HPE IMC BYOD WLAN 802.1X Authentication and Security Check Using inode Configuration Examples

Size: px
Start display at page:

Download "HPE IMC BYOD WLAN 802.1X Authentication and Security Check Using inode Configuration Examples"

Transcription

1 HPE IMC BYOD WLAN 802.1X Authentication and Security Check Using inode Configuration Examples Part Number: Software version: IMC UAM 7.2 (E0403) Document version: 2 The information in this document is subject to change without notice. Copyright 2016 Hewlett Packard Enterprise Development LP

2 Contents Introduction 1 Prerequisites 1 Example: Configuring WLAN 802.1X authentication and security check 1 Network configuration 1 Analysis 2 Software versions used 4 Restrictions and guidelines 4 Configuring the DHCP server 5 Configuring DHCP scopes 5 Configuring the DHCP Agent plugin 11 Configuring UAM 11 Configuring the AC as an access device 11 Configuring a share control policy 14 Configuring a security level 16 Configuring a security policy 17 Configuring an endpoint MAC group 18 Configuring an access policy 21 Configuring an access service 23 Adding or importing user accounts 25 Importing server and root certificates 29 Configuring WX Associating WX6103 with an AP 32 Configuring 802.1X authentication on WX Configuring MSM Configuring the security VLAN 36 Configuring a RADIUS profile 36 Configuring a VSC profile 37 Configuring a VSC binding 40 Deploying configurations from MSM 760 to the AP 40 Configuring the switch that connects the AP to MSM Configuring AIR-WLC2100-K9 41 Configuring authentication and accounting servers 41 Configuring the security VLAN 43 Configuring WLAN authentication 44 Configuring the upstream switch of AIR-WLC2100-K9 47 Verifying the configuration 48 i

3 Introduction This document provides examples for configuring UAM and an AC (H3C WX6103, HP MSM 760, or Cisco AIR-WLC2100-K9) to implement 802.1X authentication and security check for wireless users. Prerequisites Before you configure 802.1X authentication and security check, complete the following tasks: Obtain a server certificate and a root certificate from a certification authority. Deploy a DHCP server and a DNS server on the network. The example in this document uses the DHCP server and the DNS server that are embedded in Windows Server. On the DHCP server, install the DHCP Agent plugin to identify endpoint information and to obtain endpoint IP addresses for UAM. The DHCP Agent installation file HP IMC DHCP Agent.exe is located in the /UAM directory of the IMC installation path. Copy the file to the DHCP server and double-click it to install the DHCP Agent plugin. (Details not shown.) Example: Configuring WLAN 802.1X authentication and security check Network configuration As shown in Figure 1, Figure 2, and Figure 3, configure 802.1X authentication and security check for wireless users. The authentication and security check process is as follows: 1. A user uses the inode client to access the WLAN with SSID ss_byod_jay_1x. 2. UAM authenticates the user's PC based on a MAC address group: If the PC MAC address is in the group, the user passes authentication. If the PC MAC address is not in the group, the user fails authentication. 3. UAM implements security check on the authenticated PC: If the PC passes security check, UAM assigns the PC to the security VLAN 33. If the PC fails security check, UAM assigns the PC to the isolation VLAN 66 or logs off the PC: UAM isolates the PC when WX6103 is used as the access device. UAM logs off the PC when MSM 760 or AIR-WLC2100-K9 is used as the access device. 1

4 Figure 1 Network diagram (WX6103) Internet DNS server PC AP VLAN 1 SW VLAN 24 VLAN 24 DHCP server SSID: ss_byod_jay_1x Secure area: VLAN 33 Isolation area: VLAN 66 VLAN 1 VLAN 24 VLAN 24 imc UAM/EAD WX6103 VLAN-interface 1: VLAN-interface 24: VLAN-interface 33: VLAN-interface 66: Figure 2 Network diagram (MSM 760) MSM 760 VLAN-interface 1: Internet DNS server PC AP DHCP server SSID: ss_byod_jay_1x Secure area: VLAN 33 SW VLAN-interface 1: VLAN-interface 33: imc UAM/EAD Figure 3 Network diagram (AIR-WLC2100-K9) Internet DNS server PC AP AIR-WLC2100-K9 DHCP server VLAN-interface 1: SSID: ss_byod_jay_1x Secure area : VLAN 33 SW VLAN-interface 1: VLAN-interface 33: imc UAM/EAD Analysis Table 1 lists the tasks that must be performed to meet the network requirements. 2

5 Table 1 Requirements analysis Requirements Device Tasks 802.1X authentication Security check VLAN-based access control Obtaining endpoint IP addresses for UAM UAM AC UAM AC UAM AC AC Configure the AC as an access device. Configure an access policy, an access service, and user accounts: For WX6103, do not configure the deploy VLAN in the access policy. For MSM 760 or AIR-WLC2100-K9, specify the deploy VLAN in the access policy by VLAN name. On WX6103, configure VLAN, RADIUS scheme, authentication domain, port security, and WLAN settings. On MSM 760, configure VLAN, RADIUS profile, VSC profile, and VSC binding settings. On AIR-WLC2100-K9, configure authentication/accounting server, VLAN, and WLAN settings. Configure a share control policy. Configure a security level: For WX6103, select the isolation mode. For MSM 760 or AIR-WLC2100-K9, select the kick out mode. Configure a security policy: For WX6103, configure the isolation method, the security VLAN, and the isolation VLAN. MSM 760 and AIR-WLC2100-K9 require no isolation configurations. On WX6103, set the server type to extended for the RADIUS scheme. MSM 760 and AIR-WLC2100-K9 require no server type configurations. For WX6103, configure the security VLAN and the isolation VLAN in the security policy. For MSM 760 or AIR-WLC2100-K9, configure the security VLAN in the access policy. On WX6103, create the security VLAN 33 and the isolation VLAN 66. On MSM 760 and the connected switch, create the security VLAN 33. On AIR-WLC2100-K9 and the upstream switch, create the security VLAN 33. On WX6103, configure DHCP relay. On the switch connected to MSM 760, configure DHCP replay. On AIR-WLC2100-K9, configure DHCP replay. NOTE: When working with MSM 760 or AIR-WLC2100-K9, UAM does not support the isolation mode in the security policy. Therefore, UAM cannot deploy a VLAN to endpoints by implementing the security policy. It can deploy a VLAN only by implementing the access policy. The deploy VLAN in the access policy is equal to the security VLAN in the security policy. 3

6 Software versions used This configuration example was created and verified on the following platforms: IMC UAM 7.2 (E0403) EAD in IMC UAM 7.2 (E0402) DHCP server embedded in Windows Server 2008 R2 Datacenter Certificate server embedded in Windows Server 2008 R2 Datacenter HP IMC DHCP Agent Config Tool V7.0-E0102 H3C WX6103 Comware Software, Version 5.20, ESS2507P04 HP MSM 760 Software Version , Hardware Version B:48 Cisco AIR-WLC2100-K9 Software Version Windows XP SP3 inode PC 7.2 (E0403) Restrictions and guidelines When you configure 802.1X authentication and security check, follow these restrictions and guidelines: Deploy the servers (such as a Windows patch server) that PCs use in the isolation VLAN to remove unsecure conditions. UAM must provide both authentication and accounting services. Do not use another server to provide the accounting service. The service suffix configuration on UAM is closely related to the authentication domain configuration on the AC and to the username that an endpoint uses for authentication. 0, 0, and 0 show the parameter correlations for WX6103, MSM 760, and AIR-WLC2100-K9. Table 2 Parameter correlation on WX6103 Username Mandatory domain on WX6103 Authentication domain on WX6103 RADIUS command on WX6103 Service suffix on UAM X Y None Y Default domain user-name-format with-domain user-name-format without-domain user-name-format with-domain user-name-format without-domain Y No suffix Default domain No suffix X@Z Y None Y Z user-name-format with-domain user-name-format without-domain user-name-format with-domain user-name-format without-domain Y No suffix Z No suffix 4

7 Table 3 Parameter correlation on MSM 760 Username X X@Z How MSM 760 handles the account name MSM 760 sends usernames to UAM without making any modifications. Service suffix on UAM No suffix Z Table 4 Parameter correlation on AIR-WLC2100-K9 Username X X@Z How AIR-WLC2100-K9 handles the account name AIR-WLC2100-K9 sends usernames to UAM without making any modifications. Service suffix on UAM No suffix Z The examples show how to configure a service suffix. Use the following guidelines when you configure the service suffix: On UAM, configure the service suffix as Y. On a PC, use the username in X@Y format. On the AC: On WX6103, configure the dot1x mandatory-domain Y command on the WLAN-ESS interface for wireless users, and configure the user-name-format with-domain command for the RADIUS scheme for wireless users. MSM 760 and AIR-WLC2100-K9 require no configurations. When you add the AC to UAM as an access device, use the following guidelines: UAM must have the same port and shared key settings for authentication and accounting communication as the AC. Guidelines for specifying the AC IP address on UAM: For WX6103, specify the NAS IP address configured with the nas-ip command on WX6103 as the AC IP address. If the nas-ip command is not configured, specify the IP address of the physical interface or VLAN-interface that connects to UAM. For MSM 760 or AIR-WLC2100-K9, specify the IP address of the interface that connects to UAM as the AC IP address. If you select the AC from the platform, make sure the AC has been added to the IMC platform. If the AC in the IMC platform has an incorrect IP address, you must manually specify the IP address of the AC on UAM. Guidelines for specifying the deploy VLAN for an access policy on UAM: If WX6103 is used as the access device, specify the deploy VLAN by VLAN ID. If MSM 760 or AIR-WLC2100-K9 is used as the access device, specify the deploy VLAN by VLAN name. When configuring WX6103, you must execute the mac-vlan enable command on the WLAN-ESS interface for wireless users. Configuring the DHCP server Configuring DHCP scopes This example creates two scopes for 802.1X authentication. As shown in Table 5, scope 1x applies to the isolation VLAN, and scope 1x-isolate applies to the security VLAN. 5

8 Table 5 Scope configurations Scope name IP range Subnet mask Default gateway VLAN 1x to Security VLAN 33 1x-isolate to Isolation VLAN 66 The procedure for creating scopes 1x and 1x-isolate is the same. This example uses the 1x scope. To create scope 1x: 1. Start the DHCP server. 2. From the navigation tree, right-click IPv4 and select New Scope from the shortcut menu. The New Scope Wizard opens. 3. Click Next. The Scope Name page opens. 4. Enter 1x in the Name field, and then click Next, as shown in Figure 4. Figure 4 Scope Name 5. On the IP Address Range page, configure the following parameters, as shown in Figure 5: a. Enter in the Start IP address field, and in the End IP address field. b. Specify as the subnet mask. 6

9 Figure 5 IP Address Range 6. Click Next. 7. On the Add Exclusions and Delay page, click Next, as shown in Figure 6. Figure 6 Add Exclusions and Delay 8. On the Lease Duration page, use the default settings, and then click Next, as shown in Figure 7. 7

10 Figure 7 Lease Duration 9. On the Configure DHCP Options page, select Yes, I want to configure these options now, and then click Next, as shown in Figure 8. Figure 8 Configure DHCP Options 10. On the Router (Default Gateway) page, specify as the default gateway, and then click Next, as shown in Figure 9. 8

11 Figure 9 Router (Default Gateway) 11. On the Domain Name and DNS Servers page, specify the parent domain name and the DNS server IP address, and then click Next, as shown in Figure 10. This example uses uam.test.com as the parent domain name and as the DNS server IP address. Figure 10 Domain Name and DNS Servers 12. On the WINS Servers page, click Next, as shown in Figure 11. 9

12 Figure 11 WINS Servers 13. On the Activate Scope page, select Yes, I want to activate this scope now, and then click Next, as shown in Figure 12. Figure 12 Activate Scope 14. On the Completing the New Scope Wizard page, click Finish. The new DHCP scope is added to the DHCP page. The DHCP server applies this scope to wireless users who pass 802.1X authentication. 10

13 Configuring the DHCP Agent plugin 1. Double-click the DHCP Agent shortcut on the desktop to start the DHCP Agent. 2. Configure the following parameters, as shown in Figure 13: a. Select the Enable Agent option. b. Enter the IP address of the UAM server. This example uses c. Use the default UAM server port (1810) and log level. Figure 13 Configuring the DHCP Agent 3. Click Save Configuration. 4. Click Enable DHCP Server. When the DHCP Agent is operating correctly, you can see a green check mark Status area. Configuring UAM Configuring the AC as an access device in the Agent 1. Click the User tab. 2. From the navigation tree, select User Access Policy > Access Device Management > Access Device. 3. Click Add, as shown in Figure

14 Figure 14 Accessing the access device list The Add Access Device page opens, as shown in Figure 15. Figure 15 Adding an access device 4. Add the AC to UAM as an access device. You can manually add a device or select a device from the IMC platform. You cannot modify the IP address of the device that is selected from the IMC platform. This example uses the manual method. For more information about adding an access device to UAM, see "Configuring the AC as an access device." To manually add the AC to UAM: a. In the Device List area, click Add Manually. b. Configure the AC IP address: For WX6103, enter in the Start IP field, as shown in Figure 16. For MSM 760, enter in the Start IP field. 12

15 For AIR-WLC2100-K9, enter in the Start IP field. Figure 16 Adding an access device manually c. Click OK. 5. Configure the access device, as shown in Figure 17: a. Enter 1812 in the Authentication Port field. The default authentication port is b. Enter 1813 in the Accounting Port field. The default accounting port is c. Select Fully Supported from the RADIUS Accounting list. d. Select LAN Access Service from the Service Type list. e. Select a device type from the Access Device Type list: Select H3C (General) for WX6103. Select HP (General) for MSM 760. Select CISCO (General) for AIR-WLC2100-K9. f. Enter hello in the Shared Key field. If the Confirm Shared Key field appears, also enter hello in that field. g. Use the default values for the Service Group and Access Device Group fields. 13

16 Figure 17 Configuring the access device 6. Click OK. 7. Click Back to Access Device List. The AC is added to the access device list, as shown in Figure 18. Figure 18 Viewing the AC Configuring a share control policy 1. From the navigation tree, select User Security Policy > Share Control. The share control list opens. 2. Click Add, as shown in Figure

17 Figure 19 Accessing the share control list 3. Configure the share control policy, as shown in Figure 20: a. Enter share for 1x in the Share Control Name field. b. Select the Forbid Default Share and Forbid Windows XP Simple Share options. c. Use the default values for other parameters. Figure 20 Configuring the share control policy 4. Click OK. The share control policy is added to the share control list, as shown in Figure 21. Figure 21 Viewing the share control policy 15

18 Configuring a security level 1. From the navigation tree, select User Security Policy > Security Level. The security level list opens. 2. Click Add, as shown in Figure 22. Figure 22 Accessing the security level list 3. Configure the security level, as shown in Figure 23: a. Enter level1x in the Security Level Name field. b. Enter 5 in the Action After field. c. In the Check Share Control area, select an action: For WX6103, select Isolate from the share for 1x list. For MSM 760 or AIR-WLC2100-K9, select Kick Out from the share for 1x list. d. Use the default values for other parameters. Figure 23 Configuring the security level 4. Click OK. The security level is added to the security level list, as shown in Figure

19 Figure 24 Viewing the security level Configuring a security policy 1. From the navigation tree, select User Security Policy > Security Policy. The security policy list opens. 2. Click Add, as shown in Figure 25. Figure 25 Accessing the security policy list 3. Configure the security policy, as shown in Figure 26: a. Enter policy1x in the Policy Name field. b. Select level1x from the Security Level list. c. Select the Monitor in Real Time option. d. Enter 5 in the Process After field. e. Configure the isolation mode: For WX6103, select the Configure Isolation Mode option, and specify VLAN 33 as the security VLAN and VLAN 66 as the isolation VLAN. For MSM 760 or AIR-WLC2100-K9, uncheck the Configure Isolation Mode option. f. Configure the share control parameters: Select the Check Share option. Select share for 1x from the Share Control list. g. Use the default values for other parameters. 17

20 Figure 26 Configuring the security policy 4. Click OK. The security policy is added to the security policy list, as shown in Figure 27. Figure 27 Viewing the security policy Configuring an endpoint MAC group This example uses an endpoint MAC group to implement access control on PCs. 18

21 When creating the endpoint MAC group, you can add MAC addresses one by one or import MAC addresses in batches to the group. Adding an endpoint MAC address 1. From the navigation tree, select User Access Policy > Access Condition > Endpoint MAC Group. The endpoint MAC group list opens. 2. Click Add, as shown in Figure 28. Figure 28 Accessing the endpoint MAC group list 3. Configure the endpoint MAC group: a. Enter for1x in the Endpoint MAC Group Name field, as shown in Figure 29. Figure 29 Configuring the group name b. In the Endpoint MAC List, click Add. c. Enter a MAC address in the Endpoint MAC field, and then click OK, as shown in Figure 30. The MAC address must be in the XX:XX:XX:XX:XX:XX, XX-XX-XX-XX-XX-XX, or XXXX-XXXX-XXXX format. This example uses 00-B0-8C-D1-D3-D2. 19

22 Figure 30 Adding a MAC address Repeat steps b and c to add more MAC addresses. 4. On the Add Endpoint MAC Group page, click OK. Importing MAC addresses in batches 1. In the endpoint MAC group list, click Batch Import. 2. Configure the endpoint MAC group, as shown in Figure 31: a. Enter for1x in the Endpoint MAC Group Name field. b. Click Browse for the Import File field. c. Select the text file containing PC MAC addresses. The file must be in ANSI format. d. Select Space from the Column Separator list as the column separator used in the file. Figure 31 Configuring the group name 3. Click Next. 4. Select the file columns for the Access MAC Address and Description fields, as shown in Figure

23 Figure 32 Selecting file columns 5. Click Preview. The Preview Import Result page opens, as shown in Figure 33. Figure 33 Previewing the import result 6. Close the Preview Import Result page. 7. On the Batch Import Endpoint MACs page, click OK. Configuring an access policy 1. From the navigation tree, select User Access Policy > Access Policy. The access policy list opens. 2. Click Add, as shown in Figure 34. Figure 34 Accessing the access policy list 3. Configure the access policy, as shown in Figure 35: a. Enter byodjay1x in the Access Policy Name field. b. Select EAP-PEAP from the Preferred EAP Type list. 21

24 c. Select EAP-MSCHAPv2 from the Subtype list. d. Configure the deploy VLAN. For WX6103, do not configure the deploy VLAN, as shown in Figure 36. There is no need to configure the deploy VLAN for the access policy because the security and isolation VLANs of the security policy have a higher priority. Figure 35 Configuring the access policy (WX6103) For MSM 760 or AIR-WLC2100-K9, specify VLAN ssbyodjay1x as the deploy VLAN, as shown in Figure 36. Because no VLAN is configured in the security policy, you need to configure the deploy VLAN for users who pass the security check. The deploy VLAN name on UAM and the AC must be the same. Figure 36 Deploy VLAN for MSM 760 or AIR-WLC2100-K9 e. Use the default values for other parameters. 4. Click OK. The access policy is added to the access policy list, as shown in Figure

25 Figure 37 Viewing the access policy Configuring an access service This example uses the endpoint MAC group, the access policy, and the security policy to provide the authorization service for users. To configure an access service: 1. From the navigation tree, select User Access Policy > Access Service. The access service list opens. 2. Click Add, as shown in Figure 38. Figure 38 Accessing the access service list 3. Configure the basic information for the access service, as shown in Figure 39: a. Enter 1x-service in the Service Name field. b. Enter 1x in the Service Suffix field. c. Select Access Forbidden from the Default Access Policy list. d. Use the default values for other parameters. 23

26 Figure 39 Configuring access service basic information 4. In the Access Scenario List area, click Add. 5. Configure the access scenario, as shown in Figure 40: a. Enter 1x in the Access Scenario Name field. b. Select for1x from the Endpoint MAC Group list. c. Select byodjay1x from the Access Policy list. d. Select policy1x from the Security Policy list. e. Use the default values for other parameters. Figure 40 Configuring the access scenario 24

27 6. On the Add Access Scenario page, click OK. 7. On the Add Access Service page, click OK. The access service is added to the access service list, as shown in Figure 41. Figure 41 Viewing the access service Adding or importing user accounts Adding a user account 1. From the navigation tree, select Access User > All Access Users. The access user list opens. 2. Click Add, as shown in Figure 42. Figure 42 Accessing the access user list The Add Access User page opens, as shown in Figure

28 Figure 43 Adding a user account 3. Click Select next to the User Name field, select a user from the IMC platform, and then click OK, as shown in Figure 44. This example uses ftest. Figure 44 Selecting a user from the IMC platform 4. Configure the user account, as shown in Figure 45: a. Enter jay in the Account Name field. b. Enter a password in the Password and Confirm Password fields. c. Select 1x-service from the Access Service list. d. Use the default values for other parameters. 26

29 Figure 45 Configuring the user account 5. Click OK. Importing user accounts in batches 1. In the access user list, click Batch Import. The Import Accounts in Batches page opens, as shown in Figure 46. Figure 46 Importing user accounts in batches 2. Click Browser next to the Import File field. 3. Select the text file containing user accounts. The file must be in ANSI format. 27

30 4. Select the column separator used in the file from the Column Separator list. 5. Select the Import Platform Users option. 6. Click Next. 7. Configure the user account parameters, as shown in Figure 47: a. Select the file columns for the User Name, Identity Number, Account Name, and Password fields. b. Select 1x-service from the Access Service list. c. Use the default values for other parameters. Figure 47 Configuring user account parameters 8. Click Preview. The Preview Import Result page opens, as shown in.figure 48 Figure 48 Previewing the import result 28

31 9. Close the Preview Import Result page. 10. Click OK. Importing server and root certificates 1. From the navigation tree, select User Access Policy > Service Parameters > Certificate. The Certificate page opens, as shown in Figure 49. Figure 49 Accessing the Certificate page 2. On the Root Certificate tab, click Import EAP Root Certificate. 3. Click Browse and select a root certificate, as shown in Figure 50. Figure 50 Selecting the root certificate 4. Click Next. The CRL configuration page opens, as shown in Figure 51. In this example, the CRL configuration is skipped. 29

32 Figure 51 CRL configuration 5. Click OK. The imported root certificate is added to the Root Certificate tab, as shown in Figure 52. Figure 52 Viewing the imported root certificate 6. Click the Server Certificate tab, as shown in Figure 53. Figure 53 Selecting a server certificate 7. Click Import EAP Server Certificate. 30

33 8. Select Private key is included in server certificate file, click Browse next to the Server Certificate File field, and select a server certificate, as shown in Figure 54. Figure 54 Selecting the server certificate 9. Click Next. 10. Enter the password for the server private key, as shown in Figure 55. Use the same password specified during server certificate export. Figure 55 Entering the server certificate key password 11. Click OK. The imported server certificate is added to the Server Certificate tab, as shown in Figure 56. Figure 56 Viewing the imported server certificate 31

34 Configuring WX6103 Associating WX6103 with an AP After you associate WX6103 with an AP, the two devices establish a tunnel to forward traffic. You can manually or automatically associate WX6103 with an AP. This example uses the manual method. 1. On the AP, display information about the AP and record its model number, serial ID, hardware version, and software version. <WA2612-AGN>display wlan ap Display AP Profile Model Number Serial-ID : WA2612-AGN AP Address : H/W Version S/W Version : A0ALC : Ver.D Boot Version : 1.23 Mode Device State Master AC: Description AC Address State : V100R001B71D024( ) : Split Mac Mode : Zero configuration state : -NA- Transmitted control packets : 0 : -NA- Received control packets : 0 Transmitted data packets : 0 Received data packets : 0 Latest AC IP address Tunnel Down Reason : BDisc : -NA- : -NA Unicast static AC IPv4 address: Not Configured Unicast static AC IPv6 address: Not Configured Configure WX6103: # Enable WLAN service. <H3C>system-view System View: return to User View with Ctrl+Z. [H3C]wlan enable % Info: WLAN service enabled # Create AP template byod and specify the AP model number. [H3C]wlan ap byod model WA2612-AGN # Specify the AP serial ID. [H3C-wlan-ap-byod]serial-id A0ALC [H3C-wlan-ap-byod]quit # Specify the software and hardware versions of the AP. [H3C]wlan apdb WA2612-AGN Ver.D V100R001B71D024 32

35 3. On the AP, specify the IP address of WX6103. <WA2612-AGN>system-view System View: return to User View with Ctrl+Z. [WA2612-AGN]wlan ac ip Verify that WX6103 is associated with the AP. # On WX6103, display all associated APs. [H3C]display wlan ap all Total Number of APs configured : 1 Total Number of configured APs connected : 0 Total Number of auto APs connected : 1 AP Profiles State : I = Idle, J = Join, JA = JoinAck, IL = ImageLoad C = Config, R = Run, KU = KeyUpdate, KC = KeyCfm AP Name State Model Serial-ID Byod R/M WA2612-AGN A0ALC The R/M state of the AP indicates that WX6103 and the AP have been associated. Configuring 802.1X authentication on WX Configure a RADIUS scheme: # On WX6103, create RADIUS scheme byodjay1x and enter its view. <WX6103>system-view System View: return to User View with Ctrl+Z. [WX6103]radius scheme byodjay1x New Radius scheme # Specify the IP address of the authentication and accounting servers (UAM) as , and set the shared key for authentication and accounting communications to hello. [WX6103-radius-byodjay1x]primary authentication [WX6103-radius-byodjay1x]primary accounting [WX6103-radius-byodjay1x]key authentication hello [WX6103-radius-byodjay1x]key accounting hello NOTE: UAM supports only one shared key. You must configure the same key for both authentication and accounting communications. # Specify the source IP address of RADIUS packets sent to UAM. [WX6103-radius-byodjay1x]nas-ip # Set the RADIUS server type to extended. [WX6103-radius-byodjay1x]server-type extended # Configure the usernames sent to the RADIUS server to include the ISP domain name. [WX6103-radius-byodjay1x]user-name-format with-domain [WX6103-radius-byodjay1x]quit 2. Configure an ISP domain: # Create ISP domain 1x and enter its view. 33

