Does CAPsMAN support the EAP passthrough configuration of CAPs?
This is the configuration of Security profile Applied to standalone AP radio.
Can this bi configured via CAPsMAN?
name="SecProfEAP-Win2008R2" mode=dynamic-keys
authentication-types=wpa-eap,wpa2-eap unicast-ciphers=aes-ccm
group-ciphers=aes-ccm wpa-pre-shared-key="" wpa2-pre-shared-key=""
supplicant-identity="" eap-methods=passthrough
tls-mode=dont-verify-certificate tls-certificate=none mschapv2-username=""
mschapv2-password="" static-algo-0=none static-key-0="" static-algo-1=none
static-key-1="" static-algo-2=none static-key-2="" static-algo-3=none
static-key-3="" static-transmit-key=key-0 static-sta-private-algo=none
static-sta-private-key="" radius-mac-authentication=no
radius-mac-accounting=no radius-eap-accounting=yes interim-update=0s
radius-mac-format=XX:XX:XX:XX:XX:XX
radius-mac-mode=as-username-and-password radius-mac-caching=disabled
group-key-update=5m management-protection=allowed
management-protection-key=""
I tried this, but it is not working:
1 name="SecProfEAP-Win2008R2-CAPs" authentication-types=wpa-eap,wpa2-eap encryption=aes-ccm group-encryption=aes-ccm
ivugrinec:
Does CAPsMAN support the EAP passthrough configuration of CAPs?
This is the configuration of Security profile Applied to standalone AP radio.
Can this bi configured via CAPsMAN?
name="SecProfEAP-Win2008R2" mode=dynamic-keys
authentication-types=wpa-eap,wpa2-eap unicast-ciphers=aes-ccm
group-ciphers=aes-ccm wpa-pre-shared-key="" wpa2-pre-shared-key=""
supplicant-identity="" eap-methods=passthrough
tls-mode=dont-verify-certificate tls-certificate=none mschapv2-username=""
mschapv2-password="" static-algo-0=none static-key-0="" static-algo-1=none
static-key-1="" static-algo-2=none static-key-2="" static-algo-3=none
static-key-3="" static-transmit-key=key-0 static-sta-private-algo=none
static-sta-private-key="" radius-mac-authentication=no
radius-mac-accounting=no radius-eap-accounting=yes interim-update=0s
radius-mac-format=XX:XX:XX:XX:XX:XX
radius-mac-mode=as-username-and-password radius-mac-caching=disabled
group-key-update=5m management-protection=allowed
management-protection-key=""
I tried this, but it is not working:
1 name="SecProfEAP-Win2008R2-CAPs" authentication-types=wpa-eap,wpa2-eap encryption=aes-ccm group-encryption=aes-ccm
Try
name=“SecProfEAP-Win2008R2-CAPs” authentication-types=wpa-eap,wpa2-eap encryption=aes-ccm group-encryption=aes-ccm eap-methods=passthrough
Tried that. It does not work.