Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.02.xx and greater

Table Of Contents
1-33
Introduction
ProCurve Wireless Edge Services xl Module
Table 1-2 lists the encryption options that are available with each authentica-
tion option.
Table 1-2. Options for Authentication and Encryption on the Wireless Edge
Services xl Module
Intrusion Detection
Even if an unauthorized wireless user is denied access to a WLAN, he or she
can launch attacks. For example, he or she can flood RPs with probe requests
or pose as another user and cause that user denial of service (DoS). You can
implement a variety of attack checks on the Wireless Edge Services xl Module
that guard against malicious attacks from any wireless user. For more infor-
mation, see Chapter 13: Wireless Network Management.
Authentication Option Encryption Options Name of Security Provided
802.1X WEP with 64-bit or 128-bit keys
WPA/WPA2:
with TKIP
–with AES
with both TKIP and AES (802.11i Mixed Mode)
•dynamic WEP
WPA/WPA2 with 802.1X
Web-Auth WEP with 64-bit or 128-bit keys
WPA/WPA2:
with TKIP
–with AES
with both TKIP and AES (802.11i Mixed Mode)
static WEP
WPA/WPA2 with a preshared key
(PSK)
RADIUS MAC authentication WEP with 64-bit or 128-bit keys
WPA/WPA2:
with TKIP
–with AES
with both TKIP and AES (802.11i Mixed Mode)
static WEP
WPA/WPA2-PSK
MAC filters (comparable to
local MAC authentication)
Depends on other authentication implemented
on the WLAN
Depends on other authentication
implemented on the WLAN
No authentication WEP with 64-bit or 128-bit keys
WPA/WPA2:
with TKIP
–with AES
with both TKIP and AES (802.11i Mixed Mode)
static WEP
WPA/WPA2-PSK