
9 - 50 WiNG 5.7.1 Access Point System Reference Guide
server receives a RADIUS
access request
packet and verifies the server possesses a shared secret for the client. If the
server does not possess a shared secret for the client, the request is dropped. If the client received a verified
access accept
packet, the username and password are considered correct, and the user is authenticated. If the client receives a verified
access reject
message, the username and password are considered incorrect, and the user is not authenticated.
Figure 9-31
RADIUS Server Policy screen - Client tab
11. Select the
+ Add Row
button to add a table entry for a new client’s IP address, mask and shared secret. To delete a client
entry, select the
Delete
icon on the right-hand side of the table entry.
12. Specify the
IP Address
and mask of the RADIUS client authenticating with the RADIUS server.
13. Specify a
Shared Secre
t for authenticating the RADIUS client.
14. Shared secrets verify RADIUS messages with a RADIUS enabled device configured with the same shared secret. Select the
Show
check box to expose the shared secret’s actual character string. Leave the option unselected to display the shared
secret as a string of asterisks (*).
15. Select
OK
to save the server policy’s client configuration. Select the
Reset
button to revert to the last saved configuration.
16. Select the
Proxy
tab and ensure the
Activate RADIUS Server Policy
button remains selected.
A user’s access request is sent to a proxy server if it cannot be authenticated by local RADIUS resources. The proxy server
checks the information in the user access request, and either accepts or rejects the request. If the proxy server accepts the
request, it returns configuration information specifying the type of connection service required to authenticate the user.
The RADIUS proxy appears to act as a RADIUS server to the NAS, whereas the proxy appears to act as a RADIUS client to
the RADIUS server.
When the access point’s RADIUS server receives a request for a user name containing a realm, the server references a table
of configured realms. If the realm is known, the server proxies the request to the RADIUS server. The behavior of the
Summary of Contents for WiNG 5.7.1
Page 1: ...WiNG 5 7 1 ACCESS POINT SYSTEM REFERENCE GUIDE ...
Page 2: ......
Page 3: ...WING 5 7 1 ACCESS POINT SYSTEM REFERENCE GUIDE MN001977A01 Revision A April 2015 ...
Page 4: ...ii WiNG 5 7 1 Access Point System Reference Guide ...
Page 24: ...1 4 WiNG 5 7 1 Access Point System Reference Guide ...
Page 36: ...2 12 WiNG 5 7 1 Access Point System Reference Guide ...
Page 72: ...3 36 WiNG 5 7 1 Access Point System Reference Guide ...
Page 470: ...5 386 WiNG 5 7 1 Access Point System Reference Guide ...
Page 472: ...6 2 WiNG 5 7 1 Access Point System Reference Guide Figure 6 1 Configuration Wireless menu ...
Page 624: ...7 46 WiNG 5 7 1 Access Point System Reference Guide ...
Page 724: ...9 56 WiNG 5 7 1 Access Point System Reference Guide ...
Page 783: ...12 35 Figure 12 46 Device Summary screen 4 Click File Management ...
Page 816: ...12 68 WiNG 5 7 1 Access Point System Reference Guide ...
Page 1006: ...13 190 WiNG 5 7 1 Access Point System Reference Guide ...
Page 1026: ...14 20 WiNG 5 7 1 Access Point System Reference Guide ...
Page 1028: ...A 2 WiNG 5 7 1 Access Point System Reference Guide ...
Page 1089: ......
Page 1090: ...MN001977A01 Revision A April 2015 ...