Copyright © 2004-2005, Vivato, Inc.
142
Configuring an External RADIUS Server to Recognize the Vivato Wi-Fi AP/
Bridge
An external
Remote Authentication Dial-in User Server
(RADIUS) server running on the network can sup-
port EAP-TLS smart card/certificate distribution to clients in a
Public Key Infrastructure
(PKI) as well as
EAP-PEAP user account setup and authentication. By
external
RADIUS server, we mean an authentica-
tion server external to the AP/Bridge itself. This is to distinguish between the scenario in which you use a
network RADIUS server versus one in which you use the
Built-in Authentication Server
on the Vivato Wi-Fi
AP/Bridge.
This section provides an example of configuring an external RADIUS server for the purposes of authenti-
cating and authorizing TLS-EAP certificates from wireless clients of a particular Vivato Wi-Fi AP/Bridge
configured for either "WPA with RADIUS" or "IEEE 802.1x" security modes. The intention of this section is
to provide some idea of what this process will look like; procedures will vary depending on the RADIUS
server you use and how you configure it. For this example, we use the Internet Authentication Service that
comes with Microsoft Windows 2003 server.
The purpose of this procedure is to identify your Vivato Wi-Fi AP/Bridge as a "client" to the RADIUS server.
The RADIUS server can then handle authentication and authorization of wireless clients for the VA4200.
This procedure is required
per AP/Bridge
. If you have more than one AP/Bridge with which you plan to use
an external RADIUS server, you need to follow these steps for each of those VA4200s.
Keep in mind that the information you need to provide to the RADIUS server about the AP/Bridge corre-
sponds to settings on the AP/Bridge (SSID Configuration) and vice versa. You should have already pro-
vided the RADIUS server IP Address to the VA4200; in the steps that follow you will provide the AP/Bridge
IP address to the RADIUS server. The RADIUS Key provided on the VA4200 is the "shared secret" you will
provide to the RADIUS server.
Note
This document does not describe how to set up Administrative users on the RADIUS
server. In this example, we assume you already have RADIUS server user accounts
configured. You will need a RADIUS server user name and password for this procedure
and the following one that describes how to obtain and install a certificate on the wire-
less client. Please consult the documentation for your RADIUS server for information
on setting up user accounts.
No
te
The RADIUS server is identified by its IP address and UDP port numbers for the differ-
ent services it provides. On the current release of the Vivato Wi-Fi AP/Bridge, the
RADIUS server
User Datagram Protocol
(UDP) ports used by the AP/Bridge are not
configurable. (The Vivato Wi-Fi AP/Bridge is hard-coded to use RADIUS server UDP
port 1812 for authentication and port 1813 for accounting.)