NXC5500/2500. Application Note. Captive Portal with QR Code. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation



Similar documents
WiNG5 CAPTIVE PORTAL DESIGN GUIDE

Case Study - Configuration between NXC2500 and LDAP Server

WiNG 5.X How-To Guide

How to Configure a BYOD Environment with the DWS-4026

Microsoft Lync Certification Configuration Guide for WiNG 5.5

NXC5500/2500. Application Note. Smart Classroom Load Balancing. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation

DIGIPASS Authentication for Cisco ASA 5500 Series

How to Configure Guest Management on the DWC-1000

UAG Series. Application Note. Unified Access Gateway. Version 4.00 Edition 1, 04/2014. Copyright 2014 ZyXEL Communications Corporation

UAG4100 Support Notes

ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

How To - Implement Clientless Single Sign On Authentication with Active Directory

Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security

The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments

On-boarding and Provisioning with Cisco Identity Services Engine

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

Web Authentication Proxy on a Wireless LAN Controller Configuration Example

The All-in-One, Intelligent NXC Controller

The All-in-One, Intelligent WLAN Controller

VLANs. Application Note

The All-in-One, Intelligent WLAN Controller

BYOD: BRING YOUR OWN DEVICE.

Extending the range of a wireless network by using mesh topology

D-Link Central WiFiManager Configuration Guide

Security Awareness. Wireless Network Security

D-Link DAP-1360 Repeater Mode Configuration

RAP Installation - Updated

How to configure your Thomson SpeedTouch 780WL for ADSL2+

Custom Integration Solutions

Penn State Wireless 2.0 and Related Services for Network Administrators

Deploy and Manage a Highly Scalable, Worry-Free WLAN

Intelligent WLAN Controller with Advanced Functions

Lab Configuring LEAP/EAP using Local RADIUS Authentication

Palo Alto Networks User-ID Services. Unified Visitor Management

Aruba Aruba Certification ACMP-6.4 test questions and answers :

8 Steps for Network Security Protection

8 Steps For Network Security Protection

Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN

Configuring Global Protect SSL VPN with a user-defined port

Connecting an Android to a FortiGate with SSL VPN

D-View 7 Network Management System

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents

Mikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server

Abstract. Avaya Solution & Interoperability Test Lab

Virtuelle WLAN Controller Alcatel Lucent Wireless LAN Instant AP

Cisco TrustSec How-To Guide: Guest Services

NXC5200/ NWA5000-N Series Wireless LAN Controller/ a/b/g/n Managed Access Point

NETGEAR /ValuePoint Networks Interoperability Report

WLAN Information Security Best Practice Document

Web Authentication Application Note

10/ English Edition 1. Quick Start Guide. NWA1100N-CE CloudEnabled Business N Wireless Access Point

Developing Network Security Strategies

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation

Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Role-Based Firewall. June 2011 Revision 1.0

Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller

Ruckus Wireless ZoneDirector Command Line Interface

Particularities of security design for wireless networks in small and medium business (SMB)

FAQs: MATRIX NAVAN CNX200. Q: How to configure port triggering?

NXC Series. User s Guide. Quick Start Guide. Wireless LAN Controller. Default Login Details. Version 4.10 Edition 1, 01/2014

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

WLAN Outdoor CPE For 2.4G. Quick Installation Guide

Configuring User Identification via Active Directory

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

Training Module for Customer Portal & Customer Care. Enabling the Next Wave of Connectivity

Design and Implementation Guide. Apple iphone Compatibility

NWA1120 Series. User s Guide. Quick Start Guide. Wireless LAN Ceiling Mountable PoE Access Point. Default Login Details

Dramatically simplifying voice and data networking HOW-TO GUIDE. Bundle Quick Start Guide

Securing Wireless LANs with LDAP

TrustSec How-To Guide: On-boarding and Provisioning

The ECU Wireless system uses a captive portal authentication system. There are three steps to configure your computer for wireless access:

DSA-1000 / PRT-1000 Device Server / Thermal Printer

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

NXC2500. User s Guide. Quick Start Guide. Wireless LAN Controller. Default Login Details. Version 4.00 Edition 1, 05/2013

V310 Support Note Version 1.0 November, 2011

Scenario: Remote-Access VPN Configuration

Chapters. Prerequisites: Eduroam in a Microsoft Windows 2008r2 environment.

Network/VPN Overlap How-To with SonicOS 2.0 Enhanced Updated 9/26/03 SonicWALL,Inc.

WiFi-SB-L3 300M WiFi Router WiFi Bridge WiFi Repeater. WiFi Router WiFi Repeater WiFi Bridge WiFi-SB-L3 Quick Setting Guide

Implementing PCoIP Proxy as a Security Server/Access Point Alternative

Initial Access and Basic IPv4 Internet Configuration

DSL-2600U. User Manual V 1.0

User Guide. Cloud Gateway Software Device

Application Note Secure Enterprise Guest Access August 2004

How To Configure SSL VPN in Cyberoam

VPN Configuration Guide. ZyWALL USG Series / ZyWALL 1050

Lucent VPN Firewall Security in x Wireless Networks

Designing scalable wireless networks in the campus LAN

Lab Configuring Access Policies and DMZ Settings

How to Configure Captive Portal

Application Note User Groups

Quick Installation Guide For Mac users

APPENDIX 3 LOT 3: WIRELESS NETWORK

Quick Installation Guide

Configuring Routers and Their Settings

P-660HN n Wireless ADSL2+ 4-port Gateway DEFAULT LOGIN DETAILS. Firmware Version 1.10 Edition 1, 9/2010. IP Address:

Transcription:

NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note Captive Portal with QR Code Copyright 2015 ZyXEL Communications Corporation

Captive Portal with QR Code What is Captive Portal with QR code? The captive portal is a login page that is displayed when you access the Internet by launching the web browser, which would intercept the network traffic till you enter the privileged account. For example, some companies set the boundary of a captive portal for staff and visitors before they can gain network to access for the Internet via a web browser. To ensure the management of network traffic and security, they need to get a privileged account for passing the captive portal to use the network. In general, new employees have a privileged account after they report in for duty, but visitors need to ask for the privileged account from an employee or administrator. Assuming your company holds a business conference for dozens of customers. How could your company provide instant wireless access service for customers without creating numerous accounts or changing the network configuration? A captive portal with QR code could help you ease this confusion. There is no need for the IT to generate an account for every customer. Instead, he can print a QR code and post it on the entrance of the meeting room or somewhere that customers could easily see it. After customers use the mobile device to scan the QR code, customers could login to the captive portal page automatically without keying account information. In addition, if your company requires more rigid IT security policies e.g. granting guest wireless access service requires employee authentication prior to the access, there is another way for your company to use the QR code. Your company security guard or employee who has registered to authenticate guest wireless access has the privilege to scan the QR code from the login page of captive portal in the customer s device. The captive portal with QR code is a new feature that brings you convenient and fast pass in some scenarios for clients to access the Internet. The NXC provides two authentication mechanisms with QR code for different scenarios. 1

Scenario 1: Authenticator - assisted Guest receives a QR code that is authenticated by an authenticator A guest visits the ZyXEL Company and connects to the Guest SSID, but it shows the login page with QR code. The guest does not have the user name and password, so he goes to find an employee who has privilege to authenticate the guest s device to scan his QR code. After employee scan the QR and get the authentication message, then the guest can use Wi-Fi to access the Internet. 2

Scenario 2: Self - serviced Guest directly scans QR code to pass the authentication A guest visits the ZyXEL Company and he sees a QR code is posted on the table when he sits on the chair. The QR code notes Welcome to ZyXEL. After the guest connects to the SSID and scans the QR code, he will get the authentication message. Then, he can enjoy Wi-Fi service. 3

The Configuration of Captive Portal with QR code Employees are the members of VLAN 10, which can access internet by passing the authentication with enterprise security (802.1X). Guests are the members of VLAN0, which can access the internet by employee authenticating the guest s QR code. Scenario 1: Authenticator - assisted Step 1: Go to Interface > VLAN > Add. Create two VLANs as the DHCP servers, separately VLAN0 and VLAN10. VLAN0 is for guest and VLAN10 is for employee using. Step 2: Go to Zone > Edit. Set VLAN0 and VLAN10 be a LAN, therefore, the member of VLAN10 can access to the member of VLAN1. The employee in the VLAN10 can authenticate guest in the VLAN0. 4

Step 3: Create user information for guest and employees to login to the Captive portal. Go to User/Group > User > Add. *The User Type of guest must be guest or user. There are two kinds of configuration for authentication by authenticator (employee) on the NXC and external radius server. Guest information: (No matter authenticator information locates in the NXC or external authentication server e.g. Radius or Active Directory server, guest account must be pre-configured on the NXC) Authenticator(Employee) information on the NXC 5

Set a group for employee accounts. Go to User/Group > User > Group > add. Authenticator (Employee) information on the external authentication (Radius) server Add the information of external authentication server. Go to AAA Server > Radius > Add. (Note: Please confirm there is an existing authenticator account on the external authentication server.) 6

Step 4: Go to Auth. Method > Add. If the information of authenticator is on the NXC, then select the local authentication for employee s enterprise security. If the information of authenticator is on the external authentication server, then add an authenticated method and select the external authentication server for employee s enterprise security. 7

