Справочник Пользователя для Interepoch Technology Inc. IWE3302
35
In the above security modes, a back-end RADIUS (Remote Authentication Dial-In User Service)
server is needed if IEEE 802.1x functionality is enabled. See Section 3.5.3 for more information about
IEEE 802.1x and RADIUS.
server is needed if IEEE 802.1x functionality is enabled. See Section 3.5.3 for more information about
IEEE 802.1x and RADIUS.
According to the IEEE 802.11 standard, WEP can be used for authentication and data encryption.
Normally, Shared Key authentication is used if WEP data encryption is enabled. In rare cases, Open
System authentication may be used when WEP data encryption is enabled. The Authentication algo-
rithm setting is provided for better compatibility with wireless clients with various WLAN network
adapters. There are three options available, including Open System, Shared Key, and Auto.
Normally, Shared Key authentication is used if WEP data encryption is enabled. In rare cases, Open
System authentication may be used when WEP data encryption is enabled. The Authentication algo-
rithm setting is provided for better compatibility with wireless clients with various WLAN network
adapters. There are three options available, including Open System, Shared Key, and Auto.
When WEP is enabled by a security mode, the Key length can be specified to be 64 Bits or 128 Bits.
The Selected key setting specifies the key to be used as a send-key for encrypting traffic from the
IEEE 802.11b/g side to the wireless client side. All 4 WEP keys are used as receive-keys to decrypt
traffic from the wireless client side to the IEEE 802.11b/g side.
The Selected key setting specifies the key to be used as a send-key for encrypting traffic from the
IEEE 802.11b/g side to the wireless client side. All 4 WEP keys are used as receive-keys to decrypt
traffic from the wireless client side to the IEEE 802.11b/g side.
NOTE:
Each field of a WEP key setting is a hex-decimal number from 00 to FF. For example, when
the security mode is Static WEP and the key length is 64 Bits, you could set Key 1 to
“00012E3ADF”.
“00012E3ADF”.
3.5.2.2. MAC-Address-Based Access Control
Fig. 46: MAC-address-based access control settings
With MAC-Address-Based Access Control, you can specify the wireless client computers that are
permitted or not permitted to associate with the IEEE 802.11b/g. When the table type is set to inclu-
sive, entries in the table are permitted to associate with the IEEE 802.11b/g. When the table type is set
to exclusive, entries in the table are not permitted to associate with the IEEE 802.11b/g.
permitted or not permitted to associate with the IEEE 802.11b/g. When the table type is set to inclu-
sive, entries in the table are permitted to associate with the IEEE 802.11b/g. When the table type is set
to exclusive, entries in the table are not permitted to associate with the IEEE 802.11b/g.
To deny wireless clients’ access to the wireless network:
1.
Select Enabled from the Functionality drop-down list.
2.
Set the Access control type to exclusive.
3.
Specify the MAC address of a wireless client to be denied access, and then click Add.
4.
Repeat Steps 3 for other wireless clients.
To grant wireless clients’ access to the wireless network:
1.
Select Enabled from the Functionality drop-down list.
2.
Set the Access control type to inclusive.