◦
Radius Authenticated
—
The WAP device uses a database on a remote RADIUS server to authenticate the
users. Configure the following if using the Radius Authenticated setting.
◦
Radius IP Network
—
Select the Radius IP network from the drop down list (
IPv4 or IPv6
).
◦
Global RADIUS
—
Check
Enable
to enable global RADIUS. If you want the CP feature to use a
different set of RADIUS servers, uncheck the box and configure the servers in the fields on this page.
◦
RADIUS Accounting
—
Check
Enable
to track and measure the resources that a particular user has
consumed, such as the system time and the amount of data transmitted and received.
If you enable RADIUS accounting, it is enabled for the primary RADIUS server, all backup servers,
and all configured servers.
◦
Server IP Address-1 or Server IPv6 Address-1
—
Enter the IPv4 or IPv6 address for the primary
RADIUS server for this VAP. The IPv4 address should be in a form similar to xxx.xxx.xxx.xxx
(192.0.2.10). The IPv6 address should be in a form similar to xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx
(2001:DB8:CAD5:7D91).
When the first wireless client tries to authenticate with a VAP, the WAP device sends an authentication
request to the primary server. If the primary server responds to the authentication request, the WAP
device continues to use this RADIUS server as the primary server, and the authentication requests are
sent to the specified address.
Server IP Address-2 or Server IPv6 Address-2
—
Enter up to three IPv4 or IPv6 backup RADIUS
server addresses. If the authentication fails with the primary server, each configured backup server is
tried in sequence.
◦
Key-1
—
Enter the shared secret key that the WAP device uses to authenticate to the primary RADIUS
server. You can use up to 63 standard alphanumeric and special characters. The key is case sensitive
and must match the key configured on the RADIUS server. The text that you enter is shown as asterisks.
Key-2
—
Enter the RADIUS key associated with the configured backup RADIUS servers. The server at
Server IP Address-1 uses Key-1, Server IP Address-2 uses Key-2, and so on.
◦
No Authenticated
—
The users do not need to be authenticated by a database.
•
Guest Group
—
If the Authentication Method is set to Local Database or Radius Authenticated, select a Guest
Group that was created previously . All users who belong to the group are permitted to access the network through
this portal.
•
Redirect URL
—
To enable the URL Redirect, enter the URL (including http://). The range is from 0 to 256
characters.
•
Session Timeout
—
Enter the time remaining, in seconds, for the CP session to be valid. After the time reaches
zero, the client is de-authenticated. The range is from 0 to 1440 minutes. The default value is 0.
•
Web Portal Locale
—
Select a web portal locale that was created previously from the drop-down list.
Step 4
Click
Save
. Your changes are saved to the Startup Configuration.
Cisco WAP125 Wireless-AC/N Dual Band Desktop Access Point with PoE
82
Access Control
Guest Access Instance Table