Dell PowerConnect W-IAP92 Dell Instant 6.1.3.4-3.1.0.0 User Guide - Page 6

User VLAN Derivation, Role Derivation

Page 6 highlights

6 | Contents Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Connect ...126 Creating a Web Login page in the Dell PowerConnect W-ClearPass GuestConnect 126 Configuring the RADIUS Server in Instant 126 MAC Authentication...127 Configuring MAC Authentication 127 Walled Garden Access...128 Creating a Walled Garden Access 128 Wired Authentication on an IAP 129 Certificates ...129 Loading Certificates using Instant WebUI 130 Loading Certificates using Dell PowrConnect W-AirWave 131 Encryption...135 Encryption Types Supported in Dell Instant 135 WEP ...135 TKIP...135 AES...135 Encryption Recommendations ...135 Understanding WPA and WPA2 136 Recommended Authentication and Encryption Combinations 136 Role Derivation...137 User Roles...137 Creating a New User Role...137 Creating Role Assignment Rules 138 DHCP Option and DHCP Fingerprinting 139 802.1X-Authentication-Type 140 User VLAN Derivation...141 User VLAN Derivation...141 Vendor Specific Attributes (VSA 141 VLAN Derivation Rule ...142 Configuring VLAN Derivation Rules on an IAP 142 User Role...143 Configuring a User Role 143 SSID Profile ...145 Configuring VLAN Derivation Rules Using SSID Profile 145 Instant Firewall ...147 Service Options...148 Destination Options...149 Examples for Access Rules ...150 Allow TCP Service to a Particular Network 150 Allow POP3 Service to a Particular Server 151 Deny FTP Service except to a Particular Server 152 Deny bootp Service except to a Particular Network 153 Content Filtering...155 Enabling Content Filtering ...155 Enterprise Domains...156 OS Fingerprinting...157 Dell PowerConnect W-Series Instant Access Point 6.1.3.4-3.1.0.0 | User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

6
|
Contents
Dell PowerConnect W-Series Instant Access Point 6.1.3.4-3.1.0.0
| User Guide
Connect
....................................................................................................................................
126
Creating a Web Login page in the Dell PowerConnect W-ClearPass GuestConnect
126
Configuring the RADIUS Server in Instant
.................................................................
126
MAC Authentication
.......................................................................................................................
127
Configuring MAC Authentication
.........................................................................................
127
Walled Garden Access
..................................................................................................................
128
Creating a Walled Garden Access
......................................................................................
128
Wired Authentication on an IAP
..................................................................................................
129
Certificates
......................................................................................................................................
129
Loading Certificates using Instant WebUI
.........................................................................
130
Loading Certificates using Dell PowrConnect W-AirWave
.............................................
131
Chapter 11
Encryption
.........................................................................................................................
135
Encryption Types Supported in Dell Instant
...............................................................................
135
WEP
..........................................................................................................................................
135
TKIP
...........................................................................................................................................
135
AES
............................................................................................................................................
135
Encryption Recommendations
.....................................................................................................
135
Understanding WPA and WPA2
..................................................................................................
136
Recommended Authentication and Encryption Combinations
.......................................
136
Chapter 12
Role Derivation
.................................................................................................................
137
User Roles
........................................................................................................................................
137
Creating a New User Role
.....................................................................................................
137
Creating Role Assignment Rules
..........................................................................................
138
DHCP Option and DHCP Fingerprinting
...............................................................................
139
802.1X-Authentication-Type
.................................................................................................
140
Chapter 13
User VLAN Derivation
.....................................................................................................
141
User VLAN Derivation
....................................................................................................................
141
Vendor Specific Attributes (VSA)
........................................................................................
141
VLAN Derivation Rule
............................................................................................................
142
Configuring VLAN Derivation Rules on an IAP
..........................................................
142
User Role
..................................................................................................................................
143
Configuring a User Role
................................................................................................
143
SSID Profile
.............................................................................................................................
145
Configuring VLAN Derivation Rules Using SSID Profile
..........................................
145
Chapter 14
Instant Firewall
................................................................................................................
147
Service Options
...............................................................................................................................
148
Destination Options
........................................................................................................................
149
Examples for Access Rules
..........................................................................................................
150
Allow TCP Service to a Particular Network
.......................................................................
150
Allow POP3 Service to a Particular Server
........................................................................
151
Deny FTP Service except to a Particular Server
...............................................................
152
Deny bootp Service except to a Particular Network
........................................................
153
Chapter 15
Content Filtering
...............................................................................................................
155
Enabling Content Filtering
.............................................................................................................
155
Enterprise Domains
........................................................................................................................
156
Chapter 16
OS Fingerprinting
.............................................................................................................
157