50
Wireless configuration
MAC Authentication
You can control access to the wireless network based on the MAC address of a user’s wireless
device. You can either block access or allow access, depending on your requirements.
Select whether to disable MAC authentication, use a MAC authentication list stored locally on
the router, or use a list stored on a RADIUS server. If local MAC authentication is selected,
configure your MAC address list on the
Wireless
>
MAC Authentication
page. See
“MAC
authentication settings” on page 71
.
Note
MAC authentication occurs after all other authentication methods have been applied.
Authentication Mode and Encryption Type
Using authentication and encryption can help keep your network secure. Encryption works on a
system of keys, where the key on a computer must match the key on the router. The router
supports a number authentication and encryption methods. When an authentication mode is
selected from the list, only the valid encryption types can be selected and all other available
configuration options, if any, are displayed.
The router provides the following Authentication Mode options:
•
Open:
Allows a client to associate with the router without any authentication, but provides
the option of using WEP for encrypting data. If WEP encryption is used, clients must have
the correct WEP key to exchange traffic with the router. Selecting WEP encryption also
provides the option of using 802.1X for user authentication from a RADIUS server, which
dynamically generates WEP keys and distributes them to all clients.
For WEP settings, see
“WEP security” on page 51
.
For RADIUS settings, see
“Configuring RADIUS settings” on page 56
.
•
WPA2:
The Enterprise mode of WPA2 using AES encryption. If all clients in the network
are WPA2 compatible, select this option for maximum security. This mode requires the use
of a RADIUS server. See
“WPA2” on page 52
.
•
WPA2-PSK:
The Personal (pre-shared key) mode of WPA2 using AES encryption. The
pre-shared key mode uses a common password phrase for user authentication that is
manually entered on the router and all wireless clients. Data encryption keys are
automatically generated by the router and distributed to all clients connected to the
network. See
“WPA2-PSK” on page 53
.
Summary of Contents for R100-Series
Page 6: ...6 ...
Page 10: ...10 Deploying the HP R110 R120 ...
Page 44: ...44 LAN configuration ...
Page 80: ...80 VPN configuration ...
Page 88: ...88 Routing configuration ...
Page 98: ...98 Firewall configuration ...
Page 130: ...130 Tools ...
Page 134: ...134 ...
Page 142: ...142 ...