User Manual

Setup
35
5GHz Security Settings - None
Figure 21: Wireless Security - None
No security is used. Anyone using the correct SSID can connect to your network.
The only settings available from this screen are
Radius MAC Authentication
and
UAM
(Universal Access Method).
Radius-based MAC Authentication
Radius MAC Authentication provides for MAC address checking which is centralized on your
Radius server. If you don't have a Radius Server, you cannot use this feature.
This screen will look different depending on the current security setting. If you have already
provided the address of your Radius server, you won't be prompted for it again.
Figure 22: Radius-based MAC Authentication Screen
Enable ...
Enable this if you wish to use this system.
Radius Server
Address
If this field is visible, enter the name or IP address of the Radius
Server on your network.
Radius Port
If this field is visible, enter the port number used for connections to
the Radius Server.
Client Login Name
If this field is visible, it displays the name used for the Client Login
on the Radius Server. This Login name must be created on the
Radius Server.
Shared Key
If this field is visible, it is used for the Client Login on the Radius
Server. Enter the key value to match the value on the Radius Server.