NXC5500/2500. Application Note. Captive Portal with QR Code. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation
|
|
- Lambert Richard
- 8 years ago
- Views:
Transcription
1 NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note Captive Portal with QR Code Copyright 2015 ZyXEL Communications Corporation
2 Captive Portal with QR Code What is Captive Portal with QR code? The captive portal is a login page that is displayed when you access the Internet by launching the web browser, which would intercept the network traffic till you enter the privileged account. For example, some companies set the boundary of a captive portal for staff and visitors before they can gain network to access for the Internet via a web browser. To ensure the management of network traffic and security, they need to get a privileged account for passing the captive portal to use the network. In general, new employees have a privileged account after they report in for duty, but visitors need to ask for the privileged account from an employee or administrator. Assuming your company holds a business conference for dozens of customers. How could your company provide instant wireless access service for customers without creating numerous accounts or changing the network configuration? A captive portal with QR code could help you ease this confusion. There is no need for the IT to generate an account for every customer. Instead, he can print a QR code and post it on the entrance of the meeting room or somewhere that customers could easily see it. After customers use the mobile device to scan the QR code, customers could login to the captive portal page automatically without keying account information. In addition, if your company requires more rigid IT security policies e.g. granting guest wireless access service requires employee authentication prior to the access, there is another way for your company to use the QR code. Your company security guard or employee who has registered to authenticate guest wireless access has the privilege to scan the QR code from the login page of captive portal in the customer s device. The captive portal with QR code is a new feature that brings you convenient and fast pass in some scenarios for clients to access the Internet. The NXC provides two authentication mechanisms with QR code for different scenarios. 1
3 Scenario 1: Authenticator - assisted Guest receives a QR code that is authenticated by an authenticator A guest visits the ZyXEL Company and connects to the Guest SSID, but it shows the login page with QR code. The guest does not have the user name and password, so he goes to find an employee who has privilege to authenticate the guest s device to scan his QR code. After employee scan the QR and get the authentication message, then the guest can use Wi-Fi to access the Internet. 2
4 Scenario 2: Self - serviced Guest directly scans QR code to pass the authentication A guest visits the ZyXEL Company and he sees a QR code is posted on the table when he sits on the chair. The QR code notes Welcome to ZyXEL. After the guest connects to the SSID and scans the QR code, he will get the authentication message. Then, he can enjoy Wi-Fi service. 3
5 The Configuration of Captive Portal with QR code Employees are the members of VLAN 10, which can access internet by passing the authentication with enterprise security (802.1X). Guests are the members of VLAN0, which can access the internet by employee authenticating the guest s QR code. Scenario 1: Authenticator - assisted Step 1: Go to Interface > VLAN > Add. Create two VLANs as the DHCP servers, separately VLAN0 and VLAN10. VLAN0 is for guest and VLAN10 is for employee using. Step 2: Go to Zone > Edit. Set VLAN0 and VLAN10 be a LAN, therefore, the member of VLAN10 can access to the member of VLAN1. The employee in the VLAN10 can authenticate guest in the VLAN0. 4
6 Step 3: Create user information for guest and employees to login to the Captive portal. Go to User/Group > User > Add. *The User Type of guest must be guest or user. There are two kinds of configuration for authentication by authenticator (employee) on the NXC and external radius server. Guest information: (No matter authenticator information locates in the NXC or external authentication server e.g. Radius or Active Directory server, guest account must be pre-configured on the NXC) Authenticator(Employee) information on the NXC 5
7 Set a group for employee accounts. Go to User/Group > User > Group > add. Authenticator (Employee) information on the external authentication (Radius) server Add the information of external authentication server. Go to AAA Server > Radius > Add. (Note: Please confirm there is an existing authenticator account on the external authentication server.) 6
8 Step 4: Go to Auth. Method > Add. If the information of authenticator is on the NXC, then select the local authentication for employee s enterprise security. If the information of authenticator is on the external authentication server, then add an authenticated method and select the external authentication server for employee s enterprise security. 7
9 Step 5: Add an IP address range on the VLAN0 for guests that need to login to the captive portal and add the interface subnet of employee on the VLAN10. Go to Address > Address > Add. The IP address range for guest using need to login the captive portal: The interface subnet of employees on the VLAN10: 8
10 Step 6: To prevent guest in the VLAN0 can access to the VLAN10, go to Firewall > Add. Add a firewall rule to deny guest access to the member of VLAN10. Step 7: Go to Captive Portal > Captive Portal > Authentication Policy Summary. Scroll down to the page of the captive portal and select default for Authentication Method, and then add an authentication policy. 9
11 Step 8: Select the IP address range for guests that will be forced to be authenticated by the captive portal. Step 9: Bring up the page of the Captive Portal and enable the captive portal feature, and authentication with the QR code. Select Authenticator - assisted and then apply the configuration. Guest Account Select guest user ID. QR Portal Address Select the VLAN group of authenticator. Authenticator must be able to access the members of VLAN of QR Portal Address for guests; otherwise, the authenticator will be unable to authenticate guests. Authenticator able to authenticate guests. Employees are the authenticators, who can authenticate the guest to access the INTERNET. Hence, QR Portal Address needs to be selected the VLAN10 that is the VLAN of employee, and Authenticator needs to be selected a group of employees who have privilege to authenticate. 10
12 The account information of authenticaor is on the NXC. ZyXEL NXC Application Notes The account information of authenticaor is on the external authenticated server 11
13 Step 10: After AP deployment is ready, add the AP profiles for guest and employee Wi-Fi service. Before setting the SSID, we need to set an enterprise security for employee to use. Go to AP Profile > SSID > Security List > Add. If the information of authenticator is on the NXC, then select default for Auth. Method that is local authentication for employees. 12
14 If the information of authenticator is on the external authentication server, then select the auth. method that is directed to the authentication server for employees. Step 11: Go to AP Profile > SSID > Add. Create two SSID for guests and employees. Set the forwarding mode with Local bridge when the traffic of AP would go through the NXC directly. Set the forwarding mode with Tunnel mode when the traffic of AP might not go through the NXC directly. The tunnel mode setting could force all the traffic to go into the NXC and lead to the Captive portal. The SSID for guests using is named QR_guest with VLAN ID 1 13
15 The SSID for employees using is named QR_employee with VLAN ID 10 and enterprise security. 14
16 Step 12: Create a radio configuration for the AP. Go to AP Profile > Radio > Add. Step 13: Go to AP Management > Mgmt. AP List. Select the SSID to provide Wi-Fi service for guests. 15
17 Step 14: Guest can use a mobile device to connect to the SSID and open the webpage. It would show the page of the captive portal with QR code. Step 15: Find the employee who is able to authenticate guests by scanning the guest s QR code. After scanning the QR code from the guest s device, the employee s mobile device will show the result of the authentication. 16
18 Step 16: Go to Login Users. You can see that the guest has obtained the IP address, as well as who authenticated the guest. Scenario 2: Self serviced For steps 1-8 please refer to the step 1-8 of scenario 1. Step 9: Go to Captive Portal. Enable the captive portal feature and authentication with QR code. Select Self-serviced. You can leave the message in the Note Message and press Print Out, the QR code would be show in the window. QR Portal Address select the VLAN group of guest. * Please note that the IP address you select must be reachable by guest. Note Message Write any information for printing with the QR code. 17
19 Step 10: Publish the QR code and then the guest could use a mobile device to scan the QR code to pass the authentication. Step 11: Go to AP Management > Mgmt. AP List. Select SSID to provide Wi-Fi service for guests. 18
20 Step 12: Scan QR code and the mobile device will show the result of the authentication. Step 13: Go to Login Users. You can see who obtained the IP address by QR code authentication. 19
21 The Flowchart of Authentication of Captive Portal with QR code Scenario 1: Authenticator - assisted The process of scenario 1: 1. Guest connects to the SSID with captive portal authentication. 2. NXC receive the connected request from guest and leads to the page of captive portal with QR code. 3. The employee (authenticator) uses a mobile device with an IP address that has authentication ability to scan the QR code from the guest s device. 4. NXC receives the authentication request. 5. After NXC checks the authenticated request, it would send the authenticated response to the employee s mobile device. 20
22 Scenario 2: Self serviced The process of scenario 2: 1. The employee (authenticator) produces the QR code for guests. 2. Guest connects the SSID with captive portal authentication. 3. Guest scans the QR code, which is published from the authenticator. 4. NXC receives the authenticated request from guest. 5. After NXC checks the authenticated request, it would send the authenticated response to the guest s mobile device. 21
WiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
More informationCase Study - Configuration between NXC2500 and LDAP Server
Case Study - Configuration between NXC2500 and LDAP Server 1 1. Scenario:... 3 2. Topology:... 4 3. Step-by-step Configurations:...4 a. Configure NXC2500:...4 b. Configure LDAP setting on NXC2500:...10
More informationWiNG 5.X How-To Guide
WiNG 5.X How-To Guide Captive Portals Part No. TME-12-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC
More informationHow to Configure a BYOD Environment with the DWS-4026
Configuration Guide How to Configure a BYOD Environment with the DWS-4026 (MAC Authentication + Captive Portal) Overview This guide describes how to configure and implement BYOD environment with the D-Link
More informationMicrosoft Lync Certification Configuration Guide for WiNG 5.5
Microsoft Lync Certification Configuration Guide for WiNG 5.5 December 2013 Revision 1 MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark
More informationNXC5500/2500. Application Note. Smart Classroom Load Balancing. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation
NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note Smart Classroom Load Balancing Copyright 2015 ZyXEL Communications Corporation Smart Classroom Load Balancing For wireless access service,
More informationDIGIPASS Authentication for Cisco ASA 5500 Series
DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations
More informationHow to Configure Guest Management on the DWC-1000
Configuration Guide How to Configure Guest Management on the DWC-1000 Overview This guide describes how to configure and customize a billing profile and generate temporary user account on the D-Link DWC-1000
More informationUAG Series. Application Note. Unified Access Gateway. Version 4.00 Edition 1, 04/2014. Copyright 2014 ZyXEL Communications Corporation
UAG Series Unified Access Gateway Version 4.00 Edition 1, 04/2014 Application Note Copyright 2014 ZyXEL Communications Corporation Table of Contents Scenario 1 How to Activate a Paid Access Hotspot...
More informationUAG4100 Support Notes
2013 UAG4100 Support Notes CSO ZyXEL 2013/07/29 Table of Contents Scenario 1 Activate a Paid Access Hotspot... 2 Print ticket to access the Internet... 3 Pay with PayPal payment service to access the Internet...
More informationARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note
ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE Technical Note Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba the
More informationZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management
ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management Problem: The employees of a global enterprise often need to telework. When a sales representative
More informationHow To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (
UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet
More informationEnabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
More informationHow To - Implement Clientless Single Sign On Authentication with Active Directory
How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:
More informationSecure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security
Secure WiFi Access in Schools and Educational Institutions WPA2 / 802.1X and Captive Portal based Access Security Cloudessa, Inc. Palo Alto, CA July 2013 Overview The accelerated use of technology in the
More informationThe Ultimate WLAN Management and Security Solution for Large and Distributed Deployments
The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments Centralized WLAN management and auto provisioning Manages up to 0 APs with granular access control Advanced RF management
More informationOn-boarding and Provisioning with Cisco Identity Services Engine
On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID
More informationHow to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0
How to set up the HotSpot module with SmartConnect Panda GateDefender 5.0 Content Introduction... 3 Minimum requirements to enable the hotspot module... 4 Hotspot settings... 6 General settings....6 Configuring
More informationWeb Authentication Proxy on a Wireless LAN Controller Configuration Example
Web Authentication Proxy on a Wireless LAN Controller Configuration Example Document ID: 113151 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Proxy on
More informationThe All-in-One, Intelligent NXC Controller
The All-in-One, Intelligent NXC Controller Centralized management for up to 24 APs ZyXEL Wireless Optimizer for easily planning, deployment and maintenance AP auto discovery and auto provisioning Visualized
More informationThe All-in-One, Intelligent WLAN Controller
The All-in-One, Intelligent WLAN Controller Centralized management for up to 64* APs ZyMESH mitigates complex, inconvenient cabling Wi-Fi deployments Client steering enhances efficiency of wireless spectrum
More informationVLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
More informationThe All-in-One, Intelligent WLAN Controller
The All-in-One, Intelligent WLAN Controller Centralized management for up to 64* APs mitigates complex, inconvenient cabling Wi-Fi deployments Comprehensive features for WLAN performance optimization and
More informationBYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
More informationExtending the range of a wireless network by using mesh topology
Extending the range of a wireless network by using mesh topology This example demonstrates how to configure a FortiGate and two FortiAP wireless access point units to extend the reach and availability
More informationD-Link Central WiFiManager Configuration Guide
Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install
More informationSecurity Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
More informationD-Link DAP-1360 Repeater Mode Configuration
D-Link DAP-1360 Repeater Mode Configuration Outline 1. Package Contents 2. System Requirements 3. Hardware Overview Connections LED s WPS LED/Button 4. Default Settings 5. Configuring your LAN Adapter
More informationRAP Installation - Updated
RAP Installation - Updated August 01, 2012 Aruba Controller Release 6.1.3.2 The Controller has several wizards that can guide you through a variety of configuration processes. On the Configuration tab
More informationHow to configure your Thomson SpeedTouch 780WL for ADSL2+
How to configure your Thomson SpeedTouch 780WL for ADSL2+ Connecting up your router This guide assumes that you have successfully: unpacked your router connected it up to your phone socket using the DSL
More informationCustom Integration Solutions
Welcome to this introduction into a true business class network solution for you and your clients This solution has been designed, by integrators, for integrators. We look forward to producing an ever
More informationPenn State Wireless 2.0 and Related Services for Network Administrators
The following document provides details about the operation and configuration parameters for Penn State Wireless 2.0 and Visitor Wireless. It is intended for Penn State network administrators who are considering
More informationDeploy and Manage a Highly Scalable, Worry-Free WLAN
Deploy and Manage a Highly Scalable, Worry-Free WLAN Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control simplifies complex, inconvenient cabling Wi-Fi
More informationIntelligent WLAN Controller with Advanced Functions
Intelligent WLAN Controller with Advanced Functions Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control ZyMESH simplifies complex, inconvenient cabling
More informationLab 8.4.5.1 Configuring LEAP/EAP using Local RADIUS Authentication
Lab 8.4.5.1 Configuring LEAP/EAP using Local RADIUS Authentication Objective Topology Estimated Time: 40 minutes Number of Team Members: Students can work in teams of two. In this lab, the student will
More informationPalo Alto Networks User-ID Services. Unified Visitor Management
Palo Alto Networks User-ID Services Unified Visitor Management Copyright 2011 Aruba Networks, Inc. Aruba Networks trademarks include Airwave, Aruba Networks, Aruba Wireless Networks, the registered Aruba
More informationAruba Aruba Certification ACMP-6.4 test questions and answers :http://www.it-tests.com/ACMP-6.4.html
IT-TESTs.com IT Certification Guaranteed, The Easy Way! \ http://www.it-tests.com We offer free update service for one year Exam : ACMP-6.4 Title : Aruba Certified Mobility Professional 6.4 Vendor : Aruba
More information8 Steps for Network Security Protection
8 Steps for Network Security Protection cognoscape.com 8 Steps for Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because
More information8 Steps For Network Security Protection
8 Steps For Network Security Protection 8 Steps For Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because of their
More informationDeploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN
Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Copyright 2005, Meru Networks, Inc. This document is an unpublished work protected by the United States copyright laws and
More informationConfiguring Global Protect SSL VPN with a user-defined port
Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be Global Protect SSL VPN Overview This document gives you an overview on how to configure
More informationConnecting an Android to a FortiGate with SSL VPN
Connecting an Android to a FortiGate with SSL VPN This recipe describes how to provide a group of remote Android users with secure, encrypted access to the network using FortiClient and SSL VPN. You must
More informationD-View 7 Network Management System
Product Highlights Comprehensive Management Manage your network effectively with useful tools and features such as Batch Configuration, SNMP, and Flexible command Line Dispatch Hassle-Free Network Management
More informationTECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents
TECHNICAL WHITEPAPER Author: Tom Kistner, Chief Software Architect Last update: 18. Dez 2014 Table of Contents Introduction... 2 Terminology... 2 Basic Concepts... 2 Appliances... 3 Hardware...3 Software...3
More informationMikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server
Mikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server 2012 Aradial This document contains proprietary and confidential information of Aradial and Spotngo and shall not be reproduced
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Enterasys Wireless Access Point 3000 (RBT3K-AG) to Support Avaya IP Office, Avaya IP Wireless Telephones and Avaya Phone Manager
More informationVirtuelle WLAN Controller Alcatel Lucent Wireless LAN Instant AP
Virtuelle WLAN Alcatel Lucent Wireless LAN Instant AP S. 1 Alcatel Lucent Instant Technology Over-the-air provisioning: Industry only wireless over the air WLAN setup Wizard driven setup: 5 minute WLAN
More informationCisco TrustSec How-To Guide: Guest Services
Cisco TrustSec How-To Guide: Guest Services For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
More informationNXC5200/ NWA5000-N Series Wireless LAN Controller/ 802.11 a/b/g/n Managed Access Point
Higherbandwidth, higher density with full range of 802.11n s (NWA5000N Series) Comprehensive guest network management with auto guest account generator and Web authentication support Manage up to 240 APs
More informationNETGEAR /ValuePoint Networks Interoperability Report
NETGEAR /ValuePoint Networks Interoperability Report Delivering a Personalized Wireless Experience to Hotel Guests application notes Table of Contents Introduction... 3 HOW TO DEPLOY THE JOINT SOLUTION...
More informationWLAN Information Security Best Practice Document
WLAN Information Security Best Practice Document Produced by FUNET led working group on wireless systems and mobility (MobileFunet) (WLAN security) Author: Wenche Backman Contributors: Ville Mattila/CSC
More informationWeb Authentication Application Note
What is Web Authentication? Web Authentication Application Note Web authentication is a Layer 3 security feature that causes the router to not allow IP traffic (except DHCP-related packets) from a particular
More information10/2011 - English Edition 1. Quick Start Guide. NWA1100N-CE CloudEnabled Business N Wireless Access Point
10/2011 - English Edition 1 Quick Start Guide NWA1100N-CE CloudEnabled Business N Wireless Access Point Package Contents - 1 x ZyXEL NWA1100N-CE Access Point - 2 x Detachable Antennas - 1 x Power Adapter
More informationDeveloping Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
More informationDEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
More informationLayer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation
Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation This document describes the steps to undertake in configuring a Layer 2/Layer 3 switch (in this document a FMS7382S
More informationConfiguration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Role-Based Firewall. June 2011 Revision 1.0
Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG 5 How-To Guide Role-Based Firewall June 2011 Revision 1.0 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark
More informationDeployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller
Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller August 2006 Contents Overview section on page 1 Configuring Guest Access on the Cisco Wireless LAN Controller section on page
More informationRuckus Wireless ZoneDirector Command Line Interface
Ruckus Wireless ZoneDirector Command Line Interface Reference Guide Part Number 800-70258-001 Published September 2010 www.ruckuswireless.com Contents About This Guide Document Conventions................................................
More informationParticularities of security design for wireless networks in small and medium business (SMB)
Revista Informatica Economică, nr. 4 (44)/2007 93 Particularities of security design for wireless networks in small and medium business (SMB) Nicolae TOMAI, Cluj-Napoca, Romania, tomai@econ.ubbcluj.ro
More informationFAQs: MATRIX NAVAN CNX200. Q: How to configure port triggering?
FAQs: MATRIX NAVAN CNX200 Q: How to configure port triggering? Port triggering is a type of port forwarding where outbound traffic on predetermined ports sends inbound traffic to specific incoming ports.
