Netgear WN203 User Manual - Page 39

Con WPA with RADIUS, WPA2 with RADIUS, and WPA & WPA2 with RADIUS, Con WPA-PSK

Page 39 highlights

ProSAFE Single Band 802.11n Wireless Access Point WN203 Setting Description Network Authentication and Data Encryption (continued) WPA & WPA2 with Radius Configure the RADIUS server setting. TKIP + AES encryption is the default encryption. For more information, see Configure WPA with RADIUS, WPA2 with RADIUS, and WPA & WPA2 with RADIUS on page 42. Note: This setting allows clients to connect through either WPA with TKIP or WPA2 with AES. WPA-PSK WPA2-PSK Enter a WPA passphrase and select TKIP or TKIP + AES encryption. For more information, see Configure WPA-PSK, WPA2-PSK, and WPA-PSK & WPA2-PSK on page 43. Enter a WPA passphrase and select AES or TKIP + AES encryption. For more information, see Configure WPA-PSK, WPA2-PSK, and WPA-PSK & WPA2-PSK on page 43. WPA-PSK & WPA2-PSK Note: Select this setting only if all clients support WPA2. Enter a WPA passphrase. TKIP + AES encryption is the default encryption. For more information, see Configure WPA-PSK, WPA2-PSK, and WPA-PSK & WPA2-PSK on page 43. Note: This setting allows clients to connect through either WPA with TKIP or WPA2 with AES. Wireless Client Security Separation If you enable wireless client security separation by selecting Enable from the drop-down menu, the associated wireless clients cannot communicate with each other. By default, Disable is selected from the drop-down menu. This feature is intended for hotspots and other public access situations. Dynamic VLAN From the drop-down menu, select how VLANs operate by making one of the following selections: • Disable. Disables dynamic VLANs, and enables static VLANs. This is the default setting. • Optional. Enables dynamic VLANs, but if a RADIUS server does not return a VLAN ID, the wireless client is still allowed to connect to the wireless access point. • Required. Enables dynamic VLANs. If a RADIUS server does not return a VLAN ID, the wireless client is not authenticated and cannot connect to the wireless access point. For dynamic VLANs to operate (that is, the selection is Optional or Required), the following is required: • The hubs and switches on your LAN need to support the VLAN (802.1Q) standard. • The authentication is set to any RADIUS type authentication: either the network authentication in the wireless security profile or the remote MAC address database authentication for the MAC Authentication feature can be used. Wireless Configuration and Security 39

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133

Wireless Configuration and Security
39
ProSAFE Single Band 802.11n Wireless Access Point WN203
Network Authentication
and Data Encryption
(continued)
WPA & WPA2 with
Radius
Configure the RADIUS server setting. TKIP + AES
encryption is the default encryption.
For more information, see
Configure WPA with RADIUS,
WPA2 with RADIUS, and WPA & WPA2 with RADIUS
on
page
42.
Note:
This setting allows clients to connect through either
WPA with TKIP or WPA2 with AES.
WPA-PSK
Enter a WPA passphrase and select TKIP or TKIP + AES
encryption.
For more information, see
Configure WPA-PSK,
WPA2-PSK, and WPA-PSK & WPA2-PSK
on page
43.
WPA2-PSK
Enter a WPA passphrase and select AES or TKIP + AES
encryption.
For more information, see
Configure WPA-PSK,
WPA2-PSK, and WPA-PSK & WPA2-PSK
on page
43.
Note:
Select this setting only if all clients support WPA2.
WPA-PSK &
WPA2-PSK
Enter a WPA passphrase. TKIP + AES encryption is the
default encryption.
For more information, see
Configure WPA-PSK,
WPA2-PSK, and WPA-PSK & WPA2-PSK
on page
43.
Note:
This setting allows clients to connect through either
WPA with TKIP or WPA2 with AES.
Wireless Client Security
Separation
If you enable wireless client security separation by selecting Enable from the
drop-down menu, the associated wireless clients cannot communicate with
each other. By default, Disable is selected from the drop-down menu. This
feature is intended for hotspots and other public access situations.
Dynamic VLAN
From the drop-down menu, select how VLANs operate by making one of the
following selections:
Disable
. Disables dynamic VLANs, and enables static VLANs. This is the
default setting.
Optional
. Enables dynamic VLANs, but if a RADIUS server does not return
a VLAN ID, the wireless client is still allowed to connect to the wireless
access point.
Required
. Enables dynamic VLANs. If a RADIUS server does not return a
VLAN ID, the wireless client is not authenticated and cannot connect to the
wireless access point.
For dynamic VLANs to operate (that is, the selection is Optional or Required),
the following is required:
The hubs and switches on your LAN need to support the VLAN (802.1Q)
standard.
The authentication is set to any RADIUS type authentication: either the
network authentication in the wireless security profile or the remote MAC
address database authentication for the MAC Authentication feature can be
used.
Setting
Description