Netgear WFS709TP WFS709TP Setup Manual - Page 24

Basic WLAN Configuration, Authentication - vlan configuration

Page 24 highlights

WFS709TP ProSafe Smart Wireless Switch Software Administration Manual The base configuration software includes the following functions: • Centralized configuration and management of APs • Wireless client authentication to an external authentication server or to the WFS709TP's local database • Encryption • Mobility with fast roaming • RF management and analysis tools Basic WLAN Configuration You have a wide variety of options for authentication, encryption, access management, and user rights when you configure a WLAN in a WFS709TP system. However, you must configure the following basic elements: • An SSID that uniquely identifies the WLAN • Layer 2 authentication to protect against unauthorized access to the WLAN • Layer 2 encryption to ensure the privacy and confidentiality of the data transmitted to and from the network • A user role and virtual local area network (VLAN) for the authenticated client This section describes authentication, encryption, and VLAN configuration in the WFS709TP system. Authentication A user must authenticate to the system in order to access WLAN resources. There are several types of Layer 2 security mechanisms allowed by the IEEE 802.11 standard that you can employ, including those that require an external RADIUS authentication server. • None (also called open system authentication). This is the default authentication protocol. The client's identity, in the form of the Media Access Control (MAC) address of the wireless adapter in the wireless client, is passed to the WFS709TP. Essentially, any client requesting access to the WLAN is authenticated. 1-8 Overview of the WFS709TP v1.0, June 2007

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222

WFS709TP ProSafe Smart Wireless Switch Software Administration Manual
1-8
Overview of the WFS709TP
v1.0, June 2007
The base configuration software includes the following functions:
Centralized configuration and management of APs
Wireless client authentication to an external authentication server or to the WFS709TP’s local
database
Encryption
Mobility with fast roaming
RF management and analysis tools
Basic WLAN Configuration
You have a wide variety of options for authentication, encryption, access management, and user
rights when you configure a WLAN in a WFS709TP system. However, you must configure the
following basic elements:
An SSID that uniquely identifies the WLAN
Layer 2 authentication to protect against unauthorized access to the WLAN
Layer 2 encryption to ensure the privacy and confidentiality of the data transmitted to and
from the network
A user role and virtual local area network (VLAN) for the authenticated client
This section describes authentication, encryption, and VLAN configuration in the WFS709TP
system.
Authentication
A user must authenticate to the system in order to access WLAN resources. There are several types
of Layer 2 security mechanisms allowed by the IEEE 802.11 standard that you can employ,
including those that require an external RADIUS authentication server.
None
(also called open system authentication). This is the default authentication protocol. The
client’s identity, in the form of the Media Access Control (MAC) address of the wireless
adapter in the wireless client, is passed to the WFS709TP. Essentially, any client requesting
access to the WLAN is authenticated.