Cisco Cisco WAP571E Wireless-AC N Premium Dual Radio Outdoor Access Point Manual De Mantenimiento

Descargar
Página de 192
Wireless
Networks
Cisco WAP571/E Administration Guide
95
5
Click Enable pre-authentication if you want WPA2 wireless clients to send 
pre- authentication packets. The pre-authentication information is relayed 
from the WAP device that the client is currently using to the target WAP 
device. Enabling this feature can help speed up authentication for roaming 
clients who connect to multiple APs.
This option does not apply if you selected WPA for WPA Versions because 
the original WPA does not support this feature.
Client stations configured to use WPA with RADIUS must have one of these 
addresses and keys:
-
A valid TKIP RADIUS IP address and RADIUS Key
-
A valid CCMP (AES) IP address and RADIUS Key
Use Global RADIUS Server Settings—By default, each VAP uses the 
global RADIUS settings that you define for the WAP device (see 
). However, you can configure each VAP to use a different set of 
RADIUS servers.
To use the global RADIUS server settings, make sure the check box is 
selected.
To use a separate RADIUS server for the VAP, uncheck the box and enter the 
RADIUS server IP address and key in these fields:
Server IP Address Type—The IP version that the RADIUS server uses.
You can toggle between the address types to configure IPv4 and IPv6 
global RADIUS address settings, but the WAP device contacts only the 
RADIUS server or servers for the address type that you select in this field. 
Server IP Address 1 or Server IPv6 Address 1—The address for the 
primary RADIUS server for this VAP.
If IPv4 is selected as the Server IP Address Type, enter the IP address of 
the RADIUS server that all VAPs use by default, for example, 192.168.10.23. 
If IPv6 is selected, enter the IPv6 address of the primary global RADIUS 
server, for example, 2001:DB8:1234::abcd. 
Server IP Address 2 to 4 or Server IPv6 Address 2 to 4—Up to three IPv4 
and/or IPv6 addresses to use as the backup RADIUS servers for this VAP.
If authentication fails with the primary server, each configured backup 
server is tried in sequence.