Typical Bluesecure Wlan Solution Network Configurations; Single Bsc Configuration - ADTRAN BlueSecure Controller Setup And Administration Manual

Software release version: 6.5
Table of Contents

Advertisement

Chapter 1: An Overview of the BlueSecure Controller

Typical BlueSecure WLAN Solution Network Configurations

Typically, you will install and configure Bluesocket BSCs in one of the following network
configurations:

single BSC configuration

multiple BSC configuration
failover BSC configuration
Single BSC Configuration
This chapter provides complete procedures for configuring a single BSC for use in a small
network such as a workgroup. Additionally, instructions are given for configuring a pair
of BSCs for failover operation. The chapter includes:
Complete the following steps to configure a single BSC network:
Access the BSC administrator console as described in "Logging Into the Administrator
1.
Console for the First Time" on page 3-2.
Configure the BSC's protected interface to enable the BSC to communicate with the
2.
protected (i.e., wired) side of your network by following the steps listed in "Defining
the BSC Protected Physical Interface" on page 4-2.
Configure the BSC's managed interface to enable the BSC to communicate with the
3.
managed (i.e., wireless) side of your network by following the procedure given in
"Configuring the BSC Managed Interface" on page 4-7.
To create the elements that will comprise the roles you will assign to users:
4.
a)
b)
c)
d)
Define user roles that enforce network usage policies as detailed in "Defining User
5.
Roles to Enforce Network Usage Policies" on page 8-2. Setting up role-based
authorization is one of the most important aspects of BSC configuration.
6.
Optional. Define a RADIUS accounting server to record network activity and statistics
by following the procedure given in "RADIUS Accounting" on page 7-1.
Define how BSC users are authenticated and assign a role to each user as follows:
7.
1-10
Create host and network destinations and destination groups for BSC users. You
can then enable or deny user access to these destinations based on the user's
assigned role. See "Creating Destinations and Destination Groups" on page 8-
10.
Define network services and service groups as described in "Creating Network
Services and Services Groups" on page 8-13. These defined services provide
network services for your BSC users over and above the BSC's default services.
Optional. Create schedules that define when users may access BSC and network
resources (see"Creating Schedules and Schedule Groups" on page 8-17).
Optional. Define user locations and location groups specifying the location of
users on the managed side of the network. Network usage policies can be
enforced based on a user's location. User locations are identified by their
associated VLAN ID. See "Creating Locations and Location Groups" on page 8-
19 for information about defining user locations.
When using the BSC's internal database for authentication, create local users
and assign each to a role (see "Local BSC User Authentication" on page 5-2).
If you are using an external server for user authentication, you must define the
authentication server name, address, and rules used to assign roles to users. See
"Authentication Using External Servers" on page 6-1 for details.
If your BSC users have wireless devices that do not support browser-based or
transparent Windows or 802.1x login access, set up MAC address

Advertisement

Table of Contents
loading

Table of Contents