WESM zl Management and Configuration Guide WT.01.28 and greater
1-26
Introduction
ProCurve Wireless Edge Services zl Module
Figure 1-10 illustrates the Web-Auth process.
Figure 1-10. Web-Auth Process
After users authenticate, the Wireless Edge Services zl Module can control users’
network access with dynamic ACLs stored in the external RADIUS server’s database
(perhaps configured with software such as ProCurve IDM). You can also control the
VLAN associated with Web-Auth with manual ACLs.
The Wireless Edge Services zl Module grants users that fail to authenticate the same
guest status that it grants unauthenticated users. If you want, you can add IP addresses
to the approved list to provide limited resources to such users. For example, you could
allow unauthenticated guests to access a Web page with information about your
organization and other courtesy services.
Web-Auth is popular for wireless networks with many anonymous users who may
or may not have client software that supports 802.1X. This form of authentication
grants companies a degree of control over users’ access while presenting users with
an intuitive and easily navigable login interface. However, Web-Auth is not as secure
as 802.1X.