Network Infrastructure; Choosing Between Built-In Or External Authentication Server - Psion Teklogix 9160 G2 User Manual

Wireless gateway
Hide thumbs Also See for 9160 G2:
Table of Contents

Advertisement

Typically, users will configure security on their wireless clients for access to many different
networks (access points). The list of "Available Networks" will change depending on the lo-
cation of the client and which APs are online and detectable in that location.
has been detected by the client and security is configured for it, it remains in the client's list
of networks but shows as either reachable or unreachable depending on the situation. For
each network (AP) you want to connect to, configure security settings on the client to match
the security mode being used by that network.
We describe security setup on a client that uses Microsoft
wireless connectivity. The Windows client software is used as the example because of its
widespread availability on Windows computers and laptops. These procedures will vary
slightly if you use different software on the client (such as Funk Odyssey
ration information you need to provide is the same.
Note: The recommended sequence for security configuration is (1) set up security on the
access point, and (2) configure security on each of the wireless clients.
We expect that initially, you will connect to an access point that has no security set
("None") from an unsecure wireless client. With this initial connection, you can go to
the access point Administration Web pages and configure a security mode (Security).
When you re-configure the access point with a security setting and click Update, your
wireless client will be disassociated and you will lose connectivity to the AP Adminis-
tration Web pages. In some cases, you may need to make additional changes to the AP
security settings before configuring the client. Therefore, you must have a backup
Ethernet (wired) connection.
The following sections describe how to set up each of the supported security modes on wire-
less clients of a network served by the 9160 G2 Wireless Gateway.
B.1
Network Infrastructure; Choosing Between Built-in Or External
Authentication Server
Network security configurations including Public Key Infrastructures (PKI), Remote Au-
thentication Dial-in User Server (RADIUS) servers, and Certificate Authority (CA) can
vary a great deal from one organization to the next in terms of how they provide Authentica-
tion, Authorization, and Accounting (AAA). Ultimately, the particulars of your
infrastructure will determine how clients should configure security to access the wireless
1
The exception to this is if the access point is set to prohibit the broadcast of its network name. In this case the
SSID will not show up in the list of Available Networks on the client. Instead, the client must have the exact
network name configured in the network connection properties before it will be able to connect.
Appendix B: Security Settings on Wireless Clients/RADIUS Server

Network Infrastructure; Choosing Between Built-in Or External Authentication Server

Psion Teklogix 9160 G2 Wireless Gateway User Manual
1
Once an AP
®
®
Windows
client software for
®
), but the configu-
B-7

Advertisement

Table of Contents
loading

Table of Contents