Configuring Kerberos Authentication - Extreme Networks Altitude 4700 Series Product Reference Manual

Software version 4.1
Hide thumbs Also See for Altitude 4700 Series:
Table of Contents

Advertisement

Configuring Access Point Security
For access point encryption:
To create a security policy supporting WEP, see
To define a security policy supporting KeyGuard, see,
page
209.
To configure a security policy supporting WPA/TKIP, see
TKIP" on page
211.
To create a security policy supporting WPA2/CCMP, see
page
213.
7 Click Cancel to return to the target WLAN screen without keeping any of the changes made within
the New Security Policy screen.

Configuring Kerberos Authentication

Kerberos (designed and developed by MIT) provides strong authentication for client/server
applications using secret-key cryptography. Using Kerberos, a client must prove its identity to a server
(and vice versa) across an insecure network connection.
Once a client and server use Kerberos to prove their identity, they can encrypt all communications to
assure privacy and data integrity. Kerberos can only be used on the Access Point with certain Motorola
802.11b clients.
CAUTION
Kerberos makes no provisions for host security. Kerberos assumes that it is running on a trusted host with
an untrusted network. If host security is compromised, Kerberos is compromised as well
Kerberos uses the Network Time Protocol (NTP) for synchronizing the clocks of its Key Distribution Center
(KDC) server(s). Use the NTP Servers screen to specify the IP addresses and ports of available NTP
servers. Kerberos requires the Enable NTP on checkbox be selected for authentication to function
properly. See
"Configuring Network Time Protocol (NTP)" on page 110
NOTE
If 802.11a/n is selected as the radio used for a specific WLAN, the WLAN cannot use a Kerberos
supported security policy, as no Motorola 802.11a/n clients can support Kerberos.
To configure Kerberos on the access point:
1 Select Network Configuration > Wireless > Security from the access point menu tree.
If security policies supporting Kerberos exist, they appear within the Security Configuration screen.
These existing policies can be used as is, or their properties edited by clicking the Edit button. To
configure a new security policy supporting Kerberos, continue to step 2.
2 Click the Create button to configure a new policy supporting Kerberos.
The New Security Policy screen displays with no authentication or encryption options selected.
3 Select the Kerberos radio button.
The Kerberos Configuration field displays within the New Security Policy screen.
202
"Configuring WEP Encryption" on page
"Configuring KeyGuard Encryption" on
"Configuring WPA/WPA2 Using
"Configuring WPA2-CCMP (802.11i)" on
to configure the NTP server.
Altitude 4700 Series Access Point Product Reference Guide
208.

Advertisement

Table of Contents
loading

Table of Contents