Motorola WS5100 Series Reference Manual page 122

Hide thumbs Also See for WS5100 Series:
Table of Contents

Advertisement

4-40 WS5100 Series Switch System Reference Guide
g. Once the location and settings for the advanced hotspot configuration have been defined, click the
Install
6. Refer to the
accessed by the Hotspot user without authentication.
NOTE: In certain instances, an associated MU may not be able to ping the host within the
hotspot. For instance, a hotspot supported WLAN is enabled. Within the Allowed List, a
network (157.235.95.0) is added, an MU is associated, and an IP address is obtained for
the MU. The MU is then unsuccessful in pinging the host IP address (157.235.95.54) from
within the hotspot. Consequently, the Allowed List should be used for host IPs only.
7. Refer to the
messages if something goes wrong in the transaction between the applet and the switch.
8. Click
OK
to use the changes to the running configuration and close the dialog.
9. Click
Cancel
Configuring MAC Authentication
The MAC Authentication option allows the user to configure a Radius server for user authentication with the
range of MAC addressees defined as allowed or denied access to the switch managed network.
NOTE: As part of the MAC Authentication process, ensure a primary and optional
secondary Radius Server have been properly configured to authenticate the users
requesting access to the ACL supported WLAN. For more information on configuring
Radius Server support for the Dynamic MAC ACL supported WLAN, see
External Radius Server Support on page
Configuring External Radius Server Support
If either the EAP 802.1x, Hotspot or Dynamic MAC ACL options have been selected as an authentication
scheme for a WLAN, the
becomes enabled. The Radius Configuration screen provides users the option of defining an external primary
and secondary Radius Server as well as a NAC Server if you do not use the switch's resident Radius Server.
NOTE: If using the switch's local Radius Server for user authentication instead of an
external primary or secondary Radius Server, see
6-67. The switch's local Radius Server provides an easy setup option and offers a high
degree of security and accountability.
The switch ships with a default configuration defining the local Radius Server as the primary authentication
source (default users are admin with superuser privileges and operator with monitor privileges). No
secondary authentication source is specified. However, Motorola recommends using an external Radius
Server as the primary user authentication source and the local switch Radius Server as the secondary user
authentication source. To use an external Radius Server as either a primary or secondary authentication
source, it must be specified appropriately.
CAUTION: If using an external Radius Server as the primary authentication source and no
secondary source is specified (either external or local), all users attempting to access the
switch managed network will be granted access if the primary server becomes
unreachable.
button to use the hotspot configuration with the switch.
field, and enter any IP address (for internal or external Web sites) that may be
Allow List
Status
field for the current state of the requests made from applet. This field displays error
to close the dialog without committing updates to the running configuration.
Radius Config...
4-40.
button at the bottom of the Network > Wireless LANs > Edit
Configuring the Radius Server on page
Configuring

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents