ZyXEL NXC

CONFIGURATION GUIDE

The purpose of the following manual is to describe the necessary configuration of NXC2500 de ZyXEL equipment for integration with Octopus Platform

1- Pre-requisites

  • If there is a firewall in the network that might block the traffic, you will need to allow access to some domains to enable user's authentication:

    • Radius Servers:

      • Primary: <IP_Radius_1> 1812 and 1813 UDP ports

      • Secondary: <IP_Radius_2> 1812 and 1813 UDP ports

    • Splash Portal server: 

      • Domain <captive_portal_domain> 80 and 443 TCP ports

  • For the operation of the Guest and Enterprise modules configuration, it will be necessary to previously contract the Octopus platform licenses with the respective modules.

2- Guest module configuration

2.1 WLAN Settings

First of all, to configure the external captive portal in the NXC2500 controller, it is necessary to add a new SSID or edit an existing one. Go to Configuration > Object > AP Profile and open the SSID tab.

  • Profile Name: WiFi_GUEST

  • SSID: SSID name that will be visible to the wireless users.

  • VLAN ID: set the vlan associated to the SSID.

 

2.2 Radius Server

Then, it is required to add the Radius Server that will receive the user's authentication requests. Go to Configuration > Object > AAA Server and open the RADIUS tab. Once the RADIUS tab is displayed, click Add to configure a new Radius Server with the following parameters:

  • Name: RADIUS

  • Authentication Server Settings

    • Server Address: <IP_Radius_1>

    • Authentication Port: 1812

    • Backup Server Address: <IP_Radius_2>

    • Backup Authentication Port: 1812

    • Key: <Secret>

 

  • Accounting Server Settings

    • Server Address: <IP_Radius_1>

    • Accounting Port: 1813

    • Backup Server Address: <IP_Radius_2>

    • Backup Authentication Port: 1813

    • Key: <Secret>

    • Accounting Interim Update: check this box.

    • Interim Interval: 10

  • General Server Settings:

    • Timeout: 5

    • NAS Identifier: ZYXEL

 

After the Radius Server is configured, go to the section Configuration > Object > Auth. Method to add a new Authentication Method which will be linked to the Radius Server. Click Add and configure the following parameters:

  • Name: WIFI

  • Method List: add the Radius Server that has been already configured, group RADIUS

2.3 Captive Portal

The next step is to configure the external captive portal. Go to Configuration > Captive Portal section and open the Captive Portal tab. Once the Captive Portal window is displayed, set up the following parameters:

  • Enable Captive Portal: check this box to enable the captive portal.

  • External Web Portal: enable this option.

    • Login URL: https://<domain_captive_portal>/login/hotspot/zyxel

  • Authenticated Method: select the authenticated method created in the chapter before - WIFI

After having accomplished these changes, please click Apply to save the configuration.

2.4 Walled Garden

It is not possible to add domain names to the walled garden in the NXC2500 controller. So this configuration has to be done adding IP addresses. Go to Configuration > Object > Address and click Add to add every required IP address.

To consult the IP addresses to be included go to the following link.

2.5 Authentication Policy

Once the IP addresses to which the user will have free access have been added, it is necessary to create an Authentication Policy that associates these IPs to a specific rule. To do so, go to Configuration > Captive Portal and access the Redirect on AP tab, then add a new Authentication Policy Rule for each of the IP addresses used previously with the following configuration:General Settings

  • General settings

    • Enable Policy: Check this option.

    • Profile Name: Add every Policy rule created.

  • Accounting Server Settings

    • SSID: any

    • Source Address: any

    • Destination Address: WIFI

    • Schedule: none

    • Authentication: unnecessary

Once all the Policy Rules have been added, it is necessary to create a rule that block all other traffic. So add a new rule with the following configuration:

  • General Settings

    • Enable Policy: check this option.

    • Profile Name: BLOCK

  • Accounting Server Settings

    • SSID: any

    • Source Address: any

    • Destination Address: any

    • Schedule: none

    • Authentication: force

To finish the walled garden configuration, it is necessary to create an Authentication Policy Group that group all the policy rules added before. So perform the following configuration:

  • General Settings

    • Profile Name: WIFI

  • Add each rule created before. In this case it is very important to put the BLOCK rule the last one of the list.

After having done all these changes, click on the Apply button to save this configuration. 

2.6 Access Point

Finally, it is necessary to add the configured Profiles to the AP Group that the access points belong to. Go to Configuraion > Wireless > AP Management and open the AP Group tab. Once the configuration window is displayed, add a new AP Group or edit an existing one and perform the configuration as shown below:

  • General Settings

    • Group Name: set the AP Group Name.

  • Radio 1 Setting:

    • Select the SSID Profile created in the chapter before - WIFI_GUEST

  • Radio 2 Setting:

    • Select the SSID Profile created previously - WIFI_GUEST

 

  • Portal Redirect on AP

    • Policy Group: Select the Policy Group added previously - WIFI

    • Skip authentication to provide contingency access while controller is unreachable: disable this option.

 

2.7 Authorized MAC Addresses

For user validation to work correctly, it is necessary to identify the NAS that will be able to make authentication requests to the Radius Server. In this case you must add all the MAC addresses of the Access Points that will radiate the configured SSID. To obtain these MAC addresses easily go to Monitor > Wireless > AP Information and look for the column where the MAC of each of the APs appears.

 

For information on how to add the MAC address of each AP as an authorized NAS on the platform, please refer to the following link Wifiareas>General information

3- Enterprise module configuration

In order to integrate the configurations of this module with the platform, it is necessary to contract the Octopus Wifi Enterprise Module.

3.1 Configuration of “Access Profiles” funtionality in the Octopus Platform

Through the Octopus platform it is possible to configure a series of reply attributes of the Access-Accept packages, grouped in the so-called Access Profile. These Access Profiles allow to activate a series of functionalities in the Zyxel. Although the most common and proprietary Zyxel radius dictionaries are available, the following is a list of some of the most interesting ones:

Atributo

Descripción

Format

Atributo

Descripción

Format

Idle-Timeout

Maximum idle time. If the user does not transfer any data on the network during this time, the session will be terminated and the user will have to re-authenticate.

Seconds

Reply-Message

Useful for troubleshooting functions, since it allows to identify associated elements of the Octopus platform, such as an access profile, access method, location, ...

 

Example of an Access Profile configuration with the attributes explained above:

For more information on how to create an Access Profile in Octopus Platform go to Access profiles