Chapter 6: Configuring Security

Enabling Secure Communications Between Access Points and End Devices

Using an Access

Control List

(ACL)

There are several ways that you can ensure secure communications between access points and wireless end devices in your network:

ˆUse an access control list (ACL).

ˆConfigure virtual LANs (VLANs).

ˆConfigure WEP 64/128/152 security.

ˆImplement an 802.1x security solution.

ˆConfigure Wi-Fi Protected Access (WPA) security.

The next sections explain how to configure these methods.

You can use an access control list (ACL) that contains the MAC addresses that are authorized to communicate with the network through the access point. The end devices do not need any special client software. To use the ACL, you must have:

ˆa RADIUS server on the network that contains the ACL. You can either use an external RADIUS server or you can configure an EAS. For help, see Chapter 7, “Configuring the Embedded Authentication Server (EAS)” on page 204.

ˆaccess points, which are the RADIUS clients.

If the access point has two radios, or if the access point contains one 802.11g or 802.11a radio with multiple service sets, you can use an ACL for one radio and another type of security for the other radio.

For example, you have some end devices that have an 802.1x supplicant and you have some end devices that do not have a supplicant. You can enable one radio to use 802.1x security and the other radio to use an ACL. You can also use one ACL for both radios. However, you cannot use a different ACL for each radio.

184

Page 184
Image 184
Allied Telesis AT-WA7500, AT-WA7501 manual Using an Access Control List, Acl