User's Manual Part 2

Table Of Contents
Copyright © 2004, Vivato, Inc. Vivato Wi-Fi AP/Bridge User Guide 129
Enable Level Command Descriptions
Configuration Using The Command Line Interface
Windows 2000 Internet Access Server Setup
Use the following guidelines when configuring EAP/TLS/PEAP on your Windows 2000
IAS to work with the Vivato Wi-Fi AP/Bridge. For more information on configuring
Microsoft® Windows® XP clients and a Windows 2000® Internet Access Server (Win2K
IAS) for EAP or PEAP security, see Windows XP Win2kIAS Deployment.pdf© on the
Vivato 2.4 GHz Wi-Fi AP/Bridge CD.
To work with Win2K IAS, users should be grouped based on the VLAN ID in the Active
Directory. A policy for each user group must be added by, 1) setting the “Windows Group”
as the “condition to match” and selecting the user group.
(1) Encryption Key Length - Set by Profile>Encryption: Use either (a) Basic : 64 bit key,
or (b) Strongest: 128 bit key. Regardless of the type of RADIUS server used, encryption
must conform to RFC 2548 MS-MPPE-Encryption-Types.
(2) Session Timeout - Set by Profile>Dial-in Constraint>Restrict Maximum Session To:
Value: session timeout period (minutes). When a client reaches session timeout, the Wi-Fi
AP/Bridge forces the client to re-authenticate and deliver new session key. Regardless of the
type of RADIUS server used, operation must conform to RFC 2865 Attribute Type 27.
(3) Key Refresh Timeout - Set by Profile>Advanced>Vendor Specific Attribute: Vendor
code: 14615 Confirm to RADIUS RFC: Yes. Vendor Type: 60. Attribute format: Decimal.
Attribute value: key refresh period (minute). When a client reaches key refresh timeout, the
Wi-Fi AP/Bridge delivers a new session key to the client.
The administrator may configure: (a) Key refresh and session timeout. (b) Key refresh only.
(c) Session timeout only. If Key Refresh Timeout >= Session Timeout, the Key Refresh
Timeout is ignored.
If item 1 is changed on the Windows 2000 IAS, then the Wi-Fi AP/Bridge needs to be
rebooted in order to force all clients to re-authenticate using the new policy. Items 2 and 3
can be changed and applied to the next authenticated client without system reboot.
Wi-Fi AP/Bridge EAP Configuration Example
The following example shows how EAP may be configured on the Wi-Fi AP/Bridge to
work with Windows 2000 IAS:
Note: When making changes to an existing EAP configuration, you should disable
EAP before making the changes, and then re-enable EAP after making the
changes to re-initialize EAP using the new configuration.
vivato (config)# no eap
vivato (config)# eap server 1 191.173.0.149 1812
vivato (config)# eap secret 1 eapsecretforpeap
vivato (config)# eap server 2 191.173.0.150 1812
vivato (config)# eap secret 2 secondaryeapsecret
vivato (config)# eap