Description:
This article describes, how the Content Filter and Public Spot can be configured for a guest network and how the traffic from the guest network can be routed via a separate Internet connection:
This scenario provides up to 128 user accounts for using the Public Spot. To operate a greater number of Public Spot user accounts you will require a 19xx series router, a WLAN-Controller, a Central Site Gateway with the Public Spot XL option or a vRouter (as of vRouter 500).
Requirements:
- LCOS as of version 9.24 (download latest version)
- LANtools as of version 9.24 (download latest version)
- Two configured and functioning Internet connections
- Activated Public Spot option
- Activated Content Filter option
The use of the device with active Public Spot as gateway and DNS server in the Public Spot network is mandatory!
The management ports for HTTP (port 80) and HTTPS (port 443) must not be changed and have to be left on the default values! Please refer to this article in our Knowledge Base (see steps 1.8) - 1.9)).
If the integrated SSL certificate is used, a warning is displayed when invoking an HTTPS website due to an unknown certificate! Please refer to this article in our Knowledge Base (see "Security notice for the SSL-HTTPS certificate").
Scenario:
- A LANCOM 1790VAW is used as a central router. A Public Spot option and a Content Filter option (e.g. 10 users, 3 years of validity) are enabled on the device.
- The LANCOM 1790VAW is already set up with two functioning DSL connections. The first Internet connection (INTERNET1) operates via the router's VDSL modem, the second Internet connection (INTERNET2) is operated via an external modem connected to Ethernet port 4 (ETH-4).
- The Internet connection INTERNET1 is assigned the routing tag 0.
- The Internet connection INTERNET2 is assigned the routing tag 1.
- The LANCOM 1790VAW is to be set up with a local administration network with the IP address range 192.168.10.0/24), which must meet the following requirements:
- The administration network is to be configured on the port ETH-1 on the LAN side, and on the WLAN side on the logical WLAN interface WLAN-1.
- The WLAN's SSID is given the name Administration. Authentication in the WLAN uses the encryption method WPA2.
- Users of the administration network may access the Internet connection INTERNET1 only.
- The LANCOM 1790VAW is to be set up with a separate network for the guests with the IP address range 192.168.20.0/24 (also LAN & WLAN). This guest network must meet the following requirements:
- The guest network requires one (cabled) LAN connection for an Internet terminal. This connection is to be configured on the port ETH-2.
- The guest network also offers a wireless LAN (with its own SSID, Guests and the logical interface WLAN-1-2).
- Access to the guest network will be implemented and controlled by the Public Spot function.
- The administration network is to be inaccessible from the guest network.
- Users of the guest network may access the Internet connection INTERNET 2 only.
- Internet pages accessed from the guest network are to be checked by the content filter. Ten users are to be allowed to use content filter per day. In case of an eleventh user (or more), Internet access is to be blocked for this/these user/s.
Procedure:
1) Setting up the local networks for administration and guests:
1.1) Open the configuration of the LANCOM router in LANconfig and navigate to the menu IPv4 → General → IP networks.
1.2) Select the network INTRANET and click Edit. This network is used for the administration.
1.3) Modify the following parameters:
- IP address: Enter an IP address from administration network (in this example 192.168.10.1).
- Netmask: Enter the corresponding subnetmask for the administration network (in this example 255.255.255.0).
- Interface assignment: Make sure, that the bridge group BRG-1 is selected (the bridge group which, later in the course of the configuration, will group together the Ethernet port ETH-1 with the logical wireless LAN interface WLAN-1).
1.4) Create a new network for the guests and enter the following parameters:
- Network name: Enter a descriptive name (in this example GUESTS).
- IP address: Enter an IP address from the guest network (in this example 192.168.20.1).
- Netmask: Enter the corresponding netmask for the guest network (in this example 255.255.255.0).
- Interface assignment: Select the bridge group BRG-2 (the bridge group which, later in the course of the configuration, will group together the Ethernet port ETH-2 with the logical wireless LAN interface WLAN-1-2).
- Interface tag: Enter the tag 1 (this interface tag ensures that the guest network cannot access the administration network.)
Networks with an interface tag can only communicate with a network with the same tag. Networks with the interface tag 0 can communicate with all networks, regardless of the interface tag. This means, that the network INTRANET can communicate with the network GUESTS. Communication from the network GUESTS to the network INTRANET is not possible.
1.5) The table IP networks should then appear as follows:
1.6) Go to the menu IPv4 → DHCPv4 → DHCP networks.
1.7) Select the network INTRANET and click Edit.
1.8) For the parameter DHCP server enabled select the option Yes.
1.9) Click Add to create a new DHCP network.
1.10) Modify the following parameters:
- Network name: In the dropdown menu select the guest network created in step 1.4) (in this example GUESTS).
- DHCP server enabled: Select the option Yes.
2) Configuring the WLAN settings:
2.1) Go to the menu Wireless LAN → General and select the Country, the router is operated in (in this example United Kingdom).
2.2) Go to the menu Wireless LAN → General Physical WLAN settings.
2.3) Set the checkbox WLAN interface enabled, to activate the WLAN interface.
In this example, the rest of the physical parameters are left on the default settings.
2.4) Go to the menu Logical WLAN settings and select the WLAN network 1. This is to be used for the administration network.
2.5) Modify the following parameters:
- Make sure, that the checkbox WLAN network enabled is set.
- For the Network name (SSID) enter a descriptive name for the SSID (in this example Administration).
2.6) Change to the tab Encryption and enter a WPA key for the parameter Key 1/passphrase.
The WPA key must have at least 8 and a maxium of 63 characters.
