Network Setup 4 - 35
6. Refer to the
Status
field for the current state of the requests made from applet. This field displays error messages if
something goes wrong in the transaction between the applet and the switch.
7. Click
OK
to use the changes to the running configuration and close the dialog.
8. Click
Cancel
to close the dialog without committing updates to the running configuration.
Configuring Kerberos
Kerberos (designed and developed by MIT) provides strong authentication for client/server applications using secret-key
cryptography. Using Kerberos, an MU must prove its identity to a server (and vice versa) across an insecure network
connection. Once an MU and server prove their identity, they can encrypt all communications to assure privacy and data
integrity. Kerberos can only be used with Motorola
Solutions
clients.
To configure a Kerberos authentication scheme for a WLAN:
1. Select
Network
>
Wireless LANs
from the main menu tree.
2. Select an existing WLAN from those displayed within the
Configuration
tab.
3. Click the
Edit
button.
A WLAN screen displays with the WLAN’s existing configuration. Refer to the
Authentication
and
Encryption
columns to assess the WLAN’s existing security configuration.
4. Select the
Kerberos
button from within the
Authentication
field.
5. Click the
Config...
button to the right of the Kerberos checkbox. The
Kerberos
screen displays.
MU Timeout
Define the time (between 1- 60 seconds) for the switch’s retransmission of EAP-Request
packets. The default is 5 seconds.
MU Max Retries
Specify the maximum number of times the switch retransmits an EAP-Request frame to the
client before it times out the authentication session. The default is 3 retries, with a maximum
of 100 supported.
CAUTION:
Kerberos makes no provisions for host security. Kerberos assumes that it is
running on a trusted host with an untrusted network. If host security is compromised,
Kerberos is compromised as well.
NOTE:
Kerberos requires at least one encryption scheme be enabled (WEP 128 or other).
If neither WEP 128 or KeyGuard is enabled, WEP 128 will automatically be enabled for
use with Kerberos.
!
Содержание WiNG 4.4
Страница 1: ...Motorola Solutions WiNG 4 4 SYSTEM REFERENCE GUIDE ...
Страница 2: ......
Страница 3: ...MOTOROLA SOLUTIONS WING 4 4 SYSTEM REFERENCE GUIDE 72E 157062 01 Revision A January 2012 ...
Страница 6: ...iv WiNG 4 4 Switch System Reference Guide ...
Страница 14: ...xii WiNG 4 4 Switch System Reference Guide ...
Страница 48: ...1 32 WiNG 4 4 Switch System Reference Guide ...
Страница 58: ...2 10 WiNG 4 4 Switch System Reference Guide ...
Страница 117: ...Network Setup 4 13 7 Click Cancel to close the dialog without committing updates to the running configuration ...
Страница 280: ...4 176 WiNG 4 4 Switch System Reference Guide ...
Страница 352: ...5 72 WiNG 4 4 Switch System Reference Guide ...
Страница 476: ...6 124 WiNG 4 4 Switch System Reference Guide ...
Страница 506: ...7 30 WiNG 4 4 Switch System Reference Guide ...
Страница 532: ...8 26 WiNG 4 4 Switch System Reference Guide ...
Страница 536: ...A 4 WiNG 4 4 Switch System Reference Guide ...
Страница 544: ...B 12 WiNG 4 4 Switch System Reference Guide ...
Страница 558: ...B 26 WiNG 4 4 Switch System Reference Guide ...
Страница 574: ...C 16 WiNG 4 4 Switch System Reference Guide ...
Страница 596: ...E 4 WiNG 4 4 Switch System Reference Guide ...
Страница 597: ......