Motorola Series Switch WS5100 User Manual
Page 98
4-24 WS5100 Series Switch System Reference Guide
6. Refer to the
Authentication
field to select amongst the following options:
7. Refer to the
Encryption
field to select amongst the following options:
VLAN ID
Select the
VLAN ID
checkbox to change the VLAN designation for this WLAN. By default,
all WLANs created are assigned to VLAN 1. Select the
Dynamic Assignment
checkbox for
an automatic VLAN assignment for this WLAN. The WS5100 Series Switch cannot route
traffic between different VLANs on ETH1 and ETH2. Be cognizant of this limitation when
planning to route traffic between different VLANs.
Tunnel
Select the
Tunnel
checkbox to enable a field for entering the tunnel number to be used with
this WLAN. The available range is from 1-32. Enter the
Gateway
and
Mask
addresses used
with the tunnel. When selected, the
VLAN ID
field is not available. Do not set the gateway
address to any VLAN interface used by the switch.
802.1X EAP
A Radius server is used to authenticate users. For detailed information on configuring EAP
for the WLAN, see
Configuring 802.1x EAP on page 4-26
Kerberos
A Kerberos server is used to authenticate users. For detailed information on configuring
Kerberos for the WLAN, see
Configuring Kerboros on page 4-27
.
Hotspot
A hotspot is used to authenticate users to a designated WLAN for a defined period of time.
The attributes of both the hotspot and the Radius Server are required. For more information,
see
Configuring Hotspots on page 4-29
Dynamic MAC ACL
The switch uses a Radius server to see if a target MAC address is allowed on the network.
The attributes of the Radius Server are required. For more information, see
No Authentication
When selected, no Authentication is used and transmissions are made (in the open) without
security unless an encryption scheme is used. This setting is not recommended when data
protection is important.
WEP 64
Use the WEP 64 radio button to enable the Wired Equivalent Privacy (WEP) protocol with a
40-bit key. WEP is available in two encryption modes: 40 bit (also called WEP 64) and 104 bit
(also called WEP 128). The 104-bit encryption mode provides a longer algorithm that takes
longer to decode than that of the 40-bit encryption mode. For detailed information on
configuring WEP 64 for the WLAN, see
Configuring WEP 64 on page 4-40
WEP 128
Use the WEP 128 radio button to enable the Wired Equivalent Privacy (WEP) protocol with a
104-bit key. WEP is available in two encryption modes: WEP 64 (using a 40-bit key) and WEP
128 (using a 104-bit key). WEP 128 encryption mode provides a longer algorithm that takes
longer to decode than that of the WEP 64 encryption mode. For detailed information on
configuring WEP 128 for the WLAN, see
Configuring WEP 128 / KeyGuard on page 4-41
.
KeyGuard
Uses a Motorola MU proprietary encryption mechanism to protect data. For detailed
information on configuring KeyGuard for the WLAN, see
Configuring WEP 128 / KeyGuard on
.