484
C
HAPTER
21: C
ONFIGURING
AAA
FOR
N
ETWORK
U
SERS
WX Switch Requirements
The WX port connected to the third-party AP must be configured as a
wired authentication port. If SSID traffic from the AP is tagged, the
same VLAN tag value must be used on the wired authentication port.
A MAC authentication rule must be configured to authenticate the
AP.
The WX must be configured as a RADIUS proxy for the AP. The WX is
a RADIUS server to the AP but remains a RADIUS client to the real
RADIUS servers.
The WX system IP address must be the same as the IP address configured
on the VLAN that contains the proxy port.
An authentication proxy rule must be configured for the AP’s users.
The rule matches based on SSID and username, and selects the
authentication method (a RADIUS server group) for proxying.
RADIUS Server Requirements
For 802.1X users, the usernames and passwords must be configured
on the RADIUS server.
For non-802.1X users of a tagged SSID, the special username
web-portal-
ssid
or
last-resort-
ssid
must be configured, where
ssid
is the SSID name. The fallthru authentication type (
web-portal
or
last-resort
) specified for the wired authentication port connected to
the AP determines which username you need to configure.
For any users of an untagged SSID, the special username
web-portal-wired
or
last-resort-wired
must be configured,
depending on the fallthru authentication type specified for the wired
authentication port.
Configuring
Authentication for
802.1X Users of a
Third-Party AP with
Tagged SSIDs
To configure MSS to authenticate 802.1X users of a third-party AP, use
the commands below to do the following:
Configure the port connected to the AP as a wired authentication
port. Use the following command:
set port type wired-auth
port-list
[
tag
tag-list
]
[
max-sessions
num
]
[
auth-fall-thru
{
last-resort
|
none
|
web-portal
}]
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...