Dell W-Series 228 Instant 6.4.3.1-4.2 User Guide - Page 175

Enabling Authentication Survivability, In the Instant UI, Important Points to Remember, In the CLI

Page 175 highlights

Enabling Authentication Survivability You can enable authentication survivability for a wireless network profile through the UI or CLI. In the Instant UI To configure authentication survivability for a wireless network: 1. On the Network tab, click New to create a new network profile or select an existing profile for which you want to enable authentication survivability and click edit. 2. In the Edit or New WLAN window, ensure that all required WLAN and VLAN attributes are defined, and then click Next. 3. On the Security tab, under Enterprise security settings, select an existing authentication server or create a new server by clicking New. 4. To enable authentication survivability, select Enabled from the Authentication survivability drop-down. On enabling this, the W-IAP authenticates the previously connected clients using EAP-PEAP and EAP-TLS authentication when connection to the external authentication server is temporarily lost. 5. Specify the cache timeout duration, after which the cached details of the previously authenticated clients expire. You can specify a value within the range of 1-99 hours and the default cache timeout duration is 24 hours. 6. Click Next and then click Finish to apply the changes. Important Points to Remember l Any client connected through CPPM and authenticated through W-IAP remains authenticated with the WIAP even if the client is removed from the CPPM server during the CPPM downtime. l Do not make any changes to the authentication survivability cache timeout duration when the authentication server is down. l For EAP-PEAP authentication, ensure that the CPPM 6.0.2 or later version is used for authentication. For EAP-TLS authentication, any external or third-party server can be used. l For EAP-TLS authentication, ensure that the server and CA certificates from the authentication servers are uploaded on W-IAP. For more information, see Uploading Certificates on page 186. In the CLI To configure authentication survivability for a wireless network: (Instant AP)(config)# wlan ssid-profile (Instant AP)(SSID Profile )# type { | | } (Instant AP)(SSID Profile )# auth-server (Instant AP)(SSID Profile )# auth-survivability (Instant AP)(SSID Profile )# exit (Instant AP)(config)# auth-survivability cache-time-out (Instant AP)(config)# end (Instant AP)# commit apply To view the cache expiry duration: (Instant AP)# show auth-survivability time-out To view the information cached by the W-IAP: (Instant AP)# show auth-survivability cached-info To view logs for debugging: (Instant AP)# show auth-survivability debug-log 175 | Authentication and User Management Dell Networking W-Series Instant 6.4.3.1-4.2.0.0 | User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403

175
| Authentication and User Management
Dell Networking W-Series Instant 6.4.3.1-4.2.0.0 | User Guide
Enabling Authentication Survivability
You can enable authentication survivability for a wireless network profile through the UI or CLI.
In the Instant UI
To configure authentication survivability for a wireless network:
1. On the
Network
tab, click
New
to create a new network profile or select an existing profile for which you
want to enable authentication survivability and click
edit
.
2. In the
Edit <profile-name>
or
New WLAN
window, ensure that all required WLAN and VLAN attributes
are defined, and then click
Next
.
3. On the
Security
tab, under
Enterprise
security settings, select an existing authentication server or create a
new server by clicking
New
.
4. To enable authentication survivability, select
Enabled
from the
Authentication survivability
drop-down.
On enabling this, the W-IAP authenticates the previously connected clients using EAP-PEAP and EAP-TLS
authentication when connection to the external authentication server is temporarily lost.
5. Specify the cache timeout duration, after which the cached details of the previously authenticated clients
expire. You can specify a value within the range of 1-99 hours and the default cache timeout duration is 24
hours.
6. Click
Next
and then click
Finish
to apply the changes.
Important Points to Remember
l
Any client connected through CPPM and authenticated through W-IAP remains authenticated with the W-
IAP even if the client is removed from the CPPM server during the CPPM downtime.
l
Do not make any changes to the authentication survivability cache timeout duration when the
authentication server is down.
l
For EAP-PEAP authentication, ensure that the CPPM 6.0.2 or later version is used for authentication. For
EAP-TLS authentication, any external or third-party server can be used.
l
For EAP-TLS authentication, ensure that the server and CA certificates from the authentication servers are
uploaded on W-IAP. For more information, see
Uploading Certificates on page 186
.
In the CLI
To configure authentication survivability for a wireless network:
(Instant AP)(config)# wlan ssid-profile <name>
(Instant AP)(SSID Profile <name>)# type {<Employee> | <Voice>| <Guest>}
(Instant AP)(SSID Profile <name>)# auth-server <server-name1>
(Instant AP)(SSID Profile <name>)# auth-survivability
(Instant AP)(SSID Profile <name>)# exit
(Instant AP)(config)# auth-survivability cache-time-out <hours>
(Instant AP)(config)# end
(Instant AP)# commit apply
To view the cache expiry duration:
(Instant AP)# show auth-survivability time-out
To view the information cached by the W-IAP:
(Instant AP)# show auth-survivability cached-info
To view logs for debugging:
(Instant AP)# show auth-survivability debug-log