Chapter 6

Configuring Security

This chapter explains how to use different security solutions to ensure that you have a secure wireless network. This chapter covers these topics:

ˆ“Understanding Security” on page 170

ˆ“Controlling Access to Access Point Menus” on page 174

ˆ“Creating a Secure Spanning Tree” on page 181

ˆ“Enabling Secure Communications Between Access Points and End Devices” on page 184

169

Page 169
Image 169
Allied Telesis AT-WA7501, AT-WA7500 manual Configuring Security