ZyXEL NWA90AX User Guide - Page 123

Note: Click on the, Mode: wpa3 continued

Page 123 highlights

Chapter 12 AP Profile Table 47 Configuration > Object > AP Profile > SSID > Security List > Add/Edit Security Profile> Security Mode: wpa3 (continued) LABEL DESCRIPTION Advance Note: Click on the Show Advanced Settings button to show the fields describe below. Idle Timeout Group Key Update Timer Pre-Authentication Management Frame Protection Enter the idle interval (in seconds) that a client can be idle before authentication is discontinued. Enter the interval (in seconds) at which the AP updates the group WPA2 encryption key. Select Enable to allow pre-authentication. Otherwise, select Disable. This field is available only when you select wpa2 in the Security Mode field and set Cipher Type to aes. Data frames in 802.11 WLANs can be encrypted and authenticated with WEP, WPA or WPA2. But 802.11 management frames, such as beacon/probe response, association request, association response, de-authentication and disassociation are always unauthenticated and unencrypted. IEEE 802.11w Protected Management Frames allows APs to use the existing security mechanisms (encryption and authentication methods defined in IEEE 802.11i WPA/WPA2) to protect management frames. This helps prevent wireless DoS attacks. Select the check box to enable management frame protection (MFP) to add security to 802.11 management frames. This option is always enabled if you select enhanced-open or WPA3 as the Security Mode. If Optional is selected, WiFi clients will not be not required to support MFP. Management frames will be encrypted if the clients support MFP. Radius Settings Primary / Secondary Radius Server Activate Radius Server IP Address Radius Server Port Radius Server Secret Primary / Secondary Accounting Server Activate Accounting Server IP Address Accounting Server Port Accounting Share Secret Accounting Interim Update If Required is selected, WiFi clients must support MFP in order to join the Zyxel Device's WiFi network. Select this to have the Zyxel Device use the specified RADIUS server. Enter the IP address of the RADIUS server to be used for authentication. Enter the port number of the RADIUS server to be used for authentication. Enter the shared secret password of the RADIUS server to be used for authentication. Select the check box to enable user accounting through an external authentication server. Enter the IP address of the external accounting server in dotted decimal notation. Enter the port number of the external accounting server. The default port number is 1813. You need not change this value unless your network administrator instructs you to do so with additional information. Enter a password (up to 128 alphanumeric characters) as the key to be shared between the external accounting server and the Zyxel Device. The key must be the same on the external accounting server and your Zyxel Device. The key is not sent over the network. This field is available only when you enable user accounting through an external authentication server. Interim Update Interval General Server Settings Select this to have the Zyxel Device send subscriber status updates to the accounting server at the interval you specify. Specify the time interval for how often the Zyxel Device is to send a subscriber status update to the accounting server. NWA50AX/NWA90AX/NWA55AXE Series User's Guide 123

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266

Chapter 12 AP Profile
NWA50AX/NWA90AX/NWA55AXE Series User’s Guide
123
Advance
Note: Click on the
Show Advanced Settings
button to show the fields describe below.
Idle Timeout
Enter the idle interval (in seconds) that a client can be idle before authentication is
discontinued.
Group Key Update
Timer
Enter the interval (in seconds) at which the AP updates the group WPA2 encryption key.
Pre-Authentication
Select
Enable
to allow pre-authentication. Otherwise, select
Disable
.
Management Frame
Protection
This field is available only when you select
wpa2
in the
Security Mode
field and set
Cipher
Type
to
aes
.
Data frames in 802.11 WLANs can be encrypted and authenticated with WEP, WPA or
WPA2. But 802.11 management frames, such as beacon/probe response, association
request, association response, de-authentication and disassociation are always
unauthenticated and unencrypted. IEEE 802.11w Protected Management Frames allows
APs to use the existing security mechanisms (encryption and authentication methods
defined in IEEE 802.11i WPA/WPA2) to protect management frames. This helps prevent
wireless DoS attacks.
Select the check box to enable management frame protection (MFP) to add security to
802.11 management frames. This option is always enabled if you select
enhanced-open
or
WPA3
as the
Security Mode.
If
Optional
is selected, WiFi clients will not be not required to support MFP. Management
frames will be encrypted if the clients support MFP.
If
Required
is selected, WiFi clients must support MFP in order to join the Zyxel Device’s
WiFi network.
Radius Settings
Primary / Secondary
Radius Server Activate
Select this to have the Zyxel Device use the specified RADIUS server.
Radius Server IP
Address
Enter the IP address of the RADIUS server to be used for authentication.
Radius Server Port
Enter the port number of the RADIUS server to be used for authentication.
Radius Server Secret
Enter the shared secret password of the RADIUS server to be used for authentication.
Primary / Secondary
Accounting Server
Activate
Select the check box to enable user accounting through an external authentication
server.
Accounting Server
IP Address
Enter the IP address of the external accounting server in dotted decimal notation.
Accounting Server
Port
Enter the port number of the external accounting server. The default port number is 1813.
You need not change this value unless your network administrator instructs you to do so
with additional information.
Accounting Share
Secret
Enter a password (up to 128 alphanumeric characters) as the key to be shared between
the external accounting server and the Zyxel Device. The key must be the same on the
external accounting server and your Zyxel Device. The key is not sent over the network.
Accounting Interim
Update
This field is available only when you enable user accounting through an external
authentication server.
Select this to have the Zyxel Device send subscriber status updates to the accounting
server at the interval you specify.
Interim Update
Interval
Specify the time interval for how often the Zyxel Device is to send a subscriber status
update to the accounting server.
General Server Settings
Table 47
Configuration > Object > AP Profile > SSID > Security List > Add/Edit Security Profile> Security
Mode: wpa3 (continued)
LABEL
DESCRIPTION