36 [WX6103]domain 1x # Configure the ISP domain to use RADIUS scheme byodjay1x for authentication, authorization, and accounting. [WX6103-isp-1x]authentication default radius-scheme byodjay1x [WX6103-isp-1x]authorization default radius-scheme byodjay1x [WX6103-isp-1x]accounting default radius-scheme byodjay1x [WX6103-isp-1x]quit # Configure ISP domain 1x as the default ISP domain. [WX6103]domain default enable 1x 3. Configure the DHCP relay agent and VLANs: # Enable DHCP and specify DHCP server for DHCP server group 1. [WX6103]dhcp enable [WX6103]dhcp relay server-group 1 ip # Create the security VLAN 33. [WX6103]vlan 33 [WX6103-vlan33]quit # Assign IP address to VLAN-interface 33. The IP address is the gateway address for DHCP scope 1x. [WX6103]interface Vlan-interface 33 [WX6103-Vlan-interface33]ip address # Enable DHCP relay agent on VLAN-interface 33, and associate DHCP server group 1 with the interface. [WX6103-Vlan-interface33]dhcp select relay [WX6103-Vlan-interface33]dhcp relay server-select 1 [WX6103-Vlan-interface33]quit # Advertise the network /24. (Details not shown.) # Create the isolation VLAN 66. [WX6103]vlan 66 [WX6103-vlan66]quit # Assign IP address to VLAN-interface 66. The IP address is the gateway address for DHCP scope 1x-isolate. [WX6103]interface Vlan-interface 66 [WX6103-Vlan-interface66]ip address # Enable DHCP relay agent on VLAN-interface 66, and associate DHCP server group 1 with the interface. [WX6103-Vlan-interface66]dhcp select relay [WX6103-Vlan-interface66]dhcp relay server-select 1 [WX6103-Vlan-interface66]quit # Advertise the network /24, and configure ACLs to control user access in VLAN 66. (Details not shown.) 4. Configure 802.1X authentication: # Create WLAN-ESS interface 33, set its port link type to hybrid, and enable MAC-based VLAN on the interface. [WX6103]interface wlan-ess 33 [WX6103-WLAN-ESS33]port link-type hybrid [WX6103-WLAN-ESS33]mac-vlan enable # Enable 802.1X authentication on WLAN-ESS interface 33. [WX6103-WLAN-ESS33]port-security port-mode userlogin-secure-ext 34

37 # Enable key negotiation of the 11key type on WLAN-ESS interface 33. [WX6103-WLAN-ESS33]port-security tx-key-type 11key # Specify ISP domain 1x as the mandatory authentication domain on WLAN-ESS interface 33. [WX6103-WLAN-ESS33]dot1x mandatory-domain 1x [WX6103-WLAN-ESS33]quit # Globally enable port security. For 802.1X authentication to take effect on a port, you must enable port security globally and on the port. [WX6103]port-security enable # Set the 802.1X authentication method to EAP. [WX6103]dot1x authentication-method eap 5. Configure a service template: # Create crypto type WLAN service template 33 for 802.1X authentication. [WX6103]wlan service-template 33 crypto # Configure the SSID of the service template as ss_byod_jay_1x. [WX6103-wlan-st-33]ssid ss_byod_jay_1x # Associate the service template with WLAN-ESS interface 33. [WX6103-wlan-st-33]bind wlan-ess 33 # Configure the service template to use the open-system authentication method. This authentication method is required if WPA is used. [WX6103-wlan-st-33]authentication-method open-system # Configure the security IE as WPA and cipher suite as TKIP. [WX6103-wlan-st-33]security-ie wpa [WX6103-wlan-st-33]cipher-suite tkip # Enable the service template. [WX6103-wlan-st-33]service-template enable Please wait... Done. [WX6103-wlan-st-33]quit 6. Create radio policy byodjay1x. You can skip this step to use the default radio policy. [WX6103]wlan radio-policy byodjay1x [WX6103-wlan-rp-byodjay1x]beacon-interval 200 [WX6103-wlan-rp-byodjay1x]dtim 4 [WX6103-wlan-rp-byodjay1x]rts-threshold 2300 [WX6103-wlan-rp-byodjay1x]fragment-threshold 2200 [WX6103-wlan-rp-byodjay1x]short-retry threshold 6 [WX6103-wlan-rp-byodjay1x]long-retry threshold 5 [WX6103-wlan-rp-byodjay1x]max-rx-duration 500 [WX6103-wlan-rp-byodjay1x]quit 7. Enter AP template byod and associate radio 1 with radio policy byodjay1x and service template 33. [WX6103]wlan ap byod [WX6103-wlan-ap-byod]radio 1 [WX6103-wlan-ap-byod-radio-1]channel auto [WX6103-wlan-ap-byod-radio-1]radio-policy byodjay1x [WX6103-wlan-ap-byod-radio-1]service-template 33 [WX6103-wlan-ap-byod-radio-1]radio enable [WX6103-wlan-ap-byod-radio-1]quit [WX6103-wlan-ap-byod]quit 35

38 Configuring MSM 760 Configuring the security VLAN 1. Log in to the Web interface of MSM From the navigation tree, select Network Tree > Controller. 3. Select Network > Network profiles. 4. Click Add New Profile. 5. Configure the VLAN name as ssbyodjay1x and VLAN ID as 33, as shown in Figure 57. Figure 57 Configuring the security VLAN 6. Click Save. Configuring a RADIUS profile 1. From the navigation tree, select Network Tree > Controller. 2. Select Authentication > RADIUS profiles. 3. Click Add New Profile. 4. Configure the RADIUS profile, as shown in Figure 58: a. Enter ss_byod_jay_1x in the Profile name field. b. Enter 1812 in the Authentication port field and 1813 in the Accounting port field. c. Select EAP MD5 from the Authentication method list. d. Enter in the Server address field for the primary RADIUS server. e. Enter hello in the Secret and Confirm secret fields for the primary RADIUS server. f. Use the default values for other parameters. 36

39 Figure 58 Configuring a RADIUS profile 5. Click Save. Configuring a VSC profile 1. From the navigation tree, select Network Tree > Controller > VSCs. 2. Select Overview > VSC profiles. 3. Click Add New VSC Profile. 4. Configure the VSC profile, as shown in Figure 59: a. Configure Global parameters: Enter ss_byod_jay_1x in the Profile name field. Select Authentication and uncheck Access control for the Use Controller for field. b. Configure Virtual AP parameters: Select the Virtual AP option. Enter ss_byod_jay_1x in the Name (SSID) field. Select the Broadcast name (SSID) option. c. Configure Wireless protection parameters: Select the Wireless protection option, and select WPA from the list next to the option. 37

40 Select WPA (TKIP) from the Mode list. Select Dynamic from the Key source list. d. Configure 802.1X authentication parameters: Select the 802.1X authentication option. Select the Remote option. Select ss_byod_jay_1x from the RADIUS list. Select ss_byod_jay_1x from the RADIUS accounting list. e. Uncheck the MAC-based authentication option. f. Use the default values for other parameters. 38

41 Figure 59 Configuring a VSC profile 39

42 5. Click Save. Configuring a VSC binding 1. From the navigation tree, select Network Tree > Controller. 2. Expand the Controlled APs node, and select the AP group to which the AP belongs. 3. Click the VSC bindings tab. 4. Click Add New Binding. 5. Select ss_byod_jay_1x from the VSC Profile list, as shown in Figure 60. Figure 60 Configuring a VSC binding 6. Click Save. Deploying configurations from MSM 760 to the AP 1. From the navigation tree, select Unsynchronized. 2. Select Overview > Discovered APs. 3. Select Synchronize Configuration from the Select the action to apply to all listed APs list, and then click Apply, as shown in Figure 61. Figure 61 Deploying configurations to the AP 40

43 Configuring the switch that connects the AP to MSM On the switch, enable DHCP, and specify DHCP server for DHCP server group 1. <SW>system-view System View: return to User View with Ctrl+Z. [SW]dhcp enable [SW]dhcp relay server-group 1 ip Create the security VLAN 33. [SW]vlan 33 [SW-vlan33]quit 3. Assign IP address to VLAN-interface 33. The IP address is the gateway address for DHCP scope 1x. [SW]interface Vlan-interface 33 [SW-Vlan-interface33]ip address Enable DHCP relay agent on VLAN-interface 33 and associate DHCP server group 1 with the interface. [SW-Vlan-interface33]dhcp select relay [SW-Vlan-interface33]dhcp relay server-select 1 [SW-Vlan-interface33]quit 5. Advertise the network /24. (Details not shown.) Configuring AIR-WLC2100-K9 Configuring authentication and accounting servers Configuring the authentication server 1. Click the SECURITY tab. 2. From the navigation tree, select AAA > RADIUS > Authentication. 3. On the RADIUS Authentication Servers page, click New. 4. Configure the following parameters, as shown in Figure 62: a. Enter in the Server IP Address field. b. Enter hello in the Shared Secret and Confirm Shared Secret fields. c. Enter 1812 in the Port Number field. d. Use the default values for other parameters. 41

44 Figure 62 Configuring the authentication server 5. Click Apply. Configuring the accounting server 1. From the navigation tree, select AAA > RADIUS > Accounting. 2. On the RADIUS Accounting Servers page, click New. 3. Configure the following parameters, as shown in Figure 63: a. Enter in the Server IP Address field. b. Enter hello in the Shared Secret and Confirm Shared Secret fields. c. Enter 1813 in the Port Number field. d. Use the default values for other parameters. Figure 63 Configuring the accounting server 4. Click Apply. 42

45 Configuring the security VLAN 1. Click the CONTROLLER tab. 2. From the navigation tree, click Interfaces. 3. On the Interfaces page, click New. 4. Configure the following parameters, as shown in Figure 64: a. Enter ssbyodjay1x in the Interface Name field. b. Enter 33 in the VLAN ID field. Figure 64 Adding the security VLAN 5. Click Apply. 6. On the Edit page, configure the following parameters, as shown in Figure 65: a. Enter the number of the port that connects to the upstream switch in the Port Number field. This example uses 1. b. Enter 33 in the VLAN Identifier field. c. Enter in the IP Address field. d. Enter in the Netmask field. e. Enter in the Gateway field. f. Enter in the Primary DHCP Server field. g. Use the default values for other parameters. 43

46 Figure 65 Configuring the security VLAN 7. Click Apply. Configuring WLAN authentication 1. Click the WLANs tab. 2. From the navigation tree, select WLANs > WLANs. 3. On the WLANs page, select Create New from the list in top-left corner, and then click Go. 4. Configure the following parameters, as shown in Figure 66: a. Enter ss_byod_jay_1x in the Profile Name field. b. Enter ss_byod_jay_1x in the SSID field. c. Use the default values for other parameters. 44

47 Figure 66 Adding a WLAN 5. Click Apply. The page for editing the WLAN opens. 6. Click the General tab and configure the following parameters, as shown in Figure 67: a. Select the Enabled option for Status. b. Use the default values for other parameters. Figure 67 General settings 7. Click the Security tab and do the following: a. Click the Layer 2 tab and configure the following parameters, as shown in Figure 68: Select WPA+WPA2 from the Layer 2 Security list. Select WPA Policy and WPA2 Policy. Select TKIP for both WPA Encryption and WPA2 Encryption. Select 802.1X from the Auth Key Mgmt list. 45

48 Figure 68 Layer 2 settings b. Use the default settings on the Layer 3 tab. c. Click the AAA Servers tab and configure the following parameters, as shown in Figure 69: Select the Enabled option for Radius Server Overwrite interface. Select the Enabled option for Authentication Servers, and select IP: , Port:1812 from the Server 1 list. Select the Enabled option for Accounting Servers, and select IP: , Port:1813 from the Server 1 list. Figure 69 AAA Servers settings 8. Use the default settings on the QoS tab. 9. Click the Advanced tab and configure the following parameters, as shown in Figure 70: a. Select Radius NAC from the NAC State list. b. Use the default values for other parameters. 46

49 Figure 70 Advanced settings 10. Click Apply. 11. From the navigation tree, select Advanced > AP Groups. 12. In the AP groups list, click default-group. The Edit 'default-group' page opens. 13. Click the WLANs tab. The ss_byod_jay_1x WLAN is added to the WLAN list of the default group, as shown in Figure 71. Figure 71 WLAN ss_byod_jay_1x in the default group Configuring the upstream switch of AIR-WLC2100-K9 1. Create the security VLAN 33. [SW]vlan 33 [SW-vlan33]quit 2. Assign IP address /24 to VLAN-interface 33. The IP address is the gateway address for DHCP scope 1x. [SW]interface Vlan-interface 33 47

50 [SW-Vlan-interface33]ip address [SW-Vlan-interface33]quit 3. Advertise the network /24. (Details not shown.) Verifying the configuration If a PC's MAC address is not in the endpoint MAC group, the PC cannot pass 802.1X authentication. (Authentication details not shown.) To verify the configuration: 1. On the PC with MAC address 00-B0-8C-D1-D3-D2, install the inode client that supports WLAN access. 2. Start the inode client. 3. Click the Refresh icon to obtain all available SSIDs, as shown in Figure 72. Figure 72 Displaying all SSIDs 4. Double-click SSID ss_byod_jay_1x in the list. 5. Enter the username and password, as shown in Figure

51 Figure 73 Providing the user credentials 6. Click Connect. The authentication and security check process starts. After the process is completed, the client displays the security check result. In this example, the user fails security check. UAM allows the user to access the security VLAN within 300 seconds. When the threshold is reached, UAM does the following: If the unsecure condition is removed, UAM allows the user to continue accessing the security VLAN 33. If the unsecure condition is not removed, UAM assigns the user to the isolation VLAN 66 (for WX6103) or logs off the user (for MSM 760 and AIR-WLC2100-K9). In this example, the unsecure condition is not removed, and UAM isolates the user, as shown in Figure 74. Figure 74 Security check result 7. Remove the unsecure condition from the PC. (Details not shown.) 49

52 8. On the inode client, click the Refresh icon and initiate 802.1X authentication again. The user passes the security check and is assigned an IP address of the security VLAN 33, as shown in Figure 75. You can view the user IP address on the NICs tab of the Management Plat page. Figure 75 Viewing the user IP address 50

HPE IMC UAM BYOD Quick Deployment on Mobile Device Configuration Examples

HPE IMC UAM BYOD Quick Deployment on Mobile Device Configuration Examples HPE IMC UAM BYOD Quick Deployment on Mobile Device Configuration Examples Part Number: 5200-1387 Software version: IMC UAM 7.2 (E0403) Document version: 2 The information in this document is subject to

More information

HPE IMC BYOD WLAN MAC Authentication Configuration Examples

HPE IMC BYOD WLAN MAC Authentication Configuration Examples HPE IMC BYOD WLAN MAC Authentication Configuration Examples Part Number: 5200-1389 Software version: IMC UAM 7.2 (E0403) Document version: 2 The information in this document is subject to change without

More information

HPE IMC UAM 802.1X Authentication and ACL Based Access Control Configuration Examples

HPE IMC UAM 802.1X Authentication and ACL Based Access Control Configuration Examples HPE IMC UAM 802.1X Authentication and ACL Based Access Control Configuration Examples Part Number: 5200-1368 Software version: IMC UAM 7.2 (E0406) Document version: 2 The information in this document is

More information

HPE IMC UAM LDAP Authentication Configuration Examples

HPE IMC UAM LDAP Authentication Configuration Examples HPE IMC UAM LDAP Authentication Configuration Examples Part Number: 5200-1373 Software Version: IMC UAM 7.2 (E0402) Document Version: 2 The information in this document is subject to change without notice.

More information

HPE IMC UAM 802.1X Authentication Configuration Examples

HPE IMC UAM 802.1X Authentication Configuration Examples HPE IMC UAM 802.1X Authentication Configuration Examples Part Number: 5200-1365 Software version: IMC UAM 7.2 (E0403) Document version: 2 The information in this document is subject to change without notice.

More information

HPE IMC UAM Binding Access Users with PCs Configuration Examples

HPE IMC UAM Binding Access Users with PCs Configuration Examples HPE IMC UAM Binding Access Users with PCs Configuration Examples Part Number: 5200-1372 Software version: IMC UAM 7.2 (E0403) Document version: 2 The information in this document is subject to change without

More information

HPE IMC UAM 802.1X Access Control and RSA Authentication Configuration Examples

HPE IMC UAM 802.1X Access Control and RSA Authentication Configuration Examples HPE IMC UAM 802.1X Access Control and RSA Authentication Configuration Examples Part Number: 5200-1366 Software version: IMC UAM 7.2 (E0403) Document version: 2 The information in this document is subject

More information

Table of Contents X Configuration 1-1

Table of Contents X Configuration 1-1 Table of Contents 1 802.1X Configuration 1-1 802.1X Overview 1-1 Architecture of 802.1X 1-2 Authentication Modes of 802.1X 1-2 Basic Concepts of 802.1X 1-3 EAP over LAN 1-4 EAP over RADIUS 1-5 802.1X Authentication

More information

Configuring Hybrid REAP

Configuring Hybrid REAP 13 CHAPTER This chapter describes hybrid REAP and explains how to configure this feature on controllers and access points. It contains the following sections: Information About Hybrid REAP, page 13-1,

More information

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server Document ID: 112175 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Windows

More information

Configuring FlexConnect Groups

Configuring FlexConnect Groups Information About FlexConnect Groups, page 1, page 5 Configuring VLAN-ACL Mapping on FlexConnect Groups, page 10 Configuring WLAN-VLAN Mappings on FlexConnect Groups, page 11 Information About FlexConnect

More information

Wireless LAN Controller Web Authentication Configuration Example

Wireless LAN Controller Web Authentication Configuration Example Wireless LAN Controller Web Authentication Configuration Example Document ID: 69340 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Web Authentication Process

More information

Configuring OfficeExtend Access Points

Configuring OfficeExtend Access Points Information About OfficeExtend Access Points, page 1 OEAP 600 Series Access Points, page 2 OEAP in Local Mode, page 3 Supported WLAN Settings for 600 Series OfficeExtend Access Point, page 3 WLAN Security

More information

Cisco 4400 Series Wireless LAN Controllers PEAP Under Unified Wireless Networks with Microsoft Internet Authentication Service (IAS)

Cisco 4400 Series Wireless LAN Controllers PEAP Under Unified Wireless Networks with Microsoft Internet Authentication Service (IAS) Cisco 4400 Series Wireless LAN Controllers PEAP Under Unified Wireless Networks with Microsoft Internet Authentication Service (IAS) HOME SUPPORT PRODUCT SUPPORT WIRELESS CISCO 4400 SERIES WIRELESS LAN

More information

LAB: Configuring LEAP. Learning Objectives

LAB: Configuring LEAP. Learning Objectives LAB: Configuring LEAP Learning Objectives Configure Cisco ACS Radius server Configure a WLAN to use the 802.1X security protocol and LEAP Authenticate with an access point using 802.1X security and LEAP

More information

Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP)

Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP) Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP) Objective A Wireless Access Point (WAP) is a networking device that allows wireless-capable devices to connect to

More information

Configuring FlexConnect Groups

Configuring FlexConnect Groups Information About FlexConnect Groups, page 1, page 3 Configuring VLAN-ACL Mapping on FlexConnect Groups, page 8 Information About FlexConnect Groups To organize and manage your FlexConnect access points,

More information

TECHNICAL NOTE UWW & CLEARPASS HOW-TO: CONFIGURE UNIFIED WIRELESS WITH CLEARPASS. Version 2

TECHNICAL NOTE UWW & CLEARPASS HOW-TO: CONFIGURE UNIFIED WIRELESS WITH CLEARPASS. Version 2 HOW-TO: CONFIGURE UNIFIED WIRELESS WITH CLEARPASS Version 2 CONTENTS Introduction... 7 Background information... 7 Requirements... 7 Network diagram... 7 VLANs... 8 Switch configuration... 8 Initial setup...

