Authentication For A Vns; Authentication With Ssid Network Assignment - Siemens HiPath C10 User Manual

C10/c100/c1000 ap26 series wireless controller, access points and convergence software, v4.0
Hide thumbs Also See for HiPath C10:
Table of Contents

Advertisement

hwc_vnsintro.fm
Virtual Network Services

Authentication for a VNS

6.5
Authentication for a VNS
The third step in setting up a VNS is to configure the authentication mechanism for the VNS.
The authentication mechanism depends on the network assignment. In addition, all VNS
definitions can include authentication by Media Access Control (MAC) address. Authentication
by MAC address provides a method of access control for a user as it associates with the AP
based on the device's MAC address.
6.5.1

Authentication with SSID network assignment

If network assignment is SSID, there are two authentication options:
None – This authentication method is the default for a new SSID assignment VNS.
Authentication VNS, unless MAC-based authorization is used, the default filter is applied,
not the non-authentication filter. For more information, see Section 6.6, "Filtering for a
VNS", on page 114.
Captive Portal – This authentication method employs a Web redirection which directs a
user's web session to an authentication server. Typically, the user must provide their
credentials (userID, password) to be authenticated. The captive portal redirection
operation will redirect any web page requests corresponding to targets not explicitly
allowed by the non-authenticated filter. The redirection will instruct the user's web page to
contact the defined authentication web server. You must ensure that the authentication
web server is explicitly listed as an allow destination in order for traffic to access it.
The HiPath Wireless Controller supports two modes of captive portal authentication:
Internal captive portal – The controller's own captive portal authentication page
(configured as an editable form) is used to request user credentials.
External captive portal – An entity outside of the HiPath Wireless Controller is
responsible for handling the user authentication process, presenting the credentials
request forms and performing user authentication procedures. The controller is then
informed of the authentication results via its Business Echosystem's interfaces.
Four authentication types are supported for captive portal authentication:
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol (CHAP)
Windows-specific version of CHAP (MS CHAP)
MS CHAP v2 (Windows-specific version of CHAP, version 2)
For Captive Portal authentication, the RADIUS server must support the selected
authentication type: PAP, CHAP (RFC2484), MS-CHAP (RFC2433), or MS-CHAPv2
(RFC2759).
112
HiPath Wireless Controller, Access Points and Convergence Software V4.0, C10/C100/C1000 User Guide
A31003-W1040-U101-1-7619, July 2006 DRAFT

Advertisement

Table of Contents
loading

Table of Contents