Intermec WA21 System Manual page 149

Mobilelan access series
Hide thumbs Also See for WA21:
Table of Contents

Advertisement

MobileLAN access WA2X System Manual
3 Use a password server to maintain a list of authorized users who can
configure and manage the access points. You can either use an external
RADIUS server or you can use any access point's embedded
authentication server (EAS).
Or change the default login for users who need to configure or manage
the access point. For help, see "Setting Up Logins" on page 140.
4 Create a secure spanning tree, which between access points, and
includes secure IAPP and secure wireless hops. For help, see "Creating a
Secure Spanning Tree" on page 143.
5 Use a RADIUS server to maintain an access control list (ACL), which is
a list of MAC addresses of end devices that can connect to the network
through access point. You can either use an external RADIUS server or
you can use any access point's embedded authentication server (EAS).
For help, see "Using an Access Control List (ACL)" on page 146.
6 Configure VLANs that separate secure and non-secure communications
in your network. For help, see "Configuring VLANs" on page 148.
7 Implement one of these mutually-exclusive security solutions (on each
service set) to ensure secure communications between the access points
and wireless end devices in your network:
Use basic WEP 64/128/152 security. You can configure up to four
different WEP keys on the access point and most wireless end devices,
and then you specify which key is being used to encrypt data. You
should periodically change which WEP key these devices use. 802.11g
and 802.11b radios support WEP 64/128 security, and 802.11a radios
support 64/128/152 security. For help, see "Configuring WEP
64/128/152 Security" on page 150.
Use an 802.1x security solution. 802.1x security provides a framework
to authenticate user traffic to a protected wireless network. Using
802.1x security provides secure data transmission by creating a secure
spanning tree and dynamically rotating the WEP keys. You configure
the access point as an authenticator. For the authentication server, you
can either use an external RADIUS server or you can use the access
point's embedded authentication server (EAS). For help, see
"Implementing an 802.1x Security Solution" on page 152.
Use Wi-Fi Protected Access (WPA) security. WPA is a strongly
enhanced, interoperable Wi-Fi security that addresses many of the
vulnerabilities of Wired Equivalent Privacy (WEP). For help, see
"Configuring Wi-Fi Protected Access (WPA) Security" on page 158.
For help troubleshooting security, see "Troubleshooting Security" on
page 205.
Chapter 6 — Configuring Security
135

Advertisement

Table of Contents
loading

This manual is also suitable for:

Wa22Mobilelan access wa2x

Table of Contents