Users Guide

Table Of Contents
Dell PowerConnect ArubaOS 5.0 | User Guide | 15
Configuring WISPr Authentication..............................................................................................296
Configure WISPr Authentication via the WebUI...............................................................296
Configure WISPr Authentication via the CLI .....................................................................297
Chapter 12 Captive Portal...................................................................................................................299
Captive Portal Overview................................................................................................................299
Policy Enforcement Firewall Next Generation (PEFNG) License ...................................299
Controller Server Certificate ................................................................................................300
Captive Portal in the Base ArubaOS ...........................................................................................300
Configuring Captive Portal via the WebUI .........................................................................301
Configuring Captive Portal via the CLI ................................................................................302
Captive Portal with the PEFNG License......................................................................................302
Configuring Captive Portal via the WebUI .........................................................................303
Configuring Captive Portal via the CLI ................................................................................304
Example Authentication with Captive Portal .............................................................................305
Creating a Guest-logon User Role.......................................................................................305
Creating an Auth-guest User Role.......................................................................................306
Configure Policies and Roles via the WebUI.....................................................................306
Time Range......................................................................................................................306
Auth-Guest-Access Policy ...........................................................................................307
Block-Internal-Access Policy......................................................................................308
Drop-and-Log Policy......................................................................................................309
Guest-logon Role............................................................................................................309
Guest-Logon Role...........................................................................................................309
Configure Policies and Roles via the CLI....................................................................310
Time Range......................................................................................................................310
Create Aliases.................................................................................................................310
Guest-Logon-Access Policy.........................................................................................310
Auth-Guest-Access Policy ...........................................................................................310
Block-Internal-Access Policy......................................................................................311
Drop-and-Log Policy......................................................................................................311
Guest-Logon Role...........................................................................................................311
Auth-Guest Role .............................................................................................................311
Guest VLANs ...................................................................................................................................311
Configuring the guest VLAN via the WebUI.......................................................................311
Configuring the guest VLAN via the CLI .............................................................................312
Captive Portal Authentication ......................................................................................................312
Modifying the Initial User Role.............................................................................................313
Configuring the AAA Profile .................................................................................................313
Configuring the WLAN...........................................................................................................313
User Account Administration...............................................................................................314
Captive Portal Configuration Parameters ..........................................................................314
Optional Captive Portal Configurations.......................................................................................316
Per-SSID Captive Portal Page..............................................................................................316
Changing the Protocol to HTTP............................................................................................317
Proxy Server Redirect............................................................................................................318
Redirecting Clients on Different VLANs .............................................................................319
Web Client Configuration with Proxy Script ......................................................................319
Personalizing the Captive Portal Page........................................................................................320
Chapter 13 Advanced Security..........................................................................................................323
Securing Client Traffic...................................................................................................................324
Securing Wireless Clients.....................................................................................................324
In the WebUI...................................................................................................................325
In the CLI..........................................................................................................................325
Securing Wired Clients..........................................................................................................325