Creating And Configuring Wi-Fi Profiles And Vpn Profiles; Creating And Configuring Wi-Fi Profiles; Prerequisites: Creating Wi-Fi Profiles And Vpn Profiles - Blackberry PRD-10459-003 - Enterprise Server For IBM Lotus Domino Administration Manual

Enterprise server for ibm lotus domino version: 5.0 | service pack: 3
Table of Contents

Advertisement

Administration Guide
Creating and configuring Wi-Fi profiles and
VPN profiles

Creating and configuring Wi-Fi profiles

You can use Wi-Fi® configuration settings and optional VPN configuration settings to manage BlackBerry® devices
that can operate on both mobile and Wi-Fi networks.
You can manage the configuration settings for user accounts that are associated with a BlackBerry® Enterprise Server
by creating Wi-Fi profiles. You can create and assign one or more Wi-Fi profiles to a user account or to a group using
a process that is similar to the process you use to create an IT policy and assign it to a user account.
For more information, see the BlackBerry Enterprise Server Feature and Technical Overview.

Prerequisites: Creating Wi-Fi profiles and VPN profiles

You must install and configure wireless access points for your organization's enterprise Wi-Fi® network. Perform the
following actions:
Verify that the access points comply with the IEEE® 802.11a™ standard, IEEE® 802.11b™ standard, or IEEE®
802.11g™ standard.
Verify the number of connections for each access point to make sure that the access points can manage additional
traffic.
Verify that users can roam between access points.
Refer to the documentation for the access points to complete a site survey and assign channels.
If your organization does not use a switched enterprise Wi-Fi network and your organization has multiple
subnets, configure the subnets to cover the same physical area. The configuration can affect how users send or
receive calls.
Assign an SSID to each access point or each group of access points that share an SSID.
If users can roam between the access points, configure all of the relevant SSID profiles on each access point.
If your organization uses NAT traversal, verify that the access points support NAT traversal.
You must configure authentication and encryption for the access points. Perform the following actions:
Configure authentication using a supported authentication method. For example, if your organization uses layer
2 access security, verify that your organization uses one of the supported layer 2 security methods.
Configure encryption using a supported encryption method.
If your organization's environment requires a VPN concentrator, configure a VPN concentrator for VPN access security
using IPsec VPN. See the administrator for your organization's firewall or VPN concentrator to determine the
appropriate configuration settings.
You must configure firewall settings. Perform the following actions:
If your organization use a proxy firewall, configure the proxy server so that it is transparent to users.
200

Creating and configuring Wi-Fi profiles and VPN profiles

19

Advertisement

Table of Contents
loading

Table of Contents