Contents
vi
Viewing scan results............................................................................................3-34
Identifying unauthorized APs.............................................................................3-34
Viewing wireless information ...................................................................................3-35
Viewing all wireless clients ................................................................................3-35
Viewing wireless client data rates .....................................................................3-37
High throughput (HT) rate traffic ...............................................................3-37
Legacy rate traffic .........................................................................................3-38
Wireless access points ........................................................................................3-39
Access point status .......................................................................................3-39
4 Working with VSCs
Key concepts.................................................................................................................4-2
Stand-alone deployment .......................................................................................4-2
User authentication ........................................................................................4-2
Using more than one authentication type in a VSC....................................4-3
Deployment with a controller ..............................................................................4-3
Management with VLANs .....................................................................................4-4
Viewing and editing VSC profiles ........................................................................4-5
VSC configuration options ..........................................................................................4-5
General....................................................................................................................4-7
If Use HP MSM Controller option is enabled..............................................4-7
If Use HP MSM Controller option is disabled.............................................4-7
Virtual AP................................................................................................................4-9
WLAN ...............................................................................................................4-9
Wireless clients..............................................................................................4-11
Quality of service ..........................................................................................4-12
Allowed wireless rates .................................................................................4-13
Egress VLAN ........................................................................................................4-14
Wireless security filters.......................................................................................4-14
Default wireless security filter definitions ................................................4-15
Wireless protection..............................................................................................4-16
WPA ................................................................................................................4-17
802.1X .............................................................................................................4-18
WEP ................................................................................................................4-18
MAC-based authentication .................................................................................4-19
Location-aware ....................................................................................................4-19