Device Configuration 5 - 123
5.2.7.3 Defining Profile Security Settings
Profile Security Configuration
A profile can leverage existing firewall, wireless client role and WIPS policies and configurations and apply them to the profile’s
configuration. This affords each profile a truly unique combination of data protection policies best meeting the data protection
requirements of the access point’s numerous deployment scenarios.
To define a profile’s security settings:
1. Select the
Configuration
tab from the Web UI.
2. Select
Devices
.
3. Select
System Profile
from the options on left-hand side of the UI.
4. Expand the
Security
menu and select
Settings
.
Figure 5-73
Profile Security - Settings screen
5. Select the
WEP Shared Key Authentication
radio button to require profile supported devices to use a WEP key to access
the network using this profile. The access point, other proprietary routers, and Motorola Solutions clients use the key
algorithm to convert an ASCII string to the same hexadecimal number. Clients without Motorola Solutions adapters need
to use WEP keys manually configured as hexadecimal numbers. This option is disabled by default.
6. Client Identity is a set of unique fingerprints used to identify a class of devices. This information is used to configure
permissions and access rules for devices classes in the network.
Client Identity Group
is a collection of client identities
that identify devices and applies specific permissions and restrictions on these devices. From the drop-down menu select
the client identity group to use with this device profile. For more information, see
Device Fingerprinting on page 8-18
.
7. Select
OK
to save the changes made within the
Settings
screen. Select
Reset
to revert to the last saved configuration.
Содержание AP-7131 Series
Страница 1: ...Motorola Solutions WiNG 5 5 ACCESS POINT SYSTEM REFERENCE GUIDE ...
Страница 2: ......
Страница 3: ...MOTOROLA SOLUTIONS WING 5 5 ACCESS POINT SYSTEM REFERENCE GUIDE MN000160A01 Revision A October 2013 ...
Страница 14: ...x WiNG 5 5 Access Point System Reference Guide ...
Страница 22: ...8 WiNG 5 5 Access Point System Reference Guide ...
Страница 26: ...1 4 WiNG 5 5 Access Point System Reference Guide ...
Страница 74: ...3 36 WiNG 5 5 Access Point System Reference Guide ...
Страница 411: ...Device Configuration 5 325 Figure 5 211 Mesh Point Auto Channel Selection Path Method Root Path Metric screen ...
Страница 428: ...6 2 WiNG 5 5 Access Point System Reference Guide Figure 6 1 Configuration Wireless menu ...
Страница 528: ...6 102 WiNG 5 5 Access Point System Reference Guide ...
Страница 610: ...8 40 WiNG 5 5 Access Point System Reference Guide ...
Страница 615: ...Services Configuration 9 5 Figure 9 2 Captive Portal Policy screen Basic Configuration tab ...
Страница 656: ...9 46 WiNG 5 5 Access Point System Reference Guide ...
Страница 670: ...10 14 WiNG 5 5 Access Point System Reference Guide ...
Страница 682: ...11 12 WiNG 5 5 Access Point System Reference Guide ...
Страница 721: ...Operations 12 39 Figure 12 40 Certificate Management Import New Trustpoint screen ...
Страница 738: ...12 56 WiNG 5 5 Access Point System Reference Guide ...
Страница 890: ...A 2 WiNG 5 5 Access Point System Reference Guide ...
Страница 952: ...B 62 WiNG 5 5 Access Point System Reference Guide ...
Страница 953: ......