Ads 468x60px

WiNG - Hotspot Authentication - Overview


The Motorola Hotspot authentication feature offers a simple way to provide secure authenticated access on a WLAN for users and devices using a standard web browser. Hotspot authentication allows enterprises to offer authenticated access to the network by capturing and re -directing a web browsers session to a captive portal login page where the user must enter valid credentials to be granted access to the network.

The Motorola RF Switch supports the following advanced feature set that can be deployed to support Hotspot authentication for guest user or private user access:



Common Applications:
Hotspot authentication can be utilized for multiple applications including guest and visitor access or 
private user access and can be found in private enterprises, hospitality, healthcare, transportation and 
education environments. Hotspot authentication is fast becoming a popular means for authenticating 
users and devices as it provides administrators with the means for performing authentication without 
deploying 802.1X or distributing shared keys.

Authenticated Visitor Access:
A common application for the Hotspot feature is to provide secure authenticated access for guest users and visitors at a site. Prior to Hotspot authentication organizations wishing to provide guest access would establish an open ESSID that was separated from the internal network which any authorized or unauthorized device could access. While this approach provided the necessary access it also provided no means of authentication and provided free open access to the Internet for any device in range of the network.

Hotspot authentication solved this problem by providing an authentication component using a standard web browser. Visitors and guest users at a site would be provided with a temporary username and password from front desk personnel during the sign-in process which would permit access to the network for the duration of their visit. Once the time for the guest account expired, the user would be denied access to the network.

Employing Hotspot authentication for visitor access provides enterprises with the following benefits:
1.      Authentication ensures that only authorized users are permitted access to the guest network. Casual users looking for a free Internet access are not permitted.
2.      Provides the ability to associate different network access permissions to classes of users. For example visitors can be provided with one class of access vs. contractors who be provided with a different class of access.
3.      Time limits can be applied and enforced for accounts ensuring that Internet access is only permitted to a visitor for the duration of the visit. 
4.      Time of day and day of week policies can be enforced for long term visitors ensuring Internet access is only permitted during operating business hours.
5.       Bandwidth policies can be applied ensuring guest users cannot monopolize or abuse the network.
6.      Firewall policies can be applied to restrict access to only specific protocols and applications.

Authenticated Private Access:

Another common application for the Hotspot feature is to provide authenticated access to private networks for un-managed devices. In certain vertical markets such as education administrators need to provide access to un-managed devices that are owned and maintained by end users such as students and faculty.

In typical enterprise environments 802.1X authentication is commonly employed to p rovide secured authenticated access into the private network. This approach is typically very easy to deploy and maintain as the end user devices are all owned, managed and maintained by the enterprise IT organization.

However in environments such as education the make, model and OS of the end-user devices variesmaking 802.1X very challenging to deploy, manage and maintain.

Prior to Hotspot authentication it was very common for education environments to deploy an SSID that utilized shared keys and/or MAC authentication. This approach eliminated the need for 802.1X authentication but placed increased burden on IT staff which each semester had manage and rotate keys as well as maintain MAC lists of all the permitted devices.

Hotspot authentication provides an elegant way to solve these administrative challenges. First Hotspot authentication provides the means for tying the user authentication into an existing RADIUS or LDAP user database allowing students to authenticate using their assigned student ID and password. Secondly as Hotspot authentication only requires a standard web browser for authentication any end-user device can be supported.
Employing Hotspot authentication for private network access provides enterprises with the following benefits:
1)  Eliminates the administrative burden for managing and maintaining MAC address lists.
2)  Ties authentication into an existing RADIUS or LDAP back end allowing users to utilize their network credentials for access.
3)  Provides secure authentication without having to deploy, manage or maintain 802.1X on the end user devices.
4)  Provides the ability to associate different network access permissions to classes of users. For example students can be provided with one class of access vs. faculty who be provided with a different class of access.
5)  Bandwidth policies can be applied ensuring users cannot monopolize or abuse the network.
6)  Allows network access to be restricted based on location. For example firewall policies can be dynamically applied to sessions to restrict outbound Internet access at specific locations.
7)  Allows administrators to eliminate account sharing by limiting the number of simultaneous times a user-id can be used to access the Hotspot. 

Paid Internet Access:
The final common application for Hotspot authentication is to provide paid access to the Internet. Hotspot authentication allows organizations to offer paid Internet access to subscribers be offering a block of time that users can use over multiple days or a block of time that can be utilized for one day only. Add itionally 
Hotspot authentication allows providers to offer tired services to users by providing bandwidth allocationsor different classes of service based on the purchased access package.

Paid Internet access typically employs a specialized back-end that the Hotspot users are re-directed to during the capture process which provides the account creation and billing integration. Existing users with account balances can enter their credentials in the portal and authenticate to the network which provides access for the time remaining on their account. New user’s sign up for new access and can select a 
package or amount of time which is charged to a credit card. Once billing has been performed the user is provided access for the purchased block of time.

Hotspot authentication is attractive for paid access applications as it requires no client or specialized software to be installed on the end user device. Hotspot authentication leverages the end users web browser to perform the secure payment transaction and authentication and leverages the features implemented on the RF Switch which can controls time restrictions and bandwidth allocation.

Hotspot Authentication Process:
Hotspot authentication requires no client software on the end user device and leverages the end users web browser to perform authentication. When a user initially associates to a Hotspot enabled WLAN, the user has limited network access until they open their web browser and authenticate.Prior to authentication the user is only provided limited access to the network allowing devices to obtain an IP address from DHCP, resolve hostnames using DNS and communicate with the Hotspot service. Once authentication has been performed, network access is determined based on any firewall rules statically applied to the Hotspot enabled WLAN, physical port or the Hotspot virtual IP interface. Dynamic firewall policies can also be applied to users if an advanced security license is installed on the RF Switch.

Figure 1.3 outlines the Hotspot authentication process that is performed on an RFS6000 or RFS7000 Switch:


1)  The user associates with the Hotspot WLAN. The RF Switch only permits access to DHCP, DNS and the Hotspot login page.
2)  The user opens their web browser and attempts to connect to an external web server
3)  The RF Switch intercepts the browser session and redirects the web browser to a login page hosted on the RF Switch or external web server
4)  The user enters and submits their credentials.
5)  The RF Switch performs authentication using the integrated RADIUS server, external RADIUS server or external LDAP server:
a)  If authentication fails the web browser is redirected to a failed page hosted on the RF Switch or external web server.
b)  If authentication succeeds authorization is performed. RADIUS accounting information is also forwarded if enabled.
6)  The RF switch verifies that the user is permitted to access the network based user account expiry settings and time-of-day or day-of-week policies applied to the user group:
a)  If authorization fails the web browser is redirected to a failed page hosted on the RF Switch or external web server.
b)  If authorization succeeds the web browser is redirected to a welcome page hosted on the RF Switch or external web server.
7)  The RF Switch evaluates and assigns a role based policy to the session:
a)  If no advanced security license is present on the RF Switch, a default -role is assigned to the Hotspot user.
b)  If an advanced security license is present but no roles match the session, a default-role is assigned to the Hotspot user.
c)  If an advanced security license is present and a role is matched, the role is assigned to the Hotspot user.
8)  The user is now permitted access to the network. The network access that is permitted will be 
determined based on any firewall rules assigned to the WLAN, physical ports, Hotspot virtual IP interface or user.

Hotspot Architectures:

Hotspot authentication can be deployed to provide authentication for various deployment scenarios. Common applications include providing Internet access to guest users and visitors at a site as well as providing authenticated access for un-managed devices such as students and faculty at a university.The specific Hotspot application will determine the physical and logical topology that will be deployed. For example guest access applications will require that the guest user devices are physically and logically separated from corporate devices using VLANs and firewalls. Private access on the other hand will not be 
concerned with physical and logical separation as the devices are typically trusted and will share the network with other trusted devices.The following section provides an overview of the Hotspot architectures supported by the Motorola RF Switch.

AP100 / AP300 / AP4131 Access Ports:

The first common Hotspot architecture is to deploy AP100, AP300 or AP4131 Access Ports with an RF Switch over a high-speed LAN. In this architecture all wireless user data traffic is tunneled from the AP to the RF Switch over an L2 or L3 network using WiSPe encapsulation. The RF Switches can be deployed in a centralized data center or wiring closet providing seamless integration into the wired network.With this architecture the Hotspot capture, redirection, authentication, authorization and traffic forwarding functions are all provided centrally on the RF Switch. Using this model guest user’s devices can be easily mapped to a guest VLAN in the data center or main wiring closet providing physical traffic separation.When multiple virtual IP interfaces are deployed on the RF Switch, logical separation between guest and internal networks can be provided using the integrated stateful inspection firewall


Adaptive Access Points (Extended WLANs):

The second common Hotspot architecture is to deploy AP5131 or AP7131 Adaptive Access Points with an RF Switch over a high-speed LAN or wide area network using extended WLANs. With extended WLANs all user data traffic is forwarded from the AP to the RF Switch over an L2 or L3 network using WiSPh encapsulation. The RF Switches may be deployed in a centralized data center or wiring closet at a site or centrally in a NOC supporting multiple remote sites.
With this architecture the Hotspot capture, redirection, authentication, authorization and traffic forwarding functions are all provided centrally on the RF Switch. Using this model guest user’s devices can be easily mapped to a guest VLAN in the data center, main wiring closet or NOC providing physical traffic separation. When multiple virtual IP interfaces are deployed on the RF Switch, logical separation between guest and internal networks can be provided using the integrated stateful inspection firewall.

Adaptive Access Points (Independent WLANs):

The third common Hotspot architecture is to deploy AP5131 or AP7131 Adaptive Access Points with an RF Switch over a high-speed LAN or wide area network using independent WLANs. With independent WLANs all user data traffic is forwarded locally from the AP to the wired network bypassing the RF Switch. In this model the RF Switch provides centralized management a control of the APs over an L2 or L3 network but no centralized forwarding. The RF Switches may be deployed in a centralized data center or wiring closet at a site or centrally in a NOC supporting multiple remote sites.

With this architecture the Hotspot capture, redirection, authentication, authorization and traffic forwarding functions are all provided locally on each individual AAP. Authentication and authorization may also be performed centrally on the RF Switch if desired. As the AAPs are managed by a centralized RF Switch, the configuration and management of the Hot enabled WLAN can be performed centrally on the RF Switch and applied to each AAP.The guest user devices are mapped to VLAN that’s local to the AAP requiring 802.1Q tagging to be enabled on the AAP and the upstream Ethernet device. Traffic separation is provided by the Ethernet infrastructure or integrated L3 stateful inspection firewall on each  AAP.

0 nhận xét:

Post a Comment