Configuring Kerberos Authentication; Setting The Encryption Method - Motorola WS2000 - Wireless Switch - Network Management Device System Reference Manual

Wireless switch
Hide thumbs Also See for WS2000 - Wireless Switch - Network Management Device:
Table of Contents

Advertisement

5-10 WS2000 Wireless Switch System Reference Guide
18.Click the
Ok

5.3.3 Configuring Kerberos Authentication

Kerberos provides a strong authentication method for client/server applications by using secret-key
cryptography. Using this protocol, a client can prove their identity to a server (and vice versa) across an
insecure network connection. After a client and server use Kerberos to prove their identity, they can encrypt
all communications to assure privacy and data integrity.
1. Select the
Kerberos
2. Click the
Kerberos Configuration
3. A realm name functions similar to a DNS domain name. In theory, the realm name is arbitrary; however,
in practice, a Kerberos realm is typically named using an uppercase version of the DNS domain name that
is associated with hosts in the realm. Specify a realm name that is case-sensitive, for example,
MyCompany.com.
4. Specify a
Username
5. Specify a
Password
The Key Distribution Center (KDC) implements an authentication service and a ticket granting service,
whereby an authorized user is granted a ticket that is encrypted with the user's password. The KDC has
a copy of every user password.
6. Specify a server IP address and a port to be used as the
7. Optionally, specify a
8. Optionally, specify a
9. Make sure that NTP is enabled (go to
is required for Kerberos Authentication. For more information, see
(NTP)
Server.
10.Click
Ok
when done.

5.3.4 Setting the Encryption Method

Encryption applies a specific algorithm to data to alter its appearance and prevent unauthorized reading.
Decryption applies the algorithm in reverse to restore the data to its original form. Sender and receiver
employ the same encryption/decryption method.
The WS 2000 Wireless Switch provides four methods for data encryption: WEP, KeyGuard, WPA-TKIP, and
WPA2-CCMP (802.11i). The WPA-TKIP and KeyGuard methods use WEP 104-bit key encryption. WPA-TKIP
offers the highest level of security among the encryption methods available with the switch.
button to save changes.
radio button to enable Kerberos authentication.
button to display a sub-screen for authentication settings.
for the Kerberos configuration.
for the Kerberos configuration.
Backup KDC
server by providing the IP address and port.
Remote KDC
server by providing the IP address and port.
System Configuration
Primary
KDC.
-->
NTP Servers
from the left menu). NTP
Specifying a Network Time Protocol

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents