Configuring Kerberos Authentication - Motorola AP-7131 Product Reference Manual

Access point
Hide thumbs Also See for AP-7131:
Table of Contents

Advertisement

6-8
AP-7131 Access Point Product Reference Guide
WPA2/CCMP
(802.11i)
6. Click
Apply
Configure encryption or authentication supported security policies by referring to the
following:
access point authentication:
• To create a security policy supporting Kerberos, see,
on page
• To define a security policy supporting 802.1x EAP, see
Authentication on page
access point encryption:
• To create a security policy supporting WEP, see
• To define a security policy supporting KeyGuard, see,
page
• To configure a security policy supporting WPA/TKIP, see
TKIP on page
• To create a security policy supporting WPA2/CCMP, see
on page
7. Click
Cancel
within the New Security Policy screen.

6.4 Configuring Kerberos Authentication

Kerberos (designed and developed by MIT) provides strong authentication for client/server applications
using secret-key cryptography. Using Kerberos, a client must prove its identity to a server (and vice
versa) across an insecure network connection.
Once a client and server use Kerberos to prove their identity, they can encrypt all communications to
assure privacy and data integrity. Kerberos can only be used on the access point with Motorola 802.11b
clients.
Select the
CCMP Settings
detailed information on configuring WPA2/CCMP, see
WPA2-CCMP (802.11i) on page
to keep changes made within the New Security Policy screen (if any).
6-8.
6-11.
6-18.
6-20.
6-23.
to return to the target WLAN screen without keeping any of the changes made
WPA2/CCMP (802.11)
field within the New Security Policy screen. For
6-23.
Configuring WEP Encryption on page
button to display the
WPA2/
Configuring
Configuring Kerberos Authentication
Configuring 802.1x EAP
Configuring KeyGuard Encryption on
Configuring WPA/WPA2 Using
Configuring WPA2-CCMP (802.11i)
6-16.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents