ZyXEL Communications Vantage RADIUS 50 User Manual page 12

Hide thumbs Also See for Vantage RADIUS 50:
Table of Contents

Advertisement

Vantage RADIUS User's Guide
Figure 5-21 Example 2: Vantage RADIUS Remote Server 2 Setup .............................................................5-27
Figure 5-22 Example 2: Using WZC or Odyssey Client: Computer B.........................................................5-28
Figure 5-23 Example 3: Vantage RADIUS and Remote Computer Server...................................................5-29
Figure 5-24 Example 3: Vantage RADIUS Local Server Setup ...................................................................5-30
Figure 5-25 Example 3: Add Remote RADIUS Server ................................................................................5-31
Figure 5-26 Example 3: Vantage RADIUS Remote Server Setup ................................................................5-31
Figure 5-27 Example 3: Using WZC or Odyssey Client: Computer A.........................................................5-32
Figure 5-28 New Remote RADIUS Server Group .......................................................................................5-33
Figure 5-29 New Remote RADIUS Server Group Wizard ...........................................................................5-34
Figure 5-30 New Connection Request Policy Wizard ..................................................................................5-35
Figure 5-31 Realm Name..............................................................................................................................5-36
Figure 5-32 Example 4: Vantage RADIUS and Windows Active Directory.................................................5-37
Figure 5-33 Example 4: Vantage RADIUS Active Directory Account Setup ...............................................5-38
Figure 5-34 Example 4: Using WZC or Odyssey Client: Computer A.........................................................5-39
Figure 5-35 User Account.............................................................................................................................5-40
Figure 5-36 CSV File Example.....................................................................................................................5-42
Figure 5-37 User Account: Add New User ...................................................................................................5-42
Figure 5-38 ZyAIR RADIUS Settings Example...........................................................................................5-47
Figure 5-39 ZyAIR Wireless Settings Example............................................................................................5-48
Figure 6-1 System Status ................................................................................................................................6-1
Figure 6-2 F/W Upload...................................................................................................................................6-3
Figure 6-3 F/W Upload...................................................................................................................................6-3
Figure 6-4 Network Temporarily Disconnected..............................................................................................6-4
Figure 6-5 Configuration Backup ...................................................................................................................6-5
Figure 6-6 Network Temporarily Disconnected..............................................................................................6-6
Figure 7-1 HTTPS Implementation ................................................................................................................7-3
Figure 7-2 SSH Communication Example......................................................................................................7-3
Figure 7-3 How SSH Works ...........................................................................................................................7-4
Figure 7-4 SSH Example 1: Store Host Key...................................................................................................7-5
Figure 7-5 SSH Example 2: Test.....................................................................................................................7-6
Figure 7-6 SSH Example 2: Log in.................................................................................................................7-6
Figure 7-7 Telnet Configuration on a TCP/IP Network ..................................................................................7-7
Figure 7-8 Remote Access ..............................................................................................................................7-8
Figure 7-9 Remote Access: Add/Modify IP Address ....................................................................................7-10
Figure 7-10 Remote Access: Add/Modify Network IP Address ...................................................................7-11
Figure 7-11 SNMP Management Model.......................................................................................................7-12
Figure 7-12 SNMP Agent .............................................................................................................................7-14
Figure 7-13 SNMP: Allowed IP Address ......................................................................................................7-16
Figure 7-14 SNMP: Allowed Network Address ...........................................................................................7-17
Figure 8-1 RESTART/RESET ........................................................................................................................8-2
Figure A-1 Pop-up Blocker............................................................................................................................A-4
xii
List of Figures

Advertisement

Table of Contents
loading

Table of Contents