User's Manual

Table Of Contents
802.11a/g Router User’s Guide
RADIUS Settings
RADIUS (Remote Access Dial-In User Service) servers provide centralized authentication services to
wireless clients. For the WLAN security policy 802.1x and WPA, a RADIUS server is required for the
authentication purpose. Users can use the built-in RADIUS server and/or configure up to two
RADIUS servers can be used, one acting as a primary, and the other as a backup.
Use Built-in Radius Server: The built-in RADIUS server can be used for the 802.1x and WPA
security policies. When this option is checked, the primary/secondary RADIUS server would be used
only if the built-in RADIUS server is not enabled. The built-in RADIUS server can be enabled at the
“Radius Server Settings
" page. However, when you check the “Enable Built-in Certificate Authority
option at the “Radius Server Settings
" page, this option “Use Built-in Radius Server” will be checked
automatically.
Enable MAC Address Access Control: MAC address filtering requires a MAC address filter table to
be created in either the 802.11a/g Router and/or the RADIUS server. During the 802.11
authentication phase, the MAC address filter table is searched for a match against the wireless client’s
MAC address to determine whether the station is to be allowed or denied to access the network. To
leverage a RADIUS server for MAC address access control, check the box here.
To use this feature, you have to configure the MAC addresses of authorized WLAN clients as the user
name and password in the RADIUS server you use, and the RADIUS server should support PAP
authentication.
Enable Primary Server: To configure the primary server, check the “Enable Primary Server” box,
and configure the following parameters:
Server IP: The IP address of the RADIUS server
Port Number: The port number your RADIUS server uses for authentication. The default setting is
1812.
Shared Secret: This is used by your RADIUS server in the Shared Secret field in RADIUS protocol
messages. The shared secret configured in the 802.11a/g Router must match the shared secret
configured in the RADIUS server. The shared secret can contain up to 64 alphanumeric characters.
Enable Secondary Server: To configure the secondary server, check the “Enable Secondary Server
box, and configure the same parameters as for the primary server.
RADIUS Server Retry Times: The number of times the 802.11a/g Router should attempt to contact
a RADIUS server before giving up and try the next RADIUS server. The contact sequence is Built-in
server (if used) Primary server (if enabled) Secondary server (if enabled).
RADIUS Server Reattempt Period: After failed to contact the first RADIUS server (the built-in
server, or the Primary server if the built-in server is not used), the 802.11a/g Router will re-attempt to
contact the first server every this mount of minutes even if the server being used is still working.
47