7-38
Wireless Security Configuration
Configuring RADIUS Client Authentication
•
Password
: Provides a string with a minimum of 1 character and a
maximum of 32 characters. Do not use special characters or spaces.
•
Confirm Password
: Repeats the same string with a minimum of 1
character and a maximum of 32 characters.
•
[Add Account]
: Updates the access point with the new user account
information.
Figure 7-7. Configuring a Local Radius User
To Add Local RADIUS User Accounts:
1.
Select
Special Features > Local Radius
> Users tab.
2.
In the User Name field, specify the User Name used by the RADIUS server
for authentication.
3.
In the Real Name field, specify the full name of the user that is used by
the RADIUS server only for informational purposes.
4.
In the Password field, specify the password
to be associated with the user
name that the RADIUS server uses for authentication.
5.
In the Confirm Password field, enter the password
a second time for
confirmation (the two password entries must match exactly to be
accepted).
Содержание ProCurve 530 NA
Страница 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Страница 2: ......
Страница 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Страница 21: ...1 1 1 Getting Started ...
Страница 28: ...1 8 Getting Started Need Just a Quick Start This page is intentionally unused ...
Страница 29: ...2 1 2 Selecting a Management Interface ...
Страница 35: ...3 1 3 Using the Command Line Interface CLI ...
Страница 50: ...3 16 Using the Command Line Interface CLI CLI Control and Editing This page is intentionally unused ...
Страница 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Страница 85: ...5 1 5 General System Configuration ...
Страница 152: ...5 68 General System Configuration Managing Group Configuration This page is intentionally unused ...
Страница 178: ...6 26 Wireless Interface Configuration Modifying Antenna Settings 6 Select Update to set the antenna parameters ...
Страница 195: ...7 1 7 Wireless Security Configuration ...
Страница 270: ...7 76 Wireless Security Configuration Web Authentication for Mobile Users This page is intentionally unused ...
Страница 271: ...8 1 8 Special Features ...
Страница 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Страница 309: ...9 1 9 Command Line Reference ...
Страница 474: ...9 166 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Страница 475: ...A 1 A File Uploads Downloads and Resets ...
Страница 495: ...B 1 B Defaults ...
Страница 507: ...C 1 C Adaptive Tx Power Control Use Cases ...
Страница 517: ...D 1 D Open Source Licenses ...
Страница 519: ...D 3 Open Source Licenses Overview This appendix includes the following information Open Source licenses ...
Страница 550: ...D 34 Open Source Licenses This page is intentionally unused ...
Страница 555: ......