Airgo Networks AGN1201AP0000 True MIMO Access Point User Manual 3 of 4
Airgo Networks Inc. True MIMO Access Point 3 of 4
Contents
User manual 3 of 4
8 Configuring Guest Access NOTE: If both secured and open access are enabled (mixed-mode of operation) then some third party clients may not be able to access the network using WPA-PSK. All clients will be able to connect to the network using the open authentication correctly. Figure 119 provides a sample illustration of how clients are treated when guest access is implemented without VLANs. Secure clients are authenticated using WPA-PSK, while guests are authenticated through the landing page (internal page is shown). Both types of users gain access to the same network resources; however, only the secure user traffic is encrypted. Figure 119: Guest Access Without VLANs Network Guest Traffic is Not Encrypted Secure Client Authenticates with Pre-shared Key ID Corp Secure User Traffic Is Encrypted Password Guest Access Guest A0064 Guest access with VLANs This option, in which VLANs are used to differentiate between corporate traffic and guest user traffic, is ideal for businesses that want to provide guest access to visitors. When guest users log in, they are automatically assigned to the guest VLAN and are prevented from accessing the main corporate network. To use VLANs for guest access, the AP must be connected to a VLAN-aware switch, and the switch must be configured to support the designated VLANs. The VLAN configuration of the upstream network should make available only those network resources set aside for guest use. This often means prohibiting guest stations from accessing anything other than the corporate open subnet or the Internet. For open guest access, the Open access security option must be configured. This precludes the use of WEP Security Mode on APs that provide guest access, but does permit use of WPA Security Mode for non-guests only. 168 Installation and User Guide: Airgo Access Point Internal Landing Page VLANs and security privileges are assigned to users by way of service profiles defined for user groups and bound to the network SSID. It is required that the VLAN configuration include DHCP and DNS services. NOTE: If guest access is configured on a VLAN other than VLAN 1, the DCHP server on the AP cannot be used to provide IP address service for the guest VLAN. Use an external DHCP server. Internal Landing Page The internal landing page is a configurable option within the Airgo AP. The guest password for the AP can be set using the Guest Access panel, or an automatically generated password can be configured through the User Management panel in NM Portal. If the automatically generated guest password is used, then the authentication process for the internal landing page also checks the password entered by the guest user against the RADIUS authentication service provided in the security portal. If either password is acceptable, the guest user is authenticated and receives the privileges specified in the guest service profile. Internal landing pages are compatible with the VLAN and non-VLAN options. Figure 120 shows how Acme Works configured guest access with an internal guest landing page. In this example, the company has two VLANs: Corporate and Guest. Corporate and guest users belong to the Enterprise and Guest user groups, respectively, with appropriate service profiles assigned and bound to the SSID. Corporate users are authenticated by way of the enterprise RADIUS server, while guest users are authenticated by way of an internal landing page configured in the Airgo AP. After they are authenticated, guest users are place in the Guest VLAN. Installation and User Guide: Airgo Access Point 169 8 Configuring Guest Access Figure 120: Guest Access - Internal Landing Page Corp VLAN Guest VLAN Corp-VLAN Guest-VLAN VLAN Switch RADIUS Server ID Password Corp Guest Guest Access A0045D 170 Installation and User Guide: Airgo Access Point External Landing Page External Landing Page An external landing web page can be set up through a corporate web server. The URL for the landing page must use an IP address rather than a domain name. Regardless of the authentication process selected for the external page, it is necessary to forward authentication results to the AP upon completion of successful or unsuccessful guest authentication.1 External landing pages are compatible with the VLAN and non-VLAN options. Figure 121 shows a network VLAN configuration with an external guest landing page. The external landing page is made accessible over the Internet through an external web server. As in the previous example, authenticated guest users are given access to the guest VLAN. Figure 121: Guest Access - External Landing Page CorporateVLAN GuestVLAN CorporateVLAN GuestVLAN VLAN Switch RADIUS Server Password Authentication Results Passed Back to AP Web Authentication Corporate Guest A0045B 1 An example external landing page is shipped with the Airgo AP. Installation and User Guide: Airgo Access Point 171 8 Configuring Guest Access Open Subnet In an optional open subnet arrangement, shown in Figure 122, unauthenticated guest users are permitted limited access to an open enterprise subnet specified in the Airgo AP. The enterprise open subnet must be part of the Guest VLAN. Extended access requires authentication through an internal or external landing page. Figure 122: Guest Access - Open Subnet Open Access Server Open Subnet VLAN Switch Internet No Direct Internet Access Until Authenticated GUEST-VLAN Open Subnet Address Range User Group = "GUEST" A0035B Guest Access Persistence If a guest user is temporarily disconnected from the Airgo AP due to loss of association, it may not be necessary for the user to reauthenticate if the client reassociates to the same AP within one minute. This is particularly beneficial when using a virtual private network (VPN) with guest access, wherein the user signs on as a guest and then launches a VPN session to a remote VPN server. Since the VPN session is tunneled over the guest session, a temporary loss of connectivity does not require tearing down the VPN session. If loss of association extends beyond one minute, it is necessary for the guest user to reauthenticate. 172 Installation and User Guide: Airgo Access Point Configuring Guest Access with VLANs Configuring Guest Access with VLANs This section describes the complete process of setting up guest access with VLANs. Use the Guest Access wizard for easy configuration of the major guest access parameters. See “Guest Access Wizard” on page 53 for instructions on using the Guest Access wizard. Task Steps Confirm that Open access is supported as a security option. 1 Choose Wireless Security from the Security Services menu to open the Security Mode tab (“Configuring Wireless Security” on page 150). 2 Enable WPA security if mixed mode security (encrypted and Open) is desired. Only WPA can be enabled in conjunction with Open. The WPA Security mode is for non-guests only. 3 Enable Open Access. 4 Click Apply. Create or confirm existence of a corporate VLAN. This can be the default untagged VLAN or a specially created VLAN. 1 Choose VLAN Configuration from the Networking Services menu to open the VLAN table (“VLAN Table” on page 112). 2 Confirm that the corporate VLAN is listed in the table, or click Add to create a new VLAN: Create the guest VLAN. 1 Choose VLAN Configuration from the Networking Services menu to open the VLAN table (“VLAN Table” on page 112). 2 Click Add. a Enter the corporate VLAN name and a numeric VLAN ID in the Add VLAN entry panel. b Enter the IP address and maskbits of the captive portal server, or select the DHCP option. The guest portal must have a valid IP address for the authentication process to work. c Select the eth0 interface, and mark it as tagged. (Only eth0 should be tagged.) d Click Add. 3 Enter the VLAN name (Guest VLAN) and a numeric VLAN ID in the Add VLAN entry panel. It is not recommended that you use the default VLAN. 4 Enter the IP address and maskbits of the captive portal server, or select the DHCP option. 5 Select the eth0 interface, and mark it as tagged. (Only eth0 should be tagged.) 6 Click Add. For additional information on configuring VLANs, see “Configuring VLANs” on page 111. Create or confirm definition of a corporate service profile. 1 Choose SSID Configuration from the Wireless Services menu to open the SSID table (“SSIDs and Service Profiles” on page 84). 2 Click Profile Table. 3 Add a corporate profile or confirm that one exists with the desired WPA security option and the corporate VLAN specified. Make sure that the corporate profile is bound to the SSID. Installation and User Guide: Airgo Access Point 173 8 Configuring Guest Access Task (continued) Steps Create a guest service profile which specifies the guest VLAN and desired COS and security options. 1 Choose SSID Configuration from the Wireless Services menu to open the SSID table. 2 Select SSID Details (“SSID Details” on page 87). 3 Confirm the SSID name, or enter a new SSID name for the Guest Portal, and then click Apply. 4 Click Profile Table to display the current list of service profiles. 5 Click Add to create the guest service profile. Select the VLAN ID for the guest VLAN previously defined. Enter the COS value and make sure that no-encryption is selected. 6 Click Apply. Add guest access to the SSID and specify an internal or external landing page for guest users who attempt to access the network. 1 Choose Guest Access Configuration from the Guest Access Services menu to open the Guest table. 2 Click Add. 3 Confirm selection of the SSID and guest profile, as defined in the previous task. 4 Select whether the landing page will be internal or external. If external, enter a URL and an external web server secret code, which is the shared secret code for communication between the AP and web server. 5 Click Apply. For the internal landing page, set a guest password; for an external landing page use the RADIUS shared secret code. 1 If Internal is selected as the landing page type, click Security to enter the guest password. 2 Enter and confirm the password, and click Apply. Set up optional autogeneration of guest passwords 1 From NM Portal Network Management Explorer window, select User Management from the Security Portal menu. 2 On the Guest User tab (Figure 126), select Yes to enable auto-password generation. 3 Select an interval from the Generate Auto Guest Password pull-down list. 4 Click Apply. NOTE: If static and auto-generated passwords are configured, then a guest user can enter either password to be authenticated. Guest access is now configured. When guests attempt to access the network, they are directed to an external landing page or to a standard user login screen. Upon entering the correct guest password or server secret code, they are granted access to the guest VLAN. They are also given the COS and encryption characteristics specified in the guest service profile. See also “Guest Access Wizard” on page 53. Guest Access Services Panel For summary information about guest access, use the Guest Access Configuration panel. The panel opens to the Guest table (Figure 123), which lists currently defined guest service profiles. If guest access is enabled, you can also open the Guest table by clicking the Guest Access Enabled link on 174 Installation and User Guide: Airgo Access Point Guest Access Services Panel the SSID Details panel. (The panel is described in “SSID Details” on page 87.) The Guest table presents the following information: Field Description SSID The network to which the guest profile belongs (There can be at most one guest profile per SSID.) Service-Profile The name of the guest service profile bound to the SSID. Landing Page Internal or external page automatically that automatically opens when guest users attempt to access the network Allowed Guest Subnet The subnet optionally reserved for unauthenticated guest access (Configuring an allowed guest subnet can give unauthenticated users access to a limited set of free services.) Figure 123: Guest Access Configuration - Guest Table Installation and User Guide: Airgo Access Point 175 8 Configuring Guest Access Perform the following functions from the Guest Table: Function Description Add an entry to the Guest Table One guest profile can be added for each SSID. If a profile is already assigned to an SSID and you add a new one, it replaces the previously defined profile. 1 Click Add to open the Add Guest to SSID entry panel (Figure 124). 2 Select the SSID. 3 Select the service profile from the Profile pull-down list. The profile details are listed at the bottom of the entry panel. 4 If desired, enter the address and maskbits for a subnet optionally reserved for unauthenticated guest access (A.B.C.D/maskbits format) 5 Select an internal or external landing page. If the external page is selected, enter the full IP-based URL and the shared secret code used for communicating with the RADIUS server. 6 Click Apply. Modify an entry 1 Select the entry you wish to modify, and click Modify. 2 Confirm the SSID. 3 Select the service profile from the Profile pull-down list. 4 If desired, enter the address and maskbits for a subnet optionally reserved for unauthenticated guest access. 5 Select an internal or external landing page. If the external page is selected, enter the full URL and shared secret code for access. Click Apply. Delete an entry 6 Select the entry and click Delete. 7 Click OK to confirm. Figure 124: Guest Access Configuration - Add Guest to SSID Guest Access Security The Security tab of the Guest Access Configuration panel (Figure 125) provides an interface to set the guest password for an internal landing page. 176 Installation and User Guide: Airgo Access Point Guest Access Services Panel Figure 125: Guest Access Configuration - Security Auto-Generating Guest Passwords For optional generation of guest passwords automatically at set intervals, use the Guest User tab within the security area of NM Portal (Figure 126). Figure 126: Security Portal - Guest User Installation and User Guide: Airgo Access Point 177 8 Configuring Guest Access 178 Installation and User Guide: Airgo Access Point 9 Managing the Network This chapter explains how to use the NM Portal features of the Airgo Access Point to manage multiple APs across the network. It includes the following topics: • • • • • • • • Introduction Using NM Portal Using the Network Topology Menu Managing Rogue Access Points Using the NM Services Menu Managing Network Faults Using the Security Portal Menu Using the Mobility Services Menu Introduction Network management refers to the coordinated control and supervision of multiple access points across a network. Network management functions include single-point configuration of multiple access points, user access control, performance monitoring, and fault management. A unique network management capability is built into the Airgo Access Point. When configured as an NM Portal, the Airgo AP can provide network management services for up to five subnetworks. For small-size to mid-size networks, this eliminates the need for an external network management application. For mid-size to large-size enterprise networks, NM Portal can manage all the APs at a specific location or branch, while NMS Pro, offered as a separate product, can supply enterpriselevel network management. NM Portal supports the following functions: • • • • • • • • • • Single view to manage the entire network AP discovery AP enrollment Centralized software distribution and policy management Integrated security management for users Rogue AP control Email alerts Fault management Syslog Guest access control Installation and User Guide: Airgo Access Point 179 9 Managing the Network Using NM Portal To use the Airgo AP for NM Portal services, it is necessary to initialize (bootstrap) the unit in NM Portal mode. Do so when initially configuring the AP, or by resetting the AP to factory defaults prior to booting. Chapter 3, “Installing the Access Point Using the Configuration Interfaces,” explains how to initialize an NM Portal and how to reset to factory defaults. NOTE: Before resetting the AP to factory defaults, make sure to have the original password that was shipped with the unit available. After the AP is initialized as a portal, access NM Portal services from the web interface at any time by clicking Manage Wireless Network on the menu tree or on the Home panel (“The Home Panel” on page 40). The NM Portal Network Management Explorer opens in a new browser window (Figure 127). Figure 127: NM Portal Web Interface This interface is similar to that of the standard Airgo AP web interface. The menu tree on the left contains a set of menus that provide access to application features. Use the detail panels on the right to set the configuration and monitor the state of the network. The alarm panel in the lower left portion of the window shows the number of outstanding critical alarms collected across the network managed by NM Portal. Home Panel The Home panel (Figure 127) contains summary information about the network configuration together with links to some of the Detail panels. Open the Home panel at any time by selecting Home from the menu tree. Menu Tree The menu tree contains the following menus: 180 Installation and User Guide: Airgo Access Point Using the Network Topology Menu • Home — Open the Home panel. • Network Topology — Manage AP enrollment, wireless backhaul, IP address status, radio neighbors, and network inventory. • Rogue AP — Classify and manage rogue APs. • NM Services — Set up policies, network discovery, DHCP settings, and portal settings. • Fault Management — View alarm logs and syslog events. • Admin Tools — Upgrade AP software (see “Upgrading Software” on page 251). • Security Portal — Add network, administrative, and legacy users, and enable the RADIUS proxy feature. • Mobility Services — Configure and manage Layer-3 mobility services. Each of these topics is described in this chapter, except Software Upgrade, which is described in Chapter 10, “Maintaining the Access Point.” Click the arrow to the left of a menu item to expand the menu. Using the Network Topology Menu Use the Network Topology menu items to manage the identification, network status, and relationship of APs in the network. Enrolling APs Network security depends upon mutual trust between the NM Portal and the other managed Airgo APs. Each access point must trust the identity of the NM Portal AP, and the NM Portal must trust that each access point is fully authenticated (Figure 128). Figure 128: AP Enrollment Enrollment Portal: NM Portal: Verify AP Identity Other APs Manage and Monitor the Network A0028A Enrollment is the process used to establish this mutual trust. The process consists of several steps: • NM Portal automatically discovers all the Airgo Access Points and presents those not already enrolled in a list of unenrolled APs. • You select a candidate AP to enroll and verify its identity. • NM Portal and the AP perform a mutual authentication process. Installation and User Guide: Airgo Access Point 181 9 Managing the Network • Once the authentication is complete, the AP is enrolled. It is not necessary to enroll the AP again, even if power is lost to the unit. NOTE: In order to enroll an AP, it must be in the factory default state. This assures that enrollment will be based on a known configuration. An NM Portal can discover up to 50 APs across up to five subnets, and can enroll and manage up to 20 APs. To access the enrollment panel, choose AP Enrollment from the Network Topology menu. The AP Enrollment panel opens to display the list of discovered, but as yet un-enrolled, APs (see Figure 129). Figure 129: Network Topology - AP Enrollment - Not Enrolled Perform the following functions from this panel: 182 Function Description Enroll an AP 1 Select the desired AP, and click Enroll to open the Enroll an AP Entry panel (Figure 130). If the AP is not in the factory default state, a message is presented. Click the AP link to open the web interface for the AP and reset it to the factory default configuration. 2 After verifying the information on the panel (Table 15), enter the correct password, and click Enroll. It takes a couple of minutes to enroll the AP. Delete an AP Select an AP and click Delete to remove it from the list. Installation and User Guide: Airgo Access Point Using the Network Topology Menu Function Description Refresh Click to update the display. Rediscover Now Scan the network to discover APs and update the Not Enrolled APs table. Figure 130: Network Topology - AP Enrollment - Enroll an AP Entry Panel The Enroll an AP panel contains information that uniquely identifies the AP. To verify the identity of the AP, compare the following information to the information on the paperwork shipped with the AP: Table 15: AP Enrollment Information Field Description AP Device ID Verify the alphanumeric name of the AP. The default is the IP address. IP Address Verify the IP address of the AP. Serial Number Verify the AP serial number. Thumbprint Verify the thumbprint, which uniquely identifies the AP for security purposes. Password Enter and confirm the company-supplied password. Security Portal Indicate whether to use the AP as a standby security portal. With a backup security portal, a copy of the user authentication database remains accessible even if the NM Portal AP becomes unavailable. When an AP is enrolled, it is configured with the enrolling AP’s bootstrap configuration. Refer to Chapter 3, “Installing the Access Point Using the Configuration Interfaces,” for bootstrap configuration details. Enrolled APs Enrolled APs are listed on the Enrolled tab of the Enrollment panel (Figure 131). The screen should refresh automatically to reflect new enrollments. If this does not happen, click Refresh. NOTE: If DHCP is used for address assignment for enrolled Airgo APs, the AP address may change periodically. When that occurs, service is not interrupted, and all security credentials remain intact. Installation and User Guide: Airgo Access Point 183 9 Managing the Network Figure 131: Network Topology - AP Enrollment - Enrolled Perform the following functions as needed from the Enrolled APs tab: Function Description Unenroll Remove the AP from the set of enrolled APs. Refresh Update the screen display to reflect the most recent enrollment changes. Reboot Reboot the selected AP. Click the IP address link for an AP Access the web interface for the selected AP in a new browser window. NOTE: When an AP is unenrolled, the mutual trust between the NM Portal and the AP is destroyed and the unenrolled AP resets to factory defaults. The AP cannot be configured by NM Portal nor participate in the network (i.e., form a wireless backhaul) without being enrolled again. Viewing Backhaul Topology Configuring a wireless backhaul extends wireless network coverage while reducing the number of APs that must be connected to the wired network. Chapter 6, “Configuring a Wireless Backhaul,” explains how to configure the Airgo AP to be part of a wireless backhaul. Once the wireless backhaul structure is in place, use the Backhaul Topology panel in NM Portal to view all the 184 Installation and User Guide: Airgo Access Point Using the Network Topology Menu backhaul paths defined for the network. Choose Backhaul Topology from the Network Topology menu to display this information (Figure 132). Figure 132: Network Topology - Backhaul Topology This panel contains the following information for each backhaul link: Field Description Channel ID RF channel over which the backhaul traffic travels. Source AP AP that begins the backhaul trunk. The Source AP link opens the web interface for the AP in a new browser window Source Radio MAC address of the radio used for the uplink (wlan0 or wlan1) Destination AP IP address of the AP that terminates the backhaul trunk. Destination Radio MAC address of the radio (could be wlan0 or wlan1) that ends the backhaul trunk Retrunk Count The number of times a functioning backhaul radio reestablishes a trunk (a new backhaul can be established to any AP within RF range, as retrunk does not necessarily mean re-connection to the same AP; if the retrunk count is high, the network has a high level of instability in its wireless inter-access point connections) Rediscover Now button Button that initiates the rediscovery process Installation and User Guide: Airgo Access Point 185 9 Managing the Network Viewing IP Topology The IP Topology panel lists all the APs discovered by NM Portal and the APs that were manually added to the network topology (see “Configuring Network Discovery” on page 200). Choose IP Topology from the Network Topology menu to display this information (Figure 133). Figure 133: Network Topology - IP Topology The table includes the following information for each AP: 186 Field Description Name IP address assigned to the AP Device ID Unique AP identifier sent during the discovery process and required for AP enrollment (The device ID is included in the paperwork shipped with the AP.) Operation State Indication of whether the AP can be reached from the NM Portal AP (The operation state is updated once every five minutes.) MAC Address MAC addresses assigned to each of the AP radios (The address of the wlan0 radio is listed first and the wlan1 radio is listed second.) Auto/Manual Indication of whether the AP was discovered automatically or manually identified Installation and User Guide: Airgo Access Point Using the Network Topology Menu Field Description Portal Services Indication of which portal services are configured on the AP (enrollment and security). Possible values include: • Factory Default - AP has not yet been enrolled or bootstrapped. • Access Point - AP has been enrolled/bootstrapped as an AP. • NM Portal - AP is enrolled/bootstrapped as NM Portal. • SEC Portal - AP is enrolled/bootstrapped as a Security Portal. • NM & SEC Portal - AP is enrolled/bootstrapped as NM Portal and security portal. • Enrollment Portal - AP is bootstrapped as an enrollment portal. Time Discovered Date and time of discovery Enrollment State Indication of whether the AP is enrolled (authorized) or not (unauthorized) Thumbprint Unique identifier used for security purposes (The thumbprint is included in the paperwork shipped with the AP.) View and check the status of all discovered APs from this panel. To delete an AP from the list, select the radio button to the left of the listing, and click Delete. Deleting an AP removes it from the topology database and deletes all the details about its configuration. However, because network discovery is a continuous process, it is possible for a deleted AP to be rediscovered if it is still part of the network. Use the Delete feature when an AP is moved out of the network managed by this NM Portal, so that the portal no longer needs to track the AP. An enrolled AP must be unenrolled first before deleting it from the topology. Displaying Discovered Radios Every 15 minutes, the NM Portal AP polls all the enrolled APs, which then report on all the wireless devices they can detect. The results of the polling are presented in the Discovered Radio table (Figure 134), accessible from the Discovered Radios item under the Network Topology menu in the menu tree. Use the Discovered Radios list to characterize the wireless network neighborhood and detect possible rogue APs. Installation and User Guide: Airgo Access Point 187 9 Managing the Network Figure 134: Network Topology - Discovered Radios The Discovered Radios table contains the following information for each detected device: 188 Field Description MAC Address Address that uniquely identifies the detected device. IP Address IP address of the detected device, if known. Reporting AP The enrolled AP that reported the device to the NM Portal AP. If this field is blank, the AP was reported on a previous scan but not the most recent one. Time Reported The time of the last scan that detected the AP. Time Discovered The time of day that the presence of the device was discovered by the reporting AP. Class Indication of whether the discovered node is just a Radio Neighbor or a Radio and IP Neighbor. Radio and IP neighbors are part of the internal network and are reachable by way of IP addressing. Signal Strength Strength of the detected signal in dBm. SSID The SSID of the detected device, if known. Channel ID The channel on which the signal was detected. BSS Type Whether the detected device is part of an infrastructure or ad-hoc service set. Installation and User Guide: Airgo Access Point Using the Network Topology Menu Displaying Network Inventory It is recommended that you run the same software and hardware versions on all the APs in the network. The Inventory Table panel provides a display of hardware and software version information for selected APs and can be used to monitor the consistency of configurations across the network. To open the Inventory Table panel (Figure 135), select Network Inventory from the Network Topology menu. Figure 135: Network Topology - Inventory Table Installation and User Guide: Airgo Access Point 189 9 Managing the Network Select one of the following sets of APs, and click Apply to display the version information. Click Reset to return to the previously saved value. Option Description Version Details for Enrolled APs Version information for APs that are enrolled Version Details for AP Version information for the AP with the entered IP address Version Details for all discovered APs Version information for all APs discovered by NM Portal The AP Version table contains the following information for each AP: Field Description AP IP address of the AP Device ID Unique AP identifier sent during the discovery process and required for AP enrollment HW Version Release of hardware used in the AP System Board Version Release of system board hardware used in the AP Software Version Release of software used in the AP Software Build Number Sequence number indicating the exact software build used in the AP Software Build Date Date that the software was compiled Software Licenses Software licenses that are currently active on the AP Managing Rogue Access Points A rogue AP is an access point that connects to the wireless network without authorization. In some cases, the AP may be performing a legitimate function and the appropriate management action is to classify the AP as “known.” If it is not possible to identify a legitimate role for the AP, then the AP is considered to be a true rogue. NM Portal provides information to help determine where rogue APs are physically located and how recently they have accessed the network. With this information, it may be possible to find and disable them. NOTE: Use the Discovery Configuration panel to enable the rogue AP discovery feature. For instructions, see “Configuring Network Discovery” on page 200. Potential rogue AP candidates are identified during discovery. Every 15 minutes, NM Portal scans the network to discover and identify known Airgo APs. The domain for the discovery process is specified in the Discovery Configuration panel (see “Configuring Network Discovery” on page 200). Discovery can be restricted to specific subnetworks, ranges of IP addresses, or individual APs. It is also possible to specify whether the discovery is at the IP (Layer-3) or wireless/MAC level (layer 2). Wireless discovery is based on the beacon sent by APs within range of the receiving AP. Each AP collects information about beacons it sees and passes that information to NM Portal. NM Portal checks the MAC address of the detected AP to see whether it matches that of a known AP. If it does not match, the detected AP becomes a rogue AP candidate. 190 Installation and User Guide: Airgo Access Point Managing Rogue Access Points IP level discovery requires that the detecting AP be able to determine the IP address of the discovered AP through an IP / SNMP connectivity check and establish IP-level communications with it. NM Portal then performs a series of consistency checks and certification to determine whether the AP is a recognized part of the network. After an AP is successfully discovered and authenticated, the system checks to see whether it is enrolled and places it into the Enrolled or APs to be Enrolled table. For more information on AP enrollment, see “Enrolling APs” on page 181. A variety of conditions may cause NM Portal to label an AP as a rogue candidate: • The AP is not an Airgo AP. • A problem exists with the AP certificate and the AP cannot be authenticated. • The AP is a legitimate device on a neighboring network but has been detected through a wireless scan. • An unauthorized device attempts to access the network The objectives of rogue AP management are to determine which APs pose a security risk and to take action to reduce the risk. The Rogue AP panels within NM Portal provide an interface to monitor and classify rogue APs. Use the IP Rogue AP panel to manage potential rogues detected through IP discovery, and use the Wireless Rogue AP panel to manage potential rogues detected through wireless discovery. Each panel opens to the Unclassified tab, which lists the candidate rogue APs. From the list, select individual APs to classify as known in your network or a neighbor’s network. Once classified, the APs are listed in the IP or Wireless Classified tab. IP Rogue AP Management Select IP Rogue AP from the Rogue AP menu to open the table of IP-unclassified APs. This panel (Figure 136) lists the following information for each unclassified AP: Field Description Device ID Unique identifier for the AP Node Name Name of the AP advertised in the beacon frame Rejection Reason Failure that prevented the AP from passing authentication Time Discovered Time of the last IP scan that detected the AP, updated each time the AP is detected Thumbprint Factory-generated identifier used for AP enrollment Installation and User Guide: Airgo Access Point 191 9 Managing the Network Figure 136: IP Rogue AP - Unclassified Perform the following functions from this tab: Function Steps Classify an AP as known 1 Select the AP from the list. APs are identified by device ID and IP address, if known. 2 Click Classify-Node to open the Classify the Rogue AP panel (Figure 137). 3 Select Our-Network to classify the AP as known within your wireless network. Select Neighbor-Network to classify the AP as known in a neighboring network. 4 Click Apply. The AP is now classified. The classification information is retained in the NM Portal database and presented on the Classified tab (Figure 138). This information is retained upon AP reboot. 192 Delete an AP from the rogue list Click Delete and click OK to confirm. If an AP is deleted from the list and then discovered in a subsequent scan, it is added to the list again. Delete from the list all APs classified as IP rogues Click Delete all IP-Unclassified Rogues, and click OK to confirm. Installation and User Guide: Airgo Access Point Managing Rogue Access Points Figure 137: IP Rogue AP - Classify Classified Tab The Classified tab (Figure 138) lists all the APs designated as known through IP classification. It contains the following information for each classified AP: Field Description AP Name of the AP, by default, the MAC address Device ID Unique identifier for the AP Thumbprint Factory-generated identifier used for AP enrollment Portal Services Portal services (enrollment, security, NM portal) configured on the AP Operational State Indicator of whether the AP is currently active Discovery Method IP or wireless discovery Time Discovered Time of the last IP scan that detected the AP (updated each time the AP is detected) Node State Identifies whether the AP has been classified as a member of Our-Network or Neighbor-Network MAC Address MAC address of the AP Installation and User Guide: Airgo Access Point 193 9 Managing the Network Figure 138: IP Rogue AP - Classified Wireless Rogue AP Management Wireless rogue management differs from IP rogue management in the type of discovery used to determine whether the AP is authorized to be part of the network. In wireless discovery, each AP scans the beacons sent by other APs within range and attempts to identify the APs from the information in the beacon. Select Wireless Rogue AP from the Rogue AP menu to open the table of unclassified wireless rogue APs. This panel (Figure 139) lists the following information for each IP rogue: 194 Field Description MAC Address MAC address of the unclassified rogue AP Reporting AP The device ID of the AP or APs that identified the rogue AP (If this field is empty, the rogue device was detected in a previous scan, but not in the most recent scan.) Detection Time Time that the AP was last detected Class Radio Neighbor or Radio and IP Neighbor Signal Strength Strength of the beacon (dBm) BSS Type Infrastructure or ad-hoc (IBSS) SSID SSID sent in the rogue beacon Channel ID Radio channel on which the AP was discovered Installation and User Guide: Airgo Access Point Managing Rogue Access Points Field Description Reporting Time Time of the last wireless scan Figure 139: Wireless Rogue AP - Unclassified Perform the following functions from this tab: Function Steps Classify an AP as known 1 Select the AP from the list. APs are identified by MAC address. 2 Click Classify-Node to open the Classify the Rogue AP panel (Figure 140). 3 Select Our-Network to classify the AP as known within your wireless network. Select Neighbor-Network to classify the AP as known in a neighboring network. 4 Click Apply. The AP is now classified. The classification information is retained in the NM Portal database and presented on the Classified tab (Figure 141). This information is retained upon AP reboot. Delete an AP from the rogue list Click Delete and click OK to confirm. If an AP is deleted from the list and then discovered in a subsequent scan, it is added to the list again. Delete from the list all APs classified as wireless rogues Click Delete All, and click OK to confirm. Installation and User Guide: Airgo Access Point 195 9 Managing the Network Figure 140: Wireless Rogue AP - Classify Classified Tab The Classified tab (Figure 141) lists all the APs designated as known through wireless classification. It contains the following information for each AP: Field Description MAC Address Name of the detected AP; by default, the MAC address Reporting AP Device ID of the AP that detected this rogue AP Detection Time Time of the scan that last detected the AP Class Category used to classify the AP Figure 141: 196 Wireless Rogue AP - Classified Installation and User Guide: Airgo Access Point Using the NM Services Menu Using the NM Services Menu Use the NM Services menu to define and manage policies, configure parameters for network discovery, add information about DHCP servers, and add portals at remote locations. Working with Policies Policy Management provides tools to keep your network configuration synchronized to a defined set of rules. Open the Policy Management panel to manage configuration policies for distribution to the network of enrolled APs. The panel contains the following tabs: • Policy Table — View existing policies. • Define Policy — Specify a policy for bootstrapping other APs in the network. • Distribute Policy — Send a policy to other APs in the network. Policy Table The policy table (Figure 142) lists policies that exist on this AP and are available for distribution to the network of enrolled APs. Figure 142: NM Services - Policy Management - Policy Table To view the details of a policy, select the name in the policy table, and click Details. The policy table expands to display all the parameters contained in the policy (Figure 143). To return to the policy table, click Back. To delete a policy, click Delete. Installation and User Guide: Airgo Access Point 197 9 Managing the Network Figure 143: NM Services - Policy Management - Policy Table - Details (excerpt) Define Policy Define a default policy for bootstrapping other APs in the network by selecting the configuration of this AP as a model. The default policy is pushed automatically to newly enrolled APs. Use the Define Policy tab (Figure 144) to choose the default policy. NOTE: The NM Portal AP requires two radios in order to construct a default policy for two-radio APs. Perform the following functions from this tab: 198 Function Description Generate a default policy from a predefined policy Select a policy from the pull-down list, and click Apply. Not currently supported. Use this AP’s start-up configuration to generate a default policy. Select the checkbox, and click Apply. Installation and User Guide: Airgo Access Point Using the NM Services Menu Figure 144: NM Services - Policy Management - Define Policy Distribute Policy Use the Distribute Policy tab (Figure 145) to direct how policies are shared across the network. Figure 145: NM Services - Policy Management - Distribute Policy Configure the following fields on this tab: Field Description Select Policy to Distribute Select an existing policy from the pull-down list. Select All Policies to Distribute Select to distribute all the existing policies. Installation and User Guide: Airgo Access Point 199 9 Managing the Network Field Description Target AP Name Select the APs to receive the policy or policies, or select Target AP Name to distribute to all the APs. Click Distribute Now to send the policies to the designated APs. Configuring Network Discovery Use the Network Discovery panel to set up the rules for AP discovery. The panel contains the following tabs: • Configuration — Specify discovery parameters. • Scope/Seed — Restrict discovery to specified subnetworks or IP address ranges. • Rogue AP — Enable or disable rogue AP discovery. Configuration Select Network Discovery from the NM Services menu to open the Configuration panel (Figure 146). Figure 146: 200 NM Services - Discovery Configuration Installation and User Guide: Airgo Access Point Using the NM Services Menu Configure the following values on this tab: Field Description Discovery Interval Restrict discovery to a time interval (in minutes). The range is 60-10080 (default is 60 minutes). NOTE: Based on the default discovery interval, a newly installed AP could take one to two hours to be discovered. Use Force Rediscovery to speed the process. Discovery Limit Restrict discovery to a number of APs. Once this limit is reached, the discovery process stops. The range is 1-50 (default is 50 APs). AP IP Address Specify the IP address of an AP that you want to manage but which is not part of the managed subnetwork specified in the discovery scope. APs added to the managed network this way are termed “manually added” and can be managed by NM Portal. This option is useful if you want to manage just a few APs in a different subnet without incurring the overhead associated with discovering all the APs in that subnet. If an enrolled AP is moved to a different subnet not managed by the NM Portal, then the Portal will automatically flag that AP as a manually added AP and will continue to manage that AP. Discovery Methods Select whether to discover the APs with valid IP address information (IP), or those identifiable by their radio beacon (Wireless), or those that meet either criterion. Force Rediscovery Select to force an immediate rediscovery of all APs. If the discovery process is already in progress when rediscovery is initiated, then no additional discovery is re-initiated. To stop the current discovery process and restart discovery again, use the Force All option. This is useful if the discovery scope is incorrectly configured and must be deleted. Click Apply to implement the changes in each section or Reset to return to previously saved values. Use the Start Discovery radio buttons at the bottom of the panel to configure discovery on demand. Choices are to discover all APs, only those with a connection to the wired network (IP), or only those that radio neighbors. Click Rediscover Now to rediscover the network on demand. Scope/Seed By default, NM Portal automatically discovers all compatible APs in the local IP subnet. When APs are deployed across multiple subnetworks, specifying the discovery scope and seed IP address speeds the discovery process. The seed IP address is used as the reference AP for discovery purposes. The Seed AP is optional. If it is not specified, NM Portal automatically discovers all the compatible APs in that subnet and identifies a seed AP for itself. Select the Scope/Seed tab (Figure 146) to configure the scope and seed parameters. Installation and User Guide: Airgo Access Point 201 9 Managing the Network Figure 147: NM Services - Discovery Configuration - Scope/Seed Configure the following fields on this tab: Field Description Discovery Scope - IP Network Address Enter the IP address of the subnet that you want to discover. Discovery Scope Subnet Maskbits Enter the subnet prefix length for the discovery scope. Discovery Seed Specify a seed IP, which is the first address NM Portal will attempt to discover in the selected subnetwork. Click Apply to save the selections and add them to the Discovery Scope Table at the bottom of the panel. To delete an entry from the Discovery Scope table, select the entry and click Delete. Rogue AP Use the Rogue AP tab (Figure 146) to enable or disable discovery of rogue access points. The default is Enabled. Click Apply to save the setting. If enabled, NM Portal automatically scans the network to detect IP and wireless rogue access points. For more information, see “Managing Rogue Access Points” on page 190. 202 Installation and User Guide: Airgo Access Point Using the NM Services Menu Figure 148: NM Services - Discovery Configuration - Rogue AP Configuring Portals The Portal Configuration panel lists all the Airgo Access Point portals that your AP has discovered and permits addition of a standby security portal to ensure that the wireless user authentication service remains available even if the NM Portal AP temporarily loses its connection. The panel contains two tabs: • Portal Table — Add a redundant security portal and synchronize the portal databases. • Secure Backup — Use https to perform a secure backup of the NM Portal AP configuration. • Portal Backup — Back up or restore the portal databases and configuration. Installation and User Guide: Airgo Access Point 203 9 Managing the Network Portal Table Use the Portal Table (Figure 149) to manage the security portals for the network. Figure 149: NM Services - Portal Configuration - Portal Table Perform the following functions on this tab: Field Description Add Redundant Security Portal Specify the IP address, and click Apply. Only an already-enrolled AP can be configured to be a redundant security portal. Portal Table View the list of currently identified NM Portal APs. The listing includes the IP address of the AP, its device ID, and whether the AP is currently enrolled. To delete an entry from the table, select the radio button to the left of the entry, and click Delete. NOTE: All Portals shown in this table as unenrolled are currently not managed by this NM Portal but form part of other managed networks. Only Portals managed by this NM Portal will be shown as Enrolled and or will have a radio button that deletes the portal. 204 Installation and User Guide: Airgo Access Point Using the NM Services Menu Field Description Sync Frequency Select to automatically synchronize the database between the portals. The sync frequency represents the duration in minutes at which NM Portal cross checks the portals in the network to make sure their databases are synchronized with the NM Portal database. Click Apply to save the settings, or click Reset to return to the default values (autonomous selected, period five minutes). It is recommended that you accept the default value to make sure that synchronization takes place. Portal DB Version Table View current database information for user security. For each enrolled AP, the table lists the following information: • AP IP Address — IP address of each portal AP • RADIUS Client DB Version — Version of the user database resident on the RADIUS client • RADIUS User DB Version — Version of the user database for RADIUS users • Certificate DB Version — Version of the security certificate for RADIUS clients • AP Device-ID — Unique identifier for the AP • Enrollment Status — Indication of whether the AP is enrolled Secure Backup Use the Secure Backup tab (Figure 149) to save the NM Portal database and configuration using the secure https protocol. Figure 150: NM Services - Portal Configuration - Secure Backup Click Save Configuration. When the configuration is generated, a hyperlink is displayed. Rightclick and select Save As to save the configuration locally. After the configuration file is saved, click Delete to remove the file from the AP. The file takes up space in AP persistent storage, so it is recommended that you remove it. To restore the configuration, browse to select the file, and then click Apply to restore the configuration and reboot the AP. Installation and User Guide: Airgo Access Point 205 9 Managing the Network Portal Backup Use the Portal Backup tab (Figure 151) to back up the portal databases and configuration to a TFTP server and to restore the configuration from the TFTP server. To back up and restore, enter the server IP address and specify a backup file name. To restore, enter the same TFTP server address and file name. If you want to reboot the AP once the configuration file has been copied, select Reboot. (required) Figure 151: NM Services - Portal Configuration - Backup/Restore Configuring the DHCP Server NM Portal includes an internal DCHP server, which can be activated to support IP address assignments in the network if a DHCP server is not in place. Choose DHCP from the NM Services menu to open the DHCP panel. The panel contains the following tabs: • • • • DHCP Options — Activate and configure the DHCP server. IP Range — Enter address information for the DHCP server. Leases — View details about the current DHCP leases. Static IP — Assign static IP addresses for specific equipment. NOTE: Use the DHCP panels to support IP address assignments only if a DHCP server is not already in place on the existing network. NOTE: The DHCP server on the NM Portal AP is bound to the default VLAN (VLAN ID 1). It serves address requests only for this VLAN. 206 Installation and User Guide: Airgo Access Point Using the NM Services Menu DHCP Options Select the DHCP Options tab (Figure 152) to activate and configure the DHCP server. Figure 152: NM Services - DHCP Configuration - DHCP Options To activate the server, Enable DHCP Server and configure the following information: Field Description Lease Time Specify the maximum number of leases that the server should assign. This is used to restrict the number of IP addresses served even though the IP subnet served by the DHCP server may be large. The default is one hour. Max Leases Specify the maximum number of available leases. There is no default. Gateway IP Address Enter the IP address of the gateway. There is no default. DNS Server IP Address Enter the IP address of the server or servers that provide domain name resolution. There is no default. More than one DNS IP address may be specified (space separated). If the field is left blank, then any previously configured DNS server addresses will be deleted. If you delete DNS servers, only those added manually are deleted. DHCPassigned DNS servers continue to be available. WINS Server Enter the IP address of the Windows name server used to map IP addresses to computer names. There is no default. Installation and User Guide: Airgo Access Point 207 9 Managing the Network Field Description NTP Server Enter the IP address of the server or servers used to synchronize network clocks. There is no default. More than one NTP IP address may be specified (space separated). If you delete NTP servers, only those added manually are deleted. DHCPassigned NTP servers continue to be available. Click Add to save the configuration information. IP Range Select IP Range to configure address ranges for DHCP leases (Figure 153). Figure 153: NM Services - DHCP Configuration - IP Range Enter the following information on this panel: Field Description Interface Name Confirm the alphanumeric name of the AP interface. The default is br1, which is the default bridge. IP Address Range Select a radio button to specify the range of addresses available for assignment. Choose either of the following: • IP Subnet/Maskbits — Enter the address and maskbits that define the subnet to be used for address assignment. • Use Fixed IP Address Range — Specify a range of IP addresses by entering starting and ending addresses, with subnet prefix length. 208 Installation and User Guide: Airgo Access Point Using the NM Services Menu Click Apply to save the address information. Add additional interfaces if desired. The added interfaces are listed in the DHCP Address Range table at the bottom of the panel. To delete a DHCP interface, select the interface in the DHCP IP Address Range table, and click Delete. Leases The Leases tab (Figure 154) lists each network computer serviced by DHCP and its lease information. Figure 154: NM Services - DHCP Configuration - Leases This table contains the following information: Field Description MAC Address Address that uniquely defines the DHCP client Leased IP Address IP address assigned by the DCHP server Lease Time Remaining Amount of time remaining on the current DHCP lease (in hours) Installation and User Guide: Airgo Access Point 209 9 Managing the Network Static IP Use the Static IP tab (Figure 155) to reserve static IP addresses for specific nodes. Figure 155: NM Services - DHCP Configuration - Static IP Enter the following information on this tab: Field Description Client Fully Qualified Domain Name Enter an alphanumeric name for the node, which is fully qualified by DNS. Client MAC Address Enter the MAC address that uniquely identifies the client station. Assigned IP Address/ Maskbits Assign the static IP address and maskbits. Click Add to save the information. The new entry is listed in the table at the bottom of the tab. To delete an entry, select the name in the DHCP Static IP Table, and click Delete. Managing Network Faults NM Portal aggregates alarms from all managed APs. Each AP can store up to 260 alarms locally. When the number of alarms exceeds this limit, the oldest alarms are deleted as needed. Use the Fault Management panels to view the system alarms and syslog entries. Alarms are raised as SNMP Traps, which are forwarded to the SNMP Sink Host (or Primary NMS). Viewing Alarms Choose Alarm Summary from the Fault Management menu to view counts and descriptions of alarms that occur in the network managed by NM Portal. 210 Installation and User Guide: Airgo Access Point Managing Network Faults The Alarm Summary panel contains three tabs: • Alarm Summary — View counts of system alarms in the managed network. • Alarm Table — View a detailed list of alarms. • Filter Table — Select events that should be filtered out of the reported alarm list. Alarm Summary The Alarm Summary tab (Figure 156) provides an aggregate count of alarms across the network managed by NM Portal. NOTE: The alarm count in the lower left corner of the Network Management Explorer window is the same as that given on the Alarm Summary tab. Click the Alarm Summary hyperlink to open the Alarm Summary tab. The Alarm Summary tab contains the following information: Field Description Alarm Count Total alarms in the managed network Total Alarms Received Total alarms from APs other than this AP Total Alarms Filtered Count of alarms not displayed because they were filtered out Alarm Logging Start Time Time at which the counts began Figure 156: Fault Management - Alarm Summary Alarm Table The Alarm Table tab (Figure 157) provides a detailed description of alarms and enables filtering of the alarm table for easy viewing and searching. A description of all the alarms is provided in “Airgo Access Point Alarms” on page 214 and additional details are presented in Appendix D, “Alarms.” The Alarm Table includes the following information: Field Description Alarm ID Text description of the specific alarm Installation and User Guide: Airgo Access Point 211 9 Managing the Network Field Description Alarm From Device ID of the AP that reported the alarm Description Text description of the event Log Time Time the alarm occurred and was logged From Module The subsystem that is the source of the alarm. Modules include: • Authentication • Networking • Distribution • Configuration • Wireless • Discovery • NM Portal • SW Download NOTE: The filtering function on the Alarm Table tab only affects the information displayed in the Alarm Table at the bottom of the tab. To remove some event types completely from the alarm list, use the Alarm Filter tab. 212 Installation and User Guide: Airgo Access Point Managing Network Faults Figure 157: Fault Management - Alarm Summary - Alarm Table Configure the following fields to define a viewing filter: Field Description Alarm ID Select an alarm from the list to view only those specific alarms. Logging Module Name Select from the list to filter all the alarms from a specific system logging module. Alarms From (Host Address) Select an AP to view only the alarms generated by that AP. Logging Period Enter a date range to show events during a specific interval of time. Click Set Filter to apply the filter to the alarm table or Reset to clear the selected values. Installation and User Guide: Airgo Access Point 213 9 Managing the Network Table 16: Airgo Access Point Alarms Alarm ID Description Discovered New Node Generated when a new Airgo Access Point is discovered by NM Portal for the first time. Node Deleted from Network Generated when a previously-discovered node is deleted from the system. When the node is deleted, all information about that node is deleted from NM Portal. If the node’s IP address falls within the discovery scope, then the node will be rediscovered and added back to the set of the discovered nodes during the next discovery scan. Managed Nodes Limit Exceeded Generated when the number of discovered nodes exceeds the limit defined in the Discovery Configuration panel, Configuration tab. See “Configuring Network Discovery” on page 200). If this alarm occurs, NM Portal ceases to discover or track any new nodes. Node Enrolled Generated when an Airgo AP has been successfully enrolled. Node Un-Enrolled Generated when an Airgo AP has been successfully rejected (un-enrolled). Policy Download Successful Generated when a policy is successfully downloaded to an AP. Policy Download Failed Generated when policy downloaded to an AP is unsuccessful due to an error in the policy, software version mismatch, or another error. Image Download Succeeded. Generated when an image is successfully downloaded and applied to an AP. Image Download Failed Generated when image download to an AP is unsuccessful, due to corrupted images, images of invalid length, or connectivity failures. Software Distribution Succeed Generated when an image distribution is completed. Radio Enabled (BSS Enabled) Generated when an AP radio is enabled. Indicates successful start of a BSS and includes the channel on which the AP radio will be operating. Radio Disabled (BSS Disabled) Generated when an AP is disabled. Disabling can be user triggered for administrative purposes, caused by radio reset due to application of wireless configuration parameters, triggered by hardware, or due to a change in SSID. BSS Enabling Failed Generated when an attempt to enable an AP radio fails. Reason codes: 0 – Unspecified reason 1 – System timeout attempting to enable BSS Frequency Changed Generated when operating frequency is changed for an AP radio due to user intervention or events such as periodic dynamic frequency selection (DFS). Reason Codes: 0 - Triggered due to DFS 1 - User triggered 214 Installation and User Guide: Airgo Access Point Managing Network Faults Table 16: Airgo Access Point Alarms (continued) Alarm ID Description STA Association Failed Generated when an 802.11 client station fails in its attempt to associate to the AP radio. Reason Codes: 1 - Invalid parameters received from station in association request 2 - Only stations are allowed to associate with this AP based on current configuration 3 - Only backhauls can be formed with this AP based on current configuration 4 - Max backhaul limit is reached based on the 'Max Trunks' configuration for AP admission criteria 5 - Max station limit is reached based on the 'Max Stations' configuration for SSID 6 - SSID received in association request does not match SSID in AP configuration. This can occur more often when an AP is not broadcasting SSID in beacon (due to suppressed SSID or multiple SSIDs being configured) and station is associating to an AP with a different SSID 7 - Authentication and encryption requested by station does not match security policy of the AP 8 - Multi Vendor Station indicates that the station is not allowed to associate based on AP admission criteria 9 - 802.11b stations are not allowed to associate based on AP admission criteria 10 - Station is not allowed to associate and was transferred to another AP radio due to load balancing 11 - Station is not allowed to associate because node does not have network connectivity STA Associated Generated when a client station succeeds in associating to the AP radio. The alarm message includes the current associated stations, type of association, and user ID. The user ID is the user name if RADIUS authentication is employed; otherwise the MAC address is used. STA Disassociated Generated when an 802.11 station is disassociated by the network or the station. Reason Codes: 0 - Station initiated disassociation 1 - Station has handed off to another AP 2 - Disassociation triggered due to authentication failure after ULAP timeout 3 - Disassociation triggered due to user action Installation and User Guide: Airgo Access Point 215 9 Managing the Network Table 16: Airgo Access Point Alarms (continued) Alarm ID Description WDS Failed Generated when wireless backhaul formation fails. The message includes the MAC address of the end node. This alarm can help track losses in network connectivity. Reason Codes: 0 - System failure 1 - Maximum BP count has been reached (this relevant only for AP) 2 - Join attempt to the uplink AP failed (BP side only) WDS Up Generated when a wireless backhaul formation succeeds. The message includes the MAC address of the end node. Reason Codes: 0 - Trunk has been established 1 - Trunk has been optimized (re-established based on better connectivity) WDS Down This is a notification generated when a wireless backhaul has gone down. The remote end’s MAC address is provided. Reason Codes: 0 - System reason (unspecified) 1 - Loss of link (applies to BP side only) 2 - Trunk brought down by uplink AP (applies to BP side only) 3 - User retrunk issued (this can occur due to new backhaul configuration being applied on BP) 4 - Trunk has reformed with another AP (AP side only) 5 - Trunk brought down by BP (applies to AP side only) 216 Guest Authentication Succeeded Generated when a guest station is authenticated and indicates the successful start of a guest access communications session. The guest user is offered the communications services specified in the guest profile for the specified SSID. Guest Authentication Failed Generated when a guest station fails to authenticate. User Reject by RADIUS Server Generated when user authentication fails. The AP radio and the RADIUS server that rejected the user are included in the message. BP Rejected by RADIUS Server Generated when a security portal has rejected the attempt by a BP radio to associate to the AP. This may mean that the BP is not enrolled in the same network as the AP or that the BP was just enrolled, but the enrollment database has not yet been synchronized across the network to all security portals. RADIUS Server Timeout Generated when the RADIUS server fails to respond within the RADIUS timeout period. The RADIUS server may be unreachable over the network, or the shared secret for the RADIUS server is incorrectly configured on the AP. If multiple RADIUS servers are configured in this authentication zone, the AP will switch to using the next one in the list. Installation and User Guide: Airgo Access Point Managing Network Faults Table 16: Airgo Access Point Alarms (continued) Alarm ID Description Management User Login Success Generated when a management user successfully logs in to the local AP. Management User Login Failure Generated when a management user fails to log in to the AP. STA Failed EAPOL MIC Check Generated when the MIC fails during EAPOL key exchange process. If the authentication type is WPA PSK and the failure happened during the pairwise key exchange, then the most likely reason is incorrect configuration of the WPA PSK on the station. It could also mean that an attacker’s station is attempting to masquerade as a legal station. STA Attempting WPA-PSK – No Preshared Key Is Set for SSID Generated when a client station attempts to perform WPAPSK-based authentication on a given SSID, but no WPA preshared key has been configured for that SSID. Auth Server Improperly Configured on this SSID Generated when the AP has determined that a station requires an authentication server, but none is configured for this SSID. Authentication servers are needed for EAP-based authentication and MAC address based ACL lookups. STA Failed to Send EAPOL-Start Generated when the AP has determined that a client station has failed to send an EAPOL-Start, possibly indicating incorrect configuration of the station. The AP expects the station to send an EAPOL-Start if the authentication type is deemed to be EAP-based. This can happen when WPA EAP authentication is negotiated, or when WEP is enabled on the AP and no manual WEP keys are configured. RADIUS Sent a Bad Response Generated during authentication when the RADIUS server sends a bad or unexpected response. This would occur if the cryptographic signature check failed or an attribute is missing or badly encoded. RADIUS Timeout Too Short Generated when the AP receives a late response from the RADIUS server, generally due to high network latency. The AP may have attempted multiple retries or may have switched to another RADIUS server by this time. If this alarm is generated repeatedly, it may be desirable to increase the timeout associated with the authentication server. STA Authentication Did Not Complete in Time Generated when the station authentication sequence did not complete in time. Upstream AP Is Using an Untrusted Auth Server Generated when the local BP determines that the upstream AP is using an untrustworthy authentication server. This could mean that the upstream AP is a rogue AP. If the downstream AP was previously enrolled in another network, it should be restored and re-enrolled in the new network. Upstream AP Is Using a Non-portal Node As Its Auth Server Generated when the local BP determines that the upstream AP is using a node that is not a security portal as its authentication server. The BP is aware of the other node, but does not believe it is authorized to be a security portal. Upstream AP Failed MIC Check During BP Authentication Generated when the MIC fails during the EAPOL key exchange process with a BP radio. Installation and User Guide: Airgo Access Point 217 9 Managing the Network Table 16: Airgo Access Point Alarms (continued) Alarm ID Description Premature EAP-Success Receive Generated when an upstream AP sends an EAP success before authentication is complete. This may indicate that a rogue AP is trying to force an AP to join before authentication is complete. Profile Not Configured for User-Group Generated when the AP determines that the station is a member of a group that does not have a service profile defined for this SSID. STA Has Failed Security Enforcement Check Generated if the station attempts to use an encryption type that is not allowed in its service profile. The AP can advertise multiple encryption capabilities, but different stations may be restricted to different subsets of encryption capabilities based on their service profiles. AP Detected Bad TKIP MIC Generated when a bad TKIP MIC is detected on an incoming frame from a station that is encrypted with a pairwise/unicast key. All packets received by the AP are always encrypted with the pairwise/unicast key. BP Detected Bad TKIP MIC on Incoming Unicast Generated when a bad TKIP MIC is detected by a local BP radio on an incoming frame encrypted with the pairwise/ unicast key. BP Detected Bad TKIP MIC on Incoming Multicast/Broadcast Generated when a bad TKIP MIC is detected by a local BP radio on an incoming multicast or broadcast packet from the AP, where the packet is encrypted with the group/multicast/ broadcast key. STA Detected Bad TKIP MIC on Incoming Unicast Generated when a bad TKIP MIC is detected by a station associated with this AP on an incoming unicast packet from the AP, where the packet is encrypted with the pairwise/unicast key. STA Detected Bad TKIP MIC on Incoming Multicast/Broadcast Generated when a bad TKIP MIC is detected by a station associated with a radio on an incoming multicast or broadcast packet from the AP, where the packet is encrypted with the group/multicast/broadcast key. TKIP Counter-Measures Lockout Period Started Generated when a TKIP counter-measures lockout period for 60 seconds is started. Indicates that the AP has determined that an attempt is underway to compromise the secure operation of TKIP. This happens if two MIC failures are detected within a 60-second interval. If this happens, the AP disassociates all stations and prevents new stations from associating for a period of 60 seconds. EAP User-ID Timeout Generated when a station fails to send its user-ID in time to complete its authentication sequence using the specified authentication type. The two authentication modes that require the station to send its user-ID are WPA EAP and legacy 8021.x for dynamic WEP. This alarm may indicate that a user prompt is not attended to on the client side. 218 Installation and User Guide: Airgo Access Point Managing Network Faults Table 16: Airgo Access Point Alarms (continued) Alarm ID Description EAP Response Timeout Generated when a station fails to send an EAP Response in time to complete its authentication sequence using the specified authentication type and encryption. The two authentication modes that require the station to send EAP responses are WPA EAP and legacy 8021.x for dynamic WEP. This alarm may mean that a user prompt is not attended to on the client side. It may also indicate that the client silently rejected an EAP request sent from the RADIUS server – perhaps because it did not trust the RADIUS server’s credentials. EAPOL Key Exchange –Message 2 timeout Generated when a station fails to send the WPA EAPOL-Key Pairwise Message #2 in time to complete the pairwise key exchange. EAPOL Key Exchange – Message 4 timeout Generated when a station fails to send the WPA EAPOL-Key Pairwise Message #4 in time to complete its authentication sequence with a radio, using the specified authentication type and encryption. EAPOL Group 2 Key Exchange Timeout Generated when a station fails to send the WPA EAPOL-Key Group Message #2 in time to complete its authentication sequence with a radio, using the specified authentication type and encryption. Alarm Filter Use the Alarm Filter tab (Figure 158) to eliminate selected events from the alarm displays in the Alarm Summary and Alarm Table tabs. Select an event ID from the list, and click Add to include the event type in the list of events that are not reported. Each added event is included in the Event Filter Table Drop List at the top of the tab. The table includes the event ID and a description. To remove an event from the list, select the event, and click Delete. Installation and User Guide: Airgo Access Point 219 9 Managing the Network Figure 158: Fault Management - Alarm Summary - Alarm Filter Viewing the Syslog Select SYSLOG from the Fault Management menu to view syslog messages used for network troubleshooting. The most recent messages are in the default message file, Messages, with the latest messages at the top. To view older messages, select the appropriate message.x file from the list on the SYSLOG panel (Figure 159). See “Syslog Configuration” on page 241 for instructions on configuring the syslog message output. 220 Installation and User Guide: Airgo Access Point Using the Security Portal Menu Figure 159: Fault Management - SYSLOG Using the Security Portal Menu Use the Security Portal menu items to manage user access to the wireless network and to configure the RADIUS proxy feature. Managing User Accounts Choose User Management from the Security Portal menu to manage the authentication of users by way of the internal RADIUS database on the NM Portal AP. The panel contains the following tabs: • • • • Wireless Users — Manage users who seek access to the wireless network. Admin Users — Manage administrators responsible for the wireless network. MAC ACLs — Identify and manage users using the MAC addresses of their computers. Guest User — Set up automatic password generation for guest users. For a description of this tab, see “Configuring Guest Access” on page 167. Adding Wireless Users Choose User Management from the Security Portal menu to open the Wireless Users tab, which contains a list of current network users (Figure 160). Installation and User Guide: Airgo Access Point 221 9 Managing the Network Figure 160: Security Portal - User Management - Wireless Users To add a new user, click Add to open the Add Wireless User entry panel (Figure 161). Figure 161: Security Portal - User Management - Add Wireless User RADIUS DNS & DHCP Server Server NMS Server Client(s) Enterprise Network Access Point Access Point Access Point Enter the following information: Field Description Login Name Assign a login name for network access (required). User Group Select a user group as defined in the RADIUS server. First Name Enter the first name of the user. Last Name Enter the last name of the user. Email ID Enter the user’s email address. Description Enter a text description, if desired. Click Add to save the user record, Reset to clear the fields on the panel, or Cancel to return to the Wireless tab without saving the record. When a wireless user is added to the database a unique certificate is generated for that user. The certificate must be installed on the user’s PC. This can be done in one of two ways: 222 Installation and User Guide: Airgo Access Point Using the Security Portal Menu • Email — If an SMTP server is configured, the certificate is mailed to the user. To install the emailed certificate on the PC: a Ask the administrator for the password associated with the certificate. This password is displayed in the user details page. b Double click on the certificate obtained through email. When the certificate installation wizard asks for the password, supply the previously-obtained password. • Download — To download the certificate: a Click the Wireless Users tab to display the list of users. b Click the login name link for the user, or highlight the checkbox to the left of the Login Name, and click Details. This opens the View Wireless User panel (Figure 162). c Click the link entitled Click Here to Download Certificate. A security certificate pop-up opens with a prompt to open or save the certificate. d Save the certificate on your local computer. Figure 162: Security Portal - User Management - View Wireless User Adding Administrative Users To give designated users access to NM Portal or to the all APs in the network managed by this NM Portal, open the Admin Users tab (Figure 163). Installation and User Guide: Airgo Access Point 223 9 Managing the Network Figure 163: Security Portal - User Management - Admin Users The tab opens with a list of current administrative users. To add a new user, click Add, and enter the following information in the Add Administrative User entry panel (Figure 164): Field Description Login Name Assign a login name for network access (required). Password Enter the password and enter it again in the Confirm Password field (required). User First Name Enter the first name of the user. User Last Name Enter the last name of the user. Email ID Enter the user’s email address. Description Enter a text description. Figure 164: Security Portal - User Management - Add Administrative User After entering the requested information, click Add. From the user list, you can also delete an existing user, modify user information, or view the details in a read-only table. 224 Installation and User Guide: Airgo Access Point Using the Security Portal Menu Adding MAC-ACL Users Use the MAC-ACL tab (Figure 165) to identify and authenticate users by the MAC address of the computer rather than by login. This type of authentication is generally used to accommodate legacy equipment that does not support user-based authentication. MAC addresses are checked when the SSID has MAC-ACL enabled and Open access, static WEP keys, or WPA-PSK encryption are used. For more information on security options, see Chapter 7, “Managing Security.” Figure 165: Security Portal - User Management - MAC-ACLs The tab opens with a list of current MAC-ACL users. To add a new user, click Add and enter the following information in the Add MAC Address Based User entry panel (Figure 166): Field Description MAC Address Enter the MAC address that uniquely identifies the device. Use the tab key to move between the successive two-character fields. (required) User Group Select a group from the list or create a new group. User First Name Enter the first name of the user. User Last Name Enter the last name of the user. Email ID Enter the user’s email address. Description Enter a text description, if desired. Installation and User Guide: Airgo Access Point 225 9 Managing the Network Figure 166: Security Portal - User Management - Add MAC Address User Click Add after entering the requested information. From the user list, you can delete an existing MAC-ACL user, modify user information, or view the details in a read-only table. Managing Guest User Passwords For optional generation of guest passwords automatically at set intervals, use the Guest User tab, as explained in “Guest Access Security” on page 176. RADIUS Proxy Radius Proxy is a way of simplifying configuration for the external RADIUS authentication of wireless clients. When you bootstrap an AP as an NM Portal, RADIUS proxy is enabled automatically. All APs enrolled by this NM Portal will have Radius Proxy turned on. RADIUS proxy reduces configuration requirements at the external RADIUS server, as the server must now establish trust only with the security portal, rather than with all enrolled APs. RADIUS proxy should only be enabled or disabled from NM Portal. Do not enable RADIUS proxy on an individual AP if it is not enabled on the NM Portal. Perform changes to the RADIUS proxy configuration on the NM Portal and then distribute the changes to the other enrolled APs. NOTE: It is possible to turn off RADIUS proxy on individual APs. This may be useful for test purposes. Be aware that this setting will be overturned when a policy is pushed from the NM Portal. When RADIUS proxy is enabled, all RADIUS authentication requests from APs are routed to the NM Portal. If the NM Portal is not available, then these requests are routed to a backup security portal. When RADIUS Proxy is disabled, all APs forward their external RADIUS authentication requests directly to the configured external RADIUS server or servers. This requires that you enter configuration information on the RADIUS server or servers for each AP rather than for the NM Portal and security portals only. 226 Installation and User Guide: Airgo Access Point Using the Security Portal Menu NOTE: To guard against a single point of failure, it is recommended that you configure a backup security portal in addition to the working security portal. The RADIUS Proxy feature can reduce administrative effort in the following ways: • It is not necessary to configure each AP with knowledge of each external RADIUS server. • It is not necessary to configure the external RADIUS server with each AP as a RADIUS client. • Any normal (non-portal) AP can have its IP address changed at any time. RADIUS proxy must be enabled or disabled on a network-wide basis. If this is not done the following may result: • Loss of external auth-zone information on all APs • Loss of external auth-server information on non-security portal APs • Need to reset the SSID and admin auth-zones portal authentication zones for the network to function properly. Due to these potential effects, it is important to back up the configuration of all APs prior to enabling or disabling RADIUS proxy. See “Managing the AP Configuration” on page 245 for instructions on backing up the AP configurations. When enabling RADIUS proxy, there are specific configuration requirements for the NM Portal AP that acts as the enrollment portal, the backup security portal, and other normal (non-portal) APs. Configuration Requirements for Portal AP (running Enrollment Service) The following steps are required at NM Portal when enabling RADIUS Proxy: 1 Back up Portal AP Configuration (recommended). See “Managing the AP Configuration” on page 245. 2 Configure the external RADIUS server (external authentication servers). 3 Enable RADIUS Proxy. See “Configuring RADIUS Proxy” on page 228. 4 Generate a default Policy. See “Define Policy” on page 198 5 Distribute the default policy to all APs. See “Distribute Policy” on page 199. NOTE: When RADIUS proxy is enabled, external authentication server information must NOT be deleted. This information is used by the RADIUS proxy server to proxy RADIUS authentication requests to these external RADIUS servers. Once RADIUS proxy is in effect, all future user authentication traffic is redirected to the proxy. In order to avoid disruption in user authentication, it is strongly recommended to nominate another AP to be a backup security portal. If RADIUS proxy is turned off, it is necessary to rebind the authentication zones to the SSIDs. This can be accomplished from a restored backup configuration. Whenever the proxy state changes or the external auth server configuration changes, a new default policy must be regenerated and redistributed to all the enrolled APs. When you enable RADIUS-proxy, the auth-zone setting is hidden because there are no external auth-zones being used on this AP. The auth-servers settings shows the list of internal and external RADIUS servers. You can edit the list of external RADIUS servers used by the proxy on this portal Installation and User Guide: Airgo Access Point 227 9 Managing the Network and distribute the new list to one or more security portals if you generate a new default policy and distribute it. For more information on SSIDs, authentication zones, and authentication servers, see “Configuring Authentication Zones” on page 155. Configuration Requirements for Backup Security Portal It is highly recommended that you configure one or more backup security-portals when configuring RADIUS proxy. Each of the backup security portals must establish trust with the external RADIUS servers. The synchronization of configured external RADIUS servers from the primary SecurityPortal (usually the NM Portal AP) is automatic, and no special action is required by the user. All external RADIUS server configuration should be done on the NM Portal AP, not on the backup security portals. Configuration Requirements for Normal APs (Non-Portal APs) Configure RADIUS proxy on normal (non-portal) APs by defining a policy with RADIUS proxy and then distributing it to the normal APs. This ensures that the correct sequence of configuration changes are applied to the normal APs when RADIUS proxy is enabled or disabled. When RADIUS proxy is enabled on a normal AP, all external auth-server information is deleted. Security is enhanced because the number of global secrets (such as Shared Secret between external RADIUS server and the AP) maintained on the normal APs is reduced. In addition, all SSID security is bound to the portal auth-zone (which is a list of security-portals in the network), permitting normal APs to redirect wireless authentication to security portal APs that take on the role of sending a proxy request to external RADIUS servers. Similar redirection occurs with administrator logins. To disable RADIUS-proxy on the normal AP, you must go back to the NM Portal AP, disable RADIUS proxy, and redistribute the policy to all APs across the network. When RADIUS-proxy is disabled, then a policy push from the NM Portal AP to the normal APs restores the external RADIUS server configuration along with the corresponding shared secrets. Configuring RADIUS Proxy Use the RADIUS Proxy panel (Figure 167) in the AP web interface to enable the RADIUS proxy feature. For the full set of steps required to configure RADIUS proxy, see “Configuration Requirements for Portal AP (running Enrollment Service)” on page 227. NOTE: It is highly recommended that you make the decision to use RADIUS proxy when first configuring the network, in order to make the configuration seamless and less error prone. The RADIUS proxy setting should be made part of the default NM Portal or NMS Pro policy prior to enrolling other APs. This ensures that all subsequently configured APs inherit the correct proxy settings when they are enrolled. 228 Installation and User Guide: Airgo Access Point Using the Mobility Services Menu Figure 167: RADIUS Proxy Configure the following setting on this panel: Item Description Enable RADIUS Proxy Server Select the checkbox to enable the RADIUS Proxy server feature, and click Apply. NOTE: When RADIUS proxy is enabled, the authentication zone configuration is deleted. When APs are enrolled into the network, the configuration policy is distributed to the AP. If RADIUS proxy is turned off, then the authentication zone configuration must be re-added to the NM Portal and the default policy must be re-generated and distributed to the managed network to enable authentication services via an external RADIUS server. Moreover, the external RADIUS server must be re-configured to accept the individual APs as RADIUS clients. Using the Mobility Services Menu The Layer-3 Mobility feature provides seamless roaming for wireless clients in a wireless network in which there are multiple subnets in proximity to each other. An example of a network that requires seamless IP roaming is a multi-story building in which each floor is on a different subnet and wireless clients need to roam between floors without losing connectivity. In contrast to Layer-3 roaming, Layer-2 roaming occurs by default when a wireless client roams between APs on the same subnet. Layer-2 roaming is automatically seamless if IAPP is configured in the network (see “Configuring Inter Access Point Protocol (IAPP)” on page 95). Across subnets, Layer-3 mobility is required to avoid the disruption of forced disassociation and reassociation as a client moves across subnet boundaries. With the Layer-3 Mobility feature, wireless clients move across subnets without a required IP address change, and application sessions (UPD, TCP, or HTTP) are uninterrupted. Layer-3 Mobility is particularly useful in providing Wi-Fi VoIP services. For example, if a Wi-Fi VoIP phone must change its IP address during a conversation, the call is usually dropped. By Installation and User Guide: Airgo Access Point 229 9 Managing the Network enabling retention of the same IP address, clients can continue their conversations without interruption. Layer-3 Mobility requires wireless client reauthentication, and delays can occur for some authentication methods. For example, if the clients use WPA-EAP for authentication, then Layer-3 roaming still requires clients to be reauthenticated by an external RADIUS server. Delays can occur while authentication messages are exchanged between the AP and the RADIUS server. However, if WPA-PSK or WEP methods are used for authentication, the client will be reauthenticated on the new AP to which it has roamed, thereby avoiding the latency introduced by the external RADIUS server. When creating a Layer-3 Mobility zone, all APs should be managed by the same management domain (NMS Pro or NM Portal). There are two methods of configuring Layer-3 Mobility: • Layer-3 Mobility Using VLANs (See “Layer-3 Mobility Using VLANs”) • Layer-3 Mobility Using Tunneling (See “Layer-3 Mobility Using Tunneling”) Layer-3 Mobility Using VLANs This approach requires the use of VLANs to enable seamless Layer-3 Mobility. It is suitable for small networks with a number of subnetworks because traffic from all subnetworks is bridged by the APs in separate VLANs. Client stations roaming between APs are kept within the same VLAN and, hence, remain in a single subnet. Layer-3 mobility is supported with interface VLANs and user VLANs (Figure 168). 230 Installation and User Guide: Airgo Access Point Using the Mobility Services Menu Figure 168: Layer-3 Roaming Using VLANs RADIUS Server (EAP-TLS or EAP-PEAP) DHCP Server (Serving both IP subnets) User-Dir NOC Example: Cisco 3600 Router/Switch IP Routerw/DHCP Relay Agent Corp Network CORP-VLAN 192.168.88.0/24 MGMT-VLAN 192.168.90.0/24 Admin Network VLAN Switch CORP-VLAN MGMT-VLAN CORP-VLAN CORP-VLAN STA2: 192.168.90.200/24 STA2: 192.168.90.200/24 L3 Roaming L3 Roaming STA1: 192.168.88.100/24 STA1: 192.168.88.100/24 A0060 Layer-3 Mobility Using Tunneling To use the tunneling approach for Layer-3 Mobility, it is necessary to have a network with multiple subnets in wireless proximity. When a client in a subnet moves to another subnet, a handshake takes place and a tunnel is created between the two APs (Figure 169). Installation and User Guide: Airgo Access Point 231 9 Managing the Network Figure 169: Layer-3 Mobility - Tunnel Approach WNI NMS AAA Internet Enhanced IAPP • Secure Handoff • Fast Handoff • Lookup Corporate Network Update Frame Tunnel Management 10.1.1.5 10.1.1.x 10.1.1.5 10.1.2.x A0057 The tunneling approach uses mobility agents (MAs) and mobility sub-agents (MSAs). Each MA configures a tunnel to every other MA in the network, thereby creating a fully meshed tunneled infrastructure to carry Layer-3 Mobility traffic between these subnetworks. There can only be one MA per subnet, and it is highly recommended that the AP you designate as MA be directly connected to the wired network (not a wireless-backhaul AP). All other APs in the subnetwork automatically assume the role of an MSA and forward their Layer-3 Mobility traffic to the MA in the same subnet. The MSAs do not need to be configured; they automatically bind to the MA, and it is the MA’s job to periodically advertise itself to all APs on the subnet (See Figure 170). NOTE: If the MA is in the process of booting when a client station is already associated with the MSA, then the station cannot roam successfully on its first attempt. Subsequent roaming attempts should succeed. 232 Installation and User Guide: Airgo Access Point Using the Mobility Services Menu Figure 170: Layer-3 Mobility - Mobility Agents and Sub-Agents MA MA L3-Mobility Tunnel MSA MSA MSA MSA MSA IP Subnet-X IP Subnet-Z MA MSA MSA MSA IP Subnet-Y A0061 The wired network AP that is selected as an MA must be attached to one of the following: • Ethernet switch that supports jumbo frames (>1518 bytes). The switches must pass through tagged VLAN packets. • VLAN enabled Ethernet switch that supports switching of VLAN tagged frames. Such VLAN switches do require configuration to support Layer-3 Mobility. The following restrictions apply to Layer-3 Mobility using tunneling: • Redundancy: There can be only one AP per subnet designated as the MA. If the designated MA is not operational, it is necessary to manually configure another MA. • Maximum number of IP subnets: Layer-3 mobility can be configured with a maximum of 16 subnets. • Management: All APs involved in a Layer-3 mobility configuration must be managed by the same network management solution (NM Portal or NMS Pro). • SSID: All the APs in a Layer-3 mobility configuration must be configured with the same SSID. Mobility Configuration Tab Use the Mobility Configuration tab (Figure 171) to enable mobility support and add mobility agents. Installation and User Guide: Airgo Access Point 233 9 Managing the Network Figure 171: Mobility Configuration This tab contains the following information and settings: Item Description Enable L3 Mobility (Tunneling) Choose Yes to activate the L3 mobility capability, and click Apply. Click Reset to return to the previously saved value. Select Mobility Agent (Wired AP) Select an AP and click Add to enroll the AP as a mobility agent. NOTE: Only one AP in a subnet can be designated as a Mobility Agent. Mobility Agent Table View the list of currently assigned mobility agents. To delete an agent: • Choose the entry and click Delete. Click OK to confirm. To delete all currently assigned agents: • Click Delete All. Click OK to confirm. 234 Installation and User Guide: Airgo Access Point Using the Mobility Services Menu Roaming Stations Tab When client stations roam across subnets, the MA and the MSAs in the subnet track their movement. The Roaming Stations tab (Figure 172) shows the set of stations that have roamed to the selected subnet. Figure 172: Mobility Configuration - Roaming Stations The table on this panel contains information for the subnet or subnets indicated by the Mobility Agent (or all Mobility Agents) selected from the pull-down list. The table lists the following information for each client station: Item Description Home IP Subnet Subnet in which the client was originally associated Roamed IP Subnet Subnet to which the client has roamed MA IP Address IP address of the MA or MSA to which this station is associated AP Interface Radio interface at the MA or MSA to which the station is associated STA MAC Address Client’s MAC Address STA Assoc Duration Length of time in the client has been associated with the MA or MSA Roaming Statistics Tab The Roaming Statistics tab (Figure 173) displays roaming activity for each MA. Installation and User Guide: Airgo Access Point 235 9 Managing the Network Figure 173: Mobility Configuration - Roaming Statistics The table on this panel contains information for the subnet or subnets indicated by the Mobility Agent (or all Mobility Agents) selected from the pull-down list. Each row lists the following information for a client station: Item Description MA Status Indication of whether the MA is reachable or not (if not reachable, then stations that roamed to that subnet are able to tunnel traffic out of that subnet) IP Subnet Subnet for which the statistics are being displayed MA IP Address IP address of the MA in that subnet MA Uptime Amount of time the MA has been powered up and operational (Days: Hours: Minutes: Seconds) STAs Roamed In Sum of the number of stations that have roamed into this subnet as reported by the MA and MSAs combined STAs Roamed Out Sum of the number of stations that have roamed out of this subnet to other subnets as reported by the MA and MSAs in this subnet Tunneling Statistics Tab The Tunnel Statistics tab (Figure 174) shows the packet, byte, and error statistics collected at each MA tunnel for each subnet. 236 Installation and User Guide: Airgo Access Point Using the Mobility Services Menu Figure 174: Mobility Configuration - Tunnel Statistics The following information is presented for each Mobility Agent selected from the pull-down list: Item Description MA IP Address IP address of the selected mobility agent Tunnel Local Subnet Subnet address of the tunnel endpoint terminating on the selected Mobility Agent Tunnel Remote Subnet Subnet address of the tunnel endpoint terminating on a remote Mobility Agent Tunnel Interface Name of the tunnel connecting the remote and local subnets on the selected Mobility Agent Received Bytes Number of bytes received by the tunnel interface on the selected Mobility Agent Received Pkts Number of packets received by the tunnel interface on the selected Mobility Agent Transmit Pkts Number of packets transmitted by the tunnel interface on the selected Mobility Agent Transmit Bytes Number of bytes transmitted through the tunnel interface on the selected Mobility Agent Received Multicast Number of multicast packets received through the tunnel interface on the selected MA Installation and User Guide: Airgo Access Point 237 9 Managing the Network 238 Item (continued) Description Received Error Packets Packets with errors received through the tunnel interface on the selected MA Received Drop Packets Number of received packets dropped by the tunnel interface Misaligned Packets Always equal to 0 FIFO Errors Always equal to 0 Transmit Error Packets Number of packets dropped due to inability to find the route Transmit Drop Packets Number of packets dropped by the tunnel interface upon transmission due to system congestion Installation and User Guide: Airgo Access Point 10 Maintaining the Access Point A variety of tools are available to maintain the Airgo Access Point. This chapter describes the tools in the following sections: • • • • • • Rebooting the AP Saving the AP Configuration Managing the System Configuration Managing the AP Configuration Upgrading Software Common Problems and Solutions Rebooting the AP Choose Save & Reboot AP from the System Services menu to open the Reboot Configuration panel. To begin the process, click Reboot (Figure 177). The process takes approximately two minutes, and may take additional time if the AP is currently used for wireless backhaul service. Figure 175: System Configuration - Reboot AP Saving the AP Configuration Choose Save & Reboot AP from the System Services menu, and then click Save Config to open the Save Configuration tab (Figure 177). To save the current AP configuration, click Save Configuration. To enable global save, click Apply. Installation and User Guide: Airgo Access Point 239 10 Maintaining the Access Point Figure 176: System Configuration - Reboot AP Managing the System Configuration Choose System Configuration from the System Services menu to access the network-related configuration features of the Airgo AP and set up syslog parameters. The panel includes the following tabs: • • • • IP Configuration — Configure IP and host settings. Syslog Configuration — Set up and view the syslog. License Management — Configure additional licenses on the AP. NMS Configuration — Specify the entities used for network management, including the NMS Pro server and NM Portal AP. • Hardware Options — Enable the real-time clock and buzzer. IP Configuration Use the IP Configuration tab (Figure 177) to update the IP and basic system configuration for the Airgo AP. 240 Installation and User Guide: Airgo Access Point Managing the System Configuration Figure 177: System Configuration - IP Configuration The tab is divided into two sections. Click Apply after configuring each section, or Reset to return to the default values. Configure the following fields: Field Description DHCP Assigned IP Address Enables the AP to obtain an IP address for the AP from the network DHCP server. DNS IP Address Enter the IP address of the DNS server. (required) Management IP address /Maskbits Enter the IP address and subnet prefix of the management server. (required) Gateway IP address Enter the IP address of the network gateway. (required) Host Name Enter a unique name for the AP. The default is the device ID, which is derived from the MAC address. (required) AP Location Enter a text description of the physical location of the AP. Administrator Contact Enter the contact information for the administrator. Syslog Configuration Syslog tracks and records information about network activities for later viewing and analysis. CAUTION: Only an authorized administrator should change syslog levels or enable or disable syslog capabilities. Arbitrary changes to syslog can adversely affect the AP. Installation and User Guide: Airgo Access Point 241 10 Maintaining the Access Point The top area of the Syslog panel (Figure 178) provides controls to set the logging level and scope for a variety of functional areas or modules. Figure 178: 242 System Configuration - Syslog Configuration Installation and User Guide: Airgo Access Point Managing the System Configuration The tab contains the following settings: Field Description Syslog Level Select the activity level that triggers a syslog entry. Choose from several levels (Emergency, Alert, Critical, Error, Warning, Notice, Info, or Debug). (required) Syslog-Level Module Select whether to record a specific type of activity, or include all the activities in the list. (required) Remote Syslog Logging Indicate whether to enable a remote server to monitor events across the network. Remote Syslog Server If the Syslog server is enabled, enter the remote server hostname or IP address. Remote Syslog Server Port If the Syslog server is enabled, enter the IP address or hostname of the server port. (optional) License Management Use the License Management tab (Figure 179) if it is necessary to change the license key for the AP. Enter or verify the license key for the AP, and click Apply. Click Reset to clear the field. Figure 179: System Configuration - License Management NMS Configuration Use the NMS Configuration tab (Figure 180) to identify network management servers and to determine which network management system will receive fault and event notifications. NOTE: If the AP is already enrolled, it is not necessary to modify the settings on this panel. However, adding IP address does not automatically allow NM Portal or NMS to manage the AP. The AP must be enrolled to be managed. Installation and User Guide: Airgo Access Point 243 10 Maintaining the Access Point Figure 180: System Configuration - NMS Configuration Enter the following values to set the NMS configuration: Field Description Primary Manager IP Address Enter the IP address of the NMS server responsible for managing the AP. Auxiliary Manager IP Address If applicable, enter the IP address of the NM Portal AP used to manage the AP at the branch location (in conjunction with an NMS Pro server as a primary manager. Click Apply to save the entries or Reset to return to the previously saved values. Hardware Options Select HW Options (Figure 181) to set the buzzer and the real-time clock (RTC), which keeps track of the date and time in the event that the AP loses power. This feature is not required if the AP is always connected to the Internet. 244 Installation and User Guide: Airgo Access Point Managing the AP Configuration Figure 181: System Configuration - Hardware Options Select the following parameters on this tab Field Description Enable Real Time Clock Use the real-time clock (RTC). Enable Buzzer Activate the AP buzzer to locate the AP, if necessary. Click Apply to save the entries or Reset to return to the previously saved values. Managing the AP Configuration Choose Configuration Management from the System Services menu to open the Configuration Management feature panel. The panel contains the following tabs: • Secure Backup — Use https to perform a secure backup of the AP configuration. • Configuration Backup — Back up and restore configurations, export log files, and reset the AP configuration to the factory defaults. • Configuration Reports — View configuration reports for the AP. • Reset Configuration — Revert to the factory default configuration, or reset specific subsystems to default configuration. Secure Backup Perform the following functions on the Secure Backup tab (Figure 185): Task Steps Back up the AP configuration using https 1 Click Save Configuration. 2 When the configuration is generated, a hyperlink is displayed. Right-click and select Save As to save the configuration locally. 3 After the configuration file is saved, click Delete to remove the file from the AP. The file takes up space in AP persistent storage, so it is recommended that you remove it. Installation and User Guide: Airgo Access Point 245 10 Maintaining the Access Point Task Steps Restore the AP configuration 1 In the Restore Configuration area, click Browse and select the configuration file. 2 Click Apply to restore the configuration and reboot the AP. NOTE: If the AP has been unenrolled or restored to factory defaults, it is not possible to reapply the configuration using this method. The AP must be reenrolled and have a new configuration created. Generate support logs 1 Click Generate Support Logs. 2 When the configuration is generated, a hyperlink is displayed. Right-click and select Save As to save the configuration locally. 3 After the support logs file is saved, click Delete to remove the file from the AP. The file takes up space in AP persistent storage, so it is recommended that you remove it. Figure 182: Configuration Management - Secure Backup Secure Backups with NM Portal Each NM Portal contains network and security databases in its persistent storage that should be backed up periodically. Note that the Secure Backup function backs up only the configuration file of the AP, whereas the secure backup capability in the NM Portal Network Management explorer allows you to back up the security databases along with the configuration of the AP. 246 Installation and User Guide: Airgo Access Point Managing the AP Configuration If an NM Portal AP must be reset to factory defaults on a network with existing enrolled APs, follow these steps to restore the Portal AP: Condition Action A backup of the NM Portal AP exists and the AP is functional After resetting the Portal AP to factory defaults, bootstrap the AP as the NM Portal. Make sure the AP is assigned the same IP address it had originally. Restore the NM Portal Backup to the same AP. This should restore the portal to its configured state. A backup of the NM Portal AP exists but the AP is not functional Use a functioning AP that has been reset to factory defaults and make sure that this AP obtains the same IP address as the original NM Portal AP. Bootstrap this AP as NM Portal and restore the portal backup. This should produce a portal in the original configured state. A backup of the NM Portal AP does not exist 1 Use an AP that is functional. 2 Reset it to factory-defaults. 3 Bootstrap it as a Portal AP. 4 Reconfigure the Portal AP to the desired settings. 5 Generate the Default Policy. 6 Reset all other enrolled APs to factory defaults and re-enroll them in the Portal AP. This would ensure that all re-enrolled APs obtain the same default policy. Configuration Reports Select any of the following configuration reports on this tab (Figure 183): Report Description startup-config Provides details on the configuration that is stored on the AP flash device and used each time the AP reboots. running-config Provides details on the current AP configuration, which may or may not match the startup configuration. default-config Lists the factory default settings shipped on the AP. Click Refresh to update the selected report Installation and User Guide: Airgo Access Point 247 10 Maintaining the Access Point Figure 183: 248 Configuration Management - Configuration Reports Installation and User Guide: Airgo Access Point Managing the AP Configuration Reset Configuration Use the Reset Configuration tab to reset the AP configuration or revert to the defaults for individual subsystems (Figure 184). Figure 184: Configuration Management - Reset Configuration Installation and User Guide: Airgo Access Point 249 10 Maintaining the Access Point Perform the following functions on this tab: Function Description Reset Configuration to Default 1 Click Reset to Default or Reset to Factory Defaults. 2 Click Apply to reboot the AP with the selected configuration. Reset Subsystems to Defaults 1 Select one or more individual subsystems to reset. 2 Click Apply to reboot the AP with the selected defaults. Click Reset to clear the selections on the tab. TFTP Backup Use the TFTP Backup tab (Figure 185) to back up and restore configurations on an external TFTP server. Perform the following functions on this tab: Task Steps Save configuration 1 Indicate whether to save the AP configuration each time a Save operation is done. 2 Click Apply. Click Save Configuration to save the current settings on demand. Back up the configuration to a TFTP server 1 Enter the IP address of the TFTP server. 2 Enter or confirm the configuration file name. 3 Click Apply to restore the configuration and reboot the AP. NOTE: If the AP has been restored to factory defaults, it is not possible to reapply the configuration using this method. The AP must be reenrolled and a new configuration created. Restore the configuration 1 Enter the IP address of the TFTP server. 2 Enter or confirm the name of the configuration file. 3 Click Apply. Export support logs 1 Enter the IP address of the TFTP server. 2 Enter or confirm the name of the log file. 3 Click Apply. The Reset buttons on the panel clear the field entries in the associated section. NOTE: When you use a TFTP-based software download or restore backed-up configuration, use caution to select the correct file. If a very large file is chosen for download, then the TFTP client on the AP may consume all available free memory. If the correct file is chosen, AP performs a consistency check prior to consuming the file and saving it in the AP. 250 Installation and User Guide: Airgo Access Point Upgrading Software Figure 185: Configuration Management - TFTP Backup Upgrading Software From the NM Portal web interface, you can upgrade the software on enrolled APs throughout the network in one operation. You can also upgrade any individual, non-portal AP from the AP web interface. The same interface is used for both situations; however, access to the interface is different for an NM Portal than for a non-portal AP. • If the AP is an NM Portal, click Manage Wireless Network to open the NM Portal interface, and then choose Admin Tools > Software Upgrade to open the Software Upgrade panel (Figure 186). • If the AP is a non-portal AP, choose Admin Tools > Software Upgrade to open the Software Upgrade panel. NOTE: The AP license file is not affected by software upgrades. The existing software license remains valid after the AP software is upgraded. Installation and User Guide: Airgo Access Point 251 10 Maintaining the Access Point Figure 186: Software Upgrade The Software Upgrade panel offers two upgrade options. The Software Image Upgrade option uses https to download the software image to the AP. The Software Download via TFTP option uses TFTP to download the software image. Select only one of these options; it is not possible to use both methods at the same time. The software upgrade process for an NM Portal consists of the following three steps: Step Description Staging The software image is downloaded to the Airgo AP. Selection APs are selected for software upgrade. Distribution The software upgrade image is distributed to the selected APs and installed. The AP is then rebooted. If you are upgrading a non-portal AP or using TFTP as the download method, then the staging, selection, and distribution steps happen as a single process that cannot be interrupted once it begins. If you use the Software Image Upgrade selection in NM Portal, then staging, selection, and distribution are separate steps that can be monitored and canceled if needed. Software Image File The AP software image file conforms to a specific format that uses the filename extension.img. During download, the filename extension and structure are verified and the download is stopped if a problem with the file is detected. Upgrading the AP Software This section provides information for upgrading AP software using both the TFTP and https software download options. It is important to perform software upgrades during a scheduled maintenance window. Upgrading takes approximately four to five minutes per AP, and upgrading multiple APs from an NM Portal is a serial process. To manage system resources during a software 252 Installation and User Guide: Airgo Access Point Upgrading Software upgrade, the AP shuts down some services (such as CLI sessions) to create temporary memory and to validate the image prior to writing to AP's flash. NOTE: When you distribute software from NM Portal to enrolled APs, the software distribution retries three times on each of the APs selected. Some management services on the NM Portal AP are shut down to make room for the new image distribution. The NM Portal AP runs through entire list of selected APs before it restarts management services. Therefore, it is best to perform software distribution when it is least disruptive to the network. Each AP upgrade can take up to two to three minutes. Since NM Portal restarts services only after distribution is complete, you must explicit reboot the NM Portal if software distribution is interrupted. CAUTION: Do not leave the Software Upgrade panel while download is taking place. If you click on another menu item during download, the download process is canceled. Upgrade Using https Download - Individual Non-Portal AP To upgrade a non-portal AP using https download: 1 Choose Admin Tools > Software Upgrade. 2 Browse to select the .img software image file. 3 Click Download. A confirmation dialog appears asking you to confirm the software download. 4 Click OK. The software image is downloaded to the AP, the AP software image is upgraded, and the AP is automatically rebooted. Upgrade and Distribution Using https Download - NM Portal AP To upgrade APs from NM Portal using https download: 1 Choose Admin Tools > Software Upgrade. 2 Browse to select the .img software image file. 3 Click Download. A confirmation dialog asks you to confirm the software download. 4 Click OK. The system verifies the filename extension and header information. When successful, the Software Download Status panel opens (Figure 187). Staging is now complete. 5 Select the APs to receive the upgrade. 6 Click Distribute. A confirmation dialog asks you to confirm that the upgrade should now begin. 7 Click OK. Installation and User Guide: Airgo Access Point 253 10 Maintaining the Access Point Figure 187: Software Upgrade - Download Status The software distribution process begins by sending the software to the first selected AP. As soon as this AP receives the software, it upgrades its image and reboots automatically. The process then moves to the next selected AP. After all the APs have been upgraded, the NM Portal AP is upgraded and rebooted. The administrator must again log in to the NM Portal web interface after an upgrade and reboot. Upgrade Using TFTP Download To upgrade an NM Portal or non-portal AP using TFTP download: 1 Choose Software Upgrade from the Admin Tools menu. 2 Enter the IP address of the TFTP server. 3 Enter the name of the image file on the TFTP server. The default file is target.ppc.ani.img, under the boot directory of the TFTP server. Relative paths can be used when specifying the file name. 4 Click Apply. A pop-up message asks for confirmation that you want the upgrade to begin. 5 Click OK. The download process begins. Every 10 seconds the screen is updated with new status information. If the download is successful, the AP is automatically rebooted with the new software image. If the download is unsuccessful, an explanatory message is displayed in the Download Status column. 254 Installation and User Guide: Airgo Access Point Upgrading Software Canceling a Distribution To cancel software distribution at any time, you must click Cancel All. This cancels distribution to APs that have not yet been upgraded, restarts services that were shut down during the upgrade, and removes the image file from the AP RAM. Cancellation is performed serially for multiple AP distributions. Canceling during distribution does not damage the APs. If the distribution on a remote AP is cancelled, the AP will be automatically rebooted. You can cancel distribution to an individual AP at any time except when the status is Updating Flash … Error, or Done (Rebooting). If you leave the Software Upgrade panel before the distribution is complete without clicking the Cancel All, software distribution continues in the background, but it is not possible to return to the Distribution Status page. Download Status During distribution, the Download State column displays the current status of the distribution process (see Figure 187). Status information is automatically updated every 10 seconds. The status information shows clearly the stage of the distribution process and identifies any problems. Table 17 lists the possible status values and their meaning. Status Explanation Not scheduled This AP has not been scheduled to receive a software update. Scheduled The update has been ordered for this AP, but has not yet begun. Canceling A request has been made to cancel the distribution; however, the request is not complete. For example, this message is displayed if a request has been made to cancel distribution to an AP waiting its turn in the distribution list. Canceled Distribution to the AP is canceled. AP Unreachable The enrolled AP is not reachable for distribution. Retrying 1, Retrying 2 If communication with the AP is lost during distribution, the process waits for two minutes and then retries the distribution. Three retries are attempted before the process stops and an error message is presented. Retrying 1 and Retrying 2 status represent the first and second retries. Retries may occur, for example, during upgrade of backhaul APs, if the radio signal is temporarily lost and retrunking is required. There is a timeout of two minutes between retries. With a total of three retries, it can take up to 10 minutes before a distribution on an AP is deemed to be in error. The message changes to In Progress .. (XX %) when the retry actually starts. In Progress .. (XX %) Upgrade is underway on the AP and is XX% complete. Error All retries have finished and the AP could not be upgraded due to some internal error. Unknown An unknown error has occurred. Image Integrity Error The image has passed the compatibility test but failed the integrity check after the distribution, but before the flash update. Updating Flashing ... Image distribution is complete and it is being saved onto the AP's persistent storage. Installation and User Guide: Airgo Access Point 255 10 Maintaining the Access Point Status Explanation Done. Rebooting The flashing is complete and the AP is rebooting. When the distribution is complete, the message Software Distribution is Complete is displayed, regardless of whether the distribution was successful. If a portal AP is not included in the download, all services are restarted automatically after the distribution. Image Recovery During the upgrade process, care is taken to validate the image integrity and compatibility with AP hardware. If a new image is successfully upgraded but fails to initialize during subsequent reboot, AP automatically performs a “safe” boot from the backup partition. Common Problems and Solutions Table 17 lists common problems that can occur along with recommended solutions. Table 17: Common Problems and Solutions Symptom Problem Solution AP power and Ethernet Link LEDs are off Power is off or unconnected Check the power connection to make sure it is plugged in. Also check the power outlet. If necessary, plug some other appliance into the outlet to verify power. AP power LED is on, but the Ethernet Link LED is off Ethernet cable is unconnected or unable to access the LAN Check the Ethernet cable connection between the AP and network port. Make sure to use a regular CAT-5 standard Ethernet cable, and not a crossover cable (usually used for uplinks between switches and routers). If in doubt, swap the cable for a known, working cable. If the port is non-functional, it may be necessary to use another working network port. Unable to configure the Access Point through the web browser interface Computer is unable to reach the Access Point over the local area network (LAN) Check to make sure the AP power LED is on. Check the Ethernet cable connections to both the computer and to the AP. Make sure the network adapter in the computer is working properly. Check to see whether the IP address is on the same subnet as the AP. Make sure you are accessing the AP using https:// and not http://. 256 Installation and User Guide: Airgo Access Point Common Problems and Solutions Table 17: Common Problems and Solutions (continued) Symptom Problem Solution Poor or lower than expected signal strength, as measured by wireless network adapters attempting to connect to the AP The AP may be poorly placed, or external antenna may not be connected properly. The AP and/or its external antenna should not be in an obstructed location. Metallic objects (such as equipment racks) and some construction materials can block wireless signals. If this is the case, reposition the Access Point(s) and/or any external antennae to be free of these obstructions. If using an external antenna, also make sure it is connected securely to the AP. Installation and User Guide: Airgo Access Point 257
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Modify Date : 2005:02:06 10:44:04-08:00 Create Date : 2005:02:06 10:43:16-08:00 Title : Airgo Access Point Installation and Configuration Guide Author : Airgo Networks Creator : FrameMaker 6.0 Producer : Acrobat Distiller 4.05 for Windows Page Count : 90 Mod Date : 2005:02:06 10:44:04-08:00 Creation Date : 2005:02:06 10:43:16-08:00 Metadata Date : 2005:02:06 10:44:04-08:00EXIF Metadata provided by EXIF.tools