Product specifications

STEP 4. Under the security settings you will see all of the security options available for configuration. In our case the SSID =
datasec is configured with WPA2 as a security option.
STEP 5. The encryption type for the SSID was chosen as “AES” the second option available is TKIP.
STEP 6. And finally the RADIUS server with IP address 192.168.10.1 was selected for 802.1x authentication as shown in the screen
below
STEP 7. The RADIUS server can be selected as internal on the UC500 or external if External RADIUS such as ACS is available.
Note The Local RADIUS server on the UC520 is designed for support of the Internal or Standalone APs only!
For the demonstration purposes only, we have to modify the UC520 local RADIUS server to also support WLC 526 as authenticator,
therefore we need to add the following command on the UC520 from the CLI. The IP address added 192.168.50.10 indicates the IP
address of the controller’s management interface.
In the production environment do not
use the UC520 as a RADIUS server for the 526 Wireless Controllers.
STEP 8. In our demonstration we have configured the internal Local RADIUS server on the UC 520 under Configure>Wireless >
WLANs > Hostname = UC520-demo. Secret Key = demo. Enable Local RADIUS server.
© 2008 Cisco Systems, Inc. All rights reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com.
Page 39 of 95