![Xirrus Wi-Fi Array XS-3900 User Manual Download Page 71](http://html1.mh-extra.com/html/xirrus/wi-fi-array-xs-3900/wi-fi-array-xs-3900_user-manual_3445877071.webp)
Wireless LAN Array
36
Installing the Xirrus Array
z
Wi-Fi Protected Access with AES
This is government-grade encryption—available on most new client
adapters—and uses the AES–CCM encryption mode (Advanced
Encryption Standard–Counter Mode).
Authentication
Authentication ensures users are who they say they are, and occurs when users
attempt to join the wireless network and periodically there after. The following
authentication methods are available with the XS-3900:
z
RADIUS 802.1x
802.1x uses a remote RADIUS server to authenticate large numbers of
clients, and can handle different authentication methods (EAP-TLS, EAP-
TTLS EAP-PEAP).
z
Xirrus internal RADIUS server
Includes all the core functionality of a full RADIUS server built into the
Xirrus Array. Recommended for smaller numbers of users (about 100 or
less).
z
Pre-Shared Key
Uses a pass-phrase or key that is manually distributed to all authorized
users. The same passphrase is given to client devices and entered into
each Array.
z
MAC Access Control Lists (ACLs)
MAC access control lists provide a list of client adapter MAC addresses
that are allowed or denied access to the wireless network, and can be
used in addition to any of the above authentication methods. ACLs are
good for embedded devices, like printers and bar-code scanners (though
MAC addresses can be spoofed). The Xirrus Array supports 512 ACL
entries.