Specifications

Chapter 4 Security Setup
Summary of Settings for Authentication Types
4-36
Cisco Aironet 1200 Series Access Point Software Configuration Guide
OL-2159-01
EAP-TLS, EAP-MD5,
and static WEP under
802.11 Open
The access point does not support this combination of authentication types.
When you select Require EAP on the Authenticator Configuration page to
authenticate clients using EAP-TLS and EAP-MD5, non-EAP client
devices are blocked from using the access point.
MAC-based On the Address Filters page (shown in Figure 4-10):
Select yes for the Look up MAC address on authentication server if
not in existing filter list setting.
On the Authenticator Configuration page (shown in Figure 4-13):
Select an 802.1x protocol draft that matches the protocol draft used by
client devices that associate with the access point.
Enter the name or IP address, type, port, shared secret, and timeout
value for your RADIUS server.
Select the MAC Address Authentication check box under the server.
Note You can use the same server for both EAP authentication and
MAC-based authentication.
On the AP Radio Advanced page (shown in Figure 4-12):
Select Disallowed from the pull-down menu for Default Unicast
Address Filter for each authentication type requiring MAC-based
authentication.
MAC-based and LEAP
Enter the settings for LEAP.
Enter the settings for MAC-based authentication.
Table 4-5 Settings for Authentication Types (continued)
Authentication Types Required Settings