3Com WX4400 Command Reference Manual page 238

Wireless lan switch and controller
Hide thumbs Also See for WX4400:
Table of Contents

Advertisement

238
C
8: AAA C
HAPTER
OMMANDS
Provides encryption and integrity checking for the connection
Cannot be used with RADIUS server authentication (requires user
information to be in the switch's local database)
peap-mschapv2
Handshake Authentication Protocol version 2 (MS-CHAP-V2). For
wireless clients:
Uses TLS for encryption and data integrity checking and server-side
authentication
Provides MS-CHAP-V2 mutual authentication
Only the server side of the connection needs a certificate.
The wireless client authenticates using TLS to set up an encrypted
session. Then MS-CHAP-V2 performs mutual authentication using
the specified AAA method.
pass-through
RADIUS server.
EAP-MD5 does not work with Microsoft wired authentication clients.
method1, method2, method3, method4
methods that MSS uses to handle authentication. Specify one or more
of the following methods in priority order. MSS applies multiple
methods in the order you enter them.
A method can be one of the following:
— Uses the local database of usernames and user groups on
local
the WX switch for authentication.
server-group-name
for authentication. You can enter up to four names of existing
RADIUS server groups as methods.
RADIUS servers cannot be used with the EAP-TLS protocol.
For more information, see "Usage."
Defaults — By default, authentication is unconfigured for all clients with
network access through MAP ports or wired authentication ports on the
WX switch. Connection, authorization, and accounting are also disabled
for these users.
Bonded authentication is disabled by default.
— Protected EAP (PEAP) with Microsoft Challenge
— MSS sends all the EAP protocol processing to a
— Uses the defined group of RADIUS servers
— At least one and up to four

Advertisement

Table of Contents
loading

Table of Contents