Справочник Пользователя для 3e Technologies International Inc. 531AP

Скачать
Страница из 104
3e-531AP Wireless Access Point
Chapter 4 Gateway Confi guration
50
29000125-001 C
Rogue AP Detection
The Rogue AP Detection page allows the network administrator to 
set up rogue AP detection. If you enable rogue AP detection, also enter 
the MAC Address of each AP in the network that you want the AP being 
confi gured to accept as a trusted AP. (You may add up to 20 APs.)  Enter 
an email address for notifi cation of any rogue or non-trusted APs. 
The Rogue AP list, under Monitoring Reports on the navigation 
menu, will detail any marauding APs.
802.1x
Enabling 802.1x requires that you have at least one remote Radius 
server (preferably also a backup Radius server) but it will allow the use of 
the legacy WEP encrypton key system with greater resultant security.
IEEE 802.1X offers an effective framework for authenticating and con-
trolling user traffi c to a protected network, as well as dynamically varying 
encryption keys. 802.1X ties a protocol called EAP (Extensible Authentica-
tion Protocol) to both the wired and wireless LAN media and supports 
multiple authentication methods, such as token cards, Kerberos, one-time 
passwords, certifi cates, and public key authentication.
If using 802.1x, you must know and input the IP addess, Port Number 
and Shared Secret for the primary and backup Radius server and the key 
type selected on your Wireless Encryption page. Then set the accepted 
lifetime for the encryption key.
This is shown on the next page.