Switch Policies; Security Policies - Symbol WS5000 Series System Reference Manual

Hide thumbs Also See for WS5000 Series:
Table of Contents

Advertisement

3. When done, click Next. An Network Policy Updated Successfully! message panel is displayed.
4. Click Finish to save the updated Network Policy and exit the wizard.
5. Click Close in the Network Policy Manager panel.

6.2 Switch Policies

A Switch Policy acts as a container for many other policies, and contains an "adoption list" that controls the
types of access ports (APs) that can be adopted. Therefore, to be logical, the other policies and related
components—Security Policy, ACL List(s), WLANs, Ethernet Policy, and Access Port Policy—should be created
prior to creating the Switch Policy. (However, this is not mandatory. The Switch Policy Wizard allows the
administrator to create the "other" policies along the way, as well, if desired.)
To see the configuration hierarchy while creating an Wireless Switch Policy, click Where Am I? at any point.
A Where Am I? Dialog Box, such as
Figure 6.58 Wireless Switch Policy Where Am I? Dialog Box
See the following sections for more details on working with Switch Policies and related components that
comprise a Switch Policy:
Security Policies on page 6-39
Access Control Lists on page 6-47
WLANs on page 6-50
Ethernet Port Policies on page 6-55
Setting the Country on page 6-66
Creating a Switch Policy on page 6-66
Defining/Activating an Emergency Switch Policy on page 6-71

6.2.1 Security Policies

A Security Policy defines the authentication and encryption methods used to secure communication between
the WS5000 Series switch, through its APs, and on to the mobile units. Each WLAN can have a different
security policy associated with it.
You can enable VPN authentication in the security policy only by using the CLI.
Figure
6.58, is displayed.
6-39
Configuring Policies

Advertisement

Table of Contents
loading

Table of Contents