ZyXEL GS1510-24 User Guide - Page 123

Web Authentication

Page 123 highlights

CHAPTER 20 Web Authentication 20.1 Overview This feature is used to authenticate users before they can access a website on the Internet. The Switch can authenticate users who try to log in based on user accounts configured on the Switch itself (see Section 23.2 on page 143). The Switch can also use an external authentication server to authenticate a larger number of users. This external method of authentication uses the RADIUS (Remote Authentication Dial In User Service, RFC 2138, 2139) protocol to validate users. When a user on an enabled port accesses the Internet, a customized web login page will display. User accounts with "User" or "Guest" privileges can login past this screen and access the Internet. 20.2 What You Can Do • Use the Configuration screen (Section 20.4 on page 125) to configure the authentication method and port settings. • Use the Customization screen (Section 20.5 on page 126) to configure the appearance of the web login screen that users will see. 20.3 What You Need to Know Web authentication allows the network administrator to set a username and password for Internet access on a particular port. This feature could be used on a guest terminal, for example in a company meeting room, where guests are allowed to connect to the Internet but not the local network (which is thereby kept secure). GS1510 Series User's Guide 123

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204

GS1510 Series User’s Guide
123
C
HAPTER
20
Web Authentication
20.1
Overview
This feature is used to authenticate users before they can access a website on the
Internet.
The Switch can authenticate users who try to log in based on user accounts
configured on the Switch itself (see
Section 23.2 on page 143
). The Switch can
also use an external authentication server to authenticate a larger number of
users. This external method of authentication uses the RADIUS (Remote
Authentication Dial In User Service, RFC 2138, 2139) protocol to validate users.
When a user on an enabled port accesses the Internet, a customized web login
page will display. User accounts with “User” or “Guest” privileges can login past
this screen and access the Internet.
20.2
What You Can Do
Use the
Configuration
screen (
Section 20.4 on page 125
) to configure the
authentication method and port settings.
Use the
Customization
screen (
Section 20.5 on page 126
) to configure the
appearance of the web login screen that users will see.
20.3
What You Need to Know
Web authentication allows the network administrator to set a username and
password for Internet access on a particular port.
This feature could be used on a guest terminal, for example in a company meeting
room, where guests are allowed to connect to the Internet but not the local
network (which is thereby kept secure).