Overview 1 - 19
WPA
WPA is designed for use with an 802.1X authentication server, which distributes different keys to each user. However, it
can also be used in a less secure
pre-shared key
(PSK) mode, where every user is given the same passphrase.
WPA uses
Temporal Key Integrity Protocol
(TKIP), which dynamically changes keys as the system is used. When combined
with the much larger Initialization Vector, it defeats well-known key recovery attacks on WEP. For information on
configuring WPA for a WLAN, see
Configuring WPA/WPA2 using TKIP and CCMP on page 4-56
.
WPA2
WPA2 uses a sophisticated key hierarchy that generates new encryption keys each time a MU associates with an Access
Point. Protocols including 802.1X, EAP and Radius are used for strong authentication. WPA2 also supports the TKIP and
AES-CCMP encryption protocols. For information on configuring WPA for a WLAN, see
Configuring WPA/WPA2 using TKIP
and CCMP on page 4-56
.
Keyguard-WEP
KeyGuard is Motorola Solutions’ proprietary dynamic WEP solution. Motorola Solutions (upon hearing of the
vulnerabilities of WEP) developed a non standard method of rotating keys to prevent compromises. Basically, KeyGuard is
TKIP without the message integrity check. KeyGuard is proprietary to Motorola Solutions MUs only. For information on
configuring KeyGuard for a WLAN, see
Configuring WEP 128 / KeyGuard on page 4-54
.
1.2.5.2 MU Authentication
The switch uses the following authentication schemes for MU association:
•
Kerberos
•
802.1x EAP
•
MAC ACL
Refer to
Editing the WLAN Configuration on page 4-27
for additional information.
Kerberos
Kerberos allows for mutual authentication and end-to-end encryption. All traffic is encrypted and security keys are
generated on a per-client basis. Keys are never shared or reused, and are automatically distributed in a secure manner. For
information on configuring Kerberos for a WLAN, see
Configuring Kerberos on page 4-35
.
802.1x EAP
802.1x EAP is the most secure authentication mechanism for wireless networks and includes
EAP-TLS, EAP-TTLS and PEAP. The switch is a proxy for Radius packets. An MU does a full 802.11 authentication and
association and begins transferring data frames. The switch realizes the MU needs to authenticate with a Radius server
and denies any traffic not Radius related. Once Radius completes its authentication process, the MU is allowed to send
other data traffic. You can use either an onboard Radius server or internal Radius Server for authentication. For information
on configuring 802.1x EAP for a WLAN, see
Configuring 802.1x EAP on page 4-34
.
MAC ACL
The MAC ACL feature is basically a dynamic MAC ACL where MUs are allowed/denied access to the network based on
their configuration on the Radius server. The switch allows 802.11 authentication and association, then checks with the
Radius server to see if the MAC address is allowed on the network. The Radius packet uses the MAC address of the MU
as both the username and password (this configuration is also expected on the Radius server). MAC-Auth supports all
encryption types, and (in case of 802.11i) the handshake is completed before the Radius lookup begins. For information on
configuring 802.1x EAP for a WLAN, see
Configuring MAC Authentication on page 4-46
.
Summary of Contents for WiNG 4.4
Page 1: ...Motorola Solutions WiNG 4 4 SYSTEM REFERENCE GUIDE ...
Page 2: ......
Page 3: ...MOTOROLA SOLUTIONS WING 4 4 SYSTEM REFERENCE GUIDE 72E 157062 01 Revision A January 2012 ...
Page 6: ...iv WiNG 4 4 Switch System Reference Guide ...
Page 14: ...xii WiNG 4 4 Switch System Reference Guide ...
Page 48: ...1 32 WiNG 4 4 Switch System Reference Guide ...
Page 58: ...2 10 WiNG 4 4 Switch System Reference Guide ...
Page 280: ...4 176 WiNG 4 4 Switch System Reference Guide ...
Page 352: ...5 72 WiNG 4 4 Switch System Reference Guide ...
Page 476: ...6 124 WiNG 4 4 Switch System Reference Guide ...
Page 506: ...7 30 WiNG 4 4 Switch System Reference Guide ...
Page 532: ...8 26 WiNG 4 4 Switch System Reference Guide ...
Page 536: ...A 4 WiNG 4 4 Switch System Reference Guide ...
Page 544: ...B 12 WiNG 4 4 Switch System Reference Guide ...
Page 558: ...B 26 WiNG 4 4 Switch System Reference Guide ...
Page 574: ...C 16 WiNG 4 4 Switch System Reference Guide ...
Page 596: ...E 4 WiNG 4 4 Switch System Reference Guide ...
Page 597: ......