ADTRAN BlueSecure Controller Setup And Administration Manual page 16

Software release version: 6.5
Table of Contents

Advertisement

About This Guide
authentication, NTLM authentication, transparent NTLM authentication, transparent
802.1x authentication, the BSC internal 802.1x authentication server, Kerberos
authentication, cosign authentication, pubcookie authentication, CAS authentication,
transparent certificate authentication, and testing an external authentication server.
Chapter 7,
to record network activity and statistics including tracking user logins. It also
discusses the attributes sent to an external RADIUS accounting server by the BSC.
Chapter 8,
network usage policies, role-based authorization, role inheritance, defining/
modifying a role, and creating role elements, destinations, network services,
schedules, and locations.
Chapter 9,
vendor-specific IP phone support, and VoWLAN QoS.
Chapter 10,
intrusion detection system, the SNMP agent, automatic backup of the BSC database,
system time and date settings, public access networks, mail server access, event
logging and connection tracking, threshold values, domain name system (DNS)
settings, and miscellaneous BSC options.
Chapter 11,
user login pages, installing a custom SSL login certificate, and configuring hotspot
account generation.
Chapter 12,
layer-2 subnet as the BSC, deploying BSAPs with layer-3, connectivity to the BSC,
how a BSAP discovers BSCs, how a BSAP selects a home BSC, uploading BSAP
firmware files, configuring global miscellaneous non-radio settings, configuring
global radio settings, editing settings for an individual BSAP, creating SSIDs, creating
BSAPs, enabling BSAP service, and displaying configured BSAPs.
Chapter 13,
authorized RF stations on your network, configuring RF alarms, and configuring
autocontainment.
Chapter 14,
configuring multiple BlueSecure Controllers for use in relatively larger networks that
may be segmented in different subnets and physical locations. Setup and use of
Bluesocket's Replication, Load Sharing, and Secure Mobility
BSC networks are described.
Chapter 15,
administration tasks such as: monitoring user activity and connection status, viewing
the Controller's summary log, exporting Controller database information, performing
standard network diagnostics, and managing user accounts.
Chapter 16,
administrative tasks such as: restarting Controller services, backing up and restoring
the Controller database, upgrading the system software to a new version, installing
or removing system software patches, customizing the user login page, installing a
custom secure sockets layer (SSL) certificate for user login, and hotspot account
generation (i.e., end user credit card billing services).
Appendix A,
implementation of virtual LANs (VLANs) on both the managed and protected sides of
the network.
Appendix B,
procedures for configuring the DHCP servers on your network to send BSC IP
addresses to BSAPs using DHCP vendor-specific option 43.
xvi
"RADIUS Accounting"
, discusses how to set up RADIUS accounting, used
"Roles and Role Elements"
"Voice Over WLAN Support"
"General BSC Operational Settings"
"Web Logins"
, discusses customizing the user login page, translating
"BlueSecure Access Points"
"RF Intrusion Detection and Containment"
"Secure Mobility® MatriX"
"Status"
, provides procedures for performing common network
"Maintenance"
, describes how to perform common system software
"An Overview of Virtual LANs,"
"Provisioning Network DHCP Servers to Support BSAPs,"
, discusses defining user roles to enforce
, discusses general VoWLAN settings,
, discusses HTTP server settings,
, discusses deploying BSAPs on the same
, discusses identifying
, provides complete procedures for
®
features for multiple-
describes the BlueSecure Controller
provides

Advertisement

Table of Contents
loading

Table of Contents