D-Link DWS-1008 User Manual
xiii
Display of the Login Page
..............................................................................................
292
WebAAA Requirements and Recommendations
...............................................................
292
DWS-1008 Switch Requirements
..................................................................................
293
Portal ACL and User ACLs
............................................................................................
295
Network Requirements
..................................................................................................
295
Switch Recommendations
.............................................................................................
295
Client NIC Recommendations
.......................................................................................
295
Client Web Browser Recommendations
........................................................................
296
Configuring Web Portal WebAAA
......................................................................................
296
Web Portal WebAAA Configuration Example
................................................................
296
Displaying Session Information for Web Portal WebAAA Users
....................................
299
Using a Custom Login Page
..............................................................................................
300
Copying and Modifying the Web Login Page
.................................................................
301
Custom Login Page Scenario
........................................................................................
302
Using Dynamic Fields in WebAAA Redirect URLs
............................................................
304
Using an ACL Other Than
portalacl.±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±305
Configuring the Web Portal WebAAA Session Timeout Period
..........................................
306
Configuring Last-Resort Access
...............................................................................................
307
Configuring Last-Resort Access for Wired Authentication Ports
........................................
308
Configuring AAA for Users of Third-Party APs
.........................................................................
309
Authentication Process for Users of a Third-Party AP
.......................................................
309
Requirements
....................................................................................................................
310
Third-Party AP Requirements
........................................................................................
310
Switch Requirements
.....................................................................................................
310
RADIUS Server Requirements
......................................................................................
311
Configuring Authentication for 802.1X Users of a Third-Party AP with Tagged SSIDs
......
311
Configuring Authentication for Non-802.1X Users of a Third-Party AP with Tagged SSIDs313
Configuring Access for Any Users of a Non-Tagged SSID
................................................
313
Assigning Authorization Attributes
............................................................................................
313
Assigning Attributes to Users and Groups
.........................................................................
317
Assigning SSID Default Attributes to a Service Profile
......................................................
318
Assigning a Security ACL to a User or a Group
................................................................
318
Assigning a Security ACL Locally
..................................................................................
319
Assigning a Security ACL on a RADIUS Server
............................................................
320
Clearing a Security ACL from a User or Group
.............................................................
320
Assigning Encryption Types to Wireless Users
..................................................................
320
Assigning and Clearing Encryption Types Locally
.........................................................
321
Assigning and Clearing Encryption Types on a RADIUS Server
...................................
322
Keeping Users on the Same VLAN Even After Roaming
...................................................
322
Overriding or Adding Attributes Locally with a Location Policy
.................................................
323
About the Location Policy
..................................................................................................
323
How the Location Policy Differs from a Security ACL
........................................................
324
Setting the Location Policy
.................................................................................................
324
Applying Security ACLs in a Location Policy Rule
.........................................................
325
Displaying and Positioning Location Policy Rules
.........................................................
326
Clearing Location Policy Rules and Disabling the Location Policy
....................................
326
Configuring Accounting for Wireless Network Users
................................................................
327
Configuring Periodic Accounting Update Records
.............................................................
328
Enabling System Accounting Messages
............................................................................
328