Page 81 / 127 Scroll up to view Page 76 - 80
– 73 –
Static IP Address
!
Note:
The IP address must be within the same range as the wireless route or Access Point.
Wireless Network in Windows 2000
Select “
Use the following IP
address
Enter the
IP address
and
sub-
net
mask fields.
Enter the IP address of the
Router in the
Default gateway
field.
Enter the IP address of the
Router in the
DNS server
field
Click “
Ok
” to close the window
Go to
Start
menu >
Settings
>
Network and Dial-up Connec-
tions
> Double-click on the
Local Area Connection
Select “
Internet Protocol
(TCP/IP)
” and click “
Proper-
ties
Downloaded from
www.Manualslib.com
manuals search engine
Page 82 / 127
Wireless Router user’s manual
– 74 –
The TCP/IP Properties window
appears.
Select “
Obtain an IP address
automatically
” if you are on a
DHCP enabled network.
Click “
OK
” to close the window
with the changes made
Select “
Use the following IP
address
Enter the
IP address
and
sub-
net
mask fields.
Enter the IP address of the
Router in the
Default gateway
field.
Enter the IP address of the
Router in the
DNS server
field
Click “
Ok
” to close the window
Downloaded from
www.Manualslib.com
manuals search engine
Page 83 / 127
– 75 –
Wireless Network In Windows 98 and Windows ME
Go to
Start
menu >
Settings
>
Control Panel
> Double-click
on
Network
Select
TCP/IP
of the network
device
Click “
Properties
” to continue
The TCP/IP Properties window
appears.
Select “
Obtain an IP address
automatically
” if you are on a
DHCP enabled network.
Click “
OK
” to close the window
with the changes made
Downloaded from
www.Manualslib.com
manuals search engine
Page 84 / 127
Wireless Router user’s manual
– 76 –
Select “
Use the following IP
address
Enter the
IP address
and
sub-
net
mask fields.
In the
DNS Configuration
Tab
Page, (1) enter the IP address
of the Router in the
Default
gateway
field.
(2) Enter the IP address of the
Router in the
DNS server
field
Downloaded from
www.Manualslib.com
manuals search engine
Page 85 / 127
– 77 –
APPENDIX D:
802.1X AUTHENTICATION SETUP
There are three essential components to the 802.1x infrastructure: (1) Supplicant, (2) Authenticator and (3)
Server.
The 802.1x security supports both MD5 and TLS Extensive Authentication Protocol (EAP).
The 802.1x
Authentication is a complement to the current WEP encryption used in wireless network.
The current security
weakness of WEP encryption is that there is no key management and no limitation for the duration of key life-
time.
802.1x Authentication offers key management, which includes key per user and key per session, and
limits the lifetime of the keys to certain duration.
Thus, key decryption by unauthorized attacker becomes ex-
tremely difficult, and the wireless network is safely secured.
We will introduce the 802.1x Authentication
infrastructure as a whole and going into details of the setup for each essential component in 802.1x authentica-
tion.
802.1x Authentication Infrastructure
The Infrastructure diagram showing above illustrates that a group of 802.11 wireless clients is trying to form a
802.11 wireless network with the Access Point in order to have access to the Internet/Intranet. In 802.1x au-
thentication infrastructure, each of these wireless clients would have to be authenticated by the Radius server,
which would grant the authorized client and notified the Access Point to open up a communication port to be
used for the granted client. There are 2 Extensive Authentication Protocol (EAP) methods supported: (1) MD5
and (2) TLS.
MD5 authentication is simply a validation of existing user account and password that is stored in the server with
what are keyed in by the user. Therefore, wireless client user will be prompted for account/password validation
every time when he/she is trying to get connected. TLS authentication is a more complicated authentication,
which involves using certificate that is issued by the Radius server, for authentication. TLS authentication is a
more secure authentication, since not only the Radius server authenticates the wireless client, but also the cli-
ent can validate the Radius server by the certificate that it issues. The authentication request from wireless
clients and reply by the Radius Server and Access Point process can be briefed as follows:
1.
The client sends an EAP start message to the Access Point
2.
The Access Point replies with an EAP Request ID message
3.
The client sends its Network Access Identifier (NAI) – its user name – to the Access Point in an EAP Re-
spond message.
4.
The Access Point forwards the NAI to the RADIUS server with a RADIUS Access Request message.
802.11 Wireless
Access Points
Support 802.1X
RADIUS
Server
Authentication Request
Inter
net/I
ntra-
t
Authentication Success
802.11 Wireless
Clients
Support 802.1X
Public
802.11
Wireless
Networks
Downloaded from
www.Manualslib.com
manuals search engine

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top