User Manual

Table Of Contents
WaveLAN Security Options
Introduction
6-2 WaveLAN IEEE 802.11 PC Card User’s Guide
Examples of such additional WaveLAN security measures are:
“Closing the Infrastructure” described on page 6-2.
“Wireless Access Control” described on page 6-3.
“Wireless Data Encryption” described on page 6-4.
For more detailed information on operating system security
measures, please refer to the documentation that came with the
network operating system, or consult the reseller of your LAN
software.l
Closing the Infrastructure 6
The IEEE 802.11 standard on wireless LANs was designed to
allow mobile computing devices to establish a (radio) connection to
a Local Area Network (LAN) as easy as possible.
This means that mobile users that do not know the correct
WaveLAN Network Name can use the value “ANY”, or use an
empty string for the network name to establish a radio connection
with the nearest access point.
Although such a physical connection does not provide access to
network data without the appropriate username and password, in
some occasions, you may wish to restrict access to the network
resources in a more stringent way.
Lucent Technologies WavePOINT-II access points, allow you to
“close” the wireless infrastructure via a special setting of the
access point(s). Doing so, the WavePOINT-II devices will:
Ignore radio association request from users that have
configured their WaveLAN IEEE device to use the value “ANY”
Ignore radio association request from users that use a non-
Lucent WaveLAN adapter.