![HP ProCurve 530 NA Management And Configuration Manual Download Page 433](http://html.mh-extra.com/html/hp/procurve-530-na/procurve-530-na_management-and-configuration-manual_166483433.webp)
9-125
Command Line Reference
Wireless Security Commands
security
This command defines the mechanisms employed by the access point for
wireless security.
Syntax
security
<
no-security | static-wep | dynamic-wep | wpa-psk| wpa-8021x>
•
no-security
- No encryption for data transfers.
This is not recom-
mended.
•
static-wep
-
Use a Wired Equivalent Privacy static shared key.
•
dynamic-wep
- Use the IEEE 802.1X port-based authentication and
infrastructure.
•
wpa-psk
- Use the Wi-Fi Protected Access (WPA) and/or WPA2 with a
pre-shared key.
•
wpa-8021x
- Use the Wi-Fi Protected Access (WPA) and/or WPA2 with
a RADIUS server.
This is the recommended security mode.
Default Setting
No security
Command Mode
WLAN Interface Configuration
Command Usage
•
When using this command to configure WPA or 802.1X for authenti-
cation and dynamic keying, you must use the open-system
argument.
•
Shared key authentication can only be used when a static WEP key
has been defined with the key command.
•
WPA enables the access point to support different unicast encryption
keys for each client. However, the global encryption key for multicast
and broadcast traffic must be the same for all stations. This command
can set the encryption type that is used for multicast and unicast
traffic.
Summary of Contents for ProCurve 530 NA
Page 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Page 2: ......
Page 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Page 21: ...1 1 1 Getting Started ...
Page 28: ...1 8 Getting Started Need Just a Quick Start This page is intentionally unused ...
Page 29: ...2 1 2 Selecting a Management Interface ...
Page 35: ...3 1 3 Using the Command Line Interface CLI ...
Page 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Page 85: ...5 1 5 General System Configuration ...
Page 195: ...7 1 7 Wireless Security Configuration ...
Page 271: ...8 1 8 Special Features ...
Page 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Page 309: ...9 1 9 Command Line Reference ...
Page 474: ...9 166 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Page 475: ...A 1 A File Uploads Downloads and Resets ...
Page 495: ...B 1 B Defaults ...
Page 507: ...C 1 C Adaptive Tx Power Control Use Cases ...
Page 517: ...D 1 D Open Source Licenses ...
Page 550: ...D 34 Open Source Licenses This page is intentionally unused ...
Page 555: ......