Profile Overrides - Services

Use this option to override the guest access (captive portal) server configurations. You can also override the RADIUS server, DHCP server, Bonjour Gateway Forwarding Policy, and Imagotag Policy service settings.

To set or override the access point profile‘s services configuration:

  1. Go to Configuration → Devices → Device Overrides.

    The Device Overrides screen displays. This screen lists devices within the managed network.

  2. Select an access point.

    The selected access point's configuration menu displays.

  3. Expand Profile Overrides and select Services.

    The Services configuration screen displays.

    Click to expand in new window
    Profile Overrides - Service Configuration Screen
    GUID-AFA3A810-43DE-4BB2-808F-A58EBCDE3EE4-low.png
  4. In the Captive Portal Policies box, select one of the existing captive portals displayed. If needed click the Create link to create a new captive portal configuration that can be applied to this profile.

    A captive portal is guest access policy for providing guests temporary and restrictive access to the access point managed network.

    A captive portal provides secure authenticated access using a standard Web browser. Captive portals provides authenticated access by capturing and re-directing a wireless user's Web browser session to a captive portal login page where the user must enter valid credentials to access to the wireless network. Once logged into the captive portal, additional Agreement, Welcome and Fail pages provide the administrator with a number of options on screen flow and user appearance.

    For more information, see Captive Portal Policies.

  5. Use the RADIUS Server Application Policy drop-down menu to select an application policy to authenticate users and authorize access to the network.

    A RADIUS policy provides the centralized management of authentication data (usernames and passwords). When an client attempts to associate, the controller or service platform sends the authentication request to the RADIUS server. If an existing RADIUS server policy does not meet your requirements, click the Create link to create a new policy.

  6. Use the DHCP Server Policy drop-down menu assign this profile a DHCP server policy. If an existing DHCP policy does not meet the profile‘s requirements, click the Create icon to create a new policy configuration that can be applied to this profile, or click the Edit icon to modify the parameters of an existing DHCP Server policy.

    DHCP (Dynamic Host Configuration Protocol) allows hosts on an IP network to request and be assigned IP addresses as well as discover information about the network where they reside. Each subnet can be configured with its own address pool. Whenever a DHCP client requests an IP address, the DHCP server assigns an IP address from that subnet‘s address pool. When the onboard DHCP server allocates an address for a DHCP client, the client is assigned a lease, which expires after an predetermined interval. Before a lease expires, wireless clients (to which leases are assigned) are expected to renew them to continue to use the addresses. When the lease expires, the client is no longer permitted to use the leased IP address. The profile‘s DHCP server policy ensures all IP addresses are unique, and no IP address is assigned to a second client while the first client's assignment is valid (its lease has not expired).

  7. Use the DHCPv6 Server Policy drop-down menu assign this profile a DHCPv6 server policy. If an existing DHCP policy for IPv6 does not meet the profile‘s requirements, click the Create icon to create a new policy configuration that can be applied to this profile, or click the Edit icon to modify the parameters of an existing DHCP Server policy.

    DHCPv6 is a networking protocol for configuring IPv6 hosts with IP addresses, IP prefixes, or other configuration attributes required on an IPv6 network. DHCP in IPv6 works in with IPv6 router discovery. With the proper RA flags, DHCPv6 works like DHCP for IPv4. The central difference is the way a device identifies itself if assigning addresses manually instead of selecting addresses dynamically from a pool.

  8. Use the RADIUS Server Policy drop-down menu to select an existing RADIUS server policy to use as a user validation security mechanism with this profile.

    A profile can have its own unique RADIUS server policy to authenticate users and authorize access to the network. A profile‘s RADIUS policy provides the centralized management of controller or service platform authentication data (usernames and passwords). When an client attempts to associate, an authentication request is sent to the RADIUS server.

  9. Refer to the Bonjour Gateway field to select or set a Bonjour Gateway Forwarding Policy.

    Bonjour is Apple‘s implementation of Zeroconf (zero-configuration) networking. Zeroconf is a group of technologies that include service discovery, address assignment and hostname resolution. Bonjour locates devices such as printers, other computers and services that these computers offer over a local network.

    Bonjour Forwarding Policy enables discovery of services on VLANs which are not visible to the device running the Bonjour Gateway. Bonjour forwarding enables forwarding of Bonjour advertisements across VLANs to enable the Bonjour Gateway device to build a list of services and the VLANs where these services are available.

  10. Refer to the Imagotag Policy field to select or set a Imagotag Policy. Use the drop-down menu to select and apply an Imagotag Policy to the AP's profile. You can use the Create to create a new policy or Edit icon to edit an existing policy. The Imagotag feature is supported only on the AP-8432 model access point.

    For more information on enabling support for SES-imagotag‘s ESL tags on AP-8432 APs with USB interfaces, see Setting the Imagotag Policy.

  11. Select OK to save services configuration overrides.

    Select Reset to revert to the last saved configuration.