Specifications

Motorola Solutions AP-7131N-FGR Access Point Product Reference Guide
6-2
6.1 Configuring Security Options
To configure the data protection options available on the access point, refer to the following:
To set an administrative password for secure access point logins, see Setting Passwords on
page 6-2.
To display security policy screens used to configure the authetication and encryption
schemes available to the access point, see Enabling Authentication and Encryption Schemes
on page 6-4. These security policies can be used on more than one WLAN.
To create a security policy supporting 802.1x EAP, see Configuring 802.1x EAP Settings on
page 6-6.
To create a security policy supporting WPA2-CCMP, see Configuring WPA2-CCMP (802.11i)
on page 6-11.
To configure the access point to block specific kinds of HTTP, SMTP and FTP data traffic, see
Configuring Firewall Settings on page 6-13.
To create VPN tunnels allowing traffic to route securely through a IPSEC tunnel to a private
network, see Configuring VPN Tunnels on page 6-22.
To configure the access point to block transmissions with devices detected as Rogue AP’s
(hostile devices), see Configuring Rogue AP Detection on page 6-42.
6.2 Setting Passwords
Before setting the access point security parameters, verify an administrative password for the access
point has been created to restrict access to the device before advanced device security is configured.
To password protect and restrict access point device access:
1. Connect a wired computer to the access point LAN port using a standard CAT-5 cable.
2. Set up the computer for TCP/IP DHCP network addressing and make sure the DNS settings
are not hardcoded.
NOTE Security for the access point can be configured in various locations
throughout the access point menu structure. This chapter outlines the
security options available to the AP-7131N-FGR, and the menu locations
and steps required to configure specific security measures.