Motorola 2.1 Benutzerhandbuch
Chapter 2: Network Setup
• Monitor
• Keyboard
• Mouse
These requirements are an approximate estimate intended to allow for
maximum scalability while supporting rapid system response time. As a
minimum, we recommend 2 GB of system memory and redundant hard
drives with a hardware RAID controller of server quality.
maximum scalability while supporting rapid system response time. As a
minimum, we recommend 2 GB of system memory and redundant hard
drives with a hardware RAID controller of server quality.
Figure 2-1
HP DL360 G5 server
One Point Wireless Manager Server
• The One Point Wireless Manager™ server in our reference design server hosts
the One Point Wireless Manager™ application. This application provides device
configuration and network management. DHCP and DNS will also be configured
on this server and are part of the Linux operating system.
configuration and network management. DHCP and DNS will also be configured
on this server and are part of the Linux operating system.
RADIUS - (Optional)
•
The Windows 2003 server is optional and is used to support EAP-TTLS Secure
Mesh. Juniper’s Steel Belted Radius application will be configured on the
Windows 2003 server since it supports EAP-TTLS based authentication. The
Windows 2003 Server also provides certificate services which will be used to
generate certificates to support EAP-TTLS. Our RADIUS server could also be
used for certificate based 802.11 client authentication and or store 802.11 client
usernames and passwords. A RADIUS server for Secure Mesh is not required if
PSK Secure Mesh is used instead.
Mesh. Juniper’s Steel Belted Radius application will be configured on the
Windows 2003 server since it supports EAP-TTLS based authentication. The
Windows 2003 Server also provides certificate services which will be used to
generate certificates to support EAP-TTLS. Our RADIUS server could also be
used for certificate based 802.11 client authentication and or store 802.11 client
usernames and passwords. A RADIUS server for Secure Mesh is not required if
PSK Secure Mesh is used instead.
2-6