Page 81 / 126 Scroll up to view Page 76 - 80
81
GlobeSurfer
®
II 1.8 - 7.2 - 7.2 S
REFERENCE MANUAL
Figure 6.31 Certificate unsigned
Figure 6.32 Load local certificate
10. Use the ‘Browse’ button to browse to the signed certificate ’.pem’ file. Leave the password entry
empty and press ”Load” to load the signed certificate. The certificate management screen will
appear, displaying the certificate name and issuer (see Figure 6.32).
11. You can click the ’save’ icon under the ’Action’ column, and then ’Open’ in the dialogue box to view
the ’Certificate’ window (Windows only) box to save the certificate to a file (see Figure 6.34).
Figure 6.33 Open certificates
Page 82 / 126
82
GlobeSurfer
®
II 1.8 - 7.2 - 7.2 S
REFERENCE MANUAL
Figure 6.34 Windows certificate information
12. You can also click the ’edit’ icon under the ’Action’ column to view the ’Certificate Detail’ screen
(see Figure 6.35).
Figure 6.35 Certificate details
6.6.5.4.2
Creating a Self-Signed Certificate
A default self-signed certifcate is included in GlobeSurfer
®
II (see Figure 6.36), in order to enable
certifcate demanding services such as HTTPS. Note that if deleted, this certificate is restored when
GlobeSurfer
®
II’s Restore Defaults operation is run (see section 6.4.6).
To create a self-signed certificate:
1. Click the ’Certificates’ icon in the ’Advanced’ screen of the Web-based Management. The
Certificates screen will appear (see Figure 6.36).
Page 83 / 126
83
GlobeSurfer
®
II 1.8 - 7.2 - 7.2 S
REFERENCE MANUAL
Figure 6.36 Certificate default
2. Click the ’ GlobeSurfer
®
II’s Local’ certificates tab.
3. Click the ’Create Self Signed Certificate’ button. The ’Create Self Signed X509 Certificate’ screen will
appear (see Figure 6.37).
4.
Enter the following certification request parameters:
Certificate Name
Subject
Organization
State
Country
Figure 6.37 Create self signed certificate
5. Click the ’Generate’ button. A screen will appear stating that the certificate is being generated (see
Figure 6.38).
Figure 6.38 Generating self signed certificate
6. After a short while, press the ’Refresh’ button, until the ’Certificate Detail’ screen appears (see
Figure 6.39).
Page 84 / 126
84
GlobeSurfer
®
II 1.8 - 7.2 - 7.2 S
REFERENCE MANUAL
Figure 6.39 Self signed certificate details
7. Click the ’Close’ button. The main certificate management screen will reappear, displaying the
certificate name and issuer (see Figure 6.40)
Figure 6.40 Certificate main screen
6.6.5.4.3
Loading a PKCS#12 Format Certificate
You can also load certificates in PKCS#12 format (usually stored in .p12 files) to GlobeSurfer
®
II’s
certificate store. You must first obtain the ’.p12’ file, containing the private and public keys and
optional CA certificates.
1. Click the ’Certificates’ icon in the ’Advanced’ screen of the Web-based Management. The
Certificates screen will appear (see Figure 6.40)
2. Click the ’GlobeSurfer
®
II’s Local’ certificates tab.
3. Click the ’Load Certificate’ link. The ’Load GlobeSurfer
®
II’s Local Certificate’ screen will appear
(see Figure 6.41).
Figure 6.41 Load local certificate
4. Click the ’Load Certificate’ link. The ’Load GlobeSurfer
®
II’s Local Certificate’ screen will appear
(see Figure 6.41).
Page 85 / 126
85
GlobeSurfer
®
II 1.8 - 7.2 - 7.2 S
REFERENCE MANUAL
5. Use the Browse button to browse to the ‘.p12’ file. If the private key is encrypted using a
password, type it in the password entry (otherwise leave the entry empty) and press ‘Load’ to load
the certificate. The certificate management screen will appear, displaying the certificate name and
issuer (see Figure 6.40). If the ‘.p12’ file contained any CA certificates, they will be displayed in
the CA store (click the ‘CA’s’ tab to view the CA certficates).
6.6.6
Radius
For authentication to work, the client’s transmission must go through GlobeSurfer
®
II, and reach the back-end server that
performs the actual authentication. The wireless client contacts the access point, which in turn communicates with the Remote
Authentication Dial-in User Service (RADIUS) server. The RADIUS server verifies the client’s credentials to determine whether
the device is authorized to connect to the LAN. If the RADIUS server accepts the client, the server responds by exchanging
data with GlobeSurfer
®
II, including security keys for subsequent encrypted sessions.
Figure 6.42 Radius system setup
To configure the RADIUS authentication mechanism, perform the following steps:
1. Click the ‘RADIUS’ icon in the ‘Advanced’ screen of the Web-based Management. The RADIUS screen will appear (see
Figure 6.43).
2. Specify the following parameters:
‘Enabled’
Select this check-box to enable RADIUS client authentication.
‘Server IP’
Type in the RADIUS server’s IP address.
‘Server Port’
Type in the RADIUS server’s port.
‘Shared Secret’
Type in your shared secret.
Figure 6.43 Radius configuration

Rate

4 / 5 based on 2 votes.

Popular Option Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top