Netgear WC7600 Reference Manual - Page 145

Manage Guest Network Access, Portal Concepts

Page 145 highlights

ProSAFE Wireless Controller WC7600 The advanced Rogue AP screen displays. 6. Click the Browse button, navigate to the file containing the list of known access points, and select it. 7. Next to Import Known List, select one of the following radio buttons: • Merge. Merges the list of access points that you intend to import with the access points that are already present in the Rogue List. • Replace. Replaces the access points that are present in the Rogue List with the access points in the file that you intend to import. 8. Click the Import button. The wireless controller imports the MAC addresses that are in the text file into the Rogue List table. 9. Click the Apply button. Manage Guest Network Access Users with management (admin) credentials-for example, receptionists or hotel clerks-can provision guests. Guests must provide their email address, or both a login name and password. These latter guests are referred to as captive portal users, for which you must set up a captive portal and captive portal user credentials. Note: The URL for the portal is http:///guest_access/index.php in which is the IP address of the wireless controller. Portal Concepts Captive portal authentication is typically used for hotspot users and paying guests such as hotel guests who purchase access time for an Internet connection. You can configure only a single captive portal on the wireless controller. The wireless controller supports two types of portal settings: • Guest portal. Use this portal if all wireless users are allowed to access the network by supplying only their email address. You do not need to define user names and passwords for these users. • Captive portal. Use this portal type if wireless users must supply their login name and password before being allowing access the network. You must define user names and passwords for these users (see Manage Users, Accounts, and Passwords on page 150). When you configure a captive portal, you can use either the wireless controller as a local authentication server for the captive portal clients, or you can configure an external RADIUS server for authentication. Manage Rogue Access Points, Guest Network Access, and Users 145

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307

Manage Rogue Access Points, Guest Network Access, and Users
145
ProSAFE Wireless Controller WC7600
The advanced Rogue AP screen displays.
6.
Click the
Browse
button, navigate to the file containing the list of known access points, and
select it.
7.
Next to Import Known List, select one of the following radio buttons:
Merge
. Merges the list of access points that you intend to import with the access points
that are already present in the Rogue List.
Replace
. Replaces the access points that are present in the Rogue List with the
access points in the file that you intend to import.
8.
Click the
Import
button.
The wireless controller imports the MAC addresses that are in the text file into the Rogue
List table.
9.
Click the
Apply
button.
Manage Guest Network Access
Users with management (admin) credentials—for example, receptionists or hotel clerks—can
provision guests. Guests must provide their email address, or both a login name and
password. These latter guests are referred to as captive portal users, for which you must set
up a captive portal and captive portal user credentials.
Note:
The URL for the portal is http://
<IP address>
/guest_access/index.php
in which
<IP address>
is the IP address of the wireless controller.
Portal Concepts
Captive portal authentication is typically used for hotspot users and paying guests such as
hotel guests who purchase access time for an Internet connection. You can configure only a
single captive portal on the wireless controller.
The wireless controller supports two types of portal settings:
Guest portal
. Use this portal if all wireless users are allowed to access the network by
supplying only their email address. You do
not
need to define user names and passwords
for these users.
Captive portal
. Use this portal type if wireless users must supply their login name and
password before being allowing access the network. You must define user names and
passwords for these users (see
Manage Users, Accounts, and Passwords
on page
150).
When you configure a captive portal, you can use either the wireless controller as a local
authentication server for the captive portal clients, or you can configure an external
RADIUS server for authentication.