Secure Access Configuration Guide For Wireless Clients Part Two: Wireless Data Privacy and Monitored Logon 2003-03

Secure Access Configuration Guide For Wireless
Clients
Introduction
This document is Part Two of a guide that details the configuration steps for building Secure
Access Solutions for Wireless Clients. Part Two of this guide creates solutions for clients using
wireless data privacy or monitored logons. Part One creates solutions for clients using a
browser-based logon.
The following ProCurve Networking by HP products are used:
ProCurve Access Control Server 740wl (J8154A)
ProCurve Access Point 420 (J8130A)
ProCurve Access Control xl Module (J8162A)
ProCurve Switch 5300xl (J4850A)
Configuration Scenarios
This table defines the configuration scenarios covered in Part Two of this guide.
Scenario Secure Access
Method
Airwave
Security
IP address Authentication Client OS
1 Browser-based
Logon
Static WEP NAT Built-in
Database
Windows XP
2 Browser-based
Logon
WPA-PSK Real IP LDAP Windows XP
3 Browser-based
Logon
Static WEP Real IP RADIUS Windows
2000
4 Wireless Data
Privacy Logon
PPTP VPN NAT VPN Windows XP
5 Wireless Data
Privacy Logon
L2TP/IPSec NAT/Real IP VPN Windows XP
6 Monitored Logon
(802.1x)
Dynamic
WEP/802.1x
Real IP Active Directory
/RADIUS
Windows XP
Required Network Services
The configuration scenarios in the guide require the network services noted below, however,
complete server installation and configuration are not shown here with the exception of specific
changes required by the configuration scenario. Refer to product documentation for more
information.
Microsoft 2003 Enterprise Server with the following running services:
Microsoft Internet Authentication Service (IAS)
Domain Controller
Certificate Authority
DHCP
DNS
Wins
RRAS
© Copyright 2005 Hewlett-Packard Company, LP. 2