Internal radius server, 1 internal radius overview, 2 internal radius server setting – ZyXEL Communications NWA3550 User Manual

Page 169: Chapter 14 internal radius server, Internal radius server (169)

Advertising
background image

NWA3550 User’s Guide

169

C

H A P T E R

14

Internal RADIUS Server

The ZyXEL Device can use its internal RADIUS server to authenticate wireless clients. It can
also serve as a RADIUS server to authenticate other APs and their wireless clients. For more
background information on RADIUS, see

Section 8.4 on page 119

.

14.1 Internal RADIUS Overview

The ZyXEL Device has a built-in RADIUS server that can authenticate wireless clients or
other trusted APs.
The ZyXEL Device can function as an AP and as a RADIUS server at the same time.
PEAP (Protected EAP) and MD5 authentication is implemented on the internal RADIUS
server using simple username and password methods over a secure TLS connection. See the
appendices for more information on the types of EAP authentication and the internal RADIUS
authentication method used in your ZyXEL Device.

• Use the AUTH. SERVER > Setting screen to turn the ZyAIR’s internal RADIUS server

off or on and to view information about the ZyXEL Device’s certificates.

• Use the AUTH. SERVER > Trusted AP screen to specify APs as trusted. Trusted APs

can use the ZyAIR’s internal RADIUS server to authenticate wireless clients.

• Use the AUTH. SERVER > Trusted Users screen to configure a list of wireless client

user names and passwords for the ZyAIR to authenticate.

14.2 Internal RADIUS Server Setting

The AUTH. SERVER > Setting screen displays information about certificates. The
certificates are used by wireless clients to authenticate the RADIUS server. Information
matching the certificate is held on the wireless client’s utility. A password and user name on
the utility must match the Trusted Users list so that the RADIUS server can be authenticated.

Advertising