Specifications

About This Guide
xvi
authentication, NTLM authentication, transparent NTLM authentication, transparent
802.1x authentication, the BSC internal 802.1x authentication server, Kerberos
authentication, cosign authentication, pubcookie authentication, CAS authentication,
transparent certificate authentication, and testing an external authentication server.
Chapter 7,
"RADIUS Accounting"
, discusses how to set up RADIUS accounting, used
to record network activity and statistics including tracking user logins. It also
discusses the attributes sent to an external RADIUS accounting server by the BSC.
Chapter 8,
"Roles and Role Elements"
, discusses defining user roles to enforce
network usage policies, role-based authorization, role inheritance, defining/
modifying a role, and creating role elements, destinations, network services,
schedules, and locations.
Chapter 9,
"Voice Over WLAN Support"
, discusses general VoWLAN settings,
vendor-specific IP phone support, and VoWLAN QoS.
Chapter 10,
"General BSC Operational Settings"
, discusses HTTP server settings,
intrusion detection system, the SNMP agent, automatic backup of the BSC database,
system time and date settings, public access networks, mail server access, event
logging and connection tracking, threshold values, domain name system (DNS)
settings, and miscellaneous BSC options.
Chapter 11,
"Web Logins"
, discusses customizing the user login page, translating
user login pages, installing a custom SSL login certificate, and configuring hotspot
account generation.
Chapter 12,
"BlueSecure Access Points"
, discusses deploying BSAPs on the same
layer-2 subnet as the BSC, deploying BSAPs with layer-3, connectivity to the BSC,
how a BSAP discovers BSCs, how a BSAP selects a home BSC, uploading BSAP
firmware files, configuring global miscellaneous non-radio settings, configuring
global radio settings, editing settings for an individual BSAP, creating SSIDs, creating
BSAPs, enabling BSAP service, and displaying configured BSAPs.
Chapter 13,
"RF Intrusion Detection and Containment"
, discusses identifying
authorized RF stations on your network, configuring RF alarms, and configuring
autocontainment.
Chapter 14,
"Secure Mobility® MatriX"
, provides complete procedures for
configuring multiple BlueSecure Controllers for use in relatively larger networks that
may be segmented in different subnets and physical locations. Setup and use of
Bluesocket’s Replication, Load Sharing, and Secure Mobility
®
features for multiple-
BSC networks are described.
Chapter 15,
"Status"
, provides procedures for performing common network
administration tasks such as: monitoring user activity and connection status, viewing
the Controller’s summary log, exporting Controller database information, performing
standard network diagnostics, and managing user accounts.
Chapter 16,
"Maintenance"
, describes how to perform common system software
administrative tasks such as: restarting Controller services, backing up and restoring
the Controller database, upgrading the system software to a new version, installing
or removing system software patches, customizing the user login page, installing a
custom secure sockets layer (SSL) certificate for user login, and hotspot account
generation (i.e., end user credit card billing services).
Appendix A,
"An Overview of Virtual LANs,"
describes the BlueSecure Controller
implementation of virtual LANs (VLANs) on both the managed and protected sides of
the network.
Appendix B,
"Provisioning Network DHCP Servers to Support BSAPs,"
provides
procedures for configuring the DHCP servers on your network to send BSC IP
addresses to BSAPs using DHCP vendor-specific option 43.