88
Summit 300-48 Switch Software User Guide
Unified Access Security
Policy Examples
The following examples suggest typical uses of network security policies.
Example.
You want to give employees complete network access but limit access to visitors. The
solution is to base network access on the authentication method, as indicated in Table 29.
NOTE
Not all methods can be used at the same time on the same interface.
Example.
You want to restrict user access to certain locations or times. The solution is to include the
access point as a component of network access and include time restrictions for certain locations.
Policies and RADIUS Support
The authentication features of the Summit 300-48 switch are tightly integrated with RADIUS. You can
specify the following types of RADIUS access control policies:
•
User-based — 802.1x requests provide the RADIUS server with the user name and password. Based
on the user name, the RADIUS server sends back authentication information, including allow/deny,
assigned VLAN, and VLAN tag.
•
Location-based — You can configure a location string for each wireless port. The location is sent to
the RADIUS server as a vendor-specific attribute. The RADIUS server uses this information to
determine the access policy.
RADIUS Attributes
Table 30 lists the attributes are included in each request for access:
Table 29: Authentication-Based Network Access Example
Authentication Method
User Placement
802.1x with dynamic WEP
Internal VLAN
TKIP with pre-shared keys
PSK VLAN
WEP
WEP VLAN
Fails 802.1x authentication
Deny access
Table 30: RADIUS Request Attributes
Attribute
Description
User-Name
User name for dot1x or MAC address
User-Password
User-specified for dot1x or blank
Service-Type
Value is login (1)
Vendor-Specific
Contains EXTREME_USER_LOCATION, and the value is as configured
by the user for the location of each wireless port
Содержание Summit 300-48
Страница 12: ...12 Summit 300 48 Switch Software User Guide Figures...
Страница 22: ...22 Summit 300 48 Switch Software User Guide ExtremeWare Overview...
Страница 34: ...34 Summit 300 48 Switch Software User Guide Accessing the Switch...
Страница 62: ...62 Summit 300 48 Switch Software User Guide Configuring Ports on a Switch...
Страница 72: ...72 Summit 300 48 Switch Software User Guide Virtual LANs VLANs...
Страница 82: ...82 Summit 300 48 Switch Software User Guide Wireless Networking...
Страница 94: ...94 Summit 300 48 Switch Software User Guide Unified Access Security...
Страница 102: ...102 Summit 300 48 Switch Software User Guide Power Over Ethernet...
Страница 120: ...120 Summit 300 48 Switch Software User Guide Access Policies...
Страница 168: ...168 Summit 300 48 Switch Software User Guide IP Unicast Routing...
Страница 172: ...172 Summit 300 48 Switch Software User Guide Safety Information...
Страница 174: ...174 Summit 300 48 Switch Software User Guide Supported Standards...