Authentication and User Management
14.4 Configuring Authentication Servers
SCALANCE W1750D UI
216
Configuration Manual, 02/2018, C79000-G8976-C451-02
4.
From the Authentication Server 1 drop-down list, select the server name on which
RadSec is enabled.
5.
Click Next and then click Finish
In the CLI
To associate an authentication server to a WLAN SSID:
(scalance)(config)# wlan ssid-profile <name>
(scalance)(SSID Profile <name>)# auth-server <server-name>
(scalance)(SSID Profile <name>)# end
((scalance)# commit apply
To associate an authentication server to a wired profile:
(scalance)(config)# wired-port-profile <name>
(scalance)(wired ap profile <name>)# auth-server <name>
(scalance)(wired ap profile <name>)# end
(scalance)# commit apply
14.4.5
Configuring Dynamic RADIUS Proxy Parameters
The RADIUS server can be deployed at different locations and VLANs. In most cases, a
centralized RADIUS or local server is used to authenticate users. However, some user
networks can use a local RADIUS server for employee authentication and a centralized
RADIUS-based captive portal server for guest authentication. To ensure that the RADIUS
traffic is routed to the required RADIUS server, the dynamic RADIUS proxy feature must be
enabled.
Note
The dynamic RADIUS proxy parameters configuration is not required if RadSec is enabled in
the RADIUS server profil
If the AP clients need to authenticate to the RADIUS servers through a different IP address
and VLAN, ensure that the following steps are completed:
1.
Enable dynamic RADIUS proxy.
2.
Configure dynamic RADIUS proxy IP, VLAN, netmask, and gateway for each
authentication server.
3.
Associate the authentication servers to SSID or a wired profile to which the clients
connect.
After completing the configuration steps mentioned above, you can authenticate the SSID
users against the configured dynamic RADIUS proxy parameters.