Remote Access Points. Aruba M3MK1, 7024, 7240, 620, 7280, 650, ArubaOS 6.5.3.x, 3200
Add to My manuals1162 Pages
advertisement
![Remote Access Points. Aruba M3MK1, 7024, 7240, 620, 7280, 650, ArubaOS 6.5.3.x, 3200 | Manualzz Remote Access Points. Aruba M3MK1, 7024, 7240, 620, 7280, 650, ArubaOS 6.5.3.x, 3200 | Manualzz](http://s3.manualzz.com/store/data/065045702_1-408b09793e6f944b7784da0f06210a05-360x466.png)
Chapter 32
Remote Access Points
The Secure Remote Access Point Service allows AP users, at remote locations, to connect to an Aruba controller over the Internet. Because the Internet is involved, data traffic between the controller and the remote AP is
VPN encapsulated. That is, the traffic between the controller and AP is encrypted. Remote AP operations are supported on all of Aruba’s APs.
Topics in this chapter include: n n n n n n n n n n n n n
About Remote Access Points on page 701
Configuring the Secure Remote Access Point Service on page 703
Deploying a Branch/Home Office Solution on page 709
Enabling Remote AP Advanced Configuration Options on page 714
Understanding Split Tunneling on page 728
Understanding Bridge on page 734
Provisioning Wi-Fi Multimedia on page 739
Reserving Uplink Bandwidth on page 739
Provisioning 4G USB Modems on Remote Access Points on page 740
Configuring RAP-3WN and RAP-3WNP Access Points on page 745
Converting an IAP to RAP or CAP on page 746
Enabling Bandwidth Contract Support for RAPs on page 747
About Remote Access Points
Remote APs connect to a controller using Extended Authentication and Internet Protocol Security
(XAuth/IPSec). AP control and 802.11 data traffic are carried through this tunnel. Secure Remote Access Point
Service extends the corporate office to the remote site. Remote users can use the same features as corporate office users. For example, voice over IP (VoIP) applications can be extended to remote sites while the servers and the PBX remain secure in the corporate office.
For both RAPs and CAPs, tunneled SSIDs will be brought down eight seconds after the AP detects that there is no connectivity to the controller. However, RAP bridge-mode SSIDs are configurable to stay up indefinitely
(always-on / persistent). For CAP bridge-mode SSIDs, the CAP will be brought down after the keepalive times out (default 3.5 minutes).
Secure Remote Access Point Service can also be used to secure control traffic between an AP and the controller in a corporate environment. In this case, both the AP and controller are in the company’s private address space.
The remote AP must be configured with the IPSec VPN tunnel termination point. Once the VPN tunnel is established, the AP bootstraps and becomes operational. The tunnel termination point used by the remote AP depends upon the AP deployment, as shown in the following scenarios: n
Deployment Scenario 1: The remote AP and controller reside in a private network which secures AP-tocontroller communication. (This deployment is recommended when AP-to-controller communications on a private network need to be secured.) In this scenario, the remote AP uses the controller’s IP address on the private network to establish the IPSec VPN tunnel.
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 701
Figure 94 Remote AP with a Private Network n
Deployment Scenario 2: The remote AP is on the public network or behind a NAT device and the controller is on the public network. The remote AP must be configured with the tunnel termination point, which must be a publicly-routable IP address. In this scenario, a routable interface is configured on the controller in the
DMZ. The remote AP uses the controller’s IP address on the public network to establish the IPSec VPN tunnel.
Figure 95 Remote AP with Controller on Public Network n
Deployment Scenario 3: The remote AP is on the public network or behind a NAT device and the controller is also behind a NAT device. (This deployment is recommended for remote access.) The remote AP must be configured with the tunnel termination point, which must be a publicly-routable IP address. In this scenario, the remote AP uses the public IP address of the corporate firewall. The firewall forwards traffic to an existing interface on the controller. (The firewall must be configured to pass NAT-T traffic (UDP port 4500) to the controller.)
Figure 96 Remote AP with Controller Behind Firewall
In any of the described deployment scenarios, the IPSec VPN tunnel can be terminated on a local controller, with a master controller located elsewhere in the corporate network (
Figure 97 ). The remote AP must be able to
communicate with the master controller after the IPSec tunnel is established. Make sure that the L2TP IP pool configured on the local controller (from which the remote AP obtains its address) is reachable in the controller network by the master controller.
702 | Remote Access Points ArubaOS 6.5.3.x | User Guide
Figure 97 Remote AP in a Multi-Controller Environment n n n
Configuring the Secure Remote Access Point Service
The tasks for configuring an Aruba Access Points as a Secure Remote Access Point Service are:
Configure a public IP address for the controller.
You must install one or more AP licenses in the controller. There are several AP licenses available that support different maximum numbers of APs. The licenses are cumulative; each additional license installed increases the maximum number of APs supported by the controller.
Configure the VPN server on the controller. The remote AP will be a VPN client to the server.
Provision the AP with IPSec settings, including the username and password for the AP, before you install it at the remote location. You can also provision the RAP using the zero touch provisioning method. For more information, see
Provisioning 4G USB Modems on Remote Access Points on page 740 .
Configure a Public IP Address for the Controller
The remote AP requires an IP address to which it can connect to establish a VPN tunnel to the controller. This can be either a routable IP address you configure on the controller, or the address of an external router or firewall that forwards traffic to the controller. The following procedure describes how to create a DMZ address on the controller.
In the WebUI
1. Navigate to the Configuration > Network > VLANs page.
2. Click Add to add a VLAN.
3. Enter the VLAN ID.
4. Select the port that belongs to this VLAN.
5. Click Apply .
6. Navigate to the Configuration > Network > IP page.
7. Click Edit for the VLAN you just created.
8. Enter the IP Address and Net Mask fields.
9. Click Apply .
In the CLI
(host) (config) #vlan <id>
(host) (config) #interface fastethernet <slot/module/<port> switchport access vlan <id>
(host) (config) #interface vlan <id> ip address <ipaddr> <mask>
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 703
Configure the NAT Device
Communication between the AP and the secure controller uses the UDP 4500 port. When both the controller and the AP are behind NAT devices, configure the AP to use the NAT device’s public address as its master address. On the NAT device, you must enable NAT-T (UDP port 4500 only) and forward all packets to the public address of the NAT device on UDP port 4500 to the controller to ensure that the remote AP boots successfully.
Configure the VPN Server
This section describes how to configure the IPSec VPN server on the controller. For more details, see
Private Networks on page 352 .
The remote AP will be a VPN client that connects to the VPN server on the controller .
In the WebUI
1. Navigate to the Configuration > Advanced Services > VPN Services > IPSec page.
2. Select Enable L2TP .
3. Make sure that PAP (Password Authentication Protocol) is selected for Authentication Protocols.
4. To configure the L2TP IP pool, click Add in the Address Pools section. Configure the L2TP pool from which the APs will be assigned addresses, then click Done .
The size of the pool should correspond to the maximum number of APs that the controller is licensed to manage.
5. To configure an Internet Security Association and Key Management Protocol (ISAKMP) encrypted subnet and preshared key, click Add in the IKE Shared Secrets section and configure the preshared key. Click
Done to return to the IPSec page.
6. Click Apply .
In the CLI
(host) (config) # vpdn group l2tp ppp authentication PAP
(host) (config) #ip local pool <pool> <start-ipaddr> <end-ipaddr>
(host) (config) #crypto isakmp key <key> address <ipaddr> netmask <mask>
CHAP Authentication Support over PPPoE
RAPs can now establish a PPPoE session with a PPPoE server at the ISP side and get authenticated using the
Challenge Handshake Authentication Protocol (CHAP). The PPPoE client running on a RAP is capable of handling the CHAP authentication requests from the PPPoE server.
The PPPoE client selects either the PAP or the CHAP credentials for the RAP authentication depending upon the request from the PPPoE server.
You can use the WebUI or the CLI to configure CHAP.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Installation page. The list of discovered APs are displayed on this page.
2. Select the AP you want to configure using CHAP and click Provision button.
3. Enter the CHAP Secret in the text box under Authentication Method .
704 | Remote Access Points ArubaOS 6.5.3.x | User Guide
You can use all the special characters except question mark (?) and the space can be used within double quotes (“ “).
4. Enter the CHAP Secret again in the Confirm CHAP Secret text box for confirmation.
Figure 98 CHAP Authentication Using CHAP Secret
5. Click Apply and Reboot.
In the CLI
(host) (config) #provision-ap pppoe-chap-secret <KEY> reprovision ap-name <name>
Configuring Certificate RAP
You can configure the remote AP to use the internal certificate for authentication. You can use the WebUI or
CLI to configure the certificate RAP.
In the WebUI
1. Navigate to Configuration > AP Installation (under Wireless.)
2. Select the required remote AP under the Provisioning tab and then click Provision .
3. Select Yes for Remote AP and Certificate for Remote AP Authentication Method.
4. Click Apply and Reboot to apply the configuration and reboot the AP as certificate RAP.
In the CLI
(host) (config) #local-userdb-ap whitelist-db rap add <mac-address>
Creating a Remote AP Whitelist
If you use the Zero Touch provisioning method to provision the certificate RAP, then you must create a remote
AP whitelist. For more information on Zero Touch Provisioning of the RAP, see
Provisioning 4G USB Modems on Remote Access Points on page 740 .
Remote AP whitelist is the list of approved APs that can be provisioned on your controller.
In the WebUI
1. Navigate to Configuration > AP Installation (under Wireless) and then click the RAP Whitelist tab on the right side.
2. Click New and provide the following details: n n n
AP MAC Address —mandatory parameter. Enter the MAC address of the AP.
Username —enter a username that is used when the AP is provisioned.
AP Group —select a group to add the AP.
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 705
n n n
AP Name —enter a name for the AP. If you do not enter an AP name, the MAC address will be used instead.
Description —enter a text description for the AP
IP-Address —enter an IP address for the AP.
3. Click Add to add the remote AP to the whitelist.
Configuring PSK RAP
You can use Pre-Shared Key (PSK) authentication to provision an individual remote AP or a group of remote
APs using an Internet Key Exchange Pre-Shared Key (IKE PSK).
Starting with ArubaOS 6.5.2.0, PSK RAPs support IKEv1 SHA-2 cryptographic hash function.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Installation > Provisioning window.
2. Click the checkbox by the AP you want to provision, then click Provision . The Provisioning window opens.
3. Select Yes for the Remote AP option
4. In the Remote IP Authentication Method section, select Pre-shared key .
5. Enter and confirm the pre-shared key (IKE PSK).
6. In the User credential assignment section, specify if you want to use a Global User Name/password or a Per AP User Name/Password .
a. If you use the Per AP User Names/Passwords option, each RAP is given its own username and password.
b. If you use the Global User Name/Password option, all selected RAPs are given the same (shared) username and password.
7. Enter the user name, and enter and confirm the password. If you want the controller to automatically generate a user name and password, select Use Automatic Generation , then click Generate by the
User Name and Password fields.
Add the user to the internal database
You can add the user to the internal database using the WebUI or CLI.
In the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page.
2. Select Internal DB .
3. Click Add User in the Users section. The user configuration page displays.
4. Enter the username and password.
5. Click Enabled to activate this entry on creation.
6. Click Apply . Note that the configuration does not take effect until you perform this step.
7. At the Servers page, click Apply .
In the CLI
(host) (config) #local-userdb add username rapuser1 password <password>
706 | Remote Access Points ArubaOS 6.5.3.x | User Guide
RAP Static Inner IP Address
The RAP static inner IP address feature assigns a static inner IP address to a remote access point (RAP). A new remote-IP address parameter is added to the existing configuration commands.
In the WebUI
To view IP address parameter in the local database, navigate to the Configuration > Security >
Authentication > Servers > Internal DB page.
Figure 99 IP-Address parameter in the local database
To view IP-address parameter in the RAP Whitelist, navigate to the Wireless > AP Installation > RAP
Whitelist page.
Figure 100 IP-Address parameter in the RAP Whitelist
In the CLI
(host) (config) #local-userdb add {generate-username|username <name>} {generatepassword|password
<password>} {remote-ip <remote-ip>}
(host) (config) #local-userdb modify {username < name>} {remote-ip <remote-ip>}
(host) (config) #local-userdb-ap whitelist-db rap add {mac-address <address>}{ap-group <ap_ group>}{remote-ip <remote-ip>}
(host) (config) #local-userdb-ap whitelist-db rap modify {mac-address <address>} {remoteip<remote-ip>}
You cannot configure the IP-Address parameter using the WebUI.
Provision the AP
You need to configure the VPN client settings on the AP to instruct the AP to use IPSec to connect to the controller. You can provision the remote AP and give it to users and allow remote users to provision AP at their home. This method of provisioning is referred as Zero Touch Provisioning. See
Provisioning 4G USB Modems on Remote Access Points on page 740
for more information about Zero Touch Provisioning of remote AP.
You must provision the AP before you install it at its remote location. To provision the AP, the AP must be physically connected to the local network or directly connected to the controller. When connected and powered on, the AP must also be able to obtain an IP address from a DHCP server on the local network or from the controller.
If your configuration has an internal LMS IP address, remote APs may attempt to switch over to the LMS IP address, which is not reachable from the Internet. For remote APs, ensure that the LMS IP address in the AP system profile for the AP group has an externally routable IP address.
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 707
Reprovisioning the AP causes it to automatically reboot. The easiest way to provision an AP is to use the
Provisioning page in the WebUI, as described in the following steps:
1. Navigate to the Configuration > Wireless > AP Installation > Provisioning page. Select the remote AP and click Provision .
2. Under Authentication Method , select IPSec Parameters . Enter the Internet Key Exchange (IKE) Pre-
Shared Key (PSK) , username , and password .
The username and password you enter must match the username and password configured on the authentication server for the remote AP.
3. Under Master Discovery, set the Master IP Address as shown below:
Deployment Scenario
Deployment 1
Deployment 2
Deployment 3
Master IP Address Value
Controller IP address
Controller public IP address
Public address of the NAT device to which the controller is connected
The username and password you enter must match the username and password configured on the authentication server for the remote AP.
4. Under IP Settings , make sure that Obtain IP Address Using DHCP is selected.
5. Click Apply and Reboot .
Secondary Master Controller
The backup Local Mobility Switch (LMS) provides reliability and redundancy; however the functionality of a backup LMS is initiated only after an AP terminates on a controller successfully and retrieves the configuration.
If the AP boots up and fails to connect to the master controller the AP cannot be managed. To address this
ArubaOS 6.5.0.0 introduces the secondary master controller feature.
In a scenario where the master controller is not reachable, the AP will try to reach the secondary master controller and if successful will terminate on the secondary master. The secondary master details are not stored in the system flash when the AP is deployed for the first time, but only after a successful configuration.
An AP can use the secondary master controller feature after the AP reboots.
If an AP has not been configured to a controller after deployment the secondary master feature will not be applicable.
In the WebUI
To enable the secondary master controller feature:
1. Navigate to Configuration > Advanced services > All Profiles .
2. Click AP > AP System .
3. Select the AP profile for which the secondary master controller feature is to be enabled. The Profile Details section is displayed.
4. Navigate to the Basic > General tab.
5. Enter an IP or FQDN value for the secondary master controller in the Secondary Master IP/FQDN field.
708 | Remote Access Points ArubaOS 6.5.3.x | User Guide
Figure 101 Profile Details
In the CLI
Execute the following command to enable the secondary master controller feature.
(host) (config) #ap system-profile <profile name>
(host) (AP system profile "profile name")#secondary-master <value>
Deploying a Branch/Home Office Solution
In a branch office, the AP is deployed in a separate IP network from the corporate network. Typically, there are one or two NAT devices between the two networks. Branch office users need access to corporate resources such as printers and servers, but traffic to and from these resources must not impact the corporate head office.
is a graphic representation of a remote AP in a branch or home office, with a single controller providing access to both a corporate WLAN and a branch office WLAN.
Figure 102 Remote AP with Single Controller
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 709
Branch office users want continued operation of the branch office WLAN, even if the link to the corporate network goes down. The branch office AP solves these requirements by providing the following capabilities on the branch office WLAN: n n n n
Local termination of 802.11 management frames which provides survivability of the branch office WLAN.
All 802.1X authenticator functionality is implemented in the AP. The controller is used as a RADIUS passthrough when the authenticator has to communicate with a RADIUS server (which also supports survivability).
802.11 encryption/decryption is in the AP to provide access to local resources.
Local bridging of client traffic connected to the WLAN or to an AP 70 enet1 port to provide access to local resources.
Provisioning the Branch AP
You can provision the remote AP either using the controller or using the Zero Touch Provisioning method. For more information on controller provisioning, see
Configuring Installed APs on page 542
. For more information on Zero Touch Provisioning, see
Provisioning 4G USB Modems on Remote Access Points on page 740 .
Configuring the Branch AP
n n n n n n
Specify forward mode for the Extended Service Set Identifier (ESSID) in the virtual AP profile
Specify remote AP operation in the virtual AP profile (The remote AP operates in standard mode by default.)
Set how long the AP stays up after connectivity to controller has gone down in the SSID profile
Set the VLAN ID in the virtual AP profile
Set the native VLAN ID in the AP system profile
Set forward mode for enet1 port
Remote APs support 802.1q VLAN tagging. Data from the remote AP will be tagged on the wired side.
Troubleshooting Remote AP
The following WebUI options are available to troubleshoot issues with remote AP: n n n n
Using local debugging feature
Viewing the remote AP summary report
Viewing remote AP connectivity report
Using remote AP diagnostic options
Local Debugging
Local debugging is a WebUI feature that allows end users to perform diagnostics and view the status of their remote AP through a wired or wireless client. This feature is useful for troubleshooting connectivity problems on remote APs and performing throughput tests. There are three tabs in the Local Debugging WebUI window; Summary , Connectivity , and Diagnostics . Each tab displays different information for the AP, but all three tabs include a Generate & save support file link that, when clicked, will automatically generate a support.tgz
file that can be sent to a corporate IT department for additional analysis and debugging.
A snapshot of the bridge, acl, session, user, and arp tables, current processes, memory, and kernel debug messages are captured in a single rap_debug.txt
file which is bundled along with support.tgz
file.
710 | Remote Access Points ArubaOS 6.5.3.x | User Guide
Remote AP Summary
The Summary tab has two views; basic and advanced. Click the basic or advanced links at the top of this tab to toggle between the two views. The table below shows the information displayed for both the basic and advanced views of the Summary tab.
Table 159: RAP Console Summary Tab Information
Summary
Table Name
Wired Ports
Status
Basic View Information n n
Port : port numbers of the wired ports on the AP
Status : current status of each port
( Connected , LinkDown or Disabled ).
Advanced View Information
Wireless SSIDs
Wired Users n n n
SSID : Name of the SSID.
Status : SSID Status (up, down, or disabled).
Band : Radio band available on the
SSID.
n n
MAC Address : MAC address of the wired user.
IP address : IP address of the wired user.
The advanced view of the Wired Access
Ports table displays the following data: n n n
Port : port numbers of the wired ports on the AP
Status : current status of each port
( Connected , LinkDown or Disabled )
MAC Address: MAC address of the wired port n n
Speed : speed of the link
Duplex Type : duplex mode of the link, full or half n n n n
Forwarding mode : forwarding mode for the port: Bridge , Tunnel or Split Tunnel
Users : number of users accessing each port
Rx Packets : number of packets received on the port
Tx packets : number of packets transmitted via the port n n n n n n n n n n n
SSID : name of the SSID
Status : SSID Status (up, down, or disabled).
Band : radio band available on the SSID
Channel : channel used on the radio band
BSSID : BSSID of the wireless SSID
Forwarding Mode : forwarding mode used by the Wireless SSID (Bridge,
Tunnel or Split-Tunnel)
EIRP : equivalent Isotropic Radiated
Power, in dBm
Noise floor : residual background noise detected by an AP. Noise seen by an AP is reported as -dBm Therefore, a noise floor of -100 dBm is smaller (lower) than a noise floor of -50 dBm.
Users : number of users on the radio band
Rx Packets : number of packets received on the BSSID
Tx packets : number of packets transmitted via the BSSID n n n MAC Address : MAC address of the wired user.
IP address : IP address of the wired user.
Port : AP port used by the wired user.
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 711
Summary
Table Name
Wireless User
Device Info
Uplink Info
Basic View Information Advanced View Information n n
MAC Address : MAC address of the wireless user.
IP address : IP address of the wireless user.
n n n n n n n n n
Type : AP device/model type.
Name : Name assigned to the AP.
Wired MAC address : MAC address of the wired port.
Serial # : AP serial number.
Tunnel IP address : IP address of the tunnel between the AP and controller.
Software Version : Software version currently running on the AP.
Uptime : Amount of time the AP has been active since it was last reset.
Master : IP address of the master controller.
lms : IP address of the local controller.
N/A
The Uplink Info table can display some or all of the following information for your remote AP, depending upon whether a link is active and the number of links supported by the AP.
Active uplink information, including: n
Interface name n n
Port speed
IP address
Standby link information, including: n Name (3G) n n n n n n
Device connected (yes/no)
Provisioned (yes/no)
IP address
Device
User
Password n n n n n n n n n
MAC Address : MAC address of the wired user
IP address : IP address of the wired user
SSID : name of the SSID
BSSID : BSSID of the wireless user
Assoc State : shows if the user is associated or just authorized
Auth : Type of authentication: WPA,
802.1X, none, open, or shared
Encryption : encryption type used by the wireless user
Band : radio band used by the wireless client
RSSI : Receive Signal Strength Indicator
(RSSI) value displayed in the output of this command represents signal strength as a signal to noise ratio.
N/A
Multihoming on remote AP (RAP)
You can uplink a RAP as an Ethernet or a USB based modem. These uplinks can be used as a backup link if the primary link fails. The uplink becomes active based on the order of priority configured on the RAP. The RAP switches back to the primary link when the primary connection is restored.
712 | Remote Access Points ArubaOS 6.5.3.x | User Guide
For information on provisioning the RAP using the USB based modem, see
Remote Access Points on page 740
.
Seamless failover from backup link to primary link on RAP
RAPs can failover from a backup link to a primary link without much disruption to traffic. Also the failover is performed only if the controller is reachable via the primary link.
Remote AP Connectivity
The information shown on the Connectivity tab will vary, depending upon the current status of the remote
AP. If a remote AP has been successfully provisioned and connected, it should display some or all of the information in
Table 160: RAP Console Connectivity Tab Information
Data
Uplink status
IP Information
Gateway Connectivity
TPM Certificates
Master Connectivity
LMS Connectivity
Description
Shows if the link connected failed. If the link is connected, the Uplink status also displays the name of the interface.
If the AP has successfully received an IP address, this data row will show the AP’s IP address, subnet mask, and gateway IP address.
If successful, this item also shows the percentage of packet loss for data received from the gateway.
If successful, the AP has a Trusted Platform Module (TPM) certificate.
Shows if the AP was able to connect to the master controller. This item also shows the IP address to which the AP attempted to connect, and, if the AP did connect successfully, the link used to connect to that controller.
Shows if the AP was able to connect to a local controller. This item also shows the IP address to which the AP attempted to connect, and, if the AP did connect successfully, the link used to connect to that controller.
The top of the Connectivity tab has a Refresh link that allows users to refresh the data on their screen.
Additional information at the bottom of this tab shows the date, time, and reason the remote AP last rebooted. The Reboot RAP Now button reboots the remote AP.
Remote AP Diagnostics
Use the Diagnostics tab to view log files, or run diagnostic tests that can help the IT department troubleshoot errors. Use the Reboot AP Now button at the bottom of the Diagnostic window to reboot the remote AP.
To run a diagnostic test on a remote AP:
1. Access the RAP console, and click the Diagnostics tab.
2. Click the Test drop-down list and select Ping , Traceroute, NSLookup , or Throughput .
The ping and traceroute tests require that you enter a network destination in the form of an IP address or fully-qualified domain name, and select either bridge or tunnel mode for the test.
The NSLookup diagnostic test requires that you enter a destination only. The throughput test checks the throughput of the link between the AP and the controller, and does not require any additional test configuration settings.
3. Click OK to start the test. The results of the test will appear in the Diagnostics window.
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 713
To display log files in a separate browser window, click the logs drop-down list at the upper right corner of the
Diagnostics window, and select any of the log file name. The type of log files available will vary, depending upon your remote AP configuration.
n n n n n n n n
Enabling Remote AP Advanced Configuration Options
This section describes the following features designed to enhance your remote AP configuration:
Understanding Remote AP Modes of Operation on page 714
Working in Fallback Mode on page 716
Specifying the DNS Controller Setting on page 724
Backup Controller List on page 725
Configuring Remote AP Failback on page 726
Working with Access Control Lists and Firewall Policies on page 728
Understanding Split Tunneling on page 728
Provisioning Wi-Fi Multimedia on page 739
The information in this section assumes you have already configured the remote AP functionality, as described in
Configuring the Secure Remote Access Point Service on page 703
.
Understanding Remote AP Modes of Operation
summarizes the different remote AP modes of operation. You specify both the forward mode setting (which controls whether 802.11 frames are tunneled to the controller using GRE, bridged to the local
Ethernet LAN, or a combination thereof) and the remote AP mode of operation (when the virtual AP operates on a remote AP) in the virtual AP profile.
The column on the left of the table lists the remote AP operation settings. The row across the top of the table lists the forward mode settings. To understand how these settings work in concert, scan the desired remote AP operation with the forward mode setting, and read the information in the appropriate table cell.
The “all” column and row lists features that all remote AP operation and forward mode settings have in common regardless of other settings. For example, at the intersection of “all” and “bridge,” the description outlines what happens in bridge mode regardless of the remote AP mode of operation.
714 | Remote Access Points ArubaOS 6.5.3.x | User Guide
Table 161: Remote AP Modes of Operation and Behavior
Remote AP
Operation
Setting
Forward Mode Setting all always all bridge
Management frames on the AP.
Frames are bridged between wired and wireless interfaces.
No frames are tunneled to the controller.
Station acquires its IP address locally from an external DHCP server.
split-tunnel
Management frames on the AP.
Frames are either
GRE tunneled to the controller to a trusted tunnel or
NATed and bridged on the wired interface according to user role and session
ACL.
Typically, the station obtains an
IP address from a
VLAN on the controller.
Typically, the AP has ACLs that forward corporate traffic through the tunnel and source
NAT the noncorporate traffic to the Internet.
Not supported Provides an SSID that is always available for local access.
ESSID is always up when the AP is up regardless of whether the controller is reachable.
Supports PSK
ESSID only.
SSID configuration stored in flash on AP.
all bridge split-tunnel tunnel
Frames are GRE tunneled to the controller to an untrusted tunnel.
100% of station frames are tunneled to the controller.
Not supported tunnel decrypt-tunnel
Management frames on the
AP.
Frames are always GRE tunneled to controller.
Not supported
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 715
Remote AP
Operation
Setting backup
Forward Mode Setting persistent standard
ESSID is only up when the controller is unreachable.
Supports PSK
ESSID only.
SSID configuration stored in flash on AP.
ESSID is up when the AP contacts the controller and stays up if connectivity is disrupted with the controller.
SSID configuration obtained from the controller.
Designed for
802.1X SSIDs.
Provides a backup SSID for local access only when the controller is unreachable.
Same behavior as standard, described below, except the ESSID is up if connectivity to the controller is lost.
ESSID is up only when there is connectivity with the controller.
SSID configuration obtained from the controller.
Behaves like a classic Aruba branch office AP.
Provides a bridged ESSID that is configured from the controller and stays up if there is controller connectivity.
Not supported
Not supported
Split tunneling mode
Not supported
Not supported
Not supported
Not supported
Classic Aruba thin AP operation
Decrypt tunnel mode
Working in Fallback Mode
The fallback mode (also known as backup configuration) operates the remote AP if the master controller or the configured primary and backup LMS are unreachable. The remote AP saves configuration information that allows it to operate autonomously using one or more SSIDs in local bridging mode, while supporting open association or encryption with PSKs. You can also use the backup configuration if you experience network connectivity issues, such as the WAN link or the central data center becoming unavailable. With the backup configuration, the remote site does not go down if the WAN link fails or the data center is unavailable.
You define the backup configuration in the virtual AP profile on the controller. The remote AP checks for configuration updates each time it establishes a connection with the controller. If the remote AP detects a change, it downloads the configuration changes.
The following remote AP backup configuration options define when the SSID is advertised (refer to
for more information): n n
Always—Permanently enables the virtual AP. Recommended for bridge SSIDs.
Backup—Enables the virtual AP if the remote AP cannot connect to the controller. This SSID is advertised until the controller is reachable. Recommended for bridge SSIDs.
716 | Remote Access Points ArubaOS 6.5.3.x | User Guide
n n
Persistent—Permanently enables the virtual AP after the remote AP initially connects to the controller.
Recommended for 802.1X SSIDs.
Standard—Enables the virtual AP when the remote AP connects to the controller. Recommended for
802.1X, tunneled, and split-tunneled SSIDs. This is the default behavior.
While using the backup configuration, the remote AP periodically retries its IPSec tunnel to the controller. If you configure the remote AP in backup mode, and a connection to the controller is re-established, the remote AP stops using the backup configuration and immediately brings up the standard remote AP configuration. If you configure the remote AP in always or persistent mode, the backup configuration remains active after the IPSec tunnel to the controller has been re-established.
Backup Configuration Behavior for Wired Ports
If the connection between the remote AP and the controller is disconnected, the remote AP will be exhibit the following behavior: n n n
All access ports on the remote AP will be moved to bridge forwarding mode ,irrespective of their original forwarding mode..
Clients will receive an IP address from the remote AP's DHCP server.
Clients will have complete access to Remote AP's uplink network. You cannot enforce or modify any access control policies on the clients connected in this mode.
This section describes the following topics: n n n
Configuring Fallback Mode on page 717
Configuring the DHCP Server on the Remote AP on page 719
Configuring Advanced Backup Options on page 721
Configuring Fallback Mode
To configure the fallback mode, you must: n n
Configure the AAA profile
Configure the virtual AP profile
Configuring the AAA Profile for Fallback Mode
In the WebUI
The AAA profile defines the authentication method and the default user role for unauthenticated users:
1. Navigate to the Security > Authentication > AAA Profiles page. From the AAA Profiles Summary list, click Add .
2. Enter the AAA profile name, then click Add .
3. Select the AAA profile that you just created: a. For Initial role , select the appropriate role (for example, “logon”).
b. For 802.1X Authentication Default Role , select the appropriate role (for example, “default”), then click Apply .
c. Under the AAA profile that you created, locate 802.1X Authentication Server Group , and select the authentication server group to use (for example “default”), then click Apply .
If you need to create an 802.1X authentication server group, select new from the 802.1X Authentication Server
Group drop-down list, and enter the appropriate parameters.
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 717
d. Under the AAA profile that you created, locate 802.1X Authentication Profile, and select the profile to use (for example, “default”), then click Apply .
If you need to create an 802.1X authentication profile, select new from the 802.1X Authentication Profile dropdown list, and enter the appropriate parameters.
In the CLI
(host) (config) #aaa profile <name> initial-role <role> authentication-dot1x <dot1x-profile> dot1x-default-role <role> dot1x-server-group <group>
Configuring the Virtual AP Profile for Fallback Mode
In the WebUI l l
Set the remote AP operation to always , backup , or persistent .
Create and apply the applicable SSID profile.
The SSID profile for the backup configuration in always, backup, or persistent mode must be a bridge
SSID. When configuring the virtual AP profile, specify forward mode as bridge .
The SSID profile for the backup configuration in standard mode can be a bridge, tunnel, or split tunnel
SSID. When configuring the virtual AP profile, specify forward mode as bridge , tunnel , or split tunnel .
When creating a new virtual AP profile In the WebUI, you can also configure the SSID at the same time. For information about AP profiles, see
Understanding AP Configuration Profiles on page 530 .
1. Navigate to the Configuration > Wireless > AP Configuration page. Select either the AP Group or AP
Specific tab. Click Edit for the AP group or AP name.
2. Under Profiles, select Wireless LAN , then Virtual AP .
3. To create a new virtual AP profile in the WebUI, select New from the Add a profile drop-down menu. Enter the name for the virtual AP profile, and click Add .
Whenever you create a new virtual AP profile in the WebUI, the profile automatically contains the “default” SSID profile with the default ESSID. You must configure a new ESSID and SSID profile for the virtual AP profile before you apply the profile.
a. In the Profile Details entry for the new virtual AP profile, go to the AAA Profile drop-down list and select the previously configured AAA profile (for example, logon ). The AAA Profile pop-up window appears.
b. To set the AAA profile and close the pop-up window, Click Apply.
c. In the Profile Details entry for the new virtual AP profile, select NEW from the SSID Profile drop-down menu. The SSID Profile pop-up window displays to allow you to configure the SSID profile.
d. Enter the name for the SSID profile (for example, backup ).
e. Under Network, enter a name in the Network Name (SSID) field (for example, backup-psk ).
f. Under Security, select the network authentication and encryption methods (for example, wpa-psk-tkip, with the passphrase remote123 ).
g. To set the SSID profile and close the pop-up window, click Apply .
4. At the bottom of the Profile Details window, Click Apply .
5. Click the new virtual AP name in the Profiles list or the Profile Details to display configuration parameters.
6. Under Profile Details, do the following: a. Make sure Virtual AP enable is selected.
718 | Remote Access Points ArubaOS 6.5.3.x | User Guide
b. From the VLAN drop-down menu, select the VLAN ID to use for the virtual AP profile.
c. From the Forward mode drop-down menu, select bridge .
d. From the Remote-AP Operation drop-down menu, select always , backup , or persistent . The default is standard. Click Apply .
In the CLI
(host) (config) #wlan ssid-profile <profile> essid <name> opmode <method> wpa-passphrase <string> (if necessary)
(host) (config) #wlan virtual-ap <name> ssid-profile <profile> vlan <vlan> forward-mode bridge aaa-profile <name> rap-operation {always|backup|persistent}
(host) (config) #ap-group <name> virtual-ap <name> or
(host) (config) #ap-name <name> virtual-ap <name>
Configuring the DHCP Server on the Remote AP
You can configure the internal DHCP server on the remote AP to provide an IP address for the backup SSID if the controller is unreachable. If configured, the remote AP DHCP server intercepts all DHCP requests and assigns an IP address from the configured DHCP pool.
To configure the remote AP DHCP server: n n n n n
Enter the VLAN ID for the remote AP DHCP VLAN in the AP system profile. This VLAN enables the DHCP server on the AP (also known as the remote AP DHCP server VLAN). If you enter the native VLAN ID, the
DHCP server is not configured and is unavailable.
Specify the DHCP IP address pool and netmask. The AP assigns IP addresses from the DHCP pool
192.168.11.0/24 by default, with an IP address range from 192.168.11.2 through 192.168.11.254. You can manually define the DHCP IP address pool and netmask based on your network design and IP address scheme.
Specify the IP address of the DHCP server, DHCP router, and the DHCP DNS server. The AP uses IP address
192.168.11.1 for the DHCP server, the DHCP router, and the DHCP DNS server by default.
Enter the amount of days the assigned IP address is valid (also known as the remote AP DHCP lease). The lease does not expire by default, which means the IP address is always valid.
Assign the VLAN ID for the remote AP DHCP VLAN to a virtual AP profile. When a client connects to that virtual AP profile, the AP assigns the IP address from the DHCP pool.
The following is a high-level description of the steps required to configure the DHCP server on the remote AP. The steps assume you have already created the virtual AP profile, AAA profile, SSID profile, and other settings for your remote AP operation (for information about the backup configuration, see
Configuring Fallback Mode on page 717 ).
In the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration page.
2. Select either the AP Group or AP Specific tab. Click Edit for the AP group or AP name.
3. Under Profiles , select AP to display the AP profiles.
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 719
4. Select the AP system profile you want to modify.
5. Under Profile Details: a. At the LMS IP field, enter the LMS IP address.
b. At the Master controller IP address field, enter the master controller IP address.
c. At the Remote-AP DHCP Server VLAN field, enter the VLAN ID of the backup configuration virtual AP
VLAN.
d. At the Remote-AP DHCP Server ID field, enter the IP address for the DHCP server.
e. At the Remote-AP DHCP Default Router field, enter the IP address for the default DHCP router.
f. At the Remote-AP DHCP DNS Server list, enter an IP address in the field to right and click Add . You can add multiple IP addresses the same way. To delete an IP address, select an IP address from the list and click Delete .
g. Specify the DHCP IP address pool. This configures the pool of IP addresses from which the remote AP uses to assign IP addresses.
- At the Remote-AP DHCP Pool Start field, enter the first IP address of the pool.
- At the Remote-AP-DHCP Pool End field, enter the last IP address of the pool.
- At the Remote-AP-DHCP Pool Netmask field, enter the netmask.
h. At the Remote-AP DHCP Lease Time field, specify the amount of time the IP address is valid.
6. Click Apply .
7. Under Profiles , select Wireless LAN , then Virtual AP , then the virtual AP profile you want to configure.
8. Under Profile Details , at the VLAN drop-list, select the VLAN ID of the remote AP DHCP VLAN, click the left arrow to move the VLAN ID to the VLAN field, and click Apply .
In the CLI
Use the following commands:
(host) (config) #ap system-profile <name> lms-ip <ipaddr> master-ip <ipaddr> rap-dhcp-default-router <ipaddr> rap-dhcp-dns-server <ipaddr> rap-dhcp-lease <days> rap-dhcp-pool-end <ipaddr> rap-dhacp-pool-netmask <netmask> rap-dhcp-pool-start <ipaddr> rap-dhcp-server-id <ipaddr> rap-dhcp-server-vlan <vlan>
(host) (config) #wlan virtual-ap <name> ssid-profile <profile> vlan <vlan> forward-mode bridge aaa-profile <name> rap-operation {always|backup|persistent}
(host) (config) #ap-group <name> ap-system-profile <name> virtual-ap <name> or
(host) (config) #ap-name <name> ap-system-profile <name> virtual-ap <name>
720 | Remote Access Points ArubaOS 6.5.3.x | User Guide
Configuring Advanced Backup Options
You can also use the backup configuration (fallback mode) to allow the remote AP to pass through a captive portal, such as network access in a hotel, airport, or other public network, to access the corporate network. For this scenario: n n
Define a session ACL for the bridge SSID to source NAT all user traffic, except DHCP. For example, use any any svc-dhcp permit followed by any any any route src-nat . Apply the session ACL to a remote AP user role.
Configure the AAA profile. Make sure the initial role contains the session ACL previously configured.
The AAA profile defines the authentication method and the default user role.
802.1X and PSK authentication is supported when configuring bridge or split tunnel modes.
n n n
Configure the virtual AP profile for the backup configuration: l l
Set the remote AP operation to always or backup .
Create and apply the applicable SSID profile.
l
Configure a bridge SSID for the backup configuration. In the virtual AP profile, specify forward mode as bridge .
For more information about the backup configuration, see
Configuring Fallback Mode on page 717
.
Enter the remote AP DHCP server parameters in the AP system profile. For more information about the parameters, see
Configuring the DHCP Server on the Remote AP on page 719
.
If you use a local DHCP server to obtain IP addresses, you must define one additional ACL to permit traffic between clients without source NATing the traffic. Using the previously configured ACL, add user alias internal-network any permit before any any any route src-nat .
Connect the remote AP to the available public network (for example, a hotel or airport network).
The remote AP advertises the backup SSID so the wireless client can connect and obtain an IP address from the available DHCP server.
The client can obtain an IP address from the public network, for example a hotel or airport, or from the DHCP server on the remote AP.
After obtaining an IP address, the wireless client can connect and access the corporate network and bring up the configured corporate SSIDs.
The following is a high-level description of what is needed to configure the remote AP to pass through a captive portal and access the corporate controller. This information assumes you are familiar with configuring session
ACLs, AAA profiles, virtual APs, and AP system profiles and highlights the modified parameters.
Configuring the Session ACL
In the WebUI
1. Navigate to the Configuration > Security > Access Control > Policies page.
2. Click Add to create a new policy.
3. Enter the policy name in the Policy Name field.
4. From the Policy Type drop-down list, select IPv4 Session .
5. To create the first rule: a. Under Rules , click Add .
b. Under Source , select any .
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 721
c. Under Destination , select any .
d. Under Service , select service . In the service drop-down list, select svc-dhcp .
e. Under Action , select permit .
f. Click Add .
6. To create the next rule: a. Under Rules , click Add .
b. Under Source , select any .
c. Under Destination , select any .
d. Under Service , select any .
e. Under Action , select route , and select the src-nat checkbox.
f. Click Add .
.
7. Click Apply .
If you use a local DHCP server to obtain IP addresses, you must define one additional ACL to permit traffic between clients without source NATing the traffic. Add user alias internal-network any permit before any any any route src-nat .
8. Click the User Roles tab.
a. Click Add .
b. Enter the Role Name.
c. Click Add under Firewall Policies.
d. In the Choose from Configured Policies menu, select the policy you just created.
e. Click Done .
In the CLI
Use the following commands:
(host) (config) #ip access-list session <policy> any any svc-dhcp permit any any any route src-nat
If you use a local DHCP server to obtain IP addresses, you must define one additional ACL to permit traffic between clients without source NATing the traffic. Add user alias internal-network any permit before any any any route src-nat:
(host) (config) #user-role <role> session-acl <policy>
Configuring the AAA Profile
In the WebUI
1. Navigate to the Security > Authentication > AAA Profiles page. From the AAA Profiles Summary list, click Add .
2. Enter the AAA profile name, then click Add .
3. Select the AAA profile that you just created: a. For Initial role, select the user role you just created.
b. For 802.1X Authentication Default Role, select the appropriate role for your remote AP configuration, then click Apply .
722 | Remote Access Points ArubaOS 6.5.3.x | User Guide
c. Under the AAA profile that you created, locate 802.1X Authentication Server Group , and select the authentication server group to use for your remote AP configuration, then click Apply .
If you need to create an 802.1X authentication server group, select new from the 802.1X Authentication Server
Group drop-down list, and enter the appropriate parameters.
d. Under the AAA profile that you created, locate 802.1X Authentication Profile , select the profile to use for your remote AP configuration, then click Apply .
In the CLI
(host) (config) #aaa profile <name> initial-role <role>
You can define other parameters as needed.
Defining the Backup Configuration
In the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration page. Select either the AP Group or AP
Specific tab. Click Edit for the AP group or AP name.
2. Under Profiles , select Wireless LAN , then Virtual AP .
3. To create a new virtual AP profile in the WebUI, select New from the Add a profile drop-down menu. Enter the name for the virtual AP profile, and click Add .
Whenever you create a new virtual AP profile in the WebUI, the profile automatically contains the “default” SSID profile with the default ESSID. You must configure a new ESSID and SSID profile for the virtual AP profile before you apply the profile.
a. In the Profile Details entry for the new virtual AP profile, go to the AAA Profile drop-down list and select the previously configured AAA profile. The AAA Profile pop-up window appears.
b. To set the AAA profile and close the pop-up window, Click Apply.
c. In the Profile Details entry for the new virtual AP profile, select NEW from the SSID Profile drop-down menu. The SSID Profile pop-up window displays to allow you to configure the SSID profile.
d. Enter the name for the SSID profile.
e. Under Network , enter a name in the Network Name (SSID) field.
f. Under Security , select the network authentication and encryption methods.
g. To set the SSID profile and close the pop-up window, click Apply .
4. At the bottom of the Profile Details window, Click Apply .
5. Click the new virtual AP name in the Profiles list or the Profile Details to display configuration parameters.
6. Under Profile Details, do the following: a. Make sure Virtual AP enable is selected.
b. From the VLAN drop-down menu, select the VLAN ID to use for the Virtual AP profile.
c. From the Forward mode drop-down menu, select bridge .
d. From the Remote-AP Operation drop-down menu, select always or backup .
e. Click Apply .
7. Under Profiles , select AP , then AP system profile .
8. Under Profile Details , do the following: a. Select the AP system profile to edit.
b. At the LMS IP field, enter the LMS IP address.
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 723
c. At the Master controller IP address field, enter the master controller IP address.
d. Configure the Remote-AP DHCP Server fields.
e. Click Apply .
In the CLI
Use the following commands:
(host) (config) #wlan ssid-profile <profile> essid <name> opmode <method> wpa-passphrase <string> (if necessary)
(host) (config) #wlan virtual-ap <name> ssid-profile <profile> vlan <vlan> forward-mode bridge aaa-profile <name> rap-operation {always|backup}
(host) (config) #ap system-profile <name> lms-ip <ipaddr> master-ip <ipaddr> rap-dhcp-default-router <ipaddr> rap-dhcp-dns-server <ipaddr> rap-dhcp-lease <days> rap-dhcp-pool-end <ipaddr> rap-dhacp-pool-netmask <netmask> rap-dhcp-pool-start <ipaddr> rap-dhcp-server-id <ipaddr> rap-dhcp-server-vlan <vlan>
(host) (config) #ap-group <name> virtual-ap <name> ap-system-profile <name> or
(host) (config) #ap-name <name> virtual-ap <name> ap-system-profile <name>
Specifying the DNS Controller Setting
In addition to specifying IP addresses for controllers, you can also specify the master DNS name for the controller when provisioning the remote AP. The name must be resolved to an IP address when attempting to set up the IPSec tunnel. For information on how to configure a host name entry on the DNS server, refer to the vendor documentation for your server. It is recommended to use a maximum of 8 IP addresses to resolve a controller name.
If the remote AP gets multiple IP addresses responding to a host name lookup, the remote AP can use one of them to establish a connection to the controller. For more detailed information, see the next section
Specifying the name also lets you move or change remote AP concentrators without reprovisioning your APs.
For example, in a DNS load-balancing model, the host name resolves to a different IP address depending on the location of the user. This allows the remote AP to contact the controller to which it is geographically closest.
The DNS setting is part of provisioning the AP. The easiest way to provision an AP is to use the Provisioning page in the WebUI. These instructions assume you are only modifying the controller information in the Master
Discovery section of the Provision page.
724 | Remote Access Points ArubaOS 6.5.3.x | User Guide
Reprovisioning the AP causes it to automatically reboot.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Installation > Provisioning page. Select the remote AP and click Provision .
2. Under Master Discovery enter the master DNS name of the controller.
3. Click Apply and Reboot .
For more information, see
.
Backup Controller List
Using DNS, the remote AP receives multiple IP addresses in response to a host name lookup. Known as the backup controller list, remote APs go through this list to associate with a controller. If the primary controller is unavailable or does not respond, the remote AP continues through the list until it finds an available controller.
This provides redundancy and failover protection.
The remote AP loses the IP address information received through DNS when it terminates and receives the system profile configuration from the controller. If the remote AP loses connectivity on the IPSec tunnel to the controller, the RAP fails over from the primary controller to the backup controller. For this scenario, add the IP address of the backup controller in the backup LMS and the IP address of the primary controller in the LMS field of the ap-system profile. Network connectivity is lost during this time. As described in the section
controller when it becomes available. To complete this scenario, you must also configure the LMS IP address and the backup LMS IP address.
For example, assume you have two data centers, data center 1 and data center 2, and each data center has one master controller in the DMZ. You can provision the remote APs to use the controller in data center 1 as the primary controller, and the controller in data center 2 as the backup controller. If the remote AP loses connectivity to the primary, it will attempt to establish connectivity to the backup. You define the LMS parameters in the AP system profile.
Figure 103 Sample Backup Controller Scenario
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 725
Configuring the LMS and backup LMS IP addresses
In the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration page.
2. Select either the AP Group or AP Specific tab. Click Edit for the AP group or AP name.
3. Under Profiles, select AP to display the AP profiles.
4. Select the AP system profile you want to modify.
5. Under Profile Details : a. At the LMS IP field, enter the primary controller IP address.
b. At the Backup LMS IP field, enter the backup controller IP address.
6. Click Apply .
In the CLI
(host) (config) #ap system-profile <profile> lms-ip <ipaddr> bkup-lms-ip <ipaddr>
(host) (config) #ap-group <group> ap-system-profile <profile>
(host) (config) #ap-name <name> ap-system-profile <profile>
Configuring Remote AP Failback
In conjunction with the backup controller list, you can configure remote APs to revert back (failback) to the primary controller if it becomes available. If you do not explicitly configure this behavior, the remote AP will keep its connection with the backup controller until the remote AP, controller, or both have rebooted or some type of network failure occurs. If any of these events occur, the remote AP will go through the backup controller list and attempt to connect with the primary controller.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration page.
2. Select either the AP Group or AP Specific tab. Click Edit for the AP group or AP name.
3. Under Profiles , select AP to display the AP profiles.
4. Select the AP system profile you want to modify.
5. Under Profile Details : a. Click LMS Preemption . This is disabled by default.
b. At the LMS Hold-down period field, enter the amount of time the remote AP must wait before moving back to the primary controller.
6. Click Apply .
In the CLI
Use the following commands:
(host) (config) #ap system-profile <profile> lms-preemption lms-hold-down period <seconds>
726 | Remote Access Points ArubaOS 6.5.3.x | User Guide
Enabling RAP Local Network Access
You can enable local network access between the clients (from same or different subnets and VLANs) connected to a RAP through wired or wireless interfaces in split-tunnel/bridge forwarding modes. This allows the clients to effectively communicate with each other without routing the traffic via the controller. You can use WebUI or CLI to enable the local network access.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration page.
2. Select the AP Group tab. Click Edit for the AP group or AP name.
3. Under Profiles , expand the AP menu, then select AP system profile .
4. To enable remote network access, select the Remote-AP Local Network Access check box.
Figure 104 Enable Remote AP Local Network Access
5. Click Apply .
In the CLI n
To enable, enter the following command: ap system-profile <ap-profile> rap-local-network-access n
To disable, enter the following command: ap system-profile <ap-profile> no rap-local-network-access
See the ArubaOS Command Line Reference Guide for detailed information on the command options.
Configuring Remote AP Authorization Profiles
Remote AP configurations include an authorization profile that specifies which profile settings should be assigned to a remote AP that has been provisioned but not yet authenticated at the remote site. These yetunauthorized APs are put into the temporary AP group authorization-group by default and assigned the predefined profile NoAuthApGroup . This configuration allows the user to connect to an unauthorized remote
AP via a wired port, then enter a corporate username and password. Once a valid user has authorized the AP, and it will be marked as authorized on the network. The remote AP will then download the configuration assigned to that AP by its permanent AP group.
In the WebUI
Adding or Editing a Remote AP Authorization Profile
To create a new authorization profile or edit an existing authorization profile via the WebUI:
1. Select Configuration > All Profiles . The All Profile Management window opens.
2. Select AP to expand the AP profile menu.
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 727
3. Select AP Authorization Profile . The Profile Details pane appears and displays the list of existing AP authorization profiles.
n
To edit an existing profile, select a profile from the Profile Details pane.
n
To create a new authorization profile, enter a new profile name in the entry blank on the Profile Details pane, then click Add .
4. The Profile Details window will display the AP group currently defined for that authorization profile. To select a new AP group, click the drop-down list and select a different AP group name.
5. Click Apply .
In the CLI
To create a new authorization profile or edit an existing authorization profile via the command-line interface, access the command-line interface in enable mode, and issue the following commands.
(host) (config) #ap authorization-profile <profile> authorization-group <ap-group>
Working with Access Control Lists and Firewall Policies
Remote APs support the following access control lists (ACLs); unless otherwise noted, you apply these ACLS to user roles: n n n n
Standard ACLs—Permit or deny traffic based on the source IP address of the packet.
Ethertype ACLs—Filter traffic based on the Ethertype field in the frame header.
MAC ACLs—Filter traffic on a specific source MAC address or range of MAC addresses.
Firewall policies (session ACLs)—Identifies specific characteristics about a data packet passing through the
Aruba controller and takes some action based on that identification. You apply these ACLs to user roles or uplink ports.
To configure firewall policies, you must install the PEFNG license.
For more information about ACLs and firewall policies, see
Configuring Fallback Mode on page 717 .
Understanding Split Tunneling
The split tunneling feature allows you to optimize traffic flow by directing only corporate traffic back to the controller, while local application traffic remains local. This ensures that local traffic does not incur the overhead of the round trip to the controller, which decreases traffic on the WAN link and minimizes latency for local application traffic. This is useful for sites that have local servers and printers. With split tunneling, a remote user associates with a single SSID, not multiple SSIDs, to access corporate resources (for example, a mail server) and local resources (for example, a local printer). The remote AP examines session ACLs to distinguish between corporate traffic destined for the controller and local traffic.
728 | Remote Access Points ArubaOS 6.5.3.x | User Guide
Figure 105 Sample Split Tunnel Environment
displays corporate traffic is GRE tunneled to the controller through a trusted tunnel and local traffic is source NATed and bridged on the wired interface based on the configured user role and session ACL.
Configuring Split Tunneling
The procedure to configure split tunneling requires the following steps. Each step is described in detail later in this chapter.
The split tunneling feature requires the PEFNG license. If you do not have the PEFNG license on your controller, you must install it before you configure split tunneling. For details on installing licenses, see
.
1. Define a session ACL that forwards only corporate traffic to the controller.
a. Configure a net destination for the corporate subnets.
b. Create rules to permit DHCP and corporate traffic to the corporate controller.
c. Apply the session ACL to a user role.
2. (Optional) Configure an ACL that restricts remote AP users from accessing the remote AP local debugging homepage.
3. Configure the remote AP’s AAA profile.
a. Specify the authentication method ( 802.1X
or PSK ) and the default user role for authenticated users.
The user role specified in the AAA profile must contain the session ACL defined in the previous step.
b. (Optional) Use the remote AP’s AAA profile to enable RADIUS accounting.
4. Configure the virtual AP profile: a. Specify which AP group or AP to which the virtual AP profile applies.
b. set the VLAN used for split tunneling. Only one VLAN can be configured for split tunneling; VLAN pooling is not allowed.
c. When specifying the use of a split tunnel configuration, use “split-tunnel” forward mode.
d. Create and apply the applicable SSID profile.
When creating a new virtual AP profile In the WebUI, you can also configure the SSID at the same time. For information about AP profiles, see
Understanding AP Configuration Profiles on page 530 .
5. (Optional) Create a list of network names resolved by corporate DNS servers.
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 729
Configuring the Session ACL Allowing Tunneling
First you need to configure a session ACL that “permits” corporate traffic to be forwarded (tunneled) to the controller, and that routes, or locally bridges, local traffic.
In the WebUI
1. Navigate to the Configuration > Security > Access Control > Policies page.
2. Click Add to create a new policy.
3. Enter the policy name in the Policy Name field.
4. From the Policy Type drop-down list, select Session .
5. From the IP Version drop-down list, select IPv4 or IPv6 .
6. To create the first rule: a. Under Rules, click Add .
b. Under Source, select any .
c. Under Destination, select any .
d. Under Service, select service . In the service drop-down list, select svc-dhcp .
e. Under Action, select permit forIPv4 or captive for IPv6.
f. Click Add .
7. To create the next rule: a. Under Rules, click Add .
b. Under Source, select any .
c. Under Destination, select alias .
The following steps define an alias representing the corporate network. Once defined, you can use the alias for other rules and policies. You can also create multiple destinations the same way.
8. Under the alias section, click New . Enter a name in the Destination Name field.
a. Click Add .
b. For Rule Type, select Network .
c. Enter the public IP address of the controller.
d. Enter the Network Mask/Range.
e. Click Add to add the network range.
f. Click Apply . The new alias appears in the Destination menu.
9. Under Destination , select the alias you just created.
10.Under
Service , select any .
11.Under
Action , select permit for IPv4 or captive for IPv6.
12.Click
Add .
13.To create the next rule: a. Under Rules , click Add .
b. Under Source , select user .
c. Under Destination , select any .
d. Under Service , select any .
e. Under Action , select route and check src-nat .
f. Click Add .
14.Click
Apply .
15.Click the User Roles tab.
730 | Remote Access Points ArubaOS 6.5.3.x | User Guide
a. Click Add to create and configure a new user role.
b. Enter the desired name for the role in the Role Name field.
c. Under Firewall Policies , click Add .
d. From the Choose from Configured Policies drop-down menu, select the policy you just configured.
e. Click Done .
16.Click
Apply .
In the CLI
(host) (config) #ap system-profile <profile> lms-preemption lms-hold-down period <seconds>netdestination <policy> network <ipaddr> <netmask> network <ipaddr> <netmask>
(host) (config) #ip access-list session <policy> any any svc-dhcp permit any alias <name> any permit user any any route src-nat
(host) (config) #user-role <role> session-acl <policy>
When defining the alias, there are a number of other session ACLs that you can create to define the handling of local traffic, such as:
(host) (config) #ip access-list session <policy> user alias <name> any redirect 0 user alias <name> any route user alias <name> any route src-nat
Configuring an ACL to Restrict Local Debug Homepage Access
A user in split or bridge role using a remote AP (RAP) can log on to the local debug (LD) homepage (for example,
( http://rapconsole.arubanetworks.com
) and perform a reboot or reset operations. The LD homepage provides various information about the RAP and also has a button to reboot the RAP. You can now restrict a RAP user from resetting or rebooting a RAP by using the localip keyword in the in the user role ACL.
You will require the PEFNG license to use this feature. See
for more information on licensing requirements.
Any user associated to that role can be allowed or denied access to the LD homepage. You can use the localip keyword in the ACL rule to identify the local IP address on the RAP. The localip keyword identifies the set of all local IP addresses on the system to which the ACL is applied. The existing keywords controller and mswitch indicate only the primary IP address on the controller.
This release of ArubaOS provides localip keyword support only for RAP and not for controller.
In the WebUI
1. Navigate to the Configuration > Security > Access Control > Policies page.
2. Click Add to create a new policy.
3. Enter the policy name in the Policy Name field.
4. From the Policy Type drop-down list, select IPv4 Session .
5. To create the first rule:
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 731
a. Under Rules , click Add .
b. Under Source , select localip .
c. Under Destination , select any .
d. Under Action , select permit .
e. Click Apply .
Figure 106 Enable Restricted Access to LD Homepage
In the CLI
Use the localip keyword in the user role ACL.
All users have an ACL entry of type any any deny by default. This rule restricts access to all users. When the
ACL is configured for a user role, if a user any permit
ACL rule is configured, add a deny ACL before that for localip for restricting the user from accessing the LD homepage.
Example:
(host) (config) #ip access-list session logon-control user localip svc-http deny user any permit
Configuring the AAA Profile for Tunneling
After you configure the session ACL, you define the AAA profile used for split tunneling. When defining the AAA parameters, specify the previously configured user role that contains the session ACL used for split tunneling.
If you enable RADIUS accounting in the AAA profile, the controller sends a RADIUS accounting start record to the RADIUS server when a user associates with the remote AP, and sends a stop record when the user logs out or is deleted from the user database. If you enable interim accounting, the controller sends updates at regular intervals. Each interim record includes cumulative user statistics, including received bytes and packets counters. For more information on RADIUS accounting, see
In the WebUI
1. Navigate to the Security > Authentication > AAA Profiles page. From the AAA Profiles Summary list, click
Add .
2. Enter the AAA profile name, then click Add .
3. Select the AAA profile that you just created.
a. For 802.1X Authentication Default Role , select the user role you previously configured for split tunneling, then click Apply .
b. Under the AAA profile that you created, locate 802.1X Authentication Server Group , and select the authentication server group to use, then click Apply .
4. (Optional) To enable RADIUS accounting:
732 | Remote Access Points ArubaOS 6.5.3.x | User Guide
a. Select the AAA profile from the profile list to display the list of authentication and accounting profiles associated with the AAA profile.
b. Select the Radius Accounting Server Group profile associated with the AAA profile. Click the RADIUS
Accounting Server Group drop-down list to select a RADIUS server group. (For more information on configuring a RADIUS server or server group, see
Configuring a RADIUS Server on page 180 .)
c. To enable RADIUS Interim Accounting, select the AAA profile name from the profile list, then click the
RADIUS Interim Accounting checkbox. This option is disabled by default, allowing the controller to send only start and stop messages to the RADIUS accounting server.
5. Click Apply .
If you need to create an authentication server group, select new and enter the appropriate parameters.
In the CLI
(host) (config) #aaa profile <name> authentication-dot1x <dot1x-profile> dot1x-default-role <role> dot1x-server-group <group> radius-accounting <group> radius-interim-accounting
Configuring the Virtual AP Profile
In the WebUI
1. Navigate to Configuration > Wireless > AP Configuration page. Select either the AP Group or AP
Specific tab. Click Edit for the applicable AP group name or AP name.
2. Under Profiles , select Wireless LAN , then Virtual AP .
3. To create a new virtual AP profile in the WebUI, select New from the Add a profile drop-down menu. Enter the name for the virtual AP profile, and click Add .
Whenever you create a new virtual AP profile in the WebUI, the profile automatically contains the “default” SSID profile with the default ESSID. You must configure a new ESSID and SSID profile for the virtual AP profile before you apply the profile.
a. In the Profile Details entry, go to the AAA Profile drop-down list and select the previously configured
AAA profile. The AAA Profile pop-up window appears.
b. To set the AAA profile and close the window, click Apply .
c. In the Profile Details entry for the new virtual AP profile, select NEW from the SSID Profile drop-down menu. A pop-up window displays to allow you to configure the SSID profile.
d. Enter the name for the SSID profile.
e. Under Network , enter a name in the Network Name (SSID) field.
f. Under Security , select the network authentication and encryption methods.
g. To set the SSID profile and close the window, click Apply .
4. Click Apply at the bottom of the Profile Details window.
5. Click the new virtual AP name in the Profiles list or the Profile Details to display configuration parameters.
6. Under Profile Details : a. Make sure Virtual AP enable is selected.
b. From the VLAN drop-down menu, select the VLAN ID for the VLAN to be used for split tunneling.
c. From the Forward mode drop-down menu, select split-tunnel .
d. Click Apply .
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 733
In the CLI
(host) (config) #wlan ssid-profile <profile> essid <name> opmode <method>
(host) (config) #wlan virtual-ap <profile> ssid-profile <name> forward-mode <mode>
(host) (config) # vlan <vlan id> aaa-profile <profile>
(host) (config) #ap-group <name> virtual-ap <profile> or
(host) (config) #ap-name <name> virtual-ap <profile>
Defining Corporate DNS Servers
Clients send DNS requests to the corporate DNS server address that it learned from DHCP. If configured for split tunneling, corporate domains and traffic destined for corporate use the corporate DNS server. For noncorporate domains and local traffic, other DNS servers can be used.
In the WebUI
1. Navigate to Configuration > Wireless > AP Configuration page.
2. Select either the AP Group or AP Specific tab. Click Edit for the AP group or AP name.
3. Under Profiles, select AP , then AP system profile .
4. Under Profile Details : a. Enter the corporate DNS servers.
b. Click Add .
The DNS name appears in Corporate DNS Domain list. You can add multiple names the same way.
5. Click Apply .
In the CLI
(host) (config) #ap system-profile <profile> dns-domain <domain name>
Understanding Bridge
The bridge feature allows you to route the traffic flow only to the internet and not to the corporate network.
Only the 802.1X authentication request is sent to the corporate network. This feature is useful for guest users.
ArubaOS does not support Wired 802.1X authentication in bridge mode for RAP and CAP. 802.1X authentication is supported only in tunnel and split modes.
734 | Remote Access Points ArubaOS 6.5.3.x | User Guide
Figure 107 Sample Bridge Environment
displays the local traffic being routed to the internet and the 802.1X authentication request sent to the corporate network.
Configuring Bridge
To configure a bridge, perform the following steps. Each step is described in detail later in this chapter.
The bridge feature requires the PEFNG license. If you do not have the PEFNG license on your controller, you must install it before you configure bridge. For details on installing licenses, see
Software Licenses on page 78 .
1. Define a session ACL that routes the traffic.
a. Create rules to permit DHCP and local data traffic.
b. Apply the session ACL to a user role. For information about user roles and policies, see
Roles and Policies on page 381
.
2. Configure the remote AP’s AAA profile.
a. Specify the authentication method ( 802.1X
or PSK ) and the default user role for authenticated users.
The user role specified in the AAA profile must contain the session ACL defined in the previous step.
b. (Optional) Use the remote AP’s AAA profile to enable RADIUS accounting.
3. Configure the virtual AP profile: a. Specify the AP group or ap-name to which the virtual AP profile applies.
b. Set the VLAN in the virtual AP.
c. When specifying the use of a bridge configuration, use bridge forward mode.
d. Create and apply the applicable SSID profile.
e. (Optional) Under AP system profile, configure the RAP DHCP pool. RAP DHCP VLAN must be same as
VAP's VLAN. If the client needs to obtain from the RAP DHCP Server.
When creating a new virtual AP profile In the WebUI, you can simultaneously configure the SSID. For information about AP profiles, see
Understanding AP Configuration Profiles on page 530
.
Configuring the Session ACL
First you need to configure a session ACL that “permits” corporate traffic to be forwarded to the controller and that routes, or locally bridges, local traffic.
In the WebUI
1. Navigate to the Configuration > Security > Access Control > Policies page.
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 735
2. Click Add to create a new policy.
3. Enter the policy name in the Policy Name field.
4. From the Policy Type drop-down list, select Session .
5. From the IP Version drop-down list, select IPv4 or IPv6 .
6. To create the first rule: a. Under Rules , click Add .
b. Under Source , select any .
c. Under Destination , select any .
d. Under Service , select service . In the service drop-down list, select svc-dhcp .
e. Under Action , select permit for IPv4 or captive for IPv6.
f. Click Add .
7. To create the next rule: a. a. Under Rules, click Add .
b. b. Under Source, select any .
c. c. Under Destination, select alias .
The following steps define an alias representing the corporate network. Once defined, you can use the alias for other rules and policies. You can also create multiple destinations the same way.
8. Under the alias section, click New . Enter a name in the Destination Name field.
a. Click Add .
b. For Rule Type, select Network .
c. Enter the public IP address of the controller.
d. Enter the Network Mask/Range.
e. Click Add to add the network range.
f. Click Apply . The new alias appears in the Destination menu.
9. Under Destination , select the alias you just created.
10.Under
Service , select any .
11.Under
Action , select permit for IPv4 or captive for IPv6.
12.Click
Add .
13.To create the next rule: a. Under Rules , click Add .
b. Under Source , select user .
c. Under Destination , select any .
d. Under Service , select any .
e. Under Action , select any and check src-nat .
f. Click Add .
14.Click
Apply .
15.Click the User Roles tab.
a. Click Add to create and configure a new user role.
b. Enter the desired name for the role in the Role Name field.
c. Under Firewall Policies , click Add .
d. From the Choose from Configured Policies drop-down menu, select the policy you just configured.
e. Click Done .
736 | Remote Access Points ArubaOS 6.5.3.x | User Guide
16.Click
Apply .
In the CLI
If dhcp server in ap system profile is enabled
(host) (config) #ip access-list session <policy> any any svc-dhcp permit
(host) (config) #user any any route src-nat
If dhcp server in ap system profile is disabled
(host) (config) #ip access-list session <policy>
(host) (config) #any any any permit
(host) (config) #user-role <role> session-acl <policy>
To configure an ACL to Restrict Local Debug Homepage Access, see
Configuring an ACL to Restrict Local Debug
Configuring the AAA Profile for Bridge
After you configure the session ACL, you define the AAA profile used for bridge. When defining the AAA parameters, specify the previously configured user role that contains the session ACL used for bridge.
If you enable RADIUS accounting in the AAA profile, the controller sends a RADIUS accounting start record to the RADIUS server when a user associates with the remote AP, and sends a stop record when the user logs out or is deleted from the user database. If you enable interim accounting, the controller sends updates at regular intervals. Each interim record includes cumulative user statistics, including received bytes and packets counters. For more information on RADIUS accounting, see
.
In the WebUI
1. Navigate to the Security > Authentication > AAA Profiles page. From the AAA Profiles Summary list, click Add .
2. Enter the AAA profile name, then click Add .
3. Select the AAA profile that you just created.
a. For 802.1X Authentication Default Role , select the user role you previously configured for split tunneling or bridge, then click Apply .
b. Under the AAA profile that you created, locate 802.1X Authentication Server Group , and select the authentication server group to use, then click Apply .
4. (Optional) To enable RADIUS accounting: a. Select the AAA profile from the profile list to display the list of authentication and accounting profiles associated with the AAA profile.
b. Select the Radius Accounting Server Group profile associated with the AAA profile. Click the RADIUS
Accounting Server Group drop-down list to select a RADIUS server group . (For more information on configuring a RADIUS server or server group, see
Configuring a RADIUS Server on page 180 .)
c. To enable RADIUS Interim Accounting , select the AAA profile name from the profile list, then click the RADIUS Interim Accounting checkbox. This option is disabled by default, allowing the controller to send only start and stop messages RADIUS accounting server.
5. Click Apply .
If you need to create an authentication server group, select new and enter the appropriate parameters.
In the CLI
Use the following command:
(host) (config) #aaa profile <name>
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 737
(host) (config) #authentication-dot1x <dot1x-profile>
(host) (config) #dot1x-default-role <role>
(host) (config) #dot1x-server-group <group>
(host) (config) #radius-accounting <group>
(host) (config) #radius-interim-accounting
Configuring Virtual AP Profile
In the WebUI
1. Navigate to Configuration > Wireless > AP Configuration page . Select either the AP Group or AP
Specific tab. Click Edit for the applicable AP group name or AP name.
2. Under Profiles , select Wireless LAN , then Virtual AP .
3. To create a new virtual AP profile in the WebUI, select New from the Add a profile drop-down menu. Enter the name for the virtual AP profile, and click Add .
Whenever you create a new virtual AP profile in the WebUI, the profile automatically contains the “default” SSID profile with the default ESSID. You must configure a new ESSID and SSID profile for the virtual AP profile before you apply the profile.
a. In the Profile Details entry, go to the AAA Profile drop-down list and select the previously configured
AAA profile. The AAA Profile pop-up window appears.
b. To set the AAA profile and close the window, click Apply .
c. In the Profile Details entry for the new virtual AP profile, select NEW from the SSID Profile drop-down menu. A pop-up window displays to allow you to configure the SSID profile.
d. Enter the name for the SSID profile.
e. Under Network , enter a name in the Network Name (SSID) field.
f. Under Security , select the network authentication and encryption methods.
g. To set the SSID profile and close the window, click Apply .
4. Click Apply at the bottom of the Profile Details window.
5. Click the new virtual AP name in the Profiles list or the Profile Details to display configuration parameters.
6. Under Profile Details : a. Make sure Virtual AP enable is selected.
b. From the VLAN drop-down menu, select the VLAN ID for the VLAN to be used for bridge.
c. From the Forward mode drop-down menu, select Bridge .
d. Click Apply .
In the CLI
Use the following command:
(host) (config) #wlan ssid-profile <profile> essid <name>
(host) (config) #opmode <method>
(host) (config) #wlan virtual-ap <profile>
(host) (config) #ssid-profile <name>
(host) (config) #forward-mode bridge
(host) (config) #vlan <vlan id>
(host) (config) #aaa-profile <profile>
(host) (config) #ap-group <name>
(host) (config) #virtual-ap <profile> or
738 | Remote Access Points ArubaOS 6.5.3.x | User Guide
(host) (config) #ap-name <name>
(host) (config) #virtual-ap <profile>
Provisioning Wi-Fi Multimedia
Wi-Fi Multimedia (WMM) is a Wi-Fi Alliance specification based on the IEEE 802.11e wireless Quality of Service
(QoS) standard. WMM works with 802.11a, b, g, and n physical layer standards. The IEEE 802.11e standard also defines the mapping between WMM access categories (ACs) and Differentiated Services Codepoint (DSCP) tags. Remote APs support WMM.
WMM supports four ACs: voice, video, best effort, and background. You apply and configure WMM in the SSID profile.
When planning your configuration, make sure that immediate switches or routers do not have conflicting
802.1p or DSCP configurations/mappings. If this occurs, your traffic may not be prioritized correctly.
Reserving Uplink Bandwidth
You can reserve and prioritize uplink bandwidth traffic to provide higher QoS for specific applications, traffic, or ports. This is done by applying bandwidth reservation on existing session ACLs. Typically, the bandwidth reservation is applied for uplink voice traffic.
Note the following before you configure bandwidth reservation: n n n n n n
You must know the total bandwidth available.
The bandwidth reservation are applicable only on session ACLs.
Bandwidth reservation on voice traffic ACLs receives higher priority over other reserved traffic.
You can configure up to three unique priority for bandwidth reservation.
The bandwidth reservation must be specified in absolute value (kbps).
Priorities for bandwidth reservation are optional, and bandwidth reservations without priorities are treated equal.
Understanding Bandwidth Reservation for Uplink Voice Traffic
The voice ACLs are applicable on the voice signaling traffic used to establish voice call through a firewall. When a voice ACL is executed, a dynamic session is introduced to allow voice traffic through the firewall. This prevents the re-use of voice ACLs for bandwidth reservation. However, you can create bandwidth reservation rules that can be applied on voice signaling traffic and ports used for voice data traffic. This mechanism filters traffic as per the security requirements.
Configuring Bandwidth Reservation
You can configure bandwidth reservation ACLs using the WebUI or the CLI.
In the WebUI
To configure bandwidth reservation
1. Navigate to Configuration > Advanced Services > All Profiles
2. Under Profiles , navigate to AP > AP System Profile . You can create a new AP system profile to configure bandwidth reservation or edit an existing AP system profile. Under the Profiles Details page, specify bandwidth reservation values.
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 739
Figure 108 Uplink Bandwidth Reservation
In the CLI
(host) (config)#ap system-profile remotebw
(host) (AP system profile "remotebw") #rap-bw-total 1024
(host) (AP system profile "remotebw") #rap-bw-resv-1 acl voice 128 priority 1
To view bandwidth reservations:
(host) #show datapath rap-bw-resv ap-name remote-ap-1
Provisioning 4G USB Modems on Remote Access Points
ArubaOS provides support for 4G networks by allowing you to provision 4G USB modems on the RAP. You can also provision the RAP to support both 4G and 3G USB modems. This enables the RAP to choose the available network automatically. 4G takes precedence over 3G when the RAP tries to auto select the network. You can also configure the RAP to work exclusively on a 3G or 4G network. It is recommended that you provision the
USB modems for the RAP based on your network requirements.
4G USB Modem Provisioning Best Practices and Exceptions
n n n
RAP does not support dynamic plug-and-play for the 4G USB modems. You must provision a RAP with the
4G USB parameters on the controller manually based on its type and family (4G-WiMAX/4G-LTE).
When a RAP connects to a 4G network, it appears as a Remote AP (R) and Cellular (C) on the controller.
For a 3G/4G network switch, using the UML290 modem with the firmware version L0290VWB522F.242 or later is recommended. Using a lower version of the firmware auto-selects the network mode based on the network availability. The latest version allows the RAP to lock the modem in a particular network mode (for example, 3G only).
The 4G-WiMAX family of modems do not support the 3G-4G network switch-over functionality.
ArubaOS 6.3 includes a new method of provisioning multimode USB modems (such as a Verizon UML290,
Verizon MC551L, or AT&T 313u) for a remote AP. These changes simplify modem provisioning for both 3G and
4G networks. The modem configuration procedure in ArubaOS 6.2.0.x and earlier versions required that you define a driver for a 3G modem in the USB modem field under the AP provisioning profile, or define a driver for a 4G modem in the 4G USB type field. Starting with ArubaOS 6.3, you can configure drivers for both a 3G or a
4G modem using the USB field, and the 4G USB Type field is deprecated.
740 | Remote Access Points ArubaOS 6.5.3.x | User Guide
Provisioning RAP for USB Modems
To enable 3G/4G network support, you must provision the RAP with the USB parameters on the controller.
You can use the WebUI or CLI to provision the USB parameters.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Installation page.
2. Select the Provisioning tab.
3. Select an AP and click Provision .
4. Select the Yes option by Remote AP .
5. Under USB Settings , select the USB Parameters check box.
6. Click the Device drop-down list and select a USB modem device.
7. Click the Cellular NW Preferences drop-down list and select one of the following provisioning options.
Table 162: Cellular Network Preference Parameters
Parameter Description auto (default) In this mode, the modem firmware will control the cellular network service selection; so the cellular network service failover and fallback is not interrupted by the remote AP (RAP).
3g_only
4g_only advanced
Locks the modem to operate only in 3G .
Locks the modem to operate only in 4G .
The RAP controls the cellular network service selection based on an Received Signal
Strength Indication (RSSI) threshold-based approach.
n n n
Initially the modem is set to the default auto mode. This allows the modem firmware to select the available network.
The RAP determines the RSSI value for the available network type (for example 4G), checks whether the RSSI is within required range, and if so, connects to that network.
If the RSSI for the modem’s selected network is not within the required range, the RAP will then check the RSSI limit of an alternate network (for example, 3G), and reconnect to that alternate network. The RAP will repeat the above steps each time it tries to connect using a 4G multimode modem in this mode.
8. Click Apply and Reboot to reboot the RAP with the new configuration.
In the CLI
To enable 4G-exclusive network support on the RAP, execute the following commands:
(host) (config) #ap provisioning-profile <profile-name>
(host) (Provisioning profile "<profile-name>") usb-type <USB modem type>
(host) (Provisioning profile "<profile-name>") #usb-type none
(host) (Provisioning profile "<profile-name>") #cellular_nw_preference 4g_only
To enable 3G-exclusive network support on the RAP, execute the following commands:
(host) (config) #ap provisioning-profile <profile-name>
(host) (Provisioning profile "<profile-name>") usb-type <USB modem type>
(host) (Provisioning profile "<profile-name>") #usb-type none
(host) (Provisioning profile "<profile-name>") #cellular_nw_preference 3g_only
To enable 3G/4G network switch support, execute the following commands:
(host) (config) #ap provisioning-profile <profile-name>
(host) (Provisioning profile "<profile-name>") usb-type <USB modem type>
(host) (Provisioning profile "<profile-name>") #usb-type none
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 741
(host) (Provisioning profile "<profile-name>") #cellular_nw_preference auto
RAP 3G/4G Backhaul Link Quality Monitoring
The RAP is enhanced to support link monitoring on 2G, 3G, and 4G modems to provide information about the state of USB modem and cellular network.
The USB modem has the following four states: n n n n
Active - The USB modem is used as the primary path for connecting VPN to the controller
Standby or Backup - The network is available but the USB modem is not used for connecting VPN to the controller
Error - The USB modem is available but the modem is faulty
Not Plugged - The USB modem is unavailable
To view the USB modem details on the RAP, execute the following command:
(host) #show ap debug usb ap-name <ap-name>
Provisioning RAPs at Home
The following section provides information on provisioning your remote AP (RAP) at home using a static IP address, PPPoE connection, or USB modem.
Prerequisites
Follow the steps below to acquire a static IP address before provisioning the RAP at home:
1. Connect the RAP at the site of deployment and ensure that it has connectivity to the Internet to reach the controller.
2. Connect a laptop to Port 1 of the RAP to get an IP address from the RAP's internal DHCP pool.
Provisioning RAP Using Zero Touch Provisioning
You provision the RAP using provisioning wizard:
1. Navigate to the RAP configuration URL: http://rapconsole.arubanetworks.com
.
2. Enter the IP address or hostname of the controller.
3. Click the Show Advanced Settings link, shown in
Figure 109 Show Advanced Settings
4. In the Advanced Settings wizard, you can select one of the following: a.
Static IP —Select this tab to provision your RAP using a static IP address.
b.
PPPoE —Select this tab to provision your RAP on a PPPoE connection.
c.
USB —Select this tab to provision your RAP using 3G/EVDO USB modem.
742 | Remote Access Points ArubaOS 6.5.3.x | User Guide
Provisioning the RAP using a Static IP Address
Select the Static IP tab and enter the required details. See
for information on parameters.
Figure 110 Provision RAP using Static IP
Table 163: Provision using Static IP
Parameter Description
IP Address
Netmask
Gateway
Primary DNS
Domain
Enter the static IP address that you want to configure for your remote access point.
Enter the network mask.
Enter the default gateway IP address of your network.
Enter the IP address of your primary DNS server. This is an optional parameter.
Enter your domain name. This is an optional parameter.
Click Save after you have entered all the details.
Provision the RAP on a PPPoE Connection
Select the PPPoE tab and enter the required details. See
for information on parameters.
Figure 111 Provision RAP on a PPPoE Connection
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 743
Table 164: Provision using PPPoE Connection
Parameter
Service Name
Description
Username
Password
Enter the PPPoE service name provided to you by your service provider. This parameter is optional.
Enter the user name for the PPPoE connection.
Enter your PPPoE password.
Click Save after you have entered all the details.
Using 3G/EVDO USB Modems
The following procedure illustrates provisioning your RAP using a 3G/EVDO USB modem.
1. Select the USB tab and select your modem from the drop down list. Configuration details automatically appear for some common modems.
Figure 112 Provision using a preconfigured USB Modem
2. If your modem name is not listed, select Other and manually enter the following details. These are available from the manufacturer of your modem or from your IT administrator:
744 | Remote Access Points ArubaOS 6.5.3.x | User Guide
Figure 113 Provision using a USB Modem with Custom Settings n n n n n n
Device Type
Initializing String
PPP Username
PPP Password
TTY Device Path
Device Identifier n n
Dial String
Link Priority Cellular—This is a number that identifies the priority of the connection. If the Link Priority
Cellular has a higher number than Link Priority Ethernet , then cellular connection is used.
n
Link Priority Ethernet—This is a number that identifies the priority of the connection. If the Link Priority
Ethernet has a higher number than Link Priority Cellular , then Ethernet connection is used.
3. Click Save after you have entered all the details and click Continue to complete provisioning of your RAP.
Configuring RAP-3WN and RAP-3WNP Access Points
The ArubaRAP-3WN and RAP-3WNP are single-radio, single-band wireless APs that support the IEEE 802.11n
standard for high-performance WLAN. These APs use MIMO (Multiple-In, Multiple-Out) technology and other high-throughput mode techniques to deliver high-performance, 802.11n 2.4 GHz functionality while simultaneously supporting existing 802.11 b/g wireless services.
See the Aruba RAP-3WN Installation Guide for more information.
These access points require Aruba Instant 3.0 or later to operate as an Instant AP, or ArubaOS 6.1.4.0 or later to operate as a Remote AP.
The Power Sourcing Equipment (PSE) functionality is available only for RAP-3WNP APs, as the PoE itself provides the PSE functionality for RAP-3WN APs. You can use the WebUI or CLI to enable or disable the PSE functionality on the RAP-3WNP APs.
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 745
In the WebUI
1. Navigate to the Configuration > Advanced Services > All Profiles page.
2. Select the AP tab, then the AP Ethernet Link profile tab.
3. Select the default tab .
4. Select the Power over Ethernet checkbox.
5. Click Apply . Support for RAP-3WN and RAP-3WNP access points (APs)
In the CLI n
To enable, enter:
(host)(config) #ap enet-link-profile <name> poe n
To disable, enter:
(host)(config) #ap enet-link-profile <name> no poe
Use the following command to view the PoE port status on an AP:
(host) #show ap enet-link-profile default
Converting an IAP to RAP or CAP
For IAP to RAP or CAP conversion, the virtual controller sends the convert command to all the other IAPs. The virtual controller along with the other slave IAPs then set up a VPN tunnel to the remote controller, and download the firmware by FTP. The Virtual Controller uses IPsec to communicate to the controller over the internet.
A mesh point cannot be converted to RAP because mesh does not support VPN connection.
An IAP can be converted to a Campus AP and Remote AP only if the controller is running ArubaOS 6.1.4 or later.
The following table describes the supported IAP platforms and minimal AOS version for IAP to CAP/RAP conversion.
Converting IAP to RAP
To convert an IAP to RAP, follow the instructions below:
1. Navigate to the Maintenance tab in the top right corner of the Instant UI.
2. Click the Conver t tab.
3. Select Remote APs managed by a Controller from the drop-down list.
4. Enter the hostname (fully qualified domain name) or the IP address of the controller in the Hostname or
IP Address of Controller text box. This information is provided by your network administrator.
Ensure the Controller IP Address is reachable by the IAPs.
5. Click Convert Now to complete the conversion.
6. The IAP reboots and begins operating in RAP mode.
7. After conversion, the IAP is managed by the Aruba controller which has been specified in the Instant UI.
746 | Remote Access Points ArubaOS 6.5.3.x | User Guide
In order for the RAP conversion to work, ensure that you configure the Instant AP in the RAP white-list and enable the
FTP service on the controller.
If the VPN setup fails and an error message pops up, please click OK, copy the error logs and share them with your
Aruba support engineer.
Converting an IAP to CAP
To convert an IAP to a Campus AP, do the following:
1. Navigate to the Maintenance tab in the top right corner of the Instant UI.
2. Click the Convert tab.
3. Select Campus APs managed by a Controller from the drop-down list.
4. Enter the hostname (fully qualified domain name) or the IP address of the controller in the Hostname or
IP Address of Controller text box. This is provided by your network administrator.
Ensure that the Controller IP Address is reachable by the APs.
5. Click Convert Now to complete the conversion.
Enabling Bandwidth Contract Support for RAPs
This release of ArubaOS provides Bandwidth Contract support on remote APs. This is achieved by extending the Bandwidth Contract support on split-tunnel and bridge modes.
You can apply Bandwidth Contract for a RAP on a per-user or per-role basis. Bandwidth Contract is applied on a per-role basis by default. This implies that all the users belonging to the same role will share the bandwidth pool. When Bandwidth Contract configured on the controller is attached to a user-role, it automatically gets pushed to the RAPs terminating on it.
The following show commands have been enhanced in this release to retrieve the Bandwidth Contract information from the RAP: show datapath user ap-name <ap-name> show datapath bwm ap-name <ap-name>
Configuring Bandwidth Contracts for RAP
You can configure bandwidth contracts for RAP on a per-role or per-user basis. The following examples illustrate how to configure, apply, and verify the Bandwidth Contracts on the RAPs.
Defining Bandwidth Contracts
Use the following command to define a 256 Kbps contract:
(host) (config) #aaa bandwidth-contract 256k kbits 256
Use the following command to define a 512 Kbps contract
(host) (config) #aaa bandwidth-contract 512k kbits 512
Applying Contracts
You can apply the contract on a per-role or per-user basis.
