beautypg.com
v
Recommended configuration procedure ··········································································································· 194
Configuring an ISP domain ································································································································ 194
Configuring authentication methods for the domain ······················································································· 195
Configuring authorization methods for the domain ························································································ 197
Configuring accounting methods for the domain ···························································································· 199
AAA configuration example ······································································································································· 200
RADIUS configuration ············································································································································· 204
RADIUS overview ························································································································································· 204
Configuring a RADIUS scheme ··································································································································· 204
RADIUS configuration examples································································································································· 210
Configuration guidelines ············································································································································· 217
HWTACACS configuration ···································································································································· 219
HWTACACS overview ················································································································································ 219
Configuring HWTACACS ··········································································································································· 219
Recommended configuration procedure ··········································································································· 219
Creating HWTACACS scheme system ·············································································································· 220
Configuring HWTACACS servers ····················································································································· 220
Configuring HWTACACS parameters ·············································································································· 221
HWTACACS configuration example ························································································································· 224
Configuration guidelines ············································································································································· 229
User configuration ··················································································································································· 231
User overview ······························································································································································· 231
Configuring a local user ·············································································································································· 231
Configuring a user group ············································································································································ 234
Configuring a guest ····················································································································································· 235
Procedure for a management level administrator to configure a guest ························································· 235
Procedure for a guest administrator to configure a guest ··············································································· 237
Certificate management ········································································································································· 238
PKI overview ································································································································································· 238
Configuring PKI ···························································································································································· 238
Recommended configuration procedure for manual request ·········································································· 239
Recommended configuration procedure for automatic request ······································································ 240
Creating a PKI entity ··········································································································································· 241
Creating a PKI domain ······································································································································· 242
Generating an RSA key pair ······························································································································ 245
Destroying the RSA key pair ······························································································································ 246
Retrieving and displaying a certificate ············································································································· 246
Requesting a local certificate ····························································································································· 247
Retrieving and displaying a CRL ························································································································ 248
PKI configuration example ·········································································································································· 249
Configuration guidelines ············································································································································· 254
Wireless service ······················································································································································ 255
Access service ······························································································································································ 255
Terminology ························································································································································· 255
Wireless client access ········································································································································· 255
WLAN data security ··········································································································································· 259
Client access authentication ······························································································································· 260
802.11n ······························································································································································· 262
Introduction to WDS ···················································································································································· 262
Advantages of WDS ··········································································································································· 262
WDS network topologies ··································································································································· 262
Repeater mode overview ············································································································································· 264