D-Link DWS-1008 Product Manual - Page 314

Portal ACL and User ACLs, Network Requirements, Switch Recommendations, Client NIC Recommendations

Page 314 highlights

Portal ACL and User ACLs The portalacl ACL, which MSS creates automatically, applies only when a user's session is in the portal state. After the user is authenticated and authorized, the ACL is no longer applicable. To modify a user's access while the user is still being authenticated and authorized, you can configure another ACL and map that ACL instead to the service profile or the web-portal-wired user. Make sure to use the capture option for traffic you do not want to allow. D-Link recommends that you do not change the portalacl ACL. Leave the ACL as a backup in case you need to refer to it or you need to use it again. For example, if you want to allow the user to access a credit card server while MSS is still authenticating and authorizing the user, create a new ACL, add ACEs that are the same as the ACEs in portalacl, and add a new ACE before the last one, to allow access to the credit card server. Make sure the last ACE in the ACL is the deny ACE that captures all traffic that is not allowed by the other ACEs. To modify a WebAAA user's access after the user is authenticated and authorized, map an ACL to the individual WebAAA user. Changes you make to the ACL mapped to the service profile or web-portal-wired user do not affect user access after authentication and authorization are complete. Note: The filter-id attribute in a service profile applies only to authenticated users. If this attribute is set in a service profile for an SSID accessed by Web-Portal users, the attribute applies only after users have been authenticated. While a Web-Portal user is still being authenticated, the ACL set by the web-portal-acl applies instead. Network Requirements The VLAN where users will be placed must have an IP interface, and the subnet the interface is in must have access to DHCP and DNS servers. Switch Recommendations • Consider installing a WebAAA certificate signed by a trusted CA, instead of one signed by the switch itself. Unless the client's browser is configured to trust the signature on the switch's WebAAA certificate, display of the login page can take several seconds longer than usual, and might be interrupted by a dialog asking the user what to do about the untrusted certificate. Generally, the browser is already configured to trust certificates signed by a CA. Client NIC Recommendations • Configure the NIC to use DHCP to obtain its IP address. D-Link DWS-1008 User Manual 295

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502

D-Link DWS-1008 User Manual
±·´
Portal ACL and User ACLs
The portalacl ACL, which MSS creates automatically, applies only when a user’s session is in the portal
state. After the user is authenticated and authorized, the ACL is no longer applicable.
To modify a user’s access while the user is still being authenticated and authorized, you can configure
another ACL and map that ACL instead to the service profile or the
web-portal-wired
user. Make
sure to use the capture option for traffic you do not want to allow. D-Link recommends that you do not
change the
portalacl
ACL. Leave the ACL as a backup in case you need to refer to it or you need to use
it again.
For example, if you want to allow the user to access a credit card server while MSS is still authenticating
and authorizing the user, create a new ACL, add ACEs that are the same as the ACEs in
portalacl
, and
add a new ACE before the last one, to allow access to the credit card server. Make sure the last ACE in
the ACL is the deny ACE that captures all traffic that is not allowed by the other ACEs.
To modify a WebAAA user’s access after the user is authenticated and authorized, map an ACL
to the individual WebAAA user. Changes you make to the ACL mapped to the service profile or
web-portal-wired
user do not affect user access after authentication and authorization are complete.
Note:
The filter-id attribute in a service profile applies only to authenticated users. If this attribute is set
in a service profile for an SSID accessed by Web-Portal users, the attribute applies only after users
have been authenticated. While a Web-Portal user is still being authenticated, the ACL set by the
web-portal-acl applies instead.
Network Requirements
The VLAN where users will be placed must have an IP interface, and the subnet the interface is in must
have access to DHCP and DNS servers.
Switch Recommendations
• Consider installing a WebAAA certificate signed by a trusted CA, instead of one signed
by the switch itself. Unless the client’s browser is configured to trust the signature on the
switch’s WebAAA certificate, display of the login page can take several seconds longer than
usual, and might be interrupted by a dialog asking the user what to do about the untrusted
certificate. Generally, the browser is already configured to trust certificates signed by a
CA.
Client NIC Recommendations
• Configure the NIC to use DHCP to obtain its IP address.