Wired Profiles
12.1 Configuring a Wired Profile
SCALANCE W1750D UI
Configuration Manual, 02/2018, C79000-G8976-C451-02
153
12.1.4
Configuring Access Rules for a Wired Profile
The Ethernet ports allow third-party devices such as Voice over Internet Protocol (VoIP)
phones or printers (that support only wired connections) to connect to the wireless network.
You can also configure an Access Control List (ACL) for additional security on the Ethernet
downlink.
Note
If you are creating a new wired profile, complete the Wired Settings and configure the VLAN
and security parameters before defining access rules. For more information, see Configuring
Wired Settings (Page 147), Configuring VLAN for a Wired Profile (Page 149), and
Configuring Security Settings for a Wired Profile (Page 151).
You can configure access rules by using the SCALANCE W UI or the CLI.
In the SCALANCE W UI
1.
On the Access tab, configure the following access rule parameters.
2.
Select any of the following types of access control:
–
Role-based—Allows the users to obtain access based on the roles assigned to them.
–
Unrestricted—Allows the users to obtain unrestricted access on the port.
–
Network-based—Allows the users to be authenticated based on access rules specified
for a network.
3.
If the Role-based access control is selected, perform the following steps:
–
Under , select an existing role for which you want to apply the access rules, or click
New and add the required role. The list of roles defined for all networks is displayed
under Roles.
Note
The default role with the same name as the network is automatically defined for each
network. The default roles cannot be modified or deleted.
–
Select the access rule associated with a specific role and modify if required. To add a
new access rule, click New in the Access Rules window. You can configure up to 64
access rules. For more information on configuring access rules, see Configuring ACL
Rules for Network Services (Page 244).
–
Configure rules to assign roles for an authenticated client. You can also configure
rules to derive VLANs for the wired network profile. For more information on role
assignment rules and VLAN derivation rules, see Configuring Derivation Rules
(Page 270) and Configuring VLAN Derivation Rules (Page 275).