ZyXEL ADSL Prestige 662HW-61 130122.0662HW61 Manual Do Utilizador

Códigos do produto
130122.0662HW61
Página de 563
Prestige 662H/HW Series User’s Guide
Chapter 8 Wireless LAN Setup
104
Table 21   Wireless LAN: 802.1x/WPA for 802.1x Protocol
LABEL
DESCRIPTION
Wireless Port 
Control
To control wireless stations access to the wired network, select a control method 
from the drop-down list box. Choose from No Authentication Required
Authentication Required and No Access Allowed
The following fields are only available when you select Authentication Required.
ReAuthentication 
Timer                          
(in Seconds)
Specify how often wireless stations have to reenter usernames and passwords in 
order to stay connected. This field is activated only when you select 
Authentication Required in the Wireless Port Control field. 
Enter a time interval between 10 and 9999 seconds. The default time interval is 
1800 seconds (30 minutes). 
Note: If wireless station authentication is done using a RADIUS 
server, the reauthentication timer on the RADIUS server has 
priority. 
Idle Timeout         
(in Seconds)
The Prestige automatically disconnects a wireless station from the wired network 
after a period of inactivity. The wireless station needs to enter the username and 
password again before access to the wired network is allowed. 
This field is activated only when you select Authentication Required in the 
Wireless Port Control field. The default time interval is 3600 seconds (or 1 hour).
Key Management 
Protocol
Choose 802.1x from the drop-down list.
Dynamic WEP Key 
Exchange
This field is activated only when you select Authentication Required in the 
Wireless Port Control field. Also set the Authentication Databases field to 
RADIUS Only. Local user database may not be used.
Select Disable to allow wireless stations to communicate with the access points 
without using dynamic WEP key exchange. 
Select 64-bit WEP or 128-bit WEP to enable data encryption. 
Up to 32 stations can access the Prestige when you configure dynamic WEP key 
exchange.
This field is not available when you set Key Management Protocol to WPA or 
WPA-PSK.
Authentication 
Databases
The authentication database contains wireless station login information. The local 
user database is the built-in database on the Prestige. The RADIUS is an external 
server. Use this drop-down list box to select which database the Prestige should 
use (first) to authenticate a wireless station. 
Before you specify the priority, make sure you have set up the corresponding 
database correctly first. 
Select Local User Database Only to have the Prestige just check the built-in user 
database on the Prestige for a wireless station's username and password. 
Select RADIUS Only to have the Prestige just check the user database on the 
specified RADIUS server for a wireless station's username and password. 
Select Local first, then RADIUS to have the Prestige first check the user 
database on the Prestige for a wireless station's username and password. If the 
user name is not found, the Prestige then checks the user database on the 
specified RADIUS server.
Select RADIUS first, then Local to have the Prestige first check the user 
database on the specified RADIUS server for a wireless station's username and 
password. If the Prestige cannot reach the RADIUS server, the Prestige then 
checks the local user database on the Prestige. When the user name is not found 
or password does not match in the RADIUS server, the Prestige will not check the 
local user database and the authentication fails.