Configuration Guide of Cisco Infrastructure For Omnitouch™ 8118/8128 Wlan Handset
Configuration Guide of Cisco Infrastructure For Omnitouch™ 8118/8128 Wlan Handset
Cisco Infrastructure
8AL90450USAA ed05
April 2013
Configuration Guide of Cisco Infrastructure for
OmniTouch™ 8118/8128 WLAN Handset
Table of Content
1. GLOSSARY ................................................................................................................................................... 3
1. Glossary
ALU Alcatel-Lucent
AOS Alcatel-Lucent OmniAccess operating system Software
AP Access Point
CAC Call Admission Control
CNG Comfortable Noise Generation
DFS Dynamic Frequency Selection
EAP Extensible Authentication Protocol
EL Entry Level handset
HE High End handset
IPT 310/610 WLAN Handset, Alu branded Polycom handset
MS-CHAP Microsoft version of the Challenge-handshake authentication protocol
MIPT Alcatel-Lucent Mobile IP Touch
OAW OmniAccess Wireless
PEAP Protected Extensible Authentication Protocol
PTT Push To Talk
RF Radio Frequency
TBC To Be Checked
TBD To Be Defined
Tspec Traffic specifications
U-APSD Unscheduled Automatic Power Save Delivery
UP User Priority
VAD Voice Activity Detection
VoWLAN VoIP over WLAN
WMM Wireless MultiMedia
WMM-PS WMM Power Save
WMM-AC WMM Admission Control
WFA Wi-Fi Alliance
WPA Wi-Fi Protected Access
2.1 Introduction
All tests executed by ALU PQA team were performed on following platform.
All tests were performed with the APs in the table, but all access points listed in the
Comtech/PCS are supported.
Controller APs
1130
1240
Product Model WLC 4402 1140
WLC 2106 1250
1260
3500
AP Radio(s) 2.4 GHz (802.11b/g/n), 5 GHz (802.11a/n)
WPA-PSK
WPA2-PSK
Security EAP-FAST
PEAPv0-MSChap2
EAP-TLS
QoS WMM
software version 5.2.178.0 / 7.0.78 / 7.098
Handset model OmniTouch 8118/8128
Handset software 4.2.2
The handset supports CCXv2 (can work with Cisco infrastructure with a higher CCX
version).
During EAP-FAST authentication, the handset only supports auto provisioning “.PAC” file.
And it will try to download the “.PAC” file in each initialization.
For 802.11a/n, if enabling more than 8 channels the roaming performance will be
degraded.
All tests were done on AP3502I and AP3502E (Internal and external antennas). Due to the fact that
AP1140, AP 1250, AP1260 and AP3500 share WLAN chipset, their behavior on a low level can be
considered to be identical. We therefore ensure compatibility/interoperability with the entire
Cisco platform that shares this chipset
o AP1040
o AP1140
o AP1250
o AP1260
o AP3500
o 210x WLC
o 440x WLC
o 550x WLC
If U-APSD shall be used in the handset it is very important that the WMM parameters in the Cisco
WLC are set correctly since U-APSD handles a bi-directional data stream where the up and
downlink must be transmitted within the same EDCA Access Category.
To use U-APSD, make sure to set QoS to Platinum for the current WLAN profile and set WMM to
Allowed. Also set EDCA profile for 802.11b/g to "Voice Optimized" and disable low latency MAC.
1. Connect to the WLC by pointing your internet browser to the URL: https<IP_Addr> (where
<IP_Addr> is the IP address of the management interface of the WLC).
2. Click the Login prompt. The default User Name and Password is admin.
2.2.2 AP Provisioning
Layer 2 discovery
Lightweight AP will send LWAPP discover broadcast to find WLC in layer 2 after get IP address
from DHCP server.
So if the Cisco LAP and WLC are in the same subnets, we only need to configure DHCP server in
that subnet and LAP will connect to the WLC by LWAPP broadcast.
Layer 3 discovery
If LAP and WLC are in the different subnets, LAP can get WLC IP address through DNS Query.
For the access point (AP) to do so, you must configure your DNS to return controller IP addresses
in response to CISCO-LWAPP-CONTROLLER.localdomain, where localdomain is the AP domain
name. When an AP receives an IP address and DNS information from a DHCP server, it contacts the
DNS to resolve CISCO-LWAPP-CONTROLLER.localdomain. When the DNS sends a list of controller
IP addresses, the AP sends discovery requests to the controllers.
LAP needs to get DNS server address and DNS domain name from DHCP options.
Open DHCP server console; go to the related scope where LAP gets IP address from.
Right click Scope Options, select Configure Options. Add these two options like below.
2.2.3 AP Configuration
1. Power-on and connect the APs to the network. Wait a few minutes for the APs to find the
controller.
2. In the navigation pane, under Access Points click Radios, then select 802.11b/g/n. All the
APs that are connected should be listed, showing their Operational Status as UP.
3. Select Configure from the drop-down list for the access point you wish to change.
5. Configure any other settings that might be relevant to your deployment as needed.
8. For 802.11b/g Network Status and 802.11g Support, select the Enabled for 802.11g-only
mode.
2. In the navigation pane, under Access Points click Radios, then select 802.11a /n. All the
APs that are connected should be listed, showing their Operational Status as UP.
3. Select Configure from the drop-down list for the access point you wish to change.
5. Configure any other settings that might be relevant to your deployment as needed.
6. Under the General tab, set the Radio Policy to 802.11b/g or 802.11a, depending on the
radio settings of the handsets
8. Configure QoS. Under the QoS tab, set Quality of Service to Platinum. This is the required
setting for voice traffic and the configuration must match the handsets. Set WMM Policy to
Required or Allowed.
9. Click the Security tab. At Layer 2 Security select the desired security policy from the
drop-down list.
iii. At Auth Key Mgmt select PSK from the drop-down list.
iii. At Auth Key Mgmt select PSK from the drop-down list.
The PSK Format may be selected as ASCII or HEX for both WPA-PSK and WPA2-PSK
policies.
iii. At Auth Key Mgmt, select 802.1X from the drop-down list.
It is highly recommended that WMM-Admission Control (WMM-AC) is enabled for Voice and Video
on each radio used for VoIP.
If the handset is configured for with Admission Control set to Mandatory, then admission control
needs to be enabled on both voice and video access categories. If Admission Control is set to
Optional on the handset, then it is possible to skip the configuration steps enabling both the voice
and video access categories. In order to maintain enterprise grade quality of service, it is
recommended to enable admission control on the APs. It is not supported to have admission control
enabled for voice and disabled for video or vice versa.
a. Make Admission Control mandatory for Voice by clicking Voice in the navigation
pane and selecting the Admission Control (ACM) check box. This step is optional if
the handset is configured with Admission Control set to Optional. This setting must
match the setting for Video.
b. Make Admission Control mandatory for Video by clicking Video in the navigation pane and
selecting the Admission Control (ACM) check box. This step is optional if the handset is
configured with Admission Control set to Optional.
Click the Apply button to save the settings. This setting must match the setting for Voice.
3. Use WMM QoS by clicking EDCA Parameters in the navigation pane and selecting the WMM
from the EDCA Profile drop-down list.
RADIUS servers must be configured if WPA2 Enterprise security is used on the handsets.
4. Fill in the appropriate information matching the RADIUS server configured for the site.
6. Test the RADIUS server connection by pausing on the white triangle on the right side of the
server row and clicking Ping. There should be a response showing successful pings.
3. CISCO Autonomous AP
3.1 Introduction
All tests were performed with the APs in the table, but all access points listed in the
Comtech/PCS are supported.
AP 1131, 1232
Model
AP1240, 1250
AP Radio(s) 2.4 GHz (802.11b/g), 5 GHz (802.11a)
WPA-PSK
WPA2-PSK
Security EAP-FAST
PEAPv0-MSChap2
EAP-TLS
QoS WMM
12.4(10b)JDA / 12.3(8)JEA
software version
12.4(21a)JA2 and 12.4(21a)JY
Handset model OmniTouch 8118/8128
Handset software 4.2.2
For 802.11a/n, if enabling more than 8 channels the roaming performance will be
degraded.
During EAP-FAST authentication, the handset only supports auto provisioning “.PAC” file.
And it will try to download the “.PAC” file in each initialization.
4. To customize voice priorities, select the IP DSCP field, enter 46 in the text field, select
Voice < 10ms Latency (6) as the class of service, and click the Add button.
5. Likewise, to configure control packet priorities select the IP DSCP field, enter 40 in the
text field; select Controlled Load (4) as the class of service, and click the Add button.
This results in two classifications.
6. Click the Apply button in the Create/Edit Policies section of the screen.
7. Assuming both radios are being used, perform the following steps under Apply Policies to
Interface/VLANS:
a. For each radio used by the handsets, go to the Access Categories tab in the QoS
Services menu.
b. Click the WFA Default button to reset all access category settings to the WFA
default.
9. Click the Apply button in the Services: QoS Policies – Access Category section to save the
WFA default settings.
a. For each radio used by the handsets, go to the Access Categories tab in the QoS
Services menu.
e. Select yes to secure correct AVVID priority mapping and enable WMM for all used
interfaces.
3.2.2 Security
Encryption manager
4. For WPA-PSK, select TKIP from the Cipher drop-down list. For WPA2-PSK or WPA2-
Enterprise (802.1x), select AES CCMP from the drop-down list.
SSID manager
3. Under Current SSID List, select the proper SSID from list box, or create a new one if
necessary. Make sure the correct radio interface is selected, Radio0-802.11G or Radio1-
802.11A.
2. For WPA2-Enterprise:
3. For WPA-PSK or WPA2-PSK configure the WPA Pre-shared Key field. Type in the key code
used in the handsets, and select the ASCII option. Characters are case-sensitive.
4. For CCX mode operation, or CCKM Fast Roaming when using WPA2-Enterprise security,
select the CCKM check box.
5. IMPORTANT: If Wi-Fi Standard QoS or CCX is being used, you must enable Call Admission
Control. A handset configured for Wi-Fi Standard QoS or CCX will not associate with an AP
that does not have this option enabled.
4. Configure Default Server Priorities. For Priority 1 under EAP Authentication, select the
corporate server created in step 2.
3.2.3 Radio
ALU recommends disabling the lowest speeds and have 6mbits as lowest supported speed. To
further optimize performance it is recommended to disallow 802.11b clients to associate by
setting the 6 Mbps or 12Mbps rate to mandatory in the 802.11g configuration.
ALU recommended settings for 802.11b/g/n are to only use channel 1, 6 and 11. For 802.11a/n
use channels according to the infrastructure manufacturer and country regulations.
Note. For 802.11a, if using channels where DFS is mandatory roaming performance will be
degraded due passive scan only. ALU recommendation is therefore to avoid usage of DFS channels
if possible.
Note: For 802.11a, if enabling more than 8 channels the roaming performance will be degraded.
Under tab SECURITY/SSID Manager Set Beacon Period to 100ms and Data Beacon Rate (DTIM) to 5.
These values are recommended in order to allow maximum battery conservation without
impacting the quality.
1. DHCP mode
b. Only use Alcatel DHCP – Alcatel DHCP property must be configured on DHCP server.
c. Favor Alcatel DHCP – The handset will prefer to choose the DHCP server with
Alcatel property.
d. Use Any DHCP – The handset will use any DHCP offer depending on DHCP offer the
receiving time.
2. SSID
3. Security Mode
a. WEP
c. EAP-FAST
i. “EAP authentication user name and password must be entered for this
security mode.
d. PEAPv0-MSChap2
ii. “EAP authentication user name and password must be entered for this
security mode.
e. EAP-TLS
i. Root certification and client certificate must be installed into the handset.
To install the “root certificate”, please select “Root” tab and click “Edit” button to install the
certificates.
To install the “root certificate”, please select “Client” tab and click “Edit” button to install the
certificates.
In the following chapter you will find screenshots and explanations of basic settings in order to get
a Cisco WLC WLAN system to operate with an OT8118/8128. Please note that security settings
were modified according to requirements in individual test cases.
Configuration of authentication using Radius sever, 802.1X (Step 1). In this example is WPA2-
AES/CCMP used.
Configuration of authentication using Radius sever (Step 2). Select the server to use. The server is
configured under tab Security/Radius. See configuration of server below.
Configuration of authentication using Radius sever (Step 3). The IP address and the secret must
correspond to the IP and the credential used by the Radius server. Tests were performed with
FreeRadius.
Note that depending on which Authentication method used it might be necessary to add a certificate
into the OT8118/8128. PEAP-MSCHAPv2 requires a Root certificate and EAP-TLS requires both a
Root certificate and a client certificate.
Configuration of authentication using internal Radius sever and EAP-FAST (Step 1). In this example
is WPA2-AES/CCMP used.
Configuration of authentication using internal Radius sever and EAP-FAST (Step 2). Check the box
“Local EAP Authentication” and choose your local EAP profile (created in step 4).
Configuration of authentication using internal Radius sever and EAP-FAST (Step 3). Create a local
user and assign a password.
Configuration of authentication using internal Radius sever and EAP-FAST (Step 3). Create a local
EAP profile and choose the EAP method to use.
Make sure that WMM is enabled and Quality of Service (QoS) platinum profile is selected.
Disable “coverage Hole Detection” and “Session timeout”. Set DTIM period to recommended value
5. DTIM value 5 values are recommended in order to allow maximum battery conservation without
impacting the quality.
The recommended settings for 802.11b/g are to only use channel 1, 6 and 11. For 802.11a/n use
channels according to the infrastructure manufacturer and country regulations.
Note. For 802.11a/n, if enabling more than 8 channels the roaming performance will be degraded.
Note for 802.11an: Using 40 MHz channels will reduce the number of non DFS channels to 2 in
ETSI regions.
Recommend disabling the lowest speeds and have 6mbits as lowest supported speed. To further
optimize performance it is recommended to disallow 802.11b clients to associate by setting the 6
Mbps or 12Mbps rate to mandatory in the 802.11g configuration.
Use “EDCA Profile” Voice Optimized and disable low latency MAC
END OF DOCUMENT