D-Link DSL-G664T User Manual page 31

Wireless adsl router
Table of Contents

Advertisement

Important Note: If encryption of any kind, at any level is applied to the Router, all devices on the network must
comply with all security measures.
802.1X
Some network-security experts now recommend that wireless networks use 802.1X security measures to
overcome some weaknesses in standard WEP applications. A RADIUS server is used to authenticate all potential
users.
Server IP Address: enter the IP address of the Radius server
Port: enter a port number, or accept the default
Secret: enter a password (1-63 character)
Group Key Interval: time (in seconds) after which the Group Key is changed automatically (1-99999).
Important Note: The values needed for the above entries can be obtained from your Internet Service Provider
(ISP).
Figure 3-6. 802.1X configuration window
Important Note: If encryption of any kind, at any level is applied to the Router, all devices on the network must
comply with all security measures.
23

Advertisement

Table of Contents
loading

Table of Contents