Introduction This document outlines the configuration process on both the Xirrus Array and the amigopod appliance to create a fully integrated Visitor Management solution. The solution leverages the captive portal functionality built into the Xirrus Array software image. The Captive portal functionality allows a wireless client to authenticate using a web-based portal.
Page 4
The following table shows the software versions used during the integration testing. This document will be updated in the future if changes in either amigopod or Cisco subsequent releases affect the stability of this integration. It is advised that the customer always check for the latest integration guide available from either amigopod or Cisco.
Integration Although the Xirrus Array supports both internal and external Captive portal functionality, this integration guide will focus on the later (external) as the internal Captive portal dictates the use of the internal Login Page resident on the Array itself. The Login page is very basic and doesn’t allow for significant customization as is possible with the amigoPod Web Logins feature.
Xirrus Array Configuration The following configuration procedure assumes that the Xirrus Array has been powered up and a basic IP configuration has been applied through the CLI to allow the administrator to access the Web User Interface. The following table again reviews the IP Addressing used in the test environment but this would be replaced with the site specific details of each customer deployment: Xirrus Array Address...
Step 1 – Create RADIUS Authentication Server Instance In order for the Xirrus Array to successfully authenticate the guest users that will be provisioned on the amigopod appliance, a RADIUS Server needs to be enabled on the Array. From the Security ...
Step 2 – Create an SSID and Configure/Enable Web Page Redirect In order for the Xirrus Array to successfully redirect guest users to the web porta hosted by the Amigopod appliance and forward accounting data associated with traffic being generated by guest users, an SSID need to be created and Web Portal Redirect needs to be enabled and configured;...
Click on the ‘Save’ button (bottom right). Step 3 – RADIUS Configuration To configure the RADUIS Server, uncheck the ‘Global’ box; the SSID Amigopod RADIUS Configuration section should appear. Click the ‘External’ circle and click the ‘Accounting’ box. Enter the IP Address of your Amigopod appliance and the Port Numbers (note, the same IP Address can be used for both the RADIUS and Accounting Servers).
Amigopod Configuration The following configuration procedure assumes that the amigopod software or appliance has been powered up and a basic IP configuration has been applied through the setup wizard to allow the administrator to access the Web User Interface. The following table reviews the IP Addressing used in the test environment but this would be replaced with the site specific details of each customer deployment: Xirrus Array Address...
Step1 – Create RADIUS NAS for Xirrus Array In order for the Xirrus Array to authenticate users it needs to be able to communicate with the amigopod RADIUS instance. Back in Step 3 of the Xirrus Array configuration, a RADIUS server definition was created.
Step 2 – Restart RADIUS Services A restart of the RADIUS Service is required for the new NAS configuration to take affect. Click the Restart RADIUS Server button shown below and wait a few moments for the process to complete. CONFIDENTIAL...
Step 3 – Configure Xirrus Array Web Logins Page By default the amigopod comes pre-configured with Web Login templates (RADIUS Services Web Logins) for all the major wireless manufactures. The Xirrus template can be modified to suit the local deployment by adding custom HTML code or defined a unique amigopod skin for each captive portal page hosted by the amigopod installed;...
Page 14
From the RADIUS Web Login page select the Skin that you would like presented as the branding for the Captive Portal page. Modify the sample HTML in the Header HTML, and Login Message section to customize for your local environment. In addition add the following html script to the Footer section: Click the Save Changes button to commit the changes.
Step 3 – Confirm External Captive Portal URL The URL that needs to be configured in the Xirrus Array External Captive Portal section covered in Step 3 can be confirmed by clicking on the test button shown on the screen below under the RADIUS Services ...
Note: The URL presented in the web browser after the Test button has been clicked will be required in the configuration of the captive portal settings on the Xirrus Array. An example of the URL is shown below: http://192.1668.1.103/xirrusweblogin.php Step 4 – Create a test user account Within the amigopod RADIUS Server a test user account can be created using the amigopod Guest Manager.
Testing the Configuration Now that the configuration of both the Xirrus Array and the amigopod appliance is complete, the following steps can be followed to verify the configuration. Step 1 - Connect to the amigopod wireless network Using a test laptop with a compatible 802.11 based wireless card attempt to connect to the advertised amigopod wireless network.
Step 2 – Confirm DHCP IP Address received Using the Windows Command Prompt or equivalent in the chosen operating system, confirm that a valid IP Address has been received from the DHCP server defined on the Xirrus Array. Issue the ipconfig command from the Windows Command Prompt to display the IP information received from the DHCP process.
Step 3 – Launch Web Browser and login When the web browser on the test laptop is launched the Xirrus Array will automatically capture the session and redirect the user to the amigopod hosted login page as shown below: Enter the test user details created in Step 3 of the amigopod configuration procedure and click the Login button.
Step 4 – Confirm RADIUS debug messages on amigopod Once the test laptop has successfully authenticated and now able to browse the Internet, an entry should appear in the RADIUS logs confirming the positive authentication of the test user – in this example, jsmith@abc.om Select the RADIUS Services ...
Need help?
Do you have a question about the PowerConnect W Clearpass 100 Software and is the answer not in the manual?
Questions and answers