D-Link DWS-3024L User Manual - Page 75

Configuring AP Authentication, Configuring Access Point, Settings, Preparing the, Access Points

Page 75 highlights

4 Installing the D-Link Unified Access System by another Unified Switch, it looks up the MAC address of the AP in the local or RADIUS Valid AP database. If it finds the MAC address in the database, the switch validates the AP and assumes management. If you have not added the MAC address of the AP to the database, the AP appears in the Authentication Failed Access Points list, and the failure type is No Database Entry. Optionally, you can require that the AP is authenticated before the Unified Switch manages it. You can add authentication information about the AP when you add its MAC address to the local or RADIUS database.If you enable authentication, it takes place immediately after the switch validates the AP. NOTE: When a switch successfully validates an AP, it sends an AP Profile to the access point. The AP Profile contains all of the access point configuration information, such as the radio, security, and SSID settings. You can configure all of the AP settings before the switch validates an AP. For information about configuring the default AP profile, see Chapter 5, "Configuring Access Point Settings" on page 83. Configuring AP Authentication Unless access to the wired network is secured with IEEE 802.1X authentication or another security mechanism, the AP should always use authentication so that Rogue APs do not automatically associate with the switch. If you require the AP to authenticate itself to the switch, you must perform the following three steps: 1. Enable AP authentication on the switch, which is described in this section. 2. Connect to the access point CLI and configure a pass phrase as described in "Preparing the Access Points" on page 58. 3. Enter the pass phrase in the Valid AP database. To enter a pass phrase in the local database, see "Using the Local Database for AP Validation" on page 76. To enter a pass phrase in the RADIUS database, see "Using the RADIUS Database for AP Validation" on page 78. Authenticating and Validating Access Points 75

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268

Authenticating and Validating Access Points
75
4
Installing the D-Link Unified Access System
by another Unified Switch, it looks up the MAC address of the AP in the local or RADIUS
Valid AP database. If it finds the MAC address in the database, the switch validates the AP and
assumes management. If you have not added the MAC address of the AP to the database, the
AP appears in the Authentication Failed Access Points list, and the failure type is No Database
Entry.
Optionally, you can require that the AP is authenticated before the Unified Switch manages it.
You can add authentication information about the AP when you add its MAC address to the
local or RADIUS database.If you enable authentication, it takes place immediately after the
switch validates the AP.
NOTE:
When a switch successfully validates an AP, it sends an AP Profile to the
access point. The AP Profile contains all of the access point configuration
information, such as the radio, security, and SSID settings. You can configure
all of the AP settings
before
the switch validates an AP. For information about
configuring the default AP profile, see Chapter 5,
“Configuring Access Point
Settings”
on page 83.
Configuring AP Authentication
Unless access to the wired network is secured with IEEE 802.1X authentication or another
security mechanism, the AP should always use authentication so that Rogue APs do not
automatically associate with the switch.
If you require the AP to authenticate itself to the switch, you must perform the following three
steps:
1.
Enable AP authentication on the switch, which is described in this section.
2.
Connect to the access point CLI and configure a pass phrase as described in
“Preparing the
Access Points”
on page 58.
3.
Enter the pass phrase in the Valid AP database.
To enter a pass phrase in the local database, see
“Using the Local Database for AP
Validation”
on page 76. To enter a pass phrase in the RADIUS database, see
“Using the
RADIUS Database for AP Validation”
on page 78.