Page 136 / 193 Scroll up to view Page 131 - 135
136
Appendix A: Configuring Security Settings on Wireless Clients
Disable this option (click to uncheck the box).
Disable auto key option
. . . then configure WEP security on each client as follows.
Choose WEP as the
Data Encryption mode
Enter a network key that matches
the WEP key on the access point in the position
set to the transfer key index (and retype to
confirm)
Choose Open or Shared
Optionally set a different transfer key
index to send data from client back to
access point
Association Tab
Network Authentication
“Open” or “Shared”, depending on how you configured this
option on the access point.
Note:
When the Authentication Algorithm on the access point is
set to “Both”, clients set to either Shared or Open can associate
with the AP. Clients configured to use WEP in Shared mode
must have a valid WEP key in order to associate with the AP.
Clients configured to use WEP as an Open system can
associate with the AP even without a valid WEP key (but a valid
key will be required to actually view and exchange data). For
more information, see Administrators Guide and Online Help on
the access point.
Data Encryption
WEP
Network Key
Provide the WEP key you entered on the access point Security
settings in the Transfer Key Index position.
For example, if the Transfer Key Index on the access point is set
to “1”, then for the client Network Key specify the WEP Key you
entered as WEP Key 1 on the access point.
Key Index
Set key index to indicate which of the WEP keys specified on the
access point Security page will be used to transfer data from the
client back to the access point.
For example, you can set this to 1, 2, 3, or 4 if you have all four
WEP keys configured on the access point.
The key is provided
for me automatically
Page 137 / 193
137
Appendix A: Configuring Security Settings on Wireless Clients
Click
OK
on the Wireless Network Properties dialog to close it and save your
changes.
Connecting to the Wireless Network with a Static WEP Client
Static WEP clients should now be able to associate and authenticate with the access
point. As a client, you will not be prompted for a WEP key. The WEP key configured on
the client security settings is automatically used when you connect.
Authentication Tab
Make sure that IEEE 802.1x authentication is disabled (box should
be unchecked).
(Setting the encryption mode to WEP should automatically disable
authentication.)
Enable IEEE 802.1x
authentication
for this network
Page 138 / 193
138
Appendix A: Configuring Security Settings on Wireless Clients
Configuring IEEE 802.1x Security on a Client
IEEE 802.1x
is the standard defining port-based authentication and infrastructure for
doing key management.
Extensible Authentication Protocol
(EAP) messages sent
over an IEEE 802.11 wireless network using a protocol called EAP Encapsulation
Over LANs (EAPOL). IEEE 802.1x provides dynamically-generated keys that are
periodically refreshed. An RC4 stream cipher is used to encrypt the frame body and
cyclic redundancy checking (CRC) of each 802.11 frame.
IEEE 802.1x Client Using EAP/PEAP
The Built-In Authentication Server on the D-Link DWL-2210AP uses Protected
Extensible
Authentication Protocol
(EAP) referred to here as “EAP/PEAP.”
If you configured the D-Link DWL-2210AP to use IEEE 802.1x security mode . . .
• If you are using the Built-in Authentication server with “IEEE 802.1x” security
mode on the D-Link DWL-2210AP, then you will need to set up wireless clients to
use PEAP.
• Additionally, you may have an external RADIUS server that uses EAP/PEAP. If
so, you will need to (1) add the D-Link DWL-2210AP to the list of RADIUS server
clients, and (2) configure your IEEE 802.1x wireless clients to use PEAP.
The following example assumes you are using the Built-in Authentication server that
comes with the D-Link DWL-2210AP. If you are setting up EAP/PEAP on a client of
an AP that is using an external RADIUS server, the client configuration process will
differ somewhat from this example especially with regard to certificate validation.
. . . then configure IEEE 802.1x security with PEAP authentication on each client as
follows.
Page 139 / 193
139
Appendix A: Configuring Security Settings on Wireless Clients
Choose
WEP Data
Encryption
mode
Enable auto
key option
Choose Protected EAP (PEAP)
Disable (click to uncheck)
“Validate server certificate”
Choose “secured
password (EAP-
MSCHAP v2)”
. . . then click
“Configure”
Choose Open
. . . then, click
“Properties”
Enable (click to check) IEEE
802.1x authentication
Disable (click to uncheck) option to
automatically use Windows logon
name and password
Page 140 / 193
140
1. Configure the following settings on the Association tab on the Network Properties
dialog.
Appendix A: Configuring Security Settings on Wireless Clients
4. Click
Configure
to bring up the EAP MSCHAP v2 Properties dialog.
On this dialog, disable (click to uncheck) the option to “Automatically use my
Windows login name . . . “ etc.
Click
OK
on all dialogs (starting with the EAP MSCHAP v2 Properties dialog) to close
and save your changes.
Logging on to the Wireless Network with an IEEE 802.1x PEAP Client
IEEE 802.1x PEAP clients should now be able to associate with the access point.
Client users will be prompted for a user name and password to authenticate with the
network.
2. Configure this setting on the Authentication tab.
3. Click
Properties
to bring up the Protected EAP Properties dialog and configure the
following settings.
Protected EAP Properties Dialog
Validate Server Certificate
Disable this option (click to uncheck the box).
Note:
This example assumes you are using the Built-in
Authentication server on the AP. If you are setting up
EAP/PEAP on a client of an AP that is using an external
RADIUS server, you might certificate validation and
choose a certificate, depending on your infrastructure.
Select Authentication Method
Choose “Secured password (EAP-MSCHAP v2)”.
Authentication Tab
EAP Type
Choose “Protected EAP (PEAP)”.
Association Tab
Network Authentication
Open
Data Encryption
WEP
Note: An RC4 stream cipher is used to encrypt the
frame body and cyclic redundancy checking (CRC) of
each IEEE 802.11 frame. this is the same encryption
algorithm as is used for Static WEP; therefore, the
data encryption method configured on the client for
this mode is WEP.
This key is provided for me
automatically
Enable (click to check) this option

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top