1 configuring wlan security settings, Configuring wlan security settings -11 – Symbol Technologies AP-5131 User Manual
Page 73

Getting Started
3-11
a. Enter the Extended Services Set Identification (ESSID) and name associated with the
WLAN. For additional information on creating and editing up to 16 WLANs per AP-5131,
see
Creating/Editing Individual WLANs on page 5-24
.
b. Use the
Available On
checkboxes to define whether the target WLAN is operating over
the 802.11a or 802.11b/g radio. Ensure the radio selected has been enabled (see step 8).
c. Even an AP-5131 configured with minimal values must protect its data against theft and
corruption. A security policy should be configured for WLAN1 as part of the basic
configuration outlined in this guide. A security policy can be configured for the WLAN
from within the
Quick Setup
screen. Policies can be defined over time and saved to be
used as needed as the AP-5131’s security requirements change. Symbol recommends
you familiarize yourself with the security options available on the AP-5131 before
defining a security policy. Refer to
Configuring WLAN Security Settings on page 3-11
10. Click
Apply
to save any changes to the AP-5131 Quick Setup screen. Navigating away from
the screen without clicking Apply results in all changes to the screens being lost.
11. Click
Undo Changes
(if necessary) to undo any changes made. Undo Changes reverts the
settings displayed on the AP-5131 Quick Setup screen to the last saved configuration.
3.5.1.1 Configuring WLAN Security Settings
To configure a basic security policy for a WLAN:
1.
From the AP-5131 Quick Setup screen, click the
Create
button to the right of the Security
Policy item.
The
New Security Policy
screen displays with the
Manually Pre-shared key/No
authentication
and
No Encryption
options selected. Naming and saving such a policy (as
is) would provide no security and might only make sense in a guest network wherein no
sensitive data is either transmitted or received. Consequently, at a minimum, a basic
security scheme (in this case WEP 128) is recommended in a network environment wherein
sensitive data is transmitted.
2.
Ensure the
Name
of the security policy entered suits the intended configuration or function
of the policy.
NOTE
For information on configuring the other encryption and authentication
options available to the AP-5131, see
Configuring Security Options on
.