1 configuring security options, Configuring security options -2, Configuring security options on – Symbol Technologies AP-5131 User Manual

Page 188

Advertising
background image

AP-5131 Access Point Product Reference Guide

6-2

6.1 Configuring Security Options

To configure the data protection options available on the AP-5131, refer to the following:

To set an administrative password for secure AP-5131 logins, see

Setting Passwords on page 6-3

.

Refer to

Enabling Authentication and Encryption Schemes on page 6-5

to display security

policy screens used to configure the authetication and encryption schemes available to the
AP-5131. These security policies can be used on more than one WLAN.

To create a security policy supporting 802.1x EAP, see

Configuring 802.1x EAP Authentication on page 6-11

.

To define a security policy supporting Kerberos, see,

Configuring Kerberos Authentication on page 6-9

.

To create a security policy supporting WEP, see

Configuring WEP Encryption on page 6-16

.

To configure a security policy supporting KeyGuard, see,

Configuring KeyGuard Encryption on page 6-18

.

To define a security policy supporting WPA-TKIP, see

Configuring WPA Using TKIP on page 6-20

.

To create a security policy supporting WPA2-CCMP, see

Configuring WPA2-CCMP (802.11i) on page 6-22

.

To configure the AP-5131 to block specific kinds of HTTP, SMTP and FTP data traffic, see

Configuring Firewall Settings on page 6-25

.

To create VPN tunnels allowing traffic to route securely through a IPSEC tunnel to a private
network, see

Configuring VPN Tunnels on page 6-34

.

To configure the AP-5131 to block transmissions with devices detected as Rogue AP’s
(hostile devices), see

Configuring Rogue AP Detection on page 6-53

.

NOTE

Security for the AP-5131 can be configured in various locations throughout
the AP-5131 menu structure. This chapter outlines the security options
available to the AP-5131, and the menu locations and steps required to
configure specific security measures.

Advertising