Cisco AIR-LAP1252AG-A-K9 Software Configuration Guide - Page 156
Authentication Types, Required Settings, Network-EAP, Require EAP
UPC - 882658140716
View all Cisco AIR-LAP1252AG-A-K9 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 156 highlights
Summary of Settings for Authentication Types Chapter 4 Security Setup Table 4-5 Settings for Authentication Types (continued) Authentication Types Required Settings EAP-TLS and EAP-MD5 On the Authenticator Configuration page (shown in Figure 4-13): • Select an 802.1x protocol draft that matches the protocol draft used by client devices that associate with the access point. • Enter the name or IP address, type, port, shared secret, and timeout value for your RADIUS server. • Select the EAP checkbox under the server. On the AP Radio Data Encryption page for the internal radio or the radio module (shown in Figure 4-6): • Select the Open and Network-EAP checkboxes. • Select the Require EAP checkbox under Open. Note Selecting Require EAP blocks non-EAP client devices from using the access point. EAP-TLS, EAP-MD5, and static WEP under 802.11 Open • Enter a WEP key in key slot 1 and select 128-bit from the key size pull-down menu. The access point does not support this combination of authentication types. When you select Require EAP on the Authenticator Configuration page to authenticate clients using EAP-TLS and EAP-MD5, non-EAP client devices are blocked from using the access point. However, the access point can serve client devices using 802.11 open authentication if the access point is set up for MAC-based authentication and EAP authentication. See the "Authenticating Client Devices Using MAC Addresses or EAP" section on page 4-34 for instructions on setting up this combination of authentications. 4-38 Cisco Aironet 1200 Series Access Point Software Configuration Guide OL-2159-03