SonicWALL 4500 User Manual

Page of 74
Page 52
  Deploying SonicPoints for Wireless Access  
Note:
If you have configured WPA2 as your authentication 
type, you do not need to enable WiFiSec.
If you have enabled WiFiSec Enforcement, you can 
specify the following:
Select WiFiSec Exception Service to select 
services that are allowed to bypass the WiFiSec 
enforcement.
Select Require WiFiSec for Site-to-Site VPN 
Tunnel Traversal 
to require WiFiSec security for 
all wireless connections through the WLAN zone 
that are part of a Site-to-Site VPN.
If you wish to run WPA or WPA2 in addition to 
WiFiSec, you can select Trust WPA/WPA2 traffic 
as WiFiSec 
to accept WPA and WPA2 as  
allowable alternatives to IPsec.
Under SonicPoint Settings, select the SonicPoint 
Provisioning Profile 
you want to apply to all 
SonicPoints connected to this zone. Whenever a 
SonicPoint connects to this zone, it will automatically 
be provisioned by the settings in the SonicPoint 
Provisioning Profile, unless you have individually 
configured it with different settings. 
5.
Optionally configure the settings on the Guest Services 
tab. For information about configuring Guest Services, see 
the SonicOS Enhanced Administrator’s Guide
6.
When finished, click OK.
Assigning an Interface to the Wireless Zone
Once the wireless zone is configured, you can assign an 
interface to it. This is the interface where you will connect the 
SonicPoint.
1.
On the Network > Interfaces page, click the Configure 
icon in the row for the interface that you want to use, for 
example, X3. The interface must be unassigned.
2.
In the Edit Interface dialog box on the General tab, select 
WLAN or the zone that you created from the Zone drop-
down list. Additional fields are displayed.
3.
Enter the IP address and subnet mask of the zone in the IP 
Address and Subnet Mask fields.
4.
In the SonicPoint Limit field, select the maximum number 
of SonicPoints allowed on this interface. 
5.
If you want to enable remote management of the 
SonicWALL security appliance from this interface, select 
the supported management protocol(s): HTTPHTTPS
SSHPingSNMP, and/or SSH.
6.
If you want to allow selected users with limited 
management rights to log in to the security appliance, 
select HTTP and/or HTTPS in User Login.
7.
Click OK.