Cisco Cisco Aironet 350 Mini-PCI Wireless LAN Client Adapter Guide De Conception
10-32
Enterprise Mobility 4.1 Design Guide
OL-14435-01
Chapter 10 Cisco Unified Wireless Guest Access Services
Guest Account Management
Figure 10-35
Guest User Account Creation
Step 3
Under Guest Information, enter a User Name and Password.
Passwords are case sensitive. User names are restricted to 24 characters or less. Administrators also have
an option to allow the system to automatically generate a password by clicking on the Generate
Password check box.
an option to allow the system to automatically generate a password by clicking on the Generate
Password check box.
Step 4
Under Account Configuration, select the following:
•
Profile—The pull-down selection list displays a list of WLANs (SSIDs) configured with a L3 Web
Policy.
Policy.
•
Life Time—Select “limited” or “unlimited”
•
End Time—If the guest account is “limited”, select the month, day, and time the credentials are to
expire.
expire.
•
Apply To—From the pull-down selection list, select Controller List and click the check box next
to the controller(s) representing anchor WLCs. Note that there will be other controllers listed;
however, these represent the foreign WLCs. There is no need to apply user credentials on the foreign
WLCs because the authentication enforcement point is the anchor WLC.
to the controller(s) representing anchor WLCs. Note that there will be other controllers listed;
however, these represent the foreign WLCs. There is no need to apply user credentials on the foreign
WLCs because the authentication enforcement point is the anchor WLC.
Note
As seen in
, there are various options for where the credentials can be applied, including
being able to control the physical/geographic location where a user can access the guest WLAN. These
include outdoor areas, indoor areas, building, floor, and so on. This location-based access method can
only be used if: 1) the WLAN deployment has been integrated into the WCS mapping database, and 2)
the guest WLAN (a WLAN with web policy) does not use mobility anchors.
include outdoor areas, indoor areas, building, floor, and so on. This location-based access method can
only be used if: 1) the WLAN deployment has been integrated into the WCS mapping database, and 2)
the guest WLAN (a WLAN with web policy) does not use mobility anchors.
•
Description—Enter a description. The description is displayed on the WLC to which the credentials
are applied under Security > Local Net Users. It is also included in the e-mail that can be sent to a
guest informing them of what credentials to use to access the network.
are applied under Security > Local Net Users. It is also included in the e-mail that can be sent to a
guest informing them of what credentials to use to access the network.