Device Configuration
5-63
7. Select the
OK
button to save the changes and overrides. Select
Reset
to revert to the last saved
configuration.
5.4.3 Overriding a Profile’s Security Configuration
A profile can have its own firewall policy, wireless client role policy, WEP shared key authentication, NAT
policy and VPN policy applied. If an existing firewall, client role or NAT policy is unavailable, an administrator
can be navigated from the
Configuration
>
Profiles
section of the UI to the
Configuration
>
Security
portion of the UI to create the required security policy configuration. Once created, a policy’s configuration
can have an override applied as needed to meet the changing data protection requirements of a device’s
deployed environment. However, in doing so this device must now be managed separately from the profile
configuration shared by other device models within the network.
For more information on applying an override to an existing device profile, refer to the following sections:
•
Overriding a Profile’s General Security Settings
•
Overriding a Profile’s Certificate Revocation List (CRL) Configuration
•
Overriding a Profile’s NAT Configuration
Содержание AP-6511
Страница 1: ...Motorola Solutions AP 6511 Access Point System Reference Guide ...
Страница 2: ...Motorola Solutions AP 6511 Access Point System Reference Guide 1 2 ...
Страница 24: ...Motorola Solutions AP 6511 Access Point System Reference Guide 2 12 ...
Страница 136: ...Motorola Solutions AP 6511 Access Point System Reference Guide 6 2 Figure 6 1 Configuration Wireless field ...
Страница 318: ...Motorola Solutions AP 6511 Access Point System Reference Guide 10 16 ...
Страница 409: ...Statistics 13 49 Figure 13 31 Access Point Firewall Packet Flow screen ...
Страница 433: ......