Dell PowerEdge M520 Dell PowerConnect M6220/M6348/M8024 Switches Configuration - Page 118
Captive Portal Configuration, Status and Statistics, Client Access, Authentication, and Control
View all Dell PowerEdge M520 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 118 highlights
There are three states for clients connecting to the Captive Portal interface: • Unknown State • Unauthenticated State • Authenticated State In the unknown state, the CP doesn't redirect HTTP/S traffic to the switch, but queries the switch to determine whether the client is authenticated or unauthenticated. In the Unauthenticated state, the CP directs the HTTP/S traffic to the switch to allow the client to authenticate with the switch. Once the client is authenticated, the client is placed in Authenticated state; in this state all the traffic emerging from the client will be forwarded through the switch. Captive Portal Configuration, Status and Statistics This section describes the configurations, status, and statistics that can be viewed by a network administrator. Captive Portal customized web pages are only configurable via the Web Interface. Otherwise, the configurations included in this section are managed using the standard management interfaces (Web, CLI, and SNMP). Captive Portal Configuration The Captive Portal configuration allows the network administrator to control: • Verification and authentication • Assignment to interfaces • Client sessions • Web page customization The administrator can create up to 10 captive portal configuration instances. Each configuration contains flags and definitions for controlling client access, and content used to customize the user verification web page. A captive portal configuration can be applied to one or more interfaces. An interface may only be a physical port on the switch. Client Access, Authentication, and Control User verification can be configured to allow access for guest users; users that do not have assigned user names and passwords. User verification can also be configured to allow access for authenticated users. Authenticated users are required to enter a valid user name and password that are validated against the local database or a RADIUS server. Network access is granted once user verification has been confirmed. The administrator can block access to a captive portal configuration. When an instance is blocked, no client traffic is allowed through any associated interfaces. Blocking a captive portal instance is a temporary command executed by the administrator (not saved in the configuration). 118 Device Security