Your space, your reactions


    1. Hi Chris,

      An authentication strategy helps define and tells OmniVista what to do with the RADIUS request. For example, if Access Policy #1 defines the internal OmniVista UPAM embedded RADIUS as its source and destination for the AAA services in the Authentication Strategy then those requests will be forwarded to the internal UPAM DB.

      If you want to use an external RADIUS or Active Directory, then a separate Authentication Strategy is defined that points to those external AAA services.

      Please reference slide #9 for a detailed flow chart illustration of these process.

  1. Hello Felipe. If I define an Access Role Profile to control wireless network access for certain employees based on time of day parameters, can that same profile be enforced on the wired side if the employee uses their came credentials via a wired device?

    1. Hello Christine,

      Yes, the same profile can be dynamically enforced through the Stellar Wireless and through the OmniSwitch wired ports. A portion of the OmniVista demonstration shows a couple configuration options where I showed how to assign the different types of networking devices (Stellar AP groups and OmniSwitch ports) that will be used to enforce the UNP through the defined Access Role Profile.

  2. Hi. How does OmniVista maintain its device profiling database up to date to recognize the IP devices that attach via wireless or via the wired side of the network? Thank you for the presentation!

    1. Hi George,

      OmniVista communicates with an external cloud-based database, also referred as the Device Fingerprinting Service, by exchanging the device’s MAC address information. Based on the exchanged information between OmniVista and the external cloud-based database, OmniVista’s (IoT) Device Profiling inventory list is populated to display and can use the device’s MAC address, IP address, operating system, manufacturer, which wired port or SSID it is associated through for Access Role Profile enforcement, for troubleshooting or for status checks.

      And when applicable, it will also display the final UNP assigned through the enforcement of the Access Role Profile policies, refer to slide 11 for details about this device inventory view.

Comment below to share your thoughts on this blog post

Notify me of followup comments via e-mail. You can also subscribe without commenting.

This site uses Akismet to reduce spam. Learn how your comment data is processed.