44
Step 6: Remote Access Policies
Remote Access Policies handle the local authentication and can for example grant different users access to
different networks: some to the guest network, some to VLAN 10, VLAN 12, etc.
•
Right-click on “Remote Access Policies” and select “New Remote Access Policy”
•
Click on “Next”, select “Set up a custom policy” and type in a name for the policy
•
Choose descriptive names for policies, such as “Employees with guest network”, “Students in VLAN10”,
etc.
•
Click on “Next”
•
“Policy conditions” are the criteria which determine whether a user shall use this policy or try the next.
•
Click on “Add”
o
The criteria which should be checked for each Remote Access Policy are up to the system
operators and depend to a large extent on how allocation is to take place.
Some standard options may be:
“NAS-Port-Type” adding “Ethernet”, “Wireless – IEEE802.11” and “Wireless – Other” “Windows-Groups” adding
“Domain Users” and, for example, “Quarantine” or “WiFi VLAN10” or other groups from AD. NB: The AD
groups must be created first!
•
When the criteria have been determined, click on “Next”, select “Grant remote access permission” and
click on “Next”.
o
Remote Access Policies may also be created which deny access to users. For example, all
users belonging to the security group “Wireless Access Denied” will be assigned the criterion
“Deny remote access permission”. But remember: the policies are handled in a predetermined
order and users will obtain access to the first alternative which is appropriate. Hence it may be
wise to specify all policies which use “Deny remote access permission” first.
•
Click on “Edit Profile…”
o
The properties which should be specified in the profile depend somewhat on the application but
the following must be included:
•
Click on the “Authentication” tab
•
Click on “EAP Methods”, click on “Add”, select “Protected
EAP (PEAP)”, click on “OK”.
•
To check that a PEAP has been created with a single
certificate, click on “Edit …” Click on “OK” and tick:
•
“Microsoft Encrypted Authentication version 2 (MS-CHAP
v2)”
•
The use of “User can change password after it has expired”
is optional
Содержание 4402 - Wireless LAN Controller
Страница 23: ...23 Security Layer 3 shall be None ...
Страница 36: ...36 A 4 Default VLAN Now go to SECURITY SSID Manager and specify the default VLAN ...
Страница 43: ...43 Create a Connection Request Policy for every connection this RADIUS server is to serve ...
Страница 60: ...More Best Practice Documents are available at www terena org campus bp campus bp announcements terena org ...