Other Security Features - HP 530 Management Manual

Procurve wireless access point 530
Hide thumbs Also See for 530:
Table of Contents

Advertisement

Wireless Security Configuration
Wireless Security Overview
Security Mechanism
No Security
(NOT RECOMMENDED)
Static WEP Keys
Dynamic WEP
WPA-PSK
WPA-PSK (WPA2 Only) Requires WPA-enabled system and
WPA-802.1X
(RECOMMENDED
MODE)
WPA-8021X (WPA2
only)
7-12

Other Security Features

In addition to the wireless security features described in the preceding section,
the Access Point 530 has a user-based security feature called Identity Driven
Management (IDM).
For more details on IDM, see
Table 7-1.
Summary of Wireless Security
Client Support
Built-in support on all 802.11a,
802.11b, and 802.11g devices
Built-in support on all 802.11a,
802.11b, and 802.11g devices
Requires 802.1X client support in
system or by add-in software
(support provided in Windows 2000
SP3 or later, Windows XP, and
Windows Vista)
Requires WPA-enabled system and
network card driver
(native support provided in
Windows XP and Windows Vista)
network card driver
(native support provided in
Windows XP and Windows Vista)
Requires WPA-enabled system and
network card driver
(native support provided in
Windows XP and Windows Vista)
Requires WPA-enabled system and
network card driver
(native support provided in
Windows XP and Windows Vista)
"Identity Driven Management" on page 8-36
Implementation Considerations
• No key management, data encryption, or user
authentication is used
• Provides only weak security
• Requires manual key management
• Provides dynamic key rotation for improved WEP
security
• Requires configured RADIUS server
• 802.1X EAP type may require management of digital
certificates for stations and server
• Provides dynamically generated keys that are
periodically refreshed
• Provides similar shared key user authentication
• Provides robust security in small networks
• Provides robust security in small networks
• Requires manual management of pre-shared key
• stations may require hardware upgrade to be WPA2
compliant
• Provides dynamically generated keys that are
periodically refreshed
• Requires configured RADIUS server
• Provides backward compatibility to the original WPA
• Provides the strongest security in WPA2-only mode
• Provides robust security in mixed mode for WPA and
WPA2 stations
• Offers fast roaming for time-sensitive station
applications
• Requires configured RADIUS server
• 802.1X EAP type may require management of digital
certificates for stations and server
• Stations may require hardware upgrade to be WPA2
compliant
.

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Procurve 530

Table of Contents