Secure Access Configuration Guide For Wireless Clients Part Two: Wireless Data Privacy and Monitored Logon 2003-03

Basic Setup and Topology
This basic setup and topology is used in this guide to configure the above scenarios.
Figure A – Basic Topology
© Copyright 2005 Hewlett-Packard Company, LP. 3