User's Manual
Configuring the Wireless AP
hwc_apstartup.fm
Configuring Wireless AP settings
A31003-W1050-U100-2-7619
, March 2008
120 HiPath Wireless Controller, Access Points and Convergence Software V5 R1 , C20/C2400 User Guide
•Serial – The serial number of the Wireless AP. The Wireless AP serial
number cannot be edited.
•MAC – The MAC address of the Wireless AP. The Wireless AP MAC
address cannot be edited.
•Other – Click to specify a custom value. A text box is displayed. In the text
box, type the value you want to assign as the username credential.
5. In the Password drop-down list, click the value you want to assign as the
password credential:
•Name – The name of the Wireless AP, which is assigned on the AP
Properties tab. The Wireless AP name can be edited.
•Serial – The serial number of the Wireless AP. The Wireless AP serial
number cannot be edited.
•MAC – The MAC address of the Wireless AP. The Wireless AP MAC
address cannot be edited.
•Other – Click to specify a custom value. A text box is displayed. In the text
box, type the value you want to assign as the password credential.
6. To save your changes, click Save.
The 802.1x PEAP authentication configuration is assigned to the Wireless
AP. The Wireless AP can now be deployed to a 802.1x enabled switch port.
4.5.5.2 Configuring 802.1x EAP-TLS authentication
EAP-TLS authentication uses certificates for authentication. A third-party
Certificate Authentication application is required to configure EAP-TLS
authentication. Certificates can be overwritten with new ones at any time.
With EAP-TLS authentication, the HiPath Wireless Controller can operate in
either proxy mode or pass through mode.
Note: When a Wireless AP configured with 802.1x EAP-TLS authentication is
connected to a HiPath Wireless Controller, the Wireless AP begins submitting
logs to the HiPath Wireless Controller 30 days before the certificate expires to
provide administrators with a warning of the impending expiry date.
Proxy mode
In proxy mode, HiPath Wireless Controller generates the public and private key
pair used in the certificate. You can specify the criteria used to create the
Certificate Request. The Certificate Request that is generated by the HiPath
Wireless Controller is then used by the third-party Certificate Authentication
application to create the certificate used for authentication of the Wireless AP. To