This guide contains proprietary information, which is protected
by copyright. No part of this guide may be photocopied,
reproduced, or translated into another language without the
prior written consent of Hewlett-Packard.
Publication Number
5998-1136
January 2011
Applicable Products
See Products covered on page 1-2.
Trademark Credits
Windows NT®, Windows®, and MS Windows® are US
registered trademarks of Microsoft Corporation.
Disclaimer
HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF
ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. Hewlett-Packard shall not be liable for errors
contained herein or for incidental or consequential damages in
connection with the furnishing, performance, or use of this
material.
The only warranties for HP products and services are set forth
in the express warranty statements accompanying such
products and services. Nothing herein should be construed as
constituting an additional warranty. HP shall not be liable for
technical or editorial errors or omissions contained herein.
Hewlett-Packard assumes no responsibility for the use or
reliability of its software on equipment that is not furnished by
Hewlett-Packard.
Warranty
See the warranty information included with the product.
A copy of the specific warranty terms applicable to your
Hewlett-Packard products and replacement parts can be
obtained from your HP Sales and Service Office or authorized
dealer.
Open Source Software Acknowledgement
Statement
This software incorporates open source components that are
governed by the GNU General Public License (GPL), version 2.
In accordance with this license, HP will make available a
complete, machine-readable copy of the source code
components covered by the GNU GPL upon receipt of a written
request. Send a request to:
Hewlett-Packard Company, L.P.
GNU GPL Source Code
Attn: ProCurve Networking Support
Roseville, CA 95747 USA
Safety and regulatory information
Before installing and operating this product, please read
• Safety information on page 1-12.
• Appendix A: Safety and EMC regulatory statements
Hewlett-Packard Company
8000 Foothills Boulevard
Roseville, California 95747
www.hp.com/networking/
Contents
1 Introduction
About this guide ...........................................................................................................1-2
This guide explains how to configure, and operate the MSM7xx Controllers. It also provides
controlled-mode information for MSM3xx and MSM4xx Access Points, and the MSM317
Access Device. For information on the operation of access points that support autonomous
mode, see the MSM3xx/MSM4xx Access Points Management and Configuration Guide.
Products covered
This guide applies to the following MSM7xx Controller products:
ModelPart
MSM710 (E-MSM710) Access ControllerJ9328A
MSM710 (E-MSM710) Mobility ControllerJ9325A
MSM730 (E-MSM730) Access ControllerJ9329A
MSM730 (E-MSM730) Mobility ControllerJ9326A
MSM750 (E-MSM750) Access ControllerJ9330A
MSM750 (E-MSM750) Mobility ControllerJ9327A
MSM760 (E-MSM760) Access ControllerJ9421A
MSM760 (E-MSM760) Mobility ControllerJ9420A
MSM765zl (E-MSM765zl) Mobility ControllerJ9370A
The product models in the above table include alternative product names in parenthesis. For
example, the MSM710 is also known as the E-MSM710. Both names refer to the same product.
The original product names (without “E-”) are used throughout this document.
This guide provides controlled-mode information for the following MSM3xx and MSM4xx
Access Points (“WW” identifies worldwide versions for the rest of the world):
ModelWWAmericasJapanIsrael
E-MSM430J9651AJ9650AJ9652AJ9653A
E-MSM460J9591AJ9590AJ9589AJ9618A
E-MSM466J9622AJ9621AJ9620A
1-2
ModelWWUSAJapan
MSM310 (E-MSM310)J9379A/BJ9374A/BJ9524A/B
MSM310-R (E-MSM310-R)J9383A/BJ9380A/B
MSM320 (E-MSM320)J9364A/BJ9360A/BJ9527A/B
Introduction
About this guide
ModelWWUSAJapan
MSM320-R (E-MSM320-R)J9368A/BJ9365A/BJ9528A/B
MSM325 (E-MSM325)J9373A/BJ9369A/B
MSM335 (E-MSM335)J9357A/BJ9356A/B
MSM410 (E-MSM410)J9427A/BJ9426A/BJ9529A/B
MSM422 (E-MSM422)J9359A/BJ9358A/BJ9530A/B
MSM317 Access DeviceJ9423AJ9422A
The product models in the table immediately above include alternative product names in
parenthesis. For example, the MSM422 is also known as the E-MSM422. Both names refer to
the same product. Except for E-MSM430, E-MSM460, and E-MSM466, the original MSM
product names (without “E-”) are used throughout this document.
Important terms
The following terms are used in this guide.
Ter mDescription
APRefers to any HP MSM3xx or MSM4xx Access Point or the MSM317 Access
Device which is an AP with integrated Ethernet switch. Specific model
references are used where appropriate. Non-HP access points are identified
as third-party APs. These APs do not support controlled-mode operation.
controllerRefers to any HP MSM7xx Controller, including both Access Controller and
Mobility Controller variants.
Controller teams
Most of the concepts discussed in this guide apply equally to both teamed and
non-teamed controllers. Any reference to the term controller, also implies
controller team unless indicated otherwise.
1-3
Introduction
Network
Tree
Main menu
Sub-menu
About this guide
Conventions
Management tool
This guide uses specific syntax when directing you to interact with the management tool user
interface. Key user-interface elements are identified as follows:
Example directions in this guideWhat to do in the user interface
Select Controller >> Security > Firewall.On a non-teamed MSM7xx controller
In the Network Tree select the Controller element, then on
the main menu select Security, and then select Firewall on
the sub-menu. All elements to the left of the double angle
brackets >> are found in the Network Tree.
On an MSM7xx controller team
In the Network Tree on the team manager, select the Team
[team-name] element, then on the main menu select
Security, and then select Firewall on the sub-menu. All
elements to the left of the double angle brackets >> are found
in the Network Tree.
Select Controller > VSCs > [VSC-name]
>> Configuration.
On a non-teamed MSM7xx controller
Expand the Controller branch (click its + symbol), expand
the VSCs branch, select a [VSC-name], then select
Configuration on the main menu.
On an MSM7xx controller team
In the Network Tree on the team manager, expand the Team:
[team-name] branch (click its + symbol), expand the VSCs
branch, select a [VSC-name], then select Configuration on
the main menu.
For Password specify secret22.In the Password field enter the text secret22 exactly as
shown.
1-4
Commands and program listings
Monospaced text identifies commands and program listings as follows:
ExampleDescription
Introduction
About this guide
use-access-list
ip_address
ssl-certificate=URL [%s]
[ONE | TWO]
Command name. Specify it as shown.
Items in italics are parameters for which you must supply
a value.
Items enclosed in square brackets are optional. You can
either include them or not. Do not include the brackets.
In this example you can either include the “%s” or omit it.
Items separated by a vertical line indicate a choice.
Specify only one of the items. Do not include the vertical
line.
Warnings and cautions
Do not proceed beyond a WARNING or CAUTION notice until you fully understand the
hazardous conditions and have taken appropriate steps.
WarningIdentifies a hazard that can cause physical injury or death.
CautionIdentifies a hazard that can cause the loss of data or configuration information, create a non-
compliant condition, or hardware damage.
1-5
Introduction
New in this release
New in this release
The following new features and enhancements have been added in releases 5.5.x:
New feature or enhancementFor information see...
New APsThis release supports the following new 802.11n dual-radio
access points: E-MSM430, E-MSM460, and E-MSM466. For
information, see the Quickstarts for these products.
Band steeringBand steering on page 5-11
Broadcast filteringBroadcast filtering on page 5-11
Transmission protectionTx protection on page 4-30
BeamformingTx beamforming on page 4-29
Country configuration per groupAssigning country settings to a group on page 6-30
Moving multiple APs between groupsMoving multiple APs between groups on page 6-29
Identify RADIUS server by host namePrimary/Secondary RADIUS server on page 11-9
User agent filteringUser agent filtering on page 14-10
HTTPS proxy supportSupport applications that use on page 14-11
Improved mobility status pagesMonitoring the mobility domain on page 9-16
Manager login credentials resetManager username/password reset on page 2-6
PayPal supportPayPal service on page 14-37
LEAP supportSupported 802.1X protocols on page 10-9
MSM317 switch port enhancements
Inheritance on a per port basis
Port isolation
Loop protection
Network Policy TLV support
Enhanced VLAN support
See the MSM317 Installation and Getting Started Guide.
1-6
Introduction
Network Operating Center
Controller
Secure management tunnels
Site #1Site #3Site #2
AP
W
L
A
N
AP
W
L
A
N
AP
W
L
A
N
Introducing the MSM7xx Controllers
Introducing the MSM7xx Controllers
MSM7xx Controllers provide centralized management and control of intelligent HP MSM APs
for a wide range of deployments, from small Internet cafes and businesses, to large
corporations and institutions, and even entire towns.
MSM controllers let you take advantage of both distributed and centralized approaches to
deploying a wireless networking solution, letting you design a wireless infrastructure that
perfectly meets the needs of your users.
Simplified configuration, deployment, and
operation
For trouble-free deployment in geographically distributed networks, HP MSM controllers
automate discovery, authentication and configuration for all installed APs. Using standard
dynamic look-up procedures, APs identify the controller to which they are assigned.
Authentication using digital certificates assures security and eliminates the risk of rogue AP
connectivity. Once authenticated, the controller establishes a secure management tunnel for
the exchange of configuration and control information with the AP.
The controller provides centralized management for all APs. It eliminates time-consuming AP
configuration, troubleshooting and maintenance tasks by providing a single management
interface for the entire group of APs it manages. The controller automates installation of AP
software updates and ensures a consistent set of services are delivered throughout the
network. All security, quality of service (QoS), and other policies can be centrally defined
through the controller's intuitive and secure Web-based management tool.
Controller managing APs installed in different physical locations
1-7
Introduction
Secure management tunnels
Area #1
AP
Area #3Area #2
APAP
P
U
B
L
I
C
W
L
A
N
P
U
B
L
I
C
W
L
A
N
P
U
B
L
I
C
W
L
A
N
Backbone Network
Controller
Controller team
Router
Controlled APs deployed
across a layer 3 network
In this example, all controllers are
connected to the network via their
LAN ports. The Internet port can
also be used.
Team
manager
1
2
3
4
5
Team manager sends
configuration settings
to all team members.
Team members then
update the APs that
they are managing.
Introducing the MSM7xx Controllers
Controller managing APs installed in different areas at a single location
Controller teaming
Controller teaming enables you to easily configure and monitor multiple controllers and their
APs. Up to five controllers can be combined into a team providing support for up to 800 APs
(four controllers x 200 APs per controller plus one additional controller for backup/
redundancy). For example:
Key benefits of controller teaming include:
Scalability: Controller teaming enables you to scale up your wireless network as your
needs increase. Simply add additional APs, controllers, and licenses to meet the required
demand. Up to 800 APs are supported per controller team (four controllers x 200 APs per
controller plus one additional controller reserved for backup/redundancy).
Redundancy and failover support: A controller team provides for service redundancy
in case of failure. If one of the controllers in a team becomes inoperative (due to network
problems, hardware failure, etc.), its APs will automatically migrate to another controller
in the team allowing for continuation of services.
1-8
Centralized management and control: Configuration and monitoring of all team
members and their APs is performed using the management tool on the team manager.
The team manager is responsible for handling the addition and deletion of controlled
Introduction
W
L
A
N
LAN port
192.168.1.1
Internet port
192.168.30.1
W
L
A
N
2
1
User B
User A
Network 2
192.168.20.0
Network 1
192.168.10.0
Network 3
192.168.30.0
User B
User A
Introducing the MSM7xx Controllers
APs, including newly discovered APs. It also displays status information for all team
members and their APs, as well as APs directly connected to the manager.
The team manager is responsible for enforcing and updating the firmware of team
members. An update to the team manager firmware triggers an update of all members
and their controlled APs, ensuring that the entire network is running the same firmware.
The synchronization of firmware between controllers and APs alleviates any potential
issue regarding software compatibility between deployed devices.
Seamless mobility
The Mobility traffic manager (MTM) feature provides for seamless roaming of wireless users,
while at the same time giving you complete control over how wireless user traffic is
distributed onto the wired networking infrastructure. MTM enables you to implement a
wireless networking solution using both centralized and distributed strategies. Some of the
deployment strategies that you can use with MTM include:
Centralized wireless traffic: All traffic from wireless users is tunneled back to a
central controller where it is egressed onto the wired infrastructure. Wireless users can
be connected to any AP within the layer 3 network serviced by MTM.
The following diagram shows a deployment where all wireless traffic is egressed onto a
specific network segment (192.168.30.0).
MTM can also be used to send traffic to different networks or VLANs based on criteria
such as username, network location, VSC, or AP group.
Traffic distribution using home networks: A home network can be assigned to each
wireless user (via RADIUS, local user accounts, or through a VSC egress). MTM can then
be used to tunnel the user’s traffic to their home network, regardless of the AP to which a
user connects within the mobility domain.
1-9
Introduction
Home network =
Network 4
Home network =
Network 3
Traffic is sent to a different
wired network based on the
home network assigned to
each user in their account
profile.
LAN port
192.168.1.1
Internet port
192.168.40.1
W
L
A
N
W
L
A
N
2
1
User B
User A
Network 2
192.168.20.0
Network 1
192.168.10.0
Network 4
192.168.40.0
Network 3
192.168.30.0
User BUser A
Home network =
Network 4
If User A roams from AP 1 to
AP2, the tunnel is rerouted to
ensure that the user stays
connected to their home
network.
LAN port
192.168.1.1
Internet port
192.168.40.1
W
L
A
N
W
L
A
N
2
1
User A
User A
Network 2
192.168.20.0
Network 1
192.168.10.0
Network 4
192.168.40.0
Network 3
192.168.30.0
User A
Roams
Introducing the MSM7xx Controllers
The following diagram shows a deployment where the wireless traffic for each user is
egressed onto a specific network segment by assigning a home network to each user.
If a user roams between APs, MTM adjusts the tunnel to maintain the user’s connection to
their home network.
1-10
Introduction
Protected network
Public network
AP
User logs in
Access to network is granted
Access
controlled
VSC
Corporate
network
Controller
Router
Introducing the MSM7xx Controllers
Best-in-class public/guest network access service
Designed to deliver the best possible user experience, the public/guest network access
feature adapts to any client device IP address and Web proxy settings, enabling users to
connect without reconfiguring their computers.
The public access interface Web pages are fully customizable enabling service providers to
create a centrally-managed hotspot network with customized look-and-feel.
1-11
Introduction
Safety information
Safety information
WarningProfessional Installation Required
Prior to installing or using a controller, consult with a professional installer trained in RF
installation and knowledgeable in local regulations including building and wiring codes,
safety, channel, power, indoor/outdoor restrictions, and license requirements for the
intended country. It is the responsibility of the end user to ensure that installation and use
comply with local safety and radio regulations.
Cabling: You must use the appropriate cables, and where applicable, surge protection, for
your given region. For compliance with EN55022 Class-B emissions requirements use
shielded Ethernet cables.
Country of use: In some regions, you are prompted to select the country of use during
setup. Once the country has been set, the controller will automatically limit the available
wireless channels, ensuring compliant operation in the selected country. Entering the
incorrect country may result in illegal operation and may cause harmful interference to other
systems.
Safety: Take note of the following safety information during installation:
If your network covers an area served by more than one power distribution system, be
sure all safety grounds are securely interconnected.
Network cables may occasionally be subject to hazardous transient voltages (caused by
lightning or disturbances in the electrical power grid).
Handle exposed metal components of the network with caution.
The MSM7xx Controller and all directly-connected equipment must be installed indoors
within the same building (except for outdoor models / antennas), including all PoEpowered network connections as described by Environment A of the IEEE 802.3af
standard.
Servicing
There are no user-serviceable parts inside HP MSM7xx products. Any servicing, adjustment,
maintenance, or repair must be performed only by trained service personnel.
1-12
Introduction
HP support
HP support
For support information, visit www.hp.com/networking/support and for Product Brand,
select ProCurve. Additionally, your HP-authorized networking products reseller can provide
you with assistance.
Before contacting support
To make the support process most efficient, before calling your networking dealer or HP
Support, you first should collect the following information:
Collect this informationWhere to find it
Product identification.On the rear of the product.
Network topology map, including the
addresses assigned to all relevant devices.
Your network administrator.
Getting started
Get started by following the directions in the relevant guide as follows:
ProductGuide to use
MSM710, MSM730, MSM750The provided Quickstart.
MSM760, MSM765zlThe provided Installation and Getting Started Guide.
Then continue with the next chapter of this guide.
Online documentation
For the latest documentation, visit www.hp.com/networking/support and for Product
Brand, select ProCurve.
NoteThe MSM317 Access Device consists of both a controlled-mode-only access point and an
integrated Ethernet switch. Where appropriate, this guide makes reference to the MSM317
Installation and Getting Started Guide which must be used in conjunction with this guide
System time.................................................................................................................2-19
Management
Management tool
Management tool
The management tool is a Web-based interface to the controller that provides easy access to
all configuration and monitoring functions.
Management scenarios
For complete flexibility, you can manage the controller both locally and remotely. The
following management scenarios are supported:
Local management using a computer that is connected to the LAN or Internet port on the
controller. This may be a direct connection or through a switch.
Remote management via the Internet with or without a VPN connection. See Securing
controller communications to remote VPN servers on page 16-6 for more information on
using the controller integrated VPN clients to create secure remote connections.
Management station
The management station refers to the computer that a manager or operator uses to connect
to the management tool. To act as a management station, a computer must:
Have at least Microsoft Internet Explorer 7/8 or Firefox 3.x.
Be able to establish an IP connection with the controller.
NoteBefore installation, ensure that TCP/IP is installed and configured on the management
station. IP addressing can be either static or DHCP.
Starting the management tool
To launch the management tool, specify the following in the address bar of your browser:
https://Controller_IP_address
By default, the address 192.168.1.1 is assigned to the LAN port on the controller. For
information on starting the management tool for the first time, see the relevant guide as
described in Getting started on page 1-13.
About
passwords
The default username and password is admin. New passwords must be 6 to 16 printable
ASCII characters in length with at least 4 different characters. Passwords are case sensitive.
Space characters and double quotes ( “ ) cannot be used. Passwords must also conform to the
selected security policy as described in Password security policies on page 2-7.
Login credentials for administrative users can be verified using local account settings and/or
an external RADIUS sever.
Local account settings: A single manager and operator account can be configured
locally under Manager account and Operator account on this page.
RADIUS server: Using a RADIUS server enables you to have multiple accounts, each
with a unique login name and password. Identify manager accounts using the vendor
specific attribute web-administrative-role. Valid values for this attribute are Manager
and Operator. For attribute information, see Administrator attributes on page 15-31.
To use a RADIUS server, you must define a RADIUS profile on the Controller >> Authentication > RADIUS profiles page.
If both options are enabled, the RADIUS server is always checked first.
Authenticating administrative credentials using an external RADIUS
server
Configure RADIUS authentication as follows:
1. Define an account for the administrator on the RADIUS server. See Administrator
attributes on page 15-31.
2. On the controller, create a RADIUS profile that will connect the controller to the RADIUS
server. See Configuring a RADIUS server profile on the controller on page 11-6.
3. Under Administrator authentication, set Authenticate via to the RADIUS profile you
created. In this example, the profile is called Rad1.
4. Test the RADIUS account to make sure it is working before you save your changes.
Specify the appropriate username and password and select Tes t.
(As a backup measure you can choose to enable Local. This will allow you to log in using
the local account if the connection to the RADIUS server is unavailable.)
2-4
Management
Management tool
Manager and Operator accounts
Two types of administrative accounts are defined: manager and operator.
The manager account provides full management tool rights.
The operator account provides read-only rights plus the ability to disconnect wireless
clients and perform troubleshooting.
Only one administrator (manager or operator) can be logged in at any given time. Options are
provided to control what happens when an administrator attempts to log in while another
administrator (or the same administrator in a different session) in already logged in. In every
case, the manager’s rights supersede those of an operator.
The following options can be used to prevent the management tool from being locked by an
idle manager or operator:
Terminates the current manager session: When enabled, an active manager or
operator session will be terminated by the login of another manager. This prevents the
management tool from being locked by an idle session until the Account inactivity logout timeout expires.
Is blocked until the current manager logs out: When enabled, access to the
management tool is blocked until an existing manager logs out or is automatically logged
out due to an idle session.
An operator session is always terminated if a manager logs in. An active operator session
cannot block a manager from logging in.
Terminates the current operator session: When enabled, an active operator’s session
will be terminated by the login of another operator. This prevents the management tool
from being locked by an idle session until the Account inactivity logout timeout
expires.
Operator access to the management tool is blocked if a manager is logged in. An active
manager session cannot be terminated by the login of an operator.
An operator session is always terminated if a manager logs in. An active operator session
cannot block a manager from logging in.
Login control: If login to the management tool fails five times in a row (bad username
and/or password), login privileges are blocked for five minutes. Once five minutes
expires, login privileges are once again enabled. However, if the next login attempt fails,
privileges are again suspended for five minutes. This cycle continues until a valid login
occurs. You can configure the number of failures and the timeout.
Account inactivity logout: By default, if a connection to the management tool remains
idle for more than ten minutes, the controller automatically terminates the session. You
can configure the timeout.
2-5
Management
Management tool
Passwords
Passwords must be 6 to 16 printable ASCII characters in length with at least 4 different
characters. Passwords are case sensitive. Space characters and double quotes ( “ ) cannot be
used. Passwords must also conform to the selected security policy as described below.
Manager username/password reset
Not supported on the MSM-765.
The Allow password reset via console port feature provides a secure way to reset the
manager login username/password on a controller to factory default values (admin/admin),
without having to reset the entire controller configuration to its factory default settings. To
make use of this feature you must be able to access the controller through its console (serial)
port. See Appendix B: Console ports.
Important This feature is automatically enabled after performing a reset to factory default settings.
This feature is automatically disabled after performing a software (firmware) upgrade.
CautionIf you disable this feature and then forget the manager username or password, the only way
to gain access the management tool is to reset the controller to its factory default settings.
See Appendix C: Resetting to factory defaults.
To reset manager credentials on a controller
1. Connect a serial cable from the serial port on your computer to the console port on the
controller. (See Appendix B: Console ports for information on building a serial cable to
connect to your controller.)
2. Configure VT-100 terminal-emulation software on your computer as follows:
VT-100 (ANSI) terminal
Baud rate of 9600
8 data bits, 1 stop bit, no parity, and no flow control
If on Windows, disable the Use Function, Arrow, and Ctrl Keys for Windows
options.
For the Hilgrave HyperTerminal program, select the Term ina l ke y s option for the
Function, arrow, and ctrl keys act as parameter.
3. Open an appropriately-configured terminal session.
2-6
4. Power on the controller and wait for the login prompt to appear.
5. Ty pe emergency and press Enter.
6. Ty pe 1 and press Enter to reset the manager username and password.
A typical session looks like this:
127.0.0.1 login: emergency
--------------------------
Emergency Menu
--------------------------
Device information
Serial number: SG9603P004
IP address: 16.90.48.186
Select one of the following options:
1. Reset both the manager username and password to "admin"
0. Exit
Selection: 1
Trying to reset manager login credentials....
Management
Management tool
Manager login credentials were successfully reset to:
Username = admin
Password = admin
Press any key to continue.
Password security policies
Security policies affect both manager and operator accounts. Select from one of the following
options:
Follow FIPS 140-2 guidelines: When selected, implements the following requirements
from the FIPS 140-2 guidelines:
All administrator passwords must be at least six characters long.
All administrator passwords must contain at least four different characters.
For more information on these guidelines, refer to the Federal Information Processing
Standards Publication (FIPS PUB) 140-2, Security Requirements for Cryptographic
Modules.
Follow PCI DSS 1.2 guidelines: When selected, implements the following
requirements from the PCI DSS 1.2 guidelines:
All administrator passwords must be at least seven characters long.
All administrator passwords must contain both numeric and alphabetic characters.
The settings under Login control must be configured as follows:
Lock access after nn login failures must be set to 6 or less.
Lock access for nn minutes must be set to 30 minutes or more.
2-7
Management
Management tool
The settings under Account inactivity logout must be configured as follows:
Time o ut must be set to 15 minutes or less.
For more information on these guidelines, refer to the Payment Card Industry Data
Security Standard v1.2 document.
Management tool security features
The management toolis protected by the following security features:
Allowed addresses: You can configure a list of subnets from which access to the
management tool is permitted.
Active interfaces: You can enable or disable access to the management tool for each of
the following:
LAN port
Internet port
VPN
VLAN/GRE.
These settings also apply when SSH is used to access the command line interface.
NoteChanging the security settings may cause you to lose your connection to the management
tool.
Web server
You can also configure the Web server ports from which access to the management tool is
permitted.
Secure web server port: Specify a port number for the controller to use to provide
secure HTTPS access to the management tool. Default is 443. Before reaching the
management tool login page, you must accept a security certificate. The default
certificate provided with the controller will trigger a warning message on most browsers
because it is self-signed. To remove this warning message, you must replace the default
certificate. See About certificate warnings on page 12-10.
NoteChanging the secure web server port will cause you to lose your connection to the
management tool. To reconnect, you will need to specify the following address:
https://Controller_IP_address:web_server_Port_number.
2-8
Web server port: Specify a port number for the controller to use to provide standard
HTTP access to the management tool. These connections are met with a warning, and the
browser is redirected to the secure Web server port. Default is 80.
Management
Auto-refresh icon
Device discovery
Auto-refresh
This option controls how often the controller updates the information in group boxes that
show the auto-refresh icon in their title bar. Under Interval, specify the number of seconds
between refreshes.
Device discovery
Use this page to define discovery options for:
Inter-controller discovery when using the wireless mobility feature (Chapter 9: Mobility
traffic manager)
Controller discovery by controlled APs (Chapter 6: Working with controlled APs)
Select Controller >> Management > Device discovery to open the Discovery
configuration page.
On a non-teamed controller
2-9
Management
Device discovery
On a controller team
Mobility controller discovery
The wireless mobility feature defines a mobility domain, which is an interconnection
between multiple controllers for the purpose of exchanging mobility information on wireless
users. For more information, see Chapter 9: Mobility traffic manager.
For the controllers to interconnect, each must have the Mobility controller discovery
option enabled. In addition, one controller must be defined as the primary mobility
controller. It acts as the central site for distribution of mobility information.
There can only be one primary controller for each mobility domain. On all other controllers
set IP address of primary controller to the IP address of the primary controller.
Note All controllers in the mobility domain must be running the same software version. This
means that the first two numbers in the software revision must be the same. For example:
All controllers running 5.4.x, or all controllers running 5.5.x.
Discovery automatically takes place on both the LAN port and Internet port. VLANs are
not supported.
Network requirements
The network that interconnects the controllers and APs that make up a mobility domain must
not block any of the following ports/protocols:
UDP port 1194
UDP port 12141
UDP port 3000
2-10
UDP port 3001
UDP port 3518
TCP port 5432
Internet protocol number 47 (GRE)
Management
Device discovery
Controller discovery and teaming
When teaming is active, several configuration scenarios are possible:
Teamed controllers operating in conjunction with one or more non-teamed
controllers: Set the team as the primary mobility controller. On the other controllers, set
the IP address of primary mobility controller parameter to the team IP address.
A single team of controllers: Enable the This is the primary mobility controller
option on the team manager.
Multiple teamed and non-teamed controllers: Set one team as the primary mobility
controller. On the other teams and controllers, set the IP address of primary mobility
controller parameter to the team IP address of the primary mobility controller.
This is the primary mobility controller
Enable this option to designate this controller as the primary mobility controller. The primary
controller is responsible for the coordination and discovery of all other controllers in the
mobility domain.
IP address of primary mobility controller
Enter the IP address of the primary mobility controller.
Controlled AP discovery
Discovery priority of this controller
Discovery priority of controller team
Sets the priority for this controller or team when discovered by a controlled AP. A value of 1
indicates the highest priority. A value of 16 indicates the lowest priority.
If multiple controllers or teams are discovered by a controlled AP, the AP will establish a
control channel with the controller or team that has the highest priority setting first. If that
controller or team is already managing the maximum number of controlled APs, the AP will
choose the controller or team with the next highest priority.
Each controller or team must have a different priority setting, otherwise AP discovery will
fail with the diagnostic Priority conflict. See Viewing all discovered APs on page 6-14.
See Discovery of controllers by controlled APs on page 6-6 for more detailed information on
the discovery process.
Important note when your network also contains controller teams
Non-teamed controllers are always higher priority than controller teams. Therefore, if your
network contains both controller teams and non-teamed controllers, APs first attempt to
establish a secure management tunnel with discovered non-teamed controllers in order of
their discovery priority. Only if all non-teamed controllers are already managing the
maximum number of controlled APs will the AP then consider controller teams in the order
of their priority.
2-11
Management
Device discovery
The following table shows how discovery would occur for several teamed and non-teamed
controllers.
Controller or Team
Controller 111
Controller 222
Controller 333
Team 114
Team 225
Team 336
Configured discovery
priority setting
Actual order of
discovery by APs
Active interfaces
Select the physical interfaces on which the controller or team manager will listen for
discovery requests from controlled APs. The control channel to an AP is always established
on the interface on which it is discovered.
2-12
Management
SNMP
SNMP
The controller provides a SNMP implementation supporting both industry-standard and
custom MIBs. For information on supported MIBs, see the MSM SNMP MIB Reference Guide.
Configuring the SNMP agent
Select Controller >> Management > SNMP to open the SNMP agent configuration page.
By default, the SNMP agent is enabled (SNMP agent configuration in title bar is checked)
and is active on the LAN port. If you disable the agent, the controller will not respond to
SNMP requests.
2-13
Management
SNMP
Attributes
System name
Specify a name to identify the controller. By default, this is set to the serial number of the
controller.
Location
Specify a descriptive name for the location where the controller is installed.
Contact
Contact information for the controller.
Port
Specify the UDP port and protocol the controller uses to respond to SNMP requests. Default
port is 161.
SNMP protocol
Select the SNMP versions that the controller will support. Default is Versi o n 1 and Versio n
2c.
Notifications
Select the SNMP versions that the AP will support. Default is Version 1 and Ve rs io n 2 c.
Notifications
When this feature is enabled, the controller sends notifications to the hosts that appear in the
Notifications receivers list.
The controller supports the following MIB II notifications:
coldStart
linkUp
linkDown
authenticationFailure
In addition, the controller supports a number of custom notifications. Select Configure
Notifications. For a descriptions of these notifications, see the online help.
v1/v2 communities
Community name
Specify the password, also known as the read/write name, that controls read/write access to
the SNMP agent. A network management program must supply this name when attempting to
set or get SNMP information from the controller. By default, this is set to private.
Read-only name
This is the password that controls read-only access to the SNMP agent. A network
management program must supply this name when attempting to get SNMP information from
the controller. By default, this is set to public.
2-14
Management
SNMP
v3 users
This table lists all defined SNMP v3 users. To add a new user, select Add New User. Up to
five users are supported. To edit a user, select its link in the Username column.
Username
The SNMP v3 username.
Security
Security protocol defined for the user. Authentication type and encryption type are separated
by a slash. For example, MD5/DES indicates MD5 authentication and DES encryption.
Access level
Type of access assigned to the user:
Read-only: The user has read and notify access to all MIB objects.
Read-write: The user has read, write, and notify access to all MIB objects.
Notification receivers
This table lists all defined SNMP notification receivers. SNMP notifications are sent to all
receivers in this list. To add a new receiver, select Add New Receiver. Up to five receivers
are supported. To edit a receiver, select its link in the Host column.
Host
The domain name or IP address of the SNMP notifications receiver to which the controller
will send notifications.
UDP port
The port on which the controller will send notifications.
Versio n
The SNMP version (1, 2c, 3) for which this receiver is configured.
Community/Username
For SNMP v1 and v2c, the SNMP Community name of the receiver.
For SNMP v3, the SNMP v3 Username of the receiver.
Security
Use these settings to control access to the SNMP interface.
Allowed addresses: List of IP address from which access to the SNMP interface is
permitted. To add an entry, specify the IP address and appropriate Mask, and then
select Add.
When the list is empty, access is permitted from any IP address.
Active interfaces: Enable the checkboxes that correspond to the interfaces from which
to allow access to the SNMP agent. For VLAN, GRE, or Mesh, select from the list. Use
Ctrl-click to select multiple objects.
2-15
Management
SOAP
SOAP
The controller provides a SOAP interface that can be used by SOAP-compliant client
applications to perform configuration and management tasks.
An MSM SOAP/XML SDK zip file is available at www.hp.com/networking/SOAP-XML-SDK.
Look for the file corresponding to your MSM software version.
Configuring the SOAP server
Select Controller >> Management > SOAP to open the SOAP server configuration page.
By default, the SOAP server is enabled (SOAP server configuration in title bar is checked).
2-16
Server settings
Secure HTTP (SSL/TLS)
Enable this option to configure the SOAP server for SSL/TLS mode. When enabled, the
Secure Sockets Layer (SSL) protocol must be used to access the SOAP interface.
Using client certificate
When enabled, the use of an X.509 client certificate is mandatory for SOAP clients.
HTTP authentication
When enabled, access to the SOAP interface is available via HTTP with the specified
username and password.
Management
TCP port
Specify the number of the TCP port that SOAP uses to communicate with remote
applications. Default is 448.
Security
Use these settings to control access to the SOAP interface.
Allowed addresses: List of IP address from which access to the SOAP interface is
permitted. To add an entry, specify the IP address and appropriate Mask, and then
select Add.
When the list is empty, access is permitted from any IP address.
Active interfaces: Enable the checkboxes that correspond to the interfaces from which
to allow access to the SOAP interface.
Security considerations
The SOAP server is configured for SSL/TLS mode, and the use of an X.509 client
certificate is mandatory for SOAP clients.
CLI
The SOAP server is configured to trust all client certificates signed by the default SOAP
CA installed on the controller.
Users should generate and install their own SOAP CA private key/public key certificate to
protect their devices from unauthorized access. This is important because the default
SOAP CA and a valid client certificate are provided as an example to all customers. (See
Working with certificates on page 12-5.)
CLI
The controller provides a command line interface that can be used to perform configuration
and management tasks via the serial port or an IP connection on any of the controller
interfaces, including the LAN port, Internet port, or VPN/GRE tunnel.
For information on using the CLI, see the CLI Reference Guide.
A maximum of three concurrent CLI sessions are supported regardless of the connection
type.
2-17
Management
CLI
Configuring CLI support
Select Controller >> Management > CLI to open the Command Line Interface (CLI)
configuration page.
Secure shell access
Enable this option to allow access to the CLI via an SSH session. The CLI supports SSH on
the standard TCP port (22).
SSH connections to the CLI can be made on any active interface. Support for each interface
must be explicitly enabled under Security.
Lockout
After 10 unsuccessful login attempts via SSH, login to the CLI is locked for 5 minutes. After
the lockout expires, each subsequent unsuccessful login attempt re-activates the lockout
period. This behavior repeats until a successful login is completed.
NoteDepending on your SSH configuration, your client may make several login attempts with each
connection attempt.
Supported clients
The following SSH clients have been tested with the CLI. Others may work as well:
OpenSSH
Tect ia
SecureCRT
Putty
2-18
Authenticate CLI logins using
The CLI validates login credentials (username and password) using the settings defined on
the Controller >> Management > Management tool page.
Management
System time
Local manager account
The login username and password are the same as those defined for the local manager
account. If this account is disabled, the last known username and password for this account
are used.
Administrative user authentication settings
The login username and password use the same settings (Local and/or RADIUS) as defined
for the manager account under Administrative user authentication.
System time
Select Controller >> Management > System time to open the System time page. This
page enables you to configure the time server and set time zone information.
NoteThe system time page on the MSM765zl is a read-only page that displays the current time
configured on the chassis. This may or may not be the current time.
NoteSetting the correct time is important when the controller is managing controlled APs, as the
time configured on the controller is used on all controlled APs. Synchronization and
certificate problems can occur if the controller time is not accurate.
NoteCorrect time is also important when the controller is using Active Directory to authenticate
users.
2-19
Management
System time
Set timezone
Select the time zone in which the controller is located. If you change the time zone setting,
the new value does not take effect until you restart the controller.
Automatically adjust clock for daylight savings time changes
Enable this option to automatically update the clock based on the specified daylight savings
time (DST) rule.
Default DST rule: This is the currently active daylight savings time rule.
Customize DST rules: Select this button to define your own DST rule.
Time server protocol
Select the protocol that will be used to communicate with the time server.
Set date and time (manually)
Use this option to manually set the system date and time.
Set date and time (time servers)
Select this option to have the controller periodically contact a network time server to update
its internal clock. By default, the list contains two ntp vendor zone pools that are reserved for
HP devices. By using these pools, you will get better service and keep from overloading the
standard ntp.org server. For more information refer to: pool.ntp.org.
2-20
Chapter 3: Network configuration
Network configuration
Contents
Port configuration........................................................................................................3-3
LAN port configuration.........................................................................................3-4
Internet port configuration...................................................................................3-5
The Port configuration page displays summary information about all ports, VLANs, and
GRE tunnels. Open this page by selecting Controller >> Network > Ports.
Port configuration information
Status indicator: Operational state of each port, as follows:
Green: Port is properly configured and ready to send and receive data.
Red: Port is not properly configured or is disabled.
Name: Identifier for the port. To configure a port, select its name.
IP address: IP addresses assigned to the port. An address of 0.0.0.0 means that no
address is assigned.
Mask: Subnet mask for the IP address.
MAC address: MAC address of the port.
Default port settings
By default, ports are configured as follows:
PortDefault IP addressDefault DHCP server status
LAN192.168.1.1Disabled.
InternetDHCP clientThis feature is not available on the Internet port.
3-3
Network configuration
Port configuration
LAN port configuration
The LAN port is used to connect the controller to a wired network. To verify and possibly
adjust LAN port configuration, select Controller >> Network > Ports > LAN port.
Addressing options
The LAN port must be configured with a static IP address, because the controller cannot
function as a DHCP client on the LAN port. By default it is set to the address 192.168.1.1
For information on configuring address allocation on the LAN port via DHCP server or DHCP
relay agent, see Address allocation on page 3-13.
Management address
Use this option to assign a second IP address to the LAN port. This address provides a simple
way to separate management traffic from user traffic without using VLANs.
For example, by default the LAN port is set to 192.168.1.1 and all client devices obtain an
address on this subnet from the controller’s DHCP server. With this feature you can add
another address, say 192.168.2.1/255.255.255.0. APs can then be assigned to this subnet using
static IP addressing. Now all management traffic exchanged between the controller and the
APs is on a separate subnet.
Link settings
By default, the controller automatically adjusts link settings based on the type of equipment
the port is connected to. If needed, you can force the port to operate at a particular speed or
duplex setting.
3-4
Network configuration
Port configuration
Internet port configuration
To verify and possibly adjust Internet port configuration, select Controller >> Network >
Ports > Internet port.
Addressing options
The Internet port supports the following addressing options:
PPPoE client on page 3-6
DHCP client on page 3-8 (default setting)
Static addressing on page 3-9
No address.
By default, the Internet port operates as a DHCP client. Select the addressing option that is
required by your ISP or network administrator and then select Configure.
Link settings
By default, the controller automatically adjusts link settings based on the type of equipment
the port is connected to. If needed, you can force the port to operate at a particular speed or
duplex setting.
Network address translation
Enable this option to permit all the computers on the network to simultaneously share the
connection on the Internet port. See Network address translation (NAT) on page 3-30.
Limit NAT port range
When enabled, the controller reserves a range of TCP and UDP ports for each authenticated,
access-controlled user starting at port 5000, and maps all outgoing traffic for the user within
the range.
3-5
Network configuration
Port configuration
NoteIf you enable this feature you should not assign static NAT mappings in the range 5000 to
10000.
Size of port range
Sets the number of TCP and UDP ports reserved for each user.
PPPoE client
To configure the PPPoE client on the Internet port, select Controller >> Network > Ports
and then select PPPoE and then Configure.
Settings
Username
Specify the username assigned to you by your ISP. The controller will use this username to
log on to your ISP when establishing a PPPoE connection.
Password/Confirm password
Specify the password assigned to you by your ISP. The controller will use this password to log
on to your ISP when establishing a PPPoE connection.
Maximum Receive Unit (MRU)
Maximum size (in bytes) of a PPPoE packet when receiving. Changes to this parameter only
should be made according to the recommendations of your ISP. Incorrectly setting this
parameter can reduce the throughput of your Internet connection.
Maximum Transmit Unit (MTU)
Maximum size (in bytes) of a PPPoE packet when transmitting. Changes to this parameter
should only be made according to the recommendations of your ISP. Incorrectly setting this
parameter can reduce the throughput of your Internet connection.
Auto-reconnect
The controller will automatically attempt to reconnect if the connection is lost.
3-6
Network configuration
Port configuration
Un-numbered mode
This feature is useful when the controller is connected to the Internet and NAT is not being
used. Instead of assigning two IP addresses to the controller, one to the Internet port and one
to the LAN port, both ports can share a single IP address.
This is especially useful when a limited number of IP addresses are available to you.
Assigned by PPPoE server
These settings are assigned to the controller by your service provider PPPoE server. The
Internet connection is not active until this occurs.
Service provider
Identifies your Internet service provider. Not all ISPs provide this information.
Connection status
Indicates the state of the PPPoE connection. If the connection is not active, a message
indicates why.
IP address
Identifies the IP address assigned to the controller by the ISP.
Mask
Identifies the subnet mask that corresponds to the assigned IP address.
Primary DNS address
Identifies the IP address of the main DNS server the controller will use to resolve DNS
requests.
Secondary DNS address
Identifies the IP address of the backup server the controller will use to resolve DNS requests.
Default gateway
Identifies the IP address of the gateway the controller will forward all outbound traffic to.
Restart Connection
Select this button to manually establish the PPPoE connection. During normal operation, you
will not need to do this because the controller will automatically reconnect if the PPPoE
connection is interrupted. However, for certain types of connection failures, the controller
may not be able to re-establish the connection, even after several retries. When this occurs,
the cause of the failure is shown in the Connection status field and you must select Restart Connection to manually establish the connection.
3-7
Network configuration
Port configuration
DHCP client
To configure the PPPoE client on the Internet port, select Controller >> Network > Ports
and then select DHCP Client and then Configure.
Settings
DHCP client ID
Specify an ID to identify the controller to the DHCP server.
Assigned by DHCP server
These settings are assigned to the controller by your service provider DHCP server. The
Internet connection is not active until this occurs.
Domain name
Identifies the domain the DHCP server is operating in.
IP address
Identifies the IP address assigned to the controller by the DHCP server.
Mask
Identifies the subnet mask that corresponds to the assigned IP address.
Primary DNS address
Identifies the IP address of the main DNS server the controller will use to resolve DNS
requests.
Secondary DNS address
Identifies the IP address of the backup server the controller will use to resolve DNS requests.
3-8
Default gateway
Identifies the IP address of the gateway the controller will forward all outbound traffic to.
Expiration time
Indicates how long the address is valid.
Network configuration
Port configuration
Release
Select to release the controller IP address.
Renew
Select to renew the controller IP address.
Static addressing
To configure the PPPoE client on the Internet port, select Controller >> Network > Ports
and then select Static and then Configure.
Port settings
IP address
Specify the static IP address you want to assign to the port.
Address mask
Select the appropriate mask for the IP address you specified.
Additional IP addresses
Use these options to define additional IP addresses for use by either the VPN one-to-one NAT
feature or the public IP address feature. Only one of these features can be active.
Type of addresses
Select either the VPN one-to-one NAT or Public IP address option.
VPN one-to-one NAT
When this feature is enabled, the controller can assign a unique IP address to each IPSec or
PPTP VPN connection made by a user to a remote server via the Internet port. Addresses are
assigned as defined in the Address pool.
This feature can only be used with authenticated, access-controlled users.
3-9
Network configuration
Port configuration
To reduce the number of addresses that need to be defined, the controller will use the same
address for multiple users as long as they are establishing a connection with different VPN
servers.
Use this feature when all of the following conditions are true:
Users intend to make IPSec or PPTP VPN connections with a remote site via the Internet
port on the controller.
NAT is enabled on the controller. (In its default configuration, NAT translates all IP
address on the local network to a single public IP address; the address assigned to the
Internet port on the controller. As a result, all user sessions to an external resource
appear to originate from the same IP address. This can cause a problem with remote VPN
servers that require a unique IP address for each user session.)
The remote VPN server requires that each user have a unique IP address.
NoteExternal devices cannot initiate connections with users via the address assigned by this
feature.
Assigning addresses to users
To make use of this feature, each user account must have the VPN one-to-one NAT option
enabled. Do this as follows:
If using the local user accounts (defined on the Controller >> Users menu), enable the
VPN one-to-one NAT option in the account profile or subscription plan that is assigned
to the user. See Defining account profiles on page 10-32 and Defining subscription
plans on page 10-35.
If using Active Directory, enable the VPN one-to-one NAT option in the account profile
(see Defining account profiles on page 10-32) that is assigned to an Active Directory
group (see Configuring an Active Directory group on page 11-13).
If using a RADIUS server, add the following Colubris AV-Pair value to the user’s account:
one-to-one-nat=1. For more information on setting attributes, see Default user one-
to-one NAT on page 15-53 and One-to-one NAT on page 15-69.
Address pool
The address pool contains all the IP addresses that can be assigned to users. You can define
up to 30 addresses.
Addresses must be valid for the network to which the Internet port is connected. Specify a
single address or an address range as follows: address1-address2. For example, the following
defines a range of 20 addresses: 192.168.1.1-192.168.1.20
Public IP address
This feature enables the integrated DHCP server on the controller to assign public IP
addresses to users. A user with a public IP address is visible on the protected network
connected to the Internet port, instead of being hidden by the controller’s NAT feature. This
makes it possible for external devices to create connections with a user’s computer on the
internal network.
3-10
Network configuration
Port configuration
Public IP addresses are assigned by the integrated DHCP server using the addresses specified
in the Address pool. Whenever possible, this feature will assign the same public IP address
to a user each time they connect.
When you enable public IP address support in a subscription plan, an additional setting is
available called Reserve public IP address. When this option is enabled, the public IP
assigned to a user is reserved until the user’s subscription plan expires. This means that the
address is reserved, even if the user is not logged in.
When a public IP address is assigned to a user:
The user cannot access any VLANs, VPNs, or GRE tunnels configured on the controller.
The user cannot establish more than one concurrent session.
NoteIf a user’s account is configured for public IP address support and there is no free public IP
address in the pool when the user tries to login, the login is refused.
Assigning public IP addresses to users
To obtain a public IP address, a user’s account must have its Public IP address option
enabled. Do this as follows:
If using the local user accounts (defined on the Controller >> Users menu), enable the
Public IP address option in the account profile or subscription plan that is assigned to
the user. See Defining account profiles on page 10-32 and Defining subscription plans
on page 10-35.
If using Active Directory, enable the Public IP address option in the account profile (see
Defining account profiles on page 10-32) that is assigned to an Active Directory group.
To set up an Active Directory group, see Configuring an Active Directory group on
page 11-13.
If using a RADIUS server, add the following Colubris AV-Pair value to the user’s account:
use-public-ip-subnet=1. For more information, see Default user public IP address
on page 15-54 and Public IP address on page 15-70.
DHCP server lease time
Use this setting to define the amount of time the public IP address lease will be valid. This
setting only applies to public IP addresses. It overrides the DHCP lease time set by selecting
The address pool contains all the public IP addresses that can be assigned to users. You can
define up to 30 addresses.
Addresses must be valid for the network to which the Internet port is connected. Specify a
single address or an address range as follows: address1-address2. For example, the following
defines a range of 20 addresses: 192.168.1.1-192.168.1.20
3-11
Network configuration
Network profiles
Network profiles
Network profiles let you define the characteristic of a network and assign a friendly name to
it. Profiles make it easy to configure the same settings in multiple places on the controller.
For example, if you define a profile with a VLAN ID of 10, you could use that profile to:
Configure VLAN 10 on the controller’s Internet or LAN port using the Controller >>
Network > Ports page.
Configure VLAN 10 as the egress network for a group of APs when binding them to a VSC
using the Controlled APs > [group] >> VSC bindings page.
Configure VLAN 10 as the local network for an AP using the Controlled APs >>
Configuration > Local network page.
About the default network profiles
Two network profiles are created by default: LAN port network and Internet port
network. These profiles are associated with the two physical Ethernet ports on the
controller. You can rename these profiles, but you cannot assign a VLAN to them or delete
them. You can use these profiles to send untagged traffic to a specific port on the controller.
Both ports are considered to be local networks on the controller, which means that they
automatically map the network that is assigned to each physical port as a local network on
the controller. However, the LAN and Internet port network profiles can also be assigned as a
local network on an AP (for example, using the Controlled APs >> Configuration > Local networks page). When this is done, both profiles refer to the untagged Ethernet port on the
AP.
To assign a VLAN, select VLAN and then specify an ID.
If the profile will be used on an Ethernet port, you can also define a range of VLANs.
This enables a single VLAN definition to span a large number of contiguously
assigned VLANs. Specify the range in the form X-Y, where X and Y can be 1 to 4094.
For example: 50-60.
Network configuration
Address allocation
An IP address cannot be assigned to a VLAN range.
You can define more than one VLAN range by using multiple profiles. Each range
must be distinct and contiguous.
4. Select Save.
Address allocation
The controller can operate as a DHCP server or DHCP relay agent on the LAN port. This
enables it to assign IP addresses to downstream devices connected to the LAN port.
By default, address allocation is disabled. To configure address allocation settings, select
Controller >>Network > Address allocation.
For information on VPN address pool, see Configure an IPSec profile for wireless client VPN
on page 16-4.
3-13
Network configuration
Address allocation
DHCP server
The DHCP server can be used to automatically assign IP addresses to devices that are
connected to the controller via the LAN port or client data tunnel.
Note Do not enable the DHCP server if the LAN port is connected to a network that already has
an operational DHCP server.
When the DHCP server is active, users can still connect using static IP addresses assigned
on different subnets. To configure this feature, select Public access > Access control
and under Client options, select Allow any IP address.
The DHCP settings on this page are always used by the default VSC. For additional
flexibility, separate DHCP servers can enabled on other access-controlled VSCs to assign
addresses to users. See DHCP server on page 5-30.
The DHCP server feature is not supported when controller teaming is active.
To configure the internal DHCP server, select Controller >> Network > Address
allocation, select DHCP server, and then Configure.
3-14
Network configuration
Address allocation
Addresses
Start / End
Specify the starting and ending IP addresses that define the range of addresses the DHCP
server can assign to client stations. The address assigned to the controller is automatically
excluded from the range.
Gateway
Specify the IP address of the default gateway the controller will assign to DHCP users. In
most cases you will specify the IP address of the controller LAN port as the Gateway.
DNS servers to assign to client stations
Lists the IP addresses of the DNS servers that the controller will assign to users. You can
define DNS options by selecting Network > DNS.
Fixed leases
Use this feature to permanently reserve an IP addresses lease for a specific device. This
ensures that the device is always reachable at the same address on the network, but does not
require a static address to be set directly on the device itself. This table lists all permanently
reserved addresses. Up to 255 fixed leases can be defined.
To assign a specific IP address to a client station specify the following and select Add:
MAC address: MAC address of the client station in the format: nn:nn:nn:nn:nn:nn.
IP address: IP address that will be assigned to the client station in the format:
nnn.nnn.nnn.nnn.
Unique identifier: A number that identifies the device. Must be unique to all DHCP
clients on the network. Generally set to the MAC address of the client station. This
parameter is optional unless MAC masquerading is being performed by the client station.
Settings
Domain name
Specify the domain name the controller will return to DHCP users. Typically, this will be your
corporate domain name.
The host name in the currently installed SSL certificate is automatically assigned as the
domain name of the controller. The factory default SSL certificate that is installed on the
controller has the host name wireless.colubris.com.
3-15
Network configuration
Address allocation
You do not have to add this name to your server for it to be resolved. The controller
intercepts all DNS requests it receives. It resolves any request that matches the certificate
host name by returning the IP address assigned to the Internet port. All other DNS requests
are forwarded to the appropriate DNS servers as configured on the Controller > Network > DNS page.
To summarize, this means that by default, any DNS request by a user that matches
wireless.colubris.com will return the IP address of the controller’s Internet port.
Lease time
Specify the lease time (in seconds) that the controller will assign to all assigned addresses. As
long as a user remains connected their address is automatically renewed when the lease time
expires. If a user disconnects without releasing their address, then the address remains
reserved until the lease time expires. If you have a small address pool and a large user
turnover, setting a long lease time may cause you to run out of addresses even though they
are not really in use.
Logout HTML user on discovery request
When enabled, the controller will log out a client station if a DHCP discovery request is
received from the client station while a DHCP address lease is currently assigned.
This feature is useful when multiple users share the same client station. If a user forgets to
log out before turning off the client station, the next user will have to wait until the lease
expires before being able to log in.
Listen for DHCP requests on
Select the port on which the controller will listen for DHCP requests from client stations.
LAN port: Listen for requests on the LAN port.
Client data tunnel: Enable this option when the client data tunnel feature is active on
one or more VSCs, and you want tunneled client stations to be able to receive an IP
address from the controller’s DHCP server.
Controller discovery
Use this option to define controller discovery information for controlled APs. See DHCP
discovery on page 6-8.
Add the IP address for each controller that is active on the network. When working with a
controller team you should add the IP address of each team member.
This list is sent to all devices that request an IP address, encoded as DHCP option 43 (Vendorspecific information). However, this information is only interpreted by HP ProCurve APs that
are operating in controlled mode. Controlled mode APs use these addresses to connect with
the controllers in the order that they appear in the list.
3-16
DHCP relay agent
The controller provides a flexible DHCP relay implementation. It can listen for requests on
the LAN port or client data tunnel and forward them to a DHCP via any of the controller’s
physical or logical interfaces.
Network configuration
Address allocation
NoteFor additional flexibility, separate DHCP relay agents can be enabled on access-controlled
VSCs. See DHCP relay agent on page 5-31.
Use the following guidelines when configuring DHCP relay:
Routes must be defined on the DHCP server, so that the DHCP server can successfully
send DHCP response packets back to the DHCP relay agent running on the controller.
These should be static and persistent HOST routes that must identify the IP address
assigned to the controller’s LAN port or additional VSC relay IP address, (i.e. 192.168.1.1).
On Windows, such a static route would look like this:
DHCP relay is not supported via the Internet port when it is operating as a PPPoE client.
DHCP relay cannot work via the Internet port if the internal firewall is set to High and
NAT is enabled on the Internet port. The DHCP server must be able to ping the assigned
address to prevent duplicate assignments.
To configure the internal DHCP server, select Controller >> Network > Address
allocation, select DHCP relay agent, and then Configure.
Settings
Listen for DHCP requests on
Select the port on which the controller will listen for DHCP requests from users.
Listen for requests on
LAN port: Listens for DHCP requests on the LAN port and relay them to the remote
DHCP server.
Client data tunnel: Enable this option when the client data tunnel feature is active on
one or more VSCs, and you want tunneled users to be able to receive an IP address via the
DHCP relay agent. See Client data tunnel on page 5-13.
3-17
Network configuration
Address allocation
The following two fields let you attach information to the DHCP request (as defined by DHCP
relay agent information option 82) which lets the DHCP server identify the controller.
Circuit ID: Use this field to identify the user that issued the DHCP request.
Remote ID: Use this field to identify the controller.
You can use regular text in combination with the following placeholders to create the
information in each field. Placeholders are automatically expanded when the request is sent.
The following placeholders can be used:
%S: SSID to which the user is associated.
%B: BSSID to which the user is associated.
%V: VLAN to which the user is mapped.
Server
Primary DHCP server address
Specify the IP address of the first DHCP server to which the controller should forward DHCP
requests.
Secondary DHCP server address
Specify the IP address of the backup DHCP server to which the controller should forward
DHCP requests.
Note The DHCP servers must be reachable via one of the ports on the controller.
Routes must be defined on the DHCP server so that the DHCP server can successfully
send DHCP response packets back to the DHCP relay agent running on the controller.
These should be static and persistent HOST routes that must identify the IP address
assigned to the controller’s LAN port or an additional VSC relay IP address, (i.e.
192.168.1.1). On Windows, such a static route would look like this:
DHCP relay is not supported via the Internet port when it is operating as a PPPoE client.
DHCP relay cannot work via the Internet port if the internal firewall is set to High and
NAT is enabled on the Internet port. The DHCP server must be able to ping the assigned
address to prevent duplicate assignments.
Extend Internet port subnet to LAN port
When enabled, the controller will alter the DHCP address requests from client stations so that
they appear to originate from the network assigned to the Internet port on the controller. This
will cause the DHCP server to assign IP addresses on this network to all client stations. The
controller handles all mapping between the two subnets internally.
3-18
Network configuration
VLAN support
For L2 connected APs operating in controlled mode:
Enable the Client data tunnel option under Settings. (If teaming is active, the client
data tunnel is automatically used.)
Enable the Always tunnel client traffic option on the VSC profile page under Vir t ual
AP > Client data tunnel.
VLAN support
VLAN configuration is discussed in Chapter 7: Working with VLANs.
GRE tunnels
To view and configure GRE tunnel definitions, select Controller >> Network > Ports.
Initially, no GRE tunnels are defined.
3-19
Network configuration
GRE tunnels
To add a tunnel, select Add New GRE Tunnel. The Add/Edit GRE tunnel page opens.
Define tunnel settings as follows:
Name: Tunnel name.
Local tunnel IP address: Specify the IP address of the controller inside the tunnel.
Remote tunnel IP address: Specify the IP address of the remote device inside the
tunnel.
Tunnel IP mask: Specify the mask associated with the IP addresses inside the tunnel.
GRE peer IP address: Specify the IP address of the remote device that terminates the
tunnel.
3-20
Network configuration
Bandwidth Control
Internet Port
Data Rate
Limit
Level
User
Data Rate
Limits
User
traffic
Management
traffic
Internet
Port
Very High
High
Normal
Low
Traffic from
the site access list
Bandwidth control
Bandwidth control
The controller incorporates a bandwidth management feature that enables control of all user
traffic flowing through the controller.
To configure Bandwidth management, select Controller >> Network > Bandwidth
Control.
Bandwidth control has two separate components: Internet port data rate limits and
bandwidth levels. They interact with the data stream as follows:
3-21
Network configuration
Bandwidth control
Internet port data rate limits
These settings enable you to limit the total incoming or outgoing data rate on the Internet
port. If traffic exceeds the rate you set for short bursts, it is buffered. Long overages will
result in data being dropped.
To utilize the full available bandwidth, the Maximum transmit rate and Maximum receive rate should be set to match the incoming and outgoing data rates supported by the
connection established on the Internet port.
Bandwidth levels
The controller provides four levels of traffic priority that you can use to manage traffic flow:
Very High, High, Normal, and Low. The settings for each level are customizable, allowing
performance to be tailored to meet a wide variety of scenarios.
Assigning traffic to a bandwidth level
Traffic can be assigned to a specific bandwidth level for each VSC and for each user. For
bandwidth control to be operational, you must first enable the Internet port data rate limits option. Once this is done, you can assign traffic to bandwidth levels as follows:
In a VSC, select the default level for all user traffic in the Bandwidth control box. This
level applies to users who do not have a specific assignment in their user account.
In a user’s account profile, set the Bandwidth level in the Bandwidth limits box.
Or if you are using a RADIUS server to validate user logins, set the bandwidth level using
a Colubris AV-Pair value. See Bandwidth level on page 15-68.
To control the default bandwidth level for all users, see Default user bandwidth level on
page 15-51.
3-22
Network configuration
Bandwidth control
Note Management traffic (which includes RADIUS, SNMP, and administrative sessions) is
assigned to bandwidth level Ver y Hi gh and cannot be changed.
All traffic assigned to a particular bandwidth level shares the allocated bandwidth for
that level across all VSCs. This means that if you have three VSCs all assigning user traffic
to High, all users share the bandwidth allocated to the High level.
Customizing bandwidth levels
Bandwidth levels are arranged in order of priority from Very High to Low. Priority determines
how free bandwidth is allocated once the minimum rate is met for each level. Free bandwidth
is always assigned to the higher priority levels first.
Bandwidth rates for each level are defined by taking a percentage of the maximum transmit
and receive rates defined for the Internet port. Each bandwidth level has four rate settings:
Transmit rate - guaranteed minimum: Minimum amount of bandwidth that will be
assigned to a level as soon as outgoing traffic is present on the level.
Transmit rate - maximum: Maximum amount of outgoing bandwidth that can be
consumed by the level. Traffic in excess is buffered for short bursts, and dropped for
sustained overages.
Receive rate - guaranteed minimum: Minimum amount of bandwidth that will be assigned
to a level as soon as incoming traffic is present on the level.
Receive rate - maximum: Maximum amount of incoming bandwidth that can be
consumed by the level. Traffic in excess is buffered for short bursts, and dropped for
sustained overages.
Example
For example, assume that transmit bandwidth is configured as follows:
Tra ns mi t r ate s
MinMax
Very High
High
Normal
Low
2020
40100
20100
2020
Next, assume the following bandwidth requirement occurs on transmitted user data:
High requires 70%, which is 30% more than its minimum.
Normal requires 50%, which is 30% more than its minimum.
There is no traffic on Very High or Low.
3-23
Network configuration
Discovery protocols
Since both High and Normal require bandwidth in excess of their guaranteed minimum, each
is allocated their guaranteed minimum. This leaves 40% of the bandwidth free to be assigned
on a priority basis. High has more priority than Normal, so it takes as much bandwidth as
needed. In this case it is 30%, which brings High up to 70%. This leaves 10% for Normal, which
is not enough. Traffic is buffered for a short period, and then dropped.
If at the same time Very High traffic is sent, this level immediately steals 20% from the lower
levels. In this case, 10% is taken from Normal, returning it to its minimum guaranteed level,
and 10% is taken from High.
Discovery protocols
The controller supports two protocols (LLDP and CDP) that provide a mechanism for devices
on a network to exchange information with their neighbors.
To these protocols, select Controller >> Network > Discovery protocols.
3-24
LLDP agents
For a complete discussion of all LLDP options, see Chapter 17: LLDP on page 17-1.
CDP
The controller can be configured to transmit CDP (Cisco Discovery Protocol) information on
the LAN and Internet ports. This information is used to advertise controller information to
third-party devices, such as CDP-aware switches. Network managers can retrieve this
information allowing them to determine the switch ports to which different controllers are
connected.
The controller always listens for CDP information on the LAN and Internet ports, even when
this option is disabled, to build a list of autonomous APs. CDP information from third-party
devices and controlled APs is ignored.
NoteControlled APs always send CDP information.
DNS
The controller provides several options to customize DNS handling. To configure these
options, select Controller >> Network > DNS. The configuration options on this page
change depending on the address option that is active on the Internet port.
When the Internet port is configured to obtain an IP address via PPPoE or DHCP
Network configuration
DNS
When the Internet port is configured to use a static IP address
3-25
Network configuration
DNS
NoteWhen using Active Directory for user authentication, set the DNS servers to be the Active
Directory servers or the devices that provide SRV records.
DNS servers
Dynamically assigned servers
Shows the DNS servers that are dynamically assigned to the controller when PPPoE or DHCP
is used to obtain an IP address on the Internet port.
Override dynamically assigned DNS servers
Enable this checkbox to use the DNS servers that you specify on this page to replace those
that are assigned to the controller.
Server 1
Specify the IP address of the primary DNS server for the controller to use.
Server 2
Specify the IP address of the secondary DNS server for the controller to use.
Server 3
Specify the IP address of the tertiary DNS server for the controller to use.
DNS advanced settings
DNS cache
Enable this checkbox to activate the DNS cache. Once a host name is successfully resolved to
an IP address by a remote DNS server, it is stored in the cache. This speeds up network
performance, because the remote DNS server does not have to be queried for subsequent
requests for this host.
An entry stays in the cache until one of the following is true:
An error occurs when connecting to the remote host.
The time to live (TTL) of the DNS request expires.
The controller restarts.
DNS switch on server failure
Controls how the controller switches between servers:
When enabled, the controller switches servers if the current server replies with a DNS
server failure message.
3-26
When disabled, the controller switches servers if the current server does not reply to a
DNS request.
Network configuration
IP routes
DNS switch over
Controls how the controller switches back to the primary server.
When enabled, the controller switches back to the primary server once the primary
server becomes available again.
When disabled, the controller switches back to the primary server only when the
secondary server becomes unavailable.
DNS interception
When enabled, the controller intercepts all DNS requests and relays them to the configured
DNS servers. DNS interception must be enabled to support:
Redirection of users to the public access interface login page when the controller cannot
resolve the domain requested by the user. For example, if the user is using a private or
local domain as the default home page in its browser.
Users configured to use HTTP proxy.
Users with static IP addresses when the Allow any IP address option is enabled on the
Public access > Access control page.
When disabled, the controller does not intercept any DNS requests, enabling devices to
use a DNS server other than the controller. To support this option, you must set
Network > Address allocation to DHCP relay agent or Static.
NoteWhen Network > Address allocation is set to DHCP Server the controller always
returns its own address as the DNS server.
IP routes
The routing module on the controller provides the following features:
Compliance with RFC 1812, except for multicast routing
Supports Classless Inter Domain Routing (CIDR)
Supports Routing Internet Protocol (RIP) versions 1 and 2 in active or passive mode.
Output from the router is sent to the appropriate logical interface based on the target address
of the traffic. Supported logical interfaces include:
VLAN
Untagged
IPSec client
PPTP client
GRE tunnel
3-27
Network configuration
IP routes
Configuration
To view and configure IP routes, select Controller >> Network > IP routes.
Active routes
This table shows all active routes on the controller. You can add routes by specifying the
appropriate parameters and then selecting Add.
The routing table is dynamic and is updated as needed. This means that during normal
operation the controller adds routes to the table as required. You cannot delete these system
routes.
The following information is shown for each active route:
Interface: The port through which traffic is routed. When you add a route, the controller
automatically determines the interface to be used based on the Gateway address.
Destination: Traffic addressed to this IP address or subnet is routed.
Mask: Number of bits in the destination address that are checked for a match.
Gateway: IP address of the gateway to which the controller forwards routed traffic
(known as the next hop).
An asterisk is used by system routes to indicate a directly connected network.
Routes cannot be manually specified for IPSec. These routes are automatically added by
the system based on the settings for the IPSec security association.
Metric: Priority of a route. If two routes exist for a destination address, the controller
chooses the one with the lower metric.
3-28
Default routes
The Default routes table shows all default routes on the controller. Default routes are used
when traffic does not match any route in the Active routes table. You can add routes by
specifying the appropriate parameters and then selecting Add.
Network configuration
IP routes
The routing table is dynamic and is updated as needed. If more than one default route exists,
the first route in the table is used.
The following information is shown for each default route:
Interface: The port through which traffic is routed. When you add a route, the controller
automatically determines the interface to be used based on the Gateway address.
Gateway: IP address of the gateway to which the controller forwards routed traffic
(known as the next hop).
An asterisk is used by system routes to indicate a directly connected network.
Metric: Priority of a route. If two routes exist for a destination address, the controller
chooses the one with the lower metric.
Persistent routes
Persistent routes are automatically deleted and then restored each time the interface they are
associated with is closed and opened. When the routes are active, they also appear in the
Active routes table.
PPTP client
The controller provides an Auto-route discovery option to enable it to automatically
discover and add routes for IP addresses on the other side of a Point-to-Point Tunnelling
Protocol (PPTP) tunnel. The addresses must be part of the remote domain as specified on the
Controller >> VPN > PPTP client page. Routes are added only when an attempt is made to
access the target addresses.
About PPTP client routes (Internet port)
If you disabled the Auto-route discovery option (VPN > PPTP client), or if you need to
access IP addresses that are not part of the specified domain, you must define the
appropriate persistent routes.
About PPTP server routes (Internet port)
Activation of the route can be triggered by a specific username. When a user establishes a
connection with the controller PPTP server, its username is checked against the persistent
routes list and if a match is found, the route is enabled.
3-29
Network configuration
Internet
Web
server
Web Page
Web Page
192.168.1.2
NAT
192.168.1.3
ISP
addressed to
192.168.1.2
addressed to
202.125.11.26
Internal addresses are invisible
to computers on the Internet.
All traffic uses the same
external IP address
assigned by the ISP.
202.125.11.26
HTTP request
AP
Controller
Network address translation (NAT)
Network address translation (NAT)
Network address translation is an address mapping service that enables one set of IP
addresses to be used on an internal network, and a second set to be used on an external
network. NAT handles the mapping between the two sets of addresses.
Generally NAT is used to map all addresses on an internal network to a single address for use
on an external network like the Internet. The main benefits are that NAT:
Enables several devices to share a single connection
Effectively hides the IP addresses of all devices on the internal network from the external
network.
This is illustrated as follows:
3-30
NAT can be useful in conjunction with virtual private network (VPN) connections. When two
networks are connected through a VPN tunnel, it may be desirable to obscure the address of
local computers for security reasons.
NAT security and static mappings
One of the benefits of NAT is that it effectively hides the IP addresses of all devices on the
internal network an external network. In some cases, however, it is useful to make a
computer on the internal network accessible externally. For example, a Web server or FTP
server.
Static NAT mapping addresses this problem. Static NAT mapping enables you to route
specific incoming traffic to an IP address on the internal network. For example, to support a
Web server, you can define a static NAT mapping to route traffic on TCP port 80 to an internal
computer running a Web server.
Network configuration
Network address translation (NAT)
A static NAT mapping allows only one internal IP address to act as the destination for a
particular protocol (unless you map the protocol to a nonstandard port). For example, you
can run only one Web server on the internal network.
Note If you use a NAT static mapping to enable a secure (HTTPS) Web server on the internal
network on TCP port 443, remote access to the management tool is no longer possible,
as all incoming HTTPS requests are routed to the internal Web server and not to the
management tool. You can change the default management port (TCP 443) to an
alternate unused TCP port in this case.
If you create a static mapping, the firewall is automatically opened to accept the traffic.
However, this firewall rule is not visible on the Firewall configuration page (it is
maintained internally by the controller).
Common applications are affected by NAT as follows:
Application NAT
FTP (passive mode)Requires a static mapping to function.
FTP (active mode)Requires a static mapping to function.
NetMeetingRequires a static mapping to function.
TelnetRequires a static mapping to function.
Windows networking No effect
The controller provides pre-configured static mappings for most common applications,
which you can enable as needed.
Most Web browsers use FTP in active mode. Some browsers provide a configuration option
that enables you to alter this. Use the following steps to change this behavior in Microsoft
Internet Explorer.
1. Select Tools > Internet options to open the Internet options dialog.
2. Select the Advanced tab.
3. Under Browsing, enable the Use Passive FTP for compatibility with some firewalls
and DSL modems checkbox.
3-31
Network configuration
Web
server
Web
browser
FTP
client
FTP
server
192.168.1.2
192.168.1.3
FTP traffic
Web (HTTP) traffic
192.168.1.1
NAT
202.125.11.26
Controller
AP
Internet
Network address translation (NAT)
NAT example
The following example shows you how to configure static NAT mappings to run a Web server
and an FTP server on the internal network. This scenario might occur if you use the
controller in an enterprise environment.
By creating static NAT mappings, FTP and HTTP (Web) traffic can be routed to the proper
user. Note that the addresses of these stations are still not visible externally. Remote
computers send their requests to 202.125.11.26, and the controller routes them to the proper
client.
Use the following steps to configure the controller to support this example,.
2. On the NAT mappingspage, select Add New Static NAT Mapping.
3. Under Requests for, select Standard Services, and then select http (TCP 80).
4. Under Translate to, specify the IP address of the Web server, for example 192.168.1.2.
The Settings box should now look similar to this:
5. Select Add to save your changes and return to the NAT mappings page. The new mapping
is added to the table.
3-32
Network configuration
RIP
6. To support the FTP server, create two additional mappings with the following values:
Set Standard Services to ftp-data (TCP 20) and set IP address to 192.168.1.3.
Set Standard Services to ftp-control (TCP 21) and set IP address to
192.168.1.3.
The NAT mappings table should now show all three mappings:
VPN One-to-one NAT
This feature can only be used with authenticated, access-controlled users. It is only
supported when a static IP address is assigned to the Internet port. It is configured by
selecting Network > Ports > Internet port > Static > Additional IP addresses. See VPN
one-to-one NAT on page 3-9.
RIP
The controller supports Routing Information Protocol (RIP) versions 1 and 2. RIP can
operate in one of two modes on the interfaces you select.
Passive mode: The controller listens for routing broadcasts to update the routing table,
but does not broadcast its own routes.
Active mode: The controller listens for routing broadcasts to update the routing table,
and also broadcast its own routes.
For example:
NoteRIP is not supported if you are using PPPoE on the Internet port.
3-33
Network configuration
IP QoS
IP QoS
To ensure that critical applications have access to the required amount of wireless
bandwidth, you can classify packets destined for the wireless interface into priority queues
based on a number of criteria. For example, you can use any of the following to place data
packets in one of four priority queues for transmission onto the wireless interface:
TCP source port
UDP source port
Destination port
Port ranges
You configure IP quality of service (QoS) by creating IP QoS profiles that you can then
associate with VSCs or use for global wireless settings. You can configure as many as 32 IP
QoS profiles on the controller. You can associate as many as 10 IP QoS profiles with each
VSC.
Configuration
To view and configure IP QoS profiles, select Controller >> Network > IP QoS. Initially, no
profiles are defined.
To create an IP QoS profile select Add New Profile.
3-34
Network configuration
IP QoS
Settings
Profile name: Specify a unique name to identify the profile.
Protocol: Specify an IP protocol to use to classify traffic by specifying its Internet
Assigned Numbers Authority (IANA) protocol number. Protocol numbers are pre-defined
for a number of common protocols. If the protocol you require does not appear in the list,
select Other and specify the appropriate number manually. You can find IANA-assigned
protocol numbers on the Internet.
Start port/ End port: Optionally specify the first and last port numbers in the range of
ports to which this IP QoS profile applies. To specify a single port, specify the same port
number for both Start port and End port. Port numbers are pre-defined for a number of
common protocols. If the protocol you require does not appear in the list, select Other
and specify the appropriate number manually.
NoteTo accept traffic on all ports for a specified protocol, set Start port to Other and 0. Also
set End port to 65535.
Priority: Select the priority level that will be assigned to traffic that meets the criteria
specified in this IP QoS profile.
NoteIt is strongly recommended that you reserve Ve r y high priority for voice applications.
Example
This example shows how to create two IP QoS profiles and associated them with a VSC. The
two profiles are:
Voice : Provides voice traffic with high priority.
Web: Provides HTTP traffic with low priority.
Create the profiles
1. Select Network > IP QoS, and then Add New Profile. The IP QoS Profile page opens.
2. Under Profile name, specify Voi c e.
3. Under Protocol, from the drop-down list select TCP.
4. Under Start port, from the drop-down list select SIP. Start port and End port are
automatically populated with the correct value: 5060.
3-35
Network configuration
IP QoS
5. Under Priority, from the drop-down list select Very Hig h .
6. Select Save.
NoteYou could also create another profile using the same parameters but for UDP to cope
with any kind of SIP traffic.
7. On the IP QoS Profile page select Add New Profile.
8. Under Profile name, specify Web.
9. Under Protocol, from the drop-down list select TCP.
10. Under Start port, from the drop-down list select http. Start port and End port are automatically populated with the common HTTP port, 80.
11. Under Priority, from the drop-down list select Low.
12. Select Save.
3-36
Network configuration
IGMP proxy
Assign the profiles to a VSC
1. In the Network Tree select VSCs (if not visible, first select the + symbol to the left of
Controller), and then select one of the VSC profiles in the Name column. Scroll down to the Quality of service section of the Virtual AP box.
2. Set Priority mechanism to IP QoS.
3. In IP QoS profiles, Ctrl-click each profile.
4. Select Save.
IGMP proxy
This feature provides support for multicast routing using IGMP (Internet Group Management
Protocol), which is typically required by the controller. When enabled, the controller:
Routes all multicast traffic received on the Upstream interface to the Downstream
interface.
Listens for IGMP host membership reports from authenticated users on the Downstream
interface and forwards them to the Upstream interface. IGMP host membership reports
from unauthenticated users are ignored.
Note An access list definition must be created to accept the multicast traffic (video streams,
etc.)
Due to the nature of multicast traffic, once a user registers for a stream it automatically
becomes visible to unauthenticated users as well. However, unauthenticated users are
not able to register with the IGMP group.
To view and configure IGMP proxy settings, select Controller >> Network > IGMP proxy.
As a starting point for planning your network, you can assume that when operating at high
power, an AP radio provides a wireless networking area (also called a wireless cell) of up to
300 feet (100 meters) in diameter. Before creating a permanent installation however, you
should always perform a site survey (see Wireless neighborhood on page 4-34) to determine
the optimal settings and location for the AP.
The following sections provide information on wireless coverage. A tool that can help
simplify planning a secure wireless network is the HP ProCurve RF Planner. For more
information, see the RF Planner Admin Guide.
NoteSupported wireless modes, operating channels, and power output vary according to the AP
model, and are governed by the regulations of the country in which the AP is operating
(called the regulatory domain). For a list of all operating modes, see Radio configuration on
page 4-8. To set the regulatory domain, see Assigning country settings to a group on
page 6-30.
Factors limiting wireless coverage
Wireless coverage is affected by the factors discussed in this section.
Radio power
More radio power means better signal quality and the ability to create bigger wireless cells.
However, cell size should generally not exceed the range of transmission supported by
wireless users. If it does, users will be able to receive signals from the AP but will not be able
to reply, rendering the connection useless.
Further, when more than one AP operates in an area, you must adjust wireless cell size to
reduce interference between APs. An automatic power control feature is available to address
this challenge. See Transmit power control on page 4-32.
Antenna configuration
Antennas play a large role in determining the shape of the wireless cell and transmission
distance. See the specifications for the antennas you use to determine how they affect
wireless coverage.
Interference
Interference is caused by other APs or devices that operate in the same frequency band as the
AP and can substantially affect throughput. Advanced wireless configuration features are
available to automatically eliminate this problem. See Radio configuration on page 4-8.
4-2
In addition, the several tools are available to diagnose interference problems as they occur.
Select Controlled APs >> Wireless > Neighborhood to view a list of wireless APs
operating in the immediate area so that you can effectively set the operating frequencies.
See Wireless neighborhood on page 4-34.
Wireless configuration
Wireless coverage
Select Controlled APs >> Overview > Wireless rates to view information about data
rates for all connected client stations. This makes it easy to determine if low-speed
clients are affecting network performance. To prevent low-speed clients from connecting,
you can use the Allowed wireless rates option when defining a VSC. See Virtual AP on
page 5-10.
Select Controlled APs >> Overview > Wireless clients to view information about
each connected wireless client.
Select Controlled APs > [group] > [AP] >> Status > Wireless to view detailed
wireless information for an AP, including: packets sent and received, transmission errors,
and other low-level events.
CautionAPs that operate in the 2.4 GHz band may experience interference from 2.4 GHz cordless
phones and microwave ovens.
Physical characteristics of the location
To maximize coverage of a wireless cell, wireless APs are best installed in an open area with
as few obstructions as possible. Try to choose a location that is central to the area being
served.
Radio waves cannot penetrate metal; they are reflected instead. A wireless AP can transmit
through wood or plaster walls and closed windows; however, the steel reinforcing found in
concrete walls and floors may block transmissions or reduce signal quality by creating
reflections. This can make it difficult or impossible for a single AP to serve users on different
floors in a concrete building. Such installations require a separate wireless AP on each floor.
Configuring overlapping wireless cells
Overlapping wireless cells occur when two or more APs are operating within transmission
range of each other. This may be under your control, (for example, when you use several cells
to cover a large location), or out of your control (for example, when your neighbors set up
their own wireless networks). When APs are operating in the 2.4 GHz band, overlapping
wireless cells can cause performance degradation due to insufficient channel separation.
Performance degradation and channel separation
When two wireless cells operating on the same frequency overlap, throughput can be reduced
in both cells. Reduced throughput occurs because a wireless user that is attempting to
transmit data defers (delays) transmission if another station is transmitting. In a network
with many users and much traffic, these delayed transmissions can severely affect
performance, because wireless users may defer several times before the channel becomes
available. If a wireless user is forced to delay transmission too many times, data can be lost.
Delays and lost transmissions can severely reduce throughput on a network. To view this
information about your network, select Controller > Controlled APs {group} > {AP} >> Status > Wireless. For recommendations on using this information to diagnose wireless
problems, see the online help for this page.
4-3
Wireless configuration
Wireless coverage
The following example shows two overlapping wireless cells operating on the same channel
(frequency). Since both APs are within range of each other, the number of deferred
transmissions can be large.
The solution to this problem is to configure the two AP to operate on different channels.
Unfortunately, in the 2.4 GHz band, adjacent channels overlap. So even though APs are
operating on different channels, interference can still our. This is not an issue in the 5 GHz
band, as all channels are non-overlapping.
Selecting channels in the 2.4 GHz band
In the 2.4 GHz band, the center frequency of each channel is spaced 5 MHz apart (except for
channel 14). Each 802.11 channel uses 20 MHz of bandwidth (10 MHz above and 10 MHz
below the center frequency), which means that adjacent channels overlap and interfere with
each other as follows:
Center
Channel
1
2
3
4
5
6
7
To avoid interference, APs in the same area must use channels that are separated by at least
25 MHz (5 channels). For example, if an AP is operating on channel 3, and a second AP is
operating on channel 7, interference occurs on channel 5. For optimal performance, the
second AP should be moved to channel 8 (or higher).
With the proliferation of wireless networks, it is possible that the wireless cells of APs
outside your control overlap your intended area of coverage. To choose the best operating
frequency, select Controlled APs >> Overview > Neighborhood to view a list of all APs
that are operating nearby and their operating frequencies.
Wireless configuration
Wireless coverage
The number of channels available for use in a particular country are determined by the
regulations defined by the local governing body and are automatically configured by the AP
based on the Country setting you define. (See Assigning country settings to a group on
page 6-30.) This means that the number of non-overlapping channels available to you varies
by geographical location.
The following table shows the number of channels that are available in North America, Japan,
and Europe.
RegionAvailable channels
North America 1 to 11
Japan1 to 14
Europe1 to 13
Since the minimum recommended separation between overlapping channels is 25 MHz (five
channels) the recommended maximum number of overlapping cells you can have in most
regions is three. The following table gives examples relevant to North America, Japan, and
Europe (applies to 22 MHz channels in the 2.4 GHz band).
North AmericaJapanEurope
cell 1 on channel 1
cell 2 on channel 6
cell 3 on channel 11
In North America you can create an installation as shown in the following figure.
Reducing transmission delays by using different operating frequencies in North America.
cell 1 on channel 1
cell 2 on channel 7
cell 3 on channel 14
cell 1 on channel 1
cell 2 on channel 7
cell 3 on channel 13
Alternatively, you can stagger cells to reduce overlap and increase channel separation, as
shown in the following figure.
4-5
Wireless configuration
Wireless coverage
Using only three frequencies across multiple cells in North America.
This strategy can be expanded to cover an even larger area using three channels, as shown in
the following figure.
4-6
Using three frequencies to cover a large area in North America. Gray areas indicate
overlap between two cells that use the same frequency.
Distance between APs
Not supported on: E-MSM430, E-MSM460, E-MSM466
In environments where the number of wireless frequencies is limited, it can be beneficial to
adjust the receiver sensitivity of the AP. To make the adjustment, select Controlled APS >> Configuration > Radio list > [radio] and set the Distance between access points
option.
For most installations, Distance between access points should be set to Large. However,
if you are installing several wireless APs and the channels available to you do not provide
enough separation, reducing receiver sensitivity can help you to reduce the amount of
crosstalk between wireless APs.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.