User Guide

Table Of Contents
Bridge GUI Guide: Security Configuration
156
2 the smallest effective set of accessible ports is specified for
each
3 cleartext device access is enabled only when needed
Once cleartext access to encrypted interfaces has been
established for a device, the Bridge uses the device’s MAC
address, IP address and port number to authenticate it on the
network.
NOTE: The cur-
rent
Cleartext traf-
fic setting is shown in
the upper left of all
Bridge GUI screens (re-
fer to Section 5.1).
Configured cleartext devices will not be allowed to pass traffic
in the Bridge’s encrypted zone, unless
Cleartext Traffic has
been
Enabled (on Advanced View -> Configure -> Security ->
Security Settings, refer to Section 4.1.10). Cleartext Traffic is
Disabled by default.
These settings are available regardless of specified cleartext
Device Type (below):
Admin State - determines whether the device’s cleartext
access to the Bridge’s encrypted zone is
Enabled or
Disabled (the default).
Device Name - establishes a descriptive name for the
device. Access rules, whether for Trusted Devices or APs
must be uniquely named on the Bridge.
NOTE: STP and
Cisco® Layer 2,
VLAN management
traffic to or from switch-
es in the Bridge’s en-
crypted zone requires
Pass All Traffic to be en-
abled (checked).
MAC Address - provides the MAC address of the device.
IP Address - provides the network address of the device.
Device Type - establishes the cleartext device as a wireless
Access Point or a designated Trusted Device.
Pass All Traffic - determines whether the Bridge will filter
OSI Layer 2 traffic from the device (checkbox clear, the
default) or allow all OSI Layer 2 traffic to pass to and from
the device in the encrypted zone (box checked).
Figure 4.20. Advanced View
Trusted Device/AP Settings
frame, all platforms
4.5.3.1 3rd-Party AP Management
Bridges equipped with one or more radios can themselves
serve as wireless access points (APs), as described in Section
3.3.4.
The Bridge-secured network can additionally include 3rd-party
wireless APs, which will pass network traffic normally
regardless of whether you have configured the Bridge to allow
administrative access to the AP.
If you want to manage a 3rd-party AP on the Bridge-secured
network, you must communicate with it in clear text (the AP