802.1X Quarantine Method
4 Test the RADIUS server proxy:
radtest <user> <passwd> <radius-server[:port]> <nas-port-number><secret>
Using the Built-in Sentriant AG RADIUS Server for Authentication
If you selected the Manual End-user authentication method in the Authentication settings area of the
System configuration>>Quarantining>>802.1X window, configure Sentriant AG according to the
instructions in this section.
To configure Sentriant AG to handle RADIUS requests:
Add users to the RADIUS server by modifying the
file. Add user entries to the
/etc/raddb/users
beginning of the file in the following format:
Clear text authentication:
<user name> Auth-Type := Local, User-Password =="password"
EAP, PEAP, or MD5-Challenge authentication (the built-in windows 802.1X supplicant uses these
methods):
<user name> Auth-Type := EAP, User-Password =="password"
For example:
dave Auth-Type := EAP, User-Password =="d@9ij8!e"
Enabling Sentriant AG for 802.1X
To enable Sentriant AG for use in an 802.1X network, you need to select it in the user interface, and
make a few changes to the properties using JMS and an XML file.
Sentriant AG User Interface Configuration
To enable 802.1X in the Sentriant AG user interface:
Home window>>System configuration>>Quarantining
284
Sentriant AG Software Users Guide, Version 5.2