"Patrick Mowry (DHL US)" <[EMAIL PROTECTED]> wrote:
>   My understanding of Wireless 802.1x supports boils down to the AP
> passing the EAP authentication to the backend radius server after the
> initial EAPOL, but the actual EAP type used is up to the supplicant.

  Yes, but the server has to agree.

> I would like to use EAP-TLS for an SSID for wireless LAN access, and
> LEAP (no other choice :( ) for wireless phones.  But if the SSIDs
> are configured on all APs, All APs point to a single FreeRadius
> Backend configured for TLS, LEAP and PEAP; how do I prevent a
> compromised LEAP account from being used to access the SSID
> supposedly secured by EAP-TLS?

  Is the SSID in the RADIUS packet?  If not, you can't key off of SSID
to force EAP types.

>   Watching the logs with radiusd -X -A I do not see a field I can key
> off of to limit the EAP type allowed.

  In the "users" file, you can do:

bob  EAP-Type := Cisco-LEAP

  to force that user to use a specific EAP type.  See share/dictionary
for the known VALUE's of the EAP-Type attribute.

  Alan DeKok.

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to