NETGEAR ProSafe WC7520 Reference Manual page 123

20-ap wireless controller
Hide thumbs Also See for ProSafe WC7520:
Table of Contents

Advertisement

4.
Configure the users settings as described in the following table.
Table 30. User settings
Setting
Management
Captive Portal
Note:
This selection
is disabled if the
portal setting is a
guest portal instead
of a captive portal.
WiFi Clients
5.
Click Apply to save your changes.
Note:
For information about password requirements, see
page 187.
ProSafe 20-AP Wireless Controller WC7520
Description
User Name
Enter a unique user name.
User Type
From the drop-down list, select the type of user, which determines
their access to the wireless controller's web management interface.
• Administrator. Full access with read and write capabilities.
• Read Only. Read-only access that is restricted to the Monitor
and Help main navigation tabs.
• Guest Provisioning. Access that is restricted to the User
Management configuration menu tab under the Maintenance
main navigation tab.
• License Management Only. Access that is restricted to the
License configuration menu tab under the Maintenance main
navigation tab.
Password
Enter a password in the Password field, and confirm the password
in the Confirm Password field.
User Name
Enter a unique user name.
Password
Enter a password in the Password field, and confirm the password
in the Confirm Password field.
Expiry
Select one of the following radio buttons to specify the expiration of
the wireless access:
• No Expiry. Wireless access does not expire.
• Expires in. Wireless access expires within 1 hour. From the mins
drop-down list, select in how many minutes access expires.
• Expires at. Wireless access expires at a date and time that you
specify by making selections from the following drop-down lists:
hr, mins, month, Date, and Year.
User Name
Enter a unique user name.
Password
Enter a password in the Password field, and confirm the password
in the Confirm Password field.
Authentication
From the drop-down list, select one of the following protocols:
Type
• EAP. Extensible Authentication Protocol.
• PEAP. Protected EAP.
Configuring Network Access and Security
123
Table 52
on

Advertisement

Table of Contents
loading

Table of Contents