
Designing Access Controls
Lay Out the Network
You should also verify that your wireless PEPs support your chosen access control and encryption methods. All ProCurve wireless devices support all encryption options, and the Wireless Edge Services Module supports all three access control methods. As you can see in Table
For full details on each product, visit http://www.hp.com/rnd/products/wire- less/index.htm.
Table
Products
ProCurve Product | Software | Authentication | Dynamic Settings | EAP Method for | Encryption Methods | ||||||
| Version | Methods |
|
| 802.1X |
|
|
| |||
|
|
|
|
|
|
|
|
|
| ||
Wireless Edge | WS.02.02 | • | • | VLAN | Any | • | WEP | ||||
Services zl |
|
| • | • | ACL |
|
| • | WPA/WPA2: | ||
Module |
|
| • | 802.1X | • | Rate limit |
|
|
| – | TKIP |
|
|
|
|
|
| ||||||
|
|
|
|
| • | QoS |
|
|
| – | AES |
Wireless Edge xl | WS.02.07 | • | • | VLAN | Any | • | WEP | ||||
Services Module |
|
| • | • | ACL |
|
| • | WPA/WPA2: | ||
|
|
| • | 802.1X | • | Rate limit |
|
|
| – | TKIP |
|
|
|
|
| • | QoS |
|
|
| – | AES |
AP 530 | WA.01.19 | • | • | VLAN | Any | • | WEP | ||||
|
|
| • | • | ACL |
|
| • | WPA/WPA2: | ||
|
|
|
|
| • | Rate limit |
|
|
| – | TKIP |
|
|
|
|
|
|
|
|
|
| – | AES |
AP 420 | 2.2.1 | • | VLAN | • | • | WEP | |||||
|
|
| • | 802.1X |
|
| • | • | WPA/WPA2: | ||
|
|
|
|
|
|
| • |
| – | TKIP | |
|
|
|
|
|
|
| • | PEAP |
| – | AES |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
N o t e | ProCurve Networking periodically updates the software on APs, Wireless Edge |
| Services Modules, and switches. Check the ProCurve Web site at http:// |
| www.hp.com/rnd/products/wireless/index.htm to see if there is a newer ver- |
| sion of software, which delivers new capabilities for these wireless products. |
|
|
Choose Switches. A Wireless Edge Services xl Module is installed in a Switch 5300xl, and a Wireless Edge Services zl Module in a Switch 5400zl or Switch 8200zl.