
AG 5000
Introduction
23
RADIUS Proxy
The RADIUS Proxy feature relays authentication and accounting packets between the
parties performing the authentication process. Different realms can be set up to
directly channel RADIUS messages to the various RADIUS servers. This
functionality can be effectively deployed to:
Support a wholesale WISP model directly from the edge without the need
for any centralized AAA proxy infrastructure.
Support EAP authenticators (for example, WLAN APs) on the subscriber-
side of the NSE to transparently proxy all EAP types (TLS, SIM, etc.) and to
allow for the distribution of per-session keys to EAP authenticators and
supplicants.
Complementing the RADIUS Proxy functionality is the ability to route RADIUS
messages depending on the Network Access Identifier (NAI). Both prefix-based (for
example,
) and suffix-based (
) NAI routing
mechanisms are supported. Together, the RADIUS Proxy and NAI Routing further
support the deployment of the Wholesale Wi-Fi™ model allowing multiple providers
to service one location. See also,
“RADIUS Client” on page 22
.
Remember Me and RADIUS Re-Authentication
The NSE’s Internal Web Server (IWS) stores encrypted login cookies in the browser
to remember logins, using Usernames and Passwords between Access Points. This
“Remember Me” functionality creates a more efficient and better user experience in
wireless networks.
The RADIUS Re-Authentication buffer has been expanded to 720 hours, allowing an
even more seamless and transparent connection experience for repeat users.
Secure Management
There are many different ways to configure, manage and monitor the performance
and up-time of network devices. SNMP, Telnet, HTTP and ICMP are all common
protocols to accomplish network management objectives. And within those objectives
is the requirement to provide the highest level of security possible.
While several network protocols have evolved that offer some level of security and
data encryption, the preferred method for attaining maximum security across all
network devices is to establish an IPSec tunnel between the NOC (Network
Operations Center) and the edge device (early VPN protocols such as PPTP have
been widely discredited as a secure tunneling method).
ag5000_userguide.book Page 23 Friday, March 4, 2005 3:05 PM
Summary of Contents for AG 5000
Page 1: ...Nomadix AG 5000 User s Guide...
Page 6: ...This page intentionally blank...
Page 158: ...AG 5000 154 System Administration Sample of Internal Billing Options XoverY Plan Setup Screen...
Page 185: ...AG 5000 System Administration 181 5 Repeat Steps 1 3 for page 3 of 3 see following screen...
Page 206: ...AG 5000 202 System Administration Notes Use this page for your notes...
Page 262: ...AG 5000 258 Troubleshooting Notes Use this page for your notes...
Page 264: ...AG 5000 260 Technical Support Notes Use this page for your notes...
Page 280: ...AG 5000 276 Glossary of Terms Notes Use this page for your notes...
Page 286: ...AG 5000 282 Index This page intentionally blank...