DT00XTE270EN
DT00XTE270EN
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Proprietary Ownership Declaration
I agree not to copy, produce, reproduce, transfer, distribute, decode and/or modify any
ALE material (including any and all documentation, manuals, software presentation,
student book and software files) made available and/or used as part of the ALE training.
I acknowledge that sharing of any kind of courseware and media used are strictly forbidden
without approval from ALE Training Services.
I represent and warrant that I will not use or not permit to use the courseware and\or
educational tools supplied by ALE to provide trainings in a private capacity or for my
employer or any third party.
I also acknowledge and agree that ALE owns and reserves all copyright in and all other
intellectual property rights relating to the ALE training material (including courseware and
all associated documentation) provided during the training.
I understand that any breach or threat of breach of the above shall entitle ALE to injunctive
and other appropriate equitable relief (without the necessity of proving actual damages),
in addition to whatever remedies ALE may have at law.
Furthermore, I acknowledge and agree that ALE will be entitled to cancel immediately any
and all of my Certifications in case of any breach of the above.
Maintenance – eBook
The eBook is available on the Knowledge Hub training platform. Internet access is required
to download the eBook.
Participants should be informed that they must bring their laptop for the classroom or
virtual session.
In case of issue for downloading the eBook, the user can open a ticket with the ALE
Welcome Center for assistance.
ALE technical support will be provided on an "AS IS" and "AS AVAILABLE" basis without
warranty of any kind.
OmniVista 2500 NMS &
OmniAccess Stellar WLAN
DT00XTE270
Introduction
1
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Summary
Training Objectives
Training Methodology
Internet Resources
2
Training Objectives, Organization & Agenda
• OBJECTIVES
• Install & Configure the OmniVista 2500 NMS Server
• Deploy & Configure the OmniAccess Stellar APs in Enterprise Mode
• Create & Configure SSIDs for different types of Users, using different Authentication Methods
• Understand & Configure Advanced Features (Mobility & Roaming, WIPS…)
• Methods
- Live Sessions > Theoritical Presentations
- Asynchronous Sessions > Tutored labs, done from a Remote-Labs (R-Labs)
3
Agenda
DAY 1 Estimated Duration: 8h
OmniVista 2500 > Server Installation + AOS Disc. Live Session + Lab 10:45 – 12:45
OmniAccess Stellar > Portfolio & On Boarding Live Session 1:45 – 2:30
OmniAccess Stellar > Discovery in the OV2500 Live Session + Lab 2:30 – 3:30
SSID Creation > Employee SSID (UPAM) Live Session + Lab 3:45 – 4:45
SSID Creation > Employee SSID (AD) Live Session 4:45 – 5:15
4
Agenda
DAY 2 Estimated Duration: 8h
SSID Creation > Guest SSID Live Session + Lab 9:00 – 10:30
SSID Creation > BYOD SSID Live Session + Lab 1:00 – 2:15
Wi-Fi Intrusion & Prevention System (WIPS) Live Session 3:30 – 4:00
5
Agenda
DAY 3 Estimated Duration: 7h
OmniVista 2500 > Heat Map & Floor Plan Live Session + Lab 11:30 – 12:30
6
Internet Resources
ALE Knowledge Hub Alcatel-Lucent Enterprise (ALE) Training Platform « Knowledge Hub »
OmniSwitch Switches Datasheets Technical Datasheets for each ALE OmniSwitch switch
OmniAccess Stellar Datasheets Technical Datasheets for each ALE OmniAccess Stellar access point
NMS Solutions Datasheets Technical Datasheets for each ALE OmniVista solution
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
• OmniVista 2500
• Network Management System (NMS)
• Unified Management / Monitoring / Provisioning of LAN & WLAN devices:
• ALE OmniSwitch Switches
• ALE OmniAccess Stellar Access Points
• 3rd Party Devices
ALE OMNISWITCH
• PROVISION
• MANAGE
• MAINTAIN
OMNIVISTA 2500
• Installation • Administration
• OmniVista 2500 = Virtual Appliance • Web Interface
Hypervisors
• VMware ESXi
• VirtualBox
• MS Hyper-V
• KVM
HOME PAGE
• Applications
• Accessible via
a drop down menu
• Dashboard
• Applications widgets
• OV 2500 Home Page
• Quick overview
• Customizable
(add/remove…)
APPLICATIONS
ADMIN
• Notifications
• Display traps generated by the devices
• Perform an action when receiving urgent /
important traps
(send a mail, run an application, forward the trap…)
• Topology
• Topology view of all the discovered devices
• View information about a specific device
• Perform certain actions
(edit/telnet/reboot a device)
MAIN FEATURES
APPLICATION BANDWITH
ANALYTICS
• Analytics
• View of network resources utilization (users, R
devices, applications)
• Reports generation (usage trends, predictive
analysis of future network utilization…)
• Application Visibility
• Identify and restrict usage of applications
that are used by users (ex. Facebook)
• Uses the DPI feature (Deep Packet Inspection)
MAIN FEATURES
HEAT MAP
FLOOR PLAN
• Floor Plan
• Determine optimal placement of access
points in a location
• Heat Map
• Create & Organize Wi-Fi coverage maps
(“Heat Maps”)
GUESTS VLAN, EMPLOYEES VLAN,
• Captive Portal
• Integrated captive portal with credentials CAPTIVE PORTAL
GUESTS
EMPLOYEE
DEVICE (BYOD)
MAIN FEATURES
STANDBY
VLAN + RULES
MASTER « CAMERAS »
• High Availability
• 1 OV2500 Master / 1 OV2500 Standby
• Avoid loss of service
• Troubleshooting
• Embedded troubleshooting tools
• Rapid isolation of network issues
• APIs
• Northbound RESTful APIs
• Integration of network management functions
with 3rd party ecosystem application
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Stellar OmniAccess WLAN
Connection & Use of the Stellar Remote Lab
Objectives
✓ Learn how to connect to the Stellar Remote Lab (R-Lab)
✓ Discover the equipment available in the Stellar Remote Lab (R-Lab)
Contents
1 Connecting to the Remote Desktop......................................................... 1
1.1. Connection Method ................................................................................. 1
1.2. Rlab access URL: .................................................................................... 1
2 Discovering the Remote Lab Environment ................................................. 3
2.1. Topology of the Stellar Remote Lab Pod ........................................................ 3
2.2. Switch/Access Point Console ..................................................................... 3
2.3. Wi-Fi Client .......................................................................................... 4
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
1
Connection & Use of the Stellar Remote Lab
Warning
The POD ID or POD list assigned to you (or to your Training session) will be sent by email
(from: [email protected] )
You will need the information from the tables given below to set up the connection.
Notes
Recommended web browsers:
- Chrome
- Edge
Other web browser may have some issue with copy/paste from a lab guide to the remote
terminal session
Known workaround for FireFox: https://sudoedit.com/firefox-async-clipboard/
https://rdp.al-mydemo.com/
- Username: Refer to the table below to get the corresponding “User Account” to the Rlab type you are using
- Password: unique per session – sent from our LMS to the Instructor
2
Connection & Use of the Stellar Remote Lab
Use the following table to get the login name of your POD. As well as the correspondence with the
variable X = [1-8] you will use during the labs.
Ex: If you are connected to the StelLAN POD 25 and asked to configure the IP address 10.130.5.200+X, enter the
value 10.130.5.201 (X=1).
3
Connection & Use of the Stellar Remote Lab
- Open one of the switch Console terminals used during this training: SW7-OS-6860A,
SW5-OS-6360A, SW4-OS-2360
- Check that some messages are displayed
4
Connection & Use of the Stellar Remote Lab
Tips
If you get a message “Hunting Group usy” when you open a era erm console, it means that another
TeraTerm session has already been opened (from your account or another account). Check the console sessions
currently opened on your session or ask the instructor for help.
Click OK.
Tips
The language of the keyboard of the Raspberry Pi is set by the keyboard language of the remote desktop on
which you are connected.
Stellar OmniAccess WLAN
Reinitialization of the Stellar Remote Lab
Objective
✓ Reinitialize the R-Lab equipment to its default configuration
Contents
1 Reinitializing the Switches & Access Points ............................................... 1
2 Reinitializing the OmniVista 2500........................................................... 3
3 Reinitializing the PC Client .................................................................. 5
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
1
Reinitialization of the Stellar Remote Lab
In the diagram below, in red, you can see all the equipment that will be reinitialized by using this shortcut:
TELLAR POD ( P OD NU ER)
Warning
THE SWITCHES DEFAULT CONFIGURATION IS NOT AN EMPTY CONFIGURATION!
WHEN CLICKING ON THE SHORTCUT:
- A SPECIFIC CONFIGURATION IS APPLIED TO THE SWITCHES
- ALL THE INTERFACES ARE PUT DOWN. DURING THE LABS, IT WILL BE ASKED TO ENABLE THE INTERFACES
THAT YOU WILL USE.
- THE OMNISWITCH 6860 IS PRE-CONFIGURED (VLAN, IP INTERFACE,…)
Reset all the R-Lab Pod’s equipment by using the Reset PodX script
2
Reinitialization of the Stellar Remote Lab
Notes
It is also possible to reset each equipment (switch/access point) separately. Check the dedicated addon parts
(Switch Reinitialization / Access Point Reinitialization) if you want to learn more.
3
Reinitialization of the Stellar Remote Lab
The OmniVista 2500 is installed in a virtual machine. Therefore, to access and reinitialize it, we will have to
use the VMware vSphere Client.
4
Reinitialization of the Stellar Remote Lab
Click on Login
Click on REVERT TO
Click on OK
Tips
All VM are configured with an English US keyboard, your current keyboard layout is not taken into account.
Take care of that when you’re typing a command.
Set up the Wi-Fi Linux client: Starting it et resetting the wireless networks
previously saved.
To access and set up the wireless client, we will have to use a shortcut on the desktop.
Click on OK
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
LESSON SUMMARY
Upon completion this module,
you will be able to:
• Server Installation
Hypervisors
• VMware ESXi
• VirtualBox
• MS Hyper-V
• KVM
1
This table contents vary depending on the OmniVista 2500 NMS version used. For more information, please consult the official installation
guide (1 installation guide for each version)
INSTALLATION STEPS
• Deployment on an Hypervisor
• Download the OmniVista 2500 Server virtual
appliance from the Business Portal Website
(BPWS)
• Deploy the virtual appliance on the chosen
hypervisor
• Power on the virtual appliance
ADDITIONAL OV WEB
• From the Hypervisor Console
• Fill the IP Settings
• OmniVista 2500 NMS IP & Ports
• Captive Portal IP & Ports (if used)
• Additional OV Web IP & Ports (optional) CAPTIVE PORTAL
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Stellar OmniAccess WLAN
OmniVista 2500 NMS Server Installation
Objective
✓ Install the OmniVista 2500 NMS Server
Contents
1 Briefing ......................................................................................... 1
2 Accessing the VMware ESXi .................................................................. 2
3 Configuring the OmniVista 2500 NMS Settings ............................................ 2
3.1. Post Installation Wizard ........................................................................... 2
3.2. First Login ........................................................................................... 5
4 Generating & Installing an Evaluation License ............................................ 5
4.1. Generating the Evaluation License ............................................................... 5
4.2. Installing the Evaluation License ................................................................. 6
4.2.1. Inserting the License File.................................................................................. 6
4.2.2. Inserting the License Keys................................................................................. 7
4.3. Deleting the License File .......................................................................... 7
5 Debriefing ...................................................................................... 8
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by AL
1
OmniVista 2500 NMS Server Installation
1 Briefing
The OmniVista 2500 NMS is distributed as a Virtual Appliance only. There are no other standalone installers
(e.g., Windows/Linux).
The OmniVista 2500 Virtual Appliance has already been downloaded from the Business Partner Website
(BPWS, official ALE website to download software and documentations) and deployed on a VMware ESXi
server.
In this lab, you will learn how to perform the post installation of the OmniVista 2500 NMS.
CURRENT
TOPOLOGY
END OF LAB
TOPOLOGY
2
OmniVista 2500 NMS Server Installation
Follow the installation wizard to continue with the OmniVista 2500 installation.
Press Enter
Keyboard is QWERTY
Press Enter
- [y|n]: y
Press Enter
The Captive Portal has its own
IP address.
Select:
- Option 1
- IPv4: 10.130.5.7X (X=R-Lab
Number)
- Subnet mask: 255.255.255.0
– IPv6: n
Additional OV Web IP
- Option 2: Disable Additional
OV Web IP
- Confirm (y) then press Enter
Press Enter
- Option 1: English
- Confirm (y) then press Enter
Configure the Default Gateway
- Choose Option: [4]
- Default gateway:
10.130.5.253
- [y|n]: y
Press Enter
Configure the Hostname
Press Enter
- Choose Option: [6]
- [y|n]: y
- dns server 1: 10.130.5.130
- dns server 2 [y|n]: y
- dns server 2: 10.0.0.51
Press Enter
SERVICES RESTART
AFTER EXITING THE MENU, IT TAKES A COUPLE OF MINUTES FOR THE OMNIVISTA 2500 TO RESTART ITS SERVICES. PLEASE WAIT BEFORE
GOING ON WITH THE NEXT PART.
Username: admin
Password: switch
Warning
BEFORE THIS STEP, ENSURE THAT NO LICENSE GENERATED IN A PREVIOUS TRAINING IS AVAILABLE TO AVOID ANY
POSSIBLE CONFUSION.
D D ,D Y “-EVAL- …”
Click on Submit
Select the License Type:
EVAL-OV2500-ALL-TYPE_1
on’t do both!
Warning
COPY AND PASTE ONLY THE LICENSE KEYS AND NOT THE ENTIRE LINES! (HIGHLIGHTED THE INFO THAT YOU HAVE
TO COPY AND PASTE):
EVAL-NM-EX-20-N, KEQWEXRH-VXDJBEUM-4EX$299Z-BBXS7G#4-JC!GW81R-$C8YWB1K-DBE#$LDX-AXVRMLM#
EVAL-VMM-100-N, WWITUJ#W-EWBU@BSM-@EX$299Z-BBXS7G#4-JC!GWL1R-$CFYWB1L-X5#PC4WT-5UDJU7B#
EVAL-AP-NM-20-N, G1CUNONJ-YFZ%JX2W-JEX$299Z-BB@S7G#4-JC!GW81R-$CHYWB1L-WAPB3U7!-GDFXMHV&
EVAL-GA-20-N, VTP@GOKN-E53P8#@E-NEX$299Z-BB@S7G#4-JC!GW81R-$C#YWB1L-CJD%PRTF-9GTXNX!1
EVAL-BYOD-20-N, JSQRU%HH-GFFCJUGB-ZEX$299Z-BB@S7G#4-JC!GW81R-$CRYWB1L-EBX5WUFB-8X7HF@5G
Click on OK
Once the license file correctly inserted, please delete the file “ …” from the
computer.
8
OmniVista 2500 NMS Server Installation
5 Debriefing
During this lab, we have learned how to install the OmniVista 2500 NMS. We have also learned how to
generate an evaluation license.
Remember that you can use the last part (Generating an Evaluation License) if you want to get a license for
your own lab! This is not reserved for training purpose.
OmniAccess Stellar WLAN
AOS OmniSwitches Discovery in the OmniVista 2500 NMS
Objective
✓ Learn how to discover the OmniSwitches in the OmniVista 2500 NMS
Contents
1 Briefing ......................................................................................... 1
2 Backbone VLAN ................................................................................ 2
2.1. Backbone VLAN ..................................................................................... 2
2.2. Backbone VLAN IP Interfaces ..................................................................... 3
3 SNMP v3 ......................................................................................... 4
4 Discovering the OmniSwitches on the OmniVista 2500 NMS ............................. 5
5 Debriefing ...................................................................................... 6
6 Troubleshooting ............................................................................... 7
6.1. Troubleshooting the Level 2 ...................................................................... 7
6.1.1. Checking the cables ........................................................................................ 7
6.1.2. Checking the VLAN(s) ...................................................................................... 8
6.2. L3 Troubleshooting ................................................................................. 8
6.2.1. Checking the IP Interfaces ................................................................................ 8
6.2.2. Checking the OmniVista 2500 IP Settings ............................................................... 8
6.2.3. Pinging the Equipment ..................................................................................... 9
6.3. Checking the SNMP Configuration ............................................................... 10
6.4. Discovering the OmniSwitch ..................................................................... 10
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
1
AOS OmniSwitches Discovery in the OmniVista 2500 NMS
1 Briefing
Before using all the features offered by the OmniVista 2500 NMS, the network devices must be discovered
first. In this lab, we are going to discover the 3 OmniSwitches in the OmniVista 2500 NMS. The discovery of
the 2 Access Points will be covered in another lab.
CURRENT
TOPOLOGY
END OF LAB
TOPOLOGY
2
AOS OmniSwitches Discovery in the OmniVista 2500 NMS
2 Backbone VLAN
The Backbone VLAN is used to interconnect the network equipment together (OmniSwitches, OmniVista 2500,
DHCP Server). The SNMP traffic is carried over the Backbone VLAN.
Notes
The VLAN 1305 is already assigned to the OmniVista 2500 and the DHCP Server.
3
AOS OmniSwitches Discovery in the OmniVista 2500 NMS
Check that the Access OmniSwitches can reach the core OmniSwitch 6860, and can reach
the servers:
OS-6360A
6360A -> ping 10.130.5.20X (OmniSwitch 6860)
6360A -> ping 10.130.5.7 (DHCP Server)
6360A -> ping 10.130.5.5X (OmniVista 2500 NMS)
OS-2360
2360 -> ping 10.130.5.20X (OmniSwitch 6860)
2360 -> ping 10.130.5.7 (DHCP Server)
2360 -> ping 10.130.5.5X (OmniVista 2500 NMS)
4
AOS OmniSwitches Discovery in the OmniVista 2500 NMS
3 SNMP v3
The OmniVista 2500 uses the SNNMP protocol to discover the network devices and communicate with them.
The SNMP version 1,2 and 3 are supported.
In this part, we are going to configure an SNMP version 3 profile on each OmniSwitch.
To create the SNMP v3 profile on the OmniSwitches, use the following command:
> Choose Discovery Profiles: select the SNMPv3 profile, click on + to move it to the right
> Click on Create
> Select the three ranges by clicking on the checkboxes on the left
> Click on Discover Now to launch the discovery process, then click on Finish.
6
AOS OmniSwitches Discovery in the OmniVista 2500 NMS
At the end of this part, the 3 OmniSwitches are discovered and are now manageable from the OmniVista
2500 NMS:
5 Debriefing
The reset script from the previous lab created the “ ackbone” . his is used to interconnect the
network equipment together (OmniSwitches, OmniVista 2500, DHCP Server). The SNMP settings were also
configured with the reset script. And finally, we have discovered the OmniSwitches in the OmniVista 2500
NMS. These OmniSwitches can now be managed from the OmniVista 2500 GUI.
7
AOS OmniSwitches Discovery in the OmniVista 2500 NMS
6 Troubleshooting
In this part, we will cover the process to follow if an OmniSwitch is not discovered in the OmniVista 2500. We
will use the exact same infrastructure as in the lab:
OMNISWITCH
AOS -> show interfaces 1/1/11
Operational Status : up,
Last Time Link Changed : Thu Oct 17 06:13:56 2019,
Number of Status Change: 1,
Type : Ethernet,
SFP/XFP : N/A,
EPP : Disabled,
Link-Quality : N/A,
MAC address : 2c:fa:a2:1b:18:56,
BandWidth (Megabits) : 1000, Duplex : Full,
Autonegotiation : 1 [ 1000-F 100-F 100-H 10-F 10-H ],
Long Frame Size(Bytes) : 9216,
Inter Frame Gap(Bytes) : 12,
8
AOS OmniSwitches Discovery in the OmniVista 2500 NMS
OMNISWITCH
AOS -> show vlan members port 1/1/11
vlan type status
--------+-----------+---------------
1305 default forwarding
6.2. L3 Troubleshooting
OMNISWITCH
AOS -> show ip interface
Total 6 interfaces
Flags (D=Directly-bound)
A menu is displayed.
Once the equipment IP configuration checked, make sure that the OmniSwitch can ping the OmniVista
2500:
OMNISWITCH
AOS -> show aaa authentication
[…]
Service type = Snmp
Authentication = Use Default,
1st authentication server = local
[…]
- On the OmniSwitch, check that the SNMP station and username have been correctly configured:
OMNISWITCH
AOS -> show snmp station
ipAddress/port status protocol user
---------------------------------------------------+---------+--------+-------
10.130.5.50/162 enable v3 snmpuserv3
- On the OmniSwitch, re-enter the SNMP password to make sure that this password and the auth&priv
protocol are the correct ones:
OMNISWITCH
AOS -> user snmpuserv3 read-write all password Superuser=1 sha+des
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
WiFi Express
• Syslog & Syslog over TLS support
• NTP Client
System
• Dynamic Frequency Selection • Built-in DHCP/DNS/NAT
Radio
• Transmit Power Control • MESH
• Extensive Country Code list • Certificate Management
• Channel & Transmission power manual
assignment
WIFI EXPRESS – ACCESS GROUP
Another AP is responsible for rescuing the
Primary Virtual Manager (PVM). It is called
Secondary Virtual Manager (SVM)
Group ID
WIFI EXPRESS – CLUSTER SIZING
• PVM/SVM =
AP1230/1301/1301H/1311/1320/1331/1351
/1360/1411/1431/1451/1511/1521
WAN
Distribution/Aggregation
Switch
• Cluster size > 64
• Resiliency in the network design
• OmniVista 2500
• Unified wired-wireless
• Access Management (Guest/BYOD)
• Role based policy enforcement
• Smart Analytics
• Distributed intelligence control
• Up to 4000 APs
• Scale to support 100K clients per devices
• Advanced wireless features
• WLAN topology on a map and heat map
• Wireless security (wIDS/wIPS)
• Secure NAC with Unified Access AG 2.0
WIFI ENTERPRISE – FEATURES LIST Integration
• Automated deployment with ALE
• Controller-less Architecture OmniSwitch Integration
• OmniVista integrated Unified Policy • Smart Analytics Application Monitoring
Authentication Manager (UPAM) & Enforcement/ DPI
• Simplified Management of AP Groups • UPnP/ Bonjour Service Sharing
• No limit on AP Group Count • Stellar AP authentication with 802.1X
• Max 4000 APs spread across one or Management Security • MACSEC Support for AP Wireless
more AP Groups
• OmniVista High Availability • Unified Policy Authentication Manager
• Support of NaaS Stellar Access Point • Employee - Supplicant/ Non-supplicant
WiFi secure authentication
Enterprise • Guest Access - Self Registration/
• RF Management Employee sponsored/ Social Login
• wIDS/ wIPS - Rogue Containment/ • BYOD
Attack Detection
• Strategy based Policy Enforcement
• Floor Plan/ Heatmap - Planning & Radio System
• Extensive Captive Portal Customization
deployment tools to simplify
deployment while improving QoE • External Captive Portal support
• Reports - Uptime, Usage, etc. Reports • Syslog and syslog over TLS support
• MESH Topology
MODE SELECTION
• WiFi Express is the default mode
• AP requests and receives an IP address from the DHCP server.
• DHCP option 138 equals the IP address of the OmniVista 2500 Server
Option 138
dhcpd.conf
• Perform a factory reset/reboot or change the mode manually
PVM
Control
Control
Plane
Plane Control Data
Plane Plane
Data Data Control
Data Plane Plane
Plane Plane
Control Data
Plane Plane
MANAGEMENT PLANE
• Type of Traffic
• Configuration traffic (SSID creation,..)
• Monitoring and troubleshooting (client monitoring,…)
• AP management traffic is always untagged
OmniVista
“Management” VLAN
“Management” VLAN Untagged
Untagged
WiFi WiFi
Express PVM Enterprise
MANAGEMENT PLANE – AP GROUP
OmniVista
AP Group: Group 1, Group2
AP-Group
PVM
AP Group 1 AP Group 2
WiFi-Express WiFi-Enterprise
CONTROL PLANE
• Type of Traffic
• Manages network protocols, Forwarding Information Base (FIB)
• Manages authentication, packet inspection, load balancing Over the Air
Control Plane
LAN
IP interfaces / Routers for
Distribution •All AP Mgt VLANs
•All SSID VLANs
Access
Stellar Access
Points
STELLAR CLOUD MODE
WI-FI CLOUD - OVERVIEW
AP Group 1 AP Group 2
• Up to 4000 APs
OmniVista Cirrus
CENTRALIZED MANAGEMENT WITH OMNIVISTA CLOUD NMS
• Zigbee
• IoT protocol commonly used for home and AP1321/22 AP1361/D/62
BLE 5.1/ Zigbee BLE 5.1/ Zigbee
building automation
• Aim
• Manage the Zigbee endpoints from the
OmniVista
• Advantages
• Improved guest experience (ex. digital key
management)
• Improved security controls
• Automation in IT services
USE CASE : INTEGRATION WITH DOOR LOCKS
• Compatible Stellar APs (CENTRALIZED MANAGEMENT OF GUESTROOM DIGITAL DOOR LOCKS)
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNIACCESS STELLAR WLAN
H A R D WA R E O V E RV I E W
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
Indoor
Wi-Fi 5
AP123x
Outdoor
MLE MLE MLE
Wi-Fi 6
Indoor Indoor Indoor
AP136x
Wi-Fi 6 Wi-Fi 6 Wi-Fi 6
SMB
SMB Hosp. AP1331 AP1351
AP132x
Indoor
Indoor Indoor
Wi-Fi 6
Wi-Fi 6 Wi-Fi 6
AP1311
AP1301 AP1301H
Indoor
MLE
Wi-Fi 6E
Indoor
AP1451
Wi-Fi 6E
SMB AP1431
Indoor
Wi-Fi 6E
AP1411
MLE
Indoor
Wi-Fi 7
SMB AP1521
Indoor
Wi-Fi 7
AP1511
• Tri radio
• OAW-AP1231/1232
• First 5GHz radio: 1,733Mbps (with 4SS/VHT80 clients or
• High-end AP 2SS/VHT160 clients)
• 802.11ac Wave 2 MU-MIMO • Second Multiband radio: 1,733Mbps (with 4SS/VHT80
• 802.11ac 4x4:4SS VHT160 and Integrated BLE clients or 2SS/VHT160 clients)
• Third 2.4GHz radio: 800Mbps 2.4GHz (4SS/VHT40)
• MU-MIMO
• Integrated BLE radio
• Up to 24 SSID (8 per radio)
OAW-AP1231
• 768 client devices per AP
• 1xGbE + 1x2.5GbE network interfaces, RJ-45
console, USB port, reset button
• 802.3at POE (4pair - 60W) compliant/ 48V DC
Wi-Fi 5 (function reduced when powered by 802.3at 2 pair source)
• Enterprise temperature range, plenum rated
• Operating Temp: 0°C to 45°C
OAW-AP1232 • Built-in antenna (OAW-AP1231)
• External antenna connectors (OAW-AP1232)
OMNIACCESS STELLAR AP1301
Click on this icon to view the full Product Line Matrix documentation
ACCESSORIES
ACCESSORIES > POE INJECTORS & POWER ADAPTERS
POWER OUTLET
• PoE Injector AP
POE
SPEED/LINK/ACT
POWER RESET 2 4 6 8 9 10
• Power Adapter AP
• A power adapter is plugged into a power outlet and
provide power to OmniAccess Stellar Access Points. POWER
OUTLET
• A list of PoE Injectors and Power Adapters models compatible with each OmniAccess
Stellar Access Point can be found in the Access Point’s datasheet:
• Some OmniAccess Stellar Access Points are shipped with a mounting kit.
Please refer to the Product Line Matrix document to learn more
CLICK HERE
FOR MORE
DETAILS
• Note: All OmniAccess Stellar Access Points are equipped with an internal antenna
(omni-directional coverage pattern)
ACCESSORIES > EXTERNAL ANTENNAS
• The External Antennas models and details can also be found in the Product Line Matrix
documentation:
Click on this icon to view the full Antennas Matrix documentation (p. 4)
WI-FI TECHNOLOGY
WI-FI 6 TECHNOLOGY
Wi
Fi
6E
11ax .11be
20 20 7
21 23
24 years evolution
24 years evolution
6GHz
5GHz R R R
U U U
2.4GHz 320 MHz AFC 1 2 3
Wi-Fi Generations
Wi-Fi 4 Wi-Fi 5 Wi-Fi 6 Wi-Fi 6E Wi-Fi 7
Higher Data Rates
Launch date 2007 2013 2019 2021 2024
Higher Capacity
IEEE std. 802.11n 802.11ac 802.11ax 802.11be
Higher Efficiency
Latency/Resiliency MLO
Higher Performance
Max data rate 1.2 Gbps 3.5 Gbps 9.6 Gbps 46 Gbps
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNIACCESS STELLAR WIRELESS LAN
ACCESS POINTS ON BOARDING
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
LESSON SUMMARY
Upon completion this module,
you will be able to:
• Manual Classification
• Switch Configuration
• VLAN Configuration
• Create a VLAN that will serve as the management VLAN for the Stellar AP devices.
• This VLAN must then be manually configured as default/untagged VLAN on all ports where an AP is connected.
• Configuration
• Create a VLAN for AP Management.
• Configure this VLAN as default/untagged VLAN on
all ports where an AP is connected.
METHOD 1 > MANUAL CLASSIFICATION
SWITCH CONFIGURATION
1/1/1 10.130.5.50
1 1
The AP sends a DHCP request.
2
2 The DHCP Server sends back an IP address to the AP + the IP address
of the OV2500 Server via the Option 138 (must be configured in the
DHCP server).
• Limitations
• The AP Management VLAN must be manually configured on the port(s) where the AP devices are connected to.
• If a new AP is connected on a port, the AP Management VLAN AND the VLAN mapped to SSIDs must be assigned
to this port manually.
LAB SSID
VLAN 20
VLAN 30
VLAN 50
METHOD 2
ON BOARDING WITH UNP (NO 802.1X)
METHOD 2 > ON BOARDING WITH UNP (NO 802.1X)
• Switch Configuration
• Switch Built-In/Default Configuration
• Built-In/Default Configuration • defaultWLANProfile UNP created.
• “defaultWLANProfile” UNP
• UNP LLDP Classification rule created.
• Designated for classifying AP devices.
• Automatically assigned to a built-in UNP LLDP classification rule
that recognize and classify AP devices into the
• Configuration
“defaultWLANProfile” UNP. • Create a VLAN for AP Management.
• Configure the port(s) where is/are connected the
AP devices as UNP ports.
• VLAN Configuration
• Map this VLAN to the defaultWLANProfile UNP.
• Create a VLAN that will serve as the management VLAN
for the Stellar AP devices.
1
The AP sends a LLDP-MED TLV that 1
identifies the device as an AP. 2
When the AP is detected on the UNP port, it is automatically
classified in the UNP “defaultWLANProfile” via the UNP LLDP rule.
3
3 The switch sends to the AP device the LLDP Port VLAN ID (VLAN which is
mapped to the defaultWLANProfile UNP) and AP Location (derived from
the switch information i.e. system location, system name…) TLVs.
1/1/1 10.130.5.50
4 4
The AP sends a DHCP request.
5
5 The DHCP Server sends back an IP address to the AP + the IP address
of the OV2500 Server via the Option 138 (must be configured in the
DHCP server).
6
The AP device connects to the OV2500
6
Server via the MQTT protocol.
7
7 Once the AP device is trusted, the OV
sends management information to the AP
via the MQTT protocol.
METHOD 2 > ON BOARDING WITH UNP (NO 802.1X)
• Limitations
• The AP device is not 802.1x authenticated
• If 802.1x is enabled on the port where the AP device is connected, and the AP device fails 802.1x authentication, the VLAN-
tagged client traffic is trusted and forwarded on the UNP port:
1/1/1
2 1 1
If the AP device does not respond to the EAP
The switch sends an EAP “Identity
frame, the switch identifies the AP device as
Request” frame to authenticate the AP.
non-802.1x (or non-supplicant) BUT the VLAN-
tagged client traffic is still forwarded.
EMPLOYEES SSID
3
The VLAN-tagged client traffic is still
trusted and forwarded on the network.
CLIENT DEVICE
METHOD 3
ON BOARDING WITH UNP & 802.1X
METHOD 3 > ON BOARDING WITH UNP & 802.1X
• Security Configuration
• Switch Configuration
• Enable the AP Mode Secure
• Built-In/Default Configuration
• The AP will answer to 802.1x authentication requests (802.1x
• “defaultWLANProfile” UNP client)
• Designated for classifying Stellar AP devices. • If the AP’s 802.1x authentication succeeds, the switch will
• Automatically assigned to a built-in UNP LLDP classification rule trust the traffic coming from the AP device.
that recognize and classify AP devices into the • Declare the 802.1x Server which will be used to authenticate AP
“defaultWLANProfile” UNP.
devices.
3
3 The switch sends to the AP device the LLDP Port VLAN ID (VLAN which is
mapped to the defaultWLANProfile UNP) and AP Location (derived from
the switch information i.e. system location, system name…) TLVs.
1/1/1
4 4
The switch sends an EAP “Identity
Request” frame to authenticate the AP
The AP responds to 802.1x device.
authentication requests only if the AP
Mode Secure feature is enabled
(disabled by default).
5 5
The AP device responds with an EAP
“Identity Response” frame.
6 6
The 802.1x server sends the authentication
result (ex. Success).
AP MAC@
5
If the AP device does not respond to the EAP frames, the switch
identifies the AP device as non-802.1x (or non-supplicant) and will
attempt to authenticate the AP with other methods (if configured).
METHOD 3 > ON BOARDING WITH UNP & 802.1X
• Additional Information
• AP Authentication AP 802.1X SERVER
SWITCH
1/1/1
1 1
EAP Identity Request & Response exchange.
2 2
The 802.1x server sends the authentication
EMPLOYEES SSID
result (ex. Success).
3
3
The VLAN-tagged client traffic is trusted and
forwarded on the network (trust-tag = enabled).
2 2
CLIENT DEVICE The 802.1x authentication fails (AP device
does not respond to EAP frames, or is not
identified).
EMPLOYEES SSID 3
The AP is not recognized as an AP by the switch. As a
result, the VLAN-tagged client traffic is not trusted and
thus, not forwarded on the network (trust-tag = disabled).
METHOD 3 > ON BOARDING WITH UNP & 802.1X
• How does it work?
• DHCP & OV Exchanges UNP
DEFAULTWLANPROFILE
AP DHCP SERVER OV2500
VLAN 40 SWITCH
1/1/1 10.130.5.50
7 7
The AP sends a DHCP request.
8
8 The DHCP Server sends back an IP address to the AP + the IP address
of the OV2500 Server via the Option 138 (must be configured in the
DHCP server).
9 9
The AP device connects to the OV2500
Server via MQTT protocol.
10
10 Once the AP device is trusted, the OV
sends management information to the AP
via MQTT protocol.
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNIACCESS STELLAR WLAN
A P R E G I S T R AT I O N
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
• AP is Trusted Y
N
• Manually or automatically Licensed
Un-Licensed
• AP is Licensed ?
• Enough AP Licenses on OV Y
• The Registered APs are located under the Managed AP tab in Network > AP registration >
Access Point
• In case of Network growth, new APs are seen under the Unmanaged AP tab
• The Trusted APs are then displayed under the Managed AP tab.
AP REGISTRATION - TRUST
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniAccess Stellar WLAN
Stellar Access Points Discovery in the OmniVista 2500 NMS
Objective
✓ Learn how to discover the Stellar Access Points in the OmniVista 2500 NMS
Contents
1 Briefing ......................................................................................... 2
2 Configuring the VLANs & IP Interface ...................................................... 3
2.1. Creating the VLANs ................................................................................. 3
2.1.1. Creating the MANAGEMENT VLAN (VLAN 40) ............................................................ 3
2.1.2. Verifying the VLAN Creation .............................................................................. 4
2.2. Management VLAN IP Interface ................................................................... 5
2.2.1. Verifying the IP interface Creation ...................................................................... 5
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
1
Stellar Access Points Discovery in the OmniVista 2500 NMS
1 Briefing
The OmniSwitches are now discovered by the OmniVista 2500, and ready to be configured. During this lab, we
will first setup some basic settings (VLAN, IP Interface, PoE…) on the Access OmniSwitches, then we will
launch the discovery process for the Access Points to be discovered in the OmniVista 2500.
ELLA P ( P N E )
CURRENT
TOPOLOGY
NI I E
I VE E IN
V
ELLA P ( P N E )
END OF LAB
NI I E
TOPOLOGY AN AP
I VE E
3
Stellar Access Points Discovery in the OmniVista 2500 NMS
Notes
The VLAN 1305 (BACKBONE) has already been created in a previous lab. It contains all the management
equipment ( V , P erver…).
ELLA P ( P N E )
To create this VLAN on the OmniSwitches, we will use the OmniVista 2500 VLAN Manager feature.
Configure the VLAN on the Access OmniSwitches 6860, 6360 and 2360.
1. Devices Selection
> VLAN Overwrite: ENABLED
> VLAN IDs: 40
> VLAN(s) Description: MANAGEMENT
> Click on the Add/Remove Devices
> click on Add All
> Click on OK
> Click on Next
2. VLAN Configuration
> Check that Admin Status = Enabled
> Click on Next
5. Review
> Review the information
> Click on Create
Tips
The VLANs can also be created on the OmniSwitches via command lines (CLI). Hence, the VLAN Manager feature
can be very interesting to use if the infrastructure is composed of a lot of OmniSwitches, and the same VLANs
must be created on some (or all) of them.
ELLA P ( P N E )
Notes
No IP interface is configured on the OmniSwitch 6360 and 2360 for the VLAN 40 (they will act as a “level ”
switch and will redirect all the level 3 traffic to the OmniSwitch 6860).
Enable the interfaces where the Stellar Access Points are connected;
Restart the PoE feature on the OmniSwitches 6360 and 2360 to force the Stellar Access
Points to reboot.
Notes
The DHCP relay feature is not configured on the OmniSwitch 6360 and 2360. These access OmniSwitches will
act as a “level ” switch and will send the P request to the mni witch 686 , which will relay it to the
DHCP Server.
The OS6860 is pre-configured with the DHCP relay and static route.
Notes
For your information, the CLI commands used to configure these two features are the following:
> ip dhcp relay destination 10.130.5.7
> ip dhcp relay admin-state enable
> ip static-route 0.0.0.0/0 gateway 10.130.5.253
7
Stellar Access Points Discovery in the OmniVista 2500 NMS
The Access OmniSwitches are now completely configured. In the next part, we will discover the Stellar Access
Points in the OmniVista 2500 NMS.
Warning
DO NOT CHOOSE THE COUNTRY CODE USA, JAPAN OR ISRAEL AS THE STELLAR ACCESS POINTS USED IN THE
REMOTE LAB ARE NOT COMPATIBLE WITH THESE COUNTRY CODES.
8
Stellar Access Points Discovery in the OmniVista 2500 NMS
OmniVista does not manage individual APs. You must first add APs to AP Groups. The attributes configured
for the AP Group (e.g., Management VLAN, RF Profile) are applied to all APs in the group.
Once the APs are assigned to a group, you configure the APs in OmniVista (e.g., Notification traps,
Resource Manager backups) by applying the configuration to the AP Group.
In OmniVista applications (e.g., Notifications, Resource Manager), rather than presenting the user with
individual APs when applying a configuration (as is done with AOS Devices), OmniVista presents the user
with the option of applying a configuration to AOS Devices and/or AP Groups.
Any configuration applied to an AP Group is applied to all APs in the group.
When an AP initially registers with OmniVista, the AP is placed into a pre-configured “Default” AP Group.
Let’s begin by creating the AP Group:
Tips
As you can see, several settings can be managed in the AP Group properties. Take the time to learn more about
each of them by clicking on the Help button
WARNING
DO NOT ENABLE THE “ L GIN” SETTING
5 Debriefing
During this lab, we have created the Management VLAN, which contains all the management data used by the
Access Points. e have also created a “trash” VLAN, which will contain all the “faulty” devices (not
authenticated, quarantined…). hen, we have enabled the PoE on the OmniSwitches to provide power to the
Access Points, and the IP Helper feature to redirect the APs DHCP requests to the DHCP Server. And finally,
we have discovered the Stellar Access Points in the OmniVista 2500 NMS. These Access Points can now be
managed from the OmniVista 2500 GUI.
ELLA P ( P N E )
NI I E
AN AP
I VE E
10
Stellar Access Points Discovery in the OmniVista 2500 NMS
6 Troubleshooting
In this part, we will cover the process to follow if the Stellar AP is not discovered in the OmniVista 2500. We
will use the exact same infrastructure as above:
ELLA P ( P N E )
NI I E
AN AP
I VE E
OMNISWITCH
AOS -> show lanpower slot 1/1
Port Maximum(mW) Actual Used(mW) Status Priority On/Off Class Type
----+-----------+---------------+-----------+---------+--------+-------+----------
1 60000 0 Searching Low ON *
2 60000 0 Searching Low ON *
6 60000 6800 Powered On Low ON *
OMNISWITCH
AOS -> show interfaces 1/1/6
Chassis/Slot/Port 1/1/6 :
Operational Status : up,
Last Time Link Changed : Thu Oct 17 13:26:55 2019,
Number of Status Change: 23,
Type : Ethernet,
SFP/XFP : N/A,
EPP : Disabled,
Link-Quality : N/A,
MAC address : 2c:fa:a2:1b:18:58,
11
Stellar Access Points Discovery in the OmniVista 2500 NMS
OMNISWITCH 6860
AOS -> show vlan members port 1/1/6
vlan type status
--------+-----------+---------------
40 default forwarding
Use the APs console connections on the desktop and do not change the passwords in the AP Group.
- If you can’t access to the tellar AP, but have access to its Serial port:
PC
> Open a serial connection (via a software as Putty, Teraterm…)
> Baud rate: 115200
> Data bits: 8
> Parity: None
> Stop bits: 1
Notes
If at the end of this step, the result of the “getovmode” command is not the IP address of the mniVista erver
2500:
- Launch a tcpdump trace: cd /tmp, then tcpdump -i br-wan -s0 -w trace.pcap
- Transfer the trace via TFTP on a computer, to open it with Wireshark: tftp -pl trace.pcap 10.130.5.123
- Check that the option 138 or 43 is available in the DHCP Offer sent to the Stellar AP
OMNISWITCH 6860
AOS(R6/R8) -> show ip interface
Total 6 interfaces
Flags (D=Directly-bound)
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
LESSON SUMMARY
Upon completion this module,
you will be able to:
• SSID Creation
- At the end of this presentation you will be able to:
Understand the SSID Usage profile
Create a new SSID
SSID CREATION
• SSID
• Wizard driven tool.
• Pre-defined Usage (Guest, Employee, BYOD,…).
• All the configuration is performed from the wizard.
Recommended mode
PSK followed by
Captive Portal 802.1X followed by
Captive Portal
Guest Captive Portal BYOD
Guest
Y Y Y
Captive Portal PSK followed by
Captive Captive
BYOD BYOD? Captive Portal BYOD
Portal? Portal?
N N N
802.1X
Open Pre-Shared Key
or MAC followed by
or MAC 802.1X (PSK)
• Default VLAN/Network
• VLAN assigned to the SSID
• Optional - ACL/QoS rules applied to the SSID
• Authentication Strategy
• Select the Authentication source in «Advanced Configuration»
(Local Database, External Radius, LDAP/AD)
• Optional - Use the links «Manage Guest Accounts» to create new
users in the local database
• Optional – Select the RADIUS server used by the SSID
SSID WIZARD – STEP 2 « CUSTOMIZE SSID »
• VLAN options:
• Default VLAN
• Single VLAN assigned to the SSID
VLAN 20
• VLAN Pooling
• Pool of VLAN assigned to the SSID
• Avoid large broadcast domain with a single VLAN
VLAN 20
VLAN 30
VLAN 40
SSID WIZARD – STEP 2 - ACCESS ROLE PROFILE
• VLAN ID : Employee (20)
Guest
• QoS :
Employee
• Policy List : Full-Access
New User • Bandwidth : 10Mbit/s max
« Employee »
BYOD
Access Role
Profile
SSID WIZARD – STEP 2 « CUSTOMIZE SSID »
Level of Trust
• MAC authentication
• Cons: MAC can be spoofed, no traffic encryption
• Pros: Available for basic wireless devices (printers, scanners,…)
• WPA/WPA2/WPA3 Personal = Pre-Shared Key (PSK)
• Pros: Easy set up, strong keys can be difficult to hack
Authentication Method
• Cons: But all keys can be hacked or stolen (key shared by all
users)
• WPA/WPA2/WPA3 Enterprise = 802.1X
• Pros: Strongest security, ease of Management, scalability
• Cons: More configuration during initial setup (server, users)
SECURITY – WPA3
◼Wi-Fi Alliance new Security Standard
WLAN ENTERPRISE
WLAN PERSONAL
◼ WPA/WPA2-Enterprise replaced by WPA3-
◼ WPA/WPA2-Personal PSK (Pre-Shared Key)
Enterprise
replaced by WPA3-Personal SAE (Simultaneous
⚫ Optional 192-bit security mode (CNSA option)
Authentication of Equals) □ CNSA enabled: Only wpa3 client authorized on the
⚫ Stronger Encryption Key (128 bits) SSID
⚫ Offline dictionary attack resistance □ CNSA disabled: wpa2 or wpa3 clients authorized on
⚫ No additional complexity to connect (user side) the SSID
□ CNSA option not enabled on AP1101 only
WLAN SERVICE (EXPERT)
PROFILE AND SERVICE LIST
WLAN Service
Access Policy
SSID
Authentication Associate to
Access AAA Authentication
• Open SSID name
Role Profile Strategy
• Personal
802.1X or
• Enterprise Profile MAC
802.1X or MAC
Map to Assign
VLAN ID
AP Group
RF Profile
Specific
RF Profile
• The field Default Access Role Profile is mandatory in the WLAN Service
• An Access Role Profile contains the various UNP properties for the users assigned to this
profile
• QOS Policy List
• Captive Portal Authentication
• Bandwidth Controls
• The Default Access Role Profile is assigned to the VLAN ID of the SSID
• Ex: If Guest SSID uses the VLAN 10 → Assign the Access Role Profile to the VLAN 10
WLAN SERVICE AND AAA SERVER PROFILE
• An AAA Server Profile is mandatory when the security level is set to Enterprise or Personal
• The AAA Server Profile defines
• 802.1x Authentication Servers
• MAC Authentication Servers
• Captive Portal Authentication Servers
• Accounting Servers
• The Default UPAM Server can be chosen by default
EXTERNAL CAPTIVE PORTAL INTEGRATION
• Leading hotel groups, large retail chains, restaurant chains, and shopping malls re-enforce
their brands by leveraging their existing Wi-Fi networks to provide better in-door mobile
experiences.
• Both Stellar Express and Enterprise supports External Captive Portal with External Captive
Portal and MAC authentication enabled.
CONFIGURATION REQUIRED
Both External Captive Portal and MAC authentication enabled
⚫ If MAC authentication fails : Captive Portal Enforcement
⚫ If MAC authentication succeeds : No Captive Portal enforcement
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniAccess Stellar WLAN
Creation of a Secured Employee SSID
Objective
✓ Learn how to create a secured Employee SSID
Contents
1 Briefing ......................................................................................... 2
2 Creating the Service VLAN & IP Interface ................................................. 3
2.1. Creating the Service VLAN ........................................................................ 3
2.2. Employee IP Interface ............................................................................. 4
3 Creating the Employees SSID ................................................................ 4
3.1. Creating the EmployeesX SSID .................................................................... 5
3.2. Creating an Employee Account ................................................................... 5
3.3. Back to… Creating the EmployeesX SSID ........................................................ 6
3.4. Assigning the SSID to the AP Group .............................................................. 6
4 Testing the Employees SSID .................................................................. 6
4.1. Setting Up the Linux Client to Connect to the EmployeesX SSID ............................ 6
4.2. Verifying the connection .......................................................................... 7
5 Monitoring the Connections.................................................................. 8
5.1. UPAM Monitoring .................................................................................... 8
5.2. WLAN Menu .......................................................................................... 9
5.2.1. Wireless Client List ......................................................................................... 9
5.2.2. Client Session ............................................................................................... 9
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
1
Creation of a Secured Employee SSID
6 Debriefing .................................................................................... 10
7 Troubleshooting ............................................................................. 11
7.1. Troubleshooting the Stellar AP .................................................................. 11
7.1.1. Checking the wireless configuration ................................................................... 12
7.1.2. Checking the Wi-Fi Channel ............................................................................. 12
7.1.3. Checking the interface transmission power .......................................................... 12
7.1.4. Checking the interface bitrate ......................................................................... 12
7.2. Client Information ................................................................................. 13
7.2.1. Listing the client(s) associated with the AP .......................................................... 13
7.2.2. Checking the access logs of a specific client ......................................................... 14
7.2.3. Checking the 802.1x Authentication ................................................................... 14
1 Briefing
Now that all the devices have been discovered in the OmniVista 2500 NMS, let’s create multiple SSIDs
(employee, guest…). In this first lab, we will focus on how to create a secured Employee SSID.
S E OD X (X OD N MBE )
CURRENT OMNIS I C ES
TOPOLOGY ND S
DISCOVE ED
S E OD X (X OD N MBE )
To create the VLAN 20 on both OmniSwitches, we will use the OmniVista 2500 VLAN Manager feature:
1. Devices Selection
> VLAN Overwrite: ENABLED
> VLAN IDs: 20
> VLAN(s) Description: EMPLOYEES
> Click on the Add/Remove Devices
> Click on Add All
> Click on OK
> Click on Next
2. VLAN Configuration
> Check that Admin Status = Enabled
> Click on Next
5. Review
> Review the information
> Click on Create
Tips
The VLANs can also be created on the OmniSwitches via command lines (CLI). Hence, the VLAN Manager feature
can be very interesting to use if the infrastructure is composed of several OmniSwitches, and the same VLANs
must be created on some/all of them.
Authentication Strategy
> RADIUS Server: UPAMRadiusServer
> Click on Manage Employee Accounts
Assign the freshly created SSID EmployeesX to the AP Group APGX created in the
previous lab
Now that the SSID EmployeeX has been created, the last step consists in assigning it to one or several AP
Group(s):
Now that we have finished the configuration of the SSID, let’s test it!
StellarClientX Raspberry Pi
Authentication: ProtectedEAP
Check No CA certificate
PEAP version: Automatic
Inner Auth: MSCHAPv2
Click on Connect
The Authentication Record Screen displays authentication information for all devices authenticated
through UPAM:
In the Authentication Record List information, find the Stellar Access Point where your
Client Virtual machine (StellarClientX) is connected.
Another interesting feature that the OmniVista 2500 NMS offers is the ability to locate the AP, Switch
and/or slot/port that is directly connected to a user-specified station: it is the Locator application.
From the Client List page, find on which Stellar Access Point the account Employee is
connected
6 Debriefing
During this lab, you have learned how to create a secured Employee SSID, and an Employee account. You
have also used the OmniVista 2500 features to get more information about the account that are connected to
the Employee SSID.
S E OD X (X OD N MBE )
OMNIS I C ES
ND S
DISCOVE ED
11
Creation of a Secured Employee SSID
7 Troubleshooting
In this part, we will cover the process to follow if there is an issue regarding the connection to an Employee
SSID (802.1x). We will use the exact same infrastructure as in the lab:
S E OD X (X OD N MBE )
OMNIS I C ES
ND S
DISCOVE ED
Use the APs console connections on the desktop and do not change the passwords in the AP Group.
12
Creation of a Secured Employee SSID
5.5 Gb/s
11 Gb/s
6 Gb/s
9 Gb/s
12 Gb/s
18 Gb/s
24 Gb/s
36 Gb/s
48 Gb/s
54 Gb/s
Current Bit Rate:192 Mb/s
- All the clients associated with a specific interface (ex. ath01 corresponding to the SSID Employees0 in
2.4 Ghz):
support@AP-0E:E0:~$ wlanconfig ath01 list
ADDR AID CHAN TXRATE RXRATE RSSI MINRSSI MAXRSSI IDLE TXSEQ RXSEQ CAPS XCAPS
d4:6e:0e:18:60:38 1 6 72M 72M 63 62 67 0 0 65535 EPSs cORI
ACAPS ERP STATE MAXRATE(DOT11) HTCAPS VHTCAPS ASSOCTIME IEs MODE PSMODE
0 f 0 P 0gR 00:03:20 RSN WME IEEE80211_MODE_11NG_HT20
RXNSS TXNSS
0 1 1
Minimum Tx Power : 5
Maximum Tx Power : 18
HT Capability : Yes
VHT Capability : No
MU capable : No
SNR : 63
Operating band : 2.4 GHz
Current Operating class : 0
Supported Rates : 2 4 11 12 18 22 24 36 48 72 96 108
"staGlobalIPv6": "::",
"staLocalIPv6": "::",
"associationTime": 473, Assoc. Time (seconds)
"mappingType": 0,
"assignedVLAN": 20, Wi-Fi Client Assigned VLAN
"assignedAR": "__Employees0", Wi-Fi Client Assigned ARP
"assignedPL": "",
"macAuthResult": "",
"ARFromMACAuth": "",
"PLFromMACAuth": "",
"redirectURLFromMACAuth": "",
"ARFrom8021xAuth": "",
"PLFrom8021xAuth": "",
"redirectURLFrom8021xAuth": "",
"CPAuthResult": "FAILED",
"ARFromCPAuth": "",
"PLFromCPAuth": "",
"ARFromRoaming": "",
"PLFromRoaming": "",
"redirectURLFromRoaming": "",
"classificationMatched": "none"
}
[…]
- Check that the Radius configuration and AAA server profile have been correctly retrieved by the Stellar
AP:
support@AP-83:60:~$ cat /var/config/wlanservice.conf
{
"WLANService":[
{
"wlanDeviceConfigType":"SSIDs",
"upstreamBurst":0,
"maxClientsPerBand":64,
"downstreamBandwidth":0,
"multicastOptimization":"enable",
"macAuthPassProfileName":"",
"wepKeyIndex":null,
"broadcastKeyRotation":"disable",
"dscpMappingEnable":"enable",
"clientsNumber":6,
"minBasicDataRate5G":6000,
"dot1pUplinkBestEffort":0,
"bypassStatus":"disable",
"dot1pDownlinkVideo":[
4,
5
],
"minSupportedDataRate24GStatus":"disable",
"downstreamBurst":0,
"a_msdu":"enable",
"e0211gClientSupport":"enable",
15
Creation of a Secured Employee SSID
"broadcastFilterAll":"disable",
"defaultARPName":"__Employees0",
"dot1pDownlinkBackground":[
1,
2
],
"essid":"Employees0",
[…]
"operationName":null,
"broadcastFilterARP":"disable",
"trustOriginalDSCP":"disable",
"dscpUplinkBackground":8,
"aaaProfile":"Employees0",
"dscpDownlinkBackground":[
8,
16
[...]
"e02d1xAuthServer":{
"secondaryServer":null,
"primaryServer":"UPAMRadiusServer",
"thirdServer":null,
"fourthServer":null
-ANNEXES-
Notes: AAA server and Access role profiles can be created first prior to setup WLAN services but for
this exercise you will create specific profiles through the WLAN Service configuration screen.
Tips: UPAM supports both captive portal and RADIUS server and can be used to implement multiple
authentication methods: MAC, 802.1X and captive portal authentication. User Profiles can be
supported in the OmniVista database or on external servers.
Authentication Servers
802.1X
Primary: UPAMRadiusServer
Captive Portal
Primary: UPAMRadiusServer
MAC
Primary: UPAMRadiusServer
Accounting Servers
802.1X
Primary: UPAMRadiusServer
Captive Portal
Primary: UPAMRadiusServer
MAC
Primary: UPAMRadiusServer
Notes: In UPAM, there is a system-defined NAS Client Item (All Managed Devices). It cannot be
deleted and is used to indicate that all the devices managed by OmniVista are automatically added
into the NAS Client Database of UPAM and perform the AAA process.
The shared secret in the system-defined “ ll Managed Devices” N S profile is “123456”.
- In the Security section, click on the “Default ccess ole rofile” field, select “+ Add New” and create
the Access Role Profile Access-role-employeeX.
- Keep the default values for all parameters.
- Click on the Create icon.
- Back to the WLAN Service page, in the Security section, select “Access-role-employeeX” as the Default
Access Role Profile.
- Click on the Create icon.
- Do not change the Mapping method and enter the Vlan number “20” which is the EmployeeX VLAN.
- Click on Apply.
19
Creation of a Secured Employee SSID
- This is how the AP will map the Employee VLAN (20) to the EmployeeX SSID.
When the SSID uses Enterprise authentication, assign a AAA Server Profile and then create an Authentication
Strategy and Access Policy.
At this step, the AAA Server Profile is already assigned to the SSID. The Authentication policy and Access Policy
must be created.
Notes: Authentication Strategy is used to set up a user profile source and login method (web page
or not) for authentication, as well as the network attributes applied after a successful
authentication.
OV2500 -> UPAM -> Authentication -> Authentication Strategy -> + (Create icon)
- Name the Strategy “User-PODX”, select the uthentication source as “local database”, “Access-role-
employeeX” as the default ccess role profile and keep Web Authentication to none:
20
Creation of a Secured Employee SSID
Notes: Authentication Access Policies are used to define the mapping conditions for an
authentication strategy. Through Access Policy configuration, authentication strategy can be
applied to different user groups, which can be divided by SSID or other attributes.
OV2500 -> UPAM -> Authentication -> Access Policy -> + (Create icon)
- Create the access policy “User-PODX” that will define the previous strategy to apply for employee
authentication connected to SSID “EmployeeX”. The employeeX profile will use 802.1X with the UPAM
internal RADIUS server.
- In the Mapping Condition, select the SSID attribute and EmployeeX. Click on the + button.
- Keep “User-PODX” as the uthentication Strategy and click on Create.
Stellar OmniAccess WLAN
Microsoft Active Directory Authentication
Objective
✓ Learn how to configure Microsoft Active Directory Authentication
Contents
1 Briefing ......................................................................................... 1
2 Declaring the Active Directory Server ...................................................... 2
3 Modifying the Authentication Strategy ..................................................... 2
4 Testing the AD Authentication .............................................................. 3
4.1. Verifying the connection .......................................................................... 4
5 Monitoring the Connections.................................................................. 5
5.1. UPAM Monitoring .................................................................................... 5
6 Debriefing ...................................................................................... 5
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
1
Microsoft Active Directory Authentication
1 Briefing
In the previous lab, we have learned how to create an Employee SSID, with the UPAM Server (embedded in
the OmniVista 2500) in charge of authenticating the clients.
In this lab, we will learn how to declare the Active Directory in the OmniVista 2500, and we will use it during
the authentication of clients on the SSID Employee.
CURRENT
TOPOLOGY
END OF LAB
TOPOLOGY
2
Microsoft Active Directory Authentication
Then, login with the account Employee, already created in the Active Directory database.
Authentication: ProtectedEAP
Check No CA certificate
PEAP version: Automatic
Inner Auth: MSCHAPv2
Click on Connect
6 Debriefing
In this lab, we have learned how to declare the Active Directory in the OmniVista 2500. Then, we have
modified the Employee SSID settings in order to use the Active Directory to authenticate the clients which
connect to this SSID.
