442 Configuring AAA for Network Users
Authentication Process for 802.1X Users of a Third-Party AP
1
WSS Software uses MAC authentication to authenticate the AP.
2
The user contacts the AP and negotiates the authentication protocol to be used.
3
The AP, acting as a RADIUS client, sends a RADIUS request to the WSS.
4
The AP uses 802.1X to authenticate the user, using the WSS as its RADIUS server. The WSS proxies
RADIUS requests from the AP to a real RADIUS server, depending on the authentication method
specified in the proxy authentication rule for the user.
5
After successful RADIUS authentication of the user, WSS Software assigns authorization attributes to the
user from the RADIUS server's access-accept response.
320657-A