Non-Juniper 802.1X Supplicant Configuration Overview - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INFRANET CONTROLLER GUIDE REV 01 Manual

Configuring infranet controllers guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INFRANET CONTROLLER GUIDE REV 01:
Table of Contents

Advertisement

Related
Documentation

Non-Juniper 802.1X Supplicant Configuration Overview

Copyright © 2010, Juniper Networks, Inc.
Chapter 8: Configuring the Infranet Controller RADIUS Server and Layer 2 Access
To use an Infranet Enforcer as an 802.1X RADIUS client of the Infranet Controller:
Configure a location group policy for the Infranet Enforcer:
1.
Create a sign-in policy that you want to associate with the location group. See
a.
"Configuring Sign-In Policies (NSM Procedure)."
Create a location group and select the sign-in policy you want to associate with
b.
the location group. See "Configuring Location Groups (NSM Procedure)."
Associate the location group with the Infranet Enforcer:
2.
Click the Device Tree tab, and then double-click the Infranet Controller device for
a.
which you want to use the Infranet Enforcer as a RADIUS Client.
Click the Configuration tab. In the configuration tree, select UAC > Infranet Enforcer
b.
> Connection.
Select an existing Infranet Enforcer connection and click the Edit button.
c.
Select the location group that you want to associate with the Infranet Enforcer.
d.
Click one:
e.
OK—Saves the changes.
Cancel—Cancels the modifications.
Configure authenticated endpoints to connect to the Infranet Controller, and specify
3.
VLANs in RADIUS attributes policies. See "Configuring RADIUS Attributes Policies
(NSM Procedure)."
Configuring Location Groups (NSM Procedure) on page 76
Configuring RADIUS Clients (NSM Procedure) on page 77
Configuring a New RADIUS Vendor (NSM Procedure) on page 78
You can configure users to authenticate to the Infranet Controller using Odyssey Access
Client, or you can use a non-Juniper 802.1X supplicant. Odyssey Access Client is
preconfigured with standard protocols to work with the Infranet Controller. To use a
non-Juniper supplicant, you must configure the authentication protocols manually. A
non-Juniper supplicant is any client that is configured without the JUAC protocol.
To configure a non-Juniper supplicant:
Configure authentication protocols on the third-party supplicant per the instructions
1.
in the vendor's documentation.
Configure corresponding protocols on the Infranet Controller. See "Configuring
2.
Authentication Protocol Sets (NSM Procedure)."
85

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INFRANET CONTROLLER GUIDE REV 01 and is the answer not in the manual?

Table of Contents