9 - 37
5. Define the following
Settings
required in the creation or modification of the server policy:
6. Set the following
Authentication
parameters to define server policy authorization settings.
RADIUS User Pools
Select the user pools to apply to this server policy. Up to 32 can be applied. If a
pool requires creation, select the Create link. For more information, see
Defining
User Pools on page 9-32
.
LDAP Server Dead Period
Set an interval in either
Seconds
(0 - 600) or
Minutes
(0- 10) during which the
access point will not contact its LDAP server resource. A dead period is only
implemented when additional LDAP servers are configured and available.
LDAP Groups
Use the drop-down menu to select LDAP groups to apply the server policy
configuration. Select the
Create
or
Edit
icons as needed to either create a new
group or modify an existing group. Use the arrow icons to add and remove groups
as required.
LDAP Group Verification
Select the check box to set the LDAP group search configuration. This setting is
enabled by default.
LDAP Chase Referral
Select the check box to set the LDAP referral chase feature. This settings is
enabled by default. When enabled, if the LDAP server does not contain the
requested information, it indicates to the LDAP client that it does not have the
requested information and provides the client with another LDAP server that
could have the requested information. It is up to the client to contact the other
LDAP server for its information.
Local Realm
Define the LDAP Realm performing authentication using information from an
LDAP server. User information includes
user name
,
password
, and the
groups
to
which the user belongs.
Source
Select the RADIUS resource for user authentication with this server policy.
Options include Local for the local user database or LDAP for a remote LDAP
resource. The default setting is Local
FallBack
Select this option to indicate that fall back from RADIUS to local is enabled incase
RADIUS authentication is not available for any reason. This option is only enabled
when
RADIUS
is selected as the
Source
.
Local Authentication Type
Use the drop-down menu to select the local EAP authentication scheme. The
following EAP authentication types are supported by the onboard RADIUS server:
•
All
– Enables both TTLS and PEAP.
•
TLS
- Uses TLS as the EAP type
•
TLS and MD5
- The EAP type is TTLS, with default authentication using MD5.
•
TTLS and PAP
- The EAP type is TTLS, with default authentication using PAP.
•
TTLS and MSCHAPv2
- The EAP type is TTLS, with default authentication using
MSCHAPv2.
•
PEAP and GTC
- The EAP type is PEAP, with default authentication using GTC.
•
PEAP and MSCHAPv2
- The EAP type is PEAP with default authentication using
MSCHAPv2.
Summary of Contents for WiNG 5.4.2
Page 1: ...Motorola Solutions WiNG 5 4 2 ACCESS POINT SYSTEM REFERENCE GUIDE ...
Page 2: ......
Page 20: ...xvi WiNG 5 4 2 Access Point System Reference Guide ...
Page 24: ...1 4 WiNG 5 4 2 Access Point System Reference Guide ...
Page 36: ...2 12 WiNG 5 4 2 Access Point System Reference Guide ...
Page 54: ...3 18 WiNG 5 4 2 Access Point System Reference Guide ...
Page 358: ...6 2 WiNG 5 4 2 Access Point System Reference Guide Figure 6 1 Configuration Wireless menu ...
Page 462: ...6 106 WiNG 5 4 2 Access Point System Reference Guide ...
Page 474: ...7 12 WiNG 5 4 2 Access Point System Reference Guide ...
Page 509: ...9 5 Figure 9 2 Captive Portal Policy screen Basic Configuration tab ...
Page 572: ...11 12 WiNG 5 4 2 Access Point System Reference Guide ...
Page 626: ...12 54 WiNG 5 4 2 Access Point System Reference Guide ...
Page 790: ...A 2 WiNG 5 4 2 Access Point System Reference Guide ...
Page 835: ......