iv 
Associating the HTTP Service with an ACL..........................................................................................12-2 
Displaying and Maintaining HTTP.........................................................................................................12-3 
HTTP Configuration Example ...............................................................................................................12-3 
13 HTTPS Configuration ............................................................................................................................13-1 
HTTPS Overview ..................................................................................................................................13-1 
HTTPS Configuration Task List ............................................................................................................13-1 
Associating the HTTPS Service with an SSL Server Policy .................................................................13-2 
Enabling the HTTPS Service ................................................................................................................13-2 
Associating the HTTPS Service with a Certificate Attribute Access Control Policy..............................13-3 
Configuring the Port Number of the HTTPS Service ............................................................................13-3 
Associating the HTTPS Service with an ACL .......................................................................................13-4 
Displaying and Maintaining HTTPS ......................................................................................................13-4 
HTTPS Configuration Example.............................................................................................................13-5 
14 Logging In to an AP...............................................................................................................................14-1 
Logging In to an AP...............................................................................................................................14-1 
Introduction to User Interface................................................................................................................14-1 
Supported User Interfaces ............................................................................................................14-1 
Users and User Interfaces.............................................................................................................14-2 
User Interface Number..................................................................................................................14-2 
Common User Interface Configuration..........................................................................................14-2 
Logging In Through the Console Port...................................................................................................14-3 
Introduction to Local Console Port Login ......................................................................................14-3 
Logging In Through the Console Port ...........................................................................................14-3 
Configuring Common Settings for Console Login.........................................................................14-6 
Configuring None Authentication for Console Port Login..............................................................14-8 
Configuring Password Authentication for Console Port Login ......................................................14-9 
Configuring Scheme Authentication for Console Port Login.......................................................14-11 
Logging In Through Telnet..................................................................................................................14-13 
Establishing a Telnet Connection................................................................................................14-13 
Configuring Common Settings for Telnet Login ..........................................................................14-15 
Telnet Login Configuration Task List...........................................................................................14-17 
Configuring None Authentication for Telnet Login ......................................................................14-17 
Configuring Password Authentication for Telnet Login...............................................................14-18 
Configuring Scheme Authentication for Telnet Login..................................................................14-20 
Logging In Through SSH ....................................................................................................................14-22 
Configuring Command Authorization..................................................................................................14-22 
Logging In Through a Web-Based Network Management System ....................................................14-23 
Introduction..................................................................................................................................14-23 
Web Server Configuration...........................................................................................................14-23 
Displaying Web Users .................................................................................................................14-24 
Configuration Example ................................................................................................................14-24 
Logging In Through an NMS...............................................................................................................14-25 
Introduction..................................................................................................................................14-25 
Connection Establishment Through an NMS..............................................................................14-26