Encryption And Authentication - Motorola WS5100 Series Migration Giude

Hide thumbs Also See for WS5100 Series:
Table of Contents

Advertisement

4-8 WS5100 Series Switch Migration Guide

4.1.5.2 Encryption and Authentication

This section describes the differences in menu path navigation amongst the WS5100 1.4.x, 2.x and 3.0
baselines when using the Web UI to define an encryption or authentication based security policy.
This section describes how to navigate to the target security screen described in the
Feature
portion of the table. Once you navigate to the target security screen, a thorough knowledge of the
security feature is required to adequately protect the data within your network.
Table 4.8 Encryption and Authentication
Configuration
Option/Feature
Access the
Security
Configuration
Screen(s)
Create an "Open"
Configuration
1.4.x Location
Create >
Access Port >
Security Policy
Create >
Access Port >
Security Policy
--------------------------------------
• Name the policy.
• Enter a description.
None
• Select the
checkbox.
Next.
• Click
2.x Location
Create >
Access Port >
Security Policy
Create >
Access Port >
Security Policy
--------------------------------------
• Name the policy.
• Enter a description.
None
• Select the
checkbox.
Next.
• Click
Configuration Option/
3.0 Location
Network>
Wireless LANs>
--------------------------------------
Configuration
• Click the
tab
• Select a WLAN.
Edit
• Click the
button.
• Select an authentication or
encryption checkbox.
Config
• Click the
button.
Network>
Wireless LANs>
--------------------------------------
Configuration
• Click the
tab.
• Select a WLAN Index.
Edit
• Click the
button.
• Revise the SSID
(if necessary).
• Revise the configuration
description (if necessary).
No
• Select the
Authentication
checkbox.

Advertisement

Table of Contents
loading

Table of Contents