HiPath Wireless Controller, Access Points and Convergence Software, V4.0 C10/C100/C1000 User Guide
HiPath Wireless Controller, Access Points and Convergence Software, V4.0 C10/C100/C1000 User Guide
Warning
Hackers who unlawfully gain access to customer telecommunications systems are criminals.
Currently, we do not know of any telecommunications system that is immune to this type of
criminal activity. Siemens AG will not accept liability for any damages which result from
unauthorized use. Although Siemens has designed security features into its products, it is
your sole responsibility to use the security features and to establish security practices within
your company, including training, security awareness, and call auditing.
Siemens sales and service personnel, as well as Siemens business partners, are available
to work with you to help you guard against this unauthorized use of your telecommunications
system.
July 2006
No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in
any form or by any means, mechanical, electronic, photocopying, recording, or otherwise,
without prior written permission of Siemens. The software described in this publication is
furnished under a license agreement and may be used only in accordance with the terms of
that agreement.
Request Siemens publications from your Siemens representative or the Siemens branch
serving you.
Content 0
Notes identify useful information that is not essential, such as reminders, tips, or
> other ways to perform a task.
Dangers
● Replace the power cable immediately if it shows any sign of damage.
● Replace any damaged safety equipment (covers, labels and protective cables)
immediately.
● Use only original accessories or components approved for the system. Failure to observe
these instructions may damage the equipment or even violate safety and EMC regulations.
● Only authorized Siemens service personnel are permitted to service the system.
Warnings
● This device must not be connected to a LAN segment with outdoor wiring.
● Ensure that all cables are run correctly to avoid strain.
● Replace the power supply adapter immediately if it shows any sign of damage.
● Disconnect all power before working near power supplies unless otherwise instructed by a
maintenance procedure.
● Exercise caution when servicing the hot swappable power supply of the HiPath Wireless
Controller (C100/C1000).
● Exercise caution when servicing hot swappable HiPath Wireless Controller components:
power supplies or fans. Rotating fans can cause serious personal injury.
● This unit may have more than one power supply cord. To avoid electrical shock, disconnect
all power supply cords before servicing. In the case of unit failure of one of the power
supply modules, the module can be replaced without interruption of power to the HiPath
Wireless Controller. However, this procedure must be carried out with caution. Wear gloves
to avoid contact with the module, which will be extremely hot.
● There is a risk of explosion if a lithium battery is not correctly replaced. The lithium battery
must be replaced only by an identical battery or one recommended by the manufacturer.
● Always dispose of lithium batteries properly.
● Do not attempt to lift objects that you think are too heavy for you.
Cautions
● Check the nominal voltage set for the equipment (operating instructions and type plate).
High voltages capable of causing shock are used in this equipment. Exercise caution when
measuring high voltages and when servicing cards, panels, and boards while the system
is powered on.
● Only use tools and equipment that are in perfect condition. Do not use equipment with
visible damage.
● To protect electrostatic sensitive devices (ESD), wear a wristband before carrying out any
work on hardware.
● Lay cables so as to prevent any risk of them being damaged or causing accidents, such as
tripping.
1.6 Sicherheitshinweise
Gefahrenhinweise
● Sollte das Netzkabel Anzeichen von Beschädigungen aufweisen, tauschen Sie es sofort
aus.
● Tauschen Sie beschädigte Sicherheitsausrüstungen (Abdeckungen, Typenschilder und
Schutzkabel) sofort aus.
● Verwenden Sie ausschließlich Originalzubehör oder systemspezifisch zugelassene
Komponenten. Die Nichtbeachtung dieser Hinweise kann zur Beschädigung der
Ausrüstung oder zur Verletzung von Sicherheits- und EMV-Vorschriften führen.
● Das System darf nur von autorisiertem Siemens-Servicepersonal gewartet werden.
Warnhinweise
● Dieses Gerät darf nicht über Außenverdrahtung an ein LAN-Segment angeschlossen
werden.
● Stellen Sie sicher, dass alle Kabel korrekt geführt werden, um Zugbelastung zu vermeiden.
● Sollte das Netzteil Anzeichen von Beschädigung aufweisen, tauschen Sie es sofort aus.
● Trennen Sie alle Stromverbindungen, bevor Sie Arbeiten im Bereich der Stromversorgung
vornehmen, sofern dies nicht für eine Wartungsprozedur anders verlangt wird.
● Gehen Sie vorsichtig vor, wenn Sie an der Hotswap-fähigen Stromversorgung des HiPath
Wireless Controllers (C100/C1000) Servicearbeiten durchführen.
● Gehen Sie vorsichtig vor, wenn Sie an Hotswap-fähigen HiPath Wireless Controller-
Komponenten (Stromversorgungen oder Lüftern) Servicearbeiten durchführen.
Rotierende Lüfter können ernsthafte Verletzungen verursachen.
● Dieses Gerät ist möglicherweise über mehr als ein Netzkabel angeschlossen. Um die
Gefahr eines elektrischen Schlages zu vermeiden, sollten Sie vor Durchführung von
Servicearbeiten alle Netzkabel trennen. Falls eines der Stromversorgungsmodule ausfällt,
kann es ausgetauscht werden, ohne die Stromversorgung zum HiPath Wireless Controller
zu unterbrechen. Bei dieser Prozedur ist jedoch mit Vorsicht vorzugehen. Das Modul kann
extrem heiß sein. Tragen Sie Handschuhe, um Verbrennungen zu vermeiden.
● Bei unsachgemäßem Austausch der Lithium-Batterie besteht Explosionsgefahr. Die
Lithium-Batterie darf nur durch identische oder vom Händler empfohlene Typen ersetzt
werden.
● Achten Sie bei Lithium-Batterien auf die ordnungsgemäße Entsorgung.
● Versuchen Sie niemals, ohne Hilfe schwere Gegenstände zu heben.
Vorsichtshinweise
● Überprüfen Sie die für die Ausrüstung festgelegte Nennspannung (Bedienungsanleitung
und Typenschild). Diese Ausrüstung arbeitet mit Hochspannung, die mit der Gefahr eines
elektrischen Schlages verbunden ist. Gehen Sie mit großer Vorsicht vor, wenn Sie bei
eingeschaltetem System Hochspannungen messen oder Karten, Schalttafeln und
Baugruppen warten.
● Verwenden Sie nur Werkzeuge und Ausrüstung in einwandfreiem Zustand. Verwenden Sie
keine Ausrüstung mit sichtbaren Beschädigungen.
● Tragen Sie bei Arbeiten an Hardwarekomponenten ein Armband, um elektrostatisch
gefährdete Bauelemente (EGB) vor Beschädigungen zu schützen.
● Verlegen Sie Leitungen so, dass sie keine Unfallquelle (Stolpergefahr) bilden und nicht
beschädigt werden.
Dangers
● Si le cordon de raccordement au secteur est endommagé, remplacez-le immédiatement.
● Remplacez sans délai les équipements de sécurité endommagés (caches, étiquettes et
conducteurs de protection).
● Utilisez uniquement les accessoires d'origine ou les modules agréés spécifiques au
système. Dans le cas contraire, vous risquez d'endommager l'installation ou d'enfreindre
les consignes en matière de sécurité et de compatibilité électromagnétique.
● Seul le personnel de service Siemens est autorisé à maintenir/réparer le système.
Avertissements
● Cet appareil ne doit pas être connecté à un segment de LAN à l'aide d'un câblage
extérieur.
● Vérifiez que tous les câbles fonctionnent correctement pour éviter une contrainte
excessive.
● Si l'adaptateur d'alimentation présente des dommages, remplacez-le immédiatement.
● Coupez toujours l'alimentation avant de travailler sur les alimentations électriques, sauf si
la procédure de maintenance mentionne le contraire.
● Prenez toutes les précautions nécessaires lors de l'entretien/des réparations du module
d'alimentation du HiPath Wireless Controller pouvant être branché à chaud (C100/C1000).
● Prenez toutes les précautions nécessaires lors de l'entretien/réparations des modules du
HiPath Wireless Controller pouvant être branchés à chaud : alimentations électriques ou
ventilateurs.Les ventilateurs rotatifs peuvent provoquer des blessures graves.
● Cette unité peut avoir plusieurs cordons d'alimentation.Pour éviter tout choc électrique,
débranchez tous les cordons d'alimentation avant de procéder à la maintenance.En cas de
panne d'un des modules d'alimentation, le module défectueux peut être changé sans
éteindre le HiPath Wireless Controller. Toutefois, ce remplacement doit être effectué avec
précautions. Portez des gants pour éviter de toucher le module qui peut être très chaud.
● Le remplacement non conforme de la batterie au lithium peut provoquer une explosion.
Remplacez la batterie au lithium par un modèle identique ou par un modèle recommandé
par le revendeur.
● Sa mise au rebut doit être conforme aux prescriptions en vigueur.
● N'essayez jamais de soulever des objets qui risquent d'être trop lourds pour vous.
Précautions
● Contrôlez la tension nominale paramétrée sur l'installation (voir le mode d'emploi et la
plaque signalétique). Des tensions élevées pouvant entraîner des chocs électriques sont
utilisées dans cet équipement. Lorsque le système est sous tension, prenez toutes les
précautions nécessaires lors de la mesure des hautes tensions et de l'entretien/réparation
des cartes, des panneaux, des plaques.
● N'utilisez que des appareils et des outils en parfait état. Ne mettez jamais en service des
appareils présentant des dommages visibles.
● Pour protéger les dispositifs sensibles à l'électricité statique, portez un bracelet
antistatique lors du travail sur le matériel.
● Acheminez les câbles de manière à ce qu'ils ne puissent pas être endommagés et qu'ils
ne constituent pas une source de danger (par exemple, en provoquant la chute de
personnes).
2 Regulatory information
This chapter provides the regulatory information for the HiPath Wireless Controller
C10/C100/C1000/C2400 and the AP2610 and AP2620 (AP26XX series) wireless access
points.
Configuration of the AP26XX frequencies and power output are controlled by the regional
software purchased with the HiPath Wireless Controller and is downloaded from the server
upon initial set-up. Customers are only allowed to download the software related to that
customers geographic location, thus allowing the proper set-up of Access Points in accordance
with local laws and regulations. The AP26XX must not be operated until proper regional
software is downloaded and properly configured.
The HiPath Wireless Controllers are in compliance with the European Directive
7 2002/95/EC on the restriction of the use of certain hazardous substances (RoHS) in
electrical and electronic equipment.
Conformance Standards
Safety
● cULus Listed Device UL 60950:2000, 3rd Edition (North America)
● CSA C22.2 No.60950:2000, 3rd Edition (Canadian Safety)
● 73/23/EEC Low Voltage Directive (LVD)
● EN 60950-1:2001 (European Safety)
● CB Certification: IEC 60950:1999, 3rd Edition with applicable National Differences
RoHS
● European Directive 2002/95/EC
Operation in the European Community and rest of the world may be dependant on
> securing local licenses/certifications/regulatory approvals.
Safety
● UL 60950-1:2003, 1st Edition
● UL 2043 Plenum Rated as part of UL 60950. Suitable for use in environmental air space in
accordance with Section 300.22.C of the National Electrical Code.
EMC
● FCC CFR 47 Part 15, Class B
Radio Transceiver
● FCC ID: REB-APXXX1
● CFR 47 Part 15.247, Subpart C (2.4 GHz)
● CFR 47 Part 15.407, Subpart E (5 GHz)
Other
● IEEE 802.11a (5 Ghz)
● IEEE 802.11b/g (2.4 GHz)
The AP26XX must be installed and used in strict accordance with the manufacturer's
> instructions as described in this guide and the quick start guide for the device to
which AP26XX is connected. Any other installation or use of the product violates
FCC Part 15 regulations.
According to FCC, the AP2610 with internal antenna can use the UNII 5.15 - 5.25
GHz band only with indoor installations in accordance with 47 CFR 15.407(e).
AP2620 with external antenna is not allowed to operate in this band in accordance
with 47 CFR 15.407(d).
This Part 15 radio device operates on a non-interference basis with other devices
operating at the same frequency when using antennas provided or other Siemens
certified antennas. Any changes or modification to the product not expressly
approved by Siemens could void the user's authority to operate this device.
The radiated output power of the AP26XX is far below the FCC radio frequency
> exposure limits as specified in "Guidelines for Human Exposure to Radio Frequency
Electromagnetic Fields" (OET Bullet 65, Supplement C). This equipment should be
installed and operated with a minimum distance of 20 centimeters (8 inches)
between the radiator and your body or other co-located operating antennas.
This device complies with Part 15 of the FCC Rules and Canadian Standard RSS-210.
Operation is subject to the following conditions: (1) This device may not cause harmful
interference, and (2) this device must accept any interference received, including interference
that may cause undesired operation. This Class B digital apparatus complies with Canadian
ICES-003.
This equipment meets the following conformance standards:
Safety
● cULus Listed C22.2 No.60950-1-03, 1st Edition
● UL 2043 Plenum Rated as part of UL 60950. Suitable for use in environmental air space in
accordance with Sections 2-128, 12-010(3) and 12-100 of the Canadian Electrical Code,
Part 1, C22.1
EMC
● ICES-003, Class B
Radio Transceiver
● IC: 4702A-APXXXX
● RSS-210 (2.4 GHz and 5GHz)
Other
● IEEE 802.11a (5 GHz)
● IEEE 802.11b/g (2.4 GHz)
● IEEE 802.3af (PoE)
The wireless APs are in compliance with the European Directive 2002/95/EC on the
7 restriction of the use of certain hazardous substances (RoHS) in electrical and
electronic equipment.
English Hereby, Siemens, declares that this Radio LAN device is in compliance with the
essential requirements and other relevant provisions of Directive 1999/5/EC.
Finnish Valmistaja Siemens vakuuttaa täten että Radio LAN device tyyppinen laite on
direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden
ehtojen mukainen.
Dutch Hierbij verklaart Siemens dat het toestel Radio LAN device in overeenstemming
is met de essentiële eisen en de andere relevante bepalingen van richtlijn 1999/
5/EG.
Bij deze verklaart Siemens dat deze Radio LAN device voldoet aan de
essentiële eisen en aan de overige relevante bepalingen van Richtlijn 1999/5/
EC.
French Par la présente Siemens déclare que l'appareil Radio LAN device est conforme
aux exigences essentielles et aux autres dispositions pertinentes de la directive
1999/5/CE.
Par la présente, Siemens déclare que ce Radio LAN device est conforme aux
exigences essentielles et aux autres dispositions de la directive 1999/5/CE qui
lui sont applicables.
Swedish Härmed intygar Siemens att denna Radio LAN device står I överensstämmelse
med de väsentliga egenskapskrav och övriga relevanta bestämmelser som
framgår av direktiv 1999/5/EG.
Danish Undertegnede Siemens erklærer herved, at følgende udstyr Radio LAN device
overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF.
German Hiermit erklärt Siemens, dass sich dieser/diese/dieses Radio LAN device in
Übereinstimmung mit den grundlegenden Anforderungen und den anderen
relevanten Vorschriften der Richtlinie 1999/5/EG befindet". (BMWi)
Hiermit erklärt Siemens die Übereinstimmung des Gerätes Radio LAN device
mit den grundlegenden Anforderungen und den anderen relevanten
Festlegungen der Richtlinie 1999/5/EG. (Wien).
Greek ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ Siemens ΔΗΛΩΝΕΙ ΟΤΙ Radio LAN device
ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ
ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ 1999/5/ΕΚ.
Icelandic Siemens lysir her med yfir að thessi bunadur, Radio LAN device, uppfyllir allar
grunnkrofur, sem gerdar eru i R&TTE tilskipun ESB nr 1999/5/EC.
Italian Con la presente Siemens dichiara che questo Radio LAN device è conforme ai
requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva
1999/5/CE.
Spanish Por medio de la presente Siemens declara que el Radio LAN device cumple con
los requisitos esenciales y cualesquiera otras disposiciones aplicables o
exigibles de la Directiva 1999/5/CE.
Portuguese Siemens declara que este Radio LAN device está conforme com os requisitos
essenciais e outras disposições da Directiva 1999/5/CE.
Malti Hawnhekk, Siemens, jiddikjara li dan Radio LAN device jikkonforma mal-htigijiet
essenzjali u ma provvedimenti ohrajn relevanti li hemm fid-Dirrettiva 1999/5/EC.
Estonian Käesolevaga kinnitab Siemens seadme Radio LAN device vastavust direktiivi
1999/5/EÜ põhinõuetele ja nimetatud direktiivist tulenevatele teistele
asjakohastele sätetele.
Hungary Alulírott, Siemens nyilatkozom, hogy a Radio LAN device megfelel a vonatkozó
alapvetõ követelményeknek és az 1999/5/EC irányelv egyéb elõírásainak.
Slovak Siemens týmto vyhlasuje, _e Radio LAN device spåòa základné po_iadavky a
všetky príslušné ustanovenia Smernice 1999/5/ES.
Czech Siemens tímto prohlašuje, _e tento Radio LAN device je ve shodì se
základními po_adavky a dalšími pøíslušnými ustanoveními smìrnice 1999/5/ES."
Slovenian Šiuo Siemens deklaruoja, kad šis Radio LAN device atitinka esminius
reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas.
Latvian Ar ðo Siemens deklarç, ka Radio LAN device atbilst Direktîvas 1999/5/EK
bûtiskajâm prasîbâm un citiem ar to saistîtajiem noteikumiem
Lithuanian Siemens deklaruoja, kad Radio LAN device atitinka 1999/5/EC Direktyvos
esminius reikalavimus ir kitas nuostatas".
Polish Niniejszym, Siemens, deklarujê, ¿e Radio LAN device spe³nia wymagania
zasadnicze oraz stosowne postanowienia zawarte Dyrektywie 1999/5/
EC.
Safety
● 73/23/EEC Low Voltage Directive (LVD)
● CB Scheme, IEC 60950-1:2001, 1st Edition with all available National Differences
● Plenum Rated Enclosure
Radio Transceiver
● R&TTE Directive 1999/5/EC
● ETSI/EN 300 328-2 2003-04 (2.4 GHz)
● ETSI/EN 301 893-1 2002-07 (5 GHz)
Other
● IEEE 802.11a (5 Ghz)
● IEEE 802.11b/g (2.4 GHz)
● IEEE 802.3af (PoE)
RoHS
● European Directive 2002/95/EC
The AP26XX wireless access points with Internal and External antennas are
designed to be operated only indoors within all countries of the European
Community. Some countries require limited channels of operation for indoor use.
These restrictions are described in this section.
● The AP2610 and AP2620 wireless access points require the end user or
installer to ensure that they have a valid license prior to operating the AP26XX.
The license contains the region and the region exposes the country codes which
allow for proper configuration in conformance with European National spectrum
usage laws.
● There is a default group of settings that each AP26XX receives when it connects
to the controller. There is the ability to change these settings. The user or
installer is responsible to ensure that each wireless AP is properly configured.
● The software within the controller will automatically limit the allowable channels
and output power determined by the current country code entered. Incorrectly
entering the country of operation or identifying the proper antenna used, may
result in illegal operation and may cause harmful interference to other systems.
● This device employs a radar detection feature required for European
Community operation in the 5 GHz band. This feature is automatically enabled
when the country of operation is correctly configured for any European
Community country. The presence of nearby radar operation may result in
temporary interruption of operation of this device. The radar detection feature
will automatically restart operation on a channel free of radar.
● The 5 GHz Turbo Mode feature is not enabled for use on the AP2610 and
AP2620 access points.
● The AutoChannelSelect/SmartSelect setting of the 5 GHz described in this user
guide must always remain enabled to ensure that automatic 5 GHz channel
selection complies with European requirements.
● The 5150- 5350 MHz band, channels 36, 40, 44, 48, 52, 56, 60, or 64, are
restricted to indoor use only.
● The AP2620 with external antenna must be used only with the factory installed
antennas, which are certified by Siemens.
● The 2.4 GHz band, channels 1 - 13, may be used for indoor or outdoor use but
there may be some channel restrictions.
● In Italy, the end user must apply for a license from the national spectrum
authority to operate outdoors.
● In Belgium, outdoor operation is only permitted using the 2.46 - 2.4835 GHz
band: Channel 13.
● In France, outdoor operation is only permitted using the 2.4 - 2.454 GHz band:
Channels 1 - 7.
It is the responsibility of the end user to enter the proper country code for the country
> the device will be operated within.
To allow the wireless devices to communicate with computers on a wired network, the access
points must be connected to the wired network providing access to the networked computers.
This topology is called bridging. With bridging, security and management scalability is often a
concern.
The wireless devices and the wired networks communicate with each other using standard
networking protocols and addressing schemes. Most commonly, Internet Protocol (IP)
addressing is used.
As illustrated in Figure 2, the HiPath Wireless Controller appears to the existing network as if it
were an access point, but in fact one HiPath Wireless Controller controls many Wireless APs.
The HiPath Wireless Controller has built-in capabilities to recognize and manage the Wireless
APs. The HiPath Wireless Controller:
● Activates the Wireless APs
● Enables Wireless APs to receive wireless traffic from wireless devices
● Processes the data traffic from the Wireless APs
● Forwards or routes the processed data traffic out to the network
● Authenticates requests and applies access policies
Simplifying the Wireless APs makes them cost-effective, easy to manage, and easy to deploy.
Putting control on an intelligent centralized HiPath Wireless Controller enables:
● Centralized configuration, management, reporting, and maintenance
● High security
● Flexibility to suit enterprise
● Scalable and resilient deployments with a few HiPath Wireless Controllers controlling
hundreds of Wireless APs
● Web Authentication Server – A server that can be used for external Captive Portal and
external authentication. The HiPath Wireless Controller has an internal Captive portal
presentation page, which allows Web authentication (Web redirection) to take place
without the need for an external captive portal server.
● RADIUS Accounting Server (Remote Access Dial-In User Service) (RFC2866) – A
server that is required if RADIUS Accounting is enabled.
● Simple Network Management Protocol (SNMP) – A Manager Server that is required if
forwarding SNMP messages is enabled.
● Check Point Server (Check Point Event Logging API) – A server for security event logging
that is required if a firewall application is enabled. Checkpoint ELA certification for OPSEC
is provided.
● Network infrastructure – The Ethernet switches and routers must be configured to allow
routing between the various services noted above. Routing must also be enabled between
multiple HiPath Wireless Controllers for the following features to operate successfully:
● Availability
● Mobility
● Mitigator for detection of rogue access points
Some features also require the definition of static routes.
● Web Browser – A browser provides access to the HiPath Wireless Controller Management
user interface to configure the Controller, Access Points and Convergence Software.
● SSH Enabled Device – A device that supports Secure Shell (SSH) is used for remote (IP)
shell access to the system.
● Zone Integrity – The Zone integrity server enhances network security by ensuring clients
accessing your network are compliant with your security policies before gaining access.
Zone Integrity Release 5 is supported.
Each wireless device sends IP packets in the 802.11 standard to the Wireless AP. The Wireless
AP uses a UDP (User Datagram Protocol) based tunnelling protocol to encapsulate the packets
and forward them to the HiPath Wireless Controller. In a typical configuration, APs can be
configured to locally bridge traffic (to a configured VLAN) directly at their network point of
attachment. The HiPath Wireless Controller decapsulates the packets and routes these to
destinations on the network.
The HiPath Wireless Controller functions like a standard router, except that it is configured to
route only network traffic associated with wireless connected users. The HiPath Wireless
Controller can also be configured to simply forward traffic to a default or static route if dynamic
routing is not preferred.
● Shared Key authentication that relies on Wired Equivalent Privacy (WEP) keys
● Open System that relies on Service Set Identifiers (SSIDs)
● 802.1x that is compliant with Wi-Fi Protected Access (WPA)
● Captive Portal based on Secure Sockets Layer (SSL) protocol
The Controller, Access Points and Convergence Software system provides the centralized
mechanism by which the corresponding security parameters are configured for a group of APs.
● Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks
defined in the 802.11b standard
● Wi-Fi Protected Access version 1 (WPA1™) with Temporal Key Integrity Protocol (TKIP)
● Wi-Fi Protected Access version 2 (WPA2™) with Advanced Encryption Standard (AES)
and Counter Mode with Cipher Block Chaining Message Authentication Code (CCMP)
3.3.2.1 Authentication
The HiPath Wireless Controller relies on a RADIUS server, or authentication server, on the
enterprise network to provide the authentication information (whether the user is to be allowed
or denied access to the network). A RADIUS client is implemented to interact with infrastructure
RADIUS servers.
The HiPath Wireless Controller provides authentication using:
● Captive Portal – a browser-based mechanism that forces users to a Web page
● RADIUS (using IEEE 802.1x)
The 802.1x mechanism is a standard for authentication developed within the 802.11 standard.
This mechanism is implemented at the wireless Port, blocking all data traffic between the
wireless device and the network until authentication is complete. Authentication by 802.1x
standard uses Extensible Authentication Protocol (EAP) for the message exchange between
the HiPath Wireless Controller and the RADIUS server.
When 802.1x is used for authentication, the HiPath Wireless Controller provides the capability
to dynamically assign per-wireless-device WEP keys (called per-station WEP keys in 802.11).
Or in the case of WPA, the HiPath Wireless Controller is not involved in key assignment.
Instead, the controller is involvement in the path between RADIUS server and the user to
negotiate the appropriate set of keys. With WPA2 the material exchange produces a Pairwise
Master Key which is used by the AP and the user to derive their temporal keys. (The keys
change over time.)
In the Controller, Access Points and Convergence Software, a RADIUS redundancy feature is
provided, where you can define a failover RADIUS server (up to 2 servers) in the event that the
active RADIUS server fails.
3.3.2.2 Privacy
Privacy is a mechanism that protects data over wireless and wired networks, usually by
encryption techniques.
Controller, Access Points and Convergence Software supports the Wired Equivalent Privacy
(WEP) standard common to conventional access points.
It also provides Wi-Fi Protected Access version 1 (WPA v.1) encryption, based on Pairwise
Master Key (PMK) and Temporal Key Integrity Protocol (TKIP). The most secure encryption
mechanism is WPA version 2, using Advanced Encryption Standard (AES).
● WMM (Wi-Fi Multimedia) – WMM is enabled per VNS. For C1000 controllers, these are
primarily only AP features. The HiPath Wireless Controller provides centralized
management of these AP features. For devices with WMM enabled, the standard provides
multimedia enhancements for audio, video, and voice applications. WMM shortens the
time between transmitting packets for higher priority traffic. WMM is part of the 802.11e
standard for QoS.
● IP ToS (Type of Service) or DSCP (Diffserv Codepoint) – The ToS/DSCP field in the IP
header of a frame indicates the priority and QoS for each frame. The IP TOS and/or DSCP
is maintained within CTP (CAPWAP Tunneling Protocol) by copying the user IP QoS
information to the CTP header—this is referred to as Adaptive QoS.
Quality of Service (QoS) management is also provided by:
● Assigning high priority to an SSID (configurable)
● Adaptive QoS (automatic)
● Support for legacy devices that use SpectraLink Voice Protocol (SVP) for prioritizing voice
traffic (configurable)
configuration, this feature will expedite deployment, as an AP will automatically receive full
configuration (including VNS assignment) upon initial registration with the HiPath Wireless
Controller.
6. Wireless AP Configuration – Modify properties or settings of the Wireless AP, if desired.
7. Virtual Network Services (VNS) Setup – Set up one or more virtual subnetworks on the
HiPath Wireless Controller. For each VNS, configure the following:
● Topology – Configure the VNS.
● RF – Assign the Wireless APs radios to the VNS.
● Authentication and Accounting – Configure the authentication method for the
wireless device user and enable the accounting method.
● RAD Policy – Define filter ID values and VNS Groups
● Filtering – Define filtering rules to control network access
● Multicast – Define groups of IP addresses for multicast traffic
● Privacy – Select and configure the wireless security method on the VNS.
● QoS Policy – Configure the Qos Policy.
Apply a product license key file. If a product license key is not applied, the HiPath Wireless
Controller functions with some features enabled in demonstration mode. Not all features are
enabled in demonstration mode. For example, mobility is not enabled and cannot be used.
4. In the User Name box, type your user name. The default is admin.
5. In the Password box, type your password. The default is abc123.
6. Click Login. The HiPath Wireless Assistant main menu screen appears.
7. From the main menu, click Wireless Controller Configuration. The HiPath Wireless
Controller Configuration screen appears.
8. In the left pane, click IP Addresses. The factory default settings for the HiPath Wireless
Controller are displayed.
9. In the Management Port Settings section, click Modify. The System Port Configuration
screen appears.
● Management IP Address – Specifies the new IP address for the HiPath Wireless
Controller’s management port. Change this as appropriate for the enterprise network.
● Subnet mask – Specifies the appropriate subnet mask for the IP address to separate
the network portion from the host portion of the address (typically 255.255.255.0)
● Management Gateway – Specifies the default gateway of the network
● Primary DNS – Specifies the primary DNS server used by the network
● Secondary DNS – Specifies the secondary DNS server used by the network
11. To save your changes, click OK.
The Web connection between the computer and the HiPath Wireless Controller
> is now lost. The IP addresses are now set to the network you defined.
4. In the Apply Product Key section, click Browse to navigate to the location of the product
key file and select the file.
5. Click Apply Now. The product license key is applied.
VLAN ID parameter
You can define a specific VLAN tag to be applied to a particular interface. All packets associated
with that port will be tagged with the corresponding VLAN. This allows the HiPath Wireless
Controller to directly attach to a VLAN network without the need to remove VLAN tags at the
connection port.
You can redefine the data ports to function as one of three types:
● Host Port
Use a host port definition for connecting Wireless APs, with no dynamic routing. A host port
has dynamic routing disabled to ensure that the port does not participate in dynamic
routing operations, such as OSPF, to advertise the availability of Virtual Network Segments
(VNS) hosted by the HiPath Wireless Controller. Host ports may still be used as the target
for static route definitions.
● Third-Party AP Port
Use a third-party AP port definition for a port to which you will connect third-party APs. Only
one port can be configured for third-party APs.
Selecting this option prepares the port to support a third-party AP setup allowing the
mapping of a VNS to the physical port. The VNS settings permit the definition of policy,
such as filters and Captive Portal, which manage the traffic flow for wireless users
connected to these APs.
The third-party APs must operate as layer-2 bridges. The third-party AP VNS is isolated
from the rest of the network. The HiPath Wireless Controller assumes control over the
layer-3 functions including DHCP.
● Router Port
Use a router port definition for a port that you want to connect to an upstream, next-hop
router in the network. Dynamic routing protocol, such as OSPF, can be turned on for this
port type.
Wireless APs can be attached to a router port. The HiPath Wireless Controller will create
a virtual VNS port and handle wireless device traffic in the same manner as a host port.
The lower portion of the HiPath Wireless Controller Configuration screen displays either
four Ethernet ports (for the C10 and C100), or two ports (for the C1000). For each port, the
MAC address is displayed automatically.
For the HiPath Wireless Controller models C10 and C100, the footer of the
> HiPath Wireless Assistant does not include the link status of the physical
interfaces.
The lower portion of the HiPath Wireless Controller Configuration screen displays the
four Ethernet ports. For each port, the MAC address is displayed automatically.
3. To select a port, click it.
Port configuration allows for the explicit state of the administration state for each interface.
By default, data interface states will be disabled. You can then enable each of the data
interfaces individually. A disabled interface does not allow data to flow (receive/transmit).
4. Type the following:
● IP address – The IP Address of the physical Ethernet port.
● Subnet mask – The appropriate subnet mask for the IP address, which separates the
network portion from the host portion of the address (typically 255.255.255.0).
● MTU – The Maximum Transmission Unit or maximum packet size for this port. The
default setting is 1500. If you change this setting and are using OSPF, be sure that the
MTU of each port in the OSPF link matches.
If the routed connection to an AP traverses a link that imposes a lower MTU than
> the default 1500 bytes, the HiPath Wireless Controller and AP both participate
in MTU discovery to automatically learn the correct MTU and adjust their
settings accordingly. At the HiPath Wireless Controller, MTU adjustments are
tracked on a per AP basis.
For OSPF routing on a port, the port must be configured as a router port. Only
> one port should be configured as a router port.
6. To enable management traffic, select the Mgmt checkbox. Enabling management provides
access to SNMP (v2, get), SSH, and HTTPs management interfaces.
This option does not override the built-in protection filters on the port.
> The built-in protection filters for the port, which are restrictive in the types of
packets that are allowed to reach the management plane, are extended with a
set of definitions that allow for access to system management services through
that interface (SSH, SNMP, HTTPS:5825).
3. To add a new route, in the Destination Address box type the destination IP address of a
packet. To define a default static route for any unknown address not in the routing table,
type 0.0.0.0.
4. In the Subnet Mask box, type the appropriate subnet mask to separate the network portion
from the host portion of the IP address (typically 255.255.255.0). To define the default static
route for any unknown address, type 0.0.0.0.
5. In the Gateway box, type the IP address of the specific router port or gateway on the same
subnet as the HiPath Wireless Controller to which to forward these packets. This is the IP
address of the next hop between the HiPath Wireless Controller and the packet’s ultimate
destination.
6. Click Add. The new route is added to the list of routes.
7. Select the Override dynamic routes checkbox to give priority over the OSPF learned
routes, including the default route, which the HiPath Wireless Controller uses for routing.
This option is selected by default.
To remove this priority for static routes, so that routing is controlled dynamically at all times,
clear the Override dynamic routes checkbox.
If you enable dynamic routing (OSPF), the dynamic routes will normally have
> priority for outgoing routing. For internal routing on the HiPath Wireless
Controller, the static routes normally have priority.
This report displays all defined routes, whether static or OSPF, and their current status.
3. To update the display, click Refresh.
● The MTU of the ports on either end of an OSPF link must match. The MTU for ports on the
HiPath Wireless Controller is defined as 1500, in the IP Addresses screen, during data port
setup. This matches the default MTU in standard routers.
● Default – The default acts as the backbone area (also known as area zero). It forms
the core of an OSPF network. All other areas are connected to it, and inter-area routing
happens via a router connected to the backbone area.
● Stub – The stub area does not receive external routes. External routes are defined as
routes which were distributed in OSPF via another routing protocol. Therefor, stub
areas typically rely on a default route to send traffic routes outside the present domain.
● Not-so-stubby – The not-so-stubby area is a type of stub area that can import
autonomous system (AS) external routes and send them to the default/backbone area,
but cannot receive AS external routes from the backbone or other areas.
8. To save your changes, click Save.
If more than one port is enabled for OSPF, it is important to prevent the HiPath
> Wireless Controller from serving as a router for other network traffic (other than
the traffic from wireless device users controlled by the HiPath Wireless
Controller). To ensure that the HiPath Wireless Controller is never the preferred
OSPF route, set the Link Cost to its maximum value of 65535. Filters should also
be defined that will drop routed packets. For more information, see Section 7.6,
“Configuring filtering rules for a VNS”, on page 153.
6. From the Authentication drop-down list, select the authentication type for OSPF on your
network: None or Password. The default setting is None.
7. If Password was selected as the authentication type, in the Password box, type the
password. If None was selected as the Authentication type, leave this box blank. This
password must match on either end of the OSPF connection.
8. Type the following:
● Hello-Interval – Specifies the time in seconds (displays OSPF default).The default
setting is 10 seconds.
● Dead-Interval – Specifies the time in seconds (displays OSPF default). The default
setting is 40 seconds.
● Retransmit-Interval – Specifies the time in seconds (displays OSPF default). The
default setting is 5 seconds.
● Transmit Delay– Specifies the time in seconds (displays OSPF default). The default
setting is 1 second.
9. To save your changes, click Save.
For example, on the HiPath Wireless Controller’s data interfaces (both physical interfaces and
VNS virtual interfaces), the built-in exception filter prohibits invoking SSH, HTTPS, or SNMP.
However, such traffic is allowed, by default, on the management port.
If defined improperly, user exception rules may seriously compromise the systems
7 normal security enforcement rules. They may also disrupt the system's normal
operation and even prevent system functionality altogether. It is advised to only
augment the exception-filtering mechanism if absolutely necessary.
3. Select the applicable data port from the Port drop-down list.
4. In the IP / subnet: port box, type the destination IP address. You can also specify an IP
range, a port designation or a port range on that IP address.
5. From the Protocol drop-down list, select the protocol you want to specify for the filter. This
list may include UDP, TCP, IPsec-ESP, IPsec-AH, ICMP. The default is N/A.
6. Click Add. The new filter appears in the Filter area of the screen.
Wireless AP models
The wireless AP has two models:
● Model AP2610 – Internal antenna, internal dual (multimode) diversity antennas
● Model AP2620 – External antenna (dual external antennas), RP-SMA connectors
In order to comply with FCC regulations in North America, the U-NII Low Band (5.15
> to 5.25 GHz band) is disabled for the Model AP2620.
Wireless AP radios
The wireless AP has two radios:
● 5 GHz radio supporting the 802.11a standard – The 802.11a standard is an extension
to 802.11 that applies to wireless LANs and provides up to 54 Mbps in the 5-GHz band.
The 802.11a standard uses an orthogonal frequency division multiplexing encoding
scheme, rather than Frequency-Hoping Spread Spectrum (FHSS) or Direct-Sequence
Spread Spectrum (DSSS).
● 2.4 GHz radio supporting the 802.11b/g standards – The 802.11g standard applies to
wireless LANs and specifies a transmission rate of 54 Mbps. The 802.11b (High Rate)
standard is an extension to 802.11 that specifies a transmission rate of 11 Mbps. Since
802.11g uses the same communication frequency range as 802.11b (2.4 GHz), 802.11g
devices can co-exist with 802.11b devices on the same network.
The radios on the wireless AP are enabled or disabled through the HiPath Wireless Assistant.
Both radios can be enabled to offer service simultaneously. For more information, see Section
7.1, “Topology for a VNS”, on page 124.
The Unlicensed National Information Infrastructure (U-NII) bands are three frequency bands of
100 MHz each in the 5 GHz band, designated for short-range, high-speed, wireless networking
communication.
The Wireless AP supports the full range of 802.11a:
● 5.15 to 5.25 GHz – U-NII Low Band
● 5.25 to 5.35 GHz – U-NII Middle Band
● 5.725 to 5.825 GHz – U-NII High Band
● New 5.470 GHz to 5.725 GHz Band (when approved by FCC)
To configure the appropriate radio band according to each European Union country, use the
HiPath Wireless Assistant. For more information, see Section 5.5.3, “Modifying a wireless AP’s
properties”, on page 86.
Never disconnect a wireless AP from its power supply during a firmware upgrade.
7 Disconnecting a wireless AP from its power supply during a firmware upgrade may
cause firmware corruption rendering the AP unusable.
The table below assumes the software uses a timer and multiple phases to simulate LED
blinking on all three LEDs. For example, an LED status of Red indicates the LED is solid colored
Red, an LED status of Off/Green/Off indicates that the LED is Off for the first phase, Green for
the second phase, and Off for the third phase.
Random delays do not occur during normal reboot. A random delay only occurs after
> vulnerable period power-down.
The wireless AP can be reset to its factory default settings. For more information,
see Section 12.2, “Resetting the AP to its factory default settings”, on page 246.
Security mode
Security mode is a HiPath Wireless Controller property. It defines how the controller behaves
when registering new, unknown devices. During the registration process, the HiPath Wireless
Controller’s approval of the wireless AP’s serial number depends on the security mode that has
been set:
● Allow all Wireless APs to connect
● If the HiPath Wireless Controller does not recognize the registering serial number, a
new registration record is automatically created for the AP (if within MDL license limit).
The AP receives a default configuration. The default configuration can be the default
template assignment.
● If the HiPath Wireless Controller recognizes the serial number, it indicates that the
registering device is pre-registered with the controller. The controller uses the existing
registration record to authenticate the AP and the existing configuration record to
configure the AP.
● Allow only approved Wireless APs to connect (this is also known as secure mode)
● If HiPath Wireless Controller does not recognize the AP, the AP's registration record is
created in pending state (if within MDL limits. The administrator is required to manually
approve a pending AP for it to provide active service. The pending AP receives
minimum configuration, which only allows it to maintain an active link with the controller
for future state change. The AP's radios are not configured or enabled. Pending APs
are not eligible for configuration operations (VNS Assignment, default template, Radio
parameters) until approved.
● If the HiPath Wireless Controller recognizes the serial number, the controller uses the
existing registration record to authenticate the AP. Following successful authentication,
the AP is configured according to its stored configuration record.
During the initial setup of the network, it is recommended to select the Allow all
> Wireless APs to connect option. This option is the most efficient way to get a
large number of wireless APs registered with the HiPath Wireless Controller.
Once the initial setup is complete, it is recommended that the security mode is
reset to the Allow only approved Wireless APs to connect option. This option
ensures that no unapproved wireless APs are allowed to connect. For more
information, see Section 5.5, “Modifying wireless AP settings”, on page 81.
Discovery timers
The discovery timer parameters dictate the number of retry attempts and the time delay
between each attempt.
4. In the Discovery Timers section, type the discovery timer values in the following boxes:
● Number of retries
● Delay between retries
The default number of retries is 3, and the default delay between retries is 1 second.
5. To save your changes, click Save.
Once the discovery parameters are defined, you can connect the Wireless AP to a power
source.
3. To select the wireless APs for status change, do one of the following:
● For a specific Wireless AP, select the corresponding checkbox.
● For Wireless AP’s by category, click one of the Select Wireless APs buttons.
To deselect your Wireless AP selections, click Clear All.
4. Click the appropriate Perform action on selected Wireless APs option:
● Approved – Change a Wireless AP's status from Pending to Approved, if the AP
Registration screen was set to register only approved Wireless APs.
● Approved as Sensor – <<<need description>>>
● Pending – AP is removed from active list, and is forced into discovery.
● Release – Release foreign Wireless APs after recovery from a failover.
● Delete – Delete this Wireless AP from the VNS.
● Basic Rates – Select the data rates that must be supported by all stations in a BSS:
1, 2 or 1, 2, 5.5, and 11 Mbps.
● Preamble – Select a preamble value: Short, Long, or Auto.
● Protection Mode – Select a protection mode: None, Auto, or Always. The default
value is Auto.
● Protection Rate – Select a protection rate: 1, 2, 5.5, or 11 Mbps. The default value is
11.
● Protection Type – Select a protection type: CTS or RTS CTS. The default value is
RTS CTS.
● Min Basic Rate – For both radios, select the minimum data rate that must be
supported by all stations in a BSS: 1, 2, 5.5, or 11 Mbps.
● Max Basic Rate – For both radios, select the maximum data rate that must be
supported by all stations in a BSS: 1, 2, 5.5, or 11 Mbps.
● Max Operational Rate – For both radios, select the maximum data rate that clients
can operate at while associated with the AP: 11, 12, 18, 24, 36, 48, or 54 Mbps.
6. In the Static Configuration section, modify the following:
● In the Add box, type the IP address of the HiPath Wireless Controller that will control
this Wireless AP.
● Click Add. The IP address is added to the list.
● Repeat to add additional HiPath Wireless Controllers.
● Click Up and Down to modify the order of the controllers. The maximum is three
controllers.
The Wireless AP attempts to connect to the IP addresses in the order in which they
are listed. The Wireless AP is successful when it finds a HiPath Wireless Controller
that will allow it to register.
This feature allows the Wireless AP to bypass the discovery process. If the Wireless
Controller Search List box is not populated, the wireless AP will use SLP to discover
a HiPath Wireless Controller.
The DHCP function for wireless clients must be provided locally by a local DHCP
server, unless each wireless client has a static IP address.
7. In the Dynamic Radio Management section, modify the following:
● Enable – Select Enable or Disable. DRM is enabled by default.
● Coverage – Select Shaped or Standard. Shaped coverage adjusts the range based
on neighboring Wireless APs and standard coverage adjusts the range to the client
that is the most distant, as indicated by its signal strength.
● Avoid WLAN – For each radio, select On or Off.
● Minimum TX – For each radio, select the minimum power level that the range of
transmit power can be adjusted dynamically.
● Maximum TX – For each radio, select the maximum power level that the range of
transmit power can be adjusted dynamically.
8. In the VNS Assignments section, assign the radios for each VNS in the list by selecting
or clearing the radio checkbox.
9. To save your changes, click Save.
● Use broadcast for disassociation – Select if you want the wireless AP to use
broadcast disassociation when disconnecting all clients, instead of disassociating
each client one by one. This will affect the behavior of the AP under the following
conditions:
● If the Wireless AP is preparing to reboot or to enter one of the special modes
(DRM initial channel selection).
● If a BSSID is deactivated or removed on the Wireless AP.
This option is disabled by default.
● Country – Select the country of operation. This option is only available with some
licenses.
The following on the AP Properties tab are view only:
● Serial # – Displays a unique identifier that is assigned during the manufacturing
process.
● Hardware Version – Displays the current version of the Wireless AP hardware.
● Application Version – Displays the current version of the Wireless AP software.
● Status:
Approved – Indicates that the wireless AP has received its binding key from the
HiPath Wireless Controller after the discovery process.
● Pending – Indicates that the wireless AP has not yet successfully been approved
for access with the secure controller.
You can modify the status of a Wireless AP on the Access Approval screen. For more
information, see Section 5.5.1, “Modifying a Wireless AP’s status”, on page 82
● Active Clients – Displays the number of wireless devices currently active on the
Wireless AP.
4. To save your changes, click Save.
● DTIM Period – Type the Delivery Traffic Indication Message (DTIM) period. The
default value is 1. This measures the number of beacons in the DTIM cycle.
● Beacon Period – Type the time units between beacon transmissions. The default
value is 100 milliseconds.
● RTS/CTS Threshold – Type the size of a data unit, which if below, a Request To
Send (RTS)/Clear to Send (CTS) handshake is not performed. The default value
is 2346.
● Frag. Threshold – Type the maximum size of a packet or data unit that can be
delivered. The default value is 2346.
● 802.11b – Select to enable the 802.11b radio.
● 802.11g – Select to enable the 802.11g radio.
● Channel – Select the wireless channel that the wireless AP will use to
communicate with wireless devices. Depending on the regulatory domain (based
on country), some channels may be restricted. The default value is based on
North America. The Auto selection allows the wireless AP to select the
appropriate channel automatically. For more information, see Chapter 2,
“Regulatory information”.
● Tx Power Level – Select the Tx power level: Min, 13%, 25%, 50%, or Max. If
Dynamic Radio Management (DRM) was enabled on the DRM screen, this option
is read-only.
● Rx Diversity – Select Best for the best signal from both antennas, or Left or
Right to choose either of the two diversity antennas.
● Tx Diversity – Select Alternate for the best signal from both antennas, or Left or
Right to choose either of the two diversity antennas.
● Min Basic Rate – Select the minimum data rate that must be supported by all
stations in a BSS: 1, 2, 5.5, or 11 Mbps.
● Max Basic Rate – Select the maximum data rate that must be supported by all
stations in a BSS: 1, 2, 5.5, or 11 Mbps.
● Max Operational Rate – Select the maximum data rate that clients can operate
at while associated with the AP: 11, 12, 18, 24, 36, 48, or 54 Mbps.
● No of Retries for Background BK – Select the number of retries for the
Background transmission queue. The default value is 4. The recommended rate
is adaptive (multi-rate).
● No of Retries for Best Effort BE – Select the number of retries for the Best Effort
transmission queue. The default value is 4. The recommended rate is adaptive
(multi-rate).
● No of Retries for Video VI – Select the number of retries for the Video
transmission queue. The default value is 4. The recommended rate is adaptive
(multi-rate).
● No of Retries for Voice VO – Select the number of retries for the Voice
transmission queue. The default value is 1. The recommended rate is adaptive
(multi-rate).
● No of Retries for Turbo Voice TVO – Select the number of retries for the Turbo
Voice transmission queue. The default value is 1. The recommended rate is
adaptive (multi-rate).
● Preamble – Select a preamble value: Short, Long, or Auto.
● Protection Mode – Select a protection mode: None, Auto, or Always. The default
value is Auto.
● Protection Rate – Select a protection rate, in Mbps: 1, 2, 5.5, or 11. The default
value is 11.
● Protection Type – Select a protection type: CTS or RTS CTS. The default value
is RTS CTS.
● DTIM Period – Type the Delivery Traffic Indication Message (DTIM) period. The
default value is 1. This measures the number of beacons in the DTIM cycle.
● Beacon Period – Type the time units between beacon transmissions. The default
value is 100 milliseconds.
● RTS/CTS Threshold – Type the size of a data unit, which if below, a Request To Send
(RTS)/Clear to Send (CTS) handshake is not performed. The default value is 2346.
● Frag. Threshold – Type the maximum size of a packet or data unit that can be
delivered. The default value is 2346.
● 802.11a – Select to enable the 802.11a radio.
● 802.11j – Select to enable the 802.11j radio. This radio is only available in Japan.
● Channel – Select the wireless channel that the wireless AP will use to communicate
with wireless devices. Depending on the regulatory domain (based on country), some
channels may be restricted. The default value is based on North America. The Auto
selection allows the wireless AP to select the appropriate channel automatically. For
more information, see Chapter 2, “Regulatory information”.
● Tx Power Level – Select the Tx power level: Min, 13%, 25%, 50%, or Max. If Dynamic
Radio Management (DRM) was enabled on the DRM screen, this option is read-only.
● Rx Diversity – Select Best for the best signal from both antennas, or Left or Right to
choose either of the two diversity antennas.
● Tx Diversity – Select Alternate for the best signal from both antennas, or Left or
Right to choose either of the two diversity antennas.
● Min Basic Rate – Select the minimum data rate that must be supported by all stations
in a BSS: 1, 2, 5.5, or 11 Mbps.
● Max Basic Rate – Select the maximum data rate that must be supported by all
stations in a BSS: 1, 2, 5.5, or 11 Mbps.
● Max Operational Rate – Select the maximum data rate that clients can operate at
while associated with the AP: 11, 12, 18, 24, 36, 48, or 54 Mbps.
Radio a channels 100 to 140 occupy the 5470-5725 MHz band in the regulatory
> domains of the European Union and European Union free trade countries.
Radio B/G Channels 12 to 14 are not available in North America.
● No of Retries for Background BK – Select the number of retries for the Background
transmission queue. The default value is 4. The recommended rate is adaptive (multi-
rate).
● No of Retries for Best Effort BE – Select the number of retries for the Best Effort
transmission queue. The default value is 4. The recommended rate is adaptive (multi-
rate).
● No of Retries for Video VI – Select the number of retries for the Video transmission
queue. The default value is 4. The recommended rate is adaptive (multi-rate).
● No of Retries for Voice VO – Select the number of retries for the Voice transmission
queue. The default value is 1. The recommended rate is adaptive (multi-rate).
● No of Retries for Turbo Voice TVO – Select the number of retries for the Turbo Voice
transmission queue. The default value is 1. The recommended rate is adaptive (multi-
rate).
4. To save your changes, click Save.
employed at any time if required. In the branch office model, wireless APs are installed in
remote sites, while the HiPath Wireless Controller is in the central office. The wireless APs
require the capability to interact in both the local site network and the central network. To
achieve this model, a static configuration is used.
In static configuration, if the wireless AP cannot register with the HiPath Wireless
> Controller within the specified number of retries, the wireless AP will use SLP, DNS,
and SLP multicast as a backup mechanism. If unsuccessful, the wireless AP
resumes the discovery process with the static configuration, followed with SLP, DNS,
and SLP multicast. For more information, see Section 5.2, “Discovery and
registration overview”, on page 71.
6. In the Add box, type the IP address of the HiPath Wireless Controller that will control this
wireless AP.
7. Click Add. The IP address is added to the list.
8. Repeat steps 5 and 6 to add additional HiPath Wireless Controllers.
9. Use the Up and Down buttons to modify the order of the controllers. The maximum is three
controllers.
The wireless AP attempts to connect to the IP addresses in the order in which they are
listed. The wireless AP is successful when it finds a HiPath Wireless Controller that will
allow it to register.
This feature allows the wireless AP to bypass the discovery process. If the Wireless
Controller Search List box is not populated, the wireless AP will use SLP to discover a
HiPath Wireless Controller.
The DHCP function for wireless clients must be provided locally by a local DHCP server,
unless each wireless client has a static IP address.
10. To save your changes, click Save.
5. From the list of registered wireless APs, select the checkbox corresponding to the wireless
AP you want to configure for DRM. The DRM properties are populated with default values
when DRM is enabled.
6. In the Coverage drop-down list, select:
● Std – (Standard Coverage) Adjusts the range to the client that is the most distant, as
indicated by its signal strength.
● Shpd – (Shaped Coverage) Adjusts the range based on neighboring wireless APs.
7. If applicable, from the Avoid WLAN drop-down list, select on.
8. In the RF Domain ID box, type a string that uniquely identifies a group of APs that
cooperate in managing RF channels and power levels. The maximum length of the string
is 15 characters.
9. From the Minimum drop-down list, select the minimum power level that the range of
transmit power can be adjusted dynamically.
10. From the Maximum drop-down list, select the maximum power level that the range of
transmit power can be adjusted dynamically.
11. Click Apply to selected APs.
12. To save your changes, click Save.
13. To re-establish baseline settings, forcing the APs to go through the auto-channel selection
process, click Reset DRM.
5.7 Modifying the wireless AP’s default setting using the Copy to
Defaults feature
You can modify the system’s default AP settings by using the Copy to Defaults feature on the
AP Properties tab. This feature allows the properties of an already configured AP to become
the system’s default AP settings.
3. In the Wireless APs list, select one or more APs to edit. To select multiple APs, select the
appropriate APs from the list while pressing the CTRL key.
When using multi-edit configuration, any box or option that is not explicitly
> modified will not be changed by the update.
The Wireless APs shown in the Wireless APs list can be from any version of the
software. Attributes that are common between software versions are set on all
Wireless APs. Attributes that are not common, are only sent to the AP versions
to which the attributes apply. Attempting to set an attribute that does not apply
for an AP will not abort the multi-edit operation.
3. From the AP Images for Platform drop-down list select the appropriate platform.
4. To select an image to be the default image for a software upgrade, select it in the list, and
then click Set as default.
5. In the Upgrade Behavior area, select one of the following:
● Upgrade when AP connects using settings from Controlled Upgrade – The
Controlled Upgrade tab appears. Controlled upgrade allows you to individually select
and control the state of an AP image upgrade: which APs to upgrade, when to
upgrade, how to upgrade, and to which image the upgrade or downgrade should be
done. Administrators decide on the levels of software releases that the equipment
should be running.
● Always upgrade AP to default image (overrides Controlled Upgrade settings) –
Selected by default. Allows for the selection of a default revision level (firmware image)
for all APs in the domain. As the AP registers with the controller, the firmware version
is verified. If it does not match the same value as defined for the default-image, the AP
is automatically requested to upgrade to the default-image.
6. Select the Do not upgrade AP images if current image version = upgrade version
checkbox to prevent an upgrade if current image version is the same as the upgrade
version. Selecting this option overrides upgrade behavior.
7. Select the Automatically downgrade the AP to the default image if AP is at later
release number (major/minor rev) checkbox to allow an older image to be installed if
selected.
8. To save your changes, click Save.
The Controlled Upgrade tab will appear only when the Upgrade Behavior is set to
> Upgrade when AP connects using settings from Controlled Upgrade on the AP
Software Maintenance tab.
4. From the Select AP Platform drop-down list, select the type of AP you want to upgrade.
5. From the Select an image to use drop-down list, select the software image you want to
use for the upgrade.
6. In the list of registered Wireless APs, select the checkbox for each Wireless APs to be
upgraded with the selected software image.
7. Click Apply AP image version. The selected software image appears in the Upgrade To
column of the list.
8. To save the software upgrade strategy to be run later, click Save for later.
9. To run the software upgrade immediately, click Upgrade Now. The selected Wireless AP
reboots, and the new software version is loaded.
If the VNS is in branch mode, the HiPath Wireless Controller's DHCP server will
> not assign IP addresses to the wireless devices. You can allow the enterprise
network's DHCP server to provide the IP addresses for the VNS by enabling
DHCP Relay.
The assigned addresses must be within range of the VNS definition and the
controller must be defined in the network as the path for traffic delivery to the
mobile units. For more information, see Section 7.1.1.8, “Using a DHCP relay
for the VNS”, on page 131.
These IP addresses are not virtual IP addresses. They are regular IP addresses and are
unique over the network. These IP addresses are advertised to other hosts on the network
to exchange traffic with the wireless devices in the VNS.
● A single overall filtering policy applies to all the wireless devices within the VNS. Additional
filtering can be applied when the wireless user is authenticated by the Remote
Authentication Dial-In User Service (RADIUS) server. This does not apply for a bridged
VNS.
● When the HiPath Wireless Controller creates a VNS, it also creates a virtual IP subnet for
that VNS. This does not apply for a bridged VNS.
● Each VNS represents a mobility group that, when configured, can be carried across
multiple HiPath Wireless Controllers. This does not apply for a bridged VNS.
● Each VNS also offers unique Authentication, Authorization and Accounting (AAA) services.
This does not apply for a bridged VNS.
In a VLAN-bridged VNS, the default configuration dictates that the controller is not
> the DHCP server for that segment. However, DHCP services can selectively be
enabled, including DHCP Relay, allowing you to use the controller to become the
default DHCP server for the VLAN, if applicable.
The user access plan should also identify the user groups in your enterprise, and the business
structure of the enterprise network, such as:
The HiPath Wireless Controller only assigns the device's IP after the client requests
> one.
Both Captive Portal and AAA (802.1x) authentication mechanisms in Controller, Access Points
and Convergence Software rely on a RADIUS server on the enterprise network. You can
identify and prioritize up to three RADIUS servers on the HiPath Wireless Controller—in the
event of a failover of the active RADIUS server, the HiPath Wireless Controller will poll the other
servers in the list for a response. Once an alternate RADIUS server is found, it becomes the
active RADIUS server, until it either also fails, or the administrator redefines another.
4. Using the percentage drop-down lists, define the thresholds for the following:
● Max Voice (VO) bandwidth for re-association
● Max Voice (VO) bandwidth for association
● Max Video (VI) bandwidth for re-association
● Max Video (VI) bandwidth for association
● Reserved Video (VI) bandwidth
● Reserved bandwidth for non-admission controlled flows
These global QoS settings apply to all APs that serve QoS enabled VNS with admission
control.
5. To save your changes, click Save.
To define inter-HiPath Wireless Controller shared secret for VNS global settings:
1. From the main menu, click Virtual Network Configuration. The Virtual Network list
appears.
2. In the left pane, click Global Settings.
3. Click the General tab.
4. In the Inter-HWC Shared Secret box, type a password between 8 and 63 characters long,
to be used between HiPath Wireless Controllers. The same shared secret must also be
defined on the other HiPath Wireless Controllers on the network. The Inter-HWC shared
secret is also used to protect communications between the HiPath Wireless Controller and
the HiPath Wireless Manager.
5. In order to proofread your password before saving the configuration, click Unmask. The
password is displayed. To mask the password, click Mask.
This precautionary step is highly recommended in order to avoid an error, later, when the
HiPath Wireless Controller attempts to communicate with the RADIUS server.
6. To save your changes, click Save.
Before you can define the VNS topology parameters and configure the VNS, you must first
create a new VNS name.
an un-authenticated user. For example, a user may have disconnected from the system
(shutdown the device, moved out of range, etc.). A pre timeout expires and cleans up the
session.
The post timeout is the max amount of time that is allowed to elapse from the last time any
traffic was received for an authenticated user. For example, a user may have disconnected from
the system and is no longer be connected. A post timeout expires and cleans up the session.
A client that exceeds either the pre or post timeout value will be forced to disassociate.
The session timer defines the maximum amount of time a session is allowed to be connected
to the system. The session timer is particularly useful in pay-per-use models. When the lifetime
of the session reaches the defined limit, the session is expired and cleaned up. A user would
have to re-authenticate with the system to continue to receive network services.
The VNS timeout parameters define the default timers applicable to session
> management within the VNS. However, RADIUS authentication (access-accept)
may return specific timers applicable to the particular user. A RADIUS returned
value overwrites the VNS default values for the specific user.
In addition, a zero (0) value for any of the timers indicates a non-applicable value.
Therefor, the corresponding timer is not enforced.
Third-party AP devices are not fully integrated with the system and therefore must
> be managed individually to provide the correct user access characteristics. Also,
third-party AP devices must be defined in bridge mode so that user traffic is directly
transposed to the third-party AP subnet and picked up by the HiPath Wireless
Controller for forwarding and policy enforcement.
7.1.1.4 Defining a next hop route and OSPF advertisement for a VNS
The next hop definition allows the administrator to define a specific host as the target for all
non-VNS targeted traffic for users in a VNS. The next hop IP identifies the target device to which
all VNS (user traffic) will be forwarded to. Next-hop definition supersedes any other possible
definition in the routing table.
If the traffic destination from a wireless device on a VNS is outside of the VNS, it is forwarded
to the next hop IP address, where this router applies policy and forwards the traffic. This
features applies to unicast traffic only. In addition, you can also modify the Open Shortest Path
First (OSPF) route cost.
OSPF is an interior gateway routing protocol developed for IP networks based on the shortest
path first or link-state algorithm. Using OSPF, a host that obtains a change to a routing table or
detects a change in the network immediately distributes the information to all other hosts in the
network so that all will have the same routing table information. The host using OSPF sends
only the part that has changed, and only when a change has taken place.
7.1.1.5 Defining the IP address for the VNS (for the DHCP server on the controller)
Bridged at the AP VNSs do not require the definition of a corresponding IP address definition
for the VNS since all traffic for users in that VNS will be directly bridged by the AP at the local
network point of attachment (VLAN at AP port).
The IP address definition is only required for a routed VNS or VLAN bridged VNS.
Using a DHCP relay forces the HiPath Wireless Controller to forward DHCP requests to an
external DHCP server on the enterprise network. This function bypasses the local DHCP
server for the HiPath Wireless Controller and allows the enterprise to manage IP address
allocation to a VNS from its existing infrastructure.
The range of IP addresses assigned to the wireless device users on this VNS should also be
designated on the external DHCP server.
The DHCP Server must be configured to match the VNS settings. In particular
> for Routed VNS', the DHCP server must identify the HiPath Wireless Controller's
interface IP as the default Gateway (router) for the subnet. (Users intending to
reach devices outside of the subnet will forward the packets to the default
gateway (controller) for delivery upstream.)
4. Configure the topology for your VNS accordingly. For more information, see Section 7.1,
“Topology for a VNS”, on page 124.
5. To save your changes, click Save.
Once you have assigned a Wireless AP radio to eight VNSs, it will not appear in the list for
another VNS setup. Each radio can support up to eight SSIDs (16 per AP). Each AP can be
assigned to any of the VNSs defined within the system. The HiPath Wireless Controller C2400
can support up to 64 VNSs. The HiPath Wireless Controller C1000 can support up to 50 VNSs,
the C100 can support up to 32 VNSs, and the C10 can support up to 16.
● foreign APs - all radios – Select to assign only the foreign APs.
● foreign APs - a radios – Select to assign only the foreign APs’ a radios.
● foreign APs - b/g radios – Select to assign only the foreign APs’ b/g radios.
● clear all selections – Select to clear all of the AP radio assignments.
● original selections – Select to return to the AP radio selections prior to the most recent
save.
7. To save your changes, click Save.
You can view the VNSs that each radio is assigned to by clicking on each radio tab in the
Wireless AP Configuration screen.
10. In the Auth. Type drop-down list, select the authentication protocol to be used by the
RADIUS server to authenticate the wireless device users. The authentication protocol
applies to a VNS with Captive Portal authentication:
● PAP – Password Authentication Protocol
● CHAP – Challenge Handshake Authentication Protocol
● MS-CHAP – Windows-specific version of CHAP
● MS-CHAP2 – Windows-specific version of CHAP, version 2
11. In the Include VSA Attributes section, click the appropriate checkboxes to include the
Vendor Specific Attributes in the message to the RADIUS server:
● AP’s
● VNS’s
● SSID
The Vendor Specific Attributes must be defined on the RADIUS server.
12. If appropriate, click the Reset to Primary checkbox. This checkbox is visible when a
RADIUS server has not yet been selected as a primary server, or if the server you are
configuring has already been selected as the primary server, the Reset to Primary
checkbox is selected.
RADIUS redundancy defines additional backup RADIUS servers that the system will
attempt to communicate with in case a connection with the identified primary server fails.
If connection to an active primary server fails, the system automatically attempts to connect
to one of the alternate servers in sequence. If the system succeeds in registering with a
defined alternate server, it becomes the active primary server, which is identified by the A
on the list. You can subsequently reset or change the identification of the primary server
by clicking the applicable Reset to Primary checkbox.
13. To save your changes, click Save.
In the event of a failover of the main RADIUS server—if there is no response after the set
number of retries—then the other servers in the list will be polled on a round-robin basis until a
server responds.
If one of the other servers becomes the active server during a failover, when the new active
server properties are displayed the Set as primary server checkbox is selected.
If all defined RADIUS servers fail to respond, a critical message is generated in the logs.
4. Click Configure Captive Portal Settings. The Captive Portal Configurations window
appears.
5. Select the Internal Captive Portal option.
6. In the Login Label box, type the text that will appear as a label for the user login field.
7. In the Password Label box, type the text that will appear as a label for the user password
field.
8. In the Header URL box, type the location of the file to be displayed in the Header portion
of the Captive Portal screen. This page can be customized to suit your organization, with
logos or other graphics.
If you use logos or graphics, ensure that the graphics or logos are appropriately
7 sized. Large graphics or logos may force the login area out of view.
9. In the Footer URL box, type the location of the file to be displayed in the Footer portion of
the Captive Portal screen.
10. In the Message box, type the message that will appear above the Login box to greet the
user. For example, the message could explain why the Captive Portal page is appearing,
and instructions for the user.
11. In the Replace Gateway IP with FQDN box, type the appropriate name if a Fully Qualified
Domain Name (FQDN) is used as the gateway address.
12. In the Default Redirection URL box, type the URL to which the wireless device user will
be directed to before authentication.
13. In the right pane, select the appropriate checkboxes to include the following VSA Attributes
in the message to the authentication server:
● AP Serial number
● AP Name
● VNS Name
● SSID
● MAC Address
14. In the right pane, select whether these VSA attributes apply to the header or footer of the
Captive Portal page.
The selections influence what URL is returned in either area. For example, wireless users
can be identified by which Wireless AP or which VNS they are associated with, and can be
presented with a Captive Portal web page that is customized for those identifiers.
15. To provide users with a logoff button, select Logoff. The Logoff button launches a popup
logoff screen, allowing users to control their logoff.
16. To provide users with a status check button, select Status check. The Status check button
launches a popup window, which allows users to monitor session statistics such as system
usage and time left in a session.
17. To save your changes, click Save.
18. To see how the Captive Portal page you have designed will look, click View Sample Portal
Page.
You must add a filtering rule to the non-authenticated filter that allows access to
> the External Captive Portal site. For more information, see Section 6.6, “Filtering
for a VNS”, on page 114.
● AP’s
● VNS’s
● SSID
The Vendor Specific Attributes must be defined on the RADIUS server.
11. If applicable, select Set as primary server.
12. To save your changes, click Save.
5. From the RADIUS drop-down list, select the server you want to use for MAC authentication,
and then click Use. The server’s default information is displayed and a red asterisk appears
next to MAC, indicating that a server has been assigned.
The RADIUS servers are defined in the Global Settings screen. For more information, see
Section 6.8, “VNS global settings”, on page 116.
6. If applicable, to use a server that has already been used for another type of authentication
or accounting, select the server you want to use for MAC authentication, and then select
User server for MAC Authentication.
7. In the Port box, type the port used to access the RADIUS server. The default is 1812.
8. In the # of Retries box, type the number of times the HiPath Wireless Controller will
attempt to access the RADIUS server.
9. In the Timeout box, type the maximum time, in seconds, that a HiPath Wireless Controller
will wait for a response from the RADIUS server before attempting again.
10. In the NAS IP Address box, type the Network Access Server (NAS) IP address.
11. In the NAS Identifier box, type the Network Access Server (NAS) identifier. The NAS
identifier is a RADIUS attribute that identifies the server responsible for passing information
to designated RADIUS servers and then acting on the response returned. This is an
optional step.
12. In the Auth. Type field, select the authentication protocol to be used by the RADIUS server
to authenticate the wireless device users for a Captive Portal VNS.
13. In the Include VSA Attributes section, click the appropriate checkboxes to include the
Vendor Specific Attributes in the message to the RADIUS server:
● AP’s
● VNS’s
● SSID
The Vendor Specific Attributes must be defined on the RADIUS server.
14. If applicable, select Set as primary server.
15. To enable MAC-based authentication on roam, select MAC-based authentication on
roam.
Only select this checkbox if you are using MAC based authentication and if you
> want your clients to be authorized every time they roam to another AP. If this
feature is not enabled, and MAC-based authentication is in use, the client is
authenticated only at the start of a session.
16. To save your changes, click Save.
7.5 Defining RADIUS filter policy for VNSs and VNS groups
The next step in configuring a VNS is to define the filter ID values for a VNS. These filter ID
values must match those set up on the RADIUS servers.
This configuration step is optional. If filter ID values are not defined, the system uses
> the default filter as the applicable filter group for authenticated users within a VNS.
However, if more user-specific filter definitions are required, for example filters based
on a user’s department, then the filter ID configuration is used to overwrite the
default assignment.
In addition to the filter ID values, you can also set up a group ID for a VNS with AAA
authentication. You can set up a group within a VNS that relies on the RADIUS attribute Login-
LAT-Group (RFC2865). For each group, you can define filtering rules to control access to the
network.
If you define a group within an AAA VNS, the group (or child) definition acquires the same
authentication and privacy parameters as the parent VNS. However, you need to define a
different topology and filtering rules for this group.
All the filters are exposed. For the Assignment by SSID with no authentication, the filter that is
applied to the client session is the default filter.
4. In the Filter ID Values box, type the name of a group that you want to define specific
filtering rules for to control network access.
5. Click the corresponding Add button. The filter ID value appears in the list. These filter ID
values will appear in the Filter ID list on the Filtering tab. These filter ID values must match
those set up for the filter ID attribute in the RADIUS server.
6. If applicable, repeat steps 4 and 5 to add additional filtering ID values.
7. In the VNS Group Name box, type the name of a VNS group you want to create and define
within the selected parent VNS.
8. Click the corresponding Add button. The Group Name will appear as a child of the parent
VNS in the left pane Virtual Networks list.
9. To your changes, click Save.
An interface for which Allow Management is enabled, can be reached by any other
> interface. By default, Allow Management is disabled and shipped interface filters
will only permit the interface to be visible directly from it's own subnet.
The visible exception filters definitions, both in physical ports and VNS definitions, allow
administrators to define a set of rules to be prepended to the system's dynamically updated
exception filter protection rules. Rule evaluation is performed top to bottom, until an exact
match is determined. Therefor, these user-defined rules are evaluated before the system’s own
generated rules. As such, these user-defined rules may inadvertently create security lapses in
the system's protection mechanism or create a scenario that filters out packets that are
required by the system.
The exception rules are evaluated in the context of referring to the specific controller's interface.
The destination address for the filter rule definition is typically defined as the interface's own IP
address. The port number for the filter definition corresponds to the target (destination) port
number for the applicable service running on the controller's management plane.
The exception filter on an VNS applies only to the destination portion of the packet. Traffic to a
specified IP address and IP port is either allowed or denied. Adding exception filtering rules
allows network administrators to either tighten or relax the built-in filtering that automatically
drops packets not specifically allowed by filtering rule definitions. The exception filtering rules
can deny access in the event of a DoS attack, or can allow certain types of management traffic
that would otherwise be denied. Typically, Allow Management is enabled
The Filtering tab automatically provides a Deny All rule already in place. Use this rule as
the final rule in the non-authenticated filter for Captive Portal.
5. For each filtering rule you are defining, do the following:
● In the IP/subnet:port box, type the destination IP address. You can also specify an IP
range, a port designation, or a port range on that IP address.
● In the Protocol drop-down list, select the applicable protocol. The default is N/A.
6. For Captive Portal assignment, define a rule to allow access to the default gateway for this
VNS:
● Select IP/Port.
● Type the default gateway IP address that you defined in the Topology tab for this VNS.
7. Click Add. The information appears in the Filter Rules area of the tab.
8. Select the new filter, then do the following:
● If applicable, select In to refer to traffic from the wireless device that is trying to get on
the network.
● If applicable, select Out to refer to traffic from the network host that is trying to get to
a wireless device.
● Select the Allow checkbox applicable to the rule you defined.
9. Edit the order of a filter by selecting the filter and clicking the Up and Down buttons. The
filtering rules are executed in the order you define here.
10. To save your changes, click Save.
Administrators must ensure that the non-authenticated filter allows access to the
> corresponding authentication server:
● Internal captive portal – IP address of the VNS interface
● External captive portal P – IP address of external captive portal server
For external Captive Portal, an additional rule to Allow (in/out) access to the external
> Captive Portal authentication/Web server is required.
If you place URLs in the header and footer of the Captive Portal page, you must explicitly allow
access to any URLs mentioned in the authentication's server page, such as:
● Internal captive portal – URLs referenced in a header or footer
● External CP – URLs mentioned in the page definition
Here is another example of a non-authenticated filter that adds two more filtering rules. The two
additional rules do the following:
● Deny access to a specific IP address.
● Allows only HTTP traffic.
If the filter ID attribute value (or Login-LAT-Group attribute value) from the RADIUS server
matches a filter ID value that you have set up on the HiPath Wireless Controller, the HiPath
Wireless Controller applies the filtering rules that you defined for that filter ID value to the
wireless device user.
If no filter ID is returned by the authentication server, or no match is found on the HiPath
Wireless Controller, the filtering rules in the default filter will apply to the wireless device user.
The Filtering tab automatically provides a Deny All rule already in place. This rule can be
modified to Allow All, if appropriate to the network access needs for this VNS.
5. For each filtering rule you are defining, do the following:
● In the IP/subnet:port box, type the destination IP address. You can also specify an IP
range, a port designation, or a port range on that IP address.
● In the Protocol drop-down list, select the applicable protocol. The default is N/A.
6. Click Add. The information appears in the Filter Rules area of the tab.
7. Select the new filter, then do the following:
● If applicable, select In to refer to traffic from the wireless device that is trying to get on
the network.
● If applicable, select Out to refer to traffic from the network host that is trying to get to
a wireless device.
● Select the Allow checkbox applicable to the rule you defined.
8. Edit the order of a filter by selecting the filter and clicking the Up and Down buttons. The
filtering rules are executed in the order you define here.
9. To save your changes, click Save.
The Filtering tab automatically provides a Deny All rule already in place. This rule can be
modified to Allow All, if appropriate to the network access needs for this VNS.
Before enabling multicast filters and depending on the topology of the VNS, you may
> need to define which physical interface to use for multicast relay. Define the multicast
port on the IP Addresses screen of the Wireless Controller Configuration tab. For
more information, see Section 4.2.4, “Setting up the data ports”, on page 53.
5. From the WEP Key Length drop-down list, select the WEP encryption key length:
● 40-bit
● 104-bit
● 128-bit
6. Select one of the following input methods:
● Input Hex – If you select Input Hex, type the WEP key input in the WEP Key box. The
key is generated automatically, based on the input.
● Input String – If you select Input String, type the secret WEP key string used for
encrypting and decrypting in the WEP Key String box. The WEP Key box is
automatically filled by the corresponding Hex code.
7. To save your changes, click Save.
● Dynamic keys
● Wi-Fi Protected Access (WPA) version 1, with encryption by Temporal Key Integrity
Protocol (TKIP)
● Wi-Fi Protected Access (WPA) version 2, with encryption by Advanced Encryption
Standard with Counter-Mode/CBC-MAC Protocol (AES-CCMP)
● 104-bit
● 128-bit
6. Select one of the following input methods:
● Input Hex – If you select Input Hex, type the WEP key input in the WEP Key box. The
key is generated automatically, based on the input.
● Input String – If you select Input String, type the secret WEP key string used for
encrypting and decrypting in the WEP Key String box. The WEP Key box is
automatically filled by the corresponding Hex code.
7. To save your changes, click Save.
7.8.2.2 Wi-Fi Protected Access (WPA v1 and WPA v2) Privacy for an AAA VNS
The VNS Privacy feature supports Wi-Fi Protected Access (WPA v1 and WPA v2), a security
solution that adds authentication to enhanced WEP encryption and key management.
The authentication portion of WPA for AAA is in Enterprise Mode:
● Specifies 802.1x with Extensible Authentication Protocol (EAP)
● Requires a RADIUS or other authentication server
● Uses RADIUS protocols for authentication and key distribution
● Centralizes management of user credentials
The encryption portion of WPA v1 is Temporal Key Integrity Protocol (TKIP). TKIP includes:
● A per-packet key mixing function that shares a starting key between devices, and then
changes their encryption key for every packet (unicast key) or after the specified re-key
time interval (broadcast key) expires
● An extended WEP key length of 256-bits
● An enhanced Initialization Vector (IV) of 48 bits, instead of 24 bits, making it more difficult
to compromise
● A Message Integrity Check or Code (MIC), an additional 8-byte code that is inserted before
the standard WEP 4-byte Integrity Check Value (ICV). These integrity codes are used to
calculate and compare, between sender and receiver, the value of all bits in a message,
which ensures that the message has not been tampered with.
The encryption portion of WPA v2 is Advanced Encryption Standard (AES). AES includes:
● A 128 bit key length, for the WPA2/802.11i implementation of AES
● Four stages that make up one round. Each round is iterated 10 times.
● A per-packet key mixing function that shares a starting key between devices, and then
changes their encryption key for every packet or after the specified re-key time interval
expires.
● The Counter-Mode/CBC-MAC Protocol (CCMP), a new mode of operation for a block
cipher that enables a single key to be used for both encryption and authentication. The two
underlying modes employed in CCM include:
● Counter mode (CTR) that achieves data encryption
● Cipher Block Chaining Message Authentication Code (CBC-MAC) to provide data
integrity
The following is an overview of the WPA authentication and encryption process:
● Step one – The wireless device client associates with Wireless AP.
● Step two – Wireless AP blocks the client's network access while the authentication
process is carried out (the HiPath Wireless Controller sends the authentication request to
the RADIUS authentication server).
● Step three – The wireless client provides credentials that are forwarded by the HiPath
Wireless Controller to the authentication server.
● Step four – If the wireless device client is not authenticated, the wireless client stays
blocked from network access.
● Step five – If the wireless device client is authenticated, the HiPath Wireless Controller
distributes encryption keys to the Wireless AP and the wireless client.
● Step six – The wireless device client gains network access via the Wireless AP, sending
and receiving encrypted data. The traffic is controlled with permissions and policy applied
by the HiPath Wireless Controller.
● Auto – The AP will advertise both TKIP and CCMP (Counter Mode with Cipher Block
Chaining Message Authentication Code Protocol) for WPAv1. CCMP is an IEEE
802.11i encryption protocol that uses the encryption cipher AES (Advanced
Encryption Standard). Auto is the default.
● TKIP only – The AP will advertise TKIP as an available encryption protocol for WPAv1.
It will not advertise CCMP.
7. To enable re-keying after a time interval, select Broadcast re-key interval.
If this checkbox is not selected, the Broadcast encryption key is never changed and the
Wireless AP will always use the same broadcast key for Broadcast/Multicast
transmissions. This will reduce the level of security for wireless communications.
8. In the Broadcast re-key interval box, type the time interval after which the broadcast
encryption key is changed automatically. The default is 3600.
9. To save your changes, click Save.
● Private Branch Exchange (PBX) – A private telephone system within an enterprise, with
such features as voicemail.
● Telephony Gateway – For access to an external standard telephone network, such as the
wireless cellular network or the public switched telephone network (PSTN). The Telephony
Gateway should be located on the same subnet as the HiPath Wireless Controller.
For large deployments, an SVP server is required on the enterprise network if Spectralink
devices are to be supported.
11. Define rules that allow access to the DNS server, to the Telephony Gateway, and then deny
all other traffic. For more information, see Section 7.6, “Configuring filtering rules for a
VNS”, on page 153.
12. Click the Privacy tab.
13. Configure privacy to use 104-bit WEP key. This is recommended for greater security. For
more information, see Section 7.8, “Configuring privacy for a VNS”, on page 167.
The most popular level of security support is 104-bit WEP key. (Although, newer
> phones support WPA-PSK, which is considered a better method). Select the
method that is better suited for your deployment and for the type of devices that
are deployed on your network.
For more information, see Section 5.5.4, “Modifying the wireless AP’s radio properties”, on
page 88.
6. To save your changes, click Save.
Active QoS is only applied on the wireless/802.11 domain, not on the wired domain.
>
The APs are capable of supporting 4 queues. The queues are implemented per radio. For
example, 4 queues per radio. The queues are:
Traffic is classified into the VoicePriority queue (highest level access class) in view of the level
of priority override defined for the VNS. VNS’ for which override priority setting has been
defined as voice priority will have access to the higher priority queue.
The HiPath Wireless Controller supports the definition of 8 levels of user priority. These priority
levels are mapped at the AP to the best appropriate access class. Of the 8 levels of user priority,
6 are considered low priority levels and 2 are considered high priority levels.
WMM clients have the same 4 AC queues. WMM clients will classify the traffic and use these
queues when they are associated with a WMM-enabled AP. WMM clients will behave like
non-WMM clients—map all traffic to the BE queue—when not associated with WMM-enabled
AP.
The prioritization of the traffic on the downstream (for example, from wired to wireless) and on
the upstream (for example, from wireless to wired) is dictated by the configuration of the VNS
and the QoS tagging within the packets, as set by the wireless devices and the host devices on
the wired network.
Both Layer 3 tagging (DSCP) and Layer 2 (802.11d) tagging are supported, and the mapping
is conformant with the WMM specification. If both L2 and L3 priority tags are available, then
both are taken into account and the chosen AC is the highest resulting from L2 and L3. If only
one of the priority tags is present, it is used to select the queue. If none is present, the default
queue AC_BE is chosen.
The mapping of the tagged packets to the queues in the AP are as follows:
If the wireless packets to be transmitted must include the L2 priority (send to a WMM
> client from a WMM-enabled AP), the outbound L2 priority is copied from the inbound
L2 priority if available, or it is inferred from the L3 priority using the above table if the
L2 inbound priority is missing.
The following 6 options are available for configuring the QoS behavior of the VNS:
● Best Effort – WMM is disabled and all traffic to and from the wireless client device will be
handled as best effort traffic and will use the queue designated as best effort.
● WMM Priority WMM (WiFi Multimedia – Enables WMM (WiFi Multimedia), which is a WiFi-
defined industry standard intended to provide a standard QoS solution until 802.11e
specification is ratified. This new capability is designed to improve the user experience of
voice, video, and audio applications over a Wi-Fi network. This mode for a VNS enables
the WMM capability on the SSID that is being offered. Therefore, the WMM IE (Information
Element) is included in the 802.11 beacon on the given SSID, allowing WMM clients such
as wireless VoIP handsets, PDAs, and wireless laptops to use WMM. This mode enables
prioritization of traffic in both downstream and upstream directions, but only for WMM
clients.
● Pre-WMM Priority – Does not enable WMM, but enables prioritization of the traffic in the
downstream direction at the AP for all clients (WMM or non-WMM) in the VNS.
● Pre-WMM and WMM Priority – Enables WMM, enabling prioritization of the traffic in the
downstream and upstream directions, but it also enables prioritization of the traffic in the
downstream direction for the non-WMM clients.
● Voice VNS w/o WMM – Forces the highest priority (AC_VO) for the traffic in the
downstream direction for all clients (WMM or non-WMM) in the VNS. This mode changes
the channel access parameters for the downstream direction in order to provide optimum
voice performance. With this mode, WMM is not enabled so there is no prioritization in the
upstream direction.
All traffic on this VNS will be prioritized to use AC_VO. This option is available
> for backward compatibility purposes.
● Voice VNS with WMM – Forces the highest priority (AC_VO) for the traffic in the
downstream direction for all clients (WMM or non-WMM) in the VNS. This mode changes
the channel access parameters for the downstream and upstream directions in order to
provide optimum voice performance. With this mode, WMM is also enabled and there is
prioritization in the upstream direction for WMM clients. All non-WMM clients will use
AC_BE for upstream.
For the wired domain an Adaptive QoS mechanism is offered. With this mechanism, the original
QoS - TOS field (Diffserv/Precedence bits) of the original user packet is maintained end-to-end
within the CTP tunneling. This is achieved by copying the original TOS fields from the user
packet to the tunneled packet. The following diagram displays this process.
At this time, Layer 2 802.1d bits are not carried across the tunnel. The HiPath
> Wireless Controller C2400 supports functionality (CTP_QoS field) by which L2
priority flags for user traffic received from a core VLAN is copied into the CTP header
(CTP_QoS field) and passed to the AP to determine the corresponding access
class.
● Turbo Voice – <<< attention reviewer: need descriptions of what this option
does.>>:
5. To define the service class and DSCP marking for the VNS, select the Priority Override
checkbox:
● Service class – From the drop-down list, select the appropriate priority level:
● Network control (7) – The highest priority level.
● Premium (Voice) (6)
● Platinum (5)
● Gold (4)
● Silver (3)
● Bronze (2)
● Best Effort (1)
● Background (0) – The lowest priority level
● DSCP marking –
6. If you want to assign a service class to each DSCP marking, clear the Priority Override
checkbox and define the DSCP service class priorities in the DSCP classification table.
7. The Advanced Wireless QoS options are only displayed if the WMM or 802.11e
checkboxes are selected:
● Enable U-APSD checkbox – <<<need def. explanation>>>
● Use Global Admission Control for Voice (VO) checkbox – <<<need def.
explanation>>>
The VLAN IDs are assigned by the branch office network administrator. The AP
> will operate correctly only if the VLAN ID is unique per AP and there is at most
one untagged VNS per AP.
In previous releases, an entire AP had to be put into branch mode. In the current
> release, an individual VNS can be put into bridging mode. An AP can have bridged
and non-bridged VNSs.
If it has more then one branch mode VNS, only one bridged VNS can be untagged
per AP. The other branch mode VNSs need to have unique VLAN ID. You must have
VLAN aware L2 switches to support this feature.
When a VNS is setup for bridged mode, it cannot be switched to tunneled mode. The
> administrator must delete and re-add the VNS.
The availability feature provides APs with a list of interfaces to which the AP should
> attempt to automatically connect to when a connection with an active controller link
is lost. The provided list identifies the local active interfaces (enabled on the primary
and backup controllers) for the active controller as well as the active interfaces for
the backup controller. The list is sorted by top-down priority. If the active link is lost
(poll failure), the AP automatically scans (pings) all addresses in its availability
interface list. The AP will then connect to the highest priority interface that responds
to its probe.
If two HiPath Wireless Controllers are paired and one has the Allow All option
7 set for Wireless AP registration, all Wireless APs will register with that HiPath
Wireless Controller.
Once the initial setup is complete, it is recommended that the security mode is
reset to the Allow only approved Wireless APs to connect option. This option
ensures that no unapproved wireless APs are allowed to connect. For more
information, see Section 5.5, “Modifying wireless AP settings”, on page 81.
When two HiPath Wireless Controllers have been paired as described above, each
> HiPath Wireless Controller's registered wireless APs will appear as foreign in the list
of available wireless APs when configuring a VNS topology.
After the wireless AP on the failed HiPath Wireless Controller loses its connection, it will attempt
a reboot, unless the Link Persistence option is enabled. (If the AP is unsuccessful after five
minutes of attempting to register with the controller, the AP does not reboot, and instead waits
five minutes before attempting to reboot and register again.)
If the AP is assigned to different VNSs on the two controllers, it will reboot. Because of the
pairing of the two HiPath Wireless Controllers, the wireless AP will then register with the other
HiPath Wireless Controller.
All user sessions using the AP that fails over will terminate unless the Maintain client
sessions in event of poll failure option is enabled on the AP Properties tab or AP Default
Settings screen.
When the Wireless APs connect to the second HiPath Wireless Controller, they will be
assigned to the failover VNS defined in setup in that HiPath Wireless Controller. The wireless
device users will log in again and be authenticated on the second HiPath Wireless Controller.
When the failed HiPath Wireless Controller recovers, each HiPath Wireless Controller in the
pair goes back to normal mode. They exchange information that includes the latest lists of
registered Wireless APs. The administrator must release the Wireless APs manually on the
second HiPath Wireless Controller, so that they may re-register with their home HiPath
Wireless Controller. Foreign APs can now all be released at once by using the Foreign button
on the Access Approval screen to select all foreign APs, and then clicking Released.
To support the Availability feature during a failover event, administrators need to do the
following:
1. Monitor the critical messages for the failover mode message, in the information log of the
remaining HiPath Wireless Controller (in the Reports and Displays area).
2. After recovery, on the HiPath Wireless Controller that did not fail, select the foreign
Wireless APs and click on the Release button (in the Wireless AP Configuration - AP
Maintenance screen).
● Uses the information from every Heartbeat message received to update its own tables and
updates the mobility manager with information on the wireless device users and data
tunnels it is managing
If a controller configured as the mobility manager is lost, the following occurs:
● Agent to agent connections will remain active.
● Mobiltity agents will continue to operate based on the mobility information last coordinated
before the manager link was lost. The mobilility location list remains relatively unaffected
by the controller failure. Only entries associated with the failed controller are cleared from
the registration list, and users that have roamed from the manager controller to other
agents are terminated and required to re-register as local users with the agent where they
are currently located.
● Participant controllers are reset to nodal operation
● Any user sessions that roamed away from their home AP are terminated and must
reconnect
● Users need to reconnect to network, re-authenticate, and obtain new IP address
● The data link between active controllers remains active after the loss of a mobility manager
● Mobility agents continue to use the last set of mobility location list to service known users
● Existing users:
● Existing users remain in mobility scenario, and if the users are known to mobility
domain, they continue to be able to roam between connected controllers
● New users :
● New users become local at attaching controller
● Roaming to another controller resets session
3. To enable mobility for this controller, select the Enable Mobility checkbox. The controller
mobility options appear.
4. Select the This Wireless Controller is a Mobility Manager option. The mobility manager
options appear.
5. In the Port drop-down list, select the interface on the HiPath Wireless Controller to be used
for the mobility manager process. Ensure that the selected interface is routable on the
network.
6. In the Heartbeat box, type the time interval (in seconds) at which the mobility manager
sends a Heartbeat message to a mobility agent. The default is 5 seconds.
7. In the SLP Registration drop-down list, select whether to enable or disable SLP
registration.
8. In the Permission list, select the agent IP addresses you want to approve that are in
pending state, by selecting the agent and clicking Approve. New agents are only added to
the domain if they are approved.
You can also add or delete controllers that you want to be part of the mobility domain. To
add a controller, type the agent IP address in the box, and then click Add. To delete a
controller, select the controller in the list, and then click Delete.
5. In the Port drop-down list, select the port on the HiPath Wireless Controller to be used for
the mobility agent process. Ensure that the port selected is routable on the network.
6. In the Heartbeat box, type the time interval (in seconds) to wait for a connection
establishment response before trying again. The default is 60 seconds.
7. From the Discovery Method drop-down list, select one of the following:
● SLPD – Service Location Protocol Daemon is a background process acting as a SLP
server. It provides the functionality of the Directory Agent and Service Agent for SLP.
Use SLP to support the discovery of siemensNET service to attempt to locate the area
mobility manager controller.
● Static Configuration – Select Static Configuration if you want to enter the IP address
of the mobility manager manually. Defining a static configuration for a mobility
manager IP address bypasses SLP discovery.
8. In the Mobility Manager Address box, type the IP address for the designated mobility
manager.
9. To save your changes, click Save.
The user_admin list displays Admin users who have read/write privileges. The user_read
list is for users who have read only privileges.
3. From the Group pull-down list, select Admin or Read only.
4. In the User ID box, type the user ID for the new user. A User ID can only be used once, in
only one category.
5. In the Password box, type the password for the new user.
6. In the Confirm Password, re-type the password. The $ character is not permitted.
7. Click on the Add User button. The new user is added to the appropriate user list.
3. From the Continent or Ocean drop-down list, select the appropriate large-scale
geographic grouping for the time zone.
4. From the Country drop-down list, select the appropriate country for the time zone. The
contents of the drop-down list change based on the selection in the Continent or Ocean
drop-down list.
5. From the Time Zone Region drop-down list, select the appropriate time zone region for
the selected country.
6. To apply your changes, click Apply Time Zone.
Before you set up the HiPath Wireless Controller, you must first create OPSEC
> objects for HiPath Wireless Controller in the Check Point management software. The
name and password you define must also be entered into the HiPath Wireless
Controller Check Point configuration screen.
3. To enable check point logging, select the Enable Check Point Logging checkbox.
4. Type the following information:
● Check Point Server IP – Specifies the IP address of the ELA Management Station
● ELA Port – Specifies the port to use for ELA. The default port is 18187.
● ELA Log Interval – Specifies the amount of time (in milliseconds) you want the system
to wait before attempting to log once there is a connection between HiPath Wireless
Controller and the Check Point gateway. The default is 100 milliseconds.
● ELA Retry Interval – Specifies the amount of time (in milliseconds) you want the
system to wait before attempting a re-connection between HiPath Wireless Controller
and the Check Point gateway. The default is 2000 milliseconds.
● ELA Message Queue Size – Specifies the number of messages the log queue holds
if the HiPath Wireless Controller and the Check Point gateway become disconnected.
The default is 1000 log entries.
● SIC Name – Specifies the Secure Internal Communication (SIC) Name, your security-
based ID.
● SIC Password – Specifies your Secure Internal Communication (SIC) password. You
can use the Unmask button to display the password.
5. To save your changes, click Save.
6. To create the certificate to be sent to the ELA Management Station, click Generate
Certificate button.
If the certificate is properly generated and the connection with the ELA Management
Station is made, the Connection Status area displays the following message:
OPSEC Connection OK
If there is an error in generating the certificate or establishing the connection, the
Connection Status area displays the following message:
OPSEC Connection Error
The HiPath Wireless Controller is not fully compliant with MIB II. For example, esa/
> IXP ports only provide interface statistics.
● Read/Write Community Name – Specifies the community name for users with read
and write privileges
● SNMP Trap Port – Specifies the destination port for SNMP traps. The industry
standard is 162. If left blank, no traps are generated.
● Forward Traps – Specifies the security level of the traps to be forwarded. From the
drop-down list, select Informational, Minor, Major, or Critical.
● Manager A – Specifies the IP address of the specific machine on the network where
the SNMP traps are monitored
● Manager B – Specifies the IP address of a second machine on the network where the
SNMP traps are monitored, if Manager A is not available
For security purposes, it is recommended that you immediately change the Read
> Community Name (public) and the Read/Write Community Name (private) to names
that are less obvious and more secure.
3. In the Web Session Timeout box, type the time period to allow the Web session to remain
inactive before it times out. This can be entered as hour:minutes, or as minutes. The range
is 1 minute to 168 hours.
4. Select the Show VNS names on the Wireless AP SSID list checkbox to allow the names
of the VNSs to appear in the SSID list for wireless APs.
5. To save your settings, click Save.
Pages that auto-refresh will time out, unless a manual action takes place prior to the
> end of the timeout period.
3. Highlight the appropriate port, and in the Function box, select 3rd-party AP from the
drop-down list. Make sure that Management Traffic and SLP are disabled for this port.
4. Connect the third-party access point to this port, via a switch.
Bridge Traffic at AP and MAC-based authentication are not available for Third Party
> VNSs.
In a network with more than one HiPath Wireless Controller, it is not necessary for
> the data collector to be running on the same controller as the Analysis Engine. One
controller can be a dedicated Analysis Engine while the other controllers run data
collector functionality. No more than one Analysis Engine can be running at a time.
You must ensure that the controllers are all routable.
3. To enable the Mitigator Analysis Engine, select the Mitigator Analysis Engine checkbox.
4. To enable the Mitigator Data Collection Engine on this HiPath Wireless Controller, select
the Enable Local Mitigator Data Collection Engine checkbox.
5. To identify the remote RF Data Collector Engine that the Analysis Engine will poll for data,
type the IP address of the HiPath Wireless Controller on which the remote Data Collector
resides in the IP Address box. The local IP address is displayed by default.
6. For the data collection engine:
● In the Poll interval box, type (in seconds) the interval that the Analysis Engine will poll
the RF Data Collector to maintain connection status. The default is 30 seconds.
● In the Poll retry count box, type the number of times the Analysis Engine will attempt
to poll the RF Data Collector to maintain connection status, before it stops sending
requests. The default is 2 attempts.
7. Click Add. The IP address of the Data Collection Engine, with its Poll Interval and Poll
Retry parameters, appears in the list.
For each remote RF Data Collection Engine defined here, you must:
> ● Enable it by selecting the Enable Mitigator Analysis Engine checkbox on
the remote HiPath Wireless Controller
● Ensure that the controllers are routable by whatever means you use (for
example, static routes, or OSPF).
A scan will not run on an inactive AP, even though it appears as part of the Scan
> Group. If it becomes active, it will be sent a scan request during the next periodic
scan.
3. In the Scan Group Name box, type a unique name for this scan group.
4. In the Wirelss APs list, select the checkbox corresponding to the Wireless APs you want
included in the new scan group, which will perform the scan function.
In the current release, there is no capability to initiate a DoS attack on the detected
> rogue access point. Containment of a detected rogue requires an inspection of the
geographical location of its Scan Group area, where its RF activity has been found.
5. To view the Rogue Summary report, click Rogue Summary. The Rogue Summary report
appears in a popup window.
6. To clear all detected rogue devices from the list, click Clear Detected Rogues.
To avoid the Mitigator's database becoming too large, it is recommended that you
> either delete Rogue APs or add them to Friendly AP list, rather than leaving them in
the Rogue list.
To add an AP from the Mitigator scan results to the list of friendly APs:
1. From the main menu, click Mitigator. The Mitigator screen appears.
2. Click the Rogue Detection tab.
3. To add a Wireless AP to the Friendly APs list, click Add to Friendly List. The access point
item is removed from this list and appears in the Friendly AP Definitions area of the
Friendly APs tab.
4. To clear all rogue access points from the Mitigator scan results, click Clear Detected
Rogues. All APs are removed from the list.
3. To delete the marked access points from the Mitigator database, click Delete marked APs.
The selected access points are deleted from the Mitigator database, not from
> the HiPath Wireless Controller database.
The boxes display the IP address of the Data Collector engine. The status of the Data Collector
engine is indicated by one of the following colors:
● Green – The Analysis Engine has connection with the Data Collector on that HiPath
Wireless Controller.
● Yellow – The Analysis Engine has connected to the communication system of the other
controller, but has not synchronized with the Data Collector. Ensure that the Data Collector
is running on the remote controller.
● Red – The Analysis Engine is aware of the Data Collector and attempting connection.
If no box appears, the Analysis Engine is not attempting to connect with that Data Collector
Engine.
If the box appears red and remains red, ensure your IP address is correctly set
> up to point to an active controller. If the box remains yellow, ensure the Data
Collector is running on the remote controller.
The following displays are available in the HiPath Wireless Controller, Access Points and
Convergence Software system:
● Active Wireless APs
● Active Clients by Wireless AP
● Active Clients by VNS
● Wireless Controller Port Statistics
● Wireless AP Availability
● Wired Ethernet Statistics by Wireless AP
● Wireless Statistics by Wireless AP
● Client Location in Mobility Zone
● Mobility Tunnel Matrix
The two displays on the right-hand side of the screen only appear if the mobility
> manager function has been enabled for the controller.
2. In the List of Displays, click the display you want to view (some examples will follow):
Statistics are expressed in relation to the AP. Therefore, Packets Sent means the
> AP has sent that data to a client and Packets Rec’d means the AP has received
packets from a client.
In normal operations, when Availability is enabled, the local Wireless APs are green, and the
foreign Wireless APs are red. If the other HiPath Wireless Controller fails, and the foreign
Wireless APs connect to the current HiPath Wireless Controller, the display will show all
Wireless APs as green. If the Wireless APs are not attached they do not appear in the report.
3. In the Wired Ethernet Statistics by Wireless APs display, click a registered Wireless APs
to display its information.
3. In the Wired Ethernet Statistics by Wireless APs display, click a registered Wireless APs
to display its information.
4. Click the appropriate tab to display information for each radio on the Wireless AP.
5. To view information on a selected associated client, click View Client. The Associated
Clients display appears in a new browser window.
Statistics are expressed in respect of the AP. Therefore, Packets Sent means the AP has sent
that data to a client and Packets Rec’d means the AP has received packets from a client.
Time Conn is the length of time that a client has been on the system, not just on an AP. If the
client roams from one AP to another, the session stays, therefore Time Conn does not reset.
A client appears as soon as the client connects (or after refresh of screen). The client
disappears as soon as it times out.
The statistics from the mobility manager are updated every thirty seconds,
> regardless of the refresh period for the displays.
To view reports:
1. From the main menu, click Reports & Displays. The HiPath Reports & Displays screen
appears.
2. In the Reports list, click the report you want to view:
● Forwarding Table
● OSPF Neighbor
● OSPF Linkstate
● AP Inventory
The AP Inventory report appears in a new browser window. All other reports appear
> in the current browser window.
If you open only automatically refreshed report pages, the web management
> session timer will not be updated or reset. Your session will eventually timeout.
If your default XML viewer is Internet Explorer or Netscape, clicking Open will
> open the exported data to your display window. You must right click to go back
to the export display. The XML data file will not be saved to your local drive.
3. Browse to the location where you want to save the exported XML data file, and in the File
name box enter an appropriate name for the file.
4. Click Save. The XML data file is saved in the specified location.
You can search for a client by MAC Address, IP Address or User ID, by selecting
> the search parameters from the drop-down lists and typing a search string in the
Search box and clicking Search. You can also use the Select All or Clear All
buttons to help you select multiple clients.
You can search for a client by MAC Address, IP Address or User ID, by selecting
> the search parameters from the drop-down lists and typing a search string in the
Search box and clicking Search. You can also use the Select All or Clear All
buttons to help you select multiple clients.
5. Click Add to Blacklist. The selected wireless client's MAC address is added to the
blacklist.
4. To add a new MAC address to the blacklist, in the MAC Address box enter the client’s MAC
address.
5. Click Add. The client appears in the MAC Addresses list.
You can use the Select All or Clear All buttons to help you select multiple
> clients.
You can use the Select All or Clear All buttons to help you select multiple
> clients.
The restoration of factory default settings does not erase the non-volatile log.
7
To reset the AP to its factory default settings:
1. Reboot the AP.
2. Depower and repower the AP during the vulnerable time interval.
3. Repeat Step 2 two more times.
When the AP reboots for the fourth time, after having its power supply interrupted three
consecutive times, it restores its factory default settings. The AP then reboots again to put
the default settings into effect.
2. In the System Log Level area, from the Wireless Controller Log Level drop-down list,
select the least severe log level for the Controller that you want to receive: Information,
Minor, Major, Critical. For example, if you select Minor, you receive all Minor, Major and
Critical messages. If you select Major you receive all Major and Critical messages. The
default is Information.
3. Click Apply.
4. From the Wireless AP Log Level drop-down list, select the least severe log level for the
AP that you want to receive: Information, Minor, Major, Critical. The default is Critical.
5. Click Apply.
The syslog daemon must be running on both the HiPath Wireless Controller and on
> the remote syslog server before the logs can be synchronized. If you change the log
level on the HiPath Wireless Controller, you must also modify the appropriate setting
in the syslog configuration on remote syslog server.
Table 18shows Syslog and Controller, Access Points and Convergence Software event log
mapping.
The Available HWC Images area displays the list of software versions that have been
downloaded and are available.
3. In the Upgrade area, select an image from the Select an image to use drop-down list.
It is recommended that the Bypass checks for compatible upgrade RPM and
> OS patch and the Skip backup during RPM un-install options remain
disabled.
4. To launch the upgrade with the selected image, click on the Upgrade Now button.
5. In the dialog box that appears, confirm the upgrade.
At this point, all sessions are closed. The previous software is uninstalled automatically.
The new software is installed. The HiPath Wireless Controller reboots automatically. The
database is updated and migrated.
The Available OS Images area displays the list of software versions that have been
downloaded and are available.
4. In the Upgrade area, select an image from the Select an image to use drop-down list.
5. To launch the upgrade with the selected image, click Upgrade Now.
6. In the dialog box that appears, confirm the upgrade.
At this point, all sessions are closed. The previous software is uninstalled automatically.
The new software is installed. The HiPath Wireless Controller reboots automatically.
4. To delete a software image from the list, in the Available OS Images list, click the image.
5. Click Delete. The image is removed from the list.
The Available Backups area displays the list items that have been backed up and are
available.
4. In the Backup area, select an item from the Select what to backup drop-down list.
5. To launch the backup with the selected items, click on the Backup Now button.
6. In the dialog box that appears, confirm the backup. The items are backed up.
To delete a backup:
1. From the main menu, click Wireless Controller Configuration. The Wireless Controller
Configuration screen appears.
2. From the left pane, click Software Maintenance. The HWC Software tab appears.
3. Click the Backup tab.
4. To delete a backup from the list, in the Available Backups list, click the backup.
5. Click Delete. The backup is removed from the list.
To schedule a backup:
1. From the main menu, click Wireless Controller Configuration. The Wireless Controller
Configuration screen appears.
2. From the left pane, click Software Maintenance. The HWC Software tab appears.
3. Click the Backup tab.
4. Click Schedule Backup. The Schedule Backups screen appears.
5. In the What to backup drop-down list, select what you want to backup:
● Config’s, CDRs, Logs, Audit and Rogue
● Configurations only
● CDRs only
● Logs only
● Audit only
● Rogue only
6. In the Schedule task drop-down list, select the frequency of the backup:
● Daily
● Weekly
● Monthly
● Never
7. In the FTP settings area, type the following:
● FTP Server – The IP of the FTP server to where the scheduled backup will be copied
to.
● User ID – The user ID that the controller should use when it attempts to log in to the
FTP server.
● Password – The corresponding password for the user ID
● Confirm – The corresponding password for the user ID to confirm it was typed
correctly.
● Directory – The directory on the server where the image file will be stored.
8. To save your changes, click Save.
The Available Backups area displays the list items that have been backed up and are
available.
4. In the Restore area, select an item from the Select an image to use drop-down list.
5. To launch the backup with the selected items, click on the Restore Now button.
6. In the dialog box that appears, confirm the restore. The image is restored.
● User ID – The user ID that the controller should use when it attempts to log in to the
FTP server.
● Password – The corresponding password for the user ID.
● Confirm – The corresponding password for the user ID to confirm it was typed
correctly.
● Directory – The directory on the server in which the image file that is to be retrieved
is stored.
● Filename – The name of the image file to retrieve.
● Platform – The AP hardware type to which the image applies. The are several types
of AP and they require different images.
5. Click Download. The image is downloaded and added to the list.
mp
Manager. To configure the HiPath Wireless Controller to interact with the HiPath Wireless
Manager, a shared secret must be defined for both. For more information, see the HiPath
Wireless Manager User Guide.
To configure a shared secret for interaction with the HiPath Wireless Manager
1. From the main menu, click Wireless Controller Configuration. The Wireless Controller
Configuration screen appears.
2. From the left pane, click Secure Connections. The Shared Secret for Remote
Connections screen appears.
7. To remove a connections, select the IP address in the table and then click Remove
Selected Peer.
8. To save your changes, click Save.
To view logs:
1. From the main menu, click Logs & Traces. The Logs & Traces screen appears.
2. In the Navigation bar, click one of the Log tabs. The selected Log screen appears. The
following is an example of the HiPath Wireless Controller logs:
The events are displayed in chronological order, sorted by the Timestamp column.
3. To sort the display by Type or Component, click the appropriate column heading.
4. To filter the logs by severity, in order to display only Info, Minor, Major, or Critical logs,
click the appropriate Log tab at the top of the screen.
5. To refresh the information in any display, click Refresh.
6. To export information from a display as an HTML file, click the Export button.
The component called "Langley" is the term for the inter-process messaging infrastructure on
the HiPath Wireless Controller.
To view traces:
1. From the main menu, click Logs & Traces. The Logs & Traces screen appears.
2. In the Navigation bar, click one of the Traces tabs. The selected Trace screen appears. The
following is an example of the HiPath Wireless Controller traces:
The events are displayed in chronological order, sorted by the Timestamp column.
3. To sort the display by Type or Component, click the appropriate column heading.
4. To filter the traces by severity, in order to display only Info, Minor, Major, or Critical traces,
click the appropriate Traces tab at the top of the screen.
To view audits:
1. From the main menu, click Logs & Traces. The Logs & Traces screen appears.
2. In the Navigation bar, click the Audit: GUI tab. The Audit screen appears.
The events are displayed in chronological order, sorted by the Timestamp column.
3. To sort the display by User, Section, Page, or Audit Message, click the appropriate
column heading.
4. To clear the audits from the list, click Clear Audits.
5. To refresh the information in any display, click Refresh.
6. To export information from a display as an HTML file, click the Export button.
To clear logs:
1. From the main menu, click Logs & Traces. The Logs & Traces screen appears.
2. In the Navigation bar, click one of the Log tabs. The selected Log screen appears. The
following is an example of the HiPath Wireless Controller logs:
The events are displayed in chronological order, sorted by the Timestamp column.
3. To clear the logs, click Clear Log Messages.
13 Glossary
Term Explanation
AAA Authentication, Authorization and Accounting. A system in IP-based
networking to control what computer resources users have access to
and to keep track of the activity of users over a network.
Access Point (AP) A wireless LAN transceiver or "base station" that can connect a wired
LAN to one or many wireless devices.
Ad-hoc mode An 802.11 networking framework in which devices or stations
communicate directly with each other, without the use of an access
point (AP). (Compare Infrastructure Mode)
AES Advanced Encryption Standard (AES) is an algorithm for encryption
that works at multiple network layers simultaneously. As a block cipher,
AES encrypts data in fixed-size blocks of 128 bits. AES was created
by the National Institute of Standards and Technology (NIST). AES is
a privacy transform for IPSec and Internet Key Exchange (IKE). AES
has a variable key length - the algorithm can specify a 128-bit key (the
default), a 192-bit key, or a 256-bit key.
For the WPA2/802.11i implementation of AES, a 128 bit key length is
used. AES encryption includes 4 stages that make up one round. Each
round is then iterated 10, 12 or 14 times depending upon the bit-key
size. For the WPA2/802.11i implementation of AES, each round is
iterated 10 times.
AES-CCMP AES uses the Counter-Mode/CBC-MAC Protocol (CCMP). CCM is a
new mode of operation for a block cipher that enables a single key to
be used for both encryption and authentication. The two underlying
modes employed in CCM include Counter mode (CTR) that achieves
data encryption and Cipher Block Chaining Message Authentication
Code (CBC-MAC) to provide data integrity.
ARP Address Resolution Protocol. A protocol used to obtain the physical
addresses (such as MAC addresses) of hardware units in a network
environment. A host obtains such a physical address by broadcasting
an ARP request, which contains the IP address of the target hardware
unit. If the request finds a unit with that IP address, the unit replies with
its physical hardware address.
Association A connection between a wireless device and an Access Point.
Table 19
Glossary
Networking terms and abbreviations
Term Explanation
asynchronous Asynchronous transmission mode (ATM). A start/stop transmission in
which each character is preceded by a start signal and followed by one
or more stop signals. A variable time interval can exist between
characters. ATM is the preferred technology for the transfer of images.
BSS Basic Service Set. A wireless topology consisting of one Access Point
connected to a wired network and a set of wireless devices. Also called
an infrastructure network. See also IBSS.
Captive Portal A browser-based authentication mechanism that forces
unauthenticated users to a web page. Sometimes called a "reverse
firewall".
CDR Call Data (Detail) Record
In Internet telephony, a call detail record is a data record that contains
information related to a telephone call, such as the origination and
destination addresses of the call, the time the call started and ended,
the duration of the call, the time of day the call was made and any toll
charges that were added through the network or charges for operator
services, among other details of the call.
In essence, call accounting is a database application that processes
call data from your switch (PBX, iPBX, or key system) via a CDR (call
detail record) or SMDR (station message detail record) port. The call
data record details your system's incoming and outgoing calls by
thresholds, including time of call, duration of call, dialing extension,
and number dialed. Call data is stored in a PC database
CHAP Challenge-Handshake Authentication Protocol. One of the two main
authentication protocols used to verify a user's name and password for
PPP Internet connections. CHAP is more secure than PAP because it
performs a three-way handshake during the initial link establishment
between the home and remote machines. It can also repeat the
authentication anytime after the link has been established.
CLI Command Line Interface.
Collision Two Ethernet packets attempting to use the medium simultaneously.
Ethernet is a shared media, so there are rules for sending packets of
data to avoid conflicts and protect data integrity. When two nodes at
different locations attempt to send data at the same time, a collision
will result. Segmenting the network with bridges or switches is one way
of reducing collisions in an overcrowded network.
Table 19
Term Explanation
Datagram A datagram is "a self-contained, independent entity of data carrying
sufficient information to be routed from the source to the destination
computer without reliance on earlier exchanges between this source
and destination computer and the transporting network." (RFC1594).
The term has been generally replaced by the term packet. Datagrams
or packets are the message units that the Internet Protocol deals with
and that the Internet transports.
Decapsulation See tunnelling.
Device Server A specialized, network-based hardware device designed to perform a
single or specialized set of server functions. Print servers, terminal
servers, remote access servers and network time servers are
examples of device servers.
DHCP Dynamic Host Configuration Protocol. A protocol for assigning
dynamic IP addresses to devices on a network. With dynamic
addressing, a device can have a different IP address every time it
connects to the network. In some systems, the device's IP address can
even change while it is still connected. DHCP also supports a mix of
static and dynamic IP addresses.
DHCP consists of two components: a protocol for delivering host-
specific configuration parameters from a DHCP server to a host and a
mechanism for allocation of network addresses to hosts. (IETF
RFC1531.)
Option 78 specifies the location of one or more SLP Directory Agents.
Option 79 specifies the list of scopes that a SLP Agent is configured to
use.(RFC2610 - DHCP Options for Service Location Protocol)
Directory Agent (DA) A method of organizing and locating the resources (such as printers,
disk drives, databases, e-mail directories, and schedulers) in a
network. Using SLP, networking applications can discover the
existence, location and configuration of networked devices.
With Service Location Protocol, client applications are 'User Agents'
and services are advertised by 'Service Agents'. The User Agent
issues a multicast 'Service Request' (SrvRqst) on behalf of the client
application, specifying the services required. The User Agent will
receive a Service Reply (SrvRply) specifying the location of all
services in the network which satisfy the request.
For larger networks, a third entity, called a 'Directory Agent', receives
registrations from all available Service Agents. A User Agent sends a
unicast request for services to a Directory Agent (if there is one) rather
than to a Service Agent.
(SLP version 2, RFC2608, updating RFC2165)
Table 19
Glossary
Networking terms and abbreviations
Term Explanation
Diversity antenna and The AP has two antennae. Receive diversity refers to the ability of the
receiver AP to provide better service to a device by receiving from the user on
which ever of the two antennae is receiving the cleanest signal.
Transmit diversity refers to the ability of the AP to use its two antenna
to transmit on a specific antenna only, or on a alternate antennae. The
antennae are called diversity antennae because of this capability of
the pair.
DNS Domain Name Server
DSSS Direct-Sequence Spread Spectrum. A transmission technology used
in Local Area Wireless Network (LAWN) transmissions where a data
signal at the sending station is combined with a higher data rate bit
sequence, or chipping code, that divides the user data according to a
spreading ratio. The chipping code is a redundant bit pattern for each
bit that is transmitted, which increases the signal's resistance to
interference. If one or more bits in the pattern are damaged during
transmission, the original data can be recovered due to the
redundancy of the transmission. (Compare FHSS)
DTIM DTIM delivery traffic indication message (in 802.11 standard)
Dynamic WEP The IEEE introduced the concept of user-based authentication using
per-user encryption keys to solve the scalability issues that
surrounded static WEP. This resulted in the 802.1X standard, which
makes use of the IETF's Extensible Authentication Protocol (EAP),
which was originally designed for user authentication in dial-up
networks. The 802.1X standard supplemented the EAP protocol with
a mechanism to send an encryption key to a wireless Access Point
(AP). These encryption keys are used as dynamic WEP keys, allowing
traffic to each individual user to be encrypted using a separate key.
Table 19
Term Explanation
EAP-TLS EAP-TLS Extensible Authentication Protocol - Transport Layer
EAP-TTLS Security. A general protocol for authentication that also supports
multiple authentication methods, such as token cards, Kerberos, one-
time passwords, certificates, public key authentication and smart
cards. IEEE 802.1x specifies how EAP should be encapsulated in LAN
frames.
In wireless communications using EAP, a user requests connection to
a WLAN through an access point, which then requests the identity of
the user and transmits that identity to an authentication server such as
RADIUS. The server asks the access point for proof of identity, which
the access point gets from the user and then sends back to the server
to complete the authentication.
EAP-TLS provides for certificate-based and mutual authentication of
the client and the network. It relies on client-side and server-side
certificates to perform authentication and can be used to dynamically
generate user-based and session-based WEP keys.
EAP-TTLS (Tunneled Transport Layer Security) is an extension of
EAP-TLS to provide certificate-based, mutual authentication of the
client and network through an encrypted tunnel, as well as to generate
dynamic, per-user, per-session WEP keys. Unlike EAP-TLS, EAP-
TTLS requires only server-side certificates.
(See also PEAP)
ELA (OPSEC) Event Logging API (Application Program Interface) for OPSEC, a
module in Check Point used to enable third-party applications to log
events into the Check Point VPN-1/FireWall-1 management system.
Encapsulation See tunnelling.
ESS Extended Service Set (ESS). Several Basic Service Sets (BSSs) can
be joined together to form one logical WLAN segment, referred to as
an extended service set (ESS). The SSID is used to identify the ESS.
(See BSS and SSID.)
FHSS Frequency-Hopping Spread Spectrum. A transmission technology
used in Local Area Wireless Network (LAWN) transmissions where the
data signal is modulated with a narrowband carrier signal that "hops"
in a random but predictable sequence from frequency to frequency as
a function of time over a wide band of frequencies. This technique
reduces interference. If synchronized properly, a single logical channel
is maintained. (Compare DSSS)
Table 19
Glossary
Networking terms and abbreviations
Term Explanation
Fit, thin and fat APs A thin AP architecture uses two components: an access point that is
essentially a stripped-down radio and a centralized management
controller that handles the other WLAN system functions. Wired
network switches are also required.
A fit AP, a variation of the thin AP, handles the RF and encryption, while
the central management controller, aware of the wireless users'
identities and locations, handles secure roaming, quality of service,
and user authentication. The central management controller also
handles AP configuration and management.
A fat (or thick) AP architecture concentrates all the WLAN intelligence
in the access point. The AP handles the radio frequency (RF)
communication, as well as authenticating users, encrypting
communications, secure roaming, WLAN management, and in some
cases, network routing.
FQDN Fully Qualified Domain Name. A "friendly" designation of a computer,
of the general form computer.[subnetwork.].organization.domain. The
FQDN names must be translated into an IP address in order for the
resource to be found on a network, usually performed by a Domain
Name Server.
FTM Forwarding Table Manager
FTP File Transfer Protocol
Gateway In the wireless world, an access point with additional software
capabilities such as providing NAT and DHCP. Gateways may also
provide VPN support, roaming, firewalls, various levels of security, etc.
Gigabit Ethernet The high data rate of the Ethernet standard, supporting data rates of
1 gigabit (1,000 megabits) per second.
GUI Graphical User Interface
Heartbeat message A heartbeat message is a UDP data packet used to monitor a data
connection, polling to see if the connection is still alive.
In general terms, a heartbeat is a signal emitted at regular intervals by
software to demonstrate that it is still alive. In networking, a heartbeat
is the signal emitted by a Level 2 Ethernet transceiver at the end of
every packet to show that the collision-detection circuit is still
connected.
Table 19
Term Explanation
Host (1) A computer (usually containing data) that is accessed by a user
working on a remote terminal, connected by modems and telephone
lines.
(2) A computer that is connected to a TCP/IP network, including the
Internet. Each host has a unique IP address.
HTTP Hypertext Transfer Protocol is the set of rules for transferring files (text,
graphic images, sound, video, and other multimedia files) on the World
Wide Web. A Web browser makes use of HTTP. HTTP is an application
protocol that runs on top of the TCP/IP suite of protocols. (RFC2616:
Hypertext Transfer Protocol -- HTTP/1.1)
HTTPS Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over
SSL, is a Web protocol that encrypts and decrypts user page requests
as well as the pages that are returned by the Web server. HTTPS uses
Secure Socket Layer (SSL) as a sublayer under its regular HTTP
application layering. (HTTPS uses port 443 instead of HTTP port 80 in
its interactions with the lower layer, TCP/IP.) SSL uses a 40-bit key size
for the RC4 stream encryption algorithm, which is considered an
adequate degree of encryption for commercial exchange.
IBSS Independent Basic Service Set. See BSS. An IBSS is the 802.11 term
for an adhoc network. See adhoc network.
ICMP Internet Control Message Protocol, an extension to the Internet
Protocol (IP) defined by RFC792. ICMP supports packets containing
error, control, and informational messages. The PING command, for
example, uses ICMP to test an Internet connection.
ICV ICV (Integrity Check Value) is a 4-byte code appended in standard
WEP to the 802.11 message. Enhanced WPA inserts an 8-byte MIC
just before the ICV. (See WPA and MIC)
IE Internet Explorer.
IEEE Institute of Electrical and Electronics Engineers, a technical
professional association, involved in standards activities.
IETF Internet Engineering Task Force, the main standards organization for
the Internet.
Infrastructure Mode An 802.11 networking framework in which devices communicate with
each other by first going through an Access Point (AP). In
infrastructure mode, wireless devices can communicate with each
other or can communicate with a wired network. (See ad-hoc mode
and BSS.)
Table 19
Glossary
Networking terms and abbreviations
Term Explanation
Internet or IP IP or Internet telephony are communications, such as voice, facsimile,
telephony voice-messaging applications, that are transported over the Internet,
rather than the public switched telephone network (PSTN). IP
telephony is the two-way transmission of audio over a packet-switched
IP network (TCP/IP network).
An Internet telephone call has two steps: (1) converting the analog
voice signal to digital format, (2) translating the signal into Internet
protocol (IP) packets for transmission over the Internet. At the
receiving end, the steps are reversed. Over the public Internet, voice
quality varies considerably. Protocols that support Quality of Service
(QoS) are being implemented to improve this.
IP Internet Protocol is the method or protocol by which data is sent from
one computer to another on the Internet. Each computer (host) on the
Internet has at least one IP address that uniquely identifies it. Internet
Protocol specifies the format of packets, also called datagrams, and
the addressing scheme. Most networks combine IP with a higher-level
protocol called Transmission Control Protocol (TCP), which
establishes a virtual connection between a destination and a source.
IPC Interprocess Communication. A capability supported by some
operating systems that allows one process to communicate with
another process. The processes can be running on the same
computer or on different computers connected through a network.
Table 19
Term Explanation
IPsec Internet Protocol security (IPSec)
IPsec-ESP Internet Protocol security Encapsulating Security Payload (IPsec-
IPsec-AH ESP). The encapsulating security payload (ESP) encapsulates its
data, enabling it to protect data that follows in the datagram.Internet
Protocol security Authentication Header (IPsec-AH). AH protects the
parts of the IP datagram that can be predicted by the sender as it will
be received by the receiver.IPsec is a set of protocols developed by the
IETF to support secure exchange of packets at the IP layer. IPsec has
been deployed widely to implement Virtual Private Networks (VPNs).
IPsec supports two encryption modes: Transport and Tunnel.
Transport mode encrypts only the data portion (payload) of each
packet, but leaves the header untouched. The more secure Tunnel
mode encrypts both the header and the payload. On the receiving
side, an IPSec-compliant device decrypts each packet. For IPsec to
work, the sending and receiving devices must share a public key. This
is accomplished through a protocol known as Internet Security
Association and Key Management Protocol/Oakley (ISAKMP/Oakley),
which allows the receiver to obtain a public key and authenticate the
sender using digital certificates.
isochronous Isochronous data is data (such as voice or video) that requires a
constant transmission rate, where data must be delivered within
certain time constraints. For example, multimedia streams require an
isochronous transport mechanism to ensure that data is delivered as
fast as it is displayed and to ensure that the audio is synchronized with
the video. Compare: asynchronous processes in which data streams
can be broken by random intervals, and synchronous processes, in
which data streams can be delivered only at specific intervals.
ISP Internet Service Provider.
IV IV (Initialization Vector), part of the standard WEP encryption
mechanism that concatenates a shared secret key with a randomly
generated 24-bit initialization vector. WPA with TKIP uses 48-bit IVs,
an enhancement that significantly increases the difficulty in cracking
the encryption. (See WPA and TKIP)
LAN Local Area Network.
License installation
LSA Link State Advertisements received by the currently running OSPF
process. The LSAs describe the local state of a router or network,
including the state of the router's interfaces and adjacencies. See also
OSPF.
Table 19
Glossary
Networking terms and abbreviations
Term Explanation
MAC Media Access Control layer. One of two sublayers that make up the
Data Link Layer of the OSI model. The MAC layer is responsible for
moving data packets to and from one Network Interface Card (NIC) to
another across a shared channel.
MAC address Media Access Control address. A hardware address that uniquely
identifies each node of a network.
MIB Management Information Base is a formal description of a set of
network objects that can be managed using the Simple Network
Management Protocol (SNMP). The format of the MIB is defined as
part of the SNMP. A MIB is a collection of definitions defining the
properties of a managed object within a device. Every managed
device keeps a database of values for each of the definitions written in
the MIB. Definition of the MIB conforms to RFC1155 (Structure of
Management Information).
MIC Message Integrity Check or Code (MIC), also called "Michael", is part
of WPA and TKIP. The MIC is an additional 8-byte code inserted before
the standard 4-byte integrity check value (ICV) that is appended in by
standard WEP to the 802.11 message. This greatly increases the
difficulty in carrying out forgery attacks.
Both integrity check mechanisms are calculated by the receiver and
compared against the values sent by the sender in the frame. If the
values match, there is assurance that the message has not been
tampered with. (See WPA, TKIP and ICV).
MTU Maximum Transmission Unit. The largest packet size, measured in
bytes, that a network interface is configured to accept. Any messages
larger than the MTU are divided into smaller packets before being
sent.
MU Mobile Unit, a wireless device such as a PC laptop.
multicast, broadcast, Multicast: transmitting a single message to a select group of
unicast recipients. Broadcast: sending a message to everyone connected to a
network. Unicast: communication over a network between a single
sender and a single receiver.
NAS Network Access Server, a server responsible for passing information
to designated RADIUS servers and then acting on the response
returned. A NAS-Identifier is a RADIUS attribute identifying the NAS
server. (RFC2138)
Table 19
Term Explanation
NAT Network Address Translator. A network capability that enables a group
of computers to dynamically share a single incoming IP address. NAT
takes the single incoming IP address and creates new IP address for
each client computer on the network.
Netmask In administering Internet sites, a netmask is a string of 0's and 1's that
mask or screen out the network part of an IP address, so that only the
host computer part of the address remains. A frequently-used
netmask is 255.255.255.0, used for a Class C subnet (one with up to
255 host computers). The ".0" in the "255.255.255.0" netmask allows
the specific host computer address to be visible.
NIC Network Interface Card. An expansion board in a computer that
connects the computer to a network.
NMS Network Management System. The system responsible for managing
a network or a portion of a network. The NMS talks to network
management agents, which reside in the managed nodes.
NTP Network Time Protocol, an Internet standard protocol (built on top of
TCP/IP) that assures accurate synchronization to the millisecond of
computer clock times in a network of computers. Based on UTC, NTP
synchronizes client workstation clocks to the U.S. Naval Observatory
Master Clocks in Washington, DC and Colorado Springs CO. Running
as a continuous background client program on a computer, NTP sends
periodic time requests to servers, obtaining server time stamps and
using them to adjust the client's clock. (RFC1305)
OFDM Orthogonal frequency division multiplexing, a method of digital
modulation in which a signal is split into several narrowband channels
at different frequencies. OFDM is similar to conventional frequency
division multiplexing (FDM). The difference lies in the way in which the
signals are modulated and demodulated. Priority is given to
minimizing the interference, or crosstalk, among the channels and
symbols comprising the data stream. Less importance is placed on
perfecting individual channels.
OFDM is used in European digital audio broadcast services. It is also
used in wireless local area networks.
OID Object Identifier.
OPSEC OPSEC (Open Platform for Security) is a security alliance program
created by Check Point to enable an open industry-wide framework for
interoperability of security products and applications. Products
carrying the "Secured by Check Point" seal have been tested to
guarantee integration and interoperability.
Table 19
A31003-W1040-U101-1-7619, July 2006 DRAFT
HiPath Wireless Controller, Access Points and Convergence Software V4.0, C10/C100/C1000 User Guide 277
hwc_glossary.fm
Glossary
Networking terms and abbreviations
Term Explanation
OS Operating system.
OSI Open System Interconnection. An ISO standard for worldwide
communications that defines a networking framework for
implementing protocols in seven layers. Control is passed from one
layer to the next, starting at the application layer in one station, down
through the presentation, session, transport, network, data link layer
to the physical layer at the bottom, over the channel to the next station
and back up the hierarchy.
OSI Layer 2 At the Data Link layer (OSI Layer 2), data packets are encoded and
decoded into bits. The data link layer has two sublayers:
● the Logical Link Control (LLC) layer controls frame
synchronization, flow control and error checking
● The Media Access Control (MAC) layer controls how a computer
on the network gains access to the data and permission to
transmit it.
OSI Layer 3 The Network layer (OSI Layer 3) provides switching and routing
technologies, creating logical paths, known as virtual circuits, for
transmitting data from node to node. Routing and forwarding are
functions of this layer, as well as addressing, internetworking, error
handling, congestion control and packet sequencing.
OSPF Open Shortest Path First, an interior gateway routing protocol
developed for IP networks based on the shortest path first or link-state
algorithm. Routers use link-state algorithms to send routing
information to all nodes in an internetwork by calculating the shortest
path to each node based on a topography of the Internet constructed
by each node. Each router sends that portion of the routing table
(keeps track of routes to particular network destinations) that
describes the state of its own links, and it also sends the complete
routing structure (topography). Using OSPF, a host that obtains a
change to a routing table or detects a change in the network
immediately multicasts the information to all other hosts in the network
so that all will have the same routing table information. The host using
OSPF sends only the part that has changed, and only when a change
has taken place. (RFC2328)
OUI Organizationally Unique Identifier (used in MAC addressing).
Table 19
Term Explanation
Packet The unit of data that is routed between an origin and a destination on
the Internet or any other packet-switched network. When any file is
sent from one place to another on the Internet, the Transmission
Control Protocol (TCP) layer of TCP/IP divides the file into packets.
Each packet is separately numbered and includes the Internet address
of the destination. The individual packets for a given file may travel
different routes through the Internet. When they have all arrived, they
are reassembled into the original file (by the TCP layer at the receiving
end).
PAP Password Authentication Protocol is the most basic form of
authentication, in which a user's name and password are transmitted
over a network and compared to a table of name-password pairs.
Typically, the passwords stored in the table are encrypted. (See
CHAP).
PDU Protocol Data Unit. A data object exchanged by protocol machines
(such as management stations, SMUX peers, and SNMP agents) and
consisting of both protocol control information and user data. PDU is
sometimes used as a synonym for “packet''.
PEAP PEAP (Protected Extensible Authentication Protocol) is an IETF draft
standard to authenticate wireless LAN clients without requiring them
to have certificates. In PEAP authentication, first the user
authenticates the authentication server, then the authentication server
authenticates the user. If the first phase is successful, the user is then
authenticated over the SSL tunnel created in phase one using EAP-
Generic Token Card (EAP-GTC) or Microsoft Challenged Handshake
Protocol Version 2 (MSCHAP V2). (See also EAP-TLS).
PHP server Hypertext Preprocessor
PKI Public Key Infrastructure
PoE Power over Ethernet. The Power over Ethernet standard (802.3af)
defines how power can be provided to network devices over existing
Ethernet connection, eliminating the need for additional external
power supplies.
POST Power On Self Test, a diagnostic testing sequence performed by a
computer to determine if its hardware elements are present and
powered on. If so, the computer begins its boot sequence.
Table 19
Glossary
Networking terms and abbreviations
Term Explanation
push-to-talk (PTT) The push-to-talk (PTT) is feature on wireless telephones that allows
them to operate like a walkie-talkie in a group, instead of standard
telephone operation. The PTT feature requires that the network be
configured to allow multicast traffic.
A PTT call is initiated by selecting a channel and pressing the "talk"
key on the wireless telephone. All wireless telephones on the same
network that are monitoring the channel will hear the transmission. On
a PTT call you hold the button to talk and release it to listen.
QoS Quality of Service. A term for a number of techniques that intelligently
match the needs of specific applications to the network resources
available, using such technologies as Frame Relay, Asynchronous
Transfer Mode (ATM), Ethernet and 802.1 networks, SONET, and
IP-routed networks. QoS features provide better network service by
supporting dedicated bandwidth, improving loss characteristics,
avoiding and managing network congestion, shaping network traffic,
setting traffic priorities across the network.
Quality-of-Service (QoS): A set of service requirements to be met by
the network while transporting a flow. (RFC2386)
RADIUS Remote Authentication Dial-In User Service. An authentication and
accounting system that checks User Name and Password and
authorizes access to a network. The RADIUS specification is
maintained by a working group of the IETF (RFC2865 RADIUS,
RFC2866 RADIUS Accounting, RFC2868 RADIUS Attributes for
Tunnel Protocol Support).
RF Radio Frequency, a frequency in the electromagnetic spectrum
associated with radio wave propagation. When an RF current is
supplied to an antenna, an electromagnetic field is created that can
propagate through space. These frequencies in the electromagnetic
spectrum range from Ultra-low frequency (ULF) -- 0-3 Hz to Extremely
high frequency (EHF) -- 30GHz - 300 GHz. The middle ranges are:
Low frequency (LF) -- 30 kHz - 300 kHz, Medium frequency (MF) --
300 kHz - 3 MHz, High frequency (HF) -- 3MHz - 30 MHz, Very high
frequency (VHF) -- 30 MHz - 300 MHz, Ultra-high frequency (UHF)--
300MHz - 3 GHz.
RFC Request for Comments, a series of notes about the Internet, submitted
to the Internet Engineering Task Force (IETF) and designated by an
RFC number, that may evolve into an Internet standard. The RFCs are
catalogued and maintained on the IETF RFC website: www.ietf.org/
rfc.html.
Table 19
Term Explanation
Roaming In 802.11, roaming occurs when a wireless device (a station) moves
from one Access Point to another (or BSS to another) in the same
Extended Service Set (ESS) -identified by its SSID.
RP-SMA Reverse Polarity-Subminiature version A, a type of connector used
with wireless antennas
RSN Robust Security Network. A new standard within IEEE 802.11 to
provide security and privacy mechanisms. The RSN (and related TSN)
both specify IEEE 802.1x authentication with Extensible
Authentication Protocol (EAP).
RSSI RSSI received signal strength indication (in 802.11 standard)
RTS / CTS RTS request to send, CTS clear to send (in 802.11 standard)
Segment In Ethernet networks, a section of a network that is bounded by
bridges, routers or switches. Dividing a LAN segment into multiple
smaller segments is one of the most common ways of increasing
available bandwidth on the LAN.
SLP Service Location Protocol. A method of organizing and locating the
resources (such as printers, disk drives, databases, e-mail directories,
and schedulers) in a network. Using SLP, networking applications can
discover the existence, location and configuration of networked
devices.
With Service Location Protocol, client applications are 'User Agents'
and services are advertised by 'Service Agents'. The User Agent
issues a multicast 'Service Request' (SrvRqst) on behalf of the client
application, specifying the services required. The User Agent will
receive a Service Reply (SrvRply) specifying the location of all
services in the network which satisfy the request.
For larger networks, a third entity, called a 'Directory Agent', receives
registrations from all available Service Agents. A User Agent sends a
unicast request for services to a Directory Agent (if there is one) rather
than to a Service Agent.
(SLP version 2, RFC2608, updating RFC2165)
SMI Structure of Management Information. A hierarchical tree structure for
information that underlies Management Information Bases (MIBs),
and is used by the SNMP protocol. Defined in RFC1155 and RFC1442
(SNMPv2).
Table 19
Glossary
Networking terms and abbreviations
Term Explanation
SMT (802.11) Station ManagemenT. The object class in the 802.11 MIB that
provides the necessary support at the station to manage the
processes in the station such that the station may work cooperatively
as a part of an IEEE 802.11 network. The four branches of the 802.11
MIB are:
● dot11smt - objects related to station management and local
configuration
● dot11mac - objects that report/configure on the status of various
MAC parameters
● dot11res - Objects that describe available resources
● dot11phy - Objects that report on various physical items.
SNMP Simple Network Management Protocol. A set of protocols for
managing complex networks. SNMP works by sending messages,
called protocol data units (PDUs), to different parts of a network.
SNMP-compliant devices, called agents, store data about themselves
in Management Information Bases (MIBs) and return this data to the
SNMP requesters.
SNMP includes a limited set of management commands and
responses. The management system issues Get, GetNext and Set
messages to retrieve single or multiple object variables or to establish
the value of a single variable. The managed agent sends a Response
message to complete the Get, GetNext or Set.
SNMP trap An event notification sent by the SNMP managed agent to the
management system to identify the occurrence of conditions (such as
a threshold that exceeds a predetermined value).
SSH Secure Shell, sometimes known as Secure Socket Shell, is a
Unix-based command interface and protocol for securely getting
access to a remote computer. SSH is a suite of three utilities - slogin,
ssh, and scp - secure versions of the earlier UNIX utilities, rlogin, rsh,
and rcp. With SSH commands, both ends of the client/server
connection are authenticated using a digital certificate, and passwords
are protected by being encrypted.
Table 19
Term Explanation
SSID Service Set Identifier. A 32-character unique identifier attached to the
header of packets sent over a Wireless LAN that acts as a password
when a wireless device tries to connect to the Basic Service Set
(BSS). Several BSSs can be joined together to form one logical WLAN
segment, referred to as an extended service set (ESS). The SSID is
used to identify the ESS.
In 802.11 networks, each Access Point advertises its presence several
times per second by broadcasting beacon frames that carry the ESS
name (SSID). Stations discover APs by listening for beacons, or by
sending probe frames to search for an AP with a desired SSID. When
the station locates an appropriately-named Access Point, it sends an
associate request frame containing the desired SSID. The AP replies
with an associate response frame, also containing the SSID.
Some APs can be configured to send a zero-length broadcast SSID in
beacon frames instead of sending their actual SSID. The AP must
return its actual SSID in the probe response.
SSL Secure Sockets Layer. A protocol developed by Netscape for
transmitting private documents via the Internet. SSL works by using a
public key to encrypt data that's transferred over the SSL connection.
URLs that require an SSL connection start with https: instead of http.
SSL uses a program layer located between the Internet's Hypertext
Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers.
The "sockets" part of the term refers to the sockets method of passing
data back and forth between a client and a server program in a
network or between program layers in the same computer. SSL uses
the public-and-private key encryption system from RSA, which also
includes the use of a digital certificate.
SSL has recently been succeeded by Transport Layer Security (TLS),
which is based on SSL.
Subnet mask (See netmask)
Subnets Portions of networks that share the same common address format. A
subnet in a TCP/IP network uses the same first three sets of numbers
(such as 198.63.45.xxx), leaving the fourth set to identify devices on
the subnet. A subnet can be used to increase the bandwidth on the
network by breaking the network up into segments.
SVP SpectraLink Voice Protocol, a protocol developed by SpectraLink to be
implemented on access points in order to facilitate voice prioritization
over an 802.11 wireless LAN that will carry voice packets from
SpectraLink wireless telephones.
Table 19
Glossary
Networking terms and abbreviations
Term Explanation
Switch In networks, a device that filters and forwards packets between LAN
segments. Switches operate at the data link layer (layer 2) and
sometimes the network layer (layer 3) of the OSI Reference Model and
therefore support any packet protocol. LANs that use switches to join
segments are called switched LANs or, in the case of Ethernet
networks, switched Ethernet LANs.
syslog A protocol used for the transmission of event notification messages
across networks, originally developed on the University of California
Berkeley Software Distribution (BSD) TCP/IP system
implementations, and now embedded in many other operating
systems and networked devices. A device generates a messages, a
relay receives and forwards the messages, and a collector (a syslog
server) receives the messages without relaying them.
Syslog uses the user datagram protocol (UDP) as its underlying
transport layer mechanism. The UDP port that has been assigned to
syslog is 514. (RFC3164)
TCP / IP Transmission Control Protocol. TCP, together with IP (Internet
Protocol), is the basic communication language or protocol of the
Internet. Transmission Control Protocol manages the assembling of a
message or file into smaller packets that are transmitted over the
Internet and received by a TCP layer that reassembles the packets into
the original message. Internet Protocol handles the address part of
each packet so that it gets to the right destination.
TCP/IP uses the client/server model of communication in which a
computer user (a client) requests and is provided a service (such as
sending a Web page) by another computer (a server) in the network.
TFTP Trivial File Transfer Protocol. An Internet software utility for transferring
files that is simpler to use than the File Transfer Protocol (FTP) but less
capable. It is used where user authentication and directory visibility
are not required. TFTP uses the User Datagram Protocol (UDP) rather
than the Transmission Control Protocol (TCP). TFTP is described
formally in Request for Comments (RFC) 1350.
Table 19
Term Explanation
TKIP Temporal Key Integrity Protocol (TKIP) is an enhancement to the WEP
encryption technique that uses a set of algorithms that rotates the
session keys. TKIPs’ enhanced encryption includes a per-packet key
mixing function, a message integrity check (MIC), an extended
initialization vector (IV) with sequencing rules, and a re-keying
mechanism. The encryption keys are changed (rekeyed) automatically
and authenticated between devices after the rekey interval (either a
specified period of time, or after a specified number of packets has
been transmitted).
TLS Transport Layer Security. (See EAP, Extensible Authentication
Protocol)
ToS / DSCP ToS (Type of Service) / DSCP (Diffserv Codepoint). The ToS/DSCP
box contained in the IP header of a frame is used by applications to
indicate the priority and Quality of Service (QoS) for each frame. The
level of service is determined by a set of service parameters which
provide a three way trade-off between low-delay, high-reliability, and
high-throughput. The use of service parameters may increase the cost
of service.
TSN Transition Security Network. A subset of Robust Security Network
(RSN), which provides an enhanced security solution for legacy
hardware. The Wi-Fi Alliance has adopted a solution called Wireless
Protected Access (WPA), based on TSN. RSN and TSN both specify
IEEE 802.1x authentication with Extensible Authentication Protocol
(EAP).
Tunnelling Tunnelling (or encapsulation) is a technology that enables one network
to send its data via another network's connections. Tunnelling works
by encapsulating packets of a network protocol within packets carried
by the second network. The receiving device then decapsulates the
packets and forwards them in their original format.
UDP User Datagram Protocol. A connectionless protocol that, like TCP,
runs on top of IP networks. Unlike TCP/IP, UDP/IP provides very few
error recovery services, offering instead a direct way to send and
receive packets over an IP network. It is used primarily for
broadcasting messages over a network.
Table 19
Glossary
Networking terms and abbreviations
Term Explanation
U-NII Unlicensed National Information Infrastructure. Designated to provide
short-range, high-speed wireless networking communication at low
cost, U-NII consists of three frequency bands of 100 MHz each in the
5 GHz band: 5.15-5.25GHz (for indoor use only), 5.25-5.35 GHz and
5.725-5.825GHz. The three frequency bands were set aside by the
FCC in 1997 initially to help schools connect to the Internet without the
need for hard wiring. U-NII devices do not require licensing.
URL Uniform Resource Locator. the unique global address of resources or
files on the World Wide Web. The URL contains the name of the
protocol to be used to access the file resource, the IP address or the
domain name of the computer where the resource is located, and a
pathname -- a hierarchical description that specifies the location of a
file in that computer.
VLAN Virtual Local Area Network. A network of computers that behave as if
they are connected to the same wire when they may be physically
located on different segments of a LAN. VLANs are configured through
software rather than hardware, which makes them extremely flexible.
When a computer is physically moved to another location, it can stay
on the same VLAN without any hardware reconfiguration.
The standard is defined in IEEE 802.1Q - Virtual LANs, which states
that "IEEE 802 Local Area Networks (LANs) of all types may be
connected together with Media Access Control (MAC) Bridges, as
specified in ISO/IEC 15802-3. This standard defines the operation of
Virtual LAN (VLAN) Bridges that permit the definition, operation and
administration of Virtual LAN topologies within a Bridged LAN
infrastructure."
VNS Virtual Network Services (VNS). A Siemens specific technique that
provides a means of mapping wireless networks to a wired topology.
VoIP Voice Over Internet Protocol. An internet telephony technique. With
VoIP, a voice transmission is cut into multiple packets, takes the most
efficient path along the Internet and is reassembled when it reaches
the destination.
VPN Virtual Private Network. A private network that is constructed by using
public wires to connect nodes. These systems use encryption and
other security mechanisms to ensure that only authorized users can
access the network and that the data cannot be intercepted.
Table 19
Term Explanation
VSA Vendor Specific Attribute, an attribute for a RADIUS server defined by
the manufacturer.(compared to the RADIUS attributes defined in the
original RADIUS protocol RFC2865). A VSA attribute is defined in
order that it can be returned from the RADIUS server in the Access
Granted packet to the Radius Client.
Walled Garden A restricted subset of network content that wireless devices can
access.
WEP Wired Equivalent Privacy. A security protocol for wireless local area
networks (WLANs) defined in the 802.11b standard. WEP aims to
provide security by encrypting data over radio waves so that it is
protected as it is transmitted from one end point to another.
Wi-Fi Wireless fidelity. A term referring to any type of 802.11 network,
whether 802.11b, 802.11a, dual-band, etc. Used in reference to the
Wi-Fi Alliance, a nonprofit international association formed in 1999 to
certify interoperability of wireless Local Area Network products based
on IEEE 802.11 specification.
WINS Windows Internet Naming Service. A system that determines the IP
address associated with a particular network computer, called name
resolution. WINS supports network client and server computers
running Windows and can provide name resolution for other
computers with special arrangements. WINS supports dynamic
addressing (DHCP) by maintaining a distributed database that is
automatically updated with the names of computers currently available
and the IP address assigned to each one.
DNS is an alternative system for name resolution suitable for network
computers with fixed IP addresses.
WLAN Wireless Local Area Network.
WMM Wi-Fi Multimedia (WMM), a Wi-Fi Alliance certified standard that
provides multimedia enhancements for Wi-Fi networks that improve
the user experience for audio, video, and voice applications. This
standard is compliant with the IEEE 802.11e Quality of Service (QoS)
extensions for 802.11 networks. WMM provides prioritized media
access by shortening the time between transmitting packets for higher
priority traffic. WMM is based on the Enhanced Distributed Channel
Access (EDCA) method.
Table 19
Glossary
Controller, Access Points and Convergence Software terms and abbreviations
Term Explanation
WPA Wireless Protected Access, or Wi-Fi Protected Access is a security
solution adopted by the Wi-Fi Alliance that adds authentication to
WEPs’ basic encryption. For authentication, WPA specifies IEEE
802.1x authentication with Extensible Authentication Protocol (EAP).
For encryption, WPA uses the Temporal Key Integrity Protocol (TKIP)
mechanism, which shares a starting key between devices, and then
changes their encryption key for every packet. Certificate
Authentication (CA) can also be used. Also part of the encryption
mechanism are 802.1X for dynamic key distribution and Message
Integrity Check (MIC) a.k.a. Michael.
WPA requires that all computers and devices have WPA software.
WPA-PSK Wi-Fi Protected Access with Pre-Shared Key, a special mode of WPA
for users without an enterprise authentication server. Instead, for
authentication, a Pre-Shared Key is used. The PSK is a shared secret
(passphrase) that must be entered in both the wireless access point or
router and the WPA clients.
This preshared key should be a random sequence of characters at
least 20 characters long or hexadecimal digits (numbers 0-9 and
letters A-F) at least 24 hexadecimal digits long. After the initial shared
secret, the Temporal Key Integrity Protocol (TKIP) handles the
encryption and automatic rekeying.
Table 19
Term Explanation
CTP CAPWAP Tunnelling Protocol (CTP). The Wireless AP uses a UDP
(User Datagram Protocol) based tunnelling protocol called CAPWAP
Tunnelling Protocol (CTP) to encapsulate the 802.11 packets and
forward them to the HiPath Wireless Controller.
The CTP protocol defines a mechanism for the control and
provisioning of wireless access points (CAPWAP) through centralized
access controllers. In addition, it provides a mechanism providing the
option to tunnel the mobile client data between the access point and
the access controller.
Table 20
Term Explanation
DRM (dynamic radio/ The DRM feature consists of software on the Wireless AP that
RF management) provides dynamic radio frequency (RF) management. For Wireless
APs with the DRM feature enabled and on a common channel, the
power levels will be adjusted to balance coverage if a Wireless AP is
added to, or leaves, the network. The feature also allows wireless
clients to be moved to another Wireless AP if the load is too high. The
feature can also be set to scan automatically for a channel, using a
channel selection algorithm.
HiPath Wireless The HiPath Wireless Controller is a rack-mountable network device
Controller designed to be integrated into an existing wired Local Area Network
(LAN). It provides centralized control over all access points (both
Wireless APs and third-party access points) and manages the
network assignment of wireless device clients associating through
access points.
Langley Langley is a Controller, Access Points and Convergence Software
term for the inter-process messaging infrastructure on the HiPath
Wireless Controller.
Mitigator The Mitigator is a mechanism that assists in the detection of rogue
access points. The feature has three components: (1) a radio
frequency (RF) scanning task that runs on the Wireless AP, (2) an
application called the Data Collector on the HiPath Wireless
Controller that receives and manages the RF scan messages sent by
the Wireless AP, (3) an Analysis Engine on the HiPath Wireless
Controller that processes the scan data.
Mobility manager (and The technique in Controller, Access Points and Convergence
mobility agent) Software by which multiple HiPath Wireless Controllers on a network
can discover each other and exchange information about a client
session. This enables a wireless device user to roam seamlessly
between different Wireless APs on different HiPath Wireless
Controllers, to provide mobility to the wireless device user.
One HiPath Wireless Controller on the network must be designated
as the mobility manager. All other HiPath Wireless Controllers are
designated as mobility agents. Relying on SLP, the mobility manager
registers with the Directory Agent and the mobility agents discover
the location of the mobility manager.
Table 20
Glossary
Controller, Access Points and Convergence Software terms and abbreviations
Term Explanation
Data Collector The Data Collector is an application on the HiPath Wireless Controller
that receives and manages the Radio Frequency (RF) scan
messages sent by the Wireless AP. This application is part of the
Mitigator technique, working in conjunction with the scanner
mechanism and the Analysis Engine to assist in detecting rogue
access points.
Virtual Network The Virtual Network Services (VNS) technique is Siemens's means
Services (VNS) of mapping wireless networks to the topology of an existing wired
network. When you set up Virtual Network Services (VNS) on the
HiPath Wireless Controller, you are defining subnets for groups of
wireless users. This VNS definition creates a virtual IP subnet where
the HiPath Wireless Controller acts as a default gateway for wireless
devices. This technique enables policies and authentication to be
applied to the groups of wireless users on a VNS, as well as the
collecting of accounting information. When a VNS is set up on the
HiPath Wireless Controller, one or more Wireless APs (by radio) are
associated with it. A range of IP addresses is set aside for the HiPath
Wireless Controller's DHCP server to assign to wireless devices.
Wireless AP The Wireless AP is a wireless LAN thin access point (IEEE 802.11)
provided with unique software that allows it to communicate only with
a HiPath Wireless Controller. (A thin access point handles the radio
frequency (RF) communication but relies on a controller to handle
WLAN elements such as authentication.) The Wireless AP also
provides local processing such as encryption. The Wireless AP is a
dual-band access point, with both 802.11a and 802.11b/g radios.
Table 20
● Activity LED: Indicates the amount of traffic carried to and from Wireless APs. This LED is
visible from both the front and the back of the HiPath Wireless Controller.
Table 21 shows the sequence of the Status and Activity LEDs.
Index Z
A defined 112
accounting non-authenticated filtering rules 156
setup on a VNS 150 privacy mechanisms 167
adding set up a VNS topology 125
wireless AP manually 80 view sample page 144
alarms Check Point event logging 205
overview of log types and levels 262 configuring
allow all or approved APs Captive Portal, internal, external 142
for availability setup 192 software - overview steps 40
allow or deny in a filtering rule 114 static routes 57
Analysis engine controller
functions 222 availability overview 39
antennae on the wireless AP 70 back up software configuration 254
authentication define management user names, pass-
MAC-based 148 words 202
no RADIUS server 109 define network time synchronization 204
none on a VNS 175 defined as mobility manager for mobility
on a VNS for AAA 145 196
on a VNS for Captive Portal 137 enable ELA event logging (Check Point)
overview of types 135 205
protocols supported 112, 140 events during a failover 195
Authentication, Authorization, Accounting paired for availability 189
(AAA) restore software configuration 257
filter ID values (RADIUS policy), groups set up third-party APs 213
152 system maintenance 246
set up 802.1x authentication 145 system shutdown 246
set up privacy on a VNS 170
availability 192
D
default filter 162
B default gateway on a VNS 129
backup controller software configuration 254 disassociate a wireless client 241
branch office, static configuration of wireless discovery
AP 93 steps 71
wireless AP LED sequence 73
C displays
call data records (CDRs) 150 client location by foreign HWC 202, 236
Captive Portal client location by home 202, 236
authentication on a VNS 137 HWC tunnel traffic 202, 236
configuring internal, external Captive Por- list of displays 231
tal 142 wireless AP availability 194, 233
www.siemens.com/hipath