Motorola Wing 5 Manual
Have a look at the manual Motorola Wing 5 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 249 Motorola manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
ROLE-POLICY 20 - 3 20.1.1 default-role role-policy Assigns a default role to a wireless client that fails to find a matching role. Use this command to configure a wireless client not matching any role. Supported in the following platforms: AP300 AP621 AP650 AP6511 AP6521 AP6532 AP71XX RFS4000 RFS6000 RFS7000 NX9000 NX9500 Syntax default-role use [ip-access-list|mac-access-list] default-role use ip-access-list [in|out] precedence default-role use mac-access-list [in|out] precedence Parameters • default-role use ip-access-list [in|out] precedence default-role use Enables the configuration of a wireless client not matching any role Use – Enables the use of an IP or a MAC access list ip-access-list [in|out] Enables the use of an IP access list in – Applies the rule to incoming packets out – Applies the rule to outgoing packets Specifies the IP access list – Sets the IP access list name precedence After specifying the IP access list, specify the access list precedence value. precedence – Based on the packets received, the lower precedence value is evaluated first – Sets a precedence value from 1 - 100
20 - 4 WiNG CLI Reference Guide • default-role use mac-access-list [in|out] MAC-ACCESS-LIST> precedence Examples rfs7000-37FABE(config-role-policy-test)#default-role use ip-access-list in test precedence 1 rfs7000-37FABE(config-role-policy-test)#show context role-policy test default-role use ip-access-list in test precedence 1 rfs7000-37FABE(config-role-policy-test)# Related Commands default-role use Enables the configuration of a wireless client not matching any role Use – Enables the use of an IP or MAC access list mac-access-list [in|out] Enables the use of a MAC access list in – Applies the rule to incoming packets out – Applies the rule to outgoing packets Specifies the MAC access list – Sets the MAC access list name precedence After specifying the MAC access list, specify the ACL precedence value. precedence – Based on the packets received, the lower precedence value is evaluated first – Sets a precedence value from 1 - 100 noRemoves the default role assigned to a client ip-access-listCreates a new IP based access list. Access lists control access to the network using a set of rules. Each rule specifies an action taken when a packet matches a given set of rules. If the action is deny, the packet is dropped. If the action is permit, the packet is allowed.
ROLE-POLICY 20 - 5 20.1.2 no role-policy Negates a command or resets settings to their default. When used in the config role policy mode, the no command removes the default role assigned to a wireless client. It also disables existing user roles from being assigned to new users. Supported in the following platforms: AP300 AP621 AP650 AP6511 AP6521 AP6532 AP71XX RFS4000 RFS6000 RFS7000 NX9000 NX9500 Syntax no [default-role|user-role] no default-role use [ip-access-list|mac-access-list] no default-role use ip-access-list [in|out] precedence no default-role use mac-access-list [in|out] precedence no user-role Parameters • no default-role use ip-access-list [in|out] precedence no default-role use Removes the default role assigned to a wireless client Use – Disables the use of an IP or MAC access list ip-access-list [in|out] Disables the use of an IP access list in – Removes the rule applied to incoming packets out – Removes the rule applied to outgoing packets Specifies the IP access list to remove – Sets the IP access list name precedence After specifying the IP access list, specify the ACL precedence value applied. precedence – Based on the packets received, the lower precedence value is evaluated first. – Specify the precedence value from 1 - 100.
20 - 6 WiNG CLI Reference Guide • no default-role use mac-access-list [in|out] precedence • no user-role Examples rfs7000-37FABE(config-role-policy-test)#no default-role use ip-access-list in test precedence 1 rfs7000-37FABE(config-role-policy-test)#show context role-policy test role role1 precedence 1 rfs7000-37FABE(config-role-policy-test)# Related Commands no default-role use Removes the default role assigned to a wireless client Use – Disables the use of an IP or MAC access list mac-access-list [in|out] Disables the use of a MAC access list in – Removes the rule applied to incoming packets out – Removes the rule applied to outgoing packets Specifies the MAC access list to remove – Sets the MAC access list name precedence After specifying the MAC access list to remove, specify the ACL precedence value applied. precedence – Based on the packets received, the lower precedence value is evaluated first. – Specify the precedence value from 1 - 100. no user-role Deletes a user role – Specify the user role name. default-roleAssigns a default role to a wireless client user-role commandsCreates a role and associates it to the newly created role policy
ROLE-POLICY 20 - 7 20.1.3 user-role role-policy This command creates a user defined role and associates it to a role policy. This command defines a number of settings used to assign a user defined role to the role policy. user-roleCreates a user defined role user-role commandsSummarizes the user role commands
20 - 8 WiNG CLI Reference Guide 20.1.3.1 user-role user-role Creates a user defined role. A user defined role configures a set of rules for this role. Supported in the following platforms: AP300 AP621 AP650 AP6511 AP6521 AP6532 AP71XX RFS4000 RFS6000 RFS7000 NX9000 NX9500 Syntax user-role precedence Parameters • user-role precedence Examples rfs7000-37FABE(config)#role-policy test rfs7000-37FABE(config-role-policy-test)#show context role-policy test default-role use ip-access-list in test precedence 1 rfs7000-37FABE(config-role-policy-test)#user-role testing precedence 10 rfs7000-37FABE(config-role-policy-test-user-role-testing)# rfs7000-37FABE(config-role-policy-test-user-role-testing)#show context user-role testing precedence 10 default-role use ip-access-list in test precedence 1 Related Commands user-role Configures the user defined role name – Sets the user defined role name precedence Configures the rule precedence – Sets the precedence for this role. If multiple roles match, then the role with the lower precedence number is selected. noRemoves the user defined role assigned to a client
ROLE-POLICY 20 - 9 20.1.3.2 user-role commands role-policy Table 20.2 summarizes user role commands Table 20.2user-role Commands Commands Description Reference ap-locationSets an AP’s deployment locationpage 20-10 authentication- typeSelects an authentication type for a user rolepage 20-11 captive-portalDefines a captive portal role based filterpage 20-13 encryption-typeSelects the encryption typepage 20-14 groupSets a group configuration for the rolepage 20-16 mu-macConfigures the client MAC addresses for the role based firewallpage 20-17 noNegates a command or sets its defaultpage 20-18 ssidSpecifies a SSIDpage 20-21 useDefines the settings used with the role policypage 20-23 clrscrClears the display screenpage 5-3 commitCommits (saves) changes made in the current sessionpage 5-4 doRuns commands from EXEC modepage 4-66 endEnds and exits the current mode and moves to the PRIV EXEC modepage 5-5 exitEnds the current mode and moves to the previous modepage 5-6 helpDisplays the interactive help systempage 5-7 revertReverts changes to their last saved configurationpage 5-13 serviceInvokes service commands to troubleshoot or debug (config-if) instance configurationspage 5-14 showDisplays running system informationpage 6-4 writeWrites the system running configuration to memory or terminalpage 5-42
20 - 10 WiNG CLI Reference Guide 20.1.3.2.1 ap-location user-role commands Sets an AP’s deployment location Supported in the following platforms: AP300 AP621 AP650 AP6511 AP6521 AP6532 AP71XX RFS4000 RFS6000 RFS7000 NX9000 NX9500 Syntax ap-location [any|contains|exact|not-contains] ap-location any ap-location [contains|exact|not-contains] Parameters • ap-location any • ap-location [contains|exact|not-contains] Examples rfs7000-37FABE(config-role-policy-test-user-role-testing)#ap-location contains office rfs7000-37FABE(config-role-policy-test-user-role-testing)# rfs7000-37FABE(config-role-policy-test-user-role-testing)#show context user-role role1 precedence 1 ap-location contains office rfs7000-37FABE(config-role-policy-test-user-role-testing)# Related Commands ap-location any Defines an AP’s location as any contains Defines an AP location that contains a specified string – Sets a string to match exact Defines an AP location that contains the exact specified string – Sets an exact string to match not-contains Defines an AP location that does not contain the string – Sets a string that does not match the AP location noRemoves an AP’s deployment location
ROLE-POLICY 20 - 11 20.1.3.2.2 authentication-type user-role commands Selects the authentication type for this user role Supported in the following platforms: AP300 AP621 AP650 AP6511 AP6521 AP6532 AP71XX RFS4000 RFS6000 RFS7000 NX9000 NX9500 Syntax authentication-type [any|eq|neq] authentication-type any authentication-type [eq|neq] [eap|kerberos|mac-auth|none] {(eap|kerberos|mac-auth|none)} Parameters • authentication-type any any The authentication type is any supported type
20 - 12 WiNG CLI Reference Guide • authentication-type [eq|neq] [eap|kerberos|mac-auth|none] {(eap|kerberos|mac-auth| none)} Examples rfs7000-37FABE(config-role-policy-test-user-role-testing)#authentication-type eq kerberos rfs7000-37FABE(config-role-policy-test-user-role-testing)#show context user-role role1 precedence 1 authentication-type eq kerberos ap-location contains office rfs7000-37FABE(config-role-policy-test-user-role-testing)# Related Commands eq [eap|kerberos|mac-auth| none]The authentication type equals one of the following types: eap – Extensible authentication protocol kerberos – Kerberos authentication mac-auth – MAC authentication protocol none – no authentication used These parameters are recursive, and you can configure more than one unique authentication type for this user role. neq [eap|kerberos| mac-auth|none]The authentication type does not match one or more of the following types: eap – Extensible authentication protocol kerberos – Kerberos authentication mac-auth – MAC authentication protocol none – no authentication used These parameters are recursive, and you can configure more than one unique ‘not equal to’ authentication type for this user role. noRemoves the authentication type configured for a user role