550
C
HAPTER
24: C
ONFIGURING
SODA E
NDPOINT
S
ECURITY
FOR
A
WX S
WITCH
Enabling SODA
Functionality for the
Service Profile
To enable SODA functionality for a service profile, use the following
command:
set service-profile
name
soda mode
{
enable
|
disable
}
When SODA functionality is enabled for a service profile, a SODA agent is
downloaded to clients attempting to connect to a MAP managed by the
service profile. The SODA agent performs a series of security-related
checks on the client. By default, enforcement of SODA agent checks is
enabled, so that a connecting client must pass the SODA agent checks in
order to gain access to the network.
For example, the following command enables SODA functionality for
service profile
sp1
:
WX1200#
set service-profile sp1 soda mode enable
success: change accepted.
Disabling
Enforcement of SODA
Agent Checks
When SODA functionality is enabled for a service profile, by default the
SODA agent checks are downloaded to a client and run before the client
is allowed on the network. You can optionally disable the enforcement of
the SODA security checks, so that the client is allowed access to the
network immediately after the SODA agent is downloaded, rather than
waiting for the security checks to be run.
To disable (or re-enable) the enforcement of the SODA security checks,
use the following command:
set service-profile
name
enforce-checks
{
enable
|
disable
}
For example, the following command disables the enforcement of the
SODA security checks, allowing network access to clients after they have
downloaded the SODA agent, but without requiring that the SODA
agent checks be completed:
WX1200#
set service-profile sp1 enforce-checks disable
success: change accepted.
Note that if you disable the enforcement of the SODA security checks,
you cannot apply the success and failure URLs to client devices. In
addition, you should not configure the SODA agent to refer to the
success and failure pages on the WX switch if you have disabled
enforcement of SODA agent checks.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...