mirror of
https://github.com/Telecominfraproject/wlan-docs.git
synced 2025-11-25 22:24:52 +00:00
GitBook: [#32] No subject
This commit is contained in:
@@ -78,6 +78,7 @@
|
|||||||
* [RADIUS Authenticated SSID](device-feature-configuration-examples/device-feature-configuration-examples/radius-authenticated-ssid/README.md)
|
* [RADIUS Authenticated SSID](device-feature-configuration-examples/device-feature-configuration-examples/radius-authenticated-ssid/README.md)
|
||||||
* [Dynamic VLANs with RADIUS](device-feature-configuration-examples/device-feature-configuration-examples/radius-authenticated-ssid/dynamic-vlans-with-radius.md)
|
* [Dynamic VLANs with RADIUS](device-feature-configuration-examples/device-feature-configuration-examples/radius-authenticated-ssid/dynamic-vlans-with-radius.md)
|
||||||
* [WISPr Subscriber Bandwidth](device-feature-configuration-examples/device-feature-configuration-examples/radius-authenticated-ssid/wispr-subscriber-bandwidth.md)
|
* [WISPr Subscriber Bandwidth](device-feature-configuration-examples/device-feature-configuration-examples/radius-authenticated-ssid/wispr-subscriber-bandwidth.md)
|
||||||
|
* [Dynamic Multi PSK](device-feature-configuration-examples/device-feature-configuration-examples/radius-authenticated-ssid/dynamic-multi-psk.md)
|
||||||
* [RADIUS MAC-Auth](device-feature-configuration-examples/device-feature-configuration-examples/radius-authenticated-ssid/radius-mac-auth.md)
|
* [RADIUS MAC-Auth](device-feature-configuration-examples/device-feature-configuration-examples/radius-authenticated-ssid/radius-mac-auth.md)
|
||||||
* [Multi-PSK (MDU Shared Key)](device-feature-configuration-examples/device-feature-configuration-examples/multi-psk-mdu-multiple-shared-key.md)
|
* [Multi-PSK (MDU Shared Key)](device-feature-configuration-examples/device-feature-configuration-examples/multi-psk-mdu-multiple-shared-key.md)
|
||||||
* [Wireguard](device-feature-configuration-examples/device-feature-configuration-examples/wireguard.md)
|
* [Wireguard](device-feature-configuration-examples/device-feature-configuration-examples/wireguard.md)
|
||||||
|
|||||||
@@ -0,0 +1,38 @@
|
|||||||
|
# Dynamic Multi PSK
|
||||||
|
|
||||||
|
When venue authentication will support client mobility it is desirable to not cause re-authentication from one AP to another.
|
||||||
|
|
||||||
|
As with the Multi PSK feature that locally provides this functionality to enable a subscriber to have a subscriber based PSK when authenticated creates a private network, this functionality may also be handled via RADIUS to support large venue topologies. 
|
||||||
|
|
||||||
|
The authentication protocol type is `psk2-radius` . Add the RADIUS system appropriate for the network. 
|
||||||
|
|
||||||
|
 
|
||||||
|
|
||||||
|
```json
|
||||||
|
"ssids": [
|
||||||
|
{
|
||||||
|
"name": "OpenWifi",
|
||||||
|
"wifi-bands": [
|
||||||
|
"2G"
|
||||||
|
],
|
||||||
|
"bss-mode": "ap",
|
||||||
|
"encryption": {
|
||||||
|
"proto": "psk2-radius",
|
||||||
|
"ieee80211w": "optional"
|
||||||
|
},
|
||||||
|
"radius": {
|
||||||
|
"authentication": {
|
||||||
|
"host": "192.168.50.30",
|
||||||
|
"port": 1812,
|
||||||
|
"secret": "secret"
|
||||||
|
},
|
||||||
|
"accounting": {
|
||||||
|
"host": "192.168.50.30",
|
||||||
|
"port": 1813,
|
||||||
|
"secret": "secret"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
|
||||||
|
```
|
||||||
Reference in New Issue
Block a user