Datasheet
AP-5131 Introduction
1-5
WMM defines four access categories (voice, video, best effort and background) to prioritize traffic to
provide enhanced multimedia support. For information on configuring QoS support for the AP-5131,
see Setting the WLAN Quality of Service (QoS) Policy on page 5-31.
1.1.8 Industry Leading Data Security
The AP-5131 supports numerous encryption and authentication techniques to protect the data
transmitting on the WLAN.
The following authentication techniques are supported on the AP-5131:
• Kerberos Authentication
• EAP Authentication
The following encryption techniques are supported on the AP-5131:
• WEP Encryption
• KeyGuard Encryption
• Wi-Fi Protected Access (WPA) Using TKIP Encryption
• WPA2-CCMP (802.11i) Encryption
In addition, the AP-5131 supports the following additional security features:
• Firewall Security
• VPN Tunnels
• Content Filtering
For an overview on the encryption and authentication schemes available on the AP-5131, refer to
Configuring Access Point Security on page 6-1.
1.1.8.1 Kerberos Authentication
Authentication is a means of verifying information that is transmitted from a secure source. If
information is authentic, you know who created it and you know that it has not been altered in any
way since it was originated. Authentication entails a network administrator employing a software
“supplicant” on their computer or wireless device.
Authentication is critical for the security of any wireless LAN device. Traditional authentication
methods are not suitable for use in wireless networks where an unauthorized user can monitor
network traffic and intercept passwords. The use of strong authentication methods that do not
disclose passwords is necessary. Symbol uses the Kerberos authentication service protocol (specified