Brocade Mobility 5181 Access Point Product Reference Guide (Supporting software release 4.4.0.0) User Manual

Page 66

Advertising
background image

52

Brocade Mobility 5181 Access Point Product Reference Guide

53-1002516-01

Configuring data access

4

3. Use the Mobility 5181 Access Point Access field check boxes to enable/disable the following

on the access point’s LAN1, LAN2 or WAN interfaces:

4. Refer to the Applet Timeout field to set an HTTPS timeout interval.

5. Use the Admin Authentication buttons to specify the authentication server connection method.

6. Configure the Secure Shell field to set timeout values to reduce network inactivity.

7. Use the Radius Server if a Radius server has been selected as the authentication server. Enter

the required network address information

Applet HTTP (port 80)

Select the LAN1, LAN2 and/or WAN checkboxes to enable access to the
Mobility 5181 Access Point configuration applet using a Web browser.

Applet HTTPS (port 443)

Select the LAN1, LAN2 and/or WAN checkboxes to enable access to the
Mobility 5181 Access Point configuration applet using a Secure Sockets
Layer (SSL)
for encrypted HTTP sessions.

CLI TELNET (port 23)

Select the LAN1, LAN2 and/or WAN checkboxes to enable access to the
Mobility 5181 Access Point CLI via the TELNET terminal emulation TCP/IP
protocol.

CLI SSH (port 22)

Select the LAN1, LAN2 and/or WAN checkboxes to enable access to the
Mobility 5181 Access Point CLI using the SSH (Secure Shell) protocol.

SNMP (port 161)

Select the LAN1, LAN2 and/or WAN checkboxes to enable access to the
Mobility 5181 Access Point configuration settings from an SNMP-capable
client.

HTTP/S Timeout

Disables access to the access point if no data activity is detected over
Applet HTTPS (port 443) after the user defined interval. Default is 0 Mins.

Local

The Mobility 5181 Access Point verifies the authentication connection.

Radius

Designates that a Radius server is used in the authentication credential
verification. If using this option, the connected PC is required to have its
Radius credentials verified with an external Radius server. Additionally, the
Radius Server’s Active Directory should have a valid user configured and
have a PAP based Remote Access Policy configured for Radius Admin
Authentication to work.

Authentication
Timeout

Defines the maximum time (between 30 - 120 seconds) allowed for SSH
authentication to occur before executing a timeout. The minimum permissible
value is 30 seconds.

SSH Keepalive
Interval

The SSH Keepalive Interval defines a period (in seconds) after which if no data
has been received from a client, SSH sends a message through the encrypted
channel to request a response from the client. The default is 0, and no messages
will be sent to the client until a non-zero value is set. Defining a Keepalive interval
is important, otherwise programs running on a server may never notice if the other
end of a connection is rebooted.

Advertising