Cisco WAPs support 802.1q tagged VLANs and can provide a unique SSID
per VLAN. Each SSID can use different authentication methods (WEP &
WPA, no auth & WPA, no auth & 802.1x, etc).
If so desired I can provide CLI configuration examples from my 1231G
access points. The 1240 series won't be any different.
If your firewall supports it you could use L2TP/IPsec for the VPN -
the client is built into Windows 2000+, Mac OS X 10.3+, most
smartphones, etc.
Kurt Buff <kurt.b...@gmail.com> previously uttered:
All,
We've got a decent wireless network at $WORK, but I'm dissatisified
with it, because it lacks good guest access.
We have 18 Cisco 1240ag WAPs talking with 3 HP POE switches, which
currently are in our HP 3400cl layer 3 switch on our production
network. There's a single SSID across all of them, and I've got them
all configured on a single VLAN. Works great, but as mentioned there
is no guest access.
I could just stick them all physically outside our firewall, and give
the wireless users an IPSec VPN client, but I really would prefer not
to do that.
I've been doing some reading, but don't have a good handle on how to
move to a configuration that would work well - without the VPN, that
is.
I'm casting about for ideas - anyone have a solution they like?
Preferably without spending tons of money, of course.
--
Phil Brutsche
p...@optimumdata.com
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~