AOS 6.4.x User Guide

User's Guide13

AOS, 6.4.x, User, Guide#esuprt ser stor net#esuprt networking#PowerConnect, W-620#powerconnect-w-620#User's, Guide13 AOS 6.4.x User Guide

Dell Inc.

powerconnect-w-620 user's guide13 en-us

downloads.ins.dell.com - /manuals/all-products/esuprt ser stor net/esuprt networking/esuprt net wireless/

Index of /manuals/all-products/esuprt ser stor net/esuprt networking/esuprt net wireless/

PDF preview unavailable. Download the PDF instead.

all-products/esuprt ser stor net/esuprt networking/esuprt net wireless/powerconnect-w-620 user's guide13 en-us
Dell Networking W-Series ArubaOS 6.4.x

User Guide

Copyright Information

© 2015 Aruba Networks, Inc. Aruba Networks trademarks include

, Aruba Networks®, Aruba

Wireless Networks®, the registered Aruba the Mobile Edge Company logo, and Aruba Mobility Management

System®. DellTM, the DELLTM logo, and PowerConnectTM are trademarks of Dell Inc.

All rights reserved. Specifications in this manual are subject to change without notice.

Originated in the USA. All other trademarks are the property of their respective owners.

Open Source Code

Certain Aruba products include Open Source software code developed by third parties, including software code subject to the GNU General Public License (GPL), GNU Lesser General Public License (LGPL), or other Open Source Licenses. Includes software from Litech Systems Design. The IF-MAP client library copyright 2011 Infoblox, Inc. All rights reserved. This product includes software developed by Lars Fenneberg, et al. The Open Source code used can be found at this site:

arubanetworks.com/open_source

Legal Notice

The use of Aruba Networks, Inc. switching platforms and software, by all individuals or corporations, to terminate other vendors' VPN client devices constitutes complete acceptance of liability by that individual or corporation for this action and indemnifies, in full, Aruba Networks, Inc. from any and all legal actions that might be taken against it with respect to infringement of copyright on behalf of those vendors.

0511698-00v1 | May 2015

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Contents

Contents About this Guide
What's New In ArubaOS 6.4.x Features Introduced in ArubaOS 6.4.3.0 Features Introduced in ArubaOS 6.4.2.5 Features Introduced in ArubaOS 6.4.2.4 Features Introduced in ArubaOS 6.4.2.3 Features Introduced in ArubaOS 6.4.2.0 Features Introduced in ArubaOS 6.4.1.0 Features Introduced in ArubaOS 6.4.0.0
Fundamentals WebUI CLI
Related Documents Conventions Contacting Dell
The Basic User-Centric Networks
Understanding Basic Deployment and Configuration Tasks Deployment Scenario #1: Controller and APs on Same Subnet Deployment Scenario #2: APs All on One Subnet Different from Controller Subnet Deployment Scenario #3: APs on Multiple Different Subnets from Controllers
Configuring the Controller Running Initial Setup Connecting to the Controller after Initial Setup
W-7000 Series and W-7200 Series Controller

3 83
83 83 89 89 90 90 92 95 98 98 99 99 99 100
101
101 101 102 103 104 104 105 105

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Contents | 3

New Port Numbering Scheme

105

W-7200 Series Controllers Individual Port Behavior

106

Using the LCD Screen

106

Using the LCD and USB Drive

108

Upgrading an Image

108

Uploading a Pre-saved Configuration

108

Disabling LCD Menu Functions

109

Configuring a VLAN to Connect to the Network

109

Creating, Updating, and Viewing VLANs and Associated IDs

110

Creating, Updating, and Deleting VLAN Pools

110

Assigning and Configuring the Trunk Port

110

In the WebUI

110

In the CLI

111

Configuring the Default Gateway

111

In the WebUI

111

In the CLI

111

Configuring the Loopback IP Address for the Controller

111

In the WebUI

112

In the CLI

112

Configuring the System Clock

112

Installing Licenses

112

Connecting the Controller to the Network

112

Enabling Wireless Connectivity

113

Enabling Wireless Connectivity

113

Configuring Your User-Centric Network

113

Replacing a Controller

114

Transferring Licenses

114

Procedure Overview

114

Change the VRRP Priorities for a Redundant Master Pair

115

4 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Back Up the Flash File System In the WebUI In the CLI
Stage the New Controller Add Licenses to the New Controller Backup Newly Installed Licenses Import and Restore Flash Backup
In the WebUI In the CLI Restore Licenses Reboot the Controller Modify the Host Name Modify Topology Settings Save your Configuration Remove the Existing Controller
Control Plane Security
Control Plane Security Overview Configuring Control Plane Security
In the WebUI In the CLI Managing AP Whitelists Adding an AP to the Campus or Remote AP Whitelists
In the WebUI In the CLI Viewing AP Whitelist Status Modifying an AP in the Campus AP Whitelist In the WebUI In the CLI
Dell Networking W-Series ArubaOS 6.4.x | User Guide

115 115 115 115 116 116 116 117 117 117 117 118 118 119 119
120
120 121 121 123 123 123 123 125 125 128 128 128
Contents | 5

Revoking an AP from the Campus AP Whitelist

129

In the WebUI

129

In the CLI

129

Deleting an AP from the Campus AP Whitelist

129

In the WebUI

129

In the CLI

130

Purging a Campus AP Whitelist

130

In the WebUI

130

In the CLI

130

Offloading a Controller Whitelist to ClearPass Policy Manager

130

In the WebUI

130

In the CLI

131

Managing Whitelists on Master and Local Controllers

131

Campus AP Whitelist Synchronization

132

Viewing the Master or Local Controller Whitelists

133

In the WebUI

133

In the CLI

134

Deleting an Entry from the Master or Local Controller Whitelist

134

In the WebUI

134

In the CLI

134

Purging the Master or Local Controller Whitelist

135

In the WebUI

135

In the CLI

135

Working in Environments with Multiple Master Controllers

135

Configuring Networks with a Backup Master Controller

135

Configuring Networks with Clusters of Master Controllers

135

Creating a Cluster Root

136

Creating a Cluster Member

137

Viewing Controller Cluster Setting

137

6 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Replacing a Controller on a Multi-Controller Network Replacing Controllers in a Single Master Network Replacing a Local Controller Replacing a Master Controller with No Backup Replacing a Redundant Master Controller Replacing Controllers in a Multi-Master Network Replacing a Local Controller in a Multi-Master Network Replacing a Cluster Member Controller with no Backup Replacing a Redundant Cluster Member Controller Replacing a Cluster Root Controller with no Backup Controller Replacing a Redundant Cluster Root Controller
Configuring Control Plane Security after Upgrading Troubleshooting Control Plane Security
Identifying Certificate Problems Verifying Certificates Disabling Control Plane Security Verifying Whitelist Synchronization Rogue APs
Software Licenses
Understanding License Terminology Working with Licenses Centralized Licensing in a Multi-Controller Network
Primary and Backup Licensing Servers Communication between the License Server and License Clients Supported Topologies Unsupported Topologies Adding and Deleting Licenses Replacing a Controller
Dell Networking W-Series ArubaOS 6.4.x | User Guide

138 138 138 139 140 140 140 140 141 141 142 142 143 143 144 144 144 145
146
146 147 148 149 149 151 152 153 153
Contents | 7

Failover Behaviors

153

Client is Unreachable

154

Server is Unreachable

154

Configuring Centralized Licensing

154

Pre-configuration Setup in an All-Master Deployment

154

Preconfiguration Setup in a Master/Local Topology

155

Enabling Centralized Licensing

155

Monitoring and Managing Centralized Licenses

156

License server Table

156

License Client Table

156

License Client(s) Usage Table

157

Aggregate License Table

158

License Heartbeat Table

158

Using Licenses

158

Understanding License Interaction

160

License Installation Best Practices and Exceptions

160

Installing a License

161

Enabling a New License on your Controller

161

Requesting a Software License in Email

161

Locating the System Serial Number

161

Obtaining a Software License Key

162

Creating a Software License Key

162

Applying the Software License Key in the WebUI

162

Applying the Software License Key in the License Wizard

162

Deleting a License

162

Moving Licenses

163

Resetting the Controller

163

8 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Network Configuration Parameters
Configuring VLANs Creating and Updating VLANs In the WebUI In the CLI Creating Bulk VLANs In the WebUI In the CLI Creating a Named VLAN In the WebUI Distinguishing Between Even and Hash Assignment Types Updating a Named VLAN Deleting a Named VLAN Creating a Named VLAN Using the CLI Viewing and Adding VLAN IDs Using the CLI Role Derivation for Named VLAN Pools In the CLI In the WebUI Adding a Bandwidth Contract to the VLAN Optimizing VLAN Broadcast and Multicast Traffic In the WebUI In the CLI
Configuring Ports Classifying Traffic as Trusted or Untrusted About Trusted and Untrusted Physical Ports About Trusted and Untrusted VLANs Configuring Trusted/Untrusted Ports and VLANs In the WebUI In the CLI
Dell Networking W-Series ArubaOS 6.4.x | User Guide

164
164 164 164 165 165 165 165 165 166 166 166 167 167 167 167 168 168 168 168 169 169 169 169 169 170 170 170
Contents | 9

Configuring Trusted and Untrusted Ports and VLANs in Trunk Mode

171

In the WebUI

171

In the CLI

171

Understanding VLAN Assignments

171

VLAN Derivation Priorities for VLAN types

172

How a VLAN Obtains an IP Address

173

Assigning a Static Address to a VLAN

173

In the WebUI

173

In the CLI

173

Configuring a VLAN to Receive a Dynamic Address

173

Configuring Multiple Wired Uplink Interfaces (Active-Standby)

173

Enabling the DHCP Client

174

In the WebUI

174

In the CLI

174

Enabling the PPPoE Client

175

In the WebUI

175

In the CLI

175

Default Gateway from DHCP/PPPoE

175

In the WebUI

175

In the CLI

175

Configuring DNS/WINS Server from DHPC/PPPoE

175

In the WebUI

175

In the CLI

176

Configuring Source NAT to Dynamic VLAN Address

176

In the WebUI

176

In the CLI

176

Configuring Source NAT for VLAN Interfaces

177

Sample Configuration

177

In the WebUI

177

10 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the CLI Inter-VLAN Routing
In the WebUI In the CLI Configuring Static Routes In the WebUI In the CLI Configuring the Loopback IP Address In the WebUI In the CLI Configuring the Controller IP Address In the WebUI In the CLI Configuring GRE Tunnels About Layer-2 GRE Tunnels Layer-2 GRE Tunnel Network Diagram Layer-2 Traffic Flow About Layer-3 GRE Tunnels IPv4 Layer-3 GRE Tunnel Network Diagram IPv6 Layer-3 GRE Tunnel Network Diagram Layer-3 Traffic Flow Configuring a Layer-2 GRE Tunnel In the WebUI In the CLI Configuring a Layer-3 GRE Tunnel for IPv4 In the WebUI In the CLI Configuring a Layer-3 GRE Tunnel for IPv6 In the WebUI
Dell Networking W-Series ArubaOS 6.4.x | User Guide

177 178 178 179 179 179 179 179 179 180 180 180 181 181 181 181 181 182 182 182 182 183 183 185 186 186 187 188 188
Contents | 11

In the CLI

189

Limitations for Static IPv6 Layer-3 Tunnels

190

Directing Traffic into the Tunnel

190

About Configuring Static Routes

190

Configuring a Firewall Policy Rule

190

Configuring Tunnel Keepalives

192

Configuring GRE Tunnel Groups

193

About GRE Tunnel Groups

193

Tunnel Group Order

193

Tunnel Failover

193

Preemption

194

Enabling a Tunnel Group

194

Points to Remember

194

Regarding Layer-2 Tunnel Groups

194

Configuring a Layer-2 or Layer-3 Tunnel Group Using the CLI

194

Example Configuration

194

Enabling Preemption

194

Viewing Operational Status

195

Viewing Active and Member Tunnels

195

Viewing the Standby Member Tunnels

195

Configuring a Layer-2 or Layer-3 Tunnel Group Using the WebUI

196

Jumbo Frame Support

196

Limitations for Jumbo Frame Support

196

Configuring Jumbo Frame Support

197

In the WebUI

197

In the CLI

197

Viewing the Jumbo Frame Support Status

197

12 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IPv6 Support
Understanding IPv6 Notation Understanding IPv6 Topology Enabling IPv6 Enabling IPv6 Support for Controller and APs
Configuring IPv6 Addresses In the WebUI In the CLI
Configuring IPv6 Static Neighbors In the WebUI In the CLI
Configuring IPv6 Default Gateway and Static IPv6 Routes In the WebUI In the CLI
Managing Controller IP Addresses In the WebUI In the CLI
Configuring Multicast Listener Discovery In the WebUI In the CLI Dynamic Multicast Optimization In the WebUI In the CLI Limitations
Debugging an IPv6 Controller In the WebUI In the CLI
Provisioning an IPv6 AP
Dell Networking W-Series ArubaOS 6.4.x | User Guide

198
198 198 199 199 201 202 202 202 203 203 203 203 203 203 203 204 204 204 205 205 205 206 206 206 206 206 206
Contents | 13

In the WebUI

207

In the CLI

207

Enhancements to IPv6 Support on AP

207

Filtering an IPv6 Extension Header (EH)

207

Configuring a Captive Portal over IPv6

207

Working with IPv6 Router Advertisements (RAs)

208

Configuring an IPv6 RA on a VLAN

208

Using WebUI

209

Using CLI

209

Configuring Optional Parameters for RAs

209

In the WebUI

210

In the CLI

211

RADIUS Over IPv6

211

In the CLI

211

In the WebUI

212

TACACS Over IPv6

212

In the CLI

212

In the WebUI

213

DHCPv6 Server

213

Points to Remember

213

DHCP Lease Limit

213

Configuring DHCPv6 Server

214

In the WebUI

214

In the CLI

215

Understanding ArubaOS Supported Network Configuration for IPv6 Clients

216

Supported Network Configuration

216

Understanding the Network Connection Sequence for Windows IPv6 Clients

216

Understanding ArubaOS Authentication and Firewall Features that Support IPv6

217

Understanding Authentication

217

14 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Working with Firewall Features Understanding Firewall Policies
Creating an IPv6 Firewall Policy Assigning an IPv6 Policy to a User Role Understanding DHCPv6 Passthrough/Relay Managing IPv6 User Addresses Viewing or Deleting User Entries Understanding User Roles Viewing Datapath Statistics for IPv6 Sessions Understanding IPv6 Exceptions and Best Practices
Link Aggregation Control Protocol
Understanding LACP Best Practices and Exceptions Configuring LACP
In the CLI In the WebUI LACP Sample Configuration
OSPFv2
Understanding OSPF Deployment Best Practices and Exceptions Understanding OSPFv2 by Example using a WLAN Scenario
WLAN Topology WLAN Routing Table Understanding OSPFv2 by Example using a Branch Scenario Branch Topology Branch Routing Table Configuring OSPF Exporting VPN Client Addresses to OSPF
In the WebUI In the CLI
Dell Networking W-Series ArubaOS 6.4.x | User Guide

217 219 221 222 222 222 222 223 223 223
225
225 226 226 227 227
229
229 230 230 230 231 231 232 232 234 234 234
Contents | 15

Sample Topology and Configuration Remote Branch 1 Remote Branch 2 W-3200 Central Office Controller--Active W-3200 Central Office Controller--Backup Topology Observation Configuring W-3600-UP Controller Configuring W-3600-DOWN Controller Viewing the Status of Instant AP VPN RAPNG AP-1 RAPNG AP-3
Tunneled Nodes
Understanding Tunneled Node Configuration Configuring a Wired Tunneled Node Client
Configuring an Access Port as a Tunneled Node Port Configuring a Trunk Port as a Tunneled Node Port
Authentication Servers
Understanding Authentication Server Best Practices and Exceptions Understanding Servers and Server Groups Configuring Authentication Servers
Configuring a RADIUS Server Using the WebUI Using the CLI
RADIUS Service-Type Attribute Enabling Radsec on RADIUS Servers
In the Web UI In the CLI

234 235 236 237 238 240 240 240 242 243 243 244
246
246 247 248 248
249
249 249 250 250 251 251 253 254 254 254

16 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

RADIUS Server VSAs RADIUS Server Authentication Codes RADIUS Server Fully Qualified Domain Names DNS Query Intervals Configuring Username and Password for CPPM Authentication In the WebUI: In the CLI: Configuring an RFC-3576 RADIUS Server Using the WebUI Using the CLI Configuring an RFC-3576 RADIUS Server with Radsec Using the WebUI Using the CLI Configuring an LDAP Server Using the WebUI Using the CLI Configuring a TACACS+ Server Using the WebUI Using the CLI Configuring a Windows Server Using the WebUI Using the CLI Managing the Internal Database Configuring the Internal Database Using the WebUI Using the CLI Managing Internal Database Files Exporting Files in the WebUI Importing Files in the WebUI
Dell Networking W-Series ArubaOS 6.4.x | User Guide

254 257 258 258 258 258 259 259 259 259 260 260 260 260 261 261 261 262 262 263 263 263 263 263 264 264 265 265 265
Contents | 17

Exporting and Importing Files in the CLI

265

Working with Internal Database Utilities

265

Deleting All Users

265

Repairing the Internal Database

265

Configuring Server Groups

266

Configuring Server Groups

266

Using the WebUI

266

Using the CLI

266

Configuring Server List Order and Fail-Through

266

Using the WebUI

267

Using the CLI

267

Configuring Dynamic Server Selection

267

Using the WebUI

268

Using the CLI

269

Configuring Match FQDN Option

269

Using the WebUI

269

Using the CLI

269

Trimming Domain Information from Requests

269

Using the WebUI

270

Using the CLI

270

Configuring Server-Derivation Rules

270

Using the WebUI

271

Using the CLI

272

Configuring a Role Derivation Rule for the Internal Database

272

Using the WebUI

272

Using the CLI

272

Assigning Server Groups

272

User Authentication

273

Management Authentication

273

18 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Using the WebUI Using the CLI Accounting RADIUS Accounting RADIUS Accounting on Multiple Servers TACACS+ Accounting Configuring Authentication Timers Setting an Authentication Timer Using the WebUI Using the CLI Authentication Server Load Balancing Enabling Authentication Server Load Balancing Functionality
MAC-based Authentication
Configuring MAC-Based Authentication Configuring the MAC Authentication Profile In the WebUI In the CLI
Configuring Clients In the WebUI In the CLI
Branch Controller Config for Controllers
Branch Deployment Features WAN Failure (Authentication) Survivability
Supported Client and Authentication Types Supported Key Reply Attributes Support Restrictions
Administrative Functions Enabling Authentication Survivability on a Local Branch Controller
Dell Networking W-Series ArubaOS 6.4.x | User Guide

273 273 273 273 276 276 276 277 277 278 278 278
279
279 279 280 280 280 281 281
282
283 284 284 285 285 285 286
Contents | 19

Configuring the Survival Server Certificate

286

Configuring the Lifetime of the Authentication Survivability Cache

286

User Credential and Key Reply Attributes Are Saved Automatically

286

Expired User Credential and Key Reply Attributes Are Purged Automatically

286

About the Survival Server

286

Trigger Conditions for Critical Actions

286

Storing User Access Credential and Key Reply Attributes to Survival Cache

286

Picking Up the Survival Server for Authentication

287

Access Credential Data Stored

287

Authentication for Captive Portal Clients

287

Captive Portal Client Authentication Using PAP

287

External Captive Portal Client Authentication Using the XML-API

287

Authentication for 802.1X Clients

288

802.1X Termination Disabled at the Wireless LAN Controller

288

802.1X Termination Enabled at the Wireless LAN Controller

288

Authentication for MAC Address-Based Clients

289

Authentication for WISPr Clients

289

WAN Health Check

290

WAN Optimization through IP Payload Compression

290

Distributed Layer 3 Branch Deployment Model

291

Compression/Decompression Engine

291

Modes of Operation

291

Interface Bandwidth Contracts

292

Integration with a Palo Alto Networks (PAN) Portal

292

Integration Workflow

293

Configuration Prerequisites

294

Branch Controller Routing Features

295

Uplink Routing Using Nexthop Lists

295

Policy-Based Routing

295

20 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Zero-Touch Provisioning Before you Begin Provisioning Modes for branch deployments Automatically Provisioning a Branch Controller DHCP Options DHCP Server Provisioning
Using Smart Config to create a Branch Config Group Config Group Management Settings Address Pools Static vs Dynamic IP Management System Configuration Networking Configuration Routing Configuration Configuring Routing for a Branch Config Group VPN Configuration WAN Configuration Branch Config Group Summary Whitelist Configuration
PortFast and BPDU Guard PortFast BPDU Guard Scenarios Supported on PortFast and BPDU Guard Enabling PortFast and BPDU Guard on a Port In the Web UI In the CLI
Preventing WAN Link Failure on Virtual APs In the WebUI In the CLI
Branch WAN Dashboard Changes
Dell Networking W-Series ArubaOS 6.4.x | User Guide

296 296 297 297 298 298 298 299 299 299 305 307 309 309 314 317 319 320 320 320 321 321 322 322 322 322 323 323 323
Contents | 21

802.1X Authentication
Understanding 802.1X Authentication Supported EAP Types Configuring Authentication with a RADIUS Server Configuring Authentication Terminated on Controller
Configuring 802.1X Authentication In the WebUI In the CLI
Configuring and Using Certificates with AAA FastConnect In the WebUI In the CLI
Configuring User and Machine Authentication Working with Role Assignment with Machine Authentication Enabled Enabling 802.1x Supplicant Support on an AP Prerequisites Provisioning an AP as an 802.1X Supplicant
In the WebUI In the CLI Sample Configurations Configuring Authentication with an 802.1X RADIUS Server Configuring Roles and Policies Creating the Student Role and Policy Creating the Faculty Role and Policy Creating the Guest Role and Policy Creating Roles and Policies for Sysadmin and Computer
In the WebUI In the CLI
Creating an Alias for the Internal Network Configuring the RADIUS Authentication Server

326
326 326 327 328 329 329 335 335 335 335 335 336 337 338 338 338 338 338 339 339 339 340 341 342
343 343
343 343

22 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the WebUI In the CLI Configuring 802.1X Authentication In the WebUI In the CLI Configuring VLANs In the WebUI In the CLI Configuring the WLANs Configuring the Guest WLAN In the WebUI In the CLI Configuring the Non-Guest WLANs In the WebUI In the CLI Configuring Authentication with the Controller's Internal Database Configuring the Internal Database In the WebUI In the CLI Configuring a Server Rule Configuring 802.1x Authentication In the WebUI In the CLI Configuring VLANs In the WebUI In the CLI Configuring WLANs Configuring the Guest WLAN In the WebUI
Dell Networking W-Series ArubaOS 6.4.x | User Guide

343 344 344 344 345 345 345 346 346 346 346 347 347 347 348 348 349 349 349 349 349 349 350 350 350 351 351 351 352
Contents | 23

In the CLI Configuring the Non-Guest WLANs
In the WebUI In the CLI Configuring Mixed Authentication Modes In the CLI Performing Advanced Configuration Options for 802.1X Configuring Reauthentication with Unicast Key Rotation In the WebUI In the CLI Application Single Sign-On Using L2 Authentication Important Points to Remember Enabling Application SSO Configuring SSO IDP-Profiles In the WebUI In the CLI Applying an SSO Profile to a User Role In the WebUI In the CLI Selecting an IDP Certificate In the WebUI In the CLI
Stateful and WISPr Authentication
Working With Stateful Authentication Working With WISPr Authentication Understanding Stateful Authentication Best Practices Configuring Stateful 802.1X Authentication
In the WebUI

352 352 353 353 354 354 354 354 355 355 355 355 356 356 356 357 357 357 357 357 357 357
358
358 359 359 359 359

24 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the CLI Configuring Stateful NTLM Authentication
In the WebUI In the CLI Configuring Stateful Kerberos Authentication In the WebUI In the CLI Configuring WISPr Authentication In the WebUI In the CLI
Certificate Revocation
Understanding OCSP and CRL Configuring a Controller as OCSP and CRL Clients Configuring an OCSP Controller as a Responder
Configuring the Controller as an OCSP Client In the WebUI In the CLI
Configuring the Controller as a CRL Client In the WebUI In the CLI
Configuring the Controller as an OCSP Responder In the WebUI In the CLI
Certificate Revocation Checking for SSH Pubkey Authentication Configuring the SSH Pubkey User with RCP In the WebUI In the CLI Displaying Revocation Checkpoint for the SSH Pubkey User
Dell Networking W-Series ArubaOS 6.4.x | User Guide

360 360 360 361 361 361 362 362 362 363
365
365 365 366 366 366 368 368 368 369 369 369 370 370 370 370 370 371
Contents | 25

Configuring the SSH Pubkey User with RCP In the WebUI In the CLI
Removing the SSH Pubkey User In the WebUI In the CLI
Captive Portal Authentication
Understanding Captive Portal Policy Enforcement Firewall Next Generation (PEFNG) License Controller Server Certificate
Configuring Captive Portal in the Base Operating System In the WebUI In the CLI
Using Captive Portal with a PEFNG License Configuring Captive Portal in the WebUI Configuring Captive Portal in the CLI
Sample Authentication with Captive Portal Creating a Guest User Role Creating an Auth-guest User Role Configuring Policies and Roles in the WebUI Creating a Time Range Creating Aliases Creating an Auth-Guest-Access Policy Creating an Block-Internal-Access Policy Creating a Drop-and-Log Policy Creating a Guest Role Creating an Auth-Guest Role Configuring Policies and Roles in the CLI

371 371 371 371 371 371
372
372 372 373 373 374 375 375 376 378 378 378 379 379 379 380 380 381 382 382 383 383

26 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Defining a Time Range Creating Aliases Creating a Guest-Logon-Access Policy Creating an Auth-Guest-Access Policy Creating a Block-Internal-Access Policy Creating a Drop-and-Log Policy Creating a Guest-Logon Role Creating an Auth-Guest Role Configuring Guest VLANs In the WebUI In the CLI Configuring Captive Portal Authentication Profiles Modifying the Initial User Role Configuring the AAA Profile Configuring the WLAN Managing User Accounts Configuring Captive Portal Configuration Parameters Enabling Optional Captive Portal Configurations Uploading Captive Portal Pages by SSID Association Changing the Protocol to HTTP Configuring Redirection to a Proxy Server Redirecting Clients on Different VLANs Web Client Configuration with Proxy Script Personalizing the Captive Portal Page Creating and Installing an Internal Captive Portal Creating a New Internal Web Page Username Example Password Example FQDN Example
Dell Networking W-Series ArubaOS 6.4.x | User Guide

383 383 384 384 384 384 384 384 384 385 385 385 386 386 387 387 388 390 390 391 392 393 393 394 396 397 397 397 397
Contents | 27

Basic HTML Example Installing a New Captive Portal Page Displaying Authentication Error Messages Reverting to the Default Captive Portal Configuring Localization Customizing the Welcome Page Customizing the Pop-Up box Customizing the Logged Out Box Creating Walled Garden Access
In the WebUI In the CLI Enabling Captive Portal Enhancements Configuring the Redirect-URL Configuring the Login URL Defining Netdestination Descriptions Configuring a Whitelist Configuring the Netdestination for a Whitelist: Associating a Whitelist to Captive Portal Profile Applying a Captive Portal Profile to a User-Role Verifying a Whitelist Configuration Verifying a Captive Portal Profile Linked to a Whitelist Verifying Dynamic ACLs for a Whitelist Verifying DNS Resolved IP Addresses for Whitelisted URLs Bypassing Captive Portal Landing Page
Virtual Private Networks
Planning a VPN Configuration Selecting an IKE protocol Understanding Suite-B Encryption Licensing

398 398 398 399 399 402 403 404 405 405 406 406 406 407 407 407 407 407 408 408 408 408 410 410
411
411 412 412

28 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Working with IKEv2 Clients Understanding Supported VPN AAA Deployments Working with Certificate Groups Working with VPN Authentication Profiles Configuring a Basic VPN for L2TP/IPsec in the WebUI
Defining Authentication Method and Server Addresses Defining Address Pools Enabling Source NAT Selecting Certificates Defining IKEv1 Shared Keys Configuring IKE Policies Setting the IPsec Dynamic Map Finalizing WebUI changes Configuring a VPN for L2TP/IPsec with IKEv2 in the WebUI Defining Authentication Method and Server Addresses Defining Address Pools Enabling Source NAT Selecting Certificates Configuring IKE Policies Setting the IPsec Dynamic Map Finalizing WebUI changes Configuring a VPN for Smart Card Clients Working with Smart Card clients using IKEv2 Working with Smart Card Clients using IKEv1 Configuring a VPN for Clients with User Passwords In the WebUI In the CLI Configuring Remote Access VPNs for XAuth Configuring VPNs for XAuth Clients using Smart Cards
Dell Networking W-Series ArubaOS 6.4.x | User Guide

413 413 414 414 416 417 417 417 418 418 418 419 420 421 421 421 421 422 422 423 424 425 425 425 426 426 427 427 427
Contents | 29

Configuring a VPN for XAuth Clients Using a Username and Password Working with Remote Access VPNs for PPTP
In the WebUI In the CLI Working with Site-to-Site VPNs Working with Third-Party Devices Working with Site-to-Site VPNs with Dynamic IP Addresses Understanding VPN Topologies Configuring Site-to-Site VPNs
In the WebUI In the CLI Detecting Dead Peers About Default IKE Policies Working with VPN Dialer Configuring VPN Dialer In the WebUI In the CLI Assigning a Dialer to a User Role In the WebUI In the CLI
Roles and Policies
Configuring Firewall Policies Working With Access Control Lists (ACLs) Support for Desktop Virtualization Protocols Creating a Firewall Policy In the WebUI In the CLI Creating a Network Service Alias

428 428 429 429 429 429 430 430 430 430 432 434 434 435 435 436 436 436 436 437
438
438 439 439 439 442 443 443

30 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the WebUI In the CLI Creating an ACL White List Creating a Bandwidth Contract in the WebUI Configuring the ACL White List in the WebUI Creating a Bandwidth Contract in the CLI Configuring the ACL White List in the CLI User Roles In the WebUI In the CLI Assigning User Roles Assigning User Roles in AAA Profiles In the WebUI In the CLI Working with User-Derived VLANs Understanding Device Identification Configuring a User-derived VLAN in the WebUI Configuring a User-derived Role or VLAN in the CLI User-Derived Role Example RADIUS Override of User-Derived Roles Configuring a Default Role for Authentication Method In the WebUI In the CLI Configuring a Server-Derived Role Configuring a VSA-Derived Role Understanding Global Firewall Parameters Using AppRF 2.0 Enabling Deep Packet Inspection (DPI) In the WebUI
Dell Networking W-Series ArubaOS 6.4.x | User Guide

443 443 444 444 444 444 444 445 445 447 447 447 447 448 448 449 450 450 450 451 451 451 451 452 452 452 458 458 458
Contents | 31

In the CLI Configuring Policies for AppRF 2.0
How ACL Works with AppRF Global Session ACL Role Default Session ACL Example Configuring Bandwidth Contracts for AppRF 2.0 Global Bandwidth Contract Configuration Role-Specific Bandwidth Contracts
ClearPass Policy Manager Integration
Introduction Important Points to Remember Enabling Downloadable Role on a Controller
Using the WebUI Using the CLI Sample Configuration CPPM Server Configuration
Adding a Device Adding Enforcement Profile Advanced Role Configuration Mode Adding Enforcement Policy Adding Services Controller Configuration Configuring CPPM Server on Controller Configuring Server Group to include CPPM Server Configuring 802.1X Profile Configuring AAA Profile Show AAA Profile

458 458 458 459 459 459 461 461 461
463
463 463 464 464 464 464 464 464 465 466 467 469 470 470 471 471 471 471

32 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual APs
Virtual AP Configuration Workflow Using the WebUI Using the CLI
Virtual AP Profiles Configuring the Virtual AP Profile Creating and Configuring a Profile Selective Multicast Stream Associating Other Profiles to the Virtual AP Configuring a Virtual AP in the CLI Associating a Virtual AP Profile to an AP or AP Group In the WebUI In the CLI Excluding a Virtual AP Profile In the WebUI In the CLI
Changing a Virtual AP Forwarding Mode Radio Resource Management (802.11k)
Configuring the 802.11k Profile In the WebUI In the CLI
Configuring Radio Resource Management Information Elements In the WebUI In the CLI
Configuring Beacon Report Requests In the WebUI In the CLI
Configuring Traffic Stream Measurement Report Requests
Dell Networking W-Series ArubaOS 6.4.x | User Guide

472
472 472 473 473 474 474 479 479 480 480 480 481 481 481 481 481 482 482 482 484 484 484 486 486 486 487 487
Contents | 33

In the WebUI In the CLI BSS Transition Management (802.11v) Frame Types 802.11k and 802.11v clients Enabling 802.11v BSS Transition Management Fast BSS Transition ( 802.11r) Important Points to Remember Configuring Fast BSS Transition In the WebUI In the CLI Troubleshooting Fast BSS Transition SSID Profiles SSID Profile Overview Suite-B Cryptography Wi-Fi Multimedia Protection Management Frame Protection Configuring the SSID Profile In the WebUI In the CLI WLAN Authentication Configuring an AAA Profile in the WebUI Configuring an AAA Profile in the CLI High-Throughput Virtual APs Configuring the High-Throughput Radio Profile In the WebUI In the CLI Configuring the High-Throughput SSID Profile In the WebUI
34 | Contents

488 489 489 489 490 490 490 490 491 491 491 491 492 492 492 493 493 493 493 499 499 499 501 502 502 502 503 503 503
Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the CLI Guest WLANs
Configuring a Guest VLAN In the WebUI In the CLI
Configuring a Guest Role In the WebUI In the CLI
Configuring a Guest Virtual AP In the WebUI In the CLI
Changing a Virtual AP Forwarding Mode
Adaptive Radio Management
ARM Feature Overviews Configuring ARM Settings ARM Troubleshooting Understanding ARM ARM Support for 802.11n Monitoring Your Network with ARM
Maintaining Channel Quality Configuring ARM Scanning Understanding ARM Application Awareness Client Match BSS Transition Management Support Steering a Client Multi-Media Sync-Up Removing VBR Dependency on Probe Requests ARM Coverage and Interference Metrics
Dell Networking W-Series ArubaOS 6.4.x | User Guide

506 506 507 507 507 507 507 508 508 508 508 509
510
510 510 510 510 511 511 511 511 512 512 513 513 513 513 514
Contents | 35

Configuring ARM Profiles

514

Creating and Configuring a New ARM Profile

514

In the WebUI

515

In the CLI

522

Modifying an Existing Profile

523

Copying an Existing Profile

523

Deleting a Profile

524

Assigning an ARM Profile to an AP Group

524

In the WebUI

524

In the CLI

525

Using Multi-Band ARM for 802.11a/802.11g Traffic

525

Band Steering

525

Steering Modes

526

Enabling Band Steering

526

In the WebUI

526

In the CLI

526

Enabling Traffic Shaping

527

Enabling Traffic Shaping

527

In the WebUI

527

In the CLI

528

Enabling or Disabling the Hard Limit Parameter in Traffic Management Profile

528

Using the WebUI

529

Using the CLI

529

Spectrum Load Balancing

529

Reusing Channels to Control RX Sensitivity Tuning

529

Configuring Non-802.11 Noise Interference Immunity

530

Troubleshooting ARM

530

Too many APs on the Same Channel

531

Wireless Clients Report a Low Signal Level

531

36 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Transmission Power Levels Change Too Often APs Detect Errors but Do Not Change Channels APs Don't Change Channels Due to Channel Noise
Wireless Intrusion Prevention
Working with the Reusable Wizard Understanding Wizard Intrusion Detection Understanding Wizard Intrusion Protection Protecting Your Infrastructure Protecting Your Clients
Monitoring the Dashboard Detecting Rogue APs
Understanding Classification Terminology Understanding Classification Methodology
Understanding Match Methods Understanding Match Types Understanding Suspected Rogue Confidence Level Understanding AP Classification Rules Understanding SSID specification Understanding SNR specification Understanding Discovered-AP-Count specification Sample Rules Understanding Rule Matching Working with Intrusion Detection Understanding Infrastructure Intrusion Detection Detecting an 802.11n 40MHz Intolerance Setting Detecting Active 802.11n Greenfield Mode Detecting Ad hoc Networks Detecting an Ad hoc Network Using a Valid SSID
Dell Networking W-Series ArubaOS 6.4.x | User Guide

531 531 531
532
532 533 534 534 534 535 536 536 537 537 538 538 538 539 539 539 539 539 539 539 543 544 544 544
Contents | 37

Detecting an AP Flood Attack Detecting AP Impersonation Detecting AP Spoofing Detecting Bad WEP Initialization Detecting a Beacon Frame Spoofing Attack Detecting a Client Flood Attack Detecting a CTS Rate Anomaly Detecting an RTS Rate Anomaly Detecting Devices with an Invalid MAC OUI Detecting an Invalid Address Combination Detecting an Overflow EAPOL Key Detecting Overflow IE Tags Detecting a Malformed Frame-Assoc Request Detecting Malformed Frame-Auth Detecting a Malformed Frame-HT IE Detecting a Malformed Frame-Large Duration Detecting a Misconfigured AP Detecting a Windows Bridge Detecting a Wireless Bridge Detecting Broadcast Deauthentication Detecting Broadcast Disassociation Detecting Netstumbler Detecting Valid SSID Misuse Detecting Wellenreiter Understanding Client Intrusion Detection Detecting a Block ACK DoS Detecting a ChopChop Attack Detecting a Disconnect Station Attack Detecting an EAP Rate Anomaly
38 | Contents

544 544 544 544 544 544 545 545 545 545 545 545 545 545 546 546 546 546 546 546 546 546 546 546 547 549 549 549 549
Dell Networking W-Series ArubaOS 6.4.x | User Guide

Detecting a FATA-Jack Attack Structure Detecting a Hotspotter Attack Detecting a Meiners Power Save DoS Attack Detecting an Omerta Attack Detecting Rate Anomalies Detecting a TKIP Replay Attack Detecting Unencrypted Valid Clients Detecting a Valid Client Misassociation Detecting an AirJack Attack Detecting ASLEAP Detecting a Null Probe Response Configuring Intrusion Protection Understanding Infrastructure Intrusion Protection Protecting 40MHz 802.11 High Throughput Devices Protecting 802.11n High Throughput Devices Protecting Against Adhoc Networks Protecting Against AP Impersonation Protecting Against Misconfigured APs Protecting Against Wireless Hosted Networks Protecting SSIDs Protecting Against Rogue Containment Protecting Against Suspected Rogue Containment Protection against Wired Rogue APs Understanding Client Intrusion Protection Protecting Valid Stations Protecting Windows Bridge Warning Message for Containment Features Configuring the WLAN Management System (WMS) In the WebUI
Dell Networking W-Series ArubaOS 6.4.x | User Guide

549 550 550 550 550 550 550 550 551 551 551 551 551 553 553 553 554 554 554 554 554 554 554 554 555 555 555 555 555
Contents | 39

In the CLI Configuring Local WMS Settings Managing the WMS Database
Understanding Client Blacklisting Methods of Blacklisting Blacklisting Manually Blacklisting by Authentication Failure Enabling Attack Blacklisting Setting Blacklist Duration Removing a Client from Blacklisting
Working with WIP Advanced Features Configuring TotalWatch
Understanding TotalWatch Channel Types and Qualifiers Understanding TotalWatch Monitoring Features Understanding TotalWatch Scanning Spectrum Features Understanding TotalWatch Channel Dwell Time Understanding TotalWatch Channel Visiting Understanding TotalWatch Age out of Devices Administering TotalWatch Configuring Per Radio Settings Configuring Per AP Setting Licensing Tarpit Shielding Overview Configuring Tarpit Shielding Enabling Tarpit Shielding Understanding Tarpit Shielding Licensing CLI Commands
Access Points
Basic Functions and Features

557 557 557 558 558 558 559 559 560 560 560 561 561 562 562 562 563 563 563 563 563 564 564 564 565 565
566
566

40 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Naming and Grouping APs Creating an AP group In the WebUI In the CLI Assigning APs to an AP Group In the WebUI In the CLI
Understanding AP Configuration Profiles AP Profiles RF Management Profiles Wireless LAN Profiles Mesh Profiles QoS Profiles IDS Profiles HA Group profiles Other Profiles Profile Hierarchy Viewing Profile Errors
Before you Deploy an AP Mesh AP Preconfiguration Remote AP Preconfiguration
Enable Controller Discovery Controller Discovery using DNS Controller Discovery using ADP Controller discovery using a DHCP Server
Enable DHCP to Provide APs with IP Addresses In the WebUI In the CLI
AP Provisioning Profiles
Dell Networking W-Series ArubaOS 6.4.x | User Guide

567 568 568 569 569 569 569 569 570 571 571 574 574 575 575 575 576 576 576 576 576 577 577 577 578 578 578 578 579
Contents | 41

Defining an AP Provisioning Profile Assigning Provisioning Profiles Configuring Installed APs Configuring an AP using the Provisioning Wizard Configuring a AP using the WebUI Configuring a Remote AP
Remote Authentication RAP Configuration Configuring a Mesh AP Verifying the Configuration Optional AP Configuration Settings Changing the AP Installation Mode In the WebUI In the CLI Renaming an AP In the WebUI In the CLI Enabling Spanning Tree In the WebUI In the CLI AP Console Access Using a Backup ESSID In the WebUI In the CLI Defining an RTLS Server In the WebUI In the CLI Important Points to Remember AP Redundancy In the WebUI
42 | Contents

579 581 581 582 582 583 583 583 584 584 584 585 585 585 586 586 586 586 586 586 587 587 587 587 588 588 588 588 589
Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the CLI

589

AP Maintenance Mode

589

In the WebUI

589

In the CLI

590

Energy Efficient Ethernet

590

In the WebUI

590

In the CLI

591

AP LEDs

591

In the WebUI

591

In the CLI

591

Suppressing Client Probe Requests

592

In the WebUI

592

In the CLI

593

RF Management

593

802.11a and 802.11g RF Management Profiles

593

VHT Support on W-AP200 Series, W-AP210 Series, W-AP220 Series, and W-AP270 Series Access

Points

594

Managing 802.11a/802.11g Profiles Using the WebUI

594

Creating or Editing a Profile

594

Assigning an 802.11a/802.11g Profile to an AP or AP Group

599

Assigning a High-throughput Profile

600

Assigning an ARM Profile

600

Deleting a Profile

601

Managing 802.11a/802.11g Profiles Using the CLI

601

Creating or Modifying a Profile

601

Viewing RF Management Settings

602

Assigning a 802.11a/802.11g Profile

602

Deleting a Profile

603

RF Optimization

603

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Contents | 43

Using the WebUI

603

Using the CLI

603

RF Event Configuration

604

Using the WebUI

604

Using the CLI

605

Optimizing APs Over Low-Speed Links

606

Configuring the Bootstrap Threshold

606

Prioritizing AP heartbeats

611

AP Scanning Optimization

611

Channel Types and Priority

611

In the CLI

612

Scanning Optimizations

612

Unconventional (direction) Scans

612

Modifications in Scan Frequency

613

Channel Group Scanning

613

Channel Group Scanning

613

Configuring AP Channel Assignments

613

Using the WebUI

614

Using the CLI

615

Channel Switch Announcement (CSA)

615

Using the WebUI

615

Using the CLI

615

Automatic Channel and Transmit Power Selection

615

Managing AP Console Settings

616

Username and Password Protection

617

Setting a Console/Telnet Username and Password

617

Disabling Access to the AP Console

618

Link Aggregation Support on W-AP220 Series and W-AP270 Series

618

Configuring LACP

618

44 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Using the WebUI, in ArubaOS 6.4.2.x and later Using the CLI, in ArubaOS 6.4.2.x and later Using the WebUI in ArubaOS 6.3.1.x-6.4.1.x Using the CLI in ArubaOS 6.3.1.x-6.4.1.x Important Points to Remember Troubleshooting Link Aggregation Service Tag In the WebUI In the CLI
Secure Enterprise Mesh
Mesh Overview Information Mesh Configuration Procedures Understanding Mesh Access Points
Mesh Portals Mesh Points Mesh Clusters Understanding Mesh Links Link Metrics Optimizing Links Understanding Mesh Profiles Mesh Cluster Profiles Mesh Radio Profiles RF Management (802.11a and 802.11g) Profiles
Adaptive Radio Management Profiles High-Throughput Radio Profiles Mesh High-Throughput SSID Profiles Wired AP Profiles Mesh Recovery Profiles
Dell Networking W-Series ArubaOS 6.4.x | User Guide

619 619 619 619 620 620 620 620 620
622
622 622 622 623 623 624 624 625 626 626 626 627 628 628 629 629 629 629
Contents | 45

Understanding Remote Mesh Portals (RMPs)

630

Understanding the AP Boot Sequence

631

Booting the Mesh Portal

632

Booting the Mesh Point

632

Air Monitoring and Mesh

632

Mesh Deployment Solutions

632

Thin AP Services with Wireless Backhaul Deployment

633

Point-to-Point Deployment

633

Point-to-Multipoint Deployment

633

High-Availability Deployment

634

Mesh Deployment Planning

635

Pre-Deployment Considerations

635

Outdoor-Specific Deployment Considerations

635

Configuration Considerations

635

Post-Deployment Considerations

636

Dual-Port AP Considerations

636

Configuring Mesh Cluster Profiles

636

Managing Mesh Cluster Profiles in the WebUI

636

Creating a Profile

636

Associating a Mesh Cluster Profile to Mesh APs

638

Editing a Mesh Cluster Profile

638

Deleting a Mesh Cluster Profile

639

Managing Mesh Cluster Profiles in the CLI

639

Viewing Mesh Cluster Profile Settings

640

Associating Mesh Cluster Profiles

640

Excluding a Mesh Cluster Profile from a Mesh Node

640

Deleting a Mesh Cluster Profile

640

Creating and Editing Mesh Radio Profiles

641

Managing Mesh Radio Profiles in the WebUI

641

46 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Creating or Editing a Mesh Radio Profile Assigning a Mesh Radio Profile to a Mesh AP or AP Group Managing Mesh Radio Profiles in the CLI Creating or Modifying a Mesh Radio Profile Assigning a Mesh Radio Profile to a Mesh AP or AP Group Deleting Mesh Radio Profiles Creating and Editing Mesh High-Throughput SSID Profiles Managing Mesh High-Throughput SSID Profiles in the WebUI Creating a Profile Assigning a Profile to an AP Group Editing a Profile Deleting a Profile Managing Mesh High-Throughput SSID Profiles in the CLI Creating or Modifying a Profile Assigning a Profile to an AP Group Viewing High-throughput SSID Settings Deleting a Profile Configuring Ethernet Ports for Mesh Configuring Bridging on the Ethernet Port Configuring Ethernet Ports for Secure Jack Operation In the WebUI In the CLI Extending the Life of a Mesh Network In the WebUI In the CLI Provisioning Mesh Nodes Provisioning Caveats Provisioning Mesh Nodes In the WebUI
Dell Networking W-Series ArubaOS 6.4.x | User Guide

641 644 645 645 645 646 646 646 646 650 651 651 651 651 652 652 652 652 652 653 653 654 654 654 655 655 655 656 656
Contents | 47

In the CLI Verifying Your Mesh Network
Verification Checklist CLI Examples Configuring Remote Mesh Portals (RMPs) Creating a Remote Mesh Portal In the WebUI Step 1: Provision the AP Step 2: Define the Mesh Private VLAN in the Mesh Radio Profile Step 3: Assign the Mesh Radio Profile to a Remote Mesh AP Step 4: Assign an RF Management Profile to a Remote Mesh AP Step 5: Assign a Mesh Cluster Profile Step 6: Configuring a DHCP Pool Step 7: Configuring the VLAN ID of the Virtual AP Profile Provisioning a Remote Mesh Portal In the CLI
Increasing Network Uptime Through Redundancy and VRRP
High Availability Pre-Deployment Information Configuration Procedures
VRRP-Based Redundancy High Availability Deployment Models
Active/Active Deployment Model 1:1 Active/Standby Deployment Model N:1 Active/Standby Deployment Model Master-Redundancy Deployment Model AP Communication with Controllers Client State Synchronization
Feature Guidelines and Limitations High Availability Inter-Controller Heartbeats

656 657 657 658 659 659 659 659 660 660 660 660 660 660
661
661 661 661 661 662 662 662 663 663 664 664 665 665

48 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

High Availability Extended Controller Capacity Feature Requirements Standby Controller Capacity AP Failover
Configuring High Availability Pre-Deployment Information Configuring High Availability In the WebUI In the CLI
Migrating from VRRP or Backup-LMS Redundancy Configuring a Master Controller for Redundancy and High Availability Migrating from VRRP Redundancy Migrating from Backup-LMS Redundancy
Configuring VRRP Redundancy Before you Begin Configuring the Local Controller for Redundancy In the WebUI In the CLI Configuring the LMS IP In the WebUI In the CLI Configuring the Master Controller for Redundancy Configuring Database Synchronization In the WebUI In the CLI Enabling Incremental Configuration Synchronization (CLI Only) Configuring Master-Local Controller Redundancy
Dell Networking W-Series ArubaOS 6.4.x | User Guide

665 666 666 667 667 667 667 667 668 669 669 670 670 670 670 671 671 672 673 673 673 674 675 675 675 676 676
Contents | 49

RSTP
Understanding RSTP Migration and Interoperability Working with Rapid Convergence
Edge Port and Point-to-Point Configuring RSTP
In the WebUI In the CLI Monitoring RSTP Troubleshooting RSTP
PVST+
Understanding PVST+ Interoperability and Best Practices Enabling PVST+ in the CLI Enabling PVST+ in the WebUI
Link Layer Discovery Protocol
Important Points to Remember LLDP Overview
Default LLDP Configuration Configuring LLDP Monitoring LLDP Configuration
Display LLDP Interface Display LLDP Interface <interface> Display LLDP Neighbor Display LLDP Neighbor Interface Detail Display LLDP Statistics Display LLDP Statistics Interface
IP Mobility
Understanding Dell Mobility Architecture Configuring Mobility Domains

678
678 678 679 679 680 681 681 681
683
683 683 684
685
685 685 686 686 686 686 686 687 687 688 688
689
689 690

50 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Configuring a Mobility Domain In the WebUI In the CLI
Joining a Mobility Domain In the WebUI In the CLI In the WebUI
In the CLI Tracking Mobile Users
Mobile Client Roaming Status In the WebUI In the CLI Viewing User Roaming Status using the CLI In the CLI
Mobile Client Roaming Locations In the WebUI In the CLI
HA Discovery on Association In the CLI
Configuring Advanced Mobility Functions In the WebUI In the CLI
Proxy Mobile IP Revocations IPv6 L3 Mobility
Multicast Mobility Important Points to Remember
In the CLI Understanding Bridge Mode Mobility Deployments
Dell Networking W-Series ArubaOS 6.4.x | User Guide

691 691 692 692 692 692 693 694 694 694 694 694 695 696 696 696 696 696 696 696 696 699 699 700 700 700 701 701 705
Contents | 51

Enabling Mobility Multicast Working with Proxy IGMP and Proxy Remote Subscription IGMPv3 Support Configuring SSM Range Working with Inter Controller Mobility Configuring Mobility Multicast In the WebUI In the CLI
External Firewall Configuration
Understanding Firewall Port Configuration Among Dell Devices Communication Between Controllers Communication Between APs and the Controller Communication Between Remote APs and the Controller
Enabling Network Access Ports Used for Virtual Internet Access (VIA) Configuring Ports to Allow Other Traffic Types
Palo Alto Networks Firewall Integration
Limitations Preconfiguration on the PAN Firewall
User-ID Support Device-Type Based Policy Support Configuring PAN Firewall Integration Creating PAN Profiles
Using the WebUI Using the CLI Activating a PAN Profile Using the WebUI Using the CLI

706 707 707 707 708 709 709 709
711
711 711 711 712 712 712 712
714
714 714 715 715 716 716 717 717 717 718 718

52 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Enabling PAN Firewall Integration Using the WebUI Using the CLI
Enabling PAN Firewall Integration for VIA Clients Using the WebUI Using the CLI
Enabling PAN Firewall Integration for VPN Clients Using the WebUI Using the CLI
Remote Access Points
About Remote Access Points Configuring the Secure Remote Access Point Service
Configure a Public IP Address for the Controller In the WebUI In the CLI
Configure the NAT Device Configure the VPN Server
In the WebUI In the CLI CHAP Authentication Support over PPPoE In the WebUI In the CLI Configuring Certificate RAP In the WebUI In the CLI Creating a Remote AP Whitelist Configuring PSK RAP In the WebUI
Dell Networking W-Series ArubaOS 6.4.x | User Guide

718 718 718 718 718 718 718 719 719
720
720 722 722 722 722 723 723 723 723 723 723 724 724 724 724 724 725 725
Contents | 53

Add the user to the internal database

725

RAP Static Inner IP Address

725

In the WebUI

726

In the CLI

726

Provision the AP

726

Deploying a Branch/Home Office Solution

727

Provisioning the Branch AP

728

Configuring the Branch AP

728

Troubleshooting Remote AP

728

Local Debugging

728

Remote AP Summary

729

Multihoming on remote AP (RAP)

732

Seamless failover from backup link to primary link on RAP

733

Remote AP Connectivity

733

Remote AP Diagnostics

733

Enabling Remote AP Advanced Configuration Options

734

Understanding Remote AP Modes of Operation

734

Working in Fallback Mode

736

Backup Configuration Behavior for Wired Ports

737

Configuring Fallback Mode

737

Configuring the AAA Profile for Fallback Mode

737

Configuring the Virtual AP Profile for Fallback Mode

738

Configuring the DHCP Server on the Remote AP

739

Configuring Advanced Backup Options

741

Configuring the Session ACL

742

Configuring the AAA Profile

743

Defining the Backup Configuration

743

Specifying the DNS Controller Setting

744

In the WebUI

745

54 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Backup Controller List Configuring the LMS and backup LMS IP addresses
Configuring Remote AP Failback In the WebUI In the CLI
Enabling RAP Local Network Access In the WebUI In the CLI
Configuring Remote AP Authorization Profiles In the WebUI In the CLI
Working with Access Control Lists and Firewall Policies Understanding Split Tunneling
Configuring Split Tunneling Configuring the Session ACL Allowing Tunneling
In the WebUI In the CLI Configuring an ACL to Restrict Local Debug Homepage Access In the WebUI In the CLI Configuring the AAA Profile for Tunneling In the WebUI In the CLI Configuring the Virtual AP Profile In the WebUI In the CLI Defining Corporate DNS Servers In the WebUI In the CLI
Dell Networking W-Series ArubaOS 6.4.x | User Guide

745 746 746 746 747 747 747 747 748 748 748 748 749 749 750 750 751 751 752 752 752 753 753 753 753 754 754 754 754
Contents | 55

Understanding Bridge

755

Configuring Bridge

755

Configuring the Session ACL

756

In the WebUI

756

In the CLI

757

Configuring the AAA Profile for Bridge

757

In the WebUI

757

In the CLI

758

Configuring Virtual AP Profile

758

In the WebUI

758

In the CLI

758

Provisioning Wi-Fi Multimedia

759

Reserving Uplink Bandwidth

759

Understanding Bandwidth Reservation for Uplink Voice Traffic

759

Configuring Bandwidth Reservation

759

In the WebUI

759

In the CLI

760

Provisioning 4G USB Modems on Remote Access Points

760

4G USB Modem Provisioning Best Practices and Exceptions

760

Provisioning RAP for USB Modems

761

In the WebUI

761

In the CLI

761

RAP 3G/4G Backhaul Link Quality Monitoring

762

Provisioning RAPs at Home

762

Prerequisites

762

Provisioning RAP Using Zero Touch Provisioning

762

Provisioning the RAP using a Static IP Address

763

Provision the RAP on a PPPoE Connection

763

Using 3G/EVDO USB Modems

764

56 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Configuring W-IAP3WN and W-IAP3WNP Access Points In the WebUI In the CLI
Converting an IAP to RAP or CAP Converting IAP to RAP Converting an IAP to CAP
Enabling Bandwidth Contract Support for RAPs Configuring Bandwidth Contracts for RAP Defining Bandwidth Contracts Applying Contracts Verifying Contracts on AP Verifying Contracts Applied to Users Verifying Bandwidth Contracts During Data Transfer
Virtual Intranet Access Spectrum Analysis
Understanding Spectrum Analysis Spectrum Analysis Clients Hybrid AP Channel Changes Hybrid APs Using Mode-Aware ARM
Creating Spectrum Monitors and Hybrid APs Converting APs to Hybrid APs In the WebUI In the CLI Converting an Individual AP to a Spectrum Monitor In the WebUI In the CLI Converting a Group of APs to Spectrum Monitors In the WebUI
Dell Networking W-Series ArubaOS 6.4.x | User Guide

766 766 766 766 767 767 767 768 768 768 768 769 770
771 772
772 776 777 777 777 778 778 778 778 779 779 779 780
Contents | 57

In the CLI

780

Connecting Spectrum Devices to the Spectrum Analysis Client

780

View Connected Spectrum Analysis Devices

781

Disconnecting a Spectrum Device

782

Configuring the Spectrum Analysis Dashboards

783

Selecting a Spectrum Monitor

783

Changing Graphs within a Spectrum View

784

Renaming a Spectrum Analysis Dashboard View

785

Saving a Dashboard View

785

Resizing an Individual Graph

786

Customizing Spectrum Analysis Graphs

786

Spectrum Analysis Graph Configuration Options

787

Active Devices

787

Active Devices Table

789

Active Devices Trend

792

Channel Metrics

794

Channel Metrics Trend

796

Channel Summary Table

798

Device Duty Cycle

799

Channel Utilization Trend

801

Devices vs Channel

803

FFT Duty Cycle

805

Interference Power

807

Quality Spectrogram

809

Real-Time FFT

810

Swept Spectrogram

812

Working with Non-Wi-Fi Interferers

816

Understanding the Spectrum Analysis Session Log

818

Viewing Spectrum Analysis Data

819

58 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Recording Spectrum Analysis Data Creating a Spectrum Analysis Record Saving the Recording Playing a Spectrum Analysis Recording Playing a Recording in the Spectrum Dashboard Playing a Recording Using the RFPlayback Tool
Troubleshooting Spectrum Analysis Verifying Spectrum Monitors Support for One Client per Radio Converting a Spectrum Monitor Back to an AP or Air Monitor Troubleshooting Browser Issues Loading a Spectrum View Troubleshooting Issues with Adobe Flash Player 10.1 or Later Understanding Spectrum Analysis Syslog Messages Playing a Recording in the RFPlayback Tool
Dashboard Monitoring
WAN Performance
Clients APs Using Dashboard Histograms Usage Potential Issues AppRF All Traffic
Action Bar Filters Details Block/Unblock, Throttle, and QoS Action Buttons
Dell Networking W-Series ArubaOS 6.4.x | User Guide

820 820 821 821 821 822 823 823 823 823 823 823 823 824
825
825 826 826 827 827 827 828 828 829 830 830 831 833
Contents | 59

Web Content Classification Web Content Filters WebCC Configuration in the WebUI WebCC Configuration in the CLI
AirGroup Security UCC
Chart View Details View Controller Details View
Info Panel Gauges Panel Ports Panel Controller Events WLANs Access Points Clients Firewall In the WebUI In the CLI Element View Details View Element Tab Element Summary View Usage Breakdown Aggregated Sessions
60 | Contents

837 841 841 844 846 847 847 848 849 850 850 850 850 851 851 851 852 853 854 854 854 854 856 856 856 857 858
Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access
Configuring Certificate Authentication for WebUI Access In the WebUI In the CLI
Secure Shell (SSH) Enabling Public Key Authentication
In the WebUI In the CLI Enabling RADIUS Server Authentication Configuring RADIUS Server Username and Password Authentication
In the WebUI In the CLI Configuring RADIUS Server Authentication with VSA Configuring RADIUS Server Authentication with Server Derivation Rule In the WebUI In the CLI Configuring a set-value server-derivation rule In the WebUI In the CLI Disabling Authentication of Local Management User Accounts In the WebUI In the CLI Verifying the configuration Resetting the Admin or Enable Password Bypassing the Enable Password Prompt Setting an Administrator Session Timeout In the WebUI In the CLI
Dell Networking W-Series ArubaOS 6.4.x | User Guide

860
860 860 861 861 861 862 862 862 862 862 863 863 863 863 864 864 864 865 865 865 865 866 866 867 867 867 867
Contents | 61

Connecting to an W-AirWave Server

867

AMON Message Size Changes on the Controller

868

Custom Certificate Support for RAP

869

Suite-B Support for ECDSA Certificate

869

Setting the Default Server Certificate

869

Generating a CSR

870

Uploading the Certificate

870

Storing CSR and Private Key Files in a USB

870

AP Boot Prompt

870

In the WebUI

870

In the CLI

870

RAP Console

871

Implementing a Specific Management Password Policy

871

Defining a Management Password Policy

871

In the WebUI

871

In the CLI

872

Management Authentication Profile Parameters

872

Configuring AP Image Preload

873

Enable and Configure AP Image Preload

874

In the WebUI

874

In the CLI

875

View AP Preload Status

875

Configuring Centralized Image Upgrades

876

Configuring Centralized Image Upgrades

876

Using the WebUI

876

In the CLI

877

Viewing Controller Upgrade Statistics

878

Managing Certificates

878

About Digital Certificates

879

62 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Obtaining a Server Certificate In the WebUI In the CLI
Obtaining a Client Certificate Importing Certificates
In the WebUI In the CLI Viewing Certificate Information Imported Certificate Locations Checking CRLs Certificate Expiration Alert Chained Certificates on the RAP Support for Certificates on USB Flash Drives Marking the USB Device Connected as a Storage Device RAP Configuration Requirements Configuring SNMP SNMP Parameters for the Controller In the WebUI In the CLI Enabling Capacity Alerts In the WebUI In the CLI Configuring Logging In the WebUI In the CLI Enabling Guest Provisioning Configuring the Guest Provisioning Page In the WebUI Configuring the SMTP Server and Port in the WebUI
Dell Networking W-Series ArubaOS 6.4.x | User Guide

879 879 880 881 881 881 881 882 882 882 883 883 883 884 884 884 884 885 885 886 887 887 887 889 889 890 890 890 894
Contents | 63

Configuring an SMTP server and port in the CLI

894

Creating Email Messages in the WebUI

894

Configuring a Guest Provisioning User

895

In the WebUI

895

In the CLI

896

Customizing the Guest Access Pass

897

Creating Guest Accounts

897

Guest Provisioning User Tasks

898

Importing Multiple Guest Entries

900

Optional Configurations

905

Restricting one Captive Portal Session for each Guest

905

Setting the Maximum Time for Guest Accounts

905

Managing Files on the Controller

906

Transferring ArubaOS Image Files

907

In the WebUI

907

In the CLI

908

Backing Up and Restoring the Flash File System

908

Backup the Flash File System in the WebUI

908

Backup the Flash File System in the CLI

908

Restore the Flash File System in the WebUI

908

Restore the Flash File System in the CLI

908

Copying Log Files

908

In the WebUI

908

In the CLI

909

Copying Other Files

909

In the WebUI

909

In the CLI

909

Setting the System Clock

909

Manually Setting the Clock

909

64 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the WebUI In the CLI Clock Synchronization In the WebUI In the CLI Configuring NTP Authentication In the WebUI In the CLI Timestamps in CLI Output ClearPass Profiling with IF-MAP In the WebUI In the CLI Whitelist Synchronization In the WebUI In the CLI Downloadable Regulatory Table Important Points to Remember Copying the Regulatory-Cert In the WebUI In the CLI Activating the Regulatory-Cert In the WebUI In the CLI Related Show Commands
802.11u Hotspots
Hotspot 2.0 Pre-Deployment Information Hotspot Profile Configuration Tasks Hotspot 2.0 Overview
Dell Networking W-Series ArubaOS 6.4.x | User Guide

909 910 910 910 910 910 910 911 911 911 911 912 912 912 913 913 913 914 914 914 914 914 915 915
916
916 916 916
Contents | 65

Generic Advertisement Service (GAS) Queries

916

ANQP Information Elements

917

Hotspot Profile Types

917

Configuring Hotspot 2.0 Profiles

919

In the WebUI

919

In the CLI

924

Configuring Hotspot Advertisement Profiles

925

Configuring an Advertisement Profile

925

In the WebUI

925

In the CLI

926

Associating the Advertisement Profile to a Hotspot 2.0 Profile

926

In the WebUI

926

In the CLI

926

Configuring ANQP Venue Name Profiles

926

In the WebUI

927

Venue Types

928

In the CLI

928

Configuring ANQP Network Authentication Profiles

928

In the WebUI

929

In the CLI

929

Configuring ANQP Domain Name Profiles

929

In the WebUI

929

In the CLI

930

Configuring ANQP IP Address Availability Profiles

930

In the WebUI

930

In the CLI

931

Configuring ANQP NAI Realm Profiles

931

In the WebUI

931

In the CLI

935

66 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Configuring ANQP Roaming Consortium Profiles In the WebUI In the CLI
Configuring ANQP 3GPP Cellular Network Profiles In the WebUI In the CLI
Configuring H2QP Connection Capability Profiles In the WebUI In the CLI
Configuring H2QP Operator Friendly Name Profiles In the WebUI In the CLI
Configuring H2QP Operating Class Indication Profiles In the WebUI In the CLI
Configuring H2QP WAN Metrics Profiles In the WebUI In the CLI
Adding Local Controllers
Moving to a Multi-Controller Environment Configuring a PSK Configuring a Master Controller PSK Configuring a Local Controller PSK Configuring a Controller Certificate Configuring a Local Controller Certificate Configuring a Master Controller Certificate
Configuring Local Controllers Using the Initial Setup
Dell Networking W-Series ArubaOS 6.4.x | User Guide

935 935 936 936 936 937 937 938 939 939 939 940 940 940 940 941 941 942
944
944 945 945 946 946 946 946 946 947
Contents | 67

In the WebUI In the CLI Configuring Layer-2/Layer-3 Settings Configuring Trusted Ports Configuring Local Controller Settings Configuring APs In the WebUI In the CLI
Advanced Security
Securing Client Traffic Securing Wireless Clients In the WebUI In the CLI Securing Wired Clients In the WebUI In the CLI Securing Wireless Clients Through Non-Dell APs In the WebUI In the CLI Securing Clients on an AP Wired Port In the WebUI In the CLI Enabling or Disabling Spanning Tree Parameter in AP Wired Port Profile In the WebUI In the CLI
Securing Controller-to-Controller Communication Configuring Controllers for xSec In the WebUI

947 947 947 948 948 948 948 949
950
950 951 951 952 952 953 954 954 954 955 955 955 957 957 957 957 957 958 958

68 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the CLI Configuring the Odyssey Client on Client Machines
Installing the Odyssey Client
Voice and Video
Voice and Video License Requirements Configuring Voice and Video
Voice ALG and Network Address Translation Setting up Net Services
Using Default Net Services Creating Custom Net Services Configuring User Roles Using the Default User Role Creating or Modifying Voice User Roles Using the User-Derivation Rules Configuring Firewall Settings for Voice and Video ALGs In the WebUI In the CLI Additional Video Configurations Configuring Video over WLAN enhancements Prerequisites In the WebUI In the CLI Working with QoS for Voice and Video Understanding VoIP Call Admission Control Profile In the WebUI In the CLI Understanding Wi-Fi Multimedia Enabling WMM
Dell Networking W-Series ArubaOS 6.4.x | User Guide

958 959 959
965
965 965 965 965 965 966 966 966 967 969 970 970 970 971 971 971 971 973 974 974 974 976 976 977
Contents | 69

Configuring WMM AC Mapping Configuring DSCP Priorities Configuring Dynamic WMM Queue Management Enabling WMM Queue Content Enforcement In the WebUI In the CLI Unified Communication and Collaboration Microsoft® Lync Visibility and Granular QoS Prioritization Lync ALG Compatibility Matrix Configuration Prerequisites Lync SDN API 2.1 Support Lync SDN API - ArubaOS Compatibility Matrix Configuring Lync ALG Viewing Lync ALG Statistics using the CLI Viewing Lync ALG Statistics Using the WebUI Troubleshooting Lync ALG Issues UCC Dashboard in the WebUI UCC Dashboard Aggregated Display UCC Dashboard Per Client Display Viewing UCC Information Viewing UCC Call Detailed Record Viewing UCC Client Information Viewing UCC Configuration Viewing UCC Statistics Viewing UCC Trace Buffer UCC-W-AirWave Integration UCC Call Quality Metrics Changes to Call Admission Control Troubleshooting and Log Messages

978 979 980 983 983 983 983 984 985 985 985 986 986 990 991 992 993 993 995 997 997 997 997 998 998 998 998 1001 1001

70 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

UCC Limitations Understanding Extended Voice and Video Features
Understanding QoS for Microsoft Lync and Apple Facetime Microsoft Lync Microsoft Lync Support for Mobile Devices Apple Facetime In the WebUI
Enabling WPA Fast Handover In the WebUI In the CLI
Enabling Mobile IP Home Agent Assignment Scanning for VoIP-Aware ARM
In the WebUI In the CLI Disabling Voice-Aware 802.1x In the WebUI In the CLI Configuring SIP Authentication Tracking In the WebUI In the CLI Enabling Real Time Call Quality Analysis Important Points to Remember In the Web UI In the CLI Enabling SIP Session Timer In the WebUI In the CLI Enabling Wi-Fi Edge Detection and Handover for Voice Clients In the WebUI
Dell Networking W-Series ArubaOS 6.4.x | User Guide

1001 1001 1002 1002 1003 1003 1004 1005 1005 1005 1005 1006 1006 1006 1006 1006 1007 1007 1007 1007 1007 1007 1008 1008 1009 1009 1009 1010 1010
Contents | 71

In the CLI Working with Dial Plan for SIP Calls
Understanding Dial Plan Format Configuring Dial Plans Enabling Enhanced 911 Support Working with Voice over Remote Access Point Understanding Battery Boost In the WebUI In the CLI Enabling LLDP In the WebUI In the CLI Advanced Voice Troubleshooting Viewing Troubleshooting Details on Voice Client Status In the WebUI In the CLI Viewing Troubleshooting Details on Voice Call CDRs In the WebUI In the CLI Enabling Voice Logs In the WebUI In the CLI Viewing Voice Traces In the WebUI In the CLI Viewing Voice Configurations In the CLI

1010 1011 1011 1012 1014 1015 1016 1016 1016 1017 1017 1022 1022 1023 1023 1023 1024 1025 1025 1025 1025 1026 1026 1027 1027 1027 1027

72 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup
Zero Configuration Networking AirGroup Solution
AirGroup Services AirGroup Solution Components AirGroup and ClearPass Policy Manager AirGroup Deployment Models Integrated Deployment Model AirGroup with ClearPass Policy Manager Features Supported in AirGroup Multi-Controller AirGroup Cluster
Multi-Controller AirGroup Cluster--Terminologies Sample AirGroup Cluster Topology Master-Local Controller Synchronization Pre-configured AirGroup Services AirGroup IPv6 Support Limitations DLNA UPnP Support AirGroup mDNS Static Records Group Based Device Sharing Dashboard Monitoring Enhancements ClearPass Policy Manager and ClearPass Guest Features Auto-association and Controller-based Policy Configuring Auto-association and Controller-based Policy Configuring Mac Address-based Policy Configuring Shared Group-list Configuring Shared Role-list Configuring Shared User-list
Dell Networking W-Series ArubaOS 6.4.x | User Guide

1029
1029 1029 1030 1031 1031 1033 1033 1034 1034 1034 1034 1035 1037 1037 1038 1038 1038 1038 1038 1038 1039 1039 1039 1039 1039 1040 1040
Contents | 73

Configuring Shared Location Configuring Service Level-based Auto-association Best Practices and Limitations Apple iTunes Wi-Fi Synchronization and File Sharing Firewall Configuration Disable Inter-User Firewall Settings ValidUser ACL Configuration Allow GRE and UDP 5353 Recommended Ports Ports for AirPlay Service Ports for AirPrint Service AirGroup Services for Large Deployments AirGroup Scalability Limits Memory Utilization CPU Utilization General AirGroup Limitations Integrated Deployment Model Master-Local Controller Synchronization Configuring an AirGroup Integrated Deployment Model Enabling or Disabling AirGroup Global Setting Enabling or Disabling mDNS and DLNA Viewing AirGroup Global Setting on Controller Defining an AirGroup Service Enabling the allowall Service Enabling or Disabling an AirGroup Service Viewing AirGroup Service Status Viewing Blocked Services Viewing AirGroup Service Details Configuring an AirGroup Domain

1040 1041 1041 1041 1041 1041 1041 1041 1042 1042 1042 1043 1043 1044 1044 1045 1045 1045 1046 1046 1048 1048 1048 1050 1051 1051 1051 1052 1052

74 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Viewing an AirGroup Domain Configuring an AirGroup active-domain Viewing an AirGroup active-domains Viewing AirGroup VLAN Table Viewing AirGroup Multi-Controller Table Controller Dashboard Monitoring Configuring the AirGroup-CPPM Interface Configuring the CPPM Query Interval Viewing the CPPM Query Interval Defining a CPPM and RFC3576 Server Configuring a CPPM Server Configuring the CPPM Server Group Configuring an RFC 3576 Server Assigning CPPM and RFC 3576 Servers to AirGroup In the WebUI In the CLI Viewing the CPPM Server Configuration In the WebUI In the CLI Verifying CPPM Device Registration Configuring CPPM to Enforce Registration In the WebUI In the CLI Group-Based Device Sharing Bluetooth-Based Discovery and AirGroup AirGroup mDNS Static Records Important Points to Remember Creating mDNS Static Records on a Controller Group mDNS Static Records
Dell Networking W-Series ArubaOS 6.4.x | User Guide

1053 1053 1053 1053 1054 1054 1057 1057 1057 1058 1059 1060 1060 1060 1060 1061 1061 1061 1061 1062 1062 1062 1062 1063 1064 1064 1064 1065 1065
Contents | 75

Individual Static mDNS Records mDNS AP VLAN Aggregation
Configuring mDNS AP VLAN Aggregation In the WebUI In the CLI In the WebUI In the CLI Disable AirGroup using WebUI Disable mDNS AP VLAN aggregation using WebUI Disable AirGroup using CLI Disable mDNS AP VLAN Aggregation using CLI
mDNS Multicast Response Propagation Maximum Number of iChat Users Configuring mDNS Multicast Response Propagation In the WebUI In the CLI
Troubleshooting and Log Messages Controller Troubleshooting Steps ClearPass Guest Troubleshooting Steps ClearPass Policy Manager Troubleshooting Steps Log Messages Show Commands Viewing AirGroup mDNS and DLNA Cache Viewing AirGroup mDNS and DLNA Statistics Viewing AirGroup VLANs Viewing AirGroup Servers Viewing AirGroup Users Viewing Service Queries Blocked by AirGroup Viewing Blocked Services

1066 1066 1067 1067 1067 1068 1068 1068 1068 1068 1068 1069 1069 1070 1070 1071 1071 1071 1071 1071 1071 1072 1072 1072 1072 1072 1072 1072 1072

76 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup Global Tokens
Instant AP VPN Support
Overview Improved DHCP Pool Management Termination of Instant AP VPN Tunnels Termination of IAP GRE Tunnels L2/L3 Network Mode Support Instant AP VPN Scalability Limits Instant AP VPN OSPF Scaling Branch-ID Allocation Centralized BID Allocation
VPN Configuration Whitelist DB Configuration Controller Whitelist DB External Whitelist DB VPN Local Pool Configuration Role Assignment for the Authenticated IAPs VPN Profile Configuration
Viewing Branch Status
W-600 Series Controllers
Connecting with a USB Cellular Modems How it Works Switching Modes Finding USB Modem Commands Uplink Manager Cellular Profile Dialer Group
Configuring a Supported USB Modem
Dell Networking W-Series ArubaOS 6.4.x | User Guide

1072
1074
1074 1074 1074 1074 1074 1075 1075 1077 1077 1078 1078 1078 1078 1078 1078 1079 1079
1081
1081 1081 1081 1082 1082 1082 1082 1082
Contents | 77

Configuring a New USB Modem Configuring the Profile and Modem Driver Configuring the TTY Port Testing the TTY Port Selecting the Dialer Profile Linux Support
External Services Interface
Sample ESI Topology Understanding the ESI Syslog Parser
ESI Parser Domains Peer Controllers Syslog Parser Rules
Condition Pattern Matching User Pattern Matching Configuring ESI Configuring Health-Check Method, Groups, and Servers In the WebUI In the CLI Defining the ESI Server In the WebUI In the CLI Defining the ESI Server Group In the WebUI In the CLI Policies and User Role In the WebUI In the CLI ESI Syslog Parser Domains and Rules

1083 1083 1084 1084 1084 1085
1086
1086 1088 1088 1089 1090 1090 1090 1091 1091 1091 1091 1092 1092 1092 1092 1092 1092 1093 1093 1093 1094

78 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the WebUI In the CLI Managing Syslog Parser Rules In the WebUI In the CLI Monitoring Syslog Parser Statistics In the WebUI In the CLI Sample Route-Mode ESI Topology ESI server configuration on controller IP routing configuration on Fortinet gateway Configuring the Example Routed ESI Topology Health-Check Method, Groups, and Servers Defining the Ping Health-Check Method In the WebUI In the CLI Defining the ESI Server In the WebUI In the CLI Defining the ESI Server Group In the WebUI In the CLI Redirection Policies and User Role In the WebUI In the CLI Syslog Parser Domain and Rules In the WebUI In the CLI Sample NAT-mode ESI Topology
Dell Networking W-Series ArubaOS 6.4.x | User Guide

1094 1094 1095 1095 1097 1097 1097 1097 1098 1098 1098 1098 1099 1099 1099 1099 1099 1099 1100 1100 1100 1100 1100 1100 1101 1101 1101 1102 1102
Contents | 79

ESI server configuration on the controller Configuring the Example NAT-mode ESI Topology Configuring the NAT-mode ESI Example in the WebUI
In the WebUI In the CLI Understanding Basic Regular Expression (BRE) Syntax Character-Matching Operators Regular Expression Repetition Operators Regular Expression Anchors References
External User Management
Overview Before you Begin
Working with the ArubaOS XML API Works Creating an XML Request
Adding a User Deleting a User Authenticating a User Blacklisting a User Querying for User Status XML Response Default Response Format
Response Codes Query Command Response Format Using the XML API Server Configuring the XML API Server Associating the XML API Server to a AAA profile
Set up Captive Portal profile

1104 1104 1104 1104 1106 1107 1107 1108 1108 1109
1110
1110 1110 1110 1110 1111 1111 1111 1111 1111 1112 1112 1112 1113 1115 1115 1115 1117

80 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Associating the Captive Portal Profile to an Initial Role Creating an XML API Request Monitoring External Captive Portal Usage Statistics Sample Code Using XML API in C Language
Understanding Request and Response Understanding XML API Request Parameters Understanding XMl API Response Adding a Client Deleting a Client Authenticating a Client Querying for Client Details Blacklisting a Client
Behavior and Defaults
Understanding Mode Support Understanding Basic System Defaults
Network Services Policies
Validuser and Logon-control ACLs Roles Understanding Default Management User Roles Understanding Default Open Ports
DHCP with Vendor-Specific Options
Configuring a Windows-Based DHCP Server Configuring Option 60 Configuring Option 60 using the Windows DHCP Server Configuring Option 43 Configuring Option 43 using the Windows DHCP Server:
Dell Networking W-Series ArubaOS 6.4.x | User Guide

1117 1117 1119 1119 1119 1123 1123 1124 1124 1124 1125 1126 1127
1129
1129 1131 1131 1133 1139 1139 1141 1145
1148
1148 1148 1148 1149 1149
Contents | 81

Enabling DHCP Relay Agent Information Option (Option 82) Configuring Option 82 In the WebUI In the CLI
Enabling Linux DHCP Servers
802.1X Configuration for IAS and Windows Clients
Configuring Microsoft IAS RADIUS Client Configuration Remote Access Policies Active Directory Database Configuring Policies Configuring RADIUS Attributes
Configuring Management Authentication using IAS Creating a Remote Policy Defining Properties for Remote Policy Creating a User Entry in Windows Active Directory Configure the Controller to use IAS Management Authentication Verify Communication between the Controller and the RADIUS Server
Window XP Wireless Client Sample Configuration
Acronyms and Terms
Acronyms Terms

1151 1151 1151 1151 1152
1153
1153 1153 1153 1154 1154 1155 1155 1156 1156 1156 1157 1157 1157
1160
1160 1167

82 | Contents

Dell Networking W-Series ArubaOS 6.4.x | User Guide

About this Guide
This User Guide describes the features supported in Dell Networking W-Series ArubaOS 6.4.x and provides instructions and examples to configure Dell controllers and access points (APs). This guide is intended for system administrators responsible for configuring and maintaining wireless networks and assumes administrator knowledge in Layer 2 and Layer 3 networking technologies. This chapter covers the following topics: l What's New In ArubaOS 6.4.x on page 83 l Fundamentals on page 98 l Related Documents on page 99 l Conventions on page 99 l Contacting Dell on page 100
What's New In ArubaOS 6.4.x
This section lists the new features and enhancements introduced in ArubaOS 6.4.x.
Features Introduced in ArubaOS 6.4.3.0
The following features are introduced or enhanced in ArubaOS 6.4.3.0: Throughout this document the term branch controller will refer to a W-7000 Series controller that has been configured via a branch config group created using the ArubaOS Smart Config WebUI.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

About this Guide | 83

Table 1: New Features/Enhancements in ArubaOS 6.4.3.0

Feature

Description

Branch Controllers

W-7000 Series controllers support distributed enterprises through the following features designed specifically for branch and remote offices:
l Zero-touch provisioning
l Authentication survivability, which allows controllers to provide authentication and authorization survivability when remote authentication servers are not accessible.
l Integration with existing Palo Alto Networks Firewalls.
l Policy-based routing on each uplink interface, which allows you specify the next hop to which packets are routed. This feature supports multiple nexthop lists, ensuring connectivity if a device is unreachable.
l Uplink and VPN redundancy, and per-interface bandwidth contracts to limit traffic for individual applications (or categories of applications) either sent from or received by a selected interface.
l Packet compression between Dell devices.
l Virtual APs for WAN link failure.
l A WAN health-check feature to measure WAN availability and latency on each uplink.

AMON Messages Size Changes on the Controller

The AMON message size change feature caps the AMON packet size at a default value of 1500 bytes to reduce the amount of fragmentation and message loss that typically occurs in larger packet sizes. Message size is capped at 1400 bytes to allow for the addition of AMON and PAPI/UDP/IP headers. This feature allows Dell controllers and W-AirWave servers to communicate data using the faster, more reliable, and scalable AMON model instead of the SNMP model.

Anyspot Client Probe Request Suppression

The anyspot client probe suppression feature decreases network traffic by suppressing probe requests from clients attempting to locate and connect to other known networks. By reducing the frequency at which these messages are sent, this feature frees up network resources and improves network performance.

AP Scanning Optimization

The AP scanning optimization feature enables APs to effectively visit and monitor channels. By increasing the frequency of channel visits, the AP is able to gather the required data on time and input this information to the client match algorithm.

BPDU Guard

The Bridge Protocol Data Unit (BPDU) Guard feature protects port from receiving STP BPDUs. The BPDU feature is configured at the port/interface level and enabled on edge ports.

Bluetooth-based Discovery and AirGroup

AirGroup supports only mDNS-based device discovery and does not support Bluetooth-based device discovery mechanism.

BSS Transition Management Support

The BSS transition management support feature allows Client Match to seamlessly steer devices using 802.11v BSS transition management standards for continuous wireless connectivity.

84 | About this Guide

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Feature Dashboard Monitoring

Description
The following new pages are introduced as part of the Dashboard tab of the controller WebUI: l WAN l Controller

Interface Bandwidth Contracts

Apply bandwidth contracts to limit traffic for individual applications (or categories of applications) or all traffic either sent from or received by a selected interface on a W-7000 Series or W-7200 Series controller.
This feature can be configured on a branch controller using the Smart Config WebUI, or on a standalone, local or master controller using the interface fastethernet | gigabitethernet CLI command

Lync SDN API 2.1 Support

The controller supports Lync SDN API version 2.1. As part of Lync SDN API 2.1, Lync SDN Manager (LSM) sends In-Call quality update messages to the controller.

UCC Score for Lync Media Classification

The controller supports UCC score for Lync calls prioritized using media classification. As part of this feature, Unified Communication Manager (UCM) supports the following:
l Real-time quality analysis for Lync voice and video calls (voice RTP streams only)
l Real-time computation of UCC score (delay, jitter, and packet loss) for Lync VoIP calls prioritized using media classification. The UCC score is computed by the AP in the downstream direction.
l Call Quality vs. Client Health chart in the UCC dashboard of the controller.

Managing AP Whitelists

The CPSec whitelist database is enhanced to include AP group and AP name. If CPSec is enabled, a campus AP uses the AP group and AP name from the CPSec whitelist during boot. If AP group or AP name is not present, a campus AP boots with "default" as AP group and its MAC address as AP name.

mDNS Multicast Response Propagation

The mDNS multicast response propagation allows services like iChat or Messages Application to multicast the response packet. This allows the existing users to instantly see a new user when a new user logs in.

mDNS AP VLAN Aggregation

The mDNS AP VLAN aggregation allows the discovery of wired mDNS/SSDP devices which do not have L2 connectivity with the controller or which do not trunk in the controller. An AP, which is in the same VLAN as the wired mDNS/SSDP device which does not trunk in the controller, receives and forwards the mDNS/SSDP packets from the wired mDNS/SSDP devices to the controller and from the controller to the wired mDNS/SSDP device. The AP forms a separate split tunnel (0x8000) with the controller and aggregates all mDNS/SSDP traffic to and from the controller.

Maximum Number of iChat Users

Lists the maximum number of iChat users supported in different controller models.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

About this Guide | 85

Feature Mesh Support for 802.11ac

Description
Mesh support has been added for all 802.11ac-capable access points. A number of new parameters have been added to the mesh highthroughput ssid profile to support this functionality.

Multi-Media Sync-Up

The multi-media sync-up feature provides a tighter integration between Client Match and multiple media-aware ALGs to provide better call quality for programs like Lync and Facetime. Clients are no longer steered to different APs in the middle of an active media session, even with Client Match's ability to understand various media protocols.

Offloading a Whitelist to ClearPass Policy Manager

Offloading a controller whitelist to W-ClearPass Policy Manager (CPPM) allows to externally maintain AP whitelist in a CPPM server. The controller, if configured to use an external server, can send a RADIUS access request to a CPPM server. The MAC address of the AP is used as a username and password to construct the access request packet. The CPPM server validates the RADIUS message and returns the relevant parameters for the authorized APs.

Policy-Based Routing

Firewall policies support rules based on routing actions that can forward packets through an IPsec tunnel defined by the specified IPsec map, a device on a nexthop list, GRE tunnel, or tunnel group.

PortFast

The PortFast feature is introduced to avoid network connectivity issues. These issues are caused by delays in STP enabled ports moving from blocking-state to forwarding-state after transitioning from the listening and learning states.

Enabling RadSec on RADIUS Servers

Radius over TLS or RadSec is introduced as an enhancement of the conventional RADIUS protocol.

Removing VBR Dependency on Probe Requests

Client Match has shifted its dependency on probe requests to the AM data feed for virtual beacon report (VBR) data. Instead of relying solely on client background scans during probe requests, which can cause limitations due to low scanning frequency, Client Match uses AM data feeds to gain more continuous, comprehensive client RSSI feeds.

Uplink Routing using Nexthop Lists

A nexthop list provides redundancy for next-hop devices by forwarding the traffic to another next-hop device in the list if the higher-priority nexthop device fails. If the active next-hop device on the list becomes unreachable, traffic matching a policy-based routing ACL is forwarded using the highest-priority active next-hop device on the list. If preemptive failover is enabled and a higher priority next-hop device becomes reachable again, packets are again forwarded to the higher priority nexthop device.

Username and Password Protection for the AP Console

The AP console username and password feature helps protect systems by requiring users to login to the AP network with a username and password.
Under the default configuration, consoles do not have passwords. To protect the network, a username and password can be set while the AP is in enabled mode. The timeout feature is also supported as an added level of security (default of 30 minutes).

86 | About this Guide

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Feature AP Console Access Using a Backup ESSID
WAN Health Check
Warning Message for Containment Features

Description
This failover system allows users to access an AP console after the AP has disconnected from the controller. By advertising backup ESSID in either static or dynamic mode, the user is still able to access and debug the AP remotely through a virtual AP.
The WAN health check feature uses ping probes to measure WAN reachability and latency. Latency is calculated based on the round-trip time (RTT) of ping responses. The results of this health check appears in the WAN section of the Monitoring Dashboard.
A warning message is issued each time the feature for enabling wireless containment under the IDS Unauthorized Device profile and IDS Impersonation profile is enabled, as it may be in violation of certain Federal Communications Commission (FCC) regulatory statutes.

Table 2: New Hardware Platforms in ArubaOS 6.4.3.0
Check with your local Dell sales representative on new controllers and access points availability in your country.

Hardware W-7024 Controller

Description
The W-7024 controller is a wireless LAN controller that connects, controls, and intelligently integrates wireless Access Points (APs) and Air Monitors (AMs) into a wired LAN system.
There are three models of the W-7024 controller that do not differ physically or functionally from each other.
l W-7024-US--For the United States of America
l W-7024-JP--For Japan
l W-7024-RW--For the rest of the world
For more information, see the Dell Networking W-7024 Controller Installation Guide.

W-7205 Controller

The W-7205 controller is a wireless LAN controller that connects, controls, and intelligently integrates wireless Access Points (APs) and Air Monitors (AMs) into a wired LAN system.
There are three models of the W-7205 controller that do not differ physically or functionally from each other.
l W-7205-US--For the United States of America
l W-7205-JP--For Japan
l W-7205-RW--For the rest of the world
For more information, see the Dell Networking W-7205 Controller Installation Guide.

W-AP205H

The W-AP205H access point is a high-performance dual radio wireless and wired access point for hospitality and branch deployments.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

About this Guide | 87

Table 2: New Hardware Platforms in ArubaOS 6.4.3.0
Check with your local Dell sales representative on new controllers and access points availability in your country.

Hardware

Description
This device combines high-performance wireless mobility with Gigabit wired local access to deliver secure network access to dormitories, hotel rooms, classrooms, medical clinics, and multi-tenant environments. MIMO (Multiple-Input Multiple-Output) technology enables the WAP205H to provide wireless 2.4 GHz 802.11n and 5 GHz 802.11n/ac functionality, while simultaneously supporting existing 802.11a/b/g wireless services. The W-AP205H access point works in conjunction with a Dell controller.
The W-AP205H access point provides the following capabilities:
l Dual wireless transceivers
l Protocol-independent networking functionality
l IEEE 802.11a/b/g/n/ac operation as a wireless access point
l IEEE 802.11a/b/g/n/ac operation as a wireless air monitor, spectrum analyzer
l Compatibility with IEEE 802.3af/at PoE
l Centralized management configuration and upgrades using a controller
l PoE power sourcing to an attached PoE network device
l Support for select USB peripherals
For more information, see the Dell Networking W-AP205H Access Point Installation Guide.

W-AP228

W-AP228 is a fully temperature hardened, water resistant, indoor rated, dual-radio IEEE 802.11ac access point. This access point use MIMO (Multiple-In Multiple-Out) technology and other high-throughput mode techniques to deliver high-performance, 802.11ac 2.4 GHz and 5 GHz functionality while simultaneously supporting existing 802.11a/b/g/n wireless services. The W-AP228 access point works in conjunction with a Dell controller.
W-AP228 provides the following capabilities:
l Wireless transceiver
l Wireless access point (IEEE 802.11 a/b/g/n/ac)
l Wireless air monitor (IEEE 802.11 a/b/g/n/ac)
l Protocol-independent networking functionality
l Compatibility with IEEE 802.3at PoE
l Centralized management configuration and upgrades using a controller
For more information, see the Dell Networking W-AP228 Wireless Access Point Installation Guide.

88 | About this Guide

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 2: New Hardware Platforms in ArubaOS 6.4.3.0
Check with your local Dell sales representative on new controllers and access points availability in your country.

Hardware W-AP277

Description
W-AP277 is an environmentally hardened, outdoor rated, dual-radio IEEE 802.11ac access point. This access point use MIMO (Multiple-In MultipleOut) technology and other high throughput mode techniques to deliver high-performance, 802.11ac 2.4 GHz and 5 GHz functionality while simultaneously supporting existing 802.11a/b/g/n wireless services. The W-AP277 access point works in conjunction with a Dell controller.
W-AP277 provides the following capabilities:
l Wireless transceiver
l Wireless access point (IEEE 802.11 a/b/g/n/ac)
l Wireless air monitor (IEEE 802.11 a/b/g/n/ac)
l Protocol-independent networking functionality
l Compatibility with IEEE 802.3at PoE
l Centralized management configuration and upgrades using a controller
For more information, see the Dell Networking W-AP277 Outdoor Access Point Installation Guide.

Features Introduced in ArubaOS 6.4.2.5
The following features are introduced or enhanced in ArubaOS 6.4.2.5:

Table 3: New Features/Enhancements in ArubaOS 6.4.2.5

Feature

Description

Bypassing Captive Portal Landing Page

Bypasses captive portal landing page. The landing page contains the meta-refresh tag to reload the page using real browser applications.
The enhancement is added to reduce the load on the controller for nonbrowser applications such as applications on smart devices like iPhone, iPad, and more.

RADIUS Service-Type Attribute

The controller sends new Service-Type attribute for RADIUS authentication requests.

Features Introduced in ArubaOS 6.4.2.4
The following features are introduced or enhanced in ArubaOS 6.4.2.4:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

About this Guide | 89

Table 4: New Features/Enhancements in ArubaOS 6.4.2.4

Feature

Description

USB Storage for CSR and Key Files

ArubaOS 6.4.2.4 introduces an enhancement to the custom certificate support for remote AP (RAP) feature by supporting storing the Certificate Signing Request (CSR) and private key from the RAP in a USB.

Table 5: Supported SFP/SFP+ Modules

Module

Description

SFP-EX

Aruba SFP, 1000BASE-EX, LC Connector; 1550 nm pluggable GbE optic; up to 40,000 meters over single-mode fiber.

SFP-ZX

Aruba SFP, 1000BASE-ZX, LC Connector; 1310nm pluggable GbE optic; up to 70,000 meters over singlemode fiber.

SFP-10G-ZR

Aruba SFP, 10GBASE-ZR, LC Connector; 1550nm pluggable SFP+ optic; up to 80,000 meters over singlemode fiber.

Features Introduced in ArubaOS 6.4.2.3
The following features are introduced or enhanced in ArubaOS 6.4.2.3:

Table 6: New Features/Enhancements in ArubaOS 6.4.2.3

Feature

Description

L2 GRE Tunnel Group

The controller supports redundancy for L3 Generic Routing Encapsulation (GRE) tunnels. Starting with ArubaOS 6.4.2.3, the controller supports redundancy for L2 GRE tunnel as well. This feature enables automatic redirection of the user traffic to a standby tunnel when the primary tunnel goes down.

Features Introduced in ArubaOS 6.4.2.0
The following features are introduced or enhanced in ArubaOS 6.4.2.0:

90 | About this Guide

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 7: New Features/Enhancements in ArubaOS 6.4.2.0

Feature

Description

Enhanced LACP support on WAP220 Series and W-AP270 Series access points

This enhanced LACP feature allows W-AP220 Series or W-AP270 Series access points to form a 802.11g radio tunnel to a backup controller in the event of a controller failover, even if the backup controller is in a different L3 network.

RTLS Station Message Frequency

Currently, when configuring the RTLS server under ap system-profile, the valid range of values for station-message-frequency was 5-3600 seconds. There are deployments that may require this to be configurable to as frequently as 1 per second. Starting with ArubaOS 6.4.2.0, you can set the station-message-frequency parameter in the 1-3600 seconds range.

Service Tag

A service tag is a unique seven digit alphanumeric string that is used to electronically identify a Dell device. It is similar to a serial number identifier. Starting with ArubaOS 6.4.2.0, you can view the service tag of some newer Dell APs from the controller WebUI or CLI. It is displayed along with the serial number in a device information listing.

VHT Support on W-AP200 Series, W-AP210 Series, WAP220 Series, and W-AP270 Series Access Points

Starting with ArubaOS 6.4.2.0, VHT is supported on W-AP220 Series access points on both 20 MHz and 40 MHz channels.

Web Content Classification

The WebCC feature helps classify web traffic in the controller. The classification is done in the data path while the traffic flows through the controller and updates dynamically. WebCC uses a cloud-based service to dynamically determine the types of websites being visited, and their safety.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

About this Guide | 91

Table 8: New Hardware Platforms in ArubaOS 6.4.2.0
Check with your local Dell sales representative on new controllers and access points availability in your country.

Hardware W-AP210 Series

Description
The Dell W-AP210 Series (W-AP214 and W-AP215) wireless access points support the IEEE 802.11ac standard for high-performance WLAN. These access points use MIMO (Multiple-Input, Multiple-Output) technology and other high-throughput mode techniques to deliver high-performance, 802.11ac 2.4 GHz and 802.11ac 5 GHz functionality while simultaneously supporting existing 802.11a/b/g wireless services. The W-AP210 Series access points work only in conjunction with a Dell controller. The Dell WAP210 Series access point provides the following capabilities:
l Wireless transceiver
l Protocol-independent networking functionality
l IEEE 802.11a/b/g/n/ac operation as a wireless access point
l IEEE 802.11a/b/g/n/ac operation as a wireless air monitor
l Compatibility with IEEE 802.3at PoE+ and 802.3af PoE
l Centralized management configuration and upgrades through a controller
For more information, see the Dell Networking W-AP210 Series Wireless Access Point Installation Guide.

Features Introduced in ArubaOS 6.4.1.0
The following features are introduced or enhanced in ArubaOS 6.4.1.0:

Table 9: New Features/Enhancements in ArubaOS 6.4.1.0

Feature

Description

AirGroup

The following AirGroup service changes are effective in this release: l The Chromecast service is renamed to DIAL. l The googlecast service is introduced.

AP Fast Failover support for Bridge-mode Virtual AP

High Availability (HA) support for bridge mode in Campus AP is introduced in this release. In previous versions of ArubaOS the fast failover feature for Campus AP was supported using tunnel or decrypt mode. Now support has been extended to bridge mode as well.

Authentication Profile based User Idle Timeout

The user-idle-timeout parameter under AAA profile accepts a value of 0. Entering a value of 0, L3 user state is removed immediately upon disassociation. In other words, the controller deletes the user immediately after disassociation or disconnection from the wireless network. If RADIUS accounting is configured, the controller sends an accounting STOP message to the RADIUS server.
NOTE: User idle timeout of 0 should not be configured for wired, splittunnel, VIA, and VPN users. It is applicable only for wireless users in tunnel and decrypt-tunnel forwarding modes.

92 | About this Guide

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 9: New Features/Enhancements in ArubaOS 6.4.1.0

Feature

Description

DHCP Lease Limit

This section outlines the maximum number of DHCP leases supported for the new W-7000 Series controller platform.

Downloadable Regulatory Table

The downloadable regulatory table features allows new regulatory approvals to be distributed without waiting for a new software patch and upgrade. A separate file, called the Regulatory-Cert, containing AP regulatory information will be released periodically and made available for download on the customer support site. The Regulatory-Cert file can then be uploaded to a controller and pushed to deployed APs.

Global Firewall Parameters

The following new parameters are introduced:
l Monitor/police ARP attack (non Gratuitous ARP) rate (per 30 sec)
l Monitor/police Gratuitous ARP attack rate (per 30 sec)

Dell Networking W-Series ArubaOS 6.4.x | User Guide

About this Guide | 93

Table 10: New Hardware Platforms in ArubaOS 6.4.1.0
Check with your local Dell sales representative on new controllers and access points availability in your country.

Hardware W-7000 Series

Description
The Dell ControllerW-7000 Series is an integrated controller platform. The platform acts as a software services platform targeting small to medium branch offices and enterprise networks.
The W-7000 Seriescontroller includes three models that provide varying levels of scalability.
l W-7005
l W-7010
l W-7030
For more information, see the installation guide for each controller model.

W-AP103H

The Dell W-AP103H wireless access point supports the IEEE 802.11n standard for high-performance WLAN. It is a dual radio, 2x2:2 802.11n access point. This access point uses MIMO (Multiple-Input, MultipleOutput) technology and other high-throughput mode techniques to deliver high-performance 802.11n 2.4 GHz or 5 GHz functionality while simultaneously supporting existing 802.11a/b/g wireless services. The W-AP103H access point is equipped with a total of three active Ethernet ports (ENET 0-2). It is a wall-box type access point. The W-AP103H access point works only with a Dell controller.
The Dell W-AP103H access point provides the following capabilities:
l Wireless transceiver
l Protocol-independent networking functionality
l IEEE 802.11a/b/g/n operation as a wireless access point
l IEEE 802.11a/b/g/n operation as a wireless air monitor
l Compatibility with IEEE 802.3af PoE
l Centralized management configuration and upgrades through a controller
For more information, see the Dell Networking W-AP103H Wireless Access Point Installation Guide.

W-AP200 Series

The Dell W-AP200 Series (W-AP204 and W-AP205) wireless access points support the IEEE 802.11ac and 802.11n standards for high-performance WLAN. It is a dual radio, 2x2:2 802.11ac access point. These access points use MIMO (Multiple-Input, Multiple-Output) technology and other high-throughput mode techniques to deliver high-performance, 802.11n 2.4 GHz and 802.11ac 5 GHz functionality while simultaneously supporting legacy 802.11a/b/g wireless services.
The Dell W-AP200 Series access point provides the following capabilities:
l Wireless transceiver
l Protocol-independent networking functionality

94 | About this Guide

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 10: New Hardware Platforms in ArubaOS 6.4.1.0
Check with your local Dell sales representative on new controllers and access points availability in your country.

Hardware

Description
l IEEE 802.11a/b/g/n/ac operation as a wireless access point l IEEE 802.11a/b/g/n/ac operation as a wireless air monitor l Compatibility with IEEE 802.3af PoE l Centralized management configuration and upgrades through a
controller For more information, see the Dell Networking W-AP200 Series Wireless Access Point Installation Guide.

Features Introduced in ArubaOS 6.4.0.0
The following features are introduced in ArubaOS 6.4.0.0:

Table 11: New Features in ArubaOS 6.4.0.0

Feature

Description

W-AP270 Series Access Points

The Dell W-AP270 Series (W-AP274 and W-AP275) wireless access points are environmentally hardened, outdoor rated, dual-radio IEEE 802.11ac wireless access points. These access points use MIMO (Multiple-Input, Multiple-Output) technology and other high-throughput mode techniques to deliver high-performance, 802.11ac 2.4 GHz and 5 GHz functionality while simultaneously supporting existing 802.11a/b/g/n wireless services.

W-AP103 Access Point

The W-AP103 wireless access point supports the IEEE 802.11n standard for high-performance WLAN. This access point uses MIMO (MultipleInput, Multiple-Output) technology and other high-throughput mode techniques to deliver high performance, 802.11n 2.4 GHz or 5 GHz functionality while simultaneously supporting existing 802.11a/b/g wireless services.

Ability to Disable FactoryDefault IKE/IPsec Profiles

This feature enables you to disable default IKE policies, default IPsec dynamic maps, and site-to-site IPsec maps.

AirGroup

The AirGroup feature has been enhanced with the following new features in ArubaOS 6.4: l DLNA UPnP support l Group Based Device Sharing l AirGroup mDNS Static Records l Dashboard Monitoring Enhancements

Dell Networking W-Series ArubaOS 6.4.x | User Guide

About this Guide | 95

Table 11: New Features in ArubaOS 6.4.0.0

Feature

Description

Application Single Sign-On Using Layer 2 Authentication Information

This feature allows single sign-on for web-based applications using layer 2 authentication information. With single sign-on, a user does not need to provide authentication credentials before logging into each application.

AppRF 2.0

This feature improves application visibility and control by allowing you to configure and view access control list (ACL) and bandwidth application and application category-specific data. AppRF 2.0 supports a Deep Packet Inspection (DPI) engine for application detection for over a thousand applications.

AppRF Application Dashboard Visibility

This feature is supported only in the W-7000 Series controllers. This feature allows you to configure both application and application category policies within a given user role. The AppRF page displays the PEF summary of all the sessions in the controller aggregated by users, devices, destinations, applications, WLANs, and roles.The elements are now represented in box charts instead of pie charts.

Authentication Server Load Balancing

Load balancing of authentication servers ensures that the authentication load is split across multiple authentication servers, thus avoiding any one particular authentication server from being overloaded.

Centralized BID Allocation

In a Master-Local set-up, the Master controller runs the BID allocation algorithm to allocate BID to the branches terminating on it and to the Local controller.

GRE Tunnels

Static IPv6 L2/L3 GRE tunnels can now be established between Dell devices and other devices that support IPv6 GRE tunnel.

IP Payload Compression

IP payload compression is one of the key features of the WAN bandwidth optimization solution set. IP payload compression should be enabled only between Dell devices. In branch deployments, this feature can be enabled both on the link between the branch controller and the master controller and on the link between the master controller and local controllers.

Multicast Listener Discovery

The Source Specific Multicast (SSM) option supports delivery of multicast packets that originate only from a specific source address requested by the receiver.

Hotspot 2.0

Hotspot 2.0 is a Wi-Fi Alliance Passpoint specification based upon the 802.11u protocol that provides wireless clients with a streamlined mechanism to discover and authenticate to suitable networks, and allows mobile users the ability to roam between partner networks without additional authentication.

IGMPv3 Support

ArubaOS 6.4 supports IGMPv3 functionality that makes Dell controllers aware of the Source Specific Multicast (SSM) and is used to optimize bandwidth of the network

96 | About this Guide

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 11: New Features in ArubaOS 6.4.0.0

Feature

Description

Controller LLDP Support

ArubaOS 6.4 provides support for Link Layer Discovery Protocol (LLDP) on the controllers to advertise identity information and capabilities to other nodes on the network, and store the information discovered about the neighbors.

ClearPass Policy Manager Integration

ArubaOS now supports downloadable roles. By using this feature, when CPPM successfully authenticates a user, the user is assigned a role by CPPM and if the role is not defined on the controller, the role attributes can also be automatically downloaded.

High Availability

The high availability feature has been enhanced with the following new features in ArubaOS 6.4: l High Availability Configuration Using the WebUI l Extended Standby Controller Capacity l High Availability State Synchronization l High Availability Inter-controller Heartbeats

ArubaOS and ClearPass Guest Login URL Hash option

This feature enhances the security for the ClearPass Guest login URL. A new parameter called "url_hash_key"in the Captive Portal profile provides ClearPass the ability to trust and ensure that the client MAC address in the redirect URL has not been tampered with by anyone.

Palo Alto Networks Firewall Integration

This feature takes advantage of the User-Identification (User-ID) feature of the Palo Alto Networks (PAN) firewall allows network administrators to configure and enforce firewall policies based on user and user groups. User-ID identifies the user on the network based on the IP address of the device which the user is logged into. Additionally, firewall policy can be applied based on the type of device the user is using to connect to the network. Since the Dell controller maintains the network and user information of the clients on the network, it is the best source to provide the information for the User-ID feature on the PAN firewall.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

About this Guide | 97

Table 11: New Features in ArubaOS 6.4.0.0

Feature

Description

RADIUS Accounting on Multiple Servers

ArubaOS provides support for the controllers to send RADIUS accounting to multiple RADIUS servers. The controller notifies all the RADIUS servers to track the status of authenticated users. Accounting messages are sent to all the servers configured in the server group in a sequential order.

Unified Communication and Collaboration

The following new features are introduced in ArubaOS 6.4: l Per User Role Lync Call Prioritization l UCC Dashboard in the WebUI l UCC show Commands l UCC-W-AirWave Integration l Dynamically Open Firewall for UCC Clients using STUN l UCC Call Quality Metrics l Changes to Call Admission Control

802.11w Support

ArubaOS supports the IEEE 802.11w standard, also known as Management Frame Protection (MFP). MFP makes it difficult for an attacker to deny service by spoofing Deauth and Disassoc management frames. MFP uses 802.11i (Robust Security Network) framework that establishes encryption keys between the client and AP.

Fundamentals
Configure your controller and AP using either the Web User Interface (WebUI) or the command line interface (CLI).
WebUI
Each controller supports up to 320 simultaneous WebUI connections. The WebUI is accessible through a standard Web browser from a remote management console or workstation. The WebUI includes configuration wizards that step you through easy-to-follow configuration tasks. The wizards are:
l AP Wizard--basic AP configuration l Controller Wizard--basic controller configuration l LAN Wizard--creating and configuring new WLAN(s) associated with the "default" ap-group l License Wizard--installation and activation of software licenses l W-AirWave Wizard --Controllers running ArubaOS 6.3 and later can use the W-AirWave wizard to quickly
and easily connect the controller to an W-AirWave server.
In addition to the wizards, the WebUI includes a Dashboard monitoring feature that provides enhanced visibility into your wireless network's performance and usage. This allows you to easily locate and diagnose WLAN issues. For details on the WebUI Dashboard, see Dashboard Monitoring.

98 | About this Guide

Dell Networking W-Series ArubaOS 6.4.x | User Guide

CLI
The CLI is a text-based interface accessible from a local console connected to the serial port on the controller or through a Telnet or Secure Shell (SSH) session.
By default, you access the CLI from the serial port or from an SSH session. You must explicitly enable Telnet on your controller in order to access the CLI via a Telnet session.
When entering commands remember that: l commands are not case sensitive l the space bar completes your partial keyword l the backspace key erases your entry one letter at a time l the question mark ( ? ) lists available commands and options
Related Documents
The following guides are part of the complete documentation for the Dell user-centric network: l Dell Networking W-Series Controller Installation Guides l Dell Networking W-Series Access Point Installation Guides l Dell Networking W-Series ArubaOS Quick Start Guide l Dell Networking W-Series ArubaOS User Guide l Dell Networking W-Series ArubaOS Command Line Reference Guide l Dell Networking W-Series ArubaOS MIB Reference Guide l Dell Networking W-Series ArubaOS Release Notes

Conventions
The following conventions are used throughout this document to emphasize important concepts:

Table 12: Typographical Conventions

Type Style

Description

Italics

This style is used to emphasize important terms and to mark the titles of books.

System items

This fixed-width font depicts the following: l Sample screen output l System prompts l Filenames, software devices, and specific commands when mentioned in the text

Commands

In the command examples, this bold font depicts text that you must type exactly as shown.

<Arguments>

In the command examples, italicized text within angle brackets represents items that you should replace with information appropriate to your specific situation. For example:
# send <text message>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

About this Guide | 99

Type Style
[Optional] {Item A | Item B}

Description
In this example, you would type "send" at the system prompt exactly as shown, followed by the text of the message you wish to send. Do not type the angle brackets.
Command examples enclosed in brackets are optional. Do not type the brackets.
In the command examples, items within curled braces and separated by a vertical bar represent the available choices. Enter only one choice. Do not type the braces or bars.

The following informational icons are used throughout this guide: Indicates helpful suggestions, pertinent information, and important things to remember.

Indicates a risk of damage to your hardware or loss of data.

Indicates a risk of personal injury or death.

Contacting Dell

Table 13: Contact Information Web Site Support

Main Website

dell.com

Contact Information

dell.com/contactdell

Support Website

dell.com/support

Documentation Website

dell.com/support/manuals

100 | About this Guide

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Chapter 1 The Basic User-Centric Networks
This chapter describes how to connect a Dell controller and Dell AP to your wired network. After completing the tasks described in this chapter, see Access Points on page 566 for information on configuring APs. This chapter describes the following topics: l Understanding Basic Deployment and Configuration Tasks on page 101 l Configuring the Controller on page 104 l Using the LCD Screen on page 106 l Configuring a VLAN to Connect to the Network on page 109 l Enabling Wireless Connectivity on page 113 l Configuring Your User-Centric Network on page 113 l Replacing a Controller on page 114
Understanding Basic Deployment and Configuration Tasks
This section describes typical deployment scenarios and the tasks you must perform while connecting to a Dell controller and Dell AP to your wired network. For details on performing the tasks mentioned in these scenarios, refer to the other procedures within the Basic User-Centric Networks section of this document.
Deployment Scenario #1: Controller and APs on Same Subnet
Figure 1 Controller and APs on Same Subnet

In this deployment scenario, the APs and controller are on the same subnetwork and will use IP addresses assigned to the subnetwork. The router is the default gateway for the controller and clients.There are no routers between the APs and the controller. APs can be physically connected directly to the controller. The uplink port on the controller is connected to a layer-2 switch or router.
For this scenario, you must perform the following tasks:
1. Run the initial setup wizard. l Set the IP address of VLAN 1. l Set the default gateway to the IP address of the interface of the upstream router to which you will connect the controller.
2. Connect the uplink port on the controller to the switch or router interface. By default, all ports on the controller are access ports and will carry traffic for a single VLAN.
3. Deploy APs. The APs will use the Aruba Discovery Protocol (ADP) to locate the controller.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

The Basic User-Centric Networks | 101

4. Configure the SSID(s) with VLAN 1 as the assigned VLAN for all users.
Deployment Scenario #2: APs All on One Subnet Different from Controller Subnet
Figure 2 APs All on One Subnet Different from Controller Subnets

In this deployment scenario, the APs and the controller are on different subnetworks and the APs are on multiple subnetworks. The controller acts as a router for the wireless subnetworks (the controller is the default gateway for the wireless clients). The uplink port on the controller is connected to a layer-2 switch or router; this port is an access port in VLAN 1.
For this scenario, you must perform the following tasks:
1. Run the initial setup wizard. l Set the IP address for VLAN 1. l Set the default gateway to the IP address of the interface of the upstream router to which you will connect the controller.
2. Connect the uplink port on the controller to the switch or router interface.

102 | The Basic User-Centric Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

3. Deploy APs. The APs will use DNS or DHCP to locate the controller. 4. Configure VLANs for the wireless subnetworks on the controller. 5. Configure SSIDs with the VLANs assigned for each wireless subnetwork. Each wireless client VLAN must be configured on the controller with an IP address. On the uplink switch or router, you must configure static routes for each client VLAN, with the controller's VLAN 1 IP address as the next hop.
Deployment Scenario #3: APs on Multiple Different Subnets from Controllers
Figure 3 APs on Multiple Different Subnets from Controllers

In this deployment scenario, the APs and the controller are on different subnetworks and the APs are on multiple subnetworks. There are routers between the APs and the controller. The controller is connected to a layer-2 switch or router through a trunk port that carries traffic for all wireless client VLANs. An upstream router functions as the default gateway for the wireless users.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The Basic User-Centric Networks | 103

This deployment scenario does not use VLAN 1 to connect to the layer-2 switch or router through the trunk port. The initial setup prompts you for the IP address and default gateway for VLAN 1; use the default values. In later steps, you configure the appropriate VLAN to connect to the switch or router as well as the default gateway.
For this scenario, you must perform the following tasks:
1. Run the initial setup. l Use the default IP address for VLAN 1. Since VLAN 1 is not used to connect to the layer-2 switch or router through the trunk port, you must configure the appropriate VLAN in a later step. l Do not specify a default gateway (use the default "none"). In a later step, you configure the default gateway.
2. Create a VLAN that has the same VLAN ID as the VLAN on the switch or router to which you will connect the controller. Add the uplink port on the controller to this VLAN and configure the port as a trunk port.
3. Add client VLANs to the trunk port. 4. Configure the default gateway on the controller. This gateway is the IP address of the router to which you
will connect the controller. 5. Configure the loopback interface for the controller. 6. Connect the uplink port on the controller to the switch or router interface. 7. Deploy APs. The APs will use DNS or DHCP to locate the controller. 8. Now configure VLANs on the controller for the wireless client subnetworks and configure SSIDs with the
VLANs assigned for each wireless subnetwork.
Configuring the Controller
The tasks in deploying a basic user-centric network fall into two main areas:
l Configuring and connecting the controller to the wired network (described in this section) l Deploying APs (described later in this section)
To connect the controller to the wired network:
1. Run the initial setup to configure administrative information for the controller. Initial setup can be done using the browser-based Setup Wizard or by accessing the initial setup dialog via a serial port connection. Both methods are described in the Dell Networking W-Series ArubaOS Quick Start Guide and are referred to throughout this chapter as "initial setup."
2. (For topologies similar to Deployment Scenario #3: APs on Multiple Different Subnets from Controllers) Configure a VLAN to connect the controller to your network. You do not need to perform this step if you are using VLAN 1 to connect the controller to the wired network.
3. (Optional) Configure a loopback address for the controller. You do not need to perform this step if you are using the VLAN 1 IP address as the controller's IP address. Disable spanning tree on the controller if necessary.
4. Configure the system clock. 5. (Optional) Install licenses; refer to Software Licenses on page 146. 6. Connect the ports on the controller to your network.
This section describes the steps in detail.
Running Initial Setup
When you connect to the controller for the first time using either a serial console or a Web browser, the initial setup requires you to set the role (master or local) for the controller and passwords for administrator and

104 | The Basic User-Centric Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

configuration access.
Do not connect the controller to your network when running the initial setup. The factory-default controller boots up with a default IP address and both DHCP server and spanning tree functions are not enabled. Once you have completed the initial setup, you can use either the CLI or WebUI for further configuration before connecting the controller to your network.
The initial setup might require that you specify the country code for the country in which the controller will operate; this sets the regulatory domain for the radio frequencies that the APs use.
You cannot change the country code for controllers designated for certain countries, such as the U.S. Improper country code assignment can disrupt wireless transmissions. Many countries impose penalties and sanctions for operators of wireless networks with devices set to improper country codes. If none of the channels supported by the AP you are provisioning have received regulatory approval by the country whose country code you selected, the AP will revert to Air Monitor mode.
The initial setup requires that you configure an IP address for the VLAN 1 interface, which you can use to access and configure the controller remotely via an SSH or WebUI session. Configuring an IP address for the VLAN 1 interface ensures that there is an IP address and default gateway assigned to the controller upon completion of the initial setup.
Connecting to the Controller after Initial Setup
After you complete the initial setup, the controller reboots using the new configuration. (See the Dell Networking W-Series ArubaOS Quick Start Guide for information about using the initial setup.) You can then connect to and configure the controller in several ways using the administrator password you entered during the initial setup:
l You can continue to use the connection to the serial port on the controller to enter the command line interface (CLI). (Refer to Management Access on page 860 for information on how to access the CLI and enter configuration commands.)
l You can connect an Ethernet cable from a PC to an Ethernet port on the controller. You can then use one of the following access methods: n Use the VLAN 1 IP address to start an SSH session where you can enter CLI commands. n Enter the VLAN 1 IP address in a browser window to start the WebUI. n WebUI Wizards.
This chapter and the user guide in general focus on CLI and standard WebUI configuration examples. However, basic controller configuration and WLAN/LAN creation can be completed using the alternative wizards from within the WebUI. If you wish to use a configuration wizard, navigate to Configuration > Wizards, click on the desired wizard, and follow the imbedded help instructions within the wizard.

W-7000 Series and W-7200 Series Controller
The W-7000 Series and W-7200 Series controller is a new controller platform that was introduced in conjunction with ArubaOS 6.4.x and 6.2 respectively. This controller provides new functionality and improved capabilities over previous controllers. However, the W-7000 Series and W-7200 Series controller also introduces some changes that you must keep in mind when adding it to your network.
New Port Numbering Scheme
The W-7000 Series and W-7200 Series controllers use a different port numbering scheme from previous controllers. All other controller platforms use a slot/port numbering scheme. Both the W-7000 Series and W-

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The Basic User-Centric Networks | 105

7200 Series controllersuse slot/module/port instead.
It is important to consider this when migrating an older controller to either the W-7000 Series or W-7200 Series. If you load a configuration from a non-W-7000 Series/W-7200 Series controller, that controller will not have network connectivity because any interface configuration will not be recognized. For information about migrating to W-7000 Series and W-7200 Series controllers, see the Dell Networking W-Series ArubaOS 6.2 Release Notes.
W-7200 Series Controllers Individual Port Behavior
The first two ports on the W-7200 Series controllers, 0/0/0 and 0/0/1 are dual media ports and can be used for any purpose. Ports 0/0/2 through 0/0/5 are fiber-based ports that can be used for any purpose. If the fiberbased ports are connected with RJ45 or Small Form-factor Pluggable (SFP) transceivers, these ports can function as 1 GBps ports. For accessing the controller, port 0/0/0 to 0/0/5 can be used when 0/0/2 through 0/0/5 are connected with RJ45 or SFP transceivers.
The following table describes the connector and speed supported for each physical interfaces of the W-7200 Series controllers.

Table 14: W-7200 Series Controllers Ports

Port Type

Ports

10/100/1000 BASE-T Dual Media Ports

0/0/0-0/0/1

10G BASE-X

0/0/2-0/0/5

Connector Type RJ45 or SFP

Speed 1 GBps

SFP+ RJ45 or SFP

10 GBps 1 GBps

Using the LCD Screen
Some controllers are equipped with an LCD panel that displays a variety of information about the controller's status and provides a menu that allows for basic operations such as initial setup and reboot. The LCD panel displays two lines of text with a maximum of 16 characters on each line. When using the LCD panel, the active line is indicated by an arrow next to the first letter.
The LCD panel is operated using the two navigation buttons to the left of the screen.
l Menu: Allows you to navigate through the menus of the LCD panel. l Enter: Confirms and executes the action currently displayed on the LCD panel.
The LCD has four modes:
l Boot: Displays the boot up status. l LED Mode: Displays the mode that the STATUS LED is in. l Status: Displays the status of different components of the controller, including Power Supplies and
ArubaOS version. l Maintenance: Allows you to execute some basic operations of the controller such as uploading an image or
rebooting the system.

106 | The Basic User-Centric Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 15: LCD Panel Mode: Boot

Function/Menu Options
Displays boot status

Displays "Booting ArubaOS...

Table 16: LCD Panel Mode: LED Mode

Function/Menu Options Administrative
Duplex Speed Exit Idle Mode

Displays
LED MODE: ADM - displays whether the port is administratively enabled or disabled. LED MODE: DPX - displays the duplex mode of the port. LED MODE: SPD - displays the speed of the port. EXIT IDLE MENU

Table 17: LCD Panel Mode: Status

Function/Menu Options
ArubaOS

Displays Version ArubaOS X.X.X.X

PSU

Status Displays status of the power supply unit.

PSU 0: [OK | FAILED | MISSING]

PSU 1: [OK | FAILED | MISSING]

Fan Tray

Displays fan tray status. FAN STATUS: [OK | ERROR | MISSING] FAN TEMP: [OK | HIGH | SHUTDOWN]

Exit Status Menu

EXIT STATUS

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The Basic User-Centric Networks | 107

Table 18: LCD Panel Mode: Maintenance

Function/Menu Options Upgrade Image
Upload Config
Factory Default Media Eject System Reboot System Halt Exit Maintenance Menu

Displays
Upgrade the software image on the selected partition from a predefined location on the attached USB flash device. Partition [0 | 1] Upgrade Image [no | yes] Uploads the controller's current configuration to a predefined location on the attached USB flash device. Upload Config [no | yes] Allows you to return the controller to the factory default settings. Factory Default [no | yes] Completes the reading or writing of the attached USB device. Media Eject [no | yes] Allows you to reboot the controller. Reboot [no | yes] Allows you to halt the controller. Halt [no | yes] EXIT MAINTENANCE

Using the LCD and USB Drive
You can upgrade your image or upload your pre-saved configuration by using your USB drive and your LCD commands.
Upgrading an Image
1. Copy a new controller image onto your USB drive into a directory named /Dellimage. 2. Insert your USB drive into the controller's USB slot. Wait for 30 seconds for the controller to mount the
USB. 3. Navigate to Upgrade Image in the LCD's Maintenance menu. Select partition and confirm the upgrade
(Y/N) and then wait for controller to copy the image from USB to the system partition. 4. Execute a system reboot either from the LCD menu or from the command line to complete the upgrade.
Uploading a Pre-saved Configuration
1. Copy your pre-saved configuration and name the copied file Dell_usb.cfg. 2. Move your pre-saved configuration file onto your USB drive into a directory named /Dellimage. 3. Insert your USB drive into the controller's USB slot. Wait for 30 seconds for the controller to mount the
USB.

108 | The Basic User-Centric Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

4. Navigate to Upload Config in the LCD's Maintenance menu. Confirm the upload (Y/N) and then wait for the upload to complete.
5. Execute a system reboot either from the LCD menu or from the command line to reload from the uploaded configuration.
For detailed upgrade and upload instruction, see the Upgrade Chapter in the Release Notes.

Disabling LCD Menu Functions

For security purpose, you can disable all LCD menu functions by disabling the entire menu functionality using the following command:

(host) (config) #lcd-menu (host) (lcd-menu) #disable menu

To prevent inadvertent menu changes, you can disable LCD individual menu function using the following commands:

(host) (lcd-menu) #disable menu maintenance ? factory-default Disable factory default menu media-eject Disable media eject menu on LCD system-halt Disable system halt menu on LCD system-reboot Disable system reboot menu on LCD upgrade-image Disable image upgrade menu on LCD upload-config Disable config upload menu on LCD

To display the current LCD functionality from the command line, use the following command:

(host) (config) #show lcd-menu lcd-menu -------Parameter --------menu maintenance upgrade-image partition0 menu maintenance upgrade-image partition1 menu maintenance upgrade-image menu maintenance upload-config menu maintenance factory-default menu maintenance media-eject menu maintenance reload-system menu maintenance halt-system menu maintenance menu

Value ----enabled enabled enabled enabled enabled enabled enabled enabled enabled enabled

Configuring a VLAN to Connect to the Network
You must follow the instructions in this section only if you need to configure a trunk port between the controller and another layer-2 switch (shown in Deployment Scenario #3: APs on Multiple Different Subnets from Controllers on page 103).
This section shows how to use both the WebUI and CLI for the following configurations (subsequent steps show how to use the WebUI only):
l Create a VLAN on the controller and assign it an IP address. l Optionally, create a VLAN pool. A VLAN pool consists of two more VLAN IDs which are grouped together to
efficiently manage multi-controller networks from a single location. For example, policies and virtual application configurations map users to different VLANs which may exist at different controllers. This creates redundancy where one controller has to back up many other controllers. With the VLAN pool feature you can control your configuration globally.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The Basic User-Centric Networks | 109

VLAN pooling should not be used with static IP addresses.
l Assign to the VLAN the ports that you will use to connect the controller to the network. (For example, the uplink ports connected to a router are usually Gigabit ports.) In the example configurations shown in this section, a controller is connected to the network through its Gigabit Ethernet port 1/25.
l Configure the port as a trunk port. l Configure a default gateway for the controller.
Creating, Updating, and Viewing VLANs and Associated IDs
You can create and update a single VLAN or bulk VLANS using the WebUI or the CLI. See Configuring VLANs on page 164. In the WebUI configuration windows, clicking the Save Configuration button saves configuration changes so they are retained after the controller is rebooted. Clicking the Apply button saves changes to the running configuration but the changes are not retained when the controller is rebooted. A good practice is to use the Apply button to save changes to the running configuration and, after ensuring that the system operates as desired, click Save Configuration.
You can view VLAN IDs in the CLI. (host) #show vlan
Creating, Updating, and Deleting VLAN Pools
VLAN pooling should not be used with static IP addresses.
You can create, update, and delete a VLAN pool using the WebUI or the CLI. See Creating a Named VLAN on page 165. Use the CLI to add existing VLAN IDS to a pool. (host) (config) #vlan-name <name> (host) (config) #vlan mygroup <vlan-IDs> To confirm the VLAN pool status and mappings assignments, use the show vlan mapping command: (host) #show vlan mapping
Assigning and Configuring the Trunk Port
The following procedures configures a Gigabit Ethernet port as trunk port.
In the WebUI
To configure a Gigabit Ethernet port: 1. Navigate to Configuration > Network > Ports. 2. In the Port Selection section, click the port that will connect the controller to the network. In this example,
click port 25. 3. For Port Mode, select Trunk. 4. For Native VLAN, select a VLAN from the scrolling list, then click the left (<--) arrow. 5. Click Apply.

110 | The Basic User-Centric Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the CLI
To configure a Gigabit Ethernet port: (host)(config) #interface gigabitethernet <slot>/<module>/<port> (host)(config-if) #switchport mode trunk (host)(config-if) #switchport trunk native vlan <id> To confirm the port assignments, use the show vlan command: (host) (config) #show vlan
Configuring the Default Gateway
The following configurations assign a default gateway for the controller.
In the WebUI
To configure the default gateway: 1. Navigate to Configuration > Network > IP > IP Routes. 2. To add a new static gateway, click the Add button below the static IP address list.
a. In the IP Address field, enter an IP address in dotted-decimal format. b. In the Cost field, enter a value for the path cost. c. Click Add. 3. You can define a dynamic gateway using DHCP, PPPOE or a cell uplink interface. In the Dynamic section, click the DHCP, PPPoE or Cellular checkboxes to select one or more dynamic gateway options. If you select more than one dynamic gateway type, you must also define a cost for the route to each gateway. The controller will first attempt to obtain a gateway IP address using the option with the lowest cost. If the controller is unable to obtain a gateway IP address, it will then attempt to obtain a gateway IP address using the option with the next-lowest path cost. 4. Click Apply.
In the CLI
To configure the default gateway: ip default-gateway <ipaddr>|{import cell|dhcp|pppoe}|{ipsec <name>} <cost>
Configuring the Loopback IP Address for the Controller
You must configure a loopback address if you are not using a VLAN ID address to connect the controller to the network (see Deployment Scenario #3: APs on Multiple Different Subnets from Controllers on page 103).
After you configure or modify a loopback address, you must reboot the controller.
If configured, the loopback address is used as the controller's IP address. If you do not configure a loopback address for the controller, the IP address assigned to the first configured VLAN interface IP address. Generally, VLAN 1 is configured first and is used as the controller's IP address. ArubaOS allows the loopback address to be part of the IP address space assigned to a VLAN interface. In the example topology, the VLAN 5 interface on the controller was previously configured with the IP address 10.3.22.20/24. The loopback IP address in this example is 10.3.22.220.
You configure the loopback address as a host address with a 32-bit netmask. The loopback address should be routable from all external networks.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The Basic User-Centric Networks | 111

Spanning tree protocol (STP) is enabled by default on the controller. STP ensures a single active path between any two network nodes, thus avoiding bridge loops. Disable STP on the controller if you are not employing STP in your network.
In the WebUI
To configure a loopback IP address: 1. Navigate to Configuration > Network > Controller > System Settings. 2. Enter the IP address under Loopback Interface. 3. On this window, you can also turn off spanning tree. Click No for Spanning Tree Enabled. 4. Click Apply at the bottom of the window (you might need to scroll down the window). 5. At the top of the window, click Save Configuration.
You must reboot the controller for the new IP address to take effect.
6. Navigate to the Maintenance > Controller > Reboot Controller window. 7. Click Continue.
In the CLI
To configure a loopback IP address: (host)(config) #interface loopback ip address <A.B.C.D> (host)(config) #no spanning-tree (host)(config) #write memory (host)(config) #reload The controller returns the following messages: Do you really want to reset the system(y/n): Enter y to reboot the controller or n to cancel. System will now restart! ... Restarting system. To verify that the controller is accessible on the network, ping the loopback address from a workstation on the network.
Configuring the System Clock
You can manually set the clock on the controller, or configure the controller to use a Network Time Protocol (NTP) server to synchronize its system clock with a central time source. For more information about setting the controller's clock, see Setting the System Clock on page 909.
Installing Licenses
ArubaOS consists of a base operating system with optional software modules that you can activate by installing license keys. If you use the Setup Wizard during the initial setup phase, you will have the opportunity to install software licenses at that time. Refer to Software Licenses on page 146 for detailed information on Licenses.
Connecting the Controller to the Network
Connect the ports on the controller to the appropriately-configured ports on an L2 switch or router. Make sure that you have the correct cables and that the port LEDs indicate proper connections. Refer to the Installation

112 | The Basic User-Centric Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Guide for the controller for port LED and cable descriptions.
In many deployment scenarios, an external firewall is situated between various Dell devices. External Firewall Configuration on page 711 describes the network ports that must be configured on the external firewall to allow proper operation of the network.
To verify that the controller is accessible on the network: l If you are using VLAN 1 to connect the controller to the network (Deployment Scenario #2: APs All on One
Subnet Different from Controller Subnet on page 102 and Deployment Scenario #3: APs on Multiple Different Subnets from Controllers on page 103), ping the VLAN 1 IP address from a workstation on the network. l If you created and configured a new VLAN (Deployment Scenario #3: APs on Multiple Different Subnets from Controllers on page 103), ping the IP address of the new VLAN from a workstation on the network.
Enabling Wireless Connectivity
Wireless users can connect to the SSID but because you have not yet configured authentication, policies, or user roles, they will not have access to the network. Other chapters in the Dell Networking W-Series ArubaOS User Guide describe how to build upon this basic deployment to configure user roles, firewall policies, authentication, authentication servers, and other wireless features.
Enabling Wireless Connectivity
Wireless users can connect to the SSID but because you have not yet configured authentication, policies, or user roles, they will not have access to the network. Other chapters in the Dell Networking W-Series ArubaOS User Guide describe how to build upon this basic deployment to configure user roles, firewall policies, authentication, authentication servers, and other wireless features.
Configuring Your User-Centric Network
Configuring your controller and AP is done through either the Web User Interface (WebUI) or the command line interface (CLI). l WebUI is accessible through a standard Web browser from a remote management console or workstation.
The WebUI includes configuration wizards that step you through easy-to-follow configuration tasks. Each wizard has embedded online help. The wizards are: n AP Wizard--basic AP configurations including LAN, Remote, LAN Mesh and Remote Mesh deployment
scenarios n Controller Wizard--basic controller configuration including system settings, Control Plane security,
cluster settings and licenses n WLAN/LAN Wizard--creating and configuring new WLANs and LANs associated with the "default" ap-
group. Includes campus only and remote networking. n License Wizard--installation and activation of software licenses (see Software Licenses on page 146)
Clicking Cancel from the Wizards return you to where you launched the wizard. Any configuration changes you entered are not saved.
l The command line interface (CLI) allows you to configure and manage controllers. The CLI is accessible from a local console connected to the serial port on the controller or through a Telnet or Secure Shell (SSH) session from a remote management console or workstation.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The Basic User-Centric Networks | 113

By default, you can only access the CLI from the serial port or from an SSH session. To use the CLI in a Telnet session, you must explicitly enable Telnet on the controller.
Replacing a Controller
The procedures below describe the steps to replace an existing standalone master controller and/or a redundant master controller. Best practices are to replace the backup master controller first, and replace the active master controller only after the new backup controller is operational on the network. When you remove the active controller from the network to replace it, the new backup controller takes over the active controller role. When you add a second controller to the network, that second controller automatically assumes the role of a backup controller.
This procedure assumes that the existing controllers have been upgraded to ArubaOS 6.2.x or later. If your controllers are running earlier version of ArubaOS, upgrade them to 6.2.x or later before attempting to migrate them to a newer controller model, such as a W-7000 or W-7200 Series controller.
Transferring Licenses
To replace a controller with manually added licenses, you will need to transfer those licenses to the new controller as part of the replacement process. If the controller being replaced was returned to Dell as an RMA, the license keys on the RMA controller cannot be directly transferred to a new device, and must be regenerated. To generate new keys for a license on an controller returned as an RMA: 1. Navigate to the Dell Software License Management website: licensing.dell-pcw.com. 2. Select Certificate Management > Transfer Certificates. 3. Click the Transfer link by the license you want to transfer to the replacement controller. 4. Enter the serial number of the replacement controller then click Transfer. The licensing website displays a
new activation key. Use this key to apply the license to the new controller.
Procedure Overview
The procedure to replace a backup or active master controller is comprised of the following tasks: 1. Change the VRRP Priorities for a Redundant Master Pair 2. Replacing a Controller on page 114 3. Stage the New Controller on page 115 4. Add Licenses to the New Controller on page 116 5. Backup Newly Installed Licenses on page 116 6. Import and Restore Flash Backup on page 116 7. Restore Licenses on page 117 8. Reboot the Controller on page 117 9. Modify the Host Name on page 118 10.Modify Topology Settings on page 118 11.Save your Configuration on page 119 12.Remove the Existing Controller on page 119
If your controller does not have any manually added licenses, skip steps 3, 4 and 6 of the following procedure.

114 | The Basic User-Centric Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Change the VRRP Priorities for a Redundant Master Pair
If your deployment uses VRRP to define the primary master in a pair of redundant master controllers, and you are replacing only the primary master controller, and you must change the VRRP priority levels of the controllers so the primary master controller has a lower priority than the backup master controller. This will allow the configuration from the backup master to be copied to the new master controller, and prevent an old or inaccurate configuration from being pushed to the local controllers.
For details on changing VRRP priorities, see Configuring VRRP Redundancy on page 670.

Back Up the Flash File System
To start the migration process, access the backup or master controller being replaced and create a backup of the flash file system. You can create a backup file using the WebUI or command-line interfaces.

In the WebUI
To back up the flash from the WebUI, log in to the current backup or master controller and create a flash backup using the procedure below.
1. Navigate to Maintenance > File >Backup Flash. 2. Select Create Backup. 3. Select Copy Backup to create a copy of the backup file. By default, the flash backup file is named
flashbackup.tar.gz. 4. Next, move the backup the flash file system to an external server. Navigate to Maintenance>Copy Files. 5. In the Source Selection section, select Flash File System. 6. In the Destination Selection section, select one of the server options to move the flash backup off the
controller, and enter the name of the flash backup file to be exported.

In the CLI

To create a flash backup from the command-line interface, access the active master controller and issue the backup flash command, as shown in the example below.

(host) #backup flash

Please wait while we tar relevant files from flash...

Please wait while we compress the tar file...

File flashbackup.tar.gz created successfully on flash.

Please copy it out of the switch and delete it when done.

(active_host) #dir

-rw-r--r-- 1 root

root

17338 Dec 6 08:34 default.cfg

drwxr-xr-x 4 root

root

1024 Dec 6 08:34 fieldCerts

-rw-r--r-- 1 root

root

21760 Dec 6 09:29 flashbackup.tar.gz

drwx------ 2 root

root

1024 Dec 5 08:20 tpm

(host) #copy flash: flashbackup.tar.gz tftp: <your TFTP server IP> flashbackup.tar.gz

Stage the New Controller
The next step in the procedure is to stage the new backup master or active master controller with basic IP connectivity. Power up the new controller, connect a laptop computer to the controller's serial port, and follow the prompts to configure basic settings, as shown below:
Auto-provisioning is in progress. Choose one of the following options to override or debug... 'enable-debug' : Enable auto-provisioning debug logs 'disable-debug' : Disable auto-provisioning debug logs 'mini-setup' : Stop auto-provisioning and start mini setup dialog for branch role 'full-setup' : Stop auto-provisioning and start full setup dialog for any role
Enter Option (partial string is acceptable): full-setup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The Basic User-Centric Networks | 115

Are you sure that you want to stop auto-provisioning and start full setup dialog? (yes/no): yes Reading configuration from factory-default.cfg
***************** Welcome to the Dell W-7210 setup dialog ***************** This dialog will help you to set the basic configuration for the switch. These settings, except for the Country Code, can later be changed from the Command Line Interface or Graphical User Interface.
Enter System name [Dell W-7210]: Enter Switch Role (master|local|standalone) [master]: Enter VLAN 1 interface IP address [172.16.0.254]: 10.79.100.109 Enter VLAN 1 interface subnet mask [255.255.255.0]: Enter IP Default gateway [none]: 10.79.100.1 Enter Country code (ISO-3166), <ctrl-I> for supported list: US You have chosen Country code US for United States (yes|no)?: yes Enter Time Zone [PST-8:0]: Enter Time in UTC [02:24:44]: 02:36:44 Enter Date (MM/DD/YYYY) [12/3/2012]: Enter Password for admin login (up to 32 chars): ****** Re-type Password for admin login: ****** Enter Password for enable mode (up to 15 chars): ****** Re-type Password for enable mode: ****** Do you wish to shutdown all the ports (yes|no)? [no]: If you accept the changes the switch will restart! Type <ctrl-P> to go back and change answer for any question Do you wish to accept the changes (yes|no)yes Creating configuration... Done. System will now restart!
Add Licenses to the New Controller
Use the license add command in the command-line interface or navigate to Configuration > Network > Controller > License Management to add new or transferred licenses to the new controller.
Do not reboot the controller at the end of this step. Do not save the configuration or write it to memory. Reboot only after the flash memory and the licenses have been restored.
(host) #license add <key>
Backup Newly Installed Licenses
Use the license export command in the command-line interface or click Export Database in the Configuration > Network > Controller > License Management page of the WebUI to back up the newly installed licenses to the backup license database.
Do not reboot the controller at the end of this step. Do not save the configuration or write it to memory. Reboot only after the flash memory and the licenses have been restored.
(host) #license export <filename>
Import and Restore Flash Backup
Import and restore the backup flash file system from the original controller to the new controller,
Do not reboot the controller at the end of this step. Do not save the configuration or write it to memory. Reboot only after the flash memory and the licenses have been restored.

116 | The Basic User-Centric Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the WebUI
To import and restore a flash backup using the WebUI:
1. Access the new controller and navigate to Maintenance > File> Copy Files. 2. In the Source Selection section, choose any of the server options or select USB Drive if the flash backup is
on USB storage. 3. In the Destination Selection section, choose Flash File System. 4. Enter the filename of the flash backup and click Apply. By default, the flash backup file is named
flashbackup.tar.gz. 5. Next, navigate to Maintenance>File>Restore Flash and select Restore.

In the CLI
To import and restore a flash backup file using the command-line interface, use the copy and restore flash commands. The following example copies a backup file from a USB drive.
(host) #copy usb: Partition 1 flashbak2_3600.tar.gz flash: flashbackup.tar.gz ....File flashbak2_3600.tar.gz copied to flash successfully.

(host) #dir -rw-r--r--rw-r--r--rw-r--r-drwxr-xr-x -rwxr-xr-x -rw-r--r--rw-r--r-drwx------

1 root 1 root 2 root 3 root 1 root 1 root 2 root 2 root

root root root root root root root root

10182 Dec 2 18:39 default.cfg 9726 Nov 30 21:36 default.cfg.2012-11-30_21-36-23
10977 Dec 2 18:39 default.cfg.2012-12-02_18-39-27 4096 Dec 2 18:25 fieldCerts
78205 Dec 2 19:41 flashbackup.tar.gz 1796 Nov 30 19:12 license_backup.db
10977 Dec 2 18:39 original.cfg 4096 Dec 2 18:25 tpm

(host) #restore flash Please wait while we uncompress /flash/config/flashbackup.tar.gz... Please wait while we untar /flash/config/flashbackup.tar.gz... Flash restored successfully. Please reload (reboot) the switch for the new files to take effect.

Restore Licenses
Issue the license import command in the command-line interface or click Import Database in the Configuration > Network > Controller > License Management page of the WebUI to import licenses from the license database to the new controller.
(host) #license import <filename>

Do not save the configuration or write to memory at the end of this step.

Reboot the Controller
Once all the licenses have been restored, issue the reload command in the command-line interface or navigate to Maintenance>Reboot Controller in the WebUI to reboot the new controller. After rebooting, the controller should not be on the network (or a reachable subnet) with the controller it will replace. This is to prevent a possible IP address conflict.
Do not save the configuration or write to memory at the end of this step.

(host) #reload Do you want to save the configuration(y/n): n
Dell Networking W-Series ArubaOS 6.4.x | User Guide

The Basic User-Centric Networks | 117

Do you really want to restart the system(y/n): y System will now restart!
Modify the Host Name
Issue the hostname command in the command-line interface to give the new controller a unique hostname. (The flash restoration process gave the new controller the same name as the existing controller.)
Do not save the configuration or write to memory at the end of this step.

(host)(config) #hostname <hostname>
Modify Topology Settings
This is required when migrating to a newer controller model. New controller models such as the W-7000 and W7200 Series controllersuse a different port numbering scheme than other Dell controllers. Ports on the newer controller models are numbered slot/module/port. Older controller ports are numbered slot/port. As a result, flash backup files restored from older controllers onto a newer model controllers can cause the newer controller lose network connectivity, as the imported port settings don't match up with the controller hardware. Additionally, all ports will become untrusted when you import a configuration from an older model controller to a newer model controller.
Use the interface range and switchport commands to reconfigure the VLANs and IP interfaces to match the port scheme of that hardware model. To avoid network conflicts, this process must be completed before the controller is connected to the management network.
If you are replacing a controller with the same controller model, you can skip this step and continue to Save your Configuration on page 119

The following commands adjust the port configuration on the new controller .
(host) (config) #interface range gigabitethernet <slot>/<module-start>/<port-start>-<moduleend>/<port-end> (host) (config-range) #switchport access vlan <id>
Because the physical ports don't match, the port trust is removed by default, and needs to be re-enabled. In the example below, the Trusted column shows that the port trust is disabled for all ports.
(host) #show port status

Port Status

-----------

Slot-Port PortType

--------- --------

0/0/0

GE

0/0/1

GE

0/0/2

GE

0/0/3

GE

0/0/4

GE

0/0/5

GE

adminstate ---------Enabled Enabled Enabled Enabled Enabled Enabled

operstate --------Up Down Down Down Down Down

poe --Enabled Enabled Enabled Enabled Enabled Enabled

Trusted ------No No No No No No

SpanningTree -----------Disabled Disabled Disabled Disabled Disabled Disabled

PortMode -------Access Access Access Access Access Access

Use the interface range command to re-apply port trust to all of the gigabit Ethernet ports on the controller. Then issue the show port status command to verify port trust has been restored.

(host) (config) #interface range gigabitethernet <slot>/<module-start>/<port-start>-<moduleend>/<port-end> (host) (config-range) #trusted (host) #show port status

Port Status

118 | The Basic User-Centric Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

-----------

Slot-Port PortType

--------- --------

0/0/0

GE

0/0/1

GE

0/0/2

GE

0/0/3

GE

0/0/4

GE

0/0/5

GE

adminstate ---------Enabled Enabled Enabled Enabled Enabled Enabled

operstate --------Down Down Down Down Down Down

poe --Enabled Enabled Enabled Enabled Enabled Enabled

Trusted ------Yes Yes Yes Yes Yes Yes

SpanningTree -----------Disabled Disabled Disabled Disabled Disabled Disabled

PortMode -------Access Access Access Access Access Access

Save your Configuration
Now, you must save the configuration settings on the new controller. Issue the write memory command in the command-line interface, or click the Configuration tab and select the Save Configuration buton at the top of the WebUI page.
(host) (config) #write memory)

Remove the Existing Controller
If you are only replacing a backup controller, remove the existing backup controller, then connect the replacement controller to the network. If you are replacing both an active controller and a backup controller, replace the backup controller first.
When the active master controller is removed from the network, the backup master immediately assumes the role of active master, and all active APs associate to the new active master controller within a few seconds. Therefore, when you add another controller to the network, it will, by default, assume the role of a backup controller.
If you changed the VRRP priorities of your redundant master controllers prior to replacing the primary master controller, you may wish to change them back once the new primary master is active on the network.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The Basic User-Centric Networks | 119

Chapter 2 Control Plane Security

ArubaOS supports secure IPsec communications between a controller and campus or remote APs using publickey self-signed certificates created by each master controller. The controller certifies its APs by issuing them certificates. If the master controller has any associated local controllers, the master controller sends a certificate to each local controller, which in turn sends certificates to their own associated APs. If a local controller is unable to contact the master controller to obtain its own certificate, it is not be able to certify its APs, and those APs can not communicate with their local controller until master-local communication has been reestablished. You create an initial control plane security configuration when you first configure the controller using the initial setup wizard. The ArubaOS initial setup wizard enables control plane security by default, so it is very important that the local controller be able to communicate with its master controller when it is first provisioned.
Some AP model types have factory-installed digital certificates. These AP models use their factory-installed certificates for IPsec, and do not need a certificate from the controller. Once a campus or remote AP is certified, either through a factory-installed certificate or a certificate from the controller, the AP can failover between local controllers and still stay connected to the secure network, because each AP has the same master controller as a common trust anchor.
Starting with ArubaOS 6.2, the controller maintains two separate AP whitelists; one for campus APs and one for Remote APs. These whitelists contain records of all campus APs or remote APs connected to the network. You can use a campus or AP whitelist at any time to add a new valid campus or remote AP to the secure network, or revoke network access to any suspected rogue or unauthorized APs.
The control plane security feature supports IPv4 campus and remote APs only. Do not enable control plane security on a controller that terminates IPv6 APs.
When the controller sends an AP a certificate, that AP must reboot before it can connect to its controller over a secure channel. If you are enabling control plane security for the first time on a large network, you may experience several minutes of interrupted connectivity while each AP receives its certificate and establishes its secure connection.
Topics in this chapter include:
l Control Plane Security Overview on page 120 l Configuring Control Plane Security on page 121 l Managing AP Whitelists on page 123 l Managing Whitelists on Master and Local Controllers on page 131 l Working in Environments with Multiple Master Controllers on page 135 l Replacing a Controller on a Multi-Controller Network on page 138 l Configuring Control Plane Security after Upgrading on page 142 l Troubleshooting Control Plane Security on page 143
Control Plane Security Overview
Controllers using control plane security only send certificates to APs that you have identified as valid APs on the network. If you want closer control over each AP that is certified, you can manually add individual campus

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Control Plane Security | 120

and remote APs to the secure network by adding each AP's information to the whitelists when you first run the initial setup wizard. If you are confident that all APs currently on your network are valid APs, then you can use the initial setup wizard to configure automatic certificate provisioning to send certificates from the controller to each campus or remote AP, or to all campus and remote APs within specific ranges of IP addresses.
The default automatic certificate provisioning setting requires that you manually enter each campus AP's information into the campus AP whitelist, and each remote AP's information into the remote AP whitelist. If you change the default automatic certificate provisioning values to let the controller send certificates to all APs on the network, that new setting ensures that all valid APs receive a certificate, but also increases the chance that you will certify a rogue or unwanted AP. If you configure the controller to send certificates to only those APs within a range of IP addresses, there is a smaller chance that a rogue AP receives a certificate, but any valid AP with an IP address outside the specified address ranges will not receive a certificate, and can not communicate with the controller (except to obtain a certificate). Consider both options carefully before you complete the control plane security portion of the initial setup wizard. If your controller has a publicly accessible interface, you should identify the APs on the network by IP address range. This prevents the controller from sending certificates to external or rogue campus APs that may attempt to access your controller through that publicly accessible interface.
Configuring Control Plane Security
When you initially deploy the controller, you create your initial control plane security configuration using the initial setup wizard. These settings can be changed at any time using the WebUI or the command-line interfaces.
If you are configuring control plane security for the first time after upgrading from ArubaOS 5.0 or earlier, see Configuring Control Plane Security after Upgrading on page 142 for details on enabling this feature using the WebUI or CLI.
In the WebUI
1. Navigate to Configuration > Network > Controller. 2. Select the Control Plane Security tab. 3. Configure the following control plane security parameters:

121 | Control Plane Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 19: Control Plane Security Parameters

Parameter

Description

Control Plane Security

Select enable or disable to turn the control plane security feature on or off. This feature is enabled by default.

Auto Cert Provisioning

When you enable the control plane security feature, you can select this checkbox to turn on automatic certificate provisioning. When you enable this feature, the controller attempts to send certificates to all associated campus APs. Auto certificate provisioning is disabled by default.
NOTE: If you do not want to enable automatic certificate provisioning the first time you enable control plane security on the controller, you must identify the valid APs on your network by adding those to the campus AP whitelist. For details, see Viewing the Master or Local Controller Whitelists on page 133.
After you have enabled automatic certificate provisioning, you must select either Auto Cert Allow all or Addresses Allowed for Auto Cert.

Addresses allowed for Auto Cert

The Addresses Allowed for Auto Cert section allows you to specify whether certificates are sent to all associated APs, or just APs within one or more specific IP address ranges. If your controller has a publicly accessible interface, you should identify your campus and Remote APs by IP address range. This prevents the controller from sending certificates to external or rogue campus APs that may attempt to access your controller through that interface.
Select All to allow all associated campus and remote APs to receive automatic certificate provisioning. This parameter is enabled by default.
Select Addresses Allowed for Auto Cert to send certificates to a group of campus or remote APs within a range of IP addresses. In the two fields below, enter the start and end IP addresses, then click Add. Repeat this procedure to add additional IP ranges to the list of allowed addresses. If you enable both control plane security and auto certificate provisioning, all APs in the address list receives automatic certificate provisioning.
Remove a range of IP addresses from the list of allowed addresses by selecting the IP address range from the list and clicking Delete.

Number of AP Whitelist Entries

This parameter is the total number of APs in the remote AP and campus AP Whitelists. This number is also a link to a combined whitelist that displays all campus and remote AP entries.

4. Click Apply.
The master controller generates its self-signed certificate and begins distributing certificates to campus APs and any local controllers on the network over a clear channel. After all APs have received a certificate and have connected to the network using a secure channel, access the Control Plane Security window and turn off auto certificate provisioning if that feature was enabled. This prevents the controller from issuing a certificate to any rogue APs that may appear on your network at a later time.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Control Plane Security | 122

Figure 4 Control Plane Security Settings

In the CLI
Use the commands below to configure control plane security via the command line interface on a standalone or master controller. Descriptions of the individual parameters are listed in Table 19, above. (host)(config) #control-plane-security (host)(Control Plane Security Profile) #auto-cert-allow-all
(host)(Control Plane Security Profile) #auto-cert-allowed-addrs <ipaddress-start> <ipaddressend> (host)(Control Plane Security Profile) #auto-cert-prov (host)(Control Plane Security Profile) #cpsec-enable View the current control plane security settings using the following command: (host) #show control-plane-security
Managing AP Whitelists
Campus or Remote APs appear as valid APs in the campus or Remote AP whitelists when you manually enter their information into the campus or Remote AP whitelists through the WebUI or CLI of a controller or after a controller sends a certificate to an AP as part of automatic certificate provisioning and the AP connects to the controller over a secure tunnel. APs that are not approved or certified on the network are included in the campus AP whitelists, but these APs appear in an unapproved state. Use the AP whitelists to grant valid APs secure access to the network or to revoke access from suspected rogue APs. When you revoke or remove an AP from the campus or remote AP whitelists on a controller that uses control plane security, that AP is not able to communicate with the controller again, except to obtain a new certificate.
If you manually add APs to the AP whitelists (rather than automatically adding the APs as part of automatic certificate provisioning), make sure that the AP whitelists have been synchronized to all other controllers on the network before enabling control plane security.
Adding an AP to the Campus or Remote AP Whitelists
You can add an AP to the campus AP or remote AP whitelists over the WebUI or CLI.
In the WebUI
To add an AP to the campus AP or Remote AP whitelist: 1. Navigate to Configuration > Wireless > AP Installation. 2. Click the Whitelist tab. 3. Select the whitelist to which you want to add an AP. The Whitelist tab displays status information for the
Campus AP Whitelist by default. To add a Remote AP to the Remote AP whitelist, click the Remote AP link before you proceed to step 4 on page 124.

123 | Control Plane Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 5 Control Plane Security Settings

4. Click Entries in the upper right corner of the whitelist status window. 5. Click New. 6. Define the following parameters for each AP you want to add to the AP whitelist.

Table 20: AP Whitelist Parameters

Parameter

Description

Campus AP whitelist configuration parameters

AP MAC Address

MAC address of campus AP that supports secure communications to and from its controller.

AP Group

Name of the AP group to which the campus AP is assigned. If you do not specify an AP group, the AP uses default as its AP group.

AP Name

Name of the campus AP. If you do not specify a name, the AP uses its MAC address as AP name.

Description

Brief description of the campus AP.

Remote AP whitelist configuration parameters

AP MAC Address

MAC address of the remote AP, in colon-separated octets.

User Name

Name of the end user who provisions and uses the remote AP.

AP Group

Name of the AP group to which the Remote AP is assigned.

AP Name

Name of the Remote AP. If you do not specify a name, the AP uses its MAC address as AP name.

Description

Brief description of the Remote AP.

IP-Address

The static inner IP address to be assigned to the Remote APs.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Control Plane Security | 124

7. Click Add.
In the CLI
To add an AP to the campus AP whitelist: (host) #whitelist-db cpsec add mac-address <name>
ap-group <ap_group> ap-name <ap_name> description <description>
To add an AP to the remote AP whitelist: (host) #whitelist-db rap add mac-address <mac-address>
ap-group <ap-group> ap-name <ap-name> description <description> full-name <name> remote-ip <inner-ip-adr>
Viewing AP Whitelist Status
The WebUI displays either a status of the selected AP whitelist or a table of entries in the selected AP whitelist. The status page displays the current status of the AP whitelist and for controllers in a master/local controller topology, it displays the AP whitelist synchronization status between controllers. When the status of an entry in the AP whitelist changes, the AP whitelist status is updated automatically. The table of entries page displays the status of each AP on the AP whitelist.
The Configuration > Wireless > AP Installation > Whitelist tab displays the status of the campus AP whitelist by default. To view the status of remote AP whitelist, click the Remote AP link.
The following table describes the contents of the status page.

Table 21: Whitelist status information

Status Entry

Description

Campus AP whitelist status information

Control Plane Security

Shows if the control plane security is enabled or disabled on the controller. This status entry is also a link to the control plane security configuration tab.

Total entries

Number of entries in the campus AP whitelist.

Approved entries

Number of entries in the campus AP whitelist that have been approved by the controller.

Unapproved entries

Number of entries in the campus AP whitelist that have not been approved by the controller.

Certified entries

Number of entries in the campus AP whitelist that have an approved certificate from the controller.

Certified hold entries

Number of entries in the campus AP whitelist that have been certified with a factory certificate but request to be certified again. Such APs are not approved as secure until you manually change the status and verify that it is not compromised.

125 | Control Plane Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 21: Whitelist status information

Status Entry

Description

NOTE: If an AP is in the hold state because of connectivity problems, then the AP recovers and moves out of the hold state when connectivity is restored.

Revoked entries

Number of entries in the campus AP whitelist that has been manually revoked.

Marked for deletion entries

Number of entries in the campus AP whitelist that has been marked for deletion, but not removed from the Remote AP whitelist.

Remote AP whitelist configuration parameters

Total entries

Number of entries in the Remote AP whitelist.

Revoked entries

Number of entries in the Remote AP whitelist that has been manually revoked.

Marked for deletion entries

Number of entries in the Remote AP whitelist that has been marked for deletion, but not removed from the Remote AP whitelist.

The Remote AP whitelist entries page displays only the information you manually configure. The campus AP whitelist entries page displays both user-defined settings and additional information that is updated when the status of a campus AP changes.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Control Plane Security | 126

Table 22: Additional Campus AP Status Information

Parameter

Description

Cert Type

The type of certificate used by the campus AP.
l switch-cert: The campus AP is using a certificate signed by the controller.
l factory-cert: The campus AP is using a factory-installed certificate.

State Revoked

The state of a campus AP.
l unapproved-no-cert: The campus AP has no certificate and is not approved.
l unapproved-factory-cert: The campus AP has a pre-installed certificate which is not approved.
l approved-ready-for-cert: The campus AP is approved as valid and is ready to receive a certificate.
l certified-factory-cert: The campus AP already has a factory certificate. If a campus AP has a factory-cert type of certificate and is in certified-factory-cert state, then a new certificate is not reissued to the campus AP when you enable automatic certificate provisioning.
l certified-switch-cert: The campus AP has an approved certificate from the controller.
l certified-hold-factory-cert: The campus AP is certified with a factory certificate but requests to be certified again. Such APs are not approved as secure until you manually change the status and verify that it is not compromised.
NOTE: If an AP is in this state due to connectivity problems, then the AP recovers and leaves this hold state as soon as connectivity is restored.
l certified-hold-switch-cert: An AP is put in this state when the controller thinks the AP has been certified with a controller certificate but the AP requests to be certified again. Because this is not a normal condition, the AP is not approved as a secure AP until a network administrator manually changes the status of the AP to verify that it is not compromised.
NOTE: If an AP is in the hold state because of connectivity problems, then the AP recovers and moves out of the hold state when connectivity is restored.
Shows if the secure status of the AP is revoked.

Revoked Text

Brief description for revoking the campus AP.

Last Update

Time and date of the last AP status update.

To view information about the campus and remote AP whitelists using the CLI, use the following commands:
(host) #show whitelist-db cpsec ap-group <ap_group> ap-name <ap_name> cert-type {factory-cert|switch-cert} mac-address <name> page <num> start <offset> state {approved-ready-for-cert|

127 | Control Plane Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

certified-factory-cert| unapproved-factory-cert| unapproved-no-cert} (host) #show whitelist-db cpsec-status (host) #show whitelist-db rap apgroup <rap-group> apname <rap-name> fullname <rap-fullname> long mac-address <mac-address> page <page-number> start <offset> (host) #show whitelist-db rap-status
Modifying an AP in the Campus AP Whitelist
Use the following procedures to modify the AP group, AP name, certificate type, state, description, and revoked status of an AP in the campus AP whitelist.
In the WebUI
To modify an AP in the campus AP whitelist:
1. Navigate to Configuration > Wireless > AP Installation. 2. Click the Whitelist tab. 3. Click the Entries>> button. 4. Select the checkbox of the AP that you want to modify, then click Modify.
If your campus AP whitelist is large and you cannot immediately locate the AP that you want to modify, select the Search link. The Whitelist Search tab displays the fields AP Group, Cert Type, AP MAC Address, AP Name, and State that allow you to search for an AP. Specify the values of the AP that you want to locate in these fields, then click Search. The campus AP whitelist displays a list of APs that match your search criteria. Select the checkbox of the AP that you want to modify, then click Modify. 5. Modify the settings of the selected AP. Some of the following parameters are available when adding an AP to the campus AP whitelist and are described in Table 20. l AP Group: The name of the AP group to which the campus AP is assigned. l AP Name: The name of the campus AP. If you not specify a name, the AP uses its MAC address as a
name. l Cert-type: The type of certificate used by the AP.
n switch-cert: The campus AP is using a certificate signed by the controller. n factory-cert: The campus AP is using a factory-installed certificate. l State: When you click the State drop-down list to modify this parameter, you may choose one of the following options: n approved-ready-for-cert: The AP has been approved state and is ready to receive a certificate. n certified-factory-cert: The AP is certified and has a factory-installed certificate. l Description: Brief description of the campus AP. l Revoked: Click the Revoked checkbox to revoke an invalid or rogue AP. l Revoke Text: When the Revoked checkbox is selected, enter a brief comment describing why the AP is being revoked. 6. Click Update to update the campus AP whitelist entry with its new settings.
In the CLI
To modify an AP in the campus AP whitelist:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Control Plane Security | 128

(host) #whitelist-db cpsec modify mac-address <name> ap-group <ap_group> ap-name <ap_name> cert-type {switch-cert|factory-cert} description <description> mode {disable|enable} revoke-text <revoke-text> state {approved-ready-for-cert|certified-factory-cert}
Revoking an AP from the Campus AP Whitelist
You can revoke an invalid or rogue AP either by modifying its revoke status (as described in Modifying an AP in the Campus AP Whitelist) or by directly revoking it from the campus AP whitelist without modifying any other parameter. When revoking an invalid or rogue AP, enter a brief description why the AP is being revoked. When you revoke an AP from the campus AP whitelist, the campus AP whitelist retains the information of the AP. To revoke an invalid or rogue AP and permanently remove it from the whitelist, delete that entry (as described in ).
In the WebUI
To revoke an AP from the campus AP whitelist:
1. Navigate to Configuration > Wireless > AP Installation. 2. Click the Whitelist tab. 3. Click the Entries>> button. 4. Select the checkbox of the AP that you want to revoke, then click Revoke.
If your campus AP whitelist is large and you cannot immediately locate the AP that you want to revoke, select the Search link. The Whitelist Search tab displays the fields AP Group, Cert Type, AP MAC Address, AP Name, and State that allow you to search for an AP. Specify the values of the AP that you want to locate in these fields, then click Search. The campus AP whitelist displays a list of APs that match your search criteria. Select the checkbox of the AP that you want to revoke, then click Revoke. 5. Enter a brief description why the AP is being revoked, then click Update.
In the CLI
To revoke an AP via the campus AP whitelist: (host) #whitelist-db cpsec revoke mac-address <name> revoke-text <revoke-text>
Deleting an AP from the Campus AP Whitelist
Before deleting an AP from the campus AP whitelist, verify that auto certificate provisioning is either not enabled or enabled only for IP addresses that do not include the AP being deleted. If you enable automatic certificate provisioning for an AP that is still connected to the network, you cannot delete it from the campus AP whitelist; the controller immediately re-certifies the AP and recreates its whitelist entry.
In the WebUI
To delete an AP from the campus AP whitelist:
1. Navigate to Configuration > Wireless > AP Installation. 2. Click the Whitelist tab. 3. Click the Entries>> button. 4. Select the checkbox of the AP you want to delete, then click delete.
If your campus AP whitelist is large and you cannot immediately locate the AP that you want to delete, select the Search link. The Whitelist Search tab displays the fields AP Group, Cert Type, AP MAC Address, AP Name, and State that allow you to search for an AP. Specify the values of the AP that you

129 | Control Plane Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

want to locate in these fields, then click Search. The campus AP whitelist displays a list of APs that match your search criteria. Select the checkbox of the AP that you want to delete, then click Delete.
In the CLI
To delete an AP from the campus AP whitelist: (host) #whitelist-db cpsec del mac-address <name>
Purging a Campus AP Whitelist
Before adding a new local controller to a network using control plane security, purge the campus AP whitelist on the new controller. After adding the new controller to the hierarchy, the entries in the campus AP whitelist of the new controller merge into the whitelist for all other master and local controllers. If you add any old or invalid AP entries to the campus AP whitelist, all controllers in the hierarchy will trust those APs, creating a potential security risk. For additional information on adding a new local controller using control plane security to your network, see Replacing a Local Controller on page 138
In the WebUI
To purge a campus AP whitelist: 1. Navigate to Configuration > Wireless > AP Installation. 2. Click the Whitelist tab. 3. Click the Entries>> button. 4. Click Purge.
In the CLI
To purge a campus AP whitelist: (host) #whitelist-db cpsec purge
Offloading a Controller Whitelist to ClearPass Policy Manager
This feature allows to externally maintain AP whitelist in a ClearPass Policy Manager (CPPM) server. The controller, if configured to use an external server, can send a RADIUS access request to a CPPM server. The MAC address of the AP is used as a username and password to construct the access request packet. The CPPM server validates the RADIUS message and returns the relevant parameters for the authorized APs. The following supported parameters are associated with the following VSAs. The CPPM server sends them in the RADIUS access accept packet for authorized APs: l ap-group: Dell-AP-Group l ap-name: Dell-Location-ID The following defaults are used when any of the supported parameters are not provided by the CPPM server in the RADIUS access accept response: l ap-group: The default ap-group is assigned to the AP. l ap-name: The MAC address of the AP is used as the AP name. There is no change in the RAP role assignment. The RAP is assigned the role that is configured in the VPN default-rap profile.
In the WebUI
To assign a CPPM server to a RAP: 1. Configure a CPPM server using the controller WebUI:
a. Navigate to Configuration > Security > Authentication > Servers.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Control Plane Security | 130

b. Select Radius Server to display the CPPM Server List. c. To configure a CPPM server, enter the name for the server and click Add. d. Select the name to configure server parameters. Select the Mode check box to activate the
authentication server. e. Click Apply. 2. Create a server group that contains the CPPM server. 3. Navigate to Configuration > All Profile Management > Wireless LAN > VPN Authentication > default-rap > Server Group. 4. Select the CPPM server from the Server Group drop-down list. 5. Click Apply. To assign a CPPM server to a RAP that was initially an Instant AP: 1. Make sure that a CPPM server is configured on the controller. 2. Navigate to Configuration > All Profile Management > Wireless LAN > VPN Authentication > default-iap > Server Group. 3. Select the CPPM server from the Server Group drop-down list. 4. Click Apply.
In the CLI
To add a CPPM server to a RAP: Configure a radius server with CPPM server as host address. In this example cppm-rad is the CPPM server name and cppm-sg is the server group name. (host)(config) #aaa authentication-server radius cppm-rad Add this server to a server group: (host)(config) #aaa server-group cppm-sg (host) (Server Group "cppm-sg") #auth-server cppm-rad Add this server group to the default-rap vpn profile: (host)(config) #aaa authentication vpn default-rap (host)(VPN Authentication Profile "default-rap") #server-group cppm-sg
Managing Whitelists on Master and Local Controllers
Every controller using the control plane security feature maintains a campus AP whitelist, a local controller whitelist and a master controller whitelist. The contents of these whitelists vary, depending upon the role of the controller, as shown in the table below.

131 | Control Plane Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 23: Control Plane Security Whitelists

Controller Role

Campus AP Whitelist

On a (standalone) master controller with no local controllers:

The campus AP whitelist contains entries for the secure campus APs associated with that controller.

Master Controller Local Controller

Whitelist

Whitelist

The master controller whitelist is empty, and does not appear in the WebUI.

The local controller whitelist is empty, and does not appear in the WebUI.

On a master controller with local controllers:

The campus AP whitelist contains an entry for every secure campus AP on the network, regardless of the controller to which it is connected.

The master controller whitelist is empty, and does not appear in the WebUI.

The local controller whitelist contains an entry for each associated local controller.

On a local controller:

The campus AP whitelist contains an entry for every secure campus AP on the network, regardless of the controller to which it is connected.

The master controller whitelist contains the MAC and the IP addresses of the master controller.

The local controller whitelist is empty, and does not appear in the WebUI.

Figure 6 Local Controller Whitelist on a Master Controller

If your deployment includes both master and local controllers, then the campus AP whitelist on every controller contains an entry for every secure AP on the network, regardless of the controller to which it is connected. The master controller also maintains a whitelist of local controllers using control plane security. When you change a campus AP whitelist on any controller, that controller contacts the other connected controllers to notify them of the change.
The master controller whitelist on each local controller contains the IP and MAC addresses of its master controller. If your network has a redundant master controller, then this whitelist contains more than one entry. You rarely need to delete the master controller whitelist. Although you can delete an entry from the master controller whitelist, you should do so only if you have removed a master controller from the network.
Campus AP Whitelist Synchronization
The current sequence number in the AP Whitelist Sync Status field shows the number of changes to the campus AP whitelist made on that controller. Each controller compares its campus AP whitelist against whitelists on other controllers every two minutes by default. If a controller detects a difference, it sends its

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Control Plane Security | 132

changes to the other controllers on the network. If all other controllers on the network have successfully received and acknowledged all whitelist changes made on that controller, every entry in the sequencenumber column in the local controller or master controller whitelists has the same value as the sequence number displayed in the AP Whitelist Sync Status field. If a controller in the master or local controller whitelist has a lower sequence number, that controller may still be waiting to complete its update, or receive its update acknowledgment. In the example in Figure 6, the master controller has a current sequence number of 3, and each sequence number in its local controller whitelist also shows a value of 3, indicating that both local controllers have received and acknowledged all three campus AP whitelist changes made on the master controller. For additional information on troubleshooting whitelist synchronization, see Verifying Whitelist Synchronization on page 144.
You can view a controller's current sequence number via the CLI: (host) #show whitelist-db cpsec-seq
Viewing the Master or Local Controller Whitelists
The following sections describe the commands to view and delete entries in a master or local controller whitelist.
In the WebUI
To view the master or local controller whitelists:
1. Access the controller's WebUI, and navigate to Configuration > AP Installation. 2. Select the Whitelist tab.
The master and local controller tables each include the following information:

Table 24: Master and Local Controller Whitelist Information

Field

Description

MAC-Address

On a local controller whitelist: MAC address of the master controller. On a master controller whitelist: MAC address of a local controller.

IP-Address

On a local controller whitelist: IP address of the master controller. On a master controller whitelist: IP address of a local controller.

Sequence Number

The number of times the controller in the whitelist received and acknowledged a campus AP whitelist change from the controller whose WebUI you are currently viewing.
For deployments with both master and local controllers:
l The sequence number on a master controller should be the same as the remote sequence number on the local controller.
l The sequence number on a local controller should be the same as the remote sequence number on the master controller.

Remote Sequence Number

The number of times that the controller whose WebUI you are viewing received and acknowledged a campus AP whitelist change from the controller in the whitelist.
For deployments with both master and local controllers:
l The remote sequence number on a master controller should be the

133 | Control Plane Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 24: Master and Local Controller Whitelist Information

Field

Description

same as the sequence number on the local controller.
l The remote sequence number on a local controller should be the same as the sequence number on the master controller.

Null Update Count

The number of times the controller checked its campus AP whitelist and found nothing to synchronize with the other controller. The controller compares its control plane security whitelist against whitelists on other controllers every two minutes by default. If the null update count reaches five, the controller sends an "empty sync" heartbeat to the remote controller to ensure the sequence numbers on both controllers are the same, then resets the null update count to zero.

In the CLI
To view the master or local controller whitelists via the command-line interface, issue the following commands: (host) #show whitelist-db cpsec-master-switch-list [mac-address <mac-address>]
(host) #show whitelist-db cpsec-local-switch-list [mac-address <mac-address>]

Deleting an Entry from the Master or Local Controller Whitelist
You do not need to delete a master controller from the master controller whitelist during the course of normal operation. However, if you remove a local controller from the network, you should also remove the local controller from the local controller whitelist on the master controller. If the local controller whitelist contains entries for controllers no longer on the network, then a campus AP whitelist entry can be marked for deletion but is not physically deleted, as the controller is waiting for an acknowledgment from another controller no longer on the network. This can increase network traffic and reduce memory resources on the controller.
In the WebUI
To delete an entry from the master or local controller whitelist:
1. Navigate to Configuration > Controller. 2. Select the Control Plane Security tab. 3. To delete an entry from the Local Controller Whitelist: In the Local Switch List For AP Whitelist Sync
section, click the Delete button by each controller entry you want to remove. Or, To delete an entry from the Master Controller Whitelist: In the Master Switch List For AP Whitelist Sync section, click Delete by each controller entry you want to remove. 4. Click Apply.
In the CLI
To delete an entry from the master or local controller whitelist: (host) #whitelist-db cpsec-master-switch-list del mac-address <mac-address> (host) #whitelist-db cpsec-local-switch-list del mac-address <mac-address>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Control Plane Security | 134

Purging the Master or Local Controller Whitelist
There is no need to purge a master controller whitelist during the course of normal operation. If, however, you are removing a controller from the network, you can purge its controller whitelist after it has been disconnected from the network. To clear a local controller whitelist entry on a master controller that is still connected to the network, select that individual whitelist entry and delete it using the delete option.
In the WebUI
To purge a controller whitelist: 1. Navigate to Configuration > Controller. 2. Select the Control Plane Security tab. 3. To clear the Local Controller whitelist: In the Local Switch List For AP Whitelist Sync section, click
Purge. Or, 4. To clear the Master Controller whitelist: In the Master Switch List For AP Whitelist Sync section, click Purge.
In the CLI
To purge a controller whitelist: (host) #whitelist-db cpsec-master-switch-list purge (host) #whitelist-db cpsec-local-switch-list purge
Working in Environments with Multiple Master Controllers
This section describes the configuration steps required in a multiple master controllers network.
Configuring Networks with a Backup Master Controller
If your network includes a redundant backup master controller, you must synchronize the database from the primary master to the backup master at least once after all APs are communicating with their controllers over a secure channel. This ensures that all certificates, IPsec keys, and campus AP whitelist entries are synchronized to the backup controller. You should also synchronize the database any time the campus AP whitelist changes (APs are added or removed to ensure that the backup controller has the latest settings). Master and backup controllers can be synchronized using either of the following methods: l Manual Synchronization: Issue the database synchronize command in enable mode to manually
synchronize databases from your primary controller to the backup controller. l Automatic Synchronization: Schedule automatic database backups using the database synchronize
period command in configuration mode.
If you add a new backup controller to an existing controller, you must add the backup controller as the lower priority controller. If you do not add the backup controller as a lower priority controller, your control plane security keys and certificates may be lost. If you want the new backup controller to become your primary controller, increase the priority of that controller to a primary controller after you have synchronized your data.
Configuring Networks with Clusters of Master Controllers
If your network includes multiple master controllers each with their own hierarchy of APs and local controllers, you can allow APs from one hierarchy to failover to any other hierarchy by defining a cluster of master controllers. Each cluster has one master controller as its cluster root, and all other master controllers as cluster members. The master controller operating as the cluster root creates a self-signed certificate, then certifies its

135 | Control Plane Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

own local controllers and APs. Next, the cluster root sends a certificate to each cluster member, which in turn certifies its own local controllers and APs. Because all controllers and APs in the cluster have the same trust anchor, the APs can switch to any other controller in the cluster and still remain securely connected to the network.
Figure 7 A Cluster of Master Controllers using Control Plane Security

To create a controller cluster, you must first define the root master controller and set an IPsec key or select a certificate for communications between the cluster root and cluster members.
You must use the command-line interface to configure certificate authentication for cluster members. The WebUI supports cluster authentication using IPsec keys only. If your master and local controllers use a pre-shared key for authentication, they create the IPsec tunnel using IKEv1. If your master and local controllers use certificates for authentication, the IPsec tunnel is created using IKEv2.
Creating a Cluster Root
Use the WebUI to identify a controller as a cluster root, and use an IPsec key to secure communication between the cluster root and cluster members. Use the command-line interface to create a cluster root using an IPsec key, factory-installed certificate, or custom certificate.
In the WebUI
To create a cluster root:
1. Access the WebUI of the controller you want to identify as the cluster root, and navigate to Configuration > Controller.
2. Click the Cluster Setting tab. 3. For the cluster role, select Root. 4. In the Cluster Member IPsec Keys section, enter the controller IP address of a member controller in the
cluster. If you want to use a single key for all member controllers, use the IP address 0.0.0.0. 5. In the IPsec Key and Retype IPsec Key fields, enter the IPsec key for communication between the
specified member controller and the cluster root. 6. Click Add. 7. Optional: repeat steps 4-6 to add another member controller to the cluster. 8. Click Apply.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Control Plane Security | 136

In the CLI
To create a cluster root, access the command-line interface of the controller you want to identify as the root of the controller cluster, then issue one of the following commands:
l To authenticate cluster members using a custom certificate: (host)(config) #cluster-member-custom-cert member-mac <mac> ca-cert <ca> server-cert <cert> suite-b <gcm-128|gcm-256>]
l To authenticate cluster members using a factory-installed certificate: (host)(config) #cluster-member-factory-cert member-mac <mac>
l To authenticate cluster members using an IPsec key: (host)(config) #cluster-member-ip <ip-address> ipsec <key>
The <ip-address> parameter in this command is the IP address of a member controller in the cluster, and the <key> parameter in each command is the IPsec key for communication between the specified member controller and the cluster root. Use the IP address 0.0.0.0 in this command to set a single IPsec key for all member controllers, or repeat this command as desired to define a different IPsec key for each cluster member.
Creating a Cluster Member
Once you have identified the cluster root, you must then identify the member controllers in the cluster.
Use the WebUI to identify a controller as a cluster member, and use an IPsec key to secure communication between the cluster member and the cluster root. Use the command-line interface to create a cluster member and secure communications between that member and the cluster root using an IPsec key, factory-installed certificate, or custom certificate.
In the WebUI
To create a cluster member:
1. Access the WebUI of the cluster member controller, and navigate to Configuration > Controller. 2. Click the Cluster Setting tab. 3. For the cluster role, select Member. 4. In the Controller IP Address field, enter the IP address of the root controller in the cluster. 5. In the IPsec Key and Retype IPsec Key fields, enter the IPsec key for communication between the
specified member controller and the cluster root. This parameter must be have the same value as the key defined for the cluster member in Creating a Cluster Root on page 136. 6. Click Add. 7. Click Apply.
In the CLI
To create a cluster root via the CLI, access each of the member master controllers and define the IPsec key or certificate for communication between that controller and the cluster root. (host)(config) #cluster-root-ip <ip-address>
ipsec <key> ipsec-custom-cert root-mac-1 <root-mac-address-1> [master-mac2 <mac2>] ca-cert <ca> servercert <cert> [suite-b <gcm-128 | gcm-256>] ipsec-factory-cert root-mac-1 <root-mac-address-1> root-mac-2 <root-mac-address-2>
In this command the <ip-address> parameter is the IP address of the root master controller in the cluster. If you are using an IPsec key, the <key> parameter in this command must be have the same value as the key defined for the cluster member via the cluster-member-ip command.
Viewing Controller Cluster Setting
You can view the controller cluster configuration using the WebUI or CLI.

137 | Control Plane Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the WebUI To view the current cluster configuration: 1. Navigate to Configuration > Controller. 2. Click the Cluster Setting tab.
l If you are viewing the WebUI of a cluster root, the output of this command displays the IP address of the VLAN on the cluster member used to connect to the cluster root.
l If you are viewing the WebUI of a cluster member, the output of this command displays the IP address of the VLAN on the cluster root used to connect to the cluster member.
In the CLI To view your current cluster configuration, issue the CLI commands described in Table 25.

Table 25: CLI Commands to Display Cluster Settings

Command

Description

show cluster-switches

When you issue this command from the cluster root, the output of this command displays the IP address of the VLAN the cluster member uses to connect to the cluster root.
If you issue this command from a cluster member, the output of this command displays the IP address of the VLAN the cluster root uses to connect to the cluster member.

show cluster-config

When you issue this command from the cluster root, the output of this command shows the cluster role of the controller, and the IP address of each active member controller in the cluster.
When you issue this command from a cluster member, the output of this command shows the cluster role of the controller, and the IP address of the cluster root.

Replacing a Controller on a Multi-Controller Network
The procedure to replace a controller within a multi-controller network varies, depending upon the role of that controller, whether the network has a single master controller or a cluster of master controllers, and whether or not the controller has a backup.
The following sections describe the steps to replace an existing controller. To add a new local controller to a network, or to permanently remove a local controller without replacing it, see Viewing the Master or Local Controller Whitelists on page 133.
Replacing Controllers in a Single Master Network
Use the procedures in this section to replace a master or local controller in a network environment with a single master controller.
Replacing a Local Controller
Use the following procedure to replace a local controller in a single-master network: 1. Disconnect the local controller from the network. 2. If you plan on moving the local controller to another location on the network, purge the campus AP
whitelist on the controller.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Control Plane Security | 138

Access the command-line interface on the old local controller and issue the whitelist-db cpsec purge command. or, Access the local controller WebUI, navigate to Configuration > AP Installation > Campus AP Whitelist and click Purge. 3. Once you purge the campus AP whitelist, you must inform the master controller that the local controller is no longer available using one of these two methods:
This step is very important; unused local controller entries in the local controller whitelist can significantly increase network traffic and reduce controller memory resources.
l Access the command-line interface on the master controller, and issue the whitelist-db cpsec-localswitch-list del mac-address <local--mac> command.
l Access the master controller WebUI, navigate to Configuration > Controller > Control Plane Security, select the entry for the local controller you want to delete from the local controller whitelist, and click Delete.
4. Install the new local controller, but do not connect it to the network yet. If the controller has been previously installed on the network, you must ensure that the new local controller has a clean whitelist.
5. Purge the local controller whitelist using one of the following two methods: l Access the command-line interface on the new local controller and issue the whitelist-db cpsec purge command. l Access the local controller WebUI, navigate to Configuration > AP Installation > Campus AP Whitelist and click Purge.
6. Now connect the new local controller to the network. It is very important that the local controller be able to contact the master controller the first time it connects to the network, because the master controller certifies the local controller's control plane security certificate the first time the local controller contacts its master.
7. Once the local controller has a valid control plane security certificate and configuration, the local controller receives the campus AP whitelist from the master controller and starts certifying approved APs.
8. APs associated with the new local controller reboots and creates new IPsec tunnels to their controller using the new certificate keys.
Replacing a Master Controller with No Backup
Use the following procedure to replace a master controller that does not have a backup controller:
1. Remove the old master controller from the network. 2. Install and configure the new master controller, then connect the new master to the network. The new
master controller generates a new certificate when it first becomes active. 3. If the new master controller has a different IP address than the old master controller, change the master IP
address on the local controllers to reflect the address of the new master. 4. Reboot each local controller to ensure the local controllers obtain their certificate from the new master.
Each local controller begins using a new certificate signed by the master controller. 5. APs are now no longer able to securely communicate with the controller using their current key, and must
obtain a new certificate. Access the campus AP whitelist on any local controller, and change all APs in a "certified" state to an "approved" state. The new master controller sends the approved APs new certificates. The APs reboot and create new IPsec tunnels to their controller using the new certificate key. If the master controller does not have any local controllers, you must recreate the campus AP whitelist by turning on automatic certificate provisioning or manually reentering the campus AP whitelist entries.

139 | Control Plane Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Replacing a Redundant Master Controller
The control plane security feature requires you to synchronize databases from the primary master controller to the backup master controller at least once after the network is up and running. This ensures that all certificates, keys, and whitelist entries are synchronized to the backup controller. Because the AP whitelist may change periodically, you should regularly synchronize these settings to the backup controller. For details, see Configuring Networks with a Backup Master Controller on page 135.
When you install a new backup master controller, you must add it as a lower priority controller than the existing primary controller. After you install the backup controller on the network, synchronize the database from the existing primary controller to the new backup controller to ensure that all certificates, keys, and whitelist entries required for control plane security are added to the new backup controller configuration. If you want the new controller to act as the primary controller, you can increase that controller's priority after the settings have been synchronized.
Replacing Controllers in a Multi-Master Network
Use the following procedures to replace a master or local controller in a network environment with a multiple master controllers.
Replacing a Local Controller in a Multi-Master Network
The procedure to replace a local controller in a network with multiple master controllers is the same as the procedure to replace a local controller in a single-master network. To replace a local controller in a multi-master network, follow the procedure described in Replacing a Local Controller on page 138
Replacing a Cluster Member Controller with no Backup
The control plane security feature allows APs to fail over from one controller to another within a cluster. Therefore, cluster members or their local controllers may have associated APs that were first certified under some other cluster member (or the cluster root). If you permanently remove a cluster member whose APs were all originally certified under the cluster member being removed, its associated APs do not need to reboot in order to connect to a different controller. If, however, you remove a cluster member whose associated APs were originally certified under a different cluster member, those APs need to reboot and be re-certified before they can connect to a different controller. If the cluster member you are removing has local controllers, the local controllers also reboot so they can be updated with new certificates, then pass the trust update to their terminating APs.
To replace a cluster member that does not have a backup controller:
1. On the cluster master to be removed, clear the cluster root IP address by accessing the command-line interface and issuing the no cluster-root-ip <cluster-root-ip> ipsec <clusterkey> command.
2. Remove the cluster member from the network. 3. If the cluster master you removed has any associated APs, you must reboot those APs so they receive an
updated certificate. 4. If the cluster member you removed has any associated local controllers, reboot those local controllers so
they receive a new certificate and then pass that trust update to their APs. 5. Remove the cluster master from the cluster root's master controller list by accessing the command-line
interface on the cluster root and issuing the whitelist-db cpsec-master-switch-list del mac-address <cluster-master-mac> command.
This step is very important. Unused local controller entries in the local controller whitelist can significantly increase network traffic and reduce controller memory resources.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Control Plane Security | 140

6. Remove the old cluster member from the network. Remember, that controller still has campus AP whitelist entries from the entire cluster. You may want to delete or revoke unwanted entries from the campus AP whitelist.
Now, you must install the new cluster member controller according to the procedure described in Creating a Cluster Member on page 137. The new cluster member obtains a certificate from the cluster root when it first becomes active.
7. If the new cluster member has any associated APs, reboot those APs so they obtain a trust update. 8. If the new cluster member has any local controllers, reboot the local controllers associated with the new
cluster member. The local controllers obtain a new certificate signed by the cluster member, and then pass that trust update to their associated APs.
Replacing a Redundant Cluster Member Controller
The control plane security feature requires you to synchronize databases from the primary controller to the backup controller at least once after the network is up and running. This ensures that all certificates, keys, and whitelist entries are synchronized to the backup controller. Because the AP whitelist may change periodically, you should regularly synchronize these settings to the backup controller. For details, see Configuring Networks with a Backup Master Controller on page 135.
When you install a new backup cluster member, you must add it as a lower priority controller than the existing primary controller. After you install the backup cluster member on the network, resynchronize the database from the existing primary controller to the new backup controller to ensure that all certificates, keys, and whitelist entries required for control plane security are added to the new backup controller configuration. If you want the new controller to act as the primary controller, you can increase that controller's priority after the settings have been resynchronized.
Replacing a Cluster Root Controller with no Backup Controller
If you replace a cluster root controller that does not have a backup controller, the new cluster root controller creates its own self-signed certificate. You then need to reboot each controller in the hierarchy in a specific order to certify all APs with that new certificate:
1. Remove the old cluster root from the network. 2. Install and configure the new cluster root. 3. Connect the new cluster root to the network so it can access cluster masters and local controllers. 4. If necessary, reconfigure the cluster masters and local controllers with their new cluster root IP and master
IP addresses. 5. Reboot every cluster member controller. The cluster member begins using a new certificate signed by the
cluster root. 6. Reboot every local controller. Each local controller begins using a new certificate signed by the cluster
member. 7. Because the cluster root is new, it does not have a configured campus AP whitelist. Access the campus AP
whitelist on any local controller or cluster master, and change all APs in a "certified" state to an "approved" state. The APs get re-certified, reboot, and create new IPsec tunnels to their controller using the new certificate key.
If a cluster root controller does not have any cluster master or local controllers, you must recreate the campus AP whitelist on the cluster root by turning on automatic certificate provisioning or manually reentering the campus AP whitelist entries.

141 | Control Plane Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Replacing a Redundant Cluster Root Controller
Best practices is to use a backup controller with your cluster root controller. If your cluster root has a backup controller, you can replace the backup cluster root without having to reboot all cluster master and local controllers, minimizing network disruptions.
The control plane security feature requires you to synchronize databases from the primary controller to the backup controller at least once after the network is up at running. This ensures that all certificates, keys, and whitelist entries are synchronized to the backup controller. Because the AP whitelist may change periodically, you should regularly synchronize these settings to the backup controller. For details, see Configuring Networks with a Backup Master Controller on page 135.
When you install a new backup cluster root, you must add it as a lower priority controller than the existing primary controller. After you install the backup cluster root on the network, resynchronize the database from the existing primary controller to the new backup controller to ensure that all certificates, keys, and whitelist entries required for control plane security are added to the new backup controller configuration. If you want the new controller to act as the primary controller, you can increase that controller's priority after the settings have been resynchronized.
Configuring Control Plane Security after Upgrading
When you initially deploy a controller running ArubaOS 6.0 or later, create your initial control plane security configuration using the initial setup wizard. However, if you are upgrading to ArubaOS 6.0 or if you are upgrading from ArubaOS 5.0 but did not yet have control plane security enabled before the upgrade, then you can use the strategies described in Table 26 to enable and configure control plane security feature.
If you upgrade a controller running ArubaOS 5.0.x to ArubaOS 6.0 or later, then the controller's control plane security settings do not change after the upgrade. If control plane security was already enabled, then it remains enabled after the upgrade. If it was not enabled previously, but you want to use the feature after upgrading, then you must manually enable it.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Control Plane Security | 142

Table 26: Control Plane Security Upgrade Strategies

Automatically send Certificates to Campus APs

Manually Certify Campus APs

1. Access the control plane security window and enable both the control plane security feature and the auto certificate provisioning option. Next, specify whether you want all associated campus APs to automatically receive a certificate, or if you want to certify only those APs within a defined range of IP addresses.

1. Identify the campus APs that should receive certificates by entering the campus APs' MAC addresses in the campus AP whitelist.

2. Once all APs have received their certificates, disable auto certificate provisioning to prevent certificates from being issued to any rogue APs that may appear on your network at a later time.

2. If your network includes both master and local controllers, wait a few minutes, then verify that the campus AP whitelist has been propagated to all other controllers on the network. Access the WebUI of the master controller, navigate to Configuration > Controller > Control Plane Security, then verify that the Current Sequence Number field has the same value as theSequence Number entry for each local controller in the local controller whitelist. (For details, see Verifying Whitelist Synchronization on page 144.)

3. If a valid AP did not receive a certificate during the initial certificate distribution, you can manually certify the AP by adding that MAC address of the AP to the campus AP whitelist. You can also use this whitelist to revoke certificates from APs that should not be allowed access to the secure network.

3. Enable the control plane security feature.

If you upgraded your controller from ArubaOS 5.0 or earlier and you want to use this feature for the first time, you must either add all valid APs to the campus AP whitelist, or enable automatic certificate provisioning before you enable the feature. If you do not enable automatic certificate provisioning, only the APs currently approved in the campus AP whitelist are allowed to communicate with the controller over a secure channel. Any APs that do not receive a certificate will not be able to communicate with the controller except to request a certificate.
Troubleshooting Control Plane Security
Identifying Certificate Problems
If an AP has a problem with its certificate, check the state of the AP in the campus AP whitelist. If the AP is in either the certified-hold-factory-cert or certified-hold-switch-cert states, you may need to manually change the status of that AP before it can be certified.
l certified-hold-factory-cert: An AP is put in this state when the controller thinks the AP has been certified with a factory certificate, but the AP requests to be certified again. Because this is not a normal condition, the AP is not approved as a secure AP until you manually change the status of the AP to verify that it is not compromised. If an AP is in this state due to connectivity problems, then the AP recovers and is taken out of this hold state as soon as connectivity is restored.
l certified-hold-switch-cert: An AP is put in this state when the controller thinks the AP has been certified with a controller certificate yet the AP requests to be certified again. Because this is not a normal condition,

143 | Control Plane Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

the AP is not be approved as a secure AP until a network administrator manually changes the status of the AP to verify that it is not compromised. If an AP is in this state due to connectivity problems, then the AP recovers and is taken out of this hold state as soon as connectivity is restored.
Verifying Certificates
If you are unable to configure the control plane security feature on W-600 Series, W-6000M3, or W-3000 Series controllers, verify that its Trusted Platform Module (TPM) and factory-installed certificates are present and valid by accessing the controller's command-line interface and issuing the show tpm cert-info command. If the controller has a valid certificate, the output of the command appears similar to the output in the example below.
(host) #show tpm cert-info ===================================== TPM manufacturing factory certificate ===================================== subject= /CN=BA0003137::00:1a:1e:00:89:b8 issuer= /DC=com/DC=arubanetworks/DC=ca/CN=DEVICE-CA1 serial=2E1DF0D10000004C8EE7 notBefore=Aug 6 22:50:04 2013 GMT notAfter=Sep 14 03:21:14 2032 GMT ===================================== Generated Factory certificate ===================================== subject= /CN=BA0003137::00:1a:1e:00:89:b8/L=SW issuer= /CN=BA0003137::00:1a:1e:00:89:b8 serial=2E1DF0D10000004C8EE7 notBefore=Aug 6 22:50:04 2013 GMT notAfter=Sep 14 03:21:14 2032 GMT
If the controller displays the following output, it may have a corrupted or missing TPM and factory certificates. Contact Dell support.
(host) #show tpm cert-info Cannot get TPM and Factory Certificate Info.
Disabling Control Plane Security
If you disable control plane security on a standalone or local controller, all APs connected to that controller reboot then reconnect to the controller over a clear channel.
If your disable control plane security on a master controller, APs directly connected to the master controller reboot then reconnect to the master controller over a clear channel. However, its local controllers continue to communicate with their APs over a secure channel until you save your configuration on the master controller. Once you save the configuration, the changes are pushed down to the local controllers. At that point, any APs connected to the local controllers also reboot and reconnect over a secure channel.
Verifying Whitelist Synchronization
To verify that a network of master and local controllers are correctly sharing their campus AP whitelists, check the sequence numbers on the master and local controller whitelists.
l The sequence number value on a master controller should be the same as the remote sequence number on the local controller.
l The sequence number value on a local controller should be the same as the remote sequence number on the master controller.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Control Plane Security | 144

Figure 8 Sequence numbers on Master and Local Controllers

Rogue APs
If you enable auto certificate provisioning enabled with the Auto Cert Allow All option, any AP that appears on the network receives a certificate. If you notice unwanted or rogue APs connecting to your controller via an IPsec tunnel, verify that automatic certificate provisioning has been disabled, then manually remove the unwanted APs by deleting their entries from the campus AP whitelist.

145 | Control Plane Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Chapter 3 Software Licenses

ArubaOS base features include sophisticated authentication and encryption; protection against wireless rogue APs; seamless mobility with fast roaming; origination and termination of IPsec/L2TP/PPTP tunnels between controllers, clients, and other VPN gateways; adaptive RF management and analysis tools; centralized configuration; and location tracking.
Optional add-on licenses provide advanced features such as Wireless Intrusion Protection and Policy Enforcement Firewall. Evaluation licenses are available for some of these features.
ArubaOS licenses are detailed in the following sections:
l Understanding License Terminology on page 146 l Working with Licenses on page 147 l Centralized Licensing in a Multi-Controller Network on page 148 l Using Licenses on page 158 l License Installation Best Practices and Exceptions on page 160 l Installing a License on page 161 l Deleting a License on page 162 l Moving Licenses on page 163 l Resetting the Controller on page 163
Understanding License Terminology
For clarity, the following terminology will be used throughout this chapter.
l Bundle: a cost-effective way to purchase functionality that supports a controller and x-number of APs. l Certificate ID: the identification number attached to the Software License Certificate. The Certificate ID is
used in conjunction with the controller's serial number to create the License Key. l Evaluation License: a license that allows you to evaluate a feature set (or module) for a maximum of 90
days. The evaluation licenses are uploaded in 30-day increments. Only modules that offer new and unique functionality support Evaluation Licenses. l License Certificate: a certificate (soft copy) that contains license information including: n License Description n Quantity n Part Number/Order Number n Certificate ID l License Database: the licenses installed on your controller l License Key: the key generated from the controller serial number l Permanent License: the opposite of an evaluation license. This license permanently installs the specific features represented by the license. l Upgrade License: a license that adds AP capacity to your controller. Note that Upgrade Licenses do not support an evaluation license.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Software Licenses | 146

Working with Licenses
Each license refers to a specific functionality (or module) that supports unique features.
The licenses are:
l Base OS: base operating functions including VPN and VIA clients. l AP Capacity: capacity license for RAP indoor and outdoor Mesh APs. Campus, Remote, or Mesh APs can
terminate on the controller without the need for a separate license. l Advanced Cryptography (ACR): this license is required for the Suite B Cryptography in IPsec and 802.11
modes. License enforcement behavior controls the total number of concurrent connections (IPsec or 802.11) using Suite B Cryptography.The xSec license features are bundled with this license. l Policy Enforcement Firewall Virtual Private Network (PEFV): enables Policy Enforcement Firewall for VIA clients. This is a controller license. l Policy Enforcement Firewall Next Generation (PEFNG): Wired, WLAN Licensed per AP numbers including user roles, access rights, Layers 4 through 7 traffic control, per-service prioritization/QoS, authentication/accounting APIs, External Service Interfaces (ESI), Voice and Video. This is an AP count license. l Public Access: reserved for future use. l RFProtect: Wireless Intrusion Protection (WIPS) and Spectrum Analysis. This is an AP count license. l xSec (Extreme Security) for Federal: Layer 2 VPN for wired or wireless using FIPS-approved algorithms. l Internal Test Functions: for internal use only.
The license categories are:
l Permanent license: this type of license permanently enables the desired software module on a specific Dell controller. You obtain permanent licenses through the sales order process only. Permanent software license keys are sent to you via email.
l Evaluation license: this type of license allows you to evaluate the unrestricted functionality of a software module on a specific controller for 90 days (in three 30-day increments). An expired evaluation license will remain in the license database until the controller is reset using the command write erase all where all license keys are removed. An expired evaluation license has no impact on the normal operation of the controller, but it is kept in the license database to prevent abuse.
When you apply license keys on a controller, abnormal tampering of the device's system clock (setting the system clock back) results in the disabling of software licensed modules and their supported features. This can affect network services.
To determine your remaining time on an evaluation license, a banner is displayed when you log in through the command line: NOTICE NOTICE -- This switch has active licenses that will expire in 29 days NOTICE NOTICE -- See 'show license' for details. NOTICE From the WebUI, an "Alert" appears with information regarding the evaluation license status (see Figure 9).

147 | Software Licenses

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 9 Alert Flag

At the end of the 90-day period, you must apply for a permanent license to re-enable the features permanently on the controller. Evaluation software license keys are only available in electronic form and are emailed to you. When an evaluation period expires: n The controller automatically backs up the startup configuration and reboots itself at midnight (according
to the system clock). n All permanent licenses are unaffected. The expired evaluation licensed feature is no longer available and
is displayed as Expired in the WebUI. l Upgrade license--This license expands AP capacity. There are no Evaluation licenses available for Upgrade
licenses.
Centralized Licensing in a Multi-Controller Network
In order to configure each feature on the local controller, the master controller(s) must be licensed for each feature configured on the local controllers. Centralized licensing simplifies licensing management by distributing licenses installed on one controller to other controllers on the network. One controller acts as a centralized license database for all other controllers connected to it, allowing all controllers to share a pool of unused licenses. The primary and backup licensing servers can share a single set of licenses, eliminating the need for a redundant license set on the backup server. Local licensing client controllers maintain information sent from the licensing server, even if the licensing client controller and the licensing server controller can no longer communicate. If an AP fails over from one client controller to another, the AP will be allowed to come up even if there aren't sufficient licenses present on the backup controller. the APs continue to stay active until they reboot. However, if there are not sufficient available licenses to bring up an AP after it reboots, that AP will not become active.
You can use the centralized licensing feature in a master-local topology with a redundant backup master, or in a multi-master network where all the masters can communicate with each other (for example, if they are all connected to a single W-AirWave server). In the master-local topology, the master controller acts as the primary licensing server, and the redundant backup master acts as the backup licensing server. In a multi-master network, one controller must be designated as a primary server, and a second controller must be configured as a backup licensing server.
Centralized licensing can distribute the following license types:
l AP l PEFNG l RFProtect l xSec l ACR
This section includes the following topics:
l Primary and Backup Licensing Servers l Communication between the License Server and License Clients

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Software Licenses | 148

l Replacing a Controller l Failover Behaviors l Configuring Centralized Licensing
Primary and Backup Licensing Servers
Centralized licensing allows the primary and backup licensing server controllers to share a single set of licenses. If you do not enable this feature, the master and backup master controller each require separate, identical license sets. The two controllers acting as primary and backup license servers must use the same version of ArubaOS and must be connected on the same broadcast domain using the Virtual Router Redundancy Protocol (VRRP). Other client controllers on the network connect to the licensing server using the VRRP virtual IP address configured for that set of redundant servers. The primary licensing server uses the configured virtual IP address by default. However, if the controller acting as the primary licensing server becomes unavailable, the secondary licensing server will take ownership of the virtual IP address, allowing licensing clients to retain seamless connectivity to a licensing server.
Only one backup licensing server can be defined for each primary server.
The example below shows a primary and backup license server connected using VRRP. Licenses installed on either the primary or backup server are shared between that pair of servers. If the primary and backup controllers each had 16 AP licenses, 16 PEFNG licenses, and 16 xSec licenses installed, they would share a combined pool of 32 AP, 32 PEFNG, and 32 xSec licenses. Any license client controllers connected to this pair of redundant servers could also use licenses from this license pool.
Figure 10 Shared Licenses on a Primary and Backup Licensing Server

Communication between the License Server and License Clients
When you enable centralized licensing, information about the licenses already installed on the individual client controllers are sent to the licensing server, where they are added into the server's licensing table. The information in this table is then shared with all client controllers as a pool of available licenses. When a client controller uses a license in the available pool, it communicates this change to the licensing server master controller, which updates the table before synchronizing it with the other clients.

149 | Software Licenses

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Client controllers do not share information about built-in licenses to the licensing server. A controller using the centralized licensing feature will use its built-in licenses before it consumes available licenses from the license pool. As a result, when a client controller sends the licensing server information about the licenses that a client is using, it only reports licenses taken from the licensing pool, and disregards any built-in licenses used. For example, if a controller has a built-in 16-AP license and twenty connected APs, it will disregard the built-in licenses being used and report to the licensing server that it is using only four AP licenses from the license pool.
When centralized licensing is first enabled on the licensing server, its licensing table only contains information about the licenses installed on that server. When the clients contact the server, the licensing server adds the client licenses to the licensing table, then sends the clients information about the total available licenses for each license type. In the following example, the licenses installed on two client controllers are imported into the license table on the license server. The licensing server then shares the total number of available licenses with other controllers on the network.
Figure 11 Licenses Shared by Licensing Clients

When a new AP associates with a licensing client, the client sends updated licensing information to the server. The licensing server then recalculates the available total, and sends the revised license count back to the clients. If a client uses an AP license from the license pool, it also consumes a PEFNG and a RFProtect license from the pool, even if that AP has not enabled any features that would require that license. A controller cannot use more licenses than what is supported by its controller platform, regardless of how many licenses are available in the license pool.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Software Licenses | 150

Figure 12 License Pool Reflecting Used licenses
Supported Topologies
The following table describes the controller topologies supported by this feature.

151 | Software Licenses

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 27: Centralized Licensing Topologies Topology

Example

All controllers are master controllers.
The master and standby licensing servers must be defined.

A single master controller is connected to one or more local controllers.
Only the master controller can be a license server. A local controller can only be license client, not a license server.

A master and standby master are connected to one or more local controllers. The master license server will reside on the master controller, and the standby license server will reside on the standby master controller. Local controllers can only be license clients, not license servers.
Unsupported Topologies
The centralized licensing feature does NOT support topologies where multiple master controllers have one or more attached local controllers.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Software Licenses | 152

Figure 13 Topologies Not Supported by Centralized Licensing

Adding and Deleting Licenses
New licenses can be added to any controller managed by a centralized licensing system, although best practices recommend adding them to the primary licensing server for easier management and tracking of licenses across a wide network. Licenses can only be deleted from the controller on which the license is installed.
You do not need to reboot a controller after adding or deleting a license, regardless of whether you enable centralized licensing. If you delete a license from a licensing client or server and there are no longer enough licenses to support the number of active APs on the network, the APs remain active until they reboot. If there are not enough available licenses to bring up an AP after it reboots, that AP will not become active.
Centralized licensing supports evaluation licenses. When a client controller has an evaluation license installed, those license limits will be sent to the licensing server and added to the license pool as long as the evaluation period is active. When the evaluation period expires, the client with the expired license sends its revised limits to the license server. The licensing server removes the evaluation licenses from its license table, then sends updated license pool information to other clients on the network.
Replacing a Controller
If you need to replace the controller acting as a license server, the keys installed on the previous license server must be regenerated and added to the new license server. If you need to replace a controller acting as license client, you must regenerate the license keys installed on the client and reinstall them on the replacement client or the licensing server.
Failover Behaviors
If the primary licensing server fails, the controller acting as a backup license server will retain the shared license limits until the backup server reboots. If both the primary and the backup license servers fail, or if the backup controller reboots before the primary controller comes back up, License clients will retain the license limits sent to them by the licensing server for 30 days.

153 | Software Licenses

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Although a client controller retains its licensing information for 30 days after it loses contact with the licensing server, if the client reboots at any time during this 30-day window, the window will restart, and the client will retain its information for another 30 days.
APs that use centralized licensing in conjunction with a ArubaOS high availability feature behave differently than APs that do not use a high availability solution. APs using VRRP redundancy, a backup LMS, or the ArubaOS fast failover feature can quickly fail over to a backup controller, even if that backup controller does not have any AP licenses at the time of the failover. However, if that AP reboots, it will not obtain its licenses until the backup controller receives the required licenses from the licensing master.
Client is Unreachable
The centralized licensing feature sends keepalive heartbeats between the license server and the licensing client controllers every 30 seconds. If the licensing server fails to receive three consecutive heartbeats from a client, it assumes that the licensing client is down, and that any APs associated with that client are also down or have failed over to another controller . Therefore, the licensing server adds any licenses used by that client back into the available pool of licenses. If the license server fails to contact a license client for 30 consecutive days, any licenses individually installed on that client will be removed from the server's license database.
The WebUI of the licensing client and the licensing server both display a warning message when a licensing client and licensing server are unable to communicate.
Server is Unreachable
If a licensing client does not receive three consecutive heartbeats from the server, it assumes that the server is down, and that any APs directly associated to the server are also down or have failed over to another controller. The client then adds any licenses used by the licensing server into to the pool of available licenses on that client. When a license client is unable to reach a license server for 30 consecutive days, it removes any shared licenses pushed to it from the licensing server, and reverts to its installed licenses. If the 30-day window has passed and the controller does not have enough installed licenses for all of its associated APs, the controller will nonetheless continue to support each AP. However, when an AP reboots and its controller does not have enough licenses, that AP will not come up.
For more information on replacing a controller using the centralized licensing feature, see Replacing a Controller on page 114
Configuring Centralized Licensing
The steps to configure centralized licensing on your network vary, depending upon whether you are enabling this feature in a network with a master-local controller topology, or in a network where all controllers are configured as masters. Before you enable this feature, you must ensure that the controllers are able to properly communicate with the licensing master. Once you have identified your deployment type, follow the steps in the appropriate section below.
Pre-configuration Setup in an All-Master Deployment
Follow the steps described below to configure the centralized licensing feature in a network with all master controllers:
1. Ensure that the controllers using this feature are associated with the same W-AirWave server. 2. Identify a controller you want to designate as the primary licensing server. If that controller already has a
redundant backup controller, that backup controller will automatically become the backup license server.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Software Licenses | 154

3. (Optional) If your primary licensing server does not yet have a dedicated, redundant backup controller and you want to use a backup server with the centralized licensing feature, you must identify a second controller to use as the backup licensing server, and create a virtual router on the primary licensing server.
4. (Optional) Establish secure IPsec tunnels between the primary licensing server controller and the licensing client controllers by enabling control plane security on that cluster of master controllers or by creating siteto-site VPN tunnels between the licensing server and client controllers. This step is not required, but if you do not create secure tunnels between the controllers, the controllers will exchange clear, unencrypted licensing information. This step is not required for a master-local topology.
Preconfiguration Setup in a Master/Local Topology
The master controller in a master-local topology is the primary licensing server by default. If this master controller already has a redundant standby master, that redundant master will automatically act as the backup licensing server with no additional configuration. If your primary licensing server does not yet have a redundant standby controller and you want to use a backup server with the centralized licensing feature, you must identify a second controller to designate as the backup licensing server and define a virtual router on the primary licensing server.
Enabling Centralized Licensing
The following steps describe the procedure to enable centralized licensing on both the licensing master and the licensing clients.
Using the WebUI
1. Access the WebUI of the primary licensing master controller, navigate to Configuration > Controller and select the Centralized Licenses tab.
2. Select Enable Centralized Licensing. 3. (Optional) If the licensing server already has a dedicated redundant standby controller, that standby
controller will automatically become the backup license server. If the primary licensing server in your deployment does not have a dedicated, redundant master controller, but you want to define a backup server for the licensing feature, follow steps a-c below: a. In the VRRP ID field, enter the Virtual Router ID for the Virtual Router you configured in the
Preconfiguration Setup task in the section above. b. In the Peer's IP address field, enter the IP address of the backup licensing server. c. In the License Server IP field, enter the virtual IP address for the Virtual Router used for license server
redundancy. 4. Click Apply.
If you are deploying centralized licensing on a cluster of master controllers, you must define the IP address that the licensing clients in the cluster use to access the licensing server.
5. Access the WebUI of a licensing client, navigate to Configuration > Controller and select the Centralized Licenses tab.
6. Select Enable Centralized Licensing. 7. In the License Server IP field, enter the IP address the client will use to connect to the licensing server. If you
have defined a backup licensing server using a virtual router ID, enter the IP address of that virtual router. 8. Click Apply. 9. Repeat steps 5-8 on each licensing client in the cluster.
Using the CLI
Access the command-line interface of the licensing server, and issue the following commands in config mode:
(host)(config) #license profile

155 | Software Licenses

Dell Networking W-Series ArubaOS 6.4.x | User Guide

(host)(License provisioning profile) #centralized-licensing-enable
If the licensing server already has a dedicated redundant standby controller, that standby controller will automatically become the backup license server. If the primary licensing server in your deployment does not have a redundant master controller but you want to define a backup server for the licensing feature, issue the following commands on the licensing server: (host)(License provisioning profile) #License server-redundancy (host)(License provisioning profile) #License-vrrp <vrId> (host)(License provisioning profile) #Peer-ip-address <ip>
If you are deploying centralized licensing on a cluster of master controllers, access the command-line interface of a licensing client controller, and issue the following commands in config mode: (host) (config) #license profile (host) (License provisioning profile) #centralized-licensing-enable (host) (License provisioning profile) #license server-ip <ip>
If a controller is designated as standby license server, it does not have the license-server-ip value configured.
Monitoring and Managing Centralized Licenses
A centralized licensing server displays a wide variety of licensing data that you can use to monitor licenses and license usage. The tables described below are available on the Network > Controller > Centralized License Management > Information page of the Licensing server WebUI.
License server Table
This table displays information about the different types of licenses in the license table, and how many total licenses of each type are available and used. This table includes the following information:

Table 28: License Server Table Data

Column

Description

Service Type

Type of license on the licensing server.

Aggregate Licenses

Number of licenses in the licensing table on the licensing server.

Used Licenses

Total number of licenses of each license type reported as used by the licensing clients or licensing server.

Remaining Licenses

Total number of remaining licenses available in the licensing table.

License Client Table
This table displays centralized license limits applied to each licensing client. This table includes the following information:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Software Licenses | 156

Table 29: License Client Table Data

Column

Description

Service Type

Type of license on the licensing client.

System Limit Server Licenses
Used Licenses

The maximum number of licenses supported by the controller platform.
Number of licenses sent from the licensing server. NOTE: This number is limited by the total license capacity of the controller platform. A controller cannot use more licenses than is supported by that controller platform, even if additional license are available.
Total number of licenses of each license type used by the licensing client controller.

Contributed Licenses

Total number of licenses of each license type contributed by the licensing client controller.

Remaining Licenses

Total number of remaining licensing available on this controller. This number is also limited by the total license capacity of the controller platform.

License Client(s) Usage Table
This table displays information about the different types of licenses in the license table, and how many total licenses of each type are available and used.

Table 30: License Clients(s) Usage Table Data

Column

Description

Hostname

Name of the licensing client controller.

IP Address

IP address of the licensing client controller.

AP

Total number of AP licenses used by a licensing client associated with this

controller.

PEF

Total number of Policy Enforcement Firewall (PEF) licenses used by a

licensing client associated with this controller.

RF Protect

Total number of RFProtect licenses used by a licensing client associated with this controller.

xSec Module ACR Last update (secs. ago)

Total number of Extreme Security (xSec) licenses used by a licensing client associated with this controller.
Total number of advanced Cryptography (ACR) licenses used by a licensing client associated with this controller.
Time, in seconds, that has elapsed since the licensing client received a heartbeat response.

157 | Software Licenses

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Aggregate License Table
This command is issued from the command-line interface of the centralized licensing server controller to view license limits sent by licensing clients.

Table 31: Aggregate License Table Data

Column

Description

Hostname

Name of the licensing client controller.

IP Address

IP address of the licensing client controller.

AP

Total number of AP licenses sent from licensing clients associated with this

controller.

PEF

Total number of Policy Enforcement Firewall (PEF) licenses sent from

licensing clients associated with this controller.

RF Protect

Total number of RFProtect licenses sent from licensing clients associated with this controller.

xSec Module ACR

Total number of Extreme Security (xSec) licenses sent from licensing clients associated with this controller.
Total number of advanced Cryptography (ACR) licenses sent from licensing clients associated with this controller.

License Heartbeat Table
This table displays the license heartbeat statistics between the license server and the license client.

Table 32: License Heartbeat Table Data

Column

Description

IP address

IP address of the licensing client.

HB Req HB Resp

Heartbeat requests sent from the licensing client. Heartbeat responses received from the license server.

Total Missed

Total number of heartbeats that were not received by the licensing client.

Last Update

Number of seconds elapsed since the licensing client last sent a heartbeat request.

Using Licenses
Licenses are platform independent and can be installed on any controller. Installation of the feature license unlocks that feature's functionality for the maximum capacity of the controller.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Software Licenses | 158

License limits are enforced until you reach the controller limit (see Table 34).

Table 33 lists how licenses are consumed on the Controllers.

Table 33: Usage per License

License

Basis

PEFNG

AP

xSec

Session

RFprotect

AP

AP

AP

ACR

Session

What Consumes One License One operational AP
One active client termination
One operational AP
One operational LAN-connected or mesh AP that is advertising at least one BSSID (virtualAP) or RAP
One active client termination

The controller licenses are variable-capacity (see Table 34).
In Table 34, the Remote AP count is equal to the total AP count for all the controllers. The Campus AP count is 1/4 of the total AP count except for the W-6000M3 which is one half the AP count.

Table 34: Controller AP Capacity

Controller

Total AP Count Campus APs

W-7210

512

512

W-7220

1024

1024

W-7240

2048

2048

W-6000M3

1024

512

W-3200

128

32

W-3400

256

64

W-3600

512

128

W-620

8

8

W-650

16

16

Remote APs 512 1024 2048 1024 128 256 512 8 16

159 | Software Licenses

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Understanding License Interaction
Some licenses interact with each other and may require some equality.
l AP/PEFNG and RFProtect must be equal. n All active APs run AP/PEFNG and RFProtect services (if enabled). If they are not equal, the number of active APs are restricted to the minimum AP/PEFNG and RFProtect license count.
It is not possible to designate specific APs for RFProtect/non-RFProtect operations.
n Mesh portals/Mesh points with no virtual APs, do not consume an RFProtect license l If a Mesh node is also configured for client service (for example, it advertises a BSSID ), it consumes one AP
license. l Remote APs consume the same licenses as campus APs. l ACR Interaction
n On a platform that supports 2048 IPsec tunnels, the maximum number of Suite B IPsec tunnels supported is 2048, even if a larger capacity license is installed.
n The ACR license is cumulative. If you want to support 2048 Suite B connections, install two ACR licenses (LIC-ACR-1024).
n An evaluation ACR license is available (EVL-ACR-1024). You can install the ACR evaluation license with a higher capacity than the platform maximum.
n On a platform that supports 2048 IPsec tunnels, with a LIC-ACR-512 installed, only 512 IPsec tunnels can be terminated using Suite B encryption. An additional 1536 IPsec tunnels, using non-Suite B modes (for example, AES-CBC), can still be supported.
n On a platform with LIC-ACR-512 installed, a mixture of IPsec and 802.11i Suite B connections can be supported. The combined number of these sessions may not exceed 512.
n A single client using both 802.11i Suite B and IPsec Suite B will simultaneously consume two ACR licenses.
License Installation Best Practices and Exceptions
l Back up the controller's configuration (backup flash command) and back up the License database (license export filename) before making any changes. (host) #backup flash Please wait while we tar relevant files from flash... Please wait while we compress the tar file... Checking for free space on flash... Copying file to flash... File flashbackup.tar.gz created successfully on flash. Please copy it out of the switch and delete it when done. (host) #license export licensebackup.db Successfully exported 1 licenses from the License Database to licensebackup.db
l Allow for the maximum quantity required at any given time. l When calculating AP licenses, determine the normal AP load of your controller and add a backup load in case
of failure. l A reasonable estimate when calculating user licenses is 20 users per AP. Do not forget to consider
occasional large assemblies or gatherings.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Software Licenses | 160

Installing a License
The Dell licensing system is controller-based. A license key is a unique alphanumerical string generated using the controller's serial number and is valid only for that controller only. Licenses can be pre-installed at the factory so all licensed features are available upon initial setup. You can also install license features yourself.
It is recommended that you obtain a user account on the Dell Software License Management website even if software license keys are preinstalled on your controller.
Enabling a New License on your Controller
The basic steps to installing and enabling a new license feature are listed below, along with references to sections in this document with more detailed information. 1. Obtain a valid Dell software license from your sales account manager or authorized reseller (see Requesting
a Software License in Email on page 161). 2. Locate the system serial number of your controller (see Locating the System Serial Number on page 161). 3. Use your system's serial number to obtain a software license key from the Dell Software License
Management website: licensing.dell-pcw.com (see Obtaining a Software License Key on page 162). 4. Enter the software license key using one of the following procedures:
l Navigate to the Configuration > Network > Controller > System Settings page of the ArubaOS WebUI and select the License tab. Enter the software license key and click Apply (see Applying the Software License Key in the WebUI on page 162).
l Launch the License Wizard from the Configuration tab of the WebUI and click New. Enter the software license key in the space provided (see Applying the Software License Key in the License Wizard on page 162).
l Use the license add command in the CLI.
Requesting a Software License in Email
To obtain either a permanent or a evaluation software license, contact your sales account manager or authorized reseller. The license details are provided via email with an attached text file. Use the text file to cut and paste the licensing information into the WebUI or command line.
Ensure that you have provided your sales person with a valid email address.

The email also includes: l The orderable part number for the license l A description of the software module type and controller for which it is valid l A unique, 32-character alphanumerical string used to access the license management website, and when in
conjunction with the serial number of your controller, generates a unique software license key
Locating the System Serial Number
Each controller has a unique serial number located at the rear of the controller chassis. The W-6000M3 has the serial number on the device itself. You can also find the serial numbers by navigating to the Controller > Inventory page on the WebUI or by executing the show inventory command in the CLI.
To physically inspect the system serial number on a W-6000M3 , you need to remove the device from the controller chassis, which may result in network down time.

161 | Software Licenses

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Obtaining a Software License Key
To obtain a software license key, you must log in to the Dell License Management website. If you are a first time user, you can use the software license certificate ID number to log in and request a new user account. If you already have a user account, log in to the site with your login credentials. Once logged in, you are presented with several options: l Activate a certificate: Activate a new certificate and create the software license key that you will apply to
your controller. l Transfer a certificate: Transfer a software license certificate ID from one controller to another (for
example, transferring licenses to a spare system). l Import preloaded certificates: For controllers with licenses pre-installed at the factory, transfer all
software license certificate IDs used on the sales order to this user account. l List your certificates: View all currently available and active software license certificates for your account.
Creating a Software License Key
To create a software license key, you must log in to the Dell License Management website at: licensing.dell-pcw.com If you are a first time user of the licensing site, you can use the software license certificate ID number to log in and request a new user account. If you already have a user account, log in to the site with your login credentials. 1. Select Activate a Certificate. 2. Enter the certificate ID number and the system serial number of your controller. 3. Review the license agreement and select Yes to accept the agreement. 4. Click Activate it. A copy of the transaction and the software license key is emailed to you at the email
address entered for your user account
The software license key is valid only for the system serial number for which you activated the certificate.

Applying the Software License Key in the WebUI
To enable the software module and functionality, you must apply the software license key to your controller. 1. Log in to your controller's WebUI. 2. Navigate to the Configuration > Network > Controller > System Settings page and select the License
tab. 3. Copy the software license key, from your email, and paste it into the Add New License Key field. 4. Click Add.
Applying the Software License Key in the License Wizard
Log in to your controller's WebUI. 1. Launch the License Wizard from the Configuration tab and click New. 2. The License Wizard helps walk you through the activation process. Click the Help tab within the License
Wizard for additional assistance.

Deleting a License
To remove a license from your system:
Dell Networking W-Series ArubaOS 6.4.x | User Guide

Software Licenses | 162

1. Navigate to the Configuration > Network > Controller > System Settings page and select the License tab.
2. Scroll down to the License Table and locate the license you want to delete. 3. Click Delete at the far right hand side of the license to delete the license.
If a license feature is under an evaluation license, it will not generate a key when the feature is deleted.
Moving Licenses
It may be necessary to move licenses from one controller to another or delete a license for future use. To move licenses, delete the license from the chassis as described in Deleting a License on page 162. Then install the license key on the new controller as described in Applying the Software License Key in the WebUI on page 162.
ArubaOS provides the ability to move a license from one controller to another, for maximum flexibility in managing an organization's network and to minimize an RMA impact. Dell monitors and detects license fraud. Abnormally high volumes of license transfers for the same license certificate to multiple controllers can indicate a breach of the Dell end user software license agreement and will be investigated.
Resetting the Controller
Rebooting or resetting a controller has no effect on either a permanent or evaluation license. Issuing the write erase command on a controller running software licenses does not affect the license key management database on the controller. Issuing the write erase all command resets the controller to factory default and deletes all databases on the controller, including the license key management database. You must reinstall all previously-installed license keys. On both W-7000 and W-7200 Series controllers, you can reset controller using the LCD screen. Issuing the Factory Default option under the Maintenance menu returns the controller to factory default settings. For more information about the LCD menu, see Using the LCD Screen on page 106.

163 | Software Licenses

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Chapter 4 Network Configuration Parameters

The following topics in this chapter describe some basic network configuration on the controller:
l Configuring VLANs on page 164 l Configuring Ports on page 169 l Understanding VLAN Assignments on page 171 l Configuring Static Routes on page 179 l Configuring the Loopback IP Address on page 179 l Configuring the Controller IP Address on page 180 l Configuring GRE Tunnels on page 181 l Jumbo Frame Support on page 196
Configuring VLANs
The controller operates as a layer-2 switch that uses a VLAN as a broadcast domain. As a layer-2 switch, the controller requires an external router to route traffic between VLANs. The controller can also operate as a layer3 switch that can route traffic between VLANs defined on the controller.
You can configure one or more physical ports on the controller to be members of a VLAN. Additionally, each wireless client association constitutes a connection to a virtual port on the controller, with membership in a specified VLAN. You can place all authenticated wireless users into a single VLAN or into different VLANs, depending upon your network. VLANs can remain inside the controller, or they can extend outside the controller through 802.1q VLAN tagging.
You can optionally configure an IP address and netmask for a VLAN on the controller. The IP address is up when at least one physical port in the VLAN is up. The VLAN IP address can be used as a gateway by external devices; packets directed to a VLAN IP address that are not destined for the controller are forwarded according to the controller's IP routing table.
Creating and Updating VLANs
You can create and update a single VLAN or bulk VLANs.
In the WebUI
1. Navigate to the Configuration > Network > VLANs page. 2. Click Add a VLAN to create a new VLAN. (To edit an existing VLAN, click Edit for the VLAN entry.) See
Creating Bulk VLANs In the WebUI on page 165 to create a range of VLANs. 3. In the VLAN ID field, enter a valid VLAN ID. (Valid values are from 1 to 4094, inclusive). 4. To add physical ports to the VLAN, select Port. To associate the VLAN with specific port-channels, select
Port-Channel. 5. (Optional) Click the Wired AAA Profile drop-down list to assign an AAA profile to a VLAN. This wired AAA
profile enables role-based access for wired clients connected to an untrusted VLAN or port on the controller. Note that this profile will only take effect if the VLAN or port on the controller is untrusted. If you do not assign a wired AAA profile to the VLAN, the global wired AAA profile applies to traffic from untrusted wired ports.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Network Configuration Parameters | 164

6. If you selected Port in step 4, select the ports you want to associate with the VLAN from the Port Selection window. or If you selected Port-Channel in step 4, click the Port-Channel ID drop-down list, select the specific channel number you want to associate with the VLAN, then select the ports from the Port Selection window.
7. Click Apply.
In the CLI
Use the following commands: (host)(config) #vlan <id> (host)(config) #interface fastethernet|gigabitethernet <slot>/<module>/<port> (host)(config-if) #switchport access vlan <id>
Creating Bulk VLANs In the WebUI
1. To add multiple VLANs at one time, click Add Bulk VLANs. 2. In the VLAN Range pop-up window, enter a range of VLANs you want to create at once. For example, to
add VLAN IDs numbered 200-300 and 302-350, enter 200-300, 302-350. 3. Click OK. 4. To add physical ports to a VLAN, click Edit next to the VLAN you want to configure and click the port in the
Port Selection section. 5. Click Apply.
In the CLI
Use the following commands: (host)(config) #vlan (host)(config) #vlan range 200-300,302-350
Creating a Named VLAN
You can create, update, and delete a named VLAN. Each named VLAN has a name and needs to have one or more VLANs assigned to it. The following configurations create a named VLAN called mygroup. It has the assignment type Even, and VLAN IDs 2, 4 and 12 are assigned to this named VLAN.
ArubaOS supports maximum of 256 VLANs per named VLAN.
In the WebUI
1. Navigate to Configuration > Network > VLANs. 2. Select the VLAN Pool tab to open the VLAN Pool window. 3. Click Add. 4. In the VLAN Name field, enter a name that identifies this named VLAN. 5. In the Assignment Type field, select Hash or Even from the drop-down list. See Distinguishing Between
Even and Hash Assignment Types on page 166 for information and conditions regarding Hash and Even assignment types.

165 | Network Configuration Parameters

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The Even named VLAN assignment type is only supported in tunnel and decrypt-tunnel modes. It is not supported in split or bridge modes. It is not allowed for named VLANs that are configured directly under a virtual AP (VAP). It must only be used under named VLANs. L2 Mobility is not compatible with the existing implementation of the Even named VLAN assignment type.
6. In the List of VLAN IDs field, enter the VLAN IDs you want to add to this pool. If you know the ID, enter each ID separated by a comma. You can also click the drop-down list to view the IDs, then select a VLAN ID to add it to the pool.
VLAN pooling should not be used with static IP addresses.

7. You must add a VLAN ID to create a named VLAN. 8. When you finish adding all the IDs, click Add. The VLAN name along with assignment type and VLAN IDs
appears on the VLAN Pool window. 9. Click Apply. 10.At the top of the window, click Save Configuration.
Distinguishing Between Even and Hash Assignment Types
The VLAN assignment type determines how the controller handles a VLAN assignment.
The Hash assignment type means that the VLAN assignment is based on the station MAC address. The Even assignment type is based on an even distribution of named VLAN assignments.
The Even named VLAN assignment type maintains a dynamic latest usage level of each VLAN ID in the named VLAN . Therefore, as users age out, the number of available addresses increases. This leads to a more even distribution of addresses.
The Even type is only supported in tunnel and decrypt-tunnel modes. It is not supported in split or bridge modes and it is not allowed for named VLAN that are configured directly under a virtual AP. It can only be used under named VLANs.
If a named VLAN is given an Even assignment and is assigned to user roles, user rules, VSA, or server derivation rules, then while applying VLAN derivation for the client "on run time," the Even assignment is ignored and the Hash assignment is applied with a message displaying this change.
L2 Mobility is not compatible with the existing implementation of the Even named VLAN assignment type.

Updating a Named VLAN
1. On the VLAN Pool window, click Modify next to the VLAN name you want to edit. 2. Modify the assignment type and the list of VLAN IDs. Note that you can not modify the VLAN name. 3. Click Update. 4. Click Apply. 5. At the top of the window, click Save Configuration.
Deleting a Named VLAN
1. On the VLAN Pool window, click Delete next to the VLAN name you want to delete. A prompt appears. 2. Click OK. 3. Click Apply. 4. At the top of the window, click Save Configuration.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Network Configuration Parameters | 166

Creating a Named VLAN Using the CLI
Named VLAN should not be used with static IP addresses.

The following example creates named VLAN called mygroup that has assignment type even. (host)(config) #vlan-name mygroup assignment even
Viewing and Adding VLAN IDs Using the CLI
The following example shows how to view VLAN IDs in a named VLAN: (host)(config) #show vlan
The following example shows how to add existing VLAN IDs to a named VLAN: (host)(config) #vlan-name mygroup (host)(config) #vlan mygroup 2,4,12
To confirm the named VLAN mappings assignments, use the following command: (host)(config) #show vlan mapping
Role Derivation for Named VLAN Pools
You can configure Named VLANs under user rule, server derivation, user derivation, and VSA in this release.
You cannot modify a VLAN name, so choose the name carefully.

Named VLANs (single VLAN IDs or multiple VLAN IDs) can only be assigned to tunnel mode VAP's and wired profiles. They can also be assigned to user roles, user rule derivation, server derivation, and VSA for tunnel and bridge mode. For tunnel mode, named VLANs that have the assignment type "hash" and "even" are supported. For bridge mode only, named VLANs with the assignment type "hash" are supported. If a named VLAN with "even" assignment is assigned to a user rule, user role, server derivation or VSA, than the "hash" assignment is applied and the following error message displays:
"named VLAN assignment type EVEN not supported for bridge. Applying HASH algorithm to retrieve vlan-id"
L2 roaming is not supported with an even VLAN assignment.

In the CLI
To apply a named VLAN in a user rule, use the following CLI commands: (host)(config) #aaa derivation-rules (host)(config) #aaa derivation-rules user <string> (host)(config) #aaa derivation-rules user test-user-rule (host)(user-rule) #set vlan
To apply a named VLAN in a user role, use the following CLI commands: (host)(config) #user-role test-vlan-name (user)(config-role) #vlan test-vlan
To apply a named VLAN in server derivation, use the following CLI commands: (host)(config) #aaa server-group test-vlan-server-group (user)(Server Group "test-vlan-server-group") set vlan
For a named VLAN derivation using VSA, configure the RADIUS server using these values:

167 | Network Configuration Parameters

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Aruba-Named-UserVLAN 9 String Aruba 14823
In the WebUI
To apply a named VLAN in a user rule, navigate to the WebUI page: Security > Authentication > User Rules To apply a named VLAN in a user role, navigate to the WebUI page: Security > Access Control > User Roles > Add or Edit Role To apply a named VLAN in a server derivation (server group), navigate to the WebUI page: Security > Authentication> Servers > Server Group > <server-group_name> >Server Rules
Adding a Bandwidth Contract to the VLAN
Bandwidth contracts on a VLAN can limit broadcast and multicast traffic. ArubaOS includes an internal exception list to allow broadcast and multicast traffic using the VRRP, LACP, OSPF, PVST, and STP protocols. To remove per-VLAN bandwidth contract limits on an additional broadcast or multicast protocol, add the MAC address for that broadcast/multicast protocol to the VLAN Bandwidth Contracts MAC Exception List. The command in the example below adds the MAC address for CDP (Cisco Discovery Protocol) and VTP (Virtual Trunking Protocol to the list of protocols that are not limited by VLAN bandwidth contracts. (host)(config) #vlan-bwcontract-explist mac 01:00:0C:CC:CC:CC To show entries in the VLAN bandwidth contracts MAC exception list execute the following command: (host)(config) #show vlan-bwcontract-explist internal
Optimizing VLAN Broadcast and Multicast Traffic
Broadcast and Multicast (BCMC) traffic from APs, remote APs, or distributions terminating on the same VLAN floods all VLAN member ports. This causes critical bandwidth wastage, especially when the APs are connected to an L3 cloud where the available bandwidth is limited or expensive. Suppressing the VLAN BCMC traffic to prevent flooding can result in loss of client connectivity. To effectively prevent flooding of BCMC traffic on all VLAN member ports, use the bcmc-optimization parameter under the interface vlan command. This parameter ensures controlled flooding of BCMC traffic without compromising the client connectivity. This option is disabled by default. You must enable this parameter for the controlled flooding of BCMC traffic.
If you enable BCMC Optimization on uplink ports, the controller-generated Layer-2 packets will be dropped.
The bcmc-optimization parameter has the following exemptions: l All DHCP traffic will continue to flood VLAN member ports even if you enable the bcmc-optimization
parameter. l ARP broadcasts and VRRP (multicast) traffic will still be allowed. You can configure BCMC optimization using the WebUI or CLI.
In the WebUI
1. Navigate to Configuration > Network > IP. 2. In the IP Interfaces tab, click Edit of the VLAN for configuring BCMC optimization. 3. Select the Enable BCMC check box to enable BCMC Optimization for the selected VLAN.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Network Configuration Parameters | 168

Figure 14 Enable BCMC Optimization

In the CLI
(host)(config) #interface vlan 1 (host)(config-subif)#bcmc-optimization (host)(config-subif)#show interface vlan 1
Configuring Ports
Both Fast Ethernet and Gigabit Ethernet ports can be set to access or trunk mode. A port is in access mode enabled by default and carries traffic only for the VLAN to which it is assigned. In trunk mode, a port can carry traffic for multiple VLANs.
For a trunk port, specify whether the port will carry traffic for all VLANs configured on the controller or for specific VLANs only. You can also specify the native VLAN for the port. A trunk port uses 802.1q tags to mark frames for specific VLANs, However, frames on a native VLAN are not tagged.
Classifying Traffic as Trusted or Untrusted
You can classify wired traffic based not only on the incoming physical port and channel configuration, but also on the VLAN associated with the port and channel.
About Trusted and Untrusted Physical Ports
Physical ports on the controller are trusted and usually connected to internal networks by default, while untrusted ports connect to third-party APs, public areas, or other networks to which you can apply access controls. When you define a physical port as untrusted, traffic passing through that port needs to go through a predefined access control list policy.
About Trusted and Untrusted VLANs
You can also classify traffic as trusted or untrusted based on the VLAN interface and port or channel. This means that wired traffic on the incoming port is trusted only when the port's associated VLAN is also trusted; otherwise the traffic is untrusted. When a port and its associated VLANs are untrusted, any incoming and outgoing traffic must pass through a predefined ACL. For example, this setup is useful if your company provides wired user guest access, and you want guest user traffic to pass through an ACL to connect to a captive portal.
You can set a range of VLANs as trusted or untrusted in trunk mode. The following table lists the port, VLAN and the trust/untrusted combination to determine if traffic is trusted or untrusted. Both the port and the VLAN have to be configured as trusted for traffic to be considered as trusted. If the traffic is classified as untrusted, then traffic must pass through the selected session access control list and firewall policies.

169 | Network Configuration Parameters

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 35: Classifying Trusted and Untrusted Traffic

Port

VLAN

Trusted

Trusted

Untrusted

Untrusted

Untrusted

Trusted

Trusted

Untrusted

Traffic Status Trusted Untrusted Untrusted Untrusted

Configuring Trusted/Untrusted Ports and VLANs
You can configure an Ethernet port as an untrusted access port, assign VLANs and classify them as untrusted, and designate a policy through which VLAN traffic on this port must pass.
In the WebUI
1. Navigate to the Configuration > Network > Ports window. 2. In the Port Selection section, click the port you want to configure. 3. In the Make Port Trusted section, clear the Trusted check box to make the port untrusted. The default is
trusted (checked). 4. In the Port Mode section, select Access. 5. From the VLAN ID drop-down list, select the VLAN ID whose traffic will be carried by this port. 6. In the Enter VLAN(s) section, clear the Trusted check box to make the VLAN untrusted. The default is
trusted (checked). 7. In the VLAN Firewall Policy drop-down list, select the policy through which VLAN traffic must pass. You
can select a policy for both trusted and untrusted VLANs. 8. From the Firewall Policy section, select the policy from the in drop-down list through which inbound
traffic on this port must pass. 9. Select the policy from the out drop-down list through which outbound traffic on this port must pass. 10.To apply a policy to this session's traffic on this port and VLAN, select the policy from the session drop-
down list. 11.Click Apply.
In the CLI
In this example,
(host)(config) #interface range fastethernet <slot/module/port> (host)(config-if)#switchport mode access (host)(config-if)#no trusted (host)(config-if)#switchport access vlan <vlan> (host)(config-if)#no trusted vlan <vlan> (host)(config-if)#ip access-group ap-acl session vlan <vlan> (host)(config-if)#ip access-group validuserethacl in (host)(config-if)#ip access-group validuserethacl out (host)(config-if)#ip access-group validuser session

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Network Configuration Parameters | 170

Configuring Trusted and Untrusted Ports and VLANs in Trunk Mode
The following procedures configure a range of Ethernet ports as untrusted native trunks ports, assign VLANs and classify them as untrusted, and designate a policy through which VLAN traffic on the ports must pass.
In the WebUI
1. Navigate to the Configuration > Network > Ports window. 2. In the Port Selection section, click the port you want to configure. 3. For Port Mode select Trunk. 4. To specify the native VLAN, select a VLAN from the Native VLAN drop-down list and click the <-- arrow. 5. Choose one of the following options to control the type of traffic the port carries:
n Allow All VLANS Except: The port carries traffic for all VLANs except those from this drop-down list. n Allow VLANs: The port carries traffic for all VLANs selected from this drop-down list. n Remove VLANs: The port does not carry traffic for any VLANs selected from this drop-down list. 6. To designate untrusted VLANs on this port, click Trusted except. In the corresponding VLAN field enter a range of VLANs that you want to make untrusted. (In this format, for example: 200-300, 401-500 and so on). Only VLANs listed in this range are untrusted. To designate only one VLAN as untrusted, select a VLAN from the drop-down list. 7. To designate trusted VLANs on this port, click Untrusted except. In the corresponding VLAN field, enter a range of VLANs that you want to designate as trusted. (In this format, for example: 200-300, 401-500 and so on). Only VLANs listed in this range are trusted. To designate only one VLAN as trusted, select a VLAN from the drop-down menu. 8. To remove a VLAN, click the Remove VLANs option and select the VLAN you want to remove from the drop-down list, and click the left arrow to add it back to the list. 9. To designate the policy through which VLAN traffic must pass, click New under the Session Firewall Policy field. 10.Enter the VLAN ID or select it from the associated drop-down list. Then select the policy, through which the VLAN traffic must pass, from the Policy drop-down list and click Add. Both the selected VLAN and the policy appear in the Session Firewall Policy field. 11.When you are finished listing VLANs and policies, click Cancel. 12.Click Apply.
In the CLI
Use the following examples: (host)(config) #interface fastethernet <slot/module/port> (host)(config-if)#description <string> (host)(config-if)#trusted {vlan <word>} (host)(config-range)#switchport mode trunk (host)(config-if)#switchport trunk native vlan <vlan> (host)(config-range)#ip access-group (host)(config-range)#ip access-group test session vlan <vlan>
Understanding VLAN Assignments
A client is assigned to a VLAN by one of several methods, in order of precedence. The assignment of VLANs are (from lowest to highest precedence):
1. The default VLAN is the VLAN configured for the WLAN (see Virtual AP Profiles on page 473).

171 | Network Configuration Parameters

Dell Networking W-Series ArubaOS 6.4.x | User Guide

2. Before client authentication, the VLAN can be derived from rules based on client attributes (SSID, BSSID, client MAC, location, and encryption type). A rule that derives a specific VLAN takes precedence over a rule that derives a user role that may have a VLAN configured for it.
3. After client authentication, the VLAN can be configured for a default role for an authentication method, such as 802.1x or VPN.
4. After client authentication, the VLAN can be derived from attributes returned by the authentication server (server-derived rule). A rule that derives a specific VLAN takes precedence over a rule that derives a user role that may have a VLAN configured for it.
5. After client authentication, the VLAN can be derived from Microsoft Tunnel attributes (Tunnel-Type, Tunnel Medium Type, and Tunnel Private Group ID). All three attributes must be present as shown below. This does not require a server-derived rule. For example: Tunnel-Type="VLAN"(13) Tunnel-Medium-Type="IEEE-802" (6) Tunnel-Private-Group-Id="101"
6. After client authentication, the VLAN can be derived from Vendor Specific Attributes (VSA) for RADIUS server authentication. This does not require a server-derived rule. If a VSA is present, it overrides any previous VLAN assignment. For example: Dell-User-VLAN Dell-Named-User-VLAN
VLAN Derivation Priorities for VLAN types
The VLAN derivation priorities for VLAN is defined below in the increasing order:
1. Default or Virtual AP VLAN 2. VLAN from Initial role 3. VLAN from User Derivation Rule (UDR) role 4. VLAN from UDR 5. VLAN from DHCP option 77 UDR role (wired clients) 6. VLAN from DHCP option 77 UDR (wired clients) 7. VLAN from MAC-based Authentication default role 8. VLAN from Server Derivation Rule (SDR) role during MAC-based Authentication 9. VLAN from SDR during MAC-based Authentication 10.VLAN from Vendor Specific Attributes (VSA) role during MAC-based Authentication 11.VLAN from VSA during MAC-based Authentication 12.VLAN from Microsoft Tunnel attributes during MAC-based Authentication 13.VLAN from 802.1X default role 14.VLAN from SDR role during 802.1X 15.VLAN from SDR during 802.1X 16.VLAN from VSA role during 802.1X 17.VLAN from VSA during 802.1X 18.VLAN from Microsoft Tunnel attributes during 802.1X 19.VLAN from DHCP options role 20.VLAN from DHCP options
A VLAN from DHCP options has highest priority for VLAN derivation. Note, however, that DHCP options are not considered for derivation if the Aruba VSA ARUBA_NO_DHCP_FINGERPRINT (14) was sent for the user.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Network Configuration Parameters | 172

Use the following command to display user VLAN derivation related debug information: (host) #show aaa debug vlan user [ip | ipv6 | mac]
How a VLAN Obtains an IP Address
A VLAN on the controller obtains its IP address in one of the following ways: l You can manually configure it. This is the default method and is described in Assigning a Static Address to a
VLAN on page 173. At least one VLAN on the controller must be assigned a static IP address. l Dynamically assigned from a Dynamic Host Configuration Protocol (DHCP) or Point-to-Point Protocol over
Ethernet (PPPoE) server.
Assigning a Static Address to a VLAN
You can manually assign a static IP address to a VLAN on the controller. At least one VLAN on the controller a static IP address.
In the WebUI
1. Navigate to the Configuration > Network > IP > IP Interfaces page on the WebUI. Click Edit for the VLAN you just added.
2. Select the Use the following IP address option. Enter the IP address and network mask of the VLAN interface. If required, you can also configure the address of the DHCP server for the VLAN by clicking Add.
3. Click Apply.
In the CLI
(host)(config) #interface vlan <id> ip address <address> <netmask>
Configuring a VLAN to Receive a Dynamic Address
In a branch office, you can connect a controller to an uplink switch or server that dynamically assigns IP addresses to connected devices. For example, you can connect the controller to a DSL or cable modem, or a broadband remote access server (BRAS). The following figure shows a branch office where a controller connects to a cable modem. VLAN 1 has a static IP address, while VLAN 2 has a dynamic IP address assigned via DHCP or PPPoE from the uplink device.
Figure 15 IP Address Assignment to VLAN via DHCP or PPPoE

Configuring Multiple Wired Uplink Interfaces (Active-Standby)
You can assign up to four VLAN interfaces to operate in active-standby topology. An active-standby topology provides redundancy so that when an active interface fails, the user traffic can failover to the standby interface.
To allow the controller to obtain a dynamic IP address for a VLAN, enable the DHCP or PPPoE client on the controller for the VLAN.

173 | Network Configuration Parameters

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The following restrictions apply when enabling the DHCP or PPPoE client on the controller: l You can enable the DHCP/PPPoE client multiple uplink VLAN interfaces (up to four) on the controller; these
VLANs cannot be VLAN 1. l Only one port in the VLAN can be connected to the modem or uplink switch. l At least one interface in the VLAN must be in the up state before the DHCP/PPPoE client requests an IP
address from the server.
Enabling the DHCP Client
The DHCP server assigns an IP address for a specified amount of time called a lease. The controller automatically renews the lease before it expires. When you shut down the VLAN, the DHCP lease is released.
In the WebUI
1. Navigate to the Configuration > Network > IP > IP Interfaces page. 2. Click Edit for a previously-created VLAN. 3. Select Obtain an IP address from DHCP. 4. Enter a priority value for the VLAN ID in the Uplink Priority field. All wired uplink interfaces have the same
priority by default. If you want to use an active-standby topology, then prioritize each uplink interfaces by entering a different priority value (1­ 4) for each uplink interface.
Figure 16 Assigning VLAN Uplink Priority--Active-Standby Configuration

5. Click Apply.
In the CLI
In this example, the DHCP client has the client ID name myclient, and the interface VLAN 62 has an uplink priority of 2:
(host)(config) #interface vlan 62 (host)(config) #uplink wired vlan 62 priority 2 (host)(config) #interface vlan 62 ip address dhcp-client client-id myclient

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Network Configuration Parameters | 174

Enabling the PPPoE Client
To authenticate the BRAS and request a dynamic IP address, the controller must have the following configured:
l PPPoE user name and password to connect to the DSL network l PPPoE service name: either an ISP name or a class of service configured on the PPPoE server
When you shut down the VLAN, the PPPoE session terminates.
In the WebUI
1. Navigate to the Configuration > Network > IP > IP Interfaces page. 2. Click Edit for a previously-created VLAN. 3. Select Obtain an IP address with PPPoE. 4. Enter the service name, username, and password for the PPPoE session. 5. Enter a priority value for the VLAN ID in the Uplink Priority field. All wired uplink interfaces have the same
priority by default. If you want to use an active-standby topology, then prioritize each uplink interfaces by entering a different priority value (1­ 4) for each uplink interface. 6. Click Apply.
In the CLI
In this example, a PPoE service name, username, and password are assigned, and the interface VLAN 14 has an uplink priority of 3: (host)(config) #interface vlan 14
ip address pppoe (host)(config) #interface vlan 14 ip pppoe-service-name <service_name> (host)(config) #interface vlan 14 ip pppoe-username <username> (host)(config) #interface vlan 14 ip pppoe-password ***** (host)(config) #uplink wired vlan 14 priority 3

Default Gateway from DHCP/PPPoE
You can specify that the router IP address obtained from the DHCP or PPPoE server be used as the default gateway for the controller.
In the WebUI
1. Navigate to the Configuration > Network > IP > IP Routes page. 2. For Default Gateway, select (Obtain an IP address automatically). 3. Click Apply.
In the CLI
(host) (config) #ip default-gateway import
Configuring DNS/WINS Server from DHPC/PPPoE
The DHCP or PPPoE server can also provide the IP address of a DNS server or NetBIOS name server, which can be passed to wireless clients through the controller's internal DHCP server. For example, the following configures the DHCP server on the controller to assign addresses to authenticated employees; the IP address of the DNS server obtained by the controller via DHCP/PPPoE is provided to clients along with their IP address.
In the WebUI
1. Navigate to the Configuration > Network > IP > DHCP Server page.

175 | Network Configuration Parameters

Dell Networking W-Series ArubaOS 6.4.x | User Guide

2. Select Enable DCHP Server. 3. Under Pool Configuration, select Add. 4. For Pool Name, enter employee-pool. 5. For Default Router, enter 10.1.1.254. 6. For DNS Servers, select Import from DHCP/PPPoE. 7. For WINS Servers, select Import from DHCP/PPPoE. 8. For Network, enter 10.1.1.0 for IP Address and 255.255.255.0 for Netmask. 9. Click Done.
In the CLI
Use the following commands: (host)(config) #ip dhcp pool employee-pool
default-router 10.1.1.254 dns-server import netbios-name-server import network 10.1.1.0 255.255.255.0
Configuring Source NAT to Dynamic VLAN Address
When a VLAN interface obtains an IP address through DHCP or PPPoE, a NAT pool (dynamic-srcnat) and a session ACL (dynamic-session-acl) are automatically created which reference the dynamically-assigned IP addresses. This allows you to configure policies that map private local addresses to the public address(es) provided to the DHCP or PPPoE client. Whenever the IP address on the VLAN changes, the dynamic NAT pool address also changes to match the new address.
For example, the following rules for a guest policy deny traffic to internal network addresses. Traffic to other (external) destinations are source NATed to the IP address of the DHCP/PPPoE client on the controller.
In the WebUI
1. Navigate to the Configuration > Security > Access Control > Policies page. Click Add to add the policy guest.
2. To add a rule, click Add. a. For Source, select any. b. For Destination, select network and enter 10.1.0.0 for Host IP and 255.255.0.0 for Mask. c. For Service, select any. d. For Action, select reject. e. Click Add.
3. To add another rule, click Add. a. Leave Source, Destination, and Service as any. b. For Action, select src-nat. c. For NAT Pool, select dynamic-srcnat. d. Click Add.
4. Click Apply.
In the CLI
Use the following commands: (host)(config) #ip access-list session guest
any network 10.1.0.0 255.255.0.0 any deny any any any src-nat pool dynamic-srcnat

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Network Configuration Parameters | 176

Configuring Source NAT for VLAN Interfaces
The example configuration in the previous section illustrates how to configure source NAT using a policy that is applied to a user role. You can also enable source NAT for a VLAN interface to perform NAT on the source address for all traffic that exits the VLAN.
Packets that exit the VLAN are given a source IP address of the "outside" interface, which is determined by the following: l If you configure "private" IP addresses for the VLAN, the controller is assumed to be the default gateway for
the subnetwork. Packets that exit the VLAN are given the IP address of the controller for their source IP address. l If the controller is forwarding the packets at Layer-3, packets that exit the VLAN are given the IP address of the next-hop VLAN for their source IP address.
Do not enable the NAT translation for inbound traffic option for VLAN 1, as this will prevent IPsec connectivity between the controller and its IPsec peers.
Sample Configuration
In the following example, the controller operates within an enterprise network. VLAN 1 is the outside VLAN, and traffic from VLAN 6 is source NATed using the IP address of the controller. The IP address assigned to VLAN 1 is used as the controller's IP address; thus traffic from VLAN 6 would be source NATed to 66.1.131.5:
Figure 17 Example: Source NAT using Controller IP Address

In the WebUI
1. Navigate to the Configuration > Network > VLANs page. Click Add to configure VLAN 6 (VLAN 1 is configured through the Initial Setup). a. Enter 6 for the VLAN ID. b. Click Apply.
2. Navigate to the Configuration > Network > IP > IP Interfaces page. 3. Click Edit for VLAN 6:
a. Select Use the following IP address. b. Enter 192.168.2.1 for the IP Address and 255.255.255.0 for the Net Mask. c. Select the Enable source NAT for this VLAN checkbox. 4. Click Apply.
In the CLI
Use the following commands:

177 | Network Configuration Parameters

Dell Networking W-Series ArubaOS 6.4.x | User Guide

(host)(config) #interface vlan 1 ip address 66.1.131.5 255.255.255.0
(host)(config) #interface vlan 6 (host)(config) #ip address 192.168.2.1 255.255.255.0
ip nat inside ip default-gateway 66.1.131.1
Inter-VLAN Routing
On the controller, you can map a VLAN to a layer-3 subnetwork by assigning a static IP address and a netmask, or by configuring a DHCP or PPPoE server to provide a dynamic IP address and netmask to the VLAN interface. The controller, acting as a layer-3 switch, routes traffic between VLANs that are mapped to IP subnetworks; this forwarding is enabled by default.
In Figure 18, VLAN 200 and VLAN 300 are assigned the IP addresses 2.1.1.1/24 and 3.1.1.1/24, respectively. Client A in VLAN 200 is able to access server B in VLAN 300 and vice-versa, provided that there is no firewall rule configured on the controller to prevent the flow of traffic between the VLANs.
Figure 18 Default Inter-VLAN Routing

You can optionally disable layer-3 traffic forwarding to or from a specified VLAN. When you disable layer-3 forwarding on a VLAN, the following restrictions apply:
l Clients on the restricted VLAN can ping each other, but cannot ping the VLAN interface on the controller. Forwarding of inter-VLAN traffic is blocked.
l IP mobility does not work when a mobile client roams to the restricted VLAN. You must ensure that a mobile client on a restricted VLAN is not allowed to roam to a non-restricted VLAN. For example, a mobile client on a guest VLAN will not be able to roam to a corporate VLAN.
To disable layer-3 forwarding for a VLAN configured on the controller:
In the WebUI
1. Navigate to the Configuration > Network > IP > IP Interface page. 2. Click Edit for the VLAN for which routing is to be restricted. 3. Configure the VLAN to either obtain an IP address dynamically (via DHCP or PPPoE) or to use a static IP
address and netmask. 4. Deselect (uncheck) the Enable Inter-VLAN Routing checkbox. 5. Click Apply.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Network Configuration Parameters | 178

In the CLI
Use the following commands: (host)(config) #interface vlan <id> ip address {<ipaddr> <netmask>|dhcp-client|pppoe} no ip routing
Configuring Static Routes
To configure a static route (such as a default route) on the controller, do the following:
In the WebUI
1. Navigate to the Configuration > Network > IP > IP Routes page. 2. Click Add to add a static route to a destination network or host. Enter the destination IP address and
network mask (255.255.255.255 for a host route) and the next hop IP address. 3. Click Done to add the entry. Note that the route has not yet been added to the routing table. 4. Click Apply .. The message Configuration Updated Successfully confirms that the route has been
added.
In the CLI
Use the following examples: (host)(config) #ip route <address> <netmask> <next_hop>
Configuring the Loopback IP Address
The loopback IP address is a logical IP interface that is used by the controller to communicate with APs. The loopback address is used as the controller's IP address for terminating VPN and GRE tunnels, originating requests to RADIUS servers, and accepting administrative communications. You configure the loopback address as a host address with a 32-bit netmask. The loopback address is not bound to any specific interface and is operational at all times. To use this interface, ensure that the IP address is reachable through one of the VLAN interfaces. It will be routable from all external networks. You must configure a loopback address if you are not using VLAN1 to connect the controller to the network. If you do not configure the loopback interface address, then the first configured VLAN interface address is selected. Generally, VLAN 1 is the factory default setting and thus becomes the controller IP address.
In the WebUI
1. Navigate to the Configuration > Network > Controller > System Settings page and locate the Loopback Interface section.
2. Modify the IP Address as required. 3. Click Apply.
If you are use the loopback IP address to access the WebUI, changing the loopback IP address will result in loss of connectivity. It is recommended that you use one of the VLAN interface IP addresses to access the WebUI.
4. Navigate to the Maintenance > Controller > Reboot Controller page to reboot the controller to apply the change of loopback IP address.
5. Click Continue to save the configuration. 6. When prompted that the changes were written successfully to flash, click OK.

179 | Network Configuration Parameters

Dell Networking W-Series ArubaOS 6.4.x | User Guide

7. The controller boots up with the changed loopback IP address.
In the CLI
Use the following commands: (host)(config) #interface loopback ip address <address> (host)(config) #write memory Enter the following command in Enable mode to reboot the controller : (host) #reload
Configuring the Controller IP Address
The Controller IP address is used by the controller to communicate with external devices such as APs.
IP addresses used by the controller is not limited to the controller IP address.
You can set the Controller IP address to the loopback interface address or to an existing VLAN ID address. This allows you to force the controller IP address to be a specific VLAN interface or loopback address across multiple machine reboots. Once you configure an interface to be the controller IP address, that interface address cannot be deleted until you remove it from the controller IP configuration. If the controller IP address is not configured then the controller IP defaults to the current loopback interface address. If the loopback interface address is not configured then the first configured VLAN interface address is selected. Generally, VLAN 1 is the factory default setting and thus becomes the controller IP address.
In the WebUI
1. Navigate to Configuration > Network > Controller > System Settings page. 2. Locate the Controller IP Details section. 3. Select the address you want to set the Controller IP to from the VLAN ID drop-down list. This list contains
only VLAN IDs that have statically assigned IP addresses. If you have previously configured a loopback interface IP address, then it will also appear in this list. Dynamically assigned IP addresses such as DHCP/PPPOE do not display. 4. Click Apply.
Any change in the controller's IP address requires a reboot.
5. Navigate to the Maintenance > Controller > Reboot Controller page to reboot the controller to apply the change of controller IP address.
6. Click Continue to save the configuration. 7. When prompted that the changes were written successfully to flash, click OK.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Network Configuration Parameters | 180

8. The controller boots up with the changed controller IP address. of the selected VLAN ID.
In the CLI
(host)(config) #controller-ip [loopback|vlan <valn id>]
Configuring GRE Tunnels
Controllers support Generic Routing Encapsulation (GRE) tunnels between controllers and between controllers and other network devices that support GRE tunnels. This section contains the following information: l About Layer-2 GRE Tunnels l About Layer-3 GRE Tunnels l Configuring a Layer-2 GRE Tunnel l Configuring a Layer-3 GRE Tunnel for IPv4 l Configuring a Layer-3 GRE Tunnel for IPv6 l Directing Traffic into the Tunnel
About Layer-2 GRE Tunnels
Layer-2 GRE tunnels allow you to have the same VLAN in multiple locations (separated by a Layer-3 network) and be connected. The forwarding method for a Layer-2 GRE tunnel is bridging. However, the drawback of using Layer-2 GRE tunnels is that all broadcasts are flooded through the tunnel, adding traffic load to the network and the controllers.
Layer-2 GRE Tunnel Network Diagram
Figure 19 Layer-2 GRE Tunnel

Layer-2 Traffic Flow
The traffic flow illustrated by Figure 19 is as follows: 1. The frame enters the source controller (Controller-1) on VLAN 101.

181 | Network Configuration Parameters

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The frame is bridged through Controller-1 into the Layer-2 GRE tunnel. 2. The frame is encapsulated in a GRE packet. 3. The GRE packet enters the network on VLAN 10, is routed across the network to the destination controller
(Controller-2), and then exits the network on VLAN 20. The source IP address of the GRE packet is the IP address of the interface in VLAN 10 in Controller 1. 4. The frame is de-encapsulated and bridged out of the destination controller (Controller-2) on VLAN 101.
About Layer-3 GRE Tunnels
The benefit of Layer-3 GRE tunnels is that broadcasts are not flooded through the tunnel, so there's less wasted bandwidth and less load on the controllers. The forwarding method for a Layer-3 GRE tunnel is routing. By default, GRE tunnels are in IPv4 Layer-3 mode.
IPv4 Layer-3 GRE Tunnel Network Diagram
Figure 20 IPv4 Layer-3 GRE Tunnel

IPv6 Layer-3 GRE Tunnel Network Diagram
Figure 21 IPv6 Layer-3 GRE Tunnel

IPv6 encapsulated in IPv4 and IPv4 encapsulated in IPv6 are not supported. The only Layer-3 GRE modes supported are IPv4 encapsulated in IPv4 and IPv6 encapsulated in IPv6.
Layer-3 Traffic Flow
The traffic flow illustrated by Figure 20 and Figure 21 is as follows: 1. The frame enters the source controller (Controller-1) on VLAN 101.
The IP packet within the frame is routed through Controller-1 into the Layer-3 GRE tunnel. 2. The IP packet is encapsulated in a GRE packet. 3. The GRE packet enters the network on VLAN 10, is routed across the network to destination controller
(Controller-2), and then exits the network on VLAN 20.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Network Configuration Parameters | 182

The source IP address of the GRE packet is the IP address of the interface in VLAN 10 in Controller 1. 4. The IP packet is de-encapsulated and routed out of the destination controller (Controller-2) on VLAN 202.
Configuring a Layer-2 GRE Tunnel In the WebUI
To configure a Layer-2 GRE tunnel for via the WebUI: Controller-1 1. Log into Controller-1. 2. Navigate to Configuration > Network > IP > GRE Tunnels.
The GRE Tunnels page is displayed. Figure 22 GRE Tunnels Page
3. Highlight the line for the tunnel ID of interest and click Edit. The Edit GRE Tunnel screen appears. Figure 23 displays the values that would be entered into the Edit GRE Tunnel screen to configure Controller-1 based on the network shown in Figure 19.

183 | Network Configuration Parameters

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 23 Layer-2 GRE Tunnel UI Configuration for Controller-1

4. Enter the corresponding GRE tunnel values for this controller. 5. Click Apply.
Controller-2 1. Log into Controller-2. 2. Navigate to Configuration > Network > IP > GRE Tunnels. 3. Highlight the line for the tunnel ID of interest and click Edit.
The Edit GRE Tunnel screen appears (the tunnel ID also displayed). Figure 24 displays the values that would be entered into the Edit GRE Tunnel screen to configure Controller-2 based on the network shown in Figure 19.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Network Configuration Parameters | 184

Figure 24 Layer 2 GRE Tunnel UI Configuration for Controller-2

4. Enter the corresponding GRE tunnel values for this controller. 5. Click Apply.
In the CLI
The following command example configures a Layer-2 GRE tunnel:
Referring to Figure 19, the following are the required configurations to create the Layer-2 GRE tunnel between controllers named Controller-1 and Controller-2:
Controller-1 Configuration
(Controller-1) (config) # interface tunnel 102 description "IPv4 Layer-2 GRE 102" tunnel mode gre 1 tunnel source vlan 10 tunnel destination 20.20.20.249 tunnel keepalive trusted tunnel vlan 101
Controller-2 Configuration
(Controller-2) (config) # interface tunnel 202 description "IPv4 Layer-2 GRE 202" tunnel mode gre 1 tunnel source vlan 20 tunnel destination 10.10.10.249 tunnel keepalive trusted tunnel vlan 101

185 | Network Configuration Parameters

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Configuring a Layer-3 GRE Tunnel for IPv4 In the WebUI
To configure a Layer-3 GRE tunnel for IPv4 via the WebUI: Controller-1 1. Log into Controller-1. 2. Navigate to Configuration > Network > IP > GRE Tunnels.
The GRE Tunnels page is displayed. Figure 25 GRE Tunnels Page
3. Highlight the line for the tunnel ID of interest and click Edit. The Edit GRE Tunnel screen appears. Figure 26 displays the values that would be entered into the Edit GRE Tunnel screen to configure Controller-1 based on the network shown in Figure 20.
Figure 26 Layer-3 IPv4 GRE Tunnel UI Configuration for Controller-1

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Network Configuration Parameters | 186

4. Enter the corresponding GRE tunnel values for this controller. 5. Click Apply.
Controller-2 1. Log into Controller-2. 2. Navigate to Configuration > Network > IP > GRE Tunnels.
The GRE Tunnels page appears. 3. Highlight the line for the tunnel ID of interest and click Edit.
The Edit GRE Tunnel screen appears. Figure 27 displays the values that would be entered into the Edit GRE Tunnel page to configure Controller-2 based on the network shown in Figure 20.
Figure 27 Layer 3 IPv4 GRE Tunnel UI Configuration for Controller-2

4. Enter the corresponding GRE tunnel values for this controller. 5. Click Apply.
In the CLI
The following command examples configure an IPv4 Layer-3 GRE tunnel for IPv4 between two controllers.
Referring to Figure 20, the following are the required configurations to create the IPv4 Layer-3 GRE tunnel between controllers named Controller-1 and Controller-2:
Controller-1 Configuration (Controller-1) (config) # interface tunnel 104
description "IPv4 L3 GRE 104" tunnel mode gre ip ip address 1.1.1.1 255.255.255.255 tunnel source vlan 10 tunnel destination 20.20.20.249 trusted

187 | Network Configuration Parameters

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Controller-2 Configuration (Controller-2) (config) # interface tunnel 204
description "IPv4 L3 GRE 204" tunnel mode gre ip ip address 1.1.1.2 255.255.255.255 tunnel source vlan 20 tunnel destination 10.10.10.249 trusted
Configuring a Layer-3 GRE Tunnel for IPv6
In the WebUI
To configure a Layer-3 GRE tunnel for IPv6 via the WebUI:
Controller-1 1. Log into Controller-1. 2. Navigate to Configuration > Network > IP > GRE Tunnels.
The GRE Tunnels page appears. 3. Highlight the line for the tunnel ID of interest and click Edit.
The Edit GRE Tunnel screen appears. Figure 28 displays the values that would be entered into the Edit GRE Tunnel screen to configure Controller-1 based on the network shown in Figure 21 .
Figure 28 Layer-3 IPv6 GRE Tunnel UI Configuration for Controller-1

4. Enter the corresponding GRE tunnel values for this controller.
Dell Networking W-Series ArubaOS 6.4.x | User Guide

Network Configuration Parameters | 188

5. Click Apply.
Controller-2 1. Log into Controller-2. 2. Navigate to Configuration > Network > IP > GRE Tunnels.
The GRE Tunnels page appears. 3. Highlight the line for the tunnel ID of interest and click Edit.
The Edit GRE Tunnel screen appears. Figure 29 displays the values that would be entered into the Edit GRE Tunnel screen to configure Controller2 based on the network shown in Figure 21.
Figure 29 Layer-3 IPv6 GRE Tunnel UI Configuration for Controller-2

4. Enter the corresponding GRE tunnel values for this controller. 5. Click Apply.
If a VLAN interface has IPv6 addresses configured, one of them is used as the tunnel source IPv6 address. If the selected IPv6 address is deleted from the VLAN interface, then the tunnel source IP address is reconfigured with the next available IPv6 address.
In the CLI
The following command example configures a Layer-3 GRE tunnel for IPv6:
Controller-1 Configuration (Controller-1) (config) # interface tunnel 106
description "IPv6 Layer-3 GRE 106" tunnel mode gre ipv6 ip address 2001:1:2:1::1

189 | Network Configuration Parameters

Dell Networking W-Series ArubaOS 6.4.x | User Guide

tunnel source vlan 10 tunnel destination 2001:1:2:2020::1 trusted
Controller-2 Configuration (Controller-2) (config) # interface tunnel 206
description "IPv6 Layer-3 GRE 206" tunnel mode gre ipv6 ip address 2001:1:2:1::2 tunnel source vlan 20 tunnel destination 2001:1:2:1010::1 trusted
Limitations for Static IPv6 Layer-3 Tunnels
ArubaOS does not support the following functions for static IPv6 Layer-3 GRE tunnels: l IPv6 Auto-configuration and IPv6 Neighbor Discovery mechanisms do not apply to IPv6 GRE tunnels. l The tunnel encapsulation limit and Maximum Transmission Unit (MTU) discovery options are not supported
on IPv6 GRE tunnels.
Directing Traffic into the Tunnel
You can direct traffic into a GRE tunnel by configuring one of the following: l Static route: Redirects traffic to the IP address of the tunnel. l Firewall policy (session-based ACL): Redirects traffic to the specified tunnel ID.
About Configuring Static Routes
You can configure a static route that specifies the IP address of a tunnel as the next-hop for traffic for a specific destination. See Configuring Static Routes on page 179 for detailed information on how to configure a static route.
While redirecting traffic into a Layer-3 GRE tunnel via a static route, be sure to use the controller's tunnel IP address as the next-hop, instead of providing the destination controller's tunnel IP address.
Referring to Figure 20, the following are examples of the required static route configurations to direct traffic into the IPv4 Layer-3 GRE tunnel. for Controller-1 and Controller-2: l For the controller named Controller-1:
(Controller-1) (config) # ip route 20.20.202.0 255.255.255.0 1.1.1.1 l For the controller named Controller-2:
(Controller-2) (config) # ip route 10.10.101.0 255.255.255.0 1.1.1.2
Configuring a Firewall Policy Rule
You can configure a firewall policy rule to redirect selected traffic into a GRE tunnel. Traffic redirected by a firewall policy rule is not forwarded to a tunnel that is "down" (see the next section, Configuring Tunnel Keepalives, for more information on how GRE tunnel status is determined).
From the WebUI To direct traffic into a GRE tunnel via a firewall policy via the WebUI: 1. On the controller, navigate to the Configuration > Security > Access Control > Policies page.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Network Configuration Parameters | 190

Figure 30 Firewall Policies Page

2. To create a new firewall policy, click Add. To edit an existing policy, click Edit. The Add New Policy screen appears.
Figure 31 Adding a New Firewall Policy

3. Enter the Policy Name. 4. For Policy Type, specify Session (the default). 5. To create a new policy rule, scroll to the Rules section and click Add.

191 | Network Configuration Parameters

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 32 Specifying Firewall Rules

a. Specify the IP Version. b. Configure the Source, Destination, and Service/Application for the rule. c. For Action, select redirect to tunnel. d. Enter the Tunnel ID. e. Configure any additional options. 6. When satisfied with the settings, click Add, then click Apply.
In the CLI To direct traffic into a GRE tunnel via a firewall policy (session-based ACL) via the CLI, use the following command: (Controller-1)(config) #ip access-list session <name>
<source> <destination> <service> redirect tunnel <id>
Configuring Tunnel Keepalives
The controller determines the status of a GRE tunnel by sending periodic keepalive frames on the Layer-2 or Layer-3 GRE tunnel. When you enable tunnel keepalives, the tunnel is considered "down" when the keepalives fail repeatedly. If you configure a firewall policy rule to redirect traffic to the tunnel, traffic is not forwarded to the tunnel until it is "up." When the tunnel comes up or goes down, an SNMP trap and logging message is generated. The remote endpoint of the tunnel does not need to support the keepalive mechanism. The controller sends keepalive frames at 60-second intervals by default and retries keepalives up to three times before the tunnel is considered down. You can change the default values of the intervals: l For the interval, specify a value between 1 and 86400 seconds. l For the retries, specify a value between 0 and 1024. l To interoperate with Cisco network devices, use the cisco option.
In the WebUI To configure keepalives (Heartbeats) via the WebUI: 1. On the controller, navigate to the Configuration > Network > IP > GRE Tunnels page. 2. Locate the tunnel ID for which you are enabling keepalives, then click Edit.
The Edit GRE Tunnel screen appears.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Network Configuration Parameters | 192

Figure 33 Configuring Heartbeats (Keepalives)

3. To enable tunnel keepalives and display the Heartbeat Interval and Heartbeat Retries fields, click Enable Heartbeats. a. Specify a value for Heartbeat Interval. The default value is 10 seconds. b. Specify a value for Heartbeat Retries. The default value is 3 retries.
4. Click Apply.
In the CLI To configure the keepalives, use the following command: (host)(config) #interface tunnel id
tunnel keepalive [<interval> <retries>] <cisco>
Configuring GRE Tunnel Groups
This section contains the following information: l About GRE Tunnel Groups l Enabling a Tunnel Group l Points to Remember l Configuring a Layer-2 or Layer-3 Tunnel Group Using the CLI l Configuring a Layer-2 or Layer-3 Tunnel Group Using the WebUI
About GRE Tunnel Groups
The controller supports redundancy of Generic Routing Encapsulation (GRE) tunnels for both Layer-2 and Layer-3 GRE tunnels. This feature enables automatic redirection of the user traffic to a standby tunnel when the primary tunnel goes down. A tunnel group is identified by a name or number. You can add multiple tunnels to a tunnel group.
Tunnel Group Order
The order of the tunnels defined in the tunnel-group configuration specifies their standby precedence. The first member of the tunnel-group is the primary tunnel.
Tunnel Failover
A GRE tunnel group combines two tunnels created in the controller, where one tunnel is active and the other tunnel is the standby. Traffic forwarding can occur on the active tunnel, and the standby tunnel can become active once the active tunnel is down. When the first tunnel fails, the second tunnel carries the traffic. The third tunnel in the tunnel-group takes over if the second tunnel also fails. In the meantime, if the first tunnel comes up, it becomes the most eligible standby tunnel.

193 | Network Configuration Parameters

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Preemption
You can also enable or disable preemption as part of the tunnel-group configuration. Preemption is enabled by default. (For CLI examples, see Enabling Preemption on page 194.) The preemptive-failover option automatically redirects the traffic whenever it detects an active tunnel with a higher precedence in the tunnel group. When preemption is disabled, the traffic gets redirected to a higher precedence tunnel only when the tunnel carrying the traffic fails.
Enabling a Tunnel Group
To enable this tunnel-group functionality, you must complete the following tasks: 1. Configure the member tunnel. 2. Enable tunnel keepalives on the tunnel interface. 3. Configure the tunnel group and set the group type to Layer-2 or Layer-3. 4. Add the member tunnels to the group.
Points to Remember
l When a tunnel is added to the tunnel group, the tunnel is used for data traffic only if it is the active tunnel in the group.
l Standby tunnels do not carry any data traffic. However, all tunnels in the group continue to send and receive keepalive packets.
l Only one type of tunnel can be placed into a tunnel group--either Layer-2 or Layer-3. That is, you can't have a tunnel group consisting of both Layer-2 and Layer-3 tunnels.
l The default value of tunnel group type is Layer-3.
Regarding Layer-2 Tunnel Groups
When creating a Layer-2 tunnel group, keep in mind the following: l All tunnels in a Layer-2 tunnel group must be tunneling the same VLAN. l A Layer-2 tunnel can only be part of one tunnel group. l A Dell Layer-2 tunnel-group is not interoperable with other vendors. l You must set up Layer-2 tunnel groups between Dell devices only.
Configuring a Layer-2 or Layer-3 Tunnel Group Using the CLI
To configure a Layer-2 or Layer-3 tunnel group using the CLI: (Controller-1) (config) #tunnel-group <tunnel_group_name> (Controller-1) (config-tunnel-group)#mode {l2|l3} (Controller-1)(config-tunnel-group)#tunnel <tunnel-id>
Example Configuration
The following is a sample configuration: (Controller-1) (config) #tunnel-group branch_1 (Controller-1) (config-tunnel-group)#mode l2
Enabling Preemption
Execute the following command to enable preemption: (Controller-1)(config-tunnel-group)#preemptive-failover

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Network Configuration Parameters | 194

Viewing Operational Status
To view the operational status of all the tunnel groups and their members, issue the following command: (Controller-1) #show tunnel-group The following is the sample output of the show tunnel-group command: (Controller-1) #show tunnel-group

Tunnel-Group Table Entries

--------------------------

Tunnel Group Mode Tunnel Group Id

------------ ---- ---------------

branch_1

L2 16385

Preemptive Failover -------------------enabled

Active Tunnel Id ---------------1

Tunnel Members -------------10 11

Viewing Active and Member Tunnels
To view the active member tunnel and all the member tunnels of the respective tunnel-group, issue the following command: (Controller-1) #show datapath tunnel-group Following is the sample output of the show datapath tunnel-group command: (host) #show datapath tunnel-group

Datapath Tunnel-Group Table Entries

-----------------------------------

Tunnel-Group Active Tunnel

Members

------------ ------------- -------------------

16385

10

10 11

Viewing the Standby Member Tunnels
To view the standby member tunnels of the tunnel-group, issue the following command: (host) #show datapath tunnel The following is sample output of the show datapath tunnel command: (host) #show datapath tunnel

+----+------+-----------------------------------------------------+

|SUM/|

|

|

|

|CPU | Addr | Description

Value |

+----+------+-----------------------------------------------------+

||

|

|

| G | [00] | Current Entries

10 |

| G | [02] | High Water Mark

10 |

| G | [03] | Maximum Entries

32768 |

| G | [04] | Total Entries

31 |

| G | [06] | Max link length

1|

+----+------+-----------------------------------------------------+

Datapath Tunnel Table Entries ----------------------------Flags: E - Ether encap, I - Wi-Fi encap, R - Wired tunnel, F - IP fragment OK W - WEP, K - TKIP, A - AESCCM, G - AESGCM, M - no mcast src filtering S - Single encrypt, U - Untagged, X - Tunneled node, 1(cert-id) - 802.1X Term-PEAP 2(cert-id) - 802.1X Term-TLS, T - Trusted, L - No looping, d - Drop Bcast/Unknown Mcast, D - Decrypt tunnel, a - Reduce ARP packets in the air, e - EAPOL only C - Prohibit new calls, P - Permanent, m - Convert multicast n - Convert RAs to unicast(VLAN Pooling/L3 Mobility enabled), s - Split tunnel V - enforce user vlan(open clients only) H - Standby (HA-Lite)

195 | Network Configuration Parameters

Dell Networking W-Series ArubaOS 6.4.x | User Guide

#

Source

Destination Prt Type MTU VLAN

Acls ------ ------------

-- -------------- --- ---- ---- ---- -------------------

10

192.0.2.1

198.51.100.1 47 1

1100 0 0 0 0 0

11

192.0.2.1

203.0.113.1

47 1

1100 0 0 0 0 0

BSSID

Decaps

Encaps

Heartbeats Cpu QSz Flags EncapKBytes DecapKBytes

00:00:00:00:00:00

0

5

0 22 0 TEFPR

00:00:00:00:00:00

0

0

0 23 0 LEFPRH

In this example, the member tunnel 11 is a standby tunnel, which is denoted by the H flag.

Configuring a Layer-2 or Layer-3 Tunnel Group Using the WebUI
To configure a Layer-2 or Layer-3 tunnel group using the WebUI:
1. Navigate to the Configuration > Network > IP > GRE Tunnels page. 2. In the Tunnel Group pane, click Add. 3. Specify a name for the tunnel-group in the Tunnel Group Name text box. 4. Under Mode, select the tunnel group type. 5. In the Tunnel Group Member text box, specify the tunnel IDs, separating the IDs with commas. 6. To enable preemption, select the Enable Preemptive-Failover Mode check box. This option is enabled by
default. To disable pre-emption, clear the check box. 7. Click Apply.

Jumbo Frame Support
Jumbo frames are the data frames that are larger than 1500 bytes and includes the Layer 2 header and Frame Check Sequence (FCS). Jumbo frames functionality can be configured on W-7000 and W-7200 Series controllersto support up to 9216 bytes of payload.
In centralized deployments, frames that are more than 1500 bytes in size are generated from AP to the controller during encryption and enabling AMSDU. Therefore, whenever the AP associates to the controller, jumbo frames are used to get the highest network performace. If this functionality is not supported, the data frames gets fragmented, which reduces the overall throughput of the network and makes the network slow.
ArubaOS supports jumbo frames between 11ac APs and both W-7000 and W-7200 Seriescontrollersonly.

You can enable the jumbo frame support in the following scenarios:
l Tunnel node: In a tunneled node deployment, the wired clients connected on the tunneled nodes can send and receive the jumbo frames.
l L2/L3 GRE tunnels: When you establish a GRE tunnel between two controllers, the clients on one controller can send and receive jumbo frames from the clients on the other controller on enabling jumbo frames.
l Between wired clients: In a network where clients connect to the controller with jumbo frames enabled ports can send and receive the jumbo frames.
l Wi-Fi tunnel: A Wi-Fi tunnel can support an AMSDU jumbo frame for an AP (The maximum MTU supported is up to 9216 bytes).
Limitations for Jumbo Frame Support
This release of ArubaOS does not support the jumbo frames for the following scenarios:
l IPsec, IPIP, and xSec. l IPv6 fragmentation/reassembly.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Network Configuration Parameters | 196

Configuring Jumbo Frame Support
You can use the WebUI or CLI to configure the jumbo frame support.
In the WebUI
To enable jumbo frame support globally: 1. Navigate to the Configuration > ADVANCED SERVICES > Stateful firewall > Global Setting page. 2. Select the Jumbo frames processing checkbox to enable the jumbo frames support. 3. Enter the value of the MTU in the Jumbo MTU [1789-9216] bytes textbox. 4. Click Apply. To enable jumbo frame support on a port: 1. Navigate to Configuration > NETWORK > Ports page. 2. Select the Enable Jumbo MTU checkbox to enable the jumbo frames support. 3. Click Apply. To enable jumbo frame support on a port channel: 1. Navigate to the Configuration > NETWORK > Port-Channel page. 2. Select the Enable Jumbo MTU checkbox to enable the jumbo frames support. 3. Click Apply.
In the CLI
To enable the jumbo frame support globally and to configure the MTU value: (host)(config)#firewall jumbo mtu <val> You can configure the MTU value between 1,789-9,216. The default MTU value is 9,216. To disable the jumbo frame support: (host)(config)#no firewall enable-jumbo-frames In this case, the MTU value is considered as 9,216 (default). To enable jumbo frame support on a port channel: (host)(config)#interface port-channel <id> jumbo To disable jumbo frame support on a port channel: (host)(config)#interface port-channel <id> no jumbo To enable jumbo frame support on a port: (host)(config) #interface gigabitethernet <slot>/<module>/<port> jumbo To disable jumbo frame support on a port: (host)(config) #interface gigabitethernet <slot>/<module>/<port> no jumbo
Viewing the Jumbo Frame Support Status
Execute the following command to view the global status of the jumbo frame support: (host)#show firewall Execute the following command to view the jumbo frame status on a port: (host)#show interface gigabitethernet <slot>/<port>/<module> Execute the following command to view the jumbo frame status on a port channel: (host)#show interface port-channel <id>

197 | Network Configuration Parameters

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Chapter 5 IPv6 Support

This chapter describes ArubaOS support for IPv6 features: l Understanding IPv6 Notation on page 198 l Understanding IPv6 Topology on page 198 l Enabling IPv6 on page 199 l Enabling IPv6 Support for Controller and APs on page 199 l Filtering an IPv6 Extension Header (EH) on page 207 l Configuring a Captive Portal over IPv6 on page 207 l Working with IPv6 Router Advertisements (RAs) on page 208 l RADIUS Over IPv6 on page 211 l TACACS Over IPv6 on page 212 l DHCPv6 Server on page 213 l Understanding ArubaOS Supported Network Configuration for IPv6 Clients on page 216 l Managing IPv6 User Addresses on page 222 l Understanding IPv6 Exceptions and Best Practices on page 223
Understanding IPv6 Notation
The IPv6 protocol is the next generation of large-scale IP networks, it supports addresses that are 128 bits long. This allows 2128 possible addresses (versus 232 possible IPv4 addresses). Typically, the IP address assigned on an IPv6 host consists of a 64-bit subnet identifier and a 64-bit interface identifier. IPv6 addresses are represented as eight colon-separated fields of up to four hexadecimal digits each. The following are examples of IPv6 addresses: 2001:0000:0eab:DEAD:0000:00A0:ABCD:004E
The use of the "::" symbol is a special syntax that you can use to compress one or more group of zeros or to compress leading or trailing zeros in an address. The "::" can appear only once in an address. For example, the address, 2001:0000:0dea:C1AB:0000:00D0:ABCD:004E can also be represented as: 2001:0:eab:DEAD:0:A0:ABCD:4E ­ leading zeros can be omitted 2001:0:0eab:dead:0:a0:abcd:4e ­ not case sensitive 2001:0:0eab:dead::a0:abcd:4e - valid 2001::eab:dead::a0:abcd:4e - Invalid
IPv6 uses a "/" notation which describes the no: of bits in netmask, similar to IPv4. 2001:eab::1/128 ­ Single Host 2001:eab::/64 ­ Network
Understanding IPv6 Topology
IPv6 APs connect to the IPv6 controller over an IPv6 L3 network. The IPv6 controller can terminate both IPv4 and IPv6 APs. IPv4 and IPv6 clients can terminate to either IPv4 or IPv6 APs. ArubaOS supports Router Advertisements (RA). You do not need an external IPv6 router in the subnet to generate RA for IPv6 APs and clients that depend on stateless autoconfiguration to obtain IPv6 address. The external IPv6 router is the

Dell Networking W-Series ArubaOS 6.4.x| User Guide

IPv6 Support | 198

default gateway in most deployments. However, the controller can be the default gateway by using static routes. The master-local communication always occurs in IPv4.
The following image illustrates how IPv6 clients, APs, and controllers communicate with each other in an IPv6 network:
Figure 34 IPv6 Topology

l The IPv6 controller (MC2) terminates both V4 AP (IPv4 AP) and V6 AP (IPv6 AP). l Client 1 (IPv4 client) terminates to V6 AP and Client 2 (IPv6 client) terminates to V4 AP. l Router is an external IPv6 router in the subnet that acts as the default gateway in this illustration. l MC1 (master) and MC2 (local) communicates in IPv4.
Enabling IPv6
You must enable the IPv6 option on the controller before using any of the IPv6 functions. You can use the ipv6 enable command to enable the IPv6 packet/firewall processing on the controller. The IPv6 option is disabled by default. You can also use the WebUI to enable the IPv6 option: 1. Navigate to the Configuration > Advanced Services > Stateful Firewall page. 2. Select the Global Settings tab. 3. Select the IPv6 Enable check box to enable the IPv6 option. 4. Click Apply .
Enabling IPv6 Support for Controller and APs
This release of ArubaOS provides IPv6 support for controllers and access points. You can now configure the master controller with an IPv6 address to manage the controllers and APs. Both IPv4 and IPv6 APs can

199 | IPv6 Support

Dell Networking W-Series ArubaOS 6.4.x | User Guide

terminate on the IPv6 controller. You can provision an IPv6 AP in the network only if the controller interface is configured with an IPv6 address. An IPv6 AP can serve both IPv4 and IPv6 clients.
You must manually configure an IPv6 address on the controller interface to enable IPv6 support.

You can perform the following IPv6 operations on the controller:
l Configuring IPv6 Addresses on page 201 l Configuring IPv6 Static Neighbors on page 202 l Configuring IPv6 Default Gateway and Static IPv6 Routes on page 203 l Managing Controller IP Addresses on page 203 l Configuring Multicast Listener Discovery on page 204 l Debugging an IPv6 Controller on page 206 l Provisioning an IPv6 AP on page 206
You can also view the IPv6 statistics on the controller using the following commands:
l show datapath ip-reassembly ipv6 -- View the IPv6 contents of the IP Reassembly statistics table. l show datapath route ipv6 -- View datapath IPv6 routing table. l show datapath route-cache ipv6 -- View datapath IPv6 route cache. l show datapath tunnel ipv6 -- View the tcp tunnel table filtered on IPv6 entries. l show datapath user ipv6 -- View datapath IPv6 user statistics such as current entries, pending deletes,
high water mark, maximum entries, total entries, allocation failures, invalid users, and maximum link length. l show datapath session ipv6 -- View datapath IPv6 session entries and statistics such as current entries,
pending deletes, high water mark, maximum entries, total entries, allocation failures, invalid users, and maximum link length.
Additionally, you can view the IPv6 AP information on the controller using the following show commands:
l show ap database l show ap active l show user l show ap details ip6-addr l show ap debug
The following table lists IPv6 features:

Table 36: IPv6 APs Support Matrix Features Forward Mode - Tunnel Forward Mode - Decrypt Tunnel Forward Mode - Bridge Forward Mode - Split Tunnel AP Type - CAP

Supported on IPv6 APs? Yes No No No Yes

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IPv6 Support | 200

Features AP Type - RAP AP Type - Mesh Node IPSEC CPSec Wired-AP/Secure-Jack Fragmentation/Reassembly MTU Discovery Provisioning through Static IPv6 Addresses Provisioning through IPv6 FQDN Master Name Provisioning from WebUI AP boot by Flash AP boot by TFTP WMM QoS AP Debug and Syslog ARM & AM WIDS CLI support for users & datapath

Supported on IPv6 APs? No No No No No Yes Yes Yes
Yes
Yes Yes No No Yes Yes Yes (Limited) Yes

Configuring IPv6 Addresses
You can configure IPv6 addresses for the management interface, VLAN interface, and the loopback interface of the controller. The controller can have up to three IPv6 addresses for each VLAN interface. The IPv6 address configured on the loopback interface or the first VLAN interface of the controller becomes the default IPv6 address of the controller.
If only one IPv6 address is configured on the controller, it becomes the default IPv6 address of the controller. With this release of ArubaOS, you can delete this IPv6 address.
You can configure IPv6 interface address using the WebUI or CLI. As per Internet Assigned Numbers Authority (IANA), Dell controllers support the following ranges of IPv6 addresses:

201 | IPv6 Support

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l Global unicast--2000::/3 l Unique local unicast--fc00::/7 l Link local unicast--fe80::/10
In the WebUI
To Configure Link Local Address 1. Navigate to the Configuration > Network > IP page and select the IP Interfaces tab. 2. Edit a VLAN # and select IP version as IPv6. 3. Enter the link local address in the Link Local Address field. 4. Click Apply.
To Configure Global Unicast Address 1. Navigate to the Configuration > Network > IP page and select the IP Interfaces tab. 2. Edit a VLAN # and select IP version as IPv6. 3. Enter the global unicast address and the prefix-length in the IP Address/Prefix-length field. 4. (Optional) Select the EUI64 Format check box, if applicable. 5. Click Add to add the address to the global address list. 6. Click Apply.
To Configure Loopback Interface Address 1. Navigate to the Configuration > Network > Controller page and select the System Settings tab. 2. Under Loopback Interface enter the loopback address in the IPv6 Address field. 3. Click Apply.
You cannot configure the management interface address using the WebUI.

In the CLI
To configure the link local address: (host)(config)#interface vlan <vlan#> (host)(config-subif)#ipv6 address <ipv6-address> link-local To configure the global unicast address: (host)(config)#interface vlan <vlan#> (host)(config-subif)#ipv6 address <ipv6-prefix>/<prefix-length> To configure the global unicast address (EUI 64 format): (host)(config)#interface vlan <vlan#> (host)(config-subif)#ipv6 address <ipv6-prefix/prefix-length> eui-64 To configure the management interface address: (host)(config)#interface mgmt (host)(config-subif)#ipv6 address <ipv6-prefix/prefix-length> To configure the loopback interface address: (host)(config)#interface loopback (host)(config-subif)#ipv6 address <ipv6-prefix>
Configuring IPv6 Static Neighbors
You can configure a static neighbor on a VLAN interface either using the WebUI or the CLI.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IPv6 Support | 202

In the WebUI
1. Navigate to the Configuration > Network > IP page and select the IPv6 Neighbors tab. 2. Click Add and enter the following details of the IPv6 neighbor:
l IPV6 Address l Link-layer Addr l VLAN Interface 3. Click Done to apply the configuration.
In the CLI
To configure a static neighbor on a VLAN interface: (host)(config)#ipv6 neighbor <ipv6addr> vlan <vlan#> <mac>
Configuring IPv6 Default Gateway and Static IPv6 Routes
You can configure IPv6 default gateway and static IPv6 routes using the WebUI or CLI.
In the WebUI
To Configure IPv6 Default Gateway 1. Navigate to the Configuration > Network > IP page and select the IP Routes tab. 2. Under the Default Gateway section, click Add. 3. Select IPv6 as IP Version, and enter the IPv6 address in the IP Address field. 4. Click Add to add the address to the IPv6 default gateway table. 5. Click Apply.
To Configure Static IPv6 Routes 1. Under the IP Routes section, click Add and select IPv6 as IP Version. 2. Enter the destination IP address and the forwarding settings in the respective fields. 3. Click Done to add the static route to the IPv6 routes table. 4. Click Apply.
In the CLI
To configure the IPv6 default gateway: (host)(config)#ipv6 default-gateway <ipv6-address> <cost> To configure static IPv6 routes: (host)(config)#ipv6 route <ipv6-prefix/prefix-length> <ipv6-next-hop> <cost> <ipv6-next-hop> = X:X:X:X::X
Managing Controller IP Addresses
You can change the default controller IP address by assigning a different VLAN interface address or the loop back interface address. You can also turn on Syslog messaging for IPv6 (similar to IPv4 logging) using the logging <ipv6 address> command. For more information on logging, see Configuring Logging on page 887.You can use the WebUI or CLI to change the default controller IP address.
In the WebUI
1. Navigate to the Configuration > Network > Controller page and select the System Settings tab.

203 | IPv6 Support

Dell Networking W-Series ArubaOS 6.4.x | User Guide

2. Under the Controller IP Details section, select the VLAN Id or the loopback interface Id in the IPv6 Address drop down.
3. Click Apply.
In the CLI
To configure an IPv6 address to the controller: (host)(config)#controller-ipv6 loopback (host)(config)#controller-ipv6 vlan <vlanId>
To enable logging over IPv6: (host)(config)#logging <ipv6 address>
Configuring Multicast Listener Discovery
You can enable the IPv6 multicast snooping on the controller by using the WebUI or CLI and configure Multicast Listener Discovery (MLD) parameters such as query interval, query response interval, robustness variable, and ssm-range. The Source Specific Multicast (SSM) supports delivery of multicast packets that originate only from a specific source address requested by the receiver. You can forward multicast streams to the clients if the source and group match the client subscribed source group pairs (S,G). The controller supports the following IPv6 multicast source filtering modes: l Include - In Include mode, the reception of packets sent to a specified multicast address is enabled only
from the source addresses listed in the source list. The default IPv6 SSM address range is FF3X::4000:1 ­ FF3X::FFFF:FFFF, and the hosts subscribing to SSM groups can only be in the Include mode. l Exclude - In Exclude mode, the reception of packets sent to a specific multicast address is enabled from all source addresses. If there is a client in the Exclude mode, the subscription is treated as an MLDv1 join. For more information on MLD feature, see RFC 3810 and RFC 4604, Starting with ArubaOS 6.4.2.3, MLD snooping does not add IPv6 Solicited-Node multicast address or groups to the multicast table. A Solicited-Node multicast address is an IPv6 multicast address valid within the local-link (example, an Ethernet segment or a Frame Relay cloud). Every IPv6 host has at least one such address per interface. Solicited-Node multicast addresses are used in Neighbor Discovery Protocol for obtaining the layer 2 link-layer addresses of other nodes.
In the WebUI
To enable IPv6 MLD Snooping 1. Navigate to the Configuration > Network > IP page and select the IP Interfaces tab. 2. Click the Edit button listed under Actions to edit the required VLAN interface. 3. Select IPv6 from the IP version drop-down list. 4. Check the Enable MLD Snooping check box under MLD section to enable IPv6 MLD snooping. 5. Click Apply.
To Modify IPv6 MLD Parameters 1. Navigate to the Configuration > Network > IP page and select the Multicast tab. 2. Under the MLD section, enter the required values in the following fields:
l Robustness Variable: default value is 2 l Query Interval (second): default value is 125 seconds l Query Response Interval (in 1/10 second): default value is 100 (1/10 seconds). 3. Click Apply.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IPv6 Support | 204

To configure the SSM Range: 1. Navigate to Configuration>Network>IP page and select the Multicast tab. 2. In the MLD section, use the SSM Range Start-IP and SSM Range End-IP fields to configure the
SSM Range. 3. Click Apply to save your changes.
In the CLI
To enable IPv6 MLD snooping: (host)(config) #interface vlan 1 (host)(config-subif)#ipv6 mld snooping To view if IPv6 MLD snooping is enabled: (host)(config-subif)#show ipv6 mld interface To view the MLD Group information: (host)(config) #show ipv6 mld group To modify IPv6 MLD parameters: (host)(config) #ipv6 mld (host)(config-mld) # query-interval <time in seconds (1-65535)>|query-response-interval <time in 1/10th of seconds (1-65535)|robustness-variable <value (2-10)> To view MLD configuration: (host)(config-subif)#show ipv6 mld config
When you enter the SSM Range ensure that the upstream router has the same range, else the multicast stream would be dropped.
Dynamic Multicast Optimization
When multiple clients are associated to an AP and when one client is subscribed for a multicast stream, all the clients associated to the AP receive the stream, as the packets are directed to the multicast MAC address. To restrict the multicast stream to only the subscribed clients, DMO sends the stream to the unicast MAC address of the subscribed clients. DMO is currently supported for both IPv4 and IPv6.
In the WebUI
You can configure the IPv6 DMO feature using the WebUI or CLI.
Using the WEBUI To enable this feature using the WebUI: 1. Navigate to Configuration>Wireless>AP Configuration page. 2. Select the AP Group tab, click the AP Group you want to edit. 3. Expand the Wireless LAN menu, then expand the Virtual AP menu. 4. Select the Virtual AP profile for which you want to configure the Dynamic Multicast Optimization. 5. In the Basic tab under Broadcast/Multicast section configure the following parameters to enable
multicasting: a. Select the Dynamic Multicast Optimization (DMO) checkbox, b. Use the Dynamic Multicast Optimization (DMO) Threshold field to set the maximum number of
high-throughput stations in a multicast group. 6. Click Apply to save your changes.

205 | IPv6 Support

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the CLI
To verify the DMO configuration, execute the following command: (host) #show wlan virtual-ap
Limitations
The following are the MLDv2 limitations: l Controller cannot route multicast packets. l For mobility clients mld proxy should be used. l VLAN pool scenario stream is forwarded to clients in both the VLANs even if the client from one of the
VLANs is subscribed. l Dynamic Multicast Optimization is applicable for wired clients in controllers.
Debugging an IPv6 Controller
ArubaOS provides the following debug commands for IPv6: l show ipv6 global -- displays if IPv6 is enabled globally or not l show ipv6 interface -- displays the configured IPv6 address, and any duplicate addresses l show ipv6 route/show datapath route ipv6 -- displays the IPv6 routing information l show ipv6 ra status -- displays the Router Advertisement status l show Datapath session ipv6 -- displays the IPv6 sessions created, and the sessions that are allowed l show datapath frame -- displays the IPv6 specific counters You can also use the debug options such as ping and tracepath for IPv6 hosts. You can either use the WebUI or the CLI to use the ping and tracepath options.
In the WebUI
1. To ping an IPv6 host, navigate to the Diagnostics > Network > Ping page, enter an IPv6 address, and click Ping.
2. To trace the path of an IPv6 host, navigate to the Diagnostics > Network > Tracepath page, enter an IPv6 address, and click Trace.
In the CLI
To ping an IPv6 host: (host)#ping ipv6 <global-ipv6-address> (host)#ping ipv6 interface vlan <vlan-id> <linklocal-address> To trace the path of an IPv6 host: (host)#tracepath <global-ipv6-address>
Provisioning an IPv6 AP
You can provision an IPv6 AP on an IPv6 controller. You can either configure a static IP address or obtain a dynamic IPv6 address via stateless-autoconfig. The controller can act as the default gateway for the IPv6 clients, if static IPv6 routes are set on the controller.
Starting from ArubaOS 6.3, a wired client can connect to the Ethernet interface of an IPv6 enabled AP.
You can provision an IPv6 AP using the WebUI or CLI.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IPv6 Support | 206

In the WebUI
1. Navigate to the Configuration > AP Installation> Provision page and select the Provisioning tab. 2. Select an AP and click Provision. 3. Under the Master Discovery section, enter the host controller IP address and the IPv6 address of the
master controller. 4. To provision a static IP, select the Use the following IP address check box under the IP Settings section,
and enter the following details: l IPv6 Address/Prefix-lengths l Gateway IPv6 Address l DNS IPv6 Address
Ensure that CPSEC is disabled before rebooting the AP.
5. Click Apply and Reboot to bring the IPv6 AP up.
In the CLI
To provision a static IPv6 address: (host)(config)# provision-ap
Enhancements to IPv6 Support on AP
This release of ArubaOS provides the following IPv6 enhancements on the AP: l DNS based ipv6 controller discovery l FTP support for image upgrade in an IPv6 network l DHCPv6 client support

Filtering an IPv6 Extension Header (EH)
ArubaOS firewall is enhanced to process the IPv6 Extension Header (EH) to enable IPv6 packet filtering. You can now filter the incoming IPv6 packets based on the EH type. You can edit the packet filter options in the default EH, using the CLI. The default EH alias permits all EH types. Execute the following commands to permit or deny the IPv6 packets matching an EH type: (host)(config) #netexthdr default (host)(config-exthdr) #eh <eh-type> permit | deny To view the EH types denied: (host) (config-exthdr) #show netexthdr default
Configuring a Captive Portal over IPv6
IPv6 is now enabled on the captive portal for user authentication on the Dell controller. For user authentication, use the internal captive portal that is initiated from the controller. A new parameter captive has been added to the IPv6 captive portal session ACL:
(host) (config) #ipv6 user alias controller 6 svc-https captive
This release does not support external captive portal for IPv6. The captive portal authentication, customization of pages, and other attributes are same as IPv4.

207 | IPv6 Support

Dell Networking W-Series ArubaOS 6.4.x | User Guide

You can configure captive portal over IPv6 (similar to IPv4) using the WebUI or CLI. For more information on configuration, see Configuring Captive Portal in the Base Operating System on page 373.
Working with IPv6 Router Advertisements (RAs)
ArubaOS enables the controllers to send router advertisements (RA) in an IPv6 network. Each host auto generates a link local address when you enable ipv6 on the host. The link local address allows the host to communicate between the nodes attached to the same link. The IPv6 stateless autoconfiguration mechanism allows the host to generate its own addresses using a combination of locally available information and information advertised by the routers. The host sends a router solicitation multicast request for its configuration parameters in the IPv6 network. The source address of the router solicitation request can be an IP address assigned to the sending interface, or an unspecified address if no address is assigned to the sending interface. The routers in the network respond with an RA. The RAs can also be sent at periodic intervals. The RA contains the network part of the Layer 3 IPv6 address (IPv6 Prefix). The host uses the IPv6 prefix provided by the RA; it generates the universally unique host part of the address (interface identifier), and combines the two to derive the complete address. To establish continuous connectivity to the default router, the host starts the neighbor reachability state machine for the router.
ArubaOS uses Radvd, an open source Linux IPv6 Router Advertisement daemon maintained by Litech Systems Design.
You can perform the following tasks on the controller to enable, configure, and view the IPv6 RA status on a VLAN interface: l Configure IPv6 RA on a VLAN l Configure Optional Parameters for RA
n Configure neighbor discovery reachable time n Configure neighbor discovery retransmit time n Configure RA DNS n Configure RA hop-limit n Configure RA interval n Configure RA lifetime n Configure RA managed configuration flag n Configure RA MTU n Configure RA other configuration flag n Configure RA Preference n Configure RA prefix l View IPv6 RA Status
Configuring an IPv6 RA on a VLAN
You must configure the IPv6 RA functionality on a VLAN for it to send solicited/unsolicited router advertisements on the IPv6 network. You must configure the following for the IPv6 RA to be operational on a VLAN: l IPv6 global unicast address l enable IPv6 RA l IPv6 RA prefix

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IPv6 Support | 208

l The advertised IPv6 prefix length must be 64 bits for the stateless address autoconfiguration to be operational. l You can configure up to three IPv6 prefixes per VLAN interface. l Each IPv6 prefix must have an on-link interface address configured on the VLAN. l Ensure you configure the upstream routers to route the packets back to Dell controller.
You can use the WebUI or CLI to configure the IPv6 RA on a VLAN.
Using WebUI
1. Navigate to the Configuration > Network > IP page and select the IP Interfaces tab. 2. Edit a VLAN # and select IP version as IPv6. 3. To configure an IPv6 global unicast address, follow the steps below:
a. Under Details, enter the IPv6 address and the prefix-length in the IP Address/Prefix-length field. b. (Optional) Select the EUI64 Format check box, if applicable. c. Click Add to add the address to the global address list. 4. To enable an IPv6 RA on a VLAN, select the Enable Router Advertisements (RA) check box under Neighbor Discovery. 5. To configure an IPv6 RA prefix for a VLAN, follow the steps below: a. Under Neighbor Discovery, enter an IPv6 prefix in the IPv6 RA Prefix field. b. Click Add to configure an IPv6 prefix for the VLAN. You can add up to three IPv6 prefixes per VLAN interface. 6. Click Apply.
Using CLI
Execute the following commands to configure router advertisements on a VLAN: (host)(config) #interface vlan <vlanid> (host)(config-subif)#ipv6 address <prefix>/<prefix-length> (host)(config-subif)#ipv6 nd ra enable (host)(config-subif)#ipv6 nd ra prefix X:X:X:X::X/64
Configuring Optional Parameters for RAs
In addition to enabling the RA functionality, you can configure the following IPv6 neighbor discovery and RA options on a VLAN: l Neighbor discovery reachable time ­ the time, in milliseconds, that a node assumes a neighbor is reachable
after receiving a reachability confirmation. l Neighbor discovery retransmit time ­ the time, in milliseconds, between retransmitted Neighbor Solicitation
messages. l RA DNS ­ the IPv6 recursive DNS Server for the VLAN.
l On Linux systems, clients must run the open rdnssd daemon to support the DNS server option. l Windows 7 does not support the DNS server option.
l RA hop-limit ­ the IPv6 RA hop-limit value. It is the default value to be placed in the Hop Count field of the IP header for outgoing (unicast) IP packets.
l RA interval ­ the maximum and minimum time interval between sending unsolicited multicast router advertisements from the interface, in seconds.

209 | IPv6 Support

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l RA lifetime ­ the lifetime associated with the default router in seconds. A value of zero indicates that the router is not a default router and will not appear on the default router list. The router lifetime applies only to the router's usefulness as a default router; it does not apply to information contained in other message fields or options.
l RA managed configuration flag (Enable DHCP for address) ­ a flag that indicates that the hosts can use the DHCP server for address autoconfiguration besides using RAs.
l RA maximum transmission unit (MTU) ­ the maximum transmission unit that all the nodes on a link use. l RA other configuration flag (Enable DHCP for other information ­ a flag that indicates that the hosts can use
the administered (stateful) protocol for autoconfiguration of other (non-address) information. l RA preference ­ the preference associated with the default router.
You can use the WebUI or CLI to configure these options.
It is recommended that you retain the default value of the RA interval to achieve better performance.

If you enable RAs on more than 100 VLAN interfaces, some of the interfaces may not send out the RAs at regular intervals.
In the WebUI
1. Navigate to the Configuration > Network > IP page. 2. Select the IP Interfaces tab. 3. Edit the VLAN on which you want to configure the neighbor discovery or RA options. 4. Select IP Version as IPv6. 5. Under Neighbor Discovery, configure the following neighbor discovery and RA options for the VLAN
based on your requirements: a. Enter a value in the Reachable Time field. The allowed range is 0-3,600,000 msec. The default value is
zero. b. Enter a value in the Retransmit Time field. The allowed range is 0-3,600,000 msec.he default value is
zero. c. Enter a DNS server name in the IPv6 Recursive DNS Server field. d. Enter a hop-limit value in the RA hop-limit field. The allowed range is 1-255. The default value is 64. e. Enter the maximum interval value in the RA Interval(sec) field. Allowed range is 4-1800 seconds.
Default value is 600 seconds. f. Enter a value in the RA Minimum Interval(sec) field. Allowed range is 3-0.75 times the maximum RA
interval value in seconds. The default minimum value is 0.33 times the maximum RA interval value g. Enter a value in the RA Lifetime field. A value of zero indicates that the router is not a default router.
Apart from a zero value, the allowed range for the lifetime value is the RA interval time to 9,000 seconds. The default and minimum value is three times the RA interval time. h. Select the DHCP for address check box to enable the hosts to use the DHCP server for address autoconfiguration apart from any addresses auto configured using the RA. i. Enter a value in the RA MTU Option option. The allowed range is 1,280-maximum MTU allowed for the link. j. Select the DHCP for Other Address check box to enable the hosts to use the DHCP server for autoconfiguration of other (non-address) information. k. Select the router preference as High, Medium, or Low. 6. Click Apply.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IPv6 Support | 210

In the CLI
Execute the following CLI commands to configure the neighbor discovery and RA options for a VLAN interface: To configure neighbor discovery reachable time: (host)(config) #interface vlan <vlan-id> (host)(config-subif)#ipv6 nd reachable-time <value> To configure neighbor discovery retransmit time: (host)(config-subif)#ipv6 nd retransmit-time <value> To configure IPv6 recursive DNS server: (host)(config-subif)#ipv6 nd ra dns X:X:X:X::X To configure RA hop-limit: (host)(config-subif)#ipv6 nd ra hop-limit <value> To configure RA interval: (host) (config-subif)#ipv6 nd ra interval <value> <min-value> To configure RA lifetime: (host)(config-subif)#ipv6 nd ra life-time <value> To enable hosts to use DHCP server for stateful address autoconfiguration: (host)(config-subif)#ipv6 nd ra managed-config-flag To configure maximum transmission unit for RA: (host)(config-subif)#ipv6 nd ra mtu <value> To enable hosts to use DHCP server for other non-address stateful autoconfiguration: (host)(config-subif)#ipv6 nd ra other-config-flag To specify a router preference: (host)(config-subif)#ipv6 nd ra preference [High | Low | Medium] To view the IPv6 RA status on the VLAN interfaces: (host) #show ipv6 ra status
RADIUS Over IPv6
ArubaOS provides support for RADIUS authentication server over IPv6. You can configure an IPv6 host or specify an FQDN that can resolve to an IPv6 address for RADIUS authentication. The RADIUS server is in IPv4 mode by default. You must enable the RADIUS server in IPv6 mode to resolve the specified FQDN to IPv6 address.
You can only configure the global IPv6 address as the host for the Radius server in IPv6 mode.

You can configure the IPv6 host for the RADIUS server using the WebUI or CLI.
In the CLI
You must enable the enable-ipv6 parameter to configure the RADIUS server in IPv6 mode. (host)(config) #aaa authentication-server radius IPv6 (host)(RADIUS Server "IPv6") #enable-ipv6 Configure an IPv6 address as the host for RADIUS server using the following command: (host)(RADIUS Server "IPv6") #host <ipv6-address>

211 | IPv6 Support

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The <host> parameter can also be a fully qualified domain name that can resolve to an IPv6 address. To resolve FQDN, you must configure the DNS server name using the ip name-server <ip4addr> command.

You can configure an IPv6 address for the NAS-IP parameter using the following CLI command: (host) (RADIUS Server "Ipv6") #nas-ip6 <IPv6 address>
You can configure an IPv6 address for the Source Interface parameter using the following CLI command: (host) (RADIUS Server "Ipv6") # source-interface vlan <vland-id> ip6addr <ip6addr>
Use the following CLI command to configure an IPv6 address for the global NAS IP which the controller uses to communicate with all the RADIUS servers: (host) (config) #ipv6 radius nas-ip6 <IPv6 address>
You can also configure an IPv6 global source-interface for all the RADIUS server requests using the following commands: (host)(config) #ipv6 radius source-interface loopback (host)(config) #ipv6 radius source-interface vlan <vlan-id> <ip6addr>
In the WebUI
To configure an IPv6 host for a RADIUS server: 1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select RADIUS Server to display the RADIUS server List. 3. Select the required RADIUS server from the list to go to the Radius server page. 4. To enable the RADIUS server in IPv6 mode select the Enable IPv6 check box. 5. To configure an IPv6 host for the selected RADIUS server specify an IPv6 address or an FQDN in the Host
field. 6. Click Apply. To configure an IPv6 address for the NAS-IP: 1. Select the Advanced tab. 2. Specify an IPv6 address in the NAS IPv6 field. 3. Click Apply. To configure an IPv6 global source-interface: 1. Select the Advanced tab. 2. To configure the IPv6 loopback interface as the source interface, select loopback from the Source
Interface v6 drop-down list. 3. To configure a VLAN interface as the source interface, specify the VLAN interface and the IPv6 address in
the Source Interface v6 field. 4. Click Apply.

TACACS Over IPv6
ArubaOS provides support for TACACS authentication server over IPv6. You can configure the global IPv6 address as the host for TACACS authentication using CLI or WebUI.
In the CLI
(host)(config) #aaa authentication-server tacacs IPv6

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IPv6 Support | 212

(host)(TACACS Server "IPv6") #host <ipv6-address>
In the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. SelectTACACS Server to display the Server List. 3. Select the required server from the list to go to the TACACS server page. 4. To configure an IPv6 host for the selected server, specify an IPv6 address in the Host field. 5. Click Apply.
DHCPv6 Server
The DHCPv6 server enables network administrators to configure stateful/stateless options and manage dynamic IPv6 users connecting to a network. You can also configure domain name server using DHCPv6. You can configure IPv6 pools with various configurations such as lease duration, DNS server, vendor specific options, and user defined options using DHCPv6. You can also exclude IPv6 addresses from subnets. Controller IPv6 addresses, VLAN interface IPv6 addresses, and DNS server addresses are excluded from use by default. Similar to DHCPv4, a DHCPv6 server pool is associated with a VLAN only through the IPv6 address configured in that VLAN interface. A VLAN interface can have a maximum of three global unicast addresses, but only one DHCPv6 pool. DHCPv6 server supports stateless configuration of clients with options apart from the network addresses described in RFC 3736.
Points to Remember
l Similar to IPv4, the default router configuration is not required for IPv6 pools as IPv6 compliant routers will send RAs. The RA source address will be the default-gateway for the clients.
l ArubaOS does not support DHCPv6 relay and Hospitality feature on DHCPv6.
DHCP Lease Limit
The following table provides the maximum number of DHCP leases (both v4 and v6) supported per controller platform:
There is a new enforcement to the existing DHCP limit during configuration.

Table 37: DHCP Lease Limits

Platform W-620 W-650 W-3200

Maximum number of DHCP Leases Supported 256 512 512

213 | IPv6 Support

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Platform W-6000M3 W-3400 W-3600 W-7005 W-7010 W-7030 W-7210 W-7220 W-7240

Maximum number of DHCP Leases Supported 512 512 512 512 1024 2048 5120 10240 15360

Configuring DHCPv6 Server
You must enable the global DHCPv6 knob for the DHCPv6 functionality to be operational. You can enable and configure DHCPv6 server using the WebUI or CLI.
In the WebUI
1. Navigate to Configuration > Network > IP page and select the DHCP Server tab. 2. Select the IPv6 DHCP Server check box to enable DHCPv6 globally. 3. If there are addresses that should not be assigned in the subnetwork:
a. Under Excluded Address Range, click Add to create a list of IPv6 excluded address. b. Enter the excluded IPv6 address range in IPv6 Excluded Range and click Done. The specified address
range gets added to the IPv6 Excluded Address list box. The starting IP address in the Exclude Address Range should always contain a unique value, if the IP address is already present, then the existing IP address is replaced with a new one, and a warning is displayed. c. Click Apply. 4. Under Pool Configuration, click Add to create a new DHCP server pool or click Edit to modify an existing DHCP server pool.
To enable the DHCPv6 Server functionality on an interface, select the IP Interfaces tab, edit the VLAN interface, and select a DHCP pool from the drop-down list under the DHCP server section. Ensure that the IP version of the VLAN interface is IPv6.
5. Select IP Version as IPv6 to create a DHCPv6 pool. 6. Enter a name in Pool Name to configure an IPv6 pool name. 7. Enter an IPv6 address in DNS Servers to configure an IPv6 DNS server.
To configure multiple DNS servers, enter the IPv6 addresses separated by space.

8. Enter a value in Domain Name to configure the domain name.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IPv6 Support | 214

9. Enter the number of days, hours, minutes, and seconds in Lease to configure the lease time. The default value is 12 hours.
10.Specify an IPv6 prefix in Network to configure an IPv6 network. 11.Enter the following details under Option to configure client specific DHCPv6 options.
a. Specify the option code in Option. b. Select IP or text from the IP/Text drop-down list. c. Enter a value in Value. If you selected IP in step b, then you must enter a valid IPv6 address in this field. d. Click Add. 12.Click Apply.
In the CLI
To enable the DHCPv6 service you can use the following command: (host)(config) #service dhcpv6 To configure a domain name server, execute the following commands: (host)(config) #ipv6 dhcp pool <pool-name> (host)(config-dhcpv6)#dns-server <ipv6-address> To configure a domain name, use the following command: (host)(config-dhcpv6)#domain-name <domain> To configure DHCPv6 lease time, use the following command: (host)(config-dhcpv6)#lease <days> <hours> <minutes> <seconds> The default value is 12 hours. To configure a DHCP network, use the following command: (host)(config-dhcpv6)#network <network-prefix> To configure a client specific option, use the following command: (host)(config-dhcpv6)#option <code> [ip <ipv6-address> | text <string>] To configure DHCP server preference, use the following command: (host)(config-dhcpv6)#preference <value> To enable DHCPv6 Server functionality on an interface, use the following command: (host) (config) #interface vlan <vlan-id> (host) (config-subif) #ipv6 dhcp server <pool-name>
The configured DHCPv6 pool subnet must match the interface prefix for DHCPv6 Server to be active.

To configure the IPv6 excluded address range for the DHCPv6 server, use the following command: (host)(config)#ipv6 dhcp excluded-address <low-address> [<high-address>] You can view the DHCPv6 server settings, statistics, and binding information using the CLI. To view the DHCPv6 database, use the following command: (host)#show ipv6 dhcp database You can also view the DHCPv6 database for a specific pool, use the following command: (host) (config) #show ipv6 dhcp database [pool <pool-name>] (host) (config) #show ipv6 dhcp database pool DHCPv6 To view the DHCPv6 binding information, use the following command: (host)# show ipv6 dhcp binding

215 | IPv6 Support

Dell Networking W-Series ArubaOS 6.4.x | User Guide

To clear all the DHCPv6 bindings, use the following command: (host)# clear ipv6 dhcp binding
To view the DHCPv6 server statistics, use the following command: (host)(config) #show ip dhcp statistics
To view the DHCPv6 active pools, use the following command: (host) #show ipv6 dhcp active-pools
Understanding ArubaOS Supported Network Configuration for IPv6 Clients
ArubaOS provides wired or wireless clients using IPv6 addresses with services such as firewall functionality, layer-2 authentication, and, with the installation of the Policy Enforcement Firewall Next Generation (PEFNG), identity-based security. The Dell controller does not provide routing or Network Address Translation to IPv6 clients (see Understanding IPv6 Exceptions and Best Practices on page 223).
Supported Network Configuration
Clients can be wired or wireless and use IPv4 and/or IPv6 addresses. An external IPv6 router is recommended for a complete routing experience (dynamic routing). You can use the WebUI or CLI to display IPv6 client information. On the controller, you can configure both IPv4 and IPv6 client addresses on the same VLAN.
Understanding the Network Connection Sequence for Windows IPv6 Clients
This section describes the network connection sequence for Windows Vista/XP clients that use IPv6 addresses, and the actions performed by the AP and the controller. 1. The IPv6 client sends a Router Solicit message through the AP. The AP passes the Router Solicit message
from the IPv6 client through the GRE tunnel to the controller. 2. The controller removes the 802.11 frame and creates an 802.3 frame for the Router Solicit message.
a. The controller authenticates the user, applies firewall policies, and bridges the 802.3 frame to the IPv6 router.
b. The controller creates entries in the user and session tables. 3. The IPv6 router responds with a Router Advertisement message. 4. The controller applies firewall policies, then creates an 802.11 frame for the Router Advertisement message.
The controller sends the Router Advertisement through the GRE tunnel to the AP. 5. The IPv6 client sends a Neighbor Solicitation message. 6. The IPv6 router responds with a Neighbor Advertisement message. 7. If the DHCP is required to provide IPv6 addresses, the DHCPv6 process is started. 8. The IPv6 client sends data. 9. The controller removes the 802.11 frame and creates an 802.3 frame for the data.
The controller authenticates the user, applies firewall policies and bridges the 802.3 frame to the IPv6 router. The controller creates entries in the user and session tables.
A client can have an IPv4 address and an IPv6 address, but the controller does not relate the states of the IPv4 and the IPv6 addresses on the same client. For example, if an IPv6 user session is active on a client, the controller will delete an IPv4 user session on the same client if the idle timeout for the IPv4 session is reached.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IPv6 Support | 216

Understanding ArubaOS Authentication and Firewall Features that Support IPv6
This section describes ArubaOS features that support IPv6 clients.
Understanding Authentication
This release of ArubaOS only supports 802.1x authentication for IPv6 clients. You cannot configure layer-3 authentications to authenticate IPv6 clients.

Table 38: IPv6 Client Authentication

Authentication Method

Supported for IPv6 Clients?

802.1x

Yes

Stateful 802.1x (with non-Dell APs) Yes

Local database

Yes

Captive Portal

Yes

VPN

No

xSec

No (not tested)

MAC-based

Yes

You configure 802.1x authentication for IPv6 clients in the same way as for IPv4 client configurations. For more information about configuring 802.1x authentication on the controller, see 802.1X Authentication on page 326.
This release does not support authentication of management users on IPv6 clients.

Working with Firewall Features
If you installed a Policy Enforcement Firewall Next Generation (PEFNG) license in the controller, you can configure firewall functions for IPv6 client traffic. While these firewall functions are identical to firewall functions for IPv4 clients, you need to explicitly configure them for IPv6 traffic. For more information about firewall policies, see Understanding Global Firewall Parameters on page 452.
Voice-related and NAT firewall functions are not supported for IPv6 traffic.

217 | IPv6 Support

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 39: IPv6 Firewall Parameters

Parameter

Description

Monitor Ping Attack (per 30 seconds)

Number of ICMP pings per 30 second, which if exceeded, can indicate a denial of service attack. Valid range is 1-16384 pings per 30 seconds.
Recommended value is 120.
Default: No default

Monitor TCP SYN Attack rate (per 30 seconds)

Number of TCP SYN messages per 30 second, which if exceeded, can indicate a denial of service attack. Valid range is 1-16384 pings per 30 seconds.
Recommended value is 960.
Default: No default

Monitor IP Session Attack (per 30 seconds)

Number of TCP or UDP connection requests per 30 second, which if exceeded, can indicate a denial of service attack. Valid range is 1-16384 requests per 30 seconds.
Recommended value is 960.
Default: No default

Deny Inter User Bridging

Prevents the forwarding of Layer-2 traffic between wired or wireless users. You can configure user role policies that prevent Layer-3 traffic between users or networks but this does not block Layer-2 traffic. This option can be used to prevent traffic, such as Appletalk or IPX, from being forwarded.
Default: Disabled

Deny All IP Fragments

Drops all IP fragments.
NOTE: Do not enable this option unless instructed to do so by a Dell representative.
Default: Disabled

Enforce TCP Handshake Before Allowing Data

Prevents data from passing between two clients until the three-way TCP handshake has been performed. This option should be disabled when you have mobile clients on the network, as enabling this option will cause mobility to fail. You can enable this option if there are no mobile clients on the network.
Default: Disabled

Prohibit IP Spoofing

Enables detection of IP spoofing (where an intruder sends messages using the IP address of a trusted client). When you enable this option, IP and MAC addresses are checked for each ARP request/response. Traffic from a second MAC address using a specific IP address is denied, and the entry is not added to the user table. Possible IP spoofing attacks are logged and an SNMP trap is sent.
Default: Disabled

Prohibit RST Replay Attack

When enabled, closes a TCP connection in both directions if a TCP RST is received from either direction. You should not enable this option unless instructed to do so by a Dell representative.
Default: Disabled

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IPv6 Support | 218

Table 39: IPv6 Firewall Parameters

Parameter

Description

Session Mirror Destination

Destination (IPv4 address or controller port) to which mirrored session packets are sent. You can configure IPv6 flows to be mirrored with the session ACL "mirror" option. This option is used only for troubleshooting or debugging.
Default: N/A

Session Idle Timeout

Set the time, in seconds, that a non-TCP session can be idle before it is removed from the session table. Specify a value in the range 16­259 seconds. You should not set this option unless instructed to do so by a Dell representative.
Default: 30 seconds

Per-packet Logging

Enables logging of every packet if logging is enabled for the corresponding session rule. Normally, one event is logged per session. If you enable this option, each packet in the session is logged. You should not enable this option unless instructed to do so by a Dell representative, as doing so may create unnecessary overhead on the controller.
Default: Disabled (per-session logging is performed)

IPv6 Enable

Enables IPv6 globally.

The following examples configure attack rates and the session timeout for IPv6 traffic.
To configure the firewall function via the WebUI:
1. Navigate to the Configuration > Advanced Services > Stateful Firewall > Global Setting page. 2. Under the IPv6 column, enter the following:
l For Monitor Ping Attack, enter 15 l For Monitor IP Session Attack, enter 25 l For Session Idle Timeout, enter 60 3. Click Apply.
To configure firewall functions using the command line interface, issue the following commands in config mode: ipv6 firewall attack-rate ping 15 ipv6 firewall attack-rate session 25 ipv6 firewall session-idle-timeout 60
Understanding Firewall Policies
A user role, which determines a client's network privileges, is defined by one or more firewall policies. A firewall policy consists of rules that define the source, destination, and service type for specific traffic, and whether you want the controller to permit or deny traffic that matches the rule.
You can configure firewall policies for IPv4 traffic or IPv6 traffic, and apply IPv4 and IPv6 firewall policies to the same user role. For example, if you have employees that use both IPv4 and IPv6 clients, you can configure both IPv4 and IPv6 firewall policies and apply them both to the "employee" user role.
The procedure to configure an IPv6 firewall policy rule is similar to configuring a firewall policy rule for IPv4 traffic, but with some differences. Table 18 describes the required and optional parameters for an IPv6 firewall policy rule.

219 | IPv6 Support

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 40: IPv6 Firewall Policy Rule Parameters

Field

Description

Source (required)

Source of the traffic:
l any: Acts as a wildcard and applies to any source address.
l user: This refers to traffic from the wireless client.
l host: This refers to traffic from a specific host. When this option is chosen, you must configure the IPv6 address of the host. For example, 2002:d81f:f9f0:1000:c7e:5d61:585c:3ab.
l network: This refers to a traffic that has a source IP from a subnet of IP addresses. When you chose this option, you must configure the IPv6 address and network mask of the subnet. For example, 2002:ac10:fe:: ffff:ffff:ffff::.
l alias: This refers to using an alias for a host or network. NOTE: This release does not support IPv6 aliases. You cannot configure an alias for an IPv6 host or network.

Destination (required)

Destination of the traffic, which you can configure in the same manner as Source.

Service (required)

NOTE: Voice over IP services are unavailable for IPv6 policies. Type of traffic:
l any: This option specifies that this rule applies to any type of traffic.
l tcp: Using this option, you configure a range of TCP port(s) to match the rule to be applied.
l udp: Using this option, you configure a range of UDP port(s) to match the rule to be applied.
l service: Using this option, you use one of the pre-defined services (common protocols such as HTTPS, HTTP, and others) as the protocol to match the rule to be applied. You can also specify a network service that you configure by navigating to the Configuration > Advanced Services > Stateful Firewall > Network Services page.
l protocol: Using this option, you specify a different layer 4 protocol (other than TCP/UDP) by configuring the IP protocol value.

Action (required)

The action that you want the controller to perform on a packet that matches the specified criteria.
l permit: Permits traffic matching this rule.
l drop: Drops packets matching this rule without any notification.
NOTE: The only actions for IPv6 policy rules are permit or deny; in this release, the controller cannot perform network address translation (NAT) or redirection on IPv6 packets. You can specify options such as logging, mirroring, or blacklisting (described below).

Log (optional)

Logs a match to this rule. This is recommended when a rule indicates a security breach, such as a data packet on a policy that is meant only to be used for voice calls.

Mirror (optional)

Mirrors session packets to a datapath or remote destination specified in the IPv6 firewall function (see "Session Mirror Destination" in Table 39). If the destination is an IP address, it must be an IPv4 IP address.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IPv6 Support | 220

Table 40: IPv6 Firewall Policy Rule Parameters

Field

Description

Queue (optional)

The queue in which a packet matching this rule should be placed. Select High for higher priority data, such as voice, and Low for lower priority traffic.

Time Range (optional)

Time range for which this rule is applicable. You configure time ranges in the Configuration > Security > Access Control > Time Ranges page.

Black List (optional)

Automatically blacklists a client that is the source or destination of traffic matching this rule. This option is recommended for rules that indicate a security breach where the blacklisting option can be used to prevent access to clients that are attempting to breach the security.

TOS (optional)

Value of type of service (TOS) bits to be marked in the IP header of a packet matching this rule when it leaves the controller.

802.1p Priority (optional)

Value of 802.1p priority bits to be marked in the frame of a packet matching this rule when it leaves the controller.

The following example creates a policy "ipv6-web-only" that allows only web (HTTP and HTTPS) access for IPv6 clients and assigns the policy to the user role "web-guest."
The user role "web-guest" can include both IPv6 and IPv4 policies, although this example only shows configuration of an IPv6 policy.

Creating an IPv6 Firewall Policy
Following the procedure below to create an IPv6 firewall policy via the WebUI.
1. Navigate to the Configuration > Security > Access Control > Policies page. 2. Click Add to create a new policy. 3. Enter ipv6-web-only for the Policy Name. 4. To configure a firewall policy, select Session for Policy Type. 5. Click Add to add a rule that allows HTTP traffic.
a. Under IP Version column, select IPv6. b. Under Source, select network from the drop-down list. c. For Host IP, enter 2002:d81f:f9f0:1000::. d. For Mask, enter 64 as the prefix-length. e. Under Service, select service from the drop-down list. f. Select svc-http from the scrolling list. g. Click Add. 6. Click Add to add a rule that allows HTTPS traffic. a. Under IP Version column, select IPv6. b. Under Source, select network from the drop-down list. c. For Host IP, enter 2002:d81f:f9f0:1000::. d. For Mask, enter 64 as the prefix-length. e. Under Service, select service from the drop-down list.

221 | IPv6 Support

Dell Networking W-Series ArubaOS 6.4.x | User Guide

f. Select svc-https from the scrolling list. g. Click Add.
.
Rules can be reordered using the up and down arrow buttons provided for each rule.
7. Click Apply. The policy is not created until the configuration is applied. To create an IPv6 firewall policy using the command-line interface, issue the following commands in config mode: ip access-list session ipv6-web-only
ipv6 network 2002:d81f:f9f0:1000::/64 any svc-http permit ipv6 network 2002:d81f:f9f0:1000::/64 any svc-https permit
Assigning an IPv6 Policy to a User Role
To assign an IPv6 policy using the WebUI: 1. Navigate to the Configuration > Security > Access Control > User Roles page. 2. Click Add to create a new user role. 3. Enter web-guest for Role Name. 4. Under Firewall Policies, click Add. From Choose from Configured Policies, select the "ipv6-web-only" IPv6
session policy from the list. 5. Click Done to add the policy to the user role. 6. Click Apply. To assign an IPv6 policy to a user role via the command-line interface, issue the following command in config mode: user-role web-guest
access-list session ipv6-web-only position 1
Understanding DHCPv6 Passthrough/Relay
The controller forwards DHCPv6 requests from IPv6 clients to the external IPv6 router. On the external IPv6 router, you must configure the controller's IP address as the DHCP relay. You do not need to configure an IP helper address on the controller to forward DHCPv6 requests.
Managing IPv6 User Addresses
Viewing or Deleting User Entries
To view or delete IPv6 user entries via the WebUI: 1. Navigate to the Monitoring > Controller > Clients page. 2. Click the IPv6 tab to display IPv6 clients. 3. To delete an entry in the IPv6 client display, click the radio button to the left of the client and then click
Disconnect. To view user entries for IPv6 clients using the command line interface, use the show user-table command in enable mode. To delete a user entry for an IPv6 client, access the CLI in config mode and use the aaa ipv6 user delete command. For example: (host)(config) #aaa ipv6 user delete 2002:d81f:f9f0:1000:e409:9331:1d27:ef44

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IPv6 Support | 222

Understanding User Roles
An IPv6 user or a client can inherit the corresponding IPv4 roles. A user or client entry on the user table will contain the user or client's IPv4 and IPv6 entries. After captive-portal authentication, a IPv4 client can acquire a different role. This role is also updated on the client's IPv6 entry in the user table.
Viewing Datapath Statistics for IPv6 Sessions
To view datapath session statistics for individual IPv6 sessions, access the command-line interface in enable mode and issue the command show datapath session ipv6. To display the user entries in the datapath, access the command-line interface in enable mode, and issue the command show datapath user ipv6. For details on each of these commands and the output they display, refer to the Dell Networking W-Series ArubaOS Command Line Reference Guide.

Understanding IPv6 Exceptions and Best Practices
The IPv6 best practices are provided below:
l Ensure that you enable IPv6 globally. l The uplink port must be trusted. This is the same behavior as IPv4. l Ensure that the validuser session ACL does not block IPv6 traffic. l There must not be any ACLs that drop ICMPv6 or DHCPv6 traffic. It is acceptable to drop DHCPv6 traffic if
the deployment uses Stateless Address Auto Configuration (SLAAC) only. l If an external device provides RA:
n It is not recommended to advertise too many prefixes in RA. n The controller supports a maximum of four IPv6 user entries in the user table. If a client uses more than
four IPv6 addresses at a time, the user table is refreshed with the latest four active entries without disrupting the traffic flow. However, this may have some performance impact. l Enable BCMC Optimization under interface VLAN to drop any random IPv6 multicast traffic. DHCPv6, ND, NS, and RA traffic are not dropped when you enable this option.
It is recommended to enable BCMC Optimization only if mDNS traffic is not used in the network, as mDNS traffic gets dropped if this option is enabled.

l It is not recommended to enable preemption on the master redundancy model. If preemption is disabled and if there is a failover, the new primary controller remains the primary controller even when the original master is online again. The new primary controller does not revert to it's original state unless forced by the administrator. Disabling preemption prevents the master from "flapping" between two controllers and allows the administrator to investigate the cause of the outage.
l While selecting a source address, the number of common bits between each source address in the list, is checked from the left most bit. This is followed by selection of the source address that has the maximum number of matching bits with the destination address. If more than one source addresses has the same number of matching bits with the destination address, the kernel selects that source address that is most recently configured on the system. It is essential that the administrator/user configures the network appropriately, if a particular VLAN interface needs to be selected as the source. For example, in case of Dot1x authentication the administrator/user can configure the source interface appropriately so that it is selected for authentication process. For more information on IPv6 source address selection, see RFC 3848.
ArubaOS does not support the following functions for IPv6 clients:
l The controller offers limited routing services to IPv6 clients, so it is recommended to use an external IPv6 router for a complete routing experience (dynamic routing).
l Vo IP ALG is not supported for IPv6 clients.

223 | IPv6 Support

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l Remote AP supports IPv6 clients in tunnel forwarding mode only. The Remote AP bridge and split-tunnel forwarding modes do not support IPv6 clients. Secure Thin Remote Access Point (STRAP) cannot support IPv6 clients.
l IPSec is not supported over IPv6. l IPv6 Auto configuration and IPv6 Neighbor Discovery mechanisms does not apply to IPv6 tunnels. l Tunnel Encapsulation Limit, Tunnel-group, and MTU discovery options on IPv6 tunnels are not supported. l IPSec is not supported in this release, so IPv6 GRE cannot be used for master-local setup.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IPv6 Support | 224

Chapter 6 Link Aggregation Control Protocol
The ArubaOS implementation of Link Aggregation Control Protocol (LACP) is based on the standards specified in 802.3ad. LACP provides a standardized means for exchanging information, with partner systems, to form a Link Aggregation Group (LAG). LACP avoids port channel misconfiguration. Two devices (actor and partner) exchange LACP Data Units (DUs) when forming a LAG. Once multiple ports in the system have the same actor system ID, actor key, partner system ID, and partner key, they belong to the same LAG. The maximum number of supported port-channels is eight. With the introduction of LACP, this number remains the same. A port-channel group (LAG) is created either statically or dynamically through LACP. This chapter contains the following topics: l Understanding LACP Best Practices and Exceptions on page 225 l Configuring LACP on page 226 l LACP Sample Configuration on page 227
For information on configuring LACP on W-AP220 Series and W-AP270 Series access points, see Link Aggregation Support on W-AP220 Series and W-AP270 Series on page 618
Understanding LACP Best Practices and Exceptions
l LACP is disabled by default. l LACP depends on periodical Tx/Rx of LACP Data Units (LACPDUs). Any failure is noticed immediately and
that port is removed from the LAG. l The maximum LAG supported per system is eight groups; each group can be created statically or through
LACP. l Each LAG can have up to eight member ports. l The LAG group identification (ID) range is 0­7 for both static (port-channel) and LACP groups. l When a port is added to a LACP LAG, it inherits the port-channel's properties such as, VLAN membership,
trunk status, and so on. l When a port is added to a LACP LAG, the port's property (like speed) is compared to the existing port
property. If there is a mismatch, the command is rejected. l The LACP commands cannot be configured on a port that is already a member of a static port-channel.
Similarly, if the group assigned in the command lacp group <number> already contains static port members, the command is rejected. l The port uses the group number as its actor admin key. l All ports use long timeout values (90 seconds) by default. l The output of the command show interface port-channel now indicates if the LAG is created by LACP (dynamic) or static configuration. If the LAG is created through LACP, you cannot add or delete any ports under that port channel. All other commands are allowed.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Link Aggregation Control Protocol | 225

Configuring LACP
Two LACP configured devices exchange LACPDUs to form a link aggregation group (LAG). A device is configurable as an active or passive participant. In active mode, the device initiates DUs irrespective of the partner state; passive mode devices respond only to the incoming DUs sent by the partner device. Hence, to form a LAG group between two devices, one device must be an active participant. For detailed information on the LACP commands, see the ArubaOS 6.4.x Command-Line Interface Reference Guide.
In the CLI
LACPDUs exchange their corresponding system identifier/priority along with their port's key/priority. This information determines the LAG of a given port. The LAG for a port is selected based on its keys. The port is placed in that LAG only when its system ID/key and partner's system ID/key matches the other ports in the LAG (if the group has ports).
1. Enable LACP and configure the per-port specific LACP. The group number range is 0­7. lacp group <group_number> mode {active | passive} l Active mode--the interface is in an active negotiating state. LACP runs on any link that is configured to be in the active state. The port in an active mode also automatically initiates negotiations with other ports by initiating LACP packets. l Passive mode--the interface is not in an active negotiating state. LACP runs on any link that is configured in a passive mode. The port in a passive mode responds to negotiations requests from other ports that are in an active mode. Ports in passive mode respond to LACP packets.
A port in a passive mode cannot set up a port channel (LAG group) with another port in a passive mode.

2. Set the timeout for the LACP session. The timeout value is the amount of time that a port-channel interface waits for a LACPDU from the remote system before terminating the LACP session. The default long timeout value is 90 seconds; short is 3 seconds.

lacp timeout {long | short}

3. Set the port priority.

lacp port-priority <priority_value>

The higher the priority value the lower the priority. The range is 1-65535 and the default is 255.

4. View your LACP configuration.

The port uses the group number +1 as the "actor admin key". All the ports use the long timeout value (90 seconds) by default.

(host)#show lacp 0 neighbor

Flags: S - Device is requesting Slow LACPDUs

F - Device is requesting fast LACPDUs

A - Device is in active mode P - Device is in passive mode

Partner's information

---------------------

Port Flags Pri OperKey State Num Dev Id

---- ----- ---- ------- ----- ---- ----------------

FE 1/1 SA

1 0x10

0x45 0x5 00:0b:86:51:1e:70

FE 1/2 SA

1 0x10

0x45 0x6 00:0b:86:51:1e:70

When a port in a LAG is misconfigured (the partner device is different than the other ports), or the neighbor timesout or can not exchange LACPDUs with the partner, the port status is displayed as "DOWN" (see the following example):

(host)#show lacp 0 internal Flags: S - Device is requesting Slow LACPDUs

226 | Link Aggregation Control Protocol

Dell Networking W-Series ArubaOS 6.4.x | User Guide

F - Device is requesting fast LACPDUs A - Device is in active mode P - Device is in passive mode

Port ---FE 1/1 FE 1/2

Flags ----SA SA

Pri AdminKey ---- -------1 0x1 1 0x1

OperKey State Num Status

-------- ----- ---- -------

0x1

0x45 0x2 DOWN

0x1

0x45 0x3 UP

In the WebUI
Access LACP from the Configuration >Network >Port tabs. Use the drop-down list to enter the LACP values.

l LACP Group-- the link aggregation group (LAG) number; the range is 0 to 7. l Mode-- active negotiation state or not in an active negotiation state indicated by the passive option. l Priority--the port priority value; the range is 1-65535 and the default is 255. l Timeout-- time out value for the LACP session. The long default is 90 seconds; the short default is 3
seconds.
For information on configuring LACP on W-AP220 Series and W-AP270 Series access points, see Link Aggregation Support on W-AP220 Series and W-AP270 Series on page 618
LACP Sample Configuration
The following sample configuration is for FastEthernet (FE) port/slot 1/0, 1/1, and 1/2:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Link Aggregation Control Protocol | 227

interface fastethernet 1/0 description "FE1/0" trusted vlan 1-4094 lacp group 0 mode active
! interface fastethernet 1/1
description "FE1/1" trusted vlan 1-4094 lacp timeout short lacp group 0 mode active ! interface fastethernet 1/2 description "FE1/2" trusted vlan 1-4094 lacp group 0 mode passive !

228 | Link Aggregation Control Protocol

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Chapter 7 OSPFv2

OSPFv2 (Open Shortest Path First) is a dynamic Interior Gateway routing Protocol (IGP) based on IETF RFC 2328. The OSPF uses the shortest or fastest routing path. Dell's implementation of OSPFv2 allows Dell controllers to deploy effectively in a Layer 3 topology. Dell controllers can act as default gateway for all clients and forward user packets to the upstream router. A Dell controller can be used for Instant AP VPN termination from the branch office, and the OSPF on the controller can be used to redistribute branch routes into corporate OSPF domain. The information on this chapter is in the following sections:
l Understanding OSPF Deployment Best Practices and Exceptions on page 229 l Understanding OSPFv2 by Example using a WLAN Scenario on page 230 l Understanding OSPFv2 by Example using a Branch Scenario on page 231 l Configuring OSPF on page 232 l Sample Topology and Configuration on page 234

Understanding OSPF Deployment Best Practices and Exceptions
OSPF is a robust routing protocol addressing various link types and deployment scenarios. The Dell implementation applies to two main use cases; WLAN Scenarios and Branch Scenario.
l OSPF is disabled by default. l Dell controllers support only one OSPF instance. l Convergence takes between 5 and 15 seconds. l All area types are supported. l Multiple configured areas are supported. l A Dell controller can act as an ABR (Area border router). l OSPF supports VLAN and GRE tunnel interfaces. l To run OSPF over IPSec tunnels, a Layer 3 GRE tunnel is configured between two routers with GRE
destination addresses as the inner address of the IPsec tunnel. OSPF is enabled on the Layer 3 GRE tunnel interface, and all of the OSPF control packets undergo GRE encapsulation before entering the IPsec tunnels. The default MTU value for a Layer 3 GRE tunnel in a Dell controller is 1100. When running OSPF over a GRE tunnel between a Dell controller and another vendor's router, the MTU values must be the same on both sides of the GRE tunnel. The following table provides information on the maximum OSPF routes supported for various platforms:

Table 41: Maximum OSPF Routes

Platform

Branches

W-3600

8K

W-6000M3

8K

W-7210

8K

Routes 8K 8K 8K

Dell Networking W-Series ArubaOS 6.4.x| User Guide

OSPFv2 | 229

Platform W-7220 W-7240

Branches 16K 32K

Routes 16K 32K

Below are some guidelines regarding deployment and topology for this release of OSPFv2.
l In the WLAN scenario, configure the Dell controller and all upstream routers in totally stub area; in the Branch scenario, configure as stub area so that the Branch controller can receive corporate subnets.
l In the WLAN scenario upstream router, only configure the interface connected to the controller in the same area as the controller. This will minimize the number of local subnet addresses advertised by the upstream router to the controller.
l Use the upstream router as the designated router (DR) for the link/interface between the controller and the upstream router.
l The default MTU value for a Layer 3 GRE tunnel in a Dell controller is 1100. When running OSPF over a GRE tunnel between a Dell controller and another vendor's router, the MTU values must be the same on both sides of the GRE tunnel.
l Do not enable OSPF on any uplink/WAN interfaces on the Branch Controller. Enable OSPF only on the Layer 3 GRE tunnel connecting the master controller.
l Use only one physical port in the uplink VLAN interface that is connecting to the upstream router. This will prevent broadcasting the protocol PDUs to other ports and hence limit the number of adjacencies on the uplink interface to only one.

Understanding OSPFv2 by Example using a WLAN Scenario
In the WLAN scenario, the Dell controller acts as a default gateway for all the clients, and talks to one or two upstream routers for redundancy. The controller advertises all the user subnet addresses as stub addresses to the routers via LSAs.
Totally stub areas see only default route and to the areas themselves.

WLAN Topology
The controller is configured with VLAN 10 and VLAN 12 as user VLANs. These VLANs have clients on the subnets, and the controller is the default router for those clients. VLAN 4 and VLAN 5 both have OSPF enabled. These interfaces are connected to upstream routers (Router 1 and Router 2). The OSPF interface cost on VLAN 4 is configured lower than VLAN 5. The IDs are: l Dell controller-- 40.1.1.1 l Router 1-- 50.1.1.1 l Router 2-- 60.1.1.1 Based on the cost of the uplink interface, the default route from one of the upstream routers is installed in the forwarding information base (FIB) by the routing information base/route table manager (RIB/RTM) module.
WLAN Routing Table
View the controller routing table using the show ip route command: (host)#show ip route

230 | OSPFv2

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Codes: C - connected, O - OSPF, R - RIP, S - static M - mgmt, U - route usable, * - candidate default
Below is the routing table for Router 1: (router1) #show ip route
O 10.1.1.0/24 [1/0] via 4.1.1.1 O 12.1.1.0/24 [1/0] via 4.1.1.1 C 4.1.1.0 is directly connected, VLAN4 Below is the routing table for Router 2: (router2) #show ip route
O 10.1.1.0/24 [2/0] via 5.1.1.1 O 12.1.1.0/24 [2/0] via 5.1.1.1 C 5.1.1.0 is directly connected, VLAN5
Understanding OSPFv2 by Example using a Branch Scenario
The branch office scenario has a number of remote branch offices with controllers talking to a central office via a concentrator/controller using site-to-site VPN tunnels or master-local IPsec tunnels. The central office controller is in turn talking to upstream routers (see Figure 35). In this scenario, the default route is normally pointed to the uplink router, in many cases the ISP. Configure the area as stub so that inter-area routes are also advertised enabling the branch office controller to reach the corporate subnets.
Branch Topology
All the OSPF control packets exchanged between the Branch and the central office controllers undergo GRE encapsulation before entering the IPsec tunnels. The controllers in the branch offices advertise all the user subnet addresses to the Central office controller as stub addresses in router LSA. The central office controller in turn forwards those router LSAs to the upstream routers.
Figure 35 Branch OSPF Topology

All the branch office controllers, the Central office controller, and the upstream routers are part of a stub area. Because the OSPF packets follow GRE encapsulation over IPsec tunnels, the Central office controller can be a controller or any vendor's VPN concentrator. Regardless, the controller in the branch office will operate with other vendors seamlessly.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

OSPFv2 | 231

In Figure 35, the branch office controller is configured using VLAN 14 and VLAN 15. Layer 3 GRE tunnel is configured with IP address 20.1.1.1/24 and OSPF is enabled on the tunnel interface. In the Central office controller, OSPF is enabled on VLAN interfaces 4, 5, and the Layer 3 GRE tunnel interface (configured with IP address 20.1.1.2/24). OSPF interface cost on VLAN 4 is configured lower than VLAN 5.
Branch Routing Table
View the branch office controller routing table using the show ip route command: (host)#show ip route
Codes: C - connected, O - OSPF, R - RIP, S - static M - mgmt, U - route usable, * - candidate default
The routing table for the central office controller is below: (host)#show ip route
Gateway of last resort is 4.1.1.2 to network 0.0.0.0
O* 0.0.0.0/0 [1/0] via 4.1.1.2* O 14.1.1.0/24 [1/0] via 30.1.1.1* O 15.1.1.0/24 [1/0] via 30.1.1.1* C 4.1.1.0 is directly connected, VLAN4 C 5.1.1.0 is directly connected, VLAN5 C 20.1.1.0 is directly connected, Tunnel 1 The routing table for Router 1 is below: (router1) #show ip route
O 14.1.1.0/24 [1/0] via 4.1.1.1 O 15.1.1.0/24 [1/0] via 4.1.1.1 C 4.1.1.0 is directly connected, VLAN4 The routing table for Router 2 is below: (router2) #show ip route
O 14.1.1.0/24 [1/0] via 5.1.1.1 O 15.1.1.0/24 [1/0] via 5.1.1.1 C 5.1.1.0 is directly connected, VLAN5
Configuring OSPF
To configure general OSPF settings from the OSPF tab, perform the following steps: 1. Navigate to the Configuration >IP page (see Figure 36). The Area and Excluded subnets are displayed in
table format. If not explicitly specified for OSPF, the router ID defaults to the switch IP.

232 | OSPFv2

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 36 General OSPF Configuration
2. Click Add to add an area (see Figure 37). Figure 37 Add an OSPF Area
3. Configure the OSPF interface settings in the Configuration screen (Figure 38). If OSPF is enabled, the parameters contain the correct default values. You can edit the OSPF values only when you enable OSPF on the interface.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

OSPFv2 | 233

Figure 38 Edit OSPF VLAN Settings

OSPF monitoring is available from an IP Routing sub-section (Controller > IP Routing > Routing). Both Static and OSPF routes are available in table format. OSPF Interfaces and Neighboring information is available from the OSPF tab. The Interface information includes transmit (TX) and receive (RX) statistics.
Exporting VPN Client Addresses to OSPF
You can configure VPN client addresses so that they can be exported to OSPF and be advertised as host routes (/32). Exporting applies to any VPN client address regardless of how it is assigned.
In the WebUI
1. Navigate to the Configuration > Advanced Services > All Profiles > VPN Authentication > default page.
2. (Optional) Regardless of how an authentication server is contacted, the Export VPN IP address as a route option causes any VPN client address to be exported to OSPF using IPC. Note that the Framed-IPAddress attribute is assigned the IP address as long as any server returns the attribute. The Framed-IPAddress value always has a higher priority than the local address pool.
3. Click Apply.
In the CLI
(host) (config) #aaa authentication vpn default (host) (VPN Authentication Profile "default") # (host) (VPN Authentication Profile "default") # export-route Use the show ip ospf database command to show LSA types that are generated.
Sample Topology and Configuration
The figure below displays a sample OSPF topology followed by sample configurations of the Remote Branch 1, Remote Branch 2, and the W-3200 Central Office Controller (Active and Backup).

234 | OSPFv2

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 39 Sample OSPF Topology

Remote Branch 1
controller-ip vlan 30 vlan 16 vlan 30 vlan 31 vlan 32 interface gigabitethernet 1/0
description "GE1/0" trusted switchport access vlan 16 ! interface gigabitethernet 1/1 description "GE1/1" trusted switchport access vlan 30 !
interface gigabitethernet 1/2 description "GE1/2" trusted switchport access vlan 31
! interface gigabitethernet 1/3
description "GE1/3" trusted switchport access vlan 32 ! interface vlan 16 ip address 192.168.16.251 255.255.255.0
Dell Networking W-Series ArubaOS 6.4.x | User Guide

OSPFv2 | 235

! interface vlan 30
ip address 192.168.30.1 255.255.255.0 ! interface vlan 31
ip address 192.168.31.1 255.255.255.0 ! interface vlan 32
ip address 192.168.32.1 255.255.255.0 ! uplink wired priority 202 uplink cellular priority 201 uplink wired vlan 16 interface tunnel 2003
description "Tunnel Interface" ip address 2.0.0.3 255.0.0.0 tunnel source 192.168.30.1 tunnel destination 192.168.68.217 trusted ip ospf area 10.10.10.10 ! ip default-gateway 192.168.16.254 ip route 192.168.0.0 255.255.0.0 null 0 ! router ospf router ospf router-id 192.168.30.1 router ospf area 10.10.10.10 stub router ospf redistribute vlan 30-32
Remote Branch 2
controller-ip vlan 50 ! vlan 20 vlan 50 vlan 51 vlan 52 ! interface gigabitethernet 1/0
description "GE1/0" trusted switchport access vlan 20 ! interface gigabitethernet 1/1 description "GE1/1" trusted switchport access vlan 50 ! interface gigabitethernet 1/2 description "GE1/2" trusted switchport access vlan 51 ! interface gigabitethernet 1/3 description "GE1/3" trusted switchport access vlan 52 ! interface vlan 20 ip address 192.168.20.1 255.255.255.0 ! interface vlan 50
236 | OSPFv2

Dell Networking W-Series ArubaOS 6.4.x | User Guide

ip address 192.168.50.1 255.255.255.0 ! interface vlan 51
ip address 192.168.51.1 255.255.255.0 ! interface vlan 52
ip address 192.168.52.1 255.255.255.0 ! uplink wired priority 206 uplink cellular priority 205 uplink wired vlan 20 interface tunnel 2005
description "Tunnel Interface" ip address 2.0.0.5 255.0.0.0 tunnel source 192.168.50.1 tunnel destination 192.168.68.217 trusted ip ospf area 10.10.10.10 ! ip default-gateway 192.168.20.254 ip route 192.168.0.0 255.255.0.0 null 0 ! router ospf router ospf router-id 192.168.50.1 router ospf area 10.10.10.10 stub router ospf redistribute vlan 50-52
W-3200 Central Office Controller--Active
localip 0.0.0.0 ipsec db947e8d1b383813a4070ab0799fa6246b80fc5cfcc3268f controller-ip vlan 225 vlan 68 vlan 100 vlan 225 ! interface gigabitethernet 1/0
description "GE1/0" trusted switchport access vlan 225 ! interface gigabitethernet 1/1 description "GE1/1" trusted switchport access vlan 100 ! interface gigabitethernet 1/2 description "GE1/2" trusted switchport access vlan 68 ! interface vlan 68 ip address 192.168.68.220 255.255.255.0 ! interface vlan 100 ip address 192.168.100.1 255.255.255.0 ! interface vlan 225 ip address 192.168.225.2 255.255.255.0 ! interface tunnel 2003 description "Tunnel Interface" ip address 2.1.0.3 255.0.0.0
Dell Networking W-Series ArubaOS 6.4.x | User Guide

OSPFv2 | 237

tunnel source 192.168.225.2 tunnel destination 192.168.30.1 trusted ip ospf area 10.10.10.10 ! interface tunnel 2005 description "Tunnel Interface" ip address 2.1.0.5 255.0.0.0 tunnel source 192.168.225.2 tunnel destination 192.168.50.1 trusted ip ospf area 10.10.10.10 ! master-redundancy master-vrrp 2 peer-ip-address 192.168.68.221 ipsec password123 ! vrrp 1 priority 120 authentication password123 ip address 192.168.68.217 vlan 68 preempt tracking vlan 68 sub 40 tracking vlan 100 sub 40 tracking vlan 225 sub 40 no shutdown ! vrrp 2 priority 120 ip address 192.168.225.9 vlan 225 preempt tracking vlan 68 sub 40 tracking vlan 100 sub 40 tracking vlan 225 sub 40 no shutdown ! ip default-gateway 192.168.68.1 ip route 192.168.0.0 255.255.0.0 null 0
router ospf router ospf router-id 192.168.225.1 router ospf area 10.10.10.10 stub router ospf redistribute vlan 100,225 !
W-3200 Central Office Controller--Backup
localip 0.0.0.0 ipsec db947e8d1b383813a4070ab0799fa6246b80fc5cfcc3268f controller-ip vlan 225 ! interface gigabitethernet 1/0
description "GE1/0" trusted switchport access vlan 225 ! interface gigabitethernet 1/1 description "GE1/1" trusted switchport access vlan 100 !

238 | OSPFv2

Dell Networking W-Series ArubaOS 6.4.x | User Guide

interface gigabitethernet 1/2 description "GE1/2" trusted switchport access vlan 68
! interface vlan 68
ip address 192.168.68.221 255.255.255.224 ! interface vlan 100
ip address 192.168.100.5 255.255.255.0 ! interface vlan 225
ip address 192.168.225.1 255.255.255.0 ! interface tunnel 2003
description "Tunnel Interface" ip address 2.1.0.3 255.0.0.0 tunnel source 192.168.225.1 tunnel destination 192.168.30.1 trusted ip ospf area 10.10.10.10 ! interface tunnel 2005 description "Tunnel Interface" ip address 2.1.0.5 255.0.0.0 tunnel source 192.168.225.1 tunnel destination 192.168.50.1 trusted ip ospf area 10.10.10.10 ! master-redundancy master-vrrp 2 peer-ip-address 192.168.68.220 ipsec password123 ! vrrp 1 priority 99 authentication password123 ip address 192.168.68.217 vlan 68 tracking vlan 68 sub 40 tracking vlan 100 sub 40 tracking vlan 225 sub 40 no shutdown ! vrrp 2 priority 99 ip address 192.168.225.9 vlan 225 tracking vlan 68 sub 40 tracking vlan 100 sub 40 tracking vlan 225 sub 40 no shutdown ! ip default-gateway 192.168.68.1 ip route 192.168.0.0 255.255.0.0 null 0 ! router ospf router ospf router-id 192.168.225.1 router ospf area 10.10.10.10 stub router ospf redistribute vlan 100,225 !
Dell Networking W-Series ArubaOS 6.4.x | User Guide

OSPFv2 | 239

The following figure displays how the controller is configured for Instant AP VPN for different OSPF cases.

Topology
l Area-10 is NSSA (Not-So-Stubby Area) l Area-11 is Normal area. l RAPNG AP-1 is configured to have a 3600-UP controller as its primary controller and a 3600-DOWN as
secondary controller. l RAPNG AP-2 is configured to have a 3600-DOWN as its primary controller and a 3600-UP as secondary
controller. l RAPNG AP-1 is configured to have a 201.201.203.0/24 L3-distributed network. l RAPNG AP-2 is configured to have a 202.202.202.0/24 L3-distributed network.
Observation
l W-3600-UP Controller will send Type-5 LSA (External LSA) of VPN route 201.201.203.0/24 to it's upstream router, Cisco-3750.
l W-3600-DOWN Controller will send Type-7 LSA (NSSA) of VPN route 202.202.202.0/24 to it's upstream router, Cisco-2950.
l W-3600-UP Controller will send a Type-4 asbr-summary LSA.
Configuring W-3600-UP Controller
interface vlan 21 ip address 21.21.21.2 255.255.255.0 ip ospf area 0.0.0.11 ! router ospf router ospf area 0.0.0.11 router ospf redistribute rapng-vpn !

240 | OSPFv2

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The following commands displays the configuration and run time protocol details on W-3600-UP Controller:
(host)#show ip route Codes: C - connected, O - OSPF, R - RIP, S - static M - mgmt, U - route usable, * - candidate default, V - RAPNG VPN Gateway of last resort is Imported from DHCP to network 0.0.0.0 at cost 10 Gateway of last resort is Imported from CELL to network 0.0.0.0 at cost 10 Gateway of last resort is Imported from PPPOE to network 0.0.0.0 at cost 10 Gateway of last resort is 10.15.231.185 to network 0.0.0.0 at cost 1 S* 0.0.0.0/0 [1/0] via 10.15.231.185* O 10.15.228.0/27 [333/0] via 21.21.21.1* O 12.12.12.0/25 [0/0] via 21.21.21.1* O 22.22.22.0/24 [3/0] via 21.21.21.1* O 23.23.23.0/24 [2/0] via 21.21.21.1* O 25.25.25.0/24 [333/0] via 21.21.21.1* S 192.100.3.0/24 [1/0] via 192.100.2.1* S 192.100.4.0/24 [1/0] via 192.100.2.1* S 192.100.5.0/24 [1/0] via 192.100.2.1* S 192.100.6.0/24 [1/0] via 192.100.2.1* S 192.100.7.0/24 [1/0] via 192.100.2.1* S 192.100.8.0/24 [1/0] via 192.100.2.1* S 192.100.9.0/24 [1/0] via 192.100.2.1* S 192.100.10.0/24 [1/0] via 192.100.2.1* S 192.100.11.0/24 [1/0] via 192.100.2.1* S 192.100.12.0/24 [1/0] via 192.100.2.1* S 192.100.13.0/24 [1/0] via 192.100.2.1* S 192.100.14.0/24 [1/0] via 192.100.2.1* S 192.168.1.0/24 [1/0] via 192.100.2.1* S 192.169.1.0/24 [1/0] via 192.100.2.1* S 192.170.1.0/24 [1/0] via 192.100.2.1* S 192.171.1.0/24 [1/0] via 192.100.2.1* S 192.172.1.0/24 [1/0] via 192.100.2.1* S 192.173.1.0/24 [1/0] via 192.100.2.1* S 192.174.1.0/24 [1/0] via 192.100.2.1* S 192.175.1.0/24 [1/0] via 192.100.2.1* S 192.176.1.0/24 [1/0] via 192.100.2.1* S 192.177.1.0/24 [1/0] via 192.100.2.1* S 192.178.1.0/24 [1/0] via 192.100.2.1* S 192.179.1.0/24 [1/0] via 192.100.2.1* V 201.201.203.0/26 [10/0] ipsec map O 202.202.202.0/29 [0/0] via 21.21.21.1* C 192.100.2.0/24 is directly connected, VLAN2 C 10.15.231.184/29 is directly connected, VLAN1 C 172.16.0.0/24 is directly connected, VLAN3 C 21.21.21.0/24 is directly connected, VLAN21 C 5.5.0.2/32 is an ipsec map 10.15.149.30-5.5.0.2

(host) #show ip ospf database

OSPF Database Table

-------------------

Area ID LSA Type

Link ID

------- --------

-------

0.0.0.11 ROUTER

21.21.21.1

0.0.0.11 ROUTER

192.100.2.3

0.0.0.11 NETWORK

21.21.21.1

0.0.0.11 IPNET_SUMMARY 22.22.22.0

0.0.0.11 IPNET_SUMMARY 23.23.23.0

0.0.0.11 ASBR_SUMMARY 25.25.25.1

0.0.0.11 ASBR_SUMMARY 192.100.2.3

N/A

AS_EXTERNAL

10.15.228.0

N/A

AS_EXTERNAL

12.12.12.0

N/A

AS_EXTERNAL

25.25.25.0

Adv Router ---------21.21.21.1 192.100.2.3 21.21.21.1 21.21.21.1 21.21.21.1 21.21.21.1 192.100.2.3 25.25.25.1 25.25.25.1 25.25.25.1

Age --178 1406 178 178 178 178 1412 1014 268 1761

Seq# ---0x80000017 0x80000007 0x80000003 0x80000003 0x80000003 0x80000003 0x80000002 0x8000000e 0x80000003 0x80000005

Checksum -------0xca50 0x2253 0xdf6d 0x7e38 0x5064 0xefbc 0xa85d 0xea43 0x433a 0x3d8d

Dell Networking W-Series ArubaOS 6.4.x | User Guide

OSPFv2 | 241

N/A

AS_EXTERNAL

201.201.203.0 10.15.231.186 3600 0x80000001 0x6690

N/A

AS_EXTERNAL

201.201.203.0 192.100.2.3

1104 0x80000002 0xe4a2

N/A

AS_EXTERNAL

202.202.202.0 25.25.25.1

268 0x80000003 0x4385

(host) #show ip ospf neighbor

OSPF Neighbor Table

-------------------

Neighbor ID Pri State

Address

----------- --- -----

-------

21.21.21.1 1 FULL/DR 21.21.21.1

Interface --------Vlan

Configuring W-3600-DOWN Controller
interface vlan 22 ip address 22.22.22.2 255.255.255.0 ip ospf area 0.0.0.10 ! router ospf router ospf area 0.0.0.10 nssa router ospf redistribute rapng-vpn !
The following commands displays the configuration and run time protocol details on W-3600-DOWN Controller:
(host)#show ip route Codes: C - connected, O - OSPF, R - RIP, S - static M - mgmt, U - route usable, * - candidate default, V - RAPNG VPN Gateway of last resort is Imported from DHCP to network 0.0.0.0 at cost 10 Gateway of last resort is Imported from CELL to network 0.0.0.0 at cost 10 Gateway of last resort is Imported from PPPOE to network 0.0.0.0 at cost 10 O 0.0.0.0/0 [1/0] via 22.22.22.1* S 10.0.0.0/8 [1/0] via 10.15.231.177* O 10.15.228.0/27 [333/0] via 22.22.22.1* V 12.12.12.0/25 [10/0] ipsec map O 21.21.21.0/24 [3/0] via 22.22.22.1* O 23.23.23.0/24 [2/0] via 22.22.22.1* O 25.25.25.0/24 [333/0] via 22.22.22.1* V 202.202.202.0/29 [10/0] ipsec map C 192.100.2.0/24 is directly connected, VLAN2 C 10.15.231.176/29 is directly connected, VLAN1 C 22.22.22.0/24 is directly connected, VLAN22 C 4.4.0.2/32 is an ipsec map 10.15.149.35-4.4.0.2 C 4.4.0.1/32 is an ipsec map 10.17.87.126-4.4.0.1

(host) #show ip ospf neighbor

OSPF Neighbor Table

-------------------

Neighbor ID Pri State

Address

----------- --- -----

-------

25.25.25.1 1 FULL/BDR 22.22.22.1

Interface --------Vlan 22

(host) #show ip ospf database

OSPF Database Table

-------------------

Area ID LSA Type

Link ID

------- --------

-------

0.0.0.10 ROUTER

25.25.25.1

0.0.0.10 ROUTER

192.100.2.2

0.0.0.10 NETWORK

22.22.22.2

0.0.0.10 IPNET_SUMMARY 21.21.21.0

0.0.0.10 IPNET_SUMMARY 23.23.23.0

Adv Router ---------25.25.25.1 192.100.2.2 192.100.2.2 25.25.25.1 25.25.25.1

Age --1736 500 500 1990 1990

Seq# ---0x80000021 0x80000005 0x80000004 0x80000003 0x80000003

Checksum -------0xb732 0x9ad9 0x8aeb 0xe7bf 0x950d

242 | OSPFv2

Dell Networking W-Series ArubaOS 6.4.x | User Guide

0.0.0.10 0.0.0.10 0.0.0.10 0.0.0.10 0.0.0.10 N/A N/A

NSSA NSSA NSSA NSSA NSSA AS_EXTERNAL AS_EXTERNAL

0.0.0.0 10.15.228.0 12.12.12.0 25.25.25.0 202.202.202.0 12.12.12.0 202.202.202.0

25.25.25.1 25.25.25.1 192.100.2.2 25.25.25.1 192.100.2.2 192.100.2.2 192.100.2.2

725 1228 352 1485 352 352 352

0x80000002 0x80000010 0x80000005 0x80000006 0x80000005 0x80000005 0x80000005

0xaab9 0xca5f 0xe8cb 0x1fa8 0xe817 0x28d8 0x2824

Viewing the Status of Instant AP VPN

RAPNG AP-1

(host)# show vpn status

profile name:default

--------------------------------------------------

current using tunnel

:primary tunnel

ipsec is preempt status

:disable

ipsec is fast failover status

:disable

ipsec hold on period

:600

ipsec tunnel monitor frequency (seconds/packet) :5

ipsec tunnel monitor timeout by lost packet cnt :2

ipsec

primary tunnel crypto type

:Cert

ipsec

primary tunnel peer address

:10.15.231.186

ipsec

primary tunnel peer tunnel ip

:192.100.2.3

ipsec

primary tunnel ap tunnel ip

:5.5.0.2

ipsec

primary tunnel current sm status

:Up

ipsec

primary tunnel tunnel status

:Up

ipsec

primary tunnel tunnel retry times

:2

ipsec

primary tunnel tunnel uptime

:1 hour 24 minutes 50 seconds

ipsec

backup tunnel crypto type

:Cert

ipsec

backup tunnel peer address

:10.15.231.178

ipsec

backup tunnel peer tunnel ip

:0.0.0.0

ipsec

backup tunnel ap tunnel ip

:0.0.0.0

ipsec

backup tunnel current sm status

:Init

ipsec

backup tunnel tunnel status

:Down

ipsec

backup tunnel tunnel retry times

:0

ipsec

backup tunnel tunnel uptime

:0

(host)# show datapath route

Route Table Entries

-------------------

Flags: L - Local, P - Permanent, T - Tunnel, I - IPsec, M - Mobile, A - ARP, D - Drop

IP

Mask

Gateway

Cost VLAN Flags

--------------- --------------- --------------- ---- ---- -----

0.0.0.0

0.0.0.0

10.15.149.25

0

0

0.0.0.0

128.0.0.0

192.100.2.3

0

0T

128.0.0.0

128.0.0.0

192.100.2.3

0

0T

192.168.10.0

255.255.254.0 192.168.10.1

0 3333 D

201.201.203.0 255.255.255.192 0.0.0.0

0 103 LP

10.15.149.24

255.255.255.248 10.15.149.30

0

1L

10.15.231.186 255.255.255.255 10.15.149.25

0

0

Route Cache Entries

-------------------

Flags: L - local, P - Permanent, T - Tunnel, I - IPsec, M - Mobile, A - ARP, D - Drop

IP

MAC

VLAN

Flags

--------------- ----------------- ----------- -----

202.202.202.6 00:00:00:00:00:00

0T

192.100.2.3

00:00:00:00:00:00

0 PT

192.168.10.51 10:40:F3:98:80:94

1 PA

192.168.10.1

00:24:6C:C9:27:A3

3333 LP

201.201.203.8 00:26:C6:52:6B:14

103

201.201.203.1 00:24:6C:C9:27:A3

103 LP

10.1.1.50

00:00:00:00:00:00

0T

Dell Networking W-Series ArubaOS 6.4.x | User Guide

OSPFv2 | 243

5.5.0.2

00:24:6C:C9:27:A3

10.15.149.30

00:24:6C:C9:27:A3

10.15.149.25

00:0B:86:40:93:00

(host)# show clients

Client List

-----------

Name IP Address

MAC Address

Signal Speed (mbps)

---- ----------

-----------

------ ------------

201.201.203.8 00:26:c6:52:6b:14

(good) 6(poor)

Info timestamp

:80259

1 LP 1 LP 1A

OS Network Access Point

Channel Type Role

-- ------- ------------

------- ---- ----

149.30 00:24:6c:c9:27:a3 48-

AN 149.30 43

RAPNG AP-3

(host)# show vpn status

profile name:default

--------------------------------------------------

current using tunnel

:primary tunnel

ipsec is preempt status

:disable

ipsec is fast failover status

:disable

ipsec hold on period

:600

ipsec tunnel monitor frequency (seconds/packet) :5

ipsec tunnel monitor timeout by lost packet cnt :2

ipsec

primary tunnel crypto type

:Cert

ipsec

primary tunnel peer address

:10.15.231.178

ipsec

primary tunnel peer tunnel ip

:192.100.2.2

ipsec

primary tunnel ap tunnel ip

:4.4.0.2

ipsec

primary tunnel current sm status

:Up

ipsec

primary tunnel tunnel status

:Up

ipsec

primary tunnel tunnel retry times

:13

ipsec

primary tunnel tunnel uptime

:1 hour 55 minutes 6 seconds

ipsec

backup tunnel crypto type

:Cert

ipsec

backup tunnel peer address

:10.15.231.186

ipsec

backup tunnel peer tunnel ip

:0.0.0.0

ipsec

backup tunnel ap tunnel ip

:0.0.0.0

ipsec

backup tunnel current sm status

:Init

ipsec

backup tunnel tunnel status

:Down

ipsec

backup tunnel tunnel retry times

:0

ipsec

backup tunnel tunnel uptime

:0

(host)# show datapath route

Route Table Entries

-------------------

Flags: L - Local, P - Permanent, T - Tunnel, I - IPsec, M - Mobile, A - ARP, D - Drop

IP

Mask

Gateway

Cost VLAN Flags

--------------- --------------- --------------- ---- ---- -----

0.0.0.0

0.0.0.0

10.15.149.33

0

0

0.0.0.0

128.0.0.0

192.100.2.2

0

0T

128.0.0.0

128.0.0.0

192.100.2.2

0

0T

192.168.10.0

255.255.254.0 192.168.10.1

0 3333 D

10.15.149.32

255.255.255.248 10.15.149.35

0

1L

202.202.202.0 255.255.255.248 0.0.0.0

0 203 LP

10.15.231.178 255.255.255.255 10.15.149.33

0

0

Route Cache Entries

-------------------

Flags: L - local, P - Permanent, T - Tunnel, I - IPsec, M - Mobile, A - ARP, D - Drop

IP

MAC

VLAN

Flags

--------------- ----------------- ----------- -----

202.202.202.1 00:24:6C:C0:41:F2

203 LP

202.202.202.6 08:ED:B9:E1:51:7B

203

244 | OSPFv2

Dell Networking W-Series ArubaOS 6.4.x | User Guide

192.100.2.2 192.168.10.1 201.201.203.8 10.1.1.50 192.168.11.7 4.4.0.2 10.13.6.110 10.15.149.38 10.15.149.35 10.15.149.33

00:00:00:00:00:00 00:24:6C:C0:41:F2 00:00:00:00:00:00 00:00:00:00:00:00 00:26:C6:52:6B:14 00:24:6C:C0:41:F2 00:00:00:00:00:00 00:24:6C:C9:27:CC 00:24:6C:C0:41:F2 00:0B:86:40:93:00

(host)# show clients

Client List

-----------

Name IP Address

MAC Address

Signal Speed (mbps)

---- ----------

-----------

------ ------------

202.202.202.6 08:ed:b9:e1:51:7b

(good) 48(poor)

Info timestamp

:80748

0 PT 3333 LP
0T 0T 1 PA 1 LP 0T 1A 1 LP 1A

OS Network Access Point

Channel Type Role

-- ------- ------------

------- ---- ----

149.35 00:24:6c:c0:41:f2 48-

AN 149.35 53

Dell Networking W-Series ArubaOS 6.4.x | User Guide

OSPFv2 | 245

Chapter 8 Tunneled Nodes
This chapter describes how to configure a Dell tunneled node, also known as a wired tunneled node. Dell tunneled nodes provide access and security using an overlay architecture. This chapter describes the following topics: l Understanding Tunneled Node Configuration on page 246 l Configuring a Wired Tunneled Node Client on page 247
Understanding Tunneled Node Configuration
The Dell tunneled node connects to one or more client devices at the edge of the network and then establishes a secure GRE tunnel to the controlling concentrator server. This approach allows the controller to support all the centralized security features, such as 802.1x authentication, captive-portal authentication, and stateful firewall. The Dell tunneled node is required to handle only the physical connection to clients and support for its end of the GRE tunnel. To support the wired concentrator, the controller must have a license to terminate access points (APs). No other configuration is required. To configure the Dell tunneled node, you must specify the IP address of the controller and identify the ports that are to be used as active tunneled node ports. Tunnels are established between the controller and each active tunneled node port on the tunneled node. All tunneled node units must be running the same version of software. The tunneled node port can also be configured as a trunk port. This allows customers to have multiple clients on different VLANs that come through the trunk port instead of having clients on a single vlan. Figure 40 shows how the tunneled node fits into network operations. Traffic moves through GRE tunnels between the active tunneled node ports and the controller or controllers. Policies are configured on a master server and enforced on the local controllers. The master and the local controller can run on the same or different systems. The tunneled node can connect to the master, but it is not required. On the controlling controller, you can assign the same policy to tunneled node user traffic as you would to any untrusted wired traffic. The profile specified by the aaa authentication wired command determines the initial role, which contains the policy. The VLAN setting on the concentrator port must match the VLAN that will be used for users at the local controller.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Tunneled Nodes | 246

Figure 40 Tunneled Node Configuration Operation

Configuring a Wired Tunneled Node Client
ArubaOS does not allow a tunneled-node client and tunneled-node server to co-exist on the same controller at the same time. The controller must be configured as either a tunneled-node client or a tunneled-node server. By default, the controller behaves as a tunneled-node server. However, once tunneled-node-server xxx.xxx.xxx.xxx is configured on the controller, the controller becomes a tunneled-node client. To remove the tunneled-node client function, use the command tunneled-node-server 0.0.0.0 to disable the tunneled-node client on the controller side.
This section describes how to configure a tunneled node client. You can use the WebUI or the CLI to complete the configuration steps.
1. Access the Wired tunneled node CLI according to the instructions provided in the installation guide that shipped with your tunneled node. Console access (9600 8N1) and SSH access are supported.
2. Specify the IP address of the controller and specify tunnel loop prevention. n CLI: (host)(config) #tunneled-node-address ipaddress (host)(config) #tunnel-loop-prevention n WebUI a. Navigate to Configuration>Advanced Services>Wired Access page. b. Locate the Wired Access Concentration Configuration section. c. T o enable tunneled nodes, click the Enable Wired Access Concentrator checkbox.

247 | Tunneled Nodes

Dell Networking W-Series ArubaOS 6.4.x | User Guide

d. Enter the IP address of the controller in the Wired Access Concentrator Server IP field. e. To enable tunnel loop prevention, click the Enable Wired Access Concentrator Loop Prevention
checkbox. f. Click Apply. 3. Access each interface that you want to use, and assign it as a tunneled node port. (host (config) # interface fastethernet n/m (host (config-if) # tunneled-node port 4. Verify the configuration. (host) (config-if) # exit (host) # show tunneled-port config
Configuring an Access Port as a Tunneled Node Port
You can configure any port on any controller as a tunneled node port using the tunneled-node-port command. Set the tunneled-nod -address as the controller to act as the tunneled node termination point. The tunnelednode-port command tells the physical interface to tunnel that traffic to the controller. 1. Enable portfast on the Wired tunneled node.
(host)(config) #interface fastethernet <slot>/<port> (host) (config-if) # spanning-tree portfast 2. Assign a VLAN to the tunneled node port. (host) (config-if) # switchport mode access (host) (config-if) # switchport access vlan <vlanid>
Configuring a Trunk Port as a Tunneled Node Port
To enable portfast on the Wired tunneled node execute the following commands: l (host) (config-if) # switchport mode trunk l (host) (config-if) # switchport trunk allowed vlan <WORD>
To verify the status of the Wired tunneled node execute the following command:
l (host) # show tunneled-node state l (host) # show tunneled-node config
To check the current usage on the controller execute the following command. Each tunneled node client uses one AP license. Attaching an additional wired client on the tunneled node client does not increment the AP license usage on the controller. l (host) # show license-usage ap

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Tunneled Nodes | 248

Chapter 9 Authentication Servers

The ArubaOS software allows you to use an external authentication server or the controller internal user database to authenticate clients who need to access the wireless network. This chapter describes the following topics: l Understanding Authentication Server Best Practices and Exceptions on page 249 l Understanding Servers and Server Groups on page 249 l Configuring Authentication Servers on page 250 l Managing the Internal Database on page 263 l Configuring Server Groups on page 266 l Assigning Server Groups on page 272 l Configuring Authentication Timers on page 276 l Authentication Server Load Balancing on page 278
Understanding Authentication Server Best Practices and Exceptions
l For an external authentication server to process requests from the Dell controller, you must configure the server to recognize the controller. Refer to the vendor documentation for information on configuring the authentication server.
l To configure Microsoft's IAS and Active Directory see the following links: n technet2.microsoft.com/windowsserver/en/technologies/ias.mspx n microsoft.com/en-us/server-cloud/windows-server/active-directory.aspx
Understanding Servers and Server Groups
ArubaOS supports the following external authentication servers: l RADIUS (Remote Authentication Dial-In User Service) l LDAP (Lightweight Directory Access Protocol) l TACACS+ (Terminal Access Controller Access Control System) l Windows (For stateful NTLM authentication)
Starting from ArubaOS 6.4, a maximum of 128 LDAP, RADIUS, and TACACS servers, each can be configured on the controller.
Additionally, you can use the controller's internal database to authenticate users. You create entries in the database for users, their passwords, and their default role. You can create groups of servers for specific types of authentication. For example, you can specify one or more RADIUS servers to be used for 802.1x authentication. The list of servers in a server group is an ordered list. This means that the first server in the list is always used unless it is unavailable, in which case the next server in the list is used. You can configure servers of different types in one group. For example, you can include the internal database as a backup to a RADIUS server.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Authentication Servers | 249

Figure 41 represents a server group named "Radii" that consists of two RADIUS servers, Radius-1 and Radius-2. The server group is assigned to the server group for 802.1x authentication.
Figure 41 Server Group

Server names are unique. You can configure the same server in multiple server groups. You must configure the server before you can add it to a server group.
If you use the controller's internal database for user authentication, use the predefined "Internal" server group.
You can also include conditions for server-derived user roles or VLANs in the server group configuration. The server derivation rules apply to all servers in the group.
Configuring Authentication Servers
This section describes how to configure RADIUS, LDAP, TACACS+ and Windows external authentication servers and the internal database on the controller. This section includes the following information: l Configuring a RADIUS Server on page 250 l RADIUS Service-Type Attribute on page 253 l Enabling Radsec on RADIUS Servers on page 254 l Configuring Username and Password for CPPM Authentication on page 258 l Configuring an RFC-3576 RADIUS Server on page 259 l Configuring an LDAP Server on page 260 l Configuring a TACACS+ Server on page 261 l Configuring a Windows Server on page 263
Configuring a RADIUS Server
Follow the procedures below to configure a RADIUS server using the WebUI or CLI.

250 | Authentication Servers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Using the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select Radius Server to display the Radius Server List. 3. To configure a RADIUS server, enter the name for the server and click Add. 4. Select the name to configure server parameters. Enter the parameters as described in Table 42. Select the
Mode checkbox to activate the authentication server. 5. Click Apply.
The configuration does not take effect until you perform this step.

Using the CLI
(host)(config) #aaa authentication-server radius <name> host <ipaddr> key <key> enable

Table 42: RADIUS Server Configuration Parameters

Parameter

Description

Host

IP address or fully qualified domain name (FQDN) of the authentication server. The maximum supported FQDN length is 63 characters.
Default: N/A

Key

Shared secret between the controller and the authentication server. The

maximum length is 128 characters.

Default: N/A

Auth Port

Authentication port of this server. Default: 1812

Acct Port

Accounting port of this server. Default: 1813

Radsec Port

Radsec port number of this server. Range: 1-65535 Default: 2083

CPPM credentials

Allows the controller to use configurable username and password instead of a support password.

Retransmits

Maximum number of retries sent to the server by the controller before the server is marked as down.
Default: 3

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Authentication Servers | 251

Parameter Timeout NAS ID NAS IP
Enable IPv6 NAS IPv6 Source Interface
Use MD5 Mode Lowercase MAC addresses MAC address delimiter

Description
Maximum time, in seconds, that the controller waits before timing out the request and resending it. Default: 5 seconds
Network Access Server (NAS) identifier to use in RADIUS packets.
The NAS IP address to be sent in RADIUS packets. You can configure a "global" NAS IP address that the controller uses for communications with all RADIUS servers. If you do not configure a serverspecific NAS IP, the global NAS IP is used. To set the global NAS IP in the WebUI, navigate to the Configuration > Security > Authentication > Advanced page. To set the global NAS IP in the CLI, enter the ip radius nasip <ipaddr> command.
Enable or disable IPv6 for this server. Default: Disabled
The NAS IPv6 address to be sent in RADIUS packets.
Enter a VLAN number ID. Allows you to use source IP addresses to differentiate RADIUS requests. Associates a VLAN interface with the RADIUS server to allow the serverspecific source interface to override the global configuration. l If you associate a Source Interface (by entering a VLAN number) with a
configured server, then the source IP address of the packet is that interface's IP address. l If you do not associate the Source Interface with a configured server (leave the field blank), the IP address of the global Source Interface is used.
Use MD5 hash of cleartext password. Default: Disabled
Enables or disables the server. Default: Enabled
Send MAC address with lowercase in the authentication and accounting requests to this server. Default: Disabled
Send MAC address with the following delimiters in the authentication and accounting requests of this server: l colon: Send MAC address as XX:XX:XX:XX:XX:XX l dash: Send MAC address as XX-XX-XX-XX-XX-XX l none: Send MAC address as XXXXXXXXXXXX

252 | Authentication Servers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter

Description
l oui-nic: Send MAC address as XXXXXX-XXXXXX Default: none

Service-type of FRAMEDUSER

Send the service-type as FRAMED-USER instead of LOGIN-USER. For more information, see RADIUS Service-Type Attribute on page 253.
Default: Disabled

Radsec

Enable or disable RADIUS over TLS for this server. Default: Disabled

Radsec Trusted CA Name

Enter the trusted CA name to be used to verify this server.

Radsec Server Cert Name

Enter the certificate name of the trusted Radsec server certificate.

Radsec Client Cert

Enter the certificate name, the controller should use for Radsec request.

called-station-id

Allows user to send different values for Called Station ID. Configure the following parameters for Called Station ID:
l csid_type: Called station ID type. Default: macaddr
l include_ssid: Enabling this option includes SSID in the Called Station ID along with csid_type. Default: disabled
l csid_delimiter: Enabling this option allows to send this delimiter to separate csid_type and ssid in the Called Station ID. Default: colon (example: 00-1a-1e-00-1a-b8:dotx-ssid)

RADIUS Service-Type Attribute
The controller sends the following Service-Type attribute values for RADIUS authentication requests.

Table 43: RADIUS Service-Type Attributes

RADIUS Attribute

Authentication Type

Service-Type

MAC

802.1X

Captive Portal

Attribute Value Call-Check Framed Login

The service-type-framed-user configuration of the RADIUS server overwrites all the attribute values to Framed irrespective of the authentication type. Existing deployments that depend upon this attribute for their thirdparty RADIUS integrations should make changes to support these new service types.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Authentication Servers | 253

Enabling Radsec on RADIUS Servers
Conventional RADIUS protocol offers limited security. This level of limited security is not sufficient for authentication that takes place across unsecured networks such as the Internet. To address this, the RADIUS over TLS or Radsec enhancement is introduced to ensure RADIUS authentication and accounting data is transmitted safely and reliably across insecure networks. The default destination port for RADIUS over TLS is TCP/2083. Separate ports are not used for authentication, accounting, and dynamic authorization changes. In a TLS connection, both the controller (TLS client) and the Radsec server (TLS server) need to authenticate each other using certificates. For the controller to authenticate the Radsec server: l Certificate Authority (CA) certificate should be uploaded as a Trusted CA, if the Radsec server uses a
certificate signed by a CA. l Self-signed certificate should be uploaded as a PublicCert if the Radsec server uses a self-signed certificate.
If neither of these certificates are configured, the controller will not try to establish any connection with the Radsec server, even if Radsec is enabled.
The controller also needs to send a TLS client certificate to the Radsec server by uploading a certificate on the controller as ServerCert and configuring Radsec to accept and use the controller's certificate. If a certificate is not configured, the controller will use the device certificate in its Trusted Platform Module (TPM). In this case, the Aruba device CA that signed the controller's certificate, should be configured as a Trusted CA on the Radsec server.
When Radsec support is enabled, the default RADIUS shared key is radsec and remains the same even if the user configures a different shared key.
In the Web UI
1. From Configuration tab, navigate to Security > Authentication > Servers page. 2. Click RADIUS Server. 3. Click the Radsec server from the list displayed. 4. Enter the Radsec-related parameters as described in Table 42. 5. Click Apply.
In the CLI
aaa authentication-server radius <rad_server_name> enable-radsec radsec-client-cert-name <name> radsec-port <radsec-port> radsec-trusted-cacert-name <radsec-trusted-ca> radsec-trusted-servercert-name <name>
To upload certificates through the CLI, see Importing Certificates.
To configure a Radsec server as RFC 3576 server for dynamic authorization (CoA), see Configuring an RFC-3576 RADIUS Server on page 259.
RADIUS Server VSAs
Vendor-Specific Attributes (VSAs) are a method for communicating vendor-specific information between Network Access Servers and RADIUS servers, allowing vendors to support their own extended attributes. You can use Dell VSAs to derive the user role and VLAN for RADIUS-authenticated clients; however the VSAs must be present on your RADIUS server. This requires that you update the RADIUS dictionary file with the vendor name (Aruba) and/or the vendor-specific code (14823), the vendor-assigned attribute number, and the

254 | Authentication Servers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

attribute format (such as string or integer) for each VSA. For more information on VSA-derived user roles, see Configuring a VSA-Derived Role on page 452
The following table describes Dell-specific RADIUS VSAs. For the current and complete list of all RADIUS VSAs available in the version of ArubaOS currently running on your controller, access the command-line interface and issue the command show aaa radius attributes.

Table 44: RADIUS VSAs

VSA

Type

Value

Aruba-User-Role String 1

Aruba-User-Vlan Integer 2

Aruba-PrivAdmin-User
Aruba-AdminRole

Integer 2 String 4

Aruba-EssidName

String 5

Aruba-Location- String 6 Id

Aruba-Port-Id

String 7

Aruba-

String 8

Template-User

Aruba-NamedUser-Vlan

String 9

Aruba-AP-Group String 10

Aruba-Framed- String 11 IPv6-Address

Aruba-DeviceType

String 12

Aruba-NoDHCPFingerprint

Integer 14

Description This VSA returns the role, to be assigned to the user post authentication. The user will be granted access based on the role attributes defined in the role.
This VSA returns the VLAN to be used by the client. Range: 1­ 4094.
If this VSA is set in the RADIUS accept message, the user can bypass the enable prompt. This VSA returns the management role to be assigned to the user post management authentication. This role can be seen using the command show mgmt-role in the command-line interface. String that identifies the name of the ESSID.
String that identifies the name of the AP location.
String that identifies the Port ID.
String that identifies the name of a Dell user template.
This VSA returns a VLAN name for a user. This VLAN name on a controller could be mapped to user-defined name or multiple VLAN IDs. String that identifies the name of a Dell AP Group.
This attribute is used for RADIUS accounting for IPv6 users.
String that identifies a Dell device on the network.
This VSA prevents the controller from deriving a role and VLAN based on DHCP finger printing.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Authentication Servers | 255

VSA
Aruba-MdpsDevice-Udid

Type String

Value 15

Aruba-MdpsDevice-Imei

String 16

Aruba-MdpsDevice-Iccid

String 17

Aruba-MdpsMax-Devices
Aruba-MdpsDevice-Name

String 18 String 19

Aruba-Mdps-

String 20

Device-Product

Aruba-Mdps-

String 21

Device-Version

Aruba-MdpsDevice-Serial

String 22

Description
UDID is unique device identifier which is used as input attribute by the Onboard application while performing the device authorization to the internal RADIUS server within the ClearPass Policy Manager (CPPM). The UDID checks against role mappings or enforcement policies to determine if the device is authorized to be onboarded.
The Onboard application uses IMEI as an input attribute while performing the device authorization to the internal RADIUS server within the CPPM. IMEI checks against role mappings or enforcement policies to determine if the device is authorized to be onboarded.
The Onboard application uses ICCID as an input attribute while performing the device authorization to the internal RADIUS server within the CPPM. ICCID checks against role mappings or enforcement policies to determine if the device is authorized to be onboarded.
Used by Onboard as a way to define and enforce the maximum number of devices that can be provisioned by a given user.
The Onboard application uses device name as an input attribute while performing the device authorization to the internal RADIUS server within the CPPM. Device name checks against role mappings or enforcement policies to determine if the device is authorized to be onboarded.
The device product is used as input attribute by the Onboard application while performing the device authorization to the internal RADIUS server within the CPPM. Device Product checks against role mappings or enforcement policies to determine if the device is authorized to be onboarded.
The device version is used as input attribute by the Onboard application while performing the device authorization to the internal RADIUS server within the CPPM. Device Version checks against role mappings or enforcement policies to determine if the device is authorized to be onboarded.
The device serial number is used as input attribute by the Onboard application while performing the device authorization to the internal RADIUS server within the CPPM. Device Serial checks against role mappings or enforcement policies to determine if the device is authorized to be onboarded.

256 | Authentication Servers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

VSA

Type

Aruba-AirGroup- String User-Name

Value 24

Aruba-AirGroup- String 25 Shared-User

Aruba-AirGroup- String 26 Shared-Role

Aruba-AirGroup- Integer 27 Device-Type

Aruba-AuthSurvivability

String 28

Aruba-AS-User- String 29 Name

Aruba-AS-

String 30

Credential-Hash

Aruba-

String 31

WorkSpace-App-

Name

Aruba-MdpsProvisioningSettings

String 32

Aruba-MdpsDevice-Profile

String 33

Description
A device owner or username associated with the device.
This VSA contains a comma separated list of user names with whom the device is shared.
This VSA contains a comma separated list of user roles with whom the device is shared.
A value of 1 for this VSA indicates that the device authenticating on the network is a personal device and a value of 2 indicates that it is a shared device.
The Instant AP Auth survivability feature uses the VSA to indicate that the CPPM server sends the Aruba-AS-User-Name and Aruba-AS-Credential-Hash values. This attribute is just used as a flag with no specific value required.
The Auth survivability feature uses the VSA for Instant APs. The CPPM sends the actual user name to the Instant AP which can be used by the Instant AP to authenticate the user if the CPPM server is not reachable.
The Auth survivability feature uses the VSA for Instant APs. The CPPM sends the NT hash of the password to the Instant AP which can be used by the Instant AP to authenticate the user if the CPPM server is not reachable.
This VSA identifies an application supported by Dell WorkSpace.
Used as part of the ClearPass Onboard technology, this attribute allows the CPPM to signal back to the onboard process the context of the device provisioning settings that should be applied to the device based on applied role mappings.
Used as part of the ClearPass Onboard technology, this attribute allows CPPM to signal back to the onboard process the device profile that should be applied to the device based on applied role mappings.

RADIUS Server Authentication Codes
A configured RADIUS server returns the following standard response codes.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Authentication Servers | 257

Table 45: RADIUS Authentication Response Codes

Code

Description

0

Authentication OK.

1

Authentication failed : user/password combination not correct.

2

Authentication request timed out : No response from server.

3

Internal authentication error.

4

Bad Response from RADIUS server : verify shared secret is correct.

5

No RADIUS authentication server is configured.

6

Challenge from server. (This does not necessarily indicate an error condition.)

RADIUS Server Fully Qualified Domain Names
If you define a RADIUS server using the FQDN of the server rather than its IP address, the controller periodically generates a DNS request and caches the IP address returned in the DNS response. To view the IP address that currently correlates to each RADIUS server FQDN, access the command-line interface in config mode and issue the following command:
show aaa fqdn-server-names
DNS Query Intervals
If you define a RADIUS server using the FQDN of the server rather than its IP address, the controller periodically generates a DNS request and caches the IP address returned in the DNS response. DNS requests are sent every 15 minutes by default. You can use either the WebUI or the CLI to configure how often the controller will generate a DNS request to cache the IP address for a RADIUS server identified via its fully qualified domain name (FQDN).
Using the WebUI 1. Navigate to the Configuration > Security > Authentication > Advanced page. 2. In the DNS Query Interval (min) field, enter a new DNS query interval, from 1-1440 minutes, inclusive. 3. Click Apply.
Using the CLI (host)(config) #aaa dns-query-interval <minutes>
Configuring Username and Password for CPPM Authentication
The controller authenticating to CPPM is enhanced to use configurable username and password instead of support password. The support password is vulnerable to attacks as the server certificate presented by CPPM server is not validated.
In the WebUI:
1. Navigate to Configuration > Security> Authentication> Servers. 2. Under Radius Server, select the server name.

258 | Authentication Servers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

3. Enter the cppm_username and cppm_password in the CPPM credentials option. 4. Click Apply.
In the CLI:
(host)(config) #aaa authentication-server radius (host)(config) #show aaa authentication-server radius
Configuring an RFC-3576 RADIUS Server
You can configure a RADIUS server to send user disconnect, change-of-authorization (CoA), and session timeout messages as described in RFC 3576, "Dynamic Authorization Extensions to Remote Dial In User Service (RADIUS)."
For Remote AP, RADIUS CoA is supported on tunnel and split-tunnel forwarding modes only.
For Campus AP, RADIUS CoA is supported on tunnel and decrypt-tunnel forwarding modes only.
The disconnect, session timeout, and change-of-authorization messages sent from the server to the controller contains information to identify the user for which the message is sent. The controller supports the following attributes for identifying the users who authenticate with an RFC 3576 server: l user-name: name of the user to be authenticated l framed-ip-address: user's IP address l calling-station-id: phone number of a station that originated a call l accounting-session-id: unique accounting ID for the user session. If the authentication server sends both supported and unsupported attributes to the controller, the unknown or unsupported attributes are ignored. If no matching user is found, the controller sends a 503: Session Not Found error message back to the RFC 3576 server.
Using the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select RFC 3576 Server to display the Radius Server List. 3. To define a new RFC 3576 RADIUS server, enter the IP address for the server and click Add. 4. Select the server name to configure server parameters. 5. Enter the server authentication key into the Key and Retype fields. 6. Click Apply.
The configuration does not take effect until you perform this step.
Using the CLI
(host)(config) #aaa rfc-3576-server <ipaddr> clone <server> key <psk> no ...

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Authentication Servers | 259

Configuring an RFC-3576 RADIUS Server with Radsec
Using the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select RFC 3576 Server to display the Radius Server List. 3. To define a new RFC 3576 RADIUS server, enter the IP address for the server and click Add. 4. Select the server name to configure server parameters. 5. Select the Radsec checkbox. 6. Click Apply.
Using the CLI
(host)(config) #aaa rfc-3576-server <ipaddr> enable-radsec no ...
Configuring an LDAP Server
Table 46 describes the parameters you configure for an LDAP server.

Table 46: LDAP Server Configuration Parameters

Parameter

Description

Host

IP address of the LDAP server. Default: N/A

Admin-DN

Distinguished name for the admin user who has read/search privileges across all the entries in the LDAP database (the user does need write privileges, but will be able to search the database, and read attributes of other users in the database).

Admin Password

Password for the admin user. Default: N/A

Allow Clear-Text

Allows clear-text (unencrypted) communication with the LDAP server. Default: disabled

Authentication Port

Port number used for authentication. Default: 389

Base-DN

Distinguished Name of the node that contains the entire user database. Default: N/A

Filter

A string searches for users in the LDAP database. The default filter string is: (objectclass=*).
Default: N/A

Key Attribute

A string searches for a LDAP server. For Active Directory, the value is sAMAccountName.

260 | Authentication Servers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter
Timeout Mode Preferred Connection Type

Description
Default: sAMAccountName
Timeout period of a LDAP request, in seconds. Default: 20 seconds
Enables or disables the server. Default: enabled
Preferred type of connection between the controller and the LDAP server. The default order of connection type is: 1. ldap-s 2. start-tls 3. clear-text The controller first tries to contact the LDAP server using the preferred connection type, and only attempts to use a lower-priority connection type if the first attempt is not successful. NOTE: If you select clear-text as the preferred connection type, you must also enable the allow-cleartext option.

Using the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select LDAP Server to display the LDAP Server List. 3. To configure an LDAP server, enter the name for the server and click Add. 4. Select the name to configure server parameters. Enter parameters as described in Table 46. Select the
Mode checkbox to activate the authentication server. 5. Click Apply.

The configuration does not take effect until you perform this step.

Using the CLI
(host)(config) #aaa authentication-server ldap <name> host <ipaddr> (enter parameters as described in Table 46) enable
Configuring a TACACS+ Server
Table 47 defines the TACACS+ server parameters.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Authentication Servers | 261

Table 47: TACACS+ Server Configuration Parameters

Parameter

Description

Host

IP address of the server. Default: N/A

Key

Shared secret to authenticate communication between the TACACS+ client and

server.

Default: N/A

TCP Port

TCP port used by server. Default: 49

Retransmits

Maximum number of times a request is retried. Default: 3

Timeout

Timeout period for TACACS+ requests, in seconds. Default: 20 seconds

Mode

Enables or disables the server. Default: enabled

Session Authorization

Enables or disables session authorization. Session authorization turns on the optional authorization session for admin users.
Default: disabled

Using the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select TACACS Server to display the TACACS Server List. 3. To configure a TACACS+ server, enter the name for the server and click Add. 4. Select the name to configure server parameters. Enter parameters as described in Table 47. Select the
Mode checkbox to activate the authentication server. 5. Click Apply.
The configuration does not take effect until you perform this step.

Using the CLI
The following command configures, enables a TACACS+ server and enables session authorization:
(host)(config) #aaa authentication-server tacacs <name> clone default host <ipaddr> key <key> enable session-authorization

262 | Authentication Servers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Configuring a Windows Server
Table 48 defines parameters for a Windows server used for stateful NTLM authentication.

Table 48: Windows Server Configuration Parameters

Parameter

Description

Host

IP address of the server. Default: N/A

Mode

Enables or disables the server. Default: enabled

Windows Domain

Name of the Windows Domain assigned to the server.

Using the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select Windows Server to display the Windows Server List. 3. To configure a Windows server, enter the name for the server and click Add. 4. Select the name of the server to configure its parameters. Enter the parameters as described in Table 48. 5. Select the Mode checkbox to activate the authentication server. 6. Click Apply.
The configuration does not take effect until you perform this step.

Using the CLI
aaa authentication-server windows <windows-server-name> host <ipaddr> enable
Managing the Internal Database
You can create entries in the controller's internal database to authenticate clients. The internal database contains a list of clients, along with the password and default role for each client. When you configure the internal database as an authentication server, client information is checked in incoming authentication requests against the internal database.
Configuring the Internal Database
The master controller uses the internal database for authentication by default. You can choose to use the internal database in a local controller by entering the CLI command aaa authentication-server internal use-local-switch. If you use the internal database in a local controller, you need to add clients on the local controller.
.
Table 49 defines the required and optional parameters used in the internal database.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Authentication Servers | 263

Table 49: Internal Database Configuration Parameters

Parameters

Description

User Name

(Required) Enter a user name or select Generate to automatically generate a user name. An entered user name can be up to 64 characters in length.

Password

(Required) Enter a password or select Generate to automatically generate a password string. An entered password must be a minimum of 6 characters and can be up to 128 characters in length.

Role

Role for the client.
For this role to be assigned to a client, you need to configure a server derivation rule, as described in Configuring Server-Derivation Rules on page 270. (A user role assigned through a server-derivation rule takes precedence over the default role configured for an authentication method.)

E-mail

(Optional) E-mail address of the client.

Enabled

Select this checkbox to enable the user as soon as the user entry is created.

Expiration

Select one of the following options:
l Entry does not expire: No expiration on user entry.
l Set Expiry time (mins): Enter the number of minutes the user is authenticated before their user entry expires.
l Set Expiry Date (mm/dd/yyyy) Expiry Time (hh:mm): To select a specific expiration date and time, enter the expiration date in mm/dd/yyyy format, and the expiration time in hh:mm format.

Static Inner IP Address (for RAPs only)

Assign a static inner IP address to a Remote AP. If this database entry is not for a remote AP, leave this field empty.

Using the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select Internal DB. 3. Click Add User in the Users section. The user configuration page displays. 4. Enter the information for the client, as described in the table above. 5. Click Enabled to activate this entry on creation. 6. Click Apply. The configuration does not take effect until you perform this step. 7. At the Servers page, click Apply.
The Internal DB Maintenance window also includes a Guest User Page feature that allows you to create user entries for guests only. For details on creating guest users, see Guest Provisioning User Tasks on page 898.
Using the CLI
Enter the following command in enable mode: (host)(config) #local-userdb add {generate-username|username <name>}{ generate-password|password <password>}

264 | Authentication Servers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Managing Internal Database Files
ArubaOS allows you to import and export user information tables to and from the internal database. These files should not be edited once they are exported. ArubaOS only supports the importing of database files that were created during the export process. Note that importing a file into the internal database overwrites and removes all existing entries.
Exporting Files in the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select Internal DB. 3. Click Export in the Internal DB Maintenance section. A popup window opens. 4. Enter the name of the file you want to export 5. Click OK.
Importing Files in the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select Internal DB. 3. Click Import in the Internal DB Maintenance section. A popup window opens. 4. Enter the name of the file you want to import. 5. Click OK.
Exporting and Importing Files in the CLI
Enter the following command in enable mode: (host)(config) #local-userdb export <filename> (host)(config) #local-userdb import <filename>
Working with Internal Database Utilities
The local internal database also includes utilities to clear all users from the database and restart the internal database to repair internal errors. Under normal circumstances, neither of these utilities are necessary.
Deleting All Users
Issue this command to remove users from the internal database after you have moved your user database from the controller's internal server to an external server. 1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select Internal DB. 3. Click Delete All Users in the Internal DB Maintenance section. A popup window opens and asks you to
confirm that you want to remove all users. 4. Click OK.
Repairing the Internal Database
Use this utility under the supervision of Dell technical support to recreate the internal database. This may clear internal database errors, but also removes all information from the database. Make sure you export your current user information before you start the repair procedure. 1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select Internal DB. 3. Click Repair Database in the Internal DB Maintenance section. A popup window opens and asks you to
confirm that you want to recreate the database.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Authentication Servers | 265

4. Click OK.
Configuring Server Groups
You can create groups of servers for specific types of authentication ­ for example, you can specify one or more RADIUS servers to be used for 802.1x authentication. You can configure servers of different types in one group. For example, you can include the internal database as a backup to a RADIUS server.
Configuring Server Groups
Server names are unique. You can configure the same server in more than one server group. You must configure the server before you can include it in a server group.
Using the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select Server Group to display the Server Group list. 3. Enter the name of the new server group and click Add. 4. Select the name to configure the server group. 5. Under Servers, click New to add a server to the group.
a. Select a server from the drop-down list and click Add Server. b. Repeat the above step to add other servers to the group. 6. Click Apply.
Using the CLI
(host)(config) #aaa server-group <name> auth-server <name>
Configuring Server List Order and Fail-Through
The servers in a server group are part of an ordered list. The first server in the list is always used by default, unless it is unavailable, in which case the next server in the list is used. You can configure the order of servers in the server group through the WebUI using the up or down arrows (the top server is the first server in the list). In the CLI, the position parameter specifies the relative order of servers in the list (the lowest value denotes the first server in the list).
As mentioned previously, the first available server in the list is used for authentication. If the server responds with an authentication failure, there is no further processing for the user or client for which the authentication request failed. You can also enable fail-through authentication for the server group so that if the first server in the list returns an authentication deny, the controller attempts authentication with the next server in the ordered list. The controller attempts to authenticate with each server in the list until there is a successful authentication or the list of servers in the group is exhausted. This feature is useful in environments where there are multiple, independent authentication servers; users may fail authentication on one server but can be authenticated on another server.
Before enabling fail-through authentication, note the following:
l This feature is not supported for 802.1x authentication with a server group that consists of external EAPcompliant RADIUS servers. You can, however, use fail-through authentication when the 802.1x authentication is terminated on the controller (AAA FastConnect).
l Enabling this feature for a large server group list may cause excess processing load on the controller. It is recommended that you use server selection based on domain matching whenever possible (see Configuring Dynamic Server Selection on page 267).

266 | Authentication Servers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l Certain servers, such as the RSA RADIUS server, lock out the controller if there are multiple authentication failures. Therefore, you should not enable fail-through authentication with these servers.
In the following example, you create a server group "corp-serv" with two LDAP servers (ldap-1 and ldap-2), each containing a subset of the usernames and passwords used in the network. When you enable fail-through authentication, users that fail authentication with the first server on the list will be authenticated with the second server.
Using the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select LDAP Server to display the LDAP Server List. 3. Enter ldap-1 for the server name and click Add. 4. Enter ldap-2 for the server name and click Add. 5. Under the Servers tab, select ldap-1 to configure server parameters. Enter the IP address for the server.
Select the Mode checkbox to activate the authentication server. Click Apply. 6. Repeat step 5 on page 267 to configure ldap-2. 7. Display the Server Group list: Under the Servers tab, select Server Group. 8. Enter corp-serv as the new server group and click Add. 9. Select corp-serv, under the Server tab, to configure the server group. 10.Select Fail Through. 11.Under Servers, click New to add a server to the group. Select ldap-1 from the drop-down list and click Add
Server. 12.Repeat step 11 on page 267 to add ldap-2 to the group. 13.Click Apply.
Using the CLI
(host)(config) #aaa authentication-server ldap ldap-1 host 10.1.1.234
(host)(config) #aaa authentication-server ldap ldap-2 host 10.2.2.234
(host)(config) #aaa server-group corp-serv auth-server ldap-1 position 1 auth-server ldap-2 position 2 allow-fail-through
Configuring Dynamic Server Selection
The controller can dynamically select an authentication server from a server group based on the user information sent by the client in an authentication request. For example, an authentication request can include client or user information in one of the following formats:
l <domain>\<user> : for example, corpnet.com\darwin l <user>@<domain> : for example, darwin@corpnet.com l host/<pc-name>.<domain> : for example, host/darwin-g.finance.corpnet.com (this format is used with
802.1x machine authentication in Windows environments)
When you configure a server in a server group, you have the option to associate the server with one or more match rules. A match rule for a server can be one of the following:
l The server is selected if the client/user information contains a specified string. l The server is selected if the client/user information begins with a specified string.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Authentication Servers | 267

l The server is selected if the client/user information exactly matches a specified string.
You can configure multiple match rules for the same server. The controller compares the client/user information with the match rules configured for each server, starting with the first server in the server group. If a match is found, the controller sends the authentication request to the server with the matching rule. If no match is found before the end of the server list is reached, an error is returned, and no authentication request for the client/user is sent.
Figure 42 depicts a network consisting of several subdomains in corpnet.com. The server radius-1 provides 802.1x machine authentication to PC clients in xyz.corpnet.com, sales.corpnet.com, and hq.corpnet.com. The server radius-2 provides authentication for users in abc.corpnet.com.
Figure 42 Domain-Based Server Selection Example

You configure the following rules for servers in the corp-serv server group: l radius-1 is selected if the client information starts with "host." l radius-2 is selected if the client information contains "abc.corpnet.com."
Using the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Under the Servers tab, select Server Group to display the Server Group list. 3. Enter corp-serv for the new server group and click Add. 4. Under the Servers tab, select corp-serv to configure the server group. 5. Under Servers, click New to add the radius-1 server to the group. Select radius-1 from the drop-down list.
a. For Match Type, select Authstring. b. For Operator, select starts-with. c. For Match String, enter host/. d. Click Add Rule >>. e. Scroll to the right and click Add Server. 6. Under Servers, click New to add the radius-2 server to the group. Select radius-2 from the drop-down list. a. For Match Type, select Authstring. b. For Operator, select contains.

268 | Authentication Servers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

c. For Match String, enter abc.corpnet.com. d. Click Add Rule >>. e. Scroll to the right and click Add Server.
The last server you added to the server group (radius-2) automatically appears as the first server in the list. In this example, the order of servers is not important. If you need to reorder the server list, scroll to the right and click the up or down arrow for the appropriate server.
7. Click Apply.
Using the CLI
(host)(config) #aaa server-group corp-serv auth-server radius-1 match-authstring starts-with host/ position 1 auth-server radius-2 match-authstring contains abc.corpnet.com position 2
Configuring Match FQDN Option
You can also use the "match FQDN" option for a server match rule. With a match FQDN rule, the server is selected if the <domain> portion of the user information in the formats <domain>\<user> or <user>@<domain> matches a specified string exactly. Note the following caveats when using a match FQDN rule: l This rule does not support client information in the host/<pc-name>.<domain> format, so it is not useful
for 802.1x machine authentication. l The match FQDN option performs matches on only the <domain> portion of the user information sent in
an authentication request. The match-authstring option (described previously) allows you to match all or a portion of the user information sent in an authentication request.
Using the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Under the Servers tab, select Server Group to display the Server Group list. 3. Enter corp-serv for the new server group and click Add. 4. Under the Servers tab, select corp-serv to configure the server group. 5. Under Servers, click New to add the radius-1 server to the group. Select radius-1 from the drop-down list.
a. For Match Type, select FQDN. b. For Match String, enter corpnet.com. c. Click Add Rule >>. d. Scroll to the right and click Add Server. 6. Click Apply.
Using the CLI
(host)(config) #aaa server-group corp-serv auth-server radius-1 match-fqdn corpnet.com
Trimming Domain Information from Requests
Before the controller forwards an authentication request to a specified server, it can truncate the domainspecific portion of the user information. This is useful when user entries on the authenticating server do not include domain information. You can specify this option with any server match rule. This option is only applicable when the user information is sent to the controller in the following formats: l <domain>\<user> : the <domain>\ portion is truncated

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Authentication Servers | 269

l <user>@<domain> : the @<domain> portion is truncated
This option does not support client information sent in the format host/<pc-name>.<domain>
Using the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select Server Group to display the Server Group list. 3. Enter the name of the new server group and click Add. 4. Select the name to configure the server group. 5. Under Servers, click Edit for a configured server or click New to add a server to the group.
l If editing a configured server, select Trim FQDN, scroll right, and click Update Server. l If adding a new server, select a server from the drop-down list, then select Trim FQDN, scroll right, and
click Add Server. 6. Click Apply.
Using the CLI
(host)(config) #aaa server-group corp-serv auth-server radius-2 match-authstring contains abc.corpnet.com trim-fqdn
Configuring Server-Derivation Rules
When you configure a server group, you can set the VLAN or role for clients based on attributes returned for the client by the server during authentication. The server derivation rules apply to all servers in the group. The user role or VLAN assigned through server derivation rules takes precedence over the default role and VLAN configured for the authentication method.
The authentication servers must be configured to return the attributes for the clients during authentication. For instructions on configuring the authentication attributes in a Windows environment using IAS, refer to the documentation attechnet2.microsoft.com/windowsserver/en/technologies/ias.mspx
The server rules are applied based on the first match principle. The first rule that is applicable for the server and the attribute returned is applied to the client, and would be the only rule applied from the server rules. These rules are applied uniformly across all servers in the server group. Table 50 describes the server rule parameters you can configure.

270 | Authentication Servers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 50: Server Rule Configuration Parameters

Parameter

Description

Role or VLAN

The server derivation rules apply to either user role or VLAN assignment. With Role assignment, a client can be assigned a specific role based on the attributes returned. In VLAN assignment, the client can be placed in a specific VLAN based on the attributes returned.

Attribute

This is the attribute returned by the authentication server that is examined for Operation and Operand match.

Operation

This is the match method by which the string in Operand is matched with the attribute value returned by the authentication server.
l contains : The rule is applied if and only if the attribute value contains the string in parameter Operand.
l starts-with : The rule is applied if and only if the attribute value returned starts with the string in parameter Operand.
l ends-with : The rule is applied if and only if the attribute value returned ends with the string in parameter Operand.
l equals : The rule is applied if and only if the attribute value returned equals the string in parameter Operand.
l not-equals : The rule is applied if and only if the attribute value returned is not equal to the string in parameter Operand.
l value-of : This is a special condition. What this implies is that the role or VLAN is set to the value of the attribute returned. For this to be successful, the role and the VLAN ID returned as the value of the attribute selected must be already configured on the controller when the rule is applied.

Operand

This is the string to which the value of the returned attribute is matched.

Value

The user role or the VLAN name applied to the client when the rule is matched.

position

Position of the condition rule. Rules are applied based on the first match principle. One is the top.
Default: bottom

Using the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select Server Group to display the Server Group list. 3. Enter the name of the new server group and click Add. 4. Select the name to configure the server group. 5. Under Servers, click New to add a server to the group.
a. Select a server from the drop-down list and click Add. b. Repeat the above step to add other servers to the group. 6. Under Server Rules, click New to add server derivation rules for assigning a user role or VLAN. a. Enter the attribute.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Authentication Servers | 271

b. Select the operation from the drop-down list. c. Enter the operand. d. To set the role, select set role from the Set drop-down list and enter the value to be assigned from the
Value drop-down list. e. Or, to set the vlan, select set vlan from the Set drop-down list and select the VLAN name or ID from the
Value drop-down list and click the left-arrow. f. Click Add. g. Repeat the above steps to add other rules for the server group. 7. Click Apply.
Using the CLI
(host) (config) #aaa server-group <name> (host) (Server Group name) #set {role|vlan} condition <attribute> contains|endswith|equals|not-equals|starts-with <operand> set-value <set-value-str> position <number>
Configuring a Role Derivation Rule for the Internal Database
When you add a user entry in the controller's internal database, you can optionally specify a user role (see Managing the Internal Database on page 263). The role specified in the internal database entry to be assigned to the authenticated client, you must configure a server derivation rule as shown in the following sections:
Using the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select Server Group to display the Server Group list. 3. Select the internal server group. 4. Under Server Rules, click New to add a server derivation rule.
a. For Condition, enter Role. b. Select value-of from the drop-down list. c. Select Set Role from the drop-down list. d. Click Add. 5. Click Apply.
Using the CLI
(host)(config) #aaa server-group internal set role condition Role value-of
Assigning Server Groups
You can create server groups for the following purposes: l user authentication l management authentication l accounting You can configure all types of servers for user and management authentication (see Table 51). Accounting is only supported with RADIUS and TACACS+ servers when RADIUS or TACACS+ is used for authentication.

272 | Authentication Servers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 51: Server Types and Purposes RADIUS

TACACS+ LDAP

User authentication

Yes

Yes

Yes

Internal Database Yes

Management authentication

Yes

Yes

Yes

Yes

Accounting

Yes

Yes

No

No

User Authentication
For information about assigning a server group for user authentication, refer to the Roles and Policies chapter of the Dell Networking W-Series ArubaOS User Guide.
Management Authentication
Users who need to access the controller to monitor, manage, or configure the Dell user-centric network can be authenticated with RADIUS, TACACS+, or LDAP servers or the internal database. Only user record attributes are returned upon successful authentication. Therefore, to derive a management role other than the default mgmt auth role, set the server derivation rule based on the user attributes.
Using the WebUI
1. Navigate to the Configuration > Management > Administration page. 2. Under the Management Authentication Servers section, select the following:
l Enable checkbox l Server Group 3. Click Apply.
Using the CLI
(host)(config) #aaa authentication mgmt server-group <group> enable
Accounting
You can configure accounting for RADIUS and TACACS+ server groups.
RADIUS or TACACS+ accounting is only supported when RADIUS or TACACS+ is used for authentication.

RADIUS Accounting
RADIUS accounting allows user activity and statistics to be reported from the controller to RADIUS servers:
1. The controller generates an Accounting Start packet when a user logs in. The code field of transmitted RADIUS packet is set to 4 (Accounting-Request). Note that sensitive information, such as user passwords, are not sent to the accounting server. The RADIUS server sends an acknowledgement of the packet.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Authentication Servers | 273

2. The controller sends an Accounting Stop packet when a user logs off; the packet information includes various statistics such as elapsed time, input and output bytes, and packets. The RADIUS server sends an acknowledgment of the packet.
The following is the list of attributes that the controller can send to a RADIUS accounting server:
l Acct-Status-Type: This attribute marks the beginning or end of accounting record for a user. Current values are Start, Stop, and Interim Update.
l User-Name: Name of user. l Acct-Session-Id: A unique identifier to facilitate matching of accounting records for a user. It is derived
from the user name, IP address, and MAC address. This is set in all accounting packets. l Acct-Authentic: This indicates how the user was authenticated. Current values are 1 (RADIUS), 2 (Local),
and 3 (LDAP). l Acct-Session-Time: The elapsed time, in seconds, that the client was logged in to the controller. This is only
sent in Accounting-Request records, where the Acct-Status-Type is Stop or Interim Update. l Acct-Terminate-Cause: Indicates how the session was terminated and is sent in Accounting-Request
records where the Acct-Status-Type is Stop. Possible values are: 1: User logged off 4: Idle Timeout 5: Session Timeout. Maximum session length timer expired. 7: Admin Reboot: Administrator is ending service, for example prior to rebooting the controller. l NAS-Identifier: This is set in the RADIUS server configuration. l NAS-IP-Address: IP address of the master controller. You can configure a "global" NAS IP address: n In the WebUI, navigate to the Configuration > Security > Authentication > Advanced page. n In the CLI, use the, ip radius nas-ip command. l NAS-Port: Physical or virtual port (tunnel) number through which the user traffic is entering the controller. l NAS-Port-Type: Type of port used in the connection. This is set to one of the following: n 5: admin login n 15: wired user type n 19: wireless user l Framed-IP-Address: IP address of the user. l Calling-Station-ID: MAC address of the user. l Called-station-ID: MAC address of the controller.
The following attributes are sent in Accounting-Request packets when Acct-Status-Type value is Start:
l Acct-Status-Type l User-Name l NAS-IP-Address l NAS-Port l NAS-Port-Type l NAS-Identifier l Framed-IP-Address l Calling-Station-ID l Called-station-ID l Acct-Session-ID l Acct-Authentic

274 | Authentication Servers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The following attributes are sent in Accounting-Request packets when Acct-Status-Type value is Stop:
l Acct-Status-Type l User-Name l NAS-IP-Address l NAS-Port l NAS-Port-Type l NAS-Identifier l Framed-IP-Address l Calling-Station-ID l Called-station-ID l Acct-Session-ID l Acct-Authentic l Terminate-Cause l Acct-Session-Time
The following attributes are sent only in Accounting Stop packets (they are not sent in Accounting Start packets):
l Acct-Input-Octets l Acct-Output-Octets l Acct-Input-Packets l Acct-Output-Packets
Remote APs in split-tunnel mode now support RADIUS accounting. If you enable RADIUS accounting in a splittunnel Remote AP's AAA profile, the controller sends a RADIUS accounting start record to the RADIUS server when a user associates with the remote AP, and sends a stop record when the user logs out or is deleted from the user database. If interim accounting is enabled, the controller sends updates at regular intervals. Each interim record includes cumulative user statistics, including received bytes and packets counters.
You can use either the WebUI or CLI to assign a server group for RADIUS accounting.
Using the WebUI
1. Navigate to the Configuration > Security > Authentication > AAA Profiles page. 2. Select AAA Profile, then the AAA profile instance. 3. (Optional) In the Profile Details pane, select RADIUS Interim Accounting to allow the controller to send
Interim-Update messages with current user statistics to the server at regular intervals. This option is disabled by default, allowing the controller to send only start and stop messages RADIUS accounting server. 4. In the profile list, scroll down and select the Radius Accounting Server Group for the AAA profile. Select the server group from the drop-down list. You can add additional servers to the group or configure server rules. 5. Click Apply.
Using the CLI (host)(config) #aaa profile <profile>
radius-accounting <group> radius-interim-accounting

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Authentication Servers | 275

RADIUS Accounting on Multiple Servers
ArubaOS provides support for the controllers to send RADIUS accounting to multiple RADIUS servers. The controller notifies all the RADIUS servers to track the status of authenticated users. Accounting messages are sent to all the servers configured in the server group in a sequential order. You can enable multiple server account functionality by using the WebUI and CLI:
Using the WebUI 1. Navigate to the Configuration > Security > Authentication > AAA Profiles page. 2. Select AAA Profile, then select the AAA profile instance. 3. Select Multiple Server Accounting checkbox. 4. Click Apply.
Using the CLI To enable RADIUS Accounting on Multiple Servers functionality, use the following CLI: (host) (config) # aaa profile <profile_name>
multiple-server-accounting
TACACS+ Accounting
TACACS+ accounting allows commands issued on the controller to be reported to TACACS+ servers. You can specify which types of commands are reported (action, configuration, or show commands), or report all commands. You can only configure TACACS+ accounting through the CLI: (host)(config) #aaa tacacs-accounting server-group <group> command {action|all|configuration|show} mode {enable|disable}
Configuring Authentication Timers
Table 52 describes the timers you can configure for all clients and servers. These timers can be left at their default values for most implementations.

276 | Authentication Servers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 52: Authentication Timers

Timer

Description

User Idle Timeout

Maximum period after which a client is considered idle if there is no wireless traffic from the client.The timeout period is reset if there is wireless traffic. If there is no wireless traffic in the timeout period, the client is aged out. Once the timeout period has expired, the user is removed. If the keyword seconds is not specified, the value defaults to minutes at the command line.
Range: 1­255 minutes (30­15300 seconds)
Default: 5 minutes (300 seconds)

Authentication Server Dead Time

Maximum period, in minutes, that the controller considers an unresponsive authentication server to be "out of service."
This timer is only applicable if there are two or more authentication servers configured on the controller. If there is only one authentication server configured, the server is never considered out of service, and all requests are sent to the server.
If one or more backup servers are configured and a server is unresponsive, it is marked as out of service for the dead time; subsequent requests are sent to the next server on the priority list for the duration of the dead time. If the server is responsive after the dead time has elapsed, it can take over servicing requests from a lower-priority server; if the server continues to be unresponsive, it is marked as down for the dead time.
Range: 0­50 minutes
Default: 10 minutes

Logon User Lifetime

Maximum time, in minutes, unauthenticated clients are allowed to remain logged on.
Range: 0­255 minutes
Default: 5 minutes

User Interim stats frequency

Sets the timeout value for user stats, reporting in minutes or seconds.
Range: 300-600 seconds, or 5-10 minutes
Default: 600 seconds

Setting an Authentication Timer
To set an authentication timer, complete one of the following procedures:
Using the WebUI
1. Navigate to the Configuration > Security > Authentication > Advanced page. 2. Configure the timers as described above. 3. Click Apply before moving on to another page or closing the browser window. If you do not perform this
step, you will lose your configuration changes.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Authentication Servers | 277

Using the CLI
The commands below configure timers you can apply to clients. If the optional seconds keyword is not specified for the idle-timeout and stats-timeout parameters, the value defaults to minutes. (host)(config) #aaa timers
dead-time <minutes> idle-timeout <time> [seconds] logon-lifetime <0-255> stats-timeout <time> [seconds]
Authentication Server Load Balancing
Load balancing of authentication servers ensures that the authentication load is split across multiple authentication servers, thus avoiding any one particular authentication server from being overloaded. Authentication Server Load Balancing functionality enables the Dell Controller to perform load balancing of authentication requests destined for external authentication servers (Radius/LDAP etc). This prevents any one authentication server from having to handle the full load during heavy authentication periods, such as at the start of the business day.
Previously, the controller used the first authentication server in the server group list. The remaining servers in that group would be used in sequential order only when an authentication server was down. Thus, the controllers performed fail-over instead of load balancing of authentication servers.
The load balancing algorithm computes the expected time taken to authenticate a new client for each authentication server and chooses that authentication server with the shorted expected authentication time. The load balancing algorithm maintains re-authentication stickiness, meaning that at the time of reauthentication, the request is forwarded to the same server where it was originally authenticated.
Enabling Authentication Server Load Balancing Functionality
A new load­balancing enable parameter has been introduced in the aaa server-group test command to enable authentication server load balancing functionality. aaa server-group <sg_name>
load-balance auth-server s1 auth-server s2
You can use the following command to disable load balancing: aaa server-group<sg_name>
no load-balance
If you configure an internal server in the server group, load balancing is not applicable to the internal server. The Internal server will be used as a fall-back when all other servers in the group are down.

278 | Authentication Servers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Chapter 10 MAC-based Authentication
This chapter describes how to configure MAC-based authentication on the Dell controller using the WebUI. Use MAC-based authentication to authenticate devices based on their physical media access control (MAC) address. Although this not the most secure and scalable method, MAC-based authentication implicitly provides an addition layer of security to authenticate devices. MAC-based authentication is often used to authenticate and allow network access through certain devices while denying access to the rest. For example, if clients are allowed access to the network through station A, then one method of authenticating station A is MAC-based. Clients may be required to authenticate themselves using other methods depending on the network privileges required. MAC-based authentication can also be used to authenticate Wi-Fi phones as an additional layer of security to prevent other devices from accessing the voice network using what is normally an insecure SSID. This chapter describes the following topics: l Configuring MAC-Based Authentication on page 279 l Configuring Clients on page 280
Configuring MAC-Based Authentication
Before configuring MAC-based authentication, you must configure the following options: l User role--The user role that will be assigned as the default role for the MAC-based authenticated clients.
(See Roles and Policies on page 438 for information on firewall policies to configure roles.) Configure the default user role for MAC-based authentication in the AAA profile. If derivation rules exist or if the client configuration in the internal database has a role assigned, these values take precedence over the default user role. l Authentication server group--The authentication server group that the controller uses to validate the clients. The internal database can be used to configure the clients for MAC-based authentication. See Configuring Clients on page 280 for information on configuring the clients on the local database. For information on configuring authentication servers and server groups, see Authentication Servers on page 249.
Configuring the MAC Authentication Profile
Table 53 describes the parameters you can configure for MAC-based authentication.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

MAC-based Authentication | 279

Table 53: MAC Authentication Profile Configuration Parameters

Parameter

Description

Delimiter

Delimiter used in the MAC string: l colon specifies the format Xx:XX:XX:XX:XX:XX l dash specifies the format XX-XX-XX-XX-XX-XX l none specifies the format XXXXXXXXXXXX l oui-nic specifies the format XXXXXX:XXXXXX Default: none NOTE: This parameter is available for the aaa authentication-server radius command.

Case

The case (upper or lower) used in the MAC string. Default: lower

Max Authentication failures

Number of times a station can fail to authenticate before it is blacklisted. A value of zero disables blacklisting.
Default: zero (0)

In the WebUI
1. Navigate to the Configuration > Security > Authentication > L2 Authentication page. 2. Select MAC Authentication Profile. 3. Enter a profile name and click Add. 4. Select the profile name to display configurable parameters. 5. Configure the parameters, as described in Table 53. 6. Click Apply.
In the CLI
Execute the following command to configure a MAC authentication profile: (host)(configure) #aaa authentication mac <profile>
case {lower|upper} delimiter {colon|dash|none} max-authentication-failures <number>

Configuring Clients
You can create entries in the controller's internal database to authenticate client MAC addresses. The internal database contains a list of clients along with the password and default role for each client. To configure entries in the internal database for MAC authentication, you enter the MAC address for both the username and password for each client.
You must enter the MAC address using the delimiter format configured in the MAC authentication profile. The default delimiter is none, which means that MAC addresses should be in the format xxxxxxxxxxxx. If you specify colons for the delimiter, you can enter MAC addresses in the format xx:xx:xx:xx:xx:xx.

280 | MAC-based Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select Internal DB. 3. Click Add User in the Users section. The user configuration page displays. 4. For User Name and Password, enter the MAC address for the client. Use the format specified by the
Delimiter parameter in the MAC Authentication profile. For example, if the MAC Authentication profile specifies the default delimiter (none), enter MAC addresses in the format xxxxxxxxxxxx. 5. Click Enabled to activate this entry on creation. 6. Click Apply.
The configuration does not take effect until you perform this step.
In the CLI
Enter the following command in enable mode: (host)(config) #local-userdb add username <macaddr> password <macaddr>...

Dell Networking W-Series ArubaOS 6.4.x | User Guide

MAC-based Authentication | 281

Chapter 11 Branch Controller Config for Controllers
Many distributed enterprises with branch and remote offices and locations use cost-effective hybrid WAN connectivity solutions that include low-cost DSL, 4G and LTE technologies, rather than relying solely on traditional E1/T1 or T3/E3 dedicated circuits. W-7000 Series Controllers are optimized for these types of locations, which are more likely to use cloud security architectures instead of dedicated security appliances, and where clients are likely to access applications in the cloud, rather than on local application servers.
Throughout this document the term branch controller will refer to a W-7000 Series controller that has been configured via a branch config group created using the ArubaOS Smart Config WebUI.
ArubaOS supports these distributed enterprises through the following features designed specifically for branch and remote offices: l Authentication survivability allows W-7000 Series controllers to store user access credentials and key reply
attributes whenever clients are authenticated with external RADIUS servers or LDAP authentication servers, providing authentication and authorization survivability when remote authentication servers are not accessible. l Integration with existing Palo Alto Networks Firewalls, like WildFireTM anti-virus and anti-malware detection services. In deployments with multiple Palo Alto Networks (PAN) firewalls, W-7000 Series controllers can select the best PAN firewall based on priority and availability. l Policy-based routing on each uplink interface, which allows you specify the next hop to which packets are routed. ArubaOS supports multiple next-hop lists, to ensure connectivity in the event that a device on the list becomes unreachable. l Uplink and VPN redundancy, and per-interface bandwidth contracts to limit traffic for individual applications (or categories of applications) either sent from or received by a selected interface. l Packet compression between Dell devices (such as devices at the branch and main office), to maximize the amount of data that can be carried by the network. l A WAN health-check feature that uses ping-probes to measure WAN availability and latency on each uplink. The following diagram depicts managed node where a branch controller in the branch office learns the address, routing information, and other provisioning information from the master controller.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Branch Controller Config for Controllers | 282

This chapter describes the features and functions of a branch controller, and includes the following topics: l Branch Deployment Features on page 283 l Zero-Touch Provisioning on page 296 l Using Smart Config to create a Branch Config Group on page 298 l PortFast and BPDU Guard on page 320 l Preventing WAN Link Failure on Virtual APs on page 322 l Branch WAN Dashboard Changes on page 323
Branch Deployment Features
This section describes the following branch controller features. For details on the configuration parameters for each of these features, see Using Smart Config to create a Branch Config Group on page 298. l WAN Failure (Authentication) Survivability on page 284 l WAN Optimization through IP Payload Compression on page 290 l WAN Optimization through IP Payload Compression on page 290 l Interface Bandwidth Contracts on page 292 l Integration with a Palo Alto Networks (PAN) Portal on page 292 l Integration with a Palo Alto Networks (PAN) Portal on page 292

283 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

WAN Failure (Authentication) Survivability
This section contains the following information about the authentication survivability feature. This feature is supported on W-7000 Series controllers.
l Supported Client and Authentication Types l Administrative Functions l About the Survival Server l Trigger Conditions for Critical Actions l Authentication for Captive Portal Clients l Authentication for 802.1X Clients l Authentication for MAC Address-Based Clients l Authentication for WISPr Clients
Authentication survivability allows controllers to provide client authentication and authorization survivability when remote authentication servers are not accessible. It stores user access credentials, as well as key reply attributes, whenever clients are authenticated with external RADIUS servers or LDAP authentication servers. When external authentication servers are not accessible, the controller uses its local Survival Server to continue providing authentication and authorization functions by using the user access credentials and key reply attributes that were stored earlier.
Authentication survivability is critical to WLANs managed by branch controllers since most branch controllers use geographically remote authentication servers to provide authentication and authorization services. When those authentication servers are not accessible, clients can't access the WLAN because the branch controller can't authenticate them.
This feature can be configured for branch controllers using the Smart Config WebUI, or for master and local controllers using the aaa auth-survivability commands in the command-line interface. For details on configuring this feature using the Smart Config WebUI, see WAN Configuration on page 317.

Supported Client and Authentication Types
The the following combination of clients and authentication types are supported with the authentication survivability feature (see Table 54):
Table 54: Clients and Supported Authentication Types

Clients Captive Portal clients 802.1X clients

Authentication Methods
Password Authentication Protocol (PAP)
l Termination disabled: Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) with an external RADIUS server
l Termination enabled: EAP-TLS with Common Name (CN) lookup with an external authentication server

External Captive Portal clients using

PAP

the XML-API

MAC-based Authentication clients

PAP

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 284

Clients VPN clients
VIA and other VPN clients Wireless Internet Service Provider roaming (WISPr) clients

Authentication Methods l PAP with an external authentication server l CN lookup with an external authentication server PAP method and CN lookup PAP

In this initial release, the external authentication server can be either a RADIUS server or an LDAP server.

Supported Key Reply Attributes
The following key reply attributes are supported:
l ARUBA_NAMED_VLAN l ARUBA_NO_DHCP_FINGERPRINT l ARUBA_ROLE l ARUBA_VLAN l MS_TUNNEL_MEDIUM_TYPE l MS_TUNNEL_PRIVATE_GROUP_ID l MS_TUNNEL_TYPE l PW_SESSION_TIMEOUT l PW_USER_NAME
Support Restrictions
The authentication survivability feature has the following support restrictions:
l The Survival Server cache database is station-based (thus, the MAC address is the key), so authentication survivability is not supported for any station with a zero MAC address.
l For a client using EAP-TLS, you must install the issuer certificate of the Survival Server certificate as a TrustedCA certificate in the client station.
l For an 802.1X client using EAP-TLS that does not terminate at the controller, the issuer certificate for the client certificate must be imported as a TrustedCA or an intermediateCA certificate at the controller--just as the same certificate must be installed at the terminating External RADIUS server.
l The Survival Server does not support the Online Certificate Status Protocol (OCSP) nor the Certificate Revocation List (CRL) for EAP-TLS.
l Authentication survivability will not activate if Authentication Server Dead Time is configured as 0. To configure Authentication Server Dead Time, on the controller, navigate to: Configuration > SECURITY > Authentication > Advanced > Authentication Timers > Authentication ServerDeadTime (min).
Administrative Functions
This section describes the scenarios that illustrate the functionality that the authentication survivability feature provides. For more information, see:
l Branch Deployment Features on page 283 l Branch Deployment Features on page 283

285 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Enabling Authentication Survivability on a Local Branch Controller
You can configure each local branch controller to enable or disable Authentication Survivability; by default, this feature is disabled. When authentication survivability is enabled, the enabled authentication survivability state is published, which instructs the Survival Server to start storing client access credential attributes and Key Reply attributes.
Configuring the Survival Server Certificate
A default server certificate is provided in the controller so that the local Survival Server can terminate EAP-TLS 802.1X requests.
Best practices is to import a customer server certificate into the controller and assign it to the local survival server.
Configuring the Lifetime of the Authentication Survivability Cache
All access credentials and Key Reply attributes that are saved in the local Survival Server remain in the system until they expire. The system-wide lifetime parameter auth-survivability cache-lifetime has a range from 1 to 72 hours, and a default value of 24 hours. You must configure this parameter in each controller.
User Credential and Key Reply Attributes Are Saved Automatically
When a station is authenticated by an external authentication server, required access credential attributes and Key Reply attributes are stored in the local Survival Server RADIUS database in an enabled authentication survivability ArubaOScontroller.
Expired User Credential and Key Reply Attributes Are Purged Automatically
At the controller, a timer task that runs every 10 minutes purges expired user credential attributes and Key Reply attributes that are stored in the Survival Server cache.
About the Survival Server
A local Survival Server runs on the controller to perform authentication functions, as well as EAP-termination using the RADIUS protocol. The Survival Server consists of a turn-key FreeRADIUS server, plus MySQL database tables. When authentication survivability is enabled, a FreeRADIUS server runs on the controller. The Survival Server is configured to accept RADIUS requests from the local host and retrieve the access credential and Key Reply attributes from the MySQL database. The Survival Server supports EAP-TLS, PAP, and Common Name (CN) lookup.
Trigger Conditions for Critical Actions
This section describes the trigger conditions for critical authentication survivability actions.
Storing User Access Credential and Key Reply Attributes to Survival Cache
Aruba OS stores the user access credential and Key Reply attributes under the following conditions: 1. Authentication survivability is enabled > AND > 2. The non-zero MAC-address client is authenticated > AND >
a. Authenticated with an External RADIUS server using PAP or EAP-TLS > OR > b. Authenticated with an External LDAP server using PAP > OR > c. Successful query on Common Name (CN) with an External RADIUS or LDAP server

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 286

Picking Up the Survival Server for Authentication
The Survival Server performs an authentication or query request when: l Authentication survivability is enabled > AND >
a. All servers are out of service in the server group if fail-through is disabled > OR > b. All in-service servers failed the authentication and at least one server is out of service when fail-through
is enabled.
Access Credential Data Stored
In addition to the username, the following access credential data is stored: l Password Authentication Protocol (PAP): authmgr receives the password provided by the client and then
stores the encrypted SHA-1 hashed value of the password. l When employing 802.1X with disabled termination using EAP-TLS, the EAP indicator is stored. l The CN lookup EXIST indicator is stored.
Authentication for Captive Portal Clients
This section describes the authentication procedures for Captive Portal clients us, both when the branch's authentication servers are available and when they are not available. When the authentication servers are not available, the Survival Server takes over the handling of authentication requests. This section describes the following authentication scenarios: l Captive Portal clients authentication using Password Authentication Protocol (PAP) l External Captive Portal clients authentication using the XML-API
Captive Portal Client Authentication Using PAP
Table 55 describes what occurs for Captive Portal clients using PAP as the authentication method.

Table 55: Captive Portal Authentication Using PAP

When Authentication Servers Are Available

When Authentication Servers Are Not Available

l If authentication succeeds, the associated access credential with an encrypted SHA-1 hash of the password and Key Reply attributes are stored in the Survival Server database.
l If authentication fails, the associated access credential and Key Reply attributes associated with the PAP method (if they exist) are deleted from the Survival Server database.

When no in-service server in the associated server group is available, the Survival Server is used to authenticate the Captive portal client using PAP.
The Survival Server uses the previously stored unexpired access credential to perform authentication and, upon successful authentication, returns the previously stored Key Reply attributes.

External Captive Portal Client Authentication Using the XML-API
Table 56 describes the authentication procedures for External Captive Portal clients using the XML-API, both when the branch's authentication servers are available and when they are not available. When the authentication servers are not available, the Survival Server takes over the handling of authentication requests.

287 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 56: Captive Portal Authentication Using XML-API

When Authentication Servers Are Available

When Authentication Servers Are Not Available

For authentication requests from an External Captive Portal using the XML-API, PAP is used to authenticate these requests with an external authentication server.
l If authentication succeeds, the associated access credential with an encrypted SHA-1 hash of the password and Key Reply attributes are stored in the Survival Server database.
l If authentication fails, the associated access credential and Key Reply attributes associated with the PAP method (if they exist) are deleted from the Survival Server database.

When no in-service server in the associated server group is available, the Survival Server is used to authenticate the Captive portal client using PAP.
The Survival Server uses the previously stored unexpired access credential to perform authentication and, upon successful authentication, returns the previously stored Key Reply attributes.

Authentication for 802.1X Clients
This section describes the authentication procedures for 802.1X clients, both when the branch's authentication servers are available and when they are not available. When the authentication servers are not available, the Survival Server takes over the handling of authentication requests. For 802.1X clients, the authentication scenarios include two different 802.1X termination modes: l 802.1X termination disabled at the Wireless LAN Controller l 802.1X termination enabled at the Wireless LAN Controller
802.1X Termination Disabled at the Wireless LAN Controller

Table 57: 802.1X Authentication Using EAP-TLS

When Authentication Servers Are Available

When Authentication Servers Are Not Available

For an 802.1X client that terminates at an external RADIUS server using EAP-TLS:
l If authentication is accepted, the associated access credential with the EAP-TLS indicator, in addition to the Key Reply attributes, are stored in the Survival Server database.
l If authentication is rejected, the associated access credential and Key Reply attributes associated with the EAP-TLS method (if they exist) are deleted from the Survival Server database.

When there is no available in-service server in the associated server group, the Survival Server terminates and authenticates 802.1X clients using EAP-TLS.
The Survival Server uses the previously stored unexpired access credential to perform authentication and, upon successful authentication, returns the previously stored Key Reply attributes.
In this case, the client station must be configured to accept the server certificate assigned to the Survival Server.

802.1X Termination Enabled at the Wireless LAN Controller
For an 802.1X client for which termination is enabled at the wireless LAN controllerusing EAP-TLS with Common Name (CN) lookup, a query request about the Common Name is sent to the external authentication server.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 288

The external authentication server can be either a RADIUS server or an LDAP server.

Table 58: 802.1X Client Authentication Using EAP_TLS with CN Lookup

When Authentication Servers Are Available

When Authentication Servers Are Not Available

l If the query succeeds, the associated access credential with a returned indicator of EXIST, plus the Key Reply attributes, are stored in the Survival Server database.
l If the query fails, the associated access credential and Key Reply attributes associated with the Query method (if they exist) are deleted from the Survival Server database.

When there is no available in-service server in the associated server group, the Survival Server performs CN lookup for 802.1X clients for which termination is enabled at the controller using EAPTLS.
The Survival Server returns previously stored Key Reply attributes as long as the client with the EXIST indicator is in the Survival Server database.

Authentication for MAC Address-Based Clients
This section describes the authentication procedures for MAC address-based clients, both when the branch's authentication servers are available and when they are not available. When the authentication servers are not available, the Survival Server takes over the handling of authentication requests.

Table 59: MAC-Based Client Authentication Using PAP

When Authentication Servers Are Available

When Authentication Servers Are Not Available

l If authentication succeeds, the associated access credential, along with an encrypted SHA-1 hash of the password and Key Reply attributes, are stored in the Survival Server database.
l If authentication fails, the associated access credential and Key Reply attributes associated with the PAP method (if they exist) are deleted from the Survival Server database.

When there is no available in-service server in the associated server group, the Survival Server authenticates the MAC-based authentication client using PAP.
The Survival Server returns previously stored Key Reply attributes as long as the client with the EXIST indicator is in the Survival Server database.

Authentication for WISPr Clients
This section describes the authentication procedures for Wireless Internet Service Provider roaming (WISPr) clients, both when the branch's authentication servers are available and when they are not available. When the authentication servers are not available, the Survival Server takes over the handling of authentication requests.
The external authentication server can be either a RADIUS server or an LDAP server.

289 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 60: WISPr Authentication Using PAP

When Authentication Servers Are Available

When Authentication Servers Are Not Available

For a WISPr client authenticated by an external server using PAP:
l If authentication succeeds, the associated access credential, along with an encrypted SHA-1 hash of the password and Key Reply attributes, are stored in the Survival Server database.
l If authentication fails, the associated access credential and Key Reply attributes (if they exist) associated with the PAP method are deleted from the Survival Server database.

When there is no available in-service server in the associated server group, the Survival Server authenticates the WISPr client using PAP.
Upon successful authentication, the Survival Server uses the previously stored unexpired credential to perform authentication, and returns the previously stored Key Reply attributes .

WAN Health Check
The health-check feature uses ping-probes for measuring WAN availability and latency. Based upon the results of this health-check information, the controller can continue to use its primary uplink, or failover to a backup link. Latency is calculated based on the round-trip time (RTT) of ping responses. Latency is calculated based on the round-trip time (RTT) of ping responses. The results of this health check appears in the WAN section of the Monitoring Dashboard.
For details on configuring this feature using the Smart Config WebUI, see WAN Configuration on page 317.
WAN Optimization through IP Payload Compression
Data compression reduces the size of data frames that are transmitted over a network link, thereby reducing the time required to transmit the frame across the network. IP payload compression is one of the key features of the WAN bandwidth optimization solution, which is comprised of the following elements: l IP Payload Compression l Traffic Management and QoS l Caching
WAN optimization through IP payload compression is not support in W-7205 controller.
Since the branch controller can have traffic to destinations other than HQ on the same link, the preferred method is to enable payload compression on the IPsec tunnel between the branch controller and the master controller. IP payload should be enabled only between Dell devices. When this hardware-based compression feature is enabled, the quality of unencrypted traffic (such as Lync or Voice traffic) is not compromised through increased latency or decreased throughput.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 290

Distributed Layer 3 Branch Deployment Model
In the branch deployment model shown in Figure 43, the IPsec tunnels are terminated on the master controller. IPsec tunnels are treated as master-local tunnels.
Figure 43 Branch Deployment Model with Master Controller in HQ

Compression/Decompression Engine
The W-7000 Series Controllers contain the Compression/Decompression Engine (CDE) that compresses the raw IP payload data and also decompresses the compressed payload data. The CDE compression process is called Deflation; the decompression process is called Inflation (as defined in RFC1951).
The key Compression/Decompression Engine features are as follows:
l Four CDE channels on the XLP4XX processor and one CDE channel on the XLP2XX processor l 2.5 GBps per CDE (Deflation process, Inflation process, or combination of both) l Deflation context save and restore (at block boundaries) l Inflation context save and restore (at arbitrary file position) l Load balancing the input messages to all CDEs
You can split a file or data into blocks, and each block can use the mode of compression that suits it best. In this case, it is packet data and there will be only one block.

Modes of Operation
There are three modes of operation for the deflation and inflation compression processes:
l Static Compression For static compression, a predefined Huffman code is used that may not be ideal for the block in question, but it usually achieves acceptable compression. The advantage of static compression is its speed of execution.
l Dynamic Compression

291 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The advantage of dynamic compression is a higher compression ratio. However, dynamic compression is slower than static compression, as it requires two passes to complete the process. l No Compression You can use no compression for data such as an embedded image file that might already be in a compressed format. Such data does not compress well, and may even increase in size.
For details on configuring this feature using the Smart Config WebUI, see WAN Configuration on page 317.
Interface Bandwidth Contracts
W-7000 Series controllers have the ability to classify and identify applications on the network. If a W-7000 Series controller is configured as a branch office controller, you can create bandwidth contracts to limit traffic for individual applications (or categories of applications) either sent from or received by a selected interface. There are two basic models for using this feature. l Limiting lower-priority traffic: If there is a lower-priority application or application type that you want to
limit, apply a bandwidth contract just to that application, and allow all other application traffic to pass without any limits. l Protecting higher-priority traffic: If you want to guarantee bandwidth for a company-critical application or application group, you can add that application to an exception list, then apply a bandwidth contract to all remaining traffic. You can apply bandwidth contracts using one or both of these models. Each interface supports up to 64 bandwidth contracts. An interface bandwidth contract is applied to downstream traffic before a user-role bandwidth contract is applied, and upstream traffic, the user-role bandwidth contract is applied before the interface bandwidth contract. For all traffic using compression and encryption, bandwidth contracts are applied after that traffic is compressed and encrypted. If you apply more than one bandwidth contract to any specific category type, then the bandwidth contracts are applied in the following order. 1. A contract that explicitly excludes an application 2. A contract that explicitly excludes an application category 3. A contract that applies to a specific application 4. A contract that applies to a specific application category 5. A generic bandwidth contract, not specific to any application or application category
For details on configuring this feature using the Smart Config WebUI, see WAN Configuration on page 317.
Integration with a Palo Alto Networks (PAN) Portal
Dell controller deployments can leverage their networks' existing PaloAlto infrastructure to access more advanced security services, including antivirus services, malware detection and seamless integration with the Palo Alto Networks WildFireTM cloud-based threat detection. Enable Palo Alto firewall integration on a master controller to securely redirect internet inbound traffic from branch controllers using the branch config group into the PAN firewall. Although this configuration setting can be used on standalone or local controllers, this feature can only be used on controllers in these types of deployments when used in conjunction with the controller uplink VLAN manager feature.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 292

The uplink VLAN manager is enabled by default on branch controller uplinks. Master or local (non-branch) controllers using the PAN portal feature must enable the uplink VLAN manager using the uplink command in the controller command-line interface.
Figure 44 Branch Controller and PAN Firewall Integration

Integration Workflow
The following steps describes the work flow to integrate a branch controller with a Palo Alto Networks (PAN) Large-Scale VPN (LSVPN) firewall.
1. Palo Alto Portal certificates are installed on the master controller, and the master controller is configured with the Palo Alto portal IP address or FQDN, Palo Alto certificate, and the username and password for device authentication using the Configuration> Branch > Smart Config > WAN section of the master controller WebUI.
2. The W-7000 Series branch controller is provisioned via the basic setup dialog.
3. The Palo Alto portal may be configured with the device number (a text string comprised of the device serial number followed by its MAC address) of the branch controller(s) at each remote office site. This allows the branch controller to bypass the username and password challenge to authenticate to the portal.
4. The branch controller initiates a secure connection to the Palo Alto portal. Once the branch controller is authenticated, the Palo Alto portal sends the branch controller a list of PAN gateways and priority levels. Once the branch controller is authenticated, that device appears in the PAN satellite list, as shown in the figure below.

293 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 45 Palo Alto Networks Active Satellites List

.
5. The branch controller uses the Palo Alto Networks gateway list and credentials from the portal to contact all PAN gateways. Each PAN gateway sends the branch controller information that allows the branch controller to automatically create a secure IPsec tunnel and exchange branch subnet routes with each PAN gateway.
6. The branch controller maintains a priority list of IPsec tunels to each PAN gateway to enable failover in the3 event a PAN gateway becomes unreachable.
7. Policy-based routing access control lists (ACLs) on the branch controller selectively routes traffic to the PAN gateways.
8. Traffic redirected from the branch controller is inspected via the Palo Alto Networks firewall.
Configuration Prerequisites
The Palo Alto Networks LSVPN framework can integrate with a branch controller by establishing an IPsec tunnels between the firewall and the controller. Integrating a Palo Alto Networks firewall with a W-7000 Series controller requires that all user traffic is routed, so it can be managed by a policy-based routing access control list.
The following certificate requirements must be fulfilled before the branch controller can integrate with the Palo Alto Networks Large-Scale VPN (LSVPN) framework:
l the LSVPN framework must be installed and active on your network. For more information on configuring Palo Alto Networks products, refer to the Palo Alto Networks Technical Documentation portal.
l The CA certificate used by the Palo Alto portal must be installed on the master controller, so that it can be pushed down to the branch controllers.
l On the PAN gateway devices, you must enable the accept published routes option, and the devices must install the server certificates derived from the management portal root CA.
In deployments with multiple PAN firewalls, you must configure the PAN management portal with a list of gateways and the priorities for each PAN gateway. Even if the PAN management portal uses serial number registration with preregistered serial numbers or MAC addresses, best practice is to configure LDAP, Radius, Kerberos or Local Database authentication as well. This allows a controller to authenticate to the portal even if the portal does not recognize the controller's MAC address.
For details on configuring this feature using the Smart Config WebUI, see WAN Configuration on page 317.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 294

Branch Controller Routing Features
The following sections describe some of the features that can be configured using the Smart Config WebUI. For details on configuring these feature using the Smart Config WebUI, see Routing Configuration on page 309.
Uplink Routing Using Nexthop Lists
A next-hop IP is the IP address of a adjacent router or device with Layer-2 connectivity to the controller. If the controller uses policy-based routing to forward packets to a next hop device and that device becomes unreachable, the packets matching the policy will not reach their destination.
The nexthop list provides redundancy for the next-hop devices by forwarding the traffic to a backup next hop device in case of failures. If the active next-hop device on the list becomes unreachable, traffic matching a policy-based routing ACL is forwarded using the highest-priority active next-hop device on the list.
If preemptive failover is enabled and a higher priority next hop becomes reachable again, packets are again forwarded to the higher priority next-hop device.
For more information on creating a routing policy that references a nexthop list, see Configuring Firewall Policies on page 438.
A maximum of four next-hop device entries can be added to a nexthop list. Each next-hop device can be assigned a priority, which decides the order of selection of the next hop. If a higher priority next-hop device goes down, the next higher priority active next-hop device is chosen for forwarding.
If all the next-hop devices are configured with same priority, the order is determined based on the order in which they are configured. If all the next-hops devices are down, traffic is passed regular destination-based forwarding.
In a typical deployment scenario with multiple uplinks, the default route only uses one of the uplink next-hop devices for forwarding packets. If a next hop device becomes unreachable, the packets will not reach their destination.
If your deployment uses policy-based routing based on a nexthop list, any of the uplink next hop devices could be used for forwarding traffic. This requires a valid ARP entry (route-cache) in the system for all the policybased routing next-hop devices. Each controller supports up to 32 nexthop lists.
In a branch office deployment, the site uplinks can obtain their IP addresses and default gateway using DHCP. In such deployments, the nexthop list configuration can use the VLAN IDs of uplink VLANs. If the VLAN gets an IP address using DHCP, and the default gateway is determined by the VLAN interface, the gateway IP is used as the next-hop IP address.
Branch deployments may also require policy-based redirection of traffic to different VPN tunnels. The nexthop list allows you to select an IPsec map to redirect traffic through IPsec tunnels.
Policy-Based Routing
Policy-based routing is an optional feature that allows packets to be routed based on access control lists (ACLs) configured by the administrator. By default, when a controller receives a packet for routing, it looks up the destination IP in the routing table and forwards the packet to the next-hop router. If policy-based routing is configured, the nexthop device can be chosen based on a defined access control list.
In a typical deployment scenario with multiple uplinks, the default route only uses one of the uplink next-hop devices for forwarding packets. If a next-hop device becomes unreachable, the packets will not reach their destination. If your deployment uses policy-based routing based on a nexthop list, any of the uplink next-hop devices can be used for forwarding traffic. This requires a valid ARP entry (Route-cache) in the system for all the policy-based routing next hop devices.

295 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Zero-Touch Provisioning
Traditionally, the deployment of controllers was a multiple step process where the master controller information and local configurations were first pre-provisioned. After the local controller connected to the network, it established a secure tunnel to the master and downloaded the global configuration. Zero touch provisioning makes the deployment of local controllers plug-n-play. The local controller now learns the required information from the network and provisions itself automatically. A W-7000 Series branch controller is a zero-touch provision (ZTP) controller that automatically gets its local and global configuration and license limits from a central controller.
A controller does not need to be configured as a branch controller to be provisioned using ZTP.
ZTP offer the following advantages over a standard local controller: l simple deployment l reduced operational cost l limits to provisioning errors The main elements for ZTP are: l auto discovery of master controller l configuration download from the master controller Provisioning a controller includes completing the following: l setting the role l setting the country code l configuring the local configuration
The local configuration is the configuration that is specific to a controller. That is, not the global configuration shared by a network of controllers. This includes, but is not limited to, IP addresses and VLANs.
Once the controller is provisioned, it is ready to obtain its global configuration either by: l The administrator entering the global configuration directly from the WebUI or CLI of a master controller l The controller retrieving the global configuration from a mastercontroller Previously the steps of setting the role, setting the country code, and configuring the local configuration could only be performed manually by an administrator. With ZTP, these steps can be automatically completed. The local configuration that a branch controller retrieves through ZTP is called as branch config group.
A controller that is deployed using ZTP is called as branch controller.
Only the W-7000 Series controllers may be deployed as branch controllers.
Before you Begin
Before you deploy a W-7000 Series branch controller, use the smart config feature on the master controller to a create branch config group. The master controller can push a branch config group configuration to a branch controller when the branch becomes active on the network. The smart config feature is enabled by default. For more information on branch config group settings, refer to Using Smart Config to create a Branch Config Group on page 298.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 296

The parameters of role, country code, and IP address of the master controller are collectively known as the provisioning parameters.
Provisioning Modes for branch deployments
The administrator has the choice of several provisioning modes that alter how the branch controller is supplied with its own IP address, role, country code, and branch config group. During the various provisioning modes, the branch controller is supplied with the IP address of the master controller. Once the branch controller learns the IP address of the master controller, the branch controller contacts the master controller and retrieves its branch config group. Provisioning a controller means defining the following values for that device: l the role of the controller (master or branch) l the country code l local configuration settings ArubaOS supports the following provisioning modes for branch controllers: l auto: In this mode, branch controller:
n obtains its IP address from DHCP n obtains its role, country code, and the IP address of the master controller from either DHCP Options or a
provisioning rule in n retrieves its branch config group from the master controller l mini-setup: In this mode, the branch controller: n has its role set to branch when mini-setup is initiated n obtains its IP address from DHCP n is configured with its country code and the IP address of the master controller through the console n retrieves its branch config group from the master controller l full-setup: In this mode, the branch controller: n is configured with its role set to branch through the console n is configured to obtain its IP address through manual configuration of a static IP, DHCP, or PPPoE n is configured with its country code and the IP address of the master controller through the console n retrieves its branch config group from the master controller.
Automatically Provisioning a Branch Controller
When a factory-default branch controller boots, it starts the auto-provisioning process. First it will obtain its IP address through DHCP by sending a DHCP discover on the default uplink port. The default uplink port is configured as an access port in VLAN 4094. Second, it will attempt to retrieve the provisioning parameters from the DHCP options in the DHCP lease it has obtained. Next, if the provisioning parameters could not be obtained from the DHCP options, the branch controller will attempt to retrieve the provisioning parameters from . If the branch controller is unsuccessful in retrieving the provisioning parameters from , it will retry in 30 seconds. The branch controller will keep trying to retrieve the provisioning parameters from every 30 seconds until it is successful or the administrator interrupts Auto-Provisioning by initiating mini-setup or full-setup.

297 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

To interrupt the auto provisioning process, enter the string mini-setup or full-setup at the initial setup dialog prompt shown below. Auto-provisioning is in progress. Choose one of the following options to override or debug...
'enable-debug' : Enable auto-provisioning debug logs 'disable-debug': Disable auto-provisioning debug logs 'mini-setup' : Stop auto-provisioning and start mini setup dialog for smart-branch role 'full-setup' : Stop auto-provisioning and start full setup dialog for any role Enter Option (partial string is acceptable):_
DHCP Options
When the branch controller sends the DHCP discover to obtain its IP address, it adds DHCP option 60 ­ Vendor Class Identifier to the DHCP discover. DHCP Option 60 is set to "ArubaMC". If the DHCP Offer does have DHCP Option 60 = ArubaMC, the branch controller will accept the DHCP lease and send a DHCP request. It will also look for DHCP Option 43 ­ Vendor Specific Information in the DHCP Lease. If DHCP Option 43 is present in the Offer, the branch controller will parse it to learn the provisioning parameters.
The role is not explicitly specified in DHCP Option 43. However, the Controller will set its Role to branch if the other provisioning parameters are present in DHCP Option 43.
If the DHCP Offer does not have DHCP Option 60 = ArubaMC, the branch controller will still accept the DHCP lease and send a DHCP request. However, once it is bound to the IP address, it will initiate the next mode of auto-provisioning - Query for a provisioning rule.
DHCP Server Provisioning
The branch controller adds ArubaMC as a DHCP option-60 vendor class identifier in its DHCP discovery messages, so the DHCP offer from the server must include ArubaMC as a DHCP option-60 vendor class identifier. The controller gets the master information and country code from the DHCP server, which is configured with the master information corresponding to that identifier. The server may also send vendorspecific information (VSI - option 43) in its response to the controller. Before you deploy a branch controller using ZTP, configure the DHCP server with the following information: l The option-60 vendor class identifier ArubaMC l Option-43 Vendor Specific Information (VSI) with the master IP address, or the master IP and country code,
of the branch controller . This VSI must be in one of the following formats, where <master-ip-address) contains the IP address of the master controller in dotted-decimal notation (a.b.c.d) format, and the country code contains a valid ISO 3166 country codes,such as, US, AU, or IN
n <Master-IP-address>, n <Master-ip-address>,<Country-code>
Using Smart Config to create a Branch Config Group
Before you begin to configure a branch config group for individual branch controllers, you must select a master controller to serve as the master for a group of branch controllers on a network. A controller can act either as a master or a branch controller, but not both.
Any change to an active branch controller's DHCP pool configuration causes the branch controller to reboot.
Only W-7200 Series controllers can server as a master controller for a group of branch controllers on a network.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 298

Create and configure a branch config group on a master controller by navigating to the Configuration > BRANCH > Smart Config section of the master controller WebUI. The Smart Config page contains eight tabs for configuring the branch config group settings.
The BRANCH > Smart Config section of the master controller WebUI is available on the W-7200 Series controllers only.
The configuration parameter on each of these tabs are described in the following pages:
l Config Group Management Settings on page 299 l System Configuration on page 305 l Networking Configuration on page 307 l Routing Configuration on page 309 l VPN Configuration on page 314 l WAN Configuration on page 317 l Branch Config Group Summary on page 319 l Whitelist Configuration on page 320
Config Group Management Settings
Use this tab to create a new branch config group, select the model of branch controller to which this config group will be applied, and choose either the Static or Dynamic IP address management option for your deployment.
Address Pools
Each branch controller must have a pool of addresses it can dynamically assign to APs or users on each of its VLANs, and a separate IP address that branch controller uses to create a GRE tunnel to the master controller. Branch controller VLAN pools and the tunnel pool are defined on the master controller. Branch controller address pools are pushed out to each branch controller when it comes up on the network. If a branch controller is removed from the master, the IP addresses allocated to that branch controller can be reused and reassigned to a new branch controller .
A master controller must have a separate VLAN pool defined for each VLAN used by its branch controller. A VLAN pool allocates a static, continuous block of multiple IP addresses to each branch controller. The branch controller acts as a DNS proxy server and dynamically assign IP addresses from its allocated pool to each AP or client on the VLAN.
The tunnel pool on a branch controller defines a range of IP addresses that the branch controller uses to create a GRE tunnel within the IPsec tunnel back to the master controller. Unlike VLAN pools, which allocates multiple addresses to each branch controller VLAN, the tunnel DHCP pool assigns a single tunnel IP address to each branch controller.
Static vs Dynamic IP Management
If you choose the dynamic IP management option, you must define one or more IP address pools with a range of sharable addresses. The master controller then divides each IP address pool into unique subnets that can support the required number of clients per branch, and assigns one of these subnet to each branch controller.
If a branch deployment has existing IP addressing that needs to be preserved (for example, the printers at a branch office have static IP addresses), then the branch config group should use static IP addressing. When you create a branch config group that uses static IP addressing, you must export the ArubaOS static IP addressing template from the master controller, define the IP settings for the devices that need a static IP address within that template, then import the template file back into a branch config group.

299 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

To create a new branch config group:
1. Navigate to Configuration>Branch>Smart Config and select the Management tab. 2. Click the New button under the branch config group list. You are prompted to enter a name for the new
branch config group profile. 3. Click OK. 4. Next, click the Model drop-down list and select the model type of your branch controllers. Each profile can
support a single controller model . 5. Click the IP Address Management drop-down list and select the Static or Dynamic option. 6. If you select Dynamic, each branch office controller will get an IP address using DHCP. 7. If you select Static, the WebUI gives you the option to select export and download the static IP address
template export-RemoteNode.csv, or select import and upload a completed static IP address .csv file. 8. Click Apply to save your settings.
The export-RemoteNode.csv template defines the following settings for each branch controller in the branch config group. Complete the template by adding information for up to four IP address pools for each branch controller.

Table 61: Branch Config Group Template Setting

Parameter

Description

MAC Address

MAC address of the controller.

Description

A brief description of the controller

Time Zone DST

A text string indicating the controller's time zone. NOTE: This string must contain three or more characters of a supported time zone in any of the the formats described in Table 62, for example, HongKong or UTC+08 or CCT.
Specify ON or OFF to indicate if the controller's time zone is currently using daylight savings time.

Pool

Name of an IP address pool. The template supports up to four different address pools, so different address pools can be used for APs, employees, or guest users.

Domain

Name of the branch controller domain.

DNS

IP address of the DNS server.

Vlan

ID of the branch controller VLAN.

Vlan IP

IP address of the branch controller

Mask

Netmask of the branch controller network.

Exclude List

A comma-separated list of IP addresses or IP address ranges that should not be assigned to clients associated to that branch controller. If this field includes multiple entries, they must be grouped within quotation marks. For example, "15.15.15.1115.15.15.20,15.15.15.25,15.15.15.31-15.15.15.40"

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 300

The new branch config group appears in the Branch Config Group List table. This table displays the branch config group name, validated/not validated status, and reboot status for each branch config group.
l Status: A status of Validated indicates that the branch config group has a complete configuration that can be applied to branch controllers. (For example, a branch config group might have a status of Not Validated if the branch config group does not have a IP address defined for the controller or a controller VLAN interface.)
l Reboot Required: This field indicates that the branch config group includes a configuration change that requires a reboot on the branch controllers using that config group.
The table below describes the time zone formats supported by the export-RemoteNode.csv template. Each line in the table describes three or more time zone formats for a single location, though only one is required for the template. For example, specify Edinburgh or UTC+00 or UTC or BST.

301 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 62: Supported Branch Config Group Time Zone Formats

UTC- Time Zones

UTC+ Time Zones

l "International-Date-Line-West", "UTC-12", l "American-Samoa", "UTC-11", "SST" l "Hawaii", "UTC-10", "HST" l "Alaska", "UTC-09", "AKST" l "Baja-California", "UTC-08", "PST" l "Pacific-Time", "UTC-08", "PST" l "Arizona", "UTC-07", "MST" l "Chihuahua", "UTC-07", "MST" l "La-Paz", "UTC-07", "MST" l "Mazatlan", "UTC-07", "MST" l "Mountain-Time", "UTC-07", "MST" l "Central-America", "UTC-06" l "Central-Time", "UTC-06", "CST""CDT" l "Guadalajara", "UTC-06", "CST", "CDT" l "Mexico-City", "UTC-06", "CST", "CDT" l "Monterrey", "UTC-06", "CST", "CDT" l "Saskatchewan", "UTC-06", "CST" l "Bogota", "UTC-05", "EST" l "Lima", "UTC-05", "EST" l "Quito", "UTC-05", "EST" l "Eastern-Time", "UTC-05", "EST" "EDT" l "Indiana(East)", "UTC-05", "EST" "EDT" l "Caracas", "UTC-04:30", "VET" l "Asuncion", "UTC-04", "AST" "PYST" l "Atlantic-Time(Canada)", "UTC-04", "AST" "ADT" l "Cuiaba", "UTC-04", "AST","AMST" l "Georgetown", "UTC-04", "AST" l "Manaus", "UTC-04", "AST" l "San-Juan", "UTC-04", "AST" l "Santiago", "UTC-04", "AST", "SAND" l "Newfoundland", "UTC-03:30", "NST", "NDT" l "Brasilia", "UTC-03", "BST" "BRAD" l "Buenos-Aires", "UTC-03", "BST", "ARST" l "Cayenne", "UTC-03", "BST" l "Fortaleza", "UTC-03", "BST" l "Greenland", "UTC-03", "BST", "GRED" l "Montevideo", "UTC-03", "BST," "UYST"

l "Casablanca", "UTC+00", "UTC", l "Coordinated-Universal-Time", "UTC+00", "UTC", l "Dublin", "UTC+00", "UTC", "IST" l "Edinburgh", "UTC+00", "UTC", "BST" l "Lisbon", "UTC+00", "UTC", "WEST" l "London", "UTC+00", "UTC", "BST" l "Monrovia", "UTC+00", "UTC", l "Reykjavik", "UTC+00", "UTC", l "Amsterdam", "UTC+01", "CET", "CEST" l "Berlin", "UTC+01", "CET", "CEST" l "Bern", "UTC+01", "CET", "CEST" l "Rome", "UTC+01", "CET", "CEST" l "Stockholm", "UTC+01", "CET", "CEST" l "Vienna", "UTC+01", "CET", "CEST" l "Belgrade", "UTC+01", "CET", "CEST" l "Bratislava", "UTC+01", "CET", "CEST" l "Budapest", "UTC+01", "CET", "CEST" l "Ljubljana", "UTC+01", "CET", "CEST" l "Prague", "UTC+01", "CET", "CEST" l "Brussels", "UTC+01", "CET", "CEST" l "Copenhagen", "UTC+01", "CET", "CEST" l "Madrid", "UTC+01", "CET", "CEST" l "Paris", "UTC+01", "CET", "CEST" l "Sarajevo", "UTC+01", "CET", "CEST" l "Skopje", "UTC+01", "CET", "CEST" l "Warsaw", "UTC+01", "CET", "CEST" l "Zagreb", "UTC+01", "CET", "CEST" l "West-Central-Africa", "UTC+01", "CET" l "Windhoek", "UTC+01", "CET", "WAST" l "Amman", "UTC+02", "EET", "EEST" l "Athens", "UTC+02", "EET," "EEST" l "Bucharest", "UTC+02", "EET," "EEST" l "Beirut", "UTC+02", "EET", "EEST" l "Cairo", "UTC+02", "EET" l "Damascus", "UTC+02", "EET", "EEST" l "East-Europe", "UTC+02", "EET", "EEST" l "Harare", "UTC+02", "EET"

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 302

Table 62: Supported Branch Config Group Time Zone Formats

UTC- Time Zones

UTC+ Time Zones

l "Salvador", "UTC-03", "BST", "BRST" l "Mid-Atlantic", "UTC-02", "FNT" l "Azores", "UTC-01", "AZOST", "AZOST" l "Cape-Verde-Is", "UTC-01", "CVT" l "Casablanca", "UTC+00", "UTC", l "Coordinated-Universal-Time", "UTC+00", "UTC", l "Dublin", "UTC+00", "UTC", "IST" l "Edinburgh", "UTC+00", "UTC", "BST" l "Lisbon", "UTC+00", "UTC", "WEST" l "London", "UTC+00", "UTC", "BST" l "Monrovia", "UTC+00", "UTC", l "Reykjavik", "UTC+00", "UTC", l "Amsterdam", "UTC+01", "CET", "CEST" l "Berlin", "UTC+01", "CET", "CEST" l "Bern", "UTC+01", "CET", "CEST" l "Rome", "UTC+01", "CET", "CEST" l "Stockholm", "UTC+01", "CET", "CEST" l "Vienna", "UTC+01", "CET", "CEST" l "Belgrade", "UTC+01", "CET", "CEST" l "Bratislava", "UTC+01", "CET", "CEST" l "Budapest", "UTC+01", "CET", "CEST" l "Ljubljana", "UTC+01", "CET", "CEST" l "Prague", "UTC+01", "CET", "CEST" l "Brussels", "UTC+01", "CET", "CEST" l "Copenhagen", "UTC+01", "CET", "CEST" l "Madrid", "UTC+01", "CET", "CEST" l "Paris", "UTC+01", "CET", "CEST" l "Sarajevo", "UTC+01", "CET", "CEST" l "Skopje", "UTC+01", "CET", "CEST" l "Warsaw", "UTC+01", "CET", "CEST" l "Zagreb", "UTC+01", "CET", "CEST" l "West-Central-Africa", "UTC+01", "CET" l "Windhoek", "UTC+01", "CET" "WAST" l "Amman", "UTC+02", "EET" "EEST" l "Athens", "UTC+02", "EET" "EEST" l "Bucharest", "UTC+02", "EET" "EEST" l "Beirut", "UTC+02", "EET" "EEST"

l "Pretoria", "UTC+02", "EET" l "Helsinki", "UTC+02", "EET" "EEST" l "Istanbul", "UTC+02", "EET" "EEST" l "Kyiv", "UTC+02", "EET" "EEST" l "Riga", "UTC+02", "EET" "EEST" l "Sofia", "UTC+02", "EET" "EEST" l "Tallinn", "UTC+02", "EET" "EEST" l "Vilnius", "UTC+02", "EET" "EEST" l "Jerusalem", "UTC+02", "EET" "IST" l "Baghdad", "UTC+03", "MSK" l "Minsk", "UTC+03", "MSK" l "Kuwait", "UTC+03", "MSK" l "Riyadh", "UTC+03", "MSK" l "Nairobi", "UTC+03", "MSK" l "Tehran", "UTC+03:30", "IRST" l "Abu-Dhabi", "UTC+04", "GST" l "Muscat", "UTC+04", "GST" l "Baku", "UTC+04", "GST" "AZST" l "Moscow", "UTC+04", "GST" l "St.Petersburg", "UTC+04", "GST" l "Volgograd", "UTC+04", "GST" l "Port-Louis", "UTC+04", "GST" l "Tbilisi", "UTC+04", "GST" l "Yerevan", "UTC+04", "GST" l "Kabul", "UTC+04:30", "AFT" l "Islamabad" ,"UTC+05", "PKT" l "Karachi" ,"UTC+05", "PKT" l "Tashkent" ,"UTC+05", "PKT" l "Chennai" ,"UTC+05:30", "IST" l "Kolkata" ,"UTC+05:30", "IST" l "Mumbai" ,"UTC+05:30", "IST" l "New-Delhi" ,"UTC+05:30", "IST" l "Sri-Jayawardenepura", "UTC+05:30", "IST" l "Kathmandu", "UTC+05:45", "NPT" l "Astana", "UTC+06", "BTT" l "Dhaka", "UTC+06", "BTT" l "Ekaterinburg", "UTC+06", "BTT"

303 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 62: Supported Branch Config Group Time Zone Formats

UTC- Time Zones

UTC+ Time Zones

l "Cairo", "UTC+02", "EET" l "Damascus", "UTC+02", "EET" "EEST" l "East-Europe", "UTC+02", "EET" "EEST" l "Harare", "UTC+02", "EET" l "International-Date-Line-West", "UTC-12", l "American-Samoa", "UTC-11", "SST" l "Hawaii", "UTC-10", "HST" l "Alaska", "UTC-09", "AKST" l "Baja-California", "UTC-08", "PST" l "Pacific-Time", "UTC-08", "PST" l "Arizona", "UTC-07", "MST" l "Chihuahua", "UTC-07", "MST" l "La-Paz", "UTC-07", "MST" l "Mazatlan", "UTC-07", "MST" l "Mountain-Time", "UTC-07", "MST" l "Central-America", "UTC-06" l "Central-Time", "UTC-06", "CST""CDT" l "Guadalajara", "UTC-06", "CST", "CDT" l "Mexico-City", "UTC-06", "CST", "CDT" l "Monterrey", "UTC-06", "CST", "CDT" l "Saskatchewan", "UTC-06", "CST" l "Bogota", "UTC-05", "EST" l "Lima", "UTC-05", "EST" l "Quito", "UTC-05", "EST" l "Eastern-Time", "UTC-05", "EST" "EDT" l "Indiana(East)", "UTC-05", "EST" "EDT" l "Caracas", "UTC-04:30", "VET" l "Asuncion", "UTC-04", "AST" "PYST" l "Atlantic-Time(Canada)", "UTC-04", "AST" "ADT" l "Cuiaba", "UTC-04", "AST","AMST" l "Georgetown", "UTC-04", "AST" l "Manaus", "UTC-04", "AST" l "San-Juan", "UTC-04", "AST" l "Santiago", "UTC-04", "AST", "SAND" l "Newfoundland", "UTC-03:30", "NST", "NDT" l "Brasilia", "UTC-03", "BST" "BRAD" l "Buenos-Aires", "UTC-03", "BST", "ARST"

l "Yangon", "UTC+06:30", "MMT" l "Bangkok", "UTC+07", "THA" l "Hanoi", "UTC+07", "THA" l "Jakarta", "UTC+07", "THA" l "Novosibirsk", "UTC+07", "THA" l "Beijing" ,"UTC+08", "CCT" l "Chongqing" ,"UTC+08", "CCT" l "HongKong" ,"UTC+08", "CCT" l "Krasnoyarsk" ,"UTC+08", "CCT" l "Kuala-Lumpur", "UTC+08", "CCT" l "Perth", "UTC+08", "CCT" l "Singapore", "UTC+08", "CCT" l "Taipei", "UTC+08", "CCT" l "Urumqi" ,"UTC+08", "CCT" l "Ulaanbaatar", "UTC+08", "CCT" l "Irkutsk", "UTC+09", "JST" l "Osaka", "UTC+09", "JST" l "Sapporo", "UTC+09", "JST" l "Tokyo", "UTC+09", "JST" l "Seoul", "UTC+09", "JST" l "Adelaide", "UTC+09:30", "ACST" "CST" l "Darwin", "UTC+09:30", "ACST" l "Brisbane", "UTC+10", "AEST" l "Canberra","UTC+10", "AEST" l "Melbourne","UTC+10", "AEST" l "Sydney","UTC+10", "AEST" l "Guam", "UTC+10", "AEST" l "Port-Moresby", "UTC+10", l "Hobart" ,"UTC+10", "AEST" l "Yakutsk", "UTC+10", "AEST" l "Solomon-Is.", "UTC+11", "NST" l "New-Caledonia", "UTC+11", "NST" l "Vladivostok", "UTC+11", "NST" l "Auckland", "UTC+12", "NZT" l "Wellington", "UTC+12", "NZT" l "Fiji", "UTC+12", "NZT" l "Magadan", "UTC+12"

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 304

Table 62: Supported Branch Config Group Time Zone Formats

UTC- Time Zones

UTC+ Time Zones

l "Cayenne", "UTC-03", "BST" l "Fortaleza", "UTC-03", "BST" l "Greenland", "UTC-03", "BST", "GRED" l "Montevideo", "UTC-03", "BST," "UYST" l "Salvador", "UTC-03", "BST", "BRST" l "Mid-Atlantic", "UTC-02", "FNT" l "Azores", "UTC-01", "AZOST", "AZOST" l "Cape-Verde-Is", "UTC-01", "CVT"

l "Nukualofa", "UTC+13" l "Samoa", "UTC+13"

System Configuration
Configure general system settings for the branch controllers in a branch config group by navigating to Configuration>Branch>Smart Config and selecting the System tab. The settings on the System tab are described in the table below.

Figure 46 Branch Config Group System Settings

Parameter

Description

General

System Contact

An alphanumeric string that specifies the name of the system contact for the controller

Admin User

The name of a system admin user

Admin Password The password for the system admin user

Servers

W-AirWave Server (Optional) IP address of the W-AirWave server, if the branch office controller is managed or monitored by W-AirWave.

Syslog Server

(Optional) IP address of an external syslog server. You will define syslog facility levels in subsequent configuration fields on this page.

Domain Name Server

IP address of the domain server.

Captive Portal Server Certificate

(Optional) Certificate to be used for captive-portal authentication.

Time Zone

Time zone for the branch office controller. Click the DST checkbox if the selected timezone is currently using daylight-savings time.

RADIUS interface source VLAN

This field identifies the interface for outgoing RADIUS packets. The IP address of the specified interface is included in the IP header of RADIUS packets.

305 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter

Description

Advanced Settings

firewall-visibility

(Optional) Enable or disable the firewall visibility feature. For more information, see Firewall on page 854.

AppRF

(Optional) Enable or disable the AppRF feature. For more information, see AppRF on page 828.

URL Filtering

(Optional) Enable Web Content Classification. For more information, see Web Content Classification on page 837.

Lync Listen Port

(Optional) ArubaOS provides value-added services such as prioritization of Lync sessions, call quality metrics, and visibility by implementing Lync Application Layer Gateway (ALG). Use this parameter to define the Lync listening port. For more information, see Configuring the Lync Listening Port on page 986.

AirGroup

(Optional) Enable or disable the AirGroup feature on the branch office controller. For more information on AirGroup, see AirGroup on page 1029.

AirGroup MDNS

(Optional) Enable or disable support for multicast Domain Name System (mDNS) service records. For more information, see Zero Configuration Networking on page 1029.

AirGroup DLNA

(Optional) Enable or disable support for DLNA (Digital Living Network Alliance); a network standard that is derived from UPnP (Universal Plug and Play) in addition to the mDNS protocol. For more information, see Zero Configuration Networking on page 1029.

Syslog Facility Levels

Network Security System User Wireless

(Optional) Click the syslog facility levels drop-down lists to change the severity level at which the different types of syslog messages are logged. By default, all message types are logged at the warnings level.

Revocation CheckPoints

CA Cert

(Optional) The branch controller can act as an OCSP client and issue OCSP queries to remote OCSP responders located on the intranet or Internet. If you have uploaded an OCSP responder certificate to the master controller, click Edit to modify the certificates used to sign OCSP for the revocation check point. For more information on configuring a controller as an OCSP client, see Configuring the Controller as an OCSP Client on page 366.

SNMP

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 306

Parameter Community Strings for SNMPv1 and SNMPv2 Trap Receiver
SNMPv3 Users

Description
Enter community string to authenticate SNMPv1 and SNMPv2 requests. For more information on SNMP settings, see Configuring SNMP.
Enter host information about a SNMP trap receiver that can receive and interpret the traps sent by the controller. Click New, enter the following types of trap information, then click Add.
l IP address: Trap receiver IP address l SNMP version: SNMPv1,SNMPv 2c, or SNMPv3. l Security Name: SNMP security name string l Engine ID: Engine ID of SNMP server in hexadecimal format. (SNMPv3 only) l UDP Port: UDP port on which the trap receiver listens for traps. The default is the UDP
port number 162. l Type: Specify whether the controller can send inform messages to the trap receiver to
acknowledge traps. (SNMPv2c or SNMPv3 only) l Retry: If the controller is configured to send inform messages, this field specifies the
number of times the controller will retry sending inform messages to the trap receiver before giving up. l Timeout: Estimated round trip time to the trap receiver, in seconds.
For more information on SNMP settings, see Configuring SNMP.
Information about SNMPv3 users. Click New to open a message box that allows you to enter the following information types, then click Add.
l User: A string representing the name of the SNMP user. l Authentication Protocol: Select either MD5 or SHA authentication l Authentication Password: Authentication key for use with the SHA authentication
protocol. l Privacy Protocol: Select either AES or DES encryption. l Privacy Password: Privacy key for encrypted messages.
For more information on SNMP settings, see Configuring SNMP.

Networking Configuration
Configure user and uplink VLANs for the branch controllers in a branch config group, map named VLANs to one ore more VLAN IDs, define branch config group port settings and tunnels, and enable or disable the Spanning Tree Protocol (STP) by navigating to Configuration>Branch>Smart Config and selecting the Networking tab.
Use the configuration settings on the Networking tab to configure the PortFast and BPDU Guard features for a branch config group. For complete details on these features, see PortFast and BPDU Guard on page 320.
The settings on the Networking tab are described in the table below.

307 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 47 Branch Controller Networking Settings.

Parameter

Description

User VLANs

VLAN ID

Identifier for the VLAN.

Description

Text string describing the VLAN.

NAT Inside

Click this checkbox to enable source NAT for this VLAN.

BCMC Optimization

Click this checkbox to effectively prevent flooding of BCMC traffic on all VLAN member ports. This option ensures controlled flooding of BCMC traffic without compromising the client connectivity.

Operstate

Click this checkbox to select the operational state for the VLAN (Up or Down).

Named VLAN Mapping

Name

Name assigned to an individual VLAN or group of VLANs (a VLAN pool).

VLAN

Specify one or more VLAN IDs to associate the VLAN ID(s) to the VLAN name. For more information on configuring named VLANs, see Configuring VLANs on page 164.

Uplink VLANs

VLAN ID

Specify the VLAN ID of the wired uplink network connection used by the branch controller.

Priority

Specify the priority of the VLAN by selecting a value from 101-255.

Description

(Optional) text string used to describe the VLAN

Operstate

Identify the VLAN operational state as UP or DOWN.

IP Address

Specify whether the VLAN will receive its IP address using DHCP or PPPoE.

Ports

Port Settings:
l Port Enable l Enable l Description l Trusted l Speed/Duplex l Mode l Native VLAN l Trunk/Access

Click Edit to edit the settings for an individual interface port, or to apply an access control list (ACL) to inbound traffic, outbound traffic, or session traffic on a selected VLAN.
NOTE: For complete details on the PortFast and BPDU Guard features, see PortFast and BPDU Guard on page 320. For more information on configuring the port settings for branch controllers in a branch config group, see Configuring Ports on page 169 and Roles and Policies on page 438.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 308

Parameter

Description

l VLAN l PortFast l BPDU Guard

Tunnels

Tunnel settings:
l Tunnel ID l Source IP l Destination IP l Mode l Keepalive l MTU l Trusted

ArubaOS supports generic routing encapsulation (GRE) tunnels between the branch controller and APs. To define tunnel settings for the branch controllers using this branch config group, click New, select your tunnel settings, then click Add. For more information on individual GRE tunnel configuration parameters, see Configuring GRE Tunnels on page 181.

Spanning Tree Configuration

Spanning Tree Enabled

Spanning Tree Protocol (STP) can ensure a single active path between any two network nodes, thus avoiding bridge loops. Select this checkbox to enable spanning tree if you are employing STP in your network.

Routing Configuration
Use this tab to configure static routes and DHCP pools, policy-based routing, and uplink routing using nexthop lists.
Configuring Routing for a Branch Config Group
To configure the different routing settings for a branch config group, select the Routing sub-tab to configure the controller IP VLAN, static routes and DHCP pools, then optionally click the PBR sub tab to configure policybased routing (PBR) settings such as nexthop lists and PBR rules and targets.
Controller IP A valid branch config group requires a VLAN to be assigned to the controller IP address. To assign an VLAN to a controller IP: 1. Navigate to Configuration>Branch>Smart Config>Routing and select the Routing sub-tab. 2. Click the Controller-IP drop-down list and select a VLAN ID from the list of uplink VLANs configured on the
Branch>Smart Config>Networking tab. 3. Click Apply.
Static Routes A static route allows the branch controller to connect to an upstream router or switch instead of the default gateway. To define a static route for your branch config group: 1. Select the Routing sub-tab. 2. Click New to open a pop-up window that allows you to configure the following static route settings:

309 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 48 Branch Controller Static Route Settings

Parameter

Description

Destination IP

Destination IP address,s in dotted decimal format.

Destination Mask

Destination netmask, in dotted decimal format.

NextHop

The IP address of the forwarding router in dotted decimal format.

IPsec

To use a static IPsec route, map click the IPsec drop-down list and select a static IPsec route map, or click New and enter the name of a new IPsec route map.

DHCP Pools Client devices within a branch office will obtain their IP addresses from a DHCP pool. 1. Select the Routing sub-tab. 2. Click New to open a pop-up window that allows you to configure the following DHCP pool settings:

Figure 49 Branch Controller DHCP Pool Settings

Parameter

Description

VLAN

VLAN ID. Click the VLAN drop-down list and select a VLAN ID from the list of uplink VLANs configured on the Branch>Smart Config>Networking tab.

Pool Name

Name that identifies this VLAN pool.

Domain Name

Domain name of the DNS server

DNS Server

IP address of the DNS server

IP Address Range

IP addresses at the start and end of the branch controller's address range, in dotted-decimal format and the netmask per branch. The WebUI converts the netmask per branch to hosts count.
Example: If the netmask per branch is /27, WebUI calculates the hosts count as 32. Similarly, if netmask per branch is /24, the WebUI calculates the hosts count as 256.

Lease Option

Lease time for addresses in the DHCP pool. If unconfigured, the default value is 12 hours.
Use this field assign the client to a VLAN based upon the DHCP signature ID.

Next-Hop Device lists
If the controller uses policy-based routing to forward packets to a next hop device, a next-hop list ensures that if the primary next-hop device becomes unreachable, the packets matching the policy can still reach their destination. For more information on nexthop devices, see Routing Configuration on page 309.
To define a next-hop list:
1. Navigate to Configuration>Branch>Smart Config>Routing and select the PBR sub-tab.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 310

2. Click the Add button below the Nexthop Configuration table to open a pop-up window that allows you to configure the following next-hop settings:

Figure 50 Branch Controller Next-Hop Settings

Parameter

Description

Nexthop-list name

Name for the new nexthop list.

Nexthop IP / DHCP

IP address of the nexthop device or the VLAN ID of the VLAN used by the nexthop device. If the VLAN gets an IP address using DHCP, and the default gateway is determined by the VLAN interface, the gateway IP is used as the nexthop IP address. When you click Add to define a NextHop IP or DHCP value, a pop-up list appears and field requires you to select either the IP or DHCP option.
l IP: In the Nexthop Value and Priority fields, enter the IP address and priority of the nexthop device
l DHCP: In the Nexthop Value and Priority fields select the VLAN and priority of the nexthop device.

Preemptive-Failover

If preemptive failover is disabled and the highest-priority device on the nexthop list is disabled, the new primary nexthop device remains the primary even when the original device comes back online.

PBR Rules A policy-based routing (PBR) rule is an ACL that can forward traffic as normal, or route traffic over a VPN tunnel specified by an IPsec map, routed to a nexthop router on a nexthop list, ore redirected over an L3 GRE tunnel or tunnel group.
If you modify an existing ACL by adding a new rule with the same position as an existing rule, the previously existing rule will be overwritten. The Smart Config section of the ArubaOS WebUI does not prevent you from creating duplicate rules in different positions, though this is not allowed when creating ACLs using the Configuration>Security>Firewall Policies section of the ArubaOS WebUI, or when using the ip access-list commands in the ArubaOS command-line interface.
To associate a policy based routing rule with the branch config group,
1. Navigate to Configuration>Branch>Smart Config>Routing, and select the PBR subtab. 2. Click the Route ACL name drop-down list. Select an existing route ACL, or click New to define a new ACL. 3. If you selected New in the previous step, enter a name for the new ACL, then click Add. Next, you must
define the rules for the new ACL. 4. Click the Add button below the PBR rules list, and define the following values:

311 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 63: Policy Based Routing ACL Rule Parameters

Field

Description

IP version

Specifies whether the policy applies to IPv4 or IPv6 traffic.

Source (required)

Source of the traffic, which can be one of the following:
l any: Acts as a wildcard and applies to any source address.
l user: This refers to traffic from the wireless client.
l host: This refers to traffic from a specific host. When this option is chosen, you must configure the IP address of the host.
l network: This refers to a traffic that has a source IP from a subnet of IP addresses. When this option is chosen, you must configure the IP address and network mask of the subnet.
l alias: This refers to using an alias for a host or network. You configure the alias by navigating to the Configuration > Advanced Services > Stateful Firewall > Destination page.

Destination (required)

Destination of the traffic, which can be configured in the same manner as Source.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 312

Field
Service (required)

Description
Type of traffic, which can be one of the following:
l any: This option specifies that this rule applies to any type of traffic.
l application: For session and route policies on a W-7000 Series controller, you can create a rule that applies to a specific application type. Click the Application drop-down list and select an application type.
l application category: For session and route policies on a W-7000 Series controller, you can create a rule that applies to a specific application category. Click the Application Category drop-down list and select a category type.
l protocol: Using this option, you specify a different layer 4 protocol (other than TCP/UDP) by configuring the IP protocol value.
l service: Using this option, you use one of the pre-defined services (common protocols such as HTTPS, HTTP, and others) as the protocol to match for the rule to be applied. You can also specify a network service that you have manually configured. For details, see Creating a Network Service Alias on page 443.
l tcp: A range of TCP port(s) that must be used by the traffic in order for the rule to be applied.
l udp: A range of UDP port(s) hat must be used by the traffic in order for the rule to be applied.

Action (required)

The action that you want the controller to perform on a packet that matches the specified criteria. This can be one of the following:
l Forward Regularly: Packets are forwarded to their next destination without any changes.
l Forward to ipsec-map: Packets are forwarded through an IPsec tunnel defined by the specified IPsec map. You must specify the position of the forwarding or routing rule. (1 is first, default is last)
l Forward to next-hop-list: packets are forwarded to the highest priority active device on the selected next hop list. You must also specify the position of the forwarding or routing rule (1 is first, default is last). For more information on next-hop lists, see Routing Configuration on page 309.
l Forward to tunnel: Packets are forwarded through the tunnel with the specified tunnel ID. You must also specify the position of the forwarding or routing rule (1 is first, default is last). For more information on GRE tunnels, see Configuring GRE Tunnels on page 181.
l Forward to tunnel group: Packets are forwarded through the active tunnel in a GRE tunnel group. You must also specify the position of the forwarding or routing rule (1 is first, default is last). For more information on tunnel groups, see Configuring GRE Tunnel Groups on page 193.

Position

(Optional) Define a position for the rule in the ACL. Rules processed according to their position numbers, and new Rules are added at the end of an ACL by default. A position of 1 puts the rule at the top of the list.

Targets for PBR Rules
A Policy Based Routing (PBR) rule does not become active until it is applied to a VLAN interface or user role. To define a target for a PBR rule:
1. Select the PBR sub-tab. 2. Click the Add button below the Target table. 3. Click the PBR Rule Name drop-down list and select the rule to be applied to the target. 4. Select the target type: VLAN or User Role.
l If you selected the VLAN type, click the Target drop-down list and select a VLAN ID to apply the rule to the VLAN interface's inbound traffic.

313 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l If you selected the User Role type, click the Target drop-down list and select a user role. The rule will be applied to traffic from clients with the selected user role.
5. Click Done. 6. Click Apply.
VPN Configuration
Configure IPsec crypto maps and DTP settings for the branch controllers in a branch config group by navigating to Configuration>Branch>Smart Config and selecting the VPN tab. The settings on the VPN tab are described in the table below.

Table 64: Branch Config Group VPN Settings Parameter Description Description

IPSec maps

Name

Name of the IPsec map.

Disable IPsec map

Click this checkbox to temporarily disable a configured IPsec map without deleting it from the branch config group.

Priority

Priority level for the IPsec map, from 1-9998. An IPsec map with a smaller priority number will take precedence over a map with a greater priority number.

Source Network

IP address the source network (the local network connected to the branch controller).

Source Subnet Mask

Subnet mask for the source network (the local network connected to the branch controller).

Destination Network

IP address the destination network (the remote network to which the local branch network communicates).

Destination Subnet Mask

Subnet mask for the source network (the remote network to which the local branch network communicates).

Peer Gateway

Define the peer gateway.
l If you are configuring an IPsec map for a dynamically addressed remote peer, give the peer gateway a default value of 0.0.0.0.
l If you are configuring an IPsec map for a dynamically addressed remote peer, enter the IP address of the interface used by the remote peer to connect to the L3 network .

Peer Certificate Subject Name

If you use IKEv2 to establish a site-to-site VPN for a statically addressed remote peer, identify the peer device by entering its certificate subject name in the Peer Certificate Subject Name field.
NOTE: This field is not enabled until you select he Certificate option for the Dynamically Addressed Peer setting. To identify a peer certificate's subject name, issue the show crypto-local pki servercert <certname> subject command in the master controller command-line interface.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 314

Parameter Description Description

Security Association Lifetime (seconds)

Configures the lifetime for the security association (SA), in seconds.

Security Association Lifetime (Kilobites)

Specifies the amount of traffic (in kilobytes) that can pass between IPSec peers in the local and remote networks before the security association expires.

Version

Click the drop-down list and select None (to create an IPsec map that doesn't use IKE), IKEv1 or IKEv2.

IKE policies

Select a predefined IKE policy, or a policy manually defined on the Configuration>Advanced>VPN Services>IPsec page of the master controller WebUI. For more information on creating IKE policies, see Configuring IKE Policies on page 422.

VLAN

Select the VLAN containing the interface of the local branch controller that connects to the Layer-3 network. This setting determines the source IP address used to initiate IKE. If you select None, the default is the VLAN of the controller's IP address (either the VLAN where the loopback IP is configured, or VLAN 1 if no loopback IP is configured).

PFS

If you enable Perfect Forward Secrecy (PFS) mode, new session keys are

not derived from previously used session keys. Therefore, if a key is

compromised, that compromised key does not affect any previous session

keys. PFS mode is disabled by default. To enable this feature, click the PFS

drop-down list and select one of the following Perfect Forward Secrecy

modes:

l group1: 768-bit Diffie­Hellman prime modulus group.

l group2: 1024-bit Diffie­Hellman prime modulus group.

l group 14: 2048-bit Diffie­Hellman prime modulus group.

l group19: 256-bit random Diffie­Hellman ECP modulus group.

l group20: 384-bit random Diffie­Hellman ECP modulus group.

Pre-Connect

Select Pre-Connect to establish the VPN connection, even if there is no traffic being sent from the local network. If you do not select this, the VPN connection is established only when traffic is sent from the local network to the remote network.

Trusted Tunnel

Select Trusted Tunnel if traffic between the networks is trusted. If you do not select this, traffic between the networks is untrusted.

Enforce NATT

Select the Enforce NATT checkbox to enforce IKE and IPSEC NAT Traversal (NAT-T) on UDP port 4500. This option is disabled by default.

Transform Sets

A transform set defines a specific encryption and authentication type used by the dynamic peer. Click the Transform Set drop-down list to select a predefined transform set or a transform set that was manually defined using the Configuration>Advanced Services > VPN Services > Advanced page

315 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter Description Description

of the master controller WebUI, then click the arrow button by the dropdown list to add that transform set to the IPsec map.

Dynamically Addressed Peer

Select either the Pre-shared Key or Certificate optoins to define security options for a dynamically address peer.

Pre-shared Key

For pre-shared key authentication, select Pre-Shared Key, then enter a shared secret in the IKE Shared Secret and Verify IKE Shared Secret fields. This authentication type is generally required in IPsec maps for a VPN with dynamically addressed peers, but can also be used for a static site-to-site VPN.

Certificate DPD Parameters

For certificate authentication, select Certificate, then click the Server Certificate and CA certificate drop-down lists to select certificates previously imported into the controller.
See Management Access on page 860 for more information on managing certificates.

Enable DPD

The DPD Parameters checkbox on the VPN tab enables or disables Dead Peer Detection. When enabled, DPD uses IPsec traffic patterns to minimize the number of IKE messages required to determine the liveliness of an IKE peer. After a dead peer is detected, the branch controller tears down the IPsec session. Once the network path or other failure condition has been corrected, a new IPsec session is automatically re-established.

Table 65: Default IKE Policy Setting

Policy Name

Policy Number

IKE

Encryption

Version Algorithm

Hash Algorithm

Authentica -tion Method

PRF Method

DiffieHellman Group

Default protection suite

10001

IKEv1

3DES-168

SHA 160

Pre-Shared N/A Key

2 (1024 bit)

Default RAP Certificate protection suite

10002

IKEv1

AES -256

SHA 160

RSA

N/A

Signature

2 (1024 bit)

Default RAP PSK protection suite

10003

AES -256

SHA 160

Pre-Shared N/A Key

2 (1024 bit)

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 316

Policy Name

Policy Number

IKE

Encryption

Version Algorithm

Hash Algorithm

Authentica -tion Method

PRF Method

DiffieHellman Group

Default RAP IKEv2 RSA protection suite

1004

IKEv2

AES -256

SSHA160

RSA Signature

hmacsha1

2 (1024 bit)

Default Cluster PSK protection suite

10005

IKEv1

AES -256

SHA160

Pre-Shared Key

PreShared Key

2 (1024 bit)

Default IKEv2 RSA protection suite

1006

IKEv2

AES - 128

SHA 96

RSA Signature

hmacsha1

2 (1024 bit)

Default IKEv2 PSK protection suite

10007

IKEv2

AES - 128

SHA 96

Pre-shared key

hmacsha1

2 (1024 bit)

Default SuiteB 128bit ECDSA protection suite

10008

IKEv2

AES - 128

SHA 256128

ECDSA-256 Signature

hmacsha2256

Random ECP Group (256 bit)

Default SuiteB 256 bit ECDSA protection suite

10009

IKEv2

AES -256

SHA 384192

ECDSA-384 Signature

hmacsha2384

Random ECP Group (384 bit)

Default RAP IKEv2 RSA protection suite

10012

IKEv2

AES -256

SSHA160

RSA Signature

hmacsha1

14 2048-bit group

WAN Configuration
Use the WAN tab to define settings for the features listed below, which are described in detail on the following pages:
l WAN Failure (Authentication) Survivability on page 284 l WAN Configuration on page 317 l WAN Configuration on page 317 l WAN Configuration on page 317 l WAN Configuration on page 317
Configure WAN survivability, Health Check, Optimization and PAN portal settings for the branch controllers in a branch config group by navigating to Configuration>Branch>Smart Config and selecting the WAN tab. The settings on the WAN tab are described in the table below.

317 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 66: Branch Config Group WAN Setting

Parameter

Description

WAN Failure Survivability

Enable AuthSurvivability

This parameter controls whether to use the Survival Server when no other authentication servers in the server group are in-service.
This parameter also controls whether to store the user access credential in the Survival Server when it is authenticated by an external RADIUS or LDAP server in the server group. Authentication Survivability is enabled or disabled at each controller. This parameter is disabled by default.
NOTE: Authentication Survivability will not activate if Authentication Server Dead Time is configured as 0. For more information on configuring Authentication Server Dead Time, see Configuring Authentication Timers on page 276.

Authentication Server Certificate

This parameter allows you to view the name of the server certificate used by the local Survival Server. The local Survival Server is provided with a default server certificate from ArubaOS . The customer server certificate must be imported into the controller first, and then you can assign the server certificate to the local Survival Server.

Cache Lifetime (hrs)

This parameter specifies the lifetime in hours for the cached access credential in the local Survival Server. When the specified cache-lifetime expires, the cached access credential is deleted from the controller.
Configured authentication servers are put into the out-of-service (OOS) state when authentication requests time out. The wireless controller picks the next server from the server group when the previous server times out or fails.
When there are no more servers available from the server group, the local Survival Server processes the authentication request. When the client is authenticated with the local Survival Server, the previously stored Key Reply attributes are included in the RADIUS response.
The Cache Lifetime range is from 1 to 72 hours. The default is 24 hours.

CA Certificate Assigned for Auth Survivability

Select the certificate to be used for client authentication.

WAN Health Check

Probe Mode

Click the Probe Mode drop-down list and select ping to enable this feature.

Probe Interval (sec)

The Probe Interval field specifies the probe interval, in seconds. The WAN healthcheck feature sends the number of probes defined by the Pocket Burst per Probe parameter during each probe interval. To change the default interval of 10 seconds, enter a new value into this field.

Packet Burst Per Probe

The Pocket Burst per Probe field specifies the number of probes to be sent during the probe interval. To change the default value of 5 probes, enter a new value into this field.

Probe Retries

The number of times the controller will attempt to resend a probe.

WAN Optimization

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 318

Table 66: Branch Config Group WAN Setting

Parameter

Description

Compression

The Compression/Decompression Engine feature is enabled by default. However, the packets are compressed only if the IP Payload Compression Protocol (IPComp) is successfully negotiated via the Internet Key Exchange (IKE) protocol.

BW Management

Uplink

Select an interface uplink to which you will apply the bandwidth contract.

Service Type

Select one of the available service types for this bandwidth contract:
l None: The contract applies to all upstream or downstream traffic on the interface. l Application: The contract applies to a specific application. l Category: The contract applies to all applications within a category type. l Exclude: If a bandwidth contract is applied to an entire interface or category of
applications, you can create a bandwidth contract that excludes a single application or application category from that contract.

Bandwidth Contract Application Category

If you chose the None, Application or Category option in the Service Type field, select the name of the bandwidth contract to be applied to the interface.
If you chose the Application option in the Service Type field, select the application to which the bandwidth policy will be applied.
If you chose the Category option in the Service Type field, select the application category to which the bandwidth contract is applied.

Bandwidth Direction

Apply the bandwidth contract to upstream or downstream traffic.

PAN Portal Portal IP Trusted Certificate
User Name Password

The IP address or fully qualified domain name (FQDN) of the portal. Specify the name of the self-signed or external certification authority (CA) certificate to establish an SSL connection to the portal. Username to authentiate to the Palo Alto Networks portal. Password to authentiate to the Palo Alto Networks portal.

Branch Config Group Summary
The Summary tab on the Configuration>Branch>Smart Config page displays a summary of the branch config group configuration created using the Smart Config WebUI, and a summary of the settings on a specific branch controller.
To view a summary of the branch config group settings:
1. Navigate to Configuration>Branch>Smart Config>Summary. 2. Select the Profile Summary subtab.

319 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

3. Click the Profile drop-down list and select the branch config group whose configuration settings you want to review.
To view a summary of the settings specific to an individual branch controller:
1. Navigate to Configuration>Branch>Smart Config>Summary. 2. Select the BOC Summary subtab. 3. Click the Profile drop-down list and select the MAC address of the branch controller whose configuration
settings you want to review.
Whitelist Configuration
The branch controller whitelist database links the MAC address of the branch controller to the branch config group. Once you have assigned a branch config group to a branch controller, you cannot edit the config group assigned to the branch controller in the whitelist entry. To assign a different configuration to an unprovisioned branch controller, you must delete the whitelist entry and create a new branch controller whitelist entry with the correct branch config group.
When you remove an entry for an active branch controller from the whitelist on the master controller, that branch controllerno longer receives configuration or license updates from the master controller, but continues to operate as previously configured. As the license server is the master controller, any operation related to the licensing does not work after it is detached. If you remove an individual branch controller entry from the whitelist before that branch controlleris connected to the network, that branch controller is not automatically provisioned as a branch controller, and remains inactive on the network until manually provisioned.
Add branch controllers to the master controller whitelist by navigating to Configuration>Branch>Smart Config and selecting the Whitelist tab. The settings on the Whitelist tab are described in the table below.

Table 67: Branch Config Group Whitelist Settings

Parameter

Description

MAC address

MAC address of the branch controller

Hostname

Hostname of the master controller

Remote Group The name of the branch config group whose settings are applied to the branch controller.

PortFast and BPDU Guard
The following section describes some of the Layer-2 Spanning Tree Protocol (STP) features for the branch controller solution. Currently, PortFast and Bridge Protocol Data Unit (BPDU) Guard features are supported, which work along with existing L2 STP feature. These two features enhance network reliability, manageability, and security for the existing L2 STP feature.
Some devices and local stacks running on systems/workstations are capable of generating potential STP BPDUs that cause Denial of Service (DOS) attacks. PortFast and BPDU Guard features provide stability and security for network topologies to prevent such attacks.
PortFast
The PortFast feature is introduced to avoid network connectivity issues. These issues are caused by delays in STP enabled ports moving from blocking-state to forwarding-state after transitioning from the listening and learning states. STP enabled ports that are connected to devices such as a single switch, workstation, or a

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 320

server can access the network only after passing all these STP states. Some applications need to connect to the network immediately, else they will timeout.
Enabling the PortFast feature causes a switch or a trunk port to enter the STP forwarding-state immediately or upon a linkup event, thus bypassing the listening and learning states. The PortFast feature is enabled at a port level, and this port can either be a physical or a logical port. When PortFast feature is enabled on a switch or a trunk port, the port immediately transitions to the STP forwarding state.
Though PortFast is enabled the port still participates in STP. If the port happens to be part of topology that could form a loop, the port eventually transitions into STP blocking mode. PortFast is usually configured on an edge port, which means the port should not receive any STP BPDUs. If the port receives any STP BPDU, it moves back to normal/regular mode and will participate in the listening and learning states.
In most deployments, edge ports are access ports. However, in this scenario there are no restrictions in enabling the PortFast feature. The mode of the port changes from PortFast to non-PortFast when the port receives a STP BPDU. To re-enable this feature on a port, run the shut command followed by a no-shut command at the interface/port level.
Configuring PortFast on a non-edge port can cause instability to the STP topology.

BPDU Guard
BPDU Guard feature protects the port from receiving STP BPDUs, however the port can transmit STP BPDUs. When a STP BPDU is received on a BPDU Guard enabled port, the port is shutdown and the state of the port changes to ErrDis (Error-Disable) state. The port remains in the ErrDis state until the port status is manually changed by using the configuration command shut followed by a no-shut applied on the interface. In most deployments, BPDU Guard feature is configured over the PortFast enabled STP ports, but in this implementation the BPDU Guard feature can be enabled on any of the STP ports, with or without PortFast feature being enabled on these ports.
It is recommended not to enable the BPDU Guard feature on a trunk port that forms the STP topology.

Scenarios Supported on PortFast and BPDU Guard
PortFast and BPDU Guard features are applied at the port/interface level. These features can also be applied in the following scenarios:
l RSTP and PVST modes l Access and Trunk ports l Physical and Logical ports
The PortFast and BPDU Guard features can be applied either independently or together.
In the global RSTP mode there is only one RSTP instance running in the entire controller. If the port that is enabled with PortFast and BPDU Guard receives any STP BPDU it will effect all the ports, as the global RSTP runs on a port basis.
In the PVST mode there can be multiple instances of RSTP running as they are based on per VLAN. Though it is based on per VLAN, it will still behave in the same way as it does in the global RSTP mode. For example, if there are five VLANs and each VLAN has a separate RSTP instance running, then any STP BPDU received on any of these five ports effects all ports.
If an STP BPDU is received from any one of the five RSTP instances running, the port that is enabled with BPDU Guard shuts down and goes to ErrDis state. In other words both PortFast and BPDU Guard features are applied on a port basis for both global RSTP and PVST modes, even though the PVST runs on a per VLAN basis.

321 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Enabling PortFast and BPDU Guard on a Port
The following section guides you to enable the PortFast and BPDU Guard features on a port.
In the Web UI
Follow the steps below to enable PortFast and BPDU Guard features on a port using the WebUI: 1. Navigate to Configuration>Branch>Smart Config and select the Networking tab. 2. In the Ports table, click the port number for which you want to enable PortFast and BPDU Guard. 3. Click Edit. 4. Select the PortFast and BPDU Guard checkbox. 5. Click Update. To disable PortFast and BPDU Guard uncheck the PortFast and BPDU Guard checkboxes.
It is recommended to enable PortFast only on access port types. However, PortFast can be enabled on the trunk ports by selecting the Trunk checkbox in the WebUI.
In the CLI
Execute the following commands at the command prompt to enable PortFast and BPDU Guard: (host) (config) #interface gigabitinternet 0/0/4 (host) (config-if)#spanning-tree portfast (host) (config-if)#spanning-tree bpduguard To disable PortFast (host) (config-if) #no spanning-tree portfast (host) (config-if) #no spanning-tree bpduguard Execute the following command to enable PortFast on trunk ports: (host) (config) #interface gigabitethernet 0/0/4 (host) (config-if)#spanning-tree portfast trunk
Execute the following show command to display the status of the STP ports in Global RSTP mode. (host) (config-if) #show spanning-tree interface gigabitethernet 0/0/4 Execute the following show command to display the status of the STP ports in Instance RSTP (PVST) mode. (host) #show spanning-tree interface gigabitethernet 0/0/4 Execute the following command to display the status of BPDU Guard enabled port that is in ErrDis state. This command is applicable for ports that are in both the Global RSTP and Instance RSTP (PVST) modes. (host) (config-if) #show spanning-tree interface gigabitethernet 0/0/4
Preventing WAN Link Failure on Virtual APs
In the branch controller deployments, the local controllers are connected across the WAN link from the master controller to the RADIUS server. A WAN link outage will result in service outage as new users cannot be authenticated to 802.1X Virtual APs. This feature provides limited connectivity to branch controllers even when the WAN link is down. To provide connectivity when the WAN link is down, open and PSK SSID Virtual APs (VAPs) are available at all times and the user can connect to these VAPs instead of the main 802.1X Virtual AP.
Currently, this feature is targeted for Campus APs in branch office deployments.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 322

When all the WAN links are down, an AP management module in the controller updates the link state using the notification it receives from the health check manager. Depending on the link state, the new set of Virtual APs are made available to the users, ensuring minimum service depending on the deployment. The VAPs for WAN link failure feature can be configured using the branch controller WebUI or command-line interface.

In the WebUI
1. Access the WebUI of a W-7000 Series controller configured as a branch controller, and navigate to Configuration> AP Configuration> AP Group Page.
2. Select an AP Group. 3. Navigate to Wireless LAN > Virtual AP. 4. Select an existing virtual AP or add a new virtual AP. 5. Once you select the virtual AP, click Advanced tab. 6. Modify the WAN Operation Mode drop-down menu value to Primary, Always, or Backup. For WAN link
failure, this mode should be set to backup.

In the CLI

(host)(Virtual AP profile "default") #wan-operation backup

For example:

(host) (config) #wlan virtual-ap default

(host)(Virtual AP profile "default")#?

wan-operation

Virtual-AP WAN operation

wmm-traffic-managemen.. WMM Traffic Management Profile

(host)(Virtual AP profile "default")#wan-operation ?

always

Enable virtual-AP regardless of WAN link state.

backup

Enable virtual-AP when WAN link is down.

primary

Enable virtual-AP only when WAN link is present.

(host)(Virtual AP profile "default") #wan-operation backup

Branch WAN Dashboard Changes
The WAN (Wide Area Network) dashboard, in the Dashboard section of the WebUI, is the landing page for the Branch controller. The WAN dashboard provides the WAN summary details for VLANs.
Following figure shows a snapshot of the WAN summary dashboard:

The WAN Summary page contains the following tables:
323 | Branch Controller Config for Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l Status : Displays the Link status and WAN Status for VLANs. For each VLAN, the green represents an up status and red represents a down status for the Link and WAN.
l Throughput : Displays the In and Out traffic for VLANs. The Throughput table has four tabs for different uplinks. First tab shows throughput of VLANs having high priority followed by other VLAN data based on its priority. Clicking on each tab loads In and Out traffic throughput data for that particular VLAN.
l Latency : Displays Latency data for available VLANs. Each line represents one VLAN. l Alerts : Lists the last five alerts with time stamp and description. l Usage : Displays traffic based on Application Category or Application. l Compression : Displays compression that occurred on all VLANs together.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch Controller Config for Controllers | 324

Chapter 12 802.1X Authentication

802.1X is an Institute of Electrical and Electronics Engineers (IEEE) standard that provides an authentication framework for WLANs. 802.1x uses the Extensible Authentication Protocol (EAP) to exchange messages during the authentication process. The authentication protocols that operate inside the 802.1X framework that are suitable for wireless networks include EAP-Transport Layer Security (EAP-TLS), Protected EAP (PEAP), and EAPTunneled TLS (EAP-TTLS). These protocols allow the network to authenticate the client while also allowing the client to authenticate the network.
This chapter describes the following topics:
l Understanding 802.1X Authentication on page 326 l Configuring 802.1X Authentication on page 329 l Sample Configurations on page 338 l Performing Advanced Configuration Options for 802.1X on page 354
Other types of authentication not discussed in this section can be found in the following sections of this guide:
l Captive portal authentication: Configuring Captive Portal Authentication Profiles on page 385 l VPN authentication: Planning a VPN Configuration on page 411 l MAC authentication: Configuring MAC-Based Authentication on page 279 l Stateful 802.1X, stateful NTLM, and WISPr authentication: Stateful and WISPr Authentication on page 358
Understanding 802.1X Authentication
802.1x authentication consists of three components:
l The supplicant, or client, is the device attempting to gain access to the network. You can configure the Dell user-centric network to support 802.1x authentication for wired usersa wireless users.
l The authenticator is the gatekeeper to the network and permits or denies access to the supplicants. l The Dell controller acts as the authenticator, relaying information between the authentication server and
supplicant. The EAP type must be consistent between the authentication server and supplicant, and is transparent to the controller. The authentication server provides a database of information required for authentication, and informs the authenticator to deny or permit access to the supplicant. The 802.1X authentication server is typically an EAP-compliant Remote Access Dial-In User Service (RADIUS) server which can authenticate either users (through passwords or certificates) or the client computer. An example of an 802.1X authentication server is the Internet Authentication Service (IAS) in Windows (see technet.microsoft.com/en-us/library/cc759077(WS.10).aspx). In Dell user-centric networks, you can terminate the 802.1x authentication on the controller. The controller passes user authentication to its internal database or to a "backend" non-802.1X server. This feature, also called AAA FastConnect, is useful for deployments where an 802.1X EAP-compliant RADIUS server is not available or required for authentication.
Supported EAP Types
Following is the list of supported EAP types:

Dell Networking W-Series ArubaOS 6.4.x| User Guide

802.1X Authentication | 326

l PEAP--Protected EAP (PEAP) is an 802.1X authentication method that uses server-side public key certificates to authenticate clients with the server. The PEAP authentication creates an encrypted SSL / TLS tunnel between the client and the authentication server. The exchange of information is encrypted and stored in the tunnel to ensure that the user credentials are kept secure.
l EAP-GTC--The EAP-GTC (Generic Token Card) type uses clear text method to exchange authentication controls between the client and the server. Since the authentication mechanism uses the one-time tokens (generated by the card), this method of credential exchange is considered safe. In addition, EAP-GTC is used in PEAP or TTLS tunnels in wireless environments. The EAP-GTC is described in RFC 2284.
l EAP-AKA--The EAP-AKA (Authentication and Key Agreement) authentication mechanism is typically used in mobile networks that include Universal Mobile Telecommunication Systems (UMTS) and CDMA 2000. This method uses the information stored in the Subscriber Identity Module (SIM) for authentication. The EAPAKA is described in RFC 4187.
l EAP-FAST--The EAP-FAST (Flexible Authentication via Secure Tunneling) is an alternative authentication method to PEAP. This method uses the Protected Access Credential (PAC) for verifying clients on the network. The EAP-FAST is described in RFC 4851.
l EAP-MD5--The EAP-MD5 method verifies MD5 hash of a user password for authentication. This method is commonly used in a trusted network. The EAP-MD5 is described in RFC 2284.
l EAP-POTP--The EAP type 32 is supported. Complete details are described in RFC 4793.
l EAP-SIM--The EAP-SIM (Subscriber Identity Module) uses Global System for Mobile Communication (GSM) Subscriber Identity Module (SIM) for authentication and session key distribution. This authentication mechanism includes network authentication, user anonymity support, result indication, and fast reauthentication procedure. Complete details about this authentication mechanism is described in RFC 4186.
l EAP-TLS--The EAP-TLS (Transport Layer Security) uses Public key Infrastructure (PKI) to set up authentication with a RADIUS server or any authentication server. This method requires the use of a clientside certificate for communicating with the authentication server. The EAP-TLS is described in RFC 5216.
l EAP-TLV--The EAP-TLV (type-length-value) method allows you to add additional information in an EAP message. Often this method is used to provide more information about an EAP message such as status information or authorization data. This method is always used after a typical EAP authentication process.
l EAP-TTLS--The EAP-TTLS (Tunneled Transport Layer Security) method uses server-side certificates to set up authentication between clients and servers. The actual authentication is, however, performed using passwords. Complete details about EAP-TTLS is described in RFC 5281.
l LEAP--Lightweight Extensible Authentication Protocol (LEAP) uses dynamic WEP keys and mutual authentication between the client and the RADIUS server.
l ZLXEAP--ZoneLabs EAP is an EAP method that has been allocated EAP Type 44 by IANA. For more information, visit tools.ietf.org/html/draft-bersani-eap-synthesis-sharedkeymethods-00#page-30.
Configuring Authentication with a RADIUS Server
See Table 68 for an overview of the parameters that you need to configure on authentication components when the authentication server is an 802.1X EAP-compliant RADIUS server.
Figure 51 802.1X Authentication with RADIUS Server

The supplicant and the authentication server must be configured to use the same EAP type. The controller does not need to know the EAP type used between the supplicant and authentication server.

327 | 802.1X Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

For the controller to communicate with the authentication server, you must configure the IP address, authentication port, and accounting port of the server on the controller. The authentication server must be configured with the IP address of the RADIUS client, which is the controller in this case. Both the controller and the authentication server must be configured to use the same shared secret.
Additional information on EAP types supported in a Windows environment, Microsoft supplicants, and authentication servers, is available at technet.microsoft.com/en-us/library/cc782851(WS.10).aspx.
The client communicates with the controller through a GRE tunnel to form an association with an AP and to get authenticated in the network. Therefore, the network authentication and encryption configured for an ESSID must be the same on both the client and the controller.
Configuring Authentication Terminated on Controller
User authentication is performed either via the controller's internal database or a non-802.1X server. See 802.1x Authentication Profile Basic WebUI Parameters on page 330 for an overview of the parameters that you need to configure on 802.1X authentication components when 802.1X authentication is terminated on the controller (AAA FastConnect).
Figure 52 802.1X Authentication with Termination on Controller

In this scenario, the supplicant is configured for EAP-Transport Layer Security (TLS) or EAP-Protected EAP (PEAP).
l EAP-TLS is used with smart card user authentication. A smart card holds a digital certificate which, with the user-entered personal identification number (PIN), allows the user to be authenticated on the network. EAPTLS relies on digital certificates to verify the identities of both the client and the server.
EAP-TLS requires that you import server and certification authority (CA) certificates onto the controller (see Configuring and Using Certificates with AAA FastConnect on page 335). The client certificate is verified on the controller (the client certificate must be signed by a known CA) before the username is checked on the authentication server.
l EAP-PEAP uses TLS to create an encrypted tunnel. Within the tunnel, one of the following "inner EAP" methods is used:
n EAP-Generic Token Card (GTC): Described in RFC 2284, this EAP method permits the transfer of unencrypted usernames and passwords from client to server. The main uses for EAP-GTC are one-time token cards such as SecureID and the use of an LDAP or RADIUS server as the user authentication server. You can also enable caching of user credentials on the controller as a backup to an external authentication server.
n EAP-Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAPv2): Described in RFC 2759, this EAP method is widely supported by Microsoft clients. A RADIUS server must be used as the backend authentication server.
If you use the controller's internal database for user authentication, you need to add the names and passwords of the users to be authenticated. If you use an LDAP server for user authentication, you need to configure both the LDAP server and the user IDs and passwords on the controller. If you use a RADIUS server for user authentication, you need to configure the RADIUS server on the controller.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.1X Authentication | 328

Configuring 802.1X Authentication
On the controller, use the following steps to configure a wireless network that uses 802.1x authentication:
1. Configure the VLANs to which the authenticated users will be assigned. See Network Configuration Parameters on page 164.
2. Configure policies and roles. You can specify a default role for users who are successfully authenticated using 802.1X. You can also configure server derivation rules to assign a user role based on attributes returned by the authentication server; server-derived user roles take precedence over default roles. For more information about policies and roles, see Roles and Policies on page 438.
The Policy Enforcement Firewall Virtual Private Network (PEFV) module provides identity-based security for wired and wireless users and must be installed on the controller. The stateful firewall allows user classification based on user identity, device type, location, and time of day to provide differentiated access for different classes of users. For information about obtaining and installing licenses, see Software Licenses on page 146.
3. Configure the authentication server(s) and server group. The server can be an 802.1X RADIUS server or, if you use AAA FastConnect, a non-802.1X server or the controller's internal database. If you use EAP-GTC within a PEAP tunnel, configure an LDAP or RADIUS server as the authentication server (see Authentication Servers on page 249). If you use EAP-TLS, import server and CA certificates on the controller (see Configuring and Using Certificates with AAA FastConnect on page 335).
4. Configure the AAA profile: n Select the 802.1X default user role. n Select the server group you previously configured for the 802.1x authentication server group.
5. Configure the 802.1X authentication profile. See In the WebUI on page 349. 6. Configure the virtual AP profile for an AP group or for a specific AP:
n Select the AAA profile you previously configured. n In the SSID profile, configure the WLAN for 802.1X authentication.
For details on how to complete the above steps, see Sample Configurations on page 338.
In the WebUI
This section describes how to create and configure a new instance of an 802.1X authentication profile in the WebUI or the CLI.
1. Navigate to the Configuration > Security > Authentication > L2 Authentication page. 2. In the Profiles list, select 802.1X Authentication Profile. 3. Enter a name for the profile, then click Add. 4. Click Apply. 5. In the Profiles list, select the 802.1X authentication profile you just created. 6. Change the settings described in Table 68 as desired, then click Apply.
The 802.1X authentication profile configuration settings are divided into two tabs--Basic and Advanced. The Basic tab displays only those configuration settings that often need to be adjusted to suit a specific network. The Advanced tab shows all configuration settings, including settings that do not need frequent adjustment or should be kept at their default values. If you change a setting on one tab, then click and display the other tab without saving your configuration, that setting will revert to its previous value.

329 | 802.1X Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 68: 802.1x Authentication Profile Basic WebUI Parameters

Parameter

Description

Basic 802.1x Authentication Settings

Max authentication failures
Enforce Machine Authentication
Machine Authentication: Default Machine Role

Number of times a user can try to log in with wrong credentials after which the user is blacklisted as a security threat. Set to 0 to disable blacklisting, otherwise enter a non-zero integer to blacklist the user after the specified number of failures. Range: 0-5 failures. Default: 0 failure. NOTE: This option may require a license.
Select the Enforce Machine Authentication option to require machine authentication. This option is also available on the Basic settings tab. NOTE: This option may require a license.
Default role assigned to the user after completing only machine authentication. The default role for this setting is the "guest" role.

Machine Authentication: Default User Role

Default role assigned to the user after 802.1x authentication. The default role for this setting is the "guest" role.

Reauthentication

Select the Reauthentication checkbox to force the client to do a 802.1X reauthentication after the expiration of the default timer for reauthentication. (The default value of the timer is 24 hours.) If the user fails to reauthenticate with valid credentials, the state of the user is cleared. If derivation rules are used to classify 802.1x-authenticated users, then the reauthentication timer per role overrides this setting.
This option is disabled by default.

Termination

Select the Termination checkbox to allow 802.1X authentication to terminate on the controller. This option is disabled by default.

Termination EAP-Type

If you enable termination, click either EAP-PEAP or EAP-TLS to select a Extensible Authentication Protocol (EAP) method.

Termination Inner EAP-Type

If you use EAP-PEAP as the EAP method, specify one of the following
inner EAP types:
l eap-gtc: Described in RFC 2284, this EAP method permits the transfer of unencrypted usernames and passwords from client to server. The main uses for EAP-GTC are one-time token cards such as SecureID and the use of LDAP or RADIUS as the user authentication server. You can also enable caching of user credentials on the controller as a backup to an external authentication server.
l eap-mschapv2: Described in RFC 2759, this EAP method is widely supported

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.1X Authentication | 330

Table 68: 802.1x Authentication Profile Basic WebUI Parameters

Parameter

Description

by Microsoft clients.

Enforce Suite-B 128 bit or more security level Authentication

Configure Suite-B 128 bit or more security level authentication enforcement.

Enforce Suite-B 128 bit or more security level Authentication

Configure Suite-B 192 bit security level authentication enforcement.

Advanced 802.1x Authentication Settings

Machine Authentication Cache Timeout

The timeout, in hours, for machine authentication. The allowed range of values is 1-1000 hours, and the default value is 24 hours.

Blacklist on Machine Authentication Failure

Select the Blacklist on Machine Authentication Failure checkbox to blacklist a client if machine authentication fails. This setting is disabled by default.

Interval between Identity Requests

Interval, in seconds, between identity request retries. Range: 1-65535 seconds. Default: 30 seconds.

Quiet Period after Failed Authentication

The enforced quiet period interval, in seconds, following failed authentication. Range: 1-65535 seconds.
Default: 30 seconds.

Reauthentication Interval

Interval, in seconds, between reauthentication attempts. Range: 60-864000 seconds. Default: 86400 seconds (1 day).

Use Server provided Reauthentication Interval

Select this option to override any user-defined reauthentication interval and use the reauthentication period defined by the authentication server.

Multicast Key Rotation Time Interval

Interval, in seconds, between multicast key rotation. Range: 60-864000 seconds. Default: 1800 seconds.

Unicast Key Rotation Time Interval

Interval, in seconds, between unicast key rotation. Range: 60-864000 seconds. Default: 900 seconds.

Authentication Server Retry Interval

Server group retry interval, in seconds.

331 | 802.1X Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 68: 802.1x Authentication Profile Basic WebUI Parameters

Parameter

Description

Range: 5-65535 seconds. Default: 30 seconds.

Authentication Server Retry Count

Maximum number of authentication requests that are sent to server group. Range: 0-3 requests. Default: 2 requests.

Framed MTU

Sets the framed Maximum Transmission Unit (MTU) attribute sent to the authentication server.
Range: 500-1500 bytes.
Default: 1100 bytes.

Number of times IDRequests are retried

Maximum number of times ID requests are sent to the client. Range: 1-10 retries. Default: 3 retries.

Maximum Number of Reauthentication Attempts
Maximum number of times Held State can be bypassed

Number of times a user can try to log in with wrong credentials after which the user is blacklisted as a security threat. Set to 0 to disable blacklisting, otherwise enter a value from 0-5 to blacklist the user after the specified number of failures.
NOTE: If changed from its default value, this option may require a license.
Number of consecutive authentication failures which, when reached, causes the controller to not respond to authentication requests from a client while the controller is in a held state after the authentication failure. Before this number is reached, the controller responds to authentication requests from the client even while the controller is in its held state.
(This parameter is applicable when 802.1X authentication is terminated on the controller, also known as AAA FastConnect.) The allowed range of values for this parameter is 0-3 failures, and the default value is 0.

Dynamic WEP Key Message Retry Count

Set the Number of times WPA/WPA2 Key Messages are retried. Range: 1-5 retries. Default: 3 retries.

Dynamic WEP Key Size

The default dynamic WEP key size is 128 bits, If desired, you can change this parameter to 40 bits.

Interval between WPA/WPA2 Key Messages

Interval, in milliseconds, between each WPA key exchanges. Range: 1000-5000 ms. Default: 1000 ms.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.1X Authentication | 332

Table 68: 802.1x Authentication Profile Basic WebUI Parameters

Parameter

Description

Delay between EAPSuccess and WPA2 Unicast Key Exchange

Interval, in milliseconds, between EAP-Success and unicast key exchanges. Range: 0-2000 ms. Default: 0 ms (no delay).

Delay between WPA/WPA2 Unicast Key and Group Key Exchange

Interval, in milliseconds, between unicast and multicast key exchange. Time interval in milliseconds.
Range: 0-2000.
Default: 0 (no delay).

Time interval after which the PMKSA will be deleted

The time interval after which the PMKSA (Pairwise Master Key Security Association) cache is deleted. Time interval in Hours.
Range: 1-2000.
Default: 8.

WPA/WPA2 Key Message Retry Count

Number of times WPA/WPA2 key messages are retried. Range: 1-5 retries. Default: 3 retries.

Multicast Key Rotation

Select this checkbox to enable multicast key rotation. This feature is disabled by default.

Unicast Key Rotation

Select this checkbox to enable unicast key rotation. This feature is disabled by default.

Opportunistic Key Caching
Validate PMKID
Use Session Key

By default, the 802.1X authentication profile enables a cached pairwise master key (PMK) which is derived through a client and an associated AP. This key is used when the client roams to a new AP. This allows clients faster roaming without a full 802.1x authentication. Uncheck this option to disable this feature.
NOTE: Make sure that the wireless client (the 802.1X supplicant) supports this feature. If the client does not support this feature, the client will attempt to renegotiate the key whenever it roams to a new AP. As a result, the key cached on the controller can be out of sync with the client's key.
This parameter instructs the controller to check the pairwise master key (PMK) ID sent by the client. When you enable this option, the client must send a PMKID in the associate or reassociate frame to indicate that it supports OKC or PMK caching; otherwise, full 802.1x authentication takes place.
NOTE: This feature is optional, since most clients that support OKC and PMK caching do not send the PMKID in their association request.
Select the Use Session Key option to use the RADIUS session key as the unicast WEP key. This option is disabled by default.

Use Static Key

Select the Use Static Key option to use a static key as the unicast/multicast WEP key. This option is disabled by default.

333 | 802.1X Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 68: 802.1x Authentication Profile Basic WebUI Parameters

Parameter

Description

xSec MTU

Set the maximum transmission unit (MTU) for frames using the xSec protocol. Range: 1024-1500 bytes.
Default: 1300 bytes.

Token Caching

If you select EAP-GTC as the inner EAP method, you can select the Token Caching checkbox to enable the controller to cache the username and password of each authenticated user. The controller continues to reauthenticate users with the remote authentication server. However, if the authentication server is unavailable, the controller will inspect its cached credentials to reauthenticate users.
This option is disabled by default.

Token Caching Period

If you select EAP-GTC as the inner EAP method, you can specify the timeout period, in hours, for the cached information. The default value is 24 hours.

CA-Certificate

Click the CA-Certificate drop-down list and select a certificate for client authentication. The CA certificate needs to be loaded in the controller before it will appear on this list.

Server-Certificate

Click the Server-Certificate drop-down list and select a server certificate the controller will use to authenticate itself to the client.

TLS Guest Access

Select TLS Guest Access to enable guest access for EAP-TLS users with valid certificates. This option is disabled by default.

TLS Guest Role

Click the TLS Guest Role drop-down list and select the default user role for EAPTLS guest users. This option may require a license.

Ignore EAPOL-START after authentication

Select Ignore EAPOL-START after authentication to ignore EAPOL-START messages after authentication. This option is disabled by default.

Handle EAPOL-Logoff

Select Handle EAPOL-Logoff to enable handling of EAPOL-LOGOFF messages. This option is disabled by default.

Ignore EAP ID during negotiation

Select Ignore EAP ID during negotiation to ignore EAP IDs during negotiation. This option is disabled by default.

WPA-Fast-Handover

Select this option to enable WPA-fast-handover on phones that support this feature. WAP fast-handover is disabled by default.

Disable rekey and reauthentication for clients on call
Check certificate common name against AAA server

This feature disables rekey and reauthentication for VoWLAN clients. It is disabled by default, meaning that rekey and reauthentication is enabled. NOTE: This option may require a license This option may require a license.
If you use client certificates for user authentication, enable this option to verify that the certificate's common name exists in the server. This parameter is enabled by default in the default-cap and default-rap VPN profiles, and disabled by default on all other VPN profiles.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.1X Authentication | 334

In the CLI
The following command configures settings for an 802.1X authentication profiles. Individual parameters are described in the previous table. (host)(config) #aaa authentication dot1x {<profile>|countermeasures}
Configuring and Using Certificates with AAA FastConnect
The controller supports 802.1x authentication using digital certificates for AAA FastConnect.
l Server Certificate--A server certificate installed in the controller verifies the authenticity of the controller for 802.1x authentication. Dell controllers ship with a demonstration digital certificate. Until you install a customer-specific server certificate in the controller, this demonstration certificate is used by default for all secure HTTP connections (such as the WebUI and captive portal) and AAA FastConnect. This certificate is included primarily for the purposes of feature demonstration and convenience, and is not intended for long-term use in production networks. Users in a production environment are urged to obtain and install a certificate issued for their site or domain by a well-known certificate authority (CA). You can generate a Certificate Signing Request (CSR) on the controller to submit to a CA. For information on how to generate a CSR and how to import the CA-signed certificate into the controller, see Managing Certificates on page 878.
l Client Certificates--Client certificates are verified on the controller (the client certificate must be signed by a known CA) before the username is checked on the authentication server. To use client certificate authentication for AAA FastConnect, you need to import the following certificates into the controller (see Importing Certificates on page 881): n Controller's server certificate n CA certificate for the CA that signed the client certificates
In the WebUI
1. Navigate to the Configuration > Security > Authentication > L2 Authentication page. 2. In the Profiles list, select 802.1x Authentication Profile. 3. Select the default 802.1x authentication profile from the drop-down list to display configuration
parameters. 4. In the Basic tab, select Termination. 5. Select the Advanced Tab. 6. In the Server-Certificate field, select the server certificate imported into the controller. 7. In the CA-Certificate field, select the CA certificate imported into the controller. 8. Click Save As. Enter a name for the 802.1x authentication profile. 9. Click Apply.
In the CLI
(host)(config) #aaa authentication dot1x <profile> termination enable server-cert <certificate> ca-cert <certificate>
Configuring User and Machine Authentication
When a Windows device boots, it logs onto the network domain using a machine account. Within the domain, the device is authenticated before computer group policies and software settings can be executed; this process is known as machine authentication. Machine authentication ensures that only authorized devices are allowed on the network.

335 | 802.1X Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

You can configure 802.1x for both user and machine authentication (select the Enforce Machine Authentication option described in Table 68). This tightens the authentication process further, since both the device and user need to be authenticated.
Working with Role Assignment with Machine Authentication Enabled
When you enable machine authentication, there are two additional roles you can define in the 802.1x authentication profile:
l Machine authentication default machine role l Machine authentication default user role
While you can select the same role for both options, you should define the roles as per the polices that need to be enforced. Also, these roles can be different from the 802.1x authentication default role configured in the AAA profile.
With machine authentication enabled, the assigned role depends upon the success or failure of the machine and user authentications. In certain cases, the role that is ultimately assigned to a client can also depend upon attributes returned by the authentication server or server derivation rules configured on the controller.
Table 69 describes role assignment based on the results of the machine and user authentications.

Table 69: Role Assignment for User and Machine Authentication

Machine Auth Status

User Auth Status

Description

Role Assigned

Failed

Failed

Both machine authentication and user authentication failed. L2 authentication failed.

No role assigned. No access to the network allowed.

Failed

Passed

Machine authentication failed (for example, the machine information is not present on the server) and user authentication succeeded. Serverderived roles do not apply.

Machine authentication default user role configured in the 802.1x authentication profile.

Passed

Failed

Machine authentication succeeded and user authentication has not been initiated. Server-derived roles do not apply.

Machine authentication default machine role configured in the 802.1x authentication profile.

Passed

Passed

Both machine and user are successfully authenticated. If there are server-derived roles, the role assigned via the derivation take precedence. This is the only case where server-derived roles are applied.

A role derived from the authentication server takes precedence. Otherwise, the 802.1x authentication default role configured in the AAA profile is assigned.

For example, if the following roles are configured: l 802.1x authentication default role (in AAA profile): dot1x_user l Machine authentication default machine role (in 802.1x authentication profile): dot1x_mc l Machine authentication default user role (in 802.1x authentication profile): guest

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.1X Authentication | 336

Role assignment is as follows: l If both machine and user authentication succeed, the role is dot1x_user. If there is a server-derived role, the
server-derived role takes precedence. l If only machine authentication succeeds, the role is dot1x_mc. l If only user authentication succeeds, the role is guest. l On failure of both machine and user authentication, the user does not have access to the network.
With machine authentication enabled, the VLAN to which a client is assigned (and from which the client obtains its IP address) depends upon the success or failure of the machine and user authentications. The VLAN that is ultimately assigned to a client can also depend upon attributes returned by the authentication server or server derivation rules configured on the controller (see Understanding VLAN Assignments on page 171). If machine authentication is successful, the client is assigned the VLAN configured in the virtual AP profile. However, the client can be assigned a derived VLAN upon successful user authentication.
You can optionally assign a VLAN as part of a user role configuration. Do not use VLAN derivation if you configure user roles with VLAN assignments.
Table 70 describes VLAN assignment based on the results of the machine and user authentications when VLAN derivation is used.

Table 70: VLAN Assignment for User and Machine Authentication

Machine Auth Status

User Auth Status

Description

Failed

Failed

Both machine authentication and user authentication failed. L2 authentication failed.

VLAN Assigned No VLAN.

Failed

Passed

Machine authentication failed (for example, the machine information is not present on the server) and user authentication succeeded.

VLAN configured in the virtual AP profile.

Passed

Failed

Machine authentication succeeded and user authentication has not been initiated.

VLAN configured in the virtual AP profile.

Passed

Passed

Both machine and user are successfully authenticated.

Derived VLAN. Otherwise, VLAN configured in the virtual AP profile.

The administrator can now associate a VLAN ID to a client data based on the authentication credentials in a bridge mode.

Enabling 802.1x Supplicant Support on an AP
ArubaOS provides 802.1X supplicant support on the Access Point (AP). The AP can be used as a 802.1x supplicant where access to the wired Ethernet network is restricted to those devices that can authenticate

337 | 802.1X Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

using 802.1x. You can provision an AP to act as an 802.1X supplicant and authenticate to the infrastructure using the PEAP protocol.
Both Campus APs (CAPs) and Remote APs (RAPs) can be provisioned to use 802.1X authentication.

Prerequisites
l An AP has to be configured with the credentials for 802.1X authentication. These credentials are stored securely in the AP flash.
l The AP must complete the 802.1X authentication before it sends or receives IP traffic such as DHCP.
If the AP cannot complete 802.1x authentication (explicit failure or reply timeout) within 1 minute, the AP will proceed to initiate the IP traffic and attempt to contact the controller. The infrastructure can be configured to allow this. If the AP contacts the controller it will be marked as unprovisioned so that the administrator can take corrective action.
Provisioning an AP as an 802.1X Supplicant
This section describes how an AP can be provisioned as an 802.1X supplicant using CLI or the WebUI.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Installation > Provisioning window. The list of discovered APs are displayed on this page.
2. Select the AP you want to provision. 3. Click Provision. The provisioning window opens. 4. Select the 802.1x Parameters using PEAP checkbox and enter the following credentials:
a. User Name: Enter the username of the AP in the User Name field. b. Password: Enter the password of the AP in the Password field. 5. Enter the password again in the Confirm Password field and reconfirm it. 6. Click Apply and Reboot (at the bottom of the page).
In the CLI
(host) (config)# provision-ap (host) (AP provisioning) # apdot1x-username <username> (host) (AP provisioning) # apdot1x-passwd <password> (host) (AP provisioning) # reprovision ap-name <apname> To view the 802.1x authentication details on the controller: (host) # show ap active

Sample Configurations
The following examples show basic configurations on the controller for: l Configuring Authentication with an 802.1X RADIUS Server on page 339 l Configuring Authentication with the Controller's Internal Database on page 348 In the following examples: l Wireless clients associate to the ESSID WLAN-01. l The following roles allow different networks access capabilities:
n student n faculty

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.1X Authentication | 338

n guest n system administrators The examples show how to configure using the WebUI and CLI commands.
Configuring Authentication with an 802.1X RADIUS Server
l An EAP-compliant RADIUS server provides the 802.1X authentication. The RADIUS server administrator must configure the server to support this authentication. The administrator must also configure the server to all communications with the Dell controller.
l The authentication type is WPA. From the 802.1X authentication exchange, the client and the controller derive dynamic keys to encrypt data transmitted on the wireless network.
l 802.1x authentication based on PEAP with MS-CHAPv2 provides both computer and user authentication. If a user attempts to log in without the computer being authenticated first, the user is placed into a more limited "guest" user role. Windows domain credentials are used for computer authentication, and the user's Windows login and password are used for user authentication. A single user sign-on facilitates both authentication to the wireless network and access to the Windows server resources.
802.1X Configuration for IAS and Windows Clients on page 1153 describes how to configure the Microsoft Internet Authentication Server and Windows XP wireless client to operate with the controller configuration shown in this section.
Configuring Roles and Policies
You can create the following policies and user roles for: l Student l Faculty l Guest l Sysadmin l Computer
Creating the Student Role and Policy
The student policy prevents students from using telnet, POP3, FTP, SMTP, SNMP, or SSH to the wired portion of the network. The student policy is mapped to the student user role.
In the WebUI 1. Navigate to the Configuration > Security > Access Control > Policies page. Select Add to add the
student policy. 2. For Policy Name, enter student. 3. For Policy Type, select IPv4 Session. 4. Under Rules, select Add to add rules for the policy.
a. Under Source, select user. b. Under Destination, select alias.
The following step defines an alias representing all internal network addresses. Once defined, you can use the alias for other rules and policies.
c. Under the alias selection, click New. For Destination Name, enter Internal Network. Click Add to add a rule. For Rule Type, select network. For IP Address, enter 10.0.0.0. For Network Mask/Range, enter

339 | 802.1X Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

255.0.0.0. Click Add to add the network range. Repeat these steps to add the network range 172.16.0.0 - 255.255.0.0. Click Done. The alias Internal Network appears in the Destination menu. This step defines an alias representing all internal network addresses. Once defined, you can use the alias for other rules and policies. d. Under Destination, select Internal Network. e. Under Service, select service. In the Service scrolling list, select svc-telnet. f. Under Action, select drop. g. Click Add. 5. Under Rules, click Add. a. Under Source, select user. b. Under Destination, select alias and then select Internal Network. c. Under Service, select service. In the Service scrolling list, select svc-pop3. d. Under Action, select drop. e. Click Add. 6. Repeat steps 4A-E to create rules for the following services: svc-ftp, svc-smtp, svc-snmp, and svc-ssh. 7. Click Apply. 8. Click the User Roles tab. Click Add to create the student role. 9. For Role Name, enter student. 10.Under Firewall Policies, click Add. In Choose from Configured Policies, select the student policy you previously created. Click Done. 11.Click Apply.
In the CLI (host)(config) #ip access-list session student
user alias "Internal Network" svc-telnet deny user alias "Internal Network" svc-pop3 deny user alias "Internal Network" svc-ftp deny user alias "Internal Network" svc-smtp deny user alias "Internal Network" svc-snmp deny user alias "Internal Network" svc-ssh deny
(host)(config) #user-role student session-acl student session-acl allowall
Creating the Faculty Role and Policy
The faculty policy is similar to the student policy, however faculty members are allowed to use POP3 and SMTP for VPN remote access from home. (Students are not permitted to use VPN remote access.) The faculty policy is mapped to the faculty user role.
In the WebUI
1. Navigate to the Configuration > Security > Access Control > Policies page. Click Add to add the faculty policy.
2. For Policy Name, enter faculty. 3. For Policy Type, select IPv4 Session. 4. Under Rules, click Add to add rules for the policy.
a. Under Source, select user. b. Under Destination, select alias, then select Internal Network.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.1X Authentication | 340

c. Under Service, select service. In the Service scrolling list, select svc-telnet. d. Under Action, select drop. e. Click Add. f. Repeat steps A-E to create rules for the following services: svc-ftp, svc-snmp, and svc-ssh. 5. Click Apply. 6. Select the User Roles tab. Click Add to create the faculty role. 7. For Role Name, enter faculty. 8. Under Firewall Policies, click Add. In Choose from Configured Policies, select the faculty policy you previously created. Click Done.
In the CLI (host)(config) #ip access-list session faculty
user alias "Internal Network" svc-telnet deny user alias "Internal Network" svc-ftp deny user alias "Internal Network" svc-snmp deny user alias "Internal Network" svc-ssh deny
(host)(config) #user-role faculty session-acl faculty session-acl allowall
Creating the Guest Role and Policy
The guest policy permits only access to the internet (via HTTP or HTTPS) and only during daytime working hours. The guest policy is mapped to the guest user role.
In the WebUI
1. Navigate to the Configuration > Security > Access Control > Time Ranges page to define the time range working-hours. Click Add. a. For Name, enter working-hours. b. For Type, select Periodic. c. Click Add. d. For Start Day, click Weekday. e. For Start Time, enter 07:30. f. For End Time, enter 17:00. g. Click Done. h. Click Apply.
2. Click the Policies tab. Click Add to add the guest policy. 3. For ePolicy Name, enter guest. 4. For Policy Type, select IPv4 Session. 5. Under Rules, click Add to add rules for the policy.
To create rules to permit access to DHCP and DNS servers during working hours: a. Under Source, select user. b. Under Destination, select host. In Host IP, enter 10.1.1.25. c. Under Service, select service. In the Service scrolling list, select svc-dhcp. d. Under Action, select permit. e. Under Time Range, select working-hours. f. Click Add.

341 | 802.1X Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

g. Repeat steps A-F to create a rule for svc-dns. To create a rule to deny access to the internal network: a. Under Source, select user. b. Under Destination, select alias. Select Internal Network. c. Under Service, select any. d. Under Action, select drop. e. Click Add. To create rules to permit HTTP and HTTPS access during working hours: a. Under Source, select user. b. Under Destination, select any. c. Under Service, select service. In the Services scrolling list, select svc-http. d. Under Action, select permit. e. Under Time Range, select working-hours. f. Click Add. g. Repeat steps A-F for the svc-https service. To create a rule that denies the user access to all destinations and all services: a. Under Source, select user. b. Under Destination, select any. c. Under Service, select any. d. Under Action, select drop. e. Click Add. 6. Click Apply. 7. Click the User Roles tab. Click Add to create the guest role. 8. For Role Name, enter guest. 9. Under Firewall Policies, click Add. In Choose from Configured Policies, select the guest policy you previously created. Click Done.
In the CLI time-range working-hours periodic weekday 07:30 to 17:00
(host)(config) #ip access-list session guest user host 10.1.1.25 svc-dhcp permit time-range working-hours user host 10.1.1.25 svc-dns permit time-range working-hours user alias "Internal Network" any deny user any svc-http permit time-range working-hours user any svc-https permit time-range working-hours user any any deny
(host)(config) #user-role guest session-acl guest
Creating Roles and Policies for Sysadmin and Computer
The allowall policy, a predefined policy, allows unrestricted access to the network. The allowall policy is mapped to both the sysadmin user role and the computer user role.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.1X Authentication | 342

In the WebUI 1. Navigate to Configuration > Security > Access Control > User Roles page. Click Add to create the
sysadmin role. 2. For Role Name, enter sysadmin. 3. Under Firewall Policies, click Add. In Choose from Configured Policies, select the predefined allowall policy.
Click Done. 4. Click Apply.
In the CLI (host)(config) #user-role sysadmin session-acl allowall
Creating a computer role
In the WebUI
1. Navigate to Configuration > Security > Access Control > User Roles page. Click Add to create the computer role.
2. For Role Name, enter computer. 3. Under Firewall Policies, click Add. In Choose from Configured Policies, select the predefined allowall policy.
Click Done. 4. Click Apply.
In the CLI
Use the following command to create a computer role: (host)(config) #user-role computer session-acl allowall
Creating an Alias for the Internal Network
In the CLI (host)(config) #netdestination "Internal Network" network 10.0.0.0 255.0.0.0 network 172.16.0.0 255.255.0.0
Configuring the RADIUS Authentication Server
Configure the RADIUS server IAS1, with IP address 10.1.1.21 and shared key. The RADIUS server is configured to sent an attribute called Class to the controller; the value of this attribute is set to either "student," "faculty," or "sysadmin" to identify the user's group. The controller uses the literal value of this attribute to determine the role name. On the controller, you add the configured server (IAS1) into a server group. For the server group, you configure the server rule that allows the Class attribute returned by the server to set the user role.
In the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. In the Servers list, select Radius Server. In the RADIUS Server Instance list, enter IAS1 and click Add.
a. Select IAS1 to display configuration parameters for the RADIUS server. b. For IP Address, enter 10.1.1.21. c. For Key, enter |*a^t%183923!. (You must enter the key string twice.) d. Click Apply.

343 | 802.1X Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

3. In the Servers list, select Server Group. In the Server Group Instance list, enter IAS and click Add. a. Select the server group IAS to display configuration parameters for the server group. b. Under Servers, click New. c. From the Server Name drop-down list, select IAS1. Click Add Server.
4. Under Server Rules, click New. a. For Condition, enter Class. b. For Attribute, select value-of from the drop-down list. c. For Operand, select set role. d. Click Add.
5. Click Apply.
In the CLI
(host)(config) #aaa authentication-server radius IAS1 host 10.1.1.21 key |*a^t%183923!
(host)(config) #aaa server-group IAS auth-server IAS1 set role condition Class value-of
Configuring 802.1X Authentication
An AAA profile specifies the 802.1X authentication profile and 802.1x server group to be used for authenticating clients for a WLAN. The AAA profile also specifies the default user roles for 802.1X and MAC authentication.
In the 802.1X authentication profile, configure enforcement of machine authentication before user authentication. If a user attempts to log in before machine authentication completes, the user is placed in the limited guest role.
In the WebUI
1. Navigate to the Configuration > Security > Authentication > L2 Authentication page. 2. Select 802.1X Authentication Profile.
a. At the bottom of the Instance list, enter dot1x, then click Add. b. Select the profile name you just added. c. Select Enforce Machine Authentication. d. For the Machine Authentication: Default Machine Role, select computer. e. For the Machine Authentication: Default User Role, select guest. f. Click Apply. 3. Select the AAA Profiles tab. a. In the AAA Profiles Summary, click Add to add a new profile. b. Enter aaa_dot1x, then click Add. a. Select the profile name you just added. b. For MAC Auth Default Role, select computer. c. For 802.1x Authentication Default Role, select faculty. d. Click Apply. 4. In the Profiles list (under the aaa_dot1x profile), select 802.1x Authentication Profile. a. From the drop-down list, select the dot1x 802.1x authentication profile you configured previously.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.1X Authentication | 344

b. Click Apply. 5. In the Profiles list (under the aaa_dot1x profile), select 802.1x Authentication Server Group.
a. From the drop-down list, select the IAS server group you created previously. b. Click Apply.
In the CLI
(host)(config) #aaa authentication dot1x dot1x machine-authentication enable machine-authentication machine-default-role computer machine-authentication user-default-role guest
(host)(config) #aaa profile aaa_dot1x d>ot1x-default-role faculty mac-default-role computer authentication-dot1x dot1x d>ot1x-server-group IAS
Configuring VLANs
In this example, wireless clients are assigned to either VLAN 60 or 61 while guest users are assigned to VLAN 63. VLANs 60 and 61 split users into smaller IP subnetworks, improving performance by decreasing broadcast traffic. The VLANs are internal to the Dell controller only and do not extend into other parts of the wired network. The clients' default gateway is the Dell controller, which routes traffic out to the 10.1.1.0 subnetwork.
You configure the VLANs, assign IP addresses to each VLAN, and establish the "helper address" to which client DHCP requests are forwarded.
In the WebUI
1. Navigate to the Configuration > Network > VLANs page. Click Add to add VLAN 60. a. For VLAN ID, enter 60. b. Click Apply. c. Repeat steps A and B to add VLANs 61 and 63.
2. To configure IP parameters for the VLANs, navigate to the Configuration > Network > IP > IPInterfaces page. a. Click Edit for VLAN 60. b. For IP Address, enter 10.1.60.1. c. For Net Mask, enter 255.255.255.0. d. Under DHCP Helper Address, click Add. Enter 10.1.1.25 and click Add. e. Click Apply.
3. In the IP Interfaces page, click Edit for VLAN 61. a. For IP Address, enter 10.1.61.1. b. For Net Mask, enter 255.255.255.0. c. Under DHCP Helper Address, click Add. Enter 10.1.1.25 and click Add. d. Click Apply.
4. In the IP Interfaces page, click Edit for VLAN 63. a. For IP Address, enter 10.1.63.1. b. For Net Mask, enter 255.255.255.0. c. Under DHCP Helper Address, click Add. Enter 10.1.1.25 and click Add. d. Click Apply.

345 | 802.1X Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

5. Select the IP Routes tab. a. For Default Gateway, enter 10.1.1.254. b. Click Apply.
In the CLI
(host)(config) #vlan 60 (host)(config) #interface vlan 60
ip address 10.1.60.1 255.255.255.0 ip helper-address 10.1.1.25
(host)(config) #vlan 61 (host)(config) #interface vlan 61
ip address 10.1.61.1 255.255.255.0 ip helper-address 10.1.1.25
(host)(config) #vlan 63 (host)(config) #interface vlan 63
ip address 10.1.63.1 255.255.255.0 ip helper-address 10.1.1.25
(host)(config) #ip default-gateway 10.1.1.254
Configuring the WLANs
In this example, default AP parameters for the entire network are: the default ESSID is WLAN-01 and the encryption mode is TKIP. A second ESSID called "guest" has the encryption mode set to static WEP with a configured WEP key.
In this example, the non-guest clients that associate to an AP are mapped into one of two different user VLANs. The initial AP to which the client associates determines the VLAN: clients that associate to APs in the first floor of the building are mapped to VLAN 60, and clients that associate to APs in the second floor of the building are mapped to VLAN 61. Therefore, the APs in the network are segregated into two AP groups, named first-floor and second-floor. (See Creating an AP group on page 568 for information about creating AP groups.) The guest clients are mapped into VLAN 63.
Configuring the Guest WLAN
You create and configure the virtual AP profile, guest and apply the profile to each AP group. The "guest" virtual AP profile contains the SSID profile "guest" which configures static WEP with a WEP key.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration page. 2. In the AP Group list, click Edit for first-floor. 3. Under Profiles, select Wireless LAN and then Virtual AP. 4. To create the guest virtual AP:
a. Select NEW from the Add a profile drop-down list. Enter guest, and click Add. b. In the Profile Details entry for the guest virtual AP profile, select NEW from the SSID profile drop-down
list. A pop-up window allows you to configure the SSID profile. c. For the name for the SSID profile enter guest. d. For the Network Name for the SSID, enter guest. e. For Network Authentication, select None. f. For Encryption, select WEP. g. Enter the WEP Key.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.1X Authentication | 346

h. Click Apply to apply the SSID profile to the Virtual AP. i. Under Profile Details, click Apply. 5. Click on the guest virtual AP name in the Profiles list or in Profile Details to display configuration parameters. a. Ensure that you select Virtual AP enable. b. For VLAN, select 63. c. Click Apply. 6. Navigate to the Configuration > Wireless > AP Configuration page. 7. In the AP Group list, click Edit for the second-floor. 8. In the Profiles list, select Wireless LAN and then Virtual AP. 9. Select guest from the Add a profile drop-down list. Click Add. 10.Click Apply.
In the CLI
(host)(config) #wlan ssid-profile guest essid guest wepkey1 aaaaaaaaaa opmode static-wep
(host)(config) #wlan virtual-ap guest vlan 63 ssid-profile guest
(host)(config) #ap-group first-floor virtual-ap guest
(host)(config) #ap-group second-floor virtual-ap guest
Configuring the Non-Guest WLANs
You create and configure the SSID profile "WLAN-01" with the ESSID "WLAN-01" and WPA TKIP encryption. You need to create and configure two virtual AP profiles: one with VLAN 60 for the first-floor AP group and the other with VLAN 61 for the second-floor AP group. Each virtual AP profile references the SSID profile "WLAN01" and the previously-configured AAA profile aaa_dot1x.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration page. 2. In the AP Group list, click Edit for the first-floor. 3. In the Profiles list, select Wireless LAN and then Virtual AP. 4. To configure the WLAN-01_first-floor virtual AP:
a. Select NEW from the Add a profile drop-down list. Enter WLAN-01_first-floor, and click Add. b. In the Profile Details entry for the WLAN-01_first-floor virtual AP profile, select the aaa_dot1x AAA
profile you previously configured. A pop-up window displays the configured AAA profile parameters. Click Apply. c. From the SSID profile drop-down list, select NEW. A pop-up window allows you to configure the SSID profile. d. Enter WLAN-01 for the name of the SSID profile. e. For Network Name, enter WLAN-01. f. For Network Authentication, select WPA. g. Click Apply.

347 | 802.1X Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

h. At the bottom of the Profile Details page, click Apply. 5. Click on the WLAN-01_first-floor virtual AP name in the Profiles list or in Profile Details to display
configuration parameters. a. Ensurer that you select Virtual AP enable. b. For VLAN, select 60. c. Click Apply. 6. Navigate to the Configuration > Wireless > AP Configuration page. 7. In the AP Group list, click Edit for the second-floor. 8. In the Profiles list, select Wireless LAN and then Virtual AP. 9. To configure the WLAN-01_second-floor virtual AP: a. Select NEW from the Add a profile drop-down list. Enter WLAN-second-floor, and click Add. b. In the Profile Details entry for the virtual AP profile, select aaa_dot1x from the AAA profile drop-down
list. A pop-up window displays the configured AAA profile parameters. Click Apply . c. From the SSID profile drop-down list, select WLAN-01. A pop-up window displays the configured SSID
profile parameters. Click Apply . d. At the bottom of the Profile Details page, click Apply. 10.Click on the new virtual AP name in the Profiles list or in Profile Details to display configuration parameters. a. Ensure that you select Virtual AP enable. b. For VLAN, select 61. c. Click Apply.
In the CLI
(host)(config) #wlan ssid-profile WLAN-01 essid WLAN-01 opmode wpa-tkip
(host)(config) #wlan virtual-ap WLAN-01_first-floor vlan 60 aaa-profile aaa_dot1x ssid-profile WLAN-01
(host)(config) #wlan virtual-ap WLAN-01_second-floor vlan 61 aaa-profile aaa_dot1x ssid-profile WLAN-01
(host)(config) #ap-group first-floor virtual-ap WLAN-01_first-floor ap-group second-floor virtual-ap WLAN-01_second-floor
Configuring Authentication with the Controller's Internal Database
In the following example:
l The controller's internal database provides user authentication. l The authentication type is WPA. From the 802.1x authentication exchange, the client and the controller
derive dynamic keys to encrypt data transmitted on the wireless network.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.1X Authentication | 348

Configuring the Internal Database
Configure the internal database with the username, password, and role (student, faculty, or sysadmin) for each user. There is a default internal server group that includes the internal database. For the internal server group, configure a server derivation rule that assigns the role to the authenticated client.
In the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. In the Servers list, select Internal DB. 3. Under Users, click Add User to add users. 4. For each user, enter a username and password. 5. Select a role for each user (if a role is not specified, the default role is guest). 6. Select the expiration time for the user account in the internal database. 7. Click Apply.
In the CLI
Use the privileged mode in the CLI to configure users in the controller's internal database.

(host)(config) #local-userdb add username <user> password <password>
Configuring a Server Rule
In the WebUI 1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select Server Group to display the Server Group list. 3. Select the internal server group. 4. Under Server Rules, click New to add a server derivation rule.
a. For Condition, enter Role. b. Select value-of from the drop-down list. c. Select Set Role from the drop-down list. d. Click Add. 5. Click Apply.
In the CLI (host)(config) #aaa server-group internal
set role condition Role value-of
Configuring 802.1x Authentication
An AAA profile specifies the 802.1x authentication profile and 802.1x server group to be used for authenticating clients for a WLAN. The AAA profile also specifies the default user role for 802.1x authentication. For this example, you enable both 802.1x authentication and termination on the controller.
In the WebUI
1. Navigate to the Configuration > Security > Authentication > L2 Authentication page. In the profiles list, select 802.1x Authentication Profile. a. In the Instance list, enter dot1x, then click Add.

349 | 802.1X Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

b. Select the dot1x profile you just created. c. Select Termination.
The defaults for EAP Method and Inner EAP Method are EAP-PEAP and EAP-MSCHAPv2, respectively.
d. Click Apply. 2. Select the AAA Profiles tab.
a. In the AAA Profiles Summary, click Add to add a new profile. b. Enter aaa_dot1x, then click Add. c. Select the aaa_dot1x profile you just created. d. For 802.1x Authentication Default Role, select faculty. e. Click Apply. 3. In the Profiles list (under the aaa_dot1x profile you just created), select 802.1x Authentication Profile. a. Select the dot1x profile from the 802.1x Authentication Profile drop-down list. b. Click Apply. 4. In the Profiles list (under the aaa_dot1x profile you just created), select 802.1x Authentication Server Group. a. Select the internal server group. b. Click Apply.
In the CLI
(host)(config) #aaa authentication dot1x dot1x termination enable
(host)(config) #aaa profile aaa_dot1x d>ot1x-default-role student authentication-dot1x dot1x d>ot1x-server-group internal
Configuring VLANs
In this example, wireless clients are assigned to either VLAN 60 or 61 while guest users are assigned to VLAN 63. VLANs 60 and 61 split users into smaller IP subnetworks, improving performance by decreasing broadcast traffic. The VLANs are internal to the Dell controller only and do not extend into other parts of the wired network. The clients' default gateway is the Dell controller, which routes traffic out to the 10.1.1.0 subnetwork. You configure the VLANs, assign IP addresses to each VLAN, and establish the "helper address" to which client DHCP requests are forwarded.
In the WebUI
1. Navigate to the Configuration > Network > VLAN page. Click Add to add VLAN 60. a. For VLAN ID, enter 60. b. Click Apply. c. Repeat steps A and B to add VLANs 61 and 63.
2. To configure IP parameters for the VLANs, navigate to the Configuration > Network > IP > IP Interfaces page. a. Click Edit for VLAN 60. b. For IP Address, enter 10.1.60.1.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.1X Authentication | 350

c. For Net Mask, enter 255.255.255.0. d. Under DHCP Helper Address, click Add. Enter 10.1.1.25 and click Add. e. Click Apply. 3. In the IP Interfaces page, click Edit for VLAN 61. a. For IP Address, enter 10.1.61.1. b. For Net Mask, enter 255.255.255.0. c. Under DHCP Helper Address, click Add. Enter 10.1.1.25 and click Add. d. Click Apply. 4. In the IP Interfaces page, click Edit for VLAN 63. a. For IP Address, enter 10.1.63.1. b. For Net Mask, enter 255.255.255.0. c. Under DHCP Helper Address, click Add. Enter 10.1.1.25 and click Add. d. Click Apply. 5. Select the IP Routes tab. a. For Default Gateway, enter 10.1.1.254. b. Click Apply.
In the CLI
(host)(config) #vlan 60 (host)(config) #interface vlan 60
ip address 10.1.60.1 255.255.255.0 ip helper-address 10.1.1.25
(host)(config) #vlan 61 (host)(config) #interface vlan 61
ip address 10.1.61.1 255.255.255.0 ip helper-address 10.1.1.25
(host)(config) #vlan 63 (host)(config) #interface vlan 63
ip address 10.1.63.1 255.255.255.0 ip helper-address 10.1.1.25
(host)(config) #ip default-gateway 10.1.1.254
Configuring WLANs
In this example, default AP parameters for the entire network are as follows: the default ESSID is WLAN-01 and the encryption mode is TKIP. A second ESSID called guest has the encryption mode set to static WEP with a configured WEP key.
In this example, the non-guest clients that associate to an AP are mapped into one of two different user VLANs. The initial AP to which the client associates determines the VLAN: clients that associate to APs in the first floor of the building are mapped to VLAN 60, and clients that associate to APs in the second floor of the building are mapped to VLAN 61. Therefore, the APs in the network are segregated into two AP groups, named first-floor and second-floor. (See Creating an AP group on page 568 for information about creating AP groups.) The guest clients are mapped into VLAN 63.
Configuring the Guest WLAN
You create and configure the virtual AP profile, guest and apply the profile to each AP group. The guest virtual AP profile contains the SSID profile, guest which configures static WEP with a WEP key.

351 | 802.1X Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration page. 2. In the AP Group list, select first-floor. 3. In the Profiles list, select Wireless LAN and then Virtual AP. 4. To configure the guest virtual AP:
a. Select NEW from the Add a profile drop-down list. Enter guest for the name of the virtual AP profile, and click Add.
b. In the Profile Details entry for the guest virtual AP profile, select NEW from the SSID profile drop-down list. A pop-up window allows you to configure the SSID profile.
c. Enter guest for the name of the SSID profile. d. Enter guest for the Network Name. e. For Network Authentication, select None. f. For Encryption, select WEP. g. Enter the WEP key. h. Click Apply. i. Under Profile Details, click Apply. 5. Click on the guest virtual AP name in the Profiles list or in Profile Details to display configuration parameters. a. Ensure that you select Virtual AP enable. b. For VLAN, select 63. c. Click Apply. 6. Navigate to the Configuration > Wireless > AP Configuration page. 7. In the AP Group list, select second-floor. 8. In the Profiles list, select Wireless LAN and then Virtual AP. 9. Select guest from the Add a profile drop-down list. Click Add. 10.Click Apply.
In the CLI
(host)(config) #wlan ssid-profile guest essid guest wepkey1 aaaaaaaaaa opmode static-wep
(host)(config) #wlan virtual-ap guest vlan 63 ssid-profile guest
(host)(config) #ap-group first-floor virtual-ap guest
(host)(config) #ap-group second-floor virtual-ap guest
Configuring the Non-Guest WLANs
You create and configure the SSID profile "WLAN-01" with the ESSID "WLAN-01" and WPA TKIP encryption. You need to create and configure two virtual AP profiles: one with VLAN 60 for the first-floor AP group and the other with VLAN 61 for the second-floor AP group. Each virtual AP profile references the SSID profile "WLAN01" and the previously-configured AAA profile "aaa_dot1x".

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.1X Authentication | 352

In the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration page. 2. In the AP Group list, select first-floor. 3. In the Profiles list, select Wireless LAN, then select Virtual AP. 4. To configure the WLAN-01_first-floor virtual AP:
a. Select NEW from the Add a profile drop-down list. Enter WLAN-01_first-floor, and click Add. b. In the Profile Details entry for the WLAN-01_first-floor virtual AP profile, select aaa_dot1x from the
AAA Profile drop-down list. A pop-up window displays the configured AAA parameters. Click Apply. c. From the SSID profile drop-down list, select NEW. A pop-up window allows you to configure the SSID
profile. d. Enter WLAN-01 for the name of the SSID profile. e. Enter WLAN-01 for the Network Name. f. Select WPA for Network Authentication. g. Click Apply. h. At the bottom of the Profile Details page, click Apply. 5. Click on the WLAN-01_first-floor virtual AP profile name in the Profiles list or in Profile Details to display configuration parameters. a. Ensure that you select Virtual AP enable. b. For VLAN, select 60. c. Click Apply. 6. Navigate to the Configuration > Wireless > AP Configuration page. 7. In the AP Group list, select second-floor. 8. In the Profiles list, select Wireless LAN and then Virtual AP. 9. To create the WLAN-01_second-floor virtual AP: a. Select NEW from the Add a profile drop-down list. Enter WLAN-01_second-floor, and click Add. b. In the Profile Details entry for the virtual AP profile, select aaa_dot1x from the AAA Profile drop-
down list. A pop-up window displays the configured AAA profile parameters. Click Apply. c. From the SSID profile drop-down list, select WLAN-01. A pop-up window displays the configured SSID
profile parameters. Click Apply. d. At the bottom of the Profile Details page, click Apply. 10.Click on the WLAN-01_second-floor virtual AP profile name in the Profiles list or in Profile Details to display the configuration parameters. a. Ensure that you select Virtual AP enable. b. For VLAN, select 61. c. Click Apply.
In the CLI
(host)(config) #wlan ssid-profile WLAN-01 essid WLAN-01 opmode wpa-tkip
(host)(config) #wlan virtual-ap WLAN-01_first-floor vlan 60 aaa-profile aaa_dot1x ssid-profile WLAN-01
(host)(config) #wlan virtual-ap WLAN-01_second-floor

353 | 802.1X Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

vlan 61 aaa-profile aaa_dot1x sid-profile WLAN-01
(host)(config) #ap-group first-floor virtual-ap WLAN-01_first-floor
(host)(config) #ap-group second-floor virtual-ap WLAN-01_second-floor
Configuring Mixed Authentication Modes
Use l2-auth-fail-through command to perform mixed authentication which includes both MAC and 802.1x authentication. When MAC authentication fails, enable the l2-auth-fail-through command to perform 802.1x authentication.
By default the l2-auth-fail-through command is disabled.

Table 71: Mixed Authentication Modes

Authentication 1

2

3

4

5

6

MAC

Success

Success

Success Fail

Fail

Fail

authentication

802.1x

Success

Fail

--

Success

Fail

--

authentication

Association

dynamicwep

No Associatio n

staticwep

dynamicwep

No Associatio n

staticwep

Role Assignment 802.1x

--

MAC

802.1x

--

logon

Table 71 describes the different authentication possibilities
In the CLI
(host)(config) #aaa profile test l2-auth-fail-through

Performing Advanced Configuration Options for 802.1X
This section describes advanced configuration options for 802.1X authentication.
Configuring Reauthentication with Unicast Key Rotation
When enabled, unicast and multicast keys are updated after each reauthorization. It is a best practice to configure the time intervals for reauthentication, multicast key rotation, and unicast key rotation to be at least 15 minutes. Ensure that these intervals are mutually prime, and the factor of the unicast key rotation interval and the multicast key rotation interval is less than the reauthentication interval.
Unicast key rotation depends upon both the AP/controller and wireless client behavior. It is known that some wireless NICs have issues with unicast key rotation.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.1X Authentication | 354

The following is an example of the parameters you can configure for reauthentication with unicast and multicast key rotation:
l Reauthentication: Enabled l Reauthentication Time Interval: 6011 Seconds l Multicast Key Rotation: Enabled l Multicast Key Rotation Time Interval: 1867 Seconds l Unicast Key Rotation: Enabled l Unicast Key Rotation Time Interval: 1021 Seconds
In the WebUI
1. Navigate to the Configuration > Security > Authentication > L2 Authentication page. 2. Select 802.1x Authentication Profile, then select the name of the profile you want to configure. 3. Select the Advanced tab. Enter the following values:
n Reauthentication Interval: 6011 n Multicast Key Rotation Time Interval: 1867 n Unicast Key Rotation Time Interval: 1021 n Multicast Key Rotation: (select) n Unicast Key Rotation: (select) n Reauthentication: (select) 4. Click Apply.
In the CLI
(host)(config) #aaa authentication dot1x profile reauthentication timer reauth-period 6011 unicast-keyrotation timer ukey-rotation-period 1021 multicast-keyrotation timer mkey-rotation-period 1867
Application Single Sign-On Using L2 Authentication
This feature allows single sign-on (SSO) for different web-based applications using Layer 2 authentication information. Single sign-on for web-based application uses Security Assertion Markup Language (SAML), which happens between the web service provider and an identity provider (IDP) that the web server trusts. A request made from the client to a web server is redirected to the IDP for authentication. If the user has already been authenticated using L2 credentials, the IDP server already knows the authentication details and returns a SAML response, redirecting the client browser to the web-based application. The user enters the web-based application without needing to enter the credentials again.
Enabling application SSO using L2 network information requires configuration on the controllerand on the IDP server. The Dell ClearPass Policy Manager (CPPM) is the only IDP supported. The controllerhas been optimized to work with CPPM to provide better functionality as an IDP.
Important Points to Remember
l CPPM is the only supported IDP.

355 | 802.1X Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l SSO occurs after 802.1x authentication. Therefore, SSO after captive portal authentication is not supported. Roles for captive portal and SSO are mutually exclusive and, therefore, a user in the captive portal role cannot perform SSO and vice-versa.
l SSO with VIA is not supported. l There is a limit on the number of concurrent sessions that can be serviced at a given instant. This limit is set
at the webserver level using the web-server profile web-max-clients command. The default value is 320 for W-7000 and W-7200 Series controllers platforms and 25 for other controller platforms. The maximum number of concurrent SSO sessions that can be handled is dependent on the other web services being handled and the same time.
Enabling Application SSO
Enabling application SSO using L2 authentication information requires configuration on the controller and CPPM. This feature is enabled by completing the following steps:
l Controller: n Configuring an SSO-IDP Profile n Applying an SSO Profile to a User Role n Selecting an IDP Certificate
l CPPM (refer to the ClearPass Policy Manager for configuration of the following procedures): n Add the controller's IP address as a network device n Add the user to the local user DB n Create an enforcement profile to return the Aruba vendor-specific attribute (VSA) SSO token n Create an IDP attribute enforcement profile n Create an enforcement policy binding the Aruba VSA SSO token enforcement profile n Create an enforcement policy binding the IDP enforcement profile n Create a service, allowing the respective authentication types and authentication database, and bind the Aruba VSA SSO token enforcement policy. n Create a service, allowing the respective authentication types and authentication database, and bind the IDP enforcement policy. n Configure SSO for the CPPM.
Configuring SSO IDP-Profiles
Before SSO can be enabled, you must configure an SSO profile by completing the procedure detailed below.
In the WebUI
1. Navigate to Configuration > Advanced Services > All Profiles > Wireless LANs > SSO. 2. Enter the name of the SSO profile and click Add. 3. Click on the name of the IDP profile in the Instance list to edit the profile. 4. Click New. 5. Enter the name of the IDP URL in the URL Name text box. 6. Enter the IDP URL into the URL text box. 7. Click Add. 8. Repeat steps 4 through 7 for each IDP URL you are adding to the SSO profile. 9. Click Apply when all URLs have been added.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.1X Authentication | 356

In the CLI
sso idp-profile <idp profile name> idp <urlname> <url>
Applying an SSO Profile to a User Role
The newly created SSO profile must be applied to any applicable user rules that require SSO. Apply the SSO profile be completing the steps below.
In the WebUI
1. Navigate to Configuration > Security > Access Control. 2. Select the User Roles tab. 3. Select the User Role that the SSO profile will be linked to and click Edit. 4. Under Misc. Configuration, select an IDP profile from the idp profile name drop-down menu. 5. Click Apply.
In the CLI
user-role <role name> sso <idp profile name>
Selecting an IDP Certificate
An SSL certificate is needed for SSL negotiation with browser. The certificate can be imported in PKCS12 format, so that it contains the certificate and private key, or the key pair can be generated and a certificate signing request (CSR) request sent to the enterprise CA server to generate a certificate which can then be uploaded to the controller. For information about uploading or generating a certificate, see Managing Certificates. After a certificate is uploaded or generated, the IDP certificate must be selected.
In the WebUI
1. Navigate to Configuration > Management > General. 2. Under IDP Server Certificate, select the IDP certificate from the Server Certificate drop-down menu. 3. Click Apply.
In the CLI
(host)(config) #web-server profile (host)(Web Server Configuration) #idp-cert <name of the certificate>

357 | 802.1X Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Chapter 13 Stateful and WISPr Authentication
ArubaOS supports stateful 802.1X authentication, stateful NTLM authentication, and authentication for Wireless Internet Service Provider roaming (WISPr). Stateful authentication differs from 802.1X authentication in that the controller does not manage the authentication process directly, but instead monitors the authentication messages between a user and an external authentication server, then assigns a role to that user based upon the information in those authentication messages. WISPr authentication allows clients to roam between hotspots using different ISPs. This chapter describes the following topics: l Working With Stateful Authentication on page 358 l Working With WISPr Authentication on page 359 l Understanding Stateful Authentication Best Practices on page 359 l Configuring Stateful 802.1X Authentication on page 359 l Configuring Stateful NTLM Authentication on page 360 l Configuring Stateful Kerberos Authentication on page 361 l Configuring WISPr Authentication on page 362
Working With Stateful Authentication
ArubaOS supports three different types of stateful authentication: l Stateful 802.1X authentication: This feature allows the controller to learn the identity and role of a user
connected to a third-party AP, and is useful for authenticating users to networks with APs from multiple vendors. When an 802.1X-capable access point sends an authentication request to a RADIUS server, the controller inspects this request and the associated response to learn the authentication state of the user. It then applies an identity-based user-role through the Policy Enforcement Firewall. l Stateful Kerberos authentication: Stateful Kerberos authentication configures a controller to monitor the Kerberos authentication messages between a client and a Windows authentication server. If the client successfully authenticates via a Kerberos authentication server, the controller recognizes that the client has been authenticated and assigns that client a specified user role. l Stateful NTLM authentication: NT LAN Manager (NTLM) is a suite of Microsoft authentication and session security protocols. You can use stateful NTLM authentication to configure a controller to monitor the NTLM authentication messages between a client and a Windows authentication server. If the client successfully authenticates via an NTLM authentication server, the controller recognizes that the client has been authenticated and assigns that client a specified user role. The default Windows authentication method has changed from the older NTLM protocol to the newer Kerberos protocol, starting with Windows 2000. Therefore, stateful NTLM authentication is most useful for networks with legacy, pre-Windows 2000 clients. Also note that unlike other types of authentication, all users authenticated via stateful NTLM authentication must be assigned to the user role specified in the Stateful NTLM Authentication profile. Dell's stateful NTLM authentication does not support placing users in various roles based upon group membership or other role-derivation attributes.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Stateful and WISPr Authentication | 358

Working With WISPr Authentication
WISPr authentication allows a "smart client" to authenticate to the network when roaming between Wireless Internet Service Providers, even if the wireless hotspot uses an ISP, which the client may not have an account for.
If you are a hotspot operator using WISPr authentication, and a client that has an account with your ISP attempts to access the Internet at your hotspot, your ISP's WISPr AAA server authenticates that client directly and allows the client to access the network. If, however, the client only has an account with a partner ISP, your ISP's WISPr AAA server forwards that client's credentials to the partner ISP's WISPr AAA server for authentication. Once the client has been authenticated on the partner ISP, it is authenticated on your hotspot's own ISP, as per their service agreements. After your ISP sends an authentication message to the controller, the controller assigns the default WISPr user-role to that client.
ArubaOS supports the following smart clients, which enable client authentication and roaming between hotspots by embedding iPass Generic Interface Specification (GIS) redirect, proxy, authentication, and logoff messages within HTML messages to the controller.
l iPass l Boingo l Trustive l weRoam l AT&T
Understanding Stateful Authentication Best Practices
Before you can configure a stateful authentication feature, you must define a user-role you want to assign to the authenticated users and create a server group that includes a RADIUS authentication server for stateful 802.1X authentication or a Windows server for stateful NTLM authentication. For details on performing these tasks, refer to the following sections of this User Guide:
l Roles and Policies on page 438 l Configuring a RADIUS Server on page 250 l Configuring a Windows Server on page 263 l Configuring Server Groups on page 266
You can use the default stateful NTLM authentication and WISPr authentication profiles to manage the settings for these features, or you can create additional profiles as desired. Note that unlike most other types of authentication, stateful 802.lx authentication uses only a single Stateful 802.1X profile. This profile can be enabled or disabled, but you cannot configure more than one Stateful 802.1X profile.
Configuring Stateful 802.1X Authentication
When you configure 802.1X authentication for clients on non-Dell APs, you must specify the group of RADIUS servers that performs the user authentication and select the role to assign to users who successfully complete authentication. When the user logs off or shuts down the client machine, ArubaOSnotes the deauthentication message from the RADIUS server and changes the user's role from the specified authenticated role back to the login role. For details on defining a RADIUS server used for stateful 802.1X authentication, see Configuring a RADIUS Server on page 250.
In the WebUI
To configure the Stateful 802.1X Authentication profile via the WebUI:

359 | Stateful and WISPr Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

1. Navigate to the Configuration > Security > Authentication > L2 Authentication page. 2. In the Profiles list, select Stateful 802.1X Authentication Profile. 3. Click the Default Role drop-down list, and select the role assigned to stateful 802.1X authenticated users. 4. Specify the timeout period for authentication requests, between 1 and 20 seconds. The default value is 10
seconds. 5. Select the Mode checkbox to enable stateful 802.1X authentication.
In the CLI
Use the commands below to configure stateful 802.1X authentication via the command-line interface. The first set of commands defines the RADIUS server used for 802.1X authentication, and the second set assigns that server to a server group. The third set associates the server group with the stateful 802.1X authentication profile, then sets the authentication role and timeout period. (host)(config)# aaa authentication-server radius <server-name>
acctport <port> authport <port> clone <server> enable host <ipaddr> key <psk> nas-identifier <string> nas-ip <ipaddr> retransmit <number> timeout <seconds> use-md5 !
(host)(config)# aaa server-group group <server-group> auth-server <server-name> !
(host)(config)# aaa authentication stateful-dot1x server-group <server-group> default-role <role> enable timeout <seconds>
Configuring Stateful NTLM Authentication
The Stateful NTLM Authentication profile requires that you specify a server group, which includes the servers performing NTLM authentication, and the role to be assigned to users who are successfully authenticated. For details on defining a windows server used for NTLM authentication, see Configuring a Windows Server on page 263.
When the user logs off or shuts down the client machine, the user remains in the authenticated role until the user ages out, meaning there is no user traffic for the amount of time specified in the User Idle Timeout setting in the Configuration > Security > Authentication > Advanced page.
In the WebUI
To create and configure a new instance of a stateful NTLM authentication profile via the WebUI:
1. Navigate to the Configuration > Security > Authentication > L3 Authentication page. 2. In the Profiles list, expand the Stateful NTLM Authentication Profile. 3. To define settings for an existing profile, click that profile name in the profiles list.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Stateful and WISPr Authentication | 360

To create and define settings for a Stateful NTLM Authentication profile, select an existing profile, then click Save As in the right window pane. Enter a name for the new profile in the entry field at the top of the right window pane. 4. Click the Default Role drop-down list, and select the role to be assigned to all users after they complete stateful NTLM authentication. 5. Specify the timeout period for authentication requests, between 1 and 20 seconds. The default value is 10 seconds. 6. Select the Mode checkbox to enable stateful NTLM authentication. 7. Click Apply. 8. In the Profiles list, select the Server Group entry below the Stateful NTLM Authentication profile. 9. Click the Server Group drop-down list and select the group of Windows servers you want to use for stateful NTLM authentication. 10.Click Apply.
In the CLI
Use the commands below to configure stateful NTLM authentication via the command-line interface. The first set of commands defines the Windows server used for NTLM authentication, and the second set adds that server to a server group. The third set associates that server group with the stateful NTLM authentication profile, then defines the profile settings. (host)(config)# aaa authentication-server windows <windows_server_name>
host <ipaddr> enable !
(host)(config)# aaa server-group group <server-group> auth-server <windows_server_name> !
(host)(config)# aaa authentication stateful-ntlm default-role <role> enable server-group <server-group> timeout <seconds>
Configuring Stateful Kerberos Authentication
The Stateful Kerberos Authentication profile requires that you specify a server group, which includes the Kerberos servers and the role assigned to authenticated users. For details on defining a windows server used for Kerberos authentication, see Configuring a Windows Server on page 263.
When the user logs off or shuts down the client machine, the user remains in the authenticated role until the user ages out, meaning there is no user traffic for the amount of time specified in the User Idle Timeout setting in the Configuration > Security > Authentication > Advanced page.
In the WebUI
To create and configure a new stateful Kerberos authentication profile via the WebUI:
1. Navigate to the Configuration > Security > Authentication > L3 Authentication page. 2. In the Profiles list, expand the Stateful Kerberos Authentication Profile. 3. To define settings for an existing profile, click the profile name in the Profiles list.

361 | Stateful and WISPr Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

To create and define settings for a new Stateful Kerberos Authentication profile, select an existing profile, then click Save As in the right window pane. Enter a name for the new profile in the entry field at the top of the right window pane. 4. Click the Default Role drop-down list, and select the role to be assigned to all users after they complete stateful Kerberos authentication. 5. Specify the timeout period for authentication requests, from 1-20 seconds. The default value is 10 seconds. 6. Click Apply. 7. In the Profiles list, select the Server Group entry below the Stateful Kerberos Authentication profile. 8. Click the Server Group drop-down list and select the group of Windows servers you want to use for stateful Kerberos authentication. 9. Click Apply.
In the CLI
Use the commands below to configure stateful Kerberos authentication via the command-line interface. The first set of commands defines the server used for Kerberos authentication, and the second set adds that server to a server group, and the third set of commands associates that server group with the stateful NTLM authentication profile then defines the profile settings. (host)(config)# aaa authentication-server windows <windows_server_name>
host <ipaddr> enable
(host)(config)# aaa server-group group <server-group> auth-server <windows_server_name>
(host)(config)# aaa authentication stateful-kerberos default-role <role> enable server-group <server-group> timeout <seconds>
Configuring WISPr Authentication
The WISPr authentication profile includes parameters to define RADIUS attributes, default roles for authenticated WISPr users, the maximum number of authentication failures, and login wait times. The WISPrLocation-ID, sent from the controller to the WISPr RADIUS server, is the concatenation of the ISO Country Code, E.164 Country Code, E.164 Area Code, and SSID/Zone parameters configured in this profile.
The parameters used to define WISPr RADIUS attributes are specific to the RADIUS server your ISP uses for WISPr authentication; contact your ISP to determine these values. You can find a list of ISO and ITU country and area codes at the ISO and ITU websites (iso.org) and itu.int.)
In the WebUI
To create and configure a new WISPr authentication profile in the WebUI:
1. Navigate to the Configuration > Security > Authentication > L3 Authentication page. 2. In the Profiles list, expand the WISPr Authentication Profile. 3. To define settings for an existing profile, click that profile name in the Profiles list.
To create and define settings for a new WISPr Authentication profile, select an existing profile, then click Save As in the right window pane. Enter a name for the new profile in the entry field. at the top of the right window pane. 4. Define values for the parameters below.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Stateful and WISPr Authentication | 362

Table 72: WISPr Authentication Profile Parameters

Parameter

Description

Default Role

Default role assigned to users that complete WISPr authentication.

Logon wait minimum wait

If the controller's CPU utilization has surpassed the Login wait CPU utilization threshold value, the Logon wait minimum wait parameter defines the minimum number of seconds a user has to wait to retry a login attempt. Range: 1­10 seconds. Default: 5 seconds.

Logon wait maximum wait

If the controller's CPU utilization has surpassed the Login wait CPUutilization threshold value, the Logon wait maximum wait parameter defines the maximum number of seconds a user has to wait to retry a login attempt. Range: 1­10 seconds. Default: 10 seconds.

Logon wait CPU utilization threshold

Percentage of CPU utilization at which the maximum and minimum login wait times are enforced. Range: 1­100%. Default: 60%.

WISPr Location-ID ISO Country Code

The ISO Country Code section of the WISPr Location ID.

WISPr Location-ID E.164 Country Code

The E.164 Country Code section of the WISPr Location ID.

WISPr Location-ID E.164 Area Code

The E.164 Area Code section of the WISPr Location ID.

WISPr Location-ID SSID/Zone

The SSID/Zone section of the WISPr Location ID.

WISPr Operator Name

A name identifying the hotspot operator.

WISPr Location Name

A name identifying the hotspot location. If no name is defined, the parameter uses the name of the associated AP.

5. Click Apply. 6. In the Profiles list, select the Server Group entry below the WISPr Authentication profile. 7. Click the Server Group drop-down list and select the group of RADIUS servers you want to use for WISPr
authentication. 8. Click Apply.
A Boingo smart client uses a NAS identifier in the format <CarrierID>_<VenueID> for location identification. To support Boingo clients, you must also configure the NAS identifier parameter in the Radius server profile for the WISPr server
In the CLI
Use the CLI commands below to configure WISPr authentication. The first set of commands defines the RADIUS server used for WISPr authentication, and the second set adds that server to a server group. The third

363 | Stateful and WISPr Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

set of commands associates that server group with the WISPR authentication profile, then defines the profile settings.
(host)(config)# aaa authentication-server radius <rad_server_name> host 172.4.77.214 key qwERtyuIOp enable nas-identifier corp_venue1 !
(host)(config)# aaa server-group group <server-group> auth-server <radius_server_name> !
(host)(config)# aaa authentication wispr default-role <role> logon-wait {cpu-threshold|maximum-delay|minimum-delay} server-group <server-group> wispr-location-id-ac <wispr-location-id-ac> wispr-location-id-cc <wispr-location-id-cc> wispr-location-id-isocc <wispr-location-id-isocc> wispr-location-id-network <wispr-location-id-network> wispr-location-name-location <wispr-location-name-location> wispr-location-name-operator-name <wispr-location-name-location>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Stateful and WISPr Authentication | 364

Chapter 14 Certificate Revocation

The Certificate Revocation feature enables the controller to perform real-time certificate revocation checks using the Online Certificate Status Protocol (OCSP), or traditional certificate validation using the Certificate Revocation List (CRL) client. Topics in this chapter include: l Understanding OCSP and CRL on page 365 l Configuring the Controller as a CRL Client on page 368 l Configuring the Controller as an OCSP Responder on page 369 l Configuring the Controller as an OCSP Client on page 366 l Certificate Revocation Checking for SSH Pubkey Authentication on page 370
Understanding OCSP and CRL
OCSP (RFC 2560) is a standard protocol that consists of an OCSP client and an OCSP responder. This protocol determines revocation status of a given digital public-key certificate without downloading the entire CRL. CRL is the traditional method of checking certificate validity. A CRL provides a list of certificate serial numbers that have been revoked or are no longer valid. CRLs let the verifier check the revocation status of the presented certificate while verifying it. CRLs are limited to 512 entries. Both the Delegated Trust Model and the Direct Trust Model are supported to verify digitally signed OCSP responses. Unlike the Direct Trust Model, the Delegated Trust Model does not require the OCSP responder certificates to be explicitly available on the controller.
Configuring a Controller as OCSP and CRL Clients
The controller can act as an OCSP client and issue OCSP queries to remote OCSP responders located on the intranet or Internet. Since many applications in ArubaOS (such as IKE), use digital certificates, a protocol such as OCSP needs to be implemented for revocation. An entity that relies on the content of a certificate (a relying party) needs to check before accepting the certificate as valid. Once it is verified that the certificate has not been revoked, the OCSP client retrieves certificate revocation status from an OCSP responder. The responder may be the CA (Certificate Authority) that has issued the certificate in question, or it may be some other designated entity which provides the service on behalf of the CA. A revocation checkpoint is a logical profile that is tied to each CA certificate that the controller has (trusted or intermediate). Also, the user can specify revocation preferences within each profile. The OCSP request is not signed by the Dell OCSP client at this time. However, the OCSP response is always signed by the responder. Both OCSP and CRL configuration and administration is usually performed by the administrator who manages the web access policy for an organization. In small networks where there are is no Internet connection or connection to an OCSP responder, CRL is preferable to than OCSP.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Certificate Revocation | 365

Configuring an OCSP Controller as a Responder
The controller can be configured to act as an OCSP responder (server) and respond to OCSP queries from clients that want to obtain revocation status of certificates. The OCSP responder on the controller is accessible over HTTP port 8084. You cannot configure this port. Although the OCSP responder accepts signed OCSP requests, it does not attempt to verify the signature before processing the request. Therefore, even unsigned OCSP requests are supported. The controller as an OCSP responder provides revocation status information to Dell applications that use CRLs. This is useful in small disconnected networks where clients cannot reach outside OCSP server to validate certificates. Typical scenarios include client to client or client to other server communication situations where the certificates of either party need to be validated.
Configuring the Controller as an OCSP Client
When OCSP is used as the revocation method, you need to configure the OCSP responder certificate and the OCSP URL.
In the WebUI
1. Navigate to the Configuration > Management > Certificates > Upload page. 2. Enter a name in the Certificate Name field. This name identifies the certificate you are uploading. 3. Enter the certificate file name in the Certificate Filename field. Use the Browse button to enter the full
pathname. 4. Select the certificate format from the Certificate Format drop-down menu. 5. Select OCSP Responder Cert from the Certificate Type drop-down menu.
A revocation check method (OCSP or CRL) can be chosen independently for every revocation checkpoint. In this example, we are only describing the OCSP check method.
Once this certificate is uploaded it is maintained in the certificate store for OCSP responder certificates. These certificates are used for signature verification.

366 | Certificate Revocation

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 53 Upload a certificate
6. Click Upload. The certificate appears in the Certificate Lists pane. 7. For detailed information about an uploaded certificate, click View next to the certificate. Figure 54 View certificate details

8. Select the Revocation Checkpoint tab.
Dell Networking W-Series ArubaOS 6.4.x | User Guide

Certificate Revocation | 367

9. In the Revocation Checkpoint pane, click Edit next to the revocation checkpoint that you want to configure. The Revocation Checkpoint pane displays.
10.In the Revocation Check field, select ocsp from the Method 1 drop-down list as the primary check method.
11.In the OCSP URL field, enter the URL of the OCSP responder. 12.In the OCSP Responder Cert field, select the OCSP certificate you want to configure from the drop-down
menu. 13.Click Apply.
In the CLI
This example configures an OCSP client with the revocation check method as OCSP for revocation check point CAroot. The OCSP responder certificate is configured as RootCA-Ocsp_responder. The corresponding OCSP responder service is available at http://10.4.46.202/ocsp. The check method is OCSP for revocation check point CARoot. (host) (config) #crypto-local pki rcp CARoot
(host) (RCP-CARoot) #ocsp-responder-cert RootCA-Ocsp_responder (host) (RCP-CARoot) #ocsp-url http://10.4.46.202/ocsp (host) (RCP-CARoot) #revocation-check ocsp The show crypto-local pki OCSP ResponderCert CLI command lists the contents of the OCSP Responder Certificate store. The show crypto-local pki revocation checkpoint rcp_name CLI command shows the entire configuration for a given revocation checkpoint.
Configuring the Controller as a CRL Client
CRL is the traditional method of checking certificate validity. When you want to check certificate validity using a CRL, import the CRL. You can import CRLs only through the WebUI.
In the WebUI
1. Navigate to the Configuration > Management > Certificates > Upload page. 2. Enter a name in the Certificate Name field. This name identifies the CRL certificate you are uploading. 3. Enter the certificate file name in the Certificate Filename field. Use Browse to enter the full pathname. 4. Select the certificate format from the Certificate Format drop-down menu. 5. Select CRL from the Certificate Type drop-down menu.
A revocation check method (OCSP or CRL) can be chosen independently for every revocation checkpoint. In this example, we are only describing the CRL check method.
Once this CRL is uploaded it is maintained in the store for CRLs. These CRLs are used for signature verification. 6. Click Upload. The CRL appears in the Certificate Lists pane. Select CRL from the Group drop-down list if you want to display only CRLs. 7. For detailed information about an uploaded CRL, click View next to the CRL. 8. Select the Revocation Checkpoint tab.

368 | Certificate Revocation

Dell Networking W-Series ArubaOS 6.4.x | User Guide

9. In the Revocation Checkpoint pane, click Edit next to the revocation checkpoint that you want to configure. The Revocation Checkpoint pane displays.
10.In the Revocation Check field, select crl from the Method 1 drop-down list. 11.In the CRL Location field, enter the CRL you want to use for this revocation checkpoint. The CRLs listed are
files that have already been imported onto the controller. 12.Click Apply.
In the CLI
This example configures an OCSP responder with the check method as CRL for revocation check point ROOTCassh-webui. The CRL location is crl1 and the revocation check method is crl. (host) (config) #crypto-local pki rcp ROOTCa-ssh-webui
(host) (RCP-CARoot) #crl-location file crl1 (host) (RCP-CARoot) #revocation-check crl
Configuring the Controller as an OCSP Responder
When configured as an OCSP responder, the controller provides revocation status information to ArubaOS applications that use CRLs.
In the WebUI
1. Navigate to the Configuration > Management > Certificates > Upload page. 2. Enter a name in the Certificate Name field. This name identifies the OCSP signer certificate you are
uploading. 3. Enter the certificate file name in the Certificate Filename field. Use Browse to enter the full pathname. 4. Select the certificate format from the Certificate Format drop-down menu. 5. Select OCSP signer cert from the Certificate Type drop-down menu. Once this certificate is uploaded, it
is maintained in the certificate store for OCSP signer certificates. These certificates are used for signature verification. The OCSP signer cert signs OCSP responses for this revocation check point. The OCSP signer cert can be the same trusted CA as the check point, a designated OCSP signer certificate issued by the same CA as the check point or some other local trusted authority. If you do not specify an OCSP signer cert, OCSP responses are signed using the global OCSP signer certificate. If that is not present, than an error message is sent out to clients.
The OCSP signer certificate takes precedence over the global OCSP signer certificate as it is check point specific.
6. Click Upload. The certificate appears in the Certificate Lists pane. Select OCSP signer cert from the Group drop-down list if you want to display only those certificates which are OCSP signer certificates.
7. For detailed information about an uploaded certificate, click View next to the certificate. 8. Select the Revocation Checkpoint tab. 9. Select Enable next to Enable OCSP Responder.
Enable OCSP Responder is a global knob that turns the OCSP responder service on or off on the controller. The default is disabled (off). Enabling this option automatically adds the OCSP responder port (TCP 8084) to the permit list in the CP firewall so this can be accessed from outside the controller. 10.Select the OCSP signer cert from the OCSP Certificates drop-down menu to be used to sign OCSP responses for this revocation check point.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Certificate Revocation | 369

11.In the Revocation Checkpoint pane, click Edit next to the revocation checkpoint that you want to configure. The Revocation Checkpoint pane displays.
12.In the Revocation Check field, optionally select a check method from the Method 1 drop-down list. Optionally, select a backup check method from the Method 2 drop-down list.
13.Select Enable next to Enable OCSP Responder. 14.Select OCSP signer cert from the OCSP Signer Cert drop-down menu. 15.In the CRL Location field, enter the CRL you want used for this revocation checkpoint. The CRLs listed are
files that have already been imported onto the controller. 16.Click Apply.
In the CLI
This example configures the controller as an OCSP responder. The OCSP responder service is enabled, the revocation check point is CAroot, the OCSP signer cert is "oscap_CA1," and the CRL file location is "Sec1-WIN05PRGNGEKAO-CA-unrevoked.crl."
(host) (config) #crypto-local pki service-ocsp-responder (host) (config) #crypto-local pki rcp CAroot
(host) (CAroot) #ocsp-signer-cert oscsp_CA1 (host) (CAroot) #crl-location file Sec1-WIN-05PRGNGEKAO-CA-unrevoked.crl (host) (CAroot) #enable-ocsp-responder

Certificate Revocation Checking for SSH Pubkey Authentication
This feature allows the ssh-pubkey management user to be optionally configured with a Revocation Checkpoint (RCP). This meets the requirement for a two-factor authentication and integration of device management with PKI for SSH pubkey authentication. The ArubaOS implementation of SSH using Pubkey authentication is designed for integration with smart cards or other technologies that use X.509 certificates. The RCP checks the revocation status of the SSH user's client certificate before permitting access. If the revocation check fails, the user is denied access using the ssh-pubkey authentication method. However, the user can still authenticate through a username and password if configured to do so. For information about configuring a revocation checkpoint, see Certificate Revocation.
Configuring the SSH Pubkey User with RCP
You can configure the SSH pubkey user with RCP to check the validity of the user's x.509 certificate.
In the WebUI
1. Navigate to Configuration > Management > Administration. 2. Under Management Users, click Add. The Add User page displays. 3. Select Certificate Management, then SSH Public Key. 4. When adding an ssh-pubkey user, when revocation check is enabled, perform either of the following tasks :
l To enable the RCP check, select a valid configured RCP from Revocation Checkpoint drop-down menu. l Select None if you do not want the RCP check enabled for the ssh pubkey user.
In the CLI
The CLI allows you to configure an optional RCP for an ssh-pubkey user. Users can still be configured without the RCP. In this example, the certificate name is "client1-rg,", the username is "test1," the role name is "root," and the rcp is "ca-rg:" (host)(config) #mgmt-user ssh-pubkey client-cert client1-rg test1 root ? rcp Revocation Checkpoint for ssh user's client certificate

370 | Certificate Revocation

Dell Networking W-Series ArubaOS 6.4.x | User Guide

(host)(config) #mgmt-user ssh-pubkey client-cert client1-rg test1 root rcp ca-rg In this example, a user is configured without the RCP: (host)(config) #mgmt-user ssh-pubkey client-cert client2-rg test2 root
Displaying Revocation Checkpoint for the SSH Pubkey User
The RCP checks the revocation status of the SSH user's client certificate before permitting access. If the revocation check fails, the user is denied access using the ssh-pubkey authentication method. However, the user can still authenticate through a username and password if configured to do so. This feature allows the ssh-pubkey management user to be optionally configured with a Revocation Checkpoint (RCP). This meets the requirement for a two-factor authentication and integration of device management with PKI for SSH pubkey authentication. The ArubaOS implementation of SSH using Pubkey authentication is designed for integration with smart cards or other technologies that use X.50.
Configuring the SSH Pubkey User with RCP
The column REVOCATION CHECKPOINT displays the configured RCP for the ssh-pubkey user. If no RCP is configured for the user, the word none is displayed.
In the WebUI
Navigate to Configuration > Management > Administration. The column SSH Revocation Checkpoint displays the RCP configured (if any) for the ssh pubkey user.
In the CLI
(host)#show mgmt-user ssh-pubkey
Removing the SSH Pubkey User
In the WebUI
1. Navigate to Configuration > Management > Administration. 2. Click Delete next to the management user you want to delete.
In the CLI
(host) (config) #no mgmt-user ssh-pubkey client-cert <certname> <username>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Certificate Revocation | 371

Chapter 15 Captive Portal Authentication

Captive portal is one of the methods of authentication supported by ArubaOS. A captive portal presents a web page which requires user action before network access is granted. The required action can be simply viewing and agreeing to an acceptable use policy, or entering a user ID and password which must be validated against a database of authorized users. You can also configure captive portal to allow clients to download the Dell VPN dialer for Microsoft VPN clients if the VPN is to be terminated on the controller. For more information about the VPN dialer, see Virtual Private Networks on page 411. Topics in this chapter include: l Understanding Captive Portal on page 372 l Configuring Captive Portal in the Base Operating System on page 373 l Using Captive Portal with a PEFNG License on page 375 l Sample Authentication with Captive Portal on page 378 l Configuring Guest VLANs on page 384 l Configuring Captive Portal Authentication Profiles on page 385 l Enabling Optional Captive Portal Configurations on page 390 l Personalizing the Captive Portal Page on page 394 l Creating and Installing an Internal Captive Portal on page 396 l Creating Walled Garden Access on page 405 l Enabling Captive Portal Enhancements
Understanding Captive Portal
You can configure captive portal for guest users, where no authentication is required, or for registered users who must be authenticated against an external server or the controller's internal database.
While you can use captive portal to authenticate users, it does not provide for encryption of user data and should not be used in networks where data security is required. Captive portal is most often used for guest access, access to open systems (such as public hot spots), or as a way to connect to a VPN.
You can use captive portal for guest and registered users at the same time. The default captive portal web page provided with ArubaOS displays login prompts for both registered users and guests. (You can customize the default captive portal page, as described in Personalizing the Captive Portal Page on page 394) You can also load up to 16 different customized login pages into the controller. The login page displayed is based on the SSID to which the client associates.
Policy Enforcement Firewall Next Generation (PEFNG) License
You can use captive portal with or without the PEFNG license installed in the controller. The PEFNG license provides identity-based security to wired and wireless clients through user roles and firewall rules. You must purchase and install the PEFNG license on the controller to use identity-based security features.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Captive Portal Authentication | 372

There are differences in how captive portal functions work and how you configure captive portal, depending on whether the license is installed. Other parts of this chapter describe how to configure captive portal in the base operating system (without the PEFNG license) and with the license installed.
Controller Server Certificate
The Dell controller is designed to provide secure services through the use of digital certificates. A server certificate installed in the controller verifies the authenticity of the controller for captive portal.
Dell controllers ship with a demonstration digital certificate. Until you install a customer-specific server certificate in the controller, this demonstration certificate is used by default for all secure HTTP connections such as captive portal. This certificate is included primarily for the purposes of feature demonstration and convenience and is not intended for long-term use in production networks. Users in a production environment are urged to obtain and install a certificate issued for their site or domain by a well-known certificate authority (CA). You can generate a Certificate Signing Request (CSR) on the controller to submit to a CA. For information on how to generate a CSR and how to import the CA-signed certificate into the controller, see Managing Certificates on page 878 in Management Access on page 860.
The controllercan accept wild card server certificates (CN begins with an asterisk). If a wildcard certificate is uploaded (for example, CN=*.domain.com), the asterisk in CN is replaced with 'captiveportal-login' in order to derive the Captive Portal logon page URL (captiveportal-login.domain.com).
Once you have imported a server certificate into the controller, you can select the certificate to be used with captive portal as described in the following sections.
To select a certificate for captive portal using the WebUI:
1. Navigate to the Configuration > Management > General page. 2. Under Captive Portal Certificate, select the name of the imported certificate from the drop-down list. 3. Click Apply.
To select a certificate for captive portal using the command-line interface, access the CLI in config mode and issue the following commands:
(host)(config) #web-server profile (host)(Web Server Configuration) #captive-portal-cert <certificate>
To specify a different server certificate for captive portal with the CLI, use the no command to revert back to the default certificate before you specify the new certificate:
(host)(config) #web-server profile (host)(Web Server Configuration) #captive-portal-cert ServerCert1 (host)(Web Server Configuration) #no captive-portal-cert (host)(Web Server Configuration) #captive-portal-cert ServerCert2
Configuring Captive Portal in the Base Operating System
The base operating system (ArubaOS without any licenses) allows full network access to all users who connect to an ESSID, both guest and registered users. In the base operating system, you cannot configure or customize user roles; this function is only available by installing the PEFNG license. Captive portal allows you to control or identify who has access to network resources.
When you create a captive portal profile in the base operating system, an implicit user role is automatically created with same name as the captive portal profile. This implicit user role allows only DNS and DHCP traffic between the client and network and directs all HTTP or HTTPS requests to the captive portal. You cannot directly modify the implicit user role or its rules. Upon authentication, captive portal clients are allowed full access to their assigned VLAN.

373 | Captive Portal Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The WLAN Wizard within the ArubaOS WebUI allows for basic captive portal configuration for WLANs associated with the "default" ap-group: Configuration > Wizards > WLAN Wizard. Follow the steps in the workflow pane within the wizard and refer to the help tab for assistance.
What follows are the tasks for configuring captive portal in the base ArubaOS. The example server group and profile names appear inside quotation marks.
l Create the Server Group name. In this example, the server group name is "cp-srv". If you are configuring captive portal for registered users, configure the server(s) and create the server group. For more information about configuring authentication servers and server groups, see Authentication Servers on page 249.
l Create Captive Portal Authentication Profile. In this example, the profile name is "c-portal". Create and configure an instance of the captive portal authentication profile. Creating the captive portal profile automatically creates an implicit user role and ACL with the same name. Creating the profile "cportal" creates an implicit user role called "c-portal". That user role allows only DNS and DHCP traffic between the client and network and directs all HTTP or HTTPS requests to the captive portal.
l Create an AAA Profile. In this example, the profile name is "aaa_c-portal". Create and configure an instance of the AAA profile. For the initial role, enter the implicit user role that was created in step on page 374. The initial role in the profile "aaa_c-portal" must be set to "c-portal".
l Create SSID Profile. In this example, the profile name is "ssid_c-portal". Create and configure an instance of the virtual AP profile which you apply to an AP group or AP name. Specify the AAA profile you created in step on page 374.
l Create a Virtual AP Profile. In this example, the profile name is "vp_c-portal". Create and configure an instance of the SSID profile for the virtual AP.
The following sections present the procedure for configuring the captive portal authentication profile, the AAA profile, and the virtual AP profile using the WebUI or the command line (CLI). Configuring the VLAN and authentication servers and server groups are described elsewhere in this document.
In the WebUI
1. Navigate to the Configuration > Security > Authentication > L3 Authentication page. Select the Captive Portal Authentication profile. a. In the Captive Portal Authentication Profile Instance list, enter the name of the profile (for example, cportal), then click Add. b. Select the captive portal authentication profile you just created. c. You can enable user login and/or guest login, and configure other captive portal profile parameters as described in Table 73. d. Click Apply.
2. To specify authentication servers, select Server Group under the captive portal authentication profile you just configured. a. Select the server group (for example, cp-srv) from the drop-down menu. b. Click Apply.
3. Select the AAA Profiles tab. a. In the AAA Profiles Summary, click Add to add a new profile. Enter the name of the profile (for example, aaa_c-portal), then click Add. b. Select the AAA profile you just created.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Captive Portal Authentication | 374

c. For Initial Role, select the captive portal authentication profile (for example, c-portal) you created previously.
The Initial Role must be exactly the same as the name of the captive portal authentication profile you created.
d. Click Apply. 4. Navigate to the Configuration > Wireless > AP Configuration page. Select either the AP Group or AP
Specific tab. Click Edit for the applicable AP group name or AP name. 5. Under Profiles, select Wireless LAN, then select Virtual AP. 6. To create a new virtual AP profile, select NEW from the Add a profile drop-down menu. Enter the name for
the virtual AP profile (for example, vp_c-portal), then click Add. a. In the Profile Details entry for the new virtual AP profile, select the AAA profile you previously created
from the AAA Profile drop-down menu. A pop-up window displays the configured AAA profile parameters. Click Apply in the pop-up window. b. From the SSID profile drop-down menu, select NEW. A pop-up window allows to you configure the SSID profile. c. Enter the name for the SSID profile (for example, ssid_c-portal). d. Enter the Network Name for the SSID (for example, c-portal-ap). e. Click Apply in the pop-up window. f. At the bottom of the Profile Details page, click Apply. 7. Click on the new virtual AP name in the Profiles list or in Profile Details to display configuration parameters. a. Make sure Virtual AP enable is selected. b. For VLAN, select the VLAN to which users are assigned (for example, 20). c. Click Apply.
In the CLI
To configure captive portal in the base operating system via the command-line interface, access the CLI in config mode and issue the following commands: (host)(config) #aaa authentication captive-portal c-portal
server-group cp-srv (host)(config) #aaa profile aaa_c-portal
initial-role c-portal (host)(config) #wlan ssid-profile ssid_c-portal
essid c-portal-ap (host)(config) #wlan virtual-ap vp_c-portal
aaa-profile aaa_c-portal ssid-profile ssid_c-portal vlan 20
Using Captive Portal with a PEFNG License
The PEFNG license provides identity-based security for wired and wireless users. There are two user roles that are important for captive portal:
l Default user role, which you specify in the captive portal authentication profile, is the role granted to clients upon captive portal authentication. This can be the predefined guest system role.
l Initial user role, which you specify in the AAA profile, directs clients who associate to the SSID to captive portal whenever the user initiates a Web browser connection. This can be the predefined logon system role.

375 | Captive Portal Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The captive portal authentication profile specifies the captive portal login page and other configurable parameters. The initial user role configuration must include the applicable captive portal authentication profile instance.
MAC-based authentication, if enabled on the controller, takes precedence over captive portal authentication.
The following are the basic tasks for configuring captive portal using role-based access provided by the Policy Enforcement Firewall software module. Note that you must install the PEFNG license before proceeding (see Software Licenses on page 146). l Configure the user role for a default user.
Create and configure user roles and policies for guest or registered captive portal users. (See Roles and Policies on page 438 for more information about configuring policies and user roles.) l Create a server group. If you are configuring captive portal for registered users, configure the server(s) and create the server group. (See Authentication Servers on page 249for more information about configuring authentication servers and server groups.)
If you are using the controller's internal database for user authentication, use the predefined "Internal" server group. You need to configure entries in the internal database, as described in Authentication Servers on page 249.
l Create the captive portal authentication profile. Create and configure an instance of the captive portal authentication profile. Specify the default user role for captive portal users.
l Configure the initial user role. Create and configure the initial user role for captive portal. You need to include the predefined captiveportal policy, which directs clients to the captive portal, in the initial user role configuration. You also need to specify the captive portal authentication profile instance in the initial user role configuration. For example, if you are using the predefined logon system role for the initial role, you need to edit the role to specify the captive portal authentication profile instance.
l Create the AAA Profile. Create and configure an instance of the AAA profile. Specify the initial user role.
l Create the SSID Profile "ssid_c-portal". Create and configure an instance of the virtual AP profile that you apply to an AP group or AP name. Specify the AAA profile you just created.
l Create the Virtual AP Profile "vp_c-portal". Create and configure an instance of the SSID profile for the virtual AP.
The following sections present the WebUI and Command Line (CLI) procedures for configuring the captive portal authentication profile, initial user role, the AAA profile, and the virtual AP profile. Other chapters within this document detail the configuration of the user roles and policies, authentication servers, and server groups.
Configuring Captive Portal in the WebUI
To configure captive portal with PEFNG license via the WebUI: 1. Navigate to the Configuration > Security > Authentication > L3 Authentication page. 2. Select Captive Portal Authentication Profile.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Captive Portal Authentication | 376

a. In the Captive Portal Authentication Profile Instance list, enter the name of the profile (for example, cportal), then click Add.
b. Select the captive portal authentication profile you just created. c. Select the default role (for example, employee) for captive portal users. d. Enable guest login and/or user login, as well as other parameters (refer to Table 73). e. Click Apply. 3. To specify the authentication servers, select Server Group under the captive portal authentication profile you just configured. a. Select the server group (for example, cp-srv) from the drop-down menu. b. Click Apply. 4. Select the AAA Profiles tab. a. In the AAA Profiles Summary, click Add to add a new profile. Enter the name of the profile (for example,
aaa_c-portal), then click Add. b. Set the Initial role to a role that you will configure with the captive portal authentication profile. c. Click Apply. 5. Navigate to the Configuration > Security > Access Control page to configure the initial user role to use captive portal authentication. a. To edit the predefined logon role, select the System Roles tab, then click Edit for the logon role. b. To configure a new role, first configure policy rules in the Policies tab, then select the User Roles tab to
add a new user role and assign policies. c. To specify the captive portal authentication profile, scroll down to the bottom of the page. Select the
profile from the Captive Portal Profile drop-down menu, and click Change. d. Click Apply. 6. Navigate to the Configuration > Wireless > AP Configuration page to configure the virtual AP profile. 7. Select either the AP Group or AP Specific tab. Click Edit for the applicable AP group name or AP name. 8. Under Profiles, select Wireless LAN, then select Virtual AP. 9. Select NEW from the Add a profile drop-down menu to create a new virtual AP profile. Enter the name for the virtual AP profile (for example, vp_c-portal), then click Add. a. In the Profile Details entry for the new virtual AP profile, select the AAA profile you previously
configured. A pop-up window displays the configured AAA profile parameters. Click Apply in the pop-up window. b. From the SSID profile drop-down menu, select NEW. A pop-up window allows you to configure the SSID profile. c. Enter the name for the SSID profile (for example, ssid_c-portal). d. Enter the Network Name for the SSID (for example, c-portal-ap). e. Click Apply in the pop-up window. f. At the bottom of the Profile Details page, click Apply. 10.Click on the new virtual AP name in the Profiles list or in Profile Details to display configuration parameters. a. Make sure Virtual AP enable is selected. b. For VLAN, select the VLAN to which users are assigned (for example, 20). c. Click Apply.

377 | Captive Portal Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Configuring Captive Portal in the CLI
To configure captive portal with the PEFNG license via the command-line interface, access the CLI in config mode and issue the following commands: (host)(config) #aaa authentication captive-portal c-portal
d>efault-role employee server-group cp-srv (host)(config) #user-role logon captive-portal c-portal (host)(config) #aaa profile aaa_c-portal initial-role logon (host)(config) #wlan ssid-profile ssid_c-portal essid c-portal-ap vlan 20 (host)(config) #wlan virtual-ap vp_c-portal aaa-profile aaa_c-portal ssid-profile ssid_c-portal
Sample Authentication with Captive Portal
In the following example:
l Guest clients associate to the guestnet SSID which is an open wireless LAN. Guest clients are placed into VLAN 900 and assigned IP addresses by the controller's internal DHCP server. The user has no access to network resources beyond DHCP and DNS until they open a web browser and log in with a guest account using captive portal.
l Guest users are given a login and password from guest accounts created in the controller's internal database. The temporary guest accounts are created and administered by the site receptionist.
l Guest users must enter their assigned login and password into the captive portal login before they are given access to use web browsers (HTTP and HTTPS), POP3 email clients, and VPN clients (IPsec, PPTP, and L2TP) on the Internet and only during specified working hours. Guest users are prohibited from accessing internal networks and resources. All traffic to the Internet is source-NATed.
This example assumes a Policy Enforcement Firewall Next Generation (PEFNG) license is installed in the controller.
In this example, you create two user roles:
l guest-logon is a user role assigned to any client who associates to the guestnet SSID. Normally, any client that associates to an SSID will be placed into the logon system role. The guest-logon user role is more restrictive than the logon role.
l auth-guest is a user role granted to clients who successfully authenticate via the captive portal.
Creating a Guest User Role
The guest-logon user role consists of the following ordered policies:
l captiveportal is a predefined policy that allows captive portal authentication. l guest-logon-access is a policy that you create with the following rules:
n Allows DHCP exchanges between the user and the DHCP server during business hours while blocking other users from responding to DHCP requests.
n Allows ICMP exchanges between the user and the controller during business hours. l block-internal-access is a policy that you create that denies user access to the internal networks.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Captive Portal Authentication | 378

The guest-logon user role configuration needs to include the name of the captive portal authentication profile instance. You can modify the user role configuration after you create the captive portal authentication profile instance.
Creating an Auth-guest User Role
The auth-guest user role consists of the following ordered policies: l cplogout is a predefined policy that allows captive portal logout. l guest-logon-access is a policy that you create with the following rules:
n Allows DHCP exchanges between the user and the DHCP server during business hours while blocking other users from responding to DHCP requests.
n Allows DNS exchanges between the user and the public DNS server during business hours. Traffic is source-NATed using the IP interface of the controller for the VLAN.
l block-internal-access is a policy that you create that denies user access to the internal networks. l auth-guest-access is a policy that you create with the following rules:
n Allows DHCP exchanges between the user and the DHCP server during business hours while blocking other users from responding to DHCP requests.
n Allows DNS exchanges between the user and the public DNS server during business hours. Traffic is source-NATed using the IP interface of the controller for the VLAN.
n Allows HTTP/S traffic from the user during business hours. Traffic is source-NATed using the I interface of the controller for the VLAN.
l drop-and-log is a policy that you create that denies all traffic and logs the attempted network access.
Configuring Policies and Roles in the WebUI
Creating a Time Range
To create a time range via the WebUI: 1. Navigate to the Configuration > Security > Access Control > Time Ranges page to define the time
range "working-hours". 2. Click Add.
a. For Name, enter working-hours. b. For Type, select Periodic. c. Click Add. d. For Start Day, click Weekday. e. For Start Time, enter 07:30. f. For End Time, enter 17:00. g. Click Done. 3. Click Apply. To create the guest-logon-access policy via the WebUI: 1. Navigate to the Configuration > Security > Access Control > Policies page. 2. Select Add to add the guest-logon-access policy. 3. For Policy Name, enter guest-logon-access. 4. For Policy Type, select IPv4 Session. 5. Under Rules, select Add to add rules for the policy. a. Under Source, select user.

379 | Captive Portal Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

b. Under Destination, select any. c. Under Service, select udp. Enter 68. d. Under Action, select drop. e. Click Add. 6. Under Rules, click Add. a. Under Source, select any. b. Under Destination, select any. c. Under Service, select service. Select svc-dhcp. d. Under Action, select permit. e. Under Time Range, select working-hours. f. Click Add.
Creating Aliases
The following step defines an alias representing the public DNS server addresses. Once defined, you can use the alias for other rules and policies. 1. Navigate to the Configuration > Security > Access Control > Policies page. 2. Select Add to add the guest-logon-access policy. 3. For Policy Name, enter guest-logon-access. 4. For Policy Type, select IPv4 Session. 5. Under Rules, click Add.
a. Under Source, select user. b. Under Destination, select alias. c. Under the alias selection, click New.
n For Destination Name, enter "Public DNS". n Click Add to add a rule. For Rule Type, select host. n For IP Address, enter 64.151.103.120. n Click Add. For Rule Type, select host. n For IP Address, enter 216.87.84.209. n Click Add. n Click Apply. The alias "Public DNS" appears in the Destination menu d. Under Destination, select Public DNS. e. Under Service, select svc-dns. f. Under Action, select src-nat. g. Under Time Range, select working-hours. h. Click Add. 6. Click Apply.
Creating an Auth-Guest-Access Policy
To configure the auth-guest-access policy via the WebUI: 1. Navigate to the Configuration > Security > Access Control > Policies page. 2. Select Add to add the guest-logon-access policy. 3. For Policy Name, enter auth-guest-access. 4. For Policy Type, select IPv4 Session.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Captive Portal Authentication | 380

5. Under Rules, select Add to add rules for the policy. a. Under Source, select user. b. Under Destination, select any. c. Under Service, select udp. Enter 68. d. Under Action, select drop. e. Click Add.
6. Under Rules, click Add. a. Under Source, select any. b. Under Destination, select any. c. Under Service, select service. Select svc-dhcp. d. Under Action, select permit. e. Under Time Range, select working-hours. f. Click Add.
7. Under Rules, click Add. a. Under Source, select user. b. Under Destination, select alias. Select Public DNS from the drop-down menu. c. Under Service, select service. Select svc-dns. d. Under Action, select src-nat. e. Under Time Range, select working-hours. f. Click Add.
8. Under Rules, click Add. a. Under Source, select user. b. Under Destination, select any. c. Under Service, select service. Select svc-http. d. Under Action, select src-nat. e. Under Time Range, select working-hours. f. Click Add.
9. Under Rules, click Add. a. Under Source, select user. b. Under Destination, select any. c. Under Service, select service. Select svc-https. d. Under Action, select src-nat. e. Under Time Range, select working-hours. f. Click Add.
10.Click Apply.
Creating an Block-Internal-Access Policy
To create the block-internal-access policy via the WebUI:
1. Navigate to the Configuration > Security > Access Control > Policies page. 2. Select Add to add the block-internal-access policy. 3. For Policy Name, enter block-internal-access. 4. For Policy Type, select IPv4 Session. 5. Under Rules, select Add to add rules for the policy.

381 | Captive Portal Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

a. Under Source, select user. b. Under Destination, select alias.

The following step defines an alias representing all internal network addresses. Once defined, you can use the alias for other rules and policies.
c. Under the alias selection, click New. For Destination Name, enter "Internal Network". Click Add to add a rule. For Rule Type, select network. For IP Address, enter 10.0.0.0. For Network Mask/Range, enter 255.0.0.0. Click Add to add the network range. Repeat these steps to add the network ranges 172.16.0.0 255.240.0.0 and 192.168.0.0 255.255.0.0. Click Apply. The alias "Internal Network" appears in the Destination menu
d. Under Destination, select Internal Network. e. Under Service, select any. f. Under Action, select drop. g. Click Add. 6. Click Apply.
Creating a Drop-and-Log Policy
To create the drop-and-log policy via the WebUI: 1. Navigate to the Configuration > Security > Access Control > Policies page. 2. Select Add to add the drop-and-log policy. 3. For Policy Name, enter drop-and-log. 4. For Policy Type, select IPv4 Session. 5. Under Rules, select Add to add rules for the policy.
a. Under Source, select user. b. Under Destination, select any. c. Under Service, select any. d. Under Action, select drop. e. Select Log. f. Click Add. 6. Click Apply.
Creating a Guest Role
To create a guest role via the WebUI: 1. Navigate to the Configuration > Security > Access Control > User Roles page. 2. Click Add. 3. For Role Name, enter guest-logon. 4. Under Firewall Policies, click Add. 5. For Choose from Configured Policies, select captiveportal from the drop-down menu. 6. Click Done. 7. Under Firewall Policies, click Add. 8. For Choose from Configured Policies, select guest-logon-access from the drop-down menu. 9. Click Done. 10.Under Firewall Policies, click Add.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Captive Portal Authentication | 382

11.For Choose from Configured Policies, select block-internal-access from the drop-down menu. 12.Click Done. 13.Click Apply.
Creating an Auth-Guest Role
To create the guest-logon role via the WebUI:
1. Navigate to the Configuration > Security > Access Control > User Roles page. 2. Click Add. 3. For Role Name, enter auth-guest. 4. Under Firewall Policies, click Add. 5. For Choose from Configured Policies, select cplogout from the drop-down menu. 6. Click Done. 7. Under Firewall Policies, click Add. 8. For Choose from Configured Policies, select guest-logon-access from the drop-down menu. 9. Click Done. 10.Under Firewall Policies, click Add. 11.For Choose from Configured Policies, select block-internal-access from the drop-down menu. 12.Click Done. 13.Under Firewall Policies, click Add. 14.For Choose from Configured Policies, select auth-guest-access from the drop-down menu. 15.Click Done. 16.Under Firewall Policies, click Add. 17.For Choose from Configured Policies, select drop-and-log from the drop-down menu. 18.Click Done. 19.Click Apply.
Configuring Policies and Roles in the CLI
Defining a Time Range
To create a time range via the command-line interface, access the CLI in config mode and issue the following commands: (host)(config) #time-range working-hours periodic
weekday 07:30 to 17:00
Creating Aliases
To create aliases via the command-line interface, access the CLI in config mode and issue the following commands: (host)(config) #netdestination "Internal Network" network 10.0.0.0 255.0.0.0 network 172.16.0.0 255.255.0.0
network 192.168.0.0 255.255.0.0 (host)(config) #netdestination "Public DNS"
host 64.151.103.120 host 216.87.84.209

383 | Captive Portal Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Creating a Guest-Logon-Access Policy
To create a guest-logon-access policy via the command-line interface, access the CLI in config mode and issue the following commands: (host)(config) #ip access-list session guest-logon-access
user any udp 68 deny any any svc-dhcp permit time-range working-hours user alias "Public DNS" svc-dns src-nat time-range working-hours
Creating an Auth-Guest-Access Policy
To create an auth-guest-access policy via the command-line interface, access the CLI in config mode and issue the following commands: (host)(config) #ip access-list session auth-guest-access
user any udp 68 deny any any svc-dhcp permit time-range working-hours user alias "Public DNS" svc-dns src-nat time-range working-hours user any svc-http src-nat time-range working-hours user any svc-https src-nat time-range working-hours
Creating a Block-Internal-Access Policy
To create a block-internal-access policy via the command-line interface, access the CLI in config mode and issue the following commands: (host)(config) #ip access-list session block-internal-access
user alias "Internal Network" any deny
Creating a Drop-and-Log Policy
To create a drop-and-log policy via the command-line interface, access the CLI in config mode and issue the following commands: (host)(config) #ip access-list session drop-and-log
user any any deny log
Creating a Guest-Logon Role
To create a guest-logon-role via the command-line interface, access the CLI in config mode and issue the following commands: (host)(config) #user-role guest-logon
session-acl captiveportal position 1 session-acl guest-logon-access position 2 session-acl block-internal-access position 3
Creating an Auth-Guest Role
To create an auth-guest role via the command-line interface, access the CLI in config mode and issue the following commands: (host)(config) #user-role auth-guest
session-acl cplogout position 1 session-acl guest-logon-access position 2 session-acl block-internal-access position 3 session-acl auth-guest-access position 4 session-acl drop-and-log position 5
Configuring Guest VLANs
Guests using the WLAN are assigned to VLAN 900 and are given IP addresses via DHCP from the controller.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Captive Portal Authentication | 384

In the WebUI
1. Navigate to the Configuration > Network > VLANs page. a. Select the VLAN ID tab. a. Click Add. b. For VLAN ID, enter 900. c. Click Apply.
2. Navigate to the Configuration > Network > IP > IP Interfaces page. a. Click the IP Interfaces tab. a. Click Edit for VLAN 900. b. For IP Address, enter 192.168.200.20. c. For Net Mask, enter 255.255.255.0. d. Click Apply.
3. Click the DHCP Server tab. a. Select Enable DHCP Server. b. Click Add under Pool Configuration. c. In the Pool Name field, enter guestpool. d. In the Default Router field, enter 192.168.200.20. e. In the DNS Server field, enter 64.151.103.120. f. In the Lease field, enter 4 hours. g. In the Network field, enter 192.168.200.0. In the Netmask field, enter 255.255.255.0. h. Click Done.
4. Click Apply.
In the CLI
(host)(config) #vlan 900 (host)(config) #interface vlan 900 (host)(config) #ip address 192.168.200.20 255.255.255.0 (host)(config) #ip dhcp pool "guestpool" (host)(config) #default-router 192.168.200.20 (host)(config) #dns-server 64.151.103.120 (host)(config) #lease 0 4 0 (host)(config) #network 192.168.200.0 255.255.255.0

Configuring Captive Portal Authentication Profiles
In this section, you create an instance of the captive portal authentication profile and the AAA profile. For the captive portal authentication profile, you specify the previously-created auth-guest user role as the default user role for authenticated captive portal clients and the authentication server group ("Internal").
To configure captive portal authentication via the WebUI:
1. Navigate to the Configuration > Security > Authentication > L3 Authentication page. In the Profiles list, select Captive Portal Authentication Profile. a. In the Captive Portal Authentication Profile Instance list, enter guestnet for the name of the profile, then click Add. b. Select the captive portal authentication profile you just created. c. For Default Role, select auth-guest. d. Select User Login.

385 | Captive Portal Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

e. Deselect (uncheck) Guest Login. f. Click Apply. 2. Select Server Group under the guestnet captive portal authentication profile you just created. a. Select internal from the Server Group drop-down menu. b. Click Apply.
To configure captive portal authentication via the command-line interface, access the CLI in config mode and issue the following commands: (host)(config) #aaa authentication captive-portal guestnet
d>efault-role auth-guest user-logon no guest-logon server-group internal
Modifying the Initial User Role
The captive portal authentication profile specifies the captive portal login page and other configurable parameters. The initial user role configuration must include the applicable captive portal authentication profile instance. Therefore, you need to modify the guest-logon user role configuration to include the guestnet captive portal authentication profile.
To modify the guest-logon role via the WebUI:
1. Navigate to the Configuration > Security > Access Control > User Roles page. 2. Select Edit for the guest-logon role. 3. Scroll down to the bottom of the page. 4. Select the captive portal authentication profile you just created from the Captive Portal Profile drop-down
menu, and click Change. 5. Click Apply.
To modify the guest-logon role via the command-line interface, access the CLI in config mode and issue the following commands: (host)(config) #user-role guest-logon
captive-portal guestnet
Configuring the AAA Profile
In this section, you configure the guestnet AAA profile, which specifies the previously-created guest-logon role as the initial role for clients who associate to the WLAN.
To configure the AAA profile via the WebUI:
1. Navigate to the Configuration > Security > Authentication > AAA Profiles page. 2. In the AAA Profiles Summary, click Add to add a new profile. Enter guestnet for the name of the profile,
then click Add. 3. For Initial role, select guest-logon. 4. Click Apply.
To configure the AAA profile via the command-line interface, access the CLI in config mode and issue the following commands: (host)(config) #aaa profile guestnet
initial-role guest-logon

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Captive Portal Authentication | 386

Configuring the WLAN
In this section, you create the guestnet virtual AP profile for the WLAN. The guestnet virtual AP profile contains the SSID profile guestnet (which configures opensystem for the SSID) and the AAA profile guestnet.
To configure the guest WLAN via the WebUI:
1. Navigate to the Configuration > Wireless > AP Configuration page. 2. Select either AP Group or AP Specific tab. Click Edit for the AP group or AP name. 3. To configure the virtual AP profile, navigate to the Configuration > Wireless > AP Configuration page.
Select either the AP Group or AP Specific tab. Click Edit for the applicable AP group name or AP name. 4. Under Profiles, select Wireless LAN, then select Virtual AP. 5. To create a new virtual AP profile, select NEW from the Add a profile drop-down menu. Enter the name for
the virtual AP profile (for example, guestnet), and click Add. a. In the Profile Details entry for the new virtual AP profile, select the AAA profile you previously
configured. A pop-up window displays the configured AAA profile parameters. Click Apply in the pop-up window. b. From the SSID profile drop-down menu, select NEW. A pop-up window allows you to configure the SSID profile. c. Enter the name for the SSID profile (for example, guestnet). d. Enter the Network Name for the SSID (for example, guestnet). e. For Network Authentication, select None. f. For Encryption, select Open. g. Click Apply in the pop-up window. h. At the bottom of the Profile Details page, click Apply. 6. Click on the new virtual AP name in the Profiles list or in Profile Details to display configuration parameters. a. Make sure Virtual AP enable is selected. b. For VLAN, select the ID of the VLAN in which captive portal users are placed (for example, VLAN 900). c. Click Apply.
To configure the guest WLAN via the command-line interface, access the CLI in config mode and issue the following commands: (host)(config) #wlan ssid-profile guestnet
essid guestnet opmode opensystem
(host)(config) #aaa profile guestnet initial-role guest-logon
(host)(config) #wlan virtual-ap guestnet vlan 900 aaa-profile guestnet ssid-profile guestnet
Managing User Accounts
Temporary user accounts are created in the internal database on the controller. You can create a user role which will allow a receptionist to create temporary user accounts. Guests can use the accounts to log into a captive portal login page to gain Internet access.
See Creating Guest Accounts on page 897 for more information about configuring guest provisioning users and administering guest accounts.

387 | Captive Portal Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Configuring Captive Portal Configuration Parameters
Table 73 describes configuration parameters on the WebUI Captive Portal Authentication profile page.
In the CLI, you configure these options with the aaa authentication captive-portal commands.

Table 73: Captive Portal Authentication Profile Parameters

Parameter

Description

Default Role

Role assigned to the Captive Portal user upon login. When both user and guest logon are enabled, the default role applies to the user logon; users logging in using the guest interface are assigned the guest role.
Default: guest

Default Guest Role

Role assigned to guest. Default: guest

Redirect Pause

Time, in seconds, that the system remains in the initial welcome page before redirecting the user to the final web URL. If set to 0, the welcome page displays until the user clicks on the indicated link.
Default: 10 seconds

Login Page

URL of the page that appears for the user logon. This can be set to any URL. Default: /auth/index.html

User Logon

Enables Captive Portal with authentication of user credentials. Default: Enabled

Guest Login

Enables Captive Portal logon without authentication. Default: Disabled

Logout popout window

Enables a pop-up window with the Logout link for the user to logout after logon. If this is disabled, the user remains logged in until the user timeout period has elapsed or the station reloads.
Default: Enabled

Use HTTP for authentication

Use HTTP protocol on redirection to the Captive Portal page. If you use this option, modify the captive portal policy to allow HTTP traffic.
Default: disabled (HTTPS is used)

Logon wait minimum wait

Minimum time, in seconds, the user will have to wait for the logon page to pop up if the CPU load is high. This works in conjunction with the Logon wait CPU utilization threshold parameter.
Default: 5 seconds

Logon wait maximum wait

Configure parameters for the logon wait interval Default: 10 seconds

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Captive Portal Authentication | 388

Parameter
Logon wait CPU utilization threshold

Description
CPU utilization percentage above which the Logon wait interval is applied when presenting the user with the logon page. Default: 60%

Max Authentication failures

Maximum number of authentication failures before the user is blacklisted. Default: 0

Show FDQN

Allows the user to see and select the fully-qualified domain name (FQDN) on the login page. The FQDNs shown are specified when configuring individual servers for the server group used with captive portal authentication.
Default: Disabled

Authentication Protocol

Select the PAP, CHAP or MS-CHAPv2 authentication protocol.
NOTE: Do not use the CHAP = option unless instructed to do so by aDell representative.

Logon Page

URL of the page that appears before logon. This can be set to any URL. Default: /auth/index.html

Welcome Page

URL of the page that appears after logon and before redirection to the web URL. This can be set to any URL.
Default: /auth/welcome.html

Show Welcome Page

Displays the configured welcome page before the user is redirected to their original URL. If this option is disabled, users are redirected to the web URL immediately after they log in.
Default: Enabled

Add switch IP address in redirection URL

Sends the controller's IP address in the redirection URL when external captive portal servers are used. An external captive portal server can determine the controller from which a request originated by parsing the `switchip' variable in the URL.
Default: Disabled

Add User VLAN in the Redirection URL

Sends the user's VLAN ID in the redirection URL when external captive portal servers are used.

Add a controller interface in the redirection URL

Sends the controller's interface IP address in the redirection URL when external captive portal servers are used. An external captive portal server can determine the controller from which a request originated by parsing the `switchip' variable in the URL. This parameter requires the Public Access license.

Allow only one active user session

Allows only one active user session at a time. Default: Disabled

389 | Captive Portal Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter White List

Description
To add a netdestination to the captive portal whitelist, enter the destination host or subnet, then click Add. The netdestination will be added to the whitelist. To remove a netdestination from the whitelist, select it in the whitelist field, then click Delete.
If you have not yet defined a netdestination, use the CLI command netdestination to define a destination host or subnet before you add it to the whitelist.
This parameter requires the Public Access license.

Black List

To add a netdestination to the captive portal blacklist, enter the destination host or subnet, then click Add. The netdestination will be added to the blacklist. To remove a netdestination from the blacklist, select it in the blacklist field, then click Delete.
If you have not yet defined a netdestination, use the CLI command netdestination to define a destination host or subnet before you add it to the blacklist.

Show Acceptable Use Policy Page

Show the acceptable use policy page before the logon page. Default: Disabled

User idle timeout
Redirect URL URL Hash Key

The user idle timeout value for this profile. Specify the idle timeout value for the client in seconds. Valid range is 30-15300 in multiples of 30 seconds. Enabling this option overrides the global settings configured in the AAA timers. If this is disabled, the global settings are used.
URL to which an authenticated user will be directed. This parameter must be an absolute URL that begins with either http:// or https://.
If a redirection URL is defined, enter a URL Hash Key to hash the redirect URL using the specified key.
This parameter enhances security for the Clearpass Guest login URL so that Clearpass can trust and ensure that the client MAC address in the redirect URL has not been tampered with by anyone. Default: Disabled.

Enabling Optional Captive Portal Configurations
The following are optional captive portal configurations: l Uploading Captive Portal Pages by SSID Association on page 390 l Changing the Protocol to HTTP on page 391 l Configuring Redirection to a Proxy Server on page 392 l Redirecting Clients on Different VLANs on page 393 l Web Client Configuration with Proxy Script on page 393
Uploading Captive Portal Pages by SSID Association
You can upload custom login pages for captive portal into the controller through the WebUI (refer to Creating and Installing an Internal Captive Portal on page 396). The SSID to which the client associates determines the captive portal login page displayed. You specify the captive portal login page in the captive portal authentication profile, along with other configurable parameters. The initial user role configuration must include the applicable captive portal authentication profile instance. (In the case of captive portal in the base operating system, the initial user role is

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Captive Portal Authentication | 390

automatically created when you create the captive portal authentication profile instance.) You then specify the initial user role for captive portal in the AAA profile for the WLAN.
When you have multiple captive portal login pages loaded in the controller, you must configure a unique initial user role and user role, and captive portal authentication profile, AAA profile, SSID profile, and virtual AP profile for each WLAN that will use captive portal. For example, if you want to have different captive portal login pages for the engineering, business and faculty departments, you need to create and configure according to Table 74.

Table 74: Captive Portal login Pages

Entity

Engineering

Captive portal login page

/auth/eng-login.html

Captive portal user role

eng-user

Captive portal authentication profile

eng-cp
(Specify /auth/englogin.html and enguser)

Initial user role

eng-logon
(Specify the eng-cp profile)

AAA profile

eng-aaa
(Specify the eng-logon user role)

SSID profile

eng-ssid

Virtual AP profile

eng-vap

Business /auth/bus-login.html
bus-user
bus-cp (Specify /auth/buslogin.html and bususer)
bus-logon (Specify the bus-cp profile)
bus-aaa (Specify the bus-logon user role)
bus-ssid
bus-vap

Faculty /auth/fac-login.html
fac-user
fac-cp (Specify /auth/buslogin.html and facuser)
fac-logon (Specify the fac-logon profile)
fac-aaa (Specify the fac-logon user role)
fac-ssid
fac-vap

Changing the Protocol to HTTP
By default, the HTTPS protocol is used on redirection to the Captive Portal page. If you need to use HTTP instead, you need to do the following:
l Modify the captive portal authentication profile to enable the HTTP protocol. l For captive portal with role-based access only--Modify the captiveportal policy to permit HTTP traffic
instead of HTTPS traffic.
In the base operating system, the implicit ACL captive-portal-profile is automatically modified.
To change the protocol to HTTP via the WebUI:
1. Edit the captive portal authentication profile by navigating to the Configuration > Security > Authentication > L3 Authentication page. a. Enable (select) "Use HTTP for authentication". b. Click Apply.

391 | Captive Portal Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

2. (For captive portal with role-based access only) Edit the captiveportal policy by navigating to the Configuration > Security > Access Control > Policies page. a. Delete the rule for "user mswitch svc-https dst-nat". b. Add a new rule with the following values and move this rule to the top of the rules list: l source is user l destination is the mswitch alias l service is svc-http l action is dst-nat c. Click Apply.
To change the protocol to HTTP via the command-line interface, access the CLI in config mode and issue the following commands: (host)(config) #aaa authentication captive-portal profile
protocol-http
(For captive portal with role-based access only) (host)(config) #ip access-list session captiveportal
no user alias mswitch svc-https dst-nat user alias mswitch svc-http dst-nat user any svc-http dst-nat 8080 user any svc-https dst-nat 8081
Configuring Redirection to a Proxy Server
You can configure captive portal to work with proxy Web servers. When proxy Web servers are used, browser proxy server settings for end users are configured for the proxy server's IP address and TCP port. When the user opens a Web browser, the HTTP/S connection request must be redirected from the proxy server to the captive portal on the controller.
To configure captive portal to work with a proxy server:
l (For captive portal with base operating system) Modify the captive portal authentication profile to specify the proxy server's IP address and TCP port.
l (For captive portal with role-based access) Modify the captiveportal policy to have traffic for the proxy server's port destination NATed to port 8088 on the controller.
The base operating system automatically modifies the implicit ACL captive-portal-profile.
The following sections describe how use the WebUI and CLI to configure the captive portal with a proxy server.
When HTTPS traffic is redirected from a proxy server to the controller, the user's browser will display a warning that the subject name on the certificate does not match the hostname to which the user is connecting.

To redirect proxy server traffic using the WebUI:
1. For captive portal with Dell base operating system, edit the captive portal authentication profile by navigating to the Configuration > Security > Authentication > L3 Authentication page. a. For Proxy Server, enter the IP address and port for the proxy server. b. Click Apply.
2. For captive portal with role-based access, edit the captiveportal policy by navigating to the Configuration > Security > Access Control > Policies page.
3. Add a new rule with the following values: a. Source is user b. Destination is any

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Captive Portal Authentication | 392

c. Service is TCP d. Port is the TCP port on the proxy server e. Action is dst-nat f. IP address is the IP address of the proxy port g. Port is the port on the proxy server 4. Click Add to add the rule. Use the up arrows to move this rule just below the rule that allows HTTP(S) traffic. 5. Click Apply. To redirect proxy server traffic via the command-line interface, access the CLI in config mode and issue the following commands. For captive portal with Dell base operating system: (host)(config) #aaa authentication captive-portal profile proxy host ipaddr port port For captive portal with role-based access: (host)(config) #ip access-list session captiveportal user alias mswitch svc-https permit user any tcp port dst-nat 8088 user any svc-http dst-nat 8080 user any svc-https dst-nat 8081
Redirecting Clients on Different VLANs
You can redirect wireless clients that are on different VLANs (from the controller's IP address) to the captive portal on the controller. To do this: 1. Specify the redirect address for the captive portal. 2. For captive portal with the PEFNG license only, you need to modify the captiveportal policy that is assigned
to the user. To do this: a. Create a network destination alias to the controller interface. b. Modify the rule set to allow HTTPS to the new alias instead of the mswitch alias.
In the base operating system, the implicit ACL captive-portal-profile is automatically modified.
This example shows how to use the command-line interface to create a network destination called cp-redirect and use that in the captiveportal policy: (host)(config) #ip cp-redirect-address ipaddr For captive portal with PEFNG license: (host)(config) #netdestination cp-redirect ipaddr (host)(config) #ip access-list session captiveportal
user alias cp-redirect svc-https permit user any svc-http dst-nat 8080 user any svc-https dst-nat 8081
Web Client Configuration with Proxy Script
If the web client proxy configuration is distributed through a proxy script (a .pac file), you need to configure the captiveportal policy to allow the client to download the file. Note that in order modify the captiveportal policy, you must have the PEFNG license installed in the controller. To allow clients to download proxy script via the WebUI:

393 | Captive Portal Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

1. Edit the captiveportal policy by navigating to the Configuration > Security > Access Control > Policies page.
2. Add a new rule with the following values: n Source is user n Destination is host n Host IP is the IP address of the proxy server n Service is svc-https or svc-http n Action is permit
3. Click Add to add the rule. Use the up arrows to move this rule above the rules that perform destination NAT.
4. Click Apply.
To allow clients to download proxy script via the command-line interface, access the CLI in config mode and issue the following commands:
(host)(config) #ip access-list session captiveportal user alias mswitch svc-https permit user any tcp port dst-nat 8088 user host ipaddr svc-https permit user any svc-http dst-nat 8080 user any svc-https dst-nat 8081
Personalizing the Captive Portal Page
The following can be personalized on the default captive portal page:
l Captive portal background l Page text l Acceptance Use Policy
The background image and text should be visible to users with a browser window on a 1024 by 768 pixel screen. The background should not clash if viewed on a much larger monitor. A good option is to have the background image at 800 by 600 pixels, and set the background color to be compatible. The maximum image size for the background can be around 960 by 720 pixels, as long as the image can be cropped at the bottom and right edges. Leave space on the left side for the login box.
You can create your own web pages and install them in the controller for use with captive portal. See "Internal Captive Portal" on page 265
1. Navigate to the Configuration > Management > Captive Portal > Customize Login Page page. You can choose one of three page designs. To select an existing design, click the first or the second page design present.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Captive Portal Authentication | 394

2. To customize the page background:
a. Select the YOUR CUSTOM BACKGROUND page.
b. Under Additional options, enter the location of the JPEG image in the Upload your own custom background field.
c. Set the background color in the Custom page background color field. The color code must a hexadecimal value in the format #hhhhhh.
d. To view the page background changes, click Submit at the bottom on the page and then click the View CaptivePortal link. The User Agreement Policy page appears and displays the Captive Portal page as it will be seen by users.

395 | Captive Portal Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

3. To customize the captive portal background text: a. Enter the text that needs to be displayed in the Page Text (in HTML format) message box. b. To view the background text changes, click Submitat the bottom on the page and then click the View CaptivePortal link. The User Agreement Policy page appears. c. Click Accept. This displays the Captive Portal page as it will be seen by users.
4. To customize the text under the Acceptable Use Policy: a. Enter the policy information in the Policy Text text box. Use this only in the case of guest logon. b. To view the use policy information changes, click Submitat the bottom on the page and then click the View CaptivePortal link. The User Agreement Policy page appears. The text you entered appears in the Acceptable Use Policy text box. c. Click Accept. This displays the Captive Portal page as it will be seen by users.

Creating and Installing an Internal Captive Portal
If you do not wish to customize the default captive portal page, you can use the following procedures to create and install a new internal captive portal page. This section describes the following topics:
l Creating a New Internal Web Page on page 397 l Installing a New Captive Portal Page on page 398 l Displaying Authentication Error Messages on page 398 l Reverting to the Default Captive Portal on page 399 l Configuring Localization on page 399 l Customizing the Welcome Page on page 402 l Customizing the Pop-Up box on page 403 l Customizing the Logged Out Box on page 404

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Captive Portal Authentication | 396

Creating a New Internal Web Page
In addition to customizing the default captive portal page, you can also create your own internal web page. A custom web page must include an authentication form to authenticate a user. The authentication form can include any of the following variables listed in Table 75:

Table 75: Web Page Authentication Variables

Variable

Description

user

(Required)

password

(Required)

FQDN

The fully-qualified domain name (this is dependent on the setting of the controller and is supported only in Global Catalog Servers software.

The form can use either the "get" or the "post" methods, but the "post" method is recommended. The form's action must absolutely or relatively reference https://<controller_IP>/auth/index.html/u.
You can construct an authentication form using the following HTML: <FORM method="post" ACTION="/auth/index.html/u"> ... </FORM>
A recommended option for the <FORM> element is: autocomplete="off"
This option prevents Internet Explorer from caching the form inputs. The form variables are input using any form control method available such as INPUT, SELECT, TEXTAREA, and BUTTON. Example HTML code follows.

Username Example

Minimal:

<INPUT type="text" name="user">

Recommended Options:

accesskey="u" SIZE="25 VALUE=

Sets the keyboard shortcut to 'u' "Sets the size of the input box to 25
""Ensures no default value

Password Example

Minimal:

<INPUT type="password" name="password">

Recommended Options:

accesskey="p" SIZE="25 VALUE=

Sets the keyboard shortcut to 'p' "Sets the size of the input box to 25
""Ensures no default value

FQDN Example
Minimal:
<SELECT name=fqdn> <OPTION value="fqdn1" SELECTED> <OPTION value="fqdn2">

397 | Captive Portal Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

</SELECT>
Recommended Options: None
Finally, an HTML also requires an input button: <INPUT type="submit">
Basic HTML Example
<HTML> <HEAD> </HEAD> <BODY> <FORM method="post" autocomplete="off" ACTION="/auth/index.html/u">
Username:<BR> <INPUT type="text" name="user" accesskey="u" SIZE="25" VALUE=""> <BR>
Password:<BR> <INPUT type="password" name="password" accesskey="p" SIZE="25"
VALUE=""> <BR>
<INPUT type="submit"> </FORM> </BODY> </HTML>
You can find a more advanced example simply by using your browser's "view-source" function while viewing the default captive portal page.
Installing a New Captive Portal Page
You can install the captive portal page by using the Maintenance function of the WebUI.
Log into the WebUI and navigate to Configuration > Management > Captive Portal > Upload Custom Login Pages.
This page lets you upload your own files to the controller. There are different page types that you can choose:
l Captive Portal Login (top level): This type uploads the file into the controller and sets the captive portal page to reference the file that you are uploading. Use with caution on a production controller as this takes effect immediately.
l Captive Portal Welcome Page: This type uploads the file that appears after logon and before redirection to the web URL. The display of the welcome page can be disabled or enabled in the captive portal profile.
l Content: The content page type allows you to upload all miscellaneous files that you need to reference from your main captive portal login page. This can be used for images, scripts or any other file that you need to reference. These files are uploaded into the same directory as the top level captive portal page and thus all files can be referenced relatively.
Uploaded files can be referenced using: https://<controller_IP>/upload/custom/<CP-Profile-Name>/<file>
Displaying Authentication Error Messages
This section contains a script that performs the following tasks:
l When the user is redirected to the main captive portal login when there is authentication failure, the redirect URL includes a query parameter "errmsg" which java script can extract and display.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Captive Portal Authentication | 398

l Store the originally requested URL in a cookie so that once the user has authenticated, they are automatically redirected to its original page. Note that for this feature to work, you need ArubaOS release 2.4.2.0 or later. If you don't want this feature, delete the part of the script shown in red. <script> { function createCookie(name,value,days) { if (days) { var date = new Date(); date.setTime(date.getTime()+(days*24*60*60*1000)); var expires = "; expires="+date.toGMTString(); } else var expires = ""; document.cookie = name+"="+value+expires+"; path=/"; } var q = window.location.search; var errmsg = null;
if (q && q.length > 1) { q = q.substring(1).split(/[=&]/); for (var i = 0; i < q.length - 1; i += 2) { if (q[i] == "errmsg") { errmsg = unescape(q[i + 1]); break; } if (q[i] == "host") { createCookie('url',unescape(q[i+1]),0) } }
}
if (errmsg && errmsg.length > 0) { errmsg = "<div id='errorbox'>\n" + errmsg + "\n</div>\n"; document.write(errmsg);
} } </script>
Reverting to the Default Captive Portal
You can reassign the default captive portal site using the "Revert to factory default settings" check box in the "Upload Custom Login Pages" section of the Maintenance tab in the WebUI.
Configuring Localization
The ability to customize the internal captive portal provides you with a very flexible interface to the Dell captive portal system. However, other than posting site-specific messages onto the captive portal website, the most common type of customization is likely to be language localization. This section describes a simple method for creating a native language captive portal implementation using the Dell internal captive portal system.
1. Customize the configurable parts of the captive portal settings to your liking. To do this, navigate to the Configuration > Management > Captive Portal > Customize Login Page in the WebUI:
For example, choose a page design, upload a custom logo and/or a custom background. Also include any page text and acceptable use policy that you would like to include. Put this in your target language or else you will need to translate this at a later time.
Ensure that Guest login is enabled or disabled as necessary by navigating to the Configuration > Security > Authentication > L3 Authentication > Captive Portal Authentication Profile page to create or

399 | Captive Portal Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

edit the captive portal profile. Select or deselect "Guest Login". 2. Click Submit and then click on View Captive Portal. Check that your customization and text/html is
correct, with the default interface still in English and the character set still autodetects to ISO-8859-1. Repeat steps 1 and 2 until you are satisfied with your page. 3. Once you have a page you find acceptable, click on View Captive Portal one more time to display your login page. From your browser, choose "View->Source" or its equivalent. Your system will display the HTML source for the captive portal page. Save this source as a file on your local system. 4. Open the file that you saved in step 3 on page 400, using a standard text editor, and make the following changes: a. Fix the character set. The default <HEAD>...</HEAD> section of the file will appear as: <head> <title>Portal Login</title>
<link href="default1/styles.css" rel="stylesheet" media="screen" type="text/css" /> <script language="javascript" type="text/javascript">
function showPolicy()
{win = window.open("/auth/acceptableusepolicy.html", "policy", "height=550,width=550,scrollbars=1");} </script>
</head> In order to control the character set that the browser will use to show the text with, you will need to insert the following line inside the <HEAD>...</HEAD> element:
<meta http-equiv="Content-Type" content="text/html; charset=Shift_JIS"/> Replace the "Shift_JIS" part of the above line with the character set that is used by your system. In theory, any character encoding that has been registered with IANA can be used, but you must ensure that any text you enter uses this character set and that your target browsers support the required character set encoding.
b. The final <HEAD>...</HEAD> portion of the document should look similar to this: <head> <meta http-equiv="Content-Type" content="text/html; charset=Shift_JIS"/> <title>Portal Login</title>
<link href="default1/styles.css" rel="stylesheet" media="screen" type="text/css" /> <script language="javascript" type="text/javascript">
function showPolicy() {win = window.open("/auth/acceptableusepolicy.html", "policy",
"height=550,width=550,scrollbars=1");}
</script> </head> c. Fix references: If you have used the built-in preferences, you will need to update the reference for the
logo image and the CSS style sheet. To update the CSS reference, search the text for "<link href" and update the reference to include "/auth/" in front of the reference. The original link should look similar to the following: <link href="default1/styles.css" rel="stylesheet" media="screen" type="text/css" /> This should be replaced with a link like the following: <link href="/auth/default1/styles.css" rel="stylesheet" media="screen" type="text/css" /> The easiest way to update the image reference is to search for "src" using your text editor and updating the reference to include "/auth/" in front of the image file. The original link should look similar to the following: <img src="default1/logo.gif"/>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Captive Portal Authentication | 400

This should be replaced with a link like this: <img src="/auth/default1/logo.gif"/>
d. Insert javascript to handle error cases:
When the controller detects an error situation, it will pass the user's page a variable called "errmsg" with a value of what the error is in English. Currently, only "Authentication Failed" is supported as a valid error message.
To localize the authentication failure message, replace the following text (it is just a few lines below the <body> tag): <div id="errorbox" style="display: none;"> </div>
with the script below. You will need to translate the "Authentication Failed" error message into your local language and add it into the script below where it states: localized_msg="...": <script> { var q = window.location.search; var errmsg = null; if (q && q.length > 1) {
q = q.substring(1).split(/[=&]/); for (var i = 0; i < q.length - 1; i += 2) {
if (q[i] == "errmsg") { errmsg = unescape(q[i + 1]); break;
} } }
if (errmsg && errmsg.length > 0) { switch(errmsg) { case "Authentication Failed": localized_msg="Authentication Failed"; break; default: localised_msg=errmsg; break; } errmsg = "<div id='errorbox'>\n" + localised_msg + "\n</div>\n"; document.write(errmsg);
}; } </script>

e. Translate the web page text. Once you have made the changes as above, you only need to translate the rest of the text that appears on the page. The exact text that appears will depend on the controller settings when you originally viewed the captive portal. You will need to translate all relevant text such as "REGISTERED USER", "USERNAME", "PASSWORD", the value="" part of the INPUT type="submit" button and all other text. Ensure that the character set you use to translate into is the same as you have selected in part i) above.
Feel free to edit the HTML as you go if you are familiar with HTML.
5. After saving the changes made in step 4 above, upload the file to the controller using the Configuration > Management > Captive Portal > Upload Custom Login Pages section of the WebUI.
Choose the captive portal profile from the drop-down menu. Browse your local computer for the file you saved. For Page Type, select "Captive Portal Login". Ensure that the "Revert to factory default settings" box is NOT checked and click Apply. This will upload the file to the controller and set the captive portal profile to use this page as the redirection page.

401 | Captive Portal Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In order to check that your site is operating correctly, go back to the "Customize Login Page" and click on "View Captive Portal" to view the page you have uploaded. Check that your browser has automatically detected the character set and that your text is not garbled. To make any adjustments to your page, edit your file locally and simply re-upload to the controller in order to view the page again. 6. Finally, it is possible to customize the welcome page on the controller, however for language localization it is recommended to use an "external welcome page" instead. This can be a web site on an external server, or it can be a static page that is uploaded to a controller. You set the welcome page in the captive portal authentication profile. This is the page that the user will be redirected to after successful authentication. If this is required to be a page on the controller, the user needs to create their own web page (using the charset meta attribute in step 4 above). Upload this page to the designated controller in the same manner as uploading the captive portal login page under "Configuration > Management > Captive Portal > Upload Custom Login Pages. For Page Type, select "Captive Portal Welcome Page". Any required client side script (CSS) and media files can also be uploaded using the "Content" Page Type, however file space is limited (use the CLI command show storage to see available space). Remember to leave ample room for system files.
The "Registered User" and "Guest User" sections of the login page are implemented as graphics files, referenced by the default CSS styles. In order to change these, you will need to create new graphic files, download the CSS file, edit the reference to the graphics files, change the style reference in your index file and then upload all files as "content" to the controller.
A sample of a translated page is displayed in Figure 55.
Figure 55 Sample Translated Page
Customizing the Welcome Page
Once a user is authenticated by the controller, a Welcome page is launched. The default welcome page depends on your configuration, but will look similar to Figure 56:
Figure 56 Default Welcome Page

You can customize this welcome page by building your own HTML page and uploading it to the controller. You upload it to the controller by navigating to Management > Captive Portal > Upload Login Pagesand select

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Captive Portal Authentication | 402

"Captive Portal Welcome Page" from the Page Type drop-down menu. This file is stored in a directory called "/upload/" on the controller using the file's original name.
In order to actually use this file, you will need to configure the welcome page on the controller. To do this use the CLI command: "aaa captive-portal welcome-page /upload/welc.html" where "welc.html" is the name of the file that you uploaded, or you can change the Welcome page in the captive portal authentication profile in the WebUI.
An example that will create the same page as displayed in Figure 56 is shown below. The part in red will redirect the user to the web page you originally setup. For this to work, please follow the procedure described above in this document.
:
<html> <head> <script> {
function readCookie(name) {
var nameEQ = name + "="; var ca = document.cookie.split(';'); for(var i=0;i < ca.length;i++) {
var c = ca[i]; while (c.charAt(0)==' ') c = c.substring(1,c.length); if (c.indexOf(nameEQ) == 0) return c.substring (nameEQ.length,c.length); } return null; } var cookieval = readCookie('url'); if (cookieval.length>0) document.write("<meta http-equiv=\"refresh\" content=\"2;url=http://"+cookieval+"\""+">"); } </script> </head> <body bgcolor=white text=000000> <font face="Verdana, Arial, Helvetica, sans-serif" size=+1> <b>User Authenticated </b>
<p>In 2 seconds you will be automatically redirected to your original web page</p> <p> Press control-d to bookmark this page.</p>
<FORM ACTION="/auth/logout.html"> <INPUT type="submit" name="logout" value="Logout">
</FORM> </font> </body> </html>
Customizing the Pop-Up box
In order to customize the Pop-Up box, you must first customize your Welcome page. Once you have customized your welcome page, then you can configure your custom page to use a pop-up box. The default HTML for the pop-up box is:
<html> <body bgcolor=white text=000000> <font face="Verdana, Arial, Helvetica, sans-serif" size=+1>
<b>Logout</b></font>

403 | Captive Portal Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

<p> <a href="/auth/logout.html"> Click to Logout </a>
</body> </html>
If you wish your users to be able to logout using this pop-up box, then you must include a reference to /auth/logout.html Once a user accesses this URL then the controller will log them out. It is easiest to simply edit the above HTML to suit your users and then upload the resulting file to the controller using the WebUI under Configuration > Management > Captive Portal > Upload custom pages and choose "content" as the page type.
Once you have completed your HTML, then you must get the clients to create the pop-up box once they have logged into the controller. This is done by inserting the following code into your welcome page text and reuploading the welcome page text to your controller.
Common things to change:
l URL: set the URL to be the name of the pop-up HTML file that you created and uploaded. This should be preceded by "/upload/".
l Width: set w to be the required width of the pop-up box. l Height: set h to be the required height of the pop-up box. l Title: set the second parameter in the window.open command to be the title of the pop-up box. Be sure to
include the quotes as shown: <script language="JavaScript">
var url="/upload/popup.html"; var w=210; var h=80; var x=window.screen.width - w - 20; var y=window.screen.height - h - 60; window.open(url, 'logout', "toolbar=no,location=no,width="+w+",height="+h+",top="+y+",left="+x+",screenX="+x+",screenY ="+y); </script>
Customizing the Logged Out Box
In order to customize the Logged Out box, you must first customize your Welcome page and also your Pop-Up box. To customize the message that occurs after you have logged out then you need to replace the URL that the pop-up box will access in order to log out with your own HTML file.
First you must write the HTML web page that will actually log out the user and will also display page that you wish. An example page is shown below. The key part that must be included is the <iframe>..</iframe> section. This is the part of the HTML that actually does the user logging out. The logout is always performed by the client accessing the /auth/logout.html file on the controller and so it is hidden in the html page here in order to get the client to access this page and for the controller to update its authentication status. If a client does not support the iframe tag, then the text between the <iframe> and the </iframe> is used. This is simply a 0 pixel sized image file that references /auth/logout.html. Either method should allow the client to logout from the controller.
Everything else can be customized.
<html> <body bgcolor=white text=000000>
<iframe src='/auth/logout.html' width=0 height=0 frameborder=0><img src=/auth/logout.html width=0 height=0></iframe>
<P><font face="Verdana, Arial, Helvetica, sans-serif" size=+1> You have now logged out.</font></P>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Captive Portal Authentication | 404

<form> <input type="button" onclick="window.close()" name="close" value="Close Window"></form>
</body> </html>
After writing your own HTML, then you need to ensure that your customized pop-up box will access your new logged out file. In the pop-up box example above, you simply replace the "/auth/logout.html" with your own file that you upload to the controller. For example, if your customized logout HTML is stored in a file called "loggedout.html" then your "pop-up.html" file should reference it like this:
<html> <body bgcolor=white text=000000> <font face="Verdana, Arial, Helvetica, sans-serif" size=+1>
<b>Logout</b></font> <p>
<a href="/upload/loggedout.html"> Click to Logout </a> </body> </html>
Creating Walled Garden Access
On the Internet, a walled garden typically controls a user's access to web content and services. The walled garden directs the user's navigation within particular areas to allow access to a selection of websites or prevent access to other websites.
The Walled Garden feature can be used with the PEFNG or PEFV licenses.
Walled garden access is needed when an external or internal captive portal is used. A common example could be a hotel environment where unauthenticated users are allowed to navigate to a designated login page (for example, a hotel website) and all its contents. Users who do not sign up for Internet service can view "allowed" websites (typically hotel property websites). The website names must be DNS-based (not IP address based) and support the option to define wildcards. HTTP or HTTPS proxy does not work when walled garden is implemented as a user-role using domain name ACL. For example, user alias example.com any permit. When a user attempts to navigate to other websites not configured in the white list walled garden profile, the user is redirected back to the login page. In addition, the black listed walled garden profile is configured to explicitly block navigation to websites from unauthenticated users.
In the WebUI
1. Navigate to Advanced Services > Stateful Firewall > Destination. 2. Click Add to add a destination name. 3. Select the controller IP version, IPv4 or IPv6, from the IP Versiondrop-down menu. 4. In the Destination Name field, enter a name and click Add. 5. Select namefrom the Rule Type drop-down menu and add a hostname or wildcard with domain name to
which an unauthenticated user is redirected. 6. Click Apply. 7. Navigate to Configuration > Security > Authentication > L3 Authentication. 8. Select Captive Portal Authentication Profile.

405 | Captive Portal Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

9. To allow users to access a domain, enter the destination name that contains the allowed domain names in the White List field. This stops unauthenticated users from viewing specific domains such as a hotel website. A rule in the white list must explicitly permit a traffic session before it is forwarded to the controller. The last rule in the white list denies everything else.
10.To deny users access to a domain, enter the destination name that contains prohibited domain names in the Black List field. This prevents unauthenticated users from viewing specific websites.
11.Click Apply.
In the CLI
This example configures a destination named Mywhite-list and adds the domain names, example.com and example.net to that destination. It then adds the destination name Mywhite-list (which contains the allowed domain names example.com and example.net) to the white list.
(host)(config)# netdestination "Mywhite-list" (host)(config)#name example.com (host)(config)#name example.net
(host) (config) #aaa authentication captive-portal default (host)(Captive Portal Authentication Profile "default")#white-list Mywhite-list

Enabling Captive Portal Enhancements
ArubaOS introduces the following enhancements in Captive Portal:
l Location information such as AP name and AP group name have been included in the Captive Portal redirect URL. The following example shows a Captive Portal redirect URL that contains the AP name and the AP group name:
https://securelogin.example.com/cgibin/login?cmd=login&mac=00:24:d7:ed:84:14&ip=10.15.104.13&essid=example-testtunnel&apname=ap135&apgroup=example&url=http%3A%2F%2Fwww%2Eespncricinfo%2Ecom%2F
l A new option redirect-url is introduced in the Captive Portal Authentication profile which allows you to redirect the users to a specific URL after the authentication is complete.
l Captive Portal Login URL length has been increased from 256 characters to 2048 characters. l Support for "?" (question mark) inside the Captive Portal login URL has been added. l A new field, description has been introduced in the netdestination and netdestination6 commands to
provide a description about the netdestination up to 128 characters long. l Support for configuring Whitelist in Captive Portal has been introduced. l Support for bypassing Captive Portal landing page has been introduced.
The Captive Portal enhancements are available on Tunnel and Split-Tunnel forwarding modes.
Configuring the Redirect-URL
You can configure the Captive Portal redirect URL using the following commands: (host) (config) # aaa authentication captive-portal REDIRECT (host) (Captive Portal Authentication Profile "REDIRECT") #redirect-url <absolute-URL>
Example: (host) (config) # aaa authentication captive-portal REDIRECT (host) (Captive Portal Authentication Profile "REDIRECT") #redirect-url https://test-login.php

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Captive Portal Authentication | 406

Configuring the Login URL
You can configure a Captive Portal login URL up to 2048 characters using the following commands:
(host) (config) # aaa authentication captive-portal LOGIN (host) (Captive Portal Authentication Profile "LOGIN")#login-page "http://10.17.36.100/login.php?isinit=1&mac=00:11:22:33:44:55&loginURL=https://captiveportallogin.test.aero/auth/index.html&originalURL=&statusURL=&error=&logginIn"
You can configure the login URL with "?" (question mark) character in it provided the URL containing the question mark is within the double quotes.

Defining Netdestination Descriptions
You can provide a description (up to 128 characters) for the netdestination using the CLI. Use the following commands to provide description for an IPv4 netdestination: (host) (config) #netdestination Local-Server (host) (config-dest) #description "This is a local server for IPv4 client registration" Use the following commands to provide description for an IPv6 netdestination: (host) (config) #netdestination6 Local-Server6 (host) (config-dest) #description "This is a local server for IPv6 client registration" The following command displays the details of the specified IPv4 netdestination: (host) (config-dest) #show netdestination Local-Server

Local-Server Description: This is a local server for IPv4 client registration

-------------------------------------------------------------------------------

Position Type IP addr Mask-Len/Range

-------- ---- ------- --------------

1

name 0.0.0.1 yahoomail

2

name 0.0.0.2 mycorp

3

name 0.0.0.3 cricinfo

The following command displays the details of the specified IPv6 netdestination:

(host) (config-dest) #show netdestination Local-Server6

Local-Server6 Description: This is a local server for IPv6 client registration

-------------------------------------------------------------------------------

Position Type IP addr Mask-Len/Range

-------- ---- ------- --------------

1

name 0.0.0.1 yahoomail

2

name 0.0.0.2 mycorp

3

name 0.0.0.3 cricinfo

Configuring a Whitelist
You can now configure a Whitelist in Captive Portal using the CLI.
Configuring the Netdestination for a Whitelist:
Use the following commands to configure a netdestination alias for Whitelist: (host) (config) #netdestination whitelist (host) (config-dest) #description guest_whitelist (host) (config-dest) #name mycorp
Associating a Whitelist to Captive Portal Profile
Use the following CLI commands to associate a whitelist to the Captive profile: (host) (config) #aaa authentication captive-portal CP_Profile

407 | Captive Portal Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

(host) (Captive Portal Authentication Profile "CP_Profile") #white-list whitelist

Applying a Captive Portal Profile to a User-Role
Use the following commands to apply the Captive Portal profile to a user-role:
(host) (config) # user-role guest_role (host) (config-role) #session-acl logon-control (host) (config-role) #session-acl captiveportal (host) (config-role) #captive-portal CP_Profile

Verifying a Whitelist Configuration
Use the following commands to verify the whitelist alias: (host) (config) #show netdestination whitelist

whitelist Description: guest_whitelist

--------------------------------------

Position Type IP addr Mask-Len/Range

-------- ---- ------- --------------

1

name 0.0.0.6 mycorp

Verifying a Captive Portal Profile Linked to a Whitelist
Use the following commands to verify the Captive Portal profile linked to the whitelist: (host) (config) #show aaa authentication captive-portal CP_Profile

Captive Portal Authentication Profile "CP_Profile"

-----------------------------------------------------------------

Parameter

Value

---------

-----

Default Role

guest

Default Guest Role

guest

Server Group

default

Redirect Pause

10 sec

User Login

Enabled

Guest Login

Disabled

Logout popup window

Enabled

Use HTTP for authentication

Disabled

Logon wait minimum wait

5 sec

Logon wait maximum wait

10 sec

logon wait CPU utilization threshold

60 %

Max Authentication failures

0

Show FQDN

Disabled

Use CHAP (non-standard)

Disabled

Login page

/auth/index.html

Welcome page

/auth/welcome.html

Show Welcome Page

Yes

Add switch IP address in the redirection URL

Disabled

Adding user vlan in redirection URL

Disabled

Add a controller interface in the redirection URL N/A

Allow only one active user session

Disabled

White List

whitelist

Black List

N/A

Show the acceptable use policy page

Disabled

Redirect URL

N/A

Verifying Dynamic ACLs for a Whitelist
Use the following commands to verify the dynamically created ACLs for the whitelist: (host) (config) #show rights guest_role

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Captive Portal Authentication | 408

Derived Role = 'guest_role' Up BW:No Limit Down BW:No Limit L2TP Pool = default-l2tp-pool PPTP Pool = default-pptp-pool Periodic reauthentication: Disabled ACL Number = 79/0 Max Sessions = 65535 Captive Portal profile = CP_Profile

access-list List

----------------

Position Name

Location

-------- ----

--------

1

CP_Profile_list_operations

2

logon-control

3

captiveportal

CP_Profile_list_operations

-----------------------------------------

Priority Source Destination Service Action TimeRange Log Expired Queue TOS 8021P

Blacklist Mirror DisScan ClassifyMedia IPv4/6

-------- ------ ----------- ------- ------ --------- --- ------- ----- --- -----

--------- ------ ------- ------------- ------

1

user whitelist svc-http permit

Low

4

2

user whitelist svc-https permit

Low

4

logon-control

-------------

Priority Source Destination Service Action TimeRange Log Expired Queue TOS 8021P

Blacklist Mirror DisScan ClassifyMedia IPv4/6

-------- ------ ----------- ------- ------ --------- --- ------- ----- --- ----- -

-------- ------ ------- ------------- ------

1

user any

udp 68 deny

Low

4

2

any

any

svc-icmp permit

Low

4

3

any

any

svc-dns permit

Low

4

4

any

any

svc-dhcp permit

Low

4

5

any

any

svc-natt permit

Low

4

captiveportal

-------------

Priority Source Destination Service

Action

TimeRange Log Expired Queue

TOS 8021P Blacklist Mirror DisScan ClassifyMedia IPv4/6

-------- ------ ----------- -------

------

--------- --- ------- -----

--- ----- --------- ------ ------- ------------- ------

1

user controller svc-https

dst-nat 8081

Low

4

2

user any

svc-http

dst-nat 8080

Low

4

3

user any

svc-https

dst-nat 8081

Low

4

4

user any

svc-http-proxy1 dst-nat 8088

Low

4

5

user any

svc-http-proxy2 dst-nat 8088

Low

4

6

user any

svc-http-proxy3 dst-nat 8088

Low

4

Expired Policies (due to time constraints) = 0

409 | Captive Portal Authentication

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Verifying DNS Resolved IP Addresses for Whitelisted URLs
Use the following command to verify the DNS resolved IP addresses for the whitelisted URLs: (host) #show firewall dns-names ap-name <AP-name> Example: (host) #show firewall dns-names ap-name ap135

Firewall DNS names

------------------

Index

Name

-----

----

0

bugzilla

1

cricinfo

2

yahoo

3

mycorp

Id

Num-IP

List

--

------

----

10

1 0.0.0.0

9

0

1

0

6

1 1.1.1.1

Bypassing Captive Portal Landing Page
An increasing number of user sessions in Captive Portal pre-authenticated role, repeatedly request the Captive Portal login page from the controller. this impacts the number of browser-based user login requests handled per second by the controller. This eventually delays the loading of the Captive Portal page and logging into Captive Portal. Most of the increased activities are from non-browser based applications running on smart phones and tablets.
When this feature is enabled, the controller sends 200 OK status code message to the now-browser based apps so that the apps stop sending repeated requests to the controller. This reduces the load of the httpd process on the controller. This feature is enabled by default.
You can disable this feature from the controller CLI. On disabling this feature, non-browser apps continue to request Captive Portal login page from the controller. This increases the load of the httpd process of the controller.
(host) (config) #web-server profile (host) (Web Server Configuration) #bypass-cp-landing-page

The landing page contains the meta-refresh tag to reload the page using real browser applications.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Captive Portal Authentication | 410

Chapter 16 Virtual Private Networks

Wireless networks can use virtual private network (VPN) connections to further secure wireless data from attackers. The Dell controller can be used as a VPN concentrator that terminates all VPN connections from both wired and wireless clients.
This chapter describes the following topics:
l Planning a VPN Configuration on page 411 l Working with VPN Authentication Profiles on page 414 l Configuring a Basic VPN for L2TP/IPsec in the WebUI on page 416 l Configuring a VPN for L2TP/IPsec with IKEv2 in the WebUI on page 421 l Configuring a VPN for Smart Card Clients on page 425 l Configuring a VPN for Clients with User Passwords on page 426 l Configuring Remote Access VPNs for XAuth on page 427 l Working with Remote Access VPNs for PPTP on page 428 l Working with Site-to-Site VPNs on page 429 l Working with VPN Dialer on page 435
Planning a VPN Configuration
You can configure the controller for the following types of VPNs:
l Remote access VPNs: These VPNs allow hosts such as telecommuters or traveling employees to connect to private networks (e.g. a corporate network) over the Internet. Each host must run VPN client software, which encapsulates and encrypts traffic, then sends it to a VPN gateway at the destination network. The controller supports the following remote access VPN protocols: n Layer-2 Tunneling Protocol over IPsec (L2TP/IPsec) n Point-to-Point Tunneling Protocol (PPTP) n XAUTH IKE/IPsec n IKEv2 with Certificates n IKEv2 with EAP
l Site-to-site VPNs: Site-to-site VPNs allow networks, like branch office networks, to connect to other networks like a corporate network. Unlike a remote access VPN, hosts in a site-to-site VPN do not run VPN client software. All traffic for the other network is sent and received through a VPN gateway, which encapsulates and encrypts the traffic.
Before enabling VPN authentication, you must configure the following:
l The default user role for authenticated VPN clients. See Roles and Policies on page 438 for information about configuring user roles.
l The authentication server group used by the controller to validate clients. See Authentication Servers on page 249 for configuration details.
A server-derived role, if present, takes precedence over the default user role.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Virtual Private Networks | 411

You then specify the default user role and authentication server group in the VPN authentication default profile, as described in the sections below.
ESP Tunnel Mode is the only supported IPsec mode of operation. ArubaOS does not support AH and Transport modes.
Selecting an IKE protocol
Controllers running ArubaOS version 6.1 and later support both IKEv1 and the newer IKEv2 protocol to establish IPsec tunnels. Though both IKEv1 and IKEv2 support the same suite-B cryptographic algorithms, IKEv2 is a simpler, faster, and more reliable protocol than IKEv1. If your IKE policy uses IKEv2, you should be aware of the following caveats when you configure your VPN: l ArubaOS does not support separate pre-shared keys for both directions of an exchange; both peers must
use the same pre-shared key. ArubaOS does not support mixed authentication with both pre-shared keys and certificates; each authentication exchange requires a single authentication type. For example, if a client authenticates with a pre-shared key, the controller must also authenticate with a pre-shared key. l ArubaOS does not support IKEv2 Authentication Headers (AH) or IP Payload Compression Protocol (IPComp).
Understanding Suite-B Encryption Licensing
Dell controllers support Suite-B cryptographic algorithms when the Advanced Cryptography (ACR) license is installed. Table 76 describes the Suite-B algorithms supported by ArubaOS IKE Policies and IPsec tunnels. For further details on configuring a VPN to use Suite-B algorithms, see Configuring a VPN for L2TP/IPsec with IKEv2 in the WebUI on page 421.

Table 76: Suite-B Algorithms Supported by the ACR License

IKE Policies

Suite-B for IPsec tunnels

hash: SHA-256-128, SHA-384-192

Encryption: AES-128-GCM, AES-256-GCM

Diffie-Hellman (DH) Groups: ECP-256, ECP-384

Perfect Forward Secrecy (PFS): ECP-256, ECP384

Pseudo-Random Function (PRF): HMAC_SHA_256,

--

HMAC_SHA_384

Suite-B certificates: ECDSA-256, ECDSA-384

--

The ArubaOS hardware supports IKE Suite-B AES-128-GCM and AES-256-GCM encryption. ArubaOS software performs the IKE Suite-B Diffie-Hellman and Certificate-based signature operations, and hash, PFS, and PRF algorithm functions.
The following VPN clients support Suite-B algorithms when establishing an L2TP/IPsec VPN:

412 | Virtual Private Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 77: Client Support for Suite-B

Client Operating System

Supported Suite-B IKE Authentication

l Windows client
NOTE: Windows client operating system includes Windows XP and later versions.

l IKEv1 Clients using ECDSA Certificates
l IKEv1/IKEv2 Clients using ECDSA Certificates with L2TP/PPP/EAP-TLS certificate user-authentication

Supported Suite-B IPsec Encryption
l AES-128-GCM l AES-256-GCM

The Suite-B algorithms described in Table 76 are also supported by Site-to-Site VPNs between Dell controllers, or between a Dell controller and a server running Windows 2008 or StrongSwan 4.3.
Working with IKEv2 Clients
Not all clients support both the IKEv1 and IKEv2 protocols. Only the clients in Table 78 support IKEv2 with the following authentication types:

Table 78: VPN Clients Supporting IKEv2

Windows Client

StrongSwan 4.3 Client

l Machine authentication with Certificates
l User name password authentication using EAP-MSCHAPv2 or PEAPMSCHAPv2
l User smart-card authentication with EAPTLS / IKEv2
NOTE: Windows clients using IKEv2 do not support preshared key authentication. NOTE: Windows client operating system includes Windows 7 and later versions.

l Machine authentication with Certificates
l User name password authentication using EAPMSCHAPv2
l Suite-B cryptographic algorithms

VIA Client
l Machine authentication with Certificates
l User name password authentication using EAPMSCHAPv2
l EAP-TLS using Microsoft cert repository
NOTE: VIA clients using IKEv2 do not support pre-shared key authentication.

Understanding Supported VPN AAA Deployments
If you want to simultaneously deploy various combinations of a VPN client, RAP-psk, RAP-certs, and CAP on the same controller, see Table 79.
Each row in this table specifies the allowed combinations of AAA servers for simultaneous deployment. Configuration rules include the following:
l RAP-certs can only use LocalDB-AP. l An RAP-psk and RAP-cert can only terminate on the same controller if the RAP VPN profile's AAA server uses
Local-db. l If an RAP-psk is using an external AAA server, the RAP-cert cannot be terminated on the same controller. l Clients can use any type of AAA server, regardless of the RAP/CAP authentication configuration server.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual Private Networks | 413

Table 79: Supported VPN AAA Deployments

VPN Client

RAP psk

External AAA server 1 LocalDB

External AAA server 1 External AAA server 1

External AAA server 1 External AAA server 2

LocalDB

LocalDB

LocalDB

External AAA server 1

RAP certs LocalDB-AP Not supported Not supported LocalDB-AP Not supported

CAP CPSEC-whitelist CPSEC-whitelist CPSEC-whitelist CPSEC-whitelist CPSEC-whitelist

Working with Certificate Groups
The certificate group feature allows you to access multiple types of certificates on the same controller. To create a certificate group, use the following command: (host) (config) #crypto-local isakmp certificate-group server-certificate server_certificate ca-certificate ca_certificate You can view existing certificate groups using: show crypto-local isakmp certificate-group
Working with VPN Authentication Profiles
VPN Authentication profiles identify an authentication server, the server group to which the authentication server belongs, and a user-role for authenticated VPN clients. There are three predefined VPN authentication profiles: default, default-rap, and default-cap. These different profiles allow you to use different authentication servers, user roles, and IP pools for VPN, remote AP, and campus AP clients.
You can configure the default and default-rap profiles, but not the default-cap profile.

414 | Virtual Private Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 80: Predefined Authentication Profile settings

Parameter

Description

Default Role for authenticated users

The role that will be assigned to the authenticated users.

default
default-vpnrole

default-rap default-cap

default-vpnrole

sys-ap-role 0

Maximum allowed authentication failures

The number of contiguous authentication failures before the station is blacklisted.

0 (feature is disabled)

Check certificate common name against AAA server

disabled

Export VPN IP address as a route
User idle timeout

When enabled, this causes any VPN client address to be exported to OSPF using IPC.
NOTE: Note that the Framed-IP-Address attribute is assigned the IP address as long as the any server returns the attribute. The Framed-IPAddress value always has a higher priority than the local address pool.

enabled

The user idle timeout value for this profile. Specify the idle timeout value for the client in seconds. Valid range is 30-15300 in multiples of 30 seconds. Enabling this option overrides the global settings configured in the AAA timers. If this is disabled, the global settings are used.

disabled

PAN firewalls Integration

Requires IP mapping at Palo Alto Networks firewalls.

disabled

0 (feature is disabled) enabled enabled
N/A
disabled

0 (feature is disabled) enabled enabled
N/A
disabled

To edit the default VPN authentication profile:
1. Navigate to the Configuration > Advanced Services > All Profiles > VPN Authentication > default page.
2. In the Profiles list of the left window pane, select the default VPN Authentication Profile.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual Private Networks | 415

3. Click the Default Role drop-down list and select the default user role for authenticated VPN users. (For detailed information on creating and managing user roles and policies, see Roles and Policies on page 438.)
4. (Optional) If you use client certificates for user authentication, select the Check certificate common name against AAA server checkbox to verify that the certificate's common name exists in the server. This parameter is enabled by default in the default-cap and default-rap VPN profiles, and disabled by default on all other VPN profiles.
5. (Optional) Set Max Authentication failures to an integer value. The default value is 0, which disables this feature.
6. (Optional) Regardless of how an authentication server is contacted, the Export VPN IP address as a route option causes any VPN client address to be exported to OSPF using IPC. Note that the Framed-IPAddress attribute is assigned the IP address as long as any server returns the attribute. The Framed-IPAddress value always has a higher priority than the local address pool.
7. (Optional) Enabling PAN firewalls Integration requires IP mapping at Palo Alto Networks firewalls. (For more information about PAN firewall integration, see Palo Alto Networks Firewall Integration on page 714.)
8. Click Apply. 9. In the Default profile menu in the left window pane, select Server Group. 10.From the Server Group drop-down list, select the server group to be used for VPN authentication. 11.Click Apply.
To configure VPN authentication via the command-line interface, access the CLI in config mode and issue the following commands:
(host)(config) #aaa authentication vpn default cert-cn-lookup clone default-role <role> export-route max-authentication-failure <number> pan-integration radius-accounting <server_group_name> server-group <name> user-idle-timeout <seconds>
Configuring a Basic VPN for L2TP/IPsec in the WebUI
The combination of Layer-2 Tunneling Protocol and Internet Protocol Security (L2TP/IPsec) creates a highlysecure technology that enables VPN connections across public networks such as the Internet. L2TP/IPsec provides a logical transport mechanism on which to transmit PPP frames, tunneling, or encapsulation, so that the PPP frames can be sent across an IP network. L2TP/IPsec relies on the PPP connection process to perform user authentication and protocol configuration. With L2TP/IPsec, the user authentication process is encrypted using the Data Encryption Standard (DES) or Triple DES (3DES) algorithm.
L2TP/IPsec using IKEv1 requires two levels of authentication:
l Computer-level authentication with a preshared key to create the IPsec security associations (SAs) to protect the L2TP-encapsulated data.
l User-level authentication through a PPP-based authentication protocol using passwords, SecureID, digital certificates, or smart cards after successful creation of the SAs.
Note that only Windows 7 (and later versions), StrongSwan 4.3, and VIA clients support IKEv2. For additional information on the authentication types supported by these clients, see Working with IKEv2 Clients on page 413.

416 | Virtual Private Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Use the following procedures in the WebUI to configure a remote access VPN for L2TP IPsec for clients using pre-shared keys, certificates, or EAP for authentication: l Defining Authentication Method and Server Addresses on page 421 l Defining Address Pools on page 421 l Enabling Source NAT on page 421 l Selecting Certificates on page 422 l Defining IKEv1 Shared Keys on page 418 l Configuring IKE Policies on page 422 l Setting the IPsec Dynamic Map on page 423 l Finalizing WebUI changes on page 424
Defining Authentication Method and Server Addresses
1. Define the authentication method and server addresses. 2. Navigate to Configuration > Advanced Services > VPN Services and click on the IPSEC tab. 3. To enable L2TP, select Enable L2TP (this is enabled by default). 4. Select the authentication method for IKEv1 clients. Currently supported methods include:
n Password Authentication Protocol (PAP) n Extensible Authentication Protocol (EAP) n Challenge Handshake Authentication Protocol (CHAP) n Microsoft Challenge Handshake Authentication Protocol (MSCHAP) 5. Configure the IP addresses of the primary and secondary Domain Name System (DNS) servers and the primary and secondary Windows Internet Naming Service (WINS) Server that are pushed to the VPN client.
Defining Address Pools
Next, define the pool from which the clients are assigned addresses: 1. In the Address Pools section of the IPSEC tab, click Add to open the Add Address Pool page. 2. Specify the pool name, start address, and end address. 3. Click Done.
RADIUS Framed-IP-Address for VPN Clients IP addresses are usually assigned to VPN clients from configured local address pools. However, the Framed-IPAddress attribute that is returned from a RADIUS server can be used to assign the address. VPN clients use different mechanisms to establish VPN connections with the controller, such as IKEv1, IKEv2, EAP, or a user certificate. Regardless of how the RADIUS server is contacted for authentication, the Framed-IPAddress attribute is assigned the IP address as long as the RADIUS server returns the attribute. The Framed-IPAddress value always has a higher priority than the local address pool.
Enabling Source NAT
In the Source NAT section of the IPSEC tab, select Enable Source NAT if the IP addresses of clients must be translated to access the network. If you enabled source NAT, click the NAT pool drop-down list and select an existing NAT pool. If you have not yet created the NAT pool you want to use: 1. Navigate to Configuration > IP > NAT Pools. 2. Click Add. 3. In the Pool Name field, enter a name for the new NAT pool, up to 63 alphanumeric characters.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual Private Networks | 417

4. In the Start IP address field, enter the dotted-decimal IP address that defines the beginning of the range of source NAT addresses in the pool.
5. In the End IP address field, enter the dotted-decimal IP address that defines the end of the range of source NAT addresses in the pool.
6. In the Destination NAT IP Address field, enter the destination NAT IP address in dotted-decimal format. If you do not enter an address into this field, the NAT pool will use the destination NAT IP 0.0.0.0.
7. Click Done. 8. Navigate to Configuration > Advanced Services > VPN Services and click the IPSEC tab to return to the
IPsec window. 9. Click the NAT Pool drop-down list and select the NAT pool you just created.
Selecting Certificates
If you are configuring a VPN to support machine authentication using certificates, define the IKE Server certificates for VPN clients using IKE. Note that these certificates must be imported into the controller, as described in Management Access on page 860.
1. Select the server certificate for client machines using IKE by clicking the IKE Server Certificate drop-down list and selecting an available certificate name.
2. If you are configuring a VPN to support clients using certificates, you must also assign one or more trusted CA certificates to VPN clients. a. Under CA Certificate Assigned for VPN-clients, click Add. b. Select a CA certificate from the drop-down list of CA certificates imported in the controller. c. Click Done. d. Repeat the above steps to add additional CA certificates.
Defining IKEv1 Shared Keys
If you are configuring a VPN to support IKEv1 and clients using pre-shared keys, you can configure a global IKE key or IKE key for each subnet. Make sure that this key matches the key on the client.
1. In the IKE Shared Secrets section of the IPsec tab, click Add to open the Add IKE Secret page. 2. Enter the subnet and subnet mask. To make the IKE key global, specify 0.0.0.0 for both values. 3. Enter the IKE Shared Secret and Verify IKE Shared Secret. 4. Click Done.
Configuring IKE Policies
ArubaOS contains several predefined default IKE policies, as described in Table 81. If you do not want to use any of these predefined policies, you can use the procedures below to edit an existing policy or create your own custom IKE policy instead.
The IKE policy selections, along with any preshared key, must be reflected in the VPN client configuration. When using a third-party VPN client, set the VPN configuration on clients to match the choices made above. In case the Dell dialer is used, these configurations must be made on the dialer prior to downloading the dialer onto the local client.
1. Scroll down to the IKE Policies section of the IPSEC tab, then click Edit to edit an existing policy or click Add to create a new policy.
2. Enter a number into the Priority field to set the priority for this policy. Enter a priority of 1 for the configuration to take priority over the Default setting.
3. Select the IKE version. Click the Version drop-down list and select V1 for IKEv1 or V2 for IKEv2.

418 | Virtual Private Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

4. Set the Encryption type. Click the Encryption drop-down list and select one of the following encryption types: l DES l 3DES l AES128 l AES192 l AES256
5. Set the HASH function. Click the Hash drop-down list and select one of the following hash types: l MD5 l SHA l SHA1-96 l SHA2-256-128 l SHA2-384-192
6. ArubaOS VPNs support client authentication using pre-shared keys, RSA digital certificates, or Elliptic Curve Digital Signature Algorithm (ECDSA) certificates. To set the authentication type for the IKE rule, click the Authentication drop-down list and select one of the following: l Pre-Share (for IKEv1 clients using pre-shared keys) l RSA (for clients using certificates) l ECDSA-256 (for clients using certificates) l ECDSA-384 (for clients using certificates)
7. Diffie-Hellman is a key agreement algorithm that allows two parties to agree upon a shared secret, and is used within IKE to securely establish session keys. To set the Diffie­Hellman Group for the ISAKMP policy, click the Diffi­Hellman Group drop-down list and select one of the following groups: l Group 1: 768-bit Diffie­Hellman prime modulus group. l Group 2: 1024-bit Diffie­Hellman prime modulus group. l Group 14: 2048-bit Diffie­Hellman prime modulus group. l Group 19: 256-bit random Diffie­Hellman ECP modulus group. l Group 20: 384-bit random Diffie­Hellman ECP modulus group.
Configuring Diffie­Hellman Group 1 and Group 2 types are not permitted if the controller is operating in FIPS mode.
8. Set the Security Association Lifetime to define the lifetime of the security association in seconds. The default value is 7200 seconds. To change this value, uncheck the default checkbox and enter a value between 300 and 86400 seconds.
9. Click Done.
Setting the IPsec Dynamic Map
Dynamic maps enable IPsec SA negotiations from dynamically addressed IPsec peers. ArubaOS has a predefined IPsec dynamic map for IKEv1. If you do not want to use this predefined map, you can use the procedures below to edit an existing map or create your own custom IPsec dynamic map instead.
1. Scroll down to the IPsec Dynamic Map section of the IPSEC tab, then click Edit by a map name to edit the existing map or click Add to create a new map.
2. In the Name field, enter a name for the dynamic map.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual Private Networks | 419

3. In the Priority field, enter a priority number for the map. Negotiation requests for security associations try to match the highest-priority map first. If that map does not match, the negotiation request continues down the list to the next-highest priority map until a match is made.
4. Click the Version drop-down list and select V1 to create an IPsec map for remote peers using IKEv1. 5. (Optional) Configure Perfect Forward Secrecy (PFS) settings for the dynamic peer by assigning a Diffie-
Hellman prime modulus group. PFS provides an additional level of security by ensuring that the IPsec SA key was not derived from any other key, and therefore, cannot be compromised if another key is broken. Click the Set PFS drop-down list and select one of the following groups: l Group 1: 768-bit Diffie­Hellman prime modulus group. l Group 2: 1024-bit Diffie­Hellman prime modulus group. l Group 14: 2048-bit Diffie­Hellman prime modulus group. l Group 19: 256-bit random Diffie­Hellman ECP modulus group. l Group 20: 384-bit random Diffie­Hellman ECP modulus group. 6. Select the transform set for the map to define a specific encryption and authentication type used by the dynamic peer. Click the Transform Set drop-down list, and select the transform set for the dynamic peer.
To view current configuration settings for an IPsec transform-set, access the command-line interface and issue the command crypto ipsec transform-set tag <transform-set-name>.
7. Set the Security Association Lifetime to define the lifetime of the security association for the dynamic peer in seconds. The default value is 7200 seconds. To change this value, uncheck the default checkbox and enter a value between 300 and 86400 seconds.
8. Click Done.
Finalizing WebUI changes
When you have finished configuring your IPsec VPN settings, click Apply to apply the new settings before navigating to other pages.
Configuring a Basic L2TP VPN in the CLI
Use the following procedures to use the command-line interface to configure a remote access VPN for L2TP IPsec:
1. Define the authentication method and server addresses: (host)(config) #vpdn group l2tp
enable client configuration {dns|wins} <ipaddr1> [<ipaddr2>] 2. Enable authentication methods for IKEv1 clients:
vpdn group l2tp ppp authentication {cache-securid|chap|eap|mschap|mschapv2|pap 3. Create address pools:
(host)(config) #ip local pool <pool> <start-ipaddr> <end-ipaddr> 4. Configure source NAT:
(host)(config) #ip access-list session srcnatuser any any src-nat pool <pool> position 1 5. If you are configuring a VPN to support machine authentication using certificates, define server certificates
for VPN clients using IKEv1: (host)(config) #crypto-local isakmp server-certificate <cert> 6. If you are configuring a VPN to support IKEv1 Clients using pre-shared keys, you can configure a global IKE key by entering 0.0.0.0 for both the address and netmask parameters in the command below, or configure an IKE key for an individual subnet by specifying the IP address and netmask for that subnet: crypto isakmp key <key> address <ipaddr|> netmask <mask>

420 | Virtual Private Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

7. Define IKE Policies:
(host)(config) #crypto isakmp policy <priority> encryption {3des|aes128|aes192|aes256|des} version v1|v2 authentication {pre-share|rsa-sig|ecdsa-256ecdsa-384} group {1|2|19|20} hash {md5|sha|sha1-96|sha2-256-128|sha2-384-192} lifetime <seconds>

Configuring a VPN for L2TP/IPsec with IKEv2 in the WebUI
Only clients running Windows 7 (and later versions), StrongSwan 4.3, and Dell VIA support IKEv2. For additional information on the authentication types supported by these clients, see "Working with IKEv2 Clients on page 413." Use the following procedures to in the WebUI to configure a remote access VPN for IKEv2 clients using certificates. l Defining Authentication Method and Server Addresses on page 421 l Defining Address Pools on page 421 l Enabling Source NAT on page 421 l Selecting Certificates on page 422 l Configuring IKE Policies on page 422 l Setting the IPsec Dynamic Map on page 423 l Finalizing WebUI changes on page 424
Defining Authentication Method and Server Addresses
1. Define the authentication method and server addresses. 2. Navigate to Configuration > Advanced Services > VPN Services and click the IPSEC tab. 3. To enable L2TP, select Enable L2TP (this is enabled by default). 4. Select the authentication method for IKEv1 clients. The currently supported methods include:
n Password Authentication Protocol (PAP) n Extensible Authentication Protocol (EAP) n Challenge Handshake Authentication Protocol (CHAP) n Microsoft Challenge Handshake Authentication Protocol (MSCHAP) n Microsoft Challenge Handshake Authentication Protocol version 2 (MSCHAPv2) 5. Configure the IP addresses of the primary and secondary Domain Name System (DNS) servers and primary and secondary Windows Internet Naming Service (WINS) Servers that are pushed to the VPN client.
Defining Address Pools
Next, define the pool from which the clients are assigned addresses. 1. In the Address Pools section of the IPSEC tab, click Add to open the Add Address Pool page. 2. Specify the pool name, the start address, and the end address. 3. Click Done.
Enabling Source NAT
In the Source NAT section of the IPSEC tab, select Enable Source NAT if the IP addresses of clients must be translated to access the network. If you enabled source NAT, click the NAT pool drop-down list and select an existing NAT pool. If you have not yet created the NAT pool you want to use:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual Private Networks | 421

1. Navigate to Configuration > IP > NAT Pools. 2. Click Add. 3. In the Pool Name field, enter a name for the new NAT pool, up to 63 alphanumeric characters. 4. In the Start IP address field, enter the dotted-decimal IP address that defines the beginning of the range
of source NAT addresses in the pool. 5. In the End IP address field, enter the dotted-decimal IP address that defines the end of the range of source
NAT addresses in the pool. 6. In the Destination NAT IP Address field, enter the destination NAT IP address in dotted-decimal format.
If you do not enter an address into this field, the NAT pool uses the destination NAT IP 0.0.0.0. 7. Click Done to close the NAT pools tab. 8. Navigate to Configuration > Advanced Services > VPN Services and click the IPSEC tab to return to the
IPSEC window. 9. Click the NAT Pool drop-down list and select the NAT pool you just created.
Selecting Certificates
To configure the VPN to support machine authentication using certificates, define the IKE Server certificates for VPN clients using IKEv2. Note that these certificate must be imported into the controller, as described in Management Access on page 860.
1. Select the IKEv2 server certificate for client machines using IKEv2 by clicking the IKEv2 Server Certificate drop-down list and selecting an available certificate name.
2. If you are configuring a VPN to support IKEv2 clients using certificates, you must also assign one or more trusted CA certificates to VPN clients. a. Under CA Certificate Assigned for VPN-clients, click Add. b. Select a CA certificate from the drop-down list of CA certificates imported in the controller. c. Click Done. d. Repeat the above steps to add additional CA certificates.
Configuring IKE Policies
ArubaOS contains several predefined default IKE policies, as described in Table 81. If you do not want to use any of these predefined policies, you can use the procedures below to delete a factory-default policy, edit an existing policy, or create your own custom IKE policy instead.
The IKE policy selections must be reflected in the VPN client configuration. When using a third-party VPN client, set the VPN configuration on clients to match the choices made above. In case the Dell dialer is used, these configurations must be made on the dialer prior to downloading the dialer onto the local client.
1. Scroll down to the IKE Policies section of the IPSEC tab, then click Edit to edit an existing policy or click Add to create a new policy. You can also delete a predefined factory-default IKE policy by clicking Delete.
2. Enter a number into the Priority field to set the priority for this policy. Enter a priority of 1 for the configuration to take priority over the Default setting.
3. Select the IKE version. Click the Version drop-down list and select V2 for IKEv2. 4. Set the Encryption type. Click the Encryption drop-down list and select one of the following encryption
types: l DES l 3DES l AES128

422 | Virtual Private Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l AES192 l AES256 5. Set the HASH function. Click the Hash drop-down list and select one of the following hash types: l MD5 l SHA l SHA1-96 l SHA2-256-128 l SHA2-384-192 6. ArubaOS VPNs support IKEv2 client authentication using RSA digital certificates or Elliptic Curve Digital Signature Algorithm (ECDSA) certificates. To set the authentication type for the IKE rule, click the Authentication drop-down list and select one of the following types: l RSA l ECDSA-256 l ECDSA-384 7. Diffie-Hellman is a key agreement algorithm that allows two parties to agree upon a shared secret, and is used within IKE to securely establish session keys. To set the Diffie­Hellman Group for the ISAKMP policy, click the Diffie­Hellman Group drop-down list and select one of the following groups: l Group 1: 768-bit Diffie­Hellman prime modulus group. l Group 2: 1024-bit Diffie­Hellman prime modulus group. l Group 19: 256-bit random Diffie­Hellman ECP modulus group. l Group 20: 384-bit random Diffie­Hellman ECP modulus group.
Configuring Diffie­Hellman Group 1 and Group 2 types are not permitted if the controller is operating in the FIPS mode.
8. Set the Pseudo-Random Function (PRF) value. This algorithm is an HMAC function to used to hash certain values during the key exchange: l PRF-HMAC-MD5 l PRF-HMAC-SHA1 l PRF-HMAC-SHA256 l PRF-HMAC-SHA384
9. Set the Security Association Lifetime to define the lifetime of the security association in seconds. The default value is 7200 seconds. To change this value, uncheck the default checkbox and enter a value between 300 and 86400 seconds.
10.Click Done.
Setting the IPsec Dynamic Map
Dynamic maps enable IPsec SA negotiations from dynamically addressed IPsec peers. ArubaOS has predefined IPsec dynamic maps for IKEv2. If you do not want to use these predefined maps, you can use the procedures below to delete a factory-default map, edit an existing map, or create your own custom IPsec dynamic map instead.
In the WebUI
1. Scroll down to the IPsec Dynamic Map section of the IPSEC tab, then click Edit by a map name to edit an existing map, or click Add to create a new map.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual Private Networks | 423

You can also delete a predefined factory-default dynamic map by clicking Delete.

2. In the Name field, enter a name for the dynamic map. 3. In the Priority field, enter a priority number for the map. Negotiation requests for security associations try
to match the highest-priority map first. If that map does not match, the negotiation request continues down the list to the next-highest priority map until a match is made. 4. Click the Version drop-down list, and select v2 to create a map for remote peers using IKEv2. 5. (Optional) Configure Perfect Forward Secrecy (PFS) settings for the dynamic peer by assigning a DiffieHellman prime modulus group. PFS provides an additional level of security by ensuring that the IPsec SA key was not derived from any other key, and therefore can not be compromised if another key is broken. Click the Set PFS drop-down list and select one of the following groups: l Group 1: 768-bit Diffie­Hellman prime modulus group. l Group 2: 1024-bit Diffie­Hellman prime modulus group. l Group 14: 2048-bit Diffie­Hellman prime modulus group. l Group 19: 256-bit random Diffie­Hellman ECP modulus group. l Group 20: 384-bit random Diffie­Hellman ECP modulus group. 6. Select the transform set for the map to define a specific encryption and authentication type used by the dynamic peer. Click the Transform Set drop-down list, and select the transform set for the dynamic peer.
To view current configuration settings for an IPsec transform-set, access the command-line interface and issue the command crypto ipsec transform-set tag <transform-set-name>.
7. Set the Security Association Lifetime to define the lifetime of the security association for the dynamic peer in seconds. The default value is 7200 seconds. To change this value, uncheck the default checkbox and enter a value between 300 and 86400 seconds.
8. Click Done.
Finalizing WebUI changes
When you have finished configuring your IPsec VPN settings, click Apply to apply the new settings before navigating to other pages.
In the CLI
Use the following procedures in the CLI to configure a remote access VPN for L2TP IPsec using IKEv2:
1. Define the server addresses: (host)(config) #vpdn group l2tp enable client configuration {dns|wins} <ipaddr1> [<ipaddr2>]
2. Enable authentication methods for IKEv2 clients: (host)(config) #crypto isakmp eap-passthrough {eap-mschapv2|eap-peap|eap-tls}
3. Create address pools: (host)(config) #ip local pool <pool> <start-ipaddr> <end-ipaddr>
4. Configure source NAT: (host)(config) #ip access-list session srcnat user any any src-nat pool <pool> position 1
5. If you are configuring a VPN to support machine authentication using certificates, define server certificates for VPN clients using IKEv2: (host)(config) #crypto-local isakmp server-certificate <cert>

424 | Virtual Private Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The IKE pre-shared key value must be between 6-64 characters. To configure a pre-shared IKE key that contains nonalphanumeric characters, surround the key with quotation marks. For example: crypto-local isakmp key "key with spaces" fqdn-any.
6. Define IKEv2 Policies: (host)(config) #crypto isakmp policy <priority> encryption {3des|aes128|aes192|aes256|des} version v2 authentication {pre-share|rsa-sig|ecdsa-256ecdsa-384} group {1|2|19|20} hash {md5|sha|sha1-96|sha2-256-128|sha2-384-192} prf PRF-HMAC-MD5|PRF-HMAC-SHA1|PRF-HMAC-SHA256|PRF-HMAC-SHA384 lifetime <seconds>
7. Define IPsec Tunnel parameters: (host)(config) #crypto ipsec mtu <max-mtu> transform-set <transform-set-name> esp-3des|esp-aes128|esp-aes128-gcm|esp-aes192|espaes256|esp-aes256-gcm|esp-des esp-md5-hmac|esp-null-mac|esp-sha-hmac
Configuring a VPN for Smart Card Clients
This section describes how to configure a remote access VPN on the controller for Microsoft L2TP/IPsec clients with smart cards, which contain a digital certificate allowing user-level authentication without the user entering a username and password. As described earlier in this chapter, L2TP/IPsec requires two levels of authentication: IKE SA (machine) authentication and user-level authentication with an IKEv2 or PPP-based authentication protocol.
Microsoft clients running Windows 7 (and later versions) support both IKEv1 and IKEv2. Microsoft clients using IKEv2 support machine authentication using RSA certificates (but not ECDSA certificates or pre-shared keys) and smart card user-level authentication with EAP-TLS over IKEv2.
Windows 7 (and later version) clients without smart cards also support user password authentication using EAPMSCHAPv2 or PEAP-MSCHAPv2.
Working with Smart Card clients using IKEv2
To configure a VPN for Windows 7 (and later version) clients using smart cards and IKEv2, follow the procedure described in Configuring a VPN for L2TP/IPsec with IKEv2 in the WebUI on page 421, and ensure that the following settings are configured:
l L2TP is enabled l User Authentication is set to EAP-TLS l IKE version is set to V2 l The IKE policy is configured for ECDSA or RSA certificate authentication
Working with Smart Card Clients using IKEv1
Microsoft clients using IKEv1, including clients running Windows Vista or earlier versions of Windows, only support machine authentication using a pre-shared key. In this scenario, user-level authentication is performed by an external RADIUS server using PPP EAP-TLS, and client and server certificates are mutually authenticated during the EAP-TLS exchange. During the authentication, the controller encapsulates EAP-TLS messages from the client into RADIUS messages and forwards them to the server.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual Private Networks | 425

On the controller, you must configure the L2TP/IPsec VPN with EAP as the PPP authentication and IKE policy for preshared key authentication of the SA.
On the RADIUS server, you must configure a remote access policy to allow EAP authentication for smart card users and select a server certificate. The user entry in Microsoft Active Directory must be configured for smart cards.
To configure an L2TP/IPsec VPN for clients using smart cards and IKEv1, ensure that the following settings are configured:
1. On a RADIUS server, a remote access policy must be configured to allow EAP authentication for smart card users and to select a server certificate. The user entry in Microsoft Active Directory must be configured for smart cards. (For detailed information on creating and managing user roles and policies, see Roles and Policies on page 438.)
l Ensure that the RADIUS server is part of the server group used for VPN authentication. l Configure other VPN settings as described in Configuring a VPN for L2TP/IPsec with IKEv2 in the WebUI on
page 421, while selecting the following options: n Select Enable L2TP n Select EAP for the Authentication Protocol. n Define an IKE Shared Secret to be used for machine authentication. (To make the IKE key global, specify
0.0.0.0 and 0.0.0.0 for both subnet and subnet mask.) n Configure the IKE policy for Pre-Share authentication.

Configuring a VPN for Clients with User Passwords
This section describes how to configure a remote access VPN on the controller for L2TP/IPsec clients with user passwords. As described earlier, L2TP/IPsec requires two levels of authentication: IKE SA authentication and user-level authentication with the PAP authentication protocol. IKE SA is authenticated with a preshared key, which you must configure as an IKE shared secret on the controller. User-level authentication is performed by the controller's internal database.
On the controller, you must configure the following:
l AAA database entries for username and passwords l VPN authentication profile, which defines the internal server group and the default role assigned to
authenticated clients l L2TP/IPsec VPN with PAP as the PPP authentication (IKEv1 only). l (For IKEv1 clients) An IKE policy for preshared key authentication of the SA. l (For IKEv2 clients) A server certificate to authenticate the controller to clients, and a CA certificate to
authenticate VPN clients.
In the WebUI
Use the following procedure to configure L2TP/IPsec VPN for username/password clients via the WebUI:
1. Navigate to the Configuration > Security > Authentication > Servers window. a. Select Internal DB to display entries for the internal database. b. Click Add User. c. Enter the username and password information for the client. d. Click Enabled to activate this entry on creation. e. Click Apply.
2. Navigate to the Configuration > Security > Authentication > L3 Authentication window.

426 | Virtual Private Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

a. Under default VPN Authentication Profile, select Server Group. b. Select the internal server group from the drop-down menu. c. Click Apply. 3. Navigate to the Configuration > Advanced Services > VPN Services > IPsec window. a. Select Enable L2TP (this is enabled by default). b. Select PAP for Authentication Protocols. 4. Configure other VPN settings as described in Configuring a VPN for L2TP/IPsec with IKEv2 in the WebUI on page 421, while ensuring that the following settings are selected: l In the L2TP and XAUTH Parameters section of the Configuration > VPN Services > IPsec tab,
enable L2TP. l In the L2TP and XAUTH Parameters section of the Configuration > VPN Services > IPsec tab,
select PAP as the authentication protocol.
In the CLI
The following example uses the command-line interface to configure a L2TP/IPsec VPN for username/password clients using IKEv1: (host)(config) #vpdn group l2tp
enable ppp authentication pap client dns 101.1.1.245
(host)(config) #ip local pool pw-clients 10.1.1.1 10.1.1.250
(host)(config) #crypto isakmp key <key> address 0.0.0.0 netmask 0.0.00
(host)(config) #crypto isakmp policy 1 authentication pre-share
Next, issue the following command in enable mode to configure client entries in the internal database: (host)(config) #local-userdb add username <name> password <password>
Configuring Remote Access VPNs for XAuth
Extended Authentication (XAuth) is an Internet Draft that permits user authentication after IKE Phase 1 authentication. This authentication prompts the user for a username and password, in which user credentials are authenticated with an external RADIUS or LDAP server or the controller's internal database. Alternatively, the user can start client authentication with a smart card, which contains a digital certificate to verify the client credentials. IKE Phase 1 authentication can be done with either an IKE preshared key or digital certificates.
Configuring VPNs for XAuth Clients using Smart Cards
This section describes how to configure a remote access VPN on the controller for Cisco VPN XAuth clients using smart cards. Smart cards contain a digital certificate, allowing user-level authentication without the user entering a username and password. IKE Phase 1 authentication can be done with either an IKE preshared key or digital certificates; for XAuth clients using smart cards, the smart card digital certificates must be used for IKE authentication. The client is authenticated with the internal database on the controller. On the controller, you must configure the following: 1. Add entries for Cisco VPN XAuth clients to the controller's internal database, or to an external RADIUS or
LDAP server. For details on configuring an authentication server, see Authentication Servers on page 249.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual Private Networks | 427

For each client, you need to create an entry in the internal database with the entire Principal name (SubjectAltname in X.509 certificates) or Common Name as it appears on the certificate.
2. Verify that the server with the client data is part of the server group associated with the VPN authentication profile.
3. In the L2TP and XAUTH Parameters section of the Configuration > VPN Services > IPsec tab, enable L2TP.
4. In the L2TP and XAUTH Parameters section of the Configuration > VPN Services > IPsec tab, enable XAuth to enable prompting for the username and password.
5. The Phase 1 IKE exchange for XAuth clients can be either Main Mode or Aggressive Mode. Aggressive Mode condenses the IKE SA negotiations into three packets (versus six packets for Main Mode). In the Aggressive Mode section of the Configuration > VPN Services > IPsec tab, enter the authentication group name for aggressive mode to associate this setting to multiple clients. Make sure that the group name matches the aggressive mode group name configured in the VPN client software.
6. Configure other VPN settings as described in Configuring a VPN for L2TP/IPsec with IKEv2 in the WebUI on page 421, while ensuring that the following settings are selected: l In the L2TP and XAUTH Parameters section of the Configuration > VPN Services > IPSEC tab, enable L2TP. l In the L2TP and XAUTH Parameters section of the Configuration > VPN Services> IPSEC tab, enable XAuth to enable prompting for the username and password. l Define an IKE policy to use RSA or ECDSA authentication.
Configuring a VPN for XAuth Clients Using a Username and Password
This section describes how to configure a remote access VPN on the controller for Cisco VPN XAuth clients using passwords. IKE Phase 1 authentication is done with an IKE preshared key; users are then prompted to enter their username and password, which is verified with the internal database on the controller.
On the controller, you must configure the following:
1. Add entries for Cisco VPN XAuth clients to the controller's internal database. For details on configuring an authentication server, see Authentication Servers on page 249
For each client, you need to create an entry in the internal database with the entire Principal name (SubjectAltname in X.509 certificates) or Common Name as it appears on the certificate.
2. Verify that the server with the client data is part of the server group associated with the VPN authentication profile.
3. Configure other VPN settings as described in Configuring a VPN for L2TP/IPsec with IKEv2 in the WebUI on page 421, while ensuring that the following settings are selected: l In the L2TP and XAUTH Parameters section of the Configuration > VPN Services > IPSEC tab, enable L2TP. l In the L2TP and XAUTH Parameters section of the Configuration > VPN Services > IPSEC tab, enable XAuth to enable prompting for the username and password. l The IKE policy must have pre-shared authentication.
Working with Remote Access VPNs for PPTP
Point-to-Point Tunneling Protocol (PPTP) is an alternative to L2TP/IPsec. Like L2TP/IPsec, PPTP provides a logical transport mechanism using tunneling or encapsulation to send PPP frames across an IP network. PPTP

428 | Virtual Private Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

relies on the PPP connection process to perform user authentication and protocol configuration. With PPTP, data encryption begins after PPP authentication and connection process is completed. PPTP connections are encrypted through Microsoft Point-to-Point Encryption (MPPE), which uses the Rivest-ShamirAldeman (RSA) RC-4 encryption algorithm. PPTP connections require user-level authentication through a PPPbased authentication protocol (MSCHAPv2 is the currently-supported method).
In the WebUI
1. Navigate to the Configuration > Advanced Services > VPN Services > PPTP page. 2. To enable PPTP, select Enable PPTP. 3. Select either MSCHAP or MSCHAPv2 as the authentication protocol. 4. Configure IP addresses of the primary and secondary DNS servers. 5. Configure the primary and secondary WINS Server IP addresses that are pushed to the VPN Dialer. 6. Configure the VPN Address Pool.
a. Click Add. The Add Address Pool window displays. b. Specify the pool name, start address, and end address. c. Click Done. 7. Click Apply to apply the changes before navigating to other pages.
In the CLI
(host)(config) #vpdn group pptp enable client configuration {dns|wins} <ipaddr1> [<ipaddr2>] ppp authentication {mschapv2}
(host)(config) #pptp ip local pool <pool> <start-ipaddr> <end-ipaddr>
Working with Site-to-Site VPNs
Site-to-site VPNs allow sites in different locations to securely communicate with each other over a Layer-3 network such as the Internet. You can use Dell controllers instead of VPN concentrators to connect the sites. You can also use a VPN concentrator at one site and a controller at the other site. The Dell controller supports the following IKE SA authentication methods for site-to-site VPNs: l Preshared key: Note that the same IKE shared secret must be configured on both the local and remote
sites. l Suite-B cryptographic algorithms l Digital certificates: You can configure an RSA or ECDSA server certificate and a CA certificate for each site-
to-site VPN IPsec map configuration. If you use certificate-based authentication, the peer must be identified by its certificate subject name, distinguished name (for deployments using IKEv2), or by the peer's IP address (for IKEv1). For more information about importing server and CA certificates into the controller, see Management Access on page 860.
Certificate-based authentication is only supported for site-to-site VPN between two controllers with static IP addresses. IKEv1 site-to-site tunnels cannot be created between master and local controllers.
Working with Third-Party Devices
Dell controllers can use IKEv1 or IKEv2 to establish a site-to-site VPN with another Dell controller or third-party remote client devices. Devices running Microsoft® Windows 2008 can use Suite-B cryptographic algorithms and IKEv1 to support authentication using RSA or ECDSA. StrongSwan® 4.3 devices can use IKEv2 to support

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual Private Networks | 429

authentication using RSA or ECDSA certificates, Suite-B cryptographic algorithms, and pre-shared keys. These two remote clients are tested to work with Dell controllers using Suite-B cryptographic algorithm.
Working with Site-to-Site VPNs with Dynamic IP Addresses
ArubaOS supports site-to-site VPNs with two statically addressed controllers, or with one static and one dynamically addressed controller. Two methods are supported to enable dynamically addressed peers: l Pre-shared Key Authentication with IKE Aggressive Mode: The Dell controller with a dynamic IP
address must be configured as the initiator of IKE Aggressive-mode for Site-Site VPNs, while the controller with a static IP address must be configured as the responder of IKE Aggressive mode. Note that when the controller is operating in FIPS mode, IKE aggressive mode must be disabled. l X.509 certificates: IPsec peers will identify each other using the subject name of X.509 certificates. IKE operates in main mode when this option is selected. This method is preferred from a security standpoint.
Understanding VPN Topologies
You must configure VPN settings on the controllers at both the local and remote sites. In the following figure, a VPN tunnel connects Network A to Network B across the Internet.
Figure 57 Site-to-Site VPN Configuration Components

To configure the VPN tunnel on controller A, you must configure the following: l The source network (Network A) l The destination network (Network B) l The VLAN on which controller A's interface to the Layer-3 network is located (Interface A in Figure 57) l The peer gateway, which is the IP address of controller B's interface to the Layer-3 network (Interface B in
Figure 57)
Configure VPN settings on the controllers at both the local and remote sites.
Configuring Site-to-Site VPNs
Use the following procedures to create a site-to-site VPN via the WebUI or CLI.
In the WebUI
1. Navigate to the Configuration > Advanced Services > VPN Services > Site-to-Site page. 2. In the IPsec Maps section, click Add to open the Add IPsec Map window. 3. Enter a name for this VPN connection in the Name field. 4. Enter a priority level for the IPsec map. Negotiation requests for security associations try to match the
highest-priority map first. If that map does not match, the negotiation request continues down the list to the next-highest priority map until a match is made.

430 | Virtual Private Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

5. In the Source Network and Source Subnet Mask fields, enter the IP address and netmask for the source (the local network connected to the controller). (See controller A in Figure 57)
6. In the Destination Network and Destination Subnet Mask fields, enter the IP address and netmask for the destination (the remote network to which the local network communicates). (See controller B in Figure 57)
7. If you use IKEv1 to establish a site-to-site VPN for a statically addressed remote peer, enter the IP address of the interface used by the remote peer to connect to the L3 network in the Peer Gateway field (See Interface B in Figure 57). If you are configuring an IPsec map for a dynamically addressed remote peer, you must leave the peer gateway set to its default value of 0.0.0.0.
8. If you use IKEv2 to establish a site-to-site VPN for a statically addressed remote peer, identify the peer device by entering its certificate subject name in the Peer Certificate Subject Name field.
To identify the subject name of a peer certificate, issue the following command in the CLI: show crypto-local pki servercert <certname> subject
9. The Security Association Lifetime parameter defines the lifetime of the security association in seconds and kilobytes. For seconds, the default value is 7200. To change this value, uncheck the default checkbox and enter a value between 300 and 86400 seconds. Range: 1000­1000000000 kilobytes.
10.Click the Version drop-down list and select V1 to configure the VPN for IKEv1, or V2 for IKEv2. 11.Select the VLAN containing the interface of the local controller that connects to the Layer-3 network. (See
Interface A in Figure 57) This determines the source IP address used to initiate IKE. If you select 0 or None, the default is the VLAN of the controller's IP address (either the VLAN where the loopback IP is configured, or VLAN 1 if no loopback IP is configured). 12.If you enable Perfect Forward Secrecy (PFS) mode, new session keys are not derived from previously used session keys. Therefore, if a key is compromised, that compromised key does not affect any previous session keys. PFS mode is disabled by default. To enable this feature, click the PFS drop-down list and select one of the following Perfect Forward Secrecy modes: l group1: 768-bit Diffie­Hellman prime modulus group. l group2: 1024-bit Diffie­Hellman prime modulus group. l group 14: 2048-bit Diffie­Hellman prime modulus group. l group19: 256-bit random Diffie­Hellman ECP modulus group. l group20: 384-bit random Diffie­Hellman ECP modulus group. 13.Select Pre-Connect to establish the VPN connection, even if there is no traffic being sent from the local network. If you do not select this, the VPN connection is established only when traffic is sent from the local network to the remote network. 14.Select Trusted Tunnel if traffic between the networks is trusted. If you do not select this, traffic between the networks is untrusted. 15.Select the Enforce NATT checkbox to enforce UDP 4500 for IKE and IPSEC. This option is disabled by default. 16.Add one or more transform sets to be used by the IPsec map. Click the Transform Set drop-down list, select an existing transform set, then click the arrow button by the drop-down list to add that transform set to the IPsec map. 17.For site-to-site VPNs with dynamically addressed peers, click the Dynamically Addressed Peers checkbox. a. Select Initiator if the dynamically addressed switch is the initiator of IKE Aggressive-mode for Site-Site
VPNs, or select Responder if the dynamically addressed switch is the responder for IKE Aggressivemode.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual Private Networks | 431

b. In the FQDN field, enter a fully qualified domain name (FQDN) for the controller. If the controller is defined as a dynamically addressed responder, you can select all peers to make the controller a responder for all VPN peers, or select Per Peer ID and specify the FQDN to make the controller a responder for one specific initiator.
18.Select one of the following authentication types: a. For pre-shared key authentication, select Pre-Shared Key, then enter a shared secret in the IKE Shared Secret and Verify IKE Shared Secret fields. This authentication type is generally required in IPsec maps for a VPN with dynamically addressed peers, but can also be used for a static site-to-site VPN. b. For certificate authentication, select Certificate, then click the Server Certificate and CA certificate drop-down lists to select certificates previously imported into the controller. See Management Access on page 860 for more information.
19.Click Done to apply the site-to-site VPN configuration. 20.Click Apply. 21.Click the IPSEC tab to configure an IKE policy.
a. Under IKE Policies, click Add to open the IPSEC Add Policy configuration page. b. Set the Priority to 1 for this configuration to take priority over the Default setting. c. Set the Version type to match the IKE version you selected in Step 10. d. Set the Encryption type from the drop-down list. e. Set the HASH Algorithm from the drop-down list. f. Set the Authentication to PRE-SHARE if you use pre-shared keys. If you use certificate-based IKE, select
RSA or ECDSA. g. Set the Diffie­Hellman Group from the drop-down list. h. The IKE policy selections, including any pre-shared key, must be reflected in the VPN client configuration.
When using a third-party VPN client, set the VPN configuration on clients to match the choices made above. If you use the Dell dialer, you must configure the dialer prior to downloading the dialer onto the local client. i. Click Done to activate the changes. j. Click Apply.
In the CLI
To configure a site-to-site VPN with two static IP controllers using IKEv1, issue the following commands in the CLI:
(host)(config) #crypto-local ipsec-map <name> <priority> src-net <ipaddr> <mask> dst-net <ipaddr> <mask> peer-ip <ipaddr> vlan <id> version v1|v2 peer-cert-dn <peer-dn> pre-connect enable|disable trusted enable

For certificate authentication: set ca-certificate <cacert-name> set server-certificate <cert-name>
(host)(config) #crypto isakmp policy <priority> encryption {3des|aes128|aes192|aes256|des} version v1|v2 authentication {rsa-sig|ecdsa-256ecdsa-384}

432 | Virtual Private Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

group {1|2|19|20} hash {md5|sha|sha1-96|sha2-256-128|sha2-384-192} lifetime <seconds>
For pre-shared key authentication: (host)(config) #crypto-local isakmp key <key> address <ipaddr> netmask <mask>
(host)(config) #crypto isakmp policy <priority> encryption {3des|aes128|aes192|aes256|des} version v1|v2 authentication pre-share group {1|2|19|20} hash {md5|sha|sha1-96|sha2-256-128|sha2-384-192} lifetime <seconds>
To configure site-to-site VPN with a static and dynamically addressed controller that initiates IKE Aggressivemode for Site-Site VPN: (host)(config) #crypto-local ipsec-map <name> <priority>
src-net <ipaddr> <mask> dst-net <ipaddr> <mask> peer-ip <ipaddr>local-fqdn <local_id_fqdn> vlan <id> pre-connect enable|disable trusted enable For the Pre-shared-key: (host)(config) #crypto-local isakmp key <key> address <ipaddr> netmask 255.255.255.255
For a static IP controller that responds to IKE Aggressive-mode for Site-Site VPN: crypto-local ipsec-map <name2> <priority>
src-net <ipaddr> <mask> dst-net <ipaddr> <mask> peer-ip 0.0.0.0 peer-fqdn fqdn-id <peer_id_fqdn> vlan <id> trusted enable
For the Pre-shared-key: (host)(config) #crypto-local isakmp key <key> fqdn <fqdn-id>
For a static IP controller that responds to IKE Aggressive-mode for Site-Site VPN with one PSK for All FQDNs: (host)(config) #crypto-local ipsec-map <name2> <priority>
src-net <ipaddr> <mask> peer-ip 0.0.0.0 peer-fqdn any-fqdn vlan <id> trusted enable
For the Pre-shared-key for All FQDNs: (host)(config) #crypto-local isakmp key <key> fqdn-any

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual Private Networks | 433

Detecting Dead Peers
Dead Peer Detection (DPD) is enabled by default on the controller for site-to-site VPNs. DPD, as described in RFC 3706, "A Traffic-Based Method of Detecting Dead Internet Key Exchange (IKE) Peers," uses IPsec traffic patterns to minimize the number of IKE messages required to determine the liveliness of an IKE peer.
After a dead peer is detected, the controller tears down the IPsec session. Once the network path or other failure condition has been corrected, a new IPsec session is automatically re-established.
To configure DPD parameters, issue the following commands through the CLI: (host)(config) #crypto-local isakmp dpd idle-timeout <idle_seconds> retry-timeout <retry_ seconds> retry-attempts <number>
About Default IKE Policies
ArubaOS includes the following default IKE policies. These policies are predefined, but can be edited and deleted. You can do this in the CLI by using the crypto isakmp policy and crypto dynamic-map commands, or the WebUI by navigating to Advanced Services > VPN Services > IPSEC and using the Delete button next to the default IKE policy or IPsec dynamic map you want to delete.

Table 81: Default IKE Policy Settings

Policy Name

Policy Number

IKE Version

Encryption Algorithm

Hash Algorithm

Authentica -tion Method

PRF Method

DiffieHellman Group

Default protectio n suite

10001

IKEv1

3DES-168

SHA 160

Pre-Shared N/A Key

2 (1024 bit)

Default

10002

IKEv1

AES -256

SHA 160

RSA

N/A

RAP

Signature

Certificat

e

protectio

n suite

2 (1024 bit)

Default RAP PSK protectio n suite

10003

AES -256

SHA 160

Pre-Shared N/A Key

2 (1024 bit)

Default RAP IKEv2 RSA protectio n suite

1004

IKEv2

AES -256

SSHA160

RSA Signature

hmacsha1

2 (1024 bit)

Default Cluster PSK protectio n suite

10005

IKEv1

AES -256

SHA160

Pre-Shared Key

PreShared Key

2 (1024 bit)

434 | Virtual Private Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Policy Name

Policy Number

IKE Version

Encryption Algorithm

Hash Algorithm

Authentica -tion Method

PRF Method

DiffieHellman Group

Default IKEv2 RSA protectio n suite

1006

IKEv2

AES - 128

SHA 96

RSA Signature

hmacsha1

2 (1024 bit)

Default IKEv2 PSK protectio n suite

10007

IKEv2

AES - 128

SHA 96

Pre-shared key

hmacsha1

2 (1024 bit)

Default Suite-B 128bit ECDSA protectio n suite

10008

IKEv2

AES - 128

SHA 256128

ECDSA-256 Signature

hmacsha2256

Random ECP Group (256 bit)

Default Suite-B 256 bit ECDSA protectio n suite

10009

IKEv2

AES -256

SHA 384192

ECDSA-384 Signature

hmacsha2384

Random ECP Group (384 bit)

Default Suite-B 128bit IKEv1 ECDSA protectio n suite

10010

IKEv1

AES-GCM128

SHA 256128

ECDSA-256 Signature

hmacsha2256

Random ECP Group (256 bit)

Default Suite-B 256-bit IKEv1 ECDSA protectio n suite

10011

IKEv1

AES-GCM256

SHA 256128

ECDSA-256 Signature

hmacsha2256

Random ECP Group (256 bit)

Working with VPN Dialer
For Windows clients, a dialer can be downloaded from the controller to auto-configure tunnel settings on the client.
Configuring VPN Dialer
Use the following procedures to configure the VPN dialer via the WebUI or CLI:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual Private Networks | 435

In the WebUI
1. Navigate to the Configuration > Advanced Services > VPN Services > Dialers page. Click Add to add a new dialer or the Edit tab to edit an existing dialer.
2. Enter the Dialer Name that identifies this setting. 3. Configure the dialer to work with PPTP or L2TP by selecting Enable PPTP or Enable L2TP. 4. Select the authentication protocol. This should match the L2TP or PPTP authentication type configured for
the VPN in the Configuration > Advanced Services > VPN Services > IPSEC window. 5. (Optional) Select Send Direct Network Traffic In Clear to enable "split tunneling" functionality so that
traffic destined for the internal network is tunneled, while traffic for the Internet is not. This option is not recommended for security reasons. 6. (Optional) Select Disable Wireless Devices When Client is Wired to allow the dialer to shut-down the wireless interface when it detects that a wired network connection is in use. 7. (Optional) Select Enable SecurID New and Next Pin Mode to enable site-to-site VPN support for SecurID new and next pin modes. 8. For L2TP: n Set the IKE Hash Algorithm to the value defined in the IKE policy on the Advanced Services > VPN
Services > IPSEC window. n If a pre-shared key is configured for an IKE Shared Secret in the VPN Services > IPSEC window, enter
the key. n The key you enter in the Dialers window must match the pre-shared key configured on the IPsec page. n Select the IPsec Mode Group that matches the Diffie­Hellman Group configured for the IPsec policy. n Select the IPsec Encryption that matches the encryption configured for the IPsec policy. n Select the IPsec Hash Algorithm that matches the hash algorithm configured for the IPsec policy. 9. Click Done to apply the changes made prior to navigating to another page.
In the CLI
Issue the following commands in the CLI to configure the VPN dialer:
(host(config) #vpn-dialer <name> enable {dnctclear|l2tp|pptp|secureid_newpinmode|wirednowifi} ike authentication {pre-share <key>|rsa-sig} ike encryption {3des|des} ike group {1|2} ike hash {md5|sha} ipsec encryption {esp-3des|esp-des} ipsec hash {esp-md5-hmac|esp-sha-hmac} ppp authentication {cache-securid|chap|mschap|mschapv2|pap}
Assigning a Dialer to a User Role
The VPN dialer can be downloaded using Captive Portal. For the user-role assigned through Captive Portal, configure the dialer by using the dialer name.
For example, if the Captive Portal client is assigned to the guest role after logging in, and the dialer is called mydialer, configure mydialer as the dialer to be used in the guest role.
In the WebUI
1. Navigate to the Configuration > Security > Access Control > User Roles page. 2. Click Edit for the user role. 3. Under VPN Dialer, select the dialer you configured and click Change. 4. Click Apply.

436 | Virtual Private Networks

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the CLI
To configure the Captive Portal dialer for a user-role via the CLI, access the CLI in config mode and issue the following commands:
(host) (config) #user-role <role> dialer <name>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual Private Networks | 437

Chapter 17 Roles and Policies

The client in a Dell user-centric network is associated with a user role, which determines the client's network privileges, how often it must re-authenticate, and which bandwidth contracts are applicable. A policy is a set of rules that applies to traffic that passes through the Dell controller. You specify one or more policies for a user role. Finally, you can assign a user role to clients before or after they authenticate to the system.
This chapter describes assigning and creating roles and policies using the ArubaOS CLI or WebUI. Roles and policies can also be configured for WLANs associated with the "default" ap-group via the WLAN Wizard: Configuration > Wizards > WLAN Wizard. Follow the steps in the workflow pane within the wizard and refer to the help tab for assistance.
Topics in this chapter include:
l Configuring Firewall Policies on page 438 l Creating a Firewall Policy on page 439 l Creating a Network Service Alias on page 443 l Creating an ACL White List on page 444 l User Roles on page 445 l Assigning User Roles on page 447 l Understanding Global Firewall Parameters on page 452 l Using AppRF 2.0 on page 458
This chapter describes configuring firewall policies and parameters that relate to IPv4 traffic. See IPv6 Support on page 198 for information about configuring IPv6 firewall policies and parameters.

Configuring Firewall Policies
A firewall policy identifies specific characteristics about a data packet passing through the Dell controller and takes some action based on that identification. In a Dell controller, that action can be a firewall-type action such as permitting or denying the packet, an administrative action such as logging the packet, or a quality of service (QoS) action such as setting 802.1p bits or placing the packet into a priority queue. You can apply firewall policies to user roles to give differential treatment to different users on the same network, or to physical ports to apply the same policy to all traffic through the port.
Firewall policies differ from access control lists (ACLs) in the following ways:
l Firewall policies are stateful, meaning that they recognize flows in a network and keep track of the state of sessions. For example, if a firewall policy permits telnet traffic from a client, the policy also recognizes that inbound traffic associated with that session should be allowed.
l Firewall policies are bi-directional, meaning that they keep track of data connections traveling into or out of the network. ACLs are normally applied to either traffic inbound to an interface or outbound from an interface.
l Firewall policies are dynamic, meaning that address information in the policy rules can change as the policies are applied to users. For example, the alias user in a policy automatically applies to the IP address assigned to a particular user. ACLs typically require static IP addresses in the rule.
You can apply IPv4 and IPv6 firewall policies to the same user role. See IPv6 Support on page 198 for information about configuring IPv6 firewall policies.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Roles and Policies | 438

Working With Access Control Lists (ACLs)
Access control lists (ACLs) are a common way of restricting certain types of traffic on a physical port. ArubaOS provides the following types of ACLs:
l Standard ACLs permit or deny traffic based on the source IP address of the packet. Standard ACLS can be either named or numbered, with valid numbers in the range of 1-99 and 1300-1399. Standard ACLs use a bitwise mask to specify the portion of the source IP address to be matched.
l Extended ACLs permit or deny traffic based on source or destination IP address, source or destination port number, or IP protocol. Extended ACLs can be named or numbered, with valid numbers in the range 100199 and 2000-2699.
l MAC ACLs are used to filter traffic on a specific source MAC address or range of MAC addresses. Optionally, you can mirror packets to a datapath or remote destination for troubleshooting and debugging purposes. MAC ACLs can be either named or numbered, with valid numbers in the range of 700-799 and 1200-1299.
l Ethertype ACLs are used to filter based on the Ethertype field in the frame header. Optionally, you can mirror packets to a datapath or remote destination for troubleshooting and debugging purposes. Ethertype ACLs can be either named or numbered, with valid numbers in the range of 200-299.These ACLs can be used to permit IP while blocking other non-IP protocols, such as IPX or AppleTalk.
l Service ACLs provide a generic way to restrict how protocols and services from specific hosts and subnets to the controller are used. Rules with this ACL are applied to all traffic on the controller regardless of the ingress port or VLAN.
l Routing ACLs forward packets to a device defined by an IPsec map, a next-hop list, a tunnel or a tunnel group.
ArubaOS provides both standard and extended ACLs for compatibility with router software from popular vendors, however firewall policies provide equivalent and greater function than standard and extended ACLs and should be used instead.
You can apply MAC and Ethertype ACLs to a user role, however these ACLs only apply to non-IP traffic from the user.
Support for Desktop Virtualization Protocols
ArubaOS supports desktop virtualization protocols by providing preconfigured ACLs for Citrix and VMware clients. You can apply these ACLs to the user-role when using the Virtual Desktop Infrastructure (VDI) clients. This ensures that any enterprise application that uses the VDI client performs optimally with appropriate QoS.
Disable the voice aware ARM when applying the ACLs for the VDI clients as the virtual desktop sessions may prevent the ARM scanning.
Creating a Firewall Policy
This section describes how to configure the rules that constitute a firewall policy. A firewall policy can then be applied to a user role (until the policy is applied to a user role, it does not have any effect). Table 82 describes required and optional parameters for a rule.

439 | Roles and Policies

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 82: Firewall Policy Rule Parameters

Field

Description

IP version

Specifies whether the policy applies to IPv4 or IPv6 traffic.

Source (required)

Source of the traffic, which can be one of the following:
l any: Acts as a wildcard and applies to any source address.
l user: This refers to traffic from the wireless client.
l host: This refers to traffic from a specific host. When this option is chosen, you must configure the IP address of the host.
l network: This refers to a traffic that has a source IP from a subnet of IP addresses. When this option is chosen, you must configure the IP address and network mask of the subnet.
l alias: This refers to using an alias for a host or network. You configure the alias by navigating to the Configuration > Advanced Services > Stateful Firewall > Destination page.

Destination (required)

Destination of the traffic, which can be configured in the same manner as Source.

Service (required)

Type of traffic, which can be one of the following:
l any: This option specifies that this rule applies to any type of traffic.
l application: For session and route policies on a W-7000 Series controller, you can create a rule that applies to a specific application type. Click the Application drop-down list and select an application type.
l application category: For session and route policies on a W-7000 Series controller, you can create a rule that applies to a specific application category. Click the Application Category drop-down list and select a category type.
l web category/ Reputation: For session policies on a W-7000 Series controller, you can create a rule that applies to a specific web category or application type. For more information on web category classification, see AppRF on page 828
l tcp: Using this option, you configure a range of TCP port(s) to match for the rule to be applied.
l udp: Using this option, you configure a range of UDP port(s) to match for the rule to be applied.
l service: Using this option, you use one of the pre-defined services (common protocols such as HTTPS, HTTP, and others) as the protocol to match for the rule to be applied. You can also specify a network service that you configure by navigating to the Configuration > Advanced Services > Stateful Firewall > Network Services page.
l protocol: Using this option, you specify a different layer 4 protocol (other than TCP/UDP) by configuring the IP protocol value.

Action (required)

The action that you want the controller to perform on a packet that matches the specified criteria. This can be one of the following:
l permit: Permits traffic matching this rule.
l drop: Drops packets matching this rule without any notification.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Roles and Policies | 440

Field

Description

l reject: Drops the packet and sends an ICMP notification to the traffic source.
l src-nat: Performs network address translation (NAT) on packets matching the rule. When this option is selected, you need to select a NAT pool. (If this pool is not configured, you configure a NAT pool by navigating to the Configuration > Advanced > Security > Advanced > NAT Pools). Source IP changes to the outgoing interface IP address (implied NAT pool) or from the pool configured (manual NAT pool). This action functions in tunnel/decrypt-tunnel forwarding mode.
l dst-nat: This option redirects traffic to the configured IP address and destination port. An example of this option is to redirect all HTTP packets to the captive portal port on the Dell controller as used in the pre-defined policy called "captiveportal". This action functions in tunnel/decrypt-tunnel forwarding mode. User should configure the NAT pool in the controller.
l dual-nat: This option performs both source and destination NAT on packets matching the rule. Forward packets from source network to destination; re-mark them with destination IP of the target network. This action functions in tunnel/decrypt-tunnel forwarding mode. User should configure the NAT pool in the controller.
l redirect to tunnel: This option redirects traffic into a GRE tunnel. This option is used primarily to redirect all guest traffic into a GRE tunnel to a DMZ router/switch.
l redirect to esi: This option redirects traffic to the specified ESI group. You also specify the direction of traffic to be redirected: forward, reverse, or both directions. Select a NAT Pool from the NAT Pool drop-down list to add a NATPOOL for ESI policy.
l route: Specify the next hop to which packets are routed, which can be one of the following:
n Forward Regularly: Packets are forwarded to their next destination without any changes.
n Forward to ipsec-map: Packets are forwarded through an IPsec tunnel defined by the specified IPsec map.
n Forward to next-hop-list: packets are forwarded to the highest priority active device on the selected next hop list. For more information on next-hop lists, see Routing Configuration on page 309.
n Forward to tunnel: Packets are forwarded through the tunnel with the specified tunnel ID. For more information on GRE tunnels, see Configuring GRE Tunnels on page 181.
n Forward to tunnel group: Packets are forwarded through the active tunnel in a GRE tunnel group. For more information on tunnel groups, see Configuring GRE Tunnel Groups on page 193.

Log (optional)

Logs a match to this rule. This is recommended when a rule indicates a security breach, such as a data packet on a policy that is meant only to be used for voice calls.

Mirror (optional)

Mirrors session packets to datapath or remote destination.

441 | Roles and Policies

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Field Queue (optional)
Time Range (optional)
Pause ARM Scanning (optional)
Black List (optional)
White List (optional)
TOS (optional)
802.1p Priority (optional)

Description
The queue in which a packet matching this rule should be placed. Select High for higher priority data, such as voice, and Low for lower priority traffic.
Time range for which this rule is applicable. Configure time ranges on the Configuration > Security > Access Control > Time Ranges page.
Pause ARM scanning while traffic is present. Note that you must enable "VoIP Aware Scanning" in the ARM profile for this feature to work.
Automatically blacklists a client that is the source or destination of traffic matching this rule. This option is recommended for rules that indicate a security breach where the blacklisting option can be used to prevent access to clients that are attempting to breach the security.
A rule must explicitly permit a traffic session before it is forwarded to the controller. The last rule in the white list denies everything else. Configure white list ACLs on the Configuration > Advanced Services> Stateful Firewall> White List (ACL) page.
Value of type of service (TOS) bits to be marked in the IP header of a packet matching this rule when it leaves the controller.
Value of 802.1p priority bits to be marked in the frame of a packet matching this rule when it leaves the controller.

The following example creates a policy `web-only' that allows web (HTTP and HTTPS) access.
In the WebUI
1. Navigate to the Configuration > Security > Access Control > Policies page on the WebUI. 2. To configure a firewall policy, select the policy type from the Policies title bar. You can select Ethernet,
Extended, MAC, Route, Session , or Standard. 3. Click Add to create a new policy. 4. If you selected All in Step 2, then select the type of policy you are adding from the Policy Type drop-down
menu. 5. Click Add to add a rule that allows HTTP traffic.
a. Under Service, select service from the drop-down list. b. Select svc-http from the scrolling list. c. Click Add. 6. Click Add to add a rule that allows HTTPS traffic. a. Under Service, select service from the drop-down list. b. Select svc-https from the scrolling list. c. Click Add.
Rules can be re-ordered by using the up and down buttons provided for each rule.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Roles and Policies | 442

7. Click Apply to apply this configuration. The policy is not created until the configuration is applied.
In the CLI
(host)(config) #ip access-list session web-only
Creating a Network Service Alias
A network service alias defines a TCP, UDP or IP protocol and a list or range of ports supported by that service. When you create a network service alias, you can use that alias when specifying the network service for multiple session ACLs.
In the WebUI
1. Navigate to the Configuration > Advanced Services> Stateful Firewall > Network Services page on the WebUI.
2. Click Add to create a new alias. 3. Enter a name for the alias in the Service Name field. 4. In the Protocol section, select either TCP or UDP, or select Protocol and enter the IP protocol number of the
protocol for which you want to create an alias. 5. In the Port Type section, specify whether you want to define the port by a contiguous range of ports, or by
a list of non-contiguous port numbers. l If you selected Range, enter the starting and ending port numbers in the Starting Port and End Port
fields. l If you selected list, enter a comma-separated list of port numbers. 6. To limit the service alias to a specific application, click the Application Level Gateway (ALG) drop-down list and select one of the following service types l dhcp: Service is DHCP l dns: Service is DNS l ftp: Service is FTP l h323: Service is H323 l noe: Service is Alcatel NOE l rtsp: Service is RTSP l sccp: Service is SCCP l sip: Service is SIP l sips: Service is Secure SIP l svp: Service is SVP l tftp: Service is TFTP l vocera: Service is VOCERA 7. Click Apply to save your changes.
In the CLI
To define a service alias via the command-line interface, issue the following command: (host)(config) #netservice <name> <protocol>|tcp|udp {list <port>,<port>}|{<port> [<port>]} [ALG <service>]

443 | Roles and Policies

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Creating an ACL White List
The ACL White List consists of rules that explicitly permit or deny session traffic from being forwarded to or blocked from the controller. The white list protects the controller during traffic session processing by prohibiting traffic from being automatically forwarded to the controller if it was not specifically denied in a blacklist. The maximum number of entries allowed in the ACL White List is 64. To create an ACL white list, you must first define a white list bandwidth contract, and then assign it to an ACL.
Creating a Bandwidth Contract in the WebUI
1. Navigate to the Configuration > Advanced Services > Stateful Firewall > White List BW Contracts page.
2. Click Add to create a new contract. 3. In the White list contract name field, enter the name of a bandwidth contract. 4. The Bandwidth Rate field allows you to define a bandwidth rate in either kbps or Mbps. Enter a rate value
the Bandwidth rate field, then click the drop-down list and select either kbps or Mbps. 5. Click Done.
Configuring the ACL White List in the WebUI
1. Navigate to the Configuration > Stateful Firewall> ACL White Listpage. 2. To add an entry, click the Addbutton at the bottom of the page. The Add New Protocolsection displays. 3. Click the Action drop-down list and select Permit or Deny. Permit allows session traffic to be forwarded
to the controller while Deny blocks session traffic. 4. Click the IP Version drop-down list and select theIPv4 or IPv6 filter. You need to select one of three
following choices from the Source drop-down list: n For a specific IPv4 or IPv6 filter, select IP/Mask. Enter the IP address and mask of the IPv4 or IPv6 filter
in the corresponding fields. n For a IPv4 or IPv6 host, select Any and enter the source address. 5. In the IP Protocol Number or IP Protocol field, enter the number for a protocol or select the protocol from the drop-down list used by session traffic. 6. In the Starting Ports field, enter a starting port. This is the first port, in the port range, on which permitted or denied session traffic is running. Port range: 1­65535. 7. In the End Ports field, enter an ending port. This is the last port, in the port range, on which permitted or denied session traffic is running. Port range: 1­65535. 8. (Optional) Click the White list Bandwidth Contract drop-down list and specify the name of a bandwidth contract to apply to the session traffic. For further information on creating Bandwidth Contracts, see User Roles on page 445 9. Click Done. The ACL displays on the white list section. 10.To delete an entry, click Delete next to the entry you want to delete. 11.Click Apply to save changes.
Creating a Bandwidth Contract in the CLI
(host)(config) #cp-bandwidth-contract
Configuring the ACL White List in the CLI
Use the following CLI command to create ACL White Lists. (host) (config)firewall cp

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Roles and Policies | 444

User Roles
User roles are comprised of user role settings, firewall policies, and bandwidth contracts. This section describes the procedure to create a new user role, and associate a firewall policy with that role.
This section describes how to create a new user role. When you create a user role, you must specify one or more firewall policies for the role.
In the WebUI
1. Navigate to the Configuration > Security > Access Control > User Roles page. 2. Click Add to create and configure a new user role. 3. Enter a user role name. 4. Under Firewall Policies, click Add. 5. Select one of the following three options to add a policy to the role.
l To use an associate an existing policy to the user role, select Choose from Configured Policies then select an existing policy from the drop-down list.
l to create a new policy based upon the settings of an existing policy, select Create New Policy from Existing Policy drop-down list, then select an existing policy from the drop-down list. The Policies page appears, allowing you to configure a new firewall policy.
l To create and configure an entirely new policy, select Create New Policy, then click Create. The Policies page appears, allowing you to configure a new firewall policy.
For more information on creating a firewall policy, see Configuring Firewall Policies on page 438.
6. Click Done to add the policy to the user role. 7. (Optional) If the user role contains more than one firewall policy, use the up and down arrows to assign
priorities to each role. The higher the policy on the list, the higher its priority. 8. In the Misc. Configuration section, enter configuration values as described in Table 83. 9. Click Apply. 10.Next, you must assign the user role to a AAA profile. After assigning the user role you can use the show
reference user-role <role> command to see the profiles that reference this user role.For more information, see Assigning User Roles on page 447

445 | Roles and Policies

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 83: User Role Parameters

Field

Description

Role name

Name of the user role

Re-authentication Interval (optional)

Time, in minutes, after which the client is required to reauthenticate. Enter a value between 0-4096. 0 disables reauthentication.
Default: 0 (disabled)

Role VLAN ID (optional)

By default, a client is assigned a VLAN on the basis of the ingress VLAN for the client to the controller. You can override this assignment and configure the VLAN ID that is to be assigned to the user role. You configure a VLAN by navigating to the Configuration > Network > VLANs page.

Bandwidth Contract (optional)

You can assign a bandwidth contract to provide an upper limit to upstream or downstream bandwidth utilized by clients in this role. You can select the Per User option to apply the bandwidth contracts on a per-user basis instead of to all clients in the role.
For more information, see User Roles on page 445.

VPN Dialer (optional)

This assigns a VPN dialer to a user role. For details about VPN dialer, see Virtual Private Networks on page 411.
Select a dialer from the drop-down list and assign it to the user role. This dialer will be available for download when a client logs in using captive portal and is assigned this role.

L2TP Pool (optional)

This assigns an L2TP pool to the user role. For more details about L2TP pools, see Virtual Private Networks on page 411.
Select the required L2TP pool from the list to assign to the user role. The inner IP addresses of VPN tunnels using L2TP will be assigned from this pool of IP addresses for clients in this user role.

PPTP Pool (optional)

This assigns a PPTP pool to the user role. For more details about PPTP pools, see Virtual Private Networks on page 411.
Select the required PPTP pool from the list to assign to the user role. The inner IP addresses of VPN tunnels using PPTP will be assigned from this pool of IP addresses for clients in this user role.

Captive Portal Profile (optional)

This assigns a Captive Portal profile to this role. For more details about Captive Portal profiles, see Captive Portal Authentication on page 372.

Captive Portal Check for Accounting

This setting is enabled by default. If disabled, RADIUS accounting is done for an authenticated users irrespective of the captive-portal profile in the role of an authenticated user. If enabled, accounting is not done as long as the user's role has a captive portal profile on it. Accounting will start when Auth/XML-Add/CoA changes the role of an authenticated user to a role which doesn't have captive portal profile.

Max Sessions

This parameter configures the maximum number of sessions per user in this role. If the sessions reach the maximum value, any additional sessions from this user that are reaching the threshold are blocked till the session usage count for the user falls back below the configured limit.
The default is 65535. You can configure any value between 0-65535.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Roles and Policies | 446

To a delete a user role in the WebUI:
1. Navigate to the Configuration > Security > Access Control > User Roles page. 2. Click the Delete button against the role you want to delete.
You cannot delete a user-role that is referenced to profile or server derived role. Deleting a server referenced role will result in an error. Remove all references to the role and then perform the delete operation.
In the CLI
The commands to associate an access control list (ACL) to a user role vary, depending upon the type of access control list being associated to that role. User roles are applied globally across all controllers, so ethertype, MAC and session ACLs can be applied to global user roles. However, routing access lists may vary between locations, so they are mapped to a user role in a local configuration setting.
To associate the user role with an ethertype, MAC or session ACL, use the command user-role <role> accesslist eth|mac|session <acl>. To associate a user role with a routing ACL, use the routing-policy-map command.
Assigning User Roles
A client is assigned a user role by one of several methods. A role assigned by one method may take precedence over one assigned by a different method. The methods of assigning user roles are, from lowest to highest precedence:
1. The initial user role or VLAN for unauthenticated clients is configured in the AAA profile for a virtual AP (see Access Points on page 566).
2. The user role can be derived from user attributes upon the client's association with an AP (this is known as a user-derived role). You can configure rules that assign a user role to clients that match a certain set of criteria. For example, you can configure a rule to assign the role VoIP-Phone to any client that has a MAC address that starts with bytes xx:yy:zz.User-derivation rules are executed before client authentication.
3. The user role can be the default user role configured for an authentication method, such as 802.1x or VPN. For each authentication method, you can configure a default role for clients who are successfully authenticated using that method.
4. The user role can be derived from attributes returned by the authentication server and certain client attributes (this is known as a server-derived role). If the client is authenticated via an authentication server, the user role for the client can be based on one or more attributes returned by the server during authentication, or on client attributes such as SSID (even if the attribute is not returned by the server). Server-derivation rules are executed after client authentication.
5. The user role can be derived from Dell Vendor-Specific Attributes (VSA) for RADIUS server authentication. A role derived from a Dell VSA takes precedence over any other user roles.
The following sections describe the methods of assigning user roles.
Assigning User Roles in AAA Profiles
An AAA profile defines the user role for unauthenticated clients (initial role) as well as the default user role for MAC and 802.1x authentication. For additional information on creating AAA profiles, see WLAN Authentication on page 499.
In the WebUI
1. Navigate to the Configuration > Security > Authentication > AAA Profiles page. 2. Select the default profile or a user-defined AAA profile.

447 | Roles and Policies

Dell Networking W-Series ArubaOS 6.4.x | User Guide

3. Click the Initial Role drop-down list, and select the desired user role for unauthenticated users. 4. Click the 802.1x Authentication Default Role drop-down list and select the desired user role for users
who have completed 802.1x authentication. 5. Click the MAC Authentication Default Role drop-down list and select the desired user role for clients
who have completed MAC authentication. 6. Click Apply.
In the CLI
(host)(config) #aaa profile <profile>
Working with User-Derived VLANs
Attributes derived from the client's association with an AP can be used to assign the client to a specific role or VLAN, as user-derivation rules are executed before the client is authenticated. You configure the user role or VLAN to be assigned to the client by specifying condition rules; when a condition is met, the specified user role or VLAN is assigned to the client. You can specify more than one condition rule; the order of rules is important as the first matching condition is applied. You can optionally add a description of the user rule. Table 84 describes the conditions for which you can specify a user role or VLAN.

Table 84: Conditions for a User-Derived Role or VLAN

Rule Type

Condition

Value

BSSID: Assign client to a role or VLAN based upon the BSSID of AP to which client is associating.

One of the following: l contains l ends with l equals l does not equal l starts with

MAC address (xx:xx:xx:xx:xx:xx)

DHCP-Option: Assign client to a role or VLAN based upon the DHCP signature ID.

One of the following: l equals l starts with

DHCP signature ID.
NOTE: This string is not case sensitive.

DHCP-Option-77: Assign client to a role or VLAN based upon the user class identifier returned by DHCP server.

equals

string

Encryption: Assign client to a role or VLAN based upon the encryption type used by the client.

One of the following: l equals l does not equal

l Open (no encryption) l WPA/WPA2 AES l WPA-TKIP (static or dynamic) l Dynamic WEP l WPA/WPA2 AES PSK l Static WEP

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Roles and Policies | 448

Rule Type

Condition

Value l xSec

ESSID: Assign client to a role or VLAN based upon the ESSID to which the client is associated

One of the following:
l contains
l ends with
l equals
l does not equal
l starts with
l value of (does not take string; attribute value is used as role)

string

Location: Assign client to a role or VLAN based upon the ESSID to which the client is associated

One of the following: l equals l does not equal

string

MAC address of the client

One of the following: l contains l ends with l equals l does not equal l starts with

MAC address (xx:xx:xx:xx:xx:xx)

Understanding Device Identification
The device identification feature allows you to assign a user role or VLAN to a specific device type by identifying a DHCP option and signature for that device. If you create a user rule with the DHCP-Option rule type, the first two characters in the Value field must represent the hexadecimal value of the DHCP option that this rule should match, while the rest of the characters in the Value field indicate the DHCP signature the rule should match. To create a rule that matches DHCP option 12 (host name), the first two characters of the in the Value field must be the hexadecimal value of 12, which is 0C. To create a rule that matches DHCP option 55, the first two characters in the Value field must be the hexadecimal value of 55, which is 37.
The following table describes some of the DHCP options that are useful for assigning a user role or VLAN.

DHCP Option values

DHCP Option

Description

Hexadecimal Equivalent

12

Host name

0C

55

Parameter Request List

37

60

Vendor Class Identifier

3C

449 | Roles and Policies

Dell Networking W-Series ArubaOS 6.4.x | User Guide

DHCP Option 81

Description Client FQDN

Hexadecimal Equivalent 51

The device identification features in ArubaOS can also automatically identify different client device types and operating systems by parsing the User-Agent strings in the client's HTTP packets. To enable this feature, select the Device Type Classification option in the AP's AAA profile. For details, see WLAN Authentication on page 499.
Configuring a User-derived VLAN in the WebUI
1. Navigate to the Configuration > Security > Authentication > User Rules page. 2. Click Add to add a new set of derivation rules. Enter a name for the set of rules, and click Add. The name
appears in the User Rules Summary list. 3. In the User Rules Summary list, select the name of the rule set to configure rules. 4. Click Add to add a rule. For Set Type, select the VLAN name or ID from the VLAN the drop-down menu.
(You can select VLAN to create d>erivation rules for setting the VLAN assigned to a client.) 5. Configure the condition for the rule by setting the Rule Type, Condition, Value parameters and optional
description of the rule. See Table 84 for descriptions of these parameters. 6. Select the role assigned to the client when this condition is met. 7. Click Add. 8. You can configure additional rules for this rule set. When you have added rules to the set, use the up or
down arrows in the Actions column to modify the order of the rules. (The first matching rule is applied.) 9. Click Apply. 10.(Optional) If the rule uses the DHCP-Option condition, best practices is to enable the Enforce DHCP
parameter in the AP group's AAA profile, which requires users to complete a DHCP exchange to obtain an IP address. For details on configuring this parameter in an AAA profile, see WLAN Authentication on page 499.
Configuring a User-derived Role or VLAN in the CLI
(host)(config) #aaa derivation-rules user <name>
User-Derived Role Example
The example rule shown in Figure 58 below sets a user role for clients whose host name (DHCP option 12) has a value of 6C6170746F70, which is the hexadecimal equivalent of the ASCII string laptop. The first two digits in the Value field are the hexadecimal value of 12 (which is 0C), followed by the specific signature to be matched.
There are many online tools available for converting ASCII text to a hexadecimal string.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Roles and Policies | 450

Figure 58 DHCP Option Rule

To identify DHCP strings used by an individual device, access the command-line interface in config mode and issue the command logging level debugging network process dhcpd to include DHCP option values for DHCP-DISCOVER and DHCP-REQUEST frames in the controller's log files:
Now, connect the device you want to identify to the network, and issue the CLI command show log network to view the DHCP strings.
Be aware that each device type may not have a unique DHCP fingerprint signature. For example, devices from different manufacturers may use vendor class identifiers that begin with similar strings. If you create a DHCPOption rule that uses the starts-with condition instead of the equals condition, the rule may assign a role or VLAN to more than one device type.
RADIUS Override of User-Derived Roles
This feature introduces a new RADIUS vendor specific attribute (VSA) named "Aruba-No-DHCP-Fingerprint," value 14. This attribute signals the RADIUS Client (controller) to ignore the DHCP Fingerprint user role and VLAN change post L2 authentication. This feature applies to both CAP and RAP in tunnel mode and for the L2 authenticated role only.
Configuring a Default Role for Authentication Method
For each authentication method, you can configure a default role for clients who are successfully authenticated using that method. To configure a default role for an authentication method:
In the WebUI
1. Navigate to the Configuration > Security > Authentication page. 2. To configure the default user role for MAC or 802.1x authentication, select the AAA Profiles tab. Select the
AAA profile. Enter the user role for MAC Authentication Default Role or 802.1x Authentication Default Role. 3. To configure the default user role for other authentication methods, select the L2 Authentication or L3
Authentication tab. Select the authentication type (Stateful 802.1x or stateful NTLM for L2 Authentication, Captive Portal or VPN for L3 Authentication), and then select the profile. Enter the user role for Default Role. 4. Click Apply.
For additional information on configuring captive portal authentication, see Captive Portal Authentication on page 372.
In the CLI
To configure the default user role for MAC or 802.1x authentication:

451 | Roles and Policies

Dell Networking W-Series ArubaOS 6.4.x | User Guide

(host)(config) #aaa profile <profile>
To configure the default user role for other authentication methods: (host)(config) #aaa authentication captive-portal|stateful-dot1x|stateful-ntlm|vpn
Configuring a Server-Derived Role
If the client is authenticated through an authentication server, the user role for the client can be based on one or more attributes returned by the server during authentication. You configure the user role to be derived by specifying condition rules; when a condition is met, the specified user role is assigned to the client. You can specify more than one condition rule; the order of rules is important as the first matching condition is applied. You can also define server rules based on client attributes such as ESSID, BSSID, or MAC address, even though these attributes are not returned by the server.
For information about configuring a server-derived role, see Configuring Server-Derivation Rules on page 270.
Configuring a VSA-Derived Role
Many Network Address Server (NAS) vendors, including Dell, use VSAs to provide features not supported in standard RADIUS attributes. For Dell systems, VSAs can be employed to provide the user role and VLAN for RADIUS-authenticated clients, however the VSAs must be present on your RADIUS server. This involves defining the vendor (Dell) and/or the vendor-specific code (14823), vendor-assigned attribute number, attribute format (such as string or integer), and attribute value in the RADIUS dictionary file. VSAs supported on controllers conform to the format recommended in RFC 2865, "Remote Authentication Dial In User Service (RADIUS)".
For more information on Dell VSAs, see RADIUS Server VSAs on page 254. Dictionary files that contain Dell VSAs are available on the Dell support website for various RADIUS servers. Log into the Dell support website to download a dictionary file from the Tools folder.
Understanding Global Firewall Parameters
Table 85 describes optional firewall parameters you can set on the controller for IPv4 traffic. To set these options in the WebUI, navigate to the Configuration > Advanced Services > Stateful Firewall > Global Setting page and select or enter values in the IPv4 column. To set these options in the CLI, use the firewall configuration commands.
See IPv6 Support on page 198 for information about configuring firewall parameters for IPv6 traffic.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Roles and Policies | 452

Table 85: IPv4 Firewall Parameters

Parameter

Description

Monitor Ping Attack (per 30 seconds)

Number of ICMP pings per 30 second, which if exceeded, can indicate a denial of service attack. Valid range is 1-16384 pings per 30 seconds.
Recommended value is 120 seconds.
Default: No default

Monitor TCP SYN Attack rate (per 30 seconds)

Number of TCP SYN messages per 30 second, which if exceeded, can indicate a denial of service attack. Valid range is 1-16384 pings per 30 seconds.
Recommended value is 960 seconds.
Default: No default

Monitor IP Session Attack (per 30 seconds)

Number of TCP or UDP connection requests per 30 second, which if exceeded, can indicate a denial of service attack. Valid range is 1-16384 requests per 30 seconds.
Recommended value is 960 seconds.
Default: No default

Monitor/Police ARP Attack (non Gratuitous ARP) rate (per 30 seconds)

Number of ARP packets (other than Gratuitous ARP packets) per 30 seconds, which if exceeded, can indicate a denial of service attack. Valid range is 1-16384 packets per 30 seconds.
Recommended value is 960 packets.
Default: No default NOTE: Blacklisting of wired clients is not supported.

Monitor/Police CP Attack rate (per 30 seconds)

Rate of misbehaving user's traffic, which if exceeded, can indicate a denial or service attack.
Recommended value is 3000 frames per 30 seconds.
Default: No default

Monitor/Police Gratuitous ARP Attack rate (per 30 seconds)

Number of Gratuitous ARP packets per 30 seconds, which if exceeded, can indicate denial of service attack. Valid range is 1-16384 packets per 30 seconds.
Recommended value is 50 packets.
Default: 50 packets NOTE: Blacklisting of wired clients is not supported.

Deny Inter User Bridging

Prevents the forwarding of Layer-2 traffic between wired or wireless users. You can configure user role policies that prevent Layer-3 traffic between users or networks but this does not block Layer-2 traffic. This option can be used to prevent traffic, such as Appletalk or IPX, from being forwarded.
Default: Disabled

453 | Roles and Policies

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter Deny Inter User Traffic Deny Source Routing
Deny All IP Fragments Enforce TCP Handshake Before Allowing Data
Prohibit IP Spoofing
Prohibit RST Replay Attack Log ICMP Errors Stateful SIP Processing

Description
Denies traffic between untrusted users by disallowing layer-2 and layer-3 traffic. This parameter does not depend on the deny-inter-userbridging parameter being enabled or disabled. Default: Disabled
Permits the firewall to reject and log packets with the specified IP options loose source routing, strict source routing, and record route. Note that network packets where the IPv6 source or destination address of the network packet is defined as an "link-local address (fe80::/64) are permitted. Default: Disabled
Drops all IP fragments. NOTE: Do not enable this option unless instructed to do so by a Dell representative. Default: Disabled
Prevents data from passing between two clients until the three-way TCP handshake has been performed. This option should be disabled when you have mobile clients on the network as enabling this option will cause mobility to fail. You can enable this option if there are no mobile clients on the network. Default: Disabled
Enables detection of IP spoofing (where an intruder sends messages using the IP address of a trusted client). When this option is enabled, source and destination IP and MAC addresses are checked for each ARP request/response. Traffic from a second MAC address using a specific IP address is denied, and the entry is not added to the user table. Possible IP spoofing attacks are logged and an SNMP trap is sent. Default: Enabled
When enabled, closes a TCP connection in both directions if a TCP RST is received from either direction. You should not enable this option unless instructed to do so by a Dell representative. Default: Disabled
Enables logging of received ICMP errors. You should not enable this option unless instructed to do so by a Dell representative. Default: Disabled
Disables monitoring of exchanges between a voice over IP or voice over WLAN device and a SIP server. This option should be enabled only when there is no VoIP or VoWLAN traffic on the network. Default: Disabled (stateful SIP processing is enabled)

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Roles and Policies | 454

Parameter Allow Tri-session with DNAT Amsdu Configuration Session Mirror Destination
Session Idle Timeout (sec) Disable FTP Server GRE Call ID Processing Per-packet Logging
Broadcast-filter ARP

Description
Allows three-way session when performing destination NAT. This option should be enabled when the controller is not the default gateway for wireless clients and the default gateway is behind the controller. This option is typically used for captive portal configuration. Default: Disabled.
Enables handling AMSDU traffic from clients. Default: Disabled
Destination (IP address or port) to which mirrored session packets are sent. This option is used only for troubleshooting or debugging. Packets can be mirrored in multiple ACLs, so only a single copy is mirrored if there is a match within more than one ACL. You can configure the following: l Ethertype to be mirrored with the Ethertype ACL mirror option. l IP flows to be mirrored with the session ACL mirror option. l MAC flows to be mirrored with the MAC ACL mirror option. l If you configure both an IP address and a port to receive mirrored
packets, the IP address takes precedence. Default: N/A
Set the time, in seconds, that a non-TCP session can be idle before it is removed from the session table. Specify a value in the range 16-259 seconds. You should not set this option unless instructed to do so by a Dell representative. Default: 15 seconds
Disables the FTP server on the controller. Enabling this option prevents FTP transfers. You should not enable this option unless instructed to do so by a Dell representative. Default: Disabled (FTP server is enabled)
Creates a unique state for each PPTP tunnel. You should not enable this option unless instructed to do so by a Dell representative. Default: Disabled
Enables logging of every packet if logging is enabled for the corresponding session rule. Normally, one event is logged per session. If you enable this option, each packet in the session is logged. You should not enable this option unless instructed to do so by a Dell representative, as doing so may create unnecessary overhead on the controller. Default: Disabled (per-session logging is performed)
Reduces the number of broadcast packets sent to VoIP clients, thereby improving the battery life of voice handsets. You can enable this option for voice handsets in conjunction with increasing the DTIM interval on

455 | Roles and Policies

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter

Description
clients. Default: Disabled

Prohibit ARP Spoofing

Detects and prohibits ARP spoofing. When this option is enabled, possible arp spoofing attacks are logged and an SNMP trap is sent.
Default: Disabled

Prevent DHCP exhaustion

Enable check for DHCP client hardware address against the packet source MAC address. This command checks the frame's source-MAC against the DHCPv4 client hardware address and drops the packet if it does not match. Enabling this feature prevents a client from submitting multiple DHCP requests with different hardware addresses, thereby preventing DHCP pool depletion.
Default: Disabled

Session VOIP Timeout (sec)

Sets the idle session timeout for sessions that are marked as voice sessions. If no voice packet exchange occurs over a voice session for the specified time, the voice session is removed. Range is 16 ­ 300 seconds.
Default: 300 seconds

Stateful H.323 Processing

Disables stateful H.323 processing. Default: Enabled

Stateful SCCP Processing

Disables stateful SCCP processing. Default: Disabled

Only allow local subnets in user table

Adds only IP addresses, which belong to a local subnet, to the usertable.
Default: Disabled

Session mirror IPSEC

Configures session mirroring of all frames that are processed by IPsec. Frames are sent to IP address specified by the session-mirrordestination option.
NOTE: Use this option for debugging or troubleshooting only.
Default: Disabled

Session-tunnel FIB Multicast automatic shaping

Enable session-tunnel based forwarding. NOTE: Best practices is to enable this parameter only during maintenance window or off-peak production hours.
Enables multicast optimization and provides excellent streaming quality regardless of the amount of VLANs or IP IGMP groups that are used. Default: Disabled

Stateful VOCERA Processing

Disables stateful VOCERA processing.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Roles and Policies | 456

Parameter

Description Default: Disabled

Stateful UA Processing

Disables stateful UA processing. Default: Disabled

Enforce bw contracts for broadcast traffic

Applies bw contracts to local subnet broadcast traffic.

Enforce TCP Sequence numbers

Enforces the TCP sequence numbers for all packets. Default:Disabled

Enforce WMM Voice Priority Matches Flow Content

If traffic to or from the user is inconsistent with the associated QoS policy for voice, the traffic is reclassified to best effort and data path counters incremented.
Default: Disabled

Rate limit CP untrusted ucast traffic (pps)

Specifies the untrusted unicast traffic rate limit. Range is 1-65535 packets per seconds (pps).
Default: 9765 pps

Rate limit CP untrusted mcast traffic (pps)

Specifies the untrusted multicast traffic rate limit. Range is 1-65535 packets per seconds (pps).
Default: 1953 pps

Rate limit CP trusted ucast traffic (pps)

Specifies the trusted unicast traffic rate limit. Range is 1-65535 packets per seconds (pps).
Default: 65535 pps

Rate limit CP trusted mcast traffic (pps)

Specifies the trusted multicast traffic rate limit. Range is 1-65535 packets per seconds (pps).
Default: 1953 pps

Rate limit CP route traffic (pps)

Specifies the traffic rate limit that needs ARP requests. Range is 165535 packets per seconds (pps).
Default: 976 pps

Rate limit CP session mirror traffic (pps)

Specifies the session mirrored traffic forwarded to the controller. Range is 1-65535 packets per seconds (pps).
Default: 976 pps

Rate limit CP auth process traffic (pps)

Specifies the traffic rate limit that is forwarded to the authentication process. Range is Range is 1-65535 packets per seconds (pps).
Default: 976 pps

457 | Roles and Policies

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Using AppRF 2.0
The AppRF 2.0 feature improves application visibility and control by allowing you to configure access control list (ACL) and bandwidth-control applications and application categories. AppRF 2.0 supports a Deep Packet Inspection (DPI) engine for application detection for over a thousand applications. All wired and wireless traffic that traverses the controller can now be categorized and controlled by application and application category. AppRF 2.0 provides the ability to: l permit or deny an application or application category for a specific role. For example, you can block
bandwidth monopolizing applications on a guest role within an enterprise. l rate limit an application or application category, such as video streaming applications, globally or for a
specific role. l mark different L2/L3 Quality of Service (QoS) for an application or application category for a user role. For
example, you can mark video and voice sessions that originate from wireless users with different priorities so that traffic is prioritized accordingly in your network. To configure AppRF 2.0, see the following topics: l Enabling Deep Packet Inspection (DPI) on page 458 l Configuring Policies for AppRF 2.0 on page 458 l Configuring Bandwidth Contracts for AppRF 2.0 on page 461
Enabling Deep Packet Inspection (DPI)
For application and application category specific configuration to take affect, you must first enable DPI.
You must reboot (reload) the controller after you enable or disable DPI for global classification to take effect.
In the WebUI
1. Navigate to Configuration > Advanced Services > Stateful Firewall > Global Settings. 2. Check the Enable Deep Packet Inspection option. To disable DPI, uncheck the checkbox. 3. Click Apply. 4. Reload the controller.
In the CLI
To enable global DPI: (host)(config) #firewall dpi (host) #reload To display the application ID, application name, and the ACL/ACE index information for a given session: (host)(config) #how datapath session dpi
Configuring Policies for AppRF 2.0
Access control lists now contain new application and application category options that let you permit or deny an application or application category on a given role. See the Dashboard Monitoring AppRF topic for details about configuring policies from the Dashboard.
How ACL Works with AppRF
A session entry proceeds through two phases: the application detection phase (phase 1) and the postapplication detection phase (phase 2). A session ACL is applied in phase1 and in phase 2.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Roles and Policies | 458

In phase1, if the session ACL lookup results in an L3/L4 ACE entry request, the traffic pertaining to the session is guided by this L3/L4 ACE entry. However, if the session ACL lookup results in an application/application category specific ACE entry, the enforcement is postponed until phase 2. Once the application is determined, the session ACL is re-applied with "application/application category" information to determine the final action on the traffic.
Global Session ACL
The Global Session ACL is used to configure ACL rules that span across or are common to all roles. They are applied to all roles. The "global-sacl" rules take precedence over any other ACLs that may be in the user role.
A new session ACL has been added named "global-sacl." This session, by default, is in position one for every user role configured on the controller. The global-sacl session ACL has the following properties:
l It cannot be deleted. l It always remains at position one in every role and its position cannot be modified. l It contains only application rules. l It can be modified in the WebUI, CLI, and dashboard on a master controller. l Any modifications to it resulst in the regeneration of ACE's of all roles.
Role Default Session ACL
You can configure role-specific application configuration using the WebUI and dashboard. For example, you can deny the facebook application on the guest role using the CLI or dashboard without having to change the firewall configuration. This per-user role configuration from WebUI or Dashboard is placed in the Role Default Session ACL.
A new role session ACL named apprf-"role-name"-sacl has been added. This session, by default, is in position two for every user role configured on the controller.
The string "apprf" is added to the beginning and "sacl" to the end of a role's name to form a controllerunique name for role default session ACL. This session ACL is in position two of the given user role after the global session ACL and takes the next higher priority after global policy rules.
The predefined role session ACL has the following properties:
l It cannot be deleted through the WebUI or CLI. It it is only deleted automatically when the corresponding role is deleted.
l It always remains at position 2 in every role and its position cannot be modified. l It contains only application rules. l It can be modified using the WebUI, CLI, or dashboard on a master controller, however any modification
results in the regeneration of ACE's for that role. l It cannot be applied to any other role.
Each application has an implicit set of ports that are used for communication. In phase 1, if an application ACE entry is hit, the traffic matching this application's implicit port is allowed (as governed by the application ACE). The DPI engine can monitor the exchange on these ports and determine the application. Once the application is determined, phase 2 occurs when an evaluation is done to determine the final outcome for the session.
Example
This example shows a DPI rule along with a L3/L4 rule with forwarding action in the same ACL. Both ACL policies can be applied to a single user role.
ACL Policy "AppRules", Policy Type: Session
l Rule 1 n source: any

459 | Roles and Policies

Dell Networking W-Series ArubaOS 6.4.x | User Guide

n destination: any n service/application: application facebook n action: permit n TOS value: 45 l Rule 2: n source: any n destination: any n service/application: application YouTube n action: deny l Rule 3: n source: any n destination: any n service/application: application category peer-to-peer n action: deny l Rule 4: n source: any n destination: any n service/application: TCP 23 n action: permit l Rule 5: n source: network 40.1.0.0/16 n destination: any n service/application: TCP 80 n action: permit n TOS: 60 l Rule 6: n source: network 20.1.0.0/16 n destination: any n service/application: TCP 80 n action: source-nat ACL Policy "NetRules", Policy Type: Session l Rule 1 n source: network 80.0.0.0/24 n destination: any n service/application: TCP 80 n action: deny l Rule 2: n source: network 60.0.0.0/24 n destination: any n service/application: TCP 80 n action: dual-nat <nat_pool> l Rule 3:
Dell Networking W-Series ArubaOS 6.4.x | User Guide

Roles and Policies | 460

n source: network 10.0.0.0/24 n destination: any n service/application: TCP 80 n action: destination nat
In the WebUI 1. Navigate to Configuration > Access Control > Policies. 2. Click Add/Edit. 3. Click Add under Rules/IP Version. 4. Select application or application category from the Service drop-down menu and select configuration
options. 5. Click Apply.
In the CLI To configure the ACL application-specific parameters using the command-line interface, access the commandline interface in config mode, run the following commands: (host)(config)#ip access-list
Configuring Bandwidth Contracts for AppRF 2.0
Bandwidth contract configuration lets you configure bandwidth contracts for both the global or applicationspecific levels.
Global Bandwidth Contract Configuration
To configure bandwidth contracts to limit application and application categories on an application or global level, or to show global bandwidth contract configuration output, access the command-line interface and use the commands dpi global-bandwidth-contract and show dpi global-bandwidth-contract. (host)(config) #dpi global-bandwidth-contract[app|appcategory] (host) #show dpi global-bandwidth-contract
Role-Specific Bandwidth Contracts
Application-specific bandwidth contracts (unlike "generic" bandwidth-contracts) allow you to control or reserve rates for specific applications only on a per-role basis. An optional exclude list is provided that allows you to exclude applications or application categories on which a generic user/role bandwidth-contract is not applied.
Using an Exclude List Use an exclude to give specific enterprise mission-critical applications priority over other user traffic. An enterprise may have well known applications such as Microsoft Exchange, SAP, Oracle, accounting and finance applications, and other enterprise resource planning (ERP) or customer relationship management (CRM) applications.
Instead of enumerating bandwidth limits for each application individually on a per-user/per-role basis, you can configure a single bandwidth contract on a per-user/per-role to limit all non-mission critical applications. You can then exclude all mission-critical applications by placing them in an exclude list. This way all mission-critical applications will not be rate-limited. Important points regarding bandwidth contracts include:
l Application bandwidth contracts are per-role by default. l When an application bandwidth-contract is configured for both a category and an application within the
category, always apply the most specific bandwidth contract.

461 | Roles and Policies

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the WebUI 1. Navigate to Configuration > Security > Access Control > User Roles. 2. Click Add to create a new user role or Edit to modify an existing role. 3. Select the Bandwidth Contracts tab. 4. To exclude an application or application category, click the Add button below the Exceptions section, select
an item from the Name drop-down menu and click Done. 5. To add an application or application category to a bandwidth contract, click Add under Application
Bandwidth Contracts. 6. Select the application from the Name drop-down me and whether it is enforced. 7. Enter a name of the new bandwidth contract, the bandwidth in kpbs or mbps, and if downstream is
enforced. 8. Select an option from the Downstream drop-down menu and Per Role, Per User, or Per AP Group from the
adjacent drop-down menu. 9. Select additional configuration parameters from the Misc. Configuration pane.
Make sure that the Enable Deep Packet Inspection option is checked.
10.Click Apply.
In the CLI To configure the bandwidth application-specific parameters using the CLI, access the command-line interface in config mode, and issue the following commands: (host)config t #user-role <string> (host)(config-role) #bw-contract exclude

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Roles and Policies | 462

Chapter 18 ClearPass Policy Manager Integration

ArubaOS and ClearPass Policy Manager (CPPM) include support for centralized policy definition and distribution. ArubaOS now supports downloadable roles. By using this feature, when CPPM successfully authenticates a user, the user is assigned a role by CPPM and if the role is not defined on the controller, the role attributes can also be automatically downloaded.
This chapter contains the following sections:
n Introduction on page 463 n Important Points to Remember on page 463 n Enabling Downloadable Role on a Controller on page 464 n Sample Configuration on page 464
Introduction
In order to provide highly granular per-user level access, user roles can be created when a user has been successfully authenticated. During the configuration of a policy enforcement profile at CPPM, the administrator can define a role that should be assigned to the user after successful authentication. In RADIUS authentication, when CPPM successfully authenticates a user, the user is assigned a role by CPPM and if the role is not defined on the controller, the role attributes can also be automatically downloaded. This feature supports roles obtained by the following authentication methods:
l 802.1x (wireless and wired users) l MAC authentication l Captive Portal
Important Points to Remember
l Under Advanced mode, CPPM does not perform any error checking to confirm accuracy of the role definition. Therefore, it is recommended that you review the role defined in CPPM prior to enabling this feature.
l Attributes that are listed below, herein referred to as whitelist role attributes, can be defined in CPPM. n netdestination n netservice n ip access-list eth n ip access-list mac n ip access-list session n user-role
l The above attributes that are referred to by a role definition must either be defined within the role definition itself or configured on the controller before the policy is downloaded.
l In CPPM, two or more attributes (as listed above) should not have the same name. The example below is considered invalid, as both the attributes have test as the profile/net destination name. qos-profile test netdestination test

Dell Networking W-Series ArubaOS 6.4.x| User Guide

ClearPass Policy Manager Integration | 463

l An instance name (name of a whitelist role attribute as stated above) is case-sensitive. Attributes must adhere to the following rules: n Should not match any CLI option nested under a command from the whitelist. n Should not contain a number or a combination of numbers. n Should not contain any periods '.'. n Should not contain any spaces. The example below is considered an invalid configuration and will fail CPPM role download on a controller: netservice 'tcp' tcp 443 The first instance of tcp is a user-defined field, while the second is an operator of the netservice command. This violates the first rule. netdestination 'alias' The user-defined name alias is also a valid operator of the netdestination command. This violates the first rule. netdestination '10.1.5' This user-defined name uses both numbers and periods. This violates the second and third rule. ip access-list stateless '100' This user-defined name uses numbers. This violates the second rule. qos-profile emp role This profile name emp role contains spaces. This violates the fourth rule.
It is recommended that some naming convention similar to the CamelCase (mixture of upper and lower case letters in a single word) be used to avoid collisions with the CLI options in the role description.
Enabling Downloadable Role on a Controller
You can enable role download using the CLI or WebUI.
Using the WebUI
1. Navigate to the Configuration > Security > Authentication > AAA Profiles. 2. Select an AAA profile. 3. Check the Download Role from CPPM check box to enable role download.
Using the CLI
(host) (config) #aaa profile <profile-name> (host) (AAA profile) #download-role
Sample Configuration
The following example shows the configuration details to integrate CPPM server with a controller to automatically download roles.
CPPM Server Configuration
Adding a Device
1. From the Configuration > Network > Devices page, click the Add Device link. 2. On the Device tab, enter the Name, IP or Subnet Address, and RADIUS Shared Secret fields.
Keep the rest of the fields as default.

464 | ClearPass Policy Manager Integration

Dell Networking W-Series ArubaOS 6.4.x | User Guide

3. Click Add. The fields are described in Figure 59 and Table 86. Figure 59 Device Tab

Table 86: Device Tab Container

Description

Name

Specify the name or identity of the device.

IP or Subnet Address Specify the IP address or subnet (example 10.1.1.1/24) of the device.

RADIUS Shared Secret

Enter and confirm a Shared Secret for each of the two supported request protocols.

Adding Enforcement Profile
1. From Configuration > Enforcement > Profiles page, click Add Enforcement Profile. 2. On the Profile tab, select Aruba Downloadable Role Enforcement from the Template drop-down list. 3. Enter the Name of the enforcement profile. 4. From the Role Configuration Mode, select Advanced.
Keep the rest of the fields as default. 5. Click Next.
For the rest of the configuration, see Advanced Role Configuration Mode. The fields are described in Figure 60 and Table 87.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

ClearPass Policy Manager Integration | 465

Figure 60 Enforcement Profiles Page

Table 87: Enforcement Profiles Page

Container

Description

Template

Policy Manager comes pre-packaged with several enforcement profile templates. In this example, select Aruba Downloadable Role Enforcement - RADIUS template that can be filled with user role definition to create roles that can be assigned to users after successful authentication.

Name

Specify the name of the enforcement profile.

Role Configuration Mode

Standard--Configure enforcement profile role using standard mode. Advanced--Configure enforcement profile role using advanced mode.

Advanced Role Configuration Mode
1. On the Attributes tab, select Radius:Aruba from the Type drop-down list. 2. From the Name drop-down list, select Aruba-CPPM-Role. 3. In the Value field, enter the attribute for the downloadable-role. 4. Click the save icon to save the attribute. 5. Click Save to save the enforcement profile. The fields are described in Figure 61 and Table 88.

466 | ClearPass Policy Manager Integration

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 61 Enforcement Profiles Attributes Tab

Table 88: Enforcement Profiles Attributes Tab

Container

Description

Type

Type is any RADIUS vendor dictionary that is pre-packaged with Policy Manager, or imported by the Administrator. This field is pre-populated with the dictionary names.

Name

Name is the name of the attribute from the dictionary selected in the Type field. The attribute names are pre-populated from the dictionary.

Value

Value is attribute for the downloadable role. You can enter free-form text to define the role and policy.
NOTE: The maximum limit for free form text is 16,000 bytes.

Adding Enforcement Policy
1. From Configuration > Enforcement > Policies page, click Add Enforcement Policy. 2. On the Enforcement tab, enter the name of the enforcement policy. 3. From the Default Profile drop-down list, select [Deny Access Profile].
Keep the rest of the fields as default. 4. Click Next. The fields are described in Figure 62 and Table 89.
Figure 62 Enforcement Policies Enforcement Tab

Dell Networking W-Series ArubaOS 6.4.x | User Guide

ClearPass Policy Manager Integration | 467

Table 89: Enforcement Policies Enforcement Tab

Container

Description

Name

Specify the name of the enforcement policy.

Default Profile

An Enforcement Policy applies Conditions (roles, health, and time attributes) against specific values associated with those attributes to determine the Enforcement Profile. If none of the rules matches, Policy Manager applies the Default Profile.
See Adding Enforcement Profile on page 465 to add a new profile.

5. On the Rules tab, click Add Rule. 6. On the Rules Editor pop-up, select the appropriate values in the Conditions section and click the save
icon. 7. In the Enforcement Profiles section, select the RADIUS enforcement profile that you created in step
Adding Enforcement Profile on page 465 from the Profile Names drop-down list. 8. Click Save.
The fields are described in Figure 63 and Table 90.
Figure 63 Enforcement Policies Rules Editor

Table 90: Enforcement Policies Rules Editor

Container

Description

Type

The rules editor appears throughout the Policy Manager interface. It exposes different namespace dictionaries depending on Service type. When working with service rules, you can select Authentication namespace dictionary

Name

Drop-down list of attributes present in the selected namespace. In this example, select Source.

Operator

Drop-down list of context-appropriate (with respect to the attribute) operators. In this example, select EQUALS.

468 | ClearPass Policy Manager Integration

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Container Value
Profile Names

Description
Drop-down list of the Authentication source database. In this example, select [Local User Repository].
Name of the RADIUS enforcement profile.

Adding Services
1. From the Configuration > Services page, click the Add Service link. 2. On the Service tab, select 802.1X Wired from the Type drop-down-list. 3. In the Name field, enter the name of the service.
Keep the rest of the fields as default. 4. Click Next. The fields are described in Figure 64 and Table 91.
Figure 64 Service Tab

Table 91: Service Tab Container

Description

Type

Select the desired service type from the drop down menu. In this example, select 802.1X Wired.

Name

Specify the name of the service.

5. On the Authentication tab, select [Local User Repository] [Local SQL DB] from the Authentication Sources drop-down list. Keep the rest of the fields as default.
6. Click Next twice.
The fields are displayed in Figure 65.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

ClearPass Policy Manager Integration | 469

Figure 65 Authentication Tab

7. On the Enforcement tab, select the enforcement policy that you created in step Adding Enforcement Policy on page 467 from the Enforcement Policy drop-down list. Keep the rest of the fields as default.
8. Click Save. The fields are displayed in Figure 66.
Figure 66 Enforcement Tab

For more configuration details on CPPM, see the ClearPass Policy Manager User Guide.
Controller Configuration
For additional command parameters, see the ArubaOS 6.4.x CLI Reference Guide.
Configuring CPPM Server on Controller
(host) (config) #aaa authentication-server radius cppm_server (host) (RADIUS Server "cppm_server") #host <ip_address_of_cppm_server> (host) (RADIUS Server "cppm_server") #key <shared_secret>

470 | ClearPass Policy Manager Integration

Dell Networking W-Series ArubaOS 6.4.x | User Guide

(host) (RADIUS Server "cppm_server") #cppm username <username> password <password>
Configuring Server Group to include CPPM Server
(host) (config) #aaa server-group cppm_grp (host) (Server Group "cppm_grp") #auth-server cppm_server
Configuring 802.1X Profile
(host) (config) #aaa authentication dot1x cppm_dot1x_prof
Configuring AAA Profile
(host) (config) #aaa profile cppm_aaa_prof (host) (AAA Profile "cppm_aaa_prof") #authentication-dot1x cppm_dot1x_prof (host) (AAA Profile "cppm_aaa_prof") #dot1x-server-group cppm_grp (host) (AAA Profile "cppm_aaa_prof") #download-role
Show AAA Profile
(host) #show aaa profile cppm_aaa_prof

Dell Networking W-Series ArubaOS 6.4.x | User Guide

ClearPass Policy Manager Integration | 471

Chapter 19 Virtual APs

APs advertise WLANs to wireless clients by sending out beacons and probe responses that contain the WLAN's SSID and supported authentication and data rates. When a wireless client associates to an AP, it sends traffic to the AP's Basic Service Set Identifier (BSSID) which is usually the AP's MAC address. In the Dell network, an AP uses a unique BSSID for each WLAN. Thus, a physical AP can support multiple WLANs. The WLAN configuration applied to a BSSID on an AP is called a virtual AP. You can configure and apply multiple virtual APs to an AP group or to an individual AP by defining one or more virtual AP profiles. This chapter describes the following topics: l Virtual AP Configuration Workflow on page 472 l Virtual AP Profiles on page 473 l Changing a Virtual AP Forwarding Mode on page 509 l Radio Resource Management (802.11k) on page 482 l BSS Transition Management (802.11v) on page 489 l Fast BSS Transition ( 802.11r) on page 490 l SSID Profiles on page 492 l WLAN Authentication on page 499 l High-Throughput Virtual APs on page 502 l Guest WLANs on page 506
Virtual AP Configuration Workflow
The following workflow lists the tasks to configure a virtual AP that uses 802.1X authentication. Click any of the links below for details on the configuration procedures for that task.
Using the WebUI
1. Configure your authentication servers. 2. Create an authentication server group, and assign the authentication servers you configured in step 1 to
that server group. 3. Configure a firewall access policy for a group of users 4. Create a user role, and assign the firewall access policy you created in step 3 to that user role. 5. Create an AAA profile.
a. Assign the user role defined in step 4 to the AAA profile's 802.1X Authentication Default Role b. Associate the server group you created in step 2 to the AAA profile. 6. Create a new SSID profile 7. Create a new virtual AP profile. 8. Associate the virtual AP profile to the AAA profile you created in Step 5. 9. Associate the virtual AP profile to the SSID profile you created in Step 6.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Virtual APs | 472

Using the CLI
The example below follows the suggested order of steps to configure a virtual AP using the command-line interface.
(host)(config) #aaa server-group "THR-DOT1X-SERVER-GROUP-WPA2" auth-server Internal
! ip access-list session THR-POLICY-NAME-WPA2
user any any permit ! (host)(config) #user-role THR-ROLE-NAME-WPA2
session-acl THR-POLICY-NAME-WPA2 ! (host)(config) #aaa server-group "THR-DOT1X-SERVER-GROUP-WPA2"
auth-server Internal ! (host)(config) #aaa profile "THR-AAA-PROFILE-WPA2"
dot1x-default-role "THR-ROLE-NAME-WPA2" dot1x-server-group "THR-DOT1X-SERVER-GROUP-WPA2" ! (host)(config) #wlan ssid-profile "THR-SSID-PROFILE-WPA2" essid "THR-WPA2" opmode wpa2-aes ! (host)(config) #wlan virtual-ap "THR-VIRTUAL-AP-PROFILE-WPA2" ssid-profile "THR-SSID-PROFILE-WPA2" aaa-profile "THR-AAA-PROFILE-WPA2" vlan 60 ! (host)(config) #ap-group "THRHQ1-STANDARD" virtual-ap "THR-VIRTUAL-AP-PROFILE-WPA2"

Virtual AP Profiles
You can configure virtual AP profiles to provide different network access or services to users on the same physical network. For example, you can configure a WLAN to provide access to guest users and another WLAN to provide access to employee users through the same APs. You can also configure a WLAN that offers open authentication and Captive Portal access with data rates of 1 and 2 Mbps, and another WLAN that requires WPA authentication with data rates of up to 11 Mbps. You can apply both virtual AP configurations to the same AP or an AP group .
As an example, suppose there are users in both Edmonton and Toronto that access the same "Corpnet" WLAN. If the WLAN required authentication to an external server, users who associate with the APs in Toronto would want to authenticate with their local servers. In this case, you can configure two virtual APs that each reference a slightly different AAA profile; one AAA profile that references authentication servers in Edmonton and the other that references servers in Toronto (see Table 92).

Table 92: Applying WLAN Profiles to AP Groups WLAN Profiles "default" AP Group "Toronto" AP Group

Virtual AP

"Corpnet-Ed"

"Corpnet-Tr"

SSID

"Corpnet"

"Corpnet"

AAA

"E-Servers"

"T-Servers"

473 | Virtual APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

You can apply multiple virtual AP profiles to individual APs. You can also apply the same virtual AP profile to one or more AP groups.
Configuring the Virtual AP Profile
Follow the procedures below to configure a Virtual AP profile using the WebUI or command-line interfaces.
Creating and Configuring a Profile
1. Navigate to Configuration > Advanced Services > All Profiles. 2. In the Profiles pane, expand the Wireless LAN menu. 3. Select Virtual AP. The list of existing Virtual AP profiles appears in the Profile Details pane. 4. Select the virtual AP profile you want to configure:
l To configure an existing Virtual AP profile, select the name of the profile in the Profile Details pane. l To create a new Virtual AP profile, enter a name for the profile in the entry blank at the bottom of the
Profile Details pane, then click Add. Select the name of the profile in the Profile Details pane.
Whenever you create a new virtual AP profile in the WebUI, the profile automatically contains the "default" SSID profile with the default "Dell-ap" ESSID. You must configure a new ESSID and SSID profile for the virtual AP profile before you apply the profile.
5. Configure the profile parameters described in Table 93. The Virtual AP profile is divided into two tabs, Basic and Advanced. The Basic tab displays only those configuration settings that often need to be adjusted to suit a specific network. The Advanced tab shows all configuration settings, including settings that do not need frequent adjustment or should be kept at their default values. If you change a setting on one tab then click and display the other tab without saving your configuration, that setting will revert to its previous value.

Table 93: Virtual AP Profile Parameters

Parameter

Description

Basic Configuration Settings

Virtual AP enable

Select the Virtual AP enable checkbox to enable or disable the virtual AP.

VLAN Forward mode

The VLAN(s) into which users are placed in order to obtain an IP address. Click the drop-down list to select a configured VLAN, the click the arrow button to associate that VLAN with the virtual AP profile.
NOTE: You must add an existing VLAN ID to the Virtual AP profile.
This parameter controls whether data is tunneled to the controller using generic routing encapsulation (GRE), bridged into the local Ethernet LAN (for remote APs), or a combination thereof depending on the destination (corporate traffic goes to the controller, and Internet access remains local). All forwarding modes support band steering, TSPEC/TCLAS enforcement, 802.11k and station blacklisting.
Click the drop-down list to select one of the following forward modes:
l Tunnel: The AP handles all 802.11 association requests and responses, but sends all 802.11 data packets, action frames and EAPOL frames over a GRE tunnel to the controller for processing. The controller removes or adds the GRE headers, decrypts or encrypts 802.11 frames and applies firewall rules to the user traffic as usual. Both remote and campus APs can be configured in

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual APs | 474

Parameter
Allowed band Band Steering

Description
tunnel mode.
l Bridge: 802.11 frames are bridged into the local Ethernet LAN. When a remote AP or campus AP is in bridge mode, the AP (and not the controller) handles all 802.11 association requests and responses, encryption/decryption processes, and firewall enforcement. The 802.11e and 802.11k action frames are also processed by the AP, which then sends out responses as needed.
An AP in bridge mode does not support captive portal authentication. Both remote and campus APs can be configured in bridge mode. Note that you must enable the control plane security feature on the controller before you configure campus APs in bridge mode.
l Split-Tunnel: 802.11 frames are either tunneled or bridged, depending on the destination (corporate traffic goes to the controller, and Internet access remains local).
A remote AP in split-tunnel forwarding mode handles all 802.11 association requests and responses, encryption/decryption, and firewall enforcement. the 802.11e and 802.11k action frames are also processed by the remote AP, which then sends out responses as needed.
l Decrypt-Tunnel: Both remote and campus APs can be configured in decrypttunnel mode. When an AP uses decrypt-tunnel forwarding mode, that AP decrypts and decapsulates all 802.11 frames from a client and sends the 802.3 frames through the GRE tunnel to the controller, which then applies firewall policies to the user traffic.
When the controller sends traffic to a client, the controller sends 802.3 traffic through the GRE tunnel to the AP, which then converts it to encrypted 802.11 and forwards to the client. This forwarding mode allows a network to utilize the encryption/decryption capacity of the AP while reducing the demand for processing resources on the controller. APs in decrypt-tunnel forwarding mode also manage all 802.11 association requests and responses, and process all 802.11e and 802.11k action frames. APs using decrypt-tunnel mode do have some limitations that not present for APs in regular tunnel forwarding mode. You must enable the control plane security feature on the controller before you configure campus APs in decrypt-tunnel forward mode. NOTE: Virtual APs in bridge or split-tunnel mode using static WEP should use key slots 2-4 on the controller. Key slot 1 should only be used with Virtual APs in tunnel mode.
The band(s) on which to use the virtual AP:
l a--802.11a band only (5 GHz).
l g--802.11b/g band only (2.4 GHz).
l all--both 802.11a and 802.11b/g bands (5 GHz and 2.4 GHz). This is the default setting.
ARM's band steering feature encourages dual-band capable clients to stay on the 5GHz band on dual-band APs. This frees up resources on the 2.4GHz band for single band clients like VoIP phones.
Band steering reduces co-channel interference and increases available bandwidth for dual-band clients, because there are more channels on the 5GHz band than on the 2.4GHz band. Dual-band 802.11n-capable clients may see even greater bandwidth improvements, because the band steering feature will automatically select between 40MHz or 20MHz channels in 802.11n networks. This feature is disabled by default, and must be enabled in a Virtual AP profile.

475 | Virtual APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter

Description
The band steering feature supports both campus APs and remote APs that have a virtual AP profile set to tunnel, split-tunnel or bridge forwarding mode. Note, however, that if a campus or remote APs has virtual AP profiles configured in bridge or split-tunnel forwarding mode but no virtual AP in tunnel mode, those APs will gather information about 5G-capable clients independently and will not exchange this information with other APs that also have bridge or split-tunnel virtual APs only.

Steering Mode

Band steering supports the following three different band steering modes.
l Force-5GHz: When the AP is configured in force-5GHz band steering mode, the AP will try to force 5Ghz-capable APs to use that radio band.
l Prefer-5GHz (Default): If you configure the AP to use prefer-5GHz band steering mode, the AP will try to steer the client to 5G band (if the client is 5G capable) but will let the client connect on the 2.4G band if the client persists in 2.4G association attempts.
l Balance-bands: In this band steering mode, the AP tries to balance the clients across the two radios in order to best utilize the available 2.4G bandwidth. This feature takes into account the fact that the 5Ghz band has more channels than the 2.4 Ghz band, and that the 5Ghz channels operate in 40MHz while the 2.5Ghz band operates in 20MHz.

Dynamic Multicast Optimization (DMO)

Enable/Disable dynamic multicast optimization. This parameter is disabled by default, and cannot be enabled without the PEFNG license.

Drop Broadcast and Multicast

Select the Drop Broadcast and Multicast checkbox to filter out broadcast and multicast traffic in the air.
Do not enable this option for virtual APs configured in bridge forwarding mode. This configuration parameter is only intended for use for virtual APs in tunnel mode. In tunnel mode, all packets travel to the controller, so the controller is able to drop all broadcast traffic. When a virtual AP is configured to use bridge forwarding mode, most data traffic stays local to the AP, and the controller is not able to filter out that broadcast traffic.
IMPORTANT: If you enable this option, you must also enable the Broadcast-Filter ARP parameter on the virtual AP profile to prevent ARP requests from being dropped. You can enable this parameter by checking the Convert Broadcast ARP requests to unicast check box as described in the following parameter description.

Convert Broadcast ARP requests to unicast

If enabled, all broadcast ARP requests are converted to unicast and sent directly to the client. You can check the status of this option using the show ap active and the show datapath tunnel command. If enabled, the output will display the letter a in the flags column.
This configuration parameter is only intended for use for virtual APs in tunnel mode. In tunnel mode, all packets travel to the controller, so the controller is able to convert ARP requests directed to the broadcast address into unicast.
When a virtual AP is configured to use bridge forwarding mode, most data traffic stays local to the AP, and the controller is not able to convert that broadcast traffic.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual APs | 476

Parameter

Description
Beginning with ArubaOS 6.1.3.2, this parameter is enabled by default. Behaviors associated with these settings are enabled upon upgrade to ArubaOS 6.1.3.2. If your controller supports clients behind a wireless bridge or virtual clients on VMware devices, you must disable this setting to allow those clients to obtain an IP address. In previous releases of ArubaOS, the virtual AP profile included two unique broadcast filter parameters; the drop broadcast and multicast parameter, which filtered out all broadcast and multicast traffic in the air except DHCP response frames (these were converted to unicast frames and sent to the corresponding client) and the conert ARP requests to unicast parameter, which converted broadcast ARP requests to unicast messages sent directly to the client.
Starting with ArubaOS 6.1.3.2, the Convert Broadcast ARP requests to unicast setting includes the additional functionality of broadcast-filter all parameter, where DHCP response frames are sent as unicast to the corresponding client. This can impact DHCP discover/requested packets for clients behind a wireless bridge and virtual clients on VMware devices. Disable this option to resolve this issue and allow clients behind a wireless bridge or VMware devices to receive an IP address.
Default: Enabled

Advanced Configuration Settings

Dynamic Multicast Optimization (DMO) Threshold

Maximum number of high-throughput stations in a multicast group beyond which dynamic multicast optimization stops.
Range: 2-255 stations
Default: 6 stations.

Blacklist Time

Number of seconds that a client is quarantined from the network after being blacklisted. Default: 3600 seconds (1 hour)

Authentication Failure Blacklist Time

Time, in seconds, a client is blocked if it fails repeated authentication. The default setting is 3600 seconds (1 hour). A value of 0 blocks the client indefinitely.

Deny inter user traffic

Select this checkbox to deny traffic between the clients using this virtual AP profile.
The global firewall shown the Configuration>Advanced Services > Stateful Firewall > Global window also includes an option to deny all inter-user traffic, regardless of the Virtual AP profile used by those clients.
If the global setting to deny inter-user traffic is enabled, all inter-user traffic between clients will be denied, regardless of the settings configured in the virtual AP profiles. If the setting to deny inter-user traffic is disabled globally but enabled on an individual virtual ap, only the traffic between un-trusted users and the clients on that particular virtual AP will be blocked.

Deny time range

Click the drop-down list and select a configured time range for which the AP will deny access. If you have not yet configured a time range, navigate to Configuration > Security > Access Control > Time Ranges to define a time range before configuring this setting in the virtual AP profile.

477 | Virtual APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter DoS Prevention

Description
If enabled, APs ignore deauthentication frames from clients. This prevents a successful deauthorization attack from being carried out against the AP. This does not affect third-party APs. Default: Disabled

HA Discovery on-association
Mobile IP

If enabled, home agent discovery is triggered on client association instead of home agent discovery based on traffic from client. Mobility on association can speed up roaming and improve connectivity for clients that do not send many uplink packets to trigger mobility (VoIP clients). Best practices is to disable this parameter as it increases IP mobility control traffic between controllers in the same mobility domain. Enable this parameter only when voice issues are observed in VoIP clients.
Default: Disabled
NOTE: ha-disc-onassoc parameter works only when IP mobility is enabled and configured on the controller. For more information about this parameter, see HA Discovery on Association on page 696
Enables or disables IP mobility for this virtual AP.
Default: Enabled

Preserve Client VLAN

If you select this checkbox, clients retain their previous VLAN assignment if the client disassociates from an AP and then immediately re-associates either with same AP or another AP on the same controller.

Remote-AP Operation

Configures when the virtual AP operates on a remote AP:
l always--Permanently enables the virtual AP (Bridge Mode only). This option can be used for non-802.1X bridge VAPs.
l backup--Enables the virtual AP if the remote AP cannot connect to the controller (Bridge Mode only). This option can be used for non-802.1X bridge VAPs.
l persistent--Permanently enables the virtual AP after the remote AP initially connects to the controller (Bridge Mode only). This option can be used for any (Open/PSK/802.1X) bridge VAPs.
l standard--Enables the virtual AP when the remote AP connects to the controller. This option can be used for any (bridge/split-tunnel/tunnel/d-tunnel) VAPs.

Station Blacklisting

Select the Station Blacklisting checkbox to enable detection of denial of service (DoS) attacks, such as ping or SYN floods, that are not spoofed deauthorization attacks.
Default: Enabled

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual APs | 478

Parameter Strict Compliance

Description
If enabled, the AP denies client association requests if the AP and client station have no common rates defined. Some legacy client stations which are not fully 802.11-compliant may not include their configured rates in their association requests. Such non-compliant stations may have difficulty associating with APs unless strict compliance is disabled. This parameter is disabled by default.

VLAN Mobility

Enable or disable VLAN (Layer-2) mobility. Default: Disabled

FDB Update on Assoc

This parameter enables seamless failover for silent clients, allowing them to reassociate. If you select this option, the controller will generate a Layer 2 update on behalf of client to update forwarding tables in bridge devices.
Default: Disabled

6. Click Apply.
Selective Multicast Stream
The selective multicast group is based only on the packets learned through Internet Group Management Protocol (IGMP).
l When broadcast-filter all parameter is enabled, the controller would allow multicast packets to be forwarded only if the following conditions are met: n packets originating from the wired side have a destination address range of 225.0.0.0 239.255.255.255 n a station has subscribed to a multicast group.
l When IGMP snooping/proxy is disabled, the controller is not aware of the IGMP membership and drops the multicast flow.
l If DMO is enabled, the packets are sent with 802.11 unicast header. l If AirGroup is enabled, mDNS (SSDP) packets are sent to the AirGroup application. The common address for
mDNS is 224.0.0.251 and SSDP is 239.255.255.250.
Associating Other Profiles to the Virtual AP
Each Virtual AP profile can be associated with the following profile types.
l AAA l 802.11K
n Handover Trigger Feature Settings n RRM IE Settings n Beacon Report Request Settings n TSM Report Request Settings l Hotspot 2.0 l SSID n EDCA Parameters Station n EDCA Parameters AP n High-throughput SSID n 802.11r

479 | Virtual APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l WMM Traffic Management l Anyspot
As a part of the virtual AP profile configuration procedure, you must identify which instance of each profile type associates with the Virtual AP profile. By default, each Virtual AP profile is associated with the default versions of the AAA, 802.11k, Hotspot 2.0 and SSID profiles. The Virtual AP profile can also associate with a WMM traffic management profile, but as no WMM profile is associated by default, one must be manually configured.
To configure Virtual AP profile associations:
1. Navigate to Configuration > Advanced Services > All Profiles. 2. Expand the Wireless LAN menu. 3. Expand the Virtual AP menu. 4. Select the Virtual AP you want to configure. The list of associated profile types appears in the Profiles list. 5. If a plus [+] sign appears beside an associated profile category, there is more than one profile type in that
category. Select that profile category to display the associated profiles within that category. 6. To associate a different profile with the Virtual AP profile, click the name of the any currently associated
profile in the Profiles list. 7. Click the drop-down list at the top of the Profile Details pane and select a different profile to associate to
the Virtual AP. 8. Click Apply.
Configuring a Virtual AP in the CLI
The following example defines a virtual AP using the command-line interface. For additional information on the suggested order of steps to configure a virtual AP using the command-line interface, see Virtual AP Configuration Workflow on page 472. (host)(config) #wlan virtual-ap "THR-VIRTUAL-AP-PROFILE-WPA2"
ssid-profile "THR-SSID-PROFILE-WPA2" aaa-profile "THR-AAA-PROFILE-WPA2" vlan 60
Associating a Virtual AP Profile to an AP or AP Group
Use the following procedures to associate a virtual AP profile to an AP or group of APs.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration page. 2. Do one of the following:
l To associate the Virtual AP profile to a single AP, click the AP specific tab, and select the AP. l To associate the Virtual AP profile to an AP group, click the AP Group tab, and select the AP Group. 3. In the Profiles list, expand the Wireless LAN menu. 4. Select Virtual AP. The Profile Details window dislays the Virtual AP profiles currently associated to the AP or AP group. 5. Click the Add a Profile drop-down list and select a new Virtual AP profile to associate to the AP. You can associate multiple AP profiiles to an AP, but each virtual AP profile must reference a SSID profile with a different network name (SSID). 6. Click Apply
Although you can create mutliple Virtual AP profiles that reference a single SSID profile, only one of these profiles can be applied to an AP or AP group.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual APs | 480

In the CLI
(host) (config)#ap-group <ap-group> virtual-ap <vap-profile>
Excluding a Virtual AP Profile
You can exclude one or more virtual AP profiles from an individual AP. This prevents a virtual AP, defined at the AP group level, from being applied to a specific AP. For example, you can apply the virtual AP profile that corresponds to the "Corpnet" SSID to the "default" AP group. If you do not want the "Corpnet" SSID to be advertised on the AP in the lobby, you can specify the virtual AP profile that contains the "Corpnet" SSID configuration be excluded from that AP.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration > AP Specific page. 2. Do one of the following:
l If the AP you want to exclude is included in the list, click Edit for the AP. l If the AP does not appear in the list, click New. Either type in the name of the AP, or select the AP from
the drop-down list. Then click Add. 3. Select Wireless LAN under the Profiles list, then select Excluded Virtual AP. 4. Select the name of the virtual AP profile you want to exclude from the drop down menu (under Profile
Details) and click Add. The profile name appears in the Excluded Virtual APs list. You can add multiple profile names in the same way. 5. To remove a profile name from the Excluded Virtual APs list, select the profile name and click Delete. 6. Click Apply.
In the CLI
(host)(config) #ap-name <name> exclude-virtual-ap <profile>
Changing a Virtual AP Forwarding Mode
When you change the forwarding mode for a Virtual AP actively serving clients, the user table will NOT reflect accurate client information unless the entries for those users are manually cleared. The following sections describe the procedure to change the forwarding mode on a Virtual AP serving wired or wireless clients. To change the forwarding mode for wired users connected to the wired port on an AP: 1. Disable the port by issuing the CLI command ap wired-port-profile <ap-wired-port-profile> shutdown.
This will disconnect any wired clients using that port. 2. Issue the command aaa user delete {<ipaddr>|all|mac <macaddr>|name <username>|role
<role>} to remove from the user table the wired users associated with AP wired ports using the <ap-wiredport-profile>. 3. Issue the command ap wired-ap-profile <profile> forward-mode <mode> where <mode> is the new forwarding mode for the wired port 4. Reenable the port using the command ap wired-port-profile <ap-wired-port-profile> no shutdown. To change the forwarding mode for wireless users associated with a virtual AP: 1. Issue the command ap-name <group> no virtual-ap <vap-profile> or ap-group <group> no virtual-ap <vap-profile> to disassociate the AP or group of APs from the virtual AP profile.

481 | Virtual APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

2. Issue the command aaa user delete {<ipaddr>|all|mac <macaddr>|name <username>|role <role>} to remove from the user table the users associated to the virtual-ap specified in the previous step.
3. Issue the command wlan virtual-AP <vap-profile> forward-mode <mode> where <mode> is the new forwarding mode for the virtual AP.
4. Issue the command ap-name <group> virtual-ap <vap-profile> or ap-group <group> virtual-ap <vapprofile> to reassociate the AP or group of APs with the virtual AP profile.

Radio Resource Management (802.11k)
The 802.11k protocol provides mechanisms for APs and clients to dynamically measure the available radio resources. In an 802.11k enabled network, APs and clients can send neighbor reports, beacon reports, and link measurement reports to each other. This allows the APs and clients to take appropriate connection actions.
The handover process is available for voice clients that support the 802.11k standard and have the ability to transmit and receive beacon reports. For information on configuring the handoff trigger feature, see Enabling Wi-Fi Edge Detection and Handover for Voice Clients on page 1010
This topic includes the following procedures: l Configuring the 802.11k Profile l Configuring Radio Resource Management Information Elements l Configuring Beacon Report Requests l Configuring Traffic Stream Measurement Report Requests
Configuring the 802.11k Profile
The following procedures outline the steps to configure 802.11k parameters.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration window. Select either the AP Group or AP Specific tab. l If you selected the AP Group tab, click the Edit button by the AP group name for which you want to configure the new 802.11k profile. l If you selected the AP Specific tab, click the Edit button by the AP for which you want to create the 802.11K profile.
2. In the Profiles list, expand the Wireless LAN menu, then expand the Virtual AP menu. 3. Select the Virtual AP profile for which you want to configure 802.11k settings.
To edit an existing 802.11k profile, click the 802.11K Profile drop-down list In the Profile Details window pane and select the 802.1x profile you want to edit. or To create a new 802.11k profile, click the 802.11k Profile drop-down list and select New. Enter a new 802.11k profile name in the field to the right of the drop-down list. 4. Configure your 802.11k radio settings. Table 94 outlines the parameters you can configure in the 802.11k profile. Click Apply to save your settings.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual APs | 482

Table 94: 802.11k Profile Parameters

Parameter

Description

Advertise 802.11k Capability

Select this option to allow Virtual APs using this profile to advertise 802.11k capability.
Default: Disabled

Forcefully disassociate onhook voice clients

Select this option to allow the AP to forcefully disassociate on-hook voice clients (clients that are not on a call) after period of inactivity. Without the forced disassociation feature, if an AP has reached its call admission control limits and an on-hook voice client wants to start a new call, that client may be denied. If forced disassociation is enabled, those clients can associate to a neighboring AP that can fulfill their QoS requirements.
Default: Disabled

Measurement Mode for Beacon Reports

Click the Measurement Mode for Beacon Reports drop-down list and specify one of the following measurement modes:
l active--Enables active beacon measurement mode. In this mode, the client sends a probe request to the broadcast destination address on all supported channels, sets a measurement duration timer, and, at the end of the measurement duration, compiles all received beacons or probe response with the requested SSID and BSSID into a measurement report.
l beacon-table--Enables beacon-table beacon measurement mode. In this mode, the client measures beacons and returns a report with stored beacon information for any supported channel with the requested SSID and BSSID. The client does not perform any additional measurements.
l passive--Enables passive beacon measurement mode. In this mode, the client sets a measurement duration timer, and, at the end of the measurement duration, compiles all received beacons or probe response with the requested SSID and BSSID into a measurement report.
NOTE: If a station doesn't support the selected measurement mode, it returns a Beacon Measurement Report with the Incapable bit set in the Measurement Report Mode field.
Default Mode: beacon-table

Channel for Beacon Requests in 'A' band

This value is sent in the 'Channel' field of the beacon requests on the 'A' radio. You can specify values in the range 34 to 165. The default value is 36.

Channel for Beacon Requests in 'BG' band

This value is sent in the 'Channel' field of the Beacon Requests on the 'BG' radio. You can specify values in the range 1 to 14. The default value is 1.

Channel for AP Channel Reports in 'A' band

This value is sent in the 'Channel' field of the AP channel reports on the 'A' radio. You can specify values in the range 34 to 165. The default value is 36.

483 | Virtual APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter
Channel for AP Channel Reports in 'BG' band

Description
This value is sent in the 'Channel' field of the AP channel reports on the 'BG' radio. You can specify values in the range 1 to 14. The default value is 1.

Time duration between consecutive Beacon Requests

This option configures the time duration between two consecutive beacon requests sent to a dot11K client. By default, the beacon requests are sent to a dot11K client every 60 seconds. However, if a different value is required, the bcn-req-time option can be used.
This permits values in the range from 10 seconds to 200 seconds. A value of 0 is used to indicate that the generation of Beacon Request frames is turned off.

Time duration between consecutive Link Measurement Requests

This option configures the time duration between two consecutive link measurement requests sent to an dot11K client. By default, link measurement requests are sent to a dot11K client every 61 seconds.
This parameter permits values in the range from 10 seconds to 200 seconds. A value of 0 is used to indicate that the generation of Link Measurement Request frames is turned off.

Time duration between consecutive Transmit Stream Measurement Request

This option configures the time duration between two consecutive transmit stream measurement requests sent to a dot11K client. By default, the transmit stream measurement requests are sent to a dot11K client every 90 seconds.
This permits values in the range from 10 seconds to 200 seconds. A value of 0 is used to indicate that the generation of Transmit Stream Measurement Request frames is turned off.

Handover Trigger Feature Settings Profile

This command configures a Handover Trigger Profile. This profile consists of the configurable parameters for the `Wi-Fi Edge Detection and Handover of Voice Clients' feature.

Beacon Report Request Settings Profile

Configure a Beacon Report Request Profile to provide the parameters for the Beacon Report Request frames.

TSM Report Request Settings Profile

This command configures a TSM Report Request Profile which is used to provide values to the Transmit Stream/Category Measurement Request frame.

In the CLI
Use the following command to configure 802.11k profiles. The available parameters for this profile are described in Table 94. wlan dotllk <profile-name>
Configuring Radio Resource Management Information Elements
ArubaOS supports the following radio resource management information elements (RRM IEs) for APs with 802.11k support enabled. These settings can be enabled through the WebUI or CLI.
In the WebUI
To select the RRM IEs to be sent in beacons and probe responses using the WebUI: 1. Navigate to Configuration>Advanced Services>All Profile Management.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual APs | 484

2. Expand the Wireless LAN menu and select RRM IE.
3. Select the RRM IE profile you want to configure, then select any of the following IE types to enable that information element in beacons and probe responses. (All IE types are sent by default.)

Table 95: RRM IE Parameters Parameter

Description

Advertise Enabled Capabilities IE

This value is used to determine if the RRM Enabled Capabilities IE should be advertised in the beacon frames. A value of "Enabled" allows the RRM Enabled Capabilities IE to be present in the beacon frames when 802.11K capability is enabled. A value of "Disabled" prevents the advertisement of the RRM Enabled Capabilities IE in the beacon frames when 802.11K capability is enabled.

Advertise Country IE

This value is used to determine if the Country IE should be advertised in the beacon frames. A value of "Enabled" allows the Country IE to be present in the beacon frames when 802.11K capability is enabled. A value of "Disabled" prevents the advertisement of the Country IE in the beacon frames when 802.11K capability is enabled.

Advertise Power Constraint IE

This value is used to determine if the Power Constraint IE should be advertised in the beacon frames. A value of "Enabled" allows the Power Constraint IE to be present in the beacon frames when 802.11K capability is enabled. A value of "Disabled" prevents the advertisement of the Power Constraint IE in the beacon frames when 802.11K capability is enabled.

Advertise TPC Report IE

This value is used to determine if the TPC Report IE should be advertised in the beacon frames. A value of "Enabled" allows the TPC Report IE to be present in the beacon frames when 802.11K capability is enabled. A value of "Disabled" prevents the advertisement of the TPC Report IE in the beacon frames when 802.11K capability is enabled.

Advertise QBSS Load IE

This value is used to determine if the QBSS Load IE should be advertised in the beacon frames. A value of "Enabled" allows the QBSS Load IE to be present in the beacon frames when 802.11K capability is enabled. A value of "Disabled" prevents the advertisement of the QBSS Load IE in the beacon frames when 802.11K capability is enabled. The default value is "Enabled".

Advertise BSS AAC IE

This value is used to determine if the BSS Available Admission Capacity IE should be advertised in the beacon frames. A value of "Enabled" allows the BSS Available Admission Capacity IE to be present in the beacon frames when 802.11K capability is enabled. A value of "Disabled" prevents the advertisement of the BSS Available Admission Capacity IE in the beacon frames when 802.11K capability is enabled.

Advertise Quiet IE

This value is used to determine if the Quiet IE should be advertised in the beacon frames. A value of "Enabled" allows the Quiet IE to be present in the beacon frames when 802.11K capability is enabled. A value of "Disabled" prevents the advertisement of the Quiet IE in the beacon frames when 802.11K capability is enabled.

4. Click Apply Changes to save your settings.

485 | Virtual APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the CLI
To use the CLI to configure radio resource management information elements in the RRM IE profile, access the CLI in config mode and issue the following command: (host) (config)#wlan rrm-ie-profile <profile>
Configuring Beacon Report Requests
The beacon report requests are sent only to 802.11k-compliant clients that advertise Beacon Report Capability in their RRM Enabled Capabilities IE. The beacon request frames are sent every 60 seconds. The content of the report requests can be defined in the Beacon Report Request profile using the WebUI or CLI.
In the WebUI
To select the information to be sent in beacon report reqeusts using the WebUI: 1. Navigate to Configuration>Advanced Services>All Profile Management. 2. Expand the Wireless LAN menu and select Beacon Report Request. 3. Select the Beacon Report Request profile you want to configure. 4. Define the settings described in the table below, then click Apply Changes to save your settings.
Table 96: Beacon Report Request Settings

Parameter Interface
Regulatory Class

Description
This field is used to specify the Radio interface for transmitting the Beacon Report Request frame. It can have a value of either 0 or 1. The default value is 1.
This option is used to specify the Regulatory Class field in the Beacon Report Request frame. It can be set to one of the following: l 5 (for 5 GHz band) l 12 (for 2.4 GHz band)

Channel

This option is used to set the Channel field in the Beacon Report Request frame. The Channel value can be set to one of the following: - the channel of the AP (when Measurement Mode is set to either 'Passive' or 'Active-All channels') - 0 (when Measurement Mode is set to 'Beacon Table') - 255 (when Measurement Mode is set to 'Active-Channel Report')

Randomization Interval

This value is used to set the Randomization Interval field in the Beacon Report Request frame. The Randomization Interval is used to specify the desired maximum random delay in the measurement start time. It is expressed in units of TUs (Time Units). A Randomization Interval of 0 in a measurement request indicates that no random delay is to be used. This field can be given a value in the range (0, 65535). The default value is 0.

Measurement Duration

This value is used to set the Measurement Duration field in the Beacon Report Request frame. The Measurement Duration is set to the duration of the requested measurement. It is expressed in units of TUs. This field can be given a value in the range (0, 65535). The default value is 0.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual APs | 486

Parameter

Description

Measurement Mode for Beacon Reports

Click the Measurement Mode for Beacon Reports drop-down list and specify one of the following measurement modes:
l active--Enables active beacon measurement mode. In this mode, the client sends a probe request to the broadcast destination address on all supported channels, sets a measurement duration timer, and, at the end of the measurement duration, compiles all received beacons or probe response with the requested SSID and BSSID into a measurement report.
l beacon-table--Enables beacon-table beacon measurement mode. In this mode, the client measures beacons and returns a report with stored beacon information for any supported channel with the requested SSID and BSSID. The client does not perform any additional measurements.
l passive--Enables passive beacon measurement mode. In this mode, the client sets a measurement duration timer, and, at the end of the measurement duration, compiles all received beacons or probe response with the requested SSID and BSSID into a measurement report.
NOTE: If a station doesn't support the selected measurement mode, it returns a Beacon Measurement Report with the Incapable bit set in the Measurement Report Mode field. Default Mode: beacon-table

Reporting Condition

This option is used to indicate the value for the "Reporting Condition" field in the Beacon Reporting Information sub-element present in the Beacon Report Request frame. It can have a range from 0 to 255. The default value is 0.

ESSID name

This option is used to indicate the value for the "SSID" field in the Beacon Report Request frame. It corresponds to the SSID Name for which the Beacon Report Request frame needs to be generated. It is a string with a minimum length of 1 and a maximum length of 32.

Reporting Detail

This option is used to indicate the value for the "Detail" field in the Reporting Detail sub-element present in the Beacon Report Request frame. It is set to "Disabled" by default.

Measurement Duration Mandatory

This value is used to set the "Duration Mandatory" bit of the Measurement Request Mode field of the Beacon Report Request frame. The default value is "Disabled".

Request Information values

This option is used to indicate the contents of the Request Information IE that could be present in the Beacon Report Request frame. The Request Information IE is present for all Measurement Modes except the 'Beacon Table' mode. It consists of a list of Element IDs that should be included by the client in the response frame.

In the CLI
To select the information to be sent in beacon report requests using the command-line interface, access the CLI in config mode and issue the following commands. wlan bcn-rpt-req-profile <profile>
Configuring Traffic Stream Measurement Report Requests
The Traffic Stream Measurement(TSM) report requests are sent only to dot11k compliant clients that advertise a traffic stream report capability. The TSM report request frames are sent every 60 seconds. The content of the

487 | Virtual APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

report requests can be defined in the TSM Report Request profile using the WebUI or CLI.
In the WebUI
To select the information to be sent in TSM report reqeusts using the WebUI: 1. Navigate to Configuration > Advanced Services > All Profile Management. 2. Expand the Wireless LAN menu and select TSM Report Request. 3. Select the TSMReport Request profile you want to configure. 4. Define the settings described in the table below, then click Apply Changes to save your settings.
Table 97: TSM Report Request Settings

Parameter Request Mode for TSM Report Request
Number of repetitions
Duration Mandatory Randomization Interval

Description
Select one of the following request modes:
l normal l triggered
This value is used to determine the request mode for the Transmit Stream/Category Measurement Request frame. A Transmit Stream/Category Measurement Request frame can be sent in either normal mode or triggered mode. There are two options for this parameter normal and triggered. When the triggered option is selected, the Transmit Stream/Category Measurement Request frame is sent only when the trigger condition occurs. The default value for this field is normal.
This value is used to set the "Number of Repetitions" field in the Transmit Stream/Category Measurement Request frame. The Number of Repetitions field contains the requested number of repetitions for all the Measurement Request elements in this frame. A value of zero in this field indicates Measurement Request elements are executed once without repetition. A value of 65535 in the Number of Repetitions field indicates Measurement Request elements are repeated until the measurement is cancelled or superseded. This field has values in the range (0, 65535). The default value is 65535.
This value is used to set the "Duration Mandatory" bit of the Measurement Request Mode field of the Transmit Stream/Category Measurement Request frame. The default value is enabled.
This value is used to set the Randomization Interval field in the Transmit Stream/Category Measurement Request frame. The Randomization Interval is used to specify the desired maximum random delay in the measurement start time. It is expressed in units of TUs (Time Units). When the request mode for the Transmit Stream/Category Measurement Request frame is set to

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual APs | 488

Parameter Measurement Duration
Traffic ID Bin 0 Range

Description
"triggered", the Randomization Interval is not used and is set to 0. A Randomization Interval of 0 in a measurement request indicates that no random delay is to be used. This field can be given a value in the range (0, 65535). The default value is 0.
This value is used to set the Measurement Duration field in the Transmit Stream/Category Measurement Request frame. The Measurement Duration is set to the duration of the requested measurement. It is expressed in units of TUs. When the request mode for the Transmit Stream/Category Measurement Request frame is set to triggered, the Measurement Duration field should be set to 0. This field can be given a value in the range (0, 65535). The default value is 9776.
The value is used to set the Traffic Identifier field in the Transmit Stream/Category Measurement Request frame. The Traffic Identifier field contains the TID subfield. The TID subfield indicates the TC or TS for which traffic is to be measured. This field can be given a value in the range (0, 255). The default value is 96
This value is used to set the 'Bin 0 Range' field in the Transmit Stream/Category Measurement Request frame. Bin 0 Range indicates the delay range of the first bin (Bin 0) of the Transmit Delay Histogram, expressed in units of TUs. This field can be given a value in the range (0, 255). The default value is 6.

In the CLI
To select the information to be sent in TSM report requests using the command-line interface, access the CLI in config mode and issue the following command. (host) (config)#wlan tsm-req-profile <profile>

BSS Transition Management (802.11v)
BSS Transition Management enables an AP to request a voice client to transition to a specific AP, or suggest a set of preferred APs to a voice client, due to network load balancing or BSS termination. This helps the voice client identify the best AP to which that client should transition to as that client roams. ArubaOS supports BSS Transition Management features defined by the 802.11v standard.
The BSS Transition capability can improve throughput, data rates and QoS for the voice clients in a network by shifting (via transition) the individual voice traffic loads to more appropriate points of association within the ESS.
Frame Types
BSS Transition Management uses the following frame types:
l Query: A Query frame is sent by the voice client that supports BSS transition management requesting a BSS transition candidate list to its associated AP, if the associated AP indicates that it supports the BSS transition capability.

489 | Virtual APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l Request: An AP that supports BSS Transition Management responds to a BSS Transition Management Query frame with a BSS Transition Management Request frame. The AP may also send an unsolicited BSS Transition Management Request frame to a voice client at any time, if the client supports the BSS Transition Management capability. The Request frame also contains a Disassociation flag. If the flag is set, then the AP forcefully disassociates the client after 10 beacon intervals.
l Response: A Response frame is sent by the voice client back to the AP, informing whether it accepts or denies the transition.
802.11k and 802.11v clients
For 802.11k capable clients, the client management framework uses the actual beacon report generated by the client in response to a beacon report request sent by the AP. This beacon report replaces the virtual beacon report for that client. For 802.11v capable clients, the controller uses the 802.11v BSS Transition message to steer clients to the desired AP upon receiving a client steer trigger from the AP.
Enabling 802.11v BSS Transition Management
To enable 802.11v BSS transition management, enable the Advertise 802.11k Capability parameter in an 802.11k profile, then ensure that 802.11k profile is associated to a Virtual AP profile. For more information on the 802.11k profile, see Radio Resource Management (802.11k) on page 482.

Fast BSS Transition ( 802.11r)
ArubaOS provides support for Fast BSS Transition as part of the 802.11r implementation. Fast BSS Transition mechanism minimizes the delay when a voice client transitions from one BSS to another within the same ESS. Fast BSS Transition establishes security and QoS states at the target AP before or during a re-association. This minimizes the time required to resume data connectivity when a BSS transition happens.
The following table provides the modes in which Fast BSS Transition is supported:

Table 98: Supported VAP Forwarding Modes

VAP Forwarding Mode

Support for 802.11r

Tunnel Mode

Yes

Decrypt-Tunnel Mode

Yes

Split-Tunnel Mode

No

Bridge Mode

Beta quality

Important Points to Remember
l Fast BSS Transition is operational only if the wireless client has support for 802.11r standard. If the client does not have support for 802.11r standard, it falls back to normal WPA2 authentication method.
l If dot11r is enabled, iOS clients such as iPad/iPhone gen1 (limitation on iOS) and all MAC-OS clients (limitation on MAC) fail to connect to the network.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual APs | 490

Configuring Fast BSS Transition
You can enable and configure Fast BSS Transition on a per Virtual AP basis. You must create an 802.11r profile and associate that with the Virtual AP profile through an SSID profile. You can create and configure an 802.11r profile using the WebUI or CLI.
Fast BSS transition is operational only with WPA2-Enterprise or WPA2-Personal.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Configurationwindow. Select either the AP Group or AP Specific tab. a. If you selected the AP Group tab, click the AP group name for which you want to configure the 802.11R profile. b. If you selected the AP Specific tab, click the AP for which you want to configure the 802.11R profile.
2. In the Profiles list, expand the Wireless LANmenu, then expand the Virtual APmenu. 3. Select the Virtual AP profile for which you want to configure the 802.11r settings and expand SSID Profile. 4. Select the SSID profile on which you want to configure the 802.11r settings and select 802.11R Profile.
a. To edit an existing 802.11r profile, click the 802.11R Profiledrop-down list in the Profile Detailswindow pane and select the 802.11r profile you want to edit.
or b. To create a new 802.11r Profile, click the 802.11R Profile drop-down list and select New. Enter a new
802.11r profile name in the field to the right of the drop-down list.
You cannot use spaces in profile names.
5. Configure the following 802.11r radio settings. a. Select the Advertise 802.11r Capability option to allow Virtual APs using this profile to advertise 802.11r capability. b. Enter the mobility domain ID value (1-65535) in the 802.11r Mobility Domain ID field. The default value is 1. c. Enter the R1 Key timeout value in seconds (60-86400) for decrypt-tunnel or bridge mode in the 802.11r R1 Key Duration field. The default value is 3600.
6. ClickApply to save your settings.
In the CLI
Create an 802.11r profile using the following command: (host) (config) #wlan dot11r-profile <profile> dot11r
Troubleshooting Fast BSS Transition
ArubaOS provides various troubleshooting options to verify the Fast BSS Transition functionalities. In decrypt-tunnel mode and bridge mode, each r0 key generates up to four r1 keys and the controller pushes each r1 key to the corresponding AP. The following commands help verifying the pushing functionality: Execute the following command to view all the r1 keys that are stored in an AP:

491 | Virtual APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

(host)(config) #show ap debug dot11r state
You can use the following command to remove an r1 key from an AP when the AP does not have a cached r1 key during Fast BSS Transition roaming. (host) #ap debug dot11r remove-key
Execute the following command to view the hit/miss rate of r1 keys cached on an AP before a Fast BSS Transition roaming. This counter helps to verify if enough r1 keys are pushed to the neighboring APs. (host)(config) #show ap debug dot11r efficiency <client-mac>
SSID Profiles
A Service Set Identifier (SSID) is the network or WLAN that any client sees. A SSID profile defines the name of the network, authentication type for the network, basic rates, transmit rates, SSID cloaking, and certain WMM settings for the network.
SSID Profile Overview
ArubaOS supports different types of the Advanced Encryption Standard (AES), Temporal Key Integrity Protocol (TKIP), and wired equivalent privacy (WEP) encryption. AES is the most secure and recommended encryption method. Most modern devices are AES capable and AES should be the default encryption method. Use TKIP only when the network includes devices that do not support AES. In these situations, use a separate SSID for devices that are only capable of TKIP.
Suite-B Cryptography
The Suite-B (bSec) protocol is a pre-standard protocol that has been proposed to the IEEE 802.11 committee as an alternative to 802.11i. The main difference between bSec and standard 802.11i is that bSec implements Suite-B algorithms wherever possible. Notably, AES-CCM is replaced by AES-GCM, and the Key Derivation Function (KDF) of 802.11i is upgraded to support SHA-256 and SHA-384. In order to provide interoperability with standard Wi-Fi software drivers, bSec is implemented as a shim layer between standard 802.11 Wi-Fi and a Layer 3 protocol such as IP. A controller configured to advertise a bSec SSID will advertise an open network, however only bSec frames will be permitted on the network.
This feature requires the ACR license.
The bSec protocol requires that you use VIA 2.1.1 or greater on the client device. Consult VIA documentation for more information on configuring and installing VIA. The bSec protocol is available in 128-bit mode and 256-bit mode. The number of bits specifies the length of the AES-GCM encryption key. Using United States Department of Defense classification terminology, bSec-128 is suitable for protection of information up to the SECRET level, while bSec-256 is suitable for protection of information up to the TOP SECRET level. Suite-B AES-128-GCM and AES-256-GCM encryption is supported by the ArubaOS hardware. Note, however, that not all controllers support Suite-B encryption. The table below describes the controller support for Suite-B encryption in ArubaOS.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual APs | 492

Controller W-7000 Series W-600 Series W-3000 Series W-3000 Series W-6000M3 card W-6000M3 card

Serial Number Prefix All serial numbers supported All serial numbers supported FC F AK A

ACR License Support Yes Yes Yes No Yes No

To determine the serial number prefix for your controller, issue the CLI command show inventory and note the prefix before the system serial number. The serial number prefix in the example below appears in bold.

(host) #show inventory Supervisor Card slot System Serial#

:0 : AK0093676

Wi-Fi Multimedia Protection
Wi-Fi Multimedia (WMM®) is a Wi-Fi Alliance® certification program that is based on the IEEE 802.11e amendment. WMM ensures QoS for latency-sensitive traffic in the air. WMM divides the traffic into four queues or access categories:
l voice l video l best effort l background

Management Frame Protection
ArubaOS supports the IEEE 802.11w standard, also known as Management Frame Protection (MFP). MFP makes it difficult for an attacker to deny service by spoofing Deauth and Disassoc management frames. MFP uses 802.11i (Robust Security Network) framework that establishes encryption keys between the client and AP.
MFP is configured on a virtual AP (VAP) as part of the wlan ssid-profile. There are two parameters that can be configured, mfp-capable and mfp-required. Both are disabled by default.

MFP can only be enabled on SSIDs that support WPA2. MFP is not supported on virtual APs using tunnel forwarding mode.

Configuring the SSID Profile
Follow the procedures below to create a new SSID profile and associate that profile to your Virtual AP.
In the WebUI
1. Navigate to Advanced Services > All Profile Management. 2. In the Profiles list, expand the Wireless LAN menu, then select SSID.

493 | Virtual APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

3. Select an existing profile from the Profile Details pane, or enter create a new profile by entering a new name into the entry blank, then clicking Add.
4. Configure the SSID profile parameters described in Table 51, then click Apply.
The SSID profile configuration settings are divided into two tabs, Basic and Advanced. The Basic tab displays only those configuration settings that often need to be adjusted to suit a specific network. The Advanced tab shows all configuration settings, including settings that do not need frequent adjustment or should be kept at their default values. If you change a setting on one tab then click and display the other tab without saving your configuration, that setting will revert to its previous value.

Table 99: SSID Profile Parameters

Parameter

Description

Basic SSID Profile Settings

Network Name

Name that uniquely identifies a wireless network. The network name, or ESSID can be up to 31 characters. If the ESSID includes spaces, you must enclose it in quotation marks.

Network Authentication

The layer-2 authentication to be used on this ESSID to protect access and ensure the privacy of the data transmitted to and from the network. l None l 802.1x/WEP l WPA l WPA-PSK l WPA2 l WPA2-PSK l xSec l Mixed If you select the Mixed authentication option, a drop-down list will appear in the Network Authentication section. Click this drop-down list and select the combination of authentication types supported by APs using this SSID profile.

Encryption

This field shows the default encryption type used on this ESSID. Unselect the default encryption type if you do not want encryption, or click the Advanced tab to define a new encryption type.

Keys

If you selected WPA-PSK or WPA2-PSK authentication or a mixed authentication type that supports pre-shared keys, enter and confirm the Hex Key or PSK passphrase in the PSK Key/Passphrase and Confirm PSK Key/Passphrase fields.
l To define a hex key, enter a 64-character hexadecimal string.
l To define a PSK passphrase, enter san ASCII string 8-63 characters in length.

Next click the Format drop-down list and select Hex or PSK Passphrase to select the format for the key or passphrase.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual APs | 494

Parameter

Description

Advanced SSID Profile Settings

SSID Enable

Click this checkbox to enable or disable the SSID. The SSID is enabled by default.

Encryption

Select one of the following encryption types

xSec

Encryption and tunneling of Layer-2 traffic between the controller and wired or wireless clients, or between controllers. To use xSec encryption, you must use a RADIUS authentication server. For clients, you must install the Funk Odyssey client software.
Requires installation of the xSec license. For xSec between controllers, you must install an xSec license in each controller.

opensystem

No authentication and encryption.

static-wep

WEP with static keys.

dynamic-wep

WEP with dynamic keys.

wpa-tkip

WPA with TKIP encryption and dynamic keys using 802.1x.

wpa-aes

WPA with AES encryption and dynamic keys using 802.1x.

wpa-psk-tkip

WPA with TKIP encryption using a preshared key.

wpa-psk-aes

WPA with AES encryption using a preshared key.

wpa2-aes

WPA2 with AES encryption and dynamic keys using 802.1x.

wpa2-psk-aes

WPA2 with AES encryption using a preshared key.

wpa2-psk-tkip

WPA2 with TKIP encryption using a preshared key.

wpa2-tkip

WPA2 with TKIP encryption and dynamic keys using 802.1x.

wpa2-aes-gcm128

WPA2 with AES GCM-128 (Suite-b) encryption and dynamic keys
using 802.1X. NOTE: This parameter requires the ACR license. For further information on Suite-B encryption, see SSID Profiles on page 492.

wpa2-aes-gcm256

WPA2 with AES GCM-256 (Suite-b) encryption and dynamic keys
using 802.1X. NOTE: This parameter requires the ACR license. For further information on Suite-B encryption, see SSID Profiles on page 492.

Enable Management When selected, the SSID supports MFP-capable and traditional clients.

495 | Virtual APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter Frame Protection

Description NOTE: MFP can only be enabled on SSIDs that support WPA2.

Require Management Frame Protection

When selected, the SSID supports MFP-capable clients only. NOTE: MFP can only be enabled on SSIDs that support WPA2.

DTIM Interval

Specifies the interval, in milliseconds, between the sending of Delivery Traffic Indication Messages (DTIMs) in the beacon. This is the maximum number of beacon cycles before unacknowledged network broadcasts are flushed. When using wireless clients that employ power management features to sleep, the client must revive at least once during the DTIM period to receive broadcasts

802.11g Transmit Rates

Select the set of 802.11b/g rates at which the AP is allowed to send data. The actual transmit rate depends on what the client is able to handle, based on information sent at the time of association and on the current error/loss rate of the client.

802.11g Basic Rates

Select the set of supported 802.11b/g rates that are advertised in beacon frames and probe responses.

802.11a Transmit Rates

Select the set of 802.11a rates at which the AP is allowed to send data. The actual transmit rate depends on what the client is able to handle, based on information sent at the time of association and on the current error/loss rate of the client.

802.11a Basic Rates

Select the set of supported 802.11a rates, in Mbps, that are advertised in beacon frames and probe responses.

Station Ageout Time Time, in seconds, that a client is allowed to remain idle before being aged out.

Max Transmit Attempts

Maximum number of retries allowed for the AP to send a frame.

RTS Threshold

Wireless clients transmitting frames larger than this threshold must issue Request to Send (RTS) and wait for the AP to respond with Clear to Send (CTS). This helps prevent mid-air collisions for wireless clients that are not within wireless peer range and cannot detect when other wireless clients are transmitting.
The default value is 2333 bytes.

Short Preamble

Click this checkbox to enable or disable a short preamble for 802.11b/g radios. Network performance may be higher when short preamble is enabled. In mixed radio environments, some 802.11b wireless client stations may experience difficulty associating with the AP using short preamble. To use only long preamble, disable short preamble. Legacy client devices that use only long preamble generally can be updated to support short preamble.

Max Associations

Maximum number of wireless clients for the AP. The supported range is 0-256 clients.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual APs | 496

Parameter

Description

Wireless Multimedia (WMM)

Enables or disables WMM, also known as IEEE 802.11e Enhanced Distribution Coordination Function (EDCF). WMM provides prioritization of specific traffic relative to other traffic in the network.

Wireless Multimedia U-APSD (WMMUAPSD) Powersave

Enable Wireless Multimedia (WMM) UAPSD powersave.

WMM TSPEC Min Inactivity Interval

Specify the minimum inactivity time-out threshold of WMM traffic. This setting is useful in environments where low inactivity interval time-outs are advertised, which may cause unwanted timeouts.
The supported range is 0-3,600,000 milliseconds, and the default value is 0 milliseconds.

Override DSCP mappings for WMM clients

Override the default DSCP mappings in the SSID profile with the ToS value. This setting is useful when you want to set a non-default ToS value for a specific traffic.

DSCP mapping for WMM voice AC

DSCP used to map WMM voice traffic. The supported range is 0-63.

DSCP mapping for WMM video AC

Select the DSCP used to map WMM video traffic. The supported range is 0-63.

DSCP mapping for WMM best-effort AC

Select the DSCP value used to map WMM best-effort traffic. The supported range is 0-63.

DSCP mapping for WMM background AC

Select the DSCP used to map WMM background traffic. The supported range is 0-63.

Hide SSID

Select this checkbox to enable or disable the hiding of the SSID name in beacon frames. Note that hiding the SSID does very little to increase security.

Deny_Broadcast Probes

When a client sends a broadcast probe request frame to search for all available SSIDs, this option controls whether or not the system responds for this SSID. When enabled, no response is sent and clients have to know the SSID in order to associate to the SSID. When disabled, a probe response frame is sent for this SSID.

Local Probe Request Threshold (dB)

Enter the SNR threshold below which incoming probe requests will get ignored. The supported range of values is 0-100 dB. A value of 0 disables this feature.

Disable Probe Retry

Click this checkbox to enable or disable battery MAC level retries for probe response frames. By default this parameter is enabled, which mean that MAC level retries for probe response frames is disabled.

497 | Virtual APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter Battery Boost

Description
Converts multicast traffic to unicast before delivery to the client, thus allowing you to set a longer DTIM interval. The longer interval keeps associated wireless clients from activating their radios for multicast indication and delivery, leaving them in power-save mode longer and thus lengthening battery life.
This parameter requires the PEFNG license.

WEP Key 1

First static WEP key associated with the key index. Can be 10 or 26 hex characters in length.

WEP Key 2

Second static WEP key associated with the key index. Can be 10 or 26 hex characters in length.

WEP Key 3

Third Static WEP key associated with the key index. Can be 10 or 26 hex characters in length.

WEP Key 4

Fourth Static WEP key associated with the key index. Can be 10 or 26 hex characters in length.

WEP Transmit Key Index

Key index that specifies which static WEP key is to be used. Can be 1, 2, 3, or 4.

WPA Hexkey

WPA pre-shared key (PSK).

WPA Passphrase

WPA passphrase with which to generate a pre-shared key (PSK).

Maximum Transmit Failures

The AP assumes the client has left and should be deauthorized when the AP detects this number of consecutive frames were not delivered because the maximum retry threshold as been exceeded.

BC/MC Rate Optimization

Click this checkbox to enable or disable scanning of all active stations currently associated to an AP to select the lowest transmission rate for broadcast and multicast frames. This option only applies to broadcast and multicast data frames; 802.11 management frames are transmitted at the lowest configured rate.
NOTE: Do not enable this parameter unless instructed to do so by your Dell technical support representative.

Rate Optimization for delivering EAPOL frames

Click this checkbox to use a more conservative rate for more reliable delivery of EAPOL frames.

Strict Spectralink Voice Protocol (SVP)

Click this checkbox to enable Strict Spectralink Voice Protocol (SVP)

802.11g Beacon Rate

Click this drop-down list to select the beacon rate for 802.11g (use for Distributed Antenna System (DAS) only). Using this parameter in normal operation may cause connectivity problems.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual APs | 498

Parameter

Description

802.11a Beacon Rate

Click this drop-down list to select the beacon rate for 802.11a (use for Distributed Antenna System (DAS) only). Using this parameter in normal operation may cause connectivity problems.

Advertise QBSS Load IE

Click this checkbox to enable the AP to advertise the QBSS load element. The element includes the following parameters that provide information on the traffic situation:
l Station count: The total number of stations associated to the QBSS.
l Channel utilization: The percentage of time (normalized to 255) the channel is sensed to be busy. The access point uses either the physical or the virtual carrier sense mechanism to sense a busy channel.
l Available admission capacity: The remaining amount of medium time (measured as number of 32us/s) available for a station via explicit admission control.
The QAP uses these parameters to decide whether to accept an admission control request. A wireless station uses these parameters to choose the appropriate access points.
NOTE: Ensure that WMM is enabled for legacy APs to advertise the QBSS load element. For 802.11n APs, ensure that either wmm or high throughput is enabled.

Advertise Location Information

When this option is enabled, APs broadcast their location within a IE carried in Beacon frames and Probe Response frames. The AP's latitude, longitude and altitude can be configured on the Configuration > Wireless> AP Installation page of the controller WebUI, or using the provision-ap command in the controller command-line interface.

Advertise AP Name

If this parameter enabled, APs will broadcast the AP name configured by the apname command. This option is disabled by default.

Enforce User VLAN for Select this option to restrict data traffic from open stations to the user's assigned

Open Stations

VLAN. This option is disabled by default.

In the CLI
(host)(config) #wlan ssid-profile <profile>

WLAN Authentication
The AAA profile configures the authentication for a WLAN. The AAA profile defines the type of authentication (802.1x in this example), the authentication server group, and the default user role for authenticated users.
It is recommended that you assign a unique name to each virtual AP, SSID, and AAA profile that you modify.

Configuring an AAA Profile in the WebUI
1. Navigate to Configuration > Security > Authentication > Profiles, the select the AAA Profiles tab. 2. Scroll down to the bottom of the AAA Profiles Summary pane, then click Add. An entry blank appears. 3. Enter the AAA profile name, then click Add. 4. In the profiles list, and select the AAA profile you just created. 5. Configure the AAA profile parameters (see Table 100),

499 | Virtual APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

6. Click Apply.

Table 100: AAA Profile Parameters

Parameter

Description

Initial role

Click the Initial Role drop-down list and select a role for unauthenticated users. The default role for unauthenticated users is logon.

MAC Authentication Default Role

Click the MAC Authentication Default Role drop-down list and select the role assigned to the user when the device is MAC authenticated. The default role for MAC authentication is the guest user role. If derivation rules are present, the role assigned to the client through these rules take precedence over the default role.
NOTE: This feature requires the PEFNG license.

802.1X Authentication Default Role

Click the 802.1X Authentication Default Role drop-down list and select the role assigned to the client after 802.1x authentication. The default role for 802.1x authentication is the guest user role. If derivation rules are present, the role assigned to the client through these rules take precedence over the default role.
NOTE: This feature requires the PEFNG license.

User idle timeout

Select the Enable checkbox to configure user idle timeout value for this profile. Specify the idle timeout value for the client in seconds. A value of 0, deletes the user immediately after disassociation from the wireless network. Valid range is 30-15300 in multiples of 30 seconds. Enabling this option overrides the global settings configured in the AAA timers. If this is disabled, the global settings are used.

RADIUS Interim Accounting

When this option is enabled, the RADIUS accounting feature allows the controller to send Interim-Update messages with current user statistics to the server at regular intervals. This option is disabled by default, allowing the controller to send only start and stop messages to the RADIUS accounting server.

User derivation rules

Click the User derivation rules drop-down list and specify a user attribute profile from which the user role or VLAN is derived.

Wired to Wireless Roaming

Enable this feature to keep users authenticated when they roam from the wired side of the network. This feature is enabled by default.

SIP authentication role

Click the SIP authentication role drop-down list and specify the role assigned to a session initiation protocol (SIP) client upon registration.
NOTE: This feature requires the PEFNG license.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual APs | 500

Parameter Device Type Classification Enforce DHCP
PAN firewalls Integration

Description
When you select this option, the controller will parse user-agent strings and attempt to identify the type of device connecting to the AP. When the device type classification is enabled, the Global client table shown in the Monitoring>Network > All WLAN Clients window shows each client's device type, if that client device can be identified.
When you select this option, clients must obtain an IP using DHCP before they are allowed to associate to an AP. Enable this option when you create a user rule that assigns a specific role or VLAN based upon the client device's type. For details, see Working with User-Derived VLANs on page 448. NOTE: If a client is removed from the user table by the "Logon user lifetime" AAA timer, then that client will not be able to send traffic until it renews it's DHCP. NOTE: Enforce DHCP is available on the controller for APs configured for tunnel or decrypt-tunnel forwarding mode only.
Requires IP mapping at Palo Alto Networks firewalls. For details, see Palo Alto Networks Firewall Integration on page 714.

7. In the profiles list, select the AAA profile to expand the list of other profiles associated with that AAA prrofile. 8. Click 802.1X Authentication. The 802.1X Authentication Profile appears.
a. Click the 802.1X Authentication Profile drop-down list and select an authentication profile to associate with your AAA profile.
b. Click Apply. 9. Click 802.1X Authentication Server Group. The 802.1X Authentication Server Group appears..
a. Click the 802.1X Authentication Server Group drop-down list and select the server group to associate with your AAA profile.
b. Click Apply. 10.Click MAC Authentication. The MAC Authentication Profile appears.
a. Click the MAC Authentication Profile drop-down list and select a MAC authentication profile to associate with your AAA profile.
b. Click Apply. 11.Click MAC Authentication Server Group. The MAC Authentication Server Group appears.
a. Click the MAC Authentication Server Group drop-down list and select the MAC server group to associate with your AAA profile.
b. Click Apply. 12.Click RADIUS Authentication Server Group. The RADIUS Authentication Server Group appears.
a. Click the RADIUS Authentication Server Group drop-down list and select the MAC server group to associate with your AAA profile.
b. Click Apply.
Configuring an AAA Profile in the CLI
(host)(config) #aaa authentication dot1x <profile> (host)(config) #aaa profile <profile>

501 | Virtual APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

High-Throughput Virtual APs
With the implementation of the IEEE 802.11ac standard, very-high-throughput can be configured to operate on the 5 GHz frequency band. High-throughput (802.11n) can be configured on both the 5 GHz and 2.5 GHz frequency bands. High-throughput is enabled by default, and can be enabled or disabled in the 802.11a and 802.11g radio profiles. For details, see 802.11a and 802.11g RF Management Profiles on page 593
Two different profiles define settings specific to high-throughput APs. The high-throughput radio profile defines settings for 40 MHz tolerance, is associated to an AP through it's 802.11a or 802.11g radio profile. The high-throughput SSID profile configures the high-throughput SSID settings for 802.11n, and is associated to an AP through it's virtual AP profile
Stations are not allowed to use high-throughput with TKIP standalone encryption, although TKIP can be provided in mixed-mode BSSIDs that support high-throughput. High-throughput is disabled on a BSSID if the encryption mode is standalone TKIP or WEP.
De-aggregation of MAC Service Data Units (A-MSDUs) is supported on the W-3000 Series, W-7000 Series,W-7220, and the W-6000M3 controllers with a maximum frame transmission size of 4k bytes; however, this feature is always enabled and is not configurable. Aggregation is not currently supported.
Configuring the High-Throughput Radio Profile
You can configure high-throughput radio profile settings using the WebUI or CLI interfaces
In the WebUI
1. Navigate to Advanced Services > All Profile Management. 2. In the Profiles list, expand the RF Management menu, then select High-throughput radio. 3. Select an existing profile from the Profile Details pane, or enter create a new profile by entering a new
name into the entry blank, then clicking Add. The configuration settings in this profile are divided into two tabs, Basic and Advanced. The Basic tab displays only those configuration settings that often need to be adjusted to suit a specific network. The Advanced tab shows all configuration settings, including settings that do not need frequent adjustment or should be kept at their default values. If you change a setting on one tab then click and display the other tab without saving your configuration, that setting will revert to its previous value.

Table 101: High-Throughput Radio Profile Configuration Parameters

Parameter

Description

Basic

40MHz intolerance

This parameter controls whether or not APs using this radio profile will advertise intolerance of 40 MHz operation. By default, this option is disabled, and 40 MHz operation is allowed. If you do not want to use 40 Mhz operation, select the 40MHz intolerance checkbox to enable this feature.

Advanced

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual APs | 502

Parameter honor 40MHz intolerance
CSD override

Description
When enabled, the radio will stop using the 40 MHz channels if the 40 MHz intolerance indication is received from another AP or station. Uncheck the Honor 40 Mhz intolerance checkbox to disable this feature.
Default: Enabled
Most transmissions to high throughput (HT) stations are sent through multiple antennas using cyclic shift diversity (CSD). When you enable the CSD Override parameter, CSD is disabled and only one antenna transmits data, even if they are being sent to high-throughput stations. This enables interoperability for legacy or high-throughput stations that cannot decode 802.11n CDD data. This option is disabled by default, and should only be enabled under the supervision of Dell technical support.
Use this feature to turn off antenna diversity when the AP must support legacy clients such as Cisco 7921g VoIP phones, or older 802.11g clients (e.g. Intel Centrino clients). Note, however, that enabling this feature can reduce overall throughput rates.

4. Click Apply.
In order for the settings in this profile to take effect, the profile must be associated with an AP's 802.11a or 802.11g radio profile. For details, see the Associated Profiles section of , 802.11a/802.11g RF Management Configuration Parameters.
In the CLI
(host) (config) rf ht-radio-profile <profile> (host) (config) rf dot11a-radio-profile|dot11g-radio-profile <profile> high-throughput-enable
Configuring the High-Throughput SSID Profile
You can configure high-throughput SSID profile settings using the WebUI or CLI interfaces
In the WebUI
1. Navigate to Advanced Services > All Profile Management. 2. In the Profiles list, expand the Wireless LAN menu, then select High-throughput radio. 3. Select an existing profile from the Profile Details pane, or enter create a new profile by entering a new
name into the entry blank, then clicking Add. 4. Configure the high-throughput SSID profile settings described in Table 102 .
The High-Throughput SSID profile configuration settings are divided into two tabs, Basic and Advanced. The Basic tab displays only those configuration settings that often need to be adjusted to suit a specific network. The Advanced tab shows all configuration settings, including settings that do not need frequent adjustment or should be kept at their default values. If you change a setting on one tab then click and display the other tab without saving your configuration, that setting will revert to its previous value. Both basic and advanced settings are described in Table 54.

503 | Virtual APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 102: High-Throughput SSID Profile Parameters

Parameter

Description

Basic High-Throughput SSID Profile Settings

High throughput enable (SSID)

Determines if this high-throughput SSID allows high-throughput (802.11n) stations to associate. Enabling high-throughput in an WLAN high-throughput SSID profile enables Wi-Fi Multimedia (WMM) base features for the associated SSID.

40 MHz channel usage

Enable or disable the use of 40 MHz channels. This parameter is enabled by default.

Very High throughput enable (SSID)

Enable/Disable support for Very High Throughput (802.11ac ) on the SSID.

80 MHz channel usage (VHT)

Enables or disables the use of 80 MHz channels on Very High Throughput (VHT) APs.

VHT - Explicit Transmit Beamforming

Enable or disable VHT Explicit Transmit Beamforming for the W-AP220 Series. When this parameter is enabled, the AP requests information about the Multiple-Input and Multiple-Output (MIMO) channel and uses that information to transmit data over multiple transmit streams using a calculated steering matrix. The result is higher throughput due to improved signal at the beamforming (the receiving client). If this parameter is disabled, all other transmit beamforming settings will not take effect.

Advanced High-Throughput SSID Profile Settings

VHT - Supported MCS Map
VHT - Transmit Beamforming Sounding Interval BA AMSDU Enable

Allows you to set the supported Modulation and Coding Scheme (MCS) map for spatial streams 1 through 3. Each drop down list corresponds to a spatial beginning with 1 on the left and ending with 3 on the right. Default values are set to 9 for each spatial stream.
Time interval in seconds between channel information updates between the AP and the beamformee client. (W-AP220 Series only)
Enable/Disable Receive AMSDU in BA negotiation.

Legacy stations

Allow or disallow associations from legacy (non-HT) stations. By default, this parameter is enabled (legacy stations are allowed).

Low-density Parity Check

If enabled, the AP will advertise Low-density Parity Check (LDPC) support. LDPC improves data transmission over radio channels with high levels of background noise.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual APs | 504

Parameter
Maximum number of spatial streams usable for STBC reception

Description
Controls the maximum number of spatial streams usable for STBC reception. 0 disables STBC reception, 1 uses STBC for MCS 0-7. Higher MCS values are not supported. (Supported on the W-AP90 series, WAP130 Series, W-AP68, W-AP175 and W-AP105 only. The configured value will be adjusted based on AP capabilities.)

Maximum number of spatial streams usable for STBC transmission.

Controls the maximum number of spatial streams usable for STBC transmission. 0 disables STBC transmission, 1 uses STBC for MCS 0-7. Higher MCS values are not supported. (Supported on W-AP90 series, WAP175, W-AP130 Seriesand W-AP105 only. The configured value will be adjusted based on AP capabilities.)

MPDU Aggregation

Enable or disable MAC protocol data unit (MPDU) aggregation.
High-throughput APs are able to send aggregated MAC protocol data units (MDPUs), which allow an AP to receive a single block acknowledgment instead of multiple ACK signals. This option, which is enabled by default, reduces network traffic overhead by effectively eliminating the need to initiate a new transfer for every MPDU.

Max received A-MPDU size

Maximum size of a received aggregate MPDU, in bytes. Allowed values: 8191, 16383, 32767, 65535.

Max transmitted A-MPDU size

Maximum size of a transmitted aggregate MPDU, in bytes. Range: 1576­65535

Min MPDU start spacing

Minimum time between the start of adjacent MPDUs within an aggregate MPDU, in microseconds. Allowed values: 0 (No restriction on MDPU start spacing), .25 µsec, .5 µsec, 1 µsec, 2 µsec, 4 µsec.

Short guard interval in 20 MHz mode

Enable or disable use of short (400ns) guard interval in 20 MHz mode. This parameter is enabled by default.
A guard interval is a period of time between transmissions that allows reflections from the previous data transmission to settle before an AP transmits data again. An AP identifies any signal content received inside this interval as unwanted inter-symbol interference, and rejects that data. The 802.11n standard specifies two guard intervals: 400ns (short) and 800ns (long). Enabling a short guard interval can decrease network overhead by reducing unnecessary idle time on each AP. Some outdoor deployments, may, however require a longer guard interval. If the short guard interval does not allow enough time for reflections to settle in your mesh deployment, inter-symbol interference values may increase and degrade throughput.

Short guard interval in 40 MHz mode

Enable or disable use of short (400ns) guard interval in 40 MHz mode. This parameter is enabled by default.

505 | Virtual APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter Supported MCS set Temporal Diversity

Description
A guard interval is a period of time between transmissions that allows reflections from the previous data transmission to settle before an AP transmits data again. An AP identifies any signal content received inside this interval as unwanted inter-symbol interference, and rejects that data. The 802.11n standard specifies two guard intervals: 400ns (short) and 800ns (long). Enabling a short guard interval can decrease network overhead by reducing unnecessary idle time on each AP. Some outdoor deployments, may, however require a longer guard interval. If the short guard interval does not allow enough time for reflections to settle in your mesh deployment, inter-symbol interference values may increase and degrade throughput.
A list of Modulation Coding Scheme (MCS) values or ranges of values to be supported on this SSID. The MCS you choose determines the channel width (20MHz vs. 40MHz) and the number of spatial streams used by the mesh node.
The default value is 1­23; the complete set of supported values. To specify a smaller range of values, enter a hyphen between the lower and upper values. To specify a series of different values, separate each value with a comma.
Examples:
2­10
1,3,6,9,12
Range: 0­23.
When this feature is enabled and the client is not responding to 802.11 packets, the AP will launch two hardware retries; if the hardware retries are not successful then it attempts software retries. This setting is disabled by default.

In order for the settings in this profile to take effect, the profile must be associated with an AP's Virtual AP profile. For details on associating a high-throughput SSID profile with a Virtual AP profile, see Configuring the Virtual AP Profile on page 474
In the CLI
wlan ht-ssid-profile <profile-name> wlan ssid-profile <profile-name> ht-ssid-profile <profile> wlan virtual-ap <profile-name> wlan ssid-profile <profile-name>

Guest WLANs
Guest usage in enterprise wireless networks requires the following special consideration:
l Guest users must be separated from employee users by VLANs in the network. l Guests must be limited not only in where they may go, but also by what network protocols and ports they
may use to access resources. l Guests should be allowed to access only the local resources that are required for IP connectivity. These
resources include DHCP and possibly DNS if an outside DNS server is not available. In most cases, a public DNS is always available. l All other internal resources should be off limits for the guest. This restriction is achieved usually by denying any internal address space to the guest user.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual APs | 506

l A time-of-day restriction policy should be used to allow guests to access the network only during normal working hours, because they should be using the network only while conducting official business. A rate limit can also be put on each guest user to keep the user from using up the limited wireless bandwidth.Accounts should be set to expire when their local work is completed, typically at the end of each business day.
The procedures in the following example create an guest WLAN that only allows HTTP and HTTPS traffic from 9:00 a.m. to 5 p.m. on weekdays. l Configuring a Guest VLAN l Configuring a Guest Role l Configuring a Guest Virtual AP The following sections describe how to do this using the WebUI and the CLI.
Configuring a Guest VLAN
In this example, users on the "Corpnet" WLAN are placed into VLAN 1, which is the default VLAN configured on the controller. For guest users, you need to create another VLAN and assign the VLAN interface an IP address.
Each Virtual AP supports a maximum of 256 VLANs.

In the WebUI
1. Navigate to the Configuration > Network > VLANs page. 2. Click Add to add a VLAN. Enter 2 in the VLAN ID, and click Apply. 3. To assign an IP address and netmask to the VLAN you just created, navigate to the Configuration
>Network > IP > IP Interfaces page. Click Edit for VLAN 2. Enter an IP address and netmask for the VLAN interface, and then click Apply.
In the CLI
(host)(config) #vlan 2 interface vlan 2 ip address <address> <netmask>
Configuring a Guest Role
The guest role allows web (HTTP and HTTPS) access only during normal business hours (9:00 a.m. to 5:00 p.m. Monday through Friday).
In the WebUI
1. Navigate to the Configuration > Security > Access Control > Time Ranges page. 2. Click Add. Enter a name, such as "workhours". Select Periodic. Click Add. Under Add Periodic Rule, select
Weekday. For Start Time, enter 9:00. For End Time, enter 17:00. Click Done. Click Apply. 3. Select the Policies tab. Click Add. Enter a policy name, such as "restricted". From the Policy Type drop-
down list, select Session. 4. Click Add. 5. (Optional) By default, firewall policies apply to IPv4 clients only. To configure a firewall policy for IPv6 clients,
click the IP Version drop-down list and select IPv6. 6. Click the Service drop-down list, select service, then select svc-http. 7. Click the Time Range drop-down list and select the time range you previously configured. 8. Click Add.

507 | Virtual APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

9. Repeat steps 4-8 to add another rule for the svc-https service. Click Apply. 10.Select the User Roles tab. Click Add. Enter guest for Role Name. Under Firewall Policies, click Add. Select
Choose from Configured Policies and select the policy you previously configured. Click Done. 11.Click Apply.
In the CLI
(host)(config) #time-range workhours periodic weekday 09:00 to 17:00
(host)(config) #ip access-list session restricted any any svc-http permit time-range workhours any any svc-https permit time-range workhours
(host)(config) #user-role guest session-acl restricted
Configuring a Guest Virtual AP
In this example, you apply the guest virtual AP profile to a specific AP.
Best practices are to assign a unique name to each virtual AP, SSID, and AAA profile that you modify. In this example, you use the name guest to identify the virtual AP and SSID profiles.

In the WebUI
1. Navigate to Configuration > Wireless > AP Configuration > AP Specific page. 2. Click New. Either enter the AP name or select an AP from the list of discovered APs. Click Add. The AP name
appears in the list. 3. Click Edit by the AP name to display the profiles that you can configure for the AP. 4. Expand the Wireless LAN profile menu. 5. Select Virtual AP.
a. Click the Add a profile drop down list in the Profile Details window and select NEW. b. Enter guest, and click Add. c. Click Apply. 6. Click the guest virtual AP to display profile details. a. Make sure Virtual AP Enable is selected. b. Select 2 for the VLAN. c. Click Apply. 7. Under Profiles, select the AAA profile under the guest virtual AP profile. a. In the Profile Details, select default-open from the AAA Profile drop-down list. b. Click Apply. 8. Under Profiles, select the SSID profile under the guest virtual AP profile. a. Select NEW from the SSID Profile drop-down menu. b. Enter guest. c. In the Profile Details, enter Guest for the Network Name. d. Select None for Network Authentication and Open for Encryption. e. Click Apply.
In the CLI
(host)(config) #wlan ssid-profile guest opmode opensystem
(host)(config) #wlan virtual-ap guest

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Virtual APs | 508

vap-enable vlan 2 deny-time-range workhours ssid-profile guest aaa-profile default-open (host)(config) #ap-name building3-lobby virtual-ap guest
Changing a Virtual AP Forwarding Mode
When you change the forwarding mode for a Virtual AP actively serving clients, the user table will NOT reflect accurate client information unless the entries for those users are manually cleared.
The following sections describe the procedure to change the forwarding mode on a Virtual AP serving wired or wireless clients.
To change the forwarding mode for wired users connected to the wired port on an AP:
1. Disable the port by issuing the CLI command ap wired-port-profile <ap-wired-port-profile> shutdown. This will disconnect any wired clients using that port.
2. Issue the command aaa user delete {<ipaddr>|all|mac <macaddr>|name <username>|role <role>} to remove from the user table the wired users associated with AP wired ports using the <ap-wiredport-profile>.
3. Issue the command ap wired-ap-profile <profile> forward-mode <mode> where <mode> is the new forwarding mode for the wired port
4. Reenable the port using the command ap wired-port-profile <ap-wired-port-profile> no shutdown.
To change the forwarding mode for wireless users associated with a virtual AP:
1. Issue the command ap-name <group> no virtual-ap <vap-profile> or ap-group <group> no virtual-ap <vap-profile> to disassociate the AP or group of APs from the virtual AP profile.
2. Issue the command aaa user delete {<ipaddr>|all|mac <macaddr>|name <username>|role <role>} to remove from the user table the users associated to the virtual-ap specified in the previous step.
3. Issue the command wlan virtual-AP <vap-profile> forward-mode <mode> where <mode> is the new forwarding mode for the virtual AP.
4. Issue the command ap-name <group> virtual-ap <vap-profile> or ap-group <group> virtual-ap <vapprofile> to reassociate the AP or group of APs with the virtual AP profile.

509 | Virtual APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Chapter 20 Adaptive Radio Management

Dell's Adaptive Radio Management (ARM) takes the guesswork out of RF management by using automatic, infrastructure-based controls to maximize client performance and enhance the stability and predictability of the entire Wi-Fi network.
ARM Feature Overviews
The following sections provide a general overview of Adaptive Radio Management feature: l Understanding ARM on page 510 l Client Match on page 512 l ARM Coverage and Interference Metrics on page 514
Configuring ARM Settings
The section below describes the steps to configure the ARM function to automatically select the best channel and transmission power settings for each AP on your WLAN: l Configuring ARM Profiles on page 514 l Assigning an ARM Profile to an AP Group on page 524 l Configuring Non-802.11 Noise Interference Immunity on page 530 l Using Multi-Band ARM for 802.11a/802.11g Traffic on page 525 l Reusing Channels to Control RX Sensitivity Tuning on page 529 l Band Steering on page 525 l Enabling Traffic Shaping on page 527 l Spectrum Load Balancing on page 529
ARM Troubleshooting
l Troubleshooting ARM on page 530
Understanding ARM
Dell's Adaptive Radio Management (ARM) technology maximizes WLAN performance even in the highest traffic networks by dynamically and intelligently choosing the best 802.11 channel and transmit power for each Dell AP in its current RF environment. Dell's ARM technology solves wireless networking challenges such as large deployments, dense deployments, and installations that must support VoIP or mobile users. Deployments with dozens of users per access point can cause network contention and interference, but ARM dynamically monitors and adjusts the network to ensure that all users are allowed ready access. ARM provides the best voice call quality with voice-aware spectrum scanning and call admission control. With earlier technologies, network administrators would have to perform a site survey at each location to discover areas of RF coverage and interference, and then manually configure each AP according to the results of this survey. Static site surveys can help you choose channel and power assignments for APs, but these surveys are often time-consuming and expensive, and only reflect the state of the network at a single point in time. ARM is more efficient than static calibration, and, unlike older technologies, it continually monitors and adjusts radio resources to provide optimal network performance. Automatic power control can adjust AP

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Adaptive Radio Management | 510

power settings if adjacent APs are added, removed, or moved to a new location within the network, minimizing interference with other WLAN networks. ARM adjusts only the affected APs, so the entire network does not require systemic changes.
ARM Support for 802.11n
ArubaOS version 3.3.x or later supports APs with the 802.11n standard, ensuring seamless integration of 802.11n devices into your RF domain. The Dell AP's 5 Ghz band capacity simplifies the integration of new APs into your legacy network. You can also replace older APs with newer 802.11n-compliant APs while reusing your existing cabling and PoE infrastructure.
A high-throughput (802.11n) AP can use a 40 MHz channel pair comprised of two adjacent 20 MHz channels available in the regulatory domain profile for your country. When ARM is configured for a dual-band AP, it will dynamically select the primary and secondary channels for these devices. It can, however, continue to scan all changes in the a+b/g bands to calculate interference and detect rogue APs.
Monitoring Your Network with ARM
When ARM is enabled, the Dell AP dynamically scans all 802.11 channels in its regulatory domain at regular intervals and will report everything it sees to the controller on each channel it scans. (By default, 802.11n-capable APs scan channels in all regulatory domains.) This includes, but is not limited to, data regarding WLAN coverage, interference, and intrusion detection. You can retrieve this information from the controller to get a quick health check of your WLAN deployment without having to walk around every part of a building with a network analyzer. (For additional information on the individual matrix gathered on the AP's current assigned RF channel, see ARM Coverage and Interference Metrics on page 514.)
Maintaining Channel Quality
Hybrid APs and Spectrum Monitors determine channel quality by measuring channel noise, non-Wi-Fi (interferer) utilization and duty-cycles, and certain types of retries. Regular APs using the ARM feature derive channel quality values by measuring the noise floor for both 802.11 and non-802.11 noise on that channel.
The ARM algorithm is based on what the individual AP hears, so each AP on your WLAN can effectively "self heal" by compensating for changing scenarios like a broken antenna or blocked signals from neighboring APs. Additionally, ARM periodically collects information about neighboring APs to help each AP better adapt to its own changing environment.
Configuring ARM Scanning
The default ARM scanning interval is determined by the scan-interval parameter in the ARM profile. If the AP does not have any associated clients (or if most of its clients are inactive), the ARM feature will dynamically readjust this default scan interval, allowing the AP obtain better information about its RF neighborhood by scanning non-home channels more frequently. Starting with ArubaOS 6.2, if an AP attempts to scan a nonhome channel but is unsuccessful, the AP will make additional attempts to rescan that channel before skipping it and continuing on to other channels.
The Over the Air Updates feature allows an AP to get information about its RF environment from its neighbors, even the AP cannot scan. If you enable this feature, when an AP on the network scans a foreign (non-home) channel, it sends an Over-the-Air (OTA) update in an 802.11 management frame that contains information about that AP's home channel, the current transmission EIRP value of the home channel, and onehop neighbors seen by that AP.
Starting with ArubaOS 6.3.1, if ARM reports a high noise floor on a channel within a 40 MHz channel pair or 80 MHz channel set, ARM performs an additional 20 MHz scan on each channel within that channel pair or set, to determine the actual noise floor of each affected channel. This allows ARM to avoid assigning the overused channel, while still allowing channel assignments to the other unaffected channels in that channel pair or set.

511 | Adaptive Radio Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Understanding ARM Application Awareness
Dell APs keep a count of the number of data bytes transmitted and received by their radios to calculate the traffic load. When a WLAN gets very busy and traffic exceeds a predefined threshold, load-aware ARM dynamically adjusts scanning behavior to maintain uninterrupted data transfer on heavily loaded systems. ARM-enabled APs will resume their complete monitoring scans when the traffic has dropped to normal levels. You can also define a firewall policy that pauses ARM scanning when the AP detects critically important or latency-sensitive traffic from a specified host or network.
ARM's band steering feature encourages dual-band capable clients to stay on the 5GHz band on dual-band APs. This frees up resources on the 2.4GHz band for single band clients like VoIP phones.
The ARM "Mode Aware" option is a useful feature for single radio, dual-band WLAN networks with high density AP deployments. If there is too much AP coverage, those APs can cause interference and negatively impact your network. Mode aware ARM can turn APs into Air Monitors if necessary, then turn those Air Monitors back into APs when they detect gaps in coverage. Note that an Air Monitor will not turn back into an AP if it detects client traffic (or client traffic increases), but will change to an AP only if it detects coverage holes.
Client Match
The ARM client match feature continually monitors a client's RF neighborhood to provide ongoing client bandsteering and load balancing, and enhanced AP reassignment for roaming mobile clients. This feature is recommended over the legacy bandsteering and spectrum load balancing features, which, unlike client match, do not trigger AP changes for clients already associated to an AP.
Legacy 802.11a/b/g devices do not support the client match feature. When you enable client match on 802.11ncapable devices, the client match feature overrides any settings configured for the legacy bandsteering, station handoff assist or load balancing features. 802.11ac-capable devices do not support the legacy bandsteering, station hand off or load balancing settings, so these APs must be managed on using client match.
When you enable this feature on an AP, that AP is responsible for measuring the RF health of its associated clients. The AP receives and collects information about clients in its neighborhood, and periodically sends this information to the controller. The controller aggregates information it receives from all APs using client match, and maintains information for all associated clients in a database. The controller shares this database with the APs (for their associated clients), and the APs use the information to compute the client-based RF neighborhood and determine which APs should be considered candidate APs for each client. When the controller receives a client steer request from an AP, the controller identifies the optimal AP candidate and manages the client's relocation to the desired radio. This is an improvement from previous releases, where the ARM feature was managed exclusively by APs, without the larger perspective of the client's RF neighborhood.
The following client/AP mismatch conditions are managed by the client match feature:
l Load Balancing: Client match balances clients across APs on different channels, based upon the client load on the APs and the SNR levels that the client detects from an underused AP. If an AP radio can support additional clients, the AP will participate in client match load balancing and clients can be directed to that AP radio, subject to predefined SNR thresholds.
l Sticky Clients: The client match feature also helps mobile clients that tend to stay associated to an AP despite low signal levels. APs using client match continually monitor the client's RSSI as it roams between APs, and moves the client to an AP when a better radio match is found. This prevents mobile clients from remaining associated to an APs with less than ideal RSSI, which can cause poor connectivity and reduce performance for other clients associated with that AP.
l Band Steering/Band Balancing: APs using the client match feature monitor the RSSI for clients that advertise a dual-band capability. If a client is currently associated to a 2.4 GHz radio and the AP detects that the client has a good RSSI from the 5 Ghz radio, the controller attempts to steer the client to the 5 Ghz

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Adaptive Radio Management | 512

radio, as long as the 5 Ghz RSSI is not significantly worse than the 2.4 GHz RSSI, and the AP retains a suitable distribution of clients on each of it's radios.
The client match feature is enabled through the AP's ARM profile. Although default client match settings are recommended for most users, advanced client match settings can be configured using rf arm-profile commands in the command-line interface.
BSS Transition Management Support
The BSS Transition Management Support feature allows Client Match to steer devices using 802.11v BSS transition management standards for continuous wireless connectivity. This feature provides a seamless standards compatible method of device steering in wireless networks, as 802.11v BSS transition management support has become increasingly common in wireless devices.
Steering a Client
When Client Match attempts to steer the client to a more optimal AP, it sends out an 802.11v BSS transition management request to the 11v capable station and waits for a response.
1. Client Match begins a timeout session for the BSS transition management response or new association request to the desired AP.
2. If the request is rejected or the timeout session expires, Client Match is notified of the failed attempt and reinitiates the steer using the 802.11v BSS transition management request. n If the client steer fails the maximum number of timeout attempts (default: 5), Client Match marks the client as 11v unsupported and falls back to using deauths to steer. n If the client steer fails due to request rejection, Client Match does not mark the client as 11v unsupported and continues to attempt to steer using the 802.11v BSS transition management request.
Multi-Media Sync-Up
Client Match offers a tighter integration with multiple media-aware ALGs to provide better call quality for programs like Lync and Facetime. With Client Match's ability to understand various media protocols, clients are not steered to different APs in the middle of an active media session.
When a client participates in a call, the controller learns about the media session and sends this information to the AP that the client is currently associated to, as part of the variable bitrate (VBR) update. When the AP learns that the client is in a call, it will not attempt to steer the client to another AP until the controller indicates that the call has ended, allowing calls to run more smoothly without any disruptions to the ongoing media flow.
Removing VBR Dependency on Probe Requests
Client Match has shifted its dependency on probe requests to the AM data feed for virtual beacon report (VBR) data. Instead of relying solely on client background scans during probe requests, which can cause limitations due to low scanning frequency, Client Match uses AM data feeds to gain more continuous, comprehensive client RSSI feeds. Along with probe requests, AM data feeds collect client information during AP scanning using the following frames:
l Block ACK l Management frames l NULL data frames l Data frames with rates no higher than 36Mbps l Control frames

513 | Adaptive Radio Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

ARM Coverage and Interference Metrics
ARM computes coverage and interference metrics for each valid channel, and chooses the best performing channel and transmit power settings for each AP's RF environment. Each AP gathers other metrics on their ARM-assigned channel to provide a snapshot of the current RF health state.
The following two metrics help the AP decide which channel and transmit power setting is best.
l Coverage Index: The AP uses this metric to measure RF coverage. The coverage index is calculated as x/y, where "x" is the AP's weighted calculation of the Signal-to-Noise Ratio (SNR) on all valid APs on a specified 802.11 channel, and "y" is the weighted calculation of the Dell AP's SNR the neighboring APs see on that channel. To view these values for an AP in your current WLAN environment, issue the CLI command show ap arm rf-summary ap-name <ap-name>, where <ap-name> is the name of an AP for which you want to view information.
l Interference Index: The AP uses this metric to measure co-channel and adjacent channel interference. The Interference Index is calculated as a/b//c/d, where: l Metric value "a" is the channel interference the AP sees on its selected channel. l Metric value "b" is the interference the AP sees on the adjacent channel. l Metric value "c" is the channel interference the AP's neighbors see on the selected channel. l Metric value "d" is the interference the AP's neighbors see on the adjacent channel. To manually calculate the total Interference Index for a channel, issue the CLI command show ap arm rfsummary ap-name <ap-name>, then add the values a+b+c+d.
Each AP also gathers the following additional metrics, which can provide a snapshot of the current RF health state. View these values for each AP using the CLI command show ap arm rf-summary ip-addr <ap ip address>.
l Amount of Retry frames (measured in %) l Amount of Low-speed frames (measured in %) l Amount of Non-unicast frames (measured in %) l Amount of Fragmented frames (measured in %) l Amount of Bandwidth seen on the channel (measured in kbps) l Amount of PHY errors seen on the channel (measured in %) l Amount of MAC errors seen on the channel (measured in %) l Noise floor value for the specified AP
Configuring ARM Profiles
ARM profile settings are divided into two categories: Basic and Advanced. The Basic ARM settings include ARM scanning checkbox and general configuration parameters such as channel and power assignments and minimum and maximum allowed EIRP values. Most network environments do not require any changes to the advanced ARM configuration settings. If, however, your network supports a large amount of VoIP or Video traffic, or if you have unusually high security requirements you may want to manually adjust the basic ARM thresholds.
Creating and Configuring a New ARM Profile
There are two ways to create a new ARM profile. You can create an entirely new profile with all default settings using the WebUI or CLI interfaces, or you can make a copy of an existing profile using the CLI interface.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Adaptive Radio Management | 514

In the WebUI
To create a new ARM profile with all default settings via the WebUI:
1. Select Configuration > Advanced Services > All Profiles. The All Profile Management window opens. 2. Select RF Management to expand the RF Management section. 3. Select Adaptive Radio Management (ARM) Profile. Any currently defined ARM profiles appears in the
right pane of the window. If you have not yet created any ARM profiles, this pane displays the default profile only. 4. To create a new profile with all default settings, enter a name in the entry blank. The name must be 1­63 characters, and can be composed of alphanumeric characters, special characters, and spaces. If your profile name includes a space, it must be enclosed within quotation marks. 5. Click Add. The new profile appears in the ARM profile list. 6. Select the name of that profile to display the current configuration settings of that profile.
To create a new ARM profile via the command-line interface, access the CLI in config mode and issue the following command:
(host)(config) #rf arm-profile <profile>
The name must be 1­63 characters, and can be composed of alphanumeric characters, special characters and spaces. If your profile name includes a space, it must be enclosed within quotation marks.

Table 103: ARM Profile Configuration Parameters

Setting

Description

Basic Configuration Settings

Assignment

Activates one of four ARM channel/power assignment modes. (The default value is singleband.)
l disable: Disables ARM calibration and reverts APs back to default channel and power settings specified by the AP's radio profile.
l maintain: APs maintain their current channel and power settings. This setting can be used to maintain AP channel and power levels after ARM has initially selected the best settings.
l multi-band: For single-radio APs, this value computes ARM assignments for both 5 GHZ (802.11a) and 2.4 GHZ (802.11b/g) frequency bands.
l single-band: For dual-radio APs, this value enables APs to change transmit power and channels within their same frequency band, and to adapt to changing channel conditions.

Allowed bands for 40MHz channels

The specified setting allows ARM to determine if 40 MHz mode of operation is allowed on the 5 GHz or 2.4 GHz frequency band only, on both frequency bands, or on neither frequency band.

80MHz support

If enabled, this feature allows ARM to assign 80 MHz channels on APs that support VHT. This setting is enabled by default.

515 | Adaptive Radio Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 103: ARM Profile Configuration Parameters

Setting

Description

Max Tx EIRP

Maximum effective isotropic radiated power (EIRP) from 3 to 33 dBm in 3 dBm increments. You may also specify a special value of 127 dBm for regulatory maximum. Higher power level settings may be constrained by local regulatory requirements and AP capabilities. In the event that an AP is configured for a Max Tx EIRP setting it cannot support, this value will be reduced to the highest supported power setting. The default value for this parameter is 127 dBm.
NOTE: Power settings will not change if the Assignment option is set to disabled or maintain.

Min Tx EIRP

Minimum effective isotropic radiated power (EIRP) from 3 to 33 dBm in 3 dBm increments. You may also specify a special value of 127 dBm for regulatory maximum to disable power adjustments for environments such as outdoor mesh links. Note that power settings will not change if the Assignment option is set to disabled or maintain. Higher power level settings may be constrained by local regulatory requirements and AP capabilities. In the event that an AP is configured for a Min Tx EIRP setting it cannot support, this value will be reduced to the highest supported power setting. The default value for this parameter is 9 dBm.
Consider configuring a Min Tx Power setting higher than the default value if most of your APs are placed on the ceiling. APs on a ceiling often have good line of sight between them, which will cause ARM to decrease their power to prevent interference. However, if the wireless clients down on the floor do not have such a clear line back to the AP, you could end up with coverage gaps.

Client Match

The client match feature helps optimize network resources by balancing clients across channels, regardless of whether the AP or the controller is responding to the wireless clients' probe requests.
If enabled, the controller compares whether an AP has more clients than its neighboring APs on other channels. If an AP's client load is at or over a predetermined threshold as compared to its immediate neighbors, or if a neighboring Dell AP on another channel does not have any clients, load balancing will be enabled on that AP. This feature is enabled by default. For details, see Client Match on page 512.

Scanning

The Scanning checkbox enables or disables AP scanning across multiple channels. This checkbox is selected by default. Do not disable scanning unless you want to disable ARM and manually configure AP channel and transmission power. Disabling this option also disables the following scanning features:
l Multi Band Scan
l Rogue AP Aware
l Voip Aware Scan
l Power Save Scan

Multi Band Scan

If enabled, single radio channel APs scans for rogue APs across multiple channels. This option requires that Scanning is also enabled.
(The Multi Band Scan option does not apply to APs that have two radios, as these devices already scan across multiple channels. If one of these dual-radio devices are assigned an ARM profile with Multi Band enabled, that device will ignore this setting.)
Default: disabled

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Adaptive Radio Management | 516

Table 103: ARM Profile Configuration Parameters

Setting

Description

VoIP Aware Scan

Dell's VoIP Call Admission Control (CAC) prevents any single AP from becoming congested with voice calls. When you enable CAC, you should also enable VoIP Aware Scan in the ARM profile, so the AP will not attempt to scan a different channel if one of its clients has an active VoIP call. This option requires that Scanning is also enabled.
Default: disabled

Power Save Aware Scan

If enabled, the AP will not scan a different channel if it has one or more clients that is in power save mode.
Default: disabled

Video Aware Scan

As long as there is at least one video frame every 100 mSec the AP will reject an ARM scanning request. Note that for each radio interface, video frames must be defined in one of two ways:
l Classify the frame as video traffic via a session ACL.
l Enable WMM on the WLAN's SSID profile and define a specific DSCP value as a video stream. Next, create a session ACL to tag the video traffic with the that DSCP value.

Scan Mode

By default, 802.11n-capable APs scan channels within all regulatory domains. To limit the AP scans to just the regulatory domain for that AP, click the Scan Mode drop-down list and select reg-domain.
NOTE: This setting does not apply to APs that do not support 802.11n; these APs will scan their regulatory domain only.

Client Match

Select this checkbox to enable the client match feature, which monitors clients' RF neighborhood to provide ongoing client bandsteering and load balancing, and enhanced AP reassignment for roaming mobile clients. For complete information on this feature, see Client Match on page 512.

Advanced Configuration Settings

Assignment

Activates one of four ARM channel/power assignment modes:
l disable: Disables ARM calibration and reverts APs back to default channel and power settings specified by the AP's radio profile.
l maintain: APs maintain their current channel and power settings. This setting can be used to maintain AP channel and power levels after ARM has initially selected the best settings.
l multi-band: For single-radio APs, this value computes ARM assignments for both 5 GHZ (802.11a) and 2.4 GHZ (802.11b/g) frequency bands.
l single-band: For dual-radio APs, this value enables APs to change transmit power and channels within their same frequency band, and to adapt to changing channel conditions.
Default: single-band

517 | Adaptive Radio Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 103: ARM Profile Configuration Parameters

Setting

Description

Allowed bands for 40MHz channels

The specified setting allows ARM to determine if 40 MHz mode of operation is allowed on the 5 GHz or 2.4 GHz frequency band only, on both frequency bands, or on neither frequency band.

Client Aware

If the Client Aware option is enabled, the AP does not change channels if there is an active client associated to that AP. (Activity is defined by the sta-inactivity-time parameter in the IDS general profile. By default, a client is considered active if it has sent or received traffic within the last 60 seconds.)
If you disable Client Aware , the AP may change to a more optimal channel, but this change may also disrupt current client traffic.
Default: enabled

Max Tx EIRP

Maximum effective isotropic radiated power (EIRP) from 3 to 33 dBm in 3 dBm increments. You may also specify a special value of 127 dBm for regulatory maximum. Higher power level settings may be constrained by local regulatory requirements and AP capabilities. In the event that an AP is configured for a Max Tx EIRP setting it cannot support, this value will be reduced to the highest supported power setting.
Default: 127 dBm
NOTE: Power settings will not change if the Assignment option is set to disabled or maintain.

Min Tx EIRP

Minimum effective isotropic radiated power (EIRP) from 3 to 33 dBm in 3 dBm increments. You may also specify a special value of 127 dBm for regulatory maximum to disable power adjustments for environments such as outdoor mesh links. Note that power settings will not change if the Assignment option is set to disabled or maintain. Higher power level settings may be constrained by local regulatory requirements and AP capabilities. In the event that an AP is configured for a Min Tx EIRP setting it cannot support, this value will be reduced to the highest supported power setting.
Default: 9 dBm
NOTE: Consider configuring a Min Tx Power setting higher than the default value if most of your APs are on the ceiling. APs on a ceiling often have good line of sight between them, which will cause ARM to decrease their power to prevent interference. However, if the wireless clients down on the floor do not have such a clear line back to the AP, you could end up with coverage gaps.

Rogue AP Aware

If you have enabled both the Scanning and Rogue AP options, Dell APs may change channels to contain off-channel rogue APs with active clients. This security features allows APs to change channels even if the Client Aware setting is disabled.
This setting is disabled by default, and should only be enabled in high-security environments where security requirements are allowed to consume higher levels of network resources. You may prefer to receive Rogue AP alerts via SNMP traps or syslog events.
Default: disabled

Scan Interval

If Scanning is enabled, the Scan Interval defines how often the AP will leave its current channel to scan other channels in the band.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Adaptive Radio Management | 518

Table 103: ARM Profile Configuration Parameters

Setting

Description

Off-channel scanning can impact client performance. Typically, the shorter the scan interval, the higher the impact on performance. If you are deploying a large number of new APs on the network, you may want to lower the Scan Interval to help those APs find their optimal settings more quickly. Raise the Scan Interval back to its default setting after the APs are functioning as desired.
Range: 0­2,147,483,647 seconds.
Default: 10 seconds

Active Scan

When you enable Active Scan, an AP initiates active scanning via probe request. This option elicits more information from nearby APs, but also creates additional management traffic on the network. Active Scan is disabled by default, and should not be enabled except under the direct supervision of Dell Support.
Default: disabled

ARM Over the Air Updates

The ARM Over the Air Updates option allows an AP to get information about its RF environment from its neighbors, even the AP cannot scan. If this feature is enabled, when an AP on the network scans a foreign (non-home) channel, it sends other APs an Over-the-Air (OTA) update in an 802.11 management frame that contains information about the scanning AP's home channel, the current transmission EIRP value of its home channel, and one-hop neighbors seen by that AP.
Default: enabled

Scanning

The Scanning checkbox enables or disables AP scanning across multiple channels. Disabling this option also disables the following scanning features: l Multi Band Scan l Rogue AP Aware l Voip Aware Scan l Power Save Scan Do not disable Scanning unless you want to disable ARM and manually configure AP channel and transmission power. Default: enabled

Multi Band Scan

If enabled, single radio channel APs scans for rogue APs across multiple channels. This option requires that Scanning is also enabled.
(The Multi Band Scan option does not apply to APs that have two radios, as these devices already scan across multiple channels. If one of these dual-radio devices are assigned an ARM profile with Multi Band enabled, that device will ignore this setting.)
Default: disabled

VoIP Aware Scan

Dell's VoIP Call Admission Control (CAC) prevents any single AP from becoming congested with voice calls. When you enable CAC, you should also enable VoIP Aware Scan in the ARM profile, so the AP will not attempt to scan a different channel if one of its clients has an active VoIP call. This option requires that Scanning is also enabled.
Default: disabled

519 | Adaptive Radio Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 103: ARM Profile Configuration Parameters

Setting

Description

Power Save Aware Scan

If enabled, the AP will not scan a different channel if it has one or more clients that is in power save mode.
Default: disabled

Video Aware Scan

As long as there is at least one video frame every 100 mSec the AP will reject an ARM scanning request. Note that for each radio interface, video frames must be defined in one of two ways:
l Classify the frame as video traffic via a session ACL.
l Enable WMM on the WLAN's SSID profile and define a specific DSCP value as a video stream. Next, create a session ACL to tag the video traffic with the that DSCP value.

Ideal Coverage Index

The Dell coverage index metric is a weighted calculation based on the RF coverage for all Dell APs and neighboring APs on a specified channel. The Ideal Coverage Index specifies the ideal coverage that an AP should try to achieve on its channel. The denser the AP deployment, the lower this value should be.
Range: 2­20
Default: 10
For additional information on how this the Coverage Index is calculated, see ARM Coverage and Interference Metrics on page 514

Acceptable Coverage Index

For multi-band implementations, the Acceptable Coverage Index specifies the minimal coverage an AP it should achieve on its channel. The denser the AP deployment, the lower this value should be.
Range: 1­6
Default: 4

Free Channel Index

The Dell Interference index metric measures interference for a specified channel and its surrounding channels. This value is calculated and weighted for all APs on those channels (including 3rd-party APs).
An AP will only move to a new channel if the new channel has a lower interference index value than the current channel. Free Channel Index specifies the required difference between the two interference index values before the AP moves to the new channel. The lower this value, the more likely it is that the AP will move to the new channel. The range of possible values is 10­40.
Default: 25
For additional information on how this the Channel Index is calculated, see ARM Coverage and Interference Metrics on page 514.

Backoff Time

After an AP changes channel or power settings, it waits for the backoff time interval before it asks for a new channel/power setting.
Range: 120­3600 seconds.
Default: 240 seconds

Error Rate Threshold

The minimum percentage of PHY errors and MAC errors in the channel that will trigger a channel change.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Adaptive Radio Management | 520

Table 103: ARM Profile Configuration Parameters

Setting

Description

Default: 50%

Error Rate Wait Time

Minimum time in seconds the error rate has to exceed the Error Rate Threshold before it triggers a channel change.
Default: 30 seconds

Channel Quality Aware Arm

Select this checkbox to allow ARM to initiate a channel change due to low quality on the current channel.

Channel Quality Threshold

Channel quality percentage below which ARM initiates a channel change. Range: 0-100% Default: 70%.

Channel Quality Wait Time

If channel quality is below the specified channel quality threshold for this wait time period, ARM initiates a channel change.
Range:1-3600 seconds
Default: 120 seconds.

Minimum Scan Time

Minimum number of times a channel must be scanned before it is considered for assignment. Range: 0­2,147,483,647 scans. It is recommended to use a Minimum Scan Time between 1­20 scans.
Default: 8 scans

Load Aware Scan Threshold

Load aware ARM preserves network resources during periods of high traffic by temporarily halting ARM scanning if the load for the AP gets too high.
The Load Aware Scan Threshold is the traffic throughput level an AP must reach before it stops scanning.
Range: 0­20,000,000 bytes/second. (Specify 0 to disable this feature.)
Default: 1250000 Bps

521 | Adaptive Radio Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 103: ARM Profile Configuration Parameters

Setting

Description

Mode Aware ARM

If enabled, ARM will turn APs into Air Monitors (AMs) if it detects higher coverage levels than necessary. This helps avoid higher levels of interference on the WLAN. Although this setting is disabled by default, you may want to enable this feature if your APs are deployed in close proximity (less than 60 feet apart).
Mode aware ARM turns Air Monitors back into APs when they detect gaps in coverage. Note that an Air Monitor will not turn back into an AP if it detects client traffic (or client traffic increases), but will change to an AP only if it detects coverage holes.
Default: disabled

Scan Mode

By default, 802.11n-capable APs scan channels within all regulatory domains. To limit the AP scans to just the regulatory domain for that AP, click the Scan Mode drop-down list and select reg-domain.
NOTE: This setting does not apply to APs that do not support 802.11n; these APs will scan their regulatory domain only.

Video Aware Scan

As long as there is at least one video frame every 100 mSec the AP will reject an ARM scanning request. Note that for each radio interface, video frames must be defined in one of two ways:
l Classify the frame as video traffic via a session ACL.
l Enable WMM on the WLAN's SSID profile and define a specific DSCP value as a video stream. Next, create a session ACL to tag the video traffic with the that DSCP value.

In the CLI
You must be in config mode to create, modify or delete an ARM profile using the CLI. Specify an existing ARM profile with the <profile-name> parameter to modify an existing ARM profile, or enter a new name to create an entirely new profile.
Configuration details and any default values for each of these parameters are described in Table 103. If you do not specify a parameter for a new profile, that profile uses the default value for that parameter. Put the no option before any parameter to remove the current value for that parameter and return it to its default setting.
The ARM profile includes advanced client match settings that can be configured through the command-line interface only. The default values for these settings are recommended for most users, and caution should be used when changing them to a non-default value. For complete details on all client match configuration settings, refer to the Dell Networking W-Series ArubaOS CLI Reference Guide.
Use the following commands to create or modify an ARM profile:
(host)(config) #rf arm-profile <profile> rf arm-profile <profile>
40MHz-allowed-bands {All|None|a-only|g-only} 80MHz support acceptable-coverage-index <number> active-scan (not intended for use) assignment {disable|maintain|multi-band|single-band} backoff-time <seconds> channel-quality-aware-arm channel-quality-threshold <channel-quality-threshold> channel-quality-wait-time <seconds> client-aware

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Adaptive Radio Management | 522

client-match clone <profile> cm-blist-timeout <secs> cm-lb-client-thresh <#-of-clients> cm-lb-snr-thresh <dB> cm-lb-thresh <%-of-clients> cm-max-steer-fails <#-of-fails> cm-stale-age <secs> cm-sticky-check_intvl <secs> cm-sticky-check_snr <dB> cm-sticky-min-signal <-dB> cm-sticky-snr-thresh cm-update-interval <dB> error-rate-threshold <percent> error-rate-wait-time <seconds> free-channel-index <number> ideal-coverage-index <number> load-aware-scan-threshold max-tx-power <dBm> min-scan-time <# of scans> min-tx-power <dBm> mode-aware multi-band-scan no ... ota-updates ps-aware-scan rogue-ap-aware scan mode all-reg-domain|reg-domain scanning video-aware-scan voip-aware-scan
Modifying an Existing Profile
To modify an existing ARM profile:
1. Follow steps 1­3 in the above procedure to access the Adaptive Radio Management (ARM) profile window.
2. From the list of profiles, select the profile with the settings you would like to modify.
3. Make any desired changes to the parameters described in Table 103, then click Apply.
To modify of an existing ARM profile via the command-line interface, access the CLI in config mode and issue the following command.
(host)(config) #rf arm-profile <profile>
Copying an Existing Profile
To create a new ARM profile based upon the settings of another existing profile:
1. Follow steps 1­3 in the above procedure to access the Adaptive Radio Management (ARM) profile window.
2. From the list of profiles, select the profile with the settings you would like to copy.
3. Click Save As.
4. Enter a name for the new profile in the entry blank. The name must be 1­63 characters, and can be composed of alphanumeric characters, special characters and spaces.
5. Click Apply.

523 | Adaptive Radio Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

To create a copy of an existing ARM profile via the command-line interface, access the CLI in config mode and issue the following command, where <newprofile> is a unique name for the new ARM profile, and <profile> is the name of the existing profile whose setting you want to copy. (host)(config) #rf arm-profile <newprofile> clone <profile>
Deleting a Profile
You can only delete unused ARM profiles; Dell will not let you delete an ARM profile that is currently assigned to an AP group. To delete an ARM profile In the WebUI: 1. Select Configuration > Advanced Services > All Profiles. The All Profile Management window opens. 2. Select RF Management to expand the RF Management section. 3. Select Adaptive Radio Management (ARM) Profile. 4. Select the name of the profile you want to delete. 5. Click Delete. To delete an ARM profile using the CLI, issue the following command where <profile> is the name of the ARM profile you want to remove: (host)(config) #no rf arm-profile <profile>

Assigning an ARM Profile to an AP Group
Once you have created a new ARM profile, you must assign it to a group of APs before those ARM settings go into effect. Each AP group has a separate set of configuration settings for its 802.11a radio profile and its 802.11g radio profile. You can assign the same ARM profile to each radio profile, or select different ARM profiles for each radio.
In the WebUI
To assign an ARM profile to an AP group via the Web User Interface:
1. Select Configuration > Wireless > AP Configuration. 2. Click the AP Group tab if it is not already selected. 3. Click the Edit button beside the AP group to which you want to assign the new ARM profile. 4. Expand the RF Management section in the left window pane. 5. Select a radio profile for the new ARM profile.
n To assign a new ARM profile to an AP group's 802.11a radio profile, expand the 802.11a radio profile section.
n To assign a new ARM profile to an AP group's 802.11g radio profile, expand the 802.11g radio profile section.
6. Select Adaptive Radio management (ARM) Profile. 7. Click the Adaptive Radio Management (ARM) Profile drop-down list in the right window pane, and
select a new ARM profile. 8. (Optional) repeat steps 6­8 to assign an ARM profile to another 802.11a or 802.11g radio profile. 9. Click Apply.
You can also assign an ARM profile to an AP group by selecting a radio profile, identifying an AP group assigned to that radio profile, and then assigning an ARM profile to one of those groups.
1. Select Configuration > Advanced Services> All Profiles. 2. Select RF Management, and then expand either the 802.11a radio profile or 802.11b radio profile.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Adaptive Radio Management | 524

3. Select an individual radio profile name to expand that profile. 4. Click Adaptive Radio Management (ARM) Profile, and then use the Adaptive Radio management
(ARM) Profile drop-down list in the right window pane to select a new ARM profile for that radio.
In the CLI
To assign an ARM profile to an AP group via the command-line interface, access the CLI in config mode and issue the following commands where <ap_profile> is the name of the AP group, and <arm_profile> is the name of the ARM profile you want to assign to that radio band.:
(host)(config) #rf dot11a-radio-profile <ap_profile> arm-profile <arm_profile> (host)(config) #rf dot11g-radio-profile <ap_profile> arm-profile <arm_profile>
Using Multi-Band ARM for 802.11a/802.11g Traffic
It is recommended that you use the multi-band ARM assignment and Mode Aware ARM feature for singleradio APs in networks with traffic in the 802.11a and 802.11g bands. This feature allows a single-radio AP to dynamically change its radio bands based on current coverage on the configured band. This feature is enabled via the AP's ARM profile.
When you first provision a single-radio AP, it initially operates in the radio band specified in its AP system profile. If the AP finds adequate coverage on multiple channels in its current band of operation, the modeaware feature allows the AP to temporarily turn itself off and become an AP Air Monitor (APM). In AP Monitor mode, the AP scans all channels across both bands to verify that each channel meets or exceeds its required level of acceptable radio coverage (as defined by the in the ARM profile).
If the AP Monitor detects that a channel on the 802.11g band does not have adequate radio coverage, it will convert back to an AP on that 802.11 channel. If the 802.11g band is adequately covered, the AP Monitor will next check the 802.11a band. If a channel on the 802.11a band lacks coverage, the AP Monitor will convert back to an AP on that 802.11a channel.
Band Steering
ARM's band steering feature encourages dual-band capable clients to stay on the 5GHz band on dual-band APs, freeing up resources on the 2.4GHz band for single-band clients like VoIP phones.Band steering reduces cochannel interference and increases available bandwidth for dual-band clients, because there are more channels on the 5GHz band than on the 2.4GHz band. Dual-band 802.11n-capable clients may see even greater bandwidth improvements, because the band steering feature will automatically select between 40MHz or 20MHz channels in 802.11n networks. This feature is disabled by default, and must be enabled in a Virtual AP profile.
The band steering feature considers several metrics before it determines if a client should be steered to the 5GHz band, including client RSSI. For example, this feature will only steer a client to the 5GHz band if that client detects an acceptable RSSI value from an 5GHz AP radio, and the signal from the 5Ghz radio is not significantly weaker than the RSSI from the 2.4GHz radio.
This feature also takes into account the current load on each radio of a dual-band AP. The band steering feature will not steer more clients to 5G on that AP if there are many clients associated to the AP, and significantly more 802.11a clients than 80211g clients.b
The band steering feature supports both campus APs and remote APs that have a virtual AP profile set to tunnel, split-tunnel, or bridge forwarding mode. Note, however, that if a campus or remote AP has virtual AP profiles configured in bridge or split-tunnel forwarding mode but no virtual AP in tunnel mode, those APs will gather information about 5G-capable clients independently and will not exchange this information with other APs that also have bridge or split-tunnel virtual APs only. The band steering feature will not proactively

525 | Adaptive Radio Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

disconnect clients that are already associated with a radio. All band steering occurs when a client is trying to associate to a new AP radio.
Best practices are to use either the Band Steering or the Client Match feature to balance client loads, but not both at the same time.
Steering Modes
Band steering supports the following three different band steering modes:
l Prefer-5GHz (Default): If you configure the AP to use prefer-5GHz band steering mode, the AP will not respond to 2.4 Ghz probe requests from a client if all the following conditions are met. n The client has already probed the AP on the 5Ghz band and therefore is known to be capable of sending probes on the 5Ghz band. n The client is not currently associated on the 2.4Ghz radio to this AP. n The client has sent fewer than 8 probes in the last 10 seconds. If the client has sent more than 8 probes in the last 10 seconds, the client will be able to connect using whatever band it prefers
l Force-5GHz: When the AP is configured in force-5GHz band steering mode, the AP will not respond to 2.4 Ghz probe requests from a client if all the following conditions are met. n The client has already probed the AP on the 5Ghz band and therefore is known to be capable of sending probes on the 5Ghz band. n The client is not currently associated on the 2.4Ghz radio of this AP.
l Balance-bands: In this band steering mode, the AP uses client load and RSSI information balance the clients across the two radios and best use the available 2.4G bandwidth. This feature takes into account the fact that the 5Ghz band has more channels than the 2.4 Ghz band, and that the 5Ghz channels operate in 40MHz while the 2.4Ghz band operates in 20MHz.
Enabling Band Steering
Band steering is configured in a virtual AP profile. Use the following procedures to enable or disable Band Steering using the WebUI or command-line interfaces.
In the WebUI
1. Select Configuration > Advanced Services > All Profiles. The All Profile Management window opens. 2. Select Wireless LAN to expand the Wireless LAN section. 3. Select Virtual AP profile to expand the Virtual AP Profile section. 4. Select the name of the Virtual AP profile for which you want to enable band steering.
(To create a new virtual AP profile, enter a name for a new profile in the Profile Details window, then click Add. The new profile will appear in the Profiles list. Select that profile to open the Profile Details pane.) 5. In the Profile Details pane, select Band Steering to enable this feature, or uncheck the Band Steering checkbox to disable this feature. 6. Once band steering is enabled, click the steering mode drop-down list and select the desired steering mode. 7. Click Apply.
In the CLI
Use the following commands to enable band steering via the command-line interface. (host)(config) #wlan virtual-ap <profile> band-steering (host)(config) #wlan virtual-ap <profile> steering-mode

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Adaptive Radio Management | 526

Enabling Traffic Shaping
In a mixed-client network, it is possible for slower clients to bring down the performance of the whole network. To solve this problem and ensure fair access to all clients independent of their WLAN or IP stack capabilities, an AP can implement the traffic shaping feature. This feature has the following three options:
l default-access: Traffic shaping is disabled, and client performance is dependent on MAC contention resolution. This is the default traffic shaping setting.
l fair-access: Each client gets the same airtime, regardless of client capability and capacity. This option is useful in environments like a training facility or exam hall, where a mix of 802.11a/g, 802.11g and 802.11n clients need equal to network resources, regardless of their capabilities.
l preferred-access: High-throughput (802.11n) clients do not get penalized because of slower 802.11a/g or 802.11b transmissions that take more air time due to lower rates. Similarly, faster 802.11a/g clients get more access than 802.11b clients.
With this feature, an AP keeps track of all BSSIDs active on a radio, all clients connected to the BSSID, and 802.11a/g, 802.11b, or 802.11n capabilities of each client. Every sampling period, airtime is allocated to each client, giving it opportunity to get and receive traffic. The specific amount of airtime given to an individual client is determined by the following factors:
l Client capabilities (802.11a/g, 802.11b or 802.11n). l Amount of time the client spent receiving data during the last sampling period. l Number of active clients in the last sampling period. l Activity of the current client in the last sampling period.
The bw-alloc parameter of a traffic management profile allows you to set a minimum bandwidth to be allocated to a virtual AP profile when there is congestion on the wireless network. You must set traffic shaping to fair-access to use this bandwidth allocation value for an individual virtual AP.
Enabling Traffic Shaping
Traffic shaping is configured in an traffic management profile.
In the WebUI
To configure traffic shaping via the WebUI:
1. Select Configuration > Advanced Services > All Profiles. The All Profile Management window opens. 2. Select QoS to expand the QoS section. 3. Select Traffic management profile. 4. In the Profiles Details window, select the name of the traffic management profile for which you want to
configure traffic shaping. (If you do not have any traffic management profiles configured, enter a name for a new profile in the Profile Details pane, click Add, then select the new profile from the profiles list.) 5. In the Profile Details pane, click the Station Shaping Policy drop-down list and select either defaultaccess, fair-access or preferred-access. 6. Click Apply.
The following table describes configuration settings available in the traffic management profile.

527 | Adaptive Radio Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 104: Traffic Management Profile Parameters

Parameter

Description

Station Shaping Policy

Define Station Shaping Policy This feature has the following three options:
l default-access: Traffic shaping is disabled, and client performance is dependent on MAC contention resolution. This is the default traffic shaping setting.
l fair-access: Each client gets the same airtime, regardless of client capability and capacity. This option is useful in environments like a training facility or exam hall, where a mix of 802.11a/g, 802.11g, and 802.11n clients need equal to network resources, regardless of their capabilities. The bw-alloc parameter of a traffic management profile allows you to set a minimum bandwidth to be allocated to a virtual AP profile when there is congestion on the wireless network. You must set traffic shaping to fair-access to use this bandwidth allocation value for an individual virtual AP.
l preferred-access: High-throughput (802.11n) clients do not get penalized because of slower 802.11a/g or 802.11b transmissions that take more air time due to lower rates. Similarly, faster 802.11a/g clients get more access than 802.11b clients.

Proportional BW Allocation

You can allocate a maximum bandwidth, as a percentage of available bandwidth to a virtual AP (VAP).
To assign a percentage of bandwidth to a virtual AP:
1. Click the Virtual AP drop-down list, and select the VAP to which you would like to allocate a bandwidth share.
2. Specify the percentage of bandwidth to be allocated to the VAP in the Share(%) field. 3. Select the Hard Limit checkbox to restrict the bandwidth for the VAP. Do not select
the Hard Limit checkbox if you want to restrict the bandwidth for this VAP when there is a congestion on the wireless network. 4. Click Add. 5. Repeat steps 1-4 to assign any remaining bandwidth to additional VAPs, if desired.
To remove a VAP from the list of VAPs with allocated bandwidth, select the VAP from the Proportional BW Allocation field and click Delete.

Report Interval

Number of minutes between bandwidth usage reports. Range: 1-99 minutes Default value is 5 minutes.

In the CLI
To enable and configure traffic shaping via the command-line interface, access the CLI in config mode and issue the following commands: wlan traffic-management-profile <profile> shaping-policy default-access|fair-access|preferredaccess
Use the following commands to apply an 802.11a or 802.11g traffic management profile to an AP group or an individual AP. ap-group <name> dot11a-traffic-mgmt-profile|dot11g-traffic-mgmt-profile <profile>
Enabling or Disabling the Hard Limit Parameter in Traffic Management Profile
You can configure the limit on OTA bandwidth for a virtual AP by enabling or disabling the hard-limit parameter in the Traffic management profile.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Adaptive Radio Management | 528

Using the WebUI
The following procedure configures the Hard Limit parameter in Traffic management profile: 1. Navigate to the Configuration > Advanced Services > All Profiles page. 2. Under QOS > Traffic management on the Profiles pane, select the profile name. 3. Under the Advanced tab on the Profile Details pane, select the Proportional BW Allocation parameter
and follow the steps given in the Table 104. 4. Click Apply.
Using the CLI
You can configure the traffic management profile using the following command: (host)(config) #wlan traffic-management-profile <profile>
Spectrum Load Balancing
The spectrum load balancing feature helps optimize network resources by balancing clients across channels, regardless of whether the AP or the controller is responding to the wireless clients' probe requests. The controller uses the ARM neighbor update messages that pass between APs and the controller to determine the distribution of clients connected to each AP's immediate (one-hop) neighbors. This feature also takes into account the number of APs visible to the clients in the RF neighborhood, and can factor the client's perspective on the network into its coverage calculations. The controller compares whether an AP has more clients than its neighboring APs on other channels. If an AP's client load is at or over a predetermined threshold as compared to its immediate neighbors, or if a neighboring Dell AP on another channel does not have any clients, load balancing will be enabled on that AP. When an AP has the spectrum load balancing feature enabled, the AP will send an association response with error code 17 to new clients trying to associate. If the client receiving the error code tries to associate to the AP a second time, it will be admitted. If a client is rejected by two APs in a row, it will be admitted by any AP on its third try. Note that the load balancing feature only affects the association of new clients; this feature does not reject or attempt to balance clients that are already associated to the AP. Spectrum load balancing is disabled by default, and can be enabled for 2.4G traffic through an 802.11g profile or for 5G traffic through an 802.11a RF management profile. The spectrum load balancing feature also requires that the 802.11a or 802.11g RF management profiles reference an ARM profile with ARM scanning enabled.
The spectrum load balancing feature available in ArubaOS 3.4.x and later releases completely replaces the AP load balancing feature available earlier versions of ArubaOS. When you upgrade from an older release to ArubaOS 3.4.x or later, you must manually configure the spectrum load balancing settings, as you can lo longer use the AP load balancing feature, and any previous AP load balancing settings will not be preserved.
For details on modifying 802.11a or 802.11g RF management profiles, refer to RF Management on page 593 .
Reusing Channels to Control RX Sensitivity Tuning
In some dense deployments, it is possible for APs to hear other APs on the same channel. This creates cochannel interference and reduces the overall usage of the channel in a given area. Channel reuse enables dynamic control over the receive (Rx) sensitivity to improve spatial reuse of the channel.
The channel reuse feature applies to non-DFS channels only. It is internally disabled for DFS channels and is does not affect DFS radar signature detection.

529 | Adaptive Radio Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

You can configure the channel reuse feature to operate in either of the following three modes; static, dynamic or disable. (This feature is disabled by default.)
l Static mode: This mode of operation is a coverage-based adaptation of the Clear Channel Assessment (CCA) thresholds. In the static mode of operation, the CCA is adjusted according to the configured transmission power level on the AP, so as the AP transmit power decreases as the CCA threshold increases, and vice versa.
l Dynamic mode: In this mode, the Clear Channel Assessment (CCA) thresholds are based on channel loads, and take into account the location of the associated clients. When you set the Channel Reuse feature to dynamic mode, this feature is automatically enabled when the wireless medium around the AP is busy greater than half the time, and the CCA threshold adjusts to accommodate transmissions between the AP its most distant associated client.
l Disable mode: This mode does not support the tuning of the CCA Detect Threshold.
The channel reuse mode is configured through an 802.11a or 802.11g RF management profile. For details on modifying 802.11a or 802.11g RF management profiles, refer to RF Management on page 593 .
Configuring Non-802.11 Noise Interference Immunity
When an AP attempts to decode a non-802.11 signal, that attempt can momentarily interrupt its ability to receive traffic. The noise immunity feature can help improve network performance in environments with a high level of non-802.11 noise from devices such as Bluetooth headsets, video monitors and cordless phones.
You can configure the noise immunity feature for any one of the following levels of noise sensitivity. Note that increasing the level makes the AP slightly "deaf" to its surroundings, causing the AP to lose a small amount of range.
l Level 0: no ANI adaptation. l Level 1: Noise immunity only. This level enables power-based packet detection by controlling the amount of
power increase that makes a radio aware that it has received a packet. l Level 2: Noise and spur immunity. This level also controls the detection of OFDM packets, and is the default
setting for the Noise Immunity feature. l Level 3: Level 2 settings and weak OFDM immunity. This level minimizes false detects on the radio due to
interference, but may also reduce radio sensitivity. This level is recommended for environments with a highlevel of interference related to 2.4Ghz, appliances such as cordless phones. l Level 4: Level 3 settings, and FIR immunity. At this level, the AP adjusts its sensitivity to in-band power, which can improve performance in environments with high, constant levels of noise interference. l Level 5: The AP completely disables PHY error reporting, improving performance by eliminating the time the controller would spend on PHY processing.
Only 802.11n-capable APs simultaneously support both the RX Sensitivity Tuning Based Channel Reuse feature and a level-3 to level-5 Noise Immunity setting. Do not raise the noise immunity default setting on APs that do not support 802.11n unless you first disable the Channel Reuse feature.
You can manage Non-802.11 Noise Immunity settings through the Non 802.11 Interference Immunity parameter in the 802.11a or 802.11g RF management profile. For details on configuring this profile, refer to RF Management on page 593
Troubleshooting ARM
If the APs on your WLAN do not seem to be operating at an optimal channel or power setting, you should first verify that both the ARM feature and ARM scanning have been enabled. Optimal ARM performance requires

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Adaptive Radio Management | 530

that the APs have IP connectivity to their master controller, as it is the master controller that gives each AP the global classification information required to keep accurate coverage index values. If ARM is enabled but does not seem to be working properly, try some of the troubleshooting tips below.
Too many APs on the Same Channel
If many APs are selecting the same RF channel, there may be excessive interference on the other valid 802.11 channels. Issue the CLI commands show ap arm rf-summary ap-name <ap-name> or show ap arm rfsummary ip-addr <ap ip address> and calculate the Interference index (intf_idx) for all the valid channels.
An AP will only move to a new channel if the new channel has a lower interference index value than the current channel. The ARM Free Channel Index parameter specifies the required difference between two interference index values. If this value is set too high, the AP will not switch channels, even if the interference is slightly lower on another channel. Lower the Free Channel Index to improve the likelihood that the AP will switch to a better channel.
Wireless Clients Report a Low Signal Level
If APs detect strong signals from other APs on the same channel, they may decrease their power levels accordingly. Issue the CLI commands show ap arm rf-summary ap-name <ap-name> or show ap arm rfsummary ip-addr <ap ip address>.
for all APs and check their current coverage index (cov-idx). If the AP's coverage index is at or higher than the configured coverage index value, then the APs have correctly chosen the transmit power setting. To manually increase the minimum power level for the APs using a specific ARM profile, define a higher minimum value with the command rf arm-profile <profile> min-tx-power <dBm>.
If wireless clients still report that they see low signal levels for the APs, check that the AP's antennas are correctly connected to the AP and correctly placed according to the manufacturer's installation guide.
Transmission Power Levels Change Too Often
Frequent changes in transmission power levels can indicate an unstable RF environment, but can also reflect incorrect ARM or AP settings. To slow down the frequency at which the APs change their transmit power, set the ARM backoff time to a higher value. If APs use external antennas, check the Configuration > Wireless > AP Installation > Provisioning window to make sure the APs are statically configured for the correct dBi gain, antenna type, and antenna number. If only one external antenna is connected to its radio, you must select either antenna number 1 or 2.
APs Detect Errors but Do Not Change Channels
First, ensure that ARM error checking is enabled. The ARM Error Rate Threshold should be set to a percentage higher than zero. The suggested configuration value for the ARM Error Rate Threshold is 30­50%.
APs Don't Change Channels Due to Channel Noise
APs will only change channels due to interference if you enable ARM noise checking. Check to verify that the ARM Noise Threshold is set to a value higher than 0 dBm. The suggested setting for this threshold is 75 dBm.

531 | Adaptive Radio Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Chapter 21 Wireless Intrusion Prevention

The ArubaOS Wireless Intrusion Prevention (WIP) features and configurations are discussed in this chapter. WIP offers a wide selection of intrusion detection and protection features to protect the network against wireless threats. Like most other security-related features of the Dell network, the WIP configuration is done on the master controller in the network. To use most of the features described in this chapter, you must install a Wireless Intrusion Protection (RFprotect) license on all controllers in your network. If you install a RFprotect license on a master controller only, an AP or AM terminated on a local controller will not provide the WIP features. These features do not require an RFprotect license: l Rogue AP classification techniques other than AP classification rules l Rogue containment l Wired containment l Wireless containment without Tarpit For details on commands see the Dell Networking W-Series ArubaOS 6.4.x Command Line Interface Guide. This chapter contains the following sections: l Working with the Reusable Wizard on page 532 l Monitoring the Dashboard on page 535 l Detecting Rogue APs on page 536 l Working with Intrusion Detection on page 539 l Configuring Intrusion Protection on page 551 l Configuring the WLAN Management System (WMS) on page 555 l Understanding Client Blacklisting on page 558 l Working with WIP Advanced Features on page 560 l Configuring TotalWatch on page 561 l Administering TotalWatch on page 563 l Tarpit Shielding Overview on page 564 l Configuring Tarpit Shielding on page 564
Working with the Reusable Wizard
The WebUI's reusable, intuitive, user-friendly Wizard provides steps to enable, define, or change l Integrated vs Overlay WLAN/WIP options l Rules-based rogue classification l Detection features for attacks against infrastructure l Detection features for attacks against WLAN clients l Protection features for attacks against infrastructure l Protection features for WLAN clients Figure 67 displays the WIP Wizard layout. Highlighting one of the previously configured rules reveals drop down menus for changing values. Note that the reusable wizard includes robust online Help.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Wireless Intrusion Prevention | 532

Figure 67 WIP Wizard

Understanding Wizard Intrusion Detection
Apply the intrusion detection mechanisms for detecting attacks against your infrastructure and clients (see Figure 68). You can either set the detection level to automatically enable the appropriate detection mechanisms or customize the settings for infrastructure and client attacks. Use the slider to select one of the detection levels for the infrastructure and clients:
l High--Enables all the detection mechanisms applicable to your infrastructure, including all the options of low and medium level settings.
l Medium (Default)--Enables some important detection mechanisms for your infrastructure. This includes all the options of the low level settings.
l Low--Enables only the most critical detection mechanisms for your infrastructure. l Off--Disables all the detection mechanisms.
To enable custom settings, click the Allow custom settings link to manually enable or disable the detection mechanisms for your clients. To revert to the standard settings from the custom settings mode, click the Revert to standard settings link.

533 | Wireless Intrusion Prevention

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 68 WIP Wizard's Intrusion Detection

Understanding Wizard Intrusion Protection
Apply the intrusion protection mechanisms for your infrastructure and clients (see Figure 69). You can set the protection level to automatically enable the appropriate protection mechanisms or customize the settings for your infrastructure and clients.
Protecting Your Infrastructure
Use the slider to select one of the protection levels for the infrastructure:
l High--Enables all the protection mechanisms applicable to your infrastructure including all the options of low and medium level settings.
l Medium--Enables some important protection mechanisms for your infrastructure, including all the options of the low level settings.
l Low--Enables only the most critical protection mechanisms for your infrastructure. l Off (Default)--Disables all the protection mechanisms.
To enable custom settings, click the Allow custom settings link. You can manually enable or disable the protection mechanisms for your infrastructure. To revert to the standard settings from custom settings mode, click the Revert to standard settings link.
Protecting Your Clients
Use the slider (see Figure 69) to select one of the following preset protection levels for your clients:
l High--Enables all the protection mechanisms applicable to your clients including all the options of the low level settings.
l Low--Enables only the most critical protection mechanisms for your clients. l Off (Default)--Disables all the protection mechanisms.
To enable custom settings, click the Allow custom settings link to manually enable or disable the protection mechanisms for your clients. To revert to the standard settings from custom settings mode, click the Revert to standard settings link.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Wireless Intrusion Prevention | 534

Figure 69 WIP Wizard Intrusion Protection

Monitoring the Dashboard
The Security Summary dashboard, in the Monitoring section of the WebUI, allows you to monitor the detection and protection of wireless intrusions in your network.
The dashboard's two top tables--Discovered APs & Clients and Events--contain data as links. When these links are selected, they arrange, filter, and display the appropriate information in the lower table. For example, if you select the number 10 under the Active APs column (highlighted in yellow in Figure 70), the bottom table will filter and arrange information about the ten classified Rogue APs. Use the scroll bar at the right to view all ten Rogue APs.
The term events in this document is meant to include security threats, vulnerabilities, attacks (intrusion or Denial of Service) and other similarly related events.
The Event table contains data links. Selecting these data links will display information, in the bottom table, related to the Event you selected. Again, remember to use the scroll bar at the right to view all the Events.

535 | Wireless Intrusion Prevention

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 70 WIP Monitoring Dashboard

Detecting Rogue APs
The most important WIP functionality is the ability to classify an AP as a potential security threat. An AP is considered to be rogue if it is both unauthorized and plugged in to the wired side of the network. An AP is considered to be interfering if it is seen in the RF environment but is not connected to the wired network. While the interfering AP can potentially cause RF interference, it is not considered a direct security threat since it is not connected to the wired network. However, an interfering AP may be reclassified as a rogue AP.
Understanding Classification Terminology
APs and clients are discovered during scanning of the wireless medium, and they are classified into various groups. The AP and client classification definitions are in Table 105 and Table 106.

Table 105: AP Classification Definition

Classification

Description

Valid AP

An AP that is part of the enterprise providing WLAN service.

Interfering AP

An AP that is seen in the RF environment but is not connected to the wired network. An interfering AP is not considered a direct security threat since it is not connected to the wired network. For example, an interfering AP can be an AP that belongs to a neighboring office's WLAN but is not part of your WLAN network.

Neighbor AP

A neighboring AP is when the BSSIDs are known. Once classified, a neighboring AP does not change its state.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Wireless Intrusion Prevention | 536

Classification Rogue AP

Description An unauthorized AP that is plugged into the wired side of the network.

Suspected-Rogue AP

A suspected rogue AP is an unauthorized AP that may be plugged into the wired side of the network.

Manually-contained AP

An AP for which DoS is enabled manually.

Table 106: Client Classification Definitions

Classification

Description

Valid Client

Any client that successfully authenticates with a valid AP and passes encrypted traffic is classified as a valid client.

Manually-contained Client

Any clients for which DoS is enabled manually.

Interfering Client

A client associated to any AP and is not valid.

Understanding Classification Methodology
A discovered AP is classified as a rogue or a suspected rogue by the following methods:
l Internal heuristics l AP classification rules l Manually by the user
The internal heuristics works by checking if the discovered AP is communicating with a wired device on the customer network. This is done by matching the MAC address of devices that are on the discovered AP's network with that of the user's wired network. The MAC of the device on the discovered AP's network is known as the Match MAC. The ways in which the matching of wired MACs occurs is detailed in the sections Understanding Match Methods on page 537 and Understanding Match Types on page 538.
Understanding Match Methods
The match methods are:
l Plus One--The match MAC matches a device whose MAC address' last bit was one more than that of the Match MAC.
l Minus One--The match MAC matches a device whose MAC address' last bit was one less than that of the Match MAC.
l Equal--The match was against the same MAC address. l OUI--The match was against the manufacturer's OUI of the wired device.
The classification details are available in the `Discovered AP table' section of the `Security Summary' page of the WebUI. The information can be obtained by clicking on the details icon for a selected discovered AP. The information is also available in the command show wms rogue-ap.

537 | Wireless Intrusion Prevention

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Understanding Match Types
l Eth-Wired-MAC: The MAC addresses of wired devices learned by an AP on its Ethernet interface. l GW-Wired-MAC: The collection of Gateway MACs of all APs across the master and local controllers. l AP-Wired-MAC: The MAC addresses of wired devices learned by monitoring traffic out of other valid and
rogue APs. l Config-Wired-MAC: The MAC addresses that are configured by the user, typically that of well-known
servers in the network. l Manual: User-triggered classification. l External-Wired-MAC: The MAC address matched a set of known wired devices that are maintained in an
external database. l Mobility-Manager: The classification was determined by the mobility manager, AMP. l Classification-off: AP is classified as rogue because classification has been disabled, causing all non-
authorized APs to be classified as rogue. l Propagated-Wired-MAC: The MAC addresses of wired devices learned by a different AP than the one that
uses it for classifying a rogue. l Base-BSSID-Override: The classification was derived from another BSSID, which belongs to the same AP
that supports multiple BSSIDs on the radio interface. l AP-Rule: A user-defined AP classification rule has matched. l System-Wired-MAC: The MAC addresses of wired devices learned at the controller. l System-Gateway-MAC: The Gateway MAC addresses learned at the controller.
Understanding Suspected Rogue Confidence Level
A suspected rogue AP is a potential threat to the WLAN infrastructure. A suspected rogue AP has a confidence level associated with it. An AP can be marked as a suspected rogue if it is determined to be a potential threat on the wired network, or if it matches a user-defined classification rule.
The suspected-rogue classification mechanisms are:
l Each mechanism that causes a suspected-rogue classification is assigned a confidence level increment of 20%.
l AP classification rules have a configured confidence level. l When a mechanism matches a previously unmatched mechanism, the confidence level increment
associated with that mechanism is added to the current confidence level (the confidence level starts at zero). l The confidence level is capped at 100%. l If your controller reboots, your suspected-rogue APs are not checked against any new rules that were configured after the reboot. Without this restriction, all the mechanisms that classified your APs as suspected-rogues may trigger again, causing the confidence level to surpass its cap of 100%. You can explicitly mark an AP as "interfering" to trigger all new rules to match against it.
Understanding AP Classification Rules
AP classification rule configuration is performed only on a master controller. If AMP is enabled via the mobility-manager command, then processing of the AP classification rules is disabled on the master controller. A rule is identified by its ASCII character string name (32 characters maximum). The AP classification rules have one of the following specifications:
l SSID of the AP l SNR of the AP l Discovered-AP-Count or the number of APs that can see the AP

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Wireless Intrusion Prevention | 538

Understanding SSID specification
Each rule can have up to 6 SSID parameters. If one or more SSIDs are specified in a rule, an option of whether to match any of the SSIDs or not match all of the SSIDs can be specified. The default is to check for a match operation.
Understanding SNR specification
Each rule can have only one specification of the SNR. A minimum and/or maximum can be specified in each rule, and the specification is in SNR (db).
Understanding Discovered-AP-Count specification
Each rule can have only one specification of the Discovered-AP-Count. Each rule can specify a minimum or maximum of the Discovered-AP-count. The minimum or maximum operation must be specified if the Discovered-AP-count is specified. The default setting is to check for the minimum discovered-AP-count.
Sample Rules
If SSID equals xyz AND SNR > 40 then classify AP as suspected-rogue with conf-level-increment of 20 If SNR > 60 and DISCOVERING_APS > 2, then classify AP as suspected-rogue with conf-level increment of 35 If SSID equals `XYZ', then classify AP as known-neighbor
Understanding Rule Matching
A rule must be enabled before it is matched. A maximum of 32 rules can be created with a maximum of 16 rules simultaneously active. If a rule matches, an AP is classified as: l Suspected-Rogue: An associated confidence-level is provided (minimum is 5%) l Neighbor The following mechanism is used for rule matching: l When all the conditions specified in the rule evaluate to true, the rule matches. l If multiple rules match, causing the AP to be classified as a Suspected-Rogue, the confidence level of each
rule is aggregated to determine the confidence level of the classification. l When multiple rules match and any one of those matching rules cause the AP to be classified as a Neighbor,
then the AP is classified as Neighbor. l APs classified as either Neighbor or Suspected-Rogue will attempt to match any configured AP rule. l Once a rule matches an AP, the same rule will not be checked for the AP. l When the controller reboots, no attempt to match a previously matched AP is made. l If a rule is disabled or modified, all APs that were previously classified based on that rule will continue to be
in the newly classified state.
Working with Intrusion Detection
This section covers Infrastructure and Client Intrusion Detections.
Understanding Infrastructure Intrusion Detection
Detecting attacks against the infrastructure is critical in avoiding attacks that may lead to a large-scale Denial of Service (DoS) attack or a security breach. This group of features detects attacks against the WLAN infrastructure, which consists of authorized APs, the RF medium, and the wired network. An authorized or valid-AP is defined as an AP that belongs to the WLAN infrastructure. The AP is either a Dell AP or a third party AP. ArubaOS automatically learns authorized Dell APs.

539 | Wireless Intrusion Prevention

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 107 presents a summary of the Intrusion infrastructure detection features with their related commands, traps, and syslog identification. Feature details follow the table.

Table 107: Infrastructure Detection Summary

Feature

Command

Detecting an 802.11n 40MHz Intolerance Setting on page 543

ids dos-profile detect-ht-40mhz-intolerance client-ht-40mhz-intol-quiet-time

Detecting Active 802.11n Greenfield Mode on page 544

ids unauthorized-device-profile detect-ht-greenfield

Detecting Ad hoc Networks on page 544

ids unauthorized-device-profile detect-adhoc-network

Detecting an Ad hoc Network Using a Valid SSID on page 544

ids unauthorized-device-profile detect-adhoc-using-valid-ssid adhoc-using-valid-ssid-quiet-time

Detecting an AP Flood Attack on page 544

ids dos-profile detect-ap-flood ap-flood-threshold ap-flood-inc-time ap-flood-quiet-time

Detecting AP Impersonation on page 544

ids impersonation-profile detect-ap-impersonation beacon-diff-threshold beacon-inc-wait-time

Detecting AP Spoofing on page 544

ids impersonation-profile detect-ap-spoofing ap-spoofing-quiet-time

Trap wlsxHT40MHzIntoleranceAP wlsxHT40MHzIntoleranceSta
wlsxHtGreenfieldSupported
wlsxNAdhocNetwork wlsxAdhocUsingValidSSID
wlsxApFloodAttack
wlsxAPImpersonation wlsxAPSpoofingDetected wlsxClientAssociatingOn WrongChannel

Syslog ID
1260 52, 1260 53, 1270 52, 1270 53
1260 54, 1270 54
1260 33, 1270 33
1260 68, 1270 68
1260 34, 1270 34
1260 06, 1270 06
1260 69, 1260 70, 1270 69, 1270 70

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Wireless Intrusion Prevention | 540

Feature

Command

Detecting Bad WEP Initialization on page 544

ids unauthorized-device-profile detect-bad-wep

Detecting a Beacon Frame Spoofing Attack on page 544

ids impersonation-profile detect-beacon-wrong-channel beacon-wrong-channel-quiet-time

Detecting a Client Flood Attack on page 544

ids dos-profile detect-client-flood client-flood-threshold client-flood-inc-time client-flood-quiet-time

Detecting a CTS Rate Anomaly

ids dos-profile detect-cts-rate-anomaly cts-rate-threshold cts-rate-time-interval cts-rate-quiet-time

Detecting Devices with an Invalid MAC OUI on page 545

ids unauthorized-device-profile detect-invalid-mac-oui mac-oui-quiet-time

Detecting an Invalid Address Combination on page 545

ids dos-profile detect-invalid-address-combination invalid-address-combination-quiettime

Detecting an Overflow EAPOL Key on page 545

ids dos-profile detect-overflow-eapol-key overflow-eapol-key-quiet-time

Trap
wlsxRepeatWEPIVViolation wlsxStaRepeatWEPIVViolation wlsxWeakWEPIVViolation wlsxStaWeakWEPIVViolation

Syslog ID
1260 14, 1260 15, 1260 16, 1260 17, 1270 14, 1270 15, 1270 16, 1270 17

wlsxMalformedFrameWrongChan nel Detected

1260 86, 1270 86

wlsxClientFloodAttack

1260 64, 1270 64

wlsxCtsRateAnomaly

1260 73, 1270 73

wlsxInvalidMacOUIAP wlsxInvalidMacOUISta
wlsxInvalidAddressCombination

1260 29, 1260 30, 1270 29, 1270 30
1260 79, 1270 79

wlsxMalformedOverflowEAPOLKe y Detected

1260 82, 1270 82

541 | Wireless Intrusion Prevention

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Feature

Command

Detecting Overflow IE Tags on page 545

ids dos-profile detect-overflow-ie overflow-ie-quiet-time

Detecting a Malformed Frame-Assoc Request on page 545

ids dos-profile detect-malformed-assoc-req malformed-assoc-req-quiet-time

Detecting Malformed Frame-Auth on page 545

ids dos-profile detect-malformed-frame-auth malformed-auth-frame-quiet-time

Detecting a Malformed Frame-HT IE on page 546

ids dos-profile detect-malformed-htie malformed-htie-quiet-time

Detecting a Malformed Frame-Large Duration on page 546

ids-dos-profile detect-malformed-large-duration malformed-large-duration-quiet-time

Detecting a Misconfigured AP on page 546
(WEP, WPA, SSID, Channel, OUI)

ids unauthorized-device-profile detect-misconfigured-ap privacy require-wpa valid-and-protected-ssid cfg-valid-11g-channel cfg-valid-11a-channel valid-oui

Detecting a CTS Rate Anomaly on page 545

ids dos-profile detect-rts-rate-anomaly rts-rate-threshold rts-rate-time-interval rts-rate-quiet-time

Trap wlsxOverflowIEDetected

Syslog ID
1260 84, 1270 84

wlsxMalformedAssocReqDetecte d

1260 80, 1270 80

wlsxMalformedAuthFrameDetect ed

1260 83, 1270 83

wlsxMalformedHTIEDetected

1260 81, 1270 81

wlsxMalformedFrameLargeDurat ion
Detected

1260 85, 1270 85

wlsxWEPMisconfiguration wlsxWPAMisconfiguration wlsxSSIDMisconfiguration wlsxChannelMisconfiguration wlsxOUIMisconfiguration
wlsxRtsRateAnomaly

1260 11, 1260 28, 1260 10, 1260 08, 1260 09, 1270 11, 1270 28, 1270 10, 1270 08, 1270 09
1260 74, 1270 74

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Wireless Intrusion Prevention | 542

Feature
Detecting a Windows Bridge on page 546

Command
ids unauthorized-device-profile detect-windows-bridge

Detecting a Wireless Bridge on page 546

ids unauthorized-device-profile detect-wireless-bridge wireless-bridge-quiet-time

Detecting Broadcast Deauthenticati on on page 546

ids signature-matching-profile signature deauth-Broadcast
ids general-profile signature-quiet-time

Detecting Broadcast Disassociation on page 546

ids signature-matching-profile signature disassoc-Broadcast
ids general-profile signature-quiet-time

Detecting Netstumbler on page 546

ids signature-matching-profile signature `Netstumbler Generic' signature `Netstumbler Version 3.3.0.x'

ids general-profile signature-quiet-time

Detecting Valid SSID Misuse on page 546

ids-unauthorized-device-profile detect-valid-ssid-misuse valid-and-protected-ssid

Detecting Wellenreiter on page 546

ids signature-matching-profile signature Wellenreiter
ids general-profile signature-quiet-time

Trap

Syslog ID

wlsxWindowsBridgeDetectedAP
wlsxWindowsBridgeDetectedSta
wlsxNAdhocNetworkBridgeDetec ted
AP
wlsxNAdhocNetworkBridgeDetec ted Sta

1260 39, 1260 40, 1260 41, 1260 42, 1270 39, 1270 40, 1270 41, 1270 42

wlsxWirelessBridge

1260 36, 1270 36

wlsxNSignatureMatchDeauthBca st

1260 47, 1270 47

wlsxNSignatureMatchDisassocBc ast

1260 66, 1270 66

wlsxNSignatureMatchNetstumble r

1260 43, 1270 43

wlsxValidSSIDViolation

1260 07, 1270 07

wlsxNSignatureMatchWellenreite r

1260 67, 1270 67

Detecting an 802.11n 40MHz Intolerance Setting
When a client sets the HT capability "intolerant bit" to indicate that it is unable to participate in a 40MHz BSS, the AP must use lower data rates with all of its clients. Network administrators often want to know if there are

543 | Wireless Intrusion Prevention

Dell Networking W-Series ArubaOS 6.4.x | User Guide

devices that are advertising 40MHz intolerance, as this can impact the performance of the network.
Detecting Active 802.11n Greenfield Mode
When 802.11 devices use the HT operating mode, they can not share the same channel as 802.11a/b/g stations. Not only can they not communicate with legacy devices, the way they use the transmission medium is different, which would cause collisions, errors, and retransmissions.
Detecting Ad hoc Networks
An ad-hoc network is a collection of wireless clients that form a network amongst themselves without the use of an AP. As far as network administrators are concerned, ad-hoc wireless networks are uncontrolled. If they do not use encryption, they may expose sensitive data to outside eavesdroppers. If a device is connected to a wired network and has bridging enabled, an ad-hoc network may also function like a rogue AP. Additionally, adhoc networks can expose client devices to viruses and other security vulnerabilities. For these reasons, many administrators choose to prohibit ad-hoc networks.
Detecting an Ad hoc Network Using a Valid SSID
If an unauthorized ad-hoc network is using the same SSID as an authorized network, a valid client may be tricked into connecting to the wrong network. If a client connects to a malicious ad-hoc network, security breaches or attacks can occur.
Detecting an AP Flood Attack
Fake AP is a tool that was originally created to thwart wardrivers by flooding beacon frames containing hundreds of different addresses. This would appear to a wardriver as though there were hundreds of APs in the area, thus concealing the real AP. An attacker can use this tool to flood an enterprise or public hotspots with fake AP beacons to confuse legitimate users and to increase the amount of processing need on client operating systems.
Detecting AP Impersonation
In AP impersonation attacks, the attacker sets up an AP that assumes the BSSID and ESSID of a valid AP. AP impersonation attacks can be done for man-in-the-middle attacks, a rogue AP attempting to bypass detection, or a honeypot attack.
Detecting AP Spoofing
An AP Spoofing attack involves an intruder sending forged frames that are made to look like they are from a legitimate AP. It is trivial for an attacker to do this, since tools are readily available to inject wireless frames with any MAC address that the user desires. Spoofing frames from a legitimate AP is the foundation of many wireless attacks.
Detecting Bad WEP Initialization
This is the detection of WEP initialization vectors that are known to be weak. A primary means of cracking WEP keys is to capture 802.11 frames over an extended period of time and searching for such weak implementations that are still used by many legacy devices.
Detecting a Beacon Frame Spoofing Attack
In this type of attack, an intruder spoofs a beacon packet on a channel that is different from that advertised in the beacon frame of the AP.
Detecting a Client Flood Attack
There are fake AP tools that can be used to attack wireless intrusion detection itself by generating a large number of fake clients that fill internal tables with fake information. If successful, it overwhelms the wireless

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Wireless Intrusion Prevention | 544

intrusion system, resulting in a DoS.
Detecting a CTS Rate Anomaly
The RF medium can be reserved via Virtual Carrier Sensing using a Clear To Send (CTS) transaction. The transmitter station sends a Ready To Send (RTS) frame to the receiver station. The receiver station responds with a CTS frame. All other stations that receive these CTS frames will refrain from transmitting over the wireless medium for an amount of time specified in the duration fields of these frames.
Attackers can exploit the Virtual Carrier Sensing mechanism to launch a DoS attack on the WLAN by transmitting numerous RTS and/or CTS frames. This causes other stations in the WLAN to defer transmission to the wireless medium. The attacker can essentially block the authorized stations in the WLAN with this attack.
Detecting an RTS Rate Anomaly
The RF medium can be reserved via Virtual Carrier Sensing using an RTS transaction. The transmitter station sends a RTS frame to the receiver station. The receiver station responds with a CTS frame. All other stations that receive these RTS frames will refrain from transmitting over the wireless medium for an amount of time specified in the duration fields of these frames.
Attackers can exploit the Virtual Carrier Sensing mechanism to launch a DoS attack on the WLAN by transmitting numerous RTS and/or CTS frames. This causes other stations in the WLAN to defer transmission to the wireless medium. The attacker can essentially block the authorized stations in the WLAN with this attack.
Detecting Devices with an Invalid MAC OUI
The first three bytes of a MAC address, known as the MAC organizationally unique identifier (OUI), is assigned by the IEEE to known manufacturers. Often, clients using a spoofed MAC address do not use a valid OUI and instead use a randomly generated MAC address.
Detecting an Invalid Address Combination
In this attack, an intruder can cause an AP to transmit deauthentication and disassociation frames to all of its clients. Triggers that can cause this condition include the use of broadcast or multicast MAC address in the source address field.
Detecting an Overflow EAPOL Key
Some wireless drivers used in access points do not correctly validate the EAPOL key fields. A malicious EAPOLKey packet with an invalid advertised length can trigger a DoS or possible code execution. This can only be achieved after a successful 802.11 association exchange.
Detecting Overflow IE Tags
Some wireless drivers used in access points do not correctly parse the vendor-specific IE tags. A malicious association request sent to the AP containing an IE with an inappropriate length (too long) can cause a DoS and potentially lead to code execution. The association request must be sent after a successful 802.11 authentication exchange.
Detecting a Malformed Frame-Assoc Request
Some wireless drivers used in access points do not correctly parse the SSID information element tag contained in association request frames. A malicious association request with a null SSID (that is, zero length SSID) can trigger a DoS or potential code execution condition on the targeted device.
Detecting Malformed Frame-Auth
Malformed 802.11 authentication frames that do not conform to the specification can expose vulnerabilities in some drivers that have not implemented proper error checking. This feature checks for unexpected values in

545 | Wireless Intrusion Prevention

Dell Networking W-Series ArubaOS 6.4.x | User Guide

an Authentication frame.
Detecting a Malformed Frame-HT IE
The IEEE 802.11n HT (High Throughput) IE is used to convey information about the 802.11n network. An 802.11 management frame containing a malformed HT IE can crash some client implementations, potentially representing an exploitable condition when transmitted by a malicious attacker.
Detecting a Malformed Frame-Large Duration
The virtual carrier-sense attack is implemented by modifying the 802.11 MAC layer implementation to allow random duration values to be sent periodically. This attack can be carried out on the ACK, data, RTS, and CTS frame types by using large duration values. This attack can prevent channel access to legitimate users.
Detecting a Misconfigured AP
A list of parameters can be configured to define the characteristics of a valid AP. This feature is primarily used when non-Dell APs are used in the network, since the Dell controller cannot configure the third-party APs. These parameters include WEP, WPA, OUI of valid MAC addresses, valid channels, and valid SSIDs.
Detecting a Windows Bridge
A Windows Bridge occurs when a client that is associated to an AP is also connected to the wired network, and has enabled bridging between these two interfaces.
Detecting a Wireless Bridge
Wireless bridges are normally used to connect multiple buildings together. However, an attacker could place (or have an authorized person place) a wireless bridge inside the network that would extend the corporate network somewhere outside the building. Wireless bridges are somewhat different from rogue APs, in that they do not use beacons and have no concept of association. Most networks do not use bridges ­ in these networks, the presence of a bridge is a signal that a security problem exists.
Detecting Broadcast Deauthentication
A deauthentication broadcast attempts to disconnect all stations in range. Rather than sending a spoofed deauth to a specific MAC address, this attack sends the frame to a broadcast address.
Detecting Broadcast Disassociation
By sending disassociation frames to the broadcast address (FF:FF:FF:FF:FF:FF), an attacker can disconnect all stations on a network for a widespread DoS.
Detecting Netstumbler
NetStumbler is a popular wardriving application used to locate 802.11 networks. When used with certain NICs, NetStumbler generates a characteristic frame that can be detected. Version 3.3.0 of NetStumbler changed the characteristic frame slightly.
Detecting Valid SSID Misuse
If an unauthorized AP (neighbor or interfering) is using the same SSID as an authorized network, a valid client may be tricked into connecting to the wrong network. If a client connects to a malicious network, security breaches or attacks can occur.
Detecting Wellenreiter
Wellenreiter is a passive wireless network discovery tool used to compile a list of APs along with their MAC address, SSID, channel, and security setting in the vicinity. It passively sniffs wireless traffic, and with certain version (versions 1.4, 1.5, and 1.6), sends active probes that target known default SSIDs.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Wireless Intrusion Prevention | 546

Understanding Client Intrusion Detection
Generally, clients are more vulnerable to attacks than APs. Clients are more apt to associate with a malignant AP due to the client's driver behavior or a misconfigured client. It is important to monitor authorized clients to track their associations and to track any attacks raised against the client.Client attack detection is categorized as:
l Detecting attacks against Dell APs clients: An attacker can perform an active DOS attack against an associated client, or perform a replay attack to obtain the keys of transmission which could lead to more serious attacks.
l Monitoring Authorized clients: Since clients are easily tricked into associating with unauthorized APs, tracking all misassociations of authorized clients is very important.
An authorized client is a client authorized to use the WLAN network. In ArubaOS, an authorized client is called a valid-client. ArubaOS automatically learns a valid client. A client is determined to be valid if it is associated to an authorized or valid AP using encryption; either Layer 2 or IPSEC.
Detection of attacks is limited to valid clients and clients associated to valid APs. Clients that are associated as guests using unencrypted association are included in the attack detection. However, clients on neighboring (interfering) APs are not tracked for attack detection unless they are specified as valid.
Table 108 presents a summary of the client intrusion detection features with their related commands, traps, and syslog identification. Details of each feature follow the table.

Table 108: Client Detection Summary

Feature

Command

Trap

Detecting a Block ACK DoS on page 549

ids-dos-profile detect-block-ack-attack block-ack-quiet-time

wlsxBlockAckAttackDetected

Detecting a ChopChop Attack on page 549

ids-dos-profile detect-chopchop-attack chopchop-quiet-time

wlsxChopChopAttackDetected

Detecting a Disconnect Station Attack on page 549

ids dos-profile <name> detect-disconnect-sta disconnect-sta-quiet-time disconnect-sta-assoc-resp-threshold disconnect-deauth-disassoc-threshold

wlsxNDisconnectStationAttack

Detecting an EAP Rate Anomaly on page 549

ids-dos-profile detect-eap-rate-anomaly eap-rate-threshold eap-rate-time-interval eap-rate-quiet-time

wlsxEAPRateAnomaly

Detecting a FATA-Jack Attack Structure on page 549

ids dos-profile detect-fatajack-attack fatajack-attack-quiet-time

wlsxFataJackAttackDetected

Syslog ID
12608 7, 127087
12607 8, 127078
12603 5, 127035
12603 2, 127032
12607 2, 127072

547 | Wireless Intrusion Prevention

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Feature
Detecting a Hotspotter Attack on page 550

Command
ids impersonation-profile detect-hotspotter-attack hotspotter-quiet-time

Trap wlsxHotspotterAttackDetected

Syslog ID
12608 8, 127088

Detecting a Meiners Power Save DoS Attack on page 550

ids dos-profile detect-power-save-dos-attack power-save-dos-min-frames power-save-dos-quiet-time power-save-dos-threshold

wlsxPowerSaveDoSAttack

12610 9, 127109

Detecting an Omerta Attack on page 550

ids dos-profile detect-omerta-attack omerta-attack-threshold omerta-attack-quiet-time

wlsxOmertaAttack

12607 1, 127071

Detecting Rate Anomalies on page 550

ids dos-profile detect-rate-anomalies
assoc-rate-thresholds disassoc-rate-thresholds deauth-rate-thresholds probe-request-rate-thresholds probe-response-rate-thresholds auth-rate-thresholds

wlsxChannelRateAnomaly wlsxNodeRateAnomalyAP wlsxNodeRateAnomalySta

12606 1, 12606 2, 12606 3, 12706 1, 12706 2, 127063

Detecting a TKIP Replay Attack on page 550

ids dos-profile detect-tkip-replay-attack tkip-replay-quiet-time

wlsxTkipReplayAttackDetected

12607 7, 127077

Detecting Unencrypted Valid Clients on page 550

ids unauthorized-device-profile detect-unencrypted-valid-client unencrypted-valid-client-quiet-time

wlsxValidClientNotUsingEncryption

12606 5, 127065

Detecting a Valid Client Misassociatio n on page 550

ids unauthorized-device-profile detect-valid-client-misassociation

wlsxValidClientMisassociation

12607 5, 127075

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Wireless Intrusion Prevention | 548

Feature

Command

Detecting an AirJack Attack on page 551

ids signature-matching-profile signature AirJack
ids general-profile signature-quiet-time

Detecting ASLEAP on page 551

ids signature-matching-profile signature ASLEAP
ids general-profile signature-quiet-time

Detecting a Null Probe Response on page 551

ids signature-matching-profile signature Null Probe Response
ids general-profile signature-quiet-time

Trap wlsxNSignatureMatchAirjack

Syslog ID
12604 6, 127046

wlsxNSignatureMatchAsleap

12604 4, 127044

wlsxNSignatureMatchNullProbeRe sp

12604 5, 127045

Detecting a Block ACK DoS
The Block ACK mechanism that was introduced in 802.11e, and enhanced in 802.11nD3.0, has a built-in DoS vulnerability. The Block ACK mechanism allows for a sender to use the ADDBA request frame to specify the sequence number window that the receiver should expect. The receiver will only accept frames in this window.
An attacker can spoof the ADDBA request frame causing the receiver to reset its sequence number window and thereby drop frames that do not fall in that range.
Detecting a ChopChop Attack
ChopChop is a plaintext recovery attack against WEP encrypted networks. It works by forcing the plaintext, one byte at a time, by truncating a captured frame and then trying all 256 possible values for the last byte with a corrected CRC. The correct guess causes the AP to retransmit the frame. When that happens, the frame is truncated again.
Detecting a Disconnect Station Attack
A disconnect attack can be launched in many ways; the end result is that the client is effectively and repeatedly disconnected from the AP.
Detecting an EAP Rate Anomaly
To authenticate wireless clients, WLANs may use 802.1x, which is based on a framework called Extensible Authentication Protocol (EAP). After an EAP packet exchange, and the user is successfully authenticated, the EAP-Success is sent from the AP to the client. If the user fails to authenticate, an EAP-Failure is sent. In this attack, EAP-Failure or EAP-Success frames are spoofed from the access point to the client to disrupting the authentication state on the client. This confuses the client's state, causing it to drop the AP connection. By continuously sending EAP Success or Failure messages, an attacker can effectively prevent the client from authenticating with the APs in the WLAN.
Detecting a FATA-Jack Attack Structure
FATA-Jack is an 802.11 client DoS tool that tries to disconnect targeted stations using spoofed authentication frames that contain an invalid authentication algorithm number.

549 | Wireless Intrusion Prevention

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Detecting a Hotspotter Attack
The Hotspotter attack is an evil-twin attack which attempts to lure a client to a malicious AP. Many enterprise employees use their laptop in Wi-Fi area hotspots at airports, cafes, malls etc. They have SSIDs of their hotspot service providers configured on their laptops. The SSIDs used by different hotspot service providers are well known. This enables the attackers to set up APs with hotspot SSIDs in close proximity of the enterprise premises. When the enterprise laptop Client probes for hotspot SSIDs, these malicious APs respond and invite the client to connect to them. When the client connects to a malicious AP, a number of security attacks can be launched on the client. Airsnarf is a popular hacking tool used to launch these attacks.
Detecting a Meiners Power Save DoS Attack
To save on power, wireless clients will "sleep" periodically, during which they cannot transmit or receive. A client indicates its intention to sleep by sending frames to the AP with the Power Management bit ON. The AP then begins buffering traffic bound for that client until it indicates that it is awake. An intruder could exploit this mechanism by sending (spoofed) frames to the AP on behalf of the client to trick the AP into believing the client is asleep. This will cause the AP to buffer most, if not all, frames destined for the client.
Detecting an Omerta Attack
Omerta is an 802.11 DoS tool that sends disassociation frames to all stations on a channel in response to data frames. The Omerta attack is characterized by disassociation frames with a reason code of 0x01. This reason code is "unspecified" and is not used under normal circumstances.
Detecting Rate Anomalies
Many DoS attacks flood an AP or multiple APs with 802.11 management frames. These can include authenticate/associate frames, which are designed to fill up the association table of an AP. Other management frame floods, such as probe request floods, can consume excess processing power on the AP.
Detecting a TKIP Replay Attack
TKIP is vulnerable to replay (via WMM/QoS) and plaintext discovery (via ChopChop). This affects all WPA-TKIP usage. By replaying a captured TKIP data frame on other QoS queues, an attacker can manipulate the RC4 data and checksum to derive the plaintext at a rate of one byte per minute.
By targeting an ARP frame and guessing the known payload, an attacker can extract the complete plaintext and MIC checksum. With the extracted MIC checksum, an attacker can reverse the MIC AP to Station key and sign future messages as MIC compliant, opening the door for more advanced attacks.
Detecting Unencrypted Valid Clients
An authorized (valid) client that is passing traffic in unencrypted mode is a security risk. An intruder can sniff unencrypted traffic (also known as packet capture) with software tools known as sniffers. These packets are then reassembled to produce the original message.
Detecting a Valid Client Misassociation
This feature does not detect attacks, but rather it monitors authorized (valid) wireless clients and their association within the network. Valid client misassociation is potentially dangerous to network security. The four types of misassociation that we monitor are:
l Authorized Client associated to Rogue: A valid client that is associated to a rogue AP. l Authorized Client associated to External AP: An external AP, in this context, is any AP that is not valid
and not a rogue. l Authorized Client associated to Honeypot AP: A honeypot is an AP that is not valid but is using an SSID
that has been designated as valid/protected. l Authorized Client in ad hoc connection mode: A valid client that has joined an ad hoc network.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Wireless Intrusion Prevention | 550

Detecting an AirJack Attack
AirJack is a suite of device drivers for 802.11(a/b/g) raw frame injection and reception. It was intended to be used as a development tool for all 802.11 applications that need to access the raw protocol. However, one of the tools included allowing users to force all users off an AP.
Detecting ASLEAP
ASLEAP is a tool created for Linux systems used to attack Cisco LEAP authentication protocol.
Detecting a Null Probe Response
A null probe response attack has the potential to crash or lock up the firmware of many 802.11 NICs. In this attack, a client probe-request frame will be answered by a probe response containing a null SSID. A number of popular NIC cards will lock up upon receiving such a probe response.
Configuring Intrusion Protection
Intrusion protection features support containment of an AP or a client. In the case of an AP, we will attempt to disconnect all clients that are connected or attempting to connect to the AP. In the case of a client, the client's association to an AP is targeted. The following containment mechanisms are supported: l Deauthentication containment: An AP or client is contained by disrupting its association on the wireless
interface. l Tarpit containment: An AP is contained by luring clients that are attempting to associate with it to a
tarpit. The tarpit can be on the same channel as the AP being contained, or on a different channel (see Tarpit Shielding Overview on page 564). l Wired containment: An AP or client is contained by disrupting its connection on the wired interface. The WIP feature supports separate enforcement policies that use the underlying containment mechanisms to contain an AP or a client that do not conform to the policy. These policies are discussed in the sections that follow.
Understanding Infrastructure Intrusion Protection
Table 109 presents a summary of the infrastructure intrusion protection features with their related commands, traps, and syslog identifications. Details of each feature follow the table.

551 | Wireless Intrusion Prevention

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 109: Infrastructure Protection Summary

Feature

Command

Protecting 40MHz 802.11 High Throughput Devices on page 553

ids unauthorized-device-profile protect-ht-40mhz

Trap
wlsxAPDeauthContainment wlsxClientDeauthContainment wlsxTarpitContainment

Syslog ID
106005, 106006, 126102, 126103, 126108, 127102, 127103, 127108

Protecting 802.11n High Throughput Devices on page 553

ids unauthorized-device-profile protect-high-throughput

wlsxAPDeauthContainment wlsxClientDeauthContainment wlsxTarpitContainment

106005, 106006, 126102, 126103, 126108, 127102, 127103, 127108

Protecting Against Adhoc Networks on page 553

ids unauthorized-device-profile protect-adhoc-network protect-adhoc-enhanced

wlsxAPDeauthContainment
wlsxClientDeauthContainment
wlsxTarpitContainment wlsxEhancedAdhocContainme nt

106005, 106006, 126012, 126102, 126103, 126108, 127102, 127103, 127108, 126114

Protecting Against AP Impersonation on page 554

ids impersonation-profile protect-ap-impersonation

wlsxAPDeauthContainment wlsxClientDeauthContainment wlsxTarpitContainment

106005, 106006, 126102, 126103, 126108, 127102, 127103, 127108

Protecting Against Misconfigured APs on page 554

ids unauthorized-device-profile protect-misconfigured-ap

wlsxAPDeauthContainment wlsxClientDeauthContainment wlsxTarpitContainment

106005, 106006, 126102, 126103, 126108, 127102, 127103, 127108

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Wireless Intrusion Prevention | 552

Feature
Protecting SSIDs on page 554

Command
ids unauthorized-device-profile protect-ssid

Trap
wlsxAPDeauthContainment wlsxClientDeauthContainment wlsxTarpitContainment

Syslog ID
106005, 106006, 126102, 126103, 126108, 127102, 127103, 127108

Protecting Against Wireless Hosted Networks

ids unauthorized-device-profile detectwireless-hosted-network protect-wireless-hosted-network

wlsxWirelessHostedNetworkDetected
wlsxClientAssociatedToHoste d-NetworkDetected
wlsxWirelessHostedNetworkContainment
wlsxHostOfWirelessNetworkContainment

126110, 126111, 126112, 126113

Protecting Against Rogue Containment on page 554

ids unauthorized-device-profile rogue-containment

wlsxAPDeauthContainment wlsxClientDeauthContainment wlsxTarpitContainment

106005, 106006, 126102, 126103, 126108, 127102, 127103, 127108

Protecting Against Suspected Rogue Containment on page 554

ids unauthorized-device-profile suspect-rogue-containment suspect-rogue-conf-level

wlsxAPDeauthContainment wlsxClientDeauthContainment wlsxTarpitContainment

106005, 106006, 106010, 126102, 126103, 126108, 127102, 127103, 127108

Protection against Wired Rogue APs

ids general-profile wired-containment wired-containment-ap-adj-mac wired-containment-susp-l3-rogue

wlsxAPWiredContainment

126104,126105, 126106, 126107

Protecting 40MHz 802.11 High Throughput Devices
Protection from AP(s) that support 40MHz HT involves containing the AP such that clients can not connect.
Protecting 802.11n High Throughput Devices
Protection from AP(s) that support HT involves containing the AP such that clients can not connect.
Protecting Against Adhoc Networks
Protection from an ad-hoc Network involves containing the ad-hoc network so that clients can not connect to it. The basic ad-hoc protection feature protects against ad-hoc networks using WPA/WPA2 security. The

553 | Wireless Intrusion Prevention

Dell Networking W-Series ArubaOS 6.4.x | User Guide

enhanced ad-hoc network protection feature protects against open/WEP ad-hoc networks. Both features can be used together for maximum protection, or enabled or disabled separately
This feature requires that you enable the wireless-containment setting in the IDS general profile.
Protecting Against AP Impersonation
Protection from AP impersonation involves containing both the legitimate and impersonating AP so that clients can not connect to either AP.
Protecting Against Misconfigured APs
Protect Misconfigured AP enforces that valid APs are configured properly. An offending AP is contained by preventing clients from associating to it.
Protecting Against Wireless Hosted Networks
Clients using the Windows wireless hosted network feature can act as an access point to which other wireless clients can connect, effectively becoming a Wi-Fi HotSpot. This creates a security issue for enterprises, because unauthorized users can use a hosted network to gain access to the corporate network, and valid users that connect to a hosted network are vulnerable to attacks or security breaches. This feature detects a wireless hosted network, and contains the client hosting this network.
Protecting SSIDs
Protect SSID enforces that valid/protected SSIDs are used only by valid APs. An offending AP is contained by preventing clients from associating to it.
Protecting Against Rogue Containment
By default, rogue APs are not automatically disabled. Rogue containment automatically disables a rogue AP by preventing clients from associating to it.
Protecting Against Suspected Rogue Containment
By default, suspected rogue APs are not automatically contained. In combination with the suspected rogue containment confidence level, suspected rogue containment automatically disables a suspect rogue by preventing clients from associating to it.
Protection against Wired Rogue APs
This feature enables containment from the wired side of the network.The basic wired containment feature in the IDS general profile isolates layer-3 APs whose wired interface MAC addresses are the same as (or one character off from) their BSSIDs. The enhanced wired containment feature introduced in ArubaOS 6.3 can also identify and contain an AP with a preset wired MAC address that is completely different from the AP's BSSID. In many non-Dell APs, the MAC address the AP provides to wireless clients as a `gateway MAC' is offset by one character from its wired MAC address.This enhanced feature allows ArubaOS to check to see if a suspected Layer-3 rogue AP's MAC address follows this common pattern.
Understanding Client Intrusion Protection
Table 110 list the client intrusion protection features with their related commands, traps, and syslog identifications. Details of each feature follow the table.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Wireless Intrusion Prevention | 554

Table 110: Client Protection Summary

Feature

Command

Protecting Valid Stations on page 555

ids unauthorized-device-profile protect-valid-sta

Trap
wlsxAPDeauthContainment wlsxClientDeauthContainment wlsxTarpitContainment

Protecting Windows Bridge on page 555

ids unauthorized-device-profile protect-windows-bridge

wlsxAPDeauthContainment wlsxClientDeauthContainment wlsxTarpitContainment

Syslog ID
106005, 106006, 126102, 126103, 126108, 127102, 127103, 127108
106005, 106006, 126102, 126103, 126108, 127102, 127103, 127108

Protecting Valid Stations
Protecting a valid client involves disconnecting that client if it is associated to a non-valid AP.
Protecting Windows Bridge
Protecting from a Windows Bridge involves containing the client that is forming the bridge so that it can not connect to the AP.
Warning Message for Containment Features
The feature for enabling wireless containment under the IDS Unauthorized Device profile and IDS Impersonation profile may be in violation of certain Federal Communications Commission (FCC) regulatory statutes. To address this, a warning message will be issued each time the command is enabled: l If enabled through the WebUI, the warning message will appear before the command is executed. l If enabled through the CLI, the warning message will appear after the command is executed

Configuring the WLAN Management System (WMS)
The WLAN management system (WMS) on the controller monitors wireless traffic to detect any new AP or wireless client station that tries to connect to the network. When an AP or wireless client is detected, it is classified, and its classification is used to determine the security policies that should be enforced on the AP or client.
In the WebUI
1. Navigate to the Configuration > Advanced Services > Wireless page. 2. Configure the parameters, as described in Table 111. Then click Apply.

555 | Wireless Intrusion Prevention

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 111: WMS Configuration Parameters

Parameter

Description

Ad-hoc AP Ageout

The amount of time, in minutes, that an ad-hoc (IBSS) AP unseen by any problems before it is deleted from the database. Enter 0 to disable ageout.
Default: 30 minutes

AP Ageout Interval

The amount of time, in minutes, that an AP is unseen by any probes before it is deleted from the database. Enter 0 to disable ageout.
Default: 30 minutes

AM Poll Interval

Interval, in milliseconds, for communication between the controller and Dell AMs. The controller contacts the AM at this interval to download AP to STA associations, update policy configuration changes, and download AP and STA statistics.
Default: 60000 milliseconds (1 minute)

Number of AM Poll Retries

Maximum number of failed polling attempts before the polled AM is considered to be down.
Default: 3

Station Ageout Interval

The amount of time, in minutes, that a client is unseen by any probes before it is deleted from the database. Enter 0 to disable ageout.
Default: 30 minutes

Enable Statistics Update in DB

Enables or disables statistics update in the database. Default: enabled

Collect Stat

Enables collection of statistics (up to 25,000 entries) on the master controller for monitored APs and clients. This only applies when MMS is not configured.
Default: disabled

Learn System Wired Mac

Enable or disable "learning" of wired MACs at the controller. Default: disabled

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Wireless Intrusion Prevention | 556

Parameter Propagate Wired Mac
Mark Neighbor APs as Persistent Neighbor APs
Learn APs

Description
Enables the propagation of the gateway wired MAC information. Default: enabled
Enables or disables APs that are marked as neighbor from being aged out. Default: enabled
Enables or disables AP learning. Learning affects the way APs are classified. Default: disabled

In the CLI
Use the following commands to configure WMS via the CLI. The parameters in this command are described in detail in Table 111. ids wms-general-profile
adhoc-ap-ageout-interval <adhoc-ap-ageout-interval> | ap-ageout-interval <ap-ageoutinterval> | collect-stats {disable|enable} | learn-ap {enable|disable} | learn-systemwired-macs | persistent-neighbor {enable|disable} | persistent-valid-sta {enable|disable} | pollinterval <milliseconds> | poll-retries <number> | propagate-wired-macs {enable|disable} | sta-ageout-interval <minutes> | stat-update {enable|disable}
Configuring Local WMS Settings
You can also use the CLI to define local WMS system settings for the maximum number of APs and client stations.
Use this command with caution. Increasing the limit will cause an increase in usage in the memory by WMS. In general, each entry will consume about 500 bytes of memory. If the setting is bumped up by 2000, then it will cause an increase in WMS memory usage by 1MB
(host) (config) #ids wms-local-system-profile max-ap-threshold <max-ap-threshold> (host) (config) #ids wms-local-system-profile max-sta-threshold <max-sta-threshold>
Managing the WMS Database
The WMS process interacts with all the air monitor (AM) processes in the network. When WMS receives an event message from an AM, the WMS process will save the event information along with the BSSID of the AP that generated the event in the WMS database. Use the following commands in Enable mode to manage the WMS database.
The wms export-db command exports the specified file as an ASCII text file into the WMS database. (host) #wms export-db <filename>
The wms import-db command imports the specified file into the WMS database: (host) #wms import-db <filename>
The wms reint-db command reinitializes the WMS database. Note that this command does not make an automatic backup of the current database.
(host) #wms reint-db

557 | Wireless Intrusion Prevention

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Understanding Client Blacklisting
When a client is blacklisted in the Dell system, the client is not allowed to associate with any AP in the network for a specified amount of time. If a client is connected to the network when it is blacklisted, a deauthentication message is sent to force the client to disconnect. While blacklisted, the client cannot associate with another SSID in the network.
The controller retains the client blacklist in the user database, so the information is not lost if the controller reboots. When you import or export the controller's user database, the client blacklist will be exported or imported as well.
Methods of Blacklisting
There are several ways in which a client can be blacklisted in the Dell system:
l You can manually blacklist a specific client. See Blacklisting Manually on page 558 for more information. l A client fails to successfully authenticate for a configured number of times for a specified authentication
method. The client is automatically blacklisted. See Blacklisting by Authentication Failure on page 559 for more information. l A DoS or man in the middle (MITM) attack has been launched in the network. Detection of these attacks can cause the immediate blacklisting of a client. See Enabling Attack Blacklisting on page 559 for more information. l An external application or appliance that provides network services, such as virus protection or intrusion detection, can blacklist a client and send the blacklisting information to the controller via an XML API server. When the controller receives the client blacklist request from the server, it blacklists the client, logs an event, and sends an SNMP trap. See External Services Interface on page 1086 for more information.
The External Services Interface feature require the Policy Enforcement Firewall Next Generation (PEFNG) license installed in the controller.
Blacklisting Manually
There are several reasons why you may choose to blacklist a client. For example, you can enable different Dell intrusion detection system (IDS) features that detect suspicious activities, such as MAC address spoofing or DoS attacks. When these activities are detected, an event is logged and an SNMP trap is sent with the client information. To blacklist a client, you need to know its MAC address.
To manually blacklist a client via the WebUI:
1. Navigate to the Monitoring > Controller > Clients page. 2. Select the client to be blacklisted, then click the Blacklist button.
To clear the entire client blacklist using the WebUI:
1. Navigate to the Monitoring > Controller > Clients page. 2. Click Remove All from Blacklist.
To manually blacklist a client via the command-line interface, access the CLI in config mode and issue the following command:
stm add-blacklist-client <macaddr>
To clear the entire client blacklist using the command-line interface, access the CLI in config mode and issue the following command:
stm purge-blacklist-client

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Wireless Intrusion Prevention | 558

Blacklisting by Authentication Failure
You can configure a maximum authentication failure threshold for each of the following authentication methods:
l 802.1x l MAC l Captive portal l VPN
When a client exceeds the configured threshold for one of the above methods, the client is automatically blacklisted by the controller, an event is logged, and an SNMP trap is sent. By default, the maximum authentication failure threshold is set to 0 for the above authentication methods, which means that there is no limit to the number of times a client can attempt to authenticate.
With 802.1x authentication, you can also configure blacklisting of clients who fail machine authentication.
When clients are blacklisted because they exceed the authentication failure threshold, they are blacklisted indefinitely by default. You can configure the duration of the blacklisting; see Setting Blacklist Duration on page 560.
To set the authentication failure threshold via the WebUI:
1. Navigate to the Configuration > Security > Authentication > Profiles page. 2. In the Profiles list, select the appropriate authentication profile, then select the profile instance. 3. Enter a value in the Max Authentication failures field. 4. Click Apply.
To set the authentication failure threshold via the command-line interface, access the CLI in config mode and issue the following commands:
aaa authentication {captive-portal|dot1x|mac|vpn} <profile> max-authentication-failures <number>
Enabling Attack Blacklisting
There are two types of automatic client blacklisting that can be enabled: blacklisting due to spoofed deauthentication, or blacklisting due to other types of DoS attacks.
Automatic blacklisting for DoS attacks other than spoofed deauthentication is enabled by default. You can disable this blacklisting on a per-SSID basis in the virtual AP profile.
Man in the middle (MITM) attacks begin with an intruder impersonating a valid enterprise AP. If an AP needs to reboot, it sends deauthentication packets to connected clients to enable them to disconnect and reassociate with another AP. An intruder or attacker can spoof deauthentication packets, forcing clients to disconnect from the network and reassociate with the attacker's AP. A valid enterprise client associates to the intruder's AP, while the intruder then associates to the enterprise AP. Communication between the network and the client flows through the intruder (the man in the middle), thus allowing the intruder the ability to add, delete, or modify data. When this type of attack is identified by the Dell system, the client can be blacklisted, blocking the MITM attack. You can enable this blacklisting ability in the IDS DoS profile (this is disabled by default).
To enable spoofed deauth detection and blacklisting via the WebUI:
1. Navigate to the Configuration > Wireless > AP Configuration page. 2. Select either AP Group or AP Specific tab. Click Edit for the AP group or AP name. 3. In the Profiles list, expand the IDS menu, then select IDS profile. 4. Select the IDS DOS profile.

559 | Wireless Intrusion Prevention

Dell Networking W-Series ArubaOS 6.4.x | User Guide

5. Select (check) Spoofed Deauth Blacklist. 6. Click Apply. To enabled spoofed deauth detection and blacklisting via the command-line interface, access the CLI in config mode, and issue the following commands:
ids dos-profile <profile> spoofed-deauth-blacklist
Setting Blacklist Duration
You can configure the duration that clients are blacklisted on a per-SSID basis via the virtual AP profile. There are two different blacklist duration settings: l For clients that are blacklisted due to authentication failure. By default, this is set to 0 (the client is
blacklisted indefinitely). l For clients that are blacklisted due to other reasons, including manual blacklisting. By default, this is set to
3600 seconds (one hour). You can set this to 0 to blacklist clients indefinitely. To configure the blacklist duration via the WebUI: 1. Navigate to the Configuration > Wireless > AP Configuration page. 2. Select either AP Group or AP Specific tab. Click Edit for the AP group or AP name. 3. In the Profiles list, select Wireless LAN, then Virtual AP. Select the virtual AP instance.
n To set a blacklist duration for authentication failure, enter a value for Authentication Failure Blacklist Time.
n To set a blacklist duration for other reasons, enter a value for Blacklist Time. 4. Click Apply. To configure the blacklist duration via the command-line interface, access the CLI in config mode and issue the following commands:
wlan virtual-ap <profile> auth-failure-blacklist-time <seconds> blacklist-time <seconds>
Removing a Client from Blacklisting
You can manually remove a client from blacklisting using either the WebUI or CLI: To remove a client from blacklisting via the WebUI: 1. Navigate to the Monitoring > Controller > Blacklist Clients page. 2. Select the client that you want to remove from the blacklist, then click Remove from Blacklist. To remove a client from blacklisting via the command-line interface, access the CLI in enable mode and issue the following command:
stm remove-blacklist-client <macaddr>
Working with WIP Advanced Features
Device Classification is the first step in securing the corporate environment from unauthorized wireless access. Adequate measures that quickly shut down intrusions are critical in protecting sensitive information and network resources. APs and stations must be accurately classified to determine whether they are valid, rogue, or a neighboring AP. Then, an automated response can be implemented to prevent possible intrusion attempts.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Wireless Intrusion Prevention | 560

TotalWatch allows for detecting devices that are running on typical operational channels. Tarpit Shielding provides a better way of containing devices that are deemed unauthorized. Both of these features are discussed in the sections that follow. l Configuring TotalWatch on page 561 l Administering TotalWatch on page 563 l Tarpit Shielding Overview on page 564 l Configuring Tarpit Shielding on page 564
Configuring TotalWatch
Dell 802.11n APs and non-11n APs in AM-mode support for TotalWatch is the ability to scan all channels of the RF spectrum, including 2.4-and 5-GHz bands as well as the 4.9-GHz public safety band. TotalWatch also provides 5-MHz granular channel scanning of bands for rogue devices and dynamic scanning dwell times to focus on those channels with traffic. TotalWatch provides an advanced set of features to detect unauthorized wireless devices and a set of customized rules are used to highlight devices that truly pose a threat to the network.
TotalWatch is supported on APs deployed in the AM-mode only.
TotalWatch provides monitoring support for the entire WLAN spectrum. Dell APs in the AM-mode can monitor the following frequencies: l 2412MHz to 2472MHz in the 2.5GHz band l 5100Mhz to 5895MHz in the 5GHz band. Dell APs in AM-mode can scan the following additional frequencies: l 2484 MHz and 4900Mhz to 5000MHz (J-channels) l 5000 to 5100Mhz If the AP is HT-capable (High Throughput), these frequencies are scanned in the 40MHz mode.
Understanding TotalWatch Channel Types and Qualifiers
Based on the regulatory characteristics, channels are categorized into the following types: l Reg-domain Channels: A channel that belongs to the regulatory domain of the country in which the AP is
deployed. The set of channels that belong to this group is a subset of the channels in the all-reg-domain channel group. l All-reg-domain Channels: A valid non-overlapping channel that is in the regulatory domain of at least one country. The channels in this category belong in the frequency ranges of: n 2412MHz to 2472MHz in the g-band n 5100Mhz to 5895MHz in the a-band. l Rare Channel: Channels that fall into a frequency range outside of the regulatory domain; 2484 MHz and 4900MHz-4995MHz (J-channels), and 5000-5100Mhz. The channels in this group do not belong to any other group. Each of these channel types can have an associated qualifier: l Active Channel: This qualifier indicates that wireless activity is detected on this channel by the presence of an AP or other 802.11 activity such as a probe request.

561 | Wireless Intrusion Prevention

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l DOS Channel: A channel where wireless containment is active. This channel should belong to the countrycode channel (regulatory domain).
Understanding TotalWatch Monitoring Features
TotalWatch enables monitoring of all channels including regulatory domain and rare channels. You can select one of the following scanning modes for each radio AP: l scan only the channels that belong to the AP's regulatory domain l scan channels that belong to all regulatory domains l scan all channels
Understanding TotalWatch Scanning Spectrum Features
TotalWatch scans the following frequencies. l G-band--2412MHz to 2472MHz l J-band--2484 MHz and 4900-4995MHz l A-band--5000-5100Mhz to 5895MHz Table 112 list the frequency-to-channel mapping used by TotalWatch.

Table 112: Frequency to Channel Mapping

Frequency

Channel

2412 ­ 2472MHz (in increments of 5MHz)

1 - 13

2484MHz

14

5100 ­ 5895MHz (in increments of 5MHz)

20 - 179

4900 ­ 4995MHz (in increments of 5MHz)

180 - 199

5000 ­ 5100MHz

200 - 219

Understanding TotalWatch Channel Dwell Time
When an AP (in am-mode) visits a channel, the amount of time the AP stays on that channel is known as the dwell time. The channel dwell time is a variable value based on the following channel types.
l dwell-time-active-channel: For channels where there is wireless activity. Default setting is 500 ms. l dwell-time-reg-domain channel: For channels that belong to the AP's regulatory domain group (reg-
domain) with no wireless activity. The default setting is 250 ms. l dwell-time-other-reg-domain-channel: For channels that belong to the all regulatory domain group (all-
reg-domain) with no wireless activity The default setting is 250 ms. l dwell-time-rare-channel: For channels in the rare group where no wireless activity is detected. The default
value is 100 ms.
Use the rf am-scan-profile command to set the dwell time and scan mode.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Wireless Intrusion Prevention | 562

Understanding TotalWatch Channel Visiting
The Active and DOS channels are visited more frequently than the other channels. The order of preference in selecting the next channel is: 1. DOS 2. Active 3. reg-domain 4. All-reg-domain 5. Rare Once a channel is selected, the dwell time for that channel is determined based on the channel type. At the end of the dwell time, a new channel is picked.
Understanding TotalWatch Age out of Devices
ArubaOS uses a combination of inactivity time and unseen time to age out a device. This ensures that the channel is scanned a sufficient number of times before a device ages out. AM module maintains the following parameters: l Discovered Time: The absolute time, in seconds, since the device was discovered. l Monitored Time: The number of times the channel was scanned since discovery. l Inactivity Time: The number of times the device was not "seen" when the channel is scanned. l Unseen Time: The absolute time, in seconds, since the device was last "seen."
Administering TotalWatch
The AM module will initialize the channel list for each of the AP's radio based on the scan mode setting for the radio. For example, if scan mode is set to rare, then the channel list will contain all possible channels. You can view these channels by using the show ap arm scan-times command.
Configuring Per Radio Settings
For each radio, you can configure the following settings (for detailed information on commands, refer to the Dell Networking W-Series ArubaOS 6.4.x Command Line Reference Guide): l the dwell times for the various channel types l the channel list that should be used for scanning These settings are configured via the command rfam-scan-profile, which can be attached to the two profiles, dot11a-radio-profile and dot11g-radio-profile. The am-scan-profile includes the following parameters that can be configured:
rf am-scan-profile <name> scan-mode [reg-domain | all-reg-domain | rare] The default setting is the all-reg-domain. This is consistent with the default functioning of the AM scanning where the radio scans channels belonging to all regulatory domains.
Configuring Per AP Setting
If the AP is a dual-band single radio AP, an option is available to specify which band should be used for scanning in AM-mode. This setting is available in the ap system-profile, via the am-scan-rf-band command.
ap system-profile <name> am-scan-rf-band [a | g | all]

563 | Wireless Intrusion Prevention

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The default value is "all", which is consistent with the prior behavior. This setting is ignored in the case of a dual radio AP.
There are four parameters that will control the age out of devices in the AM module. ids general-profile <name> ap-inactivity-timeout sta-inactivity-timeout ap-max-unseen-timeout sta-max-unseen-timeout
The inactivity timeout is the number of times the device was not "seen" when the channel was scanned. The unseen timeout is the time, in seconds, since the device was last "seen."
The show ap monitor scan-info/channel commands provide details of the channel types, dwell times, and the channel visit sequence.
(host) # show ap monitor scan-info ap-name rb-121
Licensing
The ability to perform rare scanning is available only with the RFprotect license. However, the AP can scan `regdomain' or `all-reg-domain' channels without the RFprotect license.
Tarpit Shielding Overview
The Tarpit Shielding feature is a type of wireless containment. Detected devices that are classified as rogues are contained by forcing client association to a fake channel or BSSID. This method of tarpitting is more efficient than rogue containment via repeated de-authorization requests. Tarpit Sheilding works by spoofing frames from an AP to confuse a client about its association. The confused client assumes it is associated to the AP on a different (fake) channel than the channel that the AP is actually operating on, and will attempt to communicate with the AP in the fake channel.
Tarpit Shielding works in conjunction with the deauth wireless containment mechanism. The deauth mechanism triggers the client to generate probe request and subsequent association request frames. The AP then responds with probe response and association response frames. Once the monitoring AP sees these frames, it will spoof the probe-response and association response frames, and manipulates the content of the frames to confuse the client.
A station is determined to be in the Tarpit when we see it sending data frames in the fake channel. With some clients, the station remains in tarpit state until the user manually disables and re-enables the wireless interface.
Configuring Tarpit Shielding
Tarpit shielding is configured on an AP using one of two methods:
l Disable all clients: In this method, any client that attempts to associate with an AP marked for containment is sent spoofed frames.
l Disable non-valid clients: In this method, only non-authorized clients that attempt to associate with an AP are sent to the tarpit.
The choices for disabling Tarpit Shielding on an AP are:
l Deauth-wireless-containment l Deauth-wireless-containment with tarpit-shielding (excluding-valid-clients) l Deauth-wireless-containment with tarpit-shielding

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Wireless Intrusion Prevention | 564

Enabling Tarpit Shielding
Use the ids-general-profile command to configure Tarpit Shielding (for detailed information on commands refer to the Dell Networking W-Series ArubaOS Command Line Reference Guide). ids general-profile default
wireless-containment [deauth-only | none | tarpit-all-sta | tarpit-non-valid-sta]
Use the following show commands to view updated Tarpit Shielding status and the spoofed frames generated for an AP: show ap monitor stats ... show ap monitor containment-info
Understanding Tarpit Shielding Licensing CLI Commands
Under the ids general-profile default wireless-containment command, the `tarpit-non-valid-sta' and `tarpit-all-sta' options are available only with a RFprotect license. The `deauth-only' and `none' options are available with the Base OS license.

565 | Wireless Intrusion Prevention

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Chapter 22 Access Points
In ArubaOS, related configuration parameters are grouped into profiles that you can apply as needed to an AP group or to individual APs. When an AP is first installed on the network and powered on, the AP locates its host controller and the AP's designated configuration is "pushed" from the controller to the AP. This chapter gives an overview of the basic function of each AP profile, and describes the process to install and configure the APs on your network. The following topics are included in this chapter: l Basic Functions and Features on page 566 l Naming and Grouping APs l Understanding AP Configuration Profiles on page 569 l Before you Deploy an AP on page 576 l Enable Controller Discovery on page 577 l Enable DHCP to Provide APs with IP Addresses l Enable Controller Discovery on page 577 l Configuring Installed APs on page 581 l Optional AP Configuration Settings on page 584 l Configuring AP Image Preload on page 873 l RF Management on page 593 l Optimizing APs Over Low-Speed Links on page 606 l AP Scanning Optimization on page 611 l Configuring AP Channel Assignments on page 613 l Managing AP Console Settings on page 616 l Link Aggregation Support on W-AP220 Series and W-AP270 Series on page 618 l Service Tag on page 620
Basic Functions and Features
You configure APs using the WebUI and the CLI on the controller. Table 113 list the basic configuration functions and features.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Access Points | 566

Table 113: AP Configuration Function Overview

Features and Function

Description

Wireless LANs

A wireless LAN (WLAN) permits wireless clients to connect to the network. An AP broadcasts the SSID (which corresponds to a WLAN configured on the controller) to wireless clients. APs support multiple SSIDs. WLAN configuration includes the authentication method and the authentication servers by which wireless users are validated for access.
The WebUI includes a WLAN Wizard that provides easy-to-follow steps to configure a new WLAN.
NOTE: All new WLANs are associated with the ap-group named "default".

AP operation

An AP can function as an AP that serves clients, as an air monitor (AM) performing network and radio frequency (RF) monitoring, or as a hybrid AP that serves both clients and performs spectrum analysis a single radio channel. You can also specify the regulatory domain (the country) which determines the 802.11 transmission spectrum in which the AP will operate. Within the regulated transmission spectrum, you can configure 802.11a, 802.11b/g, or 802.11n (high-throughput) radio settings.
NOTE: The 802.11n features, such as high-throughput and 40 MHz configuration settings, are supported on APs that are 802.11n standard compliant.

Quality of Service (QoS)

Configure Voice over IP call admission control options and bandwidth allocation for 5 GHz (802.11a) or 2.4 GHz (802.11b/g) frequency bands of traffic.

RF Management

Configure settings for balancing wireless traffic across APs, detect holes in radio coverage, or other metrics that can indicate interference and potential problems on the wireless network.
Adaptive Radio Management (ARM) is an RF spectrum management technology that allows each AP to determine the best 802.11 channel and transmit power settings. ARM provides several configurable settings.

Intrusion Detection System

Configure settings to detect and disable rogue APs, ad-hoc networks, and unauthorized devices, and prevent attacks on the network. You can also configure signatures to detect and prevent intrusions and attacks.

Mesh

Configure Dell APs as mesh nodes to bridge multiple Ethernet LANs or extend wireless coverage. A mesh node is either
l a mesh portal: an AP that uses its wired interface to reach the controller
l a mesh point:an AP that establishes a path to the controller via the mesh portal
Mesh environments use a wireless backhaul to carry traffic between mesh nodes. This allows one 802.11 radio to carry traditional WLAN services to clients and one 802.11 radio to carry mesh traffic and WLAN services. Secure Enterprise Mesh on page 622 contains more specific information on the Mesh feature.

Naming and Grouping APs
In the Dell user-centric network, each AP has a unique name and belongs to an AP group.
Each AP is identified with an automatically-derived name. The default name depends on if the AP has been previously configured.

567 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l The AP has not been configured--the name is the AP's Ethernet MAC address in colon-separated hexadecimal digits.
l Configured with a previous ArubaOS release--the name is in the format building.floor.location
You can assign a new name (up to 63 characters) to an AP; the new name must be unique within your network. For example, you can rename an AP to reflect its physical location within your network, such as "building3lobby".
Renaming an AP requires a reboot of the AP before the new name takes effect. Therefore, wait until there is little or no client traffic passing through the AP before renaming it.
An AP group is a set of APs to which the same configuration is applied. There is an AP group called "default" to which all APs discovered by the controller are assigned. By using the "default" AP group, you can configure features that are applied globally to all APs.
You can create additional AP groups and assign APs to that new group. However, an AP can belong to only one AP group at a time. For example, you can create an AP group "Victoria" that consists of the APs that are installed in a company's location in British Columbia. You can create another AP group "Toronto" that consists of the APs in Ontario. You can configure the "Toronto" AP group with different information from the APs in the "Victoria" AP group (see Figure 71).
Figure 71 AP Groups

While you can use an AP group to apply a feature to a set of APs, you can also configure a feature or option for a specific AP by referencing the AP's name. Any options or values that you configure for a specific AP will override the same options or values configured for the AP group to which the AP belongs. The following procedures describes how to create an AP group.
Reassigning an AP from an AP group requires a reboot of the AP for the new group assignment to take effect. Therefore,wait until there is little or no client traffic passing through the AP before reassigning it.
Creating an AP group
You can use the WebUI or the CLI to create a new AP group.
In the WebUI
1. Navigate to the Configuration > Wireless> AP Configuration > AP Group page. 2. Click New. Enter the new AP group name and click Add. The new AP group appears in the Profile list.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 568

In the CLI
Use the following command to create an AP group: ap-group <group>
When you create an AP group with the CLI, you can specify the virtual AP definitions and configuration profiles you want applied to the APs in the group.
Assigning APs to an AP Group
Although you will assign an AP to an AP group when you first deploy the device, you can assign an AP to a different AP group at any time.
Once the ap-regroup command is executed, the AP automatically reboots. If the AP is powered off or otherwise not connected to the network or controller, the executed command is queued until the AP is powered on or reconnected. Again, the AP will automatically reboot as soon as the command is executed.
In the WebUI
1. Navigate to the Configuration > Wireless> AP Installation page. The list of discovered APs appears in this page (all discovered APs initially belong to the AP group named "default").
2. Select the AP you want to reassign, and click Provision. From the Provisioning page, select the AP group from the drop-down menu.
3. Click Apply and Reboot.
In the CLI
Use the following command to assign a single AP to an existing AP group. Use the WebUI to assign multiple APs to an AP group at the same time.
ap-regroup {ap-name <name>|serial-num <number>|wired-mac <macaddr>} <group>

Understanding AP Configuration Profiles
An AP configuration profile is a general name to describe any of the different groups of settings that can defined, saved, and applied to an Access Point. ArubaOS has many different types of profiles that each allow you to configure a different aspect of an AP's overall configuration. ArubaOS also contains a predefined "default" profile for each profile type. You can use the predefined settings in these default profiles, or create entirely new profiles that you can edit as required.
Each different AP configuration profile type can be managed using the CLI or the WebUI. To see a full list of available configuration profiles using the command-line interface, access the CLI and issue the command show profile-hierarchy. To view available configuration profiles using the WebUI, select the Configuration tab in the and navigate to Advanced Services > All Profiles.
The All Profiles tab arranges the different AP configuration profile types into the following categories:
l AP Profiles l RF Management Profiles l Wireless LAN Profiles l Mesh Profiles l QoS Profiles l IDS Profiles l HA Group profiles l Other Profiles

569 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The profile types that appear in the All Profiles tab may vary, depending upon the controller configuration and available licenses.
AP Profiles
The AP profiles configure AP operation parameters, radio settings, port operations, regulatory domain, and SNMP information.
l AP system profile: defines administrative options for the controller, including the IP addresses of the local, backup, and master controllers, Real-time Locating Systems (RTLS) server values and the number of consecutive missed heartbeats on a GRE tunnel before an AP reboots. For details on configuring this profile, see Optional AP Configuration Settings.
l Regulatory domain: defines the AP's country code and valid channels for both legacy and highthroughput 802.11a and 802.11b/g radios. For examples on figuring a regulatory domain profile, see Configuring AP Channel Assignments on page 613.
l Wired AP profile: determines if 802.11 frames are tunneled to the controller using Generic Routing Encapsulation (GRE) tunnels, bridged into the local Ethernet LAN, or configured for a combination of the two (split-mode). In tunnel forwarding mode, the AP handles all 802.11 association requests and responses, but sends all 802.11 data packets, action frames and EAPOL frames over a GRE tunnel to the controller for processing. When a remote AP or campus AP is in bridge mode, the AP handles all 802.11 association requests and responses, encryption/decryption processes, and firewall enforcement. In split-tunnel mode, 802.11 frames are either tunneled or bridged, depending on the destination (corporate traffic goes to the controller, and Internet access remains local). For details, see Configuring Ethernet Ports for Mesh on page 652
l AP LLDP-MED Network Policy and AP LLDP profiles:link Layer Discovery Protocol (LLDP), is a Layer-2 protocol that allows network devices to advertise their identity and capabilities on a LAN. The LLDP-MED Network Policy profile defines the VLAN, priority levels, and DSCP values used by a voice or video application. Wired interfaces on Dell APs support LLDP by periodically transmitting LLDP Protocol Data Units (PDUs) comprised of selected type-length-value (TLV) elements. The AP LLDP profile identifies which TLVs will be sent by the AP. For details, see Understanding Extended Voice and Video Features on page 1001.
l Ethernet interface profile:sets the duplex mode and speed of the AP's Ethernet link. The configurable speed is dependent on the port type, and you can define a separate Ethernet Interface profile for each Ethernet link. For details on configuring this profile, see Table 117.
l Ethernet Interface Port/Wired Port Profile: specifies a AAA profile for users connected to the wired port on an AP. For details on configuring this profile, see Securing Clients on an AP Wired Port on page 955
l AP Provisioning profile: defines a group of provisioning parameters for an AP or AP group. For details on configuring this profile, see .
l AP Authorization Profile--Allows you to assign an to a provisioned but unauthorized AP to a AP group with a restricted configuration profile. For details see Configuring Remote AP Authorization Profiles on page 748.
l EDCA parameters profile (Station):client to AP traffic prioritization parameters, including Enhanced Distributed Channel Access (EDCA) parameters for background, best-effort, voice and video queues. For additional information on configuring this profile, see Using the WebUI to configure EDCA parameters on page 981.
l EDCA parameters profile (AP): AP to client traffic prioritization, including EDCA parameters for background, best-effort, voice and video queues. For additional information on configuring this profile, see Using the WebUI to configure EDCA parameters on page 981.
l Spectrum Local Override Profile:configure an individual AP radio as a spectrum monitor, For details, see Converting an Individual AP to a Spectrum Monitor on page 778.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 570

RF Management Profiles
The profiles configure radio tuning and calibration, AP load balancing, and RSSI metrics.
l 802.11a radio profile: defines AP radio settings for the 5 GHz frequency band, including the Adaptive Radio Management (ARM) profile and the high-throughput (802.11n) radio profile. For additional information on configuring this profile, see 802.11a and 802.11g RF Management Profiles on page 593.
l 802.11g radio profile: defines AP radio settings for the 2.4 GHz frequency band, including the Adaptive Radio Management (ARM) profile and the high-throughput (802.11n) radio profile. Each 802.11a and 802.11b radio profile includes a reference to an Adaptive Radio Management (ARM) profile.
If you want the ARM feature to dynamically select the best channel and transmission power for the radio, verify that the 802.11a/802.11g radio profile references an active and enabled ARM profile. If you want to manually select a channel for each AP group, create separate 802.11a and 802.11g profiles for each AP group and assign a different transmission channel for each profile. For additional information on configuring this profile, see 802.11a and 802.11g RF Management Profiles on page 593.
l ARM profile: defines the Adaptive Radio Management (ARM) settings for scanning, acceptable coverage levels, transmission power and noise thresholds. In most network environments, ARM does not need any adjustments from its factory-configured settings. However, if you are using VoIP or have unusually high security requirements you may want to manually adjust the ARM thresholds. For complete details on Adaptive Radio Management, refer to Adaptive Radio Management on page 510.
l High-throughput radio profile: manages high-throughput (802.11n) radio settings for 802.11n-capable APs. A high-throughput profile determines 40 Mhz tolerance settings, and controls whether or not the APs using this profile will advertise intolerance of 40 MHz operation. (This option is disabled by default, allowing 40 MHz operation.) For additional information on configuring this profile, see High-Throughput Virtual APs on page 502.
l RF Optimization profile: enables or disables load balancing based on a user-defined number of clients or degree of AP utilization on an AP. Use this profile to detect coverage holes, radio interference and STA association failures and configure Received signal strength indication (RSSI) metrics.
l RF Event Thresholds profile: defines error event conditions, based on a customizable percentage of lowspeed frames, non-unicast frames, or fragmented, retry or error frames. For additional information on configuring this profile, see RF Event Configuration on page 604.
l AM Scanning: Dell 802.11n APs and non-11n APs in AM-mode support the TotalWatch scanning feature giving them the ability to scan all channels of the RF spectrum, including 2.4-and 5-GHz bands as well as the 4.9-GHz public safety band. The AM Scanning profile enables this feature, and defines the dwell types for different channel types.
Wireless LAN Profiles
The Wireless LAN collection of profiles configure WLANs in the form of virtual AP profiles. A virtual AP profile contains an SSID profile which defines the WLAN, the high-throughput SSID profile, and an AAA profile that defines the authentication for the WLAN.
Unlike other profile types, you can configure and apply multiple instances of virtual AP profiles to an AP group or to an individual AP.
l 802.11k profile: manages settings for the 802.11k protocol. The 802.11k protocol allows APs and clients to dynamically query their radio environment and take appropriate connection actions. For example: In a 802.11k network if the AP with the strongest signal reaches its CAC (Call Admission Control) limits for voice calls, then on-hook voice clients may connect to an under utilized AP with a weaker signal. You can configure the following options in 802.11k profile:
l Enable or disable 802.11K support on the AP
l Forceful disassociation of on-hook voice clients

571 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l Measurement mode for beacon reports.
For more details, see Radio Resource Management (802.11k) on page 482.
l Handover Trigger profile: configure a handover trigger profile to ensure QoS for voice calls for APs with the 802.11k feature enabled. For more details, see Enabling Wi-Fi Edge Detection and Handover for Voice Clients on page 1010
l RRM IE profile:configure a Radio Resource Management Information Element (RRM IE) profile to define the information elements advertised by an AP with 802.11k support enabled. For more details, see Configuring Radio Resource Management Information Elements on page 484
l Beacon Report Request profile: APs with the 802.11k feature enabled use request messages to solicit measurements. This profile defines the information an AP can send in beacon report requests. For details, see Understanding AP Configuration Profiles on page 569
l 802.11r profile: APs with the 802.11r (Fast BSS Transition) feature enabled minimize the delay when a client transitions from one BSS to another within the same ESS. For more details, see Fast BSS Transition ( 802.11r) on page 490
l TSM Report Request profile: APs with the 802.11k feature enabled use request messages to solicit measurements. This profile defines the information an AP can send in traffic stream measurement reports. For more details, see Understanding AP Configuration Profiles on page 569
l SSID profile: Configures network authentication and encryption types. This profile also includes references to the EDCA (enhanced distributed channel access) Parameters Station Profile, the EDCA Parameters AP Profile and a High-throughput SSID profile.
Use this profile to configure basic settings such as 802.11 authentication and encryption settings, or advanced settings such as DTIM (delivery traffic indication message) intervals, 802.11a/802.11g basic and transmit rates, DHCP settings and WEP keys. The advanced SSID profile settings allows you to deny broadcast probes and hide the SSID. For details on configuring an SSID profile, see SSID Profiles on page 492.
Beacon rates for 802.11a and 802.11g beacons should only be configured on APs with Distributed Antenna Systems (DAS). Configuring beacon rates during normal operation may cause connectivity problems.
l High-throughput SSID profile: high-throughput APs support additional settings not available in legacy APs. A High-throughput SSID profile enables/disables high-throughput (802.11n) features with 40 MHz channel usage, and define values for aggregated MAC protocol data units (MDPUs) and Modulation and Coding Scheme (MCS) ranges. If you modify a currently provisioned and running high-throughput SSID profile, your changes take effect immediately; rebooting is not required. For details on configuring a highthroughput SSID profile, see High-Throughput Virtual APs on page 502.
l Advertisement, ANQP, H2QP and Hotspot profiles:The settings configured in these four profile types help mobile devices identify which access points in your 802.11u hotspot network are suitable for their needs, and authenticate to a remote service provider using suitable credentials. For details on configuring Advertisement, ANQP, H2QP or Hotspot profiles, see 802.11u Hotspots on page 916.
l Virtual AP profile: this profile defines your WLAN by enabling or disabling the band steering, fast roaming and DoS prevention features. It defines radio band, forwarding mode and blacklisting parameters, and includes references to an AAA Profile, 802.11K Profile, and a High-throughput SSID profile. You can apply multiple virtual AP profiles to an AP group or to an individual AP; for most other profiles, you can apply only one instance of the profile to an AP group or AP at a time. For details on configuring a Virtual AP profile, see Virtual AP Profiles on page 473.
l Anyspot profile: Configure this profile to suppress probe requests from clients attempting to locate and connect to other known networks. By reducing the frequency at which these messages are sent, this feature frees up network resources and improves network performance. For details on configuring an anyspot profile, see Suppressing Client Probe Requests on page 592.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 572

l VIA Client WLAN profile:the VIA client WLAN profile settings are similar to the authentication settings used to set up a wireless network. For details and examples, see Virtual Intranet Access on page 771.
l AAA profile: This defines authentication settings for the WLAN users, including the role for unauthenticated users, and the different roles that should be assigned to users authenticated via 802.1x, MAC or SIP authentication. This profile includes references to:
l MAC Authentication Profile
l MAC Authentication Server Group
l 802.1X Authentication Profile
l 802.1X Authentication Server Group
l RADIUS Accounting Server Group
For details on configuring an AAA profile, see WLAN Authentication on page 499.
l XML API server profile: specifies the IP address of an external XML API server. For additional information, see Configuring the XML API Server on page 1115.
l RFC 3576 server: Specifies the IP address of a RFC 3576 RADIUS server. For additional information, see Configuring an RFC-3576 RADIUS Server on page 259.
l MAC Authentication profile: defines parameters for MAC address authentication, including upper- or lower-case MAC string, the diameter format in the string, and the maximum number of authentication failures before a user is blacklisted. For additional information, see Configuring the MAC Authentication Profile on page 279.
l Captive Portal Authentication profile: this profile directs clients to a web page that requires them to enter a username and password before being granted access to the network. This profile defines login wait times, the URLs for login and welcome pages, and manages the default user role for authenticated captive portal clients.
You can also set the maximum number of authentication failures allowed per user before that user is blacklisted. This profile includes a reference to a Server group profile. For complete information on configuring a Captive portal authentication profile, refer to Captive Portal Authentication on page 372.
l WISPr authentication profile: WISPr authentication allows a "smart client" to authenticate on the network when they roam between Wireless Internet Service Providers, even if the wireless hotspot uses an ISP for which the client may not have an account. For more information on configuring WISPr authentication, see Configuring WISPr Authentication on page 362.
l 802.1X authentication profile: defines default user roles for machine or 802.1X authentication, and parameters for 8021.X termination and failed authentication attempts. For a list of the basic parameters in the 802.1X authentication profile, refer to 802.1X Authentication on page 326
l SSO: This feature allows single sign-on (SSO) for different web-based applications using Layer 2 authentication information. For more information, see Application Single Sign-On Using L2 Authentication.
l RADIUS server profile: identifies the IP address of a RADIUS server and sets RADIUS server parameters such as authentication and accounting ports and the maximum allowed number of authentication retries. For a list of the parameters in the RADIUS profile, refer to Configuring a RADIUS Server on page 250
l LDAP server profile: defines an external LDAP authentication server that processes requests from the controller. This profile specifies the authentication and accounting ports used by the server, as well as administrator passwords, filters and keys for server access. For a list of the parameters in the LDAP profile, refer to Configuring an LDAP Server on page 260
l TACACS server profile: specifies the TCP port used by the server, the timeout period for a TACACS+ request, and the maximum number of allowed retries per user. For a list of the parameters in the TACACS profile, refer to Configuring a TACACS+ Server on page 261
l Server group: Tthis profile manages groups of servers for specific types of authentication. Server Groups identify individual authentication servers and let you create rules for clients based on attributes returned

573 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

for the client by the server during authentication. For additional information on configuring server rules, see Configuring Server-Derivation Rules on page 270
l VPN Authentication profile: this profile identifies the default role for authenticated VPN clients and also references a server group. It also provides a separate VPN AAA authentication for a terminating remote AP (default-rap) and a campus AP (default-CAP). If you want to simultaneously deploy various combinations of a VPN client, RAP-psk, RAP-certs and CAP on the same controller, see Table 79.
l Management Authentication profile: enables or disables management authentication, and identifies the default role for authenticated management clients. This profile also references a server group. For more information on configuring a management authentication profile, see Management Authentication Profile Parameters on page 872.
l Wired Authentication profile: This profile merely references an AAA profile to be used for wired authentication. See Securing Wired Clients on page 952.
l Stateful NTLM authentication Profile: monitor the NTLM (NT LAN Manager) authentication messages between clients and an authentication server. If the client authenticates via an NTLM authentication server, the controller can recognize that the client has been authenticated and assign that client a specified user role. or details on configuring stateful authentication, see Stateful and WISPr Authentication on page 358.
l Stateful Kerberos Authentication: use stateful Kerberos authentication to configure a controller to monitor the Kerberos authentication messages between a client and a Windows authentication server. If the client successfully authenticates via an Kerberos authentication server, the controller can recognize that the client has been authenticated and assign that client a specified user role. For more information on stateful Kerberos authentication, see Configuring Stateful Kerberos Authentication on page 361.
l Stateful 802.1X Authentication Profile: enables or disables 802.1X authentication for clients on nonDell APs, and defines the default role for those users once they are authenticated. This profile also references a server group to be used for authentication. For details on configuring stateful authentication, see Stateful and WISPr Authentication on page 358.
Mesh Profiles
You can provision Dell APs to operate as mesh points, mesh portals or remote mesh portals. The secure enterprise mesh environment routes network traffic between APs over wireless hops to join multiple Ethernet LANs or to extend wireless coverage. The Mesh profiles are:
l Mesh high-throughput SSID profile: enables or disables high-throughput (802.11n) features and 40 Mhz channel usage, and define values for aggregated MAC protocol data units (MDPUs) and Modulation and Coding Scheme (MCS) ranges. If none of the APs in your Mesh deployment are 802.11n-capable, you do not need to configure a mesh high-throughput SSID profile. For additional information on configuring this profile, see Creating and Editing Mesh High-Throughput SSID Profiles on page 646.
l Mesh radio profile: determines many of the settings used by mesh nodes to establish mesh links and the path to the mesh portal, including the maximum number of children a mesh node can accept, and transmit rates for the 802.11a and 802.11g radios. For additional information on configuring this profile, see Creating and Editing Mesh Radio Profiles on page 641.
l Mesh cluster profile: contains the mesh cluster name (MSSID), authentication methods, security credentials, and cluster priority. For additional information on configuring this profile, see Configuring Mesh Cluster Profiles on page 636.
QoS Profiles
The QoS profiles configure traffic management and VoIP functions.
l WMM Traffic management profile:the profile for Wi-Fi Multi-Media (WMM) traffic management prioritizes voice and video traffic above other data traffic . For additional information on configuring this profile, see Voice and Video on page 965.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 574

l Traffic management profile: specifies the minimum percentage of available bandwidth to be allocated to a specific Virtual AP when there is congestion on the wireless network, and sets the interval between bandwidth usage reports. For additional information on configuring this profile, see Table 104.
l VoIP call admission control profile: Dell's Voice Call Admission Control limits the number of active voice calls per AP by load-balancing or ignoring excess call requests. This profile enables active load balancing and call admission controls, and sets limits for the numbers of simultaneous Session Initiated Protocol (SIP), SpectraLink Voice Priority (SVP), Cisco Skinny Client Control Protocol (SCCP), Vocera or New Office Environment (NOE) calls that can be handled by a single radio. For additional information on configuring this profile, see Scanning for VoIP-Aware ARM on page 1006.
IDS Profiles
The IDS profiles manage settings for wireless intrusion protection (WIP) and The WLAN management system (WMS) on the controller that monitors wireless traffic to detect any new AP or wireless client station that tries to connect to the network. For details on IDS profile configuration settings, see Wireless Intrusion Prevention on page 532
HA Group profiles
This profile defines settings used by the high-availability:fast failover feature. For details, see Configuring High Availability on page 667
Other Profiles
The Controller profile and other profiles set the management password policy, define equipment OUIs and configure voice, video or VIA authentication settings.
l VIA Authentication Profile: define an authentication profile for the VIA feature. l VIA Connection Profile: define authentication and connection settings profile for the VIA feature. l VIA Web Authentication: define a VIA authentication profile to be used for Web authentication. l VIA Global Configuration: select whether or not the controller should allow VIA SSL fallback. l Management Password Policy: define a policy for creating management passwords. l Voip Logging:enable voice logs by for a specific voice client based upon the client's MAC address. For
details, see Advanced Voice Troubleshooting on page 1022 l SIP settings:define a keep alive mechanism for the SIP sessions using the periodic session refresh request
from the user agents. For details, see Understanding Extended Voice and Video Features on page 1001 l Dialplan Profile: define SIP dial plans on the controller to provide outgoing PSTN calls. l Configure Real-Time Analysis: enable real -time call quality analysis for voice calls. For details, see
Understanding Extended Voice and Video Features on page 1001 l License Provisioning: enable the centralized licensing feature. For details, see Centralized Licensing in a
Multi-Controller Network on page 148 l AirGroup AAA: configure the AirGroup and ClearPass Policy Manager (CPPM) interface to allow an
AirGroup controller and CPPM to exchange information about the owner, visibility, and status for each mobile device on the network. For details, see Configuring the AirGroup-CPPM Interface on page 1057 l CPPM IF-MAP: use this feature in conjunction with ClearPass Policy Manager to send HTTP User Agent Strings and mDNS broadcast information to ClearPass so that it can make more accurate decisions about what types of devices are connecting to the network. For details, see ClearPass Profiling with IF-MAP on page 911. l Valid Equipment OUI Profile: Set one or more Dell OUIs for the controller.

575 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l Upgrade:configure the software upgrade feature that allows the master controller to automatically upgrade its associated local controllers by sending an image from a image server to one or more local controllers. For details, see Configuring Centralized Image Upgrades on page 876.
Profile Hierarchy
The ArubaOS WebUI includes several wizards that allow you to configure an AP, controller, WLAN, or License installation. You can also configure profiles using the WebUI Profile list or via the command line interface. Best practices is to configure the lowest-level settings first. For example, if you are defining a virtual AP profile, you should first define a session policy, then define your server group, then create an AAA profile that references the session policy and your server group.
The output of the show profile-hierarchy CLI command shows how profiles relate to each other, and how some higher-level profiles reference other lower-level profiles. The output of this command will vary, depending upon controller configuration and licenses.
Viewing Profile Errors
To view the list of profile errors using the CLI, use the show profile-errors command. The WebUI displays them with a flag icon next to the main horizontal menu (Figure 72). Click the flag to view the list of errors.
Figure 72 Profile Errors

Before you Deploy an AP
Before you install APs in a network environment, you must ensure that the APs are able to locate and connect to the controller. Specifically, you must configure firewall settings to allow APs to obtain software images and configuration settings from the controller, verify APs are able to locate the controller, and verify each AP is assigned a valid IP address when connected to the network. If you want to provision APs with more than one interface, you can also configure the USB settings and interface priority levels using an AP provisioning profile. The following steps describe the basic pre-deployment tasks. Click any of the links for more information on these procedures. 1. Configure Firewall Settings 2. Enable Controller Discovery 3. Enable DHCP 4. (Optional) Define the AP Provisioning Profile 5. Define a virtual AP profile, and assign that profile to an AP group
Mesh AP Preconfiguration
Mesh APs require the following additional steps to define the mesh networking environment. l Define and configure the mesh cluster profile. l Define and configure the mesh radio profile
Remote AP Preconfiguration
Remote APs require the following additional step to identify valid APs in the remote AP whitelist.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 576

l Create a Remote AP whitelist
Enable Controller Discovery
An AP can discover the IP address of the controller from a DNS server, from a DHCP server, or using the Aruba Discovery Protocol (ADP).
At boot time, the AP builds a list of controller IP addresses and then tries these addresses in order until it successfully reaches a controller . This list of IP addresses provides an enhanced redundancy scheme for controllers that are located in multiple data centers separated across Layer-3 networks. The AP constructs its list of controller addresses as follows:
l If the master provisioning parameter is set to a DNS name, that name is resolved and all resulting addresses are put on the list. If master is set to an IP address, that address is put on the list.
l If the master provisioning parameter is not set and a controller address was received in DHCP Option 43, that address is put on the list.
l If the master provisioning parameter is not set and no address was received via DHCP option 43, ADP is used to discover a controller address and that address is put on the list.
l Controller addresses derived from the server-name and server-ip provisioning parameters and the default controller name aruba-master are added to the list. Note that if a DNS name resolves to multiple addresses, all addresses are added to the list.
Controller Discovery using DNS
When using DNS, AP learns multiple IP addresses to associate with a controller. If the primary controller is unavailable or does not respond, the AP continues through the list of learned IP addresses until it establishes a connection with an available controller. This takes approximately 3.5 minutes per controller.
It is recommended you use a DNS server to provide APs with the IP address of the master controller because it involves minimal changes to the network and provides the greatest flexibility in the placement of APs.
APs are factory-configured to use the host name aruba-master for the master controller. For the DNS server to resolve this host name to the IP address of the master controller, you must configure an entry on the DNS server for the name aruba-master.
Controller Discovery using ADP
ADP is enabled by default on all Dell APs and controllers. With ADP, APs send out periodic multicast and broadcast queries to locate the master controller. ADP requires that all APs and controllers are connected to the same Layer-2 network. If the devices are on different networks, you must use a Layer-3 compatible discovery mechanism, such as DNS, DHCP, or IGMP forwarding.
To use ADP discovery:
1. Issue the command show adp config to verify that ADP and IGMP join options are enabled on the controller, If ADP is not enabled, you can reenable ADP using the command adp discovery enable and adp igmp-join enable.
2. If the APs are not in the same broadcast domain as the master controller, you enable multicast on the network (ADP multicast queries are sent to the IP multicast group address 239.0.82.11) for the controller to respond to the APs' queries. You also must make sure that all routers are configured to listen for Internet Group Management Protocol (IGMP) join requests from the controller and can route these multicast packets. C

577 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Controller discovery using a DHCP Server
You can configure a DHCP server to provide the master controller's IP address. You must configure the DHCP server to send the controller's IP address using the DHCP vendor-specific attribute option 43. The APs identify themselves with a vendor class identifier set to DellAP in their DHCP requests. When the DHCP server responds to a request, it will send the controller's IP address as the value of option 43.
When using DHCP option 43, the AP accepts only one IP address. If the IP address of the controller provided by DHCP is not available, the AP can use the other IP addresses provisioned or learned by DNS to establish a connection. For more information on how to configure vendor-specific information on a DHCP server, see DHCP with Vendor-Specific Options on page 1148 or refer to the documentation included with your server.
Enable DHCP to Provide APs with IP Addresses
Each AP requires a unique IP address on a subnetwork that has connectivity to a controller. It is recommended you use the Dynamic Host Configuration Protocol (DHCP) to provide IP addresses for APs; the DHCP server can be an existing network server or an controller configured as a DHCP server.
If you do not enable DHCP, each AP must be manually configured with an IP address through the AP provisioning profile. For details, see .
You can use an existing DHCP server in the same subnetwork as the AP to provide the AP with its IP information. You can also configure a device in the same subnetwork to act as a relay agent for a DHCP server on a different subnetwork. (Refer to the vendor documentation for the DHCP Server or relay agent for information.)
If an AP is on the same subnetwork as the master controller, you can configure the controller as a DHCP server to assign an IP address to the AP. The controller must be the only DHCP server for this subnetwork.
In the WebUI
1. Navigate to the Configuration > Network > IP > DHCP Server window. 2. Select the Enable DHCP Server checkbox. 3. In the Pool Configuration section, click Add. 4. Enter information about the subnetwork for which IP addresses are to be assigned. Click Done. 5. If there are addresses that should not be assigned in the subnetwork:
a. Click Add in the Excluded Address Range section. b. Enter the address range in the Add Excluded Address section. c. Click Done. 6. Click Apply at the bottom of the window.
In the CLI
(host)(config)# ip dhcp excluded-address ipaddripaddr2 (host)(config)# ip dhcp pool name
default-router ipaddr dns-server ipaddr domain-name name network ipaddrmask (host)(config)# service dhcp

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 578

AP Provisioning Profiles
AP provisioning profiles allow you to define a set of additional provisioning information for an AP, such as USB modem settings, PPPoE values, or configuration settings to provision an AP as a remote AP. When you create a provisioning profile, you can then apply that profile to an AP group and provision that entire group of campus or remote APs with the settings in that profile.
Defining an AP Provisioning Profile
By default, an AP group does not have a provisioning profile. Make sure that any provisioning profiles you create are complete and accurate before you assign that profile to an AP group. If a misconfigured provisioning profile is assigned to a group of APs, the APs in that group may be automatically provisioned with erroneous parameters and become lost.
1. Navigate to the Configuration > Wireless > AP Installation > Provisioning window. 2. Next, select the Provisioning Profile tab and enter a provisioning profile name in the text box (next to the
Add button). 3. Click the Add button to add the profile name. 4. Select your new provisioning profile name from the list at the left. 5. (Optional) If you are provisioning a remote AP, select the Remote-AP checkbox. 6. Enter the IP address or the fully qualified domain name of the master controller in the Master IP/FQDN
field. 7. If your AP will use Point-to-Point Protocol over Ethernet (PPPoE) to authenticate itself to a service provider,
select the PPPoE Parameters checkbox and enter the following PPPoE values: l PPPoE User Name: Set the PPPoE User Name for this remote AP. l PPPoE Password: Enter and then confirm the PPPoE password for this remote AP. l PPPoE Service Name: Either an ISP name or a class of service configured on the PPPoE server. 8. (Optional) If you want to use this provisioning profile to provision APs with more than one interface, you must also configure the USB settings and priority levels for this profile. The configuration settings in this profile are described in Table 114. 9. Click Apply to save your settings.

Table 114: AP Provisioning Profile parameters

Parameter

Description

Remote-AP

Select this checkbox to provision the group of APs as remote APs.

Master IP/FQDN PPPOE User Name :

The fully qualified domain name (FQDN) or IP address of the controller to which the AP is associated. NOTE: If you configure a master IP/FQDN setting in an AP's provisioning profile, this setting will override any LMS and backup LMS settings configured in an AP's AP system-profile. Leave the master IP/FQDN parameter blank if you want the AP to use the LMS or backup LMS values.
Point-to-Point Protocol over Ethernet (PPPoE) password for the AP.

PPPOE Password :

Point-to-Point Protocol over Ethernet (PPPoE) password for the AP.

579 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter PPPOE Service Name

Description Configures the PPPoE service name for the AP.

USB User Name

Configures the USB username for the AP.

USB Password :

A USB password, if provided by the cellular service provider.

USB Device Type

The USB device type.

USB Device Identifier

The USB device identifier.

USB Dial String

The dial string for the USB modem. This parameter only needs to be specified if the default string is not correct.

USB Initialization String

The initialization string for the USB modem. This parameter only needs to be specified if the default string is not correct.

USB TTY device data path

The TTY device path for the USB modem. This parameter only needs to be specified if the default path is not correct.

USB TTY device control path

The TTY device control path for the USB modem. This parameter only needs to be specified if the default path is not correct.

Link Priority Ethernet

Set the priority of the wired uplink. Each uplink type has an associated priority; wired ports having the highest priority by default.

Link Priority Cellular

Set the priority of the cellular uplink. By default, the cellular uplink is a lower priority than the wired uplink; making the wired link the primary link and the cellular link the secondary or backup link.
Configuring the cellular link with a higher priority than your wired link priority will set your cellular link as the primary controller link.

Cellular modem network preference

The cellular modem network preference setting allows you to select how the modem should operate.
l auto (default): In this mode, the modem firmware will control the cellular network service selection; so the cellular network service failover and fallback is not interrupted by the remote AP (RAP).
l 3g_only: Locks the modem to operate only in 3G.
l 4g_only: Locks the modem to operate only in 4G.
l advanced: The RAP controls the cellular network service selection based on the Received Signal Strength Indication (RSSI) thresholdbased approach. Initially the modem is set to the default auto mode. This allows the modem firmware to select the available network. The RAP determines the RSSI value for the available network type (for example 4G), checks whether the RSSI is within required range, and if so, connects to that network. If the RSSI for the modem's selected network is not within the required range, the RAP will then check the RSSI limit of an alternate network (for example, 3G), and reconnect to that alternate network. The RAP will repeat the above steps each time

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 580

Parameter
Username of AP so that AP can authenticate to 802.1x using PEAP Password of AP so that AP can authenticate to 802.1x using PEAP Uplink VLAN
USB power mode

Description it tries to connect using a 4G multimode modem in this mode.
Configure the AP username.
Configure the AP password.
If you configure an uplink VLAN on an AP connected to a port in trunk mode, the AP sends and receives frames tagged with this VLAN on its Ethernet uplink. By default, an AP has an uplink vlan of 0, which disables this feature. If an AP is provisioned with an uplink VLAN, it must be connected to a trunk mode port or the AP's frames will be dropped. 0 ( disabled) to 4095 0
Set the USB power mode to control the power to the USB port.

Assigning Provisioning Profiles
Once you have defined a provisioning profile, you must assign that profile to an AP group.
1. Navigate to the Configuration>AP configuration window and select the AP group tab. 2. Click the Edit button by the name of the AP group to which you want to assign the provisioning profile. 3. In the profiles list, expand the AP menu, and select Provisioning Profile. The Profile Details window
appears. 4. Click the Provisioning Profile drop-down list and select the name of the provisioning profile you want to
assign to this AP group. 5. Click Apply.
If you are provisioning remote APs, you must also add the remote APs to the RAP whitelist. For details, see Remote Access Points on page 720.

Configuring Installed APs
APs and AMs are designed to require only minimal setup to make them operational in an user-centric network. Once APs have established communication with the controller, you can apply advanced configuration to individual APs or groups of APs in the network using the WebUI on the controller.
You can either connect the AP directly to a port on the controller, or connect the AP to another switch or router that has layer-2 or layer-3 connectivity to the controller. If the Ethernet port on the controller is an 802.3af Power over Ethernet (PoE) port, the AP automatically uses it to power up. If a PoE port is not available, you must get an AC adapter for the AP. For more information, see the Installation Guide for the specific AP.
If you are configuring a new AP that has never been provisioned before, you must first connect the AP to the controller according the instructions included with that AP. If you are reprovisioning or reconfiguring existing active APs, this step is not necessary, as the APs are already communicating with the controller.
This section describes the procedure to configure a installed AP with the basic settings it requires to become operational on the network. You can configure an AP using the AP wizard, the provisioning profile in the

581 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

WebUI, or the controller command-line interface. using The individual configuration steps vary, depending upon whether the AP is deployed as a campus AP, remote AP (RAP) or a mesh AP.
Configuring an AP using the Provisioning Wizard
The easiest way to provision any AP is to use the AP Wizard in the controller WebUI. This wizard will walk you through the specific steps required to provision a campus, remote or Mesh AP. The Wizard includes a help tab that further describes each of the configuration tasks for that deployment type.
To access the AP wizard to provision a AP:
1. Select Configuration>Wizards>AP Wizard. The Specify Deployment Scenario window appears. 2. Select the deployment for the new AP, then click Next to continue to the next window in the Wizard. 3. Continue working your way through the Wizard to complete the provisioning process.
Configuring a AP using the WebUI
The following basic steps configure a campus AP on a LAN.
Remote APs and mesh APs require additional configuration steps not required for campus APs. For more information, see Configuring a Remote AP and
1. Navigate to the Configuration > Wireless > AP Installation > Provisioning window. 2. Click the checkbox by the AP you want to provision, then click Provision. The Provisioning window opens. 3. In the AP Parameters section, click the AP Group drop-down list and select the AP group to which this AP
should be assigned. The AP group must have at least one virtual AP. 4. (Optional) Some AP models support an external antenna in addition to their internal antenna. If the AP you
are provisioning supports an external antenna, the Provisioning window displays an additional Antenna Parameters section. If you want to use an External antenna for the remote AP you are provisioning, select External Antenna and define settings for that antenna. Otherwise, the remote AP will use its internal antenna by default. 5. If your AP will use Point-to-Point Protocol over Ethernet (PPPoE) to authenticate itself to a service provider, select the PPPoE Parameters checkbox and enter the following PPPoE values: l PPPoE User Name: Set the PPPoE User Name for this remote AP. l PPPoE Password: Enter and then confirm the PPPoE password for this remote AP. l PPPoE Service Name: Either an ISP name or a class of service configured on the PPPoE server. 6. (Optional) To allow the remote AP to use PEAP to authenticate to 802.1X networks, enter a user name and password in the 802.1X Parameter using PEAP section. 7. In the Master Discovery section, define how the AP should identify its WLAN controller. For more information on the different controller discovery methods, see Enable Controller Discovery on page 577. 8. (Optional) Define the uplink VLAN. If you configure an uplink VLAN on an AP connected to a port in trunk mode, the AP sends and receives frames tagged with this VLAN on its Ethernet uplink. To define the uplink VLAN, entering a VLAN ID from 1-4095 (inclusive) in the IP Settings section of the Provisioning window, 9. Define how the AP should obtain its IP address. If you have configured an DHCP server to allow APs to get addresses using DHCP, select Obtain IP address using DHCP. For more information on configuring a DHCP server, see Enable DHCP to Provide APs with IP Addresses on page 578. Otherwise, select Use the Following IP address and enter the appropriate values in the following fields: l IP address: IP address for the AP, in dotted-decimal format l Subnet mask: Subnet mask for the IP, in dotted-decimal format. l Gateway IP address: The IP address the AP uses to reach other networks.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 582

l DNS IP address: The IP address of the Domain Name Server. l Domain name: (optional) The default domain name. 10.(Optional) Access points can be configured in single-chain mode, allowing the radios of those APs to transmit and receive data using only legacy rates and single-stream HT and VHT rates on a single radio chain and single antenna or antenna interface. On APs with external antennas, this feature uses the external antenna interface labeled A0 or ANT0 (radio chain 0); the other (one or two) antenna interfaces are left unused. If you are provisioning an 802.11n-capable AP, select the Enable for Radio-0 or Enable for Radio-1 checkboxes in the Single-Chain Mode section to enable single-chain mode for the selected radio. AP radios in single-chain mode will transmit and receive data using only legacy rates and single-stream HT rates up to MCS 7. This feature is disabled by default. 11.(Optional) Define the AP name or SNMP location. The AP list section displays current information for an AP, and allows you to define additional parameters for your AP, such as AP Name, SNMP System Location. 12.Click Apply and Reboot. (Reprovisioning the AP causes it to automatically reboot).
Configuring a Remote AP
A remote AP (RAP) is recommended when the network between the AP and controller is an un-trusted/nonroutable network, such as the Internet. Furthermore, a RAP supports an internal DHCP server, while a campus AP does not.
Remote Authentication
The two most common ways to provision an AP for remote authentication are certificate-based AP provisioning and provisioning using a pre-shared key. Although both options allow for a simple secure setup of your remote network, you should make sure that the procedure you select is supported by your controller, the AP model type and the end user's client software. If you must provision your APs using a pre-shared key, you need to know which controller models you have that do not support certificate-based provisioning.
l Certificate based authentication allows a controller to authenticate a AP using its certificates instead of a PSK. You can manually provision an individual AP with a full set of provisioning parameters, or simultaneously provision an entire group of APs by defining a provisioning profile which contains a smaller set of provisioning parameters that can be applied the entire AP group. When you manually provision an individual AP to use certificated-based authentication, you must connect that AP to the controller before you can define its provisioning settings.
l Use Pre-Shared Key (PSK) authentication to provision an individual remote AP or a group of remote APs using an Internet Key Exchange Pre-Shared Key (IKE PSK).
RAP Configuration
The steps to configure a remote AP using the WebUI are similar to the steps described in Configuring a AP using the WebUI , although some additional steps are required.
1. In the Configuration > Wireless > AP Installation > Provisioning window, select Yes for the Remote AP option.
2. In the Remote IP Authentication Method section, select either Pre-shared key or certificate authentication type. The Pre-shared key option requires you to perform the following additional steps: a. Enter and confirm the pre-shared key (IKE PSK). b. In the User credential assignment section, specify if you want to use a Global User Name/password or a Per AP User Name/Password. n If you use the Per AP User Names/Passwords option, each RAP is given its own user name and password. n If you use the Global User Name/Password option, all selected RAPs are given the same (shared) user name and password.

583 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

c. Enter the user name, and enter and confirm the password. If you want the controller to automatically generate a user name and password, select Use Automatic Generation, then click Generate by the User Name and Password fields.
3. If you are provisioning remote AP models that support USB modems, you must complete the fields in the USB settings section. USB settings will not appear in the Provisioning window unless you are provisioning an AP that supports these features.
Configuring a Mesh AP
The steps to configure a remote AP using the WebUI are similar to the steps described in Configuring a AP using the WebUI , although some additional steps are required.
1. Define and configure the mesh cluster profile. 2. Define and configure the mesh radio profile 3. In the AP list section of the Configuration > Wireless > AP Installation > Provisioning window, select
one of the following mesh for on the AP: n Mesh portal--The gateway between the wireless mesh network and the enterprise wired LAN. n Mesh point--APs that can provide traditional Dell WLAN services (such as client connectivity, intrusion
detection system (IDS) capabilities, user roles association, LAN-to-LAN bridging, and Quality of Service (QoS) for LAN-to-mesh communication) to clients on one radio and perform mesh backhaul/network connectivity on the other radio. Mesh points can also provide LAN-to-LAN bridging through their Ethernet interfaces and provide WLAN services on the backhaul radio n Remote Mesh Portal: The Remote Mesh Portal feature allows you to configure a remote AP at a branch office to operate as a mesh portal for a mesh cluster.
For detailed provisioning guidelines, caveats, and instructions, see Secure Enterprise Mesh on page 622.
Verifying the Configuration
After the AP has been configured, navigate to Monitoring>All Access Points window and verify that the AP has an up status. The AP on your network does not appear in this table, it may have been classified as an inactive AP for any of the following reasons:
l The AP is configured with a missing or incorrect VLAN. (For example, the AP is configured to use a tunneled SSID of VLAN 2 but the controller doesn't have a VLAN 2.)
l The AP has an unknown AP group. l The AP has a duplicate AP name. l An AP with an external antenna is not provisioned with external antenna gain settings. l Both radios on the AP are disabled. l No virtual APs are defined on the AP. l The AP has profile errors. For details, access the command-line interface and issue the command "show
profile errors". l The GRE tunnel between the AP and the controller was blocked by a firewall after the AP became active. l The AP is temporarily down while it is upgrading its software. The AP will become active again after
upgrading.

Optional AP Configuration Settings
Once the AP has been installed and provisioned, you can use the WebUI or CLI to configure the optional AP settings described in the following sections:
l Changing the AP Installation Mode on page 585

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 584

l Renaming an AP on page 586 l Enabling Spanning Tree on page 586 l AP Console Access Using a Backup ESSID on page 587 l Defining an RTLS Server on page 587 l AP Redundancy on page 588 l AP Maintenance Mode on page 589 l Energy Efficient Ethernet on page 590 l AP LEDs on page 591 l Suppressing Client Probe Requests on page 592

Changing the AP Installation Mode
By default, all AP models initially ship with an indoor or outdoor installation mode. This means that APs with an indoor installation mode are normally placed in enclosed, protected environments and those with an outdoor installation mode are used in outdoor environments and exposed to harsh elements.
In most countries, there are different channels and power that are allowed for indoor and outdoor operation. You may want to change an AP's installation mode from indoor to outdoor or vice versa.

In the WebUI
To configure the installation mode for an AP, follow these steps:
1. Navigate to the Configuration > Wireless> AP Installation page. The list of discovered APs are displayed on this page.
2. Select the AP you want to change. 3. Click Provision to reveal the Provisioning page.
Locate the AP Installation Mode section. By default, the Default mode is selected. This means that the AP installation type is based on the AP model. 4. Select the Indoor option to change the installation to Indoor mode. Select the Outdoor option to change the to Outdoor mode. 5. Click Apply and Reboot (at the bottom of the page).

In the CLI

This example displays the AP installation mode options and sets the AP to indoor installation mode.

(host) (config) #provision-ap

(host) (AP provisioning) #installation ?

default

Decide by AP model

indoor

Indoor installation

outdoor

Outdoor installation

(host) (AP provisioning) #installation indoor

This example shows basic information details about the configuration of an AP named "MyAP." The AP installation mode is indoor.

(host) #show ap details ap-name myAP

AP "MyAP" Basic Information

----------------------------

Item

Value

----

-----

AP IP Address 10.0.0.253

LMS IP Address 10.0.0.1

Group

default

Location Name N/A

585 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Status Up time Installation

Up; Mesh 9m:55s indoor

Renaming an AP
Each AP on the network should have a unique name. Display information about the APs on your network by executing the show ap database long command. The output will flag an AP that has a duplicate name (N flag).
Follow the steps below to rename an active AP on the network. If an AP with a duplicate name is no longer connected to your network, use the command clear gap-db wired-mac to clear the duplicate entry.
In the WebUI
1. Navigate to the Configuration > Wireless> AP Installation page. A list of discovered APs are on this page.
2. Select the AP you want to rename, and click Provision. 3. On the Provisioning page, scroll to the AP list at the bottom of the page and find the AP you want to
rename. 4. In the AP Name field, enter the new unique name for the AP. 5. Click Apply and Reboot.
In the CLI
Execute the following command (from enable mode) only on a master controller. Executing the command causes the AP to automatically reboot.
ap-rename {ap-name <name>|serial-num <number>|wired-mac <macaddr>} <new-name>
If an AP is recognized by the controller but is powered off or not connected to the network or controller when you execute the command, the request is queued until the AP is powered back on or reconnected.

Enabling Spanning Tree
The Spanning Tree Protocol (STP) can prevent loops in bridged Ethernet local area networks. You can enable or disable the Spanning Tree parameter using the CLI and WebUI interfaces.
In the WebUI
The following procedure configures the Spanning Tree parameter in AP System profile: 1. Navigate to the Configuration > Advanced Services > All Profiles page. 2. Under AP > AP System on the Profiles pane, select the profile name. 3. Under the Basic tab on the Profile Details pane, select the Spanning Tree checkbox. 4. Click Apply.
In the CLI
STP is enabled only on wired ports of an AP. STP works only on downlink ports (eth1-<n>). The spanning Tree is supported in APs with 3 or more ports. The following example enables spanning tree in default ap-system profile, using the CLI command:
(host) (config) #ap system-profile default (host) (AP system profile "default") #spanning-tree The following example displays the spanning tree information of an AP, using the CLI command: (host) (config) #show ap debug spanning-tree ap-name <ap-name>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 586

AP Console Access Using a Backup ESSID
This failover system allows users to access an AP console after the AP has disconnected from the controller. By advertising backup ESSID in either static or dynamic mode, the user is still able to access and debug the AP remotely through a virtual AP. Settings for this feature can be changed using the controller's WebUI or CLI.
In the WebUI
Use the following steps to configure the settings for the backup ESSID in the WebUI.
1. Navigate to the Configuration > Advanced > All Profiles page. 2. Under AP > AP System on the Profile pane, select the AP profile name. 3. In the Profile Details pane, select the Advanced tab. 4. To change the password, clear the Password for Backup field and enter the new password. 5. Click Apply. 6. To configure the RF band on which the backup ESSID is advertised, click the drop-down list in the RF Band
for Backup field and select the desired RF band. 7. Click Apply. 8. To configure the operation mode, choose one of the following options from the Operation for backup
drop-down list. 9. Click Apply.

Table 115: Operation for Backup Configuration Parameters Parameter Description

Off

No backup ESSID advertised by the AP. The default setting is off.

Static

Virtual AP continuously advertises the backup ESSID, regardless of the connection status between the AP and controller.

Dynamic

Virtual AP advertises the backup ESSID only after the AP disconnects from the controller. Once connection between the AP and controller is available, the backup ESSID is disabled again.

In the CLI
Execute the following commands in config mode to configure the backup ESSID settings.
(host)(config) #ap system profile <profile> #bkup-password <bkup-password> #bkup-band all|a|g #bkup mode static|dynamic|off
Defining an RTLS Server
The RTLS server configuration enables the AP to send RFID tag information to an RTLS server. Currently, when configuring the RTLS server under ap system-profile, the valid range of values for station-messagefrequency was 5-3600 seconds. There are deployments that may require this to be configurable to as frequently as 1 per second. Starting with ArubaOS 6.4.2.0, you can set the station-message-frequency parameter in the 1-3600 seconds range. Setting the frequency to 1 means a report would be sent for every station every second. A value of 5 would mean that a report for any particular station would be sent at 5 second intervals.

587 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the WebUI
Use the following procedure to configure an RTLS server with station message frequency using the WebUI:
1. Navigate to the Configuration > Wireless > AP Configuration page. 2. Under the AP Group tab, click the desired profile. 3. Under the Profiles list, navigate to the AP > AP system profile menu. 4. Under the Advanced tab of the Profile Details section, configure the RTLS Server configuration
parameters described in Table 116.

Table 116: RTLS Server Configuration Parameters

Parameter

Description

IP or DNS

IP address or the DNS of the RTLS server to which location reports are sent.

port

Port number on the server to which location reports are sent.

frequency

Indicates how often packets are sent to the server. Valid range is 1-3600 seconds.

key

Shared secret key.

includeUnassocSta

Indicates whether to include unassociated stations when sending station reports. Unassociated stations are stations that are not associated to any AP.
Default value is disabled.

In the CLI
Use the following commands to configure an RTLS server with station message frequency using the CLI: (host) (config) #ap system-profile default (host) (AP system profile "default") #rtls-server ip-or-dns <IP or DNS of RTLS server> port <port> key <key> station-message-frequency <1-3600>
Important Points to Remember
l Sending more frequent reports to the server can improve the accuracy of the location calculation. l Configuring an AP to send reports more frequently adds additional load in terms of CPU usage.
AP Redundancy
In conjunction with the controller redundancy features described in Increasing Network Uptime Through Redundancy and VRRP on page 661 the information in this section describes redundancy for APs. Remote APs also offer redundancy solutions via a backup configuration, backup controller list, and remote AP failback. For more information relevant to remote APs, see Remote Access Points on page 720.
The AP failback feature allows an AP associated with the backup controller (backup LMS) to fail back to the primary controller (primary LMS) if it becomes available.
If configured, the AP monitors the primary controller by sending probes every 600 seconds by default. If the AP successfully contacts the primary controller for the entire hold-down period, it will fail back to the primary controller. If the AP is unsuccessful, the AP maintains its connection to the backup controller, restarts the LMS hold-down timer, and continues monitoring the primary controller.
The following example assumes:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 588

l You have not configured the LMS or backup LMS IP addresses l Default values unless otherwise noted.
In the WebUI
Follow the procedure below to use the AP system profile to configure a redundant controller. For additional information on AP system profile settings, see Virtual AP Configuration Workflow. 1. Navigate to the Configuration > Wireless > AP Configuration page. 2. Select either the AP Group or AP Specific tab. Click Edit for the AP group or AP name. 3. Under Profiles, select AP to display the AP profiles. 4. Select the AP system profile you want to modify. 5. Under Profile Details:
a. At the LMS IP field, enter the primary controller IP address. b. At the Backup LMS IP field, enter the backup controller IP address. c. Click (select) LMS Preemption. This is disabled by default. 6. Click Apply.
In the CLI
ap system-profile <profile> lms-ip <ipaddr> bkup-lms-ip <ipaddr> lms-preemption
ap-group <group> ap-system-profile <profile>
ap-name <name> ap-system-profile <profile>
AP Maintenance Mode
You can configure APs to suppress traps and syslog messages related to those APs. Known as AP maintenance mode, this setting in the AP system profile is particularly useful when deploying, maintaining, or upgrading the network. If enabled, APs stop flooding unnecessary traps and syslog messages to network management systems or network operations centers during a deployment or scheduled maintenance. The controller still generates debug syslog messages if debug logging is enabled. After completing the network maintenance, disable AP maintenance mode to ensure all traps and syslog messages are sent. AP maintenance mode is disabled by default.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration page. 2. Select either the AP Group or AP Specific tab. Click Edit for the AP group or AP name. 3. Under Profiles, select AP to display the AP profiles. 4. Select the AP system profile you want to modify. 5. Under Profile Details, do the following:
l To enable AP maintenance mode, check (select) the Maintenance Mode checkbox. l To disable AP maintenance mode, clear (deselect) the Maintenance Mode checkbox. 6. Click Apply.

589 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the CLI
To enable AP maintenance mode: ap system-profile <profile> maintenance-mode To disable AP maintenance mode: ap system-profile <profile> no maintenance-mode
To view the maintenance mode status of APs, use the following commands: show ap config {ap-group <name>|ap-name <name>|essid <name>} show ap debug system-status {ap-name <name>|bssid <name>| ip-addr <ipaddr>}
On the local controller, you can also view maintenance mode status using the following commands: show ap active {ap-name <name>|essid <name>|ip-addr <ipaddr>} show ap database show ap details {ap-name <name>|bssid <name>|ip-addr <ipaddr>}
Energy Efficient Ethernet
The W-AP130 Series support the 803.az Energy Efficient Ethernet (EEE) standard, which allows the APs to consume less power during periods of low data activity. This setting can be enabled for provisioned APs or AP groups through the Ethernet Link profile. If this feature is enabled for an APs group, any APs in the group that do not support 803.az will ignore this setting.
In the WebUI
1. Navigate to the Configuration > Advanced Services> All Profiles page. 2. In the Profiles list, select AP to expand the AP profile menu. 3. Select AP Ethernet Interface Link profile. The list of existing Ethernet Link profiles appears in the Profile
Details window. Select the Ethernet link profile you want to configure to support 803.az from this list, or create a new Ethernet link profile by entering a name for the new profile, then clicking Add. 4. The selected profile appears in the Profile Details window. The configuration parameters for the profile are described in Table 117.

Table 117: Ethernet Interface Link Profile Parameters

Parameter

Description

Speed

The speed of the Ethernet interface, either 10 Mbps, 100 Mbps, 1000 Mbps (1 Gbps), or auto-negotiated.

Duplex

The duplex mode of the Ethernet interface, either full, half, or autonegotiated.

802.3az (EEE)

Select this checkbox to enable support for 802.1az Energy Efficient Ethernet. (for W-AP130 Series only).

5. Select the 803.az checkbox. 6. Click Apply to save your changes.
By default, AP wired port profiles reference the Default Ethernet interface link profile. If you created a new Ethernet interface link profile to support 803.az, use the procedure below to associate a AP wired port profile or Ethernet interface port configuration with the new Ethernet Interface link profile.
To associate a new Ethernet interface link profile with a wired port profile:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 590

1. Navigate to the Configuration > Advanced Services> All Profiles page. 2. In the Profiles list, select AP to expand the AP profile menu. 3. Select AP Wired Port Profile to display a list of existing wired port profiles 4. Select the AP wired port profile you want to support 802.az. The Ethernet interface link profile currently
associated with the port profile appears below the port profile in the Profiles list. 5. Click the Ethernet interface link profile currently associated with the AP wired port profile you want to
modify. The settings for the Ethernet interface link profile appear in the Profile Details window. 6. Click the Ethernet interface link profile drop-down list at the top of the Profile Details window, and
select a new Ethernet interface link profile. 7. Click Apply to save your changes.
In the CLI
To enable support for 803.az EEE, access the command-line interface in config mode and issue the following command: ap enet-link-profile <profile> dot3az Associate a new Ethernet Interface link profile with an AP wired port profile using the following command: ap wired-port-profile <profile>
enet-link-profile <profile>
AP LEDs
AP LEDs can be configured in two modes: normal and off. In normal mode, the AP LEDs will light as expected. When the mode is set to off, all of the LEDs on the affected APs are disabled.
In the WebUI
An AP system profile's LED operating mode affects LEDS on all APs using that profile.
This option is available on the W-AP90 Series and W-AP105 access points.
1. Navigate to the Configuration > Advanced Services> All Profiles page. 2. Select the AP tab and then select the AP system profiles tab. 3. Select the AP system profile you want to modify. 4. Locate the LED operating mode parameter. 5. From the drop-down list, select off. 6. Click Apply.
In the CLI
Use the ap system-profile command to disable LEDs for all APs using a particular system profile. (host) (config)# ap system-profile <profile-name> led-mode {normal | off} Use the ap-leds command to make the LEDs on a defined set of APs either blink or display in the currently configured LED operating mode. Note that if the LED operating mode defined in the AP's system profile is set to "off", then the normal parameter in the ap-leds command will disable the LEDs. If the LED operating mode in the AP system profile is set to "normal" then the normal parameter in this command will allow the LEDs light as usual. (host) (config)# ap-leds {all | ap-group <ap-group> | ap-name <ap-name> | ip-addr <ip address> | wired-mac <mac address>} {global blink|normal}|{local blink|normal}

591 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Suppressing Client Probe Requests
The anyspot client probe suppression feature decreases network traffic by suppressing probe requests from clients attempting to locate and connect to other known networks. By reducing the frequency at which these messages are sent, this feature frees up network resources and improves network performance.
When an AP is configured to use this feature, the anyspot AP radio hides its configured ESSID in beacons, and compiles a list of other ESSIDs from detected neighboring APs. If the client sends a probe request without a specified ESSID, the anyspot AP will respond with a preconfigured ESSID.
When a client searches for a preferred network, that client sends the SSID of the preferred network in the probe request. The anyspot AP checks to see if there is a neighboring AP using that ESSID that can respond the client's request. If no matching network is found, the anyspot AP sends a response to the client using the SSID from the client request. If the client is authorized to connect to the anyspot AP, that client associates to AP. Once connected to the anyspot AP, the client recognizes the ESSID to which it is connected as one associated with its preferred network, and does not send out any further probe requests.
An AP radio can only use this feature when encryption is disabled. (That is, when the operation mode parameter in the AP radio's WLAN SSSID profile is set to opensystem.)
You can define a list of excluded ESSIDs to which the anyspot AP will not respond. If a client sends probe request with an ESSID on the excluded ESSID list, the anyspot AP will not respond to the request, even if there is no neighboring AP using that ESSID. Excluded ESSIDs can be identified by exact name or a matching string.
In the WebUI
Use the following procedure to suppress client probe requests by enabling the anyspot feature.
1. Navigate to the Configuration > Advanced Services > All Profiles page. 2. Expand the Wireless LAN menu 3. Select Anyspot. 4. In the Profile Details window, enter a name for the new anyspot profile then click Add, or select the name
of an existing anyspot profile. 5. Configure the anyspot parameters described in Table 118.

Table 118: Anyspot Client Probe Suppression Configuration Parameters

Parameter

Description

Enable Anyspot

Select this checkbox to enable the anyspot feature. Note that you must associate the anyspot profile with a virtual AP profile for the settings to take effect.

Exclude ESSID(s) (exact match)

An anyspot-enabled radio will not respond to client probe requests using an ESSID in the Exclude ESSID lists. To add an ESSID to the list, enter the full name of the ESSID, then click Add. To remove an ESSID from the list, select it and click Delete. ESSIDs from neighboring APs will automatically appear in this list as long as the anyspot-enabled AP can detect that ESSID.

Exclude ESSID(s) (containing string(s)

An anyspot-enabled radio will not respond to client probe requests using an ESSID in the Exclude ESSID list. To exclude ESSIDs that partially match a text string, enter that string then click Add. To remove a matching string from the list, select it and click Delete.

Preset ESSID(s)

The anyspot-enabled AP will not send an ESSID in beacons, but if a client sends a probe

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 592

Table 118: Anyspot Client Probe Suppression Configuration Parameters

Parameter

Description

requests without ESSIDs (that is, the probe request is not looking for a specific network) then the anyspot-enabled AP will respond to the probe request with an ESSID from this list.

In the CLI
Use the following commands to configure the anyspot profile, and associate an anyspot profile with a virtual AP.
wlan anyspot-profile <anyspot-profile> wlan virtual-ap <virtual-ap-profile>
anyspot-profile <anyspot-profile>

RF Management
802.11a and 802.11g RF Management Profiles
The two 802.11a and 802.11g RF management profiles for an AP configure its 802.11a (5 Ghz) and 802.11b/g (2.4 GHz) radio settings. You can either use the "default" version of each profile, or create a new 802.11a or 802.11g profile using the procedures below. Each RF management radio profile includes a reference to an Adaptive Radio Management (ARM) profile. If you would like the ARM feature to dynamically select the best channel and transmission power for the radio, verify that the RF management profile references an active and enabled ARM profile. It can be useful to set the Max Tx EIRP parameter in the ARM profile to 127 (the maximum power level permissible) until it determines the signal-to-noise radio on the links. If ARM is active, the Max Tx EIRP can also be set to 127 to allow maximum power levels.
If you want to manually select a channel for each AP group, create separate 802.11a and 802.11g profiles for each AP group and assign a different transmission channel for each profile. For example, one AP group could have an 802.11a profile that uses channel 36 and an 802.11g profile that uses channel 11, and another AP group could have an 802.11a profile that uses channel 40 and an 802.11g profile that uses channel 9.
With the implementation of the high-throughput 802.11n standard, 40 MHz channels were added in addition to the existing 20 MHz channel options. Available 20 MHz and 40 MHz channels are dependent on the country code entered in the regulatory domain profile. The newer very high-throughput (VHT) 802.11ac standard introduces 80 Mhz channel options.
Changing the country code causes the valid channel lists to be reset to the defaults for the country.

The following channel configurations are available in ArubaOS:
l A 20 MHz channel assignment consists of a single 20 MHz channel. This channel assignment is valid for 802.11a/b/g and for 802.11n 20 MHz mode of operation.
l A 40 MHz channel assignment consists of two 20 MHz channels bonded together (a bonded pair). This channel assignment is valid for 802.11n 40 MHz mode of operation and is most often utilized on the 5 GHz frequency band.
l A 80 Mhz channel group for 5GHz radios. Only APs that support 802.11ac can be configured with 80 MHz channels.
If high-throughput is disabled, a 40 MHz channel assignment can be configured, but only the primary channel assignment is used. The 20 MHz clients can also associate using this configuration, but only the primary channel is used.

593 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

APs initially start up with default ack-timeout, cts-timeout and slot-time values. When you modify the maximum-distance parameter in an rf dot11a radio profile or rf dot11g radio profile, new ack-timeout, ctstimeout and slot-time values may be derived, but those values are never less then the default values for an indoor AP.

Mesh radios on outdoor APs have additional constraints, as mesh links may need to span long distances. For mesh radios on outdoor APs, the effect of the default maximum-distance parameter on the ack-timeout, cts-timeout and slot-time values depends on whether the APs are configured as mesh portals or mesh points. This is because mesh portals use a default maximum-distance value of 16,050 meters, and mesh points use, by default, the maximum possible maximum-distance value.

The maximum-distance value should be set correctly to span the largest link distance in the mesh network so that when a mesh point gets the configuration from the network it will apply the correct ack-timeout, ctstimeout and slot-time values.The values derived from the maximum-distance setting depend on the band and whether 20Mhz/40MHz mode of operation is in use.

The following table indicates values for a range of distances:

Timeouts[usec] --- 5GHz radio ---

--- 2.4GHz radio ---

Distance[m]

Ack

CTS

Slot

Ack

CTS

Slot

--------------------------------------------------------------------------

0 (outdoor:16050m) 128

128

63

128

128

63

0 (indoor:600a,6450g) 25

25

9

64

48

9

200 (==default)

25

25

9

64

48

9

500

25

25

9

64

48

9

600

25

25

9

64

48

9

1050

28

28

13

64

48

31

5100

55

55

26

64

55

31

10050

88

88

43

88

88

43

15000

121

121

59

121

121

59

16050

128

128

63

128

128

63

58200(5G limit 20M) 409

409

203

-

-

-

52650(2.4G limit 20M) -

-

-

372

372

185

27450(5G limit 40M) 204

204

101

-

-

-

24750(2.4G limit 40M) -

-

-

186

186

92

VHT Support on W-AP200 Series, W-AP210 Series, W-AP220 Series, and W-AP270 Series Access Points
This feature enables Very High Throughput (VHT) rates on the 2.4 GHz band, providing 256-QAM modulation and encoding that allows for 600 Mbit/sec performance over 802.11n networks. Maximum data rates are increased on the 2.4 GHz band through the addition of VHT Modulation and Coding Scheme (MCS) values 8 and 9, which support the highly efficient modulation rates in 256-QAM. Starting with ArubaOS 6.4.2.0, VHT is supported on W-AP200 Series, W-AP210 Series, W-AP220 Series, and W-AP270 Series access points on both 20 MHz and 40 MHz channels.
Using the controller's CLI or WebUI, VHT MCS values 0-9 are enabled, overriding the existing high-throughput (HT) MCS values 0-7, which have a lower maximum data rate. However, this feature should be disabled if individual rate selection is required.

Managing 802.11a/802.11g Profiles Using the WebUI
Use the following procedures to define and manage 802.11a and 802.11g RF management profiles Using the WebUI.
Creating or Editing a Profile
1. Navigate to the Configuration > Wireless > AP Configuration window. Select either the AP Group or AP Specific tab.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 594

l If you selected AP Group, click the Edit button by the AP group for which you want to create or change an RF management profile.
l If you selected AP Specific, click the Edit button by the AP for which you want to create or change an RF management profile.
2. In the Profiles list, expand the RF Management menu, then select either 802.11a radio profile or 802.11g radio profile.
3. To edit an existing 802.11a or 802.11g radio profile, select the desired profile from the 802.11a radio profile or 802.11g radio profile drop-down list at the top of the Profile Details window. To create a new 802.11a or 802.11g profile, click the drop-down list at the top of the Profile Details window, select NEW, then enter a name for the new profile.
The 802.11a and 802.11g profiles are divided into two tabs, Basic and Advanced. The Basic tab displays only those configuration settings that often need to be adjusted to suit a specific network. The Advanced tab shows all configuration settings, including settings that do not need frequent adjustment or should be kept at their default values. If you change a setting on one tab then click and display the other tab without saving your configuration, that setting will revert to its previous value. The basic and advanced profile settings are described in Table 119.
4. Make the desired configuration changes, then click Apply to save your settings.

Table 119: 802.11a/802.11g RF Management Configuration Parameters

Parameter

Description

Basic 802.11a/802.11g Settings -- General

Radio Enable

Enable transmissions on this radio band.

Mode

Access Point operating mode. Available options are: l am-mode: Air Monitor mode l ap-mode: Access Point mode l spectrum-mode: Spectrum Monitor mode The default settings is ap-mode.

High throughput enable (Radio)

Enable/Disable high-throughput (802.11n) features on the radio. This option is enabled by default.

Very high throughput enable (Radio)

Enable/Disable very high-throughput (802.11ac) features on the radio. This option is enabled by default.
NOTE: This parameter is only available in the 802.11a radio profile.

Very high throughput rates enable (256QAM)

Enable/Disable Very High Throughput (VHT) rate on 2.4 GHz band providing 256QAM modulation and encoding that allows for 600 Mbit/sec performance over 802.11n networks. For more information, see VHT Support on W-AP200 Series, WAP210 Series, W-AP220 Series, and W-AP270 Series Access Points.
NOTE: This parameter is only available in the 802.11g radio profile.

Channel

Transmit channel for this radio. The available channels depend on the regulatory domain (country). This parameter includes the following channel number configuration options for 20 MHz, 40 MHz and 80 MHz modes:

595 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter

Description
l 20: Select this option to disable 40 MHz mode and 80 Mhz mode and activate 20 MHz mode for the entered channel.
l 40: Entering a channel number and selecting the 40 radio button in the WebUI selects a primary and secondary channel for 40 MHz mode. When you use this option, the number entered becomes the primary channel and the secondary channel is determined by increasing the primary channel number by 4. For example, if you entered 157 into the Channel field and selected the above option, radios using that profile would select 157 as the primary channel and 161 as the secondary channel.
l 80; Entering a channel number and selecting the 80 Mhz radio button selects a primary and secondary channel for 80 MHz mode.
If you select the spectrum monitoring checkbox on this profile page, the AP will operate as a hybrid AP and scan the selected channel for spectrum analysis data.

Non-Wi-Fi Interference Immunity
Spectrum Monitoring

Set a value for non-Wi-Fi Interference Immunity.
The default setting for this parameter is level 2. When performance drops due to interference from non-802.11 interferers (such as DECT or Bluetooth devices), the level can be increased up to level 5 for improved performance. However, increasing the level makes the AP slightly "deaf" to its surroundings, causing the AP to lose a small amount of range.
The levels for this parameter are:
l Level 0: no ANI adaptation.
l Level 1: noise immunity only.
l Level 2: noise and spur immunity.
l Level 3: level 2 and weak OFDM immunity.
l Level 4: level 3 and FIR immunity.
l Level 5: disable PHY reporting. NOTE: Only 802.11n-capable APs simultaneously support both the RX Sensitivity Tuning Based Channel Reuse feature and a level-3 to level-5 Noise Immunity setting. Do not raise the noise immunity default setting on APs that do not support 802.11n unless you first disable the Channel Reuse feature.
Select this option to convert APs using this radio profile to a hybrid APs that will continue to serve clients as an Access Point, but will also scan and analyze spectrum analysis data for a single radio channel. For more details on hybrid APs, see Spectrum Analysis on page 772.

Advanced 802.11a/802.11g Settings

Transmit EIRP

Maximum transmit EIRP in dBm from 0 to 51 in .5 dBm increments, or 127 for regulatory maximum. Transmit power may be further limited by regulatory domain constraints and AP capabilities.

Enable CSA

Channel Switch Announcements (CSAs), as defined by IEEE 802.11h, enable an AP to announce that it is switching to a new channel before it begins transmitting on that channel. This allows clients that support CSA to transition to the new channel with minimal downtime.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 596

Parameter CSA Count

Description
Number of channel switch announcements that must be sent prior to switching to a new channel. The default CSA count is 4 announcements.

Advertise 802.11d and 802.11h Capabilities

Enable the radio to advertise its 802.11d (Country Information) and 802.11h (Transmit Power Control) capabilities. This option is disabled by default.

Spectrum Load Balancing

The Spectrum Load Balancing feature helps optimize network resources by balancing clients across channels, regardless of whether the AP or the controller is responding to the wireless clients' probe requests.
If enabled, the controller compares whether or not an AP has more clients than its neighboring APs on other channels. If an AP's client load is at or over a predetermined threshold as compared to its immediate neighbors, or if a neighboring Dell AP on another channel does not have any clients, load balancing will be enabled on that AP. This feature is disabled by default. For details, see Spectrum Load Balancing on page 529.

Beacon Period

Beacon Period for the AP in msec. The minimum value is 60 msec, and the default value is 100 msec.

Beacon Regulate

Enable this setting to introduce randomness in the beacon generation so that multiple APs on the same channel do not send beacons at the same time.

Advertised Regulatory Max EIRP

Work around a known issue on Cisco 7921G telephones by specifying a cap for a radio's maximum equivalent isotropic radiated power (EIRP). When you enable this parameter, even if the regulatory approved maximum for a given channel is higher than this EIRP cap, the AP radio using this profile will advertise only this capped maximum EIRP in its radio beacons.
The supported range is 1-31dBm.

ARM/WIDS Override

If selected, this option disables Adaptive Radio Management (ARM) and Wireless IDS functions and slightly increases packet processing performance. If a radio is configured to operate in Air Monitor mode, then the ARM/WIDS functions are always enabled, regardless of whether or not this check box is selected.

Reduce Cell Size (Rx Sensitivity)

The cell size reduction feature allows you manage dense deployments and to increase overall system performance and capacity by shrinking an AP's receive coverage area, thereby minimizing co-channel interference and optimizing channel reuse. This value should only be changed if the network is experiencing performance issues. The possible range of values for this feature is 0-55 dB. The default 0 dB reduction allows the radio to retain its current default Rx sensitivity value.
Values from 1 dB - 55 dB reduce the power level that the radio can hear by that amount. If you configure this feature to use a non-default value, you must also reduce the radio's transmission (Tx) power to match its new received (Rx) power level. Failure to match a device's Tx power level to its Rx power level can result in a configuration that allows the radio to send messages to a device that it cannot hear.

597 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter
Management Frame Throttle Interval

Description
Averaging interval for rate limiting management frames from this radio, in seconds. A management frame throttle interval of 0 seconds disables rate limiting.

Management Frame Throttle Limit

Maximum number of management frames that can come in from this radio in each throttle interval.

Maximum Distance

Maximum client distance, in meters. This value is used to derive ACK and CTS timeout times. A value of 0 specifies default settings for this parameter, where timeouts are only modified for outdoor mesh radios which use a distance of 16km.
The upper limit for this parameter varies from 24km­58km, depending on the radio's band (a/g) and 20/40 MHz mode. Note that if you configure a value above the supported maximum, the maximum supported value will be used instead. Values below 600m will use default settings.

RX Sensitivity Tuning Based Channel Reuse
RX Sensitivity Threshold

In some dense deployments, it is possible for APs to hear other APs on the same channel. This creates co-channel interference and reduces the overall utilization of the channel in a given area. Channel reuse enables dynamic control over the receive (Rx) sensitivity in order to improve spatial reuse of the channel.
This feature is disabled by default. To enable this feature, click the RX Sensitivity Tuning Based Channel Reuse drop-down list and select either static or dynamic.To disable this feature, click the RX Sensitivity Tuning Based Channel Reuse drop-down list and select disable. For details on each of these modes, see Reusing Channels to Control RX Sensitivity Tuning on page 529.
NOTE: Do not enable the Channel Reuse feature if Non-Wi-Fi Interference Immunity on page 596 is set to level 3 or higher. A level-3 to level-4 Noise Immunity setting is not compatible with the Channel Reuse feature. The channel reuse feature applies to non-DFS channels only. It is internally disabled for DFS channels and is does not affect DFS radar signature detection.
RX sensitivity tuning based channel reuse threshold, in - dBm.
If the Rx Sensitivity Tuning Based Channel reuse feature is set to static mode, this parameter manually sets the AP's Rx sensitivity threshold (in -dBm). The AP will filter out and ignore weak signals that are below the channel threshold signal strength.
If the value for this parameter is set to zero, the feature will automatically determine an appropriate threshold.

Protection for 802.11b Clients

(For 802.11g RF Management Profiles only) Enable or disable protection for 802.11b clients. This parameter is enabled by default. Disabling this feature may improve performance if there are no 802.11b clients on the WLAN.
WARNING: Disabling protection violates the 802.11 standard and may cause interoperability issues. If this feature is disabled on a WLAN with 802.11b clients, the 802.11b clients will not detect an 802.11g client talking and can potentially transmit at the same time, thus garbling both frames.

Associated Profiles

ARM profile

Dell's proprietary Adaptive Radio Management (ARM) technology maximizes WLAN performance by dynamically and intelligently choosing the best 802.11 channel and transmit power for each Dell AP in its current RF environment.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 598

Parameter
High-throughput radio profile
Spectrum Monitoring Profile
AM Scanning Profile

Description
Every RF management profile references an ARM profile. If you specify an active and enabled ARM profile, you do not need to manually configure the Channel and Transmit Power parameters for this 802.11a or 802.11g profile. For details on referencing an ARM profile, see Assigning an ARM Profile on page 600.
The Adaptive Radio Management (ARM) profile associated with this 802.11a or 802.11g radio profile appears beneath the 802.11a/802.11g radio profile name in the profiles list. To change the ARM profile associated with an 802.11a or 802.11g radio profile, select the associated ARM profile in the profiles list then click the drop-down list in the Profile Details section of the page to select a new profile.
A high-throughput profile manages 40 MHz tolerance settings, and controls whether or not APs using this profile will advertise intolerance of 40 MHz operation. (This option is disabled by default, allowing 40 MHz operation.)
A high-throughput profile also determines whether an AP radio using the profile will stop using the 40 MHz channels surrounding APs or stations advertise 40 MHz intolerance. This option is enabled by default. For details on referencing a highthroughput radio profile, see Assigning a High-throughput Profile on page 600.
The high-throughput radio profile associated with this 802.11a or 802.11g radio profile appears beneath the 802.11a/802.11g radio profile name in the profiles list. To change the high-throughput radio profile associated with an 802.11a or 802.11g radio profile, select the associated high-throughput radio profile in the profiles list then click the drop-down list in the Profile Details section of the page to select a new profile.
The spectrum monitoring profile defines the spectrum band and device ageout times used by a spectrum monitor radio.
The spectrum monitoring profile associated with this 802.11a or 802.11g radio profile appears beneath the 802.11a/802.11g radio profile name in the profiles list. To change the spectrum monitoring profile associated with an 802.11a or 802.11g radio profile, select the associated spectrum monitoring profile in the profiles list then click the drop-down list in the Profile Details section of the page to select a new profile.
The AM scanning profile associated with this 802.11a or 802.11g radio profile appears beneath the 802.11a/802.11g radio profile name in the profiles list. To change the AM scanning profile associated with an 802.11a or 802.11g radio profile, select the associated AM scanning profile in the profiles list then click the drop-down list in the Profile Details section of the page to select a new profile.

Assigning an 802.11a/802.11g Profile to an AP or AP Group
Use the following procedure to assign an 802.11a or 802.11g RF management profile to an AP Group or individual AP using the WebUI.
1. Navigate to the Configuration > Wireless > AP Configuration window. Select either the AP Group or AP Specific tab. l If you selected AP Group, click the Edit button by the AP group name to which you want to assign a new 802.11a or 802.11g RF management profile. l If you selected AP Specific, click the Edit button by the AP to which you want to assign a new 802.11a or 802.11g RF management profile
2. Under the Profiles list, expand the RF management menu, then select either 802.11a radio profile or e802.11g radio profile.

599 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

3. To select a 802.11a radio profile for an AP or AP group, click the 802.11a radio profile drop-down list in the Profile Details window pane and select the desired profile from the list. -orTo select a 802.11g radio profile for an AP or AP group, click the 802.11g radio profile drop-down list in the Profile Details window pane and select the desired profile from the list.
4. Click Apply. The profile name appears in the Profile list with your configured settings. If you configure this for the AP group, this profile also becomes the selected 802.11a or 802.11g RF management profile used by the mesh portal for your mesh network.
Assigning a High-throughput Profile
Each 802.11a or 802.11g RF management radio profile references a high-throughput profile that manages the AP group's 40Mhz tolerance settings. By default, an 802.11a profile references a high-throughput profile named default-a and an 802.11g profile references a high-throughput profile named default-g. If you do not want to use these default profiles, use the procedure below to reference a different high-throughput profile for your 802.11a or 802.11g RF management profiles.
1. Navigate to the Configuration > Wireless > AP Configuration window. Select either the AP Group or AP Specific tab. l If you selected AP Group, click the Edit button by the AP group name to which you want to assign a new high-throughput profile. l If you selected AP Specific, click the Edit button by the AP which you want to assign a new highthroughput profile.
2. In the Profiles list, expand the RF Management menu, then select either 802.11a radio profile or 802.11g radioprofile.
3. SelectHigh-throughput radio profile.The Profile Details pane appears and displays information for the currently referenced high-throughput profile. Use this window pane to select a different high-throughput profile, or to create an entirely new high-throughput profile for that 802.11a or 802.11g radio. l To reference a different high-throughput profile, click the High-throughput Radio Profile drop-down list and select a new profile name from the list. Click Apply to save your changes. l To create a new high-throughput profile, click the High-throughput Radio Profile drop-down list and select NEW. a. Enter a name for the new high-throughput profile. b. (Optional) Select 40 MHz intolerance if you want to enable 40 MHz intolerance. This parameter controls whether or not APs using this high-throughput profile will advertise intolerance of 40 MHz operation. By default, this option is disabled and 40 MHz operation is allowed. d. (Optional) Select honor40 MHz intolerance to allow a radio using this profile to stop using the 40 MHz channels if the 40 MHz intolerance indication is received from another AP or station. This option is enabled by default. d. Click Apply to save your settings.
4. The high-throughput profile appears in the Profile list with your configured settings.
Assigning an ARM Profile
By default, an 802.11a or 802.11g profile references an ARM profile named default. Most network administrators will find that this one default ARM profile is sufficient to manage all the Dell APs on their WLAN. If, however, you do not want to use this default ARM profile, use the procedure below to reference a different ARM profile for your 802.11a or 802.11g RF management profiles.
1. Navigate to the Configuration > Wireless > AP Configuration window. Select either the AP Group or AP Specific tab.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 600

l If you selected AP Group, click the Edit button by the AP group name to which you want to assign a new ARM profile.
l If you selected AP Specific, click the Edit button by the AP which you want to assign a new ARM profile. 2. Under the Profiles list, expand the RF Management menu. 3. To reference an ARM profile for a 802.11a radio profile, expand the 802.11a radio profile menu.
-orTo reference an ARM profile for a 802.11g radio profile, expand the 802.11g radio profile menu. 4. The Profile Details pane appears and displays information for the currently referenced ARM profile. You can now select a different profile, or create an entirely new ARM profile for that 802.11a or 802.11g radio. l To reference a different ARM profile, click the Adaptive Radio Management (ARM) Profile drop-down
list and select a new profile name from the list. Click Apply to save your changes. l To create a new ARM profile, click the Adaptive Radio Management (ARM) Profile drop-down list and
select NEW. a. Enter a name for your new ARM profile. b. (Optional) If you are not configuring ARM for a mesh node, select 40 MHz intolerance if you want to enable 40 MHz intolerance. This parameter controls whether or not APs using this high-throughput profile will advertise intolerance of 40 MHz operation. By default, this option is disabled and 40 MHz operation is allowed. c. (Optional)If you are not configuring ARM for a mesh node, select honor 40 MHz intolerance to allow a radio using this profile to stop using the 40 MHz channels if the 40 MHz intolerance indication is received from another AP or station. This option is enabled by default. 5. ClickApply to save your settings.
The ARM profile name appears in the Profile list with your configured settings. If you configured this profile for the AP group, this ARM profile becomes part of the selected 802.11a or 802.11g RF management profile used by the mesh portal for your mesh network.
Deleting a Profile
You can delete an 802.11a or 802.11g radio profile only if no APs or AP groups are associated with that profile. To delete a 802.11a or 802.11g radio profile using the WebUI.
1. Navigate to the Configuration > Advanced Services> All Profiles window. 2. Expand the RF Management menu, then select 802.11a radio profile or 802.11g radio profile. A list of
profiles of the specified type appears in the Profile Details window pane. 3. Click the Delete button by the name of the profile you want to delete.
Managing 802.11a/802.11g Profiles Using the CLI
You must be in config mode to create, modify or delete a 802.11a or 802.11g RF management radio profile using the CLI. Specify an existing mesh profile with the <profile-name> parameter to modify an existing profile, or enter a new name to create an entirely new profile.
Creating or Modifying a Profile
Configuration details and any default values for each of these parameters are described in Table 119. This CLI command also allows you to reference an ARM profile and high-throughput radio profile for the 802.11a or 802.11g radio. If you do not specify a parameter for a new profile, that profile uses the default value for that parameter. Put the no option before any parameter to remove the current value for that parameter and return it to its default setting. Enter exit to leave the 802.11a or 802.11g profile mode.
rf dot11a-radio-profile|dot11g-radio-profile <profile-name> am-scan-profile

601 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

arm-profile beacon-period beacon-regulate cap-reg-eirp channel <num|num+|num-> channel-reuse channel-reuse-threshold clone csa csa-count disable-arm-wids-function dot11b-protection (for 802.11g radio profiles only) dot11h high-throughput-enable ht-radio-profile interference-immunity maximum-distance mgmt-frame-throttle-interval mgmt-frame-throttle-limit mode {ap-mode|am-mode|spectrum-mode} no radio-enable slb-mode slb-threshold slb-update-interval spectrum-load-bal-domain spectrum-load-balancing spectrum-monitoring spectrum-profile tpc-power tx-power
You can also create a new 802.11a or 802.11g RF management profile by copying the settings of an existing profile using the clone parameter. Using the clone command to create a new profile makes it easier to keep constant attributes in common within multiple profiles.
rf dot11a-radio-profile <profile-name> clone <source-profile-name> rf dot11g-radio-profile <profile-name> clone <source-profile-name>
Viewing RF Management Settings
To view a complete list of 802.11a or 802.11g RF management profiles and their status:
show rf dot11a-radio-profile|dot11g-radio-profile
To view the settings of a specific RF management profile:
show rf dot11a-radio-profile|dot11g-radio-profile <profile-name>
Assigning a 802.11a/802.11g Profile
To assign an 802.11a or 802.11g RF management profile to an AP group:
ap-group <group> dot11a-radio-profile <profile-name>
-or-
ap-group <group> dot11g-radio-profile <profile-name>
To assign an 802.11a or 802.11g RF management profile to an individual AP:
ap-name <name> dot11a-radio-profile <profile-name>
-or-
ap-name <name> dot11g-radio-profile <profile-name>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 602

Deleting a Profile
If no AP or AP group is using an RF management profile, you can delete that profile using the no parameter: no rf dot11a-radio-profile <profile-name>
RF Optimization
Each AP includes an RF Optimization profile that allows you to configure settings for detecting interference. The controller can detect interference near a wireless client station or AP is based on an increase in the frame retry rate or frame receive error rate.
Using the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration window. Select either the AP Group or AP Specific tab. l If you selected the AP Group tab, click the Edit button by the AP group name for which you want to configure the RF Optimization profile. l If you selected the AP Specific tab, click the Edit button by the AP for which you want to create the RF Optimization profile.
2. Expand the RF Management menu, then expand the RF Optimization Profile menu. 3. Select the profile you want to edit from the Profile Details window pane.
or Enter a new RF Optimization profile name in the field at the bottom of the Profile Details window, then click Add. Next, select that profile name from the profile list to edit its parameters. 4. Configure your RF Optimization radio settings. Table 120 describes the parameters. Click Apply to save your settings.

Table 120: RF Optimization Profile Parameters

Parameter

Description

Station Handoff Assist

Allows the controller to force a client off an AP when the RSSI drops below a defined minimum threshold.
Default: Disabled

RSSI Falloff Wait Time

Time, in seconds, to wait with decreasing RSSI before a de-authorization message is sent to the client.
Maximum value: 8 seconds
Default : 4 seconds

Low RSSI Threshold

Minimum RSSI above which de-authorization messages should never be sent.
Default: 10

RSSI Check Frequency

Interval, in seconds, to sample RSSI. Default: 3 seconds

Using the CLI
Use the following command to configure RF Optimization profiles. The parameters described in Table 120. rf optimization-profile <profile>

603 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

clone <profile> handoff-assist low-rssi-threshold <number> no ... rssi-check-frequency <number> rssi-falloff-wait-time <seconds>
RF Event Configuration
An AP's event threshold profile configures Received Signal Strength Indication (RSSI) metrics, including high and low watermarks for frame error rates and frame retry rates. When certain RF parameters are exceeded, these events can signal excessive load on the network, excessive interference, or faulty equipment.
This profile and many of the detection parameters are disabled (value is 0) by default.

The following procedure details the steps to configure RF Event parameters.
Using the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration window. Select either the AP Group or AP Specific tab. l If you selected the AP Group tab, click the Edit button by the AP group name for which you want to configure the RF Event profile. l If you selected the AP Specific tab, click the Edit button by the AP for which you want to create the RF Event profile.
2. In the Profiles list, expand the RF Management menu, then expand the RF Event Profile menu. 3. To edit an existing RF Event profile, select the profile you want to edit from the Profile Details window
pane. -or4. To create a new profile, enter a new RF Event profile name in the field at the bottom of the Profile Details window, then click Add. Next, select that profile name from the profile list to edit its parameters. 5. Configure your settings as detailed in Table 121 and click Apply to save your settings.

Table 121: RF Event Thresholds Profile Parameters

Parameter

Description

Detect Frame Rate Anomalies

Enable or disables detection of frame rate anomalies. This feature is disabled by default.

Bandwidth Rate High Watermark

If bandwidth in an AP exceeds this value, a bandwidth exceeded condition exists. The value represents the percentage of maximum for a given radio. (For 802.11b, the maximum bandwidth is 7 Mbps. For 802.11 a and g, the maximum is 30 Mbps.) The recommended value is 85%.

Bandwidth Rate Low Watermark

After a bandwidth exceeded condition exists, the condition persists until bandwidth drops below this value. The recommended value is 70%.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 604

Parameter
Frame Error Rate High Watermark

Description
If the frame error rate (as a percentage of total frames in an AP) exceeds this value, a frame error rate exceeded condition exists. The recommended value is 16%.

Frame Error Rate Low Watermark

After a frame error rate exceeded condition exists, the condition persists until the frame error rate drops below this value. The recommended value is 8%.

Frame Fragmentation Rate High Watermark

If the frame fragmentation rate (as a percentage of total frames in an AP) exceeds this value, a frame fragmentation rate exceeded condition exists. The recommended value is 16%.

Frame Fragmentation Rate Low Watermark

After a frame fragmentation rate exceeded condition exists, the condition persists until the frame fragmentation rate drops below this value. The recommended value is 8%

Frame Low Speed Rate High Watermark

If the rate of low-speed frames (as a percentage of total frames in an AP) exceeds this value, a low-speed rate exceeded condition exists. This could indicate a coverage hole. The recommended value is 16%.

Frame Low Speed Rate Low Watermark

After a low-speed rate exceeded condition exists, the condition persists until the percentage of low-speed frames drops below this value. The recommended value is 8%.

Frame Non Unicast Rate High Watermark

If the non-unicast rate (as a percentage of total frames in an AP) exceeds this value, a non-unicast rate exceeded condition exists. This value depends upon the applications used on the network.

Frame Non Unicast Rate Low Watermark

After a non-unicast rate exceeded condition exists, the condition persists until the non-unicast rate drops below this value.

Frame Receive Error Rate High Watermark

If the frame receive error rate (as a percentage of total frames in an AP) exceeds this value, a frame receive error rate exceeded condition exists. The recommended value is 16%

Frame Receive Error Rate Low Watermark

After a frame receive error rate exceeded condition exists, the condition persists until the frame receive error rate drops below this value. The recommended value is 8%.

Frame Retry Rate High Watermark

If the frame retry rate (as a percentage of total frames in an AP) exceeds this value, a frame retry rate exceeded condition exists. The recommended value is 16%.

Frame Retry Rate Low Watermark

After a frame retry rate exceeded condition exists, the condition persists until the frame retry rate drops below this value. The recommended value is 8%.

Using the CLI
Use the following command to configure RF event profiles. The available parameters for this profile are detailed in Table 121.
rf event-thresholds-profile <profile> bwr-high-wm <percent> bwr-low-wm <percent>

605 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

clone <profile> detect-frame-rate-anomalies fer-high-wm <percent> fer-low-wm <percent> ffr-high-wm <percent> ffr-low-wm <percent> flsr-high-wm <percent> flsr-low-wm <percent> fnur-high-wm <percent> fnur-low-wm <percent> frer-high-wm <percent> frer-low-wm <percent> frr-high-wm <percent> frr-low-wm <percent>
Optimizing APs Over Low-Speed Links
Depending on your deployment scenario, you may have APs or remote APs that connect to a controller located across low-speed (less than 1 Mbps capacity) or high-latency (greater than 100 ms) links.
With low-speed links, if heartbeat or keep alive packets are not received between the AP and controller during the defined interval, APs may reboot causing clients to re-associate. You can adjust the bootstrap threshold and prioritize AP heartbeats to optimize these types of links. In addition, high bandwidth applications may saturate low-speed links. For example, if you have tunnel-mode SSIDs, use them with low-bandwidth applications such as barcode scanning, small database lookups, and Telnet to avoid saturating the link. If you have traffic that will remain local, deploying remote APs and configuring SSIDs as bridge-mode SSIDs can also prevent link saturation.
With high-latency links, consider the amount and type of client devices accessing the links. Dell APs locally process 802.11 probe-requests and probe-responses, but the 802.11 association process requires interaction with the controller.
When deploying APs across low-speed or high-latency links, The following best practices are recommended:
l Connect APs and controllers over a link with a capacity of 1 Mbps or greater. l Maintain a minimum link speed of 64 Kbps per AP and per bridge-mode SSID. This is the minimum speed
required for downloading software images. l Adjust the bootstrap threshold to 30 if the network experiences packet loss. This makes the AP recover
more slowly in the event of a failure, but it will be more tolerant to heartbeat packet loss. l Prioritize AP heartbeats to prevent losing connectivity with the controller. l If possible, reduce the number of tunnel-mode SSIDs. Each SSID creates a tunnel to the controller with its
own tunnel keep alive traffic. l If most of the data traffic will remain local to the site, deploy remote APs in bridging mode. For more
information about remote APs, see Access Points on page 566. l If high-latency links such as transoceanic or satellite links are used in the network, deploy a controller
geographically close to the APs. l If high-latency causes association issues with certain handheld devices or barcode scanners, check the
manufacturer of the device for recent firmware and driver updates.
Configuring the Bootstrap Threshold
To configure the bootstrap threshold using the WebUI:
1. Navigate to the Configuration > Wireless > AP Configuration page. 2. Select either the AP Group or AP Specific tab. Click Edit by the AP group or AP name.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 606

The AP system profile configuration settings are divided into two tabs, Basic and Advanced. The Basic tab displays only those configuration settings that often need to be adjusted to suit a specific network. The Advanced tab shows all configuration settings, including settings that do not need frequent adjustment or should be kept at their default values. If you change a setting on one tab then click and display the other tab without saving your configuration, that setting will revert to its previous value. Both basic and advanced settings are described in Table 122.
3. Under Profiles, select AP, then AP system profile. The profile appears the Profile Details window.
4. In the Bootstrap threshold field, enter 30.
5. Click Apply.

Table 122: AP System Profile Configuration

Parameter

Description

Basic AP System Profile Settings--General

RF Band

For APs that support both 802.11a and 802.11b/g RF bands, specify the RF band in which the AP should operate:
l g = 2.4 GHz
l a = 5 GHz

RF Band for AM Mode scanning

For Air Monitors that support both 802.11a and 802.11b/g RF bands, specify the RF band which the AM should scan: l a = 5 GHz l all = both radio bands l g = 2.4 GHz

Native VLAN ID

Native VLAN for bridge mode virtual APs (frames on the native VLAN are not tagged with 802.1q tags).

Session ACL Corporate DNS Domain

Session ACL configured with the ip access-list session command. NOTE: This parameter requires the PEFNG license.
Name of domain that is resolved by corporate DNS servers. Use this parameter when configuring split-tunnel forwarding.

SNMP sysContact

SNMP system contact information.

LED operating mode

The operating mode for the 802.11n-capable AP LEDs.

Basic AP System Profile Settings--LMS

SAP MTU

Maximum Transmission Unit, in bytes, on the wired link for the AP.

LMS IP

In multi-controller networks, this parameter specifies the IP address of the local management switch (LMS)--the Dell controller--which is responsible for terminating user traffic from the APs, and processing and forwarding the traffic to the wired network. This can be the IP address of the local or master controller.

607 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter Backup LMS IP

Description
When using redundant controllers as the LMS, set this parameter to be the VRRP IP address to ensure that APs always have an active IP address with which to terminate sessions. NOTE: If the LMS-IP is blank, the access point will remain on the controller that it finds using methods like DNS or DHCP. If an IP address is configured for the LMS IP parameter, the AP will be immediately redirected to the controller at that address.
In multi-controller networks, specifies the IP address of a backup to the IP address specified with the lms-ip parameter.

LMS IPv6

In multi-controller ipv6 networks, specifies the IPv6 address of the local management switch (LMS)--the controller--which is responsible for terminating user traffic from the APs, and processing and forwarding the traffic to the wired network. This can be the IP address of the local or master controller.
When using redundant controllers as the LMS, set this parameter to be the VRRP IP address to ensure that APs always have an active IP address with which to terminate sessions.

Backup LMS IPv6

In multi-controller ipv6 networks, specifies the IPv6 address of a backup to the IPv6 address specified with the lms-ipv6 parameter.

LMS Preemption

When this parameter is enabled, the AP automatically reverts to the primary LMS IP address when it becomes available.

LMS Hold-down Period

Time, in seconds, that the primary LMS must be available before an AP returns to that LMS after failover.

GRE Striping IP

Specify an IPv4 address for the .g radio of the controller to allow LACP enabled switches to send traffic for the 2 radios on different links. Recommended value is LMS_IP+1.

Basic AP System Profile Settings--Remote AP

Remote-AP DHCP Server VLAN

VLAN ID of the remote AP DHCP server used if the controller is unavailable. This VLAN enables the DHCP server on the AP (also known as the remote AP DHCP server VLAN). If you enter the native VLAN ID, the DHCP server is unavailable.

Remote-AP DHCP Server Id

IP address used as the DHCP server identifier.

Remote-AP DHCP Default Router

IP address for the default DHCP router.

Remote-AP DHCP DNS Server IP address of the DNS server.

Remote-AP DHCP Pool Start

Configures a DHCP pool for remote APs. This is the first IP address of the DHCP pool.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 608

Parameter Remote-AP DHCP Pool End

Description
Configures a DHCP pool for remote APs. This is the last IP address of the DHCP pool.

Remote-AP DHCP Pool Netmask

Configures a DHCP pool for remote APs. This is the netmask used for the DHCP pool.

Remote-AP DHCP Lease Time

The amount of days that the assigned IP address is valid for the client. Specify the lease in <days>. A value of 0 indicates the IP address is always valid; the lease does not expire.

Remote-AP uplink total bandwidth

This is the total reserved uplink bandwidth (in Kilobits per second).

Remote-AP bw reservation 1 Remote-AP bw reservation 2 Remote-AP bw reservation 3

Session ACLs with uplink bandwidth reservation in kilobits per second. You can specify up to three session ACLs to reserve uplink bandwidth. The sum of the three uplink bandwidths should not exceed the RemoteAP uplink total bandwidth .

Remote-AP Local Network Access

Enable or disable local network access across VLANs in a Remote-AP.

Advanced AP System Profile Settings

Bootstrap threshold

Number of consecutive missed heartbeats on a GRE tunnel (heartbeats are sent once per second on each tunnel) before an AP rebootstraps. On the controller, the GRE tunnel timeout is 1.5 x bootstrap-threshold; the tunnel is torn down after this number of seconds of inactivity on the tunnel. The supported range is 1-65535, and the default value is 8.

Double Encrypt

This parameter applies only to remote APs. Use double encryption for traffic to and from a wireless client that is connected to a tunneled SSID.
When enabled, all traffic is re-encrypted in the IPsec tunnel. When disabled, the wireless frame is only encapsulated inside the IPsec tunnel.
All other types of data traffic between the controller and the AP (wired traffic and traffic from a split-tunneled SSID) are always encrypted in the IPsec tunnel.

Dump Server

(For debugging purposes.) Specifies the server to receive a core dump generated when an AP process crashes.

Heartbeat DSCP

Assign a DSCP value to AP heartbeats to prioritize heartbeats traveling over low-speed links. The supported range is 0-63, and the default value is 0. For more information, see Prioritizing AP heartbeats on page 611.

Maintenance Mode

Enable or disable AP maintenance mode.
This setting is useful when deploying, maintaining, or upgrading the network.

609 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter Number of IPSEC retries Maximum Request Retries Request Retry Interval Root AP AeroScout RTLS Server
RTLS Server configuration
Telnet Spanning Tree

Description
If enabled, APs stop flooding unnecessary traps and syslog messages to network management systems or network operations centers when deploying, maintaining, or upgrading the network. The controller still generates debug syslog messages if debug logging is enabled.
Number of times the AP will try to create an IPsec tunnel with the master controller before the AP will reboot. If you specify a value of 0, and AP will not reboot if it cannot create the IPsec tunnel. The supported range of values is 0-1000 retries, and the default value is 85 retries.
Maximum number of times to retry AP-generated requests, including keepalive messages. After the maximum number of retries, the AP either tries the IP address specified by the bkup-lms-ip (if configured) or reboots.
Interval, in seconds, between the first and second retries of APgenerated requests. If the configured interval is less than 30 seconds, the interval for subsequent retries is increased up to 30 seconds.
Defines a remote AP as the root AP in a branch network with a multi-AP hierarchy.
Enables the AP to send AeroScout tag information to an RTLS server. You must specify the IP address or DNS server and port number of the server to which location reports are sent.
RTLS station reporting includes information for APs and the clients that the AP has detected. If you select the Include Unassociated Stations option, the station reports will also include information about clients not associated to any AP. By default, unassociated clients are not included in station reports.
Enables the AP to send RFID tag information to an RTLS server. You must specify the IP address or DNS server and port number of the server to which location reports are sent, a shared secret key, and the frequency at which packets are sent to the server.
RTLS station reporting includes information for APs and the clients that the AP has detected. If you select the Include Unassociated Stations option, the station reports will also include information about clients not associated to any AP. By default, unassociated clients are not included in station reports. For more information on configuring RTLS server configuration, see Optional AP Configuration Settings on page 584.
Select this checkbox to enable telnet to the AP.
Select this checkbox to enable the Spanning Tree protocol.

To configure the bootstrap threshold using the command-line interface, access the CLI in config mode and issue the following command:
ap system-profile <profile> bootstrap-threshold 30

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 610

Prioritizing AP heartbeats
If the AP heartbeat or keep alive packets sent between the APs and controller are not received during the defined interval, the APs may reboot, causing clients to re-associate. If a high-latency or low-speed link prevents AP heartbeats from being sent and received correctly, you can assign a DSCP value to AP heartbeats to prioritize the heartbeats. To prioritize AP heartbeats using the WebUI: 1. Navigate to the Configuration > Wireless > AP Configuration page. 2. Select either the AP Group or AP Specific tab. Click Edit for the AP group or AP name. 3. Under Profiles, select AP, then AP system profile. The configuration settings are displayed in Profile
Details. 4. Under Profile Details:
a. In the Heartbeat DSCP field, enter a value greater than zero. b. Click Apply. To prioritize AP heartbeats using the command-line interface, access the CLI in config mode and issue the following command: ap system-profile <profile>
heartbeat-dscp <number>
Use the following commands: show ap config {ap-group <name>|ap-name <name>|essid <name>} show ap debug system-status {ap-name <name>|bssid <name>| ip-addr <ipaddr>}
On the local controller, you can also view maintenance mode status using the following commands: show ap active {ap-name <name>|essid <name>|ip-addr <ipaddr>} show ap database show ap details {ap-name <name>|bssid <name>|ip-addr <ipaddr>}
AP Scanning Optimization
The scanning algorithm is enhanced to reduce the delay between visits to some channel types, by changing their scan priority.
Channel Types and Priority
A channel can belong to one or more channel types, depending on regulatory information and the activity that is detected on the channel. The frequency of visits to a channel depends on the priority of the channel type(s) to which it belongs. The following table describes the priority of channel types.

611 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 123: Channel Types and Priority Channel Priority Channel Type

One

DOS Channels

Two

Active Channels

Three

Reg-Domain Channels

Four

All Reg-Domain Channels

Five

Unconventional Scan

Channels

Six

Rare Channels

Description
Channels where the AP is actively containing one more rogue devices in AM mode are marked with an O flag in the ARM CLI output (show ap arm scan-times).
Channels where AP or Station activity has already been detected are marked with an A flag in the ARM CLI output and are visited in all scan-modes.
Channels that are in the AP's regulatory domain are marked with a C flag in the ARM CLI output and are visited in all scan modes.
Channels that belong to any country's regulatory domain are marked with a D flag in the ARM CLI output and are visited only if the scan-mode is set to All-Reg or Rare.
This new channel type category contains channels that belong to any country's regulatory domain, but with an unconventional scan direction. These channels are marked with a J or M flag in the ARM CLI output and are visited only if scan-mode is set to All-Reg or Rare.
Channels that do not belong to any country's regulatory domain are marked with a Z flag in the ARM CLI output. Rare channel scanning is done in the AM mode only if the rare scan mode is selected in the AM Scanning profile.

The country code in the AP Regulatory Domain profile determines supported channel and channel pairs for that specific AP. If there is a change in the country code, the valid channel list is reset to the default value for that country.
In the CLI
The show ap arm scan-times ap-name <ap_name> command is used to show scan state and flags for each channel. (host)(config) #show ap arm scan-times ap-name <ap-name>
Scanning Optimizations
The following optimizations are introduced in ArubaOS 6.4.3, to enable the AP to achieve optimum RF monitoring. Unconventional Scans and Relative Priority of Channel Type Categories optimization apply to all AP types, but Channel Group Scanning optimization applies only to W-AP200 Series models. All optimizations apply to AP and AM mode scanning.
Unconventional (direction) Scans
l Unconventional scans are 40MHz scans of a channel in the direction away from the channel pair. For example, in the 44-48 channel pair: n Conventional scans will be 44+ and 48n Unconventional scans will be 44- and 48+

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 612

l Unconventional scans are no longer interspersed with conventional scans. Unconventional scans operate with a lower frequency, because they belong to a new low priority channel type.
l Unconventional scans are performed in all-regulatory and rare scan modes. But these scans will not be performed if the scan mode is set to regulatory domain. This modification enables the AP to scan through active channels, regulatory channels, and all-regulatory channels faster.
Currently, W-AP200 Series access points do not support unconventional or rare channel scanning.
Modifications in Scan Frequency
A modification is introduced to increase the frequency of visits to active and regulatory domain channels. Channel type categories are: l DOS l Active l Regulatory domain l All-regulatory domain l Unconventional or rare
Unconventional or rare channels are merged for scanning.
Channel Group Scanning
Since a 11ac AP radio can hear frames sub-channels when it performs an 80MHz wide scan, scanning can be optimized by categorizing channels into scan groups, which are visited sequentially when a new primary channel is selected. This allows the AP scan through the list of channels faster, so that the delay between visits to channels in a group is reduced. For more information on Channel Group Scanning, see Channel Group Scanning on page 613
Channel Group Scanning
The following section describes channel group scanning: l Channel groups can be 80MHz (4 channels), 40MHz (2 channels), or 20MHz wide (1 channel). l Each channel is mapped to a group depending on the maximum width supported by that channel and the
radio's capability. The maximum width supported by a channel is determined by the channel's membership in regulatory domain channel pairs or groups. n Channel 36, 40, 44, and 48 belong to 80MHz group n Channel 165 belongs to 20MHz group l Channel groups are visited sequentially and the primary channel is rotated after each visit. l Group scanning behavior is performed for W-AP200 Series access points on A-band channels.
Scanning only once in each 80MHz wide group allows the AP to scan through the channel list faster and also hear frames on sub-channels.

Configuring AP Channel Assignments
The country code in the AP Regulatory Domain profile determines supported channel and channel pairs for that specific AP. Any changes to the country code causes the valid channel lists to be reset to the defaults for

613 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

the country.
The example in this section illustrates how to perform the following tasks for an AP group:
1. Configure the "default" regulatory domain profile to use a valid country code. (In this example, the country code US.) This will determine the available channels.
2. Configure a 40 MHz channel (bonded pair) for the AP group's 802.11a (5 GHz) radio profile. 3. Configure a 20 MHz channel for the AP group's 802.11g (2.4 GHz) radio profile.
This example uses default ARM profile settings and the recommended high-throughput channel assignments for the 802.11a and 802.11b/g bands. If you want the channel assignments to utilize high-throughput, ensure that highthroughput is enabled within the radio profile. For details, see 802.11a and 802.11g RF Management Profiles on page 593.
Using the WebUI
1. Navigate to Configuration > Wireless > AP Configuration > AP Group page. 2. Click the Edit button by the name of the AP group to which you want to assign specific channels. 3. In the Profiles list, expand the AP menu to display the AP profiles used by the AP group. 4. Select the Regulatory Domain profile named default. 5. Click the Country Code drop-down menu and select the US-United States domain if it is not already
selected. The Regulatory Domain's country code determines which channels are selected in the following fields: l Valid 802.11g channel l Valid 802.11a channel l Valid 802.11g 40MHz channel pair l Valid 802.11a 40MHz channel pair If none of the channels supported by the AP have received regulatory approval by the country whose country code you selected, the AP will revert to Air Monitor mode. 6. In the Valid 802.11a 80MHz channel group field, define which 80MHz channels on the 802.11a band are available for assignment by ARM and for the controller to randomly assign if user has not specified a channel. The channel numbers below correspond to channel center frequency. l Possible choices in US: 42, 58, 106, 122, 138, 155 l Possible choices in EU: 42, 58, 106, 122 l Possible choices in JP: 42, 58, 106, 122 l Possible global choices: 42, 58, 106, 122, 138, 155 7. Click Apply. 8. Under the Profiles list, expand the RF Management menu. 9. Select the 802.11a radio profile used by the AP group 10.Enter 36 in the Channel text field and select the Above radio button. In this instance, channel 36 becomes the primary channel and the secondary channel is 40. 11.Click Apply. 12.Under the Profiles list select the 802.11g radio profile used by the AP group. 13.Enter 1 in the Channel text field and select None. In this instance, channel 1 is the assigned 20 MHz channel and 40 MHz mode is disabled. 14.Click Apply.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 614

Using the CLI
Country codes are generally specified in ISO 3166 format. To see what channels are available for a given country code, use the show ap allowed-channels <country-code> command can be used.
ap regulatory-domain-profile default country-code US
rf dot11a-radio-profile ht-corpnet-a channel 36+
rf dot11g-radio-profile ht-corpnet-g channel 1
Country codes are generally specified in ISO 3166 format. To see what channels are available for a given country code, use the show ap allowed-channels country-code <country-code> command.
Channel Switch Announcement (CSA)
When an AP changes its channel, an existing wireless clients may "time out" while waiting to receive a new beacon from the AP; the client must begin scanning to discover the new channel on which the AP is operating. If the disruption is long enough, the client may need to reassociate, reauthenticate, and request an IP address. Channel Switch Announcement (CSA), as defined by IEEE 802.11h, enables an AP to announce that it is switching to a new channel before it begins transmitting on that channel. This allows the clients, who support CSA, to transition to the new channel with minimal downtime. When CSA is enabled, the AP does not change to a new channel immediately. Instead, it sends a number of beacons (the default is 4) which contain the CSA announcement before it switches to the new channel. You can configure the number of announcements sent before the change.
Clients must support CSA in order to track the channel change without experiencing disruption.
Using the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration page. 2. Select either the AP Group or AP Specific tab. Click Edit for the AP group or AP name. 3. Select RF Management in the Profile list. 4. Select the 802.11a or 802.11g radio profile. 5. Select Enable CSA. You can configure a different value for CSA Count. 6. Click Apply.
Using the CLI
rf radio-profile <profile> csa csa-count <number>
Automatic Channel and Transmit Power Selection
To allow automatic channel and transmit power selection based on the radio environment, enable Adaptive Radio Management (ARM). Note that ARM assignments will override the static channel and power configurations done using the radio profile. For complete information on the Adaptive Radio Management feature, refer to Adaptive Radio Management on page 510.

615 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Managing AP Console Settings
An AP's provisioning parameters are unique to each AP. These parameters are initially configured on the controller and then pushed out to the AP and stored on the AP itself. Best practices are to configure an AP's provisioning settings using the controller WebUI. If you find it necessary to alter an AP's provisioning settings for troubleshooting purposes, you can do so using the controller WebUI and CLI, or alternatively, through a console connection to the AP itself.
To create a console connection to the AP:
1. Connect a local console to the serial port on the AP. You can connect the AP's serial port to a terminal or terminal server using an Ethernet cable, or connect the serial console port to a DB-9 adapter, then connect the adapter to a laptop using an RS-232 cable. For details on connecting to an AP's serial console port, refer to the Installation Guide included with the AP.
2. Establish a console communication to the AP, then power-cycle the AP to reboot it.
3. To access the AP console command prompt, press Enter when the AP displays the message "Hit <Enter> to stop autoboot." If the autoboot countdown expires before you can interrupt it, turn the device off and then back on.
4. Once the AP boot prompt appears, you can issue any of the AP provisioning commands described in the Table 124. Remember, though these commands may be useful for troubleshooting, they are all optional and are not necessary for normal AP provisioning.

Table 124: AP Console Commands

Command

Description

setenv ipaddr <ipaddr>

IP address to be assigned to the AP.

setenv netmask <netmaskip> Netmask to be assigned to the AP.

setenv gatewayip <ipaddr> IP address of the internet gateway used by the AP.

setenv name <ap name>

Name of the AP.

setenv group <group name> Name of the AP group to which the AP should belong.

setenv master <ipaddr>

IP address of the AP's master controller.

setenv serverip <ipaddr>

IP address of the TFTP server from which the AP can download its boot image.

setenv dnsip <ipaddr>

IP address of the DNS server used by the AP.

setenv domainname <domain> Domain name used by the AP.

5. When you are finished, type Save and then press Enter to save your settings
Other AP console commands may be available when accessing an AP directly through its console port, but these commands can cause configuration errors if used improperly and should only be issued under the direct supervision of Dell technical support.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 616

The example below configures an AP location and domain name using an AP console connection: Hit <Enter> to stop autoboot: 0 apboot> <INTERRUPT> apboot> setenv group corporate 2 apboot> setenv domainname mycompany.com apboot> save apboot>reboot To view current AP settings using the AP console, issue the command printenv <name> where <name> is one of the variable names listed in Table 124, such as ipaddr, dnsip or gatewayip. apboot> printenv domainname domainname=mycompany.com
Username and Password Protection
The ArubaOS AP console username and password feature helps protect systems that manage highly sensitive information, like financial and banking institutions, by requiring users to log in to the AP network with a username and password.
Setting a Console/Telnet Username and Password
Under the default configuration, consoles do not have passwords. To protect your network, set a username and password while the AP is in enabled mode. The timeout feature is also supported as an added level of security. If there is no user input or activity during one timeout interval (default of 30 minutes), the user is logged out of the system. The timeout interval cannot be modified. Passwords must be 6 to 32 characters in length, and can include alphanumeric and special characters.
In the WebUI To set a username/password in the WebUI: 1. Navigate to Configuration > Advanced Services > All Profiles. 2. Expand the AP tab, then click on AP System. 3. Under the AP System list, select the AP system you want to modify. 4. Click on the Advanced tab, then scroll down to Shell Password. 5. Enter the desired password into the password field. Retype the password to confirm. 6. Before saving your changes, make sure the Console Enable checkbox is marked.
Once the console is enabled, you do not need to enable it again. The console is disabled under default configuration.
7. Click Apply to save your new password. 8. Click Save Configuration at the top of the page to save your changes.
In the CLI To set a username/password in the CLI: (host) (config) #ap system-profile <profile> (host) (AP system profile "<profile>") #console-enable (host) (AP system profile "<profile>") #shell-passwd <password> If the password is lost, and the AP is not connected to a controller, the console can be reset using the reset button or APboot command (factory_reset). If it has already connected to a controller, the AP password can be changed under the Shell Password field of the AP System profile in the WebUI, or using the shell-passwd command in the CLI.

617 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Disabling Access to the AP Console
Another way to protect your AP system is to completely disable access to the AP console under enabled mode.
In the WebUI To disable access to the console in the WebUI:
1. Navigate to Configuration > Advanced Services > All Profiles. 2. Expand the AP tab, then click on AP System. 3. Under the AP System list, select the AP system you want to modify. 4. Click on the Advanced tab, then scroll down to Console Enable. 5. Clear the Console Enable check box. 6. Click Apply, then Save Configuration to save your changes.
In the CLI To disable access to the console in the CLI: (host) (config) #ap system profile default (host) (AP system profile "default") #no console-enable
Link Aggregation Support on W-AP220 Series and W-AP270 Series
W-AP220 Series and W-AP270 Series access points support link aggregation using either standard port-channel (configuration based) or Link Aggregation Control Protocol (protocol signaling based). These access points can optionally be deployed with LACP configuration to benefit from the higher (greater than 1 Gbps) aggregate throughput capabilities of the two radios.
The controller uses two different IP addresses for different GRE tunnels between the AP and the controller. One IP address is used for tunnels to virtual APs using a 5G radio, while a second controllerIP address is used for tunnels corresponding to virtual APs using a 2.4G radio. The IP addresses should be selected to ensure a different physical interface is used by the load-balancing algorithm on the Ethernet switch. This will allow the W-AP225 and W-AP270 Seriesto achieve greater than 1Gbps throughput in both upstream and downstream directions.
ArubaOS 6.4.2.0 introduces a local AP LACP LMS map information profile that maps a LMS IP address to a GRE striping IP address. If the AP fails over to a standby or backup controller, the AP LACP LMS map information profile on the new controller defines the IP address that AP uses to terminate 802.11g radio tunnels on the new controller. This feature allows W-AP220 Series or W-AP270 Series access points to form a 802.11g radio tunnel to a backup controller the event of a controller failover, even if the backup controller is in a different L3 network.
In previous releases, the GRE striping IP address was defined in the global AP system profile, which did not allow APs to maintain GRE striping tunnels if the AP failed over to a backup controller in a different L3 network.
If your topology includes a backup controller you must define GRE striping IP settings in the active and the backup controller. For more information on LACP features in ArubaOS, see Configuring LACP on page 226.
Configuring LACP
To enable and configure LACP on W-AP220 Series and W-AP270 Series access points, configure the LMS IP address and the GRE Striping IP address. In ArubaOS 6.4.2 and later, the GRE striping parameter is configured in the AP LACP Striping profile. In ArubaOS 6.3.1.0 to 6.4.1.x, GRE striping is configured in the AP System profile. The GRE Striping IP value must be an IPv4 address owned by the controller that has the specified

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 618

LMS IP. The GRE Striping IP does not belong to any physical or virtual interface on the controller, but the controller can transmit or receive packets using this IP.
You can configure LACP features using the WebUI or the CLI. The procedure varies, depending upon the version of ArubaOS running on your controller.
Using the WebUI, in ArubaOS 6.4.2.x and later
Follow the procedure to configure the LACP parameters in the AP System profile and AP LACP LMS map information profile:
1. Access the active controller and navigate to the Configuration > Advanced Services > All Profiles page. 2. Expand the AP profiles menu in the Profiles pane. 3. Expand the AP System profiles menu, and select the AP system profile you want to modify. 4. Select the Basic tab on the Profile Details pane, locate the LMS Settings section and specify a unique
IPv4 address in the LMS IP field. 5. In the Profiles pane, select the AP LACP LMS map information profile. 6. In the Profile Details pane, select AP LACP Striping IP to enable the AP LACP striping feature. 7. Enter a GRE striping IP address in the IP field. 8. Enter a LMS IP address in the LMS field. 9. Click Add. 10.Click Apply.
Using the CLI, in ArubaOS 6.4.2.x and later
Execute the following commands to configure LACP and AP LACP LMS map information settings. (host) (config) #ap system-profile LACP (host) (AP system profile "LACP") #lms-ip 192.0.2.1 (host) (AP system profile "LACP") #exit (host) (config) #ap-lacp-striping-ip (host) (AP LACP LMS map information) #striping-ip 192.0.2.2 lms 192.0.2.1 (host) (AP LACP LMS map information) #aplacp-enable
Using the WebUI in ArubaOS 6.3.1.x-6.4.1.x
Follow the procedure to configure the LACP parameters in AP System profile:
1. Navigate to the Configuration > Advanced Services > All Profiles page. 2. Expand the AP profiles menu in the Profiles pane 3. Expand the AP System profiles menu, and select the AP system profile you want to modify. 4. In the Profile Details pane, select the Basic tab, locate the LMS Settings section and a specify a unique
IPv4 address in the LMS IP field. 5. Click Apply.
Using the CLI in ArubaOS 6.3.1.x-6.4.1.x
Execute the following commands to configure the LACP parameters (LMS IP and the GRE striping IP) on an AP system profile. (host) (config) #ap system-profile LACP (host) (AP system profile "LACP") #lms-ip 192.0.2.1 (host) (AP system profile "LACP") #gre-striping-ip 192.0.2.2

619 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Important Points to Remember
l In the upstream direction when the AP transmits GRE frames to the controller, the bonding driver must be in active-active mode and not in the default active-standby mode to allow link aggregation.
l The W-AP220 Series and W-AP270 Series APs detect the LACP frames and auto-configures itself to LACP mode. If gre-striping-ip is not configured, then the AP goes back to the active-standby mode. The AP link may go down in this scenario depending on the behavior of the upstream switch.
l Ensure that the gre-striping-ip is unique and not used by any other host on the subnet. l LACP support is limited to a use case where Enet0 and Enet1 ports of the AP are connected to a switch, and
LACP is enabled on the two corresponding switch ports. l The port priority is not applicable to the AP as both ports need to be used. This value is always set to the
maximum numerical priority (0xFF), which is the lowest priority. l The system priority is not configurable. It is set to the maximum numerical value (0xFFFF), which is the
lowest priority. This leaves control of the aggregate to the upstream switch. l The timeout value is not configurable. l The key is not configurable and the default key value is 1. l LACP cannot be enabled if wired AP functionality is enabled on the second port. You cannot enable LACP if
the Enet 1 port is shutdown.
Troubleshooting Link Aggregation
The following show commands in the CLI can be used to troubleshoot Link Aggregation on W-AP220 Series and W-AP270 Series APs:
l show ap debug lacp ap-name <ap-name>--Using this command, you can view if LACP is active on an AP. It displays the number of GRE packets sent and received on the two Ethernet ports.
l show ap database--TStarting with ArubaOS 6.4.2, the output of this command includes an LACP Striping flag (s) to indicate of the AP is configured with a LACP striping IP address,
l show datapath tunnel--Using this command, you can verify if the 2.4GHz tunnels are anchored on the gre-striping-ip (The GRE IDs for these tunnels are in a range between 0x8300 and 0x83F0)
l show datapath user--Using this command, you can verify if the gre-striping-ip has an entry with the `L' (local) flag
l show datapath route-cache--Using this command, you can verify if the gre-striping-ip has an entry with the controller MAC.
Service Tag
A service tag is a unique seven digit alphanumeric string that is used to electronically identify a Dell device. It is similar to a serial number identifier. Starting with ArubaOS 6.4.2.0, you can view the service tag of some newer Dell APs from the controller WebUI or CLI. It is displayed along with the serial number in a device information listing.
In the WebUI
To view the service tag of an AP using the WebUI:
1. Navigate to Configuration > WIRELESS > AP Installation. 2. View the service tag of an AP in the AP Service Tag column of Provisioning tab.
In the CLI
Use the following commands to view the service tag of an AP using the CLI:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Access Points | 620

(host) #show ap database long (host) #show ap details ap-name <ap-name> (host) #show provisioning-ap-list
Use the following commands to rename, regroup, or reprovision an AP with a service tag using the CLI:
(host) #ap-rename service-tag <service-tag> (host) #ap-regroup service-tag <service-tag> (host) (config) #provision-ap (host) (AP provisioning) #reprovision service-tag <service-tag>

621 | Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Chapter 23 Secure Enterprise Mesh

The secure enterprise mesh solution is an effective way to expand network coverage for outdoor and indoor enterprise environments without any wires. Using mesh, you can bridge multiple Ethernet LANs or you can extend your wireless coverage. As traffic traverses across mesh APs, the mesh network automatically reconfigures around broken or blocked paths. This self-healing feature provides increased reliability and redundancy: the network continues to operate if an AP stops functioning or a connection fails. Dell controllers provide centralized configuration and management for APs in a mesh environment; local mesh APs provide encryption and traffic forwarding for mesh links.
Mesh Overview Information
The following topics in this chapter describes the components of the Dell secure enterprise mesh architecture and profiles, as well as factors that should be taken into consideration when planning your mesh deployment. l Understanding Mesh Access Points on page 622 l Understanding Mesh Links on page 624 l Understanding Mesh Profiles on page 626 l Understanding Remote Mesh Portals (RMPs) on page 630 l Mesh Deployment Planning on page 635 l Mesh Deployment Solutions on page 632 l Mesh Deployment Planning on page 635
Mesh Configuration Procedures
The following topics describe the procedures required to configure your secure enterprise mesh solution: 1. Creating and Editing Mesh Radio Profiles on page 641 2. Creating and Editing Mesh Radio Profiles on page 641 3. Creating and Editing Mesh High-Throughput SSID Profiles on page 646 4. Configuring Ethernet Ports for Mesh on page 652 5. Provisioning Mesh Nodes on page 655 6. Verifying Your Mesh Network on page 657
Dell strongly recommends staging mesh APs before deploying them. Identify the physical location of the APs, configure them for mesh, provision the APs and verify connectivity before physically deploying them in a live network.
If you are configuring an AP as both a remote access point and a mesh portal, see also Configuring Remote Mesh Portals (RMPs) on page 659
Understanding Mesh Access Points
Mesh APs learn about their environment when they boot up. Mesh APs are either configured as a mesh portal (MPP), an AP that uses its wired interface to reach the controller, or a mesh point (MP), an AP that establishes an all-wireless path to the mesh portal. Mesh APs locate and associate with their nearest neighbor, which

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Secure Enterprise Mesh | 622

provides the best path to the mesh portal. Mesh portals and mesh points are also known as mesh nodes, a generic term used to describe APs configured for mesh.
A mesh radio's bandwidth can be shared between mesh-backhaul traffic and client traffic. You can, however, configure a radio for mesh services only. If you have a dual-radio AP, a mesh node can be configured to deliver client services on one radio, and both mesh and WLAN services to clients on the other. If you configure a singleradio AP to deliver mesh services only (by disabling the mesh radio in its 802.11a or 802.11g radio profile) that mesh node can not deliver WLAN services to its clients.
For mesh and traditional thin AP deployments, the Dell controller provides centralized provisioning, configuration, policy definition, ongoing network management, and wireless and security services. However, unlike the traditional thin AP case, mesh nodes also perform network traffic encryption and decryption, and packet forwarding over wired and wireless links.
You configure the AP for mesh on the controller using either the WebUI or the CLI. All mesh related configuration parameters are grouped into mesh profiles that you can apply as needed to an AP group or to individual APs.
APs operate as thin APs by default; their primary function is to receive and transmit electromagnetic signals; other WLAN processing is left to the controller. When planning a mesh network, you manually configure APs to operate in mesh portal or mesh point roles. Unlike a traditional WLAN environment, local mesh nodes provide encryption and traffic forwarding for mesh links in a mesh environment. Virtual APs are still applied to nonmesh radios.
Provisioning mesh APs is similar to thin APs; however, there are some key differences. Thin APs establish a channel to the controller from which they receive the configuration for each radio interface. Mesh nodes, in contrast, get their radio interfaces up and running before making contact with the controller. This requires a minimum set of parameters from the AP group and mesh cluster so the mesh node discovers a neighbor, and creates a mesh link and subsequent channel with the controller. To do this, you must first define and configure the mesh cluster profile before configuring an AP to operate as a mesh node. This chapter first describes how to configure the mesh profile, then describes how to configure APs to operate in mesh mode. If you have already configured a complete mesh profile, continue to "Ethernet Ports for Mesh" or "Provisioning Mesh Nodes".
Mesh Portals
The mesh portal (MPP) is the gateway between the wireless mesh network and the enterprise wired LAN. You configure a Dell AP to perform the mesh portal role, which uses its wired interface to establish a link to the wired LAN. You can deploy multiple mesh portals to support redundant mesh paths (mesh links between neighboring mesh points that establish the best path to the mesh portal) from the wireless mesh network to the wired LAN.
The mesh portal broadcasts the configured mesh service set identifier (MSSID/mesh cluster name), and advertises the mesh network service to available mesh points. Neighboring mesh points that have been provisioned with the same MSSID authenticate to the portal and establish a secure mesh link over which traffic is forwarded. The authentication process requires secure key negotiation, common to all APs, and the mesh link is established and secured using Advanced Encryption Standard (AES) encryption. Mesh portals also propagate channel information, including CSAs.
Mesh Points
The mesh point (MP) is a Dell AP configured for mesh and assigned the mesh point role. Depending on the AP model, configuration parameters, and how it was provisioned, the mesh point can perform multiple tasks. The mesh point provides traditional Dell WLAN services (such as client connectivity, intrusion detection system (IDS) capabilities, user role association, LAN-to-LAN bridging, and Quality of Service (QoS) for LAN-to-mesh communication) to clients and performs mesh backhaul/network connectivity. A mesh radio can be configured

623 | Secure Enterprise Mesh

Dell Networking W-Series ArubaOS 6.4.x | User Guide

to carry mesh-backhaul traffic only. Additionally, a mesh point can provide LAN-to-LAN Ethernet bridging by sending tagged/untagged VLAN traffic across a mesh backhaul/network to a mesh portal.
Mesh points use one of their wireless interfaces to carry traffic and reach the controller. Mesh points are also aware of potential neighbors, and can form new mesh links if the current mesh link is no longer preferred or available.
Mesh Clusters
Mesh clusters are similar to an Extended-Service Set (ESS) in a WLAN infrastructure. A mesh cluster is a logical set of mesh nodes that share the common connection and security parameters required to create mesh links. Mesh clusters are grouped and defined by a mesh cluster profile, as described in "Mesh Cluster Profile".
Mesh clusters may enforce predictability in mesh networking by limiting the amount of concurrent mesh points, hop counts, and bandwidth used in the mesh network. A mesh cluster can have multiple mesh portals and mesh points that facilitate wireless communication between wired LANs. Mesh portals in a mesh cluster do not need to be on the same VLAN. Figure 73 shows two mesh clusters and their relationship to the controller.
Figure 73 Sample Mesh Clusters

Understanding Mesh Links
The mesh link is the data link between a mesh point and its parent. A mesh point uses the parameters defined in the mesh cluster profile, to establish a mesh link with a neighboring mesh point. The mesh link uses a series of metrics to establish the best path to the mesh portal.
Throughout the rest of this chapter, the term "uplink" is used to distinguish the active association between a mesh point and its parent.
The following list describes how mesh links are created: l Creating the initial mesh link
When creating the initial mesh link, mesh points look for others advertising the same MSSID as the one contained in its mesh cluster profile. The mesh point scans the channels in its provisioned band of operation to identify a list of neighbors that match its mesh cluster profile. The mesh point then selects the from highest priority neighbors based on the least expected path cost.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Secure Enterprise Mesh | 624

If no provisioned mesh cluster profile is available, mesh points use the recovery profile to establish an uplink. If multiple cluster profiles are configured, mesh points search, in order of priority, their list of provisioned backup mesh cluster profiles to establish an uplink. If the configured profiles are unavailable after searching for 5 minutes, the recovery profile is used. l Moving to a better mesh link If the existing uplink quality degrades below the configured threshold, and a lower cost or more preferable uplink is available on the same channel and cluster, the mesh point reselects that link without re-scanning. In some cases, this invalidates all of the entries that have this mesh point as a next hop to the destination and triggers new learning of the bridge tables. l Using a new mesh link if the current mesh link goes down If an uplink goes down, the affected mesh nodes reestablish a connection with the mesh portal by rescanning to choose a new path to the mesh portal. If a mesh portal goes down, and a redundant mesh portal is available, the affected mesh nodes update their forwarding tables to reflect the path to the new mesh portal.
Link Metrics
Mesh points use the configured algorithm to compute a metric value, or "path cost," for each potential uplink and select the one with the lowest value as the optimal path to the mesh portal.Table 125 describes the components that make up the metric value: node cost, hop count, link cost and 802.11 capacity.
The link metrics indicate the relative cost of a path to the mesh portal. The best path (lowest metric value) is used to create the uplink.

Table 125: Mesh Link Metric Computation Component Description

Node cost

Indicates the amount of traffic expected to traverse the mesh node. The more traffic, the higher the node cost. When establishing a mesh link, nodes with less traffic take precedence. The node cost is dependent on the number of children a mesh node supports. It can change as the mesh network topology changes, for example if new children are added to the network or old children disconnect from the network.

Hop count

Indicates the number of hops it takes the mesh node to get to the mesh portal. The mesh portal advertises a hop count of 0, while all other mesh nodes advertise a cumulative count based on the parent mesh node.

Link cost

Represents the quality of the link to an active neighbor. The higher the Received Signal Strength Indication (RSSI), the better the path to the neighbor and the mesh portal. If the RSSI value is below the configured threshold, the link cost is penalized to filter marginal links. A less direct, higher quality link may be preferred over the marginal link.
The following factors also affect mesh link metrics:
l High-throughput APs add a high cost penalty for links to non-high-throughput APs.
l Multi-stream high-through APs add proportional cost penalties for links to highthroughput APs that support fewer streams.

625 | Secure Enterprise Mesh

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Component Description

802.11 capacity

High-throughput APs can send 802.11 information elements (IEs) in their management frames, allowing high-throughput mesh nodes to identify other mesh nodes with a highthroughput capacity. High-throughput mesh points prefer to select other 802.11-capable mesh points in their path to the mesh portal, but can use a legacy path if no highthroughput path is available.

Path Cost

Path cost is calculated by analyzing the other components in this table, and adding the link cost, the mesh parent's path cost, and the parent's node cost.
Mesh portals typically advertise a path-cost of zero, but high-throughput portals add an offset penalty if they are connected to a 10/100mbps port that is too slow for the highthroughput link capacity.

Optimizing Links
You can configure and optimize operation of the link metric algorithm via the mesh radio profile. These configurable mesh link trigger thresholds can determine when the uplink or mesh path is dropped and another is chosen, provide enhanced network reliability, and contain flapping links. Although you can modify the behavior of the link metric algorithm, It is recommended to follow the default values for most deployments. For information, see Metric algorithm on page 643.
Understanding Mesh Profiles
Mesh profiles help define and bring-up the mesh network. The following sections describe the mesh cluster, mesh radio, and mesh recovery profiles in more detail.
The complete mesh profile consists of a mesh radio profile, RF management (802.11a and 802.11g) radio profiles, a high-throughput SSID profile (if your deployment includes 802.11n-capable APs), a mesh cluster profile, and a read-only recovery profile. The recovery profile is dynamically generated by the master controller; you do not explicitly configure the recovery profile.
Dell provides a "default" version of the mesh radio, RF management, high-throughput SSID and cluster profiles with default values for most parameters. You can use the "default" version of a profile or create a new instance of a profile which you can then edit as you need. You can change the values of any parameter in a profile. You have the flexibility of applying the "default" versions of profiles in addition to customizing profiles that are necessary for the AP or AP group to function.
If you assign a profile to an individual AP, the values in the profile override the profile assigned to the AP group to which the AP belongs. The exception is the mesh cluster profile: you can apply multiple mesh cluster profiles to individual APs, as well as to AP groups.
Mesh Cluster Profiles
Mesh clusters are grouped and defined by a mesh cluster profile, which provides the framework of the mesh network. Similar to virtual AP profiles, the mesh cluster profile contains the MSSID (mesh cluster name), authentication methods, security credentials, and cluster priority required for mesh nodes to associate with their neighbors and join the cluster. Associated mesh nodes store this information in flash memory. Although most mesh deployments require only a single mesh cluster profile, you can configure and apply multiple mesh cluster profiles to an AP group or an individual AP. If you have multiple cluster profiles, the mesh portal uses the profile with the highest priority to bring up the mesh network. Mesh points, in contrast, go through the list of mesh cluster profiles in order of priority to decide which profile to use to associate themselves with the network. The mesh cluster priority determines the order by which the mesh cluster profiles are used. This

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Secure Enterprise Mesh | 626

allows you, rather than the link metric algorithm, to explicitly segment the network by defining multiple cluster profiles.
Since the mesh cluster profile provides the framework of the mesh network, you must define and configure the mesh cluster profile before configuring an AP to operate as a mesh node. You can use either the default cluster profile or create your own. If you find it necessary to define more than one mesh cluster profile, you must assign priorities to each profile to allow the Mesh AP group to identify the primary and backup mesh cluster profile(s). The primary mesh cluster profile and each backup mesh cluster profile must be configured to use the same RF channel. The APs may not provision correctly if they are assigned to a backup mesh cluster profile with a different RF channel than the primary mesh cluster profile.
If the mesh cluster profile is unavailable, the mesh node can revert to the recovery profile to bring-up the mesh network until the cluster profile is available. You can also exclude one or more mesh cluster profiles from an individual access point, this prevents a mesh cluster profile defined at the AP group level from being applied to a specific AP.
Do not delete or modify mesh cluster profiles once you use them to provision mesh nodes. You can recover the mesh point if the original cluster profile is still available. It is recommended to create a new mesh cluster profile if needed. If you modify any mesh cluster setting, you must reprovision your AP for the changes to take effect (this also causes the AP to automatically reboot). See "Provisioning Mesh Nodes" for more information.
If you configure multiple cluster profiles with different cluster priorities, you manually override the link metric algorithm because the priority takes precedence over the path cost. In this scenario, the mesh portal uses the profile with the highest priority to bring-up the mesh network. The mesh portal stores and advertises that one profile to neighboring mesh nodes to build the mesh network. This profile is known as the "primary" cluster profile. Mesh points, in contrast, go through the list of configured mesh cluster profiles in order of priority to find the profile being advertised by the mesh portal. Once the primary profile has been identified, the other profiles are considered "backup" cluster profiles. Use this deployment if you want to enforce a particular mesh topology rather than allowing the link metric algorithm to determine the topology.
For this scenario, do the following:
l Configure multiple mesh cluster profiles with different priorities. The primary cluster profile has a lower priority number, which gives it a higher priority.
l Configure the mesh radio profile. l Create an AP group for 802.11a radios and 802.11g radios l Configure the 802.11a or 802.11g RF management profiles for each AP group. l If your deployment includes high-throughput APs, configure the mesh high-throughput SSID profile. The
mesh radio profile uses the default high-throughput SSID profile unless you specifically configure the mesh radio profile to use a different high-throughput SSID profile l Create an AP group for each 802.11a channel.
If a mesh link breaks or the primary cluster profile is unavailable, mesh nodes use the highest priority backup cluster profile to re-establish the uplink or check for parents in the backup profiles. If these profiles are unavailable, the mesh node can revert to the recovery profile to bring up the mesh network until a cluster profile is available. For information about the procedure to configure a mesh cluster profile, see Configuring Mesh Cluster Profiles on page 636
Mesh Radio Profiles
The mesh radio profile allows you to specify the set of rates used to transmit data on the mesh link. This profile also allows you to define a reselection-mode setting to optimize the operation of the link metric algorithm. The reselection mode specifies the method a mesh node uses to find a better uplink to create a path to the mesh portal. Only neighbors on the same channel in the same mesh cluster are considered.
The mesh radio profile includes the following reselection mode options:

627 | Secure Enterprise Mesh

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l reselect-anytime: mesh points using the reselect-anytime reselection mode perform a single topology readjustment scan within 9 minutes of startup and 4 minutes after a link is formed. If no better parent is found, the mesh point returns to its original parent. This initial scan evaluates more distant mesh points before closer mesh points, and incurs a dropout of 5­8 seconds for each mesh point. After the initial startup scan is completed, connected mesh nodes evaluate mesh links every 30 seconds. If a mesh node finds a better uplink, the mesh node connects to the new parent to create an improved path to the mesh portal.
l reselect-never: connected mesh nodes do not evaluate other mesh links to create an improved path to the mesh portal.
l startup-subthreshold: mesh points using the startup-subthreshold reselection mode perform a single topology readjustment scan within 9 minutes of startup and 4 minutes after a link is formed. If no better parent is found, the mesh point returns to its original parent. This initial startup scan evaluates more distant mesh points before closer mesh points, and incurs a dropout of 5­8 seconds for each mesh point. After that time, each mesh node evaluates alternative links if the existing uplink falls below the configured threshold level (the link becomes a sub-threshold link). It is recommended to use this default startupsubthreshold value.
l subthreshold-only: connected mesh nodes evaluate alternative links only if the existing uplink becomes a sub-threshold link.
If a mesh point using the startup-subthreshold or subthreshold-only mode reselects a more distant parent because its original, closer parent falls below the acceptable threshold, then as long as that mesh point is connected to that more distant parent, it seeks to reselect a parent at the earlier, shorter distance (or less) with good link quality. For example, if a mesh point disconnects from a mesh parent 2 hops away and subsequently reconnects to a mesh parent 3 hops away, then the mesh point continues to seek a connection to a mesh parent with both an acceptable link quality and a distance of two hops or less, even if the more distant parent also has an acceptable link quality.
For information about the procedure to configure mesh radio profiles, see Creating and Editing Mesh Radio Profiles on page 641.
RF Management (802.11a and 802.11g) Profiles
The two 802.11a and 802.11g RF management profiles for an AP configure its 802.11a (5 Ghz) and 802.11b/g (2.4 GHz) radio settings. Use these profile settings to determine the channel, beacon period, transmit power, and ARM profile for a mesh AP's 5 GHz and 2.5 Ghz frequency bands. You can either use the "default" version of each profile, or create a new 802.11a or 802.11g profile which you can then configure as necessary. Each RF management profile also has a radio-enable parameter that allows you to enable or disable the AP's ability to simultaneously carry WLAN client traffic and mesh-backhaul traffic on that radio. This value is enabled by default. For information about configuring RF Management Radio profiles, see 802.11a and 802.11g RF Management Profiles on page 593.
If you do not want the mesh radios carrying mesh-backhaul traffic to support client traffic, consider using a dedicated 802.11a/80211/g radio profile with the mesh radio disabled. In this scenario, the radio carries mesh backhaul traffic but does not support client Virtual APs.
Mesh nodes operating in different cluster profiles can share the same radio profile. Conversely, mesh portals using the same cluster profile can be assigned different RF Management Radio profiles to achieve frequency separation (for more information, see "Deployments with Multiple Mesh Cluster Profiles").
Adaptive Radio Management Profiles
Each 802.11a and 802.11g radio profile references an Adaptive Radio Management (ARM) profile. When you assign an active ARM profile to a mesh radio, ARM's automatic power-assignment and channel-assignment

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Secure Enterprise Mesh | 628

features automatically select the radio channel with the least amount of interference for each mesh portal, maximizing end user performance. In earlier versions of this software, an AP with a mesh radio received its beacon period, transmission power, and 11a/11g portal channel settings from its mesh radio profile. Meshaccess AP portals now inherit these radio settings from their dot11a or dot11g radio profiles.
Each ARM-enabled mesh portal monitors defined thresholds for interference, noise, errors, rogue APs and radar settings, then calculates interference and coverage values and selects the best channel for its radio band (s). The mesh portal communicates its channel selection to its mesh points via Channel Switch Announcements (CSAs), and the mesh points change their channel to match their mesh portal. Although channel settings can still be defined for a mesh point via that mesh point's 802.11a and 802.11g radio profiles, these settings are overridden by any channel changes from the mesh portal. A mesh point takes the same channel setting as its mesh portal, regardless of its associated clients. If you want to manually assign channels to mesh portals or mesh points, disable the ARM profile associated with the 802.11a or 802.11g radio profile by setting the ARM profile's assignment parameter to disable.
Mesh points, unlike mesh portals, do not scan channels. This means that once a mesh point has selected a mesh portal or an upstream mesh point, it tunes to this channel, forms the link, and does not scan again unless the mesh link gets broken. This provides good mesh link stability, but may adversely affect system throughput in networks with mesh portals and mesh points. When ARM assigns optimal channels to mesh portals, those portals use different channels. Once the mesh network has formed and all the mesh points have selected a portal (or upstream mesh point), those mesh points are not be able to detect other portals on other channels that could offer better throughput. This type of suboptimal mesh network may form if, for example, two or three mesh points select the same mesh portal after booting, form the mesh network, and leave a nearby mesh portal without any mesh points. Again, this does not affect mesh functionality, but may affect total system throughput. For details about associating an ARM profile with a mesh AP, see Assigning an ARM Profile on page 600.
High-Throughput Radio Profiles
Each 802.11a and 802.11g radio profile also references a high-throughput profile that manages an AP or AP group's 40Mhz tolerance settings. For information about referencing a high-throughput profile, see Assigning a High-throughput Profile on page 600.
Mesh High-Throughput SSID Profiles
High-throughput APs support additional settings not available in legacy APs. A mesh high-throughput SSID profile can enable or disable high-throughput (802.11n) features and 40 MHz channel usage, and define values for aggregated MAC protocol data units (MDPUs), and Modulation and Coding Scheme (MCS) ranges.
Dell provides a "default" version of the mesh high-throughput SSID profile. You can use the "default" version or create a new instance of a profile which you can then edit as you need. High-throughput mesh nodes operating in different cluster profiles can share the same high-throughput SSID radio profile. For information about configuring mesh high-throughput SSID profiles, see Creating and Editing Mesh High-Throughput SSID Profiles .
Wired AP Profiles
The wired AP profile controls the configuration of the Ethernet port(s) on your AP. You can use the wired AP profile to configure Ethernet ports for bridging or secure jack operation using the wired AP profile. For details, see Configuring Ethernet Ports for Mesh on page 652
Mesh Recovery Profiles
In addition to the "default" and user-defined mesh cluster profiles, mesh nodes also have a recovery profile. The master controller dynamically generates a recovery profile, and each mesh node provisioned by the same master controller has the same recovery profile. The recovery profile is based on a pre-shared key (PSK), and

629 | Secure Enterprise Mesh

Dell Networking W-Series ArubaOS 6.4.x | User Guide

mesh nodes use the recovery profile to establish a link to the controller if the mesh link is broken and no other mesh cluster profiles are available.
The mesh portal advertises the provisioned cluster profile. If a mesh point is unaware of the active mesh cluster profile, but is aware of and has the same recovery profile as the mesh portal, the mesh point can use the recovery profile to connect to the mesh portal.
The mesh point must have the same recovery profile as the parent to which it connects. If you provision the mesh points with the same master controller, the recovery profiles should match.
To verify that the recovery profile names match, use the following command: show ap mesh debug provisioned-clusters {ap-name <name> | bssid <bssid> | ip-addr <ipaddr>}.
To view the recovery profile on the controller, use the following command: show running-config | include recovery.
If a mesh point connects to a parent using the recovery profile, it may immediately exit recovery if the parent is actively using one of its provisioned mesh cluster profiles. Once in recovery, a mesh point periodically exits recovery to see if it can connect using an available provisioned mesh cluster profile. The recovery profile is read-only; it cannot be modified or deleted.
The recovery profile is stored in the master controller's configuration file and is unique to that master controller. If necessary, you can transfer your configuration to another controller. If you do so, make sure your new mesh cluster is running and you have re-provisioned the mesh nodes before deleting your previous configuration. The APs learn the new recovery profile after they are provisioned with the new controller. This is also true if you provision a mesh node with one master controller and use it with a different master controller. In this case, the recovery profile does not work on the mesh node until you re-provision it with the new master controller.
Understanding Remote Mesh Portals (RMPs)
You can deploy mesh portals to create a hybrid mesh/remote AP environment to extend network coverage to remote locations; this feature is called remote mesh portal, or RMP. The RMP feature integrates the functions of a remote AP (RAP) and the Mesh portal. As a RAP, it sets up a VPN tunnel back to the corporate switch that secures control traffic between the RAP and the switch.
The Remote Mesh Portal feature allows you to configure a remote AP at a branch office to operate as a mesh portal for a mesh cluster. Other mesh points belonging to that cluster get their IP address and configuration settings from the main office via an IPsec tunnel between the remote mesh portal and the main office controller. This feature is useful for deploying an all-wireless branch office or creating a complete wireless network in locations where there is no wired infrastructure in place.
When the client at the branch office associates to a virtual AP in split-tunnel forwarding mode, the client's DHCP requests are forwarded over a GRE tunnel (split tunnel) to the corporate network. This communication is done over a secure VPN tunnel. The IPs are assigned from the corporate pool based on the VLAN tag information, which helps to determine the corresponding VLAN. The VLAN tag also determines the subnet from which the DHCP address has assigned.
A mesh point sends the DHCP request with the mesh private VLAN (MPV) parameter. The mesh point learns the MPV value from the response during the mesh association. When the split tunnel is setup for the RMP on the controller, the VLAN of the tunnel should be the MPV.A DHCP pool for the MPV should be setup on the switch. The use of MPV makes it easy for the RMP to decide which requests to forward over the split tunnel. All requests tagged with the MPV are sent over the split tunnel. Hence the MPV should be different from any user VLAN that is bridged using the mesh network.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Secure Enterprise Mesh | 630

The RMP configuration requires an AP license. For more information about Dell software licenses, see Software Licenses on page 146.
Figure 74 Working of RMP

By default, the data frames the mesh portal receives on its mesh link are forwarded according to the bridge table entries on the portal. However, frames received on mesh private VLAN (MPV) are treated differently by the remote mesh portal. These frames are treated the same as frames received on a split SSID and are routed rather than bridged. Mesh points obtain DHCP addresses from the corporate network. then register with the controller using these IP addresses. When these mesh points send and receive PAPI control traffic from the main office controller, it controls these mesh points just as if they were on a local VLAN. PAPI traffic containing keys and other secret information receives IPsec encryption and decryption when it is forwarded to the controller through the VPN tunnel.
Not all traffic from a mesh point is sent on the mesh private VLAN. When a mesh point bridges data received via its Ethernet interface or from clients connected to an access radio VAP, the mesh point does not tag the frame with the mesh private VLAN tag when it sends the data through mesh link to the remote mesh portal. Note that the mesh point may still tag the frame depending on the VLAN of the virtual AP and the native VLAN specified in the system profile. Care must be taken to assign the MPV value so that it does not clash with any local tags assigned in the mesh network. In this scenario, the portal performs the default operation and bridges the frame based on its bridge table. Traffic destined to the Internet is recognized as such by the remote mesh portal based on ACL rules. This traffic is NATed on the remote mesh portal's Ethernet interface.
For information on the procedure to configure remote mesh portals, see Configuring Remote Mesh Portals (RMPs) on page 659
Understanding the AP Boot Sequence
The section describes the boot sequence for mesh APs in detail. Depending on its configured role, the AP performs a slightly different boot sequence.

631 | Secure Enterprise Mesh

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Booting the Mesh Portal
When the mesh portal boots, it recognizes that one radio is configured to operate as a mesh portal. It then obtains an IP address from a DHCP server on its Ethernet interface, discovers the master controller on that interface, registers the mesh radio with the controller, and obtains regulatory domain and mesh radio profiles for each mesh point interface. A mesh virtual AP is created on the mesh portal radio interface, the regulatory domain and radio profiles are used to bring up the radio on the correct channel, and the provisioned mesh cluster profile is used to setup the mesh virtual AP with the correct announcements on beacons and probe responses. On the non-mesh radio provisioned for access mode, that radio is a thin AP and everything on that interface works as a thin AP radio interface.
If the 802.11a/802.11g radio profile assigned to the mesh radio is enabled, the radio supports both mesh backhaul and client access Virtual APs. If the mesh radio is to be used exclusively for mesh backhaul traffic, associate that radio to a dedicated 802.11a/802.11g radio profile with the radio disabled so the mesh radios carry backhaul traffic only.
Booting the Mesh Point
When the mesh point boots, it scans for neighboring mesh nodes to establish a link to the mesh portal. All of the mesh nodes that establish the link are in the same mesh cluster. After the link is up, the mesh point uses the DHCP to obtain an IP address and uses the same master controller as their parent. The remaining boot sequence, if applicable, is similar to that of a thin AP. Remember, the priority of the mesh point is establishing a link with neighboring mesh nodes, not establishing a control link to the controller.
In a single hop environment, the mesh point establishes a direct link with the mesh portal.
Air Monitoring and Mesh
Each mesh node has an air monitor (AM) process that registers the BSSID and the MAC address of the mesh node to distinguish it from a thin AP. This allows the WLAN management system (WMS) on the controller and AMs deployed in your network to distinguish between APs, wireless clients, and mesh nodes. The WMS tables also identify the mesh nodes.
For all thin APs and mesh nodes, the AM identifies a mesh node from other packets monitored on the air, and the AM does not trigger wireless-bridging events for packets transmitted between mesh nodes.
Mesh Deployment Solutions
You can configure the following single-hop and multi-hop solutions:
l Thin AP services with wireless backhaul deployment l Point-to-point deployment l Point-to-multipoint deployment l High-availability deployment
With a thin AP wireless backhaul deployment, mesh provides services and security to remote wireless clients and sends all control and user traffic to the master controller over a wireless backhaul mesh link.
The remaining deployments allow you to extend your existing wired network by providing a wireless bridge to connect Ethernet LAN segments. You can use these deployments to bridge Ethernet LANs between floors, office buildings, campuses, factories, warehouses, and other environments where you do not have access to physical ports, or cable to extend the wired network. In these scenarios, a wireless backhaul carries traffic between the Dell APs configured as the mesh portal and the mesh point, to the Ethernet LAN.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Secure Enterprise Mesh | 632

Thin AP Services with Wireless Backhaul Deployment
To expand your wireless coverage without bridging Ethernet LAN segments, you can use thin AP services with a wireless backhaul. In this scenario, the mesh point provides network access for wireless clients and establishes a mesh path to the mesh portal, which uses its wired interface to connect to the controller. Use the 802.11g radio for WLAN and controller services and the 802.11a radio for mesh services. Figure 75 shows the wireless backhaul between the mesh portal to the mesh point that services the wireless clients. Figure 75 Sample Wireless Backhaul Deployment
Point-to-Point Deployment
In this point-to-point scenario, two Ethernet LAN segments are bridged via a wireless connection that carries both client services traffic and mesh-backhaul traffic between the mesh portal and the mesh point. This provides communication from one LAN to another. Figure 76 shows a single-hop point-to-point deployment. Figure 76 Sample Point-to-Point Deployment

Point-to-Multipoint Deployment
In a point-to-multipoint scenario, multiple Ethernet LAN segments are bridged via multiple wireless/mesh backhauls that carry traffic between the mesh portal and the mesh points. This provides communication from the local LAN to multiple remote LANs. Figure 77 shows a single-hop point-to-multipoint deployment.

633 | Secure Enterprise Mesh

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 77 Sample Point-to-Multipoint Deployment
High-Availability Deployment
In this high-availability scenario, multiple Ethernet LAN segments are bridged via multiple wireless backhauls that carry traffic between the mesh portal and the mesh points. You configure one mesh portal for each remote LAN that you are bridging with the host LAN. This provides communication from the host LAN to multiple remote LANs. In the event of a link failure between a mesh point and its mesh portal, the affected mesh point could create a link to the other mesh portal. Figure 78 shows a sample single-hop high-availability deployment. The dashed lines represent the current mesh link between the mesh points and their mesh portals. The diagonal dotted lines represent possible links that could be formed in the event of a mesh link or mesh portal failure. Figure 78 Sample High-Availability Deployment

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Secure Enterprise Mesh | 634

Mesh Deployment Planning
Following considerations are recommended when planning and deploying a mesh solution:
Pre-Deployment Considerations
l Stage the APs before deployment. Identify the location of the APs, configure them for mesh, provision them, and verify connectivity before physically deploying the mesh APs in a live network.
l Ensure the controller has Layer-2/3 network connectivity to the network segment where you plan to install the mesh portal.
l Keep the AP packaging materials and reuse them to send the APs to the installation location. l Verify the layout of the physical location to determine the appropriate configuration and placement of the
APs. Use this information to avoid problems that would necessitate a physical recovery. l Label the AP before sending it to the physical location for installation.
Outdoor-Specific Deployment Considerations
l Provision the AP with the latitude and longitude coordinates of the installation location. This allows you to more easily identify the AP for inventory and troubleshooting purposes.
l Identify a "radio line of sight" between the antennas for optimum performance. The radio line of sight involves the area along a link through which the bulk of the radio signal power travels.
l Identify the minimum antenna height required to ensure a reliable mesh link. l Scan your proposed site to avoid radio interference caused by other radio transmissions using the same or
an adjacent frequency. l Consider extreme weather conditions known to affect your location, including: temperature, wind velocity,
lightning, rain, snow, and ice. l Allow for seasonal variations, such as growth of foliage.
For more detailed outdoor deployment information, refer to the installation guide that came with your outdoor AP.
Configuration Considerations
l On dual-radio APs, you can configure only one of the radio for mesh. If you want a dual-radio AP to carry mesh backhaul traffic and client services traffic on separate radios, it is recommended to use 802.11a radios for mesh-backhaul traffic and 802.11g radios for traditional WLAN access.
l If you configure more than one mesh node in the same VLAN, prevent network loops by enabling STP on the Layer-2 switch used to connect the mesh nodes.
l Mesh nodes learn a maximum of 1,024 source MAC addresses; this cannot be changed. l Place all APs for a specific mesh cluster in the same AP group. l Create and keep separate mesh cluster profiles for specific mesh clusters. Do not overwrite or delete the
cluster profiles. l Enable bridging on mesh point Ethernet ports when deploying LAN bridging solutions. l APs configured as mesh points support secure jack operation on enet0. APs with multiple Ethernet ports
configured as mesh portals support secure jack operation on enet1. If an AP with multiple Ethernet ports is configured as a mesh point, it supports secure jack operation on enet1 and enet0. l Mesh networks forward tagged/untagged VLAN traffic, but do not tag traffic. The allowed VLANS are controlled by the wired ap profile. l Mesh APs provisioned on different controllers can interoperate if those APs are configured with the same country code, cluster name and cluster key.However, the mesh recovery profile created on one controller is

635 | Secure Enterprise Mesh

Dell Networking W-Series ArubaOS 6.4.x | User Guide

not able to recover settings for mesh APs provisioned on another controller unless the recovery profile is on a master controller and the other mesh nodes were provisioned by a local controller connected to that master.
Post-Deployment Considerations
l Do not connect mesh point Ethernet ports in such a way that causes a network loop. l Have a trained professional install the AP. After installation, check to ensure the AP receives power and
boots up, enabling RSSI outputs.
Although the AP is up and operational, it is not connected to the network.

l Align the AP antenna for optimal RSSI. l Do not delete or modify mesh cluster profiles once you use them to provision mesh nodes. You can recover
the mesh point if the original cluster profile is still available. It is recommended to create a new mesh cluster profile if needed. l If you create a new mesh cluster profile for an existing deployment, you must re-provision the AP for the new profile to take effect. If you re-provision mesh nodes that are already operating, re-provision the most distant (highest hop count) mesh points first, followed by the mesh portals. If you re-provision the mesh portal first, the mesh points may be unable to form a mesh link. Note that re-provisioning the AP causes it to automatically reboot, which may cause a disruption of service to the network.
Dual-Port AP Considerations
A dual-port AP has two 10/100 Mbps Ethernet ports (enet0 and enet1, respectively). When using these APs in a mesh environment, note the following Ethernet port requirements:
l If configured as a mesh portal: n Connect enet0 to the controller to obtain an IP address. The wired AP profile controls enet1. n Only enet1 supports secure jack operation.
l If configured as a mesh point, enet0 and enet1 can be configured using separate wired-port-profiles

Configuring Mesh Cluster Profiles
The mesh cluster configuration gets pushed from the controller to the mesh portal and the other mesh points, which allows them to inherit the characteristics of the mesh cluster of which they are a member. Mesh nodes are grouped according to a mesh cluster profile that contains the MSSID, authentication methods, security credentials, and cluster priority. Cluster profiles (including the default cluster profile) are not applied until you provision your APs for mesh. For more information on mesh cluster profiles, see Mesh Cluster Profiles on page 626
Managing Mesh Cluster Profiles in the WebUI
Use the following procedures to define and manage mesh cluster profiles using the WebUI.
Creating a Profile
1. Navigate to the Configuration > Wireless > AP Configuration window. Select the AP Group or AP Specific tab. l If you selected AP Group, click the AP group name for which you want to create the new mesh cluster profile. l If you selected AP Specific, click the AP for which you want to create the new mesh cluster profile.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Secure Enterprise Mesh | 636

2. In the Profiles list, expand the Mesh menu, then select Mesh Cluster profile. 3. In the Profile Details window pane, click the Add a profile drop-down list and select NEW. 4. Enter a name for the new profile. 5. Configure the mesh cluster settings described in Table 126, then click Apply.

Table 126: Mesh Cluster Profile Configuration Parameters

Parameter

Description

Profile Name

Name of the mesh cluster profile. The name must be 1­63 characters. Default: Mesh cluster profile named "default."

Cluster Name

Indicates the mesh cluster name. The name can have a maximum of 32 characters, and is used as the MSSID for the mesh cluster. When you first create a new mesh cluster profile, the profile uses the default cluster name "Dell-mesh". Use the Cluster Name parameter to define a new, unique MSSID before you assign APs or AP groups to the mesh cluster profile.
NOTE: If you want a mesh cluster to use WPA2-PSK-AES encryption, do not use spaces in the mesh cluster name, as this may cause errors in mesh points associated with that mesh cluster.
To view existing mesh cluster profiles, use the CLI command: show ap mesh-clusterprofile.
A mesh portal chooses the best cluster profile and provisions it for use. A mesh point can have a maximum of 16 cluster profiles.
Default: Mesh cluster named "Dell-mesh."

RF Band

Indicates the band for mesh operation for multiband radios. Select a or g.
Important: If you create more than one mesh cluster profile for an AP or AP group, each mesh cluster profile must use the same band.

Encryption

Configures the data encryption, which can be either opensystem (no authentication or encryption) or wpa2-psk-aes (WPA2 with AES encryption using a preshared key). It is recommended to select wpa2-psk-aes and using the wpa-passphrase parameter to select a passphrase.
Default: opensystem.

WPA Hexkey

Configures a WPA pre-shared key. This key must be 64 hexadecimal characters

WPA Passphrase

Sets the WPA password that generates the PSK. The passphrase must be between 8­63 characters, inclusive.

Priority

Indicates the priority of the cluster profile.
The mesh cluster priority determines the order by which the mesh cluster profiles are used. This allows you, rather than the link metric algorithm, to control the network topology by defining the cluster profiles to use if one becomes unavailable
Specify the cluster priority when creating a new profile or adding an existing profile to a mesh cluster. If more than two mesh cluster profiles are configured, mesh points use the priority numbers to identify primary and backup profile(s).
NOTE: The lower the number, the higher the priority. Therefore, the profile with the lowest number is the primary profile. Each profile must use a unique priority value to ensure a deterministic mesh path.

637 | Secure Enterprise Mesh

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter

Description
Default: 1 for the "default" mesh cluster profile and all user-created cluster profiles. The recovery profile has a priority of 255 (this is not a user-configured profile). The range is 1­16.

Cluster Name

Indicates the mesh cluster name. The name can have a maximum of 32 characters, which is used as the MSSID. When you create a new cluster profile, it is a member of the "Dell-mesh" cluster.
NOTE: Each mesh cluster profile should have a unique MSSID. Configure a new MSSID before you apply the mesh cluster profile.
To view existing mesh cluster profiles, use the command: show ap mesh-clusterprofile.
A mesh portal chooses the best cluster profile and provisions it for use. A mesh point can have a maximum of 16 cluster profiles.
Default: Mesh cluster named "Dell-mesh."

RF Band

Indicates the band for mesh operation for multiband radios. Select a or g.

Associating a Mesh Cluster Profile to Mesh APs
Use the following procedure to associate a mesh cluster profile to a group of mesh APs or an individual mesh AP using the WebUI. If you configure multiple cluster profiles with different cluster priorities, you manually override the link metric algorithm because the priority takes precedence over the path cost. In this scenario, the mesh portal uses the profile with the highest priority to bring-up the mesh network.
1. Navigate to the Configuration > Wireless > AP Configuration window. Select either the AP Group or AP Specific tab. l If you selected AP Group, click the AP group name to which you want to assign a new mesh cluster profile. l If you selected AP Specific, click the AP to which you want to assign a new mesh cluster profile
2. Under the Profiles list, expand the Mesh menu, then select Mesh Cluster profile. 3. In the Profile Details window pane, click the Mesh Cluster profile drop-down list select New.
l To add an existing mesh cluster profile to the selected AP group, click the Add a profile drop-down list and select a new profile name from the list.
l To create a new mesh cluster profile to the selected AP group, click the Add a profile drop-down list and select NEW. Enter a name for the new mesh cluster profile.
4. Click the using priority drop-down list to select a priority for the mesh cluster profile. The lower the number, the higher the priority.
5. Click Add to add the mesh cluster profile to the AP group. 6. Click Apply. The profile name appears in the mesh cluster profile list with your configured settings. If you
configure this for the AP group, this profile also becomes the mesh cluster profile used by the mesh portal for your mesh network.
Editing a Mesh Cluster Profile
If you modify any mesh cluster profile setting, you must reprovision your AP. For example, if you change the priority of a cluster profile from 5 to 2, you must reprovision the AP before you can assign priority 5 to another cluster profile. Reprovisioning the AP causes it to automatically reboot. For more information, see Provisioning Mesh Nodes.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Secure Enterprise Mesh | 638

1. Navigate to the Configuration > Wireless > AP Configuration window. Select either the AP Group or AP Specific tab. l If you selected the AP Group tab, click the Edit button by the AP group name with the profile you want to edit. l If you selected the AP Specific tab, click the Edit button by the AP with the profile you want to edit.
2. In the Profiles list, expand the Mesh menu, then select Mesh Cluster profile. 3. In the Profile Details window pane, click the Mesh Cluster profile drop-down list and select the name of
the profile you want to edit. 4. Change the desired mesh radio settings as desired. Table 128 describes the parameters you can configure in
the mesh high-throughput SSID profile.
A mesh cluster profile configured with wpa2-psk-aes encryption must have a defined WPA hexkey or a WPA passphrase (or both). If you have configured one encryption type but not the other, and want switch from a hexkey to a passphrase or vice versa, you must add the new encryption type, click Apply, then remove the encryption type you no longer want and click Apply again. You cannot delete one encryption type and add a different type in a single step.
5. Click Apply to save your changes.
Deleting a Mesh Cluster Profile
You can delete a mesh cluster profile only if no APs or AP groups are associated with that profile.
1. Navigate to the Configuration > Advanced Services> All Profiles window. 2. Expand the Mesh menu, then select Mesh Cluster profile. A list of high-throughput SSID profiles appears
in the Profile Details window pane. 3. Click the Delete button by the name of the profile you want to delete.
Managing Mesh Cluster Profiles in the CLI
You must be in config mode to create, modify or delete a mesh cluster profile using the CLI. Specify an existing mesh cluster profile with the <profile-name> parameter to modify an existing profile, or enter a new name to create an entirely new profile.
Configuration details and any default values for each of these parameters are described in Table 126. If you do not specify a parameter for a new profile, that profile uses the default value for that parameter.
Use the no option before any parameter to remove the current value for that parameter and return it to its default setting. Enter exit to leave the mesh cluster profile mode. (host)(config) #ap mesh-cluster-profile <profile>
clone <profile> cluster <name> no ... opmode [opensystem | wpa2-psk-aes] rf-band {a | g} wpa-hexkey <wpa-hexkey> wpa-passphrase <wpa-passphrase>
The following examples create and configure the mesh cluster profiles cluster1 and cluster2. (host)(config) #ap mesh-cluster-profile cluster1
cluster corporate opmode wpa2-psk-aes wpa-passphrase mesh_123 rf-band a
(host)(config) #ap mesh-cluster-profile cluster2

639 | Secure Enterprise Mesh

Dell Networking W-Series ArubaOS 6.4.x | User Guide

cluster corporate opmode wpa2-psk-aes wpa-passphrase mesh_123 rf-band a
You can also create a new mesh radio profile by copying the settings of an existing profile using the clone parameter. Using the clone command to create a new profile makes it easier to keep constant attributes in common within multiple profiles. (host)(config) #ap mesh-cluster-profile <profile-name> clone <source-profile-name>
Viewing Mesh Cluster Profile Settings
To view a complete list of mesh cluster profiles and their status: (host)(config) #show ap mesh-cluster-profile
To view the settings of a specific mesh cluster profile: (host)(config) #show ap mesh-cluster-profile <profile-name>
Associating Mesh Cluster Profiles
The following commands associate a mesh cluster profile to an AP group or an individual AP. For deployments with multiple mesh clusters, you must also configure the profile's priority. Remember, the lower the priority number, the high the priority. The mesh cluster priority determines the order by which the mesh cluster profiles are used. This allows you, rather than the link metric algorithm, to control the network topology by defining the cluster profiles to use if one becomes unavailable. To associate a mesh cluster profile to an AP group in a single-cluster deployment: (host)(config) #ap-group <group> mesh-cluster-profile <profile-name>
To associate a mesh cluster profile to an individual AP in a single-cluster deployment: (host)(config) #ap-name <name> mesh-cluster-profile <profile-name>
To associate a mesh cluster profile to an AP group in a multiple-cluster deployment: (host)(config) #ap-group <group> mesh-cluster-profile <profile-name> priority <priority>
To associate a mesh cluster profile to an individual AP in a multiple-cluster deployment, use the command (host)(config) #ap-name <name>
mesh-cluster-profile <profile-name> priority <priority>
Example: (host)(config) #ap-group group1
mesh-cluster-profile cluster1 priority 5 mesh-cluster-profile cluster2 priority 10 (host)(config) #ap-group2 mesh-cluster-profile cluster1 priority 10 mesh-cluster-profile cluster2 priority 5 mesh-radio-profile channel2
Excluding a Mesh Cluster Profile from a Mesh Node
To exclude a specific mesh cluster profile from an AP: (host)(config) #ap-name <name> exclude-mesh-cluster-profile-ap <profile-name>
Deleting a Mesh Cluster Profile
If no APs are using a mesh cluster profile, you can delete that profile using the no parameter: (host)(config) #no ap mesh-cluster-profile <profile-name>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Secure Enterprise Mesh | 640

Creating and Editing Mesh Radio Profiles
The mesh radio profile determines many of the settings used by mesh nodes to establish mesh links and the path to the mesh portal, including the maximum number of children a mesh node can accept, and transmit rates for the 802.11a and 802.11g radios. The attributes of the mesh radio profile are applied to a mesh point upon receiving its configuration from the controller. You can configure multiple radio profiles; however, you select and deploy only one radio profile per AP group. Radio profiles, including the "default" profile, are not active until you provision your APs for mesh.
If you modify a currently provisioned and running radio profile, your changes take effect immediately. You do not need to reboot the controller or the AP to apply the changes.
Managing Mesh Radio Profiles in the WebUI
Use the following procedures to define and manage mesh radio profiles using the WebUI.
Creating or Editing a Mesh Radio Profile
1. Navigate to the Configuration > Wireless > AP Configuration window. Select either the AP Group or AP Specific tab. l If you selected the AP Group tab, click the AP group name for which you want to configure the new mesh radio profile. l If you selected the AP Specific tab, click the AP for which you want to create the mesh radio profile.
2. In the Profiles list, expand the Mesh menu, then select Mesh radio profile. 3. The procedure to create a new mesh profile varies slightly from the procedure to edit an existing profile.
l To create a new mesh profile: in the Profile Details window pane, click the Mesh radio profile dropdown list and select New. Enter a new mesh radio profile name in the field to the right of the drop-down list.
l To edit an existing mesh profile: in the Profile Details window pane, click the Mesh radio profile dropdown list and select the name of the profile you want to edit.
4. Configure your desired mesh radio settings. Mesh Radio profile configuration settings are divided into two tabs, Basic and Advanced. The Basic tab displays only those configuration settings that often need to be adjusted to suit a specific network. The Advanced tab shows all configuration settings, including settings that do not need frequent adjustment or should be kept at their default values. If you change a setting on one tab, then click and display the other tab without saving your configuration, that setting reverts to its previous value. The basic and advanced profile settings are described in Table 127.

641 | Secure Enterprise Mesh

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 127: Mesh Radio Profile Configuration Parameters Parameter Description Basic Mesh Radio Settings

Link Threshold

Use this setting to optimize operation of the link metric algorithm.
Indicates the minimal RSSI value. If the RSSI value is below this threshold, the link may be considered a sub-threshold link. A sub-threshold link is one whose average RSSI value falls below the configured link threshold.
If this occurs, the mesh node may try to find a better link on the same channel and cluster (only neighbors on the same channel are considered).
Default: 12. The supported threshold is hardware dependent, with a practical range of 10­90.

Advanced Mesh Radio Settings

802.11a Transmit Rates

Indicates the transmit rates for the 802.11a radio.
The AP attempts to use the highest transmission rate to establish a mesh link. If a rate is unavailable, the AP goes through the list and uses the next highest rate.
To modify transmit rates, do one of the following:
l In the WebUI, deselect (uncheck) a specific rate box to use fewer rates when establishing a mesh link.
l In the CLI, enter the specific rates to use.
Default: All transmission rates are selected and used. If you do not select 802.11a or 802.11g transmit rates, all rates are selected by default when you click Apply.

802.11g Transmit Rates

Indicates the transmit rates for the 802.11g radio.
The AP attempts to use the highest transmission rate to establish a mesh link. If a rate is unavailable, the AP goes through the list and uses the next highest rate.
To modify transmit rates, do one of the following:
l In the WebUI, deselect (uncheck) a specific rate box to use fewer rates when establishing a mesh link.
l In the CLI, enter the specific rates to use.
Default: All transmission rates are selected and used. If you do not select 802.11a or 802.11g transmit rates, all rates are selected by default when you click Apply.

Allowed VLANs on Mesh Link

List the VLAN ID numbers of VLANs allowed on the mesh link.

BC/MC Rate Optimization

Broadcast/Multicast Rate Optimization dynamically selects the rate for sending broadcast/multicast frames on any BSS. This feature determines the optimal rate for sending broadcast and multicast frames based on the lowest of the unicast rates across all associated clients.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Secure Enterprise Mesh | 642

Parameter

Description
When you enable the Multicast Rate Optimization feature, the controller scans the list of all associated stations in that BSS and finds the lowest transmission rate as indicated by the rate adaptation state for each station. If there are no associated stations in the BSS, it selects the lowest configured rate as the transmission rate for broadcast and multicast frames.
This feature is enabled by default. Multicast Rate Optimization applies to broadcast and multicast frames only. 802.11 management frames are not affected by this feature and are transmitted at the lowest configured rate. When enabled, this setting dynamically adjusts the multicast rate to that of the slowest connected mesh child. Multicast frames are not sent if there are no mesh children.
NOTE: This feature should only be enabled on a BSS where all associated stations are sending or receiving unicast data. If there is no unicast data to or from a particular station, then the rate adaptation state may not accurately reflect the current sustainable transmission rate for that station. This could result in a higher packet error rate for broadcast/multicast packets at that station. Configuring the Video Multicast Rate Optimization parameter overrides the configuration of BC/MC Rate Optimization parameter for VI-tagged multicast traffic. Multicast traffic that is not VI-tagged behaves the same with BC/MC as before. If multicast rate is not set, all traffic behaves the same.
Default: Enabled.

Heartbeat threshold

Indicates the maximum number of heartbeat messages that can be lost between neighboring mesh nodes.
Default: 10 missed heartbeats.
Range: 1­255.

Maximum Children

Indicates the maximum number of children a mesh node can accept. Default: 64 children. Range: 1­64

Maximum Hop Count

Indicates the maximum hop count from the mesh portal. Default: 8 hops. Range: 1­32

Mesh Private VLAN

A VLAN ID for control traffic between an remote mesh portal and mesh nodes. This VLAN ID must not be used for user traffic.
Range: 0­4094. Default: 0 (disabled).
For further information on configuring a remote mesh portal, see Configuring Remote Mesh Portals (RMPs) on page 659

Mesh Survivability

This feature is currently not supported and should only be enabled under the supervision of Dell support.

Metric algorithm

This parameter specifies the algorithm used by a mesh node to select its parent. Use this setting to optimize operation of the link metric algorithm.
Available options are:
l best-link-rssi: Selects the parent with the strongest RSSI, regardless of the number of children a potential parent has.

643 | Secure Enterprise Mesh

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter

Description
l distributed-tree-rssi: selects the parent based on link-RSSI and node cost based on the number of children. This option evenly distributes the mesh points over high quality uplinks. Low quality uplinks are selected as a last resort.
Default: distributed-tree-rssi. It is recommended to use the default value.

Rate Optimization for delivering EAPOL frames and mesh echoes

When you enable this parameter, EAPOL frames, mesh echo requests and echo responses are sent at a lower rate.

Reselection mode

Use this setting to optimize operation of the link metric algorithm. Available options are: l reselect-anytime l reselect-never l startup-subthreshold l subthreshold-only For complete information on reselection mode options, see Mesh Radio Profiles on page 627

Retry Limit

Indicates the number of times a mesh node can re-send a packet. Default: 4 times. Range: 1­15

RTS Threshold

Defines the packet size sent by mesh nodes. Mesh nodes transmitting frames larger than this threshold must issue request to send (RTS) and wait for other mesh nodes to respond with clear to send (CTS) to begin transmission. This helps prevent mid-air collisions.
Default: 2,333 bytes.
Range: 256­ 2,346.

5. Click Apply. The profile name appears in the Mesh Radio Profile list with your configured settings. If you configure this for the AP group, this profile also becomes the selected radio profile used by the mesh portal for your mesh network.
Assigning a Mesh Radio Profile to a Mesh AP or AP Group
1. Navigate to the Configuration > Wireless > AP Configuration window. Select either the AP Group or AP Specific tab. l If you selected AP Group, click the AP group to which you want to assign a new mesh radio profile. l If you selected AP Specific, click the AP to which you want to assign a new mesh radio profile.
2. Under the Profiles list, expand the Mesh menu, then select Mesh Radio profile. 3. In the Profile Details window pane, click the Mesh Radio profile drop-down list and select the desired
mesh radio profile from the list.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Secure Enterprise Mesh | 644

4. Click Apply. The profile name appears in the Mesh Radio Profile list with your configured settings. If you configure this for the AP group, this profile also becomes the selected radio profile used by the mesh portal for your mesh network.
5. Click the Delete button by the name of the profile you want to delete.
Managing Mesh Radio Profiles in the CLI
You must be in config mode to create, modify, or delete a mesh radio profile using the CLI. Specify an existing mesh profile with the <profile-name> parameter to modify an existing profile, or enter a new name to create an entirely new profile.
Creating or Modifying a Mesh Radio Profile
Configuration details and any default values for each of these parameters are described in Table 127. If you do not specify a parameter for a new profile, that profile uses the default value for that parameter. Put the no option before any parameter to remove the current value for that parameter and return it to its default setting. Enter exit to leave the mesh radio profile mode.
(host)(config) #ap mesh-radio-profile <profile-name> a-tx-rates allowed-vlans children <children> clone <source-profile-name> eapol-rate-opt g-tx-rates [1|2|5|6|9|11|12|18|24|36|48|54] heartbeat-threshold <count> hop-count <hop-count> link-threshold <count> max-retries <max-retries> mesh-ht-ssid-profile mesh-mcast-opt mesh-survivability metric-algorithm {best-link-rssi|distributed-tree-rssi} mpv <vlan-id> no reselection-mode rts-threshold <rts-threshold>
You can also create a new mesh radio profile by copying the settings of an existing profile using the clone parameter. Using the clone command to create a new profile makes it easier to keep constant attributes in common within multiple profiles.
(host)(config) #ap mesh-radio-profile <profile-name> clone <source-profile-name>
Assigning a Mesh Radio Profile to a Mesh AP or AP Group
To associate a mesh radio profile with an AP group, use the following commands. When you add the mesh cluster profile to the AP group, you must also define the cluster priority.
(host)(config) #ap-group <group> mesh-radio-profile <profile-name> priority <priority>
To associate a mesh radio profile with an individual AP:
(host)(config) #ap-name <name> mesh-radio-profile <profile-name> priority <priority>
The following examples assign the mesh cluster profiles cluster1 and cluster2 to two different AP groups. In the AP group group1, cluster1 has a priority of 5, and cluster2 has a priority of 10, so cluster1 has the higher priority. In the AP group group2, cluster1 has a priority of 10, and cluster2 has a priority of 5, so cluster5 has the higher priority.
(host)(config) #ap-group group1

645 | Secure Enterprise Mesh

Dell Networking W-Series ArubaOS 6.4.x | User Guide

mesh-cluster-profile cluster1 priority 5 mesh-cluster-profile cluster2 priority 10
(host)(config) #ap-group group2 mesh-cluster-profile cluster1 priority 10 mesh-cluster-profile cluster2 priority 5
Deleting Mesh Radio Profiles
You can delete a mesh radio profile only if no other APs or AP groups use that profile. To delete a mesh radio profile using the WebUI: 1. Navigate to the Configuration > Advanced Services> All Profiles window. 2. Expand the Mesh menu, then select Mesh radio profile. A list of mesh radio profiles appears in the
Profile Details window pane. 3. Click Delete by the name of the profile you want to delete. The following command deletes a radio profile via the command-line interface. (host)(config)no ap mesh-radio-profile <profile-name>
Creating and Editing Mesh High-Throughput SSID Profiles
The mesh high-throughput SSID profile defines settings unique to 802.11n and 802.11ac-capable, highthroughput APs. If none of the APs in your mesh deployment are 802.11n or 802.11ac-capable APs, you do not need to configure a high-throughput SSID profile. If you modify a currently provisioned and running highthroughput SSID profile, your changes take effect immediately. You do not need to reboot the controller or the AP.
Managing Mesh High-Throughput SSID Profiles in the WebUI
Use the following procedures to manage your high-throughput SSID profiles using the WebUI.
Creating a Profile
To create a high-throughput SSID profile: 1. Navigate to the Configuration > Wireless > AP Configuration window. Select either the AP Group or AP
Specific tab. l If you selected AP Group, click the AP group for which you want to create the new high-throughput SSID
profile. l If you selected AP Specific, click the AP for which you want to create the new high-throughput SSID
profile. 2. In the Profiles list, expand the Mesh menu, then select Mesh High-throughput SSID profile. 3. In the Profile Details window pane, click the Mesh High-throughput SSID profile drop-down list and
select NEW. 4. Enter a name for the new profile. 5. Configure the mesh high-throughput SSID parameters described in Table 128. The Mesh High-Throughput
SSID Profile configuration settings are divided into two tabs, Basic and Advanced. The Basic tab displays only those configuration settings that often need to be adjusted to suit a specific network. The Advanced tab shows all configuration settings, including settings that do not need frequent adjustment or should be kept at their default values. If you change a setting on one tab then click and display the other tab without saving your configuration, that setting reverts to its previous value.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Secure Enterprise Mesh | 646

6. Click Apply. The profile name appears in the Mesh High-throughput SSID Profile list with your configured settings.

Table 128: Mesh High-Throughput SSID Profile Configuration Parameters

Parameter

Description

Basic Mesh High-Throughput SSID Profile Settings

40 MHz channel usage

Enable or disable the use of 40 MHz channels. Default: enabled

80 MHz channel usage

Enable or disable the use of 80 MHz channels. Default: enabled

High-throughput Enable (SSID)

Enable or disable high-throughput (802.11n) features on the SSID. Default: enabled

Explicit Transmit Beamforming

Enable/Disable use of Explicit Transmit Beamforming. (For W-AP130 Series only)
If this parameter is disabled, the other transmit beamforming configuration settings have no effect.

Transmit Beamforming Compressed Steering

When enabled, the AP can use explicit compressed feedback from clients to obtain a steering matrix. (For W-AP130 Series APs only.)
Default: enabled

Transmit Beamforming non Compressed Steering

When enabled, the AP can use explicit noncompressed feedback from clients to obtain a steering matrix. (For W-AP130 Series only)
Default: enabled

Transmit Beamforming delayed feedback support

Enable/Disable delayed feedback/report support in Transmit Beamforming. (For W-AP130 Series only)
Default: enabled

Transmit Beamforming immediate feedback support

Enable/Disable immediate feedback/report support in Transmit Beamforming. (For W-AP130 Series only)
Default: enabled

Transmit Beamforming Sounding Interval

Time interval in seconds between updates of Transmit Beamforming channel estimation. (For W-AP130 Series only)
The supported range is 1-65335 seconds, and the default is 1800 seconds.

Very High throughput enable (VHT)

Enable or disable very high-throughput (802.11av) features on the SSID. Default: enabled

Advanced Mesh High-Throughput SSID Profile Settings

647 | Secure Enterprise Mesh

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter
Temporal Diversity Enable

Description
When a client is not responding to 802.11 packets, the AP will launch two hardware retries. If you enable this option and hardware retries are not successful, then the AP will launch and the software retries.

BA AMSDU Enable

Enable/Disable Receive AMSDU in BA negotiation.

Legacy stations

Allow or disallow associations from legacy (non-HT) stations. By default, this parameter is enabled (legacy stations are allowed).

Low-density Parity Check

If enabled, the AP advertises Low-density Parity Check (LDPC) support LDPC improves data transmission over radio channels with high levels of background noise. (For W-AP130 Series only)

Maximum number of spatial streams usable for STBC reception

Controls the maximum number of spatial streams usable for STBC reception. 0 disables STBC reception, 1 uses STBC for MCS 0-7. Higher MCS values are not supported. (Supported on the W-AP90 Series, W-AP130 Series, W-AP68, W-AP175 and W-AP105 only. The configured value adjusts based on AP capabilities.)
If transmit beamforming is enabled, STBC is disabled for disabled for beamformed frames.

Maximum number of spatial streams usable for STBC transmission.

Controls the maximum number of spatial streams usable for STBC transmission. 0 disables STBC transmission, 1 uses STBC for MCS 0-7. Higher MCS values are not supported. (Supported on W-AP90 Series, WAP175, W-AP130 Series and W-AP105 only. The configured value adjusts based on AP capabilities.)
If you enable transmit beamforming, STBC is disabled for disabled for beamformed frames.

MPDU Aggregation

Enable or disable MAC protocol data unit (MPDU) aggregation.
High-throughput APs are able to send aggregated MAC protocol data units (MDPUs), which allow an AP to receive a single block acknowledgment instead of multiple ACK signals. This option, which is enabled by default, reduces network traffic overhead by effectively eliminating the need to initiate a new transfer for every MPDU.

Max received A-MPDU size

Maximum size of a received aggregate MPDU, in bytes. Allowed values: 8191, 16383, 32767, 65535.

Max transmitted A-MPDU size

Maximum size of a transmitted aggregate MPDU, in bytes. Range: 1576­65535

Maximum number of MSDUs in an A-MSDU on best-effort AC

Maximum number of MSDUs in a TX A-MSDU on best-effort AC. TX-AMSDU disabled if 0.
Range: 0-15
Default: 2

Maximum number of MSDUs in an A-MSDU on

Maximum number of MSDUs in a TX A-MSDU on background. TX-AMSDU disabled if 0.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Secure Enterprise Mesh | 648

Parameter background AC

Description
Range: 0-15 Default: 2

Maximum number of MSDUs in an A-MSDU on video AC

Maximum number of MSDUs in a TX A-MSDU on video AC. TX-AMSDU disabled if 0.
Range: 0-15
Default: 2

Maximum number of MSDUs in an A-MSDU on voice AC

Maximum number of MSDUs in a TX A-MSDU on voice AC. TX-AMSDU disabled if 0. Range: 0-15
Default: 0

Maximum VHT MPDU size

Maximum size of aVHT MPDU, in bytes. Range: 3895, 7991, 11454

Min MPDU start spacing

Minimum time between the start of adjacent MPDUs within an aggregate MPDU, in microseconds. Allowed values: 0 (No restriction on MDPU start spacing), .25 µsec, .5 µsec, 1 µsec, 2 µsec, 4 µsec.

Short guard interval in 20 MHz mode

Enable or disable use of short (400ns) guard interval in 20 MHz mode. This parameter is enabled by default.
A guard interval is a period of time between transmissions that allows reflections from the previous data transmission to settle before an AP transmits data again. An AP identifies any signal content received inside this interval as unwanted inter-symbol interference, and rejects that data. The 802.11n standard specifies two guard intervals: 400ns (short) and 800ns (long). Enabling a short guard interval can decrease network overhead by reducing unnecessary idle time on each AP. Some outdoor deployments, may, however require a longer guard interval. If the short guard interval does not allow enough time for reflections to settle in your mesh deployment, inter-symbol interference values may increase and degrade throughput.

Short guard interval in 40 MHz mode

Enable or disable use of short (400ns) guard interval in 40 MHz mode. This parameter is enabled by default.
A guard interval is a period of time between transmissions that allows reflections from the previous data transmission to settle before an AP transmits data again. An AP identifies any signal content received inside this interval as unwanted inter-symbol interference, and rejects that data. The 802.11n standard specifies two guard intervals: 400ns (short) and 800ns (long). Enabling a short guard interval can decrease network overhead by reducing unnecessary idle time on each AP. Some outdoor deployments, may, however require a longer guard interval. If the short guard interval does not allow enough time for reflections to settle in your mesh deployment, inter-symbol interference values may increase and degrade throughput.

Short guard interval in 80

Enable or disable use of short (400ns) guard interval in 80 MHz mode.

649 | Secure Enterprise Mesh

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter MHz mode Supported MCS set
VHT - Support MCS Map
vht-txbf-explicit-enable

Description
A guard interval is a period of time between transmissions that allows reflections from the previous data transmission to settle before an AP transmits data again. An AP identifies any signal content received inside this interval as unwanted inter-symbol interference, and rejects that data.
The 802.11n standard specifies two guard intervals: 400ns (short) and 800ns (long). Enabling a short guard interval can decrease network overhead by reducing unnecessary idle time on each AP. Some outdoor deployments, may, however require a longer guard interval. If the short guard interval does not allow enough time for reflections to settle in your mesh deployment, inter-symbol interference values may increase and degrade throughput.
This parameter is enabled by default.
A list of Modulation Coding Scheme (MCS) values or ranges of values to be supported on this SSID. The MCS you choose determines the channel width (20MHz vs. 40MHz) and the number of spatial streams used by the mesh node.
The default value is 1­23; the complete set of supported values. To specify a smaller range of values, enter a hyphen between the lower and upper values. To specify a series of different values, separate each value with a comma.
Examples:
2­10
1,3,6,9,12
Range: 0­23.
A list of Modulation Coding Scheme (MCS) values or ranges of values to be supported on this SSID. The MCS you choose determines the channel width (20MHz vs. 40MHz vs 80MHz) and the number of spatial streams used by the mesh node.
The default value is 1­23; the complete set of supported values. To specify a smaller range of values, enter a hyphen between the lower and upper values. To specify a series of different values, separate each value with a comma.
Examples:
2­10
1,3,6,9,12
Range: 0­23.
Enable/Disable use of VHT Explicit Transmit Beamforming.

Assigning a Profile to an AP Group
1. Navigate to the Configuration > Wireless > AP Configuration window. Select either the AP Group or AP Specific tab. l If you selected AP Group, click the AP group name to which you want to assign a new high-throughput SSID profile. l If you selected AP Specific, click the AP to which you want to assign a new high-throughput SSID profile
2. Under the Profiles list, expand the Mesh menu, then select Mesh High-throughput SSID profile.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Secure Enterprise Mesh | 650

3. In the Profile Details window pane, click the Mesh High-throughput SSID profile drop-down list and select the desired profile from the list.
4. Click Apply. The profile name appears in the Mesh High-throughput SSID Profile list with your configured settings. If you configure this for the AP group, this profile also becomes the selected high-throughput SSID profile used by the mesh portal for your mesh network.
Editing a Profile
1. Navigate to the Configuration > Wireless > AP Configuration window. Select either the AP Group or AP Specific tab. l If you selected the AP Group tab, click the AP group name with the profile you want to edit. l If you selected the AP Specific tab, click the AP with the profile you want to edit.
2. In the Profiles list, expand the Mesh menu, then select Mesh High-throughput SSID profile. 3. In the Profile Details window pane, click the Mesh High-throughput SSID profile drop-down list and
select the name of the profile you want to edit. 4. Change the settings as desired. Table 128 describes the parameters you can configure in this profile. 5. Click Apply.
Deleting a Profile
You can delete a mesh high-throughput SSID profile only if no APs or AP groups are associated with that profile.
1. Navigate to the Configuration > Advanced Services> All Profiles window. 2. Expand the Mesh menu, then select Mesh High-throughput SSID profile. A list of high-throughput SSID
profiles appears in the Profile Details window pane. 3. Click Delete by the name of the profile you want to delete.
Managing Mesh High-Throughput SSID Profiles in the CLI
You must be in config mode to create, modify or delete a mesh high-throughput SSID radio profile using the CLI. Specify an existing high-throughput SSID profile with the <profile-name> parameter to modify an existing profile, or enter a new name to create an entirely new profile.
Creating or Modifying a Profile
Configuration details and any default values for each of these parameters are described in Table 128. If you do not specify a parameter for a new profile, that profile uses the default value for that parameter. Put the no option before any parameter to remove the current value for that parameter and return it to its default setting. Enter exit to leave the high-throughput radio profile mode
(host)(config) #ap mesh-ht-ssid-profile <profile-name> 40MHz-enable clone high-throughput-enable ldpc legacy-stations max-rx-a-mpdu-size max-tx-a-mpdu-size min-mpdu-start-spacing mpdu-agg no short-guard-intvl-20mhz short-guard-intvl-40mhz stbc-rx-streams stbc-tx-streams supported-mcs-set

651 | Secure Enterprise Mesh

Dell Networking W-Series ArubaOS 6.4.x | User Guide

temporal-diversity You can also create a new mesh high-throughput SSID profile by copying the settings of an existing profile using the clone parameter. Using the clone command to create a new profile makes it easier to keep constant attributes in common within multiple profiles.
ap mesh-ht-ssid-profile <profile-name> clone <source-profile-name>
Assigning a Profile to an AP Group
To associate a mesh high-throughput SSID profile with an AP group: (host)(config) #ap-group <group> mesh-ht-ssid-profile <profile-name> To associate a mesh radio profile with an individual AP: (host)(config) #ap-name <name> mesh-ht-ssid-profile <profile-name>
Viewing High-throughput SSID Settings
To view a complete list of high-throughput profiles and their status: (host)(config) #show ap mesh-ht-ssid-profile To view the settings of a specific high-throughput profile: (host)(config) #show ap mesh-ht-ssid-profile <profile-name>
Deleting a Profile
If no AP or AP group is using a mesh high-throughput SSID profile, you can delete that profile using the no parameter: (host)(config) no ap mesh-ht-ssid-profile <profile-name>

Configuring Ethernet Ports for Mesh
If you use mesh to join multiple Ethernet LANs, configure and enable bridging on the mesh point Ethernet port This section describes how to configure Ethernet ports for bridging or secure jack operation using the wired AP profile. The wired AP profile controls the configuration of the Ethernet port(s) on your AP.
Mesh nodes only support bridge mode and tunnel mode on their wired ports (enet0 or enet1). Split tunnel mode is not supported. Use bridge mode to configure bridging on the mesh point Ethernet port. Use tunnel mode to configure secure jack operation on the mesh node Ethernet port.
When configuring the Ethernet ports on dual-port APs, note the following requirements for the AP configures as a mesh portal: l Connect enet0 to the controller to obtain an IP address. The wired AP profile controls enet1. l Only enet1 supports secure jack operation.
Configuring Bridging on the Ethernet Port
Use the following procedure to configure bridging on the Ethernet port via the WebUI. 1. Navigate to the Configuration > Wireless > AP Configuration > AP Group window. 2. Click the AP group name with the wired ap profile you want to edit. 3. Under the Profiles list, expand the AP menu, then select Wired AP profile. The settings for the currently
selected wired AP profile appear. You can use a different wired AP profile by selecting a profile from the Wired AP profile drop-down list. 4. Under Profile Details, do the following: a. Select the Wired AP enable check box. This option is not selected by default.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Secure Enterprise Mesh | 652

b. From the Forward mode drop-down list, select bridge. c. Optionally, from the Switchport mode drop-down list, select access or trunk. These options only
apply to bridge mode configurations. l Access mode forwards untagged packets received on the port to the controller and they appear on
the configured access mode VLAN. Tagged packets are dropped. All packets received from the controller and sent via this port are untagged. Define the access mode VLAN in the Access mode VLAN field. l Trunk mode contains a list of allowed VLANs. Any packet received on the port that is tagged with an allowed VLAN is forwarded to the controller. Untagged packets are forwarded to the controller on the configured Native VLAN. Packets received from the controller and sent out the port remain tagged unless the tag value in the packet is the Native VLAN, in which case the tag is removed. Define the Native VLAN in the Trunk mode native VLAN field and the other allowed VLANs in the Trunk mode allowed VLANs field. d. Optionally, select Trusted to configure this as a trusted port. 5. Click Apply.
Use the following commands to configure Ethernet port bridging via the CLI.
(host)(config) #ap wired-ap-profile <profile> forward-mode bridge wired-ap-enable
Optionally, you can configure the following wired AP profile settings:
(host)(config) #ap wired-ap-profile <profile> switchport mode {access | trunk} switchport access vlan <vlan> switchport trunk native vlan <vlan> switchport trunk allowed vlan <vlan> trusted
Configuring Ethernet Ports for Secure Jack Operation
You can configure the Ethernet port(s) on mesh nodes to operate in tunnel mode. Known as secure jack operation for mesh, this configuration allows Ethernet frames coming into the specified wired interface to be generic routing encapsulation (GRE) tunneled to the controller. Likewise, Ethernet frames coming from the tunnel are bridged to the corresponding wired interface. This allows an Ethernet port on the mesh node to appear as an Ethernet port on the controller separated by one or more Layer-3 domains. You can also enable VLAN tagging.
Unlike secure jack on non-mesh APs, any mesh node configured for secure jack uses the mesh link, rather than enet0, to tunnel the frame to the controller.
When configuring mesh Ethernet ports for secure jack operation, note the following guidelines:
l Mesh points support secure jack on enet0 and enet1. l Mesh portals only support secure jack on enet1. This function is only applicable to Dell APs that support a
second Ethernet port and mesh, such as the W-AP130 Series.
You configure secure jack operation in the wired AP profile.
The parameters in the wired AP profile only apply to the wired AP interface to which they are applied. Two wired interfaces can have different parameter values.
In the WebUI
Use the following procedure to configure secure jack operation using the WebUI.
1. Navigate to the Configuration > Wireless > AP Configuration > AP Group window.

653 | Secure Enterprise Mesh

Dell Networking W-Series ArubaOS 6.4.x | User Guide

2. Click the AP group with the wired AP profile you want to edit. 3. Under the Profiles list, expand the AP menu, then select Wired AP profile. The settings for the currently
selected wired AP profile appear. You can use a different wired AP profile by selecting a profile from the Wired AP profile drop-down list. 4. In the Profile Details window pane, do the following: a. Select the Wired AP enable check box. This option is not selected by default. b. From the Forward mode drop-down list, select tunnel. c. Optionally, select Trusted to configure this as a trusted port. 5. Click Apply.
In the CLI
To configure secure jack operation using the command-line interface, access the CLI in config mode and issue the following commands: (host)(config) #ap wired-ap-profile <profile>
forward-mode tunnel wired-ap-enable
Optionally, you can configure the following wired AP profile settings: (host)(config) #ap wired-ap-profile <profile>
trusted
Extending the Life of a Mesh Network
To prevent your mesh network from going down if you experience a controller failure, modify the following settings in the AP system profile(s) used by mesh nodes to maintain the mesh network until the controller is available:
It is recommended to use the default maximum request retries and bootstrap threshold settings for most mesh networks; however, if you must keep your mesh network alive, you can modify the settings as described in this section. The modified settings are not applicable if mesh portals are directly connected to the controller.
l Maximum request retries: maximum number of times to retry AP-generated requests. The default is 10 times. If you must modify this setting, it is recommended to set a value of 10,000.
l Bootstrap threshold: number of consecutive missed heartbeats before the AP rebootstraps. (Heartbeats are sent once per second.) The default is 9 missed heartbeats. If you must modify this setting, it is recommended to set a value of 5,000.
When the controller comes back online, the affected mesh nodes (mesh portals and mesh points) rebootstrap; however, the mesh link is not affected and continues to be up.
In the WebUI
Use the following procedure to modify the AP system profile via the WebUI. 1. Navigate to the Configuration > Wireless > AP Configuration > AP Group window. 2. Click the AP group with the AP system profile you want to edit. 3. Under Profiles list, expand the AP menu, then select AP system profile. The settings for the currently
selected AP system profile appear in the Profile Details window pane. 4. Make the following changes in the Profile Details window pane.
a. Change the Maximum Request Retries to 10000. b. Change the Bootstrap threshold to 5000. 5. Click Apply.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Secure Enterprise Mesh | 654

In the CLI
To modify the AP system profile via the command-line interface, access the CLI in config mode and issue the following commands:
(host)(config) #ap system-profile <profile> max-request-retries 10000 bootstrap-threshold 5000
Provisioning Mesh Nodes
Provisioning mesh nodes is similar to thin APs; however, there are some key differences. Thin APs establish a channel to the controller from which they receive the configuration for each radio interface. Mesh nodes, in contrast, get their radio interfaces up and running before making contact with the controller. This requires a minimum set of parameters from the AP group and mesh cluster that enables the mesh node to discover a neighbor to create a mesh link and subsequent channel with the controller. To do this, you must first configure mesh cluster profiles for each mesh node prior to deployment. See Creating and Editing Mesh Radio Profiles for more information.
On each radio interface, you provision a mode of operation: mesh node or thin AP (access) mode. If you do not specify mesh, the AP operates in thin AP (access) mode. If you configure mesh, the AP is provisioned with a minimum of two mesh cluster profiles: the "default" mesh cluster profile and an emergency read-only recovery profile, as described in the section Configuring Mesh Cluster Profiles. If you create and select multiple mesh cluster profiles, the AP is provisioned with those as well. If you have a dual-radio AP and configure one radio for mesh and the other as a thin AP, each radio is provisioned as configured.
Each radio provisioned in mesh mode can operate in one of two roles: mesh portal or mesh point. You explicitly configure the role, as described in this section. This allows the AP to know whether it uses the mesh link (via the mesh point/mesh portal) or an Ethernet link to establish a connection to the controller.
During the provisioning process, mesh nodes look for a mesh profile that the AP group and AP name is a member of and stores that information in flash. If you have multiple cluster profiles, the mesh portal uses the best profile to bring-up the mesh network. Mesh points in contrast go through the list of mesh cluster profiles in order of priority to decide which profile to use to associate themselves with the network. In addition, when a mesh point is provisioned, the country code is sent to the AP from its AP name or AP group along with the mesh cluster profiles. Mesh nodes also learn the recovery profile, which is automatically generated by the master controller. If the other mesh cluster profiles are unavailable, mesh nodes use the recovery profile to establish a link to the master controller; data forwarding does not take place.
If you create a new mesh cluster profile for an existing deployment, you must re-provision the AP for the new profile to take effect. If you re-provision mesh nodes that are already operating, re-provision the most distant (highest hop count) mesh points first followed by the mesh portals. If you re-provision the mesh portal first, the mesh points may be unable to form a mesh link. Re-provisioning the AP causes it to automatically reboot. This may cause a disruption of service to the network.
Provisioning Caveats
Remember the following when provisioning APs for mesh:
l You must provision the AP before you install it as a mesh node in a mesh deployment. To provision the AP, it must be physically connected to the local network or directly connected to the controller. When connected and powered on, the AP must also be able to obtain an IP address from a DHCP server on the local network or from the controller.
l Make sure the provisioned mesh nodes form a connected mesh network before physically deploying the APs. For more information, see Verifying Your Mesh Network.

655 | Secure Enterprise Mesh

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l In multi-controller networks, save your mesh cluster configuration before provisioning the mesh nodes. To save your configuration in the WebUI, at the top of any window click Save Configuration. To save your configuration in the CLI, use the command write memory.
l If the same port on the controller is used to provision APs and provide PoE for mesh nodes, you must stop traffic from passing through that port after you provision the AP. To stop traffic, shut down (disable) the port either by using the CLI command interface fastethernet <slot>/<port> shutdown, or by following the procedure below. 1. Navigate to the Configuration > Network > Ports window. 2. Under Port Selection, click the port to configure. 3. Under Configure Selected Port, deselect (uncheck) Enable Port. 4. Make sure Enable 802.3af Power Over Ethernet is selected. 5. Click Apply.
Provisioning Mesh Nodes
Reprovisioning the AP causes it to automatically reboot. The following procedures describe the process to provision a mesh portal or mesh node via the WebUI or CLI. (The easiest way to provision a mesh node is to use the Provisioning window in the WebUI.) To provision a remote mesh portal, see Configuring Remote Mesh Portals (RMPs).
In the WebUI
1. Navigate to the Configuration > Wireless > AP Installation > Provisioning window. Select the AP to provision for mesh and click Provision.
2. In the Master Discovery section, set the Master IP address as the controller IP address. 3. In the IP settings section, select Obtain IP Address Using DHCP. 4. In the AP List section, do the following:
l Configure the Mesh Role: l To configure the AP as the mesh portal, select Mesh Portal. l To configure the AP as a mesh point, select Mesh Point.
l Configure the Outdoor Parameters, if needed. The following parameters are available only if configuring an outdoor AP: l Latitude coordinates (degrees, minutes, seconds, north or south) l Longitude coordinates (degrees, minutes, seconds, east or west) l Altitude (in meters) l Antenna bearing (horizontal coverage) l Antenna tilt angle (optimum coverage)
The above parameters apply to all outdoor APs, not just outdoor APs configured for mesh.
5. Click Apply and Reboot. After the controller reboots, mesh cluster profiles are extracted from the AP group and the AP name.
In the CLI
When you use the command-line interface to reprovision a mesh node, you may also provision other AP settings. Access the CLI in config mode and issue the following commands:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Secure Enterprise Mesh | 656

(host)(config) #provision-ap read-bootinfo ap-name <name> mesh-role {mesh-point|mesh-portal} reprovision ap-name <name>
If you are provisioning an outdoor AP, you can also configure the following parameters:
(host)(config) #provision-ap read-bootinfo ap-name <name> mesh-role {mesh-point|mesh-portal} a-ant-bearing <bearing> a-ant-tilt-angle <angle> g-ant-bearing <bearing> g-ant-tilt-angle <angle> altitude <altitude> latitude <location> longitude <location> reprovision ap-name <name>
Verifying Your Mesh Network
To view a list of your Mesh APs via the WebUI, navigate to the one of the following windows:
l Monitoring > Network > All Mesh Nodes l Monitoring > Controller > Mesh Nodes
To view mesh APs and the mesh topology tree using the command line interface, access the command-line interface in enable mode and issue the following commands:
l #show ap mesh active
l #show ap mesh topology
Verification Checklist
After provisioning the mesh APs, follow the steps below to ensure that the mesh network is up and operating correctly.
l Issue the command show ap mesh topology to verify all the mesh APs are up and the topology is as expected. (Wait 10 minutes after startup for the topology to stabilize.)
l Verify each mesh node has the expected RSSI to its neighboring mesh nodes. The mesh topology is updated periodically, so access the command-line interface and issue the command show ap mesh neighbors for the current status. If the RSSI is low, verify that the tx-power settings in the mesh node's 802.11a/802.11g radio profiles are correct, or, if ARM is used, verify the correct minimum tx-power setting.
l Issue the command show ap mesh debug provisioned-clusters to verify that the mesh clusters are correctly defined and provisioned (with encryption if desired). Issue the show running-config | include recovery command to verify that the cluster's recovery profile matches the controller's recovery profile.
l Verify antenna provisioning by issuing the show ap provisioning command and verify installation parameters for non-default installations (that is, standard indoor APs deployed outside, or outdoor APs deployed inside). Ensure all APs use the same channel list by issuing the show ap allowed-channels command.
l If the mesh-radio is to be reserved exclusively for mesh backhaul traffic, issue the command show ap profile-usage to identify the radio's 802.11a or 802.11g radio profile, then issue the command show rf dot11a-radio-profile <profile> or show rf dot11g-radio-profile <profile> to verify the radio is disabled in the profile. Next, use the show ap bss-table command to that verify no access Virtual APs are up on the mesh radio.

657 | Secure Enterprise Mesh

Dell Networking W-Series ArubaOS 6.4.x | User Guide

CLI Examples

Use the show ap mesh active command to verify all nodes are present and that EIRP is correct:

(host) #show ap mesh active

Mesh Cluster Name: meshprofile1

------------------------------

Name Group IP Address

BSSID

---- ----- ----------

-----

mp1

mp1

10.3.148.245 00:1a:1e:85:c0:30

mp2

mp2

10.3.148.250 00:1a:1e:88:11:f0

mp3

mp3

10.3.148.253 00:1a:1e:88:01:f0

mpp

mpp125 10.3.148.252 00:1a:1e:88:05:50

Band/Ch/EIRP/MaxEIRP MTU Enet 0/1 Mesh Role -------------------- --- -------- --------802.11a/157/19/36 Off/Off Point 802.11a/157/19/36 Bridge/Bridge Point 802.11a/157/19/36 Bridge/Bridge Point 802.11a/157/19/36 1578 -/Bridge Portal

Parent #Children

------ ---------

mp3

0

mpp

1

mp2

1

-

1

AP Type ------125 125 125 125

Uptime -----13d:2h:25m:19s 14d:21h:23m:49s 14d:21h:14m:55s 14d:19h:5m:3s

Use the show ap mesh topology command to verify the cluster topology, RSSI in presence of network traffic, and Tx and Rx rates.

(host) #show ap mesh topology

Mesh Cluster Name: sw-ad-GB32 ----------------------------Name Mesh Role Parent Path Cost ---- --------- ------ --------Update Uplink Age #Children ---------- ---------- ---------

Node Cost ---------

Link Cost ---------

Hop Count ---------

RSSI ----

Rate Tx/Rx ----------

Last

ad-ap Point (N) mp3

2

0

0

1

61 300/270

6m:12s

3h:8m:7s 0

msc-1 Point

mp3

2

00

1

64 54/54

6m:36s

2h:48m:12s 0

Total APs :2 (R): Recovery AP. (N): 11N Enabled. For Portals 'Uplink Age' equals uptime.
Issue the command show ap mesh neighbors ap-name <name> to verify visibility of other mesh nodes is as expected:(host) #show ap mesh neighbors ap-name portal

Neighbor list

-------------

MAC

Portal

Channel Age Hops Cost Relation

Flags RSSI

Rate Tx/Rx

---

------

------- --- ---- ---- --------

----- ---- --

--------

00:0b:86:e8:09:d1 00:1a:1e:88:01:f0 157

01

11.00 C 3h:15m:42s -

65

54/54

00:1a:1e:88:02:91 00:1a:1e:88:01:f0 157

01

4.00 C 3h:35m:30s HL

59

300/300

00:0b:86:9b:27:78 Yes

157

00

12.00 N 3h:22m:46s -

26 -

00:0b:86:e8:09:d0 00:1a:1e:88:01:f0 157

01

11.00 N 3h:15m:36s -

65 -

00:1a:1e:88:02:90 00:1a:1e:88:01:f0 157+

01

2.00 N 3h:35m:6s HL

59 -

A-Req A-Resp A-Fail HT-Details ----- ------ ------ ----------

Cluster ID ----------

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Secure Enterprise Mesh | 658

1

1

0

Unsupported

sw-ad-GB32

1

1

0

HT-40MHzsgi-2ss sw-ad-GB322

0

0

0

Unsupported

mc1

0

0

0

Unsupported

sw-ad-GB32

0

0

0

HT-40MHzsgi-2ss sw-ad-GB32

Total count: 5, Children: 2

Configuring Remote Mesh Portals (RMPs)
The following steps describe the procedure to configure a Remote Mesh portal using the WebUI and CLI interfaces.
Creating a Remote Mesh Portal In the WebUI
A remote mesh portal must be provisioned as both a remote access point and a mesh portal. For instructions on provisioning the remote mesh portal as a remote access point, see Configuring the Secure Remote Access Point Service on page 722. Wired ports on remote mesh portals can be configured in either bridge or split-tunnel forwarding mode. However, there are limitations to the forwarding modes that can be used by other mesh node types. Do not use bridge or split-tunnel forwarding mode for wired ports on mesh points. Virtual APs on remote mesh portals and remote mesh points also do not support bridge or split-tunnel forwarding mode.
A remote mesh portal does not support bridge mode Virtual APs or offline Virtual APs.

Step 1: Provision the AP
1. Navigate to the Configuration > Wireless > AP Installation > Provisioning window. 2. Select the AP to provision as a remote mesh portal and click Provision. The Provisioning window appears. 3. In the Authentication section, select the Remote AP radio button. 4. In the Remote AP Authentication Method section of this window, select either Pre-shared Key or
Certificate. If you selected Pre-Shared Key, enter and confirm the Internet Key Exchange Pre-Shared Key (IKE PSK). 5. In the Master Discovery section, set the Master IP address as the controller IP address. 6. In the IP settings section, select Obtain IP Address Using DHCP. 7. In the AP List section at the bottom of the window, click the Mesh Role drop-down list and select Remote Mesh Portal.
Step 2: Define the Mesh Private VLAN in the Mesh Radio Profile
Follow the procedure below to choose a new, non-zero tag value for the mesh private VLAN. Make sure that the mesh private VLAN so that it does not conflict with any local tags assigned in the mesh network. Once configured, all mesh points come up in that Mesh Private Vlan. This mesh private VLAN must not be used as a VLAN for any other virtual AP.
1. Edit the Mesh Radio profile for the remote mesh portal according to the procedure described in Creating or Editing a Mesh Radio Profile on page 641 .
2. Set the Mesh Private VLAN parameter to define a VLAN ID (0­4094) for control traffic between an remote mesh point and mesh nodes.
3. Click Apply to save your changes.

659 | Secure Enterprise Mesh

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Next, assign the remote mesh points with the same mesh cluster profile, 802.11a and 802.11g RF management profiles, and mesh radio profile as the remote mesh portal. If you have defined an AP group for all your remote mesh points, you can just assign the required profiles to the remote mesh point AP group. Otherwise, you must assign the required profiles to each individual remote AP.
Step 3: Assign the Mesh Radio Profile to a Remote Mesh AP
Follow the procedures described in Assigning a Mesh Radio Profile to a Mesh AP or AP Group on page 644
Step 4: Assign an RF Management Profile to a Remote Mesh AP
Follow the procedures described in Assigning an 802.11a/802.11g Profile to an AP or AP Group on page 599 to assign an 802.11a or 802.1g RF management profile to the remote mesh AP.
Step 5: Assign a Mesh Cluster Profile
Follow the procedures described in Configuring Mesh Cluster Profiles on page 636 to assign a mesh cluster profile to the remote mesh AP.
If you configure multiple cluster profiles with different cluster priorities, you manually override the link metric algorithm because the priority takes precedence over the path cost. In this scenario, the mesh portal uses the profile with the highest priority to bring-up the mesh network.
Step 6: Configuring a DHCP Pool
In this next step, you must configure a DHCP pool where the DHCP server is on the subnet associated with mesh private VLAN. Mesh points get their IP address from this subnet pool. To complete this task, refer to the procedure described in Enabling Remote AP Advanced Configuration Options.
Step 7: Configuring the VLAN ID of the Virtual AP Profile
Follow the procedure described in SSID Profiles on page 492 to configure the VLAN ID of the remote mesh AP's SSID profile. The VLAN of this Virtual AP must have the same VLAN ID as the mesh private VLAN.
Provisioning a Remote Mesh Portal In the CLI
Reprovisioning the AP causes it to automatically reboot. When you use the CLI to reprovision a mesh node, you may also provision other AP settings. (host)(config) #provision-ap
read-bootinfo ap-name <name> mesh-role remote-mesh-portal reprovision ap-name <name>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Secure Enterprise Mesh | 660

Chapter 24 Increasing Network Uptime Through Redundancy and VRRP

A single controller at the core of a network can represent a single point of failure. ArubaOS high availability and Virtual Router Redundancy Protocol (VRRP) redundancy features allow network administrators to significantly reduce network downtime and client traffic disruption during network upgrades or unexpected failures.
High Availability
When you enable the High Availability WLAN redundancy solution, campus APs that lose contact with their active controller do not need to re-bootstrap when they failover to the standby controller, significantly reducing AP downtime. APs using the High Availability features regularly communicate with the standby controller so the controller has a light workload to process in the event of an AP failover. This results in very rapid failover times and a shorter client reconnect period. Therefore, High Availability is usually preferable to other redundancy solutions (like a backup-LMS) that can put a heavy load on the backup controller during failover, which results in slower failover performance. High Availability supports failover for campus APs using tunnel, decrypt-tunnel, or bridge forwarding modes. It does not support failover for remote APs.
AP Fast Failover on bridge forwarding mode virtual AP is supported on the W-7000 and W-7200 Series controllersonly.
Pre-Deployment Information
For information to help you plan your high availability solution, refer to the following sections of this document: l High Availability Deployment Models on page 662 l High Availability Extended Controller Capacity on page 665 l Client State Synchronization on page 664 l High Availability Inter-Controller Heartbeats on page 665
Configuration Procedures
For more information on configuring the high availability feature, refer to the following sections of this document: l Configuring High Availability on page 667 l Migrating from VRRP or Backup-LMS Redundancy on page 669
VRRP-Based Redundancy
The Virtual Router Redundancy Protocol (VRRP) is used to create various redundancy solutions, including pairs of local controllers acting in an active-active mode or a hot-standby mode, or a master controller backing up a set of local controllers. The master controller owns the configured virtual IP address for the VRRP instance. When the master controller becomes unavailable, a backup controller steps in as the master and takes ownership of the virtual IP address. All network elements (APs and other controllers) can be configured to access the virtual IP address, thereby providing a transparent redundant solution to your network.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Increasing Network Uptime Through Redundancy and VRRP | 661

VRRP eliminates a single point of failure by providing a mechanism to elect a VRRP "master" controller. If VRRP preemption is disabled (the default setting) and all controllers share the same priority, the first controller that comes up becomes the master. However, if VRRP preemption is enabled and all controllers share the same priority, the controller with the highest IP address becomes the master. For more information on configuring the VRRP-Based Redundancy, refer to Configuring VRRP Redundancy on page 670.
High Availability Deployment Models
High availability supports the following deployment modes. l Active/Active Deployment Model on page 662 l 1:1 Active/Standby Deployment Model on page 662 l N:1 Active/Standby Deployment Model l Master-Redundancy Deployment Model
The High Availability Fast Failover feature supports APs in campus mode using tunnel, decrypt-tunnel, or bridge forwarding modes. This feature is not supported on remote APs or mesh APs in any mode.
Active/Active Deployment Model
In this model, two controllers are deployed in dual mode. Controller one acts as a standby for the APs served by controller two, and vice-versa. Each controller in this deployment model supports approximately 50% of its total AP capacity; if one controller fails, all the APs served by that controller would failover to the other controller, providing high availability redundancy to all APs in the cluster.
Figure 79 Active-Active HA Deployment

1:1 Active/Standby Deployment Model
In this model, the active controller supports up to 100% of its rated capacity of APs, while the other controller is idle in standby mode. If the active controller fails, all APs served by the active controller will failover to the standby controller.

662 | Increasing Network Uptime Through Redundancy and VRRP

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 80 1:1 Active/Standby Deployment
N:1 Active/Standby Deployment Model
In this model, the active controller supports up to 100% of its rated AP capacity, while the other controller is idle in standby mode. If an active controller fails, all APs served by the active controller will failover to the standby controller. This model requires that the AP capacity of the standby controller is able to support the total number of APs distributed across all active controllers in the cluster. In the cluster shown in the example below, the standby controller has enough AP capacity to support the total number of APs terminating at the active controllers ( Controller 1 and Controller 2). Figure 81 1:1 Active/Standby Deployment

Master-Redundancy Deployment Model
ArubaOS supports VRRP-based LMS redundancy in a deployment with master-master redundancy. In the topology below, when an AP connects to the master controller (M1), the AP receives a standby IP, which it uses to establish a standby connection to the backup master (M2). If the active master becomes unreachable or reboots, the backup master changes its VRRP role to master and accepts active AP connections.
When M1 comes back up, it initially acts as a backup master, and APs associated to M2 establish a standby connection to M1. When the controllers change roles and M1 becomes the active master once again, M2 forces the APs to use M1 as their active master. If an AP has not established a connection to M1 before it disassociates from M2, the AP rebootstraps before it reconnects back to M1.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Increasing Network Uptime Through Redundancy and VRRP | 663

Figure 82 Redundancy with a Active-Backup Master Controller Pair

When a VRRP instance is configured on the controller vlan, there would be no change in the VRRP state if the failover scenario was tested by shutting down the port or bringing down the vlan. The controller remains in the Master state and sends VRRP advertisements, which do not reach the peer controller. When the port is down, the peer controller becomes the Master. However, when the port on the previous master is enabled, it takes over the Master state. The peer controller moves out of the master state when the original master sends a higher priority advertisement, even when preemption is not enabled. The peer controller will not be preempted if the master controller crashes or reboots.
AP Communication with Controllers
The High Availability features work across Layer-3 networks, so there is no need for a direct Layer-2 connection between controllers in a high-availability group.
When the AP first connects to its active controller, the active controller provides the IP address of a standby controller, and the AP attempts to establish a tunnel to the standby controller. If an AP fails to connect to the first standby controller, the active controller will select a new standby controller for that AP, and the AP will attempt to connect to that standby controller.
An AP will failover to its backup controller if it fails to contact its active controller through regular heartbeats and keepalive messages, or if the user manually triggers a failover using the WebUI or CLI.
High Availability for bridge mode is supported on Campus APs. In this mode, the controller sends ACL Names to the APs instead of the ACL IDs. These APs generate and maintain the mapping between the ACL Name and ACL Id . In the event of a failover the ACL Name is sent to the AP from the stand-by controller. Since AP maintains the mapping, the ACL Ids remain intact during a failover.
Client State Synchronization
Client state synchronization allows faster client reauthentication in the event of a controller failure by synchronizing PMK and Key cache entries between active and standby controllers. When you enable this feature, clients only need to perform a four-way key exchange to reconnect to the network (instead of performing a full authentication to the RADIUS server), dramatically shortening the time required for the client to reconnect.
The following section of this document describes topologies, guidelines, and limitations for this feature. To view the procedure for enabling the client state synchronization feature, see Configuring High Availability.

664 | Increasing Network Uptime Through Redundancy and VRRP

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Feature Guidelines and Limitations
Note the following guidelines and limitations before enabling this feature in your high availability deployment:
l W-3600, W-7000, and W-7200 Series controllers, and W-6000M3 controller modules support this client state synchronization. This feature is not supported by W-3200, W-3400, and W-600 Series controllers.
l Only APs that support 802.11n and 802.11ac support client state synchronization. l The client state synchronization and standby controller over-subscription features are mutually
incompatible and cannot be enabled simultaneously. If your deployment uses the standby controller oversubscription feature, the feature must be disabled before enabling state synchronization.
High Availability Inter-Controller Heartbeats
The high availability inter-controller heartbeat feature allows for faster AP failover from an active controller to a standby controller, especially in situations where the active controller reboots or loses connectivity to the network.
The inter-controller heartbeat feature works independently from the AP mechanism that sends heartbeats from the AP to the controller. If enabled, the inter-controller heartbeat feature supersedes the AP's heartbeat to its controller. As a result, if a standby controller detects missed inter-controller heartbeats from the active controller, it triggers its standby APs to failover to the standby controller, even if those APs have not detected any missed heartbeats between the APs and their active controller. Use this feature with caution in deployments where the active and standby controllers are separated over high-latency WAN links.
When this feature is enabled, the standby controller starts sending regular heartbeats to an AP's active controller as soon as the AP has an UP status on the standby controller. The standby controller initially flags the active controller as unreachable, but changes its status to reachable as soon as the active controller sends a heartbeat response. If the active controller later becomes unreachable for the number of heartbeats defined by the heartbeat threshold (default of 5 missed heartbeats), the standby controller immediately detects this error and informs the APs using the standby controller to failover from the active controller to the standby controller. If, however, the standby controller never receives an initial heartbeat response from the active controller, and therefore never marks the active controller as initially reachable, the standby controller will not initiate a failover.
This feature is disabled by default. It can be used in conjunction with the high availability state synchronization feature only in topologies that use a single active and standby controller, or a pair of dual-mode active controllers that act as standby controllers for each other. High availability inter-controller heartbeats can be enabled and configured in the high-availability group profile using the WebUI or Command-Line interface.
For more details on how to enable and configure inter-controller heartbeats, see Configuring High Availability on page 667.
High Availability Extended Controller Capacity
The standby controller over-subscription feature allows a standby controller to support connections to standby APs beyond the controller's original rated AP capacity. This feature is an enhancement to the high availability feature introduced in ArubaOS 6.3.0.0, which requires the standby controller to have an AP capacity equal to or greater than the total AP capacity of all the active controllers it supports.
The following section of this document gives and lists requirements and capacity limitations for this feature. For more details on enabling the extended standby controller capacity, see Configuring High Availability on page 667.
Starting with ArubaOS 6.4.0.0, W-7000 and W-7200 Seriescontrollers that acts as a standby controller can oversubscribe to standby APs by up to four times that controller's rated AP capacity. A standby W-

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Increasing Network Uptime Through Redundancy and VRRP | 665

6000M3 controller module or W-3600 controller can oversubscribe by up to two times its rated AP capacity, as long as the tunnels consumed by the standby APs do not exceed the maximum tunnel capacity for that standby controller.
Feature Requirements
This feature can be enabled on controllers in a master-local topology where centralized licensing is enabled on the active and standby controllers, or on independent master controllers that are not using VRRP-based redundancy. If centralized licensing is disabled, the standby AP over-subscription feature is also disabled. Standby controller over-subscription and the high availability state synchronization features are mutually incompatible and cannot be enabled simultaneously. If your deployment uses the state synchronization feature, you must disable it before you enable standby controller over-subscription.
W-3200, W-3400 and W-600 Series controllers do not support this feature.

Standby Controller Capacity
The following table describes the AP over-subscription capacity maximum supported tunnels and the controllers that support this feature.

Table 129: Controller Support for Standby Oversubscription

Controller Model

Standby AP Capacity

W-6000M3

2x rated AP capacity

W-3600

2x rated AP capacity

W-7210

4x rated AP capacity

W-7220

4x rated AP capacity

W-7240

4x rated AP capacity

Maximum Tunnels Supported 16384 tunnels 16384 tunnels 16384 tunnels 32768 tunnels 65536 tunnels

To determine the number of standby tunnels consumed by APs on each active controller, multiply the number of APs on the active controllers by the number of BSSIDs per AP. For example, consider a deployment with four active W-7210 controllers that each have 512 APs with 8 BSSIDs. The APs on each active controller consume (512 * 8) tunnels, for a combined total of 16,384 tunnels. A single W-7210 controller using the standby controller over-subscription feature can act as the standby controller for all four active controllers in this example because this topology is within the 4x rated AP capacity limit and maximum tunnel limit for the W7210 controller model.
If the network administrator later changed all the APs in this deployment to support 10 BSSIDs, each active controller would use (512 * 10) tunnels, for a combined total of 20,480 tunnels on the four active controllers. The tunnels required by the APs on the active controllers would then exceed the maximum tunnel limit for the standby controller, so the standby controller can no longer support all APs on the active controllers. Dynamic changes to configuration (such as the addition of BSSIDs to any AP group) causes all the standby APs to disconnect and reconnect back to the standby controller defined by their updated configuration
To view information about the numbers of currently associated APs and supported BSS tunnels, and the remaining capacity for additional APs and BSS tunnels, issue the CLI command show ha oversubscription statistics.

666 | Increasing Network Uptime Through Redundancy and VRRP

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AP Failover
If a standby controller reaches its AP over-subscription capacity or exceeds its maximum BSSID limit, the standby controller drops any subsequent standby AP connections. A dropped AP attempts to reconnect to the standby controller, but after it exceeds the maximum number of request retries, the AP informs the active controller that it is unable to connect to the standby controller. The active controller then prompts the AP to create a standby tunnel to another standby controller, if one is configured.
If an active controller fails, the APs on the active controller failover to the standby controller. Once the standby controller has reached its capacity for active APs, it terminates tunnels to any standby APs that the controller can no longer serve. When these APs detect that there is no longer a heartbeat between the AP and the standby controller, they notify their active controller that they can no longer connect to the standby. The active controller then prompts the APs to establish standby tunnels to another standby controller, if one is configured.
Configuring High Availability
A controller using this feature can have one of three high availability roles: active, standby, or dual. An active controller serves APs, but cannot act as a failover standby controller for any AP except those that it serves as an active controller. A standby controller acts as a failover backup controller, but cannot be configured as the primary controller for any AP. A dual controller can support both roles, acting as the active controller for one set of APs, and a standby controller for another set of APs.
Starting with ArubaOS 6.4, a controller is assigned the dual role if no other role is specified

The high availability feature supports redundancy models with an active controller pair, or an active/standby deployment model with one backup controller supporting one or more active controllers. Each of these clusters of active and backup controllers comprises a high-availability group. All active and standby controllers within a single high-availability group must be deployed in master-local or independent masters topology. An independent masters topology requires all independent master controllers to have the same WLAN configuration.
Pre-Deployment Information
Refer to the following sections of this document for deployment models and feature details to help you plan your high availability solution: l High Availability Deployment Models on page 662 l High Availability Extended Controller Capacity on page 665 l Client State Synchronization on page 664 l High Availability Inter-Controller Heartbeats on page 665
Configuring High Availability
Configure the high availability feature in the WebUI or CLI using the high-availability and high-availability group profiles.
In the WebUI
To configure High Availability using the WebUI: 1. Navigate to Configuration > Advanced Services > Redundancy. 2. In the HA group information section in the right window pane, click Add New. A pop-up window will appear. 3. In the Name field, enter a name for the HA group you just created.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Increasing Network Uptime Through Redundancy and VRRP | 667

4. In the controller IP address field, enter the IP address of a controller in the HA group.
5. Click the IP Version drop-down list and select either IPv4 or IPv6 to identify the IP address version type used by the controller.
6. Click the Role drop-down list to assign a role to the controller. The IP address of each controller must be reachable by APs and must be the IP address that appears in the Configuration > Controller > System settings tab of the controller WebUI, or in the output of the show controller-ip CLI command.
l Active: Controller is active and serving APs.
l Dual: Controller serves some APs and acts as a standby controller for other APs.
l Standby: Controller does not serve APs and only acts as a standby in case of failover.
7. Click Add to add the controller to the group.
8. (Optional) The high availability inter-controller heartbeat feature allows for faster AP failover from an active controller to a standby controller, especially in situations where the active controller reboots or loses connectivity to the network. To edit the default heartbeat threshold and interval values:
a. Enter a heartbeat threshold in the Heartbeat Threshold field to define the number of heartbeats that must be missed before the APs are forced to failover to the standby controller. This value must be between 3 and 10, inclusive.
b. Enter a heartbeat interval in the Heartbeat Interval field to define how often inter-controller heartbeats are sent. This value must be between 100 and 1000 ms, inclusive.
9. (Optional) State synchronization improves failover performance by synchronizing client authentication state information from the active controller to the standby controller. To use the state synchronization feature, enter a pre-shared key into the Pre-shared key field. Note, however, that this feature will not be enabled until you complete the task in step 13 on page 668
10.Click OK. The popup window closes, and the name of the new HA group appears in the HA Group Configuration field on the Configuration > Advanced Services > Redundancy page.
11.(Optional) Select the Preemption checkbox to require APs that has failed over to a standby to attempt to connect back to its original active controller once the controller is reachable again. When you enable this setting, the AP will wait for the time specified by the lms-hold-down-period parameter in the ap system profile before the AP attempts to switch back from the standby controller to the orginal controller.
12.(Optional) The standby controller over-subscription feature allows a standby controller to support connections to standby APs beyond the controller's original rated AP capacity. To enable this feature, click the Oversubscription checkbox.
13.(Optional) if you defined a pre-shared key in step 9 on page 668, select the State Synchronization checkbox to enable this feature. (For more information about State Synchronization, see Client State Synchronization on page 664)
14.(Optional) The inter-controller heartbeat feature allows for faster AP failover from an active controller to a standby controller by enabling regular heartbeats between a standby controller and an active controller
15.Click Apply.
In the CLI
To configure a High Availability group using the command-line interface, access the CLI in config mode and issue the following commands. The high availability group profile should be configured with a pair of IPv4 controller addresses and pair of IPv6 controller addresses to allow an IPv4 or IPv6 access point to establish a connection to a standby controller.
ha group-profile <profile> clone <profile-name> controller <ipv4-ip-addr> role active|dual|standby controller-v6 <ipv6-ip-addr> role active|dual|standby heartbeat heartbeat-interval <heartbeat-interval>

668 | Increasing Network Uptime Through Redundancy and VRRP

Dell Networking W-Series ArubaOS 6.4.x | User Guide

heartbeat-threshold <heartbeat-threshold> no ... over-subscription pre-shared-key <key> preemption state-sync
A controller using the high availability features must be defined as a member of a high availability group. To add a controller to the new high availability group, issue following CLI command: (host)(config)#ha group-membership <ha-group>
Migrating from VRRP or Backup-LMS Redundancy
ArubaOS has a local management switch (LMS) and a backup LMS. In a typical deployment, the AP contacts the master controller and is directed to the controller that handles the AP connection and traffic via the LMS parameter. If the LMS becomes unreachable and a backup LMS is specified, the AP attempts to reconnect to that backup controller. This function provides Layer 3 and site redundancy when this level of redundancy is required.
High Availability: Fast Failover provides redundancy for APs, but not for controllers. Deployments that require master controller redundancy should continue to use an existing VRRP redundancy solution.
If your deployment currently uses a backup-LMS or VRRP redundancy solution, use the following procedures to migrate to a High-Availability-based solution. For more information on this topology, see MasterRedundancy Deployment Model on page 663.
Configuring a Master Controller for Redundancy and High Availability
Starting with ArubaOS 6.4, a backup master controller can use the High Availability feature. However, a backupmaster controller can only accept standby connections from APs, and will not serve active APs as long as its master redundancy role is backup.
This type of High Availability deployment has the following requirements and limitations:
l A backup-master controller can only form an active-standby pair with the master controller. l The backup master cannot terminate active APs. l Both the backup-master and master controllers must be configured with the dual controller role. l The controller IP address defined in the high availability group profile must be the IP address of the VRRP
interface. l The inter-controller heartbeat feature is not recommended for backup-master and master
controller pairs using the High Availability feature. If the inter-controller heartbeat feature is enabled in a high availability group profile for redundant masters, the inter-controller failover time must be greater than the VRRP failover time. That is, the (heartbeat interval * heartbeat threshold threshold) value should be greater than the (advertisement time * 3 + preemption delay + skew time [which is based on priority]).
Perform the following steps to configure controller high availability on a backup-master and master controller pair.
1. Configure the high-availability group profile with a dual role for the master controller. (host)(config) #ha group-profile grp1 (host)(HA group information "grp1"): controller <VRRP interface ipaddress> role dual 2. Configure the high-availability group profile with a dual role for the backup-master controller. (host) (HA group information "grp1"): controller <VRRP interface ipaddress> role dual

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Increasing Network Uptime Through Redundancy and VRRP | 669

Migrating from VRRP Redundancy
Perform the following steps to migrate from VRRP to High-Availability redundancy: 1. Remove the VRRP IP address as the LMS IP address of the AP.
(host) (AP system profile) #no lms-ip 2. Configure the AP to use the active controller's IP address (not VRRP the IP address) as the LMS-IP for the AP.
(host) (AP system profile) #lms-ip <ipaddress> 3. Configure the AP to use the standby controller IP address (not VRRP the IP address) as the backup LMS-IP
for the AP. (host) (AP system profile) #bkup-lms-ip <ipaddress> 4. Configure the master controller with a dual role in the high-availability group profile. (host) (config) #ha group-profile grp1 (host) (HA group information "grp1"): controller <ipaddress> role dual 5. Configure the standby controller with a dual role in the high-availability group profile. (host) (HA group information "grp1"): controller <ipaddress> role dual
Migrating from Backup-LMS Redundancy
Perform the following steps to migrate from Backup-LMS to High-Availability redundancy and maintain the existing configuration as defined by the lms-ip and bkup-lms-ip parameters in the AP system profile. 1. Configure the controller serving the AP with a dual role in the high-availability group profile.
(host) (config) #ha group-profile grp1 (host) (HA group information "grp1"): controller <ipaddress> role dual 2. Configure the AP's standby controller with a dual role in the high-availability group profile. (host) (HA group information "grp1"): controller <ipaddress> role dual
Configuring VRRP Redundancy
In a Dell network, APs are controlled by a controller. The APs tunnel all data to the controller for processing, including encryption/decryption and bridging/forwarding data. Local controller redundancy provides APs with failover to a backup controller if a controller becomes unavailable. Local controller redundancy is provided by running VRRP between a pair of controllers.The APs are then configured to connect to the "virtual-IP" configured for the VRRP instance.
The two controllers must be connected on the same broadcast domain (or Layer-2 connected) for VRRP operation. The two controllers should be of the same class (for example, and both should be running the same version of ArubaOS.
The following section of this document includes the following procedures: l Before you Begin on page 670 l Configuring the Local Controller for Redundancy on page 671 l Configuring the LMS IP on page 673 l Configuring the Master Controller for Redundancy on page 674 l Configuring Database Synchronization on page 675 l Enabling Incremental Configuration Synchronization (CLI Only) on page 676 l Configuring Master-Local Controller Redundancy on page 676
Before you Begin
Before you begin configuring VRRP redundancy, obtain the following network information:

670 | Increasing Network Uptime Through Redundancy and VRRP

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l VLAN ID for the two local controllers on the same Layer-2 network. l Virtual IP address to be used for the VRRP instance.
Configuring the Local Controller for Redundancy
You can use either the WebUI or CLI to configure VRRP on the local controllers. For this topology, it is recommended you use the default priority value.
In the WebUI
1. Navigate to the Configuration > Advanced Services > Redundancy page for each of the local controllers.
2. Under Virtual Router Table, click Add to create a new VRRP instance. 3. Select the IP version. 4. Enter the IPv4\IPv6 Address for the virtual router. Select the VLAN on which VRRP will run. Set the Admin
State to Up. 5. Configure other VRRP parameters as described in the table below. 6. Click Done, then save your configuration.

Table 130: VRRP Parameters

Parameter

Description

IP Version

Select IPv4 \ IPv6 from the drop-down list box.

Virtual Router ID

The ID uniquely identifies this VRRP instance. For ease in administration, you should configure this with the same value as the VLAN ID.

Advertisement Interval (secs)

This is the interval, in seconds, between successive VRRP advertisements sent by the current master. The default interval time is recommended.
Default: 1 second

Authentication Password

This is an optional password of up to eight characters that can authenticate VRRP peers in their advertisements. If this is not configured, there is no authentication password.

Description

This is an optional text description to describe the VRRP instance.

IP \ IPv6 Address

Based on the selection made in the IP version field, either IP Address \ IPv6 Address is displayed. This is the virtual IP address that will be owned by the elected VRRP master. Ensure that the same IP address and VRRP ID is used on each member of the redundant pair.
Note: The IP address must be unique and cannot be the loopback address of the controller. A maximum of only two virtual IPv6 addresses can be configured on each VRRP instance. Only IPv6 address format is supported for the v6 instance.

Enable Router Preemption

Selecting this option means that a controller can take over the role of master if it detects a lower priority controller currently acting as master.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Increasing Network Uptime Through Redundancy and VRRP | 671

Table 130: VRRP Parameters

Parameter

Description

Delay

Specifying a value enables the delay timer. The timer is triggered when the VRRP state moves out of backup or init state to become a master. This is applicable only if you enable router pre-emption.
When the timer is triggered, it forces VRRP to wait for a specified period of time, so that all the applications are ready before coming up. This prevents the APs from connecting to the controller before it can receive them. In the meantime, if there is an advertisement from another VRRP, the VRRP stops the timer and does not transition to master.

Priority

Priority level of the VRRP instance for the controller. This value is used in the election mechanism for the master.

Admin State

Administrative state of the VRRP instance. To start the VRRP instance, change the admin state to UP in the WebUI.

VLAN

VLAN on which the VRRP protocol runs.

Tracking

Configures a tracking mechanism that modifies a specified value to the priority after a controller has been the master for the VRRP instance. This mechanism is used to avoid failing over to a backup master for transient failures.
Tracking can be based on one of the following:
l Master Up Time: how long the controller has been the master. The duration is the length of time that the administrator expects will be long enough that the database gathered in the time is too important to be lost. This will vary from instance to instance.
l VRRP Master State Priority: the master state of another VRRP.
Tracking can also be based on the interface states of the controller:
l VLAN and Interface: prevents asymmetric routing by tracking multiple VRRP instances. The priority of the VRRP interface determined by the sub value can increase or decrease based on the operational and transitional states of the specified VLAN or Fast Ethernet/Gigabit Ethernet port. When the VLAN or interface comes up again, the value is restored to the previous priority level. You can track a combined maximum of 16 interfaces and VLANs.
NOTE: The tracked VLAN is different from the VRRP VLAN.
For example, you can track an interface that connects to a default gateway. In this situation, configure the VRRP priority to decrease and trigger a VRRP master re-election if the interface goes down. This not only prevents network traffic from being forwarded, but reduces VRRP processing.

Hold Time

The VRRP virtual router does not begin listening to advertisements until after this holdtime expires. If your deployment includes a VRRP master with preemption disabled and an uplink switch is running RSTP, a higher value will prevent the VRRP master from regaining the master state after it reboots.
The supported range is 30-120 seconds, and the default value is 45 seconds.

In the CLI
(host)(config)#vrrp <id>

672 | Increasing Network Uptime Through Redundancy and VRRP

Dell Networking W-Series ArubaOS 6.4.x | User Guide

advertise <interval> authentication <password> description <text> ip address <ipaddr> no... preempt priority <level> shutdown tracking interface {fastethernet <slot>/<port>|gigabitethernet <slot>/<port>}
{sub <value>} tracking master-up-time <duration> add <value> tracking vlan <vlanid> {sub <value>} tracking vrrp-master-state <vrid> add <value> vlan <vlanid>
(host) (config)#vrrp ipv6 <id> advertise <interval> description <text> ipv6 address <ipaddr> no... preempt priority <level> shutdown tracking interface {fastethernet <slot>/<port>|gigabitethernet <slot>/<port>} {sub <value>} tracking master-up-time <duration> add <value> tracking vlan <vlanid> {sub <value>} tracking vrrp-master-state <vrid> add <value> vlan <vlanid>
Configuring the LMS IP
Configure the APs to terminate their tunnels on the virtual-IP address. To specify the controller to which an AP or AP group tunnels client traffic, you configure the LMS IP in the AP system profile on the master controller. For information on how to configure the LMS IP in the AP system profile, see Optional AP Configuration Settings on page 584
This configuration must be executed on the master controller; the APs obtain their configuration from the master controller.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration page for the master controller. l If you select AP Group, select the AP group for which you want to configure the LMS IP. l If you select AP Specific, select the name of the AP for which you want to configure the LMS IP.
2. Under the Profiles section, select AP to display the AP profiles. 3. Select the AP system profile you want to modify. 4. In the Profile Details section, enter the controller IP address into the LMS IP field. 5. Click Apply, then save your configuration.
In the CLI
On the master controller:
(host)(config) #ap system-profile <profile> lms-ip <ipaddr>
(host)(config) #ap-group <group> ap-system-profile <profile>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Increasing Network Uptime Through Redundancy and VRRP | 673

(host)(config) #ap-name <name> ap-system-profile <profile>
Configuring the Master Controller for Redundancy
The master controller in the Dell user-centric network acts as a single point of configuration for global policies such as firewall policies, authentication parameters, and RF configuration to ease the configuration and maintenance of a wireless network. It also maintains a database related to the wireless network that you can use to make adjustments (automated or manual) in reaction to events that cause a change in the environment (such as an AP becoming unavailable).
The master controller is also responsible for providing the configuration for any AP to complete its boot process. If the master controller becomes unavailable, the network continues to run without any interruption. However, any change in the network topology or configuration will require the availability of the master controller.
To maintain a highly redundant network, the administrator can use a controller to act as a hot standby for the master controller. The underlying protocol used is the same as in local redundancy, that is, VRRP.
Collect the following data before configuring master controller redundancy:
l VLAN ID for the two controllers on the same Layer-2 network. l Virtual IP address that has been reserved to be used for the VRRP instance.
You can use either the WebUI or CLI to configure VRRP on the master controllers (see Table 130). For this topology, the following values are recommended:
l For priority: Set the master to 110; set the backup to 100 (the default value) l Enable preemption l Configure master up time or master state tracking with an add value of 20.
The following is a configuration example for the initially-preferred master.
(host)(config) #vrrp 22 vlan 22 ip address 10.200.22.254 priority 110 preempt authentication password description Preferred-Master tracking master-up-time 30 add 20 no shutdown
The following configuration is the corresponding VRRP configuration for the peer controller.
(host)(config) #vrrp 22 vlan 22 ip address 10.200.22.254 priority 100 preempt authentication password description Backup-Master tracking master-up-time 30 add 20 no shutdown
Use the following commands to associate the VRRP instance with master controller redundancy:

674 | Increasing Network Uptime Through Redundancy and VRRP

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 131: VRRP Commands Command master-redundancy

Explanation Enter the master-redundancy context.

master-vrrp <id>

Associates a VRRP instance with master redundancy. Enter the virtual router ID of the VRRP instance.

peer-ip-address <ipaddr> ipsec <key>

Loopback IP address of the peer controller for master redundancy.
The pre-shared key secures communication between the master controllers. Specify a key of up to 64 characters.

masterip <ipaddr> ipsec <key>

Configures the master IP address and pre-shared key on a local controller for communication with the master controller.
Configure this to be the virtual IP address of the VRRP instance used for master redundancy.

Configure all the APs and local controllers in the network with the virtual IP address as the master IP address. You can configure the master IP address for local controllers during the Initial Setup. The controller will require a reboot after changing the master IP on the controller.
If DNS resolution is the chosen mechanism for the APs to discover their master controller, ensure that the name "aruba-master" resolves to the same virtual IP address configured as a part of the master redundancy.
Configuring Database Synchronization
In a redundant master controller scenario, you can configure a redundant pair to synchronize their WMS and local user databases. You can either manually or automatically synchronize the databases. When manually synchronizing the database, the active VRRP master synchronizes its database with the standby. The command takes effect immediately. When configuring automatic synchronization, you set how often the two controllers synchronize their databases. To ensure successful synchronization of database events, you should set periodic synchronization to a minimum period of 20 minutes.
In the WebUI
1. On each controller, navigate to the Configuration > Advanced Services > Redundancy page. 2. Under Database Synchronization Parameters, do the following:
a. Select the Enable periodic database synchronization check box. This enables database synchronization.
b. Enter the frequency of synchronizing the databases. A minimum value of 20 minutes is recommended. 3. Click Apply.
In the CLI
Use the following commands to configure database synchronization.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Increasing Network Uptime Through Redundancy and VRRP | 675

Table 132: Database synchronization commands

Command

Description

database synchronize

This enable mode command manually synchronizes the databases and takes effect immediately.

database synchronize period <minutes>

This config mode command defines the scheduled interval for synchronizing the databases.

To view the database synchronization settings on the controller, use the following command: (host)#show database synchronize
Enabling Incremental Configuration Synchronization (CLI Only)
Typically when the master and local is synchronized, the complete configuration is sent to the local. However, you now have the option to send only the incremental updates to the local using the following CLI commands:

Table 133: Incremental Configuration Synchronization Commands

Command

Description

cfgm set sync-type <complete>

The master sends full configuration file to the local.

cfgm set sync-type <snapshot> cfgm set sync-command-block <number>

The master sends only the incremental configuration to the local. NOTE: This configuration is enabled by default
To configure the number of command-list blocks. Each block contains a list of global configuration commands for each write-mem operationThe number is 3 by default

show master-configpending

To show a list of global commands, which are not saved but sent to the local.

clear master-local-session <A.B.C.D>

To manually push the full configuration to the local.

Configuring Master-Local Controller Redundancy
This section outlines the concepts behind a redundancy solution where a master can act as a backup for one or more local controllers, and shows how to configure the Dell controllers for such a redundant solution. In this solution, the local controllers act as the controller for the APs. When any one of the local controllers becomes unavailable, the master takes over the APs controlled by that local controller for the time that the local controller remains unavailable. It is configured such that when the local controller comes back again, it can take control over the APs once more.
This type of redundant solution is illustrated by the following topology diagram.
This solution requires that the master controller have Layer-2 connectivity to all local controllers.

676 | Increasing Network Uptime Through Redundancy and VRRP

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 83 Redundant Topology: Master-Local Redundancy

In the network in Figure 83, the master controller is connected to the local controllers on VLANs 1 through n through a Layer-2 network. To configure redundancy as described in the conceptual overview for master-local redundancy, configure VRRP instances on each of the VLANs between the master and the respective local controller. The VRRP instance on the local controller is configured with a higher priority to ensure that when available, the APs always choose the local controller to terminate their tunnels. l Configure the interface on the master controller to be a trunk port with 1, 2... n being member VLANs. l Collect the following data before configuring master controller redundancy:
l VLAN IDs on the controllers corresponding to the VLANs 1, 2...n shown in the topology above. l Virtual IP addresses that have been reserved to be used for the VRRP instances. You can use either the WebUI or CLI to configure VRRP on the master controllers (see Table 130 ). For this topology, the following values are recommended: l For priority: Set the local to 110; set the master to 100 (the default value) l Enable preemption
The master controller is configured for a number of VRRP instances (equal to the number of local controllers the master is backing up).
To configure the APs, configure the appropriate virtual IP address (depending on which controller is expected to control the APs) for the LMS IP address parameter in the AP system profile for an AP group or specified AP.
Configure these AP settings on the master controller, not the local controller.
As an example, the administrator configures APs in the AP group "floor1" to be controlled by local controller 1, APs in the AP group "floor2" to be controlled by local controller 2, and so on. All the local controllers are backed up by the master controller. In the AP system profile for the AP group "floor1", enter the virtual IP address (10.200.22.154 in the example configuration) for the LMS IP address on the master controller. Configuration changes take effect only after you reboot the affected APs; this allows them to reassociate with the local controller. After rebooting, these APs appear to the new local controller as local APs.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Increasing Network Uptime Through Redundancy and VRRP | 677

Chapter 25 RSTP
The ArubaOS implementation of Rapid Spanning Tree Protocol (RSTP) is as specified in 802.1w, with backward compatibility to legacy Spanning Tree (STP) 802.1D. RSTP takes advantage of point-to-point links and provides rapid convergence of the spanning tree. RSTP is enabled by default on all Dell controllers. Topics in this chapter include: l Understanding RSTP Migration and Interoperability on page 678 l Working with Rapid Convergence on page 678 l Configuring RSTP on page 679 l Troubleshooting RSTP on page 681
Understanding RSTP Migration and Interoperability
The ArubaOS RSTP implementation interoperates with PVST (Per VLAN Spanning Tree 802.1D) and Rapid-PVST (802.1w) implementation on industry-standard routers/switches. Dell only supports global instances of STP and RSTP. Therefore, the ports on industry-standard routers/switches must be on the default or untagged VLAN for interoperability with Dell controllers. ArubaOS supports RSTP on the following interfaces: l FastEthernet IEEE 802.3: fastethernet l Gigabitethernet IEEE 802.3: gigabitethernet l Port Channel ID: port-channel
Working with Rapid Convergence
Since RSTP is backwards compatible with STP, it is possible to configure both bridges in the same network. However, such mixed networks may not always provide rapid convergence. RSTP provides rapid convergence when interfaces are configured as either: l Edge ports: These are the interfaces/ports connected to hosts. These interfaces are immediately moved to
the forwarding state. In this mode, an interface forwards frames by default until it receives a BPDU (Bridge Protocol Data Units), indicating that it should behave otherwise. It does not go through the Listening and Learning states. l Point-to-Point links: These are the interfaces/ports connected directly to neighboring bridges over a point-to-point link. RSTP negotiates with the neighbor bridge for rapid convergence/transition only when the link is point-to-point.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

RSTP | 678

Table 134: Port State Comparison

STP (802.1d) Port State

RSTP (802.1w) Port State

Disabled

Discarding

Blocking

Discarding

Listening

Discarding

Learning

Learning

Forwarding

Forwarding

In addition to port state, RSTP introduces port roles for all the interfaces (see Table 135).

Table 135: Port Role Descriptions

RSTP (802.1w) Port Role

Description

Root

The port that receives the best BPDU on a bridge.

Designated

The port can send the best BPDU on the segment to which it is connected.

Alternate

The port offers an alternate path, in the direction of root bridge, to that provided by bridge's root port.

Backup

The port acts as a backup for the path provided by a designated port in the direction of the spanning tree.

To view the RSTP output, including state and port roles, enter the following command in the CLI: (host) (config) #show spantree
The show spanning-tree interface command also indicates the state and port roles. See the example below for a partial output:
(host) #show spanning-tree interface fastethernet 1/1
Interface FE 1/7 (port 8) in Spanning tree is FORWARDING Port path cost 19, Port priority 128 Role DESIGNATED
Edge Port and Point-to-Point
At the interface level, the portfast command specifies an interface as an edge port, and the point-to-point command specifies an interface as a point-to-point link. Since RSTP is enabled by default, all the interfaces are point-to-point links by default.

Configuring RSTP
Use either the CLI or the WebUI to configure RSTP.
679 | RSTP

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the WebUI
The RSTP port interface is designated as point-to-point, by default, in the existing port configuration screen (Figure 84).
Figure 84 Configuring RSTP

Since RSTP is enabled by default, the default values appear in the WebUI. Table 136 lists the RSTP defaults and ranges (when applicable) in the configuration interface mode (config-if).

Table 136: RSTP Default Values

Feature

Default Value/Range

Port Cost

The RSTP interface path cost. Range: 1­65536 Default: Based on Interface type: Fast Ethernet 10Mbs: 100 Fast Ethernet 100Mbs: 19 1 Gigabit Ethernet: 4 10 Gigabit Ethernet: 2

Priority

Change the interface's RSTP priority Range: 0­255 Default: 128

Port Fast

Change from blocking to forwarding Default : Disabled

Dell Networking W-Series ArubaOS 6.4.x | User Guide

RSTP | 680

Feature
Point-toPoint

Default Value/Range
Set the interface as a point-to-point link Default : Enabled

In the CLI

Change the default configurations using the command line interface:

(host) (config-if)#spanning-tree

cost

Change an interface's spanning tree path cost

point-to-point

Set interface as point-to-point link

port-priority

Change an interface's spanning tree priority

portfast

Allow a change from blocking to forwarding

Monitoring RSTP
Statistics for point-to-point, role, BPDU, and other information can be viewed in the WebUI (see Figure 85). Figure 85 Monitoring RSTP

Troubleshooting RSTP
The following commands can be used to troubleshoot RSTP:
l The show spantree command (config mode) displays the root and bridge information, verifying that they are correct. The port/interface information (e.g. state, role, etc.) is also displayed to make sure that the state and role information correspond with each other. For more details and examples on the show spantree command, refer to show spantree in the ArubaOS Command-Line Interface Reference Guide.

681 | RSTP

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l The show spanning-tree interface command (config-if mode) displays Tx/Rx BPDU counters. For example, if a port's role is "designated," it only transmit BPDUs but does not receive any. In this case, the Tx counter continues to increase in increments while the Rx counter remains the same. This is reversed when a port's role is "root/alternate/backup". For more details and examples on the show spanning-tree interface command, refer to show spaning-tree in the ArubaOS Command-Line Interface Reference Guide.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

RSTP | 682

Chapter 26 PVST+

PVST+ (Per-VLAN Spanning Tree Plus) provides load-balancing of VLANs across multiple ports, resulting in optimal usage of network resources. PVST+ also ensures interoperability with industry-accepted PVST+ protocols.
PVST+ is disabled by default.
Topics in this chapter include: l Understanding PVST+ Interoperability and Best Practices on page 683 l Enabling PVST+ in the CLI on page 683 l Enabling PVST+ in the WebUI on page 684
Understanding PVST+ Interoperability and Best Practices
The interoperability between RSTP and PVST+ includes: l When the access port on the controller and the trunk port terminate on one Layer 2 switch running PVST+,
PVST+ will send untagged STP BPDUs on the access port; it also transmits untagged STP BPDUs (in addition to the other PVST+ BPDUs) on the native VLAN trunk port. If the Dell controller is the root, it will detect a loop on the native VLAN.
If PVST+ is not on the controller, best practices recommend disabling RSTP on the Dell controller to avoid a looping issue.
l For VLAN load balancing when controllers are connected to armed mode, the VLAN priorities on two ports and bridge priorities must be configured so that one set of VLANs are active on one link, and the other set of VLANs are active on the other link.
l Supported instances include: 64 on the W-7000 Series, W-7200 Series, W-6000M3, and W-3000 Series, and 32 on the W-600 Series.
Enabling PVST+ in the CLI
PVST+ is disabled by default. Enable PVST+, ensure a VLAN instance is configured, and then configure PVST+. 1. Enable PVST+:
spanning-tree mode rapid-pvst 2. Configure PVST+ forward time; the following command sets the time VLAN 2 spends in the listening and
learning state (3 seconds): spanning-tree vlan 2 forward-time 3 3. Configure PVST+ hello time; the following command sets the time VLAN 2 waits to transmit BPDUs to four seconds: spanning-tree vlan 2 hello-time 4 4. Configure PVST+ max age; the following command sets the time VLAN 2 waits to receive a hello packet to 30 seconds: spanning-tree vlan 2 max-age 30

Dell Networking W-Series ArubaOS 6.4.x| User Guide

PVST+ | 683

5. Configure PVST+ priority: the following command sets the VLAN 2 priority to 10, making it more likely to become the root bridge: spanning-tree vlan 2 priority 10
6. Configure PVST+ on a range of VLANs using the VLAN IDs (coma separated or hyphen separated): spanning-tree vlan range 2-6,11
Enabling PVST+ in the WebUI
From the WebUI, add a VLAN instance and enable PVST+:

684 | PVST+

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Chapter 27 Link Layer Discovery Protocol

ArubaOS provides support for Link Layer Discovery Protocol (LLDP) on the controllers to advertise identity information and capabilities to other nodes on the network, and store the information discovered about the neighbors. This chapter contains the following major sections: l Important Points to Remember on page 685 l LLDP Overview on page 685 l Configuring LLDP on page 686 l Monitoring LLDP Configuration on page 686
Important Points to Remember
l Inventory-management and Location TLVs are not currently supported. l Aggregation-management and Power-management TLVs are not supported. l LLDP-MED will be supported in a future release. l SNMP support is currently unavailable for LLDP MIBs. l LLDP is not supported on the expanded slots and the management port of the W-6000M3 controller. l Cisco Discovery Protocol (CDP) proprietary is not supported. l The maximum number of neighbors that can be learned on the controllers (including all the per port
neighbors) is 250.
LLDP Overview
Link Layer Discovery Protocol (LLDP), defined in the IEEE 802.1AB standard, is a Layer 2 protocol that allows network devices to advertise their identity and capabilities on a LAN. ArubaOS supports a simple one-way neighbor discovery protocol with periodic transmissions of LLDP PDU. l LLDP frames are constrained to a local link. l LLDP frames are TLV (Type-Length-Value) form. l LLDP Multicast address is 01-80-C2-00-00-0E. LLDP provides support for a set of attributes used to discover neighbor devices. These attributes are referred to as TLVs, which contain type, length, and value descriptions. LLDP supported devices use TLVs to receive and send information such as configuration information, device capabilities, and device identity to their neighbors. ArubaOS supports the following optional basic management TLVs that are enabled by default: l MAC Phy configuration TLV l Management address TLV l Maximum frame size TLV l Port-description TLV l Port VLAN ID TLV l System capabilities TLV l System description TLV

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Link Layer Discovery Protocol | 685

l System name TLV l VLAN name TLV
Default LLDP Configuration
To display the default LLDP information, use the following command: (host) #show lldp interface gigabitethernet 1/1 Interface: FE1/1 LLDP Tx: Disabled, LLDP Rx: Disabled Proprietary Neighbor Discovery: Disabled LLDP-MED: Disabled Fast Transmit interval: 1, Fast Transmit message counter: 4 Transmit interval: 30, Transmit hold 4, Hold timer: 120
When you use the default LLDP configuration, the RX and TX parameters are disabled. You must explicitly enable them for LLDP to work.

Configuring LLDP
You can configure LLDP using the CLI. For detailed information on the LLDP commands, refer to interface fastethernet | gigabitethernet in the ArubaOS Command-Line Interface Reference Guide.
(host)(config) #interface gigabitethernet <slot/port> (host)(config-if) #lldp
fast-transmit-counter <1-8> fast-transmit-interval <1-3600> med receive transmit transmit-hold <1-100> transmit-interval <1-3600>
The med command is not currently supported but will be supported in a future release. The fast-transmit-interval <1-3600> and the fast-transmit-counter <1-8> parameters should also be used with the med command.

Monitoring LLDP Configuration
This section describes commands for monitoring LLDP configurations.

Display LLDP Interface

To display all LLDP information for all interfaces, use the following command:

(host)# show lldp interface

LLDP Interfaces Information

---------------------------

Interface LLDP TX LLDP RX

--------- ------- -------

GE1/3

Enabled Enabled

GE1/4

Enabled Enabled

LLDP-MED -------Enabled Enabled

TX interval ----------30 30

Hold Timer ---------120 120

Display LLDP Interface <interface>
To display LLDP information for a specific interface, use the following command:
(host) #show lldp interface gigabitethernet <slot/port> (host) #show lldp interface gigabitethernet <1/3> Interface: gigabitethernet0/0/1

686 | Link Layer Discovery Protocol

Dell Networking W-Series ArubaOS 6.4.x | User Guide

LLDP Tx: Enabled, LLDP Rx: Enabled Proprietary Neighbor Discovery: Disabled LLDP-MED: Disabled Fast Transmit interval: 1, Fast Transmit message counter: 4 Transmit interval: 30, Hold timer: 120

Display LLDP Neighbor

(host)#show lldp neighbor

Capability codes: (R)Router, (B)Bridge, (A)Access Point, (P)Phone, (O)Other

LLDP Neighbor Information

-------------------------

Local Intf Chassis ID

Capability Remote Intf Expiry-Time (Secs)

--------- -----------

---------- ----------- ------------------

GE1/3

00:0b:86:6a:25:40 B:R

GE0/0/17

105

GE1/4

00:0b:86:6a:25:40 B:R

GE0/0/18

105

System name ----------DellW-3600

DellW-3600

Number of neighbors: 2

Display LLDP Neighbor Interface Detail

(host) (gigabitethernet "1/3") #show lldp neighbor interface gigabitethernet 1/3 detail

Interface: gigabitethernet1/3, Number of neighbors: 1

------------------------------------------------------------

Chassis id: 24.1.1.253, Management address: 24.1.1.253

Interface description: SW PORT, ID: 04C5A44C3485:P1

Device MAC: 04:c5:a4:4c:34:85

Last Update: Thu Oct 3 17:01:41 2013

Time to live: 180, Expires in: 179 Secs

System capabilities : Bridge,Phone

Enabled capabilities: Bridge,Phone

System name: SEP04C5A44C3485

System description:

Cisco IP Phone 7962G,V10, SCCP42.9-2-1S

Auto negotiation: Supported, Enabled

Autoneg capability:

100Base-X, HD: no, FD: yes

1000Base-T, HD: yes, FD: yes

Media attached unit type: 100BaseTXFD - 2 pair category 5 UTP, full duplex mode (16)

802.3 Power:

PortID:

local 04C5A44C3485:P1

PortDescr: SW PORT

LLDP-MED:

Device Type: Communication Device Endpoint (Class III)

Capability: LLDP-MED capabilities, Network policy, Extended power via MDI/PD, Inventory

LLDP-MED Network Policy for: AppType: 1, Defined: yes

Descr:

Voice

VLAN:

204

Layer 2 Priority: 5

DSCP Value: 46

LLDP-MED Network Policy for: AppType: 2, Defined: yes

Descr:

Voice Signaling

VLAN:

204

Layer 2 Priority: 4

DSCP Value: 32

Extended Power-over-Ethernet:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Link Layer Discovery Protocol | 687

Power Type & Source: PD Device

Power Source: unknown

Power Priority: unknown

Power Value: 6300

Inventory:

Hardware Revision: 10

Software Revision: SCCP42.9-2-1S

Firmware Revision: tnp62.8-3-1-21a.bin

Serial Number: FCH1529F57D

Manufacturer: Cisco Systems, Inc.

Model:

CP-7962G

Display LLDP Statistics

(host)# show lldp statistics

LLDP Statistics

---------------

Interface Received Unknow TLVs Malformed Transmitted

--------- -------- ----------- --------- -----------

GE1/3 0

0

0

0

GE1/4 0

0

0

0

Display LLDP Statistics Interface
(host)# show lldp statistics interface gigabitethernet 1/3

LLDP Statistics --------------Interface --------gigabitethernet1/3

Received Unknow TLVs Malformed Transmitted

-------- ----------- --------- -----------

0

0

0

0

688 | Link Layer Discovery Protocol

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Chapter 28 IP Mobility

A mobility domain is a group of Dell controllers among which wireless users can roam without losing their IP address. Mobility domains are not tied with the master controller; thus, it is possible for a user to roam between controllers managed by different master controllers, as long as all the controllers belong to the same mobility domain.
You enable and configure mobility domains only on Dell controllers. No additional software or configuration is required on wireless clients to allow roaming within the domain.
Topics in this chapter include:
l Understanding Dell Mobility Architecture on page 689 l Configuring Mobility Domains on page 690 l Tracking Mobile Users on page 694 l Configuring Advanced Mobility Functions on page 696 l Understanding Bridge Mode Mobility Deployments on page 705 l Enabling Mobility Multicast on page 706

Understanding Dell Mobility Architecture
Dell's layer-3 mobility solution is based on the Mobile IP protocol standard, as described in RFC 3344, IP Mobility Support for IPv4. This standard addresses users who need both network connectivity and mobility within the work environment.
Unlike other layer-3 mobility solutions, a Dell mobility solution does not require that you install mobility software or perform additional configuration on wireless clients. The Dell controllers perform all functions that enable clients to roam within the mobility domain.
In a mobility domain, a mobile client is a wireless client that can change its point of attachment from one network to another within the domain. A mobile client receives an IP address (a home address) on a home network.
A mobile client can detach at any time from its home network and reconnect to a foreign network (any network other than the mobile client's home network) within the mobility domain. When a mobile client is connected to a foreign network, it is bound to a care-of address that reflects its current point of attachment. A care-of address is the IP address of the Dell controller in the foreign network with which the mobile client is associated.
The home agent for the client is the controller at which the client appears for the first time upon joining the mobility domain. The home agent is the single point of contact for the client when the client roams. The foreign agent for the client is the controller which handles all Mobile IP communication with the home agent on behalf of the client. Traffic sent to a client's home address is intercepted by the home agent and tunneled for delivery to the client on the foreign network. On the foreign network, the foreign agent delivers the tunneled data to the mobile client.
Figure 86 shows the routing of traffic from Host A to Mobile Client B when the client is away from its home network. The client's care-of address is the IP address of the Dell controller in the foreign network.
The numbers in the Figure 86 correspond to the following descriptions:
1. Traffic to Mobile Client B arrives at the client's home network via standard IP routing mechanisms. 2. The traffic is intercepted by the home agent in the client's home network and tunneled to the care-of
address in the foreign network.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

IP Mobility | 689

3. The foreign agent delivers traffic to the mobile client. 4. Traffic sent by Mobile Client B is also tunneled back to the home agent. Figure 86 Routing of Traffic to Mobile Client within Mobility Domain

Configuring Mobility Domains
Before configuring a mobility domain, you should determine the user VLAN(s) for which mobility is required. For example, you may want to allow employees to be able to roam from one subnetwork to another. All controllers that support the VLANs into which employee users can be placed should be part of the same mobility domain.
Dell mobility domains are supported only on Dell controllers.
A controller can be part of multiple mobility domains, although it is recommended that a controller belong to only one domain. The controllers in a mobility domain do not need to be managed by the same master controller.
You configure a mobility domain on a master controller; the mobility domain information is pushed to all local controllers that are managed by the same master controller. On each controller, you must specify the active domain (the domain to which the controller belongs). If you do not specify the active domain, the controller will be assigned to a predefined "default" domain.
Although you configure a mobility domain on a master controller, the master controller does not need to be a member of the mobility domain. For example, you could set up a mobility domain that contains only local controllers; you still need to configure the mobility domain on the master controller that manages the local controllers. You can also configure a mobility domain that contains multiple master controllers; you need to configure the mobility domain on each master controller.
The basic tasks you need to perform to configure a mobility domain are listed below. The sections following describe each task in further detail. A sample mobility domain configuration is provided in Sample Configuration on page 692.

690 | IP Mobility

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 137: Tasks to Configure a Mobility Domain

On a master controller:

On all controllers in the mobility domain:

l Configure the mobility domain, including the entries in the home agent table (HAT)

l Enable mobility (disabled by default)
l Join a specified mobility domain (not required for "default" mobility domain)

You can enable or disable IP mobility in a virtual AP profile (IP mobility is enabled by default). When you enable IP mobility in a virtual AP profile, the ESSID that is configured for the virtual AP supports layer-3 mobility. If you disable IP mobility for a virtual AP, any clients that associate to the virtual AP will not have mobility service.
Configuring a Mobility Domain
You configure mobility domains on master controllers. All local controllers managed by the master controller share the list of mobility domains configured on the master. Mobility is disabled by default and must be explicitly enabled on all controllers that will support client mobility. Disabling mobility does not delete any mobility related configuration.
In ArubaOS versions before 6.3, the home agent table (HAT) maps a user VLAN IP subnet to potential home agent addresses. Starting from 6.3, when you enable mobility the controller to which the client connects for the first time becomes its home agent. The mobility feature uses the HAT table to locate a potential home agent for each mobile client, and then uses this information to perform home agent discovery. To configure a mobility domain, you must assign a home agent address to at least one controller with direct access to the user VLAN IP subnet. (Some network topologies may require multiple home agents.)
It is recommended that you configure the switch IP address to match the AP's local controller, or define the Virtual Router Redundancy Protocol (VRRP) IP address to match the VRRP IP used for controller redundancy. Do not configure both a switch IP address and a VRRP IP address as a home agent address, or multiple home agent discoveries may be sent to the controller.
All user VLANs that are part of a mobility domain must have an IP address that can correctly forward layer-3 broadcast multicast traffic to clients when they are away from the home network.
The mobility domain named "default" is the default active domain for all controllers. If you need only one mobility domain, you can use this default domain. However, you also have the flexibility to create one or more user-defined domains to meet the unique needs of your network topology. Once you assign a controller to a user-defined domain, it automatically leaves the "default" mobility domain. If you want a controller to belong to both the "default" and a user-defined mobility domain at the same time, you must explicitly configure the "default" domain as an active domain for the controller.
In the WebUI
1. Navigate to the Configuration > Advanced Services > IP Mobility page. Select the Enable IP Mobility checkbox.
2. To configure the default mobility domain, select the default domain in the Mobility Domain list. To create a new mobility domain, enter the name of the domain in Mobility Domain Name and click Add; the new domain name appears in the Mobility Domain list.
3. Select the newly-created domain name. Click Add under the Subnet column. Enter the subnetwork, mask, VLAN ID, VRIP, and home agent IP address, and click Add. Repeat this step for each HAT entry.
4. Click Apply.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IP Mobility | 691

In the CLI
router mobile ip mobile domain <name>
hat <home-agent> description <dscr>
To view currently-configured mobility domains in the CLI, use the show ip mobile domain command.
Ensure that the ESSID to which the mobile client will connect supports IP mobility. You can disable IP mobility for an ESSID in the virtual AP profile (IP mobility is enabled by default). If you disable IP mobility for a virtual AP, any client that associates to the virtual AP will not have mobility service.
Joining a Mobility Domain
Assigning a controller to a specific mobility domain is the key to defining the roaming area for mobile clients. You should take extra care in planning your mobility domains and survey the user VLANs and controllers to which clients can roam, to ensure that there are no roaming holes.
All controllers are initially part of the "default" mobility domain. If you use the default mobility domain, you do not need to specify this domain as the active domain on a controller. However, once you assign a controller to a user-defined domain, the default mobility domain is no longer an active domain on the controller.
In the WebUI
1. Navigate to the Configuration > Advanced Services > IP Mobility page. 2. In the Mobility Domain list, select the mobility domain. 3. Select the Active checkbox for the domain. 4. Click Apply.
In the CLI
Use the following command to activate a mobility domain: ip mobile active-domain <name>
To view the active domains in the CLI, use the show ip mobile active-domains command on the controller.
Sample Configuration
The following example (Figure 87) configures a network in a campus with three buildings. A Dell controller in each building provides network connections for wireless users on several different user VLANs. To allow wireless users to roam from building to building without interrupting ongoing sessions, you configure a mobility domain that includes all user VLANs on the three controllers. You configure the HAT on the master controller only (A in this example). On the local controllers (B and C), you only need to enable mobility and activate the respective domain.

692 | IP Mobility

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 87 Example Configuration: Campus-Wide

This example uses the "default" mobility domain for the campus-wide roaming area. Since all controllers are initially included in the default mobility domain, you do not need to explicitly configure "default" as the active domain on each controller.
In the WebUI
On controller A (the master controller): 1. Navigate to the Configuration > Advanced Services > IP Mobility page. 2. Select the Enable IP Mobility checkbox. 3. Select the default domain in the Mobility Domain list. 4. Click Add. 5. Enter the home agent IP address, and a description for the first entry and click Add. Repeat this step for
each HAT entry. 6. Click Apply.
Table 138: Example entries Home Agent Address or VRIP
10.1.1.245
10.2.1.245
10.3.1.245
10.4.1.245
On controllers B and C: 1. Navigate to the Configuration > Advanced Services > IP Mobility page. 2. Select the Enable IP Mobility checkbox. 3. Click Apply.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IP Mobility | 693

In the CLI
On controller A (the master controller): (host)(config) #router mobile (host)(config) #ip mobile domain default (host)(mobility-domain) #hat 10.1.1.245 description "Corporate mobile entry" (host)(mobility-domain) #hat 10.2.1.245 description "Local entry" (host)(mobility-domain) #hat 10.3.1.245 description "Reserved reentry" (host)(mobility-domain) #hat 10.4.1.245 description "Sales team" (host)(mobility-domain) #! (host)(config)# ip mobile active-domain default
On controllers B and C: (host)(config) #router mobile (host)(config)# ip mobile active-domain default
Tracking Mobile Users
This section describes how you can view information about the status of mobile clients in the mobility domain.
Location-related information for users, such as roaming status, AP name, ESSID, BSSID, and physical type are consistent in both the home agent and foreign agent. The username, role, and authentication can be different on the home agent and foreign agent, as explained by the following:
Starting from ArubaOS 6.3, L2 GRE tunnels are automatically established between controllers in mobility domain at the time of boot up. Before ArubaOS 6.3, the tunnels were created only when a client was associated to a controller. Whenever a client connects to a controller in a mobility domain, layer-2 authentication is performed and the station obtains the layer-2 (logon) role. When the client roams to other networks, layer-2 authentication is performed and the client obtains the layer-2 role. If layer-3 authentication is required, this authentication is performed on the client's home agent only. The home agent obtains a new role for the client after layer-3 authentication; this new role appears in the user status on the home agent only. Even if reauthentication occurs after the station moves to a foreign agent, the display on the foreign agent still shows the layer-2 role for the user.
Mobile Client Roaming Status
You can view the list of mobile clients and their roaming status on any controller in the mobility domain:
In the WebUI
Navigate to the Monitoring > controller > Clients page.
In the CLI
#show ip mobile host
Roaming status can be one of the following:

694 | IP Mobility

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 139: Client Roaming Status

Roaming Status Type

Description

Home Switch/Home VLAN

This controller is the home agent for a station, and the client is on the VLAN on which it has an IP address.

Mobile IP Visitor

This controller is not the home agent for a client.

Mobile IP Binding (away)

This controller is the home agent for a client that is currently away.

Home Switch/Foreign VLAN

This controller is the home agent for a client, but the client is currently on a different VLAN than its home VLAN (the VLAN from which it acquired its IP address).

Stale

The client does not have connectivity in the mobility domain. Either the controller has received a disassociation message for a client, but has not received an association or registration request for the client from another controller, or a home agent binding for the station has expired before being refreshed by a foreign agent.

No Mobility Service

The controller cannot provide mobility service to this client. The mobile client may lose its IP address if it obtains the address via DHCP and has limited connectivity. The mobile client may be using an IP address that cannot be served, or there may be a roaming hole due to improper configuration.

Viewing User Roaming Status using the CLI
You can view the roaming status of users on any controller in the mobility domain: #show user Roaming status can be one of the following:

Table 140: User Roaming status

Status Type

Description

Wireless

This client is on its home agent controller and the client is on the VLAN on which it has an IP address.

Visitor

This client is visiting this controller and the controller is not its home agent.

Away

This client is currently away from its home agent controller.

Foreign VLAN

This client is on its home agent controller but the client is currently on a different VLAN than the one on which it has an IP address.

Stale

This should be a temporary state as the client will either recover connectivity or the client's entry is deleted when the stale timer expires.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IP Mobility | 695

In the CLI
#show ip mobile trace <ip-address>|<mac-address>
Mobile Client Roaming Locations
You can view information about where a mobile user has been in the mobility domain. This information can only be viewed on the client's home agent.
In the WebUI
1. Navigate to the Monitoring > controller > Clients page. 2. Click Status. The mobility state section contains information about the user locations.
In the CLI
show ip mobile trail <ip-address>|<mac-address>
HA Discovery on Association
In normal circumstances, a controller performs an HA discovery only when it is aware of the client's IP address which it learns through the ARP or any L3 packet from the client. This limitation of learning the client's IP and then performing the HA discovery is not effective when the client performs an inter switch move silently (does not send any data packet when in power save mode). This behavior is commonly seen with various handheld devices, Wi-Fi phones and so on. This delays HA discovery and eventually results in any loss of downstream traffic that is meant for the mobile client. When HA discovery on association is triggered, the foreign agent controller to which the client is associated, sends a unicast request to all controllers within the mobility domain to find if any one of the controllers has the IP mobility state information of the client. With HA discovery on association, a controller can perform a HA discovery as soon as the client is associated. This feature is enabled by default. This option will also poll for all potential HAs.
In the CLI
To configure the mobility association: wlan virtual-ap default ha-disc-onassoc
Configuring Advanced Mobility Functions
You can configure various parameters that pertain to mobility functions on a controller in a mobility domain using either the WebUI or the CLI.
In the WebUI
1. Navigate to the Configuration > Advanced Services > IP Mobility page. 2. Select the Global Parameters tab. 3. Configure your desired IP mobility settings. Table 141 describes the parameters you can configure on the
Global Parameters tab.

696 | IP Mobility

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 141: IP Mobility Configuration Parameters

Parameter

Description

General

Encapsulation Supported

This parameter shows the type of encapsulation currently supported on the controller.

Clear Trail Entries

Clear the station location trail table. You can view entries in this table using the show ip mobile trail command.

Clear Mobility Counters

Clear counters for IP mobility statistics.

Foreign Agent

lifetime

Requested lifetime, in seconds, as per RFC 3344, IP Mobility Support for IPv4. Range: 10-65534 seconds Default: 180 seconds

Max. Visitors Allowed

Set a maximum allowed number of active visitors. Range: 0-5000 visitors Default: 5000 visitors

Registration Requests Retransmits

Maximum number of times the foreign agent attempts mobile IP registration message exchanges before giving up.
Range: 0-5 attempts
Default: 3 attempts

Registration Requests Interval

Retransmission interval, in milliseconds. Range: 100-10000 milliseconds Default: 1000 milliseconds

Home Agent

Replay

Time difference, in seconds, for timestamp-based replay protection, as described by RFC 3344, IP Mobility Support for IPv4. 0 disables replay.
Range: 0-5000 seconds
Default: 5000 seconds.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IP Mobility | 697

Parameter

Description

Max. Binding Allowed

Maximum number of mobile IP bindings. Note that there is a license-based limit on the number of users and a one user per binding limit in addition to unrelated users. This option is an additional limitation to control the maximum number of roaming users. When the limit is reached, registration requests from the foreign agent fail which causes a mobile client to set a new session on the visited controller, which will become its home controller.
Range: 0-300 seconds
Default: 7 seconds

Proxy Mobile IP

Trigger Mobility on Station Association

If enabled, mobility move detection is performed when the client associates with the controller instead of when the client sends packets.
This option is enabled by default. Mobility on association can speed up roaming and improve connectivity for devices that do not send many uplink packets out to trigger mobility. The downside to this option is lowered security. An association alone triggers mobility; however, this is irrelevant unless layer-2 security is enforced.

Mobility Trail Logging

Enables logging at the notification level for mobile client moves.

Roaming for Authenticated Stations Only

Allows a client to roam only if has been authenticated. If a client has not been authenticated, no mobility service is offered if it roams to a different VLAN or controller.

Max. Station Mobility Events per Second

Maximum number of mobility events (events that can trigger mobility) handled per second. Mobility events above this threshold are ignored. This helps to control frequent mobility state changes when the client bounces back and forth on APs before settling down.
Range: 1-65535 events
Default: 25 events

Station Trail Timeout

Specifies the maximum interval, in seconds, an inactive mobility trail is held. Range: 120-86400 seconds Default: 3600 seconds

Station Trail Max. Entries

Specifies the maximum number of entries (client moves) stored in the user mobility trail.
Range: 1-100 entries
Default: 30 entries.

698 | IP Mobility

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter Mobility Host Entry Hold Time
Mobility Host Entry Lifetime Revocation Retransmits
Interval

Description
Number of seconds the mobility state is retained after the loss of connectivity. This allows authentication state and mobility information to be preserved on the home agent controller. The default is 60 seconds but can be safely increased. In many case a station state is deleted without waiting for the stale timeout; user delete from management, foreign agent to foreign agent handoff, and so on. (This is different from the no-service-timeout; no-service-timeout occurs up front, while the stale-timeout begins when mobility service is provided but the connection is disrupted for some reason.)
Time, in seconds, after which mobility service expires. If nothing has changed from the previous state, the client is given another bridge entry but it will have limited connectivity.
Maximum number of times the home agent or foreign agent attempts mobile IP registration/revocation message exchanges before giving up. Range: 0-5 retransmissions Default: 3 retransmissions.
Retransmission interval, in milliseconds. Range: 100-10000 milliseconds Default: 1000 milliseconds

4. Click Apply.
In the CLI
To configure foreign agent functionality, use the following command: ip mobile foreign-agent {lifetime <seconds> | max-visitors <number> |
registrations {interval <msecs> | retransmits <number>}} To configure home agent functionality, use the following command: ip mobile home-agent {max-bindings <number>|replay <seconds>} To configure proxy mobile IP and DHCP functionality, use the following command: ip mobile proxy
auth-sta-roam-only | event-threshold <number> | log-trail | no-service-timeout <seconds> | on-association | stale-timeout <seconds> | trail-length <number> |trail-timeout <seconds> To configure revocation functionality, use the following command: ip mobile revocation {interval <msec>|retransmits <number> To enable packet trace for a given MAC address, use the following command: ip mobile packet-trace <host MAC address>
Proxy Mobile IP
The proxy mobile IP module in a mobility-enabled controller detects when a mobile client has moved to a foreign network and determines the home agent for a roaming client. The proxy mobile IP module performs the following functions:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IP Mobility | 699

l Derives the address of the home agent for a mobile client from the HAT using the mobile client's IP address. If there is more than one possible home agent for a mobile client in the HAT, the proxy mobile IP module uses a discovery mechanism to find the current home agent for the client.
l Detects when a mobile client has moved. Client moves are detected based on ingress port and VLAN changes, and mobility is triggered accordingly. For faster roaming convergence between AP(s) on the same controller, it is recommended that you keep the on-association option enabled. This helps trigger mobility as soon as 802.11 association packets are received from the mobile client.
Revocations
A home agent or foreign agent can send a registration revocation message, which revokes registration service for the mobile client. For example, when a mobile client roams from one foreign agent to another, the home agent can send a registration revocation message to the first foreign agent so that the foreign agent can free any resources held for the client.
IPv6 L3 Mobility
ArubaOS supports IPv6 L3 Mobility functionality. The existing L3 mobility solution has been enhanced to support dual stacked (IPv4 and IPv6) and pure IPv6 mobile clients. The IPv6 L3 mobility allows the wireless clients to retain their IPv4 or IPv6 addresses across different VLANs within a controller and between different controllers. In the previous release, the Dell Controllers supported L3 mobility only for single stacked IPv4 clients.
The following changes in the existing behavior is observed in the Dellcontroller when you enable IPv6 L3 Mobility support :
l The controller throttles and proxies Router Advertisements (RAs) if the router mobile command is enabled.
The following command configures the maximum time allowed between sending unsolicited multicast router advertisements from each interface when RA proxy is enabled: (config)# ipv6 proxy-ra interval <180-1800>
The default value for proxy-ra interval is 600 seconds. If RA is configured on an external router, but not within the controller, the controller stores the RA in cache and replays the RA from the external server and replays them every proxy-ra interval. If RA is configured in both an external router and in the controller, clients serviced by the controller receive RA only from the controller and not from the external router.
l L3 mobility support for wired and third-party APs are deprecated. l The HA discovery on association parameter is turned on by default and is not configurable.
By enabling L3 mobility feature, both the solicited RAs and the unsolicited periodic RAs will be converted to L2 unicast and sent to the wireless clients.
It is recommended to reboot the controller when you issue the no router mobile command so that mutlicast RAs do not continue to get converted to unicast RAs.
Multicast Mobility
Multicast mobility ensures a client gets an uninterrupted multicast stream while roaming. ArubaOS provides support for a MLD proxy to enable IPv6 multicast mobility. To achieve multicast mobility, the Home Agent (HA) and the Foreign Agent (FA) must be capable of MLD proxying by exchanging the MLD membership information and process MLD messages. ArubaOScontroller supports MLD versions v1 and v2.

700 | IP Mobility

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Important Points to Remember
l ArubaOS does not support the source-based forwarding functionality of MLDv2. l The multicast traffic flow stops for few seconds for roaming clients after enabling or disabling the Dynamic
Multicast Optimization (DMO) option.
In the CLI
Use the following command to enable MLD proxy in the VLAN: (host)(config)# interface vlan <vlan-id> (host)(config-subif)# ipv6 mld proxy <gigabitEtherner/fastEhernet> <slot/port> Use the following command to display the interface-specific MLD proxy group information: (host) #show ipv6 mld proxy-group Use the following command to display the MLD proxy mobility database group information for tracking: (host) #show ipv6 mld proxy-mobility-group Use the following command to display the statistics of the MLD proxy: (host) #show ipv6 mld proxy-stats Use the following command to display the MLD proxy mobility multicast statistics: (host)# show ipv6 mld proxy-mobility-stats The following command displays the discovery count table that keeps track of per client home agent discovery: (host) #show datapath mobility discovery-table The following command displays the datapath HA table information: (host) #show datapath mobility home-agent-table The following command displays the mobility multicast-group table that floods the multicast RA traffic to the roaming clients: (host) # show datapath mobility mcast-table The following commands displays the statistics of the datapath mobility: (host) #show datapath mobility stats The following command displays the mobility multicast VLAN table information: (host) #show ip mobile multicast-vlan-table The outputs of the following commands are enhanced to support IPv6 L3 mobility: l how ip mobile host l show ip mobile trace l show ip mobile remote l show ip mobile binding l show ip mobile visitor l show ip mobile trail l show ip mobile packet-trace l clear ip mobile trail <IPv6_addr> l show ip mobile traffic l show ip mobile global l show ip mobile hat l show ip mobile domain l ip mobile domain <name> hat <home-agent> description <dscr>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IP Mobility | 701

Sample Configuration The following figure provides information on how a client moves from one controller to another, when you enable IPv6 L3 mobility feature:
Figure 88 Sample IPv6 L3 Mobility Configuration

The following commands displays the initial configuration on HA and FA:
(host-HA) #show ip mobile domain Mobility Domains:, 2 domain(s) -----------------------------Domain name default Home Agent Table Domain name 6.3mobility Home Agent Table Home Agent Description --------------- ---------------10.15.45.10 10.15.44.60 (host-FA) #show ip mobile domain Mobility Domains:, 2 domain(s) -----------------------------Domain name default Home Agent Table Domain name 6.3mobility Home Agent Table Home Agent Description

702 | IP Mobility

Dell Networking W-Series ArubaOS 6.4.x | User Guide

--------------- ---------------10.15.45.10 10.15.44.60
The following commands displays information on the client association to HA:
(host-HA) #show user Users ----IP MAC Name Role Age(d:h:m) Auth VPN l ink AP name Roaming Essid/Bssid/Phy Profile Forward mode Type Host Name ---------- ------------ ------ ---- ---------- ---- ------- ------- ------- --------------- ------- ----------- ---- 50.50.50.11 24:77:03:9e:dc:4c authenticated 00:00:00 AP124-B11550-Jibin Wireless mobility-test/00:1a:1e:82:b3:10/a-HT default tunnel 2001:5000::2677:3ff:fe9e:dc4c 24:77:03:9e:dc:4c authenticated 00:00:00 AP124-B11550-Jibin Wireless mobility-test/00:1a:1e:82:b3:10/a-HT default tunnel fe80::2677:3ff:fe9e:dc4c 24:77:03:9e:dc:4c authenticated 00:00:00 AP124-B11550-Jibin Wireless mobility-test/00:1a:1e:82:b3:10/a-HT default tunnel
(host-HA) #show ip mobile host Mobile Host List, 1 host(s) --------------------------24:77:03:9e:dc:4c IPv4: 50.50.50.11 IPv6: fe80::2677:3ff:fe9e:dc4c, 2001:5000::2677:3ff:fe9e:dc4c Roaming Status: Home Switch/Home VLAN, Service time 0 days 00:00:57 Home VLAN 50
(host-HA) #show datapath bridge table 24:77:03:9e:dc:4c Datapath Bridge Table Entries ----------------------------Flags: P - Permanent, D - Deny, R - Roamed Client, M - Mobile, X - Xsec, A - Auth, O - Outer V LAN, T - Trusted MAC VLAN Assigned VLAN QinQ VLAN Destination Flags ----------------- ---- ------------- --------- ----------- ----24:77:03:9E:DC:4C 50 50 0 tunnel 17 PM
(host-HA) #show datapath station Datapath Station Table Entries -----------------------------Flags: W - WEP, T - TKIP, A - AESCCM, M - WMM N - .11n client S - AMSDU, G - AESGCM, R - DATA READY, I - INACTIVE, r - ROAMED MAC BSSID VLAN Bad Decrypts Bad Encrypts Cpu Qsz RSN cap Aid HomeVlan Flags ----------------- ----------------- ---- ------------ ------------ --- -------- ------- ---- ------- ----24:77:03:9E:DC:4C 00:1A:1E:82:B3:10 50 0 0 8 0 0 0 0 0000 0001 50 MN
The following commands displays status of the client roaming to FA:
(host-FA) #show ap association Association Table ----------------Name bssid mac auth assoc aid l-int essid vlan-i d tunnel-id phy assoc. time num assoc Flags Band steer moves (T/S) ---- ----- --- ---- ----- --- ----- ----- ------ --------- --- ----------- --------- ----- ---------------------Ap_local 6c:f3:7f:3a:ba:d8 24:77:03:9e:dc:4c y y 1 100 mobility-test 60

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IP Mobility | 703

0x1000f a-HT-40sgi-2ss 3m:20s 1 WA 0/0 ArubaOS 6.4 | User Guide IP Mobility | 594 595 | IP Mobility ArubaOS 6.4 | User Guide Num Clients:1
(host-FA) #show user Users ----IP MAC Name Role Age(d:h:m) Aut h VPN link AP name Roaming Essid/Bssid/Phy Profile Forward mode T ype Host Name ---------- ------------ ------ ---- ------------- -------- ------- ------- --------------- ------- --------------- -50.50.50.11 24:77:03:9e:dc:4c sys_mip_role_649130_9 00:00:03 Ap_local Visitor mobility-test/6c:f3:7f:3a:ba:d8/a-HT default tunnel Win 7 2001:5000::2677:3ff:fe9e:dc4c 24:77:03:9e:dc:4c sys_mip_role_649130_9 00:00:03 Ap_local Visitor mobility-test/6c:f3:7f:3a:ba:d8/a-HT default tunnel Win 7 User Entries: 2/2 Curr/Cum Alloc:1/7 Free:1/6 Dyn:2 AllocErr:0 FreeErr:0 (host-FA) #show ip mobile host Mobile Host List, 1 host(s) --------------------------24:77:03:9e:dc:4c IPv4: 50.50.50.11 IPv6: 2001:5000::2677:3ff:fe9e:dc4c Roaming Status: Mobile IP Visitor, Service time 0 days 00:03:33 Home VLAN 50, visiting local VLAN 60
(host-FA) #show datapath bridge table 24:77:03:9e:dc:4c Datapath Bridge Table Entries ----------------------------Flags: P - Permanent, D - Deny, R - Roamed Client, M - Mobile, X - Xsec, A - Auth, O - Outer V LAN, T - Trusted MAC VLAN Assigned VLAN QinQ VLAN Destination Flags ----------------- ---- ------------- --------- ----------- ----24:77:03:9E:DC:4C 4095 60 0 tunnel 15 PMR 24:77:03:9E:DC:4C 60 60 0 tunnel 15 PM
(host-FA) #show datapath station Datapath Station Table Entries -----------------------------Flags: W - WEP, T - TKIP, A - AESCCM, M - WMM N - .11n client S - AMSDU, G - AESGCM, R - DATA READY, I - INACTIVE, r - ROAMED MAC BSSID VLAN Bad Decrypts Bad Encrypts Cpu Qsz RSN cap Aid HomeVlan Flags ----------------- ----------------- ---- ------------ ------------ --- -------- ------- ---- ------- ----24:77:03:9E:DC:4C 6C:F3:7F:3A:BA:D8 60 0 0 7 0 0 0 0 0000 0001 50 MNr
(host-FA) #show ip mobile visitor Foreign Agent Visitor list, 1 host(s) ------------------------------------24:77:03:9e:dc:4c IPv4: 50.50.50.11 IPv6: 2001:5000::2677:3ff:fe9e:dc4c HA Addr 10.15.44.60, Registration id D51BA8BC:856865FC

704 | IP Mobility

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Lifetime granted 00:00:40 (40), remaining 00:00:36 Tunnel id 9, src 10.15.44.10 dest 10.15.44.60, reverse-allowed
The following command displays the status of the client on HA after roaming:
(host-HA) #show user Users ----IP MAC Name Role Age(d:h:m) Auth VPN l ink AP name Roaming Essid/Bssid/Phy Profile Forward mode Type Hos t Name ---------- ------------ ------ ---- ---------- ---- ------- ------- ------- --------------- ------- ------------ -----------50.50.50.11 24:77:03:9e:dc:4c authenticated 00:00:08 Ap_local Away mobility-test/6c:f3:7f:3a:ba:d8/a-HT default tunnel 2001:5000::2677:3ff:fe9e:dc4c 24:77:03:9e:dc:4c authenticated 00:00:08 Ap_local Away mobility-test/6c:f3:7f:3a:ba:d8/a-HT default tunnel User Entries: 2/2 Curr/Cum Alloc:1/16 Free:1/15 Dyn:2 AllocErr:0 FreeErr:0
(host-HA) #show ip mobile host Mobile Host List, 1 host(s) --------------------------24:77:03:9e:dc:4c IPv4: 50.50.50.11 IPv6: 2001:5000::2677:3ff:fe9e:dc4c Roaming Status: Mobile IP Binding (Away), Service time 0 days 00:08:20 Home VLAN 50
(host-HA) #show datapath bridge table 24:77:03:9e:dc:4c Datapath Bridge Table Entries ----------------------------Flags: P - Permanent, D - Deny, R - Roamed Client, M - Mobile, X - Xsec, A - Auth, O - Outer V LAN, T - Trusted MAC VLAN Assigned VLAN QinQ VLAN Destination Flags ----------------- ---- ------------- --------- ----------- ----24:77:03:9E:DC:4C 4095 50 0 tunnel 9 PMT 24:77:03:9E:DC:4C 50 50 0 tunnel 9 PMTR
(host-HA) #show ip mobile binding Home Agent Binding list, 1 host(s) ---------------------------------24:77:03:9e:dc:4c IPv6: 2001:5000::2677:3ff:fe9e:dc4c FA Care-of Addr 10.15.44.10, Src Addr 10.15.44.10, HAT HA Addr 10.15.44.60 FA Visiting VLAN 60 Lifetime granted 00:00:40 (40), remaining 00:00:23 Flags T, Registration id D51BA8BC:856865FC Tunnel id 9, src 10.15.44.60 dest 10.15.44.10, reverse-allowed
Understanding Bridge Mode Mobility Deployments
In bridge mode deployments, it is possible to deploy more than one AP in a single location. Therefore, APs in bridge forwarding mode support firewall session synchronization, which allows clients to retain their current session and IP address as they roam between different bridge mode APs on the same layer-2 network.
The bridge mode mobility feature facilitates client mobility on up to 32 layer-2 connected APs by allowing the APs to communicate and share the user state as the user roams from AP to AP. This mechanism is always

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IP Mobility | 705

enabled when an AP is set to bridge mode, and it requires that all APs be on the same Layer 2 segment where roaming will occur.
Figure 89 Bridge Mode Mobility

The roaming process occurs as follows:
1. A client begins to roam from AP1 and starts an association with AP2. 2. AP2 sends a broadcast message to all APs on the local layer-2 network, asking if any other AP has a current
session state for the roaming client. 3. Only AP1 responds to the broadcast, and sends the current session table of the client. 4. AP2 acknowledges receipt of the session table. 5. AP1 deletes the session state of the client. 6. Roaming is complete.
Enabling Mobility Multicast
Internet Protocol (IP) multicast is a network addressing method used to simultaneously deliver a single stream of information from one sender to multiple clients on a network. Unlike broadcast traffic, which is meant for all hosts in a single domain, multicast traffic is sent only to those specific hosts who are configured to receive such traffic. Clients who want to receive multicast traffic can join a multicast group via IGMP messages. Upstream routers use IGMP message information to compute multicast routing tables and determine the outgoing interfaces for each multicast group stream.
In ArubaOS 3.3.x and earlier, when a mobile client moved away from its local network and associated with a VLAN on a foreign controller (or a foreign VLAN on its own controller), the client's multicast membership information would not be available at its new destination, and multicast traffic from the client could be interrupted. ArubaOS 3.4 and later supports mobility multicast enhancements that provide uninterrupted streaming of multicast traffic, regardless of a client's location.

