7-54
Wireless Security Configuration
Configuring 802.1X AP Authentication
If radios are shut down on an already-authenticated access point, you will
only
be able to reconfigure the access point using a wired ethernet connection or
the console port.
C a u t i o n
When a VLAN with tagged management is used together with AP authentica-
tion on the Access Point 530, do not configure the switch authenticator with
an "auth-vid" or with a RADIUS assigned VLAN. Using either of these config-
urations will place the switch authentication port in an untagged state that
will take precedence over any statically defined VLAN tagging on the port. If
this occurs, management traffic will not be sent from the port after authenti-
cation.
Web: Configuring AP Authentication
The AP Authentication screen, shown in Figure 7-12, enables 802.1X AP
authentication on the Access Point 530.
You can modify the following parameters:
■
AP Authentication:
Enables 802.1X AP authentication for the access
point. Default is disabled.
■
EAP Type:
Selects the authentication method.
■
AP Username:
Specifies the “user” name of the access point.
■
Password:
Specifies the password for the access point “user”.
■
[Update]
: Updates the AP Authentication settings.
Figure 7-12. Configuring AP Authentication
To Enable AP Authentication:
1.
Select Management > AP Authentication.
Содержание 530 - Notebook PC
Страница 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Страница 2: ......
Страница 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Страница 21: ...1 1 1 Getting Started ...
Страница 29: ...2 1 2 Selecting a Management Interface ...
Страница 35: ...3 1 3 Using the Command Line Interface CLI ...
Страница 50: ...3 16 Using the Command Line Interface CLI CLI Control and Editing This page is intentionally unused ...
Страница 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Страница 85: ...5 1 5 General System Configuration ...
Страница 152: ...5 68 General System Configuration Managing Group Configuration ...
Страница 193: ...6 41 Wireless Interface Configuration Managing Multiple WLAN BSS SSID Interfaces This page is intentionally unused ...
Страница 194: ...6 42 Wireless Interface Configuration Managing Multiple WLAN BSS SSID Interfaces ...
Страница 195: ...7 1 7 Wireless Security Configuration ...
Страница 270: ...7 76 Wireless Security Configuration Web Authentication for Mobile Users ...
Страница 271: ...8 1 8 Special Features ...
Страница 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Страница 309: ...9 1 9 Command Line Reference ...
Страница 476: ...9 168 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Страница 477: ...A 1 A File Uploads Downloads and Resets ...
Страница 497: ...A 21 File Uploads Downloads and Resets Disabling the Access Point Push Buttons This page is intentionally unused ...
Страница 498: ...A 22 File Uploads Downloads and Resets Disabling the Access Point Push Buttons ...
Страница 499: ...B 1 B Defaults ...
Страница 512: ...B 14 Defaults Wireless Distribution System WDS This page is intentionally unused ...
Страница 513: ...C 1 C Adaptive Tx Power Control Use Cases ...
Страница 523: ...D 1 D Open Source Licenses ...
Страница 525: ...D 3 Open Source Licenses Overview This appendix includes the following information Open Source licenses ...
Страница 556: ...D 34 Open Source Licenses ...
Страница 561: ......