Security Deployment Considerations - Motorola WiNG 5.4.2 System Reference Manual

Table of Contents

Advertisement

8 - 30 WiNG 5.4.2 Access Point System Reference Guide

8.6 Security Deployment Considerations

Security Configuration
Before defining a Firewall supported configuration, refer to the following deployment guidelines to ensure the configuration is
optimally effective:
• Firewalls implement access control policies, so if you don't have an idea of what kind of access to allow or deny, a Firewall
is of little value.
• It's important to recognize the Firewall's configuration is a mechanism for enforcing a network access policy.
• A role based Firewall requires an advanced security license to apply inbound and outbound Firewall policies to users and
devices. Role based firewalls are not supported on AP6511 and AP6521 model access points.
• Firewalls cannot protect against tunneling over application protocols to poorly secured wireless clients.
• Firewalls should be deployed on WLANs implementing weak encryption to minimize access to trusted networks and hosts
in the event the WLAN is compromised.
• Firewalls should be enabled when providing Captive Portal guest access. Firewalls should be applied to Captive Portal
enabled WLANs to prevent guest user traffic from being routed to trusted networks and hosts.
Before configuring WIPS support, refer to the following deployment guidelines to ensure the configuration is optimally
effective:
• WIPS is best utilized when deployed in conjunction with a corporate or enterprise wireless security policy. Since an
organization's security goals vary, the security policy should document site specific concerns. The WIPS system can then be
modified to support and enforce these additional security policies
• WIPS reporting tools can minimize dedicated administration time. Vulnerability and activity reports should automatically
run and be distributed to the appropriate administrators. These reports should highlight areas to be to investigated and
minimize the need for network monitoring.
• It is important to keep your WIPS system firmware and software up to date. A quarterly system audit can ensure firmware
and software versions are current.
• Only a trained wireless network administrator can determine the criteria used to authorize or ignore devices. You may want
to consider your organization's overall security policy and your tolerance for risk versus users' need for network access.
Some questions that may be useful in deciding how to classify a device are:
• Does the device conform to any vendor requirements you have?
• What is the signal strength of the device? Is it likely the device is outside your physical radio coverage area?
• Is the detected access point properly configured according to your organization's security policies?
• Motorola Solutions recommends trusted and known access points be added to an sanctioned AP list. This will minimize the
number of unsanctioned AP alarms received.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents