Rockwell Automation 1783-WAPxxx Stratix 5100 Wireless Access Point User Manual User Manual

Page 85

Advertising
background image

Rockwell Automation Publication 1783-UM006A-EN-P - May 2014

85

Stratix 5100 Device Manager Parameter Definitions

Chapter 4

Security Configuration Settings on the Easy Setup Page

You can configure a limited number of security parameters for the Stratix 5100
WAP. There are four choices:

No Security
WEP Key
EAP Authentication
WPA

Use the Security page to review and configure the security settings for the access
point.

You can configure security also by
using CLI, see

Security CLI

Configuration Examples on
page 184

.

Table 12 - Security Types on Easy Set-up Security Setup Page

Security Type

Description

Security Features Enabled

No Security

This is the least secure option. Use this option only for SSIDs used in a public
space and assign it to a VLAN that restricts access to your network.

None.

WEP Key

This option is more secure than no security. However, static WEP keys are
vulnerable to attack. If you configure this setting, consider limiting association
to the wireless device based on MAC address
See

Using MAC Address ACLs to Block or Allow Client Association to the Access

Point on page 485

or, if your network does not have a RADIUS server, consider

using an access point as a local authentication server, see

Configuring a Local

Authenticator on page 320

.

Mandatory WEP. Client devices cannot associate by using this SSID without
a WEP key that matches the wireless device key.

EAP Authentication

This option enables 802.1X authentication, for example, LEAP, PEAP, EAP-TLS,
EAP-FAST, EAP-TTLS, EAP-GTC, EAP-SIM, and other 802.1X/EAP based products)
This setting uses mandatory encryption, WEP, open authentication + EAP,
network EAP authentication, no key management, RADIUS server
authentication port 1645.
You are required to enter the IP address and shared secret for an authentication
server on your network (server authentication port 1645). Because 802.1X
authentication provides dynamic encryption keys, you don’t need to enter a
WEP key.

Mandatory 802.1X authentication. Client devices that associate by using
this SSID must perform 802.1X authentication.
If radio clients are configured to authenticate by using EAP-FAST, open
authentication with EAP can also be configured. If you do not configure
open authentication with EAP, the following GUI warning message
appears:
WARNING: Network EAP is used for LEAP authentication only. If radio
clients are configured to authenticate by using EAP-FAST, Open
Authentication with EAP can also be configured.
If you are using CLI, this warning message appears:
SSID CONFIG WARNING: [SSID]: If radio clients are using EAP-FAST, AUTH
OPEN with EAP must be configured.

WPA

Wi-Fi Protected Access (WPA) permits wireless access to users authenticated
against a database through the services of an authentication server, then
encrypts their IP traffic with stronger algorithms than those used in WEP.
This setting uses encryption ciphers, TKIP, open authentication + EAP, network
EAP authentication, key management WPA mandatory, and RADIUS server
authentication port 1645.
As with EAP authentication, you must enter the IP address and shared secret for
an authentication server on your network (server authentication port 1645).

Mandatory WPA authentication. Client devices that associate by using this
SSID must be WPA-capable.
If radio clients are configured to authenticate by using EAP-FAST, open
authentication with EAP must be configured. If you don’t configure open
authentication with EAP, the following GUI warning message appears:
WARNING: Network EAP is used only for LEAP authentication. If radio
clients are configured to authenticate by using EAP-FAST, Open
Authentication with EAP must be configured.
If you are using CLI, this warning message appears:
SSID CONFIG WARNING: [SSID]: If radio clients are using EAP-FAST, AUTH
OPEN with EAP must be configured.

Advertising