This requirement is for device to device authentication between wireless network devices and the firewall. Without authentication, an unauthorized device may connect to the firewall and intercept monitored traffic, make configuration changes, or initiate man-in-the-middle attacks. Hence, it is imperative that authentication is bi-directional (mutual authentication) using cryptography to ensure a high level of trust and authenticity.
Device authentication requires unique identification and authentication that may be defined by type, by specific device, or by a combination of type and device as deemed appropriate by the organization.
Wireless device authentication is not a functionality of the firewall. |