WESM zl Management and Configuration Guide WT.01.XX and greater
11-36
RADIUS Server
RADIUS Authentication
8. Do not enter anything in the RADIUS Shared Secret field.
By default, the module can communicate with the internal server. If you
enter a string in this field, the module’s internal server will no longer work
on this WLAN. If you do change the secret, you can fix the problem in one
of two ways:
• Clear the RADIUS Shared Secret field and click OK. The secret returns
to the default.
• Configure the loopback interface (127.0.0.1) as a client for the internal
RADIUS server. Specify the new secret for the client. See “Adding
RADIUS Clients” on page 11-31.
9. If you want the module’s RADIUS server to periodically re-authenticate
stations, check the Re-authentication box. Then specify how often (in
seconds) stations re-authenticate in the Re-authentication Period field.
The valid range for the re-authentication period is 30 to 65535 seconds
(about 18 hours). The default setting is 3600 seconds (1 hour).
10. Choose CHAP or PAP for the Authentication Protocol.
This setting determines how the Wireless Edge Services zl Module for-
wards MAC authentication or Web-Auth credentials to an external server.
The module’s internal RADIUS server supports both protocols. However,
if you choose PAP, users’ passwords display in plaintext in logs. Generally,
you should choose CHAP for higher security.
11. Click the OK button.
12. On the Edit screen, click the OK button.
13. Click the Save link at the top of the Web browser interface to save the
changes to the startup-config.