D-Link DWC-2000-AP32-LIC User Manual - Page 186

External Authentication

Page 186 highlights

Section 6 - Securing Your Network External Authentication The local user database present in the controller itself is typically used for granting management access for the GUI or CLI. External authentication servers are typically more secure, and can be used for allowing wireless AP connections, authenticating IPsec endpoints, and even allowing access via a Captive Portal on the VLAN. This section describes the available authentication servers on the controller, and also the configuration requirements. In all cases, the "Server Checking" button is used to verify connectivity to the configured server(s). Configure RADIUS Server Path: Security > Authentication > External Auth Server > RADIUS Server Enterprise Mode for wireless security uses a RADIUS Server for WPA and/or WPA2 security. A RADIUS server must be configured and accessible by the controller to authenticate wireless client connections to an AP enabled with a profile that uses RADIUS authentication. • The Authentication IP Address is required to identify the server. A secondary RADIUS server provides redundancy in the event that the primary server cannot be reached by the controller when needed. • Authentication Port - The port for the RADIUS server connection • Secret - Enter the shared secret that allows this controller to log into the specified RADIUS server(s). This key must match the shared secret on the RADIUS Server. • The Timeout and Retries fields are used to either move to a secondary server if the primary cannot be reached, or to give up the RADIUS authentication attempt if communication with the server is not possible. To configure RADIUS Server: 1. Go to Security > Authentication > External Auth Server > RADIUS Server tab. D-Link DWC-2000 User Manual 186

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282

D-Link DWC-2000 User Manual
186
Section 6 - Securing Your Network
External Authentication
The local user database present in the controller itself is typically used for granting management access for the
GUI or CLI. External authentication servers are typically more secure, and can be used for allowing wireless AP
connections, authenticating IPsec endpoints, and even allowing access via a Captive Portal on the VLAN. This
section describes the available authentication servers on the controller, and also the configuration requirements.
In all cases, the “Server Checking” button is used to verify connectivity to the configured server(s).
Configure RADIUS Server
Path: Security > Authentication > External Auth Server > RADIUS Server
Enterprise Mode for wireless security uses a RADIUS Server for WPA and/or WPA2 security. A RADIUS server must
be configured and accessible by the controller to authenticate wireless client connections to an AP enabled with
a profile that uses RADIUS authentication.
• The Authentication IP Address is required to identify the server. A secondary RADIUS server provides
redundancy in the event that the primary server cannot be reached by the controller when needed.
• Authentication Port - The port for the RADIUS server connection
• Secret - Enter the shared secret that allows this controller to log into the specified RADIUS server(s). This
key must match the shared secret on the RADIUS Server.
• The Timeout and Retries fields are used to either move to a secondary server if the primary cannot
be reached, or to give up the RADIUS authentication attempt if communication with the server is not
possible.
To configure RADIUS Server:
1. Go to
Security
>
Authentication
>
External Auth Server
>
RADIUS Server
tab.