Radius; Client Name In Local Mac Authentication List - D-Link DWS-3000 Series Configuration Manual

Unified wired & wireless access system
Hide thumbs Also See for DWS-3000 Series:
Table of Contents

Advertisement

19

RADIUS

Making use of a single database of accessible information – as in an Authentication Server –
can greatly simplify the authentication and management of users in a large network. One such
type of Authentication Server supports the Remote Authentication Dial In User Service
(RADIUS) protocol as defined by RFC 2865.
For authenticating users prior to access, the RADIUS standard has become the protocol of
choice by administrators of large accessible networks. To accomplish the authentication in a
secure manner, the RADIUS client and RADIUS server must both be configured with the
same shared password or "secret". This "secret" is used to generate one-way encrypted
authenticators that are present in all RADIUS packets. The "secret" is never transmitted over
the network.
RADIUS conforms to a secure communications client/server model using UDP as a transport
protocol. It is extremely flexible, supporting a variety of methods to authenticate and
statistically track users. RADIUS is also extensible, allowing for new methods of
authentication to be added without disrupting existing functionality.
As a user attempts to connect to a functioning RADIUS supported network, a device referred
to as the Network Access Server (NAS) first detects the contact. For wired clients, the NAS is
the DWS-3000 switch; for wireless clients, the AP serves as the NAS. The NAS or user-login
interface then prompts the user for a name and password. The NAS encrypts the supplied
information and a RADIUS client transports the request to a pre-configured RADIUS server.
The server can authenticate the user itself, or make use of a back-end device to ascertain
authenticity. In either case a response may or may not be forthcoming to the client. If the
server accepts the user, it returns a positive result with attributes containing configuration
information. If the server rejects the user, it returns a negative result. If the server rejects the
client or the shared "secrets" differ, the server returns no result. If the server requires
additional verification from the user, it returns a challenge, and the request process begins
again.

Client Name in Local MAC Authentication List

A wireless client MAC address can be configured in the AP MAC authentication list. A user-
friendly name of up to 32 printable ASCII characters can be assigned to a client entry in the
local Client MAC Authentication list. This is a configurable parameter and persists over
switch reboots. The client name cannot be assigned to a client entry on a RADIUS server.
Client Name in Local MAC Authentication List
125

Advertisement

Table of Contents
loading

Table of Contents