Like every other website on the planet, SmallNetBuilder uses cookies. Our cookies track login status, but we only allow admins to log in anyway, so those don't apply to you. Any other cookies you pick up during your visit come from advertisers, which we don't control.
If you continue to use the site, you agree to tolerate our use of cookies. Thank you!

Router Charts

Click for Router Charts

Router Ranker

Click for Router Ranker

NAS Charts

Click for NAS Charts

NAS Ranker

Click for NAS Ranker

More Tools

Click for More Tools

Wireless Reviews

Wireless Features, Continued

While EAP and RADIUS make for industrial strength authorization, if you do not already have a RADIUS server or do not wish to set one up, the G-2000 can perform EAP authentication using its Local User Database (Figure 13) for up to 32 users.

If you do not have a RADIUS server you can authenticate to an onboard Local User Database

Figure 13: If you do not have a RADIUS server you can authenticate to an onboard Local User Database

The Local User Database performs a function similar to RADIUS, but is not a mini RADIUS server. Using either RADIUS or the Local User Database does require that authenticating clients support 802.1x, however.

Figure 13 shows that authentication requests can be directed to an external RADIUS server, the Local User Database (Figure 14), or both. With either method, users can be forced to periodically re-authenticate and / or re-authenticate if the user's connection is idle for too long.

A Local User Database allows for simple authentication using only a name and password

Figure 14: A Local User Database allows for simple authentication using only a name and password

The G-2000 also supports MAC address filtering (Figure 15), which uses client MAC addresses to control access to the G-2000's LAN. The list can be set to either grant or deny access, but can't be saved to or loaded from a file. The feature also doesn't present a list of currently associated or in-range client MAC addresses to pick from in order to minimize setup hassles.


Figure 15: MAC address filtering provides basic client access control

More Wireless

Wi-Fi System Tools
Check out our Wi-Fi System Charts, Ranker and Finder!

Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!

...

Over In The Forums

Hi - This week I decided to upgrade my existing AC68U running merlin to an AX86U. I have been spending time today setting up the AX86U and installed M...
Continuation of the first thread which covered beta 1 through 3.Jan 25th: Beta 5 is now available. Changes since Beta 4:Code: 3790c8fe9a Updated docu...
I have had FiOS service here for many years (originally through Verizon, now through Frontier) for internet (75/75), TV, & our landline phone. The pho...
Got an XT8 over the holidays. Overall have been very happy with it (uptime of 20 days, great coverage, no incidents, etc).As a result of today's ongoi...
For those of you aching to be beta-testers for the first 6E routers, here's a phone to go with them. Samsung Galaxy S21 Ultra: The Ultimate Smartphon...

Don't Miss These

  • 1
  • 2
  • 3