1. Setup Controller:1.1. Setup guest access:Configuration :: Wireless Network :: Guest Access: <create new>
General Options:
portal name = guest
language = english
Redirection:
start page = redirect to the url that the user intends to visit
guest access:
guest pass sms gateway = disabled
terms and conditions = show terms and conditions
"""
Guest WiFi Wireless Networking Acceptable Use Policy
the “Company" offers this guest WiFi wireless Internet service (the “Service”) according to this Guest WiFi Wireless Networking Acceptable Use Policy (the “Policy”) as a free, non-public service to its office visitors and vendors for the duration of their official visits at the any of the Company’s offices.
Company employees or contractors (referred to herein collectively as an “Employees”) using the Service must adhere to this Policy, the Company’s Acceptable Usage Policy for Information Technology, and the Company’s Information Security Policy, at all times. Employees found in violation of any of these policies may be subject to disciplinary action, including termination or legal action.
All users of this Service must agree to the terms of this Policy by clicking the ACCEPT button below.
The Company does not guarantee the Service or specific rates of speed. The Company has no control over information obtained through the Internet and cannot be held responsible for its content or accuracy. Use of the service is subject to the user’s own risk.
The Company reserves the right to remove, block, filter, or restrict by any other means any material that, in the Company’s sole discretion, may be illegal, may subject the Company to liability, or may violate this Policy. The Company may cooperate with legal authorities and/or third parties in the investigation of any suspected or alleged crime or civil wrong. Violations of this Policy may result in the suspension or termination of access to the Service or other Company resources, or other actions as detailed below.
Responsibilities of Service Users:
Users are responsible for ensuring they are running up-to-date anti-virus software on their wireless devices. Users must be aware that, as they connect their devices to the Internet through the Service, they expose their devices to: worms, viruses, Trojan horses, denial-of-service attacks, intrusions, packet-sniffing, and other abuses by third-parties.
Users must respect all copyrights. Downloading or sharing copyrighted materials is strictly prohibited.
The running of programs, services, systems, processes, or servers by a single user or group of users that may substantially degrade network performance or accessibility will not be allowed. Electronic chain letters and mail bombs are prohibited. Connecting to "Peer to Peer" file sharing networks or downloading large files, such as CD ISO images, is also prohibited.
Accessing another person's computer, computer account, files, or data without permission is prohibited. Attempting to circumvent or subvert system or network security measures is prohibited. Creating or running programs that are designed to identify security loopholes, to decrypt intentionally secured data, or to gain unauthorized access to any system is prohibited. Using any means to decode or otherwise obtain restricted passwords or access control information is prohibited. Forging the identity of a user or machine in an electronic communication is prohibited. Saturating network or computer resources to the exclusion of another's use, for example, by overloading the network with traffic such as emails or legitimate (file backup or archive) or malicious (denial of service attack) activity, is prohibited.
Users understand that wireless Internet access is inherently not secure, and users should adopt appropriate security measures when using the Service. The Company highly discourages users from conducting confidential transactions (such as online banking, credit card transactions, etc.) over any wireless network, including this Service.
Users are responsible for the security of their own devices.
Limitations of Wireless Network Access:
The Company is not liable for any damage, undesired resource usage, or detrimental effects that may occur to a user's device and/or software while the user’s device is attached to the Service.
The user is responsible for a
"""
web portal logo = logo.png {see within this doc's folder}
web portal title = Welcome to the Guest Access login page.
User session
session timeout = 1440 min
grace period = 60 min
<ok>
<create new>
General Options:
portal name = guest
language = english
Redirection:
start page = redirect to the url that the user intends to visit
guest access:
guest pass sms gateway = disabled
terms and conditions = show terms and conditions
"""
Guest WiFi Wireless Networking Acceptable Use Policy
The “Company” offers this guest WiFi wireless Internet service (the “Service”) according to this Guest WiFi Wireless Networking Acceptable Use Policy (the “Policy”) as a free, non-public service to its office visitors and vendors for the duration of their official visits at the any of the Company’s offices.
Company employees or contractors (referred to herein collectively as an “Employees”) using the Service must adhere to this Policy, the Company’s Acceptable Usage Policy for Information Technology, and the Company’s Information Security Policy, at all times. Employees found in violation of any of these policies may be subject to disciplinary action, including termination or legal action.
All users of this Service must agree to the terms of this Policy by clicking the ACCEPT button below.
The Company does not guarantee the Service or specific rates of speed. The Company has no control over information obtained through the Internet and cannot be held responsible for its content or accuracy. Use of the service is subject to the user’s own risk.
The Company reserves the right to remove, block, filter, or restrict by any other means any material that, in the Company’s sole discretion, may be illegal, may subject the Company to liability, or may violate this Policy. The Company may cooperate with legal authorities and/or third parties in the investigation of any suspected or alleged crime or civil wrong. Violations of this Policy may result in the suspension or termination of access to the Service or other Company resources, or other actions as detailed below.
Responsibilities of Service Users:
Users are responsible for ensuring they are running up-to-date anti-virus software on their wireless devices. Users must be aware that, as they connect their devices to the Internet through the Service, they expose their devices to: worms, viruses, Trojan horses, denial-of-service attacks, intrusions, packet-sniffing, and other abuses by third-parties.
Users must respect all copyrights. Downloading or sharing copyrighted materials is strictly prohibited.
The running of programs, services, systems, processes, or servers by a single user or group of users that may substantially degrade network performance or accessibility will not be allowed. Electronic chain letters and mail bombs are prohibited. Connecting to "Peer to Peer" file sharing networks or downloading large files, such as CD ISO images, is also prohibited.
Accessing another person's computer, computer account, files, or data without permission is prohibited. Attempting to circumvent or subvert system or network security measures is prohibited. Creating or running programs that are designed to identify security loopholes, to decrypt intentionally secured data, or to gain unauthorized access to any system is prohibited. Using any means to decode or otherwise obtain restricted passwords or access control information is prohibited. Forging the identity of a user or machine in an electronic communication is prohibited. Saturating network or computer resources to the exclusion of another's use, for example, by overloading the network with traffic such as emails or legitimate (file backup or archive) or malicious (denial of service attack) activity, is prohibited.
Users understand that wireless Internet access is inherently not secure, and users should adopt appropriate security measures when using the Service. The Company highly discourages users from conducting confidential transactions (such as online banking, credit card transactions, etc.) over any wireless network, including this Service.
Users are responsible for the security of their own devices.
Limitations of Wireless Network Access:
The Company is not liable for any damage, undesired resource usage, or detrimental effects that may occur to a user's device and/or software while the user’s device is attached to the Service.
The user is responsible for a
"""
web portal logo = logo.png {see within this doc's folder}
web portal title = Welcome to the Guest Access login page.
User session
session timeout = 1440 min
grace period = 60 min
<ok>
1.2. Create web auth portal: Configuration :: Wireless Network :: Web Authentication
<create new>
General Options:
Portal Name = guest
language = english
redirection
start page = redirect to the url that the user intends to visit
<ok>
1.3. Create WLANs:configuration :: Wireless Network :: WLANs :: WLAN configuration <create new> General Options:
name = Internal ssid = Internal
Wlan usage:
auth type = standard usage Auth Options: Method = open
encryption options:
method = wpa2 algorithm = aes passphrase = eC2$ta1Xd 802.11m MFP = disabled
Options:
wireless client isolation = disable priority = high radius options nas id = wlan bssid nas request timeout = 3 sec nas max numb of retries = 2 nas reconnect primary = 5 min called sta id = wlan bssid
advanced options:
access vlan = 212 max clients = up to 100 per ap 802.11d = supported inactivity timeout = 120 sec client fingerprinting = enabled mgmt tx rate = 2 mbps service schedule = always on
<apply>
<create new>
General Options:
name = Guest
ssid = Guest
Wlan usage:
auth type = Guest Access + Hotspot 2.0 Onboarding
Auth Options:
Method = open
encryption options:
method = none
Guest Access Portal:
guest portal service = guest
bypass cna = enabled
guest authentication = guest
Options:
wireless client isolation = enable
priority = high
radius options
nas id = wlan bssid
nas request timeout = 3 sec
nas max numb of retries = 2
nas reconnect primary = 5 min
called sta id = wlan bssid
advanced options:
access vlan = 211
max clients = up to 100 per ap
802.11d = supported
inactivity timeout = 1000 sec
client fingerprinting = enabled
mgmt tx rate = 2 mbps
service schedule = always on
<apply>
1.4. general AP configsConfiguration :: Wireless Network :: Access Points :: Common Settings General Options Country Code = Germany Location = FRA Location Additional Information = 106 South Rd. anywhere MA. USA AP Admin Login ID = admin pass = b8PsQmPt! AP Time Zone = follow system time zone <apply>
1.5. London AP Configs:Configuration :: Wireless Network :: Access Points :: APs AP Group: <create new> General Options: Name = LON Description = London Office Locaion = override selected = London UK EC1A 2AY GPS Coordinates = override Lat = 51 Lon = -0.08 Radio Options: Channelization = overide, auto Channel = override, auto TX Power = override, full wlan group = override, default <apply> 1.6. Guest Passes:Configuration :: Identity :: Guests :: Guest Passes <Import Guest Pass> select "guestpass.csv" in this doc's root dir. <import> 1.7. Confirm AP OS Version:Administration :: Upgrade See what the current AP firmware version history is. Then make sure that the firmware version in the below statement matches.
2. Setup the AP:2.1. Login to AP 2.2. setup and download newest firmware.fw set host 10.120.82.41 fw set control wsg/firmware/R500_3.1.1.0.348.rcks fw set port 91 fw set proto http fw show fw update fw set reboot 0
2.3. link AP to Controller:set scg enable set scg ip 10.120.82.41 get scg 3. Link AP to Controller:3.1. # 4.2 Add AP:Configuration :: Wireless Network :: Access Points :: APs select the site you want to add the APs into, and then under select the new APs and add it to the group |