User's Manual

16
4. 802.1X: The 802.1X standard is designed to enhance the security of wireless local area networks
that follow the IEEE 802.11 standard. 802.1X uses an existing protocol, the Extensible
Authentication Protocol (EAP) for message exchange during the authentication process.
In a wireless LAN with 802.1X, a user requests access to an access point (known as the
authenticator). The access point forces the user into an unauthorized state that allows the client to
send only an EAP-start message. The AP replies with an EAP-request identify message to obtain
the clients identity. The clients EAP-response packet containing the clients identity is forwarded to
the authentication server. The authentication server is configured to authenticate clients with a
specific authentication algorithm. The result is an accept or reject packet from authentication server
to AP. Once authenticated, the AP opens the client’s port and traffic will be forwarded.
Authentication type: There are three EAP (Extensible Authentication Protocol) types supported.
You can choose between EAP-TLS
1
, EAP-MD5
2
, and EAP -TTLS
3
. You can choose NONE to
disable the 802.1X.
1
TLS- Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the