
| 43
WG102-500, WGAP150 ProSafe™ 802.11g Wireless Access Point
Configuring WPA2 and WPA2-PSK (AES)
WPA2 security requires RADIUS-based 802.1x authentication, so you also must define
RADIUS server settings. For information about RADIUS servers, see “Configuring RADIUS
Server Settings” on page 45. WPA2-PSK security uses a pre-shared key (PSK) and does not
require authentication from a RADIUS server. Both methods use Advanced Encryption
Standard (AES) encryption.
When you select WPA2-AES from the Security Policy pull-down menu, the section expands
to display the WPA2-AES fields. Figure 3-7 on page 43 shows RADIUS user authentication
as an example.
Specify the fields that are explained in Table 3-5
Table 3-5.
Field Descriptions
User
Authentication
Pre-Shared Key From the User Authentication pull-down menu, select the Pre-Shared
Key to enable WPA2-PSK. WPA2-PSK does not require a RADIUS
server for authentication, but you must specify a passphrase.
Passphrase Enter a passphrase with a length must between 8 and 63
characters (inclusive).
Click the Hide / Show Passphrase hyperlink to switch
between hiding and showing the passphrase on screen.
Hiding the passphrase provides added security in a
public environment.
RADIUS From the User Authentication pull-down menu, select RADIUS to
enable WPA2, which requires a RADIUS server for authentication (see
“Configuring RADIUS Server Settings” on page 45). This is the default
user authentication setting.
Re-Keying
Period
The period during which the broadcast key remains valid. When the period expires, the
broadcast key is no longer valid and must be renewed. The default is 3600 seconds
(1 hour).
Re-key on
re-keying period
Select the Re-key on re-keying period checkbox to require rekeying after the rekeying
period has expired.
Re-key if any
station
disassociates
Select the Re-key if any station disassociates checkbox to require rekeying after any
wireless station logs off from the wireless access point.
.
Figure 3-7
Comentarios a estos manuales