Wired Profiles
12.1 Configuring a Wired Profile
SCALANCE W1750D UI
Configuration Manual, 02/2018, C79000-G8976-C451-02
153
12.1.4
Configuring Access Rules for a Wired Profile
The Ethernet ports allow third-party devices such as Voice over Internet Protocol (VoIP)
phones or printers (that support only wired connections) to connect to the wireless network.
You can also configure an Access Control List (ACL) for additional security on the Ethernet
downlink.
Note
If you are creating a new wired profile, complete the Wired Settings and configure the VLAN
and security parameters before defining access rules. For more information, see Configuring
Wired Settings (Page 147), Configuring VLAN for a Wired Profile (Page 149), and
Configuring Security Settings for a Wired Profile (Page 151).
You can configure access rules by using the SCALANCE W UI or the CLI.
In the SCALANCE W UI
1.
On the Access tab, configure the following access rule parameters.
2.
Select any of the following types of access control:
–
Role-based—Allows the users to obtain access based on the roles assigned to them.
–
Unrestricted—Allows the users to obtain unrestricted access on the port.
–
Network-based—Allows the users to be authenticated based on access rules specified
for a network.
3.
If the Role-based access control is selected, perform the following steps:
–
Under , select an existing role for which you want to apply the access rules, or click
New and add the required role. The list of roles defined for all networks is displayed
under Roles.
Note
The default role with the same name as the network is automatically defined for each
network. The default roles cannot be modified or deleted.
–
Select the access rule associated with a specific role and modify if required. To add a
new access rule, click New in the Access Rules window. You can configure up to 64
access rules. For more information on configuring access rules, see Configuring ACL
Rules for Network Services (Page 244).
–
Configure rules to assign roles for an authenticated client. You can also configure
rules to derive VLANs for the wired network profile. For more information on role
assignment rules and VLAN derivation rules, see Configuring Derivation Rules
(Page 270) and Configuring VLAN Derivation Rules (Page 275).
Содержание SCALANCE W1750D UI
Страница 18: ...About this guide SCALANCE W1750D UI 18 Configuration Manual 02 2018 C79000 G8976 C451 02 ...
Страница 28: ...About SCALANCE W 3 3 SCALANCE W CLI SCALANCE W1750D UI 28 Configuration Manual 02 2018 C79000 G8976 C451 02 ...
Страница 108: ...IPv6 Support 10 4 Debugging Commands SCALANCE W1750D UI 108 Configuration Manual 02 2018 C79000 G8976 C451 02 ...
Страница 326: ......
Страница 356: ......
Страница 374: ......
Страница 416: ......
Страница 440: ......
Страница 450: ...Intrusion Detection 27 4 Configuring IDS SCALANCE W1750D UI 450 Configuration Manual 02 2018 C79000 G8976 C451 02 ...
Страница 470: ......
Страница 480: ......
Страница 496: ......
Страница 518: ...Hotspot Profiles 33 3 Sample Configuration SCALANCE W1750D UI 518 Configuration Manual 02 2018 C79000 G8976 C451 02 ...
Страница 528: ......
Страница 552: ......
Страница 570: ...Appendix B 3 Glossary SCALANCE W1750D UI 570 Configuration Manual 02 2018 C79000 G8976 C451 02 ...