3.5.5 Firewall Rule........................................................................................................... 25
3.6 M
ANAGEMENT
................................................................................................................. 26
3.6.1 SNMP ..................................................................................................................... 26
3.6.2 Remote Management............................................................................................. 27
3.7 T
OOLS
............................................................................................................................. 28
3.7.1 Restart .................................................................................................................... 28
3.7.2 Settings .................................................................................................................. 28
3.7.3 Firmware ................................................................................................................ 29
3.7.4 Ping Test................................................................................................................. 29
3.8 W
IZARD
........................................................................................................................... 30
CHAPTER 4 802.1X AUTHENTICATION SETUP .................................................................. 31
4.1 802.1X I
NFRASTRUCTURE
................................................................................................ 31
4.2 RADIUS S
ERVER
S
ETUP
................................................................................................. 32
4.2.1 Required Services .................................................................................................. 32
4.2.2 Setup Procedure .................................................................................................... 32
4.3 A
UTHENTICATOR
S
ETUP
................................................................................................... 46
4.4 W
IRELESS
C
LIENT
S
ETUP
................................................................................................. 47
4.4.1 EAP-MD5 Authentication........................................................................................ 47
4.4.2 EAP-TLS Authentication......................................................................................... 50
CHAPTER 5 TROUBLESHOOTING....................................................................................... 58
5.1 F
REQUENTLY
A
SKED
Q
UESTIONS
...................................................................................... 58
5.2 G
LOSSARY
...................................................................................................................... 59