Motorola WiNG 5.5 Reference Manual page 9

Table of Contents

Advertisement

7.1 Policy Based Routing (PBR) ...........................................................................................................................................7-2
7.2 L2TP V3 Configuration ..................................................................................................................................................7-8
7.3 AAA Policy ..................................................................................................................................................................7-12
7.4 AAA TACACS Policy ...................................................................................................................................................7-22
7.5 Alias ............................................................................................................................................................................7-34
7.5.1 Network Basic Alias .........................................................................................................................................7-34
7.5.2 Network Group Alias ........................................................................................................................................7-37
7.5.3 Network Service Alias ......................................................................................................................................7-40
7.6 Network Deployment Considerations ........................................................................................................................7-42
8.1 Wireless Firewall ..........................................................................................................................................................8-2
8.1.1 Defining a Firewall Configuration .......................................................................................................................8-2
8.2 Configuring IP Firewall Rules .....................................................................................................................................8-13
8.3 Device Fingerprinting ..................................................................................................................................................8-18
8.4 Configuring MAC Firewall Rules ................................................................................................................................8-25
8.5 Wireless IPS (WIPS) ...................................................................................................................................................8-28
8.6 Device Categorization .................................................................................................................................................8-37
8.7 Security Deployment Considerations .........................................................................................................................8-39
9.1 Configuring Captive Portal Policies ..............................................................................................................................9-2
9.1.1 Configuring a Captive Portal Policy ....................................................................................................................9-2
9.2 Setting the DNS Whitelist Configuration ...................................................................................................................9-14
9.3 Setting the DHCP Server Configuration .....................................................................................................................9-15
9.3.1 Defining DHCP Pools .........................................................................................................................................9-15
9.3.2 Defining DHCP Server Global Settings .............................................................................................................9-23
9.3.3 DHCP Class Policy Configuration ......................................................................................................................9-25
9.4 Setting the RADIUS Configuration .............................................................................................................................9-27
9.4.1 Creating RADIUS Groups ..................................................................................................................................9-27
9.4.1.1 Creating RADIUS Groups ........................................................................................................................9-30
9.4.2 Defining User Pools ..........................................................................................................................................9-32
9.4.3 Configuring the RADIUS Server ........................................................................................................................9-35
9.5 Services Deployment Considerations .........................................................................................................................9-45
10.1 Creating Administrators and Roles .........................................................................................................................10-2
10.2 Setting the Access Control Configuration ................................................................................................................10-5
10.3 Setting the Authentication Configuration ................................................................................................................10-8
10.4 Setting the SNMP Configuration ............................................................................................................................10-10
10.5 SNMP Trap Configuration ......................................................................................................................................10-12
10.6 Management Access Deployment Considerations ................................................................................................10-13
Table of Contents
v

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents