User Manual
Table Of Contents
- Contents
- Introducing the ProCurve Wireless Access Point 10ag
- Installing the Access Point
- Before You Begin
- Installation Precautions
- Summary of Installation Tasks
- Installation Procedures
- Getting Started With Access Point Configuration
- Setting Up the Access Point
- Configuring Basic Settings
- Configuring Basic Wireless Settings
- Configuring the Security Settings
- Controlling Access to the Wireless Network
- Configuring Advanced Wireless Settings
- Setting the SNMP Community Names
- Managing the Access Point
- Troubleshooting
- Specifications
- Access Point Port and Network Cables
- Safety and EMC Regulatory Statements
- Open Source Licenses
- Recycle Statements
ii
Step 5. Connect the Access Point to a Power Source . . . . . . . . . . . . . 2-12
Step 6. Connect the Network Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13
Using the RJ-45 Connectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13
3 Getting Started With Access Point Configuration
Introducing the Management Web Interface . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Logging On to the Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Navigating Around the Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Tasks for Your First Web Browser Interface Session . . . . . . . . . . . . . . . . . 3-5
Default Configuration Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
4 Setting Up the Access Point
Configuring Basic Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1
Configuring Basic Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3
Creating a Wireless Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
Editing a Wireless Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
Deleting a Wireless Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
Configuring the Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7
Wireless Security Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7
Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8
Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-9
Key Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-9
Deciding Which Security Profile to Use . . . . . . . . . . . . . . . . . . . . . . . . 4-10
Configuring the Access Point with Your Preferred Security Profile 4-10
Using No Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-11
Configuring WEP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12
Configuring WPA-PSK (TKIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14
Configuring WPA2-PSK (AES) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-15
Configuring WPA-PSK (TKIP) / WPA2-PSK (AES) . . . . . . . . . . . 4-16
Configuring WPA (TKIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18
Configuring WPA2 (AES) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-20
Configuring 802.1X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-21
Controlling Access to the Wireless Network . . . . . . . . . . . . . . . . . . . . . . . 4-22
Setting Up Local MAC Authentication . . . . . . . . . . . . . . . . . . . . . . . . . 4-23
Setting Up Remote MAC Authentication . . . . . . . . . . . . . . . . . . . . . . . 4-25










