User's Manual
Installation and Configuration Guide: Airgo Access Point 135
7
Managing Security
This chapter describes the encryption and authentication features of the Airgo Access Point and
explains how to set the security configuration. The chapter includes the following topics:
• Introduction
• Configuring Wireless Security
• Configuring Authentication Zones
• Configuring Administrator Security
• Viewing Security Statistics
• Configuring Advanced Parameters
Introduction
Airgo offers the strongest available security options for wireless networking, as listed here and
illustrated in Figure 101:
• AP Security verifies the identity of individual APs and authorizes them to be part of the
wireless network. APs can be enrolled individually or pre-enrolled as group. The process uses a
certificate and password to fully verify the identity of the AP. By clearly identifying which APs
belong to the authorized set, the enrollment process can also help identify unauthorized or
rogue APs.
• Administrator security authorizes designated users to access the configuration and management
capabilities of the AP using HTTPS, SSH, or SNMPv3 for the web interface, CLI, or network
management system.
• User security encompasses authentication and encryption. Authentication verifies the identity
of individual users and gives them access to the network, restricted to specific network service
profiles. Once the network and authenticated users are in place, data encryption protects the
privacy of user data transmitted over the wireless network.
• Guest access security provides password or custom access control for guest users, including the
configuration of a guest-VLAN for Internet access and session management.
NOTE: For information on security for access point enrollment, refer to Chapter 9,
“Managing the Network.”