LANCOM Techpaper Smart WLAN controlling

Similar documents
LCOS Manual WLAN Management

LANCOM Techpaper Advanced Routing and Forwarding (ARF)

LANCOM Management Cloud

Feature Notes LCOS 9.20 RC2.

LANCOM Techpaper Active Radio Control

Funkwerk WLAN Controller

A connected workforce is a more productive workforce

bintec WLAN Controller Highlights Features Easy plug-and-play installation Automated radio cell planning easier, faster, better

WELCOME TO THE NEW HYPER-INTEGRATED NETWORK MANAGEMENT

Wireless LAN Access Point

23 Must-Have WiFi Features

HYPER INTEGRATION! LANCOM Management Cloud

The Neutron Series Distributed Network Management Solution

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

LCOS 8.82 RC1 Feature Notes.

Grandstream Networks, Inc. GWN76xx Wi-Fi Access Points Master/Slave Architecture Guide

Deploy and Manage a Highly Scalable, Worry-Free WLAN

Configuring FlexConnect Groups

Samsung Security AP WHITE PAPER

WHG711 V3.20. Secure WLAN Controller

Wireless 11n Smart Repeater AP (1T1R)

Wireless technology Principles of Security

Wireless# Guide to Wireless Communications. Objectives

The All-in-One, Intelligent WLAN Controller

Deploy and Manage a Highly Scalable, Worry-Free WLAN

Wireless Controller DWC-1000

Light Mesh AP. User s Guide. 2009/2/20 v1.0 draft

WHG711 Wireless LAN Controller

NXC Series. Handbook. NXC Controllers NXC 2500/ Default Login Details. Firmware Version 5.00 Edition 19, 5/

LevelOne. User Manual. WAP Mbps PoE Wireless AP V3.0.0

LANCOM WLC-4100 Controller

Exam HP2-Z33 HP Unified Wired-Wireless Networks and BYOD Version: 6.2 [ Total Questions: 65 ]

Configuring Hybrid REAP

Fitting The Pieces Together. Exemplary Solutions for Voice-Data Communications

Configuring Repeater and Standby Access Points

OmniAccess Instant AP Update

DWS-4000 Series DWL-3600AP DWL-6600AP

LANCOM Techpaper Routing Performance

EOA7530. Dual Radio Concurrent AP/CB. 2.4GHz / 5GHz 54Mbps a/b/g Flexible Application

... c o n n e c t i n g y o u r b u s i n e s s Addendum LCOS 8.62

Table of Contents. 1 Introduction. 2 Wireless Configurations. 3 Setting Up your LAN Administrator Station

Configuring the EAPs Separately via Omada Controller

IP network that supports DHCP or manual assignment of IP address, gateway, and subnet mask

Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service

Wireless LAN Access Point

Using Access Point Communication Protocols

LANCOM WLC Central zero-touch management for 25 or 50 LANCOM Access Points and WLAN routers

The Benefits of Wireless Infrastructure Management in the Cloud

ACCESSNET -T IP For professional TETRA communications. /en

Configuring OfficeExtend Access Points

Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1

A Division of Cisco Systems, Inc. Dual-Band a. Dual-Band g. Access Point. User Guide WIRELESS. WAP55AG ver. 2. Model No.

A Division of Cisco Systems, Inc. Dual-Band. GHz g a. Dual-Band. Wireless A+G. Access Point. User Guide WIRELESS WAP55AG. Model No.

Wireless LAN Access Point

EOR7550. Dual Radio Multi-Function AP. 2.4GHz / 5GHz 300Mbps a/b/g/n Multi-Function

Securing Wireless LANs with Certificate Services

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter with SRX 400. User Guide WIRELESS WMP54GX4. Model No.

Auranet EAP Solution 1

PRODUCT DESCRIPTION. Learn more about EnGenius Solutions at

WHG713. Secure WLAN Controller

A Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. PCI Adapter WIRELESS. with SpeedBooster WMP54GS (EU/UK/LA) Model No.

DATA SHEET MODEL AXC1000 HIGHLIGHTS OVERVIEW. Redefining Enterprise Wireless Management

Wireless Router at Home

NCP Secure Enterprise Management for Linux Release Notes

Think Enterprise WLAN, Think Samsung

Table of Contents. Chapter 1Introduction Package Contents Features Specifications Physical Description...

Highlight. Central AP Management with High Scalability

802.11ac Wireless Access Point Model WAC104

Grandstream Networks, Inc. GWN76XX Series Mesh Network Guide

OWL630 OUTDOOR ACCESS POINT

EWS5207. Secure WLAN Controller

Wireless AC2600 Wave 2 Dual-Band Unified Access Point

Configuring the EAPs Globally via Omada Controller

LANCOM Release Notes LANtools RU10

D-Link AirPlus G DWL-G700AP

Wireless Technologies

Veeam Cloud Connect. Version 8.0. Administrator Guide

Technology Solution Guide. Deploying Entuity s Eye of the Storm with Aruba Networks Secure Mobility Solution

Wireless Challenges and Resolutions

VOCOM II. WLAN Instructions. VOCOM II Tough

M a/b/g Outdoor Layer-2 MESH AP

Personal Handyphone Systems in Urban Infrastructure

EOR7550 Dual Radio Multi-Function Repeater 2.4 GHz/ 5.0 GHz a/b/g/n 300 Mbps Multi-Function

Chapter 11: Networks

A Division of Cisco Systems, Inc. GHz g. Wireless-G. User Guide. Access Point WIRELESS. WAP54G v2. Model No.

A Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. Access Point WIRELESS WAP54G (EU/LA/UK) Model No.

Q: Do the Cooper InVision IFM/ICM, Wireless Mesh Router and Gateway radio signals leave the plant? And what information do the signals contain?

Information regarding

From Zero Touch Provisioning to Secure Business Intent

EAP1200H a/b/g/n/ac Dual Radio Concurrent Ceiling Mount AP

Copyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills CA USA White Paper

Cisco WAP131 Wireless-N Dual Radio Access Point with PoE

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date

NCP Secure Enterprise Management (Win) Release Notes

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode

DHP-W313AV. PowerLine AV500 Wireless AC600 Starter Kit. Product Release

300Mbps Wireless N Gigabit Ceilling Mount Access Point

KillTest 䊾 䞣 催 ࢭ ད ᅌ㖦䊛 ᅌ㖦䊛 NZZV ]]] QORRZKYZ TKZ ϔᑈܡ䊏 ᮄ ࢭ

Deploy. Your step-by-step guide to successfully deploy an app with FileMaker Platform

Quick Start Guide for Standalone EAP

Transcription:

The widespread use of wireless access points and wireless routers provides great convenience and flexibility in network access for businesses, universities and other organizations. In recent years, wireless networks have seen fundamental structural changes: The rapid spread of wireless has seen the first generation of stand-alone access points being replaced by solutions with central management. To overcome the considerable disadvantages of centralized Ws, modern W architectures employ intelligent "work-sharing" between access points and W controllers, referred to as "smart W controlling". First-generation W architectures Even though W has numerous advantages over wired networks, a number of unsettled issues remain: The installation, configuration and servicing of access points involves considerable effort and expertise. Important functions such as setting up guest access accounts or rogue access point and W-client detection have to be configured separately on each access point. Overlapping frequencies can only be avoided by manually setting the radio channels. Changes to the configuration or structure are not simultaneous on all access points, but only come into effect after a time delay. access points in public places are a potential security risk because the devices themselves, including the security-related data in them such as passwords, etc., are susceptible to theft. The result: Drastically increased costs of W operation in proportion to the number of access points. The second generation: W switching The first approach to solving these problems for large W installations was to relocate the system's "intelligence" to a central component, the W switch. In W switching, the access points merely act as remote antennas of the central unit. Also known as "thin access points", these devices do not require configuration and they transmit all data received from the W directly over the to the W switch. Although W switching significantly cuts the effort and expense of operating wireless networks, the W switch itself becomes a data-transfer bottleneck and represents a single point of failure. Consequently, a breakdown of the switch would cause complete failure of the entire W. combines the advantages of the first two approaches to provide a W system that meets the following requirements: Flexible break-out of data depending on the application and user: Break-out at the access point for data with high bandwidth demands (e.g. IEEE 802.11n) or for access points at remote locations. Break-out at the W controller to implement layer-3 roaming for applications such as VoW or for guest access accounts. All access points and wireless routers are centrally authenticated and configured from the W controller. Reduction of initial installation costs as the access points are deployed faster. Firmware updates can be controlled centrally and, in the ideal case, automatically. Extension of security zones to include any access points located at home offices or subsidiaries. Automatic radio-field (RF) optimization for interference-free operation of Ws within range of other access points. Layer-3 roaming for monitoring critical IP connections in the central W controller. Secure fallback and redundancy concept in case of W controller failure, without storage of securityrelevant data in the access points. Automatic assignment of W clients to specific networks. Central rogue AP and client detection. In the following you will see how these objectives have been achieved on the basis of the CAPWAP standard. The CAPWAP standard The CAPWAP protocol (Control And Provisioning of Wireless access points) introduced by the IETF (Internet Engineering Task Force) is a draft standard for the centralized management of large W infrastructures. CAPWAP uses different channels for data transfer: Control channel, encrypted with DTLS. This channel is used to exchange administration information between the W controller and the access point. Data channel, optionally also encrypted with DTLS. The payload data from the W is transferred through this channel from the access point via the W controller into the encapsulated in the CAPWAP protocol. makes effective use of the different CAPWAP channels: Only data that is required by the W controller passes through CAPWAP tunnel. The far greater volume of the payload data can be directly broken out at the access point and transmitted to the. 1/5

Smart controller structure In a decentralized W structure with stand-alone access points (operating as so-called "rich access points") all functions for data transfer, the control functions, and the management functions are integrated in the access points. Centralized W management divides these tasks among two different devices: The central W controller assumes the administration tasks. The remote access points handle the data transmission. CAPWAP describes three different scenarios for the relocation of W functions to the central W controller. Remote MAC: In this case, all of the W functions are transferred from the access point to the W controller. Here, the access points only serve as "extended antennas" without independent intelligence. Split MAC: With this variant, only a portion of the W functions are transferred to the W controller. Normally, realtime applications will continue to be processed in the access point; the non-realtime applications are processed via the central W controller. Local MAC: The third possibility provides for complete management and monitoring of the W data traffic directly in the access points. The only information exchanged between the access point and the W controller is for network management and ensures that the access points have a uniform configuration. ANTENNA Control channel Payload data W Controller employs the local MAC procedure. Thanks to the reduction of centralized tasks, these W infrastructures offer optimum scalability. At the same time, infrastructure of this type prevents the W controller from becoming a central bottleneck that has to process large portions of the overall data traffic. In remote MAC and split MAC architectures, all payload data is forced to run centrally via the W controller. In local MAC architectures the payload data can alternatively be broken out from the access point directly to the to provide high-performance data transfer. The smart controlling approach is also suitable for Ws working with the IEEE 802.11n standard that now offer much higher data rates than previous W technologies. With break-out into the, data can also be directly routed into special Vs. This makes it very easy to set up closed networks, such as for guest access accounts. Authentication and configuration The core task of the W controller is to supply any access points connected to it with a valid configuration at all times. For the W controller to decide if it should provide a configuration to a requesting access point, the access point has to identify itself when communication is initiated. This authentication is based on digital certificates. When rolling out access points in large-scale installations that may involve several different sites, the necessary certificates are not stored in the access points. COM W controllers provide a function that allows the certificate to be transmitted to the access point when negotiations commence. The only access points that are valid for this are those that are entered into the W controller. As an alternative, the "auto accept" function provides a brief time window during which all access points in the including those without an entry in the W controller are accepted and issued with a valid certificate. The certificate allows the access point to be authenticated by the W controller, which then issues a valid configuration. The configuration for an access point is stored in the W controller and referenced by the MAC address. Access points not entered into the W controller can still be considered even when the configuration is being allocated: A default configuration can be used to enable these devices to operate in the W. The actual configuration data for the access points is stored in profiles in the W controller: These profiles are transmitted to the access points. Rollout with zero-touch management With the auto-accept function and the default configuration, COM W controllers can automatically issue certificates and configurations to access points making a request. The result is true "zerotouch" management. Simply connect new access points 2/5

