Specifications
Chapter 1: An Overview of the BlueSecure Controller
1-10
Typical BlueSecure WLAN Solution Network Configurations
Typically, you will install and configure Bluesocket BSCs in one of the following network 
configurations:
• single BSC configuration
• multiple BSC configuration
• failover BSC configuration
Single BSC Configuration
This chapter provides complete procedures for configuring a single BSC for use in a small 
network such as a workgroup. Additionally, instructions are given for configuring a pair 
of BSCs for failover operation. The chapter includes:
Complete the following steps to configure a single BSC network:
1. Access the BSC administrator console as described in “Logging Into the Administrator 
Console for the First Time” on page 3-2.
2. Configure the BSC’s protected interface to enable the BSC to communicate with the 
protected (i.e., wired) side of your network by following the steps listed in “Defining 
the BSC Protected Physical Interface” on page 4-2.
3. Configure the BSC’s managed interface to enable the BSC to communicate with the 
managed (i.e., wireless) side of your network by following the procedure given in 
“Configuring the BSC Managed Interface” on page 4-7.
4. To create the elements that will comprise the roles you will assign to users:
a) Create host and network destinations and destination groups for BSC users. You 
can then enable or deny user access to these destinations based on the user’s 
assigned role. See “Creating Destinations and Destination Groups” on page 8-
10.
b) Define network services and service groups as described in “Creating Network 
Services and Services Groups” on page 8-13. These defined services provide 
network services for your BSC users over and above the BSC’s default services.
c) Optional. Create schedules that define when users may access BSC and network 
resources (see“Creating Schedules and Schedule Groups” on page 8-17).
d) Optional. Define user locations and location groups specifying the location of 
users on the managed side of the network. Network usage policies can be 
enforced based on a user’s location. User locations are identified by their 
associated VLAN ID. See “Creating Locations and Location Groups” on page 8-
19 for information about defining user locations.
5. Define user roles that enforce network usage policies as detailed in “Defining User 
Roles to Enforce Network Usage Policies” on page 8-2. Setting up role-based 
authorization is one of the most important aspects of BSC configuration.
6. Optional. Define a RADIUS accounting server to record network activity and statistics 
by following the procedure given in “RADIUS Accounting” on page 7-1.
7. Define how BSC users are authenticated and assign a role to each user as follows:
• When using the BSC’s internal database for authentication, create local users 
and assign each to a role (see “Local BSC User Authentication” on page 5-2).
• If you are using an external server for user authentication, you must define the 
authentication server name, address, and rules used to assign roles to users. See 
“Authentication Using External Servers” on page 6-1 for details.
• If your BSC users have wireless devices that do not support browser-based or 
transparent Windows or 802.1x login access, set up MAC address 










