WESM zl Management and Configuration Guide WT.01.XX and greater

1-27
Introduction
ProCurve Wireless Edge Services zl Module
Figure 1-10 illustrates the Web-Auth process.
Figure 1-10. Web-Auth Process
After users authenticate, the Wireless Edge Services zl Module can control
users’ network access with dynamic ACLs stored in the external RADIUS
server’s database (perhaps configured with software such as ProCurve IDM).
You can also control the VLAN associated with Web-Auth with manual ACLs.
The Wireless Edge Services zl Module grants users that fail to authenticate the
same guest status that it grants unauthenticated users. If you want, you can
add IP addresses to the approved list to provide limited resources to such
users. For example, you could allow unauthenticated guests to access a Web
page with information about your organization and other courtesy services.
Web-Auth is popular for wireless networks with many anonymous users who
may or may not have client software that supports 802.1X. This form of
authentication grants companies a degree of control over users’ access while
presenting users with an intuitive and easily navigable login interface. How-
ever, Web-Auth is not as secure as 802.1X.