All new captive portal instances are also assigned to the "Default" group. The administrator can create new groups and modify the user/group association to only allow a subset of users access to a specific captive portal instance. Network access is granted upon successful verification of user credentials.

A remote RADIUS server can be used for client authentication. RADIUS authentication and accounting servers are configured separately from the captive portal configuration. In order to perform authentication/accounting via RADIUS, the administrator configures one or more RADIUS servers and then references the server(s) using their name in the captive portal configuration (each captive portal instance can be assigned one RADIUS authentication server and one RADIUS accounting server). If RADIUS is enabled for a captive portal configuration and no RADIUS servers are assigned, the captive portal activation status indicates the instance is disabled with an appropriate reason code.

The Table 5-1 shows the RADIUS attributes that are used to configure captive portal users. The table indicates both RADIUS attributes and vendor specific attributes (VSA) that are used to configure Captive Portal. VSAs are denoted in the id column and are comma delimited (vendor id, attribute id).

Table 5-1. Captive Portal RADIUS Attributes

 

 

 

Radius Attribute

#

Description

Range

Usage

Default

User-Name

1

User name to be authorized

1-32 characters

Required

None

User-Password

2

User password

8-64 characters

Required

None

Session-Timeout

27

Logout once session timeout is

Integer

Optional

0

 

 

reached (seconds). If the attribute is 0

(seconds)

 

 

 

 

or not present then use the value

 

 

 

 

 

configured for the captive portal.

 

 

 

Captive-Portal-

6231,

A comma-delimited list of group

String

Optional

None; the

Groups

127

names that correspond to the

 

 

default group

 

 

configured CP instance

 

 

is used if not

 

 

configurations.

 

 

defined here.

A Captive Portal instance can be configured to use the HTTPS protocol during its user verification process. The connection method for HTTPS uses the Secure Sockets Layer (SSL) protocol which requires a certificate to provide encryption. The certificate is presented to the user at connection time.

The Captive Portal component uses the same certificate that is used by the switch for Secure HTTP connections. This certificate can be generated by the administrator using a CLI command. If a captive portal instance is configured for the HTTPS protocol and there is not a valid certificate present on the system, the captive portal instance status shows Disabled with an appropriate reason code.

Client Authentication Logout Request

The administrator can configure and enable 'user logout'. This feature allows the authenticated client to deauthenticate from the network.

Device Security

127

Page 127
Image 127
Dell 6200 SERIES manual 127, Description Range Usage Default

6200 SERIES specifications

The Dell 6200 Series is a notable line of workstations designed for professionals seeking powerful computing solutions in fields such as engineering, architecture, and design. With its robust architecture and advanced technology, this series stands out for its ability to handle demanding applications while offering reliability and performance.

One of the key features of the Dell 6200 Series is its powerful processing capabilities. It typically includes Intel Xeon processors, which provide multiple cores to manage multitasking efficiently. This allows users to run complex simulations or render high-resolution graphics without experiencing lag or slowdown. The processors are designed for optimal thermal management, allowing for sustained performance during extended work sessions.

Another significant aspect of the Dell 6200 Series is its graphics capabilities. These workstations often come equipped with NVIDIA or AMD professional-grade graphics cards, ensuring that they are equipped to handle graphically intensive tasks, such as 3D modeling and video editing. The support for advanced rendering technologies allows professionals to work with high-fidelity visuals and complex datasets with ease.

In terms of expandability, the Dell 6200 Series is designed with flexibility in mind. Users can customize their workstations with a range of configurations, including varied RAM capacities and storage options. This flexibility ensures that the workstation can be tailored to meet the specific requirements of different workloads. The incorporation of Solid State Drives (SSDs) enhances data access speeds, significantly improving boot times and overall system responsiveness.

Additionally, the Dell 6200 Series includes comprehensive connectivity options to facilitate integration with various peripherals and networks. With multiple USB ports, Ethernet ports, and support for multiple display outputs, users can connect to external devices easily, promoting an efficient workflow.

Security features are also a priority in this series. The workstations typically include advanced security measures, such as TPM (Trusted Platform Module) technology, which helps protect sensitive data through hardware encryption and secure storage.

Overall, the Dell 6200 Series delivers a blend of power, flexibility, and security that makes it an excellent choice for professionals in need of a dependable workstation. With its advanced technologies and ample expansion options, users can feel confident that their equipment can handle both current and future demands, making it a smart investment for any professional environment.