Overview 1.2. features – SMC Networks SMCWHSG44-G User Manual
Page 19
1.1. Overview
1.2. Features
• User Authentication, Authorization, and Accounting (AAA)
• Web redirection - When an unauthenticated wireless user is trying to
access a Web page, he/she is redirected to a logon page for entering the
user name and password. Then, the user credential information is sent
to a back-end RADIUS server for authentication or via the Local
Authentication Database.
• Local pages or external pages - The SMCWHSG44-G can be configured
to use log-on, log-off, authentication success, and authentication failure
pages, which are stored internally or stored in an external Web server
maintained by the WISP. The contents of the local authentication
pages can be customized.
• Advertisement links - The log-off authentication page can be configured
to show a sequence of advertisement banners.
• Unrestricted clients - Client computers with specific IP addresses or
MAC ad-dresses can bypass the Web redirection-based access control.
• Walled garden. Some specific URLs can be accessed without authentication.
These URLs can be exploited by WISPs or Hotspot Venues for adver-
tisement purposes.
• IEEE 802.1x - If a wireless client computer supports IEEE 802.1x Port-
Based Network Access Control, the user of the computer can be authen-
ticated by the Wireless Hotspot Gateway and wireless data can be encrypted
by 802.1x EAP authentication method combined with WEP encryption.
• RADIUS client - The SMCWHSG44-G communicates with a back-end
RADIUS server for wireless user authentication, authorization, and
accounting. Authentication methods, including EAP-MD5, EAP-TLS/EAP-
TTLS, PAP, and CHAP are supported.
• Internal Database - The Wireless Hotspot Gateway also supports an
Internal Database of users so that you do not have to add an additional
Radius Server. The Internal Database supports up to 2,000 user accounts.
• Robustness - To enhance AAA integrity, the Wireless Hotspot Gateway
can be configured to notify the RADIUS server after it reboots.
• Authenticated users - Shows the status and statistics of every
authenticated user. And an authenticated user can be terminated at
any time for management purposes.
• Authentication session control - Several mechanisms are provided for
the network administrator to control user authentication session lifetimes.
• IEEE 802.11b/g Compliant
• Wireless Operation
• Access Point - The AP enables IEEE 802.11 Stations (STAs) to automatically
associate with it via the standard IEEE 802.11 association process. In
addition, the IEEE 802.11 WDS (Wireless Distribution System) technology
can be used to manually establish wireless links between two APs.
18