Cisco WAP 121 Administration Manual page 50

Wireless-n access point with power over ethernet/wireless-n selectable -band access point with power over ethernet
Hide thumbs Also See for WAP 121:
Table of Contents

Advertisement

Networks
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
REVIEW DRAFT Version 2—CISCO CONFIDENTIAL
Dynamic WEP refers to the combination of 802. 1 x technology and the Extensible
Authentication Protocol (EAP). With Dynamic WEP security, WEP keys are changed
dynamically.
EAP
messages sent over an
EAP Encapsulation Over LANs (EAPOL). IEEE 802. 1 X provides dynamically-
generated keys that are periodically refreshed. An RC4 stream cipher is used to
encrypt the frame body and cyclic redundancy checking (CRC) of each 802. 1 1
frame.
This mode requires the use of an external RADIUS server to authenticate users.
The AP requires a RADIUS server that supports EAP, such as the Microsoft Internet
Authentication Server. To work with Windows clients, the authentication server
must support Protected EAP (PEAP) and
You can use any of a variety of authentication methods that the IEEE 802. 1 X mode
supports, including certificates, Kerberos, and public key authentication. You must
configure the client stations to use the same authentication method the AP uses.
The following parameters display for Dynamic WEP configuration:
global RADIUS settings that you define for the AP (see
. However, you can configure each VAP to use a different set of
RADIUS servers.
To use the global RADIUS server settings, ensure the check box is selected.
To use a separate RADIUS server for the VAP, clear the check box and enter
the RADIUS server IP address and key in the following fields.
You can toggle between the address types to configure IPv4 and IPv6
global RADIUS address settings, but the AP contacts only the RADIUS
server or servers for the address type you select in this field.
RADIUS server for this VAP.
When the first wireless client tries to authenticate with the AP, the AP sends
an authentication request to the primary server. If the primary server
responds to the authentication request, the AP continues to use this
RADIUS server as the primary server, and authentication requests are sent
to the address you specify.
IEEE 802. 1 1
wireless network using a protocol called
MSCHAP
—By default, each VAP uses the
—The IP version that the RADIUS server uses.
or
V2.
—The address for the primary
50

Advertisement

Table of Contents
loading

This manual is also suitable for:

Wap 321

Table of Contents