Specifications
xxvii
Example............................................................................................................................................ 19-3
Configuring 802.1X Key Transmission Time Intervals ............................................................................19-3
Examples..........................................................................................................................................19-3
Managing WEP Keys ..............................................................................................................................19-4
Configuring 802.1X WEP Rekeying..................................................................................................19-4
Examples ...................................................................................................................................19-4
Configuring the Interval for WEP Rekeying ......................................................................................19-4
Example .....................................................................................................................................19-4
Setting EAP Retransmission Attempts ..........................................................................................................19-5
Examples ................................................................................................................................................19-5
Managing 802.1X Client Reauthentication ....................................................................................................19-5
Enabling and Disabling 802.1X Reauthentication ...................................................................................19-5
Example............................................................................................................................................ 19-5
Setting the Maximum Number of 802.1X Reauthentication Attempts .....................................................19-6
Examples..........................................................................................................................................19-6
Setting the 802.1X Reauthentication Period ...........................................................................................19-6
Examples..........................................................................................................................................19-6
Setting the Bonded Authentication Period ..............................................................................................19-7
Managing Other Timers.................................................................................................................................19-7
Setting the 802.1X Quiet Period..............................................................................................................19-7
Examples..........................................................................................................................................19-7
Setting the 802.1X Timeout for an Authorization Server.........................................................................19-8
Examples..........................................................................................................................................19-8
Setting the 802.1X Timeout for a Client ..................................................................................................19-8
Examples..........................................................................................................................................19-8
Displaying 802.1X Information.......................................................................................................................19-8
Viewing 802.1X Clients ...........................................................................................................................19-9
Viewing the 802.1X Configuration...........................................................................................................19-9
Viewing 802.1X Statistics......................................................................................................................19-10
Chapter 20: Configuring SODA Endpoint Security for a RoamAbout Switch
About SODA Endpoint Security.....................................................................................................................20-1
SODA Endpoint Security Support on RoamAbout Switches...................................................................20-2
How SODA Functionality Works on RoamAbout Switches .....................................................................20-2
Configuring SODA Functionality....................................................................................................................20-4
Configuring Web Portal WebAAA for the Service Profile ........................................................................20-4
Creating the SODA Agent with SODA Manager .....................................................................................20-5
Copying the SODA Agent to the RoamAbout Switch..............................................................................20-6
Example............................................................................................................................................ 20-6
Installing the SODA Agent Files on the RoamAbout Switch ................................................................... 20-6
Example............................................................................................................................................ 20-6
Enabling SODA Functionality for the Service Profile ..............................................................................20-7
Example............................................................................................................................................ 20-7
Disabling Enforcement of SODA Agent Checks .....................................................................................20-7
Example............................................................................................................................................ 20-7
Specifying a SODA Agent Success Page ...............................................................................................20-8
Example............................................................................................................................................ 20-8
Specifying a SODA Agent Failure Page..................................................................................................20-8
Examples..........................................................................................................................................20-8
Specifying a Remediation ACL ...............................................................................................................20-9
Example............................................................................................................................................ 20-9
Specifying a SODA Agent Logout Page..................................................................................................20-9
Examples........................................................................................................................................20-10