Datasheet

AP-5131 Access Point Product Reference Guide
5-28
1. Select Network Configuration -> Wireless -> Security from the AP-5131 menu tree.
The Security Configuration screen appears with existing policies and their attributes
displayed.
Configuring a WLAN security scheme with a discussion of all the authentication and
encryption options available is beyond the scope of this chapter. Chapter 6 of the AP-5131
Product Reference Guide is dedicated to configuring AP-5131 security. For detailed
information on the authentication and encryption options available to the AP-5131 and how
to configure them, see to Configuring Security Options on page 6-2 and locate the section
that describes your intended security scheme.
2. Click Logout to exit the Security Configuration screen.
NOTE When the AP-5131 is first launched, a single security policy (default) is
available and mapped to WLAN 1. It is anticipated numerous additional
security policies will be created as the list of WLANs grows.