<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AP authenticated with RADIUS? in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/ap-authenticated-with-radius/m-p/2108861#M15089</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Amjad, I knew that but my question is far beyond. Is it possible to authenticate an OfficeExtend AP remotely with RADIUS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means, is it WLC capable of authenticate remote APs agains RADIUS or is this feature not under specifications?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 18 Dec 2012 11:35:21 GMT</pubDate>
    <dc:creator>JPavonM</dc:creator>
    <dc:date>2012-12-18T11:35:21Z</dc:date>
    <item>
      <title>AP authenticated with RADIUS?</title>
      <link>https://community.cisco.com/t5/wireless/ap-authenticated-with-radius/m-p/2108858#M15086</link>
      <description>&lt;P&gt;Is it possible to authenticate an autonomous AP against ACS so no valid AP can be deployed inside the network infraestructure?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean, we wnt to configure APs to validate not only wireless clients through RADIUS but itself with it's own hostname. Any idea on how to deploy it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you guys in advanced.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 06:07:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-authenticated-with-radius/m-p/2108858#M15086</guid>
      <dc:creator>JPavonM</dc:creator>
      <dc:date>2021-07-04T06:07:39Z</dc:date>
    </item>
    <item>
      <title>AP authenticated with RADIUS?</title>
      <link>https://community.cisco.com/t5/wireless/ap-authenticated-with-radius/m-p/2108859#M15087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to configure the switch for port-based authentication then provide the correct credentials on the AP. When the AP is attached to the switch the AP will authenticate via the radius server (that is configured on the switch). only correctly authenticated APs will be allowed on the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tiny.cc/752hpw"&gt;http://tiny.cc/752hpw&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Amjad&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: blue;"&gt;Rating useful replies is more useful than saying &lt;SPAN style="color: green;"&gt; "&lt;SPAN style="text-decoration: underline;"&gt;Thank you&lt;/SPAN&gt;"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Dec 2012 07:04:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-authenticated-with-radius/m-p/2108859#M15087</guid>
      <dc:creator>Amjad Abdullah</dc:creator>
      <dc:date>2012-12-18T07:04:12Z</dc:date>
    </item>
    <item>
      <title>AP authenticated with RADIUS?</title>
      <link>https://community.cisco.com/t5/wireless/ap-authenticated-with-radius/m-p/2108860#M15088</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For AP to autheticate wireless users you would be adding the AP's on the ACS as a aaa client. You will have to specify a shared key on ACS and the same key has to be used on AP as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So by default AP's can autheticate wireless clients only when the both ACS and AP has the same shared key. So why do you need to autheticate the AP again on ACS since the shared key authetication is already happening between AP and ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry i didnt get your point here &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regard&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Najaf&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Dec 2012 11:35:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-authenticated-with-radius/m-p/2108860#M15088</guid>
      <dc:creator>kcnajaf</dc:creator>
      <dc:date>2012-12-18T11:35:19Z</dc:date>
    </item>
    <item>
      <title>AP authenticated with RADIUS?</title>
      <link>https://community.cisco.com/t5/wireless/ap-authenticated-with-radius/m-p/2108861#M15089</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Amjad, I knew that but my question is far beyond. Is it possible to authenticate an OfficeExtend AP remotely with RADIUS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means, is it WLC capable of authenticate remote APs agains RADIUS or is this feature not under specifications?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Dec 2012 11:35:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-authenticated-with-radius/m-p/2108861#M15089</guid>
      <dc:creator>JPavonM</dc:creator>
      <dc:date>2012-12-18T11:35:21Z</dc:date>
    </item>
    <item>
      <title>AP authenticated with RADIUS?</title>
      <link>https://community.cisco.com/t5/wireless/ap-authenticated-with-radius/m-p/2108862#M15090</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I already have APs authenticated against ACS and the clients are authenticating too, but the customer told me about aditional AP authentication, like AP-switch pair throug dot1x. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know from your response that the only way to authenticate the remote AP in ACS is through shared secret. Now I see this is not possible to add aditional security for this registration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Dec 2012 12:21:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-authenticated-with-radius/m-p/2108862#M15090</guid>
      <dc:creator>JPavonM</dc:creator>
      <dc:date>2012-12-18T12:21:28Z</dc:date>
    </item>
    <item>
      <title>Re: AP authenticated with RADIUS?</title>
      <link>https://community.cisco.com/t5/wireless/ap-authenticated-with-radius/m-p/2108863#M15091</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OfficeExtend!!!! Your better off just using an MAC address filter list then for the AP's to join. So what we do for our engineer lab is add a Mac filter for every AP that is allowed to join a 5508 dedicated for OfficeExtend. This may not work for you, but there is no way you can use ACS to auth the AP if you don't control the switches at the users home.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Dec 2012 12:56:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-authenticated-with-radius/m-p/2108863#M15091</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2012-12-18T12:56:03Z</dc:date>
    </item>
  </channel>
</rss>

