
Manage Rogue Access Points, Guest Network Access, and Users
145
ProSAFE Wireless Controller WC7600
The advanced Rogue AP screen displays.
6. Click the Browse button, navigate to the file containing the list of known access points, and
select it.
7. Next to Import Known List, select one of the following radio buttons:
• Merge. Merges the list of access points that you intend to import with the access points
that are already present in the Rogue List.
• Replace. Replaces the access points that are present in the Rogue List with the
access points in the file that you intend to import.
8. Click the Import button.
The wireless controller imports the MAC addresses that are in the text file into the Rogue
List table.
9. Click the Apply button.
Manage Guest Network Access
Users with management (admin) credentials—for example, receptionists or hotel clerks—can
provision guests. Guests must provide their email address, or both a login name and
password. These latter guests are referred to as captive portal users, for which you must set
up a captive portal and captive portal user credentials.
Note: The URL for the portal is http://<IP address>/guest_access/index.php
in which <IP address> is the IP address of the wireless controller.
Portal Concepts
Captive portal authentication is typically used for hotspot users and paying guests such as
hotel guests who purchase access time for an Internet connection. You can configure only a
single captive portal on the wireless controller.
The wireless controller supports two types of portal settings:
• Guest portal. Use this portal if all wireless users are allowed to access the network by
supplying only their email address. You do not need to define user names and passwords
for these users.
• Captive portal. Use this portal type if wireless users must supply their login name and
password before being allowing access the network. You must define user names and
passwords for these users (see
Manage Users, Accounts, and Passwords on page 150).
When you configure a captive portal, you can use either the wireless controller as a local
authentication server for the captive portal clients, or you can configure an external
RADIUS server for authentication.
Comentarios a estos manuales