Configuring access point security, Chapter 6. configuring access point security, Chapter 6, configuring access point security – Symbol Technologies AP-5131 User Manual

Page 187: Chapter 6, configuring

Advertising
background image

Configuring Access Point Security

Security measures for the AP-5131 and its WLANs are critical. Use the available AP-5131 security
options to protect the AP-5131 LAN from wireless vulnerabilities, and safeguard the transmission of
RF packets between the AP-5131 and its associated MUs.

WLAN security can be configured on an ESS by ESS basis on the AP-5131. Sixteen separate ESSIDs
(WLANs) can be supported on an AP-5131, and must be managed (if necessary) between the 802.11a
and 802.11b/g radio. The user has the capability of configuring separate security policies for each
WLAN. Each security policy can be configured based on the authentication (Kerberos, 802.1x EAP) or
encryption (WEP, KeyGuard, WPA/TKIP or WPA2/CCMP) scheme best suited to the coverage area that
security policy supports.

The AP-5131 can also create VPN tunnels to securely route traffic through a IPSEC tunnel and block
transmissions with devices interpreted as Rogue APs.

Advertising