
NXC CLI Reference Guide
197
CHAPTER 30
Authentication Server
This chapter shows you how to configure the NXC as an authentication server for access
points.
30.1 Authentication Server Overview
The NXC can also work as a RADIUS server to exchange messages with other APs for user
authentication and authorization.
30.2 Authentication Server Commands
The following table lists the authentication server commands you use to configure the NXC’s
built-in authentication server settings.
Table 115 Command Summary: Authentication Server
COMMAND DESCRIPTION
[no] auth-server activate Sets the NXC to act as an authentication server for other
RADIUS clients, such as APs. The
no command sets the NXC
to not act as an authentication server for other APs.
auth-server authentication
auth_method
Specifies an authentication method used by the authentication
server.
no auth-server
authentication
Resets the authentication method used by the authentication
server to the factory default (
default).
[no] auth-server cert
certificate_name
Specifies a certificate used by the authentication server (NXC).
The no command resets the certificate used by the
authentication server to the factory default (
default).
certificate_name: The name of the certificate. You can use
up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=-
characters.
[no] auth-server trusted-
client profile_name
Creates a trusted RADIUS client profile. The
no command
deletes the specified profile.
profile-name: You may use 1-31 alphanumeric characters,
underscores(
_), or dashes (-), but the first character cannot be a
number. This value is case-sensitive.
[no] activate Enables the client profile. The
no command disables the profile.
[no] ip address ip
subnet_mask
Sets the client’s IP address and subnet mask. The no command
clears this setting.
[no] secret secret Sets a password as the key to be shared between the NXC and
the client. The
no command clears this setting.
Komentarze do niniejszej Instrukcji