MSM7xx Controllers Configuration Guide v6.4.0
Configuring global 802.1X settings for wired users...............................................................338
Configuring global 802.1X settings for wireless users............................................................338
Configuring 802.1X support on an HP 517 or MSM317 switch port.........................................339
MAC-based authentication.....................................................................................................339
MAC-based filtering.........................................................................................................340
Configuring global MAC-based authentication.....................................................................341
Configuring MAC-based authentication on a VSC................................................................342
Configuring MAC-based authentication on an HP 517 or MSM317 switch port.........................343
Configuring global MAC lockout........................................................................................344
Configuring MAC-based filters on a VSC............................................................................344
Configuring MAC-based filters on an HP 517 or MSM317 switch port.....................................345
Configuring MAC address lists...........................................................................................346
Configuring MAC address format.......................................................................................347
HTML-based authentication....................................................................................................347
Configuring HTML-based authentication on a VSC................................................................348
VPN-based authentication......................................................................................................349
Configuring VPN-based authentication on a VSC.................................................................350
No authentication.................................................................................................................350
Locally-defined user accounts.................................................................................................350
Features..........................................................................................................................351
Defining a user account....................................................................................................355
Defining account profiles..................................................................................................357
Defining subscription plans...............................................................................................358
Accounting persistence.....................................................................................................359
User addressing and related features......................................................................................360
17 Authentication services..........................................................................361
Introduction..........................................................................................................................361
Using the integrated RADIUS server........................................................................................361
Primary features...............................................................................................................361
Server configuration.........................................................................................................362
User account configuration................................................................................................363
Using a third-party RADIUS server..........................................................................................364
Configuring a RADIUS server profile...................................................................................364
Authenticating manager logins using a third-party RADIUS server..........................................368
Using an Active Directory server.............................................................................................369
Supported protocols.........................................................................................................369
Active Directory configuration............................................................................................369
Configuring an Active Directory group................................................................................371
Configuring a VSC to use Active Directory...........................................................................373
18 Security...............................................................................................374
Firewall...............................................................................................................................374
Firewall presets................................................................................................................374
Firewall configuration.......................................................................................................375
Customizing the firewall....................................................................................................376
Managing certificates...........................................................................................................376
Trusted CA certificate store................................................................................................377
Certificate and private key store.........................................................................................378
Certificate usage.............................................................................................................380
About certificate warnings.................................................................................................381
IPSec certificates..............................................................................................................381
Certificate expiration alerts....................................................................................................383
19 Local mesh...........................................................................................384
Key concepts.......................................................................................................................384
Contents 9










