7-60
Wireless Security Configuration
Web Authentication for Mobile Users
Redirecting to the Destination URL
After successful authentication, a timer counts down until the connection to
the network is established. Then the user is redirected to the Redirect URL
specified on the WLAN – Web Authentication screen.
Web-Auth Security
User Credentials
The feature may be configured to offer authentication:
■
Only to Registered users with existing RADIUS credentials,
■
Only to Guest users, using common guest credentials shared by multiple
Guest users, or
■
To both Guest and Registered users.
For authentication, you can specify both a primary RADIUS server and a
secondary RADIUS server to ensure high availability; the local RADIUS server
may also be used.
Optional Encryption
Users connecting thorough Web-Auth may associate with the AP-530’s VLAN
interface using:
■
No security,
■
Static WEP, or
■
WPA(2)-PSK.
Other Security Features
■
PAP authentication is supported.
■
Web-Auth is compatible with Identity Driven Manager (IDM) extensions,
that is, dynamic VLAN assignment, ACLs, and other IDM attributes (such
as rate limiting).
■
Web-Auth does not encrypt data passing between the station and the
access point. For additional security after Web Authentication, users may
employ a VPN or Secure Sockets Layer (SSL) connection.
■
The web server supports SSL.
Summary of Contents for ProCurve 530 NA
Page 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Page 2: ......
Page 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Page 21: ...1 1 1 Getting Started ...
Page 28: ...1 8 Getting Started Need Just a Quick Start This page is intentionally unused ...
Page 29: ...2 1 2 Selecting a Management Interface ...
Page 35: ...3 1 3 Using the Command Line Interface CLI ...
Page 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Page 85: ...5 1 5 General System Configuration ...
Page 195: ...7 1 7 Wireless Security Configuration ...
Page 271: ...8 1 8 Special Features ...
Page 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Page 309: ...9 1 9 Command Line Reference ...
Page 474: ...9 166 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Page 475: ...A 1 A File Uploads Downloads and Resets ...
Page 495: ...B 1 B Defaults ...
Page 507: ...C 1 C Adaptive Tx Power Control Use Cases ...
Page 517: ...D 1 D Open Source Licenses ...
Page 550: ...D 34 Open Source Licenses This page is intentionally unused ...
Page 555: ......