Radius profiles – Proxim ORiNOCO AP-700 User Manual
Page 85

Performing Advanced Configuration
AP-700 User Guide
Radius Profiles
85
Radius Profiles
Configuring Radius Profiles on the AP allows the administrator to define a profile for RADIUS Servers used by the system or by a VLAN. The
network administrator can define
RADIUS Servers per Authentication Mode and per VLAN
The AP communicates with the RADIUS server defined in a profile to provide the following features:
•
MAC Access Control Via RADIUS Authentication
•
802.1x Authentication using RADIUS
•
RADIUS Based Management Access
allows centralized user management.
The network administrator can configure default RADIUS authentication servers to be used on a system-wide basis, or in networks with
VLANs enabled the administrator can also configure separate authentication servers to be used for MAC authentication, EAP authentication,
or Accounting in each VLAN. You can configure the AP to communicate with up to six different RADIUS servers per VLAN/SSID:
•
Primary Authentication Server (MAC-based authentication)
•
Back-up Authentication Server (MAC-based authentication)
•
Primary Authentication Server (EAP/802.1x authentication)
•
Back-up Authentication Server (EAP/802.1x authentication)
•
Primary Accounting Server
•
Back-up Accounting Server
The back-up servers are optional, but when configured, the AP will communicate with the back-up server if the primary server is off-line. After
the AP has switched to the backup server, it will periodically check the status of the primary RADIUS server every five (5) minutes. Once the
primary RADIUS server is again online, the AP automatically reverts from the backup RADIUS server back to the primary RADIUS server. All
subsequent requests are then sent to the primary RADIUS server.
You can view monitoring statistics for each of the configured RADIUS servers.
RADIUS Servers per Authentication Mode and per VLAN
The user can configure separate RADIUS authentication servers for each authentication mode and for each SSID (VLAN). For example:
•
The user can configure separate RADIUS servers for RADIUS MAC authentication and 802.1x authentication
•
The user can configure separate RADIUS servers for each VLAN: the Sales VLAN could support only WEP clients, whereas the
Marketing VLAN could support 802.1x and WEP clients.
Figure 4-32 RADIUS Servers per VLAN
This figure shows a network with separate authentication servers for each authentication type and for each VLAN. The clients in VLAN 1 are
authenticated using the authentication servers configured for VLAN 1. The type of authentication server used depends on whether the
authentication is done for an 802.1x client or a non-802.1x client. The clients in VLAN 2 are authenticated using a different set of
authentication servers configured for authenticating users in VLAN 2.