Specifications

AAA Tools for Network Users
17-12 Configuring AAA for Network Users
Ways a RoamAbout Switch Can Use EAP
Networkuserswith802.1Xsupportcannotaccessthenetworkunlesstheyareauthenticated.You
canconfigureaRoamAboutswitchtoauthenticateuserswithEAPonagrou pofRADIUSservers
and/orinalocaluserdatabaseontheRoamAboutswitch,ortooffloadsomeauthenticationtasks
fromtheservergroup.Table 17
2detailsthesethreebasicRoamAboutswitchauthentication
approaches.
(Forinformationaboutdigitalcertificates,seeChapter 16,ManagingKeysandCertificates.)
Effects of Authentication Type on Encryption Method
Wirelessuserswhoareauthenticatedonanencryptedservicesetidentifier(SSID)canhavetheir
datatrafficen cryptedbythefollowingmethods:
•WiFiProtectedAccess(WPA)encryption
•NonWPAdynamicWiredEquivalentPrivacy(WEP)encry ption
•NonWPAstaticWEPencryption
(Forencryptiondetails,seeChapter 10,ConfiguringUserEncryption.)
Theauthentication
methodyouassigntoauserdeterminestheencryptionavailabletotheuser.
UsersconfiguredforEAPauthentication,MACauthentication,Web,orlastresortauthentication
canhavetheirtrafficencryptedasfollows:
Table 17-2 Three Basic RoamAbout switch Approaches to EAP Authentication
Approach Description
Pass-through An EAP session is established directly between the client and RADIUS server, passing
through the RoamAbout switch. User information resides on the server. All authentication
information and certificate exchanges pass through the switch or use client certificates
issued by a certificate authority (CA). In this case, the switch does not need a digital
certificate, although the client might.
Local The RoamAbout switch performs all authentication using information in a local user
database configured on the switch, or using a client-supplied certificate. No RADIUS
servers are required. In this case, the switch needs a digital certificate. If you plan to use
the EAP with Transport Layer Security (EAP-TLS) authentication protocol, the clients also
need certificates.
Offload The RoamAbout switch offloads all EAP processing from a RADIUS server by
establishing a TLS session between the switch and the client. In this case, the switch
needs a digital certificate. When you use offload, RADIUS can still be used for non-EAP
authentication and authorization.
EAP Authentication MAC Authentication Last-Resort Authentication WebAAA
WPA encryption Static WEP Static WEP Static WEP
Dynamic WEP
encryption
No encryption
(if SSID is unencrypted)
No encryption
(if SSID is unencrypted)
No encryption
(if SSID is
unencrypted)