Setting The Authentication Method; Setting The Encryption Method; Mobile Unit Access Control List (Acl) - Motorola WS2000 System Reference Manual

Wireless switch
Hide thumbs Also See for WS2000:
Table of Contents

Advertisement

Setting the Authentication Method

The authentication method sets a challenge-response procedure for validating user credentials such as
username, password, and sometimes secret-key information. The WS2000 Wireless Switch provides two
methods for authenticating users: 802.1x EAP and Kerberos. The administrator can select between these two
methods. For testing connectivity, WLAN security is not an issue, so there is not reason to enable
authentication—the default setting (No Authentication) is sufficient.

Setting the Encryption Method

Encryption applies a specific algorithm to data to alter its appearance and prevent unauthorized reading.
Decryption applies the algorithm in reverse to restore the data to its original form. Sender and receiver
employ the same encryption/decryption method.
Wired Equivalent Privacy (WEP) is a security protocol specified in the IEEE Wireless Fidelity (Wi-Fi) standard,
802.11b. WEP is designed to provide a WLAN with a level of security and privacy comparable to that of a
wired LAN. WEP might be all that a small-business user needs for the simple encryption of wireless data.
However, networks that require more security are at risk from a WEP flaw. An unauthorized person with a
sniffing tool can monitor a network for less than a day and decode its encrypted messages.
For the connectivity test, set WEP 128 encryption. This ensures that communications with the switch are
secure enough for this stage. Later on, increasing the security level might be necessary.
1. Select the
WEP 128 (104-bit key)
2. To use WEP encryption with the
display a sub-screen for entering keys.
3. Add a key to
(0-9, A-E) characters. When finished, click the
Security screen.
4. Click the
Apply

Mobile Unit Access Control List (ACL)

This list is used to specify which mobile units can or cannot gain access to the WLAN. The list employs an
adoption rule for allowing or denying specific mobile units by way of exception. By default, all mobile units
can gain access.
option.
No Authentication
Key
#1, and use that key with the mobile unit. The keys consist of 26 hexadecimal
button in the WLAN Security screen to save changes.
selection, click the
Ok
button to close this screen an return to the WLAN
Getting Started
WEP Key Settings
button to
2-11

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents