User's Guide

Table Of Contents
hwc_apstartup.fm
Configuring the Wireless AP
Configuring VLAN tags for Wireless APs
9034530-02,
March 2010
HiPath Wireless Controller, Access Points and Convergence Software V7.11, User Guide 175
9. In the third-party Certificate Authentication application, use the content of the
generated certificate request file to generate the certificate file (.cer file
extension).
10. On the 802.1x tab, click Browse. The Choose file window is displayed.
11. Navigate to the location of the certificate file, and click Open. The name of the
certificate file is displayed in the X509 DER / PKCS#12 file box.
12. To save your changes, click Save.
The 802.1x EAP-TLS (certificate and private key) authentication in proxy
mode is assigned to the Wireless AP. The Wireless AP can now be deployed
to a 802.1x enabled switch port.
Pass through mode
In pass through mode, the certificate and private key is created by the third-party
Certificate Authentication application. To successfully configure 802.1x
authentication of a Wireless AP, the Wireless AP must first be configured for
802.1x authentication before the Wireless AP is deployed on a 802.1x enabled
switch port.
Before you configure 802.1x using EAP-TLS authentication in pass through
mode, you must first create a certificate using the third-party Certificate
Authentication application and save the certificate file in PKCS #12 file format
(.pfx file extension) on your system.
To configure 802.1x EAP-TLS authentication in pass through mode:
1. From the main menu, click Wireless AP Configuration. The HiPath
Wireless AP screen is displayed.
2. In the Wireless AP list, click the Wireless AP for which you want to configure
802.1x EAP-TLS authentication.
3. Click the 802.1x tab.
4. Click Browse. The Choose file window is displayed.
5. Navigate to the location of the certificate file (.pfx) and click Open. The name
of the certificate file is displayed in the X509 DER / PKCS#12 file box.
6. In the Password box, type the password that was used to protect the private
key.
Note: The password that was used to protect the private key must be a
maximum of 31 characters long.
7. To save your changes, click Save.