Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.01.03 or greater
1-46
Introduction
Radio Ports
A module collects a variety of information from managed RPs. For example,
RPs configured as detectors report information about neighboring APs. The
module then processes this information into lists of authorized and unautho-
rized APs according to rules that you configure.
The Wireless Edge Services xl Module also collects information about the
wireless network in order to improve its functioning. For example, if you
enable interference avoidance, the module has RPs change their channel when
they report excessive congestion. For more information on this and other
network self-healing capabilities, see Chapter 6: Wireless Network
Management.
Power over Ethernet (PoE)
PoE, based on the IEE 802.3af standard, defines a mechanism by which a
device receives power over the Ethernet cable on which it also sends and
receives data.
ProCurve RPs 210, 220, and 230 must be powered by PoE. The RPs operate
at 48 V and typically draw about 7 W of power.
An RP can connect to:
■ a 10/100 Ethernet port on a PoE module in your wireless services-enabled
switch
■ a 10/100 Ethernet port on an 802.3af-compatible PoE switch, such as a
ProCurve 2600-PWR
■ an 802.3af-compatible PoE injector
The source can be up to 100 meters away.
You should use a CAT 5 cable for the connection. The devices use LLDP-MED
to automatically communicate power requirements to the power source.
802.1X Default Client
An unauthorized RP can threaten your network, especially if it is actually
adopted by your Wireless Edge Services xl Module. Such an RP would be
treated exactly as an authorized RP, receiving settings for your network’s
WLANs and sending traffic into the Ethernet network. All the dangers men-
tioned for unauthorized APs in “Detectors” on page 1-39 are magnified.
For the greatest security, you should force RPs to authenticate themselves
before connecting to your network.