30

Authentication Server

This chapter shows you how to configure the NXC as an authentication server for access points.

30.1 Authentication Server Overview

The NXC can also work as a RADIUS server to exchange messages with other APs for user authentication and authorization.

30.2 Authentication Server Commands

The following table lists the authentication server commands you use to configure the NXC’s built-in authentication server settings.

Table 115 Command Summary: Authentication Server

COMMAND

DESCRIPTION

[no] auth-server activate

Sets the NXC to act as an authentication server for other

 

RADIUS clients, such as APs. The no command sets the NXC

 

to not act as an authentication server for other APs.

auth-server authentication

Specifies an authentication method used by the authentication

auth_method

server.

 

 

no auth-server

Resets the authentication method used by the authentication

authentication

server to the factory default (default).

[no] auth-server cert

Specifies a certificate used by the authentication server (NXC).

certificate_name

The no command resets the certificate used by the

 

authentication server to the factory default (default).

 

certificate_name: The name of the certificate. You can use

 

up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters.

 

 

[no] auth-server trusted-

Creates a trusted RADIUS client profile. The no command

client profile_name

deletes the specified profile.

 

profile-name: You may use 1-31 alphanumeric characters,

 

underscores(_), or dashes (-), but the first character cannot be a

 

number. This value is case-sensitive.

[no] activate

Enables the client profile. The no command disables the profile.

[no] ip address ip

Sets the client’s IP address and subnet mask. The no command

subnet_mask

clears this setting.

[no] secret secret

Sets a password as the key to be shared between the NXC and

 

the client. The no command clears this setting.

 

197

NXC CLI Reference Guide