NXC5500/2500. Application Note. Captive Portal with QR Code. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation

Size: px
Start display at page:

Download "NXC5500/2500. Application Note. Captive Portal with QR Code. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation"

Transcription

1 NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note Captive Portal with QR Code Copyright 2015 ZyXEL Communications Corporation

2 Captive Portal with QR Code What is Captive Portal with QR code? The captive portal is a login page that is displayed when you access the Internet by launching the web browser, which would intercept the network traffic till you enter the privileged account. For example, some companies set the boundary of a captive portal for staff and visitors before they can gain network to access for the Internet via a web browser. To ensure the management of network traffic and security, they need to get a privileged account for passing the captive portal to use the network. In general, new employees have a privileged account after they report in for duty, but visitors need to ask for the privileged account from an employee or administrator. Assuming your company holds a business conference for dozens of customers. How could your company provide instant wireless access service for customers without creating numerous accounts or changing the network configuration? A captive portal with QR code could help you ease this confusion. There is no need for the IT to generate an account for every customer. Instead, he can print a QR code and post it on the entrance of the meeting room or somewhere that customers could easily see it. After customers use the mobile device to scan the QR code, customers could login to the captive portal page automatically without keying account information. In addition, if your company requires more rigid IT security policies e.g. granting guest wireless access service requires employee authentication prior to the access, there is another way for your company to use the QR code. Your company security guard or employee who has registered to authenticate guest wireless access has the privilege to scan the QR code from the login page of captive portal in the customer s device. The captive portal with QR code is a new feature that brings you convenient and fast pass in some scenarios for clients to access the Internet. The NXC provides two authentication mechanisms with QR code for different scenarios. 1

3 Scenario 1: Authenticator - assisted Guest receives a QR code that is authenticated by an authenticator A guest visits the ZyXEL Company and connects to the Guest SSID, but it shows the login page with QR code. The guest does not have the user name and password, so he goes to find an employee who has privilege to authenticate the guest s device to scan his QR code. After employee scan the QR and get the authentication message, then the guest can use Wi-Fi to access the Internet. 2

4 Scenario 2: Self - serviced Guest directly scans QR code to pass the authentication A guest visits the ZyXEL Company and he sees a QR code is posted on the table when he sits on the chair. The QR code notes Welcome to ZyXEL. After the guest connects to the SSID and scans the QR code, he will get the authentication message. Then, he can enjoy Wi-Fi service. 3

5 The Configuration of Captive Portal with QR code Employees are the members of VLAN 10, which can access internet by passing the authentication with enterprise security (802.1X). Guests are the members of VLAN0, which can access the internet by employee authenticating the guest s QR code. Scenario 1: Authenticator - assisted Step 1: Go to Interface > VLAN > Add. Create two VLANs as the DHCP servers, separately VLAN0 and VLAN10. VLAN0 is for guest and VLAN10 is for employee using. Step 2: Go to Zone > Edit. Set VLAN0 and VLAN10 be a LAN, therefore, the member of VLAN10 can access to the member of VLAN1. The employee in the VLAN10 can authenticate guest in the VLAN0. 4

6 Step 3: Create user information for guest and employees to login to the Captive portal. Go to User/Group > User > Add. *The User Type of guest must be guest or user. There are two kinds of configuration for authentication by authenticator (employee) on the NXC and external radius server. Guest information: (No matter authenticator information locates in the NXC or external authentication server e.g. Radius or Active Directory server, guest account must be pre-configured on the NXC) Authenticator(Employee) information on the NXC 5

7 Set a group for employee accounts. Go to User/Group > User > Group > add. Authenticator (Employee) information on the external authentication (Radius) server Add the information of external authentication server. Go to AAA Server > Radius > Add. (Note: Please confirm there is an existing authenticator account on the external authentication server.) 6

8 Step 4: Go to Auth. Method > Add. If the information of authenticator is on the NXC, then select the local authentication for employee s enterprise security. If the information of authenticator is on the external authentication server, then add an authenticated method and select the external authentication server for employee s enterprise security. 7

9 Step 5: Add an IP address range on the VLAN0 for guests that need to login to the captive portal and add the interface subnet of employee on the VLAN10. Go to Address > Address > Add. The IP address range for guest using need to login the captive portal: The interface subnet of employees on the VLAN10: 8

10 Step 6: To prevent guest in the VLAN0 can access to the VLAN10, go to Firewall > Add. Add a firewall rule to deny guest access to the member of VLAN10. Step 7: Go to Captive Portal > Captive Portal > Authentication Policy Summary. Scroll down to the page of the captive portal and select default for Authentication Method, and then add an authentication policy. 9

11 Step 8: Select the IP address range for guests that will be forced to be authenticated by the captive portal. Step 9: Bring up the page of the Captive Portal and enable the captive portal feature, and authentication with the QR code. Select Authenticator - assisted and then apply the configuration. Guest Account Select guest user ID. QR Portal Address Select the VLAN group of authenticator. Authenticator must be able to access the members of VLAN of QR Portal Address for guests; otherwise, the authenticator will be unable to authenticate guests. Authenticator able to authenticate guests. Employees are the authenticators, who can authenticate the guest to access the INTERNET. Hence, QR Portal Address needs to be selected the VLAN10 that is the VLAN of employee, and Authenticator needs to be selected a group of employees who have privilege to authenticate. 10

12 The account information of authenticaor is on the NXC. ZyXEL NXC Application Notes The account information of authenticaor is on the external authenticated server 11

13 Step 10: After AP deployment is ready, add the AP profiles for guest and employee Wi-Fi service. Before setting the SSID, we need to set an enterprise security for employee to use. Go to AP Profile > SSID > Security List > Add. If the information of authenticator is on the NXC, then select default for Auth. Method that is local authentication for employees. 12

14 If the information of authenticator is on the external authentication server, then select the auth. method that is directed to the authentication server for employees. Step 11: Go to AP Profile > SSID > Add. Create two SSID for guests and employees. Set the forwarding mode with Local bridge when the traffic of AP would go through the NXC directly. Set the forwarding mode with Tunnel mode when the traffic of AP might not go through the NXC directly. The tunnel mode setting could force all the traffic to go into the NXC and lead to the Captive portal. The SSID for guests using is named QR_guest with VLAN ID 1 13

15 The SSID for employees using is named QR_employee with VLAN ID 10 and enterprise security. 14

16 Step 12: Create a radio configuration for the AP. Go to AP Profile > Radio > Add. Step 13: Go to AP Management > Mgmt. AP List. Select the SSID to provide Wi-Fi service for guests. 15

17 Step 14: Guest can use a mobile device to connect to the SSID and open the webpage. It would show the page of the captive portal with QR code. Step 15: Find the employee who is able to authenticate guests by scanning the guest s QR code. After scanning the QR code from the guest s device, the employee s mobile device will show the result of the authentication. 16

18 Step 16: Go to Login Users. You can see that the guest has obtained the IP address, as well as who authenticated the guest. Scenario 2: Self serviced For steps 1-8 please refer to the step 1-8 of scenario 1. Step 9: Go to Captive Portal. Enable the captive portal feature and authentication with QR code. Select Self-serviced. You can leave the message in the Note Message and press Print Out, the QR code would be show in the window. QR Portal Address select the VLAN group of guest. * Please note that the IP address you select must be reachable by guest. Note Message Write any information for printing with the QR code. 17

19 Step 10: Publish the QR code and then the guest could use a mobile device to scan the QR code to pass the authentication. Step 11: Go to AP Management > Mgmt. AP List. Select SSID to provide Wi-Fi service for guests. 18

20 Step 12: Scan QR code and the mobile device will show the result of the authentication. Step 13: Go to Login Users. You can see who obtained the IP address by QR code authentication. 19

21 The Flowchart of Authentication of Captive Portal with QR code Scenario 1: Authenticator - assisted The process of scenario 1: 1. Guest connects to the SSID with captive portal authentication. 2. NXC receive the connected request from guest and leads to the page of captive portal with QR code. 3. The employee (authenticator) uses a mobile device with an IP address that has authentication ability to scan the QR code from the guest s device. 4. NXC receives the authentication request. 5. After NXC checks the authenticated request, it would send the authenticated response to the employee s mobile device. 20

22 Scenario 2: Self serviced The process of scenario 2: 1. The employee (authenticator) produces the QR code for guests. 2. Guest connects the SSID with captive portal authentication. 3. Guest scans the QR code, which is published from the authenticator. 4. NXC receives the authenticated request from guest. 5. After NXC checks the authenticated request, it would send the authenticated response to the guest s mobile device. 21

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

WiNG5 CAPTIVE PORTAL DESIGN GUIDE WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated

More information

Case Study - Configuration between NXC2500 and LDAP Server

Case Study - Configuration between NXC2500 and LDAP Server Case Study - Configuration between NXC2500 and LDAP Server 1 1. Scenario:... 3 2. Topology:... 4 3. Step-by-step Configurations:...4 a. Configure NXC2500:...4 b. Configure LDAP setting on NXC2500:...10

More information

WiNG 5.X How-To Guide

WiNG 5.X How-To Guide WiNG 5.X How-To Guide Captive Portals Part No. TME-12-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC

More information

How to Configure a BYOD Environment with the DWS-4026

How to Configure a BYOD Environment with the DWS-4026 Configuration Guide How to Configure a BYOD Environment with the DWS-4026 (MAC Authentication + Captive Portal) Overview This guide describes how to configure and implement BYOD environment with the D-Link

More information

Microsoft Lync Certification Configuration Guide for WiNG 5.5

Microsoft Lync Certification Configuration Guide for WiNG 5.5 Microsoft Lync Certification Configuration Guide for WiNG 5.5 December 2013 Revision 1 MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark

More information

NXC5500/2500. Application Note. Smart Classroom Load Balancing. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation

NXC5500/2500. Application Note. Smart Classroom Load Balancing. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note Smart Classroom Load Balancing Copyright 2015 ZyXEL Communications Corporation Smart Classroom Load Balancing For wireless access service,

More information

DIGIPASS Authentication for Cisco ASA 5500 Series

DIGIPASS Authentication for Cisco ASA 5500 Series DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations

More information

How to Configure Guest Management on the DWC-1000

How to Configure Guest Management on the DWC-1000 Configuration Guide How to Configure Guest Management on the DWC-1000 Overview This guide describes how to configure and customize a billing profile and generate temporary user account on the D-Link DWC-1000

More information

UAG Series. Application Note. Unified Access Gateway. Version 4.00 Edition 1, 04/2014. Copyright 2014 ZyXEL Communications Corporation

UAG Series. Application Note. Unified Access Gateway. Version 4.00 Edition 1, 04/2014. Copyright 2014 ZyXEL Communications Corporation UAG Series Unified Access Gateway Version 4.00 Edition 1, 04/2014 Application Note Copyright 2014 ZyXEL Communications Corporation Table of Contents Scenario 1 How to Activate a Paid Access Hotspot...

More information

UAG4100 Support Notes

UAG4100 Support Notes 2013 UAG4100 Support Notes CSO ZyXEL 2013/07/29 Table of Contents Scenario 1 Activate a Paid Access Hotspot... 2 Print ticket to access the Internet... 3 Pay with PayPal payment service to access the Internet...

More information

ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note

ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE Technical Note Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba the

More information

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management Problem: The employees of a global enterprise often need to telework. When a sales representative

More information

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 ( UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet

More information

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your

More information

How To - Implement Clientless Single Sign On Authentication with Active Directory

How To - Implement Clientless Single Sign On Authentication with Active Directory How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:

More information

Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security

Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security Secure WiFi Access in Schools and Educational Institutions WPA2 / 802.1X and Captive Portal based Access Security Cloudessa, Inc. Palo Alto, CA July 2013 Overview The accelerated use of technology in the

More information

The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments

The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments Centralized WLAN management and auto provisioning Manages up to 0 APs with granular access control Advanced RF management

More information

On-boarding and Provisioning with Cisco Identity Services Engine

On-boarding and Provisioning with Cisco Identity Services Engine On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID

More information

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0 How to set up the HotSpot module with SmartConnect Panda GateDefender 5.0 Content Introduction... 3 Minimum requirements to enable the hotspot module... 4 Hotspot settings... 6 General settings....6 Configuring

More information

Web Authentication Proxy on a Wireless LAN Controller Configuration Example

Web Authentication Proxy on a Wireless LAN Controller Configuration Example Web Authentication Proxy on a Wireless LAN Controller Configuration Example Document ID: 113151 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Proxy on

