Extreme wm100 Guía Del Usuario
HWC_GSG_VNSConfiguration.fm
WM-AD configuration
Configuring authentication mechanism for WM-AD
120385-00 Rev 01, March 2007
Summit WM, Getting Started Guide
Summit WM, Getting Started Guide
111
•
Auth Type – Provides four options for the authentication protocol to be
used by the RADIUS server to authenticate the wireless device users:
used by the RADIUS server to authenticate the wireless device users:
•
PAP – Password authentication protocol
•
CHAP – Challenge handshake authentication protocol
•
MS-CHAP – Windows-specific version of CHAP
•
MS-CHAP – Windows-specific version of Chap (Version 2)
•
Set as primary server – To set the RADIUS server as the primary server,
select Set as the primary server.
select Set as the primary server.
•
MAC-based authentication on roam check – To ensure that the client
devices are authorized every time they roam to another AP, select MAC-
based authentication on roam check. If you don’t select this feature,
the client devices will be authenticated only at the start of their sessions.
devices are authorized every time they roam to another AP, select MAC-
based authentication on roam check. If you don’t select this feature,
the client devices will be authenticated only at the start of their sessions.
9. To save your changes, click Save.
8.5.2 Authentication mechanism for AAA network
assignment
assignment
The AAA (Authentication, Authorization and Accounting) network assignment
provides the following two authentication options:
provides the following two authentication options:
•
802.1x authentication.
•
MAC-based authentication
The following sections explain the above two authentication options.
8.5.2.1 Configuring 802.1x authentication
For more information, see
.
Note: Since Section 8.7.2, Privacy for AAA network assignment, is part of Privacy
policies configuration, you can configure 802.1x authentication after you
complete the configurations for authentication and filtering rules
policies configuration, you can configure 802.1x authentication after you
complete the configurations for authentication and filtering rules