Chapter 8 Security Configuration - Motorola AP-6511 Reference Manual

Access point
Hide thumbs Also See for AP-6511:
Table of Contents

Advertisement

When taking precautions to secure wireless traffic from a client to an Access Point, the network
administrator should not lose sight of the security solution in it's entirety, since the chain is as weak as its
weakest link. A Motorola wireless network provides seamless data protection and user validation to protect
and secure data at each vulnerable point in the network. This security is offered at the most granular level,
with role and location based secure access available to users based on identity as well as the security
posture of the client device.
There are multiple dimensions to consider when addressing the security of an AP-6511 managed network,
including:
Wireless Firewall
Intrusion Prevention
Security Configuration
8-1

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents