Motorola WiNG 5.7.1 System Reference Manual page 419

Table of Contents

Advertisement

5.4.5.5.5 Overriding General Security Settings
Overriding a Security Configuration
A profile can leverage existing firewall, wireless client role and WIPS policies and configurations and apply them to the
configuration. This affords a profile a truly unique combination of data protection policies. However, as deployment
requirements arise, an individual access point may need some or all of its general security configuration overridden from that
applied in the profile.
To define a profile's security settings and overrides:
1. Select
Devices
2. Select
Device Overrides
3. Select a target device from the device browser in the lower, left-hand, side of the UI.
4. Select
Security
5. Select Settings.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as having
an override applied. To remove an override, go to the Basic Configuration screen's
Device Overrides
from the device.
6. Refer to the
General
Firewall Policy
WEP Shared Key
Authentication
Client Identity Group
from the Configuration tab.
from the Device menu to expand it into sub menu options.
to expand its sub menu options.
field and select
Figure 5-222 Device Overrides - Security Settings screen
field to assign or override the following:
Select the firewall policy used by devices with this profile. Use the icons next to this
field to create or add new firewall policies.
Select this option to require devices using this profile to use a WEP key to access the
network using this profile. Clients without our adapters need to use WEP keys manually
configured as hexadecimal numbers. This option is disabled by default.
Client Identity is a set of unique fingerprints used to identify a class of devices. This
information is used to configure permissions and access rules for devices classes in the
network. It is a collection of client identities that identify devices and applies specific
permissions and restrictions on these devices. From the drop-down menu select the
client identity group to use with this security setting. For more information, see
Fingerprinting on page
Clear
Overrides. This will remove all overrides
8-23.
5 - 335
Device

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents