![]() ![]() ![]() Radius dynamic-server client 192.168.1.5 process-change-of-auth-requests Radius dynamic-server client 192.168.1.5 enable Radius dynamic-server client 192.168.1.5 secret useStrongerSecret Radius server host key useStrongerSecret used-by non-eapol Radius server host key useStrongerSecret used-by eapol Radius server host 192.168.1.5 acct-enable You can find on this page the enforcement modes supported by each piece of equipment tested with A3. This technique is usually used when your network hardware doesn’t support VLAN enforcement. ![]() In this case all you need to do is to have a flat layer 2 network up to A3’s inline interface with no other gateway available for devices to reach out to the Internet. There is no need to follow the instructions in this guide if you plan on deploying in inline enforcement, except RADIUS inline. Other sources of informationĬovers A3 installation, configuration and administration.Ĭovers captive portal customization, VLAN management customization and instructions for supporting new hardware. Switches, wireless controllers and wireless access points are all considered network devices in A3 terms. This guide covers the configuration of network devices in order to integrate them with A3 in VLAN enforcement. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |