Download: Mirror Download [FCC.gov] Document ID 2074666 Application ID VbwSvAM6zwL7tj01Sk/sRA== Document Description Users Manual-6 Short Term Confidential No Permanent Confidential No Supercede No Document Type User Manual Display Format Adobe Acrobat PDF - pdf Filesize 253.71kB (3171396 bits) Date Submitted 2013-09-17 00:00:00 Date Available 2013-09-18 00:00:00 Creation Date 2013-09-06 13:18:17 Producing Software Microsoft® Word 2010 Document Lastmod 2013-09-06 14:19:03 Document Title Users Manual-6 Document Creator Microsoft® Word 2010 Document Author: tejas
Administration Tab
Creating a Configuration Template for an Authorized SSID
Create SSID Template allows you to specify the details for creating a new SSID as follows:
Authorized SSID: Displays the name of the SSID that you have added earlier
This is a Guest SSID: Select this option if this SSID is a Guest SSID used to provide Wi-Fi connectivity to
visitors and guests. Though APs with Guest SSID are Authorized, they may be treated differently than APs
that are used by employees for corporate access. Making an SSID as Guest allows you to specify additional
classification and prevention policies related to Guest SSIDs. Refer to the sections Client Auto-Classification
and Intrusion Prevention Policy for more details on classifying Guest SSIDs
Template Name: Name of the SSID template
Apply this SSID template at current location: Select this option to apply this SSID template to the
current location. The WLAN policy at a location consists of SSID templates applied at that location. If the
template is not applied at this location, it will not be a part of the WLAN policy
SpectraGuard® Enterprise User Guide
271
Administration Tab
Description: Write a short description to help identify the SSID template
Network Protocol allows you to select the allowed 802.11 protocols for the SSID:
Any: Allow APs with any network protocol for this SSID
Select: Specify the 802.11 protocol on which the system allows the APs connected to the network to
operate–802.11 a, 802.11 b/g, and 802.11b only
AP Capabilities allows you to select the additional capabilities that Authorized APs may have. If you select any
of these advanced capabilities, the classification logic allows APs with and without these capabilities. Select one of
the following:
Any: Allow APs with any special capability for this SSID
Select: Specify if the AP uses any Turbo/Super techniques used by Atheros to get higher throughputs–
Turbo, 802.11n, and SuperAG
Cisco MFP (802.11w) allows you to make classification decisions on Cisco Management Frame Protection(MFP)
capability if 802.11w checkbox is selected under Security Settings:
Any: Policy does not check for MFP; both Cisco MFP enabled and disabled APs are classified as
Authorized
Select: Policy checks for MFP
Cisco MFP Enabled: Select to classify only Cisco MFP supporting APs as Authorized APs
Cisco MFP Disabled: Select to classify non-Cisco MFP supporting APs as Authorized APs
Security Settings allows you to select the security protocol(s) for the SSID:
Any: Allow any security protocol for this SSID.
Select: Specify the exact security protocol(s) for this SSID from the list: 802.11i, WPA, Open, and WEP.
Encryption Protocols allows you to select encryption protocol(s) for the SSID:
Any: Allow any encryption protocol (including no encryption) for this SSID.
Select: Specify the exact encryption protocol(s) for this SSID from the list: WEP40, WEP104, TKIP, and
CCMP. Note that encryption protocols selection panel gets enabled only when WPA or 802.11i is selected.
Authentication Framework allows you to select authentication protocol(s) for the SSID:
Any: Allow any authentication protocol (including no authentication) for this SSID.
Select: Specify the exact authentication protocol(s) for this SSID from PSK and 802.1x (EAP). Note that
authentication protocols selection panel gets enabled only when WPA or 802.11i is selected.
Authentication Types allows you to select the allowed higher layer authentication types that Clients can use
while connecting to the SSID. Authentication types do not determine the classification of APs, but are used to raise an
event if a Client uses non-allowed authentication type. The system raises this event only if the system sees
authentication protocol handshake frames.
