User's Manual

Configuring the Wireless AP
hwc_apstartup.fm
Configuring Wireless AP settings
A31003-W1050-U100-2-7619
, March 2008
118 HiPath Wireless Controller, Access Points and Convergence Software V5 R1 , C20/C2400 User Guide
802.1x authentication credentials can be updated at any time, whether or not the
Wireless AP is connected with an active session. If the Wireless AP is connected,
the new credentials are sent immediately. If the Wireless AP is not connected, the
new credentials are delivered the next time the Wireless AP connects to the
HiPath Wireless Controller.
There are two main aspects to the 802.1x feature:
Credential management – The HiPath Wireless Controller and the Wireless
AP are responsible for the requesting, creating, deleting, or invalidating the
credentials used in the authentication process.
Authentication – The Wireless AP is responsible for the actual execution of
the EAP-TLS or PEAP protocol.
802.1x authentication can be configured on a per access point basis. For
example, 802.1x authentication can be applied to specific Wireless APs
individually or with a multi-edit function.
The 802.1x authentication supports two authentication methods:
PEAP (Protected Extensible Authentication Protocol)
Is the recommended 802.1x authentication method
Requires minimal configuration effort and provides equal authentication
protection to EAP-TLS
Uses user ID and passwords for authentication of access points
EAP-TLS
Requires more configuration effort
Requires the use of a third-party Certificate Authentication application
Uses certificates for authentication of access points
HiPath Wireless Controller can operate in either proxy mode or pass
through mode.
Proxy mode – The HiPath Wireless Controller generates the public
and private key pair used in the certificate.
Pass through mode – The certificate and private key is created by the
third-party Certificate Authentication application.
Note: Although a Wireless AP can support using both PEAP and EAP-TLS
credentials simultaneously, it is not recommended to do so. Instead, it is
recommended that only one type of authentication be used, and that only
credentials for that type of authentication get installed on the Wireless AP.