Configuring Network Access and
8.
Security
This chapter includes the following sections:
•
About Basic and Advanced Security Configurations
•
Manage Rogue Access Points
•
Manage MAC Authentication and MAC Authentication Groups
•
Manage Authentication Servers and Authentication Server Groups
•
Manage Guest Network Access
•
Manage Users and Passwords
IMPORTANT:
Before you use the wireless controller to push the configurations
to your access points, first determine which profiles and security
you need, configure authentication servers and MAC
authentication as described in this chapter, and then complete
configuration of the profiles that you intend to use (see
Managing Security Profiles and Profile
CAUTION:
If security is not set up, or is set up incorrectly, when the wireless
controller pushes the configurations to the access points, you could
accidentally wipe out all security, leaving your entire network open to
access.
About Basic and Advanced Security Configurations
The basic security configuration model (Configuration > Security > Basic) does not apply
strictly to the basic profile group, nor does the advanced security configuration model
(Configuration > Security > Advanced) apply strictly to advanced profile groups. The reason
is that you apply an authentication server and a MAC ACL to an individual profile and not to a
profile group.
Groups).
106
8
Chapter 6,