To use a self-signed SSL certificate or in the absence of your certificate in the pre-installed CA list, select
User
Specified
and click
Upload a certificate
to upload the certificate you want.
Note
Security
This section describes how to configure the security settings on the WAP device.
Radius Server
Several features require communication with a RADIUS authentication server. For example, when you
configure Virtual Access Points (VAPs) on the AP, you can configure security methods that control wireless
client access. For details, see
. The WPA Enterprise security methods use an external
RADIUS server to authenticate clients. The MAC address filtering feature, where client access is restricted
to a list, may also be configured to use a RADIUS server to control access. The Captive Portal feature also
uses RADIUS to authenticate clients.
You can use the Radius Server page to configure the RADIUS servers that are used by these features. You
can configure up to two globally available IPv4 or IPv6 RADIUS servers; however, you must select whether
the RADIUS client operates in IPv4 or IPv6 mode with respect to the global servers. One of the servers always
acts as a primary while the others act as backup servers.
In addition to using the global RADIUS servers, you can also configure each VAP to use a specific set of
RADIUS servers. See
.
Note
Configuring Global RADIUS Servers
Step 1
Select
Security
>
Radius Server
Step 2
Configure these parameters:
•
Server IP Address Type
—Select the IP version that the RADIUS server uses. You can toggle between the address
types to configure IPv4 and IPv6 global RADIUS address settings, but the WAP device contacts only the RADIUS
server or servers with the address type that you select in this field.
•
Server IP Address-1 or Server IPv6 Address-1
—Enter the address for the primary global RADIUS server. When
the first wireless client tries to authenticate with the WAP device, the WAP device sends an authentication request
to the primary server. If the primary server responds to the authentication request, the WAP device continues to use
this RADIUS server as the primary server, and authentication requests are sent to the address specified.
•
Server IP Address-2 or Server IPv6 Address-2
—Enter the addresses for the backup IPv4 or IPv6 RADIUS
servers. If authentication fails with the primary server, the configured backup server is tried.
•
Key-1
—Enter the shared secret key that the WAP device uses to authenticate to the primary RADIUS server. You
can use from 1 to 64 standard alphanumeric and special characters. The key is case sensitive and must match the
key configured on the RADIUS server. The text that you enter appears as asterisks.
Cisco WAP581 Wireless-AC/N Dual Radio Access Point with 2.5GbE LAN Administration Guide
39
System Configuration
Security
Summary of Contents for Wap581
Page 4: ......