Configuring Access Point Security
6-5
6.3 Enabling Authentication and Encryption Schemes
To complement the built-in firewall filters on the WAN side of the access point, the WLAN side of the
access point supports authentication and encryption schemes. Authentication is a challenge-
response procedure for validating user credentials such as username, password, and sometimes
secret-key information. The access point provides two schemes for authenticating users:
802.1x EAP
and
Kerberos
.
Encryption applies a specific algorithm to alter its appearance and prevent unauthorized reading.
Decryption applies the algorithm in reverse to restore the data to its original form. Sender and
receiver must employ the same encryption/decryption method to interoperate.
Wired Equivalent Privacy (WEP)
is available in two encryption modes: 40 bit (also called WEP 64) and
104 bit (also called WEP 128). The 104-bit encryption mode provides a longer algorithm (better
security) that takes longer to decode (hack) than the 40-bit encryption mode.
Each WLAN (16 WLANs available in total to an access point regardless of the model) can have a
separate security policy. However, more than one WLAN can use the same security policy. Therefore,
to avoid confusion, do not name security policies the same name as WLANs. Once security policies
have been created, they are selectable within the
Security
field of each
WLAN
screen. If the
existing default security policy does not satisfy the data protection requirements of a specific WLAN,
a new security policy (using the authentication and encryption schemes discussed above) can be
created.
To enable an existing WLAN security policy or create a new policy:
1.
Select
Network Configuration
->
Wireless
->
Security
from the access point menu tree.
The
Security Configuration
screen displays
.
2.
If a new security policy is required, click the
Create
button.
The
New Security Policy
screen displays with the
Manually Pre-shared key/No
authentication
and
No Encryption
options selected. Naming and saving such a policy (as
is) would provide no security and might only make sense in a guest network wherein no
sensitive data is either transmitted or received.
CAUTION
Only a qualified installation professional should set or restore the
access point’s radio and power management configuration in the
event of a password reset.
!
Summary of Contents for AP-51 Series
Page 1: ...AP 51xx Access Point Product Reference Guide ...
Page 3: ...AP 51xx Access Point Product Reference Guide 72E 124688 01 May 2009 ...
Page 4: ......
Page 16: ...AP 51xx Access Point Product Reference Guide xiv ...
Page 80: ...AP 51xx Access Point Product Reference Guide 2 32 ...
Page 96: ...AP 51xx Access Point Product Reference Guide 3 16 ...
Page 158: ...AP 51xx Access Point Product Reference Guide 4 62 ...
Page 238: ...AP 51xx Access Point Product Reference Guide 5 80 ...
Page 318: ...AP 51xx Access Point Product Reference Guide 6 80 ...
Page 636: ...AP 51xx Access Point Product Reference Guide 9 22 3 Define a mesh supported WLAN ...
Page 649: ...Configuring Mesh Networking 9 35 3 Determine the Radio MAC Address and BSSID MAC Addresses ...
Page 679: ...Adaptive AP 10 25 line con 0 line vty 0 24 end ...
Page 680: ...AP 51xx Access Point Product Reference Guide 10 26 ...
Page 692: ...AP 51xx Access Point Product Reference Guide A 12 ...
Page 716: ...AP 51xx Access Point Product Reference Guide C 4 ...
Page 722: ...AP 51xx Access Point Product Reference Guide IN 10 ...
Page 723: ......