Extreme Networks Altitude 4700 Series Product Reference Manual page 153

Software version 4.1
Hide thumbs Also See for Altitude 4700 Series:
Table of Contents

Advertisement

NOTE
When the access point is first launched, a single security policy (default) is available and mapped to
WLAN 1. It is anticipated numerous additional security policies will be created as the list of WLANs grows.
Configuring a WLAN security scheme with a discussion of all the authentication and encryption
options available is beyond the scope of this chapter. See
page 197
for more details on configuring access point security.
For detailed information on the authentication and encryption options available to the access point
and how to configure them, see to
section that describes your intended security scheme.
2 Click Logout to exit the Security Configuration screen.
Configuring a WLAN Access Control List (ACL)
An Access Control List (ACL) affords a system administrator the ability to grant or restrict MU access by
specifying an MU MAC address or range of MAC addresses to either include or exclude from access
point connectivity. Use the Mobile Unit Access Control List Configuration screen to create new ACL
policies (using the New MU ACL Policy sub-screen) or edit existing policies (using the Edit MU ACL
Policy sub-screen). Once new policies are defined, they are available for use within the New WLAN or
Edit WLAN screens to assign to specific WLANs based on MU interoperability requirements.
Extreme Networks recommends using the New MU ACL Policy or Edit MU ACL Policy screens
strategically to name and configure ACL policies meeting the requirements of the particular WLANs
Altitude 4700 Series Access Point Product Reference Guide
"Configuring Access Point Security" on
"Configuring Security Options" on page 197
and locate the
153

Advertisement

Table of Contents
loading

Table of Contents