WESM zl Management and Configuration Guide WT.01.XX and greater
1
Contents
1 Introduction
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
ProCurve Wireless Edge Services zl Module . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Wireless Networks and WLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5
The Interface Between the Wireless and Wired Networks . . . . . . . . . 1-7
Communicating with RPs: Radio Port VLANs . . . . . . . . . . . . . . . . 1-8
Communicating with the Ethernet Network: Uplink
VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12
Forwarding Traffic Between the Wireless Network and
the Ethernet Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-14
Layer 2 and Layer 3 Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16
RP Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16
Wireless Edge Services zl Module Operations . . . . . . . . . . . . . . . 1-17
Determining the Layer 3 Services Your Wireless Edge
Services zl Module Should Provide . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-18
Using the Same VLANs for Wireless and Wired Users . . . . . . . . 1-18
Reserving VLANs for Wireless Users . . . . . . . . . . . . . . . . . . . . . . . 1-19
Reserving VLANs for Wireless Users in a Network
with Multiple Wireless Edge Services zl Modules . . . . . . . . . . . . 1-21
IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-23
DHCP Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-24
Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-24
Authentication Options for WLANs . . . . . . . . . . . . . . . . . . . . . . . . 1-24
Encryption Options for WLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-32
Intrusion Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-34
Controlling Traffic with Policies . . . . . . . . . . . . . . . . . . . . . . . . . . 1-35
Wireless Edge Services zl Module Firewall . . . . . . . . . . . . . . . . . 1-38
PKI and Digital Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-45