Wireless Array
Installing the Wireless Array
45
Security Planning
This section offers some useful guidelines for defining your preferred encryption
and authentication method. For additional information, see
“Understanding
Security” on page 191
and the
Security
section of
“Frequently Asked Questions”
on page 412
.
Wireless Encryption
Encryption ensures that no user can decipher another user’s data transmitted
over the airwaves. There are three encryption options available to you, including:
WEP-40bit or WEP-128bit
Because WEP is vulnerable to cracks, we recommend that you only use
this for legacy devices that cannot support a stronger encryption type.
Wi-Fi Protected Access (WPA)
This is much more secure than WEP and uses TKIP for encryption.
Wi-Fi Protected Access (WPA2) with AES
This is government-grade encryption — available on most new client
adapters
—
and uses the AES–CCM encryption mode (Advanced
Encryption Standard–Counter Mode).
Authentication
Authentication ensures users are who they say they are, and occurs when users
attempt to join the wireless network and periodically thereafter. The following
authentication methods are available with the Wireless Array:
RADIUS 802.1x
802.1x uses a remote RADIUS server to authenticate large numbers of
clients, and can handle different authentication methods (EAP-TLS, EAP-
TTLS, EAP-PEAP, and EAP-LEAP Passthrough). Administrators may
Note that several advanced features in this section are part of the
Xirrus
Advanced RF Security Manager (RSM)
. They require the license installed
on the Array to include support for RSM. Please see
“About Licensing and
Upgrades” on page 321
.
Содержание Wi-Fi Array XR4420
Страница 2: ......
Страница 165: ...Wireless Array Viewing Status on the Wireless Array 145 Use this Space for Your Notes ...
Страница 166: ...Wireless Array 146 Viewing Status on the Wireless Array ...