User's Manual

Elpro Technologies 450U-E Wireless Ethernet Modem & Device Server User Manual
30 www.cooperbussmann.com/wirelessresources Rev Version 1.0.12-Beta7
provided the correct authentication credentials, access is permitted and data encryption keys are established, similar to
WPA-PSK. Fine-grain (user level) access control can be achieved using this method.
An 802.1x capable RADIUS server may already be deployed in a large scale network environment. The 450U-E can make
use of this server reducing replication of user authentication information.
In a typical WPA-enterprise setup, the 450U-E Access point acts as Authenticator, controlling access to the network. The
other wireless 450U-E clients act as Supplicants, requesting access to the network. The Authenticator communicates
with an authentication (RADIUS) server on the Ethernet network to verify Supplicant identity. When a Supplicant requests
access, it sends an access request to the Authenticator, which passes an authentication request to the external
authentication server. When the user credentials of the Supplicant are verified, the Authenticator enables network access
for the Supplicant, data encryption keys are established and network traffic can pass.
Configuration of WPA-Enterprise differs when the unit is configured as an Access point (Authenticator) or Client
(Supplicant). If WDS interfaces are used, it is possible for one 450U-E to act as both an Authenticator and a Supplicant,
however in this situation, only one set of user credentials can be entered for all Supplicants.
The 450U-E supports WPA-1 TKIP, WPA-1 AES and WPA-2 AES using a
Pre-Shared Key
(PSK).
Authenticator (AP) Configuration
RADIUS Server IP Address/Port/shared secret:
Connection information for the RADIUS Authentication Server.
Supplicant Re-authenticate Period:
Sets the maximum time at which the Supplicant must re-
authenticate. This parameter determines maximum time a client
will still have access to the network after its user credentials have
been revoked.
Enable Debug:
Must only be used during commissioning and only if requested by ELPRO Support. This must be disabled for normal
operation.
Supplicant (Client) Configuration
Username / Password:
User credentials that match a valid user on the RADIUS server.
Enable Debug:
Disabled for normal operation. Enables debug mode for use
during commissioning. To be used only if requested by ELPRO
Support.
Trusted CA certificate upload
f
the RADIUS server during the authentication process.
Supported EAP method - PEAP / MSCHAPv2
Certificate Verification result:
Once a certificate has been loaded, this text box will contain validation information for the certificate. If this text is blank or
contains errors, the certificate is invalid.
Trusted CA Certificate Contents:
.Displays the contents of the loaded certificate
Figure 33 - WPA Enterprise Authenticator
Figure 34 - WPA Enterprise Supplicant