General Configuration Procedure; Secure Mobility - ADTRAN BlueSecure Controller Setup And Administration Manual

Software release version: 6.5
Table of Contents

Advertisement

General Configuration Procedure

Follow these high-level steps to configure a multiple-BSC Secure Mobility MatriX:
1.
Configure the BSC Secure Mobility feature to enable seamless secure user roaming
across subnets in your network.
Configure the BSC replication feature to enable the BSCs comprising your network to
2.
share configuration data.
Optional. Configure the BSC load sharing feature on groups of up to six BSCs within
3.
in your network. All BSCs configured to support the BSC load sharing feature must
first have the BSC replication feature configured.

Secure Mobility

When wireless network users cross a subnet boundary, they are usually forced to get a
new IP address and re-authenticate to the network. This is analogous to re-dialing a cell
phone call every time you connect to a new cell tower. In a truly mobile workplace, this
approach is impractical. Bluesocket's patent-pending Secure Mobility
users of mobile devices to connect securely to any wireless network that uses a BSC,
moving freely between offices, buildings, and floors without the need to re-authenticate as
they roam from subnet to subnet.
Bluesocket's Secure Mobility is unique because it does not require any end-user software
to enable roaming and maintain a secure IPSec tunnel, even when the user crosses subnet
boundaries.
The information on Secure Mobility in this section is organized as follows:
"How Secure Mobility Works" on page 14-4.
"Network Requirements" on page 14-5.
"Step 1: Designate and Set Up the Mobility Node List Master" on page 14-6.
"Step 2: Create a List of Nodes" on page 14-7
"Step 3: Set Up Secure Mobility® on the Nodes" on page 14-8.
"Step 4: Restart Services on the Mobility Master and All Nodes" on page 14-9
"Tracking Secure Mobility Status" on page 14-9.
"Enabling VLAN Roaming Across LSG BSCs" on page 14-10.
BlueSecure™ Controller Setup and Administration Guide
An overview of the Secure Mobility feature is given in "Secure Mobility®" on
page 14-3.
See "Step 1: Designate and Set Up the Mobility Node List Master" on page 14-6
for detailed Secure Mobility feature configuration instructions.
An overview of the BSC replication feature is given in "Replication" on page 14-
10.
See "Step 1: Set Up Replication on the Master" on page 14-12 for detailed
replication feature configuration instructions.
An overview of the BSC load sharing feature is given in "Load Sharing" on
page 14-17.
For detailed load sharing feature configuration instructions, see:
-
"Configuring BSC Load Sharing (Single Subnet, NAT Enabled)" on page 14-
18.
-
"Configuring BSC Load Sharing (No NAT)" on page 14-22.
®
Secure Mobility®
®
technology allows
14-3

Advertisement

Table of Contents
loading

Table of Contents