EasyManuals Logo

Motorola AP-51XX User Manual

Motorola AP-51XX
698 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #24 background imageLoading...
Page #24 background image
AP-51xx Access Point Product Reference Guide
1-8
Kerberos Authentication
EAP Authentication
The following encryption techniques are supported:
WEP Encryption
KeyGuard Encryption
Wi-Fi Protected Access (WPA) Using TKIP Encryption
WPA2-CCMP (802.11i) Encryption
In addition, the access point supports the following additional security features:
Firewall Security
VPN Tunnels
Content Filtering
For an overview on the encryption and authentication schemes available , refer to Configuring Access
Point Security on page 6-1.
1.2.8.1 Kerberos Authentication
Authentication is a means of verifying information transmitted from a secure source. If information is
authentic, you know who created it and you know it has not been altered in any way since originated.
Authentication entails a network administrator employing a software “supplicant” on their computer
or wireless device.
Authentication is critical for the security of any wireless LAN device. Traditional authentication
methods are not suitable for use in wireless networks where an unauthorized user can monitor
network traffic and intercept passwords. The use of strong authentication methods that do not
disclose passwords is necessary. The access point uses the Kerberos authentication service protocol
(specified in RFC 1510) to authenticate users/clients in a wireless network environment and to
securely distribute the encryption keys used for both encrypting and decrypting.
A basic understanding of RFC 1510 Kerberos Network Authentication Service (V5) is helpful in
understanding how Kerberos functions. By default, WLAN devices operate in an open system network
where any wireless device can associate with an AP without authorization. Kerberos requires device
authentication before access to the wired network is permitted.
For detailed information on Kerbeors configurations, see Configuring Kerberos Authentication on
page 6-8.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Motorola AP-51XX and is the answer not in the manual?

Motorola AP-51XX Specifications

General IconGeneral
BrandMotorola
ModelAP-51XX
CategoryWireless Access Point
LanguageEnglish

Related product manuals