
8686 | Wireless Network Profiles
Dell PowerConnect W-Series Aruba Instant 6.2.1.0-3.3 | User Guide
l Dynamic WEP with 802.1X
2. If you do not want to use a session key from the RADIUS Server to derive pair wise unicast keys, set Session
Key for LEAP to Enabled. This is required for old printers that use dynamic WEP through Lightweight Extensible
Authentication Protocol (LEAP) authentication. The Session Key for LEAP feature is Disabled by default.
3. To terminate the EAP portion of 802.1X authentication on the OAW-IAP instead of the RADIUS server, set
Termination to Enabled.
Enabling Termination can reduce network traffic to the external RADIUS server by terminating the authorization
protocol on the OAW-IAP. By default, for 802.1X authorization, the client conducts an EAP exchange with the
RADIUS server, and the OAW-IAP acts as a relay for this exchange. When Termination is enabled, the OAW-
IAP by itself acts as an authentication server and terminates the outer layers of the EAP protocol, only relaying
the innermost layer to the external RADIUS server.
If you are using LDAP for authentication, ensure that AP termination is configured to support EAP.
4. Configure an authentication server by using the Authentication server 1 drop-down list:
l Select an authentication server from the list if an external servers are already configured.
l Select New to configure any of the following servers as an external RADIUS server:
n RADIUSServer
n LDAP Server
n CPPMServer for AirGroup CoA
For information on configuring external servers, see Configuring an External Server for Authentication
on page 124.
l To use an internal server, select Internal server and add the clients that are required to authenticate with the
internal RADIUS server. Click the Users link to add the users. For information on adding a user, see
Configuring Users on page 129.
5. Specify a value for Reauth interval. When set to a value greater than zero, APs periodically reauthenticate all
associated and authenticated clients.
6. To enable blacklisting of the clients with a specific number of authentication failures, select Enabled from the
Blacklisting drop-down list and specify a value for Max authentication failures. The users who fail to
authenticate the number of times specified in Max authentication failures field are dynamically blacklisted.
7. To enable accounting, select Enabled from the Accounting drop-down list. On setting this option to Enabled,
APs post accounting information to the Radius server at the specified Accounting interval.
8. To enable authentication survivability, set Authentication survivability to Enabled. Specify a value in hours for
Cache timeout (global) to set the duration after which the authenticated credentials in the cache must expire.
When the cache expires, the clients are required to authenticate again. You can specify a value within range of 1
to 99 hours and the default value is 24 hours.
The authentication survivability feature requires ClearPass Policy Manager 6.0.2 or later, and is available
only when the New server option is selected authentication. On setting this parameter to Enabled, AOS-
W Instant authenticates the previously connected clients using EAP-PEAP authentication even when
connectivity to ClearPass Policy Manager is temporarily lost. The Authentication survivability feature is
not applicable when a RADIUS server is configured as an internal server.
9. Specify the following parameters to configure the MAC address based authentication under MAC
authentication.
Comentarios a estos manuales