set location policy
247
You can optionally add the suffixes
.in
and
.out
to
inacl-name
and
outacl-name
so that they match the names of security ACLs stored in the
local WX database.
Examples
— The following command denies network access to all users
at *.theirfirm.com, causing them to fail authorization:
WX4400#
set location policy deny if user eq *.theirfirm.com
The following command authorizes access to the
guest_1
VLAN for all
users who are not at *.wodefirm.com:
WX4400#
set location policy permit vlan guest_1 if user neq
*.wodefirm.com
The following command authorizes users at *.ny.ourfirm.com to access
the
bld4.tac
VLAN instead, and applies the security ACL
tac_24
to the
traffic they receive:
WX4400#
set location policy permit vlan bld4.tac
outacl tac_24 if user eq *.ny.ourfirm.com
The following command authorizes access to users on VLANs with names
matching
bld4.*
and applies security ACLs
svcs_2
to the traffic they send
and
svcs_3
to the traffic they receive:
WX4400#
set location policy permit inacl svcs_2 outacl svcs_3
if vlan eq bldg4.*
The following command authorizes users entering the network on WX
ports 1 and 2 to use the
floor2
VLAN, overriding any settings from AAA:
WX4400#
set location policy permit vlan floor2 if port 1-2
The following command places all users who are authorized for SSID
tempvendor_a
into VLAN
kiosk_1
:
WX1200#
set location policy permit vlan kiosk_1 iff ssid eq
tempvendor_a
success: change accepted
See Also
clear location policy
on page 210
display location policy
on page 224
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...