Alcatel-Lucent IAP93 Betriebsanweisung Seite 148

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 335
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 147
To configure an LDAP server:
(Instant Access Point)(config)# wlan ldap-server <profile-name>
(Instant Access Point)(LDAP Server <profile-name>)# ip <IP-address>
(Instant Access Point)(LDAP Server <profile-name>)# port <port>
(Instant Access Point)(LDAP Server <profile-name>)# admin-dn <name>
(Instant Access Point)(LDAP Server <profile-name>)# admin-password <password>
(Instant Access Point)(LDAP Server <profile-name>)# base-dn <name>
(Instant Access Point)(LDAP Server <profile-name>)# filter <filter>
(Instant Access Point)(LDAP Server <profile-name>)# key-attribute <key>
(Instant Access Point)(LDAP Server <profile-name>)# timeout <seconds>
(Instant Access Point)(LDAP Server <profile-name>)# retry-count <number>
(Instant Access Point)(LDAP Server <profile-name>)# end
(Instant Access Point)# commit apply
To configure a CPPM server used for AirGroup CoA (Change of Authorization):
(Instant Access Point)(config)# wlan auth-server <profile-name>
(Instant Access Point)(Auth Server <profile-name>)# ip <IP-address>
(Instant Access Point)(Auth Server <profile-name>)# key <key>
(Instant Access Point)(Auth Server <profile-name> # cppm-rfc3576-port <port>
(Instant Access Point)(Auth Server <profile-name>)# cppm-rfc3576-only
(Instant Access Point)(Auth Server <profile-name>)# end
(Instant Access Point)# commit apply
Configuring Dynamic RADIUSProxy Parameters
The RADIUS server can be deployed at different locations and VLANs. In most cases, a centralized RADIUSor
local server is used to authenticate users. However, some user networks can use a local RADIUS server for
employee authentication and a centralized RADIUS based Captive portal server for guest authentication. To ensure
that the RADIUS traffic is routed to the required RADIUS server, the dynamic RADIUSproxy feature must be
enabled.
If the OAW-IAP clients need to authenticate to the RADIUS servers through a different IP address and VLAN,
ensure that the following steps are completed:
1. Enable dynamic RADIUSproxy.
2. Configure dynamic RADIUSproxy IP, VLAN. netmask, gateway for each authentication server.
3. Associate the authentication servers to SSID or a wired profile to which the clients connect.
After completing the above-mentioned configuration steps, you can authenticate the SSID users against the
configured dynamic RADIUSproxy parameters.
Enabling Dynamic RADIUS Proxy
You can enable RADIUS Server Support using AOS-W Instant UI or CLI.
In the AOS-W Instant UI
To enable RADIUS server support:
1. In the AOS-W Instant main window, click the System link. The System window is displayed.
2. In the General tab of System window, select Enabled from the Dynamic RADIUS Proxy drop-down list.
3. Click OK.
When dynamic RADIUS proxy is enabled, ensure that a static Virtual Controller IP is configured. For more
information on configuring Virtual Controller IP address, see Virtual Controller IP Address Configuration on page
83.
When dynamic RADIUS proxy is enabled, the Virtual Controller network uses the IP Address of the Virtual
AOS-W Instant 6.3.1.1-4.0 | User Guide Authentication | 148
Seitenansicht 147
1 2 ... 143 144 145 146 147 148 149 150 151 152 153 ... 334 335

Kommentare zu diesen Handbüchern

Keine Kommentare