Motorola Wing 5 Manual
Have a look at the manual Motorola Wing 5 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 249 Motorola manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
ROLE-POLICY 20 - 13 20.1.3.2.3 captive-portal user-role commands Defines captive portal based role filter for this user role Supported in the following platforms: AP300 AP621 AP650 AP6511 AP6521 AP6532 AP71XX RFS4000 RFS6000 RFS7000 NX9000 NX9500 Syntax captive-portal authentication-state [any|post-login|pre-login] Parameters • captive-portal authentication-state [any|post-login|pre-login] Examples rfs7000-37FABE(config-role-policy-test-user-role-testing)#captive-portal authentication-state pre-login rfs7000-37FABE(config-role-policy-test-user-role-testing)#show context user-role role1 precedence 1 authentication-type eq kerberos ap-location contains office captive-portal authentication-state pre-login rfs7000-37FABE(config-role-policy-test-user-role-testing)# Related Commands authentication-state Defines the authentication state of a client connecting to a captive portal any Specifies any authentication state post-login Specifies authentication is completed successfully pre-login Specifies authentication is pending noRemoves captive portal based role filters configured for a user role
20 - 14 WiNG CLI Reference Guide 20.1.3.2.4 encryption-type user-role commands Selects the encryption type for this user role. Encryption ensures privacy of all communication between access points and wireless clients. There are various modes of encrypting communication on a WLAN, such as Counter-model CBC-MAC Protocol (CCMP), Wired Equivalent Privacy (WEP), keyguard, Temporal Key Integrity Protocol (TKIP) etc. Supported in the following platforms: AP300 AP621 AP650 AP6511 AP6521 AP6532 AP71XX RFS4000 RFS6000 RFS7000 NX9000 NX9500 Syntax encryption-type [any|eq|neq] encryption-type any encryption-type [eq|neq] [ccmp|keyguard|none|tkip|wep128|wep64] {(ccmp|keyguard|none|tkip|tkip-ccmp|wep128|wep64)} Parameters • encryption-type any any The encryption type can be any one of the listed options
ROLE-POLICY 20 - 15 • encryption-type [eq|neq] [ccmp|keyguard|none|tkip|wep128|wep64] {(ccmp|keyguard|none|tkip|tkip-ccmp|wep128|wep64)} Examples rfs7000-37FABE(config-role-policy-test-user-role-testing)#encryption-type eq wep128 rfs7000-37FABE(config-role-policy-test-user-role-testing)#show context user-role role1 precedence 1 authentication-type eq kerberos encryption-type eq wep128 ap-location contains office captive-portal authentication-state pre-login rfs7000-37FABE(config-role-policy-test-user-role-testing)# Related Commands eq [ccmp|keyguard|none|tkip| wep128|wep64]The encryption type equals one of the following options: ccmp: Encryption mode is CCMP keyguard: Encryption mode is keyguard. Keyguard encryption shields the master encryption keys from being discovered none: No encryption mode specified tkip: Encryption mode is TKIP wep128: Encryption mode is WEP128 wep64: Encryption mode is WEP64 These parameters are recursive, and you can configure more than one encryption type for this user role. neq[ccmp|keyguard|none|tkip| wep128|wep64]The encryption type is not equal to any of the following options: ccmp: Encryption mode is not equal to CCMP keyguard: Encryption mode is not equal to keyguard none: Encryption mode is not equal to none tkip: Encryption mode is not equal to TKIP wep128: Encryption mode is not equal to WEP128 wep64: Encryption mode is not equal to WEP64 These parameters are recursive, and you can configure more than one ‘not equal to’ encryption type for this user role. noRemoves the encryption type configured for this user role
20 - 16 WiNG CLI Reference Guide 20.1.3.2.5 group user-role commands Configures a group for this user role Supported in the following platforms: AP300 AP621 AP650 AP6511 AP6521 AP6532 AP71XX RFS4000 RFS6000 RFS7000 NX9000 NX9500 Syntax group [any|contains|exact|not-contains] group any group [contains|exact|not-contains] Parameters • group any • group [contains|exact|not-contains] Examples rfs7000-37FABE(config-role-policy-test-user-role-testing)#group any rfs7000-37FABE(config-role-policy-test-user-role-testing)# Related Commands any This user role can fit into any group contains Configures this user role with a group that contains the specified string – Enter the string to match against. This is case sensitive, and is compared against the group name returned by the RADIUS server. exact Configures this user role with a group that contains the exact specified string – Enter the exact string to match against. This is case sensitive, and is compared against the group name returned by the RADIUS server. not-contains Configures this user role with a group that does not contain the specified string – Enter the string to match against. This is case sensitive, and is compared against the group name returned by the RADIUS server. noRemoves the group configured for a user role
ROLE-POLICY 20 - 17 20.1.3.2.6 mu-mac user-role commands Configures a client’s MAC addresses for the role based firewall Supported in the following platforms: AP300 AP621 AP650 AP6511 AP6521 AP6532 AP71XX RFS4000 RFS6000 RFS7000 NX9000 NX9500 Syntax mu-mac [|any] mu-mac any mu-mac {mask } Parameters • mu-mac any • mu-mac {mask } Examples rfs7000-37FABE(config-role-policy-test-user-role-testing)#mu-mac any rfs7000-37FABE(config-role-policy-test-user-role-testing)# Related Commands any Matches a wireless client with any MAC address Matches a specific MAC address with the allowed wireless client – Sets the MAC address in the AA-BB-CC-DD-EE-FF format mask Optional. After specifying the client’s MAC address, specify the mask in the AA-BB-CC-DD-EE-FF format. noRemoves the MAC address and mask for this user role
20 - 18 WiNG CLI Reference Guide 20.1.3.2.7 no user-role commands Negates a command or resets configured settings to their default. When used in the config role policy user role mode, the no command removes or resets settings, such as AP location, authentication type, encryption type, captive portal etc. Supported in the following platforms: AP300 AP621 AP650 AP6511 AP6521 AP6532 AP71XX RFS4000 RFS6000 RFS7000 NX9000 NX9500 Syntax no [ap-location|authentication-type|captive-portal|encryption-type|group| mu-mac|ssid|use] no [ap-location|authentication-type|encryption-type|group|mu-mac|ssid] no captive-portal authentication-state no use ip-access-list [in|out] precedence no use mac-access-list [in|out] precedence Parameters • no [ap-location|authentication-type|encryption-type|group|mu-mac|ssid] • no captive-portal authentication-state no ap-location Removes a AP’s deployment location no authentication-type Removes the authentication type configured for a user role no encryption-type Removes the encryption type configured for a user role no group Removes the group configured for a user role no mu-mac Removes the MAC address and mask configured for a user role no ssid Removes the SSID configured for a user role no captive-portal Removes the captive portal based role filter configured for a user role authentication-state Reverts the authentication state to default
ROLE-POLICY 20 - 19 • no use ip-access-list [in|out] precedence • no use mac-access-list [in|out] MAC-ACCESS-LIST> precedence Usage Guidelines The no command negates any command associated with it. Wherever required, use the same parameters associated with the command getting negated. Examples The Role Policy User Role configuration before the execution of the no command: rfs7000-37FABE(config-role-policy-test-user-role-testing)#show context user-role role1 precedence 1 authentication-type eq kerberos encryption-type eq wep128 ap-location contains office captive-portal authentication-state pre-login rfs7000-37FABE(config-role-policy-test-user-role-testing)# The Role Policy User Role configuration after the execution of the no command: rfs7000-37FABE(config-role-policy-test-user-role-testing)#no authentication-type rfs7000-37FABE(config-role-policy-test-user-role-testing)# rfs7000-37FABE(config-role-policy-test-user-role-testing)#no encryption-type rfs7000-37FABE(config-role-policy-test-user-role-testing)# rfs7000-37FABE(config-role-policy-test-user-role-testing)#show context user-role role1 precedence 1 ap-location contains office captive-portal authentication-state pre-login rfs7000-37FABE(config-role-policy-test-user-role-testing)# no use Removes an IP or MAC access list from being used with this user role ip-access-list [in|out] Removes the IP access list in – Removes the list from being applied to incoming packets out – Removes the list from being applied to outgoing packets Specifies the IP access list name precedence Removes the access list precedence – Specifies the precedence from 1 - 100 no use Removes an IP or MAC access list used with this user role mac-access-list [in|out] Removes the Mac access list in – Removes the list from being applied to incoming packets out – Removes the list from being applied to outgoing packets Specifies the MAC access list name precedence Removes the access list precedence – Specifies the precedence from 1 - 100
20 - 20 WiNG CLI Reference Guide Related Commands ap-locationSets an AP’s deployment location authentication-typeSelects the authentication type for a user role captive-portalDefines a captive portal based role filter for a user role encryption-typeSelects the encryption type used for a user role groupConfigures a group for a user role mu-macConfigures the client’s MAC addresses for the role based firewall ssidConfigures a user role SSID useDefines the access list settings used with a user role
ROLE-POLICY 20 - 21 20.1.3.2.8 ssid user-role commands Configures a user role SSID Supported in the following platforms: AP300 AP621 AP650 AP6511 AP6521 AP6532 AP71XX RFS4000 RFS6000 RFS7000 NX9000 NX9500 Syntax ssid [any|exact|contains|not-contains] ssid any ssid [exact|contains|not-contains] Parameters • ssid any • ssid [exact|contains|not-contains] ssid any Specifies the SSID can be any value ssid exact Specifies the SSID exactly matches the specified string – Specify the SSID to match. The SSID is case sensitive and is compared against the SSID configured for the WLAN. ssid contains Specifies the SSID contains the specified string – Specify the SSID to match. The SSID is case sensitive and is compared against the SSID configured for the WLAN. ssid not-contains Specifies the SSID does not contain the specified string – Specify the SSID to match. The SSID is case sensitive and is compared against the SSID configured for the WLAN.
20 - 22 WiNG CLI Reference Guide Examples rfs7000-37FABE(config-role-policy-test-user-role-testing)#ssid not-contains TESTSSID rfs7000-37FABE(config-role-policy-test-user-role-testing)#show context user-role role1 precedence 1 ssid not-contains TESTSSID captive-portal authentication-state pre-login rfs7000-37FABE(config-role-policy-test-user-role-testing)# Related Commands noRemoves the SSID configured for a user role