Policies and Access Control
The
Policies and Access Control settings define the manner in which users are authenticated
and provisioned for network access. The relationship of roles, domains, sources,
devices, and connection profiles is described in several theory of operation
chapters:
-
Configuration - discusses A3's theory of operation with respect to policies and access control.
-
Enforcement Modes - discusses the means by which roles are enforced by access points and other devices.
-
Authentication Methods - discusses the multiple authentication sources available.
The key policy settings are best configured in the following order:
-
Roles - defines the type of users (for example, employees, guests, marketing, and sales) that are granted potentially different types of access.
-
Domains and Realms - defines Active Directory domain controllers and realms for use in domain-based authentication sources.
-
Authentication Sources - defines the available authentication sources, including null, SMS, email, and Active Directory.
-
Network Devices - defines the access points, Wi-Fi controllers, and other network devices that enforce access, mapping A3 roles to device policy identifiers, such as RADIUS attributes.
-
Connection Profiles - creates a correspondence between the wireless SSIDs and the Authentication Sources that may be used within that SSID. Authentication sources also control connection filters, billing tiers, provisioners, and scanners that are used.
Copyright ©
2020
Extreme Networks. All rights reserved. Published December 2020.