AP-7131N-FGR Access Point Product Reference Guide
1-12
The following encryption techniques are supported:
•
WPA2-CCMP (802.11i) Encryption
In addition, the access point supports the following additional security features:
•
Firewall Security
•
VPN Tunnels
•
Content Filtering
For an overview on the encryption and authentication schemes available , refer to
Configuring Access
Point Security on page 6-1
.
1.2.11.1 EAP Authentication
The
Extensible Authentication Protocol (EAP)
feature provides access points and their associated
MUs an additional measure of security for data transmitted over the wireless network. Using EAP,
authentication between devices is achieved through the exchange and verification of certificates.
EAP is a mutual authentication method whereby both the MU and AP are required to prove their
identities. Using EAP, the user loses device authentication if the server cannot provide proof of device
identification.
Using EAP, a user requests connection to a WLAN through the access point. The access point then
requests the identity of the user and transmits that identity to an authentication server. The server
prompts the AP for proof of identity (supplied to the by the user) and then transmits the user data
back to the server to complete the authentication process.
An MU is not able to access the network if not authenticated. When configured for EAP support, the
access point displays the MU as an EAP station.
EAP is only supported on mobile devices running Windows XP, Windows 2000 (using Service Pack #4)
and Windows Mobile 2003. Refer to the system administrator for information on configuring a Radius
Server for EAP (802.1x) support.
For detailed information on EAP configurations, see
Configuring 802.1x EAP Settings on page 6-6
.
1.2.11.2 WPA2-CCMP (802.11i) Encryption
WPA2 is a newer 802.11i standard that provides even stronger wireless security than
Wi-Fi Protected
Access
(WPA) and WEP.
Counter-mode/CBC-MAC Protocol (CCMP)
is the security standard used by
the
Advanced Encryption Standard (AES).
AES serves the same function TKIP does for WPA-TKIP.
CCMP computes a
Message Integrity Check (MIC)
using the proven
Cipher Block Message
Summary of Contents for AP-7131N-FGR
Page 1: ...AP 7131N FGR Access Point Product Reference Guide ...
Page 3: ...AP 7131N FGR Access Point Product Reference Guide 72E 126727 01 Revision A September 2009 ...
Page 4: ......
Page 55: ...Hardware Installation 2 11 ...
Page 68: ...AP 7131N FGR Access Point Product Reference Guide 2 24 ...
Page 90: ...AP 7131N FGR Access Point Product Reference Guide 3 22 ...
Page 148: ...AP 7131N FGR Access Point Product Reference Guide 4 58 ...
Page 300: ...AP 7131N FGR Access Point Product Reference Guide 6 72 ...
Page 338: ...AP 7131N FGR Access Point Product Reference Guide 7 38 ...
Page 635: ...Configuring Mesh Networking 9 23 5 Define a channel of operation for the 802 11a n radio ...
Page 648: ...AP 7131N FGR Access Point Product Reference Guide 9 36 ...
Page 672: ...AP 7131N FGR Access Point Product Reference Guide 10 24 line con 0 line vty 0 24 end ...
Page 692: ...AP 7131N FGR Access Point Product Reference Guide B 14 ...
Page 698: ...AP 7131N FGR Access Point Product Reference Guide B 20 ...
Page 702: ...AP 7131N FGR Access Point Product Reference Guide C 4 ...
Page 707: ......