no (user-role-config-mode-command)

Negates a command or resets configured settings to their default. When used in the config role policy user-defined role mode, the no command removes or resets settings, such as AP location, authentication type, encryption type, captive portal, etc.

Supported in the following platforms:

  • Access Points — AP505i, AP510i/e, AP560i/h
  • Service Platforms — NX5500, NX7500, NX9500, NX9600, VX9000

Syntax

no [ap-location|assign|authentication-type|captive-portal|city|client-identity|
company|country|department|emailid|employee-type|employeeid|encryption-type|
group|memberOf|mu-mac|radius-user|ssid|state|title|use|user-defined]
no [ap-location|assign|authentication-type|city|client-identity|company|country|
department|emailid|employee-type|employeeid|encryption-type|group|mu-mac|memberOf|ssid|
radius-user|state|title|user-defined]
no captive-portal authentication-state
no use [application-policy|bonjour-gw-discovery-policy|ip-access-list|
ipv6-access-list|mac-access-list|url-filter]
no use [ip-access-list|ipv6-access-list|mac-access-list] [in|out] 
<IP/IPv6/MAC-ACCESS-LIST-NAME> precedence <1-100>
no use [application-policy|bonjour-gw-discovery-policy|url-filter]

Parameters

no <PARAMETERS>

no <PARAMETERS>

Negates a command or resets configured settings to their default. When used in the config role policy user-defined role mode, the no command removes or resets settings, such as AP location, authentication type, encryption type, captive portal, etc.

Usage Guidelines

The no command negates any command associated with it. Wherever required, use the same parameters associated with the command getting negated.

Examples

The following example shows the Role Policy ‘test‘ User Role ‘testing‘ configuration before the ‘no‘ commands are executed:

nx9500-6C8809(config-role-policy-test-user-role-testing)#show context
 user-role testing precedence 10
  authentication-type eq kerberos
  encryption-type eq wep128
  ap-location contains office
  mu-mac 11-22-33-44-55-66
  group contains testgroup
  captive-portal authentication-state pre-login
  city exact SanJose
  company exact ExampleCompany
  country exact America
  department exact TnV
  emailid exact testing@examplecompany.com
  employeeid contains TnVTest1
nx9500-6C8809(config-role-policy-test-user-role-testing)#
nx9500-6C8809(config-role-policy-test-user-role-testing)#no authentication-type
nx9500-6C8809(config-role-policy-test-user-role-testing)#no encryption-type
nx9500-6C8809(config-role-policy-test-user-role-testing)#no group
nx9500-6C8809(config-role-policy-test-user-role-testing)#no mu-mac
nx9500-6C8809(config-role-policy-test-user-role-testing)#no ap-location
nx9500-6C8809(config-role-policy-test-user-role-testing)#no employeeid

The following example shows the Role Policy ‘test‘ User Role ‘testing‘ configuration after the ‘no‘ commands are executed:

nx9500-6C8809(config-role-policy-test-user-role-testing)#show context
 user-role testing precedence 10
  captive-portal authentication-state pre-login
  city exact SanJose
  company exact ExampleCompany
  country exact America
  department exact TnV
  emailid exact testing@examplecompany.com
nx9500-6C8809(config-role-policy-test-user-role-testing)#