You can optionally assign a role to the client from your defined role profiles. Connect the client even though it not authorized.If the MAC authentication fails, you can configure the AP to take one of these actions:.If the MAC authentication is successful, the client device is allowed to access the wireless network.After the user successfully associates to the SSID, the AP authenticates the MAC address of the connecting client with a RADIUS server.For example, the user can associate using WPA2 with PSK. User authentication is initiated based on the security settings configured for the SSID.For more information, see Role-Based Access Control for RADIUS MAC Authentication. After the user successfully authenticates, the RADIUS server can use Change of Authorization (CoA) to assign a post-authenticaton role to the client. For example, you can assign a pre-authentication role that redirects a client to a portal for authentication to the RADIUS server. You can also configure RADIUS MAC authentication to assign roles to clients that fail MAC authentication (to restrict access or redirect the client), or you can assign roles both pre-authentication and post-authentication. You can use RADIUS MAC Authentication to allow only authorized devices to connect to your wireless network. When you enable secondary authorization on your network, a wireless user first authenticates on the wireless network, and then the device used to connect to the network is authenticated to determine whether it is an authorized device.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |