Download Print this page

Defining The Radius Configuration - Extreme Networks Summit WM3000 Series Reference Manual

Summit wm3000 series controller system software version 4.0

Advertisement

privileges). No secondary authentication source is specified. However, Extreme Networks recommends
using an external Radius Server as the primary authentication source and the local controller Radius
Server as the secondary user authentication source. For information on configuring an external Radius
Server, see
"Configuring External Radius Server Support" on page
133. For instructions on how to
configure the controller's local Radius Server, see
"Defining the Radius Configuration" on page
399.
If an external Radius server is configured as the controller's primary user authentication source and the
controller's local Radius Server is defined as an alternate method, the controller first tries to
authenticate users using the external Radius Server. If an external Radius Server is unreachable, the
controller reverts to the local Server's user database to authenticate users. However, if the external
Radius server is reachable but rejects the user or if the user is not found in the external Server's
database, the controller will not revert to the local Radius Server and the authentication attempt fails.
If the controller's local Radius Server is configured as the primary authentication method and an
external Radius Server is configured as an alternate method, the alternate external Radius Server will
not be used as an authentication source if a user does not exist in the local Server's database, since the
primary method has rejected the authentication attempt.

Defining the Radius Configuration

To configure Radius support on the controller:
1 Select Security > Radius Server from the main menu.
2 Ensure the Configuration tab is selected.
Summit WM3000 Series Controller System Reference Guide
399

Hide quick links:

Advertisement

loading

This manual is also suitable for:

Summit wm3600Summit wm3700