Dell PowerConnect W Clearpass 100 Software Podręcznik Użytkownika Strona 117

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
Przeglądanie stron 116
AOS-W Instant 6.2.1.0-3.3| User Guide Authentication | 117
Chapter 13
Authentication
This chapter provides the following information:
l Understanding Authentication Methods on page 117
l Supported Authentication Servers on page 119
l Understanding Encryption Types on page 120
l Understanding Authentication Survivability on page 121
l Configuring Authentication Servers on page 124
l Configuring Authentication Parameters for Virtual Controller Management Interface on page 127
l Configuring Users on page 129
l Configuring 802.1X Authentication for a Network Profile on page 130
l Configuring MAC Authentication for a Network Profile on page 132
l Configuring MAC Authentication with 802.1X Authentication on page 133
l Configuring Captive Portal Authentication on page 135
l Configuring MAC Authentication with Captive Portal Authentication on page 144
l Configuring Captive Portal Roles for an SSID with 802.1x authentication on page 142
l Configuring Walled Garden Access on page 146
l Configuring WISPr Authentication on page 146
l Blacklisting Clients on page 148
l Uploading Certificates on page 150
Understanding Authentication Methods
Authentication is a process of identifying a user by through a valid username and password. Clients can also be
authenticated based on their MAC addresses.
The following authentication methods are supported inAOS-W Instant:
l 802.1X authentication 802.1X is a method for authenticating the identity of a user before providing network
access to the user. Remote Authentication Dial In User Service (RADIUS) is a protocol that provides centralized
authentication, authorization, and accounting management. For authentication purpose, the wireless client can
associate to a network access server (NAS) or RADIUS client such as a wireless OAW-IAP. The wireless client
can pass data traffic only after successful 802.1X authentication. For more information on configuring an OAW-
IAP to use 802.1X authentication, see Configuring 802.1X Authentication for a Network Profile on page 130.
l MAC authentication Media Access Control (MAC) authentication is used for authenticating devices based on
their physical MAC addresses. MAC authentication requires that the MAC address of a machine matches a
manually defined list of addresses. This authentication method is not recommended for scalable networks and
the networks that require stringent security settings. For more information on configuring an OAW-IAP to use
MAC authentication, see Configuring MAC Authentication for a Network Profile on page 132.
l MAC authentication with 802.1X authentication —This authentication method has the following features:
n MAC authentication precedes 802.1X authentication - The administrators can enable MAC authentication for
802.1X authentication. MAC authentication shares all the authentication server configurations with 802.1X
authentication. If a wireless or wired client connects to the network, MAC authentication is performed first. If
MAC authentication fails, 802.1X authentication does not trigger. If MAC authentication is successful, 802.1X
Przeglądanie stron 116
1 2 ... 112 113 114 115 116 117 118 119 120 121 122 ... 295 296

Komentarze do niniejszej Instrukcji

Brak uwag