LAPN300 is 12.5 W. Make sure your PoE switch or PoE injector is 802.3af-capable or 802.3at-capable to provide sufficient power to access point. NOTE: When both PoE and AC power adapter are connected to access point, device will get power from PoE as higher precedence.
Page 7
6. Slide the device into the bracket. Turn access point clockwise until it locks. 7. Replace tile in ceiling. IMPORTANT—Improper or insecure mounting could result in damage to the device or personal injury. Linksys is not responsible for damages caused by improper mounting.
Chapter 2 – Access Point Setup Overview This chapter describes the setup procedure to connect the wireless access point to your LAN, and configure it as an access point for your wireless stations. Wireless stations may also require configuration. For details, see Appendix C - Wireless Station Configuration.
Page 9
3. Type in default username: admin, and password: admin. 4. Click Login to launch the browser-based setup and follow the on-screen instructions. Figure 1: Password Dialog If you can't connect—It is likely that your PC’s IP address is incompatible with the wireless access point’s IP address.
Setup wizard The first time you connect to the wireless access point, run the Setup Wizard to configure the device. 1. Click the Quick Start tab on the main menu. Figure 2: Setup Wizard 2. On the first screen, click Launch. 3.
Page 11
4. Configure the time zone, date and time for the device on System Settings screen. Figure 3: Setup Wizard - System Settings 5. On the IPv4 Address screen (Figure 4) configure the IP address of the device then click Next. Figure 4: Setup Wizard - IPv4...
Page 12
6. Set the SSID information on the Wireless Network screen. Click Next. If you want to configure more than 4 SSIDs, go to Configuration > Wireless >Basic Settings. The access point supports up to 8 SSIDs. Figure 5: Setup Wizard - Wireless Network 7.
Page 13
Figure 6: Setup Wizard - Wireless Security 8. On the Summary screen, check the data to make sure they are correct and then click Submit to save the changes. Figure 7: Setup Wizard - Summary 9. Click Finish to leave the wizard.
User accounts Manage user accounts. The access point supports up to 5 users: one administrator and four normal users. Figure 9: User Accounts User Accounts Screen User Account Table User Name Enter the User Name to connect to the access point’s admin interface.
Time Figure 10: Time Screen Time Screen Time Current Time Display current date and time of the system. Manually Set date and time manually. When enabled (default setting) the access point will get the current time Automatically from a public time server. Time Zone Choose the time zone for your location from the drop-down list.
Log settings Record various types of activity on the access point. This data is useful for troubleshooting, but enabling all logs will generate a large amount of data and adversely affect performance. Figure 11: Log Settings Screen...
Log Settings Screen Log Types Log Types Select events to log. Checking all options increases the size of the log, so enable only events you believe are required. Email Alert Email Alert Enable email alert function. SMTP Server Enter the email server that is used to send logs. It can be an IPv4 address or a domain name.
Management access Configure the management methods of the access point. Figure 12: Management Access Screen Management Access Screen Web Access HTTP HTTP (Hyper Text Transfer Protocol) is the standard for transferring files (text, graphic images and other multimedia files) on the World Wide Web. Enable to allow Web access by HTTP protocol.
Page 20
HTTPS Port Specify the port for HTTPS. It can be 443 (default) or from 1024 to 65535. From Wireless Enable wireless devices to connect to access point’s admin page. Disabled by default. Access Control By default, no IP addresses are prohibited from accessing the device’s admin page.
Page 21
SNMPv3 Settings SNMPv3 Settings Configure the SNMPv3 settings if you want to use SNMPv3. Username: Enter the username. It includes 0 to 32 characters. Special characters are allowed. Authentication Protocol: None or HMAC-MD5. Authentication Key: 8 to 32 characters. Special characters are allowed.
SSL certificate Manage SSL certificate used by HTTPS. Figure 13: SSL Certificate Screen SSL Certificate Screen Export/Restore to/from Local PC Export SSL Click to export the SSL certificate. Certificate Install Certificate Browse to choose the certificate file. Click Install Certificate button. Export to TFTP Server Destination File Enter the name of the destination file.
Network setup Configure basic device settings, VLAN settings and settings for the LAN interface, including static or dynamic IPv4/IPv6 address assignment. Figure 14: Network Setup Screen Network Setup Screen TCP/IP Host Name Assign a host name to this access point. Host name consists of 1 to 15 characters.
Untagged Specifies a number between 1 and 4094 for the untagged VLAN ID VLAN ID. The default is 1. Traffic on the VLAN that you specify in this field is not be tagged with a VLAN ID when forwarded to the network. Untagged VLAN ID field is active only when untagged VLAN is enabled.
Advanced Screen Port Settings Auto If enabled, Port Speed and Duplex Mode will become grey Negotiation and cannot be configured. If disabled, Port Speed and Duplex Mode can be configured. Operational Current Auto Negotiation mode of the Ethernet port. Auto Negotiation Port Speed Select the speed of the Ethernet port.
Discovery Settings Bonjour Enable if administrator wants the access point to be discovered by Bonjour enabled devices automatically. If VLAN is enabled, the discovery packets will be sent out via management VLAN only. The access point supports http and https services. LLDP Enable if administrator wants the access point to be discovered by switch by LLDP protocol.
Basic Settings Basic Settings provides the essential configuration for your wireless radio and SSID. You should be able to set up your wireless network with these essential parameters configured. Advanced wireless settings, such as Band Steering, Channel Bandwidth, etc., will be on Configuration > Wireless > Advanced Settings screen.
SSID Settings SSID Name Enter the desired SSID Name. Each SSID must have a unique name. The name includes 1 to 32 characters Broadcast Enable or disable the broadcast of the SSID. When the access point does not broadcast its SSID, the network name is not shown in the list of available networks on a client station.
SSID Settings Screen Security Select the desired SSID from the drop-down list. Select SSID Security Mode Select the desired security method from the list. Security Mode Disabled - No security. Anyone using the correct SSID can connect to your network. •...
Page 30
Security Settings – WEP This is the 802.11b standard. Data is encrypted before transmission, but the encryption system is not very strong. Figure 18: WEP Wireless Security Screen WEP Screen Authentication Select Open System or Shared Key. All wireless stations must use the same method.
Page 31
Security Settings - WPA2-Personal This is a further development of WPA-Personal, and offers even greater security. Figure19: WPA2-Personal Wireless Security Screen WPA2-Personal Screen WPA2-Personal WPA Algorithm The encryption method is AES. Wireless stations must also use AES. Pre-shared Key Enter the key value. It is 8 to 63 ASCII characters or 64 HEX characters.
Page 32
Security Settings - WPA/WPA2-Personal This method, sometimes called Mixed Mode, allows clients to use either WPA-Personal or WPA2- Personal. Figure 20: WPA/WPA2-Personal Wireless Security Screen WPA/WPA2-Personal Screen WPA/WPA2-Personal WPA Algorithm The encryption method is TKIP or AES. Pre-shared Key Enter the key value. It is 8 to 63 ASCII characters or 64 HEX characters.
Page 33
Security Settings - WPA2-Enterprise This version of WPA2-Enterprise requires a RADIUS Server on your LAN to provide the client authentication. Data transmissions are encrypted using the WPA2 standard. Figure 21: WPA2-Enterprise Wireless Security Screen WPA2-Enterprise Screen WPA2-Enterprise Enter the IP address of the RADIUS Server on your network. Primary Server Enter the port number used for connections to the RADIUS Server.
Page 34
Security Settings - WPA/WPA2-Enterprise This version of WPA2-Enterprise requires a RADIUS Server on your LAN to provide the client authentication. Data transmissions are encrypted using either the WPA or WPA2 standard. Figure 22: WPA/WPA2-Enterprise Wireless Security Screen WPA/WPA2-Enterprise Screen WPA/WPA2-Enterprise Primary Server Enter the IP address of the RADIUS Server on your network.
Page 35
Key Renewal Specify the value of Group Key Renewal. It is a value Timeout from 600 to 36000 sec, and default is 3600 sec. WPA automatically changes secret keys after a certain period of time. The group key interval is the period of time between automatic changes of the group key, which all devices on the network share.
Page 36
RADIUS Screen Authentication Server Primary Server Enter the IP address of the RADIUS Server on your network. Primary Server Port Enter the port number used for connections to the RADIUS Server. It is a value from 1 to 65534, and default is 1812.
Rogue AP Detection Detect an unexpected or unauthorized access point installed in a secure network environment. Figure 24: Rogue AP Screen Rogue AP Screen Rogue AP Enable or disable Rogue AP Detection. Detected Rogue AP List Trust Action Click to move the AP to the Trusted AP List. MAC Address The MAC address of the Rogue AP.
Trusted AP List Untrust Action Click to move the AP to the Rogue AP List. MAC Address The MAC address of the Trusted AP. SSID The SSID of the Trusted AP. Channel The channel of the Trusted AP. Security The security method of the Trusted AP. Signal The signal level of the Trusted AP.
Page 39
Scheduler Screen Wireless Enable or disable wireless scheduler on the radio. It is Scheduler disabled by default. If disabled, even if some SSIDs are associated with profiles, they will be always active. Scheduler Operational Status Status The operational status of the scheduler. Reason The detailed reason for the scheduler operational status.
Scheduler Association Associate defined scheduler profiles with SSIDs. Figure 26: Scheduler Association Screen Scheduler Association Screen Scheduler Association SSID The index of SSID. SSID Name The name of the SSID. Profile Name Choose the profile that is associated with the SSID. If the profile associated with the SSID is deleted, then the association will be removed.
Connection Control Exclude or allow only listed client stations to authenticate with the access point. Figure 27: Connection Control Screen Connection Control Screen SSID Select the desired SSID from the list. Connection Select the option from the drop-down list as desired. Control Type Allow only following MAC addresses to Local: Choose either...
Rate Limit Limit downstream and upstream rate of SSIDs. Figure 28: Rate Limit Screen Rate Limit Screen Rate Limit SSID The index of SSID. SSID Name The name of the SSID. Upstream Enter a maximum upstream for the SSID. The range is from Rate 0 to 200 Mbps;...
Quality of Service (QoS) Specify priorities for different traffic coming from your wireless client. Lower priority traffic will be slowed down to allow greater throughput or less delay for high priority traffic. Figure 29: QoS Screen QoS Screen QoS Settings SSID The index of SSID.
With Wireless Distribution System (WDS) you can expand a wireless network through multiple access points instead of linking them with a wired backbone. WDS only works and interacts with LAPN300, LAPN600, LAPAC1200 or LAPAC1750 devices. The access point can act as WDS Root or WDS Station: •...
Page 45
WDS screen Spanning Tree (Recommended if you configure WDS connections) Spanning Tree When enabled, STP helps prevent switching loops. WDS Root Interface Enable or Disable the WDS Root. Status Be sure the following settings on WDS Root device are determined and configured. The WDS Station must use the same settings as Root afterwards.
Page 46
Allowed VLAN Enter the list of VLANs accepted by the WDS Root. List When VLAN is enabled, WDS Root receives from WDS Stations only packets in the VLAN list. Packets not in the list will be dropped. The VLAN list is only applicable when VLAN is enabled. The VLAN list includes 1 to 16 VLAN IDs separated by ","...
Page 47
Remote MAC MAC address of the access point on the other end of the Address WDS link. Optional WDS Station connects to remote WDS Root by matching SSIDs, When there is more than one remote WDS Root with the same SSID, the WDS Station can differentiate them by MAC address.
Workgroup Bridge Extend the accessibility of a remote network. In Workgroup Bridge mode, the access point acts as a wireless station on the wireless LAN. It can bridge traffic between a remote wired network and a wireless LAN. When Workgroup Bridge is enabled, SSID configuration still works to provide wireless services to clients.
