Users Guide

Table Of Contents
Dell PowerConnect ArubaOS 5.0 | User Guide 802.1x Authentication | 255
authentication server; server-derived user roles take precedence over default roles. For more information
about policies and roles, see Chapter 10, “Roles and Policies” .
3. Configure the authentication server(s) and server group. The server can be an 802.1x RADIUS server or, if you
are using AAA FastConnect, a non-802.1x server or the controller’s internal database. If you are using EAP-
GTC within a PEAP tunnel, you can configure an LDAP or RADIUS server as the authentication server (see
Chapter 8, “Authentication Servers” ) If you are using EAP-TLS, you need to import server and CA
certificates on the controller (see “Configuring and Using Certificates with AAA FastConnect” on page260).
4. Configure the AAA profile.
Select the 802.1x default user role.
Select the server group you previously configured for the 802.1x authentication server group.
5. Configure the 802.1x authentication profile. See “Using the WebUI” on page273
6. Configure the virtual AP profile for an AP group or for a specific AP:
Select the AAA profile you previously configured.
In the SSID profile, configure the WLAN for 802.1x authentication.
For details on how to complete the above steps, see “Example Configurations” on page262
Using the WebUI
This section describes how to create and configure a new instance of an 802.1x authentication profile in the
WebUI or the CLI.
1. Navigate to the Configuration > Security > Authentication > L2 Authentication page.
2. In the Profiles list, select 802.1x Authentication Profile.
3. Enter a name for the profile, then click Add.
4. Click Apply.
5. In the Profiles list, select the 802.1x authentication profile you just created.
6. The profile details window includes Basic and Advanced tabs for basic and advanced configuration settings.
Click on one or both of these tab to configure the 802.1x Authentication settings. Table 52 describes the
parameters you can configure in the high-throughput radio profile.
Note: The Policy Enforcement Firewall Virtual Private Network (PEFV) module provides identity-based security for wired and
wireless users and must be installed on the controller. The stateful firewall allows user classification based on user identity,
device type, location and time of day and provides differentiated access for different classes of users. For information about
obtaining and installing licenses, see Chapter 27, “Software Licenses” .
Table 52 802.1x Authentication Profile Basic WebUI Parameters
Parameter Description
Basic 802.1x Authentication Profile settings
Max authentication failures Number of times a user can try to login with wrong credentials after which the user will be
blacklisted as a security threat.
Set to 0 to disable blacklisting, otherwise enter a non-zero integer to blacklist the user after the
specified number of failures.
Default: 0
Enforce Machine
Authentication
(For Windows environments only) Select this option to enforce machine authentication before
user authentication. If selected, either the Machine Authentication Default Role or the User
Authentication Default Role is assigned to the user, depending on which authentication is
successful. This option is disabled by default.
NOTE: This option may require a license (see Chapter 27 on page527).The Enforce Machine
Authentication checkbox is also available on the Advanced settings tab.