Wireless Interface; Authentication; Local Authentication - SMC Networks EliteConnect SMCE21011 User Manual

802.11b/g/n ap
Hide thumbs Also See for EliteConnect SMCE21011:
Table of Contents

Advertisement

W
I
IRELESS
NTERFACE
A
UTHENTICATION
L
OCAL
A
UTHENTICATION
Sets STP settings for the radio interface.
Index — Describes the VAP in question.
Link Path Cost — This parameter is used by the STP to determine the
best path between devices. Therefore, lower values should be assigned
to ports attached to faster media, and higher values assigned to ports
with slower media. (Path cost takes precedence over port priority.)
(Default: Ethernet interface: 19; Wireless interface: 40;
Range: 1-65535
Link Port Priority — Defines the priority used for this port in the
Spanning Tree Protocol. If the path cost for all ports on a switch are the
same, the port with the highest priority (i.e., lowest value) will be
configured as an active link in the spanning tree. This makes a port
with higher priority less likely to be blocked if the Spanning Tree
Protocol is detecting network loops. Where more than one port is
assigned the highest priority, the port with lowest numeric identifier will
be enabled. (Default: 128; Range: 0-240, in steps of 16)
Wireless clients can be authenticated for network access by checking their
MAC address against the local database configured on the access point, or
by using a database configured on a central RADIUS server. Alternatively,
authentication can be implemented using the IEEE 802.1X network access
control protocol.
The access point can also operate in a 802.1X supplicant mode. This
enables the access point itself and any bridge-connected units to be
authenticated with a RADIUS server using a configured MD5 user name
and password. This mechanism can prevent rogue access points from
gaining access to the network.
You can configure a list of the MAC addresses for wireless clients that are
authorized to access the network. This provides a basic level of
authentication for wireless clients attempting to gain access to the
network. A database of authorized MAC addresses can be stored locally on
the access point or remotely on a central RADIUS server. (Default: Local
MAC)
Local MAC Authentication – Configures the local MAC authentication
database. The MAC database provides a mechanism to take certain actions
based on a wireless client's MAC address. The MAC list can be configured to
allow or deny network access to specific clients.
– 85 –
| Wireless Settings
C
8
HAPTER

Authentication

Advertisement

Table of Contents
loading

Table of Contents