H3C Technologies H3C WX3000E Series Wireless Switches User Manual
Page 357

344
4.
Click Apply.
Table 96 Configuration items
Item Description
Select an ISP
domain
Select the ISP domain for which you want to specify authentication methods.
Default AuthZ
Configure the default authorization method and secondary authorization method for all
types of users.
Options include:
•
HWTACACS—Performs HWTACACS authorization. You need to specify the
HWTACACS scheme to be used.
•
Local—Performs local authorization.
•
None—All users are trusted and authorized. A user gets the default rights of the
system.
•
RADIUS—Performs RADIUS authorization. You need to specify the RADIUS scheme to
be used.
•
Not Set—Restore the default, that is, local authorization.
Name
Secondary
Method
LAN-access AuthZ
Configure the authorization method and secondary authorization method for LAN access
users.
Options include:
•
Local—Performs local authorization.
•
None—All users are trusted and authorized. A user gets the default rights of the
system.
•
RADIUS—Performs RADIUS authorization. You need to specify the RADIUS scheme to
be used.
•
Not Set—Uses the default authorization methods.
Name
Secondary
Method
Login AuthZ
Configure the authorization method and secondary authorization method for login users.
Options include:
•
HWTACACS—Performs HWTACACS authorization. You need to specify the
HWTACACS scheme to be used.
•
Local—Performs local authorization.
•
None—All users are trusted and authorized. A user gets the default rights of the
system.
•
RADIUS—Performs RADIUS authorization. You need to specify the RADIUS scheme to
be used.
•
Not Set—Uses the default authorization methods.
Name
Secondary
Method
PPP AuthZ
Configure the authorization method and secondary authorization method for PPP users.
Options include:
•
HWTACACS—Performs HWTACACS authorization. You need to specify the
HWTACACS scheme to be used.
•
Local—Performs local authorization.
•
None—All users are trusted and authorized. A user gets the default rights of the
system.
•
RADIUS—Performs RADIUS authorization. You need to specify the RADIUS scheme to
be used.
•
Not Set—Uses the default authorization methods.
Name
Secondary
Method