Cisco Systems OL-29225-01 Film Camera User Manual


 
11-26
Cisco IOS Software Configuration Guide for Cisco Aironet Access Points
OL-30644-01
Chapter 11 Configuring Authentication Types
Guest Access Management
Step 4 Save the customized pages to the web server.
Step 5 In the access point GUI, browse to the Management > Guest Management Services page.
Step 6 Select Webauth Login.
Step 7 Browse and upload these pages from the web server:
Login Page
Success Page
Failure Page
Expired page
Note It is mandatory to load the Login page, Success page, Failure page, and Expired page when you
customize the guess access login.
Step 8 Select the file transfer method: FTP or TFTP.
Step 9 Enter the Username.
Step 10 Enter the Password.
Step 11 Enter the Allowed-In ACL Name and the Allowed-Out ACL Name.
Step 12 Click Close Window to save your changes.
Alternatively, you can use the following CLI commands to configure a customized guest access page.
Copy all edited files to the flash memory. Then, beginning in privileged EXEC mode, use these
commands to load all the edited files from flash:
ap(config)# ip auth-proxy proxy http login page file flash:web_login.html
ap(config)# ip auth-proxy proxy http success page file flash:web_success.html
ap(config)# ip auth-proxy proxy http failure page file flash:web_fail.html
ap(config)# ip auth-proxy proxy http login expired page file flash:web_logout.html
To configure the IP address of the web server (IP address here is 40.40.5.10) in the ACL, the following
commands are also required. Beginning in privileged EXEC mode, use these ACL commands:
ap(config)# dot11 webauth allowed incoming webauth_acl_in outgoing webaut_acl_out
ap(config)# ip access-list extended webauth_acl_in
ap(config-ext-nacl)# permit tcp any host 40.40.5.10 eq www
ap(config-ext-nacl)# permit tcp any host 40.40.5.10 eq 443
ap(config-ext-nacl)# permit tcp any host 40.40.5.10 eq 443
ap(config-ext-nacl)# exit
ap(config)# ip access-list extended webauth_acl_out
ap(config-ext-nacl)# permit tcp any host 40.40.5.10 eq www
ap(config-ext-nacl)# permit tcp any host 40.40.5.10 eq 443
ap(config-ext-nacl)# exit