Users Guide

Table Of Contents
278| 802.1X Authentication Dell Networking W-Series ArubaOS 6.5.x| User Guide
6. Select the expiration time for the user account in the internal database.
7. Click Apply.
In the CLI
Use the privileged mode in the CLI to configure users in the controller’s internal database.
(host)(config) #local-userdb add username <user> password <password>
Configuring a Server Rule
In the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page.
2. Select Server Group to display the Server Group list.
3. Select the internal server group.
4. Under Server Rules, click New to add a server derivation rule.
a. For Condition, enter Role.
b. Select value-of from the drop-down list.
c. Select Set Role from the drop-down list.
d. Click Add.
5. Click Apply.
In the CLI
(host)(config) #aaa server-group internal
set role condition Role value-of
Configuring 802.1X Authentication
An AAA profile specifies the 802.1X authentication profile and 802.1X server group to be used for
authenticating clients for a WLAN. The AAA profile also specifies the default user role for 802.1X
authentication.
For this example, you enable both 802.1X authentication and termination on the controller.
In the WebUI
1. Navigate to the Configuration > Security > Authentication > L2 Authentication page. In the profiles
list, select 802.1X Authentication Profile.
a. In the Instance list, enter dot1x, then click Add.
b. Select the dot1x profile you just created.
c. Select Termination.
The defaults for EAP Method and Inner EAP Method are EAP-PEAP and EAP-MSCHAPv2, respectively.
d. Click Apply.
2. Select the AAA Profiles tab.
a. In the AAA Profiles Summary, click Add to add a new profile.
b. Enter aaa_dot1x, then click Add.
c. Select the aaa_dot1x profile you just created.