Specifications

Configuring Access Point Security
Altitude 3500 Series Access Point Product Reference Guide
174
6 Click Apply to keep changes made within the New Security Policy screen (if any).
Configure encryption or authentication supported security policies by referring to the following:
Altitude 35xx authentication:
To create a security policy supporting Kerberos, see, “Configuring Kerberos Authentication” on
page 174.
To define a security policy supporting 802.1x EAP, see “Configuring 802.1x EAP Authentication”
on page 176.
Altitude 35xx encryption:
To create a security policy supporting WEP, see “Configuring WEP Encryption” on page 179.
To define a security policy supporting KeyGuard, see, “Configuring KeyGuard Encryption” on
page 181.
To configure a security policy supporting WPA/TKIP, see “Configuring WPA/WPA2 Using
TKIP” on page 183.
To create a security policy supporting WPA2/CCMP, see “Configuring WPA2-CCMP (802.11i)” on
page 185.
7 Click Cancel to return to the target WLAN screen without keeping any of the changes made within
the New Security Policy screen.
Configuring Kerberos Authentication
Kerberos (designed and developed by MIT) provides strong authentication for client/server
applications using secret-key cryptography. Using Kerberos, a client must prove its identity to a server
(and vice versa) across an insecure network connection.
Once a client and server use Kerberos to prove their identity, they can encrypt all communications to
assure privacy and data integrity. Kerberos can only be used on the access point with Motorola 802.11b
clients.
CAUTION
Kerberos makes no provisions for host security. Kerberos assumes that it is running on a trusted host with
an untrusted network. If host security is compromised, Kerberos is compromised as well
Kerberos uses the Network Time Protocol (NTP) for synchronizing the clocks of its Key Distribution Center
(KDC) server(s). Use the NTP Servers screen to specify the IP addresses and ports of available NTP
WPA/WPA2 TKIP Select the WPA/WPA2 TKIP button to display the WPA/
TKIP Settings field within the New Security Policy screen.
For specific information on configuring WPA/WPA2 TKIP,
see “Configuring WPA/WPA2 Using TKIP” on page 183.
WPA2/CCMP
(802.11i)
Select the WPA2/CCMP (802.11) button to display the
WPA2/CCMP Settings field within the New Security Policy
screen. For detailed information on configuring WPA2/
CCMP, see “Configuring WPA2-CCMP (802.11i)” on
page 185.