Home > HP > Router > HP Vm200 User Manual

HP Vm200 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual HP Vm200 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Working with wireless communities
    Wireless community configuration options
    4-9
    RADIUS: The V-M200 retrieves the key from the RADIUS server and uses it to generate 
    the TKIP or AES/CCMP keys that are used to encrypt the wireless data stream. The key is 
    dynamically generated by the RADIUS server each time the user logs in. Communication 
    with the RADIUS server occurs via 802.1X using the EAP protocol specified by the user’s 
    WPA client software. 
    If you select the RADIUS option, you need to configure the following settings:
    RADIUS profile: Select the RADIUS profile to use. The profile defines the settings 
    that are used by the V-M200 to communicate with the RADIUS server. RADIUS 
    profiles are defined by selecting Authentication > RADIUS profiles. For more 
    information, see Using a third-party RADIUS server on page 7-2.
    RADIUS accounting: Enable this option to have the V-M200 generate a RADIUS 
    START/STOP and interim request for each user. The V-M200 respects the RADIUS 
    interim-update-interval attribute if it is present inside the RADIUS access accept 
    response for the authentication.
    RADIUS accounting profile: Select the RADIUS profile to use for accounting 
    requests. The profile defines the settings that are used by the V-M200 to communicate 
    with the RADIUS server. RADIUS profiles are defined by selecting Authentication > 
    RADIUS profiles. For more information, see Using a third-party RADIUS server on 
    page 7-2.
    Called-Station-ID content: Select the value that the V-M200 will return as the 
    called station ID.
    Port 1: MAC address of the Ethernet port on the V-M200.
    Wireless radio: MAC address of the wireless port on the V-M200.
    BSSID: Basic service set ID of the wireless network defined by this community.
    MAC address:SSID: The MAC address of the V-M200 followed by a colon 
    followed by the SSID of the wireless community to which the client station is 
    connected.
    Station ID delimiter: Select the one-character delimiter that will be used to format 
    both the calling station ID and the called station ID attributes in RADIUS packets. By 
    default, a dash (-) is used.
    Station ID MAC case: Select the case applied to the station ID. 
    						
    							Working with wireless communities
    Wireless community configuration options
    4-10
    802.1X
    802.1X enables you to authenticate wireless clients via user accounts stored on a third-party 
    RADIUS server.
    Caution802.1X is purely a protocol for user authentication. Using 802.1X without enabling the WEP 
    encryption option results in wireless traffic being unencrypted. Therefore, for security 
    reasons, use of 802.1X without enabling WEP encryption is not recommended.
    Supported 802.1X protocols
    The following EAP protocols are supported by the V-M200. Other EAP protocols may also 
    work, but have not been tested. The 802.1X protocol that is used is always determined by the 
    configuration of the user’s 802.1X client software and is not configured on the V-M200.
    EAP-MD5: Extensible Authentication Protocol Message Digest 5. Offers minimum 
    security. Not recommended.
    EAP-TLS: Extensible Authentication Protocol Transport Layer Security. Provides strong 
    security based on mutual authentication. Requires both client and server-side 
    certificates. 
    EAP-TTLS: Extensible Authentication Protocol Tunnelled Transport Layer Security. 
    Provides excellent security with less overhead than TLS, as client-side certificates can be 
    used, but are not required. 
    PEAPv0: Protected Extensible Authentication Protocol. One of the most supported 
    implementations across all client platforms. Uses MSCHAPv2 as the inner protocol.
    PEAPv1: Protected Extensible Authentication Protocol. Alternative to PEAPv0 that 
    permits other inner protocols to be used.
    EAP-FAST: Extensible Authentication Protocol Flexible Authentication via Secure 
    Tunneling). Can use a pre-shared key instead of server-side certificate.
    For more detailed information, see the appropriate Internet Engineering Task Force (IETF) 
    Request for Comments (RFC) for each protocol. 
    						
    							Working with wireless communities
    Wireless community configuration options
    4-11
    802.1X settings
    If you select the 802.1X option, the following settings are configurable:
    RADIUS profile: Select the RADIUS profile to use. RADIUS profiles are defined by 
    selecting Authentication > RADIUS profiles. The profile defines the settings that are 
    used by the V-M200 to communicate with the RADIUS server. RADIUS profiles are 
    defined by selecting Authentication > RADIUS profiles. For more information, see 
    Using a third-party RADIUS server on page 7-2.
    RADIUS accounting: Enable this option to have the V-M200 generate a RADIUS START/
    STOP and interim request for each user. The V-M200 respects the RADIUS interim-
    update-interval attribute if it is present inside the RADIUS access accept response for the 
    authentication.
    RADIUS accounting profile: Select the RADIUS profile to use for accounting requests. 
    The profile defines the settings that are used by the V-M200 to communicate with the 
    RADIUS server. RADIUS profiles are defined by selecting Authentication > RADIUS 
    profiles. For more information, see Using a third-party RADIUS server on page 7-2. 
    WEP encryption: Enable the use of dynamic WEP keys for all 802.1X sessions. Dynamic 
    key rotation occurs on key 1, which is the broadcast key. Key 0 is the pair-wise key. It is 
    automatically generated by the V-M200. To configure the key change interval, select 
    Authentication > 802.1X.
    Called-Station-ID content: Select the value that the V-M200 will return as the called 
    station ID. 
    Port 1: MAC address of the Ethernet port on the V-M200.
    Wireless radio: MAC address of the wireless port on the V-M200.
    BSSID: Basic service set ID of the wireless network defined by this community.
    MAC address:SSID: The MAC address of the V-M200 followed by a colon followed 
    by the SSID of the wireless community to which the client station is connected.
    Station ID delimiter: Select the one-character delimiter that will be used to format both 
    the calling station ID and the called station ID attributes in RADIUS packets. By default, a 
    dash (-) is used.
    Station ID MAC case: Select the case applied to the station ID.
    NoteGlobal settings for 802.1X are configured by selecting Authentication > 802.1X. See 
    Global 802.1X settings on page 7-11. 
    						
    							Working with wireless communities
    Wireless community configuration options
    4-12
    WEP
    WEP enables you to encrypt wireless transmissions, but does not provide for user 
    authentication. WEP is not as secure as WPA. 
    NoteWEP cannot be used when the radio operating mode supports 802.11n.
    Key
    The number of characters you specify for the key determines the level of encryption. 
    For 40-bit encryption, specify 5 ASCII characters or 10 HEX digits.
    For 128-bit encryption, specify 13 ASCII characters or 26 HEX digits.
    Key format 
    Select the format used to specify the encryption key. The definition for the encryption key 
    must be the same on the V-M200 and all client stations. 
    ASCII: ASCII keys are much weaker than carefully chosen HEX keys. You can include 
    ASCII characters between 32 and 126, inclusive, in the key. However, note that not all 
    client stations support non-alphanumeric characters such as spaces, punctuation, or 
    special symbols in the key.
    HEX: Your keys should only include the following characters: 0-9, a-f, A-F.
    MAC-based authentication
    This feature enables you to authenticate wireless users based on the MAC address of their 
    wireless device. Authentication occurs via a third-party RADIUS server. 
    						
