![]() |
Menu path: Configuration > Policies and Access Control > Roles.
At the successful conclusion of the authentication process each client is assigned a role that determines their access permissions. Typically, visitors to a company are assigned a guest role that only allows them access to the internet. Employees authenticated by an Active Directory or other authentication techniques can be assigned an employee role, or further differentiated into sales, marketing, development, or other departments. The employee, sales, marketing, or development roles might be enforced through assignment to different VLANs that limit access.
The general format and usage of this page is discussed in General GUI Usage.
Roles are used in several other configuration entities. See Configuration for a discussion of roles' usage during configuration.
Roles are arbitrary names that imply their usage, along with a description. Several roles are predefined in A3, corresponding to commonly used roles:
Select to define a role. The fields in the dialog are:
Field | Usage | Example |
---|---|---|
Name | Name of the role. The name should be descriptive. It need not match the RADIUS attribute used in enforcement. | Guest |
Description | An optional description of the role. | Visitor access |
Maximum Clients Per User | Designates the maximum number of devices that a client with this role is permitted. A value of 0 allows an unlimited number of devices. | 0 |
Copyright © 2021 Extreme Networks. All rights reserved. Published April 2021.