Creating an Access Control Policy
You can use the Access Control policy to create multiple wireless networks with different access control components.
Complete the following steps to create an Access Control policy:
- Add the Access Control service to your tenant account. From the navigation bar, select Network Control > Service Catalog. Alternatively, you can select Network Control > My Services, then click Add Service.
-
Find Access Control
tile and click Add.
The Add Access Control page is displayed. By default, Wi-Fi is selected for Access Control Type, and Access Control Set is selected for Wi-Fi Access Control Profile.
-
Click Next.
The Add Access Control Policy page is displayed.
Add Access Control Policy
- Enter the Policy Name for the access control policy.
- (Optional) Enter a Description for the access control policy.
-
Configure the Access Control Components.
Note: By default, access control component profiles are disabled.
Access Control Components
-
Toggle the Layer 2 switch on and select a profile from
the drop-down list.
If the Layer 2 Settings are not available, click Add New.The Layer 2 Settings sidebar is displayed.
Layer 2 Settings Page
Complete the following to create a new Layer 2 setting:
- Enter a Policy Name.
- Enter a Description.
-
Select Access. Select one of the following
options:
- Allow connections: This allows the user added MAC addresses to connect to the network server.
- Block connections: This denies the user added MAC addresses from connecting to the network server.
-
Select a MAC Address from the list by clicking
the radio button.
If the MAC address you need is not listed, click Add.
The Add MAC Address sidebar is displayed.- Enter MAC addresses.Note: You can add multiple MAC addresses at once by separating them with a comma or semicolon, and you can add up to 128 MAC addresses in total.
- Click Save.
- Enter MAC addresses.
- Click Clear list to clear the MAC address list.
- Click Save.
-
Toggle the Layer 3 switch on and select profile from the
drop-down list.
If the Layer 3 Settings are not available, click Add New.
The Layer 3 Settings sidebar is displayed.
Layer 3 Settings Page
Complete the following to create a Layer 3 Settings
- Enter a Policy Name.
- Enter a Description.
-
Select Default Access. Select one of the
following options:
- Allow Traffic: This allows traffic to flow from a user added source to a destination IP address and port.
- Block Traffic: This denies traffic from flowing a user added source to a destination IP address and port.
-
Select a rule from the Layer 3 Rules list by
clicking the radio button.
If the Layer 3 Rules you need are not listed, click Add.
The Add Layer 3 Rule sidebar is displayed. Complete the following to create a new Layer 3 Rule.- Description: Enter a description for the rule.
- Access: Select one of the following
options:
- Allow Traffic: This allows the upstream traffic.
- Block Traffic: This denies the upstream traffic.
- Protocol: Select the protocol that you
wish to use for the new traffic rule, from the protocol
drop-down list. The following is a list of protocols available
for use.
- TCP: Transmission Control Protocol.
- UDP: User Datagram Protocol.
- UDPLITE: Lightweight User Datagram Protocol, which is a connectionless protocol that allows even a damaged data payload to be delivered rather than being discarded.
- ICMP (ICMPV4): Internet Control Message Protocol, which is an error-reporting protocol used by network devices to generate error messages to the source IP address, when issues in the network prevent delivery of IP packets.
- IGMP: Internet Group Management Protocol, which is a communications protocol used by hosts on IPv4 networks to establish multicast group memberships.
- ESP: Encapsulating Security Payload is a protocol that provides authentication, integrity, and confidentiality of network packets in IPv4 and IPv6 networks.
- AH: Authentication Header protocol, which is used to authenticate SNMP.
- SCTP: Stream Control Transmission Protocol is a communications protocol that operates at the transport layer.
- Source:
- Select one of the following options:
- Any IP Address: This allows or denies the upstream traffic from any IP addresses.
- Subnet Network Address: Enter the source network address and source mask.
- IP Address: Enter the specific IP address.
- Port: Enter a port number or a
range of ports (for example, 22-34).Note:
If you select the ICMP protocol in the previous step, you do not need to specify ports for the source and the destination. Hence, the option to select ports will not be displayed.
- Select one of the following options:
- Destination:
- Select one of the following options:
- Any IP Address: This allows or denies the upstream traffic from any IP addresses.
- Subnet Network Address: Enter the source network address and source mask.
- IP Address: Enter the specific IP address.
- Port: Enter a port number or a
range of ports (for example, 22-34).Note:
If you select the ICMP protocol in the previous step, you do not need to specify ports for the source and the destination. Hence, the option to select ports will not be displayed.
- Select one of the following options:
- Click Save.
- Click Save.
-
Toggle the Device & OS switch on and select profile
from the drop-down list.
If the Device & OS are not available, click Add New.
The Device & OS Access Settings sidebar is displayed.
Device & OS Access Settings Page
Complete the following to create a new device and OS access setting:
- Enter a Policy Name.
- Enter a Description.
-
Select a Default Access. Select one of the
following options:
- Allow Traffic: This allows traffic from the user added devices.
- Block Traffic: This denies traffic from the user added devices.
-
Select a rule from the Rules list by clicking
the radio button.
If the rule you need is not listed, click Add.
The Add Rule sidebar is displayed.Add Rule - Device & OS Access Settings
Complete the following to create a new rule.- Rule Name: Enter the name of the rule.
- Access: Select one of the following
options:
- Allow Traffic: This allows traffic from the devices.
- Block Traffic: This denies traffic from the devices.
- Device Type: Select a device type from the list of devices from the drop-down. Currently, the supported devices are Laptop, Smartphone, Tablet, VoIP, Gaming, Printer, and IoT device.
- OS or Manufacturer: Select the OS vendor
for the device from the drop-down.Note: The OS type field is populated based on the type of device. For example, if the device type is selected as Gaming, the OS or Manufacturer drop-down displays the following options: All, GameCube, Wii, PlayStation, Xbox, and Nintendo.
- Rate Limit: Configure the From
client and To client rate
limit using the sliders.Note: Maximum rate limit ranges from 0.1 Mbps to 200 Mbps.
- VLAN: Enter the VLAN ID.
- Click Save.
- Click Save.
-
Toggle the Applications switch on and select profile
from the drop-down list.
If the Application Access Settings is not available, click Add New.
The Application Access Settings sidebar is displayed.
Complete the following to create a new device and OS access setting:
- Enter a Policy Name.
- Enter a Description.
-
Select a Default Access. Select one of the
following options:
- Allow Traffic: This allows traffic from the user added devices.
- Block Traffic: This denies traffic from the user added devices.
-
Select a rule from the Rules list by clicking
the radio button.
If the rule you need is not listed, click Add.
The Add Rule sidebar is displayed. Complete the following to create a new rule.- Rule Name: Enter the name of the rule.
- Rule
Type: Select one of the following options:
- System Defined: Complete the following
fields.
- Application Category: Select the category of application from the list.
- Application Name: Enter the name of the application.
- User
Defined: Complete the following
fields.
- Application Name: Enter the name of the application.
- Destination Ip: Enter the destination IP address.
- Netmask: Enter the subnet mask value.
- Destination Port: Enter the port number.
- Protocol: Select TCP or UDP.
- Port Mapping Only: Selecting this option disables the Destination Ip and Netmask fields.
- System Defined: Complete the following
fields.
- Access
Control: Select one of the following options:
- Block Application: This blocks the user added application.
- Rate
Limit: Configure the Max
uplink rate and Max downlink
rate limits using the sliders.Note: Maximum rate limit ranges from 0.25 Mbps to 20 Mbps.
- QoS:
Complete the following fields.
- Uplink Marking: Select from
802.1p, DSCP, or Both, and select from Best effort, Video, Voice, or Background. By default, the
802.1p and Background are selected.
QoS: Uplink Marking
- Downlink Priority: Select from Best effort, Video, Voice, or Background. By default, Voice is selected.
- Click Save.
- Uplink Marking: Select from
802.1p, DSCP, or Both, and select from Best effort, Video, Voice, or Background. By default, the
802.1p and Background are selected.
- Click Save.
-
Toggle the Client Rate Limit switch on and configure the
maximum upload rate limit and maximum download rate limit using the
slider.
Note: Maximum client rate limit ranges from 1 Mbps to 200 Mbps.
-
Click Finish.
An Access Control policy is created and is displayed in the Access Control page.