Dell 6.2 Server User Manual


 
(host)(config) #ap-group first-floor
virtual-ap WLAN-01_first-floor
ap-group second-floor
virtual-ap WLAN-01_second-floor
Configuring Authentication with the Controller’s Internal Database
In the following example:
l The controller’s internal database provides user authentication.
l The authentication type is WPA. From the 802.1x authentication exchange, the client and the controller derive
dynamic keys to encrypt data transmitted on the wireless network.
Configuring the Internal Database
Configure the internal database with the username, password, and role (student, faculty, or sysadmin) for each user.
There is a default internal server group that includes the internal database. For the internal server group, configure a
server derivation rule that assigns the role to the authenticated client.
In the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page.
2. In the Servers list, select Internal DB.
3. Under Users, click Add User to add users.
4. For each user, enter a username and password.
5. Select the Role for each user (if a role is not specified, the default role is guest).
6. Select the expiration time for the user account in the internal database.
7. Click Apply.
In the CLI
NOTE: Use the privileged mode in the CLI to configure users in the controller’s internal database.
(host)(config) #local-userdb add username <user> password <password>
Configuring a Server Rule Using the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page.
2. Select Server Group to display the Server Group list.
3. Select the internal server group.
4. Under Server Rules, click New to add a server derivation rule.
a. For Condition, enter Role.
b. Select value-of from the drop-down menu.
c. Select Set Role from the drop-down menu.
d. Click Add.
5. Click Apply.
Configuring a Server Rule Using the CLI
(host)(config) #aaa server-group internal
set role condition Role value-of
DellPowerConnectW-SeriesArubaOS6.2 | User Guide 802.1XAuthentication | 214