Siemens SCALANCE W1750D UI Configuration Manual page 8

Table of Contents

Advertisement

Table of contents
13.9.1
Disabling Captive Portal Authentication ............................................................................... 195
14
Authentication and User Management .................................................................................................. 197
14.1
Managing AP Users ............................................................................................................. 197
14.1.1
Configuring AP Users .......................................................................................................... 198
14.1.2
Configuring Authentication Parameters for Management Users ......................................... 200
14.1.3
Adding Guest Users through the Guest Management Interface .......................................... 202
14.2
Supported Authentication Methods ...................................................................................... 203
14.3
Supported EAP Authentication Frameworks ....................................................................... 205
14.4
Configuring Authentication Servers ..................................................................................... 206
14.4.1
Supported Authentication Servers ....................................................................................... 206
14.4.2
TACACS Servers ................................................................................................................. 208
14.4.3
Configuring an External Server for Authentication ............................................................... 209
14.4.4
Enabling RADIUS Communication over TLS ....................................................................... 214
14.4.5
Configuring Dynamic RADIUS Proxy Parameters ............................................................... 216
14.4.6
Associate Server Profiles to a Network Profile .................................................................... 218
14.5
Understanding Encryption Types ......................................................................................... 220
14.6
Configuring Authentication Survivability .............................................................................. 222
14.7
Configuring 802.1X Authentication for a Network Profile .................................................... 224
14.8
Enabling 802.1X Supplicant Support ................................................................................... 227
14.9
Configuring MAC Authentication for a Network Profile ........................................................ 229
14.10
14.11
Configuring WISPr Authentication ....................................................................................... 233
14.12
Blacklisting Clients ............................................................................................................... 235
14.13
Uploading Certificate ............................................................................................................ 238
15
Roles and Policies ............................................................................................................................... 243
15.1
Firewall Policies ................................................................................................................... 243
15.1.1
Access Control List Rules .................................................................................................... 243
15.1.2
Configuring ACL Rules for Network Services ...................................................................... 244
15.1.3
Configuring Network Address Translation Rules ................................................................. 247
15.1.4
Configuring ALG Protocols .................................................................................................. 250
15.1.5
Configuring Firewall Settings for Protection from ARP Attacks ........................................... 251
15.1.6
Configuring Firewall Settings to Disable Auto Topology Rules ........................................... 253
15.1.7
Managing Inbound Traffic .................................................................................................... 254
15.2
Content Filtering ................................................................................................................... 260
15.3
Configuring User Roles ........................................................................................................ 266
15.4
Configuring Derivation Rules ............................................................................................... 270
15.4.1
Understanding Role Assignment Rule ................................................................................. 270
15.4.2
Creating a Role Derivation Rule .......................................................................................... 271
15.4.3
Understanding VLAN Assignment ....................................................................................... 273
15.4.4
Configuring VLAN Derivation Rules ..................................................................................... 275
15.5
Using Advanced Expressions in Role and VLAN Derivation Rules ..................................... 277
15.6
Configuring a User Role for VLAN Derivation ...................................................................... 279
8
SCALANCE W1750D UI
Configuration Manual, , C79000-G8976-C451-02

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents