ZyXEL Communications ADSL VoIP IAD with 802.11g Wireless 2602HW Series User Manual

Page 101

Advertising
background image

Prestige 2602HW Series User’s Guide

Chapter 6 Wireless LAN Setup

101

Table 18 Wireless LAN: 802.1x/WPA for 802.1x Protocol

LABEL

DESCRIPTION

Wireless Port

Control

To control wireless stations access to the wired network, select a control method

from the drop-down list box. Choose from No Authentication Required,

Authentication Required and No Access Allowed.
The following fields are only available when you select Authentication Required.

ReAuthentication

Timer

(in Seconds)

Specify how often wireless stations have to reenter usernames and passwords in

order to stay connected. This field is activated only when you select

Authentication Required in the Wireless Port Control field.
Enter a time interval between 10 and 9999 seconds. The default time interval is

1800 seconds (30 minutes).

Note: If wireless station authentication is done using a RADIUS

server, the reauthentication timer on the RADIUS server has
priority.

Idle Timeout
(in Seconds)

The Prestige automatically disconnects a wireless station from the wired network

after a period of inactivity. The wireless station needs to enter the username and

password again before access to the wired network is allowed.
This field is activated only when you select Authentication Required in the

Wireless Port Control field. The default time interval is 3600 seconds (or 1 hour).

Key Management

Protocol

Choose 802.1x from the drop-down list.

Dynamic WEP Key

Exchange

This field is activated only when you select Authentication Required in the

Wireless Port Control field. Also set the Authentication Databases field to

RADIUS Only. Local user database may not be used.
Select Disable to allow wireless stations to communicate with the access points

without using dynamic WEP key exchange.
Select 64-bit WEP or 128-bit WEP to enable data encryption.
Up to 32 stations can access the Prestige when you configure dynamic WEP key

exchange.
This field is not available when you set Key Management Protocol to WPA or

WPA-PSK.

Authentication

Databases

The authentication database contains wireless station login information. The local

user database is the built-in database on the Prestige. The RADIUS is an external

server. Use this drop-down list box to select which database the Prestige should

use (first) to authenticate a wireless station.
Before you specify the priority, make sure you have set up the corresponding

database correctly first.
Select Local User Database Only to have the Prestige just check the built-in user

database on the Prestige for a wireless station's username and password.
Select RADIUS Only to have the Prestige just check the user database on the

specified RADIUS server for a wireless station's username and password.
Select Local first, then RADIUS to have the Prestige first check the user

database on the Prestige for a wireless station's username and password. If the

user name is not found, the Prestige then checks the user database on the

specified RADIUS server.
Select RADIUS first, then Local to have the Prestige first check the user

database on the specified RADIUS server for a wireless station's username and

password. If the Prestige cannot reach the RADIUS server, the Prestige then

checks the local user database on the Prestige. When the user name is not found

or password does not match in the RADIUS server, the Prestige will not check the

local user database and the authentication fails.

Advertising