User`s manual

31
y IEEE 802.1x EAP with Static WEP (EAP-MD5): The IEEE 802.1x
functionality is enabled and the user-name/password-based EAP-
MD5 authentication is used. Data encryption is achieved by static
WEP.
y IEEE 802.1x EAP with Dynamic WEP (EAP-TLS, EAP-TTLS,
PEAP): The IEEE 802.1x functionality is enabled and dynamic WEP
key distribution authentication (EAP-TLS, EAP-TTLS, or PEAP) is
used. Data encryption is achieved by dynamic WEP.
y IEEE 802.1x EAP with Dynamic TKIP (WPA): This is a full WPA
mode, in which both the TKIP and IEEE 802.1x dynamic key
exchange mechanisms are enabled. The AP is highly secured in this
mode.
In the above security modes, a back-end RADIUS (Remote Authentication
Dial-In User Service) server is needed if IEEE 802.1x functionality is enabled.
According to the IEEE 802.11 standard, WEP can be used for authentication
and data encryption. Normally, Shared Key authentication is used if WEP
data encryption is enabled. In rare cases, Open System authentication may
be used when WEP data encryption is enabled. The Authentication algorithm
setting is provided for better compatibility with wireless clients with various
WLAN network adapters. There are three options available, including Open
System, Shared Key, and Auto.
When WEP is enabled by a security mode, the Key length can be specified to
be 64 Bits or 128 Bits. The Selected key setting specifies the key to be used
as a send-key for encrypting traffic from the AP side to the wireless client side.
All 4 WEP keys are used as receive-keys to decrypt traffic from the wireless
client side to the AP side.
3.6.2.2 MAC-Address-Based Access Control
With MAC-Address-Based Access Control, users can specify the wireless
client computers that are permitted or not permitted to associate with the AP.
When the table type is set to inclusive, entries in the table are permitted to
associate with the AP. When the table type is set to exclusive, entries in the
table are not permitted to associate with the AP.