Specifications
Motorola Solutions AP-7131N-FGR Access Point Product Reference Guide
4-16
4. Configure the Secure Shell field to set timeout values to reduce network inactivity.
5. Use the Admin Authentication buttons to specify the authentication server connection
method. These settings are used if you wish to authenticate management users against a
local database or remote RADIUS database. Note that when RADIUS is selected, the AP will
fallback to local authentication if connection to RADIUS server is lost. It is therefore
recommended to configure atleast one local account for emergency use. The default ‘admin’
can server this purpose..
6. Use the RADIUS Server if a RADIUS server has been selected as the authentication server.
Enter the required network address information.
Authentication
Timeout
Defines the maximum time (between 30 - 120 seconds) allowed for
SSH authentication to occur before executing a timeout. The
minimum permissible value is 30 seconds.
SSH Inactivity
Timeout
Terminates the SSH session to the access point if no data activity
is detected over the session after the user defined interval. The
default value is 2 minutes.
Local The access point verifies the authentication connection.
Radius Designates that a RADIUS server is used in the authentication
credential verification. If using this option, the connected PC is
required to have its RADIUS credentials verified with an external
RADIUS server.Additionally, the Active Directory should have a
valid user configured and the Radius Server should have a PAP
based Remote Access Policy for Management User Authentication
to work.
Remote Login Failure
Threshold
Defines the maximum number of attempts (between 1 - 3) allowed
for remote login to occur.
Console Timeout Defines the console timeout value in seconds. This is the interval
after which the console times out and the user has to login again.
Radius Server IP Specify the numerical (non DNS name) IP address of the Remote
Authentication Dial-In User Service (RADIUS) Server. RADIUS is a
client/server protocol and software enabling remote-access
servers to communicate with a server used to authenticate users
and authorize access to the requested system or service.