
7-39
Wireless Security Configuration
Configuring RADIUS Client Authentication
6.
Select
[Add Account]
to set the user account.
Managing the RADIUS User Database
The User Database tab shown in Figure 7-8 enables you to create a backup
file. Once you have created user accounts for use with Local RADIUS, you can
save the account information to a Backup file, which can then be used to
Restore the Local RADIUS user accounts if needed.
■
[Backup User Database]
: Backs up the user database.
■
Restore User Database/[Browse...]:
Enables browsing for a restore file
(.ubk). The selected file is displayed in the Restore User Database field.
■
[Restore]:
Restores selected file.
■
Return to Local Radius/[Return]:
Returns to the Local Radius screen.
Figure 7-8. Backing Up a User Database
To Create a Backup File of Local RADIUS User Accounts Information:
1.
Select Special Features > Local Radius to display the Local RADIUS
screen and user account information.
2.
Click
[backup or restore user database]
link to display the User Database
screen.
3.
Click
[backup user database]
.
4.
A confirmation pop-up displays, click
Save
to continue (or Cancel to exit).
5.
In the Save As dialogue window, select the
location (folder)
where the file
will be saved.
The default filename is wirelessUsers.ubk. You can edit the filename, but
do not change the file extension (.ubk).
Summary of Contents for 530 - Notebook PC
Page 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Page 2: ......
Page 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Page 21: ...1 1 1 Getting Started ...
Page 29: ...2 1 2 Selecting a Management Interface ...
Page 35: ...3 1 3 Using the Command Line Interface CLI ...
Page 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Page 85: ...5 1 5 General System Configuration ...
Page 152: ...5 68 General System Configuration Managing Group Configuration ...
Page 194: ...6 42 Wireless Interface Configuration Managing Multiple WLAN BSS SSID Interfaces ...
Page 195: ...7 1 7 Wireless Security Configuration ...
Page 270: ...7 76 Wireless Security Configuration Web Authentication for Mobile Users ...
Page 271: ...8 1 8 Special Features ...
Page 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Page 309: ...9 1 9 Command Line Reference ...
Page 476: ...9 168 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Page 477: ...A 1 A File Uploads Downloads and Resets ...
Page 498: ...A 22 File Uploads Downloads and Resets Disabling the Access Point Push Buttons ...
Page 499: ...B 1 B Defaults ...
Page 512: ...B 14 Defaults Wireless Distribution System WDS This page is intentionally unused ...
Page 513: ...C 1 C Adaptive Tx Power Control Use Cases ...
Page 523: ...D 1 D Open Source Licenses ...
Page 556: ...D 34 Open Source Licenses ...
Page 561: ......