
10 - 12 WiNG 5.4.2 Access Point System Reference Guide
10.6 Management Access Deployment Considerations
Before defining an access control configuration as part of a Management Access policy, refer to the following deployment
guidelines to ensure the configuration is optimally effective:
• Unused management protocols should be disabled to reduce a potential attack.
• Use management interfaces providing encryption and authentication. Management services like HTTPS, SSH and SNMPv3
should be used when possible, as they provide both data privacy and authentication.
• By default, SNMPv2 community strings on most devices are set to
public
for the read-only community string and
private
for
the read-write community string. Legacy Motorola Solutions devices may use other community strings by default.
• Motorola Solutions recommends SNMPv3 be used for device management, as it provides both encryption, and
authentication.
• Enabling SNMP traps can provide alerts for isolated attacks at both small radio deployments or distributed attacks occurring
across multiple sites.
Summary of Contents for WiNG 5.4.2
Page 1: ...Motorola Solutions WiNG 5 4 2 ACCESS POINT SYSTEM REFERENCE GUIDE ...
Page 2: ......
Page 20: ...xvi WiNG 5 4 2 Access Point System Reference Guide ...
Page 24: ...1 4 WiNG 5 4 2 Access Point System Reference Guide ...
Page 36: ...2 12 WiNG 5 4 2 Access Point System Reference Guide ...
Page 54: ...3 18 WiNG 5 4 2 Access Point System Reference Guide ...
Page 358: ...6 2 WiNG 5 4 2 Access Point System Reference Guide Figure 6 1 Configuration Wireless menu ...
Page 462: ...6 106 WiNG 5 4 2 Access Point System Reference Guide ...
Page 474: ...7 12 WiNG 5 4 2 Access Point System Reference Guide ...
Page 509: ...9 5 Figure 9 2 Captive Portal Policy screen Basic Configuration tab ...
Page 572: ...11 12 WiNG 5 4 2 Access Point System Reference Guide ...
Page 626: ...12 54 WiNG 5 4 2 Access Point System Reference Guide ...
Page 790: ...A 2 WiNG 5 4 2 Access Point System Reference Guide ...
Page 835: ......