Configuring Security Options - Symbol AP-51xx Product Reference Manual

Table of Contents

Advertisement

6-2
AP-51xx Access Point Product Reference Guide
NOTE Security for the access point can be configured in various locations

6.1 Configuring Security Options

To configure the data protection options available on the access point, refer to the following:
• To set an administrative password for secure access point logins, see
Setting Passwords on page
• Refer to
Enabling Authentication and Encryption Schemes on page 6-5
policy screens used to configure the authetication and encryption schemes available to the
access point. These security policies can be used on more than one WLAN.
• To create a security policy supporting 802.1x EAP, see
Configuring 802.1x EAP Authentication on page
• To define a security policy supporting Kerberos, see,
Configuring Kerberos Authentication on page
• To create a security policy supporting WEP, see
Configuring WEP Encryption on page
• To configure a security policy supporting KeyGuard, see,
Configuring KeyGuard Encryption on page
• To define a security policy supporting WPA-TKIP, see
Configuring WPA/WPA2 Using TKIP on page
• To create a security policy supporting WPA2-CCMP, see
Configuring WPA2-CCMP (802.11i) on page
• To configure the access point to block specific kinds of HTTP, SMTP and FTP data traffic, see
Configuring Firewall Settings on page
• To create VPN tunnels allowing traffic to route securely through a IPSEC tunnel to a private
network, see
• To configure the access point to block transmissions with devices detected as Rogue AP's
(hostile devices), see
throughout the access point menu structure. This chapter outlines the
security options available to the access point, and the menu locations and
steps required to configure specific security measures.
6-3.
Configuring VPN Tunnels on page
Configuring Rogue AP Detection on page
6-11.
6-8.
6-16.
6-18.
6-21.
6-24.
6-27.
6-36.
to display security
6-55.

Advertisement

Table of Contents
loading

Table of Contents