Cisco AIR-LAP1252AG-A-K9 Software Configuration Guide - Page 152

Authenticating Client Devices Using MAC Addresses or EAP, Disallowed, Require EAP

Page 152 highlights

Setting Up MAC-Based Authentication Chapter 4 Security Setup devices to authenticate using MAC addresses. To force all client devices to authenticate using MAC addresses, select Disallowed for all the enabled authentication types. When you set Default Unicast Address Filter to disallowed, the radio discards all unicast traffic except packets sent to the MAC addresses listed as allowed on the authentication server or on the access point's Address Filters page. Note Client devices associated to the radio are not immediately affected when you set the Default Unicast Address Filter to disallowed. Step 16 Click OK. You return automatically to the Setup page. Client devices that associate with the access point through this radio will not be allowed to authenticate unless their MAC addresses are included in the list of allowed addresses. Authenticating Client Devices Using MAC Addresses or EAP You can set up one or both access point radios to authenticate client devices using a combination of MAC-based and EAP authentication. When you enable this feature, client devices that associate to the access point using open authentication first attempt MAC authentication. If MAC authentication succeeds, the client device joins the network; if the client is also using EAP authentication, it attempts to authenticate using EAP. If MAC authentication fails, the access point waits for the client device to attempt EAP authentication. Follow these steps to combine MAC-based and EAP authentication for client devices using IEEE 802.11 open authentication: Step 1 Step 2 Follow the steps in the "Setting Up EAP Authentication" section on page 4-20 to set up EAP. You must select Require EAP under Open authentication on the radio's AP Radio Data Encryption page to force client devices to perform EAP athentication if they fail MAC authentication. If you do not select Require EAP, client devices that fail MAC authentication might be able to join the network without performing EAP authentication. Follow the steps in the "Setting Up MAC-Based Authentication" section on page 4-29 to set up MAC-based authentication. 4-34 Cisco Aironet 1200 Series Access Point Software Configuration Guide OL-2159-03

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284

Chapter 4
Security Setup
Setting Up MAC-Based Authentication
4-34
Cisco Aironet 1200 Series Access Point Software Configuration Guide
OL-2159-03
devices to authenticate using MAC addresses. To force all client devices to
authenticate using MAC addresses, select
Disallowed
for all the enabled
authentication types.
When you set Default Unicast Address Filter to disallowed, the radio discards all
unicast traffic except packets sent to the MAC addresses listed as allowed on the
authentication server or on the access point
s Address Filters page.
Note
Client devices associated to the radio are not immediately affected when
you set the Default Unicast Address Filter to disallowed.
Step 16
Click
OK
. You return automatically to the Setup page. Client devices that
associate with the access point through this radio will not be allowed to
authenticate unless their MAC addresses are included in the list of allowed
addresses.
Authenticating Client Devices Using MAC Addresses or EAP
You can set up one or both access point radios to authenticate client devices using
a combination of MAC-based and EAP authentication. When you enable this
feature, client devices that associate to the access point using open authentication
first attempt MAC authentication. If MAC authentication succeeds, the client
device joins the network; if the client is also using EAP authentication, it attempts
to authenticate using EAP. If MAC authentication fails, the access point waits for
the client device to attempt EAP authentication.
Follow these steps to combine MAC-based and EAP authentication for client
devices using IEEE 802.11 open authentication:
Step 1
Follow the steps in the
Setting Up EAP Authentication
section on page 4-20
to
set up EAP. You must select
Require EAP
under Open authentication on the
radio
s AP Radio Data Encryption page to force client devices to perform EAP
athentication if they fail MAC authentication. If you do not select
Require EAP
,
client devices that fail MAC authentication might be able to join the network
without performing EAP authentication.
Step 2
Follow the steps in the
Setting Up MAC-Based Authentication
section on
page 4-29
to set up MAC-based authentication.