Dell PowerConnect W-IAP92 Dell Instant 6.1.3.4-3.1.0.0 User Guide - Page 55

Conditions for Adding a Voice Network- Security Tab, Both WPA-2 & WPA

Page 55 highlights

Table 9 Conditions for Adding a Voice Network- Security Tab If then, You select the Enterprise security level Perform the following steps: 1. Select the required key options from the Key management drop-down list. Available options are:  WPA-2 Enterprise  WPA Enterprise  Both (WPA-2 & WPA)  Dynamic WEP with 802.1x  Use Session Key for LEAP: Use the Session Key for LEAP instead of using Session Key from the RADIUS Server to derive pair wise unicast keys. This is required for old printers that use dynamic WEP via LEAP authentication. This is Disabled by default. For more information on encryption and recommended encryption type, see Chapter 11, "Encryption" . 2. Termination- Enable this option to terminate the EAP portion of 802.1x authentication on the IAP instead of the RADIUS server. For more information, see "External RADIUS Server" on page 110. 3. Authentication server 1 and 2- Select the required Authentication server option from the drop-down list. Available options are:  New- If you select this option, then an external radius server has to be configured to authenticate the users. For information on configuring an external RADIUS server, see Chapter 10, "Authentication" . 4. Reauth interval- When set to a value greater than zero, the Access Points periodically reauthenticate all associated and authenticated clients. 5. Blacklisting- Select Enabled if you want clients to be blacklisted after a certain number of authentication failures. 6. Max authentication failures- Users who fail to authenticate the number of times specified here will be dynamically blacklisted. The maximum value for this entry is 10. NOTE: Navigate to PEF > Blacklisting in the WebUI to specify the duration of the blacklisting on the Blacklisting tab of the PEF window. Dell PowerConnect W-Series Instant Access Point 6.1.3.4-3.1.0.0 | User Guide Wireless Network | 55

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

Dell PowerConnect W-Series Instant Access Point 6.1.3.4-3.1.0.0
| User Guide
Wireless Network
|
55
Table 9
Conditions for Adding a Voice Network— Security Tab
If
then,
You select the
Enterprise
security level
Perform the following steps:
1.
Select the required key options from the
Key management
drop-down list.
Available options are:
WPA-2 Enterprise
WPA Enterprise
Both (WPA-2 & WPA)
Dynamic WEP with 802.1x
Use Session Key for LEAP:
Use the
Session Key for LEAP
instead of using
Session Key from the RADIUS Server to derive pair wise unicast keys. This
is required for old printers that use dynamic WEP via LEAP authentication.
This is
Disabled
by default.
For more information on encryption and recommended
encryption type, see
Chapter 11, “Encryption”
.
2.
Termination
— Enable this option to terminate the EAP portion of 802.1x
authentication on the IAP instead of the RADIUS server. For more
information, see
“External RADIUS Server” on page 110
.
3.
Authentication server 1 and 2—
Select the required Authentication server
option from the drop-down list. Available options are:
New
— If you select this option, then an external radius server has to be
configured to authenticate the users. For information on configuring an
external RADIUS server, see
Chapter 10, “Authentication”
.
4.
Reauth interval—
When set to a value greater than zero, the Access
Points periodically reauthenticate all associated and authenticated
clients.
5.
Blacklisting—
Select
Enabled
if you want clients to be blacklisted after a
certain number of authentication failures.
6.
Max authentication failures—
Users who fail to authenticate the number
of times specified here will be dynamically blacklisted. The maximum
value for this entry is 10.
NOTE:
Navigate to
PEF > Blacklisting
in the WebUI to specify the duration of
the blacklisting on the Blacklisting tab of the PEF window.