User guide

58
Configuring the Access Point
Configuring Wireless Settings
5. Click Update Settings to save and apply the changes. A confirmation message
appears at the top of the page.
6. Click Go back to Wireless Configuration to reopen the previous page.
Customizing 802.1X Settings
CAUTION: Do not customize these options unless you are an experienced network
administrator or are under the guidance of an IT/support professional.
If you choose WPA as the encryption method, you have the option to set up the Access
Point to act as an 802.1X proxy, utilizing external authentication sources such as a
RADIUS server.
In 802.1X authentication, the supplicant sends access request messages along with
credentials, such as user name / password or digital certificate, to an authenticator,
which forwards the credentials to the authentication server for verification. The
supplicant (client device) remains in an unauthorized state until verification has been
received. In unauthorized state, only 802.1X traffic is allowed; all other traffic, such as
DHCP and HTTP traffic, is dropped. For its wireless interfaces, the Access Point can
serve as the authenticator communicating between the supplicant and the authenti-
cation server.
WPA Algorithm TKIP: Temporal Key Integrity Protocol is an older encryption
algorithm that provides stronger security than a shared WEP
key, but not as strong as the newer AES algorithm.
AES: AES (Advanced Encryption Standard) replaces TKIP as
the default (and recommended) encryption algorithm for
modern wireless LANs.
Auto: Auto allows both encryption algorithms to be used
on the same WLAN. When Auto is selected, the wireless
client decides whether TKIP or AES will be used. Note
however that allowing TKIP will reduce the performance of
the WLAN (as broadcast packets will be limited to slower
transfer rates), and is therefore not recommended.
Passphrase
Enter a new passphrase between 8 and 32 characters long,
using any combination of printable characters (letters,
numbers, hyphens and underscores).