Chapter 8, Discovery -1, Chapter 9 – Amer Networks WS6028 Web GUI User Manual

Page 4: Provisioning -1, Chapter 10, Wids security -1, Chapter 11, Captive portal -1

Advertising
background image

Basic Management Configuration Content

3

7.1

R

ADIUS

C

ONFIGURATION

.....................................................................7-1

7.1.1 Global Configuration ..............................................................................7-1

7.1.2 Radius Authentication Server Configuration.......................................7-2

7.1.3 Radius Accounting Server Configuration ............................................7-2

7.1.4 Radius Group Manage............................................................................7-2

7.1.5 Radius Configuration .............................................................................7-3

7.2

LDAP

C

ONFIGURATION

.......................................................................7-3

CHAPTER 8

DISCOVERY ....................................................... 8-1

8.1

L3/IP

D

ISCOVERY

...............................................................................8-1

8.1.1 Enable/Disable L3/IP Discovery.............................................................8-1

8.1.2 Add IP of L3/IP Discovery.......................................................................8-1

8.1.3 Delete IP Address from L3/IP Discovery List .......................................8-1

8.2

L2/VLAN

D

ISCOVERY

.........................................................................8-1

8.2.1 Enable L2/VLAN Discovery ....................................................................8-1

8.2.2 Add VLAN of L2/VLAN Discovery..........................................................8-2

8.2.3 Delete VLAN from L2/VLAN Discovery List .........................................8-2

CHAPTER 9

PROVISIONING .................................................. 9-1

9.1

AP

P

ROVISIONING

...............................................................................9-1

9.2

S

WITCH

P

ROVISIONING

........................................................................9-2

9.3

M

UTUAL

A

UTHENTICATION

...................................................................9-2

CHAPTER 10

WIDS SECURITY ............................................ 10-1

10.1

AP

C

ONFIGURATION

........................................................................10-1

10.2

C

LIENT

C

ONFIGURATION

..................................................................10-2

10.3

K

NOWN

C

LIENT

...............................................................................10-3

10.3.1 MAC Authentication Mode ................................................................ 10-3

10.3.2 Black/white List Configuration ......................................................... 10-3

CHAPTER 11

CAPTIVE PORTAL.......................................... 11-1

11.1

G

LOBAL

C

ONFIGURATION

................................................................. 11-1

11.2

C

APTIVE

P

ORTAL

A

UTHENTICATION

T

YPE

.......................................... 11-1

Advertising
This manual is related to the following products: