
Altitude 3500 Series Access Point Product Reference Guide
169
C H A P T E R
6
Configuring Access Point
Security
Security measures for the Altitude 35xx and its WLANs are critical. Use the available Altitude 35xx
security options to protect the Altitude 35xx LAN from wireless vulnerabilities, and safeguard the
transmission of RF packets between the Altitude 35xx and its associated MUs.
WLAN security can be configured on an ESS by ESS basis on the Altitude 35xx. Sixteen separate ESSIDs
(WLANs) can be supported on an Altitude 35xx, and must be managed (if necessary) between the
802.11a and 802.11b/g radio. The user has the capability of configuring separate security policies for
each WLAN. Each security policy can be configured based on the authentication (Kerberos, 802.1x EAP)
or encryption (WEP, KeyGuard, WPA/TKIP or WPA2/CCMP) scheme best suited to the coverage area
that security policy supports.
The Altitude 35xx can also create VPN tunnels to securely route traffic through a IPSEC tunnel and
block transmissions with devices interpreted as Rogue APs.
NOTE
Security for the Altitude 35xx can be configured in various locations throughout the Altitude 35xx menu
structure. This chapter outlines the security options available to the Altitude 35xx, and the menu locations and steps
required to configure specific security measures.
Configuring Security Options
To configure the data protection options available on the Altitude 35xx, refer to the following:
●
To set an administrative password for secure Altitude 35xx logins, see
“Setting Passwords” on
page 170
.
●
To display security policy screens used to configure the authentication and encryption schemes
available to the Altitude 35xx, see
“Enabling Authentication and Encryption Schemes” on page 172
.
These security policies can be used on more than one WLAN.
●
To create a security policy supporting 802.1x EAP, see
“Configuring 802.1x EAP Authentication” on
page 176
.
●
To define a security policy supporting Kerberos, see,
“Configuring Kerberos Authentication” on
page 174
.
●
To create a security policy supporting WEP, see
“Configuring WEP Encryption” on page 179
.
Summary of Contents for Altitude 3500 Series
Page 10: ...Altitude 3500 Series Access Point Product Reference Guide 10...
Page 34: ...Introduction Altitude 3500 Series Access Point Product Reference Guide 34...
Page 66: ...Getting Started Altitude 3500 Series Access Point Product Reference Guide 66...
Page 112: ...System Configuration Altitude 3500 Series Access Point Product Reference Guide 112...
Page 168: ...Network Management Altitude 3500 Series Access Point Product Reference Guide 168...
Page 258: ...Monitoring Statistics Altitude 3500 Series Access Point Product Reference Guide 258...
Page 537: ...Altitude 3500 Series Access Point Product Reference Guide 537 3 Define a mesh supported WLAN...
Page 570: ...Adaptive AP Altitude 3500 Series Access Point Product Reference Guide 570...
Page 592: ...Altitude 3500 Series Access Point Product Reference Guide 592...
Page 594: ...Altitude 3500 Series Access Point Product Reference Guide 594...