HP (Hewlett-Packard) 700wl Series Switch User Manual


 
Ethernet bridging, enabling 6-24
Expire timer, See reauthentication timeout
export rights
5-50
External 4-51
external identity retrieval 5-28
F
Failover See Access Control Server redundancy
filters
display filters
2-12
folders
creating or editing
6-13
selecting for an Access Controller 6-12
vs. Locations 6-14
Full DCHP Subnet setting 6-23
G
getMemberList methodCall (XML-RPC) 5-24
Guest user
Guest Registration page custom template
5-40
logon options 5-34
registered guest option 5-35
guest user
registered guest
5-30
Guest users
pre-registering
4-16
H
Header bar 2-7
Help
for Administrative Console
2-5
for CLI A-3
hostname
in network configuration
6-20
HTTP proxy
automatic
6-26
server configuration 6-26
HTTP Proxy filters 4-4, 4-75
creating or editing a filter 4-76
example 4-83
proxy filter types 4-77
Verify via DNS option 4-78
HTTP Proxy tab 4-55
I
Identity Profiles 4-11
and NT Domain logon 5-28
creating or editing 4-13
overview of 4-3
predefined profiles 4-12
Idle time
in session status display
3-13
images
logo image types
5-34
Stop image types 5-38
uploading for custom templates 5-40
importing rights 5-52
inaccessible Access Control Server,
troubleshooting
D-1
incorrect network configuration, troubleshooting
D-1
incorrect rights, troubleshooting D-3
Integrated Access Manager
changing administrator username/password
6-10
configuring 6-7
configuring NAS-ID for accounting 6-10
editing the configuration 6-8
enable technical support access 6-10
enabling SSH CLI access 6-10
shared secret 6-10
Integrated System
changing administrator username/password
6-12
interfaces
port connection type
6-34
speed/duplex settings 6-34
Subnet tab 6-37
Interfaces tab 6-34
IP address
setting for Access Controller ports
6-36
IP broadcasting
configuring ports for
6-26
enabling 6-26
iPlanet directory service
configuring as authentication service
5-14
IPSec
and authentication
5-3
certificate configuration 7-5
configuring 7-2
configuring PKI for 7-5
shared secret 7-4
IPX/802.2 protocol 6-24
IPX/802.3 protocol 6-24
IPX/Ethernet II encapsulation protocol 6-24
K
Kerberos 5-2
configuring as authentication service 5-17
Kerberos realm 5-18
Key Distribution Center 5-18
L
L2TP/IPSec
and authentication
5-3
Layer 2 bridging 6-24
layer 3 roaming 1-4
layer 3 roaming, overview 2-23
IX-4 HP ProCurve Secure Access 700wl Series Management and Configuration Guide