User's Guide

Table Of Contents
Virtual Network Services concepts
hwc_vnsintro.fm
Filtering
9034530-02, March 2010
238 HiPath Wireless Controller, Access Points and Convergence Software V7.11, User Guide
Authentication by captive portal
The non-authenticated filter will apply before authentication. Specific network
access can be defined. The filter should also include a rule to allow all users
to get as far as the Captive Portal Web page where the user can enter login
identification for authentication. When authentication is returned, the filter ID
determines what Policy, and therefore filters, are applied. If no filter ID
matches are found, then the default filter is applied. The filter ID is an optional
behavior specification. If a filter ID is not returned, or an invalid one is
returned, the default filter is applied.
Authentication by 802.1x
When authentication by 802.1x is configured, user authentication is
completed using the 802.1x/EAP protocol before a user is granted access to
a network resource. Therefore, the enforcement of non-authenticated traffic
rules is not applicable. When authentication is returned, then the filter ID
determines what Policy, and therefore filters, are applied to the user.
The following is a high-level description of how HiPath Wireless Controller filters
traffic:
Step One – The HiPath Wireless Controller attempts to match each packet of a
VNS to the filtering rules (that is, Policy) that apply to the wireless device user.
Step Two – If a filtering rule is matched, the operation to allow or deny is
executed.
Step Three – The next packet is fetched for filtering.
5.6.3 Legacy compatibility with Policy-based filtering
and VNS assignment
Prior to V7.0, policy re-assignments were made through the return of special
attributes in the RADIUS Accept message. These attributes included:
“Login-Lat-Group” and “Tunnel-Private-Group-ID” to assign the user to a child
VNS context
“Filter ID” to assign the user to a specified Filter Group.
At V7.0, the upgrade process converts and generates the necessary
relationships for all elements of a VNS.
Each Filter Group definition for a VNS becomes a new Policy, with the Policy
name determined by VNS hierarchy. The Policy name is created by adding the
internal context to the RADIUS-returned attributes. For example:
Policy name = <parent VNS>[ :<Login-Lat-Group>] : FilterID | “Default”