
724-746-5500 | blackbox.com
724-746-5500 | blackbox.com
Page 117
Chapter 9: Common Configuration Examples
This field is only relevant when both primary and backup RADIUS authentication servers are configured. The retry interval
defines how long a SmartPath AP RADIUS authenticator waits before retrying a previously unresponsive primary RADIUS
server, even if the current backup server is responding. When there is only a single RADIUS authentication server, as in
this example, the retry interval does not matter.
Accounting Interim Update Interval: 20 seconds (the default setting)
This setting defines the interval for sending RADIUS accounting updates to report the status and cumulative length of
RADIUS supplicant sessions. This setting is important when enforcing RADIUS accounting, which is not involved in the
present example. Therefore, this setting is irrelevant here.
Permit Dynamic Change of Authorization Messages (RFC 3576): (clear; the default setting)
This option allows SmartPath AP RADIUS authenticators to accept unsolicited disconnect and Change of Authorization
(CoA) messages from the RADIUS authentication server by enabling the dynamic authorization extension provided in RFC
3576, Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS). "Disconnect" messages
terminate a user's session immediately, and CoA messages modify session authorization attributes such as VLANs and
user profile IDs. The ability for SmartPath AP RADIUS authenticators to accept these messages from the RADIUS authen-
tication server is not required in this example, so it remains disabled.
To save the configuration as "RADIUS-10.1.1.10" and close the dialog box, click Save.
Defining an SSID with 802.1X/EAP Authentication
Define an SSID that supports 802.1X/EAP authentication and directs the SmartPath AP RADIUS authenticators to forward
authentication requests from RADIUS supplicants to the RADIUS authentication server that you just defined.
Click “Configuration > SSIDs > New,” enter the following, leave all other values at their default settings, and then click “Save:”
Profile Name: corp-wifi
SSID: corp-wifi
Description: Employee and IT WLAN access; 802.1X
SSID Access Security: WPA/WPA2 802.1X (Enterprise)
Use Default 802.1X Settings: (select)
By default, when a SmartPath AP hosts a WPA/WPA2 802.1X (Enterprise) SSID, it negotiations with clients over the use
of WPA or WPA2 for key management and TKIP or CCMP (AES) for encryption, and uses whichever methods each client
supports. The SmartPath AP and client use EAP (802.1X) for authentication through an external RADIUS server.
RADIUS Server: RADIUS-10.1.1.10
User profile assigned if no attribute is returned from RADIUS after successful authentication: Emp(1)
The SmartPath AP RADIUS authenticator applies the user profile "Emp(1)" to users if the RADIUS authentication server
successfully authenticates them and returns a Tunnel-Private-Group-ID attribute that matches the attribute for this user
profile (1). The SmartPath AP also applies this profile to users if the RADIUS authentication server does not return any
attributes.
If the RADIUS server authenticates a user and returns attributes that do not match an existing user profile, the user
profile lookup will fail and SmartPath AP will reject the client.
User profiles assigned via attributes returned from RADIUS after successful authentication: Click IT(2) in the Available User
Profiles list, and then click the right arrow ( > ) to move it to the Selected User Profiles list.
The SmartPath AP RADIUS authenticator applies the "IT(2)" user profile only if the RADIUS authentication server returns
a Tunnel-Private-Group-ID attribute matching the attribute for this user profile (2).
Only the selected user profiles can be assigned via RADIUS for use with this SSID: (clear)