This document contains proprietary information,
which is protected by copyright. No part of this
document may be photocopied, reproduced, or
translated into another language without the prior
written consent of Hewlett-Packard.
Publication Number
5990-8809
March, 2004
Edition 1
Applicable Products
HP ProCurve Access Controller 720wl (J8153A)
HP ProCurve Access Control Server 740wl (J8154A)
HP ProCurve Integrated Access Manager 760wl (J8155A)
HP ProCurve 700wl 10/100 Module (J8156A)
HP ProCurve 700wl Gigabit-SX Module (J8157A)
HP ProCurve 700wl Gigabit-LX Module (J8158A)
HP ProCurve 700wl 10/100/1000Base-T (J8159A)
HP ProCurve 700wl Acceleration Module (J8160A)
Trademark Credits
Windows NT®, Windows®, and MS Windows® are US
registered trademarks of Microsoft Corporation.
Disclaimer
HEWLETT-PACKARD COMPANY MAKES NO
WARRANTY OF ANY KIND WITH REGARD TO
THIS MATERIAL, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE. Hewlett-Packard shall not
be liable for errors contained herein or for incidental or
consequential damages in connection with the
furnishing, performance, or use of this material.
The only warranties for HP products and services are
set forth in the express warranty statements
accompanying such products and services. Nothing
herein should be construed as constituting an
additional warranty. HP shall not be liable for technical
or editorial errors or omissions contained herein.
Hewlett-Packard assumes no responsibility for the use
or reliability of its software on equipment that is not
furnished by Hewlett-Packard.
Warranty
See the Customer Support/Warranty booklet included
with the product.
A copy of the specific warranty terms applicable to
your Hewlett-Packard products and replacement parts
can be obtained from your HP Sales and Service Office
or authorized dealer.
ii
CONTENTS
Preface
Chapter 1 Introduction
700wl Series Overview
700wl Series Functions
Client Authentication
Client Access Rights
Wireless Data Privacy and VPN Protocols
Roaming Support
Network Address Translation
VLAN Tag Support
Chapter 2 Using the 700wl Series System
Initial Configuration of the 700wl Series System
Managing and Administering the 700wl Series System 2-2
Centralized Administration 2-3
Logging on to the Administrative Console 2-4
Changing the Built-In Administrator Username and Password 2-5
Using Online Help
Logging Out
ix
1-1
1-1
1-3
1-3
1-4
1-4
1-4
1-5
1-6
2-1
2-1
2-5
2-6
Using the Administrative Console
Header Bar and Navigation Bar
Tabs
Basic System Configuration Tasks
Setting Up Authentication and Access Rights
System Features and Concepts
Centralized Management and Administration
Enterprise Class Redundancy
Bandwidth Management
Addressing in the 700wl Series System
Layer 3 Roaming Support
VLANs and the 700wl Series System
2-7
2-7
2-10
2-16
2-16
2-17
2-17
2-18
2-20
2-21
2-23
2-24
iii
Chapter 3 System Status
3-1
Viewing Status Information
Viewing Equipment Status
Viewing Access Control Server Status
Viewing Access Controller Status
Viewing Access Controller Status Details
Viewing Client Status
Filtering Client Status Information
Viewing Client Details
Viewing Session Status
Filtering Session Status Information
Viewing License Information
Chapter 4 Configuring Rights
Access Rights in the 700wl Series System
The Rights Manager
Configuring Access Rights—An Overview
The Rights Assignment Table
Adding or Editing a Rights Assignment
Identity Profiles
Creating or Editing an Identity Profile
3-1
3-3
3-4
3-5
3-5
3-7
3-9
3-9
3-12
3-14
3-15
4-1
4-1
4-4
4-5
4-6
4-9
4-11
4-13
Users in the Built-In Database
Creating or Editing a User
Network Equipment in the Built-in Database
Creating or Editing an Equipment Entry
Retrieving MAC Addresses from an LDAP Database
Specifying an LDAP Service for MAC Address Retrieval
Configuring the Search for MAC Addresses
Connection Profiles
Creating or Editing a Connection Profile
Locations
Time Windows
Example—Modifying the “Guest Access” Access Policy
Enabling an Existing Allowed Traffic Filter—Outside World
4-16
4-17
4-20
4-22
4-24
4-25
4-26
4-29
4-31
4-35
4-37
4-39
4-41
4-43
4-62
4-66
4-72
4-75
4-79
4-79
iv HP ProCurve Secure Access 700wl Series Management and Configuration Guide
Modifying the Outside World Filter to Restrict Access
Setting Up HTTP Proxy Filters
4-82
4-83
Chapter 5 Configuring Authentication
Authentication in the 700wl Series System
The Rights Manager
Authentication Policies
Creating or Editing an Authentication Policy
Configuring Authentication Services
Configuring an LDAP Authentication Service
Using the Active Directory LDAP Service
Using a Netscape or iPlanet Directory Service
Configuring the 802.1X Authentication Service
Configuring a Kerberos Authentication Service
Configuring a RADIUS Authentication Service
Using RADIUS for Accounting
Configuring an XML-RPC Authentication Service
NT Domain Logon
External Identity Retrieval
Logon Page Customization
Customizing a Logon Page
Customizing the Stop Page
Customized Page Templates
Tools and Options
Simulating User Rights
Tracing Authentication Service Transactions
Importing and Exporting the Rights Configuration
5-1
5-1
5-4
5-4
5-6
5-7
5-8
5-13
5-14
5-16
5-17
5-19
5-20
5-22
5-27
5-28
5-30
5-32
5-37
5-39
5-42
5-42
5-47
5-49
Chapter 6 Configuring the Network
700wl Series System Components
The System Components List
Configuring an Access Control Server
Configuring an Integrated Access Manager
Configuring Access Controllers
Organizing Access Controllers into Folders
Configuring Failover with Redundant Access Control Servers
The Secondary Access Control Server
Disabling Redundancy
HP ProCurve Secure Access 700wl Series Management and Configuration Guide v
6-1
6-2
6-2
6-3
6-7
6-10
6-13
6-15
6-16
6-17
6-17
6-19
SSL Certificate
6-28
Configuring Network Interfaces
Configuring the Port Speed and Duplex Settings
Port Subnet IP Address and Subnet Netmask
Configuring SNMP
Setting the Date and Time
Setting Up Administrators
Editing an Administrator’s Settings
Editing Your Administrator Password
Chapter 7 Setting up Wireless Data Privacy
Overview of Wireless Data Privacy
Wireless Data Privacy Setup
Global Wireless Data Privacy Configuration
Configuration for IPSec
IPSec Certificate Configuration
IP Address Assignment for Tunneling
VPN Tunneling and Network Address Translation
Chapter 8 System Maintenance
6-34
6-34
6-36
6-38
6-40
6-42
6-44
6-45
7-1
7-1
7-2
7-3
7-3
7-5
7-11
7-12
8-1
Software Setup
Updating the System Software
Remote Update
Local Update
Restarting Using the Alternate Version Software
Backing Up and Restoring the System Configuration
Creating the Backup Image
Saving the Backup as a File
Restoring From a Backup File
Transferring a Backup to a Different System
Shutting Down and Restarting a System Component
Restarting a System Component
Shutting Down a System Component
Resetting to Factory Default Settings
Chapter 9 Logs
Viewing 700wl Series System Logs
Configuring Session Logging
Viewing the Session Logs
The Session Log Entry Format
8-1
8-2
8-5
8-9
8-12
8-13
8-14
8-15
8-16
8-17
8-18
8-19
8-20
8-21
9-1
9-1
9-4
9-6
9-6
vi HP ProCurve Secure Access 700wl Series Management and Configuration Guide
Appendix A Command Line Interface
A-1
Accessing the Command Line Interface
Connecting with a Serial Console
Connecting Using SSH
Using the CLI on an Integrated Access Manager
Command Syntax
Getting CLI Command Help
Administrator Access Control Commands
System Status and Information Commands
Network Configuration Commands
Port Configuration Commands
Access Controller Port Status Commands
Access Controller Configuration
Advanced Network Configuration Status
Access Control Server Configuration
Advanced Network Configuration
Remote Commands
Wireless Data Privacy Configuration
Active Client Management Commands
System Backup, Upgrade and Shutdown Commands
Backup and Restore
Upgrading the System Software
Stopping and Restarting the System
Resetting to Factory Defaults
A-2
A-2
A-2
A-2
A-3
A-3
A-4
A-6
A-9
A-12
A-13
A-14
A-15
A-15
A-18
A-18
A-21
A-23
A-25
A-25
A-27
A-29
A-30
Diagnostic and Log Commands
Time Configuration
SNMP Configuration and Reporting Commands
Appendix B Filter Expression Syntax
Introduction
Filter Specification Syntax
Tcpdump Primitives
Appendix C Creating Customized Templates
Introduction
A Simple Logon Page Template Example
Example 1
Logon Template Elements
Required Elements
HP ProCurve Secure Access 700wl Series Management and Configuration Guide vii
A-30
A-33
A-34
B-1
B-1
B-1
B-2
C-1
C-1
C-2
C-2
C-3
C-4
Optional Elements C-5
Logon Page Template — A More Advanced Example C-7
Example 2 C-7
Changing the Logon Button Names C-10
Example 3 C11
Customizing the Logon Page Messages C-12
Guest Registration Template C-13
Example 4 C-14
Using a Logoff Pop-Up with a Customized Logon Page C-16
Example 5 C-17
Redisplaying the Logon Page in a New Window C-18
Customizing the Stop Page C-19
Appendix D
Appendix E
Index of Commands
Index
Troubleshooting D-1
Glossary E-1
IOC-1
IX-1
viii HP ProCurve Secure Access 700wl Series Management and Configuration Guide
PREFACE
This preface describes the audience, use, and organization of the Management and Configuration Guide. It
also outlines the document conventions, safety advisories, compliance information, related
documentation, support information, and revision history.
Audience
The primary audience for this document are network administrators who want to enable their network
users to communicate using the HP ProCurve system. This document is intended for authorized
personnel who have previous experience working with network telecommunications systems or similar
equipment. It is assumed that the personnel using this document have the appropriate background and
knowledge to complete the procedures described in this document.
How To Use This Document
This document contains procedural information describing the configuration and management of the HP
ProCurve Integrated Access Manager, Access Control Server, and Access Controller. Where applicable,
navigation aids also refer you to supplemental information such as figures, tables, and other procedures
in this document or another document. Main chapters are followed by supplemental information such as
appendices and an index.
Document Conventions
The following text conventions are used in this document:
Table 1. Text Conventions
Convention Definition
Boldface Tahoma Screen menus, commands, or field names that you select are in boldface Arial.
Boldface Italic
Palatino
Italic Palatino
Courier Filenames and text that you type are in Courier.
New terms that are introduced are in boldface italic Palatino.
Emphasized terms and cross references to other areas in the manual are in italic
Palatino.
ix
The following notices and icons are used to alert you to important information.
Table 2. Notices
Icon Notice Type Alerts you to...
None Note Helpful suggestions or information of special importance in certain
situations.
None Caution Risk of system functionality loss or data loss.
Warning Risk of personal injury, system damage, or irrecoverable data loss.
Document Organization
This manual is organized as follows:
Chapter 1–Introduction
This chapter provides an introduction to the 700wl Series system.
Chapter 2–Using the 700wl Series System
This chapter helps you get started using the 700wl Series system and its Administrative Console. It gives
an overview of what you can do and provides pointers to where to learn more for each task and
procedure.
Chapter 3–System Status
This chapter describes the status component of the 700wl Series system. It explains how to monitor
equipment. client, and session status.
Chapter 4–Configuring Rights
This chapter describes how network access rights are assigned to clients through the 700wl Series system,
and explains how to configure access control policies.
Chapter 5–Configuring Authentication
This chapter describes how clients are authenticated through the 700wl Series system, and explains how
to configure authentication policies.
x HP ProCurve Secure Access 700wl Series Management and Configuration Guide
Chapter 6–Configuring the Network
This chapter describes how to configure the 700wl Series system components so that they work with your
enterprise network.
Chapter 7–Setting up Wireless Data Privacy
This chapter describes how to enforce security using IPSec, L2TP, and PPTP.
Chapter 8–System Maintenance
This chapter explains how to install new software, backup your system, and shutdown and reboot.
Chapter 9–Logs
This chapter explains how to configure, examine and use the 700wl Series system log.
Appendices
Appendix A–Command Line Interface
This appendix provides a description of the 700wl Series system command line interface.
Appendix B–Filter Expression Syntax
This appendix describes the syntax of the filter specifications used by the Rights Manager for defining
Allows, Redirects, Bridged traffic, and HTTP Proxy filters.
Appendix C–Creating Customized Templates
This appendix explains how to create customized templates for the Logon, Guest Registration, and Logoff
web pages.
Appendix D–Troubleshooting
This appendix presents troubleshooting procedures for the 700wl Series system, including the symptoms,
probable cause and recommended actions for a variety of problems.
Appendix E–Glossary
The Glossary explains terms that are relevant to the 700wl Series system. These terms are shown in italics
when first used.
HP ProCurve Secure Access 700wl Series Management and Configuration Guide xi
Index of Commands
The Index of Commands is an alphabetized list of the CLI commands with references to the pages where
they are documented.
Related Publications
There are several other publications related to the 700wl Series that may be useful:
• 700wl Series Software Release Notes provides the most up-to-date information on the current software
release.
• The 700wl Series Installation and Getting Started Guide documents the initial system installation and
configuration of your HP ProCurve hardware unit.
• The 700wl Series Quick Start Guide provides a much briefer overview of the system installation of your
hardware unit.
• The700wl Series Wireless Data Privacy™ Guide provides information and instructions for configuring
Wireless Data Privacy on the 700wl Series system, including information and instructions on
configuring selected Wireless Data Privacy clients on Windows and Macintosh client systems.
• The 700wl Series Software Migration Guide provides important information and instructions for
customers who are upgrading from 700wl Series system software version 3.0 or 3.1 to version 4.0 or
later.
All system documentation is available on the HP ProCurve Technical Support web site at
http://www.hp.com/rnd/index.htm. In addition, all documentation except the Release Notes is
available on the 700wl Series Documentation CD-ROM which accompanies each 700wl Series system
unit.
xii HP ProCurve Secure Access 700wl Series Management and Configuration Guide
1
INTRODUCTION
This chapter provides a brief introduction to the 700wl Series system™ and its primary features. The
topics covered in this chapter include:
The 700wl Series system’s industry-leading cost-performance and uniquely flexible and scalable
deployment architecture provides the foundation for a secure, scalable, mission-critical 802.11 wireless
network. At the core of the wireless LAN (WLAN) the 700wl Series system provides key services
including centralized management and control, role-based fine-grained access policy enforcement, secure
Layer 3 roaming, and tiered layers of security, which enables companies to deploy and manage 802.11
networks ranging from tens to thousands of access points (APs).
A 700wl Series system consists of a central Access Control Server 740wl that provides services such as
authentication, roaming, and policy management, and one or more Access Controller 720wl units. Access
Controllers are gateway devices deployed at the edge of the network in the user data path enforcing
network authorization and business policy.
The Access Controller (the HP ProCurve Access Controller 720wl) is a low cost, high-performance
appliance with modular connectivity options that require minimal configuration, and are deployed in
conjunction with an HP ProCurve Access Control Server 740wl. The Access Controller sits between the
Wireless Access Points and the network, and implements a powerful Packet Inspection Engine (Layer 2-
7) that can rewrite and redirect client traffic based on an Access Policy received from the Access Control
Server. Each Access Policy is tailored to the individual client based on who the client is (per a successful
authentication) and where and when the client has connected to the network.
The Access Control Server (the HP ProCurve Access Control Server 740wl) is a centralized resource on
the network that provides services to the connected Access Controllers such as authentication
management, mobility management (roaming support), policy management, and system monitoring and
reporting. The Access Control Server is deployed as a dedicated control function and does not sit in the
user data path. A second Access Control Server can be deployed in a redundant configuration to support
stateful failover.
1-1
Introduction
Figure 1-1 illustrates a 700wl Series system topology that is configured with redundant Access Control
Servers for failover.
Figure 1-1. 700wl Series topology
Access Control Server
Internet
Access Controller
Guest Employees Untrusted User Employee Untrusted User Employee
Redundant Access
Control Server
Access Controller
Access Controllers sit at or near the edge of the network, and enforce authentication and access policies.
As shown in
Figure 1-1, Access Points are typically connected directly to Access Controller ports, but it is
also possible to connect APs or clients through devices such as switches or hubs. When a client is detected
at an Access Controller port, the Access Controller must first determines who the client is based on the
Authentication Policy in force for that port at that time of day. The 700wl Series system supports a variety
of authentication methods, and can interface with an organization’s existing authentication services (such
as an LDAP service, RADIUS, Kerberos, 802.1x or NT Domain Logon) or can handle authentication
through its own built-in user database.
The Access Controller actually hands off the client authentication to the central Access Control Server,
which manages the authentication process and returns the appropriate Access Policy to the Access
Controller.
An Access Policy specifies the network addresses, services, and resources the client is permitted to access.
The Access Policy can also specify that client traffic for certain destinations be redirected to alternate
destinations. This capability is used by the 700wl Series system to redirect traffic from an unknown client
to a logon page. It can also be used to notify clients when they attempt to access non-permitted resources,
or to redirect a request to a permitted resource. Traffic to a destination that is neither permitted nor
redirected is dropped. An Access Policy may also specify other settings such as bandwidth limitations,
HTTP Proxy Servers (including filtering to impose HTTP access control), and encryption requirements.
Access Policies can be configured to “expire” after a specified length of time, or at a specific time, forcing
the client to reauthenticate.
1-2 HP ProCurve Secure Access 700wl Series Management and Configuration Guide
Introduction
Clients that are successfully authenticated, Employees in Figure 1-1, are typically associated with Access
Policies that provide access to secure network resources. Clients that are not successfully authenticated,
Untrusted Users, are typically associated with an Access Policy that allows only the ability to logon. The
700wl Series system also provides a Guest logon feature and Access Policy, that can be used to provide
limited network access to users designated as Guests, for example, Internet access via the network with
no intranet access.
Access Policies are defined and maintained by the Access Control Server, but are administered by the
Access Controller. Once a client has been identified and the appropriate Access Policy has been returned
to the Access Controller, the Access Controller is responsible for filtering client traffic and either
forwarding it to its destination, redirecting it to the appropriate alternate destination, or dropping it. The
Access Control Server does not get involved again unless something occurs that requires a renewal of the
client’s rights, such as expiration of their existing rights, or roaming to a different location.
In addition to being the repository for the Authentication Policies, Access Policies, and other system
configuration information, the Access Control Server maintains status for every Access Controller. This
includes status for every client connected to the 700wl Series system and every client session.
700wl Series Functions
The 700wl Series system provides central control of Access Controllers, and clients. The key system
functions are: client authentication, rights management, Wireless Data Privacy, roaming support, NAT,
and VLANs.
Client Authentication
The 700wl Series system provides a great deal of flexibility in authenticating users. The system supports
three types of authentication:
• Browser-based logon: With browser-based logon, the first time a client attempts an HTTP access, the
Access Controller presents a browser-based logon page. After the user enters a logon ID and password,
the Rights Manager authenticates the client using one or more Authentication services, such as an
LDAP database, RADIUS server, Kerberos service, or through the Rights Manager’s own built-in
authentication database.
• VPN logon: With VPN logon, the client initiates a connection to the network using L2TP or PPTP. The
Access Controller uses the login information provided by the VPN client for authentication via
RADIUS or the built-in database. In this case, the user does not see the HP ProCurve logon page.
• Monitored logon: The 700wl Series system supports both 802.1x logon and NT Domain logon. In both
these cases, the system simply forwards the packets on to the RADIUS or NT Domain server, and
monitors the response to determine whether the client has been successfully authenticated.
Once the client has been authenticated, rights for the client are requested from the Rights Manager.
The Rights Manager uses the concept of Authentication Policies, which are ordered lists of one or more
authentication services. By defining multiple Authentication Policies, you can use different authentication
methods for users logging in through different locations or at different times.
The 700wl Series system supports the following authentication services, any of which can be used in an
Authentication Policy:
• LDAP directory services, such as Active Directory or iPlanet LDAP server
HP ProCurve Secure Access 700wl Series Management and Configuration Guide 1-3
Introduction
• RADIUS servers
• Kerberos services
• XML-RPC-based services
• The Rights Manager’s built-in database. This is the default authentication service. You can populate it
with user names and passwords through the Rights Manager.
User Authentication is discussed in detail in Chapter 5, Configuring Authentication.
Client Access Rights
At any given time a certain set of rights is in effect for each client attached to an Access Controller. These
rights are based on a number of factors, including client authentication, client identity, location of the
connection, VLAN tags, and the time and day. The Rights Manager manages the criteria for each client
connection.
• The Rights Manager uses Access Policies to define what network resources a user can access at any given
time. Access Policies are defined for a group, and an individual user’s rights are determined by the
groups to which he or she belongs.
• The Rights Manager uses Identity Profiles and Connection Profiles to define which users can access the
network at any given time, what sorts of logon and authentication mechanisms may be used, and
what type of security is required.
• A client is matched to an Identity Profile based on who they are. They are matched to a Connection
Profile based on when and where they connect to the network. The Rights Manager uses the Identity
Profile and Connection Profile to match the client with the appropriate Access Policy. This in done in
the Rights Assignment Table.
Chapter 4, Configuring Rights describes this process in detail.
Wireless Data Privacy and VPN Protocols
The 700wl Series system’s VPN component enables strong encryption of data between a client and the
Access Controller. This provides additional security for data sent over the airwaves, replacing the
relatively insecure Wired Equivalent Privacy (WEP) of a wireless network.
The 700wl Series system offers four choices for encrypting data between a client and the Access
Controller: PPTP, L2TP/IPSec, tunnel mode IPSec, and SSH. It also supports a variety of authentication
and encryption algorithms related to these choices. It supports a number of client software packages that
handle the client side of the security method. In most cases, the 700wl Series system accepts the
authentication performed by the security protocol and provides user access rights as soon as the secure
connection has been set up.
Once a secure connection has been set up, clients can roam between access points and the 700wl Series
system will maintain each session transparently to the client.
Roaming Support
One of the key features of the 700wl Series system is its support of layer 3 roaming—enabling clients to
move around physically between access points without having to reauthenticate or establish a new
session.
1-4 HP ProCurve Secure Access 700wl Series Management and Configuration Guide
Introduction
Because the 700wl Series system identifies clients by MAC address, it is simple to detect when a device
roams. A Linger Timeout determines the length of time a client has to complete a roam, that is to appear at
a new physical location after disappearing from the old physical location. The settings for timing out a
roaming client are part of the client’s assigned Access Policy; different clients can have different settings
and one client can have different settings depending on their location, time of day, and so on.
If the client completes the roam within the linger time, no reconnect or authentication is needed—the
client’s connection state is maintained intact. If the client fails to complete the roam before the linger
timer expires the 700wl Series system concludes the client has actually disconnected and logs the client
off.
Roaming support is discussed in more detail in VLANs and the 700wl Series System in Chapter 2, Using the
700wl Series System.
Network Address Translation
By default, an Access Controller provides Network Address Translation (NAT) services for clients that
request a DHCP IP address when they initiate a connection to the Access Controller. The 700wl Series
system implements NAT as a form of “overloading,” where a range of private IP addresses are mapped
to a single public IP address (the IP address of the Access Controller) by using TCP ports. When a client
sends a packet through the Access Controller, the Access Controller rewrites the IP address field and the
port number field to a value that is unique within the entire 700wl Series system and uses this unique
identifier for returned packets.
Although NAT is enabled by default in the 700wl Series system you can elect whether to use it or not
depending on your application. Following are some points in favor of using NAT within the 700wl Series
system:
• NAT makes roaming much more efficient. Because each NAT address is unique for the entire 700wl
Series system, the client’s connection state can be moved to the nearest Access Controller while
roaming, rather than requiring every connection to be tunneled back to the original Access Controller.
• NAT provides some amount of protection to a client since no device other than an Access Controller
can talk directly to the client. This provides rudimentary firewall protection.
• Allowing NAT can ensure that a client will be able to successfully communicate with the network—if
NAT is not allowed, and a client has an IP address that is not within the subnet used by the Access
Controller, return packets will not be able to reach the client. A client having an IP address not within
the Access Controller’s subnet can occur if the client uses a static IP address or receives an IP address
from an external DHCP server.
However, certain applications may require a host or server system to know the actual IP address of a
client. Some examples include multi-player games, file transfer in Instant Messenger applications, and
other peer-to-peer applications.
To allow flexibility, the 700wl Series system provides alternate addressing schemes:
• Use NAT only if the client’s IP address is on the wrong subnet, that is specifically not within the Access
Controller’s subnet. Otherwise, use the client’s real or static IP address.
• Always use the client’s real or static IP address and never use NAT, regardless of the subnet. This
setting is intended for access points, and should be used with caution.
There is one case where NAT will always be used—when PPTP/L2TP tunneling is used.
HP ProCurve Secure Access 700wl Series Management and Configuration Guide 1-5
Introduction
Addressing in the 700wl Series System in Chapter 2, and Chapter 4, Configuring Rights include more
extensive discussions of addressing considerations and NAT.
VLAN Tag Support
The HP System provides support for Virtual LAN (VLAN) tagging in several ways:
• A client can be matched to a Connection Profile based on the VLAN ID (802.1Q tag) associated with the
client traffic.
• The VLAN tag associate with the client traffic can be stripped, added, or rewritten before the traffic is
forwarded onto the network, based on the Access Policy in force for the client.
Matching a client to a Connection Profile based on the VLAN tag effectively enables you to assign an
Access Policy to clients in a specific VLAN. The Access Policies associated with the VLAN-specific
Connection Profiles can be configured to modify the VLAN tagging of these clients, if necessary. By
default, the tag associated with the client’s traffic is removed so the client’s traffic is sent on to the
network untagged. This scenario can be useful if you want to use the client’s VLAN membership only to
assign access rights for the client, and once the Access Policy is in place, the VLAN tag is no longer used.
Optionally you can configure the Access Policy to preserve the tag or you can replace the original tag
with a different tag.
The 700wl Series system also provides limited support for assigning IP addresses through DHCP based
on the VLAN tag of the incoming traffic. In the 700wl Series system, IP subnet ranges may be specified on
a port-by-port basis. In order to restrict an IP range to members of a specific VLAN, you can associate a
Connection Profile that filters for the desired VLAN with the port that defines the subnet range.
1-6 HP ProCurve Secure Access 700wl Series Management and Configuration Guide
2
USING THE 700WL SERIES SYSTEM
This chapter provides a brief introduction to using the 700wl Series system and its Administrative
Console. It also provides an overview and discussion of a number of common tasks you may need to
accomplish. The topics covered in this chapter include:
This chapter assumes that you have installed your HP ProCurve Access Control Server or Integrated
Access Manager as instructed in the 700wl Series Quick Start Guide or the 700wl Series Installation and Getting Started Guide. This chapter takes you through the next steps towards configuring and using the
700wl Series system. The first section takes you through the required settings from the “Complete the
Configuration” steps in the 700wl Series System Quick Start Guide.
This chapter assumes you are new to the 700wl Series system. For users who are upgrading their 700wl
Series system from a previous software version to version 4.1, you should read the 700wl Series Introduction to Software Version 4.x. The Introduction to Software Version 4.x document introduces you to
software version 4.0 as part of the process of migrating your system, and explains what has changed from
versions 3.0 and 3.1.
Initial Configuration of the 700wl Series System
The initial configuration of a 700wl Series system component, sufficient to allow network access, is
described in both the 700wl Series Quick Start Guide shipped with each hardware unit, and in more detail
in the 700wl Series Installation and Getting Started Guide.
If you have installed your 700wl Series system according to the instructions in the Quick Start Guide, it
should be configured with a set of basic network configuration settings.
For an Access Control Server, these settings include:
• An IP address of the Access Control Server
• Subnet mask that defines the subnet associated with the Access Control Server (the default is
255.255.255.0 (/24))
• Name of the domain in which the 700wl Series system resides
• Default router (gateway) IP address
2-1
Using the 700wl Series System
• Primary and secondary DNS server addresses
• Shared secret, used to enable Access Controllers or a peer Access Control Server to establish a trusted
communication relationship with the Access Control Server. This is actually an optional item in the
initial installation process of an Access Control Server, but no system components will be able to
communicate with the 700wl Series system until this is set, so it is recommended that you do it as part
of the initial installation.
For an Access Controller, the initial settings include:
• IP address of the Access Controller
• Subnet mask that defines the subnet associated with the Access Controller (the default is
255.255.255.0 (/24))
• Domain name
• Default router (gateway) IP address
• Primary and secondary DNS server addresses
• IP address of the Access Control Server that will manage the Access Controller
• Shared secret of the Access Control Server
If you allow your 700wl Series system components to get their IP address from a DHCP server, the
DHCP server can provide the domain, default router IP address, DNS addresses, and WINS addresses.
On a newly-installed or Factory Reset Access Control Server, the following defaults are in effect:
• The DHCP address range for use with NAT’ed clients is the 42.0.0.0 subnet
• An HP ProCurve-signed SSL certificate is in place
• SNMP is disabled
• Wireless Data Privacy settings (encryption protocols) are disabled
• The default Authentication Policy uses the built-in database for user authentication
Managing and Administering the 700wl Series System
A 700wl Series system consists of an HP ProCurve Access Control Server and one or more HP ProCurve
Access Controllers, or an HP ProCurve Integrated Access Manager, optionally with additional Access
Controllers connected. All the elements of your 700wl Series system are configured, monitored and
managed centrally from the Access Control Server or Integrated Access Manager. This monitoring and
management is done through the Administrative Console, a web-browser-based interface that runs on the
Access Control Server or Integrated Access Manager.
Note: An HP ProCurve Integrated Access Manager is effectively an Access Control Server and an
Access Controller physically integrated into a single module. However, the 700wl Series system
software internally handles the functions within an Integrated Access Manager as if they are two
separate subsystems. Therefore, throughout this guide, system features are described in terms of
Access Control Servers and Access Controllers. These features all apply to an Integrated Access
Manager as well.
2-2 HP ProCurve Secure Access 700wl Series Management and Configuration Guide
Using the 700wl Series System
The 700wl Series system provides three levels of administrator access:
• A Network Administrator can configure the network parameters that enable the 700wl Series system
to function in a network, such as configuring IP addressing, interface configuration, date and time
settings, SNMP access, and performing software updates and backups. The network administrator
can perform these functions for all system components that make up a 700wl Series system. A
Network Administrator cannot perform any functions under the Rights Manager, such as adding
users, creating or modifying Access Policies, modifying the Rights Table, setting up Authentication
Services or Authentication Policies, or other similar functions. A Network Administrator can view
all the pages in the Status and Logs areas.
• A
Policy Administrator
removing users, configuring Authentication, setting up Identity Profiles, Connection Profiles, and
Access Policies, and manipulating the Rights Assignment Table. A Policy Administrator cannot
modify any of the network configuration parameters, or perform system software updates, backups,
or restarts. A Policy Administrator can view all the pages in the Status and Logs areas.
• A
Super Administrator
a 700wl Series system—both network and rights configuration. In addition, a Super Administrator
can add, delete, enable, and disable other administrator.
There is one built-in administrator that has Super Administrator capabilities. This is the only
administrator that exists on a new unit. While all other administrator settings are maintained in the
700wl Series system database, and thus are deleted if the system is reset to factory defaults, the
built-in administrator simply has its name and password reset to the default.
The built-in administrator name and password can be changed on the System Components Edit
page for an individual system component. For information about creating additional administrator
accounts, see
Setting Up Administrators on page 6-42.
can perform functions under the Rights Manager, such as adding and
can perform all the administrative functions for all connected components of
Centralized Administration
Wireless network clients connect through an Access Controller, but authentication and rights
administration for these clients is handled centrally from the Access Control Server. In addition, all
configuration of the Access Control Server and all Access Controllers connected to the 700wl Series
system is handled through the Administrative Console running on the Access Control Server. Once you
have installed an Access Controller onto your network following the instructions in the 700wl Series Quick Start Guide, all other administration on the Access Controller is handled through the Access Control
Server.
From the centralized Administrative Console on your Access Control Server you can perform the
following functions:
• Monitor in real-time the status of all the 700wl Series system components
• Monitor in real-time the status of all clients logged onto the system, and monitor the status of all their
sessions
• View the 700wl Series system logs
• Update access rights for clients in real-time
• Log clients out of the system
• Configure advanced network settings for 700wl Series system components, including bridging, DHCP
addressing for use with NAT, IP broadcast forwarding, setting up HTTP proxies, configuring SNMP
settings, and setting the system date and time
HP ProCurve Secure Access 700wl Series Management and Configuration Guide 2-3
Using the 700wl Series System
• Enable or disable Wireless Data Privacy protocols, configuring the address method and range for VPN
tunneling, and configuring IPSec parameters
• Update the 700wl Series system software
• Back up a 700wl Series system component’s configuration, and restore the backup if needed
• Set up Connection Profiles that identify where and when clients connect to the 700wl Series system
• Set up Authentication Policies that determine how clients authenticate themselves to the system
• Set up Access Policies to control what users can do over the network
• Set up Identity Profiles to put users in groups that share the same access policies
• Customize login pages
Logging on to the Administrative Console
To monitor or configure the 700wl Series system you use the Administrative Console. This is a web-based
interface. To log in to the Administration Interface over the network, follow these steps:
Step 1. Set your browser to the IP address or hostname of your Integrated Access Manager or Access
Control Server.
For example, if the IP address of your Access Control Server is 10.2.3.4, you can access its
Administrative Console by entering
browser software.
http://10.2.3.4 in the address or location textbox of the
The Administrator Logon page appears, as shown in Figure 2-1.
Note: Your browser must accept cookies to enable logging on.
Step 2. Enter your administrator name and password and click Logon.
The initial administrator name is “admin” and the initial password is “admin.”
Figure 2-1. Administrator Logon Page
The Administrative Console initially displays the Equipment Status tab under the Status module.
2-4 HP ProCurve Secure Access 700wl Series Management and Configuration Guide
Using the 700wl Series System
Note: It is strongly recommended that you change the built-in administrator logon name and password
as soon as possible. You should also set the date and time for each 700wl Series system component
(Access Control Server, Integrated Access Manager, and Access Controllers).
Changing the Built-In Administrator Username and Password
To change the built-in administrator name and password on a 700wl Series system unit do the following:
Step 1. Click the Network button in the Navigation bar. The System Components page appears, with a
System Components list that shows the components that make up your 700wl Series system.
Step 2. Click a system component name listed under the Component Name heading to bring up the
Edit page.
Step 3. In the Admin Username field, type a new administrator user name.
Type a new password in the
Password
Step 4. Click Save.
field.
Admin Password field, and type it again in the Confirm Admin
You can make other changes on this Edit page, such as giving the unit a descriptive name, changing the
shared secret, and so on. See Configuring an Access Control Server on page 6-3, Configuring an Integrated Access Manager on page 6-7, or Configuring Access Controllers on page 6-10 in Chapter 6 for more
information on changing these settings.
Note:
logon name and password are also reset to their defaults.
When a 700wl Series system unit is reset to its factory default settings, the built-in administrator
The built-in administrator for an Access Control Server or Integrated Access Manager has the
equivalent of Super Administrator capabilities—this administrator can configure all network and
Rights settings for the Access Control Server or Integrated Access Manager as well as perform
configuration through the Administrative Console for any Access Controllers connected to the Access
Control Server or Integrated Access Manager. The built-in administrator for an Access Controller can
only log on to that Access Controller through the Command Line Interface (CLI).
You can create additional 700wl Series system administrators on the Access Control Server or Integrated
Access Manager, with different administration roles—Super Administrators, Network Administrators,
and Policy Administrators. See
Setting Up Administrators on page 6-42 for information about creating
additional administrators.
Using Online Help
The 700wl Series system offers several levels of Help:
• Each page of the Administrative Console includes some basic Help, normally displayed in the left panel
under the page name (and beneath the System Components List or page links, if they are present on
the pa
ge).
• The Help button displays context-sensitive help presented in a separate browser window. The
contents of this page are different depending on the page of the Administrative Console you are
viewing when you click Help. Once inside the help system you can move around to view different
topics using a variety of navigation tools:
— Next/previous page buttons
HP ProCurve Secure Access 700wl Series Management and Configuration Guide 2-5
Using the 700wl Series System
— Links within the page contents
—
Related Topics links: these are presented at the top of the page, or they can be accessed from a
Related Topics menu displayed using the Related Topics button
— Table of Contents and Index, accessed through the navigation panel at the left of the page.
— You can display the Table of Contents by clicking the Contents button
You can also print the page you are viewing by clicking the print button .
• From the Help window, you can display the full 700wl Series system Management and Configuration
Guide by clicking the PDF button (
This requires a version of Adobe’s Acrobat Reader software, which is available free of charge from
Adobe Systems at http://www.adobe.com.
).
Logging Out
To log out of the Administrative Console:
» From any page, click the Logout button at the right of the Navigation bar. See Figure 2-2.
Figure 2-2. Logging Out
2-6 HP ProCurve Secure Access 700wl Series Management and Configuration Guide
Using the 700wl Series System
Using the Administrative Console
When you first logon to the Administrative Console, your browser displays the Equipment Status tab of
the Status pages (Figure 2-3).
Figure 2-3. Initial Page of the Administrative Console
.
Header Bar
Navigation Bar
Tabs
Page Title
Left Panel
Sub-Tab
Main
Panel
The various pages of the Administrative Console have many elements in common, as well as elements
specific to certain pages.
All pages have the following elements in common:
• The Header bar—Administrative Console session information
• The Navigation bar—Navigation and Logout buttons
• Tabs—Main function pages under each Navigation button containing left and main panels
• Left Panel—Instructive page information, page and component links, and data filters
• Main Panel—Input interfaces in the form of tables or sub-tabs, and tables displaying logs or status
Header Bar and Navigation Bar
The Header bar identifies the Access Control Server on which you are running the Administrative
Console. The Navigation bar shows the top-level set of options provided by the Administrative Console
based on the type of access the logged-in Administrator is permitted.
Navigation bars of a single Access Control Server for an administrator with Super Admin access.
HP ProCurve Secure Access 700wl Series Management and Configuration Guide 2-7
Figure 2-4 shows the Header and
Using the 700wl Series System
Figure 2-4. Header and Navigation Bars for an Access Control Server
Information at the right side of the Header bar shows the username of the logged in Administrator, the
IP address of the Access Control Server, and the current date and time.
• If the IP address is labeled simply Access Control Server, this Access Control Server is functioning
as the only Access Control Server in the 700wl Series system. If the system is an Integrated Access
Manager, the label will reflect that.
• If the IP address is labeled Primary Access Control Server, this Access Control Server is currently
functioning as the primary Access Control Server in a redundant configuration. You can perform all
management and configuration functions for your 700wl Series system from this Access Control
Server.
• If the IP address is labeled Secondary Access Control Server, this Access Control Server is
functioning as a secondary Access Control Server in a redundant configuration. In this case, the
Header bar is also labeled with a large “secondary” and only a subset of the Navigation buttons are
available. (see
Secondary Access Control Server.
Figure 2-5). Limited configuration capabilities are available directly through the
Figure 2-5. Header and Navigation Bars for a Secondary Access Control Server
The Navigation bar is always accessible from anywhere in the Administrative Console. Each Navigation
button takes you to a set of pages related to specific administrative functions.
Status
The Status pages of the Administrative Console provide views of the status of system equipment,
clients, and sessions. The Equipment Status tab is displayed when a 700wl Series system
administrator first enters the Administrative Console. These pages are available to administrators
of all access levels.
For details, refer to Chapter 3, System Status.
Rights
The Rights Manager pages of the Administrative Console enable you to manage access rights for
clients, customize client logon windows, and configure authentication and access control policies.
These pages are available to Super Administrators and Policy Administrators. Additional tools
such as simulating user rights for testing are also available.
2-8 HP ProCurve Secure Access 700wl Series Management and Configuration Guide
Using the 700wl Series System
For details, refer to Chapter 4, Configuring Rights and Chapter 5, Configuring Authentication.
Network
The Network pages enable configuration of the 700wl Series system components to work with
your enterprise network. Most pages in this area are available to Super Administrators and
Network Administrators only. However, both Network Administrator and Policy Administrators
can change their own passwords under this function.
For details, refer to Chapter 6, Configuring the Network.
VPN
The VPN pages enable Wireless Data Privacy configuration, such as configuring IPSec,
certificates, and IP address assignment for tunneling. These pages are available to administrators
of all access levels.
For details, refer to Chapter 7, Setting up Wireless Data Privacy.
Maintenance
The Maintenance pages provide the following functions: Software Setup, Backup & Restore, and
Shutdown/Restart of 700wl Series system equipment. These pages are available to Super
Administrators and Network Administrators.
For details, refer to Chapter 8, System Maintenance.
Logs
The Logs pages provide views of the log data, which includes time, source, severity and event
description. Log data can be filtered and exported as text files. Configure the settings for a syslog
server. These pages are available to administrators of all access levels.
For details, refer to Chapter 9, Logs.
Help
Click this button in the Navigation bar to view context-sensitive HTML help for the tab or
subordinate tab displayed. You can also access the complete 700wl Series system Management and Configuration Guide in PDF format from the Help interface.
Logout
Click this button to log out of the 700wl Series system. A new logon window is displayed. You will
need to log on again to perform additional system tasks with the Administrative Console.
Summary of Functions
The main administrative functions and the first level of tabs available under each Navigation button
are listed below.
HP ProCurve Secure Access 700wl Series Management and Configuration Guide 2-9
Using the 700wl Series System
.
Status Rights Network VPN Maintenance Logs
• Equipment • Rights Setup • System • Wireless Data • Software Setup • Log Files
• Session Status • Connection • Interfaces • IP Address • Shutdown/
Profiles Assignment Restart
(for Tunneling)
• License • Authentication • SNMP
Information Policies
• Access Policies • Date & Time
• Login • Admin Setup
Customization
• Tools & Options
Tabs
Tabs are used to access the pages found under a Navigation button. Clicking a button on the Navigation
bar displays the first (left-most) tab for that set of functions, as shown in Figure 2-3. The active tab is
shown in white. Clicking an inactive tab makes it the active tab and displays the page for that subset of
functions.
Some tabs represent complex sets of functions. These may use sub-tabs to further organize the functions
and make them easier to use. Sub-tabs work the same as tabs, with the active tab shown in white and
inactive tabs grayed out.
When there are action buttons, for example, the
the page, the buttons pertain to the entire set of functions available under the tab. When the action
buttons are displayed within the grayed area under a sub-tab, the buttons apply only to the input fields
for the sub-tab.
A main tab page is divided into two distinct areas—the left panel containing informational and
navigational aids, and the main panel containing the main functional area of the page (see
Function-specific elements that are common to many pages include:
• System Component list, Navigation links, or Display filters
• Input interfaces such as text fields, check boxes, buttons, drop-down lists
• Table manipulation buttons for re-ordering, editing, or deleting rows
• Page navigation controls for viewing large amounts of data spanning multiple pages
• Refresh mechanisms for updating the page, and Save, Save As Copy, Reset to Defaults, and Cancel
buttons
Save button ( ), displayed at the bottom of
Figure 2-3).
2-10 HP ProCurve Secure Access 700wl Series Management and Configuration Guide
Loading...
+ 358 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.