D-Link DWS-3024L User Manual page 97

Unified wired & wireless access system
Hide thumbs Also See for DWS-3024L:
Table of Contents

Advertisement

Table 12. Wireless Network Configuration
Field
Description
MAC
If you enable MAC authentication, wireless clients must be authenticated by
Authentication
the AP in order to connect to the network. You must configure the MAC
addresses of the clients to accept or deny (based on the default action you set
in the AP profile) in one of the following databases:
RADIUS IP
If you use a RADIUS server to authenticate wireless clients, you can use the
Address
same RADIUS server that you configure on the AAA/RADIUS tab for the
profile, or you can specify a different RADIUS server.
To specify a RADIUS server for this VAP, clear the Use Profile check box
and enter the IP address of the RADIUS server in the field.
RADIUS Secret
To enter a RADIUS secret, select the Edit check box and type the secret in
the field.
RADIUS
Select the RADIUS Accounting check box to enable accounting for wireless
Accounting
clients on the specified RADIUS server.
Security
The default AP profile does not use any security mechanism by default. In
order to protect your network, we strongly recommend that you select a
security mechanism so that unauthorized wireless clients cannot gain access
to your network.
The following WLAN network security options are available:
If you select WEP or WPA/WPA2 as your security mechanism, a dialogue
box asks if you want to change network security. After you click OK,
additional fields appear, and any network settings that you modified are
applied to the switch.
"Configuring AP Security"
and the additional fields you can configure if you select WEP or
WPA/WPA2.
D-Link's Adaptable Wireless technology provides you with the choice to associate a wireless
network (SSID) with a VLAN or a tunneled subnet. To associate an SSID with a VLAN, enter
a VLAN ID in the VLAN field. To associate an SSID with a tunneled subnet, enable L3
Tunnel and complete the L3 Tunnel Subnet and L3 Tunnel Mask fields.
The Adaptable Wireless technology offers maximized flexibility. The wireless application can
determine how traffic is handled. For example, guest traffic can be tunneled to the switch for
centralized security control, and VoIP traffic can be tagged with a VLAN ID and forwarded
directly from the access point for optimal performance.
Local
RADIUS
None
WEP
WPA/WPA2
on page 101 describes the security mechanisms
5 Configuring Access Point Settings
Configuring SSID Settings
97

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dws-3000 seriesDwl-3500apDwl-8500apDws-3024Dws-3026

Table of Contents