Users Guide

Table Of Contents
Dell PowerConnect ArubaOS 5.0 | User Guide 802.1x Authentication | 273
5. Select the Role for each user (if a role is not specified, the default role is guest).
6. Select the expiration time for the user account in the internal database.
7. Click Apply.
Using the CLI
local-userdb add username <user> password <password>
Configuring a server rule using the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page.
2. Select Server Group to display the Server Group list.
3. Select the internal server group.
4. Under Server Rules, click New to add a server derivation rule.
a. For Condition, enter Role.
b. Select value-of from the drop-down menu.
c. Select Set Role from the drop-down menu.
d. Click Add.
5. Click Apply.
Configuring a server rule using the CLI
aaa server-group internal
set role condition Role value-of
Configure 802.1x Authentication
An AAA profile specifies the 802.1x authentication profile and 802.1x server group to be used for authenticating
clients for a WLAN. The AAA profile also specifies the default user role for 802.1x authentication.
For this example, you enable both 802.1x authentication and termination on the controller.
Using the WebUI
1. Navigate to the Configuration > Security > Authentication > L2 Authentication page. In the profiles list,
select 802.1x Authentication Profile.
a. In the Instance list, enter: dot1x, then click Add.
b. Select the dot1x profile you just created.
c. Select Termination.
d. Click Apply.
2. Select the AAA Profiles tab.
a. In the AAA Profiles Summary, click Add to add a new profile.
b. Enter aaa_dot1x, then click Add.
c. Select the aaa_dot1x profile you just created.
Note: Use the privileged mode in the CLI to configure users in the controller’s internal database.
Note: The defaults for EAP Method and Inner EAP Method are EAP-PEAP and EAP-MSCHAPv2, respectively.