Wireless Edge Services zl Module Release Notes WT.01.28
15
Support Notes and Clarifications
Release WT.01.03
If the server does not send the proper VSAs, the user receives the monitor role (read-only) to the
Web browser interface.
The module’s internal server does not support VSAs, so you should use the local server only to
authenticate users that require read-only access.
Note
If you do not correctly configure the RADIUS server, you can lock yourself out of the Wireless Edge
Services zl Module Web browser interface.
To fix the problem, access the module CLI through the wireless services-enabled switch. Enter this
global configuration mode command to have the module authenticate Web-Users against its local list:
Syntax: aaa authentication login default local
Then configure at least one user in the local list:
Syntax: username <username> password <password>
The password must be between 8 and 32 characters.
Then assign the user rights sufficient to correct the problem. For example:
Syntax: username <username> privilege superuser
Special Characters for the ACL ID Field
As indicated in the chapter “Access Control Lists (ACLs)” of the Management and Configuration
Guide (5991-8626), string names for ACL IDs may contain alphanumeric characters, but spaces and
non-alphanumeric characters are not allowed. However, the following special characters may be
used:
` ~ ! @ # $ % ^ & * ( ) _ - { } [ ] | : ; ' < > , .
Correction: SNMP v3 Default Password
The chapter “Configuring the ProCurve Wireless Edge Services zl Module” of the Management and
Configuration Guide (5991-8626) incorrectly states that for the snmptrap user, the default password
is “procurve”. Instead, the default password is “trapuser.”