More information

The All-in-One, Intelligent NXC Controller

The All-in-One, Intelligent NXC Controller The All-in-One, Intelligent NXC Controller Centralized management for up to 24 APs ZyXEL Wireless Optimizer for easily planning, deployment and maintenance AP auto discovery and auto provisioning Visualized

More information

The All-in-One, Intelligent WLAN Controller

The All-in-One, Intelligent WLAN Controller The All-in-One, Intelligent WLAN Controller Centralized management for up to 64* APs ZyMESH mitigates complex, inconvenient cabling Wi-Fi deployments Client steering enhances efficiency of wireless spectrum

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

The All-in-One, Intelligent WLAN Controller

The All-in-One, Intelligent WLAN Controller The All-in-One, Intelligent WLAN Controller Centralized management for up to 64* APs mitigates complex, inconvenient cabling Wi-Fi deployments Comprehensive features for WLAN performance optimization and

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased

More information

Extending the range of a wireless network by using mesh topology

Extending the range of a wireless network by using mesh topology Extending the range of a wireless network by using mesh topology This example demonstrates how to configure a FortiGate and two FortiAP wireless access point units to extend the reach and availability

More information

D-Link Central WiFiManager Configuration Guide

D-Link Central WiFiManager Configuration Guide Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install

More information

Security Awareness. Wireless Network Security

Security Awareness. Wireless Network Security Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition

More information

D-Link DAP-1360 Repeater Mode Configuration

D-Link DAP-1360 Repeater Mode Configuration D-Link DAP-1360 Repeater Mode Configuration Outline 1. Package Contents 2. System Requirements 3. Hardware Overview Connections LED s WPS LED/Button 4. Default Settings 5. Configuring your LAN Adapter

More information

RAP Installation - Updated

RAP Installation - Updated RAP Installation - Updated August 01, 2012 Aruba Controller Release 6.1.3.2 The Controller has several wizards that can guide you through a variety of configuration processes. On the Configuration tab

More information

How to configure your Thomson SpeedTouch 780WL for ADSL2+

How to configure your Thomson SpeedTouch 780WL for ADSL2+ How to configure your Thomson SpeedTouch 780WL for ADSL2+ Connecting up your router This guide assumes that you have successfully: unpacked your router connected it up to your phone socket using the DSL

More information

Custom Integration Solutions

Custom Integration Solutions Welcome to this introduction into a true business class network solution for you and your clients This solution has been designed, by integrators, for integrators. We look forward to producing an ever

More information

Penn State Wireless 2.0 and Related Services for Network Administrators

Penn State Wireless 2.0 and Related Services for Network Administrators The following document provides details about the operation and configuration parameters for Penn State Wireless 2.0 and Visitor Wireless. It is intended for Penn State network administrators who are considering

More information

Deploy and Manage a Highly Scalable, Worry-Free WLAN

Deploy and Manage a Highly Scalable, Worry-Free WLAN Deploy and Manage a Highly Scalable, Worry-Free WLAN Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control simplifies complex, inconvenient cabling Wi-Fi

More information

Intelligent WLAN Controller with Advanced Functions

Intelligent WLAN Controller with Advanced Functions Intelligent WLAN Controller with Advanced Functions Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control ZyMESH simplifies complex, inconvenient cabling

More information

Lab 8.4.5.1 Configuring LEAP/EAP using Local RADIUS Authentication

Lab 8.4.5.1 Configuring LEAP/EAP using Local RADIUS Authentication Lab 8.4.5.1 Configuring LEAP/EAP using Local RADIUS Authentication Objective Topology Estimated Time: 40 minutes Number of Team Members: Students can work in teams of two. In this lab, the student will

More information

Palo Alto Networks User-ID Services. Unified Visitor Management

Palo Alto Networks User-ID Services. Unified Visitor Management Palo Alto Networks User-ID Services Unified Visitor Management Copyright 2011 Aruba Networks, Inc. Aruba Networks trademarks include Airwave, Aruba Networks, Aruba Wireless Networks, the registered Aruba

More information

Aruba Aruba Certification ACMP-6.4 test questions and answers :http://www.it-tests.com/ACMP-6.4.html

Aruba Aruba Certification ACMP-6.4 test questions and answers :http://www.it-tests.com/ACMP-6.4.html IT-TESTs.com IT Certification Guaranteed, The Easy Way! \ http://www.it-tests.com We offer free update service for one year Exam : ACMP-6.4 Title : Aruba Certified Mobility Professional 6.4 Vendor : Aruba

More information

8 Steps for Network Security Protection

8 Steps for Network Security Protection 8 Steps for Network Security Protection cognoscape.com 8 Steps for Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because

More information

8 Steps For Network Security Protection

8 Steps For Network Security Protection 8 Steps For Network Security Protection 8 Steps For Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because of their

More information

Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN

Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Copyright 2005, Meru Networks, Inc. This document is an unpublished work protected by the United States copyright laws and

More information

Configuring Global Protect SSL VPN with a user-defined port

Configuring Global Protect SSL VPN with a user-defined port Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be Global Protect SSL VPN Overview This document gives you an overview on how to configure

More information

Connecting an Android to a FortiGate with SSL VPN

Connecting an Android to a FortiGate with SSL VPN Connecting an Android to a FortiGate with SSL VPN This recipe describes how to provide a group of remote Android users with secure, encrypted access to the network using FortiClient and SSL VPN. You must

More information

D-View 7 Network Management System

D-View 7 Network Management System Product Highlights Comprehensive Management Manage your network effectively with useful tools and features such as Batch Configuration, SNMP, and Flexible command Line Dispatch Hassle-Free Network Management

More information

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents TECHNICAL WHITEPAPER Author: Tom Kistner, Chief Software Architect Last update: 18. Dez 2014 Table of Contents Introduction... 2 Terminology... 2 Basic Concepts... 2 Appliances... 3 Hardware...3 Software...3

More information

Mikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server

Mikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server Mikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server 2012 Aradial This document contains proprietary and confidential information of Aradial and Spotngo and shall not be reproduced

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Application Notes for Configuring Enterasys Wireless Access Point 3000 (RBT3K-AG) to Support Avaya IP Office, Avaya IP Wireless Telephones and Avaya Phone Manager

More information

Virtuelle WLAN Controller Alcatel Lucent Wireless LAN Instant AP

Virtuelle WLAN Controller Alcatel Lucent Wireless LAN Instant AP Virtuelle WLAN Alcatel Lucent Wireless LAN Instant AP S. 1 Alcatel Lucent Instant Technology Over-the-air provisioning: Industry only wireless over the air WLAN setup Wizard driven setup: 5 minute WLAN

More information

Cisco TrustSec How-To Guide: Guest Services

Cisco TrustSec How-To Guide: Guest Services Cisco TrustSec How-To Guide: Guest Services For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...

More information

NXC5200/ NWA5000-N Series Wireless LAN Controller/ 802.11 a/b/g/n Managed Access Point

NXC5200/ NWA5000-N Series Wireless LAN Controller/ 802.11 a/b/g/n Managed Access Point Higherbandwidth, higher density with full range of 802.11n s (NWA5000N Series) Comprehensive guest network management with auto guest account generator and Web authentication support Manage up to 240 APs

More information

NETGEAR /ValuePoint Networks Interoperability Report

NETGEAR /ValuePoint Networks Interoperability Report NETGEAR /ValuePoint Networks Interoperability Report Delivering a Personalized Wireless Experience to Hotel Guests application notes Table of Contents Introduction... 3 HOW TO DEPLOY THE JOINT SOLUTION...

More information

WLAN Information Security Best Practice Document

WLAN Information Security Best Practice Document WLAN Information Security Best Practice Document Produced by FUNET led working group on wireless systems and mobility (MobileFunet) (WLAN security) Author: Wenche Backman Contributors: Ville Mattila/CSC

More information

Web Authentication Application Note

Web Authentication Application Note What is Web Authentication? Web Authentication Application Note Web authentication is a Layer 3 security feature that causes the router to not allow IP traffic (except DHCP-related packets) from a particular

More information

10/2011 - English Edition 1. Quick Start Guide. NWA1100N-CE CloudEnabled Business N Wireless Access Point

10/2011 - English Edition 1. Quick Start Guide. NWA1100N-CE CloudEnabled Business N Wireless Access Point 10/2011 - English Edition 1 Quick Start Guide NWA1100N-CE CloudEnabled Business N Wireless Access Point Package Contents - 1 x ZyXEL NWA1100N-CE Access Point - 2 x Detachable Antennas - 1 x Power Adapter

More information

Developing Network Security Strategies

Developing Network Security Strategies NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network

More information

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and

More information

Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation

Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation This document describes the steps to undertake in configuring a Layer 2/Layer 3 switch (in this document a FMS7382S

More information

Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Role-Based Firewall. June 2011 Revision 1.0

Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Role-Based Firewall. June 2011 Revision 1.0 Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG 5 How-To Guide Role-Based Firewall June 2011 Revision 1.0 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark

More information

Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller

Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller August 2006 Contents Overview section on page 1 Configuring Guest Access on the Cisco Wireless LAN Controller section on page

More information

Ruckus Wireless ZoneDirector Command Line Interface

Ruckus Wireless ZoneDirector Command Line Interface Ruckus Wireless ZoneDirector Command Line Interface Reference Guide Part Number 800-70258-001 Published September 2010 www.ruckuswireless.com Contents About This Guide Document Conventions................................................

More information

Particularities of security design for wireless networks in small and medium business (SMB)

Particularities of security design for wireless networks in small and medium business (SMB) Revista Informatica Economică, nr. 4 (44)/2007 93 Particularities of security design for wireless networks in small and medium business (SMB) Nicolae TOMAI, Cluj-Napoca, Romania, tomai@econ.ubbcluj.ro

More information

FAQs: MATRIX NAVAN CNX200. Q: How to configure port triggering?

FAQs: MATRIX NAVAN CNX200. Q: How to configure port triggering? FAQs: MATRIX NAVAN CNX200 Q: How to configure port triggering? Port triggering is a type of port forwarding where outbound traffic on predetermined ports sends inbound traffic to specific incoming ports.

More information

NXC Series. User s Guide. Quick Start Guide. Wireless LAN Controller. Default Login Details. Version 4.10 Edition 1, 01/2014

NXC Series. User s Guide. Quick Start Guide. Wireless LAN Controller. Default Login Details. Version 4.10 Edition 1, 01/2014 NXC Series Wireless LAN Controller Version 4.10 Edition 1, 01/2014 Quick Start Guide User s Guide Default Login Details IP Address https://192.168.1.1 User Name admin Passwordwww.zyxel.com 1234 Copyright

More information

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer

More information

WLAN Outdoor CPE For 2.4G. Quick Installation Guide

WLAN Outdoor CPE For 2.4G. Quick Installation Guide WLAN Outdoor CPE For 2.4G Quick Installation Guide Part I: External Installation Direction A. Check the parts in your box CPE SET 1 DC 12V/1.5A Power Adapter 1 PoE DC Injector 1 Hose Clamps 2 Manual &

More information

Configuring User Identification via Active Directory

Configuring User Identification via Active Directory Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be User Identification Overview User Identification allows you to create security policies based

More information

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia

More information

State of Kansas. Interim Wireless Local Area Networks Security and Technical Architecture

State of Kansas. Interim Wireless Local Area Networks Security and Technical Architecture State of Kansas Interim Wireless Local Area Networks Security and Technical Architecture October 6, 2005 Prepared for Wireless Policy Committee Prepared by Revision Log DATE Version Change Description

More information

Training Module for Customer Portal & Customer Care. Enabling the Next Wave of Connectivity

Training Module for Customer Portal & Customer Care. Enabling the Next Wave of Connectivity Training Module for Customer Portal & Customer Care Customer Portal Interface used by the registered end user to interact with the network End user can modify Information, change Password & check the account,billing

More information

Design and Implementation Guide. Apple iphone Compatibility

Design and Implementation Guide. Apple iphone Compatibility Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new

More information

NWA1120 Series. User s Guide. Quick Start Guide. Wireless LAN Ceiling Mountable PoE Access Point. Default Login Details

NWA1120 Series. User s Guide. Quick Start Guide. Wireless LAN Ceiling Mountable PoE Access Point. Default Login Details NWA1120 Series Wireless LAN Ceiling Mountable PoE Access Point Version 1.00 Edition 1, 08/2012 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 User Name admin Passwordwww.zyxel.com

