510
C
HAPTER
21: C
ONFIGURING
AAA
FOR
N
ETWORK
U
SERS
The configuration order now shows that all 802.1X users are processed
as you intended:
WX1200#
display aaa
...
set accounting dot1x ssid mycorp EXAMPLE/* start-stop group1
set authentication dot1x ssid mycorp EXAMPLE/* peap-mschapv2 group1
set accounting dot1x ssid mycorp * start-stop group1
set authentication dot1x ssid mycorp * peap-mschapv2 local
Configuring a
Mobility Profile
A Mobility Profile is a way of specifying, on a per-user basis, those users
who are allowed access to specified MAP access ports and wired
authentication ports on a WX switch. In this way, you can constrain the
areas to which a user can roam. You first create a Mobility Profile, assign
it to one or more users, and finally enable the Mobility Profile feature on
the WX.
CAUTION:
When Mobility Profile attributes are enabled, a user is denied
access if assigned a Mobility-Profile attribute in the local WX switch
database or RADIUS server and no Mobility Profile of that name exists on
the WX switch.
Use the following command to create a Mobility Profile by giving it a
name and identifying the accessible port or ports:
set mobility-profile name
name
{
port
{
none
|
all
|
port-list
}} | {
dap
{
none
|
all
|
dap-num
}}
Specifying
none
prevents users assigned to the Mobility Profile from
accessing any MAP access ports, Distributed MAPs, or wired
authentication ports on the WX. Specifying
all
allows the users access to
all of the ports or Distributed MAPs.
Specifying an individual port or Distributed MAP number or a list limits
access to those ports or MAPs. For example, the following command
creates a Mobility Profile named
roses-profile
that allows access through
ports 2 through 4 and port 6:
WX1200#
set mobility-profile name roses-profile port 2-4,6
success: change accepted.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...