User's Manual

Table Of Contents
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access
16
To use the internal Fortress RADIUS Server
to authenticate administrators:
You must execute the commands below in the order given.
1 Enable the internal authentication server to provide local
authentication:
# set localauth
EnableLocalAuth[N] (Y|N to enable|disable local authentication server): y
Port[1812] (Port number to communicate):
SharedKey (Authentication key): authkey
Priority (Local server priority [0..999]):
RetryInterval (Time in seconds for retrying [1..600]):
EnableDevAuth[N] (Y|N to enable|disable Device authentication):
EnableUserAuth[N] (Y|N to enable|disable User Authentication):
DefaultDeviceState[pending] (pending|allow|deny):
DefaultMaxRetries[3] (Maximum attempts at reaching server before failover 1-30, default is 3):
DefaultIdleTimeout[30] (User idle timeout in minutes 1-720, default is 30):
DefaultSessionTimeout
(Authentication timeout in minutes, 1-200, default is 30)
:
EnableAdminAuth[N] (Y|N to enable|disable administrator authentication): y
Enable8021xAuth[N] (Y|N to enable|disable 802.1x authentication):
EnableEAP-MD5 (Y|N to enable|disable support for EAP-MD5 protocol):
EnableEAP-TLS (Y|N to enable|disable support for EAP-TLS protocol):
EnableCRLCheck[N] (Y|N to enable|disable CRL check):
EnableOcsp[N] (Y|N to enable|disable OCSP):
OcspUrl[""] (URL of OCSP responder):
EnableOcspNonce[Y] (Y|N to enable|disable OCSP nonce):
CaCertUrl[""] (URL of CA certificate or chain):
LdapSB[""] (Search base for CA certificate or chain (LDAP only)):
TLSCipherSuite (all|legacy|suite-b to set supported cipher suite for EAP-TLS):
For help with other set localauth command options,
refer to Section 4.5.2.
2 Verify that authentication failback is at the default setting of
enable, and if it is disabled, enable it:
#
set account -authMethod radius -accountAuthFailback enable
For help with other set account command options, refer
to the rest of this section.
3 Add an account for each administrator you want to be able
to authenticate through the internal authentication server:
# add userauth -name
<admin>
-passwd
<userpw>
-passwordConfirm
<userpw>
-adminauth administrator|maintenance|logviewer
The password must conform to the password requirements
currently in effect.
-name must match that of the
administrative account for which you are configuring the
internal RADIUS account.
-adminauth must correctly
identify that account’s administrative role.
For help with other
add userauth command options, refer
to Section 4.5.3.