Chapter 7, Configuring security, About security – Allied Telesis AT-WL2411 User Manual
Page 124

124
Chapter 7
Configuring Security
This chapter explains how to use features that are available on the
access point to ensure that you have a secure wireless network.
About Security
There are several levels of security that you can implement in the access
points.
❑ Enable/disable access methods.
❑ Change the default logins for users who need to be able to
configure and manage the access point.
Or, use a password server (external or internal to the access
point) to create a list of authorized user names and passwords.
Typically, this password server is a RADIUS server.
❑ (802.11b/802.11a) Configure static WEP keys. You can configure
up to four different WEP keys on the access point and most
wireless end devices. You should periodically change which WEP
key these devices use to transmit data.
❑ Use an 802.1x authentication server (typically a RADIUS server
external to the access point) with EAP-TLS or EAP-TTLS if you want
to implement the 802.1x standard and automatically generated,
periodically rotating WEP keys.
These security levels are described in this chapter.