Establish configuration requirements, connection requirements, and implementation guidance for each type of wireless access; and Authorize each type of wireless access to the system prior to allowing such connections.
Wireless technologies include microwave, packet radio (ultra-high frequency or very high frequency), 802.11x, and Bluetooth. Wireless networks use authentication protocols that provide authenticator protection and mutual authentication.
configuration requirements are established for each type of wireless access; connection requirements are established for each type of wireless access; implementation guidance is established for each type of wireless access; each type of wireless access to the system is authorized prior to allowing such connections.