
Configuring Access Point Security
Altitude 3500 Series Access Point Product Reference Guide
174
6
Click
Apply
to keep changes made within the New Security Policy screen (if any).
Configure encryption or authentication supported security policies by referring to the following:
Altitude 35xx authentication:
●
To create a security policy supporting Kerberos, see,
“Configuring Kerberos Authentication” on
page 174
.
●
To define a security policy supporting 802.1x EAP, see
“Configuring 802.1x EAP Authentication”
on page 176
.
Altitude 35xx encryption:
●
To create a security policy supporting WEP, see
“Configuring WEP Encryption” on page 179
.
●
To define a security policy supporting KeyGuard, see,
“Configuring KeyGuard Encryption” on
page 181
.
●
To configure a security policy supporting WPA/TKIP, see
“Configuring WPA/WPA2 Using
TKIP” on page 183
.
●
To create a security policy supporting WPA2/CCMP, see
“Configuring WPA2-CCMP (802.11i)” on
page 185
.
7
Click
Cancel
to return to the target WLAN screen without keeping any of the changes made within
the New Security Policy screen.
Configuring Kerberos Authentication
Kerberos (designed and developed by MIT) provides strong authentication for client/server
applications using secret-key cryptography. Using Kerberos, a client must prove its identity to a server
(and vice versa) across an insecure network connection.
Once a client and server use Kerberos to prove their identity, they can encrypt all communications to
assure privacy and data integrity. Kerberos can only be used on the access point with Motorola 802.11b
clients.
CAUTION
Kerberos makes no provisions for host security. Kerberos assumes that it is running on a trusted host with
an untrusted network. If host security is compromised, Kerberos is compromised as well
Kerberos uses the
Network Time Protocol (NTP)
for synchronizing the clocks of its
Key Distribution Center
(KDC) server(s)
. Use the
NTP Servers
screen to specify the IP addresses and ports of available NTP
WPA/WPA2 TKIP
Select the
WPA/WPA2 TKIP
button to display the
WPA/
TKIP Settings
field within the New Security Policy screen.
For specific information on configuring WPA/WPA2 TKIP,
see
“Configuring WPA/WPA2 Using TKIP” on page 183
.
WPA2/CCMP
(802.11i)
Select the
WPA2/CCMP (802.11)
button to display the
WPA2/CCMP Settings
field within the New Security Policy
screen. For detailed information on configuring WPA2/
CCMP, see
“Configuring WPA2-CCMP (802.11i)” on
page 185
.
Summary of Contents for Altitude 3500 Series
Page 10: ...Altitude 3500 Series Access Point Product Reference Guide 10...
Page 34: ...Introduction Altitude 3500 Series Access Point Product Reference Guide 34...
Page 66: ...Getting Started Altitude 3500 Series Access Point Product Reference Guide 66...
Page 112: ...System Configuration Altitude 3500 Series Access Point Product Reference Guide 112...
Page 168: ...Network Management Altitude 3500 Series Access Point Product Reference Guide 168...
Page 258: ...Monitoring Statistics Altitude 3500 Series Access Point Product Reference Guide 258...
Page 537: ...Altitude 3500 Series Access Point Product Reference Guide 537 3 Define a mesh supported WLAN...
Page 570: ...Adaptive AP Altitude 3500 Series Access Point Product Reference Guide 570...
Page 592: ...Altitude 3500 Series Access Point Product Reference Guide 592...
Page 594: ...Altitude 3500 Series Access Point Product Reference Guide 594...