D-Link DWL-7700AP Product Manual - Page 6

Introduction continued - d link

Page 6 highlights

DWL-7700AP User's Manual Introduction (continued) Introduction WPA-EAP and WPA2-EAP is ideal for businesses that have existing security infrastructures in place. Management and security implementation can now be centralized on a server participating on the network. Utilizing 802.1x with a RADIUS (Remote Authentication Dial-in User Service) server, a network adminstrator can define a list of authorized users who can access the wireless LAN. When attempting to access a wireless LAN with either WPA-EAP or WPA2-EAP configured, the new client will be challenged with a username and password. If the new client is authorized by the administration, and enters the correct username and password, then access is granted. In a scenario where an employee leaves the company, the network administrator can remove the employee from the authorized list and not have to worry about the network being compromised by a former employee. WPA2-EAP is far superior to WPA-EAP, because the encryption of data is upgraded with the Advanced Encryption Standard (AES). 802.1x: Authentication which is a first line of defense against intrusion. In the authentication process, the Authentication Server verifies the identity of the client attempting to connect to the network. Unfamiliar clients would be denied access. EAP (Extensible Authentication Protocol) is available through the Windows XP Operating System.You will need to use the same type of EAP protocol on all the devices in your network when using the 802.1x feature. D-Link Systems, Inc. 6

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125

6
DWL-7700AP User’s Manual
D-Link Systems, Inc.
Introduction (continued)
Introduction
WPA-EAP
and
WPA2-EAP
is ideal for businesses that have existing security
infrastructures in place. Management and security implementation can now be
centralized on a server participating on the network. Utilizing 802.1x with a RADIUS
(Remote Authentication Dial-in User Service) server, a network adminstrator can define
a list of authorized users
who can access the wireless LAN. When attempting to access
a wireless LAN with either
WPA-EAP
or
WPA2-EAP
configured, the new client will
be challenged with a username and password.
If the new client is authorized by the
administration, and enters the correct username and password, then access is granted.
In a scenario where an employee leaves the company, the network administrator can
remove the employee from the authorized list and not have to worry about the network
being compromised by a former employee.
WPA2-EAP
is far superior to
WPA-EAP
,
because the encryption of data is upgraded with the Advanced Encryption Standard
(AES).
802.1x: Authentication
which is a first line of defense against intrusion. In the
authentication process, the Authentication Server verifies the identity of the client
attempting to connect to the network. Unfamiliar clients would be denied access.
EAP (Extensible Authentication Protocol)
is available through the Windows XP
Operating System. You will need to use the same type of EAP protocol on all the devices
in your network when using the 802.1x feature.