When you configure 802.1X authentication methods, the process requires three steps:
The sections that follow show how to make these configurations. Configuring the AP for RADIUS ConnectionThe AP must be configured to connect to the appropriate RADIUS server. Open the Server Manager tab on the AP (this is done by following Security > Server Manager). Figure 8-9 shows the resulting Server Manager page. Figure 8-9. Configuring the RADIUS Server on the Server Manager PageOn this page, do the following:
Alternately, you can make this configuration from the command-line interface if you use the following commands: AP# configure terminal AP(config)# aaa group server radius rad_eap AP(config-sg-radius)# server 192.168.1.105 auth-port 1630 acct-port 1631 AP(config-sg-radius)# exit AP(config)# aaa new-model AP(config)# aaa authentication login eap_methods group rad_eap AP(config)# radius-server host 192.168.1.105 auth-port 1630 acct-port 1631 key w@lth3r99k AP(config)# end AP# copy running-config startup-config Configuring the RADIUS ServerThe second step in connecting to a RADIUS server is to configure the RADIUS server to use the AP as an AAA client. The example in this section uses Cisco Secure ACS as the RADIUS server. If you use a different RADIUS server, you should refer to the server's documentation. Setting up the AP as an AAA client in Cisco Secure ACS is done on the Network Configuration page, as illustrated in Figure 8-10. Figure 8-10. Configuring Cisco Secure ACS to Use the AP as a ClientOn this page, enter the following information:
You must also configure the RADIUS server to use the authentication method that you select for the AP. You can accomplish this in Cisco Secure ACS if you configure the Global Authentication Setup page (click System Configuration > Global Authentication Method). Again, if you use a different RADIUS server, check the manufacturer's documentation. Figure 8-11 shows the Global Authentication Setup page with the authentication server configured to use EAP-TLS. Figure 8-11. Enabling EAP Authentication Methods on Cisco Secure ACSNote Enabling PEAP or EAP-TLS requires the installation of a server certificate on ACS. Defining AuthenticationAfter the RADIUS server and the AP know they can talk to each other to share authentication data, the final step is to configure the AP to actually use 802.1X authentication methods. First, open the Security Encryption Manager on the AP (select Security > Encryption Manager), as illustrated in Figure 8-12. Figure 8-12. Setting Up the AP to Use EAPNext, do the following:
You can also apply these settings from the CLI using the following commands: AP# configure terminal AP(config)# interface dot11radio 0 AP(config-if)# encryption mode wep mandatory AP(config-if)# end AP# write memory The next settings are made on the AP SSID Manager tab (Security > SSID Manager), as illustrated in Figure 8-13. Figure 8-13. EAP Configuration Steps on the SSID Manager PageEnter the following settings:
Alternately, you can make these settings from the CLI using the following commands: AP# configure terminal AP(config)# interface dot11radio 0 AP(config-if)# ssid ssid qbranch AP(config-if-ssid)# authentication open eap eap_methods AP(config-if-ssid)# authentication network-eap eap_methods AP(config-if-ssid)# end AP# write memory |