Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Examining 802.11i and WPA: Page 7 of 7

Proxy support is an important feature in WLAN RADIUS servers especially if the network has an existing AAA server. Proxy support lets the server maintain accounting information and user data in a database that also holds information pertaining to conventional RADIUS usage, such as dial-up, VPN and firewall-access data. The challenge in proxy support is to account for tunneling user access, which by virtue of design is hidden.

The host of EAP authentication types is a distinguishing factor in RADIUS servers. By default, all servers support mutual authentication through tunneled protocols like TTLS, PEAP and TLS. They differ in the type of internal authentication mechanism they can support, which is highly dependent on the ID stores they authenticate against. For example Funk's Odyssey server supports TTLS with MS-CHAP-v2 as its internal authentication mechanism because it is closely integrated with Active Directory.

A WLAN RADIUS server defines user-specific check and reply attributes, such as NAS-IP address, session time-out, idle time-out and framed IP address. A WLAN RADIUS server also defines attributes to groups and realms that are later applied on users defined in its local database. RADIUS servers like Interlink's Secure.XS also can restrict a user's access based on his or her organization role. Some servers can restrict concurrent logons by keeping track of the sessions provisioned by the server.

WLAN RADIUS servers are carving their own niche in the secure access market. However, don't expect the robustness of a conventional RADIUS server in these access-specific products.