Avaya WLAN 8100 Technical Configuration Manual page 50

Wireless lan, identity engines
Hide thumbs Also See for WLAN 8100:
Table of Contents

Advertisement

the client being unable to communicate. Guests are typically authenticated by a captive portal,
so the purpose of this policy is not to assign the guest to a guest VLAN, but rather to enforce the
policy that guests should already be in the guest VLAN. Depending on the VLAN design of the
guest service, such as if there are multiple guest VLANs, providing an outbound value for VLAN
assignment may not be appropriate. Use this attribute with discretion.
The resulting rule for Guest access should look like this:
3
Configure the Policy Rule for corporate device access
You will now add a rule for corporate devices.
It is assumed you are already in the Edit Authorization Policy window. If you are not, then Click Site <#>,
Site Configuration, Access Policies, RADIUS, <wireless-policy-name>. In the right pane click
Authorization Policy. Click Edit.
In the Edit Authorization Policy window, click Add to add a new rule. Type the name of the rule
"corp_device". Click Ok.
Make sure you have the new "corp_device" rule highlighted on the left hand list and on the right side, click
New to add a new Constraint.
In the Constraint Details window, choose "Device" from the Attribute Category list, and then below, select
"device-group-member". On the right side, click Add and select the group "Corp_asset". Click Ok.
August 2011
Avaya Inc. –External Distribution
avaya.com
50

Advertisement

Table of Contents
loading

Table of Contents