HP ProCurve 420 Management And Configuration Manual page 131

Table of Contents

Advertisement

Configuring Encryption in the HP ProCurve Wireless Access Point 420
Encryption Methods and
Process
WEP Static ONLY
1. Define MAC
authentication method
2. Configure Security
Suite wizard option 2
(encryption only) or as
shared-key (includes
authentication)
3. Configure key length
4. Configure key index
5. Configure key
* The AP 420 supports the following Extensible Authentication Protocol (EAP) methods: MD5, TLS, TTLS and PEAP
** Please refer to the table "Configuring MAC Authentication in the HP ProCurve Wireless Access Point 420"
*** To start, the access point is in the factory default configuration.
Conventions used:
Vertical bars separate alternative, mutually exclusive elements ( | ).
Braces enclose required elements ( < > ).
Italics indicate variables for which the user must supply a value when executing the command.
Configuring MAC Authentication in the HP ProCurve Wireless Access Point 420
MAC
MAC
Authentication
Authentication
Mode
Local MAC
Local MAC
authentication
CLI Privilege Level and Commands***
Global Configuration Level
HP420(config)#mac-authentication server
remote**
OR
HP420(config)#mac-authentication server local
OR
HP420(config)#no mac-authentication server
Context Configuration Level
HP420(if-wireless g)#security-suite 2
OR
HP420(if-wireless g)#security-suite shared-key
HP420(if-wireless g)#key-length-wep <64 | 128 | 152>
HP420(if-wireless g)#transmit-key-wep <1 | 2 | 3 | 4>
HP420(if-wireless g)#wep-key <1 | 2 | 3 | 4> <ASCII |
HEX> <key>
Table 5-2.
Summary of MAC Authentication Configuration
Local MAC
MAC Authentication Table
Authentication
MAC Address
MAC Table
Permission
Deny
xx-xx-xx-xx-xx-xx
Access Point Configuration
Configuring Wireless Security
Additional
Requirements
WEP supported
client required.
RADIUS Comments
Permission
Active Inactive
*
Not
needed
Notes
Requires manual
key management.
Encryption index,
length and type
configured in the
access point must
match those config­
ured in the clients.
All MAC addresses
allowed unless entry
set to active in the
MAC Authentication
Table. Can be
combined with other
methods for improved
security.
5-73

Advertisement

Table of Contents
loading

Table of Contents