User Guide

Table Of Contents
442 Configuring AAA for Network Users
320657-A
Authentication Process for 802.1X Users of a Third-Party AP
1 WSS Software uses MAC authentication to authenticate the AP.
2 The user contacts the AP and negotiates the authentication protocol to be used.
3 The AP, acting as a RADIUS client, sends a RADIUS request to the WSS.
4 The AP uses 802.1X to authenticate the user, using the WSS as its RADIUS server. The WSS proxies
RADIUS requests from the AP to a real RADIUS server, depending on the authentication method
specified in the proxy authentication rule for the user.
5 After successful RADIUS authentication of the user, WSS Software assigns authorization attributes to the
user from the RADIUS servers access-accept response.