![]() ![]()
In the case of access via captive portal instead, the Access Points are programmed in open mode, that is without any authentication and encryption. In addition to authentication, traffic encryption is also guaranteed between client and Access Point. WPA/WPA2 Enterprise, which requires Wi-Fi Access Points associate a client only if the user has valid credentials verified by a RADIUS server using 802.1x. Authentication and traffic encryption via WPA/WPA2 Enterprise.In order to obtain this functionality you can use one or both of the following methods of access: In particular, the accounting can allow the management of prepaid connections in which the user must have a Credit to be online. In addition, through accounting, you can set limits on traffic and time over which the user is disconnected from the network. Often the purpose of accounting is to allow the charging of costs for traffic in Megabytes and time in minutes of connection. The accounting, however, in addition to tracking the beginning and end of the connection, record the time and traffic for connection of a user. #Captive portal register access registrationMind you that logging does not include registration of URLs or worse content that the user had access, but simply record the date and time of start and end of each of the connections to the Internet of the user and the IP address associated with the client (usually a laptop) from where the connection took place. The access log is sometimes required by law, because it allows us to trace the perpetrators of illicit activities. #Captive portal register access passwordThe authentication, that is the ability to uniquely identify the user and then grant access to the network, it can be done via username and password or through a X.509 digital certificate that could be stored on smart card.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |