Netgear FSM726v3 7000 Series Managed Switch Administration Guide for Software - Page 549

Captive Portal

Page 549 highlights

NETGEAR Managed Switches Software Administration Manual, Release 8.0 Chapter 32 Captive Portal This chapter includes the following sections: • "Captive Portal Configuration" on page 32-2 • "Enable Captive Portal" on page 32-2 • "Client Access, Authentication, and Control" on page 32-5 • "Block a Captive Portal Instance" on page 32-5 • "Local Authorization User/Group Configuration" on page 32-6 • "Remote Authorization (RADIUS) User Configuration" on page 32-8 • "SSL Certificates" on page 32-10 The Captive Portal feature is a software implementation that blocks clients from accessing the network until user verification has been established. Verification can be configured to allow access for both guest and authenticated users. Authenticated users must be validated against a database of authorized Captive Portal users before access is granted. The Authentication server supports both HTTP and HTTPS web connections. In addition, Captive Portal can be configured to use an optional HTTP port (in support of HTTP Proxy networks). If configured, this additional port is then used exclusively by Captive Portal. Note that this optional port is in addition to the standard HTTP port 80 which is currently being used for all other web traffic. Captive Portal for wired interfaces allows the clients directly connected to the switch be authenticated using a Captive Portal mechanism before the client is given access to the network. When a wired physical port is enabled for Captive Portal then the port would be set in captive-portalenabled state such that all the traffic coming onto the port from the unauthenticated clients are ropped except for the ARP, DHCP, DNS and NETBIOS packets. These packets are allowed to be forwarded by the switch so that the unauthenticated clients can get an IP address and be able to resolve the hostname or domain names. The data traffic from the authenticated clients would go through normally and the above rules do not apply to these packets. All the HTTP/HTTPS packets from unauthenticated clients are directed to the CPU on the switch for all the ports that are enabled for Captive Portal. So when an unauthenticated client opens a web browser and tries to connect to network, the Captive Portal redirects all the HTTP/HTTPS traffic from unauthenticated clients to the authenticating server on the switch. A Captive portal web page is sent back to the unauthenticated client and the client can authenticate and based upon the authentication the client is given access to the port. The Captive Portal feature can be enabled on all the physical ports on the switch. It is not supported for VLAN interfaces, loopback interfaces or logical interfaces. The Captive Portal feature is Mac-based authentication and not port-based authentication. This means that all the clients connected to the captive portal interface have to get authenticated before they can get access to the network. Captive Portal v1.0, October 2009 32-1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551
  • 552
  • 553
  • 554
  • 555
  • 556
  • 557
  • 558
  • 559
  • 560
  • 561

NETGEAR Managed Switches Software Administration Manual, Release 8.0
Captive Portal
32-1
v1.0, October 2009
Chapter 32
Captive Portal
This chapter includes the following sections:
“Captive Portal Configuration” on page 32-2
“Enable Captive Portal” on page 32-2
“Client Access, Authentication, and Control” on page 32-5
“Block a Captive Portal Instance” on page 32-5
“Local Authorization User/Group Configuration” on page 32-6
“Remote Authorization (RADIUS) User Configuration” on page 32-8
“SSL Certificates” on page 32-10
The Captive Portal feature is a software implementation that blocks clients from accessing the network until
user verification has been established. Verification can be configured to allow access for both guest and
authenticated users. Authenticated users must be validated against a database of authorized Captive Portal
users before access is granted.
The Authentication server supports both HTTP and HTTPS web connections. In addition, Captive Portal can
be configured to use an optional HTTP port (in support of HTTP Proxy networks). If configured, this
additional port is then used exclusively by Captive Portal. Note that this optional port is in addition to the
standard HTTP port 80 which is currently being used for all other web traffic.
Captive Portal for wired interfaces allows the clients directly connected to the switch be authenticated using
a Captive Portal mechanism before the client is given access to the network.
When a wired physical port is enabled for Captive Portal then the port would be set in captive-portal-
enabled state such that all the traffic coming onto the port from the unauthenticated clients are ropped except
for the ARP, DHCP, DNS and NETBIOS packets. These packets are allowed to be forwarded by the switch
so that the unauthenticated clients can get an IP address and be able to resolve the hostname or domain
names. The data traffic from the authenticated clients would go through normally and the above rules do not
apply to these packets.
All the HTTP/HTTPS packets from unauthenticated clients are directed to the CPU on the switch for all the
ports that are enabled for Captive Portal. So when an unauthenticated client opens a web browser and tries to
connect to network, the Captive Portal redirects all the HTTP/HTTPS traffic from unauthenticated clients to
the authenticating server on the switch. A Captive portal web page is sent back to the unauthenticated client
and the client can authenticate and based upon the authentication the client is given access to the port.
The Captive Portal feature can be enabled on all the physical ports on the switch. It is not supported for
VLAN interfaces, loopback interfaces or logical interfaces. The Captive Portal feature is Mac-based
authentication and not port-based authentication. This means that all the clients connected to the captive
portal interface have to get authenticated before they can get access to the network.