Specifications
Configuring Access Point Security
6-5
have been created, they are selectable within the Security field of each WLAN screen. If the
existing default security policy does not satisfy the data protection requirements of a specific WLAN,
a new security policy (using the authentication and encryption schemes discussed above) can be
created.
To enable an existing WLAN security policy or create a new policy:
1. Select Network Configuration -> Wireless -> Security from the access point menu tree.
The Security Configuration screen displays.
2. If a new security policy is required, click the Create button.
3. Use the Name field to define a logical security policy name.
Remember, multiple WLANs can share the same security policy, so be careful not to name
security policies after specific WLANs or risk defining a WLAN to single policy. Motorola
recommends naming the policy after the attributes of the authentication or encryption type
selected.
4. Enable and configure an Authentication option if necessary for the target security policy.
5. Enable and configure an Encryption option if necessary for the target security policy.
CAUTION Mesh configurations do not support mismatched security policies
when operating using a mixed mode scheme. Ensure the encryptions
and authentication schemes used by APs in a mesh network are
complimentary with one another.
NOTE An existing security policy can be edited from the Security Configuration
screen by selecting an existing policy and clicking the Edit button. Use the
Edit Security Policy screen to edit the policy. For more information on
editing an existing security policy, refer to security configuration sections
described in steps 4 and 5.
Manually Pre-Shared
Key / No
Authentication
Select this button to disable authentication. This is the default
value for the Authentication field.
802.1x EAP Select the 802.1x EAP button to display the 802.1x EAP Settings
field within the New Security Policy screen. For specific
information on configuring EAP, see Configuring 802.1x EAP
Settings on page 6-6.