7: Networking
EMG™ Edge Management Gateway User Guide
105
WPA/WPA2 Security
Parameters
If WPA2/WPA Mixed Mode security suite is selected, these
authentication parameters can be selected and configured:
Authentication:
Select
PSK
for a connection where the same key
must be configured on both on the EMG side and on the access point
side, or
IEEE 802.1X
for a connection that is authenticated with a
RADIUS server that is part of the network. The RADIUS server
matches the credentials sent by the EMG with an internal database. If
IEEE 802.1X is selected under authentication type, see the IEEE
802.1X Parameters below for configuring WPA2 enterprise
authentication.
Key Type:
For WPA/WPA2 PSK authentication, select the type of key
required for the WLAN network: Passphrase for an ASCII password, or
Hex for a 64 character hexadecimal key.
Passphrase / Retype Passphrase:
For WPA/WPA2 PSK
authentication with Passphrase, enter the passphrase required to
authenticate the connection. The minimum length of passphrase is 8
characters and the maximum length is 63 characters. All printable
characters may be used in the passphrase.
Key:
For WPA/WPA2 PSK authentication with Hex keys, enter the
hexadecimal key. The key should be exactly 64 hexadecimal
characters. The Show Keys checkbox can be used to display the
masked key.
Encryption:
For WPA/WPA2 PSK authentication, select the type of
encryption - CCMP (preferred), TKIP or Any.
IEEE 802.1X Parameters
802.1X uses enterprise class authentication to grant access to secure
networks. There are 3 components to 802.1X:
A supplicant, or client, which requires authentication (the EMG).
An authenticator, or access point, which acts as a proxy for the
client, and restricts the client's communication with the
authentication server.
An authentication server (usually RADIUS), which decides whether
to accept the client's request for network access.
If
IEEE 802.1X
is selected for Authentication, these parameters can be
selected and configured:
IEEE 802.1X EAP Protocol:
Select one of the following Extensible
Authentication Protocol (EAP) protocols to use for authentication with
the RADIUS server. With EAP, the keys used for authentication are
negotiated and changed automatically, offering a greater level of
security over PSK authentication where the keys are stored on the
device on each side of a connection.
LEAP:
Lightweight Extensible Authentication Protocol (LEAP) uses
dynamic WEP keys and mutual authentication with a modified version
of MS-CHAP between the EMG and a RADIUS server.
EAP-TLS:
uses TLS and Public key Infrastructure (PKI) to set up
authentication with a RADIUS server. This method requires the use of a
client-side certificate for communicating with the server.
EAP-TTLS:
uses TTLS (Tunneled Transport Layer Security) and
server-side certificates to set up authentication between the EMG and
a RADIUS server. The actual authentication is, however, performed
using passwords.
Содержание EMG 7500
Страница 1: ...Part Number PMD 00008 Revision C April 2020 EMG Edge Management Gateway User Guide EMG 8500 EMG 7500 ...
Страница 82: ...7 Networking EMG Edge Management Gateway User Guide 82 Figure 7 2 Network Network Settings 2 of 2 ...
Страница 100: ...7 Networking EMG Edge Management Gateway User Guide 100 Figure 7 5 Network Wireless Settings ...
Страница 353: ...15 Maintenance EMG Edge Management Gateway User Guide 353 Figure 15 12 About EMG ...
Страница 474: ...EMG Edge Management Gateway User Guide 474 Figure E 3 EU Declaration of Conformity ...
Страница 475: ...EMG Edge Management Gateway User Guide 475 Figure E 4 EU Declaration of Conformity continued ...