Secure Access Configuration Guide For Wireless Clients Part Two: Wireless Data Privacy and Monitored Logon 2003-03

ProCurve Networking
Secure Access Configuration
Guide For Wireless Clients
Part Two: Wireless Data Privacy and
Monitored Logon
Secure Access Configuration Guide For Wireless Clients ....................2
Introduction ......................................................................................................... 2
Configuration Scenarios ......................................................................................... 2
Required Network Services..................................................................................... 2
Basic Setup and Topology....................................................................................... 3
Software Versions.................................................................................................4
Getting Started..................................................................................................... 4
Step 1: Configuring the Switch 5300xl .....................................................................4
Step 2: Configuring the Access Control Server 740wl ................................................. 5
Step 3: Configuring the Access Control xl Module....................................................... 5
Step 4: Configuring the Access Point 420..................................................................5
Configuring Scenario 4: Wireless Data Privacy Logon using VPN Authentication (PPTP).... 8
Configuring Scenario 5: Wireless Data Privacy Logon
using VPN Authentication (L2TP/IPSec)
.............................................................. 23
Configuring Scenario 6: Monitored Logon 802.1x Authentication ................................. 44
© Copyright 2005 Hewlett-Packard Company, LP.

Summary of content (60 pages)