Cli Commands For Security On The Switch; Security Profile Commands; Vendor-Specific Attributes - Extreme Networks Summit 300-48 Software User's Manual

Software version 6.2a
Hide thumbs Also See for Summit 300-48:
Table of Contents

Advertisement

Table 31 lists the attributes included in the RADIUS response.
Table 31: RADIUS Response Attributes
Attribute
EXTREME_NETLOGIN_VLAN_TAG

Vendor-Specific Attributes

Table 32 lists the supported vendor-specific attributes (VSAs). The Extreme vendor ID is 1916.
Table 32: Vendor-Specific Attributes
VSA
EXTREME_NETLOGIN_VLAN_TAG
EXTREME_USER_LOCATION
The following rules apply for VSAs:
• There is no RADIUS support required for WEP authentication.
• For locations, the switch receives Extreme VSA containing the location of the access point. The
RADIUS server uses the location VSA to determine whether to allow or deny access.
• For WPA and legacy dot1x clients, the RADIUS server sends the VLAN value to use for the client.

CLI Commands for Security on the Switch

Security Profile Commands

Table 33 lists the CLI commands for creating security profiles.
Table 33: Security Profile Commands
Command
create security-profile <name> {copy
<name>}
delete security-profile <name>
config security-profile <name> <property>
<value>
show security-profile {<name>}
Summit 300-48 Switch Software User Guide
Description
VLAN for this MAC
Attribute
Value
Type
209
Integer
208
String
Description
Creates a new profile identified by the string name.
Optional from argument specifies the name of an existing profile from
which the system copies the initial values
Deletes the named security profile. The named profile must not be
currently attached to any active port on the switch.
Sets the value of the property specified in the command line.
Changes take effect immediately and are propagated to all ports
sharing the named profile. If the command fails, none of the changes
is propagated to any of the ports. Table 34 lists the <property>
values.
Shows the configured parameters of the security profile.
CLI Commands for Security on the Switch
Sent In
Access-accept
Access-request
89

Advertisement

Table of Contents
loading

Table of Contents