Hi,

> Hmm, just thought, some vendors may include the information in the RADIUS 
> packet as VSAs (Vendor Specific Attributes).
> 
> Might be worth running the server in debugging mode (radiusd -X) and see what 
> your wireless controllers
> are actually sending in Access-Request packets.
> 
> So although you won't get the info in the EAP Tunnel, you may find it's 
> available in the RADIUS Access-request
> packets.

I thought the same thing - so had a quick look at our incoming RADIUS 
Access-Requests etc...
and nothing useful buried there - but there again, I havent looked at the other 
end
yet to see if there are other options or VSAs that can be used -  we can 
currently get
such info from the wireless control system - so that information is being 
passed from
the LWAPP/CAPWAP systems to the controller - and a suitable SNMP to the WCS 
from the
RADIUS server would allow you to tie the two together (best done out of band!) 
..
this is probably a useful step for any site wondering whether to drop WPA/TKIP
support for example (for security - move to WPA2/AES) - you'd need to see how
many non-AES clients you had before the change......


alan
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to