Industry Leading Data Security; Kerberos Authentication - Motorola AP-7131 Product Reference Manual

Access point
Hide thumbs Also See for AP-7131:
Table of Contents

Advertisement

For detailed information on configuring QoS support, see
Policy on page
5-41.

1.1.12 Industry Leading Data Security

The access point supports numerous encryption and authentication techniques to protect the data
transmitting on the WLAN.
The following authentication techniques are supported:

Kerberos Authentication

EAP Authentication
The following encryption techniques are supported:
WEP Encryption
KeyGuard Encryption
Wi-Fi Protected Access (WPA) Using TKIP Encryption
WPA2-CCMP (802.11i) Encryption
In addition, the access point supports the following additional security features:
Firewall Security
VPN Tunnels
Content Filtering
For an overview on the encryption and authentication schemes available , refer to
Point Security on page
1.1.12.1 Kerberos Authentication
Authentication is a means of verifying information transmitted from a secure source. If information is
authentic, you know who created it and you know it has not been altered in any way since it was
originated. Authentication entails a network administrator employing a software "supplicant" on
their computer or wireless device.
Authentication is critical for the security of any wireless LAN device. Traditional authentication
methods are not suitable for use in wireless networks where an unauthorized user can monitor
network traffic and intercept passwords. The use of strong authentication methods that do not
disclose passwords is necessary. The access point uses the Kerberos authentication service protocol
6-1.
Setting the WLAN Quality of Service (QoS)
1-7
Introduction
Configuring Access

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents