460
C
HAPTER
21: C
ONFIGURING
AAA
FOR
N
ETWORK
U
SERS
Configuring Web
Portal WebAAA
WebAAA simplifies secure access to unencrypted SSIDs. When a user
requests access to an SSID or attempts to access a web page before
logging onto the network, MSS serves a login page to the user’s browser.
After the user enters a username and password, MSS checks the local
database or RADIUS servers for the user information, and grants or denies
access based on whether the user information is found.
MSS redirects an authenticated user back to the requested web page, or
to a page specified by the administrator.
WebAAA, like other types of authentication, is based on an SSID or on a
wired authentication port.
You can use WebAAA on both encrypted and unencrypted SSIDs. If you
use WebAAA on an encrypted SSID, you can use static WEP or WPA with
PSK as the encryption type.
MSS provides a 3Com login page, which is used by default. You can add
custom login pages to the WX switch’s nonvolatile storage, and
configure MSS to serve those pages instead.
Web Portal WebAAA replaces the WebAAA implementation in MSS
Version 3.x. The previous implementation is deprecated beginning in MSS
Version 4.0. During upgrade from MSS Version 3.x, your 3.x WebAAA
configuration is automatically converted to a Web Portal WebAAA
configuration.
How WebAAA Portal
Works
1
A WebAAA user attempts to access the network. For a wireless user, this
begins when the user’s network interface card (NIC) associates with an
SSID on a 3Com radio. For a wired authentication user, this begins when
the user’s NIC sends data on the wired authentication port.
2
MSS starts a portal session for the user, and places the user in a VLAN.
If the user is wireless (associated with an SSID), MSS assigns the
user to
the VLAN set by the vlan-name attribute for the SSID’s service
profile.
If the user is on a wired authentication port, the VLAN is the one
assigned
to the
web-portal-wired
user
.
Содержание 3CRWX120695A
Страница 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Страница 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Страница 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Страница 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Страница 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Страница 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Страница 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Страница 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Страница 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Страница 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Страница 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Страница 706: ...706 GLOSSARY ...