Kerberos, Windows NT/2000 domain and built-in database.
♦VPN support allows secure wireless communications to and from
wireless clients.
♦Rights-based network access increases network security by
providing network administrators full control on users’ access to a
network, based on user identification, location, and time.
♦Web-based configuration is easy-to-use, convenient and provides
simple configuration management.
♦Network access and usage policies can be set for trusted users and
guests by user identification, location, and time.
♦Roaming across different subnets and persistent session roaming
eliminates the need for re-authentication by roaming users.
User Manual
SMC2504W
SMC2502W
ELITECONNECT
WLAN SECURITY SYSTEM
USER MANUAL
From SMC’s EliteConnect line of enterprise wireless LAN solutions
38 TeslaMarch 2002
Irvine, CA 92618Part No. 01-111343-006
Phone: (949) 679-8000
Copyrights and Trademarks
Copyright
Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and
reliable. However, no responsibility is assumed by SMC for its use, nor for any
infringements of patents or other rights of third parties which may result from its
use. No license is granted by implication or otherwise under any patent or patent
rights of SMC. SMC reserves the right to change specifications at any time without
notice.
This publication is protected by federal copyright law. No part of this publication
may be copied or distributed, stored in a retrieval system, or translated into any
human or computer language in any form or by any means electronic, mechanical,
manual, magnetic, or otherwise, or disclosed to third parties without the express
written permission of SMC Networks Incorporated, located at 38 Tesla, Irvine, CA
92618.
SMC is a registered trademark; and EliteConnect is a trademark of SMC Networks,
Inc. Other product and company names are trademarks or registered trademarks
of their respective holders.
Licensed users and authorized distributors of SMC Networks products may copy
this document for use with SMC Networks products provided that the copyright
notice above is included in all reproductions.
All other brand and product names are claimed or registered marks of their
respective companies.
Limited Warranty
Limited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products
to be free from defects in workmanship and materials, under normal use and
service, for the applicable warranty term. All SMC products carry a standard 90day limited warranty from the date of purchase from SMC or its Authorized
Reseller. SMC may, at its own discretion, repair or replace any product not
operating as warranted with a similar or functionally equivalent product, during
the applicable warranty term. SMC will endeavor to repair or replace any product
returned under warranty within 30 days of receipt of the product.
SMC EliteConnect WLAN Security System User Manualv
The standard limited warranty can be upgraded to a Limited Lifetime* warranty
by registering new products within 30 days of purchase from SMC or its
Authorized Reseller. Registration can be accomplished online via the SMC web
site. Failure to register will not affect the standard limited warranty. The Limited
Lifetime warranty covers a product during the Life of that Product, which is
defined as the period of time during which the product is an “Active” SMC
product. A product is considered to be “Active” while it is listed on the current
SMC price list. As new technologies emerge, older technologies become obsolete
and SMC will, at its discretion, replace an older product in its product line with
one that incorporates these newer technologies. At that point, the obsolete product
is discontinued and is no longer an “Active” SMC product. A list of discontinued
products with their respective dates of discontinuance can be found at:
All products that are replaced become the property of SMC. Replacement products
may be either new or reconditioned. Any replaced or repaired product carries
either a 30-day limited warranty or the remainder of the initial warranty,
whichever is longer. SMC is not responsible for any custom software or firmware,
configuration information, or memory data of Customer contained in, stored on,
or integrated with any products returned to SMC pursuant to any warranty.
Products returned to SMC should have any customer-installed accessory or addon components, such as expansion modules, removed prior to returning the
product for replacement. SMC is not responsible for these items if they are
returned with the product.
Customers must contact SMC for a Return Material Authorization number prior to
returning any product to SMC. Proof of purchase may be required. Any product
returned to SMC without a valid Return Material Authorization (RMA) number
clearly marked on the outside of the package will be returned to customer at
customer's expense. For warranty claims within North America, please call our
toll-free customer support number at (800) 762-4968. Customers are responsible for
all shipping charges from their facility to SMC. SMC is responsible for return
shipping charges from SMC to customer.
WARRANTIES EXCLUSIVE: IF AN SMC PRODUCT DOES NOT OPERATE AS
WARRANTED ABOVE, CUSTOMER’S SOLE REMEDY SHALL BE REPAIR OR
REPLACEMENT OF THE PRODUCT IN QUESTION, AT SMC’S OPTION. THE
FOREGOING WARRANTIES AND REMEDIES ARE EXCLUSIVE AND ARE IN
LIEU OF ALL OTHER WARRANTIES OR CONDITIONS, EXPRESS OR IMPLIED,
EITHERIN FACT OR BY OPERATION OF LAW, STATUTORY OR OTHERWISE,
INCLUDING WARRANTIES OR CONDITIONS OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. SMC NEITHER ASSUMES NOR
AUTHORIZES ANY OTHER PERSON TO ASSUME FOR IT ANY OTHER
LIABILITY IN CONNECTION WITH THE SALE, INSTALLATION,
MAINTENANCE OR USE OF ITS PRODUCTS. SMC SHALL NOT BE LIABLE
UNDER THIS WARRANTY IF ITS TESTING AND EXAMINATION DISCLOSE
THE ALLEGED DEFECT IN THE PRODUCT DOES NOT EXIST OR WAS
vi
CAUSED BY CUSTOMER'S OR ANY THIRD PERSON'S MISUSE, NEGLECT,
IMPROPER INSTALLATION OR TESTING, UNAUTHORIZED ATTEMPTS TO
REPAIR, OR ANY OTHER CAUSE BEYOND THE RANGE OF THE INTENDED
USE, OR BY ACCIDENT, FIRE, LIGHTNING, OR OTHER HAZARD. LIMITATION
OF LIABILITY: IN NO EVENT, WHETHER BASED IN CONTRACT OR TORT
(INCLUDING NEGLIGENCE), SHALL SMC BE LIABLE FOR INCIDENTAL,
CONSEQUENTIAL, INDIRECT, SPECIAL, OR PUNITIVE DAMAGES OF ANY
KIND, OR FOR LOSS OF REVENUE, LOSS OF BUSINESS, OR OTHER
FINANCIAL LOSS ARISING OUT OF OR IN CONNECTION WITH THE SALE,
INSTALLATION, MAINTENANCE, USE, PERFORMANCE, FAILURE, OR
INTERRUPTION OF ITS PRODUCTS, EVEN IF SMC OR ITS AUTHORIZED
RESELLER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES
OR THE LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES FOR
CONSUMER PRODUCTS, SO THE ABOVE LIMITATIONS AND EXCLUSIONS
MAY NOT APPLY TO YOU. THIS WARRANTY GIVES YOU SPECIFIC LEGAL
RIGHTS, WHICH MAY VARY FROM STATE TO STATE. NOTHING IN THIS
WARRANTY SHALL BE TAKEN TO AFFECT YOUR STATUTORY RIGHTS.
* SMC will provide warranty service for one year following discontinuance from
the active SMC price list. Under the limited lifetime warranty, internal and external
power supplies, fans, and cables are covered by a standard one-year warranty from
date of purchase.
SMC Networks, Inc.
38 Tesla
Irvine, CA 92618
SMC EliteConnect WLAN Security System User Manualvii
Compliances
FCC - Class A
This equipment has been tested and found to comply with the limits for a Class A
digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a residential
installation.
This equipment generates, uses and can radiate radio frequency energy and, if not
installed and used in accordance with instructions, may cause harmful interference
to radio communications. However, there is no guarantee that the interference will
not occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning
the equipment off and on, the user is encouraged to try to correct the interference
by one or more of the following measures:
Reorient the receiving antenna
Increase the separation between the equipment and receiver
Connect the equipment into an outlet on a circuit different from that to which
the receiver is connected
Consult the dealer or an experienced radio/TV technician for help
Industry Canada - Class A
This digital apparatus does not exceed the Class A limits for radio noise emissions
from digital apparatus as set out in the interference-causing equipment standard
entitled “Digital Apparatus,” ICES-003 of the Department of Communications.
Cet appareil numérique respecte les limites de bruits radioélectriques applicables
aux appareils numériques de Classe B prescrites dans la norme sur le matériel
brouilleur: “Appareils Numériques,” NMB-003 édictée par le ministère des
Communications.
viii
Preface -vii
Introduction 1-1
Overview 1-2
The EliteConnect WLAN Security System 1-3
WLAN Access Manager 1-4
Control Server 1-4
Rights Manager 1-5
Administrative Login 2-2
Changing Your Network Configuration 2-4
Advanced Network Settings 2-6
Setting the Shared Secret 2-10
Authorizing the Shared Secret on the WLAN Secure Server 2-10
Setting the Secure Server IP Address and Shared Secret 2-11
Configuring SNMP 2-11
Specifying Location Description 2-13
Specifying Session Logging 2-14
Configuring the Time and Date 2-15
Viewing Online Documentation and Help 2-16
Restoring a Backed-Up Image 4-5
Updating the System Software 4-7
Rebooting or Shutting Down the System 4-9
Viewing System Status 5-1
Viewing Status Information 5-2
Viewing WLAN Access Managers 5-3
Viewing the Active Client List 5-4
Viewing Active Session Information 5-6
Viewing Log Files 5-7
Informational Logs 5-7
Session logs 5-8
Viewing Version and License Information 5-9
Configuring the Rights Manager 6-1
Rights Manager Terminology 6-2
About the Rights Manager 6-3
Two Simple Rights Examples 6-4
Example 1: Visiting Professor 6- 4
Example 2: Contractors with Extended Hours 6- 4
Getting to the Rights Manager 6-5
Changing Rights Associated with Locations 6-6
Why Change Rights 6-6
Adding a Location 6-7
Modifying a Location 6-11
Deleting a Location 6-12
Changing WLAN Access Manager Rights 6-13
Adding a WLAN Access Manager 6- 13
Modifying a WLAN Access Manager 6- 19
Changing Other Where Properties 6- 20
Deleting a Where 6- 21
Changing Group Properties 6-22
Adding a New Group 6-22
Modifying a Group’s Rights 6-26
Initially Configuring Valid Times or Whens 6- 26
Changing the Time that a Group is Valid 6- 30
x
Modifying the Group/Allows Column 6- 31
Deleting a Group 6-33
Adding, Modifying, or Deleting a User 6-34
Adding a New User 6-34
Modifying a User’s Characteristics 6-36
Deleting a User 6-36
Adding a MAC Address as a User 6-38
Enforcing Authentication 6-40
To use the Built-in Authentication service: 6- 42
To use the LDAP Authentication Service: 6- 42
To use the RADIUS Authentication Service: 6- 43
To use the Kerberos Authentication Service: 6- 44
To use the Advanced Authentication Service: 6- 46
Creating a New Authentication Realm 6- 47
Changing the Default Realm 6-47
Changing Rights-Allows in Groups 6-50
Adding Rights-Allows 6-50
Modifying a Rights-Allow 6-53
Deleting a Rights-Allow 6-53
Redirecting Packets 6-54
Creating or Modifying a Redirect 6-54
Deleting a Redirect 6-58
Changing Allows and Redirect Rights 6- 59
Changing a Group’s Redirect Rights 6- 60
Displaying Rights 6-63
Rights Manager Logs 6-67
Viewing the Rights Manager Log 6-67
Changing the Rights Manager Log Display 6-68
Importing and Exporting Rights 6-68
Importing Rights 6- 68
Exporting a Set of Rights 6- 69
Creating a new Rights Image 6- 69
Downloading the XML Schema 6- 70
Customizing the Logon Screen Appearance 6-70
Customizing the Logon Screen 6-71
Generating an SSL Certificate Signing Request 6-73
Syntax of Client Rights A-1
Command Line Interface B-1
Syntax for Command Line Interface B-2
EliteConnect WLAN Security System User Manualxi
CLI Help Commands B-2
CLI Access Control Commands B-2
Diagnostic Commands B-3
System Status Commands B-4
Diagnostic Log Commands B-5
Active Client Management Commands B-6
System Configuration and Control Commands B-6
Upgrading the System Software B-6
Stopping and Restarting the System B-7
Network Configuration B-8
Access Manager Configuration B-9
Control Server Configuration B-11
Time Configuration B-11
Backup and Restore B-12
SNMP Configuration and Reporting Commands B-12
Rights Tutorial C-1
Starting with Locations C-2
Group Editor C-4
Logon Expire Times for Groups C-5
Default Groups C-6
Logon Rights C-6
Guest Rights C-7
User Rights C-9
Required Rights C-11
Built-in Users C-11
Example 1, Rights Debugger C-12
Example 2, Allowed User Groups C-17
Example 3, Public Location C-24
Time-Based Rights C-28
Time-Based Logon Rights C-29
Example 4, Wired Interface C-29
Example 5, MAC Address User C-32
Example 6, Differentiated Access by Groups C-35
Denying Access to a Subnet C-35
Getting Access to the Subnet C-37
Adding Users C-41
Creating a Location C-42
Example 7, Trap Known Port C-47
Example 8, SOCKS Proxy C-50
Example 9, Public Kiosk Location C-51
xii
Simple Network Management Protocol D-1
Introduction to WLAN Security System SNMP D-2
Supported Management Information Base Objects D-3
MIB Objects D-3
System MIB D-4
Hardware Description MIB Object D-5
Hardware Version MIB Object D-5
Software Version MIB Object D-5
Serial Number MIB Object D-5
Environmental Monitoring Objects D-6
Cooling Fan Registry MIB Objects D-6
Traps D-7
Glossary E-1
Index 1-1
EliteConnect WLAN Security System User Manualxiii
xiv
PREFACE
This preface describes the objective, audience, use, and organization of the
EliteConnect WLAN Security System User Manual. It also outlines the document
conventions, safety advisories, compliance information, comments, ordering
process, related documentation, support information, and revision history.
