[NEBULA] Authentication for captive portal
Hi @pinger, welcome to the Nebula community!
If you configure the radius server in the NSG (Gateway > Configure > My authentication server)
And then in Gateway > Configure > Network access method you configure an interfaces to sign-on with your radius server ("ZyxelRadius" in this example)
All the wireless and wired clients connecting to this interface will see the gateway captive portal and will need to authenticate using the credentials configured in your radius server.
On the other hand, if you have a NAP and only want to authenticate the wireless clients connecting to a specific SSID, you can configure the SSID authentication method to sign-on with your radius server in AP > Configure > Authentication:
This wireless clients will the AP captive portal and will need to authenticate using the credentials configured in your radius server.
Hope this is clear0
Hi, and thank you very much for your support; if I can authenticate against my radius server for wired clients on such interface, if I connect an AP on such interface I assume my WiFi clients would also get network access through captive portal, right?, and another big question is, does the request to my radius server come from an IP address in Nebula network? I mean, should I setup my radius server to allow requests from just a set of IP addresses on Nebula network, or does the request to my radius server come from my customer public internet address and so I should setup every single public IP address allowed to request on my radius server? and
I have another question related to Nebula, does it have an open API to get data from AP's on Nebula? (connected clients, passerby, location heatmap, etc...,and real time data support), if so, where can I get such info?0
If you configure the radius authentication in the security gateway, this (NSG) will be the radius client for your server.
Thus, if your topology is NSG (192.168.1.1) ----- Radius server (192.168.1.100), you will need to allow the request from the NSG IP address 192.168.1.1.
The idea is to authenticate against an external cloud based radius server, so I thought one of the advantages of cloud managed devices was requests on cloud services (such as radius authentication) were performed from a set of IP addresses (nebula ones) instead of customers public addresses where NSG devices are actually deployed. So are you sure requests would come from public IP addresses from our customers where NSG devices are actually deployed?0
The request would come from the public IP address of the network. Depending on the topology, the public IP might be the one configured in the NSG WAN interface or if you have the NSG behind a NAT router, it will be the public IP of that router.
You can check what's the public IP of your network in Gateway > Monitor > Security gateway:
In this example, the NSG is behind a NAT router. The cloud radius server will receive the request from 126.96.36.199.
It's also important to check the attributes needed for the cloud radius server. Currently, the NSG will send the radius attributes:
- User information: username and encrypted password
- NAS IP address: configurable on Nebula control center
- Calling station ID: the IP address of the client connecting to the network.
I saw you edited the previous post and I missed some of your questions there.
if I connect an AP on such interface I assume my WiFi clients would also get network access through captive portal, right?
- Right. WiFi clients will see the NSG captive portal
does it have an open API to get data from AP's on Nebula? (connected clients, passerby, location heatmap, etc...,and real time data support), if so, where can I get such info?
- Currently no API is available to get this information. If you have specific requirements for API, you can use the Ideas section to tell us more details about what kind of information you need to get.
Our radius server is just a cloud hosted radius service. Another question, If I choose Click-to-continue option as Network Access, is there any URL from Nebula Cloud I should use to add some parameters to gain network access from my captive portal?, I mean if I setup Network Access through "Click-to-continue" option, I assume clients connected to that interface (also WiFI clients if I connect an AP to such interface) should get access through captive portal, but the question is how my captive portal returns to Nebula an ok to allow network access after any kind of authentication?0
I have another question regarding an open API; we have a current development for dashboards which include info such as:
- Total devices in the area
- Connected vs Detected devices
- Repeated vs New (Repeated is a device that has already come to that place in the past).
- Total devices grouped by time granularity (To display a line chart with evolution over time).
- Total devices grouped by each zone (Previously registered in the system).
- Coordinates of each device (So we can display a heatmap).
- Image of the place (Floor plan).
- List of mac addresses (To match those mac addresses info with our db).
In your portfolio for Nebula options for businesses, both professional pack and its lifetime version support for "WiFI analytics integration (social media/3rd party AAA)" option, so is this feature related to a potential development on Zyxel based APs deployment which could include the above info?
I have been using my own captive portal with the NAP tho....But I guess it's the same.
On Nebula portal I just configured the URL of my external HTML page, no more parameters needed. But in your captive portal HTML code you obviously need to handle the submit event. I downloaded the template available in the captive portal page on the Nebula portal to use the same script.
"You will never walk along"1
So I assume the template includes the required code to control network access (to grant clients network access) after an authentication process from my captive portal code, right?, is it something like a post on Nebula cloud?0
- 8.1K All Categories
- 1.6K Nebula
- 60 Nebula Ideas
- 54 Nebula Status and Incidents
- 4.4K Security
- 224 Security Ideas
- 965 Switch
- 45 Switch Ideas
- 868 WirelessLAN
- 20 WLAN Ideas
- 5.2K Consumer Product
- 139 Service & License
- 268 News and Release
- 95 Success Stories
- 53 Security Advisories
- 12 Education Center
- 573 FAQ
- 273 Nebula FAQ
- 132 Security FAQ
- 73 Switch FAQ
- 72 WirelessLAN FAQ
- 7 Consumer Product FAQ
- 34 Nebula Monthly Express
- 71 About Community
- 44 Security Highlight