Network Setup
4-29
7. Refer to the
Authentication
field to select amongst the following options:
8. Refer to the
Encryption
field to select amongst the following options:
802.1X EAP
A Radius server is used to authenticate users. For detailed information on
configuring EAP for the WLAN, see
Configuring 802.1x EAP on page 4-33
.
Kerberos
A Kerberos server is used to authenticate users. For detailed information on
configuring Kerberos for the WLAN, see
Configuring Kerberos on page 4-34
.
Hotspot
A Hotspot is used to authenticate users in a unique network segment (hotspot).
The attributes of both the hotspot and the Radius Server are required. For more
information, see
Configuring Hotspots on page 4-35
.
MAC Authentication
The switch uses a Radius server to see if a target MAC address is allowed on the
network. The attributes of the Radius Server are required. For more information,
see
Configuring MAC Authentication on page 4-46
No Authentication
When selected, no Authentication is used and transmissions are made (in the
open) without security unless an encryption scheme is used. This setting is not
recommended when data protection is important.
WEP 64
Use the WEP 64 checkbox to enable the
Wired Equivalent Privacy
(WEP) protocol
with a 40-bit key. WEP is available in two encryption modes: 40 bit (also called
WEP 64) and 104 bit (also called WEP 128). The 104-bit encryption mode provides
a longer algorithm that takes longer to decode than that of the 40-bit encryption
mode. For detailed information on configuring WEP 64 for the WLAN, see
Configuring WEP 64 on page 4-54
.
WEP 128
Use the WEP 128 checkbox to enable the
Wired Equivalent Privacy
(WEP) protocol
with a 104-bit key. WEP is available in two encryption modes: WEP 64 (using a 40-
bit key) and WEP 128 (using a 104-bit key). WEP 128 encryption mode provides a
longer algorithm that takes longer to decode than that of the WEP 64 encryption
mode. For detailed information on configuring WEP 128 for the WLAN, see
Configuring WEP 128 / KeyGuard on page 4-55
.
KeyGuard
Uses a Motorola proprietary encryption mechanism to protect data. For detailed
information on configuring KeyGuard for the WLAN, see
Configuring WEP 128 / KeyGuard on page 4-55
.
WPA-WPA2-TKIP
Use the WPA-TKIP checkbox to enable
Wi-Fi Protected Access
(WPA) with
Temporal Key Integrity Protocol
(TKIP). For detailed information on configuring
TKIP for the WLAN, see
Configuring WPA/WPA2 using TKIP and CCMP on page 4-57
.
WPA2-CCMP
WPA2 is a newer 802.11i standard that provides even stronger wireless security
than Wi-Fi Protected Access (WPA) and WEP. CCMP is the security standard used
by the
Advanced Encryption Standard
(AES). AES serves the same function TKIP
does for WPA-TKIP. CCMP computes a
Message Integrity Check
(MIC) using the
proven
Cipher Block Chaining (
CBC) technique. Changing just one bit in a message
produces a totally different result. For detailed information on configuring CCMP
for the WLAN, see
Configuring WPA/WPA2 using TKIP and CCMP on page 4-57
.
Содержание RFS Series
Страница 1: ...M Motorola RFS Series Wireless LAN Switches WiNG System Reference Guide ...
Страница 10: ...TOC 8 Motorola RF Switch System Reference Guide ...
Страница 56: ...2 8 Motorola RF Switch System Reference ...
Страница 334: ...5 52 Motorola RF Switch System Reference 2 Select the MU Status tab ...
Страница 510: ...7 32 Motorola RF Switch System Reference Guide ...
Страница 534: ...8 24 Motorola RF Switch System Reference Guide ...
Страница 570: ...C 14 Motorola RF Switch System Reference Guide ...
Страница 589: ......
Страница 590: ...MOTOROLA INC 1303 E ALGONQUIN ROAD SCHAUMBURG IL 60196 http www motorola com 72E 132942 01 Revision C December 2010 ...