Audience
The primary audience for this document are network administrators who want to
enable their network users to communicate using the EliteConnect WLAN Security
System. This document is intended for authorized personnel who have previous
experience working with network telecommunications systems or similar
equipment. It is assumed that the personnel using this document have the
appropriate background and knowledge to complete the procedures described in
this document.
How To Use This Document
This document contains procedural information describing all configuration and
management of the SMC2504W EliteConnect WLAN Secure Server and SMC2502W
WLAN Access Manager. Each procedure is written in a task-oriented format
consisting of numbered step-by-step instructions, that enable you to perform a
series of actions to accomplish a stated objective. In most cases, several different
procedures are required to complete one overall task. All procedures should be
performed in the order they appear in this document, unless otherwise instructed.
Where applicable, navigation aids also refer you to supplemental information such
as figures, tables, and other procedures in this document or another document.
Main chapters are followed by supplemental information such as appendices and
an index.
vii
Document Conventions
ConventionDefinition
Boldface PalatinoScreen menus that you click to select, commands that you select,
and emphasized terms are in boldface Palatino.
Italic Palatino
Courier
New terms that are defined in the Glossary are in italic Palatino.
Filenames and text that you type are in Courier.
Organization
This document is organized as follows:
Chapter 1—Introduction
This chapter provides an overview EliteConnect WLAN Security System and
describes how the components operate.
Chapter 2—Configuration
This chapter explains how to configure your EliteConnect WLAN Security System
system.
Chapter 3—Airwave Security
This chapter describes how to enforce security using IPSec, L2TP, and PPTP.
Chapter 4—Controlling the System Functions
This chapter explains how to install new software, backup your system, and
shutdown and reboot.
Chapter 5—Viewing Status Information
This chapter explains how to view the status of the components of the EliteConnect
WLAN Security System.
Chapter 6—Configuring the Rights Manager
This chapter describes how to allocate rights to clients based on their location,
groups, and time and date. It includes a definition of frequently used terms for
managing rights.
Appendix A—Syntax of Client’s Rights
This appendix explains client’s rights based on the tcpdump utility.
viii Preface
Appendix B—Command Line Interface
This appendix provides a description of the command line interface.
Appendix C—Rights Tutorial Appendix
This appendix explains Rights Management through examples.
Appendix D—Simple Network Management Protocol
This appendix describes the Management Information Base modules used in
EliteConnect WLAN Security System.
Glossary
The Glossary explains terms that are specific to the EliteConnect WLAN Security
System. These terms are shown in italics when first used.
EliteConnect WLAN Security System User Manual ix
x Preface
INTRODUCTION
This chapter gives a brief description of the SMC EliteConnect WLAN Security
System Solution products. It consists of the following sections
1.2 The EliteConnect WLAN Security System . . . . . . . . . . . . . 1-3
11
1-1
1.1Overview
The WLAN Security System permits fine-grained access control and transparent
Layer 3 roaming capabilities for wireless and wired IP networks. The IP traffic of
each user machine or client can be individually authenticated, controlled,
redirected, and logged for auditing or billing purposes. When clients move
through the enterprise, their open sessions are transparently forwarded so that the
sessions are not terminated. Almost any user authentication scheme can be
supported thanks to WLAN Security System’s fully customizable Rights Manager
component.
In addition, the Airwave Security feature can encrypt all client traffic using standard
encryption technology including PPTP, L2TP, or IPSec.
The WLAN Security System addresses the following mandatory network
infrastructure functions:
• Security that includes the following functions:
•
User authentication
• User-based access and resource control
• Airwave Security: PPTP, L2TP, or IPSec
• Management: tracking of wireless access points and users
• Accounting: information for accounting, logging, and billing
The WLAN Security System also addresses the following mobility functions:
• Address Mobility: no need to re-authenticate or acquire a new address when
roaming
• Connection Mobility: sessions remain open when roaming
1-2Introduction
1.2The EliteConnect WLAN Security System
Figure 1-1 shows the EliteConnect WLAN Security System.
Figure 1-1. The SMC EliteConnect WLAN Security System Solution
The EliteConnect WLAN Security System consists of three logical functions:
• WLAN Access Manager
• Control Server
• Rights Manager
There are two physical components of the EliteConnect WLAN Security System:
• The WLAN Secure Server consists of a Control Server, Rights Manager, and
WLAN Access Manager with four RJ-45 ports
• The WLAN Access Manager consists of the WLAN Access Manager function
with four RJ-45 ports
The next section explains the three logical functions.
SMC EliteConnect WLAN Security System User Manual1-3
1.2.1WLAN Access Manager
The WLAN Access Manager is positioned between each access point and the
network. It inspects and filters each packet arriving from the wireless client
through the access point, deciding whether to allow or deny forwarding of the
packet. The WLAN Access Manager applies a set of rules to each packet. Allowed
packets can be redirected based on other rule sets.
Initially, the WLAN Access Manager knows of no connected devices. As a user
sends a packet through a wireless access point, it forwards the packet to the
network through the WLAN Access Manager. The WLAN Access Manager uses
the received packet to determine the hardware MAC address of the client device,
and requests an initial set of rights from the Rights Manager through the WLAN
Secure Server.
The Rights Manager supplies a set of logon rights that allow DHCP, DNS, and
HTTP requests, additionally redirecting HTTP requests to the Rights Manager. The
Rights Manager uses the first HTTP request to require user authentication by
means of an SSL-protected HTTP connection. After verifying a user’s identity
through the HTTPS connection, the Rights Manager sends a new rights package
through the WLAN Secure Server, to the WLAN Access Manager. This rights
package is based on the user’s identity, location, and the time and date.
In addition to filtering and redirecting packets, the WLAN Access Manager
coordinates with other Access Managers through the WLAN Secure Server to
maintain connections as a client device roams from one access point to another.
The Access Manager is also responsible for maintaining Airwave Security
encryption using PPTP, L2TP, or IPSec protocols.
Scalability is ensured by concentrating all packet-level inspection and rewriting
functions and encryption at the WLAN Access Manager. An individual Control
Server can easily supervise several WLAN Access Managers.
1.2.2Control Server
Each WLAN Secure Server administrative domain requires only one Control
Server, which is embedded in the WLAN Secure Server. The Control Server in the
WLAN Secure Server performs two functions:
•
Coordinates between the WLAN Access Managers and the Rights Manager
• Coordinates WLAN Access Manager-to-WLAN Access Manager communications, such
as a roaming handoff.
To ensure scalability, all per-packet operations are confined to the WLAN Access
Managers. The WLAN Secure Server merely coordinates the client metainformation among the WLAN Access Managers.
All policy and user database entries are kept in the Rights Manager, which is part
of the WLAN Secure Server.
1-4Introduction
Command and control communication between the WLAN Access Manager and
the WLAN Secure Server is through an encrypted connection. Command and
control communication between WLAN Access Managers is also through an
encrypted connection. User packets that must be tunneled between WLAN Access
Managers to ensure transparent Layer 3 roaming are not encrypted.
1.2.3Rights Manager
The Rights Manager, which is part of the WLAN Secure Server, enables the
network administrator to edit rights for users, groups, locations, and times. It
supplies the WLAN Access Managers with appropriate rights based on who, when,
and where. The Rights Manager also authenticates users.
Users and Authentication
Active Authentication
As described earlier in WLAN Access Manager, the initial set of rights sent by the
Rights Manager to the WLAN Access Manager limits the packets allowed into the
network. Additionally, any HTTP requests from the end-user are redirected to the
Rights Manager. The Rights Manager sets up an HTTPS connection with the user,
and presents a logon screen.
The user types their username and password, or requests guest rights. Users are
authenticated, while guests are given a set of pre-defined rights that limit network
access to the external Internet.
The Rights Manager supports four methods of authentication:
• A built-in database of user-password pairs
• An interface to an external LDAP authentication service
• An interface to an external RADIUS service
• An interface to a Kerberos service
After performing the appropriate authentication, the Rights Manager determines
the correct set of rights for that particular user based on group membership,
geographic location of the client, day, and time of day. The Rights Manager also
offers an advanced authentication option in which multiple authentication
methods can be used.
SMC EliteConnect WLAN Security System User Manual1-5
Passive Authentication
Alternatively, you can choose one of the following passive methods for user-level
authentication. The following all require user-level authentication and the
EliteConnect WLAN Security System can use these authentication services for its
own user authentication:
• NT/2000 domain login
• 802.1x authentication
• PPTP MS-CHAP, or MS-CHAP v2 authentication
• L2TP MS-CHAP or MS-CHAP v2 authentication
1.2.4Rights
At any given time, for each client attached to a WLAN Access Manager, a certain
set of rights is in effect. These rights are based on the powerful packet-matching
language of the tcpdump utility program. A rights package contains the following
main components: Network Address Translation (NAT) setting, Mode Setting,
Packet Filters, and Session Redirectors. Each set of rights has a valid time.
