Security Configuration
The AP provides several security features to protect your network from unauthorized access.
MAC Access
•
Authentication and Encryption Modes
•
Rogue Scan
•
Hardware Configuration Reset
•
Virtual Local Area Networks (VLANs) are logical groupings of network hosts. Defined by
software settings, other VLAN members or resources appear (to clients) to be on the same
physical segment, no matter where they are attached on the logical LAN or WAN segment.
VLANs simplify traffic flow between clients and their frequently-used or restricted resources.
The AP uses Security Profiles to define allowed wireless clients, and authentication and
encryption types and RADIUS Profiles to define RADIUS Servers used by the system or by a
VLAN.
See the following sections for more information:
VLAN Overview
•
VLANs and Security Profiles
•
VLAN Configuration
•
Security Profiles
•
RADIUS Profiles
•
MAC Access
The MAC Access subtab allows you to build a list of stations, identified by their MAC addresses,
authorized to access the network through the AP. The list is stored inside each AP within your
network. Note that you must reboot the AP for any changes to the MAC Access Control Table to
take effect. Up to 1000 entries can be made in the table.
The MAC ACL Status parameter (on the SSID/VLAN > Wireless subtab) is per VLAN if VLAN
Management is enabled. All other parameters besides MAC ACL Status are configured per AP,
even if VLAN is enabled.
(configured under Configure > Alarms > Rogue Scan)
(configured under Configure > Management > CHRD)
on page 135
on page 139
on page 139
on page 141
on page 121
Security Configuration
Issue 1 September 2004
129