9 - 38 WiNG 5.4.2 Access Point System Reference Guide
7. Set the following
Session Resumption/Fast Reauthentication
settings to define how server policy sessions are
re-established once terminated and require cached data to resume:
8. Select
OK
to save the settings to the server policy configuration. Select
Reset
to revert to the last saved configuration.
9. Select the
Client
tab and ensure the
Activate RADIUS Server Policy
button remains selected.
The access point uses a RADIUS client as a mechanism to communicate with a central server to authenticate users and
authorize access.
The client and server share a secret. That shared secret followed by the request authenticator is put through a MD5 hash
to create a 16 octet value used with the password entered by the user. If the user password is greater than 16 octets,
additional MD5 calculations are performed, using the previous ciphertext instead of the request authenticator. The server
receives a RADIUS
access request
packet and verifies the server possesses a shared secret for the client. If the server does
not possess a shared secret for the client, the request is dropped. If the client received a verified
access accept
packet, the
username and password are considered correct, and the user is authenticated. If the client receives a verified
access reject
message, the username and password are considered incorrect, and the user is not authenticated.
LDAP Authentication Type
Use the drop-down menu to select the LDAP authentication scheme. The
following LDAP authentication types are supported by the external LDAP
resource:
•
All
– Enables both TTLS and PAP and PEAP and GTC.
•
TTLS and PAP
- The EAP type is TTLS with default authentication using PAP.
•
PEAP and GTC
- The EAP type is PEAP with default authentication using GTC.
Enable CRL Validation
Select this option to enable a
Certificate Revocation List
(CRL) check. Certificates
can be checked and revoked for a number of reasons, including the failure or
compromise of a device using a certificate, a compromise of a certificate key pair
or errors within an issued certificate. This option is disabled by default.
Enable Session Resumption
Select the check box to control volume and the duration cached data is
maintained by the server policy upon the termination of a server policy session.
The availability and quick retrieval of the cached data speeds up session
resumption.
Cached Entry Lifetime
Use the spinner control to set the lifetime (1 - 24 hours) cached data is maintained
by the RADIUS server policy. The default setting is 1 hour.
Maximum Cache Entries
Use the spinner control to define the maximum number of entries maintained in
cache for this RADIUS server policy. The default setting is 128 entries.
Содержание WiNG 5.4.2
Страница 1: ...Motorola Solutions WiNG 5 4 2 ACCESS POINT SYSTEM REFERENCE GUIDE ...
Страница 2: ......
Страница 20: ...xvi WiNG 5 4 2 Access Point System Reference Guide ...
Страница 24: ...1 4 WiNG 5 4 2 Access Point System Reference Guide ...
Страница 36: ...2 12 WiNG 5 4 2 Access Point System Reference Guide ...
Страница 54: ...3 18 WiNG 5 4 2 Access Point System Reference Guide ...
Страница 358: ...6 2 WiNG 5 4 2 Access Point System Reference Guide Figure 6 1 Configuration Wireless menu ...
Страница 453: ...6 97 Figure 6 45 Advanced Rate Settings 2 4 GHz screen Figure 6 46 Advanced Rate Settings 5 GHz screen ...
Страница 462: ...6 106 WiNG 5 4 2 Access Point System Reference Guide ...
Страница 474: ...7 12 WiNG 5 4 2 Access Point System Reference Guide ...
Страница 509: ...9 5 Figure 9 2 Captive Portal Policy screen Basic Configuration tab ...
Страница 572: ...11 12 WiNG 5 4 2 Access Point System Reference Guide ...
Страница 608: ...12 36 WiNG 5 4 2 Access Point System Reference Guide Figure 12 38 Certificate Management Import New Trustpoint screen ...
Страница 626: ...12 54 WiNG 5 4 2 Access Point System Reference Guide ...
Страница 790: ...A 2 WiNG 5 4 2 Access Point System Reference Guide ...
Страница 835: ......