Legal Disclaimer: The resource assets in this website may include abbreviated and/or legacy terminology for HPE Aruba Networking products. See www.arubanetworks.com for current and complete HPE Aruba Networking product lines and names.
Configuring Wired Networks for Guest Users on IAPs
The captive portal solution for an IAP cluster consists of the following:
- The captive portal web login page hosted by an internal or external server.
- The RADIUS Remote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources. authentication or user authentication against internal database of the AP.
- The SSID Service Set Identifier. SSID is a name given to a WLAN and is used by the client to access a WLAN network. broadcast by the IAP.
The IAP administrators can create a wired or WLAN Wireless Local Area Network. WLAN is a 802.11 standards-based LAN that the users access through a wireless connection. guest network based on captive portal authentication for guests, visitors, contractors, and any non-employee users who can use the enterprise Wi-Fi network. Administrators can also create guest accounts and customize the captive portal page with organization-specific logo, terms, and usage policy. With captive portal authentication and guest profiles, the devices associating with the guest SSID are assigned an initial role and are assigned IP addresses. When a guest user tries to access a URL Uniform Resource Locator. URL is a global address used for locating web resources on the Internet. through HTTP Hypertext Transfer Protocol. The HTTP is an application protocol to transfer data over the web. The HTTP protocol defines how messages are formatted and transmitted, and the actions that the w servers and browsers should take in response to various commands. or HTTPS Hypertext Transfer Protocol Secure. HTTPS is a variant of the HTTP that adds a layer of security on the data in transit through a secure socket layer or transport layer security protocol connection., the captive portal webpage prompts the user to authenticate with a user name and password.
Splash Page Profiles
IAPs support the following types of splash page profiles:
- —Select this splash page to use an internal server for hosting the captive portal service. Internal captive portal supports the following types of authentication:
- —When is enabled, a guest user who is pre-provisioned in the user database has to provide the authentication details.
- —When is enabled, a guest user has to accept the terms and conditions to access the Internet.
- —Select this splash page to use an external portal on the cloud or on a server outside the enterprise network for authentication.
Creating a Wired Network Profile for Guest Users
To create a wired SSID for guest access, complete the following steps:
- In the WebUI, set the filter to a group containing at least one AP.
The dashboard context for the group is displayed.
- Under , click > .
A list of APs is displayed in the view.
- Click the icon.
The tabs to configure the APs are displayed.
- Click .
- Click the tab.
The Interfaces page is displayed.
- Click the accordion.
-
To create a new wired SSID profile, click .
The pane is displayed.
- Under , enter the following information:
- —Enter a name.
- —Select port(s) form the drop-down list.
- Click Next to configure the settings.
- In the tab, select a type of mode from the drop-down list.
- Select any of the following options for :
|
Parameter |
Description |
|---|---|
|
|
Select this option to allow the Virtual Controller to assign IP addresses to the wired clients. When the Virtual Controller assignment is used, the source IP address is translated for all client traffic that goes through this interface. The Virtual Controller can also assign a guest VLAN to a wired client. If this option is selected, specify any of the following options in :
|
|
|
Select this option to allow the clients to receive an IP address from the network to which the Virtual Controller is connected. On selecting this option, the button to create a VLAN is displayed. Create a new VLAN if required. |
Configuring an Internal Captive Portal Splash Page Profile
To configure internal captive portal profile, complete the following steps:
- In the Security page, set the button on the Security Level sliding bar to Visitors and configure the following parameters:
Table 2: Internal Captive Portal Configuration Parameters
Parameter
Description
Select any of the following from the drop-down list:
- Internal Captive Portal—When is selected, the guest users are required to authenticate in the captive portal page to access the Internet. The guest users who are required to authenticate must already be added to the user database. The guest users is then required to accept the terms and conditions to access the Internet.
- —When this option is selected, the guest users are required to enter the proxy server details such as IP address and captive portal proxy server port details. Also enter the details in , and section.
Select or from the drop-down list.
Customize Captive Portal
:
for which you are customizing the splash page design.
- —Enter a title for the banner. To preview the page with the new banner title, click .
- —Specify a background color for the header.
- —To change the welcome text, click the first square box in the splash page, enter the required text in the Welcome Text box, and click OK. Ensure that the welcome text does not exceed 127 characters.
- —To change the color of the splash page, click the Splash page rectangle and select the required color from the color palette.
- —To redirect users to another URL, specify a URL in .
- —To upload a custom logo, click Choose File, browse the image file, and click . Ensure that the image file size does not exceed 16 KB. To delete an image, click .
To preview the captive portal page, click splash page.
Primary Server
Select the server type from the drop-down list.
Create and manage users in the captive portal network. Only registered users of type will be able to access this network. Click Manage Users to view the existing usernames and user type. Click + Add User to add a new user. Enter the required field and select the user type as guest or employee from Type drop-down list.
>
To enable MAC Media Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. address based authentication for and security levels, turn on the toggle switch.
>
Select one of the following options:
- —Uses the VC ID as the called station ID.
- —Uses the host name of the IAP as the called station ID.
- —Uses the VLAN ID of as the called station ID.
- —Uses the IP address of the IAP as the called station ID.
- —Uses the MAC address of the IAP as the called station ID.
The detail can be configured even if the is set to disabled.
>
Set the toggle button to enable, to configure client IP address as calling station ID.
>
Specify a value for Reauth Interval. When set to a value greater than zero, APs periodically re-authenticate all associated and authenticated clients.
> Walled Garden >
To exclude uplink, select an uplink type.
- Click .
Configuring an External Captive Portal Splash Page Profile
You can configure external captive portal profiles and associate these profiles to a user role or SSID. You can create a set of captive portal profiles in the > data pane and associate these profiles with an SSID or a wired profile. You can also create a new captive portal profile under the tab of the WLAN wizard or a Wired Network pane. You can configure up to eight external captive portal profiles.
When the captive portal profile is associated to an SSID, it is used before user authentication. If the profile is associated to a role, it is used only after the user authentication. When a captive portal profile is applied to an SSID or wired profile, the users connecting to the SSID or wired network are assigned a role with the captive portal rule. The guest user role allows only DNS Domain Name System. A DNS server functions as a phone book for the intranet and Internet users. It converts human-readable computer host names into IP addresses and IP addresses into host names. It stores several records for a domain name such as an address 'A' record, name server (NS), and mail exchanger (MX) records. The Address 'A' record is the most important record that is stored in a DNS server, because it provides the required IP address for a network peripheral or element. and DHCP Dynamic Host Configuration Protocol. A network protocol that enables a server to automatically assign an IP address to an IP-enabled device from a defined range of numbers configured for a given network. traffic between the client and network, and directs all HTTP or HTTPS requests to the captive portal unless explicitly permitted.
To configure an external captive portal profile, complete the following steps:
- In the Security page, set the button on the Security Level sliding bar to Visitors and configure the following parameters:
- Click .
- Specify the following authentication parameters in :
- —To enable MAC address based authentication for persona and open security levels, turn on the toggle switch.
- —Sets a primary authentication server.
- To use an internal server, select and add the clients that are required to authenticate with the internal RADIUS Server. Click Users to add the users.
- To add a new server, click . For information on configuring external servers, see Configuring External Authentication Servers for IAPs.
- —To add another server for authentication, configure another authentication server.
- If required, under , create a list of domains that are denylisted and also an allowlist of websites that the users connected to this splash page profile can access.
- To exclude uplink, select an uplink type.
- Configure the . Specify a value for Reauth Interval. When set to a value greater than zero, IAPs periodically re-authenticate all associated and authenticated clients.
- If required, enable denylisting. Set a threshold for denylisting clients based on the number of failed authentication attempts.
- Click .
The Access page is displayed.
Configuring ACLs for Guest User Access
To configure access rules for a guest network, complete the following steps:
- Under , select any of the following types of access control:
- Role Based—Select Role Based on the sliding bar to enable access based on user roles. For role-based access control, complete the following steps:
- Create a user role:
- Click in the pane.
- Enter a name for the new role and click .
- Create access rules for a specific user role:
- Click and select appropriate options for , , , , and fields.
- Click OK.
- Create a role assignment rule:
- Under , click + Add Role Assignment. The pane is displayed.
- Select appropriate options in , , , and fields.
- Click .
- Network Based—Select Network Based on the sliding bar to set common rules for all users in a network. By default, Allow any to all destinations access rule is enabled. This rule allows traffic to all destinations. To define an access rule, complete the following steps:
- Click and select appropriate options for , , , , and fields
- Click OK.
- Unrestricted—Select this to set unrestricted access to the network.
- Role Based—Select Role Based on the sliding bar to enable access based on user roles. For role-based access control, complete the following steps:
- For all the access control types, you can enable Downloadable Role. Downloadable roles can only function when radius server is configured for the selected wired profile. For more information, see Configuring Downloadable Roles.
- Select Assign Pre-Authentication Role and select the role that you want to assign from the drop-down list.
- Select Enforce Machine Authentication to specify authentication type for the assigned role.
- Select Enforce Mac Auth Only Role to enforce mac authentication for the assigned role.
- Click Next.
The Summary page is displayed.
Viewing Wired Port Profile Summary
In the tab, the page displays all the settings configured in the , , , and tabs. Click Finishto complete the network profile creation.