Network Address Translation
A WLAN Access Manager provides Network Address Translation (NAT) services
for users who request DHCP IP address when they initiate connection to the
Access Manager.
When a client sends a packet through the WLAN Access Manager, the WLAN
Access Manager rewrites the IP address field and the port number field to a value
that is unique and that will identify any return packet.
Depending on the application, you can choose to use the NAT service or you can
choose to assign your own IP address. Following are some points in favor of and
against using NAT:
• NAT makes roaming much more efficient. The WLAN Security System can move
the entire connection state from one WLAN Access Manager to the roamed-to
WLAN Access Manager, and only tunnel open sessions back through the
original WLAN Access Manager. MobileIP as a solution to roaming suffers
because every connection has to be tunneled back through the original
connection point.
• NAT provides some amount of protection to a client since no device other than
the WLAN Access Manager can talk directly to the client. This provides
rudimentary firewall protection.
• Certain applications require a host or server system to know the actual IP
address of a client. Some examples include multi-player games, file transfer in
Instant Messenger applications, and other peer-to-peer applications.
1-6Introduction
NAT is enabled by default. You can choose to disable NAT based on individual
user’s needs. See Configuring the Rights Manager for more information about
configuring NAT.
Packet Filters
Each set of client rights has an associated set of packet filters that determine what
traffic the client is allowed to generate. Any packets generated by the client that
do not match one or more of the filters are quietly rejected. You can base filters for
packets on protocol, IP address, port, or other considerations. You can specify
packet filters to be as granular as you want, even to the point of specifying
individual bit patterns in the client’s packet.
Session Redirectors
Client TCP and UDP sessions can be redirected from their original destination IP
address or port. This is useful, for example, to force HTTP clients to login, or to
ensure that certain requests for network services, such as DNS, are directed to the
appropriate servers.
Some important notes about configuring rights:
• Filters and redirectors match packets using the powerful pattern matching
language introduced by the tcpdump utility program.
• If NAT is not enabled for a set of rights, then these rights should also include a
filter allowing clients to renew their DHCP leases.
• Often a session redirector will match client DNS requests and redirect them to a
known DNS server allowing for client misconfiguration of DNS.
Valid Times
A set of rights is valid for some time periods as specified by the system
administrator when configuring the rights. When the rights valid time expires, the
WLAN Access Manager queries the Rights Manager for a new set of rights, but
does not require re-authentication.
1.2.5Timers
There are two important timers maintained by the WLAN Security System:
• Expire
• Linger
The Expire timer specifies how long before a user is required to re-authenticate.
The Linger time specifies how long a user has to roam once he disappears from
one WLAN Access Manager and before he reappears at another WLAN Access
Manager. A WLAN Access Manager periodically probes for a client after that client
is idle for a while. If the client does not respond to the probe (an ARP request) after
a period of idleness, the WLAN Access Manager removes the client’s data from its
SMC EliteConnect WLAN Security System User Manual1-7
internal tables and informs the Rights Manager. The Rights Manager starts the
linger timer. If the linger timer expires, the user must re-authenticate.
1-8Introduction
CONFIGURINGTHE WLAN SECURITY SYSTEM
This chapter describes how to configure the WLAN Secure Server and WLAN
Access Manager so that they work with your enterprise network after you have
installed it, as described in the EliteConnect WLAN Security System Installation Guide. It includes the following sections:
2.8 Configuring the Time and Date . . . . . . . . . . . . . . . . . . . . . 2-15
2.9 Viewing Online Documentation and Help . . . . . . . . . . . . 2-16
2
Note:You can also use the EliteConnect WLAN Security System command-line interface for
configuration, which is described in
Command Line Interface.
March 18, 2002 3:12 pm2-1
2.1Administrative Login
To log in:
Step 1.Set your browser to the IP address or hostname of the WLAN Secure
Server or WLAN Access Manager
Step 2.Press Enter.
The Administrator Login Screen appears, as shown in Figure 2-1
Any system connected through a WLAN Access Manager’s or WLAN Secure
Server’s ports can access the web interface through the specially recognized URL:
http://42.0.0.1.
Note:Your browser must accept cookies to log in.
Figure 2-1. Administrator’s Login
Note:The text is adjusted appropriately depending on whether the component you are
connected to is a WLAN Secure Server or a WLAN Access Manager.
Step 3.
Note:By default, the system ships with the user name admin and password admin.
Step 4.
Step 5.Click Login.
Enter your username.
Enter your password.
The Main Menu appears. Figure 2-2 shows the Main Menu for the WLAN Secure
Server. Figure 2-3 shows the Main Menu for the WLAN Access Manager.
2-2Configuring the WLAN Security System
Figure 2-2. Main Menu for the WLAN Secure Server
Figure 2-3. Main Menu for the WLAN Access Manager
EliteConnect WLAN Security System User Manual2-3
This chapter explains the Configuration functions of the Main Menu; other topics
are discussed in other chapters, as shown in Table 2-1.
Table 2-1 Topics in Other Chapters
Top icChapter
Airwave Security3
System Functions4
Viewing the System5
2.2Changing Your Network Configuration
The WLAN Security System Installation Manual explains initial network installation.
Refer to this section if you need to change your network configuration.
To change your network configuration:
Step 1.Click Network from the Main Menu.
Figure 2-4 shows the Network Configuration screen for the WLAN Secure Server.
Figure 2-5 shows the Network Configuration screen for the WLAN Access
Manager.
Figure 2-4. Network Configuration for the WLAN Secure Server
2-4Configuring the WLAN Security System
Figure 2-5. Network Configuration for the WLAN Access Manager
Step 2.Type the hostname as a fully qualified domain name.
Note:SMC recommends creating a hostname. Use a hostname to prevent your users from
getting SSL warning about an unknown SSL certificate when they first see the Logon
screen. If you enter a hostname, the DNS at your site must resolve the hostname to the
IP address you select.
Step 3.
Type the DCHP Server IP address.
Leave this field blank if DHCP server requests are handled on this WLAN
Access Manager’s or WLAN Secure Server’s subnet.
Note:There are two ways for a WLAN Access Manager to pass DHCP requests from a client
to a DHCP server located somewhere on the network. This applies only to clients that
are not using Network Address Translation (NAT), since a network-address translated
client will have its DHCP request satisfied by the WLAN Access Manager itself.
• The first way to handle DHCP requests is by bridging. This means that the WLAN
Access Manager or WLAN Secure Server simply copies the DHCP request from the
client to the WLAN Access Manager's or WLAN Secure Server’s subnet. Assuming
there is a DHCP server on the subnet or a DHCP-forwarding router, the DHCP server
replies with the IP address and other information the DHCP server provides, and the
WLAN Access Manager or WLAN Secure Server sends the reply on to the client. As
far as the client is concerned, it is connected directly to the DHCP server.
• If there is no DHCP server on the WLAN Access Manager's or WLAN Secure Server’s
subnet nor any DHCP-forwarding router, then the WLAN Access Manager or WLAN
EliteConnect WLAN Security System User Manual2-5
Secure Server needs to know how to locate the DHCP server. In this case, called
DHCP relay, the WLAN Access Manager relays the client DHCP request to the DHCP
server at the administrator-specified IP address. When the WLAN Access Manager or
WLAN Secure Server receives the reply, it relays it to the client.
Step 4.Click Yes to Obtain IP Address via DHCP.
If you click Yes, the unit will request its IP address, subnet mask, gateway,
and DNS IP address from a DHCP server.
Step 5.Choose the Netmask address from the drop-down box.
Step 6.Type the Default Router IP address.
Step 7.Type the Primary DNS server IP address, and if applicable, the
Secondary DNS server IP address.
Step 8.Click Submit Changes to save your settings.
Step 9.Click the Advanced Network Configuration to configure advanced
network settings, as described in Advanced Network Settings.
2.3Advanced Network Settings
To configure advanced network settings:
Step 1.Click Advanced Network Configuration on the Network Configuration
screen.
The Advanced Network screen appears, as shown in Figure 2-4.
Note:The screens for the WLAN Access Manager and WLAN Secure Server are the same.
2-6Configuring the WLAN Security System
Figure 2-6. Advanced Network Configuration for the WLAN Secure Server
Step 2.Enable Ethernet Bridging, if appropriate for this WLAN Secure Server or
WLAN Access Manager. A WLAN Security System is a Layer 3 device
that provides filtering and redirection of IP packets at Layer 3. With
bridging, you can specify certain Layer 2 packets to be copied across a
WLAN Secure Server or WLAN Access Manager.
Step 3.For Bridged traffic:
a.Click Cisco Discovery Protocol to enable CDP packets through this
WLAN Secure Server or WLAN Access Manager.
This Layer 2 protocol is used by Cisco network hardware and
software to manage a network of Cisco devices.
b.Click Wireless Network Access Protocol to enable WNMP packets
through this WLAN Secure Server or WLAN Access Manager.
This Layer 2 protocol is used by Symbol Technologies, Inc. network
hardware to manage a network of Symbol devices.
c.Click EnableIP Multicast.
This enables multicast packets to be copied from the Network Uplink
subnet to all clients connected to ports on this WLAN Secure Server
or WLAN Access Manager.
EliteConnect WLAN Security System User Manual2-7
d.Click Other.
You can enter arbitrary tcpdump syntax in this box to specify what
Layer 2 traffic to allow through this WLAN Secure Server or WLAN
Access Manager. Any tcpdump-enabled packets are in addition to
those enabled by checking CDP, WNMP, or Multicast options, above.
See Appendix A for a description of tcpdump syntax.
Examples:
CDP enable tcpdump syntaxether [12:2]<= 1514 and ether dst 01:00:0c:cc:cc:cc and ether[14:4]
= 0xaaaa0300 and ether[18:4] = 0x000c2000
WNMP enable tcpdump
syntax
Multicastip[16:4]&0xf000000=0xe0000000
Step 4.Type the number of seconds for client probes: the amount of idle time
ether [12:2] = 0x8781 and ether[0:4] = 0x01a0f8f0
before the WLAN Security System checks on the client.
When the client is idle, that is, when it is not sending any packets to the
network, this timer runs. When the client probes timer expires, the
WLAN Secure Server or WLAN Access Manager probes the client by
sending it an ARP request. The WLAN Secure Server continues sending
ARP requests at the specified interval as long as the client is idle.
Step 5.Type the number of seconds of idle time to disassociate clients after.
This counter determines how long a client must be idle before the WLAN
Access Manager disassociates that client. A disassociation is:
1) the WLAN Access Manager forgets the client and the client’s MAC
address, and wipes its rights from memory;
2) the WLAN Access Manager sends a message to the Rights Manager,
which tells the Rights Manager that the client is no longer connected. At
this point the Rights Manager starts the linger timer. The linger timer is
how long a client has to re-establish communication before it must reauthenticate See Configuring the Rights Manager for more information
on the linger timer.
Step 6.Click the checkboxes for those ports on which you want to Forward
broadcast IP packets to clients. You can click none, any, or all of the ports.
IMPORTANT:
Enabling this functionality permits broadcast IP packets to be transmitted to all clients on the selected
ports, even unauthenticated clients. In some circumstances, broadcast IP packets contain sensitive information that network administrators prefer to keep from unauthenticated users.
Step 7.Configure the Port Settings.
Clients connected to WLAN Access Manager or WLAN Secure Server ports can
obtain an IP address in one of three ways:
•NAT mode: the WLAN Access Manager or WLAN Secure Server responds to a
DHCP request from a client with an address on the logical subnet 42.x.x.x. The
2-8Configuring the WLAN Security System
WLAN Access Manager or WLAN Secure Server will then rewrite source IP
address and source port number of client packets sent to the network (NAT and
PAT functions). Packets received by a WLAN Access Manager or WLAN Secure
Server from the network sent in reply to the NAT and PAT packets are relayed
to the appropriate client with the destination IP address and destination port
number rewritten as appropriate.
Note:Normally a client that uses an IP address that is not on the WLAN Access Manager or
WLAN Secure Server's subnet, or that uses the IP address of the WLAN Access
Manager or WLAN Secure Server itself, or that uses an IP address on the WLAN Access
Manager or WLAN Secure Server's subnet, but which does not have NAT-mode
disabled, will automatically be assigned NAT mode.
•Non-NAT, static IP mode: the client uses a pre-assigned IP address on the
WLAN Access Manager or WLAN Secure Server's subnet. Packets received by
the WLAN Access Manager or WLAN Secure Server with this static IP address
in the destination IP address field are forwarded to the appropriate client.
Packets from the client to the network do not have their source IP address or
source port number rewritten.
•Non-NAT, dynamic IP mode: the client sends a DHCP request for an IP address
which the WLAN Access Manager or WLAN Secure Server passes on to an
external DHCP server. This DHCP request will obtain an IP address on the
WLAN Access Manager or WLAN Secure Server's subnet. Packets received by
the WLAN Access Manager or WLAN Secure Server with the IP address
returned by the external DHCP server are forwarded to the appropriate client.
Packets from the client to the network do not have their source IP address or
source port number rewritten.
You can use the Port Settings facility to modify this behavior. If you fill in the IP
address and subnet mask for a WLAN Access Manager or WLAN Secure Server
port, under Port Settings then only for non-NAT mode clients:
• If a client makes a DHCP request, and you have configured an external DHCP
server IP address, then the WLAN Access Manager or WLAN Secure Server
will relay the DHCP request, but indicating the client originating the request
is on the subnet as specified in the Port Settings for that particular port. This
indicates to the external DHCP server that it should allocate an IP address on
that subnet.
• If a client has the real IP right and uses an IP address on the subnet as defined
by the Port Settings for that particular port, then the WLAN Access Manager
or WLAN Secure Server will not NAT that client's sessions.
In either case, the WLAN Access Manager or WLAN Secure Server will forward
packets from the network to a client IP address on a subnet defined in the Port
Settings to the appropriate client.
EliteConnect WLAN Security System User Manual2-9
Note:Network routers must be configured to route traffic destined for the subnet defined by
the Port Settings to the WLAN Access Manager or WLAN Secure Server.
Step 8.
Click Update.
2.4Setting the Shared Secret
All WLAN Access Managers must prove to a system’s WLAN Secure Server that
they are trusted. A shared secret is used by the WLAN Access Manager to establish
this trust relationship. You must set this shared secret on the WLAN Secure Server
that controls one or more WLAN Access Managers.
2.4.1Authorizing the Shared Secret on the WLAN Secure Server
To set the shared secret in a WLAN Secure Server:
Step 1.Click Shared SecretAuthorization from the Main Menu.
The Shared Secret Authorization Configuration screen appears, as shown
in Figure 2-7.
2.4.2Setting the Secure Server IP Address and Shared Secret
A WLAN Access Manager must know the address of its WLAN Secure Server. The
WLAN Access Manager must also know the shared secret to establish a trust
relationship with that WLAN Secure Server.
To set the Control Server, which is embedded in the Secure Server, and the IP
address from a WLAN Access Manager:
Step 1.Click Control Server from the Main Menu of the WLAN Access Manager.
The Specify the Control Server screen appears, as shown in Figure 2-8.
Figure 2-8. Specify the Control Server
Step 2.Type the Control Server IP address.
Step 3.Type the Secret Key.
Step 4.Confirm the Secret key.
Step 5.Click Submit Changes.
2.5Configuring SNMP
The Simple Network Management Protocol (SNMP) is a standard for network
management. SNMP enables network administrators to manage their networks.
The SNMP subsystem enables the WLAN Access Manager and WLAN Secure
Server to be monitored via SNMP from a network management application such
as HP OpenView, Aprisma SPECTRUM, or SMC EliteView.
EliteConnect WLAN Security System User Manual2-11
Note:The WLAN Security System supports Management Information Base-2-compliant
objects. See the SNMP appendix for a list of Management Information Base (MIB)
objects.
To configure SNMP:
Step 1.Click SNMP from the Main Menu.
Note:This screen shows the values for the WLAN Secure Server. The screens for the WLAN
Access Manager are the same.
Figure 2-9. SNMP Configuration
Step 2.Determine whether you need SNMP to work with your overall network.
SNMP is disabled by default. Click Yes to enable SNMP.
Step 3.Type your Community Name, which is analogous to a password.
The default name is public; SMC recommends that you change it to increase
your security.
Step 4.Type the port number of your SNMP Port.
Port 161 is the default. If you change the port number, be careful that you do not
use a port that is used by another application.
Step 5.Type your Contact info: typically, this is the Network Administrator’s
name, email, or phone.
Step 6.Type your Trap IP address.
Certain events generate SNMP traps. The trap IP address is the recipient of this
2-12Configuring the WLAN Security System
information. Proprietary SNMP events include fan failure or restart, and out-ofrange temperatures. General SNMP trap events include SNMP authentication
failures, which are sent as trap information.
Note:Type the Tr ap I P add ress only if you have an SNMP trap receiver listening for this
information.
Step 7.
Type up to fo ur Manager IP addresses.
These are the addresses of SNMP consoles that are authorized to request
information from the WLAN Secure Server.
You can enter the following forms of Manager IP addresses: IP
addresses, such as 192.168.1.1; netmask addresses, such as
192.168.1.0/24; a hostname such as snmp.fiesta.com, or a wildcard
address, for example: 0.0.0.0/0.
Note:To query the SNMP agent from the SNMP console, you must include at least one
Manager IP address.
Step 8.
Click Submit Changes to save your settings.
2.6Specifying Location Description
Specifying locations is helpful in a wireless system for system debugging and
management. This an optional screen. The WLAN Secure Server Location
information is readable by SNMP. This screen applies to the WLAN Access
Manager and WLAN Secure Server.
To specify location descriptions:
Step 1.Click Specify Location Information from the Main Menu.
The Location Information screen appears.
EliteConnect WLAN Security System User Manual2-13
Figure 2-10. Location Information
Step 2.Type the location of the WLAN Secure Server Location, for example,
Network Closet 2 on the 4th floor of the Physics Building.
Step 3.Type the location of Port 1, for example, Advanced Physics Lab.
Step 4.Type the location of Port 2, for example, Conference Room 12.
Step 5.Type the location of Port 3, for example, Centrifuge Room.
Step 6.Type the location of Port 4, for example, Applied Research Lab.
Step 7.Click Submit Changes to save your choices.
2.7Specifying Session Logging
The WLAN Security System creates logs of session information, known as session
logs, for the WLAN Secure Servers and WLAN Access Managers. You can use these
logs for accounting and troubleshooting. These logs are sent to a remote server via
a
syslog protocol.
Note:You must configure session logging from a WLAN Secure Server; you cannot configure
session logging from a WLAN Access Manager.
To specify session logging:
Step 1.Click Specify Session Logging from the Main Menu.
The Specify Session Logging screen appears, as shown in Figure 2-11.
2-14Configuring the WLAN Security System
Figure 2-11. Specify Session Logging
Step 2.Click Yes to enable Session Login.
Step 3.Type a Syslog Server IP address.
Step 4.Choose your Syslog Facility from the drop-down list.
You can choose Daemon, User, or Local 0 through 7. Use Syslog settings
that interoperate with your enterprise Syslog server.
Step 5.Click Submit Changes.
2.8Configuring the Time and Date
Accurate time and date reporting is necessary for logs and for troubleshooting.
Accurate and synchronized time and dates across multiple systems is especially
important. You use the Time and Date Configuration screen to set the System
timezones and date.
This screen applies to WLAN Access Managers and WLAN Secure Servers.
To configure the time and date:
Step 1.Click Time and Date from the Main Menu.
The Time and Date Configuration screen is shown in Figure 2-12.
Step 2.Click the arrow on the drop-down list and choose the time zone that is
appropriate for your location.
Note:Time zones are associated with major cities: for example, you would choose
America/New York for eastern standard time.
EliteConnect WLAN Security System User Manual2-15
Figure 2-12. Configuring the Time and Date
You can either get the time from an NTP server or set it yourself.
Step 3.To use an NTP server, click Get time from server for a primary and an
optional secondary NTP server.
You can enter either a hostname or an IP address for the NTP servers.
Step 4.To configure the time manually:
a.Click Set time manually.
When you click Set time now, you disconnect from the NTP server.
b.Click Set time now to set the time with the fields below.
Type the date and time in mm-dd-yy format, the hour in 24-hour
format, and minutes in the fields shown in Figure 2-12.
Step 5.Click Submit Changes.
2.9Viewing Online Documentation and Help
To view online documentation and help:
Step 1.Click Help from the Main menu.
The Help menu appears, as shown in Figure 2-13 for the WLAN Secure
Server.
2-16Configuring the WLAN Security System
Figure 2-13. WLAN Secure Server Documentation and Release Notes
Step 2.Click EliteConnect WLAN Security System User Manual to see this
document in HTML or PDF format. The HTML pages of this document
contain blue hypertext links.
The online help is organized by the topic of the screen: for example, if you
click Help on the Time and Date screen, a screen appears with
information on setting the time and date.
Step 3.Review the information in the Release Notes so that you are aware of
recent changes. Information in release notes is the most up-to-date
information and supersedes the user and installation manuals.
Note:The WLAN Access Manager has no online help, user, or installation manual. If you click
Help when you are connected to a WLAN Secure Server, the server provides online
help for the screen.
EliteConnect WLAN Security System User Manual2-17
2-18Configuring the WLAN Security System
VPN SECURITY (AIRWAVE SECURITY)
This chapter explains how to secure the airwaves between the client and the
WLAN Access Manager or WLAN Secure Server. This VPN or Airwave security is
an integrated feature of the EliteConnect WLAN Security System that creates a
secure VPN tunnel to protect your information over the airwaves.
VPN Security (Airwave Security) is a VPN security feature of the WLAN Security
System that allows you to provide strong encryption of data between a client and
the WLAN Access Manager. Airwave Security provides additional security for
data sent over the airwaves, supplanting the relatively insecure Wired Equivalent
Privacy (WEP) of a wireless network.
The WLAN Secure Server offers three choices for encrypting data between a client
and the WLAN Access Manager: PPTP, L2TP/IPSec, and pure IPSec.
3.1.1Point-to-Point Tunneling Protocol (PPTP)
PPTP is a protocol defined by Microsoft for encrypting network data transfers. Its
advantages include its wide availability as it comes pre-installed on all versions of
the Windows operating system including Windows 9x, Windows ME, Windows
NT, Windows 2000, Windows XP, and Windows CE.
PPTP can use a variety of user-level authentication algorithms, including
Microsoft Challenge Handshake Authentication Protocol (MS-CHAP and MSCHAP version 2). The WLAN Security System can use the PPTP user
authentication for its own authentication. In this case, the WLAN Secure Server
login page is not necessary. For encryption, it uses either 40-bit or 128-bit MPPE
(Microsoft Point-to-Point Encryption), which employs the RC4 encryption
algorithm.
3.1.2L2TP/IPSec
L2TP/IPSec is also a Microsoft protocol. It uses the standard IPSec (IP Security)
protocol to encrypt network communications and uses L2TP, an updated and more
secure version of PPTP, for IP address management and user-level authentication.
L2TP clients are pre-installed on Windows 2000 and Windows XP operating
systems.
L2TP can use the same user-level authentication algorithms as PPTP: MS-CHAP
and MS-CHAPv2. As with PPTP, the WLAN Security System can use the L2TP user
authentication as its own authentication. L2TP does not itself provide for any data
encryption; instead, it uses IPSec to encrypt data; see IPSec.
Both PPTP and L2TP were originally designed as a means for remote users,
typically the traveling business person, to access their home network while on the
road. As such, both protocols include IP address assignment features that are not
really necessary in a wireless environment. Both protocols also include facilities for
user-level authentication and for non-IP protocols.
3-2SMC EliteConnect WLAN Security System User Guide
3.1.3IPSec
IPSec is an industry-standard method for encrypting networking communications
that was designed specifically to work with IP networking. IPSec clients are
available from a variety of vendors. Clients known to interoperate with the WLAN
Secure Server IPSec implementation include ones from SafeNet, Netscreen, PGP,
and Certicom/Movian.
The IPSec standard does not include a specification for user-level authentication.
It does provide for machine-to-machine authentication using either certificatebased or shared secret-based authentication. The WLAN Security System only
supports shared secret IPSec authentication.
IPSec operates in two phases and uses encryption and a secure hash function for
each phase. The first phase, Internet Key Exchange (IKE) sets up a session key used
in the second phase to do the actual encryption. The second phase, Encapsulating
Security Payload (ESP), does the actual data encryption. Both the IKE and ESP
phases can use Data Encryption Standard (DES), Triple DES, Blowfish, or CAST
encryption.
The secure hash used for data integrity in both the IKE and ESP phases can be
either Secure Hash Algorithm 1 (SHA-1) or Message Digest 5 (MD5).
IPSec uses the Diffie-Hellman Public-Key-Interchange (PKI) to generate the persession encryption key during the IKE phase. Supported versions of the DiffieHellman key exchange include Group 1, 2, and 5.
In general, the client and the SMC system negotiate the type of hash, encryption,
and key-exchange algorithms. Configuration of IPSec on the WLAN Security
System consists primarily of noting which algorithm the SMC system is prepared
to negotiate. It is up to the client system to propose algorithms, and the SMC server
either agrees or not.
3.1.4General Considerations
Selection of a particular VPN protocol involves several factors:
• necessity
• performance
• security
• availability
Necessity
You must first determine whether you require VPN Security as it imposes a fairly
heavy administrative burden and it slows the throughput of data between a client
and a WLAN Access Manager.
VPN Security (Airwave Security)3-3
VPN tunneling encrypts user data that passes between a client and the network.
Only those networks subject to snooping by unauthorized individuals need
encryption. Even those networks might be adequately protected by WEP
encryption.
If your network is subject to unauthorized interception of data and if WEP is
inadequate to protect this data, you should consider using VPN Security.
Performance and Security
Encryption and decryption of data imposes a computational load on both a client
computer system and the WLAN Access Manager. Encrypting and decrypting data
could slow data throughput by a factor of five or more. Although a more secure
algorithm is generally thought to be slower, that is not necessarily the case. Table
3-1 shows the various possible encryption algorithms and their relative
performance.
Table 3-1 Algorithms and their Relative Performance
As previously mentioned, the availability of a client is an important part of the
selection of an algorithm to use for VPN Security. Table 3-2 shows availability of
PPTP, L2TP/IPSec, and pure IPSec clients known to interoperate with the WLAN
Secure Server VPN Security:
Table 3-2 Availability of Algorithms on Platforms
AlgorithmPlatform
PPTP
L2TP/IPSec
IPSec
Windows 95, Windows 98, Windows ME, Windows NT, Windows 2000,
Windows XP, Windows CE, and other vendors
Windows 2000, Windows XP
SafeNet, Netscreen, PGP, Certicom Movian
3.2Configuring PPTP and L2TP
Configuration of PPTP and L2TP is done in two stages. The first stage configures
the WLAN Access Manager or WLAN Secure Server, and the second stage
configures the Rights Manager location, which is part of the WLAN Secure Server,
that allows (or requires) PPTP and L2TP.
3-4SMC EliteConnect WLAN Security System User Guide
The WLAN Access Manager configuration of PPTP and L2TP is relatively simple.
First, you either enable or disable PPTP and L2TP. Then, you configure IP address
assignment.
Since PPTP and L2TP were originally designed as remote access protocols, used by
traveling clients to access their home network, the PPTP and L2TP protocol assigns
an IP address to the client computer. But in a WLAN Secure Server environment,
a client usually obtains an IP address before enabling PPTP and L2TP encryption.
This results in two IP addresses: an initial one that describes the PPTP or L2TP
tunnel, and one that describes the actual IP address used by the client.
The WLAN Access Manager can be configured in one of two ways to assign this
inner-tunnel address: it can either assign an address from a range of addresses prespecified by the network administrator, or it can request an external DHCP server
to assign an address.
In addition to configuring the WLAN Access Manager, you must also configure the
location in the Rights Manager in order to use PPTP and L2TP. When you configure
a location to use PPTP or L2TP, you must decide how to do PPTP and L2TP user
authentication. For PPTP only, you must specify the strength of MPPE (RC4)
encryption to use.
Note:Configuring a location to use PPTP and L2TP encryption has a non-obvious effect on
how IP addresses are assigned at that location. Normally, an WLAN Access Manager
provides an IP address for clients with NAT mode enabled and for non-NAT clients,
passes any DHCP requests to an external DHCP server. When you configure a location
to use PPTP or L2TP encryption, you actually get two IP addresses: one is the IP address
of the tunnel that encapsulates all data packets; the other is the IP address of the client.
If a location is going to use PPTP encryption, this outer tunnel address must be assigned
by the WLAN Access Manager. The inner tunnel IP address can then be selected to be
assigned by the WLAN Access Manager or an external DHCP server. For more
information, see
Figure 3-1.
There are three ways to perform PPTP and L2TP user authentication at a location.
You can do the authentication through a RADIUS authentication server; you can
use the Rights Manager’s built-in username and password database, or you can
use a shared secret.
Caution: Using a shared secret is inherently insecure and should not be used if at all possible. It is
provided as a convenience for sites who cannot or choose not to use RADIUS or the
built-in server.
If you choose to use RADIUS or built-in authentication, the WLAN Secure Server
uses the PPTP/L2TP authentication both to authenticate the PPTP and L2TP
connection with a shared secret and to authenticate the user to the WLAN Security
System.
VPN Security (Airwave Security)3-5
If you choose the shared secret, all users at this location must enter the specified
shared secret when establishing their PPTP tunnel. The WLAN Security System
only uses the PPTP authentication to set up the PPTP connection. The user is
required to authenticate to the WLAN Security System through the usual webbased logon page.
Note:Since Microsoft links L2TP with L2TP IPSec, the WLAN Security System only supports
L2TP on IPsec. Enabling or requiring implicitly enables or allows use of IPSec.
3.2.1Configuring PPTP or L2TP
To configure PPTP and L2TP:
Step 1.Click PPTP and L2TPConfiguration from the Main menu.
The PPTP and L2TP Configuration appears, as shown in Figure 3-1.
Figure 3-1. PPTP and L2TP
Step 2.Click Yes for Enable PPTP, if appropriate.
Step 3.Click Yes for Enable L2TP, if appropriate.
Step 4.Click the appropriate method to assign an IP address to the IP client.
Since PPTP and L2TP are based on the remote access protocol PPP, it
expects the server to provide an IP address to a client when the
PPTP/L2TP connection is established. There are two ways to do this in
the WLAN Security System. You can either request the system to assign
an IP address from a pre-selected range of IP addresses or you can let an
external DHCP server assign as an IP address.
Step 5.If you clicked IP address range, type the appropriate IP address range for
your enterprise network.
3-6SMC EliteConnect WLAN Security System User Guide
Step 6.Click Submit Changes.
Note:To complete the PPTP or L2TP configuration, you need to configure PPTP settings as
shown above on the WLAN Access Manager, as well as the WLAN Secure Server’s
Rights Manager, and on the client application.
3.3Configuring IPSec
Configuration of IPSec consists of three parts in the WLAN Access Manager:
enable or disable, specifying the shared secret, and checking allowed encryption
and secure hash algorithms. There is also an enable/require IPSec setting on a perlocation basis in the Rights Manager.
An IPSec client negotiates with the IPSec server to set the various options for
encryption and integrity assurance. The IPSec configuration screen allows the
network administrator to specify which IKE and ESP encryption and integrity
algorithms that the WLAN Secure Server and WLAN Access Manager will
negotiate with the client.
To configure security:
Step 1.Click IPSec Configuration from the Main Menu.
The IPsec Configuration screen appears, as shown in Figure 3-2.
Figure 3-2. IPSec Configuration
VPN Security (Airwave Security)3-7
Step 2.Click Yes button to enable IPSec.
Step 3.Enter your shared secret.
You are defining a shared secret to give to your IPSec users so that their
IPSec client software can prove they are authorized to use an IPSec
connection.
Note:The WLAN Secure Server does not support certificate-based authentication for an IPSec
connection. For Windows 2000 users and other clients that use certificate-based
authentication (by default) you must enable shared-secret authentication.
Step 4.
Step 5.Click MD5 and/or SHA for IKE integrity.
Step 6.Click the appropriate IKE Diffie-Hellman settings.
Step 7.Click the appropriate setting for ESP Encryption.
Step 8.Click the appropriate setting for ESP Integrity.
Click the appropriate type of Internet Key Encryption (IKE).
For those IPSec clients that define both outer- and inner-tunnel IP addresses,
specify how the inner-tunnel address is to be assigned.
Step 9.Click DHCP client to assign the inner-tunnel IP address via an external
DHCP server.
Step 10.Click IP Address Range and type the range of IP addresses to be assigned
by the WLAN Access Manager or WLAN Secure Server.
Step 11.Click Submit Changes to save your settings.
3-8SMC EliteConnect WLAN Security System User Guide
CONTROLLINGTHE SYSTEM FUNCTIONS
This chapter describes how to create, store, and restore a back up file, update
system software, and shut down the WLAN Secure Servers and WLAN Access
Managers. It also describes how to reset the SMC WLAN Secure Server to its
factory defaults.
4.4 Rebooting or Shutting Down the System . . . . . . . . . . . . . . 4-9
4
4-1
4.1Creating and Storing a Backup Image
You should create backup files often of your WLAN Secure Server to ensure a
relatively painless recovery from any data loss. You must create a backup prior to
upgrading your software, as described in Updating the System Software, or if you
are restoring to factory defaults, as described in Rebooting or Shutting Down the
System.
There is almost always enough data on a WLAN Secure Server to make manual reentry of data unpleasant.
Note:Often multiple WLAN Access Managers contain nearly identical configuration, and the
amount of data kept in each WLAN Access Manager is small. You might consider
manually re-entering a WLAN Access Manager’s data, as necessary, rather than creating
a large backup file.
SMC recommends that you create data backups on a regular basis. If you make
significant changes to the Rights Manager, back up these changes.
4.1.1Creating a Backup Image
To create a backup image of your software and settings:
Step 1.Click Backup and Restore from the Main Menu.
The Backup and Restore screen appears, as shown in Figure 4-1.
Figure 4-1. Backup and Restore
Note:The Save Backup button is dimmed because you have not yet created a backup file.
4-2Controlling the System Functions
Step 2.Click Create Backup.
The Confirm Create Backup screen of appears, as shown in Figure 4-2.
Figure 4-2. Confirm Create Backup
Step 3.Click Continue with Create Backup.
The Starting to backup Image screen appears, as shown in Figure 4-3.
Figure 4-3. Starting to Backup Image
It is important that you save your back-up image to a local computer. If your
WLAN Secure Server configuration becomes inoperable, you can restore your
back-up image that is stored on another system.
SMC EliteConnect WLAN Security System User Guide4-3
Once you create your image file, you must save it to a local system. You cannot
restore a backed-up image from the WLAN Secure Server or WLAN Access
Manager.
4.1.2Saving the Backup
To save the back up image to your local computer:
Step 1.Click Save Backup, as shown in Figure 4-4.
Figure 4-4. Saving the Restored Image
Step 2.Click OK.
Figure 4-5. Download Backup Screen
4-4Controlling the System Functions
The Save As screen appears, as shown in Figure 4-6. If you are using the Internet
Explorer browser, the following download pop-up screen appears. Other browsers
display similar screens.
Figure 4-6. Save As Screen on your local computer
The default backup image file name automatically appears next to File Name. You
can use this default or rename it. Choose the folder in which you want to store the
backup and click Save.
4.2Restoring a Backed-Up Image
To restore a previously backed-up image:
Step 1.Click Backup and Restore from the Main menu.
The Backup and Restore screen appears, as shown in Figure 4-7.
SMC EliteConnect WLAN Security System User Guide4-5
Figure 4-7. Backup and Restore Screen
Step 2.Click Restore From File.
The Confirm Restore from File screen appears, as shown in Figure 4-8.
Figure 4-8. Confirm Restore From File
Use the Browse feature, if necessary, to locate the backed-up image you want to
restore. Enter the backup image file name in the Image file text box.
Step 3.Click Continueto Restore from File.
When the file is completely restored, the Backup and Restore screen appears, as
shown in Figure 4-9
4-6Controlling the System Functions
.
Figure 4-9. Backup Status Restore
Step 4.Click Return to Main Menu.
After the system reboots, you can start again using the restored image.
The system might take 90 seconds to reboot.
Note:If your system settings have become inconsistent, for example, a power failure occurred
while restoring from a backup, you can reset to factory defaults and reboot to restore the
initial system settings. However, you must reconfigure your system completely if you
restore from factory defaults. You can restore your setting from a back-up image.
4.3Updating the System Software
Upgrading system software is a two-step process. First, download a new software
image. This new image becomes the Alternate Version. Then, reboot from the
Alternate Version, which automatically makes the older image the new alternate
version. This allows you to revert to the older images if the new image is
unsatisfactory.
IMPORTANT:
Before updating system software, it is prudent to create a backup of your current system software. See
Creating and Storing a Backup Image.
To update the system software:
Step 1.Click Update Software from the Main Menu.
The Update Software screen appears, as shown in Figure 4-10.
Step 2.Type the URL from which you want to download the software.
This field provides the latest version available. If you leave this blank, the
SMC EliteConnect WLAN Security System User Guide4-7
location defaults to an SMC FTP server site where upgrade images are
stored.
Figure 4-10. Entering the Update Software
Step 3.Type your Key.
The key is a password that enables you to use this version, which you get
from Technical Support.
Step 4.To reboot the system automatically and immediately after downloading,
check the box that says Immediately Reboot with update when finished
downloading.
Step 5.Enable Proxy, if appropriate.
An FTP proxy enables you to download the new image through an
enterprise firewall.
Step 6.If you enable the proxy, type the IP address of the FTP proxy server and
type the port number of the FTP proxy service (default is 3128), username,
and password.
Step 7.Click Save Proxy Settings.
It is helpful to save settings if you download new system software
periodically.
Step 8.Click Download.
The Update Software Process screen appears, as shown in Figure 4-11.
4-8Controlling the System Functions
Figure 4-11. Software Update Status
This is the initial status screen after you click Download. It has a Start refreshing
this page button; this screen does not refresh unless you click that button.
The screen refreshes approximately every 10 seconds, displaying updated status
information. After the download is complete, the status message indicates
unpacking the new image file. After unpacking is complete, the screen stops
refreshing, and a completion message appears:
New image successfully installed. Initiating reboot.
If you did not check the box that says Reboot with new version when finished
downloading, then the download proceeds, with the new software replacing the
alternate version software and without rebooting. The Update Software screen
displays both an installed version as well as an alternate version, as shown in
Figure 4-10. You are notified if the new image is successfully installed. You must
then reboot to the alternate version to complete the update of the software.
Note:Depending on the amount of data on your system, you might have to wait 90 seconds to
before you can log in again.
4.4Rebooting or Shutting Down the System
To reboot, shut down, or reset your WLAN Secure Server to factory defaults
settings and reboot:
Step 1.Click System Shutdown from the Main Menu.
The System Shutdown appears, as shown in Figure 4-12.
SMC EliteConnect WLAN Security System User Guide4-9
Figure 4-12. Shutdown Options
Step 2.Click Reboot this System to reboot.
The Confirm System Reboot screen appears. Click Continue with System
Reboot button to proceed with the reboot.
Step 3.Click Shutdown and Power Off to shut down the system.
The Confirm System Shutdown and Power Off screen appears. Click the
Continue with Shutdown and Power Off to proceed with the reboot.
Step 4.Click Reset to Factory Reset and Reboot to restore the original
configuration settings.
The Confirm Factory Reset and Reboot screen appears. Click the
Continue with Factory Reset and Reboot to proceed, as shown in Figure
4-13.
4-10Controlling the System Functions
Figure 4-13. Confirm Reset to Factory Defaults
Caution: If you click this option, you must restore all settings from a backup image that was
created before the reset.
Step 5.
Click Main Menu if you do not want to reboot or shut down.
Caution: If you reboot a WLAN Access Manager, you will erase the logs and backup information.
SMC EliteConnect WLAN Security System User Guide4-11
4-12Controlling the System Functions
VIEWING SYSTEM STATUS
This chapter explains how to view the system status of the WLAN Secure Server
and WLAN Access Manager. It consists of the following sections:
5.6 Viewing Version and License Information . . . . . . . . . . . . . 5-9
Note:The text and the buttons are adjusted appropriately depending on whether the
component you are connected to is a WLAN Secure Server or a WLAN Access Manager.
Most of the images in this chapter are of a WLAN Secure Server, so the images might
contain options that are not available on a WLAN Access Manager.
5
5-1
5.1Viewing Status Information
This chapter explains how to view information about the WLAN Secure Server and
WLAN Access Manager. The screens that provide this information let you filter the
information. This enables you to easily find the WLAN Security System
information that you need.
Figure 5-1. View Active Sessions
To filter, click Apply Filter, as shown in Figure 5-1. To restore to the default filter,
click Reset Filter. Depending on the screen you view, you can filter on the
following entries:
Table 5-1 Filtering Information
EntryDetails
LinesYou can specify a number of entries to be displayed. The default is
25. You can choose 10, 25, 100, 1000, or unlimited.
ProtocolChoose the protocol from the drop-down list; you can choose All, IP,
TCP, or UDP.
MAC AddressChoose the MAC address from the drop-down list; you can choose
All or one of the MAC addresses shown.
Port numberChoose All or one of the ports in the list.
SeverityChoose the error type that you want to see; choose Notice, Critical,
Informational, Warning, or Error.
WithinChoose the time period for which you want to view logs; you can
choose the past hour, day, week, or unlimited.
SearchType a string that you want to find. It can be any string on which you
want to search or filter.
5-2Viewing System Status
To sort column headings, click the column heading, such as MAC address or IP
address, as shown in Table 5-2
5.2Viewing WLAN Access Managers
The WLAN Access Manager List shows all the currently connected WLAN Access
Managers to your WLAN Secure Server. Use this list to manage the WLAN Access
Managers. This screen is available only from the Main Menu of a WLAN Secure
Server.
To view the current list of WLAN Access Managers:
Step 1.Click View WLAN Access Manager List from the Main Menu.
The WLAN Access Manager list appears, as shown in Figure 5-2.
Figure 5-2. View WLAN Access Manager List
Step 2.To view more information about or to manage a particular WLAN Access
Manager, click on the IP address if it is underlined.
This takes you to the Main Menu of the WLAN Access Manager.
Note:A WLAN Secure Server and WLAN Access Manager share a single web interface, so the
IP address of a WLAN Access Manager portion of a WLAN Secure Server will not be
underlined.
Step 3.
To learn more about a specific client, click the appropriate entry in the
User column.
EliteConnect WLAN Security System User Manual5-3
5.3Viewing the Active Client List
The Active Client list shows the status of all connected clients.
To view the Active Client List screen:
Step 1.Click View Active Clients from the Main Menu.
The View Active Client screen appears, as shown in Figure 5-3
Figure 5-3. View Active Clients
The screen presents user name, machine name, IP address, port number, sessions,
and the idle time for each active session.
Step 2.You can filter column headings or choose the number of lines to display,
as described in Table 5-1.
Step 3.To learn more about a specific client, click the entry with the user or MAC
address on it.
The client information screen appears, as shown Figure 5-4.
5-4Viewing System Status
Figure 5-4. Client Information
Table 5-2 Client Information
InformationDescription
ClientThe MAC address (hardware ID) of the client
UserThe name or the user, if known, otherwise the MAC address
Machine nameThe name of the machine, if known.
IP AddressIP address for the client’s machine
Address StatusInformation about how your IP address was assigned
WLAN Access
Manager
The IP address of the WLAN Access Manager to which the user is
connected.
Port NumberThe port number of the WLAN Access Manager to which the user
is connected.
IP SecurityDisplays the type of tunnelling protocol used by the client (none,
PPTP, L2TP, or IPSec); the type of authentication used by the
client, and the type of encryption used by the client
Log InfoClick this link to see the WLAN Access Manager’s log file filtered
for entries that pertain to this client.
n Active
Click this link for more information about a client’s active sessions.
Session
Rights in XMLClick this link to see the client’s rights in XML. See Configuring
the Rights Manager
for more information.
Rights ExpireThe amount of time in days, hours, and minutes before the rights
expire. This entry is the valid time for the rights, not the time left
before requiring re-authentication.
Step 4.Click the Logoff This Client to log off this client, if appropriate.
EliteConnect WLAN Security System User Manual5-5
Step 5.Click the Go to Rights Manager, if appropriate.
Clicking this button takes you to the Home Rights Manager screen, as
shown in Figure 6-5.
5.4Viewing Active Session Information
Viewing active sessions provides information on client’s open sessions. From this
screen, you learn more about a client’s network traffic.
To view active sessions:
Step 1.Click View Active Sessions.
The View Active Sessions screen appears, as shown in Figure 5-5.
Figure 5-5. Active Sessions
Step 2.You can filter by MAC address, protocol, port number, and by the number
of lines to be displayed.
Step 3.You can sort by MAC addresses.
The column headings provide the following information about sessions, as shown
in Table 5-3.
Table 5-3 Understanding the Active Session Information
HeadingDescription
ProtocolThe protocol for the client session. The following
protocols are translated from their numeric
strings: CMP, IGMP, TCP, UDP, ESP, AH, IP, and
PPTP. All other protocol are displayed as the
protocol number prefixed with a pound sign (#)
IdleThe time since the last packet was received.
5-6Viewing System Status
Table 5-3 Understanding the Active Session Information
HeadingDescription
MAC addressLists the MAC addresses of all clients that are
currently connected or the specific client chosen
by the MAC address filter
Client Source
Actual Source
Client Destination
Actual Destination
PortThe WLAN Access Manager or WLAN Secure
XmitThe number of bytes transmitted.
RecvThe number of bytes received
When a client sends a packet, it puts its IP
address in the header of packet, which is the
client source. If the client address is Network
Address Translated by the WLAN Access
Manager, the WLAN Access Manager rewrites
the IP address so it appears as if the client comes
from the WLAN Access Manager, which is the
client’s actual source IP address and port number
The client puts a destination IP address in a
packet, which is the client destination. The WLAN
Security System can rewrite packet’s destination
IP address, which is the actual destination.
Server port number used by the session
5.5Viewing Log Files
The WLAN Security System provides two types of logs for WLAN Secure Servers
and WLAN Access Managers:
• Informational logs that provide information about WLAN Security System
warnings
• Session logs that list each session
For information about Rights Manager logs, see Rights Manager Logs.
5.5.1Informational Logs
Each WLAN Secure Server and WLAN Access Manager logs events to an internal
file. Viewing these logs provides important information on the activity of the
WLAN Secure Server and WLAN Access Manager.
To view log files:
Step 1.Click View Log Files from the Main Menu.
The Log File appears, as shown in Figure 5-6.
EliteConnect WLAN Security System User Manual5-7
Step 2.Click on any log file.
Step 3.The most recent entries are shown first by default. You can filter the
entries in reverse order time order by deselecting Show most recent first
and clicking Apply Filter.
Step 4.You can filter log files based on severity, time period, or search based on
any string you type; as described in Table 5-1.
Step 5.Click Apply Filter to view filtered results; click Reset Filter to reset to the
default view.
Step 6.Click Export Log as plain text to save the log as a plain text file on your
web browser’s system. You might want to archive or forward the log file.
Note:Click Clear Log File to empty the log file of older information.
5.5.2Session logs
Session logs provide information about every completed session. These logs are
kept on a Syslog server.
A session log consists of a single line for each session. A typical session would be
represented as a string of parameters, delimited by spaces. These parameters are
defined in Table 5-4.
Figure 5-6. Viewing Log FIles
5-8Viewing System Status
Table 5-4 Session Log Parameters
Entry NameDefinition
StartStart time of session in seconds since
1/1/2000 12:00am GMT
DurationDuration of session in seconds
MACaddrUser’s MAC Address
ProtocolSession Protocol
Client.SourceClient Source IP and Port
Client.DestClient Destination IP and Port
Actual.SourceActual Source IP and Port
Actual.DestActual Destination IP and Port
Bytes.XmitBytes Transmitted
Bytes.RcvdBytes Received
5.6Viewing Version and License Information
You should know the current version of software run by your WLAN Security
System to upgrade your software or contact Technical Support. This page also tells
you the latest configuration change, IP address and Ethernet adapters.
To view version and license information, click Version and License Information
from the Main Menu.
EliteConnect WLAN Security System User Manual5-9
5-10Viewing System Status
CONFIGURINGTHE RIGHTS MANAGER
This chapter explains how to configure the Rights Manager for the WLAN Secure
Server. It includes the following sections:
Note:The information in this chapter is further explained through real-life examples in the
Rights Tutorial appendix.
6-1
6.1Rights Manager Terminology
The Rights Manager uses common terms in a very specific manner. Before starting
to administer rights, make sure you understand these terms:
A Location is a group of wheres. A Where is a WLAN Access Manager or a WLAN
Access Manager port or a specific client. Some set of rights are associated with the
location. See Section 6.4.5, Changing WLAN Access Manager Rights for more
information. Locations have wheres and whens associated with them.
Everywhere else is the location that a client belongs to if it does not associate with
any other location. Until you create another location, this is the location to which
all clients are associated.
A When is set of valid times that apply to a location or a group. See Section 6.5,
Changing Group Properties.
Groups define rights for users who are members of the group. A user can be a
member of a group and is given rights as part of the group. An Allowed Group is
a group allowed at a specified location. Groups can be one of the following types:
• Guest: the rights given to someone who clicks the Guest button on the logon
page.
• Implicit users: the base group in which rights are allocated to all authenticated
users at the specified location.
• Normal: the only group that users can belong to. A user cannot belong to a
Logon, Guest or Implicit User group.
• Logon: the rights given to a client who has not yet logged on.
See Section 6.6, Adding, Modifying, or Deleting a User for more information about
users.
A Realm is an ordered list of authentication services. See the Rights Tutorial for
more information. There are both Rights Manager realms and Kerberos realms.
Kerberos realms refer to the domain specified by Kerberos.
Allows specify packets that are permitted to be forwarded by a WLAN Secure
Server or a WLAN Access Manager. Allows can include:
• Destination protocol
• Destination port
• Destination IP address
Redirects specify packets that are allowed to be forwarded, but require that these
packets be redirected to a new destination, also specified by the redirect. An
example is requesting a DNS server; packets could be redirected to the enterprise
DNS server rather than the one that was originally specified. Redirects can include:
• Original protocol
• Original port
• Original address
6-2Configuring the Rights Manager
• Redirect port
• Redirect IP address
See Section 6.9, Redirecting Packets for more information.
Linger: a timer for how long the client is allowed to remain known by the Rights
Manager after being disassociated from the WLAN Access Manager. If the linger
setting is not exceeded, then the next time clients associate, they will receive the
rights they had before they disassociated
Expire: a timer that determines how long rights are valid after they are allocated
to a client.
6.2About the Rights Manager
The Rights Manager is the portion of the WLAN Secure Server that allocates rights
to devices and users in the EliteConnect WLAN Security System. The Rights
Manager enables you to determine site policy based on location, user groups,
times, and other choices.
This chapter and the Rights Tutorial Appendix describe how to configure rights
for your sites.
Figure 6-1 shows some simplified relationships that are part of managing rights.
Location
where when
Access
Manager
In Figure 6-1, rights are first a function of the Location, and then a result of the
where, when, and group to which a user belongs. In this example, User 2 is a
member of Group 1, while User 1 is a member of Groups 1 and 2.
Access
Manager
Allowed
times
Figure 6-1. RIghts Diagram
Allowed
times
group1
Rights for
group
1
group 2
Rights for
group 2
user 1
user 2
EliteConnect WLAN Security System User Manual6-3
6.2.1Two Simple Rights Examples
The following simple examples explain at a high level why you might want to
change rights. First, there is the visiting professor who comes to Cold Creek
University for the month of January. Second, the contractors who are implementing
a new student database for Cold Creek University need extra hours to complete
the project on schedule.
Example 1: Visiting Professor
Professor Lupine is visiting Cold Creek for the month of January to share his
research findings. Figure 6-2 shows a conceptual illustration of his rights compared
to those of usual professors at this location.
Location:
Cold Creek U
Where:
Chemistry
Bldg.
When:
When=
Usual
Group:
Usual
When:
Special
January 02
Group:
visitor
Appointed Faculty and
staff
Figure 6-2. Example 1: Visiting Professor
Visiting Professor Lupine
In Figure 6-2, Professor Lupine has access to the university network for the month
of January. He is part of the Professor group in the Chemistry building, but his
rights are limited based on when, while the usual professors have unlimited rights.
Example 2: Contractors with Extended Hours
The contractors who are completing implementation of a new student database
need access for additional hours. Figure 6-3 on page 6-5 shows the conceptual
overview of giving special database contractors extended hours.
6-4Configuring the Rights Manager
Location:
Cold Creek U
Where:
Admin office
Bldg.
When:
When=
Usual
Group:
Usual
General Contractors
Figure 6-3. Contractor Example
6.3Getting to the Rights Manager
To go to the Rights Manager:
Step 1.Set your browser to the IP address or hostname of the WLAN Secure
Server or WLAN Access Manager.
Step 2.Press Enter.
Step 3.The Main Menu appears, as shown in Figure 6-4.
When:
8AM midnight
Group:
ORA
ORA Database
Contractors
Figure 6-4. Main Menu
EliteConnect WLAN Security System User Manual6-5
Note:Any system connected through one of the WLAN Access Manager’s ports can access the
web interface through the 42.0.0.1 IP address for initial system configuration.
Step 4.
The Home screen for the Rights Manager shows each user and its MAC address,
the Where, which is the WLAN Access Manager or the WLAN Access Manager
plus its port, the client IP Address, and the date and time that the client’s rights
expire.
Click Goto Rights Manager.
The Rights Manager screen appears, as shown in Figure 6-5.
Figure 6-5. Home Rights Manager
6.4Changing Rights Associated with Locations
A Location is a group of Wheres, and some set of rights associated with the
location itself. A Where is a WLAN Access Manager or a WLAN Access Manager
port or a specific client. Locations are also associated with Whens, the times that
the location is available to groups of clients. See Changing the Time that a Group
is Valid for more information on changing the times associated with a group.
6.4.1Why Change Rights
You must configure the initial rights that are associated with a location to enable
the SMC WLAN Secure Server. After configuring initial rights, you might need to
add locations, modify the rights associated with a location, or delete locations
because the locations or the functions housed in the location might change.
6-6Configuring the Rights Manager
As an example, a room that was once used only for college professors might
become a location used for graduate student’s thesis demonstrations to defend
their research. In this example, you might want to limit access to only graduate
students so that only these students can use network resources.
6.4.2Adding a Location
To add a lo ca ti on:
Step 1.From the Rights Manager screen, click Locations.
Figure 6-6. Rights Manager
The Locations Manager appears, as shown in Figure 6-7.
Figure 6-7. Locations Manager
EliteConnect WLAN Security System User Manual6-7
Step 2.Click New Location.
The Location Editor appears, as shown in Figure 6-8 on page 6-8.
Figure 6-8. Locations Editor
Step 3.Type a loc at io n n ame.
Step 4.Add or change the Where:
a.Click New under Where to add a new WLAN Access Manager. See
Adding a WLAN Access Manager.
b.Click Edit under Where to change the properties of an existing WLAN
Access Manager. See Changing WLAN Access Manager Rights.
Note:You must have at least one Where.
Step 5.
Add or change the When: see Section , Changing the Time that a Group
is Valid.
6-8Configuring the Rights Manager
Note:If you leave When blank, it is available all of the time.
Step 6.
Add or change Groups: see Changing Group Properties.
a.Click New under Group to add a new group; see Adding a New
Group.
b.Click Edit under Group to change a groups’s rights; see Modifying a
Group’s Rights.
Note:All groups are disallowed except for those that you specifically allow.
Step 7.
Click NAT for this location, if applicable.
NAT determines if this location uses Network Address Translation for IP
addresses. The default is enable NAT; you must deselect NAT to use a
specified IP address.
Step 8.Type the Maximum number of users.
The maximum number of users permitted to use this location; the default
is unlimited.
Step 9.Click to disable or allow Encryption at this location.
Step 10.Choose whether to use L2TP and IPsec, IPSec, or PPTP.
Step 11.Click either:
a.Encryption allowed but not required
b.Require Encryption
c.Require Encryption except for: choose from the list of groups.
You can choose one or more of these groups.
Step 12.Click Enable PPTP/L2TP Authentication.
This box enables PPTP and L2TP authentication for this location.
Note: you might see No PPTP authentication realm defined with a radio
button indicated on, which means you cannot enable PPTP authentication
for this location until you create a PPTP realm.
Step 13.Choose a Realm.
If you have not yet created a realm, the default realm appears.
PPTP/L2TP Authentication Realm is the authentication realm that you
create. See Enforcing Authentication.
Step 14.Type and confirm the Shared Secret.
The shared secret is the shared secret for the enterprise network. The
shared secret is used instead of a PPTP realm. When selected, the user’s
password is compared with the shared secret to determine if the user is
authorized to create a PPTP tunnel.
Step 15.Type the Minimum session key length.
The minimum key length for the session key to encrypt a session; the
default value is 128 bits; alternate value is 40 bits.
EliteConnect WLAN Security System User Manual6-9
Step 16.Click to enable either MS-CHAP v2 or to enable MS-CHAP or MS-CHAP
v2.
Step 17.Click Update.
The Locations Editor now shows Music in the Location Name textbox, as shown in
Figure 6-9.
New Location Added
Figure 6-9. Location Editor With New Location to be Added
6-10Configuring the Rights Manager
6.4.3Modifying a Location
You can modify the following location attributes: its name, the ports in use, the
times, groups, and other options that allow it to be available for use.
To modify the characteristics of a location:
Step 1.In the Location Manager, as shown in Figure 6-7 on page 6-7, click the
location name that you want to modify.
The Location Editor appears, as shown in Figure 6-10.
Figure 6-10. Location Editor
Step 2.You can change the Where, When, Allowed Groups, or Options.
• You can change Where; seeModifying a WLAN Access Manager.
• You can change When: see Changing Group Properties.
• You can change the Allowed Groups: seeChanging Group Properties.
Step 3.Click Update.
EliteConnect WLAN Security System User Manual6-11
6.4.4Deleting a Location
To delete a location:
Step 1.Click a Location that you want to delete from the Location Editor, as
shown in Figure 6-11.
Figure 6-11. Location Manager with a Location to be Deleted
Step 2.Click Delete.
The Delete Confirmation Screen appears, as shown in Figure 6-12 on page 6-13.
6-12Configuring the Rights Manager
Figure 6-12. Delete Location Confirmation
Step 3.If you are sure you want to delete this location, click Yes. Otherwise, click
No.
6.4.5Changing WLAN Access Manager Rights
You might want to add, change, or delete rights associated with a WLAN Access
Manager if your environment has changed. For example, you might want to add a
WLAN Access Manager to handle increased network traffic in a meeting room. You
might want to modify the hours that a WLAN Access Manager supports if you
start offering night classes. You might delete a WLAN Access Manager’s rights if
you are closing the nearby area for renovation.
Adding a WLAN Access Manager
To add a WLAN Access Manager:
Step 1.Click Locations.
The Location Manager appears, as shown in Figure 6-13 on page 6-14.
EliteConnect WLAN Security System User Manual6-13
Figure 6-13. Location Manager
Step 2.Click New Location to add a WLAN Access Manager from the Locations
Manager menu.
The Locations Editor appears, as shown in Figure 6-14 on page 6-15.
6-14Configuring the Rights Manager
Figure 6-14. Location Editor
Step 3.Click New under Where.
The Where Editor appears, as shown in Figure 6-15.
EliteConnect WLAN Security System User Manual6-15
Figure 6-15. Where Editor
Step 4.Click New to add a new WLAN Access Manager.
The WLAN Access Manager Editor appears, as shown in Figure 6-16.
Figure 6-16. WLAN Access Manager Editor
Step 5.Type the WLAN Access Manager Name.
Step 6.Type the MAC address.
You can find the MAC address in the WLAN Access Manager Version and
License screen.
Step 7.Optionally, type a comment.
6-16Configuring the Rights Manager
Step 8.Click Update to create a new WLAN Access Manager.
The Where Editor appears with your new WLAN Access Manager, as
shown in Figure 6-17.
Step 9.Type a name for your Where.
Figure 6-17. Where Editor with the New WLAN Access Manager
Step 10.Click Update.
The Location Editor appears, as shown in Figure 6-18 on page 6-18.
Step 11.Click the Where you created.
EliteConnect WLAN Security System User Manual6-17
N
ew Where
Figure 6-18. Location Editor with New Where Added
Step 12.Click Update.
6-18Configuring the Rights Manager
Modifying a WLAN Access Manager
To modify a WLAN Access Manager
Step 1.Go to the Where Editor, as shown in Figure 6-19.
Figure 6-19. Where Editor with Graham and Geology
Step 2.Click Edit.
The Choose a WLAN Access Manager to Edit screen appears with the list
of the WLAN Access Manager at that location, as shown in Figure 6-20.
Figure 6-20. Choose WLAN Access Manager to Edit
Step 3.Click the WLAN Access Manager to edit.
The WLAN Access Manager appears, as shown in Figure 6-21 on page 6-
20.
EliteConnect WLAN Security System User Manual6-19
Figure 6-21. WLAN Access Manager Editor
Step 4.Change the MAC Address or comment as required.
Step 5.When you are done, click Update.
The WLAN Access Manager is modified or created if you changed the
WLAN Access Manager name.
Changing Other Where Properties
You can change other Where properties, as shown in Figure 6-22.
Figure 6-22. Where Editor
To chan ge Where properties:
• Click a specific port number or All to change the port number.
6-20Configuring the Rights Manager
• Click the checkbox for the Watch for NT Domain logons or Watch for 802.1x
logons to interoperate with your enterprise environment.
• Type a new Client MAC address.
See Section C.14, Example 9, Public Kiosk Location for an example of a client
MAC address.
Click Update.
Deleting a Where
To delete a Where:
Step 1.Click Edit under Where to select the WLAN Access Manager from the
Location Editor.
The Choose a Where to edit screen appears, as shown in Figure 6-23.
Figure 6-23. Choose a Where to Edit
Step 2.Choose the Where to edit from the list.
The Where Editor appears with the name of the WLAN Access Manager
you selected, as shown in Figure 6-24.
Figure 6-24. Where Editor with Where Name Selected
Step 3.Click Delete.
The Delete Confirmation screen appears, as shown in Figure 6-25.
EliteConnect WLAN Security System User Manual6-21
Figure 6-25. Where Delete Confirmation Screen
Step 4.To delete the Where, click Yes. Otherwise, click No.
6.5Changing Group Properties
Users can be members of one or more groups. Making a user a member of a group
is the basic way to deliver a set of rights for a collection of users. Group properties
include:
• group type, indicating the type of user
• valid times for the group (When)
• Allow rights
• Redirect rights
• Options
The Rights Manager has the following standard groups:
• Logon: users are users who have not yet logged in and have not been
authenticated
• Guest: users who have guest rights allocated
• Normal: authenticated users with the rights allocated to their group; this is the
base group for all authenticated users at the location.
• User Group: the base group in which rights are allocated to all authenticated
users at the specified location.
See Section 6.6.2, Modifying a User’s Characteristics for more information.
You can add or delete a group, or modify a group’s properties.
6.5.1Adding a New Group
Step 1.Click Groups.
The Groups Manager screen appears, as shown in Figure 6-26.
6-22Configuring the Rights Manager
Figure 6-26. Groups Manager
Step 2.Click New Group.
Step 3.Type the Group Name that you want to add, in this example, Contractors,
as shown in Figure 6-27 on page 6-24.
EliteConnect WLAN Security System User Manual6-23
Figure 6-27. Group Editor with Contractors
Step 4.Check the appropriate Group Type.
See Modifying a User’s Characteristics.
Step 5.Choose specific times when this group is allowed access. Under Valid
Times, click New.
The When Editor appears, as shown in Figure 6-31 on page 6-29. Click the
appropriate times these set of rights are valid or none if they are always
valid. See Changing the Time that a Group is Valid.
Step 6.Pick the set of rights for the group.
Table 6-1 explains the entries in the Group Editor.
6-24Configuring the Rights Manager
Table 6-1 Group Editor Rights Entries
EntryExplanation
Group NameThe name of a group you want to create, modify, or delete
Group TypeEither Normal, Guest, Logon, or Implicit Users
Valid TimesWhen these rights are valid
Has RightsSelect each right that you want members of this group to have
Match an NT Group NameUse these rights when a user logs into a Matching NT domain.
NATWhether NAT addresses are enabled.
Static IP allowedWhether static IP addresses are enabled or obtain the IP
address from DHCP.
Override max user
restrictions
Max concurrent logons per
user
Linger SecondsHow long to wait before logging off after the client
Expire SecondsHow long these rights are in effect.
Enable HTTP ProxyWhen checked, the HTTP Proxy is enabled
Use a browser cookie to
optimize logoffs
HTTP Proxy IP AddressWhen Enable HTTP Proxy is checked, the HTTP Proxy IP
HTTP Proxy PortWhen Enable HTTP Proxy is checked, the HTTP Proxy IP Port
Whether any member of this group can override the maximum
amount of users of a group at a location.
The maximum number of logons each user can have; the
default is UNLIMITED.
disassociates. The default is 300.
When checked, a browser cookie helps with logoffs saved
during logon.
Address.
Number.
Note:You can choose multiple Allows, Redirects, and valid times for a group. Your web
browser determines how you select individual rights. Using Microsoft Internet
Explorer™, for example, hold the Control key while you highlight the individual rights.
Using Netscape Navigator, hold down the Shift key while you select individual rights.
Step 7.
When you are done click Update.
The Group Manager screen appears with Contractors added as a group, as
shown in Figure 6-28 on page 6-26.
EliteConnect WLAN Security System User Manual6-25
Contractors Added
Figure 6-28. Groups Manager With Group Contractors Added
6.5.2Modifying a Group’s Rights
This section describes how to modify a group that was previously created by:
• Initially configuring the times when a group can access
• Changing the times when the group can access
• Changing the Allows that appear on the Group Manager screen
Note:If you leave When blank, it is available all of the time.
Initially Configuring Valid Times or Whens
To create valid times for a group:
Step 1.In the Group Manager screen, click the group you have created, in this
example, Contractors, as shown in Figure 6-29 on page 6-27.
6-26Configuring the Rights Manager
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.