TRENDnet TEW-453APB User Guide - Page 32

Security Settings - WPA-802.1x, WPA-802.1x Wireless Security

Page 32 highlights

Access Point Setup Security Settings - WPA-802.1x This version of WPA requires a Radius Server on your LAN to provide the client authentication according to the 802.1x standard. Data transmissions are encrypted using the WPA standard. If this option is selected: • This Access Point must have a "client login" on the Radius Server. • Each user must have a "user login" on the Radius Server. Normally, a Certificate is used to authenticate each user. See Chapter4 for details of user configuration. • Each user's wireless client must support 802.1x. • All data transmission is encrypted using the WPA standard. Keys are automatically generated, so no key input is required. Figure 18: WPA-802.1x Wireless Security 29

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115

Access Point Setup
Security Settings - WPA-802.1x
This version of WPA requires a Radius Server on your LAN to provide the client authentica-
tion according to the 802.1x standard. Data transmissions are encrypted using the WPA
standard.
If this option is selected:
This Access Point must have a "client login" on the Radius Server.
Each user must have a "user login" on the Radius Server. Normally, a Certificate is used to
authenticate each user. See Chapter4 for details of user configuration.
Each user's wireless client must support 802.1x.
All data transmission is encrypted using the WPA standard. Keys are automatically
generated, so no key input is required.
Figure 18: WPA-802.1x Wireless Security
29