502
C
HAPTER
21: C
ONFIGURING
AAA
FOR
N
ETWORK
U
SERS
The following command places all users who are authorized for SSID
tempvendor_a
into VLAN
kiosk_1
:
WX1200#
set location policy permit vlan kiosk_1 if ssid eq
tempvendor_a
success: change accepted.
Applying Security ACLs in a Location Policy Rule
When reassigning security ACL filters, specify whether the filter is an
input filter or an output filter, as follows:
Input filter
— Use
inacl
inacl-name
to filter traffic that
enters
the
switch from users via a MAP access port or wired authentication port,
or from the network via a network port.
Output filter
— Use
outacl
outacl-name
to filter traffic sent
from
the
switch to users via a MAP access port or wired authentication port, or
from the network via a network port.
For example, the following command authorizes users at
*.ny.ourfirm.com to access the
bld4.tac
VLAN, and applies the security
ACL
tac_24
to the traffic they receive:
WX1200#
set location policy permit vlan bld4.tac outacl
tac_24 if user eq *.ny.ourfirm.com
The following command authorizes access to users on VLANs with names
matching
bld4.*
and applies security ACLs
svcs_2
to the traffic they send
and
svcs_3
to the traffic they receive:
WX1200#
set location policy permit inacl svcs_2
outacl svcs_3 if vlan eq bldg4.*
You can optionally add the suffixes
.in
and
.out
to
inacl-name
and
outacl-name
for consistency with their usage in entries stored in the local
WX database.
Displaying and Positioning Location Policy Rules
The order of location policy rules is significant. MSS checks a location
policy rule that is higher in the list before those lower in the list. Rules are
listed in the order in which you create them, unless you move them.
To position location policy rules within the location policy, use
before
rule-number
and
modify
rule-number
in the
set location policy
command, or use the
clear location policy
rule-number
command.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...