EasyManua.ls Logo

Motorola WiNG 5.5 - Device Categorization

Motorola WiNG 5.5
954 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Security Configuration 8 - 37
8.6 Device Categorization
Security Configuration
A proper classification and categorization of access points and clients can help suppress unnecessary unauthorized access
point alarms, and allow an administrator to focus on alarms on devices actually behaving in a suspicious manner. An intruder
with a device erroneously authorized could potentially perform activities that harm your organization.
Authorized access points and clients are generally known to you and conform with your organization’s security policies.
Unauthorized devices are those detected as interoperating within the network, but have not been approved. These devices
should be filtered to avoid jeopardizing the data managed by the access point and its connected clients. Use the Device
Categorization screen to apply neighboring and sanctioned (approved) filters on peer access points operating in this access
point’s radio coverage area. Detected client MAC addresses can also be filtered based on their classification in this access
point’s coverage area.
To categorize access points and clients as authorized or unauthorized:
1. Select Configuration tab from the Web user interface.
2. Select Security
3. Select Device Categorization to display existing device categorization policies.
Figure 8-23 Device Categorization screen
The Device Categorization screen lists the device authorizations defined thus far.
4. Select Add to create a new Device Categorization policy, Edit to modify the attributes of a selected policy or Delete to
remove obsolete policies from the list of those available.

Table of Contents

Related product manuals