WebUI navigation
53
Take note of the following points before configuring MAC address or 802.1X
authentication:
•
Use MAC address authentication for a small network with a limited
number of users. MAC addresses can be manually configured on the
access point itself without the need to set up a RADIUS server, but
managing a large number of MAC addresses across many access
points is very cumbersome. A RADIUS server can be used to centrally
manage a larger database of user MAC addresses.
•
Use IEEE 802.1X authentication for networks with a larger number of
users and where security is the most important issue. When using
802.1X authentication, a RADIUS server is required in the wired network
to centrally manage the credentials of the wireless clients. It also
provides a mechanism for enhanced network security using dynamic
encryption key rotation or W-Fi Protected Access (WPA).
Note: If you configure RADIUS MAC authentication together with
802.1X, RADIUS MAC address authentication is performed prior to
802.1X authentication. If RADIUS MAC authentication succeeds, then
802.1X authentication is performed. If RADIUS MAC authentication
fails, 802.1X authentication is not performed.
System Authentication
MAC Authentication—You can configure a list of the MAC addresses for
wireless clients that are authorized to access the network. This provides a
basic level of authentication for wireless clients attempting to gain access
to the network. A database of authorized MAC addresses can be stored
locally on the access point or remotely on a central RADIUS server.
BAP120
Using the Nortel Business Access Point 120
NN47921-301
01.01
Standard
1.0
August 2006
Copyright © 2006, Nortel Networks
Nortel Networks Confidential
.
Summary of Contents for 120
Page 1: ...BAP120 Using the Nortel Business Access Point 120 NN47921 301 ...
Page 129: ......