WESM zl Management and Configuration Guide WT.01.XX and greater

4-62
Wireless Local Area Networks (WLANs)
Configuring a WLAN
Configuring Encryption for a WLAN that Uses Web-Auth. Web-Auth
occurs after a station connects to the WLAN and, by itself, provides no
encryption.
To protect the users’ data within the wireless network, you can add WEP or
WPA/WPA2 encryption. In this case, users must first enter a WEP or WPA key
to connect to the WLAN. Then, when they attempt to access a Web site, they
must submit their username and password for Web-Auth.
See “Web-Auth” on page 4-39 or Chapter 5: “Web Authentication for Mobile
Users” for instructions on configuring the authentication. After selecting Web-
Auth in a WLAN’s Edit screen, you have several choices for which boxes in the
Encryption section to check. Table 4-6 summarizes these options and refers you
to section that explains how to configure the second security option.
Table 4-6. Encryption Options for Web-Auth
Configuring Advanced WLAN Settings
In the Advanced section of a WLAN’s Edit screen, you can establish more
specialized settings for a WLAN.
This section will explain how to configure:
control over inter-station traffic
closed system operations
inactivity timeouts
Encryption Option Security Option Reference
WEP 64 static WEP “Configuring Static WEP
Encryption (No
Authentication)” on
page 4-48
WEP 128 static WEP “Configuring Static WEP
Encryption (No
Authentication)” on
page 4-48
WPA/WPA2-TKIP WPA/WPA2-PSK “Configuring WPA/WPA2-
PSK” on page 4-58
WPA2-AES WPA2-PSK “Configuring WPA/WPA2-
PSK” on page 4-58
WPA/WPA2-TKIP and
WPA2-AES
WPA/WPA2-PSK “Configuring WPA/WPA2-
PSK” on page 4-58