
Configure Tab
110
NXA-WAPZD1000 ZoneDirector Smart WLAN Controller
7.
If the imported certificate does not match the NXA-WAPZD1000’s private key, a warning message
appears (FIG. 40).
8.
Click the click here link, and an Import Private Key dialog appears (FIG. 41).
9.
Click Browse and locate the private key file you saved in step 3.
10.
Click Import to finish importing the private key to the NXA-WAPZD1000.
Using an External Server for Administrator Authentication
The NXA-WAPZD1000 supports additional administrator accounts that can be authenticated using an external
authentication server such as RADIUS, LDAP or Active Directory. Two types of administrative privileges can
be assigned to these administrator accounts:
Full Privileges - Allow all types of configuration and management tasks
Limited Privileges - Allow monitoring operations only
This section provides basic instructions for setting up the NXA-WAPZD1000 to authenticate additional
administrator accounts with an external authentication server. For more information on AAA server
configuration, please refer to the Using an External AAA Server section on page 96.
To authenticate NXA-WAPZD1000 administrators using an AAA server:
1.
Set up Group Attributes on the AAA server.
RADIUS:
- Ruckus Wireless private attribute
- Vendor ID: 25053
- Vendor Type/Attribute Number: 1 (Ruckus-User-Groups)
- Value Format: group_attr1,group_attr2,group_attr3,...
Cisco private attribute (if your network is using a Cisco access control server)
- Vendor ID: 9
- Vendor Type / Attribute Number: 1 (Cisco-AVPair)
- Value Format: shell:roles=?hgroup_attr1 group_attr2 group_attr3 ...?h
Active Directory or LDAP:
Set up two groups. one for administrators with Full Privileges and another for administrators with
Limited Privileges.
Populate these groups with users to whom you want to grant administrator access. One way to do
this is to edit each user’s Member of profile and add the group to which you want the user to
belong. Remember the group names that you set; you will enter this information when you create
administrator roles in the NXA-WAPZD1000 (see Step 3).
2.
Set up the NXA-WAPZD1000 to use an AAA server (Configure > AAA Servers).
3.
Create an Administrator Role in the NXA-WAPZD1000 (Configure > Roles).
Allow access to all/specific WLANs.
Allow/deny Guest Pass Generation.
Ensure that Allow ZoneDirector Administration is enabled, and choose Full Privileges or Limited
Privileges.
FIG. 40
The imported certificate does not match ZoneDirector’s private key
FIG. 41
Importing a private key
Summary of Contents for NXA-WAPZD1000
Page 4: ......
Page 12: ...viii NXA WAPZD1000 ZoneDirector Smart WLAN Controller Table of Contents ...
Page 16: ...Introduction 12 NXA WAPZD1000 ZoneDirector Smart WLAN Controller ...
Page 130: ...Blocking Client Devices 126 NXA WAPZD1000 ZoneDirector Smart WLAN Controller ...
Page 146: ...Smart Mesh Networking Best Practices 142 NXA WAPZD1000 ZoneDirector Smart WLAN Controller ...
Page 153: ...Troubleshooting 149 NXA WAPZD1000 ZoneDirector Smart WLAN Controller ...