Authentication Support Matrix
It is important to understand the compatibility between AAA servers and different WLANs.
Proxy Mode
In proxy mode, authentication requests are set through the controller.
Authentication Source | 802.1X | HS 2.0 Secure | Web Auth | Hotspot/WISPr |
---|---|---|---|---|
Local Database | No | Yes | No | Yes |
IDM-Provisioned Local DB | Yes | Yes | NA | NA |
Active Directory | No* | No | Yes | Yes |
RADIUS | Yes | Yes | Yes | Yes |
LDAP | Yes | No | Yes | Yes |
To support 802.1X with Active Directory, an external RADIUS server (such as NPS) must be used.
Non-proxy Mode
In the Non-proxy mode, authentication requests are sent directly by AP and not through the controller. The local database is stored on the controller, therefore, authentication sources such as local database and IDM-provisioned local databases are not supported.
Authentication Source | 802.1X | Zero-IT Onboard | HS 2.0 Onboard | HS 2.0 Secure | Web Auth | Hotspot/WISPr |
---|---|---|---|---|---|---|
Active Directory | No | No* | No* | No | Yes | No |
RADIUS | Yes | No* | No* | No | Yes | Yes* |
LDAP | No | No* | No* | No | Yes | No |
(*) From the configuration it may seem like non-proxy RADIUS is supported in WISPr, but the call flow goes through the controller.
Profile Configuration
The following table details proxy and non-proxy AAA server configurations against various platforms.
Feature | SZ100 | vSZ-E | vSZ-H | Description |
---|---|---|---|---|
Per-Zone ProxyAAA Profiles | NA | NA | NA | Ability to configure a ProxyAAA profile in a specific zone |
Global ProxyAAA Profiles | Yes | Yes | Yes | Ability to configure a ProxyAAA profile globally and then use it across zones |
Per-Zone NonProxy AAA Profiles | NA | NA | Yes | Ability to configure a NonProxyAAA profile in a specific zone |
Global NonProxy AAA Profiles | Yes | Yes | No | Ability to configure a NonProxy AAA profile globally and then use it across zones |
Dynamic Policy Assignment (Proxy Authentication Types)
The following table details dynamic policy assignments across authentication types.
Feature | 802.1X | Zero-IT Onboard | HS 2.0 Onboard | HS 2.0 Secure | Web Auth | Hotspot/WISPr | MAC Auth | Description |
---|---|---|---|---|---|---|---|---|
Dynamic Role Assignment | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Ability to assign a user to a particular local Role via a group/role attribute from RADIUS, AD, LDAP. From SmartZone 3.4, Role can contain UTP. Therefore, , when you assign a role, you also get the ACL and Rate Limiting policies. |
Dynamic VLAN / VLAN Pool | Yes | NA | NA | NA | No | No | Yes | Ability to assign a user to a VLAN through a VLAN attribute from RADIUS, AD, LDAP.
From SmartZone release 3.5, you can also assign VLANs and VLAN pools based on the user role. |
Dynamic UTP | Yes | Yes | Yes | Yes | Ability to assign a user to a UTP through an attribute from an authentication source. | |||
Dynamic ACL | Yes | Yes | Yes | No | Yes | Yes | Yes | Ability to assign a specific ACL to a user through an attribute from RADIUS, AD, LDAP. |
Dynamic Rate Limit | Yes | Yes | Yes | Yes | Yes | Ability to assign a specific Rate Limit to a user through an attribute from RADIUS, AD, LDAP. |
Dynamic Policy Assignment (Non-Proxy Authentication Types)
The following table details dynamic policy assignments across authentication types.
Feature | 802.1X | HS 2.0 Secure | Web Auth | Description |
---|---|---|---|---|
Dynamic Role Assignment | No | Ability to assign a user to a local Role through a group/role attribute from the authentication source. | ||
Dynamic VLAN / VLAN Pool | Ability to assign a user to a VLAN through a VLAN attribute from the authentication source. | |||
Dynamic UTP | Ability to assign a user to a UTP through an attribute from the authentication source.
NOTE From SmartZone release 3.4, UTP contains ACL and rate limit.
|
|||
Dynamic ACL |
Ability to assign a specific ACL to a user through an attribute from the authentication source. NOTE ACLs are a part of a UTP. If you configure a UTP without a rate limit,you effectively only have an ACL.
|
|||
Dynamic Rate Limit | Ability to assign a specific Rate Limit to a user through an attribute from the authentication source.
NOTE Rate limiting is also a part of a UTP. If you configure a UTP without ACL, you effectively only have a rate limiting policy.
|
Other Authentication Features
The following table details authentication support for various authentication features.
Feature | Supported | Description |
---|---|---|
Test AAA - RADIUS | Yes | Ability to test a specific username/password against a configured RADIUS serve. |
Test AAA - Active Directory | Yes | Ability to test a specific username/password against a configured AD serve. |
Test AAA - LDAP | Yes | Ability to test a specific username/password against a configured LDAP serve.
NOTE Only Non-Proxy LDAP is supported at the Zone Level.
|
Test AAA - Return a Role | Yes - supported by RADIUS, AD and LDAP | Ability to return a role assignment when testing a AAA server. |
RADIUS CoA - Change Role | Ability to change a user's Role through a Change of Authorization (CoA). | |
RADIUS CoA - Change VLAN | Ability to change a user's VLAN through a Change of Authorization (CoA). | |
RADIUS CoA - Change ACL | Ability to change a user's ACL through a Change of Authorization (CoA). | |
RADIUS CoA - Change Rate Limit | Ability to change a user's rate limit through a Change of Authorization (CoA). | |
RADIUS CoA - Change Authorization | Ability to authorize or deauthorize a user through a Change of Authorization (CoA). |
PAP/CHAP Support
The following table details PAP and CHAP support for various authentication features.
Feature | 802.1X | Web Auth | Hotspot/ WISPr | MAC Auth | Notes |
---|---|---|---|---|---|
Proxy-Mode | |||||
Active Directory | Yes | Yes* | Yes | No | PAP / CHAP is supported for Web Authentication and HotSpot/WISPr. NPS interface (AD) is required for WebAuthenticaiton (CHAP) and 802.1X (MSCHAPv2). |
RADIUS | Yes | Yes* | Yes | Yes | |
LDAP | Yes | Yes* | Yes | No | PAP / CHAP is supported for Web Authentication and HotSpot/WISPr |
LDAP-TLS | Yes | Yes* | Yes | No | This support is available from SmartZone version 3.5. |
Active Directory (TLS) | Yes | Yes* | Yes | No | This support is available from SmartZone version 3.5. NPS interface (AD) is required for WebAuthenticaiton (CHAP) and 802.1X (MSCHAPv2). |
Non-proxy Mode | |||||
Active Directory | No | Yes* | Yes | No | |
RADIUS | Yes | Yes* | Yes | Yes | |
LDAP | No | Yes* | Yes | No |
set aaa auth-method pap|chapIt is a global setting for all WebAuth WLANs on the AP. The default is CHAP.