Configuring Access Rules For A Wlan Ssid Profile - Siemens SCALANCE W1750D UI Configuration Manual

Table of Contents

Advertisement

11.1.4

Configuring Access Rules for a WLAN SSID Profile

This section describes the procedure for configuring security settings for Employee and
Voice networks only. For information on guest network configuration, see Captive Portal for
Guest Access (Page 161).
Note
If you are creating a new SSID profile, complete the WLAN settings and configure VLAN and
security parameters, before defining access rules. For more information, see Configuring
WLAN Settings for an SSID Profile (Page 110), Configuring VLAN Settings for a WLAN SSID
Profile (Page 117) and Configuring Security Settings for a WLAN SSID Profile. (Page 120)
You can configure up to 128 access rules for an Employee, Voice , or Guest network using
the SCALANCE W UI or the CLI.
In the SCALANCE W UI
To configure access rules for an Employee or Voice network:
1. In the Access Rules tab, set the slider to any of the following types of access control:
● Unrestricted—Select this option to set unrestricted access to the network.
● Network-based—Set the slider to Network-based to set common rules for all users in a
network. The Allow any to all destinations access rule is enabled by default. This rule
allows traffic to all destinations.
To define an access rule:
– Click New.
– Select appropriate options in the New Rule window.
– Click OK.
● Role-based—Select this option to enable access based on user roles. For role-based
access control:
– Create a user role if required. For more information, see Configuring User Roles.
– Create access rules for a specific user role. For more information, see Configuring
– Create a role assignment rule. For more information, see Configuring Derivation Rules
2. Click Finish.
SCALANCE W1750D UI
Configuration Manual, 02/2018, C79000-G8976-C451-02
ACL Rules for Network Services on page 180. You can also configure an access rule
to enforce captive portal authentication for an SSID that is configured to use 802.1X
authentication method. For more information, see Configuring Captive Portal Roles for
an SSID on page 135.
on page 199.
Wireless Network Profiles
11.1 Configuring Wireless Network Profiles
131

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents