Specifications
xxv
WebAAA Requirements and Recommendations ..................................................................................17-24
RoamAbout Switch Requirements..................................................................................................17-24
Portal ACL and User ACLs.............................................................................................................17-26
Network Requirements ...................................................................................................................17-27
RoamAbout Switch Recommendations ..........................................................................................17-27
Client NIC Requirements................................................................................................................17-27
Client Web Browser Recommendations.........................................................................................17-27
Configuring Web Portal WebAAA .........................................................................................................17-28
Web Portal WebAAA Configuration Example.................................................................................17-28
Displaying Session Information for Web Portal WebAAA Users ....................................................17-29
Using a Custom Login Page .................................................................................................................17-30
Copying and Modifying the Enterasys Login Page.........................................................................17-31
Custom Login Page Scenario.........................................................................................................17-31
Using Dynamic Fields in WebAAA Redirect URLs................................................................................17-33
Examples .................................................................................................................................17-33
Configuring the Web Portal WebAAA Session Timeout Period ............................................................17-35
Configuring Last-Resort Access ..................................................................................................................17-36
Examples ..............................................................................................................................................17-36
Configuring AAA for Users of Third-Party APs ............................................................................................17-37
Requirements........................................................................................................................................17-38
Third-Party AP Requirements.........................................................................................................17-38
RoamAbout Switch Requirements..................................................................................................17-38
RADIUS Server Requirements .......................................................................................................17-39
Configuring Authentication for 802.1X Users of a Third-Party AP with Tagged SSIDs.........................17-39
Examples .................................................................................................................................17-40
Configuring Authentication for Non-802.1X Users of a Third-Party AP with Tagged SSIDs.................17-41
Configuring Access for Any Users of a Non-Tagged SSID ...................................................................17-41
Assigning Authorization Attributes...............................................................................................................17-42
Assigning Attributes to Users and Groups ............................................................................................17-45
Assigning SSID Default Attributes to a Service Profile .........................................................................17-47
Assigning a Security ACL to a User or a Group....................................................................................17-48
Assigning a Security ACL Locally...................................................................................................17-48
Examples .................................................................................................................................17-48
Assigning a Security ACL on a RADIUS Server.............................................................................17-49
Clearing a Security ACL from a User or Group ..............................................................................17-49
Assigning Encryption Types to Wireless Users.....................................................................................17-49
Assigning and Clearing Encryption Types Locally..........................................................................17-49
Examples .................................................................................................................................17-50
Assigning and Clearing Encryption Types on a RADIUS Server....................................................17-50
Keeping Users on the Same VLAN Even After Roaming......................................................................17-50
Overriding or Adding Attributes Locally with a Location Policy....................................................................17-52
About the Location Policy...................................................................................................................... 17-52
How the Location Policy Differs from a Security ACL ........................................................................... 17-52
Setting the Location Policy....................................................................................................................17-53
Examples........................................................................................................................................17-53
Applying Security ACLs in a Location Policy Rule ................................................................................17-54
Examples........................................................................................................................................17-54
Displaying and Positioning Location Policy Rules.................................................................................17-54
Example..........................................................................................................................................17-54
Clearing Location Policy Rules and Disabling the Location Policy .......................................................17-55
Configuring Accounting for Wireless Network Users...................................................................................17-55
Configuring Periodic Accounting Update Records ................................................................................17-56
Enabling System Accounting Messages ...............................................................................................17-56