User's Manual

Table Of Contents
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing
148
Enable802.1XAuth turns the service on (
y
) and off (
n
, the
default).
Use
EnableEAP-MD5 to enable (
y
) or disable (
n
) support for the
EAP-MD5 protocol.
EnableEAP-TLS enables or disables
support for EAP-TLS.
NOTE: CRL-check-
ing must be glob-
ally enabled (the
default), as described in
Section 4.4.1, in order
for the EAP-TLS CRL
function to operate.
EnableCRLCheck
applies only to EAP-TLS, and determines
whether certificates used to authenticate 802.1X supplicants
are checked against the lists of certificates that have been
revoked by their issuing authorities.
CRLCheck is
Disabled
by
default. When the function is
Enabled
, supplicant certificate
chains are traced back to a trusted root certificate and each
certificate's serial number is checked against the contents of
the issuing authority’s CRL to verify that none of the certificates
in the chain have been revoked, as described in RFC 3280.
TLSCipherSuite also applies only to EAP-TLS, and specifies
the list of supported cipher suites, or sets of encryption and
integrity algorithms, that the 802.1X service will accept:
All
- the default, supports both
Legacy
and
Suite B
cipher suites (below)
Legacy
- supports Diffie-Hellman with RSA keys
(
DHE-RSA-AES128-SHA and DHE-RSA-AES256-SHA)
Suite B
- supports Diffie-Hellman with ECC keys
(
ECDHE-ECDSA-AES128-SHA and ECDHE-ECDSA-
AES256-SHA)
In EAP-TLS, the authentication server selects the cipher
suite to use from the list of supported suites sent by the
client device (or rejects the authentication request if none of
the proposed suites are acceptable).
If you will be using the local user service to authenticate
administrators on the current or a remote Mesh Point (Section
2.1.1), you must enable administrator authentication
(
EnableAdminAuth: y
). It is disabled by default.
4.5.2.5 OCSP Authentication Server Settings
NOTE:
The inter-
nal RADIUS
servers OCSP cache is
intended to store entries
for users’ CACs (Com-
mon Access Cards).
The Online Certificate Status Protocol (OCSP) can be used to
determine the current revocation status of an X.509 digital
certificate, as an alternative to CRLs (Certificate Revocation
Lists). Revocation status determined through OCSP is based
on more current information than is possible with CRLs.