Configuring Wlan Security Settings - Motorola WiNG 5.7.1 System Reference Manual

Table of Contents

Advertisement

6 - 8
WiNG 5.7.1 Access Point System Reference Guide

6.1.2 Configuring WLAN Security Settings

Wireless LANs
Assign WLANs unique security configurations supporting authentication, captive portal (hotspot), self registration or encryption
schemes as data protection requirements dictate.
Figure 6-4 WLAN Security screen
Authentication ensures only known and trusted users or devices access an access point managed WLAN. Authentication is
enabled per WLAN to verify the identity of both users and devices. Authentication is a challenge and response procedure for
validating user credentials such as user name, password and secret-key information.
A client must authenticate to an access point to receive resources from the network. 802.1x EAP, 802.1x EAP-PSK, MAC and
PSK/None authentication options are supported.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents