![3Com OfficeConnect WX1200 Command Reference Manual Download Page 238](http://html1.mh-extra.com/html/3com/officeconnect-wx1200/officeconnect-wx1200_command-reference-manual_3121270238.webp)
238
C
HAPTER
8: AAA C
OMMANDS
However, if
local
appears first, followed by a RADIUS server group, MSS
overrides any failed searches in the local WX database and sends an
authentication request to the server group.
MSS uses a last-resort authentication rule under the following conditions:
The client is not denied access by 802.1X or does not support 802.1X.
The client’s MAC address does not match a MAC authentication rule.
The fallthru method is
last-resort
. (For a wireless authentication rule,
the fallthru method is specified by the
set service-profile
auth-fallthru
command. For a wired authentication rule, the fallthru
method is specified by the
auth-fall-thru
option of the
set port type
wired-auth
command.)
For wireless access, MSS appends the requested SSID name to the user
name
last-resort
. For example, if the requested SSID is
mycorp
, MSS
attempts to authenticate the user
last-resort-mycorp
. If the RADIUS server
or local database used as the authentication method has the user
last-resort-mycorp
, access is granted. Otherwise, access is denied.
If the SSID specified in the last-resort authentication rule is
any
, MSS
searches for user
last-resort-any
. The
any
in the username is not a
wildcard. The username must be
last-resort-any
, exactly as spelled here.
Examples
— The following command configures a last-resort
authentication rule in the local WX database for SSID
mycorp
:
WX4400#
set authentication last-resort ssid mycorp local
success: change accepted.
See Also
clear authentication last-resort
on page 207
display aaa
on page 219
set authentication admin
on page 229
set authentication console
on page 231
set authentication dot1x
on page 233
set authentication mac
on page 239
set authentication web
on page 242
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...