7-17
Wireless Security Configuration
Establishing Security
You should give special consideration to the security option for WLAN 1 if you
are configuring one or more Wireless Distribution System (WDS) links on the
AP 530. The security option configured for WLAN 1 also establishes the
security option that is used with WDS links (1–6). WDS security options (and
thus the WLAN 1 configuration) are limited to one of the choices listed in Table
7-4. The security modes in the table are listed in order of the least secure to
the most secure.
Table 7-4.
WLAN 1 and WDS Security Configuration
N OT E
You must configure WDS data encryption keys separately, because the WEP
or WPA/WPA2 encryption key configured for WLAN 1 is not used for WDS
links. See
“Wireless Distribution System (WDS) and Spanning Tree Protocol (STP)” on page 8-15
.
CAU T I O N
When access point configuration parameters are changed, wireless stations
may be temporarily disconnected until the new configuration parameter is
enabled. This includes any changes to a WLAN or radio parameter.
The recommended security option for WDS operation is WPA2, using the AES
cipher, because this setting provides the maximum security for data sent over
the WDS link.
The No Security option can be used for initial setup, testing, or problem solving
for a WDS link, but this setting is not recommended for normal operation. With
No Security, all wireless data received by the access point (for all WLANs) is
decrypted by the access point upon receipt and is then sent over the WDS link
with no data encryption.
Security Mode on WLAN 1
Security Mode for WDS links (1–6)
No Security
No Security (not recommended)
Static/Dynamic WEP
Static WEP
WPA-PSK/802.1X, WPA-only, TKIP cipher
WPA-PSK, TKIP cipher
WPA-PSK/802.1X, WPA2-only, AES cipher
WPA-PSK, AES cipher (recommended)
Содержание ProCurve 530 NA
Страница 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Страница 2: ......
Страница 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Страница 21: ...1 1 1 Getting Started ...
Страница 28: ...1 8 Getting Started Need Just a Quick Start This page is intentionally unused ...
Страница 29: ...2 1 2 Selecting a Management Interface ...
Страница 35: ...3 1 3 Using the Command Line Interface CLI ...
Страница 50: ...3 16 Using the Command Line Interface CLI CLI Control and Editing This page is intentionally unused ...
Страница 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Страница 85: ...5 1 5 General System Configuration ...
Страница 152: ...5 68 General System Configuration Managing Group Configuration This page is intentionally unused ...
Страница 178: ...6 26 Wireless Interface Configuration Modifying Antenna Settings 6 Select Update to set the antenna parameters ...
Страница 195: ...7 1 7 Wireless Security Configuration ...
Страница 270: ...7 76 Wireless Security Configuration Web Authentication for Mobile Users This page is intentionally unused ...
Страница 271: ...8 1 8 Special Features ...
Страница 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Страница 309: ...9 1 9 Command Line Reference ...
Страница 474: ...9 166 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Страница 475: ...A 1 A File Uploads Downloads and Resets ...
Страница 495: ...B 1 B Defaults ...
Страница 507: ...C 1 C Adaptive Tx Power Control Use Cases ...
Страница 517: ...D 1 D Open Source Licenses ...
Страница 519: ...D 3 Open Source Licenses Overview This appendix includes the following information Open Source licenses ...
Страница 550: ...D 34 Open Source Licenses This page is intentionally unused ...
Страница 555: ......