
RLX2-IHx Series ♦ 802.11a, b, g, n
Configuring a Radio - Detailed Configuration
Industrial Hotspots
User Manual
ProSoft Technology, Inc.
Page 73 of 248
Enterprise Mode Settings
When you select one of the
E
NTERPRISE
modes in the
S
ECURITY
M
ODE
control in the
W
IRELESS
S
ECURITY
S
ETTINGS
group, the webpage automatically displays a set of
controls for Enterprise mode parameters. There are two sets of controls:
The first set is for the RLX2-IHx series radio in Master mode
The second set is for the RLX2-IHx series radio Repeater or Client mode.
Enterprise mode parameters
In Enterprise mode, the radio authenticator communicates directly with the RADIUS
Server while it is relaying 802.1x frames received from an associating note’s Supplicant.
You must configure the following parameters in the
W
IRELESS
S
ECURITY
S
ETTINGS
group
on the Master radio in this
S
ECURITY
M
ODE
:
Parameter
Description
IP Address
Specifies the IP address of the RADIUS server with which the Network
Administrator has registered this radio.
UDP Port
Specifies the UDP port number the RADIUS server is using to listen to Radius
frames from this radio. The default port number used for the Radius protocol is
1812.
Secret
Specifies the pass phrase that was used when this radio was registered to the
RADIUS server. This validates that the Radius frames received on either end are
legitimate.
Repeater or Client mode parameters
When in Repeater or Client mode, the RLX2-IHx series radio Supplicant communicates
via its Parent radio’s authenticator with a RADIUS server. Several different
authentication protocols are available and can be set using the following parameters.
Parameter
Description
EAP Method
Specifies the EAP Method, sometimes referred to as the ‘outer protocol’ defines
the mechanism used to create a secure tunnel between the Supplicant and
RADIUS server during the first phase of the Authentication sequence. The
following EAP methods are supported:
EAP-PEAP
-
EAP method using the Protected Extensible Authentication
Protocol
EAP-TLS
-
EAP method based on X.509 certificates that provides for mutual
authentication. This is the most secure authentication mechanism available for
802.11. Certificates are required both on the radio and the RADIUS server. The
only authentication option available for EAP-TLS is to use TLS for the inner
protocol.
EAP-TTLS
-
EAP Tunneled TLS. Similar to EAP-PEAP.
Anonymous ID
Specifies the identity request in the first phase of the exchange that is sent in the
clear. The identity sent in this first phase can be set to an anonymous identity
(for example
anon_user
) or an anonymous identity at a domain (for example
[email protected]). The real identity (
username
) is sent encrypted after the EAP
tunnel is established in the second phase of the radius exchange.
Use this parameter if you are concerned about the username being sent in the
clear. Your IT department should specify the text for this parameter based on
their RADIUS server(s) configuration.