Dell PowerConnect W-IAP92 Dell Instant 5.0.3.0-1.1.0.0 User Guide - Page 81

MAC Authentication, Configuring MAC Authentication

Page 81 highlights

2. Enter the URL for the splash page in the URL text box. 3. Enter the number of the port to be used for communicating with the external server in the Port text box. 4. In the Authentication text box, enter the unique signature that the external server will return in the response after a successful authentication. Figure 69 Configuring External Captive Portal Authentication when editing a Guest Network 4. Click Next and click Finish. MAC Authentication Media Access Control (MAC) authentication is used to authenticate devices based on their physical MAC addresses. It is an early form of filtering. MAC authentication requires that the MAC address of a machine must match a manually defined list of addresses. This form of authentication does not scale past a handful of devices, because it is difficult to maintain the list of MAC addresses. Additionally, it is easy to change the MAC address of a station to match one on the accepted list. This spoofing is trivial to perform with built-in driver tools, and it should not be relied upon to provide security. MAC authentication can be used alone, but typically it is combined with other forms of authentication, such as WEP authentication. Because MAC addresses are easily observed during transmission and easily changed on the client, this form of authentication should be considered nothing more than a minor hurdle that will not deter the determined intruder. Dell recommends against the use of MAC based authentication. Configuring MAC Authentication To enable MAC Authentication for a wireless network, perform the following steps: 1. In the Network tab, click the network for which you want to enable MAC authentication. The edit link for the network appears. 2. Click the edit link. The Edit box for the network appears. 3. Click Next and perform the following tasks in the Security tab: 1. For a network with Personal or Open security level, select External Radius Server from the MAC Authentication drop-down list. Dell PowerConnect W-Instant Access Point 5.0.3.0-1.1.0.0 | User Guide Authentication | 81

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140

Dell PowerConnect W-Instant Access Point 5.0.3.0-1.1.0.0
| User Guide
Authentication
|
81
2.
Enter the URL for the splash page in the
URL
text box.
3.
Enter the number of the port to be used for communicating with the external server in the
Port
text box.
4.
In the
Authentication
text box, enter the unique signature that the external server will return in the
response after a successful authentication.
Figure 69
Configuring External Captive Portal Authentication when editing a Guest Network
4.
Click
Next
and click
Finish.
MAC Authentication
Media Access Control (MAC) authentication is used to authenticate devices based on their physical MAC
addresses. It is an early form of filtering. MAC authentication requires that the MAC address of a machine must
match a manually defined list of addresses. This form of authentication does not scale past a handful of devices,
because it is difficult to maintain the list of MAC addresses. Additionally, it is easy to change the MAC address of
a station to match one on the accepted list. This spoofing is trivial to perform with built-in driver tools, and it
should not be relied upon to provide security.
MAC authentication can be used alone, but typically it is combined with other forms of authentication, such as
WEP authentication. Because MAC addresses are easily observed during transmission and easily changed on the
client, this form of authentication should be considered nothing more than a minor hurdle that will not deter the
determined intruder. Dell recommends against the use of MAC based authentication.
Configuring MAC Authentication
To enable MAC Authentication for a wireless network, perform the following steps:
1.
In the
Network
tab, click the network for which you want to enable MAC authentication. The
edit
link for the
network appears.
2.
Click the
edit
link. The
Edit
box for the network appears.
3.
Click
Next
and perform the following tasks in the
Security
tab:
1.
For a network with
Personal
or
Open
security level, select
External Radius Server
from the
MAC
Authentication
drop-down list.