Chapter 17 Internal RADIUS Server

Take the following steps to set up trusted APs and trusted users.

1Configure an IP address and shared secret in the Trusted AP database to specify an AP as trusted.

2Configure wireless client user names and passwords in the Trusted Users database to use a trusted AP as a relay between the NWA’s internal RADIUS server and the wireless clients.

The wireless clients can then be authenticated by the NWA’s internal RADIUS server.

PEAP (Protected EAP) and MD5 authentication is implemented on the internal RADIUS server using simple username and password methods over a secure TLS connection. See Appendix A on page 303 for more information on the types of EAP authentication and the internal RADIUS authentication method used in your NWA.

Note: The internal RADIUS server does not support domain accounts (DOMAIN/ user). When you configure your Windows XP SP2 Wireless Zero Configuration PEAP/MS-CHAPv2 settings, deselect the Use Windows logon name and password check box. When authentication begins, a pop-up dialog box requests you to type a Name, Password and Domain of the RADIUS server. Specify a name and password only, do not specify a domain.

 

215

NWA-3500/NWA-3550 User’s Guide