Configuring SSID Settings 105
5 Configuring Access Point Settings
WPA Ciphers
Select the cipher suite you want to use:
•
TKIP
•
CCMP (AES)
•
TKIP and CCMP (AES)
Both TKIP and AES clients can associate with the access point. WPA
clients must have one of the following to be able to associate with the AP:
•
A valid TKIP key
•
A valid AES-CCMP key
WPA Key Type
Select the key type by clicking one of the radio buttons:
•
ASCII—includes upper and lower case alphabetic letters, the numeric
digits, and special symbols such as @ and #
•
Hex—includes digits 0 to 9 and the letters A to F
Passphrase
The WPA Key is the shared secret key for
WPA
Personal. Enter a string of
at least 8 characters to a maximum of 63 characters.
Pre-Authentication
If you select WPA/WAP2 Enterprise, you can enable Pre-Authentication.
Click the Pre-Authentication check box if you want
WPA2
wireless clients
to send pre-authentication packets. The pre-authentication information is
relayed from the access point the client is currently using to the target
access point.
Enabling this feature can help speed up authentication for roaming clients
who connect to multiple access points. Only clients that connect by using
WPA2 can use this feature. It is not supported by the original
WPA
.
Pre-Authentication
Limit
Enter the number of pre-authentications that can be in progress
simultaneously on an AP. The limit prevents too much load on the RADIUS
server. This does not prevent the pre-authentication from being attempted
again when the load is lighter. A value of 0 represents no limit.
NOTE: This field is only available if you access the network through the
AP Profile or Network page under Advanced Configuration.
Key Forwarding
Select the check box to allow APs to forward the Pairwise Master Key
(PMK) for the wireless client to other APs in case the client roams to
another AP.
NOTE: This field is only available if you access the network through the
AP Profile or Network page under Advanced Configuration.
Key Caching Hold
Time
Enter the amount of minutes a PMK will be held by the AP. This applies to
PMKs generated by RADIUS, those that come from pre-authentication, and
those that are forwarded to the AP. Note that this time limit can be
overridden by RADIUS if the RADIUS server returns a longer time in the
Session-Timeout attribute for a particular user. The valid values of this are
from 1-1440 minutes.
NOTE: This field is only available if you access the network through the
AP Profile or Network page under Advanced Configuration.
Table 14.
Static WPA
Field
Description
Summary of Contents for DWS-3024L
Page 8: ...D Link Unified Access System User Manual ...
Page 12: ...12 2001 2008 D Link Corporation All Rights Reserved D Link Unified Access System User Manual ...
Page 20: ...20 2001 2008 D Link Corporation All Rights Reserved D Link Unified Access System User Manual ...
Page 52: ...52 2001 2008 D Link Corporation All Rights Reserved D Link Unified Access System User Manual ...
Page 82: ...82 2001 2008 D Link Corporation All Rights Reserved D Link Unified Access System User Manual ...
Page 122: ...122 2001 2008 D Link Corporation All Rights Reserved D Link Unified Access System User Manual ...
Page 212: ...212 2001 2008 D Link Corporation All Rights Reserved D Link Unified Access System User Manual ...
Page 226: ...226 2001 2008 D Link Corporation All Rights Reserved D Link Unified Access System User Manual ...
Page 262: ...262 2001 2008 D Link Corporation All Rights Reserved D Link Unified Access System User Manual ...
Page 264: ...264 2001 2008 D Link Corporation All Rights Reserved D Link Unified Access System User Manual ...
Page 267: ...Registration Card All Countries and Regions Excluding USA 267 ...
Page 268: ......