Users Guide

Table Of Contents
Dell PowerConnect ArubaOS 5.0 | User Guide Behavior and Defaults | 609
user-role default-vpn-role
session-acl allowall
ipv6 session-acl v6-allowall
This is the default role used for VPN-connected clients. It is referenced
in the default "aaa authentication vpn" profile.
user-role voice
session-acl sip-acl
session-acl noe-acl
session-acl svp-acl
session-acl vocera-acl
session-acl skinny-acl
session-acl h323-acl
session-acl dhcp-acl
session-acl tftp-acl
session-acl dns-acl
session-acl icmp-acl
This role can be applied to voice devices in order to automatically
permit and prioritize all VoIP protocols.
user-role guest
session-acl http-acl
session-acl https-acl
session-acl dhcp-acl
session-acl icmp-acl
session-acl dns-acl
ipv6 session-acl v6-http-acl
ipv6 session-acl v6-https-acl
ipv6 session-acl v6-dhcp-acl
ipv6 session-acl v6-icmp-acl
ipv6 session-acl v6-dns-acl
This is a default role for guest users. It permits only HTTP, HTTPS,
DHCP, ICMP, and DNS for the guest user. To increase security, a "deny"
rule for internal network destinations could be added at the beginning.
user-role guest-logon
captive-portal default
session-acl logon-control
session-acl captiveportal
This role is used as the pre-authentication role for guest SSIDs. It
allows control traffic such as DNS, DHCP, and ICMP, and also enables
captive portal.
user-role <ssid>-guest-logon
captive-portal default
session-acl logon-control
session-acl captiveportal
This role is only generated when creating a new WLAN using the
WLAN Wizard. The WLAN Wizard creates this role when captive portal
is enabled. This is the initial role that a guest will be placed in prior to
captive portal authentication. By using a different guest logon role for
each SSID, it is possible to enable multiple captive portal profiles with
different customization.
user-role stateful-dot1x This is an internal role used for Stateful 802.1x. It should not be edited.
user-role authenticated
session-acl allowall
ipv6 session-acl v6-allowall
This is a default role that can be used for authenticated users. It
permits all IPv4 and IPv6 traffic for users who are part of this role.
user-role logon
session-acl logon-control
session-acl captiveportal
session-acl vpnlogon
ipv6 session-acl v6-logon-control
This is a system role that is normally applied to a user prior to
authentication. This applies to wired users and non-802.1x wireless
users.
The role allows certain control protocols such as DNS, DHCP, and
ICMP, and also enables captive portal and VPN termination/pass
through. The logon role should be edited to provide only the required
services to a pre-authenticated user. For example, VPN pass through
should be disabled if it is not needed.
Table 133 Predefined Roles (Continued)
Predefined Role Description