OMNIACCESS STELLAR WLAN
U N I F I E D P O L I C Y A U T H E N T I C AT I O N M A N A G E M E N T
( U PA M ) - G U E S T A C C E S S
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
LESSON SUMMARY
Upon completion this module,
you will be able to:
• UPAM applications
• Guest Access – Guest License required
• BYOD Access – BYOD License required
• UPAM consists of
• Guest Access
• BYOD Access
• A built-in RADIUS Server
• A built-in MAC Authentication Server
UPAM – GUEST AND BYOD ACCESS
• Employee user access the corporate network • Guest user are granted limited access
with it’s personal device to the corporate network
• Authentication via a « BYOD » Captive Portal
• Authentication via « Guest » Captive
• Captive Portal and employee users managed in Portal
UPAM BYOD
• Captive Portal and guests users
managed in UPAM Guest
UPAM - SERVICES
• Authentication Server
• Internal RADIUS server used to authenticate both Guest and BYOD users
• E-mail server configuration
• Guest sponsor approval
• External Log Server
• UPAM logs can be redirected to an external syslog server
• Guest Access Management
• Dedicated Captive Portal and database
• Guest Access License : per device license model (not per account)
• BYOD Access Management
• Dedicated Captive Portal and database
• BYOD Access License : per device license model (not per account)
UPAM – AUTHENTICATION STRATEGY
• Advanced Options
• Network Enforcement
• Default Role of the user if the Authentication server
doesn’t return a role
• Other attributes
• Session timeout, Accounting Interim Interval,
Upstream/Downstream bandwidth
• Web Redirection
• Web Authentication – which Captive Portal template is returned
• Guest Access Strategy
• How the guest is managed (login strategy, self-registration,…)
• Location Policy
GUEST ACCESS STRATEGY
UPAM – GUEST ACCESS STRATEGY
• Self-registration strategy
• The sponsor can create it’s own username &
password
• An Employee can validate the guest account
creation
•
UPAM GUEST - SID CREATION
UPAM – GUEST ACCESS SSID
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNIACCESS STELLAR
WIRELESS LAN
USER ROLE AND BANDWIDTH CONTROL
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
LESSON SUMMARY
Upon completion this module,
you will be able to:
• AP support
• Full Application Visibility signature kit (~2000 applications)
• Creation of Policy List, based on the L7 Application (Google, Facebook, …)
Matches a
Matches N
DPI N Access Role N N
User an ACL in SSID set with No BW
application set with BW
Traffic the Policy BW Control ? Limitation
in the Policy Control ?
List ?
List? All User
Other User Other User
Traffic Traffic Y Traffic Y
Y
Y
User BW
Application Specific ACL Specific BW Enforcement Shared BW Enforced
BW Enforcement Enforcement
as per DPI Rule as per Access Role as per WLAN Service/SSID
as per Policy List Profile
User Role /Policy List Access Role Profile WLAN Service / SSID
Per User & Application BW Control Per User BW Control All Users shared BW
WEB CONTENT FILTERING - WCF
WEB CONTENT FILTERING - WCF
BRIGHTCLOUD SDK
Client assigned
to Address
Role Profile FQDN
Create Block ACL rule 3 « Social
« Guest » category ? Network »
to IP of the FQDN 4
6 2 FQDN filtered ?
DNS request ARP Guest
Not supported:
• AP1101
• AP1201H
WEB CONTENT FILTERING - CONFIGURATION
• Multiple categories
• Action: Accept or Reject • One WCF profile per Access Role Profile
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniAccess Stellar WLAN
Creation of a Guest SSID
Objective
✓ Learn how to create a Guests SSID
Contents
1 Briefing ......................................................................................... 2
2 Creating the Guest VLAN ..................................................................... 3
2.1. Creating the Service VLAN ........................................................................ 3
2.2. Guest IP Interface .................................................................................. 4
3 Creating the Guests SSID ..................................................................... 4
3.1. Creating the GuestsX SSID ......................................................................... 4
3.2. Creating a Guest Account ......................................................................... 5
3.3. Back to… Creating the GuestsX SSID ............................................................. 5
3.4. Assigning the SSID to the AP Group .............................................................. 6
4 Testing the Guests SSID ...................................................................... 7
4.1. Connecting to the “WifiClient” Raspberry Pi ................................................... 7
4.2. Setting Up the Wifi Client to Connect to the GuestXs SSID ................................... 7
4.3. Verifying the connection .......................................................................... 8
5 Monitoring the Connections.................................................................. 9
5.1. Monitoring the UPAM ............................................................................... 9
5.1.1. Viewing the Authentication Record ...................................................................... 9
5.1.2. Checking the Captive Portal Access Record ............................................................ 9
5.2. WLAN Menu ......................................................................................... 10
5.2.1. Wireless Client List ....................................................................................... 10
5.2.2. Client Session ............................................................................................. 10
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
1
Creation of a Guest SSID
1 Briefing
In the previous Lab, we have learned how to create a secured Employee SSID, dedicated for the company’s
employee. Now, let’s see how to create a Guests SSID, dedicated for the guests.
S E RP D X X P D N BER
CURRENT
NISWI C ES
TOPOLOGY ND P S
DISC ERED
S E RP D X X P D N BER
NISWI C ES
END OF LAB ND P S
Creating an SSID can be decomposed in several steps same way as in the previous lab “Creation of a Secured
Employee SSID” :
1. Create the N 30. his N will service the SSID “GuestsX” X R-Lab Number). It will be tagged
from the Access Points to the access OmniSwitches (OS2360 and OS6360), and over the link towards
the core OmniSwitch (OS6860).
2. Create the SSID and configure its options.
To create the VLAN 30 on the OmniSwitches, we will use the OmniVista 2500 VLAN Manager feature:
1. Devices Selection
> VLAN Overwrite: ENABLED
> VLAN IDs: 30
> VLAN(s) Description: GUESTS
> Click on the Add/Remove Devices
> Click Add All
> Click on OK
> Click on Next
2. VLAN Configuration
> Check that Admin Status = Enabled
> Click on Next
5. Review
> Review the information
> Click on Create
Tips
The VLANs can also be created on the OmniSwitches via command lines (CLI). Hence, the VLAN Manager feature
can be very interesting to use if the infrastructure is composed of several OmniSwitches, and the same VLANs
must be created on some/all of them.
Authentication Strategy
> RADIUS Server: UPAMRadiusServer
> Click on Manage Guest Accounts
Default VLAN/Network
> VLAN ID: 30
> Click on Save and Apply to AP Group
Assign the freshly created SSID GuestsX to the AP Group APGX created in the previous
lab
Now that the SSID GuestsX has been created, assign it to the AP Group(s) APGX:
Now that we have finished the configuration of the SSID, let’s test it!
7
Creation of a Guest SSID
WifiClientX Raspberry Pi
In the Authentication Record List information, find the Stellar Access Point where your
Client Virtual machine (StellarClientX) is connected.
> Select UPAM > AUTHENTICATION > Captive Portal Access Record
Another interesting feature that the OmniVista 2500 NMS offers is the ability to locate the AP, Switch
and/or slot/port that is directly connected to a user-specified station: it is the Locator application.
10
Creation of a Guest SSID
From the Client List page, find on which Stellar Access Point the Guest account is
connected
6 Kicking/Banning a Device
Now that we are sure that the StellarClient virtual machine is correctly connected to the Guests SSID, let’s
see how to kick him out from the network, and blacklist it.
- Try to kick out the StellarClient. Check that you can reconnect to the Guest SSID
- Try to ban/blacklist the StellarClient. Check that it is not possible to reconnect to
the Guests SSID until the StellarClient is removed from the blacklist.
> Select WLAN > CLIENT > Client List > Wireless Client List
> Scroll down to the List of Clients on All APs section
> Select the Client
> Click on Add to Blocklist
> Click OK to confirm
11
Creation of a Guest SSID
7 Debriefing
During this lab, we have created a VLAN dedicated for the Guests data traffic. Then, we have created the
Guests SSID and configured it to force the Guests to authenticate via a Captive Portal. Finally, we have
monitored the Guest StellarClient virtual machine connection, and we’ve seen that it was possible de
kick/ban a device from the OmniVista 2500.
S E RP D X X P D N BER
NISWI C ES
ND P S
DISC ERED
12
Creation of a Guest SSID
8 Troubleshooting
In this part, we will cover the process to follow if there is an issue regarding the connection to a Guests SSID.
We will use the exact same infrastructure as in the lab:
S E RP D X X P D N BER
NISWI C ES
ND P S
DISC ERED
The Stellar console access is deactivated in Enterprise mode for the application Configuration > CLI
Scripting > Terminal.
To activate the SSH console connection on OV2500, go to Network > AP Registration >AP Group, edit the
AP Group and change the support and root passwords.
Use the APs console connections on the desktop and do not change the passwords in the AP Group.
support@AP-0E:E0:~$ date
Thu Oct 24 09:25:08 2019
- All the clients associated with a specific interface (ex. ath12 corresponding to the SSID Guests0 in 5
Ghz):
support@AP-0E:E0:~$ wlanconfig ath12 list
ADDR AID CHAN TXRATE RXRATE RSSI MINRSSI MAXRSSI IDLE TXSEQ RXSEQ CAPS XCAPS
d4:6e:0e:18:60:38 1 44 6M 72M 64 63 67 0 0 65535 Es OI
ACAPS ERP STATE MAXRATE(DOT11) HTCAPS VHTCAPS ASSOCTIME IEs MODE PSMODE
0 b 0 WPS 2gGR 00:10:10 WME IEEE80211_MODE_11AC_VHT40 0
RXNSS TXNSS
1 1
Minimum Tx Power : 5
Maximum Tx Power : 18
HT Capability : Yes
VHT Capability : Yes
MU capable : No
SNR : 64
Operating band : 5GHz
Current Operating class : 0
Supported Rates : 12 18 24 36 48 72 96 108
16
Creation of a Guest SSID
support@AP-83:60:~$ eag_cli show user all //or// eag_cli show user list
user num : 1
ID UserName UserIP UserMAC SessionTime
1 Guest 10.7.0.69 D4:6E:0E:18:60:38 0:16:18
OutputFlow InputFlow AuthType ESSID
3091809 659705 PORTAL Guests0
-ANNEXES-
Create a policy which will regroup the forbidden services: telnet, SSH
et’s begin with the creation of the Policy. In this Policy, we will deny the telnet and SS protocols:
1. Config
> Name: DeniedServ
> Click on Next
2. Device Selection
> Click on both ADD buttons to apply the policy on the network device OS6860E and AP Group APGX.
Note: OS2360 and OS6360 are not supported.
> Click on Next
3. Set Condition
> Select L4 Services
> Select Group
> Service Group: click on
Service Group
> Group Name: DeniedSrv
Services
> Click on
> Service Name: telnet
> Destination Port: select TELNET (23)
> Click on Create
> Click on Finish
19
Creation of a Guest SSID
Services
> Click on
> Service Name: SSH
> Protocol: TCP
> Destination Port: select
> Name: SSH
> Port Number: 22
> Click on Create
> Click on Finish
Service Group
> Select Services: Click on to add all the services
> Click on Create
3. Set Condition
> Service Group: DeniedSrv
> Click on Next
4. Set Action
> Click on QOS
> Disposition: DROP
> Click on Next
5. Validity Period
> Validity Periods: AllTheTime
> Click on Next
6. Review
> Review the information, then click on Create
> Click on OK
At the end of this step, a Policy has been created. This Policy contains the services that will be denied to
the users, when they will be authenticated. Creating a list of authorized services is not necessary, as one
“ ccept llPolicy” is created by default (we will use it in the next part).
> In the drop-down list at the bottom of the area (“Device-Default”), select OV-L3-AcceptAllPolicy
> Click on Next
2. Device Selection
> Click on ADD, then add the devices OS6860E and the AP Group APGX
> Click on Create, then OK
9.4. Pushing the Policy List & Policies on the Network Devices
Once the Policies and the Policy List created, they must be pushed to the network devices:
We have also pushed them on the network devices (OmniSwitch 6860E and Stellar APs contained in the
AP Group APGX).
21
Creation of a Guest SSID
WIRELESS CLIENT VM
> Open PuTTY, under Start > Internet > PuTTY SSH Client
> Choose Telnet (port 23) > Host name (or IP) 10.7.X.62 (X = R-Lab Number)
> Choose SSH (port 22) > Host name (or IP) 10.7.X.62 (X = R-Lab Number)
Warning
BEFORE PERFORMING THE TEST, BE SURE TO DISCONNECT AND RECONNECT THE VIRTUAL MACHINE FROM THE
NETWORK TO FORCE THE RE AUTHENTICATION AS THE POLICY IS APPLIED ONCE THE CLIENT AUTHENTICATION IS
SUCCESSFUL.
Stellar OmniAccess WLAN
Web Content Filtering
Objective
✓ Learn how to configure the Web Content Filtering
Contents
1 Briefing ......................................................................................... 1
2 Activate Web Content Filtering ............................................................. 2
3 Configure Web Content Filtering ........................................................... 3
3.1. WCF operational status ............................................................................ 3
3.2. WCF Profile creation ............................................................................... 3
3.3. Assign WCF Profile to Access Role Profile ....................................................... 4
4 Test and validation ........................................................................... 5
4.1. Connect to the GuestsX SSID ...................................................................... 5
4.2. Verifying the connection > On the WLAN Client ............................................... 5
4.3. Verify the Web Content Filtering ................................................................ 7
5 Debriefing ...................................................................................... 8
6 Troubleshooting ............................................................................... 9
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
1
Web Content Filtering
1 Briefing
Now that the Stellar solution is broadcasting the EmployeesX and GuestsX SSID, the company wants to filter
the guest traffic from specific websites.
In this example, “Social Network” and “Gambling” traffic will be rejected, whereas all the other internet
traffic will be accepted on the GuestsX SSID.
The WCF feature will be implemented on the network and will be then tested.
S N
S N
G est
2
Web Content Filtering
Web Content Filtering can either be activated per AP Group or per Access Point.
It will be activated per AP Group in this lab but look at the tip to know how to activate
it per Access Point.
We will activate the WCF feature for the AP Group APGX – attached to all our Access Points.
As the WCF is now active for all the Access Points in our AP Group APGX, we will configure it. We will create
a profile, select the categories of web traffic to be rejected and assign this profile to our users.
> Select UPAM > Web Content Filtering > WCF Profile
In this lab, we will create a profile that will reject all the traffic categorized as “Social Networking”
Facebook, witter, inkedin,… and “Gambling” nibet, bet 365,… .
All the traffic that does not belong to one of these categories will be accepted.
> Select UPAM > WEB CONTENT FILTERING > WCF Profile
> Click on
> Name: WCF-guests
> Category: Social Networking
> Action: Reject
> Click on to add this rule
By default, all the traffic is accepted. It means that on the traffic from these two
categories are rejected.
The WCF profile is assigned to one – or multiple – Access Role Profile. All the users
assigned to this Access Role Profile can have their web traffic filtered.
For o r G ests SSI , the sers are attached to the ccess ole rofile “__G ests ”. he WCF profile will
therefore be attached to this Access Role Profile.
As we have modified the Access Role Profile, we must apply it to the AP Group.
Otherwise, the modification is just changed locally on the OmniVista server and not pushed to the Access
Points.
> Select __GuestsX and click on the button Apply to Devices (in the Access Role Profile window)
> In the Mapping Method, select Map to VLAN
> In the VLAN(s), select “30” (the Guests VLAN)
> Click on ADD in front of “0 AP Groups”
> Move the AP Group APGX to the column on the right and click on OK
> Click on Apply
> Review the success logs, click on OK and then on Close
The WCF profile is assigned to the Access Role Profile __GuestsX, which is then applied
to the AP Groups. All the Guests authenticated are assigned to this Access Role Profile
and will have their Social Network and Gambling web traffic filtered.
5
Web Content Filtering
We will use the StellarClient, connect to the GuestsX SSID and use our Guest credentials.
We will then generate web traffic for different websites google, facebook, bet 365,… and observe the
behavior of the traffic.
WifiClientX Raspberry Pi
Click on Connect
5 Debriefing
At the end of this lab, the G est’s web traffic for the Social Network and Gambling categories is rejected.
These rules, rejecting this traffic, are applied to all the users belonging to the Access Role Profile __GuestsX.
S N
G est
9
Web Content Filtering
6 Troubleshooting
The Web Content Filtering feature requires the DNS configuration on the OmniVista server.
If the NS config ration is missing in the mniVista 2500, the stat s of the WCF feat re will be “Not in
service” and the mniVista won’t be able to join the rightclo d I.
Check that the DNS servers are configured on the OmniVista server.
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
• Alternate solution to Employee Account, BYOD device (MAC address) can be created by
admin
• Referred as Company Property
• Registration Strategy
• BYOD user account attributes
• Login Strategy
• Redirection URL after successful authentication.
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniAccess Stellar WLAN
Creation of an Employee SSID for BYOD
Objective
✓ Learn how to create an SSID dedicated for Employees with personal
devices (BYOD: Bring Your Own Device)
Contents
1 Briefing ......................................................................................... 2
2 Creating the BYOD SSID ...................................................................... 3
2.1. Creating the BYODX SSID .......................................................................... 3
2.2. Back to… Creating the BYODX SSID............................................................... 4
2.3. Assigning the SSID to the AP Group .............................................................. 4
3 Testing the BYOD SSID ........................................................................ 5
3.1. Setting Up the Linux Client to Connect to the BYODX SSID ................................... 5
3.2. Verifying the connection > After the Web Authentication ................................... 6
4 Monitoring the Connections.................................................................. 6
4.1. UPAM Monitoring .................................................................................... 7
4.1.1. Authentication Record ..................................................................................... 7
4.1.2. Captive Portal Access Record ............................................................................. 7
5 Debriefing ...................................................................................... 8
6 Troubleshooting ............................................................................... 9
6.1. Troubleshooting the Stellar AP ................................................................... 9
6.1.1. Checking the DNS configuration .......................................................................... 9
6.1.2. Checking the wireless configuration ................................................................... 11
6.1.3. Checking the Wi-Fi Channel ............................................................................. 11
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
1
Creation of an Employee SSID for BYOD
1 Briefing
In the previous Labs, we have learned how to create a secured Employees SSID and a Guests SSID. Now, let’s
see how to create an Employees BYOD SSID, dedicated for the employees who want to bring and use their
personal device within the company network.
S OD X X OD N B
CURRENT O NIS I C S
TOPOLOGY ND
DISCO
S
D
S OD X X OD N B
O NIS I C S
END OF LAB ND S
DISCO D
TOPOLOGY
3
Creation of an Employee SSID for BYOD
Assign the freshly created SSID BYODX to the AP Group APGX created in the previous lab
Now that the SSID BYODX has been created, assign it to one or several AP Group(s):
Now that we have finished the configuration of the SSID, let’s test it!
5
Creation of an Employee SSID for BYOD
StellarClientX Raspberry Pi
Ouvrez un navigateur
Another interesting feature that the OmniVista 2500 NMS offers is the ability to locate the AP, Switch
and/or slot/port that is directly connected to a user-specified station: it is the Locator application.
8
Creation of an Employee SSID for BYOD
5 Debriefing
In this Lab, we have learned how to create an Employee SSID, dedicated for the employees who want to use
their personal device within the company network (BYOD, Bring Your Own Device).
S OD X X OD N B
O NIS I C S
ND S
DISCO D
9
Creation of an Employee SSID for BYOD
6 Troubleshooting
In this part, we will cover the process to follow if there is an issue regarding the connection to a BYOD SSID.
We will use the exact same infrastructure as in the lab:
S OD X X OD N B
O NIS I C S
ND S
DISCO D
- All the clients associated with a specific interface (ex. ath03 corresponding to the SSID BYOD0 in 2.4
Ghz):
support@AP-0E:E0:~$ wlanconfig ath03 list
ADDR AID CHAN TXRATE RXRATE RSSI MINRSSI MAXRSSI IDLE TXSEQ RXSEQ CAPS XCAPS
d4:6e:0e:18:60:38 1 6 72M 86M 63 60 64 0 0 65535 ESs cORI
ACAPS ERP STATE MAXRATE(DOT11) HTCAPS VHTCAPS ASSOCTIME IEs MODE PSMODE
0 f 0 P 0gR 00:07:01 WME IEEE80211_MODE_11NG_HT20 0
RXNSS TXNSS
1 1
Minimum Tx Power : 5
Maximum Tx Power : 18
HT Capability : Yes
VHT Capability : No
MU capable : No
SNR : 63
Operating band : 2.4 GHz
Current Operating class : 0
Supported Rates : 2 4 11 12 18 22 24 36 48 72 96 108.
13
Creation of an Employee SSID for BYOD
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
LESSON SUMMARY
Upon completion this module,
you will be able to:
• Each AP can take RF action (try, wait, retry mechanism) Edge Switch Edge Switch
• Concept of RF Profile
• Use default or new RF Profile
• RF Profile applied to AP Group or at AP level
• Country Code set in the RF Profile
DISTRIBUTED RADIO MANAGEMENT - DRM
OmniVista
AP Group 1: AP 1,2,3,4,6 => RF Profile Profile1
AP Group 2: AP 5,7 => RF Profile Profile2
AP7 explicitly assigned to RF Profile Profile2
LAN
RF App
MGT VLAN 1 MGT VLAN 2 Over the LAN RF management
Scope = Adjacent APs
AP Group 2
AP 2
AP 1
AP 3 AP 5
AP 4
AP 6 AP 7
AP Group 1
• RF Profile configuration
• Name / Description & Country Code
• Scanning
• RF Profile
• Dynamic Radio
Management (DRM)
channel list selection
• Band Steering
• Steer client to 2.4Ghz, 5Ghz or 6GHz
Radio/Band
• Option: Force steering to 5 or 6 GHz
DUAL RADIO
Diff. = 5G Client Number – 2.4G Client Number
(Threshold:10)
AP
TRI RADIO
• Pri-Diff. = 5G High Client # – 2.4G Client #
(Threshold:10)
• Sec-Diff. = 5G Low Client # – 2.4G Client #
(Threshold:10)
Overloaded: A channel is considered overloaded when its average medium utilization over the span of a minute exceeds 70%.
