316
C
HAPTER
8: C
ONFIGURING
A
UTHENTICATION
, A
UTHORIZATION
,
AND
A
CCOUNTING
P
ARAMETERS
Creating a Web AAA
Network Access Rule
To create a Web AAA network access rule:
1
Access the Create MAC Network Access wizard:
a
Select the Configuration tool bar option.
b
In the Organizer panel, click the plus sign next to the WX switch.
c
Click the plus sign next to AAA.
d
Select
MAC Access Rules
.
e
In the Task List panel, select
MAC Network Access
.
2
Specify whether the rule is for wireless access to an SSID or access
through a wired authentication port:
If the rule is for access to an SSID, do one of the following:
To match on any SSID name, leave the value
any
in the SSID box.
To match only on a specific SSID name, select or type the name in
the SSID box.
If the rule is for access through a wired authentication port, select
Wired
.
CAUTION:
The default SSID name
any
matches on all SSID names. If the
SSID box contains any and you do not change the SSID name, the
authentication rule allows clients who match the userglob to access any
SSID.
3
Type the userglob that is allowed to use Web AAA to access the SSID or
wired authentication port.
A user glob is a string containing wildcards that matches on one or more
user names. Type a full or partial username to be matched during
authentication (1 to 80 alphanumeric characters, with no spaces or tabs).
The format of a user glob depends on the client type and EAP method.
For Windows domain clients using Protected EAP (PEAP), the user glob is
in the format
Windows_domain_name\username
. The Windows domain
name is the NetBIOS domain name and must be specified in capital
letters. For example, EXAMPLE\sydney, or EXAMPLE\*.*, which specifies
all usernames whose usernames contain periods.
Summary of Contents for OfficeConnect WX1200
Page 16: ......
Page 48: ...48 CHAPTER 2 WORKING WITH THE 3WXM USER INTERFACE ...
Page 236: ...236 CHAPTER 6 CONFIGURING WX SYSTEM PARAMETERS ...
Page 288: ...288 CHAPTER 7 CONFIGURING WIRELESS PARAMETERS ...
Page 332: ...332 CHAPTER 8 CONFIGURING AUTHENTICATION AUTHORIZATION AND ACCOUNTING PARAMETERS ...
Page 364: ...364 CHAPTER 10 MANAGING WX SYSTEM IMAGES AND CONFIGURATIONS ...
Page 476: ...476 CHAPTER 17 DETECTING AND COMBATTING ROGUE DEVICES ...
Page 492: ...492 CHAPTER A CHANGING 3WXM PREFERENCES ...
Page 514: ...514 APPENDIX C OBTAINING SUPPORT FOR YOUR 3COM PRODUCTS ...
Page 520: ...520 INDEX ...