Motorola AP-7131 Product Reference Manual page 606

Hide thumbs Also See for AP-7131:
Table of Contents

Advertisement

9-12
AP-7131 Access Point Product Reference Guide
If none of the existing policies are suitable, select the
Security Policy
network. For information on configuring a security using the authentication and
encryption techniques available to the
access point, see
8. ACL policies should be configured to allow or deny a range of MAC addresses from
interoperating with the WLAN used with the mesh network. ACLs should be defined
based on the client bridge and repeater (an access point defined as both a base and
client bridge) association requirements within the mesh network.
For information on defining an ACL for use with the WLAN assigned to the mesh
network, see
NOTE The
9. Select the
interacting with each other both within this WLAN, as well as other WLANs.
Selecting this option could be a good idea, if restricting device "chatter" improves mesh
network performance. If base bridges and client bridges are added at any given time to
extent the coverage are of a mesh network, the data going back and forth amongst just
those radios could be compromised by network interference. Adding mesh device traffic
could jeopardize network throughput. If however, MU to MU communication is central
to the organization (for example, scanners sharing data entry information) then this
checkbox should remain unselected.
drop-down menu and configure a policy suitable for the mesh
Enabling Authentication and Encryption Schemes on page
Configuring a WLAN Access Control List (ACL) on page
Kerberos User Name
ignored, as Kerberos is not supported as a viable authentication scheme
within a mesh network.
Disallow MU to MU Communication
Create
and
Kerberos Password
checkbox to restrict MUs from
button to the right of the
6-5.
5-36.
fields can be

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents