Configuring Wlan Security - Motorola WiNG 5.5 Reference Manual

Table of Contents

Advertisement

6 - 8
WiNG 5.5 Access Point System Reference Guide

6.1.2 Configuring WLAN Security

Wireless LANs
Assign WLANs unique security configurations supporting authentication, captive portal (hotspot), self registration or encryption
schemes as data protection requirements dictate.
Figure 6-4 WLAN Security screen
Authentication ensures only known and trusted users or devices access an access point managed WLAN. Authentication is
enabled per WLAN to verify the identity of both users and devices. Authentication is a challenge and response procedure for
validating user credentials such as user name, password and secret-key information.
A client must authenticate to an access point to receive resources from the network. 802.1x EAP, 802.1x EAP-PSK, MAC and
PSK/None authentication options are supported.
Refer to the following to configure a WLAN's authentication scheme:
802.1x EAP, EAP-PSK and EAP MAC

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents