7-2
Wireless Security Configuration
Contents
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5
Wireless Security Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6
User Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6
MAC Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6
802.1X User Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7
Access Point Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7
Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-8
Wired Equivalent Privacy (WEP) . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-8
Temporal Key Integrity Protocol (TKIP) . . . . . . . . . . . . . . . . . . . . 7-8
Counter Mode/CBC-MAC Protocol (CCMP) . . . . . . . . . . . . . . . . . . 7-9
Key Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9
Security Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9
No Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9
Static Wired Equivalent Privacy (WEP) . . . . . . . . . . . . . . . . . . . . 7-10
Dynamic Wired Equivalent Privacy (WEP) . . . . . . . . . . . . . . . . . 7-10
TKIP with Preshared Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-10
AES with Preshared Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-10
TKIP with 802.1X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11
AES with 802.1X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11
Other Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-12
Establishing Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-16
Web: Setting Security Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-18
Manual Configuration Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-24
CLI: Configuring Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-24
Configuring RADIUS Client Authentication . . . . . . . . . . . . . . . . . . . . . . . . 7-32
Web: Setting RADIUS Server Parameters . . . . . . . . . . . . . . . . . . . . . . 7-33
CLI: Setting RADIUS Server Parameters . . . . . . . . . . . . . . . . . . . . . . . 7-35
Web: Establishing Local RADIUS Accounts . . . . . . . . . . . . . . . . . . . . 7-36
Managing Existing RADIUS Accounts . . . . . . . . . . . . . . . . . . . . . . 7-36
Adding New RADIUS Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-37
Managing the RADIUS User Database . . . . . . . . . . . . . . . . . . . . . 7-39
CLI: Setting Local RADIUS Server Parameters . . . . . . . . . . . . . . . . . . 7-41
Configuring MAC Address Authentication . . . . . . . . . . . . . . . . . . . . . . . . . 7-43
Authentication Order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-43
Summary of Contents for ProCurve 530 NA
Page 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Page 2: ......
Page 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Page 21: ...1 1 1 Getting Started ...
Page 28: ...1 8 Getting Started Need Just a Quick Start This page is intentionally unused ...
Page 29: ...2 1 2 Selecting a Management Interface ...
Page 35: ...3 1 3 Using the Command Line Interface CLI ...
Page 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Page 85: ...5 1 5 General System Configuration ...
Page 195: ...7 1 7 Wireless Security Configuration ...
Page 271: ...8 1 8 Special Features ...
Page 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Page 309: ...9 1 9 Command Line Reference ...
Page 474: ...9 166 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Page 475: ...A 1 A File Uploads Downloads and Resets ...
Page 495: ...B 1 B Defaults ...
Page 507: ...C 1 C Adaptive Tx Power Control Use Cases ...
Page 517: ...D 1 D Open Source Licenses ...
Page 550: ...D 34 Open Source Licenses This page is intentionally unused ...
Page 555: ......