beautypg.com

Motorola Series Switch WS5100 User Manual

Page 98

background image

4-24 WS5100 Series Switch System Reference Guide

6. Refer to the

Authentication

field to select amongst the following options:

7. Refer to the

Encryption

field to select amongst the following options:

VLAN ID

Select the

VLAN ID

checkbox to change the VLAN designation for this WLAN. By default,

all WLANs created are assigned to VLAN 1. Select the

Dynamic Assignment

checkbox for

an automatic VLAN assignment for this WLAN. The WS5100 Series Switch cannot route
traffic between different VLANs on ETH1 and ETH2. Be cognizant of this limitation when
planning to route traffic between different VLANs.

Tunnel

Select the

Tunnel

checkbox to enable a field for entering the tunnel number to be used with

this WLAN. The available range is from 1-32. Enter the

Gateway

and

Mask

addresses used

with the tunnel. When selected, the

VLAN ID

field is not available. Do not set the gateway

address to any VLAN interface used by the switch.

802.1X EAP

A Radius server is used to authenticate users. For detailed information on configuring EAP
for the WLAN, see

Configuring 802.1x EAP on page 4-26

.

Kerberos

A Kerberos server is used to authenticate users. For detailed information on configuring
Kerberos for the WLAN, see

Configuring Kerboros on page 4-27

.

Hotspot

A hotspot is used to authenticate users to a designated WLAN for a defined period of time.
The attributes of both the hotspot and the Radius Server are required. For more information,
see

Configuring Hotspots on page 4-29

.

Dynamic MAC ACL

The switch uses a Radius server to see if a target MAC address is allowed on the network.
The attributes of the Radius Server are required. For more information, see

Configuring

Dynamic MAC ACL on page 4-36

No Authentication

When selected, no Authentication is used and transmissions are made (in the open) without
security unless an encryption scheme is used. This setting is not recommended when data
protection is important.

WEP 64

Use the WEP 64 radio button to enable the Wired Equivalent Privacy (WEP) protocol with a
40-bit key. WEP is available in two encryption modes: 40 bit (also called WEP 64) and 104 bit
(also called WEP 128). The 104-bit encryption mode provides a longer algorithm that takes
longer to decode than that of the 40-bit encryption mode. For detailed information on
configuring WEP 64 for the WLAN, see

Configuring WEP 64 on page 4-40

.

WEP 128

Use the WEP 128 radio button to enable the Wired Equivalent Privacy (WEP) protocol with a
104-bit key. WEP is available in two encryption modes: WEP 64 (using a 40-bit key) and WEP
128 (using a 104-bit key). WEP 128 encryption mode provides a longer algorithm that takes
longer to decode than that of the WEP 64 encryption mode. For detailed information on
configuring WEP 128 for the WLAN, see

Configuring WEP 128 / KeyGuard on page 4-41

.

KeyGuard

Uses a Motorola MU proprietary encryption mechanism to protect data. For detailed
information on configuring KeyGuard for the WLAN, see

Configuring WEP 128 / KeyGuard on

page 4-41

.