Sourced in Canada, the United States of America, and India
LEGAL NOTICE
While the information in this document is believed to be accurate and reliable, except as otherwise expressly
agreed to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS "WITHOUT WARRANTY OR CONDITION OF
ANY KIND, EITHER EXPRESS OR IMPLIED. The information and/or products described in this document are
subject to change without notice.
Nortel, the Nortel logo, and the Globemark are trademarks of Nortel Networks.
All other trademarks are the property of their respective owners.
.
.
Contents
Software license11
New in this release15
Features 15
Other changes16
Introduction17
Before you begin 18
Text conventions18
Related information20
How to get help21
Overview23
The Nortel SNAS24
Nortel SNAS configuration and management tools36
Nortel SNAS configuration roadmap37
3
Publications 20
Online 21
Elements of the Nortel SNAS25
Supported users25
Supporting additional users with the software license file26
Role of the Nortel SNAS27
Nortel SNAS clusters 35
Interface configuration35
Initial setup41
Before you begin 41
About the IP addresses42
Initial setup43
Setting up a single Nortel SNAS device or the first in a cluster43
Adding a Nortel SNAS device to a cluster50
Next steps54
Applying and saving the configuration 55
Controlling communication with the network access devices74
Configuring SSCPLite74
Configuring SNMP Profiles 75
Configuring SNMP Versions 76
Configuring SSCPLite Community 77
Configuring SNMP Templates 77
Configuring the domain79
Configuring the domain 79
Roadmap of domain commands81
Creating a domain 83
Deleting a domain 89
Configuring domain parameters 89
Configuring the Nortel Health Agent check92
Configuring the SSL server97
Configuring HTTP redirect 107
Browser-Based Management Configuration 108
Browser-Based Management Configuration with SSL 108
Configuring advanced settings 109
Configuring RADIUS accounting 110
Configuring local DHCP services115
Creation of the location123
Configuring Lumension PatchLink integration124
Configuration of the RADIUS server127
Overview of RADIUS server127
802.1x functionality127
Roadmap of RADIUS server configuration commands128
Configuration of the RADIUS server 129
Configuration of the client130
Configuration of the realms131
Configuration of the dictionary133
Configuration of the RADIUS accounting 134
Configuration of the RADIUS authentication methods134
Configuration of the EAP authentication methods136
Select the server certificate137
Select the CA certificate138
Reinstalling the software from an external file server373
Reinstalling the software from a CD375
The Command Line Interface377
Connecting to the Nortel SNAS378
Establishing a console connection378
Establishing a Telnet connection379
Establishing a connection using SSH 380
Accessing the Nortel SNAS cluster 381
CLI Main Menu or Setup 383
Command line history and editing 383
Idle timeout383
Configuration example385
Scenario 385
Steps 387
Configure the network DNS server 388
Configure the network DHCP server 388
Configure the network core router 392
Configure the Ethernet Routing Switch 8300393
Configure the Ethernet Routing Switch 5510395
Configure the Nortel SNAS397
Troubleshooting403
Troubleshooting tips403
Cannot connect to the Nortel SNAS using Telnet or SSH 403
Cannot add the Nortel SNAS to a cluster405
Cannot contact the MIP406
The Nortel SNAS stops responding 407
A user password is lost 408
A user fails to connect to the Nortel SNAS domain 409
Trace tools409
System diagnostics410
Variables 420
CLI Main Menu 421
CLI command reference 422
Information menu422
Statistics menu423
Configuration menu424
Boot menu448
Maintenance menu449
Syslog messages by message type 451
Operating system (OS) messages452
System Control Process messages453
Traffic Processing Subsystem messages457
Start-up messages461
AAA subsystem messages 461
NSNAS subsystem messages 463
Syslog messages in alphabetical order 465
Supported MIBs477
Supported traps481
485
Install All Administrative Tools (Windows 2000 Server) 485
Register the Schema Management dll (Windows Server 2003)485
Add the Active Directory Schema Snap-in (Windows 2000 Server and Windows
Server 2003)486
Permit write operations to the schema (Windows 2000 Server)488
Create a new attribute(Windows 2000 Server and Windows Server 2003) 489
Create the new class489
Configuring IP Phone auto-configuration494
Creating the DHCP options494
Configuring the Call Server Information and VLAN Information options497
Setting up the IP Phone 500
Configuring the logon script501
Creating a logon script502
Creating the script as a batch file 502
Creating the script as a VBScript file 503
This section contains the Nortel Networks software license.
Nortel Networks software license agreement
This Software License Agreement ("License Agreement") is between
you, the end-user ("Customer") and Nortel Networks Corporation and
its subsidiaries and affiliates ("Nortel Networks"). PLEASE READ THE
FOLLOWING CAREFULLY. YOU MUST ACCEPT THESE LICENSE
TERMS IN ORDER TO DOWNLOAD AND/OR USE THE SOFTWARE.
USE OF THE SOFTWARE CONSTITUTES YOUR ACCEPTANCE OF
THIS LICENSE AGREEMENT. If you do not accept these terms and
conditions, return the Software, unused and in the original shipping
container, within 30 days of purchase to obtain a credit for the full
purchase price.
"Software" is owned or licensed by Nortel Networks, its parent or one of
its subsidiaries or affiliates, and is copyrighted and licensed, not sold.
Software consists of machine-readable instructions, its components, data,
audio-visual content (such as images, text, recordings or pictures) and
related licensed materials including all whole or partial copies. Nortel
Networks grants you a license to use the Software only in the country
where you acquired the Software. You obtain no rights other than those
granted to you under this License Agreement. You are responsible for the
selection of the Software and for the installation of, use of, and results
obtained from the Software.
11
1. Licensed Use of Software. Nortel Networks grants Customer a
nonexclusive license to use a copy of the Software on only one
machine at any one time or to the extent of the activation or authorized
usage level, whichever is applicable. To the extent Software is
furnished for use with designated hardware or Customer furnished
equipment ("CFE"), Customer is granted a nonexclusive license to
use Software only on such hardware or CFE, as applicable. Software
contains trade secrets and Customer agrees to treat Software as
confidential information using the same care and discretion Customer
uses with its own similar information that it does not wish to disclose,
publish or disseminate. Customer will ensure that anyone who
2. Warranty. Except as may be otherwise expressly agreed to in
uses the Software does so only in compliance with the terms of this
Agreement. Customer shall not a) use, copy, modify, transfer or
distribute the Software except as expressly authorized; b) reverse
assemble, reverse compile, reverse engineer or otherwise translate the
Software; c) create derivative works or modifications unless expressly
authorized; or d) sublicense, rent or lease the Software. Licensors
of intellectual property to Nortel Networks are beneficiaries of this
provision. Upon termination or breach of the license by Customer or in
the event designated hardware or CFE is no longer in use, Customer
will promptly return the Software to Nortel Networks or certify its
destruction. Nortel Networks may audit by remote polling or other
reasonable means to determine Customer’s Software activation or
usage levels. If suppliers of third party software included in Software
require Nortel Networks to include additional or different terms,
Customer agrees to abide by such terms provided by Nortel Networks
with respect to such third party software.
writing between Nortel Networks and Customer, Software is provided
"AS IS" without any warranties (conditions) of any kind. NORTEL
NETWORKS DISCLAIMS ALL WARRANTIES (CONDITIONS)
FOR THE SOFTWARE, EITHER EXPRESS OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
AND ANY WARRANTY OF NON-INFRINGEMENT. Nortel Networks is
not obligated to provide support of any kind for the Software. Some
jurisdictions do not allow exclusion of implied warranties, and, in such
event, the above exclusions may not apply.
3.
Limitation of Remedies. IN NO EVENT SHALL NORTEL
NETWORKS OR ITS AGENTS OR SUPPLIERS BE LIABLE FOR ANY
OF THE FOLLOWING: a) DAMAGES BASED ON ANY THIRD PARTY
CLAIM; b) LOSS OF, OR DAMAGE TO, CUSTOMER’S RECORDS,
FILES OR DATA; OR c) DIRECT, INDIRECT, SPECIAL, INCIDENTAL,
PUNITIVE, OR CONSEQUENTIAL DAMAGES (INCLUDING LOST
PROFITS OR SAVINGS), WHETHER IN CONTRACT, TORT OR
OTHERWISE (INCLUDING NEGLIGENCE) ARISING OUT OF
YOUR USE OF THE SOFTWARE, EVEN IF NORTEL NETWORKS,
ITS AGENTS OR SUPPLIERS HAVE BEEN ADVISED OF THEIR
POSSIBILITY. The foregoing limitations of remedies also apply to any
developer and/or supplier of the Software. Such developer and/or
supplier is an intended beneficiary of this Section. Some jurisdictions
do not allow these limitations or exclusions and, in such event, they
may not apply.
•“Configuration of Microsoft NAP Interoperability” (page 139)
•
“Configuration of auto blacklisting” (page 293)
•
“Configuration of harden password” (page 295)
•
“Kicking by username or address” (page 349)
•“Nortel SNAS TPS Interface” (page 349)
•“Self service portal” (page 233)
•“Configuring the Nortel SNAS scheduler” (page 359)
On-the-fly SRS Policy Change—When a security policy is modified
on the SNAS using the administrative tool the policy is updated on the
Nortel Health Agent running on the logged in operating systems. For more
information, See the “Configuring the Nortel Health Agent check” (page
Multi-OS Applet Support—The Nortel Health captive portal applet
supports Windows and non-Windows operating systems. For
non-Windows operating systems the applet supports collecting operating
systems information and VLAN transition. for more information, see the
Nortel* Secure Network Access (Nortel SNAS ) is a clientless solution that
provides seamless, secure access to the corporate network from inside
or outside that network. The Nortel SNAS combines multiple hardware
devices and software components to support the following features:
•
partitions the network resources into access zones (authentication,
remediation, and full access)
•
provides continual device integrity checking using Nortel Health Agent
•
supports both dynamic and static IP clients
The Nortel Secure Network Access Switch 4050or 4070 (Nortel SNAS
4050 or 4070) controls operation of the Nortel SNAS.
This user guide covers the process of implementing the Nortel SNAS using
the Nortel SNAS 4050 or 4070 for Nortel Secure Network Access Switch
Software Release 2.0. The document includes the following information:
17
•
overview of the role of the Nortel SNAS 4050 or 4070 in the Nortel
SNAS
•
initial setup
•
configuring authentication, authorization, and accounting (AAA)
features
•
managing system users
•customizing the portal
•upgrading the software
•logging and monitoring
•troubleshooting installation and operation
The document provides instructions for initializing and customizing the
features using the Command Line Interface (CLI). To learn the basic
structure and operation of the Nortel SNAS CLI, refer to “CLI reference”
(page 413). This reference guide provides links to where the function
and syntax of each CLI command are described in the document. For
information on accessing the CLI, see “The Command Line Interface”
(page 377).
BBI is a graphical user interface (GUI) that runs in an online, interactive
mode. BBI allows the management of multiple devices (for example, the
Nortel SNAS) from one application. For information about using BBI to
configure and manage Nortel SNAS, see
Switch Configuration — Using the BBI, (NN47230-500).
Before you begin
This guide is intended for network administrators who have the following
background:
•
basic knowledge of networks, Ethernet bridging, and IP routing
•familiarity with networking concepts and terminology
•
experience with windowing systems or GUIs
•
basic knowledge of network topologies
Nortel Secure Network Access
Before using this guide, you must complete the following procedures. For
a new switch:
StepAction
1Install the switch.
2Connect the switch to the network.
Ensure that you are running the latest version of Nortel SNAS software.
For information about upgrading the Nortel SNAS, see “Upgrading or
reinstalling the software” (page 367).
Text conventions
This guide uses the following text conventions:
For installation instructions, see Nortel Secure Network AccessSwitch 4050 Installation Guide , (NN47230-300).
For more information, see “The Command Line Interface” (page
Enter text based on the description inside the
brackets. Do not type the brackets when entering
the command.
Example: If the command syntax is
ping <ip_address>, you enter
ping 192.32.10.12
bold textObjects such as window names, dialog box names,
and icons, as well as user interface objects such
as buttons, tabs, and menu items.
bold Courier text
Command names, options, and text that you must
enter.
Example: Use the dinfo command.
Example: Enter show ip {alerts|routes}.
braces ({})
Required elements in syntax descriptions where
there is more than one option. You must choose
only one of the options. Do not type the braces
when entering the command.
Example: If the command syntax is
show ip {alerts|routes}, you must enter
either show ip alerts or show ip routes, but
not both.
Optional elements in syntax descriptions. Do not
type the brackets when entering the command.
Example: If the command syntax is
show ip interfaces [-alerts], you can enter
either show ip interfaces or
show ip interfaces -alerts.
Repeat the last element of the command as
needed.
Example: If the command syntax is
ethernet/2/1 [ <parameter> <value> ]...,
you enter ethernet/2/1 and as many
parameter-value pairs as needed.
Nortel Secure Network Access Switch
Using the Command Line Interface
NN47230-100 03.01 Standard
28 July 2008
.
20 Introduction
italic text
plain Courier text
separator ( > )
vertical line ( | )Options for command keywords and arguments.
Variables in command syntax descriptions. Also
indicates new terms and book titles. Where a
variable is two or more words, the words are
connected by an underscore.
Example: If the command syntax is
show at <valid_route>,
valid_route is one variable and you substitute
one value for it.
Command syntax and system output, for example,
prompts and system messages.
Example: Set Trap Monitor Filters
Menu paths.
Example: Protocols > IP identifies the IP
command on the Protocols menu.
Enter only one of the options. Do not type the
vertical line when entering the command.
Example: If the command syntax is
show ip {alerts|routes}, you enter either
show ip alerts or show ip routes, but not
both.
Related information
This section lists information sources that relate to this document.
Publications
Refer to the following publications for information on the Nortel SNAS:
•Nortel Secure Network Access Switch Configuration — Using the BBI,
(NN47230-500).
To access Nortel technical documentation online, go to the Nortel web site:
ttp://www.nortel.com/support
h
You can download current versions of technical documentation. To locate
documents, browse by category or search using the product name or
number.
You can print the technical manuals and release notes free, directly from
the Internet. Use Adobe* Reader* to open the manuals and release
notes, search for the sections you need, and print them on most standard
printers. Go to the Adobe Systems site at h
download a free copy of Adobe Reader.
ttp://www.adobe.com to
How to get help
If you purchased a service contract for your Nortel product from a
distributor or authorized reseller, contact the technical support staff for that
distributor or reseller for assistance.
If you purchased a Nortel service program, use the h
elp web page to locate information to contact Nortel for assistance:
•
•To call a Nortel Technical Solutions Center for assistance, click the
An Express Routing Code (ERC) is available for many Nortel products and
services. When you use an ERC, your call is routed to a technical support
person who specializes in supporting that product or service. To locate the
ERC for your product or service, go to the h
page and follow these links:
ttp://www.nortel.com/h
To obtain Nortel Technical Support contact information, click the
CONTACT US link on the left side of the page.
CALL US link on the left side of the page to find the telephone number
The Nortel Secure Network Access Solution Release 2.0 features are
mapped to the relevant section(s) in this guide in the following table. For
information on the Nortel SNAS Release 1.6.1 see
Nortel Secure Network Access Solution Release 1.6.1, NN47230-400,
(formerly 320850).
Table 1
Features on NSNA
23
Release Notes for
Feature
Performance and scalability
enhancements: 20,000 concurrent
users
Support for hubs“Configuring local DHCP services” (page 115), “Hub
Support for Nortel Ethernet Switch models
- 325 / 425 / 450 / 470 and 2500 series
and Ethernet Routing Switch models 4500 series, 5500 series, 8300 and 8600.
Support for WLAN Controller“Configuring local DHCP services” (page 115), “Hub
Support of RADIUS server“Configuration of the RADIUS server” (page 127)
Support of Microsoft NAP Interoperability“Configuration of Microsoft NAP Interoperability” (page
Nortel Health Agent Run-Once,
Continuous and Never modes
Support for MAC OSX, Linux OS, and
non-interactive devices
MAC address policy services“Configuring groups” (page 156), “Managing the local
Switches that support the Switch to Nortel SNAS Communication Protocol
(SSCP) are referred to as NSNA network access devices in this document.
Generally, NSNA network access devices are the Ethernet Routing Switch
5500 Series and the Ethernet Routing Switch 8300. Specifically, Release 1.6.1
features are supported by the Ethernet Routing Switch 5500 Series, Release
5.0.2 and later.
ATTENTION
The character combination "<" appears instead of the character "<" in several
command strings in this document. For example, <DN> rather than <DN>.
Resolution is under investigation.
This chapter includes the following topics:
Topic
“The Nortel SNAS ” (page 24)
“Elements of the Nortel SNAS ” (page 25)
“Supported users” (page 25)
“Role of the Nortel SNAS ” (page 27)
Nortel Secure Network Access Solution (Nortel SNAS ) is a protective
framework to completely secure the network from endpoint vulnerability.
The Nortel SNAS addresses endpoint security and enforces policy
compliance. Nortel SNAS delivers endpoint security by enabling only
trusted, role-based access privileges premised on the security level of the
device, user identity, and session context. Nortel SNAS enforces policy
compliance, such as for Sarbanes-Oxley and COBIT, ensuring that the
required anti-virus applications or software patches are installed before
users are granted network access.
