
AOS-W Instant 6.2.1.0-3.3| User Guide Authentication | 117
Chapter 13
Authentication
This chapter provides the following information:
l Understanding Authentication Methods on page 117
l Supported Authentication Servers on page 119
l Understanding Encryption Types on page 120
l Understanding Authentication Survivability on page 121
l Configuring Authentication Servers on page 124
l Configuring Authentication Parameters for Virtual Controller Management Interface on page 127
l Configuring Users on page 129
l Configuring 802.1X Authentication for a Network Profile on page 130
l Configuring MAC Authentication for a Network Profile on page 132
l Configuring MAC Authentication with 802.1X Authentication on page 133
l Configuring Captive Portal Authentication on page 135
l Configuring MAC Authentication with Captive Portal Authentication on page 144
l Configuring Captive Portal Roles for an SSID with 802.1x authentication on page 142
l Configuring Walled Garden Access on page 146
l Configuring WISPr Authentication on page 146
l Blacklisting Clients on page 148
l Uploading Certificates on page 150
Understanding Authentication Methods
Authentication is a process of identifying a user by through a valid username and password. Clients can also be
authenticated based on their MAC addresses.
The following authentication methods are supported inAOS-W Instant:
l 802.1X authentication — 802.1X is a method for authenticating the identity of a user before providing network
access to the user. Remote Authentication Dial In User Service (RADIUS) is a protocol that provides centralized
authentication, authorization, and accounting management. For authentication purpose, the wireless client can
associate to a network access server (NAS) or RADIUS client such as a wireless OAW-IAP. The wireless client
can pass data traffic only after successful 802.1X authentication. For more information on configuring an OAW-
IAP to use 802.1X authentication, see Configuring 802.1X Authentication for a Network Profile on page 130.
l MAC authentication — Media Access Control (MAC) authentication is used for authenticating devices based on
their physical MAC addresses. MAC authentication requires that the MAC address of a machine matches a
manually defined list of addresses. This authentication method is not recommended for scalable networks and
the networks that require stringent security settings. For more information on configuring an OAW-IAP to use
MAC authentication, see Configuring MAC Authentication for a Network Profile on page 132.
l MAC authentication with 802.1X authentication —This authentication method has the following features:
n MAC authentication precedes 802.1X authentication - The administrators can enable MAC authentication for
802.1X authentication. MAC authentication shares all the authentication server configurations with 802.1X
authentication. If a wireless or wired client connects to the network, MAC authentication is performed first. If
MAC authentication fails, 802.1X authentication does not trigger. If MAC authentication is successful, 802.1X
Comentarios a estos manuales