Does only work with Cisco LEAP.
And well i would be surpised if it would be possiple to somehow cach the
EAP/TLS stuff to  
reuse them later ?!



> -----Original Message-----
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On 
> Behalf Of Matanya Elchanani
> Sent: Thursday, October 07, 2004 6:21 PM
> To: [EMAIL PROTECTED]
> Subject: RE: Authentication for Cisco WDS? 
> 
> 
> > -----Original Message-----
> > From: [EMAIL PROTECTED]
> > [mailto:[EMAIL PROTECTED] On 
> > Behalf Of Alan DeKok
> > Sent: Thursday, October 07, 2004 11:54 AM
> > To: [EMAIL PROTECTED]
> > Subject: Re: Authentication for Cisco WDS? 
> > 
> > Joe Matuscak <[EMAIL PROTECTED]> wrote:
> > > I've got a couple of Cisco 1200 access points set up doing
> > EAP/TLS with
> > > FreeRADIUS (0.9.3) on Fedora Core 2. That seems to be
> > working fine, but I
> > > now want to allow the client devices to roam without having to 
> > > re-authenticate.
> > 
> >   I don't think that will work.  The AP's won't let the 
> user onto the 
> > network until they authenticate.  They also can't get 
> dynamic WEP keys 
> > unless they re-authenticate.
> 
> Alan,
> 
> This can work. Cisco provides a wireless infrastructure 
> called Wireless Domain Services (WDS - see subject of the 
> thread). One of the services in WDS is "Fast Secure Roaming", 
> eliminating the need to re-auth to RADIUS. Here is a quote 
> from the Cisco WDS doc:
> 
> ==============================================================
> =================================
> Using Cisco Centralized Key Management (CCKM), a device 
> configured to provide Wireless Domain Services (WDS) takes 
> the place of the RADIUS server and authenticates the client 
> so quickly that there is no perceptible delay in voice or 
> other time-sensitive applications ... The WDS device 
> maintains a cache of credentials for CCKM-capable client 
> devices on your wireless LAN. When a CCKM-capable client 
> roams from one access point to another, the client sends a 
> reassociation request to the new access point, and the new 
> access point relays the request to the WDS device. The WDS 
> device forwards the client's credentials to the new access 
> point, and the new access point sends the reassociation 
> response to the client. Only two packets pass between the 
> client and the new access point, greatly shortening the 
> reassociation time. The client also uses the reassociation 
> response to generate the unicast key. 
> ==============================================================
> =================================
> 
> Joe,
> 
> To get this to work, you will need to have a 6500 with a WLSM 
> module, and WLSE running on CiscoWorks. The whole thing is 
> well documented in the Cisco doc: 
> http://www.cisco.com/en/US/products/hw/wireless/ps4570/product
s_configuration_guide_chapter09186a0080208a6e.html

--
Matanya


- 
List info/subscribe/unsubscribe? See
http://www.freeradius.org/list/users.html



- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to