User's Manual
Table Of Contents
- Introducing the 802.11a/g Router
- Installing the 802.11a/g Router
- What’s in the Box?
- A physical look at the back panel
- A physical look at the front panel
- Connecting the Cables
- High Level Configuration Steps Required for the 802.11a/g Router
- Setting up a Windows PC or wireless client as DHCP clients
- Configuring a PC running MS-Windows 95/98/Me:
- Configuring a PC running MS-Windows XP/2000:
- Confirming your PC’s IP Configuration:
- Connecting More Devices Through A Switch/Hub To The 802.11a/g Router
- Basic Configuration of the 802.11a/g Router
- Advanced Settings
- Managing your 802.11a/g Router
- How to View the device Status
- How to View the System Log
- Security Log
- DHCP Client Table
- Wireless Client Table
- Bridge Table
- WAN Status
- LAN Status
- Upgrading Firmware
- How to Save or Restore Configuration Changes
- How to Restore the System Settings to the Factory Defaults
- How to Reboot your 802.11a/g Router
- What if you Forgot the Password?
- Command Line Interface
- Text Configuration
- Specification
802.11a/g Router User’s Guide
RADIUS Settings
RADIUS (Remote Access Dial-In User Service) servers provide centralized authentication services to
wireless clients. For the WLAN security policy 802.1x and WPA, a RADIUS server is required for the
authentication purpose. Users can use the built-in RADIUS server and/or configure up to two
RADIUS servers can be used, one acting as a primary, and the other as a backup.
Use Built-in Radius Server: The built-in RADIUS server can be used for the 802.1x and WPA
security policies. When this option is checked, the primary/secondary RADIUS server would be used
only if the built-in RADIUS server is not enabled. The built-in RADIUS server can be enabled at the
“Radius Server Settings
" page. However, when you check the “Enable Built-in Certificate Authority”
option at the “Radius Server Settings
" page, this option “Use Built-in Radius Server” will be checked
automatically.
Enable MAC Address Access Control: MAC address filtering requires a MAC address filter table to
be created in either the 802.11a/g Router and/or the RADIUS server. During the 802.11
authentication phase, the MAC address filter table is searched for a match against the wireless client’s
MAC address to determine whether the station is to be allowed or denied to access the network. To
leverage a RADIUS server for MAC address access control, check the box here.
To use this feature, you have to configure the MAC addresses of authorized WLAN clients as the user
name and password in the RADIUS server you use, and the RADIUS server should support PAP
authentication.
Enable Primary Server: To configure the primary server, check the “Enable Primary Server” box,
and configure the following parameters:
Server IP: The IP address of the RADIUS server
Port Number: The port number your RADIUS server uses for authentication. The default setting is
1812.
Shared Secret: This is used by your RADIUS server in the Shared Secret field in RADIUS protocol
messages. The shared secret configured in the 802.11a/g Router must match the shared secret
configured in the RADIUS server. The shared secret can contain up to 64 alphanumeric characters.
Enable Secondary Server: To configure the secondary server, check the “Enable Secondary Server”
box, and configure the same parameters as for the primary server.
RADIUS Server Retry Times: The number of times the 802.11a/g Router should attempt to contact
a RADIUS server before giving up and try the next RADIUS server. The contact sequence is Built-in
server (if used) Primary server (if enabled) Secondary server (if enabled).
RADIUS Server Reattempt Period: After failed to contact the first RADIUS server (the built-in
server, or the Primary server if the built-in server is not used), the 802.11a/g Router will re-attempt to
contact the first server every this mount of minutes even if the server being used is still working.
47