EasyManua.ls Logo

Check Point UTM-1 Edge - Page 284

Check Point UTM-1 Edge
707 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Overview
270 Check Point UTM-1 Edge User Guide
Network Count Limitations
You can configure a total of eight wireless objects, including any combination of the
following:
The primary WLAN
Up to three virtual access points (VAPs)
Up to seven WDS links
For example, if you configure the primary WLAN and two VAPs, then you can configure
five WDS links, or one more VAP and four WDS links.
When Extended Range (XR) mode is enabled for a wireless object, then it is counted as
two objects. For example, if you configure XR mode for the primary WLAN and one
VAP, they are counted as four wireless objects.
For information on default security policy rules controlling traffic to and from the primary
WLAN and VAPs, see Default Security Policy on page
327.
Wireless Security Protocols
The UTM-1 wireless security appliance supports the following security protocols:
Table 49: Wireless Security Protocols
Security
Protocol
Description
None No security method is used. This option is not recommended, because it
allows unauthorized users to access your wireless network, although you can
still limit access from the wireless network by creating firewall rules. This
method is suitable for creating public access points.

Table of Contents

Related product manuals