Symbol Technologies AP-5131 User Manual

Page 193

Advertising
background image

Configuring Access Point Security

6-7

3.

Use the

Name

field to define a logical security policy name.

Remember, multiple WLANs can share the same security policy, so be careful not to name
security policies after specific WLANs or risk defining a WLAN to single policy. Symbol
recommends naming the policy after the attributes of the authentication or encryption type
selected (for example, WPA2 Allow TKIP).

4.

Enable and configure an

Authentication

option if necessary for the target security policy.

5.

Enable and configure an

Encryption

option if necessary for the target security policy.

NOTE

An existing security policy can be edited from the Security Configuration
screen by selecting an existing policy and clicking the

Edit

button. Use the

Edit Security Policy

screen to edit the policy. For more information on

editing an existing security policy, refer to security configuration sections
described in steps 4 and 5.

Manually Pre-Shared
Key / No
Authentication

Select this button to disable authentication. This is the default
value for the

Authentication

field.

Kerberos

Select the

Kerberos

button to display the

Kerberos

Configuration

field within the New Security Policy screen. For

specific information on configuring Kerberos, see

Configuring Kerberos Authentication on page 6-9

.

802.1x EAP

Select the

802.1x EAP

button to display the

802.1x EAP Settings

field within the New Security Policy screen. For specific
information on configuring EAP, see

Configuring 802.1x EAP Authentication on page 6-11

.

No Encryption

If

No Encryption

is selected, encryption is disabled for the

security policy. If security is not an issue, this setting avoids the
overhead an encryption protocol causes on the

AP-5131

. No

Encryption is the default value for the Encryption field.

WEP 64 (40-bit key)

Select the

WEP 64 (40 bit key)

button to display the

WEP 64

Settings

field within the New Security Policy screen. For specific

information on configuring WEP 64, see

Configuring WEP Encryption on page 6-16

.

Advertising