User`s manual
294
DWS-1008 User’s Manual
D-Link Systems, Inc.
Conguring AAA for Network Users
Conguring Access for Any Users of a Non-Tagged SSID
If SSID trafc from the third-party AP is untagged, use the same conguration commands
as the ones required for 802.1X users, except the set radius proxy port command. This
command is not required and is not applicable to untagged SSID trafc. In addition, when
conguring the wired authentication port, use the auth-fall-thru option to change the fallthru
authentication type to last-resort.
On the RADIUS server, congure username last-resort-wired, depending on the fallthru
authentication type specied for the wired authentication port.
Assigning Authorization Attributes
Authorization attributes can be assigned to users in the local database or on remote servers.
The attributes, which include access control list (ACL) lters, VLAN membership, encryption
type, session time-out period, and other session characteristics, let you control how and
when users access the network. When a user or group is authenticated, the local database
or RADIUS server passes the authorization attributes to MSS to characterize the user’s
session.
The VLAN attribute is required. MSS can authorize a user to access the network only if the
VLAN to place the user on is specied.
The table below lists the authorization attributes supported by MSS. (For brief descriptions
of all the RADIUS attributes and D-link vendor-specic attributes supported by MSS, as well
as the vendor ID and types for D-link VSAs congured on a RADIUS server, see Appendix B,
“Supported RADIUS Attributes”).