iv
Associating the HTTP Service with an ACL..........................................................................................12-2
Displaying and Maintaining HTTP.........................................................................................................12-3
HTTP Configuration Example ...............................................................................................................12-3
13 HTTPS Configuration ............................................................................................................................13-1
HTTPS Overview ..................................................................................................................................13-1
HTTPS Configuration Task List ............................................................................................................13-1
Associating the HTTPS Service with an SSL Server Policy .................................................................13-2
Enabling the HTTPS Service ................................................................................................................13-2
Associating the HTTPS Service with a Certificate Attribute Access Control Policy..............................13-3
Configuring the Port Number of the HTTPS Service ............................................................................13-3
Associating the HTTPS Service with an ACL .......................................................................................13-4
Displaying and Maintaining HTTPS ......................................................................................................13-4
HTTPS Configuration Example.............................................................................................................13-5
14 Logging In to an AP...............................................................................................................................14-1
Logging In to an AP...............................................................................................................................14-1
Introduction to User Interface................................................................................................................14-1
Supported User Interfaces ............................................................................................................14-1
Users and User Interfaces.............................................................................................................14-2
User Interface Number..................................................................................................................14-2
Common User Interface Configuration..........................................................................................14-2
Logging In Through the Console Port...................................................................................................14-3
Introduction to Local Console Port Login ......................................................................................14-3
Logging In Through the Console Port ...........................................................................................14-3
Configuring Common Settings for Console Login.........................................................................14-6
Configuring None Authentication for Console Port Login..............................................................14-8
Configuring Password Authentication for Console Port Login ......................................................14-9
Configuring Scheme Authentication for Console Port Login.......................................................14-11
Logging In Through Telnet..................................................................................................................14-13
Establishing a Telnet Connection................................................................................................14-13
Configuring Common Settings for Telnet Login ..........................................................................14-15
Telnet Login Configuration Task List...........................................................................................14-17
Configuring None Authentication for Telnet Login ......................................................................14-17
Configuring Password Authentication for Telnet Login...............................................................14-18
Configuring Scheme Authentication for Telnet Login..................................................................14-20
Logging In Through SSH ....................................................................................................................14-22
Configuring Command Authorization..................................................................................................14-22
Logging In Through a Web-Based Network Management System ....................................................14-23
Introduction..................................................................................................................................14-23
Web Server Configuration...........................................................................................................14-23
Displaying Web Users .................................................................................................................14-24
Configuration Example ................................................................................................................14-24
Logging In Through an NMS...............................................................................................................14-25
Introduction..................................................................................................................................14-25
Connection Establishment Through an NMS..............................................................................14-26