Any: Allow any higher layer authentication type for Clients connecting to this SSID.
Select: Specify the exact authentication type(s) that Clients can use (only if 802.1x is selected) from the
list: PEAP, EAP-TLS, LEAP, EAP-TTLS, EAP-FAST, and EAP-SIM.
Allowed Networks allows you to select the network(s) where wireless traffic on the SSID is to be mapped
through Authorized APs:
Any: Allow wireless traffic on this SSID to be mapped to any network.
Select Networks: Specify the exact networks where wireless traffic on this SSID is to be mapped through
Authorized APs. You can either choose from networks that are discovered automatically by the system or add
new networks that are not yet discovered by the system.
Click to open Allowed Networks for SSID dialog where you can move a
network from Networks Monitored by the System to Allowed Networks for this SSID and add or
delete networks.
Under Allowed AP Vendors, select one of the following:
Any: Allow APs manufactured by any vendor to connect to the system.
Select Vendors: Select the manufacturer of the AP for the specified SSID.
SSID Templates
SpectraGuard® Enterprise User Guide
272
Administration Tab
A policy is collection of SSID templates attached to that location. You can apply an SSID template from the parent or
create it locally; if you wish to customize the WLAN policy for that location. Other templates may be available to be
attached but are not part of the WLAN policy and will not be used for AP classification.
The SSID Templates section lists the SSID templates that are available at a particular location. You must apply the
templates from the available list to create the WLAN policy at that location. A new AP or an existing Authorized AP
is compared against the applied SSID templates to determine if it is a Rogue or Mis-configured AP. The SSID
templates created at other locations can be applied to a selected location but cannot be edited or deleted. The edit and
delete operations are possible only at the location where the template is created. The table shows the following
details:
SSID: Name of the SSID
Guest SSID?: Indicates if it is a Guest SSID
Template Name: Name of the SSID template
Apply Here?: Enables you to apply the SSID template to the selected location. New and existing Authorized
APs are evaluated against all applied SSID templates to determine if they are Rogue or Mis-configured.
: Click these icons to perform the following:
Copy the selected SSID template to another location.
Edit the SSID template. This option is enabled only at the location where the template was created.
View the SSID template.
Delete the template. This option is enabled only at the location where the template was created and only
if the template is not applied at any other child locations of the location where it was created.
Determining Policy Compliance
An AP is considered as being compliant to the Authorized WLAN Policy if:
It is not connected to a No Wi-Fi network for its location
Its SSID matches with one of the templates attached at that location
Is connected to one of the networks specified in that template
Conforms to the other settings in that template (except the Authentication Framework, as this setting is not a
property of the AP itself but of the backend authentication system)
Note: If the template specifies certain allowed AP capabilities (such as Turbo, 802.11n, and so on.), the AP may or
may not have those capabilities. However, if a capability is not selected, the AP must not have that capability to be
considered as compliant.
With location-based policies, you can specify (or attach) different sets of SSID templates for different locations.
However, you cannot attach more than one template with the same SSID at any one location.
SpectraGuard® Enterprise User Guide
273
Administration Tab
Determining Policy Compliance
Select No Wi-Fi Networks
This section allows you to specify the list of networks at the selected location where no Wi-Fi APs are allowed to be
connected. The No Wi-Fi Networks list at a location takes precedence over the list of networks in SSID templates
applied at that location. In other words, if a network is included in a location’s no Wi-Fi list and happens to be in the
list of networks in one or more applied SSIDs at that location, the network will be still treated as a no Wi-Fi network.
SpectraGuard® Enterprise User Guide
274
Administration Tab
No Wi-Fi Network
Networks Monitored by the System: Specifies the networks monitored by the system.
No Wi-Fi Networks at this Location: Specifies the networks to which no Wi-Fi AP should be connected at the
selected location.
You can move a network from Networks Monitored by the System to No Wi-Fi Networks at this Location.
Click Add to enter a new network address to add a No Wi-Fi network at the selected location.
