Motorola WS5100 Series Reference Manual page 108

Hide thumbs Also See for WS5100 Series:
Table of Contents

Advertisement

4-26 WS5100 Series Switch System Reference Guide
6. Refer to the
802.1X EAP
Kerberos
Hotspot
MAC Authentication
No Authentication
7. Refer to the
WEP 64
WEP 128
KeyGuard
WPA-WPA2-TKIP
WPA2-CCMP
Authentication
field to select amongst the following options:
A Radius server is used to authenticate users. For detailed information on
configuring EAP for the WLAN, see
A Kerberos server is used to authenticate users. For detailed information on
configuring Kerberos for the WLAN, see
A Hotspot is used to authenticate users in a unique network segment (hotspot).
The attributes of both the hotspot and the Radius Server are required. For more
information, see
Configuring Hotspots on page
The switch uses a Radius server to see if a target MAC address is allowed on the
network. The attributes of the Radius Server are required. For more information,
see
Configuring MAC Authentication on page 4-40
When selected, no Authentication is used and transmissions are made (in the
open) without security unless an encryption scheme is used. This setting is not
recommended when data protection is important.
Encryption
field to select amongst the following options:
Use the WEP 64 checkbox to enable the Wired Equivalent Privacy (WEP) protocol
with a 40-bit key. WEP is available in two encryption modes: 40 bit (also called
WEP 64) and 104 bit (also called WEP 128). The 104-bit encryption mode provides
a longer algorithm that takes longer to decode than that of the 40-bit encryption
mode. For detailed information on configuring WEP 64 for the WLAN, see
Configuring WEP 64 on page
Use the WEP 128 checkbox to enable the Wired Equivalent Privacy (WEP) protocol
with a 104-bit key. WEP is available in two encryption modes: WEP 64 (using a 40-
bit key) and WEP 128 (using a 104-bit key). WEP 128 encryption mode provides a
longer algorithm that takes longer to decode than that of the WEP 64 encryption
mode. For detailed information on configuring WEP 128 for the WLAN, see
Configuring WEP 128 / KeyGuard on page
Uses a Motorola proprietary encryption mechanism to protect data. For detailed
information on configuring KeyGuard for the WLAN, see
Configuring WEP 128 / KeyGuard on page
Use the WPA-TKIP checkbox to enable Wi-Fi Protected Access (WPA) with
Temporal Key Integrity Protocol (TKIP). For detailed information on configuring
TKIP for the WLAN, see
Configuring WPA/WPA2 using TKIP and CCMP on page
WPA2 is a newer 802.11i standard that provides even stronger wireless security
than Wi-Fi Protected Access (WPA) and WEP. CCMP is the security standard used
by the Advanced Encryption Standard (AES). AES serves the same function TKIP
does for WPA-TKIP. CCMP computes a Message Integrity Check (MIC) using the
proven Cipher Block Chaining (CBC) technique. Changing just one bit in a message
produces a totally different result. For detailed information on configuring CCMP
for the WLAN, see
Configuring WPA/WPA2 using TKIP and CCMP on page
Configuring 802.1x EAP on page
Configuring Kerboros on page
4-32.
4-47.
4-49.
4-49.
4-51.
4-30.
4-31.
4-51.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents