Software User Manual
D-Link Unified Access System
02/15/2011
Document 34CS3000-SWUM104-D10
Page 101
Configuring Valid Access Point Settings
You can add an AP into the list of Valid APs from the
Administration > Basic Setup > Valid AP
tab, as <Link>Figure 47
shows, or you can add an AP from the AP Authentication Failures or Rogue AP/RF Scan lists.
From the
Valid AP
page, you can manually set the channel and RF signal transmit power level for an individual AP. You can
also configure the AP mode and local authentication password, and you can specify which profile the AP uses.
Passphrase
The WPA Key is the shared secret key for
WPA
Personal. Enter a string of at least 8
characters to a maximum of 63 characters.
Pre-Authentication
If you select WPA/WAP2 Enterprise, you can enable Pre-Authentication.
Click the
Pre-Authentication
check box if you want
WPA2
wireless clients to send pre-
authentication packets. The pre-authentication information is relayed from the access point
the client is currently using to the target access point.
Enabling this feature can help speed up authentication for roaming clients who connect to
multiple access points. Only clients that connect by using WPA2 can use this feature. It is
not supported by the original
WPA
.
Pre-Authentication Limit
Enter the number of pre-authentications that can be in progress simultaneously on an AP.
The limit prevents too much load on the RADIUS server. This does not prevent the pre-
authentication from being attempted again when the load is lighter. A value of 0 represents
no limit.
Note:
This field is only available if you access the network through the AP Profile or
Network page under
Advanced Configuration
.
Key Forwarding
Select the check box to allow APs to forward the Pairwise Master Key (PMK) for the wireless
client to other APs in case the client roams to another AP.
Note:
This field is only available if you access the network through the AP Profile or
Network page under
Advanced Configuration
.
Key Caching Hold Time
Enter the amount of minutes a PMK will be held by the AP. This applies to PMKs generated
by RADIUS, those that come from pre-authentication, and those that are forwarded to the
AP. Note that this time limit can be overridden by RADIUS if the RADIUS server returns a
longer time in the Session-Timeout attribute for a particular user. The valid values of this are
from 1-1440 minutes.
Note:
This field is only available if you access the network through the AP Profile or
Network page under
Advanced Configuration
.
Table 17: Static WPA
Field
Description