Motorola AP-51XX Product Reference Manual page 227

Table of Contents

Advertisement

CAUTION Kerberos makes no provisions for host security. Kerberos assumes
!
Kerberos uses the Network Time Protocol (NTP) for synchronizing the clocks of its Key Distribution
Center (KDC) server(s). Use the
NTP servers. Kerberos requires the
function properly. See
server.
NOTE If 802.11a is selected as the radio used for a specific WLAN, the WLAN
To configure Kerberos on the access point:
1. Select
Network Configuration
If security policies supporting Kerberos exist, they appear within the
Configuration
by clicking the
to step 2.
2. Click the
Create
The
New Security Policy
selected.
3. Select the
Kerberos
The
Kerberos Configuration
4. Ensure the
Name
of the policy.
that it is running on a trusted host with an untrusted network. If host
security is compromised, Kerberos is compromised as well
NTP Servers
Enable NTP on
Configuring Network Time Protocol (NTP) on page 4-39
cannot use a Kerberos supported security policy, as no Motorola 802.11a
clients can support Kerberos.
->
screen. These existing policies can be used as is, or their properties edited
Edit
button. To configure a new security policy supporting Kerberos, continue
button to configure a new policy supporting Kerberos.
screen displays with no authentication or encryption options
radio button.
field displays within the New Security Policy screen.
of the security policy entered suits the intended configuration or function
screen to specify the IP addresses and ports of available
checkbox be selected for authentication to
Wireless
->
Security
Configuring Access Point Security
to configure the NTP
from the access point menu tree.
Security
6-9

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ap-51 seriesAp-5131Ap-5181

Table of Contents