Creating and Managing Users in the Local User Database
295
Authorization
Attributes
Authorization attributes can be assigned to users in the local database or
on remote servers. The attributes, which include access control list (ACL)
filters, VLAN membership, encryption type, session time-out period, and
other session characteristics, let you control how and when users access
the network. When a user or group is authenticated, the local database
or RADIUS server passes the authorization attributes to MSS to
characterize the user’s session.
Table 22 lists the user attributes and their value ranges. You can specify
these attributes in lowercase when using the CLI.
Table 22
Authentication Attributes for Local Users
Attribute
Description
Valid Value(s)
encryption-type
Type of encryption
required for access by
the client. Clients who
attempt to use an
unauthorized
encryption method are
rejected.
Encryption-Type is a
3Com vendor-specific
attribute (VSA). The
vendor ID is 43, and the
vendor type is 3.
One of the following numbers that
identifies an encryption algorithm:
1
—AES_CCM (Advanced
Encryption Standard using
Counter with CBC-MAC)
2
—Reserved
4
—TKIP (Temporal Key Integrity
Protocol)
8
—WEP_104 (the default)
(Wired-Equivalent Privacy protocol
using 104 bits of key strength)
16
—WEP_40 (Wired-Equivalent
Privacy protocol using 40 bits of
key strength)
32
—NONE (no encryption)
64
—Static WEP
In addition to these values, you can
specify a sum of them for a
combination of allowed encryption
types. For example, to specify
WEP_104 and WEP_40, use
24
.
end-date
Date and time after
which the user is no
longer allowed to be on
the network.
Date and time, in the following
format:
YY/MM/DD-HH:MM
You can use
end-date
alone or with
start-date
. You also can use
start-date
,
end-date
, or both in
conjunction with
time-of-day
.
Содержание OfficeConnect WX1200
Страница 16: ......
Страница 48: ...48 CHAPTER 2 WORKING WITH THE 3WXM USER INTERFACE ...
Страница 236: ...236 CHAPTER 6 CONFIGURING WX SYSTEM PARAMETERS ...
Страница 288: ...288 CHAPTER 7 CONFIGURING WIRELESS PARAMETERS ...
Страница 332: ...332 CHAPTER 8 CONFIGURING AUTHENTICATION AUTHORIZATION AND ACCOUNTING PARAMETERS ...
Страница 364: ...364 CHAPTER 10 MANAGING WX SYSTEM IMAGES AND CONFIGURATIONS ...
Страница 476: ...476 CHAPTER 17 DETECTING AND COMBATTING ROGUE DEVICES ...
Страница 492: ...492 CHAPTER A CHANGING 3WXM PREFERENCES ...
Страница 514: ...514 APPENDIX C OBTAINING SUPPORT FOR YOUR 3COM PRODUCTS ...
Страница 520: ...520 INDEX ...