EasyManua.ls Logo

Motorola AP-6511 - Chapter 8 Security Configuration

Motorola AP-6511
434 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
8-1
Security Configuration
When taking precautions to secure wireless traffic from a client to an Access Point, the network
administrator should not lose sight of the security solution in it's entirety, since the chain is as weak as its
weakest link. A Motorola wireless network provides seamless data protection and user validation to protect
and secure data at each vulnerable point in the network. This security is offered at the most granular level,
with role and location based secure access available to users based on identity as well as the security
posture of the client device.
There are multiple dimensions to consider when addressing the security of an AP-6511 managed network,
including:
Wireless Firewall
Intrusion Prevention

Table of Contents

Other manuals for Motorola AP-6511

Related product manuals