Chantry Networks BP200E ACCESS POINT WITH WLAN AND UNII User Manual Chantry Networks Inc BeaconWorks User Guide

Chantry Networks Inc. (a Siemens Company) ACCESS POINT WITH WLAN AND UNII Chantry Networks Inc BeaconWorks User Guide

USERS MANUAL 1

Chantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 1 of 134ChantryBeaconWorks User GuideChantry’s next generation of wireless networking devicesprovide a truly scalable WLAN solution. Chantry’sBeaconPoints are thin access points that are controlledthrough a sophisticated network device, the BeaconMaster.This solution provides the security and manageabilityrequired by enterprises and service providers alike.BeaconMasterBeaconPoint BeaconWorks Release 2.0
BeaconWorks User Guide – In this documentChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 2 of 134In this document The Chantry BeaconWorks Solution.................................................................. 4What is the Chantry BeaconWorks System? ............................................... 4Conventional Wireless LANS ....................................................................... 4The Chantry BeaconWorks Solution ............................................................ 5BeaconWorks and Your Enterprise Network ..................................................... 8Network traffic flow in the BeaconWorks System......................................... 8Network security ........................................................................................... 9Interaction with Wired Networks: Virtual Network Services........................ 10Static Routing and Routing Protocols......................................................... 10Policy: Packet Filtering ............................................................................... 10Mobility and Roaming ................................................................................. 11Availability................................................................................................... 11BeaconWorks Release 2.0 Features: Overview.............................................. 12Backwards compatibility with Release 1.1 on the BeaconPoint............ 12Backwards compatibility with Release 1.1 on the BeaconMaster......... 12Multi-SSID: BeaconPoint radios on more than one VNS ...................... 12Privacy using Wi-Fi Protected Access (WPA)....................................... 13BeaconPoint software: Dual image capability ....................................... 13BeaconPoint software: Dynamic reconfiguration (without reboot) ........ 13BeaconPoint Statistics........................................................................... 13Event reporting using Syslog................................................................. 13Capacity for Redundant RADIUS servers ............................................. 14Detection of Rogue APs ........................................................................ 14Quality of Service (QoS) on a VNS: Spectralink Voice Protocol (SVP) 14BeaconPoint static configuration: Branch Office, Phase 1.................... 14BeaconMaster: Startup .................................................................................... 15BeaconMaster Features and Installation .................................................... 15First-Time Setup of BeaconMaster............................................................. 16Management Port First-Time Set Up..................................................... 16The Graphical User Interface (GUI): Overview........................................... 20BeaconWorks Configuration Steps: Overview................................................. 22BeaconWorks Configuration: Data Port and Routing Setup............................ 23Setting Up the Data Ports........................................................................... 23Port Type or Function ............................................................................ 24Port-Level Filtering of Unauthorized Traffic........................................... 25Setting up Static Routes ............................................................................. 26Setting up OSPF Routing ........................................................................... 27BeaconPoint: Startup ....................................................................................... 30BeaconPoint (BP200) Features.................................................................. 30Installing the BeaconPoints ........................................................................ 32BeaconPoint: Registering ........................................................................... 33Setting Parameters for BeaconPoint Registration................................. 33Discovery and Registration: The DHCP and SLP Solution ................... 34The BeaconPoint’s Discovery Process and LED Sequence ................. 35BeaconPoint: Configuring Properties and Radios ...................................... 36BeaconPoint: Adding Manually ............................................................. 40BeaconPoint Radios on a VNS ............................................................. 41BeaconPoint Static Configuration: Branch Office Deployment ............. 41Virtual Network Services (VNS): Overview...................................................... 43What is a VNS? .......................................................................................... 44Topology of a VNS: Overview .................................................................... 44Multi-SSID: BeaconPoint radios on more than one VNS ...................... 45Other network parameters for the VNS topology .................................. 45Network Assignment and Authentication for a VNS ................................... 45RADIUS Server: Location and Redundancy ......................................... 46Filtering for a VNS: How it works................................................................ 46Privacy on a VNS: Overview of WEP and WPA......................................... 47Setting up a new VNS................................................................................. 48
BeaconWorks User Guide – In this documentChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 3 of 134Virtual Network Configuration: A VNS for Captive Portal ................................ 50Topology for a VNS for Captive Portal ....................................................... 50Authentication for a VNS for Captive Portal ............................................... 53Filtering Rules for a VNS for Captive Portal ............................................... 57The Non-Authenticated Filter ................................................................ 57Privacy using WEP for a VNS for Captive Portal ....................................... 59Virtual Network Configuration: A VNS with No Authentication ........................ 61Virtual Network Configuration: A VNS for Voice Traffic (QoS with SVP) ........ 62Voice Data Traffic on a Wireless Network: Overview................................. 62Setting up a VNS for Voice Traffic.............................................................. 62Virtual Network Configuration: A VNS for AAA................................................ 65Topology for a VNS for AAA....................................................................... 65Authentication for a VNS for AAA............................................................... 68VNS Topology for an AAA group........................................................... 71Filtering Rules for a Filter ID group............................................................. 72Filtering Rules for a Default Filter ............................................................... 74Filtering Rules for an AAA Group VNS.................................................. 75Filtering Rules between two wireless devices ....................................... 76Privacy for a VNS for AAA.......................................................................... 76Privacy for a VNS for AAA: WEP .......................................................... 76Privacy for a VNS for AAA: Wi-Fi Protected Access (WPA) ................. 77BeaconMaster Configuration: Availability ........................................................ 80BeaconMaster Configuration: Mobility and the VN Manager........................... 85BeaconMaster Configuration: Management Users.......................................... 88BeaconMaster Configuration: Network Time................................................... 89Setting up Third-Party Access Points .............................................................. 90BeaconKeeper Mitigator: Detecting Rogue Access Points.............................. 93BeaconKeeper Mitigator: Overview....................................................... 93BeaconKeeper Mitigator: Enabling the Analysis and RFDC Engines ... 94BeaconKeeper Mitigator: Running Scans ............................................. 95BeaconKeeper Mitigator: How the Analysis Engine works ................... 97BeaconKeeper Mitigator: Viewing the Scanner Status Report ........... 100Ongoing Operation: BeaconPoint Maintenance – Software .......................... 101BeaconPoint software: Dynamic reconfiguration (without reboot) ...... 101BeaconPoint software: Dual image backup ........................................ 101Ongoing Operation: BeaconPoint Access Approval ...................................... 104Ongoing Operation: BeaconPoint Disassociate a Client ............................... 105Ongoing Operation: BeaconMaster System Maintenance ............................ 106Event Messages relayed to a Syslog server ....................................... 107Ongoing Operation: BeaconWorks Logs and Traces .................................... 109Logs and Alarms.................................................................................. 109Traces.................................................................................................. 111Audits................................................................................................... 111Ongoing Operation: BeaconWorks Reports and Displays............................. 112View Displays ........................................................................................... 112View Statistics for BeaconPoints .............................................................. 113View Reports ............................................................................................ 114BeaconMaster Configuration: Setting up SNMP ........................................... 115Appendix 1: BeaconWorks System States and LEDs ................................... 118Appendix 2: Glossary of Terms and Acronyms ............................................. 120Appendix 3: Index of Procedures, Screens and Figures ............................... 131
BeaconWorks User Guide – The Chantry BeaconWorks SolutionChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 4 of 134The Chantry BeaconWorks SolutionThe BeaconWorks system is a highly scalable wireless local area network (WLAN)solution developed by Chantry Networks Inc. Based on a third generation WLANtopology, the BeaconWorks system makes wireless practical for medium and large-scale enterprises and for service providers.The BeaconWorks system provides a secure, highly scalable, cost-effective solutionbased on the IEEE 802.11standard. The solution is intended for enterprise networksoperating on many floors in more than one building, as well as in public environmentssuch as airports and convention centers that require more than two access points.This section provides an overview of the fundamental principles of the ChantryBeaconWorks system: what it is, how it works, and its advantages.What is the Chantry BeaconWorks System?The BeaconWorks system replaces the conventional access points used in wirelessnetworking with two network devices that work as a system:BeaconMaster A network device that provides smart centralized control over theelements (BeaconPoints) in the wireless network.BeaconPoints The access points for 802.11 clients (wireless devices) in thenetwork, controlled by the BeaconMaster. The BeaconPoint is a“thin access point” because its wireless control is handled by theBeaconMaster. The BeaconPoint (BP200 model) is a dual-bandaccess point, with both 802.11a and 802.11b/g radios.Together, the BeaconWorks products enable a radically simplified new approach tosetting up, administering and maintaining a WLAN. BeaconWorks provides a Layer 3IP routed WLAN architecture. This architecture can be implemented over severalsubnets without requiring the configuration of virtual local area networks (VLANs).Conventional Wireless LANSAt its simplest, wireless communication between two or more computers requires thateach one is equipped with a receiver/transmitter – a WLAN Network Interface Card(NIC) – capable of exchanging digital information over a common radio frequency.This is called an ad hoc configuration. An ad hoc network allows wireless devices tocommunicate together. This is an independent basic service set (IBSS).An alternative to the ad hoc configuration is the use of an access point. This may be adedicated hardware router or a computer running special software. Computers andother wireless devices communicate with each other through this access point. The802.11 standard defines Access Point communications as devices that allow wirelessdevices to communicate with a “distribution system”. This is a basic service set (BSS)or infrastructure network.For the wireless devices to communicate with computers on a wired network, theaccess points must be connected into the wired network, and provide access to thenetworked computers. This is called bridging. Clearly, there are security issues andmanagement scalability issues in this arrangement.
BeaconWorks User Guide – The Chantry BeaconWorks SolutionChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 5 of 134RADIUSAuthentication ServerDHCPServerRouterWirelessDeviceEth ern et S witchWirelessDeviceAccessPointFigure 1: Standard wireless network solutionThe wireless devices and the wired networks communicate with each other usingstandard networking protocols and addressing schemes. Most commonly, InternetProtocol (IP) addressing is used.While this topology works well enough for small installations, as the network growsthe difficulty of setting up and administering all the individual access points expandsas well. When the expanding network has to cope with a large number of wirelessusers all signing on and off at random times, the complexity grows rapidly. Imagine,for example, a university library filled with professors and students – all equippedwith laptops. Or a conference full of delegates and exhibitors.Clearly, there must be a better way than setting up each access point individually.The Chantry BeaconWorks SolutionThe Chantry Networks BeaconWorks solution consists of two devices:The BeaconMaster controller is a rack-mountable network device designed to beintegrated into an existing wired Local Area Network (LAN). It provides centralizedcontrol over all access points (both BeaconPoints and third-party access points) andmanages the network assignment of wireless device clients associating through accesspoints.The BeaconPoint is a wireless LAN thin access point (IEEE 802.11) provided withunique software that allows it to communicate only with a BeaconMaster. (A thinaccess point handles the radio frequency (RF) communication but relies on acontroller to handle WLAN elements such as authentication.) The BeaconPoint alsoprovides local processing such as encryption.This architecture allows a single BeaconMaster to control many BeaconPoints,making the administration and management of large networks much easier.
BeaconWorks User Guide – The Chantry BeaconWorks SolutionChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 6 of 134There can be several BeaconMasters in the network, each with its set of registeredBeaconPoints. The BeaconMasters can also act as backups to each other, providingstable network availability.In addition to the BeaconMasters and BeaconPoints, the solution requires two othercomponents, which are standard for enterprise and service provider networks:•RADIUS Server (Remote Access Dial-In User Service) (RFC2865 and RFC2866),or other authentication server. Assigns and manages ID and Password protectionthroughout the network. Used for authentication of the wireless users.•DHCP Server (Dynamic Host Configuration Protocol) (RFC2131). Assigns IPaddresses, gateways and subnet masks dynamically. Also used by theBeaconPoints to discover the location of the BeaconMaster during the initialregistration process.BeaconPointRADIUSAuthentication ServerDHCPServerRouterWirelessDeviceEthernet SwitchEthernet SwitchWirelessDeviceBeaconMasterFigure 2: Chantry BeaconWorks SolutionThe BeaconMaster appears to the existing network as if it were an access point, but infact one BeaconMaster controls many BeaconPoints.The BeaconMaster has built-in capabilities to recognize and manage theBeaconPoints. The BeaconMaster activates the BeaconPoints, enables them to receivewireless traffic from wireless devices, processes the data traffic from theBeaconPoints and forwards or routes that data traffic out to the network. Thisprocessing includes authenticating requests and applying access policies.Simplifying the BeaconPoints make them:• cost-effective• easy to manage• easy to deploy.
BeaconWorks User Guide – The Chantry BeaconWorks SolutionChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 7 of 134Putting control on an intelligent centralized BeaconMaster enables:• centralized configuration, management, reporting, maintenance• high security• flexibility to suit enterprise• scalable and resilient deployments with a few BeaconMasters controlling hundredsof BeaconPoints.Here are some of the BeaconWorks system advantages:Scales up to EnterprisecapacityOne BeaconMaster controls as many as 200 BeaconPoints. In turneach BeaconPoint can handle up to 254 wireless devices. Withadditional BeaconMasters, the number of wireless devices theChantry system can support is in the thousands.Integrates in existingnetworkA BeaconMaster can be added to an existing enterprise network asa new network device, greatly enhancing its capability withoutinterfering with its existing functionality. Integration of theBeaconMasters and BeaconPoints does not require anyreconfiguration of the existing infrastructure (e.g. VLANs).Offers centralizedmanagement andcontrolAn administrator accesses the BeaconMaster in its centralizedlocation and uses its user interface to monitor and administer theentire wireless network. The BeaconMaster has functionality torecognize, configure and manage the BeaconPoints and distributenew software releases.Provides easydeployment ofBeaconPointsThe initial configuration of the BeaconPoints on the centralizedBeaconMaster can be done with an automatic “discovery”technique.Provides security viauser authenticationBeaconWorks uses existing authentication (AAA) servers toauthenticate and authorize users.Provides security viafilters and privilegesBeaconWorks uses virtual networking techniques to createseparate virtual networks with defined authentication and billingservices, as well as access policies and privileges.Supports seamlessmobility and roamingBeaconWorks supports seamless roaming of a wireless devicefrom one BeaconPoint to another on the same BeaconMaster or ona different BeaconMaster.Integrates third-partyaccess pointsBeaconWorks can integrate legacy third-party access points, usinga combination of network routing and authentication techniques.Prevents rogue devices Rogue devices will not be authenticated by the BeaconMaster,preventing unproved devices from masquerading as validBeaconPoints.Provides accountingservicesThe BeaconMaster has software to track and log wireless usersessions, user group activity, and other activity reporting, enablingthe generation of consolidated billing records.Offers troubleshootingcapabilityThe BeaconMaster software logs system and session activity andprovides reports to aid in troubleshooting analysis.
BeaconWorks User Guide – BeaconWorks and Your Enterprise NetworkChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 8 of 134BeaconWorks and Your Enterprise NetworkNetwork traffic flow in the BeaconWorks SystemThe diagram below shows a simple configuration with a single BeaconMaster and twoBeaconPoints, each supporting a wireless device. A RADIUS server on the networkprovides authentication, and a DHCP server is used by the BeaconPoints to discoverthe location of the BeaconMaster during the initial registration process. Also presentin the network are routers and ethernet switches.BeaconPointRADIUSAuthentication ServerDHCPServerRouterWirelessDeviceEthernetSwitchEthernetSwitch802.11IP packet transmissionBeaconMaster /BeaconPointtunnelling802.11 beacon & probe,wireless device associateswith a BeaconPoint by its SSID.• BP sends data traffic to BMthrough a UDP tunnelcalled WASSP.• BM controls BP throughWASSP tunnel.• Using WASSP tunnels, BMallow wireless clients to roamto BPs on different BMs.BeaconMaster authenticatesWireless User, forwards IPpacket to wired n etwork.BeaconMastercontrol & routingBeaconMasterWirelessDeviceFigure 3: BeaconWorks Traffic Flow diagramEach wireless device sends IP packets in the 802.11 standard to the BeaconPoint. TheBeaconPoint uses a UDP (User Datagram Protocol) based tunnelling protocol calledCAPWAP Tunnelling Protocol (CTP) to encapsulate the packets and forward them tothe BeaconMaster.Note: The CTP protocol defines a mechanism for the control and provisioning ofwireless access points (CAPWAP) through centralized access controllers. In addition,it provides a mechanism providing the option to tunnel the mobile client data betweenthe access point and the access controller.The BeaconMaster decapsulates the packets, and routes these to destinations on thenetwork, after authentication by the RADIUS server.The BeaconMaster functions like a standard router, except that it is configured toroute only between its ingress ports (incoming wireless device traffic viaBeaconPoints) and egress ports (traffic out to the wired network). The BeaconMaster
BeaconWorks User Guide – BeaconWorks and Your Enterprise NetworkChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 9 of 134can also be configured to simply forward traffic to a default or static route if dynamicrouting is not preferred.Network securityThe Chantry BeaconWorks system provides features and functionality to controlnetwork access. These are based on standard wireless network security practices.Current wireless network security methods provide a degree of protection. Thesemethods include:• Shared Key authentication, that relies on Wired Equivalent Privacy (WEP) keys• Open System, that relies on Service Set Identifiers (SSIDs)• 802.1x that is compliant with Wi-Fi Protected Access (WPA)• Captive Portal based on Secure Sockets Layer (SSL) protocolThe Chantry BeaconWorks system supports these encryption approaches:• Wired Equivalent Privacy (WEP), a security protocol for wireless local areanetworks defined in the 802.11b standard.• Wi-Fi Protected Access (WPA) with Temporal Key Integrity Protocol (TKIP), alsoknown as WPA version 1. (BeaconWorks Release 2.0)• Advanced Encryption Standard (AES).AuthenticationThe Chantry BeaconMaster relies on a RADIUS server, or authentication server, onthe enterprise network to provide the authentication information (whether the user isto be allowed or denied access to the network).The BeaconMaster provides authentication using:• Captive Portal, a browser-based mechanism that forces users to a web page.• RADIUS (using IEEE 802.1x)The 802.1x mechanism is a standard for authentication developed within the 802.11standard. This mechanism is implemented at the port, blocking all data traffic betweenthe wireless device and the network until authentication is complete. Authenticationby 802.1x standard uses Extensible Authentication Protocol (EAP) for the messageexchange between the BeaconMaster and the RADIUS server.When 802.1x is used for authentication, the BeaconMaster provides the capability todynamically assign per-wireless-device WEP keys (called per-station WEP keys in802.11).Note: In BeaconWorks Release 2.0, a RADIUS redundancy feature is provided,where you can define a failover RADIUS server (up to 2 servers) in the event that theactive RADIUS server fails.PrivacyPrivacy is a mechanism that protects data over wireless and wired networks, usuallyby encryption techniques.
BeaconWorks User Guide – BeaconWorks and Your Enterprise NetworkChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 10 of 134Chantry supports the Wired Equivalent Privacy (WEP) standard common toconventional access points.It also provides Wi-Fi Protected Access (WPA) encryption, based on Pairwise MasterKey (PMK) and Temporal Key Integrity Protocol (TKIP). This second option isavailable when the AAA (802.1x) authentication technique is used.Interaction with Wired Networks: Virtual Network ServicesBeaconWorks provides a versatile means of mapping wireless networks to thetopology of an existing wired network. This is accomplished through the assignmentof Virtual Network Services.When you set up Virtual Network Services (VNS) on the BeaconMaster, you aredefining subnets for groups of wireless users. This VNS definition creates a virtual IPsubnet where the BeaconMaster acts as a default gateway for wireless devices.This technique enables policies and authentication to be applied to the groups ofwireless users on a VNS, as well as the collecting of accounting information on usersessions that can be used for billing.When a VNS is set up on the BeaconMaster:• one or more BeaconPoints (by radio) are associated with it• a range of IP addresses is set aside for the BeaconMaster’s DHCP server to assignto wireless devices.If routing protocol is enabled, the BeaconMaster advertises the VNS as a routablenetwork segment to the wired network, and routes traffic between the wireless devicesand the wired network.Note: In BeaconWorks Release 2.0, each radio on a BeaconPoint can participate in upto four VNSs, via the multi-SSID function.Static Routing and Routing ProtocolsRouting can be used on the BeaconMaster to support the VNS definitions.In the User Interface on the BeaconMaster, you can configure routing on theBeaconMaster to use one of the following routing techniques:• Static routes: Use static routes to set the default route of a BeaconMaster so thatlegitimate wireless device traffic can be forwarded to the default gateway.• Open Shortest Path First (OSPF) (RFC2328): Use OSPF to specify the next besthop (route) of a BeaconMaster.Open Shortest Path First (OSPF) is a protocol designed for medium and large IPnetworks, with the ability to segment routers into different routing areas for routinginformation summarization and propagation.Policy: Packet FilteringPolicy refers to the rules that allow different network access to different groups ofusers. The BeaconWorks system can link authorized users to user groups. These usergroups then can be confined to predefined portions of the network.
BeaconWorks User Guide – BeaconWorks and Your Enterprise NetworkChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 11 of 134In the BeaconWorks system, policy is carried out by means of packet filtering, withina VNS.In the BeaconMaster user interface, you set up a filtering policy by defining a set ofhierarchical rules that allow (or deny) traffic to specific IP addresses, IP addressranges, or services (ports). The sequence and hierarchy of these filtering rules must becarefully designed, based on your enterprise’s user access plan.The authentication technique selected determines how filtering is carried out:• If authentication is by SSID and captive portal, a global filter will allow all users toget as far as the Captive Portal web page, where login occurs. When authenticationis returned, then filters are applied, based on user ID and permissions.• If authentication is by AAA (802.1x), there is no need for a global filter. Users willalready have logged in and have been authenticated before being assigned an IPaddress. At this point, filters are applied, based on user ID and permissions.Mobility and RoamingThe 802.11 standard allows a wireless device to preserve its IP connection when itroams from one access point to another on the same subnet. However, if a user roamsto an access point on a different subnet, the user is disconnected.Chantry BeaconWorks has functionality that supports mobility on any subnet in thenetwork. Wireless device users can roam between BeaconPoints on any subnetwithout having to renew the IP connectionThe BeaconMaster stores the wireless device’s current session information, such as IPaddress and MAC address. If the wireless device has not disassociated, then when itrequests network access on a different BeaconPoint, the BeaconMaster can match itssession information and recognize it as still in a current session.In addition, a BeaconMaster can learn about other BeaconMasters on the network, andthen exchange client session information. This enables a wireless device user to roamseamlessly between different BeaconPoints on different BeaconMasters.AvailabilityBeaconWorks provides seamless availability against BeaconPoint outages,BeaconMaster outages, and even network outages.For example, if one BeaconPoint fails, coverage for the wireless device isautomatically provided by the next nearest BeaconPoint.If a BeaconMaster fails, all of its associated BeaconPoints, or access points, canautomatically migrate to another BeaconMaster that has been defined as the secondaryor backup BeaconMaster. When the original BeaconMaster returns to the network, theBeaconPoints automatically re-establish their normal connection with their originalBeaconMaster.
BeaconWorks User Guide – BeaconWorks Release 2.0 Features: OverviewChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 12 of 134BeaconWorks Release 2.0 Features: OverviewBackwards compatibility with Release 1.1 on the BeaconPointIn Release 2.0, the upgrading of software on the BeaconPoint is no longer automatic.You can schedule the upgrade and select the image to be used. Use the BeaconPointMaintenance screen to select and schedule an upgrade.One result of this feature is that you can continue to use BeaconPoints that still haveRelease 1.1 software. However, there are certain limitations to the functionssupported. In Release 1.1, a BeaconPoint appeared as a single entity in a VNS, andcould be assigned to only one VNS. Both radios had the same properties. Privacy byWPA was not supported. The default privacy mechanism was dynamic WEP.A BeaconPoint that is still running a Release 1.1 software image will therefore retainthese parameters, and these parameters are not modifiable. The new capability willonly be available when the BeaconPoint is upgraded from Release 1.1 to Release 2.0software.Backwards compatibility with Release 1.1 on the BeaconMasterUpgrading to BeaconWorks 2.0 requires a migration of the database on theBeaconMaster. In order to preserve the BeaconMaster network configurations that youdefined in Release 1.1 software, the new release provides scripts that migrate theconfiguration data into the new data format.Details of the software upgrade procedure, and the appropriate script to run areavailable in Technical Release Notes.Multi-SSID: BeaconPoint radios on more than one VNSIn Release 1.1, a BeaconPoint appeared as a single entity in a VNS, and could beassigned to only one VNS.In Release 2.0, each radio on a BeaconPoint BP200 can participate in up to fourVNSs, for a total of eight VNSs per BeaconPoint. This provides greater flexibility indefining VNSs and providing support to a wide range of wireless devices.This flexibility enables the network to support wireless devices with either:• 802.11g radios on the 2.4 GHz band, and legacy support to 802.11b on the sameband• 802.11a radios on the 5 GHz band.Furthermore, a VNS can be set up to support only one type of radio, for specific typesof wireless traffic such as voice-over-internet traffic,Use the Virtual Network Configuration: Topology screen to assign the BeaconPointradios to a VNS. The Virtual Network Configuration: Privacy screen will allow onlyone WEP key to be set up. After a VNS definition has been saved, you can view (inthe BeaconPoint Configuration screen) the properties for each radio for a selectedBeaconPoint, including a list of the VNSs to which the radio has been assigned.
BeaconWorks User Guide – BeaconWorks Release 2.0 Features: OverviewChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 13 of 134Privacy using Wi-Fi Protected Access (WPA)The VNS Privacy configuration function now includes Wi-Fi Protected Access(WPA) privacy, a new security solution that adds authentication and enhanced WEPencryption with key management. . WPA specifies IEEE 802.1x authentication withExtensible Authentication Protocol (EAP).WPA uses the Temporal Key Integrity Protocol (TKIP) mechanism, which shares astarting key between devices, and then changes their encryption key for every packet.Configure the WPA option and define the initial shared key in the Virtual NetworkConfiguration: Privacy screenBeaconPoint software: Dual image capabilityThe BeaconPoint in Release 2.0 keeps a backup copy of its software image. When asoftware upgrade is sent to the BeaconPoint, the upgrade becomes the BeaconPoint’scurrent image and the previous image becomes the backup. In the event of failure ofthe current image, the BeaconPoint will run the backup image.BeaconPoint software: Dynamic reconfiguration (without reboot)In Release 2.0, a number of the properties of each radio on a BeaconPoint can bemodified (in the BeaconPoint Configuration screen) without requiring a reboot of theBeaconPoint. However, modifying the following properties does require a reboot:• enabling or disabling either radio• changing the radio channel.In addition, the BeaconPoint must be rebooted after it has been added to a VNS, or theradio assignment in a VNS has been changed. Any changes to security also require areboot of the BeaconPoint.BeaconPoint StatisticsRadio statistics are available from a BeaconPoint running Release 2.0 software. Onthe BeaconMaster user interface, two displays (in the Reports and Displays area of theuser interface) show information about activity on a selected BeaconPoint:• Wired Ethernet Statistics by BeaconPoints• Wireless Statistics by BeaconPoints, plus a subscreen that displays transmissionand association information by wireless client.These displays are snapshots of the BeaconPoint activity at the current point in time.The statistics displayed are those defined in the 802.11 MIB, defined in the IEEE802.11 standard (in Section 11.4 and Annex D).The BeaconMaster can also be configured to send these radio statistics as SNMPmessages to the SNMP monitoring machine on a network.Event reporting using SyslogIn addition to viewing BeaconWorks event messages in the BeaconWorks Reports andDisplays area of the user interface, you can also set up the BeaconMaster to relayevent messages on to a centralized Event Server on your enterprise network. The relayis done using the syslog protocol.Use the BeaconMaster System Maintenance screen to enable the syslog function andto define the location of one or more centralized Event Servers.
BeaconWorks User Guide – BeaconWorks Release 2.0 Features: OverviewChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 14 of 134Capacity for Redundant RADIUS serversBeaconWorks Release 2.0 provides the capability to define more than one RADIUSserver for authentication, and to provide the priority of use during a failover situation.Use the Virtual Network Configuration: Authentication screen to define the RADIUSserver location and priority.Detection of Rogue APsBeaconWorks Release 2.0 provides a new mechanism that recognizes rogue accesspoints. The mechanism scans radio frequency (RF) activity on the BeaconPoints andbuilds a data log of this activity. This data is then analyzed through various algorithmsthat assist in distinguishing rogue access points from legitimate activity.Use the BeaconKeeper function in the user interface to enable this mechanism. Onceenabled, you can configure and schedule the RF scan mechanism, maintain a list of“friendly AP” access points, and view the detected access points for which a match isnot found in the “friendly AP” list.Quality of Service (QoS) on a VNS: Spectralink Voice Protocol (SVP)A VNS can be configured to handle voice-over internet traffic using SpectraLinkVoice Protocol (SVP), a protocol developed by SpectraLink for implementation on anaccess point. The SVP protocol facilitates voice prioritization over an 802.11 wirelessLAN that will carry voice packets from SpectraLink wireless telephones.Use the Virtual Network Configuration: Topology screen to set up a VNS for voice-over-internet traffic with SVP prioritization. A number of conditions apply to a VNSfor voice-over-internet.BeaconPoint static configuration: Branch Office, Phase 1The BeaconPoint static configuration feature provides BeaconWorks capability for anetwork with the central office / branch office model.In the branch office scenario, BeaconPoints are installed in a remote site. TheBeaconPoints require the capability to interact both in the local site network and in thecentral headquarters network. To achieve this, the BeaconPoint’s automatic process ofdiscovery and registration with the BeaconMaster is disabled, and a staticconfiguration is used instead.
BeaconWorks User Guide – BeaconMaster: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 15 of 134BeaconMaster: StartupBeaconMaster Features and InstallationThe Chantry BeaconMaster is a network device designed to be integrated into anexisting wired Local Area Network (LAN).Figure 4: The Chantry BeaconMasterThe BeaconMaster provides centralized management, network access and routing towireless devices that are using BeaconPoints to access the network. It can also beconfigured to handle data traffic from third-party access points.The BeaconMaster performs the following functions:• Controls and configures BeaconPoints, providing centralized management• Authenticates wireless devices that contact a BeaconPoint• Assigns each wireless device to a VNS when it connects• Routes traffic from wireless devices, using VNSs, to the wired network• Applies filtering policies to the wireless device session• Provides session logging and accounting capability.The BeaconMaster is rack-mountable and comes in two models:•BeaconMaster 100 (BM100):• Four Fast-Ethernet ports, (10/100 BaseT), supporting up to 60 BeaconPoints• One management port, (10/100 BaseT)• One console port (DB9 serial)• Power supply, either standard (S), or redundant (R)•BeaconMaster 1000 (BM1000):• Two GigE ports (dual 1GB SX network interfaces), supporting up to 200BeaconPoints• One management port, (10/100 BaseT)• One console port (DB9 serial)• Power supply, either standard (S), or redundant (R)Installing the BeaconMasterBefore you begin installation, make sure that a site survey has been done, to determinethe number and location of BeaconPoints and BeaconMasters required. The sitesurvey should take a number of factors into consideration, including:
BeaconWorks User Guide – BeaconMaster: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 16 of 134• coverage areas• number of users• architectural features that affect transmission• existing wired network and access to ethernet cabling• type of mount (wall, ceiling, plenum) for BeaconPoints• type of power (Power-over-Ethernet or AC adaptor) for BeaconPoints• physical security of the BeaconMaster, including access control.Installing the BeaconMaster1. Unpack the BeaconMaster from its shipment carton. Follow the instructions in theInstallation Guide included with the unit to:• Check that all parts are present, including the ethernet cross-over cable• Install the BeaconMaster, using its rack mounts, or stand-alone table mount• Plug in the BeaconMaster power supply (single or dual).        ↑                      ↑Power supply        Power On/Off switch(single or dual)← Data ports (4-port version)←  Management portsFigure 5: The Chantry BeaconMaster – back view diagram2. Perform the First-Time Setup of the BeaconMaster, to change its factory defaultIP address (see next topic)3. After that, connect the BeaconMaster to the enterprise LAN.Power Cord,BeaconMasterSteward28A5776-0A2 Note: Install ferrite beads as shownin the two diagrams:←   on the BeaconMaster powersupply cord, and on theBeaconMaster ethernet cable    →RJ45 Data Cord,BeaconMasterSteward28A2024-0A0First-Time Setup of BeaconMasterManagement Port First-Time Set UpBefore you can connect the BeaconMaster to the enterprise network, you must changethe IP address of the BeaconMaster management port from its factory default to the IPaddress suitable for your enterprise network.To access the BeaconMaster for this initial setup, use a laptop computer, runningInternet Explorer 6.0 (or higher) web browser, attached to the BeaconMaster’sethernet Management Port (RJ45 port) via an ethernet cross-over cable (cableprovided with the BeaconMaster).
BeaconWorks User Guide – BeaconMaster: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 17 of 134The factory default management port setup of the BeaconMaster is:Host Name:  BM0001Management Port IP address:  192.168.10.1:5825Management Network Mask:  255.255.255.0Changing the Management Port IP address web browser, ethernet port method1. Connect a cross-over ethernet cable between the ethernet port of the laptop andethernet Management Port of the BeaconMaster.2. Statically assign an unused IP address in the 192.168.10.0/24 subnet for theethernet port of the PC (for example, 192.168.10.205).3. Run Internet Explorer (version 6.0 or above) on the laptop.4. Point the browser to the URL https://192.168.10.1:5825. This URL launches theweb-based GUI on the BeaconMaster.The Chantry BeaconWorks system login screen appears.Screen 1: Chantry BeaconWorks User Interface Login5. Key in the factory default User Name (“chantry”) and Password (“abc123”) .Click on the Login button. The main menu screen appears.Screen 2: Chantry BeaconWorks User Interface Main Menu6. Click on the BeaconMaster Configuration menu option to navigate to theBeaconMaster Configuration screen.
BeaconWorks User Guide – BeaconMaster: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 18 of 1347. In the left-hand list, click on the IP Addresses option. The Management PortSettings area (top portion of the screen) displays the factory settings for theBeaconMaster.Screen 3: BeaconMaster Configuration – IP Addresses – Management Port8. To modify Management Port Settings, click the Modify button. The System PortConfiguration screen appears.Screen 4: Modify Management Port Settings (System Port Configuration)
BeaconWorks User Guide – BeaconMaster: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 19 of 1349. Key in:Hostname The name of the BeaconMaster.Domain The IP domain name of the enterprise networkManagement The new IP address for the BeaconMaster’s managementIP Address port (change this as appropriate to the enterprise network).Subnet mask For the IP address, the appropriate subnet mask to separatethe network portion from the host portion of the address(typically 255.255.255.0)Management Gateway The default gateway of the network.Primary DNS The primary name server used by the network.Secondary DNS The secondary name server used by the network.10. Click OK to return to the BeaconMaster Configuration screen.11. Click on the Save button, to save the port changes.The web connection between the laptop and the BeaconMaster is now lost, becausetheir IP addresses are now on different networks.Add the BeaconMaster to your enterprise network1. Disconnect the laptop from the BeaconMaster Management Port.2. Connect the BeaconMaster Management Port to the enterprise ethernet LAN.Now you will be able to launch the BeaconWorks GUI again, with the system visibleto the enterprise network.The remaining steps in initial configuration of the BeaconWorks system are describedin the next topic, after an overview of the GUI.
BeaconWorks User Guide – BeaconMaster: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 20 of 134The Graphical User Interface (GUI): OverviewNote: The Chantry Graphical User Interface is web-based. The only browser itsupports is Microsoft Internet Explorer 6.0 or above.The administrator can configure and administer the BeaconWorks system using theweb-based Graphical User Interface.To run the Graphical User interface1. Launch Microsoft Internet Explorer (version 6.0 or above).2. In the address bar, key in the URL https://x.x.x.x:5825(your management gateway as defined in initial setup plus port 5825, formerlyfactory default 192.168.10.1:5825)The Chantry BeaconWorks system login screen appears.Screen 5: Chantry BeaconWorks User Interface Login3. Key in the factory default User Name (“chantry”) and Password (“abc123”).Note: In the BeaconMaster Configuration: Management Users screen, you can definewhich user names have full read/write access to the user interface (“Admin” users)and which users have “read-only” privileges. This is described in a later topic.4. To change the password, click on the Password button. The Change Passwordpopup screen appears.Screen 6: Change Password popup5. Enter the new password and click on the Submit button.
BeaconWorks User Guide – BeaconMaster: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 21 of 1346. In the Login screen, click on the Login button. The main menu screen appears.Screen 7: Chantry BeaconWorks Main MenuThe five areas in the BeaconWorks user interface are accessed from the main menu(above) or, in each area, by clicking on the tab across the top of each screen. Withineach area, you access the associated subscreens by clicking on an item in the left-handlist in each screen. A few subscreens are popups from buttons on the parent screen.Tab Screen FunctionLogs & Traces Logs normal events and alarm events.Trace logs are by component.Reports & Displays Access to various on-screen reportsBeaconMasterConfigurationSystem MaintenanceRouting ProtocolsIP AddressesBeaconKeeperVN ManagerSNMPNetwork TimeManagement UsersVarious: shutdown, enable syslog.Define static routes, configure OSPF.Set up management port (Modify screen)Set up the data ports.Enable “detect rogue APs” mechanism.Manage multiple BeaconMasters.Enable SNMP messages to be sent.Configure synchronized time.Define user level.BeaconPointConfigurationHighlight a BPAccess ApprovalBP MaintenanceBP RegistrationBP FailoverClient DisassociateModify properties, radios, static config.Modify the status of a BeaconPoint.View and set up BP software upgrade.Define registration mode, pairing of BPs.View failover VNS, part of VN Manager.Force a wireless device to disassociateVirtual NetworkConfigurationAdd a subnetVNS TopologyVNS AuthenticationVNS FilteringVNS PrivacyLeft-hand list. Enter name. Click to add.Define the VNSDefine Filter IDsDefine filtering rules to control accessSet up WEP keys or WPA privacy.BeaconKeeperMitigatorConfigure and view reports for the BeaconKeeper Mitigator(rogue access point detection)
BeaconWorks User Guide – BeaconWorks Configuration Steps: OverviewChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 22 of 134BeaconWorks Configuration Steps: OverviewTo set up and configure the BeaconMaster and BeaconPoints, follow these steps:1. First-Time Setup: Perform “First-Time Setup” of the BeaconMaster on thephysical network by configuring the Management Port (as described earlier):• modify the Management Port IP address to suit the enterprise network.2. Data Port Setup: Set up the BeaconMaster on the physical network by configuringthe physical data ports. Determine whether the data ports will be:• “host port”• “router port”• “3rd party AP port”3.  Routing Setup: For any port defined as a “router port”, configure:• static routes• OSPF parameters, if appropriate to the network4. BeaconPoint Initial Setup: Connect the BeaconPoints to the BeaconMaster:• first determine their Registration mode (in the BeaconPoint Registrationscreen)• then power on the BeaconPoints (they will perform an automatic discoveryand registration process described in this User Guide)5. BeaconPoint Configuration: Modify properties or settings of the BeaconPoint, ifdesired.6. Virtual Network Services (VNS) Setup: Set up one or more virtual subnetworks, onthe BeaconMaster. For each VNS:• select radios on the BeaconPoints that the VNS will use.• select and configure the authentication method for the wireless device user.• select and configure the privacy method on the VNS.7. Filtering Rules Setup: For each VNS, define the filtering rules that will controlnetwork access:• define global and default filtering rules, depending on network assignmentand authentication method• define specific filtering rules for the Filter IDs (defined user groups in yourenterprise) that you want on this VNS.Each of these steps is described in detail in the relevant section of this User Guide.
BeaconWorks User Guide – BeaconWorks Configuration: Data Port and Routing SetupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 23 of 134BeaconWorks Configuration: Data Port and Routing SetupOnce the “First-Time Setup” described above is complete, the next step in the initialsetup of the BeaconMaster is to configure the data ports. Next, you can define routingon a data port, if appropriate.Setting Up the Data PortsConfiguring the data ports on the BeaconMaster1. Click on the BeaconMaster tab in any screen. The BeaconMaster Configurationscreen appears.2. In the left-hand portion of the screen, click on the IP Address option. TheManagement Port Settings and Interfaces screen appears.The lower portion of the BeaconMaster Configuration screen displays theInterfaces, either the four ethernet ports (for the BM100), or the two ports (forthe BM1000). For each port, the MAC address is displayed automatically.Screen 8: BeaconMaster Configuration – IP Addresses / Interfaces3. Click in a port row to highlight it.4. For the highlighted port, key in the:IP address IP Address of the physical ethernet port.Subnet mask For the IP address, the appropriate subnet mask to separate thenetwork portion from the host portion of the address (typically255.255.255.0)MTU Maximum Transmission Unit (maximum packet size for thisport). Default setting is 1500. Do not change this setting.
BeaconWorks User Guide – BeaconWorks Configuration: Data Port and Routing SetupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 24 of 134Note: In a “Branch Office” scenario, where the BeaconPoint is configured statically tofunction on a local network whose MTU is lower than 1500, a mechanism on theBeaconMaster automatically adjusts the MTU size to prevent packet fragmentation.5. For the highlighted port, select its Function from the drop-down list: Host Port,3rd Party AP, Router (see “Port Type” explanation below)Note: It is recommended that one port be configured as a “Router” Port, so that staticroutes and/or OSPF routing can be defined for the BeaconMaster. See next topic.6. For the highlighted port, click the Mgmt checkbox on to allow ManagementTraffic on this port.7. For the highlighted port, click the SLP checkbox on to allow SLP protocol on thisport for BeaconPoint discovery and registration.Note: For the implications of these two options, see Port-Level Filtering (after thenext topic).8. To save the port configuration, click Save.To cancel the entries without saving, click Cancel.Port Type or FunctionA new BeaconMaster is shipped from the factory with all its data ports set up as “Hostports”, and support of management traffic disabled on all data ports.In the user interface, you can redefine the data ports to function as one of three types:•Host PortDefine as “Host Port” any port to which only BeaconPoints are connected, in atypical installation. When BeaconPoints are attached to a host port and assigned toa VNS (see later in this guide), a virtual VNS port is created and wireless devicetraffic is directed to the virtual VNS port, allowing the BeaconMaster to forwardtraffic. IP forwarding and routing are disabled for third-party hosts attached to a“Host Port”.•Third-Party Access Point PortDefine as “3rd-Party AP” any port to which you will connect only third-partyaccess points, in order for the BeaconMaster to manage these access points. TheBeaconMaster uses a combination of network routing and authenticationtechniques to forward traffic on this port. BeaconPoints must not be attached to a“3rd-Party AP” port.•Router PortDefine as “Router Port” a port that you wish to connect to an upstream next-hoprouter in the network. Dynamic routing protocol such as OSPF can be turned onfor this port type.BeaconPoints can be attached to a “Router” port. The BeaconMaster will create avirtual VNS port and handle wireless device traffic in the same manner as a “Hostport”. Third-party access points must not be directly connected to a “Router” port(unless the BeaconMaster is not required to manage these access points).There is a fourth port type that is not configurable in the user interface:
BeaconWorks User Guide – BeaconWorks Configuration: Data Port and Routing SetupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 25 of 134•Virtual Network Services (VNS) InterfaceA VNS port is a virtual port created automatically on the BeaconMaster when anew VNS is defined (see later in this guide.) The VNS port becomes the defaultgateway for wireless devices on this VNS. No BeaconPoints can be associatedwith a VNS port and no routing is permitted on this port.Note: The Management Port is always a Host port, with management traffic supportenabled.The chart below summarizes the port types and their functions:Port Type IP Forwarding BeaconPointsupportManagement traffic support(SNMP, HTTP, TELNET,SLP, RADIUS, DHCP)Routing protocolsupport (IP,OSPF and PIM)Host No Yes Selectable NoThird-Party AP No No Selectable NoRouter SelectableRoute wireless devicetraffic onlyYes Selectable SelectableVNS No No Selectable NoPort-Level Filtering of Unauthorized TrafficPort-based filters on the BeaconMaster are built in to protect it from unauthorizedaccess to system management functions and services via the ports.When you select a port type, you automatically activate a set of filtering rules thatallow or deny traffic seeking access to specific services. For example:• Router and Host interfaces allow access to specific management applications(SSH, HTTPS, SNMP) and to BeaconPoint registration mechanisms.• Third Party AP and VNS interfaces deny access to management and BPregistration mechanisms, but allow access to captive portal (HTTP, HTTPS) and IPassignment infrastructure (DHCP).Only traffic allowed by the interface’s filter are allowed to reach the BeaconMasteritself. All other traffic is dropped.The physical Management Port that you configured in “First-Time Set-up” has arestricted set of Management Traffic filtering rules that apply automatically. Theserules allow incoming traffic for SSH, HTTPS, FTP, SNMP, and outgoing traffic forSyslog, NTP, and RADIUS, both directions for ICMP, and then deny all other traffic.When you enable Management Traffic on one of the data ports (clicking the checkboxon), you will activate the Management Traffic filter on that port. There is a secondway to enable Management Traffic, and invoke this implicit filter – in the VNSConfiguration: Topology, you can allow Management Traffic on a VNS by clicking acheckbox on. (See later in this Guide.)Note: These implicit or built-in filtering rules work in conjunction with the VNSfiltering rules that you can define in a VNS Configuration (described later in thisGuide). The implicit rules on a port always override the administrator-defined rules,unless specific access is defined and allowed, as in a filter for Captive Portal.
BeaconWorks User Guide – BeaconWorks Configuration: Data Port and Routing SetupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 26 of 134Setting up Static RoutesIt is recommended that one of the data ports be configured as a “Router” port. Thenyou can define a default route to your enterprise network, either with a static route orby using OSPF protocol. This will enable the BeaconMaster to forward wirelesspackets to the remainder of the network.Setting up a Static Route on the BeaconMaster1. Click on the BeaconMaster tab in any screen. The BeaconMaster Configurationscreen appears.2. In the left-hand portion of the screen, click on the Routing Protocols option.Then click the Static Routes tab. The Static Routes screen appears.Screen 9: BeaconMaster Configuration – Static Routes3. To add a new route, click in the Destination Address field, and key in thedestination IP address of a packet.[The destination network IP address that this static route applies to. Packets withthis destination address will be sent to the Destination below.]To define a default static route for any unknown address not in the routing table,key in 0.0.0.04. Key in the Subnet Mask. For the IP address, the appropriate subnet mask toseparate the network portion from the host portion of the address (typically255.255.255.0)For the default static route for any unknown address, key in 0.0.0.0.5. Select an outbound destination for the packets, either:Click on the radio button in the Gateway field, and key in the IP address of thegateway (the IP address of the specific router port or gateway, on the same subnetas the BeaconMaster, to which to route these packets; that is, the IP address of thenext hop between the BeaconMaster and the packet’s ultimate destination) ,
BeaconWorks User Guide – BeaconWorks Configuration: Data Port and Routing SetupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 27 of 134orClick on the Interface button, and select a port from the drop-down list.6. Click on the Add button. The new route appears in the list, numbered sequentially.7. Click on Save to update the routing table on the BeaconMaster.Viewing the Routing Table on the BeaconMasterTo view the static routes that have been defined for the BeaconMaster, click onthe View Forwarding Table tab. This displays the Forwarding Table Screen fromthe Reports & Displays area of the user interface.Screen 10: Report – Forwarding TableThis report displays all defined routes, whether static or OSPF, and their currentstatus. To update the display, click on the Refresh button.Setting up OSPF RoutingFor each data port defined as a “Router Port”, you can enable OSPF (as well as, orinstead of, defining static routes). First, you enable OSPF on the BeaconMaster, anddefine the global OSPF parameters. Then you enable (or disable) OSPF on each portthat you defined as a “Router Port” in the data port setup.Note: Ensure that the OSPF parameters defined here for the BeaconMaster areconsistent with the adjacent routers in the OSPF area. For example:• If the peer router has different timer settings, the protocol timer settings in theBeaconMaster must be changed to match, in order to achieve OSPF adjacency.• The MTU of the ports on either end of an OSPF link must match. The MTU forports on the BeaconMaster is defined as 1500, in the Interfaces area of the IPAddresses screen, during data port setup. This matches the default MTU instandard routers.
BeaconWorks User Guide – BeaconWorks Configuration: Data Port and Routing SetupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 28 of 134Setting up OSPF Routing on the BeaconMaster1. Click on the OSPF tab in Routing Protocols screen. The OSPF Settings screenappears.Screen 11: BeaconMaster Configuration – Routing, OSPF tab2. In the Global Settings area, enable OSPF on the BeaconMaster by filling in thefollowing fields:OSPF Status: To enable OSPF, select ON from the drop-down list.Router ID: If left blank, the OSPF daemon will automatically pick arouter ID from one of the BeaconMaster’s interface IPaddresses.If filled in here with the IP address of the BeaconMaster, thisID must be unique across the OSPF area.Area ID: 0 is the main area in OSPF(Note: The Area ID must be the same for all ports on theBeaconMaster defined as router ports, to avoid creating anarea boundary in the BeaconMaster.)Area Type: Select Default (Normal), Stub or Not-so-stubby (OSPF areatypes) from the drop-down list.3. To save these settings, click on the Save button.4. In the Port Settings area, for each data port defined as a “Router Port”, you canenable (or disable) OSPF by filling in the following fields:Port Status: To enable OSPF on the port, select Enabled from the drop-down list.Link Cost: Key in the OSPF standard for your network for this port.Default displayed is 10. (The cost of sending a data packeton the interface. The lower the cost, the more likely theinterface is to be used to forward data traffic.)
BeaconWorks User Guide – BeaconWorks Configuration: Data Port and Routing SetupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 29 of 134Note: If more than one port on the BeaconMaster is enabled for OSPF, it is desirableto prevent the BeaconMaster from serving as a router for other network traffic (otherthan the traffic from wireless device users controlled by the BeaconMaster). Onesolution is to set the Link Cost to its maximum value of 65535. This will ensure thatthe BeaconMaster is never the preferred OSPF route. Filters should also be defined inthe Virtual Network Configuration – Filtering screen that will drop routed packets.Authentication: From the drop-down list, select the authentication type set upfor the OSPF on your network: None or Password.Password: If “Password” was selected above, key it in here. Thispassword must match on either end of the OSPF connection.Dead-Interval: Time in seconds (displays OSPF default).Hello-Interval: Time in seconds (displays OSPF default).Retransmit-Interval: Time in seconds (displays OSPF default).Transmit delay: Time in seconds (displays OSPF default).5. To save these settings, click on the Save button.To confirm that the ports are set up for OSPF, and that advertised routes from theupstream router are recognized, view the Forwarding Table report (described abovefor static routes) by clicking the tab. This display shows the current routing table,displaying the default, connected, static and OSPF routes.Two additional reports in the Reports and Displays area of the GUI display OSPFinformation when the protocol is in operation:•OSPF Neighbor report displays the current neighbors for OSPF (routers that haveinterfaces to a common network)•OSPF Linkstate report shows the Link State Advertisements (LSAs) received bythe currently running OSPF process. The LSAs describe the local state of a routeror network, including the state of the router’s interfaces and adjacencies.  Screen 12: Reports – OSPF Neighbor and Linkstate
BeaconWorks User Guide – BeaconPoint: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 30 of 134BeaconPoint: StartupYou are now ready to add the BeaconPoints to the BeaconWorks system and registerthem with the BeaconMaster. Before the BeaconPoints can handle wireless traffic,you will also need to assign the BeaconPoints to a VNS (see later in this Guide).BeaconPoint (BP200) FeaturesThe Chantry BeaconPoint is a wireless LAN access point using the 802.11 wirelessstandards that allow wireless functionality comparable to ethernet (802.11a, 802.11band 802.11g).The BeaconPoint is provided with proprietary software that allows it to communicateonly with the BeaconMaster.The BeaconPoint is physically connected to a LAN infrastructure with an IPconnection to a BeaconMaster. The BeaconPoint has no user interface. The only wayto communicate with a BeaconPoint is through the BeaconMaster.All communication with the BeaconMaster is carried out using a UDP-based protocolcalled CAPWAP Tunnelling Protocol (CTP) to encapsulate IP traffic from theBeaconPoints and direct it to the BeaconMaster. The BeaconMaster decapsulates thepackets and routes them to the appropriate destinations, while managing sessions andapplying policy.Figure 6: The Chantry BeaconPointThe BeaconPoint BP200 has two radios:• a radio that supports the 802.11a standard.The 802.11a standard is an extension to 802.11 that applies to wireless LANs andprovides up to 54 Mbps in the 5-GHz band. 802.11a uses an orthogonal frequencydivision multiplexing encoding scheme rather than FHSS or DSSS.• a radio that supports the 802.11g standard (and 802.11b).The 802.11g standard applies to wireless LANs and provides 20+ Mbps in the 2.4GHz band. Because 802.11g uses the same communication frequency range as802.11b (2.4 GHz), it is backwards compatible with 802.11b.The 802.11b (High Rate) standard is an extension to 802.11 that specifies atransmission rate of 11 Mbps (with a fallback to 5.5, 2 and 1 Mbps) in the 2.4 to2.4835 GHz frequency band. The 802.11b standard uses direct-sequence spreadspectrum (DSSS).Either radio on the BP200 can be enabled or disabled in the user interface.
BeaconWorks User Guide – BeaconPoint: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 31 of 134The BP200 supports the full range of 802.11a:5.15 to 5.25 GHz U-NII Low Band5.25 to 5.35 GHz U-NII Middle Band5.725 to 5.825 GHz U-NII High BandNew 5.470 GHz to 5.725 GHz Band(when approved by FCC)The U-NII bands (Unlicensed National Information Infrastructure) are three frequencybands of 100 MHz each in the 5 GHz band designated for short-range, high-speedwireless networking communication.The BeaconPoint BP200 has two models:• internal antenna (Model BP200s), internal dual (multimode) diversityantennas• external antenna (Model BP200e) (dual external antennas) RP-SMAThe BeaconPoint are powered in one of three ways:•Power Over Ethernet (PoE)If your network is already set up with PoE, attach the LAN ethernet cable to theRJ45 ethernet connector in the top of the BeaconPoint.•Power Over Ethernet: Adding PoE InjectorIf your network is not set up with PoE, you can provide power to the ethernet cablewith a PoE injector. The PoE injector must be 802.3af compliant. The PoE injectoris not provided with the BeaconPoint.•Power by AC AdaptorAn AC adaptor is not provided with the BeaconPoint. If you wish to use one, thespecifications are: BP200 – Input: 120-240 VAC, Output Voltage DC +6V, maxamps 1.50, max watts 10.To use an adaptor, install the BeaconPoint within six feet of a wall outlet, attachthe adaptor to the BeaconPoint and then plug the adaptor into the wall outlet.Note: For a list of recommended and tested devices (PoE Injectors or AC adaptors)for use with the BeaconPoint, contact Chantry Networks Customer Service, or go towww.chantrynetworks.com/site/support.html.The BeaconPoint has a mounting bracket for wall, ceiling or plenum mount, andsecurity hardware (an allen key and a spreading rivet with screw, described later).
BeaconWorks User Guide – BeaconPoint: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 32 of 134Installing the BeaconPointsThe steps to install the BeaconPoints are repeated here from the Installation Guidepacked with the units. Keep the security instructions for future reference (along withthe allen key needed to remove the BeaconPoint from its mounting bracket).1. Unpack the BeaconPoint from its shipment carton. Check that all parts are present,using the Installation Guide packed with the unit.BeaconPointwall bracket2. Mount the BeaconPointwall bracket, using 3 screws.Make sure the top of the bracketis near the LAN ethernet cableplug coming from the wall.3. Press the back of the BeaconPoint onto the bracket,aligning it with the open notches in the bracket.Then slide it downwards until it clicks into place.                 ↑Channel for allen key to spring clipSecurity Note #1: A small spring clip on the BeaconPoint case has now snapped intothe bracket. To remove the BeaconPoint from the bracket, insert the allen key(provided) into the small hole at the bottom of the bracket. Use the allen key todepress the spring clip. Then slide the case up the bracket and lift off the BeaconPoint.4. Insert the plastic spreading rivet through thehole at the bottom of the bracket and into theBeaconPoint case. Then screw in the plasticscrew. This spreads the rivet and locks the caseto the bracket.Opening for rivet                       ↓                       ↑Opening for allen keySecurity Note #2: The spreading rivet prevents casual removal of the BeaconPoint.You will need a screwdriver to remove it.5. Attach the LAN ethernet cable to the ethernet port of the BeaconPoint.6. If you are using the optional power adaptor (rather that Power-over-Ethernet),plug in the unit.Note: Before you power up the BeaconPoint (steps 5 or 6), you should first power upthe BeaconMaster, and then define the Registration Mode in the User Interface of theBeaconMaster (BeaconPoint Configuration, BP Registration screen).Powering up the BeaconPoint initiates its automatic discovery and registration processdescribed below. The parameters for this process should be set first. See next topic.
BeaconWorks User Guide – BeaconPoint: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 33 of 134BeaconPoint: RegisteringSetting Parameters for BeaconPoint RegistrationBefore the BeaconPoints are powered and begin their automatic process of“Discovery” and “Registration”, you should define the parameters of this process.This is done in the BeaconPoint Registration Mode screen.In this screen you define the Security Mode: whether the BeaconMaster shouldautomatically allow all BeaconPoints to register, or whether only approvedBeaconPoints should be allowed.This screen also controls the “Availability” function, whether this BeaconMaster ispaired with another BeaconMaster. If they are paired, then they share informationabout BeaconPoints and if one BeaconMaster fails, the other can continue to provideservice availability. This is discussed in detail later in this Guide (BeaconMasterConfiguration: Availability).Define the Security Mode for registering BeaconPoints1. Select BeaconPoints tab in any screen.2. In the left-hand list, click on BP Registration. The BeaconPoint RegistrationMode screen appears.Screen 13: BeaconPoint Configuration – BP Registration Mode3. To allow all BeaconPoints to connect, click this radio button. (The screen is in thismode by default.)To allow approved BeaconPoints only to connect, click on this radio buttonDuring the “Registration” process, the BeaconMaster’s approval of the serialnumber of the BeaconPoint depends on the security mode that has been set:
BeaconWorks User Guide – BeaconPoint: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 34 of 134•Allow allIf the BeaconMaster does not recognize the serial number, it sends a defaultconfiguration to the BeaconPoint.If it recognizes the serial number, it sends the specific configuration (port andbinding key) set for that BeaconPoint.•Allow approvedIf the BeaconMaster does not recognize the serial number, the operator isprompted to create a configuration.If it recognizes the serial number, it sends the configuration for thatBeaconPoint.Note: It may be advisable, for the initial set up of the network, to select the “AllowAll” option here. This is the most efficient way to get a large number of BeaconPointsregistered with the BeaconMaster.However, after that, you may want to reset this option to “Allow Approved”, so thatno unapproved BeaconPoints would be able to connect. You can modify the status ofan unapproved BeaconPoint in the BeaconPoint Configuration: BP Maintenancescreen described later in this Guide.4. To save the above parameters, click the Save button.Note: The remaining functions in this screen are part of the “Availability” feature,described later in this Guide. Whether this BeaconMaster is Stand-alone (the default)or is Paired with another BeaconMaster, and whether it is the Primary or Secondaryconnection, is part of the “Availability” feature. The Allow dynamic portassignment checkbox is also used as part of the “Availability” feature.Now you can go back to the BeaconPoints and power them on. They will begin theautomatic Discovery and Registration sequence.Discovery and Registration: The DHCP and SLP SolutionBefore you can begin to register the BeaconPoints with the BeaconMaster, you mustensure that the DHCP server on your network supports Option 78. The BeaconPointsrely on these to locate the BeaconMaster during the discovery process, as explainedbelow.The solution to centrally configuring BeaconPoints, and to mass deployment, is totake advantage of two services that are present on most networks: DHCP and SLP.DHCP (Dynamic Host Configuration Protocol), is the standard means of providing IPaddresses dynamically to devices on a network.SLP (Service Location Protocol) is a means of allowing client applications to discovernetwork services without knowing their location beforehand. Devices advertise theirservices, using a Service Agent. In larger installations, a Directory Agent collectsinformation from Service Agents and creates a central repository.A device that is searching for a service makes use of the SLP User Agent to retrieveinformation from Service Agents or Directory Agents. DHCP Option 78 returns a listof IP addresses of Directory Agents.
BeaconWorks User Guide – BeaconPoint: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 35 of 134Meanwhile, the active BeaconMaster has management software that has registereditself as a service. When a BeaconMaster starts up, it queries the DHCP server forOption 78. It registers with the Directory Agents as service type “Chantry”.This information enables the BeaconPoint to discover the location of theBeaconMaster.The BeaconPoint’s Discovery Process and LED SequenceAs soon as the BeaconPoint is powered and connected to the LAN, it begins itsautomatic process to discover and register with the BeaconMaster.For the BP200 the Status LED in the centre also indicates power. The Status LED isdark when unit is off and is green (solid) when the BP has completed discovery and isoperational.BP200← LED→  Status LED  ↓         ↑                              ↑Left LED:                   Right LED:2.4 GHz radio           5 GHz radioactivity                       activityThe BeaconPoint boot sequence is described below:1. When powered on, the BeaconPoint status LED turns from dark to green briefly.Status LED: green (solid) then to dark before beginning boot sequence.2. [available in Release 2.0 only] The BeaconPoint performs a self-test.[available in Release 2.0 only] Status LED: red (solid) if POST failed.3. The “Discovery” mode: the BeaconPoint sends a request to the DHCP server onthe enterprise network for the location of the BeaconMaster. (This isaccomplished through a combination of Service Location Protocol (SLP) andDHCP, as described above.)Status LED: orange (solid) while searching (“Discovery”)Status LED: red-orange (alternate blink) if DHCP server not found on networkStatus LED: green-orange (alternate blink) if SLP issues in failed discovery.4. The BeaconPoint “learns” the IP address of the BeaconMaster,Status LED: orange (blink) when IP address successfully obtained(“Registration” process underway)Status LED: red (blink) if “Registration” fails5. The BeaconPoint sends its serial number (a unique identifier that is hard codedduring manufacture) to the BeaconMaster.Status LED: green (blink) when BeaconPoint finds BeaconMaster (“Standby”status)6. The BeaconMaster sends the BeaconPoint a port IP address and a binding key, asfollows:• If the BeaconMaster does not recognize the serial number, it sends a defaultconfiguration to the BeaconPoint.
BeaconWorks User Guide – BeaconPoint: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 36 of 134• If it does recognize the serial number, it sends the specific configuration (portand binding key) set for that BeaconPoint.The BeaconMaster also adds the BeaconPoint to its database.Status LED: green (blink) when BeaconPoint finds BeaconMaster (“Standby”status)7. When the binding key is received, the BeaconPoint’s status changes from“Standby” to “Active”. It becomes active and is enabled to transmit data traffic.LED: green steady (“Active”)When the BeaconPoint has wireless traffic, you will see a green blink on the trafficLED. On the BP200, the left LED indicates the traffic LED for activity on the 2.4GHz radio, while the right LED indicates activity on the 5 GHz radio.Once a BeaconPoint is registered with a BeaconMaster:• it appears in the side list in the BeaconPoint Configuration: Properties screen,where you can modify the properties and radio parameters.• its two radios appear as available choices in the Virtual Network Configuration:Topology screen, when you are setting up a VNS (for up to four VNS for eachradio).Note: Before a registered BeaconPoint can handle wireless traffic, you must set up aVNS definition, and assign the BeaconPoint’s radios to a VNS. See Virtual NetworkConfiguration.BeaconPoint: Configuring Properties and RadiosView and modify properties of registered BeaconPoints1. Select the BeaconPoints tab in any screen. The BeaconPoint Configurationscreen appears, with a list of registered BeaconPoints.2. Highlight the appropriate BeaconPoint in the list.3. If the selected BeaconPoint is running Release 1.1 software, the properties cannotbe modified. You will see the following message:Screen 14: BeaconPoint Configuration: Message R1.1 version of BP softwareTo schedule a software upgrade for the BeaconPoint, use the BeaconPointConfiguration: BP Maintenance screen, described later in this guide.
BeaconWorks User Guide – BeaconPoint: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 37 of 1344. For a BeaconPoint running Release 2.0 software, click on the BP Properties tabto view basic information about the highlighted BeaconPoint.Screen 15: BeaconPoint Configuration – Properties5. To modify the default information about a selected BeaconPoint, key ininformation in the following fields (where appropriate):Serial #  (Display only) A unique identifier set during manufacture.Name Change the serial number to a unique descriptive name thatmore easily identifies the BeaconPoint.Description  Available for descriptive comments (optional).Port # From the drop-down list, select the ethernet port throughwhich the BeaconPoint can be reached.Hardware Version (Display only) Current version of the BeaconPoint hardware.Application Version (Display only) Current version of the BeaconPoint software.Status (Display only) “Approved” = BeaconPoint has received itsbinding key from the BeaconMaster after the Discoveryprocess. “Pending” = binding key not yet received.Active Clients (Display only) The number of wireless devices currentlyactive on the BeaconPoint.Diversity From the drop-down list, select “Best,” for the best signalfrom both antennas, or “Left” or “Right” to choose either ofthe two diversity antennas.Note: You can modify the status of a BeaconPoint (for example from “Pending” to“Approved”) in the Access Approval screen.3. To save the modified information, click on the Save button.
BeaconWorks User Guide – BeaconPoint: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 38 of 134Screen 16: BeaconPoint Configuration – Properties (after modifications)View and modify the radio settings of registered BeaconPoints1. Select the BeaconPoints tab in any screen. The BeaconPoint Configurationscreen appears, with a list of registered BeaconPoints.2. Highlight the appropriate BeaconPoint in the list. Then click on the appropriateradio tab:•802.11a (5 GHz radio)•802.11 b/g (2.4 GHz radio)Screen 17: BeaconPoint Configuration – Radio 802.11a (5 GHz)The screen displays the default radio settings for each radio on the BeaconPoint.
BeaconWorks User Guide – BeaconPoint: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 39 of 134Note: If this radio has been assigned to a VNS (or up to four VNSs), the VNS namesand MAC addresses will be displayed in the Base Settings area. (See Virtual NetworkConfiguration.)Screen 18: BeaconPoint Configuration – Radio 802.11b/g (2.4 GHz)3. Modify these Base Settings where appropriate.BSS Info (Display only) After VNS configuration, the Basic ServiceSet (BSS) area displays the MAC address on theBeaconPoint for each VNS and the SSIDs of the VNSs towhich this radio has been assigned.DTIM Delivery Traffic Indication Message period. Default is 1.Beacon Period The time units between beacon transmissions. Default is100.Short Retry Limit The maximum number of transmission attempts of a framethat is less than or equal to the RTS Threshold, before afailure condition is indicated. Default is 200.Long Retry Limit The maximum number of transmission attempts of a framethat is greater than the RTS Threshold, before a failurecondition is indicated. Default is 201.RTS Threshold Request To Send Threshold, the size of a data unit belowwhich an RTS/CTS (RTS/Clear to Send) handshake is notperformed. Default is 2346.Frag. Threshold The Fragmentation Threshold, the maximum size of a packetor data unit that can be delivered. Default is 2346.Enable Radios Click checkbox on for each radio.
BeaconWorks User Guide – BeaconPoint: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 40 of 134Radio Settings:Channel (Drop-down list) The wireless channel that the BeaconPointshould use to communicate with wireless devices.802.11a 802.11b/g  Auto Auto36: 5180 MHz 1: 2412 MHz40: 5200 MHz 2: 2417 MHz44: 5220 MHz 3: 2422 MHz48: 5240 MHz 4: 2437 MHz52: 5260 MHz 5: 2432 MHz56: 5280 MHz 6: 2437 MHz60: 5300 MHz 7: 2442 MHz64. 5320 MHz 8: 2447 MHz149: 5745 MHz 9: 2452 MHz153: 5765 MHz 10: 2457 MHz157: 5785 MHz 11: 2462 MHz161: 5805 MHz165: 5825 MHzTx Power Level (Drop-down list) Min, 13%, 25%, 50%, Max.Operational Rate Set (Drop-down list) in MbpsA: Best data rate, 6, 9 12,18, 24, 36, 48, 54B/G: Best data rate, 1, 2, 5.5, 11, 6, 9 12,18, 24, 36, 48, 54Basic Rates (for b radio only) Select a set of basic rates from the drop-down list. The best data rate from the set will be used forcurrent conditions (power vs range)Short Preamble Invoked Click checkbox on to enable.g Radio Settings:Protection Mode (Drop-down list) None, Auto (default), AlwaysProtection Rate (Drop-down list) in Mbps: 1, 2, 5.5, 11 (default)Protection Type (Drop-down list) CTS (Clear To Send),RTS CTS (Request To Send, Clear To Send) – default.4. To save the modified information, click on the Save button.Note: In Release 2.0, a number of the properties of each radio on a BeaconPoint canbe modified (in the BeaconPoint Configuration screen) without requiring a reboot ofthe BeaconPoint.However, modifying the following properties will trigger a reboot of the BeaconPoint:• enabling or disabling either radio• changing the radio channel between “Auto” and any fixed channel number.BeaconPoint: Adding ManuallyAdd and register a BeaconPoint manually1. Select the BeaconPoint tab. In the BeaconPoint Properties screen, click on theAdd BeaconPoint button. The BeaconPoint Configuration subscreen appears.
BeaconWorks User Guide – BeaconPoint: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 41 of 134Screen 19: BeaconPoint Configuration – Add BeaconPoint3. Key in, or select from the drop-down list, information in the following fields:Serial #  A unique identifier set during manufacture.Name A unique name for the BeaconPoint.Description  Available for descriptive comments (optional).Port # The ethernet port through which the BeaconPoint can be reached4. To add the BeaconPoint, click the Add BeaconPoint button.To return to the previous screen, click Close.The BeaconPoint is added with default settings. To modify these settings, use theBeaconPoint Configuration screens described earlier. You can modify the propertiesand the settings for each radio on the BeaconPoint.BeaconPoint Radios on a VNSBefore a registered BeaconPoint can handle wireless traffic, you must set up a VNSdefinition, and assign one or both of the BeaconPoint’s radios to a VNS. See VirtualNetwork Configuration section for details.After you have set up Virtual Network Configuration definitions and assigned theBeaconPoint radios to a VNS (or up to four VNSs), the VNS names and the MACaddresses are displayed in the Base Settings: “BSS Info” area.BeaconPoint Static Configuration: Branch Office DeploymentThe BeaconPoint static configuration feature provides BeaconWorks capability for anetwork with the central office / branch office model.In the branch office scenario, BeaconPoints are installed in remote sites, while theBeaconMaster is in the central office. The BeaconPoints require the capability tointeract both in the local site network and in the central network.To achieve this, the BeaconPoint’s automatic process of discovery and registrationwith the BeaconMaster is disabled, and a static configuration is used instead.
BeaconWorks User Guide – BeaconPoint: StartupChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 42 of 134Set up a BeaconPoint with static configuration1. Select the BeaconPoint tab in any screen. In the BeaconPoint Properties screen,click on the Static Configuration tab. The Static Configuration screen appears.Screen 20: BeaconPoint Configuration: Static Configuration2. To enable static configuration of the BeaconPoint, click the Statically ConfigureBeaconPoint checkbox on.3. Select one of the two methods of IP address assignment for the BeaconPoint:• to enable DHCP, click the radio button on (default), or• to specify the IP address of the BeaconPoint, click the Static Values radiobutton on and fill in the IP Address, Subnet Mask, and Gateway.Note: For first time deployment of the BeaconPoint for a Branch Office scenario, it isrecommended that you use DHCP initially on the central office network to obtain anIP address for the BeaconPoint.Then enter these values in the Static Configuration screen for this BeaconPoint andsave the configuration.4. Add a BeaconMaster IP address to the list of BeaconMasters. Click in the entryfield and key in the address of the BeaconMaster that will control thisBeaconPoint. This allows the BeaconPoint to bypass the discovery process. If thisfield is not filled in, the BeaconPoint will use SLP to discover a BeaconMaster.5. To save the static configuration, click on the Save button.Note: In a “Branch Office” scenario, where the BeaconPoint is configured statically tofunction on a local network whose MTU is lower than 1500, a mechanism on theBeaconMaster automatically adjusts the MTU size to prevent packet fragmentation.The MTU is set in the BeaconMaster Configuration – IP Addresses / Interfaces screenand should not be changed.
BeaconWorks User Guide – Virtual Network Services (VNS): OverviewChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 43 of 134Virtual Network Services (VNS): OverviewVirtual Network Services (VNS) are the key to the advantages that the ChantryBeaconWorks system has to offer. This technique provides a versatile means ofmapping wireless networks to the topology of an existing wired network.When you set up a VNS on the BeaconMaster, you are defining a subnet for a groupof wireless device users. This VNS definition creates a virtual IP subnet where theBeaconMaster acts as a default gateway to wireless devices.Before you begin to define a VNS, you should have determined:•a user access plan for both individual users and user groups• the RADIUS attributes that support the user access plan• the location and identity of the BeaconPoints that will be used on the VNS• the routing mechanism to be used on the VNS• the network addresses that the VNS will use• the type of authentication for wireless device users on the VNS• the specific filters to be applied to the defined users and user groups to controlnetwork access• what privacy mechanisms should be employed between the BeaconPoints and thewireless devices.• whether the VNS is to be used for voice traffic.The user access plan should analyze the enterprise network and identify which usersshould have access to which areas of the network. What areas of the network shouldbe separated? Which users can go out the World Wide Web?The BeaconWorks system relies on authenticating users via a RADIUS server (orother authentication server). To make use of this feature, you will, of course, requiresuch an authentication server on the network. Make sure that the server’s database ofregistered users, with login identification and passwords, is current.Note: It is possible to deploy BeaconWorks without a RADIUS server (and withoutthe authentication of users on the network). In that scenario, select SSID as thenetwork assignment (in the Topology screen described later in this section) and then,in the Authentication screen, click on the None radio button. That means there is noauthentication of users, but BeaconWorks is otherwise operational.The user access plan should also identify the user groups in your enterprise, and thebusiness structure of the enterprise network. You could identify users for variouspurposes, as in these examples:• department (such as Engineering, Sales, Finance)• role (such as student, teacher, library user)• status (such as guest, administration, technician).For each user group, you should set up a Filter ID attribute in the RADIUS server, andthen associate each user in the RADIUS server to at least one Filter ID name.
BeaconWorks User Guide – Virtual Network Services (VNS): OverviewChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 44 of 134Chantry enables you to define specific filtering rules, by Filter ID attribute, that willbe applied to user groups to control network access.What is a VNS?A VNS is an IP subnet that is especially designed to enable Chantry BeaconPoints tointeract with wireless devices.In many ways, a VNS is very similar to a regular IP subnet. However, it has thefollowing required features:1. Each VNS is assigned a unique identifier.2. Each VNS is assigned an SSID. These do not have to be unique.3. Each VNS is assigned a range of IP addresses for wireless devices. All thewireless devices share the same IP address prefix (the part of the IP address thatidentifies the network and subnet).The IP addresses of the wireless devices are assigned dynamically by theBeaconMaster’s DHCP server within the assigned range.(These IP addresses are not “virtual”. They are regular IP addresses, and areunique over the network. These IP addresses are advertised to other hosts on thenetwork so that they can exchange traffic with the wireless devices in the VNS.)Note: Alternatively, you can allow the enterprise network’s DHCP server to providethe IP addresses for the VNS, by enabling DHCP Relay in the Topology screen.4. A single overall filtering policy applies to all the wireless devices within the VNS.However, further filtering can be applied when the wireless user is authenticatedby the RADIUS server.5. When the BeaconMaster creates the VNS, it also creates a virtual IP subnet forthat VNS.Topology of a VNS: OverviewThe first step in setting up a VNS is configuring the topology in the Topology screen.The type of network assignment determines all the other factors of the VNS. Theoptions for network assignment are:•SSID:• has Captive Portal authentication, or no authentication.• requires restricted filtering rules before authentication and, afterauthentication, filtering rules for group Filter IDs.• is used for a VNS supporting wireless voice traffic (QoS).• is used for a VNS supporting third-party APs.• has WEP privacy.•AAA (Authentication, Authorization and Accounting).• has 802.1x authentication• requires filtering rules for group Filter IDs and default filter.• has WEP and WPA privacy.
BeaconWorks User Guide – Virtual Network Services (VNS): OverviewChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 45 of 134The next step to assign the available BeaconPoints (by radio) to the VNS.Multi-SSID: BeaconPoint radios on more than one VNSIn Release 2.0, each radio on a BeaconPoint BP200 can participate in up to fourVNSs, for a total of eight VNSs per BeaconPoint. The Topology screen displays a listof registered BeaconPoints with a checkbox for each radio. A BeaconPoint radio willappear in the list as available for VNS assignment until it has been assigned to fourVNSs. After that, it will no longer appear in the list.After a VNS definition has been saved, the BeaconMaster updates this information onthe BeaconPoint. Each radio acquires up to four SSIDs (one for each VNS it is partof), and broadcasts these during beacon transmission (unless the beacon is suppressedin the VNS topology screen).You can view (in the BeaconPoint Configuration screen) a list of defined VNSs towhich each radio has been assigned.Other network parameters for the VNS topologyIn the Topology area of VNS configuration, you also define other aspects of the VNS,such as the parameters for DHCP for IP address assignment. You might also configurethis VNS for management traffic only, or for Third-Party Access Points, or for VoiceTraffic. (These are described in detail later in this Guide.)Network Assignment and Authentication for a VNSThe second step is to configure the authentication mechanism for the VNS. Theauthentication mechanism depends on the network assignment.Authentication with SSID Network AssignmentIf SSID was selected, there are two authentication options:•None: The wireless device connects to the network, but can only access specifiednetwork destinations (those defined in the Non-Authenticated Filter described inFiltering). No authentication is performed.•Captive Portal: The wireless device connects to the network, but can only accessspecified network destinations (those defined in the Non-Authenticated Filterdescribed in Filtering). One of those destinations is a web page logon screen (theportal in which he is captive), where the user must input an ID and a password.This identification is sent by the BeaconMaster to the RADIUS server forauthentication. Four authentication types are supported by BeaconWorks forCaptive Portal:• PAP (Password Authentication Protocol)• CHAP (Challenge Handshake Authentication Protocol)• MS CHAP (Windows-specific version of CHAP)• MS CHAP v2 (Windows-specific version of CHAP, version 2)Note: For Captive Portal, the RADIUS server must support the selected authenticationtype: PAP, CHAP (RFC2484), MS-CHAP (RFC2433), MS-CHAPv2 (RFC2759).
BeaconWorks User Guide – Virtual Network Services (VNS): OverviewChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 46 of 134Authentication with AAA (802.1x) Network AssignmentIf AAA (802.1x) was selected, the wireless device user requesting network access viaBeaconWorks must first be authenticated. The wireless device’s client utility mustsupport 802.1x. The user’s request for network access along with login identificationor user profile will be forwarded by the BeaconMaster to a RADIUS server.BeaconWorks supports these authentication types:• EAP-TLS Extensible Authentication Protocol - Transport Layer Security that relieson client-side and server-side certificates to perform authentication and can beused to dynamically generate user-based and session-based WEP keys.• EAP-TTLS (EAP with Tunneled Transport Layer Security) is an extension ofEAP-TLS to provide certificate-based, mutual authentication of the client andnetwork through an encrypted tunnel, as well as to generate dynamic, per-user,per-session WEP keys. Unlike EAP-TLS, EAP-TTLS requires only server-sidecertificates.• PEAP (Protected Extensible Authentication Protocol) is a standard to authenticatewireless LAN clients without requiring them to have certificates. In PEAPauthentication, first the user authenticates the authentication server, then theauthentication server authenticates the user.Note: For 802.1x, the RADIUS server must support RADIUS extensions (RFC2869).If the RADIUS servers sends an “access-accept” message to the BeaconMaster, theBeaconMaster’s DHCP server assigns the device its IP address and allows networkaccess controlled by the filtering rules defined for the specific Filter ID associatedwith the wireless device user.RADIUS Server: Location and RedundancyBoth Captive Portal and AAA (802.1x) authentication mechanisms in BeaconWorksrely on a RADIUS server on the enterprise network.In BeaconWorks Release 2.0, up to three RADIUS servers can be identified andprioritized on the BeaconMaster. This means that in the event of a failover of theactive RADIUS server, the BeaconMaster will poll the other servers in the list for aresponse.Filtering for a VNS: How it worksThe Chantry VNS capability provides a technique to apply policy, to allow differentnetwork access to different groups of users. This is done by packet filtering.After setting up the authentication, the next step is to define the filtering rules for thefilters that apply to your network and the VNS you are setting up.Three types of filters are applied by the BeaconMaster in the following order:1.  Non-Authenticated filter, with filtering rules that apply before authentication, tocontrol network access and to direct users to a Captive Portal web page for login.2. Group filters (by Filter ID) for designated user groups, to control access to certainareas of the network, with names that match defined RADIUS Filter ID attributes.3. Default filter, to control access if there is no matching Filter ID for a user.
BeaconWorks User Guide – Virtual Network Services (VNS): OverviewChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 47 of 134Within each type of filter, you define a sequence of filtering rules. This sequence mustbe carefully planned and arranged in the order that you want them to take effect. Youdefine each rule to either allow or deny traffic in either direction:• “In”: from a wireless device in to the network• “Out”: from the network out to the wireless unit.Note: The final rule in any filter should be a catch-all for any traffic that did notmatch a filter. This final rule should either “allow all” or “deny all” traffic, dependingon the requirements for network access. For example, the final rule in a Non-Authenticated Filter for Captive Portal is typically “deny all”. A final “allow all” rulein a Default Filter will ensure that a packet is not dropped entirely if no other matchcan be found.Each rule can be based on any one of the following:• destination IP address, or any IP address within a specified range that is on thenetwork subnet (as a wildcard)• ports, by number and range• protocols (UDP, TCP, etc.)This is how the BeaconMaster software filters traffic:1. The BeaconMaster software attempts to match each packet of a VNS to thefiltering rules that apply to the wireless device user.2. If a filtering rule is matched, the operation (allow or deny) is executed.3. The next packet is fetched for filtering.The filtering sequence depends on the type of authentication:•No authentication (network assignment by SSID)Only the Non-Authenticated filter will apply. Specific network access can bedefined. Since there will be no authentication, the final rule should be “deny all”.•Authentication by Captive Portal (network assignment by SSID)The Non-Authenticated filter will apply before authentication. Specific networkaccess can be defined. The filter should also include a rule to allow all users to getas far as the Captive Portal webpage where the user can enter login identificationfor authentication. When authentication is returned, then the Filter ID group filtersare applied. If no Filter ID matches are found, then the Default filter is applied.•Authentication by AAA (802.1x)Since users have already logged in and have been authenticated, there is no needfor a Non-Authenticated filter. When authentication is returned, then the Filter IDgroup filters are applied. For AAA, a VNS can have a subgoup with Login-LAT-group ID that has its own filtering rules. If no Filter ID matches are found, then theDefault filter is applied.Privacy on a VNS: Overview of WEP and WPAPrivacy is a mechanism that protects data over wireless and wired networks, usuallyby encryption techniques.
BeaconWorks User Guide – Virtual Network Services (VNS): OverviewChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 48 of 134BeaconWorks supports the Wired Equivalent Privacy (WEP) standard common toconventional access points. WEP provides data confidentiality services by encryptingthe data sent between wireless nodes. Each node must use the same encryption key.For a VNS with AAA network assignment, BeaconWorks also provides Wi-FiProtected Access (WPA) privacy, a solution that adds authentication and enhancedWEP encryption with key management. WPA is available in Enterprise Mode (whichspecifies 802.1x authentication and requires an authentication server) or in Pre-SharedKey mode (which relies on a shared secret). Encryption is by Temporal Key IntegrityProtocol (TKIP), which changes the encryption key after a specified interval.Setting up a new VNSClick on the Virtual Network Configuration tab in any screen. The Virtual NetworkConfiguration screen appears. For a new BeaconWorks installation, where no VNShas yet been defined, the screen is blank, except for the Add subnet function.Screen 21: Virtual Network Configuration: Before any VNS definitionsCreate a subnet (VNS)1. In the entry field above the Add subnet button, key in a name that will uniquelyidentify the new VNS.2. Click on the Add subnet button. The name appears in the left-hand list. TheTopology screen appears.3. Highlight the name of the subnet you wish to configure. Its parameters can beconfigured now in the Topology screen.
BeaconWorks User Guide – Virtual Network Services (VNS): OverviewChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 49 of 134Screen 22: Virtual Network Configuration: Topology for a new VNS SubnetConfigure the new VNS (overview of basic steps)1. Select the network assignment mechanism from the Assignment by drop-downlist:•  SSID•AAA2. In the SSID box at the right, key in the SSID that the wireless devices will use toaccess the BeaconPoint.3. Select the BeaconPoints (by radio) to be assigned to this VNS. The displayed listof available BeaconPoints has a checkbox for each radio on the BeaconPoint.Each radio on a BeaconPoint can be assigned to a maximum of four VNSs. Whenthis maximum is reached, the radio will no longer be available in this list.4. Configure other options for this VNS: Allow Management Traffic, Use DHCPRelay, Use 3rd Party APs, or Enable Priority Traffic Handling.5. Define the DHCP settings for this VNS.6. To save the new VNS Topology, click on the Save button.When the new Topology has been saved, the screen changes to display tabs forAuthentication, Filtering and Privacy, for configuring these aspects of the new VNS.The next sections explain several scenarios for possible VNS configurations:• VNS for Captive Portal: Network Assignment by SSID and Authentication byCaptive Portal• VNS with no Authentication: Network Assignment by SSID and no Authentication• VNS for Voice Traffic• VNS with 802.1x Authentication: Network Assignment by AAA (802.1x)
BeaconWorks User Guide – Virtual Network Configuration: A VNS for Captive PortalChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 50 of 134Virtual Network Configuration: A VNS for Captive PortalThis section describes how to set up a VNS for Captive Portal: its Topology,Authentication, Filtering and Privacy.If the authentication technique for network assignment is by Captive Portal, theprocess is as follows. The wireless device requesting network access viaBeaconWorks first gets its IP network assignment from the DHCP server, but canaccess only the specific IP addresses defined in the Non-Authenticated Filter.Typically, one of these addresses is a Captive Portal web page, where the wirelessdevice user can log in and become authenticated.Topology for a VNS for Captive PortalFor a VNS with Captive Portal authentication, select Network Assignment by SSID inthe Topology screen.In the Virtual Network Configuration screen, highlight the VNS name in the left-handlist and click on the Topology tab.Screen 23: Virtual Network Configuration – Topology – SSID AssignmentCreate an SSID for Captive Portal VNS1. Using the Assignment by drop-down list, select SSID.2. In the SSID box at the right, key in the SSID that the wireless devices will use toaccess the BeaconPoint.3. Click the Suppress SSID checkbox on to prevent this SSID from appearing in thebeacon message sent by the BeaconPoint. The wireless device user seekingnetwork access will not see this SSID as an available choice, and will need tospecify it.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for Captive PortalChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 51 of 1344. In the Session Timeout box, key in the number of minutes that a wireless devicecan be inactive before the BeaconMaster closes the session.Identify the BeaconPoint radios that will be assigned to this VNS5. From the displayed list of BeaconPoint Radios that are available throughout thenetwork, check the ones to be assigned to this VNS.Once you have assigned a BeaconPoint radio to four VNSs, it will not appear inthe list for another VNS setup.Note: You can view the VNSs that each radio is participating in by clicking on theappropriate tab for each radio in the BeaconPoint Configuration screenEnable Management Traffic on this VNS6. To allow Management Traffic on this VNS, click the Allow management trafficcheckbox on.Note: This choice invokes the built-in port-based filtering rules for ManagementTraffic, as described earlier in the “Port Type or Function” topic.Enable Third Party Access Points on this VNS7. If this VNS is to be used for third-party access points, click the Use 3rd Party APcheckbox on. The screen changes to include fields to enter the IP Address andMAC Address of the third-party access point.Note: Use this function as part of the process defined in the topic “Setting up a Third-Party Access Point”. For further information, see that section in this Guide.Enable QoS Policy for voice-over-internet traffic on this VNS8. To set up this VNS to prioritize voice-over-internet traffic, click on the PriorityTraffic Handling checkbox. Enable SVP by clicking on the checkbox.Note: There is no authentication on a voice traffic VNS. For more information about avoice traffic VNS, see the “Quality of Service (QoS) on a VNS” in this Guide.Set the IP address for the VNS (for the DHCP server on the BeaconMaster)9. In the Network Address box, key in the network IP address for the VNS.This IP address is the default gateway for the VNS. The BeaconMaster advertisesthis address to the wireless devices when they sign on.10. In the Mask box, key in the appropriate subnet mask for this IP address, toseparate the network portion from the host portion of the address (typically255.255.255.0)The Address Ranges fields populate automatically (based on the IP address youkeyed in) with the range of IP addresses to be assigned to wireless devices usingthis VNS.11. To modify the Address Ranges, key the first available address in the from box.Key the last available address in the to box.12. If there are specific IP addresses to be excluded from this range, click on theExclusions field. The Exclusions subscreen appears.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for Captive PortalChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 52 of 134Screen 24: Virtual Network Configuration – Exclusions subscreen13. In the Exclusions subscreen, key in the IP addresses or address ranges to exclude.Click on the Add button after each entry. Click on the Save button to save thechanges and return to the Topology screen.14. The Broadcast Address field populates automatically, based on the IP addressand subnet mask of the VNS. Modify this if appropriate..15. In the Domain Name box, key in the external enterprise domain name.Set time limits for IP assignments16. In the Default Lease box, accept the default value of 3600 seconds (1 hour), ormodify. This is the default time limit that an IP address would be assigned by theDHCP server to a wireless device.In the Max Lease box, accept the default value is 24000 seconds (40 hours), ormodify. This is the maximum time that an IP address can be assigned.Set the name server configuration17. In the DNS Servers box, key in the IP Address of the Domain Name Server(s) tobe used.18. If the DHCP server uses WINS (Windows Internet Naming Service), key in the IPaddress in the WINS box. If not, leave it blank.Use DHCP Relay for the VNSUse DHCP Relay to force the BeaconMaster to forward DHCP requests to an externalDHCP server on the enterprise network. This function will bypass the local DHCPserver on BeaconMaster (to bypass steps 9 to 18 above). This function allows theenterprise to manage IP address allocation to a VNS from its existing infrastructure.19. To use an external DHCP server, click the Use DHCP Relay checkbox on. TheDHCP Settings area of the screen changes to display only the Gateway IP, Maskand DHCP Server fields. Key in the appropriate IP addresses and mask to reachthe enterprise’s external DHCP server.Note: The range of IP addresses to be assigned to the wireless device users on thisVNS should also be designated on the external DHCP server.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for Captive PortalChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 53 of 134Screen 25: Virtual Network Configuration – Topology – DHCP RelaySave the new VNS20. To save this VNS configuration, click on the Save button.When the new Topology has been saved, the screen changes to display tabs forAuthentication, Filtering and Privacy.Authentication for a VNS for Captive PortalThe next step is to set up the Authentication mechanism for Captive Portal.For Captive Portal, the wireless device connects to the network, but can only accessthe specific network destinations defined in the Non-Authenticated Filter (seeFiltering). One of these destinations should be a web page logon screen (the CaptivePortal). The user must input an ID and a Password. This request for authentication issent by the BeaconMaster to a RADIUS server.Captive Portal authentication relies on a RADIUS server on the enterprise network.You can define more than one RADIUS server for authentication and define thepriority of use in the event of a failover situation.Set up authentication by Captive Portal1. Highlight the VNS name. Click on the Authentication tab. In the Authenticationconfiguration screen, click the Captive Portal radio button. The Captive Portalportion of the screen appears.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for Captive PortalChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 54 of 134Screen 26: Virtual Network Configuration – Authentication – Captive PortalDefine how the BeaconMaster will access the RADIUS server.2. For each RADIUS server to be defined, click on the Add button. The RADIUSServer Configuration popup window appears.Screen 27: Virtual Network Configuration – Authentication CP – Add RADIUS Server3. For each server, fill in the following fields:Server Address The IP address of the RADIUS server.Port # The port used to access the RADIUS server (default: 1812)# of Retries Number of times the BeaconMaster will attempt to accessthe RADIUS serverTimeout The maximum time that a BeaconMaster will wait for aresponse from the RADIUS server, before attempting again(up to the maximum number of retries).
BeaconWorks User Guide – Virtual Network Configuration: A VNS for Captive PortalChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 55 of 1344. Key in the Shared Secret (a password that is required in both directions) that isset up on the RADIUS Server. This password is used to validate the connectionbetween the BeaconMaster and the RADIUS Server.To display the shared secret (in order to proofread your entry before saving theconfiguration), click on the Unmask button. To mask the shared secret again,click on the button again (the button toggles between Mask and Unmask).Note: This precautionary step is recommended at this point in order to avoid an errorlater when the BeaconMaster attempts to communicate with the RADIUS server.5. Select the authentication protocol to be used by the RADIUS server toauthenticate the users of the wireless devices (for Captive Portal authentication).PAP  (Password Authentication Protocol)CHAP  (Challenge Handshake Authentication Protocol)MS CHAP  (Windows-specific version of CHAP)MS CHAP v2 (Windows-specific version of CHAP, version 2)6. To save these settings and return to the main Authentication screen, click on theSave button.To return to the main Authentication screen without saving, click on the Closebutton.Define the RADIUS server priority for RADIUS RedundancyAfter setting up a RADIUS server, its IP address will appear in the RADIUS Serversbox. To allow for RADIUS server redundancy, set up one or two additional server, asdescribed above (three is the maximum).7. To define the priority of the servers, highlight a RADIUS server in the list and usethe Move Up or Move Down key to change the order.The first server in the list is the active one.In the event of a failover of the main RADIUS server (if no response after the setnumber of retries), then the other servers in the list will be polled on a round-robinbasis until one responds.If one of the other servers becomes the active one during a failover, an “A” willappear after that server name.Note: If all defined RADIUS servers fail to respond, a critical message will begenerated in the logs.8. To remove a defined server from the list, highlight it and click on the Deletebutton.9. To modify the parameters of a defined server, highlight it and click on the Editbutton. In the RADIUS Server popup screen, follow steps 2 to 6 described above.Note: It is recommended that the RADIUS databases with names, logins, andattributes be kept synchronous on all RADIUS servers.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for Captive PortalChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 56 of 134Define the Filter ID Values on this VNS.10. In the Filter ID Values entry field, key in the name of a group that you want todefine specific filtering rules for, to control network access. Click on the Addbutton. The Filter ID name appears in the list above.Repeat for additional Filter ID names.These Filter ID names will appear in the Filter ID list in the Filtering screen.Note: These names must match the Filter ID attribute names in the RADIUS server.11. To save the authentication parameters for this VNS, click on the Save button.Configure the appearance of the Captive Portal page1. To design how the Captive Portal authentication page will display for CaptivePortal, click on the Configure button in the Authentication screen. The CaptivePortal Configuration subscreen appears.Screen 28: Captive Portal login configuration2. Key in the text that will appear on the Captive Portal page.Login Label The text that will appear as a label for the user login field inthe Captive Portal screen.Password Label The text that will appear as a label for the user passwordfield3. Key in the locations of the header and footers.Header URL The location of the file to be displayed in the Header portionof the Captive Portal screen. This page can be customized tosuit your company, with logos or other graphics. (Caution:Ensure that such graphics in the header are not so large thatthey push the login area out of view.)Footer URL The location of the file to be displayed in the Footer portionof the Captive Portal screen.Note: You can also add URLs in the header and footer that link to other websites, toallow the wireless device user to access to some specific areas of your enterprise, or tothe World Wide Web, before authentication.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for Captive PortalChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 57 of 1344. In the Message field, key in the message that will appear above the login field togreet the user. For example, this could explain why this Captive Portal page isappearing, and what the user should do.5. To save this configuration, click on Save.6. To see how the Captive Portal page you have designed will look (after saving theconfiguration), click on the View Sample Portal Page button.Filtering Rules for a VNS for Captive PortalThe next step is to configure the filtering rules for a Captive Portal VNS. Three typesof filters are required:• Non-Authenticated Filter, with restrictive filtering rules that apply to all wirelessdevice users before authentication.• Filter ID filtering rules that apply after authentication, when the RADIUS serverreturns the “access-accept” message along with associated Filter ID for the user.• Default filtering rules that apply after authentication, to control network access ifthere are no Filter ID matches for the user.The Non-Authenticated FilterThe Non-Authenticated Filter should allow access to the Captive Portal page IPaddress, as well as to any URLs for the header and footer of the Captive Portal page.The filter should also allow network access to the IP address of the DNS server and tothe Network Address, the Gateway, of the VNS (the VNS Gateway is used as the IPfor the Captive Portal page).You can also set up filtering rules to allow access, before authentication, to explicitlydefined areas of the network. Then you must deny all other access.Redirection and captive portal credentials only apply to HTML traffic, that is, if awireless device user is attempting to reach websites other than those specificallyallowed in the Non-Authenticated Filter, they will be redirected to the alloweddestinations.All other network access will be controlled after the user is authenticated, when theFilter ID or Default filtering rules are applied. The wireless device user who does notauthenticate will not get a wireless session.Define filtering rules for a Non-Authenticated Filter1. In the Virtual Network Configuration screen, click on the Filtering tab. TheFiltering screen appears. Click on the subnet name in the left-hand list. The rightportion of the screen displays the filtering screen for the selected subnet.2. Using the Filter ID drop-down list, select Non-Authenticated.Note: If you defined specific Filter ID Values in the Authentication screen, theseFilter IDs will appear in Filter ID drop-down list.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for Captive PortalChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 58 of 134Screen 29: Virtual Network Configuration – Non-Authenticated Filter for Captive PortalThe Filtering screen automatically provides a “Deny All” rule already in place.Use this rule as the final rule in the Non-Authenticated Filter for Captive Portal.3. For each filtering rule you are defining:IP / Port: Type in the destination IP address. You can also specify an IPrange, a port designation or a port range on that IP address.Protocol: Default is N/A. To specify a protocol, select from the drop-downlist (may include UDP, TCP, IPsec-ESP, IPsec-AH, ICMP).Note: For Captive Portal, select IP / Port and key in the IP address you defined as theNetwork Address in the Topology screen for this VNS (its default gateway)4. Click on the Add button.The information appears in a new line in the Filter Rules area of the screen.5. Highlight the new filtering rule and fill in (or leave unchecked) the threecheckboxes in the combinations that define the traffic access:In: Click checkbox on to refer to traffic from the wireless device thatis trying to get on the network (“going to” the network)Out: Click checkbox on to refer to traffic from the network host that istrying to get to a wireless device. (“coming from” the network)Allow Click checkbox on to allow. Leave unchecked to disallow.Note: For Captive Portal, to allow access to the IP address, check all three boxes on.6.  Edit the order of a filtering rule by highlighting the line and clicking on the Upand Down button. The filtering rules are executed in the order defined here.7. To save the filtering rules, click on the Save button.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for Captive PortalChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 59 of 134Non-Authenticated Filters: ExamplesA basic Non-Authenticated Filter for Captive Portal should have three rules in thefollowing order:In Out Allow IP / Port Descriptionx x x IP address of the DefaultGatewayAllow all incoming wireless devices access to the default gateway ofthe VNS.xx x IP address of the DNSServerAllow all incoming wireless devices access to the DNS server of theVNS.x x *.*.*.* Deny everything else.Note: If you put URLs in the header and footer of the Captive Portal page, you mustinclude a filtering rule to allow traffic to each of these URLs. Put this rule above the“deny everything” rule.Here is another example of a Non-Authenticated Filter that adds two more filteringrules: one denies access to a specific IP address, and the next rule allows only HTMLtraffic, before denying all other access:In Out Allow IP / Port Descriptionx x x IP address of the DefaultGatewayAllow all incoming wireless devices access to the default gateway ofthe VNS.xx x IP address of the DNSServerAllow all incoming wireless devices access to the DNS server of theVNS.x x [a specific IP address, oraddress plus range]Deny all traffic to a specific IP address,or to a specific range within an IP address (such as :0/24)x x x *.*.*.*:80 Allow all port 80 (HTML) traffic.x x *.*.*.*. Deny everything else.Once a wireless device user has logged in on the Captive Portal page, and has beenauthenticated by the RADIUS server, then the following filters will apply:• Filter ID Filter, if a Filter ID associated with this user was returned theauthentication server• Default Filter, if no matching Filter ID was returned from the authentication server.These filters are described in detail in the Filtering for an AAA VNS.Privacy using WEP for a VNS for Captive PortalUse the Privacy screen to set up the static Wired Equivalent Privacy (WEP) keys for aselected VNS, so that it matches the WEP mechanism used on the rest of the network.In BeaconWorks Release 2.0, you can assign each radio on a BeaconPoint to up tofour VNSs by SSID. For each VNS, only one WEP key can be specified.BeaconWorks always uses the first key (key index 0).Set up a Static WEP key for a selected VNS1. In the Virtual Network Configuration screen, click on the Privacy tab. ThePrivacy screen appears.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for Captive PortalChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 60 of 1342. Click on the VNS subnet name in the left-hand list. The right portion of the screendisplays the privacy parameters for the selected subnet.3. For no privacy mechanism on this VNS, click on the None radio button.4. To configure static keys for WEP, click on the Static Keys (WEP) radio button.Screen 30: Virtual Network Configuration – Privacy – Captive Portal VNS5. From the drop-down list, select the WEP Key Length:  40-bit, 104-bit, 128-bit6.  Click on the appropriate radio button to select the Input Method:Input Hex, Input String.7. Type in the WEP key input, as appropriate to the technique selected. The key isgenerated automatically, based on the input.8. To save these settings, click on the Save button.
BeaconWorks User Guide – Virtual Network Configuration: A VNS with No AuthenticationChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 61 of 134Virtual Network Configuration: A VNS with No AuthenticationYou can choose to set up a VNS that will bypass all Chantry authenticationmechanisms and run BeaconWorks with no authentication of a wireless device user.On such a VNS, however, you can still control network access with filtering rules. Seethe Filtering Rules: Non-Authenticated Filter for Captive Portal topic for informationon how to set up filtering rules that allow access only to specified IP addresses andports.Set up a VNS with no authentication1. In the Virtual Network Configuration screen, highlight the VNS name in the left-hand list and click on the Topology tab.2. In the Topology screen, select Network Assignment by SSID.For the remaining Topology parameters, follow the steps described above for aVNS for Captive Portal.Save the new VNS Topology by clicking on the Save button..3. Then click on the Authentication tab for this VNS.Screen 31: Virtual Network Configuration – Authentication – None4. Select the None radio button, for no authentication on this VNS. Click on theSave button.5. In the Filtering screen, define a Non-Authenticated Filter that will control specificnetwork access for any wireless device users on this VNS. These rules should bevery restrictive. The final rule should be a “Deny All” rule.See “Filtering Rules for a VNS for Captive Portal” for more information.The Non-Authenticated Filter for a VNS with no authentication will not have aCaptive Portal page for login.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for Voice Traffic (QoS withSVP)Chantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 62 of 134Virtual Network Configuration: A VNS for Voice Traffic (QoS with SVP)Voice Data Traffic on a Wireless Network: OverviewNew developments are enabling the integration of internet telephony technology onwireless networks – Voice over Internet Protocol (VoIP) using 802.11 wireless localarea networks (WLANs).VoIP over 802.11 WLANs raises various issues including quality-of-service (QoS),call control, network capacity, and network architecture.Wireless voice data requires a constant transmission rate and must be delivered withina time limit. This type of data is called isochronous data. This requirement forisochronous data is in contradiction to the concepts in the 802.11 standard that allowfor data packets to wait their turn, to avoid data collisions. (Regular traffic on awireless network is an asynchronous process in which data streams are broken up byrandom intervals.)The solution is to add mechanisms to the network that give voice data traffic priorityover all other traffic, and allow for continuous transmission of voice traffic.One such mechanism is SpectraLink Voice Protocol (SVP), a protocol developed bySpectraLink for implementation on an access point. The SVP protocol facilitates voiceprioritization over an 802.11 wireless LAN that will carry voice packets fromSpectraLink wireless telephones.In BeaconWorks Release 2.0, you can configure a VNS that supports wireless voice-over-internet devices. Specifically, you can enable SpectraLink Voice Protocol (SVP)on the VNS in order to provide priority queuing on the BeaconPoint.This feature is part of the development of Quality of Service (QoS) mechanisms inBeaconWorks. Such techniques match the needs of specific applications to thenetwork resources available, in order to provide better network traffic flow.Setting up a VNS for Voice TrafficIn order to set up a VNS for voice-over-internet traffic, a number of factors should betaken into account, on the enterprise network and in the BeaconWorks system.On the enterprise network, the wireless telephone users will require access to:• a private branch exchange (PBX), a private telephone system within an enterprise,with such features as voicemail.• a Telephony Gateway, for access to an external standard telephone network, suchas the wireless cellular network or the public switched telephone network (PSTN).Note: The Telephony Gateway should be located on the same subnet as theBeaconMaster.For large deployments, an SVP server is required on the enterprise network.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for Voice Traffic (QoS withSVP)Chantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 63 of 134In BeaconWorks, the VNS that is dedicated voice-over-internet traffic should beconfigured as follows:• Network assignment by SSID• Authentication set to None, since wireless telephone users do not have a userinterface in which they can enter authentication identification• Filtering rules that allow access to the DNS server, to the Telephony Gateway, andthen deny all other traffic.• Privacy using 104-bit WEP key (recommended for greater security).Set up a VNS for voice traffic1. In the Virtual Network Configuration screen, add a new VNS, as described earlier.Then configure the VNS as described below.Screen 32: Virtual Network Configuration: Topology – QoS for Voice Traffic2. In the Topology screen, in the Assignment by field, select SSID from the drop-down list.3. In the QoS Policy area of the screen, enable Priority Traffic Handling by clickingthe checkbox on.Note: It is possible to enable only the Priority Traffic Handling on a VNS withoutusing SVP. The Priority Traffic Handling mode sets the BeaconPoint to give priorityto traffic on this VNS. There is no multicast on with this feature.However, this mode is usually used together with SVP enabled (the next feature)4. To enable SVP on the VNS, click the SVP Enabled checkbox on.When SVP is enabled, multicast traffic is also automatically enabled.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for Voice Traffic (QoS withSVP)Chantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 64 of 1345. Define parameters for multicast. The IP entry field displays an IP address thatSVP can use for multicast. The next field displays one of the BeaconMasterphysical data ports for multicast. You can modify these if required.6. To allow this VNS to handle Push-To-Talk wireless communication, click theSupport Push-To-Talk checkbox on.Note: The Push-To-Talk feature on wireless telephones allows direct communicationbetween any devices open on the same handset channel (like a walkie-talkie).7. Define the remaining parameters of the VNS topology as described earlier fornetwork assignment by SSID.8. To save this VNS configuration, click on the Save button.9. In the Authentication screen, set the Authentication method for this VNS to None.Click on the Save button.10. In the Filtering screen, define filtering rules in the Non-Authenticated Filter thatallow access to the DNS server, to the Telephony Gateway, and then deny allother traffic. Click on the Save button.11 In the Privacy screen, set up Privacy using a 104-bit WEP key. Click on the Savebutton.Configure the BeaconPoint radio for a voice traffic VNSIn the BeaconPoint Configuration screen, make the following changes on theBeaconPoint radio for this VNS, to support SVP requirements:Screen 33: BeaconPoint Configuration for QoS VNS (need screen with correct settings)1. Set the 2.4 Ghz radio to support only B mode (G mode not supported)2. Set the operational radio rate to Best data rate.3.  The save these modifications, click on the Save button.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for AAAChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 65 of 134Virtual Network Configuration: A VNS for AAAThis section describes how to set up a VNS for AAA (802.1x): its Topology,Authentication, Filtering and Privacy.If network assignment is by AAA (802.1x) with 802.1x authentication, the process isas follows. The wireless device user requesting network access via BeaconWorksmust first be authenticated. The wireless device’s client utility must support 802.1x.The user’s request for network access along with login identification or user profilewill be forwarded by the BeaconMaster to a RADIUS server. BeaconWorks supportsthese authentication types:• EAP-TLS Extensible Authentication Protocol - Transport Layer Security that relieson client-side and server-side certificates to perform authentication and can beused to dynamically generate user-based and session-based WEP keys.• EAP-TTLS (EAP with Tunneled Transport Layer Security) is an extension ofEAP-TLS to provide certificate-based, mutual authentication of the client andnetwork through an encrypted tunnel, as well as to generate dynamic, per-user,per-session WEP keys. Unlike EAP-TLS, EAP-TTLS requires only server-sidecertificates.• PEAP (Protected Extensible Authentication Protocol) is a standard to authenticatewireless LAN clients without requiring them to have certificates. In PEAPauthentication, first the user authenticates the authentication server, then theauthentication server authenticates the user.Note: For 802.1x, the RADIUS server must support RADIUS extensions (RFC2869).If the RADIUS servers sends an “access-accept” message to the BeaconMaster, theBeaconMaster’s DHCP server assigns the wireless device its IP address.The BeaconMaster controls network access by means of the filtering rules defined forthe specific Filter ID associated with the wireless device user, as defined in theFiltering screen.For a VNS with AAA (802.1x), privacy by Wi-Fi Protected Access (WPA) isavailable.Topology for a VNS for AAAFor a VNS with 802.1x authentication, select Network Assignment by AAA(Authentication, Authorization, Accounting) in the Topology screen.In the Virtual Network Configuration screen, highlight the VNS name in the left-handlist and click on the Topology tab.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for AAAChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 66 of 134Screen 34: Virtual Network Configuration – Topology – AAA AssignmentCreate an AAA topology1. Using the Assignment by drop-down list, select AAA.2. In the SSID box at the right, key in the SSID that the wireless devices will use toaccess the BeaconPoint.3. Click the Suppress SSID checkbox on to prevent this SSID from appearing in thebeacon message sent by the BeaconPoint. The wireless device user seekingnetwork access will not see this SSID as an available choice, and will need tospecify it.4. In the Session Timeout box, key in the number of minutes that a wireless devicecan be inactive before the BeaconMaster closes the session.Identify the BeaconPoint radios that will be assigned to this VNS5. From the displayed list of BeaconPoint Radios that are available throughout thenetwork, check the ones to be assigned to this VNS.Once you have assigned a BeaconPoint radio to four VNSs, it will not appear inthe list for another VNS setup.Note: You can view the VNSs that each radio is participating in by clicking on theappropriate tab for each radio in the BeaconPoint Configuration screenEnable Management Traffic on this VNS6. To allow Management Traffic on this VNS, click the Allow management trafficcheckbox on.Note: This choice invokes the built-in port-based filtering rules for ManagementTraffic, as described earlier in the “Port Type or Function” topic.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for AAAChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 67 of 134Set the IP address for the VNS (for the DHCP server on the BeaconMaster)7. In the Network Address box, key in the network IP address for the VNS.This IP address is the default gateway for the VNS. The BeaconMaster advertisesthis address to the wireless devices when they sign on.8. In the Mask box, key in the appropriate subnet mask for this IP address, toseparate the network portion from the host portion of the address (typically255.255.255.0)The Address Ranges fields populate automatically (based on the IP address youkeyed in) with the range of IP addresses to be assigned to wireless devices usingthis VNS.9. To modify the Address Ranges, key the first available address in the from box.Key the last available address in the to box.10. If there are specific IP addresses to be excluded from this range, click on theExclusions field. The Exclusions subscreen appears.Screen 35: Virtual Network Configuration – Exclusions subscreen11. In the Exclusions subscreen, key in the IP addresses or address ranges to exclude.Click on the Add button after each entry. Click on the Save button to save thechanges and return to the Topology screen.12. The Broadcast Address field populates automatically, based on the IP address ofthe VNS. Modify this if appropriate..13. In the Domain Name box, key in the external enterprise domain name.Set time limits for IP assignments14. In the Default Lease box, accept the default value of 3600 seconds (1 hour), ormodify. This is the default time limit that an IP address would be assigned by theDHCP server to a wireless device.In the Max Lease box, accept the default value is 24000 seconds (40 hours), ormodify. This is the maximum time that an IP address can be assigned.Set the name server configuration15. In the DNS Servers box, key in the IP Address of the Domain Name Server(s) tobe used.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for AAAChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 68 of 13416. If the DHCP server uses WINS (Windows Internet Naming Service), key in the IPaddress in the WINS box. If not, leave it blank.Use DHCP Relay for the VNSUse DHCP Relay to force the BeaconMaster to forward DHCP requests to an externalDHCP server on the enterprise network. This function will bypass the local DHCPserver on BeaconMaster (to bypass steps 9 to 18 above). This function allows theenterprise to manage IP address allocation to a VNS from its existing infrastructure.17. To use an external DHCP server, click the Use DHCP Relay checkbox on. TheDHCP Settings area of the screen changes to display only the Gateway IP, Maskand DHCP Server fields. Key in the appropriate IP addresses and mask to reachthe enterprise’s external DHCP server.Note: The range of IP addresses to be assigned to the wireless device users on thisVNS should also be designated on the external DHCP server.Save the new VNS for AAA18. To save this VNS configuration, click on the Save button.When the new Topology has been saved, the screen changes to display tabs forAuthentication, Filtering and Privacy.Authentication for a VNS for AAAThe next step is to set up the Authentication mechanism for AAA (802.1x).This type of authentication relies on a RADIUS server on the enterprise network. Youcan define more than one RADIUS server for authentication and define the priority ofuse in the event of a failover situation.Set up authentication by AAA (802.1x) method1. Highlight the VNS name. Click on the Authentication tab. For an AAA VNS, theAAA version of the Authentication screen appears.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for AAAChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 69 of 134Screen 36: Virtual Network Configuration – Authentication – AAADefine how the BeaconMaster will access the RADIUS Server.2. For each RADIUS server to be defined, click on the Add button. The RADIUSServer Configuration popup window appears.Screen 37: Virtual Network Configuration – Authentication AAA – RADIUS Server Configuration3. For each server, fill in the following fields:Server Address The IP address of the RADIUS Server.Port # The port used to access the RADIUS Server (default: 1812)# of Retries Number of times the BeaconMaster will attempt to accessthe RADIUS ServerTimeout The maximum time that a BeaconMaster will wait for aresponse from the RADIUS server, before attempting again(up to the maximum number of retries).
BeaconWorks User Guide – Virtual Network Configuration: A VNS for AAAChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 70 of 1344. Key in the Shared Secret (a password that is required in both directions) that isset up on the RADIUS Server. This password is used to validate the connectionbetween the BeaconMaster and the RADIUS Server.To display the shared secret (in order to proofread your entry before saving theconfiguration), click on the Unmask button. To mask the shared secret again,click on the button again (the button toggles between Mask and Unmask).Note: This precautionary step is recommended at this point in order to avoid an errorlater when the BeaconMaster attempts to communicate with the RADIUS server.5. In the NAS Identifier field, type in the Network Access Server (NAS) identifier, aRADIUS attribute that identifies the server responsible for passing information todesignated RADIUS Servers and then acting on the response returned. [Optional]6. To save these settings and return to the main Authentication screen, click on theSave button. To return to the main Authentication screen without saving, click onthe Close button.Define the RADIUS server priority for RADIUS RedundancyAfter setting up a RADIUS server, its IP address appears in the RADIUS Servers box.To allow for RADIUS server redundancy, set up a second server, as described above.7. To define the priority of the servers, highlight a RADIUS server in the list and usethe Move Up or Move Down key to change the order.The first server in the list is the active one.In the event of a failover of the main RADIUS server (if no response after the setnumber of retries), then the other servers in the list will be polled on a round-robinbasis until one responds.If one of the other servers becomes the active one during a failover, an “A” willappear after that server name.Note: If all defined RADIUS servers fail to respond, a critical message will begenerated in the logs.8. To remove a defined server from the list, highlight it and click on the Deletebutton.9. To modify the parameters of a defined server, highlight it and click on the Editbutton. In the RADIUS Server popup screen, follow steps 2 to 6 described above.Note: It is recommended that the RADIUS databases with names, logins, andattributes be kept synchronous on all RADIUS servers.Define the Filter ID Values on this VNS.10. In the Filter ID Values entry field, key in the name of a group that you want todefine specific filtering rules for, to control network access. Click on the Addbutton. The Filter ID name appears in the list above.Repeat for additional Filter ID names.These Filter ID names will appear in the Filter ID list in the Filtering screen.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for AAAChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 71 of 134Note: These names must match the Filter ID attribute names in the RADIUS server.11. To save the authentication parameters for this VNS, click on the Save button.VNS Topology for an AAA groupYou can set up a group within a VNS that relies on the RADIUS attribute Login-LAT-Group (RFC2865). For each group, you can define filtering rules to control access tothe network.If you define a group within an AAA VNS, the group (or child) definition acquires thesame authentication and privacy parameters as the parent VNS. However, you need todefine a different topology and filtering rules for this group.Set up an AAA Group1. Highlight the VNS name for which you selected AAA as the Assignment methodin the Topology screen. Click on the Authentication tab. For an AAA VNS, theAAA version of the Authentication screen appears.2. To create and define a VNS Group within the selected parent VNS, key in thename in the VNS Group Name field. Then click on the Add button.The Group Name that you defined will appear as a child of the parent VNS in theleft-hand list. (To configure the Topology of a group, see the next topic.)3. To save these settings and create the group VNS definition, click on Save.Configure the VNS Topology for an AAA Group1. To configure the VNS topology for an AAA Group, click on its name in the left-hand list. The Group version of the Topology screen appears.Screen 38: Virtual Network Configuration – Topology – AAA Group
BeaconWorks User Guide – Virtual Network Configuration: A VNS for AAAChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 72 of 1342. Define the DHCP settings for this VNS, as described above for the parent VNS.The Gateway and DHCP Ranges must be different than those of the parent VNS.3. To save the modifications, click on Save.The filtering screen for an AAA Group is described at the end of the Filtering topic.Filtering Rules for a Filter ID groupAfter setting up RADIUS parameters for Authentication and the Filter ID Values, thenext step is to define the filtering rules for the Filter ID Values on the VNS for AAA.When the wireless device user enters a login identification, that identification is sentby the BeaconMaster to the RADIUS server or other authentication server, through asequence of exchanges depending on the type of authentication protocol used.When the server allows this request for authentication (sends an “access-accept”message), the RADIUS server may also send back to the BeaconMaster a Filter IDattribute associated with the user, or a Login-LAT-Group identifier for the user.If the Filter ID attribute (or Login-LAT-Group attribute) from the RADIUS servermatches a Filter ID Value that you have set up on the BeaconMaster, theBeaconMaster applies to the wireless device user the filtering rules that you definedfor that Filter ID Value.Note: The BeaconMaster’s Filter ID Values must match the Filter ID attribute namesin the RADIUS server.If no Filter ID is returned by the authentication server, or no match is found on theBeaconMaster, then the Default Filter and its filtering rules will apply to the wirelessdevice user.Define filtering rules for a Filter ID group1. In the Virtual Network Configuration screen, highlight the VNS name in the listand click on the Filtering tab. The Filtering screen for this VNS appears.2. Using the Filter ID drop-down list, select one of the names you defined in theFilter ID Values field in the Authentication screen [one of your enterprise’s usergroups, such as Sales, Engineering, Teacher, Guest....]
BeaconWorks User Guide – Virtual Network Configuration: A VNS for AAAChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 73 of 134Screen 39: Virtual Network Configuration –Filter ID Value filtering rulesThe screen automatically provides a “Deny All” rule already in place. This can bemodified to “Allow All”, if appropriate to the network access needs for this VNS.3. Select one of the following as the basis for each filtering rule you are defining:IP / Port: Type in the destination IP address, and if desired, the portdesignation on that IP address.Protocol: Select from the drop-down list (may include UDP, TCP, IPsec-ESP, IPsec-AH, ICMP)4. Click on the Add button.The information appears in a new line in the Filter Rules area of the screen.5. Highlight the new filtering rule and fill in (or leave unchecked) the threecheckboxes in the combinations that define the traffic access:In: Click checkbox on to refer to traffic from the wireless device thatis trying to get on the network (“going to” to network)Out: Click checkbox on to refer to traffic from the network host that istrying to get to a wireless device. (“coming from” the network)Allow Click checkbox on to allow. Leave unchecked to disallow..6.  Edit the order of a filtering rule by highlighting the line and clicking on the Upand Down button. The filtering rules are executed in the order defined here7. To save the filtering rules, click on the Save button.Filtering Rules by Filter ID: ExamplesBelow are two examples of possible filtering rules for a Filter ID. The first disallowsonly some specific access before allowing everything else.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for AAAChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 74 of 134In Out Allow IP / Port Descriptionx x *.*.*.*:22-23 Deny all telnet sessionsx x [specific IP address, range] Deny all traffic to a specific IP address, or address rangex x x *.*.*.*. Allow everything else.The second example does the opposite of the first example. It allows only somespecific access and denies everything else.In Out Allow IP / Port Descriptionx x x [specific IP address, range] Allow all traffic to a specific IP address, or address rangex x *.*.*.*. Deny everything else.Filtering Rules for a Default FilterIf, after authentication of the wireless device user, no Filter ID attribute is returned bythe authentication server for this user, or no match is found on the BeaconMaster for aFilter ID Value, then the Default Filter will apply.Define the filtering rules for a Default Filter1. In the Virtual Network Configuration – Filtering screen, using the Filter ID drop-down list, select Default.Screen 40: Virtual Network Configuration – Default Filter2. Follow Steps 2 to 5, as described above.3. To save the filtering rules, click on the Save button.Default Filter: ExamplesHere is an example of filtering rules for a Default Filter:
BeaconWorks User Guide – Virtual Network Configuration: A VNS for AAAChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 75 of 134In Out Allow IP / Port Description / Purposex x Intranet IP, range Deny all access to an IP rangex x Port 80 (HTTP) Deny all access to web browsing.x x Intranet IP Deny all access to a specific IPx x x *.*.*.*. Allow everything else.Here is another example of filtering rules for a Default Filter:In Out Allow IP / Port Description / Purposex Port 80 (HTTP) on host IP Deny all incoming wireless devices access to web browsing the host.xIntranet IP 10.3.0.20, ports10-30Deny all traffic from the network to the wireless devices on the portrange, such as TELNET (port 23) or FTP (port 21).x x Intranet IP 10.3.0.20 Allow all other traffic from the wireless devices to the Intranet network.x x Intranet IP 10.3.0.20 Allow all other traffic from Intranet network to wireless devices.x x x *.*.*.*. Allow everything else.Filtering Rules for an AAA Group VNSIf you defined a child group for an AAA VNS, it will have the same authenticationparameters and Filter IDs as the parent VNS. However, you can define differentfiltering rules for these Filters IDs in the child configuration than in the parentconfiguration.1. In the Virtual Network Configuration screen, highlight the VNS group name in thelist and click on the Filtering tab. The Filtering screen for this VNS groupappears.Screen 41: Virtual Network Configuration – Filtering – AAA Group2. Follow Steps 2 to 5, as described above for a parent VNS.3. To save the filtering rules, click on the Save button.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for AAAChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 76 of 134Filtering Rules between two wireless devicesTraffic from two wireless devices that are on the same VNS and are connected to thesame BeaconPoint will pass through the BeaconMaster and therefore be subject tofiltering policy.You can set up filtering rules that allow each wireless device access to the defaultgateway, but prevent each device from communicating each other. Add the followingtwo rules to a Filter ID filter before allowing everything else:In Out Allow IP / Port Description / Purposex x x [Intranet IP] Allow access to the Gateway IP address of the VNS onlyx x [Intranet IP, range] Deny all access to the VNS subnet range 0/24x x x *.*.*.*. Allow everything else.Privacy for a VNS for AAAUse the Privacy screen to set up privacy mechanisms for a VNS with authenticationby 802.1x (AAA). There are three options• Static keys (WEP)• Dynamic keys• Wi-Fi Protected Access (WPA) version 1, with Temporal Key Integrity Protocol(TKIP).Privacy for a VNS for AAA: WEPSet up static WEP privacy for a selected AAA VNS1. In the Virtual Network Configuration screen, highlight the VNS name in the listand click on the Privacy tab. The Privacy screen for the selected VNS appears.Screen 42: Virtual Network Configuration – Privacy – AAA VNS: Static Keys
BeaconWorks User Guide – Virtual Network Configuration: A VNS for AAAChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 77 of 1342. To use static keys, click on the Static Keys (WEP) radio button.3. From the drop-down list, select the WEP Key Length:  40-bit, 104-bit, 128 bit4.  Click on the appropriate radio button to select the Input Method:Input Hex, Input String.5. Type in the WEP key input, as appropriate to the technique selected. The key isgenerated automatically, based on the input.6. To save these settings, click on the Save button.Set up dynamic WEP privacy for a selected AAA VNSThe dynamic key WEP mechanism changes to key for each user and each session.1. To use dynamic keys, click on the Dynamic Keys radio button.2. To save these settings, click on the Save button.Privacy for a VNS for AAA: Wi-Fi Protected Access (WPA)The VNS Privacy configuration function now includes Wi-Fi Protected Access(WPA) privacy, a new security solution that adds authentication to enhanced WEPencryption and key management.The authentication portion of WPA has two modes:• Enterprise Mode:• Specifies 802.1x with Extensible Authentication Protocol (EAP)• Requires a RADIUS or other authentication server• Uses RADIUS protocols for authentication and key distribution• Centralizes management of user credentials•  Pre-Shared Key (PSK) Mode: Pre-Shared Key for authentication: • Does not require an authentication server (suitable for home or small office) • Uses a Pre-Shared Key (shared secret) used for authentication to the accesspointThe encryption portion of WPA is Temporal Key Integrity Protocol (TKIP). TKIPincludes:•  a per-packet key mixing function that shares a starting key between devices, andthen changes their encryption key for every packet or after the specified re-keytime interval.•  a extended WEP key length of 256-bits• an enhanced Initialization Vector (IV) of 48 bits, instead of 24 bits, making itmore difficult to compromise.•  a Message Integrity Check or Code (MIC), an additional 8-byte code that isinserted before the standard WEP 4-byte Integrity Check Value (ICV). Theseintegrity codes are used to calculate and compare, between sender and receiver,the value of all bits in a message, to ensure that the message has not beentampered with.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for AAAChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 78 of 134The steps in the WPA authentication and encryption process are as follows:1.  The wireless device client associates with BeaconPoint.2.  BeaconPoint blocks the client’s network access while the authentication process iscarried out (the BeaconMaster sends the authentication request to the RADIUSauthentication server)3.  The wireless client provides credentials that are forwarded by the BeaconMasterto the authentication server.4. If the wireless device client is not authenticated, the wireless client stays blockedfrom network access.5. If the wireless device client is authenticated, the BeaconMaster distributesencryption keys to the BeaconPoint and the wireless client.6.  The wireless device client gains network access via the BeaconPoint, sending andreceiving encrypted data. The traffic is controlled with permissions and policyapplied by the BeaconMaster.Set up Wi-Fi Protected Access privacy (WPA) for an AAA VNS1. To set up WPA privacy on the VNS, click on the WPA radio button.Screen 43: Virtual Network Configuration – Privacy – AAA VNS: WPASpecify a re-key interval for WPA Privacy2. To enable re-keying after a time interval, click the Broadcast re-key intervalcheckbox on (the default is on). Type in the re-key time interval (the time afterwhich the broadcast encryption key is changed automatically) in seconds.If the box is unchecked, the Broadcast encryption key is never changed and theBeaconPoint will always use the same broadcast key for Broadcast/Multicasttransmissions. Note that this reduces the level of security for wirelesscommunications.
BeaconWorks User Guide – Virtual Network Configuration: A VNS for AAAChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 79 of 134Enable WPA in PSK mode if there is no authentication server3. To enable WPA-PSK, for authentication on a network without an authenticationserver, click the Pre-Shared Key checkbox on.4. Type in the Pre-Shared Key (PSK), or shared secret, to be used between thewireless device and BeaconPoint. The key should be between 8 and 63 characters.It is used to generate the 256-bit key.5. To display the Pre-Shared Key (in order to proofread your entry before saving theconfiguration), click on the Unmask button. To mask the key again, click on thebutton again (the button toggles between Mask and Unmask).Save the privacy parameters for this VNS6. To save the privacy parameters for the new VNS, click on the Save button.
BeaconWorks User Guide – BeaconMaster Configuration: AvailabilityChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 80 of 134BeaconMaster Configuration: AvailabilityThe BeaconWorks system provides a feature that maintains service availability in theevent of a BeaconMaster outage.The Availability feature links two BeaconMasters as a pair, so that they shareinformation about their BeaconPoints. If one BeaconMaster in a pair fails, then itsBeaconPoints are allowed to connect instead to the second BeaconMaster. The secondBeaconMaster provides the wireless network and a pre-assigned VNS for theBeaconPoint.From the viewpoint of a BeaconPoint, if its home BeaconMaster fails, theBeaconPoint reboots and begins its discovery process. The BeaconPoint will bedirected to the appropriate second BeaconMaster of the pair.Note: The Availability feature relies on SLP and a DHCP server that supports Option78, as described earlier in the BeaconPoint discovery and registration process. TheAvailability feature controls how the paired BeaconMasters register as services withSLP, in normal operations and in the event of an outage.The wireless device users that were on the BeaconPoint must log in again and becomeauthenticated on the second BeaconMaster.The Availability feature is set up in the BeaconPoint Registration Mode screen.Prepare for setting up the Availability featureBefore you begin, the following preparation should be done:• choose which BeaconMaster is the primary and which is the secondary• determine the physical communication link for the TCP/IP connection between thetwo BeaconMasters (this is done over TCP port 13907), and ensure that theinterfaces used for this connection are routable• set up DHCP to support Option 78 for SLP, so that it points to the IP addresses ofboth BeaconMastersNow set up each BeaconMaster separately. One method is as follows:1.  In the BP Registration screen, set up each BeaconMaster in “Stand-alone Mode”and “Secure Mode” (allow only approved BeaconPoints to connect)2. In the VNS Configuration, Topology screen, define a VNS on each BeaconMasterwith the same SSID (but different IP addresses)3. Associate the appropriate BeaconPoints to each BeaconMaster. The BeaconPointswill appear on each BeaconMaster as “Pending” in the Access Approval screen.4. In the BP Registration screen, now enable the two BeaconMasters as a pair, asdescribed below.5. On each BeaconMaster in the Access Approval screen, change the status of therelevant BeaconPoints from “Pending” to “Approved”.
BeaconWorks User Guide – BeaconMaster Configuration: AvailabilityChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 81 of 134A second method to set up the BeaconMasters is as follows:1. In the BP Registration screen, enable the two BeaconMasters as a pair, asdescribed below.2. Add each BeaconPoint manually to each BeaconMaster. (Select the BeaconPointtab. In the BeaconPoint Properties screen, click on the Add BeaconPoint button.The BeaconPoint Configuration subscreen appears. Define the BeaconPoint andclick on the Add BeaconPoint button.)Note: Caution: If two Beacon Masters are paired and one BeaconMaster has the“Allow All” option set for BeaconPoint registration, all BeaconPoints will registerwith that BeaconMaster.Set up two BeaconMasters as a pair, for availability1. On the BeaconMaster that is to be the primary, select BeaconPoints tab in anyscreen. Then, in the left-hand list, click on BP Registration. The BeaconPointRegistration Mode screen appears.Screen 44: BeaconPoint Configuration – Paired BeaconMasters for Availability2. Click the Paired radio button.3. Enter the IP address of the physical port of the secondary BeaconMaster.Note: This IP must be on a routable subnet between the two BeaconMasters.4. Select a Default Failover VNS on the other BeaconMaster from the drop-downlist of VNS’s (this list will be populated only after a VNS has been defined).5. Since this BeaconMaster is to be the primary connection point, click thecheckbox on.6. Set the Security Mode to “Allow Approved” by clicking the radio button.[recommended after initial set up for paired BeaconMasters]
BeaconWorks User Guide – BeaconMaster Configuration: AvailabilityChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 82 of 1347. Click the Allow dynamic port assignment checkbox on. This ensures that theBeaconPoint will always find a port for the return connection to its homeBeaconMaster after a failover.8. To save these settings, click on the Save button.On the BeaconMaster that is to be the secondary one, repeat Steps 1 to 8, with theseexceptions:• In Step 3, enter the IP address of the Management port or physical port of theprimary BeaconMaster.• In Step 5, leave the primary connection point checkbox unchecked.Modifying BP Failover selections for availabilityWhen you have enabled a pair of BeaconMasters as described above, BP Failover isadded as an option in the BeaconPoint Configuration left-hand list.1. Click on BP Failover option. The BeaconPoint Failover – Paired BM screenappears.Screen 45: BeaconPoint Configuration – BP Failover for Paired BMThis screen displays the BeaconPoints registered on the other BeaconMaster of thepair.2. For each BeaconPoint, select a Failover VNS from the drop-down list.This selection overrides the Default Failover VNS selected in the BeaconPointRegistration Mode screen. If no VNS is assigned in here in the BeaconPointFailover – Paired BM screen, then the Default Failover VNS will be used.View the BeaconPoint Availability ReportWhen the BeaconPoint Configuration: BP Registration Mode screen has been savedfor the BeaconMaster in Paired Mode, the BeaconPoint Availability report will showthe status of both “local” and “foreign” BeaconPoints for that BeaconMaster.
BeaconWorks User Guide – BeaconMaster Configuration: AvailabilityChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 83 of 134In normal operations, when Availability is enabled, the “local” BeaconPoints aregreen, and the “foreign” BeaconPoints are red. If  the other BeaconMaster fails, andthe “foreign” BeaconPoints connect to the current BeaconMaster, then the display willshow all BeaconPoints as green. If the BeaconPoints are not attached they do notappear in the report.Screen 46: Report – BeaconPoint AvailabilityView the SLP activity with the “slpdump tool”1. Select BeaconPoints tab in any screen. Then, in the left-hand list, click on BPRegistration. The BeaconPoint Registration Mode screen appears.2. Click on the View SLP Registration button. A popup screen displays the resultsof the “slpdump tool”, showing the recent SLP activity:Screen 47: BeaconPoint configuration – View SLP RegistrationIn normal operations, the primary BeaconMaster registers as an SLP service called“ac_manager” and directs the BeaconPoints to the appropriate BeaconMaster of apair. During an outage, if the remaining BeaconMaster is the secondary one, it willregister as an SLP service  “ru_manager”.
BeaconWorks User Guide – BeaconMaster Configuration: AvailabilityChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 84 of 134Events and actions during a FailoverIf one of the BeaconMasters in a pair fails, then the connection between the twoBeaconMasters is lost. This triggers a “Failover mode” condition, and a criticalmessage appears in the information log of the remaining BeaconMaster.After the BeaconPoint on the failed BeaconMaster loses its connection,  it will attempta reboot. Because of the pairing of the two BeaconMasters, the BeaconPoint will thenregister with the other BeaconMaster.Note: A BeaconPoint connects first to a BeaconMaster registered as “ac_manager”and, if not found, then seeks an “ru_manager”. If the primary BeaconMaster fails, thesecondary one registers as an SLP service  “ru_manager”. This enables the secondaryBeaconMaster to be found by BeaconPoints after they reboot.When the BeaconPoints connect to the second BeaconMaster, they will be assigned tothe Failover VNS defined in setup in that BeaconMaster. The wireless device userswill log in again and be authenticated on the second BeaconMaster.When the failed BeaconMaster recovers, each BeaconMaster in the pair goes back tonormal mode. They exchange information that includes the latest lists of registeredBeaconPoints. The administrator will release the BeaconPoints on the secondBeaconMaster, so that they may re-register with their home BeaconMaster.To support the Availability feature during a “Failover” event,  administrator will needto perform the following actions:1. Monitor the critical messages in the information log of the remainingBeaconMaster for the “Failover mode” message (in the Reports and Displays areaof the user interface).2. After recovery, on the BeaconMaster that did not fail, select the “foreign”BeaconPoints and click on the Release button (in the BeaconPoint Configuration– BP Maintenance screen).
BeaconWorks User Guide – BeaconMaster Configuration: Mobility and the VN ManagerChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 85 of 134BeaconMaster Configuration: Mobility and the VN ManagerThe BeaconWorks system has a technique by which multiple BeaconMasters on anetwork can discover each other and exchange information about a client session. Thisenables a wireless device user to roam seamlessly between different BeaconPoints ondifferent BeaconMasters.The solution introduces the concept of a “VN Manager”. This means that oneBeaconMaster on the network must be designated as the “VN Manager”. All otherBeaconMasters are designated as “VN Agents”. To define whether the BeaconMasteris a Manager or an Agent, use the VN Manager screen in the BeaconMasterConfiguration area.The wireless device will keep the IP address, VNS assignment and filtering rules thatit received from the BeaconMaster that it first connected to – its “home”BeaconMaster. (This information is collected in the Active Clients by VNS display onthe home BeaconMaster.) The VNS on each BeaconMaster must have the same SSID.If the VNS has static WEP, it is recommended that the same key be used.Note: The “VN Manager” concept relies on SLP and DHCP. Before you begin, youmust ensure that the DHCP server on your network supports Option 78. These are alsoused during the BeaconPoint discovery process, and are explained in that topic earlierin this Guide.VN Manager and VN Agent: BackgroundThe BeaconMaster that is the “VN Manager”:• uses SLP to register itself as a service with the SLP Directory Agent• listens for connection attempts from “VN Agents”• if it receives a connection attempt from “VN Agent”, it establishes connection andsends a message to the “VN Agent” specifying the Heartbeat interval, and the VNManager’s IP address.• sends regular Heartbeat messages (which contain wireless device session changesand Agent changes) to the VN Agents and waits for an Update message back• if it fails to receive an Update from the VN Agent after three Heartbeat messages,it sends a Disconnect message to the VN Agent, removes all wireless device usersassociated with that VN Agent BeaconMaster from its tables and closes down theconnection.The BeaconMaster that is a “VN Agent”:• uses SLP to find the location of the VN Manager• attempts to establish a TCP/IP connection with the VN Manager• when it receives the connection-established message (see above), it updates itstables, and sets up data tunnels to and between all BeaconMasters it has beeninformed of• after every Heartbeat massage received, it uses the information to update its owntables and then sends an Update message to the VN Manager, with updates onwireless device users and data tunnels it is managing.
BeaconWorks User Guide – BeaconMaster Configuration: Mobility and the VN ManagerChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 86 of 134Set up a BeaconMaster as a VN Manager1. In the BeaconMaster Configuration screen, click on the VN Manager option. TheVirtual Network Settings for VN Manager screen appears.Screen 48: BeaconMaster Configuration – VN Manager2. From the Role drop-down list, select VN Manager (other options: None, Agent).3.  From the drop-down list, select the Port on the BeaconMaster to be used by theVN Manager process.Note: Ensure that the port selected is routable on the network.4. In the Heartbeat field, type in the time interval at which the VN Manager sends aHeartbeat message to a VN Agent. The default is 5 seconds.5. To save these settings, click on the Save button.If you set up one BeaconMaster on the network as a “VN Manager”, then all otherBeaconMasters must be set up as “VN Agents”. In the VN Manager screen, in theRole drop-down list, select Agent. The Heartbeat value, for a “VN Agent”, is howlong to wait for a connection establishment response before trying again.View displays when VN Managers is enabledWhen a BeaconMaster has been configured as a VN Manager, three additionaldisplays are available in the List of Displays screen:
BeaconWorks User Guide – BeaconMaster Configuration: Mobility and the VN ManagerChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 87 of 134Screen 49: Reports and Displays for a VN Manager: MenuScreen 50: Reports and Displays for a VN Manager: ExamplesTo view the status of the tunnels between the BeaconMasters, click on the BM TunnelTraffic display option. This screen displays the BeaconMasters known to the VNManager. If a tunnel is active, a green band is displayed between BeaconMasters. Ared band indicates that there is no traffic on the tunnel. If the BeaconMasters are notdisplayed, the tunnel is inactive. Screen 51: Reports and Displays for a VN Manager: BM Tunnel TrafficThe Active Clients by VNS display also collects information on the VN ManagerBeaconMasters of for all BeaconPoints, and for the wireless devices that travel, if theyare on the same SSID.
BeaconWorks User Guide – BeaconMaster Configuration: Management UsersChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 88 of 134BeaconMaster Configuration: Management UsersIn this screen you define the login usernames that have access to the GUI, either forAdministrators with “read/write” privileges, or other users with “read only”privileges.Designate BeaconMaster management users1. Click on the BeaconMaster tab in any screen. The BeaconMaster Configurationscreen appears.2. In the left-hand portion of the screen, click on the Management Users option.The Management Users screen appears. .Screen 52: BeaconMaster Configuration – Management UsersThe list on the left is for “Admin” users who have read/write privileges. The right-hand list is for users who have “read only” privileges.To add a User ID, type it in the entry field (on the appropriate side) and click on theAdd user... button.To delete a User ID, click in its checkbox to select it, and then click on the Removeselected user... button.Note: A User ID can only be used once, in only one of these two lists.
BeaconWorks User Guide – BeaconMaster Configuration: Network TimeChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 89 of 134BeaconMaster Configuration: Network TimeUse the Network Time screen to synchronize the elements on the network to auniversal clock. This ensures accuracy in usage logs.The Network Time screen synchronizes in one of two ways:• using system time• using Network Time Protocol (NTP), an Internet standard protocol thatsynchronizes client workstation clocks.Set Network Time parameters1. Click on the BeaconMaster tab in any screen. The BeaconMaster Configurationscreen appears.2. In the left-hand portion of the screen, click on the Network Time option. TheNetwork Time screen appears.Screen 53: BeaconMaster Configuration – Network Time3. From the drop-down list, select the Continent or Ocean, the large-scalegeographic grouping.4. From the drop-down list, select the Country, within the previous group (thecontents of the list will change based on the selection in the previous field).5. From the drop-down list, select the Time Zone Region for the country selected.6. To apply these time zone settings, click on the Apply Time Zone button.7. To use System Time, click on its radio button. Type in the time setting.8. To use Network Time Protocol, click on the NTP radio button. Then fill in thelocation (IP address) of up to three standard NTP Time Servers.9.  To apply these settings, click on the Apply button
BeaconWorks User Guide – Setting up Third-Party Access PointsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 90 of 134Setting up Third-Party Access PointsYour enterprise’s WLAN may have existing third-party access points that you wouldlike to integrate into the Chantry WLAN solution. You can set up the BeaconMasterto handle wireless device traffic from third-party access points, providing the samepolicy and network access control.Set up third-party access points on the BeaconMaster1.  Define one data port as a “3rd-party AP” port:In the BeaconMaster Configuration screen, click on the IP Address option. TheManagement Port Settings and Interfaces screen appears. Highlight theappropriate port, and in the Function field, select “3rd-party AP” from the drop-down list. Make sure that Management Traffic and SLP are disabled for this port.Screen 54: BeaconMaster Configuration – IP Addresses / Interfaces2. Connect the third-party access point to this port, via a switch.3. Define a static route to the access point:In the BeaconMaster Configuration screen, click on the Routing Protocolsoption. Then click the Static Routes tab. The Static Routes screen appears.Define a static route to the access point (see Routing topic earlier).4. Set up a VNS for the “3rd-party AP” port:In the Virtual Network Configuration screen, add a new VNS. Then highlight theVNS name in the left-hand list and click on the Topology tab.
BeaconWorks User Guide – Setting up Third-Party Access PointsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 91 of 134Screen 55: Virtual Network Configuration – Topology for Third-Party APsIn the Topology screen, select Assignment by SSID.Click on the Use 3rd Party AP checkbox to select it.Fill in the IP Address and MAC Address entry fields that appear on the right (theaddresses of the third party access points, and click on the Add button. They willappear in the list of access points known to the BeaconMaster.Follow the remaining steps described in the setting up a VNS for Captive Portalearlier in this Guide.5. Set up Authentication by Captive Portal for the “3rd-party AP” VNS:Click on the Authentication tab. In the Authentication configuration screen, clickthe Captive Portal radio button. In the Captive Portal portion of the screen, definethe RADIUS Attributes and the Filter IDs to match those in RADIUS..Note: Alternatively, for third-party APs, you can define network assignment by AAA,and authentication by 802.1x. The RADIUS requests from the third-party access pointwill flow through the BeaconMaster.6. Set up filtering rules for Filter IDs for the 3rd-Party APs:In the Virtual Network Configuration screen, click on the Filtering tab. TheFiltering screen appears. Click on the subnet name in the left-hand list.Define filtering rules that allow access to other services and protocols on thenetwork such as HTTP, FTP, Telnet, SNMP.In addition, modify the following functions on the third-party access point:• Disable the access point’s DHCP server, so that the IP address assignment for anywireless device on the AP is from the DHCP server at the BeaconMaster with VNSinformation• Disable the third-party access point’s layer 3 IP routing capability and set theaccess point to work as a layer 2 bridge.
BeaconWorks User Guide – Setting up Third-Party Access PointsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 92 of 134Here are the differences between third-party access points and BeaconPoints on theBeaconWorks system:• An access point exchanges data with the BeaconMaster’s data port using standardIP over ethernet protocol. The third-party access points do not support theCAPWAP Tunnelling Protocol (CTP) header for encapsulation.• For third-party access points, the VNS is mapped to the physical data port and thisis the default gateway for mobile units supported by the third-party access points.• A BeaconMaster cannot directly control or manage the configuration of an accesspoint.• Access points are required to broadcast an SSID unique to their segment. ThisSSID cannot be used by any other VNS.• Roaming from access points to BeaconPoints not supported.
BeaconWorks User Guide – BeaconKeeper Mitigator: Detecting Rogue Access PointsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 93 of 134BeaconKeeper Mitigator: Detecting Rogue Access PointsBeaconKeeper Mitigator: OverviewThe BeaconWorks system (Release 2.0)  includes a mechanism that assists in thedetection of rogue access points. The function is called the BeaconKeeper Mitigator.Th BeaconKeeper Mitigator feature has three components:•a radio frequency (RF) scanning task that runs on the BeaconPoint. TheBeaconPoint itself functions as a scan device. Its scan function alternates withproviding its regular service the wireless devices on the network. You set up thescan parameters in the BeaconKeeper user interface.• an application called the RF Data Collector (RFDC) on the BeaconMaster thatreceives and manages the RF scan messages sent by the BeaconPoint. The scandata includes lists of all connected BeaconPoints, third Party APs and otherfriendly APs and the RF scan information that has been collected from theBeaconPoints.•an Analysis Engine on the BeaconMaster that processes the scan data from theRFDC through algorithms that make decisions about whether a detected accesspoint is a rogue access point.Note: In a network with more than one BeaconMaster, the analysis engine should beactive on only one BeaconMaster that communicates with the RFDC applicationsrunning on itself and on the other BeaconMasters on the network.The BeaconKeeper Mitigator function must be enabled in the user interface. Before itis enabled, the BeaconKeeper menu item in the main menu, or the BeaconKeepertab in any screen will only access a popup Rogue Summary report screen:Screen 56: BeaconKeeper Mitigator – Rogue Summary ReportTo enable the BeaconKeeper Mitigator, use the menu option in the BeaconMasterConfiguration area of the user interface.
BeaconWorks User Guide – BeaconKeeper Mitigator: Detecting Rogue Access PointsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 94 of 134BeaconKeeper Mitigator: Enabling the Analysis and RFDC EnginesEnable and configure the BeaconKeeper Mitigator Analysis Engine1. Click on BeaconMaster tab in any screen. The BeaconMaster Configuration areaof the user interface appears. In the left-hand list, click on the BeaconKeeperoption. The BeaconKeeper Mitigator Configuration screen appears.Screen 57: BeaconMaster Configuration – BeaconKeeper Mitigator Configuration2. To enable the Mitigator Analysis Engine, click the checkbox on.Define the BeaconKeeper Mitigator RF Data Collector Engines3. To enable the Mitigator Data Collection Engine on this BeaconMaster click thecheckbox on.4. Identify the remote RF Data Collector Engines that the Analysis Engine will pollfor data: In the Collection Engine IPs entry field, key in the IP address of theBeaconMaster on which the remote RFDC resides. (For this BeaconMaster, thelocal IP address is displayed by default.)5. For each data collection engine, enter:•In the Poll interval field (he interval that the Analysis Engine polls the RFData Collector for data), key in the time in seconds. Default is 30 seconds.•In the Poll retry count field, key in the number of times the Analysis Enginewill attempt to poll the RF Data Collector for data before it stops sendingrequests. Default is 2 attempts.6. Click on the Add button. The IP address of the Data Collection Engine, with itsPoll Interval and Poll Retry parameters, appears in the list.Note: For each remote RF Data Collection Engine you define here, you must alsoenable it (click the checkbox on) in the same screen on the remote BeaconMaster.
BeaconWorks User Guide – BeaconKeeper Mitigator: Detecting Rogue Access PointsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 95 of 134Screen 58: BeaconMaster Configuration – BeaconKeeper Mitigator: Collection Engines7. To clear the entry fields and add a new Collection Engine, click on the AddCollection Engine option. Repeat steps 4 to 6 above.8. To save these settings, click on the Apply button.BeaconKeeper Mitigator: Running ScansAfter enabling the BeaconKeeper engines (as described above), click theBeaconKeeper menu item in the main menu, or the BeaconKeeper tab in anyscreen. The BeaconKeeper Scanner screen appears, with five tabs.Set up and run the BeaconKeeper Mitigator scan task mechanism:1. To set up the parameters of the scan task mechanism, click on the Scan Groupstab. The Scan Groups screen appears.Screen 59: BeaconKeeper Mitigator Scanner – Scan Groups
BeaconWorks User Guide – BeaconKeeper Mitigator: Detecting Rogue Access PointsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 96 of 1343. In the Scan Group Name entry field, key in a name for this Scan Group.4. In the BeaconPoints area, clicking the checkbox on to select the BeaconPoint (orBeaconPoints) that will be included in this Scan Group and will perform the scanfunction.Note: A BeaconPoint can participate in only one Scan Group at a time.It is recommended that the Scan Groups represent geographical groupings ofBeaconPoints.5. In the Radio field, from the drop-down list select which radios on theBeaconPoint are to perform the scan function  Both, A only, B/G only.6. In the Channel List field, from the drop-down list select the radio channels toscan on: All, or Current.7. In the Scan Type field, from the drop-down list select either Active or Passive.• Active: the BeaconPoint sends out ProbeRequests and waits forProbeResponse messages from any access points.• Passive: the BeaconPoint listens for 802.11 beacons8. In the Channel Dwell Time field, key in the time in milliseconds that the scannerwaits for a response (either for 802.11 beacons in passive scanning, orProbeResponse in active scanning).9. In the Scan Time Interval field, key in the time in minutes {1 to 120}, to definethe frequency at which a BeaconPoint within the Scan Group will initiate a scanof the RF space.10. To start a scan, using the periodic scanning parameters defined above, click on theStart Scan button11. To initiate an immediate scan on request, click on the Run Now button.12. To stop the scan, click on the Stop Scan button.Note: You must stop the scan before modifying any parameters of the Scan Group, orbefore adding or removing a BeaconPoint from a Scan Group.13. The Scan Activity field displays the current state of the scan engine.
BeaconWorks User Guide – BeaconKeeper Mitigator: Detecting Rogue Access PointsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 97 of 13414. To view a popup report showing the timeline of scan activity and results, click onthe Show Details button.BeaconKeeper Mitigator: How the Analysis Engine worksThe Analysis Engine relies on a database of known devices on the BeaconWorkssystem as follows:• BeaconPoints registered with any BeaconMaster that has its RF Data Collectorenables and has been associated with the Analysis Engine on this BeaconMaster.• Third-Party Access Points that have been defined and assigned to a VNS (asdescribed earlier in this Guide).• Friendly APs, a list created in the BeaconKeeper Mitigator user interface aspotential rogue access points are designated by the administrator as “Friendly”.The Analysis Engine compares the data from the RF Data Collector with the abovedatabase of known devices.The Analysis Engine looks for access points with seven conditions:• unknown MAC address and unknown SSID (critical alarm)• unknown MAC, with a valid SSID – a known SSID is being broadcast by theunknown access point (critical alarm)• known MAC, with an unknown SSID – a rogue may be spoofing a MAC address(critical alarm)• inactive BeaconPoint with valid SSID (critical alarm)• inactive BeaconPoint with unknown SSID (critical alarm)• known BeaconPoint with an unknown SSID (major alarm)• in ad-hoc mode (major alarm).Note: In Release 2.0, there is no capability to initiate a DoS attack on the detectedrogue access point. Containment of a detected rogue will require an inspection of thegeographical location of its Scan Group area (where its RF activity has been found).View the BeaconKeeper scan results and build list of Friendly APs1. Click on the BeaconKeeper tab in any screen Then click on the RogueDetection tab. The Rogue Detection screen appears displaying all access pointsand BeaconPoints that were found in the scan but are not in the database of knowndevices (as defined above).2. To modify the rate that this information is refreshed, key in a time in seconds andclick on the Apply button.Note: The Rogue Summary button accesses the Rogue Summary popup reportdescribed earlier in this Guide.
BeaconWorks User Guide – BeaconKeeper Mitigator: Detecting Rogue Access PointsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 98 of 134Screen 60: BeaconKeeper Mitigator Scanner – Rogue Detection3. To remove an access point from this list, click on the Delete button.4. To add an access point or BeaconPoint to the Friendly APs list, click on the Addto Friendly List button. The access point item will be removed from this list andwill appear in the Friendly APs list.5. To view the Friendly list, click on the Friendly APs tab. The Friendly APDefinitions screen appears.Screen 61: BeaconKeeper Mitigator Scanner – Friendly APs6. To add friendly access points manually to the Friendly AP Definitions list, key inthe MAC Address, SSID, Channel and a text description of the access point.Click on the Add button. The new access point appears in the list above.
BeaconWorks User Guide – BeaconKeeper Mitigator: Detecting Rogue Access PointsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 99 of 1347. To delete an access point from the list, highlight it and click on the Delete button.8. To modify an access point in the list, highlight it and make the appropriatechanges in the entry fields. Click on the Save button.View the BeaconKeeper list of Third-Party APsTo view the list of the known third-party access points, click on the 3rd Party APstab. The 3rd Party APs screen appears.Screen 62: BeaconKeeper Mitigator Scanner – 3rd Party APsMaintain the BeaconKeeper list of access points and BeaconPointsWhen BeaconPoints or Third-Party Access Points are deleted in the BeaconWorksuser interface on a BeaconMaster has its RFDC running and is in communication withthe Analysis Engine, this information will also be displayed in the BeaconKeeperMitigator’s AP / BP Maintenance screen.1. To view the AP / BP Maintenance screen, click on the AP / BP Maintenance tab..Screen 63: BeaconKeeper Mitigator Scanner – AP / BP MaintenanceThe deleted access points and BeaconPoints will be marked with a “Deleted” flag
BeaconWorks User Guide – BeaconKeeper Mitigator: Detecting Rogue Access PointsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 100 of 1342. To delete the marked access points and BeaconPoints from the BeaconKeeperMitigator’s database, click on the Delete marked AP / BPs button.BeaconKeeper Mitigator: Viewing the Scanner Status ReportWhen the BeaconKeeper Mitigator is enabled, you can view a report on theconnection status of the RF Data Collector Engines with the Analysis Engine.View the BeaconKeeper scanner engine status display1. Click the BeaconKeeper tab in any screen, and then click on the Scanner Statustab. Examples of the connection reports are shown below.  Screen 64: BeaconKeeper Mitigator – Scanner Status ReportThe IP address of the RFDC engine is displayed, with its status:• Connected (green box) – the Analysis Engine has connection with the RFDC onthat BeaconMaster.• Connected but not serviced (yellow box) – the Analysis Engine has connectionwith the RFDC but is not synchronized with it yet.• Not connected (red box) – the Analysis Engine is aware of the RFDC andattempting connection.
BeaconWorks User Guide – Ongoing Operation: BeaconPoint Maintenance – SoftwareChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 101 of 134Ongoing Operation: BeaconPoint Maintenance – SoftwarePeriodically, the software used by the BeaconPoints is altered, either for reasons ofupgrade or security. The new version of the software is installed from theBeaconMaster, using the BeaconPoint Maintenance area of the user interface.You prepare the version of software for each BeaconPoint that will be uploaded to theBeaconPoint in one of time scenarios:• the next time the BeaconPoint connects. Part of the BeaconPoint boot sequence isto seek and install its software from the BeaconMaster.• an immediate upgrade and reboot.BeaconPoint software: Dynamic reconfiguration (without reboot)In Release 2.0, a number of the properties of each radio on a BeaconPoint can bemodified (in the BeaconPoint Configuration screen) without requiring a reboot of theBeaconPoint. However, modifying the following properties does require a reboot:• enabling or disabling either radio• changing the radio channel between “Auto” and any fixed channel number.In addition, the BeaconPoint must be rebooted after it has been added to a VNS, or theradio assignment in a VNS has been changed. Any changes to security also require areboot of the BeaconPoint.BeaconPoint software: Dual image backupThe BeaconPoint in Release 2.0 keeps a backup copy of its software image. When asoftware upgrade is sent to the BeaconPoint, the upgrade becomes the BeaconPoint’scurrent image and the previous image becomes the backup. In the event of failure ofthe current image, the BeaconPoint will run the backup image.Maintain the list of current BeaconPoint software images1. Select the BeaconPoints tab in any screen. The BeaconPoint Configurationscreen appears. Click on the BP Maintenance option in the left-hand list.2. To maintain the list of current BeaconPoint software images, click on the BPSoftware Maintenance tab. The BP Software Maintenance screen appears.
BeaconWorks User Guide – Ongoing Operation: BeaconPoint Maintenance – SoftwareChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 102 of 134Screen 65: BeaconPoint Configuration – BP Maintenance: Software MaintenanceThe Current BP Images area displays the list of BP software versions that havebeen downloaded and are available. (This list appears in the drop-down list ofavailable images in the Controlled Upgrade screen.)3. To select an image as the default image to be used for software upgrade, highlightthe image name in the list and click on the Set as default button.4. To delete a software image from the list, highlight the version in the displayed listof Current BP Images and click on the Delete button.5. To download a new image to be added to the list, fill in the fields in theDownload BP Images area with parameters for FTP transfer: FTP server, UserID, Password, Confirm password, Directory, Filename.Click on the Download button.6. In the Upgrade Behavior area, select one of these radio buttons:• Upgrade when BP connects using setting from Controlled Upgrade• Always upgrade BP to default image (overrides Controlled Upgrade settings)For either choice, click the checkbox on to prevent an upgrade if current imageversion is the same as the upgrade version (this overrides Upgrade Now behavior)7. In the Upgrade Behavior area, click the checkbox on to automatically downgradeBP to default image if BP is at later release number (major/minor rev)8. To save these parameters, click on the Save button.Define the parameters for a BeaconPoint software upgrade1. Select the BeaconPoints tab in any screen. The BeaconPoint Configurationscreen appears. Click on the BP Maintenance option in the left-hand list.
BeaconWorks User Guide – Ongoing Operation: BeaconPoint Maintenance – SoftwareChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 103 of 1342. To set the software upgrade parameters, click on the Controlled Upgrade tab.The Controlled Upgrade screen appears.Screen 66: BeaconPoint Configuration – BP Maintenance: Controlled UpgradeThe top portion of the screen displays a list of the registered BeaconPoints and thecurrent software image on each one.3.  Select a BeaconPoint for software upgrade by clicking its checkbox on. Use theSelect All or Clear All buttons to modify your selections.To save the BeaconPoint selections, click on Save button.4. In the Upgrade Image field, from the drop-down list, select the software versionyou wish to use for the upgrade. (This list is maintained in the BP SoftwareMaintenance screen, described above.) Click on Apply button.The selected image now appears in the Upgrade To column beside the selectedBeaconPoint.5. To run the software upgrade immediately, click on the Upgrade Now button.This will force the selected BeaconPoint to reboot, during which the new softwareversion will be loaded.Note: Some of the settings defined in the BP Software Maintenance screen willoverride the Upgrade Now function. See previous screen.
BeaconWorks User Guide – Ongoing Operation: BeaconPoint Access ApprovalChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 104 of 134Ongoing Operation: BeaconPoint Access ApprovalYou can also view and modify the status of registered BeaconPoints. Use this functionto modify the status of a BeaconPoint from “Pending” to “Approved” for a manualregistration.Modify a BeaconPoint’s registration status (approve access)1. Select the BeaconPoints tab in any screen. The BeaconPoint Configurationscreen appears. Click on the Access Approval option in the left-hand list. TheAccess Approval screen appears.Screen 67: BeaconPoint Configuration – Access ApprovalThe screen displays the current registered BeaconPoints and their currentregistration status.The Home field displays “Local” (this BeaconMaster) or “Foreign” (otherBeaconMaster), if you have set up two BeaconMasters in Paired Mode, asdescribed in the BeaconMaster Configuration: Availability topic.2. Select the BeaconPoints for status change, either by:• clicking the checkbox on to select a specific BeaconPoint, or• using one of the Select BeaconPoints buttons to select by category.3. To perform an action on the selected BeaconPoints, click on one of the Actionbuttons: Approved, Pending, Release, Delete.Note: A typical use of this function is to change a BeaconPoint’s status from“Pending” to “Approved”, if the BeaconMaster was set to register only approvedBeaconPoints, in the BeaconPoint Configuration: BP Registration screen.Use the “Release” function to release “foreign” BeaconPoints after recovery from aFailover, as described in the BeaconMaster Configuration: Availability topic.
BeaconWorks User Guide – Ongoing Operation: BeaconPoint Disassociate a ClientChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 105 of 134Ongoing Operation: BeaconPoint Disassociate a ClientThere are times when you want to cut the connection with a particular wireless device,for service reasons or to deal with a security issue. Using the BeaconMaster userinterface, you can disassociate any wireless device from its BeaconPoint.Disassociate a Wireless Device Client1. Select the BeaconPoints tab in any screen. The BeaconPoint Configurationscreen appears.2. Click on the Client Disassociate option in the left-hand portion the BeaconPointConfiguration screen. The Wireless Unit Disassociate screen appears.Screen 68: BeaconPoint Configuration – Wireless Unit (Client) DisassociateThe Client Disassociate screen displays the current active sessions, the wirelessdevices that are currently active for each BeaconPoint.3. Click on the checkbox to select the wireless device to be disassociated.4. To search for a client by MAC Address, IP Address or User ID, select one andthen key in the parameters and click on the Search button.5. Click on the Disassociate button to terminate the client’s session immediately.
BeaconWorks User Guide – Ongoing Operation: BeaconMaster System MaintenanceChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 106 of 134Ongoing Operation: BeaconMaster System MaintenanceUse the System Maintenance screen to perform various maintenance tasks, including:•  change the log level•  enable and define parameters for Syslog event reporting (see next topic)• enable or disable the collecting of accounting information•  force an immediate system shutdown, with or without reboot.Performing BeaconMaster maintenance functions1. Click on the BeaconMaster tab in any screen. The BeaconMaster Configurationscreen appears. In the left-hand portion of the screen, click on the SystemMaintenance option. The System Maintenance screen appears. .Screen 69: BeaconMaster Configuration – System MaintenanceChange the System Log Level2.  From the drop-down list, select the desired log level (Trace, Info, Minor, Major,Critical). Click on the Apply button.Enable Data Collection for Accounting3.  Click the checkbox on to enable the collecting of accounting data. Click on theApply button.Perform a System Shutdown4.  To shut down the BeaconWorks system, with its BeaconPoints, click on theappropriate radio button:• Halt system, reboot• Halt system, shutdown powerClick on the Apply Now button.
BeaconWorks User Guide – Ongoing Operation: BeaconMaster System MaintenanceChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 107 of 134 Event Messages relayed to a Syslog serverIn addition to viewing BeaconWorks events generated by its internal event server inthe Reports and Displays area of the user interface, you can also relay those messagesto a centralized event server on your enterprise network.The relay is done using the syslog protocol, a protocol used for the transmission ofevent notification messages across networks. In the protocol a device generates amessages, a relay receives and forwards the messages, and a collector (a syslogserver) receives the messages without relaying them.Use the System Maintenance screen, Syslog area, to enable the syslog function and todefine the location of one or more centralized Event Servers (syslog servers).Screen 70: BeaconMaster Configuration – System Maintenance: Syslog enabled1. Click the checkbox on to enable the Syslog function for up to three syslogservers.2. For each enabled syslog server, key in a valid IP address for the server on thenetwork. The default port for syslog is 514.3. In the Facilities area, in the Chantry App. Logs drop-down list, select the loglevel (“local.0” to “local.6”) to be sent to the syslog server. (This will apply to allthree servers.)4. To include additional system messages as well as the standard componentmessages, click the Include all service messages checkbox on. If the box is leftunchecked, only BeaconWorks component messages (logs and traces) are relayed.(This will apply to all three servers.)The system messages that can be included in Release 2.0 are:•  DHCP messages reporting users receiving IP addresses• Startup Manager Task messages reporting component startup and failure.
BeaconWorks User Guide – Ongoing Operation: BeaconMaster System MaintenanceChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 108 of 134If you clicked the Include all service messages checkbox on, the Facilitiesdrop-down list for Service Logs become selectable. Select a log level from thelist.5. To activate the above settings, click on the Apply button.The log level mapping between syslog and BeaconWorks event logging is shownbelow:Syslog BeaconWorksLOG_CRIT CriticalLOG_ERR MajorLOG_WARNING MinorLOG_INFO InformationLOG_DEBUG TraceNote: The syslog daemon must be running on both the BeaconMaster and on theremote syslog server before the logs can be synchronized. If you change the log levelon the BeaconMaster, you must also modify the appropriate setting in the syslogconfiguration on remote syslog server.
BeaconWorks User Guide – Ongoing Operation: BeaconWorks Logs and TracesChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 109 of 134Ongoing Operation: BeaconWorks Logs and TracesBeaconWorks Log and Data FilesThe Chantry BeaconWorks system stores configuration data and log files in flat files.These files include:• event and alarm logs (triggered by events, described below)• trace logs (triggered by component activity, described below)• accounting files (created on a half-hourly basis, up to six files).The files are stored in the operating system and have a maximum size of 1 GB.The accounting files are stored in a directory that is created every day. Eightdirectories are maintained in a circular buffer (when all are full, the most recentreplaces the earliest).The BeaconMaster generates three types of messages (Logs, Traces and Audits). Toview these, select the Logs & Traces tab in any screen.Screen 71: Logs & Traces: Log Display – AllThe details for each type of message are described below.Logs and AlarmsLog messages are triggered by events. The log messages contain the time of event,severity, source component and any details generated by the source component. Themessages are classified at four levels of severity:• Informational, the activity of normal operation•Minor (alarm)• Major (alarm)• Critical (alarm)The alarm messages (minor, major or critical log messages) are triggered by activitiesthat meet certain conditions that should be known and dealt with.
BeaconWorks User Guide – Ongoing Operation: BeaconWorks Logs and TracesChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 110 of 134On the BeaconMaster, conditions such as the following generate an alarm message:• Reboot due to failure• Software upgrade failure on the BeaconMaster• Software upgrade failure on the BeaconPoint• Detection of rogue access point activity without valid IDIf SNMP is enabled on the BeaconMaster, alarm conditions will trigger a trap inSNMP (Simple Network Management Protocol). An SNMP trap is an eventnotification sent by the managed agent (a network device) to the management systemto identify the occurrence of conditions. (See BeaconMaster Configuration: Setting upSNMP for more information on enabling this function on the BeaconMaster.)View the Logs1. Select the Logs & Traces tab in any screen. In the Navigation bar, to view alllogs, click on one of the Log tabs. The Log screen appears (Info shown below).Screen 72: Logs & Traces: Log Display – InfoThe events are displayed in chronological order, sorted by the Timestampcolumn.2. To sort the display by Type or Component, click on the column heading.3. To filter the logs by severity, in order to display only Info, Minor, Major orCritical logs, click on the appropriate Log tab at the top of the screen.4. To refresh the information in any display, click on the Refresh button.5. To export the displayed information from any display as an HTML file, click onthe button.Note: The component called “Langley” is Chantry’s term for the inter-processmessaging infrastructure on the BeaconMaster.
BeaconWorks User Guide – Ongoing Operation: BeaconWorks Logs and TracesChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 111 of 134TracesTrace messages display activity by component. These can be used for systemdebugging, troubleshooting and internal monitoring of software.View the Traces1. To view the list of Traces, messages by component, click on its tab.Screen 73: Logs & Traces: Trace MessagesYou can sort, refresh and export the Trace information, as described for Log displays.AuditsAudit files record administrative changes made to the system. For example, the GUIAudit displays changes to the Graphical User Interface on the BeaconMaster.View the Audits1. To view the GUI Audit display, click on the GUI Audit tab.Screen 74: Logs & Traces: GUI Audit
BeaconWorks User Guide – Ongoing Operation: BeaconWorks Reports and DisplaysChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 112 of 134Ongoing Operation: BeaconWorks Reports and DisplaysView DisplaysTo view BeaconWorks reports and displays, click on the Reports tab in any screen.The List of Displays screen appears, with a menu of available displays. The navigationbar across the top of the screen shows the available Reports.Screen 75: Reports and Displays – List of DisplaysNote: If a BeaconMaster has been configured as a VN Manager, three additionalreports are available in the List of Displays screen. (See the VN Manager topic.)Click on an option in the menu to view its display screen, with current informationabout BeaconMaster and BeaconPoint activity. Some examples are illustrated below.Screen 76: Displays – Active BeaconPointsScreen 77: Displays – Active Clients by VNSScreen 78: Displays – BeaconPoint Availability
BeaconWorks User Guide – Ongoing Operation: BeaconWorks Reports and DisplaysChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 113 of 134View Statistics for BeaconPointsTwo displays show information about activity on a selected BeaconPoint:• Wired Ethernet Statistics by BeaconPoints• Wireless Statistics by BeaconPointsThese displays are snapshots of the BeaconPoint activity at that point in time. Thestatistics displayed are those defined in the 802.11 MIB, defined in the IEEE 802.11standard (in Section 11.4 and Annex D).To view the Wired Ethernet Statistics by BeaconPoints display, click on its optionin the List of Displays menu. The displays lists the registered BeaconPoints in theleft-hand list. Click on the selected BeaconPoint to display its information.Screen 79: Display – Wired Ethernet Statistics by BeaconPointsTo view the Wireless Statistics by BeaconPoints display, click on its option in theList of Displays menu.Screen 80: Display – Wireless Statistics by BeaconPoints
BeaconWorks User Guide – Ongoing Operation: BeaconWorks Reports and DisplaysChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 114 of 134The displays lists the registered BeaconPoints in the left-hand list. Click on theselected BeaconPoint. Then click on the appropriate tab to display information foreach radio on the BeaconPointIf there are associated clients on this radio, you can view information on a selectedclient. Click on the View Client button. The Associated Clients popup windowappears.Screen 81: Display – Wireless Statistics by BeaconPoints: ClientsView ReportsTo view BeaconWorks reports and displays, click on the Reports tab in any screen.The List of Displays screen appears, with a menu of available displays.To access a Report, click on one of the options in the navigation bar across the top ofthe screen. The following reports are currently available in BeaconWorks:To access a Report, click on one of the options in the navigation bar across the top ofthe screen. The following reports are currently available in BeaconWorks:• Forwarding Table (routes defined in the BeaconMaster Routing Protocols screen)• OSPF Neighbor (available is OSPF is enabled in the BeaconMaster RoutingProtocols screen)• OSPF Linkstate (available is OSPF is enabled in the BeaconMaster RoutingProtocols screen)For example, to view the routing table report, click on Forwarding Table tab.Screen 82: Forwarding Table Report
BeaconWorks User Guide – BeaconMaster Configuration: Setting up SNMPChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 115 of 134BeaconMaster Configuration: Setting up SNMPSNMP: BackgroundThe Chantry BeaconWorks system supports Simple Network Management Protocol(SNMP), Version 1 and 2c, for retrieving BeaconMaster statistics and configurationinformation.Simple Network Management Protocol, a set of protocols for managing complexnetworks, sends messages, called protocol data units (PDUs), to different parts of anetwork. Devices on the network that are SNMP-compliant, called agents, store dataabout themselves in Management Information Bases (MIBs) and return this data to theSNMP requesters.The Chantry system accepts SNMP “Set”, “Get” and “Trap” commands. In Release2.0 support is provided for retrieving information from the router MIB-II(SNMP_GET) as well as SNMP traps. Release 2.0 supports the retrieval of wirelessinformation (802.11 MIB).In BeaconWorks Release 2.0, the MIB support includes:1. MIB-II (RFC1213), for the following groups for the router characteristics of theBeaconMaster:• System Group• Interfaces Group• Address Translation Group• IP Group• ICMP Group•TCP Group• UDP GroupNote: Because of limitations in data captured in the control / data planes, MIB IIcompliance is incomplete. For example, esa/IXP ports can only provide the interfacestatistics.2. The Chantry Enterprise MIB, which includes:• 802.11 MIB (IEEE 802.11 standard)• IANAif Type-MIB•IF-MIB• INET-ADDRESS-MIB•IP-FORWARD-MIB•SNMPv2-MIB• SNMPv2-SMI•SNMPv2-TCThe Chantry MIB also includes:• CHANTRY-AC-MIB
BeaconWorks User Guide – BeaconMaster Configuration: Setting up SNMPChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 116 of 134• CHANTRY-PRODUCTS-MIB• CHANTRY-SMI• CHANTRY-VNS-MIBThe MIB is provided for compilation into an external NMS.No support has been provided for automatic device discovery by an external NMS.The BeaconMaster is the only point of SNMP access for the entire system. In effect,the BeaconMaster will proxy sets and gets and alarms from the associatedBeaconPoints.SNMP: Enabling on the BeaconMasterThe Chantry BeaconWorks system also supports the Simple Network ManagementProtocol (SNMP), version 1 and 2c, standard, for system monitoring and alarmreporting. If your enterprise network uses SNMP, you can enable SNMP on theBeaconMaster and define where the BeaconMaster should send the SNMP messages.Setting SNMP Parameters1. Click on the BeaconMaster tab in any screen. The BeaconMaster Configurationscreen appears.2. In the left-hand portion of the screen, click on the SNMP option. The SimpleNetwork Management Protocol screen appears.Screen 83: BeaconMaster Configuration – SNMP Setup
BeaconWorks User Guide – BeaconMaster Configuration: Setting up SNMPChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 117 of 1343. Key in:Contact Name The name of SNMP administrator.Location Location of the SNMP administration machine(descriptive).Read Community Key in the password for Read activity.NameRead/Write  Key in the password for Read/Write activity.Community NameSNMP Port: Key in the destination port for SNMP traps. The industrystandard is 162.[If left blank, no traps are generated.]Forward Traps From the drop-down list, select the severity level of thetraps to be forwarded: Informational, Minor, Major,Critical.Manager A: The IP address of the specific machine on the networkwhere the SNMP traps are monitored.Manager B: The IP address of a second specific machine on thenetwork where the SNMP traps are monitored, if ManagerA is not available.To enable SNMP traps, ensure that the following three fields are defined:• SNMP port• Read Community• Manager A and/or Manager BThe list of SNMP traps supported can be found in the Chantry MIB.
BeaconWorks User Guide – Appendix 1: BeaconWorks System States and LEDsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 118 of 134Appendix 1: BeaconWorks System States and LEDsBeaconMaster System States and LEDsThe BeaconMaster has the two system states:• Enters “Standby” when shut down in the BeaconMaster Configuration – SystemMaintenance screen. The BeaconMaster:•  sends control message to BeaconPoint to enter “Standby” state•  will not handle any wireless traffic or sessions•  disables DHCP, Policy Manager, Security Manager, BeaconPoint Manager,Redirector.•  remains on the wired network.• Enters “Active” state on startup in the user interface. The BeaconMaster can nowrespond to the BeaconPoint’s “discover” message by returning a message that theBeaconPoint can enter the “active” state.The activity and traffic on the BeaconMaster can bemonitored via three LEDs on the back of theBeaconMaster.BeaconPoint BP200 System StatesFor the BP200 the Status LED in the centre also indicates power The Status LED isdark when unit is off and is green (solid) when the BP has completed discovery and isoperational.BP200← LED→  Status LED  ↓         ↑                              ↑Left LED:                   Right LED:2.4 GHz radio           5 GHz radioactivity                       activityThe chart below shows states and corresponding Status LED displays on the BP200:State / Process Description LEDsPower BeaconPoint not powered. offPower Start up: Power On Self Test (POST) steady green (briefly)Power Power On Self Test (POST) successful off (briefly)Discovery If he POST self test is successful, the BP begins “Discovery”process. BeaconPoint is powered on and searching for an activeBeaconMaster. It sends a “discover” message and waits for aresponse.orange (steady)Fail to find DHCP BeaconPoint failed to find DHCP (will stay in this state until aroute appears)red-orange(alternate blink)Failed discovery If there are SLP issues in failed discovery, the LED displaychanges.green-orange(alternate blink)
BeaconWorks User Guide – Appendix 1: BeaconWorks System States and LEDsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 119 of 134Registration BeaconPoint learns the BeaconMaster’s IP address, and canbegin the Registration processorange (blink)FailedRegistrationBeaconPoint fails to learn the BeaconMaster’s IP address. red (blink)Standby 1. BeaconPoint enters this state from “Discovery” when itencounters an active BeaconMaster and completes theRegistration process.2. BeaconPoint enters this state from “Active” when it receives acontrol message from the BeaconMaster to enter this state. If theBeaconPoint has any wireless device traffic, it will drop the traffic.green (blink)BeaconPoint fails to register. It will wait 5 seconds and try again. red (slow blink)Firmware download from the BeaconMaster is in progress orange + green (blink)Active (Ready) BeaconPoint has received a control message from an activeBeaconMaster to enter “active” or “ready” state. It is ready toreceive wireless traffic.Note: The two Traffic LEDs on either side of the Status LEDdisplay a green (blink) if there is active wireless traffic. The leftLED is for the 2.4 GHz radio. The right LED is for the 5 GHz radio.green (steady)
BeaconWorks User Guide – Appendix 2: Glossary of Terms and AcronymsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 120 of 134Appendix 2: Glossary of Terms and AcronymsTERM ExplanationAAA Authentication, Authorization and Accounting. A system in IP-based networking tocontrol what computer resources users have access to and to keep track of the activityof users over a network.Access Point (AP) A wireless LAN transceiver or “base station” that can connect a wired LAN to one ormany wireless devices.Ad-hoc mode An 802.11 networking framework in which devices or stations communicate directlywith each other, without the use of an access point (AP). (Compare InfrastructureMode)AES Advanced Encryption Standard (AES) is an algorithm for encryption that works atmultiple network layers simultaneouslyARP Address Resolution Protocol. A protocol used to obtain the physical addresses (suchas MAC addresses) of hardware units in a network environment. A host obtains such aphysical address by broadcasting an ARP request, which contains the IP address ofthe target hardware unit. If the request finds a unit with that IP address, the unit replieswith its physical hardware address.Association A connection between a wireless device and an Access Point.asynchronous Asynchronous transmission mode (ATM).  A start/stop transmission in which eachcharacter is preceded by a start signal and followed by one or more stop signals.  Avariable time interval can exist between characters.  ATM is the preferred technologyfor the transfer of images.BSS Basic Service Set. A wireless topology consisting of one Access Point connected to awired network and a set of wireless devices. Also called an infrastructure network. Seealso IBSS.Captive Portal A browser-based authentication mechanism that forces unauthenticated users to aweb page. Sometimes called a “reverse firewall”.CHAP Challenge-Handshake Authentication Protocol. One of the two main authenticationprotocols used to verify a user’s name and password for PPP Internet connections.CHAP is more secure than PAP because it performs a three-way handshake duringthe initial link establishment between the home and remote machines. It can alsorepeat the authentication anytime after the link has been established.CLI Command Line Interface.Collision Two Ethernet packets attempting to use the medium simultaneously. Ethernet is ashared media, so there are rules for sending packets of data to avoid conflicts andprotect data integrity. When two nodes at different locations attempt to send data at thesame time, a collision will result. Segmenting the network with bridges or switches isone way of reducing collisions in an overcrowded network.Datagram A datagram is “a self-contained, independent entity of data carrying sufficientinformation to be routed from the source to the destination computer without relianceon earlier exchanges between this source and destination computer and thetransporting network.” (RFC1594). The term has been generally replaced by the termpacket. Datagrams or packets are the message units that the Internet Protocol dealswith and that the Internet transports.Decapsulation See tunnelling.Device Server A specialized, network-based hardware device designed to perform a single orspecialized set of server functions. Print servers, terminal servers, remote accessservers and network time servers are examples of device servers.DHCP Dynamic Host Configuration Protocol. A protocol for assigning dynamic IP addresses
BeaconWorks User Guide – Appendix 2: Glossary of Terms and AcronymsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 121 of 134TERM Explanationto devices on a network.With dynamic addressing, a device can have a different IP address every time itconnects to the network. In some systems, the device’s IP address can even changewhile it is still connected. DHCP also supports a mix of static and dynamic IPaddresses.DHCP consists of two components: a protocol for delivering host-specific configurationparameters from a DHCP server to a host and a mechanism for allocation of networkaddresses to hosts. (Compliant with IETF RFC1531.)Directory Agent(DA)A component of Service Location Protocol (SLP) (RFC 2608) that stores and maintainsa cache of service advertisements that are sent by the Service Agent (SA). Whendeployed, the DA resolves User Agent (UA) service requests.Diversity antennaand receiverDiversity wireless systems are those with two antennas and receivers. A diversityreceiver can choose the strongest signal and therefore can avoid signal conflicts suchas a partial phase cancellation (multipath) or a total phase cancellation (drop-out) froma transmitter with two microphones.DSSS Direct-Sequence Spread Spectrum. A transmission technology used in Local AreaWireless Network (LAWN) transmissions where a data signal at the sending station iscombined with a higher data rate bit sequence, or chipping code, that divides the userdata according to a spreading ratio. The chipping code is a redundant bit pattern foreach bit that is transmitted, which increases the signal’s resistance to interference. Ifone or more bits in the pattern are damaged during transmission, the original data canbe recovered due to the redundancy of the transmission. (Compare FHSS)DTIM DTIM delivery traffic indication message (in 802.11 standard)EAP-TLSEAP-TTLSEAP-TLS Extensible Authentication Protocol - Transport Layer Security. A generalprotocol for authentication that also supports multiple authentication methods, such astoken cards, Kerberos, one-time passwords, certificates, public key authentication andsmart cards. IEEE 802.1x specifies how EAP should be encapsulated in LAN frames.In wireless communications using EAP, a user requests connection to a WLAN throughan access point, which then requests the identity of the user and transmits that identityto an authentication server such as RADIUS. The server asks the access point forproof of identity, which the access point gets from the user and then sends back to theserver to complete the authentication.EAP-TLS provides for certificate-based and mutual authentication of the client and thenetwork. It relies on client-side and server-side certificates to perform authenticationand can be used to dynamically generate user-based and session-based WEP keys.EAP-TTLS (Tunneled Transport Layer Security) is an extension of EAP-TLS to providecertificate-based, mutual authentication of the client and network through an encryptedtunnel, as well as to generate dynamic, per-user, per-session WEP keys. Unlike EAP-TLS, EAP-TTLS requires only server-side certificates.(See also PEAP)ELA (OPSEC) Event Logging API (Application Program Interface) for OPSEC, a module in CheckPoint used to enable third-party applications to log events into the Check Point VPN-1/FireWall-1 management system.Encapsulation See tunnelling.ESS Extended Service Set (ESS). Several Basic Service Sets (BSSs) can be joinedtogether to form one logical WLAN segment, referred to as an extended service set(ESS). The SSID is used to identify the ESS. (See BSS and SSID.)FHSS Frequency-Hopping Spread Spectrum. A transmission technology used in Local AreaWireless Network (LAWN) transmissions where the data signal is modulated with anarrowband carrier signal that “hops” in a random but predictable sequence from
BeaconWorks User Guide – Appendix 2: Glossary of Terms and AcronymsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 122 of 134TERM Explanationfrequency to frequency as a function of time over a wide band of frequencies. Thistechnique reduces interference. If synchronized properly, a single logical channel ismaintained. (Compare DSSS)FQDN Fully Qualified Domain Name. A “friendly” designation of a computer, of the generalform computer.[subnetwork.].organization.domain. The FQDN names must betranslated into an IP address in order for the resource to be found on a network,usually performed by a Domain Name Server.FTM Forwarding Table Manager.FTP File Transfer Protocol.Gateway In the wireless world, an access point with additional software capabilities such asproviding NAT and DHCP. Gateways may also provide VPN support, roaming,firewalls, various levels of security, etc.Gigabit Ethernet The high data rate of the Ethernet standard, supporting data rates of 1 gigabit (1,000megabits) per second.GUI Graphical User InterfaceHeartbeat message A heartbeat message is a UDP data packet used to monitor a data connection, pollingto see if the connection is still alive.In general terms, a heartbeat is a signal emitted at regular intervals by software todemonstrate that it is still alive. In networking, a heartbeat is the signal emitted by aLevel 2 Ethernet transceiver at the end of every packet to show that the collision-detection circuit is still connected.Host (1) A computer (usually containing data) that is accessed by a user working on aremote terminal, connected by modems and telephone lines.(2) A computer that is connected to a TCP/IP network, including the Internet. Eachhost has a unique IP address.HTTP Hypertext Transfer Protocol is the set of rules for transferring files (text, graphicimages, sound, video, and other multimedia files) on the World Wide Web. A Webbrowser makes use of HTTP. HTTP is an application protocol that runs on top of theTCP/IP suite of protocols. (RFC2616: Hypertext Transfer Protocol -- HTTP/1.1)HTTPS Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL, is a Webprotocol that encrypts and decrypts user page requests as well as the pages that arereturned by the Web server. HTTPS uses Secure Socket Layer (SSL) as a sublayerunder its regular HTTP application layering. (HTTPS uses port 443 instead of HTTPport 80 in its interactions with the lower layer, TCP/IP.) SSL uses a 40-bit key size forthe RC4 stream encryption algorithm, which is considered an adequate degree ofencryption for commercial exchange.IBSS Independent Basic Service Set, see BSS. An IBSS is the 802.11 term for an adhocnetwork. See adhoc network.ICMP Internet Control Message Protocol, an extension to the Internet Protocol (IP) definedby RFC792. ICMP supports packets containing error, control, and informationalmessages. The PING command, for example, uses ICMP to test an Internetconnection.ICV ICV (Integrity Check Value) is a 4-byte code appended in standard WEP to the 802.11message. Enhanced WPA inserts an 8-byte MIC just before the ICV. (See WPA andMIC)IE Internet Explorer.IEEE Institute of Electrical and Electronics Engineers, a technical professional association,involved in standards activities.IETF Internet Engineering Task Force, the main standards organization for the Internet.
BeaconWorks User Guide – Appendix 2: Glossary of Terms and AcronymsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 123 of 134TERM ExplanationInfrastructure Mode An 802.11 networking framework in which devices communicate with each other byfirst going through an Access Point (AP). In infrastructure mode, wireless devices cancommunicate with each other or can communicate with a wired network. (See ad-hocmode and BSS.)Internet or IPtelephonyIP or Internet telephony are communications, such as voice, facsimile, voice-messaging applications, that are transported over the Internet, rather than the publicswitched telephone network (PSTN). IP telephony is the two-way transmission of audioover a packet-switched IP network (TCP/IP network).An Internet telephone call has two steps: (1) converting the analog voice signal todigital format, (2) translating the signal into Internet protocol (IP) packets fortransmission over the Internet. At the receiving end, the steps are reversed.Over the public Internet, voice quality varies considerably. Protocols that supportquality of service (QoS) are being implemented to improve this.IP Internet Protocol is the method or protocol by which data is sent from one computer toanother on the Internet. Each computer (host) on the Internet has at least one IPaddress that uniquely identifies it. Internet Protocol specifies the format of packets,also called datagrams, and the addressing scheme. Most networks combine IP with ahigher-level protocol called Transmission Control Protocol (TCP), which establishes avirtual connection between a destination and a source.IPC Interprocess Communication. A capability supported by some operating systems thatallows one process to communicate with another process. The processes can berunning on the same computer or on different computers connected through a network.IPsecIPsec-ESPIPsec-AHInternet Protocol security (IPSec),Internet Protocol security Encapsulating Security Payload (IPsec-ESP). Theencapsulating security payload (ESP) encapsulates its data, enabling it to protect datathat follows in the datagram.Internet Protocol security Authentication Header (IPsec-AH). AH protects the parts ofthe IP datagram that can be predicted by the sender as it will be received by thereceiver.IPsec is a set of protocols developed by the IETF to support secure exchange ofpackets at the IP layer. IPsec has been deployed widely to implement Virtual PrivateNetworks (VPNs).IPsec supports two encryption modes: Transport and Tunnel. Transport mode encryptsonly the data portion (payload) of each packet, but leaves the header untouched. Themore secure Tunnel mode encrypts both the header and the payload. On the receivingside, an IPSec-compliant device decrypts each packet.For IPsec to work, the sending and receiving devices must share a public key. This isaccomplished through a protocol known as Internet Security Association and KeyManagement Protocol/Oakley (ISAKMP/Oakley), which allows the receiver to obtain apublic key and authenticate the sender using digital certificates.isochronous Isochronous data is data (such as voice or video) that requires a constant transmissionrate, where data must be delivered within certain time constraints. For example,multimedia streams require an isochronous transport mechanism to ensure that data isdelivered as fast as it is displayed and to ensure that the audio is synchronized withthe video. Compare: asynchronous processes in which data streams can be broken byrandom intervals, and synchronous processes, in which data streams can be deliveredonly at specific intervals.ISP Internet Service Provider.IV IV (Initialization Vector), part of the standard WEP encryption mechanism thatconcatenates a shared secret key with a randomly-generated 24-bit initializationvector. WPA with TKIP uses 48-bit IVs, an enhancement that significantly increases
BeaconWorks User Guide – Appendix 2: Glossary of Terms and AcronymsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 124 of 134TERM Explanationthe difficulty in cracking the encryption. (See WPA and TKIP)LAN Local Area Network.LSA Link State Advertisements received by the currently running OSPF process. The LSAsdescribe the local state of a router or network, including the state of the router’sinterfaces and adjacencies. See also OSPF.MAC Media Access Control layer. One of two sublayers that make up the Data Link Layer ofthe OSI model. The MAC layer is responsible for moving data packets to and from oneNetwork Interface Card (NIC) to another across a shared channel.MAC address Media Access Control address. A hardware address that uniquely identifies each nodeof a network.MIB Management Information Base is a formal description of a set of network objects thatcan be managed using the Simple Network Management Protocol (SNMP). The formatof the MIB is defined as part of the SNMP. A MIB is a collection of definitions definingthe properties of a managed object within a device. Every managed device keeps adatabase of values for each of the definitions written in the MIB. Definition of the MIBconforms to RFC1155 (Structure of Management Information).MIC Message Integrity Check or Code (MIC), also called “Michael”, is part of WPA andTKIP. The MIC is an additional 8-byte code inserted before the standard 4-byteintegrity check value (ICV) that is appended in by standard WEP to the 802.11message. This greatly increases the difficulty in carrying out forgery attacks.Both integrity check mechanisms are calculated by the receiver and compared againstthe values sent by the sender in the frame. If the values match, there is assurance thatthe message has not been tampered with. (See WPA, TKIP and ICV).MTU Maximum Transmission Unit. The largest packet size, measured in bytes, that anetwork interface is configured to accept. Any messages larger than the MTU aredivided into smaller packets before being sent.MU Mobile Unit, a wireless device such as a PC laptop.multicast,broadcast, unicastMulticast: transmitting a single message to a select group of recipients. Broadcast:sending a message to everyone connected to a network. Unicast: communication overa network between a single sender and a single receiver.NAS Network Access Server, a server responsible for passing information to designatedRADIUS Servers and then acting on the response returned. A NAS-Identifier is aRADIUS attribute identifying the NAS server. (RFC2138)NAT Network Address Translator. A network capability that enables a group of computers todynamically share a single incoming IP address. NAT takes the single incoming IPaddress and creates new IP address for each client computer on the network.Netmask In administering Internet sites, a netmask is a string of 0’s and 1’s that mask or screenout the network part of an IP address, so that only the host computer part of theaddress remains. A frequently-used netmask is 255.255.255.0, used for a Class Csubnet (one with up to 255 host computers). The “.0” in the “255.255.255.0” netmaskallows the specific host computer address to be visible.NIC Network Interface Card. An expansion board in a computer that connects the computerto a network.NMS Network Management System. The system responsible for managing a network or aportion of a network. The NMS talks to network management agents, which reside inthe managed nodes.NTP Network Time Protocol, an Internet standard protocol (built on top of TCP/IP) thatassures accurate synchronization to the millisecond of computer clock times in anetwork of computers. Based on UTC, NTP synchronizes client workstation clocks tothe U.S. Naval Observatory Master Clocks in Washington, DC and Colorado Springs
BeaconWorks User Guide – Appendix 2: Glossary of Terms and AcronymsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 125 of 134TERM ExplanationCO. Running as a continuous background client program on a computer, NTP sendsperiodic time requests to servers, obtaining server time stamps and using them toadjust the client’s clock. (RFC1305)OFDM Orthogonal frequency-division multiplexing, a method of digital modulation in which asignal is split into several narrowband channels at different frequencies. OFDM issimilar to conventional frequency-division multiplexing (FDM). The difference lies in theway in which the signals are modulated and demodulated. Priority is given tominimizing the interference, or crosstalk, among the channels and symbols comprisingthe data stream. Less importance is placed on perfecting individual channels.OFDM is used in European digital audio broadcast services. It is also used in wirelesslocal area networks.OID Object Identifier.OPSEC OPSEC (Open Platform for Security) is a security alliance program created by CheckPoint to enable an open industry-wide framework for interoperability of securityproducts and applications. Products carrying the "Secured by Check Point" seal havebeen tested to guarantee integration and interoperability.OS Operating system.OSI Open System Interconnection. An ISO standard for worldwide communications thatdefines a networking framework for implementing protocols in seven layers. Control ispassed from one layer to the next, starting at the application layer in one station, downthrough the presentation, session, transport, network, data link layer to the physicallayer at the bottom, over the channel to the next station and back up the hierarchy.OSI Layer 3 The Network layer (OSI Layer 3) provides switching and routing technologies, creatinglogical paths, known as virtual circuits, for transmitting data from node to node. Routingand forwarding are functions of this layer, as well as addressing, internetworking, errorhandling, congestion control and packet sequencing.OSPF Open Shortest Path First, an interior gateway routing protocol developed for IPnetworks based on the shortest path first or link-state algorithm. Routers use link-statealgorithms to send routing information to all nodes in an internetwork by calculating theshortest path to each node based on a topography of the Internet constructed by eachnode. Each router sends that portion of the routing table (keeps track of routes toparticular network destinations) that describes the state of its own links, and it alsosends the complete routing structure (topography).Using OSPF, a host that obtains a change to a routing table or detects a change in thenetwork immediately multicasts the information to all other hosts in the network so thatall will have the same routing table information. The host using OSPF sends only thepart that has changed, and only when a change has taken place. (RFC2328)OUI Organizationally Unique Identifier (used in MAC addressing).Packet The unit of data that is routed between an origin and a destination on the Internet orany other packet-switched network. When any file is sent from one place to another onthe Internet, the Transmission Control Protocol (TCP) layer of TCP/IP divides the fileinto packets. Each packet is separately numbered and includes the Internet address ofthe destination. The individual packets for a given file may travel different routesthrough the Internet. When they have all arrived, they are reassembled into the originalfile (by the TCP layer at the receiving end).PAP Password Authentication Protocol is the most basic form of authentication, in which auser’s name and password are transmitted over a network and compared to a table ofname-password pairs. Typically, the passwords stored in the table are encrypted. (SeeCHAP).PDU Protocol Data Unit. A data object exchanged by protocol machines (such asmanagement stations, SMUX peers, and SNMP agents) and consisting of both
BeaconWorks User Guide – Appendix 2: Glossary of Terms and AcronymsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 126 of 134TERM Explanationprotocol control information and user data. PDU is sometimes used as a synonym for``packet’’.PEAP PEAP (Protected Extensible Authentication Protocol) is an IETF draft standard toauthenticate wireless LAN clients without requiring them to have certificates. In PEAPauthentication, first the user authenticates the authentication server, then theauthentication server authenticates the user. If the first phase is successful, the user isthen authenticated over the SSL tunnel created in phase one using EAP-GenericToken Card (EAP-GTC) or Microsoft Challenged Handshake Protocol Version 2(MSCHAP V2). (See also EAP-TLS)PHP server Hypertext Preprocessor.PKI Public Key InfrastructurePoE Power over Ethernet. The Power over Ethernet standard (802.3af) defines how powercan be provided to network devices over existing Ethernet connection, eliminating theneed for additional external power supplies.POST Power On Self Test, a diagnostic testing sequence performed by a computer todetermine if its hardware elements are present and powered on. If so, the computerbegins its boot sequence.push-to-talk (PTT) The push-to-talk (PTT) is feature on wireless telephones that allows them to operatelike a walkie-talkie in a group, instead of standard telephone operation. The PTTfeature requires that the network be configured to allow multicast traffic.A PTT call is initiated by selecting a channel and pressing the “talk” key on the wirelesstelephone. All wireless telephones on the same network that are monitoring thechannel will hear the transmission. On a PTT call you hold the button to talk andrelease it to listen.QoS Quality of Service. A term for a number of techniques that intelligently match the needsof specific applications to the network resources available, using such technologies asFrame Relay, Asynchronous Transfer Mode (ATM), Ethernet and 802.1 networks,SONET, and IP-routed networks. QoS features provide better network service bysupporting dedicated bandwidth, improving loss characteristics, avoiding andmanaging network congestion, shaping network traffic, setting traffic priorities acrossthe network.Quality-of-Service (QoS): A set of service requirements to be met by the network whiletransporting a flow. (RFC2386)RADIUS Remote Authentication Dial-In User Service. An authentication and accounting systemthat checks UserName and Password and authorizes access to a network. TheRADIUS specification is maintained by a working group of the IETF (RFC2865,RFC2866.)RFC Request for Comments, a series of notes about the Internet, submitted to the IETF anddesignated by an RFCnumber, that may evolve into an Internet standard.Roaming In 802.11, roaming occurs when a wireless device (a station) moves from one AccessPoint to another (or BSS to another) in the same Extended Service Set (ESS) –identified by its SSID.RP-SMA Reverse Polarity-Subminiature version A, a type of connector used with wirelessantennasRSN Robust Security Network. A new standard within IEEE 802.11 to provide security andprivacy mechanisms. The RSN (and related TSN) both specify IEEE 802.1xauthentication with Extensible Authentication Protocol (EAP).RSSI RSSI received signal strength indication (in 802.11 standard)RTS / CTS RTS request to send, CTS clear to send (in 802.11 standard)
BeaconWorks User Guide – Appendix 2: Glossary of Terms and AcronymsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 127 of 134TERM ExplanationSegment In ethernet networks, a section of a network that is bounded by bridges, routers orswitches. Dividing a LAN segment into multiple smaller segments is one of the mostcommon ways of increasing available bandwidth on the LAN.SLP Service Location Protocol. A method of organizing and locating the resources (such asprinters, disk drives, databases, e-mail directories, and schedulers) in a network. UsingSLP, networking applications can discover the existence, location and configuration ofnetworked devices. (From RFC2165)SMI Structure of Management Information. A hierarchical tree structure for information thatunderlies Management Information Bases (MIBs), and is used by the SNMP protocol.Defined in RFC1155 and RFC1442 (SNMPv2).SMT (802.11) Station ManagemenT. The object class in the 802.11 MIB that provides the necessarysupport at the station to manage the processes in the station such that the station maywork cooperatively as a part of an IEEE 802.11 network. The four branches of the802.11 MIB are:•  dot11smt - objects related to station management and local configuration•  dot11mac - objects that report/configure on the status of various MAC parameters•  dot11res – Objects that describe available resources•  dot11phy – Objects that report on various physical items.SNMP Simple Network Management Protocol. A set of protocols for managing complexnetworks. SNMP works by sending messages, called protocol data units (PDUs), todifferent parts of a network. SNMP-compliant devices, called agents, store data aboutthemselves in Management Information Bases (MIBs) and return this data to theSNMP requesters.SNMP includes a limited set of management commands and responses. Themanagement system issues Get, GetNext and Set messages to retrieve single ormultiple object variables or to establish the value of a single variable. The managedagent sends a Response message to complete the Get, GetNext or Set.SNMP trap An event notification sent by the SNMP managed agent to the management system toidentify the occurrence of conditions (such as a threshold that exceeds apredetermined value).SSH Secure Shell, sometimes known as Secure Socket Shell, is a Unix-based commandinterface and protocol for securely getting access to a remote computer. SSH is a suiteof three utilities - slogin, ssh, and scp - secure versions of the earlier UNIX utilities,rlogin, rsh, and rcp. With SSH commands, both ends of the client/server connectionare authenticated using a digital certificate, and passwords are protected by beingencrypted.SSID Service Set Identifier. A 32-character unique identifier attached to the header ofpackets sent over a Wireless LAN that acts as a password when a wireless device triesto connect to the Basic Service Set (BSS). Several BSSs can be joined together toform one logical WLAN segment, referred to as an extended service set (ESS). TheSSID is used to identify the ESS.In 802.11 networks, each Access Point advertises its presence several times persecond by broadcasting beacon frames that carry the ESS name (SSID). Stationsdiscover APs by listening for beacons, or by sending probe frames to search for an APwith a desired SSID. When the station locates an appropriately-named Access Point, itsends an associate request frame containing the desired SSID. The AP replies with anassociate response frame, also containing the SSID.Some APs can be configured to send a zero-length broadcast SSID in beacon framesinstead of sending their actual SSID. The AP must return its actual SSID in the proberesponse.
BeaconWorks User Guide – Appendix 2: Glossary of Terms and AcronymsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 128 of 134TERM ExplanationSSL Secure Sockets Layer. A protocol developed by Netscape for transmitting privatedocuments via the Internet. SSL works by using a public key to encrypt data that’stransferred over the SSL connection. URL’s that require an SSL connection start withhttps: instead of http.SSL uses a program layer located between the Internet’s Hypertext Transfer Protocol(HTTP) and Transport Control Protocol (TCP) layers. The “sockets” part of the termrefers to the sockets method of passing data back and forth between a client and aserver program in a network or between program layers in the same computer. SSLuses the public-and-private key encryption system from RSA, which also includes theuse of a digital certificate.SSL has recently been succeeded by Transport Layer Security (TLS), which is basedon SSL.Subnet mask (See “netmask”)Subnets Portions of networks that share the same common address format. A subnet in aTCP/IP network uses the same first three sets of numbers (such as 198.63.45.xxx),leaving the fourth set to identify devices on the subnet. A subnet can be used toincrease the bandwidth on the network by breaking the network up into segments.SVP SpectraLink Voice Protocol, a protocol developed by SpectraLink to be implementedon access points in order to facilitate voice prioritization over an 802.11 wireless LANthat will carry voice packets from SpectraLink wireless telephones.Switch In networks, a device that filters and forwards packets between LAN segments.Switches operate at the data link layer (layer 2) and sometimes the network layer(layer 3) of the OSI Reference Model and therefore support any packet protocol. LANsthat use switches to join segments are called switched LANs or, in the case of Ethernetnetworks, switched Ethernet LANs.syslog A protocol used for the transmission of event notification messages across networks,originally developed on the University of California Berkeley Software Distribution(BSD) TCP/IP system implementations, and now embedded in many other operatingsystems and networked devices. A device generates a messages, a relay receives andforwards the messages, and a collector (a syslog server) receives the messageswithout relaying them.Syslog uses the user datagram protocol (UDP) as its underlying transport layermechanism. The UDP port that has been assigned to syslog is 514. (RFC3164)TCP / IP Transmission Control Protocol. TCP, together with IP (Internet Protocol), is the basiccommunication language or protocol of the Internet. Transmission Control Protocolmanages the assembling of a message or file into smaller packets that are transmittedover the Internet and received by a TCP layer that reassembles the packets into theoriginal message. Internet Protocol handles the address part of each packet so that itgets to the right destination.TCP/IP uses the client/server model of communication in which a computer user (aclient) requests and is provided a service (such as sending a Web page) by anothercomputer (a server) in the network.TFTP Trivial File Transfer Protocol. An Internet software utility for transferring files that issimpler to use than the File Transfer Protocol (FTP) but less capable. It is used whereuser authentication and directory visibility are not required. TFTP uses the UserDatagram Protocol (UDP) rather than the Transmission Control Protocol (TCP). TFTPis described formally in Request for Comments (RFC) 1350.Thin AP(Lightweight AP)A thin AP architecture uses two components: an access point that is essentially astripped-down radio and a centralized management controller that handles the otherWLAN system functions. Wired network switches are also required.A fat (or thick) AP architecture concentrates all the WLAN intelligence in the access
BeaconWorks User Guide – Appendix 2: Glossary of Terms and AcronymsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 129 of 134TERM Explanationpoint. The AP handles the radio frequency (RF) communication, as well asauthenticating users, encrypting communications, secure roaming, WLANmanagement, and in some cases, network routing.TKIP Temporal Key Integrity Protocol (TKIP) is an enhancement to the WEP encryptiontechnique that uses a set of algorithms that rotates the session keys. TKIP’s enhancedencryption includes a per-packet key mixing function, a message integrity check (MIC),an extended initialization vector (IV) with sequencing rules, and a re-keyingmechanism. The encryption keys are changed (rekeyed) automatically andauthenticated between devices after the rekey interval (either a specified period oftime, or after a specified number of packets has been transmitted).TLS Transport Layer Security. (See EAP, Extensible Authentication Protocol)ToS Type of Service. An attribute used in Quality of Service (QoS).TSN Transition Security Network. A subset of Robust Security Network (RSN), whichprovides an enhanced security solution for legacy hardware. The Wi-Fi Alliance hasadopted a solution called Wireless Protected Access (WPA), based on TSN. RSN andTSN both specify IEEE 802.1x authentication with Extensible Authentication Protocol(EAP).Tunnelling Tunnelling (or encapsulation) is a technology that enables one network to send its datavia another network’s connections. Tunnelling works by encapsulating packets of anetwork protocol within packets carried by the second network. The receiving devicethen decapsulates the packets and forwards them in their original format.UDP User Datagram Protocol. A connectionless protocol that, like TCP, runs on top of IPnetworks. Unlike TCP/IP, UDP/IP provides very few error recovery services, offeringinstead a direct way to send and receive packets over an IP network. It is usedprimarily for broadcasting messages over a network.U-NII Unlicensed National Information Infrastructure. Designated to provide short-range,high-speed wireless networking communication at low cost, U-NII consists of threefrequency bands of 100 MHz each in the 5 GHz band: 5.15-5.25GHz (for indoor useonly), 5.25-5.35 GHz and 5.725-5.825GHz. The three frequency bands were set asideby the FCC in 1997 initially to help schools connect to the Internet without the need forhard wiring. U-NII devices do not require licensing.VLAN Virtual Local Area Network. A network of computers that behave as if they areconnected to the same wire when they may be physically located on differentsegments of a LAN. VLANs are configured through software rather than hardware,which makes them extremely flexible. When a computer is physically moved to anotherlocation, it can stay on the same VLAN without any hardware reconfiguration.The standard is defined in IEEE 802.1Q - Virtual LANs, which states that “IEEE 802Local Area Networks (LANs) of all types may be connected together with MediaAccess Control (MAC) Bridges, as specified in ISO/IEC 15802-3. This standard definesthe operation of Virtual LAN (VLAN) Bridges that permit the definition, operation andadministration of Virtual LAN topologies within a Bridged LAN infrastructure.”VNS Virtual Network Services (VNS). A Chantry-specific technique that provides a means ofmapping wireless networks to a wired topology.VoIP Voice Over Internet Protocol. An internet telephony technique. With VoIP, a voicetransmission is cut into multiple packets, takes the most efficient path along theInternet and is reassembled when it reaches the destination.VPN Virtual Private Network. A private network that is constructed by using public wires toconnect nodes. These systems use encryption and other security mechanisms toensure that only authorized users can access the network and that the data cannot beintercepted.Walled Garden A restricted subset of network content that wireless devices can access.
BeaconWorks User Guide – Appendix 2: Glossary of Terms and AcronymsChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 130 of 134TERM ExplanationWEP Wired Equivalent Privacy. A security protocol for wireless local area networks (WLANs)defined in the 802.11b standard. WEP aims to provide security by encrypting data overradio waves so that it is protected as it is transmitted from one end point to another.Wi-Fi Wireless fidelity. A term referring to any type of 802.11 network, whether 802.11b,802.11a, dual-band, etc. Used in reference to the Wi-Fi Alliance, a nonprofitinternational association formed in 1999 to certify interoperability of wireless LocalArea Network products based on IEEE 802.11 specification.WINS Windows Internet Naming Service. A system that determines the IP addressassociated with a particular network computer, called name resolution. WINS supportsnetwork client and server computers running Windows and can provide nameresolution for other computers with special arrangements. WINS supports dynamicaddressing (DHCP) by maintaining a distributed database that is automatically updatedwith the names of computers currently available and the IP address assigned to eachone.DNS is an alternative system for name resolution suitable for network computers withfixed IP addresses.WLAN Wireless Local Area Network.WPA Wireless Protected Access, or Wi-Fi Protected Access is a security solution adopted bythe Wi-Fi Alliance that adds authentication to WEP’s basic encryption. Forauthentication, WPA specifies IEEE 802.1x authentication with ExtensibleAuthentication Protocol (EAP). For encryption, WPA uses the Temporal Key IntegrityProtocol (TKIP) mechanism, which shares a starting key between devices, and thenchanges their encryption key for every packet. Certificate Authentication (CA) can alsobe used. Also part of the encryption mechanism are 802.1X for dynamic keydistribution and Message Integrity Check (MIC) a.k.a. “Michael”WPA requires that all computers and devices have WPA software.WPA-PSK Wi-Fi Protected Access with Pre-Shared Key, a special mode of WPA for users withoutan enterprise authentication server. Instead, for authentication, a Pre-Shared Key isused. The PSK is a shared secret (passphrase) that must be entered in both thewireless access point or router and the WPA clients.This preshared key should be a random sequence of characters at least 20 characterslong or hexadecimal digits (numbers 0-9 and letters A-F) at least 24 hexadecimal digitslong. After the initial shared secret, the Temporal Key Integrity Protocol (TKIP) handlesthe encryption and automatic rekeying.
BeaconWorks User Guide – Appendix 3: Index of Procedures, Screens and FiguresChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 131 of 134Appendix 3: Index of Procedures, Screens and FiguresList of Procedures:Installing the BeaconMaster ............................................................................................. 16Changing the Management Port IP address web browser, ethernet port method ........... 17Add the BeaconMaster to your enterprise network .......................................................... 19To run the Graphical User interface.................................................................................. 20Configuring the data ports on the BeaconMaster ............................................................. 23Setting up a Static Route on the BeaconMaster............................................................... 26Viewing the Routing Table on the BeaconMaster ............................................................ 27Setting up OSPF Routing on the BeaconMaster .............................................................. 28Define the Security Mode for registering BeaconPoints ................................................... 33View and modify properties of registered BeaconPoints .................................................. 36View and modify the radio settings of registered BeaconPoints....................................... 38Add and register a BeaconPoint manually........................................................................ 40Set up a BeaconPoint with static configuration ................................................................ 42Create a subnet (VNS)...................................................................................................... 48Configure the new VNS (overview of basic steps) ........................................................... 49Create an SSID for Captive Portal VNS ........................................................................... 50Identify the BeaconPoint radios that will be assigned to this VNS ................................... 51Enable Management Traffic on this VNS.......................................................................... 51Enable Third Party Access Points on this VNS ................................................................ 51Enable QoS Policy for voice-over-internet traffic on this VNS.......................................... 51Set the IP address for the VNS (for the DHCP server on the BeaconMaster) ................. 51Set time limits for IP assignments..................................................................................... 52Set the name server configuration.................................................................................... 52Use DHCP Relay for the VNS .......................................................................................... 52Save the new VNS............................................................................................................ 53Set up authentication by Captive Portal............................................................................ 53Define how the BeaconMaster will access the RADIUS server........................................ 54Define the RADIUS server priority for RADIUS Redundancy........................................... 55Define the Filter ID Values on this VNS............................................................................ 56Configure the appearance of the Captive Portal page ..................................................... 56Define filtering rules for a Non-Authenticated Filter.......................................................... 57Set up a Static WEP key for a selected VNS.................................................................... 59Set up a VNS with no authentication ................................................................................ 61Set up a VNS for voice traffic............................................................................................ 63Configure the BeaconPoint radio for a voice traffic VNS.................................................. 64Create an AAA topology ................................................................................................... 66Identify the BeaconPoint radios that will be assigned to this VNS ................................... 66Enable Management Traffic on this VNS.......................................................................... 66Set the IP address for the VNS (for the DHCP server on the BeaconMaster) ................. 67Set time limits for IP assignments..................................................................................... 67Set the name server configuration.................................................................................... 67Use DHCP Relay for the VNS .......................................................................................... 68Save the new VNS for AAA .............................................................................................. 68Set up authentication by AAA (802.1x) method................................................................ 68Define how the BeaconMaster will access the RADIUS Server....................................... 69Define the RADIUS server priority for RADIUS Redundancy........................................... 70Define the Filter ID Values on this VNS............................................................................ 70Set up an AAA Group ....................................................................................................... 71Configure the VNS Topology for an AAA Group .............................................................. 71Define filtering rules for a Filter ID group .......................................................................... 72Define the filtering rules for a Default Filter ...................................................................... 74Set up static WEP privacy for a selected AAA VNS ......................................................... 76Set up dynamic WEP privacy for a selected AAA VNS .................................................... 77Set up Wi-Fi Protected Access privacy (WPA) for an AAA VNS ...................................... 78
BeaconWorks User Guide – Appendix 3: Index of Procedures, Screens and FiguresChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 132 of 134Specify a re-key interval for WPA Privacy ........................................................................ 78Enable WPA in PSK mode if there is no authentication server ........................................ 79Save the privacy parameters for this VNS........................................................................ 79Prepare for setting up the Availability feature ................................................................... 80Set up two BeaconMasters as a pair, for availability ........................................................ 81Modifying BP Failover selections for availability............................................................... 82View the BeaconPoint Availability Report......................................................................... 82View the SLP activity with the “slpdump tool” ................................................................... 83Events and actions during a Failover................................................................................ 84Set up a BeaconMaster as a VN Manager ....................................................................... 86View displays when VN Managers is enabled.................................................................. 86Designate BeaconMaster management users ................................................................. 88Set Network Time parameters .......................................................................................... 89Set up third-party access points on the BeaconMaster .................................................... 90Enable and configure the BeaconKeeper Mitigator Analysis Engine ............................... 94Define the BeaconKeeper Mitigator RF Data Collector Engines...................................... 94Set up and run the BeaconKeeper Mitigator scan task mechanism:................................ 95View the BeaconKeeper scan results and build list of Friendly APs ................................ 97View the BeaconKeeper list of Third-Party APs ............................................................... 99Maintain the BeaconKeeper list of access points and BeaconPoints............................... 99View the BeaconKeeper scanner engine status display................................................. 100Maintain the list of current BeaconPoint software images.............................................. 101Define the parameters for a BeaconPoint software upgrade.......................................... 102Modify a BeaconPoint’s registration status (approve access)........................................ 104Disassociate a Wireless Device Client ........................................................................... 105Performing BeaconMaster maintenance functions......................................................... 106Change the System Log Level........................................................................................ 106Enable Data Collection for Accounting ........................................................................... 106Perform a System Shutdown .......................................................................................... 106View the Logs ................................................................................................................. 110View the Traces .............................................................................................................. 111View the Audits ............................................................................................................... 111Setting SNMP Parameters.............................................................................................. 116List of Screens:Screen 1: Chantry BeaconWorks User Interface Login.................................................... 17Screen 2: Chantry BeaconWorks User Interface Main Menu........................................... 17Screen 3: BeaconMaster Configuration – IP Addresses – Management Port ................. 18Screen 4: Modify Management Port Settings (System Port Configuration) ..................... 18Screen 5: Chantry BeaconWorks User Interface Login.................................................... 20Screen 6: Change Password popup ................................................................................. 20Screen 7: Chantry BeaconWorks Main Menu................................................................... 21Screen 8: BeaconMaster Configuration – IP Addresses / Interfaces ............................... 23Screen 9: BeaconMaster Configuration – Static Routes .................................................. 26Screen 10: Report – Forwarding Table............................................................................. 27Screen 11: BeaconMaster Configuration – Routing, OSPF tab ....................................... 28Screen 12: Reports – OSPF Neighbor and Linkstate....................................................... 29Screen 13: BeaconPoint Configuration – BP Registration Mode ..................................... 33Screen 14: BeaconPoint Configuration: Message R1.1 version of BP software .............. 36Screen 15: BeaconPoint Configuration – Properties ........................................................ 37Screen 16: BeaconPoint Configuration – Properties (after modifications) ....................... 38Screen 17: BeaconPoint Configuration – Radio 802.11a (5 GHz) ................................... 38Screen 18: BeaconPoint Configuration – Radio 802.11b/g (2.4 GHz) ............................. 39Screen 19: BeaconPoint Configuration – Add BeaconPoint............................................. 41Screen 20: BeaconPoint Configuration: Static Configuration ........................................... 42Screen 21: Virtual Network Configuration: Before any VNS definitions ........................... 48
BeaconWorks User Guide – Appendix 3: Index of Procedures, Screens and FiguresChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 133 of 134Screen 22: Virtual Network Configuration: Topology for a new VNS Subnet................... 49Screen 23: Virtual Network Configuration – Topology – SSID Assignment ..................... 50Screen 24: Virtual Network Configuration – Exclusions subscreen ................................. 52Screen 25: Virtual Network Configuration – Topology – DHCP Relay ............................. 53Screen 26: Virtual Network Configuration – Authentication – Captive Portal................... 54Screen 27: Virtual Network Configuration – Authentication CP – Add RADIUS Server... 54Screen 28: Captive Portal login configuration................................................................... 56Screen 29: Virtual Network Configuration – Non-Authenticated Filter for Captive Portal 58Screen 30: Virtual Network Configuration – Privacy – Captive Portal VNS ..................... 60Screen 31: Virtual Network Configuration – Authentication – None................................. 61Screen 32: Virtual Network Configuration: Topology – QoS for Voice Traffic .................. 63Screen 33: BeaconPoint Configuration for QoS VNS (need screen with correct settings).................................................................................................................................. 64Screen 34: Virtual Network Configuration – Topology – AAA Assignment ...................... 66Screen 35: Virtual Network Configuration – Exclusions subscreen ................................. 67Screen 36: Virtual Network Configuration – Authentication – AAA .................................. 69Screen 37: Virtual Network Configuration – Authentication AAA – RADIUS ServerConfiguration ............................................................................................................ 69Screen 38: Virtual Network Configuration – Topology – AAA Group ............................... 71Screen 39: Virtual Network Configuration –Filter ID Value filtering rules ......................... 73Screen 40: Virtual Network Configuration – Default Filter ................................................ 74Screen 41: Virtual Network Configuration – Filtering – AAA Group ................................. 75Screen 42: Virtual Network Configuration – Privacy – AAA VNS: Static Keys................. 76Screen 43: Virtual Network Configuration – Privacy – AAA VNS: WPA........................... 78Screen 44: BeaconPoint Configuration – Paired BeaconMasters for Availability............. 81Screen 45: BeaconPoint Configuration – BP Failover for Paired BM............................... 82Screen 46: Report – BeaconPoint Availability .................................................................. 83Screen 47: BeaconPoint configuration – View SLP Registration ..................................... 83Screen 48: BeaconMaster Configuration – VN Manager ................................................. 86Screen 49: Reports and Displays for a VN Manager: Menu............................................. 87Screen 50: Reports and Displays for a VN Manager: Examples...................................... 87Screen 51: Reports and Displays for a VN Manager: BM Tunnel Traffic ......................... 87Screen 52: BeaconMaster Configuration – Management Users ...................................... 88Screen 53: BeaconMaster Configuration – Network Time ............................................... 89Screen 54: BeaconMaster Configuration – IP Addresses / Interfaces ............................. 90Screen 55: Virtual Network Configuration – Topology for Third-Party APs...................... 91Screen 56: BeaconKeeper Mitigator – Rogue Summary Report...................................... 93Screen 57: BeaconMaster Configuration – BeaconKeeper Mitigator Configuration ........ 94Screen 58: BeaconMaster Configuration – BeaconKeeper Mitigator: Collection Engines95Screen 59: BeaconKeeper Mitigator Scanner – Scan Groups ......................................... 95Screen 60: BeaconKeeper Mitigator Scanner – Rogue Detection ................................... 98Screen 61: BeaconKeeper Mitigator Scanner – Friendly APs.......................................... 98Screen 62: BeaconKeeper Mitigator Scanner – 3rd Party APs ........................................ 99Screen 63: BeaconKeeper Mitigator Scanner – AP / BP Maintenance............................ 99Screen 64: BeaconKeeper Mitigator – Scanner Status Report ...................................... 100Screen 65: BeaconPoint Configuration – BP Maintenance: Software Maintenance...... 102Screen 66: BeaconPoint Configuration – BP Maintenance: Controlled Upgrade........... 103Screen 67: BeaconPoint Configuration – Access Approval............................................ 104Screen 68: BeaconPoint Configuration – Wireless Unit (Client) Disassociate ............... 105Screen 69: BeaconMaster Configuration – System Maintenance .................................. 106Screen 70: BeaconMaster Configuration – System Maintenance: Syslog enabled ....... 107Screen 71: Logs & Traces: Log Display – All ................................................................. 109Screen 72: Logs & Traces: Log Display – Info ............................................................... 110Screen 73: Logs & Traces: Trace Messages ................................................................. 111Screen 74: Logs & Traces: GUI Audit............................................................................. 111Screen 75: Reports and Displays – List of Displays....................................................... 112Screen 76: Displays – Active BeaconPoints................................................................... 112Screen 77: Displays – Active Clients by VNS................................................................. 112
BeaconWorks User Guide – Appendix 3: Index of Procedures, Screens and FiguresChantry Networks Inc. Copyright 2004. All rights reserved.    BeaconWorks Rel 2.0 (051304) Page 134 of 134Screen 78: Displays – BeaconPoint Availability ............................................................. 112Screen 79: Display – Wired Ethernet Statistics by BeaconPoints.................................. 113Screen 80: Display – Wireless Statistics by BeaconPoints ............................................ 113Screen 81: Display – Wireless Statistics by BeaconPoints: Clients ............................... 114Screen 82: Forwarding Table Report.............................................................................. 114Screen 83: BeaconMaster Configuration – SNMP Setup............................................... 116List of Figures:Figure 1: Standard wireless network solution..................................................................... 5Figure 2: Chantry BeaconWorks Solution........................................................................... 6Figure 3: BeaconWorks Traffic Flow diagram .................................................................... 8Figure 4: The Chantry BeaconMaster............................................................................... 15Figure 5: The Chantry BeaconMaster – back view diagram............................................. 16Figure 6: The Chantry BeaconPoint ................................................................................. 30

Navigation menu