![3Com OfficeConnect WX1200 Command Reference Manual Download Page 237](http://html1.mh-extra.com/html/3com/officeconnect-wx1200/officeconnect-wx1200_command-reference-manual_3121270237.webp)
set authentication last-resort
237
method1, method2, method3, method4
— At least one of up to four
methods that MSS uses to handle authentication. Specify one or more
of the following methods in priority order. MSS applies multiple
methods in the order you enter them.
A method can be one of the following:
local
— Uses the local database of usernames and user groups on
the WX switch for authentication.
server-group-name
— Uses the defined group of RADIUS servers
for authentication. You can enter up to four names of existing
RADIUS server groups as methods.
For more information, see “Usage.”
Defaults
— By default, authentication is unconfigured for all clients with
network access through MAP ports or wired authentication ports on the
WX switch. Connection, authorization, and accounting are also disabled
for these users. When using RADIUS for authentication, a last-resort
user’s default authorization password is
3Com
.
Access
— Enabled.
History
—Introduced in MSS Version 3.0.
Usage
— You can configure different authentication methods for
different groups of users by “globbing.” (For details, see “User Globs” on
page 26.)
You can configure a rule either for wireless access to an SSID, or for wired
access through a WX switch’s wired authentication port. If the rule is for
wireless access to an SSID, specify the SSID name or specify
any
to match
on all SSID names. If the rule is for wired access, specify
wired
instead of
an SSID name.
If you specify multiple authentication methods in the
set authentication
last-resort
command, MSS applies them in the order in which they
appear in the command, with these results:
If the first method responds with pass or fail, the evaluation is final.
If the first method does not respond, MSS tries the second method,
and so on.
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...