User's Guide

Table Of Contents
hwc_intro.fm
Overview of the HiPath Wireless Controller, Access Points and Convergence Software solution
HiPath Wireless Controller, Access Points and Convergence Software and your network
9034530-02,
March 2010
HiPath Wireless Controller, Access Points and Convergence Software V7.11, User Guide 33
Port of presence for the topology on the HiPath Wireless Controller. (This
attribute is not required for Routed and Bridged at AP topologies.)
Interface. This attribute is the IP (L3) address assigned to the HiPath Wireless
Controller on the network described by the topology. (Optional.)
Type. This attribute describes how traffic is forwarded on the topology.
Options are:
“Physical” - the topology is the native topology of a data plane and it
represents the acrual Ethernet ports
"Management" - the native topology of the HiPath Wireless Controller
management port
"Routed" - the controller is the routing gateway for the routed topology.
"Bridged at Controller" - the user traffic is bridged (in the L2 sense)
between wireless clients and the core network infrastructure.
"Bridged at AP" - the user traffic is bridged locally at the AP without being
redirected to the HiPath Wireless Controller.
Exception Filters. Specifies which traffic has access to the HiPath Wireless
Controller from the wireless clients or the infrastructure network.
Certificates.<<SEE DISCUSSION ABOUT AUTHENTICATION?? See Sandy
Pavel’s review notes>>
Multicast filters. Defines the multicast groups that are allowed on a specific
topology segment.
2.3.4.2 Policy
A Policy is a collection of attributes and rules that determine actions taken user
traffic accesses the wired network through the WLAN service (associated to the
WLAN Service's SSID). Depending upon its type, a VNS can have between 1 and
3 Authorization Policies associated with it:
1. Default non-authorized policy — This is a mandatory policy that covers all
traffic from stations that have not authenticated. At the administrator's
discretion the default non-authorized policy can be applied to the traffic of
authenticated stations as well.
2. Default authorized policy — This is a mandatory policy that applies to the
traffic of authenticated stations for which no other policy was explicitly
specified. It can be the same as the default non-authorized policy.
3. Third party AP policy — This policy applies to the list of MAC addresses
corresponding to the wired interfaces of third party APs specifically defined
by the administrator to be providing the RF access as an AP WLAN Service.
This policy is only relevant when applied to third party AP WLAN Services.