Brocade Mobility 5181 Access Point Product Reference Guide Manual do Utilizador Página 21

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 428
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 20
Brocade Mobility 5181 Access Point Product Reference Guide 7
53-1002516-01
Feature overview
1
The following encryption techniques are supported:
WEP encryption
KeyGuard encryption
Wi-Fi protected access (WPA) using TKIP encryption
WPA2-CCMP (802.11i) encryption
In addition, the Mobility 5181 Access Point supports the following additional security features:
Firewall security
VPN tunnels
Content filtering
For an overview on the encryption and authentication schemes available, refer to “Configuring
Access Point Security” on page 131.
Kerberos authentication
Authentication is a means of verifying information transmitted from a secure source. If information
is authentic, you know who created it and you know it has not been altered in any way since
originated. Authentication entails a network administrator employing a software “supplicant” on
their computer or wireless device.
Authentication is critical for the security of any wireless LAN device. Traditional authentication
methods are not suitable for use in wireless networks where an unauthorized user can monitor
network traffic and intercept passwords. The use of strong authentication methods that do not
disclose passwords is necessary. The access point uses the Kerberos authentication service
protocol (specified in RFC 1510) to authenticate users/clients in a wireless network environment
and to securely distribute the encryption keys used for both encrypting and decrypting.
A basic understanding of RFC 1510 Kerberos Network Authentication Service (V5) is helpful in
understanding how Kerberos functions. By default, WLAN devices operate in an open system
network where any wireless device can associate with an AP without authorization. Kerberos
requires device authentication before access to the wired network is permitted.
For detailed information on Kerbeors configurations, see “Configuring Kerberos authentication” on
page 136.
EAP authentication
The Extensible Authentication Protocol (EAP) feature provides access points and their associated
Client’s an additional measure of security for data transmitted over the wireless network. Using
EAP, authentication between devices is achieved through the exchange and verification of
certificates.
EAP is a mutual authentication method whereby both the Client and AP are required to prove their
identities. Like Kerberos, the user loses device authentication if the server cannot provide proof of
device identification.
Using EAP, a user requests connection to a WLAN through the Mobility 5181 Access Point. The
Mobility 5181 Access Point then requests the identity of the user and transmits that identity to an
authentication server. The server prompts the AP for proof of identity (supplied to the Mobility 5181
Access Point by the user) and then transmits the user data back to the server to complete the
authentication process.
Vista de página 20
1 2 ... 16 17 18 19 20 21 22 23 24 25 26 ... 427 428

Comentários a estes Manuais

Sem comentários