Bienvenido a Soporte Purple

Alcatel-Lucent Instant (IAP)

  • Actualización

Log in to your Alcatel-Lucent (Master) IAP

 

Under Network at the top left, click on New

 

Configure with:

  • Name (SSID): Guest WiFi (or whatever you wish)
  • Primary usage: Guest

     

Click Next and configure with:

  • Client IP assignment: Virtual Controller managed
  • Client VLAN assignment: Default (unless you have a custom VLAN set up)

     

Click Next and configure with:

  • Splash page type: External
  • Captive portal profile: Click the dropdown and choose New. Configure with:

 

  • Name: guestwifi
  • Type: Radius Authentication
  • IP or hostname: *insert access_domain here*
  • URL: /access/?iapmac=<ap-mac>  (i.e. /access/?iapmac=00-0B-86-6E-C5-F8)
  • Port: 80
  • Use https: Disabled
  • Captive portal failure: Deny internet
  • Automatic URL whitelisting: Disabled
  • Redirect URL: *insert redirect_url here*

 

 

Click OK to save

  • Auth server 1: Click the dropdown and choose New. Configure with:

 

  • Type: RADIUS
  • Name: guestwifi1
  • IP address: *insert radius_server_ip here*
  • Auth port: 1812
  • Acct port: 1813
  • Shared key: *insert radius_secret here*
  • Retype key: as abov

     

Click OK to save

  • Auth server 2: Click the dropdown and choose New. Configure with
  • Type: RADIUS
  •  
  • Name: guestwifi2
  • IP address: *insert radius_server2_ip here*
  • Auth port: 1812
  • Acct port: 1813
  • Shared key: *insert radius_secret here*
  • Retype key: as above

Click OK to save

  • Reauth interval: 24 hrs
  • Accounting: Enabled
  • Accounting mode: Authentication
  • Accounting interval: 3 min
  • Blacklisting: Disabled
  • Walled garden: Click the link "Blacklist: 0 Whitelist: 0" and you will see the below screen:

    Under Whitelist Click New and add all the domains one by one until all are in the list. Please refer to this list.

Press OK when all the domains have been added to save

Click Next and configure with:

  • Access Rules: Role-based

    Under Roles click New and enter Preauth as the name
    Under Access Rules for Preauth click New and add the following rule:

  • Rule type: Access control
  • Service: Network - any
  • Action: Allow
  • Destination: to domain name
  • Domain name: *insert access_domain here*

Click OK to save.

 

You need to add a rule (just like you did above), for all the below domains:

 

*insert access_domain here*

venuewifi.com

openweathermap.org

cloudfront.net

stripe.com

 

If you wish to support social network logins, you also need to add a rule for the domains below for each network you plan to support

 

Facebook Twitter LinkedIn Instagram
facebook.com
fbcdn.net
akamaihd.net
connect.facebook.net

twitter.com
twimg.com

linkedin.com
licdn.net
licdn.com
instagram.com
  • Assign pre-authentication role: select Preauth

Click Finish to complete the set up.

 

Compartir en línea
¿Fue útil este artículo?
Usuarios a los que les pareció útil: 0 de 0