The following table gives recommendations on configuring a WLAN security policy. For the NAC configuration, see "NAC Configuration (Unified Mode)" in the S2720, S5700, and S6700 V200R019C10 Configuration Guide - User Access and Authentication Configuration Guide.
Security Policy |
Parameter |
Description |
---|---|---|
Open system authentication |
Recommended Configuration Scenario |
Public places with high user mobility, such as airports, stations, business centers, conference halls, and sports stadiums. Open system authentication should be configured together with Portal authentication, which supports user authentication, accounting, authorization, and information pushing. |
Description |
It is not secure to use open system authentication independently because any wireless terminals can access the network without authentication. You are advised to configure open system authentication together with Portal authentication or MAC address authentication. |
|
User Access Authentication Mode |
|
|
WEP |
Recommended Configuration Scenario |
None |
Description |
This security policy is not recommended due to its low security. |
|
User Access Authentication Mode |
None |
|
WPA/WPA2-PSK authentication |
Recommended Configuration Scenario |
Individual or home networks |
Description |
This security policy has higher security than WEP. Additionally, no third-party server is required and the cost is low. |
|
User Access Authentication Mode |
None |
|
WPA/WPA2-802.1X authentication |
Recommended Configuration Scenario |
Scenarios with fixed users and requiring high security and centralized user management and authorization, such as mobile office, campus networks, and mobile administration |
Description |
This security policy provides high security and requires a third-party server. |
|
User Access Authentication Mode |
802.1X authentication |
|
WAPI-PSK authentication |
Recommended Configuration Scenario |
None |
Description |
This security policy provides higher security than WEP and requires no third-party server. Only some terminals support the protocol. |
|
User Access Authentication Mode |
None |
|
WAPI-certificate authentication |
Recommended Configuration Scenario |
None |
Description |
This security policy provides high security and requires a third-party server. Only some STAs support the protocol. |
|
User Access Authentication Mode |
None |