Symbol AP-51xx Product Reference Manual page 223

Table of Contents

Advertisement

Once a client and server use Kerberos to prove their identity, they can encrypt all communications to
assure privacy and data integrity. Kerberos can only be used on the access point with Symbol 802.11b
clients.
CAUTION Kerberos makes no provisions for host security. Kerberos assumes
!
Kerberos uses the Network Time Protocol (NTP) for synchronizing the clocks of its Key Distribution
Center (KDC) server(s). Use the
NTP servers. Kerberos requires the
authentication to function properly. See
configure the NTP server.
NOTE If 802.11a is selected as the radio used for a specific WLAN, the WLAN
To configure Kerberos on the access point:
1. Select
Network Configuration
If security policies supporting Kerberos exist, they appear within the
Configuration
by clicking the
to step 2.
2. Click the
Create
The
New Security Policy
selected.
3. Select the
Kerberos
The
Kerberos Configuration
4. Ensure the
Name
of the policy.
that it is running on a trusted host with an untrusted network. If host
security is compromised, Kerberos is compromised as well
NTP Servers
screen to specify the IP addresses and ports of available
Enable NTP on
Configuring Network Time Protocol (NTP) on page 4-36
cannot use a Kerberos supported security policy, as no Symbol 802.11a
clients can support Kerberos.
->
Wireless
screen. These existing policies can be used as is, or their properties edited
Edit
button. To configure a new security policy supporting Kerberos, continue
button to configure a new policy supporting Kerberos.
screen displays with no authentication or encryption options
radio button.
field displays within the New Security Policy screen.
of the security policy entered suits the intended configuration or function
Configuring Access Point Security
access point checkbox be selected for
->
Security
from the access point menu tree.
to
Security
6-9

Advertisement

Table of Contents
loading

Table of Contents