Motorola Solutions AP-6511 Access Point System Reference Guide
8-12
8.1.4 Firewall Deployment Considerations
Configuring a Firewall Policy
Before defining a Firewall supported configuration, refer to the following deployment guidelines to ensure
the configuration is optimally effective:
• Firewalls implement access control policies, so if you don't have an idea of what kind of access to allow
or deny, a Firewall is of little value.
• It's important to recognize the Firewall's configuration is a mechanism for enforcing a network access
policy.
• A role based Firewall requires an advanced security license to apply inbound and outbound Firewall
policies to users and devices.
• Firewalls cannot protect against tunneling over application protocols to poorly secured wireless clients.
• Firewalls should be deployed on WLANs implementing weak encryption to minimize access to trusted
networks and hosts in the event the WLAN is compromised.
• Firewalls should be enabled when providing Hotspot guest access. Firewall policies should be applied to
Hotspot enabled WLANs to prevent guest user traffic from being routed to trusted networks and hosts.