manual

USA Headquarters | 19800 North Creek Parkway | Suite 200 | Bothell | WA 98011 | USA | T: +1 800 424 4284 | F: +1 425 481 3895
European Headquarters | Via Motta 24 | 6830 Chiasso | Switzerland | T: +41 91 69769.00 | F: +41 91 69769.11
Asia-Pacific Headquarters | 11 Tai Seng Link | Singapore | 534182 | T: +65 6383 3832 | F: +65 6383 3830
www.alliedtelesis.com
© 2006 Allied Telesyn Inc. All rights reserved. Information in this document is subject to change without notice. All company names, logos, and product designs that are trademarks or registered trademarks are the property of their respective owners.
C613-16091-00 REV A
Using a Wired Allied Telesis Switch Instead of the
AT- WA 74 00
All Allied Telesis Rapier, AT8600, AT-8800, AT-9800, Switchblade, AT8900, AT-9900, and x900
Series switches support 802.1x port authentication. You can use any of these switches
instead of the AT-WA7400.
For example, if you connected your laptop directly to port 1 on the AT-8624 (see "Network
Diagram" on page 2), instead of using wireless, you would apply the following configuration to
the AT-8624 switch.
# RADIUS configuration
add radius server=169.254.4.66 secret="secret" port=1812 accport=1813
# 802.1X configuration
enable portauth=8021x
enable portauth=8021x port=1 type=authenticator
In the above configuration:
the IP address 169.254.4.66 is the IP address of the RADIUS server
the RADIUS server is configured to listen on port 1812 for access-requests and 1813 for
accounting-requests.
This configuration is the same whether you use Linux’s Xsupplicant or Microsoft’s supplicant
client.
Naturally, the switch needs to have IP connectivity to the RADIUS server, however, the
supplicant does not require any IP connectivity before the port authentication process begins.
A DHCP server may assign the supplicant an IP after successful authentication.