beautypg.com

Chapter 7, Configuring security, About security – Allied Telesis AT-WL2411 User Manual

Page 124

background image

124

Chapter 7

Configuring Security

This chapter explains how to use features that are available on the
access point to ensure that you have a secure wireless network.

About Security

There are several levels of security that you can implement in the access
points.

❑ Enable/disable access methods.

❑ Change the default logins for users who need to be able to

configure and manage the access point.

Or, use a password server (external or internal to the access
point) to create a list of authorized user names and passwords.
Typically, this password server is a RADIUS server.

❑ (802.11b/802.11a) Configure static WEP keys. You can configure

up to four different WEP keys on the access point and most
wireless end devices. You should periodically change which WEP
key these devices use to transmit data.

❑ Use an 802.1x authentication server (typically a RADIUS server

external to the access point) with EAP-TLS or EAP-TTLS if you want
to implement the 802.1x standard and automatically generated,
periodically rotating WEP keys.

These security levels are described in this chapter.