Overriding A Profile's Security Configuration - Motorola AP-6511 Reference Manual

Access point
Hide thumbs Also See for AP-6511:
Table of Contents

Advertisement

7. Select the
OK
configuration.

5.4.3 Overriding a Profile's Security Configuration

A profile can have its own firewall policy, wireless client role policy, WEP shared key authentication, NAT
policy and VPN policy applied. If an existing firewall, client role or NAT policy is unavailable, an administrator
can be navigated from the
portion of the UI to create the required security policy configuration. Once created, a policy's configuration
can have an override applied as needed to meet the changing data protection requirements of a device's
deployed environment. However, in doing so this device must now be managed separately from the profile
configuration shared by other device models within the network.
For more information on applying an override to an existing device profile, refer to the following sections:
Overriding a Profile's General Security Settings
Overriding a Profile's Certificate Revocation List (CRL) Configuration
Overriding a Profile's NAT Configuration
button to save the changes and overrides. Select
Configuration
>
Profiles
Reset
to revert to the last saved
section of the UI to the
Configuration
Device Configuration
>
Security
5-63

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents