Brocade Communications Systems Mobility 7131 Series Service Manual Page 206

  • Download
  • Add to my manuals
  • Print
  • Page
    / 520
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 205
194 Brocade Mobility 7131 Access Point Product Reference Guide
53-1002517-01
6
6. Click Apply to keep changes made within the New Security Policy screen (if any).
Configure encryption or authentication supported security policies by referring to the
following:
Mobility 7131 Access Point authentication:
To create a security policy supporting Kerberos, see, Configuring Kerberos Authentication
on page 6-194.
To define a security policy supporting 802.1x EAP, see Configuring 802.1x EAP
Authentication on page 6-196.
Mobility 7131 Access Point encryption:
To create a security policy supporting WEP, see Configuring WEP Encryption on page
6-199.
To define a security policy supporting KeyGuard, see, Configuring KeyGuard Encryption on
page 6-201.
To configure a security policy supporting WPA/TKIP, see Configuring WPA/WPA2 Using
TKIP on page 6-203.
To create a security policy supporting WPA2/CCMP, see Configuring WPA2-CCMP (802.11i)
on page 6-205.
7. Cli ck Cancel to return to the target WLAN screen without keeping any of the changes made
within the New Security Policy screen.
Configuring Kerberos Authentication
Kerberos (designed and developed by MIT) provides strong authentication for client/server
applications using secret-key cryptography. Using Kerberos, a client must prove its identity to a
server (and vice versa) across an insecure network connection.
Once a client and server use Kerberos to prove their identity, they can encrypt all communications
to assure privacy and data integrity. Kerberos can only be used on the access point with Brocade
Mobility 802.11b clients.
CAUTION
Kerberos makes no provisions for host security. Kerberos assumes that it is running on a trusted
host with an untrusted network. If host security is compromised, Kerberos is compromised as
well
Kerberos uses the Network Time Protocol (NTP) for synchronizing the clocks of its Key Distribution
Center (KDC) server(s). Use the NTP Servers screen to specify the IP addresses and ports of
available NTP servers. Kerberos requires the Enable NTP on checkbox be selected for
authentication to function properly. See Configuring Network Time Protocol (NTP) on page 4-100 to
configure the NTP server.
NOTE
If 802.11a/n is selected as the radio used for a specific WLAN, the WLAN cannot use a Kerberos
supported security policy, as no Brocade Mobility
802.11a/n clients can support Kerberos.
Page view 205
1 2 ... 201 202 203 204 205 206 207 208 209 210 211 ... 519 520

Comments to this Manuals

No comments