Security

last person joined: yesterday 

Forum to discuss Enterprise security using HPE Aruba Networking NAC solutions (ClearPass), Introspect, VIA, 360 Security Exchange, Extensions, and Policy Enforcement Firewall (PEF).
Expand all | Collapse all

Limiting wireless Access

This thread has been viewed 0 times
  • 1.  Limiting wireless Access

    Posted Jul 08, 2015 02:22 AM

    We have below wireless controller model and firmware version deployed in our campus. Requirement is to provide wireless access from 6:00 am to 2: 00 PM for 7 days of week. After 2:00 pm there should be no wireless access for wireless users. Any wireless users that were connected before 2:00 pm afternoon should disconnect automatically after 2pm

     

    We have 3 kinds of SSID configured:

    STAFF ssid it uses Radius server for authentication.

    Student SSID  same as above

    WORKGROUP SSID it is a password protected SSID without any radius authentication

    Model:Aruba3400
    Version:6.4.2.3


  • 2.  RE: Limiting wireless Access

    Posted Jul 08, 2015 02:47 AM
    Create a custom rule from Security > Access Control > TimeRange >
    and apply that to your vap profile
    Configuration > AP Group > Edit "default">Virtual AP > gst-vap_prof


  • 3.  RE: Limiting wireless Access

    Posted Jul 08, 2015 06:40 AM

    Hi,

    Let me understand some thing here. you don't want to broadcast the SSID after 2 pm or you want to stop accessing wireless for some users after 2 PM.

     

    Solution will be different for these two requirements.

     

    Please feel free to come for the solution.



  • 4.  RE: Limiting wireless Access

    Posted Jul 08, 2015 07:01 AM
    Wireless access for users should stop after 2 pm completely. This includes disconnection of users that are already associated with wireless before 2 pm

    Access timings required are from 6 am to 2 pm afternoon


    Sent from Samsung Mobile
    ________________________________

    The information in this email and any attachments are confidential and solely for the use of the individual or entity to whom it is addressed to and authorized to receive it. If you are not the intended recipient, be advised that you have received this email in error and that any use, disclosure, copying, distribution or taking any action in reliance on the content of this information is strictly prohibited and may be unlawful. If you have received this email in error, please delete along with any attachments and inform the Higher Colleges of Technology immediately at disclaimer@hct.ac.ae. We do not guarantee the integrity of any emails or attachments and are not responsible for any changes made to them by any other person.

    تعتبر المعلومات الواردة في هذا البريد الإلكتروني وأياً من مرفقاته سرية وتخص المستلم المعني أو الاشخاص المصرح لهم باستلامه، فإذا لم تكن المستلم المقصود، فيرجى العلم بأنك قد استلمت هذا البريد الإلكتروني عن طريق الخطأ ويمنع منعاً باتاً الاستفادة منه أو افشاء محتواه أو توزيعه. وفي حال استلام بريد إلكتروني عن طريق الخطأ، يرجى حذفه مع مرفقاته وإخطار كليات التقنية العليا فوراً على البريد الإلكتروني التالي: disclaimer@hct.ac.ae. كما أننا لا نضمن سلامة أي بريد إلكتروني أو مرفقاته، ولسنا مسؤولين عن أية تعديلات عليها من قبل أي شخص آخر.

    ________________________________


  • 5.  RE: Limiting wireless Access
    Best Answer

    Posted Jul 08, 2015 07:15 AM

    Hi,

     You have two different solutions here,

     

    1. if you are using Airwave, you can specify the time range to enable the SSID.

    2. Create a timebased ACL ( any any any deny) and map to the initial role as well as all the Authenticated roles ( role assigned to users after successful Authentication) and enable block list for this rule.

     

    Hope this meets your requirement.

     

    Please feel free for any further help on this.