Deployment Guide
147
E
XAMPLE
1: M
APPING
L
OCATIONS
AND
I
NSTALLING
H
IVE
AP
S
6. To create a user profile for IT staff, select the check box of the user profile that you just created, "Emp(1)", and
then click Clone.
The User Profiles dialog box appears with the settings for Emp(1).
7. For Name, enter IT(2); for Attribute Number, enter 2; for Default VLAN, choose VLAN-20, modify the text in
the Description field to For IT staff to use VLAN 20, and then click Save.
HiveAPs as RADIUS Authenticators
HiveAP RADIUS authenticators provide network access to wireless clients and pass authentication requests between
the wireless clients acting as RADIUS supplicants and a RADIUS authentication server. In this section, you configure
the settings that control how the HiveAPs communicate with the RADIUS authentication server.
Click Configuration > Advanced Configuration > Authentication > AAA Client Settings > New, and enter the
following:
RADIUS Name: RADIUS-10.1.1.10
This is a name for the RADIUS configuration object on HiveManager. Provide it with a useful name
that easily identifies it to you. The name can be up to 32 characters and cannot contain spaces.
Description: HQ RADIUS server with employee accounts
Enter a useful comment about the configuration. It can be up to 64 characters, including spaces.
In the RADIUS Servers section, enter the following to define the necessary network and security settings for making
secure connections with the RADIUS authentication server:
Click the New icon to the right of the IP Address/Domain Name drop-down list, and define the IP address of the
RADIUS authentication server in the IP Objects/Host Names dialog box that appears:
IP Address: (select; this setting automatically applies a netmask of 255.255.255.255)
Object Name: AuthServer-10.1.1.10
Enter the following, and then click Apply to add the IP address to the address configuration:
IP Entry: 10.1.1.10
Type: Global
Setting the type as "Global" means that HiveManager applies the IP entry to all HiveAPs that include
the IP address/host name object in their configuration.
Description: RADIUS auth server at 10.1.1.10
Click Save to save the address configuration and return to the AAA Client Settings page.
IP Address/Domain Name: AuthServer-10.1.1.10 (This is the address that you just created.)
Server Type: Authentication
You can define the service that the RADIUS server provides: authentication, accounting, or both
(auth/acct). In this example, the server only authenticates users, so there is no need to enable
accounting. When RADIUS accounting is enabled, the RADIUS authenticators report the status and
cumulative length of RADIUS supplicant sessions to the RADIUS authentication server. Accounting is
often used to track client activity so that users can be accurately charged for network use. It is also
sometimes used to gather statistics about general network usage.
Shared Secret: t6bEdmNfot3vW9vVr6oAz48CNCsDtInd
Confirm Secret: t6bEdmNfot3vW9vVr6oAz48CNCsDtInd
The shared secret that you enter here must exactly match that on the RADIUS authentication
server. Because the authentication server and authenticators use it to verify each other’s identities
Содержание access point
Страница 1: ...Aerohive Deployment Guide ...
Страница 7: ...HiveAP Compliance Information 6 Aerohive ...
Страница 13: ...Contents 12 Aerohive ...
Страница 37: ...Chapter 2 The HiveAP 20 ag Platform 36 Aerohive ...
Страница 71: ...Chapter 4 The HiveAP 340 Platform 70 Aerohive ...
Страница 81: ...Chapter 5 The HiveAP 320 Platform 80 Aerohive ...
Страница 105: ...Chapter 8 The High Capacity HiveManager Platform 104 Aerohive ...
Страница 123: ...Chapter 10 Using HiveManager 122 Aerohive ...
Страница 209: ...Chapter 14 Deployment Examples CLI 208 Aerohive ...
Страница 217: ...Appenidix A Country Codes 216 Aerohive ...