Zyxel NXC5500 [169/469] Chapter 14 captive portal

Zyxel NXC5500 [169/469] Chapter 14 captive portal
Chapter 14 Captive Portal
NXC Series User’s Guide
169
QR Content Select a VLAN interface on the NXC, through which the authenticator is allowed to access
the NXC.
Authenticato
r
Select a user account or user group that you created in the Object > User/Group screen
to act as an authenticator. The authenticator assists clients in authentication with a QR
code.
Note: The authenticator must be able to access the IP address of the specified VLAN
interface.
Self-assisted Select this option to allow clients themselves to scan the QR code (printed out by the
administrator) to log into the web site.
QR Content Select a VLAN interface on the NXC, through which the client is allowed to access the NXC.
Note
Message
Enter the notes you want to display along with the QR code.
Print Out QR
Code
Click the button to view and print the QR code.
Authentication
Method
Select an authentication method for the captive portal page. You can configure the
authentication method in the Configuration > Object > Auth. Method screen (Chapter
25 on page 266).
This sets the default for all wireless clients interacting with the network through the captive
portal page. You can override this in the Auth. Policy Edit screen (Section 14.2.2 on page
171).
Note: If the Authentication with QR code option is selected, make sure you also have the
NXC use the local user database to authenticate clients.
Exceptional
Services
This table allows you to configure exceptions to the captive portal interception of network
traffic.
Add Click to add a service that is allowed to by-pass the captive portal. This allows certain
networking features (such as being able to connect to a DNS server, one of the pre-
configured default exceptions), to remain unhindered.
Remove Select an exception from the table then click this button to remove it. Once removed, all
traffic from the specified protocol goes back to being intercepted by the captive portal.
# This is the index number of the Exceptional Services list entry.
Exceptional
Services
This column lists the services that you have flagged as exceptions to captive portal
interception.
Authentication
Policy Summary
This table defines how captive portal interception is implemented using the source IPs, and
destination IPs that you specify.
Add Click this to create a new entry.
Edit Double-click an entry or select it and click Edit to open a screen where you can modify the
entry’s settings.
Remove To remove an entry, select it and click Remove. The NXC confirms you want to remove it
before doing so.
Activate To turn on an entry, select it and click Activate.
Inactivate To turn off an entry, select it and click Inactivate.
Move Click this to assign the selected policy a new Priority.
When you click the button, an entry box opens beside it. Enter the priority value, then
press [Enter].
Status This indicates whether a policy is active or inactive.
Table 83 Configuration > Captive Portal (continued)
LABEL DESCRIPTION

Содержание

Скачать