ZyXEL NWA3550 User Manual Page 169

  • Download
  • Add to my manuals
  • Print
  • Page
    / 344
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 168
NWA3550 User’s Guide
169
CHAPTER 14
Internal RADIUS Server
The ZyXEL Device can use its internal RADIUS server to authenticate wireless clients. It can
also serve as a RADIUS server to authenticate other APs and their wireless clients. For more
background information on RADIUS, see Section 8.4 on page 119.
14.1 Internal RADIUS Overview
The ZyXEL Device has a built-in RADIUS server that can authenticate wireless clients or
other trusted APs.
The ZyXEL Device can function as an AP and as a RADIUS server at the same time.
PEAP (Protected EAP) and MD5 authentication is implemented on the internal RADIUS
server using simple username and password methods over a secure TLS connection. See the
appendices for more information on the types of EAP authentication and the internal RADIUS
authentication method used in your ZyXEL Device.
Use the AUTH. SERVER > Setting screen to turn the ZyAIR’s internal RADIUS server
off or on and to view information about the ZyXEL Device’s certificates.
Use the AUTH. SERVER > Trusted AP screen to specify APs as trusted. Trusted APs
can use the ZyAIR’s internal RADIUS server to authenticate wireless clients.
Use the AUTH. SERVER > Trusted Users screen to configure a list of wireless client
user names and passwords for the ZyAIR to authenticate.
14.2 Internal RADIUS Server Setting
The AUTH. SERVER > Setting screen displays information about certificates. The
certificates are used by wireless clients to authenticate the RADIUS server. Information
matching the certificate is held on the wireless client’s utility. A password and user name on
the utility must match the Trusted Users list so that the RADIUS server can be authenticated.
Page view 168
1 2 ... 164 165 166 167 168 169 170 171 172 173 174 ... 343 344

Comments to this Manuals

No comments