296CHAPTER 7: CONFIGURING AUTHENTICATION, AUTHORIZATION, AND ACCOUNTING PARAMETERS

3Click 802.1X Policy at the top of the Create 802.1X Network Access wizard. The 802.1X Policy page appears. Go to step 5.

4Click Authentication at the top of the wizard to display the following page. (The page contents are the same for MAC, last-resort, and WebAAA.)

5To enable this authentication rule for the SSID, select Enabled. By default, a rule you configure in 3WXM is disabled, which means 3WXM does not add the rule to a WX switch’s configuration.

6For 802.1X authentication only, to bind authentication of the user with authentication of the user’s machine, select Enable Bonded Authentication.

When this option is enabled, the user can be successfully authenticated only if the machine the user is logging on from has already been authenticated and is therefore a known and trusted device.

7For 802.1X authentication only, select one of the following as the EAP type:

„EAP-MD5— Extensible Authentication Protocol (EAP) with message-digest algorithm 5. Select this protocol for wired authentication clients.

„Uses challenge-response to compare hashes.

„Provides no encryption or integrity checking for the connection.

EAP-MD5 does not work with Microsoft wired authentication clients.

„PEAP — Protected EAP with Microsoft Challenge Handshake Authentication Protocol Version 2 (MS-CHAP-V2). Select this protocol for wireless clients.

„Uses TLS for encryption and data integrity checking.

„Provides MS-CHAP-V2 mutual authentication.

„Only the server side of the connection needs a certificate.

„EAP-TLSEAP with TLS.

„Provides mutual authentication, integrity-protected negotiation, and key exchange.

„Requires X.509 public key certificates on both sides of the connection.

„Provides encryption and integrity checking for the connection.

Page 296
Image 296
HP Manager Software manual