|
|
Home: Configuring/Enabling
Network EAP
|
A bridge uses the Extensible Authentication Protocol
(EAP) to interact with an EAP-compatible RADIUS server on your
network to provide authentication for wireless client devices.
In order to configure Network
EAP, you must first configure the SSID. Complete the following
steps to configure the SSID.
- From the navigation menu, click Security
to go the Security Summary page.
- From the expanded Security menu, click SSID
Manager to go to the SSID Manager page.
- At the VLAN list, select the VLAN to be used
for this SSID. Select <NONE> if
VLANs are not enabled.
- Under Authentication Methods Accepted, check
the Network EAP check box.
- Click Apply to
create the SSID.
Now that the SSID is
configured, you must configure the encryption. Complete the following
steps to configure the encryption.
- From the navigation menu, click Security
to go the Security Summary page.
- From the expanded Security menu, click Encryption
Manager to go to the Encryption Manager page.
- From the Set Encryption Mode and Keys for
VLAN drop-down menu, select the VLAN corresponding to the SSID
you added above. Select <NONE>
if VLANs are not enabled.
- Under the Encryption Mode section, click the
WEP Encryption radio button to enable
encryption. You can choose either Optional or Mandatory from
the drop-down menu.
- Click Apply.
Now that encryption is
configured, you must add a RADIUS server.
- From the navigation menu, click Security
to go the Security Summary page.
- From the expanded Security menu, click Server
Manager to go to the Server Manager screen.
- In the Current Server List, select the server
to be used for EAP authentication. If you need to create a new
server, continue to step 4. Otherwise, skip to Step 10.
- Select <NEW>
from the Current Server List.
- Enter the server host name or IP address in
the Server text field.
- In the Shared Secret text field, enter the
shared secret used by your specified server that matches the
one on the bridge.
- Enter the port number your server uses for
authentication in the Authentication Port parameter. The port
setting for the Cisco RADIUS server (the Access Control Server
[ACS]) is 1645, and the port setting for many RADIUS servers
is 1812.
- Check the EAP Authentication
check box in the Use Server For section.
- Click the first Apply
button to add the server.
- Steps 11 through 16 are optional tasks and
can be skipped to expedite setup. Click the Global
Properties tab. Specify the interval at which the accounting
updates should be performed in the Accounting Updates Interval
field.
- In the TACACS+ Server Timeout field, specify
the number of seconds an access point waits for a reply to a
TACACS+ request before resending the request.
- In the RADIUS Server Timeout field, specify
the number of seconds an access point waits for a reply to a
RADIUS request before resending the request.
- In the RADIUS Server Retransmit Retries field,
specify the number of times the access point sends each RADIUS
request to the server before giving up.
- If more than one RADIUS server is configured
for EAP authentication, enable the Dead Server List option.
Specify how long unresponsive RADIUS servers should be skipped
over when the access point is attempting RADIUS server authentication.
Enter this amount in the Server remains on list for text field.
- Click Apply in
the Global Server Properties section.
Configuring
advanced EAP parameters
Now that the RADIUS server is added, you can
configure advanced EAP parameters. These steps are optional and
can be skipped to expedite setup.
Complete the following steps to configure advanced
EAP parameters.
- From the navigation menu, click Security
to go the Security Summary page.
- From the expanded Security navigation menu,
click Advanced Security to go to
the Advanced Security screen.
- Choose either the second or third option to
enable authentication. These interval options set how often
EAP authentication is reattempted. You can enter your own interval
or use the one provided by the RADIUS server.
- In the EAP Client Timeout text field, enter
the amount of time the access point should wait for wireless
clients to respond to EAP authentication requests.
- Click Apply.
|
|