beautypg.com

H3C Technologies H3C WA3600 Series Access Points User Manual

Page 10

background image

v

Recommended configuration procedure ··········································································································· 194

 

Configuring an ISP domain ································································································································ 194

 

Configuring authentication methods for the domain ······················································································· 195

 

Configuring authorization methods for the domain ························································································ 197

 

Configuring accounting methods for the domain ···························································································· 199

 

AAA configuration example ······································································································································· 200

 

RADIUS configuration ············································································································································· 204

 

RADIUS overview ························································································································································· 204

 

Configuring a RADIUS scheme ··································································································································· 204

 

RADIUS configuration examples································································································································· 210

 

Configuration guidelines ············································································································································· 217

 

HWTACACS configuration ···································································································································· 219

 

HWTACACS overview ················································································································································ 219

 

Configuring HWTACACS ··········································································································································· 219

 

Recommended configuration procedure ··········································································································· 219

 

Creating HWTACACS scheme system ·············································································································· 220

 

Configuring HWTACACS servers ····················································································································· 220

 

Configuring HWTACACS parameters ·············································································································· 221

 

HWTACACS configuration example ························································································································· 224

 

Configuration guidelines ············································································································································· 229

 

User configuration ··················································································································································· 231

 

User overview ······························································································································································· 231

 

Configuring a local user ·············································································································································· 231

 

Configuring a user group ············································································································································ 234

 

Configuring a guest ····················································································································································· 235

 

Procedure for a management level administrator to configure a guest ························································· 235

 

Procedure for a guest administrator to configure a guest ··············································································· 237

 

Certificate management ········································································································································· 238

 

PKI overview ································································································································································· 238

 

Configuring PKI ···························································································································································· 238

 

Recommended configuration procedure for manual request ·········································································· 239

 

Recommended configuration procedure for automatic request ······································································ 240

 

Creating a PKI entity ··········································································································································· 241

 

Creating a PKI domain ······································································································································· 242

 

Generating an RSA key pair ······························································································································ 245

 

Destroying the RSA key pair ······························································································································ 246

 

Retrieving and displaying a certificate ············································································································· 246

 

Requesting a local certificate ····························································································································· 247

 

Retrieving and displaying a CRL ························································································································ 248

 

PKI configuration example ·········································································································································· 249

 

Configuration guidelines ············································································································································· 254

 

Wireless service ······················································································································································ 255

 

Access service ······························································································································································ 255

 

Terminology ························································································································································· 255

 

Wireless client access ········································································································································· 255

 

WLAN data security ··········································································································································· 259

 

Client access authentication ······························································································································· 260

 

802.11n ······························································································································································· 262

 

Introduction to WDS ···················································································································································· 262

 

Advantages of WDS ··········································································································································· 262

 

WDS network topologies ··································································································································· 262

 

Repeater mode overview ············································································································································· 264

 

This manual is related to the following products: