
7-7
Wireless Security Configuration
Wireless Security Overview
address as the MAC authentication password. To avoid this compatibility
issue, use the “radius” CLI command to configure the “mac-auth-password”
for the AP 530 to be consistent with the Access Point 520 shared-secret
password. For the CLI commands, see Section 9,
“MAC Address Authentication” on
page 9-72
.
MAC Authentication on the AP 530 includes the ability to lock out clients by
MAC address, and to force an already connected client or station to deauthen-
ticate.
802.1X User Authentication
802.1X user authentication can be implemented either by using a remote
authentication server, such as a RADIUS server, or by using the local built-in
RADIUS server on the access point itself. The user’s credentials are exchanged
with the servers (both remote and local built-in) using a mechanism called
Extensible Authentication Protocol (EAP). EAP is a public-key encryption
system that ensures that only authorized network users can access the net-
work. In wireless communications using EAP, a user requests connection to
a WLAN through an access point, which then requests the identity of the user
and transmits that identity to an authentication server such as RADIUS. The
server asks the access point for proof of identity, which the access point gets
from the user and sends back to the server to complete the authentication.
The local built-in RADIUS server supports only one EAP type: PEAP-
MSCHAPv2. For remote server authentication, the access point serves as an
intermediate authenticator to transparently pass any EAP type to the remote
server as specified in RFC3748.
The AP 530 supports all EAP types tested by the Wi-Fi Alliance: TLS, TTLS,
PEAP-MSCHAPv2, PEAP1/GTC, and SIM. EAP types that do not provide key
management (like MD5) are not suitable for wireless networks. User 802.1X
authentication can be used with WEP, TKIP, and CCMP/AES encryption
ciphers.
It is possible to use a combination of both MAC authentication and 802.1X
authentication simultaneously on the same WLAN.
Access Point Authentication
ProCurve switches support port-access authentication which requires any
equipment plugged into the port to prove its authenticity through 802.1X
authentication, making their wireless networks less susceptible to rogue AP
Summary of Contents for 530 - Notebook PC
Page 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Page 2: ......
Page 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Page 21: ...1 1 1 Getting Started ...
Page 29: ...2 1 2 Selecting a Management Interface ...
Page 35: ...3 1 3 Using the Command Line Interface CLI ...
Page 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Page 85: ...5 1 5 General System Configuration ...
Page 152: ...5 68 General System Configuration Managing Group Configuration ...
Page 194: ...6 42 Wireless Interface Configuration Managing Multiple WLAN BSS SSID Interfaces ...
Page 195: ...7 1 7 Wireless Security Configuration ...
Page 270: ...7 76 Wireless Security Configuration Web Authentication for Mobile Users ...
Page 271: ...8 1 8 Special Features ...
Page 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Page 309: ...9 1 9 Command Line Reference ...
Page 476: ...9 168 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Page 477: ...A 1 A File Uploads Downloads and Resets ...
Page 498: ...A 22 File Uploads Downloads and Resets Disabling the Access Point Push Buttons ...
Page 499: ...B 1 B Defaults ...
Page 512: ...B 14 Defaults Wireless Distribution System WDS This page is intentionally unused ...
Page 513: ...C 1 C Adaptive Tx Power Control Use Cases ...
Page 523: ...D 1 D Open Source Licenses ...
Page 556: ...D 34 Open Source Licenses ...
Page 561: ......