Motorola AP-51 Series Product Reference Manual page 232

Hide thumbs Also See for AP-51 Series:
Table of Contents

Advertisement

6-6
AP-51xx Access Point Product Reference Guide
Encryption applies a specific algorithm to alter its appearance and prevent unauthorized reading.
Decryption applies the algorithm in reverse to restore the data to its original form. Sender and
receiver must employ the same encryption/decryption method to interoperate.
Wired Equivalent Privacy (WEP) is available in two encryption modes: 40 bit (also called WEP 64) and
104 bit (also called WEP 128). The 104-bit encryption mode provides a longer algorithm (better
security) that takes longer to decode (hack) than the 40-bit encryption mode.
Each WLAN (16 WLANs available in total to an access point regardless of the model) can have a
separate security policy. However, more than one WLAN can use the same security policy. Therefore,
to avoid confusion, do not name security policies the same name as WLANs. Once security policies
have been created, they are selectable within the
existing default security policy does not satisfy the data protection requirements of a specific WLAN,
a new security policy (using the authentication and encryption schemes discussed above) can be
created.
To enable an existing WLAN security policy or create a new policy:
1. Select
Network Configuration
The
Security Configuration
2. If a new security policy is required, click the
The
New Security Policy
authentication
is) would provide no security and might only make sense in a guest network wherein no
sensitive data is either transmitted or received.
However, selecting any other authetnication or encryption checkbox displays a configuration
field for the selected security scheme within the
NOTE An existing security policy can be edited from the Security Configuration
3. Use the
Remember, multiple WLANs can share the same security policy, so be careful not to name
security policies after specific WLANs or risk defining a WLAN to single policy. Motorola
recommends naming the policy after the attributes of the authentication or encryption type
selected (for example, WPA2 Allow TKIP).
screen displays with the
and
No Encryption
screen by selecting an existing policy and clicking the
Edit Security Policy
editing an existing security policy, refer to security configuration sections
described in steps 4 and 5.
Name
field to define a logical security policy name.
Security
field of each
->
Wireless
->
Security
screen
displays.
Create
options selected. Naming and saving such a policy (as
New Security Policy
screen to edit the policy. For more information on
WLAN
screen. If the
from the access point menu tree.
button.
Manually Pre-shared key/No
screen.
Edit
button. Use the

Advertisement

Table of Contents
loading

Table of Contents