beautypg.com

Setting the authentication configuration – Brocade Mobility Access Point System Reference Guide (Supporting software release 5.5.0.0 and later) User Manual

Page 631

background image

Brocade Mobility Access Point System Reference Guide

621

53-1003100-01

10

9. Set the following Access Restrictions:

10.Select

OK

to save the Access Control configuration. Select

Reset

to revert to the

last saved configuration.

Setting the Authentication Configuration

Getting Started with the Mobile Computer

As part of the access point’s Management Policy, define how client authentication requests are
validated using either an external or internal authentication resource:

To configure an authentication resource:

1. Select Configuration.

2. Select

Management

.

3. Select Authentication from the list of Management Policy options in the upper, left-hand, side

of the UI.

Filter Type

Select a filter type for access restriction. Options include IP Access List, Source
Address
or None. To restrict management access to specific hosts, select Source
Address as the filter type and provide the allowed addresses within the Source Hosts
field.

IP Access List

If the selected filter type is IP Access List, select an access list from the drop-down
menu or select the Create button to define a new one. IP based firewalls function like
Access Control Lists (ACLs) to filter/mark packets based on the IP from which they
arrive, as opposed to filtering packets on layer 2 ports. IP firewalls implement
uniquely defined access control policies, so if you do not have an idea of what kind of
access to allow or deny, a firewall is of little value, and could provide a false sense of
network security.

Source Hosts

If the selected filter type is Source Address, enter an IP Address or IP Addresses for
the source hosts. To restrict management access to specific hosts, select Source
Address as the filter type and provide the allowed addresses within the Source Hosts
field.

Source Subnets

If the selected filter type is Source Address, enter a source subnet or subnets for the
source hosts. To restrict management access to specific subnets, select Source
Address
as the filter type and provide the allowed addresses within the Source
Subnets field.

Logging Policy

If the selected filter is Source Address, enter a logging policy for administrative
access. Options includes None, Denied Requests or All.