Applying Contracts Per-Role
Use the following commands to apply the contracts on a per-role basis for upstream and downstream:
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 747
For upstream contract of 512 Kbps:
(host) (config) #user-role authenticated bw-contract 512k upstream
For downstream contract of 256 Kbps:
(host) (config) #user-role authenticated bw-contract 256k downstream
Applying Contracts Per-User
Use the following commands to apply the contracts on a per-user basis for upstream and downstream:
For upstream contract of 512 Kbps:
(host) (config) #user-role authenticated bw-contract 512k per-user upstream
For downstream contract of 256 Kbps:
(host) (config) #user-role authenticated bw-contract 256k per-user downstream
Verifying Contracts on AP
The following example displays the bandwidth contracts on AP for per-role configuration:
(host) #show datapath bwm ap-name rap5-2
Datapath Bandwidth Management Table Entries
-------------------------------------------
Flags: Q - No drop, P - No shape(Only Policed),
T - Auto tuned
--------------------------------------------------------------------
Rate: pps - Packets-per-second (256 byte packets), bps - Bits-per-second
--------------------------------------------------------------------
Cont Avail Queued/Pkts
Id Rate Policed Bytes Bytes Flags
---- --------- ---------- ------- ------------ -----
1
2
512000
256000
0
0
16000
8000
0/0
0/0
P
P
The following example displays the bandwidth contracts on AP for per-user configuration (contract IDs 3 and 4 are per-user contracts):
(host) #show datapath bwm ap-name rap5-2
Datapath Bandwidth Management Table Entries
-------------------------------------------
Flags: Q - No drop, P - No shape(Only Policed),
T - Auto tuned
--------------------------------------------------------------------
Avail Queued/Pkts
Id Rate Policed Bytes Bytes Flags
---- --------- ---------- ------- ------------ -----
3
4
1
2
512000
256000
512000
256000
300
277
0 16000
0
16000
8000
8000
0/0
0/0
0/0
0/0
P
P
P
P
Verifying Contracts Applied to Users
You can verify if the contracts are applied to the user after the user connects to the AP using CLI.
The following is a sample output for a per-role configuration:
(host) #show datapath user ap-name rap5-2
Datapath User Table Entries
---------------------------
748 | Remote Access Points ArubaOS 6.5.3.x | User Guide
Flags: P - Permanent, W - WEP, T- TKIP, A - AESCCM, G - AESGCM, V - ProxyArp to/for MN
(Visitor),
N - VPN, L - local, Y - Any IP user, R - Routed user, M - Media Capable,
S - Src NAT with VLAN IP, E - L2 Enforced, F - IPIP Force Delete, O - VOIP user, I - Interim stats,
C - Inactive, D - Suppress Idle TMO, m - IP mobile user anchor, H - 1st DHCP sent to AUTH
FM(Forward Mode): S - Split, B - Bridge, N - N/A
IP MAC ACLs Contract Location Age Sessions Flags Vlan
------------------------------------- ---------------------------------
10.15.72.50
10.15.72.253
00:0B:86:61:12:AC
00:18:8B:A9:A8:DF
2703/0
52/0
0/0
1/2
0
0
16
1
1/65535
0/65535
P 0
1
192.168.11.1
10.15.196.249
FM IdleTMO
---------
00:0B:86:66:03:3F 2700/0
00:0B:86:66:03:3F 2700/0
0/0
0/0
0
0
20024 0/65535
3 1/65535
P
P
177
1
N 300
S 300
N 300
N 300
The following is a sample output for a per-user configuration:
(host) #show datapath user ap-name rap5-2
Datapath User Table Entries
---------------------------
Flags: P - Permanent, W - WEP, T- TKIP, A - AESCCM, G - AESGCM, V - ProxyArp to/for MN
(Visitor),
N - VPN, L - local, Y - Any IP user, R - Routed user, M - Media Capable,
S - Src NAT with VLAN IP, E - L2 Enforced, F - IPIP Force Delete, O - VOIP user, I - Interim stats,
C - Inactive, D - Suppress Idle TMO, m - IP mobile user anchor, H - 1st DHCP sent to AUTH
FM(Forward Mode): S - Split, B - Bridge, N - N/A
FM IdleTMO
---------
N 300
S 300
N 300
N 300
Verifying Bandwidth Contracts During Data Transfer
You can verify the Bandwidth Contracts that are in use during data transfer using CLI.
The following is a sample output for a per-role configuration:
(host) #show datapath session ap-name rap5-2 table 10.15.72.99
Datapath Session Table Entries
------------------------------
Flags: F - fast age, S - src NAT, N - dest NAT
D - deny, R - redirect, Y - no syn
H - high prio, P - set prio, T - set ToS
C - client, M - mirror, V - VOIP
Q - Real-Time Quality analysis
I - Deep inspect, U - Locally destined
E - Media Deep Inspect, G - media signal
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 749
r - Route Nexthop
A - Application Firewall Inspect
B - Permanent, O - Openflow
RAP Flags: 1 - Class 1, 2 - Class 2, 3 - Class 3
Source IP Destination IP Prot SPort DPort Cntr Prio ToS Age Destination
-------------- -------------- ---- ----- -------- ---- --- --- -----------
10.15.72.253
10.15.72.99
6
10.15.72.253
10.15.72.99
10.15.72.99
10.15.72.253
6
6
10.15.72.99
10.15.72.253
6
5001 36092 1/1 0 0 0 dev12
3488 5001 1/1 0 0 0 dev5
5001 3488 1/2 0 0 0 dev5
36092 5001 1/2 0 0 0 dev12
TAge Packets Bytes Flags
---- ---------------------
6 --
6 --
6 --
6 --
--
--
--
--
C
C
C
The following is a sample output for a per-user configuration:
(host) #show datapath session ap-name rap5-2 table 10.15.72.99
Datapath Session Table Entries
------------------------------
Flags: F - fast age, S - src NAT, N - dest NAT
D - deny, R - redirect, Y - no syn
H - high prio, P - set prio, T - set ToS
C - client, M - mirror, V - VOIP
Q - Real-Time Quality analysis
I - Deep inspect, U - Locally destined
E - Media Deep Inspect, G - media signal r - Route Nexthop
A - Application Firewall Inspect
B - Permanent, O - Openflow
RAP Flags: 1 - Class 1, 2 - Class 2, 3 - Class 3
Source IP Destination IP Prot SPort DPort Cntr Prio ToS Age Destination
-------------- ----------------- ----- -------- ---- --- --- -----------
10.15.72.253
10.15.72.99
10.15.72.99
10.15.72.253
6
6
3489
5001
5001
3489
1/3
1/4
0
0
0
0
0
0 dev5 dev5
10.15.72.99
10.15.72.253
10.15.72.253
6
10.15.72.99
6
36096 5001 1/4 0 0 0 dev12
5001 36096 1/3 0 0 0 dev12
TAge Packets Bytes Flags
---- ---------------------
37
37
--
--
--
--
FC
F
37
37
--
--
--
--
C
RAP TFTP Image Upgrade
Starting from ArubaOS 6.5, you can enable or disable the TFTP image upgrade on a RAP. This feature does not impact the campus APs. You can enable or disabled this feature using the WebUI or the CLI.
In the WebUI
The following WebUI procedure enables or disables the TFTP image upgrade on a RAP:
1. Navigate to Configuration > ADVANCED SERVICES > All Profiles .
2. In the Profiles section, expand AP > AP system .
3. Select the default ap system-profile.
750 | Remote Access Points ArubaOS 6.5.3.x | User Guide
4. In the Profile Details section, click the Advanced tab.
5. Select the Disable RAP Tftp Image Upgrade check box.
Note: Selecting the check box disables the TFTP image upgrade. Clearing the check box enables the TFTP image upgrade.
6. Click Apply .
In the CLI
The following commands enables or disables the TFTP image upgrade on a RAP:
(host) (config) #ap system-profile default
(host) (AP system profile "default") #[no] disable-tftp-image-upgrade
(host) (AP system profile "default") #write memory
The following command displays if the TFTP image upgrade is enabled or disabled in the AP system profile:
(host) #show ap system-profile default
AP system profile "default"
---------------------------
Parameter
---------
RF Band
RF Band for AM mode scanning
Native VLAN ID
Tunnel Heartbeat Interval
Session ACL
Corporate DNS Domain
Value
----g all
10
1 ap-uplink-acl
N/A
SNMP sysContact N/A
LED operating mode (11n/11ac APs only) normal
LED override
Driver log level
Disabled warnings
Console log level
SAP MTU
RAP MTU
LMS IP emergencies
N/A
1200 bytes
N/A
Backup LMS IP
LMS IPv6
Backup LMS IPv6
LMS Preemption
LMS Hold-down Period
LMS ping interval
Remote-AP DHCP Server VLAN
Remote-AP DHCP Server Id
Remote-AP DHCP Default Router
Remote-AP DHCP DNS Server
Remote-AP DHCP Pool Start
Remote-AP DHCP Pool End
Remote-AP DHCP Pool Netmask
Remote-AP DHCP Lease Time
Remote-AP uplink total bandwidth
Remote-AP bw reservation 1
Remote-AP bw reservation 2
Remote-AP bw reservation 3
Remote-AP Local Network Access
Bootstrap threshold
Double Encrypt
Dump Server
Heartbeat DSCP
Maintenance Mode
Maximum Request Retries
Request Retry Interval
N/A
N/A
N/A
Disabled
600 sec
20
N/A
192.168.11.1
192.168.11.1
N/A
192.168.11.2
192.168.11.254
255.255.255.0
0 days
0 kbps
N/A
N/A
N/A
Disabled
8
Disabled
N/A
0
Disabled
10
10 sec
ArubaOS 6.5.3.x
| User Guide Remote Access Points | 751
Number of IPSEC retries
Secondary Master IP/FQDN
AeroScout RTLS Server
RTLS Server configuration
85 exit
N/A
N/A
RTLS Server Compatibility Mode Enabled
Slow Timer Recovery by rebooting itself Disabled
Telnet
Disable RAP Tftp Image Upgrade
Enabled
Disabled
Spanning Tree
AP multicast aggregation
Enabled
Disabled
AP ARP attack protection Enabled
AP multicast aggregation allowed VLANs none
Console enable
AP Console Protection
AP Console Password
Password for Backup
AP USB Power override
RF Band for Backup
Operation for Backup
BLE Endpoint URL
BLE Auth Token
BLE Operation Mode
Enabled
Disabled
********
********
Disabled all off
N/A
N/A
Disabled
752 | Remote Access Points ArubaOS 6.5.3.x | User Guide
advertisement
Related manuals
advertisement
Table of contents
- 3 Contents
- 16 Revision History
- 17 About this Guide
- 17 What's New In ArubaOS 6.5.x
- 29 Fundamentals
- 30 Related Documents
- 31 Conventions
- 32 Contacting Support
- 33 The Basic User-Centric Networks
- 33 Understanding Basic Deployment and Configuration Tasks
- 36 Controller Configuration Workflow
- 37 Connect the Controller to the Network
- 38 7000 Series and 7200 Series Controllers
- 40 Using the LCD Screen
- 43 Configuring a VLAN to Connect to the Network
- 46 Enabling Wireless Connectivity
- 47 Enabling Wireless Connectivity
- 47 Configuring Your User-Centric Network
- 47 Replacing a Controller
- 54 Control Plane Security
- 55 Control Plane Security Overview
- 55 Configuring Control Plane Security
- 57 Managing AP Whitelists
- 64 Managing Whitelists on Master and Local Controllers
- 68 Working in Environments with Multiple Master Controllers
- 71 Replacing a Controller on a Multi-Controller Network
- 75 Configuring Control Plane Security after Upgrading
- 76 Troubleshooting Control Plane Security
- 78 Software Licenses
- 78 Getting Started with ArubaOS Licenses
- 78 License Types and Usage
- 81 Licensing Best Practices and Limitations
- 82 Centralized Licensing Overview
- 88 Configuring Centralized Licensing
- 90 Installing a License
- 92 Deleting a License
- 93 Monitoring and Managing Centralized Licenses
- 96 Network Configuration Parameters
- 96 Campus WLAN Workflow
- 97 Understanding VLAN Assignments
- 105 Configuring VLANs
- 109 Configuring Ports
- 112 Configuring Static Routes
- 112 Configuring the Loopback IP Address
- 113 Configuring the Controller IP Address
- 114 Configuring GRE Tunnels
- 123 Configuring GRE Tunnel Groups
- 126 Jumbo Frame Support
- 129 IPv6 Support
- 129 Understanding IPv6 Notation
- 129 Understanding IPv6 Topology
- 130 Enabling IPv6
- 130 Enabling IPv6 Support for Controller and APs
- 138 Filtering an IPv6 Extension Header (EH)
- 138 Configuring a Captive Portal over IPv6
- 139 Working with IPv6 Router Advertisements (RAs)
- 143 RADIUS Over IPv6
- 144 TACACS Over IPv6
- 145 DHCPv6 Server
- 147 Understanding ArubaOS Supported Network Configuration for IPv6 Clients
- 148 Understanding ArubaOS Authentication and Firewall Features that Support IPv6
- 153 Managing IPv6 User Addresses
- 154 Understanding IPv6 Exceptions and Best Practices
- 156 Link Aggregation Control Protocol
- 156 Understanding LACP Best Practices and Exceptions
- 157 Configuring LACP
- 159 LACP Sample Configuration
- 160 OSPFv2
- 160 Understanding OSPF Deployment Best Practices and Exceptions
- 161 Understanding OSPFv2 by Example using a WLAN Scenario
- 162 Understanding OSPFv2 by Example using a Branch Scenario
- 164 Configuring OSPF
- 165 Sample Topology and Configuration
- 176 Tunneled Nodes
- 176 Understanding Tunneled Node Configuration
- 177 Configuring a Wired Tunneled Node Client
- 179 Authentication Servers
- 179 Understanding Authentication Server Best Practices and Exceptions
- 179 Understanding Servers and Server Groups
- 180 Configuring Authentication Servers
- 198 Managing the Internal Database
- 201 Configuring Server Groups
- 207 Assigning Server Groups
- 212 Configuring Authentication Timers
- 213 Authentication Server Load Balancing
- 214 MAC-based Authentication
- 214 Configuring MAC-Based Authentication
- 215 Configuring Clients
- 217 Branch Controller Config for Cloud Services Controllers
- 218 Branch Deployment Features
- 219 Scalable Site-to-Site VPN Tunnels
- 219 Layer-3 Redundancy for Branch Controller Masters
- 220 WAN Failure (Authentication) Survivability
