Configuring Wireless Security - HP R110 Configuration And Administration Manual

R100-series wireless vpn routers
Hide thumbs Also See for R110:
Table of Contents

Advertisement

Configuring wireless security

The router's wireless interface is configured by default as an open system, which broadcasts a
beacon signal including the configured SSID. Wireless clients can read the SSID from the
beacon and automatically connect to the wireless network. To implement wireless security, you
need to employ authentication, which verifies users connecting to the network, and traffic
encryption, to protect transmitted data from interception and eavesdropping.
The router supports supports a number of security mechanisms that provide various levels of
authentication and encryption, depending on the requirements of the network.
MAC Authentication
You can control access to the wireless network based on the MAC address of a user's wireless
device. You can either block access or allow access, depending on your requirements.
Select whether to disable MAC authentication, use a MAC authentication list stored locally on
the router, or use a list stored on a RADIUS server. If local MAC authentication is selected,
configure your MAC address list on the Wireless > MAC Authentication page. See
authentication settings" on page
Note that MAC authentication occurs after other authentication methods have been applied.
Authentication Mode and Encryption Type
Using authentication and encryption can help keep your network secure. Encryption works on a
system of keys, where the key on a computer must match the key on the router. The router
supports a number authentication and encryption methods. When an authentication mode is
selected from the list, only the valid encrytion types can be selected and all other available
configuration options, if any, are displayed.
The router provides the following Authentication Mode options:
Open: Allows a client to associate with the router without any authentication, but provides
the option of using WEP for encrypting data. If WEP encryption is used, clients must have
the correct WEP key to exchange traffic with the router. Selecting WEP encryption also
provides the option of using 802.1X for user authentication from a RADIUS server, which
dynamically generates WEP keys and distributes them to all clients.
For WEP settings, see
For RADIUS settings, see
56
Wireless configuration
70.
"WEP security" on page
"Configuring RADIUS settings" on page
57.
62.
"MAC

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

R120

Table of Contents