Defining Profile Security Settings
    
    
        
			A profile can make use of existing firewall, wireless client role, and WIPS policies
				and apply them to the profile‘s configuration. This affords each profile a truly
				unique combination of data protection policies for best meeting the data protection
				requirements of the profile it supports. However, as deployment requirements arise,
				an individual device may need some or all of its general security configuration
				overridden from the profile‘s settings.
			To configure a profile‘s security settings and overrides:
		 
        
            - 
                Select from the web UI.
            
- 
                Expand the Security menu and select
                        Settings.
                
                    Profile Security - Settings screen 
 
- 
                Select a firewall policy from the Firewall Policy
                    drop-down menu. All devices using this profile must meet the requirements of the
                    firewall policy to access the network. A firewall is a mechanism enforcing
                    access control, and is considered a first line of defense in protecting
                    proprietary information within the network. The means by which this is
                    accomplished varies, but in principle, a firewall can be thought of as
                    mechanisms both blocking and permitting data traffic within the network. If an
                    existing Firewall policy does not meet your requirements, select the Create icon
                    to create a new firewall policy that can be applied to this profile. An existing
                    policy can also be selected and edited as needed using the Edit icon.
            
- 
                Select the WEP Shared Key
                        Authentication option to require profile supported devices to
                    use a WEP key to access the network using this profile. The access point, other
                    proprietary routers, and our clients use the key algorithm to convert an ASCII
                    string to the same hexadecimal number. Clients without our adapters need to use
                    WEP keys manually configured as hexadecimal numbers. This option is disabled by
                    default.
            
- 
                Client Identity is a set of
                    unique fingerprints used to identify a class of devices. This information is
                    used to configure permissions and access rules for devices classes in the
                    network. A client identity group is a collection of client identities that
                    identify devices and applies specific permissions and restrictions on these
                    devices. From the drop-down menu select the Client Identity
                        Group to use with this device profile. For more information, see
                        Device Fingerprinting.
            
- 
                Use the CMP Policy drop-down
                    menu to apply a CMP policy. CMP (Certificate Management
                        Protocol) is an Internet protocol to obtain and manage digital
                    certificates in a PKI (Public
                        Key Infrastructure) network. A CA (Certificate Authority)
                    issues the certificates using the defined CMP. 
            
- 
				Use the URL Filter
					drop-down menu to select or override the URL Filter configuration applied to
					this virtual interface. 
				URL filtering is used to
					restrict access to resources on the internet. 
- 
				Click OK to save the
					changes or overrides. 
				Click Reset to revert
					to the last saved configuration.