Amer Networks E5Web GUI User Manual
Page 562

•
Netmask: 255.255.255.0
3.
Select the Options tab and enable the option:
Distribute leases only to RADIUS relay authenticated clients
4.
Click OK
Create the IPRule object that grants access to the networks on the If2 interface:
1.
Go to: Policies > Add > IPRule
2.
Specify a suitable name for the rule, for example LAN_HTTP
3.
Now enter:
•
Name: client_access_rule
•
Action: Allow
•
Service: all_services
•
Source Interface: If1
•
Source Network: client_net
•
Destination Interface: If2
•
Destination Network: all-nets
4.
Click OK
Create the RadiusRelay object:
1.
Go to: Network > Network Services > RADIUS Relays > add > RADIUS Relay
2.
Now enter:
•
Name: r_relay1
•
DHCP Server: rr_dhcp_server
•
Source Interface: If1
•
Client IP Filter: client_ip_range
•
Remote Server IP:
3.
Click OK
Note: Configure the RADIUS server to send the group
In the above example, it is assumed the group name ue_group will be sent back by the
RADIUS server during authentication. The RADIUS server must be configured to do this.
When configuring the external RADIUS server to provide group information for the
logged in user to cOS Core, it is necessary to use the Clavister-User-Group vendor
Chapter 8: User Authentication
562