User's Guide

Table Of Contents
hwc_vnsintro.fm
Virtual Network Services concepts
Multicast traffic
9034530-02,
March 2010
HiPath Wireless Controller, Access Points and Convergence Software V7.11, User Guide 239
The child VNS concept is deprecated, with child VNSs becoming just pure Policy
definitions, assigned by the authentication action.
The RADIUS client or Security Manager applies legacy decision rules to pick the
correct Policy name if the “Restrict Policy Set” feature is selected for the VNS.
5.7 Multicast traffic
A mechanism that supports multicast traffic can be enabled as part of a topology
definition. This mechanism is provided to support the demands mainly of VoIP
and IPTV network traffic, while still providing the network access control.
The multicast traffic can be enabled or disabled at the Topology level. In support
for multicast traffic over routed topologies, a physical port needs to be selected
as the gateway to/from the network for the multicast traffic. The desired multicast
groups need to be explicitly specified in the multicast filter list. The entry order of
these filter rules is not relevant and the presence of an entry is associated with
the “allow” action. The end default value is the “deny all” rule.
There is a high premium paid in terms of RF access time when it comes to
multicast traffic. The HiPath multicast solution optimizes the multicast forwarding
on air and also provides a mechanism to enable or disable the replication on air,
per multicast group.
5.8 Data protection — WEP and WPA
Privacy is a mechanism that protects data over wireless and wired networks,
usually by encryption techniques. The HiPath Wireless Controller provides
several privacy mechanisms to protect data over the WLAN. Privacy type is
configured as part of a WLAN Service.
Data protection encryption techniques
Note: Regardless of the Wireless AP model or VNS type, a maximum of 112
simultaneous clients, per radio, are supported by all of the data protection
encryption techniques listed below.
Wired Equivalent Privacy (WEP) – WEP encrypts data sent between
wireless nodes. Each node must use the same encryption key.
Wi-Fi Protected Access Privacy (WPA v.1 and v.2) – Encryption is by
Advanced Encryption Standard (AES) or by Temporal Key Integrity Protocol
(TKIP). Two modes are available: