
6 - 12 WiNG 5.4.2 Access Point System Reference Guide
6.1.2.3 PSK / None
Configuring WLAN Security
Open-system authentication can be referred to as no authentication, since no actual authentication takes place. When
selecting PSK/None, a client requests (and is granted) authentication with no credential exchange.
6.1.2.4 Captive Portal
Configuring WLAN Security
A
captive portal
is guest access policy that provides guests temporary and restrictive access to the wireless network. The
primary means of securing such guest access is the use of a captive portal. For an overview of the captive portal process and
information on how to define a captive portal policy that can be applied to a WLAN, see
Configuring Captive Portal Policies on
page 9-2
.
To assign a captive portal policy to a WLAN:
1. Select the
Configuration
tab from the Web UI.
2. Select
Wireless.
3. Select
Wireless LANs
to display a high level display of existing WLANs.
4. Select the
Add
button to create an additional WLAN or select an existing WLAN and
Edit
to modify the properties of an
existing WLAN.
5. Select
Security
.
6. Refer to the
Captive Portal
field within the WLAN security screen.
Select the
Captive Portal Enable
option if authenticated guess access is required with the selected WLAN. This feature
is disabled by default.
7. Select the
Captive Portal Policy
to use with the WLAN from the drop-down menu. If no relevant policies exist, select the
Create
icon to define a new policy to use with this WLAN or the
Edit
icon to update the configuration of an existing captive
portal policy. For more information, see
Configuring Captive Portal Policies on page 9-2
.
8. Select
OK
when completed to update the captive portal configuration. Select
Reset
to revert the screen back to the last
saved configuration.
6.1.2.5 MAC Registration
Configuring WLAN Security
The MAC Registration feature provides returning captive portal users quicker access to the captive portal.
When a user accesses the captive portal for the first time, user information is gathered and stored. This information is matched
with the MAC address of the device accessing the captive portal. This information is stored on board the wireless controller.
The next time the user accesses the captive portal service using the same device, he/she is authenticated immediately as the
MAC address of the device is available in the wireless controller’s database along with the user’s identification information.
The user saves time as identification information is not collected again speeding the logon.
The MAC Registration feature must be enabled for each captive portal WLAN.
To enable MAC Registration:
NOTE:
Although
None
implies no authentication, this option is also used when
pre-shared keys are used for encryption (thus the /PSK in the description).
Summary of Contents for WiNG 5.4.2
Page 1: ...Motorola Solutions WiNG 5 4 2 ACCESS POINT SYSTEM REFERENCE GUIDE ...
Page 2: ......
Page 20: ...xvi WiNG 5 4 2 Access Point System Reference Guide ...
Page 24: ...1 4 WiNG 5 4 2 Access Point System Reference Guide ...
Page 36: ...2 12 WiNG 5 4 2 Access Point System Reference Guide ...
Page 54: ...3 18 WiNG 5 4 2 Access Point System Reference Guide ...
Page 358: ...6 2 WiNG 5 4 2 Access Point System Reference Guide Figure 6 1 Configuration Wireless menu ...
Page 462: ...6 106 WiNG 5 4 2 Access Point System Reference Guide ...
Page 474: ...7 12 WiNG 5 4 2 Access Point System Reference Guide ...
Page 509: ...9 5 Figure 9 2 Captive Portal Policy screen Basic Configuration tab ...
Page 572: ...11 12 WiNG 5 4 2 Access Point System Reference Guide ...
Page 626: ...12 54 WiNG 5 4 2 Access Point System Reference Guide ...
Page 790: ...A 2 WiNG 5 4 2 Access Point System Reference Guide ...
Page 835: ......