Motorola AP-51XX User Manual

Page 227

Advertising
background image

Configuring Access Point Security

6-9

Kerberos uses the Network Time Protocol (NTP) for synchronizing the clocks of its Key Distribution
Center (KDC) server(s)
. Use the

NTP Servers

screen to specify the IP addresses and ports of available

NTP servers. Kerberos requires the

Enable NTP on

checkbox be selected for authentication to

function properly. See

Configuring Network Time Protocol (NTP) on page 4-39

to configure the NTP

server.

To configure Kerberos on the access point:

1.

Select

Network Configuration

->

Wireless

->

Security

from the access point menu tree.

If security policies supporting Kerberos exist, they appear within the

Security

Configuration

screen. These existing policies can be used as is, or their properties edited

by clicking the

Edit

button. To configure a new security policy supporting Kerberos, continue

to step 2.

2.

Click the

Create

button to configure a new policy supporting Kerberos.

The

New Security Policy

screen displays with no authentication or encryption options

selected.

3.

Select the

Kerberos

radio button.

The

Kerberos Configuration

field displays within the New Security Policy screen.

4.

Ensure the

Name

of the security policy entered suits the intended configuration or function

of the policy.

CAUTION Kerberos makes no provisions for host security. Kerberos assumes

that it is running on a trusted host with an untrusted network. If host
security is compromised, Kerberos is compromised as well

NOTE

If 802.11a is selected as the radio used for a specific WLAN, the WLAN
cannot use a Kerberos supported security policy, as no Motorola 802.11a
clients can support Kerberos.

!

Advertising