3Com 8760 User Guide - Page 90

separately in the table. Required RADIUS server support is also listed.

Page 90 highlights

CHAPTER 4: SYSTEM CONFIGURATION Security Mechanism Client Support Implementation Considerations WPA over 802.1X Mode Requires WPA-enabled system and network card driver (native support provided in Windows XP) • Provides robust security in WPA-only mode (i.e., WPA clients only) • Offers support for legacy WEP clients, but with increased security risk (i.e., WEP authentication keys disabled) • Requires configured RADIUS server • 802.1X EAP type may require management of digital certificates for clients and server WPA PSK Mode Requires WPA-enabled system and network card driver (native support provided in Windows XP) • Provides good security in small networks • Requires manual management of pre-shared key WPA2 with 802.1X Requires WPA-enabled system and network card driver (native support provided in Windows XP) • Provides the strongest security in WPA2-only mode • Provides robust security in mixed mode for WPA and WPA2 clients • Offers fast roaming for time-sensitive client applications • Requires configured RADIUS server • 802.1X EAP type may require management of digital certificates for clients and server • Clients may require hardware upgrade to be WPA2 compliant WPA2 PSK Mode Requires WPA-enabled system and network card driver (native support provided in Windows XP) • Provides robust security in small networks • Requires manual management of pre-shared key • Clients may require hardware upgrade to be WPA2 compliant NOTE: You must enable data encryption through the web in order to enable all types of encryption (WEP, TKIP, or AES) in the access point. The access point can simultaneously support clients using various different security mechanisms. The configuration for these security combinations are outlined in the following table. Note that MAC address authentication can be configured independently to work with all security mechanisms and is indicated separately in the table. Required RADIUS server support is also listed. Table 6 Security Considerations Client Security Combination Configuration Summarya No encryption and no Authentication: Open System authentication Encryption: Disable 802.1x: Disable Static WEP only (with Enter 1 to 4 WEP keys or without shared Select a WEP transmit key for the interface key authentication) Authentication: Shared Key or Open System Encryption: Enable 802.1x: Disable MAC RADIUS Authenticationb Server Local, RADIUS, or Yesc Disabled Local, RADIUS, or Yesc Disabled 4-50

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

4-50
C
HAPTER
4: S
YSTEM
C
ONFIGURATION
The access point can simultaneously support clients using various different
security mechanisms. The configuration for these security combinations are
outlined in the following table. Note that MAC address authentication can be
configured independently to work with all security mechanisms and is indicated
separately in the table. Required RADIUS server support is also listed.
Table 6
Security Considerations
WPA over 802.1X
Mode
Requires WPA-enabled system
and network card driver
(native support provided in
Windows XP)
Provides robust security in WPA-only mode
(i.e., WPA clients only)
Offers support for legacy WEP clients, but with
increased security risk (i.e., WEP authentication
keys disabled)
Requires configured RADIUS server
802.1X EAP type may require management of
digital certificates for clients and server
WPA PSK Mode
Requires WPA-enabled system
and network card driver
(native support provided in
Windows XP)
Provides good security in small networks
Requires manual management of pre-shared key
WPA2 with
802.1X
Requires WPA-enabled system
and network card driver (native
support provided in Windows
XP)
Provides the strongest security in WPA2-only
mode
Provides robust security in mixed mode for WPA
and WPA2 clients
Offers fast roaming for time-sensitive client
applications
Requires configured RADIUS server
802.1X EAP type may require management of
digital certificates for clients and server
Clients may require hardware upgrade to be
WPA2 compliant
WPA2 PSK Mode
Requires WPA-enabled system
and network card driver (native
support provided in Windows
XP)
Provides robust security in small networks
Requires manual management of pre-shared key
Clients may require hardware upgrade to be
WPA2 compliant
Security
Mechanism
Client Support
Implementation Considerations
NOTE:
You must enable data encryption through the web in order to enable all
types of encryption (WEP, TKIP, or AES) in the access point.
Client Security
Combination
Configuration Summary
a
MAC
Authentication
b
RADIUS
Server
No encryption and no
authentication
Authentication: Open System
Encryption: Disable
802.1x: Disable
Local, RADIUS, or
Disabled
Yes
c
Static WEP only (with
or without shared
key authentication)
Enter 1 to 4 WEP keys
Select a WEP transmit key for the interface
Authentication: Shared Key or Open System
Encryption: Enable
802.1x: Disable
Local, RADIUS, or
Disabled
Yes
c