Device Categorization - Motorola WiNG 5.5 Reference Manual

Table of Contents

Advertisement

8.6 Device Categorization

Security Configuration
A proper classification and categorization of access points and clients can help suppress unnecessary unauthorized access
point alarms, and allow an administrator to focus on alarms on devices actually behaving in a suspicious manner. An intruder
with a device erroneously authorized could potentially perform activities that harm your organization.
Authorized access points and clients are generally known to you and conform with your organization's security policies.
Unauthorized devices are those detected as interoperating within the network, but have not been approved. These devices
should be filtered to avoid jeopardizing the data managed by the access point and its connected clients. Use the
Categorization
screen to apply neighboring and sanctioned (approved) filters on peer access points operating in this access
point's radio coverage area. Detected client MAC addresses can also be filtered based on their classification in this access
point's coverage area.
To categorize access points and clients as authorized or unauthorized:
1. Select
Configuration
2. Select
Security
3. Select
Device Categorization
The Device Categorization screen lists the device authorizations defined thus far.
4. Select
Add
to create a new Device Categorization policy,
remove obsolete policies from the list of those available.
tab from the Web user interface.
to display existing device categorization policies.
Figure 8-23 Device Categorization screen
Security Configuration 8 - 37
Edit
to modify the attributes of a selected policy or
Device
Delete
to

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents