Configuring Access Point Security
6-9
Kerberos uses the Network Time Protocol (NTP) for synchronizing the clocks of its Key Distribution
Center (KDC) server(s). Use the NTP Servers screen to specify the IP addresses and ports of available
NTP servers. Kerberos requires the Enable NTP on checkbox be selected for authentication to
function properly. See Configuring Network Time Protocol (NTP) on page 4-41 to configure the NTP
server.
To configure Kerberos on the access point:
1. Select Network Configuration -> Wireless -> Security from the access point menu tree.
If security policies supporting Kerberos exist, they appear within the Security
Configuration screen. These existing policies can be used as is, or their properties edited
by clicking the Edit button. To configure a new security policy supporting Kerberos, continue
to step 2.
2. Click the Create button to configure a new policy supporting Kerberos.
The New Security Policy screen displays with no authentication or encryption options
selected.
3. Select the Kerberos radio button.
The Kerberos Configuration field displays within the New Security Policy screen.
4. Ensure the Name of the security policy entered suits the intended configuration or function
of the policy.
CAUTION Kerberos makes no provisions for host security. Kerberos assumes
that it is running on a trusted host with an untrusted network. If host
security is compromised, Kerberos is compromised as well
NOTE If 802.11a/n is selected as the radio used for a specific WLAN, the WLAN
cannot use a Kerberos supported security policy, as no Motorola
802.11a/n clients can support Kerberos.
!