Contents
xxvi OmniSwitch AOS Release 6 Network Configuration Guide September 2009
IPX RIP/SAP Filter Precedence ....................................................................33-14
Flushing the IPX RIP/SAP Tables .......................................................................33-14
Verifying the IPX Configuration ................................................................................33-15
Chapter 34 Configuring Access Guardian ...............................................................................34-1
In This Chapter ..............................................................................................................34-1
Access Guardian Specifications ....................................................................................34-3
Access Guardian Defaults .............................................................................................34-4
Quick Steps for Configuring Access Guardian .............................................................34-5
Quick Steps for Configuring User Network Profiles .............................................34-7
Quick Steps for Configuring Host Integrity Check ................................................34-8
Quick Step for Configuring QoS Policy Lists ........................................................34-9
Quick Steps for Configuring User Network Profile Mobile Rules ......................34-10
Access Guardian Overview .........................................................................................34-12
Authentication and Classification ........................................................................34-13
Using Device Classification Policies .............................................................34-13
Host Integrity Check (End-User Compliance) .....................................................34-15
How it Works ................................................................................................34-16
User Network Profiles (Role-Based Access) .......................................................34-16
What are UNP Mobile Rules? .......................................................................34-18
34-18
Interaction With Other Features ..................................................................................34-19
Quality of Service (QoS) ......................................................................................34-19
Captive Portal - Browser Support ........................................................................34-19
Host Integrity Check - InfoExpress ......................................................................34-20
Setting Up Port-Based Network Access Control ........................................................34-21
Setting 802.1X Switch Parameters .......................................................................34-21
Enabling MAC Authentication ......................................................................34-21
Enabling 802.1X on Ports ....................................................................................34-21
Configuring 802.1X Port Parameters ...................................................................34-22
Configuring Access Guardian Policies .......................................................................34-22
Configuring Supplicant Policies ...........................................................................34-23
Supplicant Policy Examples ..........................................................................34-24
Configuring Non-supplicant Policies ...................................................................34-26
Non-supplicant Policy Examples ..................................................................34-27
Configuring the Captive Portal Policy .................................................................34-30
Configuring Captive Portal Authentication ................................................................34-32
Configuring Captive Portal Session Parameters ..................................................34-33
Customizing Captive Portal .................................................................................34-33
Authenticating with Captive Portal ......................................................................34-35
Logging Into the Network with Captive Portal .............................................34-35
Logging Off the Network with Captive Portal ..............................................34-38
Configuring Host Integrity Check ...............................................................................34-39
Configuring User Network Profiles ............................................................................34-40
Configuring QoS Policy Lists ..............................................................................34-40
Configuring User Network Profile Mobile Rules ................................................34-41