User Guide

Table Of Contents
Bridge GUI Guide: Security Configuration
157
having no means to decrypt/encrypt Fortress MSP traffic). To
do so, you must configure cleartext access for the AP.
Cleartext access configured to permit direct communication
with APs can represent a security risk: APs’ MAC addresses
are necessarily transmitted in clear text and could be spoofed.
Fortress recommends creating and enabling cleartext device
access only as required and filtering that traffic to permit only
the necessary minimum network access for the device.
CAUTION: To max-
imize network se-
curity, permit the fewest
possible cleartext devic-
es to access encrypted
interfaces and to config-
ure the smallest effec-
tive set of accessible
ports for each.
These settings are available only when Device Type (Section
4.5.3) is
Access Point:
Custom Management Ports - specifies ports by number
(separate multiple entries by commas, no spaces).
Two-Way - permits two-way communication for AP
management (
Enabled) or allows only one-way
communication from the Bridge to the AP (
Disabled, the
default), according to the requirements of the AP. When
Trusted Device is the selected Device Type, this field is
greyed out.
Figure 4.21. Advanced View
Access Point Settings
frame, all platforms
4.5.3.2 Trusted Devices
Some wireless devices—IP phones, digital scales or printers,
for example—are not equipped to run additional software such
as the Fortress Secure Client.
In order to allow such a device onto the network, the Fortress
Bridge must be configured to identify it as a Trusted Device
essentially a specialized, cleartext network device for which the
narrowest possible access rules are applied.
Visitor Access through Trusted Devices
Visitors to your facilities can be granted temporary access to
the WLAN by configuring Trusted Devices, with appropriate
access rules, through which visitors can connect their mobile
devices. Trusted Devices created to provide access to visiting
mobile device are managed no differently from other Trusted
Devices.
To limit visitor access to the Web, select only the
Web group of
port numbers from the checkbox options in the Access
Management Rules frame.
Trusted Devices for visitors are managed no differently from
other Trusted Devices. You should delete any Trusted Device
access rule when it is no longer required.