3Com WL-455 manual Radius

Models: WL-455

1 81
Download 81 pages 34.4 Kb
Page 37
Image 37

„Disable—The access point does not monitor the wired network, and therefore, the radio interface does not shut down due to a broken Ethernet link. This is the default setting.

„Enable—The access point monitors the Ethernet link and shuts down radios if the link is broken.

„Host PING Enable—When enabled, the access point periodically PINGs a target host on the network to determine the status of the Ethernet link. IP settings must be configured correctly for the PING to work. When disabled, only the physical Ethernet link is checked.

„Target IP Address—Enter the IP address of the reference check target. The target must be on the Ethernet network and may not be a wireless station.

„PING Interval—Enter the time interval (in milliseconds) between PINGs to the reference target, if enabled.

„Number of retries—This is the number of failed PINGs to the reference target that the access point will accept before if shuts down the radios.

RADIUS

The RADIUS page lets you define servers to be used for authentication and accounting.

RADIUS (Remote Access Dial-In User Service) is a login authentication protocol that uses software running on a central AAA (Access, Authentication, and Accounting) server to control access to RADIUS-compliant devices on the network. There are no special settings on the access point to distinguish between the various RADIUS policies or authentication types (for example EAP-MD5, EAP-TLS, EAP-TTLS). These policies are setup and controlled on the AAA server. Note that for most RADIUS software packages, the access point is actually called the “RADIUS client” and has a shared secret or secret key corresponding to the RADIUS setup page (see KEY parameter below).

The access point can send connection parameters to a RADIUS server, as well as statistics for accounting purposes. The access point is compatible with RFC2866 (the RADIUS Accounting specification).

Configuring a secondary RADIUS server provides a backup in case the primary server fails. The access point uses the secondary server if a failure is detected in the primary server. Once the access point switches over to the secondary authentication server, it periodically attempts to establish communication again with the primary authentication server. Once communication is established, the secondary authentication server reverts back to a backup server.

31

Page 37
Image 37
3Com WL-455 manual Radius