113
Item Description
Enable RADIUS Server Check it to enable the internal RADIUS server.
Authentication Type
Let the user to choose the authentication method for RADIUS server.
Radius EAP Type – There are two types, PEAP and EAP TLS, offered for
selection. If EAP TLS is selected, a certificate must be installed or must be
ensured to be trusted.
Users Profile
Username – Type a new name for the user profile.
Password – Type a new password for such new user profile.
Confirm Password – Retype the password to confirm it.
Configure
Add – Make a new user profile with the name and password specified
on the left boxes.
Cancel – Clear current settings for user profile.
Delete Selected – Delete the selected user profile (s).
Delete All – Delete all of the user profiles.
Authentication Client
This internal RADIUS server of VigorAP 903 can be treated as the external
RADIUS server for other users. Specify the client IP and secret key to make
the wireless client choosing VigorAP 903 as its external RADUIS server.
Client IP – Type the IP address for the user to be authenticated by
VigorAP 903 when the user tries to use VigorAP 903 as the external
RADIUS server.
Secret Key – Type the password for the user to be authenticated by
VigorAP 903 while the user tries to use VigorAP 903 as the external
RADIUS server.
Confirm Secret Key – Type the password again for confirmation.
Configure
Add – Make a new client with IP and secret key specified on the left
boxes.
Cancel – Clear current settings for the client.
Delete Selected – Delete the selected client(s).
Delete All – Delete all of the clients.
Backup
Click it to store the settings (RADIUS configuration) on this page as a file.
Restore
Click it to restore the settings (RADIUS configuration) from an existed file.
After finishing this web page configuration, please click OK to save the settings.
IV-1-2 Certificate Management
When the local client and remote server are required to make certificate authentication (e.g., Radius
EAP-TLS authentication) for wireless connection and avoiding the attack of MITM, a trusted root certificate
authority (Root CA) will be used to authenticate the digital certificates offered by both ends.
However, the procedure of applying digital certificate from a trusted root certificate authority is
complicated and time-consuming. Therefore, Vigor AP offers a mechanism which allows you to generate
root CA to save time and provide convenience for general user. Later, such root CA generated by DrayTek
server can perform the issuing of local certificate.
Root CA can be deleted but not edited. If you want to modify the settings for a Root CA, please delete the
one and create another one by clicking Create Root CA.
Содержание VigorAP 903
Страница 1: ...I ...
Страница 6: ...Chapter I Installation ...
Страница 29: ...23 ...
Страница 32: ...26 5 After clicking Finish the following web page appears VigorAP will search for mesh node around the network ...
Страница 34: ...28 8 Later a summary page of mesh root with mesh node will be shown on the screen ...
Страница 40: ...34 This page is left blank ...
Страница 41: ...35 Chapter II Connectivity ...
Страница 45: ...39 ...
Страница 68: ...62 Below shows how Band Steering works ...
Страница 92: ...86 This page is left blank ...
Страница 93: ...87 Chapter III Management ...
Страница 116: ...110 This page is left blank ...
Страница 117: ...111 Chapter IV Others ...
Страница 128: ...122 This page is left blank ...
Страница 129: ...123 Chapter V Troubleshooting ...
Страница 134: ...VigorAP 903 User s Guide 128 V 1 6 WLAN 5GHz Statistics Such page is used for debug by RD only ...
Страница 139: ...133 V 1 9 Station Airtime This page displays the operation status for 2 4GHz wireless stations within 30 minutes ...
Страница 147: ...141 ...