Client Name in Local MAC Authentication List
125
19
RADIUS
Making use of a single database of accessible information – as in an Authentication Server –
can greatly simplify the authentication and management of users in a large network. One such
type of Authentication Server supports the Remote Authentication Dial In User Service
(RADIUS) protocol as defined by RFC 2865.
For authenticating users prior to access, the RADIUS standard has become the protocol of
choice by administrators of large accessible networks. To accomplish the authentication in a
secure manner, the RADIUS client and RADIUS server must both be configured with the
same shared password or “secret”. This “secret” is used to generate one-way encrypted
authenticators that are present in all RADIUS packets. The “secret” is never transmitted over
the network.
RADIUS conforms to a secure communications client/server model using UDP as a transport
protocol. It is extremely flexible, supporting a variety of methods to authenticate and
statistically track users. RADIUS is also extensible, allowing for new methods of
authentication to be added without disrupting existing functionality.
As a user attempts to connect to a functioning RADIUS supported network, a device referred
to as the Network Access Server (NAS) first detects the contact. For wired clients, the NAS is
the DWS-3000 switch; for wireless clients, the AP serves as the NAS. The NAS or user-login
interface then prompts the user for a name and password. The NAS encrypts the supplied
information and a RADIUS client transports the request to a pre-configured RADIUS server.
The server can authenticate the user itself, or make use of a back-end device to ascertain
authenticity. In either case a response may or may not be forthcoming to the client. If the
server accepts the user, it returns a positive result with attributes containing configuration
information. If the server rejects the user, it returns a negative result. If the server rejects the
client or the shared “secrets” differ, the server returns no result. If the server requires
additional verification from the user, it returns a challenge, and the request process begins
again.
Client Name in Local MAC Authentication List
A wireless client MAC address can be configured in the AP MAC authentication list. A user-
friendly name of up to 32 printable ASCII characters can be assigned to a client entry in the
local Client MAC Authentication list. This is a configurable parameter and persists over
switch reboots. The client name cannot be assigned to a client entry on a RADIUS server.
Содержание UNIFIED WIRED & WIRELESS ACCESS SYSTEM DWS-3000
Страница 2: ...2 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 12: ...12 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 14: ...14 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 32: ...32 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 40: ...40 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 44: ...44 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 55: ...Web Examples 55 6 IGMP Snooping Figure 19 IGMP Snooping Multicast Router VLAN Configuration Page ...
Страница 56: ...56 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 66: ...66 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 84: ...84 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 90: ...90 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 103: ...Web Examples 103 15 Access Control Lists ACLs Figure 57 Attach IP ACL to an Interface ...
Страница 110: ...110 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 123: ...Web Examples 123 18 Port Security Figure 70 Port Security Violation Status ...
Страница 124: ...124 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 129: ...RADIUS Configuration Examples 129 19 RADIUS Figure 73 Configuring the RADIUS Server ...
Страница 137: ...TACACS Configuration Example 137 20 TACACS Figure 82 Set the User Login TACACS ...
Страница 138: ...138 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 146: ...146 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 166: ...166 2001 2011 D Link Corporation All Rights Reserved Configuration Guide Figure 109 DHCP Filter Binding Information ...
Страница 176: ...176 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 183: ...Web Interface Examples 183 28 Simple Network Time Protocol SNTP Figure 115 Summer Time Configuration Page ...
Страница 184: ...184 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...