    							Working with wireless communities
    Wireless community configuration options
    4-13
    NoteWhen both this option and the MAC filtering option are enabled, MAC filtering occurs 
    first.
    MAC-based authentication cannot be enabled at the if Wireless protection is set to WPA/
    WPA2 with RADIUS.
    To successfully authenticate a user, an account must be created on the RADIUS server with 
    both username and password set to the MAC address of the user’s wireless device.
    The MAC address sent by the V-M200 (in the RADIUS REQUEST packet) for both username 
    and password is 12 hexadecimal numbers, with the values “a” to “f” in lowercase. For 
    example, 0003520a0f01.
    The RADIUS server will reply to the REQUEST with either an ACCEPT or REJECT RADIUS 
    RESPONSE packet. In the case of an ACCEPT, the RADIUS server can return the session-
    timeout RADIUS attribute (if configured for the account). This attribute indicates the amount 
    of time, in seconds, that the authentication is valid for. When this period expires, the V-M200 
    will re-authenticate the user.
    MAC-based authentication
    Select this checkbox to enable MAC-based authentication.
    RADIUS profile
    Select the RADIUS profile to use for authentication.The profile defines the settings that are 
    used by the V-M200 to communicate with the RADIUS server. RADIUS profiles are defined by 
    selecting Authentication > RADIUS profiles. For more information, see Using a third-
    party RADIUS server on page 7-2.
    RADIUS accounting
    Enable this option to have the V-M200 generate a RADIUS START/STOP and interim request 
    for each user. The V-M200 respects the RADIUS interim-update-interval attribute if it is 
    present inside the RADIUS access accept response for the authentication.
    RADIUS accounting profile
    Select the RADIUS profile to use for accounting. The profile defines the settings that are used 
    by the V-M200 to communicate with the RADIUS server. RADIUS profiles are defined by 
    selecting Authentication > RADIUS profiles. For more information, see Using a third-
    party RADIUS server on page 7-2.
    Station ID delimiter
    Select the one-character delimiter that will be used to format both the calling station ID and 
    the called station ID attributes in RADIUS packets. By default, a colon (:) is used.
    Station ID MAC case
    Select the case applied to the station ID. 
    						
    							Working with wireless communities
    Wireless community configuration options
    4-14
    Called-Station-ID Content
    Select the value that the V-M200 will return as the called station ID.
    Port 1: MAC address of the Ethernet port on the V-M200.
    Wireless Radio: MAC address of the wireless port on the V-M200.
    BSSID: Basic service set ID of the wireless network defined by this community.
    MAC address:SSID: The MAC address of the V-M200 followed by a colon followed by 
    the SSID of the wireless community to which the client station is connected.
    MAC filtering
    This feature enables you to control access to the wireless network based on the MAC address 
    of a user’s wireless device. You can either block access or allow access, depending on your 
    requirements.
    NoteMAC filtering occurs before any other authentication method.
    MAC filter
    Select this checkbox to enable the MAC filter.
    Filter mode
    Allow: Only users whose MAC addresses appear in the MAC address list can connect to 
    the wireless network created by this community. 
    Block: Users whose MAC address appear in the MAC address list are blocked from 
    accessing the wireless network created by this community. 
    Address list
    List of defined MAC addresses. Up to 64 MAC addresses are supported. To delete an address, 
    select it in the list and click Delete.
    MAC address
    To add a MAC address, specify six pairs of hexadecimal digits separated by colons and click 
    Add. For example: 00:00:00:0a:0f:01.  
    						
    							Working with wireless communities
    Wireless community data flow
    4-15
    Wireless community data flow
    The following diagram illustrates the order in which the wireless community features act 
    upon incoming data from a wireless user.
    For a detailed description of each feature, see Wireless community configuration options 
    on page 4-4.
    Quality of service (QoS)
    The QoS feature defines four traffic queues based on the Wi-Fi Multimedia (WMM) access 
    categories. In order of priority, these queues are: 
    Outgoing wireless traffic on a wireless community is assigned to a queue based on the 
    selected priority mechanism. Traffic delivery is based on strict priority (per the WMM 
    standard). Therefore, if excessive traffic is present on queues 1 or 2, it will reduce the flow of 
    traffic on queues 3 and 4. 
    To see how traffic is marked based on QoS settings, see Upstream/downstream traffic 
    marking on page 4-17.
    Regardless of the priority mechanism that is selected, traffic that cannot be classified by a 
    priority mechanism is assigned to queue 3.
    Priority mechanisms are used to classify wireless community traffic and assign it to the 
    appropriate queue. The following mechanisms are available:
    Wireless community  1
    MAC filtering
    Blocked
    Wireless
    protection
    Refused Refused
    PriorityEthernet
    VLANAllowedWireless userAllowed
    User connection
    refused
    MAC-based
    authenticationAllowed SSIDEthernet
    port
    QueueWMM access categoryTy p i c a l l y  u s e d  f o r
    1
    2
    3
    4AC_VO
    AC_VI
    AC_BE
    AC_BKVoice traffic
    Video traffic
    Best effort data traffic
    Background data traffic 
    						
    							Working with wireless communities
    Quality of service (QoS)
    4-16
    802.1p
    This mechanism classifies traffic based on the value of the VLAN priority field present within 
    the VLAN header.
    Community Based priority
    This mechanism enables you to assign a single priority level to all traffic on a wireless 
    community. If you enable the community based priority mechanism, it takes precedence 
    regardless of the priority mechanism supported by associated client stations. For example, if 
    you set Community Based Low priority, then all clients connected to this community have 
    their traffic set at low priority.
    Diffserv (Differentiated Services)
    This mechanism classifies traffic based on the value of the Differentiated Services (DS) 
    codepoint field in IPv4 and IPv6 packet headers (as defined in RFC2474). The codepoint is 
    composed of the six most significant bits of the DS field. 
    Queue802.1p (VLAN priority field value)
    16, 7
    24, 5
    30, 3
    41, 2
    QueueCommunity Based priority value
    1 Community Based Very-high
    2 Community Based High
    3 Community Based Normal
    4 Community Based Low
    QueueDiffServ (DS codepoint value)
    1 111000 (Network control)
    110000 (Internetwork control)
    2 101000 (Critical) 
    100000 (Flash override)
    3 011000 (Flash)
    000100 (Routine)
    4 010000 (Immediate)
    001000 (Priority) 
    						
    							Working with wireless communities
    Quality of service (QoS)
    4-17
    Upstream/downstream traffic marking
    Depending on the priority mechanism that is active, upstream and downstream traffic is 
    marked as described in this section.
    Upstream traffic marking
    This table describes the marking applied to wireless traffic sent by connected client stations 
    to the V-M200 and then forwarded onto the wired network (via the Ethernet port) by the 
    V- M 2 0 0 .
    Downstream traffic marking
    This table describes the marking applied to traffic received from the wired network (via the 
    Ethernet port) by the V-M200 and then sent to connected wireless client stations. 
    Although the WMM specification refers to 802.1D and not 802.1p, this guide uses the term 
    802.1p because it is more widely recognized. (The updated IEEE 802.1D: ISO/IEC 15802-3 
    (MAC Bridges) standard covers all parts of the Traffic Class Expediting and Dynamic 
    Multicast Filtering described in the IEEE 802.1p standard.)
    Mechanism
    INCOMING
    TRAFFIC
    Wireless traffic sent from wireless
    client stations to the V-M200
    OUTGOING TRAFFIC
    Traffic sent by the V-M200 to the wired network
    L2 marking
    802.1p WMM 802.1p (requires an Ethernet VLAN to be defined 
    on the wireless community).
    Community Based WMM
    Non-WMMIf an egress VLAN is defined for the wireless 
    community, then 802.1p and IP DSCP are set to 
    reflect the Community Based priority setting.
    If no egress VLAN is defined for the wireless 
    community, then the 802.1p header is not added, 
    and only IP DSCP is set to reflect the Community 
    Based priority setting.
    DiffServ DiffServ None
    Mechanism
    INCOMING
    TRAFFIC
    Traffic received from the wired network
    OUTGOING TRAFFIC
    Wireless traffic sent from the 
    V-M200 to wireless client stations
    WMM ClientNon-WMM Client
    802.1p 802.1p WMM + HPQ (WMM 
    marking done 
    according to the 
    rules for the 
    mechanism.)HPQ (hardware 
    priority queueing)
    Community 
    BasedAll traffic on the community
    DiffServ DiffServ 
    						
    							Working with wireless communities
    Quality of service (QoS)
    4-18 
    						
    All HP manuals Comments (0)