D-Link DWS-3024 [167/266] Software user manual d link unified access system

D-Link DWS-3024 [167/266] Software user manual d link unified access system
Software User Manual D-Link Unified Access System
02/15/2011
Document 34CS3000-SWUM104-D10 Page 167
Configuring the Captive Portal
Use the CP Summary page to create or delete captive portal configurations. The switch supports 10 CP configurations. CP
configuration 1 is created by default and can not be deleted. Each CP configuration can contain up to 5 locale specific web
configurations. Therefore a total maximum of 50 custom web page configurations can be created. Each captive portal
configuration can have unique guest or group access modes and a customized acceptance use policy that displays when
the client connects.
To view summary information about existing captive portals, or to add or delete a captive portal, click Security > Captive
Portal > CP Configuration.
Figure 79: Captive Portal Summary
To create a CP configuration, enter the configuration name in the text box and click Add. After you add the configuration,
the CP Configuration page for that configuration displays, and a new tab with the name of that configuration appears.
To delete an existing CP, select the check box for the CP to remove, and then click Delete.
To configure the settings for an existing CP, click the name in the Configuration column or click the appropriate tab.
Table 62 describes the fields on the CP Summary page.
Table 62: Captive Portal Summary
Field Description
Configuration Shows the captive portal ID and name. To access the
configuration page for an existing CP, click the configuration
name.
Mode Shows whether the CP is enabled.
Protocol Indicates whether the portal uses HTTP or HTTPS.
Verification Specifies which type of user verification to perform:
•Guest: The user does not need to be authenticated by a
database.
Local: The switch uses a local database to authenticate users.
RADIUS: The switch uses a database on a remote RADIUS
server to authenticate users.
To configure authorized users on the local or remote RADIUS
database, see “Monitoring and Configuring Captive Portal Users”
on page 177.

Содержание

Скачать
Случайные обсуждения