User Guide
Table Of Contents
- WFS709TP ProSafe Smart Wireless Switch Software Administration Manual
- Contents
- About This Manual
- Chapter 1 Overview of the WFS709TP
- Chapter 2 Deploying a Basic WFS709TP System
- Chapter 3 Configuring Network Parameters
- Chapter 4 RF Plan
- Chapter 5 Configuring WLANS
- Chapter 6 Configuring AAA Servers
- Chapter 7 Configuring 802.1x Authentication
- Chapter 8 Configuring the Captive Portal
- Chapter 9 Configuring MAC-Based Authentication
- Chapter 10 Adding Local WFS709TPs
- Chapter 11 Configuring Redundancy
- Chapter 12 Configuring Wireless Intrusion Protection
- Chapter 13 Configuring Management Utilities
- Chapter 14 Configuring WFS709TP for Voice
- Appendix A Configuring DHCP with Vendor-Specific Options
- Appendix B Windows Client Example Configuration for 802.1x
- Appendix C Internal Captive Portal
- Appendix D Related Documents
- Index

WFS709TP ProSafe Smart Wireless Switch Software Administration Manual
7-2 Configuring 802.1x Authentication
v1.0, June 2007
You can terminate the 802.1x authentication on the WFS709TP. The switch passes user
authentication to its internal database or to a “backend” non-802.1x server. This feature, also
called AAA FastConnect, is useful for deployments where an 802.1x EAP-compliant RADIUS
server is not available or required for authentication.
Authentication with a RADIUS Server
Figure 7-1 is an overview of the parameters that you need to configure on authentication
components when the authentication server is an 802.1x EAP-compliant RADIUS server.
The supplicant and authentication server must be configured to use the same EAP type. The
WFS709TP does not need to know the EAP type used between the supplicant and authentication
server.
Figure 7-1
Client
(Supplicant)
WFS709TP
(Authenticator)
EAP type
Server IP
Shared secret
Auth port
Acct port
Client IP
Shared secret
ESSID
Network authentication
Data encryption
ESSID
Network authentication
Data encryption
EAP type
Authentication
server