User's Manual
Table Of Contents
- Introducing the 802.11a/g Router
- Installing the 802.11a/g Router
- What’s in the Box?
- A physical look at the back panel
- A physical look at the front panel
- Connecting the Cables
- High Level Configuration Steps Required for the 802.11a/g Router
- Setting up a Windows PC or wireless client as DHCP clients
- Configuring a PC running MS-Windows 95/98/Me:
- Configuring a PC running MS-Windows XP/2000:
- Confirming your PC’s IP Configuration:
- Connecting More Devices Through A Switch/Hub To The 802.11a/g Router
- Basic Configuration of the 802.11a/g Router
- Advanced Settings
- Managing your 802.11a/g Router
- How to View the device Status
- How to View the System Log
- Security Log
- DHCP Client Table
- Wireless Client Table
- Bridge Table
- WAN Status
- LAN Status
- Upgrading Firmware
- How to Save or Restore Configuration Changes
- How to Restore the System Settings to the Factory Defaults
- How to Reboot your 802.11a/g Router
- What if you Forgot the Password?
- Command Line Interface
- Text Configuration
- Specification
802.11a/g Router User’s Guide
configure anything for the TLS type. If the built-in CA is not enabled, users have to enter the built-in
RADIUS server’s certificate issued by an external CA (by specifying “Certificate Path”), the password
to use the certificate (by specifying “Password”), and the certificate of the CA issuing all the user
certificates (by specifying “Root CA Certificate Path”). The expected format for the built-in
RADIUS server’s certificate is PEM (extension file name: .pem) and the expected format for the CA’s
certificate is DER encoded binary X.509 (extension file name: .CER). Click the APPLY button to
make the settings effective. Once the built-in RADIUS server is enabled, the “Use Built-in Radius
Server” option at the “Radius Settings” page is automatically checked.
The built-in RADIUS server does not require a user listed in its user database when TLS type is being
used. So when the TLS type is selected, users do not have to add any user information into the built-in
RADIUS server’s database.
When the MD5 type is selected, users have to add the User Name and Password for each user into
the built-in RADIUS server’s database. The database management is in the MD5 User Management
section. A MD5 user can be removed from the database by selecting the user in the table and clicking
the D
ELETE SELECTED button.
For each RADIUS client that will use the built-in RADIUS server, users have to add a client entry in
the “Radius Client Management” section.
Name: a mnemonic name for the RADIUS client.
IP Address: the IP address of the RADIUS client.
Shared Secret: the shared secret pass phrase used to authenticate the RADIUS client.
When the built-in RADIUS server is enabled, the PAP authentication function is always enabled. The
PAP authentication function is used for WLAN MAC address control (the "Enable MAC Address
Access Control" option at the "Radius Settings" page); in this case, the MAC address of an authorized
WLAN client is used as both user name and password. A PAP user can be added in the PAP User
Management section with the User Name and Password entered. A PAP user can be removed
from the database by selecting the user in the table and clicking the D
ELETE SELECTED button.
49