250
C
HAPTER
8: AAA C
OMMANDS
end-date
Date and time after
which the user is no
longer allowed to be on
the network.
Date and time, in the following
format:
YY/MM/DD-HH:MM
You can use
end-date
alone or with
start-date
. You also can use
start-date
,
end-date
, or both in
conjunction with
time-of-day
.
filter-id
Inbound or outbound
ACL to apply to the
user.
If configured in the WX switch’s local
database, this attribute can be an
access control list (ACL) to filter
outbound or inbound traffic. Use the
following format:
filter-id
inboundacl
.in
or
filter-id
outboundacl
.out
If you are configuring the attribute on
a RADIUS server, the value field of
filter-id can specify up to two ACLs.
Any of the following are valid:
filter-id = "Profile=acl1"
filter-id = "OutboundACL=acl2"
filter-id = "Profile=acl1
OutboundACL=acl2"
(Each example goes on a single line on
the server.) The format in which to
specify the values depends on the
RADIUS server.
Regardless of whether the attributes
are defined locally or on a RADIUS
server, the ACLs must already be
configured on the WX switch.
idle-timeout
This option is not implemented in the current MSS version.
mobility-profile
(network access
mode only)
Mobility Profile attribute
for the user. (For more
information, see
set
mobility-profile
on
page 255.)
Name of an existing Mobility Profile,
which can be up to 32 alphanumeric
characters, with no tabs or spaces.
If the Mobility Profile feature is
enabled, and a user is assigned the
name of a Mobility Profile that does
not exist on the WX switch, the user is
denied access.
Table 44
Authentication Attributes for Local Users (continued)
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...