Specifications
OmniAccess Reference: AOS-W System Reference
x Part 031652-00 May 2005
Configuring Captive Portal Authentication with
Web UI . . . . . . . . . . . . . . . . . . . . . . . 340
Configuring MAC Address Role Mapping with
Web UI
. . . . . . . . . . . . . . . . . . . . . . . 343
Configuring Stateful 802.1x for Third Party
Access Points
. . . . . . . . . . . . . . . . . . . . 344
Role Mapping . . . . . . . . . . . . . . . . . . . . . . . 345
SSID Role Mapping. . . . . . . . . . . . . . . . . . 345
Encryption Type Role Mapping
. . . . . . . . . . . 346
Configuring Advanced Conditions . . . . . . . . . 346
Configuring General AAA Settings Using the CLI. . . 348
Configuring RADIUS Servers Using the CLI
. . . . . . 348
Server Rules. . . . . . . . . . . . . . . . . . . . . . 349
Configuring LDAP Servers Using the CLI . . . . . . . 350
Server Rules
. . . . . . . . . . . . . . . . . . . . . . 352
Configuring the Internal Authentication Database
Using the CLI . . . . . . . . . . . . . . . . . . . . . 353
Configuring RADIUS Accounting Using the CLI
. . . . 353
Configuring 802.1x Authentication Using the CLI . . 354
Adding 802.1x Authentication Servers . . . . . . 357
Configuring VPN Authentication Using the CLI
. . . . 357
Configuring Captive Portal Authentication
Using the CLI . . . . . . . . . . . . . . . . . . . . . 357
Configuring MAC Address Role Mapping
Using the CLI
. . . . . . . . . . . . . . . . . . . . . 359
Configuring Stateful 802.1x Using the CLI . . . . . . 359
AP/Server Configuration for Stateful 802.1x
. . . 360
Role Mapping . . . . . . . . . . . . . . . . . . . . . . . 360
SSID Role Mapping. . . . . . . . . . . . . . . . . . 360
Encryption Type Role Mapping
. . . . . . . . . . . 360
Notes on Advanced AAA Features . . . . . . . . . . . 361
The Problem . . . . . . . . . . . . . . . . . . . . . 361
The AOS-W Solution
. . . . . . . . . . . . . . . . . 362
Chapter 17 IAS Server Configuration . . . . . . . . . 367
Starting the IAS Server . . . . . . . . . . . . . . . . . 368
Creating NAS Client Entries . . . . . . . . . . . . . . . 369
Creating Remote Access Policies
. . . . . . . . . . . . 372
Adding a User. . . . . . . . . . . . . . . . . . . . . . . 376
Chapter 18 Firewall Configuration . . . . . . . . . . . . 381
Setting Policies Using Web UI . . . . . . . . . . . . . 381
Aliases
. . . . . . . . . . . . . . . . . . . . . . . . . 381
Defining Service Aliases . . . . . . . . . . . . . . . 381
Defining Source and Destination Aliases . . . . . 383
Firewall Policies
. . . . . . . . . . . . . . . . . . . . 385