Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.02.xx and greater

Table Of Contents
4-34
Wireless Local Area Networks (WLANs)
Configuring a WLAN
Necessary Configurations on the Wireless Services-Enabled
Switch
The VLAN for which the Wireless Edge Services xl Module tags WLAN traffic
is called an uplink VLAN. If you decide to have your Ethernet infrastructure
devices route traffic from the wireless stations, you must tag the module’s
uplink port for the stations’ VLAN. You make this configuration from the
wireless services-enabled switch. (See the Wireless Edge Services xl MOdule
Supplement to the ProCurve 6400cl/5300xl/3400cl Management and Config-
uration Guide.)
Alternatively, you can have the Wireless Edge Services xl Module route
wireless traffic and perform other necessary services for the wireless stations’
VLAN. In this case, no further configuration on the wireless services-enabled
switch is necessary.
Configuring Security Options
From the Network Setup > WLAN Setup > Edit screen, you can also configure
authentication and encryption options.
The security provided by a WLAN is one of its most important functions. All
RPs in a WLAN must use the same security options and, for some security
options, static keys. Therefore, the Wireless Edge Services xl Module, which
automatically deploys the same WLAN configuration to all adopted RPs,
simplifies establishing a WLAN throughout a wireless network. Remember,
however, that if your network includes more than one Wireless Edge Services
xl Module, you must configure exactly the same security options for identical
WLANs on different modules.
Configuring Authentication
For the best security, you should enable some form of authentication on every
WLAN. Authentication protects your network resources from unauthorized
access; it can also protect wireless stations from connecting to a rogue access
point (AP).
The Wireless Edge Services xl Module supports three types of authentication:
802.1X Extensible Authentication Protocol (EAP)
Web authentication (Web-Auth)
Media Access Control (MAC) authentication