Allied Telesis AT-TQ2403 Network Card User Manual


 
AT-TQ2403 Management Software User's Guide 71
Field Description
Radius IP Enter the Radius IP in the text box.
The Radius IP is the IP address of the RADIUS server.
You can configure two RADIUS servers. The secondary server only when the
first server is not available. If the IP address of secondary server is “0.0.0.0”, it
implies to disable secondary server.
(The AT-TQ2403 Management Software internal authentication server is
127.0.0.1)
For information on setting up user accounts, see “Managing User Accounts
Radius Port Enter the Radius Port in the text box.
The Radius Port is the port number of the RADIUS server.
(The port of AT-TQ2403 internal RADIUS server is 1812.)
Radius Key Enter the Radius Key in the text box.
The Radius Key is the shared secret key for the RADIUS server. The text you
enter will be displayed as " * " characters to prevent others from seeing the
RADIUS key as you type.
(The AT-TQ2403 Management Software internal authentication server key is
secret. This value is never sent over the network.)
Radius Key is a string of up to 128 characters.
Enable radius
accounting
Click the checkbox beside Enable radius accounting if you want to track and
measure the resources a particular user has consumed such system time,
amount of data transmitted and received, and so on.
Require VLAN ID
in Dynamic VLAN
Dynamic mode is enabled when you click the checkbox.
If you have enabled dynamic mode and try to establish wireless connection
between wireless client and AP, the AP must receive VLAN ID information from
Radius server in authentication process. Otherwise, the AP will reject wireless
connection to the wireless client.
The default setting is unchecked the checkbox, which means dynamic mode is
disable.
WPA Personal
Wi-Fi Protected Access Personal is a Wi-Fi Alliance IEEE 802.11i standard, which includes Counter
mode/ CBC-MAC Protocol-Advanced Encryption Algorithm - (CCMP-AES), and Temporal Key Integrity
Protocol (TKIP) mechanisms. The Personal version of WPA employs a pre-shared key (instead of using
IEEE802.1x and EAP as is used in the Enterprise WPA security mode). The PSK is used for an initial check
of credentials only.
This security mode is backwards-compatible for wireless clients that support the original WPA.