User Guide: AT-RADGate for VST-APL/VST-VRT version 1.1.1

Policy Management



The "Policy Management" page allows you to manage policies for User, Endpoint, NAS, etc.

User

Policy Management > User

Manages AT-RADgate User policies.
Clicking the "User" tab displays a list of User policies registered on AT-RADgate.
Note
For User policy, register the MAC Address in the case of MAC Address-based Authentication (MAC-based Authentication, MAC Access Control). When registering a MAC Address on AT-RADgate, please make sure the format (login name and password) matches the format sent by the NAS.

Table 1: User policy list
Item Name Display Search Sort Description
Login Name × × × The user's account name. This value is used to identify the User policy and authenticate the supplicant.
Full Name × × × The user's full name. This value is not used to authenticate the supplicant.
Access Level × × An integer value between 0 and 15 that represents the user's access level. A value of 0 means access is denied, any other value means access is allowed. A higher value indicates a higher level of access.
Tag × × A list of tags assigned to the user. Used to categorize users into specific groups.
Note × × × A description of the user. This value is not used to authenticate the supplicant.
The functions of each button at the top right of the page are as follows:
Table 2: Button Functions
Button Name Description

Export as CSV
Download the currently registered User policies in CSV (comma separated values) format.
For information about CSV files, refer to Appendix > CSV File.

Manage Columns
Changes the visibility of each column in the table.

Reload
Reload the User policy list.
Add Add a User policy (the Add User dialog appears).
At the far right of each row in the list there is a menu button that allows you to manage the policies for that row.

Table 3: Functions of each menu
Button Name Description
"Edit" button Update the User policy (the Update User dialog appears).
"Delete" button Delete a User policy.

Add User/Update User

Policy Management > User > Add User/Update User

Clicking the "Add" button in the upper right corner of the User page displays the Add User dialog, allowing you to add a new User policy. Additionally, if you click the "Edit" menu on the far right of a User policy that has already been registered, the Update User dialog appears, allowing you to edit the User policy.
The two dialogs share a common form.

Table 4: Add User/Update User
Item / Button Name Mandatory Format Description
Login Name × Identifier The user's account name.
"Configure Password" button Only visible in the User Update dialog. Clicking this displays the "Password" items, allowing you to change your password.
Password × Password The user's account password. Alphanumeric characters and symbols can be used.
Full Name String (Max 63 characters) The user's full name.
Access Level Integer (0-15)
(When "Numeric" is selected)
The user's access level.
Permit: Allow access.
Deny: Denies access.
Number: Set an integer value between 0 and 15. A value of 0 means access is denied, any other value means access is granted, with higher values representing higher levels of access.
Tag Tag A list of tags to assign to the user. If you specify multiple values, separate them with a space character.
Note String (Max 63 characters) A description of the user.
"Cancel" button Cancels the policy addition or update.
"Save" button Register new policy information or update policy information.

Endpoint

Policy Management > Endpoint

Manages AT-RADgate Endpoint policies.
Clicking the "Endpoint" tab displays a list of Endpoint policies registered on AT-RADgate.
An endpoint refers to a network interface installed in a device such as a PC or smartphone. If an endpoint has two interfaces, one wired and one wireless, you need to register two Endpoint policies to manage all interface connections on that endpoint.

The contents of each column in the table are as follows:
Table 5: Endpoint policy list
Item Name Display Search Sort Description
MAC Address × × × The endpoint's MAC Address. This value is used to identify the station policy and authenticate the supplicant.
Device Name × × × The device name of the device. You can assign the same device name to multiple devices. Multiple devices with the same device name represent the same device having multiple network interfaces. This value can be used as a condition for applying the Supplicant Profile when authenticating a supplicant.
Access Level × × An integer value between 0 and 15 that represents the user's access level. A value of 0 means access is denied, any other value means access is allowed. A higher value indicates a higher level of access.
Tag × × A list of tags assigned to the device. Used to categorize devices into specific groups.
Note × × × A description of the device. This value is not used to authenticate the supplicant.
The functions of each button at the top right of the page are as follows:
Table 6: Button Functions
Button Name Description

Export as CSV
Download the currently registered Endpoint policies in CSV (comma separated values) format.
For information about CSV files, refer to Appendix > CSV File.

Manage Columns
Changes the visibility of each column in the table.

Reload
Reload the Endpoint policy list.
Add Add an Endpoint policy (the Add Endpoint dialog appears).
At the far right of each row in the list there is a menu button that allows you to manage the policies for that row.

Table 7: Functions of each menu
Button Name Description
"Edit" button Update the contents of the Endpoint policy (the Update Endpoint dialog appears).
"Delete" button Delete the Endpoint policy.

Add Endpoint/Update Endpoint

Policy Management > Endpoint > Add Endpoint/Update Endpoint

Clicking the "Add" button in the upper right corner of the Endpoint page displays the Add Device dialog, allowing you to add a new Endpoint policy. Additionally, if you click the "Edit" menu for an Endpoint policy that has already been registered, the Update Endpoint dialog is displayed, allowing you to edit the Endpoint policy.
The two dialogs share a common form.

Table 8: Endpoint policies
Item / Button Name Mandatory Format Description
MAC Address × MAC Address The endpoint's MAC Address.
Device Name × Identifier The device name of the device.
Access Level Integer (0-15) The access level of the endpoint.
Tag Tag A list of tags to assign to the endpoint. If you specify multiple values, separate them with a space character.
Note String (Max 63 characters) A description of the device.
"Cancel" button Cancels the policy addition or update.
"Save" button Register new policy information or update policy information.

NAS / RADIUS Proxy

Policy Management > NAS > RADIUS Proxy

Manages AT-RADgate's NAS policies and RADIUS Proxy policies.
Clicking the "NAS / RADIUS Proxy" tab displays a list of NAS policies and RADIUS Proxy policies registered on AT-RADgate.

The contents of each column in the table are as follows:
Table 9: NAS policy list
Item Name Display Search Sort Description
IP Address × × × NAS / RADIUS Proxy IP Address. This value is used to identify the NAS policy and authenticate the supplicant.
Name × × × NAS / RADIUS Proxy name. This value is not used to authenticate the supplicant.
Profile × The profile name assigned to this NAS / RADIUS Proxy. A profile is data that stores NAS / RADIUS Proxy settings and is useful when you need to apply the same settings to multiple NAS / RADIUS Proxy devices. If this value is empty, the default profile is assigned.
For information about the default profiles, refer to Default NAS Profile.
Tag × × This is a list of tags assigned to the NAS / RADIUS Proxy. Used to classify NAS into specific groups.
Note × × × A description of the NAS / RADIUS Proxy. This value is not used to authenticate the supplicant.
The functions of each button at the top right of the page are as follows:
Table 10: Button Functions
Button Name Description

Export as CSV
Download the currently registered NAS / RADIUS policies in CSV (comma separated values) format.
For information about CSV files, refer to Appendix > CSV File.

Manage Columns
Changes the visibility of each column in the table.

Reload
Reloads the NAS / RADIUS Profile policy list.
Add Add a NAS / RADIUS Proxy policy (the Add NAS > RADIUS Proxy dialog appears).
At the far right of each row in the list there is a menu button that allows you to manage the policies for that row.

Table 11: Functions of each menu
Button Name Description
"Edit" button Updates the contents of the NAS / RADIUS Proxy policy (the Update NAS > RADIUS Proxy dialog appears).
"Delete" button Delete the NAS / RADIUS Proxy policy.

Add NAS / RADIUS Proxy/Update NAS / RADIUS Proxy

Policy Management > NAS > RADIUS Proxy > Add NAS > RADIUS Proxy > Update NAS > RADIUS Proxy

Clicking the "Add" button in the upper right corner of the NAS > RADIUS Proxy page displays the Add NAS > RADIUS Proxy dialog, allowing you to add a new NAS policy. In addition, if you click the "Edit" menu on the far right of a NAS policy that has already been registered, the Update NAS > RADIUS Proxy dialog is displayed, allowing you to edit the NAS policy.
The two dialogs share a common form.

Table 12: Add NAS / RADIUS Proxy/Update NAS / RADIUS Proxy
Item / Button Name Mandatory Format Description
IPv4 Address × IPv4 Address NAS / RADIUS Proxy IP Address.
Allow only connections via proxy. Check box Check the checkbox to omit entering the pre-shared key. With this setting, authentication requests sent by this NAS / RADIUS Proxy are only accepted if they are routed through other RADIUS Proxies.
"Configure Pre-Shared Key" button Only visible in the Update NAS > RADIUS Proxy dialog. Clicking this displays the "Pre-shared Key (PSK)" item, allowing you to change the pre-shared key.
Pre-Shared Key × Password The pre-shared key for the NAS / RADIUS Proxy.
Name × Identifier NAS / RADIUS Proxy name. You cannot set a name that is already in use.
Profile The profile name. Select the profile you registered in NAS Profile.
Tag Tag A list of tags to be assigned to the NAS / RADIUS Proxy. If you specify multiple values, separate them with a space character.
Note String (Max 63 characters) A description of the NAS / RADIUS Proxy.
"Cancel" button Cancels the policy addition or update.
"Save" button Register new policy information or update policy information.

NAS Profile

Policy Management > NAS Profile

Manages AT-RADgate's NAS Profile policies.
Clicking "NAS Profile" displays a list of NAS Profile policies registered on AT-RADgate.

The contents of each column in the table are as follows:
Table 13: NAS Profile policy list
Item Name Display Search Sort Description
Name × × × NAS Profile name.
Note × × × A description of the NAS Profile.
The functions of each button at the top right of the page are as follows:
Table 14: Button Functions
Button Name Description

Export as CSV
Download the currently registered NAS Profile policies in CSV (comma separated values) format.
For information about CSV files, refer to Appendix > CSV File.

Manage Columns
Changes the visibility of each column in the table.

Reload
Reloads the NAS Profile policy list.
Add Add a NAS Profile policy (the Add NAS Profile dialog appears).
At the far right of each row in the list there is a menu button that allows you to manage the policies for that row.

Table 15: Functions of each menu
Button Name Description
"Edit" button Updates the contents of the NAS Profile policy (the Update NAS Profile dialog appears).
"Delete" button Delete a NAS Profile policy.

Add NAS Profile/Update NAS Profile

Policy Management > NAS Profile > Add NAS Profile/Update NAS Profile

Clicking the "Add" button in the upper right corner of the NAS Profile page displays the Add NAS Profile dialog, allowing you to add a new NAS Profile policy. In addition, if you click the "Edit" menu on the far right of an already registered NAS policy, the Update NAS Profile dialog is displayed, allowing you to edit the NAS Profile policy.
The two dialogs share a common form.

Table 16: Add NAS Profile/Update NAS Profile
Item / Button Name Mandatory Format Description
Name × Identifier NAS Profile name.
Note String (Max 63 characters) A description of the NAS Profile.
Enable device authentication, in addition to user authentication. Check box If you check the check box, and a MAC Address is stored in the User Name attribute of a received authentication request message, endpoint authentication is performed by MAC Address in addition to authentication by user name.
Enable MAC based authentication. Check box If you check the check box, and a MAC Address is stored in the User-Name attribute of the received authentication message, endpoint authentication is performed using the MAC Address instead of user authentication.
The process of determining whether the string stored in the user name is a MAC address is performed after the realm (domain) portion is removed by the User-Name Attribute Settings. If you have added realm (domain) information to the MAC Address for RADIUS Proxy processing, you must perform the User-Name Attribute Settings and delete that information.
Note
When using MAC-based authentication through a RADIUS Proxy, a NAS profile must be assigned to the NAS connected to the supplicant.
"Cancel" button Cancels the policy addition or update.
"Save" button Register new policy information or update policy information.

Default NAS Profile

If you do not explicitly assign a profile to a NAS policy, the default NAS Profile is applied to that NAS. The default NAS Profile settings are as follows:
Table 17: Default NAS Profile
Setting items Default value
Enable device authentication, in addition to user authentication. Unselected state
Enable MAC based authentication. Unselected state

Supplicant Profile

Policy Management > Supplicant Profile

Manages Supplicant Profile policies for AT-RADgate.
Clicking "Supplicant Profile" displays a list of Supplicant Profile policies registered in AT-RADgate.
Note
If you do not register Supplicant Profile policy, the default policy is applied to the supplicant. Refer to Default Supplicant Profile policy.

Table 18: Supplicant Profile policy list
Item Name Display Search Sort Description
Name × × × Supplicant Profile name.
Priority × × The priority for applying the Supplicant Profile. The lower the value, the higher the priority.
Action × × The action to be applied to the supplicant.
Reason × × × This is the reason why this action was registered.
Note × × × A description of the Supplicant Profile.
The functions of each button at the top right of the page are as follows:
Table 19: Button Functions
Button Name Description

Export as CSV
Downloads the currently registered Supplicant Profile policies in CSV (comma separated values) format.
For information about CSV files, refer to Appendix > CSV File.

Manage Columns
Changes the visibility of each column in the table.

Reload
Reloads the Supplicant Profile policy list.
Add Add Supplicant Profile policy (the Add Supplicant Profile dialog appears).
At the far right of each row in the list there is a menu button that allows you to manage the policies for that row.

Table 20: Functions of each menu
Button Name Description
"Edit" button Update the contents of the Supplicant Profile policy (the Update Supplicant Profile dialog appears).
"Delete" button Delete the Supplicant Profile policy.

Add Supplicant Profile/Update Supplicant Profile

Policy Management > Supplicant Profile > Add Supplicant Profile/Update Supplicant Profile

Clicking the "Add" button in the upper right corner of the Supplicant Profile page displays the Add Supplicant Profile dialog, allowing you to add a new Supplicant Profile. Additionally, if you click the "Edit" menu on the far right of an already registered Supplicant Profile, the Update Supplicant Profile dialog is displayed, allowing you to edit the Supplicant Profile.
The two dialogs share a common form.

Table 21: Add Supplicant Profile/Update Supplicant Profile
Item / Button Name Mandatory Format Description
Name × Identifier Supplicant Profile name.
Priority × Integer (0-15) The priority for applying the profile.
Condition Set the conditions for the supplicants for which this profile applies.
Refer to Conditions for details.
Value Configure the parameters that is applied to supplicants that meet the conditions of this profile.
Refer to Settings for detail.
Additional Information Set any additional information for this profile.
Refer to Additional Information for details.
"Cancel" button Cancels the policy addition or update.
"Save" button Register new policy information or update policy information.

Condition

Table 2: Condition
Item Name Mandatory Format Description
Device These are conditions related to the supplicant's endpoint information.
Refer to Device Condition for details.
Access Level String Match condition for the supplicant's access level.
Refer to Access Level Condition for details.
Tag String (Max 255 characters) Matching criteria for the supplicant's tag.
Refer to Tag Conditions for details.
Device Condition
For Device Condition, select "All endpoints," "Registered devices," "Unregistered devices," "Specified MAC address," or "Specified by name." The operation of each parameter is as follows:
Table 23: Device Condition
Device Condition Name Behavior
All endpoints Matches all supplicants.
Registered devices The MAC Address matches the supplicant registered in AT-RADgate as the Endpoint policy.
Unregisterd devices The MAC Address matches the supplicant that unregistered in AT-RADgate as the Endpoint policy.
Specified by MAC address Matches supplicants whose MAC Address matches the configured address. If you select this condition, an additional field appears where you can enter the MAC Address.
Specified by name Matches supplicants whose device name matches the configured device name. If you select this condition, an additional field appears where you can enter the device name.
Table 24: Additional items
Additional Field Name Mandatory Format Description
MAC Address × MAC Address This is displayed when "Specified MAC address" is selected as the Device Condition.
Device Name × Identifier This is displayed when "Specified by name" is selected as the Device Condition.
Access Level Condition
The Access Level Condition is written in the following format:
Table 25: Access Level Condition
Name Format Examples Behavior
Value specification NUM 3 NUM represents an integer value. Matches supplicants with a value equal to the specified numeric value.
Tag Condition
The Tag Condition is specified in the following format:
Table 26: Tag Condition
Tag Condition Name Behavior
Specified by name Matches supplicants with the specified Tag Condition Name.

Value

Table 27: Configurable fields
Item Name Mandatory Format Description
Action × The action to be applied to the supplicant.
Refer to Actions for details.
Filter ID String (Max 255 characters) The ID of the packet filter to be applied to the supplicant.
Refer to Packet Filters for details.
Filter Rule String (Max 1024 characters) The packet filter rules that are applied to the supplicant.
Refer to Packet Filters for details.
Action
Action settings are basically used in conjunction with functions such as port authentication that mainly control the network connection of user endpoints (supplicants), and specify the control that the network switch that accommodates the user endpoint performs on packets sent by the user endpoint. In all other cases, set the action to "Pass" and leave the VLAN blank.
In the Action Setting field, select either "Pass", "Drop", "Isolate", "Undecided", or "Notice". The operation of each parameter is as follows:
Table 28: Action
Action Name Behavior
Pass It forwards packets sent by the supplicant to the appropriate network segment. If you select this condition, an additional field appears where you can enter the destination VLAN name. If a VLAN name is set, the packet is forwarded to the specified VLAN. If not set, it is forwarded to the base VLAN.
Drop Discards packets sent by the supplicant.
Quarantine It forwards packets sent by the supplicant to the isolated network segment. If you select this condition, an additional field appears where you can enter the destination VLAN name. If a VLAN name is set, the packet is forwarded to the specified VLAN.
If not set, the traffic is forwarded to the VLAN set in the "Default Quarantine VLAN" in the General policy. If the "default isolated VLAN" is also not set, traffic is forwarded to the base VLAN.
Undecide Sets the supplicant connection state to undetermined. If you select this condition, an additional field appears where you can enter the destination VLAN name. If a VLAN name is set, the packet is forwarded to the specified VLAN.
If it is not set, it is discarded.
Note
Do not select this as it is not supported in this version.
Notice Outputs the event log. When a profile with this action configured is applied to a supplicant, other configuration parameters do not apply to the supplicant, they are ignored and the evaluation of lower priority profiles continues to determine the action that should be applied to the supplicant.
Packet Filter
Packet filter settings are basically used in conjunction with functions that control the network connection of user endpoints (supplicants), such as port authentication, and specify additional filter processing that the network switch that accommodates the user endpoint performs on packets sent by the user endpoint. Do not configure this setting in any other cases.
Table 29: Packet filter
Item Name Format
Filter ID Specify the filter name (ACL name) that has already been set in the network switch. Multiple filters can be specified by separating them with a space character.
Filter Rule Specifies the filter rule to be set on the network switch. Filter rules are written according to the grammar defined by the network switch to which the settings are applied. Multiple rules can be specified by separating them with line breaks.

Additional Information

Table 30: Additional Information
Field Name Mandatory Format Description
Reason String (Max 63 characters) A description of the NAS Profile.
Note String (Max 63 characters) A description of the NAS Profile.

Default Supplicant Profile policy

In AT-RADgate, the following Supplicant Profile policies are pre-configured with a lower priority than the profile set by the user. If a user does not match any of the registered Supplicant Profile policies, these policies are applied to the supplicant in order of decreasing priority.
Table 31: Default policies
Priority Condition Action
1 Unregistered devices Drop
2 Access Level 0 Drop
3 Access Level 1 or higher Pass

Global

Policy Management > Global

Manages general policy settings for AT-RADgate.
Clicking the General tab displays the current general policy settings for AT-RADgate.

General

Policy Management > Global > General

In General, you can set the default isolated VLAN. Click the "Edit" button at the bottom right to enter edit mode.

◼ Edit mode

Table 32: General
Item / Button Name Mandatory Format Description
Default Isolate VLAN Identifier This is the quarantine destination VLAN name that is sent to the NAS when a quarantine action without a VLAN specification is configured in the Supplicant Profile. If not set, the device is isolated to the base VLAN. The default is no setting.
"Edit" button Enter edit mode to configure the default quarantine VLAN.
"Cancel" button Cancel the default quarantine VLAN configuration.
"Save" button Register or update the default isolation VLAN settings.

01 Oct 2025 12:51