Users Guide

Table Of Contents
Configuring Remote AP Authorization Profiles
Remote AP configurations include an authorization profile that specifies which profile settings should be
assigned to a remote AP that has been provisioned but not yet authenticated at the remote site. These yet-
unauthorized APs are put into the temporary AP group authorization-group by default and assigned the
predefined profile NoAuthApGroup. This configuration allows the user to connect to an unauthorized remote
AP via a wired port, then enter a corporate username and password. Once a valid user has authorized the AP,
and it will be marked as authorized on the network. The remote AP will then download the configuration
assigned to that AP by its permanent AP group.
In the WebUI
Adding or Editing a Remote AP Authorization Profile
To create a new authorization profile or edit an existing authorization profile via the WebUI:
1. Select Configuration > All Profiles. The All Profile Management window opens.
2. Select AP to expand the AP profile menu.
3. Select AP Authorization Profile. The Profile Details pane appears and displays the list of existing AP
authorization profiles.
l To edit an existing profile, select a profile from the Profile Details pane.
l To create a new authorization profile, enter a new profile name in the entry blank on the Profile Details
pane, then click Add.
4. The Profile Details window will display the AP group currently defined for that authorization profile. To
select a new AP group, click the drop-down list and select a different AP group name.
5. Click Apply.
In the CLI
To create a new authorization profile or edit an existing authorization profile via the command-line interface,
access the command-line interface in enable mode, and issue the following commands.
(host) (config) #ap authorization-profile <profile>
authorization-group <ap-group>
Working with Access Control Lists and Firewall Policies
Remote APs support the following access control lists (ACLs); unless otherwise noted, you apply these ACLS to
user roles:
l Standard ACLs—Permit or deny traffic based on the source IP address of the packet.
l Ethertype ACLs—Filter traffic based on the Ethertype field in the frame header.
l MAC ACLs—Filter traffic on a specific source MAC address or range of MAC addresses.
l Firewall policies (session ACLs)—Identifies specific characteristics about a data packet passing through the
Dell controller and takes some action based on that identification. You apply these ACLs to user roles or
uplink ports.
To configure firewall policies, you must install the PEFNG license.
For more information about ACLs and firewall policies, see Configuring Fallback Mode on page 737.
Dell Networking W-Series ArubaOS 6.4.x | User Guide Remote Access Points | 748