Introduction to WLAN security of AR routers

2

WLAN security is as follows:
User access security: Link authentication, access authentication, and data encryption are used to ensure validity and security of user access on wireless networks.
Service security: This feature protects service data of authorized users from being intercepted by unauthorized users during transmission. For details, see WLAN Security Configuration > Overview .

Other related questions:
WLAN security of AR routers
WLAN security is as follows: User access security: Link authentication, access authentication, and data encryption are used to ensure validity and security of user access on wireless networks. Service security: This feature protects service data of authorized user from being intercepted by unauthorized users during transmission. For details, see WLAN Security Configuration.

How to classify the interfaces of AR routers
For AR routers: Interfaces of a device are used to exchange data and interwork with other devices and can be classified into physical interfaces and logical interfaces, in which: 1. Physical interfaces are real interfaces supported by components and can be further classified into management interfaces and service interfaces. - Management interfaces: Management interfaces are used to support the configuration and management operations performed by users. Users can use management interfaces to log in to devices and perform configuration and management operations. Management interfaces do not transfer service data. - Service interfaces: Service interfaces are used to transfer service data and can be classified into LAN interfaces and WAN interfaces. LAN interfaces can be used by routers to exchange data with network devices in the LAN. WAN interfaces can be used by routers to exchange data with devices in the external networks which are far away from the routers. 2. Logical interfaces can implement data exchange but do not exist physically and must be established by configurations. Logical interfaces transfer service data.

Configure the basic firewall functions on an AR router
The basic firewall functions of an AR router include: creating a security zone and adding interfaces into the security zone, creating an interzone and enabling the firewall functions in the interzone, configuring session table aging time, and checking the configuration result. For details about the configuration, see the following content: [Creating a security zone and adding interfaces into the security zone on an AR router] Create a security zone and add interfaces into the security zone on an AR router. [Enabling the firewall functions on an AR router] Enable the firewall functions on an AR router. [Configuring session table aging time of the firewall on an AR router] Configure session table aging time of the firewall on an AR router. For details about configuration of basic firewall functions on AR series routers, see the URL: AR router configuration firewall basic functions.

Create a security zone and add interfaces into the security zone on an AR router
A router considers that data flows occurring within a security zone are trustful and therefore no security policy needs to be implemented. If data flows occur between different security zones, the security check function of the firewall is triggered, and corresponding policy is implemented. To configure firewall services, create relevant security zones and specify priorities for the security zones so as to determine deployment of security services according to the priorities between different security zones. The specified priorities cannot be modified; otherwise, other configuration cannot be performed. Different security zones have different priorities. The larger the value, the higher the priority of a zone. After a security zone is created, interfaces must be added to the zone to activate the firewall. The specific configuration procedure is as follows: 1. Run the system-view command to access the system view. 2. Run the firewall zone zone-name command to create a security zone. By default, no security zone is created on the router. 3. Run the priority security-priority command to configure a priority for the security zone. 4. Run the quit command to access the system view. 5. Run the interface interface-type interface-number command to access the interface view. 6. Run the zone zone-name command to add interfaces to the security zone.//Each security zone can contain multiple interfaces, but an interface can be added to one zone only. Note: The router will automatically create a security zone named Local which has the highest priority. This security zone cannot be deleted or contain any interface, and its priority cannot be modified. To apply the firewall functions to the control packets which are reported to this router, the Local security zone may be used. For details about the commands for creating a security zone and adding interfaces into the security zone as well as creating an interzone, see the URL: The AR router creates a security domain and adds the interface to the security zone.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top