Chapter 6: Configuring Security

To create a secure spanning tree

Note

You do not need to perform this procedure if you are implementing an 802.1x security solution. 802.1x authentication automatically enables secure IAPP and secure wireless hops. See “Implementing an 802.1x Security Solution” on page 192.

1.From the main menu, click Security > Spanning Tree Security. The Spanning Tree Security screen appears.

2.Check the Secure IAPP check box.

3.Click Submit Changes to save your changes.

4.In the IAPP Secret Key field, enter a secret key. This secret key must be between 16 and 32 bytes.

5.Determine how the access points authenticate to the network:

ˆCheck the Allow SWAP check box if you have older access points or you are not implementing an 802.1x security solution.

ˆCheck the Allow TLS check box, if you are implementing an 802.1x security solution and you want to use TLS. The access point must have a server certificate loaded on it.

ˆCheck the Allow TTLS (MSCHAPv2) check box, if you are implementing an 802.1x security solution and you want to use TTLS. You must also enter a User Name and Password that matches an entry in the authentication server.

182

Page 182
Image 182
Allied Telesis AT-WA7500, AT-WA7501 manual 182