Dell PowerConnect W Clearpass 100 Software 3.7 Deployment Guide - Page 417

Optional EAP Module Options Continued

Page 417 highlights

Table 53 Optional EAP Module Options (Continued) Function Description eap.default_eap_type = md5 Invoke the default supported EAP type when EAP-Identity response is received. The incoming EAP messages DO NOT specify which EAP type they will be using, so it MUST be set here. Only one default EAP type may be used at a time. If the EAP-Type attribute is set by another module, then that EAP type takes precedence over the default type configured here. eap.timer_expire = 60 A list is maintained to correlate EAP-Response packets with EAPRequest packets. After a configurable length of time, entries in the list expire, and are deleted. eap.ignore_unknown_eap_types = no There are many EAP types, but the server has support for only a limited subset. If the server receives a request for an EAP type it does not support, then it normally rejects the request. By setting this configuration to "yes", you can tell the server to instead keep processing the request. Another module MUST then be configured to proxy the request to another RADIUS server which supports that EAP type. If another module is NOT configured to handle the request, then the request will still end up being rejected. eap.cisco_accounting_username_bug = no Cisco AP1230B firmware 12.2(13)JA1 has a bug. When given a User-Name attribute in an Access-Accept, it copies one more byte than it should. Work around this issue by adding an extra zero byte. module.eap_md5 = yes Enables "md5" EAP type. EAP-MD5 authentication is not recommended for wireless connections. It is insecure, and does not provide for dynamic WEP keys. module.eap_leap = yes Cisco LEAP. LEAP is not recommended for use in new deployments. Cisco LEAP uses the MS-CHAP algorithm (but not the MS-CHAP attributes) to perform its authentication. As a result, LEAP requires access to the plain-text User-Password, or the NTPassword attributes. "System" authentication is impossible with LEAP. module.eap_gtc = yes Generic Token Card. Currently, this is only permitted inside of EAPTTLS, or EAP-PEAP. The module "challenges" the user with text, and the response from the user is taken to be the User-Password. Proxying the tunneled EAP-GTC session is a bad idea: the users password will go over the wire in plain text, for anyone to see. eap.gtc.challenge = "Password: " The default challenge string, which many clients ignore. eap.gtc.auth_type= PAP The plain-text response which comes back is put into a UserPassword attribute, and passed to another module for authentication. This allows the EAP-GTC response to be checked against plain-text, or encrypted passwords. If you specify "Local" instead of "PAP", then the module will look for a User-Password configured for the request, and do the authentication itself. Amigopod 3.7 | Deployment Guide Reference | 417

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438

Amigopod 3.7
|
Deployment Guide
Reference |
417
eap.default_eap_type
= md5
Invoke the default supported EAP type when EAP-Identity response
is received. The incoming EAP messages DO NOT specify which
EAP type they will be using, so it MUST be set here. Only one
default EAP type may be used at a time. If the EAP-Type attribute is
set by another module, then that EAP type takes precedence over
the default type configured here.
eap.timer_expire
= 60
A list is maintained to correlate EAP-Response packets with EAP-
Request packets. After a configurable length of time, entries in the
list expire, and are deleted.
eap.ignore_unknown_eap_types
= no
There are many EAP types, but the server has support for only a
limited subset. If the server receives a request for an EAP type it
does not support, then it normally rejects the request. By setting
this configuration to “yes”, you can tell the server to instead keep
processing the request. Another module MUST then be configured
to proxy the request to another RADIUS server which supports that
EAP type. If another module is NOT configured to handle the
request, then the request will still end up being rejected.
eap.cisco_accounting_username_bug
= no
Cisco AP1230B firmware 12.2(13)JA1 has a bug. When given a
User-Name attribute in an Access-Accept, it copies one more byte
than it should. Work around this issue by adding an extra zero byte.
module.eap_md5
= yes
Enables “md5” EAP type. EAP-MD5 authentication is not
recommended for wireless connections. It is insecure, and does not
provide for dynamic WEP keys.
module.eap_leap
= yes
Cisco LEAP. LEAP is not recommended for use in new
deployments. Cisco LEAP uses the MS-CHAP algorithm (but not
the MS-CHAP attributes) to perform its authentication. As a result,
LEAP requires access to the plain-text User-Password, or the NT-
Password attributes. “System” authentication is impossible with
LEAP.
module.eap_gtc
= yes
Generic Token Card. Currently, this is only permitted inside of EAP-
TTLS, or EAP-PEAP. The module "challenges" the user with text,
and the response from the user is taken to be the User-Password.
Proxying the tunneled EAP-GTC session is a bad idea: the users
password will go over the wire in plain text, for anyone to see.
eap.gtc.challenge
= "Password: "
The default challenge string, which many clients ignore.
eap.gtc.auth_type
= PAP
The plain-text response which comes back is put into a User-
Password attribute, and passed to another module for
authentication. This allows the EAP-GTC response to be checked
against plain-text, or encrypted passwords. If you specify “Local”
instead of “PAP”, then the module will look for a User-Password
configured for the request, and do the authentication itself.
Table 53
Optional EAP Module Options (Continued)
Function
Description