Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.02.xx and greater

Table Of Contents
5-28
Web Authentication for Mobile Users
Configuring Web-Auth
9. In the Path field, specify the name of the server directory in which the file
that you are loading is stored.
If the file is stored in the server’s base directory, leave the field empty. For
some FTP servers, you might need to enter
/.
To specify a directory within the base directory, include (/)—for example,
/MyDirectory.
10. Click the Install button.
The file immediately copies to the module’s flash.
11. Configure the Allow list as described below.
Configuring the Allow List
The Allow list determines the devices that stations can access before they are
authenticated by the RADIUS server. The Allow list can contain up to 10 IP
addresses. (For more information about which devices should be included on
the Allow list, see “Allow List” on page 5-8.)
Follow these steps to configure the Allow list:
1. Complete the steps in “Configuring Basic Options and Accessing the
Web-Auth Screen” on page 5-11.
2. You should be on the Web-Auth screen for the WLAN. In the Allow List
section on the right side of the screen, add up to 10 IP addresses.
a. If you have specified External for the Web-Auth page type, enter the
IP address of the external Web server:
i. Under the Allow List heading, select one of the 0.0.0.0 addresses.
ii. In the Change field, enter the address for the Web server.
iii. Click the Change button.
b. Follow the same process to enable access to any other devices
providing services to unauthenticated users.
You do not need to allow the IP addresses of your DHCP and DNS
servers. Access to these services is automatically permitted.
Note When you add a device’s IP address to the Allow list, that device is publicly
available; no network authentication is required to access the device. Any user
can access the device—unless that device (like the Wireless Edge Services xl
Module) has its own authentication requirements.
3. Verify that you have configured the Web pages as described in earlier
sections of this chapter.