EasyManua.ls Logo

Alcatel-Lucent OmniSwitch 6860 Series

Alcatel-Lucent OmniSwitch 6860 Series
1078 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Configuring Access Guardian Quick Steps for Configuring Access Guardian
OmniSwitch AOS Release 8 Network Configuration Guide December 2017 page 28-10
Quick Steps for Configuring Access Guardian
The following procedure provides a brief tutorial for setting up the OmniSwitch implementation of Access
Guardian network access control. For additional configuration tutorials, see “Access Guardian Application
Examples” on page 28-95 and “Quick Steps for Configuring Captive Portal Authentication” on
page 28-78.
1 Configure the RADIUS server to use for device authentication (802.1X, MAC, or Captive Portal). For
example, the following commands define the RADIUS server for MAC device authentication:
-> aaa radius-server rad1_mac host 10.135.60.44 hash-key secret retransmit 3
timeout 2 auth-port 1812 acct-port 1813
-> aaa device-authentication mac rad1_mac
2 Configure the RADIUS server with the IP address of the OmniSwitch and the same shared secret that
was assigned through the AAA RADIUS server configuration in Step 1.
3 Add the user name and password details in the RADIUS server.
4 Enable the MAC authentication session timer to determine the amount of time the user session remains
active after a successful login (the default time is set to 12 hours). For example:
-> aaa mac session-timeout enable
5 Configure a UNP profile to which user devices will be assigned. Profile attribute values are applied to
devices that are associated with the profile. For example, the following commands create the
“na_employee” profile and assign the QoS policy list “naEmpList” to the profile. QoS policy rules
contained in the “naEmpList” list are applied to traffic assigned to the “na_employee” profile.
-> unp profile na_employee
-> unp profile na_employee qos-policy-list naEmpList
The QoS policy list name specified in the above example must already exist in the switch
configuration. See “UNP Profile Attributes” on page 28-18 for more information about assigning a
QoS policy list and other configurable options for a UNP profile.
6 Configure an additional UNP profile that will serve as a default profile for UNP port configuration. For
example, the following command creates the “def_unp” profile that is configured as a default profile for
UNP ports configured in Step 10:
-> unp profile def_unp
7 Configure a VLAN or service mapping for the profiles created in Step 5 and Step 6. Devices that are
assigned to a profile will automatically become members of the VLAN or service that is mapped to the
profile. For example, the following commands map VLAN 100 to the “na_employee” profile and VLAN
200 to the “def_unp” profile:
-> unp profile map na_employee vlan 100
-> unp profile map def_unp vlan 200
See “UNP Profile Mapping” on page 28-17 for more information about assigning a VLAN or service
parameters to a UNP profile.
8 Configure UNP classification rules that will identify the device traffic to assign to a specific profile.
For example, the following command creates a MAC address range rule for profile “na_employee”. Any
user device with a source MAC address that falls within the specified range is assigned to the profile.

Table of Contents

Related product manuals