Setting Up the RADIUS Client
659
generate an EAPOL-Logoff message when the user logs-off, which leaves the port
authorized. To reduce the impact of this issue, decrease the "session-timeout"
return list attribute to force re-authentication of the port more often. Alternatively,
use a RADIUS client without this security flaw, for example the Aegis client
A patch for the Windows XP RADIUS client may be available from Microsoft since
publishing this guide.
Aegis Client Installation
The Aegis Client is a standards-based implementation of IEEE 802.1x and supports
many different encrypted algorithms such as MD5. It works on different Windows
and Linux operating systems, such as Win XP, 2000, NT, 98, ME, Mac OSX. Details
of the Aegis client can be found at
http://www.mtghouse.com
/
Follow these steps to install the Aegis client:
1
Registering the Aegis Client.
When using the Aegis client for the first time, a license key will be requested. To
obtain a valid license key, complete an online form on the Meetinghouse website
giving the System ID. A license key will then be sent using e-mail. The System ID
can be found when running the Aegis Client application for the first time. To apply
the license key:
a
Run the Aegis Client software.
b
Go to
Aegis Client
>
Register
and select
Help
on the menu
c
Copy the License ID indicated at the bottom of the dialog box into the
License
ID
field.
d
Copy the License Key provided in the e-mail from Meetinghouse into the
License Key
field.
e
Press
OK
2
Configuring the Aegis Client
a
Click the
Key
icon.
Содержание 5500 SI - Switch - Stackable
Страница 24: ...24 ABOUT THIS GUIDE...
Страница 30: ...30 CHAPTER 1 GETTING STARTED Figure 3 Setting up a New Connection Figure 4 Configuring the Port for Connection...
Страница 50: ...50 CHAPTER 1 GETTING STARTED...
Страница 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Страница 78: ...78 CHAPTER 3 PORT OPERATION...
Страница 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Страница 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Страница 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Страница 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Страница 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Страница 349: ...349...
Страница 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Страница 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Страница 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Страница 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Страница 614: ...614 CHAPTER 32 CLUSTERING...
Страница 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...