If an External Portal server is used for authentication, you need to configure related parameters in the Portal server template, for example, the authentication protocol, to ensure that the device and Portal server can communicate.
The system view is displayed.
The Portal interconnection function of the HTTP or HTTPS protocol is enabled.
By default, the Portal interconnection function of the HTTP or HTTPS protocol is disabled.
A Portal server template is created and the Portal server template view is displayed.
By default, no Portal server template is created.
The protocol used in Portal authentication is set to HTTP or HTTPS.
By default, the Portal protocol is used in Portal authentication.
The default password encryption mode is none. Set the password encryption mode on the device to be the same as that on the Portal server.
The device is configured to allow users to submit user name and password information using the GET method during Portal authentication.
By default, the device does not allow users to submit user name and password information using the GET method during Portal authentication.
By default, the device allows users to submit user name and password information using the POST method during Portal authentication. Perform this step if the Portal server uses the GET method.
Parameters for parsing and replying to POST or GET request packets of the HTTP or HTTPS protocol are configured.
By default, the system has configured parameters for parsing and replying to POST or GET request packets of the HTTP or HTTPS protocol. For details, see the "Parameters" table in the http-method post command.
Configure command identification keywords on the device according to the configuration on the Portal server.
You can bind a URL or a URL template to a Portal server template. Compared with URL binding, URL template binding allows you to configure the redirect URL of the Portal server and configure the URL to carry parameters related to users or the access device. The Portal server then can obtain user terminal information based on parameters carried in the URL and provide different Portal authentication pages for different users. You can choose URL binding mode or URL template binding mode based on actual requirements.
URL binding mode
Run url url-string
A URL is configured for the Portal server.
By default, no URL is configured for the Portal server.
URL template binding mode
Create and configure a URL template.
Run quit
Return to the system view.
A URL template is created and the URL template view is displayed.
By default, no URL template is created on the device.
A redirect URL is configured for the Portal server.
By default, no redirect URL is configured for the Portal server.
Parameters carried in the URL are configured.
By default, a URL does not carry any parameters.
The MAC address format in the URL is configured.
By default, the MAC address format in a URL is XXXXXXXXXXXX.
Characters in the URL are configured.
By default, the start character in a URL is a question mark (?), the assignment character is an equal sign (=), and the delimiter between parameters is an ampersand (&).
Redirection parameters are set.
By default, the device automatically obtains redirection parameter values.
Run quit
Return to the system view.
Run web-auth-server server-name
The Portal server template view is displayed.
The URL template is bound to the Portal server template.
By default, no URL template is bound to a Portal server template.
Run quit
Return to the system view.
The function of inserting a JavaScript file during Portal redirection is enabled.
By default, the function of inserting a JavaScript file during Portal redirection is disabled.
Redirection based on the status code 302 is enabled for Portal authentication.
By default, redirection based on the status code 302 is disabled for Portal authentication.
An address or an address range is added to the HTTPS redirection blacklist. After an address is added to the HTTPS redirection blacklist, HTTPS redirection is not performed for HTTPS access to this address.
By default, no address is added to the HTTPS redirection blacklist.
An address or an address range is added to the HTTPS redirection whitelist.
By default, no address is added to the HTTPS redirection whitelist.
The aging time of addresses in the HTTPS redirection blacklist is configured.
By default, the aging time of addresses in the HTTPS redirection blacklist is 259200 seconds, that is, 72 hours.
The maximum rate at which a Portal user accesses an address through HTTPS. If the user access rate reaches the maximum, the switch adds the destination address to the HTTPS redirection blacklist.
By default, the maximum rate at which a Portal user accesses an address through HTTPS is 40 times per minute.
The maximum number of times and the detection period are configured. Within the detection period, if the number of times an address is added to the provisional HTTPS redirection blacklist reaches the maximum, the address is added to the HTTPS redirection blacklist.
By default, the maximum number of times is 10, the detection period is 3 minutes.