4-25
Configuring the RADIUS Server—Integrated with ProCurve Identity Driven Manager
Configure the NAC 800 as a RADIUS Server
The default filter is shown in Figure 4-6; it tells the NAC 800 to search for
an entry in which the “uid” attribute equals whatever username is submit-
ted in an authentication request. (The “Stripped-User-Domain” portion of
the filter allows the NAC 800 to remove an appended domain name, which
may be necessary to match the uid as stored in the directory.)
N o t e
Depending on how your directory is constructed, you might need to
change “uid” to “cn.”
The password attribute (default “userPassword”) must match the name
of the attribute that stores passwords in your directory. Remember the
OpenLDAP directory must allow the NAC 800 “auth” access to this
attribute.
N o t e
Be careful when altering the default settings: if you cause searches to fail,
you effectively lock out all users.
9.
Check the
Use a secure connection (TLS)
box.
The NAC 800 and the OpenLDAP server perform a TLS handshake to
authenticate each other, as well as set up encryption keys to secure the
connection.
ProCurve Networking recommends that you always enable this option.
10. If you checked the box in the previous step, verify that the NAC 800 has
the proper certificate authority (CA) certificate.
The NAC 800 requires the CA certificate for the CA that signed the
OpenLDAP server’s certificate. Save this certificate on your management
station. Then click the
Browse
button next to
New certificate
to upload
it to the NAC 800.
11. To verify that the NAC 800 can successfully bind to the OpenLDAP server,
click the
test settings
button.
See “Test Authentication Settings” on page 4-35 for more information on
setting up the test.
N o t e
You may receive a message that the test failed because the LDAP query
returned no results. Do not worry: although the search did not return any
results, the bind completed successfully. For information about other result
messages, see Table 4-2 on page 4-39.
12. You are now ready to specify your network’s NASs. (See “Add NASs as
802.1X Devices” on page 4-40.)
Summary of Contents for 800
Page 1: ...Configuration Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Configuration Guide April 2008 1 0 30398 ...
Page 74: ...1 62 Overview of the ProCurve NAC 800 Deployment Methods ...
Page 155: ...3 27 Initial Setup of the ProCurve NAC 800 System Settings ...
Page 194: ...3 66 Initial Setup of the ProCurve NAC 800 Digital Certificates ...
Page 336: ...6 8 Disabling Endpoint Integrity Testing Overview ...
Page 354: ...7 18 Redundancy and Backup for RADIUS Services Back Up Your NAC 800 Configuration ...
Page 380: ...A 26 Appendix A Glossary ...
Page 394: ...B 14 Appendix B Linux Commands Service Commands ...
Page 405: ......