Juniper Network, Inc. 1194 N. Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net. SmartPass 9.0 User s Guide



Similar documents
Radius Integration Guide Version 9

For the most current version of all documentation, go to Part Number: Rev. H

Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm

ADMINISTRATOR S GUIDE

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1

SOFTWARE LICENSE LIMITED WARRANTY

High Availability Configuration Guide Version 9

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT

Implementation Consulting

HTTP Client Installation Guide Version 9

ADS Integration Guide

Portal Administration. Administrator Guide

RingMaster. Monitoring and Management Guide. Release February 2011 (Release Date) Part Number: , Revision C

Symantec On-Demand 2.6/ Juniper IVE SSL VPN 5.2 Integration Guide Addendum

IPSec VPN Client Installation Guide. Version 4

Mobility Point Hardware Installation Guide 7.4

Cyberoam IPSec VPN Client Configuration Guide Version 4

Mobility Exchange Hardware Installation Guide 7.4

PRODUCT SUPPORT AND SOFTWARE MAINTENANCE AGREEMENT

ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note

CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad , INDIA

Cyberoam Multi link Implementation Guide Version 9

Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide

Strategic Network Consulting

Trustwave SEG Cloud Customer Guide

SSL VPN Client Installation Guide Version 9

CYBEROAM WINDOWS DOMAIN CONTROLLER INTEGRATION GUIDE VERSION:

NETGEAR Onsite Hardware Replacement Service Agreement Terms and Conditions

Managing Service Design for PTP Timing

REPAIR SERVICES AND PROCESSING FEES.

System Requirements. Installation. Microsoft SQL Express 2008 R2 Installation

Juniper Secure Analytics

CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad , INDIA

Unified Access Control Client-side Changes Guide

BlackBerry Enterprise Server Resource Kit BlackBerry Analysis, Monitoring, and Troubleshooting Tools Version: 5.0 Service Pack: 2.

GLOBAL CUSTOMER SUPPORT SERVICES

KeyAdvantage System DMS Integration. Software User Manual

Virtual LAN Configuration Guide Version 9

Palo Alto Networks User-ID Services. Unified Visitor Management

Interworks. Interworks Cloud Platform Installation Guide

Cyberoam Anti Spam Implementation Guide Version 9

Juniper Secure Analytics

STRM Log Manager Administration Guide

BlackBerry Enterprise Server. BlackBerry Administration Service Roles and Permissions Version: 5.0 Service Pack: 4.

FIREEYE SUPPORT TERMS AND CONDITIONS

Junos Space. Junos Space Security Director Restful Web Services API Reference. Modified: Copyright 2016, Juniper Networks, Inc.

Secure Virtual Workspace. Release 5.3R3. Juniper Networks Secure Access. Juniper Networks, Inc.

Juniper Secure Analytics

DIGIPASS as a Service. Google Apps Integration

BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide

Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6

Identity-Based Traffic Logging and Reporting

ZIMPERIUM, INC. END USER LICENSE TERMS

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

NetBak Replicator 4.0 User Manual Version 1.0

Feature Guide. RingMaster Software Version 7.4 Mobility System Software Version 7.3

Juniper Secure Analytics

Migrating Log Manager to JSA

BES10 Self-Service. Version: User Guide

Mobility System Software Quick Start Guide

APPLIED BIOSYSTEMS END USER SOFTWARE LICENSE AGREEMENT FOR INSTRUMENT OPERATING AND ASSOCIATED BUNDLED SOFTWARE AND LIMITED PRODUCT WARRANTY

EMC Data Protection Search

BLACKBERRY AUTHORIZED ONLINE RETAILER BLACKBERRY HANDHELD REPAIR SERVICE TERMS AND CONDITIONS

Configuring and Implementing A10

TERMS AND CONDITIONS 1 CONTRACT INFORMATION

FME SOFTWARE LICENSE AGREEMENT

jchartfx Plus End User License Agreement (EULA)

WSAM and Network Connect Error Messages. Release 6.5. Juniper Networks Secure Access. Juniper Networks, Inc.

Track and Trace. Administration Guide

Support Advisory: ArubaOS Default Certificate Expiration

BlackBerry Mobile Voice System - BlackBerry MVS Client

Junos Pulse for Google Android

Error Messages. Release 5.4. WSAM and Network Connect. Juniper Networks, Inc.

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365

Hyper-V Installation Guide. Version 8.0.0

Extension Module (XMOD): Batch Order Management (BOM)

Web Security Firewall Setup. Administrator Guide

Symantec Mobile Management for Configuration Manager

FOR WINDOWS FILE SERVERS

HP IMC Firewall Manager

Security Analytics Engine 1.0. Help Desk User Guide

Server Installation Guide ZENworks Patch Management 6.4 SP2

Cyberoam Anti Virus Implementation Guide Version 9

MDM Zinc 3.0 End User License Agreement (EULA)

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual

axsguard Gatekeeper Internet Redundancy How To v1.2

END USER LICENSE AGREEMENT ( EULA )

Secure Web Service - Hybrid. Policy Server Setup. Release Manual Version 1.01

User Manual. Page 2 of 38

Cyberoam Anti Spam Configuration Guide Version 9

TSM Studio Server User Guide

Symantec Critical System Protection. Symantec Software License Agreement

Ektron CMS400.NET Virtual Staging Server Manual Version 7.5, Revision 1

HP A-IMC Firewall Manager

Hosted Service Documentation and Limited License Agreement

Nokia E61i Configuring connection settings

NSM Plug-In Users Guide

Support Advisory: ArubaOS Default Certificate Expiration

BlackBerry Desktop Manager Version: User Guide

SOFTWARE HOSTING AND SERVICES AGREEMENT

Transcription:

Juniper Network, Inc. 1194 N. Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net SmartPass 9.0 User s Guide

Copyright 2013, Juniper Networks, Inc. All rights reserved. Trademarks Juniper Networks, the Juniper Networks logo, NetScreen, NetScreen Technologies, the NetScreen logo, NetScreen-Global Pro, ScreenOS, and GigaScreen are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The following are trademarks of Juniper Networks, Inc.: ERX, ESP, E-series, Instant Virtual Extranet, Internet Processor, J2300, J4300, J6300, J-Protect, J-series, J-Web, JUNOS, JUNOScope, JUNOScript, JUNOSe, M5, M7i, M10, M10i, M20, M40, M40e, M160, M320, M-series, MMD, NetScreen-5GT, NetScreen-5XP, NetScreen-5XT, NetScreen-25, NetScreen-50, NetScreen-204, NetScreen-208, NetScreen-500, NetScreen-5200, NetScreen-5400, NetScreen-IDP 10, NetScreen-IDP 100, NetScreen-IDP 500, NetScreen-Remote Security Client, NetScreen-Remote VPN Client, NetScreen-SA 1000 Series, NetScreen-SA 3000 Series, NetScreen-SA 5000 Series, NetScreen-SA Central Manager, NetScreen Secure Access, NetScreen-SM 3000, NetScreen-Security Manager, NMC-RX, SDX, Stateful Signature, T320, T640, T-series, and TX Matrix. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. All specifications are subject to change without notice. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Disclaimer All statements, specifications, recommendations, and technical information are current or planned as of the date of the publication of this document. They are reliable as of the time of this writing and are presented without warranty of any kind, expressed or implied. In an effort to continuously improve the product and add features, Juniper Networks reserves the right to change any specifications contained in this document without prior notice of any kind. Copyright 2013, Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, NetScreen, NetScreen Technologies, the NetScreen logo, NetScreen-Global Pro, ScreenOS, and GigaScreen are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The following are trademarks of Juniper Networks, Inc.: ERX, ESP, E-series, Instant Virtual Extranet, Internet Processor, J2300, J4300, J6300, J-Protect, J-series, J-Web, JUNOS, JUNOScope, JUNOScript, JUNOSe, M5, M7i, M10, M10i, M20, M40, M40e, M160, M320, M-series, MMD, NetScreen-5GT, NetScreen-5XP, NetScreen-5XT, NetScreen-25, NetScreen-50, NetScreen-204, NetScreen-208, NetScreen-500, NetScreen-5200, NetScreen-5400, NetScreen-IDP 10, NetScreen-IDP 100, NetScreen-IDP 500, NetScreen-Remote Security Client, NetScreen-Remote VPN Client, NetScreen-SA 1000 Series, NetScreen-SA 3000 Series, NetScreen-SA 5000 Series, NetScreen-SA Central Manager, NetScreen Secure Access, NetScreen-SM 3000, NetScreen-Security Manager, NMC-RX, SDX, Stateful Signature, T320, T640, T-series, and TX Matrix. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. All specifications are subject to change without notice. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. ii

Chapter 1 Setting Up SmartPass New Features in SmartPass 9.0..................................................... 1 Enhancements to Self Provisioning Feature....................................... 1 Third part SMS Gateway...................................................... 2 Enhanced Security Certification through Chaining.................................. 3 New Features in SmartPass 8.0..................................................... 4 IPv6 Addressing Support...................................................... 4 Device Finger Printing........................................................ 4 MSS Interaction for Captive Portal and Session Management..................... 5 Device-Profile, Device-Type, Device Group, and Allowed Devices................. 5 Policy Management and Impact on Access Rules............................... 5 Access Rules Creation Page.................................... 5 Features Introduced in Smartpass 7.7................................................ 6 Licensing...................................................................... 6 SmartPass Licensing......................................................... 6 Guest Access Licensing................................................... 6 Subscriber Management Licensing.......................................... 6 Security Licensing.......................................................6 SP-SEC-ADV............................................... 6 Upgrading the SP 7.6 License..................................................7 Upgrading the License Feature Set and User Count.................. 7 Upgrading Only the Feature Set................................. 7 Downgrading the License Set................................... 7 Upgrading from a Previous Version of SmartPass................... 7 Obtaining a SmartPass License.................................................7 Activating SmartPass Licenses.................................................8 Activating a Base License................................................. 8 Activating Additional SmartPass Licenses.................................... 8 Setup/Server Settings............................................................. 8 RADIUS Server Settings...................................................... 8 Server Settings and SmartPass Serving Settings................................ 8 Server Settings / RADIUS Server Settings.................................... 8 RADIUS Dynamic Authorization Settings........................................ 8 External RADIUS Authentication.............................................. 9 Configuring RADIUS Authentication....................................... 10 Web Portal Authentication Server.............................................. 10 Server Certificate........................................................... 10 Importing the CSR and CA Certificates...................................... 11 User Roles.................................................................... 11 Access Control and Accounts..................................................... 12 Enabling SmartPass Login....................................................12 Requiring All SmartPass Users to Log in........................................ 12 Disabling the Login Requirement (once Enable login-required is turned on)............. 12 Creating and Managing Accounts.............................................. 12 RADIUS-based Login for User Roles....................................... 12 Creating and Managing Administrator User Accounts.......................... 12 Creating and Managing Provisioning User Accounts........................... 14 Configuring Self-Signed Access Control......................................... 14 Assigning a Provisioning User to a Self-Signed User Account........................ 15 Password Management Enhancement............................................... 15 i

Creating or Editing a Password Profile.......................................... 16 Restrictions in Password Management Configuration........................... 17 Changing the Password.................................................. 17 Web Portal Management Page for Specifying the Password...................... 17 Adding a WLC as a RADIUS Client on SmartPass.................................... 18 Using the Allow any Client Option............................................. 19 Third Party NAS/RADIUS Dictionary Support....................................... 19 Importing or Adding Dictionaries.............................................. 20 Configuring RADIUS Clients................................................. 21 Trapeze Vendor Specific Attribute List.......................................... 21 Authentication, Authorization, and Accounting................................... 22 Dynamic RADIUS.......................................................... 23 Proxy Rules............................................................... 23 Publishing the IF-MAP Data...................................................... 23 Authentication and Authorization.............................................. 24 Web Portal Management.....................................................25 Database (DB) Settings.......................................................... 25 Location Appliance Settings...................................................... 26 Location Appliance Settings..................................................26 Refresh Locale List..................................................... 26 Coupon Management............................................................ 26 Coupon Enhancements in SmartPass 7.6......................................... 26 Coupon Management.................................................... 26 Coupon Template Management............................................ 27 SMTP and SMS Settings......................................................... 27 SMTP..................................................... 27 SMS...................................................... 28 User-Type Configuration Changes.......................................... 29 User Configuration Changes.............................................. 29 E-mail/Text Message Related Actions....................................... 29 Global Save Coupons Action.............................................. 29 Per User Save Coupon Action.................................. 30 Global E-mail Coupons Action................................. 30 Per User E-mail/Text Coupon Action............................ 30 Global Text Coupons Action................................... 30 Create User................................................ 30 Bulk Create Users........................................... 30 Logging................................................... 31 Licensing.................................................. 31 Chapter 2 Web Portal Management Web Portal Authentication Server.............................................. 33 Web Portal Management Page............................................. 33 Web Portal Configuration Wizard.............................................. 34 Deleting SSID Configurations............................................. 34 Adding SSID Configurations.............................................. 34 Configuring SmartPass as an External Captive Portal Server......................... 35 Configuring the SmartPass Connection to the WLC.................................... 35 Configuring the WLC to Support SmartPass......................................... 35 Adding SmartPass Server as a RADIUS Server on the WLC (CLI)........................ 35 ii

Configuring the WLC With RingMaster............................................. 36 SmartPass Network Level Setup............................................... 36 SmartPass Wizard.......................................................... 36 SmartPass Accounting Summary............................................... 37 SmartPass Accounting Details................................................. 38 Chapter 3 SmartPass Guest Access WLC Configuration............................................................. 39 User Groups................................................................... 39 Fallthru Authentication...................................................... 40 Creating and Managing Users..................................................... 40 Creating Custom User Types...................................................... 40 Managing User Types....................................................... 42 Editing a Custom User Type.................................................. 42 Deleting a Custom User Type................................................. 42 Viewing a Custom User Type................................................. 42 Creating and Managing Users..................................................... 43 User Types................................................................ 43 MAC and Bonded Authentication.............................................. 43 Creating Users............................................................. 44 Creating Multiple Users at One Time........................................... 44 Creating Multiple Users.................................................. 44 Auto-generating User Names.................................................. 44 Bulk Create MAC Address Users.............................................. 45 Managing Users................................................................ 45 Showing User Details....................................................... 45 Deleting Users............................................................. 45 Disconnecting Users........................................................ 46 Unlocking a User........................................................... 46 Clearing the MAC Restriction................................................. 46 Printing a User Report....................................................... 46 Exporting to CSV........................................................... 46 Viewing and Printing Guest Coupons........................................... 46 Saving Coupons............................................................ 47 E-mailing Coupons......................................................... 47 Texting Coupons........................................................... 47 Printing Single-User Coupons After Creating Users................................ 48 Reactivating an Expired User................................................. 48 Changing a Users Password................................................... 48 Changing a User Type....................................................... 48 Sessions Monitoring............................................................ 49 Sessions View............................................................. 49 Filtering.................................................................. 50 Basic Filters........................................................... 50 Configuring Advanced Filters............................................. 50 Disconnect Sessions......................................................... 51 Reports................................................................... 51 Accounting Summary Report.............................................. 51 Displaying User Name Report................................................. 51 Displaying the MAC Address Report........................................... 52 Table Refresh.............................................................. 52 iii

Chapter 4 Network Access Rules Custom Access Control Rule Example.............................................. 53 Selecting the Conditions Descriptions........................................... 53 Managing Access Rules......................................................... 54 Chapter 5 RADIUS Proxy RADIUS Proxy Settings.....................................................57 Proxy Filters............................................................... 57 Forwarding Conditions...................................................... 57 Forwarding Destination...................................................... 58 RADIUS Server Groups..................................................... 58 RADIUS Server Entries......................................................58 Failback Capability......................................................... 58 Default VSA Values........................................................ 59 Realms................................................................... 59 Suffixed Realms............................................................ 59 Prefixed Realms............................................................ 59 User Name Processing....................................................... 59 Access Rule Integration...................................................... 59 Granting Access............................................................ 60 Denying Access............................................................ 60 Compatibility.............................................................. 60 RADIUS Proxy Tab......................................................... 60 RADIUS Proxy Settings.....................................................60 RADIUS Servers Management................................................ 61 Creating a RADIUS Server................................................... 61 Editing a RADIUS Server Entry............................................... 61 Creating a RADIUS Server Group............................................. 61 Deleting a RADIUS Server Entry.............................................. 61 RADIUS Proxy Rules Management Page........................................ 61 Creating a RADIUS Proxy Rule............................................... 61 Template /Custom Rule......................................................62 The Rule Conditions Page....................................................62 User Name Pattern.......................................................... 62 The AP MAC Address Selection............................................... 62 Selecting a Realm.......................................................... 62 The Destination Page........................................................ 62 The Default Attributes Page...................................................63 The Description Page........................................................ 63 Chapter 6 Maintaining SmartPass Exporting Log Files......................................................... 65 Database Backup and Restore................................................. 66 Auto-Backup.............................................................. 66 Creating a Manual Backup of the Database....................................... 67 Backups Management.......................................................67 iv

About This Guide SmartPass 9.0 User s Guide This guide is intended for network administrators or persons responsible for installing and managing SmartPass 9.0 software. SmartPass API User Guide SmartPass provides a fully functional REST-based web API that can be used to integrate the data stored in SmartPass with any third party system. The API is described in the SmartPass API Reference Guide. Internally, RingMaster manages the reporting for the accounting data stored in the SmartPass accounting tables. The actual reporting is performed within RingMaster and the data is provided by SmartPass via an API. RingMaster Publication Suite SmartPass is used with RingMaster (versions 6.2 and higher) and allows you to configure SmartPass as an accounting as well as a DAC server and also generate client session reports based on accounting information collected by the SmartPass server. Publications that make up the Ringmaster Publication Suite are: RingMaster Quick Start Guide This guide provides a description of prerequisites and procedures required to install and begin using RingMaster 9.0 software. Information is provided about system requirements for optimum performance, as well as how to install RingMaster Client and RingMaster Services software. RingMaster Planning Guide This guide provides instructions for planning a WLAN with the RingMaster tool suite.it describes RingMaster 9.0 planning tools. It is intended for network administrators or persons responsible for planning a WLAN using RingMaster 9.0 software. RingMaster Configuration Guide This guide provides detailed procedures for configuring a Wireless Local Area Network (WLAN) using RingMaster 9.0 software. RingMaster Management Guide This guide provides instructions for managing a WLAN with the RingMaster tool suite. It describes RingMaster 9.0 WLAN management and monitoring tools. It is intended for administrators of WLANs using RingMaster 9.0 software. Mobility System Configuration and Management SmartPass is used with Juniper Networks Mobility System hardware and software, as described in the following publications: Juniper Networks Mobility System Software Configuration Guide This guide provides instructions for configuring and managing a system using the Juniper Networks Mobility System Software (MSS) Command Line Interface (CLI). Juniper Networks Mobility System Software Command Reference This publication provides functional and alphabetic reference to all MSS commands supported on WLCs and WLAs Copyright 2013, Juniper Networks, Inc. v

Juniper Networks Mobility Exchange Hardware Installation Guide Instructions and specifications for installing an WLC. Juniper Networks Mobility System Software Quick Start Guide Instructions for performing setup of secure (802.1X) and guest (WebAAA ) access, and configuring a Mobility Domain for roaming Juniper Networks Mobility Point MP-422 Installation Guide Instructions and specifications for installing an WLA access point and connecting it to an WLC. Juniper Networks Mobility Point MP-620 Installation Guide Instructions and specifications for installing the WLA-620 access point and connecting it to an WLC. Juniper Networks Regulatory Information Important safety instructions and compliance information that you must read before installing Juniper Networks products Juniper Networks Documentation Conventions Safety and Advisory Notices The following types of safety and advisory notices appear in this guide. This situation or condition can lead to data loss or damage to the product or other property. Informational Note: This information you should note relevant to the current topic. Informational Note: This alerts you to a possible risk of personal injury or major equipment problems. Hypertext Links Hypertext links appear in Blue. As an example, this is a link to Contacting the Technical Assistance Center. Text and Syntax Conventions Juniper Networks guides use the following text and syntax conventions: Convention Monospace text Bold text Italic text Use Sets off command syntax or sample commands and system responses. Highlights commands that you enter or items you select. Designates command variables that you replace with appropriate values or highlights publication titles or words requiring special emphasis. vi Copyright 2013, Juniper Networks, Inc.

Convention Bold italic text font Menu Name > Command Use Bold italic text font in narrative, capitalized or not, indicates a program name, function name, or string. Indicates a menu item. For example, File > Exit indicates that you select Exit from the File menu. [ ] (square brackets) Enclose optional parameters in command syntax. { } (curly brackets) Enclose mandatory parameters in command syntax. (vertical bar) Separates mutually exclusive options in command syntax. For information about Juniper Networks support services, visit http://www.juniper.net/, or call 1-866-877-9822 (in the US or Canada) or +1 925-474-2400 and select option 5. Informational Note: Juniper Networks sells and services its products primarily through its authorized resellers and distributors. If you purchased your product from an authorized Juniper Networks reseller or distributor and do not have a service contract with Juniper Networks, you must contact your local reseller or distributor for technical assistance. Contacting the Technical Assistance Center Contact the Juniper Networks Technical Assistance Center (TAC) by telephone, email, or via web support portal. Within the US and Canada, call 1-866-TRPZTAC (1-866-877-9822). Within Europe, call +31 35 64 78 193. From locations outside the US and Canada, call +1 925-474-2400. In non-emergencies, send email to http://www.juniper.net/ If you have a service contract or are a Juniper Networks Authorized Partner, log in to http://www.juniper.net/ to create a ticket online. TAC Response Time TAC responds to service requests as follows: Contact method Priority Response time Telephone Emergency One hour Non-emergency Next business day Email Non-emergency Next business day Information Required When Requesting Service To expedite your service request, please have the following information available when you call or write to TAC for technical assistance: Your company name and address Your name, phone number, cell phone or pager number, and email address Name, model, and serial number of the product(s) requiring service Software version(s) and release number(s) Copyright 2013, Juniper Networks, Inc. vii

Output of the show tech-support command Wireless client information Description of any problems and status of any troubleshooting effort Warranty and Software Licenses Current Juniper Networks warranty and software licenses are available at http://www.juniper.net/. Limited Warranty for Hardware and Software TERMS AND CONDITIONS OF SALE 1. Software Any software provided is licensed pursuant to the terms and conditions of Juniper Network s Software License Agreement, an electronic copy of which is provided with the software ("Software License Agreement") and a printed copy of which is available upon request. The Software License Agreement is incorporated by this reference into these Terms and Conditions of Sale (collectively referred to as "Terms and Conditions of Sale"). In the event of any conflict between the Software License Agreement and these Terms and Conditions of Sale, the Software License Agreement shall control, except for the terms of the limited hardware and software warranty set forth below ("Limited Warranty"). 2. Limited Hardware Warranty Juniper Networks, Inc. ("Juniper Networks") warrants solely to Customer, subject to the limitation and disclaimer below, that all Juniper Networks hardware will be free from defects in material and workmanship under normal use as follows: (a) if the hardware was purchased directly from Juniper Networks, for a period of one (1) year after original shipment by Juniper Networks to Customer, (b) if the hardware was purchased from a Juniper Networks Authorized Distributor or Reseller, for a period of one (1) year from the date of delivery to Customer, but in no event more than fifteen (15) months after the original shipment date by Juniper Networks, or (c) for certain indoor Mobility Point access points that are specifically identified on Juniper Network's price list for the lifetime of the hardware (each of the foregoing, the "Limited Hardware Warranty"). The date of original shipment from Juniper Networks will be determined by shipping evidence on file at Juniper Networks. This Limited Hardware Warranty shall not apply to any third party products provided under this Agreement which shall be subject exclusively to the manufacturers warranty for such products and extends only to the Customer who was the original purchaser of the hardware and may not be transferred to any subsequent repurchasing entity. During the Limited Hardware Warranty period upon proper notice to Juniper Networks by Customer, Juniper Networks will, at its sole option, either: Repair and return of the defective hardware; Replace the defective hardware with a new or refurbished component; Replace the defective hardware with a different but similar component that contains compatible features and functions; or Refund the original purchase price paid upon presentation of proof of purchase to Juniper Networks. 3. Restrictions on the Limited Hardware Warranty. viii Copyright 2013, Juniper Networks, Inc.

This Limited Hardware Warranty does not apply if the hardware (a) is altered from its original specifications, (b) is installed, configured, implemented or operated in any way that is contrary to its documentation, (c) has damage resulting from negligence, accident, or environmental stress, (d) was subject to unauthorized repair or modification, or (e) is provided to Customer for pre-production, evaluation or charitable purposes. 4. Limited Software Warranty Juniper Networks warrants solely to Customer, subject to the limitation and disclaimer below, that the software will substantially conform to its published specifications as follows: (a) if the software was purchased directly from Juniper Networks, for a period of ninety (90) days after original shipment by Juniper Networks to Customer, or (b) if the software was purchased from a Juniper Networks Authorized Distributor or Reseller, for a period of ninety (90) days from the date of delivery to Customer commencing not more than ninety (90) days after original shipment date by Juniper Networks), ("Limited Software Warranty"). The date of original shipment from Juniper Networks will be determined by shipping evidence on file at Juniper Networks. This Limited Software Warranty shall not apply to any third party products provided under this Agreement which shall be subject exclusively to the manufacturers warranty for such products and extends only to the Customer of original purchaser of the software and may not be transferred to any subsequent repurchasing entity. During the Limited Software Warranty period upon proper notice to Juniper Networks by Customer, Juniper Networks will, at its option, either: Use reasonable commercial efforts to attempt to correct or provide workarounds for errors; Replace the software with functionally equivalent software; or Refund to Customer the license fees paid by Customer for the software. Juniper Networks does not warrant or represent that the software is error free or that the software will operate without problems or disruptions. Additionally, and due to the steady and ever-improving development of various attack and intrusion technologies, Juniper Networks does not warrant or represent that any networks, systems or software provided by Juniper Networks will be free of all possible methods of access, attack or intrusion. 5. Restrictions on the Limited Software Warranty This Limited Software Warranty does not apply if the software (a) is altered in any way from its specifications, (b) is installed, configured, implemented or operated in any way that is contrary to its documentation, (c) has damage resulting from negligence, accident, or environmental stress, (d) was subject to unauthorized repair or modification, or (e) is provided to Customer for pre-production, evaluation or charitable purposes 6. General Warranty Disclaimer EXCEPT AS SPECIFIED IN THIS LIMITED WARRANTY, ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS, AND WARRANTIES INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTY OR CONDITION OF MERCHANTABILITY, FITNESS FOR A PARTICULAR APPLICATION OR PURPOSE, NONINFRINGEMENT, SATISFACTORY QUALITY OR ARISING FROM A COURSE OF DEALING, LAW, USAGE, OR TRADE PRACTICE, ARE HEREBY EXCLUDED TO THE EXTENT ALLOWED BY APPLICABLE LAW. TO THE EXTENT AN IMPLIED WARRANTY CANNOT BE EXCLUDED, SUCH WARRANTY IS LIMITED IN DURATION TO THE AFOREMENTIONED WARRANTY PERIOD. BECAUSE SOME STATES, COUNTRIES OR JURISDICTIONS DO NOT ALLOW LIMITATIONS ON HOW LONG AN IMPLIED WARRANTY LASTS, THE ABOVE LIMITATION MAY NOT APPLY. THIS LIMITED WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS, AND YOU MAY ALSO HAVE OTHER RIGHTS, WHICH VARY FROM JURISDICTION TO JURISDICTION. THE LIMITED WARRANTY ABOVE IS THE SOLE REMEDY FOR ANY BREACH OF ANY WARRANTY WITH RESPECT TO THE HARDWARE AND SOFTWARE AND IS IN LIEU OF ANY AND ALL OTHER REMEDIES. 7. Limitation of Liabilities Copyright 2013, Juniper Networks, Inc. ix

IN NO EVENT SHALL JUNIPER NETWORKS, ITS SUPPLIERS, OR ITS AUTHORIZED DISTRIBUTORS OR RESELLERS BE LIABLE TO CUSTOMER OR ANY THRID PARTY FOR ANY LOST REVENUE, PROFIT, OR DATA, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL, OR PUNITIVE DAMAGES REGARDLESS OF HOW THOSE DAMAGES WERE CAUSED. NOR WILL JUNIPER NETWORKS, ITS SUPPLIERS, OR ITS AUTHORIZED RESELLERS BE LIABLE FOR ANY MONETARY OR PUNITIVE DAMAGES ARISING OUT OF THE USE OF, OR INABILITY TO USE JUNIPER NETWORKS HARDWARE OR SOFTWARE. JUNIPER NETWORK S LIABILITY SHALL NOT EXCEED THE PRICE PAID BY THE CUSTOMER FOR ANY HARDWARE OR SOFTWARE COVERED UNDER THE TERMS AND CONDITIONS OF THIS WARRANTY. THIS LIMITATION OF LIABILITY AND RESTRICTION ON DAMAGES APPLIES WHETHER IN CONTRACT, TORT, NEGLIGENCE, OR OTHERWISE, AND SHALL APPLY EVEN IF THE LIMITED WARRANTY FAILS OF ITS ESSENTIAL PURPOSE. WARRANTY LAWS VARY FROM JURISDICTION TO JURISDICTION, AND THE ABOVE LIMITATIONS AND EXCLUSION OF CONSEQUENTIAL AND INCIDENTAL DAMAGES MAY NOT APPLY TO YOU, DEPENDING UPON YOUR STATE, COUNTRY OR JURISDICTION. 8. Procedures for Return of Hardware or Software under the Limited Warranty Where repair or replacement is required under the Limited Warranty, Customer will contact Juniper Networks and obtain a Return Materials Authorization number ("RMA Number") prior to returning any hardware and/or software, and will include the Juniper Networks RMA Number on all packaging. Juniper Networks will ship repaired or replacement components within a commercially reasonable time after receipt of any hardware and/or software returned for the Limited Warranty purposes to the address provided by Customer. Customer will pay freight and handling charges for defective return to the address specified by Juniper Networks and Juniper Networks will pay freight and handling charges for return of the repair or replacement materials to Customer. 9. Miscellaneous These Terms and Conditions of Sale and Limited Warranty shall be governed by and construed in accordance with the laws of the State of California without reference to that State's conflict of laws rules and as if the contract was wholly formed within the State of California. Customer agrees that jurisdiction and venue shall be in Santa Clara County, California. Under no circumstances shall the United Nations Convention on the International Sale of Goods be considered for redress of grievances or adjudication of any warranty or other disputes that include Juniper Networks hardware or software. If any provision of these Terms and Conditions of Sale are held invalid, then the remainder of these Terms and Conditions of Sale will continue in full force and effect. Where a Customer has entered into a signed contractual agreement with Juniper Networks for supply of hardware, software or services, the terms of that agreement shall supersede any terms contained within this Terms and Conditions of Sale and Limited Warranty. Customer understands and acknowledges that the terms of this Terms and Conditions of Sale and Limited Warranty, as well as material information regarding the form, function, operation and limitations of Juniper Networks hardware and software will change from time to time, and that the most current revisions will be publicly available at the Juniper Networks corporate web site (http://www.juniper.net/). x Copyright 2013, Juniper Networks, Inc.

Setting Up SmartPass SmartPass has evolved into a software tool that gives an IT manager full control over client access to WiFi networks. The network manager can fine tune access and authorization on the wireless LAN both for primary Users and Users on the network. With SmartPass, you not only allow or deny access but also change authorization attributes in response to conditions that change including location, time of day, and amount of traffic per user. This chapter describes the tasks required to configure SmartPass, and provides you with step-by-step instructions detailing each task. New Features in Smartpass 9.0 This document describes the new features in SmartPass 9.0 release. The new features are: Enhancements to Self Provisioning Feature on page 1 Third part SMS Gateway on page 2 Enhanced Security Certification through Chaining on page 3 Enhancements to Self Provisioning Feature Self provisioning feature allows a client to connect to a network using a web portal to define the user through which the access is made. Prior to this enhancement feature, communication between the client and SmartPass was done through the Clickatell based SMS gateway. With this enhancement, the communication is extended by: adding E-mail-to-SMS option including an E-mail option adding a third party SMS gateway to send user credentials E-mail-to-SMS-Option SmartPass release 9.0 allows you to create a web portal configuration with Email-to-SMS profile and send the user credentials to the client using the SMS gateway. In the Create a new User Account page, You must specify the carriers from the SMS profile associated with the user-type selected for the current web portal configuration. Informational Note: If you choose another carrier than that was specified in your SMS profile, then the SMS will not be delivered. If the web portal configuration has a user type with email-to-sms profile, a list of available carriers is displayed in the self generation page. SmartPass will also log the credentials sent to the user. Copyright 2013, Juniper Networks, Inc. New Features in Smartpass 9.0 1

Email Option Apart from receiving the user credentials through SMS, you can also receive the user credentials through E-mail. In the web portal self generation page, click the Send Credentials button to send an E-mail with the user credentials to the E-mail address that you provided. The E-mail will be sent only if the E-mail address field was populated with the E-mail address. For E-mail delivery, you must specify the same SMTP server that was configured in the SMTP profile associated with the user-type of the web portal configuration. When self generation is successful, the response contains the results of each operation SMS and E-mail. Third part SMS Gateway Apart from the Clickatell and email-to-sms options, the SMS with user credentials from the self generation page can be delivered through a third party SMS gateway defined by the SmartPass administrator. The SMS gateway is selected at the time of creating the SMS profile. The SMS profile associated with the user-type selected for this web portal configuration will use the new SMS gateway type. SmartPass can invoke the third party SMS gateway through a HTTP channel. The SmartPass administrator chooses the method to pass the parameters to the gateway, which will be either in text or XML format. You can specify the required information for the integration with the SMS gateway using the Edit SMS Gateway Profile page. Specify the following details in the Edit SMS gateway Profile page: Profile name Enter the profile name, for example, Intelecom. Username Enter the username. Password Enter the password for the specified username. URL Enter the gateway URL. Message Content Enter the message to be passed to the SMS gateway in XML or text format. Request Type Select Text or XML from the list Successful Response Content a string, when found in the response message, indicates that the SMS message operation was successful; if not present in the response, indicates that the SMS was not sent. It is not advisable to specify the exact message content while creating the SMS profile as some information like the destination or the text to be sent is determined during runtime. The SMS gateway password should also appear encrypted. For dynamic message creation, the following placeholders are provided: SMS_USERNAME SMS_PASSWORD SMS_MESSAGE SMS_DESTINATION 2 Third part SMS Gateway Copyright 2013, Juniper Networks, Inc.

Setting Up SmartPass The interface for a requested SMS gateway, Intelecom, is described below: The web address of the production system is smsgw.carrot.no and the Gateway servlet is accepting HTTP GET requests. The following input parameters are sent to the gateway: Table 1: Interface Parameters for Intelecom SMS Gateway Parameter Name Mandatory Comment Type Yes Text = 1 ServiceID Yes Unique identifier for service. Provided by Intelecom. Content Yes The content of the SMS message TTL No The validity of the message (Time to Live) Originator No The originator of the message Originator Type No The originator type: 1 = International (only available for free messages). 2 = Alphanumeric, max 11 chars (only available for free messages). 3 = Network specific (e.g. 1960) Recipient Yes The recipient MSISDN of the message in international format RSR No Request Status Report To indicate if CP wants to receive a delivery report who is CP? Username Yes For authorization Password Yes For authorization Priority No 1 = low 2 = medium 3 = high Differentiator No Set by the customer to differentiate between the different types of messages that are sent. Enhanced Security Certification through Chaining With SmartPass Release 9.0, for enhanced security connection, the new certificates are signed by multiple authorities. Prior to SmartPass 9.0, the application certificates were signed by only one certification authority (CA). With Smartpass 9.0, the certificates are signed by an intermediate certification authority, which in turn can be signed by either another intermediate CA or by the root CA, and this results in a chain of certificates. All the certificates in the certificate chain are saved in the SmartPass key store. In the Smartpass Server Settings page, you can request a Certificate Signing Request by clicking on the Create CSR button. You can submit this request to the Certification Authority. Usually the certificate authority that signs the Certificate Signing Request (CSR) provides two files: The signed certificate; it will be provided in the Reply Server Certificate (DER) field. A bundle containing the root CA and the intermediate CA(s); it will be uploaded in the Root/CA Certificate (DER) field. Copyright 2010, Juniper Networks, Inc. Enhanced Security Certification through Chaining 3

SmartPass extracts the certificates from the input files, builds a chain (by verifying that each certificate is signed by the next one from the chain) and saves the certificates in the key store. All the certificates in the chain are saved in one entry having the alias: sp_generated_keypair. The previous entry in the key store identified by this alias will be overridden. SmartPass also allows the certification authority to provide all the certificates through a single file. This file should be uploaded in the Reply Server Certificate field. If SmartPass is unable to build a certificate chain from the input files, the following error message is displayed: Incomplete certificate chain in reply. Features Introduced in SmartPass 8.0 The new features in SmartPass 8.0 release: IPv6 Addressing Support on page 4 Device Finger Printing on page 4 IPv6 Addressing Support The IPv6 addressing feature in SmartPass 8.0 provides support for Juniper's WLAN deployments, which allows IPv6 clients to seamlessly connect to Juniper's WLAN system. In this release, only IPv6 clients are supported; configuration of IPv6 addresses is not supported. The IPv6 addresses of clients is updated in SmartPass through RADIUS Accounting. Refer to RFC3162 for attributes to be used for RADIUS and IPv6 addresses. For more information on IPv6 addressing, see the book, Day One: Exploring IPv6. The IPv6 feature has no user interface changes. SmartPass can automatically detect if the client is using IPv6, IPv4 or both address types and display the IP address format. The features affected by IPv6 address support are: accounting, session monitoring, and IF-MAP features. In the accounting-update packets, different standard RADIUS attributes are used for IPv6. These attributes are used along with IPv4 attributes. In the Accounting History page, from the Session Monitoring area, SmartPass displays the IPv6 client addresses. The NAS IP addresses are IPv4 addresses only. IPv6 addresses are visible in the show details page on clicking the "Show" button in the monitoring table. SmartPass allows you to publish the IPv6 addresses. Device Finger Printing This release of SmartPass supports the device management feature called Bring Your Own Device or BYOD. The BYOD feature is applicable for devices not supported by the enterprise and it includes device provisioning, device policy management, and device monitoring. For more information on Device Finger Printing, see the Configuring Device Fingerprinting guide. SmartPass acts as a guest access management tool and also as a policy and captive portal server in customer networks. The requirements for this feature: 4 Features Introduced in SmartPass 8.0 Copyright 2013, Juniper Networks, Inc.

