Solved

Wireless network

Posted on 2013-01-03
4
461 Views
Last Modified: 2013-07-08
The scenario is...

1 sonicwall tz100
2 engeniuestech eap600.

I need to have two separete ssid's. one for the production staff with access to the production network and a public ssid for guest access without being able to access company resources.

My questions is can this be done with the above mentioned equipment or do i need a managed switch?
0
Comment
Question by:dscla
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 17

Accepted Solution

by:
Kent Dyer earned 500 total points
ID: 38742369
Isn't this what you are looking for?

http://ct-miramar.com/blog/2012/05/22/configure-sonicwall-tz100-wireless/

HTH,

Kent
0
 

Author Comment

by:dscla
ID: 38745645
Thanks for the reply Kent,

Yes looks like this is it. Do i need to purchase Sonicpoints or can i just use the engeniues tech EAP 600?


http://www.engeniusnetworks.com/product/product.php?c=10&s=24&p=95
0
 
LVL 46

Expert Comment

by:Craig Beck
ID: 38747438
You can use the EAP600 units for this as they support 802.1q-based SSID-to-VLAN mapping.
0
 

Author Comment

by:dscla
ID: 38751931
thanks
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
home router to use as repeater  (signal extender) 10 67
Password recovery 2960S 4 35
Palo Alto site-to-site vpn monitoring 5 49
Sonos and 5ghz 14 46
This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question