Dell PowerConnect W Clearpass 100 Software 3.9 Deployment Guide - Page 494

Optional EAP Module Options, Continued, Table 62

Page 494 highlights

Table 62 Optional EAP Module Options (Continued) Function Description module.eap_tls = no module.eap_ttls = no Enables EAP-TLS module. The following functions onfigure digital certificates for EAP-TLS. If the private key and certificate are located in the same file, then private_key_file and certificate_file must contain the same filename.  eap.tls.private_key_password = not set  eap.tls.private_key_file = "${raddbdir}/certs/cert-srv.pem"  eap.tls.certificate_file = "${raddbdir}/certs/cert-srv.pem"  eap.tls.dh_file = "${raddbdir}/certs/dh"  eap.tls.random_file = "${raddbdir}/certs/random"  eap.tls.CA_file = "${raddbdir}/certs/demoCA/cacert.pem" Trusted root CA list.  eap.tls.fragment_size = 1024 This can never exceed the size of a RADIUS packet (4096 bytes), and is preferably half that, to accommodate other attributes in the RADIUS packet. On most APs the maximum packet length is configured between 1500 - 1600. In these cases, fragment size should be 1024 or less.  eap.tls.include_length = yes If set to yes, the total length of the message is included in every packet we send. If set to no, total length of the message is included only in the first packet of a fragment series.  eap.tls.check_crl = yes Check the Certificate Revocation List.  eap.tls.check_cert_cn = not set If check_cert_cn is set, the value will be xlat'ed and checked against the CN in the client certificate. If the values do not match, the certificate verification will fail, rejecting the user. The TTLS module implements the EAP-TTLS protocol, which can be described as EAP inside of Diameter, inside of TLS, inside of EAP, inside of RADIUS. The TTLS module needs the TLS module to be installed and configured, in order to use the TLS tunnel inside of the EAP packet. You will still need to configure the TLS module, even if you do not want to deploy EAP-TLS in your network. Users will not be able to request EAP-TLS, as it requires them to have a client certificate. EAP-TTLS does not require a client certificate.eap.ttls.default_eap_type = md5 The tunneled EAP session needs a default EAP type which is separate from the one for the non-tunneled EAP module. Inside of the TTLS tunnel, we recommend using EAP-MD5. If the request does not contain an EAP conversation, then this configuration entry is ignored.  eap.ttls.copy_request_to_tunnel = no The tunneled authentication request does not usually contain useful attributes like Calling-Station-Id, etc. These attributes are outside of the tunnel, and are normally unavailable to the tunneled authentication request. By setting this configuration entry to 'yes', any attribute which is not in the tunneled authentication request, but which is available outside of the tunnel, is copied to the tunneled request.  eap.ttls.use_tunneled_reply = no The reply attributes sent to the NAS are usually based on the name of the user 'outside' of the tunnel (usually 'anonymous'). If you want to send the reply attributes based on the username inside of the tunnel, then set this configuration entry to 'yes', and the reply to the NAS will be taken from the reply to the tunneled request. 494 | Reference ClearPass Guest 3.9 | Deployment Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518

494
|
Reference
ClearPass Guest 3.9
|
Deployment Guide
module.eap_tls
= no
Enables EAP-TLS module.
The following functions onfigure digital certificates for EAP-TLS. If
the private key and certificate are located in the same file, then
private_key_file and certificate_file must contain the same filename.
eap.tls.private_key_password
=
not set
eap.tls.private_key_file
= "${raddbdir}/certs/cert-srv.pem"
eap.tls.certificate_file
= "${raddbdir}/certs/cert-srv.pem"
eap.tls.dh_file
= "${raddbdir}/certs/dh"
eap.tls.random_file
=
"${raddbdir}/certs/random"
eap.tls.CA_file
= "${raddbdir}/certs/demoCA/cacert.pem"
Trusted root CA list.
eap.tls.fragment_size
= 1024
This can never exceed the size of a RADIUS packet (4096
bytes), and is preferably half that, to accommodate other
attributes in the RADIUS packet. On most APs the maximum
packet length is configured between 1500 – 1600. In these
cases, fragment size should be 1024 or less.
eap.tls.include_length
= yes
If set to yes, the total length of the message is included in every
packet we send. If set to no, total length of the message is
included only in the first packet of a fragment series.
eap.tls.check_crl
= yes
Check the Certificate Revocation List.
eap.tls.check_cert_cn
=
not set
If check_cert_cn is set, the value will be xlat'ed and checked
against the CN in the client certificate. If the values do not
match, the certificate verification will fail, rejecting the user.
module.eap_ttls
= no
The TTLS module implements the EAP-TTLS protocol, which can
be described as EAP inside of Diameter, inside of TLS, inside of
EAP, inside of RADIUS.
The TTLS module needs the TLS module to be installed and
configured, in order to use the TLS tunnel inside of the EAP packet.
You will still need to configure the TLS module, even if you do not
want to deploy EAP-TLS in your network. Users will not be able to
request EAP-TLS, as it requires them to have a client certificate.
EAP-TTLS does not require a client
certificate.
eap.ttls.default_eap_type
= md5
The tunneled EAP session needs a default EAP type which is
separate from the one for the non-tunneled EAP module. Inside of
the TTLS tunnel, we recommend using EAP-MD5. If the request
does not
contain an EAP conversation, then this configuration entry
is ignored.
eap.ttls.copy_request_to_tunnel
= no
The tunneled authentication request does not usually contain
useful attributes like Calling-Station-Id, etc. These attributes are
outside of the tunnel, and are normally unavailable to the
tunneled authentication request.
By setting this configuration entry to ‘yes’, any attribute which is
not in the tunneled authentication request, but which is available
outside of the tunnel, is copied to the tunneled request.
eap.ttls.use_tunneled_reply
= no
The reply attributes sent to the NAS are usually based on the
name of the user ‘outside’ of the tunnel (usually ‘anonymous’). If
you want to send the reply attributes based on the username
inside of the tunnel, then set this configuration entry to ‘yes’,
and the reply to the NAS will be taken from the reply to the
tunneled request.
Table 62
Optional EAP Module Options
(Continued)
Function
Description