Configuring Kerberos Authentication - Motorola AP-7131 Product Reference Manual

Hide thumbs Also See for AP-7131:
Table of Contents

Advertisement

6-8
AP-7131 Access Point Product Reference Guide
7. Click
Cancel
within the New Security Policy screen.

6.4 Configuring Kerberos Authentication

Kerberos (designed and developed by MIT) provides strong authentication for client/server applications
using secret-key cryptography. Using Kerberos, a client must prove its identity to a server (and vice
versa) across an insecure network connection.
Once a client and server use Kerberos to prove their identity, they can encrypt all communications to
assure privacy and data integrity. Kerberos can only be used on the access point with Motorola 802.11b
clients.
CAUTION Kerberos makes no provisions for host security. Kerberos assumes
!
Kerberos uses the Network Time Protocol (NTP) for synchronizing the clocks of its Key Distribution
Center (KDC) server(s). Use the
NTP servers. Kerberos requires the
properly. See
Configuring Network Time Protocol (NTP) on page 4-41
NOTE If 802.11a/n is selected as the radio used for a specific WLAN, the WLAN
To configure Kerberos on the access point:
1. Select
Network Configuration
If security policies supporting Kerberos exist, they appear within the
screen. These existing policies can be used as is, or their properties edited by clicking the
button. To configure a new security policy supporting Kerberos, continue to step 2.
2. Click the
The
New Security Policy
selected.
3. Select the
The
Kerberos Configuration
to return to the target WLAN screen without keeping any of the changes made
that it is running on a trusted host with an untrusted network. If host
security is compromised, Kerberos is compromised as well
NTP Servers
Enable NTP on
cannot use a Kerberos supported security policy, as no Motorola
802.11a/n clients can support Kerberos.
Create
button to configure a new policy supporting Kerberos.
screen displays with no authentication or encryption options
Kerberos
radio button.
screen to specify the IP addresses and ports of available
checkbox be selected for authentication to function
->
Wireless
->
Security
field displays within the New Security Policy screen.
to configure the NTP server.
from the access point menu tree.
Security Configuration
Edit

Advertisement

Table of Contents
loading

Table of Contents