EasyManua.ls Logo

Alcatel-Lucent AOS-W 6.5.3.x - Network Configuration Parameters; Campus WLAN Workflow

Alcatel-Lucent AOS-W 6.5.3.x
1160 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
AOS-W 6.5.3.x | User Guide Network Configuration Parameters | 97
Chapter 4
Network Configuration Parameters
The following topics in this chapter describe some basic network configuration steps that must be performed
on the switch:
n Campus WLAN Workflow on page 97
n Configuring VLANs on page 105
n Configuring VLANs on page 105
n Configuring Ports on page 110
n Configuring Static Routes on page 113
n Configuring the Loopback IP Address on page 113
n Configuring the Switch IP Address on page 114
n Configuring GRE Tunnels on page 115
n Jumbo Frame Support on page 127
Campus WLAN Workflow
The following workflow lists the tasks to configure a campus WLAN, with a signal SSID, that uses 802.1X
authentication. Click any of the links below for details on the configuration procedures for that task.
Using the WebUI
1. Configure your authentication servers.
2. Create an authentication server group, and assign the authentication servers you configured in step 1 to
that server group.
3. Configure a firewall access policy for a group of users
4. Create a user role, and assign the firewall access policy you created in step 3 to that user role.
5. Create an AAA profile.
a. Assign the user role defined in step 4 to the AAA profile's 802.1X Authentication Default Role
b. Associate the server group you created in step 2 to the AAA profile.
6. Create a new SSID profile
7. Create a new virtual AP profile.
8. Associate the virtual AP profile to the AAA profile you created in Step 5.
9. Associate the virtual AP profile to the SSID profile you created in Step 6.
Using the CLI
The example below follows the suggested order of steps to configure a virtual AP using the command-line
interface.
(host)(config) #aaa server-group "THR-DOT1X-SERVER-GROUP-WPA2"
auth-server Internal
!
ip access-list session THR-POLICY-NAME-WPA2
user any any permit
!
(host)(config) #user-role THR-ROLE-NAME-WPA2
session-acl THR-POLICY-NAME-WPA2

Table of Contents