Motorola AP-51XX 사용자 설명서

다운로드
페이지 698
AP-51xx Access Point Product Reference Guide
6-8
6.
Click 
Apply
 to keep changes made within the New Security Policy screen (if any). 
Configure encryption or authentication supported security policies by referring to the 
following: 
access point authentication:
• To create a security policy supporting Kerberos, see, 
.
• To define a security policy supporting 802.1x EAP, se
.
access point encryption:
• To create a security policy supporting WEP, see 
.
• To define a security policy supporting KeyGuard, see, 
.
• To configure a security policy supporting WPA/TKIP, see 
.
• To create a security policy supporting WPA2/CCMP, see 
7.
Click 
Cancel
 to return to the target WLAN screen without keeping any of the changes made 
within the New Security Policy screen.
6.4 Configuring Kerberos Authentication
Kerberos (designed and developed by MIT) provides strong authentication for client/server applications 
using secret-key cryptography. Using Kerberos, a client must prove its identity to a server (and vice 
versa) across an insecure network connection. 
Once a client and server use Kerberos to prove their identity, they can encrypt all communications to 
assure privacy and data integrity. Kerberos can only be used on the access point with Motorola 802.11b 
clients.
WPA2/CCMP 
(802.11i)
Select the 
WPA2/CCMP (802.11) 
button to display the 
WPA2/
CCMP Settings
 field within the New Security Policy screen. For 
detailed information on configuring WPA2/CCMP, see