User's Guide

Table Of Contents
Configuring the Wireless AP
hwc_apstartup.fm
Configuring VLAN tags for Wireless APs
9034530-02, March 2010
170 HiPath Wireless Controller, Access Points and Convergence Software V7.11, User Guide
4.5.1 Setting up 802.1x authentication for a Wireless
AP
802.1x is an authentication standard for wired and wireless LANs. The 802.1x
standard can be used to authenticate access points to the LAN to which they are
connected. 802.1x support provides security for network deployments where
access points are placed in public spaces.
To successfully set up 802.1x authentication of a Wireless AP, the Wireless AP
must be configured for 802.1x authentication before the Wireless AP is connected
to a 802.1x enabled switch port.
Caution: If the switch port, to which the Wireless AP is connected to, is not
802.1x enabled, the 802.1x authentication will not take effect.
802.1x authentication credentials can be updated at any time, whether or not the
Wireless AP is connected with an active session. If the Wireless AP is connected,
the new credentials are sent immediately. If the Wireless AP is not connected, the
new credentials are delivered the next time the Wireless AP connects to the
HiPath Wireless Controller.
There are two main aspects to the 802.1x feature:
Credential management – The HiPath Wireless Controller and the Wireless
AP are responsible for the requesting, creating, deleting, or invalidating the
credentials used in the authentication process.
Authentication – The Wireless AP is responsible for the actual execution of
the EAP-TLS or PEAP protocol.
802.1x authentication can be configured on a per access point basis. For
example, 802.1x authentication can be applied to specific Wireless APs
individually or with a multi-edit function.
The 802.1x authentication supports two authentication methods:
PEAP (Protected Extensible Authentication Protocol)
Is the recommended 802.1x authentication method
Requires minimal configuration effort and provides equal authentication
protection to EAP-TLS
Uses user ID and passwords for authentication of access points
EAP-TLS
Requires more configuration effort
Requires the use of a third-party Certificate Authentication application