Wireless Security - Eap Overview; Mac Access - HP WL520 User Manual

Hp wl520 enterprise access point user guide
Hide thumbs Also See for WL520:
Table of Contents

Advertisement

wireless security - eap overview

wireless security - eap overview
wireless security - eap overview
wireless security - eap overview
802.1x uses the Extensible Authentication Protocol (EAP) as a standards-based authentication framework, and supports
dynamic WEP keys for enhanced security. The EAP-based authentication framework can easily be upgraded to keep pace with
future EAP types, which. can easily be added to the access point device. EAP currently supports three authentication methods:
EAP-Message Digest 5 (MD5)
EAP-Transport Layer Security (TLS)
EAP-Tunneled Transport Layer Security (TTLS)
EAP-MD5 is a user name and password base method. EAP-TLS requires the use of certificates on both the access point and the
client. EAP-TTLS is a username and password-based method that requires download of a certificate to the access point device.

mac access

mac access
mac access
mac access
The MAC Authentication tab allows you to build a list of authorized stations that will be stored inside each HP WL520 within
your network.
Enable MAC Access Control
Enable MAC Access Control
Enable MAC Access Control
Enable MAC Access Control
turn off the MAC Address authentication feature.
Operation Type
Operation Type
. Select
Passthru
Passthru
Operation Type
Operation Type
Passthru
Passthru
select
to prevent access by devices listed in the MAC Access Control Table. This only takes effect when the MAC
Block
Block
Block
Block
Access Control Status is enabled.
NOTE:
For larger networks that include multiple HP WL520 devices, you may prefer to maintain this list on a centralized
location using a
RADIUS
mac access control table
mac access control table
mac access control table
mac access control table
To add an entry, click
, and then specify the MAC Address and related comment.
Add
Add
Add
Add
. Enter the MAC Address of the device.
MAC Address
MAC Address
MAC Address
MAC Address
. Enter related information such as the device name or location.
Comment
Comment
Comment
Comment
To edit or delete an entry, click
. Click to check the boxSelect
Enable
Enable
Enable
Enable
to permit access by only the devices specified in the MAC Access Control Table. In contrast,
Server.
. Edit the information, or select
Edit
Edit
Edit
Edit
Advanced Security Settings
to allow MAC Address authentication, or select
, or
from the
Enable, Disable
Enable
, Di
sable
Delete
Delete
Enable
Enable, ,
Disable
Disable
Delete
Delete
to
Disable
Disable
Disable
Disable
pull-down menu.
Status
4-19

Advertisement

Table of Contents
loading

Table of Contents