For the SMCWHSG44-G, the RADIUS client component of the Router is shared by the IEEE 802.1x and Web redirection components. The RADIUS settings are for the RADIUS client to communicate with backend RADIUS servers.

NOTE: When configured for EAP authentication, the RADIUS server supports either EAP-TLS or EAP-MD5, but not both at the same time. As a result, not all combinations of EAP-MD5, EAP-TLS, PAP and CHAP authentication meth- ods are available if both IEEE 802.1x and Web redirection are enabled. The following table shows the allowable IEEE 802.1x and Web redirection authen- tication modes on the Wireless Advanced edition of access Router.

Table 2. Allowable Authentication Modes.

The SMCWHSG44-G can be configured to communicate with two RADIUS servers. When the primary RADIUS server fails to respond, the SMCWHSG44-G will try to communicate with the secondary RADIUS server. You can specify the length of timeout and the number of retries before communicating with the secondary RADIUS server after failing to communicate with the primary RA-DIUS server.

The SMCWHSG44-G and its RADIUS server(s) share a secret key so that they can authenticate each other. In addition to its IP address, the SMCWHSG44-G can identify itself by an NAS (Network Access Server) iden- tifier. Each SMCWHSG44-G must have a unique NAS identifier.

2.6.2.2. Robustness

Fig. 91. RADIUS Robustness Settings.

The Router can be configured to notify the RADIUS server after it reboots. The RADIUS server can make use of the notification to clean up user authentication session records in the event that the Router reboots unexpectedly due to abnormal operation.

Select the Notify RADIUS server after reboot check box to enable this capability, and then specify the name of the pseudo user (default to “reboot”) for this operation in the Reboot user name text box.

74

Page 75
Image 75
SMC Networks SMCWHSG44-G manual Robustness