Chapter 1: Configuration
Configuring a RADIUS server
Page
1-292
The RADIUS VSA attributes concerning Zero Touch are as follows:
VSA Type String
Cambium-Canopy-ConfigFileImportUrl (29) string Maximum Length 127 characters.
Cambium-Canopy-ConfigFileExportUrl (30) string Maximum Length 127 characters.
The updated RADIUS dictionary can be downloaded from below link:
https://support.cambiumnetworks.com/files/pmp450/
Note
The feature is not applicable to the AP.
Using RADIUS for centralized AP and SM user name and password
management
AP – Technician/Installer/Administrator Authentication
To control technician, installer, and administrator access to the AP from a centralized RADIUS server:
Procedure 20 Centralized user name and password management for AP
1
Set Authentication Mode on the AP’s Configuration > Security tab to RADIUS AAA
2
Set User Authentication Mode on the AP’s Account > User Authentication tab (the tab only
appears after the AP is set to RADIUS authentication) to Remote or Remote then Local.
•
Local: The local SM is checked for accounts. No centralized RADIUS accounting (access
control) is performed.
•
Remote: Authentication by the centralized RADIUS server is required to gain access to
the SM if the SM is registered to an AP that has RADIUS AAA Authentication Mode
selected. For up to 2 minutes a test pattern is displayed until the server responds or times
out.
•
Remote then Local: Authentication using the centralized RADIUS server is attempted. If
the server sends a reject message, then the setting of Allow Local Login after Reject from
AAA determines if the local user database is checked or not. If the configured servers do
not respond within 2 minutes, then the local user database is used. The successful login
method is displayed in the navigation column of the SM.
User administration and authentication separation
On the AP, it is possible to configure up to three User Authentication servers, along with their Shared
Secret. If none of the User Authentication servers are configured, the AP continues to use SM
Authorization servers for User Authentication.
If at least one of the IP addresses is configured, all Authentication, Authorization, and Accounting
requests now follow the newly configured User Authorization server.
To configure separate User Authentication and SM Authentication:
Содержание PMP 450 AP
Страница 51: ...Chapter 1 Configuration Quick link setup Page 1 23 ...
Страница 155: ...Chapter 1 Configuration Configuring security Page 1 127 ...
Страница 160: ...Chapter 1 Configuration Configuring security Page 1 132 Table 41 Security attributes 450 Platform Family BHM ...
Страница 163: ...Chapter 1 Configuration Configuring security Page 1 135 ...
Страница 164: ...Chapter 1 Configuration Configuring security Page 1 136 ...
Страница 169: ...Chapter 1 Configuration Configuring security Page 1 141 Table 43 Security attributes 450 Platform Family BHS ...
Страница 193: ...Chapter 1 Configuration Configuring radio parameters Page 1 165 ...
Страница 194: ...Chapter 1 Configuration Configuring radio parameters Page 1 166 ...
Страница 195: ...Chapter 1 Configuration Configuring radio parameters Page 1 167 ...
Страница 206: ...Chapter 1 Configuration Configuring radio parameters Page 1 178 ...
Страница 210: ...Chapter 1 Configuration Configuring radio parameters Page 1 182 ...
Страница 232: ...Chapter 1 Configuration Configuring radio parameters Page 1 204 Figure 27 Multicast scheduler statistics ...
Страница 305: ...Chapter 1 Configuration Configuring a RADIUS server Page 1 277 Table 89 Security tab attributes ...
Страница 342: ...Chapter 1 Configuration Configuring a RADIUS server Page 1 314 6 Finally press Save Changes and you are ready to use it ...
Страница 408: ...Chapter 3 Operation System information Page 3 8 Table 115 General Status page attributes PMP 450 AP ...
Страница 423: ...Chapter 3 Operation System information Page 3 23 Site Contact Site Location Time Updated and Location Code ...
Страница 636: ...Chapter 5 Troubleshooting Logs Page 5 16 Figure 95 SM Authorization log ...