For Nortel, success is delivering technologies providing secure access
to your information using security-compliant systems. Your success
is measured by increased employee productivity and lower network
operations costs. Nortel’s solutions provide your organization with the
network intelligence required for success.
Supporting additional users with the software license file
— Nortel IP Phone 2002
—
Nortel IP Phone 2004
—
Nortel IP Phone 2007
See Release Notes for the Nortel Secure Network Access Solution,Software Release 1.6.1 (NN47230-400), for the minimum firmware
versions required for the IP Phones operating with different call
servers.
Each Nortel SNAS -enabled port on a network access devices can support
one PC (untagged traffic) and one IP Phone (tagged traffic). Softphone
traffic is considered to be the same as PC traffic (untagged).
ATTENTION
Where there is both an IP Phone and a PC, the PC must be connected through
the 3-port switch on the IP Phone.
The standard Nortel SNAS 4050 implementation can support up to 200
authenticated user sessions. To support additional users on your Nortel
SNAS 4050 switch, you must obtain a Nortel SNA software license
file. The software license file contains a software license key that you
must enter into the Nortel SNAS 4050 switch to activate support for the
additional users. The file can support an additional 100, 250, 500, or 1000
users.
ATTENTION
An authenticated IP Phone is considered to be a licensed user.
Your unique software license key is based on your switch MAC address.
Before you obtain your software license file, first record the MAC address
for the Nortel Secure Network Access Switch to be upgraded. To find the
MAC address in the Command Line Interface, use the
command.
To obtain your software license file, contact Nortel to order the Nortel SNA
Software License Certificate. Follow the instructions on this certificate to
obtain your software license file.
After you obtain the software license file from Nortel, you must copy
the entire license key to the switch using the CLI or the BBI. When you
copy the license key, ensure you include the BEGIN LICENSE and ENDLICENSE lines.
To copy the license key using the CLI, use the following command:
Paste the license, press Enter to create a new line,
and then type "..." (without the quotation marks)
to terminate.
> -----BEGIN LICENSE----> U4GsdGVkX36AJpnd8KL4iImtRzBvZy+iANDzxog22+vq6Qx4aawSl4FVQo
> lXYlsNNFJpYW/vl3osvNPXhzcLV2E9hNHlqirkzc5aLDJ+2xYpK/BRDrMZ
> 86OQvdBMyer53xgq8Kk/5BvoFcQYvEC/yWrFyrmZr4XPtAr3qmuZ8UxLqJ
> 0x7PUrp6tVI=
> -----END LICENSE----> ...
License loaded
For more information, see “Configuring the Nortel SNAS host” (page 264).
To copy the license key using the BBI, use the Install New License screen
(System > Hosts > host > Install New License).
To view the license using BBI, in the cluster select Cluster > Hosts >
License from the menu. For more information, see Nortel Secure Network
Access Switch Configuration — Using the BBI, (NN47230-500).
Role of the Nortel SNAS
The Nortel SNAS helps protect the network by ensuring endpoint
compliance for devices that connect to the network.
Before allowing a device to have full network access, the Nortel SNAS
checks user credentials and host integrity against predefined corporate
policy criteria. Through tight integration with network access devices, the
Nortel SNAS can:
•dynamically move the user into a quarantine VLAN
•dynamically grant the user full or limited network access
•dynamically apply per port firewall rules that apply to a device’s
connection
Once a device has been granted network access, the Nortel SNAS
continually monitors the health status of the device to ensure continued
compliance. If a device falls out of compliance, the Nortel SNAS can
dynamically move the device into a quarantine or remediation VLAN.
Acts as a web server portal, which is accessed by users in clientless
mode for authentication and host integrity check and which sends
remediation instructions and guidelines to endpoint clients if they fail
the host integrity check.
•
Communicates with backend authentication servers to identify
authorized users and levels of access.
•Acts as a policy server, which communicates with the Nortel Health
Agent applet that verifies host integrity.
•Instructs the network access devices to move clients to the appropriate
enforcement zones.
•Can be a DNS proxy in the Red VLAN when the Nortel SNAS functions
as a captive portal
•
Supports the RADIUS server
•
Supports Microsoft NAP Interoperability.
•
Performs session management.
•
Monitors the health of clients and switches.
•
Performs logging and auditing functions.
