Users Guide

Table Of Contents
Dell PowerConnect ArubaOS 5.0 | User Guide Captive Portal | 305
aaa authentication captive-portal c-portal
default-role employee
server-group cp-srv
user-role logon
captive-portal c-portal
aaa profile aaa_c-portal
initial-role logon
wlan ssid-profile ssid_c-portal
essid c-portal-ap
vlan 20
wlan virtual-ap vp_c-portal
aaa-profile aaa_c-portal
ssid-profile ssid_c-portal
Example Authentication with Captive Portal
In the following example:
z Guest clients associate to the guestnet SSID which is an open wireless LAN. Guest clients are placed into
VLAN 900 and assigned IP addresses by the controller’s internal DHCP server. The user has no access to
network resources beyond DHCP and DNS until they open a web browser and log in with a guest account
using captive portal.
z Guest users are given a login and password from guest accounts created in the controller’s internal database.
The temporary guest accounts are created and administered by the site receptionist.
z Guest users must enter their assigned login and password into the captive portal login before they are given
access to use web browsers (HTTP and HTTPS), POP3 email clients, and VPN clients (IPsec, PPTP, and
L2TP) on the Internet and only during specified working hours. Guest users are prohibited from accessing
internal networks and resources. All traffic to the Internet is source-NATed.
In this example, you create two user roles:
z guest-logon is a user role assigned to any client who associates to the guestnet SSID. Normally, any client that
associates to an SSID will be placed into the logon system role. The guest-logon user role is more restrictive
than the logon role.
z auth-guest is a user role granted to clients who successfully authenticate via the captive portal.
Creating a Guest-logon User Role
The guest-logon user role consists of the following ordered policies:
z captiveportal is a predefined policy that allows captive portal authentication.
z guest-logon-access is a policy that you create with the following rules:
Allows DHCP exchanges between the user and the DHCP server during business hours while blocking
other users from responding to DHCP requests.
Allows ICMP exchanges between the user and the controller during business hours.
z block-internal-access is a policy that you create that denies user access to the internal networks.
Note: This example assumes a Policy Enforcement Firewall Next Generation (PEFNG) license is installed in the controller.
Note: The guest-logon user role configuration needs to include the name of the captive portal authentication profile instance. You
can modify the user role configuration after you create the captive portal authentication profile instance.