Motorola WiNG 4.4 Reference Manual page 139

Table of Contents

Advertisement

MU Timeout
Define the time (between 1- 60 seconds) for the switch's retransmission of EAP-Request
packets. The default is 5 seconds.
MU Max Retries
Specify the maximum number of times the switch retransmits an EAP-Request frame to the
client before it times out the authentication session. The default is 3 retries, with a maximum
of 100 supported.
6. Refer to the
Status
field for the current state of the requests made from applet. This field displays error messages if
something goes wrong in the transaction between the applet and the switch.
7. Click
OK
to use the changes to the running configuration and close the dialog.
8. Click
Cancel
to close the dialog without committing updates to the running configuration.
Configuring Kerberos
Kerberos (designed and developed by MIT) provides strong authentication for client/server applications using secret-key
cryptography. Using Kerberos, an MU must prove its identity to a server (and vice versa) across an insecure network
connection. Once an MU and server prove their identity, they can encrypt all communications to assure privacy and data
integrity. Kerberos can only be used with Motorola
CAUTION: Kerberos makes no provisions for host security. Kerberos assumes that it is
running on a trusted host with an untrusted network. If host security is compromised,
Kerberos is compromised as well.
To configure a Kerberos authentication scheme for a WLAN:
1. Select
Network
>
Wireless LANs
2. Select an existing WLAN from those displayed within the
3. Click the
Edit
button.
A WLAN screen displays with the WLAN's existing configuration. Refer to the
columns to assess the WLAN's existing security configuration.
4. Select the
Kerberos
button from within the
NOTE: Kerberos requires at least one encryption scheme be enabled (WEP 128 or other).
If neither WEP 128 or KeyGuard is enabled, WEP 128 will automatically be enabled for
use with Kerberos.
5. Click the
Config...
button to the right of the Kerberos checkbox. The
clients.
Solutions
from the main menu tree.
Configuration
Authentication
field.
Network Setup 4 - 35
tab.
Authentication
and
Kerberos
screen displays.
Encryption

Advertisement

Table of Contents
loading

Table of Contents