Configuring Captive Portal Authentication Profiles
In this section, you create an instance of thecaptive portalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.authentication profile and theAAAAuthentication, Authorization, and Accounting. AAA is a security framework to authenticate users, authorize the type of access based on user credentials, and record authentication events and information about the network access and network resource consumption.profile. For thecaptive portalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.authentication profile, you specify the previously-created user role as the default user role for authenticatedcaptive portalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.clients and the authentication server group (“Internal”).
1.Login to theMobility Master.
2.In the node hierarchy, navigate to the tab and select .
a.Click + in the window to create a newCaptive PortalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.Authentication Profile, enter as the and click .
b.Select thecaptive portalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.authentication profile you just created.
c.For Default Role, select .
d.Select User Login.
e.Uncheck .
f.Click .
3.Select under thecaptive portalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.authentication profile you just created.
a.Select from the drop-down list.
b.Click .
4.Click .
5.In the window, select the check box and click .
The followingCLICommand-Line Interface. A console interface with a command line shell that allows users to execute text input as commands and convert these commands to appropriate functions.commands configurecaptive portalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.authentication:
(host) [md] (config) #aaa authentication captive-portal guestnet
default-role auth-guest
user-logon
no guest-logon
server-group internal
The following section describes how to configure the user accounts,WLANWireless Local Area Network. WLAN is a 802.11 standards-based LAN that the users access through a wireless connection.,AAAAuthentication, Authorization, and Accounting. AAA is a security framework to authenticate users, authorize the type of access based on user credentials, and record authentication events and information about the network access and network resource consumption.profile, andcaptive portalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.parameters:
Modifying the Initial User Role
Thecaptive portalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.authentication profile specifies thecaptive portalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.login page and other configurable parameters. The initial user role configuration must include the applicablecaptive portalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.authentication profile instance. Therefore, you need to modify the user role configuration to include thecaptive portalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.身份验证配置文件。您还需要包括the predefined policy, which directs clients to thecaptive portalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users., in the initial user role configuration.
The following procedure describes how to modify the guest-logon role:
1.Login to theMobility Master.
2.In the node hierarchy, navigate to the tab.
3.Select the role.
4.Select in the table.
5.Select the tab.
6.Expand the accordion.
7.Select thecaptive portalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.authentication profile you just created from the drop-down list, and click
8.Click .
9.In the window, select the check box and click .
The followingCLICommand-Line Interface. A console interface with a command line shell that allows users to execute text input as commands and convert these commands to appropriate functions.commands modify the guest-logon role:
(host) [md] (config) #user-role guest-logon
(host) [md] (config-submode)#access-list session captiveportal
captive-portal guestnet
Configuring the AAA Profile
In this section, you configure theAAAAuthentication, Authorization, and Accounting. AAA is a security framework to authenticate users, authorize the type of access based on user credentials, and record authentication events and information about the network access and network resource consumption.profile, which specifies the previously-created role as the initial role for clients who associate to theWLANWireless Local Area Network. WLAN is a 802.11 standards-based LAN that the users access through a wireless connection..
1.Login to theMobility Master.
2.In the node hierarchy, navigate to the page.
3.Expand . In the , click to add a new profile. Enter for the name of the profile, then click .
4.Select from drop-down list.
5.Click
6.Click .
7.In the window, select the check box and click .
The followingCLICommand-Line Interface. A console interface with a command line shell that allows users to execute text input as commands and convert these commands to appropriate functions.command configures theAAAAuthentication, Authorization, and Accounting. AAA is a security framework to authenticate users, authorize the type of access based on user credentials, and record authentication events and information about the network access and network resource consumption.profile:
(host)[md](config) #aaa profile guestnet
initial-role guest-logon
Configuring the WLAN
In this section, you create theWLANWireless Local Area Network. WLAN is a 802.11 standards-based LAN that the users access through a wireless connection.. The virtual AP profile contains theSSIDService Set Identifier. SSID is a name given to a WLAN and is used by the client to access a WLAN network.profile (which configures opensystem for theSSIDService Set Identifier. SSID is a name given to a WLAN and is used by the client to access a WLAN network.) and theAAAAuthentication, Authorization, and Accounting. AAA is a security framework to authenticate users, authorize the type of access based on user credentials, and record authentication events and information about the network access and network resource consumption.profile .
virtual AP profile for the下面的过程介绍如何配置the guestWLANWireless Local Area Network. WLAN is a 802.11 standards-based LAN that the users access through a wireless connection.:
1.Login to theMobility Master.
2.In the node hierarchy, navigate to the tab.
3.Under , select , then select .
4.To create a new virtual AP profile, Click from the pane. Enter the name for the virtual AP profile (for example, ), and click .
a.In the Profile Details entry for the new virtual AP profile ( ), select and then select theAAAAuthentication, Authorization, and Accounting. AAA is a security framework to authenticate users, authorize the type of access based on user credentials, and record authentication events and information about the network access and network resource consumption.profile you previously configured from the drop-down list and click .
b.In the Profile Details entry for the new virtual AP profile ( ), select and then selectSSIDService Set Identifier. SSID is a name given to a WLAN and is used by the client to access a WLAN network.from theSSIDService Set Identifier. SSID is a name given to a WLAN and is used by the client to access a WLAN network.profile drop-down list.
c.Enter the name for the profile (for example, ).
d.For , select
e.At the bottom of the Profile Details page, click
5.Navigate to the page.
6.Select an AP Group and Click tab in the AP group window.
7.Click + under theWLANsWireless Local Area Network. WLAN is a 802.11 standards-based LAN that the users access through a wireless connection.tab and select the newly create virtual AP profile (guestnet) from the drop-down list and click .
8.Navigate to the tab. Select and then select . Click on the new virtual AP name in the All Profiles list.
a.Click accordion and make sure is selected.
b.ForVLANVirtual Local Area Network. In computer networking, a single Layer 2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them through one or more routers; such a domain is referred to as a Virtual Local Area Network, Virtual LAN, or VLAN., enter the ID of theVLANVirtual Local Area Network. In computer networking, a single Layer 2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them through one or more routers; such a domain is referred to as a Virtual Local Area Network, Virtual LAN, or VLAN.in whichcaptive portalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.users are placed (for example,VLANVirtual Local Area Network. In computer networking, a single Layer 2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them through one or more routers; such a domain is referred to as a Virtual Local Area Network, Virtual LAN, or VLAN.).
c.Click
9.Click .
10.In the window, select the check box and click .
The followingCLICommand-Line Interface. A console interface with a command line shell that allows users to execute text input as commands and convert these commands to appropriate functions.commands configure the guestWLANWireless Local Area Network. WLAN is a 802.11 standards-based LAN that the users access through a wireless connection.:
(host) [md] (config) #wlan ssid-profile guestnet
essid guestnet
opmode opensystem
(host) [md] (config) #aaa profile guestnet
initial-role guest-logon
(host) [md] (config) #wlan virtual-ap guestnet
vlan 900
aaa-profile guestnet
ssid-profile guestnet
Managing User Accounts
Temporary user accounts are created in the internal database on theMobility Master. You can create a user role which will allow a receptionist to create temporary user accounts. Guests can use the accounts to log into acaptive portalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.login page to gain Internet access.
Configuring Captive Portal Configuration Parameters
Table 1describes configuration parameters in the WebUICaptive PortalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.Authentication profile page.
In theCLICommand-Line Interface. A console interface with a command line shell that allows users to execute text input as commands and convert these commands to appropriate functions., you configure these options with the commands. |