EasyManua.ls Logo

HP 530 User Manual

HP 530
562 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #204 background imageLoading...
Page #204 background image
7-10
Wireless Security Configuration
Wireless Security Overview
network VPN server. If this mode is used, it may be desirable to prevent
advertising availability of the network to other stations by configuring the
WLAN for closed-system operation.
Caution Use the No Security mode on a sensitive internal network only for initial setup,
testing, or problem solving, or where VPN connections are mandated to
provide end-to-end security for the otherwise insecure wireless connection.
Static Wired Equivalent Privacy (WEP)
Static Wired Equivalent Privacy (WEP) uses shared keys (fixed-length hexa-
decimal or alphanumeric strings) that are manually distributed to all stations
that want to use the network. WEP keys are indexed in different slots (up to
four on each WLAN) and the client stations must have the same key indexed
in the same slot to access data on the access point. Shared mode 802.11
authentication is not recommended, because it sends encryption keys that are
viewable in plain text.
Dynamic Wired Equivalent Privacy (WEP)
Dynamic WEP uses WEP as the encryption cipher and 802.1X as the authen-
tication mechanism. In this way, each client station is assigned a unique
encryption key (for each session) from the authentication server. The length
of the cipher can be 64 bits or 128 bits, and the encryption keys can be
automatically and periodically changed to further reduce the risk of their
discovery.
TKIP with Preshared Key
The TKIP with Preshared Key security profile uses TKIP as the encryption
cipher and preshared key between the access point and station as the master
key and authentication mechanism. The encryption keys used between the
access point and the stations are derived from the same master key.
AES with Preshared Key
The AES with Preshared Key security profile uses AES as the encryption
cipher and preshared key between the access point and station as the master
key and authentication mechanism. The encryption keys used between the
access point and the stations are derived from same master key.

Table of Contents

Other manuals for HP 530

Question and Answer IconNeed help?

Do you have a question about the HP 530 and is the answer not in the manual?

HP 530 Specifications

General IconGeneral
GraphicsIntel GMA 950
ProcessorIntel Core Duo T2050
RAM512 MB, upgradable to 2 GB
Storage80 GB HDD
Display15.4-inch WXGA (1280 x 800)
Operating SystemWindows XP Professional
Battery6-cell Lithium-Ion
Optical DriveDVD+/-RW
Ports3 x USB 2.0, 1 x VGA, 1 x RJ-45, 1 x RJ-11, 1 x Headphone, 1 x Microphone
Wireless802.11a/b/g

Summary

Getting Started

Overview

Introduces the guide and applicable products.

IP Addressing

Guides on configuring IP addressing using the CLI for quick setup.

Selecting a Management Interface

Understanding Management Interfaces

Explains CLI, Web browser, and SNMP interfaces for managing the access point.

Advantages of Using the CLI

Details the benefits and usage of the Command Line Interface for configuration.

Using the Command Line Interface (CLI)

Accessing the CLI

Describes methods for accessing the CLI via console, Telnet, or SSH.

Password Security

Emphasizes setting a strong manager password to secure access to the CLI.

Using the ProCurve Web Browser Interface

Starting a Web Browser Interface Session with the Access Point

Explains how to initiate a web browser session using IP address or DNS name.

Changing the Management Password

Explains how to change the management password to enhance access security.

General System Configuration

Modifying Management Passwords

Details how to change the administrator password for secure management access.

Configuring SNMP

Introduces SNMP for network management and the access point's support for versions 1, 2c, and 3.

Wireless Interface Configuration

Setting the Country Code

Explains the importance of setting the country code for authorized radio channels and regulatory compliance.

Managing Multiple WLAN (BSS/SSID) Interfaces

Explains how to separate wireless traffic for different user groups using multiple SSIDs on a single access point.

Wireless Security Configuration

Wireless Security Overview

Explains wireless security concepts: open system, authentication, encryption, and key management.

Establishing Security

Provides access to security options via the WLANs tab and explains basic parameter configuration.

Special Features

QoS Commands

Explains QoS technologies for controlling traffic and the IEEE 802.11e standard for wireless networks.

Identity Driven Management

Introduces Identity-Driven Management (IDM) integrated with 802.1X for automatic network edge configuration based on user identity.

Command Line Reference

General Commands

Covers basic commands like configure, end, exit, logout, ping, reload, show, terminal, and write.

System Management Commands

Covers commands for configuring country code, hostname, domain, password manager, buttons, CLI confirmation, console, Telnet, SSH, and web-management.

File Uploads, Downloads, and Resets

Downloading Access Point Software

Explains how to acquire and download new access point software from the ProCurve support site.

Transferring Configuration Files

Covers copying configuration files to/from remote servers using Web UI and CLI.

Defaults

System Management

Lists default settings for System Management commands like country, hostname, password manager, buttons, console, Telnet, SSH, and web-management.

Adaptive Tx Power Control Use Cases

Use Model: Airport Deployment

Demonstrates Adaptive Transmit Power Control in an airport network scenario with SSID and RF Group Name configurations.

Open Source Licenses

GPL2 (GNU General Public License, v.2)

Provides the full text of the GNU General Public License, version 2.

Related product manuals