RSSI based Classification
APs are further classified based on the RSSI value that the sensors receive. If the signal strength exceeds a maximum
threshold, the sensor appropriately classifies the AP. Airtight higly recommends that you turn on network
connectivity based classification as it is the most reliable mechanism to classify wireless devices when most of your
network is monitored using sensors and NDs.
Under RSSI Threshold, select one or both (recommend) of the following checkboxes:
Pre-classify APs with signal strength stronger than threshold as Rogue or Authorized APs to specify the
threshold RSSI value based on which the system further classifies APs.
Pre-classify APs connected to monitored subnet as Rogue or Authorized APs to classify APs based on their
network connectivity.
SpectraGuard® Enterprise User Guide
275
Administration Tab
RSSI based Classification
Operating Policies
Select the Operating Policies screen to set the operating policies in the system. You can set the location-wise AP autoclassification policy, client auto-classification policy, intrusion prevention levels and policy.
AP auto-classification
The AP Auto-Classification policy function enables you to specify the AP classification policy for different AP
categories.
SpectraGuard® Enterprise User Guide
276
Administration Tab
AP Auto-Classification Policy
Under External APs, AirTight recommends that you select Automatically move Potentially External APs in the
Uncategorized list to the External Folder. The system automatically removes an AP from the External folder and
moves it to an appropriate AP folder if it later detects that the AP is wired to the enterprise network.
Under Rogue APs, AirTight recommends that you select Automatically move Potentially External APs in the
Uncategorized list to the Rogue Folder.
Note: Once you move an AP to the Rogue folder, the system never automatically removes it from the Rogue folder,
even if it later detects that the AP is unwired from the enterprise network or its security settings have changed.
Client auto-classification
The Client Classification policy determines how Clients are classified upon initial discovery and subsequent
associations with APs.
SpectraGuard® Enterprise User Guide
277
Administration Tab
Client Auto-Classification Policy
Under Initial Client Classification, specify if newly discovered Clients at a particular location, which are
Uncategorized by default should be classified as External, Authorized or Guest.
Under Automatic Client Classification, select one or more options to enable the system automatically re-classify
Uncategorized and Unauthorized Clients based on their associations with APs. You can categorize the following
types of Clients.
Clients running SAFE
All External Clients running SpectraGuard SAFE are classified as Authorized
All Uncategorized Clients running SpectraGuard SAFE are classified as Authorized
All Rogue Clients running SpectraGuard SAFE are classified as Authorized
All Guest Clients running SpectraGuard SAFE are classified as Authorized
Clients connecting to Authorized APs
All External Clients that connect to an Authorized AP are re-classified as Authorized
All Uncategorized Clients that connect to an Authorized AP are reclassified as Authorized
All Guest Clients that connect to an Authorized AP are reclassified as Authorized
You can select the following Exceptions
Do not re-classify a Client connecting to a Mis-configured AP as Authorized
Do not re-classify a Client if its wireless data packets are not detected on the wired network (except if the
connection is reported by WLAN controller)
Clients connecting to Guest APs
All External Clients that connect to a Guest AP are reclassified as Guest
All Uncategorized Clients that connect to a Guest AP are reclassified as Guest
You can select the following Exceptions
Do not re-classify a Client connecting to a Mis-configured AP as Guest
SpectraGuard® Enterprise User Guide
278
Administration Tab
Do not re-classify a Client as Guest if its wireless data packets are not detected on the wired network
(except if the connection is reported by WLAN controller)
Clients connecting to External APs
All Uncategorized Clients that connect to an External AP are reclassified as External
All Uncategorized Clients that connect to a Potentially External AP are classified as External
All Guest Clients that connect to an External AP are re-classified as External
All Guest Clients that connect to a Potentially External AP are re-classified as External
Clients connecting to Rogue APs
All Clients other than Authorized Clients that connect to a Rogue AP are (re)classified as Rogue
All Clients other than Authorized Clients that connect to a Potentially Rogue AP are classified as Rogue
RSSI Based Classification
Enable RSSI based Client Classification
Uncategorized Clients
External Clients
RSSI threshold -60 dBm
Destination folder Authorized
Bridging to the Corporate Network
Classify any non-authorized Client as Rogue if it is detected as bridging wi-fi to the corporate network
Intrusion Prevention Policy
The Intrusion Prevention Policy determines the wireless threats against which the system protects the network
automatically. The system automatically moves such threat-posing APs and Clients to quarantine. The system can
protect against multiple threats simultaneously based on the selected Intrusion Prevention level.
If the server quarantines an AP or Client based on the Intrusion Prevention policy, the Disable Auto-quarantine
option ensures that the system will not automatically quarantine this AP or Client (regardless of the specified
Intrusion Prevention policies).
SpectraGuard® Enterprise User Guide
279
Administration Tab
Intrusion Prevention Policy
You can enable intrusion prevention against the following threats:
Rogue APs: APs connected to your network but not authorized by the administrator; an attacker can gain access to
your network through the Rogue APs. You can also automatically quarantine Uncategorized Indeterminate and
Banned APs connected to the network.
Mis-configured APs: APs authorized by the administrator but do not conform to the security policy; an attacker
can gain access to your network through misconfigured APs. This could happen if the APs are reset, tampered with,
or if there is a change in the security policy.
Client Mis-associations: Authorized Clients that connect to Rogue or External (neighboring) APs; corporate data
on the Authorized Client is under threat due to such connections. AirTight recommends that you provide automatic
intrusion prevention against Authorized Clients that connect to Rogue or External APs.
There is a special intrusion prevention policy for the smart devices that are not approved. Even if a current client
policy restricts authorized clients from connecting to a guest AP, an unapproved smart device can still be allowed to
do so. One needs to explicitly allow or restrict unapproved smart devices from connecting to a guest AP.
Refer to the section Smart Device Detection in the Devices Tab chapter for more information.
Click Special Handling for Smart Devices to enable special handling for unapproved smart devices. You can allow
the unapproved smart device to connect to a guest AP only. To do this,
1. Select Enable Special Handling for Unapproved Smart Devices.
2. Select Allow connection to Guest AP, but not Authorized AP.
To disallow the unapproved smart device from connecting to both a guest AP as well as an authorized AP, select Do
not allow connection to Guest AP and Authorized AP.
SpectraGuard® Enterprise User Guide
280
Administration Tab
Special Handling for Smart Devices
Non-authorized Associations: Non-authorized and Banned Clients that connect to Authorized APs; an attacker can
gain access to your network through Authorized APs if the security mechanisms are weak. Non-authorized or
Uncategorized Client connections to an Authorized AP using a Guest SSID are not treated as unauthorized
associations.
Associations to Guest APs: External and Uncategorized Clients that connect to Guest APs are classified as Guest
Clients. The Clients connected to a wired network or a MisConfigured AP can be specified as exceptions to this
policy.
Ad hoc Connections: Peer-to-peer connections between Clients; corporate data on the Authorized Client is under
threat if it is involved in an ad hoc connection.
MAC Spoofing: An AP that spoofs the wireless MAC address of an Authorized AP; an attacker can launch an
attack through a MAC spoofing AP.
Honeypot/Evil Twin APs: Neighboring APs that have the same SSID as an Authorized AP; Authorized Clients can
connect to Honeypot/Evil Twin APs. Corporate data on these Authorized Clients is under threat due to such
connections.
Denial of Service (DoS) Attacks: DoS attacks degrade the performance of an official WLAN.
WEPGuard TM: Active WEP cracking tools allow attackers to crack the WEP key and gain access to confidential
data in a matter of minutes or even seconds. Compromised WEP keys are used to gain entry into the authorized
WLAN by spoofing the MAC address of an inactive Authorized Client.
Client Bridging/ICS: A Client with packet forwarding enabled between wired and wireless interfaces. An
authorized Client bridging and unauthorized/uncategorized bridging Client connected to enterprise subnet is a
serious security threat.
Intrusion Prevention Level
The system can prevent any unwanted communication in your 802.11 network. It provides you various levels of
prevention-blocking mechanisms of varying effectiveness. Intrusion Prevention Level enables you to specify a tradeoff between the desired level of prevention and the desired number of multiple simultaneous preventions across
radio channels.
The greater the number of channels across which simultaneous prevention is desired, the lesser is the effectiveness of
prevention in inhibiting unwanted communication. Scanning for new devices continues regardless of the chosen
prevention level.
SpectraGuard® Enterprise User Guide
281
Administration Tab
Intrusion Prevention Level
You can select the following prevention levels:
Block: A single sensor can block unwanted communication on any one channel in the 802.11b/g band and any
one channel in the 802.11a band.
Disrupt: A single sensor can disrupt unwanted communication on any two channels in the 802.11b/g band and
any two channels in the 802.11a band.
Interrupt: A single sensor can interrupt unwanted communication on any three channels in the 802.11b/g band
and any three channels in the 802.11a band.
Degrade: A single sensor can degrade the performance of unwanted communication on any four channels in
802.11b/g band and any four channels in the 802.11a band.
Block is the most powerful prevention level, that is, it can severely block almost all popular Internet applications
including ping, SSH, Telnet, FTP, HTTP, and the like. However, at this level, a single sensor can simultaneously
prevent unwanted communication on only one channel in the 802.11b/g band and one channel in the 802.11a band. If
you want the sensor to prevent unwanted communication on multiple channels simultaneously in the 802.11 b/g
and/or the 802.11a band, you must select other prevention levels.
Note: Prevention Type determines the blocking strength to prevent communication from unwanted APs and Clients.
The system can prevent multiple APs and Clients on each channel. Prevention Type is not applicable for Denial of
Service (DoS) attacks or ad hoc networks. You must select a lower blocking level to prevent devices on more channels.
Choosing a lower blocking level means that some packets from the blocked device may go through.
Event Settings
Configuration
SpectraGuard® Enterprise User Guide
282
Administration Tab
Event Configuration comprises of the following main tabs:
Security
System
Performance
Security
Security enables you to view events that indicate security vulnerability or breach in your network. Security events are
further divided into the following sub-categories:
Rogue AP
Mis-Configured AP
Misbehaving Clients
Prevention
DOS
Ad hoc Network
Man-in-the-Middle
MAC Spoofing
Reconnaissance
Cracking
Note: Prevention tab is not available with WIDS.
System
System enables you to view events that indicate system health. System events are further divided into the following
sub-categories:
Troubleshooting
Sensor
Server
Performance
Performance enables you to view events that indicate wireless network performance problems. Performance events
are further divided into the following sub-categories:
Bandwidth
Configuration
Coverage
Interference
Once you select an event type and then a sub-category, a list of events under that sub-category appears.
SpectraGuard® Enterprise User Guide
283
Administration Tab
Event Configuration
The events list displays the following columns:
Activity Status Icon: Specifies the activity status of the event – Live or Instantaneous.
Display: Select the checkboxes that correspond to the types of events that you want to appear in the main
Events screen.
E-mail: Select the checkboxes that correspond to the types of events for which you want email notifications sent
to all users whose email addresses you have configured in the AdministrationEvent SettingsEmail Notification.
Notify: Select the checkboxes that correspond to the types of events for which you want notifications sent to
external agents such as SNMP, Syslog, ArcSight, and OPSEC.
Vulnerability: Select checkboxes to indicate which types of events make the system Vulnerable. The Security
Scorecard shows Vulnerable status if any events of the selected type occur.
Severity: Select the severity of each event as High, Medium, or Low. This function helps you to organize events
in the most useful way.
Event: Provides a short description of each event.
Click for Details: Click
to view a detailed description of the corresponding event category.
Advanced Settings: Click to open the Event Advanced Settings dialog and change the configuration
parameters of the corresponding event category. is disabled when the event has no configuration parameters.
Note: The parameters in the Event Advanced Settings dialog changes according to the settings for the selected
event.
SpectraGuard® Enterprise User Guide
284
Administration Tab
Event Advanced Settings
Email Notification
The Email Notification screen enables you to select the email addresses that should be notified when an event occurs
at a particular location. You can select from the email addresses of system users or add a new email address.
SpectraGuard® Enterprise User Guide
285
Administration Tab
Email Notification
Click Add to open Custom Email Address for Notification dialog where you can add a new email address.
Custom Email Addresses for Notification Dialog
Click OK to add the new email address.
Select an email address and click Delete to delete an existing email address. You can delete multiple email addresses
using click-and-drag or using the + keys and then clicking Delete.
Device Settings
You can define the device templates and SSID profiles through Administration->Local->Local Policies->Device
Settings. Device templates can be applied to AirTight devices that function as WIPS sensors or as sensor/AP combos.
To define and manage SSID profiles, use the Administration->Local->Device Settings->SSID profiles.
To define and manage device templates, use Administration->Local->Device Settings->Device Template.
SpectraGuard® Enterprise User Guide
286
Administration Tab
SSID Profile
Configure SSID Profiles using the SSID Profile.
SSID Profile
To add a wireless SSID profile, click Add New Profile. You can add multiple SSID profiles for the Sensor/AP combo
operating in the AP mode. When in AP mode, a single physical AP device can be logically split up into multiple
virtual AP's. Each wireless profile represents the configuration settings of a virtual AP. Multiple virtual APs can be
configured on a single radio. Up to 8 such virtual AP's can be configured using the Add New Profile dialog box.
To delete a profile from the list, select the respective row, and click Delete.
A virtual AP has the following features:
Each virtual AP supports Open, WPA (TKIP), WPA2 (CCMP) or WPA/WPA2 (TKIP+CCMP) security.
Distinct virtual AP's can have different security modes.
Each virtual AP can be used to provide distinct services that are independent of each other.
Data from the individual virtual AP’s can be assigned to a VLAN, so that data transmitted and received
over one virtual AP is not mixed with that over any other virtual AP. Thus, data from a virtual AP is not
visible outside that virtual AP.
The security settings for a virtual AP could be either of the following:
Open: Open means no security settings are to be applied. This is the default security setting.
WEP: WEP stands for Wireless Equivalent Privacy. WEP is a deprecated security algorithm for IEEE 802.11
networks. This has been provided for backward compatibility purpose only.
SpectraGuard® Enterprise User Guide
287
Administration Tab
WPA: WPA stands for Wi-Fi Protected Access. It is the security protocol that eliminates the shortcomings of
WEP.
WPA2: WPA2 is the latest and more robust security protocol. It fully implements the IEEE 802.11i standard.
WPA and WPA2 mixed mode: This stands for a mix of the WPA and WPA2 protocols.
PSK or Personal Shared key is generally used for small office networks. In case of bigger enterprise networks,
RADIUS authentication is used.
Basic Settings
The following dialog box appears on clicking Add New Profile.
SpectraGuard® Enterprise User Guide
288
Administration Tab
Basic Settings
The following table explains the fields present on the Basic Settings tab.
Field
Profile Name
Description
Default value
This field specifies the name of the profile.
SpectraGuard® Enterprise User Guide
289
Administration Tab
SSID
This field specifies the SSID of the wireless profile. This is a
mandatory field.
Broadcast SSID
This check box indicates whether the SSID is to be broadcast The check box is selected,
or not for this Virtual AP, in the beacon frames. If selected, the indicating that the SSID
beacon for this Virtual AP carries the SSID.
is broadcast.
Client Isolation
This check box indicates whether communication between 2
wireless clients of this virtual AP is enabled or disabled. If
selected, wireless client communication is enabled for the
virtual AP.
Limit number of
associations
This field specifies the maximum number of clients that can
associate with the AP. You can select the check box and then
specify the number of clients.
Security Mode
blank
The check box is clear,
indicating that wireless client
communication for the virtual
AP is disabled.
This specifies the security mode applied to the virtual AP.
The possible values are Open, WEP, WPA, WPA2, WPA and
WPA2 mixed mode.
Fields related to security mode WEP
Authentication
Type
Select Open if the type of authentication is open. In case of
open authentication, the key is used for encryption only.
Select Shared if the authentication type is shared key. In case Open
of shared key authentication, the same key is used for both
encryption and authentication.
WEP Type
Select WEP40 if 40-bit WEP security is used.
Select WEP104 if 104-bit WEP security is used.
WEP104
Key Type
Select ASCII option if you are comfortable with ASCII format
and want to enter WEP key in that format. The Sensor/AP
combo converts it to hexadecimal internally.
Select HEX option if you are comfortable with hexadecimal
format and want to enter WEP key in that format.
ASCII
Key
WEP key is a sequence of hexadecimal digits.
If WEP Type is WEP40, enter the key as a 5 character ASCII
key or a 10 digit hexadecimal key, depending on the Key Type
selected by you.
blank
If WEP Type is WEP104, enter the key as a 13 character
ASCII key or a 26 digit hexadecimal key, depending on the
Key Type selected by you.
Show Key
Select this check box to see the actual key on the screen. If
this check box is cleared, the key is masked.
clear
Fields related to security mode WPA/WPA2/WPA and WPA2 Mixed Mode
SpectraGuard® Enterprise User Guide
290
Administration Tab
PSK
Select the PSK option if you want to use a personal shared
key. The Pass phrase field is enabled when this option is
selected.
PSK
Pass Phrase
Specify the shared key of length 8-63 ASCII characters for
PSK authentication
blank
Show Key
Select this check box to see the actual pass phrase on the
screen. If this check box is cleared, the key is masked.
clear
802.1x
Select 802.1x option if you want to use a RADIUS server for
authentication. The fields on the Authentication and
Accounting tabs are enabled on selecting this option.
clear
Opportunistic
Key Caching
Select the check box to enable client fast handoffs using
opportunistic key caching method. Note that the key caching
works within the same subnet only and not across subnets.
selected
Preauthentication
Select the Pre-Authentication check box to enable client fast
clear
handoffs using the Pre-Authentication method.
Fields in the Authentication Tab-Primary RADIUS Server area
Server IP
Enter the IP Address of the primary RADIUS server here.
Port Number
Enter the port number at which primary RADIUS server listens
1813
for client requests.
Shared Secret
Enter the secret shared between the primary RADIUS server
and the AP.
blank
Show
Select this check box to see the actual text of the RADIUS
Secret on the screen. If this check box is cleared, the key is
masked.
clear
blank
Fields in the Authentication Tab- Secondary RADIUS Server area
Server IP
Enter the IP Address of the secondary RADIUS server here.
blank
Port Number
Enter the port number at which secondary RADIUS server
listens for client requests.
1813
Shared Secret
Enter the secret shared between the secondary RADIUS
server and the AP.
blank
Show
Select this check box to see the actual text of the shared
secret on the screen. If this check box is cleared, the key is
masked.
clear
Field in the Accounting Tab
Enable RADIUS
Accounting
Select this check box to enable RADIUS Accounting. The
other fields on the Accounting tab are enabled on selecting
this check box. Define the primary RADIUS Server, and
optionally secondary RADIUS Accounting server in the
Accounting tab.
clear
Fields in the Accounting Tab- Primary Accounting Server area
SpectraGuard® Enterprise User Guide
291
Administration Tab
Server IP
Enter the IP Address of the primary accounting server here.
blank
Port Number
Enter the port number at which primary accounting server
listens for client requests.
1813
Shared Secret
Enter the secret shared between the primary accounting
server and the AP.
blank
Show
Select this check box to see the actual text of the shared
secret on the screen. If this check box is cleared, the key is
masked.
clear
Fields in the Accounting Tab- Secondary Accounting Server area
Server IP
Enter the IP Address of the secondary accounting server here. blank
Port Number
Enter the port number at which secondary accounting server
listens for client requests.
1813
Shared Secret
Enter the secret shared between the secondary accounting
server and the AP.
blank
Show
Select this check box to see the actual text of the shared
secret on the screen. If this check box is cleared, the key is
masked.
clear
Network Settings
The following figure shows the fields on the Network Settings tab.
SpectraGuard® Enterprise User Guide
292
Administration Tab
Network Settings
Configure the VLAN and DHCP settings to be used be the NAT device using the Network Settings tab.
VLAN ID: Specify the VLAN ID.
Start IP address: Specify the starting IP address of the DHCP address pool in the selected network ID.
End IP address: Specify the end IP address of the DHCP address pool in the selected network ID.
Local IP address: Specify an IP address in selected network ID outside of the DHCP address pool. This address is
used as the gateway address for the guest wireless network.
Subnet Mask: Specify the netmask for the selected network ID.
Lease Time: Specify the DHCP lease time.
SpectraGuard® Enterprise User Guide
293
Administration Tab
Guest clients will be allowed to make DNS queries to specific servers only. Specify at least one DNS server by
clicking Add.. under DNS Servers. The following screen appears on clicking Add..
Add DNS Server
You can specify up to three DNS server IP addresses. Requests to a DNS server, not specified under DNS Servers,
are dropped. Guest users cannot configure DNS servers of their choice. Using an external service like OpenDNS
allows control over what types of site are resolved and hence allowed for guests.
To delete a DNS server, select the entry and click Delete.
Guest Portal Settings
The following figure shows the fields on the Guest Portal tab.
SpectraGuard® Enterprise User Guide
294
Administration Tab
Guest Portal
A guest network is used to provide restricted wireless connectivity (e.g., Internet only) to guests. Currently ONLY
one wireless profile can be configured as a guest network.
Select Enable Splash Page to enable the splash page display.
The portal consists of a web page with a submit button. The portal supports only ‘click-through’; authentication is
not supported. The portal page can be used to display the terms and conditions of accessing the guest network as
well as any other information as needed.
Create a .zip file of the portal page along with any other files like images, style sheets etc. The zip file must satisfy the
following requirements for the portal to work correctly:
SpectraGuard® Enterprise User Guide
295
Administration Tab
The zip file should have a file with the name “index.html” at the root level (i.e., outside of any other folder). This is
the main portal page.
It can have other files and folders, (and folder within folders) at the root level that are referenced by the index.html
file.
The total unzipped size of the files in the bundle should be less than 100 KB. In case, large images or other content is
to be displayed on the page, this content can be placed on an external web server with references from the index.html
file. In this case, the IP address of the external web server must be included in the list of exempt hosts (see below).
The index.html file must contain the following HTML tags for the portal to work correctly:
A form element with the exact starting tag: Source Exif Data:
File Type : PDF
File Type Extension : pdf
MIME Type : application/pdf
PDF Version : 1.6
Linearized : No
Author : tejas
Create Date : 2013:09:06 13:18:17+08:00
Modify Date : 2013:09:06 14:19:03+08:00
Has XFA : No
Language : zh-TW
Tagged PDF : Yes
XMP Toolkit : Adobe XMP Core 4.2.1-c041 52.342996, 2008/05/07-20:48:00
Format : application/pdf
Creator : tejas
Creator Tool : Microsoft® Word 2010
Metadata Date : 2013:09:06 14:19:03+08:00
Producer : Microsoft® Word 2010
Document ID : uuid:11b70501-1c95-4db0-9555-46229a4fd8d0
Instance ID : uuid:17c57c35-d5de-4910-a5eb-8a8f6bf737dc
Page Count : 69
EXIF Metadata provided by EXIF.tools