
CHAPTER 7 SECURITY CONFIGURATION
When taking precautions to secure wireless traffic from a client to an access point, the network administrator should not
lose sight of the security solution in it's entirety, since the network’s chain is as weak as its weakest link. An access point
managed wireless network provides seamless data protection and user validation to protect and secure data at each
vulnerable point in the network. This security is offered at the most granular level, with role and location based secure
access available to users based on identity as well as the security posture of the client device.
There are multiple dimensions to consider when addressing the security of an access point managed wireless network,
including:
•
Wireless Firewall
•
Wireless IPS (WIPS)
•
Device Categorization
Summary of Contents for Solutions WiNG 5.2.6
Page 1: ...Motorola Solutions WiNG 5 2 6 Access Point System Reference Guide ...
Page 2: ......
Page 14: ...1 4 WiNG 5 2 6 Access Point System Reference Guide ...
Page 26: ...2 12 WiNG 5 2 6 Access Point System Reference Guide ...
Page 46: ...3 20 WiNG 5 2 6 Access Point System Reference Guide ...
Page 247: ...Device Configuration 5 189 Figure 5 102 Profile Overrides Management Settings screen ...
Page 264: ...6 2 WiNG 5 2 6 Access Point System Reference Guide Figure 6 1 Configuration Wireless ...
Page 392: ...7 32 WiNG 5 2 6 Access Point System Reference Guide ...
Page 438: ...8 46 WiNG 5 6 2 Access Point System Reference Guide ...
Page 514: ...12 12 WiNG 5 2 6 Access Point System Reference Guide Figure 12 6 RF Domain Health screen ...
Page 533: ...Statistics 12 31 Figure 12 18 RF Domain Smart RF Energy Graph ...
Page 597: ...Statistics 12 95 Figure 12 54 Access Point Certificate Trustpoint screen ...
Page 626: ...12 124 WiNG 5 2 6 Access Point System Reference Guide ...
Page 628: ...A 2 WiNG 5 2 6 Access Point System Reference Guide ...
Page 669: ......