SMART LOAD BALANCE – DYNAMIC LOAD BALANCE
AP 2. Reply to Client
3. New Client joins AP2
1. Broadcast Join Request
• All AP13xx and AP14xx have a dedicated scanning Radio Employee (5GHz)
Guest (2.4GHz, 5GHz)
• No background scanning for these models BYOD (5GHz)
• Each radio periodically scan the air – One channel at the time Employee (5GHz)
Guest (2.4GHz, 5GHz)
• During scanning wireless clients are impacted – no 802.11 data BYOD (5GHz)
• Scanning is required for WIPS
• Interfering & Rogue AP detection, Wireless attack detection 2.4GHz 5GHz 6GHz
20 ms
• Scanning Interval and duration
• Default interval = 5 sec – Range = 5-10 sec
• Default Duration = 20 ms – Range = 20-110 ms Dedicated AP
scanning mode
• Dedicated AP scanning mode Employee (5GHz)
• AP only used to scan the air in order to the quality of the wireless Guest (2.4GHz, 5GHz)
BYOD (5GHz)
environment
• Voice and Video Awareness
2.4GHz 5GHz 6GHz
• Bypass scanning when the AP has an active voice or video session from a
client
• SIP and H.323 traffic detected
BAND, CHANNEL AND POWER SETTINGS
• Per band configuration (2.4G, 5G (all), 5G High and 5G Low, 6G)
• Channel and Power settings mode
• Auto mode
• Channel number and power setting automatically set & adjusted
• Optimal settings to minimize interferences and maximize wifi coverage
• Decision based on the RF context shared between neighbor APs
• Does not depend on background scanning configuration status
• Channel width still needs to be set
• Explicit mode
• Channel number, channel width and power setting manually set
• Channel number restriction per Country Code
• Channel width for 2.4G: 20Mhz (default) or 40 Mhz
• Channel width for 5G, 5G Low, 5G High: 20Mhz , 40 Mhz (default), 80Mhz or 160
Mhz
• Channel width for 6G: 20Mhz , 40 Mhz, 80Mhz or 160 Mhz
• Power: Auto or value in 3-23Dbm
• Short Guard Interval
• Used to improve the overall throughput of the AP
RF OPTIMIZATION AND RECOMMENDATION
Smart Load Balance Per Band Info
CLI
-> wlanconfig ath01 list
CLIENT LIST
RSSI VALUES
RSSI dBm RSSI dBm RSSI dBm
10 -86 21 -75 29 -67
11 -85 22 -74 30 -66
12 -84 23 -73 31 -65
13 -83 24 -72 32 -64
14 -82 25 -71 33 -63
15 -81 26 -70 34 -62
16 -80 27 -69 35 -61
17 -79 28 -68 36 -60
18 -78 37 -59
OK – not bad
19 -77 38 -58
20 -76 39 -57
40 -56
Bad
Not recommended for Video or Audio 41 -55
applications 42 -54
Desired and recommended 43 -53
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniAccess Stellar WLAN
Radio Frequency Settings Configuration
Objective
✓ Learn how to configure the RF (Radio Frequency) Settings
Contents
1 Briefing ......................................................................................... 2
2 Creating an RF Profile ........................................................................ 2
2.1. General Settings .................................................................................... 2
2.2. Smart Load Balance ................................................................................ 2
2.2.1. Band Steering ............................................................................................... 2
2.2.2. Exclude MAC OUI ........................................................................................... 2
2.2.3. Force 5 GHz ................................................................................................. 2
2.2.4. Association RSSI Threshold ................................................................................ 3
2.2.5. Roaming RSSI Threshold ................................................................................... 4
2.3. Per Band Info ........................................................................................ 4
2.3.1. Default Setting .............................................................................................. 4
2.3.2. Band .......................................................................................................... 4
2.3.3. Channel Setting ............................................................................................. 4
2.3.4. Client-aware ................................................................................................ 4
2.3.5. Channel DRM ................................................................................................ 4
2.3.6. Channel List ................................................................................................. 4
2.3.7. Channel Width .............................................................................................. 4
2.3.8. Power Setting ............................................................................................... 4
2.3.9. Minimum and Maximum TX Power........................................................................ 4
2.3.10. External Antenna Gain ................................................................................ 4
2.3.11. Beacon interval ........................................................................................ 4
2.3.12. Short Guard Interval .................................................................................. 5
2.3.13. MU-MIMO ................................................................................................ 5
2.3.14. High Efficiency ......................................................................................... 5
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
1
Radio Frequency Settings Configuration
1 Briefing
In the OmniVista 2500, and for Stellar Access Points, the Radio Frequency settings management is done via
“RF Profiles”. A RF Profile contains all the radio frequency settings. Once created, it must be assigned to an
AP or AP Group.
2 Creating an RF Profile
It can also cause problems. For example, a 5 GHz-capable device is automatically redirected to the 5 Ghz band
by the band steering feature, even if the 5 GHz signal is low.
Solution:
- Design your networks for simultaneous 5 GHz and 2.4 GHz coverage.
- For existing deployments where this may not be feasible, and your coverage is quite different on both bands,
avoid using band steering or use the Exclude MAC OUI feature explained below.
- Find the RSSI value of your StellarClient virtual machine (we will consider in the lab
that this RSSI value is too low to connect to the SSIDs created previously)
- Modify the Association RSSI Threshold to make StellarClient RSSI too low to connect
the SSIDs created previously
> Before doing this, be sure that the StellarClientX virtual machine is connected to one of the SSIDs
created in the previous labs!
- Now, we are going to assume that the StellarClient signal strength (ex. -18 dBm) must be considered
too weak to connect to the AP. To do so, we will set the Association RSSI Threshold to a value greater
than the client RSSI value:
Notes > RSSI vs dBm
dBm and RSSI are different units of measurement that both represent the same thing: signal strength. The
difference is that RSSI is a relative index, while dBm is an absolute number representing power levels in mW
(milliwatts).
For this exercise, we need to translate the client signal strength from dBm to RSSI. To do so, please refer to
the following table (to convert the RSSI value to dBm you just need to subtract 96 to the RSSI value):
Notes
We will test this feature in the next section, as the RF Profile must be first applied to the desired AP or AP
Group.
4
Radio Frequency Settings Configuration
2.3.2. Band
Configures the working radio for the AP.
2.3.4. Client-aware
When enabled, the Auto Channel Selection does not change channels for Stellar APs with connected client.
When disabled, the Stellar AP may change to a more optimal channel but may disrupt connected clients.
2.3.13. MU-MIMO
Enables/Disables Multi-User, Multiple-Input, Multiple-Output feature. If enabled, the AP can communicate
with multiple users simultaneously. It decreases the time each device has to wait for a signal and speeds
up the network
Notes
Note that it is also possible to assign an RF Profile to a specific AP (instead of an AP Group). To do so, go to the
NETWORK > AP REGISTRATION > Access Points menu.
Tips
The RF Profile can also be created directly from the AP/AP Group, in the Edit mode, by clicking on Add New:
Now that the RF Profile My_RF_Profile is applied to the APGX Group, try to connect to
one SSID from the StellarClient virtual machine.
6
Radio Frequency Settings Configuration
4 Debriefing
During this lab, we have learned that the OmniVista 2500 provides an easy way to manage the Stellar Access
Points radio frequency settings.
We have also learned that a lot of settings are available and can be enabled or disabled depending on the
infrastructure deployed.
7
Radio Frequency Settings Configuration
5 Troubleshooting
In this part, we will cover the process to follow if there is an issue regarding the RF Profile and RF Profile
settings assignment. We will use the exact same infrastructure as in the lab:
AR PO PO R)
O H
A AP
O R
"bandSteering":"disable",
"bandSteeringForce5g":"disable",
"LoadBalance":"disable",
"backgroundScanning":"enable",
"scanningEnhance":"disable",
"countryCode":"FR",
"scanningInterval":20,
"scanningDuration":50,
"voiceVedioAwareness":"enable",
"airtimeFairnessAt2G":"disable",
"airtimeFairnessAt5G":"disable",
"perBandInfo":{
"2.4G":{
"band":"enable",
"channelSetting":"AUTO",
"channelWidth":20,
"autoChannelWidth":"enable",
"powerSetting":"AUTO",
"shortGuardInterval":"enable",
"signalStrengthThreshold":90,
"roamingSignalStrengthThreshold":0,
"powerValMax":"0",
"powerValMin":"0",
"radioMode":"normal",
"scanDuration":"normal",
"Gain":"3",
"clientAwareness":"disable"
},
"5G_high":{
"band":"enable",
"channelSetting":"AUTO",
"channelWidth":20,
"autoChannelWidth":"enable",
"globalChannelWidth":20,
"powerSetting":"AUTO",
"shortGuardInterval":"enable",
"signalStrengthThreshold":90,
"roamingSignalStrengthThreshold":0,
"powerValMax":"0",
"powerValMin":"0",
"radioMode":"normal",
"scanDuration":"normal",
"Gain":"4",
"clientAwareness":"disable"
},
"5G_low":{
"band":"enable",
"channelSetting":"AUTO",
"channelWidth":20,
"autoChannelWidth":"enable",
"globalChannelWidth":20,
"powerSetting":"AUTO",
"shortGuardInterval":"enable",
"signalStrengthThreshold":90,
"roamingSignalStrengthThreshold":0,
"powerValMax":"0",
"powerValMin":"0",
"radioMode":"normal",
"scanDuration":"normal",
"Gain":"4",
"clientAwareness":"disable"
},
"5G_all":{
"band":"enable",
"channelSetting":"AUTO",
"channelWidth":40,
"autoChannelWidth":"enable",
"globalChannelWidth":20,
"powerSetting":"AUTO",
"shortGuardInterval":"enable",
9
Radio Frequency Settings Configuration
"signalStrengthThreshold":90,
"roamingSignalStrengthThreshold":0,
"powerValMax":"0",
"powerValMin":"0",
"radioMode":"normal",
"scanDuration":"normal",
"Gain":"4",
"chainmask":15,
"clientAwareness":"disable"
}
},
"scanRadioInfo":{
"radioMode":"normal",
"scanDuration":"normal"
[…]
ACAPS ERP STATE MAXRATE(DOT11) HTCAPS VHTCAPS ASSOCTIME IEs MODE PSMODE
0 b 0 WPS 2gGR 00:10:10 WME IEEE80211_MODE_11AC_VHT40 0
RXNSS TXNSS
1 1
[…]
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
Fast Roaming
L2 Roaming L2 Roaming
L3 Roaming
• Roaming relies on client context sharing between over the air adjacent APs
• L2 or L3 Roaming selection based on the client VLAN between "home" and "foreign" AP
• L3 Roaming based on L2 GRE tunnel between "home" and "foreign" AP
CONFIGURATION
• AP Discovery Protocol
• Each AP learns about its “over-the-air” adjacent APs and their IP addresses
• No dependency on AP Groups and Management VLAN
• Limited to AP managed by the same OmniVista
Network OmniVista
Over-the-LAN Client
Context sharing
Edge Switch
Access Point
Over-the-air AP discovery
Client
CLIENT CONTEXT
Client Context exists on WLAN service and Access Client Context VLAN ID = Roaming Results
the new AP? Role Profile exist in the VLAN ID mapped to the
Client Context on the Access Role Profile on
new AP? the new AP?
No - - No Roaming, new client
Yes No - No Roaming, new client
Yes Yes Yes L2 Roaming
Yes Yes No L3 Roaming
• Layer 2 and Layer 3 selection based on the management VLAN between the "home" and
"foreign" AP.
FAST ROAMING
FAST ROAMING
• OKC / 802.11k
• PMK (Pairwise Master Key) caching
• Client can provide the PMKID in the association request (802.11k)
• If 802.11k not supported by client, AP uses the cached PMK
• Re-auth reduced to 4-way handshake to establish transient keys PTK/GTK (Pairwise/Group
Transient Key)
• PMK caching always stored in client context even when OK disabled
• 802.11r / Fast BSS Transition (FT)
• Initial handshake for PTK/GTK with the new AP is done before the client roams to the target AP
• New capability in the 802.11 authentication request
• FT protocol modes
• Over-the-Air FT Roaming
• Over-the-DS (Distribution System) FT Roaming
• Eliminates much of the handshaking overhead while roaming, thus reducing the handoff times
• FT PMK R01/R01 only cached when 802.11r enabled
STICKY CLIENT AVOIDANCE
STICKY CLIENT AVOIDANCE
• Goal: Optimize client distribution among APs
• In case of user roaming, suggest to the client to best new Access Point,
based on availability and RSSI.
No overlap
Overlap
KO OK
No Radio overlap, no Roaming Radio overlap, Roaming available
NEIGHBOR AP
• The Roaming RSSI Threshold controls the signal strength a client needs to see before
searching for another site.
• If the RSSI threshold is too low, the client remains on a low signal strength site, even with a
stronger site nearby.
• If the RSSI threshold is too high, the client roams too much that could result to packet loss.
MISCELLANEOUS
• Background scanning
• When a user roams, his real time traffic can be interrupted if the new AP
on which he is connected is using the background scanning.
• No impact on the voice traffic.
• The AP is voice aware and will deactivate the background
scanning when a voice call is detected.
• Other real-time traffic can be impacted.
• Solution:
• Deactivate the Background scanning on the Stellar APs
• Install new Stellar APs in the network,
acting as dedicated scanning Aps
• Please note that this solution requires additional Stellar APs in the network
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNIACCESS STELLAR WIRELESS LAN
L AY E R 3 R O A M I N G & FA S T R O A M I N G
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
• L2 GRE tunnel established between Foreign AP and Home AP at early stage of roaming
• All network enforcement done in the Home AP
• Foreign AP transparently tunnels the client data to the Home AP
• Home AP terminates the tunnel and process the client data locally
• Incoming traffic received & processed by the Home AP, then tunneled to the foreign AP
• One L2 GRE tunnel per SSID
• Any number of Roaming Clients can Use the tunnel
Limit Comment
Client Cache per AP 1K -
L2 GRE tunnel per AP 16 -
Client Cache Removal - During Roaming
L2 GRE tunnel Removal - On last client disconnection
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNIACCESS STELLAR WIRELESS LAN
WIPS
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
LESSON SUMMARY
Upon completion this module,
you will be able to:
Policy Description
Signal Strength Threshold The detected AP signal in dbm is too strong and above the threshold
Default: – 70 dbm ; Range -95 to -50 dbm
Detect Valid SSID The detected AP is advertising a SSID that is configured in OmniVista and set in your WLAN network
(An AP not managed by OV is adverting a SSID set in OV)
Detect Rogue SSID Keyword The detected AP is advertising a SSID name that matches a string set in this policy
(SSID blacklist)
Rogue OUI The detected AP has a OUI that matches one of the OUI set in this policy
• Enabled by default
• AP attack Detection Policy
• The scanning Stellar AP is detecting a wireless attack that seems to be originated from an AP
• Client Attack Detection Policy
• The scanning Stellar AP is detecting a wireless attack that seems to be originated from a client
• Limitations
• The attacker source MAC can be anything (an AP mac, a BSSID mac, a wireless NIC card mac..)
• Blacklisting the attacker source MAC is only relevant when the source MAC is an actual wireless client
WIPS MONITORING
• Top N Attacks
• Displays a list of attacks from foreign APs and Clients
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNIACCESS STELLAR WIRELESS LAN
O M N I V I S TA C I R R U S
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
LESSON SUMMARY
Upon completion this module,
you will be able to:
OmniVista Cirrus
Monitoring,…
• Limit per OmniVista instance:
OmniAccess® Stellar
• Up to 5000 devices
• Up to 4000 APs
SUBSCRIPTION MODEL
Freemium Premium
LAN Core
OS6900
Premium
Restarting Activation Process
Device
Product
Software
OS6560, OS6860, OS6860E,
AOS 8.4.1.R03 +
• Freemium or Premium account created OS6865, OS6900
AOS 6.7.2.R03 + OS6350, OS6450
AOS 5.1R1 + OS2260, OS2360
1
2
SETTING PRE-PROVISIONING PARAMETERS
Stellar AP
REGISTRATION PROCESS
Managed devices
Registered
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNIACCESS STELLAR WIRELESS LAN
O P E R AT I O N A N D M A I N T E N A N C E
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
LESSON SUMMARY
Upon completion this module,
you will be able to:
ONLINE/OFFLINE LOG
MONITORING - APS
• APs Monitoring
• AP details
• Name, AP Group, MAC address
• Client count
• IP configuration
• Radio details
MONITORING – GUEST AND BYOD DEVICES
• Reboot
• Save to Running
• Backup Device
• View AP Logs
MAINTENANCE – RESOURCE MANAGER
• Backup / Restore
• Backup
• Full
• Config
• Image
• Restore
IMAGE UPGRADE
OMNIVISTA 2500
• Can be : CLIENT PC
• Executed immediatly
• Scheduled
MAINTENANCE – WEB INTERFACE
• Step 2 – Stellar AP
• Log in on the Stellar AP • Start/Stop the capture
• In RF Environment, select the Radio to capture
• Step 3 – PC/laptop
• Open the file on Wireshark
CLIENT BEHAVIOR TRACKING
PROCEDURE
MONITORING – CLIENT BEHAVIOR TRACKING HOW TO
• In Unified Access →
Unified Profile →
Template →Access Role
Profile
• Enable/Disable "Client
Session Logging" per
Access Role Profile
• Choose "HTTP/HTTPS",
AP will log client
HTTP/HTTPS
connections. Choose
"ALL", AP will log client
all TCP/UDP
connections including
HTTP/HTTPS connection
MONITORING – CLIENT BEHAVIOR TRACKING HOW TO
◼ In Network → AP
Registration → AP Group
⚫ Control per AP Group →
Client Behavior
Tracking – Upload to
MONITORING – CLIENT BEHAVIOR TRACKING HOW TO
• In Unified Access →
Unified Profile → Template
→Access Role Profile
• Enable/Disable "Client
Session Logging" per
Access Role Profile
• Choose "HTTP/HTTPS",
AP will log client
HTTP/HTTPS
connections. Choose
"ALL", AP will log client OR
all TCP/UDP connections
including HTTP/HTTPS
connection
◼ In Network → AP
Registration → AP
Group
⚫ Control per AP
Group → Client
Behavior Tracking –
Upload to
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniAccess Stellar WLAN
Backup, Restore & Upgrade
Objective
✓ Backup & Restore and Upgrade the Network Devices
Contents
1 Briefing ......................................................................................... 2
2 Saving the Current Configuration ........................................................... 3
2.1. From the Notification Area........................................................................ 3
3 Backing Up the Devices Configuration ..................................................... 4
3.1.1. Backing Up AOS OmniSwitches............................................................................ 4
3.1.2. Backing Up Stellar APs Devices ........................................................................... 5
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
1
Backup, Restore & Upgrade
1 Briefing
At this stage of the training, we have a fully operational infrastructure with the devices deployed, SSID
broadcasted, and QoS & ACLs setup. In this lab, we will learn how to backup and restore the devices
configuration.
CURRENT
TOPOLOGY
END OF LAB
TOPOLOGY
3
Backup, Restore & Upgrade
Save all the management done during this training as Running configuration
> Click on the bell icon on the top right and corner
> Click on the floppy icon Save All
> Click on OK to confirm
Check that the operation has been successfully completed. Then click on Finish
1. Backup Method
> Select Backup By Devices
> Click on Next
2. Device Selection
> Click on ADD > Use Switch Picker
> Click on Add All to add all the OmniSwitches
> Click on OK
> Click on Add FTP Authentication
> Username: admin
> Password: switch
> Check Apply FTP Authentication for all missed devices
> Click on Apply
> Click on Close
> Click on Next
3. Configuration
> Backup Type: Configuration Only
> Click on Next
4. Review
> Review the information, then click on Backup to launch the backup process
Check that the 3 lines “SUCCESS” appear in the Result screen. Click on OK.
