Specifications
About This Guide
xvi
authentication, NTLM authentication, transparent NTLM authentication, transparent 
802.1x authentication, the BSC internal 802.1x authentication server, Kerberos 
authentication, cosign authentication, pubcookie authentication, CAS authentication, 
transparent certificate authentication, and testing an external authentication server.
• Chapter 7, 
"RADIUS Accounting"
, discusses how to set up RADIUS accounting, used 
to record network activity and statistics including tracking user logins. It also 
discusses the attributes sent to an external RADIUS accounting server by the BSC.
• Chapter 8, 
"Roles and Role Elements"
, discusses defining user roles to enforce 
network usage policies, role-based authorization, role inheritance, defining/
modifying a role, and creating role elements, destinations, network services, 
schedules, and locations.
• Chapter 9, 
"Voice Over WLAN Support"
, discusses general VoWLAN settings, 
vendor-specific IP phone support, and VoWLAN QoS.
• Chapter 10, 
"General BSC Operational Settings"
, discusses HTTP server settings, 
intrusion detection system, the SNMP agent, automatic backup of the BSC database, 
system time and date settings, public access networks, mail server access, event 
logging and connection tracking, threshold values, domain name system (DNS) 
settings, and miscellaneous BSC options.
• Chapter 11, 
"Web Logins"
, discusses customizing the user login page, translating 
user login pages, installing a custom SSL login certificate, and configuring hotspot 
account generation.
• Chapter 12, 
"BlueSecure Access Points"
, discusses deploying BSAPs on the same 
layer-2 subnet as the BSC, deploying BSAPs with layer-3, connectivity to the BSC, 
how a BSAP discovers BSCs, how a BSAP selects a home BSC, uploading BSAP 
firmware files, configuring global miscellaneous non-radio settings, configuring 
global radio settings, editing settings for an individual BSAP, creating SSIDs, creating 
BSAPs, enabling BSAP service, and displaying configured BSAPs.
• Chapter 13, 
"RF Intrusion Detection and Containment"
, discusses identifying 
authorized RF stations on your network, configuring RF alarms, and configuring 
autocontainment.
• Chapter 14, 
"Secure Mobility® MatriX"
, provides complete procedures for 
configuring multiple BlueSecure Controllers for use in relatively larger networks that 
may be segmented in different subnets and physical locations. Setup and use of 
Bluesocket’s Replication, Load Sharing, and Secure Mobility
®
 features for multiple-
BSC networks are described.
• Chapter 15, 
"Status"
, provides procedures for performing common network 
administration tasks such as: monitoring user activity and connection status, viewing 
the Controller’s summary log, exporting Controller database information, performing 
standard network diagnostics, and managing user accounts.
• Chapter 16, 
"Maintenance"
, describes how to perform common system software 
administrative tasks such as: restarting Controller services, backing up and restoring 
the Controller database, upgrading the system software to a new version, installing 
or removing system software patches, customizing the user login page, installing a 
custom secure sockets layer (SSL) certificate for user login, and hotspot account 
generation (i.e., end user credit card billing services).
• Appendix A, 
"An Overview of Virtual LANs,"
 describes the BlueSecure Controller 
implementation of virtual LANs (VLANs) on both the managed and protected sides of 
the network.
• Appendix B, 
"Provisioning Network DHCP Servers to Support BSAPs,"
 provides 
procedures for configuring the DHCP servers on your network to send BSC IP 
addresses to BSAPs using DHCP vendor-specific option 43.










