User Manual
Table Of Contents
- Contents
- Introducing the ProCurve Wireless Access Point 10ag
- Installing the Access Point
- Before You Begin
- Installation Precautions
- Summary of Installation Tasks
- Installation Procedures
- Getting Started With Access Point Configuration
- Setting Up the Access Point
- Configuring Basic Settings
- Configuring Basic Wireless Settings
- Configuring the Security Settings
- Controlling Access to the Wireless Network
- Configuring Advanced Wireless Settings
- Setting the SNMP Community Names
- Managing the Access Point
- Troubleshooting
- Specifications
- Access Point Port and Network Cables
- Safety and EMC Regulatory Statements
- Open Source Licenses
- Recycle Statements
4-10
Setting Up the Access Point
Configuring the Security Settings
Setting Up the Access Point
Deciding Which Security Profile to Use
Table 4-1 shows a summary of available security profiles. Use this table as a
reference when deciding on which security profile best suits your network.
Remember that certain security profiles may require additional software or
hardware. 802.1X, for example, requires a RADIUS server to be configured on
the network. Additionally, not all wireless network cards support WPA.
Choose a security profile that provides the highest level of security while
maintaining compatibility with most, if not all, existing wireless devices on
the network.
Table 4-1. Summary of Wireless Security
When you have decided on which security profile to implement on your
network, refer to the next section, ”
Configuring the Access Point with Your
Preferred Security Profile”, for more details including the configuration proce-
dures.
Configuring the Access Point with Your Preferred
Security Profile
Wireless security options are available on the Security Settings page. By
default, the Security Settings page shows None as the selected security
profile. When you click other security options, the page refreshes, and then
displays additional options for that security profile.
Security Profile Client Support Implementation Considerations
None
(NOT RECOMMENDED)
Built-in support on all 802.11a,
802.11b, and 802.11g devices
No key management, data encryption, or user
authentication is used
WEP Built-in support on all 802.11a,
802.11b, and 802.11g devices
• Provides only weak security
• Requires manual key management
WPA-PSK (TKIP) •
WPA2-PSK (AES) •
WPA-PSK (TKIP) /
WPA2-PSK (AES)
•
WPA (TKIP) •
WPA2 (AES) •
802.1X •










