Instructions

Authentication Management
Stellar AP User Guide
ALCATEL-LUCENT ENTERPRISE 82
3. Browse http://mywifi.al-enterprise.com:8080 or http://192.168.1.254:8080 to configure
the Stellar AP.
7 Authentication Management
As WLANs evolve from best-effort to mission-critical infrastructure, organizations are finding that the
operational aspects of network security take on much greater importance. The ALE Wi-Fi solution supports
enhanced security methods to assure your wireless connection is more secure to eliminate any type of
potential sniffers and other security threats. The major features of the ALE WLAN are:
To secure users and network traffic in a WLAN - ALE provides a full suite of authentication, encryption,
and policy enforcement capabilities in an architecture that allows easy integration of additional security
services.
Wireless Intrusion Prevention System (WIPS) - To enforce no-wireless policies or detect attacks against
a WLAN, ALE AP provides advanced threat detection and suppressing functions. An AP can scan the
wireless environment and detect the potential rogue and restrict it from replying to user connection
requests.
AP Security described in this chapter includes:
Authentication and Encryption Methods
How to Configure Captive Portal Authentication
Authentication and Encryption Methods
When creating a WLAN, select the security type as illustrated in Figure 7-3.
Open: No Authentication or encryption method for this WLAN. User data will be transmitted as Plain
text Transmit Mode.
Personal: There will be Static-WEP, and several WPA, WPA2, WPA3 combinations available once you
select Personal. This does not require an external RADIUS server as illustrated in Figure 7-3.
Enterprise: Authentication method will be based on WPA Enterprise Architecture. Encryption method
TKIP or AES is selected. An external RADIUS server is required as illustrated in Figure 7-4.
Note 7-1: WPA uses 802.1X authentication which is one of the Extensible Authentication Protocol (EAP) types
available today. 802.1X is a port-based network access control method for wired, as well as wireless, networks.
It was adopted as a standard by the IEEE in August of 2001. EAP handles the presentation of users’ credentials,
in the form of digital certificates (already widely used in Internet security), unique usernames and passwords, smart
cards, secure IDs, or any other identity credential that the IT administrator is comfortable deploying. WPA allows
flexibility in both the type of credentials that are used and in the selection of an EAP type.