Netgear WAG102 WAG102 Reference Manual - Page 45

Understanding Security Profiles, If you are using a RADIUS Server, con the RADIUS settings first

Page 45 highlights

ProSafe Dual Band Wireless Access Point WAG102 Reference Manual (802.11a/g) Understanding Security Profiles Security profiles let you configure unique security settings for each SSID. You can configure up to eight unique 802.11a wireless security profiles and up to eight unique 802.11b/g wireless security profiles on the WG302. The security profile screens are shown below in Figure 2-11. Note: If you are using a RADIUS Server, configure the RADIUS settings first, as described in the "Configuring WEP" on page 2-29. Selected Security Profile Figure 2-11 Basic Installation and Configuration v2.0, September 2006 2-19

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102

ProSafe Dual Band Wireless Access Point WAG102 Reference Manual (802.11a/g)
Basic Installation and Configuration
2-19
v2.0, September 2006
Understanding Security Profiles
Security profiles let you configure unique security settings for each SSID. You can configure up to
eight unique 802.11a wireless security profiles and up to eight unique 802.11b/g wireless security
profiles on the WG302. The security profile screens are shown below in
Figure 2-11
.
Note:
If you are using a RADIUS Server, configure the RADIUS settings first, as
described in the
“Configuring WEP” on page 2-29
.
Figure 2-11
Selected Security
Profile