Siemens EF 711 Series Podręcznik Użytkownika Strona 188

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 492
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 187
Configuring Policies
Filtering Rules
SCALANCE WLC711
5-4 C79000-G8976-C260-03, 07/2012, User Guide, V8.11
Redirection and Captive Portal credentials apply to HTTP traffic only. A wireless device user
attempting to reach Websites other than those specifically allowed in the non-authenticated filter
will be redirected to the allowed destinations. Most HTTP traffic outside of that defined in the
non-authenticated filter will be redirected.
Note:
Although non-authenticated filters definitions are used to assist in the redirection of HTTP traffic for restricted
or denied destinations, the non-authenticated filter is not restricted to HTTP operations. The filter definition is
general. Any traffic other than HTTP that the filter does not explicitly allow will be discarded by the controller.
The non-authenticated filter is applied by the SCALANCE IWLAN Controller to sessions until
they successfully complete authentication. The authentication procedure results in an adjustment
to the user's applicable filters for access policy.
Typically, default filter ID access is less restrictive than a non-authenticated profile. It is the
administrators responsibility to define the correct set of access privileges.
Note:
Administrators must ensure that the non-authenticated filter allows access to the corresponding
authentication server:
Internal Captive Portal — IP address of the VNS interface
Non-authenticated Filter Examples
A basic non-authenticated filter for internal Captive Portal should have three rules, in the
following order:
If you place URLs in the header and footer of the Captive Portal page, you must explicitly allow
access to any URLs mentioned in the authentication servers page, such as:
Internal Captive Portal — URLs referenced in a header or footer
Here is another example of a non-authenticated filter that adds two more filtering rules. The two
additional rules do the following:
Deny access to a specific IP address.
Allow only HTTP traffic.
Table 5-3 Non-authenticated Filter Example A
In Out Allow IP / Port Description
x x x IP address of default
gateway (VNS Interface IP)
Allow all incoming wireless devices access to the
default gateway of the VNS.
x x x IP address of the DNS
Server
Allow all incoming wireless devices access to the
DNS server of the VNS.
x x *.*.*.* Deny everything else.
Table 5-4 Non-authenticated Filter Example B
In Out Allow IP / Port Description
x x x IP address of the default
gateway
Allow all incoming wireless devices access to the
default gateway of the VNS.
Przeglądanie stron 187
1 2 ... 183 184 185 186 187 188 189 190 191 192 193 ... 491 492

Komentarze do niniejszej Instrukcji

Brak uwag