WESM zl Management and Configuration Guide WT.01.28 and greater

4-40
Wireless Local Area Networks (WLANs)
Configuring a WLAN
3. Under Authentication, select Web-Auth.
Note On the configuration screens that appear in this procedure, you can quickly get the
WLAN running by completing these minimal steps. (Learn more about the process
in Chapter 5: “Web Authentication for Mobile Users.”)
4. Click the Config button next to Web-Auth. The Web-Auth screen is displayed.
Figure 4-26. Configuring the Allow
5. On the Web-Auth screen, under Allow List, add the IP addresses that
unauthorized stations are allowed to access.
The Wireless Edge Services zl Module automatically handles traffic such as
DHCP and Domain Name System (DNS) requests. Therefore, even if you do
not add any IP addresses to the Allow list, Web-Auth using the internal pages
functions correctly.