to the no further configuration is necessary. Simplifying the installation of the devices in this way reduces the workload for IT departments, especially in decentralized structures, because no special IT or W expertise is required at the remote locations. Inheritance of parameters A COM W controller is capable of managing a wide range of different access points at different locations. However, W profiles include settings that are not equally suitable for every type of access point that can be managed. For example, there are differences between the country settings and the device properties. In order to avoid having to maintain multiple redundant W profiles to cater for different countries or device types, it is possible for certain W parameters to "inherit" selected properties from other entries. Inheritance also allows for chains over multiple stages (cascading). This means, for example, that country and device-specific parameters can be grouped for convenience. Recursion is also possible profile A inherits from profile B, and at the same time B inherits from A. Split management for distant access points COM access points can locate your W controller in distant networks a simple IP connection, e. g. via a VPN path, is all that you need. As the W controllers only influence the W part of the configuration in the access point, all other functions can be managed separately. This division of the configuration tasks makes COM W controllers perfect for establishing a company-wide W infrastructure that is based at the headquarters and includes all of the branch and home offices connected to it. This avoids errors in the W settings at the remote access points, that would otherwise allow unauthorized clients to access the company network. Layer-3 tunneling and layer-3 roaming generally operates by separating payload data from control data: The only data transferred via the layer-3 tunnel is control data relevant to the W controller; the rest of the data, which represents the vast majority of the data volume, breaks-out directly from the access point into the. This greatly reduces the data throughput at the W controller, so preventing the W controller from becoming a central bottleneck. However, some applications need payload data to be passed through the layer-3 tunnel to the W controller. With applications such as voice over wireless (VoW) W clients can move between radio cells. However, the underlying IP connection will not be interrupted because it continues to be managed by the central W controller (layer-3 roaming). In this way, mobile SIP telephones can easily roam even during a call. Central firmware and script management With central firmware and script management, uploads of firmware and scripts can be automated for all of the W devices. To this end the firmware and script files are stored to a web server. The W controller checks once daily, or when prompted by a user, to compare the available files with those on the devices. Alternatively, this procedure can be handled by a cron job overnight, for example. If an update can be carried out, or if the access point is not running the desired firmware version, then the W controller downloads the file from the web server and uploads it to the appropriate wireless routers and access points. Activating firmware and script management allows the distribution of the files to be controlled precisely. It is possible, for example, to limit certain firmware versions to certain device types or MAC addresses. Automatic RF optimization Selecting the channel from the channel list defines a portion of the frequency band that an access point uses for its logical wireless s. All W clients that need to connect to an access point have to use the same channel on the same frequency band. In the 2.4-GHz band channels 1 to 13 are available (depending on the country), and in the 5 GHz band channels 36 to 64 are available. On each of these channels, only one access point can actually transfer data. In order to operate another access point within radio range and without interference, the access point must make use of a separate channel otherwise all of the participating Ws have to share the channel's bandwidth. With automatic radio-field (RF) optimization, the COM W controllers provide an automatic method of setting the optimum channels for access points that work in the 2.4-GHz band. Initially the channel lists in the access points are deleted and re-defined by the W controller. The W modules are then switched off and switched on again, one after the other. Once switched on the modules automatically search for a vacant channel. 3/5

The result is an optimized distribution of the channels in the radio field. Channel 1 Channel 6 Channel 11 Channel 6 Channel 11 Automatic RF optimization can be started for all of the access points managed by a W controller or for one device at a time. Stand-alone operation Channel 1 W Controller Installations with a single W controller have a potential single point of failure. Failure would lead to the immediate outage of all of the Ws managed by it. COM W controllers optionally support the standalone operation of wireless routers and access points even in case of a temporary outage of the central management. Because smart W controlling uses the access points to manage the payload data, the W controller is only responsible for updating the configuration. The configuration is allocated to the access point by the W controller and, normally, it is stored in the RAM only. Operational reliability can be increased by optionally storing the configuration data to the flash memory (in an area that is not accessible to config or other tools). Should the connection to the W controller be interrupted, the access point will for a preset period of time continue to operate with the configuration stored in flash memory. The access point can also continue to work with this flash configuration after a local power outage. If there is still no connection to the W controller after this time period has expired then the flash configuration is deleted and the access point goes out of operation. As soon as the W controller can be reached again, the configuration is transmitted again from the W controller to the access point. This option enables an access point to continue operating even if the connection to the W controller is temporarily interrupted. Dedicated IP networks for access points Access points can be configured with their own IP parameters to make them even more independent of the central W controller. This involves the separate definition of important IP parameters such as domain, netmask, gateway or DNS server addresses for each access point this IP configuration allows the device to continue to operate even if the W controller fails. DHCP is only required for the initial search for a W controller. After the access point has been configured by the W controller, DHCP is no longer used. Backup solutions COM W controllers manage a large number of access points, which in turn may have a large number of W clients associated with them. W controllers thus play a crucial role in the functioning of the entire W infrastructure for which reason the organization of a backup solution in case of temporary W controller failure is in many cases indispensable. In case of a backup event, a managed access point should connect to an alternative W controller. Because this connection will only function if the certificate in the access point has been authorized by the backup controller, all W controllers sharing a backup solution have identical root certificates. There are two approaches to choose from for the backup structure itself: Backup with redundant W controllers requires each device to be backed up 1:1 with a second device. The backup controllers all have redundantly available certificates, profiles and configurations that are identical to those in the W controller. With multiple W controllers in use, the devices provide a backup for one another and if necessary they can manage the access points of the other W controllers. This involves the combination of a larger number of W controllers than would normally be necessary for managing the available access points. The access points are entered into the AP tables of all of the W controllers: If a W controller fails, another device takes over and continues to assign the corresponding profiles. The AP table in a COM W controller can accommodate five times the maximum number of access points than the device can manage by itself. For each five W controllers (identical models), just one additional W controller is sufficient to provide a full backup in case of failure. 4/5

Authentication and accounting for W clients RADIUS servers are generally employed to implement access authentication and for the billing of charges. There are two methods for accessing a RADIUS server via the access points: If no specialized configuration is required, the access points forward any W client s RADIUS requests to the central W controller. The W controller then applies its own user table or it forwards the RADIUS request to a defined server. For RADIUS requests to be processed independently of the central W controller, the profiles for the access points can be configured with their own RADIUS server. In this case the access point does not forward the RADIUS request to the W controller. Instead, the request breaks out into the and is routed to the RADIUS server there. Dynamic V assignment Larger W infrastructures often require individual W clients to be assigned to certain networks. Assuming that the W clients are always within range of the same access points, then assignment can be realized via the SSID in connection with a particular IP network. If on the other hand the W clients frequently change their position and logon to different access points then, depending on the configuration, they may find themselves in a different IP network. For W clients to remain within a certain network independent of their current W network, dynamically assigned Vs can be used. Unlike the situation where V IDs are statically configured for a certain SSID, in this case a RADIUS server directly assigns the V ID to the W client. LAPTOP/W- W Controller V ID = 10 V ID =20 RADIUS LAPTOP/W- Example: Two W clients log into the same access point with the SSID 'INTERNAL'. During registration, the RADIUS requests from the W clients are directed to the access point. If the corresponding W interface is in the operating mode 'managed' the RADIUS requests are automatically forwarded to the W controller. This forwards the request in turn to the defined RADIUS server. The RADIUS server can check the access rights of the W clients. It can also use the MAC address to assign a certain V ID, for example. The W client A, for example, receives the V ID '10' and W client B receives '20'. Summary from COM Systems provides a wide range of functions to facilitate the operation of large W installations. Automatic authentication and configuration simplify the rollout, even at sites without expert IT personnel. Automatic firmware updates enable the access points to be kept up to date at all times. Also optimized automatically is the utilization of vacant radio channels. By separating payload and control data, COM W controllers provide load balancing in the network and avoid excessive data traffic at the Controller. For specialized applications payload data can be directed via the W controller to provide uninterrupted IP connections even when the client moves between radio cells (layer-3 roaming). The W configuration of remote sites by means of split management extends your company's W security policy to home offices and subsidiaries. The dynamic assignment of Vs to users provides excellent protection for critical network segments from guest access accounts. Short-term outages of the W controllers can be handled by temporary stand-alone operation by the access points. Various backup strategies ensure operational reliability. 2012 COM Systems GmbH, Würselen (Germany). All rights reserved. COM, COM Systems, LCOS and vantage are registered trademarks. All other names or descriptions used may be trademarks or registered trademarks of their owners. Subject to change without notice. No liability for technical errors and/or omissions. Version 1.1 www.lancom.eu COM Systems GmbH I Adenauerstr. 20/B2 I 52146 Würselen I Germany I E-mail info@lancom.de I Internet www.lancom.eu