Dell PowerConnect W Clearpass 100 Software 3.7 Deployment Guide - Page 65

Universal Access Method (UAM) Password Encryption, NAS Redirect Parameters

Page 65 highlights

The 'Allowed Access' and 'Denied Access' fields are access control lists that determine if a client is permitted to access this Web login page. You can specify multiple IP addresses and networks, one per line, using the following syntax:  1.2.3.4 - IP address  1.2.3.4/24 - IP address with network prefix length  1.2.3.4/255.255.255.0 - IP address with explicit network mask The 'Deny Behavior' drop-down list may be used to specify the action to take when access is denied. The access control rules will be applied in order, from the most specific match to the least specific match. Access control entries are more specific when they match fewer IP addresses. The most specific entry is a single IP address (for example, 1.2.3.4), while the least specific entry is the match-all address of 0.0.0.0/0. As another example, the network address 192.168.2.0/24 is less specific than a smaller network such as 192.168.2.192/26, which in turn is less specific than the IP address 192.168.2.201 (which may also be written as 192.168.2.201/32). To determine the result of the access control list, the most specific rule that matches the client's IP address is used. If the matching rule is in the Denied Access list, then the client will be denied access. If the matching rule is in the Allowed Access list, then the client will be permitted access. If the Allowed Access list is empty, all access will be allowed, except to clients with an IP address that matches any of the entries in the Denied Access list. This behavior is equivalent to adding the entry 0.0.0.0/0 to the Allowed Access list. If the Denied Access list is empty, only clients with an IP address that matches one of the entries in the Allowed Access list will be allowed access. This behavior is equivalent to adding the entry 0.0.0.0/0 to the Denied Access list. Universal Access Method (UAM) Password Encryption Two different forms of password encryption are supported for the Web login page. These are:  UAM basic - Equivalent to the Password Authentication Protocol (PAP) scheme.  UAM with shared secret - Equivalent to the Challenge Handshake Authentication Protocol (CHAP) scheme. When using either of these schemes, the NAS must supply a parameter named challenge to the Web login page. This parameter should be a string of hexadecimal digits ("hexadecimal challenge string") encoding a binary value at least 128 bits long ("binary challenge"). The challenge is used to encrypt the user's password as follows:  UAM basic - The user's password is XORed bytewise with the supplied binary challenge. The result is encoded as a string of hexadecimal characters.  UAM with shared secret - The MD5 checksum of the binary challenge followed by the predefined UAM secret is computed ("checksum challenge"). The encrypted password is the hexadecimal MD5 checksum of a stream consisting of a null byte followed by the user's plaintext password and the hexadecimal checksum challenge. NAS Redirect Parameters The NAS may supply additional parameters when redirecting the user to the Web login page. These are supported and will be passed back to the NAS along with the variables that are defined as part of the Web login form. For example, some wireless network equipment will pass a "wlan" parameter that contains the user's ESSID to the login page. This might result in the following redirection URL: Amigopod 3.7 | Deployment Guide RADIUS Services | 65

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438

Amigopod 3.7
|
Deployment Guide
RADIUS Services
|
65
The ‘Allowed Access’ and ‘Denied Access’ fields are access control lists that determine if a client is
permitted to access this Web login page. You can specify multiple IP addresses and networks, one per line,
using the following syntax:
1.2.3.4
– IP address
1.2.3.4/24
– IP address with network prefix length
1.2.3.4/255.255.255.0
– IP address with explicit network mask
The ‘Deny Behavior’ drop-down list may be used to specify the action to take when access is denied.
The access control rules will be applied in order, from the most specific match to the least specific match.
Access control entries are more specific when they match fewer IP addresses.
The most specific entry is a
single IP address (for example,
1.2.3.4
), while the least specific entry is the match-all address of
0.0.0.0/0
.
As another example, the network address
192.168.2.0/24
is less specific than a smaller network such as
192.168.2.192/26
, which in turn is less specific than the IP address
192.168.2.201
(which may also be
written as
192.168.2.201/32
).
To determine the result of the access control list, the most specific rule that matches the client’s IP address
is used.
If the matching rule is in the Denied Access list, then the client will be denied access.
If the
matching rule is in the Allowed Access list, then the client will be permitted access.
If the Allowed Access list is empty, all access will be allowed, except to clients with an IP address that
matches any of the entries in the Denied Access list.
This behavior is equivalent to adding the entry
0.0.0.0/0
to the Allowed Access list.
If the Denied Access list is empty, only clients with an IP address that matches one of the entries in the
Allowed Access list will be allowed access.
This behavior is equivalent to adding the entry
0.0.0.0/0
to the
Denied Access list.
Universal Access Method (UAM) Password Encryption
Two different forms of password encryption are supported for the Web login page. These are:
UAM basic
– Equivalent to the Password Authentication Protocol (PAP) scheme.
UAM with shared secret
– Equivalent to the Challenge Handshake Authentication Protocol (CHAP)
scheme.
When using either of these schemes, the NAS must supply a parameter named
challenge
to the Web login
page. This parameter should be a string of hexadecimal digits (“hexadecimal challenge string”) encoding a
binary value at least 128 bits long (“binary challenge”).
The challenge is used to encrypt the user’s password as follows:
UAM basic
– The user’s password is XORed bytewise with the supplied binary challenge. The result is
encoded as a string of hexadecimal characters.
UAM with shared secret
– The MD5 checksum of the binary challenge followed by the predefined
UAM secret is computed (“checksum challenge”). The encrypted password is the hexadecimal MD5
checksum of a stream consisting of a null byte followed by the user’s plaintext password and the
hexadecimal checksum challenge.
NAS Redirect Parameters
The NAS may supply additional parameters when redirecting the user to the Web login page. These are
supported and will be passed back to the NAS along with the variables that are defined as part of the Web
login form.
For example, some wireless network equipment will pass a “wlan” parameter that contains the user’s ESSID
to the login page. This might result in the following redirection URL: