Specifications in this manual are subject to change without notice.
Originated in the USA.
Trademarks
AOS-W, OmniAccess 4304, OmniAccess 4308, OmniAccess Wireless LAN,
OmniAccess 6000, OmniAccess AP60, OmniAccess AP61, and OmniAccess
AP 70 are trademarks of Alcatel Internetworking, Inc. in the United States and
certain other countries.
Any other trademarks appearing in this manual are owned by their respective
companies.
Legal Notice
The use of Alcatel Internetworking, Inc. switching platforms and software, by
all individuals or corporations, to terminate Cisco or Nortel VPN client devices
constitutes complete acceptance of liability by that individual or corporation for
this action and indemnifies, in full, Alcatel Internetworking, Inc. from any and
all legal actions that might be taken against it with respect to infringement of
copyright on behalf of Cisco Systems or Nortel Networks.
ii Part 031652-00May 2005
Page 3
Prefacexix
An Overview of this Manual . . . . . . . . . . . . . . . xix
z An overview of the sections in this manual
z A list of related documentation for further reading
z A key to the various text conventions used throughout this
manual
z Alcatel support and service information
An Overview of this Manual
This manual is for network administrators and operators
responsible for configuring and monitoring the Alcatel Wireless
LAN Switch. The manual is organized as follows:
z Part 1, “Overview”
Explains the Alcatel Wireless LAN Switch interfaces, including the
Command-Line Interface (CLI) and the Web UI.
z Part 2, “Design”
Explains the basic network design issues in adding a Wireless
LAN switch to a network.
z Part 3, “Configuration”
Explains the features that can be configured for Alcatel Wireless
LAN switches.
z Part 4, “Monitoring”
Explains how Alcatel Wireless LAN switches are managed and
maintained.
z Part 5, “Common CLI Commands”
Explains the CLI syntax for commands commonly used.
z Part 6, “Appendix”
Includes a glossary of terms used in this document.
Preface xix
Page 20
OmniAccess Reference: AOS-W System Reference
Related Documents
The following items are part of the complete documentation for the Alcatel
system:
z Alcatel Wireless LAN Switch Installation Guides (OmniAccess 4308, Omni-
Access Wireless LAN, and OmniAccess 6000)
z Alcatel AOS-W User Guide
z Alcatel AP Installation Guides (AP60/61 and AP70)
Text Conventions
The following conventions are used throughout this manual to emphasize
important concepts:
TABLE P-1 Text Conventions
Type StyleDescription
ItalicsThis style is used to emphasize important terms and to
mark the titles of books.
System itemsThis fixed-width font depicts the following:
z Sample screen output
z System prompts
z Filenames, software devices, and certain commands
when mentioned in the text.
CommandsIn the command examples, this bold font depicts text
that the user must type exactly as shown.
Button
The name of the object (button, link, etc.) on the
interface that you click.
xx Part 031652-00May 2005
Page 21
TABLE P-1 Text Conventions
<Arguments>In the command examples, italicized text within angle
brackets represents items that the user should replace
with information appropriate to their specific situation.
For example:
# send<text message>
In this example, the user would type “send” at the
system prompt exactly as shown, followed by the text of
the message they wish to send. Do not type the angle
brackets.
[ Optional ]In the command examples, items enclosed in brackets
are optional. Do not type the brackets.
{ Item A | Item B }In the command examples, items within curled braces
and separated by a vertical bar represent the available
choices. Enter only one choice. Do not type the braces or
bars.
Contacting Alcatel
Web Site
z Main Sitehttp://www.alcatel.com
z Supporthttp://www.alcatel.com/enterprise
Telephone Numbers
z Main US/Canada(800) 995-2612
z Main Outside US(818) 880-3500
Preface xxi
Page 22
OmniAccess Reference: AOS-W System Reference
xxii Part 031652-00May 2005
Page 23
Part
1
Overview
1
Page 24
OmniAccess Reference: AOS-W System Reference
2 Part 031652-00May 2005
Page 25
CHAPTER 1
Overview
The AOS-W 2.2 Interface Reference is organized by product
feature for the Alcatel Wireless LAN switches and access points.
This guide also includes best practice recommendations and
configuration examples for a number of features.
Key Features
Prevention of Layer-2 Bridging between
Wireless Users
In AOS-W, a global firewall feature has been added to deny all L2
bridging between users. Because wireless users enter the switch
through GRE tunnels, the feature has been labeled “Deny L2
Bridging between Untrusted GRE Tunnels”, and can be
configured under the global firewall settings.
Wired Port 802.1x Authentication
In AOS-W, 802.1x authentication has been extended to wired
ports as well. This implementation is different than that found on
standard Ethernet switches, as they are designed to authenticate
an entire port. Alcatel’s 802.1x implementation is designed to
authenticate individual MAC addresses, regardless of how many
MAC addresses are seen on a given port. Port-based 802.1x
authentication is automatically enabled on any port configured as
“untrusted”, as long as global 802.1x authentication has been
configured.
Overview 3
Page 26
OmniAccess Reference: AOS-W System Reference
Enhanced Location Services
AOS-W 2.2 adds more precise position tracking of wireless devices by utilizing
RF triangulation. In previous AOS-W releases, the “RF Locate” feature would
display the nearest APs receiving signals from a wireless user or AP, along
with the corresponding signal strength. AOS-W 2.2 adds the ability to
triangulate position based on RF signal strength. This algorithm is accurate to
within approximately 10 meters. Note that for triangulation to function
properly, at least three sources of data are required. If three sources of data
are not available, the system will revert to showing the nearest APs receiving
signal from the device to be located. An additional restriction on triangulation
in release 2.2 is that APs must be present in the network in order to provide
live calibration data – triangulation will not function in a network with only air
monitors in this release.
Web Management Interface Enhancements
Many sections of the Web-based management interface have been changed to
improve usability. In addition, all critical features configurable from the CLI are
also now available in the Web interface.
Enhanced Network Monitoring Interface
The “Monitoring” section of the Web-based management interface has been
enhanced through the separation of network monitoring and switch
monitoring. In a network with multiple Alcatel switches, the network
monitoring section now provides an easy interface into the network view of
the system. When connected to the master switch, all users in the entire
network can now be located from the network monitoring section.
SNMPv3
Previous releases of AOS-W supported only SNMPv1 and SNMPv2c. When
connecting Alcatel components to a network management platform across an
insecure network, use of these protocols could lead to unintentional releases
of sensitive information. SNMPv3 provides the ability to encrypt SNMP
communication.
Remote Thin AP
Some customers reported problems when using Alcatel APs connected to a
switch across a low-speed link such as a frame relay connection. The issue
with this was that latency in the low-speed link would cause greater than 5ms
of delay when responding to 802.11 probe request frames from wireless
clients. Certain clients would only wait on a single channel for 5ms, and would
be on a new channel by the time the probe response arrived. AOS-W 2.2
4 Part 031652-00May 2005
Page 27
Chapter 1
provides the ability to enable local probe responses for remotely connected
APs. This feature may be configured under the Wireless LANÆAdvanced
section of the Web-based management interface, or may be configured under
the “ap location” section of the CLI.
Auto-Blacklist Firewall Extended Action
AOS-W 2.2 provides the ability to automatically blacklist (prevent association
to any AP) clients who violate a rule in a firewall policy. This is useful for
protecting wireless LANs made up of devices that cannot perform
authentication, such as Wi-Fi voice handsets or barcode scanners. Devices
such as these should be placed into a role with an extremely restrictive
firewall policy, for example allowing only SIP traffic to a SIP gateway. If an
attacker were to compromise an encryption key or spoof a MAC address on
such a network, a single firewall policy violation (i.e. sending an HTTP request
or initiating a port scan) would cause the station to be immediately
disconnected from the network. This feature may be configured by selecting
it as an extended action in any firewall policy.
Enhanced AP-Switch Discovery and Alcatel Discovery
Protocol
In order for thin APs to operate, they must be able to locate and connect to a
Wi-Fi switch. Alcatel APs have always had the ability to automatically locate a
switch, boot from it, and become operational without requiring any
configuration. In the past, this was based on APs obtaining an address
through DHCP and performing a DNS lookup on the hostname
“Alcatel-master”. While this method of switch location is still popular, a
number of customers requested alternate methods of AP configuration.
AOS-W 2.2 adds “Alcatel Discovery Protocol” (ADP) to provide this
functionality. ADP is present in the switch by loading AOS-W.
APs will go through the following sequence to locate a switch:
Power is applied. If AP does not already contain a pre-configured IP address,
it will issue a DHCP request to obtain an address.
If DHCP response contains an Alcatel vendor-specific option (see below), it
will use this vendor-specific option to contact an Alcatel switch and continue
the boot process.
If the DHCP response contains a DNS server address, the AP will perform DNS
lookup of the hostname “Alcatel-master.<subdomain>”, where <subdomain>
was learned from the DHCP server. If this request is successful, the AP will
use the returned IP address to contact an Alcatel switch and continue the
boot process.
Overview 5
Page 28
OmniAccess Reference: AOS-W System Reference
If no DNS information is available, the AP will begin using Alcatel Discovery
Protocol (ADP) to locate a switch. It will alternately send out ADP broadcast
packets and ADP multicast packets until a response is received. The multicast
packet is an IP packet directed to multicast address 224.0.82.11. If a switch is
attached to the local L2 segment, it will reply to the ADP broadcast. If a switch
has joined the ADP multicast group, the intervening network will forward the
AP multicast packets to the switch and it will reply.
DHCP Configuration
DHCP servers may be configured to return Alcatel vendor-specific options to
APs. The vendor class identifier is “AlcatelAP”, and the vendor-specific option
code is 43. A sample configuration for the open-source ISC DHCP server
follows. In this example, the Alcatel switch is located at IP address 10.1.1.10.
option serverip code 43 = ip-address;
class "vendor-class" {
match option vendor-class-identifier;
}
.
.
.
subnet 10.200.10.0 netmask 255.255.255.0 {
default-lease-time 200;
max-lease-time 200;
option subnet-mask 255.255.255.0;
option routers 10.200.10.1;
option domain-name-servers 10.4.0.12;
option domain-name "test.com";
subclass "vendor-class" "AlcatelAP" {
option vendor-class-identifier "AlcatelAP";
6 Part 031652-00May 2005
Page 29
Chapter 1
option serverip 10.1.1.10;
}
range 10.200.10.200 10.200.10.252;
}
To configure Microsoft’s DHCP server for this feature:
1. Add an “option 43” entry to the desired DHCP scope that contains the IP
address of the Alcatel switch in text. An example of this is shown in the
following figure.
A network supporting IP multicast must be in place to make use of the ADP
multicast capability. To configure the Alcatel switch for multicast, enter:
(config) # adp discovery enable
(config) # adp igmp-join enable
This configuration will cause the Alcatel switch to send an IGMPv2 join
message for multicast group 224.0.82.11.
8 Part 031652-00May 2005
Page 31
CHAPTER 2
Management Options
AOS-W provides a number of methods for managing your Alcatel
Wireless LAN Switch.
Command-Line Interface
The Command-Line Interface (CLI) provides the most direct
method for configuring the switch and collecting system
information. The CLI has the following features:
z Accessible from a local console terminal
z Optionally available through Telnet or SSH to local manage-
ment console or remote network connection
z Comprehensive, industry-standard command system
See “Command Line Basics” on page 13 for more information.
Web Interface
The Web interface provides an intuitive, graphical interface to
special configuration and design tools. The Web interface
provides the following:
z Compatible with a standard Web browser
1
z Accessible from the local management console or remote net-
work connection
1.AOS-W requires Internet Explorer 6.0 or higher. Other browsers may work but
with limited functionality and are therefore not officially supported.
Management Options 9
Page 32
OmniAccess Reference: AOS-W System Reference
z Configure and manage wireless intrusion prevention and performance poli-
cies
z Monitor the state and performance of the Wireless LAN
z Perform a site survey to assist deployment of Alcatel Access Points and Air
Monitors
z Monitor air interface security and performance events
z AP triangulation
General Screen Elements
When Web UI is started after a successful login, the browser window will
show the default page: the Monitor Summary. For ease of navigation, all of the
Web UI pages have a similar page structure:
Selected
Too l
Too l B ar
Logout
Button
Page
Display
Selected
Page
Page
Tree
FIGURE 2-1 Web UI Page Elements
z Tool Bar–This contains buttons for the various tools available in the Web UI
software. Click on a button to select the tool.
z Selected Tool–This displays the name of the currently selected tool.
10 Part 031652-00May 2005
Page 33
Chapter 2
z Page Tree–Each tool has its own information or configuration pages and
sub-pages.
The page tree lists all of the pages available when using the currently selected
tool. You can navigate to any of the listed pages by clicking on the page name.
NOTE—Some of the items in the page tree are merely headings for their sub-pages and cannot be selected. Selectable pages
become highlighted when the mouse cursor is placed over them. Non-selectable items do not react.
z Selected Page–The name of the currently selected page is highlighted in
the page tree.
z Page Display–This area displays all the information and/or input fields rele-
vant to the current page of the current tool.
z Logout Button–Click on this button to end your Web UI session.
Page Elements
Each tool in the Web UI has its own unique information or configuration
pages, each with specialized data and control fields. Some of the page items
appear on multiple pages in multiple tools and provide a similar navigation or
configuration function in each.
Navigation Items
z
Scroll-bars–In some cases, there will be more fields than can be conveniently displayed on one window. When this occurs, standard Windows
scroll-bars will be available to let you access the rest of the page.
z Page Tabs–Some pages feature a row of tabs near the top of the page dis-
play area. Each tab represents a different form available from the current
page.
z Links–Items which are underlined are linked to other pages. By clicking on
the item, the relevant item’s configuration or information page will be displayed.
Fields
z
Information Fields–These fields are used only for displaying information.
The data in these fields cannot be edited directly on the displayed screen.
z Data Entry Fields–Boxed text fields contain user-configurable data. To enter
or edit the information, click inside the field box.
z Pull-down Menus–These fields allow you to select an item from a preset
list. The currently selected item is displayed in the box. When the arrow
button is selected, a list of available options appears. You can change the
current selection by clicking on any item in the options list.
z Scrolling Menus–These fields allow you to select an item from a preset list.
Use the scroll arrows to view the available options. To select a specific
item from the list, click on the item when displayed.
Management Options 11
Page 34
OmniAccess Reference: AOS-W System Reference
z Check Boxes–Represented as small squares in front of the item text. These
fields allow you to turn items on or off by clicking on the check box. A feature or option will be turned on, selected, or enabled (as appropriate) when
the box is checked. A feature or option will be turned off, unselected, or
disabled when the box is empty.
z Radio Buttons–Represented as small circles in front of the item text. When
a group of these items appears together, only one can be selected at any
given time. An item is selected when its circle is filled. An item is unselected when the circle is empty.
Action Buttons
The following buttons are generally available on configuration pages.
z Apply–Accept all configuration changes made on the current page and send
the completed form to the Wireless LAN switch.
z Clear–Reset all options on the current page to their last applied or saved
settings.
z Add–Add a new item to the current page. This generally displays a set of
relevant configuration fields for the added item.
z Edit–Edit the configuration of the selected item.
z Delete–Remove the selected item from the page configuration.
z Save Configuration–Save all applied configuration changes made since dur-
ing this configuration session. Saved settings will be retained when the
switch is rebooted or turned off. Unsaved configuration changes will be
permanently lost.
12 Part 031652-00May 2005
Page 35
CHAPTER 3
Command Line Basics
The Command Line Interface (CLI) is the most direct and
comprehensive method for managing the Alcatel Wireless LAN
Switch. The CLI can be used to gather information about the
switch configuration, collect switch performance statistics, and
make configuration changes.
The CLI uses a simple, text-based interface with a Cisco-like
command structure. The format is compatible with standard
terminals and PC terminal emulation software, and can be
accessed locally or over the network using Telnet.
Connecting to the Switch
Local Serial Console
The CLI is always available using a local terminal or a computer
running terminal emulation software. Attach your terminal directly
to the serial port on the supervisor card and set the terminal to
use the following communications setting:
TABLE 3-1 Console Terminal Settings
Baud RateData BitsParityStop BitsFlow Control
96008None1None
Press <Enter> a few times.to establish the connection and access
the login prompt.
OTE—The serial port accepts an RS-232 serial cable with an
N
RJ-45 male connector (see the Alcatel 6000 Installation Guide
for more port and cable specifications).
Command Line Basics 13
Page 36
OmniAccess Reference: AOS-W System Reference
Local or Remote Telnet
If properly set up, the CLI can be accessed locally or remotely using Telnet. You
can use Telnet (or SSH or the Web GUI) to access any IP interface on an Alcatel
Wireless LAN switch.
Enabling Telnet Access
The default CLI management method is SSH. To enable Telnet, from
configuration terminal mode, enter:
> telnet cli
Telnet access requires that the switch management interface and default
gateway be defined. This is usually done during initial setup (see Step 3 on
page 11) but can also be done manually using the local serial console:
1
Use the local serial console to log in as the administrator.
2
Enter configuration mode and select the management interface
sub-mode:
(Alcatel) # configure terminal
Enter Configuration commands, one per line. End with CNTL/Z
(Alcatel) (config) # interface mgmt
3
Set the management interface IP address and subnet mask:
(Alcatel) (config-mgmt)# ip address
The management interface is active by default.
4
Exit the sub-mode:
<IP address> <subnet mask>
(Alcatel) (config-mgmt)# exit
5
Configure the default gateway for the management interface:
(Alcatel) (config) # ip default-gateway
NOTE—If no default gateway is configured, remote access is available only for
devices on the same subnet as the management interface.
<next hop>
mgmt
14 Part 031652-00May 2005
Page 37
Chapter 3
Using Telnet to Connect
Use a Telnet client on your management workstation to connect to the Alcatel
Wireless LAN Switch management interface IP address. The connection
command may vary depending on the specific software used, but commonly
appears as follows:
> telnet
When the connection is established, the login prompt will be displayed.
<management interface IP address>
Logging In
Once connected, the system displays its host name (Alcatel if not
configured), followed by the log in prompts. Log in using the administrator
account. For example:
(Alcatel)
user: admin
password: admin
As shown above, the default administrator user name is admin, and the default
password is also admin. If the password has been changed, use the correct
one. When properly logged in, the user mode CLI prompt will be displayed:
(
host
) > _
(password is displayed as asterisks)
Access Modes
Once logged in, there are two levels of access to the switch: user mode and
privileged mode.
z User Mode
User mode provides only limited access for basic operational testing, such as
running ping and traceroute. User mode is entered immediately upon login and
is shown with the following prompt:
(
host
) >
where host is the host name of the switch if configured, or Alcatel if not
configured.
User mode commands are documented starting on page 819.
Command Line Basics 15
Page 38
OmniAccess Reference: AOS-W System Reference
z Privileged Mode
All configuration and management functions are available in privileged mode. To
move from user mode to privileged mode requires an additional password:
(Alcatel) > enable
<privileged password>
(Alcatel) #
When successfully promoted to privileged mode, the > prompt is replaced by the
# prompt.
The numerous privileged mode commands are divided into groups according to
their context as outlined in the next section.
Command Context
The commands available while in the privileged mode are divided into a number
of context groups:
z Action Commands
The Action Commands take effect as soon as they are entered. They affect the
current behavior or operation of the switch, but are not saved as part of the
permanent configuration.
The Immediate commands are documented starting on page 819.
z Master Commands
One Alcatel Wireless LAN Switch on the network is responsible for loading
software and configuration files to the Alcatel Access Points and for managing
enhanced Wireless LAN switching features (such as air management and
wireless load balancing).
In a system with only one switch, the single switch always acts as the master.
In a system with more than one switch, one (and only one) switch is selected as
the master.
The master switch has an extended command set for handling Access Points
and enhanced Wireless LAN features. The master commands are documented
starting on page 797.
z Local Commands
In a system with two or more switches, only one acts as the master. The others
act as local switches with a more limited command set.
Commands on local switches mostly affect Layer 2/Layer 3 configuration (such
as physical ports and routing interfaces). The local commands are documented
starting on page 445.
16 Part 031652-00May 2005
Page 39
z Show Commands
The show commands list information about the switch configuration and
performance and are invaluable for debugging system configuration. The show
commands are documented starting on page 833.
Saving Configuration Changes
Configuration changes made using the CLI affect only the current state of the
switch. Unless saved, the changes will be lost when the system is rebooted.
To save your changes so that they will be retained after a reboot, use the
following privileged mode CLI command:
There are two configuration images which can be viewed from the CLI:
z startup-config
This holds the configuration options which will be used the next time the
system is rebooted. It contains all the options last saved using the write memory
command. Presently unsaved changes are not included.
To view the startup-config, use the following command:
(Alcatel) # show startup-config
z running-config
This holds the current switch configuration, including all pending changes
which have yet to be saved.
To view the running-config, use the following command:
(Alcatel) # show running-config
Both configurations can also be saved to a file or sent to a TFTP server for
backup or transfer to another system. See “Making Configuration Backups”
on page 126 for details.
Command Line Basics 17
Page 40
OmniAccess Reference: AOS-W System Reference
Shortcuts
Command Completion
To make command input easier, you can usually abbreviate each key word in
the command. You need type only enough of each keyword to distinguish it
from similar commands. For example:
(Alcatel) # configure terminal
could also be entered as:
(Alcatel) # con t
Three characters (con) represent the shortest abbreviation allowed for
configure. Typing only c or co would not work because there are other
commands (like copy) which also begin with those letters. The configure
command is the only one that begins with con.
As you type, you can press the spacebar or tab to move to the next keyword.
The system will then attempt to expand the abbreviation for you. If there is
only command keyword that matches the abbreviation, it will be filled in for
you automatically. If the abbreviation is too vague (too few characters), the
cursor will not advance and you must type more characters or use the help
feature to list the matching commands.
Command Help
You can use the question mark (?) to get various types of command help.
List Available Commands
When typed at the beginning of a line, the question mark lists all the
commands available in your current mode or sub-mode. A brief explanation
follows each command. For example:
(
host
) > ?
enable Turn on Privileged commands
logout Exit this session. Any unsaved changes are lost.
ping Send ICMP echo packets to a specified IP address.
traceroute Trace route to specified IP address.
18 Part 031652-00May 2005
Page 41
Chapter 3
List Matching Commands
When typed at the end of a possible command or abbreviation, the question
mark lists the commands that match (if any). For example:
(
host
) # c?
clear Clear configuration
clock Configure the system clock
configure Configuration Commands
copy Copy Files
If more than one item is shown, type more of the keyword characters to
distinguish your choice. However, if only one item is listed, the keyword or
abbreviation is valid and you can press tab or the spacebar to advance to the
next keyword.
List Next Parameter
When typed in place of a parameter, the question mark list the available
options. For example:
(
host
) # write ?
erase Erase and start from scratch
file Write to a file in the file system
memory Write to memory
terminal Write to terminal
<Enter>
The <Enter> entry (“carriage return,” or the enter key) indicates that the
command can be entered without additional parameters. Any other
parameters are optional.
Command History
The system records your most recently entered commands. You can review
the history of your actions, or reissue a recent command easily, without
having to retype it.
To view items in the command history, use the <up arrow> to move back
through the list and <down arrow> key to forward. To reissue a specific
command, press <enter> when it appears. You can even use the command line
editing feature to make changes to the command prior to entering it.
Command Line Basics 19
Page 42
OmniAccess Reference: AOS-W System Reference
Command Line Editing
The command line editing feature allows you to make corrections or changes
to a command without retyping. Ta b l e 3 -2 lists the editing controls:
TABLE 3-2 Line Editing Keys
KeyEffectDescription
<Ctrl-a>HomeMove the cursor to the beginning of the line.
<Ctrl-b> or
<left arrow>
<Ctrl-d>Delete
<Ctrl-e>EndMove the cursor to the end of the line.
<Ctrl-f> or
<right
arrow>
<Ctrl-k>Kill RightDelete all characters to the right of the cursor.
<Ctrl-n> or
<down
arrow>
<Ctrl-p> or
<up arrow>
<Ctrl-t>TransposeSwap the character to the left of the cursor with
<Ctrl-u>ClearClear the line.
<Ctrl-w>Delete
<Ctrl-x>Kill LeftDelete all characters to the left of the cursor.
BackMove the cursor one character left.
Delete the character to the right of the cursor.
Right
ForwardMove the cursor one character right.
NextDisplay the next command in the command
history.
PreviousDisplay the previous command in the command
history.
the character to the right of the cursor.
Delete the characters from the cursor up to and
Word
including the first space encountered.
Alpha-numeric characters are always inserted into the line at the cursor
position.
Command Syntax
CLI commands use basic notations for the parameters that modify a
command. These include:
z Brackets [ ]—denotes that the object(s) inside are optional.
z Braces { }—denotes that the object(s) inside are required. If more than one
object is included inside a brace, one of the objects must be specified.
z Angles < >—denotes the parameter is required and must be specified.
20 Part 031652-00May 2005
Page 43
Chapter 3
z Pipe | —denotes a two or more parameters, separated one from the other
by the | symbol.
For example:
crypto ipsec transform-set
<set name>
{esp-des|esp-3des}
{esp-md5-hmac|esp-sha-hmac}
means you have to specify the set name, then choose either esp-des or
esp3des, then choose either esp-md5-hmac or esp-sha-hmac.
client configuration dns
means you have to specify the server1 address, but you do not have to specify
anything about server2.
In general, italics indicates a value you have to enter. For example address
means you have to specify an IP address or MAC address. You cannot just
enter “address”.
Bold, like no, means you enter that string. In this case, just type “no”.
<server1 address> [<server2 address>
|no]
Command Line Basics 21
Page 44
OmniAccess Reference: AOS-W System Reference
22 Part 031652-00May 2005
Page 45
Part
2
Design and
Planning
23
Page 46
OmniAccess Reference: AOS-W System Reference
24 Part 031652-00May 2005
Page 47
CHAPTER 4
RF Design
The Alcatel RF Plan Tool
RF Plan is a three-dimensional wireless deployment modeling tool
that enables Network Administrators to design an efficient
Wireless Local Area Network (Wireless LAN) for their corporate
environment, optimizing coverage and performance, and
eliminating complicated Wireless LAN network setup.
RF Plan provides the following critical functionality:
z Defines Wireless LAN coverage
z Defines Wireless LAN environment security coverage
z Assesses equipment requirements
z Optimizes radio resources
z Creates an exportable Wireless LAN profile that may be
imported into an Alcatel switch and be used to configure and
deploy the Wireless LAN.
z AP validation
z Rogue AP triangulation
RF Plan provides a view of each floor, allowing Network
Administrators to specify how Wi-Fi coverage should be
provided. RF Plan then provides coverage maps and AP/AM
placement locations.
Unlike other static site survey tools that require
administrators to have intricate knowledge of building
materials and other potential Radio Frequency (RF)
hazards, RF Plan calibrates coverage on the fly
through a sophisticated RF calibration algorithm. This
real-time calibration lets administrators characterize
the indoor propagation of RF signals in order to determine the best channel and transmission power set-
RF Design 25
Page 48
OmniAccess Reference: AOS-W System Reference
tings for each AP. Real-time calibration can be automatically
programmed or manually undertaken at any time in order to
quickly adapt to changes in the wireless environment.
Getting Started
The RF Plan application is available on the Alcatel Wireless LAN switch or as a
standalone Windows application. This chapter describes the functionality for
both versions of RF Plan. Where there are differences in how the two
difference versions are used, they are noted.
System Requirements for Standalone RF Plan
The standalone Alcatel RF Plan application requires:
z Windows 2000 or Windows XP
z Microsoft Internet Explorer 6.0 or later
z Macromedia Flash 6.0 or later plug-in for Internet Explorer
z Intel Pentium® III 800Mhz (min) or equivalent
z 128MB RAM
1
z 10MB available hard drive space
Installing RF Plan
To install RF Plan, follow the three steps below:
NOTE—RF Plan only runs on Windows 2000 and WindowsXP.
1. Locate the file named Alcatel RF Plan.zip.
2. Unzip the file.
3. Launch setup.exe.
By default, the installer places the files in C:\Program Files\Alcatel RF Plan
directory. To install the application in a different directory, specify the
appropriate location.
1.Other browsers may work with AOS-W but with limited capability and are therefore unsupported.
26 Part 031652-00May 2005
Page 49
Launching RF Plan
To open RF Plan select: Start > All Programs > Alcatel Offline RF Plan> Alcatel RF
Plan
.
RF Plan Basics
Page Summary
The following is a brief summary of the functionality of each of the pages in
RF Plan.
z Building List PageThe Building List page provides a list of
buildings that you have created and saved.
You may use this page to add or delete
buildings from you saved database. You may
also import or export buildings here.
z Building Overview PageThe Building Overview page allows you to see
all the dimensional data and modeling
parameters for your buildings.
Chapter 4
z Building Specification
Page
Specify the dimensions of your building and
name it in the Building Specifications page.
z AP Modeling PageSpecify the AP Modeling parameters on this
page.
z AM Modeling PageSpecify the AM Modeling parameters on this
page.
z Import and ExportUse this page to import and export building
database files.
z Planning Floors PageThe Planning Floors page allows you to see
approximate coverages of APs and AMs, as
well as any floor plans you may have imported
as background images.
z Floor Editor PageUse this page to upload background images
for each floor, name the floor and delete floors.
NOTE—You cannot have more than one
browser window open when you are trying to
upload images.
RF Design 27
Page 50
OmniAccess Reference: AOS-W System Reference
z Area Editor PageUse this page to specify areas on each floor
where coverage is not desirable or where
Access Points/Air Monitors may not be
physically deployed.
z Access Editor PageUse this page to manually create, position, or
configure Access Points or Air Monitors.
z AP PlanThe AP Plan page is used to initialize the
position of Access Points and launch RF
Plan’s positioning algorithm.
z AM PlanThe AP Plan page is used to initialize the
position of Air Monitors and launch RF Plan’s
positioning algorithm.
Page Fields
Each tool in the RF Plan has its own unique information or configuration pages,
each with specialized data and control fields. Some of the page items appear
on multiple pages and provide a similar navigation or configuration function in
each.
z Information Fields–These fields are used only for displaying information.
The data in these fields cannot be edited directly on the displayed screen.
z Data Entry Fields–Boxed text fields contain user-configurable data. To enter
or edit the information, click inside the field box.
z Pull-down Menus–These fields allow you to select an item from a preset
list. The currently selected item is displayed in the box. When the arrow
button is selected, a list of available options appears. You can change the
current selection by clicking on any item in the options list.
z Scrolling Menus–These fields allow you to select an item from a preset list.
Use the scroll arrows to view the available options. To select a specific item
from the list, click on the item when displayed.
z Check Boxes–These fields are represented as small squares in front of the
item text. These fields allow you to turn items on or off by clicking on the
check box. A feature or option will be turned on, selected, or enabled (as
appropriate) when the box is checked. A feature or option will be turned
off, unselected, or disabled when the box is empty.
z Radio Buttons–These fields are represented as small circles in front of the
item text. When a group of these items appears together, only one can be
selected at any given time. An item is selected when its circle is filled. An
item is unselected when the circle is empty.
28 Part 031652-00May 2005
Page 51
Chapter 4
Navigation
The RF Plan tool is a wizard in that it logically guides you through the process
of defining radio coverage for all the buildings on your campus. The left pane
of the wizard screens shows the progression you follow each time you click
Apply. The button on the top, right corner also takes you to the next logical
step. You can also click the link on the left pane to go to any screen in the
wizard.
Regardless of your current location, you can always return to the opening
window by clicking Plan on the menu bar.
Applying and Saving
When you edit information on any of the RF Plan pages you need to apply that
information before it is effective. However, applying the information doesn’t
save it to your hard drive. You must click on the Save button to permanently
save the information.
The following buttons are generally available on configuration pages.
z Apply–Accept all configuration changes made on the current page (does
not save changes).
z Save–Save all applied configuration changes made since during this config-
uration session to a database file. Unsaved configuration changes will be
lost when the RF Plan tool is exited.
NOTE—Always Apply. If you advance to the next step without clicking on the
Apply button the information will be lost.
Next Step Button
RF Plan will sequence you through all the pages as you setup your Wireless
LAN. When you have finished entering the information for each page, click
Next Step located in the upper right-hand portion of the page.
RF Design 29
Page 52
OmniAccess Reference: AOS-W System Reference
Opening Screen
When RF Plan opens, the browser window will show the default page: the RF
Plan Building List page.
Building List Page
The Building list page contains all the buildings you have defined using the RF
Plan software. The first time you run the application, there should be no
buildings in the list.
FIGURE 4-1 Building List Page
z New Building Use this button to create a new building. See
“Adding a New Building to the Plan” on page 32.
z Edit BuildingsUse this button to edit existing buildings in the
building list. See “Adding a New Building to the
Plan” on page 32
z Delete BuildingsUse this button to delete existing buildings in the
building list.
z ExportUse this button to export a database file with all
the specifications and background images of a
selected building(s) in the building list. See “Import
and Export” on page 39
z ImportUse this button to import database files defining
pre-existing buildings into the RF Plan building list.
See “Import and Export” on page 39
z LocateUse this button to find the specified building.
30 Part 031652-00May 2005
Page 53
z SearchWhen the database of buildings has been created,
use this feature to find a specific building, on a
specific campus, or search for a name string.
You may add, edit, and delete buildings using this window. You may also
import and export buildings using the import and export buttons.
Using RF Plan
Task Overview
Before you begin take a minute to review this section, it explains the general
steps in the order they should be taken to create a building and plan the
Wireless LAN for it.
z Gather information about your building’s dimensions and floor plan.
z Determine the level of coverage you want for your Access Points and Air
Monitors.
z Create a new building and add its dimensions.
z Enter the parameters of your Access Point coverage.
Chapter 4
z Enter the parameters of your Air Monitor coverage.
z Add floors to your building and import the floor plans.
z Define special areas.
z Generate suggested AP and AM tables by executing the AP/AM Plan fea-
tures.
z Export the building.
RF Design 31
Page 54
OmniAccess Reference: AOS-W System Reference
Planning Requirements
You should collect the following information before beginning to plan your
network. Having the information below readily available will expedite your
planning efforts.
z Building Dimensions
z Number of floors
z Distance between floors
z Number of users and number of users per AP
z Radio type(s)
z Overlap Factor
z Desired data rates for access points
z Desired monitoring rates for air monitors
z Areas of your building(s) that you don’t necessarily want coverage
z Areas of your building(s) where you don’t want to, or cannot, deploy an
AP or AM
z Any area where you want to deploy a fixed AP or AM.
Building Dimensions
Height:Width:
Number of Floors:
User Information
Number of Users:Users per AP:
Radio Types:
Overlap Factor:
AP Desired Rates
802.11b|g:802.11a:
AM Desired Rates
802.11b|g:802.11a:
Don’t Care/Deploy Areas
Adding a New Building to the Plan
To define a new building, click New Building.
32 Part 031652-00May 2005
Page 55
Chapter 4
The Overview page shows the default values for your new building, most of
which you can change in the following pages.
On Building Overview Page you will be able to view the specifications for the
following:
z Your buildings dimensions.
z Access Point modeling parameters.
z Air Monitor modeling parameters.
To define your building, click
displays.
Building Dimensions. The Specification page
RF Design 33
Page 56
OmniAccess Reference: AOS-W System Reference
Building Specification Page
The Building Specification Page enables you to specify the identity of your
building and its dimensions.
Enter the appropriate values in the text boxes in the Dimension window.
z Building IDThis consists of two decimal numbers separated by a
dot. The first is the campus ID. The campus ID will
always be “1” if there is only one campus. The second is
the building number.
The valid range for these fields is any integer from 1 to
255.
z Building Name Enter a user friendly name for the building.
The Building Name may be an alpha-numeric string up to
64 characters in length.
z Width and
Height
z Inter-floor
Height
34 Part 031652-00May 2005
Enter the rectangular exterior dimensions of the
building.
The valid range for this field is any integer from 1 to a
value corresponding to .
This is the distance between floor surfaces in the
building.
The valid range for this field is any integer from 1 to a
value corresponding to .
NOTE—This is NOT the distance from floor to ceiling. Some
buildings have a large space between the interior ceilings
and the floor above.
112×10
1
×10
12
Page 57
z FloorsEnter the number of floors in your building here.
Chapter 4
The valid range for this field is any integer from 1 to a
value corresponding to .
1
×10
12
z UnitsSpecify the units of measurement for the dimensions
you specified on the page. The choices are feet and
meters.
A Word About Building Dimensions
The dimensions you specify for building width and height should be the major
dimensions (maximum height and width) of the overall footprint of the
building as illustrated below.
Maximum Width
Maximum Height
When height and width are specified, RF Plan creates a rectangular area in the
Planning feature pages that represent the overall area covered by the building.
You will need to import an appropriate background image (see, “Floor Editor
Page” on page 44.) to aid you in defining areas that don’t require coverage or
areas in which you do not wish to deploy Access Points and Air Monitors
(see,“Area Editor Page” on page 45).
Define your first building on this campus and click
Apply. The AM Modeling
page displays.
RF Design 35
Page 58
OmniAccess Reference: AOS-W System Reference
AP Modeling Page
The AP Modeling page allows you to specify all the information necessary for
RF Plan to determine the appropriate placement of your APs.
Controls on this page allow you to select or control the following functions:
z Radio TypeUse this pull-down menu to specify the radio type in the
appropriate combination of a, b, and or g configuration.
z AP TypeSpecify AP 52 or AP 60.
z CoverageUse this option to let RF Plan automatically determine
the number of APs based on desired data rates and the
configuration of your building. The desired rate is
selectable from 1 to 54 Mbps in both the Coverage and
Capacity models.
z CapacityUse this option to let RF Plan determine the number of
APs based upon the total number of users, ratio of users
to APs, and desired data rates. The desired rate is
selectable from 1 to 54 Mbps in both the Coverage and
Capacity models.
z CustomUse this option to simply specify a fixed number of APs.
z Overlap Factor Use this field and pull-down to specify an overlap factor.
z RatesUse these pull-down to specify the data rates desired on
your Access Points.
z Users/APSelectable for Capacity or Custom models.
z APsSelectable for Capacity or Custom models.
36 Part 031652-00May 2005
Page 59
Chapter 4
Radio Type
Specify the radio type(s) of your APs using the pull-down Radio Type menu on
the Modeling Parameters page.
Available Radio Type Choices:
z 801.11a5GHz, Orthogonal Frequency Division Multiplexing
(OFDM) with data rates up to 54Mbps.
z 802.11b2.4GHz, Direct Spread Spectrum (DSSS) multiplexing
with data rates up to 11Mbps.
z 802.11g2.4GHZ, OFDM/CCK (Complementary Code Keying)
with data rates up to 54Mbps.
Overlap Factor
The Overlap Factor is the amount of signal area overlap that you want when
the APs are operating. Overlap is important if an AP fails. It allows the
network to self-heal with adjacent APs powering up to assume some of the
load from the failed device. Although there may be no holes in coverage in this
scenario, there will likely be a loss of throughput. Increasing the overlap will
allow for higher throughputs when an AP has failed and will allow for future
capacity as the number of users increases.
The valid range of values for the overlap factor are from 100% to 1000%.
Users
NOTE—The Users text boxes are active only when the Capacity model is selected.
Enter the number of users you expect to have on your Wireless LAN in the
Users text box. Enter the number of users per access point you expect in the
Users/AP text box.
The numbers entered in the these two text boxes must be no-zero integers
between 1-255 inclusive.
Rates
NOTE—The Rate pull-down menus are active only when the Coverage or Capacity
design models are selected.
Select the desired data rates from the pull-down menus for 802.11b/g and
802.11a.
High data transmission rates will require an increased number of AP to be
placed in your building. You should carefully evaluate your user’s data rate
needs.
RF Design 37
Page 60
OmniAccess Reference: AOS-W System Reference
Click Apply and the AM Modeling page displays.
AM Modeling Page
The AM Modeling page allows you to specify all the information necessary for
RF Plan to determine the appropriate placement of your AMs.
Controls on this page allow you to select or control the following functions:
z Monitor RateUse this pull-down menu to specify the desired monitor
rate for your Air Monitors.
z AMsUse this field to manually specify the number of Air
Monitors to deploy (Custom Model only).
z Design ModelUse these radio buttons to specify a design model to
use in the placement of Air Monitors.
Design Models
Two radio buttons on the page allow you to control the kind of model which
will be used to determine the number and type of APs.
Design Model Radio Button Options:
z CoverageUse this option to let RF Plan automatically determine
the number of AMs based on desired monitor rates and
the configuration of your building.
Desired rate is selectable from 1 to 54 Mbps in the
Coverage model.
z CustomUse this option to simply specify a fixed number of
AMs. When the AM Plan portion of RF Plan is executed,
RF Plan will make an even distribution of the AMs.
38 Part 031652-00May 2005
Page 61
Chapter 4
NOTE—The monitor rates you select for the AMs should be less than the data rates
you selected for the APs. If you set the rate for the AMs at a value equal to that
specified for the corresponding PHY type AP, RF Plan will allocate one AM per
AP. If you specify a monitor rate larger than the data rate, RF Plan will allocate
more than one AM per AP.
Monitor Rates
Use the drop down menus to select the desired monitor rates for 802.11b/g
and 802.11a air monitors.
NOTE—This option is available only when the coverage design model is selected.
Import and Export
RF Plan allows you to import and export files that define the parameters of
your buildings. The files that you import and export are XML files and
depending on how many floors your buildings have, and particularly how
many background images you have for your floors, the XML files may be quite
large. (See “Background Images” on page 44.)
Buildings exported from RF Plan will be imported into an Alcatel switch and
used by the version of RF Plan that is integrated into the Web UI Software.
The exported building file contains all the data about the building(s) you
created using RF Plan. The integrated RF Plan in Web UI gives you the ability
to automatically configure the APs and AMs that are actually connected to the
switch using the Suggested AP and Suggested AM tables created by RF Plan.
(See, “AP Plan” on page 49 and “AM Plan” on page 51.)
Import Buildings
The Import Buildings page allows you to import configuration information
from an existing Alcatel switch so you can modify it for use on another switch
or in an another building.
Only XML files exported from an Alcatel switch or from Alcatel RF Plan may be
imported into RF Plan.
RF Design 39
Page 62
OmniAccess Reference: AOS-W System Reference
NOTE—Importing any other file, including XML files from other applications,
may result in unpredictable results.
Any file you wish to import must be in the C:\Program Files\Alcatel RF Plan\data\ path. You can not specify any other path in the RF Plan Import
Buildings dialog.
Export Buildings
The Export Buildings page allows you to export the configuration of the
Wireless LAN you just created so that it may be imported into and used to
automatically configure your Alcatel switches.
Files exported from RF Plan will be placed in the C:\Program Files\Alcatel RF Plan\data\ directory on your hard drive.
When exporting a building file it is recommended that you check the Include
Images check box.
When naming your exported file, be sure to give the file the .XML file
extension.
Example: My_Building.XML
40 Part 031652-00May 2005
Page 63
Planning Pages
Planning Floors Page
Chapter 4
The Planning Floors page enables you to see what the footprint of your floors
look like. You can select or adjust the following features on the Planning
Floors Page.
z ZoomUse this pull-down menu or type a zoom factor in
the text field to increase or decrease the size of the
displayed floor area.
z Approximate Cover-
age Map (select
radio type)
Use this pull-down to select a particular radio type
for which to show estimated coverage.
z Coverage Rate Use this pull-down to modify the coverage areas
based on a different data rate.
z Floor EditorClick on this link to launch the Floor Editor. See
“Floor Editor Page” on page 44.
z Area EditorClick on this link to launch the Area Editor. See
“Area Editor Page” on page 45.
z Access Point Editor Click on this link to launch the Access Point Editor.
See “Access Editor Page” on page 46.
RF Design 41
Page 64
OmniAccess Reference: AOS-W System Reference
Zoom
The Zoom control sets the viewing size of the floor image. It is adjustable in
finite views from 10% to 1000%. You may select a value from the pull-down
zoom menu or specify a value in the text box to the left of the pull-down. When
you specify a value, RF Plan adjusts the values in the pull-down to display a set
of values both above and below the value you typed in the text box.
Coverage
Select a radio type from the Coverage pull-down menu to view the
approximate coverage area for each of the APs that RF Plan has deployed in AP
Plan or AM Plan. Adjusting the Coverage values will help you understand how
the AP coverage works in your building.
NOTE—You will not see coverage circles displayed here until you have executed either
an AP Plan or an AM Plan.
42 Part 031652-00May 2005
Page 65
Chapter 4
Coverage Rate
Adjusting the coverage rate will also affect the size of the coverage circles for
AMs. Adjusting the rate values will help you understand how the coverage
works in your proposed building.
Reading Coverage Maps
Under some conditions, AP or AM signal strengths show in coverage maps
may not be reported accurately. One condition is a single AP or AM in the
corner of a building. The coverage map may show the signal strength
extending well outside the building. However, if the signal encounters nearby
interference in the building, the signal strenght may be much weaker in the
area of the interference. This area of weakened signal strength will likely not
be reflected in the coverage map.
Another condition that renders the coverage map to be somewhat inaccurate
is an environment in which multiple APs or AMs differ substantially in signal
strength. In this mixed environment, the coverage map will average signal
strengths of the devices and may report strengths slightly less than the actual
signal strength of the stronger devices and slightly greater than that of the
weaker devices.
Per Floor Recap
Between each floor display, RF Plan lists the APs and AMs defined for the
floor.
RF Design 43
Page 66
OmniAccess Reference: AOS-W System Reference
Floor Editor Page
Click Edit Floor to display the Floor Editor which allows you to specify the
background image, and name the floor.
Naming
You may name the floor anything you choose as long as the name is an
alpha-numeric string with a maximum length of 64 characters. The name you
specify appears just to the right of the Floor Number displayed just above the
background image in the Planning view.
Background Images
A background image (floor plan image) may be imported into RF Plan for each
floor. A background image is extremely helpful when specifying areas where
coverage is not desired or areas where an AP/AM is not to be physically
deployed.
Select a background image using the Browse button on the Floor Editor Dialog.
z File Type and Size
Background images must be JPEG format and may not exceed 2048 X 2048
pixels in size. Attempting to import a file with a larger pixel footprint than that
specified here will result in the image not scaling to fit the image area in the
floor display area.
NOTE—Because the background images for your floors are embedded in the XML file
that defines your building you should strongly consider minimizing the file size of
the JPEGs you use for your backgrounds. You can minimize the file size by selecting the maximum compression (lowest quality) in most graphics programs.
z Image Scaling
Images are scaled (stretched) to fit the display area. The display area aspect
ratio is determined by the building dimensions specified on the Dimension
page.
44 Part 031652-00May 2005
Page 67
Chapter 4
Area Editor Page
The area editor allows you to specify areas on your buildings floors where you
either do not care about coverage, or where you do not want to place an AP or
AM.
Open the Area Editor by clicking on the New link in the Areas field just below
the area where the background image is displayed.
Area Editor “New” Link
You specify these areas by placing them on top of the background image
using the Area Editor.
Naming
You may name an area using an alpha-numeric string of characters with a
maximum length of 64 characters. You should give areas some meaningful
name so that they are easily identified.
Locating and Sizing
You may specify absolute coordinates for the lower left corner and upper right
corner of the box that represents the area you are defining. The datum for
measurement is the lower left corner of the rectangular display area that
represents your building’s footprint. The coordinates of the upper right-hand
corner of the display area are the absolute (no unit of measure) values of the
dimensions you gave your building when you defined it with the dimension
feature.
For example: If you defined your building to be 200 feet wide and 400 feet
long, the coordinates of the upper right-hand corner would be (199, 399).
NOTE—Remember, the location is zero based, so the values range from 0 to (height-1
and width-1).
RF Design 45
Page 68
OmniAccess Reference: AOS-W System Reference
You may also use the drag and drop feature of the Area Editor to drag your
area to where you want it and resize it by dragging one or more of the handles
displayed in the corners of the area.
Don’t Care areas are displayed as orange rectangles.
Don’t Deploy areas are displayed as yellow rectangles.
Access Editor Page
The Access Editor allows you to manually create or modify a suggested access
point.
Naming
RF Plan automatically names APs using the default convention “a number”. It
assigns the number starting at 1 and increasing by one for each new AP. When
you manually create an AP that new AP is then assigned the next “a” number
in sequence and added to the bottom of the suggested AP list.
46 Part 031652-00May 2005
Page 69
Chapter 4
You may name an Access Point anything you wish. The name must be
comprised of alpha-numeric characters and be 64 characters or less in length.
Location
The physical location of the AP is specified by X-Y coordinates beginning at
the lower left corner of the display area. The numbers you specify in the X and
Y text boxes are whole units. The X coordinates increase as a point moves up
the display and the Y coordinates increase as they move from left to right
across the display.
Y
262 ft.
98
0,0126
X
418 ft.
Fixed
Fixed APs don’t move when RF Plan executes the positioning algorithm.
NOTE—You might typically set an AP as fixed when you have a specific room, such
as a conference room, in which you want saturated coverage. You might also
want to consider using a Fixed AP when you have an area that has an unusually
high user density.
Choose Yes or No from the drop down box. Choosing Yes will lock the
position of the AP as it is shown in the coordinate boxes of the Access Editor.
Choosing No will allow RF Plan to move the AP as necessary to achieve best
performance.
PHY Types
The PHY Type drop down menu allows you to specify what radio mode the
AP will use. You may choose from one of the following:
z 802.11a/b/g
z 802.11a
z 802.1 b/g
RF Design 47
Page 70
OmniAccess Reference: AOS-W System Reference
802.11 Types
The 802.11 b/g and 802.11a Type drop down boxes allow you to choose the
mode of operation for the access point. You may choose to set the mode of
operation to access point (Alcatel AP) or Air Monitor.
802.11 Channels
The 802.11a and 802.11b/g channel drop down menus allow you to select
from the available channels.
N
OTE—The available channels will vary depending on the regulatory
domain (country) in which the device is being operated.
802.11a channels begin at channel 34 at a frequency of 5.170 MHz and
increase in 20MHz steps through channel 161 at 5.805 Mhz.
802.11b/g channels begin at 1 and are numbered consecutively through 14. The
frequencies begin at 2.412 MHz on channel 1 and increase in 22 MHz steps
through Channel 14 at 2.484 MHz.
802.11 Power Levels
The power level drop down menus allow you to specify the transmission
power of the access point. Choices are OFF, 0, 1, 2, 3, and 4. A setting of 4 will
apply the maximum Effective Isotropic Radiated Power (EIRP) allowed in the
regulatory domain (country) in which you are operating the access point.
Memo
The Memo text field allows you to enter notes regarding the access point. You
may enter a maximum of 256 alpha-numeric characters in the Memo field.
48 Part 031652-00May 2005
Page 71
AP Plan
The AP Plan feature uses the information entered in the modeling pages to
locate access points in the building(s) you described.
Chapter 4
Initialize
Initialize the Algorithm by clicking on the Initialize button. This makes an initial
placement of the access points and prepares RF Plan for the task of
determining the optimum location for each of the APs. As soon as you click
the Initialize button you will see the AP symbols appear on the floor plan.
Access points are represented by this symbol.
RF Design 49
Page 72
OmniAccess Reference: AOS-W System Reference
Colored circles around the AP symbols on the floor plan indicate the
approximate coverage of the individual AP and the color of the circle
represents the channel on which the AP is operating. The circles appear when
you select an approximate coverage value on one of the Floors pages. You may
also use click on an AP icon and drag it to manually reposition it.
Start
Click on the Start button to launch the optimizing algorithm. You will see the
AP symbols moving on the page as RF Plan finds the optimum location for
each.
The process may take several minutes. You may watch the progress on the
status bar of your browser. The algorithm will stop when the movement is less
than a threshold value calculated based on the number of APs. The threshold
value may be seen in the status bar at the bottom of the browser window.
Viewing the Results
The results of optimizing algorithm may be viewed two ways: graphically and
in a table of suggested APs. You may obtain information about a specific AP
by placing the cursor over its symbol. An information box appears containing
information about the exact location, PHY type, channel, power, etc.
50 Part 031652-00May 2005
Page 73
Chapter 4
The Suggested AP Table lists the coordinates, power, location, power setting,
and channel for each of the APs that are shown in the floor plan.
AM Plan
The AM Plan feature calculates the optimum placement for your air monitors
(AMs).
Initialize
Initialize the Algorithm by clicking on the Initialize button. This makes an initial
placement of the air monitors and prepares RF Plan for the task of determining
the optimum location for each of the AMs. As soon as you click the Initialize
button you will see the AM symbols appear on the floor plan. Air Monitors are
represented by this symbol.
Start
Click on the Start button to launch the optimizing algorithm. You will see the
AM symbols moving on the page as RF Plan finds the optimum location for
each.
The process may take several minutes. You may watch the progress on the
status bar of your browser. The algorithm will stop when the movement is
less than a threshold value calculated based on the number of AMs. The
threshold value may be seen in the status bar at the bottom of the browser
window.
RF Design 51
Page 74
OmniAccess Reference: AOS-W System Reference
Viewing the Results
Viewing the results of the AM Plan feature is similar to that for the AP Plan
feature.
The results of optimizing algorithm may be viewed two ways: graphically and
in a table of suggested AMs. You may obtain information about a specific AP
by placing the cursor over its symbol. An information box appears containing
information about the exact location, PHY type, channel, power, etc.
The Suggested AP Table lists the coordinates, power, location, power setting,
and channel for each of the APs that are shown in the floor plan.
Locating Devices
To find a specific device by for example a MAC address or ESSID, click Locate
on the main menu (Building List). AOS-W locates devices by the process of
triangulation.
52 Part 031652-00May 2005
Page 75
Chapter 4
RF Design 53
Page 76
OmniAccess Reference: AOS-W System Reference
54 Part 031652-00May 2005
Page 77
CHAPTER 5
Security Options
Strong network security is an absolute necessity in today’s
enterprise network environment. There are prying “eyes”
everywhere. Some who want to gain access to your secrets, and
some who are just plain malicious.
Security hinges on two important concepts. Encryption of the
information traveling on the network, and authentication of users
on the network. This ensures that only authorized users are using
the network and that the data transmitted by them is strongly
encrypted.
Cunning and devious hackers have devised ways to attack secure
networks and gain unauthorized access. Therefore, cunning and
inventive network security professionals have devised methods
to detect, defend, and disable would-be attackers from gaining
access to or disrupting the network.
One of the principle features of Alcatel AOS-W is the ability to
lock the air so that unauthorized users can’t even get past the
antennas of a wireless access point. Alcatel’s Intrusion Detection
System (IDS) detects and neutralizes all the common types of
intrusion attacks that might be mounted against the network.
Additionally, AOS-W deploys both Layer 2 and Layer 3 security
protocols allowing a full spectrum of network security measures.
Security Options 55
Page 78
OmniAccess Reference: AOS-W System Reference
Default Open Ports
By default, Alcatel Wireless LAN Switches and Access Points treat ports as
being untrusted. However, certain ports are open by default. To maintain
security, these default open ports are only open on the trusted side of the
network. These open ports are listed in Table 5 -1 below.
TABLE 5-1 Default (Trusted) Open Ports
Port
Number
17TCPWireless
21TCPWireless
22TCPWireless
23TCPAP and
53UDPWireless
67UDPAP (and
ProtocolWhere UsedDescription
LAN
Switch
LAN
Switch
LAN
Switch
Wireless
LAN
Switch
LAN
Switch
Wireless
LAN
Switch if
DHCP
server is
configured
)
This is use for certain types of
VPN clients that accept a banner
(QOTD). During normal operation,
this port will only accept a
connection and immediately
close it.
FTP server for AP6X software
download.
SSH
Telnet is disabled by default but
the port is still open
Internal domain
DHCP server
56 Part 031652-00May 2005
Page 79
TABLE 5-1 Default (Trusted) Open Ports (Continued)
Chapter 5
Port
Number
68UDPAP (and
69UDPWireless
80TCPAP and
123UDPWireless
161UDPAP and
443TCPWireless
500UDPWireless
ProtocolWhere UsedDescription
Wireless
LAN
Switch if
DHCP
server is
configured
)
LAN
Switch
Wireless
LAN
Switch
LAN
Switch
Wireless
LAN
Switch
LAN
Switch
LAN
Switch
DHCP client
TFTP
HTTP Used for remote packet
capture where the capture is
saved on the Access Point.
Provides access to the WebUI on
the Wireless LAN Switch.
NTP
SNMP. Disabled by default.
Used internally for captive portal
authentication (HTTPS) and is
exposed to wireless users. A
default self-signed certificate is
installed after the user explicitly
selects this port to be open.
Users in a production
environment are urged to install a
certificate from a well known CA
such as Verisign. Self-signed
certs are open to
man-in-the-middle attacks and
should only be used for testing.
ISAKMP
Security Options 57
Page 80
OmniAccess Reference: AOS-W System Reference
TABLE 5-1 Default (Trusted) Open Ports (Continued)
Port
Number
514UDPWireless
1701UDPWireless
1723TCPWireless
2300TCPWireless
3306TCPWireless
4343TCPWireless
4500 UDPWireless
8080TCPWireless
ProtocolWhere UsedDescription
Syslog
LAN
Switch
L2TP
LAN
Switch
PPTP
LAN
Switch
Internal terminal server opened
LAN
Switch
LAN
Switch
LAN
Switch
LAN
Switch
LAN
Switch
by telnet soe command.
Remote wired MAC lookup.
HTTPS. A different port is used
from 443 in order to not conflict
with captive portal. A default
self-signed certificate is installed
after the user explicitly selects
this port to be open. Users in a
production environment are
urged to install a certificate from
a well known CA such as
Verisign. Self-signed certs are
open to man-in-the-middle
attacks and should only be used
for testing
sae-urn
Used internally for captive portal
authentication (HTTP-proxy). Not
exposed to wireless users.
58 Part 031652-00May 2005
Page 81
TABLE 5-1 Default (Trusted) Open Ports (Continued)
Chapter 5
Port
Number
8081TCPWireless
8082TCPWireless
8083TCPWireless
8088TCPWireless
8200UDPWireless
8211UDPWireless
ProtocolWhere UsedDescription
LAN
Switch
LAN
Switch
LAN
Switch
LAN
Switch
LAN
Switch
LAN
Switch
Used internally for captive portal
authentication (HTTPS). Not
exposed to wireless users. A
default self-signed certificate is
installed after the user explicitly
selects this port to be open.
Users in a production
environment are urged to install a
certificate from a well known CA
such as Verisign. Self-signed
certs are open to
man-in-the-middle attacks and
should only be used for testing.
Used internally for single sign-on
authentication (HTTP). Not
exposed to wireless users.
Used internally for single sign-on
authentication (HTTPS). Not
exposed to wireless users.
Internal
Alcatel Discovery Protocol (ADP)
Internal
AOS-W Security Options
The following security configuration options are supported in AOS-W:
z Roles
z Policies
z AAA Servers
z Authentication Methods
z VPN Settings
Security Options 59
Page 82
OmniAccess Reference: AOS-W System Reference
z Global Firewall Settings
z Advanced
These options are described in this chapter.
User Roles
Role Design
The role of a wireless user determines a number of access policies, including
firewall/traffic policies, bandwidth contracts, IP address pool, VLAN
assignment, and VPN dialer. The role is determined through some type of
authentication mechanism, and can be as simple as “employee” versus
“guest”, or more granular such as “sales user, marketing user, finance user, IT
staff”. The selection of a role framework is an important design decision.
Role Configuration
To manage user roles, navigate to Configuration > Security > Roles. Current roles
will be displayed, as shown in the figure below.
FIGURE 5-1 User Roles
To edit an existing role, click Edit. To add a new role, click Add as shown in the
figure below.
60 Part 031652-00May 2005
Page 83
Chapter 5
FIGURE 5-2 Add New Role
User role configuration parameters are described in the following sections.
Security Options 61
Page 84
OmniAccess Reference: AOS-W System Reference
CLI Configuration for User Roles
Sample CLI configuration follows for two different user roles. One is used for
IT staff who have full access to the entire network, normally use VPN access,
and have no bandwidth limitations. The other role is used for guest users.
Guests must reauthenticate every 30 minutes, have a 1Mbps rate limiting
policy applied, and have a restricted traffic policy that allows only Internet
access.
A “traffic policy” is a term used to describe a stateful flow-classification rule. In
other words, a traffic policy identifies specific characteristics about a data
packet passing through the switch, then takes some action based on that
identification. In an Alcatel switch, the action could be a firewall-type action
such as permitting or denying the packet, an administrative action such as
logging the packet, or a quality of service (QoS) type action such as setting
Diffuser or 802.1p bits or placing the packet into a priority queue. Traffic
policies can be applied to users, giving differential treatment to different users
on the same network, or to physical ports, applying the same policy to all
traffic through that port.
Traffic policies are often confused with access control lists (ACLs), but the two
have some major differences:
Traffic policies are stateful, meaning they understand flows in a network and
keep track of the state of sessions. If a policy is enabled to allow telnet
outbound from a client, a traffic policy will understand that inbound traffic
associated with that session should be allowed. ACLs have no memory of
62 Part 031652-00May 2005
Page 85
Chapter 5
what came before – at best, ACLs can look at the “SYN” flag in a TCP packet,
treating the session as new if the flag is set and treating the session as
“established” if it is not. This works for “normal” traffic but is ineffective
against many types of attack traffic.
Traffic policies in an Alcatel Wi-Fi switch are dynamic, meaning that address
information in the rules can change as the policies are applied to users. For
example, a traffic policy containing the alias “user” can be created. After the
policy is applied to a particular user, this alias is automatically changed to
match the IP address assigned to the user. An ACL is typically a static packet
filter, with IP addresses hard coded into the rule.
Traffic policies are bi-directional. While ACLs are normally applied either to
traffic inbound to an interface or outbound from an interface, traffic policies
automatically work in both directions. Traffic policy configuration can be
simpler than ACL configuration for this reason, since the administrator does
not need to worry about building consistent input and output ACLs.
Configuring Traffic Policies
To configure traffic policies, navigate to Configuration > Security > Policies as
shown in the figure below.
FIGURE 5-3 Traffic Policies
Security Options 63
Page 86
OmniAccess Reference: AOS-W System Reference
To edit or delete existing policies, click the appropriate button. Note that some
policies are system policies and cannot be deleted. The Policy Usage column
will display which user roles currently have a policy applied – if a policy is in
use, it cannot be deleted. To delete a policy that is in use, first edit the user role
and delete the policy, then return to the policies screen to delete it.
To add a new policy, click the Add button. The “Add New Policy” screen
appears, as shown in the figure below. Supply a descriptive name for the new
policy, and click
Add under Rules to begin adding rules.
FIGURE 5-4 Add New Policy
Source/Destination
Identical parameters are available for both source and destination selection.
Traffic policies are bi-directional, and will match traffic in either direction. A
packet will match a particular rule in the traffic policy only if the rule is matched
exactly, meaning that source address, destination address, and service all
match. However, traffic policies are stateful. For example, when a wireless
user generates a DNS request to a DNS server, the traffic policy will
automatically create a session entry for the response so that the response will
be permitted. Because traffic policies are stateful, it is not necessary to
configure separate rules for inbound and outbound traffic. All packets that
match an identified flow will receive the same treatment by the traffic policy.
Five choices exist for both source and destination.
Any – Alias that represents any IP address.
User –Alias that represents the user’s IP address. When a traffic policy
containing the “user” alias is applied to an authenticated user, this alias is
replaced by the IP address assigned to that user. With this alias, generic traffic
policies can be configured that will automatically be customized at the time of
user login.
Host – A single IP address.
64 Part 031652-00May 2005
Page 87
Chapter 5
Network – An IP subnet, consisting of a network number and subnet mask.
Alias – When Alias is selected, allows selection of a pre-defined
source/destination alias, or creation of a new one. See the section of this
guide entitled “Source/Destination Aliases” for more information on these
aliases.
Service
Traffic flows are identified in part by their service type. A service type may be
defined by IP protocol number, TCP port number(s), or UDP port number(s).
Four options are available for service selection:
Any – Represents any service.
TCP – Matches TCP packets destined to the specified port(s). To specify a
single port, enter it in the Port1 field. To specify a range of ports, enter the
lower port number in the Port1 field, and the upper port number in the Port2
field.
UDP – Matches UDP packets destined to the specified port(s). To specify a
single port, enter it in the Port1 field. To specify a range of ports, enter the
lower port number in the Port1 field, and the upper port number in the Port2
field.
Service – Matches a pre-defined service alias, and also provides the ability to
create a new service alias by clicking the “New” button. The use of a service
alias allows for a more easily readable and understandable policy. For more
information about service aliases, please see the section of this guide entitled
“Service Aliases”.
Protocol – Matches an IP protocol number. For example, IPSec ESP uses
protocol number 50 (IPSec ESP is also a pre-defined service alias called
“svc-esp”.)
Action
The traffic policy action defines what the disposition of packets matching the
rule will be. Five options are available:
Permit – Forwards the packet unmodified
Deny – Silently drops the packet
Security Options 65
Page 88
OmniAccess Reference: AOS-W System Reference
Src-nat – Changes the source IP address of the packet. If no source NAT pool
is specified, the packet will be given the source IP address of the Alcatel
switch. If a NAT pool is specified, the packet will be given an IP address from
the NAT pool. Add a new NAT pool by clicking
navigating to Configuration > Security > Advanced > NAT Pools.
Dst-nat – Changes the destination IP address of the packet to that of the
Alcatel switch. Used primarily for intercepting VPN sessions to outside VPN
concentrators or for captive portal authentication.
Redirect – The redirect action does not modify the packet, but changes the
internal destination of the packet. This action is configured automatically by
the system when Stateful 802.1x is enabled. This action can also be
configured by the administrator to redirect packets to tunnel interfaces.
New, or manage NAT pools by
Log
If the “Log” option is checked, all packets matching the rule will be recorded in
the system logfile. Use caution when enabling this option for high-volume
traffic, since the logfile will quickly grow very large.
Queue
Select this action to place packets outbound to wireless users in either a high
or low priority queue. AOS-W uses strict queueing, meaning that any time
packets are waiting in the high priority queue, they will be transmitted ahead of
packets in the low priority queue.
Rule Ordering
After rules have been defined the order of rules may be changed by clicking on
the up arrow or down arrow next to each rule, as shown in the figure below.
The order of rules is important, since policies are executed from the first rule
sequentially to the last rule.
66 Part 031652-00May 2005
Page 89
FIGURE 5-5 Rule Ordering
CLI Configuration
Chapter 5
All CLI configuration for traffic/firewall policies is done under the ip access-list session command. Equivalent CLI configuration for the example
shown above is:
ip access-list session Internet_Only
user alias Internal_Network svc-dhcp permit
user alias Internal_Network svc-dns permit
user alias Internal_Network any deny
user any svc-http permit
user any svc-https permit
user any svc-ike permit
user any any deny
Applying Traffic Policies to Physical Ports
Traffic policies can be applied either to user roles, as described below in the
User Roles section, or to physical ports. To apply traffic policies to a physical
port, navigate to Configuration > Switch > Port. Select the port to which the
policy should be applied, then select the policy under
in the figure below.
Firewall Policy as shown
Security Options 67
Page 90
OmniAccess Reference: AOS-W System Reference
FIGURE 5-6 Applying Traffic Policies to Ports
To add traffic policies to ports using the CLI, use the following format:
interface fastethernet 2/13
ip access-group guest session
Firewall Policies
This section provides an ordered list of traffic policies applied to the user role.
Traffic policies are executed in order, with an implicit “deny all” after the final
policy. For more information on firewall and traffic policies, see the section
entitled “
To apply a new policy to the user role, click
Firewall and Traffic Policies.”
Add.
FIGURE 5-7 User Role Traffic Policies
Three options are available when adding new traffic policies to a user role:
Choose from Configured Policies – Select this option to apply a traffic policy
already configured in the system. By default, the policy will be applied to the
user role regardless of where the user is physically located (indicated by
Location 0.0.0). However, if the policy only applies while the user is associated
to a particular AP or is located in a particular building or floor, fill in the
68 Part 031652-00May 2005
Page 91
Chapter 5
“Location” field on this line. See the chapter entitled “Wireless LAN
Configuration – Advanced Location-Based AP Configuration” for more
information on location codes.
Create New Policy From Existing Policy – Select this option to create a new
traffic policy by copying an existing one. The next screen will allow
modification of the newly created policy as well as selection of a location
code. See the section entitled “Firewall and Traffic Policies” for information on
building traffic policies.
dc=Alcatelnetworks, dc=com
Create New Policy – Create an entirely new traffic policy. The next screen will
allow editing of the newly created policy as well as selection of a location
code. See the section entitled “Firewall and Traffic Policies” for information on
building traffic policies.
Multiple traffic policies may be applied to a user role. When multiple traffic
policies are applied, they behave as a single policy – that is, once a rule is
matched in the policy and action is taken, no further rules are processed in the
policy. Rules are executed from top to bottom, so the placement of rules
within a policy and of policies within a user role is important. When multiple
traffic policies are applied to a user role, their position within the role may be
adjusted using the up and down arrows, as shown in the figure below.
FIGURE 5-8 Multiple Policies
Other Role Parameters
Re-authentication Interval – By default, once a user has been authenticated
that user will remain authenticated until the login session is terminated. If this
parameter is set, re-authentication will be required on a periodic basis. If
re-authentication is unsuccessful, the user will be denied access to the
network.
Security Options 69
Page 92
OmniAccess Reference: AOS-W System Reference
Role VLAN ID –This parameter allows the user to be mapped to a particular
VLAN based on the role assigned. This parameter only works when using L2
authentication such as 802.1x, MAC address role mapping, ESSID role
mapping, or encryption type role mapping, because these happen before an IP
address has been assigned. If a user authenticates using a L3 mechanism such
as VPN or captive portal, this parameter has no effect.
Bandwidth Contract – Applies a bandwidth contract, or rate limiting policy, to
the user role to prevent any one user from monopolizing network resources.
Bandwidth contracts may be viewed or edited by navigating to
Security > Advanced > Bandwidth
be created while adding or editing a user role – to do this, select Add New,
supply a name for the bandwidth contract, and fill in the desired bandwidth
limit either in kilobits per second or in megabits per second. Bandwidth
contracts are part of the user role, but are applied independently on a per-user
basis. For example, if two users are active on the network and both are part of
the same role with a 500kbps bandwidth contract, then each user will be able
to use up to 500kbps.
VPN Dialer – If VPN is used is an access method, a user may login using
captive portal and download a customized VPN “dialer”. This dialer is a
Windows application that configures the VPN client built into Microsoft
Windows 2000 and Windows XP. The VPN dialer may be customized based on
the user role. This parameter specifies which customization profile should be
available for download to users who are part of this user role. See the section
entitled “
dialers.
Configuring VPN Settings” for more information on setting up VPN
Contract. A new bandwidth contract may also
Configuration >
L2TP Pool – If VPN is used as an access method, specifies which address pool
the user’s IP address should be assigned from when the user negotiates an
L2TP/IPSec session. Address pools are configured under Configuration >
Security > VPN Settings > IPSec > Address Pools
Configuring VPN Settings” for more information on setting up L2TP/IPSec.
“
PPTP Pool – If VPN is used as an access method, specifies which address pool
the user’s IP address should be assigned from when the user negotiates a
PPTP session. Address pools are configured under Configuration > Security >
VPN Settings > PPTP > Address Pools
Settings
” for more information on setting up PPTP.
. See the section entitled “Configuring VPN
. See the section entitled
Access Control Lists
Access Control Lists (ACLs) are a common way of restricting certain types of
traffic on a physical port. (ACLs can be applied on a per user, per group, as well
as a per port basis.) Standard and extended ACLs are both available for
compatibility with router software from other popular vendors. However,
traffic policies provide equivalent and greater function than standard and
extended ACLs, and should be used instead. When filtering non-IP traffic on a
70 Part 031652-00May 2005
Page 93
Chapter 5
physical port basis, MAC address ACLs and Ethertype ACLs are both
available. All ACL configuration is done through the CLI – because these
options are not often used, no GUI configuration is available.
ACLs are applied to interfaces using the ip access-group command. The
direction of traffic to which the ACL is applied must also be specified, using
either the keywords
in or out. For example:
interface FastEthernet 1/21
ip access-group IP-only in
Standard ACLs
A standard ACL permits or denies traffic based on the source IP address of
the packet. Standard ACLs can be either named or numbered, with valid
numbers in the range of 1 to 99 and 1300 to 1399. Standard ACLs use a
bitwise mask (sometimes inaccurately called an “inverse netmask”) to specify
which portion of the address should be matched.
Sample configuration:
ip access-list standard 1
permit 1.0.0.0 0.255.255.255
permit host 10.1.1.3
deny any
The example above permits any traffic from the subnet 1.0.0.0/8. It also
permits traffic from a host with IP address 10.1.1.3. All other traffic is denied.
Extended ACLs
Extended ACLS permit or deny traffic based on source or destination IP
address, source or destination port number, or IP protocol. Extended ACLs
can be named or numbered, with valid numbers in the range of 100 to 199 and
2000 to 2699. The command syntax follows standard Cisco IOS conventions,
and extensive context-sensitive help is available by pressing the ? key after
each keyword entry.
Sample configuration:
ip access-list extended 101
permit tcp any host 1.1.1.1 range 67 69
Security Options 71
Page 94
OmniAccess Reference: AOS-W System Reference
permit icmp 1.1.1.0 0.0.0.255 any echo-reply
The example above permits TCP traffic from any host to 1.1.1.1 on ports 67
through 69. It also permits ICMP echo-replies from the 1.1.1.0/24 subnet to
any network.
MAC ACLs
A MAC ACL is used to filter on a specific source MAC address or range of
MAC addresses. MAC ACLs can be either named or numbered, with valid
numbers in the range of 700 to 799 and 1200 to 1299.
Sample configuration:
ip access-list mac 700
permit host 00:01:01:04:cf:b2
permit 00:03:01:00:00:00 ff:ff:ff:00:00:00
The sample above permits a specific host with MAC address
00:01:01:04:cf:b2. Also permits any MAC address with the prefix of 00:03:01.
Ethertype ACLs
Ethertype ACLs are used to filter based on the ethertype field in the frame
header. These ACLs could be used, for example, to permit IP while blocking
other non-IP protocols such as IPX or AppleTalk. Ethertype ACLs can be named
or numbered, with valid numbers in the range of 200 to 299.
Sample configuration:
ip access-list eth IP-only
permit 2048
The above ACL permits only IP traffic. IP is ethertype 0x800 (hex) or 2048
(decimal). The ethertype can also be entered in hex using “0x” to precede the
ethertype value.
Authentication and Accounting Servers
All strong authentication methods (meaning that the user identity is validated)
must use some type of authentication server. In an Alcatel switch, the
authentication server may be an internal database, or may be an external
RADIUS or LDAP server. MAC address “authentication” also can make use of
an authentication server, simplifying access control when many
MAC-authenticated devices (such as VoIP handsets) are used in a network.
72 Part 031652-00May 2005
Page 95
Chapter 5
To configure general authentication server settings, navigate to
Security > AAA Servers > General
, as shown in the figure below.
Configuration >
FIGURE 5-9 AAA General Parameters
Configuration parameters for this section are:
User Idle Timeout – Determines the maximum amount of time a user may
remain idle before being deauthenticated and removed from the system. The
default is 5 minutes.
Authentication Server Dead Time – Determines the maximum amount of time
an authentication server may remain unresponsive before it is considered
down. Multiple authentication servers may be configured for each
authentication method – if the first server in the list is down, the request will
be sent to the second server.
The equivalent CLI configuration for the example above is:
aaa timers idle-timeout 5
aaa timers dead-time 10
RADIUS
RADIUS is the most commonly used type of authentication server. RADIUS is
flexible, extensible, and has a high degree of interoperability. To configure
RADIUS server settings navigate to
RADIUS
, as shown in the figure below.
Configuration > Security > AAA Servers >
Security Options 73
Page 96
OmniAccess Reference: AOS-W System Reference
FIGURE 5-10 RADIUS Server Configuration
A list of currently configured RADIUS servers appears in this section. To edit or
delete an existing server, click the appropriate button. To add a new RADIUS
server, click the “Add” button as shown in the figure below.
FIGURE 5-11 Add RADIUS Server
Available configuration parameters when adding a RADIUS server are:
Server Name – Supply a human-readable name for the RADIUS server. This
name will be referenced in other parts of the configuration when this RADIUS
server is used.
IP Address – Specifies the IP address of the RADIUS server.
74 Part 031652-00May 2005
Page 97
Chapter 5
Shared Secret – Each RADIUS client-server pair must use a shared secret.
Treat this shared secret as a password, and ensure that it is not an
easily-guessed word. Ensure that the shared secret is configured identically
on the RADIUS server.
Authentication Port – Specifies the UDP port number over which RADIUS
exchanges will take place. The default is 1812 – this value is typically used by
most modern RADIUS implementations.
Accounting Port – When RADIUS accounting is enabled, this value specifies
the UDP port number over which RADIUS accounting exchanges will take
place. The default is 1813 – this value is typically used by most modern
RADIUS implementations.
Num Retries – Specifies the number of times that the Alcatel switch will send
authentication requests without receiving a reply
Timeout – Specifies how long, in seconds, the Alcatel switch will wait for a
response from the RADIUS server for each request sent.
Mode – Enables or disables use of this RADIUS server. A server may be
disabled, for example, when the server will be offline for maintenance.
The equivalent CLI configuration for the example above is:
For each authentication server used by the system, a server rule may be
configured to specify how role and VLAN information is determined. Role and
VLAN determination may be done simply by specifying a default value per
authentication type, or the information may be learned from the authentication
server through a RADIUS attribute. Any attribute may be used – the server rule
specifies how that attribute is mapped into a role or VLAN. Server rules are
executed in order, and multiple server rules may be configured for each
authentication server. To add a new server rule, click the “Add” button.
Security Options 75
Page 98
OmniAccess Reference: AOS-W System Reference
FIGURE 5-12 Add RADIUS Server Rule
Available configuration parameters are:
Rule Type – Specifies if the server rule is used to determine role assignment or
VLAN assignment.
Attribute – Specifies a RADIUS attribute that will contain role or VLAN
information.
Condition – Specifies how the system will match the attribute. If the condition
is set to “value-of”, the contents of the attribute will be treated literally as the
role or VLAN assignment. For example, if the attribute is set to “Filter-ID” and
the condition is set to “value-of”, the RADIUS server will return the value of
“IT-Staff” in side the Filter-ID attribute to set the user’s role to “IT-Staff”.
Valu e – If the condition is set to any option other than “value-of”, the value
specifies what the contents of the attribute should be in order to match the
rule. For example, if the attribute is set to “Filter-ID”, the condition is set to
“equals”, and the value is set to “IT”, a role can be selected when the RADIUS
server returns the Filter-ID attribute containing the value “IT”.
Role/VLAN – Specifies the role or VLAN that will be set if the rule is matched.
The equivalent CLI configuration for the example above is:
aaa derivation-rules server Auth2 set role condition
"Filter-Id" value-of
76 Part 031652-00May 2005
Page 99
Chapter 5
LDAP
LDAP (Lightweight Directory Access Protocol) is a lightweight protocol for
accessing directory services. A directory is a specialized database optimized
for searching, reading and browsing. Directories tend to contain descriptive,
attribute-based information. LDAP is specifically geared towards X.500 based
directory services and runs over TCP/IP.
LDAP Background
The LDAP information model is based on entries, where an entry is a
collection of attributes. An attribute has a type and one or more values. A
type is typically a mnemonic string, for example, “cn” for Common Name, or
“mail” for Email Address. The syntax of an attribute’s value depends on the
type of the attribute. It can be a string, for example, the value “John Doe” for
“cn”, or a binary JPEG format value for an attribute, say “jpegPhoto”. LDAP
allows the administrator to control the attributes in an entry through the use
of a special attribute called objectClass. An objectClass defines the attributes
for an entry, and specifies which attributes are required, and which ones are
optional. In addition to the attributes that comprise an entry, protection and
privacy mechanisms for an entry can be specified in LDAP. Access rights for
performing the read/write/search operations on the entry can be defined for
each entry.
In LDAP, the directory entries are organized in a hierarchical tree-like structure.
Traditionally, this structure reflected the geographic and/or organizational
boundaries. For example, entries representing countries appear at the top of
the tree. Below them are entries representing states and national
organizations. Below them may be entries representing organizational units,
people, printers, documents etc. An example LDAP directory for an
organization is shown below.
Security Options 77
Page 100
OmniAccess Reference: AOS-W System Reference
dc=Alcatelnetworks,dc=com
ou=People
ou=People
ou=Printers
uid=jdoe,cn=John Doe
uid=guest,cn=Guest
FIGURE 5-13 LDAP Directory Structure
An entry at a given level in the directory’s tree structure is identified by a
Relative Distinguished Name (or RDN). For example, the RDN of a user “John
Doe” in an NIS based organization is “uid=jdoe” or “cn=John Doe”. The
attribute that is used to specify the Login ID in the RDN is called the key attribute. The Distinguished Name is used to identify an entry uniquely in a
global namespace. It identifies an entry in the entire tree. It is built by
incorporating the names in the tree along the path that lead up to the entry. For
example, the DN for the entry corresponding to user “John Doe”, in our
example, would be: “uid=jdoe, ou=People, dc=Alcatelnetworks, dc=com”. There
is usually one entry in the directory that has special privileges: the root/admin
entry. This entry usually has read/write/search privileges over all the entries in
the directory.
LDAP provides an API for interrogating and updating the directory. Although
LDAP supports operations to add, delete and update an entry, it is primarily
used to search for information in the directory. The LDAP search operation
allows the user to specify the portion of the directory that should be searched.
In addition, a search filter¸ can be used to specify the criteria that should be
looked for in the entries that are being searched for.
In addition to the above operations, LDAP supports access control by
providing a mechanism for a client to authenticate itself to the server. Typically,
a root or admin entry in the directory has access privileges to all the entries in the
directory. Some implementations, like Active Directory for example, do not
allow even the root entry to read the password attribute of another entry in
order to protect the privacy of an entry. During client authentication, the client
should supply the distinguished name of the entry that it is trying to connect
as, and the password for the entry. Since the connection between the client
78 Part 031652-00May 2005
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.