Configuring Kerberos Authentication - Symbol AP-51xx Product Reference Manual

Table of Contents

Advertisement

6-8
AP-51xx Access Point Product Reference Guide
WPA/WPA2 TKIP
WPA2/CCMP
(802.11i)
6. Click
Apply
Configure encryption or authentication supported security policies by referring to the
following:
access point authentication:
• To create a security policy supporting Kerberos, see,
Configuring Kerberos Authentication on page
• To define a security policy supporting 802.1x EAP, see
Configuring 802.1x EAP Authentication on page
access point encryption:
• To create a security policy supporting WEP, see
Configuring WEP Encryption on page
• To define a security policy supporting KeyGuard, see,
Configuring KeyGuard Encryption on page
• To configure a security policy supporting WPA/TKIP, see
Configuring WPA/WPA2 Using TKIP on page
• To create a security policy supporting WPA2/CCMP, see
Configuring WPA2-CCMP (802.11i) on page
7. Click
Cancel
within the New Security Policy screen.

6.4 Configuring Kerberos Authentication

Kerberos (designed and developed by MIT) provides strong authentication for client/server
applications using secret-key cryptography. Using Kerberos, a client must prove its identity to a server
(and vice versa) across an insecure network connection.
Select the
WPA/WPA2 TKIP
Settings
field within the New Security Policy screen. For specific
information on configuring WPA/WPA2 TKIP, see
Configuring WPA/WPA2 Using TKIP on page
Select the
WPA2/CCMP (802.11)
CCMP Settings
detailed information on configuring WPA2/CCMP, see
Configuring WPA2-CCMP (802.11i) on page
to keep changes made within the New Security Policy screen (if any).
to return to the target WLAN screen without keeping any of the changes made
button to display the
button to display the
field within the New Security Policy screen. For
6-8.
6-11.
6-16.
6-18.
6-21.
6-24.
WPA/TKIP
6-21.
WPA2/
6-24.

Advertisement

Table of Contents
loading

Table of Contents