Home > Motorola > Wireless > Motorola Wing 5 Manual

Motorola Wing 5 Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Motorola Wing 5 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 249 Motorola manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 1128
    							ROLE-POLICY 20 - 13
    20.1.3.2.3  captive-portal
    user-role commands
    Defines captive portal based role filter for this user role
    Supported in the following platforms:
     AP300
     AP621
     AP650
     AP6511
     AP6521
     AP6532
     AP71XX
     RFS4000
     RFS6000
     RFS7000
     NX9000
     NX9500
    Syntax
    captive-portal authentication-state [any|post-login|pre-login]
    Parameters
    • captive-portal authentication-state [any|post-login|pre-login]
    Examples
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#captive-portal 
    authentication-state pre-login
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#show context
     user-role role1 precedence 1
      authentication-type eq kerberos
      ap-location contains office
      captive-portal authentication-state pre-login
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#
    Related Commands
    authentication-state Defines the authentication state of a client connecting to a captive portal
    any Specifies any authentication state
    post-login Specifies authentication is completed successfully
    pre-login Specifies authentication is pending
    noRemoves captive portal based role filters configured for a user role 
    						
    							20 - 14 WiNG CLI Reference Guide
    20.1.3.2.4  encryption-type
    user-role commands
    Selects the encryption type for this user role. Encryption ensures privacy of all communication between access points and 
    wireless clients. There are various modes of encrypting communication on a WLAN, such as Counter-model CBC-MAC 
    Protocol (CCMP), Wired Equivalent Privacy (WEP), keyguard, Temporal Key Integrity Protocol (TKIP) etc.
    Supported in the following platforms:
     AP300
     AP621
     AP650
     AP6511
     AP6521
     AP6532
     AP71XX
     RFS4000
     RFS6000
     RFS7000
     NX9000
     NX9500
    Syntax
    encryption-type [any|eq|neq]
    encryption-type any
    encryption-type [eq|neq] [ccmp|keyguard|none|tkip|wep128|wep64] 
    {(ccmp|keyguard|none|tkip|tkip-ccmp|wep128|wep64)}
    Parameters
    • encryption-type any
    any The encryption type can be any one of the listed options 
    						
    							ROLE-POLICY 20 - 15
    • encryption-type [eq|neq] [ccmp|keyguard|none|tkip|wep128|wep64] 
    {(ccmp|keyguard|none|tkip|tkip-ccmp|wep128|wep64)}
    Examples
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#encryption-type eq wep128
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#show context
     user-role role1 precedence 1
      authentication-type eq kerberos
      encryption-type eq wep128
      ap-location contains office
      captive-portal authentication-state pre-login
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#
    Related Commands
    eq [ccmp|keyguard|none|tkip|
    wep128|wep64]The encryption type equals one of the following options:
     ccmp: Encryption mode is CCMP
     keyguard: Encryption mode is keyguard. Keyguard encryption shields the master 
    encryption keys from being discovered
     none: No encryption mode specified
     tkip: Encryption mode is TKIP
     wep128: Encryption mode is WEP128
     wep64: Encryption mode is WEP64
    These parameters are recursive, and you can configure more than one encryption 
    type for this user role.
    neq[ccmp|keyguard|none|tkip|
    wep128|wep64]The encryption type is not equal to any of the following options:
     ccmp: Encryption mode is not equal to CCMP
     keyguard: Encryption mode is not equal to keyguard
     none: Encryption mode is not equal to none
     tkip: Encryption mode is not equal to TKIP
     wep128: Encryption mode is not equal to WEP128
     wep64: Encryption mode is not equal to WEP64
    These parameters are recursive, and you can configure more than one ‘not equal to’ 
    encryption type for this user role.
    noRemoves the encryption type configured for this user role 
    						
    							20 - 16 WiNG CLI Reference Guide
    20.1.3.2.5  group
    user-role commands
    Configures a group for this user role
    Supported in the following platforms:
     AP300
     AP621
     AP650
     AP6511
     AP6521
     AP6532
     AP71XX
     RFS4000
     RFS6000
     RFS7000
     NX9000
     NX9500
    Syntax
    group [any|contains|exact|not-contains]
    group any
    group [contains|exact|not-contains] 
    Parameters
    • group any
    • group [contains|exact|not-contains] 
    Examples
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#group any
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#
    Related Commands
    any This user role can fit into any group
    contains  Configures this user role with a group that contains the specified string
      – Enter the string to match against. This is case sensitive, and is compared 
    against the group name returned by the RADIUS server.
    exact  Configures this user role with a group that contains the exact specified string
      – Enter the exact string to match against. This is case sensitive, and is 
    compared against the group name returned by the RADIUS server.
    not-contains  Configures this user role with a group that does not contain the specified string
      – Enter the string to match against. This is case sensitive, and is compared 
    against the group name returned by the RADIUS server.
    noRemoves the group configured for a user role 
    						
