Configuration example, Network requirements, Configuration scheme – TP-Link Omada ER8411 VPN Router User Manual

Page 213: Network requirements configuration scheme, 1 network requirements, 2 configuration scheme

Advertising
background image

User Guide 204

Configuring Authentication

Configuration Example

7

Configuration Example

Here we take the application of Local Authentication as an example.

7.1 Network Requirements

A hotel needs to offer internet service to the guests and push hotel advertisement. For

network security, only the authorized guests can access the internet.

Figure 7-1 

Network Topology

Internet

Router

Clients

Clients

Clients

Core Switch

Access Switch

Access Switch

7.2 Configuration Scheme

For the hotel does not have an external Web server or Authentication server, it is

recommended to choose Local Authentication to meet this requirement.

To control the guests’ internet access, you can create local user accounts for the

guests. The guests need to use the accounts assigned to them to get authenticated,

then can visit the internet. The other people cannot visit the internet through the hotel’s

network without authentication accounts.

Advertising