Example 2: Ieee 802.1X With An External Radius Server - Black Box SmartPath LWN602A User Manual

Smartpath enterprise wireless system
Hide thumbs Also See for SmartPath LWN602A:
Table of Contents

Advertisement

Port: Type the port number that the SmartPath AP uses to connect to the HTTP proxy server.
Authenticate the SmartPath AP on the HTTP proxy server: Select this checkbox if the HTTP proxy server requires connections to be
authenticated. Selecting this checkbox activates the user name and password fields.
User Name: Enter the user name that the SmartPath AP submits to authenticate itself to the HTTP proxy server.
Password: Enter the password that the SmartPath AP submits to the HTTP proxy server along with its user name.
Upgrade SmartPath OS Firmware
You can use the NetConfig UI to update the SmartPath OS firmware running on the SmartPath AP. First, download the latest
SmartPath OS image for your SmartPath AP from the Black Box Support site and save it to your local workstation. After that, log
in to the NetConfig UI, click "Upgrade SmartPath OS Software," enter the following, and then click "Apply:"
Image File: Click "Browse," navigate to the image file, select it, and then click "Open."
If you want to activate the new image automatically, select "Activate after" and enter the number of seconds that you want the
SmartPath AP to wait before rebooting. The default wait is 300 seconds (five minutes).
If you do not want the SmartPath AP to activate the firmware automatically, select "Activate at next reboot." If you select this
option, the SmartPath AP loads the new firmware the next time it boots up.

9.2 Example 2: IEEE 802.1x with an External RADIUS Server

You can configure SmartPath APs to act as RADIUS authenticators, also known as RADIUS clients or network access server (NAS)
devices. They forward IEEE 802.1X/EAP user authentication requests and responses between wireless supplicants and up to four
RADIUS authentication servers (a primary and three backups). In this example, you configure two SmartPath APs to act as RADIUS
authenticators. They provide network access to wireless clients/RADIUS supplicants and pass authentication requests between the
supplicants and a RADIUS authentication server.
NOTE: This example makes several assumptions about the RADIUS authentication server: (1) user accounts are already stored on it;
(2) it listens on UDP port 1812 for authentication requests; (3) it uses "t6bEdmNfot3vW9vVr6oAz48CNCsDtInd" as its
shared secret; (4) it allows RADIUS authentication requests from NAS devices in the 10.1.1.0/24 subnet. For configuration
details, consult the product documentation for your RADIUS server.
You also configure an SSID that makes use of IEEE 802.1X/EAP authentication on the SmartPath AP authenticators. Because an
SSID using 802.1X/EAP authentication can support numerous user profiles, the example shows how two groups of users—
employees and IT staff—can access the same SSID but be assigned to two different VLANs. See Figure 9-6.
Chapter 9: Common Configuration Examples
724-746-5500 | blackbox.com
Page 113

Advertisement

Table of Contents
loading

Table of Contents