![HP 530 - Notebook PC Скачать руководство пользователя страница 208](http://html.mh-extra.com/html/hp/530-notebook-pc/530-notebook-pc_management-manual_158176208.webp)
7-14
Wireless Security Configuration
Wireless Security Overview
WPA-PSK
1. Enable WPA Security.
2. Enable WPA and/or
WPA2.
3. Set Authentication
Protocols—TKIP, AES,
or both.
4. Set the key.
security
<wpa-psk>
wpa-allowed
[no]
wpa2-allowed
[no]
wpa-cipher-tkip
[no]
wpa-cipher-aes
wpa-pre-shared-key
<key>
WPA supported
station required.
If there is a mix of
stations, some
supporting
WPA2 and
others
supporting the
original WPA,
configure for
both (set both
wpa/wpa2
allowed).
When both TKIP and
CCMP authentication
methods are set, both
TKIP and AES stations
can associate with the
access point. WPA
stations must have
either a valid TKIP or an
AES key to
communicate.
WPA-802.1X
1. Enable WPA Security.
2. Enable WPA and/or
WPA2.
3. Enable Pre-
authentication.
4. Set the Authentication
Server and Protocols—
TKIP, AES, or both.
5. Set the Radius Key.
6. Allow Non-WPA
stations.
security
<wpa-802.1X>
wpa-allowed
[no]
wpa2-allowed
[no]
rsn-preauthentication
[no]
wpa-cipher-tkip
[no]
wpa-cipher-aes
radius-accounting
<
primary | secondary
> <
ip
<
ip>
|
port
<
port>
|
key
<key>
>
radius
<
primary | secondary
>
WPA supported
station required.
If there is a mix of
stations, some
supporting
WPA2 and
others
supporting the
original WPA,
configure for
both (set both
wpa/wpa2
allowed).
• When both TKIP and
CCMP authentication
methods are set, both
TKIP and AES
stations can
associate with the
access point. WPA
stations must have
either a valid TKIP or
an AES key to
communicate.
• For WPA2 wireless
stations to send pre-
authentication
packets, enable Pre-
authentication.
The AP 530 supports the following Extensible Authentication Protocol (EAP) methods: TLS, TTLS, MD5, and PEAP (MS-
CHAP v2) when configured to use an external RADIUS server for authentication. The AP 530 supports only PEAP (MS-
CHAP v2) when configured to use the built-in (local) RADIUS server.
To start, the access point is in the default configuration.
Conventions used:
Vertical bars separate alternative, mutually exclusive elements ( | ).
Braces enclose required elements ( < > ).
Italics indicate variables for which the user must supply a value when executing the command.
Configuring Encryption in the ProCurve Wireless Access Point 530
Encryption Methods and
Process
WLAN Interface Level Commands
Additional
Requirements
Notes
Содержание 530 - Notebook PC
Страница 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Страница 2: ......
Страница 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Страница 21: ...1 1 1 Getting Started ...
Страница 29: ...2 1 2 Selecting a Management Interface ...
Страница 35: ...3 1 3 Using the Command Line Interface CLI ...
Страница 50: ...3 16 Using the Command Line Interface CLI CLI Control and Editing This page is intentionally unused ...
Страница 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Страница 85: ...5 1 5 General System Configuration ...
Страница 152: ...5 68 General System Configuration Managing Group Configuration ...
Страница 193: ...6 41 Wireless Interface Configuration Managing Multiple WLAN BSS SSID Interfaces This page is intentionally unused ...
Страница 194: ...6 42 Wireless Interface Configuration Managing Multiple WLAN BSS SSID Interfaces ...
Страница 195: ...7 1 7 Wireless Security Configuration ...
Страница 270: ...7 76 Wireless Security Configuration Web Authentication for Mobile Users ...
Страница 271: ...8 1 8 Special Features ...
Страница 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Страница 309: ...9 1 9 Command Line Reference ...
Страница 476: ...9 168 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Страница 477: ...A 1 A File Uploads Downloads and Resets ...
Страница 497: ...A 21 File Uploads Downloads and Resets Disabling the Access Point Push Buttons This page is intentionally unused ...
Страница 498: ...A 22 File Uploads Downloads and Resets Disabling the Access Point Push Buttons ...
Страница 499: ...B 1 B Defaults ...
Страница 512: ...B 14 Defaults Wireless Distribution System WDS This page is intentionally unused ...
Страница 513: ...C 1 C Adaptive Tx Power Control Use Cases ...
Страница 523: ...D 1 D Open Source Licenses ...
Страница 525: ...D 3 Open Source Licenses Overview This appendix includes the following information Open Source licenses ...
Страница 556: ...D 34 Open Source Licenses ...
Страница 561: ......