Captive Portal is a safe and configurable network authentication method. It allows you to protect yourself against improper use of network access and excessive network traffic due to the possibility of imposing bandwidth restrictions.The correct configuration of Captive Portal in the NACVIEW system will result in the users being redirected to the page where they will be asked to enter data for authentication. After the successful authentication, they will gain access to the desired URL and other network resources, in accordance with established access policies.
The instruction below applies to the external configuration of the Captive Portal service (embedded in network devices). If you want to learn how to configure the Captive Portal of the NACVIEW system, open the Captive Portal (NACVIEW) document.
1. From the main menu select Access Policies (Configuration section).
2. Click the Add Rule button.
3. In the form that appears, enter the following data:
Form field | Value |
---|---|
Name | Enter any name |
Authentication method to the network | Captive Portal (you can also choose a more specific protocol, e.g.* PAP or CHAP) |
Action | VLAN access |
Whether to send back the VLAN number | x (checked) |
VLAN | select from the VLANs list to be assigned to the organization's users |
No defined Identities means | Any Identity |
Lack of a specific Identity means | Any active Identities defined in the system |
Identity Data Sources | select an authorization server for synchronizing identity with AD from the list or leave it blank |
Object groups | if the identities have been previously grouped - select the appropriate group of objects for them |
No users defined devices means | Any device |
Network devices | select from the list WiFi controllers and/or network devices on which the authorization service will be launched |
Wireless network | optionally: if you have selected a wifi controller above, select the SSID |
4. Save the set values.
For a larger network you can add more policies to allocate appropriate resources based on identity, authorization type, and/or object groups.
5. In order for the changes made to the access policies to take effect, press the Install list button.