7-34
Wireless Security Configuration
Configuring RADIUS Client Authentication
■
Secondary Server Setup:
Configures a secondary RADIUS server to
provide a backup in case the primary server fails. The access point uses
the secondary server if the primary server fails or becomes inaccessible.
Once the access point switches over to the secondary server, it
periodically attempts to establish communication again with the primary
server. If communication with the primary server is reestablished, the
secondary server reverts to a backup role. (The default is Disable.)
■
Internal Server as Failover:
Enables the internal server to begin
authenticating in the event that the primary server is disconnected. (The
default is Disabled.)
Figure 7-5. Configuring RADIUS Servers on the Access Point
To Set RADIUS Server Parameters:
1.
Select WLANs.
2.
Click
[Edit]
after the selected WLAN. The WLAN Configuration Security
pop-up window opens.
3.
Select the RADIUS Servers tab.
Содержание ProCurve 530 NA
Страница 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Страница 2: ......
Страница 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Страница 21: ...1 1 1 Getting Started ...
Страница 28: ...1 8 Getting Started Need Just a Quick Start This page is intentionally unused ...
Страница 29: ...2 1 2 Selecting a Management Interface ...
Страница 35: ...3 1 3 Using the Command Line Interface CLI ...
Страница 50: ...3 16 Using the Command Line Interface CLI CLI Control and Editing This page is intentionally unused ...
Страница 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Страница 85: ...5 1 5 General System Configuration ...
Страница 152: ...5 68 General System Configuration Managing Group Configuration This page is intentionally unused ...
Страница 178: ...6 26 Wireless Interface Configuration Modifying Antenna Settings 6 Select Update to set the antenna parameters ...
Страница 195: ...7 1 7 Wireless Security Configuration ...
Страница 270: ...7 76 Wireless Security Configuration Web Authentication for Mobile Users This page is intentionally unused ...
Страница 271: ...8 1 8 Special Features ...
Страница 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Страница 309: ...9 1 9 Command Line Reference ...
Страница 474: ...9 166 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Страница 475: ...A 1 A File Uploads Downloads and Resets ...
Страница 495: ...B 1 B Defaults ...
Страница 507: ...C 1 C Adaptive Tx Power Control Use Cases ...
Страница 517: ...D 1 D Open Source Licenses ...
Страница 519: ...D 3 Open Source Licenses Overview This appendix includes the following information Open Source licenses ...
Страница 550: ...D 34 Open Source Licenses This page is intentionally unused ...
Страница 555: ......