Deployment Guide
161
E
XAMPLE
3: P
ROVIDING
G
UEST
A
CCESS
THROUGH
A
C
APTIVE
W
EB
P
ORTAL
The rules in this policy allow clients to access a DHCP and DNS server to get their network settings and resolve
DNS queries so that they can access the captive web portal. They deny traffic to all private IP address spaces,
thus blocking access to the internal network. Rules 7–9 allow HTTP and HTTPS traffic so that guests can browse
the public network and they allow IKE and NAT-T traffic so that they can make VPN connections back to their
corporate sites. Finally, rule 10 logs all outgoing packets that HiveAPs drop because the firewall blocked them.
To save the firewall policy and close the dialog box, click Save.
User Profile
A user profile contains the rate control and queuing QoS settings, VLAN, firewall policies, tunnel policy, and
schedules that you want the HiveAP to apply to traffic from certain users. Because the SSID in this example uses
a preshared key for user authentication, you can assign a single user profile to it.
1
The HiveAP then applies the
various settings in the user profile to all traffic on this SSID.
To define a user profile so that HiveAPs can apply the appropriate QoS settings, VLAN, and firewall policies to all
traffic on that SSID, click Configuration > User Profiles > New, enter the following, leave the other settings as
they are, and then click Save:
Name: Self-reg-guests(3)
The number 3 is included as part of the user profile name so that you can easily know its attribute
number when looking at the user profile name.
Attribute Number: 3
You must enter an attribute number that is unique for the WLAN policy to which the user profile is
attached. Although you can define different user profiles with the same attribute number in
HiveManager, the attribute number must be unique for each user profile that appears in the same
WLAN policy. You can set an attribute number between 1 and 4095. (The default user profile
"default-profile", which cannot be deleted, uses attribute 0.)
In this example, you only associate the user profile to an SSID that authenticates users with a
preshared key, so the attribute number is not used here. It becomes important if you use a remote
RADIUS authentication server for IEEE 802.1X authentication. When replying to a successful user
authentication request, the server returns a set of attributes, and HiveAPs use a combination of
three of them to determine which user profile to assign to traffic from an authenticated user:
Tunnel-Type = GRE (10)
Tunnel-Medium-Type = IP (1)
Tunnel-Private-Group-ID = <number>
If a HiveAP receives all three attributes and the Tunnel-Private-Group-ID matches the attribute of a
user profile, it then applies that user profile to traffic from the authenticated user. Regardless of its
ultimate use in an SSID using a preshared key or 802.1X, the attribute number for a user profile is a
required setting.
Default VLAN: 1
Description: Visiting guests
Manage users for this profile via User Manager: (clear)
2
Note:
You do not have to create a policy to control incoming traffic because you will set the default action to
deny all incoming and outgoing traffic not specified in any of the policy rules.
1. An SSID using a preshared key supports a single user profile. An SSID using 802.1X authentication can support multiple user
profiles.
2. Although not a component in this example, User Manager is an excellent option for guest management. Information about
setting up and managing users through User Manager is available in the HiveManager online Help. You can perform a search for
"User Manager", or navigate through the TOC to Home > Administration > User Manager.
Содержание access point
Страница 1: ...Aerohive Deployment Guide ...
Страница 7: ...HiveAP Compliance Information 6 Aerohive ...
Страница 13: ...Contents 12 Aerohive ...
Страница 37: ...Chapter 2 The HiveAP 20 ag Platform 36 Aerohive ...
Страница 71: ...Chapter 4 The HiveAP 340 Platform 70 Aerohive ...
Страница 81: ...Chapter 5 The HiveAP 320 Platform 80 Aerohive ...
Страница 105: ...Chapter 8 The High Capacity HiveManager Platform 104 Aerohive ...
Страница 123: ...Chapter 10 Using HiveManager 122 Aerohive ...
Страница 209: ...Chapter 14 Deployment Examples CLI 208 Aerohive ...
Страница 217: ...Appenidix A Country Codes 216 Aerohive ...