User's Manual

Table Of Contents
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing
155
Attempts made by auto-populating Client device to connect to
the Mesh Point-protected network are treated according to the
default device state (
DefaultDeviceState) configured on the
internal authentication server (Section 4.5.2.1).
View the current list of authenticating Secure Client devices
with
show deviceauth:
> show deviceauth
DeviceID MACAddress EnableUserAuth AuthStateMode AdminState CommonName
---------------- ------------------ ---------------- -------------- ---------- -------------------
333300148cf80001 00:14:8c:f8:00:01 Y allowfirst active Test1
333300148cf80002 00:14:8c:f8:00:02 N denyall inactive Test2
333300148cf80003 00:14:8c:f8:00:03 N defer active Test3
333300148cf80004 00:14:8c:f8:00:04 Y allowfirst inactive Test4
333300148cf80005 00:14:8c:f8:00:05 Y allowfirst active Test5
333300148cf80006 00:14:8c:f8:00:06 Y allowfirst active Test6
333300148cf80007 00:14:8c:f8:00:07 Y allowfirst active Test7
333300148cf80008 00:14:8c:f8:00:08 Y allowfirst active Test8
333300148cf80009 00:14:8c:f8:00:09 Y allowfirst active Test9
---Total devices: 9
Manually add devices for authentication with add deviceauth:
# add deviceauth -deviceID
<deviceID>
-deviceMac
<deviceMACaddr>
-name
<deviceName>
-userAuth y|n -mode allowfirst|denyall|defer -admin active|inactive
The 16-digit hexadecimal Fortress Device ID automatically
generated for Secure Client devices and the device’s MAC
address must be specified in order to manually add a device for
local authentication. These are not user configurable settings.
You can optionally specify a name (
-name) for the device and
determine whether its user must also authenticate (
-userAuth)
before the device is permitted to connect. User authentication
is enabled for authenticating devices by default.
The
-mode switch determines the initial state of the device’s
connection to the encrypted zone:
allowfirst
(the default) to allow the device to connect
using the first key establishment method it attempts to use,
denyall
to block any connection attempt
defer
to apply the default device state
(
DefaultDeviceState
) configured through set localauth
(Section 4.5.2.1)
Devices that have been manually added for internal RADIUS
authentication have a default administrative state (
-admin) of
active
. You can temporarily suspend a device from
authentication, without deleting its record, by changing
-admin
to
inactive
.
Once a device account has been established, use the
-deviceID switch with the update command to reconfigure