Management and Configuration Guide (Includes ACM xl) 2005-12
ProCurve Secure Access 700wl Series Management and Configuration Guide 6-13
Configuring the Network
Note: Folders cannot be nested.
Folders and the Access Controllers within them are listed in alphabetical order.
Figure 6-6. New Folder Page
» To change the name of a folder, click the folder name in the System Components List, or click the pencil
icon ( ) to the far right of the folder. Either action displays the Edit Folder page. Enter the new folder
name in the
Folder Name field and click Save.
» To add an Access Controller to a folder, go to the Edit Access Controller page and select the folder by
name from the drop-down
Folder list, then click Save. See “Configuring Access Controllers” on
page 6-10.
» To remove an Access Controller from a folder, go to the Edit Access Controller page and either select a
different folder from the drop-down
Folder list in which to place the Access Controller, or select
“None” from the drop-down
Folder list, then click Save. See “Configuring Access Controllers” on
page 6-10.
» To delete a folder, click the trash can icon ( ) to the far right of the folder in the System Components
List.
Note:
You cannot delete a folder that has Access Controllers in it—the trash can icon will be dimmed
and not selectable.
Folders vs. Locations
The 700wl Series system provides two means of grouping its physical components: Folders and
Locations.
• Folders are used within the Administrative Interface as a way to organize Access Controllers in the
System Components List for convenience in the configuration, management, and monitoring of
system components.
• Locations are used within the Rights Management system to logically group sets of Access
Controller ports, or specify client devices by MAC addresses, to define the physical locations
through which clients may connect to the 700wl Series system. The client’s physical location is one
of the factors that determines the access rights eventually granted to that client. See Chapter 4,
“Configuring Rights” for a much more detailed explanation of Locations are how they are used
within the Rights Management system.
A Location may consist of a client device (defined by the MAC address), or one or all ports on an
Access Controllers—the grouping is based on sets of ports that should be associated with a common
Access Policy (or set of access rights).