4-34
Using the ProCurve Web Browser Interface
Tasks for Your First ProCurve Web Browser Interface Session
12. Click
[Update]
to save these Security settings.
WEP is the security protocol initially specified in the IEEE 802.11 standard
for wireless communications. While WEP provides a margin of security for
environments with light network traffic, it is not sufficient for enterprise use
where highly-sensitive data is transmitted.
For more robust wireless security, you should consider implementing other
features supported by the access point. Wi-Fi Protected Access (WPA) and
IEEE 802.1X-2004 (Port-based network access control using the physical
access characteristics of IEEE 802® Local Area Networks (LAN) infrastruc-
tures to provide a means of authenticating and authorizing devices attached
to a LAN port that has point-to-point connection characteristics) provide
improved data encryption and user authentication. See
“Wireless Security Configu-
ration” on page 7-1
.
Содержание ProCurve 530 NA
Страница 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Страница 2: ......
Страница 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Страница 21: ...1 1 1 Getting Started ...
Страница 28: ...1 8 Getting Started Need Just a Quick Start This page is intentionally unused ...
Страница 29: ...2 1 2 Selecting a Management Interface ...
Страница 35: ...3 1 3 Using the Command Line Interface CLI ...
Страница 50: ...3 16 Using the Command Line Interface CLI CLI Control and Editing This page is intentionally unused ...
Страница 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Страница 85: ...5 1 5 General System Configuration ...
Страница 152: ...5 68 General System Configuration Managing Group Configuration This page is intentionally unused ...
Страница 178: ...6 26 Wireless Interface Configuration Modifying Antenna Settings 6 Select Update to set the antenna parameters ...
Страница 195: ...7 1 7 Wireless Security Configuration ...
Страница 270: ...7 76 Wireless Security Configuration Web Authentication for Mobile Users This page is intentionally unused ...
Страница 271: ...8 1 8 Special Features ...
Страница 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Страница 309: ...9 1 9 Command Line Reference ...
Страница 474: ...9 166 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Страница 475: ...A 1 A File Uploads Downloads and Resets ...
Страница 495: ...B 1 B Defaults ...
Страница 507: ...C 1 C Adaptive Tx Power Control Use Cases ...
Страница 517: ...D 1 D Open Source Licenses ...
Страница 519: ...D 3 Open Source Licenses Overview This appendix includes the following information Open Source licenses ...
Страница 550: ...D 34 Open Source Licenses This page is intentionally unused ...
Страница 555: ......