Configuration Guide
WEB Authentication Configuration
After the HTTP interception, the access device directs the HTTP connection requests from the user to
itself and thus establishes a session between the access device and the user. The access device uses
the HTTP redirection function to push the redirection page to the
user, and the user’s browser will show a
window which may require authentication, or may display a link for downloading software.
With Web authentication function, it is possible to set which users
’ HTTP packets to the destination ports
are to be blocked, and which are not to be blocked. Generally, HTTP requests from unauthenticated
users are intercepted, and those from authenticated users are not intercepted. HTTP interception is the
foundation of Web authentication. The Web authentication process is automatically triggered once HTTP
interception takes place.
HTTP Redirection
According to the HTTP protocol, generally, after a user
’s browser sends HTTP GET or HEAD request
packets, the receiver responds with a 200 packet if it is able to provide the required resources, or the
receiver responds with a 302 packet if it is unable to do so. A new site path is provided in the 302
message. After the user has received the response, it may re-send the HTTP GET or HEAD request
packets to the new site for requesting resources, which is called redirection.
HTTP redirection is an important part of Web authentication and takes place after HTTP interception. It
uses the special characteristic of the 302 packet in the HTTP protocol. HTTP interception leads to the
creation of a session between the access device and the user. After that, the user sends the HTTP GET
or HEAD request packets (which should have been sent to another site) to the access device, which then
responds with a 302 packet and specifies the site path of the redirection page in the 302 packet. In this
way, the user re-sends the requests along the new site path and gets the redirection page.
Operating Principle
The typical networking of Web authentication is illustrated below with three essential roles, authentication
client, access device and Portal server.
Figure 1 Networking topology of web authentication
Summary of Contents for RG-S2900G-E Series
Page 1: ...RG S2900G E Series Switch RGOS Configuration Guide Release 10 4 2b12 p1 ...
Page 91: ...Configuration Guide Configuring PoE Configuration ...
Page 133: ...Configuration Guide EEE Configuration ...
Page 319: ...Configuration Guide QinQ Configuration ...
Page 408: ......
Page 409: ...IP Routing Configuration 1 Static Route Configuration ...
Page 412: ......
Page 413: ...Multicast Configuration 1 IGMP Snooping Configuration 2 MLD Snooping Configuration ...
Page 757: ......
Page 758: ...ACL QoS Configuration 1 Access Control List Configuration 2 QoS Configuration ...
Page 801: ...Reliability Configuration 1 RLDP Configuration 2 TPP Configuration 3 SEM Configuration ...
Page 901: ...Configuration Guide ERSPAN Configuration ...
Page 902: ...Web based Configuration 1 Web based Configuration ...