Overriding A Security Configuration - Motorola WiNG 5 System Reference Manual

Table of Contents

Advertisement

5 - 260 WiNG 5 Access Point System Reference Guide

5.10.3 Overriding a Security Configuration

A profile can have its own firewall policy, wireless client role policy, WEP shared key authentication, NAT policy and
VPN policy applied. If an existing firewall, client role or NAT policy is unavailable create the required security policy
configuration. Once created, a configuration can have an override applied as needed to meet the changing data
protection requirements of a device's deployed environment. However, in doing so this device must now be managed
separately from the profile configuration shared by other identical models within the network.
For more information on applying an override to an existing device profile, refer to the following sections:
Overriding General Security Settings
Overriding a Certificate Revocation List (CRL) Configuration
Overriding a Profile's NAT Configuration

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents