User's Manual
Table Of Contents
- Introducing the 802.11a/g Router
- Installing the 802.11a/g Router
- What’s in the Box?
- A physical look at the back panel
- A physical look at the front panel
- Connecting the Cables
- High Level Configuration Steps Required for the 802.11a/g Router
- Setting up a Windows PC or wireless client as DHCP clients
- Configuring a PC running MS-Windows 95/98/Me:
- Configuring a PC running MS-Windows XP/2000:
- Confirming your PC’s IP Configuration:
- Connecting More Devices Through A Switch/Hub To The 802.11a/g Router
- Basic Configuration of the 802.11a/g Router
- Advanced Settings
- Managing your 802.11a/g Router
- How to View the device Status
- How to View the System Log
- Security Log
- DHCP Client Table
- Wireless Client Table
- Bridge Table
- WAN Status
- LAN Status
- Upgrading Firmware
- How to Save or Restore Configuration Changes
- How to Restore the System Settings to the Factory Defaults
- How to Reboot your 802.11a/g Router
- What if you Forgot the Password?
- Command Line Interface
- Text Configuration
- Specification
Radius Server Settings
The 802.11a/g Router has a built-in RADIUS server so users don’t have to setup a separate RADIUS
for the use of WLAN 802.1x and WPA security policies and MAC address access control. To use the
built-in RADIUS server, users have to select the “Enable Built-in Radius Server” check box. The
built-in RADIUS server currently provides two types of authentication methods for EAP
authentication: MD5 and TLS (i.e. EAP-MD5 or EAP-TLS). The way to configure the setting for the
TLS type depends on whether the built-in CA (certificate authority) is enabled. The built-in CA is
enabled by selecting the “Enable Built-in Certificate Authority” option. If the built-in CA is enabled,
the built-in RADIUS server will use the built-in CA to issue its own certificate and requires all the user
certificates issued by the built-in CA. So when the built-in CA is enabled, users do not have to
48