Справочник Пользователя для 3e Technologies International Inc. 531AP
3e-531AP Wireless Access Point
Chapter 4 Gateway Confi guration
50
29000125-001 C
Rogue AP Detection
The Rogue AP Detection page allows the network administrator to
set up rogue AP detection. If you enable rogue AP detection, also enter
the MAC Address of each AP in the network that you want the AP being
confi gured to accept as a trusted AP. (You may add up to 20 APs.) Enter
an email address for notifi cation of any rogue or non-trusted APs.
The Rogue AP list, under Monitoring Reports on the navigation
menu, will detail any marauding APs.
802.1x
Enabling 802.1x requires that you have at least one remote Radius
server (preferably also a backup Radius server) but it will allow the use of
the legacy WEP encrypton key system with greater resultant security.
IEEE 802.1X offers an effective framework for authenticating and con-
trolling user traffi c to a protected network, as well as dynamically varying
encryption keys. 802.1X ties a protocol called EAP (Extensible Authentica-
tion Protocol) to both the wired and wireless LAN media and supports
multiple authentication methods, such as token cards, Kerberos, one-time
passwords, certifi cates, and public key authentication.
If using 802.1x, you must know and input the IP addess, Port Number
and Shared Secret for the primary and backup Radius server and the key
type selected on your Wireless Encryption page. Then set the accepted
lifetime for the encryption key.
This is shown on the next page.