Step 5: Add an IP address range on the VLAN0 for guests that need to login to the captive portal and add the interface subnet of employee on the VLAN10. Go to Address > Address > Add. The IP address range for guest using need to login the captive portal: The interface subnet of employees on the VLAN10: 8

Step 6: To prevent guest in the VLAN0 can access to the VLAN10, go to Firewall > Add. Add a firewall rule to deny guest access to the member of VLAN10. Step 7: Go to Captive Portal > Captive Portal > Authentication Policy Summary. Scroll down to the page of the captive portal and select default for Authentication Method, and then add an authentication policy. 9

Step 8: Select the IP address range for guests that will be forced to be authenticated by the captive portal. Step 9: Bring up the page of the Captive Portal and enable the captive portal feature, and authentication with the QR code. Select Authenticator - assisted and then apply the configuration. Guest Account Select guest user ID. QR Portal Address Select the VLAN group of authenticator. Authenticator must be able to access the members of VLAN of QR Portal Address for guests; otherwise, the authenticator will be unable to authenticate guests. Authenticator able to authenticate guests. Employees are the authenticators, who can authenticate the guest to access the INTERNET. Hence, QR Portal Address needs to be selected the VLAN10 that is the VLAN of employee, and Authenticator needs to be selected a group of employees who have privilege to authenticate. 10

The account information of authenticaor is on the NXC. ZyXEL NXC Application Notes The account information of authenticaor is on the external authenticated server 11

Step 10: After AP deployment is ready, add the AP profiles for guest and employee Wi-Fi service. Before setting the SSID, we need to set an enterprise security for employee to use. Go to AP Profile > SSID > Security List > Add. If the information of authenticator is on the NXC, then select default for Auth. Method that is local authentication for employees. 12

If the information of authenticator is on the external authentication server, then select the auth. method that is directed to the authentication server for employees. Step 11: Go to AP Profile > SSID > Add. Create two SSID for guests and employees. Set the forwarding mode with Local bridge when the traffic of AP would go through the NXC directly. Set the forwarding mode with Tunnel mode when the traffic of AP might not go through the NXC directly. The tunnel mode setting could force all the traffic to go into the NXC and lead to the Captive portal. The SSID for guests using is named QR_guest with VLAN ID 1 13

The SSID for employees using is named QR_employee with VLAN ID 10 and enterprise security. 14

Step 12: Create a radio configuration for the AP. Go to AP Profile > Radio > Add. Step 13: Go to AP Management > Mgmt. AP List. Select the SSID to provide Wi-Fi service for guests. 15

Step 14: Guest can use a mobile device to connect to the SSID and open the webpage. It would show the page of the captive portal with QR code. Step 15: Find the employee who is able to authenticate guests by scanning the guest s QR code. After scanning the QR code from the guest s device, the employee s mobile device will show the result of the authentication. 16

Step 16: Go to Login Users. You can see that the guest has obtained the IP address, as well as who authenticated the guest. Scenario 2: Self serviced For steps 1-8 please refer to the step 1-8 of scenario 1. Step 9: Go to Captive Portal. Enable the captive portal feature and authentication with QR code. Select Self-serviced. You can leave the message in the Note Message and press Print Out, the QR code would be show in the window. QR Portal Address select the VLAN group of guest. * Please note that the IP address you select must be reachable by guest. Note Message Write any information for printing with the QR code. 17

Step 10: Publish the QR code and then the guest could use a mobile device to scan the QR code to pass the authentication. Step 11: Go to AP Management > Mgmt. AP List. Select SSID to provide Wi-Fi service for guests. 18

Step 12: Scan QR code and the mobile device will show the result of the authentication. Step 13: Go to Login Users. You can see who obtained the IP address by QR code authentication. 19

The Flowchart of Authentication of Captive Portal with QR code Scenario 1: Authenticator - assisted The process of scenario 1: 1. Guest connects to the SSID with captive portal authentication. 2. NXC receive the connected request from guest and leads to the page of captive portal with QR code. 3. The employee (authenticator) uses a mobile device with an IP address that has authentication ability to scan the QR code from the guest s device. 4. NXC receives the authentication request. 5. After NXC checks the authenticated request, it would send the authenticated response to the employee s mobile device. 20

Scenario 2: Self serviced The process of scenario 2: 1. The employee (authenticator) produces the QR code for guests. 2. Guest connects the SSID with captive portal authentication. 3. Guest scans the QR code, which is published from the authenticator. 4. NXC receives the authenticated request from guest. 5. After NXC checks the authenticated request, it would send the authenticated response to the guest s mobile device. 21