Chapter 7 Security Configuration - Motorola Solutions WiNG 5.2.6 Reference Manual

Access point
Table of Contents

Advertisement

CHAPTER 7 SECURITY CONFIGURATION

When taking precautions to secure wireless traffic from a client to an access point, the network administrator should not
lose sight of the security solution in it's entirety, since the network's chain is as weak as its weakest link. An access point
managed wireless network provides seamless data protection and user validation to protect and secure data at each
vulnerable point in the network. This security is offered at the most granular level, with role and location based secure
access available to users based on identity as well as the security posture of the client device.
There are multiple dimensions to consider when addressing the security of an access point managed wireless network,
including:
Wireless Firewall
Wireless IPS (WIPS)
Device Categorization

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents