D-Link DWS-3024L User Manual - Page 97

Tunnel and complete the L3 Tunnel Subnet and L3 Tunnel Mask fields., Wireless Network Configuration

Page 97 highlights

5 Configuring Access Point Settings Table 12. Wireless Network Configuration Field MAC Authentication RADIUS IP Address RADIUS Secret RADIUS Accounting Security Description If you enable MAC authentication, wireless clients must be authenticated by the AP in order to connect to the network. You must configure the MAC addresses of the clients to accept or deny (based on the default action you set in the AP profile) in one of the following databases: • Local • RADIUS If you use a RADIUS server to authenticate wireless clients, you can use the same RADIUS server that you configure on the AAA/RADIUS tab for the profile, or you can specify a different RADIUS server. To specify a RADIUS server for this VAP, clear the Use Profile check box and enter the IP address of the RADIUS server in the field. To enter a RADIUS secret, select the Edit check box and type the secret in the field. Select the RADIUS Accounting check box to enable accounting for wireless clients on the specified RADIUS server. The default AP profile does not use any security mechanism by default. In order to protect your network, we strongly recommend that you select a security mechanism so that unauthorized wireless clients cannot gain access to your network. The following WLAN network security options are available: • None • WEP • WPA/WPA2 If you select WEP or WPA/WPA2 as your security mechanism, a dialogue box asks if you want to change network security. After you click OK, additional fields appear, and any network settings that you modified are applied to the switch. "Configuring AP Security" on page 101 describes the security mechanisms and the additional fields you can configure if you select WEP or WPA/WPA2. D-Link's Adaptable Wireless technology provides you with the choice to associate a wireless network (SSID) with a VLAN or a tunneled subnet. To associate an SSID with a VLAN, enter a VLAN ID in the VLAN field. To associate an SSID with a tunneled subnet, enable L3 Tunnel and complete the L3 Tunnel Subnet and L3 Tunnel Mask fields. The Adaptable Wireless technology offers maximized flexibility. The wireless application can determine how traffic is handled. For example, guest traffic can be tunneled to the switch for centralized security control, and VoIP traffic can be tagged with a VLAN ID and forwarded directly from the access point for optimal performance. Configuring SSID Settings 97

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268

Configuring SSID Settings
97
5
Configuring Access Point Settings
D-Link's Adaptable Wireless technology provides you with the choice to associate a wireless
network (SSID) with a VLAN or a tunneled subnet. To associate an SSID with a VLAN, enter
a VLAN ID in the VLAN field. To associate an SSID with a tunneled subnet, enable L3
Tunnel and complete the L3 Tunnel Subnet and L3 Tunnel Mask fields.
The Adaptable Wireless technology offers maximized flexibility. The wireless application can
determine how traffic is handled. For example, guest traffic can be tunneled to the switch for
centralized security control, and VoIP traffic can be tagged with a VLAN ID and forwarded
directly from the access point for optimal performance.
MAC
Authentication
If you enable MAC authentication, wireless clients must be authenticated by
the AP in order to connect to the network. You must configure the MAC
addresses of the clients to accept or deny (based on the default action you set
in the AP profile) in one of the following databases:
Local
RADIUS
RADIUS IP
Address
If you use a RADIUS server to authenticate wireless clients, you can use the
same RADIUS server that you configure on the
AAA/RADIUS
tab for the
profile, or you can specify a different RADIUS server.
To specify a RADIUS server for this VAP, clear the
Use Profile
check box
and enter the IP address of the RADIUS server in the field.
RADIUS Secret
To enter a RADIUS secret, select the Edit check box and type the secret in
the field.
RADIUS
Accounting
Select the
RADIUS Accounting
check box to enable accounting for wireless
clients on the specified RADIUS server.
Security
The default AP profile does not use any security mechanism by default. In
order to protect your network, we strongly recommend that you select a
security mechanism so that unauthorized wireless clients cannot gain access
to your network.
The following WLAN network security options are available:
None
WEP
WPA/WPA2
If you select WEP or WPA/WPA2 as your security mechanism, a dialogue
box asks if you want to change network security. After you click
OK
,
additional fields appear, and any network settings that you modified are
applied to the switch.
“Configuring AP Security”
on page 101 describes the security mechanisms
and the additional fields you can configure if you select WEP or
WPA/WPA2.
Table 12.
Wireless Network Configuration
Field
Description