User Manual
Table Of Contents
- Contents
- Introducing the ProCurve Wireless Access Point 10ag
- Installing the Access Point
- Before You Begin
- Installation Precautions
- Summary of Installation Tasks
- Installation Procedures
- Getting Started With Access Point Configuration
- Setting Up the Access Point
- Configuring Basic Settings
- Configuring Basic Wireless Settings
- Configuring the Security Settings
- Controlling Access to the Wireless Network
- Configuring Advanced Wireless Settings
- Setting the SNMP Community Names
- Managing the Access Point
- Troubleshooting
- Specifications
- Access Point Port and Network Cables
- Safety and EMC Regulatory Statements
- Open Source Licenses
- Recycle Statements
4-9
Setting Up the Access Point
Configuring the Security Settings
Setting Up the Access Point
The Access Point 10ag supports all EAP type tested by the WiFi Alliance; TLS,
TTLS, PEAP0/MSCHAPv2, PEAP1/GTC and SIM. EAP types which do not
provide key management (like MD5) are not suitable for wireless networks.
802.1X authentication can be used with WEP, TKIP and AES encryption
ciphers. It is possible to use a combination of both MAC authentication and
802.1X authentication simultaneously on the same WLAN.
Encryption
The access point supports three types of encryption:
■ Wired Equivalent Privacy (WEP): Key lengths of 64 bits and 128 bits are
possible. WEP provides the least secure method of encryption (static WEP
is not secure, as it can be easily compromised).
■ Temporal Key Integrity Protocol (TKIP): Intermediate security between
WEP and AES with key length of 256 bits. Provides a more-secure method
of encryption than WEP (security is much better than WEP, but not as
robust as AES).
■ Advanced Encryption Standard (AES): AES is a symmetric 128-bit block
data encryption technique that works on multiple layers of the network.
It is the most effective encryption system currently available for wireless
networks.
Key Management
Keys for encrypting the data can be managed either dynamically using 802.1X
authentication or statically using pre-shared keys between the access point
and station. Dynamic key management provides significantly better security
when compared to using static keys.