More informationNXC Series. User s Guide. Quick Start Guide. Wireless LAN Controller. Default Login Details. Version 4.10 Edition 1, 01/2014
NXC Series Wireless LAN Controller Version 4.10 Edition 1, 01/2014 Quick Start Guide User s Guide Default Login Details IP Address https://192.168.1.1 User Name admin Passwordwww.zyxel.com 1234 Copyright
More informationEbonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
More informationWLAN Outdoor CPE For 2.4G. Quick Installation Guide
WLAN Outdoor CPE For 2.4G Quick Installation Guide Part I: External Installation Direction A. Check the parts in your box CPE SET 1 DC 12V/1.5A Power Adapter 1 PoE DC Injector 1 Hose Clamps 2 Manual &
More informationConfiguring User Identification via Active Directory
Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be User Identification Overview User Identification allows you to create security policies based
More informationADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
More informationState of Kansas. Interim Wireless Local Area Networks Security and Technical Architecture
State of Kansas Interim Wireless Local Area Networks Security and Technical Architecture October 6, 2005 Prepared for Wireless Policy Committee Prepared by Revision Log DATE Version Change Description
More informationTraining Module for Customer Portal & Customer Care. Enabling the Next Wave of Connectivity
Training Module for Customer Portal & Customer Care Customer Portal Interface used by the registered end user to interact with the network End user can modify Information, change Password & check the account,billing
More informationDesign and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
More informationNWA1120 Series. User s Guide. Quick Start Guide. Wireless LAN Ceiling Mountable PoE Access Point. Default Login Details
NWA1120 Series Wireless LAN Ceiling Mountable PoE Access Point Version 1.00 Edition 1, 08/2012 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 User Name admin Passwordwww.zyxel.com
More informationDramatically simplifying voice and data networking HOW-TO GUIDE. Bundle Quick Start Guide
Dramatically simplifying voice and data networking HOW-TO GUIDE Bundle Quick Start Guide 2 edgebox How-To Guide - Table of Contents Scope of the Quick-Start Guide...3 edgebox bundles...3
More informationSecuring Wireless LANs with LDAP
A P P L I C A T I O N N O T E Securing Wireless LANs with LDAP Many organizations have standardized on LDAP (Lightweight Directory Access Protocol) servers as a repository for their users and related security
More informationTrustSec How-To Guide: On-boarding and Provisioning
TrustSec How-To Guide: On-boarding and Provisioning For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
More informationThe ECU Wireless system uses a captive portal authentication system. There are three steps to configure your computer for wireless access:
ECU WIRELESS SETUP The ECU Wireless system uses a captive portal authentication system. There are three steps to configure your computer for wireless access: 1. Install a wireless network card into your
More informationDSA-1000 / PRT-1000 Device Server / Thermal Printer
LevelOne DSA-1000 / PRT-1000 Device Server / Thermal Printer User Manual V2.0 TABLE OF CONTENTS 1. INTRODUCTION...- 3-2. DEVICE OVERVIEW...- 7-3. HARDWARE SETUP...- 10-4. SYSTEM CONFIGURATION...- 12 -,
More informationHosting more than one FortiOS instance on. VLANs. 1. Network topology
Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of
More informationNXC2500. User s Guide. Quick Start Guide. Wireless LAN Controller. Default Login Details. Version 4.00 Edition 1, 05/2013
NXC2500 Wireless LAN Controller Version 4.00 Edition 1, 05/2013 Quick Start Guide User s Guide Default Login Details IP Address https://192.168.1.1 User Name admin Passwordwww.zyxel.com 1234 Copyright
More informationV310 Support Note Version 1.0 November, 2011
1 V310 Support Note Version 1.0 November, 2011 2 Index How to Register V310 to Your SIP server... 3 Register Your V310 through Auto-Provision... 4 Phone Book and Firmware Upgrade... 5 Auto Upgrade... 6
More informationScenario: Remote-Access VPN Configuration
CHAPTER 7 Scenario: Remote-Access VPN Configuration A remote-access Virtual Private Network (VPN) enables you to provide secure access to off-site users. ASDM enables you to configure the adaptive security
More informationChapters. Prerequisites: Eduroam in a Microsoft Windows 2008r2 environment.
Eduroam in a Microsoft Windows 2008r2 environment. This guide will help with the deployment of eduroam in a Microsoft Windows 2008r2 only environment. We will briefly note the prerequisites for a successful
More informationNetwork/VPN Overlap How-To with SonicOS 2.0 Enhanced Updated 9/26/03 SonicWALL,Inc.
Network/VPN Overlap How-To with SonicOS 2.0 Enhanced Updated 9/26/03 SonicWALL,Inc. Introduction In this whitepaper, we will configure a VPN tunnel between two SonicWALLs running SonicOS 2.0 Enhanced that
More informationWiFi-SB-L3 300M WiFi Router WiFi Bridge WiFi Repeater. WiFi Router WiFi Repeater WiFi Bridge WiFi-SB-L3 Quick Setting Guide
300M WiFi Router WiFi Repeater WiFi Bridge WiFi-SB-L3 Quick Setting Guide 1 Chapter 1 Router Mode Quick Setup Guide 1. Let WiFi-SB-L3 be powered on. 2.Turn on wireless network connection, disabled local
More informationImplementing PCoIP Proxy as a Security Server/Access Point Alternative
Implementing PCoIP Proxy as a Security Server/Access Point Alternative Overview VMware s Horizon Security Server and Access Point provides secure access to sessions over an unsecured WAN and/or Internet
More informationInitial Access and Basic IPv4 Internet Configuration
Initial Access and Basic IPv4 Internet Configuration This quick start guide provides initial and basic Internet (WAN) configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
More informationDSL-2600U. User Manual V 1.0
DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS
More informationUser Guide. Cloud Gateway Software Device
User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software).
More informationApplication Note Secure Enterprise Guest Access August 2004
Application Note Secure Enterprise Guest Access August 2004 Introduction More and more enterprises recognize the need to provide easy, hassle-free high speed internet access to people visiting their offices,
More informationHow To Configure SSL VPN in Cyberoam
How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,
More informationVPN Configuration Guide. ZyWALL USG Series / ZyWALL 1050
VPN Configuration Guide ZyWALL USG Series / ZyWALL 1050 2011 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this configuration guide may not be copied, in whole or in part,
More informationLucent VPN Firewall Security in 802.11x Wireless Networks
Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper
More informationDesigning scalable wireless networks in the campus LAN
Designing scalable wireless networks in the campus LAN Sebastian Büttrich, wire.less.dk/nsrc edit: March 2010, KENET http://creativecommons.org/licenses/by-nc-sa/3.0/ Agenda Introduction to wireless networking
More informationLab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
More informationHow to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
More informationApplication Note User Groups
Application Note User Groups Application Note User Groups Table of Contents Background... 3 Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 6 Configuration...
More informationQuick Installation Guide For Mac users
Quick Installation Guide For Mac users Packing List 1) IP CAMERA X 1 2) Wi-Fi Antenna (only available for wireless model) 3) DC Power Supply X 1 4) Network Cable X 1 5) Mounting bracket 1 6) CD X 1 (Include
More informationAPPENDIX 3 LOT 3: WIRELESS NETWORK
APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop
More informationQuick Installation Guide
Packing List Quick Installation Guide Quick Installation Guide 1) IP CAMERA X 1 2) Wi-Fi Antenna (only available for wireless model) 3) DC Power Supply X 1 4) Network Cable X 1 5) Mounting bracket 1 6)
More informationConfiguring Routers and Their Settings
Configuring Routers and Their Settings When installing a router on your home network the routers settings are usually defaulted to automatically protect your home, and simplify setup. This is done because
More informationP-660HN-51. 802.11n Wireless ADSL2+ 4-port Gateway DEFAULT LOGIN DETAILS. Firmware Version 1.10 Edition 1, 9/2010. IP Address: http://192.168.1.
P-660HN-51 802.11n Wireless ADSL2+ 4-port Gateway Firmware Version 1.10 Edition 1, 9/2010 DEFAULT LOGIN DETAILS IP Address: http://192.168.1.1 User Name: admin Password: 1234 www.zyxel.com Copyright 2010
More information