HP 4200n HP Jetdirect Print Servers - Administrator Guide - Page 85

Table 3.4, Telnet Commands and Parameters 5 of 18, TCP/IP Configuration 85

Page 85 highlights

Table 3.4 Telnet Commands and Parameters (5 of 18) svr-auth-pass Specify a password for server-based authentication. Up to 128 alphanumeric characters may be used. svr-auth-id Specify the CA certificate character string that will be used to identify and validate the authentication server. This string will be compared to an identification string received from the authentication server. For string comparison, you can specify whether an exact match is required: RIGHT_MOST (default): The string entry will be compared to the right-most characters in the CA certificate string. USE_EXACT: The string entry must exactly match the authentication server's string. wpa-auth-type This command is not compatible with the Shared Key authentication option in the auth-type command. Use this command to specify a supported EAP authentication type: 802.1x: Select this option on an EAP network that uses an authentication server. Use the server-auth command to specify the EAP/802.1x protocols used on your network. Use the dynamic-encrypt command to specify a dynamic encryption option. PSK: Select this option on EAP networks where an authentication server is not used. Instead, a Pre-shared key provides device authentication. A Pre-shared key is generated when you specify a network pass-phrase using the psk-passphrase command. The dynamic-encrypt command should be set to the Robust option. psk-passphrase Specify a pass-phrase that is used to generate a network Pre-shared key. A pass-phrase must be from 8 to 63 ASCII characters in the hexadecimal range 21 through 7E (characters 0-9, a-z, A-Z and numerous special characters including dynamic-encrypt Select a supported dynamic encryption option: Basic: Dynamic WEP encryption is supported. Robust: Dynamic Wi-Fi Protected Access (WPA) and WEP encryption protocols are supported. Use the wpa-auth-type command to select a compatible EAP authentication type: G For EAP/PSK authentication, the print server should use Robust encryption (WPA encryption protocols). G For EAP/802.1x authentication (LEAP only), the print server should use Basic encryption. G For EAP/802.1x authentication (PEAP, TLS, TTLS only), the print server may use either Basic encryption or Robust encryption depending on your network. Dynamic encryption protocols are under the control of the authentication server and also must be supported by the Access Point. ENWW TCP/IP Configuration 85

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302

ENWW
TCP/IP Configuration 85
svr-auth-pass
Specify a password for server-based authentication. Up to
128 alphanumeric characters may be used.
svr-auth-id
Specify the CA certificate character string that will be used
to identify and validate the authentication server. This string
will be compared to an identification string received from the
authentication server. For string comparison, you can
specify whether an exact match is required:
RIGHT_MOST
(default): The string entry will be compared
to the right-most characters in the CA certificate string.
USE_EXACT
: The string entry must exactly match the
authentication server
s string.
wpa-auth-type
This command is not compatible with the Shared Key
authentication option in the
auth-type
command. Use this
command to specify a supported EAP authentication type:
802.1x
: Select this option on an EAP network that uses an
authentication server. Use the
server-auth
command to
specify the EAP/802.1x protocols used on your network. Use
the
dynamic-encrypt
command to specify a dynamic
encryption option.
PSK
: Select this option on EAP networks where an
authentication server is not used. Instead, a Pre-shared key
provides device authentication. A Pre-shared key is
generated when you specify a network pass-phrase using
the
psk-passphrase
command. The
dynamic-encrypt
command should be set to the
Robust
option.
psk-passphrase
Specify a pass-phrase that is used to generate a network
Pre-shared key. A pass-phrase must be from 8 to 63 ASCII
characters in the hexadecimal range 21 through 7E
(characters 0-9, a-z, A-Z and numerous special characters
including !, @, #, $, %, ^, &, (, ), _, +, =, -, {, }, [, ], \, /,
, <,
>, ?,
,
, ~).
dynamic-encrypt
Select a supported dynamic encryption option:
Basic
: Dynamic WEP encryption is supported.
Robust
: Dynamic Wi-Fi Protected Access (WPA) and WEP
encryption protocols are supported.
Use the
wpa-auth-type
command to select a compatible
EAP authentication type:
For EAP/PSK authentication, the print server should use
Robust encryption (WPA encryption protocols).
For EAP/802.1x authentication (LEAP only), the print
server should use Basic encryption.
For EAP/802.1x authentication (PEAP, TLS, TTLS only),
the print server may use either Basic encryption or
Robust encryption depending on your network.
Dynamic encryption protocols are under the control of the
authentication server and also must be supported by the
Access Point.
Table 3.4
Telnet Commands and Parameters (5 of 18)