
136136 | Authentication
Dell PowerConnect W-Series Aruba Instant 6.2.1.0-3.3 | User Guide
a. Select any of the following from the Splash page type drop-down list.
l Internal - Authenticated
l Internal - Acknowledged
b. Select Enabled from the WISPr drop-down list to enable the WISPr authentication for Internal
Authenticated splash page. For more information on WISPr authentication, see Configuring WISPr
Authentication on page 146.
c. Select Enabled from the MAC authentication drop-down list to enable the MAC authentication. For
information on MAC authentication, see Configuring MAC Authentication for a Network Profile on page 132.
d. Select any of the following from the Auth server 1drop-down list:
l Select a server from the list of servers if the server is already configured.
l Select Internal Server to authenticate user credentials at run time.
l Select New for configuring an new external RADIUSserver for authentication. For more information on
configuring external radius server, see Configuring an External Server for Authentication on page 124.
e. Select a value for Reauth interval to allow APs to periodically reauthenticate all associated and
authenticated clients.
f. Select an accounting mode from Accounting mode for posting accounting information at the specified
Accounting interval. You can select either Authentication or Association mode. When the accounting
mode is set to Authentication, the accounting starts only after client authentication is successful and stops
when the client logs out of the network. If the Accounting mode is set to Association, the accounting starts
when the client associates to the network successfully and stops when the client is disconnected.
g. Select Enabled from Blacklisting drop-down list to enable blacklisting of the clients with a specific number of
authentication failures. Specify a value for Max authentication failures to indicate the maximum number of
authentication failures dynamic blacklisting of users who fail to authenticate the number of times specified.
h. If Internal Server is selected as an authentication server, under Internal server, click the User link to add
users for internal authentication. For more information about adding a user, see Configuring Users on page
129.
i. To exclude uplink, select an uplink type under Disable if uplink type is.
4. Configure the required encryption parameters.
5. Click Next to configure access rules, and then click Finish to apply the changes.
In the CLI
To configure internal captive portal with WISPr authentication enabled:
(Instant Access Point)(config)# wlan ssid-profile <profile-name>
(Instant Access Point)(SSID Profile <name>)# essid <ESSID-name>
(Instant Access Point)(SSID Profile <name>)# type <Guest>
(Instant Access Point)(SSID Profile <name>)# captive-portal <internal-authenticated> exclude-
uplink {3G|4G|Wifi|Ethernet}
(Instant Access Point)(SSID Profile <name>)# wispr
(Instant Access Point)(SSID Profile <name>)# blacklist
(Instant Access Point)(SSID Profile <name>)# max-authentication-failures <number>
(Instant Access Point)(SSID Profile <name>)# auth-server <server-name>
(Instant Access Point)(SSID Profile <name>)# wpa-passphrase <WPA_key>
(Instant Access Point)(SSID Profile <name>)# radius-accounting
(Instant Access Point)(SSID Profile <name>)# radius-interim-accounting-interval
(Instant Access Point)(SSID Profile <name>)# radius-accounting-mode {user-association|user-
authentication}
(Instant Access Point)(SSID Profile <name>)# end
(Instant Access Point)(SSID Profile <name>)# commit apply
Comentarios a estos manuales