User Manual

Psion Teklogix 9160 Wireless Gateway User Manual C-11
Appendix C: Configuring Security Settings On Wireless Clients
Configuring IEEE 802.1x Security On A Client
C.6 Configuring IEEE 802.1x Security On A Client
IEEE 802.1x is the standard defining port-based authentication and infrastructure for
doing key management. Extensible Authentication Protocol (EAP) messages are
sent over an IEEE 802.11 wireless network using a protocol called EAP Encapsula-
tion Over LANs (EAPOL). IEEE 802.1x provides dynamically-generated keys that
are periodically refreshed. An RC4 stream cipher is used to encrypt the frame body
and cyclic redundancy checking (CRC) of each 802.11 frame.
C.6.1 IEEE 802.1x Client Using EAP/PEAP
The Built-In Authentication Server on the 9160 Wireless Gateway uses Protected
Extensible Authentication Protocol (EAP) referred to here as “EAP/PEAP”.
If you are using the Built-in Authentication server with “IEEE 802.1x”
security mode on the 9160 Wireless Gateway, then you will need to set up
wireless clients to use PEAP.
Additionally, you may have an external RADIUS server that uses
EAP/PEAP. If so, you will need to:
(1) Add the 9160 Wireless Gateway to the list of RADIUS server clients.
AND
(2) Configure your IEEE 802.1x wireless clients to use PEAP.
Note: The following example assumes that you are using the Built-in Authenti-
cation server that comes with the 9160 Wireless Gateway. If you are
setting up EAP/PEAP on a client of an AP that is using an external
RADIUS server, the client configuration process will differ somewhat
from this example, especially with regard to certificate validation.