beautypg.com

IBM 802.11g Wireless Broadband Router WRT-410 User Manual

Page 5

background image

3.5.5 Firewall Rule........................................................................................................... 25

3.6 M

ANAGEMENT

................................................................................................................. 26

3.6.1 SNMP ..................................................................................................................... 26

3.6.2 Remote Management............................................................................................. 27

3.7 T

OOLS

............................................................................................................................. 28

3.7.1 Restart .................................................................................................................... 28

3.7.2 Settings .................................................................................................................. 28

3.7.3 Firmware ................................................................................................................ 29

3.7.4 Ping Test................................................................................................................. 29

3.8 W

IZARD

........................................................................................................................... 30

CHAPTER 4 802.1X AUTHENTICATION SETUP .................................................................. 31

4.1 802.1X I

NFRASTRUCTURE

................................................................................................ 31

4.2 RADIUS S

ERVER

S

ETUP

................................................................................................. 32

4.2.1 Required Services .................................................................................................. 32

4.2.2 Setup Procedure .................................................................................................... 32

4.3 A

UTHENTICATOR

S

ETUP

................................................................................................... 46

4.4 W

IRELESS

C

LIENT

S

ETUP

................................................................................................. 47

4.4.1 EAP-MD5 Authentication........................................................................................ 47

4.4.2 EAP-TLS Authentication......................................................................................... 50

CHAPTER 5 TROUBLESHOOTING....................................................................................... 58

5.1 F

REQUENTLY

A

SKED

Q

UESTIONS

...................................................................................... 58

5.2 G

LOSSARY

...................................................................................................................... 59