3com WX1200 User Manual

Page of 646
234
C
HAPTER
 8: AAA C
OMMANDS
Provides encryption and integrity checking for the connection
Cannot be used with RADIUS server authentication (requires user 
information to be in the switch’s local database)
„
peap-mschapv2
 — Protected EAP (PEAP) with Microsoft Challenge 
Handshake Authentication Protocol version 2 (MS-CHAP-V2). For 
wireless clients
:
Uses TLS for encryption and data integrity checking and server-side 
authentication
Provides MS-CHAP-V2 mutual authentication
Only the server side of the connection needs a certificate.
The wireless client authenticates using TLS to set up an encrypted 
session. Then MS-CHAP-V2 performs mutual authentication using 
the specified AAA method. 
„
pass-through
 — MSS sends all the EAP protocol processing to a 
RADIUS server.
EAP-MD5 does not work with Microsoft wired authentication clients.
„
method1,
 
method2,
 
method3,
 
method4
— At least one and up to four 
methods that MSS uses to handle authentication. Specify one or more 
of the following methods in priority order. MSS applies multiple 
methods in the order you enter them.
A method can be one of the following:
„
local
 — Uses the local database of usernames and user groups on 
the WX switch for authentication.
„
server-group-name
 — Uses the defined group of RADIUS servers 
for authentication. You can enter up to four names of existing 
RADIUS server groups as methods. 
RADIUS servers cannot be used with the EAP-TLS protocol.
For more information, see “Usage.”
Defaults — By default, authentication is unconfigured for all clients with 
network access through MAP ports or wired authentication ports on the 
WX switch. Connection, authorization, and accounting are also disabled 
for these users. 
Bonded authentication is disabled by default.