Specifications

xxvi
Viewing Local Accounting Records.......................................................................................................17-57
Viewing Roaming Accounting Records .................................................................................................17-57
Example..........................................................................................................................................17-57
Displaying the AAA Configuration ...............................................................................................................17-60
Example ................................................................................................................................................17-60
Avoiding AAA Problems in Configuration Order ..........................................................................................17-61
Using the Wildcard “Any” as the SSID Name in Authentication Rules..................................................17-61
Example ................................................................................................................................................17-61
Using Authentication and Accounting Rules Together..........................................................................17-62
Configuration Producing an Incorrect Processing Order ................................................................17-62
Configuration for a Correct Processing Order ................................................................................17-62
Example ...................................................................................................................................17-62
Configuring a Mobility Profile.......................................................................................................................17-63
Examples ..............................................................................................................................................17-63
Network User Configuration Scenarios .......................................................................................................17-64
General Use of Network User Commands............................................................................................17-65
Enabling RADIUS Pass-Through Authentication ..................................................................................17-66
Enabling PEAP-MS-CHAP-V2 Authentication ......................................................................................17-67
Enabling PEAP-MS-CHAP-V2 Offload..................................................................................................17-67
Combining EAP Offload with Pass-Through Authentication .................................................................17-68
Overriding AAA-Assigned VLANs .........................................................................................................17-68
Chapter 18: Configuring Communication with RADIUS
RADIUS Overview .........................................................................................................................................18-1
Before You Begin ..........................................................................................................................................18-2
Configuring RADIUS Servers ........................................................................................................................18-3
Configuring Global RADIUS Defaults......................................................................................................18-4
Examples..........................................................................................................................................18-4
Setting the System IP Address as the Source Address ..........................................................................18-4
Configuring Individual RADIUS Servers..................................................................................................18-5
Examples..........................................................................................................................................18-5
Deleting RADIUS Servers .......................................................................................................................18-5
Configuring RADIUS Server Groups .............................................................................................................18-6
Creating Server Groups ..........................................................................................................................18-6
Example............................................................................................................................................ 18-6
Ordering Server Groups ...................................................................................................................18-6
Configuring Load Balancing .............................................................................................................18-7
Example............................................................................................................................................ 18-7
Adding Members to a Server Group.................................................................................................18-7
Example............................................................................................................................................ 18-8
Deleting a Server Group .........................................................................................................................18-9
Example............................................................................................................................................ 18-9
RADIUS and Server Group Configuration Scenario......................................................................................18-9
Chapter 19: Managing 802.1X on the RoamAbout Switch
Managing 802.1X on Wired Authentication Ports..........................................................................................19-1
Enabling and Disabling 802.1X Globally .................................................................................................19-2
Example............................................................................................................................................ 19-2
Setting 802.1X Port Control ....................................................................................................................19-2
Examples..........................................................................................................................................19-2
Managing 802.1X Encryption Keys ...............................................................................................................19-3
Enabling 802.1X Key Transmission ........................................................................................................19-3