More information

Dramatically simplifying voice and data networking HOW-TO GUIDE. Bundle Quick Start Guide

Dramatically simplifying voice and data networking HOW-TO GUIDE. Bundle Quick Start Guide Dramatically simplifying voice and data networking HOW-TO GUIDE Bundle Quick Start Guide 2 edgebox How-To Guide - Table of Contents Scope of the Quick-Start Guide...3 edgebox bundles...3

More information

Securing Wireless LANs with LDAP

Securing Wireless LANs with LDAP A P P L I C A T I O N N O T E Securing Wireless LANs with LDAP Many organizations have standardized on LDAP (Lightweight Directory Access Protocol) servers as a repository for their users and related security

More information

TrustSec How-To Guide: On-boarding and Provisioning

TrustSec How-To Guide: On-boarding and Provisioning TrustSec How-To Guide: On-boarding and Provisioning For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...

More information

The ECU Wireless system uses a captive portal authentication system. There are three steps to configure your computer for wireless access:

The ECU Wireless system uses a captive portal authentication system. There are three steps to configure your computer for wireless access: ECU WIRELESS SETUP The ECU Wireless system uses a captive portal authentication system. There are three steps to configure your computer for wireless access: 1. Install a wireless network card into your

More information

DSA-1000 / PRT-1000 Device Server / Thermal Printer

DSA-1000 / PRT-1000 Device Server / Thermal Printer LevelOne DSA-1000 / PRT-1000 Device Server / Thermal Printer User Manual V2.0 TABLE OF CONTENTS 1. INTRODUCTION...- 3-2. DEVICE OVERVIEW...- 7-3. HARDWARE SETUP...- 10-4. SYSTEM CONFIGURATION...- 12 -,

More information

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Hosting more than one FortiOS instance on. VLANs. 1. Network topology Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of

More information

NXC2500. User s Guide. Quick Start Guide. Wireless LAN Controller. Default Login Details. Version 4.00 Edition 1, 05/2013

NXC2500. User s Guide. Quick Start Guide. Wireless LAN Controller. Default Login Details. Version 4.00 Edition 1, 05/2013 NXC2500 Wireless LAN Controller Version 4.00 Edition 1, 05/2013 Quick Start Guide User s Guide Default Login Details IP Address https://192.168.1.1 User Name admin Passwordwww.zyxel.com 1234 Copyright

More information

V310 Support Note Version 1.0 November, 2011

V310 Support Note Version 1.0 November, 2011 1 V310 Support Note Version 1.0 November, 2011 2 Index How to Register V310 to Your SIP server... 3 Register Your V310 through Auto-Provision... 4 Phone Book and Firmware Upgrade... 5 Auto Upgrade... 6

More information

Scenario: Remote-Access VPN Configuration

Scenario: Remote-Access VPN Configuration CHAPTER 7 Scenario: Remote-Access VPN Configuration A remote-access Virtual Private Network (VPN) enables you to provide secure access to off-site users. ASDM enables you to configure the adaptive security

More information

Chapters. Prerequisites: Eduroam in a Microsoft Windows 2008r2 environment.

Chapters. Prerequisites: Eduroam in a Microsoft Windows 2008r2 environment. Eduroam in a Microsoft Windows 2008r2 environment. This guide will help with the deployment of eduroam in a Microsoft Windows 2008r2 only environment. We will briefly note the prerequisites for a successful

More information

Network/VPN Overlap How-To with SonicOS 2.0 Enhanced Updated 9/26/03 SonicWALL,Inc.

Network/VPN Overlap How-To with SonicOS 2.0 Enhanced Updated 9/26/03 SonicWALL,Inc. Network/VPN Overlap How-To with SonicOS 2.0 Enhanced Updated 9/26/03 SonicWALL,Inc. Introduction In this whitepaper, we will configure a VPN tunnel between two SonicWALLs running SonicOS 2.0 Enhanced that

More information

WiFi-SB-L3 300M WiFi Router WiFi Bridge WiFi Repeater. WiFi Router WiFi Repeater WiFi Bridge WiFi-SB-L3 Quick Setting Guide

