6.7 Mesh QoS Policy .........................................................................................................................................................6-93
6.8 Passpoint Policy ........................................................................................................................................................6-100
7.1 Policy Based Routing (PBR) ...........................................................................................................................................7-2
7.2 L2TP V3 Configuration ..................................................................................................................................................7-8
7.3 Crypto CMP Policy ......................................................................................................................................................7-12
7.4 AAA Policy ..................................................................................................................................................................7-15
7.5 AAA TACACS Policy ...................................................................................................................................................7-26
7.6 Alias ............................................................................................................................................................................7-42
7.6.1 Network Basic Alias .........................................................................................................................................7-42
7.6.2 Network Group Alias ........................................................................................................................................7-45
7.6.3 Network Service Alias ......................................................................................................................................7-48
8.1 Wireless Firewall ..........................................................................................................................................................8-2
8.2 Configuring IP Firewall Rules .....................................................................................................................................8-16
8.3 Device Fingerprinting ..................................................................................................................................................8-23
8.5 Wireless IPS (WIPS) ...................................................................................................................................................8-33
8.6 Device Categorization .................................................................................................................................................8-43
9.3.1 Defining DHCP Pools .........................................................................................................................................9-14
9.5.1 Defining DHCPv6 Options .................................................................................................................................9-33
9.5.2 DHCPv6 Pool Configuration ..............................................................................................................................9-34
Table of Contents
5