Table of contents
SCALANCE W1750D UI
8 Configuration Manual, , C79000-G8976-C451-02
13.9.1 Disabling Captive Portal Authentication ............................................................................... 195
14 Authentication and User Management .................................................................................................. 197
14.1 Managing AP Users ............................................................................................................. 197
14.1.1 Configuring AP Users .......................................................................................................... 198
14.1.2 Configuring Authentication Parameters for Management Users ......................................... 200
14.1.3 Adding Guest Users through the Guest Management Interface .......................................... 202
14.2 Supported Authentication Methods ...................................................................................... 203
14.3 Supported EAP Authentication Frameworks ....................................................................... 205
14.4 Configuring Authentication Servers ..................................................................................... 206
14.4.1 Supported Authentication Servers ....................................................................................... 206
14.4.2 TACACS Servers ................................................................................................................. 208
14.4.3 Configuring an External Server for Authentication ............................................................... 209
14.4.4 Enabling RADIUS Communication over TLS ....................................................................... 214
14.4.5 Configuring Dynamic RADIUS Proxy Parameters ............................................................... 216
14.4.6 Associate Server Profiles to a Network Profile .................................................................... 218
14.5 Understanding Encryption Types ......................................................................................... 220
14.6 Configuring Authentication Survivability .............................................................................. 222
14.7 Configuring 802.1X Authentication for a Network Profile .................................................... 224
14.8 Enabling 802.1X Supplicant Support ................................................................................... 227
14.9 Configuring MAC Authentication for a Network Profile ........................................................ 229
14.10
Configuring MAC Authentication with Captive Portal Authentication ................................... 231
14.11 Configuring WISPr Authentication ....................................................................................... 233
14.12 Blacklisting Clients ............................................................................................................... 235
14.13 Uploading Certificate ............................................................................................................ 238
15 Roles and Policies ............................................................................................................................... 243
15.1 Firewall Policies ................................................................................................................... 243
15.1.1 Access Control List Rules .................................................................................................... 243
15.1.2 Configuring ACL Rules for Network Services ...................................................................... 244
15.1.3 Configuring Network Address Translation Rules ................................................................. 247
15.1.4 Configuring ALG Protocols .................................................................................................. 250
15.1.5 Configuring Firewall Settings for Protection from ARP Attacks ........................................... 251
15.1.6 Configuring Firewall Settings to Disable Auto Topology Rules ........................................... 253
15.1.7 Managing Inbound Traffic .................................................................................................... 254
15.2 Content Filtering ................................................................................................................... 260
15.3 Configuring User Roles ........................................................................................................ 266
15.4 Configuring Derivation Rules ............................................................................................... 270
15.4.1 Understanding Role Assignment Rule ................................................................................. 270
15.4.2 Creating a Role Derivation Rule .......................................................................................... 271
15.4.3 Understanding VLAN Assignment ....................................................................................... 273
15.4.4 Configuring VLAN Derivation Rules ..................................................................................... 275
15.5 Using Advanced Expressions in Role and VLAN Derivation Rules ..................................... 277
15.6 Configuring a User Role for VLAN Derivation ...................................................................... 279