Configuring AAA for network users 575
Nortel WLAN—Security Switch 2300 Series Configuration Guide
success: change accepted.
WSS# set service-profile mycorp-srvcprof cipher-ccmp enable
success: change accepted.
3Display the service profile to verify the changes:
WSS# show service-pr ofile mycorp-srvcprof
ssid-name: mycorp ssid-type: crypto
Beacon: yes Proxy ARP: no
DHCP restrict: no No broadcast: no
Short retry limit: 5 Long retry limit: 5
Auth fallthru: none Sygate On-Demand (SODA): no
Enforce SODA checks: yes SODA remediation ACL:
Custom success web-page: Custom failure web-page:
Custom logout web-page: Custom agent-directory:
Static COS: no COS: 0
CAC mode: none CAC sessions: 14
User idle timeout: 180 Idle client probing: yes
Keep initial vlan: no Web Portal Session Timeout: 5
Web Portal ACL: portalacl
WEP Key 1 value: <none> WEP Key 2 value: <none>
WEP Key 3 value: <none> WEP Key 4 value: <none>
WEP Unicast Index: 1 WEP Multicast Index: 1
Shared Key Auth: NO
RSN enabled:
ciphers: cipher-tkip, cipher-ccmp
authentication: 802.1X
TKIP countermeasures time: 60000ms
vlan-name = mycorp-vlan
4Configure individual Web-based AAA users.
WSS# set user alice password alicepword
success: change accepted.
WSS# set user bob password bobpword
success: change accepted.
5Configure a web authentication rule for Web-based AAA users. The following rule uses a wildcard (**)
to match on all user names.
The rule does not by itself allow access to all usernames. The ** value simply makes all usernames
eligible for authentication, in this case by searching the switch’s local database for the matching
usernames and passwords. If a username does not match on the access rule’s userglob, the user is denied
access without a search of the local database for the username and password.
WSS# set authentication web ssid mycorp ** local
success: change accepted.
6Display the configuration:
WSS# show config
# Configuration nvgen'd at 2006-6-13 13:27:07
# Image 5.0.0.0.62
# Model 2350
# Last change occurred at 2006-6-13 13:24:46