Profile Security Configuration

An access point profile can have its own firewall policy, wireless client role policy, WEP shared key authentication and NAT policy applied.

Before defining a profile‘s security configuration, refer to the following deployment guidelines to ensure the profile configuration is optimally effective:

For more information, refer to the following: