beautypg.com

Captive portals – NETGEAR AV Line M4250 GSM4210PX 8-Port Gigabit PoE+ Compliant Managed AV Switch with SFP (220W) User Manual

Page 631

background image

Table 157. DAI Statistics information (Continued)

Description

Field

The number of ARP packets that were dropped by DAI because the sender MAC address
in the ARP packets did not match the source MAC address in the Ethernet header.

Bad Source MAC

The number of ARP packets that were dropped by DAI because the target MAC address
in the ARP reply packets did not match the destination MAC address in the Ethernet
header.

Bad Dest MAC

The number of ARP packets that were dropped by DAI because the sender IP address
in the ARP packets or the target IP address in the ARP reply packets is invalid. Invalid
addresses include 0.0.0.0, 255.255.255.255, IP multicast addresses, class E addresses
(240.0.0.0/4), and loopback addresses (127.0.0.0/8).

Invalid IP

The number of valid ARP packets forwarded by DAI.

Forwarded

The number of invalid ARP packets dropped by DAI.

Dropped

Captive portals

The captive portal feature allows you to prevent clients from accessing the network until
user verification is established. You can configure captive portal verification to allow
access for both guest and authenticated users. Authenticated users must be validated
against a database of authorized captive portal users before access is granted. The
database can be stored locally on the switch or on a RADIUS server.

The authentication server supports both HTTP and HTTPS web connections. In addition,
you can configure a captive portal to use an optional HTTP port (in support of HTTP
proxy networks). If configured, this additional port is then used exclusively by the captive
portal. This optional port is in addition to the standard HTTP port 80, which is used for
all other web traffic.

If you enable the captive portal feature on a port, the port drops all traffic from
unauthenticated clients except for ARP, DHCP, DNS, and NETBIOS packets, which are
forwarded so that unauthenticated clients can get an IP address and resolve the host
name or domain names. Data traffic from authenticated clients goes through, and the
rules do not apply to these packets.

For a port on which you enable the captive portal feature, if an unauthenticated client
opens a web browser and tries to connect to network, the captive portal redirects all
HTTP and HTTPS traffic from unauthenticated clients to the authenticating server on the
switch. A captive portal web page is displayed for the unauthenticated client, allowing
the client to authenticate, after which the client receives access to the port.

The captive portal feature is not supported for VLAN interfaces, loopback interfaces,
and logical interfaces. The captive portal feature uses MAC-address based authentication

Main User Manual

631

Manage Switch Security

AV Line of Fully Managed Switches M4250 Series Main User Manual