Wi-Fi Array
70
Installing the Wi-Fi Array
Security Planning
This section offers some useful guidelines for defining your preferred encryption
and authentication method. For additional information, see
“Understanding
Security” on page 210
and the
Security
section of
“Frequently Asked Questions”
on page 398
.
Wireless Encryption
Encryption ensures that no user can decipher another user’s data transmitted
over the airwaves. There are three encryption options available to you, including:
z
WEP-40bit or WEP-128bit
Because WEP is vulnerable to cracks, we recommend that you only use
this for legacy devices that cannot support a stronger encryption type.
z
Wi-Fi Protected Access (WPA)
This is much more secure than WEP and uses TKIP for encryption.
z
Wi-Fi Protected Access (WPA2) with AES
This is government-grade encryption—available on most new client
adapters—and uses the AES–CCM encryption mode (Advanced
Encryption Standard–Counter Mode).
Authentication
Authentication ensures users are who they say they are, and occurs when users
attempt to join the wireless network and periodically thereafter. The following
authentication methods are available with the Wi-Fi Array:
z
RADIUS 802.1x
802.1x uses a remote RADIUS server to authenticate large numbers of
clients, and can handle different authentication methods (EAP-TLS, EAP-
TTLS, EAP-PEAP, and EAP-LEAP Passthrough). Administrators may
also be authenticated via RADIUS when preferred, or to meet particular
security standards.
z
Xirrus Internal RADIUS server
Recommended for smaller numbers of users (about 100 or less). Supports
EAP-PEAP only
Summary of Contents for Wi-Fi Array XS-3500
Page 1: ...October 28 2009 ...
Page 2: ......
Page 15: ...Wi Fi Array Table of Contents xi Glossary of Terms 455 Index 467 ...
Page 16: ...Wi Fi Array xii Table of Contents ...
Page 140: ...Wi Fi Array 118 Installing the Wi Fi Array ...
Page 196: ...Wi Fi Array 174 Viewing Status on the Wi Fi Array ...