442Configuring AAA for Network Users

Authentication Process for 802.1X Users of a Third-Party AP

1WSS Software uses MAC authentication to authenticate the AP.

2The user contacts the AP and negotiates the authentication protocol to be used.

3The AP, acting as a RADIUS client, sends a RADIUS request to the WSS.

4The AP uses 802.1X to authenticate the user, using the WSS as its RADIUS server. The WSS proxies RADIUS requests from the AP to a real RADIUS server, depending on the authentication method specified in the proxy authentication rule for the user.

5After successful RADIUS authentication of the user, WSS Software assigns authorization attributes to the user from the RADIUS server’s access-accept response.

320657-A

Page 442
Image 442
Nortel Networks 2300 manual Authentication Process for 802.1X Users of a Third-Party AP