Symbol Technologies AP-5131 User Manual

Page 194

Advertising
background image

AP-5131 Access Point Product Reference Guide

6-8

6.

Click

Apply

to keep changes made within the New Security Policy screen (if any).

Configure encryption or authentication supported security policies by referring to the
following:

AP-5131 authentication:

• To create a security policy supporting Kerberos, see,

Configuring Kerberos Authentication on page 6-9

.

• To define a security policy supporting 802.1x EAP, see

Configuring 802.1x EAP Authentication on page 6-11

.

AP-5131 encryption:

• To create a security policy supporting WEP, see

Configuring WEP Encryption on page 6-16

.

• To define a security policy supporting KeyGuard, see,

Configuring KeyGuard Encryption on page 6-18

.

• To configure a security policy supporting WPA/TKIP, see

Configuring WPA Using TKIP on page 6-20

.

• To create a security policy supporting WPA2/CCMP, see

Configuring WPA2-CCMP (802.11i) on page 6-22

.

WEP 128 (104-bit key) Select the

WEP 128 (104 bit key)

button to display the

WEP 128

Settings

field within the New Security Policy screen. For specific

information on configuring WEP 128, see

Configuring WEP Encryption on page 6-16

.

KeyGuard

Select the

KeyGuard

button to display the

KeyGuard Settings

field within the New Security Policy screen. For specific
information on configuring KeyGuard, see

Configuring KeyGuard Encryption on page 6-18

.

WPA/TKIP

Select the

WPA/TKIP

button to display the

WPA/TKIP Settings

field within the New Security Policy screen. For specific
information on configuring WPA-TKIP, see

Configuring WPA Using TKIP on page 6-20

.

WPA2/CCMP
(802.11i)

Select the

WPA2/CCMP (802.11)

button to display the

WPA2/

CCMP Settings

field within the New Security Policy screen. For

detailed information on configuring WPA2/CCMP, see

Configuring WPA2-CCMP (802.11i) on page 6-22

.

Advertising