843| DellPowerConnect W- Series ArubaOS 6.2 | User Guide
Figure 408: IAS RADIU S Clients
3. T o configurea RADIUS client, select Action > New RADIUS Client from the menu at the top of the window.
4. I n the New RADIUS Client dialog window, enter the name andI P addressfor the controller. Click Next.
5. I n the nextwi ndow that appears,enter and confirm a shared secret. The shared secret is configuredon bot h the
RADIUS server and client, and ensuresthat an unauthorized client cannot perform authentication against the
server.
6. Click Finis h.
Remote A ccess Policies
The IAS policy configuration definesall policies related to wireless access, includingt ime ofday restricti ons,sess ion
length,authentication t ype, andgroup-related policies. See Microsoft product documentation for detailed
descriptions and explanations of IAS policy settings.
Active Directo ry Database
The Active Directory database serves as the master authentication database for both the wired and wireless
networks.The I AS authentication server bases all authentication decisions on information in the Acti ve Directory
database. IAS is normally used as an authentication server for remote access and thus looks to t he Active Directory
“Remote Access” property to determine whetherauthenticatio n requestss houldbe allowed or denied. This property
is set on a per-user or per-computer basis. For a user or computer to be allowed access to t he wireless network,t he
remote access property must be set to “Allow access”.
The authentication policy configured in IAS depends on the group membership of the computer or user in Active
Directory. These policies are responsible for passing group information back to the controller for use in assigning
computers or usersto the correct role,whic hdetermines their network access privileges. When the IAS server
receives a requestfor authentication, it compares the request with the list of remote access policies. The first policy
to match the request is executed; additional policies are not s earched.
Configuring P olicies
The policies in this 802.1x authenticati on exampleare designed to work by examining the username portion of the
authentication request,searching the Active D irectory database for a matchingname, and then examining the group