    							ROLE-POLICY 20 - 17
    20.1.3.2.6  mu-mac
    user-role commands
    Configures a client’s MAC addresses for the role based firewall
    Supported in the following platforms:
     AP300
     AP621
     AP650
     AP6511
     AP6521
     AP6532
     AP71XX
     RFS4000
     RFS6000
     RFS7000
     NX9000
     NX9500
    Syntax
    mu-mac [|any]
    mu-mac any
    mu-mac  {mask }
    Parameters
    • mu-mac any
    • mu-mac  {mask }
    Examples
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#mu-mac any
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#
    Related Commands
    any Matches a wireless client with any MAC address
     Matches a specific MAC address with the allowed wireless client
      – Sets the MAC address in the AA-BB-CC-DD-EE-FF format
    mask  Optional. After specifying the client’s MAC address, specify the mask in the 
    AA-BB-CC-DD-EE-FF format.
    noRemoves the MAC address and mask for this user role 
    						
    							20 - 18 WiNG CLI Reference Guide
    20.1.3.2.7  no
    user-role commands
    Negates a command or resets configured settings to their default. When used in the config role policy user role mode, the 
    no command removes or resets settings, such as AP location, authentication type, encryption type, captive portal etc.
    Supported in the following platforms:
     AP300
     AP621
     AP650
     AP6511
     AP6521
     AP6532
     AP71XX
     RFS4000
     RFS6000
     RFS7000
     NX9000
     NX9500
    Syntax
    no [ap-location|authentication-type|captive-portal|encryption-type|group|
    mu-mac|ssid|use]
    no [ap-location|authentication-type|encryption-type|group|mu-mac|ssid]
    no captive-portal authentication-state
    no use ip-access-list [in|out]  precedence 
    no use mac-access-list [in|out]  precedence 
    Parameters
    • no [ap-location|authentication-type|encryption-type|group|mu-mac|ssid]
    • no captive-portal authentication-state
    no ap-location Removes a AP’s deployment location
    no authentication-type Removes the authentication type configured for a user role
    no encryption-type Removes the encryption type configured for a user role
    no group Removes the group configured for a user role
    no mu-mac Removes the MAC address and mask configured for a user role
    no ssid Removes the SSID configured for a user role
    no captive-portal Removes the captive portal based role filter configured for a user role
    authentication-state Reverts the authentication state to default 
    						
    							ROLE-POLICY 20 - 19
    • no use ip-access-list [in|out]  precedence 
    • no use mac-access-list [in|out] MAC-ACCESS-LIST> precedence 
    Usage Guidelines
    The no command negates any command associated with it. Wherever required, use the same parameters associated with 
    the command getting negated.
    Examples
    The Role Policy User Role configuration before the execution of the no command:
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#show context
     user-role role1 precedence 1
      authentication-type eq kerberos
      encryption-type eq wep128
      ap-location contains office
      captive-portal authentication-state pre-login
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#
    The Role Policy User Role configuration after the execution of the no command:
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#no authentication-type
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#no encryption-type
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#show context
     user-role role1 precedence 1
      ap-location contains office
      captive-portal authentication-state pre-login
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#
    no use Removes an IP or MAC access list from being used with this user role
    ip-access-list [in|out] Removes the IP access list
     in – Removes the list from being applied to incoming packets
     out – Removes the list from being applied to outgoing packets
     Specifies the IP access list name
    precedence  Removes the access list precedence
      – Specifies the precedence from 1 - 100
    no use Removes an IP or MAC access list used with this user role
    mac-access-list [in|out] Removes the Mac access list
     in – Removes the list from being applied to incoming packets
     out – Removes the list from being applied to outgoing packets
     Specifies the MAC access list name
    precedence  Removes the access list precedence
      – Specifies the precedence from 1 - 100 
    						
    							20 - 20 WiNG CLI Reference Guide
    Related Commands
    ap-locationSets an AP’s deployment location
    authentication-typeSelects the authentication type for a user role
    captive-portalDefines a captive portal based role filter for a user role
    encryption-typeSelects the encryption type used for a user role
    groupConfigures a group for a user role
    mu-macConfigures the client’s MAC addresses for the role based firewall
    ssidConfigures a user role SSID
    useDefines the access list settings used with a user role 
    						
    							ROLE-POLICY 20 - 21
    20.1.3.2.8  ssid
    user-role commands
    Configures a user role SSID
    Supported in the following platforms:
     AP300
     AP621
     AP650
     AP6511
     AP6521
     AP6532
     AP71XX
     RFS4000
     RFS6000
     RFS7000
     NX9000
     NX9500
    Syntax
    ssid [any|exact|contains|not-contains]
    ssid any
    ssid [exact|contains|not-contains] 
    Parameters
    • ssid any
    • ssid [exact|contains|not-contains] 
    ssid any Specifies the SSID can be any value
    ssid exact  Specifies the SSID exactly matches the specified string
      – Specify the SSID to match. The SSID is case sensitive and is compared 
    against the SSID configured for the WLAN.
    ssid contains  Specifies the SSID contains the specified string
      – Specify the SSID to match. The SSID is case sensitive and is compared 
    against the SSID configured for the WLAN.
    ssid not-contains  Specifies the SSID does not contain the specified string
      – Specify the SSID to match. The SSID is case sensitive and is compared 
    against the SSID configured for the WLAN. 
    						
    							20 - 22 WiNG CLI Reference Guide
    Examples
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#ssid not-contains TESTSSID
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#show context
     user-role role1 precedence 1
      ssid not-contains TESTSSID
      captive-portal authentication-state pre-login
    rfs7000-37FABE(config-role-policy-test-user-role-testing)#
    Related Commands
    noRemoves the SSID configured for a user role 
    						
    All Motorola manuals Comments (0)