Summary of the content on the page No. 1
Fortress Security System
Secure Wireless
Access Bridge
User Guide
www.fortresstech.com
© 2006 Fortress Technologies
Summary of the content on the page No. 2
Summary of the content on the page No. 3
Fortress Bridge Fortress Secure Wireless Access Bridge 2.6.1 Copyright © 2006 Fortress Technologies, Inc. All rights reserved. This document contains proprietary information protected by copyright. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, without written permission of Fortress Technologies, 4023 Tampa Road, Suite 2000, Oldsmar, FL 34677, except as specified in the Product Warranty and License Terms. FORTRESS TECHNOLOGIES,
Summary of the content on the page No. 4
Fortress Bridge DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE
Summary of the content on the page No. 5
Fortress Bridge: Table of Contents Table of Contents 1 Introduction 1 Fortress Secure Wireless Access Bridge . . . . . . . . . . . . . . . . . . . . .1 Management Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Bridge GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Bridge CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary of the content on the page No. 6
Fortress Bridge: Table of Contents Installation Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Outdoor Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Connecting the Bridge for Preconfiguration . . . . . . . . . . . . . . . . . . . . . . . . 12 Preconfiguring the Bridge for Outdoor Operation . . . . . . . . . . . . . . . . . . . . 12 Weatherizing the Bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary of the content on the page No. 7
Fortress Bridge: Table of Contents 802.1X Server and LAN Port Settings . . . . . . . . . . . . . . . . . . . . . . 35 802.1X Authentication Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 LAN Port 802.1X Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Bridge Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary of the content on the page No. 8
Fortress Bridge: Table of Contents Trusted Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Adding Trusted Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Editing Trusted Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Deleting Trusted Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Visitor Access through Trusted Devices . . . . . .
Summary of the content on the page No. 9
Fortress Bridge: Table of Contents Getting Help in the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Command Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Configuration in the Bridge CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 LAN Settings in the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Spanning Tree Protocol in the CLI . . . . . . . . . . . . . . . . . . . . . .
Summary of the content on the page No. 10
Fortress Bridge: Table of Contents Secure Automatic Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . .105 Preconfiguring a New Network Deployment with SAC . . . . . . . . . . . . . . . . 106 Connecting the Bridges for Preconfiguration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .106 Automatically Preconfiguring Network Bridges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .106 Reconfiguring Network Settings with SAC . . . . . . . . . . . . . . .
Summary of the content on the page No. 11
Fortress Bridge: Introduction Chapter 1 Introduction 1.1 Fortress Secure Wireless Access Bridge The Fortress Secure Wireless Access Bridge is an all-in-one network access device with the most stringent security available today built in. It can serve as a wireless bridge, a WLAN access point, and an eight-port LAN switch, while performing all the functions of a Fortress controller device: encrypting wireless traffic and providing Multi-factor Authentication for devices on the network it pro
Summary of the content on the page No. 12
Fortress Bridge: Introduction 1.1.1.2 Bridge CLI The Bridge’s command-line interface provides administration and monitoring functions via a command line. It is accessed over the network via the Bridge’s IP address or through a terminal connected directly to the Bridge’s serial Console port. 1.1.1.3 SNMP The Bridge supports versions 1 and 2 of the Simple Network NOTE: You cannot configure SNMP Management Protocol (SNMP) Internet standard for network management on a For- management. The Fortre
Summary of the content on the page No. 13
Fortress Bridge: Introduction 3) User authentication requires the user of a connecting device to enter a recognized user name and valid creden- tials, a password, for example, or a digital certificate. The Fortress Security System can authenticate users locally or through existing user-authentication provisions. 1.3.2 Strong Encryption at the MAC Layer Fortress ensures network privacy at the Media Access Control (MAC) sublayer, within the Data Link Layer (Layer 2) of the Open System Interco
Summary of the content on the page No. 14
Fortress Bridge: Introduction 1.3.5 Deployment Options The Fortress Security System is flexible and expandable. Figure 1.1 Example Point-to-Multipoint Deployment of the Fortress Secure Wireless Access Bridge 4
Summary of the content on the page No. 15
Fortress Bridge: Introduction The Bridge can provide a secure edge for a WLAN (or infrastructure-mode) deployments, as shown in Figure 1.1 1.4 This Document WARNING: can cause physical in- This user guide assumes its users have a level of expertise jury or death to you consistent with a professional Network Administrator. and/or your equipment. 1.4.1 Document Conventions This is a task-oriented document, and the procedures it CAUTION: can cor- contains are, wherever possible, self-contained an
Summary of the content on the page No. 16
Fortress Wireless Access Bridge: Installation Chapter 2 Installation 2.1 Introduction The Fortress Secure Wireless Access Bridge is a full-featured NOTE: Only essen- tial configuration Fortress controller device, providing strong data encryption and settings, as required for Multi-factor Authentication™, including native RADIUS basic installation, are authentication, to users and devices on the network it secures. covered in this chapter. The Bridge additionally comprises three, independent n
Summary of the content on the page No. 17
Fortress Wireless Access Bridge: Installation 2.1.2 Compatibility The Fortress Bridge is fully compatible with Fortress Secure Client versions 2.4 and higher. 2.2 Preparation 2.2.1 Shipped and Optional Parts Included in each Fortress Bridge shipment are: Fortress Secure Wireless Access Bridge, comprising: one eight-port Ethernet LAN switch one PoE Ethernet WAN port two USB ports one 802.11 a/b/g multi-mode radio one 802.11a radio two lightning arrestor modules one universal AC-to-48V DC
Summary of the content on the page No. 18
Summary of the content on the page No. 19
Fortress Wireless Access Bridge: Installation General: This equipment must be installed by qualified WARNING: The Bridge contains a service personnel according to the applicable installation 3V (7 year) lithium bat- codes. Do not locate the Bridge or antennas near power tery for time-keeping lines or power circuits. When installing an external antenna, purposes. It is not in- take extreme care not to come into contact with such tended to be operator- circuits as they can cause serious injur
Summary of the content on the page No. 20
Fortress Wireless Access Bridge: Installation PoE powered from a remote 802.11af (13 Watt) PoE midspan source. Circuit Overloading: The Bridge includes a 48 V main resettable fuse specified at 1.8 A. Lightning/Electrostatic Protection: The Bridge’s antenna ports conform to IEC1000-4-5 10 KV 8/20us waveform. The WAN port conforms to IEC-61000-4-2 8 KV waveform with 58 V additional transient protection. Grounding: The Bridge features a rear panel grounding stud which, on Bridges with exte