Introduction
1-13
Authentication Code (CBC-MAC)
technique. Changing just one bit in a message produces a totally
different result.
WPA2-CCMP is based on the concept of a
Robust Security Network (RSN),
which defines a hierarchy
of keys with a limited lifetime (similar to TKIP). Like TKIP, the keys the administrator provides are used
to derive other keys. Messages are encrypted using a 256-bit secret key and a 256-bit block of data.
The end result is an encryption scheme as secure as any the access point provides.
For detailed information on WPA2-CCMP, see
Configuring WPA2-CCMP (802.11i) on page 6-12
.
1.2.11.3 Firewall Security
A firewall keeps personal data in and hackers out. The access point’s firewall prevents suspicious
Internet traffic from proliferating the access point managed network. The access point performs
Network Address Translation
(NAT) on packets passing to and from the WAN port. This combination
provides enhanced security by monitoring communication with the wired network.
For detailed information on configuring the access point’s firewall, see
Configuring Firewall Settings
on page 6-14
.
1.2.11.4 VPN Tunnels
Virtual Private Networks (VPNs)
are IP-based networks using encryption and tunneling providing
users remote access to a secure LAN. In essence, the trust relationship is extended from one LAN
across the public network to another LAN, without sacrificing security. A VPN behaves like a private
network; however, because the data travels through the public network, it needs several layers of
security. The access point can function as a robust VPN gateway.
For detailed information on configuring VPN security support, see
Configuring VPN Tunnels on page
6-23
.
1.2.11.5 Content Filtering
Content filtering allows system administrators to block specific commands and URL extensions from
going out through the WAN port. Therefore, content filtering affords system administrators selective
control on the content proliferating the network and is a powerful screening tool. Content filtering
allows the blocking of up to 10 files or URL extensions and allows blocking of specific outbound
requests.
For detailed information on configuring content filtering support, see
Configuring Content Filtering
Settings on page 6-41
.
Summary of Contents for AP-7131N-FGR
Page 1: ...AP 7131N FGR Access Point Product Reference Guide ...
Page 3: ...AP 7131N FGR Access Point Product Reference Guide 72E 126727 01 Revision A September 2009 ...
Page 4: ......
Page 55: ...Hardware Installation 2 11 ...
Page 68: ...AP 7131N FGR Access Point Product Reference Guide 2 24 ...
Page 90: ...AP 7131N FGR Access Point Product Reference Guide 3 22 ...
Page 148: ...AP 7131N FGR Access Point Product Reference Guide 4 58 ...
Page 300: ...AP 7131N FGR Access Point Product Reference Guide 6 72 ...
Page 338: ...AP 7131N FGR Access Point Product Reference Guide 7 38 ...
Page 635: ...Configuring Mesh Networking 9 23 5 Define a channel of operation for the 802 11a n radio ...
Page 648: ...AP 7131N FGR Access Point Product Reference Guide 9 36 ...
Page 672: ...AP 7131N FGR Access Point Product Reference Guide 10 24 line con 0 line vty 0 24 end ...
Page 692: ...AP 7131N FGR Access Point Product Reference Guide B 14 ...
Page 698: ...AP 7131N FGR Access Point Product Reference Guide B 20 ...
Page 702: ...AP 7131N FGR Access Point Product Reference Guide C 4 ...
Page 707: ......