EasyManuals Logo

Ruijie RG-WLAN Series User Manual

Ruijie RG-WLAN Series
1243 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #939 background imageLoading...
Page #939 background image
Configuration Guide Configuring ACL
interface of a user, but the user should be allowed to log in to a website to download some resources (for example,
downloading the Ruijie SU client) before the DOT1X authentication.
Configuration Steps
Configuring an ACL
(Mandatory) Configure an ACL before configuring the security channel. For details about the configuration method, see
the earlier descriptions.
You can configure this ACL on an access, an aggregate, or a core device based on the distribution of users. The
configurations take effect only on the local device, and do not affect other devices on the network.
Adding ACEs to an ACL
(Optional) An ACL may contain zero or multiple ACEs. If no ACE is configured for an ACL, it is equivalent that the
security channel does not take effect. For details about how to add an ACE to an ACL, see the related descriptions.
Configuring a Security Channel on a Specified Interface or Globally
Configure a security channel on an interface if you want this security channel take effect on the interface. Configure a
global security channel if you want this security channel take effect globally. You must configure either the
interface-based security channel or the global security channel.
You can configure a security channel on an access, an aggregate, or a core device based on the distribution of users.
Configuring an Exclusive Interface for the Global Security Channel
(Optional) Configure an interface as the exclusive interface for the global security channel if you do not want the global
security channel to take effect on this interface.
Configuring an Access Control Application
(Optional) You can enable the DOT1X or Web authentication function to verify the security channel function.
You can configure the access control function on an access, an aggregate, or a core device based on the distribution of
users.
Verification
On a PC that is subject to the control of an access control application, ping the resources (devices or servers) that are
allowed to bypass the check of the access control application to verify the configuration of the security channel.
Related Commands
Configuring an ACL
For details about how to configure an ACL, see the earlier descriptions about the IP ACL, MAC extended ACL, expert
extended ACL, or IPv6 ACL.
Adding ACEs to an ACL

Table of Contents

Other manuals for Ruijie RG-WLAN Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Ruijie RG-WLAN Series and is the answer not in the manual?

Ruijie RG-WLAN Series Specifications

General IconGeneral
BrandRuijie
ModelRG-WLAN Series
CategoryWireless Access Point
LanguageEnglish

Related product manuals