Mac access control via radius authentication, 1x authentication using radius, Performing advanced configuration – Proxim ORINOCO AP-2000 User Manual

Page 81

Advertising
background image

81

Performing Advanced Configuration

Server Name/IP Address: Enter the server’s name or IP address.

Destination Port: Enter the port number which the AP and the server will use to communicate. By default,
RADIUS servers communicate on port 1812.

Server VLAN ID: Indicates the VLAN that uses this RADIUS server profile. If VLAN is disabled, the text “VLAN is
disabled” will appear.

Shared Secret and Confirm Shared Secret: Enter the password shared by the RADIUS server and the AP. The
same password must also be configured on the RADIUS server.

Response Time (seconds): Enter the maximum time, in seconds, that the AP should wait for the RADIUS server
to respond to a request. The range is 1-10 seconds; the default is 3 seconds.

Maximum Retransmissions (0-4): Enter the maximum number of times an authentication request may be
transmitted. The range is 0 to 4, the default is 3.

Server Status: Select Enable from the drop-down box to enable the RADIUS Server Profile.

2. Click OK.
3. Select the Profile and click Edit to configure the Secondary RADIUS Server, if required.
4. Reboot the AP.

MAC Access Control Via RADIUS Authentication

If you want to control wireless access to the network and if your network includes a RADIUS Server, you can store the
list of MAC addresses on the RADIUS server rather than configure each AP individually. You can define a RADIUS
Profile that specifies the IP Address of the server that contains a central list of MAC Address values identifying the
authorized stations that may access the wireless network. You must specify information for at least the primary
RADIUS server. The back-up RADIUS server is optional.

NOTE

Each VLAN can be configured to use a separate RADIUS server (and backup server) for MAC authentication.

NOTE

Contact your RADIUS server manufacturer if you have problems configuring the server or have problems
using RADIUS authentication.

802.1x Authentication using RADIUS

You must configure a primary EAP/802.1x Authentication server to use 802.1x security. A back-up server is optional.

NOTE

Each VLAN can be configured to use a separate RADIUS server (and backup server) for 802.1x
authentication. 802.1x authentication (“EAP authentication”) can be separately enabled for each VLAN.

Advertising