Configuration Wizards
Using the Wireless Wizard (for ISA550W and ISA570W only)
Cisco ISA500 Series Integrated Security Appliances Administration Guide
80
2
STEP 2
In the
Security Settings
area, specify the wireless security settings.
•
Security Mode:
Choose the security mode and configure the
corresponding security settings. For complete details on configuring the
security mode, see
Configuring Wireless Security, page 186
STEP 3
In the
Advanced Settings
area, enter the following information:
•
VLAN Mapping:
Choose the VLAN to which the SSID is mapped. All traffic
from the wireless clients that are connected to this SSID will be directed to
the selected VLAN. For Guest VLAN access, you must choose a VLAN that
is mapped to a guest zone.
•
User Limit:
Specify the maximum number of users that can simultaneously
connect to this SSID. Enter a value in the range of 0 to 200. The default value
is zero (0), which indicates that there is no limit for this SSID.
NOTE:
The maximum number of users that can simultaneously connect to all
enabled SSIDs is 200.
Configuring the SSID for Captive Portal Access
Follow these steps to configure the connectivity settings for Captive Portal
access. In this configuration, the wireless network allows access only by the
wireless users who have authenticated successfully. When attempting to access
the Internet, the wireless users will be directed to a specific HotSpot Login page
to authenticate, and then will be directed to a specified web portal.
STEP 1
Enter the following information:
•
SSID:
Enter the name of the SSID.
•
Broadcast SSID:
Check this box to broadcast the SSID in its beacon frames.
All wireless devices within range are able to see the SSID when they scan
for available networks. Uncheck this box to prevent auto-detection of the
SSID. In this case, users must know the SSID to set up a wireless connection
to this SSID.
•
Station Isolation:
Check so that the wireless clients on the same SSID will
be unable to see each other.
STEP 2
In the
Security Settings
area, choose the
Security Mode
and configure the
corresponding settings. For complete details on configuring the security mode,
see