Logo

Roles

Menu path: Configuration > Policies and Access Control > Roles.

At the successful conclusion of the authentication process each client is assigned a role that determines their access permissions. Typically, visitors to a company are assigned a guest role that only allows them access to the internet. Employees authenticated by an Active Directory or other authentication techniques can be assigned an employee role, or further differentiated into sales, marketing, development, or other departments. The employee, sales, marketing, or development roles might be enforced through assignment to different VLANs that limit access.

The general format and usage of this page is discussed in General GUI Usage.

Roles are used in several other configuration entities. See Configuration for a discussion of roles' usage during configuration.

Roles are arbitrary names that imply their usage, along with a description. Several roles are predefined in A3, corresponding to commonly used roles:

Select new role icon to define a role. The fields in the dialog are:

Field Usage Example
Name Name of the role. The name should be descriptive. It need not match the RADIUS attribute used in enforcement. Guest
Description An optional description of the role. Visitor access
Maximum Clients Per User Designates the maximum number of devices that a client with this role is permitted. A value of 0 allows an unlimited number of devices. 0

Copyright © 2021 Extreme Networks. All rights reserved. Published April 2021.