Network Setup 4 - 35
6. Refer to the
Status
field for the current state of the requests made from applet. This field displays error messages if
something goes wrong in the transaction between the applet and the switch.
7. Click
OK
to use the changes to the running configuration and close the dialog.
8. Click
Cancel
to close the dialog without committing updates to the running configuration.
Configuring Kerberos
Kerberos (designed and developed by MIT) provides strong authentication for client/server applications using secret-key
cryptography. Using Kerberos, an MU must prove its identity to a server (and vice versa) across an insecure network
connection. Once an MU and server prove their identity, they can encrypt all communications to assure privacy and data
integrity. Kerberos can only be used with Motorola
Solutions
clients.
To configure a Kerberos authentication scheme for a WLAN:
1. Select
Network
>
Wireless LANs
from the main menu tree.
2. Select an existing WLAN from those displayed within the
Configuration
tab.
3. Click the
Edit
button.
A WLAN screen displays with the WLAN’s existing configuration. Refer to the
Authentication
and
Encryption
columns to assess the WLAN’s existing security configuration.
4. Select the
Kerberos
button from within the
Authentication
field.
5. Click the
Config...
button to the right of the Kerberos checkbox. The
Kerberos
screen displays.
MU Timeout
Define the time (between 1- 60 seconds) for the switch’s retransmission of EAP-Request
packets. The default is 5 seconds.
MU Max Retries
Specify the maximum number of times the switch retransmits an EAP-Request frame to the
client before it times out the authentication session. The default is 3 retries, with a maximum
of 100 supported.
CAUTION:
Kerberos makes no provisions for host security. Kerberos assumes that it is
running on a trusted host with an untrusted network. If host security is compromised,
Kerberos is compromised as well.
NOTE:
Kerberos requires at least one encryption scheme be enabled (WEP 128 or other).
If neither WEP 128 or KeyGuard is enabled, WEP 128 will automatically be enabled for
use with Kerberos.
!
Summary of Contents for WiNG 4.4
Page 1: ...Motorola Solutions WiNG 4 4 SYSTEM REFERENCE GUIDE ...
Page 2: ......
Page 3: ...MOTOROLA SOLUTIONS WING 4 4 SYSTEM REFERENCE GUIDE 72E 157062 01 Revision A January 2012 ...
Page 6: ...iv WiNG 4 4 Switch System Reference Guide ...
Page 14: ...xii WiNG 4 4 Switch System Reference Guide ...
Page 48: ...1 32 WiNG 4 4 Switch System Reference Guide ...
Page 58: ...2 10 WiNG 4 4 Switch System Reference Guide ...
Page 280: ...4 176 WiNG 4 4 Switch System Reference Guide ...
Page 352: ...5 72 WiNG 4 4 Switch System Reference Guide ...
Page 476: ...6 124 WiNG 4 4 Switch System Reference Guide ...
Page 506: ...7 30 WiNG 4 4 Switch System Reference Guide ...
Page 532: ...8 26 WiNG 4 4 Switch System Reference Guide ...
Page 536: ...A 4 WiNG 4 4 Switch System Reference Guide ...
Page 544: ...B 12 WiNG 4 4 Switch System Reference Guide ...
Page 558: ...B 26 WiNG 4 4 Switch System Reference Guide ...
Page 574: ...C 16 WiNG 4 4 Switch System Reference Guide ...
Page 596: ...E 4 WiNG 4 4 Switch System Reference Guide ...
Page 597: ......