Ap Deployed With A Controller - HP MSM3xx Management And Configuration Manual

Msm3 series/msm4 series
Hide thumbs Also See for MSM3xx:
Table of Contents

Advertisement

Working with VSCs
VSC data flow
Features
Authentication: Authentication can be either 802.1X or MAC. To validate user
credentials the AP makes use of an external RADIUS server, which can be the controller
or a third-party device. For more information, see
Wireless security filters: Enables the AP to block traffic unless it is addressed to a
specific device (like the controller). For more information, see
on page
MAC filter: Enables the AP to only allow wireless-to-wired LAN traffic for specific
wireless-user MAC addresses. For more information, see
IP filter: Enables the AP to only allow wireless-to-wired LAN traffic for specific
wireless-user IP addresses. For more information, see
Egress
Bridge onto port 1+2: Unless a centralized mode tunnel has been established, user and
authentication traffic is bridged onto ports 1 and 2 (if available).
VLAN: All traffic on port 1 or 2 (if available) can be assigned to a VLAN.

AP deployed with a controller

Ingress
The AP only handles wireless traffic. The SSID is the name of the wireless network that the
user associates with.
Features
Authentication: Authentication can either 802.1X or MAC. To validate user credentials
the AP makes use of the controller. For more information, see the chapter on User
authentication in the MSM7xx Controllers Management and Configuration Guide.
Wireless security filters: Enables the AP to block traffic unless it is addressed to a
specific device (like the controller). For more information, see
on page
MAC filter: Enables the AP to only allow wireless-to-wired LAN traffic for specific
wireless-user MAC addresses. For more information, see
IP filter: Enables the AP to only allow wireless-to-wired LAN traffic for specific
wireless-user IP addresses. For more information, see
Egress
Bridge onto port 1+2: User and authentication traffic is bridged onto ports 1 and 2 (if
available).
VLAN: All traffic on port 1 or 2 (if available) can be assigned to a VLAN.
4-22
4-14.
4-14.
Stand-alone deployment on page 4-2
Wireless security filters
MAC filter on page
IP filter on page
4-20.
Wireless security filters
MAC filter on page
IP filter on page
4-20.
4-19.
4-19.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents