4 - 30 WiNG 4.4 Switch System Reference Guide
7. Refer to the
Authentication
field to select amongst the following options:
8. Refer to the
Encryption
field to select amongst the following options:
802.1X EAP
A Radius server is used to authenticate users. For detailed information on configuring
EAP for the WLAN, see
Configuring 802.1x EAP on page 4-34
.
Kerberos
A Kerberos server is used to authenticate users. For detailed information on
configuring Kerberos for the WLAN, see
Configuring Kerberos on page 4-35
.
Hotspot
A Hotspot is used to authenticate users in a unique network segment (hotspot). The
attributes of both the hotspot and the Radius Server are required. For more
information, see
Configuring Hotspots on page 4-36
.
MAC Authentication
The switch uses a Radius server to see if a target MAC address is allowed on the
network. The attributes of the Radius Server are required. For more information, see
Configuring MAC Authentication on page 4-46
No Authentication
When selected, no Authentication is used and transmissions are made (in the open)
without security unless an encryption scheme is used. This setting is not
recommended when data protection is important.
WEP 64
Use the WEP 64 checkbox to enable the
Wired Equivalent Privacy
(WEP) protocol with a
40-bit key. WEP is available in two encryption modes: 40 bit (also called WEP 64) and
104 bit (also called WEP 128). The 104-bit encryption mode provides a longer algorithm
that takes longer to decode than that of the 40-bit encryption mode. For detailed
information on configuring WEP 64 for the WLAN, see
Configuring WEP 64 on page 4-53
.
WEP 128
Use the WEP 128 checkbox to enable the
Wired Equivalent Privacy
(WEP) protocol with
a 104-bit key. WEP is available in two encryption modes: WEP 64 (using a 40-bit key) and
WEP 128 (using a 104-bit key). WEP 128 encryption mode provides a longer algorithm
that takes longer to decode than that of the WEP 64 encryption mode. For detailed
information on configuring WEP 128 for the WLAN, see
Configuring WEP 128 / KeyGuard
on page 4-54
.
KeyGuard
Uses a Motorola Solutions proprietary encryption mechanism to protect data. For
detailed information on configuring KeyGuard for the WLAN, see
Configuring WEP 128 / KeyGuard on page 4-54
.
WPA-WPA2-TKIP
Use the WPA-TKIP checkbox to enable
Wi-Fi Protected Access
(WPA) with
Temporal Key
Integrity Protocol
(TKIP). For detailed information on configuring TKIP for the WLAN, see
Configuring WPA/WPA2 using TKIP and CCMP on page 4-56
.
WPA2-CCMP
WPA2 is a newer 802.11i standard that provides even stronger wireless security than
Wi-Fi Protected Access (WPA) and WEP. CCMP is the security standard used by the
Advanced Encryption Standard
(AES). AES serves the same function TKIP does for WPA-
TKIP. CCMP computes a
Message Integrity Check
(MIC) using the proven
Cipher Block
Chaining (
CBC) technique. Changing just one bit in a message produces a totally different
result. For detailed information on configuring CCMP for the WLAN, see
Configuring
WPA/WPA2 using TKIP and CCMP on page 4-56
.
Summary of Contents for WiNG 4.4
Page 1: ...Motorola Solutions WiNG 4 4 SYSTEM REFERENCE GUIDE ...
Page 2: ......
Page 3: ...MOTOROLA SOLUTIONS WING 4 4 SYSTEM REFERENCE GUIDE 72E 157062 01 Revision A January 2012 ...
Page 6: ...iv WiNG 4 4 Switch System Reference Guide ...
Page 14: ...xii WiNG 4 4 Switch System Reference Guide ...
Page 48: ...1 32 WiNG 4 4 Switch System Reference Guide ...
Page 58: ...2 10 WiNG 4 4 Switch System Reference Guide ...
Page 280: ...4 176 WiNG 4 4 Switch System Reference Guide ...
Page 352: ...5 72 WiNG 4 4 Switch System Reference Guide ...
Page 476: ...6 124 WiNG 4 4 Switch System Reference Guide ...
Page 506: ...7 30 WiNG 4 4 Switch System Reference Guide ...
Page 532: ...8 26 WiNG 4 4 Switch System Reference Guide ...
Page 536: ...A 4 WiNG 4 4 Switch System Reference Guide ...
Page 544: ...B 12 WiNG 4 4 Switch System Reference Guide ...
Page 558: ...B 26 WiNG 4 4 Switch System Reference Guide ...
Page 574: ...C 16 WiNG 4 4 Switch System Reference Guide ...
Page 596: ...E 4 WiNG 4 4 Switch System Reference Guide ...
Page 597: ......