Spec Sheet

6
Transmit Power Control
Transmit Power Control minimizes radio interference for sites that require a very dense population of radios (Access Ports) to support bandwidth requirements. Configured from within the
WS5000, this can also be part of a group policy.
End-to-End Layered Security
There is no element of networking—wired or wireless—more important than security. As a pioneer and leader in wireless LANs, Symbol has implemented a complete end-to-end layered
security model that includes support for all of today’s wireless security standards, and is easily upgradeable to support the standards of tomorrow. Policy-based classes enable the
organization of security requirements in groups—public, low, medium, and high. Policies are then configured to specify the correct level of control for users, applications, and devices
within those groups.
A pioneer and leader in wireless LANs, Symbol offers a complete end-to-end
layered security model that includes support for all of today's wireless security
standards, and is easily upgradeable to support the standards of tomorrow.
7
Network Access Control
Access Control Lists (ACLs)
Layer 2/3/4 Access Control Lists provide filtering for advanced network
traffic control, enabling administrators to forward, drop or redirect
packets based on application type, protocol, IP Address, MAC
Address and more.
Authentication
Authentication ensures that only authorized users and devices can
access your network. The WS5000 provides a comprehensive set of
authentication mechanisms to support a variety of security
requirements:
Automatic Channel Selection
The degradation of RF performance due to environmental factors is
eliminated with Automatic Channel Select (ACS). ACS optimizes radio
channel planning and installation, scanning and selecting the best
channel for each Access Port based on noise and signal properties.
A complete set of configuration controls provides time, mode of
operation and Access Port exclusion lists.
Transmit Power Control
Transmit Power Control minimizes radio interference for sites that
require a very dense population of radios (Access Ports) to support
bandwidth requirements. Configured from within the WS5000, this can
also be part of a group policy.
Pre-shared keys
Simple shared authentication through non-wireless distribution of
authentication keys ensures secure key management.
The robust
and cost-effective
layered security
approach enables
the deployment
of multiple
security
mechanisms
throughout
your wireless
network.
Two-stage Mutual Authentication
1
st
Stage: Device level w/PKI
2
nd
Stage: User Auth. w/Radius
Multilayer Transport Security
1
st
WEP 128
2
nd
WTLS-AES -VPN Tunneling
Access Scope from FW/ACLs
Core Applications
POS
CRM/ERP
Mobile Worker
User Access to
corporate
network
User Authentication
EAP: TLS/TTLS/PEAP
Kerberos
Transport Security
WEP w/TKIP
Keyguard -MCM
802.11i (when ratified)
Access Scope from FW/ACLs
VOIP
Kiosks
Controlled local
access for PCs
Client Bridge
with Kerberos
NOS Based User Authentication
Basic transport Security
WEP 128 Encryption
Access Scope
Firewall Rules
ACLS
Scales
Price Checker
Wireless Video
Security
Client Bridge
attached
Open System Access
Public Access
Hot Spot
HIGH
MEDIUM
LOW
OPEN
Compound Security Layers
Device/User Class
Layered Security Architecture
A layered security approach achieves the most robust and cost-effective security,
deploying multiple mechanisms throughout the various layers of your wireless network—
the perimeter, the network, the servers, and client devices (also known as the link,
network and session layers). User rights, network access, application types, content
classes and location dependencies can all be grouped into layers, creating aggregate
security policies that are simpler and less expensive to deploy and manage.
Normal vs Pre-emptive Roaming
Normal Roaming (Frequently Results in Uneven Load Balancing and Poor Connection)
Pre-emptive Roaming (Results in Even Load Balancing and Higher Connection Speeds)
Mobile devices communicate over the wireless network at 11, 5.5, 2 or 1 Mbps. Since normal roaming
does not occur until device reaches 1 Mbps, many devices are well into another cell before the
connection erodes to 1 Mbps, and actual roaming to the next access point occurs. The result is uneven
load balancing—too many devices supported by the Cell 1 access point result in a lack of connection
quality
, while only a few devices are supported by the Cell 2 access point—even though the devices
have technically roamed into Cell 2.
Pre-emptive roaming occurs close to the cell ‘edges’, ensuring that the load on any given access
point is limited to those devices within the actual cell. Users experience higher and more consistent
connection speeds, resulting in smoother running of applications.
Cell 1:
11 devices
Cell 2:
3 devices
Normal Roaming Point
Cell 1:
8 devices
Cell 2:
6 devices
Pr
e-emptive Roaming Point