![Dell PowerConnect 7024 Manual Download Page 447](http://html.mh-extra.com/html/dell/powerconnect-7024/powerconnect-7024_manual_86095447.webp)
Configuring a Captive Portal
447
also writes a message to the trap log when the event occurs. To enable the
Captive Portal traps, see "Configuring SNMP Notifications (Traps and
Informs)" on page 341.
What Factors Should Be Considered When Designing and Configuring a
Captive Portal?
Before enabling the Captive Portal feature, decide what type (or types) of
authentication to require. Since the PowerConnect 7000 Series switches
support up to 10 different Captive Portal instances, you can configure one
Captive Portal that requires a username and password and another that only
requires the username. For each Captive Portal, you can customize the
welcome screen, including the colors and logo.
If you require authentication, consider the number of users that must exist in
the user database. The local user database supports up to 128 users. If you
need to support more than 128 authenticated users, you must use a remote
RADIUS server for authentication.
You can specify whether the captive portal uses HTTP or HTTPS as the
protocol during the user verification process. HTTP does not use encryption
during verification, and HTTPS uses the Secure Sockets Layer (SSL), which
requires a certificate to provide encryption. The certificate is presented to the
user at connection time.
The initial Web page that a user sees when he or she connects to the Captive
Portal can be customized. You can change the logo, color schemes, welcome
messages, and all text on the page, including the field and button labels. The
welcome page the user sees after a successful verification or authentication
can also be customized.
Summary of Contents for PowerConnect 7024
Page 134: ...134 Setting Basic Network Information ...
Page 290: ...290 Managing General System Settings Figure 11 14 SNTP Servers Table ...
Page 348: ...348 Configuring SNMP ...
Page 430: ...430 Monitoring Switch Traffic ...
Page 444: ...444 Configuring iSCSI Optimization ...
Page 538: ...538 Configuring 802 1X and Port Based Security ...
Page 594: ...594 Configuring VLANs Figure 21 16 GVRP Port Parameters Table ...
Page 600: ...600 Configuring VLANs Figure 21 23 Double VLAN Port Parameter Table ...
Page 658: ...658 Configuring the Spanning Tree Protocol ...
Page 693: ...Configuring Port Based Traffic Control 693 Figure 24 3 Storm Control 5 Click Apply ...
Page 780: ...780 Configuring Connectivity Fault Management ...
Page 804: ...804 Snooping and Inspecting Traffic Figure 27 17 DAI Interface Configuration Summary ...
Page 818: ...818 Snooping and Inspecting Traffic ...
Page 836: ...836 Configuring Link Aggregation ...
Page 882: ...882 Configuring DHCP Server Settings ...
Page 916: ...916 Configuring L2 and L3 Relay Features Figure 33 3 DHCP Relay Interface Summary ...
Page 924: ...924 Configuring L2 and L3 Relay Features Figure 33 12 IP Helper Statistics ...
Page 930: ...930 Configuring L2 and L3 Relay Features ...
Page 1004: ...1004 Configuring OSPF and OSPFv3 ...
Page 1044: ...1044 Configuring VRRP ...
Page 1057: ...Configuring IPv6 Routing 1057 Figure 37 9 IPv6 Route Preferences ...
Page 1064: ...1064 Configuring IPv6 Routing ...
Page 1084: ...1084 Configuring DHCPv6 Server and Relay Settings ...
Page 1091: ...Configuring Differentiated Services 1091 Figure 39 5 DiffServ Class Criteria ...
Page 1114: ...1114 Configuring Differentiated Services ...
Page 1130: ...1130 Configuring Class of Service ...
Page 1136: ...1136 Configuring Auto VoIP ...
Page 1216: ...1216 Managing IPv4 and IPv6 Multicast ...