68
A100K11194
Turbine Station Conguration Guide
The dierent authentication methods are:
● EAP-MSCHAPV2
● EAP-MD5
● EAP-TTLS with PAP
● PEAP with MSCHAPV2
● EAP-TLS
EAP-MSCHAPV2 and EAP-MD5 will encrypt the password.
EAP-TTLS with PAP and PEAP with MSCHAPV2 will encrypt both the Username and Password.
The parameters to congure depend on the authentication method:
802.1X status: Enable or disable 802.1X.
Username: The user name that identies a station.
Password: The password associated with the user name.
Fake username: The fake user name sent outside of the encrypted tunnel with EAP-TTLS with PAP
and PEAP with MSCHAPV2. The user name is encrypted.
Verifyserverwithcerticate: [EAP-TTLS with PAP, PEAP with MSCHAPV2 and EAP-TLS
only] Species that the client veries that server certicates presented to the client have the correct
signatures, have not expired, and were issued by a trusted root certication authority (CA). It’s
enabled by default.
Fast Re-Authentication: Re-authenticates the clients connected to 802.1x-enabled interfaces.
Get new DHCP on success: If 802.1X authentication is successful, the station will restart its DHCP
client.
InsertCACerticate: [EAP-TTLS with PAP, PEAP with MSCHAPV2 and EAP-TLS only] Uploads
certicate (public key) used by authentication server. This is not required if the Verify server with
certicate option is disabled.
InsertUserPublicCerticate: [EAP-TLS only] Uploads certicate (public key) used by
authentication client (user).
Insert User Private Key: [EAP-TLS only] Uploads the private key that is paired with the user public
certicate.
● Click SAVE to save the current settings
● Click REBOOT
The new 802.1X settings will only come into eect after the reboot.