Dell PowerConnect W-IAP92 Dell Instant 6.2.0.0-3.2.0.0 User Guide - Page 112

Internal RADIUS Server, Authentication Terminated on W-IAP

Page 112 highlights

Internal RADIUS Server Each W-IAP has an instance of Free RADIUS server operating locally. When you enable the Internal RADIUS server option for the network, the authenticator on the W-IAP sends a RADIUS packet to the local IP address. The Internal RADIUS server listens and replies to the RADIUS packet. The following authentication methods are supported in Dell W-Instant network: l EAP-TLS- The Extensible Authentication Protocol- Transport Layer Security method supports the termination of EAP-TLS security using the internal RADIUS server. The EAPTLS requires both server and certification authority (CA) certificates installed onto the WIAP.The client certificate is verified on the Virtual Controller (the client certificate must be signed by a known CA) before the user name is checked on the authentication server. l EAP-TTLS (MSCHAPv2)- The Extensible Authentication Protocol-Tunneled Transport Layer Security (EAP-TTLS) method uses server-side certificates to set up authentication between clients and servers. However, the actual authentication is performed using passwords. l EAP-PEAP (MSCHAPv2)- Protected Extensible Authentication Protocol (PEAP) is an 802.1X authentication method that uses server-side public key certificates to authenticate clients with server. The PEAP authentication creates an encrypted SSL / TLS tunnel between the client and the authentication server. Exchange of information is encrypted and stored in the tunnel ensuring the user credentials are kept secure. l LEAP- Lightweight Extensible Authentication Protocol (LEAP) uses dynamic WEP keys for authentication between the client and authentication server. NOTE: Dell does not recommend to use the LEAP authentication method because it does not provide any resistance to network attacks. External RADIUS Server In the external RADIUS server, the IP address of the Virtual Controller is configured as the NAS IP address. Instant RADIUS is implemented on the Virtual Controller, and this feature eliminates the need to configure multiple NAS clients for every W-IAP on the RADIUS server for client authentication. Instant RADIUS dynamically forwards all the authentication requests from a NAS to a remote RADIUS server. The RADIUS server responds to the authentication request with an Access-Accept or Access-Reject message, and users are allowed or denied access to the network depending on the response from the RADIUS server. When you enable the external RADIUS server option for the network, the authenticator on the W-IAP sends a RADIUS packet to the local IP address. The external RADIUS server then listens and responds to the RADIUS packet. The following authentication methods are supported in Dell W-Instant network: Authentication Terminated on W-IAP Dell W-Instant allows EAP termination for PEAP-GTC and PEAP-MSCHAV2. PEAP-GTC termination allows authorization against an LDAP server and external RADIUS server while PEAPMSCHAV2 allows authorization against an external RADIUS server. This allows users to run PEAP-GTC termination with their own username and password to a local Microsoft Active Directory server with LDAP authentication. The following EAP-Type methods are described below: 112 | Authentication Dell PowerConnect W-Series Instant Access Point 6.2.0.0-3.2.0.0 | User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296

112
|
Authentication
Dell PowerConnect W-Series Instant Access Point
6.2.0.0-3.2.0.0
|
User Guide
Internal RADIUS Server
Each W-IAP has an instance of Free RADIUS server operating locally. When you enable the
Internal RADIUS server option for the network, the authenticator on the W-IAP sends a RADIUS
packet to the local IP address. The Internal RADIUS server listens and replies to the RADIUS
packet. The following authentication methods are supported in Dell W-Instant network:
l
EAP-TLS— The Extensible Authentication Protocol- Transport Layer Security method
supports the termination of EAP-TLS security using the internal RADIUS server. The EAP-
TLS requires both server and certification authority (CA) certificates installed onto the W-
IAP.The client certificate is verified on the Virtual Controller (the client certificate must be
signed by a known CA) before the user name is checked on the authentication server.
l
EAP-TTLS (MSCHAPv2)— The Extensible Authentication Protocol-Tunneled Transport
Layer Security (EAP-TTLS) method uses server-side certificates to set up authentication
between clients and servers. However, the actual authentication is performed using passwords.
l
EAP-PEAP (MSCHAPv2)— Protected Extensible Authentication Protocol (PEAP) is an
802.1X authentication method that uses server-side public key certificates to authenticate
clients with server. The PEAP authentication creates an encrypted SSL / TLS tunnel between
the client and the authentication server. Exchange of information is encrypted and stored in
the tunnel ensuring the user credentials are kept secure.
l
LEAP— Lightweight Extensible Authentication Protocol (LEAP) uses dynamic WEP keys for
authentication between the client and authentication server.
NOTE: Dell does not recommend to use the LEAP authentication method because it does not
provide any resistance to network attacks.
External RADIUS Server
In the external RADIUS server, the IP address of the Virtual Controller is configured as the NAS
IP address. Instant RADIUS is implemented on the Virtual Controller, and this feature eliminates
the need to configure multiple NAS clients for every W-IAP on the RADIUS server for client
authentication. Instant RADIUS dynamically forwards all the authentication requests from a NAS
to a remote RADIUS server. The RADIUS server responds to the authentication request with an
Access-Accept or Access-Reject message, and users are allowed or denied access to the network
depending on the response from the RADIUS server.
When you enable the external RADIUS server option for the network, the authenticator on the
W-IAP sends a RADIUS packet to the local IP address. The external RADIUS server then listens
and responds to the RADIUS packet.
The following authentication methods are supported in Dell W-Instant network:
Authentication Terminated on W-IAP
Dell W-Instant allows EAP termination for PEAP-GTC and PEAP-MSCHAV2. PEAP-GTC
termination allows authorization against an LDAP server and external RADIUS server while PEAP-
MSCHAV2 allows authorization against an external RADIUS server. This allows users to run
PEAP-GTC termination with their own username and password to a local Microsoft Active
Directory server with LDAP authentication.
The following EAP-Type methods are described below: