Cisco Cisco Aironet 350 Mini-PCI Wireless LAN Client Adapter Guia Do Desenho
10-37
Enterprise Mobility 4.1 Design Guide
OL-14435-01
Chapter 10 Cisco Unified Wireless Guest Access Services
Guest Account Management
Note
If “Days of the Week” is selected, the start and stop times represent the period within each day that
access is available. Upon expiry within a given day, WCS removes the credentials from the applicable
controllers. For each new day/interval that access is permitted, WCS automatically generates a new
password (and optionally a username), e-mails it to the guest user, and re-applies the new credentials to
the applicable WLCs. If “Days of the Week” is not defined, access begins based on the start day and time
and is continuously active until the end day and time.
access is available. Upon expiry within a given day, WCS removes the credentials from the applicable
controllers. For each new day/interval that access is permitted, WCS automatically generates a new
password (and optionally a username), e-mails it to the guest user, and re-applies the new credentials to
the applicable WLCs. If “Days of the Week” is not defined, access begins based on the start day and time
and is continuously active until the end day and time.
•
Apply To—From the pull-down selection list, select Controller List and click the check box next
to the controller(s) representing anchor WLCs. Note that there will be other controllers listed;
however, these represent the foreign WLCs. There is no need to apply user credentials on the foreign
WLCs because the authentication enforcement point is the anchor WLC.
to the controller(s) representing anchor WLCs. Note that there will be other controllers listed;
however, these represent the foreign WLCs. There is no need to apply user credentials on the foreign
WLCs because the authentication enforcement point is the anchor WLC.
Note
As seen in
, there are various options for where the credentials can be applied, including
being able to control the physical/geographic location where a user can access a guest WLAN. These
include outdoor areas, indoor areas, building, floor, and so on. This location-based access method can
only be used if: 1) the WLAN deployment has been integrated into the WCS mapping database, and 2)
the guest WLAN (a WLAN with web policy) does not use mobility anchors.
include outdoor areas, indoor areas, building, floor, and so on. This location-based access method can
only be used if: 1) the WLAN deployment has been integrated into the WCS mapping database, and 2)
the guest WLAN (a WLAN with web policy) does not use mobility anchors.
•
E-mail Credentials to—Enter the e-mail address for whom an account is being established. This is
a mandatory field.
a mandatory field.
Note
An SMTP mail server must be configured in WCS so that it can use to send guest account
information. For details, see the following URL:
information. For details, see the following URL:
•
Description—Provide a description. The description is displayed on the WLC to which the
credentials are applied under Security > Local Net Users. The description is also included in an
e-mail that can be sent to the guest, informing them of what credentials to use to access the network.
credentials are applied under Security > Local Net Users. The description is also included in an
e-mail that can be sent to the guest, informing them of what credentials to use to access the network.
•
Disclaimer—Used in the e-mail that is sent to a guest user, informing them of what credentials to
use to access the network.
use to access the network.
Step 4
Click Save when finished. The screen shown in
appears, acknowledging that the scheduled
account has been created. The admin is also presented with an option to print or e-mail the credentials
to the guest user.
to the guest user.