Page 49
Workgroup Bridge Screen Workgroup Bridge Status Status Enable or disable Workgroup Bridge function. Workgroup Bridge can only be enabled when VLAN function is disabled. Before configuring Workgroup Bridge, make sure all devices in Workgroup Bridge have the following identical settings. •...
Security Mode Select the desired mode from the list. • Disabled • WPA-Personal • WPA2-Personal • WPA-Enterprise • WPA2-Enterprise Connection Connected or Not Connected. Status Advanced Settings Configure advanced parameters. Figure 32: Advanced Settings Advanced Settings Screen Band Steering Band Steering Enable or disable Band Steering function.
Page 51
Isolation Isolation between Define whether to isolate traffic between SSIDs. If SSIDs enabled, wireless clients in different SSIDs cannot communicate with each other. Enabled by default. Advanced Parameters Worldwide Mode Worldwide Mode (802.11d) enables the access point (802.11d) to direct connected wireless devices to radio settings specific to where in the world the devices are in use.
Page 52
DTIM Interval Enter the Delivery Traffic Information Map (DTIM) period, an integer from 1 to 255 beacons. The default is 1 beacon. The DTIM message is an element included in some beacon frames. It indicates which client stations, currently sleeping in low-power mode, have data buffered on the access point awaiting pickup.
Page 53
Fragmentation Enter the fragmentation threshold, an integer from Threshold 256 to 2346. The default is 2346. The fragmentation threshold is a way of limiting the size of packets (frames) transmitted over the network. If a packet exceeds the fragmentation threshold you set, the fragmentation function is activated and the packet is sent as multiple 802.11 frames.
Captive Portal There are seven configuration screens: • Global Configuration • Portal Profiles • Local User Local Group • • Web Customization • Profile Association • Client Information Global Configuration Change settings and modify captive portal authentication access port number if needed. Figure 33: Global Configuration Global Configuration Screen Captive Portal...
Additional HTTP HTTP portal authentication uses HTTP Port management port by default. You can configure an additional port for that process. HTTP Port Define an additional port for HTTP protocol. The value can be 80 or 1024 to 65535 and is 80 by default. If Additional HTTP Port is enabled, the HTTP Port must be different from the HTTP port in "Administration"...
Page 56
Portal Profiles Screen Portal Profiles Captive Portal Select a profile to configure. Profile Protocol Select the protocol used to access the Portal Authentication web server. It can be HTTP or HTTPS. Authentication Select an authentication method for clients. Local - The access point uses a local database to authenticate wireless clients.
Radius Authentication Primary Server Enter the IP address of the RADIUS Server on your network. Primary Server Port Enter the port number used for connections to the RADIUS Server. Primary Shared Enter the key value to match the RADIUS Server. Secret Backup Server The Backup Authentication Server will be used when...
Local User Screen User Name Enter the name of the user account. The user name includes 1 to 32 characters. Special characters except ':' and ';' are allowed. Password Enter the New Password of the user account. The password must be between 4 and 32 characters in length.
Members User members of the selected group. You can select one user and click ">>" button to remove it. Other Users Other users which don't belong to the selected group. You can select one user and click "<<" button to add it into the group.
Page 60
Font Color The HTML code for the font color in 6-digit hexadecimal format. The default is #FFFFFF. Welcome Title Customize text to go with your logo. The default is Welcome to the Wireless Network. Login Instruction Customize text to go with the login box. Default text for different authentication options: •...
Profile Association Associate defined Captive Portal profiles with SSIDs. Figure 38: Profile Association Profile Association Screen SSID A list of available SSIDs. SSID Name The name of the SSID. Profile Name Choose the profile that is associated with the SSID. If the profile associated with the SSID is deleted, then the association will be removed.
Client Information View the status of wireless clients that are authenticated by Captive Portal. Figure 39: Client Information Client Information Screen MAC address of the client. MAC Address IP address of the client. IP Address User name used by the client to log in. User Name Name of the SSID to which the client is connected.
Chapter 3 – System Status System Summary Provides the system status of the access point. Figure 40: System Summary Screen System Summary Screen System Summary Device SKU The SKU is often used to identify device model number and region. Firmware Version The version of the firmware currently installed.
LAN Status LAN Status displays settings, and status of LAN interface. Figure 41: LAN Status Screen LAN Status Screen VLAN VLAN Enabled or disabled (default). Untagged VLAN Enabled (default) or disabled. If enabled (default), traffic is untagged when VLAN ID is equal to Untagged VLAN ID and untagged traffic can be accepted by LAN port.
Page 65
Management Displays the Management VLAN ID. The VLAN associated with the IP VLAN address you use to connect to the access point. Provide a number between 1 and 4094 for the Management VLAN ID. The default is 1. This VLAN is also the default untagged VLAN. If you already have a management VLAN configured on your network with a different VLAN ID, you must change the VLAN ID of the management VLAN on the access point.
Wireless Status Wireless Status displays settings and status of the wireless radio and SSID. Figure 42: Wireless Status Screen Wireless Status Screen Radio Status Indicates whether the radio is enabled. Radio Status Current 802.11mode (a/b/g/n) of the radio. Mode The channel currently in use. Channel Current channel bandwidth of the radio.
Page 67
Current scheduler status of the SSID. Scheduler State • No scheduler is enabled on the SSID, or the SSID is disabled by administrator. • Active The SSID is enabled. • Inactive The SSID is disabled. WDS Root Status Status of the WDS Root: Enabled or Disabled. Local MAC MAC Address of the WDS Root.
Workgroup Bridge Status of the Workgroup Bridge: enabled or disabled. Status MAC address of the Workgroup Bridge. Local MAC SSID of the destination access point on the other end of the Remote SSID Workgroup Bridge link to which data is sent and from which data is received.
Wireless Clients Screen Select Your Wireless Interface Wireless Select the desired interface from the list. The interfaces Interface include eight SSIDs. Connected Clients SSID Name Name of the SSID to which the client connects. Client MAC The MAC address of the client. SSID MAC MAC of the SSID to which the client connects.
Statistics Screen Transmit/Recei Total Packets - The total packets sent (in Transmit table) or received (in Received table) by the interface. Total Bytes - The total bytes sent (in Transmit table) or received (in Received table) by the interface. Total Dropped Packets - The total number of dropped packets sent (in Transmit table) or received (in Received table) by the interface.
Page 71
Log View Screen Log Messages Log Messages Show the log messages. Buttons Refresh Update the data on screen. Save Save the log to a file on your PC. Clear Delete the existing logs from your device.
Firmware Upgrade The firmware (software) in the wireless access point can be upgraded by using HTTP/HTTPS, or TFTP. Check the Linksys support website (http://www.linksys.com/support) and download the latest firmware release to your storage such as PC. Then, perform firmware upgrade by following the steps below.
Configuration Backup/Restore Configuration backup/restore allows you to download the configuration file from the access point to external storage. You can save to your PC or networked storage, or upload a previously saved configuration file from external storage to your access point. It is highly recommended you save one extra copy of the configuration file to external storage after you are done with access point setup.
Page 75
Configuration Backup/Restore Screen Backup/Restore to/from Local PC Backup Once you have the access point working properly, you Configuration should back up the settings to a file on your computer. You can later restore the access point's settings from this file, if necessary. To create a backup file of the current settings, click Backup.
Factory Default It’s highly recommended you save your current configuration file before you restore to factory default settings. To save your current configuration file, click Maintenance > Configuration Backup/Restore. Select and click Save. Figure 48: Factory Default Screen Factory Default Screen Factory Default When you restore to factory defaults your current configuration file will be deleted and the system will...
Reboot Reboot power cycles the device. The current configuration file will remain after reboot. Figure 49: Reboot Screen Reboot Screen Device Reboot Select and click Save to power cycle the access point.
Ping Test Determine the accessibility of a host on the network. Figure 50: Ping Test Screen Ping Test Screen General IP Type Enter the IP type of destination address. IP or URL Address Enter the IP address or domain name that you want to ping.
Packet Capture Capture and store received and transmitted 802.3 packets based on one specified network interface. Network interface can be SSID or LAN. Figure 51: Packet Capture Screen Packet Capture Screen Network Interface Select the desired network interface from the drop- down list.
Diagnostic Log Diagnostic Log provides system detail information such as configuration file, system status and statistics data, hardware information, operational status. The information is useful in troubleshooting and working with technical support. Figure 52: Diagnostic Screen Diagnostic Log Screen Download Click to download the device diagnostic log into a local file.
Appendix A -- - Troubleshooting Overview This chapter covers some common problems encountered while using the wireless access point, and some possible solutions to them. If you follow the suggested steps and the wireless access point still does not function properly, contact your dealer for further advice. General Problems Problem 1: I can't find the access point on my network.
Page 82
Figure 53: Ping If your PC uses a fixed (static) IP address, ensure that it is using an IP address that is in the network segment (subnet) with the wireless access point. On Windows PCs, you can use Control Panel->Network to check the properties for the TCP/IP protocol.
Appendix B -- - About Wireless LANs Overview Wireless networks have their own terms and jargon. You should understand these terms in order to configure and operate a wireless LAN. Wireless LAN Terminology Modes Wireless LANs can work in either of two modes: •...
Different access points within an ESS can use different channels. To reduce interference, it is recommended that adjacent access points SHOULD use different channels. As wireless stations are physically moved through the area covered by an ESS, they will automatically change to the access point that has the least interference or best performance.
WPA-PSK In WPA-PSK, like WEP, data is encrypted before transmission. WPA is more secure than WEP. The PSK (Pre-shared Key) must be entered on each wireless station. The 256-bit encryption key is derived from the PSK, and changes frequently. WPA2-PSK This is a further development of WPA-PSK, and offers even greater security, using the AES (Advanced Encryption Standard) method of encryption.
Page 86
802.1x This uses the 802.1X standard for client authentication, and WEP for data encryption. If possible, you should use WPA-Enterprise instead, because WPA encryption is much stronger than WEP encryption. If this option is used: The access point must have a "client login" on the RADIUS server. •...
Appendix C -- - PC and Server Configuration Overview All wireless stations need to have settings that match the wireless access point. These settings depend on the mode in which the access point is being used. • If using WEP or WPA2-PSK, it is only necessary to ensure that each wireless station's settings match those of the wireless access point, as described below.
Wireless On each client, wireless security must be set to WPA2- Security PSK. The Pre-shared Key entered on the access point must • also be entered on each wireless client. The Encryption method (e.g. TKIP, AES) must be set to •...
• There must be a ‘‘client login’’ for the wireless access point itself. The wireless access point will use its default name as its client login name. (However, your RADIUS server may ignore this and use the IP address instead.) Shared Key Security Shared Secret...
Page 90
Figure 53: Components Screen 4. Click Next. Enterprise root CA , and click Next. 5. Select the Figure 54: Certification Screen...
Page 91
6. Enter the information for the Certificate Authority, and click Next. Figure 55: CA Screen 7. Click Next if you don't want to change the CA's configuration data. 8. Installation will warn you that Internet Information Services are running, and must be stopped before continuing.
DHCP Server Configuration 1. Click on Start > Programs > Administrative Tools > DHCP New Scope 2. Right-click on the server entry, and select Figure 56: DHCP Screen 3. Click Next when the New Scope Wizard begins. 4. Enter the name and description for the scope, click Next.
Page 93
5. Define the IP address range. Change the subnet mask if necessary. Click Next. Figure 57: IP Address Screen 6. Add exclusions in the address fields if required. If no exclusions are required, leave it blank. Click Next. 7. Change the Lease Duration time if preferred. Click Next. 8.
Page 94
10. For the parent domain, enter the domain you specified for the domain controller setup, and enter the server's address for the IP address. Click Next. Figure 58: DNS Screen 11. If you don't want a WINS server, just click Next. Yes, I want to activate this scope now 12.
Certificate Authority Setup 1. Select Start > Programs > Administrative Tools > Certification Authority. 2. Right-click Policy Settings, and select New > Certificate to Issue. Figure 59: Certificate Authority Screen Authenticated Session Smartcard Logon 3. Select (select more than one by holding down the Ctrl key).
Page 96
4. Select Start > Programs > Administrative Tools > Active Directory Users and Computers. 5. Right-click on your active directory domain, and select Properties. Figure 61: Active Directory Screen...
Page 97
6. Select the Group Policy tab, choose Default Domain Policy then click Edit. Figure 62: Group Policy Tab...
Page 98
7. Select Computer Configuration > Windows Settings > Security Settings > Public Key Policies, right-click Automatic Certificate Request Settings > New > Automatic Certificate Request. Figure 63: Group Policy Screen 8. When the Certificate Request Wizard appears, click Next. 9. Select Computer, click Next. Figure 64: Certificate Template Screen Next 10.
Start 12. Click > ; type ‘‘cmd‘‘ and press Enter. secedit /refreshpolicy machine_policy” Enter “ (This command may take a few minutes to take effect. Internet Authentication Service (RADIUS) Setup 1. Select Start > Programs > Administrative Tools > Internet Authentication Service. 2.
Page 100
8. Click Add... Day-And-Time- If you don't want to set any restrictions and a condition is required, select Restrictions , and click Add... Figure 66: Attribute Screen Permitted Next 9. Click , then OK. Select Grant remote access permission 10. Select .
Edit Profile... Authentication Extensible Authentication 11. Click and select the tab. Enable Protocol Smart Card or other Certificate , and select . Deselect other authentication methods listed. Click OK. Figure 67: Authentication Screen 12. Select if you don't want to view the help for EAP. Click Finish. Remote Access Login for Users 1.
3. Select the Dial-in tab, and enable Allow access. Click OK. Figure 68: Dial-in Screen 802.1x Client Setup on Windows XP Windows XP ships with a complete 802.1x client implementation. If using Windows 2000, you can install SP3 (Service Pack 3) to gain the same functionality. If you don't have either of these systems, you must use the 802.1x client software provided with your wireless adapter.
The following instructions assume that: • You are using Windows XP You are connecting to a Windows 2000 server for authentication. • • You already have a login (User-name and password) on the Windows 2000 server. Client Certificate Setup 1. Connect to a network that doesn't require port authentication. Address 2.
Page 104
Request a certificate 4. On the first screen (below), select , click Next. Figure 70: Wireless CA Screen...
Page 105
5. Select User certificate request and select User Certificate, click Next. Figure 71: Request Type Screen...
Page 106
6. Click Submit. Figure 72: Identifying Information Screen...
Page 107
7. A message will be displayed and the certificate will be returned to you. Install this certificate Click Figure 73: Certificate Issued Screen 8. You will receive a confirmation message. Click Yes. Figure 74: Root Certificate Screen 9. Certificate setup is now complete.
802.1x Authentication Setup Start > Control Panel > Network Open the properties for the wireless connection, by selecting Connections. Wireless Network Connection Properties Right-click on the , and select Authentication Enable network access control using IEEE 3. Select the Tab, and ensure that 802.1X Smart Card or other Certificate is selected, and...
Encryption Settings The encryption settings must match the access point’s on the wireless network you wish to join. • Windows XP will detect any available wireless networks, and allow you to configure each network independently. • Your network administrator can advise you of the correct settings for each network. 802.1x networks typically use EAP-TLS.
Page 110
Available Networks Configure 2. Select the wireless network from the list, and click 3. Select and enter the correct values, as advised by your Network Administrator. Data encryption For example, to use EAP-TLS, you would enable , and click the checkbox for The key is provided for me automatically the setting , as shown below.
Using 802.1x Mode (without WPA) This is very similar to using WPA-Enterprise. The key is provided for me The only difference is that on your client, you must NOT enable the setting automatically Instead, you must enter the WEP key manually, ensuring it matches the WEP key used on the access point.