beautypg.com

B&B Electronics WLNN-AN(ER,SE,SP.EK)-DP551 - Manual User Manual

Page 60

background image

60

Airborne Enterprise CLI Reference Manual

The implementation of WPA2-Enterprise is more complex and requires not only
configuration of the device but, in most cases, delivery of certificates and private
keys as well. These are small (2K-6K files) that the client uses to authenticate
with an infrastructures‟ RADIUS server. For the different EAP processes to work
it is required to define which process and underlying encryption methods to use,
along with identification of the appropriate certificates and private keys. Each
EAP process has a different requirement. Although they utilize the same
common elements, each treats the authentication process differently and
accordingly requires the credentials to be presented in a particular way.

The certificates are typically owned and generated by the Information
Technology (IT) department of the organization that owns the infrastructure. The
certificates have standard formats. It is critical to make sure that all certificates
are in the appropriate format for the client to utilize.

Since there are different configuration requirements for each EAP process the
following tables (Table 16, Table 17 and Table 18) identify the typical
requirements for implementing each type when using a certificate type other than
.P12 and .PFX.