Contents
OmniSwitch AOS Release 8 Network Configuration Guide December 2017 xxii
Source Learning ...................................................................................................28-28
Universal Network Profile (UNP) ........................................................................28-28
Configuring Port-Based Network Access Control ......................................................28-31
Setting Authentication Parameters for the Switch ...............................................28-32
Configuring UNP Port-Based Functionality ........................................................28-38
Configuring UNP Profiles ....................................................................................28-51
Configuring the UNP Profile Mapping ................................................................28-54
Configuring QoS Policy Lists ..............................................................................28-61
Configuring UNP Classification Rules ................................................................28-65
OmniAccess Stellar AP Integration ............................................................................28-69
How it Works .......................................................................................................28-69
Configuration Guidelines .....................................................................................28-70
Quick Steps for Configuring OmniSwitch AP Discovery ...................................28-72
Using Captive Portal Authentication ..........................................................................28-76
Configuration Tasks and Guidelines ....................................................................28-77
Quick Steps for Configuring Captive Portal Authentication ...............................28-78
Using Captive Portal Configuration Profiles .......................................................28-79
Replacing the Captive Portal Certificate ..............................................................28-80
Authenticating with Captive Portal ......................................................................28-80
Using Guest Tunneling ...............................................................................................28-83
Configuration Overview and Guidelines ..............................................................28-84
Quick Steps for Configuring Guest Tunneling ....................................................28-88
Guest Tunneling Configuration Example ............................................................28-90
Using Quarantine Manager and Remediation .............................................................28-93
Access Guardian Application Examples .....................................................................28-95
Application Example 1: Classification (Port Mobility) .......................................28-96
Application Example 2: 802.1X Authentication ..................................................28-97
Application Example 3: Internal Captive Portal Authentication .........................28-99
Application Example 4: Supplicant/Non-supplicant with Captive
Portal Authentication .........................................................................................28-101
Application Example 5: IP Phone (LLDP Network Policy TLV/
Mobile Tag) .......................................................................................................28-104
Application Example 6: Restricted Role (Policy List) Assignment ...................28-106
Verifying Access Guardian Users .............................................................................28-109
Logging Users Out of the Network ....................................................................28-112
Verifying the Access Guardian Configuration ..........................................................28-114
Bring Your Own Devices (BYOD) Overview ..........................................................28-115
Key Components of a BYOD Solution ..............................................................28-116
Configuring OmniSwitch BYOD Support .........................................................28-123
BYOD Authentication Process Overview ..........................................................28-126
Multicast Domain Name System ........................................................................28-127
Simple Service Discovery Protocol ....................................................................28-128
Zero Configuration Networking (mDNS and SSDP) .........................................28-132
BYOD Application Examples ...................................................................................28-142
Application Example 1: 802.1X — OmniSwitch Configuration .......................28-143
Application Example 1: 802.1X — ClearPass Configuration ............................28-144
Application Example 2: IP Phone — OmniSwitch Configuration ....................28-149