D-Link DSA-3100P Manual - Page 34

Home > User Manager > Authentication Server > RADIUS &gt

Page 34 highlights

Using the Configuration Utility (continued) Home > User Manager > Authentication Server > RADIUS > 802.1x Select Enable to use the 802.1x feature. The DSA-3100 supports integrated single sign-on when used with 802.1x enabled access points. By using the integrated RADIUS proxy function in the DSA-3100, users can use the EAP methods such as EAP-MD5 or EAP-TLS to login and get the service depending on the authentication methods which the backend RADIUS server and APs support. The assumption, for this scenario, is that the network administrator has configured an EAP-enabled RADIUS server like Microsoft Internet Authentication Service on Windows 2000 or .NET Server 2003. If EAP-TLS is required for the dynamic key exchange, Microsoft Certification is also required. It is also recommended that the system administrator perform an authentication test to make sure everything is correct before connecting the network to the DSA-3100. (802.1x is available only when RADIUS is selected here, under Home>User Manager>Authentication Server in the DSA-3100 Configuration). To utilize 802.1x, all the devices on the network must be 802.1x and EAP enabled. The APs and the RADIUS server must share the same secret word, and the DSA-3100 and the RADIUS server must share the same secret word. Configuring network devices for use with 802.1x: To use 802.1x, please configure the RADIUS server, the access points and the DSA-3100 as follows : RADIUS server: The system administrator should create a client account for the DSA-3100 first and define the required secret. (We suggest that you use a different one than the one the APs are using). The RADIUS server is capable of mulitple "secret keys" each assigned to a specific device. In order to participate in the network, each device must share the secret key that has been assigned to it in the RADIUS server's configuration. DSA-3100: In the configuration utility, select Home>User Manager>Authentication Server and select RADIUS. Access Points: When configuring the access point, include the IP address of the RADIUS server in the appropriate field. The corresponding secrets for each AP should match the settings in DSA-3100. 34

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79

34
Using the Configuration Utility (continued)
Select
Enable
to use the 802.1x feature. The DSA-3100 supports integrated single
sign-on when used with 802.1x enabled access points. By using the integrated
RADIUS proxy function in the DSA-3100, users can use the EAP methods such
as EAP-MD5 or EAP-TLS to login and get the service depending on the
authentication
methods which the backend RADIUS server and APs support.
The assumption, for this scenario, is that the network administrator has configured an
EAP-enabled RADIUS server like Microsoft Internet Authentication Service on
Windows 2000 or .NET Server 2003. If EAP-TLS is required for the dynamic key
exchange, Microsoft Certification is also required. It is also recommended that the
system administrator perform an authentication test to make sure everything is
correct before connecting the network to the DSA-3100. (802.1x is available only
when RADIUS is selected here, under
Home>User Manager>Authentication Server
in the
DSA-3100 Configuration).
To utilize 802.1x, all the devices on the network must be 802.1x and EAP enabled. The
APs and the RADIUS server must share the same secret word, and the DSA-3100
and the RADIUS server must share the same secret word.
Home > User Manager > Authentication Server > RADIUS >
802.1x
To use 802.1x, please configure the RADIUS server, the access points and the
DSA-3100 as follows :
RADIUS server:
The system administrator should create a client account for the DSA-3100 first and
define the required secret. (We suggest that you use a different one than the one the
APs are using). The RADIUS server is capable of mulitple “secret keys” each
assigned to a specific device. In order to participate in the network, each device must
share the secret key that has been assigned to it in the RADIUS server’s configuration.
DSA-3100:
In the configuration utility, select Home>User Manager>Authentication Server and
select RADIUS.
When configuring the access point, include the IP address of the RADIUS server in
the appropriate field. The corresponding secrets for each AP should match the settings
in DSA-3100.
Configuring network devices for use with 802.1x:
Access Points: