Configuration example, Network requirements, Configuration scheme – TP-Link Omada ER8411 VPN Router User Manual
Page 213: Network requirements configuration scheme, 1 network requirements, 2 configuration scheme

User Guide 204
Configuring Authentication
Configuration Example
7
Configuration Example
Here we take the application of Local Authentication as an example.
7.1 Network Requirements
A hotel needs to offer internet service to the guests and push hotel advertisement. For
network security, only the authorized guests can access the internet.
Figure 7-1
Network Topology
Internet
Router
Clients
Clients
Clients
Core Switch
Access Switch
Access Switch
7.2 Configuration Scheme
For the hotel does not have an external Web server or Authentication server, it is
recommended to choose Local Authentication to meet this requirement.
■
To control the guests’ internet access, you can create local user accounts for the
guests. The guests need to use the accounts assigned to them to get authenticated,
then can visit the internet. The other people cannot visit the internet through the hotel’s
network without authentication accounts.