Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.01.03 or greater

3-38
Wireless Local Area Networks (WLANs)
Configuring a WLAN
5. You can optionally select the Re-authentication box to force stations to
periodically re-authenticate to the server. The default period is 3600
seconds (one hour). You can shorten or lengthen this period by changing
the value in the Re-authentication Period field. The shorter the period, the
tighter the security. Valid settings are between 30 and 65535 seconds
(roughly 18 hours).
6. If you so desire, alter settings in the Advanced section:
Enter values in the Server Timeout and Server Retries fields to control
how long the module will wait for a reply from the RADIUS server
and how many times the module will re-attempt to contact a server
that does not reply.
The Server Timeout can be from 1 to 255 seconds, and the default
setting is 5 seconds. The setting for Server Retries can be from 2 to 60.
By default, the module attempts to contact the server up to three
times.
Enter values in the Station Timeout and Station Retries fields to control
how long the module will wait for a station to authenticate itself and
how many times it will reissue the challenge.
The Station Timeout can be from 1 to 255 seconds, and the default
setting is 5 seconds. The setting for Station Retries can be from 1 to 10.
The default setting is 3.
7. Click OK.
8. You will return to the WLAN’s screen. Click OK.
Web-Auth. Web-Auth allows wireless stations that do not support 802.1X to
authenticate to a RADIUS server. An easy-to-use option for authentication
option, it is often selected by administrators for wireless networks that
provide Internet or limited network access to a broad range of users. The
instructions below simply guide you through the most basic Web-Auth set-
tings. You should refer to Chapter 7: Web Authentication for Mobile Users to
learn how to configure more advanced options and customize Web pages.
Note You can configure MAC authentication for more security in a WLAN using
Web-Auth. (See Chapter 6: Wireless Network Management.)