Cisco WAPs support 802.1q tagged VLANs and can provide a unique SSID per VLAN. Each SSID can use different authentication methods (WEP & WPA, no auth & WPA, no auth & 802.1x, etc).

If so desired I can provide CLI configuration examples from my 1231G access points. The 1240 series won't be any different.

If your firewall supports it you could use L2TP/IPsec for the VPN - the client is built into Windows 2000+, Mac OS X 10.3+, most smartphones, etc.

Kurt Buff <kurt.b...@gmail.com> previously uttered:

All,

We've got a decent wireless network at $WORK, but I'm dissatisified
with it, because it lacks good guest access.

We have 18 Cisco 1240ag WAPs talking with 3 HP POE switches, which
currently are in our HP 3400cl layer 3 switch on our production
network. There's a single SSID across all of them, and I've got them
all configured on a single VLAN. Works great, but as mentioned there
is no guest access.

I could just stick them all physically outside our firewall, and give
the wireless users an IPSec VPN client, but I really would prefer not
to do that.

I've been doing some reading, but don't have a good handle on how to
move to a configuration that would work well - without the VPN, that
is.

I'm casting about for ideas - anyone have a solution they like?
Preferably without spending tons of money, of course.

--

Phil Brutsche
p...@optimumdata.com


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to