HP Vm200 User Manual
Here you can view all the pages of manual HP Vm200 User Manual. The HP manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 61
Working with wireless communities Wireless community configuration options 4-9 RADIUS: The V-M200 retrieves the key from the RADIUS server and uses it to generate the TKIP or AES/CCMP keys that are used to encrypt the wireless data stream. The key is dynamically generated by the RADIUS server each time the user logs in. Communication with the RADIUS server occurs via 802.1X using the EAP protocol specified by the user’s WPA client software. If you select the RADIUS option, you need to configure the...
Page 62
Working with wireless communities Wireless community configuration options 4-10 802.1X 802.1X enables you to authenticate wireless clients via user accounts stored on a third-party RADIUS server. Caution802.1X is purely a protocol for user authentication. Using 802.1X without enabling the WEP encryption option results in wireless traffic being unencrypted. Therefore, for security reasons, use of 802.1X without enabling WEP encryption is not recommended. Supported 802.1X protocols The following EAP...
Page 63
Working with wireless communities Wireless community configuration options 4-11 802.1X settings If you select the 802.1X option, the following settings are configurable: RADIUS profile: Select the RADIUS profile to use. RADIUS profiles are defined by selecting Authentication > RADIUS profiles. The profile defines the settings that are used by the V-M200 to communicate with the RADIUS server. RADIUS profiles are defined by selecting Authentication > RADIUS profiles. For more information, see Using a...
Page 64
Working with wireless communities Wireless community configuration options 4-12 WEP WEP enables you to encrypt wireless transmissions, but does not provide for user authentication. WEP is not as secure as WPA. NoteWEP cannot be used when the radio operating mode supports 802.11n. Key The number of characters you specify for the key determines the level of encryption. For 40-bit encryption, specify 5 ASCII characters or 10 HEX digits. For 128-bit encryption, specify 13 ASCII characters or 26 HEX...
Page 65
Working with wireless communities Wireless community configuration options 4-13 NoteWhen both this option and the MAC filtering option are enabled, MAC filtering occurs first. MAC-based authentication cannot be enabled at the if Wireless protection is set to WPA/ WPA2 with RADIUS. To successfully authenticate a user, an account must be created on the RADIUS server with both username and password set to the MAC address of the user’s wireless device. The MAC address sent by the V-M200 (in the RADIUS...
Page 66
Working with wireless communities Wireless community configuration options 4-14 Called-Station-ID Content Select the value that the V-M200 will return as the called station ID. Port 1: MAC address of the Ethernet port on the V-M200. Wireless Radio: MAC address of the wireless port on the V-M200. BSSID: Basic service set ID of the wireless network defined by this community. MAC address:SSID: The MAC address of the V-M200 followed by a colon followed by the SSID of the wireless community to which the...
Page 67
Working with wireless communities Wireless community data flow 4-15 Wireless community data flow The following diagram illustrates the order in which the wireless community features act upon incoming data from a wireless user. For a detailed description of each feature, see Wireless community configuration options on page 4-4. Quality of service (QoS) The QoS feature defines four traffic queues based on the Wi-Fi Multimedia (WMM) access categories. In order of priority, these queues are: Outgoing...
Page 68
Working with wireless communities Quality of service (QoS) 4-16 802.1p This mechanism classifies traffic based on the value of the VLAN priority field present within the VLAN header. Community Based priority This mechanism enables you to assign a single priority level to all traffic on a wireless community. If you enable the community based priority mechanism, it takes precedence regardless of the priority mechanism supported by associated client stations. For example, if you set Community Based Low...
Page 69
Working with wireless communities Quality of service (QoS) 4-17 Upstream/downstream traffic marking Depending on the priority mechanism that is active, upstream and downstream traffic is marked as described in this section. Upstream traffic marking This table describes the marking applied to wireless traffic sent by connected client stations to the V-M200 and then forwarded onto the wired network (via the Ethernet port) by the V- M 2 0 0 . Downstream traffic marking This table describes the marking...
All HP manuals