Page 31 / 69 Scroll up to view Page 26 - 30
25
Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility
Setup
Wireless-G Ethernet Bridge with 5-Port Switch
TTLS
TTLS is a mutual authentication method that uses digital certificates. Select TTLS from the EAP Type drop-
down menu. Enter the Login name of your wireless network in the
User ID
field and the password in the
Password
field. Enter the
Root Certificate
in the field or click the
Browse
button to browse for it, then upload
it.
EAP Type - The authentication method that your network uses. Select
TTLS
from the drop-down menu.
User ID -Your User ID is the Login name of your wireless network. Enter the Login name of your wireless
network in the
User ID
field.
Password - This is the password used for your wireless network. Enter the password in the
Password
field.
Root Certificate - Enter the root certificate you have installed to authenticate you on your wireless
network
or click the
Browse
button to browse for it. Click the
Upload
button to upload the certificate.
Click the
Apply
button to save your changes. If your page doesn’t automatically refresh itself, then click the
Refresh
button of your web browser. Click the
View Log
button to view a log.
EAP
(
E
xtensible
A
uthentication
P
rotocol) - A general
authentication protocol used to control network access.
Many specific authentication methods work within this
framework.
Figure 7-8: RADIUS-TTLS
Downloaded from
www.Manualslib.com
manuals search engine
Page 32 / 69
26
Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility
Setup
Wireless-G Ethernet Bridge with 5-Port Switch
WPA RADIUS
WPA RADIUS. This option features WPA used in coordination with a RADIUS server. (This should only be used
when a RADIUS server is connected to the Router.) The WPA algorithm used is TKIP. Enter the RADIUS server’s
IP Address and port number, along with a key shared between the Router and the server. Last, enter a Key
Renewal Timeout, which instructs the Router how often it should change the encryption keys. (See Figure 7-
11.)
Click the
Apply
button to save your changes. If your screen doesn’t automatically refresh itself, then click the
Refresh
button of your web browser. Click the
View Log
button to view a log.
TLS
TLS is a mutual authentication method that uses digital certificates. Select TLS from the EAP Type drop-down
menu. Enter the Login name of your wireless network in the
User ID
field. Enter the
User
Certificate and Root
Certificate
in the fields or click the
Browse
button to browse for it, then upload it.
EAP Type - The authentication method that your network uses. Select
TLS
from the drop-down menu.
WPA Algorithm - The WPA algorithm used is TKIP.
User ID -Your User ID is the Login name of your wireless network. Enter the Login name of your wireless
network in the
User ID
field.
User Certificate - Enter the user certificate you have installed to authenticate you on your wireless
network
or click the
Browse
button to browse for it. Click the
Upload
button to upload the certificate.
Root Certificate - Enter the root certificate you have installed to authenticate you on your wireless
network
or click the
Browse
button to browse for it. Click the
Upload
button to upload the certificate.
Click the
Apply
button to save your changes. If your page doesn’t automatically refresh itself, then click the
Refresh
button of your web browser. Click the
View Log
button to view a log.
Figure 7-9: WPA RADIUS-TLS
TLS (T
ransport
L
ayer
S
ecurity) - A mutual authentication
method that uses digital certificates.
Downloaded from
www.Manualslib.com
manuals search engine
Page 33 / 69
27
Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility
Setup
Wireless-G Ethernet Bridge with 5-Port Switch
TTLS
TTLS is a mutual authentication method that uses digital certificates. Select TTLS from the EAP Type drop-
down menu. Enter the Login name of your wireless network in the
User ID
field and the password in the
Password
field. Enter the
Root Certificate
in the field or click the
Browse
button to browse for it, then upload
it.
EAP Type - The authentication method that your network uses. Select
TTLS
from the drop-down menu.
WPA Algorithm - The WPA algorithm used is TKIP.
User ID -Your User ID is the Login name of your wireless network. Enter the Login name of your wireless
network in the
User ID
field.
Password - This is the password used for your wireless network. Enter the password in the
Password
field.
Root Certificate - Enter the root certificate you have installed to authenticate you on your wireless
network
or click the
Browse
button to browse for it. Click the
Upload
button to upload the certificate.
Click the
Apply
button to save your changes. If your page doesn’t automatically refresh itself, then click the
Refresh
button of your web browser. Click the
View Log
button to view a log.
Figure 7-10: WPA RADIUS-TTLS
Downloaded from
www.Manualslib.com
manuals search engine
Page 34 / 69
28
Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility
Setup
Wireless-G Ethernet Bridge with 5-Port Switch
WPA Pre-Shared Key
WPA gives you TKIP for the encryption method. Enter a WPA Shared Key of 8-32 characters. (See Figure 7-11.)
Enter a key shared between the Bridge and the server.
Click the
Apply
button to save your changes. If your page doesn’t automatically refresh itself, then click the
Refresh
button of your web browser. Click the
View Log
button to view a log.
The
Log Table
screen appears in Figure 7-12. The log shows the authentication process.
Click the
Refresh
button to refresh the screen. Click the
Close
button to return to the the previous screen.
Figure 7-12: Log Table
Figure 7-11: WPA Pre-Shared Key
Downloaded from
www.Manualslib.com
manuals search engine
Page 35 / 69
29
Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility
Password
Wireless-G Ethernet Bridge with 5-Port Switch
Password
The
Password
screen, shown in Figure 7-13, lets you change the Bridge’s Username and Password and restore
the factory default settings.
Username - It is strongly recommended that you change the factory default user name of the Bridge from
admin to a new password that you create. All users who try to access the Bridge’s Web-based Utility will be
prompted for the Bridge’s Password. The new Password must not exceed 12 characters in length and must
not include any spaces.
Administrative Password - It is strongly recommended that you change the factory default password of the
Bridge from admin to a new password that you create. All users who try to access the Bridge’s Web-based
Utility will be prompted for the Bridge’s Password. The new Password must not exceed 12 characters in
length and must not include any spaces. Enter the new Password a second time to confirm it.
Restore Factory Defaults - Click the
Yes
radio button to reset all configuration settings to their default values.
If you do not want to restore the factory defaults, then keep the default setting,
No
.
To save your changes, click the
Apply
button. Click the
Cancel
button to cancel your changes. Click the
Help
button for additional on-screen information.
Figure 7-13: Password Tab
IMPORTANT:
Any settings you have saved will be
lost if the default settings are restored.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top