More information

HPE IMC UAM Device User Authentication Configuration Examples

HPE IMC UAM Device User Authentication Configuration Examples HPE IMC UAM Device User Authentication Configuration Examples Part Number: 5200-1375 Software version: IMC UAM 7.2 (E0403) Document version: 2 The information in this document is subject to change without

More information

P ART 3. Configuring the Infrastructure

P ART 3. Configuring the Infrastructure P ART 3 Configuring the Infrastructure CHAPTER 8 Summary of Configuring the Infrastructure Revised: August 7, 2013 This part of the CVD section discusses the different infrastructure components that are

More information

IMC inode Intelligent Client v7.0 (E0106) Copyright (c) Hewlett-Packard Development Company, L.P. and its licensors.

IMC inode Intelligent Client v7.0 (E0106) Copyright (c) Hewlett-Packard Development Company, L.P. and its licensors. IMC inode Intelligent Client v7.0 (E0106) Copyright (c) 2011-2014 Hewlett-Packard Development Company, L.P. and its licensors. Table of Contents 1. What's New in this Release 2. Problems Fixed in this

More information

MSM320, MSM410, MSM422, MSM430,

MSM320, MSM410, MSM422, MSM430, Polycom VIEW Certified Configuration Guide Hewlett-Packard MSM710/720/760/765 Wireless LAN Controller With MSM310, MSM320, MSM410, MSM422, MSM430, MSM46x APs September 2012 1725-36068-001 Rev H Trademarks

More information

Enterprise WLAN Solution V100R001C00. Deployment Guide. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

Enterprise WLAN Solution V100R001C00. Deployment Guide. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD. V100R001C00 Issue 01 Date 2011-08-29 HUAWEI TECHNOLOGIES CO., LTD. . 2011. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written

More information

Grandstream Networks, Inc. GWN76xx Wi-Fi Access Points Master/Slave Architecture Guide

Grandstream Networks, Inc. GWN76xx Wi-Fi Access Points Master/Slave Architecture Guide Grandstream Networks, Inc. GWN76xx Wi-Fi Access Points Master/Slave Architecture Guide Table of Contents INTRODUCTION... 4 DISCOVER AND PAIR GWN76XX ACCESS POINTS... 5 Discover GWN76xx... 5 Method 1: Discover

More information

Secure Access Configuration Guide For Wireless Clients

Secure Access Configuration Guide For Wireless Clients ProCurve Networking Secure Access Configuration Guide For Wireless Clients Secure Access Configuration Guide For Wireless Clients Introduction... 2 Configuration Scenarios... 2 Required Network Services...

More information

Controlled/uncontrolled port and port authorization status

Controlled/uncontrolled port and port authorization status Contents 802.1X fundamentals 1 802.1X architecture 1 Controlled/uncontrolled port and port authorization status 1 802.1X-related protocols 2 Packet formats 2 EAP over RADIUS 4 Initiating 802.1X authentication

More information

Configuring a VAP on the WAP351, WAP131, and WAP371

Configuring a VAP on the WAP351, WAP131, and WAP371 Article ID: 5072 Configuring a VAP on the WAP351, WAP131, and WAP371 Objective Virtual Access Points (VAPs) segment the wireless LAN into multiple broadcast domains that are the wireless equivalent of

More information

Using PEAP and WPA PEAP Authentication Security on a Zebra Wireless Tabletop Printer

Using PEAP and WPA PEAP Authentication Security on a Zebra Wireless Tabletop Printer Using PEAP and WPA PEAP Authentication Security on a Zebra Wireless Tabletop Printer Q. What is PEAP? A. Protected Extensible Authentication Protocol is an IEEE 802.1x EAP security method that uses an

More information

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ]

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ] s@lm@n HP Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ] HP HP2-Z32 : Practice Test Question No : 1 What is a proper use for an ingress VLAN in an HP MSM VSC?

More information

Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients

Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients Document ID: 64067 Contents Introduction Prerequisites Requirements Components Used Conventions Microsoft Certificate Service Installation

More information

Configuring WLANsWireless Device Access

Configuring WLANsWireless Device Access CHAPTER 6 This chapter describes how to configure up to 16 WLANs for your Cisco UWN Solution. It contains these sections: WLAN Overview, page 6-2 Configuring WLANs, page 6-2 6-1 WLAN Overview Chapter 6

More information

PEAP under Cisco Unified Wireless Networks with ACS 4.0 and Windows 2003

PEAP under Cisco Unified Wireless Networks with ACS 4.0 and Windows 2003 PEAP under Cisco Unified Wireless Networks with ACS 4.0 and Windows 2003 Document ID: 72013 Contents Introduction Prerequisites Requirements Components Used Network Diagram Conventions Windows Enterprise

More information

Protected EAP (PEAP) Application Note

Protected EAP (PEAP) Application Note to users of Microsoft Windows 7: Cisco plug-in software modules such as EAP-FAST and PEAP are compatible with Windows 7. You do not need to upgrade these modules when you upgrade to Windows 7. This document

More information

Configuring Client Profiling

Configuring Client Profiling Prerequisites for, page 1 Restrictions for, page 2 Information About Client Profiling, page 2, page 3 Configuring Custom HTTP Port for Profiling, page 4 Prerequisites for By default, client profiling will

More information

Using the Cisco Unified Wireless IP Phone 7921G Web Pages

Using the Cisco Unified Wireless IP Phone 7921G Web Pages CHAPTER 4 Using the Cisco Unified Wireless IP Phone 7921G Web Pages You can use the Cisco Unified Wireless IP Phone 7921G web pages to set up and configure settings for the phone. This chapter describes

More information

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the

More information

VOCOM II. WLAN Instructions. VOCOM II Tough

VOCOM II. WLAN Instructions. VOCOM II Tough WLAN Instructions VOCOM II Tough 88894000 1 Please make sure the VOCOM II is connected to the computer via USB. Open the VOCOM II Configuration Application. Located under the START menu. The VOCOM II should

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help,

More information

802.1x Configuration Examples H3C S7500 Series Ethernet Switches Release Table of Contents

802.1x Configuration Examples H3C S7500 Series Ethernet Switches Release Table of Contents Table of Contents Table of Contents Chapter 1 802.1X Overview... 1-1 1.1 Introduction to 802.1X... 1-1 1.2 Features Configuration... 1-1 1.2.1 Global Configuration... 1-1 1.2.2 Configuration in Port View...

More information

Summary. Deployment Guide: Configuring the Cisco Wireless Security Suite 1 OL

Summary. Deployment Guide: Configuring the Cisco Wireless Security Suite 1 OL Summary Numerous papers have been written on the topic of IEEE 802.11 security for wireless LANs (WLANs). The major vulnerabilities of 802.11 security can be summarized as follows: Weak device-only authentication:

More information

Configuring the Client Adapter through the Windows XP Operating System

Configuring the Client Adapter through the Windows XP Operating System APPENDIX E Configuring the Client Adapter through the Windows XP Operating System This appendix explains how to configure and use the client adapter with Windows XP. The following topics are covered in

More information

Vendor: Cisco. Exam Code: Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0. Version: Demo

Vendor: Cisco. Exam Code: Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0. Version: Demo Vendor: Cisco Exam Code: 642-737 Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0 Version: Demo QUESTION 1 Which statement describes the major difference between PEAP and EAP-FAST

More information

User Guide. Omada Controller Software

User Guide. Omada Controller Software User Guide Omada Controller Software 1910012506 REV 3.2.0 March 2019 CONTENTS 1 Quick Start... 1 1.1 Determine the Network Topology...2 1.1.1 Management on the local Network... 2 1.1.2 Management via Cloud

More information

Use Shrew Soft VPN Client to Connect with IPSec VPN Server on RV130 and RV130W

Use Shrew Soft VPN Client to Connect with IPSec VPN Server on RV130 and RV130W Use Shrew Soft VPN Client to Connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing an encrypted

More information

Configuring the Access Point/Bridge for the First Time

Configuring the Access Point/Bridge for the First Time CHAPTER 2 Configuring the Access Point/Bridge for the First Time This chapter describes how to configure basic settings on your access point/bridge for the first time. You can configure all the settings

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 300-208 Exam Questions & Answers Number: 300-208 Passing Score: 800 Time Limit: 120 min File Version: 38.4 http://www.gratisexam.com/ Exam Code: 300-208 Exam Name: Implementing Cisco Secure Access

More information

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps Cisco 300-375 Dumps with Valid 300-375 Exam Questions PDF [2018] The Cisco 300-375 Securing Cisco Wireless Enterprise Networks (WISECURE) exam is an ultimate source for professionals to retain their credentials

More information

Using the Cisco Unified Wireless IP Phone 7921G Web Pages

Using the Cisco Unified Wireless IP Phone 7921G Web Pages 4 CHAPTER Using the Cisco Unified Wireless IP Phone 7921G Web Pages This chapter describes how to set up your PC to configure a Cisco Unified Wireless IP Phone 7921G by using a USB connector and how to

More information

Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3

Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3 Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3 Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram Configuration Declare RADIUS Server on WLC Create

More information

RSA SecurID Ready with Wireless LAN Controllers and Cisco Secure ACS Configuration Example

RSA SecurID Ready with Wireless LAN Controllers and Cisco Secure ACS Configuration Example RSA SecurID Ready with Wireless LAN Controllers and Cisco Secure ACS Configuration Example Document ID: 100162 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information

More information

User Guide. Omada Controller Software

User Guide. Omada Controller Software User Guide Omada Controller Software 1910012394 REV 2.7.0 July 2018 CONTENTS 1 Quick Start... 1 1.1 Determine the Network Topology...2 1.1.1 Management in the Same Subnet... 2 1.1.2 Management in Different

More information

Table of Contents. 4 System Guard Configuration 4-1 System Guard Overview 4-1 Guard Against IP Attacks 4-1 Guard Against TCN Attacks 4-1

Table of Contents. 4 System Guard Configuration 4-1 System Guard Overview 4-1 Guard Against IP Attacks 4-1 Guard Against TCN Attacks 4-1 Table of Contents 1 802.1x Configuration 1-1 Introduction to 802.1x 1-1 Architecture of 802.1x Authentication 1-1 The Mechanism of an 802.1x Authentication System 1-3 Encapsulation of EAPoL Messages 1-3

More information

Verify Radius Server Connectivity with Test AAA Radius Command

Verify Radius Server Connectivity with Test AAA Radius Command Verify Connectivity with Test AAA Radius Command Contents Introduction Prerequisites Requirements Components Used Background Information How The Feature Works Command Syntax Scenario 1. Passed Authentication

More information

LevelOne. Quick Installation Guide. WHG series Secure WLAN Controller. Introduction. Getting Started. Hardware Installation

LevelOne. Quick Installation Guide. WHG series Secure WLAN Controller. Introduction. Getting Started. Hardware Installation Introduction LevelOne WHG series Secure WLAN Controller LevelOne Secure WLAN Controller is the most advanced yet simple deployment and cost-effective wireless solution; it is an ideal security solution

More information

WLAN high availability

WLAN high availability Technical white paper WLAN high availability Table of contents Overview... 2 WLAN high availability implementation... 3 Fundamental high availability technologies... 3 AP connection priority... 3 AC selection...

More information

Configuration Guide. Wireless Controller AC50/AC REV 1.0.0

Configuration Guide. Wireless Controller AC50/AC REV 1.0.0 Configuration Guide Wireless Controller AC50/AC500 1910012001 REV 1.0.0 Content About This Guide... 1 1 Quick Start... 2 1.1 Determine the Network Topology... 2 1.1.1 Manage CAPs in the LAN...2 1.1.2 Manage

More information

Configuring Authentication Types

Configuring Authentication Types CHAPTER 11 This chapter describes how to configure authentication types on the access point. This chapter contains these sections: Understanding Authentication Types, page 11-2, page 11-10 Matching Access

More information

EnGenius Quick Start Guide

EnGenius Quick Start Guide T he operates seamlessly in the 2.4 GHz frequency spectrum supporting the 802.11b (2.4GHz, 11Mbps) and the newer, faster 802.11g (2.4GHz, 54Mbpswireless standard. High output power and high sensitivity

More information

Cisco Secure ACS for Windows v3.2 With PEAP MS CHAPv2 Machine Authentication

Cisco Secure ACS for Windows v3.2 With PEAP MS CHAPv2 Machine Authentication Cisco Secure ACS for Windows v3.2 With PEAP MS CHAPv2 Machine Authentication Document ID: 43486 Contents Introduction Prerequisites Requirements Components Used Background Theory Conventions Network Diagram

More information

Securing a Wireless LAN

Securing a Wireless LAN Securing a Wireless LAN This module describes how to apply strong wireless security mechanisms on a Cisco 800, 1800, 2800, or 3800 series integrated services router, hereafter referred to as an access

More information

HP Unified Wired-WLAN Products

HP Unified Wired-WLAN Products HP Unified Wired-WLAN Products Security Command Reference HP 830 Unified Wired-WLAN PoE+ Switch Series HP 850 Unified Wired-WLAN Appliance HP 870 Unified Wired-WLAN Appliance HP 11900/10500/7500 20G Unified

More information

User Guide. Omada Controller Software

User Guide. Omada Controller Software User Guide Omada Controller Software 1910012370 REV 2.6.0 March 2018 CONTENTS 1 Quick Start... 1 1.1 Determine the Network Topology...2 1.1.1 Management in the Same Subnet... 2 1.1.2 Management in Different

More information

Configure to Secure a Flexconnect AP Switchport with Dot1x

Configure to Secure a Flexconnect AP Switchport with Dot1x Configure to Secure a Flexconnect AP Switchport with Dot1x Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram Verify Troubleshoot Introduction This document describes

More information

NXC Series. Handbook. NXC Controllers NXC 2500/ Default Login Details. Firmware Version 5.00 Edition 19, 5/

NXC Series. Handbook. NXC Controllers NXC 2500/ Default Login Details. Firmware Version 5.00 Edition 19, 5/ NXC Series NXC 2500/ 5500 NXC Controllers Firmware Version 5.00 Edition 19, 5/2017 Handbook Default Login Details LAN Port IP Address https://192.168.1.1 User Name admin Password 1234 Copyright 2017 ZyXEL

More information

Multicast VLAN, page 1 Passive Clients, page 2 Dynamic Anchoring for Clients with Static IP Addresses, page 5

Multicast VLAN, page 1 Passive Clients, page 2 Dynamic Anchoring for Clients with Static IP Addresses, page 5 Multicast VLAN, page 1 Passive Clients, page 2 Dynamic Anchoring for Clients with Static IP Addresses, page 5 Multicast VLAN Information About Multicast Optimization Prior to the 7.0.116.0 release, multicast

More information

ISE Express Installation Guide. Secure Access How -To Guides Series

ISE Express Installation Guide. Secure Access How -To Guides Series ISE Express Installation Guide Secure Access How -To Guides Series Author: Jason Kunst Date: September 10, 2015 Table of Contents About this Guide... 4 How do I get support?... 4 Using this guide... 4

More information

H3C WA Series WLAN Access Points. WLAN Configuration Guide. Hangzhou H3C Technologies Co., Ltd. Document Version: 6W

H3C WA Series WLAN Access Points. WLAN Configuration Guide. Hangzhou H3C Technologies Co., Ltd.  Document Version: 6W H3C WA Series WLAN Access Points WLAN Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document Version: 6W100-20100910 Copyright 2010, Hangzhou H3C Technologies Co., Ltd. and

More information

Configuring WLANs CHAPTER

Configuring WLANs CHAPTER CHAPTER 6 This chapter describes how to configure up to 16 wireless LANs for your Cisco Wireless LAN Solution. This chapter contains these sections: Wireless LAN Overview, page 6-2 Configuring Wireless

More information

TECHNICAL NOTE MSM & CLEARPASS HOW TO CONFIGURE HPE MSM CONTROLLERS WITH ARUBA CLEARPASS VERSION 3, JUNE 2016

TECHNICAL NOTE MSM & CLEARPASS HOW TO CONFIGURE HPE MSM CONTROLLERS WITH ARUBA CLEARPASS VERSION 3, JUNE 2016 HOW TO CONFIGURE HPE MSM CONTROLLERS WITH ARUBA CLEARPASS VERSION 3, JUNE 2016 CONTENTS Introduction... 5 MSM and AP Deployment Options... 5 MSM User Interfaces... 6 Assumptions... 7 Network Diagram...

More information

Wireless BYOD with Identity Services Engine

Wireless BYOD with Identity Services Engine Wireless BYOD with Identity Services Engine Document ID: 113476 Contents Introduction Prerequisites Requirements Components Used Topology Conventions Wireless LAN Controller RADIUS NAC and CoA Overview

More information

Web Authentication Proxy on a Wireless LAN Controller Configuration Example

Web Authentication Proxy on a Wireless LAN Controller Configuration Example Web Authentication Proxy on a Wireless LAN Controller Configuration Example Document ID: 113151 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Proxy on

More information

Configuring Cisco Mobility Express controller

Configuring Cisco Mobility Express controller There are multiple ways one can configure a Cisco Mobility Express controller. They are as follows: 1 CLI Setup Wizard 2 Over the Air Setup Wizard 3 Network Plug and Play CLI Setup Wizard, page 1 Over-the-Air

More information

Configuring the Client Adapter through Windows CE.NET

Configuring the Client Adapter through Windows CE.NET APPENDIX E Configuring the Client Adapter through Windows CE.NET This appendix explains how to configure and use the client adapter with Windows CE.NET. The following topics are covered in this appendix:

More information

Oct 2007 Version 1.01

Oct 2007 Version 1.01 Oct 2007 Version 1.01 Table of Contents Introduction...4 System Requirement...4 Getting Started...4 Installing the Smart WLAN Manager...5 Discovering the Switch and AP...9 Understanding the Screen Layout...12

More information

Configuring the Client Adapter through the Windows XP Operating System

Configuring the Client Adapter through the Windows XP Operating System APPENDIX E through the Windows XP Operating System This appendix explains how to configure and use the client adapter with Windows XP. The following topics are covered in this appendix: Overview, page

More information

FortiNAC. Cisco Airespace Wireless Controller Integration. Version: 8.x. Date: 8/28/2018. Rev: B

FortiNAC. Cisco Airespace Wireless Controller Integration. Version: 8.x. Date: 8/28/2018. Rev: B FortiNAC Cisco Airespace Wireless Controller Integration Version: 8.x Date: 8/28/2018 Rev: B FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET KNOWLEDGE

More information

Release Notes: Version Operating System

Release Notes: Version Operating System Release Notes: Version 2.0.29 Operating System for the HP ProCurve Wireless Access Point 420 These release notes include information on the following: Downloading access point software and documentation

More information

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] s@lm@n Cisco Exam 642-737 Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] Cisco 642-737 : Practice Test Question No : 1 RADIUS is set up with multiple servers

More information

Lab Configuring LEAP/EAP using Cisco Secure ACS (OPTIONAL)

Lab Configuring LEAP/EAP using Cisco Secure ACS (OPTIONAL) Lab 8.4.5.2 Configuring LEAP/EAP using Cisco Secure ACS (OPTIONAL) Estimated Time: 60 minutes Number of Team Members: Students can work in teams of two. Objective In this lab, the student will learn about

More information

Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1

Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1 Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1 Last revised: February 1, 2008 Contents Overview section on page 1 Configuring Guest Access on the Cisco Wireless

More information

Creating Wireless Networks

Creating Wireless Networks WLANs, page 1 Creating Employee WLANs, page 2 Creating Guest WLANs, page 4 Internal Splash Page for Web Authentication, page 7 Managing WLAN Users, page 9 Adding MAC for Local MAC Filtering on WLANs, page

More information

WLC 7.0 and Later: VLAN Select and Multicast Optimization Features Deployment Guide

WLC 7.0 and Later: VLAN Select and Multicast Optimization Features Deployment Guide WLC 7.0 and Later: VLAN Select and Multicast Optimization Features Deployment Guide Document ID: 112932 Contents Introduction Prerequisites Requirements Platforms Supported Conventions VLAN Select Feature

More information

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac WISNETWORKS User Manual V1.1 2016/3/21 Software version 1.0.0021 Table of contents 1. Setup& WMI... 3 1.1 Hardware Setup... 3 1.2 Web Management Interface... 3 2. Status... 4 2.1 Overview... 4 2.1.1 System...

More information

Troubleshooting DHCP server configuration 28

Troubleshooting DHCP server configuration 28 Contents DHCP overview 1 Introduction to DHCP 1 DHCP address allocation 1 Allocation mechanisms 1 Dynamic IP address allocation process 2 IP address lease extension 2 DHCP message format 3 DHCP options

More information

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table

More information

802.1x Port Based Authentication

802.1x Port Based Authentication 802.1x Port Based Authentication Johan Loos Johan at accessdenied.be Who? Independent Information Security Consultant and Trainer Vulnerability Management and Assessment Wireless Security Next-Generation

More information

Table of Contents X Configuration 1-1

Table of Contents X Configuration 1-1 Table of Contents 1 802.1X Configuration 1-1 802.1X Overview 1-1 Architecture of 802.1X 1-1 Authentication Modes of 802.1X 1-2 Basic Concepts of 802.1X 1-2 EAP over LAN 1-3 EAP over RADIUS 1-5 802.1X Authentication

More information

Siemens HiPath Wireless: Configuration and Deployment Guide

Siemens HiPath Wireless: Configuration and Deployment Guide Siemens HiPath Wireless System Configuration and Deployment Guide SpectraLink's Voice Interoperability for Enterprise Wireless (VIEW) Certification Program is designed to ensure interoperability and high

More information

Cisco Structured Wireless-Aware Network (SWAN) Implementation Guide

Cisco Structured Wireless-Aware Network (SWAN) Implementation Guide Cisco Structured Wireless-Aware Network (SWAN) Implementation Guide The Cisco Structured Wireless-Aware Network (SWAN) provides the framework to integrate and extend wired and wireless networks to deliver

More information

Extreme Networks Summit WM-Series Wireless Controller and Altitude APs Configuration and Deployment Guide

Extreme Networks Summit WM-Series Wireless Controller and Altitude APs Configuration and Deployment Guide Extreme Networks Summit WM-Series Wireless Controller and Altitude 350-2 APs Configuration and Deployment Guide SpectraLink's Voice Interoperability for Enterprise Wireless (VIEW) Certification Program

More information

HP FlexFabric 5700 Switch Series

HP FlexFabric 5700 Switch Series HP FlexFabric 5700 Switch Series Security Command Reference Part number: 5998-6695 Software version: Release 2416 Document version: 6W100-20150130 Legal and notice information Copyright 2015 Hewlett-Packard

More information

CCIE Wireless v3 Lab Video Series 1 Table of Contents

CCIE Wireless v3 Lab Video Series 1 Table of Contents CCIE Wireless v3 Lab Video Series 1 Table of Contents Section 1: Network Infrastructure Layer 2 Technologies VLANs VTP Layer 2 Interfaces DTP Spanning Tree- Root Election Spanning Tree- Path Control Spanning

More information

CounterACT 802.1X Plugin

CounterACT 802.1X Plugin CounterACT 802.1X Plugin Version 4.2.0 Table of Contents Overview... 4 Understanding the 802.1X Protocol... 4 About the CounterACT 802.1X Plugin... 6 About This Document... 7 802.1X Plugin Components...

More information

Chapter 1 Introduction

Chapter 1 Introduction Copyright Statement is the registered trademark of Zonet Technology Inc. All the products and product names mentioned herein are the trademarks or registered trademarks of their respective holders. Copyright

More information

Procedure: You can find the problem sheet on the Desktop of the lab PCs.

Procedure: You can find the problem sheet on the Desktop of the lab PCs. University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Advance Networks Laboratory 907529 Lab.3 WLAN Security Objectives 1. Configure administrator accounts.

More information

WRE2206. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Details. Version 1.00 Edition 1, 01/2015

WRE2206. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Details. Version 1.00 Edition 1, 01/2015 WRE2206 Wireless N300 Range Extender Version 1.00 Edition 1, 01/2015 Quick Start Guide User s Guide Default Details Web Address http://zyxelsetup OR http://192.168.1.2 www.zyxel.com User Name admin Password

More information

Table of Contents 1 DHCP Overview DHCP Server Configuration 2-1

Table of Contents 1 DHCP Overview DHCP Server Configuration 2-1 Table of Contents 1 DHCP Overview 1-1 Introduction to DHCP 1-1 DHCP Address Allocation 1-2 Allocation Mechanisms 1-2 Dynamic IP Address Allocation Process 1-2 IP Address Lease Extension 1-3 DHCP Message

More information

ADMINISTRATION GUIDE Cisco Small Business

ADMINISTRATION GUIDE Cisco Small Business ADMINISTRATION GUIDE Cisco Small Business RV180/RV180W Multifunction VPN Firewall November 2011 Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other

More information

3Com Wireless LAN Mobility System Configuration and Deployment Guide

3Com Wireless LAN Mobility System Configuration and Deployment Guide 3Com Wireless LAN Mobility System Configuration and Deployment Guide SpectraLink's Voice Interoperability for Enterprise Wireless (VIEW) Certification Program is designed to ensure interoperability and

More information

DWS-4000 Series DWL-3600AP DWL-6600AP

DWS-4000 Series DWL-3600AP DWL-6600AP Unified Wired & Wireless Access System Configuration Guide Product Model: Release 1.0 DWS-4000 Series DWL-8600AP DWL-6600AP DWL-3600AP Page 1 Table of Contents 1. Scenario 1 - Basic L2 Edge Setup: 1 Unified

More information