Configuring RADIUS Settings for Wireless Clients 211
Configuring the External RADIUS Server
NOTE: In the FreeRADIUS database, the MAC address is case sensitive, and the
octets must be separated by hyphens.
00-11-95-a3-32-80 Auth-Type := Local, User-Password=="NOPASSWORD"
D-Link-Wireless-AP-Mode = WS-Managed,
D-Link-Wireless-AP-Location = "Lobby AP",
D-Link-Wireless-AP-Profile-ID = 1,
D-Link-Wireless-AP-Switch-IP = 192.168.30.4,
D-Link-Wireless-AP-Radio-1-Chan = Auto,
D-Link-Wireless-AP-Radio-2-Chan = Auto,
D-Link-Wireless-AP-Radio-1-Power = Auto,
D-Link-Wireless-AP-Radio-2-Power = Auto
Configuring RADIUS Settings for Wireless Clients
You can configure D-Link Access Points to use 802.1X authentication on the RADIUS server
to allow or deny specific users on client stations access to the wireless network. If you enable
802.1X authentication, the client entry on a RADIUS server can support user-based VLANs
and subnet assignments for IP tunneling. Table 81 shows the attributes to set for wireless
clients within the RADIUS server.
Configuring RADIUS for Client MAC Authentication
You can configure the AP to use RADIUS-based MAC authentication to allow or deny
specific client stations access to the wireless network. Although this method is less secure than
802.1X, you can use it for client stations that do not support 802.1X.
The addresses you enter are either allowed or denied based on the global default action within
the AP profile.
Table 82 indicates the attributes that you configure in the RADIUS server entry.
Table 81. RADIUS Attributes for Wireless Clients
RADIUS Server
Attribute
Description Range Usage
User-Name (1) 1-32 characters Required
User-Password (2) 1-128 characters Required
Tunnel-Medium-Type
(65)
802 Optional
Table 82. RADIUS Attributes for Wireless Client MAC Authentication
RADIUS Server
Attribute
Description Range Usage
User-Name (1) Ethernet Address of the client
station.
Valid Ethernet
MAC Address.
Required
User-Password (2) A fixed password used to
lookup a client MAC entry.
NOPASSWORD Required