1. Backup Method
> Select Backup By AP Groups
> Click on Next
2. AP Group Selection
> Click on ADD
> Select the APGX (X = R-Lab Number), then click on Add >
> Click on OK
3. Configuration
> Backup Type: Configuration Only
> Click on Next
4. Review
> Review the information, then click on Backup to launch the backup process
Check that the 2 lines “SUCCESS” appear in the Result screen. Click on OK.
4.1.1. Briefing
In this part, we are going to:
- Create VLANs 70 to 80 on the OmniSwitch OS6860
- Restore the backup
- Check that the VLANs 70 to 80 have been removed
1. Devices Selection
> VLAN IDs: 70-80
> VLAN(s) Description: TEMP-VLANS
> Click on the Add/Remove Devices
> Select the Add the OS6860
> Click on OK
> Click on Next
2. VLAN Configuration
> Check that Admin Status = Enabled
> Click on Next
5. Review
> Review the information
> Click on Create
Tips
You can check that the VLANs have been created by connecting on the OS6860 CLI console, or via the CLI
Scripting.
1. File Selection
> Click on OmniSwitch 6860
7
Backup, Restore & Upgrade
Check that the restore is successful in the Result page, then click OK
As you may have guessed, the configuration files are transferred in the WORKING and CERTIFIED folders
but are NOT applied on the RUNNING configuration (could cause major problems in real cases scenarios if
it was the case).
To force the configuration restored in the WORKING directory to be used by the OmniSwitch, launch the
following command (via the console, or the OV 2500 CLI SCRIPTING application):
Wait for the OmniSwitch to reboot (~3 min), then use the VLAN Manager application to check that the
VLANs 70-80 have been correctly removed:
5 Debriefing
During this lab, we have learned how to backup the configuration of each device (AOS or Stellar) available in
the network. We have also learned that it is possible to schedule the backup operation, and that the restore
operation can be done only on AOS Devices (not on Stellar APs).
9
Backup, Restore & Upgrade
-ANNEXES-
The list of uploaded firmware is displayed in the Upgrade Image main page:
2. Devices Selection
> In case of AP upgrade
> To install a firmware only on specific AP(s): Click on ADD > Use Switch Picker
> To install a firmware on all the APs of an AP Group: Click on ADD
> In case of OmniSwitch upgrade
> Select one or several OmniSwitch(es)
3. Software Installation
> Review the information, then click on Install Software
10
Backup, Restore & Upgrade
> Go to System
> Select Image File (or Image File URL if the Image File/Firmware is located on a web server)
> Click on Browse, then select the firmware/image file
OmniAccess Stellar WLAN
Monitoring the Network Infrastructure
Objective
✓ Monitor the Network Devices from the OmniVista 2500
Contents
1 Briefing ......................................................................................... 1
2 Checking the Topology & Devices Status .................................................. 2
2.1. Saving the Configuration .......................................................................... 3
2.2. Monitoring the Devices & Links Status ........................................................... 4
2.2.1. Device Information ......................................................................................... 4
2.2.2. Device Status................................................................................................ 4
2.2.3. Notification Status ......................................................................................... 5
2.2.4. Links Status.................................................................................................. 5
4 Debriefing .................................................................................... 10
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
1
Monitoring the Network Infrastructure
1 Briefing
Let’s see how to monitor all the network devices from one platform, the OmniVista 2500. 2 applications will
be used:
- The Topology Application which provides a view of all discovered devices in the network;
- The Notification Application which displays the notification generated by the network devices.
O O
CURRENT
TOPOLOGY
O
OV
O O
END OF LAB
TOPOLOGY O
OV
O O O O
2
Monitoring the Network Infrastructure
The network topology containing all the previously discovered devices is displayed:
3
Monitoring the Network Infrastructure
Save all the management done during this training as Running configuration
Notes
It is also possible to save the management of each device (one by one):
OMNISWITCH
> Click on the OmniSwitch
> Click on Actions > Device
> Click on Copy Working/Running to Certified
> Check that the save process has been completed successfully
> Click on Finish
Notes
If the links between the Omni witches and the tellar ccess oints don’t appear in the
diagram, manually poll the links:
Display the MAC Address, version and device model of the OmniSwitch 6360.
To display detailed device information, click on the device. A Detail panel appears on the right. A list of
information is displayed. The information displayed may vary depending on the device:
- Discover why the OmniSwitch are in Warning state, and solve the problem;
- Display the OmniSwitches & Access Points notifications
- Check that the links are ups, and that the correct ports are used;
Device status is displayed by the device status circle around the device:
• Green = Up (Device is up)
• Orange = Warning (indicates that traps have been received on the device. The highest level of
trap received by the device is displayed (Green, Orange, Red) in the Notifications Status).
• Red = Down (Device is down)
otice that your Omni witches are in the Orange “ arning” state, meaning that a notification has been
generated on these devices. The Notification Status part (next part) shows how to acknowledge the(se)
notification(s).
5
Monitoring the Network Infrastructure
To clear/acknowledge the notification and pass the Device & Notification status to Green status:
OMNISWITCH
> Click on the OmniSwitch (ex: 6360)
> Click on Actions > Notifications > View Traps
> Select the first checkbox to select all the lines
> Click on ACK (blue button) to acknowledge the notifications or CLEAR (red button) to delete the
notifications from the database
You may have to repeat the operation to acknowledge/clear all the notifications. A maximum of 1000
notifications can be acknowledged/cleared at the same time.
In order to clear all the notifications, you could use the following procedure:
OMNISWITCH
> Click on the OmniSwitch
> Click on Actions > Notifications > View Traps
> On the top right corner, click the button Actions
> Click Ack All to acknowledge the notifications and click OK to validate.
You can then click Clear All to delete all the notifications from the database
To display link information, move the mouse over the link until the pointer turns into a finger. Link
information will be displayed in table form as shown below:
Tips
Several shortcuts to the other OmniVista 2500
applications are available when a device (OmniSwitch,
Access Point) is selected or by right clicking on a device.
We will discover these applications and learn
how to use them in the next labs.
7
Monitoring the Network Infrastructure
The Notifications Home Screen displays all traps received from network devices and provides basic trap
information (e.g., severity level, date/time received). You can also use this screen to acknowledge,
renounce, and clear traps, as well as poll devices for traps.
In the result, the reboot operations done during this training should be displayed.
8
Monitoring the Network Infrastructure
1. Agent
> Agent Type: AP Group
> AP Group Selection: APGX (X=Remote-Lab Number)
> Click on Next
2. Trap Type
> Traps which match these severities: Critical
> Click on Next
3. Response
> Action: Send an e-mail
> E-mail To: [email protected] (X = R-Lab Number)
> Click on Next
For example, you can use the following fields and variables:
- E-mail Subject: Warning! Critical Trap Received on $TrapAgent$ ($TrapAgentName$)!
Check that a notification has been generated by the AP and sent to the OmniVista 2500:
> In the Action panel (on the right), click on Actions > Notification > View Traps
Now, check that a mail has been send to [email protected] (wait a few minutes if needed, as the
mail server doesn’t send mails in real time :
10
Monitoring the Network Infrastructure
4 Debriefing
In this lab, we saw that the OmniVista 2500 provides powerful application to monitor the network devices
(OmniSwitches/Access Points).
O O
OV
O O O O
OMNIACCESS STELLAR WIRELESS LAN
H E AT M A P & F L O O R P L A N
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
LESSON SUMMARY
Upon completion this module,
you will be able to:
• Heat Map
• Visual Heat Map of Deployed AP
• Floor Plan
• Visual Heat Map of Estimated Aps before Deployment
HEAT MAP – USE CASE
Custom
obstacle
Manual AP
deployment
HEAT MAP
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniAccess Stellar WLAN
Configuring Heat Map & Floor Plan
Objective
✓ Learn how to create and configure a Heat Map and a Floor Plan
Contents
1 Configuring a Heat Map ...................................................................... 1
1.1. Creating the Building Hierarchy .................................................................. 1
1.2. Configuring the Plan Map .......................................................................... 1
1.2.1. Scaling the Plan ............................................................................................. 1
1.2.2. Laying Down the Obstacles ................................................................................ 2
1.2.3. Placing the Access Points .................................................................................. 2
1.2.4. Displaying the Result ....................................................................................... 3
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by AL
1
Configuring Heat Map & Floor Plan
Campus
> Click on the + button
> Campus Name: My_Campus
> Double click on the My_Campus that is now displayed
Building
> Click on the + button
> Building Name: My_Building
> Double click on the My_Building that is now displayed
Floor
> Click on the + button
> Floor Name: First_Floor
> Floor Number: 1
> File Name: click on Select File > Select the Office-Plan.jpg file in the C:\Resources folder
> Click on OK
> Double click on the First_Floor that is now displayed to access the Floor map
Tips
Pre-defined obstacles can be selected by clicking on the button and each one with a different absorption
coefficient (dB).
It is also possible to create custom obstacles via the Operation > Obstacle Manage link.
Notes
Go back to Edit Floor Map and place the APs in different places to cover the cold areas.
Changing the APs on the map will simulate the new Wi-Fi coverage based on the real
band and power of emission of the APs.
With Floor Plan, the admin can import a map into a floor plan, scale it and perform the AP auto Deployment.
Tips
Pre-defined obstacles can be selected by clicking on the button and each one with a different absorption
coefficient (dB).
It is also possible to create custom obstacles via the Operation > Obstacle Manage link.
Tips
The result will vary based on the following parameters:
- Scale of the map
- Number and type of obstacles placed
- AP Model
- Quality (General, Good, Excellent)
Change some of these parameters (AP Model, Quality…) and click on Save the Layout.
Notes
In Edit Floor Plan, APs can be added manually on the map to fill the cold areas. After clicking on
“Save The Layout”, the Floor Plan application will process and display the Wi-Fi coverage based on
all the APs located on the map.
OMNIACCESS STELLAR
WIRELESS LAN
WIFI SURVEY
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
LESSON SUMMARY
Upon completion this module,
you will be able to:
• Wifi Survey
- At the end of this module you will be able to:
Understand the multiple types of site survey
Understand and identify the causes of Wifi signal issues
Troubleshoot based on the site survey result
Learn how to perform and analyze a passive site survey with
Ekahau mapper
WIFI SITE SURVEY
• Goal:
• Analyze Radio Frequency (RF) environment
• Identify Radio Frequency (RF) interferences
• Find optimum locations for Access Points
Industry Healthcare
(Factory, Warehouse) (Hospital, Clinic)
Shelves, machine tools Walls, RF interferences
WIFI SIGNAL ISSUES - CAUSES
Concrete
pillar
Dead
zone
Add a new AP Concrete wall
Placement of AP in front of obstructing object Place an AP on both side of the obstructing wall
WIFI SIGNAL ISSUES - CAUSES • Signal degrades when going
through:
• Concrete (walls)
• Wood (doors)
• Physical obstruction: Environment (multiple walls, materials). • Metal (cabinet, shelves,…)
• Steel (building structure)
• Glass & Mirrors
• Brick (fireplace)
• Distance = 4 meters • Water (liquid: fish tank; vapor:
bathroom)
• 1 to 4 walls crossed
• RSSI = -70dBm
• Not enough for
VoWLAN
Ekahau Site Survey on Windows
WIFI SIGNAL ISSUES - CAUSES
Directional Omnidirectional
antenna antenna
20 meters
No
Small
Area covered
Area covered
Obstacles
Access Points
ON-SITE TROUBLESHOOTING
Stellar AP1221
1 As originally planned
Obstructed
areas
No coverage Move AP to
Default transmit power (17dBm)
AP missing 4 Increase for best coverage optimize RF 5
coverage
3
ON-SITE TROUBLESHOOTING
• Use Case:
• Modify transmit power
of an AP
• Add a new Stellar AP
• Move a Stellar AP
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNIACCESS STELLAR
WIRELESS LAN
WIFI BRIDGE & WIFI MESH
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
LESSON SUMMARY
Upon completion this module,
you will be able to:
PROPERTIES PROPERTIES
• VLANs can be used to separate & secure traffic over the • VLANs can be used to separate & secure traffic coming
bridge* from Wi-FI clients connected on different SSID.
• Cannot provide service (WiFi) to WiFi clients • Can provide service (WiFi) to WiFi clients
WIFI BRIDGE
* AP1101, AP1201 & AP1201H are not compatible with VLAN tagging over a bridge.
WIFI BRIDGE - ATTRIBUTES
• SSID
• WLAN used to setup wireless bridge connection
• Must be the same on both APs
WIFI BRIDGE
• Band
• Wireless bridge working frequency
• Must be the same on both APs
• Is Root
• Specify the root AP of the wireless bridge
SSID: STELLAR-BRIDGE SSID: STELLAR-BRIDGE
• 1 AP doit être définie comme Root BAND: 5 GHZ BAND: 5 GHZ
IS ROOT: YES IS ROOT: NO
PASSPHRASE: ALCATEL123! PASSPHRASE: ALCATEL123!
• Passphrase
• Password of the WLAN
• Must be the same on both APs
• Band
• Wireless Mesh working frequency
• Must be the same on both APs
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNIACCESS STELLAR
WIRELESS LAN
REMOTE ACCESS POINT (RAP)
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
CORPORATE SSID
CORPORATE SSID
CORPORATE
INTERNET
NETWORK
USER ROUTER
FIREWALL
STELLAR AP (RAP)
PREMIUM FREEMIUM
CLOUD CLOUD
COMPANY HQ
STELLAR AP
(RAP)
BRANCH/HOME OFFICE
[PRE] – SETTINGS TO BE ENTERED BY THE ADMINISTRATOR
SETTINGS (OV CIRRUS)
• STELLAR AP MAC@ • VPN CLIENT IP@
[PRE] – Settings to be Entered by the Administrator PREMIUM • VPN SERVER PUB. IP@ • AP SETTINGS
OMNIVISTA
1 – Stellar Access Point Startup & Registration CIRRUS
CLOUD
2 – Configuration Settings Retrieval
COMPANY HQ
BRANCH/HOME OFFICE
1 – STELLAR ACCESS POINT STARTUP & REGISTRATION
SETTINGS (OV CIRRUS)
[PRE] – Settings to be Entered by the Administrator • STELLAR AP MAC@
PREMIUM
1 – Stellar Access Point Startup & Registration OMNIVISTA
CIRRUS
• The Stellar AP starts up
• The Stellar AP automatically tries to reach the CLOUD
OmniVista Cirrus
• The OmniVista Cirrus identify the Stellar AP by its MAC
address.
STELLAR AP
(RAP)
BRANCH/HOME OFFICE
2 – CONFIGURATION SETTINGS RETRIEVAL
[PRE] – Settings to be Entered by the Administrator SETTINGS (OV CIRRUS)
• STELLAR AP MAC@ • VPN CLIENT IP@
PREMIUM • VPN SERVER PUB. IP@ • AP SETTINGS
1 – Stellar Access Point Startup & Registration
OMNIVISTA
CIRRUS
2 – Configuration Settings Retrieval
CLOUD
• The Stellar AP connects to the OmniVista Cirrus
• The OmniVista Cirrus sends to the Stellar AP:
• VPN Server public IP Address
• IP Address (VPN Client) • IP@ (CLIENT VPN)
• AP Settings (SSID(s) to broadcast , radiofrequency • VPN SERVER PUBLIC IP@
INTERNET
settings…) • AP CONFIG. SETTINGS ALE VPN
SERVER
4 – Client Connection
VPN TUNNEL
OMNIVISTA
CORPORATE
2 – Configuration Settings Retrieval CIRRUS
NETWORK
CLOUD
3 - VPN Tunnel (Client Traffic) Establishment
4 – Client Connection
VPN TUNNEL
COMPANY HQ
STELLAR AP
(RAP)
BRANCH/HOME OFFICE
[PRE] – SETTINGS TO BE ENTERED BY THE ADMINISTRATOR
[PRE] – Settings to be Entered by the Administrator SETTINGS (OV CIRRUS)
• STELLAR AP MAC@ • VPN SERVER PUB. IP@
FREEMIUM • MODE > RAP • OV 2500 SERVER IP@
1 – Stellar Access Point Startup & Registration
OMNIVISTA • VPN CLIENT IP@
CIRRUS
2 – VPN & OmniVista 2500 Settings Retrieval
CLOUD
3 - VPN Tunnel (Management Traffic) Establishment
COMPANY HQ
COMPANY HQ
4 – Configuration Settings Retrieval • MAC ADDRESS
STELLAR AP
(RAP)
BRANCH/HOME OFFICE
2 – VPN & OMNIVISTA 2500 SETTINGS RETRIEVAL
[PRE] – Settings to be Entered by the Administrator SETTINGS (OV CIRRUS)
• STELLAR AP MAC@ • VPN SERVER PUB. IP@
FREEMIUM • MODE > RAP • OV 2500 SERVER IP@
1 – Stellar Access Point Startup & Registration
OMNIVISTA • VPN CLIENT IP@
CIRRUS
2 – VPN & OmniVista 2500 Settings Retrieval
CLOUD
• The Stellar AP connects to the OmniVista Cirrus
• The OmniVista Cirrus sends to the Stellar AP:
• Mode (RAP)
• IP Address (Client VPN) • Mode = RAP
• VPN Server public IP Address • IP@ (VPN Client)
INTERNET
• OmniVista 2500 NMS Server IP Address • VPN Server pub. IP@ ALE VPN OMNIVISTA
• IP@ OV 2500 SERVER 2500
3 - VPN Tunnel (Management Traffic) Establishment
COMPANY HQ
4 – Configuration Settings Retrieval
FREEMIUM
1 – Stellar Access Point Startup & Registration
OMNIVISTA
CIRRUS
2 – VPN & OmniVista 2500 Settings Retrieval
CLOUD
3 - VPN Tunnel (Management Traffic) Establishment
COMPANY HQ
5 – VPN Tunnel (Clients Traffic) & Client Connection
VPN TUNNEL
FREEMIUM
1 – Stellar Access Point Startup & Registration
OMNIVISTA
CIRRUS SETTINGS (OV 2500)
2 – VPN & OmniVista 2500 Settings Retrieval
• AP SETTINGS
CLOUD
3 - VPN Tunnel (Management Traffic) Establishment
OMNIVISTA
CORPORATE
2 – VPN & OmniVista 2500 Settings Retrieval CIRRUS
NETWORK
CLOUD
3 - VPN Tunnel (Management Traffic) Establishment
INTERNET
5 – VPN Tunnel (Clients Traffic) & Client Connection ALE VPN OMNIVISTA
SERVER 2500
• 2nd VPN tunnel is established (clients data traffic)
• Client on remote site COMPANY HQ
• Connects to the Clients SSID
• Access to the corporate network
• Client data traffic > VPN Tunnel
EMPLOYEE STELLAR AP
CORPORATE SSID
(RAP)
BRANCH/HOME OFFICE
USE CASE > RAP & REMOTE WORKING
EMPLOYEES SSID
EMPLOYEES SSID
CORPORATE
INTERNET
NETWORK
EMPLOYEES VLAN
LAB VLAN
VLAN tagging
Local Breakout
CONFIGURATION STEPS
CONFIGURATION STEPS – OMNIVISTA CIRRUS (PREMIUM
ACCOUNT)
1 – Configuring the OmniVista Cirrus
PREMIUM
• Declaring the Remote AP (Serial Nb / MAC@)
• Configuring the VPN settings (VPN > clients traffic) OMNIVISTA
• Public IP@ / Port CIRRUS
• VPN Server IP@
• IP@ / IP@ range of VPN clients CLOUD
• Exporting the VPN settings (VPN > clients traffic)
• Configuring the AP settings
• SSID(s) to broadcast
• Radio frequency settings
• … INTERNET
ALE VPN
SERVER
2 – Deploying & Configuring the "VPN Server" VM
COMPANY HQ
• Deploying the « VPN Server » VM (provided by ALE)
• Configuring the network interfaces
• Interface 1 (ex. eth0) > public IP@
• Importing the VPN settings
• Interface 2 (ex. eth1) > VPN « clients traffic »
STELLAR AP
> Connecting the
(RAP)
Remote AP
BRANCH/HOME OFFICE
CONFIGURATION STEPS – OMNIVISTA CIRRUS (FREEMIUM
ACCOUNT) & OMNIVISTA 2500
1 – Configuring the OmniVista Cirrus
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniVista 2500 NMS Release 4
Internet of Things
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
Lesson Summary
IoT Inventory
End Point MAC / IP
Endpoints
Local Cache
DATA PROFILING
OmniSwitch COLLECTION API
OmniVista 2500/Cirrus
UNP Device Profile
ENFORCEMENT Endpoint IoT Phase 1
Services
Stellar AP Inventory
Device Category
IoT can also be used to enable/disable and monitor Zigbee devices. OmniVista interfaces with a
Zigbee Server and Stellar APs to provide Zigbee device support.
IoT Category
• Displays information about device categories
• OmniVista monitors network packets to determine the types of devices connected to the
network and categorizes them based on the list of categories.
• Default categories cannot be modified, but custom categories can be added
IoT Enforcement
Configures category-based device authentication
• By associating a Category with an Access Role Profile
• You can also specify exceptions for specific devices by SSID, MAC address, AP Group, or IP address.
When a device matching one of these exceptions is categorized, it will not be subject to IoT
enforcement.
OmniAccess Stellar
Wireless LAN
OmniVista 2500 NMS &
OmniAccess Stellar WLAN
Conclusion
1
Course Objectives Review
During this course, you have learned how to:
• Install & Configure the OmniVista 2500 NMS Server
• Deploy & Configure Stellar APs in Enterprise Mode
• Configure SSIDs for different type of Users, using
different Authentication Methods
• Understand & Configure Additional Features
(Mobility & Roaming, WIPS)
2
Agenda
DAY 1 DAY 3
OmniVista 2500 > Overview + Installation OmniVista 2500 > Heat Map & Floor Plan
L2 & L3 Roaming
WIPS
ALE Knowledge Hub Alcatel-Lucent Enterprise (ALE) Training Platform « Knowledge Hub »
OmniSwitch Switches Datasheets Technical Datasheets for each ALE OmniSwitch switch
OmniAccess Stellar Datasheets Technical Datasheets for each ALE OmniAccess Stellar access point
NMS Solutions Datasheets Technical Datasheets for each ALE OmniVista solution
Evaluation links are available to you as of the last day of the session and can therefore be filled in
at the end of the session before leaving the classroom or virtual class.
Two main situations have to be considered to access to the course evaluation, and this depends
on the Knowledge Hub session status (while still being in “In progress”, and as of it has switched
to “Completed”).
The status switches usually the next Monday after the session has ended.
5
Reach the session evaluation
•if “Evaluate” is not proposed, click on “Open Curriculum” and after, on “Evaluate”
6
Thank You
7
OmniSwitch LAN R8
OmniVista 2500 NMS R4
Administrative Users and Groups
How to
✓ Create user accounts and manage the read-write capabilities for certain
users.
Contents
1 The Users and Groups Application .......................................................... 2
2 Summary ........................................................................................ 6
3 Lab Check ...................................................................................... 6
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Administrative Users and Groups
Implementation
This lab provides the instructions to set up security using OmniVista. You will create Users and Groups to
determine access privileges within OmniVista.
- Provide the new group with the name Training and give it a description.
- Check on the Group Rights and choose Read to provide read-only access.
- Users could be added at this point, but we’ll create a new user.
- Click Create when done to save the new group.
- Enter the new user training_user with a password of training_user1 and make it part of the Training
group.
- As you are typing the password you can check the password strength button going from Risky – Weak –
Fair – OK. This provides an indication of the security of the password.
- Log out and log back in from Omnivista using the account you have just created and try to perform
various tasks. Notice that you are limited to view information, but you are not allowed to modify the
configuration.
2 Summary
OmniVista provides the capability to limit the rights of users logged into the OmniVista server. This
feature can be used to provide read-only access or even to prevent certain users from seeing all of the
discovered devices.
3 Lab Check
1. What are the default accounts and what privileges do each of them have?
..............................................................................................................
..............................................................................................................
2. OmniVista can be configured to allow users to only make modifications on edge devices. T/F
..............................................................................................................
..............................................................................................................
3. What was different about the OmniVista interface when you logged in with an account having
read-only privileges?
..............................................................................................................
OmniSwitch LAN R8
OmniVista 2500 NMS R4
Control Panel
How to
✓ View services currently running on OmniVista
View Asset Management History
Shut Down server processes on OmniVista.
Contents
1 Control Panel .................................................................................. 2
1.1. Watchdog Service .................................................................................. 2
2 Summary ........................................................................................ 3
2
Control Panel
Implementation
1 Control Panel
This lab will provide the steps required to view services and shutdown the OmniVista server.
- You can start/stop all services or shutdown OmniVista using the buttons at the top of the screen:
(Do not modify or stop any process unless directed by your instructor!)
2 Summary
The OmniVista Control Panel can be used to start and stop services and the OmniVista server.
OmniSwitch LAN R8
OmniVista 2500 NMS R4
Preference
How to
✓ Manage the default settings of OmniVista Web GUI
Contents
1 Preference ..................................................................................... 2
1.1. User Settings ........................................................................................ 2
1.2. System Settings ..................................................................................... 3
2 Summary ........................................................................................ 3
3 Lab Check ...................................................................................... 3
2
Preference
Implementation
1 Preference
This lab will provide the instructions for making OmniVista Web GUI modifications using Preferences.
- Make sure the LAN+WLAN menu is selected.
- Select Administration -> Preferences.
Continue exploring the various options that can be configured using Preferences.
2 Summary
Preferences allows an administrator to change the default behavior of the OmniVista Web GUI and
change the look and feel of OmniVista.
3 Lab Check
1. What are the two different areas that can be modified using Preferences.
..............................................................................................................
..............................................................................................................
..............................................................................................................
OmniVista 2500 NMS release 4
Analytics
Lesson Summary
◼ BYOD Trend
⚫ User mobility and the need to have the same type of access on any device
◼ Bottlenecks can affect the network and disappear before the source of the
problem is even identified
◼ Network Planning is required
⚫ From Real-time to Long-term needs
Analytics Application
Overview
• Reports.
Provides a comprehensive view of network resource utilization.
Two types of reports:
- "Visibility" Reports can be configured to show network utilization over
different time periods.
- "Availability" Reports provide a "real-time" view of all discovered
network switches.
• Profiles.
Used to create Analytics Profiles. To generate an Analytics Report for
any of the "Visibility“ Reports, you must first create an Analytics Profile
that defines the switches/ports that you want to view and the type of
information that you want to view on those switches/ports.
Analytics
Overview
• Summary View
Displays basic information on all supported network devices,
including any Analytics Profiles defined for a device.
• Applications Management
When generating a Top N Applications Report, the Analytics
application uses port numbers to identify application traffic. This
screen is used to create port/application mappings to identify
applications traffic.
• Anomalies
Displays any port utilization anomalies. An anomaly is an utilization
data point that fall outside of expected norms based on past usage.
Reports
Reports
Types
◼ Top N Applications
⚫ Displays information about the top applications being accessed on the network,
including which users are using an application, and which switches have the most
traffic for an application.
◼ Top N Clients
⚫ Displays information for the Top Network Users including the number of traffic flows
for each user.
Reports
Types
◼ Network Health
⚫ Displays information for the top devices on the network in terms of the device's
resource usage. Devices are ranked based on the device's CPU usage, memory usage,
and temperature.
◼ Network Availability
⚫ Displays the current operational state of network devices (Up/Warning/Down).
◼ Alarms
⚫ Displays network alarms by severity level.
Reports
Measurements & OPERATIONS
Ports
Widgets &
Source IP
Graphical
Top N Users Sflow sampling address/ Sflow Reporting
sampling OV412.R02
Top N Switches/ “Index” derived
Value /gravity
Resources from CPU, Mem
scale
Utilization use, Temp
Availability
Store analytical
data
◼ Right-click on a section of the Pie Chart and select the appropriate option.
Switches
Top N Applications
Detail View
◼ Provides a detailed view of the specified time interval.
⚫ For example, if a report displays data for the last 24 hours, the Summary View will
display a summary of the data for the last 24 hours; and the Detail View will then
display data for each hour within those 24 hours.
Top N Applications
Trending information
◼ When in the Detail View, you can click on a bar in the chart to view usage
trends for each application for the selected time interval by "drilling down" on
a data set to see a subset of that data.
⚫ The trend for an hour would be displayed in 15-minute increments.
Top N Clients
Summary View
◼ Displays information for the top network clients including the number of traffic
flows for each client.
◼ OmniVista uses the source IP address in the sFlow packet to determine the
client.
⚫ Each client is displayed as a percentage of the total for the configured time interval
(e.g., last 24 hours).
List View
Pie Chart
Top N Clients
Detail View and Trending information
◼ Detail view provides a detailed view of ◼ In the Detail View, you can click on a bar
the specified time interval in the chart to view usage trends for
⚫ If a report displays data for the last 24 each client for the selected time interval
hours, the Detail View will display data for ⚫ Displayed in 15 minute increments.
each hour within those 24 hours.
◼ Click on a data point in the trending
◼ Information is displayed in a bar chart view for more detailed information.
view
Network Health
◼ Displays information for the top switches on the network in terms of the
switch's resource usage.
⚫ Based on switch's CPU usage, memory usage, and temperature.
Top N Ports
Summary View
◼ Displays the top network ports based on utilization.
⚫ Displayed as a percentage of the total utilization for all monitored ports.
◼ In this view, switches/ports are displayed in a list view from highest to lowest
utilization for the configured time period (e.g., day, week).
Top N Ports
Detail View
◼ Depending on the number of ports you configured for display (e.g., top 10
ports, top 15 ports), any monitored ports that qualify during the configured
time interval (e.g., last 24 hours) are displayed.
◼ Ports are simply stacked numerically in each bar by IP address and port number
(the order is not based on utilization).
Top N Ports
Trending View
◼ Used to view predicted future port utilization based on past utilization.
⚫ Predictions can provide valuable insight for capacity management.
Current Predicted
Top N Reports
Customization
◼ Click on the Configuration icon in the upper right corner of the screen to
configure how information is displayed in the report.
⚫ Default Devices - By default, all top switches/ports are displayed. However, you can
click on the Select Devices button to display only information from specific switches.
◼ The reported alarms in each severity level are displayed as a percentage of the
total alarms reported.
⚫ Click on a severity level in the pie chart to view the switch(es) from which the alarms
originated, and the number of those alarms received.
Profiles
◼ Displays currently configured Analytics Profiles.
⚫ Used to create, edit, and delete profiles.
◼ The first step in generating analytics information for any of the "Visibility"
Reports (Top N Applications, Top N Clients, Top N Switches, and Top N Ports
Utilization) is to create an Analytics Profile.
◼ A profile consists of the type of information you want to view (Profile Type)
and the switches/ports that you want to analyze.
Create Profile
Profiles
Configuration
◼ Configuration Screen
⚫ Profile Name - User-configured name for the profile.
⚫ Profile Type - Select a Profile Type from the drop-down menu:
Top N Apps & Clients
Top N Ports Utilization
⚫ Sampling Rate (Top N Apps & Clients Only) - Ratio of packets observed at the data
source to the samples generated. For example, a sampling rate of 100 specifies that,
on average, 1 sample will be generated for every 100 packets observed.
Profiles
Configuration
◼ Device/Port Selection Screen
⚫ Add/Remove Switches - From the list of switches, select those you want to analyze.
⚫ Add/Remove Ports - Select a switch and click on the Add/Remove Ports button. From
the list of ports, select the port(s) that you want to analyze.
◼ An existing application ports mapping file (.json file) can be imported into
OmniVista 2500 NMS.
⚫ Note that this new mapping will override the existing mapping.
Anomalies
◼ Displays any anomalies that are discovered in established port utilization
trends.
⚫ The information is displayed in a list that describes the anomaly and its origins (e.g.,
IP address, Port).
◼ Anomaly detection uses Z-Score to check for anomalies in the latest port
utilization data gathered from hourly polling over the past 30 days.
⚫ Z-Score is a statistical measurement of a score's relationship to the mean in a group of
scores.
⚫ It measures utilization for a port for a specific hour to determine its relationship with
utilization for the same hour over the sampling period (30 days).
⚫ A data point that deviates considerably from an established pattern is flagged as an
anomaly and displayed on the Anomalies Screen.
⚫ Z-Score parameters are configured on the Preferences - Analytics Screen.
Anomalies
Create Report
Report
Configuration
◼ A report is created in two steps:
1) In the Report Configuration screen, click on the Create icon and complete the
fields as described below:
⚫ Report Title
⚫ Schedule Settings
Purging Policy – The report will be removed from the server at the selected interval. Select
"None" to never purge the report.
Schedule – "Now” generates the report immediately.
“Periodically” creates the report at specific times/intervals.
- "Simple” schedules the report generation every "x" number of days, hours,
minutes, seconds (e.g., every 5 days, every 5 minutes).
- "Cron” schedules the report generation as a cron job (e.g., every minute,
every hour, every year).
⚫ Other Settings - Optional report parameters (e.g., page size, orientation).
Report
Configuration
Report
Configuration
2) In the Analytics Application, go to the report that you want to include (e.g.
Alarms). In the upper right corner of the screen, click on the Export icon and
select Add to Report.
▪ On the Add to Report Window, select the Report from the Report Configuration drop-
down list and click OK.
▪ You can open different views (e.g., Summary View, Detailed View) and repeat
the procedure to include those views in the report.
Report
List
◼ Displays all generated reports.
◼ To download/view a report in PDF format, select the report and click on the
Download button.
◼ To delete a report(s), select the report(s) and click on the Delete icon , then
click OK at the confirmation prompt.
Application Visibility
Application Visibility
Devices Management
◼ Displays all network switches that support Application Visibility.
⚫ Name, IP address, and operational status of each switch,
⚫ Indicates whether or not an Application Visibility Profile has been assigned to the
switch.
Application Visibility
Signature Files
Application Visibility
Signature Profile Creation
Application Visibility
Signature Profile Creation
◼ Select one of the predefined groups or a custom application group can be
configured
◼ Two different types of groups can be created:
⚫ Monitoring group: Used for the Analytics Reports
⚫ Enforcement group: used for the QoS and Access Role applications
Application Visibility
Signature Profile Assignment
◼ After the profile is created, it has to be assigned to the switches and its ports.
Application Visibility
Displaying Application Reports
◼ In the Analytics screen, select Top N Applications – Advanced to display the
reports
◼ Then, the Policy List is included as part of the Access Role Profile configuration
OMNIVISTA 2500
How-to Setup Application Visibility
Abstract
Quick configuration guide on how to enable Application Monitoring on the OmniSwitch 6860E
and configure Application Visibility and Reporting on OmniVista.
OmniVista 2500
How-to setup Application Visibility
Table of Contents
1 INTRODUCTION 3
2 REFERENCES 3
3 APPLICATION MONITORING 3
3.1 OMNISWITCH 3
3.2 OMNIVISTA 2500 3
3.3 APPLICATION SIGNATURE DATA BASE 3
4 PREREQUISITES 4
4.1 OV 2500 5
4.2 SWITCH 5
6 SWITCH CONFIGURATION 5
7 OV 2500 CONFIGURATION 5
7.1 IMPORT SIGNATURE FILES 5
7.2 CREATE SIGNATURE PROFILE AND ADD SWITCH/PORTS 7
7.3 APPLYING SIGNATURE PROFILE TO DEVICES 11
7.4 ADDING WIDGETS TO DASHBOARD 15
7.5 DISPLAY OUTPUT 16
7.5.1 FLOW DATA COUNT 16
7.5.2 FLOW DATA USAGE STATISTICS 18
7.6 VERIFY CONFIGURATION ON SWITCH 21
7.6.1 SHOW APP-MON CONFIG 21
7.6.2 SHOW APP-MON PORT 21
7.6.3 SHOW APP-MON STATS 22
7.6.4 SHOW APP-MON APP-RECORD 22
7.6.5 SHOW APP-MON FLOW TABLE 24
2 References
1. OmniVista User Guide
2. AOS 8x Network Configuration Guide
3. AOS 8x CLI Reference Guide
3 Application Monitoring
Application Monitoring (app-mon) feature is available on the OS6860E’s. Since app-mon looks deeper into packets
received, it can detect application flows (e.g., YouTube, Netflix, Facebook etc.,).
App-mon has three components to work: a capable OmniSwith, OmniVista 2500 and an application signature data
base.
3.1 OmniSwitch
The OmniSwitch 6860E’s ASIC has Flow Tracker and a co-processor to accomplish app-mon. When a new flow is
received on the switch, a new entry is added to flow tracker (The flow tracker is 8K in size). When a port is enabled
st
for app-mon, the 1 few packets of the flow are trapped and sent to the co-processor. The co-processor runs a
regex pattern matching algorithm on the received packet to see if any patterns match with the application
signatures. When packet’s pattern match with application signatures, they are logged if Monitoring is enabled. If
Enforcement is enabled additional controls in the form of ACL’s can be applied to control the traffic.
Multiple signatures may be needed to detect a particular application. The signatures in OV 2500 are grouped into
individual applications (YouTube, Facebook, twitter etc.,) and application groups (Audio/Video, Game, Peer to Peer,
ERP etc.,). OV 2500 allows for groups to be created based on need. There are 3 constructs in AOS app-mon
• App Pool – This is the set of all signatures (An application may need multiple signatures)
• App Group – Logical group of signatures
o AOS has pre-defined groups
o User can create groups according to need
• Monitoring
• Enforcement
Monitoring counts the number of flows that are detected per application.
§ Enabling enforcement will start collection statistics (traffic counters) for application traffic. For
each flow the amount of bandwidth will be collected (e.g., 30MB for YouTube traffic 5 MB of
Twitter traffic).
§ Enforcement can also be used to apply QOS (ACL) on a per flow basis.
4 Prerequisites
4.2 Switch
1. Time and Date should be set
2. SNMP should be configured for OV 2500 to discover it
3. Switch should be setup to be accessed through OV 2500
4. Advanced Licenses should be applied to the switch(s)
5.1 Hardware
OS6860E-24
5.2 Software
AOS Software Release: 8.2.1.304
OV 25000 Release: 4.2.1.R01 (Build 69)
6 Switch Configuration
Since most of the configuration is done using OV 2500. There is not much to be done on the switch with respect to
app-mon.
The IPV6 Flow management has to be disabled. This has been fixed in future releases.
7 OV 2500 Configuration
The DPI configurations from OV 2500 can be modified at any time based on customer need. Any number of
switches and ports can be added. The configuration applied during runtime will be applied immediately to the
switch (no need for a reboot of the switch). The data collection from OV 2500 relies on the hourly data collected
on the switch. The users might have to wait for an hour to see the display on the Dashboard.
Select Signature Profile on the left side and click on the “+” to create a new profile
Enter the Profile Name any String and the Description and click on Next
Application groups can be searched and selected or “+” sign can be clicked to add the groups to the profile.
For the purposes of this document, we will select the entire list (all application groups).
Select the Ports in the Switch by clicking on Add Port and selecting the ports on that switch
SPB Service statistics have to be disabled for App Mon Statistics to work (since they use the same counters).
This completes the assignment of Signature profiles to switches and enabling of app-mon on port(s) on the
switch(s).
Click on the Widget Icon on the top right corner of the OV 2500 dashboard (main page)
Click on “Add Widget”
This Widget shows the total network bandwidth. This is collected using the hardware statistics (as one part of
enforcement).
This command shows app-records for current hour, hourly and a twenty four hour period. This is what is collected
in OV 2500 and displayed.
google Web
2
twitter Web
1
google_analytics Web
1
gstatic Web
21
hulu Audio/Video
1
instagram Web
4
--------------------------------
Number of Applications: 6
This command provided Flow Table for monitoring/Enforcement. For the purposes of this document we only do
monitoring
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
Lesson Summary
• Timeout (msec) that OmniVista will wait for a switch to respond before
assuming that the request has timed-out (Default = 5,000)
• Auth and Priv Protocol (v3 only) - used for SNMP communications with
the discovered switches (None, MD5, SHA, ...).
• Auth Password (v3 only) - Used for MD5 or SHA authentication protocol
(if applicable).
• Priv Password (v3 only) - Used as secret key (if applicable).
Advanced Services
• Trap Station Name - The device user name that will be used when an AOS device is configured to send
traps to OmniVista.
• Discover Link - Specifies how OmniVista will discover the physical links associated with the discovered
devices.
• Shell Preference - Specifies the default command line interface to be used for discovered devices: Telnet
or SSH
• Use Get Bulk - When enabled, the "Get Bulk" operation is used for retrieving large amounts of data,
particularly from large tables
• Max Repetitions - The number of rows of table data that the "Get Bulk" operation will request in each
"Get Next" operation.
Discover New Devices – IP Ranges
Define address ranges to discover devices
Associate Address Ranges to SNMP Setups
Discovery – Start Discovering
After creating the IP Range, click on the Discover Now button
Discovery – Managed Devices
Displays a list of all network devices that are currently being managed by OmniVista.
There are two tabs.
• "ALL“ displays all managed devices (LAN Devices and APs).
• "OAW“ displays only managed APs.
Discovery – Hardware Inventory
Displays inventory information (e.g., CMM, Chassis, Power Supplies) for any discovered device
Discovery - Links
Displays existing links in the network
• Automatically discovered using AMAP or LLDP
• Links can also be added manually
Discovery – Manual Link
Manual links are persistent and displayed in RED when the link goes down.
Recommended to configure critical links providing better monitoring capabilities.
Useful to create links between ALE devices and external devices.
Discovery - Ports
Displays information about ports on network devices
• Enables/Disables device ports
Discovery – SPB Ports
Displays information about SPB Services Ports on network devices.
• SPB Services are configured on edge devices, so only edge devices are displayed.
Discovery – Third-Party Devices Support
Discovery and support of third-party (non-AOS) devices.
Once third-party devices have been discovered, OV supports the following:
• Web Browser, Telnet or SSH
• Custom MIBs
• Custom Icons
• Traps
• Locator
Discovery – Adding Third-party Device Support
Create Mibset
• OID: Device’s Object ID
• Display Name: Name to be used for the device
• Mib Directory Name: If you want to use MIB-2 level support for third-party devices, enter mib-2. This
generic directory already exists in OV. If you are not using standard MIB-2, enter a directory name.
Discovery – Import MIBs
Imports new or updated MIB files to Omnivista
All MIB files must have an file extension of .mib
If you create a new MIB directory, you must import a complete set of MIBs into that directory.
Select the Mibset to be updated from the drop-down box and click on the Import button
Discovery – Scheduled Upgrades
Allows to upgrade multiple switches at the same time
• Upgrade can be done immediately or scheduled for a later time
Discovery – Scheduled Upgrades
User can set the same or different software version for each device
• Directory in which the new version will be installed can be defined as well
Discovery – Scheduled Upgrades
At the end of the software update, the user can go to the Managed Devices window to review the
result of the action
• Verify that the directory where the installation was made is correct and that the status of the update
is successful
Discovery – NaaS Device Licenses
• A device interacts with a designated License Activation Server to obtain a Device License:
• NaaS. The switch is a licensed device that participates in the NaaS subscription-based model.
• CAPEX. The switch does not participate in the NaaS subscription-based model.
• CAPEX Undecided. The switch has not yet obtained a license
Topology
Topology – Geo Map View
Google Maps for Topology
• Display of Google Maps for geolocating sites
• Zoom-In / Zoom-Out on for displaying Countries / Cities / Sites
• Switch to Topology application for moving to floor plans
• Enter the code for your user account into the TOTP Code Field on the OmniVista Login Screen and
click Verify to log into OmniVista.
CLI Scripting
Create Telnet Scripts
Create Exit & Apply Scripts
• Preconfigured files
• Create scripts in OV or text editor
• Import Scripts
Send Scripts
Select a Script
Select Switches
Schedule and
send the script
View Log
View Script Log
• Success / Error
• Syntax errors
SSH/Telnet
SSH/Telnet to a New Device
Objective
✓ Learn how to setup the different equipment in order to deploy an
OmniAccess Stellar Access Point as Remote Access Point (RAP)
Contents
1 Topology ........................................................................................ 2
2 Configuring the OmniVista Cirrus ........................................................... 2
2.1. Logging into the OmniVista Cirrus ................................................................ 3
2.2. Declaring the OmniAccess Stellar AP as Remote AP Point .................................... 3
2.2.1. Retrieving the Stellar AP Serial Number & MAC Address .............................................. 3
2.2.2. Declaring the Stellar AP in the OmniVista Cirrus ....................................................... 4
2.3. Configuring the VPN Settings ..................................................................... 5
3 Connecting the OmniAccess Stellar Access Point ......................................... 6
4 Importing the VPN Configuration ........................................................... 6
5 Configuring the VPN Server Virtual Appliance ............................................ 7
5.1. Configuring the VPN Server Virtual Appliance Basic Settings ................................ 8
5.2. Configuring the VPN Server Virtual Appliance Settings ....................................... 8
5.2.1. Configuring the Network Interfaces...................................................................... 9
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by AL
1
Remote Access Point (RAP) Deployment – OV Cirrus (Freemium) & OV 2500
1 Topology
During this lab, we will use the following topology:
VPN Server
OMNIVISTA - Public IP@: x.x.x.x (hidden)
CIRRUS - Private IP@: 10.130.5.251
- VPN Server IP@ (vpn_mgmt): 192.168.0.1
- VPN Client IP@ (vpn_mgmt): 192.168.0.2-20
- VPN Server IP@ (vpn_data): 10.7.0.61
FREEMIUM - VPN Client IP@ (vpn_data): 10.7.0.55-60
CLOUD
192.168.1.76 192.168.1.1
ROUTER
AP
OMNIVISTA 2500
VPN SERVER
REMOTE SITE 10.130.5.50
MAIN SITE
OMNIVISTA
CIRRUS
FREEMIUM
CLOUD
ROUTER
AP
OMNIVISTA 2500
VPN SERVER
REMOTE SITE
MAIN SITE
The OmniAccess Stellar Access Point to be deployed as Remote Access Point (RAP) must be first declared in
the OmniVista Cirrus.
3
Remote Access Point (RAP) Deployment – OV Cirrus (Freemium) & OV 2500
The OmniVista Cirrus is a cloud-based network management system. To log into this application, an account
is necessary. 2 types of accounts are available:
- Freemium: free account that provides limited features for an unlimited number of registered devices.
- Paid: full OmniVista Cirrus functionalities for the subscribed number of devices and services for the length
of your contract.
In this lab, we will use a Freemium account. To learn how to create a freemium account, please refer to the
dedicated part available in the add-on section of this lab.
Web Browser
Access to the OmniVista Cirrus https://registration.ovcirrus.com/
webpage
Enter your credentials
(Freemium account)
ROUTER
AP
OMNIVISTA 2500
VPN SETTINGS : VPN SERVER
REMOTE SITE - CLIENT IP@ RANGE: 192.168.0.2 TO .20
- SERVER IP@: 192.168.0.1
MAIN SITE
OMNIVISTA
CIRRUS
FREEMIUM
CLOUD
192.168.1.79 192.168.1.1
ROUTER
AP
REMOTE SITE OMNIVISTA 2500
VPN SERVER
MAIN SITE
Connect the OmniAccess Stellar Access Point that must act as Remote Access Point to Internet. After a few
moments, the OmniAccess Stellar Access Point is seen as registered on the OmniVista Cirrus:
OMNIVISTA
CIRRUS
FREEMIUM
CLOUD
VPN SETTINGS
(.CONF FILE)
ROUTER
AP
OMNIVISTA 2500
VPN SERVER
REMOTE SITE
MAIN SITE
Now that the Remote Access Point has been registered in the OmniVista Cirrus, let’s export the VPN settings.
In the next part (5 - Configuring the VPN Server Virtual Appliance), we will import these VPN settings in order
to configure the VPN server.
7
Remote Access Point (RAP) Deployment – OV Cirrus (Freemium) & OV 2500
Click on Export
Warning
KEEP THE CONF FILE PRECIOUSLY, AS WE WILL NEED TO IMPORT IT IN THE VPN SERVER VIRTUAL APPLIANCE AT
THE END OF THE NEXT PART.
OMNIVISTA
CIRRUS
FREEMIUM
CLOUD
10.130.5.251
PUBLIC IP@
ROUTER
AP
OMNIVISTA 2500
VPN SERVER
REMOTE SITE
MAIN SITE
Tips
To learn how to deploy the ALE “VPN Server” virtual appliance, please refer to the dedicated add-on part
available at the end of this lab.
8
Remote Access Point (RAP) Deployment – OV Cirrus (Freemium) & OV 2500
Web Browser
Enter y to confirm
The virtual machine reboots to take the basic settings into account.
Press Enter
10
Remote Access Point (RAP) Deployment – OV Cirrus (Freemium) & OV 2500
Press Enter
Press Enter
Press Enter
Select ssh
Press Enter
11
Remote Access Point (RAP) Deployment – OV Cirrus (Freemium) & OV 2500
- Now that the SSH/SFTP is enabled, upload the VPN server configuration (.conf file) to the VPN server
VM:
Windows
Click Quickconnect
12
Remote Access Point (RAP) Deployment – OV Cirrus (Freemium) & OV 2500
/opt/OmniVista_2500_NMS/d
ata/vpn_conf/vpn_profile
Press Enter
Select vpn_
Press Enter
Press Enter
IP@: 192.168.0.2
AP IP@: 192.168.0.1
OMNIVISTA 2500
VPN > MGMT TRAFFIC VPN SERVER
REMOTE SITE
MAIN SITE
- Now that the VPN Server configuration is complete, reboot the OmniAccess Stellar Access Point to
reinitialize the VPN connection process.
15
Remote Access Point (RAP) Deployment – OV Cirrus (Freemium) & OV 2500
Select Maintenance…
Press Enter
Press Enter
Notes
In this part, we consider that the OmniVista 2500 NMS Virtual Appliance has already been deployed and that the
initial configuration has already been done (IP address, gateway, password…)
If not done, please refer to the lab dedicated to the installation of the OmniVista 2500 NMS.
ROUTER
AP
OMNIVISTA 2500
VPN SERVER
16
Remote Access Point (RAP) Deployment – OV Cirrus (Freemium) & OV 2500
Web Browser
Select the OV2500 VA, then
Enter y to confirm
7.2. Discovering the Remote Access Point in the OmniVista 2500 NMS
Go to NETWORK > AP
REGISTRATION > Access
Points
ROUTER
AP
OMNIVISTA 2500
VPN SERVER
REMOTE SITE VPN SETTINGS (VPN > CLIENT DATA TRAFFIC):
- CLIENT IP@ RANGE: 10.7.0.55 TO .60
- SERVER IP@: 10.7.0.61 MAIN SITE
Click Apply
19
Remote Access Point (RAP) Deployment – OV Cirrus (Freemium) & OV 2500
Warning
KEEP THE CONF FILE PRECIOUSLY, AS WE WILL NEED TO IMPORT IT IN THE VPN SERVER VIRTUAL APPLIANCE AT
THE END OF THE NEXT PART.
Click Commit
20
Remote Access Point (RAP) Deployment – OV Cirrus (Freemium) & OV 2500
Tips
During this lab, the default AP Group is used. If desired, it is also possible to create an AP Group dedicated for
Remote Access Points and insert in it all the settings that will be sent to these Remote APs.
Notes
This part is designed as a quick reminder, as the Employee SSID creation is viewed in details in a dedicated lab.
Authentication Strategy
> RADIUS Server: UPAMRadiusServer
> Click on Manage Employee Accounts
Default VLAN/Network
VPN SETTINGS
(.CONF FILE)
ROUTER
AP
OMNIVISTA 2500
VPN SERVER
REMOTE SITE
MAIN SITE
- As in one of the previous steps, upload the VPN server configuration (.conf file) to the VPN server VM:
Windows
Open FileZilla Client
- Username: admin
- Password: VPN Server
password (ex. Alcatel.0)
- Port : 22
Click Quickconnect
Transfer the <VPN Server
name>.conf file in the folder
/opt/OmniVista_2500_NMS/d
ata/vpn_conf/vpn_profile
Press Enter
Select vpn_
Press Enter
CLIENTS NETWORK
> VLAN 30
PUBLIC INTERFACE > 10.7.0.X
> X.X.X.X (HIDDEN)
ETH2
ETH0
ETH1 MGMT NETWORK
> VLAN 1305
VPN SERVER > 10.130.5.X
VPN Server
- Public IP@: x.x.x.x (hidden) OMNIVISTA 2500
MAIN SITE - Private IP@: 10.130.5.251
- VPN Server IP@ (vpn_mgmt): 192.168.0.1 10.130.5.50
- VPN Client IP@ (vpn_mgmt): 192.168.0.2-20
- VPN Server IP@ (vpn_data): 10.7.0.61
- VPN Client IP@ (vpn_data): 10.7.0.55-60
Press Enter
Click on Connect
Username: Employee
Password: password
Click on OK
26
Remote Access Point (RAP) Deployment – OV Cirrus (Freemium) & OV 2500
Click on Connect
In our example, the client has received an IP address in the range dedicated to the employees:
27
Remote Access Point (RAP) Deployment – OV Cirrus (Freemium) & OV 2500
Web Browser
Access to the OmniVista Cirrus https://registration.ovcirrus.com/
webpage
Click Create New Account
Mail
Click the link GO TO VERIFY
ACCOUNT
Click on Browse…
Click Next
Review the details
Click Next
Check the box “I accept all
license agreements”
Click Next
Select a storage (depends on
your infrastructure)
Click Next
Select the destination
network for the network cards
Click Next
OJPQRH;STUVIIH;Q>
61'87 W&#"0C35
1'2#23
1'2#233
1'2#25
1'2433X152Y$5
8822 8 88779 77 2 2789 28 7! 7!6789 23333"#4#$2%88& 02"
0123425304 6789
'(4433
78 8 6 ' (79 97 8 *9* 8*++ 88 + (79 78,
688 8
8822 8 88779 77 2 2789 28 7! 7!6789 23333"#4#$2%88& "2"
OMNIACCESS STELLAR WLAN
VOWLAN
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
PORTFOLIO FOR VOICE
ENTERPRISE HANDSET
• Handset Management & Alarm Tool
• Handsets
• ALE NOE & SIP standard protocols handled
USB Configuration Cradle IMS3 Mass Deployment Server
• Key Features
• Seamless Roaming • Handset Accessories
• Power Save
• Real-time handset location (Ekahau RTLS for
OT8168s and OT8128)
Rack Charger Battery Rack Charger
• For industrial use 8168s.
• Voice applications:
• Rainbow UCaaS client
• Rainbow mobility with OXO/OXE integration
• OTC mobile application
• Non-ALE softphones applications (Facetime,…)
Indoor Indoor
Wi-Fi 7 Wi-Fi 7
SMB Hosp. SMB MLE MLE Rugged
AP1511 AP1521
Indoor Indoor Indoor Indoor Indoor Outdoor
Wi-Fi 6
VOICE WLAN DEPLOYMENT PROCESS
VOICE OVER WLAN DEPLOYMENT STEPS
These are the major steps for the deployment of VoWLAN in a WLAN Stellar environment.
In any case, please refer to the document « VoWLAN Deployment Guide » in the appendix.
Operate Provide Voice service to users, maintain and extend the service
PREPARATION 1
Prepare
• Actions
Figure 1
• Site survey
• Analyze the RF environment
• Discover the source of interferences and their level
• Number of APs required (Fig. 1)
• AP placement calculation (Fig. 2)
WMM Queuing
• Antennas & Channels selection Management Voice Application
• Channels selection is country dependent QoS Aware RF Management Bandwidth Management
Management Plan
• 802.11ac data throughput requires Gigabit user
ports compatible on the access switches
Figure 2 Voice LAN
• Dedicated VLAN for voice with guaranteed
bandwidth and QOS
IMPLEMENTATION 4
Implement
• Planning of Deployment
• Cabling
• Install the Voice servers
• Configure Radius, DNS and DHCP servers
• Configure IMS3 server for Voice devices
management
• Configure WLAN SSID for handsets
• Install, template and configure Voice
handsets via IMS3
• Monitoring
• Voice coverage (level of SNR, RF scan)
• VoIP audit
• System performances
• Updating the infrastructure
• Handsets, Hardware networking infrastructure, servers
• Surveying
• Ekahau site survey PRO or Airmagnet Survey PRO
• Support & Troubleshooting
• Professional services
• Professional Services cover the build and run phases of all projects, including plan & design,
integrate & deploy, asses & migrate, and project management.
• Ekahau 3D site survey tool can be delivered as service by PS to design WLAN deployments
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniVista 2500 NMS Release 4
PolicyView
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
Lesson Summary
OmniVista 2500
Used to configure network-wide QoS policies
Infrastructure
Operation modes
• OneTouch for Voice, Data & ACL
- QoS for one or more subnets of VoIP phones
- QoS priorities for selected data servers
- Accept/ Drop traffic for selected groups
• Expert Mode
- Advanced QoS controls for complex policies (including validation scheme)
PolicyView Home
QOS Rule configuration steps
L3 DSCP / TOS
TCM.
Committed information Rate.
Peak Information Rate
Expert Mode Wizard
Validity Period and Review
Policy and Policy Manager
Policy
Administration LDAP
Repository
LDAP
LDAP LDAP
Policy Flow
User creates a policy using
OmniVista PolicyView
2
Policy
Directory
Server
3
Policy Enabled
Switches
OMNIACCESS STELLAR
WIRELESS LAN
S S I D C R E AT I O N – A D VA N C E D O P T I O N S
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE
LESSON SUMMARY
Upon completion this module,
you will be able to:
• Basic
• Hide SSID
• UAPSD
• Unscheduled Automatic Power Save Delivery is a QoS facility defined in
IEEE 802.11e that extends the battery life of mobile clients
• Security
• Classification Status
• Role assignement if 802.1X/MAC authentication does not return a role
• Client Isolation
• Traffic between clients on the same AP (in the SSID) is blocked
ADVANCED WLAN SERVICE CONFIGURATION
⚫ Broadcast Optimization
Broadcast Filter All
Drop all broadcast packets except DHCP & ARP.
Broadcast Filter ARP
Convert broadcast ARP to unicast ARP
Recommended if no specific multicast application is
used
ADVANCED WLAN SERVICE CONFIGURATION
• Multicast Optimization
• Enabling Multicast Optimization = Convert multicast to unicast
• Unicast key PTK used
• Uses the highest data rate (unicast)
• WMM QoS
• Four categories
• QOS treatment per category
• Uplink 802.1p/DSCP
DSCP=56
• Downlink 802.1p/DSCP
DSCP=56 DSCP=46
• Recommended Settings
WMM 802.1p DSCP
Best Effort 0 0
Background 2 18 - AF 21
Voice 5 46 – EF
Video 4 34 – AF41
• Default OV Settings
NAT
DHPC
Firewall
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
1
February 25
It’s an Open Technical Community To connect and…
providing a great place to connect
with other members or just participants Read or post interesting information
who share the same passion Provide mutual aids
on Alcatel-Lucent Enterprise Network Learn from others into the community
Solutions
All about Our Developer
Homepage Network via
our NEWS
Center is our
APIs center
Slider mode
Configurable
home banner Community
activity Stats
Search for
quick access
Ask your
question
Top
Details on
members:
Location
Most answers
Services
& comment
category
Dedicated topic
News
Resources
Blog
Developer Center
Developer Center
Category’s example
Search bar
Key Takeaways
Join us now!
Time for a little quiz
Now that you are a
Spacewalkers’ member, here
a couple questions to check
your training before you start
exploring on your own!
Start now
Thank you!
C O N TA C T U S
WEBSITE
www.al-enterprise.com
Follow us on:
END OF TRAINING EVALUATIONS
C L A S S R O O M S E S S I O N O R V I RT U A L C L A S S S E S S I O N
YOUR FEEDBACKS ARE
IMPORTANT!
• Search for the training course by the reference provided by your instructor
ACCESS TO THE ONLINE EVALUATION SURVEY (2/2)
• From the session, select Evaluate in the dropdown menu and follow the instructions
OR
• From the curriculum, select Open Curriculum
• Then select Evaluate in the dropdown menu associated to the session and follow the
instructions
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Find a Course
Browse our catalog available on https://enterprise-education.csod.com/ to find your training path
and course detail.
Feedback
In order to improve the quality of the documentation, please report any feedback and address to:
Alcatel-Lucent Enterprise
115-225 rue Antoine de Saint-Exupéry
ZAC Prat Pip – Guipavas
29806 BREST CEDEX 9 – France
FAX: (33) 2 98 28 50 03