Step 8: Configure Wlan Security; Setting The Authentication Method; Setting The Encryption Method - Motorola WS2000 - Wireless Switch - Network Management Device System Reference Manual

Wireless switch
Hide thumbs Also See for WS2000 - Wireless Switch - Network Management Device:
Table of Contents

Advertisement

2-10 WS2000 Wireless Switch System Reference Guide

Step 8: Configure WLAN Security

In the previous step, the administrator set parameters for each WLAN that fine tune the performance of the
WLAN. In addition, the administrator can set the type and level of security for each WLAN. These security
measures do not control communications from the WAN; instead, they control communication from the
clients within the WLAN.
In the
Network Configuration
the administrator can set the user authentication method and the encryption method, as well as define a set
of rules that control which MUs can communicate through the WLAN.

Setting the Authentication Method

The authentication method sets a challenge-response procedure for validating user credentials such as
username, password, and sometimes secret-key information. The WS2000 Wireless Switch provides two
methods for authenticating users: 802.1x EAP and Kerberos. The administrator can select between these two
methods. For testing connectivity, WLAN security is not an issue, so there is not reason to enable
authentication—the default setting

Setting the Encryption Method

Encryption applies a specific algorithm to data to alter its appearance and prevent unauthorized reading.
Decryption applies the algorithm in reverse to restore the data to its original form. Sender and receiver
employ the same encryption/decryption method.
Wired Equivalent Privacy (WEP) is a security protocol specified in the IEEE Wireless Fidelity (Wi-Fi) standard,
802.11b. WEP is designed to provide a WLAN with a level of security and privacy comparable to that of a
wired LAN. WEP might be all that a small-business user needs for the simple encryption of wireless data.
However, networks that require more security are at risk from a WEP flaw. An unauthorized person with a
sniffing tool can monitor a network for less than a day and decode its encrypted messages.
-->
Wireless
--> <WLAN name> --> <WLAN Name> -->
(No
Authentication) is sufficient.
Security
screen,

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents