EasyManua.ls Logo

Motorola AP-6511 - Overriding a Profiles Security Configuration

Motorola AP-6511
434 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Device Configuration
5-63
7. Select the OK button to save the changes and overrides. Select Reset to revert to the last saved
configuration.
5.4.3 Overriding a Profile’s Security Configuration
A profile can have its own firewall policy, wireless client role policy, WEP shared key authentication, NAT
policy and VPN policy applied. If an existing firewall, client role or NAT policy is unavailable, an administrator
can be navigated from the Configuration > Profiles section of the UI to the Configuration > Security
portion of the UI to create the required security policy configuration. Once created, a policy’s configuration
can have an override applied as needed to meet the changing data protection requirements of a device’s
deployed environment. However, in doing so this device must now be managed separately from the profile
configuration shared by other device models within the network.
For more information on applying an override to an existing device profile, refer to the following sections:
Overriding a Profile’s General Security Settings
Overriding a Profile’s Certificate Revocation List (CRL) Configuration
Overriding a Profile’s NAT Configuration

Table of Contents

Other manuals for Motorola AP-6511

Related product manuals