
Table of contents
SCALANCE W1750D UI
8Configuration Manual, , C79000-G8976-C451-02
13.9.1 Disabling Captive Portal Authentication............................................................................... 195
14 Authentication and User Management..................................................................................................197
14.1 Managing AP Users ............................................................................................................. 197
14.1.1 Configuring AP Users .......................................................................................................... 198
14.1.2 Configuring Authentication Parameters for Management Users ......................................... 200
14.1.3 Adding Guest Users through the Guest Management Interface.......................................... 202
14.2 Supported Authentication Methods...................................................................................... 203
14.3 Supported EAP Authentication Frameworks ....................................................................... 205
14.4 Configuring Authentication Servers ..................................................................................... 206
14.4.1 Supported Authentication Servers ....................................................................................... 206
14.4.2 TACACS Servers ................................................................................................................. 208
14.4.3 Configuring an External Server for Authentication............................................................... 209
14.4.4 Enabling RADIUS Communication over TLS....................................................................... 214
14.4.5 Configuring Dynamic RADIUS Proxy Parameters ............................................................... 216
14.4.6 Associate Server Profiles to a Network Profile .................................................................... 218
14.5 Understanding Encryption Types......................................................................................... 220
14.6 Configuring Authentication Survivability .............................................................................. 222
14.7 Configuring 802.1X Authentication for a Network Profile .................................................... 224
14.8 Enabling 802.1X Supplicant Support ................................................................................... 227
14.9 Configuring MAC Authentication for a Network Profile........................................................ 229
14.10 Configuring MAC Authentication with Captive Portal Authentication................................... 231
14.11 Configuring WISPr Authentication ....................................................................................... 233
14.12 Blacklisting Clients ............................................................................................................... 235
14.13 Uploading Certificate............................................................................................................ 238
15 Roles and Policies ...............................................................................................................................243
15.1 Firewall Policies ................................................................................................................... 243
15.1.1 Access Control List Rules .................................................................................................... 243
15.1.2 Configuring ACL Rules for Network Services ...................................................................... 244
15.1.3 Configuring Network Address Translation Rules ................................................................. 247
15.1.4 Configuring ALG Protocols .................................................................................................. 250
15.1.5 Configuring Firewall Settings for Protection from ARP Attacks ........................................... 251
15.1.6 Configuring Firewall Settings to Disable Auto Topology Rules ........................................... 253
15.1.7 Managing Inbound Traffic .................................................................................................... 254
15.2 Content Filtering................................................................................................................... 260
15.3 Configuring User Roles........................................................................................................ 266
15.4 Configuring Derivation Rules ............................................................................................... 270
15.4.1 Understanding Role Assignment Rule................................................................................. 270
15.4.2 Creating a Role Derivation Rule .......................................................................................... 271
15.4.3 Understanding VLAN Assignment ....................................................................................... 273
15.4.4 Configuring VLAN Derivation Rules..................................................................................... 275
15.5 Using Advanced Expressions in Role and VLAN Derivation Rules..................................... 277
15.6 Configuring a User Role for VLAN Derivation...................................................................... 279