2.7) In the Logical WLAN settings click on the WLAN network 2. This is to be used for the guest network.
2.8) Modify the following parameters:
- Activate the SSID by checking WLAN network enabled.
- For the Network name (SSID) enter a descriptive name for the SSID (in this example Guest).
- Set the parameter Direct traffic between stations to Deny (for all APs in LAN), so that WLAN clients in the guest WLAN cannot communicate with each other.
2.9) Switch to the tab Encryption and untick the checkbox Encryption activated.
Encryption for the guest WLAN is not needed, as the authentication of the WLAN clients is done via the Public Spot.
3) Configuring the interfaces:
3.1) Go to the menu Interfaces → LAN → Ethernet ports and click on the interface ETH 2.
3.2) For Interface usage, select the option LAN-2 in the dropdown menu.
3.3) Go to the menu LAN bridge.
3.4) Switch to the menu Port table.
3.5) Whether users are in the administration or guest networks, the LAN and WLAN networks are each to be accessible at the same respective IP address. To achieve this, we must combine the logical interfaces for the LAN and WLAN into what are known as bridge groups. The following have to be grouped:
- Network INTRANET:
- LAN port ETH-1 is to be grouped with the logical WLAN interface WLAN-1 into bridge group 1 (BRG-1).
- Network GUESTS:
- LAN port ETH-2 is to be grouped with the logical WLAN interface WLAN-1-2 into bridge group 2 (BRG-2).
Make sure, that the logical interfaces LAN-1 and WLAN-1 are assigned the bridge group BRG-1.
For the logical interfaces WLAN-1-2 and LAN-2 assign the bridge group BRG-2.
The port table must now look as follows:
4) Setting up the Public Spot function for the GUESTS network:
4.1) Go to the menu Public-Spot → Authentication and activate the option Authenticate with name and password.
4.2) Go to the menu Public-Spot → Server → Operational settings.
4.3) Go to the menu Interfaces.
4.4) Activate the user authentication for the interfaces WLAN-1-2 and LAN-2.
The table Interfaces must now look as follows:
4.5) Go to the menu Public-Spot → Users → RADIUS server.
4.6) A reference to the integrated RADIUS server has to be entered in this menu.
In the default settings the entry LOCAL is present. It refers to the integrated RADIUS and Accounting server .
If no entry exists, please create one and give it a descriptive name.
Make sure, that the parameters are set as follows:
- Auth. server address: 127.0.0.1
- Auth server port: 1812
- Acc. server address: 127.0.0.1
- Acc server port: 1813
4.7) Go to the menu RADIUS → Server and activate the options RADIUS authentication active, RADIUS accounting active as well as the feature Auto cleanup user table.
4.8) Go to the menu RADIUS → Server → RADIUS services ports.
4.9) Make sure, that the port 1812 is used as Authentication port and the port 1813 is used as Accounting port.
4.10) The manual configuration steps are completed for now. Write the configuration back to the router.
5) Setting up the Content Filter function for the GUESTS network:
A further requirement of our scenario is for Internet access in the GUESTS network to be regulated by the Content Filter. In this example, a Content Filter license for 10 users is used. The Internet access for an eleventh (or more) content-filter user should be blocked.
When setting up the content filter for the first time, we recommend that you use the Setup Wizard.
In this example, we will carry out a basic configuration of the Content Filter. There are many more configuration options. Information is available in the Reference manual or in the LANCOM Support Knowledge Base.
5.1) Select the router in LANconfig, perform a rightclick and, in the context menu select the option Setup Wizard.
5.2) Select the option Content Filter Setup and confirm with Next.
5.3) Confirm the following dialog with Next.
5.4) In this example we use the Basic security profile, as this suffices to set up the essential security parameters. Click Next afterwards.
5.5) Close the Setup Wizard by clicking on Finish.
5.6) Open the configuration dialog of the LANCOM router in LANconfig and go to the menu Content Filter → General.
Make sure that the Content filter is active and that the option In case of license exceedance is set to Forbidden. This ensures that Internet access is blocked for an eleventh (or more) users according to the requirements of our scenario.
6) Routing the traffic from the guest network via the Internet connection INTERNET2:
Without modifying additional settings, all traffic is routed via the default route with the routing tag 0 (in this case the Internet connection INTERNET1). Therefore there is no action required for the administration network. For the guest network additional configuration steps are necessary to ensure, that its traffic is routed via the Internet connection INTERNET2.
6.1) Go to the menu Firewall/Qos → IPv4 Rules → Rules.
6.2) Select the rule CONTENT-FILTER activated by the setup wizard and click Edit.
6.3) For the parameter Routing tag enter tag 1 to ensure, that websites (HTTP and HTTPS) are routed via the Internet connection INTERNET2.
6.4) Switch to the tab Stations and delete the object LOCALNET.
The object LOCALNET contains all local networks and therefore has to be removed.
6.5) For the Connection source click Add → Add custom station.
6.6) For the Network name select the network GUESTS, so that only this network is checked by the Content Filter.
6.7) Click Add to create an additional firewall rule to ensure, that all traffic except HTTP and HTTPS is also routed via the Internet connection INTERNET2.
6.8) Enter a descriptive name and enter the Routing tag 1 to ensure, that all traffic is routed via the Internet connection INTERNET2.
6.9) Switch to the tab Actions and delete the object REJECT.
6.10) Add the object ACCEPT.
6.11) Switch to the tab Stations, select the option connections from the following stations and click Add → Add custom station.
6.12) For the Network name select the network GUESTS.
6.13) The Firewall Rules table has to look as follows:
6.14) This concludes the configuration. Write the configuration back to the router.