Chapter 8, Security Configuration - Motorola WiNG 5.7.1 System Reference Manual

Table of Contents

Advertisement

CHAPTER 8
SECURITY CONFIGURATION
When taking precautions to secure wireless traffic from a client to an access point, the network administrator should not lose
sight of the security solution in it's entirety, since the network's chain is as weak as its weakest link. An access point managed
wireless network provides seamless data protection and user validation to protect and secure data at each vulnerable point in
the network. This security is offered at the most granular level, with role and location based secure access available to users
based on identity as well as the security posture of the client device.
There are multiple dimensions to consider when addressing the security of an access point managed wireless network,
including:
Wireless Firewall
Configuring IP Firewall Rules
Configuring MAC Firewall Rules
Wireless IPS (WIPS)
Device Categorization
Device Fingerprinting
Security Deployment Considerations

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents