3 802.1x – LevelOne WBR-3405TX User Manual

Page 24

Advertising
background image

3.2.3 802.1X

There are three essential components to the 802.1x infrastructure: (1) Supplicant, (2)
Authenticator and (3) Server. The Router serves as an Authenticator, and the EAP
methods used must be supported by the backend Radius Server. The 802.1x security
supports both MD5 and TLS Extensive Authentication Protocol (EAP). Please follow
the steps below to configure 802.1X security.

1. Select the Encryption Key Length Size ranging from 64 to 128 Bits that you

would like to use.

Select the Lifetime of the Encryption Key from 5 Minutes to 1 Day. As soon
as the lifetime of the Encryption Key is over, the Encryption Key will be renewed
by the Radius server.

2. Enter the IP address of and the Port used by the Primary Radius Server

Enter the Shared Secret, which is used by the Radius Server.

24

Advertising