7: Networking
EMGâ„¢ Edge Management Gateway User Guide 107
5. To save, select Apply.
Quick Connect
Quick Connect simplifies adding WLAN profiles by scanning the wireless network, and displaying
all of the networks that are detected with the SSID, BSSID, Frequency and Channel, Signal and
Security Suite for each network. Selecting the link for any channel will display a WLAN profile page
with fields to fill in the appropriate authentication tokens (for example the passphrase or key for a
network with WPA2 security). Refer to the configurable items for WLAN Profiles for a description of
the fields on the Quick Connect web page.
Note: For networks that are detected that do not broadcast the SSID, the scan will
display [No SSID broadcast].
Wireless Access Point Settings
Wireless networking is supported on EMG models only. The EMG can be configured as a wireless
client or an access point. This page describes how to configure the EMG to be an access point,
which is enabled by default. The access point will allow WiFi devices to connect to the EMG and
access all functions, similar to how users on a wired network connect to the EMG via Ethernet
ports Eth1 or Eth2. A maximum of 5 clients can connect simultaneously to the access point. A
DHCP server will assign IP addresses to the clients.
As the access point is enabled by default, a wireless device can be used for initial configuration of
the EMG, instead of using connections that require a cabled connection, such as the console port
or Ethernet Ports.
To configure the wireless access point:
1. On the Wireless Settings page, click Configure Access Point.
2. The following page is displayed.
IEEE 802.1X Parameters,
continued
PEAP Configuration: Enter a User Name and Password that can be
authenticated by the RADIUS server. The User Name and Password
can be up to 63 characters long, and all printable characters are
supported. Select the PEAP Inner Authentication used in the TLS
tunnel, which can be EAP-MSCHAPv2, EAP-TLS or EAP-MD5. If
EAP-TLS is selected for Inner Authentication, a client side certificate
with a Certificate file, Private Key file and Authority Certificate file
must be provided (see EAP-TLS Configuration for certificate file
formats). Certificate filenames must be unique across all profiles,
otherwise certificates for one profile may be overwritten by certificates
for another profile.
FAST Configuration: Enter a User Name and Password that can be
authenticated by the RADIUS server. The User Name and Password
can be up to 63 characters long, and all printable characters are
supported. Select the FAST Inner Authentication, which can be
MSCHAPv2, GTC or EAP-MD5. If Inner Authentication is set to
MSCHAPv2, select FAST Provisioning, which controls in-line
provisioning of the PAC (Protected Access Credential): Authenticated
(requires a server certificate), Unauthenticated (requires no server
certificate), or Both.