5 configuring 802.1x eap authentication, Configuring 802.1x eap authentication -11 – Symbol Technologies AP-5131 User Manual

Page 197

Advertising
background image

Configuring Access Point Security

6-11

6.

Click the

Apply

button to return to the

WLAN

screen to save any changes made within the

Kerberos Configuration field of the New Security Policy screen.

7.

Click the

Cancel

button to undo any changes made within the Kerberos Configuration field

and return to the

WLAN

screen. This reverts all settings for the Kerberos Configuration field

to the last saved configuration.

6.5 Configuring 802.1x EAP Authentication

The IEEE 802.1x standard ties the 802.1x EAP authentication protocol to both wired and wireless LAN
applications.

The EAP process begins when an unauthenticated supplicant (client device) tries to connect with an
authenticator (in this case, the authentication server). The AP-5131 passes EAP packets from the
client to an authentication server on the wired side of the AP-5131. All other packet types are blocked
until the authentication server (typically, a RADIUS server) verifies the MU’s identity.

To configure 802.1x EAP authentication on the AP-5131:

1.

Select

Network Configuration

->

Wireless

->

Security

from the AP-5131 menu tree.

If security policies supporting 802.1x EAP exist, they appear within the

Security

Configuration

screen. These existing policies can be used as is, or their properties edited

by clicking the

Edit

button. To configure a new security policy supporting 802.1x EAP,

continue to step 2.

2.

Click the

Create

button to configure a new policy supporting 802.1x EAP.

The

New Security Policy

screen displays with no authentication or encryption options

selected.

Backup KDC

Optionally, specify a numerical (non-DNS) IP address and port for a
backup KDC. Backup KDCs are referred to as slave servers. The
slave server periodically synchronizes its database with the
primary (or master) KDC.

Remote KDC

Optionally, specify a numerical (non-DNS) IP address and port for a
remote KDC. Kerberos implementations can use an administration
server allowing remote manipulation of the Kerberos database.
This administration server usually runs on the KDC.

Port

Specify the ports on which the Primary, Backup and Remote KDCs
reside. The default port number for Kerberos Key Distribution
Centers is Port 88.

Advertising