Extreme wm100 Guía Del Usuario
WM-AD configuration
HWC_GSG_VNSConfiguration.fm
Configuring authentication mechanism for WM-AD
120385-00 Rev 01, March 2007
102
Summit WM, Getting Started Guide
•
Untagged – If you select Untagged, the VLAN will be untagged.
6. To save your changes, click Save.
You have created a WM-AD. Now you must configure the authentication
mechanism for the WM-AD.
mechanism for the WM-AD.
The following section explains how to configure the authentication mechanism.
8.5 Configuring authentication mechanism for WM-AD
The Summit WM Switch offers several authentication options. The options can be
classified under network assignment types – SSID and AAA (Authentication,
Authorization and Accounting).
classified under network assignment types – SSID and AAA (Authentication,
Authorization and Accounting).
•
SSID – The SSID network assignment type offers the following authentication
options:
options:
•
By Captive Portal
•
By internal Captive Portal
•
By external Captive Portal
•
No Captive Portal support
•
By MAC-based authentication
Note: You must note here that the internal Captive Portal does not substitute the
external RADIUS server. The RADIUS server is still needed. The internal Captive
Portal within the Summit WM Switch displays the webpage to enable the users to
supply their user name and password. The user name and password are sent to the
configured RADIUS server for authentication.
In case of external Captive Portal, webpage authentication is performed by the
external Captive Portal.
external RADIUS server. The RADIUS server is still needed. The internal Captive
Portal within the Summit WM Switch displays the webpage to enable the users to
supply their user name and password. The user name and password are sent to the
configured RADIUS server for authentication.
In case of external Captive Portal, webpage authentication is performed by the
external Captive Portal.
•
AAA – The AAA (Authentication, Authorization and Accounting) network
assignment type offers the following authentication options:
assignment type offers the following authentication options:
•
By 802.1x authentication – The mobile user is authenticated before
gaining access to the network.
gaining access to the network.
•
By MAC-based authentication – The mobile user is authenticated on the
basis of their MAC address.
basis of their MAC address.
The following figure illustrates the authentication options: