D-Link DWS-1008 User Manual
xiv
Viewing Local Accounting Records
...................................................................................
329
Viewing Roaming Accounting Records
..............................................................................
329
Displaying the AAA Configuration
.............................................................................................
330
Avoiding AAA Problems in Configuration Order
.......................................................................
331
Using the Wildcard “Any” as the SSID Name in Authentication Rules
...............................
331
Using Authentication and Accounting Rules Together
.......................................................
332
Configuration Producing an Incorrect Processing Order
...............................................
332
Configuration for a Correct Processing Order
...............................................................
333
Network User Configuration Scenarios
....................................................................................
334
General Use of Network User Commands
........................................................................
334
Enabling RADIUS Pass-Through Authentication
...............................................................
336
Enabling PEAP-MS-CHAP-V2 Authentication
...................................................................
336
Enabling PEAP-MS-CHAP-V2 Offload
..............................................................................
337
Combining EAP Offload with Pass-Through Authentication
..............................................
337
Overriding AAA-Assigned VLANs
......................................................................................
338
Configuring Communication with RADIUS
................................................................................
339
RADIUS Overview
....................................................................................................................
339
Before You Begin
......................................................................................................................
339
Configuring RADIUS Servers
...................................................................................................
339
Configuring Global RADIUS Defaults
................................................................................
340
Setting the System IP Address as the Source Address
.....................................................
341
Configuring Individual RADIUS Servers
............................................................................
341
Deleting RADIUS Servers
..................................................................................................
342
Configuring RADIUS Server Groups
........................................................................................
342
Creating Server Groups
.....................................................................................................
342
Ordering Server Groups
................................................................................................
343
Configuring Load Balancing
..........................................................................................
343
Adding Members to a Server Group
..............................................................................
344
Deleting a Server Group
....................................................................................................
345
RADIUS and Server Group Configuration Scenario
.................................................................
345
Managing 802.1X
..........................................................................................................................
347
Managing 802.1X on Wired Authentication Ports
.....................................................................
347
Enabling and Disabling 802.1X Globally
............................................................................
347
Setting 802.1X Port Control
...............................................................................................
347
Managing 802.1X Encryption Keys
...........................................................................................
348
Enabling 802.1X Key Transmission
....................................................................................
349
Configuring 802.1X Key Transmission Time Intervals
........................................................
349
Managing WEP Keys
.........................................................................................................
349
Configuring 802.1X WEP Rekeying
...............................................................................
350
Configuring the Interval for WEP Rekeying
...................................................................
350
Setting EAP Retransmission Attempts
.....................................................................................
351
Managing 802.1X Client Reauthentication
...............................................................................
351
Enabling and Disabling 802.1X Reauthentication
..............................................................
352
Setting the Maximum Number of 802.1X Reauthentication Attempts
................................
352
Setting the 802.1X Reauthentication Period
......................................................................
353
Setting the Bonded Authentication Period
.........................................................................
353
Managing Other Timers
............................................................................................................
354
Setting the 802.1X Quiet Period
........................................................................................
354