Motorola AP-51XX 사용자 설명서

다운로드
페이지 698
AP-51xx Access Point Product Reference Guide
3-12
a. Enter the Extended Services Set Identification (ESSID) and name associated with the 
WLAN. For additional information on creating and editing up to 16 WLANs per access 
point, see 
.
b. Use the 
Available On
 checkboxes to define whether the target WLAN is operating over 
the 802.11a or 802.11b/g radio. Ensure the radio selected has been enabled (see step 8).
c. Even an access point configured with minimal values must protect its data against theft 
and corruption. A security policy should be configured for WLAN1 as part of the basic 
configuration outlined in this guide. A security policy can be configured for the WLAN 
from within the 
Quick Setup 
screen. Policies can be defined over time and saved to be 
used as needed as security requirements change. Motorola recommends you familiarize 
yourself with the security options available on the access point before defining a 
security policy. Refer to 
10. Click 
Apply 
to save any changes to the access point Quick Setup screen. Navigating away 
from the screen without clicking Apply results in all changes to the screens being lost.
11. Click 
Undo Changes
 (if necessary) to undo any changes made. Undo Changes reverts the 
settings displayed on the access point Quick Setup screen to the last saved configuration. 
3.5.1.1 Configuring WLAN Security Settings
To configure a basic security policy for a WLAN:
1.
From the access point Quick Setup screen, click the 
Create 
button to the right of the Security 
Policy item.
The 
New Security Policy
 screen displays with the 
Manually Pre-shared key/No 
authentication
 and 
No Encryption
 options selected. Naming and saving such a policy (as 
is) would provide no security and might only make sense in a guest network wherein no 
sensitive data is either transmitted or received. Consequently, at a minimum, a basic 
security scheme (in this case WEP 128) is recommended in a network environment wherein 
sensitive data is transmitted.
2.
Ensure the 
Name
 of the security policy entered suits the intended configuration or function 
of the policy.
Multiple WLANs can share the same security policy, so be careful not to name security 
policies after specific WLANs or risk defining a WLAN to single policy. Motorola 
NOTE
For information on configuring the other encryption and authentication 
options available to the access point, see