Installation guide
Network Setup
4-29
6. Refer to the Authentication field to select amongst the following options:
7. Refer to the Encryption field to select amongst the following options:
802.1X EAP A Radius server is used to authenticate users. For detailed
information on configuring EAP for the WLAN, see
Configuring 802.1x EAP on page 4-33.
Kerberos A Kerberos server is used to authenticate users. For detailed
information on configuring Kerberos for the WLAN, see
Configuring Kerboros on page 4-34.
Hotspot A Hotspot is used to authenticate users in a unique network
segment (hotspot). The attributes of both the hotspot and the
Radius Server are required. For more information, see Configuring
Hotspots on page 4-35.
MAC Authentication The switch uses a Radius server to determine if a target MAC
address is allowed on the network. The attributes of the Radius
Server are required to implement MAC Authentication. For more
information, see Configuring MAC Authentication on page 4-43
No Authentication When selected, no Authentication is used and transmissions are
made (in the open) without security unless an encryption scheme is
used. This setting is not recommended when data protection is
important.
WEP 64 Use the WEP 64 checkbox to enable the Wired Equivalent Privacy
(WEP) protocol with a 40-bit key. WEP is available in two
encryption modes: 40 bit (also called WEP 64) and 104 bit (also
called WEP 128). The 104-bit encryption mode provides a longer
algorithm that takes longer to decode than the 40-bit encryption
mode. For detailed information on configuring WEP 64 for the
WLAN, see Configuring WEP 64 on page 4-50.
WEP 128 Use the WEP 128 checkbox to enable the Wired Equivalent Privacy
(WEP) protocol with a 104-bit key. WEP is available in two
encryption modes: WEP 64 (using a 40-bit key) and WEP 128 (using
a 104-bit key). WEP 128 encryption mode provides a longer
algorithm that takes longer to decode than the WEP 64 encryption
mode. For detailed information on configuring WEP 128 for the
WLAN, see Configuring WEP 128 / KeyGuard on page 4-51.
KeyGuard Uses a Motorola proprietary encryption mechanism to protect data.
For detailed information on configuring KeyGuard for the WLAN,
see Configuring WEP 128 / KeyGuard on page 4-51. Keyguard is
only available on legacy Motorola devices.
WPA-WPA2-TKIP Use the WPA-TKIP checkbox to enable Wi-Fi Protected Access
(WPA) with Temporal Key Integrity Protocol (TKIP). For detailed
information on configuring TKIP for the WLAN, see Configuring
WPA/WPA2 using TKIP and CCMP on page 4-52.