Services Configuration 8 - 39
6. Set the following
Session Resumption/Fast Reauthentication
settings to define how server policy sessions are
re-established once terminated and require cached data to resume:
7. Select
OK
to save the settings to the server policy configuration. Select
Reset
to revert to the last saved configuration.
8. Select the
Client
tab and ensure the
Activate RADIUS Server Policy
button remains selected.
The access point uses a RADIUS client as a mechanism to communicate with a central server to authenticate users
and authorize access.
The client and server share a secret. That shared secret followed by the request authenticator is put through a MD5
hash to create a 16 octet value used with the password entered by the user. If the user password is greater than 16
octets, additional MD5 calculations are performed, using the previous ciphertext instead of the request authenticator.
The server receives a RADIUS
access request
packet and verifies the server possesses a shared secret for the client.
If the server does not possess a shared secret for the client, the request is dropped. If the client received a verified
access accept
packet, the username and password are considered correct, and the user is authenticated. If the client
receives a verified
access reject
message, the username and password are considered to be incorrect, and the user is
not authenticated.
LDAP Authentication Type
Use the drop-down menu to select the LDAP authentication scheme.
The following LDAP authentication types are supported by the external
LDAP resource:
All
– Enables both TTLS and PAP and PEAP and GTC.
TTLS and PAP
- The EAP type is TTLS with default authentication using
PAP.
PEAP and GTC
- The EAP type is PEAP with default authentication using
GTC.
Enable CRL Validation
Select this option to enable a
Certificate Revocation List
(CRL) check.
Certificates can be checked and revoked for a number of reasons,
including the failure or compromise of a device using a certificate, a
compromise of a certificate key pair or errors within an issued
certificate. This option is disabled by default.
Enable Session Resumption
Select the checkbox to control volume and the duration cached data is
maintained by the server policy upon the termination of a server policy
session.The availability and quick retrieval of the cached data speeds
up session resumption.
Cached Entry Lifetime
Use the spinner control to set the lifetime (1 - 24 hours) cached data is
maintained by the RADIUS server policy. The default setting is 1 hour.
Maximum Cache Entries
Use the spinner control to define the maximum number of entries
maintained in cache for this RADIUS server policy. The default setting
is 128 entries.
Содержание Solutions WiNG 5.2.6
Страница 1: ...Motorola Solutions WiNG 5 2 6 Access Point System Reference Guide ...
Страница 2: ......
Страница 14: ...1 4 WiNG 5 2 6 Access Point System Reference Guide ...
Страница 26: ...2 12 WiNG 5 2 6 Access Point System Reference Guide ...
Страница 46: ...3 20 WiNG 5 2 6 Access Point System Reference Guide ...
Страница 247: ...Device Configuration 5 189 Figure 5 102 Profile Overrides Management Settings screen ...
Страница 264: ...6 2 WiNG 5 2 6 Access Point System Reference Guide Figure 6 1 Configuration Wireless ...
Страница 392: ...7 32 WiNG 5 2 6 Access Point System Reference Guide ...
Страница 438: ...8 46 WiNG 5 6 2 Access Point System Reference Guide ...
Страница 514: ...12 12 WiNG 5 2 6 Access Point System Reference Guide Figure 12 6 RF Domain Health screen ...
Страница 533: ...Statistics 12 31 Figure 12 18 RF Domain Smart RF Energy Graph ...
Страница 597: ...Statistics 12 95 Figure 12 54 Access Point Certificate Trustpoint screen ...
Страница 626: ...12 124 WiNG 5 2 6 Access Point System Reference Guide ...
Страница 628: ...A 2 WiNG 5 2 6 Access Point System Reference Guide ...
Страница 669: ......