User's Guide

Table Of Contents
Virtual Network Services concepts
hwc_vnsintro.fm
Filtering
9034530-02, March 2010
236 HiPath Wireless Controller, Access Points and Convergence Software V7.11, User Guide
Until the access-accept packet is received from the RADIUS server for a specific
user, the user is kept in an unauthenticated state. 802.1x rules dictate no other
packets other than EAP are allowed to traverse between the AP and the HiPath
Wireless Controller until authentication completes. Once authentication is
completed (access-accept packet is received), the user's client is then allowed to
proceed with IP services, which typically implies the request of an IP address via
DHCP.
In addition, the definition of a specific filter ID is optional configuration. If a specific
filter ID is not defined or returned by the access-accept packet operation, the
HiPath Wireless Controller assigns the VNS' default policy for authenticated
users.
Note: The HiPath Wireless Controller only assigns the device's IP after the client
requests one.
Both Captive Portal and 802.1x authentication mechanisms in Controller, Access
Points and Convergence Software rely on a RADIUS server on the enterprise
network. You can identify and prioritize up to three RADIUS servers on the HiPath
Wireless Controller—in the event of a failover of the active RADIUS server, the
HiPath Wireless Controller will poll the other servers in the list for a response.
Once an alternate RADIUS server is found, it becomes the active RADIUS server,
until it either also fails, or the administrator redefines another.
5.6 Filtering
The Policy capability provides a technique to specify different network access to
different groups of users. This is accomplished by packet filtering.
After setting the authentication mode, define the filtering rules for the filters that
apply to your network.
Exception filters and Multicast filters are part of the Topology
definition. All other filter types are part of the Policy definition.
Policy-based filtering – These filters can apply to non-authenticated and
authenticated users:
Non-authenticated filter with filtering rules that apply before
authentication Controls network access and to direct users to a
Captive Portal Web page for login.
Authenticated filters – Controls access to certain areas of the network,
with values that match the values defined for the RADIUS filter ID
attribute.