3.2.3 802.1X
There are three essential components to the 802.1x infrastructure: (1) Supplicant, (2)
Authenticator and (3) Server. The Router serves as an Authenticator, and the EAP
methods used must be supported by the backend Radius Server. The 802.1x security
supports both MD5 and TLS Extensive Authentication Protocol (EAP). Please follow
the steps below to configure 802.1X security.
1.
Select the
Encryption Key Length Size
ranging from 64 to 128 Bits that you
would like to use.
Select the
Lifetime of the Encryption Key
from 5 Minutes to 1 Day. As soon
as the lifetime of the Encryption Key is over, the Encryption Key will be renewed
by the Radius server.
2.
Enter the
IP address
of and the
Port
used by the
Primary
Radius Server
Enter the
Shared Secret
, which is used by the Radius Server.
24
Summary of Contents for WBR-3405TX
Page 1: ...LevelOne WBR 3405TX 11g Wireless AP Router User s Manual ...
Page 7: ...Now the main menu screen is popup 7 ...
Page 11: ...PPPoE to obtain IP automatically 11 ...
Page 12: ...PPPoE with a fixed IP address 12 ...
Page 13: ...PPTP 13 ...
Page 23: ...23 ...