WiFi-SB-L3 300M WiFi Router WiFi Bridge WiFi Repeater. WiFi Router WiFi Repeater WiFi Bridge WiFi-SB-L3 Quick Setting Guide 300M WiFi Router WiFi Repeater WiFi Bridge WiFi-SB-L3 Quick Setting Guide 1 Chapter 1 Router Mode Quick Setup Guide 1. Let WiFi-SB-L3 be powered on. 2.Turn on wireless network connection, disabled local

More information

Implementing PCoIP Proxy as a Security Server/Access Point Alternative

Implementing PCoIP Proxy as a Security Server/Access Point Alternative Implementing PCoIP Proxy as a Security Server/Access Point Alternative Overview VMware s Horizon Security Server and Access Point provides secure access to sessions over an unsecured WAN and/or Internet

More information

Initial Access and Basic IPv4 Internet Configuration

Initial Access and Basic IPv4 Internet Configuration Initial Access and Basic IPv4 Internet Configuration This quick start guide provides initial and basic Internet (WAN) configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N

More information

DSL-2600U. User Manual V 1.0

DSL-2600U. User Manual V 1.0 DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS

More information

User Guide. Cloud Gateway Software Device

User Guide. Cloud Gateway Software Device User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software).

More information

Application Note Secure Enterprise Guest Access August 2004

Application Note Secure Enterprise Guest Access August 2004 Application Note Secure Enterprise Guest Access August 2004 Introduction More and more enterprises recognize the need to provide easy, hassle-free high speed internet access to people visiting their offices,

More information

How To Configure SSL VPN in Cyberoam

How To Configure SSL VPN in Cyberoam How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,

More information

VPN Configuration Guide. ZyWALL USG Series / ZyWALL 1050

VPN Configuration Guide. ZyWALL USG Series / ZyWALL 1050 VPN Configuration Guide ZyWALL USG Series / ZyWALL 1050 2011 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this configuration guide may not be copied, in whole or in part,

More information

Lucent VPN Firewall Security in 802.11x Wireless Networks

Lucent VPN Firewall Security in 802.11x Wireless Networks Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper

More information

Designing scalable wireless networks in the campus LAN

Designing scalable wireless networks in the campus LAN Designing scalable wireless networks in the campus LAN Sebastian Büttrich, wire.less.dk/nsrc edit: March 2010, KENET http://creativecommons.org/licenses/by-nc-sa/3.0/ Agenda Introduction to wireless networking

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

How to Configure Captive Portal

How to Configure Captive Portal How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,

More information

Application Note User Groups

Application Note User Groups Application Note User Groups Application Note User Groups Table of Contents Background... 3 Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 6 Configuration...

More information

Quick Installation Guide For Mac users

Quick Installation Guide For Mac users Quick Installation Guide For Mac users Packing List 1) IP CAMERA X 1 2) Wi-Fi Antenna (only available for wireless model) 3) DC Power Supply X 1 4) Network Cable X 1 5) Mounting bracket 1 6) CD X 1 (Include

More information

APPENDIX 3 LOT 3: WIRELESS NETWORK

APPENDIX 3 LOT 3: WIRELESS NETWORK APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop

More information

Quick Installation Guide

Quick Installation Guide Packing List Quick Installation Guide Quick Installation Guide 1) IP CAMERA X 1 2) Wi-Fi Antenna (only available for wireless model) 3) DC Power Supply X 1 4) Network Cable X 1 5) Mounting bracket 1 6)

More information

Configuring Routers and Their Settings

Configuring Routers and Their Settings Configuring Routers and Their Settings When installing a router on your home network the routers settings are usually defaulted to automatically protect your home, and simplify setup. This is done because

More information

P-660HN-51. 802.11n Wireless ADSL2+ 4-port Gateway DEFAULT LOGIN DETAILS. Firmware Version 1.10 Edition 1, 9/2010. IP Address: http://192.168.1.

P-660HN-51. 802.11n Wireless ADSL2+ 4-port Gateway DEFAULT LOGIN DETAILS. Firmware Version 1.10 Edition 1, 9/2010. IP Address: http://192.168.1. P-660HN-51 802.11n Wireless ADSL2+ 4-port Gateway Firmware Version 1.10 Edition 1, 9/2010 DEFAULT LOGIN DETAILS IP Address: http://192.168.1.1 User Name: admin Password: 1234 www.zyxel.com Copyright 2010

More information