Dell PowerConnect W-IAP92 Dell Instant 6.1.2.3-2.0.0.0 User Guide - Page 10

Configuring External Captive Portal Authentication when Editing a Guest Network

Page 10 highlights

10 | Figures Figure 45 Figure 46 Figure 47 Figure 48 Figure 49 Figure 50 Figure 51 Figure 52 Figure 53 Figure 54 Figure 55 Figure 56 Figure 57 Figure 58 Figure 59 Figure 60 Figure 61 Figure 62 Figure 63 Figure 64 Figure 65 Figure 66 Figure 67 Figure 68 Figure 69 Figure 70 Figure 71 Figure 72 Figure 73 Figure 74 Figure 75 Figure 76 Figure 77 Figure 78 Figure 79 Figure 80 Figure 81 Figure 82 Figure 83 Figure 84 Figure 85 Figure 86 Figure 87 Figure 88 Figure 89 Figure 90 Figure 91 Figure 92 Figure 93 Figure 94 Editing IAP Settings...64 Changing IAP Name ...64 Configuring IAP Settings-Connectivity Tab 65 Configuring IAP Connectivity Settings-Specifying Static Settings 65 Configuring IAP Radio Settings Mode-Access 66 Maintenance Box ...67 Maintenance-Convert Tab...67 Confirm Access Point Conversion Box 68 Rebooting the IAP ...68 Confirm Reboot message ...69 Reboot In progress...69 Reboot Successful ...69 Automatic Image Check-New Version Available Link 70 New Version Available Box ...70 Manual Image Check...71 Configuring NTP Server ...73 Specifying Virtual Controller Name and IP Address 75 Configuring the DHCP Server ...76 Configuring an External RADIUS Server 80 Enabling Instant RADIUS ...81 Management Authentication Settings 84 Configuring Captive Portal when Adding A Guest Network 85 Configuring Captive Portal when Editing a Guest Network 86 Configuring Internal Captive Portal with External Radius Server Authentication 87 Customizing a Splash Page...88 Disabling Captive Portal Authentication 88 Configuring External Captive Portal when adding a Guest Network 89 Configuring External Captive Portal Authentication when Editing a Guest Network 90 Configuring Mac Authentication 92 Walled Garden ...93 Loading Certificates ...94 New Certificate...95 Access Tab-Instant User Role Settings 99 Creating a New User Role...100 Creating Role Assignment Rules 101 Access Tab-Instant Firewall Settings 103 Defining Rule-Allow TCP Service to a Particular Network 106 Defining Rule-Allow POP3 Service to a Particular Server 107 Defining Rule-Deny FTP Service Except to a Particular Server 108 Defining Rule-Deny bootp Service Except to a Particular Network 109 Enabling Content Filtering ...112 Enterprise Domains...112 OS Fingerprinting ...113 Airtime fairness mode...116 Configuring Administrator Assigned Radio Settings for IAP 118 Radio Profile ...119 Intrusion Detection ...121 Wireless Intrusion Protection-Detection 122 Wireless Intrusion Protection-Protection 124 Containment Methods ...125 Dell PowerConnect W-Series Instant Access Point 6.1.2.3-2.0.0.0 | User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158

10
|
Figures
Dell PowerConnect W-Series Instant Access Point 6.1.2.3-2.0.0.0
| User Guide
Figure 45
Editing IAP Settings
..........................................................................................................................
64
Figure 46
Changing IAP Name
........................................................................................................................
64
Figure 47
Configuring IAP Settings—Connectivity Tab
..............................................................................
65
Figure 48
Configuring IAP Connectivity Settings—Specifying Static Settings
......................................
65
Figure 49
Configuring IAP Radio Settings Mode—Access
........................................................................
66
Figure 50
Maintenance Box
............................................................................................................................
67
Figure 51
Maintenance—Convert Tab
...........................................................................................................
67
Figure 52
Confirm Access Point Conversion Box
........................................................................................
68
Figure 53
Rebooting the IAP
............................................................................................................................
68
Figure 54
Confirm Reboot message
................................................................................................................
69
Figure 55
Reboot In progress
...........................................................................................................................
69
Figure 56
Reboot Successful
...........................................................................................................................
69
Figure 57
Automatic Image Check—New Version Available Link
............................................................
70
Figure 58
New Version Available Box
............................................................................................................
70
Figure 59
Manual Image Check
.......................................................................................................................
71
Figure 60
Configuring NTP Server
..................................................................................................................
73
Figure 61
Specifying Virtual Controller Name and IP Address
.................................................................
75
Figure 62
Configuring the DHCP Server
.........................................................................................................
76
Figure 63
Configuring an External RADIUS Server
......................................................................................
80
Figure 64
Enabling Instant RADIUS
................................................................................................................
81
Figure 65
Management Authentication Settings
..........................................................................................
84
Figure 66
Configuring Captive Portal when Adding A Guest Network
.....................................................
85
Figure 67
Configuring Captive Portal when Editing a Guest Network
.......................................................
86
Figure 68
Configuring Internal Captive Portal with External Radius Server Authentication
.................
87
Figure 69
Customizing a Splash Page
.............................................................................................................
88
Figure 70
Disabling Captive Portal Authentication
.......................................................................................
88
Figure 71
Configuring External Captive Portal when adding a Guest Network
......................................
89
Figure 72
Configuring External Captive Portal Authentication when Editing a Guest Network
...........
90
Figure 73
Configuring Mac Authentication
...................................................................................................
92
Figure 74
Walled Garden
..................................................................................................................................
93
Figure 75
Loading Certificates
........................................................................................................................
94
Figure 76
New Certificate
.................................................................................................................................
95
Figure 77
Access Tab—Instant User Role Settings
.....................................................................................
99
Figure 78
Creating a New User Role
.............................................................................................................
100
Figure 79
Creating Role Assignment Rules
..................................................................................................
101
Figure 80
Access Tab—Instant Firewall Settings
......................................................................................
103
Figure 81
Defining Rule—Allow TCP Service to a Particular Network
.................................................
106
Figure 82
Defining Rule—Allow POP3 Service to a Particular Server
..................................................
107
Figure 83
Defining Rule—Deny FTP Service Except to a Particular Server
..........................................
108
Figure 84
Defining Rule—Deny bootp Service Except to a Particular Network
..................................
109
Figure 85
Enabling Content Filtering
............................................................................................................
112
Figure 86
Enterprise Domains
........................................................................................................................
112
Figure 87
OS Fingerprinting
...........................................................................................................................
113
Figure 88
Airtime fairness mode
....................................................................................................................
116
Figure 89
Configuring Administrator Assigned Radio Settings for IAP
..................................................
118
Figure 90
Radio Profile
....................................................................................................................................
119
Figure 91
Intrusion Detection
........................................................................................................................
121
Figure 92
Wireless Intrusion Protection—Detection
................................................................................
122
Figure 93
Wireless Intrusion Protection—Protection
...............................................................................
124
Figure 94
Containment Methods
...................................................................................................................
125