Wlan Basic Configuration Deployment Considerations; Configuring Wlan Security - Motorola WiNG 5 System Reference Manual

Table of Contents

Advertisement

6.1.1.1 WLAN Basic Configuration Deployment Considerations

Basic WLAN Configuration
Before defining a WLAN's basic configuration, refer to the following deployment guidelines to ensure the configuration is
optimally effective:

6.1.2 Configuring WLAN Security

Wireless LANs
Assign WLANs unique security configurations supporting authentication, captive portal (hotspot) or encryption schemes
as data protection requirements dictate.
Authentication ensures only known and trusted users or devices access an access point managed WLAN. Authentication
is enabled per WLAN to verify the identity of both users and devices. Authentication is a challenge and response
procedure for validating user credentials such as username, password and secret-key information.
A client must authenticate to an access point to receive resources from the network. 802.1x EAP, 802.1x EAP PSK, MAC
and PSK/None authentication options are supported.
NOTE: Motorola Solutions recommends one VLAN be deployed for secure WLANs,
while separate VLANs be defined for each WLAN providing guest access.
Figure 6-4 WLAN Security screen
Wireless Configuration 6 - 7

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents