Symbol Technologies AP-5131 Network Router User Manual


 
Getting Started
3-11
a. Enter the Extended Services Set Identification (ESSID) and name associated with the
WLAN. For additional information on creating and editing up to 16 WLANs per AP-5131,
see Creating/Editing Individual WLANs on page 5-24.
b. Use the Available On checkboxes to define whether the target WLAN is operating over
the 802.11a or 802.11b/g radio. Ensure the radio selected has been enabled (see step 8).
c. Even an AP-5131 configured with minimal values must protect its data against theft and
corruption. A security policy should be configured for WLAN1 as part of the basic
configuration outlined in this guide. A security policy can be configured for the WLAN
from within the Quick Setup screen. Policies can be defined over time and saved to be
used as needed as the AP-5131’s security requirements change. Symbol recommends
you familiarize yourself with the security options available on the AP-5131 before
defining a security policy. Refer to Configuring WLAN Security Settings on page 3-11.
10. Click Apply to save any changes to the AP-5131 Quick Setup screen. Navigating away from
the screen without clicking Apply results in all changes to the screens being lost.
11. Click Undo Changes (if necessary) to undo any changes made. Undo Changes reverts the
settings displayed on the AP-5131 Quick Setup screen to the last saved configuration.
3.5.1.1 Configuring WLAN Security Settings
To configure a basic security policy for a WLAN:
1. From the AP-5131 Quick Setup screen, click the Create button to the right of the Security
Policy item.
The New Security Policy screen displays with the Manually Pre-shared key/No
authentication and No Encryption options selected. Naming and saving such a policy (as
is) would provide no security and might only make sense in a guest network wherein no
sensitive data is either transmitted or received. Consequently, at a minimum, a basic
security scheme (in this case WEP 128) is recommended in a network environment wherein
sensitive data is transmitted.
2. Ensure the
Name of the security policy entered suits the intended configuration or function
of the policy.
NOTE For information on configuring the other encryption and authentication
options available to the AP-5131, see Configuring Security Options on
page 6-2.