•
Provides High Availability (HA) through IPmig protocol.
Nortel SNAS enforcement types
Nortel SNAS provides several enforcement types for restricting access
to the network.
•VLANs and filters uses a combination of VLANs and filters to provide
enforcement. It is available with NSNA network access devices; that is,
devices that support SSCP (Switch-SNAS Communication Protocol),
SSCP-Lite, and 802.1x switches.
•Filters only uses only filters to provide enforcement. It is available with
NSNA network access devices.
•NSNA network access devices including Nortel Ethernet Switch
models - 325, 425, 450, 470 and 2500 series and Ethernet Routing
Switch models - 4500 series, 5500 series, 8300 and 8600 as well as
third-party switches.
Four type of Layer 2 or Layer 3 VLANs are configured for VLANs andfilters enforcement:
•
Red—extremely restricted access. If the default filters are used, the
user can communicate only with the Nortel SNAS and the Windows
domain controller network. There is one Red VLAN for each network
access devices.
•
Yellow—restricted access for remediation purposes if the client PC fails
the host integrity check. Depending on the filters and Nortel Health
Agent rules configured for the network, the client may be directed to
a remediation server participating in the Yellow VLAN. There can be
up to five Yellow VLANs for each network access devices. Each user
group is associated with only one Yellow VLAN.
•Green—full access, in accordance with the user’s access privileges.
There can be up to five Green VLANs for each network access
devices.
•
VoIP—automatic access for VoIP traffic. The network access devices
places VoIP calls in a VoIP VLAN without submitting them to the Nortel
SNAS authentication and authorization process.
When a client attempts to connect to the network, the network access
devices places the client in its Red VLAN. The Nortel SNAS authenticates
the client. By default, the Nortel SNAS then downloads a Nortel Health
Agent applet to check the integrity of the client host. If the integrity check
fails, the Nortel SNAS instructs the network access devices to move the
client to a Yellow VLAN, with its associated filter. If the integrity check
succeeds, the Nortel SNAS instructs the network access devices to move
the client to a Green VLAN, with its associated filter. The network access
devices applies the filters when it changes the port membership.
The VoIP filters allow IP phone traffic into preconfigured VoIP VLANs, for
VoIP communication only.
The default filters can be modified to accommodate network requirements,
such as Quality of Service (QoS) or specific workstation boot processes
and network communications.
For information about configuring VLANs and filters on the network access
devices, see Release Notes for Nortel Ethernet Routing Switch 5500
Series, Software Release 5.0.1,orRelease Notes for the Ethernet Routing
Switch 8300, Software Release 2.2.8 ,.
To configure the Nortel SNAS for VLANs and filters enforcement, see
Filters only enforcement uses two VLANs: Red and VoIP. A client
computer is placed in the Red VLAN where it is held pending successful
authentication. If successful, Nortel Health Agent integrity checking can be
used to determine if remediation is required. Filters are applied to direct
the client to the appropriate network resources but the client remains in
the same VLAN regardless of its status. This contrasts with VLANs andfilters where the client is moved to another VLAN in addition to applying
filters. Filters only handles IP phones in the same manner as VLANsand filters.
With Filters only, there is less network configuration than with VLANs andfilters because there are only two VLANs (Red and VoIP) to configure.
However, the double layer of protection afforded with VLANs and filters
is not provided.
To configure the Nortel SNAS for Filters only enforcement, see
“Configuring groups” (page 156), enftype. Though configuring for Filters
only can result in higher DNS demands on the Nortel SNAS, using the
filter DHCP subnet type maintains these demands at the same level as
with VLANs and filters: for more information, see “Configuring local
DHCP services” (page 115).
DHCP hub subnet
DHCP hub subnet enforcement allows the Nortel SNAS to operate with
a broader range of Nortel ethernet switches as well as third party network
access devices. Unlike VLANs and filters and Filters only enforcement,
DHCP hub subnet enforcement does not require SSCP support on the
network access device.
The DHCP hub subnet configuration is an integral component of the
DHCP services provided by the Nortel SNAS. For more information, see
“Configuring local DHCP services” (page 115).
Groups and profiles
Users are organized in groups. In the user gorup we can specify Locaion
also. Group membership determines:
•user access rights
Within the group, extended profiles further refine access rights
depending on the outcome of the Nortel Health Agent checks.
•number of sessions allowed
•the Nortel Health Agent SRS rule to be applied
•what on the portal page after the user has been authenticated