The hotspot can be enabled or disabled by clicking on the main switch at the top of the page. When enabled (i.e., the switch is green ), one of three roles can be selected:
When the hotspot is used as a Master all the configuration data, even those of the satellites, e.g., user database, portal configuration, setting, logs, and so on, are stored locally and the management tasks are performed on this hotspot.
This role can only be Standalone hotspot on small appliances while bigger appliances can also be a Master, i.e., they store all the administrative settings and data that are reused by the satellite hotspots, which can connect to the master by means of OpenVPN accounts (see below).
For the Master role, one setting is available and also the available VPN accounts are shown that can be assigned to the satellites.
This is the Master Hotspot’s password. Remote satellite systems need to use it to connect to the master hotspot. If this field is left blank, a new random password will be generated.
The list of available OpenVPN tunnels for use in connecting a remote satellite system. One or more systems can be selected from this list.
A satellite hotspot does not store any configuration, but relies on the Master to verify user data, ticket availability, and all the settings. When selecting this option, the IP address and the password of the Master hotspot must be specified, along with the VPN tunnel name (see below). In detail, these are the available options:
Specify in this field the IP address of the master hotspot, which is usually the first IP address available in the special OpenVPN subnet (see The zones) defined in the OpenVPN server settings (under ) of the Master hotspot.
The Master hotspot password. This is typically auto-generated on the Master. Click on the Show checkbox to reveal the password mask.
From this drop-down menu, select the OpenVPN tunnel used to reach the Master hotspot.
In this configuration, the hotspot relies on an external RADIUS server, like FreeRadius for its activities: It connects and ask for authentication to the RADIUS server, which stores all the data about accounting, settings, ticketing and connections. Several information about the RADIUS server are required for its correct functioning: the IP address, password, and ports, the IP address of the fallback server. Additionally, the external portal can be used.
The IP address of the external RADIUS Server.
The IP address of the fallback external RADIUS Server.
The password for the RADIUS Server. Click on the Show checkbox to reveal the password.
The RADIUS Server AUTH (Authentication) port number.
The RADIUS Server ACCT (Accounting) port number.
The RADIUS Server COA (Change of Authorisation) port number.
Hint
The default values for the RADIUS port are: 1812 (AUTH), 1813 (ACCT), and 3799 (COA)
When this option is chosen, an external portal can be configured as the login interface that the users see when they want to connect through the hotspot. The external portal must be compatible and communicate with chilli. The following options should be configured to activate the external portal.
The location on which the portal is located.
The Network Access Server Identifier of the RADIUS server that identifies the portal.
The UAM shared secret from the external RADIUS server. While it is possible to not define a value for this option, it is suggested to define it, since it improves security.
A list of websites accessible even without registering to the hotspot.
Allows clients without an active DHCP client to connect to the hotspot.
Note
The setup of a RADIUS server is not discussed here since it is outside the scope and duties of Endian, who does not provide assistance in this task.
Master/Satellite roles and VPN.
The Master/Satellite roles can prove useful when wide areas should be covered and one hotspot does not suffice. When such an architecture is employed, all the management tasks for users and tickets are carried out on the master only. On the satellite systems only the Reports section (under the hotspot administration Interface) will be available.
Any Endian Hotspot Appliance can be used as both Master and Satellite system, except for the smallest appliances which can act only as a either a Standalone or a Satellite system.
The connection between the Master and its satellites is set up by creating OpenVPN accounts on the Master, using one for each Satellite, and creating a VPN tunnel between each Master-Satellite pair. Many tasks have to be competed before setting up this configuration, both on the Master and the Satellite systems, that are grouped in two parts, each encompassing operations to be carried out on either the Master, in which case they are labelled with M#, or on the Satellite, labelled with S#.
When a Master and one (or more) Satellite hotspots have already been configured, an additional Satellite only requires that only tasks M3, M4, and M5 on the Master be carried out, but all tasks on the Satellite.
M0. Set the hotspot as standalone (This is optional).
M1. On the The VPN Menu section ( ), set up the hotspot as OpenVPN server with a routed connection type and an ad-hoc network range (say xxx.yyy.zzz.0/24) that must be different from the subnets of the other Endian Hotspot Appliance zones.
M2. A new virtual interface is created that routes the traffic from the OpenVPN tunnels. The Master acquires the IP xxx.yyy.zzz.1 (i.e., the first available IP address in the network range) and acts as the gateway for all the OpenVPN tunnels.
M3. Create one unique OpenVPN account for each remote satellite system (from under
) The OpenVPN account must be configured with a static IP address. The IP addresses assigned to the satellites must fall within the subnet defined in step M1. Within that subnet, IP addresses ending with 0, 255, and the first IP of the subnet range are not available to Satellites.Hint
Good practices suggest to assign to each new Satellite the lowest IP available, so that they remain in order.
Once all the necessary client accounts have been created and before activating the Master/Satellite configuration, it is necessary to verify that the OpenVPN connection be setup correctly. Hence, on the Satellite side two steps are needed:
S1. Create the OpenVPN client account (
), using one of the accounts created at step M3.S2. Connect to the Master and verify that the connection is established and the traffic can flow.
Now it is possible to activate the Master and complete the setup:
M4. Open the Hotspot settings page and enable the necessary VPN account in the list of hotspot satellite systems.
M5. Click on Save and then on Apply to activate the changes.
The set up of the master is now finished, so proceed to complete the Satellite setup:
S3. Enter the hotspot menu, choose the Satellite hotspot, enter the first IP address available in the OpenVPN subnet of the Master and the Master hotspot password, and select the Hotspot VPN tunnel from the drop-down menu.
S4. Click on Save and then on Apply to activate the changes.
To verify that the satellite system is properly connected, open the satellite system’s Hotspot Administration interface: Only a limited interface shows up, containing the Reports section and nothing else: all the management’s task are delegated to the Master.
The setup is now complete: both the Master and the Satellite systems are correctly working.
When the role of the Hotspot is Master / Standalone hotspot, it has now the ability to rely on an external resource only for the purpose of authenticating the users, while keeping accounting, logging, user database, and all other settings locally on the Endian Hotspot Appliance. In other words, the data of a user are copied locally from the external server, either a RADIUS or a LDAP server, allowing her to provide her credentials of the remote server and immediately use the hotspot, without the need to create a new account.
To allow the Hotspot to connect to the remote server and retrieve the data, there is an option available:
By ticking this checkbox, the two possible remote authentication modalities are shown, together with all the necessary options to configure them.
This drop-down menu allows to choose one of the two supported servers, either LDAP or RADIUS and changes the configuration options displayed accordingly.
Note
The additional configuration options that will appear are very similar to those that appear in
.For the LDAP server, the following configuration options are available (see the example on the right for more details):
The drop-down menu allows to choose one of the supported LDAP server types: Generic, active directory, or Novell eDirectory.
The IP address or hostname of the LDAP server, in LDAP format.
Hint
The port specification, if needed, can be written after the URL, like e.g., ldap://192.168.0.20:389/. The standard port, 389, can safely be omitted.
This settings define the Distinguished Name of the LDAP server, i.e., the top level node of the LDAP’s tree structure.
The username to be used for querying the DN. It is necessary to retrieve and authenticate the credentials of the Hotspot’s users.
The password for the user specified in the previous option. A click on the checkbox on the right shows or hides the characters.
The string that shall be used to query the remote LDAP server.
The IP address or hostname of the LDAP fallback server, in LDAP format, that shall be used when the primary server is not reachable.
The rate that shall be associated to each users that authenticate through this method.
For the RADIUS server, the following configuration options are available:
The IP address or URL of the RADIUS server.
The port on which the RADIUS server is listening.
An additional identifier.
The password to be used.
The IP address or URL of the fallback RADIUS server, used when the primary server is not reachable.
The rate that shall be associated to each users that authenticate through this method.