Installation and Getting Started Guide for 720wl/740wl/760wl 2004-03

INTRODUCTION TO THE HP PROCURVE
1
700WL SERIES
This chapter gives a brief description of the installation procedures for HP ProCurve 700wl Series
products. It consists of the following sections
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Order of Network Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Tools and Information Required . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Overview
There are five products that make up the HP ProCurve 700wl Series:
HP ProCurve Access Control Server 740wl
HP ProCurve Access Controller 720wl
HP ProCurve Integrated Access Manager 760wl
The physical installation of the hardware for any of these products is essentially the same, and is
described fully in
Chapter 2, “Hardware Installation”. The hardware installation is always performed
first, before the network installation.
Centralized Administration of the 700wl Series system
Wireless network clients physically connect through Access Controllers, but authentication and rights
administration for these clients is handled centrally from the Access Control Server. In addition, all
configuration of the Access Controllers connected to the system is handled by the Administrative Console
located in the Access Control Server. Once you have installed an Access Controller onto your network,
you should not need to perform any administration functions directly on the Access Controller.
From the centralized Administrative Console on your Access Control Server you can perform the
following configuration functions:
Configure the 700wl Series system setup, including bridging, DHCP Network for NAT Clients,
Forwarding of IP Address broadcasts, setting up HTTP proxies, configuring SNMP settings, and
setting the system date & time
Update the 700wl Series system software or return to a previous version
Set up Wireless Data Privacy policy for clients using VPN protocols
Set up authentication policies for how users authenticate themselves to the system
Set up access policies to control what users can do over the network
1-1