wlan auth-server
wlan auth-server <auth_profile_name>
acct-modifier
acctport <accounting-port>
auth-modifier
cppm [username <username> password <password>]
cppm-rfc3576-only
cppm-rfc3576-port <rfc3576-port>
deadtime <time>
drp-ip <IP> <mask> vlan <vlan> gateway <gateway>
ip <host>
key <key>
msg-auth-required
nas-id <ID>
nas-ip <IP-address>
port <port>
radsec [port <port>]
radsec-ciphers-level {all|high}
retry-count <count>
rfc3576
rfc5997 {auth-only|acct-only}
service-type-framed-user {1x|cp|mac}
timeout <value>
no...
Description
This command configures an external RADIUS server for user authentication and Policy Manager server as a RADIUS server for AirGroup CoA requests.
|
Parameter |
Description |
|
wlan auth-server <auth_profile_name> |
Configures the external RADIUS server authentication profile. |
|
acct-modifier |
Attributes modifier for accounting request. |
|
acctport <accounting-port> |
Configures the accounting port number used for sending accounting records to the RADIUS server. 1813 |
|
auth-modifier |
Attributes modifier for access request. |
|
cppm [username <username> password <password>] |
Configures a and for the Policy Manager server . |
|
cppm-rfc3576-only |
Configures a ClearPass Policy Manager server used for AirGroup CoA with RFC3576 only. The ClearPass Policy Manager server acts as a RADIUS server and asynchronously provides the Air Group parameters for the client device, including shared user, shared role and shared location. |
|
cppm-rfc3576-port <rfc3576-port> |
Configures the port number for sending AirGroup CoA, instead of the standard CoA port. 5999 |
|
deadtime <time> |
Configures a dead time interval for the authentication server. When two or more authentication servers are configured on the Instant AP and a server is unavailable, the dead time configuration determines the duration for which the authentication server would be available if the server is marked as unavailable. 1–1440 minutes 5 minutes |
|
drp-ip <IP-address> <mask> vlan <vlan> gateway <gateway-IP-address> |
Configures the IP address, net mask and VLAN, which will be used as source address and VLAN for RADIUS packets. Before configuring DRP IP address, ensure that dynamic-radius-proxy is enabled, and a static virtual controller IP is configured. |
|
ip <host> |
Configures the IP address or the host name of the RADIUS server. |
|
key <key> |
Configures a shared key communicating with the external RADIUS server. |
|
msg-auth-required |
This parameter controls the discarding of RADIUS packets when message-authenticator is not present. By default, this option is disabled. When enabled, RADIUS packets are discarded when the access point receives Access-Request, Access-Reject, Access-Challenge, CoA-Request, or Disconnect-Request requests and the message-authenticator is not present. When disabled, RADIUS packets are not discarded if the message-authenticator is not present. |
|
nas-id <ID> |
Configures NAS identifier strings for RADIUS attribute 32, which is sent with RADIUS requests to the RADIUS server. |
|
nas-ip <IP> |
Configures the Virtual Controller IP address as the NAS address which is sent in data packets. |
|
port <port> |
Configures the authorization port number of the external RADIUS server. 1812 |
|
radsec [port <port>] |
The command enables secure communication between the RADIUS server and Instant AP clients by creating a TLS tunnel between the Instant AP and the server. When RadSec is enabled, the command can be used for specifying the communication port number for RadSec TLS connection. 1–65534 2083 |
|
radsec-ciphers-level {all|high} |
Includes or excludes SHA1 cipher suites. By default, the radsec-ciphers-level parameter is not configured and set to all. all—Includes all currently supported cipher suites. high—Excludes SHA1 cipher suites. all |
|
no radsec-ciphers-level |
Changes the configuration to the default setting. |
|
retry-count <count> |
Configures the maximum number of authentication requests that can be sent to the server group. 1-5 3 |
|
rfc3576 |
Allows the Instant APs to process RFC 3576-compliant CoA and disconnect messages from the RADIUS server. Disconnect messages cause a user session to be terminated immediately, whereas the CoA messages modify session authorization attributes such as data filters. Disabled |
|
rfc5997 {auth-only|acct-only} |
When enabled, this parameter allows the Instant AP to send a status-server request to determine the actual status of the authentication or accounting server. This proves useful when there is a authentication or request time —RFC5997 support enabled for both authentication and accounting on the authentication server. —RFC5997 support enabled for authentication only. acct-only—RFC5997 support enabled for accounting only —Disables RFC5997 support for the authentication server. Disabled |
|
service-type-framed-user {1x|cp|mac} |
Changes the service type to frame for the following RADIUS authentication methods: 1x—Changes Service-Type to Framed for 802.1X authentication. cp—Changes Service-Type to Framed for Captive Portal authentication. mac—Changes Service-Type to Framed for MAC authentication. 1x, cp, mac |
|
timeout <value> |
Configures a timeout value in second to determine when a RADIUS request must expire. The Instant AP retries to send the request several times (as configured in the Retry count), before the user gets disconnected. For example, if the Timeout is 5 seconds, Retry counter is 3, user is disconnected after 20 seconds. 1 to 30 seconds 5 seconds |
|
no… |
Removes the parameter configuration. |
Example
The following example configures the external RADIUS server parameters:
(Instant AP)(config)# wlan auth-server RADIUS1
(Instant AP)(Auth Server <RADIUS1>)# ip 192.0.0.5
(Instant AP)(Auth Server <RADIUS1>)# key SecretKey
(Instant AP)(Auth Server <RADIUS1>)# port 1812
(Instant AP)(Auth Server <RADIUS1>)# acctport 1813
(Instant AP)(Auth Server <RADIUS1>)# cppm username admin password eTIPS123
(Instant AP)(Auth Server <RADIUS1>)# rfc3576
(Instant AP)(Auth Server <RADIUS1>)# rfc5997 auth-only
(Instant AP)(Auth Server <RADIUS1>)# no nas-id
(Instant AP)(Auth Server <RADIUS1>)# no nas-ip
(Instant AP)(Auth Server <RADIUS1>)# drp-ip 192.0.2.11 255.255.255.255 vlan 200 gateway 192.0.2.15
(Instant AP)(Auth Server <RADIUS1>)# timeout 10
(Instant AP)(Auth Server <RADIUS1>)# retry-count 3
(Instant AP)(Auth Server <RADIUS1>)# service-type-framed-user cp
(Instant AP)(Auth Server <RADIUS1>)# msg-auth-required
(Instant AP)(Auth Server <RADIUS1>)# end
(Instant AP)# commit apply
Command History
|
Release |
Modification |
|
HPE Aruba NetworkingInstant 8.13.0.0 |
The parameter was added. |
|
HPE Aruba NetworkingInstant 8.12.0.0 |
The parameter was added. |
|
Instant AOS-8.4.0.0 |
The parameter was added. |
|
Instant AOS-8.3.0.0 |
Command introduced. |
Command Information
|
Platform |
Command Mode |
|
All platforms |
Configuration mode and authentication server profile sub-mode. |