EasyManua.ls Logo

Extreme Networks Summit WM3000 Series - Page 403

Extreme Networks Summit WM3000 Series
513 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Summit WM3000 Series Controller System Reference Guide 403
3 Refer to the Authentication field to define the following Radius authentication information:
EAP and Auth Type
Specify the EAP type for the Radius server.
PEAP
uses a TLS layer on top of EAP as a carrier for other EAP
modules. PEAP is an ideal choice for networks using legacy EAP
authentication methods.
TTLS
is similar to EAP-TLS, but the client authentication portion of
the protocol is not performed until after a secure transport tunnel has
been established. This allows EAP-TTLS to protect legacy
authentication methods used by some Radius servers.
Auth Data Source
Use
Auth Data Source
drop-down menu to select the data source for the
local Radius server.
If
Local
is selected, the controller’s internal user database serves as
the data source for user authentication. Refer to the
Users
and
Groups
tabs to define user and group permissions for the controller’s local
Radius server.
If
LDAP
is selected, the controller uses the data within an LDAP
server.
Cert Trustpoint
Click the
View/Change
button to specify the trustpoint from which the
Radius server automatically grants certificate enrollment requests. A
trustpoint is a representation of a CA or identity pair. A trustpoint
contains the identity of the CA, CA-specific configuration parameters, and
an association with one enrolled identity certificate. If the server
certificate trustpoint is not used, the default trustpoint is used instead.