User manual
WPA-Enterprise
Wi-Fi Protected Access uses the IEEE 802.1X protocol to provide authenticate the user
and dynamically assign the encryption key via a RADIUS server. This is the
recommended security method.
The RADIUS server must be defined on the RADIUS page (see the RADIUS section of
the chapter entitled System).
WPA Encryption: Select the encryption algorithm, either TKIP (Temporary Key Integrity
Protocol) or AES (Advanced Encryption Standard). TKIP is more commonly supported
by wireless clients, AES is more secure, but may not be supported by wireless clients.
ACL (Access Control List)
To edit access control list settings, click the Edit icon alongside the Wireless network
interface; click the Wireless Configuration tab, then the ACL tab.
When the Access Control List is disabled (Disable Access Control List), any wireless
client with the correct ESSID (and encryption key if applicable) can connect to the
wireless network. For additional security, you can specify a list of MAC addresses
(network hardware addresses) to either allow or deny.
82
Network Setup