Chapter 8, Discovery -1, Chapter 9 – Amer Networks WS6028 Web GUI User Manual
Page 4: Provisioning -1, Chapter 10, Wids security -1, Chapter 11, Captive portal -1
![background image](https://www.manualsdir.com/files/811745/content/doc004.png)
Basic Management Configuration Content
3
7.1
R
ADIUS
C
ONFIGURATION
.....................................................................7-1
7.1.1 Global Configuration ..............................................................................7-1
7.1.2 Radius Authentication Server Configuration.......................................7-2
7.1.3 Radius Accounting Server Configuration ............................................7-2
7.1.4 Radius Group Manage............................................................................7-2
7.1.5 Radius Configuration .............................................................................7-3
7.2
LDAP
C
ONFIGURATION
.......................................................................7-3
CHAPTER 8
DISCOVERY ....................................................... 8-1
8.1
L3/IP
D
ISCOVERY
...............................................................................8-1
8.1.1 Enable/Disable L3/IP Discovery.............................................................8-1
8.1.2 Add IP of L3/IP Discovery.......................................................................8-1
8.1.3 Delete IP Address from L3/IP Discovery List .......................................8-1
8.2
L2/VLAN
D
ISCOVERY
.........................................................................8-1
8.2.1 Enable L2/VLAN Discovery ....................................................................8-1
8.2.2 Add VLAN of L2/VLAN Discovery..........................................................8-2
8.2.3 Delete VLAN from L2/VLAN Discovery List .........................................8-2
CHAPTER 9
PROVISIONING .................................................. 9-1
9.1
AP
P
ROVISIONING
...............................................................................9-1
9.2
S
WITCH
P
ROVISIONING
........................................................................9-2
9.3
M
UTUAL
A
UTHENTICATION
...................................................................9-2
CHAPTER 10
WIDS SECURITY ............................................ 10-1
10.1
AP
C
ONFIGURATION
........................................................................10-1
10.2
C
LIENT
C
ONFIGURATION
..................................................................10-2
10.3
K
NOWN
C
LIENT
...............................................................................10-3
10.3.1 MAC Authentication Mode ................................................................ 10-3
10.3.2 Black/white List Configuration ......................................................... 10-3
CHAPTER 11
CAPTIVE PORTAL.......................................... 11-1
11.1
G
LOBAL
C
ONFIGURATION
................................................................. 11-1
11.2
C
APTIVE
P
ORTAL
A
UTHENTICATION
T
YPE
.......................................... 11-1