User`s guide
Table Of Contents
- About This User's Guide
- Document Conventions
- Safety Warnings
- Table of Contents
- Part I: Introduction
- 1. Getting to Know Your MWR222
- 2.
- 2. Introducing the Web Configurator
- 3. Monitor
- 4.
- 4.
- 4. MWR222 Modes
- 5. Router Mode
- 6. Access Point Mode
- 5.
- 5.
- 7. WISP Mode
- 7
- 7
- 8 Tutorials
- 8.3 Connecting to Internet from an Access Point
- 8.4 Configuring Wireless Security Using WPS
- 9 Wireless LAN
- 9.1 Overview
- 9.2 What You Can Do
- Use the General screen to enable the Wireless LAN, enter the SSID and select the wireless security mode.
- 9.3 What You Should Know
- 9.4 General Wireless LAN Screen
- 9.5 Security
- 9.6 MAC Filter
- 9.7 Wireless LAN Advanced Screen
- 9.8 Quality of Service (QoS) Screen
- 9.9 WPS Screen
- 9.10 WPS Station Screen
- 9.11 Scheduling Screen
- 9.12 WDS Screen
- 10.1 Overview
- 10.2 What You Can Do
- 10.3 What You Need To Know
- 10.2
- 10.3
- 10.4 Internet Connection
- 10.5 Mobile WAN
- 10.7 IGMP Snooping Screen
- 11 LAN
- 12 DHCP Server
- 13. Network Address Translation (NAT)
- 14 Dynamic DNS
- 15. OpenDNS
- 16 Static Route
- 17.
- 17.
- 17. Routing Information Protocol
- Part III
- Part V
- Maintenance and Troubleshooting
- Part VI
- Appendices and Index
- Appendix A
- Pop-up Windows, JavaScripts and Java Permissions
- End-User License Agreement for “MWR222”
- NOTE: Some components of this product incorporate free software programs covered under the open source code licenses which allows you to freely copy, modify and redistribute the software. For at least three (3) years from the date of distribution of t...
- Notice
- Information herein is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any p...
- Notice
- GNU GENERAL PUBLIC LICENSE
- GNU LESSER GENERAL PUBLIC LICENSE

MWR211 User’s Guide
274
Figure 157 WPA(2)-PSK Authentication
WPA(2) with RADIUS Application Example
You need the IP address of the RADIUS server, its port number (default is 1812),
and the RADIUS shared secret. A WPA(2) application example with an external
RADIUS server looks as follows. "A" is the RADIUS server. "DS" is the distribution
system.
1 The AP passes the wireless client's authentication request to the
RADIUS server.
2 The RADIUS server then checks the user's identification against its
database and grants or denies network access accordingly.
3 The RADIUS server distributes a Pairwise Master Key (PMK) key to the
AP that then sets up a key hierarchy and management system, using
the pair-wise key to dynamically generate unique data encryption keys
to encrypt every data packet that is wirelessly communicated between
the AP and the wireless clients.
Security Parameters Summary
Refer to this table to see what other security parameters you should configure for
each Authentication Method/ key management protocol type. MAC address filters
are not dependent on how you configure these security features.