Motorola AP-51XX User Manual
Page 227

Configuring Access Point Security
6-9
Kerberos uses the Network Time Protocol (NTP) for synchronizing the clocks of its Key Distribution
Center (KDC) server(s). Use the
NTP Servers
screen to specify the IP addresses and ports of available
NTP servers. Kerberos requires the
Enable NTP on
checkbox be selected for authentication to
Configuring Network Time Protocol (NTP) on page 4-39
to configure the NTP
server.
To configure Kerberos on the access point:
1.
Select
Network Configuration
->
Wireless
->
Security
from the access point menu tree.
If security policies supporting Kerberos exist, they appear within the
Security
Configuration
screen. These existing policies can be used as is, or their properties edited
by clicking the
Edit
button. To configure a new security policy supporting Kerberos, continue
to step 2.
2.
Click the
Create
button to configure a new policy supporting Kerberos.
The
New Security Policy
screen displays with no authentication or encryption options
selected.
3.
Select the
Kerberos
radio button.
The
Kerberos Configuration
field displays within the New Security Policy screen.
4.
Ensure the
Name
of the security policy entered suits the intended configuration or function
of the policy.
CAUTION Kerberos makes no provisions for host security. Kerberos assumes
that it is running on a trusted host with an untrusted network. If host
security is compromised, Kerberos is compromised as well
NOTE
If 802.11a is selected as the radio used for a specific WLAN, the WLAN
cannot use a Kerberos supported security policy, as no Motorola 802.11a
clients can support Kerberos.
!