Specifications

xxiv
Installing CA-Signed Certificates from PKCS #12 Object Files.............................................................16-13
Installing CA-Signed Certificates Using a PKCS #10 Object File (CSR) and a PKCS #7 Object File ..16-14
Chapter 17: Configuring AAA for Network Users
About AAA for Network Users .......................................................................................................................17-1
Authentication .........................................................................................................................................17-2
Authentication Types ........................................................................................................................ 17-2
Authentication Algorithm...................................................................................................................17-3
SSID Name “Any” ............................................................................................................................. 17-5
Last-Resort Processing ....................................................................................................................17-5
User Credential Requirements .........................................................................................................17-5
Authorization ...........................................................................................................................................17-6
Accounting ..............................................................................................................................................17-7
Summary of AAA Features .....................................................................................................................17-7
AAA Tools for Network Users........................................................................................................................17-8
“Globs” and Groups for Network User Classification ..............................................................................17-8
Wildcard “Any” for SSID Matching ....................................................................................................17-8
AAA Methods for IEEE 802.1X and Web Network Access .....................................................................17-8
AAA Rollover Process ......................................................................................................................17-9
Local Override Exception .................................................................................................................17-9
Remote Authentication with Local Backup .......................................................................................17-9
Example .....................................................................................................................................17-9
IEEE 802.1X Extensible Authentication Protocol Types .......................................................................17-11
Ways a RoamAbout Switch Can Use EAP ...........................................................................................17-12
Effects of Authentication Type on Encryption Method ..........................................................................17-12
Configuring 802.1X Authentication ..............................................................................................................17-13
Example ................................................................................................................................................17-13
Configuring EAP Offload.......................................................................................................................17-14
Example..........................................................................................................................................17-14
Using Pass-Through .............................................................................................................................17-14
Example..........................................................................................................................................17-14
Authenticating via a Local Database.....................................................................................................17-14
Example..........................................................................................................................................17-14
Binding User Authentication to Machine Authentication .......................................................................17-
15
Authentication Rule Requirements .................................................................................................17-15
Bonded Auth Period .......................................................................................................................17-16
Bonded Auth Configuration Example .............................................................................................17-17
Displaying Bonded Auth Configuration Information........................................................................17-17
Example ...................................................................................................................................17-17
Configuring Authentication and Authorization by MAC Address .................................................................17-19
Adding and Clearing MAC Users and User Groups Locally..................................................................17-19
Adding MAC Users and Groups .....................................................................................................17-19
Examples .................................................................................................................................17-19
Clearing MAC Users and Groups ...................................................................................................17-20
Examples .................................................................................................................................17-20
Configuring MAC Authentication and Authorization .............................................................................. 17-20
Examples........................................................................................................................................17-20
Changing the MAC Authorization Password for RADIUS .....................................................................17-21
Example..........................................................................................................................................17-21
Configuring Web Web Portal WebAAA .......................................................................................................17-22
How Web Web Portal WebAAA Works .................................................................................................17-22
Display of the Login Page...............................................................................................................17-23