Creating and Managing Users in the Local User Database 275

Table 24 lists the user attributes and their value ranges. You can specify these attributes in lowercase when using the CLI.

Table 24 Authentication Attributes for Local Users

Attribute

Description

Valid Value(s)

encryption-type

Type of encryption

One of the following numbers that

 

required for access by

identifies an encryption algorithm:

 

the client. Clients who

„

1—AES_CCM (Advanced

 

attempt to use an

 

 

Encryption Standard using Counter

 

unauthorized

 

 

 

with CBC-MAC)

 

encryption method are

 

 

 

2—Reserved

 

rejected.

„

 

 

„ 4—TKIP (Temporal Key Integrity

 

 

 

Protocol)

 

 

„

8—WEP_104 (the default)

 

 

 

(Wired-Equivalent Privacy protocol

 

 

 

using 104 bits of key strength)

 

 

„

16—WEP_40 (Wired-Equivalent

 

 

 

Privacy protocol using 40 bits of key

 

 

 

strength)

 

 

„

32—NONE (no encryption)

 

 

„

64—Static WEP

 

 

In addition to these values, you can

 

 

specify a sum of them for a

 

 

combination of allowed encryption

 

 

types. For example, to specify

 

 

WEP_104 and WEP_40, use 24.

 

 

 

end-date

Date and time after

Date and time, in the following format:

 

which the user is no

YY/MM/DD-HH:MM

 

longer allowed to be

 

You can use end-datealone or with

 

on the network.

 

 

start-date. You also can use

 

 

start-date,end-date, or both in

 

 

conjunction with time-of-day.

 

 

 

 

Page 275
Image 275
HP Manager Software manual Authentication Attributes for Local Users, Attribute Description Valid Values Encryption-type