706 | IP Mobility

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Working with Proxy IGMP and Proxy Remote Subscription
The controller is always aware of the client's location, so the controller can join multicast group(s) on behalf of that mobile client. This feature, called Proxy IGMP, allows the controller to join a multicast group and suppresses the client's IGMP control messages to the upstream multicast router. (The client's IGMP control messages will, however, still be used by controller to maintain a multicast forwarding table.) The multicast IGMP traffic originating from the client will instead be sent from the controller's incoming VLAN interface IP.
The IGMP proxy feature includes both a host implementation and a router implementation. An upstream router sees a controller running IGMP proxy as a host; a client attached to the controller sees the controller as router. When you enable Proxy IGMP, all multicast clients associated with the controller are hidden from the upstream multicast device or router.
The newer IGMP proxy feature and the older IGMP snooping feature cannot be enabled at the same time, as both features add membership information to multicast group table. For most multicast deployments, you should enable the IGMP Proxy feature on all VLAN interfaces to manage all the multicast membership requirements on the controller. If IGMP snooping is configured on some interfaces, there is a greater chance that multicast information transfers may be interrupted.
IGMP proxy must be enabled or disabled on each individual interface. To use the IGMP proxy, ensure that the VLANs on the controllers are extended to the upstream router. Enabling IGMP proxy enables IGMP on the interface and sets the querier to the controller itself. You must identify the controller port from which the controller sends proxy join information to the upstream router, and identify the upstream router by upstream port so the controller can dynamically update the upstream multicast router information.
IGMPv3 Support
ArubaOS 6.4 supports IGMPv3 functionality that makes Dell controllers aware of the Source Specific Multicast (SSM) and is used to optimize bandwidth of the network. The SSM functionality is an extension of IP multicast where the datagram traffic is forwarded to receivers from only those multicast sources to which the receivers have explicitly joined. By default, the multicast group range of 232.0.0.0 through 232.255.255.255 (232/8) is reserved for SSM by IANA (Internet Assigned Numbers Authority).
The IGMPv3 snooping functionality is configured at the edge of the network. The devices that support IGMP snooping listen for the IGMP messages that the host sent to join an IP multicast group. These devices record details of all the hosts and also about the IP multicast group in which a particular host has joined. These devices forward IP multicast traffic to the hosts that have joined the specific multicast group.
The IGMP proxy and IGMP snooping functionalities cannot be enabled on the same VLAN simultaneously.
Configuring SSM Range
You can configure the SSM range by using the CLI and WebUI.
In the WebUI 1. Navigate to Configuration > Network > IP > Multicast Routing page of the WebUI. 2. In the IGMP tab, enter values for SSM Range in the SSM Range Start-IP and SSM Range Mask-IP text
boxes. 3. Click Apply.
The proxy operation will be downgraded to IGMPv2 if any lower version clients are present and reverts back to v3 mode if the controller finds no lower version client joins (reports) for a specified interval of time. In the downgraded proxy operation the SSM semantics is not applicable for the particular VLAN.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IP Mobility | 707

In the CLI (host)(config) # ip igmp (host)(config-ip)# ssm-range <startip> <maskip>
Working with Inter Controller Mobility
When a client moves from one controller to another, multicast traffic migrates as follows: Figure 90 Inter-Controller Mobility

1. The local controller uses its VLAN 10 IP address to join multicast group1 on behalf of a mobile client. 2. The mobile client leaves its local controller and roams to VLAN 50 remote controller A.
Remote controller A locates the mobile client's local controller and learns about the client's multicast groups. Remote controller A then joins group1 on behalf the mobile client, using its VLAN 50 source IP. Upstream multicast traffic from the roaming client is sent to the local controller over an L2 GRE tunnel. The remote controller will receive downstream multicast traffic and send it to the mobile client.
The L2-GRE Tunnel implementation of the IP mobility functionality is supported only on ArubaOS versions 6.2 or later, and is not backward compatible with the earlier implementation. ArubaOS supports only v4 mobility and does not support IPv6 L3 mobility.
Meanwhile, the local controller checks to see if other local clients require group1 traffic. If no other clients are interested in group1, then the local controller will leave that group. If there are other clients using that group, the controller will continue its group1 membership. 3. Now the mobile client leaves remote controller A and roams to VLAN 100 on remote controller B. Remote controller B locates the mobile client's local controller and learns about the client's multicast groups. Remote controller B then joins group1 on behalf the roaming mobile client 1, using its VLAN 100 IP address. Both the local controller and remote controller A will verify if any of their other clients require group1 traffic. If none of their other clients require group1, then that controller will leave the group. (If the local controller leaves the group, it will also notify remote controller A.) If either controller has other clients using that group, that controller it will continue its group1 membership.

708 | IP Mobility

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Configuring Mobility Multicast
To enable IGMP and/or IGMP snooping on this interface, or configure a VLAN interface for uninterrupted streaming of multicast traffic:
In the WebUI
1. Navigate to the Configuration > Network > IP window. 2. Click Edit by the VLAN interface for which you want to configure mobility multicast. The Edit VLAN window
opens. 3. Select Enable IGMP to enable the router to discover the presence of multicast listeners on directly-attached
links. 4. Select Snooping to save bandwidth and limit the sending of multicast frames to only those nodes that
need to receive them. 5. Select the Interface checkbox, then click the Proxy drop-down list and select the controller interface, port
and slot for which you want to enable proxy IGMP. 6. Click Apply. 7. (Optional) Repeat steps 1-6 above to configure mobility multicast for another VLAN interface.
In the CLI
interface vlan <vlan> ip igmp proxy [{fastethernet|gigabitethernet} <slot>/<port>]|[snooping]

Table 142: Command Syntax Parameter fastethernet

Description Enable IGMP proxy on the FastEthernet (IEEE 802.3) interface

gigabitethernet

Enable IGMP proxy on the GigabitEthernet (IEEE 802.3) interface

<slot>/<port> <slot>/<module>/<port> (7000 Series only)

Any command that references a Fast Ethernet or Gigabit Ethernet interface requires that you specify the corresponding port on the controller in the format <slot>/<port>.
<slot> is always 1, except when referring to interfaces on the W-6000 controller(slots 0-3).
The <port> parameter refers to the network interfaces that are embedded in the front panel of the W-3000 Series controller, or a W6000M3 controller module. Port numbers start at 0 from the left-most position.

The W-7000 and W-7200 Series controllers use a <slot>/<module>/<port> port numbering scheme. <slot> and <module> will always be 0 on the W7000 and W-7200 Series.

snooping

Enable IGMP snooping.
The IGMP protocol enables an router to discover the presence of multicast listeners on directly-attached links. Enable IGMP snooping to limit the sending of multicast frames to only those nodes that need to receive them.

Example

Dell Networking W-Series ArubaOS 6.4.x | User Guide

IP Mobility | 709

The following example configures IGMP proxy for VLAN 2. IGMP reports from the controller would be sent to the upstream router on fastethernet port 1/3:
conf# interface vlan 2 conf-subif# ip igmp proxy fastethernet 1/3

710 | IP Mobility

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Chapter 29 External Firewall Configuration

In many deployment scenarios, an external firewall is situated between Dell devices. This chapter describes the network ports that need to be configured on the external firewall to allow proper operation of the Dell network. You can also use this information to configure session ACLs to apply to physical ports on the controller for enhanced security. However, that this chapter does not describe requirements for allowing specific types of user traffic on the network.
A controller uses both its loopback address and VLAN addresses for communications with other network elements. If the firewall uses host-specific ACLS, those ACLs must specify all IP addresses used on the controller.
Topics in this chapter include: l Understanding Firewall Port Configuration Among Dell Devices on page 711 l Enabling Network Access on page 712 l Ports Used for Virtual Internet Access (VIA) on page 712 l Configuring Ports to Allow Other Traffic Types on page 712
Understanding Firewall Port Configuration Among Dell Devices
This section describes the network ports that need to be configured on the firewall to allow proper operation of the network.
Communication Between Controllers
Configure the following ports to enable communication between any two controllers: l IPSec (UDP ports 500 and 4500) and ESP (protocol 50). PAPI between a master and a local controller is
encapsulated in IPSec. l IP-IP (protocol 94) and UDP port 443 if Layer-3 mobility is enabled l GRE (protocol 47) if tunneling guest traffic over GRE to DMZ controller l IKE (UDP 500) l ESP (protocol 50) l NAT-T (UDP 4500)
Communication Between APs and the Controller
APs use Trivial File Transfer Protocol (TFTP) during their initial boot to grab their software image and configuration from the controller. After the initial boot, the APs use FTP to retrieve their software images and configurations from the controller. In many deployment scenarios, an external firewall is situated between various Dell devices. Configure the following ports to enable communication between an AP and the controller: l PAPI (UDP port 8211). If the AP uses DNS to discover the LMS controller, the AP first attempts to connect
to the master controller. (Also allow DNS (UDP port 53) traffic from the AP to the DNS server.) l PAPI (UDP port 8211). All APs running as Air Monitors (AMs) require a permanent PAPI connection to the
master controller. l FTP (TCP port 21)

Dell Networking W-Series ArubaOS 6.4.x| User Guide

External Firewall Configuration | 711

l TFTP (UDP port 69) all APs, if there is no local image on the AP (for example, a new AP) the AP will use TFTP to retrieve the initial image.
l SYSLOG (UDP port 514) l PAPI (UDP port 8211) l GRE (protocol 47) l Control Plane Security (CPSec) uses UDP port 4500
Communication Between Remote APs and the Controller
Configure the following ports to enable communication between a Remote AP (IPSec) and a controller: l NAT-T (UDP port 4500) l TFTP (UDP port 69)
TFTP is not needed for normal operation. If the remote AP loses its local image for any reason, it will use TFTP to download the latest image.
Enabling Network Access
This section describes the network ports that need to be configured on the firewall to manage the Dell network. For WebUI access between the network administrator's computer (running a Web browser) and a controller: l HTTP (TCP ports 80 and 8888) or HTTPS (TCP ports 443 and 4343). l SSH (TCP port 22 or TELNET (TCP port 23).
Ports Used for Virtual Internet Access (VIA)
The following ports are used with Dell VIA. l For the reachability/trusted network check use port 443 l For the IPSec connection use port 4500 l To allow ISAKMP use port 500
Configuring Ports to Allow Other Traffic Types
This section describes the network ports that need to be configured on the firewall to allow other types of traffic in the Dell network. You should only allow traffic as needed from these ports. l For logging: SYSLOG (UDP port 514) between the controller and syslog servers. l For software upgrade or retrieving system logs: TFTP (UDP port 69) or FTP (TCP ports 21 and 22) between
the controller and a software distribution server. l If the controller is a PPTP VPN server, allow PPTP (UDP port 1723) and GRE (protocol 47) to the controller. l If the controller is an L2TP VPN server, allow NAT-T (UDP port 4500), ISAKMP (UDP port 500) and ESP
(protocol 50) to the controller. l If a third-party network management system is used, allow SNMP (UDP ports 161 and 162) between the
network management system and all controllers. l For authentication with a RADIUS server: RADIUS (typically, UDP ports 1812 and 813, or 1645 and 1646)
between the controller and the RADIUS server.

712 | External Firewall Configuration

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l For authentication with an LDAP server: LDAP (UDP port 389) or LDAPS (UDP port 636) between the controller and the LDAP server.
l For authentication with a TACACS+ server: TACACS (TCP port 49) between the controller and the TACACS+ server.
l For packet captures: UDP port 5555 from an AP to an Ethereal packet-capture station; UDP port 5000 from an AP to a Wildpackets packet-capture station.
l For telnet access: Telnet (TCP port 23) from the network administrator's computer to any AP, if "telnet enable" is present in the "ap location 0.0.0" section of the controller configuration.
l For External Services Interface (ESI): ICMP (protocol 1) and syslog (UDP port 514) between a controller and any ESI servers.
l For XML API: HTTP (TCP port 80) or HTTPS (TCP port 443) between a controller and an XML-API client.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External Firewall Configuration | 713

Chapter 30 Palo Alto Networks Firewall Integration

User-Identification (User-ID) feature of the Palo Alto Networks (PAN) firewall allows network administrators to configure and enforce firewall policies based on user and user groups. The User-ID identifies the user on the network based on the IP address of the device which the user is logged into. Additionally, a firewall policy can be applied based on the type of device the user is using to connect to the network. Since the Dell controller maintains the network and user information of the clients on the network, it is the best source to provide the information for the User-ID feature on the PAN firewall.
PAN firewall integration with ArubaOS requires PAN-OS 5.0 or later
This feature introduces the following interactions with PAN firewall servers: l Send logon events to the PAN firewall for the client with its IP address user name, device type, when
classified. l Send logout events to PAN firewalls for the client with its IP address. The following must be configured on the PAN Firewall: l An Admin account must be created on the PAN firewall to allow the controller to send data to the PAN
firewall. This account must match the account added in the PAN profile on the controller. The built-in Admin account can be used for this purpose, but that is not recommended. It is better to create a new Admin account used solely for the purpose of communications between the controller and PAN firewall. l Preconfiguration of PAN Host Information Profile (HIP) objects and HIP-profiles on the PAN Firewall to support a device-type based policy. To enable these features, the following must be configured on the controller: l The system-wide PAN profile must be properly configured and made active on the controller. l The pan-integration parameter in the AAA profile which the client is associated with must be enabled. l For VPN clients, enable the pan-integration parameter in the VPN authentication profile which the client is associated. l For VIA clients, enable the pan-integration parameter in the VIA authentication profile to which the client is associated.
Limitations
Keep the following limitations in mind when configuring PAN Firewall Integration: l PAN Firewall Integration does not support bridge forwarding mode. l The W-600 Series controller does not support PAN Firewall integration.
Preconfiguration on the PAN Firewall
Before PAN Firewall configuration is completed on the controller, some configuration must be completed on the PAN Firewall.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Palo Alto Networks Firewall Integration | 714

User-ID Support
The administrator must configure firewall policies based on user-name and/or user-group. Additionally, correct configuration of connection to directory servers is needed for user-group based policies on the PAN firewall.
Device-Type Based Policy Support
The controller supports a limited number of device types. The identified device type associated with each IP user will be sent to the PAN in the client-version field with the host-info category of the HIP-report. PAN administrators must create these HIP objects, which filter the HIP-reports sent from the controller to support device-type based firewall policies. Table 143 lists the HIP objects with a specified Is Value in the Client Version field, which must be preconfigured on the PAN firewall.
Table 143: HIP Objects
Client Version Is Value Android Apple AppleTV BlackBerry Chrome OS iPad iPhone iPod Kindle Linux Nintendo Nintendo 3DS Nintento Wii Nook OS X PlayStation PS Vita

715 | Palo Alto Networks Firewall Integration

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Client Version Is Value PS3 PSP RIM Tablet Roku Symbian webOS Win 7 Win 8 Win 95 Win 98 Win 2000 Win CE Win ME Win NT Win Server Win Vista Win XP Windows Windows Mobile Windows Phone 7

Configuring PAN Firewall Integration
A PAN profile must be created on the controller. Multiple PAN profiles can be configured and saved on the controller, but only one profile can be active at a time. These profiles can be configured and applied using the ArubaOS WebUI or CLI.
Creating PAN Profiles
The first step in configuring PAN firewall integration is to create PAN Profiles. This profile provides the controller with the information required for connecting to and interacting with the specified PAN firewall. The PAN profile can be created using the WebUI or CLI.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Palo Alto Networks Firewall Integration | 716

This configuration is done and available on the master controller only. The configuration will be pushed to all connected local controllers.
Using the WebUI
To configure a new PAN profile, complete the following steps: 1. Navigate to Configuration > Advanced Services > All Profiles > Other Profiles > Palo Alto
Networks Servers. 2. Type the name of the PAN profile and click Add. 3. Click on the name of the name PAN profile to open the Profile Details window. 4. Enter the Host (IP address or hostname) of the PAN firewall 5. Enter the Port (1 ­ 65535) of the PAN Firewall. 6. Enter the Username of the PAN firewall. The user name is between 1 and 255 bytes in length. The
username must match the Admin account previously created on the PAN firewall. 7. Enter the Password of the username in PAN Firewall. The password is between 6 and 100 bytes in length.
The password must match the Admin account previously created on the PAN firewall. 8. Re-enter the Password entered in the previous step. 9. Click Add. 10.Click Apply.
Up to twenty (20) PAN firewalls are supported.

Table 144: PAN Profile Parameters

Parameter

Description

Host (IP or hostname)

The hostname or IP address of the PAN firewall.

Port (1 - 65535)

The port number of the PAN firewall.

Username

The username in the PAN firewall (1 - 255 bytes in length).

Password

Enter the password of the PAN firewall.

Retype Password

Retype the password of the PAN firewall.

Using the CLI
(host)(config) #pan profile <profile-name> firewall host <host> port <port> username <username> passwd <password>
Activating a PAN Profile
Once a PAN profile has been created, the profile must be activated. Select profile you want to activate from the list of configured profiles.
This configuration must be completed on each local controller.

717 | Palo Alto Networks Firewall Integration

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Using the WebUI
To apply a PAN profile, complete the following steps: 1. Navigate to Configuration > Advanced Services > All Profiles > Other Profiles > Palo Alto
Networks Active. 2. Select Active Palo Alto Networks. To the right of this link, the name of the active profile is displayed. 3. Another configured profile can be selected from the Active Palo Alto Networks Profile > drop-down
menu. Additionally, a new profile can be configured by selecting --NEW-- and completing the configuration details. 4. Once a profile is selected from the drop-down menu or a new profile is created, click Apply.
Using the CLI
(host)(config) #pan active-profile profile <profile- name>
Enabling PAN Firewall Integration
PAN firewall integration must be enabled on the AAA profile that the client is associated with.
Using the WebUI
To enable PAN firewall integration in the AAA profile: 1. Navigate to the Configuration > Security > Authentication > AAA Profiles page. 2. In the AAA Profiles Summary, select the desired profile. 3. Check the PAN Firewalls Integration check box. 4. Click Apply.
Using the CLI
(host)(config) #aaa profile <aaa profile-name> pan-integration
Enabling PAN Firewall Integration for VIA Clients
For VIA clients, PAN firewall integration must be enabled on the VIA authentication profile that the client is associated with.
Using the WebUI
To enable PAN firewall integration for VIA clients: 1. Navigate to the Security > Authentication > L3 Authentication page. 2. In the profiles list on the left, click VIA Authentication and select the desired profile. 3. Check the PAN Firewalls Integration check box. 4. Click Apply.
Using the CLI
(host)(config) #aaa authentication via auth-profile <profile-name> pan-integration
Enabling PAN Firewall Integration for VPN Clients
For VPN clients, PAN firewall integration must be enabled on the VPN authentication profile that the client is associated with.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Palo Alto Networks Firewall Integration | 718

Using the WebUI
To enable PAN firewall integration for VPN clients: 1. Navigate to the Security > Authentication > L3 Authentication page. 2. In the profiles list on the left, click VPN Authentication and select the default profile. 3. Check the PAN Firewalls Integration check box. 4. Click Apply.
Using the CLI
(host)(config) #aaa authentication vpn default pan-integration

719 | Palo Alto Networks Firewall Integration

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Chapter 31 Remote Access Points

The Secure Remote Access Point Service allows AP users, at remote locations, to connect to a Dell controller over the Internet. Because the Internet is involved, data traffic between the controller and the remote AP is VPN encapsulated. That is, the traffic between the controller and AP is encrypted. Remote AP operations are supported on all of Dell's APs.
Topics in this chapter include:
l About Remote Access Points on page 720 l Configuring the Secure Remote Access Point Service on page 722 l Deploying a Branch/Home Office Solution on page 727 l Enabling Remote AP Advanced Configuration Options on page 734 l Understanding Split Tunneling on page 749 l Understanding Bridge on page 755 l Provisioning Wi-Fi Multimedia on page 759 l Reserving Uplink Bandwidth on page 759 l Provisioning 4G USB Modems on Remote Access Points on page 760 l Configuring W-IAP3WN and W-IAP3WNP Access Points on page 766 l Converting an IAP to RAP or CAP on page 766 l Enabling Bandwidth Contract Support for RAPs on page 767
About Remote Access Points
Remote APs connect to a controller using Extended Authentication and Internet Protocol Security (XAuth/IPSec). AP control and 802.11 data traffic are carried through this tunnel. Secure Remote Access Point Service extends the corporate office to the remote site. Remote users can use the same features as corporate office users. For example, voice over IP (VoIP) applications can be extended to remote sites while the servers and the PBX remain secure in the corporate office.
For both RAPs and CAPs, tunneled SSIDs will be brought down eight seconds after the AP detects that there is no connectivity to the controller. However, RAP bridge-mode SSIDs are configurable to stay up indefinitely (always-on / persistent). For CAP bridge-mode SSIDs, the CAP will be brought down after the keepalive times out (default 3.5 minutes).
Secure Remote Access Point Service can also be used to secure control traffic between an AP and the controller in a corporate environment. In this case, both the AP and controller are in the company's private address space.
The remote AP must be configured with the IPSec VPN tunnel termination point. Once the VPN tunnel is established, the AP bootstraps and becomes operational. The tunnel termination point used by the remote AP depends upon the AP deployment, as shown in the following scenarios:
l Deployment Scenario 1: The remote AP and controller reside in a private network which secures AP-tocontroller communication. (This deployment is recommended when AP-to-controller communications on a private network need to be secured.) In this scenario, the remote AP uses the controller's IP address on the private network to establish the IPSec VPN tunnel.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Remote Access Points | 720

Figure 91 Remote AP with a Private Network

l Deployment Scenario 2: The remote AP is on the public network or behind a NAT device and the controller is on the public network. The remote AP must be configured with the tunnel termination point, which must be a publicly-routable IP address. In this scenario, a routable interface is configured on the controller in the DMZ. The remote AP uses the controller's IP address on the public network to establish the IPSec VPN tunnel.
Figure 92 Remote AP with Controller on Public Network
l Deployment Scenario 3: The remote AP is on the public network or behind a NAT device and the controller is also behind a NAT device. (This deployment is recommended for remote access.) The remote AP must be configured with the tunnel termination point, which must be a publicly-routable IP address. In this scenario, the remote AP uses the public IP address of the corporate firewall. The firewall forwards traffic to an existing interface on the controller. (The firewall must be configured to pass NAT-T traffic (UDP port 4500) to the controller.)
Figure 93 Remote AP with Controller Behind Firewall

In any of the described deployment scenarios, the IPSec VPN tunnel can be terminated on a local controller, with a master controller located elsewhere in the corporate network (Figure 94). The remote AP must be able to communicate with the master controller after the IPSec tunnel is established. Make sure that the L2TP IP pool configured on the local controller (from which the remote AP obtains its address) is reachable in the controller network by the master controller.

721 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 94 Remote AP in a Multi-Controller Environment

Configuring the Secure Remote Access Point Service
The tasks for configuring a Dell Access Points as a Secure Remote Access Point Service are: l Configure a public IP address for the controller.
You must install one or more AP licenses in the controller. There are several AP licenses available that support different maximum numbers of APs. The licenses are cumulative; each additional license installed increases the maximum number of APs supported by the controller. l Configure the VPN server on the controller. The remote AP will be a VPN client to the server. l Provision the AP with IPSec settings, including the username and password for the AP, before you install it at the remote location. You can also provision the RAP using the zero touch provisioning method. For more information, see Provisioning 4G USB Modems on Remote Access Points on page 760.
Configure a Public IP Address for the Controller
The remote AP requires an IP address to which it can connect to establish a VPN tunnel to the controller. This can be either a routable IP address you configure on the controller, or the address of an external router or firewall that forwards traffic to the controller. The following procedure describes how to create a DMZ address on the controller.
In the WebUI
1. Navigate to the Configuration > Network > VLANs page. 2. Click Add to add a VLAN. 3. Enter the VLAN ID. 4. Select the port that belongs to this VLAN. 5. Click Apply. 6. Navigate to the Configuration > Network > IP page. 7. Click Edit for the VLAN you just created. 8. Enter the IP Address and Net Mask fields. 9. Click Apply.
In the CLI
(host) (config) #vlan <id>
(host) (config) #interface fastethernet <slot/module/<port>
switchport access vlan <id> (host) (config) #interface vlan <id>
ip address <ipaddr> <mask>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 722

Configure the NAT Device
Communication between the AP and the secure controller uses the UDP 4500 port. When both the controller and the AP are behind NAT devices, configure the AP to use the NAT device's public address as its master address. On the NAT device, you must enable NAT-T (UDP port 4500 only) and forward all packets to the public address of the NAT device on UDP port 4500 to the controller to ensure that the remote AP boots successfully.
Configure the VPN Server
This section describes how to configure the IPSec VPN server on the controller. For more details, see Virtual Private Networks on page 411. The remote AP will be a VPN client that connects to the VPN server on the controller.
In the WebUI
1. Navigate to the Configuration > Advanced Services > VPN Services > IPSec page. 2. Select Enable L2TP. 3. Make sure that PAP (Password Authentication Protocol) is selected for Authentication Protocols. 4. To configure the L2TP IP pool, click Add in the Address Pools section. Configure the L2TP pool from which
the APs will be assigned addresses, then click Done.
The size of the pool should correspond to the maximum number of APs that the controller is licensed to manage.
5. To configure an Internet Security Association and Key Management Protocol (ISAKMP) encrypted subnet and preshared key, click Add in the IKE Shared Secrets section and configure the preshared key. Click Done to return to the IPSec page.
6. Click Apply.
In the CLI
(host) (config) # vpdn group l2tp
ppp authentication PAP
(host) (config) #ip local pool <pool> <start-ipaddr> <end-ipaddr> (host) (config) #crypto isakmp key <key> address <ipaddr> netmask <mask>
CHAP Authentication Support over PPPoE
RAPs can now establish a PPPoE session with a PPPoE server at the ISP side and get authenticated using the Challenge Handshake Authentication Protocol (CHAP). The PPPoE client running on a RAP is capable of handling the CHAP authentication requests from the PPPoE server.
The PPPoE client selects either the PAP or the CHAP credentials for the RAP authentication depending upon the request from the PPPoE server.
You can use the WebUI or the CLI to configure CHAP.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Installation page. The list of discovered APs are displayed on this page. 2. Select the AP you want to configure using CHAP and click Provision button. 3. Enter the CHAP Secret in the text box under Authentication Method.

723 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

You can use all the special characters except question mark (?) and the space can be used within double quotes (" ").
4. Enter the CHAP Secret again in the Confirm CHAP Secret text box for confirmation. Figure 95 CHAP Authentication Using CHAP Secret

5. Click Apply and Reboot.
In the CLI
(host) (config) #provision-ap pppoe-chap-secret <KEY> reprovision ap-name <name>
Configuring Certificate RAP
You can configure the remote AP to use the internal certificate for authentication. You can use the WebUI or CLI to configure the certificate RAP.
In the WebUI
1. Navigate to Configuration > AP Installation (under Wireless.) 2. Select the required remote AP under the Provisioning tab and then click Provision. 3. Select Yes for Remote AP and Certificate for Remote AP Authentication Method. 4. Click Apply and Reboot to apply the configuration and reboot the AP as certificate RAP.
In the CLI
(host) (config) #local-userdb-ap whitelist-db rap add <mac-address>
Creating a Remote AP Whitelist
If you use the Zero Touch provisioning method to provision the certificate RAP, then you must create a remote AP whitelist. For more information on Zero Touch Provisioning of the RAP, see Provisioning 4G USB Modems on Remote Access Points on page 760. Remote AP whitelist is the list of approved APs that can be provisioned on your controller.
In the WebUI 1. Navigate to Configuration > AP Installation (under Wireless) and then click the RAP Whitelist tab on the
right side. 2. Click New and provide the following details:
l AP MAC Address--mandatory parameter. Enter the MAC address of the AP. l Username--enter a username that is used when the AP is provisioned. l AP Group--select a group to add the AP.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 724

l AP Name--enter a name for the AP. If you do not enter an AP name, the MAC address will be used instead.
l Description--enter a text description for the AP l IP-Address--enter an IP address for the AP. 3. Click Add to add the remote AP to the whitelist.
Configuring PSK RAP
You can use Pre-Shared Key (PSK) authentication to provision an individual remote AP or a group of remote APs using an Internet Key Exchange Pre-Shared Key (IKE PSK).
In the WebUI
1. Navigate to the Configuration > Wireless > AP Installation > Provisioning window. 2. Click the checkbox by the AP you want to provision, then click Provision. The Provisioning window opens. 3. Select Yes for the Remote AP option 4. In the Remote IP Authentication Method section, select Pre-shared key. 5. Enter and confirm the pre-shared key (IKE PSK). 6. In the User credential assignment section, specify if you want to use a Global User Name/password
or a Per AP User Name/Password. a. If you use the Per AP User Names/Passwords option, each RAP is given its own username and
password. b. If you use the Global User Name/Password option, all selected RAPs are given the same (shared)
username and password. 7. Enter the user name, and enter and confirm the password. If you want the controller to automatically
generate a user name and password, select Use Automatic Generation, then click Generate by the User Name and Password fields.
Add the user to the internal database
You can add the user to the internal database using the WebUI or CLI.
In the WebUI 1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select Internal DB. 3. Click Add User in the Users section. The user configuration page displays. 4. Enter the username and password. 5. Click Enabled to activate this entry on creation. 6. Click Apply . Note that the configuration does not take effect until you perform this step. 7. At the Servers page, click Apply.
In the CLI (host) (config) #local-userdb add username rapuser1 password <password>
RAP Static Inner IP Address
The RAP static inner IP address feature assigns a static inner IP address to a remote access point (RAP). A new remote-IP address parameter is added to the existing configuration commands.

725 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the WebUI
To view IP address parameter in the local database, navigate to the Configuration > Security > Authentication > Servers > Internal DB page.
Figure 96 IP-Address parameter in the local database

To view IP-address parameter in the RAP Whitelist, navigate to the Wireless > AP Installation > RAP Whitelist page.
Figure 97 IP-Address parameter in the RAP Whitelist

In the CLI
(host) (config) #local-userdb add {generate-username|username <name>} {generatepassword|password <password>} {remote-ip <remote-ip>} (host) (config) #local-userdb modify {username < name>} {remote-ip <remote-ip>} (host) (config) #local-userdb-ap whitelist-db rap add {mac-address <address>}{ap-group <ap_ group>}{remote-ip <remote-ip>} (host) (config) #local-userdb-ap whitelist-db rap modify {mac-address <address>} {remoteip<remote-ip>}
You cannot configure the IP-Address parameter using the WebUI.
Provision the AP
You need to configure the VPN client settings on the AP to instruct the AP to use IPSec to connect to the controller. You can provision the remote AP and give it to users and allow remote users to provision AP at their home. This method of provisioning is referred as Zero Touch Provisioning. See Provisioning 4G USB Modems on Remote Access Points on page 760 for more information about Zero Touch Provisioning of remote AP.
You must provision the AP before you install it at its remote location. To provision the AP, the AP must be physically connected to the local network or directly connected to the controller. When connected and powered on, the AP must also be able to obtain an IP address from a DHCP server on the local network or from the controller.
If your configuration has an internal LMS IP address, remote APs may attempt to switch over to the LMS IP address, which is not reachable from the Internet. For remote APs, ensure that the LMS IP address in the AP system profile for the AP group has an externally routable IP address.
Reprovisioning the AP causes it to automatically reboot. The easiest way to provision an AP is to use the Provisioning page in the WebUI, as described in the following steps:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 726

1. Navigate to the Configuration > Wireless > AP Installation > Provisioning page. Select the remote AP and click Provision.
2. Under Authentication Method, select IPSec Parameters. Enter the Internet Key Exchange (IKE) PreShared Key (PSK), username, and password.
The username and password you enter must match the username and password configured on the authentication server for the remote AP.
3. Under Master Discovery, set the Master IP Address as shown below:

Deployment Scenario Deployment 1 Deployment 2 Deployment 3

Master IP Address Value Controller IP address Controller public IP address Public address of the NAT device to which the controller is connected

The username and password you enter must match the username and password configured on the authentication server for the remote AP.
4. Under IP Settings, make sure that Obtain IP Address Using DHCP is selected. 5. Click Apply and Reboot.
Deploying a Branch/Home Office Solution
In a branch office, the AP is deployed in a separate IP network from the corporate network. Typically, there are one or two NAT devices between the two networks. Branch office users need access to corporate resources such as printers and servers, but traffic to and from these resources must not impact the corporate head office. Figure 98 is a graphic representation of a remote AP in a branch or home office, with a single controller providing access to both a corporate WLAN and a branch office WLAN. Figure 98 Remote AP with Single Controller

727 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Branch office users want continued operation of the branch office WLAN, even if the link to the corporate network goes down. The branch office AP solves these requirements by providing the following capabilities on the branch office WLAN: l Local termination of 802.11 management frames which provides survivability of the branch office WLAN. l All 802.1x authenticator functionality is implemented in the AP. The controller is used as a RADIUS pass-
through when the authenticator has to communicate with a RADIUS server (which also supports survivability). l 802.11 encryption/decryption is in the AP to provide access to local resources. l Local bridging of client traffic connected to the WLAN or to an AP 70 enet1 port to provide access to local resources.
Provisioning the Branch AP
You can provision the remote AP either using the controller or using the Zero Touch Provisioning method. For more information on controller provisioning, see Configuring Installed APs on page 581. For more information on Zero Touch Provisioning, see Provisioning 4G USB Modems on Remote Access Points on page 760.
Configuring the Branch AP
l Specify forward mode for the Extended Service Set Identifier (ESSID) in the virtual AP profile l Specify remote AP operation in the virtual AP profile (The remote AP operates in standard mode by default.) l Set how long the AP stays up after connectivity to controller has gone down in the SSID profile l Set the VLAN ID in the virtual AP profile l Set the native VLAN ID in the AP system profile l Set forward mode for enet1 port
Remote APs support 802.1q VLAN tagging. Data from the remote AP will be tagged on the wired side.
Troubleshooting Remote AP
The following WebUI options are available to troubleshoot issues with remote AP: l Using local debugging feature l Viewing the remote AP summary report l Viewing remote AP connectivity report l Using remote AP diagnostic options
Local Debugging
Local debugging is a WebUI feature that allows end users to perform diagnostics and view the status of their remote AP through a wired or wireless client. This feature is useful for troubleshooting connectivity problems on remote APs and performing throughput tests. There are three tabs in the Local Debugging WebUI window; Summary, Connectivity, and Diagnostics. Each tab displays different information for the AP, but all three tabs include a Generate & save support file link that, when clicked, will automatically generate a support.tgz file that can be sent to a corporate IT department for additional analysis and debugging.
Starting from Dell Networking W-Series ArubaOS 6.4.x, snapshot of the bridge, acl, session, user, and arp tables, current processes, memory, and kernel debug messages are captured in a single rap_debug.txt file which is bundled along with support.tgz file.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 728

Remote AP Summary
The Summary tab has two views; basic and advanced. Click the basic or advanced links at the top of this tab to toggle between the two views. The table below shows the information displayed for both the basic and advanced views of the Summary tab.

729 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 145: RAP Console Summary Tab Information

Summary Table Name

Basic View Information

Wired Ports Status

l Port: port numbers of the wired ports on the AP
l Status: current status of each port (Connected, LinkDown or Disabled).

Wireless SSIDs

l SSID: Name of the SSID.
l Status: SSID Status (up, down, or disabled).
l Band: Radio band available on the SSID.

Advanced View Information
The advanced view of the Wired Access Ports table displays the following data:
l Port: port numbers of the wired ports on the AP
l Status: current status of each port (Connected, LinkDown or Disabled)
l MAC Address: MAC address of the wired port
l Speed: speed of the link
l Duplex Type: duplex mode of the link, full or half
l Forwarding mode: forwarding mode for the port: Bridge, Tunnel or Split Tunnel
l Users: fumber of users accessing each port
l Rx Packets: number of packets received on the port
l Tx packets: number of packets transmitted via the port
l SSID: name of the SSID
l Status: SSID Status (up, down, or disabled).
l Band: radio band available on the SSID
l Channel: channel used on the radio band
l BSSID: BSSID of the wireless SSID
l Forwarding Mode: forwarding mode used by the Wireless SSID (Bridge, Tunnel or Split-Tunnel)
l EIRP: equivalent Isotropic Radiated Power, in dBm
l Noise floor: residual background noise detected by an AP. Noise seen by an AP is reported as -dBm Therefore, a noise floor of -100 dBm is smaller (lower) than a noise floor of -50 dBm.
l Users: number of users on the radio band
l Rx Packets: number of packets received on the BSSID
l Tx packets: number of packets

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 730

Summary Table Name

Basic View Information

Advanced View Information transmitted via the BSSID

Wired Users

l MAC Address: MAC address of the wired user.
l IP address: IP address of the wired user.

l MAC Address: MAC address of the wired user.
l IP address: IP address of the wired user.
l Port: AP port used by the wired user.

Wireless User

l MAC Address: MAC address of the wireless user.
l IP address: IP address of the wireless user.

l MAC Address: MAC address of the wired user
l IP address: IP address of the wired user
l SSID: name of the SSID
l BSSID: BSSID of the wireless user
l Assoc State: shows if the user is associated or just authorized
l Auth: Type of authentication: WPA, 802.1x, none, open, or shared
l Encryption: encryption type used by the wireless user
l Band: radio band used by the wireless client
l RSSI: Receive Signal Strength Indicator (RSSI) value displayed in the output of this command represents signal strength as a signal to noise ratio.

731 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Summary Table Name
Device Info

Basic View Information

Advanced View Information

l Type: AP device/model type.

N/A

l Name: Name assigned to the AP.

l Wired MAC address: MAC address of the wired port.

l Serial #: AP serial number.

l Tunnel IP address: IP address of the tunnel between the AP and controller.

l Software Version: Software version currently running on the AP.

l Uptime: Amount of time the AP has been active since it was last reset.

l Master: IP address of the master controller.

l lms: IP address of the local controller.

Uplink Info

The Uplink Info table can display some

N/A

or all of the following information for

your remote AP, depending upon

whether a link is active and the number

of links supported by the AP.

Active uplink information, including:

l Interface name

l Port speed

l IP address

Standby link information, including:

l Name (3G)

l Device connected (yes/no)

l Provisioned (yes/no)

l IP address

l Device

l User

l Password

Multihoming on remote AP (RAP)
You can uplink a RAP as an Ethernet or a USB based modem. These uplinks can be used as a backup link if the primary link fails. The uplink becomes active based on the order of priority configured on the RAP. The RAP switches back to the primary link when the primary connection is restored.
For information on provisioning the RAP using the USB based modem, see Provisioning 4G USB Modems on Remote Access Points on page 760.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 732

Seamless failover from backup link to primary link on RAP
RAPs can failover from a backup link to a primary link without much disruption to traffic. Also the failover is performed only if the controller is reachable via the primary link.
Remote AP Connectivity
The information shown on the Connectivity tab will vary, depending upon the current status of the remote AP. If a remote AP has been successfully provisioned and connected, it should display some or all of the information in Table 146.

Table 146: RAP Console Connectivity Tab Information

Data

Description

Uplink status

Shows if the link connected failed. If the link is connected, the Uplink status also displays the name of the interface.

IP Information

If the AP has successfully received an IP address, this data row will show the AP's IP address, subnet mask, and gateway IP address.

Gateway Connectivity

If successful, this item also shows the percentage of packet loss for data received from the gateway.

TPM Certificates

If successful, the AP has a Trusted Platform Module (TPM) certificate.

Master Connectivity

Shows if the AP was able to connect to the master controller. This item also shows the IP address to which the AP attempted to connect, and, if the AP did connect successfully, the link used to connect to that controller.

LMS Connectivity

Shows if the AP was able to connect to a local controller. This item also shows the IP address to which the AP attempted to connect, and, if the AP did connect successfully, the link used to connect to that controller.

The top of the Connectivity tab has a Refresh link that allows users to refresh the data on their screen. Additional information at the bottom of this tab shows the date, time, and reason the remote AP last rebooted. The Reboot RAP Now button reboots the remote AP.
Remote AP Diagnostics
Use the Diagnostics tab to view log files, or run diagnostic tests that can help the IT department troubleshoot errors. Use the Reboot AP Now button at the bottom of the Diagnostic window to reboot the remote AP.
To run a diagnostic test on a remote AP:
1. Access the RAP console, and click the Diagnostics tab. 2. Click the Test drop-down list and select Ping, Traceroute, NSLookup, or Throughput.
The ping and traceroute tests require that you enter a network destination in the form of an IP address or fully-qualified domain name, and select either bridge or tunnel mode for the test. The NSLookup diagnostic test requires that you enter a destination only. The throughput test checks the throughput of the link between the AP and the controller, and does not require any additional test configuration settings. 3. Click OK to start the test. The results of the test will appear in the Diagnostics window.

733 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

To display log files in a separate browser window, click the logs drop-down list at the upper right corner of the Diagnostics window, and select any of the log file name. The type of log files available will vary, depending upon your remote AP configuration.
Enabling Remote AP Advanced Configuration Options
This section describes the following features designed to enhance your remote AP configuration: l Understanding Remote AP Modes of Operation on page 734 l Working in Fallback Mode on page 736 l Specifying the DNS Controller Setting on page 744 l Backup Controller List on page 745 l Configuring Remote AP Failback on page 746 l Working with Access Control Lists and Firewall Policies on page 748 l Understanding Split Tunneling on page 749 l Provisioning Wi-Fi Multimedia on page 759
The information in this section assumes you have already configured the remote AP functionality, as described in Configuring the Secure Remote Access Point Service on page 722.
Understanding Remote AP Modes of Operation
Table 147 summarizes the different remote AP modes of operation. You specify both the forward mode setting (which controls whether 802.11 frames are tunneled to the controller using GRE, bridged to the local Ethernet LAN, or a combination thereof) and the remote AP mode of operation (when the virtual AP operates on a remote AP) in the virtual AP profile. The column on the left of the table lists the remote AP operation settings. The row across the top of the table lists the forward mode settings. To understand how these settings work in concert, scan the desired remote AP operation with the forward mode setting, and read the information in the appropriate table cell. The "all" column and row lists features that all remote AP operation and forward mode settings have in common regardless of other settings. For example, at the intersection of "all" and "bridge," the description outlines what happens in bridge mode regardless of the remote AP mode of operation.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 734

Table 147: Remote AP Modes of Operation and Behavior

Remote AP Operation Setting

Forward Mode Setting

all

bridge

split-tunnel

tunnel

decrypt-tunnel

all

Management

Management

Frames are GRE Management

frames on the

frames on the

tunneled to the

frames on the

AP.

AP.

controller to an AP.

Frames are bridged

Frames are either GRE

untrusted tunnel.

Frames are always GRE

between wired

tunneled to the

100% of station tunneled to

and wireless

controller to a

frames are

controller.

interfaces.

trusted tunnel or tunneled to the

No frames are tunneled to the controller.

NATed and bridged on the wired interface according to

controller.

Station acquires its IP address

user role and session ACL.

locally from an external DHCP server.

Typically, the station obtains an IP address

from a VLAN on

the controller.

Typically, the AP has ACLs that forward corporate traffic through the tunnel and source NAT the non-corporate traffic to the Internet.

always

ESSID is always up when the AP is up regardless of whether the controller is reachable.
Supports PSK ESSID only.
SSID configuration stored in flash on AP.

Provides an SSID that is always available for local access.

Not supported

Not supported

Not supported

all

bridge

split-tunnel

tunnel

735 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote AP Operation Setting
backup

Forward Mode Setting

ESSID is only up when the controller is unreachable.
Supports PSK ESSID only.
SSID configuration stored in flash on AP.

Provides a backup SSID for local access only when the controller is unreachable.

Not supported

persistent

ESSID is up when the AP contacts the controller and stays up if connectivity is disrupted with the controller.
SSID configuration obtained from the controller.
Designed for 802.1x SSIDs.

Same behavior as standard, described below, except the ESSID is up if connectivity to the controller is lost.

Not supported

standard

ESSID is up only when there is connectivity with the controller.
SSID configuration obtained from the controller.

Behaves like a classic Dell branch office AP.
Provides a bridged ESSID that is configured from the controller and stays up if there is controller connectivity.

Split tunneling mode

Not supported

Not supported

Not supported

Not supported

Classic Dell thin AP operation

Decrypt tunnel mode

Working in Fallback Mode
The fallback mode (also known as backup configuration) operates the remote AP if the master controller or the configured primary and backup LMS are unreachable. The remote AP saves configuration information that allows it to operate autonomously using one or more SSIDs in local bridging mode, while supporting open association or encryption with PSKs. You can also use the backup configuration if you experience network connectivity issues, such as the WAN link or the central data center becoming unavailable. With the backup configuration, the remote site does not go down if the WAN link fails or the data center is unavailable.
You define the backup configuration in the virtual AP profile on the controller. The remote AP checks for configuration updates each time it establishes a connection with the controller. If the remote AP detects a change, it downloads the configuration changes.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 736

The following remote AP backup configuration options define when the SSID is advertised (refer to Table 147 for more information):
l Always--Permanently enables the virtual AP. Recommended for bridge SSIDs. l Backup--Enables the virtual AP if the remote AP cannot connect to the controller. This SSID is advertised
until the controller is reachable. Recommended for bridge SSIDs. l Persistent--Permanently enables the virtual AP after the remote AP initially connects to the controller.
Recommended for 802.1x SSIDs. l Standard--Enables the virtual AP when the remote AP connects to the controller. Recommended for
802.1x, tunneled, and split-tunneled SSIDs. This is the default behavior.
While using the backup configuration, the remote AP periodically retries its IPSec tunnel to the controller. If you configure the remote AP in backup mode, and a connection to the controller is re-established, the remote AP stops using the backup configuration and immediately brings up the standard remote AP configuration. If you configure the remote AP in always or persistent mode, the backup configuration remains active after the IPSec tunnel to the controller has been re-established.
Backup Configuration Behavior for Wired Ports
If the connection between the remote AP and the controller is disconnected, the remote AP will be exhibit the following behavior:
l All access ports on the remote AP will be moved to bridge forwarding mode ,irrespective of their original forwarding mode..
l Clients will receive an IP address from the remote AP's DHCP server. l Clients will have complete access to Remote AP's uplink network. You cannot enforce or modify any access
control policies on the clients connected in this mode.
This section describes the following topics:
l Configuring Fallback Mode on page 737 l Configuring the DHCP Server on the Remote AP on page 739 l Configuring Advanced Backup Options on page 741
Configuring Fallback Mode
To configure the fallback mode, you must:
l Configure the AAA profile l Configure the virtual AP profile
Configuring the AAA Profile for Fallback Mode
In the WebUI The AAA profile defines the authentication method and the default user role for unauthenticated users:
1. Navigate to the Security > Authentication > AAA Profiles page. From the AAA Profiles Summary list, click Add.
2. Enter the AAA profile name, then click Add. 3. Select the AAA profile that you just created:
a. For Initial role, select the appropriate role (for example, "logon"). b. For 802.1X Authentication Default Role, select the appropriate role (for example, "default"), then
click Apply.

737 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

c. Under the AAA profile that you created, locate 802.1x Authentication Server Group, and select the authentication server group to use (for example "default"), then click Apply.
If you need to create an 802.1x authentication server group, select new from the 802.1X Authentication Server Group drop-down list, and enter the appropriate parameters.
d. Under the AAA profile that you created, locate 802.1X Authentication Profile, and select the profile to use (for example, "default"), then click Apply.
If you need to create an 802.1x authentication profile, select new from the 802.1X Authentication Profile dropdown list, and enter the appropriate parameters.
In the CLI (host) (config) #aaa profile <name> initial-role <role> authentication-dot1x <dot1x-profile> dot1x-default-role <role> dot1x-server-group <group>
Configuring the Virtual AP Profile for Fallback Mode
In the WebUI n Set the remote AP operation to always, backup, or persistent. n Create and apply the applicable SSID profile. The SSID profile for the backup configuration in always, backup, or persistent mode must be a bridge SSID. When configuring the virtual AP profile, specify forward mode as bridge. The SSID profile for the backup configuration in standard mode can be a bridge, tunnel, or split tunnel SSID. When configuring the virtual AP profile, specify forward mode as bridge, tunnel, or split tunnel.
When creating a new virtual AP profile In the WebUI, you can also configure the SSID at the same time. For information about AP profiles, see Understanding AP Configuration Profiles on page 569.
1. Navigate to the Configuration > Wireless > AP Configuration page. Select either the AP Group or AP Specific tab. Click Edit for the AP group or AP name.
2. Under Profiles, select Wireless LAN, then Virtual AP. 3. To create a new virtual AP profile in the WebUI, select New from the Add a profile drop-down menu. Enter
the name for the virtual AP profile, and click Add.
Whenever you create a new virtual AP profile in the WebUI, the profile automatically contains the "default" SSID profile with the default ESSID. You must configure a new ESSID and SSID profile for the virtual AP profile before you apply the profile.
a. In the Profile Details entry for the new virtual AP profile, go to the AAA Profile drop-down list and select the previously configured AAA profile (for example, logon). The AAA Profile pop-up window appears.
b. To set the AAA profile and close the pop-up window, Click Apply. c. In the Profile Details entry for the new virtual AP profile, select NEW from the SSID Profile drop-down
menu. The SSID Profile pop-up window displays to allow you to configure the SSID profile. d. Enter the name for the SSID profile (for example, backup). e. Under Network, enter a name in the Network Name (SSID) field (for example, backup-psk). f. Under Security, select the network authentication and encryption methods (for example, wpa-psk-tkip,
with the passphrase remote123).

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 738

g. To set the SSID profile and close the pop-up window, click Apply. 4. At the bottom of the Profile Details window, Click Apply. 5. Click the new virtual AP name in the Profiles list or the Profile Details to display configuration parameters. 6. Under Profile Details, do the following:
a. Make sure Virtual AP enable is selected. b. From the VLAN drop-down menu, select the VLAN ID to use for the virtual AP profile. c. From the Forward mode drop-down menu, select bridge. d. From the Remote-AP Operation drop-down menu, select always, backup, or persistent. The default
is standard. Click Apply.
In the CLI (host) (config) #wlan ssid-profile <profile> essid <name> opmode <method> wpa-passphrase <string> (if necessary)
(host) (config) #wlan virtual-ap <name> ssid-profile <profile> vlan <vlan> forward-mode bridge aaa-profile <name> rap-operation {always|backup|persistent}
(host) (config) #ap-group <name> virtual-ap <name>
or
(host) (config) #ap-name <name> virtual-ap <name>
Configuring the DHCP Server on the Remote AP
You can configure the internal DHCP server on the remote AP to provide an IP address for the backup SSID if the controller is unreachable. If configured, the remote AP DHCP server intercepts all DHCP requests and assigns an IP address from the configured DHCP pool.
To configure the remote AP DHCP server:
l Enter the VLAN ID for the remote AP DHCP VLAN in the AP system profile. This VLAN enables the DHCP server on the AP (also known as the remote AP DHCP server VLAN). If you enter the native VLAN ID, the DHCP server is not configured and is unavailable.
l Specify the DHCP IP address pool and netmask. The AP assigns IP addresses from the DHCP pool 192.168.11.0/24 by default, with an IP address range from 192.168.11.2 through 192.168.11.254. You can manually define the DHCP IP address pool and netmask based on your network design and IP address scheme.
l Specify the IP address of the DHCP server, DHCP router, and the DHCP DNS server. The AP uses IP address 192.168.11.1 for the DHCP server, the DHCP router, and the DHCP DNS server by default.
l Enter the amount of days the assigned IP address is valid (also known as the remote AP DHCP lease). The lease does not expire by default, which means the IP address is always valid.
l Assign the VLAN ID for the remote AP DHCP VLAN to a virtual AP profile. When a client connects to that virtual AP profile, the AP assigns the IP address from the DHCP pool.

739 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The following is a high-level description of the steps required to configure the DHCP server on the remote AP. The steps assume you have already created the virtual AP profile, AAA profile, SSID profile, and other settings for your remote AP operation (for information about the backup configuration, see Configuring Fallback Mode on page 737).
In the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration page. 2. Select either the AP Group or AP Specific tab. Click Edit for the AP group or AP name. 3. Under Profiles, select AP to display the AP profiles. 4. Select the AP system profile you want to modify. 5. Under Profile Details:
a. At the LMS IP field, enter the LMS IP address. b. At the Master controller IP address field, enter the master controller IP address. c. At the Remote-AP DHCP Server VLAN field, enter the VLAN ID of the backup configuration virtual AP
VLAN. d. At the Remote-AP DHCP Server ID field, enter the IP address for the DHCP server. e. At the Remote-AP DHCP Default Router field, enter the IP address for the default DHCP router. f. At the Remote-AP DHCP DNS Server list, enter an IP address in the field to right and click Add. You can
add multiple IP addresses the same way. To delete an IP address, select an IP address from the list and click Delete. g. Specify the DHCP IP address pool. This configures the pool of IP addresses from which the remote AP uses to assign IP addresses. - At the Remote-AP DHCP Pool Start field, enter the first IP address of the pool. - At the Remote-AP-DHCP Pool End field, enter the last IP address of the pool. - At the Remote-AP-DHCP Pool Netmask field, enter the netmask. h. At the Remote-AP DHCP Lease Time field, specify the amount of time the IP address is valid. 6. Click Apply. 7. Under Profiles, select Wireless LAN, then Virtual AP, then the virtual AP profile you want to configure. 8. Under Profile Details, at the VLAN drop-list, select the VLAN ID of the remote AP DHCP VLAN, click the left arrow to move the VLAN ID to the VLAN field, and click Apply.
In the CLI
Use the following commands:
(host) (config) #ap system-profile <name> lms-ip <ipaddr> master-ip <ipaddr> rap-dhcp-default-router <ipaddr> rap-dhcp-dns-server <ipaddr> rap-dhcp-lease <days> rap-dhcp-pool-end <ipaddr> rap-dhacp-pool-netmask <netmask> rap-dhcp-pool-start <ipaddr> rap-dhcp-server-id <ipaddr> rap-dhcp-server-vlan <vlan>
(host) (config) #wlan virtual-ap <name> ssid-profile <profile> vlan <vlan> forward-mode bridge aaa-profile <name> rap-operation {always|backup|persistent}

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 740

(host) (config) #ap-group <name> ap-system-profile <name> virtual-ap <name>
or (host) (config) #ap-name <name> ap-system-profile <name> virtual-ap <name>
Configuring Advanced Backup Options
You can also use the backup configuration (fallback mode) to allow the remote AP to pass through a captive portal, such as network access in a hotel, airport, or other public network, to access the corporate network. For this scenario: l Define a session ACL for the bridge SSID to source NAT all user traffic, except DHCP. For example, use any
any svc-dhcp permit followed by any any any route src-nat. Apply the session ACL to a remote AP user role. l Configure the AAA profile. Make sure the initial role contains the session ACL previously configured. The AAA profile defines the authentication method and the default user role.
802.1X and PSK authentication is supported when configuring bridge or split tunnel modes.
l Configure the virtual AP profile for the backup configuration: n Set the remote AP operation to always or backup. n Create and apply the applicable SSID profile. n Configure a bridge SSID for the backup configuration. In the virtual AP profile, specify forward mode as bridge. For more information about the backup configuration, see Configuring Fallback Mode on page 737.
l Enter the remote AP DHCP server parameters in the AP system profile. For more information about the parameters, see Configuring the DHCP Server on the Remote AP on page 739. If you use a local DHCP server to obtain IP addresses, you must define one additional ACL to permit traffic between clients without source NATing the traffic. Using the previously configured ACL, add user alias internal-network any permit before any any any route src-nat.
l Connect the remote AP to the available public network (for example, a hotel or airport network). The remote AP advertises the backup SSID so the wireless client can connect and obtain an IP address from the available DHCP server.
The client can obtain an IP address from the public network, for example a hotel or airport, or from the DHCP server on the remote AP.
After obtaining an IP address, the wireless client can connect and access the corporate network and bring up the configured corporate SSIDs. The following is a high-level description of what is needed to configure the remote AP to pass through a captive portal and access the corporate controller. This information assumes you are familiar with configuring session ACLs, AAA profiles, virtual APs, and AP system profiles and highlights the modified parameters.

741 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Configuring the Session ACL
In the WebUI 1. Navigate to the Configuration > Security > Access Control > Policies page. 2. Click Add to create a new policy. 3. Enter the policy name in the Policy Name field. 4. From the Policy Type drop-down list, select IPv4 Session. 5. To create the first rule:
a. Under Rules, click Add. b. Under Source, select any. c. Under Destination, select any. d. Under Service, select service. In the service drop-down list, select svc-dhcp. e. Under Action, select permit. f. Click Add. 6. To create the next rule: a. Under Rules, click Add. b. Under Source, select any. c. Under Destination, select any. d. Under Service, select any. e. Under Action, select route, and select the src-nat checkbox. f. Click Add. 7. Click Apply.
.
If you use a local DHCP server to obtain IP addresses, you must define one additional ACL to permit traffic between clients without source NATing the traffic. Add user alias internal-network any permit before any any any route src-nat.
8. Click the User Roles tab. a. Click Add. b. Enter the Role Name. c. Click Add under Firewall Policies. d. In the Choose from Configured Policies menu, select the policy you just created. e. Click Done.
In the CLI Use the following commands:
(host) (config) #ip access-list session <policy> any any svc-dhcp permit any any any route src-nat
If you use a local DHCP server to obtain IP addresses, you must define one additional ACL to permit traffic between clients without source NATing the traffic. Add user alias internal-network any permit before any any any route src-nat:
(host) (config) #user-role <role> session-acl <policy>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 742

Configuring the AAA Profile
In the WebUI 1. Navigate to the Security > Authentication > AAA Profiles page. From the AAA Profiles Summary list,
click Add. 2. Enter the AAA profile name, then click Add. 3. Select the AAA profile that you just created:
a. For Initial role, select the user role you just created. b. For 802.1X Authentication Default Role, select the appropriate role for your remote AP configuration,
then click Apply. c. Under the AAA profile that you created, locate 802.1x Authentication Server Group, and select the
authentication server group to use for your remote AP configuration, then click Apply.
If you need to create an 802.1x authentication server group, select new from the 802.1X Authentication Server Group drop-down list, and enter the appropriate parameters.
d. Under the AAA profile that you created, locate 802.1X Authentication Profile, select the profile to use for your remote AP configuration, then click Apply.
In the CLI (host) (config) #aaa profile <name> initial-role <role>
You can define other parameters as needed.
Defining the Backup Configuration
In the WebUI 1. Navigate to the Configuration > Wireless > AP Configuration page. Select either the AP Group or AP
Specific tab. Click Edit for the AP group or AP name. 2. Under Profiles, select Wireless LAN, then Virtual AP. 3. To create a new virtual AP profile in the WebUI, select New from the Add a profile drop-down menu. Enter
the name for the virtual AP profile, and click Add.
Whenever you create a new virtual AP profile in the WebUI, the profile automatically contains the "default" SSID profile with the default ESSID. You must configure a new ESSID and SSID profile for the virtual AP profile before you apply the profile.
a. In the Profile Details entry for the new virtual AP profile, go to the AAA Profile drop-down list and select the previously configured AAA profile. The AAA Profile pop-up window appears.
b. To set the AAA profile and close the pop-up window, Click Apply. c. In the Profile Details entry for the new virtual AP profile, select NEW from the SSID Profile drop-down
menu. The SSID Profile pop-up window displays to allow you to configure the SSID profile. d. Enter the name for the SSID profile. e. Under Network, enter a name in the Network Name (SSID) field. f. Under Security, select the network authentication and encryption methods. g. To set the SSID profile and close the pop-up window, click Apply. 4. At the bottom of the Profile Details window, Click Apply. 5. Click the new virtual AP name in the Profiles list or the Profile Details to display configuration parameters. 6. Under Profile Details, do the following:

743 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

a. Make sure Virtual AP enable is selected. b. From the VLAN drop-down menu, select the VLAN ID to use for the Virtual AP profile. c. From the Forward mode drop-down menu, select bridge. d. From the Remote-AP Operation drop-down menu, select always or backup. e. Click Apply. 7. Under Profiles, select AP, then AP system profile. 8. Under Profile Details, do the following: a. Select the AP system profile to edit. b. At the LMS IP field, enter the LMS IP address. c. At the Master controller IP address field, enter the master controller IP address. d. Configure the Remote-AP DHCP Server fields. e. Click Apply.
In the CLI
Use the following commands:
(host) (config) #wlan ssid-profile <profile> essid <name> opmode <method> wpa-passphrase <string> (if necessary)
(host) (config) #wlan virtual-ap <name> ssid-profile <profile> vlan <vlan> forward-mode bridge aaa-profile <name> rap-operation {always|backup}
(host) (config) #ap system-profile <name> lms-ip <ipaddr> master-ip <ipaddr> rap-dhcp-default-router <ipaddr> rap-dhcp-dns-server <ipaddr> rap-dhcp-lease <days> rap-dhcp-pool-end <ipaddr> rap-dhacp-pool-netmask <netmask> rap-dhcp-pool-start <ipaddr> rap-dhcp-server-id <ipaddr> rap-dhcp-server-vlan <vlan>
(host) (config) #ap-group <name> virtual-ap <name> ap-system-profile <name>
or
(host) (config) #ap-name <name> virtual-ap <name> ap-system-profile <name>
Specifying the DNS Controller Setting
In addition to specifying IP addresses for controllers, you can also specify the master DNS name for the controller when provisioning the remote AP. The name must be resolved to an IP address when attempting to set up the IPSec tunnel. For information on how to configure a host name entry on the DNS server, refer to the

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 744

vendor documentation for your server. It is recommended to use a maximum of 8 IP addresses to resolve a controller name.
If the remote AP gets multiple IP addresses responding to a host name lookup, the remote AP can use one of them to establish a connection to the controller. For more detailed information, see the next section Backup Controller List on page 745.
Specifying the name also lets you move or change remote AP concentrators without reprovisioning your APs. For example, in a DNS load-balancing model, the host name resolves to a different IP address depending on the location of the user. This allows the remote AP to contact the controller to which it is geographically closest.
The DNS setting is part of provisioning the AP. The easiest way to provision an AP is to use the Provisioning page in the WebUI. These instructions assume you are only modifying the controller information in the Master Discovery section of the Provision page.
Reprovisioning the AP causes it to automatically reboot.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Installation > Provisioning page. Select the remote AP and click Provision.
2. Under Master Discovery enter the master DNS name of the controller. 3. Click Apply and Reboot.
For more information, see Provision the AP on page 726.
Backup Controller List
Using DNS, the remote AP receives multiple IP addresses in response to a host name lookup. Known as the backup controller list, remote APs go through this list to associate with a controller. If the primary controller is unavailable or does not respond, the remote AP continues through the list until it finds an available controller. This provides redundancy and failover protection.
The remote AP loses the IP address information received through DNS when it terminates and receives the system profile configuration from the controller. If the remote AP loses connectivity on the IPSec tunnel to the controller, the RAP fails over from the primary controller to the backup controller. For this scenario, add the IP address of the backup controller in the backup LMS and the IP address of the primary controller in the LMS field of the ap-system profile. Network connectivity is lost during this time. As described in the section Configuring Remote AP Failback on page 746, you can also configure a remote AP to revert back to the primary controller when it becomes available. To complete this scenario, you must also configure the LMS IP address and the backup LMS IP address.
For example, assume you have two data centers, data center 1 and data center 2, and each data center has one master controller in the DMZ. You can provision the remote APs to use the controller in data center 1 as the primary controller, and the controller in data center 2 as the backup controller. If the remote AP loses connectivity to the primary, it will attempt to establish connectivity to the backup. You define the LMS parameters in the AP system profile.

745 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 99 Sample Backup Controller Scenario

Configuring the LMS and backup LMS IP addresses
In the WebUI 1. Navigate to the Configuration > Wireless > AP Configuration page. 2. Select either the AP Group or AP Specific tab. Click Edit for the AP group or AP name. 3. Under Profiles, select AP to display the AP profiles. 4. Select the AP system profile you want to modify. 5. Under Profile Details:
a. At the LMS IP field, enter the primary controller IP address. b. At the Backup LMS IP field, enter the backup controller IP address. 6. Click Apply.
In the CLI (host) (config) #ap system-profile <profile>
lms-ip <ipaddr> bkup-lms-ip <ipaddr>
(host) (config) #ap-group <group> ap-system-profile <profile>
(host) (config) #ap-name <name> ap-system-profile <profile>
Configuring Remote AP Failback
In conjunction with the backup controller list, you can configure remote APs to revert back (failback) to the primary controller if it becomes available. If you do not explicitly configure this behavior, the remote AP will keep its connection with the backup controller until the remote AP, controller, or both have rebooted or some type of network failure occurs. If any of these events occur, the remote AP will go through the backup controller list and attempt to connect with the primary controller.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration page. 2. Select either the AP Group or AP Specific tab. Click Edit for the AP group or AP name.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 746

3. Under Profiles, select AP to display the AP profiles. 4. Select the AP system profile you want to modify. 5. Under Profile Details:
a. Click LMS Preemption. This is disabled by default. b. At the LMS Hold-down period field, enter the amount of time the remote AP must wait before moving
back to the primary controller. 6. Click Apply.
In the CLI
Use the following commands: (host) (config) #ap system-profile <profile> lms-preemption lms-hold-down period <seconds>
Enabling RAP Local Network Access
You can enable local network access between the clients (from same or different subnets and VLANs) connected to a RAP through wired or wireless interfaces in split-tunnel/bridge forwarding modes. This allows the clients to effectively communicate with each other without routing the traffic via the controller. You can use WebUI or CLI to enable the local network access.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Configuration page. 2. Select the AP Group tab. Click Edit for the AP group or AP name. 3. Under Profiles, expand the AP menu, then select AP system profile. 4. To enable remote network access, select the Remote-AP Local Network Access check box.
Figure 100 Enable Remote AP Local Network Access

5. Click Apply.
In the CLI
l To enable, enter the following command: ap system-profile <ap-profile> rap-local-network-access
l To disable, enter the following command: ap system-profile <ap-profile> no rap-local-network-access
See the Dell Networking W-Series ArubaOS Command Line Reference Guide for detailed information on the command options.

747 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Configuring Remote AP Authorization Profiles
Remote AP configurations include an authorization profile that specifies which profile settings should be assigned to a remote AP that has been provisioned but not yet authenticated at the remote site. These yetunauthorized APs are put into the temporary AP group authorization-group by default and assigned the predefined profile NoAuthApGroup. This configuration allows the user to connect to an unauthorized remote AP via a wired port, then enter a corporate username and password. Once a valid user has authorized the AP, and it will be marked as authorized on the network. The remote AP will then download the configuration assigned to that AP by its permanent AP group.
In the WebUI
Adding or Editing a Remote AP Authorization Profile To create a new authorization profile or edit an existing authorization profile via the WebUI: 1. Select Configuration > All Profiles. The All Profile Management window opens. 2. Select AP to expand the AP profile menu. 3. Select AP Authorization Profile. The Profile Details pane appears and displays the list of existing AP
authorization profiles. l To edit an existing profile, select a profile from the Profile Details pane. l To create a new authorization profile, enter a new profile name in the entry blank on the Profile Details
pane, then click Add. 4. The Profile Details window will display the AP group currently defined for that authorization profile. To
select a new AP group, click the drop-down list and select a different AP group name. 5. Click Apply.
In the CLI
To create a new authorization profile or edit an existing authorization profile via the command-line interface, access the command-line interface in enable mode, and issue the following commands. (host) (config) #ap authorization-profile <profile>
authorization-group <ap-group>
Working with Access Control Lists and Firewall Policies
Remote APs support the following access control lists (ACLs); unless otherwise noted, you apply these ACLS to user roles: l Standard ACLs--Permit or deny traffic based on the source IP address of the packet. l Ethertype ACLs--Filter traffic based on the Ethertype field in the frame header. l MAC ACLs--Filter traffic on a specific source MAC address or range of MAC addresses. l Firewall policies (session ACLs)--Identifies specific characteristics about a data packet passing through the
Dell controller and takes some action based on that identification. You apply these ACLs to user roles or uplink ports.
To configure firewall policies, you must install the PEFNG license.
For more information about ACLs and firewall policies, see Configuring Fallback Mode on page 737.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 748

Understanding Split Tunneling
The split tunneling feature allows you to optimize traffic flow by directing only corporate traffic back to the controller, while local application traffic remains local. This ensures that local traffic does not incur the overhead of the round trip to the controller, which decreases traffic on the WAN link and minimizes latency for local application traffic. This is useful for sites that have local servers and printers. With split tunneling, a remote user associates with a single SSID, not multiple SSIDs, to access corporate resources (for example, a mail server) and local resources (for example, a local printer). The remote AP examines session ACLs to distinguish between corporate traffic destined for the controller and local traffic.
Figure 101 Sample Split Tunnel Environment

Figure 101 displays corporate traffic is GRE tunneled to the controller through a trusted tunnel and local traffic is source NATed and bridged on the wired interface based on the configured user role and session ACL.
Configuring Split Tunneling
The procedure to configure split tunneling requires the following steps. Each step is described in detail later in this chapter.
The split tunneling feature requires the PEFNG license. If you do not have the PEFNG license on your controller, you must install it before you configure split tunneling. For details on installing licenses, see Software Licenses on page 146.
1. Define a session ACL that forwards only corporate traffic to the controller. a. Configure a net destination for the corporate subnets. b. Create rules to permit DHCP and corporate traffic to the corporate controller. c. Apply the session ACL to a user role.
2. (Optional) Configure an ACL that restricts remote AP users from accessing the remote AP local debugging homepage.
3. Configure the remote AP's AAA profile. a. Specify the authentication method (802.1x or PSK) and the default user role for authenticated users. The user role specified in the AAA profile must contain the session ACL defined in the previous step. b. (Optional) Use the remote AP's AAA profile to enable RADIUS accounting.
4. Configure the virtual AP profile:

749 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

a. Specify which AP group or AP to which the virtual AP profile applies. b. set the VLAN used for split tunneling. Only one VLAN can be configured for split tunneling; VLAN pooling
is not allowed. c. When specifying the use of a split tunnel configuration, use "split-tunnel" forward mode. d. Create and apply the applicable SSID profile.
When creating a new virtual AP profile In the WebUI, you can also configure the SSID at the same time. For information about AP profiles, see Understanding AP Configuration Profiles on page 569.
5. (Optional) Create a list of network names resolved by corporate DNS servers.
Configuring the Session ACL Allowing Tunneling
First you need to configure a session ACL that "permits" corporate traffic to be forwarded (tunneled) to the controller, and that routes, or locally bridges, local traffic.
In the WebUI
1. Navigate to the Configuration > Security > Access Control > Policies page. 2. Click Add to create a new policy. 3. Enter the policy name in the Policy Name field. 4. From the Policy Type drop-down list, select Session. 5. From the IP Version drop-down list, select IPv4 or IPv6. 6. To create the first rule:
a. Under Rules, click Add. b. Under Source, select any. c. Under Destination, select any. d. Under Service, select service. In the service drop-down list, select svc-dhcp. e. Under Action, select permitforIPv4 orcaptivefor IPv6. f. Click Add. 7. To create the next rule: a. Under Rules, click Add. b. Under Source, select any. c. Under Destination, select alias. The following steps define an alias representing the corporate network. Once defined, you can use the alias for other rules and policies. You can also create multiple destinations the same way. 8. Under the alias section, click New. Enter a name in the Destination Name field. a. Click Add. b. For Rule Type, select Network. c. Enter the public IP address of the controller. d. Enter the Network Mask/Range. e. Click Add to add the network range. f. Click Apply. The new alias appears in the Destination menu. 9. Under Destination, select the alias you just created. 10.Under Service, select any. 11.Under Action, select permitfor IPv4 or captivefor IPv6.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 750

12.Click Add. 13.To create the next rule:
a. Under Rules, click Add. b. Under Source, select user. c. Under Destination, select any. d. Under Service, select any. e. Under Action, select any and check src-nat. f. Click Add. 14.Click Apply. 15.Click the User Roles tab. a. Click Add to create and configure a new user role. b. Enter the desired name for the role in the Role Name field. c. Under Firewall Policies, click Add. d. From the Choose from Configured Policies drop-down menu, select the policy you just configured. e. Click Done. 16.Click Apply.
In the CLI
(host) (config) #ap system-profile <profile> lms-preemption lms-hold-down period <seconds>netdestination <policy> network <ipaddr> <netmask> network <ipaddr> <netmask>
(host) (config) #ip access-list session <policy> any any svc-dhcp permit any alias <name> any permit user any any route src-nat
(host) (config) #user-role <role> session-acl <policy>
When defining the alias, there are a number of other session ACLs that you can create to define the handling of local traffic, such as:
(host) (config) #ip access-list session <policy> user alias <name> any redirect 0 user alias <name> any route user alias <name> any route src-nat
Configuring an ACL to Restrict Local Debug Homepage Access
A user in split or bridge role using a remote AP (RAP) can log on to the local debug (LD) homepage and perform a reboot or reset operations. The LD homepage provides various information about the RAP and also has a button to reboot the RAP. You can now restrict a RAP user from resetting or rebooting a RAP by using the localip keyword in the in the user role ACL.
You will require the PEFNG license to use this feature. See Software Licenses on page 146 for more information on licensing requirements.
Any user associated to that role can be allowed or denied access to the LD homepage. You can use the localip keyword in the ACL rule to identify the local IP address on the RAP. The localip keyword identifies the set of

751 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

all local IP addresses on the system to which the ACL is applied. The existing keywords controller and mswitch indicate only the primary IP address on the controller.
This release of ArubaOS provides localip keyword support only for RAP and not for controller.
In the WebUI
1. Navigate to the Configuration > Security > Access Control > Policies page. 2. Click Add to create a new policy. 3. Enter the policy name in the Policy Name field. 4. From the Policy Type drop-down list, select IPv4 Session. 5. To create the first rule:
a. Under Rules, click Add. b. Under Source, select localip. c. Under Destination, select any. d. Under Action, select permit. e. Click Apply. Figure 102 Enable Restricted Access to LD Homepage

In the CLI
Use the localip keyword in the user role ACL.
All users have an ACL entry of type any any deny by default. This rule restricts access to all users. When the ACL is configured for a user role, if a user any permit ACL rule is configured, add a deny ACL before that for localip for restricting the user from accessing the LD homepage.
Example: (host) (config) #ip access-list session logon-control
user localip svc-http deny user any permit
Configuring the AAA Profile for Tunneling
After you configure the session ACL, you define the AAA profile used for split tunneling. When defining the AAA parameters, specify the previously configured user role that contains the session ACL used for split tunneling.
If you enable RADIUS accounting in the AAA profile, the controller sends a RADIUS accounting start record to the RADIUS server when a user associates with the remote AP, and sends a stop record when the user logs out or is deleted from the user database. If you enable interim accounting, the controller sends updates at regular intervals. Each interim record includes cumulative user statistics, including received bytes and packets counters. For more information on RADIUS accounting, see RADIUS Accounting on page 273

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 752

In the WebUI
1. Navigate to the Security > Authentication > AAA Profiles page. From the AAA Profiles Summary list, click Add.
2. Enter the AAA profile name, then click Add. 3. Select the AAA profile that you just created.
a. For 802.1X Authentication Default Role, select the user role you previously configured for split tunneling, then click Apply.
b. Under the AAA profile that you created, locate 802.1x Authentication Server Group, and select the authentication server group to use, then click Apply.
4. (Optional) To enable RADIUS accounting: a. Select the AAA profile from the profile list to display the list of authentication and accounting profiles associated with the AAA profile. b. Select the Radius Accounting Server Group profile associated with the AAA profile. Click the RADIUS Accounting Server Group drop-down list to select a RADIUS server group. (For more information on configuring a RADIUS server or server group, see Configuring a RADIUS Server on page 250.) c. To enable RADIUS Interim Accounting, select the AAA profile name from the profile list, then click the RADIUS Interim Accounting checkbox. This option is disabled by default, allowing the controller to send only start and stop messages to the RADIUS accounting server.
5. Click Apply.
If you need to create an authentication server group, select new and enter the appropriate parameters.
In the CLI
(host) (config) #aaa profile <name> authentication-dot1x <dot1x-profile> dot1x-default-role <role> dot1x-server-group <group> radius-accounting <group> radius-interim-accounting
Configuring the Virtual AP Profile
In the WebUI
1. Navigate to Configuration > Wireless > AP Configuration page. Select either the AP Group or AP Specific tab. Click Edit for the applicable AP group name or AP name.
2. Under Profiles, select Wireless LAN, then Virtual AP. 3. To create a new virtual AP profile in the WebUI, select New from the Add a profile drop-down menu. Enter
the name for the virtual AP profile, and click Add.
Whenever you create a new virtual AP profile in the WebUI, the profile automatically contains the "default" SSID profile with the default ESSID. You must configure a new ESSID and SSID profile for the virtual AP profile before you apply the profile.

a. In the Profile Details entry, go to the AAA Profile drop-down list and select the previously configured AAA profile. The AAA Profile pop-up window appears.
b. To set the AAA profile and close the window, click Apply. c. In the Profile Details entry for the new virtual AP profile, select NEW from the SSID Profile drop-down
menu. A pop-up window displays to allow you to configure the SSID profile. d. Enter the name for the SSID profile. e. Under Network, enter a name in the Network Name (SSID) field.

753 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

f. Under Security, select the network authentication and encryption methods. g. To set the SSID profile and close the window, click Apply. 4. Click Apply at the bottom of the Profile Details window. 5. Click the new virtual AP name in the Profiles list or the Profile Details to display configuration parameters. 6. Under Profile Details: a. Make sure Virtual AP enable is selected. b. From the VLAN drop-down menu, select the VLAN ID for the VLAN to be used for split tunneling. c. From the Forward mode drop-down menu, select split-tunnel. d. Click Apply.
In the CLI
(host) (config) #wlan ssid-profile <profile> essid <name> opmode <method>
(host) (config) #wlan virtual-ap <profile> ssid-profile <name> forward-mode <mode>
(host) (config) # vlan <vlan id> aaa-profile <profile>
(host) (config) #ap-group <name> virtual-ap <profile>
or (host) (config) #ap-name <name> virtual-ap <profile>
Defining Corporate DNS Servers
Clients send DNS requests to the corporate DNS server address that it learned from DHCP. If configured for split tunneling, corporate domains and traffic destined for corporate use the corporate DNS server. For noncorporate domains and local traffic, other DNS servers can be used.
In the WebUI
1. Navigate to Configuration > Wireless > AP Configuration page. 2. Select either the AP Group or AP Specific tab. Click Edit for the AP group or AP name. 3. Under Profiles, select AP, then AP system profile. 4. Under Profile Details:
a. Enter the corporate DNS servers. b. Click Add.
The DNS name appears in Corporate DNS Domain list. You can add multiple names the same way. 5. Click Apply.
In the CLI
(host) (config) #ap system-profile <profile> dns-domain <domain name>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 754

Understanding Bridge
The bridge feature allows you to route the traffic flow only to the internet and not to the corporate network. Only the 802.1X authentication request is sent to the corporate network. This feature is useful for guest users.
ArubaOS does not support Wired 802.1x authentication in bridge mode for RAP and CAP. 802.1x authentication is supported only in tunnel and split modes.
Figure 103 Sample Bridge Environment

Figure 103 displays the local traffic being routed to the internet and the 802.1X authentication request sent to the corporate network.
Configuring Bridge
To configure a bridge, perform the following steps. Each step is described in detail later in this chapter.
The bridge feature requires the PEFNG license. If you do not have the PEFNG license on your controller, you must install it before you configure bridge. For details on installing licenses, see Software Licenses on page 146.
1. Define a session ACL that routes the traffic. a. Create rules to permit DHCP and local data traffic. b. Apply the session ACL to a user role. For information about user roles and policies, see Roles and Policies on page 438.
2. Configure the remote AP's AAA profile. a. Specify the authentication method (802.1x or PSK) and the default user role for authenticated users. The user role specified in the AAA profile must contain the session ACL defined in the previous step. b. (Optional) Use the remote AP's AAA profile to enable RADIUS accounting.
3. Configure the virtual AP profile: a. Specify the AP group or ap-name to which the virtual AP profile applies. b. Set the VLAN in the virtual AP. c. When specifying the use of a bridge configuration, use bridge forward mode. d. Create and apply the applicable SSID profile. e. (Optional) Under AP system profile, configure the RAP DHCP pool. RAP DHCP VLAN must be same as VAP's VLAN. If the client needs to obtain from the RAP DHCP Server.
When creating a new virtual AP profile In the WebUI, you can simultaneously configure the SSID. For information about AP profiles, see Understanding AP Configuration Profiles on page 569.

755 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Configuring the Session ACL
First you need to configure a session ACL that "permits" corporate traffic to be forwarded to the controller and that routes, or locally bridges, local traffic.
In the WebUI
1. Navigate to the Configuration > Security > Access Control > Policies page. 2. Click Add to create a new policy. 3. Enter the policy name in the Policy Name field. 4. From the Policy Type drop-down list, select Session. 5. From the IP Version drop-down list, select IPv4 or IPv6. 6. To create the first rule:
a. Under Rules, click Add. b. Under Source, select any. c. Under Destination, select any. d. Under Service, select service. In the service drop-down list, select svc-dhcp. e. Under Action, select permit for IPv4 or captive for IPv6. f. Click Add. 7. To create the next rule: a. a. Under Rules, click Add. b. b. Under Source, select any. c. c. Under Destination, select alias.
The following steps define an alias representing the corporate network. Once defined, you can use the alias for other rules and policies. You can also create multiple destinations the same way. 8. Under the alias section, click New. Enter a name in the Destination Name field.
a. Click Add. b. For Rule Type, select Network. c. Enter the public IP address of the controller. d. Enter the Network Mask/Range. e. Click Add to add the network range. f. Click Apply. The new alias appears in the Destination menu. 9. Under Destination, select the alias you just created. 10.Under Service, select any. 11.Under Action, select permit for IPv4 or captive for IPv6. 12.Click Add. 13.To create the next rule: a. Under Rules, click Add. b. Under Source, select user. c. Under Destination, select any. d. Under Service, select any. e. Under Action, select any and check src-nat. f. Click Add. 14.Click Apply. 15.Click the User Roles tab.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 756

a. Click Add to create and configure a new user role. b. Enter the desired name for the role in the Role Name field. c. Under Firewall Policies, click Add. d. From the Choose from Configured Policies drop-down menu, select the policy you just configured. e. Click Done. 16.Click Apply.
In the CLI
If dhcp server in ap system profile is enabled (host) (config) #ip access-list session <policy> any any svc-dhcp permit (host) (config) #user any any route src-nat
If dhcp server in ap system profile is disabled (host) (config) #ip access-list session <policy> (host) (config) #any any any permit (host) (config) #user-role <role>
session-acl <policy>
To configure an ACL to Restrict Local Debug Homepage Access, see Configuring an ACL to Restrict Local Debug Homepage Access on page 751.
Configuring the AAA Profile for Bridge
After you configure the session ACL, you define the AAA profile used for bridge. When defining the AAA parameters, specify the previously configured user role that contains the session ACL used for bridge.
If you enable RADIUS accounting in the AAA profile, the controller sends a RADIUS accounting start record to the RADIUS server when a user associates with the remote AP, and sends a stop record when the user logs out or is deleted from the user database. If you enable interim accounting, the controller sends updates at regular intervals. Each interim record includes cumulative user statistics, including received bytes and packets counters. For more information on RADIUS accounting, see RADIUS Accounting on page 273.
In the WebUI
1. Navigate to the Security > Authentication > AAA Profiles page. From the AAA Profiles Summary list, click Add.
2. Enter the AAA profile name, then click Add. 3. Select the AAA profile that you just created.
a. For 802.1X Authentication Default Role, select the user role you previously configured for split tunneling or bridge, then click Apply.
b. Under the AAA profile that you created, locate 802.1x Authentication Server Group, and select the authentication server group to use, then click Apply.
4. (Optional) To enable RADIUS accounting: a. Select the AAA profile from the profile list to display the list of authentication and accounting profiles associated with the AAA profile. b. Select the Radius Accounting Server Group profile associated with the AAA profile. Click the RADIUS Accounting Server Group drop-down list to select a RADIUS server group. (For more information on configuring a RADIUS server or server group, see Configuring a RADIUS Server on page 250.) c. To enable RADIUS Interim Accounting, select the AAA profile name from the profile list, then click the RADIUS Interim Accounting checkbox. This option is disabled by default, allowing the controller to send only start and stop messages RADIUS accounting server.

757 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

5. Click Apply. If you need to create an authentication server group, select new and enter the appropriate parameters.
In the CLI
Use the following command: (host) (config) #aaa profile <name> (host) (config) #authentication-dot1x <dot1x-profile> (host) (config) #dot1x-default-role <role> (host) (config) #dot1x-server-group <group> (host) (config) #radius-accounting <group> (host) (config) #radius-interim-accounting
Configuring Virtual AP Profile
In the WebUI
1. Navigate to Configuration > Wireless > AP Configuration page. Select either the AP Group or AP Specific tab. Click Edit for the applicable AP group name or AP name.
2. Under Profiles, select Wireless LAN, then Virtual AP. 3. To create a new virtual AP profile in the WebUI, select New from the Add a profile drop-down menu. Enter
the name for the virtual AP profile, and click Add.
Whenever you create a new virtual AP profile in the WebUI, the profile automatically contains the "default" SSID profile with the default ESSID. You must configure a new ESSID and SSID profile for the virtual AP profile before you apply the profile.
a. In the Profile Details entry, go to the AAA Profile drop-down list and select the previously configured AAA profile. The AAA Profile pop-up window appears.
b. To set the AAA profile and close the window, click Apply. c. In the Profile Details entry for the new virtual AP profile, select NEW from the SSID Profile drop-down
menu. A pop-up window displays to allow you to configure the SSID profile. d. Enter the name for the SSID profile. e. Under Network, enter a name in the Network Name (SSID) field. f. Under Security, select the network authentication and encryption methods. g. To set the SSID profile and close the window, click Apply. 4. Click Apply at the bottom of the Profile Details window. 5. Click the new virtual AP name in the Profiles list or the Profile Details to display configuration parameters. 6. Under Profile Details: a. Make sure Virtual AP enable is selected. b. From the VLAN drop-down menu, select the VLAN ID for the VLAN to be used for bridge. c. From the Forward mode drop-down menu, select Bridge. d. Click Apply.
In the CLI
Use the following command: (host) (config) #wlan ssid-profile <profile> essid <name> (host) (config) #opmode <method>
(host) (config) #wlan virtual-ap <profile> (host) (config) #ssid-profile <name>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 758

(host) (config) #forward-mode bridge (host) (config) #vlan <vlan id> (host) (config) #aaa-profile <profile>
(host) (config) #ap-group <name> (host) (config) #virtual-ap <profile>
or (host) (config) #ap-name <name> (host) (config) #virtual-ap <profile>

Provisioning Wi-Fi Multimedia
Wi-Fi Multimedia (WMM) is a Wi-Fi Alliance specification based on the IEEE 802.11e wireless Quality of Service (QoS) standard. WMM works with 802.11a, b, g, and n physical layer standards. The IEEE 802.11e standard also defines the mapping between WMM access categories (ACs) and Differentiated Services Codepoint (DSCP) tags. Remote APs support WMM.
WMM supports four ACs: voice, video, best effort, and background. You apply and configure WMM in the SSID profile.
When planning your configuration, make sure that immediate switches or routers do not have conflicting 802.1p or DSCP configurations/mappings. If this occurs, your traffic may not be prioritized correctly.

Reserving Uplink Bandwidth
You can reserve and prioritize uplink bandwidth traffic to provide higher QoS for specific applications, traffic, or ports. This is done by applying bandwidth reservation on existing session ACLs. Typically, the bandwidth reservation is applied for uplink voice traffic. Note the following before you configure bandwidth reservation: l You must know the total bandwidth available. l The bandwidth reservation are applicable only on session ACLs. l Bandwidth reservation on voice traffic ACLs receives higher priority over other reserved traffic. l You can configure up to three unique priority for bandwidth reservation. l The bandwidth reservation must be specified in absolute value (kbps). l Priorities for bandwidth reservation are optional, and bandwidth reservations without priorities are treated
equal.
Understanding Bandwidth Reservation for Uplink Voice Traffic
The voice ACLs are applicable on the voice signaling traffic used to establish voice call through a firewall. When a voice ACL is executed, a dynamic session is introduced to allow voice traffic through the firewall. This prevents the re-use of voice ACLs for bandwidth reservation. However, you can create bandwidth reservation rules that can be applied on voice signalling traffic and ports used for voice data traffic. This mechanism filters traffic as per the security requirements.
Configuring Bandwidth Reservation
You can configure bandwidth reservation ACLs using the WebUI or the CLI.
In the WebUI
To configure bandwidth reservation 1. Navigate to Configuration > Advanced Services > All Profiles

759 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

2. Under Profiles, navigate to AP > AP System Profile. You can create a new AP system profile to configure bandwidth reservation or edit an existing AP system profile. Under the Profiles Details page, specify bandwidth reservation values.
Figure 104 Uplink Bandwidth Reservation

In the CLI
(host) (config)#ap system-profile remotebw (host) (AP system profile "remotebw") #rap-bw-total 1024 (host) (AP system profile "remotebw") #rap-bw-resv-1 acl voice 128 priority 1
To view bandwidth reservations: (host) #show datapath rap-bw-resv ap-name remote-ap-1

Provisioning 4G USB Modems on Remote Access Points
ArubaOS provides support for 4G networks by allowing you to provision 4G USB modems on the RAP. You can also provision the RAP to support both 4G and 3G USB modems. This enables the RAP to choose the available network automatically. 4G takes precedence over 3G when the RAP tries to auto select the network. You can also configure the RAP to work exclusively on a 3G or 4G network. It is recommended that you provision the USB modems for the RAP based on your network requirements.
4G USB Modem Provisioning Best Practices and Exceptions
l RAP does not support dynamic plug-and-play for the 4G USB modems. You must provision a RAP with the 4G USB parameters on the controller manually based on its type and family (4G-WiMAX/4G-LTE).
l When a RAP connects to a 4G network, it appears as a Remote AP (R) and Cellular (C) on the controller. l For a 3G/4G network switch, using the UML290 modem with the firmware version L0290VWB522F.242 or
later is recommended. Using a lower version of the firmware auto-selects the network mode based on the network availability. The latest version allows the RAP to lock the modem in a particular network mode (for example, 3G only).
The 4G-WiMAX family of modems do not support the 3G-4G network switch-over functionality.

ArubaOS 6.3 includes a new method of provisioning multimode USB modems (such as a Verizon UML290, Verizon MC551L, or AT&T 313u) for a remote AP. These changes simplify modem provisioning for both 3G and 4G networks. The modem configuration procedure in ArubaOS 6.2.0.x and earlier versions required that you define a driver for a 3G modem in the USB modem field under the AP provisioning profile, or define a driver for a 4G modem in the 4G USB type field. Starting with ArubaOS 6.3, you can configure drivers for both a 3G or a 4G modem using the USB field, and the 4G USB Type field is deprecated.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 760

Provisioning RAP for USB Modems
To enable 3G/4G network support, you must provision the RAP with the USB parameters on the controller. You can use the WebUI or CLI to provision the USB parameters.
In the WebUI
1. Navigate to the Configuration > Wireless > AP Installation page. 2. Select the Provisioning tab. 3. Select an AP and click Provision. 4. Select the Yes option by Remote AP. 5. Under USB Settings, select the USB Parameters check box. 6. Click the Device drop-down list and select a USB modem device. 7. Click the Cellular NW Preferences drop-down list and select one of the following provisioning options.

Table 148: Cellular Network Preference Parameters

Parameter

Description

auto (default)

In this mode, the modem firmware will control the cellular network service selection; so the cellular network service failover and fallback is not interrupted by the remote AP (RAP).

3g_only

Locks the modem to operate only in 3G .

4g_only

Locks the modem to operate only in 4G .

advanced

The RAP controls the cellular network service selection based on an Received Signal Strength Indication (RSSI) threshold-based approach.
l Initially the modem is set to the default auto mode. This allows the modem firmware to select the available network.
l The RAP determines the RSSI value for the available network type (for example 4G), checks whether the RSSI is within required range, and if so, connects to that network.
l If the RSSI for the modem's selected network is not within the required range, the RAP will then check the RSSI limit of an alternate network (for example, 3G), and reconnect to that alternate network. The RAP will repeat the above steps each time it tries to connect using a 4G multimode modem in this mode.

8. Click Apply and Reboot to reboot the RAP with the new configuration.
In the CLI
To enable 4G-exclusive network support on the RAP, execute the following commands: (host) (config) #ap provisioning-profile <profile-name> (host) (Provisioning profile "<profile-name>") usb-type <USB modem type> (host) (Provisioning profile "<profile-name>") #usb-type none (host) (Provisioning profile "<profile-name>") #cellular_nw_preference 4g_only
To enable 3G-exclusive network support on the RAP, execute the following commands: (host) (config) #ap provisioning-profile <profile-name> (host) (Provisioning profile "<profile-name>") usb-type <USB modem type> (host) (Provisioning profile "<profile-name>") #usb-type none (host) (Provisioning profile "<profile-name>") #cellular_nw_preference 3g_only
To enable 3G/4G network switch support, execute the following commands:

761 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

(host) (config) #ap provisioning-profile <profile-name> (host) (Provisioning profile "<profile-name>") usb-type <USB modem type> (host) (Provisioning profile "<profile-name>") #usb-type none (host) (Provisioning profile "<profile-name>") #cellular_nw_preference auto
RAP 3G/4G Backhaul Link Quality Monitoring
The RAP is enhanced to support link monitoring on 2G, 3G, and 4G modems to provide information about the state of USB modem and cellular network. The USB modem has the following four states: l Active - The USB modem is used as the primary path for connecting VPN to the controller l Standby or Backup - The network is available but the USB modem is not used for connecting VPN to the
controller l Error - The USB modem is available but the modem is faulty l Not Plugged - The USB modem is unavailable To view the USB modem details on the RAP, execute the following command: (host) #show ap debug usb ap-name <ap-name>
Provisioning RAPs at Home
The following section provides information on provisioning your remote AP (RAP) at home using a static IP address, PPPoE connection, or USB modem.
Prerequisites
Follow the steps below to acquire a static IP address before provisioning the RAP at home: 1. Connect the RAP at the site of deployment and ensure that it has connectivity to the Internet to reach the
controller. 2. Connect a laptop to Port 1 of the RAP to get an IP address from the RAP's internal DHCP pool.
Provisioning RAP Using Zero Touch Provisioning
You provision the RAP using provisioning wizard: 1. Navigate to the RAP configuration URL: rapconsole.dell-pcw.com. 2. Enter the IP address or hostname of the controller. 3. Click the Show Advanced Settings link, shown in Figure 105. Figure 105 Show Advanced Settings

4. In the Advanced Settings wizard, you can select one of the following: a. Static IP--Select this tab to provision your RAP using a static IP address.
Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 762

b. PPPoE--Select this tab to provision your RAP on a PPPoE connection. c. USB--Select this tab to provision your RAP using 3G/EVDO USB modem.
Provisioning the RAP using a Static IP Address
Select the Static IP tab and enter the required details. See Table 149 for information on parameters. Figure 106 Provision RAP using Static IP

Table 149: Provision using Static IP

Parameter

Description

IP Address

Enter the static IP address that you want to configure for your remote access point.

Netmask

Enter the network mask.

Gateway

Enter the default gateway IP address of your network.

Primary DNS

Enter the IP address of your primary DNS server. This is an optional parameter.

Domain

Enter your domain name. This is an optional parameter.

Click Save after you have entered all the details.
Provision the RAP on a PPPoE Connection
Select the PPPoE tab and enter the required details. See Table 150 for information on parameters.

763 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 107 Provision RAP on a PPPoE Connection

Table 150: Provision using PPPoE Connection

Parameter

Description

Service Name

Enter the PPPoE service name provided to you by your service provider. This parameter is optional.

Username

Enter the user name for the PPPoE connection.

Password

Enter your PPPoE password.

Click Save after you have entered all the details.
Using 3G/EVDO USB Modems
The following procedure illustrates provisioning your RAP using a 3G/EVDO USB modem. 1. Select the USB tab and select your modem from the drop down list. Configuration details automatically
appear for some common modems.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 764

Figure 108 Provision using a preconfigured USB Modem
2. If your modem name is not listed, select Other and manually enter the following details. These are available from the manufacturer of your modem or from your IT administrator:
Figure 109 Provision using a USB Modem with Custom Settings

l Device Type l Initializing String l PPP Username l PPP Password l TTY Device Path l Device Identifier l Dial String
765 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l Link Priority Cellular--This is a number that identifies the priority of the connection. If the Link Priority Cellular has a higher number than Link Priority Ethernet, then cellular connection is used.
l Link Priority Ethernet--This is a number that identifies the priority of the connection. If the Link Priority Ethernet has a higher number than Link Priority Cellular, then Ethernet connection is used.
3. Click Save after you have entered all the details and click Continue to complete provisioning of your RAP.
Configuring W-IAP3WN and W-IAP3WNP Access Points
The DellW-IAP3WN and W-IAP3WNP are single-radio, single-band wireless APs that support the IEEE 802.11n standard for high-performance WLAN. These APs use MIMO (Multiple-In, Multiple-Out) technology and other high-throughput mode techniques to deliver high-performance, 802.11n 2.4 GHz functionality while simultaneously supporting existing 802.11 b/g wireless services. See the Dell Networking W-Series W-IAP3WN/P Installation Guide for more information.
These access points require Dell Instant 3.0 or later to operate as an Instant AP, or ArubaOS 6.1.4.0 or later to operate as a Remote AP.
The Power Sourcing Equipment (PSE) functionality is available only for W-IAP3WNP APs, as the PoE itself provides the PSE functionality for W-IAP3WN APs. You can use the WebUI or CLI to enable or disable the PSE functionality on the W-IAP3WNP APs.
In the WebUI
1. Navigate to the Configuration > Advanced Services > All Profiles page. 2. Select the AP tab, then the AP Ethernet Link profile tab. 3. Select the default tab . 4. Select the Power over Ethernet checkbox. 5. Click Apply. Support for W-IAP3WN and W-IAP3WNP access points (APs)
In the CLI
l To enable, enter: (host)(config) #ap enet-link-profile <name>
poe l To disable, enter: (host)(config) #ap enet-link-profile <name>
no poe Use the following command to view the PoE port status on an AP: (host) #show ap enet-link-profile default
Converting an IAP to RAP or CAP
For IAP to RAP or CAP conversion, the virtual controller sends the convert command to all the other IAPs. The virtual controller along with the other slave IAPs then set up a VPN tunnel to the remote controller, and download the firmware by FTP. The Virtual Controller uses IPsec to communicate to the controller over the internet.
A mesh point cannot be converted to RAP because mesh does not support VPN connection.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 766

An IAP can be converted to a Campus AP and Remote AP only if the controller is running ArubaOS 6.1.4 or later. The following table describes the supported IAP platforms and minimal AOS version for IAP to CAP/RAP conversion.
Converting IAP to RAP
To convert an IAP to RAP, follow the instructions below: 1. Navigate to the Maintenance tab in the top right corner of the Instant UI. 2. Click the Convert tab. 3. Select Remote APs managed by a Controller from the drop-down list. 4. Enter the hostname (fully qualified domain name) or the IP address of the controller in the Hostname or
IP Address of Controller text box. This information is provided by your network administrator.
Ensure the Controller IP Address is reachable by the IAPs.
5. Click Convert Now to complete the conversion. 6. The IAP reboots and begins operating in RAP mode. 7. After conversion, the IAP is managed by the Dell controller which has been specified in the Instant UI.
In order for the RAP conversion to work, ensure that you configure the Instant AP in the RAP white-list and enable the FTP service on the controller.
If the VPN setup fails and an error message pops up, please click OK, copy the error logs and share them with your Dell support engineer.
Converting an IAP to CAP
To convert an IAP to a Campus AP, do the following: 1. Navigate to the Maintenance tab in the top right corner of the Instant UI. 2. Click the Convert tab. 3. Select Campus APs managed by a Controller from the drop-down list. 4. Enter the hostname (fully qualified domain name) or the IP address of the controller in the Hostname or
IP Address of Controller text box. This is provided by your network administrator.
Ensure that the Controller IP Address is reachable by the APs.
5. Click Convert Now to complete the conversion.
Enabling Bandwidth Contract Support for RAPs
This release of ArubaOS provides Bandwidth Contract support on remote APs. This is achieved by extending the Bandwidth Contract support on split-tunnel and bridge modes. You can apply Bandwidth Contract for a RAP on a per-user or per-role basis. Bandwidth Contract is applied on a per-role basis by default. This implies that all the users belonging to the same role will share the bandwidth pool. When Bandwidth Contract configured on the controller is attached to a user-role, it automatically gets pushed to the RAPs terminating on it.

767 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The following show commands have been enhanced in this release to retrieve the Bandwidth Contract information from the RAP:
show datapath user ap-name <ap-name> show datapath bwm ap-name <ap-name>

Configuring Bandwidth Contracts for RAP
You can configure bandwidth contracts for RAP on a per-role or per-user basis. The following examples illustrate how to configure, apply, and verify the Bandwidth Contracts on the RAPs.

Defining Bandwidth Contracts
Use the following command to define a 256 Kbps contract: (host) (config) #aaa bandwidth-contract 256k kbits 256 Use the following command to define a 512 Kbps contract (host) (config) #aaa bandwidth-contract 512k kbits 512

Applying Contracts
You can apply the contract on a per-role or per-user basis.
Applying Contracts Per-Role Use the following commands to apply the contracts on a per-role basis for upstream and downstream: For upstream contract of 512 Kbps: (host) (config) #user-role authenticated bw-contract 512k upstream For downstream contract of 256 Kbps: (host) (config) #user-role authenticated bw-contract 256k downstream
Applying Contracts Per-User Use the following commands to apply the contracts on a per-user basis for upstream and downstream: For upstream contract of 512 Kbps: (host) (config) #user-role authenticated bw-contract 512k per-user upstream For downstream contract of 256 Kbps: (host) (config) #user-role authenticated bw-contract 256k per-user downstream

Verifying Contracts on AP
The following example displays the bandwidth contracts on AP for per-role configuration: (host) #show datapath bwm ap-name rap5-2

Datapath Bandwidth Management Table Entries

-------------------------------------------

Contract Types :

0 - CP Dos 1 - Configured contracts 2 - Internal contracts

-----------------------------------------------

Flags: Q - No drop, P - No shape(Only Policed),

T - Auto tuned

--- -------- --------- ---------- ----------- -----------------

Cont

Avail Queued/Pkts

Type Id Bits/sec Policed Bytes Bytes

Flags

---- ---- --------- ---------- ------- ------------ -----

11

512000

0 16000

0/0 P

12

256000

0 8000

0/0 P

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 768

The following example displays the bandwidth contracts on AP for per-user configuration (contract IDs 3 and 4 are per-user contracts):
(host) #show datapath bwm ap-name rap5-2

Datapath Bandwidth Management Table Entries

-------------------------------------------

Contract Types :

0 - CP Dos 1 - Configured contracts 2 - Internal contracts

-----------------------------------------------

Flags: Q - No drop, P - No shape(Only Policed),

T - Auto tuned

--- -------- --------- ---------- ----------- -----------------

Cont

Avail Queued/Pkts

Type Id Bits/sec Policed Bytes Bytes

Flags

---- ---- --------- ---------- ------- ------------ -----

11

512000

300 16000

0/0 P

12

256000

277 8000

0/0 P

13

512000

0 16000

0/0 P

14

256000

0 8000

0/0 P

Verifying Contracts Applied to Users
You can verify if the contracts are applied to the user after the user connects to the AP using CLI. The following is a sample output for a per-role configuration: (host) #show datapath user ap-name rap5-2

Datapath User Table Entries

---------------------------

Flags: P - Permanent, W - WEP, T- TKIP, A - AESCCM, G - AESGCM, V - ProxyArp to/for MN

(Visitor),

N - VPN, L - local, Y - Any IP user, R - Routed user, M - Media Capable,

S - Src NAT with VLAN IP, E - L2 Enforced, F - IPIP Force Delete, O - VOIP user

FM(Forward Mode): S - Split, B - Bridge, N - N/A

IP

MAC

ACLs Contract Location Age Sessions Flags Vlan

--------------- ----------------- ------- --------- -------- --- --------- -----

--

10.15.72.50

00:0B:86:61:12:AC 2703/0

0/0 0

16

1/65535

P

N

10.15.72.253

00:18:8B:A9:A8:DF 52/0

1/2 0

1

0/65535

S

192.168.11.1

00:0B:86:66:03:3F 2700/0

0/0 0

20024 0/65535

P

N

10.15.196.249 00:0B:86:66:03:3F 2700/0

0/0 0

3

1/65535

P

N

The following is a sample output for a per-user configuration:

(host) #show datapath user ap-name rap5-2

FM ----
0 1 177 1

Datapath User Table Entries

---------------------------

Flags: P - Permanent, W - WEP, T- TKIP, A - AESCCM, G - AESGCM, V - ProxyArp to/for MN

(Visitor),

N - VPN, L - local, Y - Any IP user, R - Routed user, M - Media Capable,

S - Src NAT with VLAN IP, E - L2 Enforced, F - IPIP Force Delete, O - VOIP user

FM(Forward Mode): S - Split, B - Bridge, N - N/A

IP

MAC

ACLs Contract Location Age Sessions Flags Vlan

--------------- ----------------- ------- --------- -------- --- --------- -----

--

10.15.72.50

00:0B:86:61:12:AC 2703/0

0/0 0

11

0/65535 P

N

FM ----
0

769 | Remote Access Points

Dell Networking W-Series ArubaOS 6.4.x | User Guide

10.15.72.253 S
192.168.11.1 N
10.15.196.249 N

00:18:8B:A9:A8:DF 52/0 00:0B:86:66:03:3F 2700/0 00:0B:86:66:03:3F 2700/0

3/4 0 0/0 0 0/0 0

46

0/65535

1

20883 0/65535 P

177

15

1/65535 P

1

Verifying Bandwidth Contracts During Data Transfer
You can verify the Bandwidth Contracts that are in use during data transfer using CLI. The following is a sample output for a per-role configuration: (host) #show datapath session ap-name rap5-2 table 10.15.72.99

Datapath Session Table Entries

------------------------------

Flags: F - fast age, S - src NAT, N - dest NAT

D - deny, R - redirect, Y - no syn

H - high prio, P - set prio, T - set ToS

C - client, M - mirror, V - VOIP

Q - Real-Time Quality analysis

I - Deep inspect, U - Locally destined

E - Media Deep Inspect, G - media signal

RAP Flags: 1 - Class 1, 2 - Class 2, 3 - Class 3

Source IP

Destination IP Prot SPort DPort Cntr Prio ToS Age Destination TAge Flags

-------------- -------------- ---- ----- ----- ---- ---- --- --- ----------- ---- -----

10.15.72.253 10.15.72.99

6 5001 36092 1/1

0 0 0 dev12

6

10.15.72.253 10.15.72.99

6 3488 5001 1/1

0 0 0 dev5

6C

10.15.72.99

10.15.72.253 6 5001 3488 1/2

0 0 0 dev5

6

10.15.72.99

10.15.72.253 6 36092 5001 1/2

0 0 0 dev12

6C

The following is a sample output for a per-user configuration:

(host) #show datapath session ap-name rap5-2 table 10.15.72.99

Datapath Session Table Entries

------------------------------

Flags: F - fast age, S - src NAT, N - dest NAT

D - deny, R - redirect, Y - no syn

H - high prio, P - set prio, T - set ToS

C - client, M - mirror, V - VOIP

Q - Real-Time Quality analysis

I - Deep inspect, U - Locally destined

E - Media Deep Inspect, G - media signal

RAP Flags: 1 - Class 1, 2 - Class 2, 3 - Class 3

Source IP

Destination IP Prot SPort DPort Cntr Prio ToS Age Destination TAge Flags

-------------- -------------- ---- ----- ----- ---- ---- --- --- ----------- ---- -----

10.15.72.253 10.15.72.99

6 3489 5001 1/3

0 0 0 dev5

37 FC

10.15.72.99

10.15.72.253 6 5001 3489 1/4

0 0 0 dev5

37 F

10.15.72.99

10.15.72.253 6 36096 5001 1/4

0 0 0 dev12

37 C

10.15.72.253 10.15.72.99

6 5001 36096 1/3

0 0 0 dev12

37

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Remote Access Points | 770

Chapter 32 Virtual Intranet Access
Virtual Intranet Access (VIA) is part of the Dell W-Series remote networks solution intended for teleworkers and mobile users. VIA detects the network environment (trusted and untrusted) of the user and connects the users to the enterprise network. Trusted networks refers to a protected office network that allows users to directly access the corporate intranet. Untrusted networks are public Wi-Fi hotspots such as airports, cafes, or home network. The VIA solution includes the VIA client and controller configuration. l VIA client­ Remote workers and mobile users can install VIA on their computers to connect to their
enterprise network from remote locations. l Controller configuration­ To setup VIA for remote users, configure the controller with user roles,
authentication profile, and connection profile. Use either the WebUI or CLI to configure the controller. VIA requires the PEFV license and is supported on W-600 Series, W-3000 Series, W-6000M3, W-7000 Series, and W7200 Series controllers.
Figure 110 VIA Topology

For more details on configuring, installing, and using VIA, refer to the latest version of the Dell VIA 2.0 User Guide.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Virtual Intranet Access | 771

Chapter 33 Spectrum Analysis
Wireless networks operate in environments with electrical and radio frequency devices that can interfere with network communications. Microwave ovens, cordless phones, and even adjacent Wi-Fi networks are all potential sources of continuous or intermittent interference. The spectrum analysis software modules on APs that support this feature examine the radio frequency (RF) environment in which the Wi-Fi network is operating, identify interference and classify its sources. An analysis of the results quickly isolate issues with packet transmission, channel quality, and traffic congestion caused by contention with other devices operating in the same band or channel. AP radios that gather spectrum data but do not service clients are called spectrum monitors, or SMs. Each SM scans and analyzes the spectrum band used by the SM's radio (2.4Ghz or 5Ghz). An AP radio in hybrid AP mode continues to serve clients as an access point while analyzing spectrum analysis data for the channel the radio uses to serve clients. You can record data for both types of spectrum analysis devices, save that data, and then play it back for later analysis. Topics in this chapter include: l Understanding Spectrum Analysis on page 772 l Creating Spectrum Monitors and Hybrid APs on page 777 l Connecting Spectrum Devices to the Spectrum Analysis Client on page 780 l Configuring the Spectrum Analysis Dashboards on page 783 l Customizing Spectrum Analysis Graphs on page 786 l Working with Non-Wi-Fi Interferers on page 816 l Understanding the Spectrum Analysis Session Log on page 818 l Viewing Spectrum Analysis Data on page 819 l Recording Spectrum Analysis Data on page 820 l Troubleshooting Spectrum Analysis on page 823
Understanding Spectrum Analysis
The table below lists the AP models that support the spectrum analysis feature. Single-radio mesh APs do not support the spectrum analysis feature; if an AP radio has a virtual AP carrying mesh backhaul traffic, no other virtual AP on that radio can be configured as a spectrum monitor. However, dual-radio mesh APs can have the client access radio configured as a Spectrum monitor or hybrid AP while the other radio supports mesh backhaul traffic.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Spectrum Analysis | 772

Table 151: Device Support for Spectrum Analysis

Device

Configurable as a Spectrum Monitor?

Configurable as a Hybrid AP?

W-AP210 Series

Yes

Yes

W-AP200 Series

Yes

Yes

W-AP220 Series

Yes

Yes

W-AP270 Series

Yes

Yes

W-AP114

Yes

Yes

W-AP115

Yes

Yes

W-AP104

Yes

Yes

W-AP105

Yes

Yes

W-AP92

Yes

Yes

W-AP93

Yes

Yes

W-AP130 Series

Yes

Yes

W-AP93H

Yes

No

W-AP175

Yes

No

W-IAP3WN Series

Yes

No

The radios on groups of APs can be converted to dedicated spectrum monitors or hybrid APs via the AP group's dot11a and dot11g radio profiles. Individual APs can also be converted to spectrum monitors through the AP's spectrum override profile.
The spectrum analysis feature requires the RF Protect license. To convert an AP to a spectrum monitor or hybrid AP, you must have an AP license and an RFProtect license for each AP on that controller.
The Spectrum Analysis section of the Monitoring tab in the WebUI includes the Spectrum Monitors, Session Log, and Spectrum Dashboards windows.
l Spectrum Monitors: this window displays a list of active spectrum monitors and hybrid APs streaming data to your client, the radio band the device is monitoring, and the date and time the SM or hybrid AP was connected to your client. This window allows you to select the spectrum monitors or hybrid APs for which you want to view information, and release the connection between your client and any device you no longer want to view.

773 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l Session Log: this tab displays activity for spectrum monitors and hybrid APs during the current browser session, including timestamps showing when the devices were connected to and disconnected from the client, and any changes to a hybrid APs monitored channel.
l Spectrum Dashboards: this window shows different user-customizable data charts for 2.4 Ghz and 5 GHz spectrum monitor or hybrid AP radios. Table 152 below gives a basic description of each of the spectrum analysis graphs that can appear on the spectrum dashboard.
For more detailed information on these graphs, refer to Customizing Spectrum Analysis Graphs on page 786.

Table 152: Spectrum Analysis Graphs Graph Title Description

Update Interval

Active

A pie chart showing the percentages and total numbers of each N/A

Devices Table device type for all active devices. This graph has no set update

interval; the graph automatically updates when values change.

For details, see Active Devices on page 787.

Active Devices Trend

A line chart showing the numbers of up to five different types of Wi-Fi and non-Wi-Fi devices seen on selected channels during a specified time interval. This chart can show devices on multiple channels for a spectrum monitor, or the single monitored channel for a hybrid AP. For details, see Active Devices Trend on page 792.

5 seconds

Channel Metrics

This stacked bar chart shows the current relative quality, availability or utilization of selected channels in the 2.4 GHz or 5 GHz radio bands. This chart can show multiple channels for a spectrum monitor, or the single monitored channel for a hybrid AP. For details, see Channel Metrics on page 794.

5 seconds

Channel Metrics Trend

A line chart showing the relative quality or availability of selected channels in the 2.4 GHz or 5 GHz radio bands over a specified time interval. Spectrum monitors can show channel data for multiple channels, while a hybrid AP shows information only for its one monitored channel. For details, see Channel Metrics Trend on page 796.

5 seconds

Channel Summary Table

The Channel Summary table displays the number of devices found on each channel in the spectrum monitor's radio band, the percentage of channel utilization, and AP power and interference levels. Spectrum monitors can show data for multiple channels, while a hybrid AP shows a channel summary only for its one monitored channel. For details, see Channel Summary Table on page 798.

5 seconds

Channel Utilization Trend

A line chart that shows the channel utilization for one or more radio channels, as measured over a defined time interval. Spectrum monitors can show data for multiple channels, while a hybrid AP shows utilization levels for its one monitored channel only. For details, see Channel Utilization Trend on page 801.

5 seconds

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 774

Graph Title
Device Duty Cycle

Description

Update Interval

A stacked bar chart showing the percent of each channel in the spectrum monitor radio's frequency band used by a Wi-Fi AP or any other device type detected by the spectrum monitor. The Device Duty Cycle chart for a hybrid AP only shows data for the one channel monitored by the hybrid AP.This chart is not available for W-AP68 access points. For details, see Device Duty Cycle on page 799.

5 seconds

Devices vs Channel

A stacked bar chart showing the total numbers of each device type detected on each channel in the spectrum monitor radio's frequency band. The Devices vs Channel chart for a hybrid AP only shows data for the one channel monitored by the hybrid AP. For details, see Devices vs Channel on page 803.

5 seconds

FFT Duty Cycle

Fast Fourier Transform, or FFT, is an algorithm for computing the frequency spectrum of a time-varying input signal. This line chart shows the FFT duty cycle, which represents the percent of time a signal is broadcast on the specified channel or frequency. Spectrum monitors can show data for multiple channels, while a hybrid AP shows information only for its one monitored channel.
This chart is not available for W-AP68 access points. For details, see FFT Duty Cycle on page 805.

1 second

Interference Power

This chart shows information about Wi-Fi interference, including the Wi-Fi noise floor, and the amount of adjacent channel interference from cordless phones, bluetooth devices and microwaves. Spectrum monitors can show interference power data for multiple channels, while a hybrid AP shows information only for its one monitored channel. For details, see Interference Power on page 807.

5 seconds

775 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Graph Title
Quality Spectrogram

Description

Update Interval

This plot shows quality statistics for selected range of channels or frequencies as determined by the current noise floor, nonWi-Fi (interferer) utilization and duty-cycles and certain types of retries. This chart can also be configured to show channel availability, the percentage of each channel that is unused and available for additional traffic. Spectrum monitors can show data for multiple channels, while a hybrid AP shows information only for its one monitored channel. For details, see Quality Spectrogram on page 809.

5 seconds

Real-Time FFT

Fast Fourier Transform, or FFT, is an algorithm for computing the frequency spectrum of a time-varying input signal. This line chart shows the power level of a signal on the channels or frequencies monitored by a spectrum monitor radio. Spectrum monitors can show data for multiple channels, while a hybrid AP shows information only for its one monitored channel.
This chart is not available for W-AP68 access points. For details, see Real-Time FFT on page 810.

1 second

Swept Spectrogram

This plot displays FFT power levels For details, see or the FFT duty cycle for a selected channel or frequency, as measured during each time tick. Spectrum monitors can show data for multiple channels, while a hybrid AP shows information only for its one monitored channel.
This chart is not available for W-AP68 access points. For details, see Swept Spectrogram on page 812.

1 second

Spectrum Analysis Clients
The maximum number of spectrum monitor radios and hybrid AP radios on a controller is limited only by the number of APs on that controller. If desired, you can configure every radio on an AP that supports the Spectrum Analysis feature as a spectrum device. A dual-radio AP can operate as two spectrum devices, because each radio can be individually configured as a spectrum monitor (SM) or hybrid AP.
A spectrum analysis client can simultaneously access data from up to four individual spectrum device radios. Each spectrum device radio, however, can only be connected to a single client WebUI.
When you select a specific spectrum monitor or hybrid AP radio to stream data to your client, the controller first verifies the device is not subscribed to some other client. Once the SM or hybrid AP radio has been verified as available, the SM or hybrid AP establishes a connection to the client and begins sending spectrum analysis data either every second or every five seconds, depending on the type of data being requested. Each client may select up to twelve different spectrum analysis charts and graphs to appear in the spectrum dashboard.
A controller can support up to 22 active WebUI connections. If spectrum analysis clients are simultaneously viewing data for than 22 WebUI connections, any additional WebUI requests are refused until some clients close their WebUI browser sessions.
When you finish reviewing data from an SM or hybrid AP, you should disconnect the device from your spectrum client. Do not forget this important step--no other user can access data from that spectrum monitor or hybrid AP until you release your subscription. Note, however, that when you disconnect a spectrum monitor from your client, the AP continues to operate as a spectrum monitor until you return it to AP mode by removing the local spectrum override, or by changing the mode parameter in the AP's 802.11a or 802.11g radio profile from spectrum-mode back to AP-mode.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 776

A spectrum monitor or hybrid AP automatically disconnects from a client when you close the browser window you used to connect the spectrum monitor to your client. However, if you use Internet Explorer and have multiple instances of an Internet Explorer browser open, the data-streaming connection to the spectrum monitor or hybrid AP is not released until 60 seconds after you close the spectrum client browser window. During this 60-second period, the spectrum monitor is still connected to the client.
When a spectrum monitor or hybrid AP is not subscribed to any client, it still performs all classification tasks and collect all necessary channel lists and device information. You can view classification, device, and channel information for any active spectrum monitor or hybrid AP via the controller's command-line interface, regardless of whether or not that device is sending real-time spectrum data to another client WebUI.
Individual spectrum analysis graphs and charts are explained in detail in Customizing Spectrum Analysis Graphs on page 786.
Hybrid AP Channel Changes
By default, a hybrid AP only monitors the channel specified in its 802.11a or 802.11g radio profile for spectrum interference. If you want to change the channel monitored by a hybrid AP, you must edit the channel setting in those profiles. However, there are other ArubaOS features that may automatically change the channels on hybrid APs. APs using Dynamic Frequency Selection (DFS) perform off-channel scanning to detect the presence of satellite and radar transmissions, and switch to a different channel if it detects that satellite or radar transmissions are present. APs using the Adaptive Radio Response (ARM) feature constantly monitor the network and automatically select the best channel and transmission power settings for that AP. If you manually change a channel monitored by a hybrid AP, best practices are to temporarily disable the ARM feature, as ARM may automatically return the channel to its previous setting.
If a hybrid AP is using ARM or DFS, that hybrid AP may automatically move to a different channel in response to changes in the network environment. If a hybrid AP changes channels while it is connected to a spectrum analysis client, the hybrid AP updates the graphs in the spectrum dashboard to start displaying spectrum data for the new channel, and sends a log message to the session log. For details on changing the channel monitored by a hybrid AP, see 802.11a and 802.11g RF Management Profiles on page 593.
Hybrid APs Using Mode-Aware ARM
If a radio is configured as a hybrid AP and that AP is enabled with mode-aware ARM, the hybrid AP can change to an Air Monitor (or AM) if too many APs are detected in the area. If the ARM feature changes a hybrid AP to an Air Monitor, that AM does not provide spectrum data after the mode change. The AM unsubscribes from any connected spectrum analysis client, and sends a log message warning about the change. If mode-aware ARM changes the AM back to an AP, the hybrid AP does not automatically resubscribe back to the spectrum analysis client. The hybrid AP must manually resubscribed before it can appear in the client's spectrum monitors page.
Creating Spectrum Monitors and Hybrid APs
Each controller can support up to 22 active WebUI connections to spectrum monitor or hybrid AP radios. If you plan on using spectrum monitors or hybrid APs as a permanent overlay to constantly monitor your network, you should create a separate AP group for these devices. If you plan on temporarily converting campus APs to spectrum monitors, best practices are to use the spectrum local override profile to convert an AP to a spectrum monitor.
This section describes the following tasks for converting regular APs into hybrid APs or spectrum monitors.
l Converting APs to Hybrid APs on page 778 l Converting an Individual AP to a Spectrum Monitor on page 778

777 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l Converting a Group of APs to Spectrum Monitors on page 779
Converting APs to Hybrid APs
You can convert a group of regular APs into a hybrid APs by selecting the spectrum monitoring option in the AP group's 802.11a and 802.11g radio profiles. Once you have enab led the spectrum monitoring option, all APs in the group that support the spectrum monitoring feature start to function as hybrid APs. If any AP in the group does not support the spectrum monitoring feature, that AP continues to function as a standard AP, rather than a hybrid AP.
The spectrum monitoring option in the 802.11a and 802.11g radio profiles only affects APs in ap-mode. Devices in am-mode (Air Monitors) or sm-mode (Spectrum Monitors) are not affected by enabling this option.
If you want to convert a individual AP (and not an entire AP group) to a hybrid AP, you must create a new 802.11a or 802.11g radio profile, enable the spectrum monitoring option, then reassign that AP to the new profile. For additional information see Creating and Editing Mesh High-Throughput SSID Profiles on page 646 for details on how to create a new 802.11a/g radio profile, then assign an individual AP to that profile.
If the spectrum local-override profile on the controller that terminates the AP contains an entry for a hybrid AP radio, that entry overrides the mode selection in the 802.11a or 802.11g radio profile, and the AP operates as a spectrum monitor, not as a hybrid AP. You must remove any spectrum local override for an AP to allow the device to operate as a hybrid AP. For further details on editing a spectrum local override, see Converting an Individual AP to a Spectrum Monitor on page 778.
In the WebUI
Follow the procedure below to convert a group of APs to hybrid mode via the WebUI. 1. Navigate to the Configuration > Wireless > AP Configuration window. Select the AP Group tab. 2. Click Edit by the name of the AP group you want to convert to hybrid APs. 3. Under the Profiles list, expand the RF Management menu. 4. To enable a spectrum monitor on the 802.11a radio band, select the 802.11a radio profile menu.
-orTo enable a spectrum monitor on the 802.11g radio band, select the 802.11g radio profile menu. 5. The Profile Details pane appears. Select the Spectrum Monitor checkbox. 6. Click Apply.
In the CLI
To convert a group of APs via the command-line interface, access the CLI in config mode and issue the following commands, where <profile> is the name of the 802.11a or 802.11g radio profile used by the group of APs you want to convert to hybrid APs: rf dot11a-radio-profile <profile> spectrum-monitoring rf dot11g-radio-profile <profile> spectrum-monitoring
Converting an Individual AP to a Spectrum Monitor
There are two ways to change a radio on an individual AP or AM into a spectrum monitor. You can assign that AP to a different 802.11a and 802.11g radio profile that is already set to spectrum mode, or you can temporarily change the AP into a spectrum monitor using a local spectrum override profile. When you use a local spectrum override profile to override an AP's mode setting, that AP begins to operate as a spectrum monitor, but remains associated with its previous 802.11a and 802.11g radio profiles. If you change any parameter (other than the overridden mode parameter) in the spectrum monitor's 802.11a or 802.11 radio

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 778

profiles, the spectrum monitor immediately updates with the change. When you remove the local spectrum override, the spectrum monitor reverts back to its previous mode, and remains assigned to the same 802.11a and 802.11 radio profiles as before.
The spectrum local override profile overrides the mode parameter in the 802.11a or 802.11g radio profile, changing it from ap-mode or am-mode to spectrum-mode, while allowing the spectrum monitor to continue to inherit all other settings from its 802.11a/802.11g radio profiles. When the spectrum local override is removed, the AP automatically reverts to its previous mode as defined it its 802.11a or 802.11g radio profile settings. If you use the local override profile to change an AP radio to a spectrum monitor, you must do so by accessing the WebUI or CLI of the controller that terminates the AP. This is usually a local controller, not a master controller.
In the WebUI
To convert an individual AP using the local spectrum override profile in the WebUI:
1. Select Configuration > All Profiles. The All Profile Management window opens. 2. Select AP to expand the AP profiles section. 3. Select Spectrum Local Override Profile. The Profile Details pane displays the current Override Entry
settings. 4. In the AP name entry blank, enter the name of an AP whose radio you want to configure as a spectrum
monitor. Note that AP names are case-sensitive. Any extra spaces before or after the AP name prevents the AP from being correctly added to the override list. 5. If your AP has multiple radios or a single dual-band radio, click the band drop-down list and select the spectrum band you want that radio to monitor: 2-ghz or 5-ghz. Click Add to add that radio to the Override Entry list. 6. (Optional) Repeat steps 4-6 to convert other AP radios to spectrum monitors, as desired. To remove a spectrum monitor from the override entry list, select that radio name in the override entry list, then click Delete. 7. Click Apply.
In the CLI
To convert an individual AP spectrum monitor using the spectrum local override profile in the command-line interface, access the CLI in config mode and issue the following command:
ap spectrum local-override override ap-name <ap-name> spectrum-band 2ghz|5ghz
Converting a Group of APs to Spectrum Monitors
When you convert a group of APs to spectrum monitors using their 802.11a/802.11g radio profiles, all AP radios associated with that profile stop serving clients and act as spectrum monitors only. Therefore, before you convert an entire group of APs to spectrum monitors, be sure that none of the APs are currently serving clients, as that may temporarily interrupt service to those clients.
If you use an 802.11a or 802.11g radio profile to create a group of spectrum monitors, all APs in any AP group referencing that radio profile are set to spectrum mode. Therefore, best practices are to create a new 802.11a or 802.11g radio profile just for spectrum monitors, using the following CLI commands: ap-name <ap name> dot11a-radio-profile <profile-name>ap-name <ap name> dot11g-radio-profile <profile-name>
If you want to set an existing 802.11a or 802.11g radio profile to spectrum mode, verify that no other AP group references that radio profile, using the following CLI commands: show references rf dot11a-radio-profile <profile-name>show references rf dot11g-radioprofile <profile-name>

779 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the WebUI
Follow the procedure below to convert a group of APs to Spectrum mode via the WebUI. 1. Navigate to the Configuration > Wireless > AP Configuration window. Select the AP Group tab. 2. Click Edit by the name of the AP group you want to convert to spectrum monitors. 3. Under the Profiles list, expand the RF Management menu. 4. To enable a spectrum monitor on the 802.11a radio band, select the 802.11a radio profile menu.
-orTo enable a spectrum monitor on the 802.11g radio band, select the 802.11g radio profile menu. 5. The Profile Details pane appears. Click the Mode drop-down list, and select spectrum-mode. 6. Click Apply.
In the CLI
To convert a group of APs via the command-line interface, access the CLI in config mode and issue the following commands, where <profile> is the 80211a or 80211g radio profile used by the AP group. rf dot11a-radio-profile <profile> mode spectrum-mode rf dot11g-radio-profile <profile> mode spectrum-mode
Connecting Spectrum Devices to the Spectrum Analysis Client
A spectrum analysis client is any laptop or desktop computer that can access the controller WebUI and receive streaming data from individual spectrum monitors or hybrid APs. Once you have configured one or more APs to operate as a spectrum monitor or hybrid AP, use the Spectrum Monitors window to identify the spectrum devices you want to actively connect to the spectrum analysis client. To connect one or more spectrum devices to your client: 1. Navigate to Monitoring > Spectrum Analysis. 2. Click the Spectrum Monitors tab. 3. Click Add. A table appears, displaying a list of spectrum analysis devices, sorted by name. Single-radio
spectrum devices have a single entry in this table, and dual-radio spectrum devices have two entries: one for each radio. This table displays the following data for each radio.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 780

Table 153: Spectrum Device Selection Information

Table Column

Description

AP

Name of the AP whose radio you want to convert to a spectrum monitor. AP names are

case sensitive.

This column includes the following icons: Radio is operating as a spectrum monitor.

Radio is operating as a hybrid AP with spectrum enabled.

Band

The frequency band currently used by the radio. This value can be either 2.4 GHz or 5 GHz.

Model

AP model type.

AP Group

Name of the AP group to which the spectrum monitor is currently associated.

Mode

This column indicates the type of spectrum analysis device:
l Spectrum Monitor: AP is in spectrum monitor mode.
l Access Point: AP is configured as an access point but with spectrum monitoring enabled (Hybrid AP).

Availability for Connection

Indicates if the AP is available to send spectrum analysis data to the client. Possible options ares:
l Available, 2.4GHz: the radio is available to send spectrum analysis data on the 2.4GHz frequency band.
l Available, 5GHz: the radio is available to send spectrum analysis data on the 5GHz frequency band.
l Available, Dual Band: the radio is available and is capable of sending spectrum analysis data on either the 2.4 GHz or the 5 GHz frequency bands.
l Available, current channel - <channel>: the AP radio is in hybrid mode and can display spectrum analysis data for the single specified channel only.
l Not available: an AP may not be available because it is currently sending spectrum analysis data to another client.

4. Click the table entry for a spectrum monitor radio, then click Connect. 5. Repeat steps 3-4 to connect additional devices, if desired.
View Connected Spectrum Analysis Devices
Once you have connected one or more spectrum monitors or hybrid APs to your Spectrum Analysis client, the Monitoring > Spectrum Analysis > Spectrum Monitors window displays a table of currently connected spectrum devices. This table includes the name of each spectrum monitor or hybrid AP and its current radio band (2GHz or 5GHz):

781 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 111 Viewing a list of Connected Spectrum Monitors

To view a list of connected spectrum devices via the command-line interface, issue the show ap spectrum monitors command:

Disconnecting a Spectrum Device
A spectrum monitor or hybrid AP can send spectrum analysis data to only one client at a time. When you are done viewing data for a spectrum device, you should release your client's subscription to that spectrum device and allow other clients to view data from that device. A spectrum monitor or hybrid AP automatically disconnects from your client when you close the browser window used to connect the spectrum device your client.
To manually disconnect a spectrum monitor or hybrid AP:
1. Click the Spectrum Monitors tab. 2. Each table entry in the Currently Connected table includes a Disconnect link to release the client's
connection to that spectrum monitor. Identify the table entry for the spectrum monitor you want to release then click Disconnect. 3. A popup window asks you to confirm that you want to disconnect the spectrum monitor from the spectrum analysis client. Click OK. The spectrum monitor d>isconnects from the client and the device's entry is removed from the Currently Connected table.
When you disconnect a spectrum device from your client, the AP continues to operate as a spectrum monitor or hybrid AP until you return the device to AP mode by removing the local spectrum override, or by changing the mode parameter in the AP's 802.11a or 802.11g radio profile from spectrum-mode to AP-mode.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 782

If you are use Internet Explorer with multiple instances of the Internet Explorer browser open, and you close the spectrum browser window without manually disconnecting the spectrum device, the controller does not release the data streaming connection to aspectrum monitor until 60 seconds after you close the spectrum client browser window. During this 60-second period, the spectrum monitor is still connected to the client.
Configuring the Spectrum Analysis Dashboards
Once you have connected spectrum monitors to your spectrum analysis client, you can begin to monitor spectrum data in the spectrum analysis dashboards. There are three predefined sets of dashboard views, View 1, View 2 and View 3. View 1 displays the Real-Time FFT, FFT Duty-Cycle and Swept Spectrogram graphs by default, and Views 2 and 3 display the Swept Spectrogram and Quality Spectrogram charts, and the Channel Summary and Active Devices tables.
Each chart in the dashboard can be replaced with other chart types, or reconfigured to show data for a different spectrum monitor. Once you have configured a dashboard view with different settings, you can rename that dashboard view to better reflect its new content.
The following sections explain how to customize your Spectrum Analysis dashboard to best suit the needs of your individual network:
l Selecting a Spectrum Monitor on page 783 l Changing Graphs within a Spectrum View on page 784 l Renaming a Spectrum Analysis Dashboard View on page 785 l Saving a Dashboard View on page 785 l Resizing an Individual Graph on page 786
Selecting a Spectrum Monitor
When you first log into the Spectrum Analysis dashboard, it displays blank charts. You must identify the spectrum monitor whose information you want to view before the graphs display any data.
To identify the spectrum monitor radio whose data you want to appear in the Spectrum Analysis dashboard:
1. Access the Monitoring > Spectrum Analysis window in the WebUI. 2. Click the Spectrum Dashboards tab. 3. In the graph title bar, click the down arrow by the Please select a spectrum monitor heading, as shown
in Figure 112. A drop-down list appears with the name of all spectrum monitor and hybrid AP radios currently connected to the client.

783 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 112 Selecting a Spectrum Monitor

4. Select a spectrum monitor from the list. The spectrum monitor or hybrid AP name appears in the chart titlebar and the chart starts displaying data for that spectrum monitor.
After you have selected the initial spectrum monitor or hybrid AP for a graph, you can display data for a different spectrum device at any time by clicking the down arrow by the device name in the chart titlebar and selecting a different connected spectrum monitor or hybrid AP.
Changing Graphs within a Spectrum View
To replace an existing graph with any other type of graph or chart:
1. Access the Monitoring > Spectrum Analysis window in the WebUI. 2. Click the Spectrum Dashboards tab. 3. From Spectrum Dashboards window, click one of the view names at the top of the window to select the
dashboard layout with the graph you want to change. 4. Click the down arrow at the far right end of the graph title bar to display a drop-down menu of chart
options. 5. Click Replace With to display a list of available graphs. 6. Click the name of the new graph you want to display.
Figure 113 Replacing a Graph in the Spectrum Analysis Dashboard

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 784

Renaming a Spectrum Analysis Dashboard View
You can rename any of the three spectrum analysis dashboard views at any time. Note, however, that simply renaming a view does not save its settings. (For details on saving a spectrum dashboard view, refer to Saving a Dashboard View on page 785.)
To rename a Spectrum Analysis Dashboard view:
1. From the Monitoring > Spectrum Analysis > Spectrum Dashboards window, click the down arrow to the right of the dashboard view you want to rename.
2. Select Rename.
Figure 114 Renaming a Spectrum Dashboard View

3. The Dashboard Name popup window appears. Enter a new name for the dashboard view, then click OK.
Saving a Dashboard View
You can select different graphs to display in a dashboard view, but these changes are not saved unless you save that view. Dashboard views, (like the spectrum analysis profile and spectrum local-override profile) are all local configurations that must be configured on each controller. None of these settings are synchronized between controllers. To save a dashboard view: 1. After selecting the graphs you want to appear in the view, click Save Spectrum View at the top of the
window.

785 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 115 Save a Spectrum Analysis Dashboard Layout
2. The Spectrum View Saved confirmation window appears when the spectrum view has been saved. The selected graphs now appear by default whenever you log in to view the spectrum dashboard.
If you change graphs in a spectrum view but do not save your settings, you are prompted to save or cancel your changes when you close the spectrum dashboard browser window
Resizing an Individual Graph
The left side of the title bar for each graph includes a resizing button on that allows you to expand a graph for easier viewing. Click this button as shown in Figure 116 to expand the selected graph to the size of the full window and display the Options pane, which allows you to change the current display options for that graph. (Configuration options are described in Spectrum Analysis Graph Configuration Options on page 787). To close the options pane if you have not made any changes to the graph, click Close at the bottom of the Options pane or click the resize button again to return the graph to its original size. To save any changes to the graph, click OK to save your settings and close the Options pane. Figure 116 Resizing a Spectrum Analysis Graph

Customizing Spectrum Analysis Graphs
Each Spectrum Analysis graph can be customized to display or hide selected data types. To view the available options for a graph type:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 786

1. From the Monitoring > Spectrum Analysis > Spectrum Dashboards window, click the down arrow at the end of the title bar for the graph you want to configure.
2. Select Options. The Options window appears to the right of the graph.
Figure 117 Viewing Spectrum Analysis Graph Options

3. From the Options window, configure graph settings described in Spectrum Analysis Graph Configuration Options on page 787.
4. When you are done, click OK at the bottom of the Options window to hide the options window. 5. (Optional) Click Save Spectrum View at the top of the window to save your new settings.
Spectrum Analysis Graph Configuration Options
The following sections describe the customizable parameters and the default settings for each spectrum analysis graph.
Active Devices
This graph appears as a pie chart showing the percentages and total numbers of each device type for all active devices seen by the spectrum monitor or hybrid AP radio. This chart is useful for determining which types of devices are sending signals on the specified radio band or channel. The Active Devices graphs for spectrum monitors can be configured to show data for several different device types on a single radio channel or range of channels. Active Devices graphs for hybrid APs can show data for the single monitored channel only.
When you hover your mouse over any section of the pie chart, a tooltip displays the percentage and number of active devices classified into that device type. The example in Figure 118 shows that 99% of the active devices a spectrum monitor radio sees in the 2.4 GHz band are Wi-Fi APs.

787 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 118 Active Devices Graph

Click the down arrow in the upper right corner of this chart then click the Options menu to access the configuration settings for the Active Devices graph. Once you have configured the desired parameters, click OK at the bottom of the Options menu to save your settings and return to the spectrum dashboards.

Table 154: Active Devices Graph Options

Parameter

Description

Band

Radio band displayed in this graph (2.4 GHz or 5 GHz)

Channel numbering

This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band. A hybrid AP on a 20 MHz channel sees 40 MHz Wi-Fi data as non-Wi-Fi data. For spectrum monitors using the 5 GHz radio band, click the Channel Numbering drop-down list and select either 20 MHz or 40 MHz channel numbering to identify a channel numbering scheme for the graph. Graphs for AP radios that support 802.11ac include an additional 80MHz option for very-highthroughput channels.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 788

Parameter Channel Range
Show

Description
For graphs created by spectrum monitors, specify a channel range to determine which channels appears in this graph. Click the first drop-down list to select the lowest channel in the range, then click the second drop-down list to select the highest channel to appear in the graph. This graph displays all channels within the spectrum monitor's radio band by default. NOTE: This parameter is not configurable for graphs created by hybrid APs.
Click the checkbox by any of these device categories to include that device type in the graph. l WiFi (AP) l Microwave (This option is only available for 2.4 GHz radios) l Bluetooth (This option is only available for 2.4 GHz radios) l Fixed Freq (Others) l Fixed Freq (Cordless Phones) l Fixed Freq (Video) l Fixed Freq (Audio) l Freq Hopper (Others) l Freq Hopper (Cordless Network) l Freq Hopper (Cordless Base) l Freq Hopper Xbox (This option is only available for 2.4 GHz radios) l Microwave (Inverter) (This option is only available for 2.4 GHz radios) l Generic Interferer NOTE: For more information on non-Wi-Fi device types detected by a spectrum monitor, see Working with Non-Wi-Fi Interferers on page 816.

Active Devices Table
This table lets you view, sort, and search for data about the devices that are sending signals on the specified radio band or channel. The Active Devices table for a spectrum monitor displays data for all channels on the selected band. The Active Devices table for a hybrid monitor displays data for the single monitored channel only. Click any of the column headings to sort the information in the table by that column criteria. Make a column wider or narrower by clicking the border of a column heading and dragging the border to a new position.
Figure 119 Active Devices Table

You can save the data in the Active Devices table for later analysis by exporting it as data file in .csv format, which can be viewed by spreadsheet and database management applications like Microsoft Excel. To export this table, click the down arrow in the upper right corner of this chart and select Export. A window opens and

789 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

lets you browse to the location to which you want to save the file. Once you have identified the location where you want to save the file, click Save.
You can also filter table entries by signal strength, duty cycle, discovery time, activity duration, channels affected and device ID number by clicking the icon below any column heading and specifying the values or value ranges that should appear in the table. Table 155 describes each of the columns in the table and the filters that can be applied to the table output.

Table 155: Active Devices Table Options

Parameter

Description

Device Type

This column shows the type of active device detected by the spectrum monitor or hybrid AP. This column may display any of the following values: l WiFi (AP) l Microwave (This option is only available for 2.4 GHz radios) l Bluetooth (This option is only available for 2.4 GHz radios) l Fixed Freq (Others) l Fixed Freq (Cordless Phones) l Fixed Freq (Video) l Fixed Freq (Audio) l Freq Hopper (Others) l Freq Hopper (Cordless Network) l Freq Hopper (Cordless Base) l Freq Hopper Xbox (This option is only available for 2.4 GHz radios) l Microwave (Inverter) (This option is only available for 2.4 GHz radios) l Generic Interferer NOTE: For more information on non-Wi-Fi device types detected by a spectrum monitor, see Working with Non-Wi-Fi Interferers on page 816.

BSSID

The Basic Service Set Identifier of the device. An AP's BSSID is usually its MAC address.

SSID

The service set identifier of the device's 802.11 wireless LAN.

Signal (dBm)

The current transmission power for this device, in dBm.
To filter the output of this table to show only specific device types, click the icon in the column heading then select one of the following options:
l Select Any to display entries for all signal strength levels.
l To display entries within a specific range of power strength levels, enter the minimum signal strength level in the Min field and enter the maximum signal strength level in the Max field.
Click OK to save your settings and return to the Active Devices table.

Duty Cycle

The percentage of time that the device is actively sending a signal on the radio band or channel.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 790

Parameter

Description
To filter the output of this table to show only specific duty cycle values or a range of values types, click the icon in the column heading then select one of the following options:
l Select Any to display all entries, regardless of duty cycle value.
l To display entries within a specific range of duty cycles, enter the minimum duty cycle percentage in the Min field and enter the maximum duty cycle percentage in the Max field.
Click OK to save your settings and return to the Active Devices table.

Discovered

The time at which the device was first discovered by the spectrum monitor or hybrid AP.
To filter the output of this table to show devices discovered within a specific time, click the icon in the column heading.
Select Any to display all entries, regardless of when the device was discovered.
To display entries for devices discovered within a specific time range:
1. Select the button by the Less than drop down list. 2. Click the Less than drop-down list and select either Less than or More than to
limit the output of this table to devices discovered earlier or after a specified number of hours or minutes. 3. Enter the number of hours or minutes in the time range you want apply to this filter. 4. Click the min. drop down list and select either min. or hrs. to define the time range in minutes or hours. 5. Click OK to save your settings and return to the Active Devices table.

Activity Duration

Amount of time that the device has been active.
To filter the output of this table to show devices that have been active within a specific time range, click the icon in the column heading.
Select Any to display all entries, regardless of how long the device has been active.
To display entries for devices active for a specific time range:
1. Select the button by the > symbol. 2. Click drop-down list with the > symbol and select either > (greater than), < (less
than), <= (less than or equal to), or >= (more than or equal to) to limit the output of this table to devices that have been active for a specified time range. 3. Enter the number of hours or minutes in the time range you want apply to this filter. 4. Click the min. drop down list and select either min. or hrs. to define the time range in minutes or hours. 5. ClickOK to save your settings and return to the Active Devices table.

Channels Affected

Radio channels affected by the device's transmission. The Active Devices table for a spectrum monitor shows entries for all devices by default, regardless of the channels their transmissions may affect.
To filter the output of this table to show devices that affect a specific channel or range of channels, click the icon in the column heading.
l Select Any to display all entries, regardless of the channels that device may affect.
l Select Single Channel, then enter the channel value to only display devices that affect the specified channel.

791 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter
Device ID Center Frequency (MHz) Occupied Bandwidth

Description
l Select Range of Channels, then enter the lower and upper channels in the channel range to filter the output to show only those devices whose transmissions affect the specified channel range. This option is only available for tables created by spectrum monitors, not hybrid APs.
l Select Specified Channels to show only those devices whose transmissions affect selected channels. If you choose this option, you can click the none checkbox to show only those devices whose transmissions do not affect any other channels, select all to show devices whose transmissions affect any channel, or click the checkboxes by individual channel numbers to show only those devices whose output affect those selected channels. This option is only available for tables created by spectrum monitors, not hybrid APs.
l Click OK to save your settings and return to the Active Devices table. NOTE: This option is not available for Active Devices tables created by a hybrid AP, because each hybrid AP monitors a single channel only.
The spectrum monitor or hybrid AP applies a unique device ID per device type to each device it detects on the radio channel.
To display the entry for a device that matches a single device ID, click the icon in the column heading and enter the device ID. Click OK to save your settings and return to the Active Devices table.
Signals from a wireless device can spread beyond the boundaries of an individual 802.11 channel. This table column shows the center frequency for the device's transmission, in megahertz.
Channel bandwidth used by the device, in megahertz.

Active Devices Trend
The Active Devices Trend chart is a line chart that shows the numbers of Wi-Fi and non-Wi-Fi devices seen on each radio channel during the displayed time interval. When you hover your mouse over any line in the chart, a tooltip displays the number of active devices for the selected device type. The example in Figure 120 shows that there are 27 active Wi-Fi APs on channel 157 of the 5 GHz radio band.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 792

Figure 120 Active Devices Trend Graph

An Active Devices Trend chart created by a hybrid AP displays data for the single channel monitored by that device. For spectrum monitors, the Active Devices Trend chart can display values for up to five different channels and device types. These graphs show the following data by default:
l For SMs on the 2.4 GHz radio band, Wi-Fi APs on channel 1, 6, and 11. l For SMs on the 5 GHz band, Wi-Fi APs on channel 36, 40, and 44.
Table 156 describes the other values that can be displayed in the Active Devices Trend chart. Click the down arrow in the upper right corner of this chart, then click the Options menu to access the Active Devices Trend configuration settings. Once you have configured the desired parameters, click OK at the bottom of the Options menu to save your settings and return to the spectrum dashboards.

Table 156: Active Devices Trend Options

Parameter

Description

Band

Radio band displayed in this graph (2.4 GHz or 5 GHz).

Show Trend for Last

Amount of elapsed time for which this chart should display data.

Channel Numbering

This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band. A hybrid AP on a 20 MHz channel sees 40 MHz Wi-Fi data as non-Wi-Fi data. For spectrum monitors using the 5 GHz radio band, click the Channel Numbering drop-down list and select either 20 MHz or 40 MHz channel numbering to identify a channel numbering scheme for the graph. Graphs for AP radios that support 802.11ac include an additional 80MHz option for very-high-throughput channels.

793 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter
Show lines for these channels

Description
The Active Devices Trend chart can display values for up to five different device types on different channels for a spectrum monitor, or a single device type for a hybrid AP. To choose which type of data each line should represent, click the channel number drop-down list and select a channel within the radio band, then click the device type drop-down list and select one of the following device types.
l WiFi (AP) l Microwave (This option is only available for 2.4 GHz radios) l Bluetooth (This option is only available for 2.4 GHz radios) l Fixed Freq (Others) l Fixed Freq (Cordless Phones) l Fixed Freq (Video) l Fixed Freq (Audio) l Freq Hopper (Others) l Freq Hopper (Cordless Network) l Freq Hopper (Cordless Base) l Freq Hopper Xbox (This option is only available for 2.4 GHz radios) l Microwave (Inverter) (This option is only available for 2.4 GHz radios)
l Generic Interferer Select the checkbox beside each channel and device entry to show that information on the chart, or deselect the checkbox to hide that information. For more information on non-Wi-Fi device types detected by a spectrum monitor, see Working with Non-Wi-Fi Interferers on page 816.

Channel Metrics
This stacked bar chart can show one of three different types of channel metrics; channel utilization, channel availability, or channel quality.
This chart displays channel utilization data by default, showing both the percentage of each monitored channel that is currently being used by Wi-Fi devices, and the percentage of each channel being used by non-Wi-Fi devices and 802.11 adjacent channel interference (ACI).
ACI refers to the interference on a channel created by a transmitter operating in an adjacent channel. A transmitter on a nonadjacent or partially overlapping channel may also cause interference, depending on the transmit power of the interfering transmitter and the distance between the devices. In general, ACI may be caused by a Wi-Fi transmitter or a non-Wi-Fi interferer. However, whenever the term ACI appears in Spectrum Analysis graphs, it refers to the ACI caused by Wi-Fi transmitters. The channel utilization option in the Channel Metrics Chart shows the percentage of the channel utilization due to both ACI and non-Wi-Fi interfering devices. Unlike the ACI shown in the Interference Power chart, the ACI shown in this graph indicates the percentage of channel time that is occupied by ACI or unavailable for Wi-Fi communication due to ACI.
The Channel Metrics graph can also show channel availability, the percentage of each channel that is available for use, or display the current relative quality of selected channels in the 2.4 GHz or 5 GHz radio bands. Spectrum monitors can display data for all channels in their selected band. Hybrid APs display data for their one monitored channel only.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 794

In the spectrum analysis feature, channel quality is a relative measure that indicates the ability of the channel to support reliable Wi-Fi communication. Channel quality, which is represented as a percentage in this chart, is a weighted metric derived from key parameters that can affect the communication quality of a wireless channel, including noise, non-Wi-Fi (interferer) utilization and duty-cycles, and certain types of retries. Note that channel quality is not directly related to Wi-Fi channel utilization, as a higher quality channel may or may not be highly used.
When you hover your mouse over any bar in the chart, a tooltip displays the metric value for that individual channel. The example below shows that 61% of channel 3 is being consumed by non-Wi-Fi devices and 802.11 adjacent channel interference.
Figure 121 Channel Metrics Graph

Table 157 describes the parameters that can be displayed in the Channel Metrics graph. Click the down arrow in the upper right corner of this chart then click the Options menu to access these configuration settings. Once you have configured the desired parameters, click OK at the bottom of the Options menu to save your settings and return to the spectrum dashboards.

795 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 157: Channel Metrics Options

Parameter

Description

Band

Radio band displayed in this graph.
For spectrum monitor radios using the 5 GHz radio band, click the Band drop-down list and select 5 GHz upper, 5GHz middle or 5Ghz lowerto display data for that portion of the 5 Ghz radio band. This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band.

Channel Numbering

This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band. A hybrid AP on a 20 MHz channel sees 40 MHz Wi-Fi data as non-Wi-Fi data. For spectrum monitors using the 5 GHz radio band, click the Channel Numbering drop-down list and select either 20 MHz or 40 MHz channel numbering to identify a channel numbering scheme for the graph. Graphs for AP radios that support 802.11ac include an additional 80MHz option for very-high-throughput channels.

Channel Range Display Mode

For graphs created by spectrum monitors, specify a channel range to determine which channels appear in this graph. Click the first drop-down list to select the lowest channel in the range, then click the second drop-down list to select the highest channel to appear in the graph.
This graph displays all channels within the spectrum monitor's radio band by default. NOTE: This parameter is not configurable for graphs created by hybrid APs.
Select Channel Quality to show the relative quality of the channel. Channel Quality is a weighted metric derived from key parameters which include noise, non-Wi-Fi (interferer) utilization and duty-cycles, and certain types of retries.
Select Channel Availability to show the percentage of the channel that is unused and available for additional Wi-Fi traffic.
Select Channel Utilization to show both the percentage of the channel that is currently used by Wi-Fi devices, and the percentage of each channel that is being used by non-802.11 devices or 802.11 adjacent channel interference (ACI).

Channel Metrics Trend
By default, this line chart shows the current relative quality of selected channels in the 2.4 GHz or 5 GHz radio bands over a period of time. The Channel Metrics Trend chart can also be configured to display trends for the current availability of selected channels, or the percentage of availability for those channels.Spectrum monitors can display data for up to five different channels. Hybrid APs display data for their one monitored channel only.
For more information on how the spectrum analysis feature determines the quality of a channel, see Channel Metrics on page 794.
When you hover your mouse over any line in the chart, a tooltip displays channel quality or availability data for that individual channel at the selected time.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 796

Figure 122 Channel Metrics Trend Chart

Table 158 describes the other parameters that can be displayed in the Channel Metrics Trend output. Click the down arrow in the upper right corner of this chart then click the Options menu to access these configuration settings. Once you have configured the desired parameters, click OK at the bottom of the Options menu to save your settings and return to the spectrum dashboard.

Table 158: Channel Metrics Trend Options

Parameter

Description

Band

Radio band displayed in this graph (2.4 GHz or 5 GHz).

Show Trend for Last

The Channel Quality Trend chart shows channel quality or channel availability for the past 10 minutes by default. To view data for a different time range, click the Show Trend for Last drop-down list and select one of the following options:
l 10 minutes
l 30 minutes
l 1 hour

Channel numbering

This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band. A hybrid AP on a 20 MHz channel sees 40 MHz Wi-Fi data as non-Wi-Fi data. For spectrum monitors using the 5 GHz radio band, click the Channel Numbering drop-down list and select either 20 MHz or 40 MHz channel numbering to identify a channel numbering scheme for the graph. Graphs for AP radios that support 802.11ac include an additional 80MHz option for very-high-throughput channels.

Show Lines for These Channels

The Channel Quality Trend chart for a spectrum monitor can display channel quality, channel availability, or channel utilization values for up to five different channels on the selected radio band. Charts for hybrid APs can display data for the one channel monitored by that hybrid AP radio.

797 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter

Description
To choose which type of data each line should represent on a chart for a spectrum monitor, click the channel number drop-down list and select a channel within the radio band, then click the second drop-down list and select either Channel Quality, or Channel Availability.
Select the checkbox beside each channel entry to show that information on the chart, or deselect the checkbox to hide that information.

Channel Summary Table
The channel summary table provides a summarized or aggregated view of key statistics. Spectrum monitors display spectrum analysis data seen on all channels in the selected band, and hybrid APs display data from the one channel they are monitoring. The example in Figure 123 below shows that a spectrum monitor sees 44 Valid APs and 52% channel utilization on channel 40 in the 5GHz radio band.
Figure 123 Channel Summary Table

Spectrum monitor radios using the 5 GHz radio band can display channels using either 20 MHz or 40 MHz channel numbering. Spectrum monitor radios that support 802.11ac can also display 80MHz channels. To toggle between these channel numbering modes, click the down arrow in the upper right corner of the graph titlebar, then click either Show 20 MHz Channels, Show 40 MHz Channels or Show 80 MHz Channels.
Click any of the column headings to sort the information in the table by that column criteria. Make a column wider or narrower by clicking the border of a column heading and dragging the border to a new position.
Table 159 describes the output of the Channel Summary table.

Table 159: Channel Summary Table Parameters

Parameter

Description

Channel

Radio channel being monitored by the spectrum monitor or hybrid AP

Valid APs

Number of known APs seen on the network.

Not Valid APs

Number of unknown or invalid APs seen on the network.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 798

Parameter Non Wi-Fi Devices Center Freq. (GHz) Channel Util. (%) Max AP Power (dBm) Max Interference (dBm) SNIR (dB)

Description
Number of Non-Wi-Fi (interfering) devices detected/classified by the spectrum monitor.
Center frequency of the Wi-Fi signals sent on that radio channel.
Percentage of the channel currently being used by devices on the network.
Signal strength of the AP that has the maximum signal strength on a channel.
Signal strength of the non-Wi-Fi device that has the highest signal strength.
The Signal-to-Noise-and-Interference Ratio (SNIR) is the ratio of signal strength to the combined levels of interference and noise on that channel. This value is calculated by determining the maximum noisefloor and interference-signal levels, and then calculating how strong the desired signal is above this maximum.

Device Duty Cycle
The Device Duty Cycle Chart is a stacked bar chart that shows the duty cycle of each device type on a channel. The duty cycle is the percentage of time each device type operates or transmits on that channel. Though Wi-Fi devices do not transmit if there is another Wi-Fi or non-Wi-Fi device active at that time, most non-Wi-Fi devices do not follow such a protocol for transmissions. Because these devices operate independently without regard to any other devices operating on the same channel, the total duty cycle of all device types may add up to more than 100% on a channel. For example, one or more video bridges may be active on a channel, each with a 100% duty cycle. The same channel may have a cordless transmitter with a 10% duty cycle and a microwave oven with a 50% duty cycle. In this example, the Device Duty Cycle chart shows all three device types with their respective duty cycle percentages.
This chart is not available for W-AP68 access points. A hybrid AP on a 20 MHz channel will see 40 MHz Wi-Fi data as non-Wi-Fi data.
Spectrum monitors display spectrum analysis data seen on all channels in the selected band, and hybrid APs display data from the one channel they are monitoring. The example below shows data from a spectrum monitor monitoring all channels in the 2.4 Ghz band.

799 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 124 Device Duty Cycle

Table 160 describes the parameters you can use to customize the Device Duty Cycle chart. Click the down arrow in the upper right corner of this chart, then click the Options menu to access these configuration settings. Once you have configured the desired parameters, click OK at the bottom of the Options menu to save your settings and return to the spectrum dashboards.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 800

Table 160: Device Duty Cycle Options Parameter Description

Band

Radio band displayed in this graph.
For spectrum monitor radios using the 5 GHz radio band, click the Band drop-down list and select 5 GHz upper, 5 GHz middle or 5 Ghz lower to display data for that portion of the 5 Ghz radio band. This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band.

Channel Numbering

This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band. A hybrid AP on a 20 MHz channel sees 40 MHz WiFi data as non-Wi-Fi data. For spectrum monitors using the 5 GHz radio band, click the Channel Numbering drop-down list and select either 20 MHz or 40 MHz channel numbering to identify a channel numbering scheme for the graph. Graphs for AP radios that support 802.11ac include an additional 80 MHz option for very-high-throughput channels.

Channel Range
Show

For graphs created by spectrum monitors, specify a channel range to determine which channels appear in this graph. Click the first drop-down list to select the lowest channel in the range, then click the second drop-down list to select the highest channel to appear in the graph.
This graph displays all channels within the spectrum monitor's radio band by default. NOTE: This parameter is not configurable for graphs created by hybrid APs.
This graph can display values for up to five different device types on different channels for a spectrum monitor, or a single device type for a hybrid AP monitoring a single channel.
To choose which type of data each line should represent, click the channel number dropdown list and select a channel within the radio band, then click the device type drop-down list and select one of the following device types
l WiFi (AP) l Microwave (This option is only available for 2.4 GHz radios)
l Bluetooth (This option is only available for 2.4 GHz radios)
l Fixed Freq (Others)
l Fixed Freq (Cordless Phones)
l Fixed Freq (Video)
l Fixed Freq (Audio)
l Freq Hopper (Others)
l Freq Hopper (Cordless Network)
l Freq Hopper (Cordless Base)
l Freq Hopper Xbox (This option is only available for 2.4 GHz radios)
l Microwave (Inverter) (This option is only available for 2.4 GHz radios)
l Generic Interferer NOTE: For more information on non-Wi-Fi device types detected by a spectrum monitor, see Working with Non-Wi-Fi Interferers on page 816.

Channel Utilization Trend
The Channel Utilization Trend chart is a line chart that shows the percentage of total utilization on each channel over a time interval. The channel utilization includes the utilization due to Wi-Fi as well as utilization due to non-

801 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Wi-Fi interferers and Adjacent Channel Interference (ACI).
For additional information on how the spectrum analysis feature measures ACI, see Channel Metrics on page 794.
This graph can show data recorded for the last ten, thirty, or sixty minutes. Spectrum monitors display spectrum analysis data seen on all channels in the selected band, and hybrid APs display data from the one channel they are monitoring. When you hover your mouse over any line in the chart, a tooltip shows the percentage of the channel being utilized at the specified time. The example in Figure 125 shows that channel 1 was 70% used at the selected time in the chart. Figure 125 Channel Utilization Trend

Table 161 describes the parameters you can use to customize the Channel Utilization Trend chart. Click the down arrow in the upper right corner of this chart, then click the Options menu to access these configuration settings. Once you have configured the desired parameters, click OK at the bottom of the Options menu to save your settings and return to the spectrum dashboards.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 802

Table 161: Channel Utilization Trend Options

Parameter

Description

Intervals

The Channel Utilization Trend chart shows channel quality or channel availability for the past 10 minutes by default. To view data for a different time range, click the Intervals drop-down list and select one of the following options:
l 10 minutes
l 30 minutes
l 1 hour

Band

Radio band displayed in this graph (2.4 GHz or 5 GHz).

Channel Numbering

This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band. A hybrid AP on a 20 MHz channel sees 40 MHz Wi-Fi data as non-Wi-Fi data. For spectrum monitors using the 5 GHz radio band, click the Channel Numbering drop-down list and select either 20 MHz or 40 MHz channel numbering to identify a channel numbering scheme for the graph. Graphs for AP radios that support 802.11ac include an additional 80MHz option for very-high-throughput channels.

Show

To select individual channels you want to display on this chart, click the checkbox by a channel entry, then click the channel drop-down list to select the channel to display. To hide a channel, uncheck the checkbox by that channel number.

Devices vs Channel
This stacked bar chart shows the current number of devices using each channel in the radio's frequency band. This chart can show separate per-channel statistics for the numbers of Wi-Fi devices, cordless phones, bluetooth devices, microwaves, and other non-Wi-Fi devices.
If a device affects more than one channel, it is recorded as a device on all channels it affects. For example, if a 20Mhz Wi-Fi AP has a center frequency of 2437 Mhz (channel 6) it is counted as a device on channels 3-9 because it affects all those channels. Similarly, if a channel-hopping device uses all channels within a frequency band, it is counted as a device on all channels in that band.
When you hover the mouse over any part of the chart, a tooltip shows the numbers of the device type currently using that channel. The example in Figure 126 shows that the spectrum monitor can detect 42 APs on channel 5.

803 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 126 Devices vs Channel

Table 162 describes the parameters you can use to customize the Devices vs Channel chart. Click the down arrow in the upper right corner of this chart, then click the Options menu to access these configuration settings. Once you have configured the desired parameters, click OK at the bottom of the Options menu to save your settings and return to the spectrum dashboards.

Table 162: Devices vs Channel Options

Parameter

Description

Band

Radio band displayed in this graph.
For spectrum monitor radios using the 5 GHz radio band, click the Band drop-down list and select 5 GHz upper, 5GHz middle or 5Ghz lower to display data for that portion of the 5 Ghz radio band. This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band.

Channel Numbering

This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band. A hybrid AP on a 20 MHz channel sees 40 MHz Wi-Fi data as non-Wi-Fi data. For spectrum monitors using the 5 GHz radio band, click the Channel Numbering drop-down list and select either 20 MHz or 40 MHz channel numbering to identify a channel numbering scheme for the graph. Graphs for AP radios that support 802.11ac include an additional 80MHz option for very-high-throughput channels.

Channel Range

For graphs created by spectrum monitors, specify a channel range to determine which channels appear in this graph. Click the first drop-down list to select the lowest channel in the range, then click the second drop-down list to select the highest channel to appear in the graph.
This graph displays all channels within the spectrum monitor's radio band by default.
NOTE: This parameter is not configurable for graphs created by hybrid APs.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 804

Parameter Show

Description
This graph can show data for up to five different device types. To show how many devices of a specific type are sending a signal on the selected channel range, click the show checkbox by that device, then click the device drop-down list and select one of the following device types. l WiFi (AP) l Microwave (This option is only available for 2.4 GHz radios) l Bluetooth (This option is only available for 2.4 GHz radios) l Fixed Freq (Others) l Fixed Freq (Cordless Phones) l Fixed Freq (Video) l Fixed Freq (Audio) l Freq Hopper (Others) l Freq Hopper (Cordless Network) l Freq Hopper (Cordless Base) l Freq Hopper Xbox (This option is only available for 2.4 GHz radios) l Microwave (Inverter) (This option is only available for 2.4 GHz radios) l Generic Interferer NOTE: For more information on non-Wi-Fi device types detected by a spectrum monitor, see Working with Non-Wi-Fi Interferers on page 816.

FFT Duty Cycle
The FFT Duty Cycle chart is a line chart that shows the duty cycle for each frequency bin. The width of the each frequency bin depends on the resolution bandwidth of the spectrum monitor. The spectrum analysis feature considers a frequency bin to be used if the detected power in that bin is at least 20 dB higher than the nominal noise floor on that channel. The FFT Duty Cycle provides a more granular view of the duty cycle per bin as opposed to the aggregated channel utilization reported in the Channel Metrics chart.
This chart is not available for W-AP68 access points. A hybrid AP on a 20 MHz channel will see 40 MHz Wi-Fi data as non-Wi-Fi data.

This chart can show the duty cycle over the last second, the maximum FFT duty cycle measured for all samples taken over the last N sweeps, and the greatest FFT duty cycle recorded since the chart was last reset.

805 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 127 FFT Duty Cycle

This chart shows the current duty cycle for devices on all channels being monitored by the spectrum monitor radio by default. Table 163 describes the other optional parameters you can use to customize the FFT Duty Cycle table. Click the down arrow in the upper right corner of this chart, then click the Options menu to access these configuration settings. Once you have configured the desired parameters, click OK at the bottom of the Options menu to save your settings and return to the spectrum dashboards.

Table 163: FFT Duty Cycle Options

Parameter

Description

Band

Radio band displayed in this graph.
For spectrum monitor radios using the 5 GHz radio band, click the Band dropdown list and select 5 GHz upper, 5GHz middle or 5Ghz lower to display data for that portion of the 5 Ghz radio band. This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band.

Channel Numbering

This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band. A hybrid AP on a 20 MHz channel sees 40 MHz Wi-Fi data as non-Wi-Fi data. For spectrum monitors using the 5 GHz radio band, click the Channel Numbering drop-down list and select either 20 MHz or 40 MHz channel numbering to identify a channel numbering scheme for the graph. Graphs for AP radios that support 802.11ac include an additional 80MHz option for very-high-throughput channels.

X-Axis

Select either Channel or Frequency to show the duty cycle for a range of channels or frequencies.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 806

Parameter Channel Range
Center Frequency Span
Show

Description
If you selected Channel in the X-Axis parameter, you must also specify a channel range to determine which channels appear in the x-axis of this chart. Click the first drop-down list to select the lowest channel in the range, then click the second drop-down list to select the highest channel to appear in the chart.
NOTE: This parameter is not configurable for graphs created by hybrid APs.
If you selected Frequency in the X-Axis parameter, enter the frequency, in MHz, that you want to appear in the center of the x-axis of this chart.
If you selected Frequency in the X-Axis parameter, specify the size of the range of frequencies around the selected center frequency. If you set a frequency span of 100 MHz, for example, the chart shows the FFT duty cycle for a range of frequencies from 50MHz lower to 50 MHz higher than the selected center.
Select a checkbox to display that information on the FFT Duty Cycle chart.
l Duty Cycle: The percentage of duty cycle the channel or frequency was actively used.
l Max Hold: The maximum recorded percentage of active duty cycles for the channel frequency since the chart was last reset. To clear this setting, click the down arrow at the end of the title bar for this graph and select Reset MaxHold.
l Max of last sweeps: This chart shows the maximum percentage of active duty cycles for the channel of frequency recorded during the last 10 sweeps, by default. To change the number of sweeps used to determine this value, enter a number from 2 to 20, inclusive. To clear this setting, click the down arrow at the end of the title bar for this graph and select Reset MaxNSweep.

Interference Power
The Interference Power chart displays various power levels of interest, including the Wi-Fi AP with maximum signal strength, noise, and interferer types with maximum signal strength. The ACI displayed in the Interference Power Chart is the ACI power level based on the signal strength(s) of the Wi-Fi APs on adjacent channels. A higher ACI value in Interference Power Chart does not necessarily mean higher interference, because the AP that is contributing to the maximum ACI may or may not be very actively transmitting data to other clients at all times. The ACI power levels are derived from the signal strength of the beacons.
This chart displays the noise floor of each selected channel in dBm. The noise floor of a channel depends on the noise figure of the RF components used in the radio, temperature, presence of certain types of interferers or noise, and the width of the channel. For example, in a clean RF environment, a 20 MHz channel has a noise floor around -95 dBm and a 40 MHz channel has a noise floor around -92 dBm. Certain types of fixedfrequency continuous transmitters such as video bridges, fixed-frequency phones, and wireless cameras typically elevate the noise floor seen by the spectrum monitor. Other interferers such as frequency-hopping phones, Bluetooth, and Xbox may not affect the noise floor of the radio. A Wi-Fi radio can only reliably decode Wi-Fi signals that are a certain dB above the noise floor. Therefore estimating and understanding the actual noise floor of the radio is critical to understanding the reliability of the RF environment.
The chart also includes information about the AP on each channel with the highest power level. You can hover your mouse over an AP on the chart to view the AP's name, SSID, and current power level. The example below shows that the AP with the maximum power on channel 157 has the SSID qa-ss, and a power level of -55dBm.

807 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 128 Interference Power

Table 164 describes the other optional parameters you can use to customize the interference power chart. Click the down arrow in the upper right corner of this chart then click the Options menu to access these configuration settings. Once you have configured the desired parameters, click OK at the bottom of the Options menu to save your settings and return to the spectrum dashboards.

Table 164: Interference Power Options

Parameter

Description

Band

Radio band displayed in this graph.
For spectrum monitor radios using the 5 GHz radio band, click the Band drop-down list and select 5 GHz upper, 5GHz middle or 5Ghz lower to display data for that portion of the 5 Ghz radio band. This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band.

Channel Numbering

This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band. A hybrid AP on a 20 MHz channel sees 40 MHz Wi-Fi data as non-Wi-Fi data. For spectrum monitors using the 5 GHz radio band, click the Channel Numbering drop-down list and select either 20 MHz or 40 MHz channel numbering to identify a channel numbering scheme for the graph. Graphs for AP radios that support 802.11ac include an additional 80MHz option for very-high-throughput channels.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 808

Parameter Show
Channel Range

Description
By default, this chart displays data for the current noise floor, adjacent channel interference (ACI), and the maximum AP power level for each channel. To display interference power levels form other devices, click the show checkbox then click the show drop-down list and select one of the following device types. l Microwave (This option is only available for 2.4 GHz radios) l Bluetooth (This option is only available for 2.4 GHz radios) l Fixed Freq (Others) l Fixed Freq (Cordless Phones) l Fixed Freq (Video) l Fixed Freq (Audio) l Freq Hopper (Others) l Freq Hopper (Cordless Network) l Freq Hopper (Cordless Base) l Freq Hopper Xbox (This option is only available for 2.4 GHz radios) l Microwave (Inverter) (This option is only available for 2.4 GHz radios) l Generic Interferer For more information on non-Wi-Fi device types detected by a spectrum monitor, see Working with Non-Wi-Fi Interferers on page 816.
For graphs created by spectrum monitors, specify a channel range to determine which channels appear in this graph. Click the first drop-down list to select the lowest channel in the range, then click the second drop-down list to select the highest channel to appear in the graph. This graph displays all channels within the spectrum monitor's radio band by default. NOTE: This parameter is not configurable for graphs created by hybrid APs.

Quality Spectrogram
This plot shows the channel quality statistics for selected range of channels or frequencies. This chart can also be configured to show channel availability, the percentage of each channel that is unused and available for additional traffic.
Channel Quality is a weighted metric derived from key parameters which include noise, non-Wi-Fi (interferer) utilization and duty-cycles and certain types of retries. Quality levels are indicated by a range of colors between dark blue, which represents a higher channel quality, and red, which represents a lower channel quality. Channel availability is indicated by a range of colors between dark blue, which represents 100% channel availability, and red, which represents 0% availability.
For additional information on interpreting a Dell Spectrogram plot, see Swept Spectrogram on page 812.

The Spectrum Analysis Quality Spectrogram chart measures channel data each second, so after every 5-second sweep, the newest data appears as a thin colored line on the bottom of the chart. Older data is pushed up higher on the chart until it reaches the top of the spectrogram and ages out. The example below shows the Dell Quality Spectrogram chart after it has recorded over 1,500 seconds of FFT data.

809 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 129 Quality Spectrogram

When you hover your mouse over any part of the spectrogram, a tooltip shows the devices the spectrum monitor detected on that frequency, the BSSID of the device (if applicable), the power level of the device in dBm, the time the device was last seen by the spectrum monitor, and the channels affected by the device.
The following table describes the other optional parameters you can use to customize the Quality Spectrogram. Click the down arrow in the upper right corner of this chart, then click the Options menu to access these configuration settings. Once you have configured the desired parameters, click OK at the bottom of the Options menu to save your settings and return to the spectrum dashboards.

Table 165: Quality Spectrogram Options Parameter Description

Band

Radio band displayed in this graph.
For spectrum monitor radios using the 5 GHz radio band, click the Band drop-down list and select 5 GHz upper, 5GHz middle or 5Ghz lower to display data for that portion of the 5 Ghz radio band. This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band.

Channel Numbering

This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band. A hybrid AP on a 20 MHz channel sees 40 MHz WiFi data as non-Wi-Fi data. For spectrum monitors using the 5 GHz radio band, click the Channel Numbering drop-down list and select either 20 MHz or 40 MHz channel numbering to identify a channel numbering scheme for the graph. Graphs for AP radios that support 802.11ac include an additional 80MHz option for very-high-throughput channels.

Channel Range

Specify a channel range to determine which channels appear in the x-axis of this chart. Click the first drop-down list to select the lowest channel in the range, then click the second drop-down list to select the highest channel to appear in the chart.
NOTE: This parameter is not configurable for graphs created by hybrid APs.

Real-Time FFT
The Real-time FFT chart displays the instantaneous Fast Fourier Transform (FFT) signature of the RF signal seen by the radio. The Fast Fourier Transform (FFT) converts an RF signal from time domain to frequency domain.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 810

The frequency domain representation divides RF signals into discrete frequency bins; small frequency ranges whose width depends on the resolution bandwidth of the spectrum monitor (that is, how many Hz are represented by a single signal strength value). Each frequency bin has a corresponding signal strength value. Because there may be a large number of FFT signatures received by the radio every second, an algorithm selects one FFT sample to display in the Real-time FFT chart every second. This chart is not available for W-AP68 access points. A hybrid AP on a 20 MHz channel will see 40 MHz Wi-Fi data as non-Wi-Fi data.
This chart can show an average for all samples taken over the last second, the maximum FFT power measured for all samples taken over ten channel sweeps, and the greatest FFT power recorded since the chart was last reset. When you hover your mouse over any line, a tooltip shows the power level and channel or frequency level represented by that point in the graph. When you hover your mouse over a frequency level (within the blue brackets on the graph), a tooltip shows the types of devices seen on that frequency, and each device's BSSID, power level, channels affected and the time the device was last seen by the spectrum monitor. Figure 130 Real-TIme FFT
This chart shows the maximum power level recorded for any device on all channels or frequencies monitored by the spectrum monitor radio by default. Table 166 describes the other parameters you can use to customize the Real-time FFT chart. Click the down arrow in the upper right corner of this chart, then click the Options menu to access these configuration settings. Once you have configured the desired parameters, click OK at the bottom of the Options menu to save your settings and return to the spectrum dashboards.

811 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 166: Real-Time FFT Options Parameter Description

Band

Radio band displayed in this graph.
For spectrum monitor radios using the 5 GHz radio band, click the Band drop-down list and select 5 GHz upper, 5GHz middle or 5Ghz lowerto display data for that portion of the 5 Ghz radio band. This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band.

Channel Numbering

This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band. A hybrid AP on a 20 MHz channel sees 40 MHz Wi-Fi data as non-Wi-Fi data. For spectrum monitors using the 5 GHz radio band, click the Channel Numbering drop-down list and select either 20 MHz or 40 MHz channel numbering to identify a channel numbering scheme for the graph. Graphs for AP radios that support 802.11ac include an additional 80MHz option for very-high-throughput channels.

X-Axis

Select either Channel or Frequency to show FFT power for a range of channels or frequencies. If you select Frequency, you must select the radio frequency on which this chart should center, and determine the span of frequencies for the graph.

Channel Range

If you selected Channel in the X-Axis parameter, you must also specify a channel range to determine which channels appear in the X-axis of this chart. Click the first drop-down list to select the lowest channel in the range, then click the second drop-down list to select the highest channel to appear in the chart.
NOTE: This parameter is not configurable for graphs created by hybrid APs.

Center Frequency

If you selected Frequency in the X-Axis parameter, enter the frequency, in MHz, that you want to appear in the center of the x-axis of this chart.

Span

If you selected Frequency in the X-Axis parameter, specify the size of the range of frequencies around the selected center frequency. If you set a frequency span of 100 MHz, for example, the chart shows the FFT duty cycle for a range of frequencies from 50MHz lower to 50 MHz higher than the selected center.

Y-axis

Select the range of power levels, in -dBm, to appear in the y-axis of this chart. Enter the lower value in the right field, and the higher value in the left field.

Show

Select the checkbox by the following items to display that information on the FFT Power chart.
l Average: the average power level of all samples recorded during the last 10 sweeps.
l Maxthe The highest power recorded during the last 10 channel sweeps.
l Max Hold: the highest maximum power level recorded since the chart data was reset. To clear this setting, click the down arrow at the end of the title bar for this graph and select Clear Max Hold.

Swept Spectrogram
A spectrogram is a chart that shows how the density of the quantity being plotted varies with time. The spectrum analysis Swept Spectrogram chart plots real-time FFT Maximums, real-time FFT Averages, or the FFT Duty Cycle. In this swept spectrogram, the x-axis represents frequency or channel and the y-axis represents time. Each line in the swept spectrogram corresponds to the data displayed in the Real-Time FFT or FFT Duty Cycle chart.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 812

This chart is not available for W-AP68 access points. A hybrid AP on a 20 MHz channel will see 40 MHz Wi-Fi data as non-Wi-Fi data. The power or duty cycle values recorded in each sweep are mapped to a range of colors. In the average or maximum FFT power Swept Spectrogram charts, the signal strength levels are indicated by a range of colors between dark blue, which represents -90 dBm, and red, which represents a higher -50 dBm. The duty cycle Swept Spectrogram chart shows the percentage of the time tick interval that the selected channel or frequency was broadcasting a signal. These percentages are indicated by a range of colors between dark blue, which represents a duty cycle of 0% percent, and red, which represents a duty cycle of 100%. A spectrogram plot is a complex chart that can display a lot of information. If you are not familiar with these types of charts, they may be difficult to interpret. The following illustrations can help explain how FFT power data is rendered in a spectrogram format. The example in Figure 131 shows how an FFT Power chart could appear if a single data measurement was plotted as a simple line graph. Figure 131 Simple Line Graph of FFT Power Data
Now, suppose that each channel's FFT power level was also represented by a color that corresponded to that specific FFT power level. In the example below, channel 12 has a FFT power level of -50 dBm, represented by the color red. Channel 1 has a FFT power level of -85 dBm, represented by dark blue. Figure 132 FFT Power Line Graph with Color

813 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

If the graph was then flattened so each channel's FFT power for that single1-second sweep was represented only by a color (and not by a value on the y-axis), the graph could then appear as follows: Figure 133 FFT Power Spectrogram Sample
The spectrum analysis Swept Spectrogram measures FFT power levels or duty cycle data each second, so after every 1-second sweep, the newest data appears as a thin colored line on the bottom of the chart. Older data is pushed up higher on the chart until it reaches the top of the spectrogram and ages out. The example below shows the Swept Spectrogram chart after it has recorded over 300 seconds of FFT data. Figure 134 Swept Spectrogram

Table 167 describes the parameters you can use to customize the Swept Spectrogram chart. Click the down arrow in the upper right corner of this chart, then click the Options menu to access these configuration settings. Once you have configured the desired parameters, click OK at the bottom of the Options menu to save your settings and return to the spectrum dashboards.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 814

Table 167: Swept Spectrogram Options

Parameter

Description

Band

Radio band displayed in this graph.
For spectrum monitor radios using the 5 GHz radio band, click the Band dropdown list and select 5 GHz upper, 5GHz middle, or 5Ghz lower to display data for that portion of the 5 Ghz radio band. This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band.

Channel Numbering

This parameter is not configurable for graphs created by hybrid APs or spectrum monitor radios that use the 2.4 GHz radio band. A hybrid AP on a 20 MHz channel sees 40 MHz Wi-Fi data as non-Wi-Fi data. For spectrum monitors using the 5 GHz radio band, click the Channel Numbering drop-down list and select either 20 MHz or 40 MHz channel numbering to identify a channel numbering scheme for the graph. Graphs for AP radios that support 802.11ac include an additional 80MHz option for very-high-throughput channels.

X-Axis

Select either Channel or Frequency to show FFT power or duty cycles for a range of channels or frequencies. If you select Frequency, you must select the radio frequency on which this chart should center, and determine the span of frequencies for the graph.

Channel Range Center Frequency

If you selected Channel in the X-Axis parameter, you must also specify a channel range to determine which channels appear in the x-axis of this chart. Click the first drop-down list to select the lowest channel in the range, then click the second drop-down list to select the highest channel to appear in the chart. NOTE: This parameter is not configurable for graphs created by hybrid APs.
If you selected Frequency in the X-Axis parameter, enter the frequency, in MHz, that you want to appear in the center of the x-axis of this chart.

815 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter Span Color-Map Range
Show

Description
If you selected Frequency in the X-Axis parameter, specify the size of the range of frequencies around the selected center frequency. If you set a frequency span of 100 MHz, for example, the chart shows the swept spectrogram for a range of frequencies from 50MHz lower to 50 MHz higher than the selected center.
If this chart is configured to show average or maximum FFT values, the default color range on this chart represents values from -50dBm (red) to -90dBm (blue). If you would like the color range on this chart to represent a different range of FFT power levels, enter this range in the from and to entry blanks.
For example, if you defined a color-map range from -60 to -80, then any FFT power level at or above -60 dBm appears as red, and any FFT power level at or below -80 appears blue. Only the channel or frequency qualities between -60 dBm and -80 dBm would be represented by gradiented colors within the color range.
If this chart is configured to show the FFT duty cycle, the default color range on this chart represents duty cycles from 0% (red) to 100% (blue). If you would like the color range on this chart to represent a different range of FFT duty cycle percentages, enter this range in the from and to entry blanks.
For example, if you defined a color-map range from 25 to 75, then any FFT duty cycle at or below 25% appears as red, and any FFT duty cycle at or below 75% appears blue. Only the duty cycle levels between 25% and 75% would be represented by gradiented colors within the color range. NOTE: If your swept spectrogram is showing a single color only, you may need to increase the color map range to display a greater range of values.
Select FFT Avg, FFT Max or FFT Duty Cycle to select the type of data you want to appear in this chart.

Working with Non-Wi-Fi Interferers
The following table describes each type of non-Wi-Fi interferer detected by the spectrum analysis feature. These devices appear in the following charts:
l Active Devices l Active Devices Table l Active Devices Trend l Device Duty Cycle l Device vs Channel l Interference Power

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 816

Table 168: Non-Wi-Fi Interferer Types

Non-Wi-Fi Interferer

Description

Bluetooth

Any device that uses the Bluetooth protocol to communicate in the 2.4 GHz band is classified as a Bluetooth device. Bluetooth uses a frequency hopping protocol.

Fixed Frequency (Audio)

Some audio devices such as wireless speakers and microphones also use fixed frequency to continuously transmit audio. These devices are classified as Fixed Frequency (Audio).

Fixed Frequency (Cordless Phones)

Some cordless phones use a fixed frequency to transmit data (much like the fixed frequency video devices). These devices are classified as Fixed Frequency (Cordless Phones).

Fixed Frequency (Video)

Video transmitters that continuously transmit video on a single frequency are classified as Fixed Frequency (Video). These devices typically have close to a 100% duty cycle. These types of devices may be used for video surveillance, TV or other video distribution, and similar applications.

Fixed Frequency (Other)

All other fixed frequency devices that do not fall into one of the above categories are classified as Fixed Frequency (Other). Note that the RF signatures of the fixed frequency audio, video and cordless phone devices are very similar, and that some of these devices may be occasionally classified as Fixed Frequency (Other).

Frequency Hopper (Cordless Base)

Frequency hopping cordless phone base units transmit periodic beacon-like frames at all times. When the handsets are not transmitting (i.e., no active phone calls), the cordless base is classified as Frequency Hopper (Cordless Base).

Frequency Hopper (Cordless Network)

When there is an active phone call and one or more handsets are part of the phone conversation, the device is classified as Frequency Hopper (Cordless Network). Cordless phones may operate in 2.4 GHz or 5 GHz bands. Some phones use both 2.4 GHz and 5 GHz bands (for example, 5 GHz for Base-to-handset and 2.4 GHz for Handset-to-base). These phones may be classified as unique Frequency Hopper devices on both bands.

Frequency Hopper (Xbox)

The Microsoft Xbox device uses a frequency hopping protocol in the 2.4 GHz band. These devices are classified as Frequency Hopper (Xbox).

Frequency Hopper (Other)

When the classifier detects a frequency hopper that does not fall into one of the above categories, it is classified as Frequency Hopper (Other). Some examples include IEEE 802.11 FHSS devices, game consoles, and cordless/hands-free devices that do not use one of the known cordless phone protocols.

817 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Non-Wi-Fi Interferer Microwave
Microwave (Inverter)
Generic Interferer

Description
Common residential microwave ovens with a single magnetron are classified as a Microwave. These types of microwave ovens may be used in cafeterias, break rooms, dormitories and similar environments. Some industrial, healthcare or manufacturing environments may also have other equipment that behave like a microwave and may also be classified as a Microwave device.
Some newer-model microwave ovens have inverter technology to control the power output and may have a duty cycle close to 100%. These microwave ovens are classified as Microwave (Inverter). Dual-magnetron industrial microwave ovens with higher duty cycle may also be classified as Microwave (Inverter). As in the Microwave category described above, there may be other equipment that behave like inverter microwaves in some industrial, healthcare or manufacturing environments. Those devices may also be classified as Microwave (Inverter).
Any non-frequency hopping device that does not fall into one of the other categories described in this table is classified as a Generic Interferer. For example, a Microwave-like device that does not operate in the known operating frequencies used by the Microwave ovens may be classified as a Generic Interferer. Similarly, wide-band interfering devices may be classified as Generic Interferers.

Understanding the Spectrum Analysis Session Log
The spectrum analysis Session Log tab displays times the spectrum monitors and hybrid APs connected to or disconnected from the spectrum client during the current browser session. This tab also shows changes in a hybrid AP's scanning channel caused by changes to the hybrid AP's 802.11a or 802.11g radio profile or automatic channel changes by the DFS or ARM features. The latest entry in the session log is also displayed in a footer at the bottom of the Spectrum Monitors and Spectrum Dashboard window. When you close the browser and end your spectrum analysis session, the session log is cleared.
The example in Figure 135 shows that a 2.4 GHz radio on hybrid AP was connected to the spectrum analysis client, its channel changed twice, then was disconnected from the spectrum client.
Figure 135 Spectrum Analysis Session Logs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 818

Viewing Spectrum Analysis Data
You can use the command-line interface to view spectrum analysis data from any spectrum monitor, even if that spectrum monitor is currently sending data to another spectrum monitor client's WebUI.
Table 169 shows the commands that display spectrum analysis data in the CLI interface.

Table 169: Spectrum Analysis CLI Commands

Command

Description

show ap spectrum ap-list

Shows spectrum data seen by an access point that has been converted to a spectrum monitor.

show ap spectrum channel-metrics

Shows channel utilization information for a 802.11a or 802.11g radio band, as seen by a spectrum monitor

show ap spectrum channel-summary

Displays a summary of the 802.11a or 802.11g channels seen by a spectrum monitor.

show ap spectrum client-list

Shows details for Wi-Fi clients seen by a specified spectrum monitor.

show ap spectrum debug

Sub-commands under this command save spectrum analysis channel information to a file on the controller.

show ap spectrum device-duty-cycle

Shows the current duty cycle for devices on all channels being monitored by the spectrum monitor radio.

show ap spectrum device-history

Displays spectrum analysis history for non-interfering devices.

show ap spectrum device-list

Shows summary table and channel information for non-WiFi devices currently seen by the spectrum monitor.

show ap spectrum device-log

Shows a time log of add and delete events for non-Wi-Fi devices.

show ap spectrum device-summary

Shows the numbers of Wi-Fi and non-Wi-Fi device types on each channel monitored by a spectrum monitor.

show ap spectrum interference-power Shows the interference power detected by a 802.11a or 80211g radio on a spectrum monitor.

show ap spectrum monitors

Shows a list of APs currently configured as spectrum monitors.

show ap spectrum technical-support

Saves spectrum data for later analysis by your Dell technical support representative.

819 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Recording Spectrum Analysis Data
The spectrum analysis tool allows you to record up to 60 continuous minutes (or up to 10 Mb) of spectrum analysis data. By default, each spectrum analysis recording displays data for the Real-Time FFT, FFT Duty Cycle, Interference Power and Swept Spectrogram charts, however, you can view recorded device data for any the spectrum analysis charts supported by that spectrum monitor radio. Configurable recording settings allow you to start a recording session immediately, or schedule a recording to begin at a later date and time. Each recording can be scheduled to end after a selected amount of time has passed, or continue on until the recorded data file reaches a specified size. You can save the file to your spectrum monitor client, then play back that data at a later time.
Creating a Spectrum Analysis Record
To record spectrum analysis data for later analysis:
1. Navigate to the Monitoring > Spectrum Analysis > Spectrum Dashboards window. 2. Click Record at the top of the window. The New Recording popup window appears. 3. Click the Record From link, and select the spectrum monitor whose data you want to record. 4. Next, decide whether you want the recording to start immediately, or at a later scheduled time. If you want
the recording to start immediately, select When the OK button is clicked. To schedule a different starting time for the recording, click the date and time drop-down lists to select a starting month, day, year and time. 5. The recording continues until either the specified amount of time has passed, or until the recording files reaches a selected size. Click the Length of recording reaches drop down list and select the amount of time the recording should last, or click the Data file reaches drop down list and select the maximum file size for the recording. 6. Click OK to save your settings. If you selected the When the OK button is clicked in step 5, the recording begins.
Figure 136 Recording Spectrum Analysis Data

While the recording is in progress, a round, red recording icon and recording status information appears at the top of the spectrum dashboard. You can view data for other spectrum monitors and charts while the recording is in progress. If you want to stop the recording before recording period has finished, click Stop by the recording status information. When you the Stop, a popup window appears and allows you to stop and delete the current recording, stop and save the recording in its current state (before it has completed), or continue recording again.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 820

Saving the Recording
After the recording has ended, either because the recording period has elapsed, the recording maximum file size has been reached, the Spectrum Monitor Recording Complete window appears and displays information for the current recording.
Figure 137 Saving Spectrum Analysis Data

To save the recording file:
1. From the Spectrum Monitor Recording Complete window, click Continue. 2. A Save As window appears and prompts you to select a file name for the recording and a location to save
the file. 3. Click Save.
Playing a Spectrum Analysis Recording
There are two ways to play back a spectrum recording. You can use the playback feature in the spectrum dashboard, or view recordings using the Dell Networking W-RFPlayback tool downloaded from the Dell website.
Playing a Recording in the Spectrum Dashboard
The spectrum monitor does not have to be subscribed to your spectrum analysis client in order to play back a recording in the spectrum dashboard. However, you cannot play back an existing recording in the spectrum dashboard while another recording session is currently in progress.
To play a spectrum analysis recording in the spectrum dashboard:
1. Navigate to Monitoring > Spectrum Analysis > Spectrum Dashboards window. 2. Click the Recording View/Play link at the top of the window. 3. Click Load File For Playback. 4. An Open dialog box appears and prompts you to browse to and select the file you want to open. 5. Click Open. 6. Click the triangular play icon at the top of the window to start playing back the recording.
Recorded data for the selected spectrum monitor and dashboard view appears in the spectrum analysis dashboard. You can replace any of the graphs in the playback window with a different graph type while replaying the recording. A playback progress bar at the top of the window shows what part of the recording currently appears on the dashboard. If you pause the recording, you can click and drag the red slider on this progress bar to advance to or replay any part of the current record.

821 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Playing a Recording Using the RFPlayback Tool
The Dell Networking W-RFPlayback tool can play spectrum recordings created in this and earlier versions of ArubaOS. Dell uses the Adobe AIR application to display spectrum recording information. If you have not done so already, follow the steps below to download and install the free Adobe AIR application and the Dell spectrum playback tool.
1. Download the Adobe Air application from get.adobe.com/air/ and install it on the client on which you want to play spectrum recordings.
2. Next, download the spectrum playback installation file from the Dell website. 3. Open the folder containing the spectrum installation file, and double-click the spectrum.air icon to install
the spectrum playback tool. You will be prompted to select the folder in which you want to install this tool.
Once you have installed the Dell Networking W-RFPlayback tool, follow the steps below to load and view a spectrum recording.
1. Start the Spectrum playback application. 2. Click Load File for Playback. An Open dialog box appears and prompts you to browse to and select the
file you want to open. 3. Click the triangular play icon at the top of the window play the recording.
The RFPlayback tool also allows you to select and display different graph types while the recording playback is in progress. A playback progress bar at the top of the window shows what part of the recording is displayed in the playback tool. If you pause the recording, you can click and drag the red slider on this progress bar to advance to or replay any part of the current record.
Figure 138 Playing a Recording with the Spectrum Playback Tool

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 822

Troubleshooting Spectrum Analysis
Verifying Spectrum Monitors Support for One Client per Radio
Each spectrum monitor radio can only send information to one client at a time. If you log into a controller and the spectrum monitor dashboard does not display any data for the selected radio, another user may be logged in to the controller at that time. Note that dual-radio spectrum monitors may be accessed by two clients; one client for each radio.
Converting a Spectrum Monitor Back to an AP or Air Monitor
If want to convert a spectrum monitor radio back to AP or AM mode but the radio still comes up as a spectrum monitor, access the command-line interface and see if that spectrum monitor appears in the output of the show ap spectrum local-override command. If the spectrum monitor does appear in the local override profile table, issue the command ap spectrum local-override no override ap-name <apame> spectrumband <spectrum-band> to remove the local override for that spectrum monitor and return the radio to AP or AM mode.
Troubleshooting Browser Issues
If you access the spectrum analysis dashboard using the Safari 5.0 browser, clicking the backspace button may return you to the previous browser screen. Avoid using the backspace button when changing dashboard view names or chart options.
If you are recording spectrum analysis data or playing back a spectrum analysis recording using a Mac client, do not minimize the browser window while the recording is in progress, as that may cause the Adobe Flash player to pause.
Loading a Spectrum View
Saved spectrum view preferences may not be backwards compatible with the spectrum analysis dashboard in earlier versions of ArubaOS. If you downgrade to an earlier version of ArubaOS and your client is unable to load a saved spectrum view in the spectrum dashboard, access the CLI in enable mode and issue the command ap spectrum clear-webui-view-settings to delete the saved spectrum views and display default view settings in the spectrum dashboard.
Troubleshooting Issues with Adobe Flash Player 10.1 or Later
Removing focus from the browser window displaying the spectrum analysis dashboard may cause Adobe Flash 10.1 or later to stop updating the spectrum charts to reduce CPU usage. When you restore focus to the spectrum analysis dashboard, you may see the spectrum charts update rapidly as the display catches up. Recorded data may be inaccurate if you navigate away from the spectrum window during a recording. Flash 10.0 does not have this issue.
Understanding Spectrum Analysis Syslog Messages
The spectrum analysis feature can send four different types of syslog messages: wifi add, wifi delete, non-wifi add, and non-wifi delete. All messages are in the wireless category at the syslog severity level NOTICE.
The four syslog message types appear in the following formats:
l AM: Spectrum: new wifi device found = [addr:%s] SSID = [ssid:%s] BSSID [bssid_str:%s] DEVICE ID [did:%d] l AM: Spectrum: deleting wifi device = [addr:%s] SSID = [ssid:%s] BSSID [bssid_str:%s] DEVICE ID [did:%d] l AM: Spectrum: new non-wifi device found = DEVICE ID [did:%u] Type [dytpe:%s] Signal [sig:%u] Freq
[freq:%u]KHz Bandwidth [bw:%u]KHz l AM: Spectrum: deleting non-wifi device = DEVICE ID [did:%d] Type [dtype:%s]

823 | Spectrum Analysis

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Playing a Recording in the RFPlayback Tool
The Dell Networking W-RFPlayback tool is periodically updated to support improvements to the ArubaOS Spectrum Analysis feature. The RFPlayback tool can play spectrum recordings created in the same version of ArubaOS or earlier releases. If the RFPlayback tool cannot load a newer recording, you may need to download a more recent version of the tool from the Dell website.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Spectrum Analysis | 824

Chapter 34 Dashboard Monitoring
The ArubaOS dashboard monitoring functionality provides an enhanced visibility into your wireless network performance and usage within a controller. This allows you to easily locate and diagnose WLAN issues in the controller. The dashboard monitoring is available in the WebUI. To monitor and troubleshoot RF issues in the WLAN, click the Dashboard tab. The following pages in the Dashboard page allows you to view various performance and usage information: l WAN l Performance l Usage l Potential Issues l AppRF l AirGroup l Security l UCC l Controller l WLANs l Access Points l Clients Additionally, you can view the context sensitive help for each field in the Dashboard UI by clicking the help link at the top-right corner of the UI. The field for which the help has been defined appears as green. You can turn off the help by clicking Done. You can use the Search functionality to find the matched results for clients, APs, and WLANs. Click the count on the search results of clients, APs, and WLANs to navigate the related summary page with the filters applied.
WAN
The WAN page displays the Wide Area Network (WAN) summary details for VLANs.
The WAN page is available only in branch controllers.
displays a snapshot of the WAN summary dashboard:

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Dashboard Monitoring | 825

Figure 139 WAN Summary Dashboard

The WAN summary dashboard page contains the following tables:
l Status : Displays the Link status and WAN Status for VLANs. For each VLAN, the green represents an up status and red represents a down status for the Link and WAN.
l Throughput : Displays the In and Out traffic for VLANs. The Throughput table has four tabs for different uplinks. First tab shows throughput of VLANs having high priority followed by other VLAN data based on its priority. Clicking on each tab loads In and Out traffic throughput data for that particular VLAN.
l Latency : Displays Latency data for available VLANs. Each line represents one VLAN. l Alerts : Lists the last five alerts with time stamp and description. l Usage : Displays traffic based on Application Category or Application. l Compression : Displays compression that occurred on all VLANs together.
Performance
The Performance page displays the performance details of the wireless clients and APs connected to the controller.
Clients
This section displays the total number of wireless clients connected to the controller. You can view the distribution of clients in different client health ranges, SNR ranges, associated data rate ranges, and data transfer speed ranges using the histograms and distributed charts. You can click on the hyperlinked number to view the data in different screens with histograms.
An AP's client health is the efficiency at which that AP transmits downstream traffic to a particular client. This value is determined by comparing the amount of time the AP spends transmitting data to a client to the amount of time that would be required under ideal conditions, that is, at the maximum Rx rate supported by client, with no data retries.
A client health metric of 100% means the actual airtime the AP spends transmitting data is equal to the ideal amount of time required to send data to the client. A client health metric of 50% means the AP is taking twice as long as is ideal, or is sending one extra transmission to that client for every packet. A metric of 25% means the AP is taking four times longer than the ideal transmission time, or sending 3 extra transmissions to that client for every packet.
To understand histogram information, see Using Dashboard Histograms on page 827.

826 | Dashboard Monitoring

Dell Networking W-Series ArubaOS 6.4.x | User Guide

APs
This section displays the following performance details of the APs on the controller:
l Overall goodput l Frame rate distribution of the APs l Channel quality l To client or from client frame rates l Percentage of frames dropped
You can click the hyperlinked text and histograms to view the AP specific performance information as a trend chart. Additionally, you can view the distribution of the APs in different noise floor ranges, channel utilization ranges, and non-Wi-Fi interference ranges using the histograms. To understand histogram information, see Using Dashboard Histograms on page 827.
Using Dashboard Histograms
Dashboard histograms are a visual representation of the distribution of the wireless clients, access points, and radios across different performance parameters in the controller. Histograms help you to quickly identify any performance issues in the network from the color of the distribution. For example, critical ranges of the distribution are highlighted in red and normal ranges are highlighted in green.
You can view the number of clients or APs falling in each range of the distribution with a hyperlink. You can also perform the following tasks on the histograms to get additional information on the clients and APs in the distribution:
l View Client or AP details--Click the hyperlinked number to view the details of the clients or APs in a popup window.
l Sort--Click a column header of the clients or APs table to sort the complete list based on the entries on the active column. You can also use the sort icon that appears when you click on a column for sorting.
l Filter--Click the filter icon and select the filter criterion on any column to filter the entries. l Close pop-up window--Click on the close icon to close the client or AP details pop-up window.
Usage
The Usage page displays the usage summary of the following on the controller:
l Clients & APs: The active wireless clients, status of APs, and its usage. l Top APs: The list of APs with the number of clients on the controller. The list of APs is in the descending
order based on the number of clients associated with an AP. You can filter the APs for the 2.4 GHz and 5 GHz radio band options. l Radios: The radios and clients connected to an AP, usage, and frame types transmitted and received by the radio. l Devices: The pie chart of the clients based on the device type. Clicking on the pie chart segment opens the client details page filtered on the device type. l AirGroup: All the AirGroup services available and number of servers offering the service. It is aggregated by the total number of AirGroup servers sorted by the services they advertise. For more information, see Controller Dashboard Monitoring on page 1054. l Overall Usage: The total number of clients and APs that have the low usage and throughput data in the last 15 minutes.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Dashboard Monitoring | 827

l Usage by WLANs: The total number of clients per WLAN and throughput data in the last 15 minutes. You can view only three WLANs in a graph and the remaining WLANs are displayed in other graph. Click the graph to view the blown up chart and information on the Clients page.
l Apps by Usage: The charts with the list of application based on the usage. You can click on the specific chart to view the application details in the Firewall Application page.
l Apps by Sessions: The list of top five applications with the session information in descending order. l Call Quality vs. Client Health: This is a new graph added in ArubaOS 6.4. This graph displays the co-
relation between the VoIP call quality and the VoIP client health of every Unified Communication and Collaboration (UCC) call. For more information, see UCC Dashboard in the WebUI on page 993. l Top Sessions: The top five sessions by user with usage details. l Collaboration Apps: The list of applications with sessions and usage details.
You can click the hyperlinked text in the sections above to view the lists and trend chart in the last 15 minutes and summary of the APs and clients in the new windows. For more information on the columns, you can view the context sensitive help for each field in the Dashboard UI by clicking the help link at the top right corner of the UI.
Potential Issues
The Potential Issues page displays the total number of radios and wireless clients that may have potential issues in the network. You can click on the total number to view the trend of the clients and radios with potential issues in the last 15 minutes. You can also view the number of clients or radios that have a specific potential issue in each radio band.
The potential issues that a client may have are:
l Low SNR: clients that have signal to noise ratio of 30 dBm or lower. l Low speed: clients that have a connection speed of 36 Mbps or lower. l Low goodput: clients that have an average data rate of 24 Mbps or lower.
The potential issues that a radio may have are:
l High noise floor: radios that have a noise floor of -85 dB or greater. l Busy channel: radios that have a channel utilization of 80% or greater. l High non-Wi-Fi interference: radios that have a non-Wi-Fi interference of 20% or greater. l Low goodput: radios that have an average data rate of 24 Mbps or lower. l High client association: radios that have 15 or more clients connected.
You can click on the hyperlinked number to view the details of the respective clients or radios in the bottom pane of the page. You can perform the following tasks on the details table:
l Sort: click a column header of the table to sort the complete list based on the entries on the active column. You can also use the sort icon that appears when you click on a column for sorting.
l View or hide columns: click the drop-down menu on the top right corner of the table header and select Custom Columns; choose the Edit Current View option to select the columns that you want to view.
AppRF
AppRF is an application visibility and control feature and was introduced in ArubaOS 6.4.2. AppRF performs deep packet inspection (DPI) of local traffic and detects over 1500 applications on the network. AppRF allows you to configure both application and application category policies within a given user role.

828 | Dashboard Monitoring

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The AppRF dashboard application visibility feature is supported only in W-7000 Series and W-7200 Series controllers, and requires the PEF-NG license.
Since many applications are moving to the web and because the content in the web is so dynamic, ArubaOS introduces web content control through the Web Content Classification (WebCC) feature. WebCC uses a cloudbased service to dynamically determine the types of websites being visited, and their safety. In the WebUI, the AppRF dashboard contains the following two pages as shown in Figure 140: l All Traffic--The All Traffic page displays the summary of all traffic in the controller. This is the default page.
For more details, see All Traffic on page 829. l Web Content--The Web Content page link include the percentage of all traffic in parenthesis. The Web
Content page displays the summary of only the web traffic in the controller. For more details, see Web Content Classification on page 837.
Figure 140 All Traffic and Web Content Page Options

All Traffic
The All Traffic page on the Dashboard > AppRF page displays the PEF summary of all the sessions in the controller aggregated by users, devices, destinations, applications, WLANs, and roles.The applications, application categories, and other containers are represented in box charts instead of pie charts.
Enable DPI to enhance the benefit of the existing visualization or dashboard, To enable DPI, see the Enabling Deep Packet Inspection (DPI) section.
To view the AppRF dashboard in the WebUI:
1. Navigate to the Dashboard > AppRF page. 2. Click on the link To enable this feature, click here to enable firewall visibility. To disable, click the
Disable Firewall Visibility link at the bottom the page.
You will see a screen similar to the following figure.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Dashboard Monitoring | 829

Figure 141 AppRF- All Traffic Page

Action Bar
The Action bar displays the total traffic depending on the filters applied, allows the user to configure per Application, per Role, and Global Policy, and includes Action buttons namely, Block/Unblock, Throttle, and QoS. Figure 142 Action Bar
Filters
You can click on any rectangle tile in a container and that filter is applied across all the containers. For example: If you click on the Web rectangle in the Application Categories container, Application Categories == Web filter is applied to all other containers (Roles, WLANs, Application, Destination and Devices). See the following figure. Figure 143 Single Filter Applied

You can apply multiple filters from different containers by clicking on muliple rectangle tiles in various containers.

830 | Dashboard Monitoring

Dell Networking W-Series ArubaOS 6.4.x | User Guide

For example: If you click on the Web rectangle in the Application Categories container and the https rectangle under Application, the remaining containers (Roles, WLANs, Destination and Devices) will be filtered on Application categories == web and Application == https. See the following figure.
Figure 144 Multiple Filters Applied

The action bar reflects the total traffic based on the filter applied. For example, see Figure 145 and Figure 146. Figure 145 Total traffic with Web Filter
Figure 146 Total traffic with Web and https Filter
The action buttons are disabled if the applied filter contains anything apart from Role and Application or Role and Application category. To remove filters, click on Remove filter in the container that filter is removed across all the containers.
Details
Clicking on Details navigates you to the corresponding details page with data filtered by all selected rectangle when a filter is applied, The Details link changes to User filtered by <filter> in that container. See Figure 147 and Figure 148

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Dashboard Monitoring | 831

Figure 147 Details Figure 148 User filtered by <filter> Clicking on Details or User filtered by <filter> shows the user table, See Figure 149 and Figure 150.

832 | Dashboard Monitoring

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 149 Details View Figure 150 User filtered by <filter>- Details View

Block/Unblock, Throttle, and QoS Action Buttons
The pop-up window that is displayed for block/unblock, throttle, or QoS depends on the filters applied..
Upon clicking OK, the corresponding CLI commands are executed and the pop-up window closes retaining the filters in the AppRF main page. When filters are not applied, all the pop-up windows allow the user to configure global or per ­role configuration.
The following table shows the pop-up window with respect to the Action button and the filter applied:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Dashboard Monitoring | 833

Table 170: Pop-up Window with Respect to the Action Button and the Filter Applied

Action Button Block/Throttle/QoS Block Block Block Block Block Throttle Throttle Throttle Throttle Throttle QoS QoS

Filter Non-application/role ex: WLANS No Filters Application Application Category Application and Role Application category and Role No Application Application Category Application and Role Application category and Role Application Application Category

Config Level No pop-up Global and per role Global Global Global and per role Global and per role Global and per role Global Global Global and per role Global and per role Global Global

Block/Unblock This button allows you to permit/deny an application or an application category for a given role. You can create global and per-role rules. For example, you can block the YouTube application,which belongs to the Streaming application category for the guest role within the enterprise. Applying a New Rule Using AppRF 1. Click on Block/Unblock on the Action bar.
The Block/Unblock button changes to the Block button if a filter is applied. The pop-up window appears based on the filters applied is shown in Table 170. Click on Show policy tables. Block allows only permit action and priority setting.
2. To create a new Global rule: a. Click on the Global Policy tab, the following pop-up window appears:

834 | Dashboard Monitoring

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 151 Global Policy Tab

b. Click on New. The following pop-up window appears: Figure 152 New Rule Pop-up Window

c. Select an Application category, Application, Action, and Priority. 3. To create a new per-role rule:
a. Click on the Per-role policies tab, the following pop-up window appears:
Figure 153 Per-role Policies Tab

b. Select a role from the list, or click on New below the role pane to create a new role and select the newly created role.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Dashboard Monitoring | 835

c. Select a policy from the list, or click on New below they policy pane to create a new policy and select the newly created policy.
d. Select an Application category, Application, Action, and Priority from the New Rule pop-up window, as shown in Figure 152
4. Click on OK. Throttle This button allows you to limit the bandwidth usage of an application or an application category on a given role. So, you can set the upstream limit and downstream limit for an application or an application category on a given role. For example, you can rate limit applications video streaming applications like YouTube, Netflix. You can also view the bandwidth contract table and create a new bandwidth contract.See the following figure. Figure 154 Throttle Application and New Bandwidth Contract
QoS This button allows you to set the priority for a given application or an application category on a given role. For example, you can set the video/voice sessions originating from wireless users with a different priority to that of other web applications so that traffic would be prioritized accordingly in the your network.