- 226 WAN Health Check
- 226 WAN Optimization through IP Payload Compression
- 227 Interface Bandwidth Contracts
- 228 Branch Integration with a Palo Alto Networks (PAN) Portal
- 231 Branch Controller Routing Features
- 232 Cloud Management
- 232 Zero-Touch Provisioning
- 239 Using Smart Config to create a Branch Config Group
- 260 PortFast and BPDU Guard
- 262 Preventing WAN Link Failure on Virtual APs
- 263 Branch WAN Dashboard
- 265 802.1X Authentication
- 265 Understanding 802.1X Authentication
- 268 Configuring 802.1X Authentication
- 276 Enabling 802.1X Supplicant Support on an AP
- 277 Sample Configurations
- 293 Performing Advanced Configuration Options for 802.1X
- 294 Application Single Sign-On Using L2 Authentication
- 296 Device Name as User Name for Non-802.1X Authentication
- 297 Stateful and WISPr Authentication
- 297 Working With Stateful Authentication
- 298 Working With WISPr Authentication
- 298 Understanding Stateful Authentication Best Practices
- 298 Configuring Stateful 802.1X Authentication
- 299 Configuring Stateful NTLM Authentication
- 300 Configuring Stateful Kerberos Authentication
- 301 Configuring WISPr Authentication
- 304 Certificate Revocation
- 304 Understanding OCSP and CRL
- 305 Configuring the Controller as an OCSP Client
- 307 Configuring the Controller as a CRL Client
- 308 Configuring the Controller as an OCSP Responder
- 309 Certificate Revocation Checking for SSH Pubkey Authentication
- 310 OCSP Configuration for VIA
- 312 Captive Portal Authentication
- 312 Understanding Captive Portal
- 313 Configuring Captive Portal in the Base Operating System
- 315 Using Captive Portal with a PEFNG License
- 318 Sample Authentication with Captive Portal
- 324 Configuring Guest VLANs
- 325 Configuring Captive Portal Authentication Profiles
- 330 Enabling Optional Captive Portal Configurations
- 333 Personalizing the Captive Portal Page
- 336 Creating and Installing an Internal Captive Portal
- 346 Creating Walled Garden Access
- 347 Enabling Captive Portal Enhancements
- 351 Netdestination for AAAA Records
- 352 Virtual Private Networks
- 352 Planning a VPN Configuration
- 356 Working with VPN Authentication Profiles
- 358 Configuring a Basic VPN for L2TP/IPsec
- 362 Configuring a VPN for L2TP/IPsec with IKEv2
- 367 Configuring a VPN for Smart Card Clients
- 368 Configuring a VPN for Clients with User Passwords
- 369 Configuring Remote Access VPNs for XAuth
- 370 Working with Remote Access VPNs for PPTP
- 371 Working with Site-to-Site VPNs
- 379 Working with VPN Dialer
- 381 Roles and Policies
- 381 Configuring Firewall Policies
- 391 User Roles
- 393 Assigning User Roles
- 399 Understanding Global Firewall Parameters
- 403 Using AppRF 2.0
- 408 ClearPass Policy Manager Integration
- 408 Introduction
- 408 Important Points to Remember
- 409 Enabling Downloadable Role on a Controller
- 409 Sample Configuration
- 417 Virtual APs
- 417 Virtual AP Configuration Workflow
- 418 Virtual AP Profiles
- 426 Changing a Virtual AP Forwarding Mode
- 427 Radio Resource Management (802.11k)
- 434 BSS Transition Management (802.11v)
- 434 Fast BSS Transition ( 802.11r)
- 436 SSID Profiles
- 443 WLAN Authentication
- 446 High-Throughput Virtual APs
- 451 Guest WLANs
- 454 Changing a Virtual AP Forwarding Mode
- 455 Adaptive Radio Management
- 455 Understanding ARM
- 457 Client Match
- 459 ARM Coverage and Interference Metrics
- 460 Configuring ARM Profiles
- 470 Assigning an ARM Profile to an AP Group
- 470 Using Multi-Band ARM for 802.11a/802.11g Traffic
- 471 Band Steering
- 472 Dynamic Bandwidth Switch
- 473 Enabling Traffic Shaping
- 475 Traffic Steering
- 476 Spectrum Load Balancing
- 476 Reusing Channels to Control RX Sensitivity Tuning
- 477 Configuring Non-802.11 Noise Interference Immunity
- 477 Troubleshooting ARM
- 479 Wireless Intrusion Prevention
- 479 Working with the Reusable Wizard
- 482 Monitoring the Dashboard
- 483 Detecting Rogue APs
- 486 Working with Intrusion Detection
- 498 Configuring Intrusion Protection
- 502 Configuring the WLAN Management System
- 505 Understanding Client Blacklisting
- 508 Working with WIP Advanced Features
- 508 Configuring TotalWatch
- 510 Administering TotalWatch
- 511 Tarpit Shielding Overview
- 512 Configuring Tarpit Shielding
- 513 Access Points
- 513 Important Points to Remember
- 514 AP Discovery Logic
- 527 Basic Functions and Features
- 528 Naming and Grouping APs
- 530 Understanding AP Configuration Profiles
- 537 Before you Deploy an AP
- 537 Enable Controller Discovery
- 538 Enable DHCP to Provide APs with IP Addresses
- 539 AP Provisioning Profiles
- 542 Configuring Installed APs
- 547 Optional AP Configuration Settings
- 563 RF Management
- 577 Optimizing APs Over Low-Speed Links
- 585 AP Scanning Optimization
- 587 Channel Group Scanning
- 588 Configuring AP Channel Assignments
- 590 Managing AP Console Settings
- 593 Link Aggregation Support on 220 Series, 270 Series, 320 Series, and 330 Series
- 596 Recording Consolidated AP-Provisioned Information
- 598 Intelligent Power Monitoring
- 600 Secure Enterprise Mesh
- 600 Mesh Overview Information
- 600 Mesh Configuration Procedures
- 600 Understanding Mesh Access Points
- 602 Understanding Mesh Links
- 604 Understanding Mesh Profiles
- 608 Understanding Remote Mesh Portals (RMPs)
- 609 Understanding the AP Boot Sequence
- 610 Mesh Deployment Solutions
- 612 Mesh Deployment Planning
- 614 Configuring Mesh Cluster Profiles
- 618 Creating and Editing Mesh Radio Profiles
- 623 Creating and Editing Mesh High-Throughput SSID Profiles
- 629 Configuring Ethernet Ports for Mesh
- 631 Provisioning Mesh Nodes
- 633 Verifying Your Mesh Network
- 635 Configuring Remote Mesh Portals (RMPs)
- 638 Increasing Network Uptime Through Redundancy and VRRP
- 638 High Availability
- 638 VRRP-Based Redundancy
- 639 High Availability Deployment Models
- 641 Client State Synchronization
- 642 High Availability Inter-Controller Heartbeats
- 642 High Availability Extended Controller Capacity
- 643 Configuring High Availability
- 645 High Availability Alerting
- 646 Migrating from VRRP or Backup-LMS Redundancy
- 648 Configuring VRRP Redundancy
- 656 RSTP
- 656 Understanding RSTP Migration and Interoperability
- 656 Working with Rapid Convergence
- 657 Configuring RSTP
- 659 Troubleshooting RSTP
- 660 PVST+
- 660 Understanding PVST+ Interoperability and Best Practices
- 660 Enabling PVST+ in the CLI
- 661 Enabling PVST+ in the WebUI
- 662 Link Layer Discovery Protocol
- 662 Important Points to Remember
- 662 LLDP Overview
- 663 Configuring LLDP
- 664 Monitoring LLDP Configuration
- 668 IP Mobility
- 668 Understanding Aruba Mobility Architecture
- 669 Configuring Mobility Domains
- 673 Tracking Mobile Users
- 675 Configuring Advanced Mobility Functions
- 684 Understanding Bridge Mode Mobility Deployments
- 684 Enabling Mobility Multicast
- 689 External Firewall Configuration
- 689 Understanding Firewall Port Configuration Among Aruba Devices
- 690 Enabling Network Access
- 690 Ports Used for Virtual Intranet Access (VIA)
- 692 Configuring Ports to Allow Other Traffic Types
- 693 PAPI Enhanced Security
- 693 Interoperability
- 693 Configuring PAPI Enhanced Security
- 694 Verifying PAPI Enhanced Security
- 695 Palo Alto Networks Firewall Integration
- 695 Limitation
- 695 Preconfiguration on the PAN Firewall
- 697 Configuring PAN Firewall Integration
- 701 Remote Access Points
- 701 About Remote Access Points
- 703 Configuring the Secure Remote Access Point Service
- 709 Deploying a Branch/Home Office Solution
- 714 Enabling Remote AP Advanced Configuration Options
- 728 Understanding Split Tunneling
- 734 Understanding Bridge
- 739 Provisioning Wi-Fi Multimedia
- 739 Reserving Uplink Bandwidth
- 740 Provisioning 4G USB Modems on Remote Access Points
- 742 Provisioning RAPs at Home
- 745 Configuring RAP-3WN and RAP-3WNP Access Points
- 746 Converting an IAP to RAP or CAP
- 747 Enabling Bandwidth Contract Support for RAPs
- 750 RAP TFTP Image Upgrade
- 753 Virtual Intranet Access
- 754 Spectrum Analysis
- 754 Understanding Spectrum Analysis
- 759 Creating Spectrum Monitors and Hybrid APs
- 761 Connecting Spectrum Devices to the Spectrum Analysis Client
- 764 Configuring the Spectrum Analysis Dashboards
- 767 Customizing Spectrum Analysis Graphs
- 793 Working with Non-Wi-Fi Interferers
- 795 Understanding the Spectrum Analysis Session Log
- 795 Viewing Spectrum Analysis Data
- 796 Recording Spectrum Analysis Data
- 799 Troubleshooting Spectrum Analysis
- 801 Dashboard Monitoring
- 801 WAN
- 802 Performance
- 803 Usage
- 804 Potential Issues
- 804 Traffic Analysis
- 826 AirGroup
- 827 Security
- 827 UCC
- 829 Controller
- 831 WLANs
- 832 Access Points
- 832 Clients
- 833 Firewall
- 839 Automatic Reporting (PhoneHome)
- 839 Pre-Deployment Information
- 839 Configuration Procedures
- 839 Sending Reports to Activate vs. SMTP Servers
- 840 Configuring PhoneHome Automatic Reporting
- 841 Sending an Individual Report
- 842 Viewing Report Status
- 843 PhoneHome-Lite
- 844 Management Access
- 844 Configuring Certificate Authentication for WebUI Access
- 845 Secure Shell (SSH)
- 846 WebUI Session Timer
- 847 Enabling RADIUS Server Authentication
- 853 Connecting to an AirWave Server
- 856 Custom Certificate Support for RAP
- 858 Implementing a Specific Management Password Policy
- 860 Configuring AP Image Preload
- 863 Configuring Centralized Image Upgrades
- 865 Managing Certificates
- 871 Configuring SNMP
- 873 Enabling Capacity Alerts
- 874 Configuring Logging
- 878 Enabling Guest Provisioning
- 894 Managing Files on the Controller
- 897 Setting the System Clock
- 899 ClearPass Profiling with IF-MAP
- 900 Whitelist Synchronization
- 901 Downloadable Regulatory Table
- 904 802.11u Hotspots
- 904 Hotspot Profile Configuration Tasks
- 904 Hotspot 2.0 Overview
- 907 Configuring Hotspot 2.0 Profiles
- 911 Configuring Hotspot Advertisement Profiles
- 913 Configuring ANQP Venue Name Profiles
- 915 Configuring ANQP Network Authentication Profiles
- 916 Configuring ANQP Domain Name Profiles
- 917 Configuring ANQP IP Address Availability Profiles
- 918 Configuring ANQP NAI Realm Profiles
- 921 Configuring ANQP Roaming Consortium Profiles
- 921 Configuring ANQP 3GPP Cellular Network Profiles
- 922 Configuring H2QP Connection Capability Profiles
- 924 Configuring H2QP Operator Friendly Name Profiles
- 925 Configuring H2QP Operating Class Indication Profiles
- 926 Configuring H2QP WAN Metrics Profiles
- 927 Configuring H2QP OSU Provider List Profiles
- 930 Adding Local Controllers
- 930 Moving to a Multi-Controller Environment
- 933 Configuring Local Controllers
- 935 Uplink Monitoring and Management
- 937 Voice and Video
- 937 Voice and Video License Requirements
- 937 Configuring Voice and Video
- 946 Working with QoS for Voice and Video
- 955 Unified Communication and Collaboration
- 974 Understanding Extended Voice and Video Features
- 998 Advanced Voice Troubleshooting
- 1004 AirGroup
- 1004 Zero Configuration Networking
- 1004 AirGroup Solution
- 1008 AirGroup Integrated Deployment Model
- 1009 Features Supported in AirGroup
- 1014 ClearPass Policy Manager and ClearPass Guest Features
- 1014 Auto-association and Controller-based Policy
- 1016 Best Practices and Limitations
- 1020 Integrated Deployment Model
- 1028 Controller Dashboard Monitoring
- 1031 Configuring the AirGroup-CPPM Interface
- 1038 Bluetooth-Based Discovery and AirGroup
- 1039 AirGroup mDNS Static Records
- 1041 mDNS AP VLAN Aggregation
- 1043 mDNS Multicast Response Propagation
- 1045 Troubleshooting and Log Messages
- 1048 Instant AP VPN Support
- 1048 Overview
- 1053 VPN Configuration
- 1054 Viewing Branch Status
- 1056 External Services Interface
- 1056 Sample ESI Topology
- 1058 Understanding the ESI Syslog Parser
- 1060 Configuring ESI
- 1067 Sample Route-Mode ESI Topology
- 1072 Sample NAT-mode ESI Topology
- 1077 Understanding Basic Regular Expression (BRE) Syntax
- 1080 External User Management
- 1080 Overview
- 1080 How the ArubaOS XML API Works
- 1080 Creating an XML Request
- 1083 XML Response
- 1086 Using the XML API Server
- 1091 Sample Scripts
- 1097 Behavior and Defaults
- 1097 Understanding Mode Support
- 1099 Understanding Basic System Defaults
- 1107 Understanding Default Management User Roles
- 1110 Understanding Default Open Ports
- 1113 DHCP with Vendor-Specific Options
- 1113 Configuring a Windows-Based DHCP Server
- 1116 Enabling DHCP Relay Agent Information Option (Option-82)
- 1118 Enabling Linux DHCP Servers
- 1120 802.1X Configuration for IAS and Windows Clients
- 1120 Configuring Microsoft IAS
- 1122 Configuring Management Authentication using IAS
- 1124 Window XP Wireless Client Sample Configuration
- 1127 Glossary of Terms