Switch Policies; Security Policies - Symbol WS5000 series Reference Manual

Hide thumbs Also See for WS5000 series:
Table of Contents

Advertisement

4-22
WS5000 Series Switch System Reference Guide

4.4 Switch Policies

A Switch Policy acts as a container for many other policies, and contains an "adoption list" that controls the
types of access ports (APs) that can be adopted. Therefore, to be logical, the other policies and related
components—Security Policy, ACL List(s), WLANs, Ethernet Policy, and Access Port Policy—should be created
prior to creating the Switch Policy. (However, this is not mandatory. The Switch Policy Wizard allows the
administrator to create the "other" policies along the way, as well, if desired.)
To see the configuration hierarchy while creating an Wireless Switch Policy, click Where Am I? at any point.
A Where Am I? Dialog Box, such as
Figure 4.25 Wireless Switch Policy Where Am I? Dialog Box
See the following sections for more details on working with Switch Policies and related components that
comprise a Switch Policy:
Security Policies on page 4-22
Access Control Lists on page 4-29
WLANs on page 4-32
Ethernet Port Policies on page 4-36
Setting the Country on page 4-47
Creating a Switch Policy on page 4-47
Defining/Activating an Emergency Switch Policy on page 4-52

4.4.1 Security Policies

A Security Policy defines the authentication and encryption methods that are used to secure communication
between the WS5000 Series switch, through its APs, and on to the mobile units. Each WLAN can have a
different security policy associated with it.
To see the configuration hierarchy while creating a Security Policy, click Where Am I? at any point. A Where
Am I? Dialog Box, such as
Figure
Figure
4.25, is displayed.
4.26, is displayed.

Advertisement

Table of Contents
loading

Table of Contents