BelAir100SN User Guide
Wi-Fi AP Security
May 31, 2010
Confidential
Document Number BDTM11001-A01 Released
server, then an updated VLAN IP address is not automatically reflected
into the
NAS IP address
parameter.
The
timeout
parameter ranges from 2 to 300. It specifies the interval (in
seconds) after which the RADIUS client considers that the remote server has
timed out if a reply is not received. The default value is 10 seconds.
The
reauthtime
parameter ranges from 0 to 50000000. It specifies the RADIUS
re-authentication time (in seconds). This forces the BelAir100SN to check all
connected clients with the RADIUS server (that is, make sure they are still
allowed to access the network) at the specified interval. You only need to
configure this parameter if it is not specified on the RADIUS server. Setting the
interval to zero disables this feature. The maximum interval time is
2147483647. If you enter a higher number, the value is set to its maximum.
Example
/protocol/radius# set server 3 172.16.1.20 my-secret12345 authport 1812 acctport 1813
interface 172.16.1.254 timeout 15 reauthtime 1
Changing RADIUS
Server Admin State
/protocol/radius/set server-state <server_idx> {enable|disable}
This command enables or disables a particular RADIUS server on the server
list. Use the
show servers
command to determine
<server_idx>
.
Assigning SSIDs to
RADIUS Servers
/interface/wifi-<n>-<m>/add ssid <ssid_index>
radius-server <server_idx>
/interface/wifi-<n>-<m>/del ssid <ssid_index>
radius-server <server_idx>
The
add
command specifies which RADIUS server to use to authenticate the
specified SSID. The
del
command means that the specified RADIUS server
stops authenticating the specified SSID. Use the
/wifi-<n>-<m>/show ssid table
command to determine
<ssid_index>
. Use the
/radius/show servers
command
to determine
<server_idx>
.
RADIUS
Pre-authentication
/interface/wifi-<n>-<m>/set ssid <ssid_index>
radius-pre-auth {enabled|disabled}
This feature allows you to set up a centralized access control list at the
RADIUS server instead of each AP. With this feature enabled, when an AP
receives a client’s association request, it composes an
access-request
message
and sends it to a RADIUS server. If an
access-accept
message is received from
the RADIUS server, the AP continues with the client’s association procedure
and grants access based on other criteria such as encryption type and key
matching.