HP (Hewlett-Packard) 700wl Series Switch User Manual


 
Configuring the Network
Deleting a Peer Access Control Server
You must disable redundancy by editing the Primary Access Control Server configuration before you can
delete the Secondary Access Control Server (uncheck the Enable Redundancy checkbox and
Save).
To delete a peer Access Control Server once redundancy is disabled, click the trash can icon ( ) to the
far right of the Access Control Server in the System Components List.
You can also delete a peer Access Control Server, by changing the Peer IP address to 0.0.0.0.
Note: You cannot delete the Access Control Server on which you are running, and you cannot delete
the peer Access Control Server while redundancy is enabled.
The Access Control Server Shared Secret
Each Access Controller system must prove to its Access Control Server (or Integrated Access Manager)
that it is trustworthy. A shared secret, initially established on the Access Control Server, is used between
the Access Controller and the Access Control Server to establish this trust relationship. (The exception is
that a shared secret is not necessary for communication between the internal Access Controller and the
Access Control Server function of an Integrated Access Manager.)
In order for an Access Controller to communicate with an Access Control Server, it must be configured
with the Access Control Server’s IP address and the correct shared secret. The Access Control Server must
be configured with its IP address (or receive it via DHCP) and the shared secret must be determined
before an Access Controller can be configured to communicate with it. Each Access Controller that will be
connected to the Access Control Server must then be configured with the Access Control Server’s IP
address and a matching shared secret.
The Quick Start Guide and the Installation and Getting Started Guide for your hardware both include setting
the shared secret as part of the initial hardware installation on the network. This is done using the
Command Line Interface (CLI) over the serial port. The Access Controller Quick Start Guide leads you
through entering these commands on your Access Controller.
Once the Access Controller can communicate with the Access Control Server, shared secret changes will
be propagated from the Access Control Server to the Access Controller as long as the Access Controller is
connected at the time the shared secret is changed. If the shared secret is changed while an Access
Controller is disconnected or otherwise cannot communicate with the Access Control Server, the new
shared secret will need to be entered using the CLI.
Configuring an Integrated Access Manager
An Integrated Access Manager combines an Access Control Server and an Access Controller in a single
chassis. Thus, an Integrated Access Manager can be used to provide centralized administration for the
700wl Series system in the same way as an Access Control Server does.
Note: An Integrated Access Manager cannot be configured as a peer in a redundancy configuration.
HP ProCurve Secure Access 700wl Series Management and Configuration Guide 6-7