ZyXEL Communications NWA3160 User Manual

Page of 314
ZyXEL NWA-3160 Series User’s Guide
175
C
H A P T E R
 
 15 
Internal RADIUS Server
The ZyXEL Device can use its internal RADIUS server to authenticate wireless clients. It can 
also serve as a RADIUS server to authenticate other APs and their wireless clients. For more 
background information on RADIUS, see 
15.1  Internal RADIUS Overview
The ZyXEL Device has a built-in RADIUS server that can authenticate wireless clients or 
other trusted APs.
The ZyXEL Device can function as an AP and as a RADIUS server at the same time.
PEAP (Protected EAP) and MD5 authentication is implemented on the internal RADIUS 
server using simple username and password methods over a secure TLS connection. See the 
appendices for more information on the types of EAP authentication and the internal RADIUS 
authentication method used in your ZyXEL Device. 
• Use the AUTH. SERVER > Setting screen to turn the ZyAIR’s internal RADIUS server 
off or on and to view information about the ZyXEL Device’s certificates.
• Use the AUTH. SERVER > Trusted AP screen to specify APs as trusted. Trusted APs 
can use the ZyAIR’s internal RADIUS server to authenticate wireless clients. 
• Use the AUTH. SERVER > Trusted Users screen to configure a list of wireless client 
user names and passwords for the ZyAIR to authenticate. 
15.2  Internal RADIUS Server Setting
The AUTH. SERVER > Setting screen displays information about certificates. The 
certificates are used by wireless clients to authenticate the RADIUS server. Information 
matching the certificate is held on the wireless client’s utility. A password and user name on 
the utility must match the Trusted Users list so that the RADIUS server can be authenticated.