User guide
Contents Canopy System User Guide
viii
pmp-0229pmp-0229 (Mar 2013)
Isolating APs from the Internet ........................................................................................................................................ 428
Encrypting Radio Transmissions ..................................................................................................................................... 428
DES Encryption ........................................................................................................................................................ 428
AES Encryption ........................................................................................................................................................ 429
AES-DES Operability Comparisons ........................................................................................................................ 429
Managing Module Access by Passwords ......................................................................................................................... 430
Adding a User for Access to a Module ..................................................................................................................... 430
Deleting a User from Access to a Module ................................................................................................................ 432
Overriding Forgotten IP Addresses or Passwords on AP, SM, or BH ..................................................................... 433
Requiring SM Authentication .......................................................................................................................................... 435
Filtering Protocols and Ports ............................................................................................................................................ 435
Port Filtering with NAT Enabled ............................................................................................................................. 436
Protocol and Port Filtering with NAT Disabled ....................................................................................................... 436
Encrypting Downlink Broadcasts .................................................................................................................................... 438
Isolating SMs ................................................................................................................................................................... 438
Filtering Management through Ethernet .......................................................................................................................... 438
Allowing Management from Only Specified IP Addresses ............................................................................................. 439
Configuring Management IP by DHCP ........................................................................................................................... 439
Chapter 23: Managing Bandwidth and Authentication ............................................... 440
Managing Bandwidth without RADIUS, Prizm, or BAM ............................................................................................... 440
Bandwidth and Authentication Manager (BAM) Services and Features ......................................................................... 440
Bandwidth Manager Capability ................................................................................................................................ 441
Authentication Manager Capability .......................................................................................................................... 442
Chapter 24: Configuring a RADIUS server ................................................................. 444
Understanding RADIUS .................................................................................................................................................. 444
RADIUS
Fun
c
tion
s
................................................................................................................................................. 444
Tested RADIUS Servers .......................................................................................................................................... 444
Choosing Authentication Mode and Configuring for
Authenti
c
ation
Ser
v
er
s - AP
................................................... 445
SM Authentication Mode – Require RADIUS or Follow
AP
............................................................................. 447
Handling Certificates ................................................................................................................................................ 449
Configuring your RADIUS servers for SM authentication .............................................................................................. 451
Configuring your RADIUS server for SM configuration ................................................................................................ 451
Assigning SM management IP addressing via RADIUS ................................................................................................. 452
Using RADIUS for centralized AP and SM user name and password management ....................................................... 454
RADIUS Attribute Framed-IP-Address ................................................................................................................... 458
Chapter 25: Managing the Network From a Management Station (NMS) ................... 459
Roles of Hardware and Software Elements ..................................................................................................................... 459
Role of the Agent ..................................................................................................................................................... 459
Role of the Managed Device .................................................................................................................................... 459
Role of the NMS ...................................................................................................................................................... 459
Dual Roles for the NMS ........................................................................................................................................... 460
Simple Network Management Protocol (SNMP) Commands .................................................................................. 460
Traps from the Agent ............................................................................................................................................... 460
AP SNMP Proxy to SMs .......................................................................................................................................... 460