BelAir20E User Guide
Universal Access Method
April 2, 2012
Confidential
Document Number BDTM02201-A01 Standard
Host entries can contain URLs or IP addresses. The host white list and the
MAC address white list can have up to 10 entries. The protocol white list can
be empty or contain
ICMP
only.
In addition to the entries you control with these
add
and
del
commands, the AP
has an internal white list that contains the DHCP, DNS and ARP protocols, and
the URLs for the authentication server and the splash page (if specified).
Example
/services/uam# add scope 1 host-white-list www.mysite.com
Associating VLAN
Traffic to a Scope
/services/uam/add scope <index (1-8)> vlan {<vlan-list>|untag}
/services/uam/del scope <index (1-8)> vlan {<vlan-list>|untag}
These commands let you associate different VLAN traffic with different UAM
scopes. If you specify
untag
, then untagged traffic is associated with the specified
UAM scope.
“Configuring IP Parameters” on page 45
for a description on how to set up
VLANs for dynamic and static IP addressing.
Performing MAC
Address
Authentication
/services/uam/set scope <index (1-8)>
mac-auth-state {enabled|disabled}
[passwd <string>]
[success-redir {enabled|disabled}]
[reject-suspend {enabled|disabled}]
This command lets you control whether or not client MAC address
authentication is performed when a client attempts to associate to the AP.
When this feature is enabled, the AP determines the client’s MAC address
when the client attempts to associate with AP. The AP then sends the MAC
address to the RADIUS server for authentication. If the server authenticates
the MAC address, then the user has full access to the Internet when the
association completes. If the RADIUS server does not authenticate the MAC
address, then the user must provide credentials through the typical UAM
mechanism (Web server, RADIUS server, white lists) before they can access the
Internet. The default setting is
enabled
.
The
passwd
parameter provides an alternate password to log into the RADIUS
server.