
a. Enter the IP address of the ClearPass Guest server in the IP or hostname field. Obtain the ClearPass Guest
IP address from your system administrator.
b. Enter /page_name.php in the URL field. This URL must correspond to the Page Name configured in the
ClearPass Guest RADIUS Web Login page. For example, if the Page Name is Alcatel-Lucent, the URL
should be /Alcatel-Lucent.php in the AOS-W Instant UI.
c. Enter the Port number (generally should be 80). The ClearPass Guest server uses this port for HTTP
services.
d. Click OK.
4. To create an external RADIUS server, select New from the Authentication server 1 drop-down list. For
information on RADIUS server configuration parameters, see Configuring an External Server for Authentication
on page 144.
5. Click Next and then click Finish.
6. Click the updated SSID in Network tab.
7. Open any browser and type any URL. AOS-W Instant redirects the URL to ClearPass Guest login page.
8. Log in to the network with the username and password specified used while configuring the RADIUS server.
Configuring Guest Logon Role and Access Rules for Guest Users
You can configure up to 64 access rules for guest network using the AOS-W Instant UI or CLI.
In the AOS-W Instant UI
To configure access rules for guest network:
1. In the Access Rules tab, set slider to any of the following types of access control:
l Unrestricted— Select this to set unrestricted access to the network.
l Network-based— Set the slider to Network-based to set common rules for all users in a network. The Allow
any to all destinations access rule is enabled by default. This rule allows traffic to all destinations. To define
an access rule:
a. Click New.
b. Select appropriate options in the New Rule window.
c. Click OK.
l Role-based— Select Role-based to enable access based on user roles. For role-based access control:
n Create a user role if required. For more information, see Configuring User Roles.
n Create access rules for a specific user role. For more information, see Configuring Access Rules on page
169. You can also configure an access rule to enforce Captive portal authentication for an SSIDthat is
configured to use 802.1X authentication method. For more information, see Configuring Captive Portal
Roles for an SSID on page 123.
n Create a role assignment rule. For more information, see Configuring Derivation Rules on page 178. AOS-
W Instant supports role derivation based on DHCP option for Captive Portal authentication. When the
Captive Portal authentication is successful, a new user role is assigned to the guest users based on
DHCP option configured for the SSID profile, instead of the pre-authenticated role.
2. Click Finish.
In the CLI
To configure access control rules for a WLAN SSID:
(Instant Access Point)(config)# wlan access-rule <name>
AOS-W Instant 6.3.1.1-4.0 | User Guide Captive Portal for Guest Access | 122
Komentarze do niniejszej Instrukcji