Using The Built-In Sentriant Ag Radius Server For Authentication; Enabling Sentriant Ag For 802.1X; Sentriant Ag User Interface Configuration - Extreme Networks Sentriant AG Software User's Manual

Version 5.2
Hide thumbs Also See for Sentriant AG:
Table of Contents

Advertisement

802.1X Quarantine Method
4 Test the RADIUS server proxy:
radtest <user> <passwd> <radius-server[:port]> <nas-port-number><secret>

Using the Built-in Sentriant AG RADIUS Server for Authentication

If you selected the Manual End-user authentication method in the Authentication settings area of the
System configuration>>Quarantining>>802.1X window, configure Sentriant AG according to the
instructions in this section.
To configure Sentriant AG to handle RADIUS requests:
Add users to the RADIUS server by modifying the
file. Add user entries to the
/etc/raddb/users
beginning of the file in the following format:
Clear text authentication:
<user name> Auth-Type := Local, User-Password =="password"
EAP, PEAP, or MD5-Challenge authentication (the built-in windows 802.1X supplicant uses these
methods):
<user name> Auth-Type := EAP, User-Password =="password"
For example:
dave Auth-Type := EAP, User-Password =="d@9ij8!e"

Enabling Sentriant AG for 802.1X

To enable Sentriant AG for use in an 802.1X network, you need to select it in the user interface, and
make a few changes to the properties using JMS and an XML file.

Sentriant AG User Interface Configuration

To enable 802.1X in the Sentriant AG user interface:
Home window>>System configuration>>Quarantining
284
Sentriant AG Software Users Guide, Version 5.2

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sentriant ag 5.2

Table of Contents