Setting Up SmartPass MSS interaction for captive portal and session management Policy management and impact on access rules Accounting and reporting MSS Interaction for Captive Portal and Session Management For SmartPass 8.0 release, the device-profile and device-type information is delivered to SmartPass through accounting updates as VSAs from MSS. Device-Profile, Device-Type, Device Group, and Allowed Devices A new VSA called device profile is delivered to SmartPass from MSS through accounting updates. An operator with the same name is also added to the user type definition. However, it can be overridden at user level. Two new operators device type and device group are delivered as VSAs from MSS through accounting updates. Allowed devices operator is defined in user type definition page with override possibility at user level. It contains a list (separated by comma) of the devices types that will be allowed to connect as the specified user. These operators (device profile, device type, device group, and allowed devices) will be available with the WLM-SP-GA-xx and WLM-SP-SM-xx licenses. Policy Management and Impact on Access Rules Access Rules Creation Page SmartPass access rules include two new conditions in the Step 1 of the Create Access Rule wizard: To check if the session has a certain device profile (from accounting start or update). A free form label is available along with wild-cards to set the device profile (or pattern). To check if the session has a certain device-type value (received in accounting start or update). A free form label is available to set the device-type. Copyright 2010, Juniper Networks, Inc. Features Introduced in SmartPass 8.0 5

You must specify the device type and device profile if you select the check-boxes against With the Specified Device Type and With the Specified Device Profile. You can select the following attributes from the Access Rule Action - Rule 1 page of the Create Access Rule wizard. 6 Features Introduced in SmartPass 8.0 Copyright 2013, Juniper Networks, Inc.

Setting Up SmartPass The Create User Type page from the User Types menu will include two new operators: the Device Profile and Allowed Devices in the User Type - Authorization Attributes-<profile name> page in Step 4 of 6. You can also define the device profile and the allowed devices attributes from the Create User wizard. A global setting is provided to select the attributes SmartPass sends. By default, the attributes from the User Type Creation page have priority. The attributes Device Profile and Allowed Devices are available when a user is created through the Web API. To access the Web API, you need the WLM-SP-Security license. For accounting and reporting purposes, the device type associated with the session is displayed in the session monitoring page. The new Device-Type column from the Session Monitoring page displays the device types received from MSS as VSA accounting updates.you can view the received Device Profiles and applied Device Profiles by clicking the show details link from the Session Monitoring page. Features Introduced in Smartpass 7.7 The features introduced in SmartPass 7.7 release: Copyright 2010, Juniper Networks, Inc. Features Introduced in Smartpass 7.7 7

Password Management Enhancement The Password Management feature allows SmartPass administrators to enforce strong password management facility based on the user type. You can enforce password restrictions like minimum and maximum length, expiration interval, and inclusion of character types. For details, see Password Management Enhancement. Third Party NAS/RADIUS Dictionary Support The third party NAS/RADIUS dictionary feature allows you (SmartPass administrators) to use SmartPass with a 3rd party NAS and to provide guest access. You can import vendor specific dictionary to communicate with a NAS provided by that vendor. For details, see Third Party NAS/RADIUS Dictionary Support. Configuring the IF-MAP Server The SmartPass administrator can configure the IF-MAP server to which SmartPass publishes the metadata information. The role of SmartPass in authenticating and authorizing users and providing dynamic authorization based on rules and policies set by the network administrator can be expanded through the IF-MAP interface. On the network side, SmartPass continues to provide authentication and authorization function using a RADIUS interface, but will offer added intelligence to the network by publishing guest user specific metadata to an IF-MAP server. See, Publishing the IF-MAP Data. Licensing SmartPass Licensing The licensing scheme used by SmartPass includes new SKUs that are more functional and solution based. SmartPass SKUs: Guest Access Subscriber Management Security SmartPass Evaluation licenses (SP-EVAL) SP-EVAL licenses have all SmartPass functionalities available for 50 users and are valid for 90 days from activation. Guest Access Licensing The Guest Access License allows the Administrator, Provisioner and Self-Signed User roles to provision guest access, create custom user types, upload bulk users and access the API calls that are specific to that function. Table 2: Guest Access Licensing SKU SP-GA-Base SP Comments / Description SmartPass Guest Access Base License; Includes 50 guest accounts SP-GA-50 SmartPass Guest Access License for additional 50 guests; requires current / previous purchase of SP-GA-BASE or SP (SmartPass 7.1 and earlier) 8 Licensing Copyright 2013, Juniper Networks, Inc.