Configuration Guide
WEB Authentication Configuration
http://www.web_auth.com/webportal/index.jsp. If no internal DNS server is deployed, go to the
preceding URL to configure the IP address of the web authentication server.
The SAM server works as the Radius server, which provides the authentication and charging
services.
A public server is available in the server area and it can be accessed without authentication.
Configuration Tips
After web authentication is enabled on a port, the DHCP and DNS packets sent from
unauthenticated users connected to the port can pass through the port. The users obtain IP
addresses, and domain names are resolved normally.
The maximum number of connections before user authentication is limited to prevent TCP attacks.
By default, the maximum number of connections for each IP address is 255 globally. (The number
of connections available for each IP address may decrease as the total number of connections
increases.) One user PC may initiate multiple HTTP connections through a browser or other
software (such as software for chatting, downloading, and videos), or even Trojan virus. In this case,
the browser may fail to set up a connection; therefore, authentication cannot be completed because
other software occupies the connection resource. To address this issue, the maximum number of
connections for each IP address must be set to a large value if possible. If users with web
authentication enable too much software that features automatic connection, the software must be
disabled before users access the Internet.
When a user PC needs to perform web authentication, the user PC must initiate an HTTP
connection, which requires the user PC to obtain an IP address resolved by the DNS server and an
ARP reply packet sent by the gateway. In this case, the access device allows the user PC to send
an ARP request packet to the gateway before authentication. This situation may create chance for
ARP spoofing. If a user sends ARP packets to the gateway by forging the IP addresses of other
users on the same VLAN, the gateway will learn incorrect ARP entries, affecting other users on the
same VLAN.
The first-generation web authentication device communicates with the Portal server over SNMP.
Therefore, SNMP must be enabled and related communication parameters must be configured
properly.
Configuration Steps
29) On the access devices, configure the IP address of the authentication server and the key used for
communication with the authentication server.
Ruijie# config
Enter configuration commands, one per line. End with CNTL/Z.
Ruijie(config)#
http redirect
192.168.3.1
Ruijie(config)#
web-auth portal key
web_auth_s26_1
30) On the access devices, configure the URL of the authentication page.
Ruijie(config)#
http
redirect
homepage
http://www.web_auth.com/webportal/index.jsp
Summary of Contents for RG-S2900G-E Series
Page 1: ...RG S2900G E Series Switch RGOS Configuration Guide Release 10 4 2b12 p1 ...
Page 91: ...Configuration Guide Configuring PoE Configuration ...
Page 133: ...Configuration Guide EEE Configuration ...
Page 319: ...Configuration Guide QinQ Configuration ...
Page 408: ......
Page 409: ...IP Routing Configuration 1 Static Route Configuration ...
Page 412: ......
Page 413: ...Multicast Configuration 1 IGMP Snooping Configuration 2 MLD Snooping Configuration ...
Page 757: ......
Page 758: ...ACL QoS Configuration 1 Access Control List Configuration 2 QoS Configuration ...
Page 801: ...Reliability Configuration 1 RLDP Configuration 2 TPP Configuration 3 SEM Configuration ...
Page 901: ...Configuration Guide ERSPAN Configuration ...
Page 902: ...Web based Configuration 1 Web based Configuration ...