ix
Guidelines for AP Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-53
Web: Configuring AP Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . 7-54
CLI: Configuring AP Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-55
Web Authentication for Mobile Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-57
The Web-Auth Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-57
Associating with the AP-530 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-57
URL Intercept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-58
Logging In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-58
Authenticating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-58
Redirecting to the Destination URL . . . . . . . . . . . . . . . . . . . . . . . . 7-60
Web-Auth Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-60
User Credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-60
Optional Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-60
Other Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-60
The Web-Auth Address Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-61
Customizing the Authentication Screens . . . . . . . . . . . . . . . . . . . . . . . 7-61
Default Text Values for Authentication Screens . . . . . . . . . . . . . . . . . 7-62
Login Screen Default Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-62
Welcome Screen Default Values . . . . . . . . . . . . . . . . . . . . . . . . . . 7-63
Failed Screen Default Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-63
Guidelines for Deploying Web-Auth . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-63
Configuration Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-64
Web: Configuring the Global Address Pool . . . . . . . . . . . . . . . . . . . . . 7-64
CLI: Configuring the Global Address Pool . . . . . . . . . . . . . . . . . . . . . . 7-65
Web: Configuring Global Guest Account Settings . . . . . . . . . . . . . . . 7-66
CLI: Configuring Global Guest Account Settings . . . . . . . . . . . . . . . . 7-67
Web: Configuring Web-Auth on a WLAN . . . . . . . . . . . . . . . . . . . . . . . 7-68
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-68
CLI: Configuring Web-Auth on a WLAN . . . . . . . . . . . . . . . . . . . . . . . . 7-70
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-70
Web: Customizing the Login, Welcome, and Failed Screens . . . . . . . 7-72
CLI: Customizing the Login, Welcome, and Failed Screens . . . . . . . . 7-74
8 Special Features
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3
QoS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4
Web: Configuring QoS Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-5
Содержание ProCurve 530 NA
Страница 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Страница 2: ......
Страница 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Страница 21: ...1 1 1 Getting Started ...
Страница 28: ...1 8 Getting Started Need Just a Quick Start This page is intentionally unused ...
Страница 29: ...2 1 2 Selecting a Management Interface ...
Страница 35: ...3 1 3 Using the Command Line Interface CLI ...
Страница 50: ...3 16 Using the Command Line Interface CLI CLI Control and Editing This page is intentionally unused ...
Страница 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Страница 85: ...5 1 5 General System Configuration ...
Страница 152: ...5 68 General System Configuration Managing Group Configuration This page is intentionally unused ...
Страница 178: ...6 26 Wireless Interface Configuration Modifying Antenna Settings 6 Select Update to set the antenna parameters ...
Страница 195: ...7 1 7 Wireless Security Configuration ...
Страница 270: ...7 76 Wireless Security Configuration Web Authentication for Mobile Users This page is intentionally unused ...
Страница 271: ...8 1 8 Special Features ...
Страница 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Страница 309: ...9 1 9 Command Line Reference ...
Страница 474: ...9 166 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Страница 475: ...A 1 A File Uploads Downloads and Resets ...
Страница 495: ...B 1 B Defaults ...
Страница 507: ...C 1 C Adaptive Tx Power Control Use Cases ...
Страница 517: ...D 1 D Open Source Licenses ...
Страница 519: ...D 3 Open Source Licenses Overview This appendix includes the following information Open Source licenses ...
Страница 550: ...D 34 Open Source Licenses This page is intentionally unused ...
Страница 555: ......