![Motorola WiNG 5.4.2 System Reference Manual Download Page 367](http://html.mh-extra.com/html/motorola/wing-5-4-2/wing-5-4-2_system-reference-manual_247436367.webp)
6 - 11
somewhat poor as a standalone data protection technique, as MAC addresses can be easily spoofed by hackers who can mimic
a trusted device within the network.
MAC authentication is enabled per WLAN, augmented with the use of a RADIUS server to authenticate each device. A device’s
MAC address can be authenticated against an access point’s local RADIUS server (if supported) or centrally (from a datacenter).
For RADIUS server compatibility, the format of the MAC address can be forwarded to the RADIUS server in non-delimited and
or delimited formats:
To configure MAC authentication on a WLAN:
1. Select the
Configuration
tab from the Web UI.
2. Select
Wireless.
3. Select
Wireless LANs
to display a high level display of existing WLANs.
4. Select the
Add
button to create an additional WLAN, or select an existing WLAN and
Edit
to modify its security properties.
5. Select
Security
.
6. Select
MAC
as the Authentication Type.
Selecting MAC enables the radio buttons for the
Open
,
WEP 64
,
WEP 128
,
WPA/WPA2-TKIP
,
WPA2-CCMP
and
Keyguard
encryption options as additional measures for the WLAN.
7. Either select an existing AAA Policy from the drop-down menu or select the
Create
icon to the right of the AAA Policy
parameter to display a screen where new AAA policies can be created. A default AAA policy is also available if configuring
a WLAN for the first time and there’s no existing policies. Select the
Edit
icon to modify the configuration of a selected
AAA policy.
Authentication, Authorization, and Accounting
(AAA) is a framework for intelligently controlling access to the wireless
client managed network, enforcing user authorization policies and auditing and tracking usage. These combined processes
are central for securing wireless client resources and wireless network data flows. For information on defining a new AAA
policy, see
AAA Policy on page 6-67
.
8. Select the
Reauthentication
radio button to force MAC supported clients to reauthenticate. Use the spinner control set
the number of minutes (from 30 - 86,400) that, once exceeded, forces the EAP supported client to reauthenticate.
9. Select
OK
when completed to update the WLAN’s MAC configuration. Select
Reset
to revert the screen back to the last
saved configuration.
MAC Authentication Deployment Considerations
MAC Authentication
Before defining a MAC authentication configuration on a WLAN, refer to the following deployment guidelines to ensure the
configuration is optimally effective:
• MAC authentication can only be used to identify end-user devices, not the users themselves.
• MAC authentication is somewhat poor as a standalone data protection technique, as MAC addresses can be easily spoofed
by hackers who can provision a MAC address on their device to mimic a trusted device.
Summary of Contents for WiNG 5.4.2
Page 1: ...Motorola Solutions WiNG 5 4 2 ACCESS POINT SYSTEM REFERENCE GUIDE ...
Page 2: ......
Page 20: ...xvi WiNG 5 4 2 Access Point System Reference Guide ...
Page 24: ...1 4 WiNG 5 4 2 Access Point System Reference Guide ...
Page 36: ...2 12 WiNG 5 4 2 Access Point System Reference Guide ...
Page 54: ...3 18 WiNG 5 4 2 Access Point System Reference Guide ...
Page 358: ...6 2 WiNG 5 4 2 Access Point System Reference Guide Figure 6 1 Configuration Wireless menu ...
Page 462: ...6 106 WiNG 5 4 2 Access Point System Reference Guide ...
Page 474: ...7 12 WiNG 5 4 2 Access Point System Reference Guide ...
Page 509: ...9 5 Figure 9 2 Captive Portal Policy screen Basic Configuration tab ...
Page 572: ...11 12 WiNG 5 4 2 Access Point System Reference Guide ...
Page 626: ...12 54 WiNG 5 4 2 Access Point System Reference Guide ...
Page 790: ...A 2 WiNG 5 4 2 Access Point System Reference Guide ...
Page 835: ......