![Dell SonicPoint ACe Getting Started Manual Download Page 8](http://html.mh-extra.com/html/dell/sonicpoint-ace/sonicpoint-ace_getting-started-manual_86312008.webp)
Dell SonicPoint ACi Getting Started Guide
8
Dell SonicWALL wireless firewalling
When a wireless device uses a Dell SonicPoint ACi wireless
access point to communicate with a wireless device on
another subnet or on a completely different network, traffic
between the devices is forced to traverse the Dell SonicWALL
network security appliance. This traversal enables security
services to be enforced by SonicOS.
Standard practice for wireless firewalling (where one wireless
client is communicating with another) bypasses many of the
critical security services. The following illustration shows the
standard practice for wireless firewalling.
Figure 1. Standard wireless firewalling
Many security products on the market share this potential
vulnerability when two users connected by a common hub or
wireless access point wish to exchange data.
Dell SonicWALL addresses this security shortcoming by
managing the SonicPoint access points from the network
security appliance. This allows complete control of the
wireless space, including zone enforcement of security
services and complete firewalling capabilities.
Figure 2. Secure wireless firewalling
WLAN Zone
Security Services
?
Content Filtering Service
Client Anti-Virus Enforcement
Gateway Anti-Virus
Gateway Anti-Spyware
Intrusion Prevention Service
Other Security Appliance
WLAN Zone
Security Services
SonicWALL
appliance
SonicWALL
SonicPoint
Content Filtering Service
Client Anti-Virus Enforcement
Gateway Anti-Virus
Gateway Anti-Spyware
Intrusion Prevention Service
L
nt