User's Guide

Table Of Contents
hwc_vnsintro.fm
Virtual Network Services concepts
Authentication for a VNS
9034530-02,
March 2010
HiPath Wireless Controller, Access Points and Convergence Software V7.11, User Guide 235
If a specific filter ID is not defined or returned by the access-accept packet
operation, the HiPath Wireless Controller assigns the VNS' default policy for
authenticated users.
5.5.1 Authentication with Captive Portal
Four authentication types are supported for Captive Portal authentication:
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol (CHAP)
Windows-specific version of CHAP (MS CHAP)
MS CHAP v2 (Windows-specific version of CHAP, version 2)
For Captive Portal authentication, the RADIUS server must support the selected
authentication type: PAP, CHAP (RFC2484), MS-CHAP (RFC2433), or MS-
CHAPv2 (RFC2759).
5.5.2 Authentication with 802.1x and WPA
If the applied WLAN Service is configured with WPA privacy, the wireless device
user requesting network access must first be authenticated. The wireless
device's client utility must support 802.1x. The user's request for network access
along with login identification or a user profile is forwarded by the HiPath Wireless
Controller to a RADIUS server. The HiPath Wireless Controller, Access Points
and Convergence Software system supports the following authentication types:
Extensible Authentication Protocol - Transport Layer Security (EAP-
TLS) – Relies on client-side and server-side certificates to perform
authentication. Can be used to dynamically generate a Pairwise Master Key
for encryption.
Extensible Authentication Protocol with Tunneled Transport Layer
Security (EAP-TTLS) – Relies on mutual authentication of client and server
through an encrypted tunnel. Unlike EAP-TLS, it requires only server-side
certificates. The client uses PAP, CHAP, or MS-CHAPv2 for authentication.
Protected Extensible Authentication Protocol (PEAP) – Is an
authentication protocol similar to TTLS in its use of server side certificates for
server authentication and privacy and its support for a variety of user
authentication mechanisms.
For EAP-SIM and EAP-FAST, the RADIUS server must support RADIUS
extensions (RFC2869).