Omniaccess Stellar Wlan For Exp - Alcatel-Lucent Enterprise
Omniaccess Stellar Wlan For Exp - Alcatel-Lucent Enterprise
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniAccess Stellar Wireless Lan – Training offer for newcomers
Evolutive design
grow your WiFi at your own pace
Market position
WiFi Express WiFi Enterprise
Mutually exclusive with WiFi Enterprise Mutually exclusive with WiFi Express
All APs models supported All APs models supported
Virtual Controller Management with Web Centralized Management with OmniVista 2500
Interface 4000 APs managed
Cluster of 64 APs (cluster limitation of 32 AP1101) Access Switch required (PoE model if possible)
Access Switch required (PoE model if possible) DHCP server required
DHCP server required OmniVista 2500 server and licenses required
* Hardware limitation
OmniVista 2500
Cloud ready (for future release)
Unified wired-wireless
Access Management (Guest/BYOD)
Role based policy enforcement
Smart Analytics
Distributed intelligence control
Up to 4000 APs
Scale to support 100K clients per devices
Option 138
dhcpd.conf
Perform a factory reset/reboot or change the mode manually
PVC
Control
Plane Control Data
Control Plane Plane
Plane Control
Data
Data Plane
Plane
Plane
Data Control Data
Plane Plane Plane
Management Plane
Management plane – Type of Traffic
Configuration traffic (SSID creation,..)
Monitoring and troubleshooting (client monitoring,…)
AP management traffic is always untagged
Use the native vlan of the upstream switch and the subnet got from the DHCP scope
OmniVista
“Management” VLAN
“Management” VLAN Untagged
Untagged
WiFi WiFi
Express PVC
Enterprise
Management Plane – AP Group OmniVista
AP Group: Group 1, Group2
AP-Group
PVC AP Group 1 AP Group 2
WiFi-Express WiFi-Enterprise
Control Plane
Control Plane – Type of Traffic
Manages network protocols, Forwarding Information Base (FIB)
Manages authentication, packet inspection, load balancing
Over the Air
Control Plane
LAN
IP interfaces / Routers for
Distribution •All AP Mgt VLANs
•All SSID VLANs
Access
Stellar Access
Points
Network Topology - Configuration
AP : acts as a bridge
Management traffic: Untagged VLAN
Wireless client data: Tagged VLANS
WLAN VLANs
Same VLAN ID could be used for both wireless and
wired clients "Employee" VLAN
However, it is recommended to have reserved
VLAN ID for wireless clients
Up to 256 wireless clients in the same WLAN
256 Clients
Network Resiliency
AP does not support Linkagg or dual home attachment
If AP is plugged on 2 switches, only one uplink is active
If the active uplink provides POE and goes down, AP will reboot
Either Port can be connected, but it is recommended not to connect both ports
Active
OmniSwitch
Convergence time
Appendix
Option 138 for DHCP Server
Appendix
BLE Beaconing
BLE Beaconing ready for the AP1230 series and AP1201 with a built-in BLE
AeroScout tags
AeroScout solution utilize standard WiFi (802.11) technologies as a
communication infrastructure
Customers use the Stellar AP to communicate with AeroScout tags and
deliver information to the AeroScout Location Engine
#
# Classify OmniAccess Stellar AP as STELLAR
#
class "STELLAR" {
match if substring (option vendor-class-identifier, 0, 4) = "HAP.";
}
#
# Create custom option 138 as it is not known to isc-dhcp-server
#
option ovwma code 138 = ip-address;
Appendix
Example Configuration (ISC-DHCP-Server)
subnet 192.168.10.0 netmask 255.255.255.0 {
option routers 192.168.10.1;
option broadcast-address 192.168.10.255;
option domain-name-servers 192.168.10.1;
option domain-name "vlan10.home";
default-lease-time 6000;
max-lease-time 72000;
# Pool for OmniAccess Stellar AP
pool {
allow members of "STELLAR";
range 192.168.10.10 192.168.10.20;
option ovwma 192.168.0.61;
}
pool {
range 192.168.10.21 192.168.10.50;
allow unknown-clients;
}
}
Appendix
Example Configuration (OmniSwitch DHCPD)
OmniSwitch used as DHCP server
192.168.0.61
Appendix
DHCP Discover from AP1221
14:50:03.732118 IP (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto UDP (17), length 328)
0.0.0.0.68 > 255.255.255.255.67: [udp sum ok] BOOTP/DHCP, Request from 34:e7:0b:03:d0:60, length 300, xid
0xed131e0c, Flags [none] (0x0000)
Client-Ethernet-Address 34:e7:0b:03:d0:60
Vendor-rfc1048 Extensions
Magic Cookie 0x63825363
DHCP-Message Option 53, length 1: Discover
MSZ Option 57, length 2: 576
Parameter-Request Option 55, length 12:
Subnet-Mask, Default-Gateway, Domain-Name-Server, Hostname
Domain-Name, BR, NTP, Vendor-Option
TFTP, BF, Option 138, Option 212
Vendor-Class Option 60, length 19: "HAP.1-OAW-AP1221-RW"
END Option 255, length 0
PAD Option 0, length 0, occurs 17
Appendix
DHCP Offer to AP1221
14:50:04.734289 IP (tos 0x10, ttl 128, id 0, offset 0, flags [none], proto UDP (17), length 333)
192.168.10.1.67 > 192.168.10.13.68: [udp sum ok] BOOTP/DHCP, Reply, length 305, xid 0xed131e0c, Flags [none]
(0x0000)
Your-IP 192.168.10.13
Client-Ethernet-Address 34:e7:0b:03:d0:60
Vendor-rfc1048 Extensions
Magic Cookie 0x63825363
DHCP-Message Option 53, length 1: Offer
Server-ID Option 54, length 4: 192.168.10.1
Lease-Time Option 51, length 4: 6000
Subnet-Mask Option 1, length 4: 255.255.255.0
Default-Gateway Option 3, length 4: 192.168.10.1
Domain-Name-Server Option 6, length 4: 192.168.10.1
Domain-Name Option 15, length 11: "vlan10.home"
BR Option 28, length 4: 192.168.10.255
NTP Option 42, length 4: 192.168.10.1
3232235581 (decimal) = 0xC0A8003D (hexadecimal)
T138 Option 138, length 4: 3232235581 =>(C0, A8, 00, 3D) =>192.168.0.61
END Option 255, length 0
Follow us on…
facebook.com/ALUEnterprise
linkedin.com/company/alcatellucententerprise
twitter.com/ALUEnterprise
youtube.com/user/enterpriseALU
OmniAccess Stellar Wireless Lan
Stellar Hardware Presentation
Lesson summary
• List the Stellar Access points per capacity
• Position the Stellar Access Point in the market
OMNIACCESS STELLAR WLAN
Access Points Overview
OmniAccess Stellar AP Lineup
AP1201
802.11ac: Wave 2
OmniAccess Stellar AP1101
OAW-AP1101 – 802.11ac Wave 1 Entry Level AP
All indoor mounting kits can be applied to (OAW-AP-MNT-B mounting kit ships by default with
each AP)
OAW-AP1101
OAW-AP1221
OAW-AP1222
OAW-AP1231
OAW-AP1232
Outdoor AP Mounting Kits
Outdoor Mounting kit
AP-MNT-OUT
Pole or Wall mount
ADP-60GRBC
AC100-240V input, 48V DC output, 60W; Compatible with
802.3af/at; Applicable to
• OAW-AP1101
• OAW-AP1221
• OAW-AP1222
• OAW-AP1231
• OAW-AP1232
Antenna & Cables
Antennas (Applicable to Indoor AP ONLY)
Omnidirectional antenna that can be mounted directly on AP
Omnidirectional ceiling mount antenna
Directional antenna with 60 degree sector coverage
ANT-O-6 Dual band 2.4/5GHz, 1-element, direct mount , omni-directional, 6dBi (4x)
Dual band 2.4/5GHz, 4-element, Ceiling-mount , Downtilt omni-directional antenna, >5dBi (1x);
ANT-O-M4-5 includes 4* 30-35in RF cable
Dual band 2.4/5GHz, 4-element, Wall-mount, sector antenna , >5dBi, 60°Hx60°V (1x); includes 4*
ANT-S-M4-60 30-35in RF cable
Dual band 2.4/5GHz, 4-element, Wall-mount, sector antenna , >5dBi, 90°Hx90°V (1x); includes 4*
ANT-S-M4-90 30-35in RF cable
Dual band 2.4/5GHz, 4-element, Wall-mount, sector antenna , >5dBi, 120°V (1x); includes 4* 30-
ANT-S-M4-120 35in RF cable
Antenna & Cables Connection
Follow us on…
facebook.com/ALUEnterprise
linkedin.com/company/alcatellucententerprise
twitter.com/ALUEnterprise
youtube.com/user/enterpriseALU
OmniAccess Stellar Wireless Lan
WiFi Enterprise – Requirements
Lesson summary
• Identify the setup required in the WiFi Enterprise mode
• Configure the OmniVista 2500 server
• Configure the OmniSwitch
Initial Setup
Initial Setup
Hardware requirement
Alcatel OmniSwitch
PoE
Management VLAN
"ip helper" for external DHCP server
DHCP server
Option 138 on Management VLAN
Addresses Plan for Service VLAN
OmniVista as a Virtual Appliance. Open Virtualization Format (OVF) file runs on:
VMware ESXi 5.5 and above
Vmware Player 4.0 and above
Vmware vCenter Server 5.5 and above
OmniVista 2500 Licenses
+
Initial AP Additional AP Updated AP
License count License count License count
= 100 = 50 = 150
OmniVista 2500 Configuration
OmniVista 2500 installed
IP address and network mask
OmniVista Network size configuration
Default Gateway
Timezone, DNS server,… (optional)
Services Services
Databases Databases
Sync
Stand-by
Main OVOV Stand-by OV
Main OV
Laptop switch AP Laptop
Network devices must
Services Services
Databases Databases
Main OV Stand-by OV
High Availability (HA) creates a redundant (Stand-by) OmniVista which will take aver if the
primary (Main) OmniVista becomes unavailable
When control is moved from Main to Stand-by all services and operations are transferred
E.g. UPAM functions including BYOD and Guest Access is handled by Stand-by
All network monitoring services are taken over by Stand-by
SNMP configuration
Example in SNMPv2
-> aaa authentication snmp local
-> user snmpuser read-write all password snmpuser no auth
-> snmp security no-security
-> snmp community-map mode enable
-> snmp community-map public user snmpuser enable
-> snmp station OV_ip_address snmpuser v2 enable
OmniSwitch Automatic Configuration
Reduce the configuration steps on the Edge switch
No need to set a trunk port
No need to know in advance where the AP will be connected
On the same port, AP, Phone, Camera, PC can be plugged
No need to tag the “WLAN” vlan
Available in
AOS 8.4.1.R02
AOS 6.7.2.R02
OmniSwitch Automatic Configuration
AOS 8.4.1.R02
Edge Ports of the OmniSwitch are set as UNP port with type bridge
-> unp port slot/port port-type bridge
1
Implicit and built-in classification rule for AP, based on LLDP capabilities and MED device type
-> unp classification lldp med-endpoint access-point profile1 defaultWLANProfile
1 AP sends LLDP
3
Client Traffic
Available in AOS 8.4.1.R02 & 6.7.2.R02
Backup Slides
If you want to know more
OmniSwitch Automatic Configuration – AP Location Logic
If port alias (“interfaces chassis/slot/port alias <string>”) is configured on the port
=> AP Location = Port Alias
If the system name (“system name <string>”) is configured on the OmniSwitch
=> AP Location = “System Name”:“PortID”
By default
=> AP Location = “Chassis ID”:“PortID”
facebook.com/ALUEnterprise
linkedin.com/company/alcatellucententerprise
twitter.com/ALUEnterprise
youtube.com/user/enterpriseALU
Stellar OmniAccess Wlan
Lab: Initial Stellar Access Point deployment
How to
✓ How to deploy a Stellar Access Point in Enterprise mode
Contents
1 Objectives ...................................................................................... 3
2 Design and setup Lab information .......................................................... 3
2.1. Equipment List ......................................................................................... 3
3 State of your Lab equipment ................................................................ 3
3.1. LAN OmniSwitch ........................................................................................ 3
3.2. OmniVista 2500/UPAM ................................................................................ 4
3.2.1. Start the OV500 VM ........................................................................................ 4
3.2.2. Connect to OV2500 ......................................................................................... 5
3.2.3. AP Registration ............................................................................................. 5
3.2.4. Managed devices............................................................................................ 5
3.3. WLAN OmniAccess AP ................................................................................. 6
4 Configuring the LAN infrastructure for AP to OV2500 connectivity .................... 7
4.1. Topology ................................................................................................. 7
4.2. OmniSwitch 6860 configuration ..................................................................... 8
4.2.1. Access port .................................................................................................. 8
4.2.2. Backbone vlan ports ........................................................................................ 8
4.2.3. SNMP ......................................................................................................... 8
4.3. OmniSwitch 6560 configuration ..................................................................... 9
4.3.1. Access port .................................................................................................. 9
2
Lab: Initial Stellar Access Point deployment
Implementation
1 Objectives
• Identify the hardware
• Reset your equipment to initial settings
• LAN infrastructure pre-configuration
• Stellar AP deployment
Reset the OS6560 and OS6860 to initial configuration, using the script “reset_PODX” on the desktop.
Once the switch boots, verify that it booted from the working directory
->show running-directory
CONFIGURATION STATUS
Running CMM : PRIMARY,
CMM Mode : MONO CMM,
Current CMM Slot : A,
Running configuration : WORKING,
Certify/Restore Status : CERTIFIED
SYNCHRONIZATION STATUS
Running Configuration : SYNCHRONIZED,
4
Lab: Initial Stellar Access Point deployment
- According to your Pod number, select the Virtual Machine OV2500-4.3R1-b47-StellarX, then right-click on
it and select Snapshot -> Snapshot Manager.
- In the Snapshot Manager window Select OV2500 – Fresh Install and click on Go to.
- Click Yes to confirm it.
5
Lab: Initial Stellar Access Point deployment
Notes:
The Virtual Machine is already configured:
IP: 10.130.5.50+X/24, replace X by your Pod number
UPAM IP: 10.130.5.70+X
Console credentials: cliadmin / Alcatel.0
3.2.3. AP Registration
- In OV Network->AP Registration
- Check the Access Point List Managed and Unmanaged
- Delete all AP if present
- On the OS6560 and OS6860, activate the port 1/1/3 and turn on the lanpower. This will power on the APs
OS6560
-> interfaces 1/1/3 admin-state enable
-> lanpower slot 1/1 service start
OS6860
-> interfaces 1/1/3 admin-state enable
-> lanpower slot 1/1 service start
- The APs should have been purged at the end of the previous session. Open the console on both APs and log
in with the default credentials:
AP1101 & AP1221
Login: support
Password: aos2016
- If you can log in, then the AP is already purged and you can go to the section 4.
- If the log in is incorrect, enter the following credentials (configured later in the lab):
AP1101 & AP1221
Login: support
Password: Alcatel.0
- Enter these commands to reset the configuration to factory default and reboot the APs:
AP1101 & AP1221
support@AP-<MAC@>:”$ ssudo firstboot
This will erase all settings and remove any installed packages. Are you sure [N/y] y
support@AP-<MAC@>:”$ ssudo reboot
- The APs are now purged and have a factory default configuration.
Notes:
If you cannot reset the Stellar AP with the credentials listed above, use this alternate procedure:
- Open a console connection on the Stellar AP and restart the Stellar APs with the command “lanpower
slot …” of the OmniSwitch where the Stellar AP is connected.
- On an AP1221, 23sec after the reboot of the AP, the following message is displayed “Press the [f]
key and hit [enter] to enter failsafe mode”.
- Hit [f] and then [Enter]
- When you enter the failsafe mode, enter “mount_root”
- Then, enter “firstboot –y”
- And finally “reboot”
7
Lab: Initial Stellar Access Point deployment
4.1. Topology
DHCP OmniVista / UPAM
P: 10.130.5.50+X
P: 10.130.5.7 P: 10.130.5.70+X
Backbone
10.130.5.253
VLAN 1305
1/1/1 10.130.5.200+X
OS6860 2
1/1/2
1/1/3
VLAN 40
10.7.X.126
AP 2X
Client 2X 1221
Default
VLAN 999
TAG
Vlan 40
1/1/2
1/1/3
VLAN 40
AP 1X
Client 1X 1101
Notes:
DHCP Option 138 in the management VLAN (40) is mandatory for the AP’s contact the OV2500
The management vlan is untagged and the SSID vlans are tagged on the switch port where the AP’s
are connected.
8
Lab: Initial Stellar Access Point deployment
OS6860
-> vlan 40 name “Enterprise”
-> vlan 40 members port 1/1/3 untagged
-> ip interface Enterprise address 10.7.X.126/27 vlan 40
-> lanpower slot 1/1 service start
-> interfaces 1/1/3 alias “AP2X”
-> interfaces 1/1/3 admin-state disable
- Trunk port 2:
Tag vlan 40 (carrying AP data traffic)
Tag vlan 1305 (carrying traffic between OS6560 and OV2500)
- Port 1/1/1: connects LAN to backbone
OS6860
-> vlan 999 name “Trash”
-> vlan 999 members port 1/1/2 untagged
-> vlan 40 members port 1/1/2 tagged
-> vlan 1305 name “Backbone”
-> vlan 1305 members port 1/1/1 untagged
-> vlan 1305 members port 1/1/2 tagged
-> ip interface Backbone address 10.130.5.200+X/24 vlan 1305
-> ip static-route 0.0.0.0/0 gateway 10.130.5.253
-> ip helper address 10.130.5.7
-> interfaces 1/1/1-2 alias “Backbone”
-> interfaces 1/1/1-3 admin-state enable
-> write memory
4.2.3. SNMP
4.3.3. SNMP
- Setup SNMP for later discovery through OV2500
OS6560
-> aaa authentication default local
-> user snmpuser password snmpuserv2 read-write all no auth
-> snmp security no-security
-> snmp community-map mode enable
-> snmp community-map public user snmpuser enable
-> snmp station 10.130.5.50+X 162 snmpuser v2 enable
-> write memory
4.4. Test
- Verifying Backbone and LAN Switch connectivity
OS6560 / OS6860
-> ping 10.130.5.7 (DHCP server)
-> ping 10.130.5.(50+X) (OV 2500 server)
OS6560
-> ping 10.7.X.126 (vlan40 OS6860)
10
Lab: Initial Stellar Access Point deployment
- Select the two ranges created and then press on Discover Now. Once the Discovery process is completed,
click on Finish.
- You should display as follow:
11
Lab: Initial Stellar Access Point deployment
5.2. AP Registration
- In Network > AP Registration, see the two Access Points UP in UnManaged List
Notes: If you go to the AP Registration page for the first time, you will be prompted to define a
country/region. Select “FR – France” or any other country and click on OK. Do not choose the
country code USA, Japan or Israel as the APs used in the Remote Lab are not compatible with
these country codes.
- In the AP Group submenu, click on the “+” button to create an AP group named “APGx” (x is your POD
number)
- Keep the default parameters. In the “SSH” section of your AP-Group “APGx”, turn on SSH Login and set
the password to “Alcatel.0” and confirm it. This password will be used at the end of the session to reset
the AP.
Notes: APs in an AP Group share common options like RF Profile, Timezone, NTP, Syslog and PMD
(TFTP) servers
- Go to the Access Points submenu. In the Managed tab, select the two APs and click on the “Edit” button.
- In the contextual window, click on “Change Group”.
The two Access Points should be displayed on OmniVista Dashboard in AP Management widget and group
APGx in AP Groups widget.
By clicking on More, you can access to the configuration page of the AP group and the Access Points.
6 Test
3. Which information are shared among APs having the same RF profile?
Stellar OmniAccess Wlan
Lab: Create a secure Employee SSID
How to
✓ How to create a secure SSID for Employee in an Enterprise mode with
Stellar Access Points
Contents
1 Creation & Deployment of an SSID.......................................................... 2
1.1. Topology ................................................................................................. 2
1.2. Service Vlans ............................................................................................ 2
1.2.1. Creation of an SSID EmployeeX .......................................................................... 4
1.2.2. Creation of a WLAN Service profile (SSID) .............................................................. 5
1.2.3. AAA Server Profile .......................................................................................... 5
1.2.4. Access Role Profile ......................................................................................... 6
1.2.5. Apply the Access Role Profile to the APs ................................................................ 6
1.2.6. Authentication Strategy ................................................................................... 7
1.2.7. Access Policy configuration ............................................................................... 8
1.2.8. Create an Employee Account ............................................................................. 9
1.2.9. Apply Profile(s) to AP Group(s) ......................................................................... 10
2 Testing Employee Wireless Access with Internal UPAM RADIUS Authentication .... 11
2.1.1. Test wireless connectivity............................................................................... 11
2.1.2. Setup the client to connect to the SSID EmployeeX ................................................. 11
2.1.3. OmniVista 2500/UPAM monitoring ..................................................................... 15
3 Test ........................................................................................... 18
2
Lab: Create a secure Employee SSID
1.1. Topology
P: 10.130.5.50+X
P: 10.130.5.7 P: 10.130.5.70+X
Backbone
10.130.5.253
OS6860 2
EmployeeX 1/1/2
1/1/3
Vlan 20 VLAN 40
10.7.X.126
10.7.X.62 AP 2X
Client 2X 1221
Default
VLAN 999
TAG
Employee Vlan 20
TAG
Vlan 40
1/2
We need first to create the VLAN 20 (needed to service the SSID “EmployeeX”) and tagged it towards the AP
from the Switch and over the trunk link between access and core switches.
OS6560
-> vlan 20 name “EmployeeX”
-> vlan 20 members port 1/1/3 tagged
-> vlan 20 members port 1/1/2 tagged
-> ip interface EmployeeX address 10.7.X.61/27 vlan 20 ,Replace X by your POD number
OS6860
-> vlan 20 name “EmployeeX”
-> vlan 20 members port 1/1/3 tagged
-> vlan 20 members port 1/1/2 tagged
-> ip interface EmployeeX address 10.7.X.62/27 vlan 20 ,Replace X by your POD number
4
Lab: Create a secure Employee SSID
Notes: AAA server and Access role profiles can be created first prior to setup WLAN services but for
this exercise you will create specific profiles through the WLAN Service configuration screen.
Tips: UPAM supports both captive portal and RADIUS server and can be used to implement multiple
authentication methods: MAC, 802.1X and captive portal authentication. User Profiles can be
supported in the OmniVista database or on external servers.
Authentication Servers
802.1X
Primary: UPAMRadiusServer
Captive Portal
Primary: UPAMRadiusServer
MAC
Primary: UPAMRadiusServer
Accounting Servers
802.1X
Primary: UPAMRadiusServer
Captive Portal
Primary: UPAMRadiusServer
MAC
Primary: UPAMRadiusServer
Notes: In UPAM, there is a system-defined NAS Client Item (All Managed Devices). It cannot be
deleted and is used to indicate that all the devices managed by OmniVista are automatically added
into the NAS Client Database of UPAM and perform the AAA process.
The shared secret in the system-defined “All Managed Devices” NAS profile is “123456”.
- In the Security section, click on the “Default Access Role Profile” field, select “+ Add New” and create
the Access Role Profile Access-role-employeeX.
- Keep the default values for all parameters.
- Click on the Create icon.
- Back to the WLAN Service page, in the Security section, select “Access-role-employeeX” as the Default
Access Role Profile.
- Click on the Create icon.
- Do not change the Mapping method and enter the Vlan number “20” which is the EmployeeX VLAN.
- Click on Apply.
7
Lab: Create a secure Employee SSID
- This is how the AP will map the Employee VLAN (20) to the EmployeeX SSID.
When the SSID uses Enterprise authentication, assign a AAA Server Profile and then create an Authentication
Strategy and Access Policy.
At this step, the AAA Server Profile is already assigned to the SSID. The Authentication policy and Access Policy
must be created.
Notes: Authentication Strategy is used to set up a user profile source and login method (web page
or not) for authentication, as well as the network attributes applied after a successful
authentication.
OV2500 -> UPAM -> Authentication -> Authentication Strategy -> + (Create icon)
- Name the Strategy “User-PODX”, select the Authentication source as “local database”, “Access-role-
employeeX” as the default Access role profile and keep Web Authentication to none:
8
Lab: Create a secure Employee SSID
Notes: Authentication Access Policies are used to define the mapping conditions for an
authentication strategy. Through Access Policy configuration, authentication strategy can be
applied to different user groups, which can be divided by SSID or other attributes.
OV2500 -> UPAM -> Authentication -> Access Policy -> + (Create icon)
- Create the access policy “User-PODX” that will define the previous strategy to apply for employee
authentication connected to SSID “EmployeeX”. The employeeX profile will use 802.1X with the UPAM
internal RADIUS server.
- In the Mapping Condition, select the SSID attribute and EmployeeX. Click on the + button.
- Keep “User-PODX” as the Authentication Strategy and click on Create.
9
Lab: Create a secure Employee SSID
User: EmployeeX
Password: password
User is bound to the Access role “Access-role-employeeX”.
Click on Create.
Notes: You can automatically import a xls/csv/xlsx file containing Employee Account information
by clicking on the Import button at the top of the screen. You can also download a template by
clicking on the import button then clicking on the template Download button.
10
Lab: Create a secure Employee SSID
The newly created SSID must be applied to the Stellar Access Points, otherwise the configuration is kept locally.
OV2500 -> WLAN -> WLAN Service
- Select the checkbox next to the SSID “EmployeeX” and click on the Apply to Devices button to assign the
profile to the Stellar APs of the network.
Open vSphere Client, using the login “StellarPodX” and the password “alcatel”. Start the
VM “StellarClientX”.
Click on Set up a new connection or network and then Manually connect to a wireless network
Click ‘Next’
12
Lab: Create a secure Employee SSID
Configure as follows:
1. Click ‘Next’
Click on ‘Settings’
Click on ‘Configure’ and uncheck ‘Automatically use my Windows logon name…’. This will make sure
your windows login credentials are not used for the authentication.
4. Click on ‘Advanced Settings’ and Check ‘Specify Authentication Mode’ and select ‘User
Authentication’
14
Lab: Create a secure Employee SSID
Connect to your EmployeeX SSID using the credentials that you have entered in the local user database:
User: EmployeeX
Passwd: password
Once a successful connection has been established, you should have an IP address in the
10.7.X.32/27 network (not the self asigned 169.254.x.x address). You should be able to ping
the DHCP (10.130.5.7) and OV2500/UPAM (10.130.5.50+X) IP addresses as well as Internet.
15
Lab: Create a secure Employee SSID
With the Locator application, you can click on Search by to locate a “user” based on criteria as Auth user, Mac
Address or IP Address or Hostname.
Here you can specify as auth user name: EmployeeX and click on Locate to run the research within the network.
17
Lab: Create a secure Employee SSID
In the Netforward Results Table, Locator reports all equipment that meet both of the criteria. The table display
will vary depending on the view option you choose - Location (default), Classification, Data Center, or Template,
which is used to create custom views.
3 Test
1. Can you update automatically any parameter modification from OV to the APs?
How to
✓ How to create a secure SSID for Employee in Enterprise mode with an
Active Directory
Contents
1 Creation & Deployment of an SSID.......................................................... 2
1.1. Topology ................................................................................................. 2
1.2. Service Vlans ............................................................................................ 2
1.2.1. Creation of an SSID Employee-ADX ...................................................................... 3
1.2.2. Creation of a WLAN Service profile (SSID) .............................................................. 4
1.2.3. Create the AD server ....................................................................................... 4
1.2.4. Authentication Strategy ................................................................................... 5
1.2.5. Policy List Web-Services ................................................................................... 6
1.2.6. Create the Access-Role “Access-Role-Contractor” .................................................... 7
1.2.7. AD Role Mapping ............................................................................................ 8
1.2.8. Access Policy configuration ............................................................................... 9
1.2.9. Apply Profile(s) to AP Group(s) ........................................................................... 9
2 Testing Employee-AD Wireless Access with Internal UPAM RADIUS Authentication and AD
database ...................................................................................... 11
2.1.1. Test wireless connectivity............................................................................... 11
2.1.2. Setup the client to connect to the SSID Employee-ADX ............................................. 11
3 Test ........................................................................................... 16
2
Lab: Create a secure Employee-AD SSID using Active Directory
1.1. Topology
P: 10.130.5.50+X
P: 10.130.5.7 P: 10.130.5.70+X
Backbone
10.130.5.253
OS6860 2
Employee-ADX 1/1/2
1/1/3
Vlan 20 VLAN 40
10.7.X.126
10.7.X.62 AP 2X
Client 2X 1221
Default
VLAN 999
TAG
Employee Vlan 20
TAG
Vlan 40
1/2
The Employee-ADX SSID will use the same VLAN 20 than the Employee SSID.
Employees will then have two SSIDs to connect to the corporate network with the same network access rights.
No new VLAN required.
3
Lab: Create a secure Employee-AD SSID using Active Directory
- Enter the Service Name Employee-ADX and replace X by your POD number.
- In the Basic section configure the following parameters :
ESSID - Employee-ADX
Hide SSID - Disable
Enable SSID - Enable
Allowed Band - All
- In the Security section configure the following parameters :
Security Level - Enterprise
Encryption type - WPA2_AES
AAA Profile - AAA-Server-PODX
Default Access Role Profile - Access-role-employeeX
- Keep the default values for all the other parameters and click on Apply.
Notes: We will use the same AAA Profile and Default Access Role Profile than the EmployeeX SSID.
The type of authentication and Radius server do not change here. It is the user Database that will
be later selected to point to the Active Directory.
- Click on Test Connection and check that you get the following message :
Notes: Authentication Strategy is used to set up a user profile source and login method (web page
or not) for authentication, as well as the network attributes applied after a successful
authentication.
OV2500 -> UPAM -> Authentication -> Authentication Strategy -> + (Create icon)
- Name the Strategy “EmployeeAD-PODX” and set the Authentication source as “External LDAP/AD”.
- Enable the Role Mapping, set “Access-role-employeeX” as the default Access role profile and keep the
Web Authentication to none:
6
Lab: Create a secure Employee-AD SSID using Active Directory
In this lab, two different type of users can be authenticated on the Employee-ADX SSID. The company
employees and the contractor. Each company employee will use its own credentials whereas the
contractors will use a unique login and password to access the network.
Based on the Department parameter returned by the AD server, the company employees will be given a
full access to the network and the contractor will have a restricted access to the network.
The restricted access to the network is defined by a policy List and will deny access to HTTP(S) traffic.
Go to:
OV2500 -> Unified Access -> Unified Policy -> Users & Groups -> Unified Policy List -> + (Create icon)
- For the Add Unified Policies parameter, click on the Add button .
- In the Create Service Group page, you will find an empty table as customized services have not been
defined yet. Click on the Add button on the right side of the table and in the create service page
enter the following:
o Service Name: Web-Service
o Protocol: TCP
o Source Port: Enter http in the search field and click on click on Select all (HTTP, HTTP-alt
and HTTP-SSL).
o Destination Port: Do not modify this field.
o Click on Create to complete the creation of the “Web-Service” and then on Finish.
- Click on Create to complete the creation of the policy. Then confirm the creation by clicking on OK.
7
Lab: Create a secure Employee-AD SSID using Active Directory
- Back to the Policy List configuration page, select the Policy Deny-http-PODX in the Add Unified
Policies field and click on Next.
- In the device selection page, click on ADD in front of “0 AP Groups”. Move the AP Group APGX to the
right side of the table and click on OK.
- Click on Create and then on OK.
The Policy-List “ContractorX-Policy-List” must then be contained in an Access Role Profile that will be
assigned to the Contractor users.
Go to:
OV2500 -> Unified Access -> Unified Profile -> Template -> Access Role Profile -> + (Create icon)
Based on the Department name returned by the AD for each user, the network access behavior will be
changed.
A company employee user will have a full access to the network. No Role mapping configuration is
performed for the Employee users, so they will get the Access Role Profile “Access-Role-Employee0”
configured in the Employee-ADX SSID.
The AD will return the Department name “Contractor” for the contractor users. Based on this parameter,
the contractors will be assigned to Access Role Profile “Access-Role-Contractor” - created earlier - that
will deny their HTTP(S) traffic.
Go to :
OV2500 -> UPAM -> Authentication -> Role Mapping LDAP/AD -> + (Create icon)
Notes: Authentication Access Policies are used to define the mapping conditions for an
authentication strategy. Through Access Policy configuration, authentication strategy can be
applied to different user groups, which can be divided by SSID or other attributes.
OV2500 -> UPAM -> Authentication -> Access Policy -> + (Create icon)
- Create the access policy “EmployeeAD-PODX” that will define the previous strategy to apply for
employee authentication connected to SSID “Employee-ADX”. This profile will use 802.1X with the UPAM
internal RADIUS server.
- In the Mapping Condition, select the SSID attribute and Employee-ADX. Click on the button.
- Keep “EmployeeAD-PODX” as the Authentication Strategy and click on Create.
The newly created SSID must be applied to the Stellar Access Points, otherwise the configuration is kept locally.
OV2500 -> WLAN -> WLAN Service
- Select the checkbox next to the SSID “Employee-ADX” and click on the Apply to Devices button to assign
the profile to the Stellar APs of the network.
Open vSphere Client, using the login “StellarPod0” and the password “alcatel”. Start the
VM “StellarClientX”.
Click on Set up a new connection or network and then Manually connect to a wireless network
Click ‘Next’
12
Lab: Create a secure Employee-AD SSID using Active Directory
Configure as follows:
1. Click ‘Next’
Click on ‘Settings’
Click on ‘Configure’ and uncheck ‘Automatically use my Windows logon name…’. This will make sure
your windows login credentials are not used for the authentication.
4. Click on ‘Advanced Settings’ and Check ‘Specify Authentication Mode’ and select ‘User
Authentication’
14
Lab: Create a secure Employee-AD SSID using Active Directory
Connect to your Employee-ADX SSID using first the Employee account saved on the AD:
User: Employee
Passwd: Alcatel.0
Once a successful connection has been established, you should have an IP address in the 10.7.X.32/27
network (not the self asigned 169.254.x.x address). You should be able to ping the DHCP (10.130.5.7)
and OV2500/UPAM (10.130.5.50+X).
Open a web browser and enter the URL https://10.7.X.62 (OV2500 IP address).
As the Employees have full access to the network, you can join the web interface of the OmniSwitch.
Log out from the SSID Employee-ADX and log in, using this time the Contractor account:
User: Contractor
Passwd: Alcatel.0
15
Lab: Create a secure Employee-AD SSID using Active Directory
Once a successful connection has been established, check that you have an IP address in the same
subnet as earlier : 10.7.X.32/27 (and not the self asigned 169.254.x.x address).
Open a web browser and enter the URL https://10.7.X.62 (OS6860 IP address).
As the Contractors have limited access to the network (no web traffic allowed), the HTTPS request will
fail here – as intended.
Notes: Complex network access restrictions can be configured and applied to the Access Role
Profile, such as Bandwidth restriction, traffic restriction based on IP addresses, type of traffic.
3 Test
Bandwidth Contract
Upstream (Ingress) bandwidth (and depth) for the SSID
Downstream (Egress) bandwidth (and depth) for the SSID
Broadcast Optimization
Broadcast Filter All
Drop all broadcast packets except DHCP & ARP.
Broadcast Filter ARP
Convert broadcast ARP to unicast ARP
Recommended if no specific multicast application is used
WLAN Service – Broadcast & Multicast Optimization
Multicast Optimization / IGMP Snooping
Multicast normally sent on the “Group” (GTK key) to reach all stations
Uses the lowest data rate (which is typically 1 Mbps for the 802.11 b/g/n and 6 Mbps for 802.11 a/n)
Default OV Settings
WMM 802.1p DSCP
Best Effort 0,3 0x00, 0x18 – 0, 24
Background 1,2 0x08, 0x10 – 8, 16
Voice 6,7 0x30, 0x38 – 48, 56
Video 4,5 0x20, 0x28 – 32, 40
WLAN Service - Others
WMM Power Save
Always enabled on AP
As per 802.11e
WMM also features a Power Save certification that helps small devices on a network conserve battery
life. Power Save allows small devices, such as phones and PDAs, to transmit data while in a low-power
"dozing" status.
facebook.com/ALUEnterprise
linkedin.com/company/alcatellucententerprise
twitter.com/ALUEnterprise
youtube.com/user/enterpriseALU
OmniAccess Stellar Wireless Lan
User Role and Bandwidth Control
Lesson summary
• Understand a user role
• Configure the bandwidth contracts and understand the
precedence system
User Role
User Role - Overview
Policy List:
User Role = Policy List
"Policy-Guest"
List of Policy Rules (ACLs)
Action can be • Rule : "http-traffic"
Accept/drop ➢ Action: Accept
Bandwidth control • Rule: "Network-traffic"
Priority, 802.1p, DSCP marking ➢ Action: Deny
Application Policy Rules (DPI) • Rule: "Guest-speed"
In Application Visibility, application/application ➢ Action: 1Mb/s
group Policy Rules can be set in a Policy List • Rule: "Guest-priority"
Enforcement is bidirectional ➢ Action: 802.1p=3
Policy List Assignment
From RADIUS
From Access Role Profile (Default Policy List)
Built-in roles
Redirection (UPAM)
Access Role
Unauthorized (Time and Location based policy) Profile
RADIUS Server
User Role - Considerations
No Policy List / ACL on SSID
Can not be directly assigned on the WLAN Service/SSID
Assigned in the Access Role Profile set for the WLAN Service/SSID
Access Role Profile can also be returned by RADIUS
AP support
Policy Rules / ACL
SSID "Guest0"
Bandwidth Control
User Role – Bandwidth Control
Bandwidth contract at WLAN Service / SSID level
Upstream (Ingress) bandwidth (and depth) for the SSID
Downstream (Egress) bandwidth (and depth) for the SSID
Bandwidth shared for all user, per radio
User Context
• Role / Policy List
• Access Role Profile
• WLAN Service /SSID
Matches a
Matches N
DPI N Access Role N N
User an ACL in SSID set with No BW
application set with BW
Traffic the Policy BW Control ? Limitation
in the Policy Control ?
List ?
List? All User
Other User Other User
Traffic Traffic Y Traffic Y
Y
Y
User BW
Application Specific ACL Specific BW Enforcement Shared BW Enforced
BW Enforcement Enforcement
as per DPI Rule as per Access Role as per WLAN Service/SSID
as per Policy List Profile
User Role /Policy List Access Role Profile WLAN Service / SSID
Per User & Application BW Control Per User BW Control All Users shared BW
Follow us on…
facebook.com/ALUEnterprise
linkedin.com/company/alcatellucententerprise
twitter.com/ALUEnterprise
youtube.com/user/enterpriseALU
OmniAccess Stellar Wireless Lan
Unified Policy Authentication Manager (UPAM) - Guest
Lesson summary
• Understand the UPAM application.
• Configure a UPAM Guest access and the Guest operator
UPAM
Overview
Unified Policy Authentication Manager
OmniVista 4.2.2R01 has 2 new optional applications
Guest Access – Guest License required
BYOD Access – BYOD License required
UPAM consists of
Guest Access
BYOD Access
A built-in RADIUS Server
A built-in MAC Authentication Server
UPAM – Wired and Wireless user services
Network Enforcement
What is the default Role of the user if the
Authentication server doesn’t return a role
Web Redirection
Web Authentication – which Captive Portal
template is returned
Guest Access Strategy
UPAM – Location Based Policy Control
New Access Policy parameters New Authentication Strategy Location Policy
Access Policy based on NAS Client Location Reload Enforcement – Apply new Policy when
Access Policy based on AP Group
moving from Lobby Guest to Hotel Room Guest
Overwrite enforcement – Keep Hotel Room Guest
Policy even when moving ton Lobby
UPAM
Guest Access
UPAM – Guest Access
WEB Redirection/Registration
Authentication Strategy can impose a Web Redirection for Guest Access
Registered & Remembered device/MAC address database
Post Web Network Enforcement
Guest Access Strategy
Registration Strategy
Account Validity Period
Device Validity Period
Max number of devices per account
Self-registration strategy
Only for Username & Password
Notification with Web, Email or SMS: E-mail server and SMS gateway configuration in UPAM
Employee Sponsor
Guest Account
Local Guest Account Database
Created by Admin, employee sponsored, or from a Self-Registration
UPAM – Guest Access Strategy
Registration
Strategy
Login Strategy
Self-Registration
Strategy
Guest Tunneling
Guest Tunneling
facebook.com/ALUEnterprise
linkedin.com/company/alcatellucententerprise
twitter.com/ALUEnterprise
youtube.com/user/enterpriseALU
Stellar OmniAccess Wlan
Lab: Create a Guest SSID
How to
✓ How to create a Guest SSID for Visitor in an Enterprise mode with
Stellar Access Points
Contents
1 Creation and Deployment of a Gest SSID .................................................. 2
1.1. Topology ................................................................................................. 2
1.2. Service Vlans ............................................................................................ 2
1.3. Creation of an SSID GuestX ........................................................................... 3
Creation of a WLAN Service profile (SSID) .............................................................. 4
AAA Server Profile .......................................................................................... 4
Access Role Profile ......................................................................................... 5
Apply the Access Role Profile to the Stellar APs ....................................................... 5
Activate Server Redirection ............................................................................... 6
Authentication Strategy ................................................................................... 7
Access Policy configuration ............................................................................... 8
Create a Guest Account ................................................................................... 9
Guest Access Strategy ..................................................................................... 9
Captive Portal Customization ...................................................................... 10
Apply Profile(s) to AP Group(s) .................................................................... 11
Mail Server Configuration .......................................................................... 13
1.1. Topology
DHCP OmniVista / UPAM
P: 10.130.5.50+X
P: 10.130.5.7 P: 10.130.5.70+X
Backbone
10.130.5.253
OS6860
2
GuestX
1/1/2
Vlan 30 1/1/3
VLAN 40
AP 2X 10.7.X.126
10.7.X.94 Client 2X 1221
Default
VLAN 999
TAG
Guest Vlan 30
TAG
Vlan 40
1/2
We need first to create the VLAN 30 (needed to service the SSID “GuestX”) and tagged it towards the AP from
the Switch and over the trunk between access and core switches.
OS6560
-> vlan 30 name “GuestX”
-> vlan 30 members port 1/1/3 tagged
-> vlan 30 members port 1/1/2 tagged
-> ip interface GuestX address 10.7.X.93/27 vlan 30 ,Replace X by your POD number
OS6860
-> vlan 30 name “GuestX”
-> vlan 30 members port 1/1/3 tagged
-> vlan 30 members port 1/1/2 tagged
-> ip interface GuestX address 10.7.X.94/27 vlan 30 ,Replace X by your POD number
1.3. Creation of an SSID GuestX
Notes: AAA servers and Access role profiles can be created first prior to setup WLAN services but
for this exercise you will create specific profiles through the WLAN Service configuration screen.
Tips: UPAM supports both captive portal server and RADIUS server; and can be used to implement
multiple authentication methods, such as MAC authentication, 802.1X authentication, and captive
portal authentication. User Profiles can be supported in the OmniVista database or on external
servers.
Accounting Servers
802.1X
Primary: UPAMRadiusServer
Captive Portal
Primary: UPAMRadiusServer
MAC
Primary: UPAMRadiusServer
- In the Security section, click on the “Default Access Role Profile” field, select “+ Add New” and create the
Access Role Profile access-role-guestX.
- Set the Redirect Status parameter to Enable as the Guest traffic will be redirected to the Captive Portal.
- Click on the Create icon.
- Back to the WLAN Service page, in the Security section, select “access-role-guest” as the Default Access
Role Profile.
- Click on the Create icon.
- Do not change the mapping Method and enter the Vlan number “30” which is the GuestX VLAN.
- This is how the AP will map the Guest VLAN (30) to the GuestX SSID.
OV2500 -> Unified Access -> Unified Profile -> Template -> Global Configuration -> Setting
- Select the default profile “upamGlobalConfigurationl” and click on the Edit button.
- In the Redirect Server Host field, check that you have the secondary IP address “10.130.5.70(+Pod
Number)”. If not, enter this value.
- Click on Apply.
When the SSID uses the Captive Portal authentication, assign a AAA Server Profile and then create an
Authentication Strategy and Access Policy.
At this step, the AAA Server Profile is already assigned to the SSID. The Authentication policy and Access Policy
must be created.
7
Lab: Create a Guest SSID
Authentication Strategy
Notes: Authentication Strategy is used to set up a user profile source and login method (web page
or not) for authentication, as well as the network attributes applied after passing the
authentication.
OV2500 -> UPAM -> Authentication -> Authentication Strategy -> + (Create icon)
- Name the strategy “Guest-PODX”, select the Authentication source as “None”. As the initial
Authentication is set to “Open”, it does not require an Authentication source.
- Set the Web authentication to “Guest” and the Guest Access Strategy to “Default Guest”.
Notes: By setting the Web authentication to “Guest”, the UPAM server will return the “Guest”
Captive Portal pages. The Guest Access Strategy is the Guest Captive Portal template that will
define how the Captive Portal Authentication will be performed.
8
Lab: Create a Guest SSID
Notes: Authentication Access Policies are used to define the mapping conditions for an
authentication strategy. Through Access Policy configuration, authentication strategy can be
applied to different user groups, which can be divided by SSID or other attributes.
OV2500 -> UPAM -> Authentication -> Access Policy -> + (Create icon)
- Name the Policy Name “Guest-PODX” that will define the previous strategy to apply for guest
authentication connected to SSOD “GuestX”. The guestX profile will use an Open Authentication and a
Guest Web Authentication.
- In the Mapping Condition, select the SSID attribute and GuestX. Click on the + button.
- Select “Guest-PODX” as the Authentication Strategy and click on Create.
9
Lab: Create a Guest SSID
OV2500 -> UPAM -> Guest Access -> Guest Account -> + (Create icon)
- In order to create a login account for a guestX users in the local UPAM Database enter the following
parameters:
User: GuestX
Password: password
Guest Strategy: Default Guest.
- Click on Create.
Notes: Another way to create a Guest account is via a Guest Operator web page. Once a Guest
Operator account has been created, log in with the provided URL and create a Guest account. A
Guest operator has no other rights on the OmniVista Server.
When the Captive portal Authentication is used to authenticate Guest users, the Guest Access Strategy will
define multiple parameters, such as:
- The validity period of the Guest accounts and the maximum number of devices authorized per guest account
- The login strategy: username & password, Terms & Conditions or Access Code
- Post Portal Authentication Enforcement
- Self-registration strategy
In this scenario, you can keep the default values for most of the parameters, but the self-registration will be
activated as well as the approval by sponsor.
That way, an employee acting as the approver has to validate any new Guest request.
OV2500 -> UPAM -> Guest Access -> Guest Access Strategy
- Select the default guest strategy “Default Guest” and Edit it.
- Keep the default values in Registration Strategy.
- In Login Strategy, select Username & Password and set the Success Redirect URL to Go to Success Page.
- Keep the default values in Post Portal Authentication Enforcement.
10
Lab: Create a Guest SSID
- In Self-Registration Strategy, Enable Self-Registration and select “Approve By Employee Sponsor” in the
Approval field.
- Set the Email Suffix Restriction to “@company.com” and click on the “+” button to add the suffix.
- Click on Apply.
At this time the guest user page, seen by guest users, is the Alcatel-Lucent default page. This section will show
you how to modify the actual Captive Portal page seen by the guest users by using your own logos / graphics,
welcome text and advertisement panels.
- Once the templates have been selected, select the DefaultPortal profile and click on the Customization
button.
11
Lab: Create a Guest SSID
Notes: The size of the picture should match the size of the Advertisement section, otherwise, the
picture will be scaled and deformed.
The link to a URL can be used instead of a picture.
- Click on Apply.
Both Welcome and Success pages of the “DefaultProfile” template are now customized and will be seen by the
guest users.
Notes: A new template can be defined, with different Welcome and Success pages.
In UPAM -> Guest Access -> Guest Access Strategy, select the new template in the “Redirect
Strategy” field.
The look and feel of the Captive Portal can then be quickly modified for the Guest users.
The newly created SSID must be applied to the Stellar Access Points, otherwise the configuration is kept locally.
OV2500 -> WLAN -> WLAN Service
- Select the checkbox next to the SSID “GuestX” and click on the Apply to Devices button to assign the
profile to the Stellar APs of the network.
12
Lab: Create a Guest SSID
- Click on Add AP Group, move the AP Group APGX to the right and click on OK.
The last step is to configure the parameters related to the mail server. The OmniVista server will send emails to
the sponsor when a Guest requests an account.
- A mail server is already configured in the remote lab. Enter the following parameters:
- SMTP Server : mail.company.com
- Port : 25
- Send From : [email protected] , Replace X by your POD number
- Password : password
- Security Type : TLS
- Click on Apply.
14
Lab: Create a Guest SSID
Open vSphere Client, using the login “StellarPodX” and the password “alcatel”. Start the
VM “StellarClientX”.
Open now a web browser on the Client and enter any valid IP address or URL.
The traffic is redirected by the OmniVista server to the UPAM server and the Captive Portal Guest page is
returned.
Notes: If the web redirection does not work and indicates a DNS failure, restart both Stellar APs.
Use the “lanpower” command on the OS6560 and 6860.
The reason is that the Stellar AP requires a reload for the redirection URL to be applied.
In the log-in window, the guest can log-in with two different ways:
- Using the Guest log-in and password created in the guest local database (GuestX/password)
15
Lab: Create a Guest SSID
- Create your own username and password by clicking on “Create new one if don’t have an account”.
- In the new window, enter the username and password desired for the new guest as well as the email
address of the sponsor and click on Register.
Username : NewGuest
Password : password
Sponsor address : [email protected] , Replace X by your POD number
A Successful Register message is then returned and a summary of the Guest account request is displayed.
Notes: The validation of the account can be seen by the Guest when the Account status is set to
Enabled and the “Back to Login” button is disabled.
16
Lab: Create a Guest SSID
- On the Remote Desktop Connection, open a new tab in the web browser and enter the URL:
mail.company.com
- Log in with the username [email protected] and the password password. (Replace X by your POD
number)
Open the last mail received “Sponsor Request Notification” and click on the Approve link.
Notes: You might get a certificate error page after clicking on Accept. Proceed anyway in order to
get the answer from the OmniVista server.
- The UPAM server sends back a confirmation message: “Approve the registration request successfully”.
- Back on the Guest web page, click on the Back to Login button and login with the new credentials
NewGuest and password.
17
Lab: Create a Guest SSID
Notes: The same details can be found in OV2500 -> UPAM -> Guest Access -> Guest Device.
- Navigate to OV2500 -> UPAM -> Authentication -> Captive Portal Access Record
Throughput: ___________
AP name: ___________
With the Locator application, you can click on Search by to locate a “user” based on criteria as Auth user, Mac
Address or IP Address or Hostname.
Here you can specify as IP address: <Guest_IP_address> and click on Locate to run the research within the
network.
In the Netforward Results Table, Locator reports all equipment that meet both of the criteria. The table display
will vary depending on the view option you choose - Location (default), Classification, Data Center, or Template,
which is used to create custom views.
3 Test
Employee Account
Usually not created, used LDAP/AD
Employee Account can be locally created
UPAM – BYOD Access and Employee Property
Alternate solution, BYOD device can be created by admin
Referred as Company Property
Registration
Strategy
Login Strategy
Post web
authentication
strategy
UPAM - BYOD Access – Part 1
facebook.com/ALUEnterprise
linkedin.com/company/alcatellucententerprise
twitter.com/ALUEnterprise
youtube.com/user/enterpriseALU
Stellar OmniAccess Wlan
Lab: Create a BYOD SSID
How to
✓ How to create a BYOD SSID for Employees with personal devices
Contents
1 Creation & Deployment of a BYOD SSID .................................................... 2
1.1. Topology ................................................................................................. 2
1.2. Service Vlans ............................................................................................ 2
1.3. Creation of an SSID BYODX ........................................................................... 3
Creation of a WLAN Service profile (SSID) .............................................................. 4
AAA Server Profile .......................................................................................... 4
Access Role Profile ......................................................................................... 5
Apply the Access Role Profile to the Stellar APs ....................................................... 5
Post Captive Portal - Access Role Profile ............................................................... 6
Authentication Strategy ................................................................................... 6
Access Policy configuration ............................................................................... 7
Create an Employee Account ............................................................................. 8
BYOD Access Strategy ...................................................................................... 8
Apply Profile(s) to AP Group(s) ...................................................................... 9
1.1. Topology
DHCP OmniVista / UPAM
P: 10.130.5.50+X
P: 10.130.5.7 P: 10.130.5.70+X
Backbone
10.130.5.253
10.7.X.94
Default
VLAN 999
TAG
Employee Vlan 20
TAG
Guest Vlan 30
TAG
Vlan 40
EmployeeX 1/1/2
Vlan 20
1/1/3
GuestX
Vlan 30 VLAN 40
AP 1X
Client 1X 1101
10.7.X.93
The VLANs used for the BYOD access have already been created in the previous labs: VLAN 20 and 30.
Check that the VLANs 20 and 30 are already created and attached to the 1/1/3 and 1/1/2 on the
OS6560 and on the ports 1/1/3 and 1/1/2 on the OS6860.
OS6560
-> show vlan
-> show vlan 20 members
-> show vlan 30 members
OS6860
-> show vlan
-> show vlan 20 members
-> show vlan 30 members
1.3. Creation of an SSID BYODX
"BYOD" SSID
• Open
• Web
Redirection
• BYOD Strategy
Notes: AAA servers and Access role profiles can be created first prior to setup WLAN services but
for this exercise you will create specific profiles through the WLAN Service configuration screen.
Tips: UPAM supports both captive portal server and RADIUS server; and can be used to implement
multiple authentication methods, such as MAC authentication, 802.1X authentication, and captive
portal authentication. User Profiles can be supported in the OmniVista database or on external
servers.
- In the Security section, click on the “Default Access Role Profile” field, select “+ Add New” and create the
Access Role Profile “access-role-byodX”.
- Set the Redirect Status parameter to Enable as the Employee traffic will be redirected to the Captive
Portal.
- Click on the Create icon.
- Back to the WLAN Service Page, in the Security section, select “access-role-byodX” as the Default Access
Role Profile.
- Click on Create.
- Do not change the Mapping Method and enter the Vlan number “30” which is the GuestX VLAN.
When the employee authenticates himself on the Captive Portal, he is considered as trusted and thus, an Access
Role – attached to the “Employee” VLAN – will be assigned to the employee.
The Access Role Profile “Access-role-employeeX” created in a previous lab will be used later for that reason.
- This Access Role Profile is already attached to the “Employee” VLAN (20).
- The redirect status is also disabled as we don’t need the captive portal redirection anymore.
Authentication Strategy
Notes: Authentication Strategy is used to set up a user profile source and login method (web page
or not) for authentication, as well as the network attributes applied after passing the
authentication.
OV2500 -> UPAM -> Authentication -> Authentication Strategy -> + (Create icon)
- Name the strategy “BYOD-PODX” and set the Authentication source to “None”. As the initial
Authentication is “Open”, it does not require an Authentication source.
- Set the Web authentication to “Employee” and the BYOD Access Strategy to “Default BYOD”.
- Click on Create.
7
Lab: Create a BYOD SSID
Notes: By setting the Web authentication to “Employee”, the UPAM server will return the
“Employee” Captive Portal pages. The BYOD Access Strategy is the BYOD Captive Portal template
that will define how the Captive Portal Authentication will be performed.
Notes: Authentication Access Policies are used to define the mapping conditions for an
authentication strategy. Through Access Policy configuration, authentication strategy can be
applied to different user groups, which can be divided by SSID or other attributes.
OV2500 -> UPAM -> Authentication -> Access Policy -> + (Create icon)
- Name the Policy Name “BYOD-PODX” that will define the previous strategy to apply for guest
authentication connected to SSID “BYODX”. The BYODX profile will use an Open Authentication and a
BYOD Web Authentication.
- In the Mapping Condition, select the SSID attribute and BYODX. Click on the + button.
- Select “BYOD-PODX” as the Authentication Strategy and click on Create.
8
Lab: Create a BYOD SSID
OV2500 -> UPAM -> Authentication -> Employee Account -> + (Create icon)
- In order to create a login account for BYODX users in the local UPAM Database, enter the following
parameters:
User: BYODX
Password: password
- Click on Create.
Notes: The Access Role Profile Employee0 can be set in the Employee account. But we will set it in
the BYOD Access Strategy.
When the Captive portal Authentication is used for the BYOD users, the BYOD Access Strategy will define
multiple parameters, such as:
- The validity period of the Guest accounts and the maximum number of devices authorized per account
- The login strategy: URL redirection for a successful authentication
- Post Portal Authentication Enforcement
In this scenario, most of the parameters can keep their default values.
OV2500 -> UPAM -> BYOD Access -> BYOD Access Strategy
- Select the default guest strategy “Default BYOD” and Edit it.
- Keep the default values in Registration Strategy.
- In Login Strategy, set the Success Redirect URL to Go to Success Page.
- In Post Portal Authentication Enforcement, set the Fixed Access Role Profile to “Access-role-employeeX”.
- Click on Apply.
9
Lab: Create a BYOD SSID
The newly created SSID must be applied to the Stellar Access Points, otherwise the configuration is kept locally.
OV2500 -> WLAN -> WLAN Service
- Select the checkbox next to the SSID “BYODX” and click on the Apply to Devices button to assign the
profile to wireless devices on the network.
10
Lab: Create a BYOD SSID
- Click on Add AP Group, move the AP Group APGX to the right and click on OK.
Open vSphere Client, using the login “StellarPodX” and the password “alcatel”. Start the VM
“StellarClientX”.
Open now a web browser on the Client and enter any valid IP address or URL.
The traffic is redirected by the OmniVista server to the UPAM server and the Captive Portal BYOD page is
returned.
Log in, using the BYOD user from the local database: BYOD0 / password
After a successful Login, check the IP address of the client. You should have an IP in the range [10.7.X.37 –
10.7.X.62], which is the “Employee” subnet.
12
Lab: Create a BYOD SSID
Notes: The Access Role assigned to the client is the Fixed Access Role Profile “Access-role-
employeeX”. After a successful authentication, the OmniVista server changed the initial “Guest”
Access Role profile to this new profile. The Access VLAN and client IP address are then changed to
the “Employee” VLAN (20) in the subnet 10.7.X.64/27.
Notes: The same details can be found in OV2500 -> UPAM -> BYOD Access -> BYOD Device.
13
Lab: Create a BYOD SSID
Navigate to OV2500 -> UPAM -> Authentication -> Captive Portal Access Record
Look for the MAC address of the client in the table and check that it is assigned to the Employee VLAN (20).
With the Locator application, you can click on Search by to locate a “user” based on criteria as Auth user, Mac
Address or IP Address or Hostname.
Here you can specify as auth user name: <BYOD_IP_address> and click on Locate to run the research within the
network.
In the Netforward Results Table, Locator reports all equipment that meet both of the criteria. The table display
will vary depending on the view option you choose - Location (default), Classification, Data Center, or Template,
which is used to create custom views.
3 Test
1. What is the purpose of the Fixed Access Role Profile in the Post Portal
Authentication Enforcement?
3. In which monitoring page can you check the Captive Portal Authentication
result?
OmniAccess Stellar Wireless Lan
RF Management and Optimization
Lesson Summary
Concept of RF Profile
Default RF Profile
Can create RF Profile
RF Profile applied to AP Group or at AP level
Country Code set in the RF Profile
Distributed Radio Management - DRM
OmniVista
AP Group 1: AP 1,2,3,4,6 => RF Profile Profile1
AP Group 2: AP 5,7 => RF Profile Profile2
AP7 explicitly assigned to RF Profile Profile2
LAN
RF App
MGT VLAN 1 MGT VLAN 2 Over the LAN RF management
Scope = Adjacent APs
AP Group 2
AP 2
AP 1
AP 3 AP 5
AP 4
AP 6 AP 7
AP Group 1
Scanning
DUAL RADIO
Diff. = 5G Client Number – 2.4G Client Number
(Threshold:10)
AP
TRI RADIO
• Pri-Diff. = 5G High Client # – 2.4G Client #
(Threshold:10)
• Sec-Diff. = 5G Low Client # – 2.4G Client #
(Threshold:10)
Overloaded: A channel is considered overloaded when its average medium utilization over the span of a minute exceeds 70%.
SMART Load Balance – Dynamic Load Balance
AP 2 Reply to Client
3 New Client joins AP2
1 Broadcast Join Request
facebook.com/ALUEnterprise
linkedin.com/company/alcatellucententerprise
twitter.com/ALUEnterprise
youtube.com/user/enterpriseALU
Stellar OmniAccess Wlan
Lab: Configure the RF Profile
How to
✓ How to modify the RF Profile assigned to the Stellar AP
Contents
1 2
1.1. Erreur ! Signet non défini.
1.1.1. Erreur ! Signet non défini.
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Lab: Configure the RF Profile
Implementation
The Client SNR Threshold is part of the RF profile and will deny new client connections to the AP if the signal
strength of the client received by the Stellar AP is greater than the threshold.
In this example a client is connected to a SSID (I.E: Employee0) and the RSSI (Received Signal Strength
Indication) will be observed.
A RSSI threshold will then be set with a higher value, thus avoiding any new connection attempts from the
client.
Once the connection has been established, monitor the client “EmployeeX”
3
Lab: Configure the RF Profile
Select the client “Employee0” and check the fields RSSI and Attached Band.
In this case, the client is using the 5GHz band and has the RSSI value 53.
Notes: Because of the short distance between the client and the Stellar AP in this environment, the
RSSI value is much higher than what you should get in a real deployment.
Notes: If one of the Stellar AP used a different and specific RF Profile, the RSSI Threshold change
won’t impact the Stellar AP. The RF profile attached to this AP must also be modified.
Click on Apply.
Notes: The RSSI measured in the client list view is not static and could vary. This is why the RSSI
Threshold has been increased by around 20.
4
Lab: Configure the RF Profile
On the client, reset the “EmployeeX” connection by clicking Disconnect and Connect.
As the RSSI of the client “EmployeeX” is now lower than the threshold set in the RF Profile, the client is unable
to connect to the SSID.
Even after a couple of minutes, the connection can’t be established.
Although the username and password are correct, no clients are listed on this page, which means that the RSSI
threshold does not accept the client connection attempt.
Notice that the authentication process is performed by the OV2500 server. The RSSI Threshold check is
performed after the authentication.
Notes: Tests using the Band Steering or Dynamic Load Balance parameters can be performed in an
environment with a higher client density.
5
Lab: Configure the RF Profile
Once the test has been done, set the RSSI Threshold back to its initial value “0” for the 2.4GHz or 5GHz band.
Otherwise, the client can no longer connect to the “EmployeeX” SSID.
2 Test
2. What will happen if the RSSI value measured on the AP is higher than the RSSI
Threshold on the OV2500 server?
3. If the client signal is too weak the authentication process is not performed?
OmniAccess Stellar Wireless Lan
Layer 2 Mobility and Roaming
Lesson summary
• Understand the Layer 2 Roaming.
• Configure the Fast Roaming
Overview
Overview
WiFi Enterprise only
In WiFi Express, roaming is limited to L2 only within the same cluster
Fast Roaming
L2 Roaming L2 Roaming
L3 Roaming
Roaming relies on client context sharing between over the air adjacent APs
L2 or L3 Roaming selection based on the client VLAN between "home" and "foreign" AP
L3 Roaming based on L2 GRE tunnel between "home" and "foreign" AP
Configuration
L2 Roaming always enabled
Network OmniVista
Over-the-LAN Client
Context sharing
Edge Switch
Access Point
Over-the-air AP discovery
Client
Client Context Sharing
OV2500
AP-Group: Building AP-Group: Campus
Management VLAN: 100 Management VLAN: 400
WLAN Service 1: SSID:”Lab”; VLAN:10 WLAN Service 4: SSID:”Lab”; VLAN:11
WLAN Service 2: SSID:”Classroom”;VLAN:20 Client WLAN Service 3: SSID:”Classroom”;VLAN:21
Context
AP-4
AP-2
Client
Context
AP-Group: Campus
Management VLAN: 100
Client WLAN Service 4: SSID:”Lab”; VLAN:11
Context AP-1 WLAN Service 3: SSID:”Classroom”;VLAN:21
AP-5 AP-3
Client
AP-Group: Library Context AP-Group: Building
Management VLAN: 400 Management VLAN: 300
WLAN Service 1: SSID:”Lab”; VLAN:12 WLAN Service 1: SSID:”Lab”; VLAN:10
CLIENT CONTEXT
WLAN Service 2: SSID:”Classroom” SSID & WLAN service – “Classroom” WLAN Service 2: SSID:”Classroom”;VLAN:20
MAC Address
IP Address
Currently assigned Unified Access
…
Client Context
Client Context Content
Client Context exists on WLAN service and Access Client Context VLAN ID = Roaming Results
the new AP? Role Profile exist in the VLAN ID mapped to the
Client Context on the Access Role Profile on
new AP? the new AP?
No - - No Roaming, new client
Yes No - No Roaming, new client
Yes Yes Yes L2 Roaming
Yes Yes No L3 Roaming
Layer 2 and Layer 3 selection based on the management VLAN between the "home" and "foreign"
AP.
FAST Roaming
FAST Roaming
Improve handoff times during roaming
Remove RADIUS authentication
Optimize authentication handshake
Require key caching
No overlap
Overlap
KO OK
No Radio overlap, no Roaming Radio overlap, Roaming available
Neighbor AP
Radio
coverage
In some cases, the Stellar APs are hole
geographical neighbors but can't see each
other through the air (i.e: corridor with right No client
context
angles,…). sharing
The client context can't be shared. No roaming.
Solution:
On both AP, add statically the neighbor Stellar AP
from the list of known AP.
The client context can be shared through the LAN
and the client can roam.
Select the AP in the AP Registration > Access
Point view and click on the hyperlink
"Neighbor AP"
Click on the Edit button and select the neighbor
AP from the list
Repeat the process for the second AP
Sticky client avoidance
The roaming decision is made by the client device.
But some devices will stick to the AP they were previously associated to.
The Roaming RSSI Threshold controls the signal strength a client needs to see before searching for
another site.
If the RSSI threshold is too low, the client remains on a low signal strength site, even with a
stronger site nearby.
If the RSSI threshold is too high, the client roams too much that could result to packet loss.
Miscellaneous
Background scanning
When a user roams, his real time traffic can be interrupted if the new AP on which he is
connected is using the background scanning.
No impact on the voice traffic.
The AP is voice aware and will deactivate the background scanning when a voice call is detected.
Other real-time traffic can be impacted.
Solution:
Deactivate the Background scanning on the Stellar APs
Install new Stellar APs in the network, acting as dedicated scanning APs
Please note that this solution requires additional Stellar APs in the network
Follow us on…
facebook.com/ALUEnterprise
linkedin.com/company/alcatellucententerprise
twitter.com/ALUEnterprise
youtube.com/user/enterpriseALU
OmniAccess Stellar Wireless Lan
Layer 3 Mobility and Roaming
Lesson Summary
• Understand and configure the Layer 3
Roaming
L3 Roaming
L3 Client Roaming
facebook.com/ALUEnterprise
linkedin.com/company/alcatellucententerprise
twitter.com/ALUEnterprise
youtube.com/user/enterpriseALU
OmniAccess Stellar Wireless Lan
WIPS
Lesson Summary
Classify an AP as Interfering, Rogue or Friendly
Configure the WIPS
WIPS
WIPS Overview
Stellar APs monitors the radio spectrum for the presence of unauthorized
AP
Users
Automatically take countermeasures
Global configuration applied to all APs managed by OV
Require AP with scanning activated
WIPS – Interfering / Rogue / Friendly AP
Interfering AP
The “scanning” Stellar AP discovers any other AP over the air
Such AP are marked as Interfering
AP managed by the same OV are excluded
Rogue AP
An interfering AP is marked as Rogue based on the configured of Rogue AP Policy
AP managed by the same OV are excluded
Rogue AP Containment – enabled by default
The scanning Stellar AP sends de-auth request to all clients associated to the rogue AP
Friendly AP
Friendly AP is not reported as Interfering or Rogue
An Interfering or Rogue AP can be set as Friendly AP manually
Friendly AP OUI can be set – ALE OUI set by default
Friendly AP can be added
WIPS – Rogue AP Policy
Policy Description
Signal Strength Threshold The detected AP signal in dbm is too strong and above the threshold
Default: – 70 dbm Range -95 to -50 dbm
Detect Valid SSID The detected AP is advertising a SSID that is configured in OmniVista and set in your WLAN network
(An AP not managed by OV is adverting a SSID set in OV)
Detect Rogue SSID Keyword The detected AP is advertising a SSID name that matches a string set in this policy
(SSID blacklist)
Rogue OUI The detected AP has a OUI that matches one of the OUI set in this policy
Limitations
The attacker source MAC can be anything (an AP mac, a BSSID mac, a wireless NIC card mac..)
Blacklisting the attacker source MAC is only relevant when the source MAC is an actual wireless client
Follow us on…
facebook.com/ALUEnterprise
linkedin.com/company/alcatellucententerprise
twitter.com/ALUEnterprise
youtube.com/user/enterpriseALU
OmniAccess Stellar Wireless Lan
Heat Map & Floor Plan
Lesson Summary
Heat Map & Floor Plan
At the end of this module, you will be able to:
• Create and visualize the Heat Map of the deployed AP
• Create a Floor Plan and visualize the automatic
deployment of APs
Heat Map and Floor Plan
Wireless Monitoring Applications
Heat Map
Visual Heat Map of Deployed AP
Floor Plan
Visual Heat Map of Estimated Aps before Deployment
Heat Map – Use Case
Insufficient Radio coverage
Identify network weaknesses and fix it (move/add APs)
Custom
obstacle
Manual AP
deployment
Heat Map
facebook.com/ALUEnterprise
linkedin.com/company/alcatellucententerprise
twitter.com/ALUEnterprise
youtube.com/user/enterpriseALU
Stellar OmniAccess Wlan
Lab: Heat Map and Floor Plan
How to
✓ How to create a Heat Map and Floor Plan
Contents
1 Heat Map ....................................................................................... 2
1.1. Heat Map ................................................................................................ 2
1.2. Profile Creation ........................................................................................ 2
1.3. Plan Configuration ..................................................................................... 3
1.4. Heat Map Monitoring .................................................................................. 5
2 Floor Plan ...................................................................................... 6
2.1. Floor Plan ............................................................................................... 6
2.2. Profile Creation ........................................................................................ 6
2.3. Plan Configuration ..................................................................................... 6
2.4. Floor Plan Monitoring ................................................................................. 7
3 Test ............................................................................................. 8
2
Lab: Heat Map and Floor Plan
1 Heat Map
The Heat map function is to display the current work of the AP signal intensity distribution, through different
colors showing the signal coverage.
The Heat Map feature permits the administrator to create Campus, Building and floor map, to set up obstacles
in the Map and put APs into the Floor in order to observe the wireless signal coverage.
Create first a Campus by clicking on Add “+” and give the campus name “MyCampus”.
Then double-click on the “MyCampus” icon in order to create a new building.
Create then a new Building by clicking on Add “+” and give the Building Name “Building A”.
Then double-click on the “Building A” icon in order to add a new floor.
Finally, create a Floor for this building by clicking on Add “+”, give the Floor Name “1st Floor” and the Floor
Number “1”.
A Floor Plan must also be assigned to the Floor. Click on “Select File” and select in C:/Resources the Floor Plan
“Office-plan”.
3
Lab: Heat Map and Floor Plan
Click on OK to create the Floor and double-click then on the 1st Floor icon to access the plan.
From this point, three main actions are required to visualize the wireless signal: scaling the plan, laying down
obstacle and placing the APs.
In order to scale the plan, Click on Edit Floor Map in the Operation section and then on Scale the Map.
Trace a line one the map and enter a distance for this segment. In the example bellow, the red line is 5 meters
long.
Notes: The scale is here increased because in reality, the APs are very close to each other and the
plan used does not match the actual one. By increasing the scale, the end result is much better. In
practice, use the actual scale.
The next step is to lay down the obstacles on the map. Click on the button “Draw:WallsHeavy” to start drawing
the obstacles on the map. Pre-defined obstacles can be selected by clicking on the button and each one
with a different absorption coefficient (dB). “WallsHeavy” – or concrete wall – will absorb more signal power
than a regular Glass obstacle.
4
Lab: Heat Map and Floor Plan
Notes: New obstacles can be created with the Custom Obstacle link. Name, Signal decline (in dB),
Color and line width are configurable.
The last step is to lay the Stellar APs to the Floor. Click on the link “Adding AP to the Flooor”, select the two
APs from the list and click on OK.
The two APs are now located on the top left corner of the map and are identified by their Management IP
address. Drag and Drop the APs and place them on the map.
As this is not the real deployment map, place the APs where they should be best located.
Click on “Stop” in the Edit Floor Map section and click on “Yes” when you are asked to Save the layout.
5
Lab: Heat Map and Floor Plan
Once the Layout has been saved, the Heat Map Application will display the signal power on the map based on the
actual signal power transmitted by the APs.
Observe the Heat Map as well as the absorption of the different materials.
Go back to Edit Floor Map and place the APs in different places in order to cover the cold areas.
Changing the APs on the map will simulate the new WiFi coverage based on the real band and power of emission
of the APs.
6
Lab: Heat Map and Floor Plan
2 Floor Plan
The main functions of the Floor Plan are to import the floor map and mark the relevant obstacle. Then,
calculate the placement of the AP by a relevant algorithm, and automatically generate the functions of the AP
plan.
With Floor Plan, the admin can import a map into a floor plan, scale it and perform the AP auto Deployment.
Give the name “My Floor Plan” for the Floor Plan Name, select the map “Office-plan.jpg” in C:/Resources and
click on Create.
From this point, three main actions are required to visualize the wireless signal: scaling the plan, laying down
obstacle and Auto Deploy the APs.
In order to scale the plan, Click on Edit Floor Plan in the Operation section and then on Scale the Map.
Notes: The scale is here increased because in reality, the APs are very close to each other and the
plan used does not match the actual one. By increasing the scale, the end result is much better. In
practice, use the actual scale.
The next step is to lay down the obstacles on the map. Click on the button “Draw:WallsHeavy” to start drawing
the obstacles on the map. Pre-defined obstacles can be selected by clicking on the button and each one
with a different absorption coefficient (dB). “WallsHeavy” – or concrete wall – will absorb more signal power
than a regular Glass obstacle.
Notes: New obstacles can be created with the Obstacle Manage link. Name, Signal decline (in dB),
Color and line width are configurable.
The last step is to deploy automatically the Stellar APs on the plan. Click on Auto Deployment.
In the new window, the deployment quality can be chosen between General, Good and Excellent.
Select the Excellent quality as the Floor Plan application will deploy more APs to cover all the cold areas.
Select the AP Model OAW-AP1231, based on the environment (office). Keep the default Tx Power.
Click on OK.
The Floor Plan application calculates and places the APs required to cover the plan.
8
Lab: Heat Map and Floor Plan
In this example, the scale has been reduced, the quality lowered to “General” and the AP model changed to
AP1101:
Notes: In Edit Floor Plan, APs can added manually on the map to fill the cold areas. After clicking
on “Save The Layout”, the Floor Plan application will process and display the Wifi coverage based
on all the APs located on the map.
3 Test
1. Which application (Heat Map or Floor Plan) simulates the signal coverage?
2. In the Heat Map application, once an AP has been assigned to a Floor, can it be
used in another Floor?
OmniAccess Stellar Wireless Lan
Operation and Maintenance
Lesson Summary
Operation and Maintenance
At the end of this module, you will be able to:
Monitor the clients, APs, guest and BYOD devices
Maintain the AP and upgrade its firmware
Monitoring
Monitoring - Clients
Wireless Clients Monitoring
Monitoring – Client Behavior Tracking
Administrator tool for effective monitoring & troubleshooting of clients
Parameters tracked
View user ONLINE/OFFLINE status
View TCP/UDP flow context
View HTTP(S) domain flow context
ONLINE/OFFLINE LOG
Monitoring – Client Behavior Tracking How To
In Unified Access Unified Profile
Template Access Role Profile
Enable/Disable "Client Session
Logging" per Access Role Profile
Choose "HTTP/HTTPS", AP will
log client HTTP/HTTPS
connections. Choose "ALL", AP
will log client all TCP/UDP
connections including
HTTP/HTTPS connection
Monitoring – Client Behavior Tracking How To
In Unified Access Unified Profile
Template Access Role Profile
Enable/Disable "Client Session
Logging" per Access Role Profile
Choose "HTTP/HTTPS", AP will
log client HTTP/HTTPS
connections. Choose "ALL", AP
will log client all TCP/UDP
connections including
HTTP/HTTPS connection
In Network AP Registration AP
Group
Control per AP Group Client
Behavior Tracking – Upload to
Server
Monitoring – Client Behavior Tracking How To
In Unified Access Unified Profile
Template Access Role Profile
Enable/Disable "Client Session
Logging" per Access Role Profile
Choose "HTTP/HTTPS", AP will
log client HTTP/HTTPS
connections. Choose "ALL", AP
will log client all TCP/UDP
connections including
HTTP/HTTPS connection
OR
In Network AP Registration AP
Group
Control per AP Group Client
Behavior Tracking – Upload to
Server
Config the TFTP or SFTP server
IP & server port, optional
Remote Path,
"Username/Password"
Choose Cycle time and Save, or
Upload Now
Monitoring - APs
APs Monitoring
Monitoring – Guest and BYOD Devices
Monitoring – Summary
Maintenance
Maintenance – Topology Map
In Network > Topology
Edit Device
AP name
Group Name
RF Profile
Reboot
Save to Running
Backup Device
View AP Logs
Maintenance – Resource Manager
Backup / Restore
Backup
Full
Config
Image
Restore
Maintenance – Resource Manager
In Configuration > Resource Manager > Upgrade Image
Import AOS or Stellar AP Firmware (zip format)
facebook.com/ALUEnterprise
linkedin.com/company/alcatellucententerprise
twitter.com/ALUEnterprise
youtube.com/user/enterpriseALU
Stellar OmniAccess Wlan
Lab: Operation and Maintenance
How to
✓ How to Monitor the clients and APs and maintain the Stellar APs
Contents
1 Monitoring Tools ............................................................................... 2
1.1. Clients Monitoring ..................................................................................... 2
1.2. Authentication Record ................................................................................ 3
1.3. Captive Portal Access Record ........................................................................ 3
1.4. Summary Pages ......................................................................................... 4
1.5. AP Monitoring ........................................................................................... 5
1.6. Audit ..................................................................................................... 6
2 Maintenance Tools ............................................................................ 7
2.1. AP Maintenance ........................................................................................ 7
2.2. Backup and Restore Device .......................................................................... 7
2.3. Upgrade image ......................................................................................... 8
3 Reset the Pod .................................................................................. 9
Once all the labs have been performed, Reset the devices of the POD and follow this order: . 9
4 Test ............................................................................................. 9
2
Lab: Operation and Maintenance
1 Monitoring Tools
Make sure that the client is connected to one of the SSIDs broadcasted by the Stellar AP.
If not, connect the client to the SSID GuestX and use the guest account GuestX / password.
The clients authentication record is stored and contains all the related information such as account name,
authentication result, time and date,..
Select the latest entry from the list, which is the GuestX entry.
Answer the following questions:
Account Name : _________________
Authentication Type: __________________
Auth Ressource: _____________________
Authentication Result: ______
Session Start: ______
Throughput: ___________
AP name: ___________
BYOD and Guest Access use Captive Portal as authentication method. Records of these authentications are
stored in the following page
OV2500 -> UPAM -> Authentication / Guest Access / BYOD Access -> Summary
The Summary Pages compile relevant parameters from the different authentication methods and are displayed
to the administrator through statistics and graphs.
Compare these answers with the details from the Guest Summary page.
5
Lab: Operation and Maintenance
1.5. AP Monitoring
Parameters about the AP can be found: AP Model, AP Version, Last Registration Time, Country Code.
As well as parameters set during the configuration: Group Name, RF Profile.
Find to which AP the Guest client is connected: the AP with “Client Count : 1”.
Click on the number of client, this will open a new page, similar to the Client List page.
Can you see new relevant parameters from this Client View?
6
Lab: Operation and Maintenance
1.6. Audit
Log out the GuestX client and log in again, but with the wrong username and password.
Refresh the UPAM logs page and analyze the authentication packets received by the server.
The reason of the “Access-Reject” message from the OmniVista server is also explained.
7
Lab: Operation and Maintenance
2 Maintenance Tools
2.1. AP Maintenance
Select one of the two APs from the topology. The operations are listed in the new
window.
In the Device section, click on Edit Device, rename it “AP1” and Apply.
The modification is applied on the OmniVista server.
Click on Backup.
Let’s Backup the APs by selecting Backup By AP Groups and click on Next.
In the “Configuration” step, select Configuration Only for the Backup type and press Backup to complete the
process.
Review the Result page and click on OK.
The configuration of the Stellar AP is now saved on the OmniVista server and can be applied to the Stellar AP at
any time.
Notes: A Backup is restored on the same AP. Informations about the IP address, device type,
version and Date are contained in the backup file so it means that the backup can’t get applied on
any AP.
The Firmware version of the Stellar AP can be applied on the AP from the Resource Manager Application.
OV2500 -> Configuration-> Resource Manager -> Upgrade Image
The first step is to import the newest firmware version on the OmniVista server by clicking on Import.
Choose the file from the directory and click on OK.
Select the Device to upgrade and make sure that the appropriate binary file is contained in the firmware.
i.e: OAW-AP1101_3.0.0.50.bin for an OAW AP1101.
Click finally on Install Software.
9
Lab: Operation and Maintenance
Once all the labs have been performed, Reset the devices of the POD and follow this order:
1) Reset the APs: On the Desktop, launch the shortcuts “AP-1101” and “AP-1221” to established a
console connection.
AP1101 & AP1221
Login: support
Password: Alcatel.0
This password has been set during the first lab, while activating the SSH connection.
Once logged in, enter the command ”ssudo firstboot” which will reset the configuration to factory
default:
AP1101 & AP1221
support@AP-<MAC@>:”$ ssudo firstboot
This will erase all settings and remove any installed packages. Are you sure [N/y] y
Notes: The command “ssudo reboot” can be used while logged in as support.
This command is not used here, because after the AP reboots, it is still connected to the switch
and the DHCP server will provide an IP address and the option 138.
4 Test
1. In the Client List View, the authentication method can be found as one of the
parameters?
2,4 GHz
Reaching areas where 5 GHz high
cabling is not available
5 GHz low
Mesh link
Limits
MAX 16 APs in a single MESH to Root
MAX 5 APs in a single hop P2MP connection
Enterprise MESH
facebook.com/ALUEnterprise
linkedin.com/company/alcatellucententerprise
twitter.com/ALUEnterprise
youtube.com/user/enterpriseALU
Book your remote demo
through the
eDemo website!