
AP-51xx Access Point Product Reference Guide
6-2
6.1 Configuring Security Options
To configure the data protection options available on the access point, refer to the following:
• To set an administrative password for secure access point logins, see Setting Passwords on
page 6-3.
• To display security policy screens used to configure the authetication and encryption
schemes available to the access point, see Enabling Authentication and Encryption Schemes
on page 6-5. These security policies can be used on more than one WLAN.
• To create a security policy supporting 802.1x EAP, see Configuring 802.1x EAP
Authentication on page 6-11.
• To define a security policy supporting Kerberos, see, Configuring Kerberos Authentication on
page 6-8.
• To create a security policy supporting WEP, see Configuring WEP Encryption on page 6-16.
• To configure a security policy supporting KeyGuard, see, Configuring KeyGuard Encryption
on page 6-18.
• To define a security policy supporting WPA-TKIP, see Configuring WPA/WPA2 Using TKIP on
page 6-21.
• To create a security policy supporting WPA2-CCMP, see Configuring WPA2-CCMP (802.11i)
on page 6-24.
• To configure the access point to block specific kinds of HTTP, SMTP and FTP data traffic, see
Configuring Firewall Settings on page 6-27.
• To create VPN tunnels allowing traffic to route securely through a IPSEC tunnel to a private
network, see Configuring VPN Tunnels on page 6-36.
• To configure the access point to block transmissions with devices detected as Rogue AP’s
(hostile devices), see Configuring Rogue AP Detection on page 6-55.
NOTE Security for the access point can be configured in various locations
throughout the access point menu structure. This chapter outlines the
security options available to the access point, and the menu locations and
steps required to configure specific security measures.