Configuring access point security, In this chapter, Chapter 6 – Brocade Mobility 7131 Access Point Product Reference Guide (Supporting software release 4.4.0.0 and later) User Manual
Page 201: Chapter, D in, Chapter , configuring access
![background image](/manuals/361705/201/background.png)
Brocade Mobility 7131 Access Point Product Reference Guide
189
53-1002517-01
Chapter
6
Configuring Access Point Security
In this chapter
•
•
•
Enabling Authentication and Encryption Schemes . . . . . . . . . . . . . . . . . . . 192
•
Configuring Kerberos Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
•
Configuring 802.1x EAP Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
•
•
Configuring KeyGuard Encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
•
Configuring WPA/WPA2 Using TKIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
•
Configuring WPA2-CCMP (802.11i) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
•
•
•
•
Configuring Content Filtering Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
•
•
Security measures for the Mobility 7131 Access Point and its WLANs are critical. Use the available
Mobility 7131 Access Point security options to protect the Mobility 7131 Access Point LAN from
wireless vulnerabilities, and safeguard the transmission of RF packets between the Mobility 7131
Access Point and its associated MUs.
WLAN security can be configured on an ESS by ESS basis on the Mobility 7131 Access Point.
Sixteen separate ESSIDs (WLANs) can be supported on an Mobility 7131 Access Point, and must be
managed (if necessary) between the 802.11a/n and 802.11b/g/n radio. The user has the
capability of configuring separate security policies for each WLAN. Each security policy can be
configured based on the authentication (Kerberos, 802.1x EAP) or encryption (WEP, KeyGuard,
WPA/TKIP or WPA2/CCMP) scheme best suited to the coverage area that security policy supports.
The Mobility 7131 Access Point can also create VPN tunnels to securely route traffic through a
IPSEC tunnel and block transmissions with devices interpreted as Rogue APs.
NOTE
Security for the Mobility 7131 Access Point can be configured in various locations throughout the
Mobility 7131 Access Point menu structure. This chapter outlines the security options available to
the Mobility 7131 Access Point, and the menu locations and steps required to configure specific
security measures.