Step 6: configure wlan security – Symbol Technologies WS 2000 User Manual

Page 31

Advertising
background image

Step 6: Configure WLAN Security

Within the WLAN window, the administrator changes both standard and advanced
configuration features of the WLAN.

Field Description

Name

Rename the WLAN in this field, if desired. Character spaces are allowed.
This change affects several other screens and the interface will also change
the name in the left menu tree. Symbol Technologies recommends the use
of descriptive names for WLANs.

ESSID

Specify an Extended Service Set Identification (ESSID) for the WLAN. The
ESSID is a alphanumeric string up to 32 characters. Its purpose is to
identify one or more access ports that are associated with the WLAN.

Subnet

This field provides a pull-down list of the enabled subnets. Select the
subnet to associate with the current WLAN.

The lower section of the WLAN window provides several advanced settings that the
administrator might need to modify; however, the default settings are typically sufficient for
most installations. For more information, refer to How to Configure the Advanced WLAN
Settings.

Step 6: Configure WLAN Security

In the previous step, the administrator set parameters for each WLAN that fine tune the
performance of the WLAN. In addition, the administrator can set the type and level of
security for each WLAN. These security measures do not control communications from the
WAN; instead, they control communication from the clients within the WLAN.

In the Network Configuration --> Wireless --> <WLAN name> --> <WLAN Name>
Security screen, the administrator can set the user authentication method and the
encryption method, as well as define a set of rules that control which MUs can
communicate through the WLAN.

Copyright © 2004 Symbol Technologies, Inc. All Rights Reserved

31

WS 2000 Wireless Switch: 1.0 Date of last Revision: March 2004

Advertising