WESM zl Management and Configuration Guide WT.01.28 and greater
11-3
RADIUS Server
RADIUS Authentication
RADIUS Authentication
The Wireless Edge Services zl Module’s RADIUS authentication server fulfils these
roles:
■ decides whether a user can connect to a WLAN that enforces one of these types
of security:
• 802.1X
• Web authentication (Web-Auth)
• MAC authentication
■ makes the decision based on credentials stored in one of these locations:
• user accounts configured on the module itself
• user accounts on a Lightweight Directory Access Protocol (LDAP) server,
such as Novell eDirectory
■ specifies policies (such as a dynamic virtual LAN (VLAN) assignment) for
authenticated users
For 802.1X authentication, the module’s internal RADIUS server supports these
Extensible Authentication Protocol (EAP) methods:
■ EAP-Transport Layer Security (TLS)
■ EAP-Tunneled TLS (TTLS) with Message Digest 5 (MD5)
■ EAP-TTLS with Password Authentication Protocol (PAP)
■ Protected EAP (PEAP) with Generic Token Card (GTC)
■ PEAP with Microsoft Challenge Handshake Authentication Protocol version 2
(MSCHAPv2)
All of these methods are suitable for a wireless network. That is, they not only enable
a wireless user to authenticate securely, they also help the Wireless Edge Services zl
Module and the station to generate a unique encryption key for the association. This
key can be either for Wired Equivalent Privacy (WEP) or the more secure Wi-Fi
Protected Access (WPA).
Table 11-1 summarizes the characteristics of these different EAP types.