User Guide

Table Of Contents
Configuring AAA for Network Users 469
Nortel WLAN Security Switch 2300 Series Configuration Guide
(For a list of the commands for assigning attributes, see “Assigning Attributes to Users and Groups” on page 450.)
During 802.1X authorization for clients at EXAMPLE\, WSS Software must search for the Mobility Profile named
roses-profile. If it is not found, the authorization fails and clients with usernames like EXAMPLE\jose and
EXAMPLE\tamara are rejected.
If roses-profile is configured for EXAMPLE\ users on your WSS, WSS Software checks its port list. If, for example, the
current port for EXAMPLE\jose’s connection is on the list of allowed ports specified in roses-profile, the connection is
allowed to proceed. If the port is not in the list (for example, EXAMPLE\jose is on port 12, which is not in the port list),
the authorization fails and client EXAMPLE\jose is rejected.
The Mobility Profile feature is disabled by default. You must enable Mobility Profile attributes on the WSS switch to
use it. You can enable or disable the feature for the whole WSS only. If the Mobility Profile feature is disabled, all
Mobility Profile attributes are ignored.
To put Mobility Profile attributes into effect on an WSS, type the following command:
23x0# set mobility-profile mode enable
success: change accepted.
To display the name of each Mobility Profile and its ports, type the following command:
23x0# show mobility-profile
Mobility Profiles
Name Ports
=========================
roses-profile
AP 2
AP 3
AP 4
AP 7
AP 9
To remove a Mobility Profile, type the following command:
clear mobility-profile name
Network User Configuration Scenarios
The following scenarios provide examples of ways in which you use AAA commands to configure access for users:
“General Use of Network User Commands” on page 470
“Enabling RADIUS Pass-Through Authentication” on page 472
“Enabling PEAP-MS-CHAP-V2 Authentication” on page 473
“Enabling PEAP-MS-CHAP-V2 Offload” on page 474
“Combining 802.1X Acceleration with Pass-Through Authentication” on page 475
“Overriding AAA-Assigned VLANs” on page 476