Authentication Process For 802.1X Users Of A Third-Party Ap - Nortel 2300 Series Configuration Manual

Wlan security switch
Hide thumbs Also See for 2300 Series:
Table of Contents

Advertisement

442 Configuring AAA for Network Users

Authentication Process for 802.1X Users of a Third-Party AP

1
WSS Software uses MAC authentication to authenticate the AP.
2
The user contacts the AP and negotiates the authentication protocol to be used.
3
The AP, acting as a RADIUS client, sends a RADIUS request to the WSS.
4
The AP uses 802.1X to authenticate the user, using the WSS as its RADIUS server. The WSS proxies
RADIUS requests from the AP to a real RADIUS server, depending on the authentication method
specified in the proxy authentication rule for the user.
5
After successful RADIUS authentication of the user, WSS Software assigns authorization attributes to the
user from the RADIUS server's access-accept response.
320657-A

Advertisement

Table of Contents
loading

Table of Contents