Reference Manual

Manage Rogue Access Points, Guest Network Access, and Users
217
ProSAFE Wireless Controller WC9500
The wireless controller’s web management interface opens and displays the Summary
screen.
5. Select Configuration > Security > Advanced > Rogue AP.
The advanced Rogue AP screen displays.
6. Click the Browse button, navigate to the file containing the list of known access points, and
select it.
7. Next to Import Known List, select one of the following radio buttons:
Merge. Merges the list of access points that you intend to import with the access points
that are already present in the Rogue List.
Replace. Replaces the access points
that are present in the Rogue List
with the
access points in the file that you intend to import.
8. Click the Import button.
The wireless controller imports the MAC addresses that are in the text file into the Rogue
List table.
9. Click the Apply button.
The changes are saved.
Manage Guest Network Access
Users with management (admin) credentials—for example, receptionists or hotel clerks—can
provision guests. Guests must provide their email address, or both a login name and
password. These latter guests are referred to as captive portal users, for which you must set
up a captive portal and captive portal user credentials.
Note: The URL for the portal is http://<IP address>/guest_access/index.php
in which <IP address> is the IP address of the wireless controller.
Portal Concepts
Captive portal authentication is typically used for hotspot users and paying guests such as
hotel guests who purchase access time for an Internet connection. You can configure only a
single captive portal on the wireless controller.
The wireless controller supports two types of portal settings:
Guest portal. Use this portal if all wireless users are allowed to access the network by
supplying only their email address. You do not need to define user names and passwords
for these users.
Captive portal. Use this portal type if wireless users must supply their login name and
password before being allowing access the network. Y
ou must define user names and
passwords for these users (see Manage Users, Accounts, and Passwords on page 222).