Netgear WC7600v2 – ProSAFE Wireless Controller 사용자 설명서
Manage Security Profiles and Profile Groups
139
ProSAFE Wireless Controller
WPA2 with Radius
AES
TKIP + AES
To configure WPA2 authentication with a RADIUS server:
1.
Set up and enable an internal or external (RADIUS or LDAP)
authentication server.
For information, see
authentication server.
For information, see
From the Data Encryption menu, select the type of
encryption:
encryption:
-
AES. Supports AES only.
-
TKIP + AES. Supports both TKIP and AES.
2.
Select the Local or External radio button.
3.
If you select the External radio button, select the
authentication server that you wish to use from the menu.
authentication server that you wish to use from the menu.
WPA & WPA2 with Radius
Note:
Use this option if
the network includes both
WPA and WPA2 clients.
WPA and WPA2 clients.
TKIP + AES
To configure WPA & WPA2 authentication with a RADIUS server:
1.
Set up and enable an internal or external (RADIUS or LDAP)
authentication server.
For information, see
authentication server.
For information, see
2.
Select the Local or External radio button.
3.
If you select the External radio button, select the
authentication server that you wish to use from the menu.
authentication server that you wish to use from the menu.
Note:
The Data Encryption menu displays TKIP + AES, which
is the only available option. Both TKIP and AES are supported.
WPA-PSK
TKIP
TKIP + AES
To configure WPA-PSK authentication:
1.
From the Data Encryption menu, select the type of
encryption:
encryption:
-
TKIP. Supports TKIP only.
-
TKIP + AES. Supports both TKIP and AES.
2.
To display the characters in the WPA Passphrase (Network
Key) field, select the Show Passphrase check box.
Key) field, select the Show Passphrase check box.
3.
Type a passphrase of at least eight characters in the WPA
Passphrase (Network Key) field.
Passphrase (Network Key) field.
Note:
For information about requirements for a WPA
passphrase, see
Table 10. Network authentication and data encryption settings (continued)
Network Authentication
Selection
Selection
Data
Encryption
Options
Encryption
Options
Configuration Steps