1 configuring wlan security settings, Configuring wlan security settings -11 – Symbol Technologies AP-5131 User Manual

Page 73

Advertising
background image

Getting Started

3-11

a. Enter the Extended Services Set Identification (ESSID) and name associated with the

WLAN. For additional information on creating and editing up to 16 WLANs per AP-5131,
see

Creating/Editing Individual WLANs on page 5-24

.

b. Use the

Available On

checkboxes to define whether the target WLAN is operating over

the 802.11a or 802.11b/g radio. Ensure the radio selected has been enabled (see step 8).

c. Even an AP-5131 configured with minimal values must protect its data against theft and

corruption. A security policy should be configured for WLAN1 as part of the basic
configuration outlined in this guide. A security policy can be configured for the WLAN
from within the

Quick Setup

screen. Policies can be defined over time and saved to be

used as needed as the AP-5131’s security requirements change. Symbol recommends
you familiarize yourself with the security options available on the AP-5131 before
defining a security policy. Refer to

Configuring WLAN Security Settings on page 3-11

.

10. Click

Apply

to save any changes to the AP-5131 Quick Setup screen. Navigating away from

the screen without clicking Apply results in all changes to the screens being lost.

11. Click

Undo Changes

(if necessary) to undo any changes made. Undo Changes reverts the

settings displayed on the AP-5131 Quick Setup screen to the last saved configuration.

3.5.1.1 Configuring WLAN Security Settings

To configure a basic security policy for a WLAN:

1.

From the AP-5131 Quick Setup screen, click the

Create

button to the right of the Security

Policy item.

The

New Security Policy

screen displays with the

Manually Pre-shared key/No

authentication

and

No Encryption

options selected. Naming and saving such a policy (as

is) would provide no security and might only make sense in a guest network wherein no
sensitive data is either transmitted or received. Consequently, at a minimum, a basic
security scheme (in this case WEP 128) is recommended in a network environment wherein
sensitive data is transmitted.

2.

Ensure the

Name

of the security policy entered suits the intended configuration or function

of the policy.

NOTE

For information on configuring the other encryption and authentication
options available to the AP-5131, see

Configuring Security Options on

page 6-2

.

Advertising