Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.01.03 or greater

3-34
Wireless Local Area Networks (WLANs)
Configuring a WLAN
For example, traffic from the WLAN shown in Figure 3-21, which uses the SSID
MyWLAN, is placed in VLAN 10. You can tag wireless traffic for one of your
network’s user VLANs, or you can create a separate VLAN entirely dedicated
to wireless stations.
The VLAN for which the Wireless Edge Services xl Module tags WLAN traffic
is called an uplink VLAN. On the wireless services-enabled switch, you must
configure the modules uplink port to carry tagged traffic in that VLAN. (See
the ProCurve Series 6400cl Switches, 5300xl Switches, and 3400cl Switches
Management and Configuration Guide and ProCurve Series 6400cl
Switches, 5300xl Switches, and 3400cl Switches Advanced Traffic Manage-
ment Guide.)
Note The Wireless Edge Services xl Module initially receives traffic from RPs in a
Radio Port VLAN (typically, 2100). Generally, you should separate the uplink
VLANs to which WLAN traffic is assigned from this downlink VLAN. However,
you can use the same VLAN for both, if you so desire.
For more information on, and other methods for, assigning wireless user
traffic to a VLAN, see “VLAN Assignment” on page 3-62.
Security Options
From the Network Setup > WLAN Setup > Edit screen, you can also configure
authentication and encryption options.
The security provided by a WLAN is one of its most important functions. All
RPs in a WLAN must use the same security options, and for static WEP
encryption, keys. Therefore, the Wireless Edge Services xl Module, which
automatically deploys the same WLAN configuration to all adopted RPs,
simplifies establishing a WLAN throughout a wireless network. Remember,
however, that if your network includes more than one Wireless Edge Services
xl Module, you must configure exactly the same security options for identical
WLANs on different modules.
Authentication
For the best security, you should enable some form of authentication on every
WLAN. Authentication protects your network resources from unauthorized
access; it can also protect wireless stations from connecting to a rogue access
point (AP).