User's Manual
Table Of Contents
- WavePoint™ Product Safety
- Preface
- Chapter 1: Introduction
- Key Features and Supported Protocols
- Requirements
- Accessories
- Product Variations
- WavePoint 10e Labels
- WavePoint™ Components
- Certified Antennas
- Connect Power
- Network Deployment Scenarios
- Connecting and Logging In
- Configuration Pages
- Chapter 2: Configuring Basic WavePoint™ Network Features
- Chapter 3: Additional Data Networking Features
- Chapter 4: Configuring Wireless Access
- Example: Point-to-Point Configuration
- Point-to-Multipoint Configuration Examples
- Configuring Wireless Communication
- Defining Advanced Radio Settings
- Verify the Wireless Connection
- Enabling Virtual Access Points
- Wireless Security
- Scheduling When Wireless Connections are Available
- Chapter 5: Security
- Chapter 6: Management and Administration
- Set Up Remote Access to the WAN Port
- User Access Management
- Software Maintenance
- System Logging
- Simple Network Management Protocol (SNMP)
- Authentication Certificates
- Setting the Date and Time
- System Statistics
- Chapter 7: Diagnostics and Troubleshooting
- Appendix A: Factory Default Settings
- Chapter B: Installation Instructions
- Appendix C: WavePoint™ Configurations
- Appendix D: Bench Test Verification of WavePoint™ Configuration
- Appendix E: WavePoint 10e Technical Specifications
- Glossary
- Index
WavePoint 10e
2. Use a web browser to access the Configuration pages.
3. On the Wireless LAN menu, click Rogue AP List.
The Rogue AP List at the bottom of the page identifies the:
l SSID and MAC address of the unauthorized devices that attempted to access the
wireless network.
l Security mode set on the rogue device.
l Time that has passed since the access attempt.
Defining EAP Authentication and External RADIUS Servers
In wireless communications using the Extensible Authentication Protocol (EAP), users request
connection to the wireless network through a WavePoint 10e. The WavePoint 10e then requests
the user's identity and sends that identity to the RADIUS authentication server.
If WPA-Enterprise is selected as the wireless security option in the Wireless LAN > Radios >
Basic menu, a RADIUS server must be defined to authenticate and authorize users and devices to
access the wireless network.
Note: A RADIUS server is an external server that provides authentication for devices
and users trying to access the wireless network.
Configure the EAP Authentication
1. Connect to the WavePoint 10e either through an Ethernet cable connected to Ethernet
port 3 or 4 or through the computer's wireless options.
2. Use a web browser to access the Configuration pages.
3. On the Wireless LAN menu, click RADIUS Settings.
4. In the EAP Authentication Configuration section, complete these fields:
a. Select the Outer EAP Method authentication used to establish a tunnel the User
Name and Password are exchanged over.
b. Enter the unique User Name for the user.
c. Enter the unencrypted Anonymous ID that a Client must match to start an
authentication request.
Note: Both EAP-TTLS and EAP-PEAP support anonymous identification,
or identification hiding.
An access point typically generates an EAP-Identity request used to
LUM0063AA Rev 05/05/2014 Page 95 of 171
This document is the property of FreeWave Technologies, Inc. and contains proprietary information owned by
FreeWave®. This document cannot be reproduced in whole or in part by any means without written permission from
FreeWave Technologies, Inc.