Creating A Role Derivation Rule - Siemens SCALANCE W1750D UI Configuration Manual

Table of Contents

Advertisement

For example, to create a role assignment rule with the DHCP option, select equals from the
Operator drop- down list and enter 370103060F77FC in the String text box. Since
370103060F77FC is the fingerprint for Apple iOS devices such as iPad and iPhone, AP
assigns Apple iOS devices to the role that you choose.
Device
Apple iOS
Android
Blackberry
Windows 7/Vista Desktop
Windows XP (SP3, Home, Pro-
fessional)
Windows Mobile
Windows 7 Phone
Apple Mac OS X
15.4.2

Creating a Role Derivation Rule

You can configure rules for determining the role that is assigned for each authenticated
client.
Note
When creating more than one role assignment rule, the first matching rule in the rule list is
applied.
You can create a role assignment rule by using the SCALANCE W UI or the CLI.
In the SCALANCE W UI
1. Navigate to the WLAN wizard or the Wired settings window:
– To configure access rules for a WLAN SSID, in the Network tab, click New to create a
– To configure access rules for a wired profile, go to More > Wired. In the Wired
2. Click the Access tab.
3. Under Role Assignment Rules, click New. The New Role Assignment window allows you
to define a match method by which the string in
value returned by the authentication server.
4. Select the attribute that matches with the rule from the Attribute drop-down list. The list of
supported attributes includes RADIUS attributes, dhcp-option, dot1x-authentication-type,
mac-address, and mac- address-and-dhcp-options. For information on a list of RADIUS
attributes, see RADIUS Server Authentication with VSA (Page 209).
SCALANCE W1750D UI
Configuration Manual, 02/2018, C79000-G8976-C451-02
new network profile or edit to modify an existing profile.
window, click New under Wired Networks to create a new network or click Edit to
select an existing profile.
DHCP Option
Option 55
Option 60
Option 60
Option 55
Option 55
Option 60
Option 55
Option 55
Operand
Roles and Policies
15.4 Configuring Derivation Rules
DHCP Fingerprint
370103060F77FC
3C64686370636420342E302E3
135
3C426C61636B4265727279
37010f03062c2e2f1f2179f92b
37010f03062c2e2f1f21f92b
3c4d6963726f736f66742057696
e646f777320434500
370103060f2c2e2f
370103060f775ffc2c2e2f
is matched with the attribute
271

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents