Home > HP > Router > HP Vm200 User Manual

HP Vm200 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual HP Vm200 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Using Quick Setup
    Basic wireless network
    2-3
    Manually running Quick Setup after your first login
    If you manually launch Quick Setup by selecting Home > Quick Setup, you will see the 
    Quick Setup global settings page instead of the Quick Setup home page. See Global settings 
    page on page 2-20.
    Basic wireless network
    See also the HP V-M200 802.11n Access Point Quickstart which describes the configuration 
    procedure for a basic wireless network.
    Choose this option if you want to create a single wireless network to provide wireless 
    connectivity for your users. This option can be used to connect the V-M200 directly to a 
    broadband router or to an existing wired network, using either static IP addressing or DHCP. 
    						
    							Using Quick Setup
    Basic wireless network
    2-4
    Click OK to display the configuration page for the scenario.
    Step 1: Specify wireless network settings
    For a complete description of all settings see:
    Step 1: Configure access point settings on page 2-21.
    The online help for this section. 
    						
    							Using Quick Setup
    Basic wireless network
    2-5
    Step 2: Specify wireless network settings
    Identify the wireless network
    Use this section to define names for the wireless community.
    Community name
    Specify a name to identify the community on the V-M200. 
    Network name (SSID)
    Specify a name to uniquely identify the wireless network associated with this community. 
    Each wireless user that wants to connect to this community must use the network name. The 
    name is case-sensitive.
    By default, the V-M200 will broadcast this name so that wireless users can see it when they 
    try to connect to the wireless network.
    Secure the wireless network
    Use this section to define security settings for the wireless network.
    Security method
    Choose the method that will be used to protect wireless transmissions. Refer to the sections 
    that follow for configuration details.
    WPA, WPA2, WPA or WPA2
    Wi-Fi Protected Access (WPA) is a security protocol that provides for both encryption of the 
    wireless data stream (via TKIP or AES/CCMP) and authentication of wireless users (via 
    802.1X/EAP).
    The following versions are supported: 
    Ve rs io nDescription
    WPAWPA with TKIP encryption. WPA cannot be used when the radio 
    operating mode supports 802.11n.
    WPA2WPA2 (802.11i) with CCMP encryption. If all your clients are WPA2, 
    select this option for the maximum possible security.
    WPA or WPA2Mixed mode supports both WPA (version 1) and WPA2 (version 2) at 
    the same time. Some legacy WPA clients may not work if this mode is 
    selected. This mode is slightly less secure than using the pure WPA2 
    mode. 
    						
    							Using Quick Setup
    Basic wireless network
    2-6
    Key source
    This scenario only supports the use of a PreShared key. 
    Key: The V-M200 uses the key you specify in this field to generate the TKIP or AES/
    CCMP keys that are used to encrypt the wireless data stream. This key must be 
    configured by each user in their WPA software. Specify a key that is between 8 and 63 
    alphanumeric characters in length. It is recommended that the preshared key be at 
    least 20 characters long, and be a mix of letters and numbers. The double quote 
    character (”) should not be used.
    WEP
    This is the least secure method of protecting wireless transmissions. WEP is provided to so 
    you can support client stations that do not have WPA software.
    NoteWEP cannot be used when the radio operating mode supports 802.11n.
    Key
    The number of characters you specify for the key determines the level of encryption. 
    For 40-bit encryption, specify 5 ASCII characters or 10 hexadecimal digits.
    For 128-bit encryption, specify 13 ASCII characters or 26 hexadecimal digits.
    When encryption is enabled, wireless stations that do not support encryption cannot 
    communicate with the V-M200. The definition for each encryption key must be the same 
    on the V-M200 and all client stations.
    Key format 
    Select the format used to specify the encryption key: 
    ASCII: ASCII keys are much weaker than carefully chosen HEX keys. You can 
    include ASCII characters between 32 and 126, inclusive, in the key. However, note 
    that not all client stations support non-alphanumeric characters such as spaces, 
    punctuation, or special symbols in the key.
    HEX: Your keys should only include the following characters: 0-9, a-f, A-F. 
    						
    							Using Quick Setup
    Multiple wireless networks
    2-7
    Multiple wireless networks
    Choose this option if you want to create multiple wireless networks to support users with 
    different networking requirements. For example, you could create two wireless networks, 
    one for employees and one for guests. The guest network could be given a lower priority so 
    employee traffic is never delayed due to excessive guest traffic.
    This option can be used to connect the V-M200 to a network using either static IP addressing 
    or DHCP.
    Click OK to display the configuration page for the scenario. 
    						
    							Using Quick Setup
    Multiple wireless networks
    2-8
    Step 1: Specify wireless network settings
    For a complete description of all settings see:
    Step 1: Configure access point settings on page 2-21.
    The online help for this section. 
    						
    							Using Quick Setup
    Multiple wireless networks
    2-9
    Step 2: Specify wireless network settings
    Buttons
    Add New Wireless Community
    Select this button to add a new wireless community to the table. The V-M200 supports up to 
    four wireless communities. After you add a new community, configure its settings using the 
    fields under Wireless community settings. Select Update Community when you are done.
    Delete
    Select this button to delete the selected wireless community. (The one that is currently being 
    edited.) If the community is configured to use a RADIUS server for WPA authentication, the 
    RADIUS profile created when the community was added is also deleted if it is not being used 
    by another wireless community.
    Update Community
    Select this button to update the community with your configuration settings. The settings are 
    not saved until you select the Save button.
    Cancel
    Select this button to discard your settings.
    Save
    Select this button to save your settings.
    Wireless community table
    This table lists all wireless communities that are defined on the V-M200. The V-M200 supports 
    up to four wireless communities. Each wireless community defines the settings for a distinct 
    wireless network with its own configuration settings. 
    To edit the settings for a community, select the community in the table, then configure the 
    fields under Wireless community settings. Select Update Community when you are done.
    Wireless community settings
    The following sections present the settings for the selected wireless community. 
    						
    							Using Quick Setup
    Multiple wireless networks
    2-10
    Identify the wireless network
    Use this section to define names for the wireless community.
    Community name
    Specify a name to identify the community on the V-M200. 
    Network name (SSID)
    Specify a name to uniquely identify the wireless network associated with this community. 
    Each wireless user that wants to connect to this community must use the network name. The 
    name is case-sensitive.
    By default, the V-M200 will broadcast this name so that wireless users can see it when they 
    try to connect to the wireless network.
    Secure the wireless network
    Use this section to define security settings for the wireless network.
    Security method
    Choose the method that will be used to protect wireless transmissions. Refer to the sections 
    that follow for configuration details.
    WPA, WPA2, WPA or WPA2
    Wi-Fi Protected Access (WPA) is a security protocol that provides for both encryption of the 
    wireless data stream (via TKIP or AES/CCMP) and authentication of wireless users (via 
    802.1X/EAP).
    The following versions are supported: 
    Ve rs io nDescription
    WPAWPA with TKIP encryption. WPA cannot be used when the radio 
    operating mode supports 802.11n.
    WPA2WPA2 (802.11i) with CCMP encryption. If all your clients are WPA2, 
    select this option for the maximum possible security.
    WPA or WPA2Mixed mode supports both WPA (version 1) and WPA2 (version 2) at 
    the same time. Some legacy WPA clients may not work if this mode is 
    selected. This mode is slightly less secure than using the pure WPA2 
    mode. 
    						
    							Using Quick Setup
    Multiple wireless networks
    2-11
    Key source
    This scenario only supports the use of a PreShared key. 
    Key: The V-M200 uses the key you specify in this field to generate the TKIP or AES/
    CCMP keys that are used to encrypt the wireless data stream. This key must be 
    configured by each user in their WPA software. Specify a key that is between 8 and 63 
    alphanumeric characters in length. It is recommended that the preshared key be at 
    least 20 characters long, and be a mix of letters and numbers. The double quote 
    character (”) should not be used.
    WEP
    This is the least secure method of protecting wireless transmissions. WEP is provided to so 
    you can support client stations that do not have WPA software.
    NoteWEP cannot be used when the radio operating mode supports 802.11n.
    Key
    The number of characters you specify for the key determines the level of encryption. 
    For 40-bit encryption, specify 5 ASCII characters or 10 hexadecimal digits.
    For 128-bit encryption, specify 13 ASCII characters or 26 hexadecimal digits.
    When encryption is enabled, wireless stations that do not support encryption cannot 
    communicate with the V-M200. The definition for each encryption key must be the same 
    on the V-M200 and all client stations.
    Key format 
    Select the format used to specify the encryption key: 
    ASCII: ASCII keys are much weaker than carefully chosen HEX keys. You can 
    include ASCII characters between 32 and 126, inclusive, in the key. However, note 
    that not all client stations support non-alphanumeric characters such as spaces, 
    punctuation, or special symbols in the key.
    HEX: Your keys should only include the following characters: 0-9, a-f, A-F.
    Prioritize wireless network traffic
    The quality of service (QoS) feature provides a number of different mechanisms to prioritize 
    wireless traffic sent to wireless client stations.  
    						
    							Using Quick Setup
    Multiple wireless networks with wired VLANS
    2-12
    This is useful when you have defined multiple wireless communities and want to ensure a 
    specific level of service for each one.
    For example, if you have two communities, one for employees and one for guests, you might 
    want to make the employee traffic higher priority so that employee traffic is never delayed 
    due to excessive guest traffic.
    Priority mechanism
    By default, Diffserv is used. Unless you have specific requirements you can leave this setting. 
    For a complete description of all options, see Quality of service (QoS) on page 4-15.
    Multiple wireless networks with wired VLANS
    Choose this option if you want to:
    Create multiple wireless networks to support users with different requirements.
    Map the traffic from each wireless network to a specific VLAN.
    This option can be used to connect the V-M200 to a network using either static IP addressing 
    or DHCP.
    Click OK to display the configuration page for the scenario. 
    						
    All HP manuals Comments (0)