836 | Dashboard Monitoring

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 155 QoS for Application Category Streaming

Web Content Classification
Many applications are moving to the web and web being so dynamic in nature, ArubaOS 6.4.2.0 introduces web content control through the Web Content Classification (WebCC) feature. WebCC uses a cloud-based service to dynamically determine the types of websites being visited, and their safety.
This feature is available for all customers with a PEF license to use during an early preview period. Eventually, Dell intends to license this feature as an annual subscription. License enforcement timeline and pricing information will be made available once the SKUs and prices are finalized.
The implementation of WebCC feature can be viewed on this new web page.
When the WebCC feature is enabled, all web traffic (http and https) is classified. The classification is done in data path as the traffic flows through the controller and updates dynamically. Dell has partnered with Webroot®, and uses the Webroot's URL database and the cloud look-up service to classify the web traffic. Dell uses Webroot classified categories and score for web categories and reputation for WebCC.
The current policy enforcement model in Dell relies on L3/L4 information of the packet or L7 information with Deep Packet Inspection (DPI) support to apply rules. WebCC complements this as the user is allowed to apply firewall policies based on web content category and reputation.
Benefits of WebCC:
1. Prevention of malicious malware, spyware, or adware by blocking known dangerous websites 2. Visibility into web content category-level 3. Visibility into web sites accessed by the user
To view the web content page from the WebUI, navigate to Dashboard > AppRF . Click on Web Content tab. The following figure shows the Web Content page.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Dashboard Monitoring | 837

Figure 156 Web Contents Page

The web content page includes the following containers: l Web Categories: This chart shows traffic for web categories in tree chart presentation. All boxes in this
chart is click-able. Clicking on a box filters rest of page data with the clicked web category as filter, and this chart is locked until the filter is removed by clicking on Remove filter on <web category>. For example, see the following figure. Figure 157 Filter by Web Category
l Roles: This chart shows the for Roles using the web traffic in tree chart presentation. All role boxes are In this chart is click-able. Clicking on box filters rest of page data with the clicked Role as filter, and this chart is locked until the filter is removed by clicking on Remove filter on <role name>. For example, see the following figure.

838 | Dashboard Monitoring

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 158 Filter by Role

l All traffic by Reputation: The reputation traffic light chart shows the percentage of traffic based on reputation or score of web traffic in the controller. The reputation levels are Trustworthy, Low-Risk, Moderate-Risk, Suspicious, and High-Risk. If there is no traffic on a specific reputation, then the corresponding reputation does not appear in the chart. The circles in this chart are click-able. Clicking on circle filters rest of page data with the selected reputation as filter and this chart is locked until the filter is removed by clicking on Remove filter on <reputation>. For example, see the following figure.
Figure 159 Filter by Reputation
l Category Views: A drop-down at the extreme right of reputation traffic lights allows selecting the category view. The view options are Top 9 and Top 6. Top 9 is the default view and displays predefined set of categories that need to be listed in categories by reputation chart. This also list the top 6 or top 9 categories based on traffic usage. The list updates automatically when filters are applied. The following figure shows an for Top 9 category view with reputation chart.
Figure 160 Category View- Top 9

l Details Table: Click on the web category link above the Category view chart to display the details table as shown in the following figure.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Dashboard Monitoring | 839

Figure 161 Category Views and Details

The details table of the selected web category includes the following four columns: n Website: Lists the website n Risk: Reputation score of the website with image presentation n Traffic: Traffic of the website in total traffic of the selected category n User: The number of users using that website l User Table: Click on the number in the User column in the details table as shown in the following figure:
Figure 162 User Table

The user table includes the following columns: n User: Lists the users of the website n Traffic: Traffic of the user on the website

840 | Dashboard Monitoring

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Web Content Filters
Web content tree chart filter behaves in the same way described in Filters on page 830. Filters can be applied to Web Categories, Roles, and Reputation containers. Following are the properties of container filters: l Clicking on any box in the tree chart or reputation traffic light chart will update whole page with the selected
box as filter. l On clicking, the tree chart will freeze that chart and update rest of the page. l Filter will be applied only to non-freeze chart. l Reputation chart color won't change upon selection. The following figure shows an example with multiple filters: Figure 163 Multiple Filters
WebCC Configuration in the WebUI
Configurations of policies from web content dashboard can be done with the help of the following Block/Unblock, Throttle, and QoS Action Buttons. These buttons behave the same way as described in Block/Unblock, Throttle, and QoS Action Buttons. Block / Unblock To permit or deny a rule for global policy or per-role policies for a web category, role, or reputation. To apply a policy, click on a on a web category, role, reputation, or a combination of these three container and click block. Click OK. For example, the following two figures show applying a policy on web category filter and on Role + Category + Reputation filter:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Dashboard Monitoring | 841

Figure 164 Policy on Web Category Filter Figure 165 Policy on Web Category + Reputation + Role Filter

Throttle
To apply bandwidth contract for a web category, role, or reputation. For example, the following figure shows the throttle applied to a category filter:

842 | Dashboard Monitoring

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 166 Throttle on Category Filter

When multiple bandwidth contracts exist, the precedence is as follows: l WebCC Global bandwidth contract l Application bandwidth exception List l Application Category bandwidth exception List l App bandwidth contract l Application Category bandwidth contract l Web category bandwidth contract l Web reputation bandwidth contract l User bandwidth contract
QoS To set the priority of the web category and reputation. For example, the following figure shows QoS on category and reputation filter:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Dashboard Monitoring | 843

Figure 167 QoS on Web Category + Reputation Filter

Additionally rules can be added in any of the following combination: l Rules for Web category only l Rules for Reputation only l Rules for Web Category and Web Reputation combination
WebCC Configuration in the CLI
Enabling WebCC Use the following command to enable WebCC using the CLI: (host) (config) #firewall web-cc Use the following command to configure WebCC per-role using the CLI: (host) (config-role) #web-cc
New policy configuration The new CLI extends the existing policy configuration to take web category or reputation or both. Use the following command to configure a new policy to create ACL rule with web category and reputation: (host) (config-sess-acl) #source destination proto-port/service/app/app-group <name> webcccategory <ctgry> webcc-reputation <score> action [log | mirror | time-range] The following actions are supported when web category/reputation is selected: l Deny l Permit l Blacklist l Classify-media l Disable-scanning l Dot1q-priority l Log l Mirror l Queue

844 | Dashboard Monitoring

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l Time-range l TOS
Example for WebCC policy configuration is as follows:
ip access-list session url-filter any any web-cc-category educational-institutions permit any any web-cc-reputation suspicious deny any any any deny Assuming that webcc categorization was done only for http traffic running on TCP 80, the above ACL is converted as follows in datapath for pre-classification ACL scan:
ip access-list session url-filter any any tcp {80} permit any any tcp {80} deny any any any deny Post-classification, ACL look-up will have the ACL as follows:
ip access-list session url-filter any any tcp {80} WebCCCtgID 40 WebCCRep 1-100 permit any any tcp {80} WebCCRep 1-100 deny any any any deny
In case there exists an ACL rule to deny/permit a specific web category but is required to make an exception to allow/deny a specific URL or website, then this can be accomplished by configuring in the following manner:
1. First define a netdestination with one or more URLs to whitelist or blacklist (config) #netdestination search (config-dest) #name www.google.com (config-dest) #name www.bing.com (config-dest) #exit
2. Apply this netdestination to an ACL (config) #ip access-list session whitelist (config-sess-whitelist)#any alias search tcp 80 permit (config-sess-whitelist)#any alias search tcp 443 permit
3. Apply this ACL to an user-role. The position of this ACL should be at the top. However, with global or rolespecific default ACLs this wouldn't be possible. (config) #user-role guest2 (config-role) #access-list session whitelist
If there a web-cc/app rule that is applicable globally across user-roles, then there is no way to override such behavior. This is a limitation.
WebCC Bandwidth Contract Configuration
With this feature, ArubaOS supports configuring WebCC category and reputation based bandwidth contract configuration/enforcement. This can be enforced globally for all user-roles, or can be enforced per user-role.
Use the following command to apply global WebCC based bandwidth contracts using the CLI:
(host) (config) #web-cc global-bandwidth-contract webcc-category/webcc-reputation <name> upstream/downstream mbits/kbits <value>
Use the following command to apply AAA bandwidth contracts using the CLI:
(host) (config) #aaa bandwidth-contract webcc mbits <value>
Use the following command to apply role-specific web-cc based bandwidth contracts using the CLI:
(host) (config) #user-role webcc (host) (config-role) #bw-contract webcc-category/webcc-reputation <name> <contract> upstream/downstream
Debugging-- The following show commands are introduced as part of this feature:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Dashboard Monitoring | 845

l show web-cc category all: Displays all WebCC categories l show web-cc reputation: Displays WebCC reputation l show web-cc stats: Displays the statistics of WebCC module in CP l show web-cc status: Display the status of Web-CC module in CP l show web-cc global-bandwidth-contract: Displays configured WebCC bandwidth contract l show datapath web-cc: Displays md5, web category, reputation, and age for each URL l show datapath web-cc counters: Displays the number of URLs in cache, Classified and Unclassified
sessions. l show datapath session web-cc: Displays Internal Flags, Pre Classification ACE Index, and Post
Classification ACE Index l show gsm debug channel web_cc_info: Lists md5, Category, and Reputation for each URL. GSM entries
are populated as and when URL cache entry is learned, and it is used for reporting the actual URLs being associated with user session entries.
The following clear command are introduced as part of this feature:
l clear web-cc cache <md5_1> <md5_2> : Clears the WebCC cache entry from both data plane and GSM. l clear web-cc stats: Clears all WebCC statistics. l clear datapath web-cc counters: Clears configuration values and statistics in the WebCC datapath
module.

AirGroup
The AirGroup page displays the information about AirGroup clients and servers. By default, these tables contain information for all active AirGroup clients and servers. You can filter the information in these tables by clicking the filter icon on any column heading and entering a string in the filter field.
The Dashboard >AirGroup page contains the following information for AirGroup Users and Servers:

Table 171: AirGroup Monitoring Information Column

AirGroup Users

Host Name

Host name of the AirGroup server

User Name

User name given to a client that completed 802.1X authentication

IP address

Device IP address

Role

Role assigned to the device's user

AP Name

Name of the AP to which the device is associated

VLAN ID

ID of the VLAN to which the device is assigned

Group(s)

Displays the Group of the AirGroup user

AirGroup Type

Displays the type of the device

846 | Dashboard Monitoring

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Column

Wired/Wireless

Type of connection between the device and the LAN

AirGroup Servers

Host Name

Host name of the AirGroup server

Service

Service(s) running on the server

IP address

AirGroup Server's IP address

MAC

AirGroup Server's MAC address

Role

Role assigned to the AirGroup server

Wired/Wireless

Type of connection between the device and the LAN

AP Name

Name of the AP to which the device is associated

VLAN ID

ID of the VLAN to which the server is assigned

Group(s)

Displays the Group of the AirGroup user

AirGroup Type

Displays the type of the device

For more information on the AirGroup feature, see AirGroup on page 1029

Security
The Security page allows you to monitor the detection and protection of wireless intrusions in your network. The two top tables--Discovered APs & Clients and Events--contain data as links. When these links are selected, they arrange, filter, and display the appropriate information in the lower table. The term events in this document refers to security threats, vulnerabilities, attacks (intrusion or Denial of Service), and other related events.
UCC
The Unified Communication and Collaboration (UCC) Dashboard Aggregated Display shows an aggregated view of the UCC calls made in the controller. The administrator can see a top level view of the call quality assessment, and further drill down into a specific view based on the analysis required.
The UCC feature requires the PEFNG license.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Dashboard Monitoring | 847

Chart View
A new UCC tab is introduced under the Dashboard tab. Navigate to the Dashboard > UCC page to view UCC dashboard. Clicking the UCC hyperlink displays the following characteristics (in graphical format) of the UCC deployment.
Figure 168 UCC Dashboard

n Call Volume ­ This graph displays the total number of calls made based on the UCC application type. For example, SIP, Lync, SCCP, H.323, NOE, SVP, VOCERA, and FaceTime.
n Call Quality ­ This graph displays the AP-to-Client call quality under the WLAN tab and the end-to-end quality including wired and wireless legs of the call under the End-to-End tab. The number of UCC calls are categorized by the following call quality: n Good n Fair n Poor n Not Available: Under WLAN tab, short duration voice calls (less than 60 seconds), video calls, and file-transfer session are categorized as Not Available. Under End-to-End tab, short duration voice calls (less than 60 seconds), video calls, file-transfer, and desktop-sharing sessions are categorized as Not Available.
When VoIP calls are prioritized using media classification, the End-to-End call quality is not available.
n Call Quality vs. Client Health - This graph displays the co-relation between the VoIP call quality and the VoIP client health of every UCC call. This graph displays the UCC score under the WLAN tab and MOS under the End-to-End tab.
When VoIP calls are prioritized using media classification, the End-to-End call quality is not available.
n Calls Per Device Type ­ This graph displays the calls made per device type. For example, Windows 7, Mac OS X, iPhone, or Android.
n Roaming ­ Roaming status of UCC clients. The status can be: n No ­ Number of calls where the client did not roam to a new AP. n Yes - Number of calls where the client has roamed to a new AP.

848 | Dashboard Monitoring

Dell Networking W-Series ArubaOS 6.4.x | User Guide

n QoS Correction ­ If the DSCP value of the Real-time Transport Protocol (RTP) packets sent by the client differs from the recommended QoS setting, the call is classified as QoS Corrected. This graph displays the number of UCC calls where the controller has corrected the DSCP QoS value for such calls. The QoS correction is categorized as: n No ­ No UCC QoS call correction. n Yes ­ DSCP QoS value corrected by the controller. n Not Available ­ WLAN short duration voice calls (less than 60 seconds), video calls, and file-transfer session are categorized as Not Available.
Details View
Navigate to the Dashboard > UCC page. To display an aggregated list of all the UCC call data metrics in the controller, click any of the following hyperlinks:
n Call Volume Details n Call Quality Details n Client Health Details n Device Details n Roaming Details n QoS Details
Figure 169 displays an aggregated list of all the UCC call data metrics in the controller.
Figure 169 Wireless Call List

VoIP calls made to/from clients outside the local controller are displayed in the External Call List pane. This pane lists all the external and wired client call CDRs. See Figure 170.
Figure 170 External Call List

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Dashboard Monitoring | 849

Controller
The Controller page displays details of the controller and its health related information, such as CPU usage, memory usage, temperature, and fan speed. This page is divided into three sections: l Info panel l Gauges panel l Ports panel
Figure 171 Controller Dashboard

Details View
Info Panel
This panel displays all the information related to the controller such as name, model, serial number, MAC address start, MAC address end, up time, system time, software, ROM, Partition details, country, the type of deployment, IP addresses, and license information.
Gauges Panel
This panel displays the various gauges like CPU, memory, temperature, and fans. CPU and memory gauges indicate the memory and CPU usage by the controller. Click the Temperature and Fans gauge to view the details.
If temperature is high, then that data will be shown in red color. Each color represents the percentage of usage where red is high, yellow is moderate, and green is low.

850 | Dashboard Monitoring

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 172 Temperature Tab

Figure 173 Fan Tab
Ports Panel
This panel displays the status of all the ports in the controller.
Controller Events
Click the events link to view the list of events and the timestamps for each event. Figure 174 Events Tab

WLANs
The WLANs page displays the WLAN details such as the number of associated APs, radios, wireless clients, and the WLAN usage in the controller. You can also view the details of the associated APs and clients as tables.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Dashboard Monitoring | 851

The following sections are available in the WLANs page:
l WLANs: The unique SSID of the WLAN, clients connected in the network, APs connected to the WLAN, Radios that are enabled on the AP, Goodput, usage, and the frames transmitted and received by the AP.
l All WLANs: The clients, usage, and device distribution information in graphs.
Click the hyperlinked text in the WLANs page to view the following menus with the summary:
l Info: The summary of the WLAN details, frames transmitted and received from and to the client, air quality, and Tx/Rx statistics.
l Clients: The summary of WLANs and clients. l Radios: The summary of APs and clients, channel, and its utilization. l Charts: The summary of WLAN details in graphs. l Firewall: The summary of users, destination, applications, devices and its roles.
You can perform the following tasks on this page:
l Sort: Click a column header of the WLAN table to sort the complete list based on the entries on the active column. You can also use the sort icon that appears when you click on a column for sorting.
l Filter: Click the filter icon and select the filter criterion on any column of the details table to filter the entries.
l Customize column view: Click the drop-down menu on the top right corner of the table header and select Custom Columns; choose the Edit Current View option to select the columns that you want to view. You can also choose one of the following system defined views that have the appropriate pre-selected columns. n Default Columns: you cannot edit this view. n To/From Client Stats: you can customize this view using the Edit Current View option.
l View WLAN trends: The trends of the clients connected in the WLAN and the WLAN usage in the last 15 minutes.
l View client summary: Click on the hyperlinked client name on the client details table to view the Client Summary page. In this page, you can view the client details summary (air quality metrics and from and to clients statistics), bandwidth of the client usage, trend of the client frame loss in the last 15 minutes, and the frame rate distribution of the client.
l View AP or radio summary: Click on the hyperlinked AP name or the radio band on the AP details table to view the Access Points page. In this page you can view the summary of the AP details such as air quality metrics, from and to clients statistics, and the number of clients associated with the AP under different SNR ranges. Additionally, you can view the details of the associated clients and WLANs.

Access Points
The Access Points page displays the details of all the radios and APs associated with the controller by selecting the specific section. You can also view the trends of the connected wireless clients and the client usage under the 2.4 Ghz and 5 Ghz radio bands in the last 15 minutes.
The Access Points page has the following three sections:
l Access Points--Displays the AP name, status, uptime, mode, and model details. l Radios--Displays the AP name, band, radio mode, goodput, usage, and the frames transmitted and
received by the AP. l All Clients--Displays the clients and usage trend in charts for the last 15 minutes.
You can click the hyperlinked text on the Access Points page to view the following menus with the summary:
l Info--Displays the summary of the AP details, frames transmitted and received from and to the client, air quality, and Tx/Rx statistics.

852 | Dashboard Monitoring

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l WLANs & Clients--Displays the summary of WLANs and clients. l Charts--Displays the summary of clients and its usage in graphs for different bands. l History--Displays the history of channel utilization, frame drops, and frame rates for every minute with
histograms for the last 15 minutes. You can perform the following tasks on this page: l Sort: Click a column header of the AP table to sort the complete list based on the entries on the active
column. You can also use the sort icon that appears when you click on a column for sorting. l Filter: Click the filter icon and select the filter criterion on any column of the details table to filter the
entries. l Customize column view: Click the drop-down menu on the top right corner of the table header and select
Custom Columns; choose the Edit Current View option to select the columns that you want to view. You can also choose one of the following system defined views that have the appropriate pre-selected columns. n Default Columns--You cannot edit this view. n Air Quality Metrics--You can customize this view using the Edit Current View option. n To/From Client Stats--You can customize this view using the Edit Current View option. l View client details: Click on the number of clients associated with the AP to view the details of the clients on the Clients page. l View AP or radio summary: Click on the hyperlinked AP name or the radio band on the AP details table to view the summary of the AP details such as air quality metrics, from and to clients statistics, and the number of clients associated with the AP under different SNR ranges. Additionally, you can view the details of the associated clients and WLANs.
Clients
The Clients page displays the details of all the wireless clients on the controller. You can also view the trends of the connected clients and the client usage under the 2.4 Ghz and 5 Ghz radio bands in the last 15 minutes. The Clients page displays the following sections: l Clients: The connectivity type, radios, client health, goodput, channel, and the frames transmitted and
received. l All Clients: The clients and its usage for 2.4 GHz and 5 GHz bands. Click the hyperlinked text on the Clients page to view the following menus with the summary: l Info: The summary of the client details, frames transmitted and received from and to the client, air quality,
and Tx/Rx statistics. l Charts: The summary of the client details in graphs. l AirGroup: A list of all the far and near end devices that are either accessible or not accessible by the specific
client.For more information, see Controller Dashboard Monitoring on page 1054. l Firewall: The summary of traffic in the clients, applications and its roles, and protocols. l UCC: This tab displays an aggregated list of UCC call data metrics of a client. For more information, see UCC
Dashboard in the WebUI on page 993.
The AirGroup and Firewall links are not available on W-600 Series controllers.
You can perform the following tasks on this page:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Dashboard Monitoring | 853

l Sort: Click a column header of the AP table to sort the complete list based on the entries on the active column. You can also use the sort icon that appears when you click on a column for sorting.
l Filter: Click the filter icon and select the filter criterion on any column of the details table to filter the entries.
l Customize column view: Click the drop-down menu on the top right corner of the table header and select Custom Columns; choose the Edit Current View option to select the columns that you want to view. You can also choose one of the following system defined views that have the appropriate pre-selected columns. n Default Columns: you cannot edit this view. n Air Quality Metrics: you can customize this view using the Edit Current View option. n To/From Client Stats: you can customize this view using the Edit Current View option.
l View client summary: Click on the hyperlinked client name on the client details table to view the Client Summary page. In this page, you can view the client details summary (air quality metrics and from or to clients statistics), bandwidth of the client usage, trend of the client frame loss in the last 15 minutes, and the frame rate distribution of the client.
l View AP details: Click on the hyperlinked AP name to view the Access Points page. l View WLAN details: Click on the hyperlinked SSID of the WLAN to view the WLANs page.
Firewall
The ArubaOS Policy Enforcement Firewall (PEF) module provides identity-based controls to enforce applicationlayer security and prioritization. With PEF, network administrators can enforce network access policies that specify who may access the network, with which mobile devices, and which areas of the network they may access. The Dell AppRF technology integrated with PEF delivers mobile application traffic visibility through a simple dashboard that shows the applications in use by user and device. It gives network administrators insights on the applications that are running on their network, and the users using them. The Firewall page on the Dashboard tab displays the PEF summary of all the sessions in the controller aggregated by users, devices, destinations, applications, WLANs, and roles. Firewall visibility is disabled on the controller by default. To enable this feature, use the following procedures:
In the WebUI
1. Navigate to the Dashboard > Firewall page. 2. Click the link on the Element View section to enable firewall visibility. To disable, click the Disable Firewall
link at the bottom of the Element View section.
In the CLI
Use the following command: (host)(config) #firewall-visibility
To disable this setting, include the no parameter: no firewall-visibility
This feature is supported in W-3000 Series, W-6000 controllers, and requires the PEFNG license. For W-7000 controllerand W-7200 Series controllers, see AppRF on page 828.
Element View
Navigate to the Dashboard > Firewall page to view Element View section. This section displays a summary of all the sessions in the controller and includes six categories of monitoring data, or elements, that display traffic statistics aggregated by the following elements:

854 | Dashboard Monitoring

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 172: Element View Element User Devices Destinations Applications
WLANs Roles

Description
Indicates a wireless or wired user associated to the controller. Traffic that is not generated by a user is aggregated as non-user traffic.
Specifies the client device type. for example: Windows 7, Mac OS X, iPhone, or Android.
Destination hostname, or IP address if the hostname is unavailable. Common advertising and file sharing services on the Internet are categorized under special destinations called ad networks and file share networks respectively.
Application name, protocols, and ports. For example:
l Web applications: YouTube, Twitter, Facebook, Gotomeeting, Webex, Amazon, Saleforce, and more.
l Stateful applications: FTP, Lync, SIP, and more. l Custom applications: using the netservice command, you can
define custom applications if the application uses well-known port numbers (0 - 1023). l Peer-to-Peer: all peer-to-peer traffic is classified under peer to peer. l Lync applications: Lync-desktop-sharing, Lync-file-transfer, Lync-voice, and Lync-video. If a session does not map to any of the above, the destination port is classified as application.
The service set identifier (SSID) that uniquely identifies the WLAN. Wired connection is shown as wired.
Determines the user's network privileges based on the assigned user role.

The Element View section has two views: Chart and Table. Click Chart or Table at the top-right corner of an element to toggle between the two views. Each chart container shows the top five sessions with respect to traffic bandwidth and the rest are shown as Others. Click Others within the chart to view the rest of the sessions in the chart. Click any entry on the chart legend to view more usage details. The figure below shows the Chart view:
Figure 175 Chart View

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Dashboard Monitoring | 855

In addition to the element, the Table view shows the common fields displayed in the table below:

Table 173: Table View Fields Column Bytes Tx Bytes Rx Bytes

Description Total number of bytes transmitted and received by an element. Total number of bytes transmitted by an element. Total number of bytes received by an element.

You can perform the following tasks in the Table view: l Sort: click a column header of the table to sort the list by column. You can also use the sort icon that
appears when you click on a column. l Filter: click the filter icon on the first column and select the filter criterion to filter the entries.
Details View
Navigate to the Dashboard > Firewall page. Click the All <element> link to view the Details View page. There are four sections on this page.
Element Tab
The Element Tab shows the available usage detail elements. Click an element to view more usage details: Figure 176 Element Tab

Element Summary View
The Element Summary View displays a detailed view of all the six elements and their corresponding fields: Figure 1a Element Summary View

856 | Dashboard Monitoring

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 1b Element Summary View (continued)

See the following table for more information on Element Summary View fields:

Table 174: Element Summary View Fields

Column

Description

User

Indicates a wireless or wired user associated to the controller. Click a User IP address to view details of the connected client.

Bytes

Total number of bytes transmitted and received by an element.

Packets Device
Destination

Total number of data packets transmitted and received by an element.
Specifies the client device type. Click the number to view details of the device type identification.
Total number of destination hostnames or IP addresses. Click the number to view details of the destination hosts.

Application WLAN Role

Total number of application name, protocols, and ports. Click the number to view details of the application ports.
The service set identifier (SSID) that uniquely identifies the WLAN. Click the number to view details of the WLAN SSID.
Determines the user's network privileges based on the assigned user role. Click the number to view details of the role.

You can perform the following tasks in the Element Summary View:
l Sort: click a column header of the table to sort the list by column. You can also use the sort icon that appears when you click on a column.
l Filter: click the filter icon on the first column and select the filter criterion to filter the entries.
Usage Breakdown
In the Usage Breakdown, section you can apply any of the filters that are listed under each element to customize the output. To apply a filter, click any row under each element. The selected row turns yellow. The filtered output is displayed in the Element Summary View and Aggregated Sessions sections of the page. Click the row again to deselect it and remove the filter. For example, if you click autodiscover.arubanetworks.com under Destination, and salesforce.com under Application, the

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Dashboard Monitoring | 857

Element Summary View and Aggregated Sessions sections display session information based on the selected rows. The following figure shows the selected row in each element:
Figure 177 Usage Breakdown

Aggregated Sessions
The Aggregated Sessions displays a list of all user and non-user sessions on the controller. Figure 2a Aggregated Sessions

858 | Dashboard Monitoring

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 2b Aggregated Sessions (continued)

See the following table for more information on Aggregated Sessions fields:

Table 175: Aggregated Sessions Fields

Column

Description

Source IP

Indicates the IP address of the wireless or wired user associated to the controller.

Destination Name/IP

Destination hostname, or IP address if the hostname is unavailable.

IP Protocol

Type of IP protocol traffic: for example, TCP or UDP.

Application

Application name, protocols, and ports.

Tx Bytes

Total number of bytes transmitted in a session.

RX Bytes

Total number of bytes received in a session.

User

Indicates a wireless or wired user associated to the controller.

Device

Specifies the client device type.

Role

Determines the user's network privileges based on the assigned user role.

WLAN

The service set identifier (SSID) that uniquely identifies the WLAN.

Destination Alias

Fully Qualified Domain Name (FQDN) or the URL of the destination network or host.

You can perform the following tasks in the Aggregated Sessions section:
l Sort: click a column header of the table to sort the list by column. You can also use the sort icon that appears when you click on a column.
l Filter: click the filter icon on the first column and select the filter criterion to filter the entries.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Dashboard Monitoring | 859

Chapter 35 Management Access

This chapter describes management access and tasks for a user-centric network and includes the following topics: l Configuring Certificate Authentication for WebUI Access on page 860 l Secure Shell (SSH) on page 861 l Enabling RADIUS Server Authentication on page 862 l Connecting to an W-AirWave Server on page 867 l Custom Certificate Support for RAP on page 869 l Implementing a Specific Management Password Policy on page 871 l Configuring AP Image Preload on page 873 l Configuring Centralized Image Upgrades l Managing Certificates on page 878 l Configuring SNMP on page 884 l Enabling Capacity Alerts on page 886 l Configuring Logging on page 887 l Enabling Guest Provisioning on page 890 l Managing Files on the Controller on page 906 l Setting the System Clock on page 909 l ClearPass Profiling with IF-MAP on page 911 l Whitelist Synchronization on page 912 l Downloadable Regulatory Table on page 913
Configuring Certificate Authentication for WebUI Access
The controller supports client certificate authentication for users accessing the controller using the WebUI. (The default is for username/password authentication.) You can use client certificate authentication only, or client certificate authentication with username/password (if certificate authentication fails, the user can log in with a configured username and password).
Each controller can support a maximum of ten management users.
To use client certificate authentication, you must do the following: 1. Obtain a client certificate and import the certificate into the controller. Obtaining and importing a client
certificate is described in Managing Certificates on page 878. 2. Configure certificate authentication for WebUI management. You can optionally also select
username/password authentication. 3. Configure a user with a management role. Specify the client certificate for authentication of the user.
In the WebUI
1. Navigate to the Configuration > Management > General page.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Management Access | 860

2. Under WebUI Management Authentication Method, select Client Certificate. You can select Username and Password as well; in this case, the user is prompted to manually enter the username and password only if the client certificate is invalid.
3. Select the server certificate to be used for this service. 4. Click Apply. 5. To configure the management user, navigate to the Configuration > Management > Administration
page. a. Under Management Users, click Add. b. Select Certificate Management. c. Select WebUI Certificate. d. Enter the username. e. Select the user role assigned to the user upon validation of the client certificate f. Enter the serial number for the client certificate. g. Select the name of the CA that issued the client certificate. h. Click Apply.
In the CLI
(host)(config) #web-server profile (host)(Web Server Configuration) #mgmt-auth certificate (host)(Web Server Configuration) #switch-cert <certificate> (host)(Web Server Configuration) #! (host)(config) #mgmt-user webui-cacert <certificate-name> serial <number> <username> <rolename>
Secure Shell (SSH)
SSH is enabled by default in ArubaOS, and thus lets you log in using a username and password. You can enable SSH login by using public key authentication while leaving username/password authentication enabled, or you may disable the username/password authentication and leave only the public key authentication enabled. In the FIPS mode of operation, SSH is pre-configured to only use Diffie-Hellman Group 14 with AES-CBC-128 and AES-CBC-256 and HMAC-SHA1/HMAC-SHA1-96. These settings are not configurable.
When you import an X.509 client certificate into the controller, the certificate is converted to SSH-RSA keys. When you enable public key authentication for SSH, the controller validates the client's credentials with the imported public keys. You can specify public key authentication only, or public key authentication with username/password (if the public key authentication fails, the user can login with a configured username and password).
Enabling Public Key Authentication
The controller allows public key authentication of users accessing the controller using SSH. (The default is for username/password authentication.)
To use public key authentication, you must do the following:
1. Import the X.509 client certificate into the controller using the WebUI, as described in Importing Certificates on page 881
2. Configure SSH for client public key authentication. You can optionally also select username/password authentication.
3. Configure the username, role and client certificate.

861 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the WebUI
1. Navigate to the Configuration > Management > General page. 2. Under SSH (Secure Shell) Authentication Method, select Client Public Key. You can optionally select
Username/Password to use both username/password and public key authentication for SSH access. 3. Click Apply. 4. To configure the user, navigate to the Configuration > Management > Administration page.
a. Under Management Users, click Add. b. Select Certificate Management. c. Select SSH Public Key.
ArubaOS recommends that the username and role for SSH be the same as for the WebUI Certificate. You can optionally use the checkbox to copy the username and role from the Web Certificate section to the SSH Public Key section.

d. Enter the username. e. Select the management role assigned to the user upon validation of the client certificate. f. Select the client certificate. g. Click Apply.
In the CLI
ssh mgmt-auth public-key [username/password] mgmt-user ssh-pubkey client-cert <certificate> <username> <role>
Enabling RADIUS Server Authentication
This section include many different types of RADIUS server configuration and related procedures.
Configuring RADIUS Server Username and Password Authentication
In this example, an external RADIUS server is used to authenticate management users. Upon authentication, users are assigned the default role root.
In the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select RADIUS Server to display the Radius Server List.
a. To configure a RADIUS server, enter the name for the server (for example, rad1) and click Add. b. Select the name to configure server parameters, such as IP address. Select the Mode checkbox to
activate the server. c. Click Apply. 3. Select Server Group to display the Server Group list. a. Enter the name of the new server group (for example, corp_rad) and click Add. b. Select the name to configure the server group. c. Under Servers, click New to add a server to the group. d. Select a server from the drop-down menu and click Add Server. e. Click Apply. 4. Navigate to the Configuration > Management > Administration page.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 862

a. Under Management Authentication Servers, select a management role (for example, root) for the Default Role.
b. Select (check) Mode. c. For Server Group, select the server group that you just configured. d. Click Apply.
In the CLI
aaa authentication-server radius rad1 host <ipaddr> enable
aaa server-group corp_rad auth-server rad1
aaa authentication mgmt default-role root enable server-group corp_rad
Configuring RADIUS Server Authentication with VSA
In this scenario, an external RADIUS server authenticates management users and returns to the controller the Dell vendor-specific attribute (VSA) called Dell-Admin-Role that contains the name of the management role for the user. The authenticated user is placed into the management role specified by the VSA. The controller configuration is identical to the Configuring RADIUS Server Username and Password Authentication on page 862. The only difference is the configuration of the VSA on the RADIUS server. Ensure that the value of the VSA returned by the RADIUS server is one of the predefined management roles. Otherwise, the user will have no access to the controller.
Configuring RADIUS Server Authentication with Server Derivation Rule
Dell controllers do not make use of any returned attributes from a TACACS+ server.
A RADIUS server can return to the controller a standard RADIUS attribute that contains one of the following values: l The name of the management role for the user l A value from which a management role can be derived For either situation, configure a server-derivation rule for the server group. In the following example, the RADIUS server returns the attribute Class to the controller. The value of the attribute can be either "root" or "network-operations" depending upon the user; the returned value is the role granted to the user.
Ensure that the value of the attribute returned by the RADIUS server is one of the predefined management roles. Otherwise, the management user will not be granted access to the controller.
In the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select RADIUS Server to display the Radius Server List.
a. To configure a RADIUS server, enter the name for the server (for example, rad1) and click Add.

863 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

b. Select the name to configure server parameters, such as IP address. Select the Mode checkbox to activate the server.
c. Click Apply. 3. Select Server Group to display the Server Group list.
a. Enter the name of the new server group (for example, corp_rad) and click Add. b. Select the name to configure the server group. c. Under Servers, click New to add a server to the group. d. Select a server from the drop-down menu and click Add Server. e. Under Server Rules, click New to add a server rule. f. For Condition, select Class from the scrolling list. Select value-of from the drop-down menu. Select Set
Role from the drop-down menu. g. Click Add. h. Click Apply. 4. Navigate to the Configuration > Management > Administration page. a. Under Management Authentication Servers, select a management role (for example, read-only) for the
Default Role. b. Select (check) Mode. c. For Server Group, select the server group that you just configured. d. Click Apply.
In the CLI
aaa authentication-server radius rad1 host <ipaddr> enable
aaa server-group corp_rad auth-server rad1 set role condition Class value-of
aaa authentication mgmt default-role read-only enable server-group corp_rad
In the following example, the RADIUS server returns the attribute Class to the controller; the value of this attribute can be "it", in which case, the user is granted the root role. If the value of the Class attribute is anything else, the user is granted the default read-only role.
Configuring a set-value server-derivation rule
In the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page. 2. Select RADIUS Server to display the Radius Server List.
a. To configure a RADIUS server, enter the name for the server (for example, rad1) and click Add. b. Select the name to configure server parameters, such as IP address. Select the Mode checkbox to
activate the server. c. Click Apply. 3. Select Server Group to display the Server Group list. a. Enter the name of the new server group (for example, corp_rad) and click Add.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 864

b. Select the name to configure the server group. c. Under Servers, click New to add a server to the group. d. Select a server from the drop-down menu and click Add Server. e. Under Server Rules, click New to add a server rule. f. For Condition, select Class from the scrolling list. Select equals from the drop-down menu. Enter it.
Select Set Role from the drop-down menu. For Value, select root from the drop-down menu. g. Click Add. h. Click Apply. 4. Navigate to the Configuration > Management > Administration page. a. Under Management Authentication Servers, select a management role (for example, read-only) for the
Default Role. b. Select (check) Mode. c. For Server Group, select the server group that you just configured. d. Click Apply.
In the CLI
aaa authentication-server radius rad1 host <ipaddr> enable
aaa server-group corp_rad auth-server rad1 set role condition Class equals it set-value root
aaa authentication mgmt default-role read-only enable server-group corp_rad
For more information about configuring server-derivation rules, see Configuring Server-Derivation Rules on page 270.
Disabling Authentication of Local Management User Accounts
You can disable authentication of management user accounts in local switches if the configured authentication server(s) (RADIUS or TACACS+) are not available.
You can disable authentication of management users based on the results returned by the authentication server. When configured, locally-defined management accounts (for example, admin) are not allowed to log in if the server(s) are reachable and the user entry is not found in the authentication server. In this situation, if the RADIUS or TACACS+ server is unreachable, meaning it does not receive a response during authentication, or fails to authenticate a user because of a timeout, local authentication is used and you can log in with a locallydefined management account.
In the WebUI
1. Navigate to the Configuration > Management > Administration page. 2. Under Management Authentication Servers, uncheck the Local Authentication Mode checkbox. 3. Click Apply.
In the CLI
mgmt-user localauth-disable

865 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Verifying the configuration
To verify if authentication of local management user accounts is enabled or disabled, use the following command:
show mgmt-user local-authentication-mode
Resetting the Admin or Enable Password
This section describes how to reset the password for the default administrator user account (admin) on the controller. Use this procedure if the administrator user account password is lost or forgotten. 1. Connect a local console to the serial port on the controller. 2. From the console, login in the controller using the username password and the password forgetme!. 3. Enter enable mode by typing in enable, followed by the password enable. 4. Enter configuration mode by typing in configure terminal. 5. To configure the administrator user account, enter mgmt-user admin root. Enter a new password for this
account. Retype the same password to confirm. 6. Exit from the configuration mode, enable mode, and user mode. This procedure also resets the enable mode password to enable. If you have defined a management user password policy, make sure that the new password conforms to this policy. For details, see Implementing a Specific Management Password Policy on page 871. Figure 178 is an example of how to reset the password. The commands in bold type are what you enter.
Figure 178 Resetting the Password
(host) User: password Password: forgetme! (host) >enable Password: enable (host) #configure terminal Enter Configuration commands, one per line. End with CNTL/Z
(host) (config) #mgmt-user admin root Password: ****** Re-Type password: ****** (host) (config) #exit (host) #exit (host) >exit
After you reset the administrator user account and password, you can login to the controller and reconfigure the enable mode password. To do this, enter configuration mode and type the enable secret command. You are prompted to enter a new password and retype it to confirm. Save the configuration by entering write memory. Figure 179 details an example reconfigure the enable mode password. Again, the command you enter displays in bold type.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 866

Figure 179 Reconfigure the enable mode password
User: admin Password: ****** (host) >enable Password: ****** (host) #configure terminal Enter Configuration commands, one per line. End with CNTL/Z
(host) (config) #enable secret Password: ****** Re-Type password: ****** (host) (config) #write memory
Bypassing the Enable Password Prompt
The bypass enable feature lets you bypass the enable password prompt and go directly to the privileged commands (config mode) after logging on to the controller. This is useful if you want to avoid changing the enable password due to company policy. Use the enable bypass CLI command to bypass the enable prompt an go directly to the privileged commands (config mode). Use the no enable bypass CLI command to restore the enable password prompt.
Setting an Administrator Session Timeout
You can configure the number of seconds after which an administrator's WebUI or CLI session times out.
In the WebUI
To define a timeout interval for a WebUI session, use the command: (host)(config) #web-server profile (host)(Web Server Configuration) #session-timeout <session-timeout> In the above command, <session-timeout> can be any number of seconds from 30 to 3600, inclusive.
In the CLI
To define a timeout interval for a CLI session, use the command: (host)(config) #loginsession timeout <value> In the above command, <val> can be any number of minutes from 5 to 60 or seconds from 1 to 3600, inclusive. You can also specify a timeout value of 0 to disable CLI session timeouts.
Connecting to an W-AirWave Server
W-AirWave is a powerful and easy-to-use network operations system that manages Dell W-Series wireless, wired and remote access networks, as well as wireless and wired infrastructures from Dell and a wide range of third-party manufacturers. Controllers running ArubaOS 6.3 and later can use the W-AirWave wizard in the Configuration > Wizards > W-AirWave section of the controller WebUI to quickly and easily connect the controller to an W-AirWave server. The following checklist lists the information you will need to use this wizard. Determine each of these values for your deployment and W-AirWave server before you start the wizard process.

867 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 176: W-AirWave Wizard Checklist

Information

Description

My Values

W-AirWave IP address

IP address of the W-AirWave server.

SNMP version

Specify if the controller and W-AirWave serer should communicate using SNMP v2 or SNMPv3. SNMPv3 communications between a controller and an W-AirWave server use SHA authentication and AES encryption.

For SNMPv2

If you select SNMPv2, you must enter an SNMP community string.

For SNMPv3

If you select SNMPv3, you must enter values for the following parameters:
l User name : A string representing the name of the SNMP user.
l Authentication password: Authentication key for use with the SHA authentication protocol.
l privacy password: Privacy key for encrypted messages.
l NTP server: If the controller is not already configured to use an NTP server, enter the IP address of an NTP server.

Syslog

Syslog messages are disabled by default. Use the Syslog section of the wizard to enable syslog messages, and define the syslog category, syslog facility levels (local0-local7) and syslog severity levels (debug-emergency) for messages from the controller. By default, W-AirWave syslog messages sent at the error severity level.
The possible syslog categories are as follows:
l ap-debug l arm-user-debug l network l security l system l user l user-debug l wireless

AMON Message Size Changes on the Controller
Data communication between Dell controllers and W-AirWave servers has shifted from the SNMP model to the faster, more reliable, and scalable AMON model. Though the SNMP model can still be used to communicate data, users generally encounter delayed W-AirWave updates and high controller and process CPU usage.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 868

The AMON packet size has been capped at a default value of 1400 bytes to reduce the amount of fragmentation and message loss that typically occurs in larger packet sizes, which can force customers to fall back to the SNMP model. Message size has been capped at 1400 bytes to allow for the addition of AMON headers and PAPI/UDP/IP headers. Each packet only contains one message to further reduce the amount of overall message loss, as the loss of even a single fragment can render an entire message invalid. The AMON packet size can be modified using the following CLI command: (host)(config) #amon msg-buffer-size <msg-buffer-size>
With the additional message load due to the smaller packet size and 1:1 message to packet ratio, output has also been increased from 10 second intervals to 1 second intervals to distribute packets more evenly, helping maintain a more stable and less congested traffic flow.
Custom Certificate Support for RAP
As Suite-B mandates using the AES-GCM encryption and ECDSA certificates for security, this feature allows you to upload custom RSA and ECDSA certificates to a RAP. This allows custom certificates to be used for IKEv2 negotiation which establishes a tunnel between the RAP and the controller. Feature support includes the ability to: l Upload a single CA certificate and RAP certificate which have either elliptical crypto key parameters with
ECDSA or RSA parameters for signing and verification. l Store the certificate in the flash of the RAP l Store CSR and private key files in a USB l Delete certificates l Generate a CSR paired with a private key generation for the RAP. The private key is stored in the flash and
the CSR can be exported out of the RAP to get it signed by the CA. If there is a custom certificate present in the flash when rebooting, this feature creates a suite B tunnel with the controller if the certificates uploaded are using EC algorithms. Otherwise it creates a tunnel using standard RAP IPSec parameters.
Suite-B Support for ECDSA Certificate
If a custom ECDSA certificate is present in the flash of a certificate-based RAP, it is automatically designated as a Suite-B RAP. On the controller side, tunnel creation uses the server certificate as a default VPN server certificate. Administering Suite-B support for a RAP includes these steps which are described in the following sections: 1. Setting the Default Server Certificate 2. Import a custom certificate 3. Generate a Certificate Signing Request (CSR) 4. Upload the certificate
Setting the Default Server Certificate
In the CLI To set the default server certificate that is presented to the RAP as the default VPN server certificate: (host) (config) #crypto-local isakmp server-certificate <server_certificate_name>
To add the CA certificate to verify the RAP certificate: (host) (config) #crypto-local isakmp ca-certificate <trusted CA>

869 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Importing a Custom Certificate Certificates can only be imported to the controller using the WebUI.
In the WebUI 1. Navigate to Configuration > Management > Certificates and upload the certificate. 2. To use imported certificates to create a tunnel, navigate to Configuration > Advanced Services >
Emulate VPN Services.
Generating a CSR
The RAP console page allows you to generate a CSR. This is done through a private key which can be generated and saved to the RAP flash. A corresponding CSR is exported so it can be signed by the required CA to use as the RAP certificate. This RAP certificate can then be uploaded using the Upload button on the RAP Console page. The subject of the RAP certificate needs to be the MAC address of the RAP, and nothing more. Note that this is case insensitive. If you create a CSR on the RAP and then have a certificate issued by a CA, you must have the certificate in PEM format before uploading it to the RAP.
Uploading the Certificate
When using the "rapconsole.dell.com" page on a bridge/split-tunnel RAP to manage certificates on the RAP, a blank page or a page that does not have the Certificates tabs on it may display. The RAP provisioning page that is standard on the RAP may conflict with the "rapconsole" page and thus confuse the browser. If this occurs, clear your browser cache first or use two different browsers.
The Upload button on the RAP console page that lets you upload the certificates to the RAP flash. The certificate needs to be in PEM format and uploading the RAP certificate requires that the corresponding private key is present in the RAP flash. Or, use the PKCS12 bundle where the chain includes the RAP private key with the RAP and CA certificates are optionally password protected.
Storing CSR and Private Key Files in a USB
To provision a RAP to store the CSR and private key in a USB, use one of the following options:
AP Boot Prompt
At the AP boot prompt, issue the setenv usb_csr 1 and setenv usb_type 100 commands.
If this option is used to provision the RAP to store the files in the USB device, after the files are saved in the USB, enter the AP boot prompt to issue the setenv usb_csr 0 command. This is mandatory.
In the WebUI
1. Navigate to Configuration > Wireless > AP Installation > Provisioning. 2. Select the RAP, click Provision. 3. Under USB Settings, select the USB Parameters check box. 4. Select the USB storage for CSR/Key check box. 5. Select Device Type as storage. 6. Click Apply and Reboot.
In the CLI
(host) (config) #provision-ap

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 870

(host) (AP provisioning) #read-bootinfo ap-name <ap name> (host) (AP provisioning) #usb-csr (host) (AP provisioning) #usb-type storage
RAP Console
1. Navigate to Configuration > Management > Certificates. 2. For Store CSR and key in USB/Flash, select USB from the drop-down list.
After the RAP is provisioned to store the CSR and private key in a USB, log in to the RAP console, export the CSR and private key files to the USB. A .p12 certificate file format must be manually created as the RAP certificate in the USB to bring up the IKE/IPSEC connection.

Implementing a Specific Management Password Policy
By default, the password for a new management user has no requirements other than a minimum length of 6 alphanumeric or special characters. However, if your company enforces a best practices password policy for management users with root access to network equipment, you may want to configure a password policy that sets requirements for management user passwords.
Defining a Management Password Policy
To define specific management password policy settings through the WebUI or the CLI, complete the following steps:
In the WebUI
1. Navigate to Configuration>All Profiles. 2. Expand Other Profiles. 3. Select Mgmt Password Policy. 4. Configure the settings described in Table 177.

Table 177: Management Password Policy Settings

Parameter

Description

Enable Password Policy

Select this checkbox to enable the password management policy. The password policy will not be enforced until this checkbox is selected.

Minimum password length required

The minimum number of characters required for a management user password
Range: 6-64 characters. Default: 6.

Minimum number of Upper Case characters

The minimum number of uppercase characters required in a management user password.
Range: 0-10 characters. By default, there is no requirement for uppercase letters in a password, and the parameter has a default value of 0.

Minimum number of Lower Case characters

The minimum number of lowercase characters required in a management user password.

871 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 177: Management Password Policy Settings

Parameter

Description

Range: 0-10 characters. By default, there is no requirement for lowercase letters in a password, and the parameter has a default value of 0.

Minimum number of Digits

The minimum number of numeric digits required in a management user password.
Range: 0-10 digits. By default, there is no requirement for numerical digits in a password, and the parameter has a default value of 0.

Minimum number of Special characters (!, @, #, $, %, ^, &, *, <, >, {, }, [, ], :, ., comma, |, +, ~, `)

The minimum number of special characters. Range: 0-10 characters.

Username or Reverse of username NOT in Password

When you select this checkbox, the password cannot be the management users' current username or the username spelled backwards.

Maximum consecutive character repeats

The maximum number of consecutive repeating characters allowed in a management user password.
Range: 0-10 characters. By default, there is no limitation on the numbers of character that can repeat within a password, and the parameter has a default value of 0 characters.

Maximum Number of failed attempts in 3 minute window to lockout user

The number of failed attempts within a 3 minute window that causes the user to be locked out for the period of time specified by the Time duration to lockout the user upon crossing the "lock-out" threshold parameter.
Range: 0-10 attempts. By default, the password lockout feature is disabled, and the default value of this parameter is 0 attempts.

Time duration to lock out the user upon crossing the "lockout" threshold

The duration in time that locks out the user upon crossing the lock out threshold.
Range: 0-60 in minutes.

5. Click Apply to save your settings.
In the CLI
aaa password-policy mgmt
Management Authentication Profile Parameters
Table 178 describes configuration parameters on the Management Authentication profile page.
In the CLI, you configure these options with the aaa authentication mgmt and aaa-server-group commands.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 872

Table 178: Management Authentication Profile Parameters Parameter Description

Enable

Enables authentication for administrative users.

Default Role Select a predefined management role to assign to authenticated administrative users:

Root

Default superuser role

guestprovisioning

Guest provisioning role

location-apimgmt

Location API role

networkoperations

Network operations role

no-access

No commands are accessible for this role

read-only

Read-only role

no access

Negates any configured parameter.

Server Group

Name of the group of servers used to authenticate administrative users. See the CLI command aaa-server-group, in the CLI Command Reference Guide for more information.

Configuring AP Image Preload
The AP image preload feature minimizes the downtime required for a controller upgrade by allowing the APs associated to that controller to download the new images before the controller actually starts running the new version.
This feature is supported only on the W-3600, W-6000M3, and W-7000, and W-7200 Series controllers.
This feature allows you to select the maximum number of APs that are allowed to preload the new software image at any one time, thereby reducing the possibility that the controller may get overloaded or that network traffic may be impacted by all APs on the controller attempting to download a new image at once. APs can continue normal operation while they are downloading their new software version. When the download completes, the AP sends a message to the controller, informing it that the AP has either successfully downloaded the new software version, or that the preload has failed for some reason. If the download fails, the AP will retry the download after a brief waiting period. You can allow every AP on a controller to preload a new software version, or also create a custom list of AP groups or individual APs that can use this feature. If a new AP associates to the controller while the AP image download feature is active, the controller will check that AP's name and group to see if it appears in the preload

873 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

list. If an AP is on the list, (and does not already have the specified image in its Flash memory) that AP will start preloading its image.
Enable and Configure AP Image Preload
Use the following procedures to enable and configure the AP Image Preload feature on the W-3600, W6000M3, and W-7000, controllersand W-7200 Series controllers using the WebUI or CLI.
In the WebUI
1. Navigate to Maintenance > WLAN > Preload AP Image. If this feature has not yet been enabled, the window will display the message "AP Image Preload status is Inactive. Click here to activate AP Image Preload." Click the link in the warning message to enable this feature and display the AP Image Preload settings.
2. Configure the settings described in the table below, then click Apply to save your changes.

Table 179: AP Image Preload Settings

Setting

Description

AP Image Preload

Select Enable to enable this feature, or Disable to disable AP image preload. AP image preload is disabled by default.
NOTE: This feature can also be enabled and disabled with its current configuration settings in the Maintenance > Controller > Image Management window.

Partition

Select the controller partition from which the APs should download their images. By default, the APs will preload images from the controller's default boot partition.

Software Version

This field shows the image on the partition that will be preloaded onto eligible APs, and is not editable.

Maximum Number of Simultaneous downloads

Specify the maximum number of APs that can simultaneously download their image from the controller. A higher number will decrease the time it takes for many APs to preload their new image, but will increase the workload on the controller.

APs to Preload

In this field, select All APsif you want to preload images on all registered APs that are eligible for preload and that support this feature, or select Specific APs to preload images on a list of selected APs.
If you selected Specific APs, you must create a list of APs allowed to preload images. You can preload images to a group of APs, or specify APs that can use this feature by identifying those APs by AP name.
To preload images to a group of APs:
1. In the AP Groups field, click Add. 2. Type the AP Group Name, or select the AP Group from the list. 3. Click OK. (To remove AP groups from this list of APs using this feature, select an AP
group name in the list, then click Delete.)
To preload images to APs with specific name:
1. In the AP Names field, click Add. 2. Type the AP Name, or select the AP Name from the list 3. Click OK. (To remove an AP from this list of APs using this feature, select an AP
name in the list, then click Delete.)

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 874

In the CLI
To configure the AP image preload feature using the command-line interface, enter the following commands in enable mode.
ap image-preload
The command ap image preload clear-all deletes all AP groups and AP names from the list of APs eligible for preloading. This command may be executed either before or after preloading is activated. If it is executed after preloading has already been activated, any APs waiting to preload the new software version will be removed from the list. APs that have already begun the preloading process will continue to download their image and will not be affected.
The ap image-preload cancel command deletes all AP groups and AP names from the list of APs eligible for preloading and cancels the preloading process for any APs on the list that have already begun to download the new image. This command then disables the image preload feature.
View AP Preload Status
You can monitor the current preload status of APs using the image preload feature using the show ap imagepreload-status and show ap image-preload-status-summary commands in the command-line interface, or in the Maintenance > WLAN > Preload AP Image window in the WebUI.
The output of the show ap image-preload-status CLI command and the AP Image Preload Status and AP Image Preload Status Summary tables in the WebUI contain the following information:

Table 180: AP Image Preload Status Settings

Column

Description

AP Image Preload State/Count

These two columns list the different possible preload states for APs eligible to preload a new software image, and the total number of APs in each state.
l Preloaded: Number of APs that have finished preloaded a new software image.
l Preloading: Number of APs that are currently downloading the new image.
l Waiting: Number of APs that are waiting to start preloading the new image from the controller.

Count

This column lists the number of eligible APs currently in each preload state.

AP Name

Name of an AP eligible to preload a new software image.

AP Group

AP group of an AP eligible to preload a new software image.

AP IP

IP address of the AP.

AP Type

AP model type.

Preload State

Current preload state for the AP l Preloaded: The AP is finished preloading a new software image. l Preloading: The AP is currently downloading the new image. l Waiting: The AP is waiting to start preloading the new image from the

875 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Column
Start Time End Time Failure Count Failure Reason

Description controller.
Time the AP starting preloading an image. Time the AP completed the image preload. Number of times that the AP failed to preload the new image. In the event of an image preload failure, this column will display the reason that the image download failed.

Configuring Centralized Image Upgrades
The centralized image upgrade feature introduced in ArubaOS 6.3 allows the master controller to automatically upgrade its associated local controllers by sending an image from a image server to one or more local controllers. If your master controller supports different local controller models, you can upload different image types to the server, and the centralized image upgrade feature will send the local controller only the type of image that controller supports.
Configuring Centralized Image Upgrades
This feature can be configured on a master controller only, and supports up to 100 simultaneous downloads. You can configure a centralized image upgrade using the WebUI or command-line interfaces.
Using the WebUI
1. Navigate to Maintenance > Controller> Image Management. 2. Click the Local Configuration tab. 3. Click the Enable checkbox to enable this feature. When this option is selected, the WebUI displays the
following centralized image configuration parameters.

Table 181: Centralized Image Upgrade Configuration Parameters Parameter Description

Protocol

Specify the protocol used to send the software upgrade from the image server to the local controller.
l TFTP l FTP l SCP

Server IP address
Username

IP address of the image server.
If you selected the FTP or SCP protocol in the Protocol field, enter the username that ArubaOS uses to connect to the image server

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 876

Parameter Description

Password

If you selected the FTP or SCP protocol in the Protocol field, enter the password that ArubaOS uses to connect to the image server

Relative Filepath

Location on the image server where the image file(s) are located

Max downloads

Maximum number of local controllers that can simultaneously download a file from a file server. The centralized image downloading feature supports up to 100 simultaneous downloads. If this field is left blank, ArubaOS will use its default value of 10 downloads.

Reboot automatically

Select this checkbox to allow the local controllers to reboot after they download their new images.
NOTE: If you enable this option, local controllers will reboot without saving any changes to their current configuration. If you have any unsaved configuration changes on your local controller that you want to retain, do not enable this option

4. Configure the image server settings described in the table above, then click Apply to save your changes. 5. Click the Verify button at the bottom of the Maintenance > Controller> Image Management > Local
Configuration page. When you verify the upgrade profile, the master controller attempts to connect to the file server, download the different images for each unique local controller and verify the validity of the image. Once controller images are "verified" by the master controller, the local controllers that are in the upgrade target list connect to the file server, download the appropriate image, and upgrade their software to the downloaded version.
Next, specify which local controllers should download the image from the image server. You can allow all local controllers on the master to download an image from the upgrade server, or configure this feature to allow only controllers with a specified IP address or subnet to download the image. The upgrade target controllers are configured in the Upgrade Target section of the Maintenance > Controller> Image Management > Local Configuration page.
l Allow All Targets: To allow all local controllers associated with that master to download an image from the image server, select the all option in the Upgrade Target section.
l Select Targets by IP address/Subnet: To allow local controllers with a specific IP address or subnet mask to download the image: 1. Click New. 2. Enter the IP address of a controller or the subnet mask of a group of local controllers. 3. Click Add. 4. (Optional) Repeat steps 1-3 to add a new target. 5. Click Apply to save your changes.
To remove a controller from the list of upgrade targets, click Delete by the IP address or subnet entry in the Upgrade Targets table. To clear the entire list of controllers in the Upgrade Targets table, click the Purge the entire target list checkbox.
In the CLI
Access the command-line interface of the master controller in config mode, and issue the following command:
upgrade-profile
The following commands are available in enable mode on master controllers:
upgrade verify

877 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

upgrade target
Viewing Controller Upgrade Statistics
The Maintenance > Controller> Image Management > Upgrade Status page in the WebUI and the output of the show upgrade status and show upgrade configuration commands in the command-line interface display current controller upgrade statistics.

Table 182: All ControllersTable Data

Column

Description

IP Address

IP address of a controller that can download images from the image file server.

Hostname

Name of the controller.

Type

Controller type (local or master)

Model

Controller model.

Version

Version of software currently running on the controller.

Upgrade Status

A controller configured to use the centralized image update feature can have one of the following upgrade status types:
l N/A: Not applicable. Only the master controller has this status type. (Or the active master if a standby controller is configured.)
l Rebooting: The local controller upgraded its image and is rebooting.
l Up-to-date: The local or standby controller is running the same image as the master controller.
l Waiting, image not verified: The local controller is waiting for the master controller to verify the images are present in the file server.
l Not Supported: The local controller version is lower than ArubaOS 6.3 and does not support the upgrade feature.
l Upgraded, reboot required: The local controller upgraded its image and a reboot is needed. A controller can have this status if the auto-reboot setting is not enabled in the upgrade profile.
l Not part of target: The local controller image version does not match with the master and requires an upgrade, but is not part of the target upgrade list.

Managing Certificates
The controller is designed to provide secure services through the use of digital certificates. Certificates provide security when authenticating users and computers and eliminate the need for less secure password-based authentication.
There is a default server certificate installed in the controller to demonstrate the authentication of the controller for captive portal and WebUI management access. However, this certificate does not guarantee security in production networks. Dell strongly recommends that you replace the default certificate with a custom certificate issued for your site or domain by a trusted Certificate Authority (CA). This section describes how to generate a Certificate Signing Request (CSR) to submit to a CA and how to import the signed certificate received from the CA into the controller.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 878

The controller supports client authentication using digital certificates for specific user-centric network services, such as AAA FastConnect, VPN (see Virtual Private Networks on page 411), and WebUI and SSH management access. Each service can employ different sets of client and server certificates.
During certificate-based authentication, the controller provides its server certificate to the client for authentication. After validating the controller's server certificate, the client presents its own certificate to the controller for authentication. To validate the client certificate, the controller checks the certificate revocation list (CRL) maintained by the CA that issued the client certificate. After validating the client's certificate, the controller can check the user name in the certificate with the configured authentication server (this action is optional and configurable).
When using X.509 certificates for authentication, if a banner message has been configured on the controller, it displays before the user can login. Click on a "login" button after viewing the banner message to complete the login process.
About Digital Certificates
Clients and the servers to which they connect may hold authentication certificates that validate their identities. When a client connects to a server for the first time, or the first time since its previous certificate has expired or been revoked, the server requests that the client transmit its authentication certificate. The client's certificate is then verified against the CA which issued it. Clients can also request and verify the server's authentication certificate. For some applications, such as 802.1x authentication, clients do not need to validate the server certificate for the authentication to function.
Digital certificates are issued by a CA which can be either a commercial, third-party company or a private CA controlled by your organization. The CA is trusted to authenticate the owner of the certificate before issuing a certificate. A CA-signed certificate guarantees the identity of the certificate holder. This is done by comparing the digital signature on a client or server certificate to the signature on the certificate for the CA. When CAsigned certificates are used to authenticate clients, the controller checks the validity of client certificates using certificate revocation lists (CRLs) maintained by the CA that issued the certificate.
Digital certificates employ public key infrastructure (PKI), which requires a private-public key pair. A digital certificate is associated with a private key, known only to the certificate owner, and a public key. A certificate encrypted with a private key is decrypted with its public key. For example, party A encrypts its certificate with its private key and sends it to party B. Party B decrypts the certificate with party A's public key.
Obtaining a Server Certificate
Best practices is to replace the default server certificate in the controller with a custom certificate issued for your site or domain by a trusted CA. To obtain a security certificate for the controller from a CA:
1. Generate a Certificate Signing Request (CSR) on the controller using either the WebUI or CLI. 2. Submit the CSR to a CA. Copy and paste the output of the CSR into an email and send it to the CA of your
choice. 3. The CA returns a signed server certificate and the CA's certificate and public key. 4. Install the server certificate, as described in Importing Certificates on page 881.
There can be only one outstanding CSR at a time in the controller. Once you generate a CSR, you need to import the CA-signed certificate into the controller before you can generate another CSR.
In the WebUI
1. Navigate to the Configuration > Management > Certificates > CSR page. 2. Enter the following information:

879 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 183: CSR Parameters

Parameter

Description

CSR Type

Type of the CSR.
You can generate a certificate signing request either with an Elliptic curve (EC) key, or with a Rivest-Shamir-Aldeman (RSA) key.

Range ec/rsa

Curve name

Length of the private/public key for ECDSA. This is applicable only if CSR Type is ec.

secp256r1/secp384 r1

Key Length Common Name

Length of the private/public key for RSA.
This is applicable only if CSR Type is rsa. NOTE: RSA-1024 is not permitted if the controller is operating in the FIPS mode.
Typically, this is the host and domain name, as in www.yourcompany.com.

1024/2048/4096 --

Country

Two-letter ISO country code for the country in which your organization is located.

State/Province

State, province, region, or territory in which your organization is located.

City

City in which your organization is located.

Organization

Name of your organization.

Unit

Optional field to distinguish a department or other unit within your organization.

Email Address

Email address referenced in the CSR.

3. Click Generate New. 4. Click View Current to display the generated CSR. Select and copy the CSR output between the BEGIN
CERTIFICATE REQUEST and END CERTIFICATE REQUEST lines, paste it into an email and send it to the CA of your choice.
In the CLI
1. Run the following command: crypto pki csr {rsa key_len <key_val> |{ec curve-name <key_val>} common_name <common_val> country <country_val> state_or_province <state> city <city_val> organization <organization_ val> unit <unit_val> email <email_val>
RSA-1024 is not permitted if the controller is operating in the FIPS mode.

2. Display the CSR output with the following command: show crypto pki csr

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 880

3. Copy the CSR output between the BEGIN CERTIFICATE REQUEST and END CERTIFICATE REQUEST lines, paste it into an email and send it to the CA of your choice.
Obtaining a Client Certificate
You can use the CSR generated on the controller to obtain a certificate for a client. However, since there may be a large number of clients in a network, you typically obtain client certificates from a corporate CA server. For example, in a browser window, enter http://<ipaddr>/crtserv, where <ipaddr> is the IP address of the CA server.
Importing Certificates
Use the WebUI or the CLI to import certificates into the controller.
You cannot export certificates from the controller.
You can import the following types of certificates into the controller: l Server certificate signed by a trusted CA. This includes a public and private key pair. l CA certificate used to validate other server or client certificates. This includes only the public key for the
certificate. l Client certificate and client's public key. (The public key is used for applications such as SSH which does not
support X509 certificates and requires the public key to verify an allowed certificate.) Certificates can be in the following formats: l X509 PEM unencrypted l X509 PEM encrypted with a key l DER l PKCS7 encrypted l PKCS12 encrypted
In the WebUI
1. Navigate to the Configuration > Management > Certificates > Upload page. 2. For Certificate Name, enter a user-defined name. 3. For Certificate Filename, click Browse to navigate to the appropriate file on your computer. 4. If the certificate is encrypted, enter the passphrase. 5. Select the Certificate Format from the drop-down menu. 6. Select the Certificate Type from the drop-down menu. 7. Click Upload to install the certificate in the controller.
In the CLI
Use the following command to import CSR certificates: crypto pki-import {der|pem|pfx|pkcs12|pkcs7} {PublicCert|ServerCert|TrustedCA} <name> The following example imports a server certificate named cert_20 in DER format: crypto pki-import der ServerCert cert_20

881 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Viewing Certificate Information
In the WebUI, the Certificate Lists section of the page lists the certificates that are currently installed in the controller. Click View to display the contents of a certificate.
To view the contents of a certificate with the CLI, use the following commands:

Table 184: Certificate Show Commands

Command

Description

show crypto-local pki trustedCAs [<name>]< [attribute>]

Displays the contents of a trusted CA certificate. If a name is not specified, all CA certificates imported into the controller are displayed. If name and attribute are specified, then only the attribute in the certificate are displayed. Attributes can be CN, validity, serial-number, issuer, subject, public-key.

show crypto-local pki serverCerts [<name>] [<attribute>]

Displays the contents of a server certificate. If a name is not specified, all server certificates imported into the controller are displayed.

show crypto-local pki publiccert [<name>] [<attribute>]

Displays the contents of a public certificate. If a name is not specified, all public certificates imported into the controller are displayed.

Imported Certificate Locations
Imported certificates and keys are stored in the following locations in flash on the controller:

Table 185: Imported Certificate Locations

Location

Description

/flash/certmgr/trustedCAs

Trusted CA certificates, either for root or intermediate CAs. Best practices is to import the certificate for an intermediate CA, you also import the certificate for the signing CA.

/flash/certmgr/serverCerts

Server certificates. These certificates must contain both a public and private key (the public and private key must match). You can import certificates in PKCS12 and X509 PEM formats, but they are stored in X509 PEM DES encrypted format.

/flash/certmgr/CSR

Temporary certificate signing requests (CSRs) that have been generated on the controller and are awaiting a CA to sign them.

/flash/certmgr/publiccert

Public key of certificates. This allows a service on the controller to identify a certificate as an allowed certificate.

Checking CRLs
A CA maintains a CRL that contains a list of certificates that have been revoked before their expiration date. Expired client certificates are not accepted for any user-centric network service. Certificates may be revoked because certificate key has been compromised or the user specified in the certificate is no longer authorized to use the key.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 882

When a client certificate is being authenticated for a user-centric network service, the controller checks with the appropriate CA to make sure that the certificate has not been revoked.
The controller does not support download of CRLs.

Certificate Expiration Alert
The certificate expiration alert sends alerts when installed certificates, which correspond to trust chains, OCSP responder certificates, and any other certificates installed on the device. By default, the system sends this alert 60 days before the expiration of the installed credentials. This alert is then repeated periodically on a weekly or biweekly basis. This alerts consist of two SNMP traps: l wlsxCertExpiringSoon l wlsxCertExpired
Chained Certificates on the RAP
Chained certificates on the RAP (that is, certificates from a multi-level PKI) need to be in a particular order inside the file. The RAP's certificate must be first, followed by the certificate chain in order, and then followed by the private key for the certificate. For example, with a root CA, a single intermediate CA, and a root CA, the PEM or PKCS12 file must contain the following parts, in this order: 1. RAP Certificate 2. Intermediate CA 3. Root CA 4. Private key
If this order is not followed, certificate validation errors occur. This order also applies to server certificates.

Support for Certificates on USB Flash Drives
This release now supports storing RAP certificates in a USB device. This ensures that the RAP certificate is activated only when the USB with the corresponding certificate is connected to the RAP. If the USB is removed from the RAP, the RAP certificate is deactivated and when the USB is connected to the RAP it acts a storage device and not as a 3G/4G RAP.
The RAP supports only PKCS12-encoded certificates that are present in the USB. This certificate contains all the information that is required for creating the tunnel including the private key, RAP certificate with the chain of certificates, and the trusted CA certificate. There is a limit of three supported intermediate CAs.
Ensure you adhere to the following file naming guidelines when you are saving the certificate:
l The first twelve characters of the certificate file name should be the RAP's MAC address. For example, if RAP's eth0 MAC address is 00:0b:86:c2:00:6c, then the file name will be 000B86C2006C.P12 or 000B86C2006C_rap155.p12
l All alphabets of the MAC address in the file name should be in upper case. l The file name can have additional characters after the MAC address separated by "_" for the purpose of
identification.
If this naming convention is not followed a error will occur during certificate validation.
Follow the steps below to configure the USB certificate store:
1. Copy the PKCS12 certificate bundle to a USB device. 2. Enter a name for the certificate using the correct naming convention as mentioned above.

883 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

If you unplug the USB device the RAP will become unresponsive. Reboot the RAP to bring it up with a custom certificate, if the USB device was unplugged.
Marking the USB Device Connected as a Storage Device
If the AP provisioning parameter "usb-type" contains the value "storage," this indicates that the RAP will retrieve certificates from the connected USB flash drive.
RAP Configuration Requirements
The RAP needs to have one additional provisioning parameter, the pkcs12_passphrase, which can be left untouched or can store an ACSII string. The string assigned to this parameter is used as the passphrase for decoding the private key stored.
If you have an activated RAP that is using USB storage for the certificate, and you remove the USB storage, the RAP drops the tunnel. This is by design. However, for the RAP to re-establish the tunnel it has to be power cycled. It does not matter if you reinsert the USB storage before or after the power cycle as long as you power cycle it.
When the RAP successfully extracts all the information including the CA certificate, the RAP certificate and the RAP private key using the passphrase from the provisioning parameter, it successfully establishes the tunnel.

Configuring SNMP
Dell controllers support versions 1, 2c, and 3 of Simple Network Management Protocol (SNMP) for reporting purposes only. In other words, SNMP cannot be used for setting values in a Dell system in the current ArubaOS version. MIB Reference Guide for information about the Dell MIBs and SNMP traps..
Dell-specific management information bases (MIBs) describe the objects that can be managed using SNMP. See the Dell Networking W-Series ArubaOS MIB Reference Guide for information about the Dell MIBS and SNMP traps.
SNMP Parameters for the Controller
You can configure the following SNMP parameters for the controller.

Table 186: SNMP Parameters for the Controller

Field

Description

Host Name

Host name of the controller.

System Contact

Name of the person who acts as the System Contact or administrator for the controller.

System Location

String to describe the location of the controller.

Read Community Strings

Community strings used to authenticate requests for SNMP versions before version 3.
NOTE: This is needed only if using SNMP v2c and is not needed if using version 3.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 884

Field Enable Trap Generation

Description
Enables generation of SNMP traps to configured SNMP trap receivers. Refer to the list of traps in the "SNMP traps" section below for a list of traps that are generated by the controller.

Trap receivers

Host information about a trap receiver. This host needs to be running a trap receiver to receive and interpret the traps sent by the Dell controller. Configure the following for each host/trap receiver:
l IP address
l SNMP version: can be 1, 2c, or 3.
l Type: Trap or Inform (SNMPv2c or SNMPv3 only)
l Engine ID: (SNMPv3 only)
l Security string
l UDP port on which the trap receiver is listening for traps. The default is the UDP port number 162. This is optional, and will use the default port number if not modified by the user.

If you are using SNMPv3 to obtain values from the controller, you can configure the following parameters:

User name

A string representing the name of the user.

Authentication protocol

An indication of whether messages sent on behalf of this user can be authenticated, and if so, the type of authentication protocol used. This can take one of the two values:
l MD5: HMAC-MD5-96 Digest Authentication Protocol
l SHA: HMAC-SHA-96 Digest Authentication Protocol

Authentication protocol password

If messages sent on behalf of this user can be authenticated, the (private) authentication key for use with the authentication protocol. This is a string password for MD5 or SHA depending on the choice above.

Privacy protocol

An indication of whether messages sent on behalf of this user can be protected from disclosure, and if so, the type of privacy protocol which is used. This takes the value DES (CBC-DES Symmetric Encryption Protocol).

Privacy protocol password

If messages sent on behalf of this user can be encrypted/decrypted with DES, the (private) privacy key for use with the privacy protocol.

Follow the steps below to configure a controller's basic SNMP parameters.
In the WebUI
1. Navigate to the Configuration > Management > SNMP page. 2. If the controller will be sending SNMP traps, click Add in the Trap Receivers section to add a trap receiver. 3. If you are using SNMPv3 to obtain values from the controller, click Add in the SNMPv3 Users section to add
a new SNMPv3 user. 4. Click Apply.
In the CLI
hostname name

885 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

syscontact name syslocation string snmp-server community string snmp-server enable trap snmp-server engine-id engine-id snmp-server host ipaddr version {1|2c|3} string [udp-port number] snmp-server trap source ipaddr snmp-server user name [auth-prot {md5|sha} password priv-prot DES password
Earlier versions of ArubaOS supported SNMP on individual APs. This feature is not supported by this version of ArubaOS.

Enabling Capacity Alerts
Use the capacity alert feature to set controller capacity thresholds which, when exceeded, will trigger alerts. The controller will send a wlsxThresholdExceeded SNMP trap and a syslog error message when the controller has exceeded a set percentage of the total capacity for that resource. A wlsxThresholdCleared SNMP trap and error message will be triggered if the resource usage drops below the threshold once again.
The following table describes the thresholds that can be configured with this feature.

Table 187: Capacity Alert Thresholds

Threshold

Description

controlpath-cpu

Set an alert threshold for controlpath CPU capacity. The <percentage> parameter is the percentage of the total controlpath CPU capacity that must be exceeded before the alert is sent. The default threshold for this parameter is 80%.

controlpathmemory

Set an alert threshold for controlpath memory consumption. The <percentage> parameter is the percentage of the total memory capacity that must be exceeded before the alert is sent. The default threshold for this parameter is 80%.

datapath-cpu

Set an alert threshold for datapath CPU capacity. The <percentage> parameter is the percentage of the total datapath CPU capacity that must be exceeded before the alert is sent. The default threshold for this parameter is 30%.

no-of-APs

The maximum number of APs that can be connected to a controller is determined by that controller's model type and installed licenses. Use this command to trigger an alert when the number of APs currently connected to the controller exceeds a specific percentage of its total AP capacity. The default threshold for this parameter is 80%.

no-of-locals

Set an alert threshold for the master controller's capacity to support branch and local controllers. A master controller can support a combined total of 256 branch and local controllers. The <percentage> parameter is the percentage of the total master controller capacity that must be exceeded before the alert is sent. The default threshold for this parameter is 80%.

total-tunnelcapacity

Set an alert threshold for the controller's tunnel capacity. The <percentage> parameter is the percentage of the controller's total tunnel capacity that must be exceeded before the alert is sent. The default threshold for this parameter is 80%

user-capacity

Set an alert threshold for the controller's user capacity. The <percentage> parameter is the percentage of the total resource capacity that must be exceeded before the alert is sent. The default threshold for this parameter is 80%.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 886

In the WebUI
1. Navigate to the Configuration > Management > Thresholdpage. 2. Modify the capacity percentages for any of the thresholds described in "Capacity Alert Thresholds" on
page 657. 3. ClickApply to save your settings.

In the CLI

4. To configure this feature, access the command-line interface in config mode and issue the following commands:
threshold

Sample Configuration

The following command configures a new alert threshold for controlpath memory consumption:

(host) (config) #threshold datapath-cpu 90

If this threshold is exceeded then subsequently drops below the 90% threshold, the controller would send the following two syslog error messages.

May 14 13:13:58 nanny[1393]: <399816> <ERRS> |nanny| above 90% threshold, value : 93 May 14 13:16:58 nanny[1393]: <399816> <ERRS> |nanny| below 90% threshold, value : 87

Resource 'Control-Path Memory' has gone Resource 'Control-Path Memory' has come

Configuring Logging

This section outlines the steps required to configure logging on a controller.
For each category or subcategory of message, you can set the logging level or severity level of the messages to be logged. Table 188 summarizes these categories:

Table 188: Software Modules Category/Subcategory Description

Network

Network messages

all

All network messages

packet-dump

Protocol packet dump messages

mobility

Mobility messages

dhcp

DHCP messages

System

System messages

all

All system messages

887 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Category/Subcategory Description

configuration

Configuration messages

messages

Messages

snmp

SNMP messages

webserver

Web server messages

security

Security messages

all

All security messages

aaa

AAA messages

firewall

Firewall messages

packet-trace

Packet trace messages

mobility

Mobility messages

vpn

VPN messages

dot1x

802.1x messages

ike

IKE messages

webserver

Web server messages

Wireless

Wireless messages

all

All wireless messages

User

User messages

all

All user messages

captive-portal

Captive portal user messages

vpn

VPN messages

dot1x

802.1x messages

radius

RADIUS user messages

For each category or subcategory, you can configure a logging level. Table 189 describes the logging levels in order of severity, from most to least severe.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 888

Table 189: Logging Levels Logging Level Emergency

Description Panic conditions that occur when the system becomes unusable.

Alert

Any condition requiring immediate attention and correction.

Critical

Any critical conditions such as a hard drive error.

Errors

Error conditions.

Warning

Warning messages.

Notice

Significant events of a non-critical and normal nature.

Informational

Messages of general interest to system users.

Debug

Messages containing information useful for debugging.

The default logging level for all categories is Warning. You can also configure IP address of a syslog server to which the controller can direct these logs.
In the WebUI
1. Navigate to the Configuration > Management > Logging > Servers page. 2. To add a logging server, click New in the Logging Servers section. 3. Click Add to add the logging server to the list of logging servers. Ensure that the syslog server is enabled and
configured on this host. Click Apply. 4. To select the types of messages you want to log, select the Levels tab. 5. Select the category or subcategory to be logged. 6. To select the severity level for the category or subcategory, scroll to the bottom of the page. Select the level
from the Logging Level drop-down menu. Click Done. 7. Click Apply to apply the configuration.
In the CLI
logging <ipaddr> logging level <level> <category> [subcat <subcategory>]
Syslog operates over UDP and is connectionless. Therefore, it is not possible for the controller to recognize a failure of the syslog server or the network path to the syslog server. By establishing an IPsec tunnel between the controller and the syslog server, (see Planning a VPN Configuration) it is possible to indirectly track the status of the syslog server link.
After a failure occurs, the network administrator has to manually re-synchronize log files by copying them from the controller to the syslog server. Use the tar logs CLI command to create an archive of all local logs, then use the copy CLI command to copy this archive to an external server. Log space is limited on the controller, and depending on how long the outage lasted some local logs may be overwritten.

889 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Enabling Guest Provisioning
The Guest Provisioning feature lets you manage guests who need access to your company's wireless network. This section describes how to: l Design and configure the Guest Provisioning page ­ Using the WebUI, the network administrator designs
and configures the Guest Provisioning page that is used to create a guest account. l Configure a guest provisioning user ­ The network administrator configures one or more guest provisioning
users. A guest provisioning user, such as a front desk receptionist, signs in guests at your company. l Using the Guest Provisioning page ­ The Guest Provisioning page is used by the guest provisioning user to
create guest accounts for people who are visiting your company.
Configuring the Guest Provisioning Page
Use the Guest Provisioning Configuration page to create the Guest Provisioning page. This configuration page consists of three tabs: Guest Fields, Page Design and Email. You configure the information on all three tabs to create a Guest Provisioning page. l Guest Fields tab--lets you select the fields that appear on the Guest Provisioning page. l Page Design tab--lets you specify the company banner, heading, and text and background colors that
appear on the Guest Provisioning page. l Email tab--lets you specify an email to be sent to the guest or sponsor (or both). Email messages can be
sent automatically at account creation time and also may be sent manually by the administrator from the Guest Provisioning page.
In the WebUI
You can only create and design the Guest Provisioning page in the WebUI.
This section describes how to design a Guest Provisioning page using all three tabs.
Configuring the Guest Fields 1. Navigate to the Configuration > Management > Guest Provisioning page. The Guest Provisioning
configuration page displays with the Guest Fields tab on top. This tab contains the following columns: n Internal Name--The unique identifier that is mapped to the label in the UI. n Label in UI--A customizable string that displays in both the main listing pane and details sheet on the
Guest Provisioning page. n Display in Details--Fields with selected checkboxes appear in the Show Details popup-window.
If the guest_category, account_category, sponsor_category and optional_category fields are not checked, their respective sections do not appear on the Guest Provisioning page.
n Display in Listing--Fields with selected checkboxes appear as columns in the management user summary page.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 890

Figure 180 Guest Provisioning Configuration Page--Guest Fields Tab

2. Select the checkbox next to each field, described in Table 190, that you want to appear on the Guest Provisioning page. Optionally, you can customize the label that displays in the UI.
3. Click Preview Current Settings to view what the Guest Provisioning page looks like while you are designing it.
4. To save changes, click Apply.
Best practices is to check the Display in Listing field for only the most essential fields, so that the Guest Provisioning user does not have to scroll the guest listing horizontally to see all the columns.

Table 190: Guest Provisioning--Guest Field Descriptions

Guest Field

Description

guest_category

A guest is the person who needs guest access to the company's wireless network. This is the label on the Guest Provisioning page for the guest information.

guest_username

Username for the guest.

guest_password

Password for the guest. (Must contain at least 1-6 characters and at least one digit.)

891 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Guest Field guest_fullname guest_company guest_email
guest_phone comments
account_category creation-date start_date end_date grantor grantor_role
sponsor_category sponsor_username
sponsor_email optional_category
optional_field_1 optional_field_2 optional_field_3 optional_field_4

Description Full name of the guest.
Name of the guest's company.
Guest's Email address.
Guest's phone number
Optional comments about the guest's account status, meeting schedule and so on.
This is the label on the Guest Provisioning page for the account information.
Date the account is created.
Date the guest account begins.
Date the guest account ends.
The username of the person of who created the guest account.
The authentication role of the grantor.
A sponsor is the guest's primary contact for the visit. This is the label in the Guest Provisioning page for the sponsor information.
Sponsor's work department
Sponsor's Email address.
This is the label in the Guest Provisioning page for the information in the optional fields that follow. NOTE: The optional_category field can be used for another person, for example a "Supervisor." You can enter username, full name, department and Email information into the optional fields. Or, you can use this category for some other purpose. optional_field_1 description
optional_field_2 description
optional_field_2 description
optional_field_2 description

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 892

Configuring the Page Design The Page Design tab lets you specify the company banner, heading, and text and background colors that appear on the Guest Provisioning page. 1. Navigate to the Configuration > Management > Guest Provisioning page and select the Page Design
tab.
Figure 181 Guest Provisioning Configuration Page--Page Design Tab

2. Enter the filename which contains the company banner in the Banner field. Or, click Browse to search for the filename
Best practices is to use a logo or banner image that is 600 x 100 pixels (width x height). The WebUI does not apply the size restrictions when you upload an image file, but the image is resized to 600 x 100 pixels when it displays or is printed.
3. Enter the label for the guest listing (the one you used in the Guest Fields tab) in the Text field. 4. Enter the hex value for the color of the text in the Text Color field. The text in the header of the guest
listing displays in this color. 5. Enter the hex value for the color of the background in the Background color field. This determines the
color of the header of the guest listing. 6. Click Preview Current Settings to preview the Guest Provisioning page while you are designing it. 7. To save changes, click Apply.
Configuring Email Messages You can specify an email to be sent to the guest or sponsor (or both). Email messages can be sent automatically at account creation time or sent manually by the network administrator or guest provisioning user from the Guest Provisioning page at any time.
1. Specify the SMTP server and port that processes the guest provisioning (also known as guest access) email. You can complete this step using the WebUI or CLI commands: n Configuring the SMTP Server and Port in the WebUI on page 894 n Configuring an SMTP server and port in the CLI on page 894

893 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

2. Create the email messages. Complete this step using the WebUI: Creating Email Messages in the WebUI on page 894
Configuring the SMTP Server and Port in the WebUI
1. Navigate to the Configuration > Management > SMTPpage. 2. Enter the IP address of the SMTP server to which the controller sends the guest provisioning email in the IP
Address of SMTP server field. 3. Enter the number of the port through which the guest provisioning email passes in the Port field. 4. Click Apply and then Save Configuration.
Configuring an SMTP server and port in the CLI
The following command creates a guest-access email and sends guest user email through SMTP server IP address 1.1.1.1 on port 25. (host) (config) #guest-access-email (host) (Guest-access Email) #smtp-port 25 (host) (Guest-access Email) #smtp-server 1.1.1.1
Creating Email Messages in the WebUI
After you configured the SMTP server and port, follow these steps: 1. Navigate to the Configuration > Management > Guest Provisioning page and select the Email tab.
Figure 182 Guest Provisioning Configuration Page--Email Tab

2. To create a message for a guest or sponsor, customize the text in the Subject, From,s and Body fields as needed for both the Guest message and Sponsor message.
3. Optionally, select the Send automatically at account creation time checkbox when you want an email message to be sent to the guest and/or sponsor alerting them that a guest account has just been created.
Regardless of whether you select this option, the person responsible for managing the Guest Provisioning page may choose to send this email message manually at any time.
Figure 183 shows a sample email message that is sent to the guest after the guest account is created.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 894

Figure 183 Sample Guest Account Email ­ Sent to Sponsor

4. To save changes, click Apply.
Configuring a Guest Provisioning User
The guest provisioning user has access to the Guest Provisioning Page (GPP) to create guest accounts within your company. The guest provisioning user is usually a person at the front desk who greets guests and creates guest accounts. Depending upon your needs, there are three ways to configure and authenticate a guest provisioning user: l Username and Password authentication -- Allows you to configure a user in a guest provisioning role. l Smart Card authentication
n Static authentication --Uses a configured certificate name and serial number to derive the user role. This authentication process uses a previously configured certificate name and serial number to derive the user role. This method does not use and external authentication server.
n Authentication server -- Uses an external authentication server to derive the management role. This is helpful if there is a large number of users who need to be deployed as guest provisioning users.
You can use the WebUI or CLI to create a Guest Provisioning user.
In the WebUI
This section describes how to configure a guest provisioning user. All three methods are described.
Username and Password Authentication Method 1. Navigate to the Configuration > Management > Administration page. 2. In the Management Users section, click Add. 3. In the Add User page select Conventional User Accounts. 4. In the User Name field, enter the name of the user who you want to configure as a guest provisioning
user. 5. In the Password and Confirm Password fields, enter the user's password and reconfirm it. 6. From the Role drop-down menu, select guest-provisioning. 7. Click Apply.

895 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Static Authentication Method
Before using this method, make sure that the correct CA certificate is uploaded to the controller.
1. Navigate to the Configuration > Management > Administration page. 2. In the Management Users section, click Add. 3. In the Add User page, select Certificate Management. 4. Make sure that the Use external authentication server to authenticate check box is unchecked. 5. In the Username field, enter the name of the user who you want to configure as a guest provisioning user. 6. In the Rolefield, select guest-provisioning from the drop-down list. 7. Enter client certificate serial number in the Client Certificate Serial No. field. 8. Select the CA certificate you want to use from the Trusted CA Certificate Name drop-down menu. 9. Click Apply.
Smart Card Authentication Method 1. Navigate to the Configuration > Management > General page. 2. In the WebUI Management Authentication Method section, select Client Certificate. 3. Click Apply. 4. Navigate to the Configuration > Management > Administration page. 5. In the Management Authentication Servers section, select guest-provisioning from the Default
Role drop-down menu. 6. Select the Mode checkbox. 7. Select the server group from the Server Group drop-down menu. 8. Click Apply. 9. In the Management Users section, click Add to display the Configuration > Management > Add User
page. 10.Select Certificate Management, WebUI Certificate and Use external authentication server to
authenticate. 11.Select the trusted CA certificate you want to use from the Trusted CA Certificated Name drop-down
menu. 12.Click Apply and Save Configuration.
In the CLI
Username and Password Method This example creates a user named Alex and assigns her the role of guest provisioning. (host) (config)# mgmt-user Alex guest-provisioning
Static Authentication Method This example uses the CA certificate mycertificate with the serial number 1234 to authenticate user Laura in the guest provisioning role. (host) (config)# mgmt-user webui-cacert mycertificate serial 1234 Laura guest-provisioning
Smart Card Authentication Method This example shows that using previously configured certificate (1234), authentication and authorization are automatically configured using an authentication server.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 896

(host) (config) #web-server profile (host)(Web Server Configuration) #mgmt-auth username/password certificate (host)(Web Server Configuration) #! (host) (config) #mgmt-user webui-cacert <certificate_name> (host) (config) #aaa authentication mgmt (host) (config) #server-group "internal" (host) (config) #mgmt-user webui-cacert default (host) (config) #mgmt-user webui-cacert 1234
Customizing the Guest Access Pass
In the WebUI, you can customize the pop-up window that displays the guest account information. You may want to do this before the Guest Provisioning user creates guest accounts.
1. Navigate to the Configuration > Security > Access Control > Guest Access page. 2. Click Browse to insert a logo or other banner information on the window.
Best practices is to use a logo or banner image that is 600 x 100 pixels (width x height). The WebUI does not apply the size restrictions when you upload an image file, but the image is resized to 600 x 100 pixels when it displays or is printed.
3. You can enter text for the Terms and Conditions portion of the window. 4. Click Submit to save your changes. Click Preview Pass to preview the window. (See Figure 184.)
Figure 184 Customized Guest Account Information Window

Creating Guest Accounts
After the Guest Provisioning user is created, that person can log in to the controller using the preconfigured username and password. The Guest Provisioning page displays. (See .) This is a sample page as the fields may differ based on how the network administrator designed the page.
Starting with ArubaOS 3.4 release, a guest user account that is created by a guest provisioning user can only be viewed, modified or deleted by the guest provisioning user who created the account or the network administrator. A guest user account that is created by the network administrator can only be viewed, modified or deleted by the network administrator.

897 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 185 Creating a Guest Account--Guest Provisioning Page
If you do not want multiple guest users to share the same guest account concurrently, navigate to the Captive Portal Authentication and select the "Allow only one active user session" option. If a guest user authenticates successfully but the controller detects there is already a guest session with the same guest username, the second login is rejected.
Guest Provisioning User Tasks
The Guest Provisioning user creates guest accounts by filling in information on the Guest Provisioning page. Tasks include creating, editing, manually sending email, enabling, printing, disabling and deleting guest accounts. The Guest Provisioning user can also manually send emails to either the guest or sponsor. To create a new guest account, the Guest Provisioning user clicks New to display the New Guest window. (See Figure 186.) After filling in information into the fields, click Create. The guest account now displays on the Guest Provisioning page. If you manually configure the user name and password, note the following: l User name entries support alphanumeric characters, however the percent sign (%) and trailing the back
slash are not allowed. l Passwords must have a minimum of six characters. You can use special characters for the password. l Click on the Account Start and End fields to change the account start and end times. The default account
start to end time setting is eight hours.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 898

Figure 186 Creating a Guest Account--New Guest Window

To see details about an existing user account, highlight an existing account and select the Show Details checkbox. The Show Details popup-window displays. (See Figure 187.) The Guest Provisioning user can send out Email from this window to either the guest or the sponsor. When you send an email from the Details popup window, a pop-up message confirming that the email was successfully processed displays

899 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 187 Creating a Guest Account--Show Details Pop-up Window

Importing Multiple Guest Entries
The Guest Provisioning user can manually create individual guest entries, as previously described, or import multiple guest entries into the database from a CSV file. This is useful and more efficient if you want to enter multiple guest entries at once. To import multiple guest entries, you need to:
1. Create a CSV file that contains the guest entries 2. Import the CSV file into the database
Creating Multiple Guest Entries in a CSV File Create a CSV file that contains multiple guest entries. Each field in an entry needs to be separated by a comma and each entry needs to end with a carriage return. The order of the fields is:
l Guest's first name (required) l Guest's last name (required) l Guest's email address (optional) l Guest's phone number (optional) l Guest's user ID (optional) l Guest's password (optional) l Sponsor's first name (optional) l Sponsor's last name (optional) l Sponsor's email address (optional)
See Figure 188 for an example of how guest entries need to be formatted in a CSV file.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 900

Figure 188 CVS File Format--Guest Entries Information
Note the following limitations when creating guest entries in a CVS file: l None of the field values can have a comma l There is no format checking on field. Only the local-userdb-guest CLI command will validate proper
format. l Any extra columns, beyond the 9th column, are discarded. l The WebUI only supports characters that the CLI supports. l If a guest's user ID is not provided, then it is automatically generated based on the numeric suffix in the
Import Guest List window. See Figure 189. l We recommend a maximum of 250 entries per CSV file. Importing the CSV File into the Database To import a CSV file that contains multiple guest entries, the Guest Provisioning user must follow these steps: 1. Log in to the WebUI using the username and password assigned to the Guest Provisioning user. 2. Click on Import. The Import Guest List pop-up window displays. See Figure 189.

901 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 189 Importing a CSV file that contains Guest Entries

3. Click Browse to locate for the CSV file you want to import.
4. Click Import. A window displays that lets you open CSV file in text format. (See Figure 190.) Open the text file to see a summary of the number of users and error messages if users are not imported.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 902

Figure 190 Displaying the Guest Entries Log File

5. Click Import. A window displays that lets you open CSV file in text format. (See Figure 190.)
6. Open the text file. (See Figure 191.) Note that because no user ID is entered in the CSV file, a guest ID (username) is automatically generated based on the default value in the Suffix for auto-generated field. Make changes or corrections to the guest entry information in text file. A user can also change the start time and end time from this window. Save and exit the file.

903 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 191 Viewing and Editing Guest Entries in the Log File
7. Click Cancel to close the Import Guest List window. Guest entries are now displayed in the Guest Provisioning page.
Figure 192 Viewing Multiple Imported Guest Entries--Guest Provisioning Page
Printing Guest Account Information To print guest account information: 1. Highlight the guest account you want to print and click Print. The Print info for guest window displays. 2. Click Print password if you want to print the guest password on the badge. Then enter or generate a new
password for the guest. This modifies the existing guest password. (See Figure 193.) 3. Optionally, click Print policy text if you want your company policy text to appear on the print out. 4. Click Show preview to view the information before it is printed. 5. Click Print to print the guest account information.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 904

Figure 193 Printing Guest Account Information

Optional Configurations
This section describes guest provisioning options that the administrator can configure.
These options are not configurable by the guest provisioning user.
Restricting one Captive Portal Session for each Guest
You can restrict one captive portal session for each guest. When a new captive portal request is received and passes authentication, all users are checked and compared with user names. If a user with the same name already exists and this option is enabled, the second login is denied.
If a guest logs in from one system (and does not log out) and tries to log in again from another system, that guest has to wait for the initial session to expire.
1. Navigate to the Configuration > Advanced Services> All s page. 2. Select Wireless Lan. 3. Under Wireless Lan, select and open Captive Portal Authentication. 4. Add a new or select and existing 5. Select the Allow only one active user session check box. 6. Click Apply. Using the CLI to restrict one Captive Portal session for each guest (host)(config)# aaa authentication captive-portal <> single-session
Setting the Maximum Time for Guest Accounts
You can set the maximum expiration time (in minutes) for guest accounts. If the guest-provisioning user attempt to add a guest account that expires beyond this time period, an error message is displayed and the

905 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

guest account is created with the maximum time you configured.
If you set the maximum expiration time, it applies to all users in the internal database whether they are guests or not.
Using the WebUI to set the maximum time for guest accounts 1. Navigate to the Configuration > Security > Authentication page. 2. Select Internal DB. 3. Under Internal DB Maintenance, enter a value in Maximum Expiration. 4. Click Apply. Using the CLI to set the maximum time for guest accounts (host)# local-userdb maximum-expiration <minutes>
Managing Files on the Controller
You can transfer the following types of files between the controller and an external server or host: l ArubaOS image file l A specified file in the controller's flash file system, or a compressed archive file that contains the entire
content of the flash file system. You back up the entire content of the flash file system to a compressed archive file, which you can then copy from the flash system to another destination.
l Configuration file, either the active running configuration or a startup configuration. l Log files. You can use the following protocols to copy files to or from a controller: l File Transfer Protocol (FTP): Standard TCP/IP protocol for exchanging files between computers. l Trivial File Transfer Protocol (TFTP): Software protocol that does not require user authentication and is
simpler to implement and use than FTP. l Secure Copy (SCP): Protocol for secure transfer of files between computers that relies on the underlying
Secure Shell (SSH) protocol to provide authentication and security. You can use SCP only for transferring image files to or from the controller, or transferring files between the flash file system on the controller and a remote host. The SCP server or remote host must support SSH version 2 protocol.
The following table lists the parameters that you configure to copy files to or from a controller.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 906

Table 191: File Transfer Configuration Parameters

Server Type

Configuration

Trivial File Transfer Protocol (TFTP)

l tftphost - tftp host IPv4 / IPv6 address l filename - absolute path of filename l flash: - copy to the flash file system l destination: - destination file name l system: - system partition l partition - partition 0 / partition 1

File Transfer Protocol (FTP)

l ftphost - ftp server host name or IPv4/IPv6 address l username - user name to log into server l filename - absolute path of filename l system: - system partition l partition - partition 0 / partition 1

Secure Copy (SCP)
You must use the CLI to transfer files with SCP.

l scphost - scp host of IPv4 / IPv6 address l username - user name to secur to log into the server l filename - absolute path of filename (otherwise, SCP
searches for the file relative to the user's home directory) l flash: - copy to the flash file system l destfilename: - destination file name l system: - system partition l partition - partition 0 / partition 1

For example, you can copy an ArubaOS image file from an SCP server to a system partition on a controller or copy the startup configuration on a controller to a file on a TFTP server, You can also store the contents of a controller's flash file system to an archive file which you can then copy to an FTP server. You can use SCP to securely download system image files from a remote host to the controller or securely transfer a configuration file from flash to a remote host.
Transferring ArubaOS Image Files
You can download an ArubaOS image file onto a controller from a TFTP, FTP, or SCP server. In addition, the WebUI allows you to upload an ArubaOS image file from the local PC on which you are running the browser.
When you transfer an ArubaOS image file to a controller, you must specify the system partition to which the file is copied. The WebUI shows the current content of the system partitions on the controller. You have the option of rebooting the controller with the transferred image file.
In the WebUI
1. Navigate to the Maintenance > Controller > Image Management page. 2. Select TFTP, FTP, SCP, or Upload Local File. 3. Enter or select the appropriate values for the file transfer method. 4. Select the system partition to which the image file is copied.

907 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

5. Specify whether the controller is to be rebooted after the image file is transferred, and whether the current configuration is saved before the controller is rebooted.
6. Click Upgrade.
In the CLI
copy tftp: <tftphost> <filename> system: partition [0|1]} copy ftp: <ftphost> <user> <filename> system: partition {0|1} copy scp: <scphost> <username> <filename> system: partition [0|1]
Backing Up and Restoring the Flash File System
You can store the entire content of the flash file system on a controller to a compressed archive file. You can then copy the archive file to an external server for backup purposes. If necessary, you can restore the backup file from the server to the flash file system.
Backup the Flash File System in the WebUI
1. Navigate to the Maintenance > File > Backup Flash page. 2. Click Create Backup to back up the contents of the flash system to the flashbackup.tar.gz file. 3. Click Copy Backup to enter the Copy Files page where you can select the destination server for the file. 4. Click Apply.
Backup the Flash File System in the CLI
backup flash copy flash: flashbackup.tar.gz tftp: <tftphost> <destfilename> copy flash: flashbackup.tar.gz scp: <scphost> <username> <destfilename>
Restore the Flash File System in the WebUI
1. Navigate to the Maintenance > File > Copy Files page. a. For Source Selection, specify the server to which the flashbackup.tar.gz file was previously copied. b. For Destination Selection, select Flash File System. c. Click Apply.
2. Navigate to the Maintenance > File > Restore Flash page. 3. Click Restore to restore the flashbackup.tar.gz file to the flash file system. 4. Navigate to the Maintenance > Switch > Reboot Switch page. 5. Click Continue to reboot the controller.
Restore the Flash File System in the CLI
copy tftp: <tftphost> <srcfilename> flash: flashbackup.tar.gz copy scp: <scphost> <username> <srcfilename> flash: flashbackup.tar.gz restore flash
Copying Log Files
You can store log files into a compressed archive file which you can then copy to an external TFTP or SCP server. The WebUI allows you to copy the log files to a WinZip folder which you can display or save on your local PC.
In the WebUI
1. Navigate to the Maintenance > File > Copy Logs page. 2. For Destination, specify the TFTP or FTP server to which log files are copied.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 908

3. Select Download Logs to download the log files into a WinZip file on your local PC, 4. Click Apply.
In the CLI
tar logs copy flash: logs.tar tftp: <tftphost> <destfilename> copy flash: logs.tar scp: <scphost> <username> <destfilename>
Copying Other Files
The flash file system contains the following configuration files: l startup-config: Contains the configuration options that are used the next time the controller is rebooted. It
contains all options saved by clicking the Save Configuration button in the WebUI or by entering the write memory CLI command. You can copy this file to a different file in the flash file system or to a TFTP server. l running-config: Contains the current configuration, including changes which have yet to be saved. You can copy this file to a different file in the flash file system, to the startup-config file, or to a TFTP or FTP server. You can copy a file in the flash file system or a configuration file between the controller and an external server.
In the WebUI
1. Navigate to the Maintenance > File > Copy Files page. 2. Select the source where the file or image exists. 3. Select the destination to where the file or image is to be copied. 4. Click Apply.
In the CLI
copy startup-config flash: <filename> copy startup-config tftp: <tftphost> <filename>
copy running-config flash: <filename> copy running-config ftp: <ftphost> <user> <filename> [<remote-dir>] copy running-config startup-config copy running-config tftp: <tftphost> <filename>
Setting the System Clock
You can set the clock on a controller manually or by configuring the controller to use a Network Time Protocol (NTP) server to synchronize its system clock with a central time source.
Manually Setting the Clock
You can use either the WebUI or CLI to manually set the time on the controller's clock.
In the WebUI
1. Navigate to the Configuration > Management > Clock page. 2. Under Controller Date/Time, set the date and time for the clock. 3. Under Time Zone, enter the name of the time zone and the offset from Greenwich Mean Time (GMT). 4. To adjust the clock for daylight savings time, click Enabled under Summer Time. Additional fields appear
that allow you to set the offset from UTC, and the start and end recurrences. 5. Click Apply.

909 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the CLI
To set the date and time, enter the following command in privileged mode: clock set <year> <month> <date> <hour> <minutes> <seconds>
To set the time zone and daylight savings time adjustment, enter the following commands in configure mode: clock timezone <WORD> <-23 - 23>
clock summer-time <zone> [recurring] <1-4> <start day> <start month> <hh:mm> first <start day> <start month> <hh:mm> last <start day> <start month> <hh:mm> <1-4> <end day> <end month> <hh:mm> first <end day> <end month> <hh:mm> last <end day> <end month> <hh:mm> [<-23 - 23>]
Clock Synchronization
You can use NTP to synchronize the controller to a central time source. Configure the controller to set its system clock using NTP by configuring one or more NTP servers. For each NTP server, you can optionally specify the NTP iburst mode for faster clock synchronization. The iburst mode sends up ten queries within the first minute to the NTP server. (When iburst mode is not enabled, only one query is sent within the first minute to the NTP server.) After the first minute, the iburst mode typically synchronizes the clock so that queries need to be sent at intervals of 64 seconds or more.
The iburst mode is a configurable option and not the default behavior for the controller, as this option is considered "aggressive" by some public NTP servers. If an NTP server is unresponsive, the iburst mode continues to send frequent queries until the server responds and time synchronization starts.
In the WebUI
1. Navigate to the Configuration > Management > Clock page. 2. Under NTP Servers, click Add. 3. Enter the IP address of the NTP server. 4. Select (check) the iburst mode, if desired. 5. Click Add.
In the CLI
ntp server ipaddr [iburst]
Configuring NTP Authentication
The Network Time Protocol adds security to an NTP client by authenticating the server before synchronizing the local clock. NTP authentication works by using a symmetric key which is configured by the user. The secret key is shared by both the controller and an external NTP server. This helps identify secure servers from fraudulent servers.
In the WebUI
1. Navigate to the Configuration > Management > Clock page. 2. Under NTP Authentication, make sure Enable is selected. Enable is the default option. 3. Under NTP Servers, enter the NTP server IP address (IPv4/IPv6) in the Server IP field.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 910

4. Under NTP Identification Keys, enter an identification key (a number between 1 and 65535) in the Identification Key field. Then add a secret string in the MD5 Secret field. The MD5 ID key must be an ASCII string up to 31 characters.
5. Click Add. 6. The identification key along with its corresponding MD5 secret string is displayed in the Identification
Keys section. 7. Under NTP Trusted Keys, enter a string in the Trusted Key field. This is a subset of keys which are
trusted. The trusted key value must be numeric values between 1 to 65535. 8. Click Apply.
In the CLI
This example enables NTP authentication, add authentication secret keys into the database, and specifies a subset of keys which are trusted. It also enables the iburst option. (host) (config) #ntp authenticate (host) (config) #ntp authentication-key <key-id> md5 <key-secret> (host) (config) #ntp trusted-key <key-id> (host) (config) #ntp server <ipaddr> <iburst> <key> (host) (config) #ntp server <server IP> <iburst key> <key>
Timestamps in CLI Output
The timestamp feature can include a timestamp in the output of each show command issued in the commandline interface, indicating the date and time the command was issued. Note that the output of show clock and show log do not include timestamps, even when this feature is enabled. To enable this feature, access the command-line interface in config mode and issue the command clock append. (host) (config) #clock append
ClearPass Profiling with IF-MAP
This feature is used in conjunction with ClearPass Policy Manager. It sends HTTP User Agent Strings and mDNS broadcast information to ClearPass so that it can make more accurate decisions about what types of devices are connecting to the network.
In the WebUI
To enable and configure this feature: 1. Navigate to Configuration >All Profiles>Other Profiles. 2. Click the CPPM IF-MAP profile. 3. Configure this profile according to the following parameters:

911 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 192: CPPM IF-Map Configuration Parameters

Parameter

Description

CPPM IF-Map Interface

Enables the feature

Host IP address

IP address or hostname of the CPPM IF-MAP server

Username

Username for the user who performs actions on the CPPM IF-MAP server. Range must be between 1-255 bytes in length.

Password

Password of the user who performs actions on the CPPM IF-MAP server.Range between 6-100 bytes in length.

In the CLI

To configure this feature using the CLI:

(host) (config) #ifmap (host) (config) #ifmap cppm (host) (CPPM IF-MAP Profile) #server host <host> (host) (CPPM IF-MAP Profile) #port <port> (host) (CPPM IF-MAP Profile) #passwd <psswd> (host) (CPPM IF-MAP Profile) #enable

This show command show if the CCPM interface is enable and the CPPM server IP address, username and password.

(host) (CPPM IF-MAP Profile) #show ifmap cppm

CPPM IF-MAP Profile

-------------------

Parameter

Value

---------

-----

CPPM IF-MAP Interface Enabled

CPPM IF-MAP Server

10.4.191.32:443 admin/********

This show command shows if state of all enabled CPPM servers.

(host) (CPPM IF-MAP Profile) #show ifmap state cppm

CPPM IF-MAP Connection State [Interface: Enabled]

-------------------------------------------------

Server

State

------

-----

10.4.191.32:443 UP

Whitelist Synchronization
ArubaOS allows controllers to synchronize their remote AP whitelists with the Dell Activate cloud-based services. When you configure Activate whitelist synchronization, the controller will securely contact the Activate server and download the contents of the whitelist on the Activate server to the whitelist on the controller. The controller and the Activate server must have layer-3 connectivity to communicate.
By default, this feature will both add new remote AP entries to the controller whitelist and delete any obsolete entries on the controller whitelist that were not on the Activate server whitelist. Select the add-only option to allow this feature to add or modify entries, but not delete any existing entries.
In the WebUI
To enable this feature using the WebUI,

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 912

1. Navigate to Configuration>Network>Controller>Sync Whitelist Service. 2. Select Enable sync service. 3. In the Activate user field, enter the user name for your Activate account. 4. In the Activate password field, enter the password for your Activate account. 5. (Optional) Click the Frequency drop-down list and configure how frequently the controller should
synchronize its remote AP whitelist with the whitelist on the Activate server. 6. Click Apply to save your settings.
In the CLI
The following example enables the Activate whitelist service on the controller. The add-only parameter allows only the addition of entries to the Activate remote AP whitelist database. This parameter is enabled by default. If this setting is disabled, the activate-whitelist-download command can both add and remove entries from the Activate database. (host)(config)# activate-service-whitelist (host)(activate-service-whitelist) #username user2 password pA$$w0rd whitelist-enable (host)(activate-service-whitelist)add-only
The following command is available in enable mode, and prompts the controller to synchronize its remote AP whitelist with the associated whitelist on the Activate server: (host)# activate whitelist download

Downloadable Regulatory Table
The downloadable regulatory table feature allows for the update of country domain options without upgrading the ArubaOS software version. A separate file, called the Regulatory-Cert, containing AP regulatory information will be released periodically on download.dell-pcw.com. The Regulatory-Cert file can then be uploaded to a controller and pushed to deployed APs.
The Regulatory-Cert includes the following information for each AP:
l All countries supported in the current release of ArubaOS (not just United States or Rest of World or any subset of countries)
l Allowed channels for each country l Max EIRP for each channel and each country in the allowed list. The max values are specified for each PHY-
type at which the AP is allowed to transmit on. The classified PHY-types are n 802.11 OFDM rates (802.11a/g mode) n 802.11b rates (CCK rates) n 802.11n HT20 and 802.11ac VHT20 rates (MCS0-7) n 802.11n HT20 and 802.11ac VHT40(MCS0-7) n 802.11ac VHT80 rates l DFS functionality for each channel and each country in the allowed list
Important Points to Remember
l When a Regulatory-Cert is activated, the new file is checked against the default file built into ArubaOS. If the file is of a newer version, the activation is allowed. If the file is of a lower version, then the activation is not completed. The controller's CLI displays the following message upon failure: (host0) #ap regulatory activate reg-data-1.0_00002.txt

913 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Failed to activate regulatory file reg-data-1.0_00002.txt. File Version should be greater than 1.0_43859 l APs do not rebootstrap or reboot on activation. l If there is change in channel list or power level, APs will change the channel/power level. Impact is same as that of ARM channel/power change in that case. l Clients are not disconnected upon regulatory file activation. Max latency impact during activation (with no channel changes) is less than 1s (applies to power change too). l With channel change, the impact is similar to ARM channel change (depends on client behavior and if CSA is enabled or not). l If support for the AP (Country) is added, the AP will move from AM to AP mode (if the AP is configured in AP mode of operation).
Copying the Regulatory-Cert
You can use the following protocols to copy the regulatory file to a controller: l FTP l TFTP l SCP Additionally, regulatory files saved to a USB drive can be uploaded to a controller equipped with a USB port. You can copy the Regulatory-Cert to the controller using the WebUI or CLI.
In the WebUI
1. Navigate to the Maintenance > File > Copy Files page. 2. Select the source (TFTP, FTP, SCP, or USB) where the file exists. 3. The controller WebUI will automatically select Flash File System under the Destination Selection menu. 4. Click Apply.
In the CLI
Use one of the following copy commands to download the regulatory file to the controller: copy
ftp: <ftphost> <user> <filename> scp: <scphost> <username> <filename> flash: <destfilename> tftp: <tftphost> <filename> flash: <destfilename> usb: partition <partition-number> <filename> flash: <destfilename>
To view the current regulatory and the content of the file, use the following commands: show ap regulatory show ap allowed-channels country-code <country-code> ap-type <ap-type show ap allowed-max-eirp ap-name <ap-name> country-code <country-code> show ap debug received-reg-table ap-name <ap-name>
Activating the Regulatory-Cert
Once the Regulatory-Cert has been added to the controller, the new regulatory information must be activated and pushed to the APs.
In the WebUI
To activate a specific regulatory file using the WebUI: 1. Navigate to Maintenance > File > Regulatory Files. 2. Select a regulatory file from the File List.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Management Access | 914

3. Click Activate.
In the CLI
To activate a specific regulatory file loaded on the controller, use the following command: ap regulatory activate <filename> To return to the factory default regulatory-cert, use the following command: ap regulatory reset In a master-local-standby deployment, the file syncing profile can be enabled to ensure that the regulatory-cert that is stored on the master is shared with its subordinate controllers. File syncing is enabled by default, with a default sync time of 30 minutes. The sync time can be set between 30 to 180 minutes, To configure the file syncing profile, use the following commands (host) (config) #file syncing profile (host) (File syncing profile) #file-syncing-enable (host) (File syncing profile) #sync-time 30
Related Show Commands
To view the version of Regulatory Cert currently active on all controllers, execute the following command: (host) #show switches regulatory To view the file synching profile settings, execute the following command: (host) #show file syncing profile

915 | Management Access

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Chapter 36 802.11u Hotspots

ArubaOS incorporates Passpoint technology from the Wi-Fi Alliance Hotspot 2.0 Specification to simplify and automate access to public Wi-Fi networks. Follow the procedures in this chapter to help mobile devices identify which access points in your hotspot network are suitable for their needs, and authenticate to a remote service provider using suitable credentials.
Hotspot 2.0 Pre-Deployment Information
Hotspot 2.0 is a Wi-Fi Alliance Passpoint specification based upon the 802.11u protocol that provides wireless clients with a streamlined mechanism to discover and authenticate to suitable networks, and allows mobile users the ability to roam between partner networks without additional authentication. For an overview Hotspot 2.0 enhanced network discovery and selection technology, and a description of each of the hotspot profile types, see Hotspot 2.0 Overview on page 916
Hotspot Profile Configuration Tasks
The following sections describe the procedure to configure the profiles for the hotspot feature. l Configuring Hotspot 2.0 Profiles on page 919 l Configuring Hotspot Advertisement Profiles on page 925 l Configuring ANQP Venue Name Profiles on page 926 l Configuring ANQP Network Authentication Profiles on page 928 l Configuring ANQP Domain Name Profiles on page 929 l Configuring ANQP IP Address Availability Profiles on page 930 l Configuring ANQP NAI Realm Profiles on page 931 l Configuring ANQP Roaming Consortium Profiles on page 935 l Configuring ANQP 3GPP Cellular Network Profiles on page 936 l Configuring H2QP Connection Capability Profiles on page 937 l Configuring H2QP Operator Friendly Name Profiles on page 939 l Configuring H2QP Operating Class Indication Profiles on page 940 l Configuring H2QP WAN Metrics Profiles on page 941
Hotspot 2.0 Overview
ArubaOS supports Hotspot 2.0 with enhanced network discovery and selection. Clients can receive general information about the network identity, venue and type via management frames from the Dell AP. Clients can also query APs for information about the network's available IP address type (IPv4 or IPv6), roaming partners, and supported authentication methods, and receive that information in Information Elements from the AP.
Generic Advertisement Service (GAS) Queries
An Organization Identifier (OI) is a unique identifier assigned to a service provider when it registers with the IEEE registration authority. A Dell AP can include its service provider OI in beacons and probe responses to clients. If a client recognizes an AP's OI, it will attempt to associate to that AP using the security credentials corresponding to that service provider.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

802.11u Hotspots | 916

If the client does not recognize the AP's OI, that client can send a Generic Advertisement Service (GAS) query to the AP to request more information more about the network before associating.
ANQP Information Elements
ANQP Information Elements (IEs) are additional data that can be sent from the AP to the client to identify the AP's network and service provider. If a client requests this information via a GAS query, the hotspot AP then sends the ANQP Capability list in the GAS Initial Response frame indicating support for the following IEs. If the client responds with a request for a specific IE, the AP will send a GAS response frame with the configured ANQP IE information.
l Venue Name: the Venue Name IE defines the venue group and venue type. l Domain Name: this IE specifies the AP's domain name. l Network Authentication Type: if the network has Additional Steps required for Access (ASRA), this profile
defines the authentication type being used by the hotspot network. l Roaming Consortium List: roaming Consortium Information Elements (IEs) contain information identifying
the network and service provider, whose security credentials can then be used to authenticate with the AP transmitting this element. l IP address Availability: this IE provides clients with information about the availability of IP address versions and types which could be allocated to those clients after they associate to the hotspot AP. l NAI Realm: an AP's NAI Realm profile identifies and describes a NAI realm accessible using the AP, and the method that this NAI realm uses for authentication. l 3GPP Cellular Network Data: defines information for a 3rd Generation Partnership Project (3GPP) Cellular Network for hotspots that have roaming relationships with cellular operators. l Connection Capability: define hotspot protocol and port capabilities to be sent in an ANQP IE. l Operating Class: use this profile to define the channels on which the hotspot is capable of operating. l Operator Friendly Name: a free-form text field that can identify the operator and also something about the location. l WAN Metrics: provides hotspot clients information about access network characteristics such as link status and the capacity and speed of the WAN link to the Internet.
Hotspot Profile Types
ArubaOS supports several different ANQP and H2QP profile types for defining Hotspot data. The following table describes the profiles in the Hotspot profile set.

917 | 802.11u Hotspots

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 193: ANQP and H2QP Profiles referenced by an Advertisement Profile

Profile

Description

Hotspot Advertisement profile

An advertisement profile defines a collection of ANQP and H2QP profiles. Each hotspot 2.0 profile is associated with one advertisement profile, which in turn references one of each type of ANQP and H2QP profile.
For more information on configuring this profile, refer to Configuring Hotspot Advertisement Profiles on page 925

ANQP 3GPP Cellular Network profile

Use this profile to define priority information for a 3rd Generation Partnership Project (3GPP) Cellular Network used by hotspots that have roaming relationships with cellular operators.
For more information on configuring this profile, refer to Configuring ANQP 3GPP Cellular Network Profiles on page 936

ANQP Domain Name profile

Use this profile to specify the hotspot operator domain name.
For more information on configuring this profile, refer to Configuring Hotspot Advertisement Profiles on page 925

ANQP IP Address Availability profile

Use this profile to specify the types of IPv4 and IPv6 IP addresses available in the hotspot network.
For more information on configuring this profile, refer to Configuring ANQP IP Address Availability Profiles on page 930

ANQP NAI Realm profile

An AP's NAI Realm profile identifies and describes a Network Access Identifier (NAI) realm accessible using the AP, and the method that this NAI realm uses for authentication.
For more information on configuring this profile, refer to Configuring ANQP NAI Realm Profiles on page 931

ANQP Network Authentication profile

Use the ANQP Network Authentication profile to define the authentication type used by the hotspot network.
For more information on configuring this profile, refer to Configuring ANQP Network Authentication Profiles on page 928.

ANQP Roaming Consortium profile

Name of the ANQP Roaming Consortium profile to be associated with this WLAN advertisement profile.
For more information on configuring this profile, refer to Configuring ANQP Roaming Consortium Profiles on page 935

ANQP Venue Name profile

Use this profile to specify the venue group and venue type information be sent in an Access network Query Protocol (ANQP) information element in a Generic Advertisement Service (GAS) query response.
For more information on configuring this profile, refer to Configuring ANQP Venue Name Profiles on page 926.

H2QP Connection Capability profile

Use this profile to specify hotspot protocol and port capabilities.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.11u Hotspots | 918

Profile
H2QP Operating Class Indication profile
H2QP Operator Friendly Name profile
H2QP WAN Metrics profile

Description
For more information on configuring this profile, refer to Configuring H2QP Connection Capability Profiles on page 937
Use this profile to specify the channels on which the hotspot is capable of operating For more information on configuring this profile, refer to Configuring H2QP Operating Class Indication Profiles on page 940
Use this profile to define the operator-friendly name sent by devices using this profile. For more information on configuring this profile, refer to Configuring H2QP Operator Friendly Name Profiles on page 939
Use this profile to specify the WAN status and link metrics for your hotspot. For more information on configuring this profile, refer to Configuring H2QP WAN Metrics Profiles on page 941

Configuring Hotspot 2.0 Profiles
Use this profile to enable the hotspot 2.0 feature, and define venue and OI settings for roaming partners. Each hotspot 2.0 profile also references an advertisement profile, which defines a set of ANQP or H2QP profiles which define other values for the hotspot feature. By default, hotspot 2.0 profiles references the default advertisement profile. For information on associating a different advertisement profile with a hotspot 2.0 profile, see Associating the Advertisement Profile to a Hotspot 2.0 Profile on page 926.
In the WebUI
To configure a hotspot 2.0 profile from the controller WebUI:
1. Navigate to Configuration>Advanced Services>All Profiles. 2. In the profiles list, expand the Wireless LAN section. 3. Select Hotspot 2.0. 4. Select an existing profile from the list of profiles on the profile details pane or create a new profile by
entering a profile name into the entry blank, then clicking Add. 5. Configure the parameters described in Table 194 as desired, then click Apply.

919 | 802.11u Hotspots

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 194: Hotspot 2.0 Profile Settings

Parameter

Description

Advertise Hotspot 2.0 Capability

This checkbox enables or disables the hotspot. When this feature is enabled, the Information Elements (IEs) for this hotspot are included in beacons and probe responses from the AP.
This setting is disabled by default.

Use GAS Comeback Request/Response

By default, ANQP Information is obtained from a GAS Request and Response. If you enable the Use GAS Comeback Request/Response option, advertisement information is obtained using a GAS Request and Response. as well as a Comeback-Request and Comeback-Response. This option is disabled by default.

Additional Steps required for Access Enabled
Network Internet Access

Select this checkbox if any additional steps are required for network access. If this parameter is enabled, the AP will send the following Information Elements (IEs) in response to the client's the ANQP query.
l Venue Name
l Domain Name List
l Network Authentication Type
l Roaming Consortium List
l NAI Realm List NOTE: If this parameter is enabled, the advertisement profile for this hotspot must reference an enabled network authentication type profile.
If you select this checkbox, the AP sends an Information Element (IE) indicating that the network allows internet access. By default, a hotspot profile does not advertise network internet access.

Length of Query Response

Generic Advertisement Service (GAS) enables advertisement services that lets clients query multiple 802.11 networks at once, while also allowing the client to learn more about a network's 802.11 infrastructure before associating.
If a client transmits a GAS Query using a GAS Initial Request frame, the responding AP will provide the query response (or information on how to receive the query response) in a GAS Initial Response frame.
This parameter sets the maximum length of the GAS query response, in octets. The supported range is 1-255 octets.

Access Network Type

Specify the 802.11u network type. The default setting is publicchargeable. l emergency-services: emergency services only network l personal-device: personal device network l private: private network

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.11u Hotspots | 920

Parameter

Description
l private-guest: private network with guest access l public-chargeable: public chargeable network l public-free: free public network l test: test network l wildcard: wildcard network

Roaming Consortium Len Entry 1

Length of the OI. The value of the Roaming Consortium Len Entry 1 parameter is based upon the number of octets of the Roaming Consortium OI Entry 1 field.
l 0: Zero Octets in the OI (Null)
l 3: OI length is 24-bit (3 Octets)
l 5: OI length is 36-bit (5 Octets)

Roaming Consortium OI Entry 1 Roaming Consortium Len Entry 2

Roaming consortium OI assigned to one of the service provider's top three roaming partners.This additional OI will only be sent to a client if the Additional Roaming Consortium OI's parameter is set to1 or higher. NOTE: The service provider's own roaming consortium OI is configured using the ANQP Roaming Consortium profile.
Length of the OI. The value of the Roaming Consortium Len Entry 2 parameter is based upon the number of octets of the Roaming Consortium OI Entry 2 field.
l 0: Zero Octets in the OI (Null)
l 3: OI length is 24-bit (3 Octets)
l 5: OI length is 36-bit (5 Octets)

Roaming Consortium OI Entry 2 Roaming Consortium Len Entry 3

Roaming consortium OI assigned to one of the service provider's top three roaming partners. This additional OI will only be sent to a client if the Additional Roaming Consortium OI's parameter is set to 2 or higher. NOTE: The service provider's own roaming consortium OI is configured using the ANQP Roaming Consortium profile.
Length of the OI. The value of the Roaming Consortium Len Entry -3 parameter is based upon the number of octets of the Roaming Consortium OI Entry 3 field.
l 0: Zero Octets in the OI (Null)
l 3: OI length is 24-bit (3 Octets)
l 5: OI length is 36-bit (5 Octets)

Roaming Consortium OI Entry 3

Roaming consortium OI assigned to one of the service provider's top three roaming partners. This additional OI will only be sent to a client if the Additional Roaming Consortium OI's parameter is set to 3.
NOTE: The service provider's own roaming consortium OI is configured using the ANQP Roaming Consortium profile.

921 | 802.11u Hotspots

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter Additional Roaming Consortium OI's (displayed in Advertisement Profile) HESSID Venue Group Type
Venue Type
PAME BI Downstream Group Frames Forwarding Blocked

Description
Number of additional roaming consortium Organization Identifiers (OIs) advertised by the AP. This feature supports up to three additional OIs, which are defined using the Roaming Consortium Len Entry 1, Roaming Consortium Len Entry 2 and Roaming Consortium Len Entry 3 parameters
This optional parameter devices an AP's homogenous ESS identifier (HESSSID), which is that device's MAC address in colon-separated hexadecimal format.
Specify one of the following venue groups to be advertised in the IEs from APs associated with this hotspot profile. The default setting is unspecified.
l assembly
l business
l educational
l factory-or-industrial
l institutional
l mercantile
l outdoor
l reserved
l residential
l storage
l unspecified
l Utility-Misc
l Vehicular NOTE: This parameter only defines the venue group advertised in the IEs from hotspot APs.
Specify a venue type to be advertised in the IEs from APs associated with this hotspot profile. The complete list of supported venue types is described in Configuring Hotspot 2.0 Profiles on page 919.
This parameter only defines the venue type advertised in the IEs from hotspot APs.
This option enables the Pre-Association Message Exchange BSSID Independent (PAME-BI) bit, which is used by an AP to indicate whether the the AP indicates that the Advertisement Server can return a query response that is independent of the BSSID used for the GAS Frame exchange.
This option configures the Downstream Group Addressed Forwarding (DGAF) Disabled Mode. If this feature is enabled, it ensures that the AP does not forward downstream groupaddressed frames. It is disabled by default, allowing the AP to forward downstram group-addressed frames.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.11u Hotspots | 922

Parameter Time Zone Format
Time Advertisement Capability

Description
The time zone in which the AP is operating, in the format <std><offset>[dst[offset][,start[/time],end[/time]] Where the <std> string specifies the abbreviation of the time zone, <dst> is the abbreviation of the timezone in daylight savings time, and the <offset> string specifies the time value you must add to the local time to arrive at UTC. NOTE: For complete details on configuring the timezone format, refer to section 8.3 of IEEE Std 1003.1, 2004 Edition.
This parameter specifies the AP's source of external time, and the current condition of its timing estimator.
l no-std-ext-time-src: The AP using this profile has no standardized external time source.
l timestamp-offset-utc: The AP has a timestamp offset based on UTC.
l reserved: This setting is reserved for future use, and should not be used.

Time Error Value

The standard deviation of error in the time value estimate, in milliseconds. The default value is 0 milliseconds, and the supported range is 0- 2,147,483,647 milliseconds.

P2P Device Management

Issue this command to advertise support for P2P device management. This setting is disabled by default.

P2P Cross Connect

Issue this command to advertise support for P2P Cross Connections. This setting is disabled by default.

Hotspot 2.0 Advertisement Protocol Type

Select one of the following advertisement protocol types to be used by the AP.
l anqp: Access Network Query Protocol (ANQP)
l emergency: Emergency Alert System (EAS)
l mih-cmd-event: Media Independent Handover (MIH) Command and Event Services Capability Discovery
l mih-info: Media Independent Handover (MIH) Information Service. This option allows handovers between differing kinds of wireless access protocols and technologies, allowing access points on different IP subnets to communicate with each other at the link level while maintaining session continuity.
l rsvd: Reserved for future use.

923 | 802.11u Hotspots

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter GAS comeback delay in milliseconds
RADIUS Chargeable User Identity (RFC4372)
RADIUS Location Data (RFC5580)

Description
At the end of the GAS comeback delay interval, the client may attempt to retrieve the query response using a Comeback Request Action frame. The supported range is 100-2000 milliseconds, and the default value is 500 milliseconds.
Include this parameter to enable the Chargeable-User-Identity RADIUS attribute defined by RFC 4372. Home networks can use this attribute to identify a user for the roaming transactions that take place outside of that home network.
Include this parameter to enable the Location Data RADIUS attribute defined by RFC 5580. Enabling this parameter allows the RADIUS server to use user location data.

In the CLI
To configure a hotspot 2.0 profile from the controller CLI, access the CLI in config mode and issue the following commands:
wlan hotspot h2-profile <profile-name> access-network-type emergency-services|personal-device|private|private-guest|publicchargeable|public-free|test|wildcard addtl-roam-cons-ois <addtl-roam-cons-ois> advertisement-profile <profile-name> advertisement-protocol anqp|eas|mih-cmd-event|mih-info|rsvd asra clone <profile-name> comeback-mode gas-comeback-delay grp-frame-block hessid <id> hotspot-enable internet no .. p2p-cross-connect p2p-dev-mgmt pame-bi query-response-length-limit <query-response-length-limit> radius_cui radius_loc_data roam-cons-len-1 0|3|5 roam-cons-len-2 0|3|5 roam-cons-len-3 0|3|5 roam-cons-oi-1 <roam-cons-oi-1> roam-cons-oi-2 <roam-cons-oi-1> roam-cons-oi-3 <roam-cons-oi-1> time-advt-cap no-std-ext-timesrc|timestamp-offset-utc |reserved time-error <milliseconds> time-zone <time-zone> venue-group <venue-group> venue-type <venue-type>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.11u Hotspots | 924

Configuring Hotspot Advertisement Profiles
An advertisement profile defines a set of ANQP and H2QP profiles for the hotspot feature. Advertisement profiles can reference multiple instances of some ANQP and H2QP profile types, but only a single instance of other ANQP and H2QP profiles. The table below shows how the different ANQP and H2QP profile types can be associated to a single advertisement profile.

Table 195: Hotspot Advertisement Profile Associations One Instance per Advertisement Profile

Multiple Instances per Advertisement Profile

l ANQP IP address availability profile l H2QP WAN metrics profile l H2QP connection capability profile

l ANQP venue name profile l ANQP network authentication profile l ANQP foaming consortium profile l ANQP NAI realm profile l ANQP 3GPP cellular network profile l H2QP operator friendly name profile l H2QP operating class indication profile l ANQP domain Name profile

For more information on each of these profile types, see Hotspot Profile Types on page 917

Configuring an Advertisement Profile
The steps below describe the procedure to associate an advertisement profile to a set of ANQP and H2QP profiles. Note that the procedure to associate an ANQP or H2QP profile to an advertisement profile varies, depending upon whether the advertisement profile can reference just one instance or many instances of that profile type
In the WebUI
To configure an advertisement profile from the controller WebUI:
1. Navigate to Configuration>Advanced Services>All Profiles. 2. In the Profiles list, click Wireless LAN expand the Wireless LAN profiles section. 3. Select Advertisement. 4. Select an existing advertisement profile from the list of profiles in the Profiles list. pane or create a new
advertisement profile by entering a profile name into the entry blank on the Profile Details pane, then clicking Add. The ANQP and H2QP profiles associated with the selected advertisement profile appear below the advertisement profile in the Profiles list. 5. For an ANQP or H2QP profile type that can have only one instance associated with the advertisement profile: a. In the Profiles list, select the ANQP or H2QP profile type. b. Click the drop-down list in the Profile Details pane and select a profile name. 6. For an ANQP or H2QP profile type that can have multiple instances associated with the advertisement profile: a. In the Profiles list, select the ANQP or H2QP profile type. b. In the Profile Details pane, click the Add a Profile drop down list.

925 | 802.11u Hotspots

Dell Networking W-Series ArubaOS 6.4.x | User Guide

c. Select the name of the profile to associate with the advertisement profile. d. click Add. e. (Optional) To remove an existing reference to an ANQP or H2QP profile, select the profile name in the
Profile Details pane, then click Delete. 7. Click Apply .
In the CLI
To configure a advertisement profile from the controller CLI, access the CLI in config mode and issue the following commands: wlan hotspot advertisement profile <profile-name>
anqp-3gpp-nwk-profile <profile-name> anqp-domain-name-profile <profile-name> anqp-ip-addr-avail-profile <profile-name> anqp-nai-realm-profile <profile-name> anqp-nwk-auth-profile <profile-name> anqp-roam-cons-profile <profile-name> anqp-venue-name-profile <profile-name> clone <profile-name> h2qp-conn-cap-profile <profile-name> h2qp-op-cl-profile <profile-name> h2qp-operator-friendly-profile <profile-name> h2qp-wan-metrics-profile <profile-name> no ...
Associating the Advertisement Profile to a Hotspot 2.0 Profile
The settings in the ANQP and H2QP profiles referenced by the Advertisement profile will not be sent to clients until you associate the advertisement profile with an active hotspot 2.0 profile. By default, all hotspot 2.0 profiles reference the default advertisement profile.
In the WebUI
To associate a different advertisement profile to a hotspot 2.0 profile:
1. Navigate to Configuration>Advanced Services>All Profiles. 2. In the Profiles list, click Wireless LAN expand the Wireless LAN profiles section. 3. Select Hotspot 2.0. The list of available hotspot 2.0 profiles appears in the Profiles list. 4. In the Profiles list, select a hotspot 2.0 profile. 5. Click the Advertisement link that appears below the selected hotspot 2.0 profile. 6. In the Profile Details list, click the Advertisement Profile drop-down list and select a different
advertisement profile name. 7. Click Apply.
In the CLI
To associate a different advertisement profile to a hotspot 2.0 profile from the controller CLI, access the CLI in config mode and issue the following commands: wlan hotspot hs2-profile <hotspot-profile-name>
advertisement-profile <advertisement-profile-name>
Configuring ANQP Venue Name Profiles
Use this profile to define the venue group and venue type information be sent in an Access network Query Protocol (ANQP) information element in a Generic Advertisement Service (GAS) query response. If a client uses

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.11u Hotspots | 926

the Generic Advertisement Service (GAS) to post an ANQP query to an Access Point, the AP will return ANQP Information Elements with the values configured in this profile.
To send the values configured in this profile to clients, you must associate this profile with an advertisement profile, then associate the advertisement profile with a hotspot 2.0 profile. For details, see Configuring Hotspot Advertisement Profiles on page 925.
In the WebUI
To configure an ANQP venue name profile from the controller WebUI:
1. Navigate to Configuration>Advanced Services>All Profiles. 2. In the profiles list, expand the Wireless LAN section. 3. Select ANQP Venue Name. 4. Select an existing profile from the list of profiles on the profile details pane or create a new profile by
entering a profile name into the entry blank, then clicking Add. 5. Configure the following parameters as desired, then click Apply to save your settings.

Table 196: ANQP Venue Name Profile Parameters

Parameter

Description

Venue Group

Specify one of the following venue groups to be advertised in the ANQP Information Elements (IEs) from APs associated with this profile. The default setting is unspecified. l assembly l business l educational l factory-or-industrial l institutional l mercantile l outdoor l reserved l residential l storage l unspecified l Utility-Misc l Vehicular

Venue Language Code

An ISO 639 language code that identifies the language used in the Venue Name field.

Venue Name

Venue name to be advertised in the ANQP IEs from APs associated with this profile. If the venue name includes spaces, the name must be enclosed in quotation marks, e.g. "Midtown Shopping Center".

Venue Type

Specify a venue type to be advertised in the IEs from APs associated with this hotspot profile. The complete list of supported venue types is described the table below

927 | 802.11u Hotspots

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Venue Types
The following list describes the different venue types that may be configured in a Hotspot 2.0 or ANQP Venue Name profile:

l assembly-amphitheater l assembly-amusement-
park l assembly-arena l assembly-bar l assembly-coffee-shop l assembly-convention-
center l assembly-emer-coord-
center l assembly-library l assembly-museum l assembly-passenger-
terminal l assembly-restaurant l assembly-stadium l assembly-theater l assembly-worship-place l assembly-zoo l business-attorney l business-bank l business-doctor

l business-fire-station l business-police-station l business-post-office l business-professional-office l business-research-and-
development l educational-primary-school l educational-secondary-school l educational-university l industrial-factory l institutional-alcohol-or-drug-
rehab l institutional-group-home l institutional-hospital l institutional-prison l institutional-terminal-care l mercantile-automotive-service-
station l mercantile-gas-station l mercantile-grocery l mercantile-retail

l mercantile-shopping-mall l outdoor-bus-stop l outdoor-city-park l outdoor-kiosk l outdoor-muni-mesh-nwk l outdoor-rest-area l outdoor-traffic-control l residential-boarding-
house l residential-dormitory l residential-hotel l residential-private-
residence l unspecified l vehicular-airplane l vehicular-automobile l vehicular-bus l vehicular-ferry l vehicular-motor-bike l vehicular-ship l vehicular-train

In the CLI
To configure an ANQP venue name profile from the controller CLI, access the CLI in config mode and issue the following commands:
wlan hotspot anqp-venue-name-profile <profile-name> clone <profile-name> no ... venue-group outdoor|reserved|utility-misc|vehicular|assembly|business educational|factoryor-industrial|institutional|mercantile|residential| storage|unspecified venue-language <language> venue-name <venue-name> venue-type <venue-type>

Configuring ANQP Network Authentication Profiles
Use the ANQP Network Authentication profile to define the authentication type used by the hotspot network.
To send the values configured in this profile to clients, you must associate this profile with an advertisement profile, then associate the advertisement profile with a hotspot 2.0 profile. For details, see Configuring Hotspot Advertisement Profiles on page 925.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.11u Hotspots | 928

In the WebUI
To configure an ANQP network authentication profile from the controller WebUI:
1. Navigate to Configuration>Advanced Services>All Profiles. 2. In the profiles list, expand the Wireless LAN section. 3. Select ANQP Network Authentication. 4. Select an existing profile from the list of profiles on the profile details pane or create a new profile by
entering a profile name into the entry blank, then clicking Add. 5. Configure the following parameters as desired, then click Apply to save your settings.

Table 197: ANQP Network Authentication Profile Parameters

Parameter

Description

Type of Network Authentication

Network Authentication Type being used by the hotspot network.
l acceptance: Network requires the user to accept terms and conditions. This option requires you to specify a redirection URL string as an IP address, FQDN or URL.
l dns-redirection: Additional information on the network is provided through DNS redirection. This option requires you to specify a redirection URL string as an IP address, FQDN or URL.
l http-https-redirection: Additional information on the network is provided through HTTP/HTTPS redirection.
l online-enroll: Network supports online enrollment.

Network Authentication URL

URL, IP address, or FQDN used by the hotspot network for the acceptance or dns-redirection network authentication types.

In the CLI
To configure an ANQP network authentication profile from the controller CLI, access the CLI in config mode and issue the following commands: wlan hotspot anqp-nwk-auth-profile <profile-name>
clone <profile-name> no ... nwk-auth-type acceptance|dns-redirection|http-https-redirection|online-enroll url <url>
Configuring ANQP Domain Name Profiles
This profile defines the hotspot operator domain name to be sent in an Access Network Query Protocol (ANQP) information element in a Generic Advertisement Service (GAS) query response. To send the values configured in this profile to clients, you must associate this profile with an advertisement profile, then associate the advertisement profile with a hotspot 2.0 profile. For details, see Configuring Hotspot Advertisement Profiles on page 925.
In the WebUI
To configure an ANQP domain name profile from the controller WebUI: 1. Navigate to Configuration>Advanced Services>All Profiles. 2. In the profiles list, expand the Wireless LAN section.

929 | 802.11u Hotspots

Dell Networking W-Series ArubaOS 6.4.x | User Guide

3. Select ANQP Domain Name. 4. Select an existing profile from the list of profiles on the profile details pane or create a new profile by
entering a profile name into the entry blank, then clicking Add. 5. In the Domain Name field, enter the domain name of the hotspot operator. This alphanumeric text string
must be 32 characters or less. 6. Click Apply.
In the CLI
To configure an ANQP domain name profile from the controller CLI, access the CLI in config mode and issue the following commands: wlan hotspot anqp-domain-name-profile <profile-name>
clone <profile-name> domain-name <domain-name> no ...
Configuring ANQP IP Address Availability Profiles
Use this profile to specify the types of IPv4 and IPv6 IP addresses available in the hotspot network. This information is sent in an Access network Query Protocol (ANQP) information element in a Generic Advertisement Service (GAS) query response. To send the values configured in this profile to clients, you must associate this profile with an advertisement profile, then associate the advertisement profile with a hotspot 2.0 profile. For details, see Configuring Hotspot Advertisement Profiles on page 925.
In the WebUI
To configure an ANQP IP address availability profile from the controller WebUI: 1. Navigate to Configuration>Advanced Services>All Profiles. 2. In the profiles list, expand the Wireless LAN section. 3. Select ANQP IP Address Availability 4. Select an existing profile from the list of profiles on the profile details pane or create a new profile by
entering a profile name into the entry blank, then clicking Add. 5. Configure the following parameters as desired, then click Apply to save your settings.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.11u Hotspots | 930

Table 198: ANQP IP Address Availability Profile Parameters Parameter Description

IPv4 Address Availability Type

Indicate the availability of an IPv4 network by clicking the IPv4 Address Availability Type dropdown list and selecting one of the following options:
l availability-unknown: Network availability cannot be determined.
l not-available: Network is not available.
l port-restricted: Some ports are restricted (e.g., the network blocks port 110 to restrict POP mail).
l port-restricted-double-nated: Some ports are restricted and multiple routers perform network address translation.
l port-restricted-single-nated: Some ports are restricted and a single router performs network address translation.
l private-double-nated: Network is a private network with multiple routers doing network address translation.
l private-single-nated: Network is a private network a single router doing network address translation.
l public: Network is a public network.

IPv6 Address Availability Type

Indicate the availability of an IPv6 network by clicking the IPv6 Address Availability Type dropdown list and selecting one of the following options:
l available: An IPv6 network is available. l availability-unknown: Network availability cannot be determined. l not-available: Network is not available.

In the CLI
To configure an ANQP IP address availability profile from the controller CLI, access the CLI in config mode and issue the following commands: wlan hotspot anqp-ip-addr-avail-profile <profile-name>
clone <profile-name> ipv4-addr-avail availability-unknown|not-available|port-restricted|port-restricted-doublenated|port-restricted-single-nated|private-double-nated|private-single-nated ipv6-addr-avail available|availability-unknown|not-available no ...
Configuring ANQP NAI Realm Profiles
An AP's NAI Realm profile identifies and describes a Network Access Identifier (NAI) realm accessible using the AP, and the method that this NAI realm uses for authentication. These settings configured in this profile determine the NAI realm elements that are included as part of a GAS Response frame.
To send the values configured in this profile to clients, you must associate this profile with an advertisement profile, then associate the advertisement profile with a hotspot 2.0 profile. For details, see Configuring Hotspot Advertisement Profiles on page 925.
In the WebUI
To configure an ANQP NAI Realm profile from the controller WebUI:

931 | 802.11u Hotspots

Dell Networking W-Series ArubaOS 6.4.x | User Guide

1. Navigate to Configuration>Advanced Services>All Profiles. 2. In the profiles list, expand the Wireless LAN section. 3. Select ANQP NAI Realm 4. Select an existing profile from the list of profiles on the profile details pane or create a new profile by
entering a profile name into the entry blank, then clicking Add. 5. Configure the following parameters as desired, then click Apply.

Table 199: ANQP NAI Realm Profile Parameters

Parameter

Description

NAI Realm name

Name of the NAI realm. The realm name is often the domain name of the service provider.

NAI Realm Encoding NAI Realm EAP Method

Issue this command if the NAI realm name is a UTF-8 formatted character string that is not formatted in accordance with IETF RFC 4282.
Select one of the options below to identify the EAP authentication method supported by the hotspot realm.
l crypto-card: Crypto card authentication l eap-aka: EAP for Universal Mobile Telecommunications System
(UMTS) Authentication and Key Agreement l eap-sim: EAP for GSM Subscriber Identity Modules l eap-tls: EAP-Transport Layer Security l eap-ttls: EAP-Tunneled Transport Layer Security l generic-token-card: EAP Generic Token Card (EAP-GTC) l identity: EAP Identity type l notification: The hotspot realm uses EAP Notification messages for
authentication. l one-time-password: Authentication with a single-use password l peap: Protected Extensible Authentication Protocol l peap-mschapv2: Protected Extensible Authentication Protocol with
Microsoft Challenge Handshake Authentication Protocol version 2

NAI Realm Authentication Param ID 1

Use the NAI Realm Authentication Param ID 1 parameter to send the one of the following authentication methods for the primary NAI realm ID.
l credential-type: The specified authentication ID uses credential authentication.
l expanded-eap: The specified authentication ID uses the expanded EAP authentication method.
l expanded-inner-eap: The specified authentication ID uses the expanded inner EAP authentication method.
l inner-auth-eap: The specified authentication ID uses inner EAP authentication type.
l non-eap-inner-auth: The specified authentication ID uses non-EAP inner authentication type.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.11u Hotspots | 932

Parameter NAI Realm Authentication Param Value 1
NAI Realm Authentication Param ID 2

Description
Use the NAI Realm Authentication Param Value 1 parameter select an authentication value for the authentication method specified by the NAI Realm Authentication Param ID 1 parameter. l cred-cert: Credential - Certificate l cred-hw-token: Credential - Hardware Token l cred-nfc: Credential - NFC l cred-none: Credential - None l cred-rsvd: Credential - Reserved l cred-sim: Credential - SIM l cred-soft-token: Credential - Soft Token l cred-user-pass: Credential - Username/password l cred-usim: Credential - USIM l cred-vendor-spec: Credential - Vendor-specific l eap-crypto-card: EAP Method - Crypto-card l eap-generic-token-card: EAP Method - Generic-Token-Card l eap-identity: EAP Method - Identity l eap-method-aka: EAP Method - AKA l eap-method-sim: EAP Method - SIM - GSM Subscriber Iden l eap-method-tls: EAP Method - TLS - Transport Layer Sec l eap-method-ttls: EAP Method - TTLS - Tunneled Transport Security l eap-notification: EAP Method - Notification l eap-one-time-password: EAP Method - One-Time-Password l eap-peap: EAP Method - PEAP l eap-peap-mschapv2: EAP Method - PEAP MSCHAP V2 l non-eap-chap: Non-EAP Method - CHAP l non-eap-mschap: Non-EAP Method - MSCHAP l non-eap-mschapv2: Non-EAP Method - MSCHAPv2 l non-eap-pap: Non-EAP Method - PAP l non-eap-rsvd: Non-EAP Method - Reserved for future use l reserved: Reserved for Future use
Use the NAI Realm Authentication ID Value 2 parameter to send the one of the following authentication methods for the secondary NAI realm ID.
l credential-type: The specified authentication ID uses credential authentication.
l expanded-eap: The specified authentication ID uses the expanded EAP authentication method.
l expanded-inner-eap: The specified authentication ID uses the

933 | 802.11u Hotspots

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter NAI Realm Authentication Param Value 2
NAI Home Realm

Description
expanded inner EAP authentication method. l inner-auth-eap: The specified authentication ID uses inner EAP
authentication type. l non-eap-inner-auth: The specified authentication ID uses non-EAP
inner authentication type.
Use the NAI Realm Authentication Param Value 2 parameter select an authentication value for the authentication method specified by the NAI Realm Authentication Param ID 2 parameter.
l cred-cert: Credential - Certificate l cred-hw-token: Credential - Hardware Token l cred-nfc: Credential - NFC l cred-none: Credential - None l cred-rsvd: Credential - Reserved l cred-sim: Credential - SIM l cred-soft-token: Credential - Soft Token l cred-user-pass: Credential - Username/password l cred-usim: Credential - USIM l cred-vendor-spec: Credential - Vendor-specific l eap-crypto-card: EAP Method - Crypto-card l eap-generic-token-card: EAP Method - Generic-Token-Card l eap-identity: EAP Method - Identity l eap-method-aka: EAP Method - AKA l eap-method-sim: EAP Method - SIM - GSM Subscriber Iden l eap-method-tls: EAP Method - TLS - Transport Layer Sec l eap-method-ttls: EAP Method - TTLS - Tunneled Transport Security l eap-notification: EAP Method - Notification l eap-one-time-password: EAP Method - One-Time-Password l eap-peap: EAP Method - PEAP l eap-peap-mschapv2: EAP Method - PEAP MSCHAP V2 l non-eap-chap: Non-EAP Method - CHAP l non-eap-mschap: Non-EAP Method - MSCHAP l non-eap-mschapv2: Non-EAP Method - MSCHAPv2 l non-eap-pap: Non-EAP Method - PAP l non-eap-rsvd: Non-EAP Method - Reserved for future use l reserved: Reserved for Future use
Mark the realm in this profile as the NAI Home Realm

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.11u Hotspots | 934

In the CLI
To configure an ANQP NAI realm profile from the controller CLI, access the CLI in config mode and issue the following commands: wlan hotspot anqp-nai-realm-profile <profile-name>
clone <profile-name> nai-home-realm nai-realm-auth-id-1|nai-realm-auth-id-2 {credential-type|expanded-eap|expanded-innereap|inner-auth-eap|non-eap-inner-auth|tunneled-eap-credential-type} nai-realm-auth-value-1|nai-realm-auth-value-2 {cred-cert|cred-hw-token|cred-nfc|crednone|cred-rsvd|cred-sim|cred-soft-token|cred-user-pass|cred-usim|cred-vendor-spec|eapcrypto-card|eap-generic-token-card|eap-identity|eap-method-aka|eap-method-sim|eap-methodtls|eap-method-ttls|eap-notification|eap-one-time-password|eap-peap|eap-peap-mschapv2|noneap-chap|non-eap-mschap|non-eap-mschapv2|non-eap-pap|non-eap-rsvd|reserved} nai-realm-eap-method crypto-card|eap-aka|eap-sim|eap-tls|eap-ttls|generic-token-
card|identity|notification|one-time-password|peap|peap-mschapv2 nai-realm-encoding nai-realm-name <nai-realm-name> no ...
Configuring ANQP Roaming Consortium Profiles
Organization Identifiers (OIs) are assigned to service providers when they register with the IEEE registration authority. You can specify the OI for the hotspot's service provider in the ANQP Roaming Consortium profile using the ANQP Roaming Consortium Profile. The Hotspot 2.0 profile also allows you to define and send up to three additional roaming consortium OIs for the service provider's top three roaming partners.
To send the values configured in this profile to clients, you must associate this profile with an advertisement profile, then associate the advertisement profile with a hotspot 2.0 profile. For details, see Configuring Hotspot Advertisement Profiles on page 925.
In the WebUI
To configure an ANQP roaming consortium profile from the controller WebUI:
1. Navigate to Configuration>Advanced Services>All Profiles. 2. In the profiles list, expand the Wireless LAN section. 3. Select ANQP Roaming Consortium. 4. Select an existing profile from the list of profiles on the profile details pane or create a new profile by
entering a profile name into the entry blank, then clicking Add. 5. Configure the following parameters as desired, then click Apply to save your settings.

935 | 802.11u Hotspots

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 200: ANQP Roaming Consortium Profile Parameters

Parameter

Description

Roaming consortium OI Len

Length of the OI. The value of the Roaming consortium OI Len parameter must equal upon the number of octets of the Roaming Consortium OI field. l 0: 0 Octets in the OI (Null) l 3: OI length is 24-bit (3 Octets) l 5: OI length is 36-bit (5 Octets)

Roaming Consortium OI

Send the specified roaming consortium OI in a GAS query response. The OI must be a hexadecimal number 3-5 octets in length.

In the CLI
To configure an ANQP roaming consortium profile from the controller CLI, access the CLI in config mode and issue the following commands: wlan hotspot anqp-roam-cons-profile <profile-name>
clone <profile-name> no ... roam-cons-oi <roam-cons-oi> roam-cons-oi-len <roam-cons-oi-len>
Configuring ANQP 3GPP Cellular Network Profiles
Use this profile to define priority information for a 3rd Generation Partnership Project (3GPP) Cellular Network used by hotspots that have roaming relationships with cellular operators. To send the values configured in this profile to clients, you must associate this profile with an advertisement profile, then associate the advertisement profile with a hotspot 2.0 profile. For details, see Configuring Hotspot Advertisement Profiles on page 925.
In the WebUI
To configure an ANQP 3GPP cellular network profile from the controller WebUI: 1. Navigate to Configuration>Advanced Services>All Profiles. 2. In the profiles list, expand the Wireless LAN section. 3. Select ANQP 3GPP Cellular Network. 4. Select an existing profile from the list of profiles on the profile details pane or create a new profile by
entering a profile name into the entry blank, then clicking Add. 5. Configure the following parameters as desired, then click Apply to save your settings.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.11u Hotspots | 936

Table 201: ANQP 3GPP Cellular Network Profile Parameters

Parameter

Description

3GPP PLMN1

The Public Land Mobile Networks (PLMN) value of the highest-priority network.
The PLMN is comprised of a 12-bit Mobile Country Code (MCC) and the 12-bit Mobile Network Code (MNC).

3GPP PLMN2

The Public Land Mobile Networks (PLMN) value of the second-highest priority network.
The PLMN is comprised of a 12-bit Mobile Country Code (MCC) and the 12-bit Mobile Network Code (MNC).

3GPP PLMN3

The Public Land Mobile Networks (PLMN) value of the third-highest priority network.
The PLMN is comprised of a 12-bit Mobile Country Code (MCC) and the 12-bit Mobile Network Code (MNC).

3GPP PLMN4

The Public Land Mobile Networks (PLMN) value of the fourth-highest priority network.
The PLMN is comprised of a 12-bit Mobile Country Code (MCC) and the 12-bit Mobile Network Code (MNC).

3GPP PLMN5

The Public Land Mobile Networks (PLMN) value of the fifth-highest priority network.
The PLMN is comprised of a 12-bit Mobile Country Code (MCC) and the 12-bit Mobile Network Code (MNC).

3GPP PLMN6

The Public Land Mobile Networks (PLMN) value of the sixth-highest priority network.
The PLMN is comprised of a 12-bit Mobile Country Code (MCC) and the 12-bit Mobile Network Code (MNC).

In the CLI
To configure an ANQP 3GPP network profile from the controller CLI, access the CLI in config mode and issue the following commands:
wlan hotspot anqp-3gpp-nwk-profile <profile-name> 3gpp_plmn1 <3GPP PLMN1 data> 3gpp_plmn2 <3GPP PLMN2 data> 3gpp_plmn3 <3GPP PLMN3 data> 3gpp_plmn4 <3GPP PLMN4 data> 3gpp_plmn5 <3GPP PLMN5 data> 3gpp_plmn6 <3GPP PLMN6 data> clone <profile-name> enable no ...
Configuring H2QP Connection Capability Profiles
Use this profile to specify hotspot protocol and port capabilities. This information is sent in a Access Network Query Protocol (ANQP) information element in a Generic Advertisement Service (GAS) query response.

937 | 802.11u Hotspots

Dell Networking W-Series ArubaOS 6.4.x | User Guide

To send the values configured in this profile to clients, you must associate this profile with an advertisement profile, then associate the advertisement profile with a hotspot 2.0 profile. For details, see Configuring Hotspot Advertisement Profiles on page 925.
In the WebUI
To configure a H2QP connection capability profile from the controller WebUI: 1. Navigate to Configuration>Advanced Services>All Profiles. 2. In the profiles list, expand the Wireless LAN section. 3. Select H2QP Connection Capability. 4. Select an existing profile from the list of profiles on the profile details pane or create a new profile by
entering a profile name into the entry blank, then clicking Add. 5. Configure the following parameters as desired, then click Apply to save your settings.

Table 202: ANQP Connection Capability Profile Parameters

Parameter

Description

H2QP Connection Capability ICMP Port

Select this option to enable the ICMP port. (port 0)

H2QP Connection Capability FTP port (TCP Protocol)

Select this option to enable the FTP port. (port 20)

H2QP Connection Capability SSH port (TCP Protocol)

Select this option to enable the SSH port. (port 22)

H2QP Connection Capability HTTP port (TCP Protocol)

Select this option to enable the HTTP port. (port 80)

H2QP Connection Capability TLS VPN port (TCP Protocol)

H2QP Connection Capability TLS VPN port(TCP Protocol)

H2QP Connection Capability PPTP Select this option to enable the PPTP port used by IPSec VPNs. (port

VPN port (TCP Protocol)

1723)

H2QP Connection Capability VOIP Select this option to enable the TCP VoIP port. (port 5060) port (TCP Protocol)

H2QP Connection Capability VOIP port (UDP Protocol)

Select this option to enable the UDP VoIP port. (port 5060)

H2QP Connection Capability IKEv2 port for IPSec VPN

Select this option to enable the IPsec VPN port. (ports 500, 4500 and 0)

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.11u Hotspots | 938

Parameter

Description

H2QP Connection Capability May be used by IKEv2 port for IPSec VPN

Select this option to enable the IKEv2 port 4500.

H2QP Connection Capability IKEv2 port for IPSec VPN

Select this option to enable the IKEv2 port 500.

H2QP Connection Capability ESP port(Used by IPSec VPN)

Include this parameter to enable the Encapsulating Security Payload (ESP) port used by IPSec VPNs. (port 0)

In the CLI
To configure a H2QP connection capability profile from the controller CLI, access the CLI in config mode and issue the following commands:
wlan hotspot h2qp-conn-capability-profile <profile> clone <profile-name> esp icmp no ... tcp-ftp tcp-http tcp-pptp-vpn tcp-ssh tcp-tls-vpn tcp-voip udp-ike2-4500 udp-ike2-500 udp-ipsec-vpn udp-voip

Configuring H2QP Operator Friendly Name Profiles
This profile defines an operator-friendly name sent by devices using this profile. To send the values configured in this profile to clients, you must associate this profile with an advertisement profile, then associate the advertisement profile with a hotspot 2.0 profile. For details, see Configuring Hotspot Advertisement Profiles on page 925.
In the WebUI
To configure a H2QP operating class profile from the controller WebUI: 1. Navigate to Configuration>Advanced Services>All Profiles. 2. In the profiles list, expand the Wireless LAN section. 3. Select H2QP Operator Friendly Name. 4. Select an existing profile from the list of profiles on the profile details pane or create a new profile by
entering a profile name into the entry blank, then clicking Add. 5. Configure the following parameters as desired, then click Apply to save your settings.

939 | 802.11u Hotspots

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 203: H2QP Operator Friendly Name Profile Parameters

Parameter

Description

Operator Friendly Name Language Code

An ISO 639 language code that identifies the language used in the Operator Friendly Name field

Operator Friendly Name

An operator-friendly name sent by devices using this profile. The name can be up to 64 alphanumeric characters, and can include special characters and spaces. If the name includes quotation marks ("), include a backslash character (\) before each quotation mark. (e.g. \"example\")

In the CLI
To configure a H2QP operator friendly name profile from the controller CLI, access the CLI in config mode and issue the following commands:
wlan hotspot h2qp-operator-friendly-name-profile <profile> clone <profile-name> no ... op-fr-name <op-fr-name> op-lang-code <op-lang-code>

Configuring H2QP Operating Class Indication Profiles
The values configured in this H2QP Operating Class Indication profile list the channels on which the hotspot is capable of operating. It may be useful where, for instance, a mobile device discovers a hotspot in the 2.4 GHz band but finds it is dual-band and prefers the 5 GHz band.
To send the values configured in this profile to clients, you must associate this profile with an advertisement profile, then associate the advertisement profile with a hotspot 2.0 profile. For details, see Configuring Hotspot Advertisement Profiles on page 925.
In the WebUI
To configure a H2QP operating class indication profile from the controller WebUI:
1. Navigate to Configuration>Advanced Services>All Profiles. 2. In the profiles list, expand the Wireless LAN section. 3. Select H2QP Operating Class Indication. 4. Select an existing profile from the list of profiles on the profile details pane or create a new profile by
entering a profile name into the entry blank, then clicking Add. 5. In the H2QP Operating Class field, enter a valid operating class value. (For a definition of these global
operating classes refer to Table E-4 of IEEE Std 802.11-2012, Annex E.) 6. Click Apply.
In the CLI
To configure a H2QP operating class profile from the controller CLI, access the CLI in config mode and issue the following commands: wlan hotspot h2qp-op-cl-profile <profile>
clone <profile-name> op-cl <1-255>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.11u Hotspots | 940

Configuring H2QP WAN Metrics Profiles
Use this profile to specify the WAN status and link metrics for your hotspot. To send the values configured in this profile to clients, you must associate this profile with an advertisement profile, then associate the advertisement profile with a hotspot 2.0 profile. For details, see Configuring Hotspot Advertisement Profiles on page 925.
In the WebUI
To configure an ANQP venue name profile from the controller WebUI: 1. Navigate to Configuration>Advanced Services>All Profiles. 2. In the profiles list, expand the Wireless LAN section. 3. Select H2QP WAN Metrics. 4. Select an existing profile from the list of profiles on the profile details pane or create a new profile by
entering a profile name into the entry blank, then clicking Add. 5. Configure the following parameters as desired, then click Apply to save your settings.

Table 204: H2QP WAN Metrics Profile Parameters

Parameter

Description

H2QP WAN metrics link status

Define the status of the WAN Link by clicking the H2QP WAN metrics link status drop-down list, and selecting one of the following values. The default link status is reserved, which indicates that the link status is unknown or unspecified

l link down: WAN link is down. l link test: WAN link is currently in a test state. l link up: WAN link is up. l reserved: This parameter is reserved by the Hotspot 2.0 specification, and
cannot be configured. Default: reserved

H2QP WAN metrics sym- Select this checkbox to indicate that the WAN Link has same speed in both the uplink

metric WAN link

and downlink directions.

H2QP WAN metrics link at capacity

Select this checkbox to indicate that the WAN Link has reached its maximum capacity. If this parameter is enabled, no additional mobile devices will be permitted to associate to the hotspot AP.

WAN Metrics uplink speed

This parameter defines the current WAN uplink speed in Kbps. If no value is set, this parameter will show a default value of 0 to indicate that the uplink speed is unknown or unspecified.
Range: 0 - 2147483647, Default: 0

WAN Metrics downlink speed

This parameter defines the current WAN backhaul downlink speed in Kbps. If no value is set, this parameter will show a default value of 0 to indicate that the downlink speed is unknown or unspecified.
Range: 0 - 2147483647, Default: 0

WAN Metrics uplink

This parameter defines the percentage of the WAN uplink that is currently utilized. If

941 | 802.11u Hotspots

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter

Description

load

no value is set, this parameter will show a default value of 0 to indicate that the downlink speed is unknown or unspecified.
Range: 0-100; Default: 0

WAN Metrics downlink load

This parameter defines the percentage of the WAN downlink that is currently in use. If no value is set, this parameter will show a default value of 0 to indicate that the downlink speed is unknown or unspecified.
Range: 0-100; Default: 0

WAN Metrics load meas- Duration over which the downlink load is measured, in tenths of a second.

urement duration

Range: 0-65535; Default: 0

In the CLI
To configure a H2QP WAN metrics profile from the controller CLI, access the CLI in config mode and issue the following commands:
wlan hotspot h2qp-wan-metrics-profile <profile-name> at-capacity clone <profile-name> downlink-load downlink-speed load-dur no ... symm-link uplink-load uplink-speed wan-metrics-link-status link_down|link_test|link_up|reserved

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.11u Hotspots | 942

Chapter 37 Adding Local Controllers

This chapter explains how to expand your network by adding a local controller to a master controller configuration. Typically, this is the first expansion of a network with just one controller (which is a master controller). This chapter is a basic discussion of creating master-local controller configurations. More complicated multi-controller configurations are discussed in other chapters.
This chapter describes the following topics:
l Moving to a Multi-Controller Environment on page 944 l Configuring Local Controllers on page 946
Moving to a Multi-Controller Environment
For a single WLAN configuration, the master controller is the controller which controls the RF and security settings of the WLAN. Additional controllers to the same WLAN serve as local switches to the master controller. The local controller operates independently of the master controller and depends on the master controller only for its security and RF settings. You configure the layer-2 and layer-3 settings on the local controller independent of the master controller. The local controller needs to have connectivity to the master controller at all times to ensure that any changes on the master are propagated to the local controller.
Some of the common reasons to move from a single to a multi-controller-environment include:
l Scaling to include a larger coverage area l Setting up remote Access Points (APs) l Network setup requires APs to be redistributed from a single controller to multiple controllers
You can use a pre-shared key (PSK) or a certificate to create IPSec tunnels between a master and backup master controllers and between master and local controllers. These inter-controller IPsec tunnels carry management traffic such as mobility, configuration, and master-local information.
An inter-controller IPsec tunnel can be used to route data between networks attached to the controllers if you have installed PEFV licenses in the controllers. To route traffic, configure a static route on each controller specifying the destination network and the name of the IPsec tunnel.
There is a default PSK to allow inter-controller communications, however, for security you need to configure a unique PSK for each controller pair. You can use either the WebUI or CLI to configure a 6-64 character PSK on master and local controllers. To configure a unique PSK for each controller pair, you must configure the master controller with the IP address of the local and the PSK, and configure the local controller with the IP address of the master and the PSK.
You can configure a global PSK for all master-local communications, although this is not recommended for networks with more than two controllers. On the master controller, use 0.0.0.0 for the IP address of the local. On the local controller, configure the IP address of the master and the PSK.
The local controller can be located behind a NAT device or over the Internet. On the local controller, when you specify the IP address of the master controller, use the public IP address for the master.
If your master and local controllers use PSK for authentication, the IPsec tunnel will be created using IKEv1. If they use a factory-installed or custom certificate, they will use IKEv2 to create the IPsec tunnel. Controllers using IKEv2 and custom-installed certificates can optionally use Suite-B encryption for IPsec encryption. For details and requirements for Suite-B encryption, see Suite-B Cryptography on page 492.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Adding Local Controllers | 944

Configuring a PSK
Leaving the PSK set to the default value exposes the IPsec channel to serious risk, therefore you should always configure a unique PSK for each controller pair. Sharing the same PSK between more than two controllers increases the likelihood of compromise. If one controller is compromised, all controllers are compromised. Therefore, best security practices include configuring a unique PSK for each controller pair
Do not use the default global PSK on a master or stand-alone controller. If you have a multi-controller network then configure the local controllers to match the new IPsec PSK key on the master controller.
Weak keys are susceptible to offline dictionary attacks, meaning that a hostile eavesdropper can capture a few packets during connection setup and derive the PSK, thus compromising the connection. Therefore the PSK selection process should be the same process as selecting a strong passphrase: l the PSK should be at least ten characters in length l the PSK should not be a dictionary word l the PSK should combine characters from at least three of the following four groups:
n lowercase characters n uppercase characters n numbers n punctuation or special characters, such as !~`@#$%^&*()_-+=\|//.[]{} The following sections describe how to configure a PSK using the WebUI or CLI.
Configuring a Master Controller PSK
Use the procedure below to configures the IP address and preshared key for the master controller.
In the WebUI To configure a master controller PSK: 1. Navigate to the Configuration > Network > Controller > System Settings page. 2. In the IPSEC Key (IKE PSK) field, enter the IPSec key. Reenter this key in the Retype IPSEC Key (IKE PSK)
field. 3. (Optional) In the FQDN field, enter a fully qualified domain name used in IKE. 4. (Optional) Click the Source IP address field and select the VLAN ID of Vlan interface to initiate IKE. The
controller IP address will be used if the VLAN is not specified. 5. Click Apply.
In the CLI On the master controller you can configure a specific IPsec PSK for a local controller and use the localip 0.0.0.0 ipsec <secret_key> command:
You need to change the secret key to a non-default PSK value even if you use a per-local controller PSK configuration.
To configure a master controller PSK: (host)(config) #localip 0.0.0.0 ipsec <secret_key> (host)(config) #localip <ipaddr> ipsec <secret_key>

945 | Adding Local Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Configuring a Local Controller PSK
Use the procedure below to configure the IP address and PSK for the local controller.
In the WebUI To configure a local controller PSK: 1. Navigate to Configuration > Network > Controller > System Settings. 2. The procedure to configure a local PSK varies, depending upon whether it is configured using a local
controller or a master controller. l On a local controller, enter the IPsec key in the IPSec Key (IKE PSK) and Retype IPSec Key (IKE PSK)
fields. l On a master controller, click New under Local Controller IPSec Keys. then enter the local controller IP
address and then enter and retype the IPsec key. Click Add. 3. Click Apply.
In the CLI To configure a local controller PSK:
On the local controller the PSK must match the master controller's PSK.

(host)(config) #masterip <ipaddr> ipsec <secret_key> [fqdn <fqdn>][uplink][vlan <id>]
Configuring a Controller Certificate
The following sections describe how to use the command-line interface to select a factory-installed or custom certificate for secure inter-controller communication.
Configuring a Local Controller Certificate
l Issue the following command on a master controller to configure the factory-installed certificate for secure communication between that master and a local controller. (host)(config) #local-factory-cert local-mac <mac> In this command, <mac> is the MAC address of the local controller's factory-installed certificate.
l Issue the following command on a master controller to configure a custom certificate for secure communication between that master and a local controller. (host)(config) #local-custom-cert local-mac <mac> ca-cert <ca> server-cert <cert> suite-b <gcm-128 | gcm-256> In this command, <mac> is the MAC address of the local controller's custom certificate.
Configuring a Master Controller Certificate
Issue the following command on a local controller to configure the preshared key or certificate for the master controller. (host)(config) #masterip <ipaddr>
ipsec <key> [interface uplink|{vlan <id>}] [fqdn <fqdn>] ipsec-custom-cert master-mac1 <mac1> [master-mac2 <mac2>] ca-cert <ca> server-cert <cert> [interface uplink|{vlan <id>}] [fqdn <fqdn>] [suite-b gcm-128|gcm-256] ipsec-factory-cert master-mac1 <mac1> [master-mac2 <mac2>] [interface uplink|{vlan <id>}] [fqdn <fqdn>]

Configuring Local Controllers
The steps involved in migrating from a single to a multi-controller environment are:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Adding Local Controllers | 946

1. Configure the role of the local controller to local and specify the IP address of the master. 2. Configure the layer-2 / layer-3 settings on the local controller (VLANs, IP subnets, IP routes). 3. Configure as trusted ports the ports the master and local controller use to communicate with each other. 4. For those APs that need to boot off the local controller, configure the LMS IP address to point to the new
local controller. 5. Reboot the APs that are already on the network, so that they now connect to the local controller. These steps are explained below. You configure the role of a controller by running the initial setup on an unconfigured controller, or by using the WebUI, Controller Wizard, or CLI on a previously-configured controller.
Using the Initial Setup
Initial setup can be done using the browser-based Setup Wizard or by accessing the initial setup dialog via a serial port connection. Both methods are described in the Dell Networking W-Series ArubaOS Quick Start Guide and are referred throughout this section as "initial setup". The initial setup allows you to configure the IP address of the controller and its role, in addition to other operating parameters. You perform the initial setup the first time you connect to and log into the controller or whenever the controller is reset to its factory default configuration (after executing a write erase, reload sequence). When prompted to enter the controller role in the initial setup, select or enter local to set the controller operational mode to be a local controller. You are then prompted for the master controller IP address. Enter the IP address of the master controller for the WLAN network. Enter the preshared key (PSK) that is used to authenticate communications between controllers.
You need to enter the same PSK on the master controller and on the local controllers that are managed by the master.
In the WebUI
For a controller that is up and operating with layer-3 connectivity, configure the following to set the controller as local: 1. Navigate to Configuration > Network > Controller > System Settings. 2. Set the Controller Role to Local. 3. Enter the IP address of the master controller. If master redundancy is enabled on the master, this address
should be the VRRP address for the VLAN instance corresponding to the IP address of the controller. 4. Enter the PSK that is used to authenticate communications between controllers.
You need to enter the same PSK on the master controller and on the local controllers that are managed by the master.
In the CLI
For a controller that is up and operating with layer-3 connectivity, configure the following to set the controller as local: (host)(config) #masterip <ipaddr> ipsec <key>
Configuring Layer-2/Layer-3 Settings
Configure the VLANs, subnets, and IP address on the local controller for IP connectivity. Verify connectivity to the master controller by pinging the master controller from the local controller.

947 | Adding Local Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Ensure that the master controller recognizes the new controller as its local controller. The local controller should be listed with type local in the Monitoring > Network > All WLAN Controllers page on the master. It takes about 4­5 minutes for the master and local controllers to synchronize configurations.
Configuring Trusted Ports
On the local controller, navigate to the Configuration > Network > Ports page and make sure that the port on the local controller connecting to the master is trusted. On the master controller, check this for the port on the master controller that connects to the local controller.
Configuring Local Controller Settings
Many controller settings are unique to that device and therefore are not replicated from a master controller to a local controller. The following settings must be manually configured on a local controller that synchronizes with the master controller. l Time zone and daylight savings time settings l VPN pools for remote APs and other VPN clients. l Controller and IP interfaces. (Note that these values may need to be set before synchronization with the
master so the synchronization can properly complete.) l IP routing and spanning-tree configurations l Remote AP whitelist and local-user database values
By default, the local controllers forward the authentication requests for the RAP whitelist and the local user database to the master controller. Therefore, this data does not have to be manually replicated unless the default behavior has been altered. The user table is NOT synchronized, so if an AP fails over to a master from a local or vice versa, that AP will have to re-authenticate.
l DHCP pools l NAT pools l SNMP, NTP, and syslog settings l Hostnames, DNS and SMTP servers l ACLs applied to ports l Certificates l RADIUS client details and RADIUS source interfaces l Stateful firewall settings l Customized captive portal pages and images, and the captive portal redirect address.
If you want to configure GRE tunnel between master and local controllers, you should use controller-IPs as tunnel endpoints.
Configuring APs
APs download their configurations from a master controller. However, an AP or AP group can tunnel client traffic to a local controller. To specify the controller to which an AP or AP group tunnels client traffic, you configure the LMS IP in the AP system profile on the master controller. Configuration changes take effect only after you reboot the affected APs; this allows them to reassociate with the local controller. After rebooting, these APs appear to the new local controller as local APs.
In the WebUI
To configure the LMS IP:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Adding Local Controllers | 948

1. Navigate to Configuration > Wireless > AP Configuration. n If you select AP Group, click Edit for the AP group name for which you want to configure the LMS IP. n If you select AP Specific, select the name of the AP for which you want to configure the LMS IP.
2. Under the Profiles section, select AP to display the AP profiles. 3. Select the AP system profile you want to modify. 4. Enter the controller IP address in the LMS IP field. 5. Click Apply.
In the CLI
To configure the LMS IP: (host)(config) #ap system-profile <profile-name> (host) (AP system profile "default") #lms-ip <ipaddr>
(host)(config) #ap-group <group-name> (host) (AP group "default") #ap-system-profile <profile>
(host)(config) #ap-name <profile-name> (host) (AP name "default") #ap-system-profile <profile>

949 | Adding Local Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Chapter 38 Advanced Security

Extreme Security (xSec) is a cryptographically secure, Layer-2 tunneling network protocol implemented over the 802.1x protocol. The xSec protocol can be used to secure Layer-2 traffic between the controller and wired and wireless clients, or between controllers.
xSec is an optional ArubaOS software module. You must purchase and install the license for the xSec software module on the controller.
This chapter describes the following topics: l Securing Client Traffic on page 950 l Securing Controller-to-Controller Communication on page 957 l Configuring the Odyssey Client on Client Machines on page 959 xSec encrypts an original Layer-2 data frame inside a Layer-2 xSec frame, the contents of which are defined by the protocol. xSec relies on 256-bit Advanced Encryption Standard (AES) encryption. Upon 802.1X client authentication, xSec creates a tunnel between the client and the controller. The xSec frame sent over the air or wire between the user and the controller contains user and controller information, as well as original IP and MAC addresses, in encrypted form. All user information is secured using xSec. This concept is also extended to secure management information and data between two controllers on the same VLAN. For xSec tunneling between a client and controller to work, a version of the Funk Odyssey client software that supports xSec needs to be installed on the client. It is possible to secure clients running Windows 2000 and XP operating systems using xSec and the Odyssey client software..
xSec is an optional licensed feature for controllers. xSec is automatically enabled on the controller when you install the license. For information about the currently supported release for Funk Odyssey, please contact Juniper Networks.
xSec provides the following advantages: l Advanced security as Layer-2 frames are encrypted and tunneled. l Ease of implementation of advanced encryption in a heterogeneous environment. xSec is designed to
support multiple operating systems and a wide range of network interface cards (NICs). All encryption and decryption on the client machine is performed by the Odyssey client while the NICs are configured with NULL encryption. This ensures that even older operating systems that cannot be upgraded to support WPA or WPA2 authentication can be secured using xSec and the Odyssey client. l Compatible with TLS, TTLS and PEAP. l Advanced authentication extended to wired clients allowing network managers to secure wired ports.
Securing Client Traffic
You can secure wireless or wired client traffic with xSec. On the client, install the Odyssey Client software. The xSec client must complete 802.1X authentication. to connect to the network. The client indicates the use of the xSec protocol during 802.1X exchanges with the controller. Controllers support 802.1X for both wired and wireless clients. Upon successful client authentication, an xSec tunnel is established between the controller and the client.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Advanced Security | 950

The authenticated client is placed into a configured VLAN, which determines the client's DHCP server, IP address, and Layer-2 connection. For wireless xSec clients, the VLAN is the user VLAN configured for the WLAN. For wired xSec clients and wireless xSec clients that connect to the controller through a non-Dell AP, the VLAN is a designated xSec VLAN. The VLAN can also be derived from configured RADIUS server-derivation rules or from Vendor-Specific Attributes (VSAs). Once an xSec tunnel is established, a DHCP server assigns the xSec client an IP address from the address pool on the VLAN to which the client is assigned. All traffic between the client and the controller is then encrypted.
The following sections describe how to configure xSec on the controller for wireless and wired clients.
Securing Wireless Clients
The following are the basic steps for configuring the controller for xSec wireless clients:
1. Configure the user VLAN to which the authenticated clients will be assigned. See Network Configuration Parameters on page 164 for more information.
2. Configure the user role for the authenticated xSec clients. See Roles and Policies on page 438for information.
3. Configure the server group that will be used to authenticate clients using 802.1X. See Authentication Servers on page 249 for more information
4. Configure the AAA profile to specify the 802.1X default user role. Specify the 802.1X authentication server group.
You can configure the 802.1X authentication profile if necessary. See 802.1X Authentication on page 326 for more information.
5. Configure the virtual AP profile for the WLAN. Specify the previously-configured user VLAN. Only xSec clients will be allowed to connect to the WLAN and non-xSec connections are dropped. a. Specify the previously-configured AAA profile. b. Configure the SSID profile with xSec as the authentication.
6. Install and set up the Odyssey client on the wireless client.
Figure 194 is an example network where a wireless xSec client is assigned to the user VLAN 20 and the user role "employee" upon successful 802.1x authentication. VLAN 1 includes the port on the controller that connects to the wired network on which the AP is installed. (APs can connect to the controller across either a Layer-2 or Layer-3 network.)
Figure 194 Wireless xSec Client Example

The following sections describe how to use the WebUI or CLI to configure the AAA profile and virtual AP profile for this example. Other chapters in this manual describe the configuration of the user role, VLAN, authentication servers and server group, and 802.1X authentication profile.
In the WebUI
To configure the AAA profile and virtual AP profile: 1. Navigate to Configuration > Security > Authentication > AAA Profiles.
a. To create a new AAA profile, click Add in the AAA Profiles Summary. b. Enter a name for the profile (for example, xsec-wireless), and click Add. c. To configure the AAA profile, click on the newly-created profile name.

951 | Advanced Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

d. For 802.1X Authentication Default Role, select a configured user role (for example, employee). e. Click Apply. f. In the AAA Profile list, select 802.1X Authentication Profile under the AAA profile you configured. Select
the applicable 802.1X authentication profile (for example, xsec-wireless-dot1x). Click Apply. g. In the AAA Profile list, select 802.1X Authentication Server Group under the AAA profile you configured.
Select the applicable server group (for example, xsec-svrs). Click Apply. 2. Navigate to Configuration > Wireless > AP Configuration. Select either the AP Group or AP Specific
tab. Click the applicable AP group name. 3. Under Profiles, select Wireless LAN, then select Virtual AP. 4. To create a new virtual AP profile, select NEW from the Add a profile drop-down menu. Enter the name for
the virtual AP profile (for example, xsec-wireless), and click Add. a. In the Profile Details entry for the new virtual AP profile, select the AAA profile you previously
configured. A pop-up window displays the configured AAA profile parameters. Click Apply in the pop-up window. b. From the SSID profile drop-down menu, select NEW. A pop-up window allows you to configure the SSID profile. c. Enter the name for the SSID profile (for example, xsec-wireless). d. Enter the Network Name for the SSID (for example, xsec-ap). e. For Network Authentication, select xSec. f. Click Apply. g. At the bottom of the Profile Details page, click Apply. 5. Click on the new virtual AP name in the Profiles list or in Profile Details to display configuration parameters. a. Make sure Virtual AP enable is selected. b. For VLAN, enter the ID of the VLAN in which authenticated xSec clients are placed (for example, 20). c. Click Apply.
In the CLI
To configure the AAA profile and virtual AP profile:
(host)(config) #aaa profile xsec-wireless authentication-dot1x xsec-wireless-dot1x dot1x-default-role employee dot1x-server-group xsec-svrs
(host)(config) #wlan ssid-profile xsec-wireless essid xsec-ap opmode xSec
(host)(config) #wlan virtual-ap xsec-wireless vlan 20 aaa-profile xsec-wireless ssid-profile xsec-wireless
Securing Wired Clients
The following are the basic steps for configuring the controller for xSec wired clients:
1. Configure the VLAN to which the authenticated clients will be assigned. See Network Configuration Parameters on page 164 for information. This VLAN must have an IP interface, and is a different VLAN from the port's "native" VLAN that provides connectivity to the network.
2. Configure the user role for the authenticated xSec clients. See Roles and Policies on page 438 for information.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Advanced Security | 952

3. Configure the server group that will be used to authenticate clients using 802.1X. See Authentication Servers on page 249 for more information.
4. Configure the controller port to which the wired clients) are connected. Specify the VLAN to which the authenticated xSec clients are assigned. For firewall rules to be enforced after client authentication, the port must be configured as untrusted.
5. Configure the AAA profile to specify the 802.1X default user role and the 802.1X authentication server group.
6. Configure the wired authentication profile to use the AAA profile. 7. Install and set up the Odyssey Client on the wireless client.
Figure 195 is an example network where a wired xSec client is assigned to the VLAN 20 and the user role "employee" upon successful 802.1X authentication. Traffic between the controller and the xSec client is encrypted.
Figure 195 Wired xSec Client Example

The VLAN to which you assign an xSec client must be a different VLAN from the VLAN that contains the controller port to which the wired xSec client or AP is connected.
The following sections describe how to use the WebUI or CLI to configure the controller port to which the wired client is connected, the AAA profile, and the wired authentication profile for this example. Other chapters in this manual describe the configuration of the user role, VLAN, authentication servers and server group, and 802.1X authentication profile.
In the WebUI
To configure the controller port to which the wired client is connected, the AAA profile, and the wired authentication profile:
1. Navigate to Configuration > Networks > Ports to configure the port to which the wired client(s) are connected. a. Click the port that you want to configure. b. Make sure the Enable Port checkbox is selected. c. For Enter VLAN(s), select the native VLAN on the port to ensure Layer-2 connectivity to the network. In Figure 195, this is VLAN 1. d. For xSec VLAN, select the VLAN to which authenticated users are assigned from the drop-down menu. In Figure 195, this is VLAN 20. e. Click Apply.
2. Navigate to Configuration > Security > Authentication > AAA Profiles to configure the AAA profile. a. To create a new AAA profile, click Add. b. Enter a name for the profile (for example, xsec-wired), and click Add. c. To configure the AAA profile, click on the newly-created profile name. d. For 802.1x Authentication Default Role, select a configured user role (for example, employee). e. Click Apply. f. In the AAA Profile list, select 802.1x Authentication Profile under the AAA profile you configured. Select the applicable 802.1x authentication profile (for example, xsec-wired-dot1x). Click Apply.

953 | Advanced Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

g. In the AAA Profile list, select 802.1x Authentication Server Group under the AAA profile you configured. Select the applicable server group (for example, xsec-svrs). Click Apply.
3. Navigate to Configuration > Advanced Services > Wired Access. a. Under Wired Access AAA Profile, select the AAA profile you just configured. b. Click Apply.
In the CLI
To configure the controller port to which the wired client is connected, the AAA profile, and the wired authentication profile:
(host)(config) #interface fastethernet|gigabitethernet slot/port switchport access vlan 1 xsec vlan 20
(host)(config) #aaa profile xsec-wired authentication-dot1x xsec-wired-dot1x d>ot1x-default-role employee d>ot1x-server-group xsec-svrs
(host)(config) #aaa authentication wired profile xsec-wired
Securing Wireless Clients Through Non-Dell APs
If xSec clients are connecting through a non-Dell AP, you need to configure the controller port to which the AP is connected. The AP must be configured for no (opensystem) authentication.
The following are the basic steps for configuring the controller for xSec wireless clients connecting through a non-Dell AP:
1. Configure the VLAN to which the authenticated clients will be assigned. See Network Configuration Parameters on page 164for information. This VLAN must have an IP interface, and is a different VLAN from the port's "native" VLAN that provides connectivity to the network.
2. Configure the user role for the authenticated xSec clients. See Roles and Policies on page 438 for information.
3. Configure the server group that will be used to authenticate clients using 802.1X. See Authentication Servers on page 249 for more information.
4. Configure the controller port that connects to the wired network on which the non-Dell AP is installed. Specify the VLAN to which the authenticated xSec clients are assigned. The ingress and egress ports for xSec client traffic must be different physical ports on the controller.
5. Configure the AAA profile to specify the 802.1X default user role and the 802.1X authentication server group.
6. Configure the wired authentication profile to use the AAA profile. 7. Install and set up the Odyssey Client on the wireless client.
The following sections describe how to use the WebUI or CLI to configure the controller port and AAA wired authentication profiles for wireless clients connecting with non-Dell APs. Other chapters in this manual describe the configuration of the user role, VLAN, authentication servers and server group, and 802.1X authentication profile.
In the WebUI
To configure the controller port and AAA wired authentication profiles for wireless clients connecting with nonDell APs

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Advanced Security | 954

1. Navigate to Configuration > Networks > Ports to configure the port to which the wireless xSec client(s) are connected. a. Click the port that you want to configure. b. Make sure the Enable Port checkbox is selected. c. For Enter VLAN(s), select the native VLAN (for example, VLAN 1) on the port to ensure Layer-2 connectivity to the network. d. For xSec VLAN, select the VLAN to which authenticated users are assigned from the drop-down menu (for example, VLAN 20) e. Click Apply.
2. Navigate to Configuration > Security > Authentication > AAA Profiles to configure the AAA profile. a. To create a new AAA profile, click Add. b. Enter a name for the profile (for example, xsec-3party), and click Add. c. To configure the AAA profile, click on the newly-created profile name. d. For 802.1x Authentication Default Role, select a configured user role (for example, employee). e. Click Apply. f. In the AAA Profile list, select 802.1x Authentication Profile under the AAA profile you configured. Select the applicable 802.1x authentication profile (for example, xsec-NonDell-dot1x). Click Apply. g. In the AAA Profile list, select 802.1x Authentication Server Group under the AAA profile you configured. Select the applicable server group (for example, xsec-svrs). Click Apply.
3. Navigate to Configuration > Advanced Services > Wired Access. a. Under Wired Access AAA Profile, select the AAA profile you just configured. b. Click Apply.
In the CLI
To configure the controller port and AAA wired authentication profiles for wireless clients connecting with nonDell APs
(host)(config) #interface fastethernet|gigabitethernet slot/port switchport access vlan 1 xsec vlan 20
(host)(config) #aaa profile xsec-wired authentication-dot1x xsec-NonDell-dot1x d>ot1x-default-role employee d>ot1x-server-group xsec-svrs
(host)(config) #aaa authentication wired profile xsec-wired
Securing Clients on an AP Wired Port
APs with multiple wired Ethernet ports include an wired port profile that can enable or disable the wired port, define an AAA profile for wired port devices, and associate the port with an Ethernet link profile that defines its speed and duplex values.
In the WebUI
The procedure to create a new Ethernet port configuration profile depends on if you want to immediately associate that profile to a specific port on an AP.
1. To configure a new Ethernet port configuration profile without assigning it to a specific port: a. Navigate to Configuration > All Profiles. b. Expand the AP menu and select AP Wired Port profile.

955 | Advanced Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

c. In the Profile Details window, enter a name for the new profile, then click Add. -orTo create a new Ethernet port configuration profile for a specific port on an AP or group of APs: a. Navigate to Configuration > Wireless > AP Configuration. b. Select either the AP Group or AP Specific tab. Click the Edit button by name of the AP group or
individual AP you want to configure. c. In the Profiles list, expand the AP profile menu and select the Ethernet Interface Port Configuration
profile for the Ethernet port number you want to configure. d. In the Profile Details window, click the Ethernet interface port configuration drop-down list and
select New. 2. Configure the Ethernet Interface Port/ Wired AP Port Configuration profile parameters described in
Table 205.

Table 205: Ethernet Interface Port/ Wired AP Port Configuration Parameters

Parameter

Description

Shut Down

Disable the wired AP port.

Remote AP Backup

If enabled, the port of Remote-AP is up for the local connectivity and troubleshooting when the controller is not reachable and no firewall policies will be applied.

Time to wait for authentication to succeed
Spanning Tree

If disabled, the port would be up for the bridge mode when controllerr is not reachable, and retains the previous bridge wired port configuration (if the configuration is applied and persistent). For split and tunnel modes, the ports would be shutdown when the controller is not reachable.
Authentication timeout value, in seconds, for devices connecting the AP's wired port. The supported range is 1-65535 seconds, and the default value is 20 seconds.
Select this checkbox to enable the Spanning Tree protocol.

3. Each Ethernet interface port/wired AP port configuration profile is automatically associated to the wired AP profile Default. To assign a new wired AP profile to the AP wired port: a. Click the wired AP profile directly under the Ethernet port profile you are editing. b. In the Profile Details window, click the Wired AP Profile drop-down list and select a new Wired AP profile.
4. A new AP wired profile is automatically associated to the Ethernet Interface Link profile Default. To assign a new Ethernet Interface Link profile to the AP wired port: a. Click the Ethernet Interface Link profile directly under the Ethernet port profile you are editing. b. In the Profile Details window, click the Ethernet Interface Link drop-down list and select a new Ethernet Interface Link profile.
5. By default, there is no AAA profile associated with an AP wired port profile. To assign an AAA profile to the AP wired port:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Advanced Security | 956

a. Click the AAA profile directly under the Ethernet port profile you are editing. b. In the Profile Details window, click the AAA Profile drop-down list and select an AAA profile. 6. Click Apply to save your settings.
In the CLI
To create a new Ethernet port/wired AP port profile: (host)(config) #ap wired-port-profile <profile>
aaa-profile <profile> authentication-timeout <seconds> enet-link-profile <profile> rap-backup shutdown wired-ap-profile <profile> To associate an existing Ethernet port/wired AP port profile to a specific interface on an AP or group of APs: (host)(config) #ap-group <group> enet0-port-profile <profile> enet1-port-profile <profile> enet2-port-profile <profile> enet3-port-profile <profile> enet4-port-profile <profile>
Enabling or Disabling Spanning Tree Parameter in AP Wired Port Profile
You can enable or disable the spanning tree parameters in WebUI and CLI.
In the WebUI
To configure spanning tree parameters in AP wired port profile: 1. Navigate to the Configuration > Advanced Services > All Profiles page. 2. Under AP > AP Wired Port on the Profiles pane, select the profile name. 3. On the Profile Details pane, select the Spanning Tree check box. 4. Click Apply.
In the CLI
To configure spanning tree parameters in AP wired port profile: (host) (config) #ap wired-port-profile default
spanning-tree To display the spanning tree information of an AP: (host) (config) #show ap debug spanning-tree ap-name <ap-name>
Securing Controller-to-Controller Communication
xSec can be used to secure data and control traffic passed between two controllers. The only requirement is that both controllers be members of the same VLAN. To establish a point-to-point tunnel between the two controllers, you need to configure the following for the connecting ports on each controller: l The MAC address of the xSec tunnel termination point. This would be the MAC address of the "other"
controller. l A 16-byte shared key used to authenticate the controllers to each other. You must configure the same
shared key on both controllers.

957 | Advanced Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l The VLAN IDs for the VLANs that will extend across both the controllers via the xSec. Figure 196 shows an example network where two controllers are connected to the same VLAN, VLAN 1. On controller 1, you configure the MAC address of controller 2 for the xSec tunnel termination point. On controller 2, you configure the MAC address of controller 1 for the xSec tunnel termination point. On both controllers, you configure the same 16-byte shared key and the IDs for the VLANs which are allowed to pass through the xSec tunnel.
Figure 196 Controller-to-Controller xSec Example

Configuring Controllers for xSec
The following sections describe how to use the WebUI or CLI to configure the port that connects to the wired network on which the other controller is installed. Other chapters in this manual describe the configuration of VLANs.
In the WebUI
To configure the port that connects to the wired network on which the other controller is installed:
1. On each controller, navigate to Configuration > Network > Port. 2. Click on the port to be configured. 3. Select the VLAN from the drop-down list. 4. Configure the xSec point-to-point settings:
a. Enter the MAC address of the tunnel termination point (the "other" controller's MAC address). b. Enter the key (for example, 1234567898765432) used by xSec to establish the tunnel between the
controllers. c. Select the VLANs that would be allowed across the point-to-point connection from the Allowed VLANs
drop-down menu, and click the <-- button. 5. Click Apply.
In the CLI
To configure the port that connects to the wired network on which the other controller is installed:
For Controller 1: (host)(config) #interface gigabitethernet|fastethernet slot/port
vlan 1 xsec point-to-point 10:11:12:13:14:15 1234567898765432 allowed vlan 101,200,250
For Controller 2: (host)(config) #interface gigabitethernet|fastethernet slot/port
vlan 1 xsec point-to-point 01:02:03:04:05:06 1234567898765432 allowed vlan 101,200,250

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Advanced Security | 958

Configuring the Odyssey Client on Client Machines
You can obtain the Odyssey Client from Juniper Networks. For information on Odyssey Client versions, contact Juniper Networks Support.
Installing the Odyssey Client
1. Unzip and install the Odyssey client on the client laptop. 2. For wired xSec, to use the Odyssey client to control the wired port, modify the registry:
a. On the windows machine, click Start and select Run. b. Type regedit in the dialog box and click OK. c. Navigate down the tree to
HKEY_LOCAL_MACHINE\SOFTWARE\Funk Software, Inc.\odyssey\client\configuration\options\wiredxsec
Figure 197 The regedit Window

d. Select policy from the registry values and right click on it. Select Modify to modify the contents of policy. Set the value in the resulting window to required.

959 | Advanced Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 198 Modifying a regedit Policy
3. Open the Funk Odyssey Client. Click the Profile tab in the client window. This allows the user to create the user profile for 802.1X authentication.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Advanced Security | 960

Figure 199 The Funk Odyssey Client Profile

a. In the login name dialog box, enter the login name used for 802.1X authentication. For the password, the client could use the WINDOWS password or use the configured password based on the selection made.
b. Click the certificate tab and enter the certificate information required. This example shows the PEAP settings.

961 | Advanced Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 200 Certificate Information

c. Click the Authentication tab. In the resultant window, click the Add tab and select EAP/PEAP. Move this option to the top of the list if PEAP is the method chosen. If certification validation not required, clear the Validate server certificates check box.
d. Click the PEAP Settings tab and select the EAP protocol supported. e. Click OK. f. To modify an existing profile, select the profile and then click the Properties tab. 4. Select the Network tab to configure the network for wireless client. For wired clients, skip this step.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Advanced Security | 962

Figure 201 Network Profile

a. Click the Add tab. Enter the SSID to which the client connects. b. Set the Network type to Infrastructure. c. Set the Association mode to xSec, AES encryption is automatically selected. d. Under Authentication, select the Authenticate using profile check box. e. From the pull down menu, select the profile used for 802.1x authentication. This would be one of the
profiles configured in step 2. f. Select the keys that will be generated automatically for data privacy. g. Apply the configuration changes made by clicking on the OK tab. h. To modify an existing profile, select the profile and then click the Properties tab. 5. Click the Adapters tab if the adapter used is not seen under the list of adapters pull down menu under connections. a. When using a wireless client, click the Wireless tab. b. Select the Wireless adapters only radio button. From the resulting list, select the adapter required
from the list and click OK. c. For wired 802.1x clients, select the Wired 802.1x tab and select the Wired adapters only radio
button. From the resulting list, select the adapter required from the list and click OK. 6. Establish the connection.
a. Click the Connection tab. b. From the pull down menu, select the adapter required. If the adapter in use is not visible, add the
adapter as explained in Step 5. c. Select the Connect to network check box and select the Network option from the pull down menu.
To configure a new network, follow the instructions in Step 4. d. This will automatically start the connection process. To reconnect to the network, click Reconnect.

963 | Advanced Security

Dell Networking W-Series ArubaOS 6.4.x | User Guide

7. Click Scan to display the SSIDs seen by the NIC after a site survey.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Advanced Security | 964

Chapter 39 Voice and Video

This chapter outlines the steps required to configure voice and video services on the Dell controller for Voice over IP (VoIP) devices, including Session Initiation Protocol (SIP), Spectralink Voice Priority (SVP), H323, SCCP, Vocera, and Alcatel NOE phones, clients running Microsoft Lync Server, and Apple devices running the Facetime application. As video and voice applications are more vulnerable to delay and jitter, the network infrastructure must be able to prioritize video and voice traffic over data traffic. This chapter includes the following topics: l Voice and Video License Requirements on page 965 l Configuring Voice and Video on page 965 l Working with QoS for Voice and Video on page 974 l Unified Communication and Collaboration on page 983 l Understanding Extended Voice and Video Features on page 1001 l Advanced Voice Troubleshooting on page 1022
Voice and Video License Requirements
The voice and video services require PEFNG licenses on the controller. For complete details on the required licenses, see Software Licenses on page 146.
Configuring Voice and Video
This section describes the steps required to set up and configure voice features on a controller: 1. Set up net services 2. Configure roles 3. Configure firewall settings for voice and video ALGs 4. Configure other parameters depending on the need and environment
Assigning voice traffic to the high priority queue is recommended when deploying voice over WLAN networks.
Voice ALG and Network Address Translation
Voice ALGs do not support Network Address Translation (NAT). This is due to the way NAT functions and the way IP addresses are embedded in the signaling messages. In a typical customer deployment, a call server is deployed within an internal network which eliminates the need for NAT. In short, voice ALGs should not be enabled when voice clients are behind a NAT.
Setting up Net Services
You can either use the default net services and ports or you can create or modify net services.
Using Default Net Services
The following table lists the default net services and their ports:

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Voice and Video | 965

Table 206: Default Voice Net Services and Ports

Net Service Name

Protocol

Port

svc-sccp

TCP

2000

ALG SCCP

svc-sip-tcp

TCP

5060

SIP

svc-sip-udp

--

--

SIP

svc-sips

--

--

SIP

svc-noe

UDP

32512

NOE

svc-h323-udp

UDP

1718, 1719 H.323

svc-h323-tcp

TCP

1720

H.323

svc-vocera

--

--

VOCE RA

svc-svp

--

None

SVP

Creating Custom Net Services
You can use CLI to create or modify net services. (host)(config)# netservice [service name] [protocol] [port] [alg]
To create an svc-noe service on UDP port 32522, enter: (host) (config)# netservice svc-noe udp 32522 alg noe
Configuring User Roles
In the user-centric network, the user role of a wireless client determines its privileges and the type of traffic that it can send or receive in the wireless network. You can configure roles for clients that use mostly data traffic, such as laptops, and roles for clients that use mostly voice traffic, such as VoIP phones. Although there are different ways for a client to derive a user role, in most cases the clients using data traffic are assigned a role after they are authenticated through a method such as 802.1X, VPN, or captive portal. The user role for VoIP phones is derived from the OUI of their MAC addresses or the SSID to which they associate. Refer to Roles and Policies on page 438 for details on how to create and configure a user role. This section describes how to configure voice user roles with the required privileges and priorities. Dell controller provides default user roles for all voice services. You can do one of the following: l Use default user roles l Create or modify user roles l Use user-derivation roles
Using the Default User Role
The controller is configured with the default voice role. This role has the following settings: l No limit on upload or download bandwidth

966 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l Default L2TP and PPTP pool l Maximum sessions: 65535 The following ACLs are associated with the default voice role: l SIP-ACL l NOE-ACL l SVP-ACL l VOCERA-ACL l SKINNY-ACL l H323-ACL l DHCP-ACL l TFTP-ACL l DNS-ACL l ICMP-ACL For more details on the default voice role, enter the following command in the config mode on your controller: (host)(config) #show rights voice
Creating or Modifying Voice User Roles
You can create roles for NOE, SIP, SVP, Vocera, SCCP, and H.323 ALGs. Use the WebUI or CLI to configure user roles for any of the ALGs.
In the WebUI To configure user roles for ALGs: 1. Navigate to Configuration > Security > Access Control. 2. Select the Policies tab. Click Add to create a new policy. 3. For Policy Name, enter a name here. 4. For Policy Type, select Session. 5. Under Rules, click Add.
a. For IP Version, select IPv4. a. For Source, select any. b. For Destination, select any. c. For Service, select service, then the correct voice or video ALG service. See Table 207 and Table 208 for
service names for all ALGs:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 967

Table 207: Services for ALGs

ALG

Service Name

NOE

l svc-noe l sip-noe-oxo

SIP

l svc-sips

l svc-sip-tcp

l svc-sip-udp

SVP

svc-svp

VOCERA svc-vocera

SCCP

svc-sccp

H.323

l svc-h323-tcp l svc-h323-udp

DHCP

svc-dhcp

TFTP

svc-tftp

ICMP

svc-icmp

DNS

svc-dns

Table 208: Other Mandatory Services for the ALGs

ACL

Service Name

DHCP

svc-dhcp

TFTP

svc-tftp

ICMP

svc-icmp

DNS

svc-dns

d. For Action, select permit. e. For Queue, select High. f. Click Add. Repeat steps 1 to 5e to add more ALG services. 6. Click Apply. 7. Select the User Roles tab. Click Add to add a user role. a. For Role Name, enter a name for the user role.

968 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

b. Under Firewall Policies, click Add. c. Select the previously-configured policy name from the Choose from Configured Policies drop-down
menu. d. Click Done. e. Under Firewall Policies, click Add. f. Select control from the Choose from Configured Policies drop-down menu. g. Click Done. 8. Click Apply.
In the CLI To configure user roles for ALGs: (host)(config) #ip access-list session <policy-name> (host)(config-sess-<policy-name>) #any any <service-name> permit queue high To map the policy name to the user role: (host)(config) #user-role <role-name> (host)(config-role) #session-acl <policy-name> Replace the following strings: l policy-name with a string that you want to identify the roles policy l role-name with the name you want to identify the voice user role l service-name with any of the service names from Table 206
Using the User-Derivation Rules
The user role can be derived from attributes from the client's association with an AP. For VoIP phones, you can configure the devices to be placed in their user role based on the SSID or the Organizational Unit Identifier (OUI) of the client's MAC address.
User-derivation rules are executed before the client is authenticated.
In the WebUI To derive a role based on SSID: 1. Navigate to Configuration > Security > Authentication > User Rules. 2. Click Add to add a new set of derivation rules. Enter a name for the set of rules, and click Add. The name
appears in the User Rules Summary list. 3. In the User Rules Summary list, select the name of the rule set to configure rules. 4. Click Add to add a rule. For Set Type, select Role from the drop-down menu. 5. For Rule Type, select ESSID. 6. For Condition, select equals. 7. For Value, enter the SSID used for the phones. 8. For Roles, select the user role you previously created. 9. Click Add. 10.Click Apply.
In the CLI To derive a role based on SSID: (host)(config) #aaa derivation-rules user <name of rule-set>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 969

(host) (user-rule) #set role condition essid equals <ssid-name> set-value <The value that the role/VLAN should be set to>
In the WebUI To derive a role based on MAC OUI: 1. Navigate to Configuration > Security > Authentication > User Rules. 2. Click Add to add a new set of derivation rules. Enter a name for the set of rules, and click Add. The name
appears in the User Rules Summary list. 3. In the User Rules Summary list, select the name of the rule set to configure rules. 4. Click Add to add a rule. For Set Type, select Role from the drop-down menu. 5. For Rule Type, select MAC Address. 6. For Condition, select contains. 7. For Value, enter the first three octets (the OUI) of the MAC address of the phones (for example, the
Spectralink OUI is 00:09:7a). 8. For Roles, select the user role you previously created. 9. Click Add. 10.Click Apply.
In the CLI To derive a role based on MAC OUI: (host)(config) #aaa derivation-rules user <name of rule-set> (host) (user-rule) #set role condition macaddr contains <xx:xx:xx:xx:xx:xx> set-value <The value that the role/VLAN should be set to>
Configuring Firewall Settings for Voice and Video ALGs
After configuring the user roles, you must configure the firewall settings for the voice and video ApplicationLevel Gateways (ALGs) to pass traffic securely through the Dell devices.
In the WebUI
To enable the firewall settings for the ALGs: 1. Navigate to Configuration > Advanced Services > Stateful Firewall. 2. Enable the firewall settings for the ALGs:
a. Select the Stateful SIP Processing check box for the SIP ALG. b. Select the Stateful H.323 Processing check box for the H.323 ALG. c. Select the Stateful SCCP Processing check box for the SCCP ALG. d. Select the Stateful Vocera Processing check box for the Vocera ALG. e. Select the Stateful UA Processing check box for the NOE ALG.
In the CLI
To enable the firewall settings for the SIP ALG: (host) (config) #no firewall disable-stateful-sip-processing To enable the firewall settings for the H.323 ALG: (host) (config) #no firewall disable-stateful-h323-processing To enable the firewall settings for the SCCP ALG: (host) (config) #no firewall disable-stateful-sccp-processing To enable the firewall settings for the Vocera ALG:

970 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

(host) (config) #no firewall disable-stateful-vocera-processing
To enable the firewall settings for the NOE ALG: (host) (config) #no firewall disable-stateful-ua-processing
Additional Video Configurations
You can configure ArubaOS to reliably and efficiently stream video traffic over WLAN. This new method allows you to stream video traffic reliably without much distortion. To ensure that video data is transmitted reliably, dynamic multicast optimization techniques are used. Although the dynamic multicast optimization conversion generates more traffic, that traffic is buffered by the AP and delivered to the client when the client emerges from power-save mode.
Configuring Video over WLAN enhancements
To configure video over WLAN enhancements: l Enable WMM on the SSID profile. l Enable IGMP proxy or IGMP snooping. l Configure an ACL to set a DSCP value same as the wmm-vi-dscp value in the SSID profile for prioritizing
the multicast video traffic. l Enable dynamic multicast optimization under VAP profile. l Configure the dynamic multicast optimization threshold--The maximum number of high throughput
stations in a multicast group. The optimization will stop if the number exceeds the threshold value. l Enable multicast rate optimization to support higher data rate for multicast traffic in the absence of
dynamic multicast optimization. Dynamic multicast optimization takes precedence over multicast rate optimization up to the configured threshold value.
Configuring the Video Multicast Rate Optimization parameter overrides the configuration of BC/MC Rate Optimization parameter for VI-tagged multicast traffic. Multicast traffic that is not VI-tagged behaves the same with BC/MC as before. If multicast rate is not set, all traffic behaves the same.
l Enable video aware scan on ARM profile--This ensures that AP does not scan when a video stream is active.
l Optionally, you can configure and apply the WMM bandwidth management profile--The total bandwidth share should not exceed 100 percent.
l Enable multicast shaping to shape the sudden traffic from the source.
Prerequisites
l You will need the Policy Enforcement Firewall Next Generation (PEFNG) license to enable dynamic multicast optimization.
l This feature is available only on W-7000 Series, W-7200 Series, W-6000, W-3000 Series, and W-600 Series controller platforms.
In the WebUI
To configure video over WLAN enhancements: 1. Enable IGMP proxy or IGMP snooping on the controller.
To enable IGMP proxy: a. Navigate to Configuration > Network > IP. Under the IGMP settings, select the Enable IGMP
checkbox. b. Select the Proxy check box and then the appropriate value from the Interface drop down menu.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 971

c. Click Apply. To enable IGMP snooping: a. Navigate to Configuration > Network > IP. Under the IGMP settings, select the Enable IGMP check
box. b. Select the Snooping check box. c. Click Apply. 2. Enable wireless multimedia and set a DSCP value for video traffic: a. Navigate to Configuration > Advanced Services > All Profiles. b. Under the Profiles column, expand Wireless LAN > SSID Profile and select the profile name.
This example uses the default profile. c. Click the Advanced tab and select the Wireless Multimedia (WMM) check box. d. Enter the DSCP value (integer number) in the DSCP mapping for WMM video AC field. e. Click Apply. 3. Create an ACL on the controller with the values equivalent to the DSCP mappings to prioritize the video traffic: a. Navigate to Configuration > Security > Access Control and click the Policies tab. b. Click Add to create a new policy. c. Enter the appropriate values under Rules to match the DSCP mapping values. You can also add this ACL to any user role or port. To apply the ACL to a user role: a. Navigate to Configuration > Security > Access Control page and click the User Roles tab. b. Edit the user role and click Add under Firewall Policies. c. Select the ACL from the Choose From Configured Policies drop-down menu and click the Done
button. d. Click Apply to save the configurations. To apply the ACL to a port: a. Navigate to Configuration > Network > Port and select the upstream port. b. Under the Firewall Policy drop-down menu, select the ACL. c. Click Apply. 4. Configure dynamic multicast optimization for video traffic on a virtual AP profile: Under the Profiles column, expand Wireless LAN > Virtual AP Profile and select the profile name. This example uses the default profile. In the Profile Details section, select the Dynamic Multicast Optimization (DMO) option and enter the threshold value. 5. Configure multicast rate optimization for the video traffic: a. Navigate to Configuration > Advanced Services > All Profiles. b. Under the Profiles column, expand Wireless LAN > SSID Profile and select the profile name. c. Click the Advanced tab and select the BC/MC Rate Optimization check box. d. Select an option from the Video Multicast Rate Optimization drop-down menu. e. Click Apply.
Configuring the Video Multicast Rate Optimization parameter overrides the configuration of BC/MC Rate Optimization parameter for VI-tagged multicast traffic. Multicast traffic that is not VI-tagged behaves the same with BC/MC as before. If multicast rate is not set, all traffic behaves the same.
6. Configure ARM scanning for video traffic:

972 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Under the Profiles column, expand RF Management > Adaptive Radio Management (ARM) Profile and select the profile name. This example uses the default profile. Select the Video Aware Scan option and click Apply. 7. Configure and apply bandwidth management profile: Under the Profiles column, expand Virtual AP >[profile-name] > WMM Traffic Management Profile. In the Profile Details section, select the profile name from the drop down list box. Select the Enable Shaping Policy option and enter the bandwidth share values. Click Apply. This step is optional.
Ensure that you configure the WMM traffic management profile to the virtual AP profile, if you have configured the virtual AP traffic management profile.
After you configure the WMM bandwidth management profile, apply it to the virtual AP profile. 8. Enable multicast shaping on the firewall:
a. Navigate to Configuration > Advanced Services > Stateful Firewall. b. Click the Global Setting tab and select the Multicast automatic shaping check box. c. Click Apply.
In the CLI
To configure the video over WLAN enhancements: 1. Enable IGMP proxy or IGMP snooping on the controller.
To enable IGMP proxy: (host) (config) #interface vlan <id> (host) (config-subif)#ip igmp proxy gigabitethernet <slot/module/port> To enable IGMP snooping: (host) (config) #interface vlan <id> (host) (config-subif)#ip igmp snooping 2. Enable wireless multimedia and set a DSCP value for video traffic: (host) (config)#wlan ssid-profile default (host) (ssid-profile "default")#wmm (host) (ssid-profile "default")#wmm-vi-dscp <value> Example: (host) (ssid-profile "default")#wmm-vi-dscp 40 Setting the DSCP value tags the content as video stream that the APs can recognize. 3. Create an ACL on the controller with the values equivalent to the DSCP mappings to prioritize the video traffic. Example: The following ACL prioritizes the multicast traffic from the specified multicast group on the controller. You can also add this ACL to any user role or port: (host) (config-sess-mcast_video_acl)#any network 224.0.0.0 255.0.0.0 any permit tos 40 queue high 802.1p 5 a. To apply the ACL to a user role: This example uses the user role authenticated. (host) (config) #user-role authenticated access-list session mcast_video_acl b. To apply the ACL to a port: (host) (config) #interface gigabitethernet <slot/module/port> (host) (config-if)#ip access-group mcast_video_acl session 4. Configure dynamic multicast optimization for video traffic on a virtual AP profile: (host) (config)#wlan virtual-ap default

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 973

(host) (Virtual AP Profile "default")#dynamic-mcast-optimization 5. Configure the dynamic multicast optimization threshold value:
(host) (config) #dynamic-mcast-optimization-thresh 6 6. Configure multicast rate optimization for video traffic:
(host) (config) #wlan ssid-profile default (host) (SSID Profile "default") #mcast-rate-opt 7. Configure ARM scanning for video traffic: In the default RF ARM profile, enable the video aware scan option. This prevents APs from scanning when a video traffic is active: (host) (config) #rf arm-profile default (host) (Adaptive Radio Management (ARM) profile "default") #video-aware-scan 8. Configure and apply a bandwidth management profile.
Ensure that you configure the WMM traffic management profile to the virtual AP profile, if you have configured the virtual AP traffic management profile.
a. Enable a bandwidth shaping policy so that the allocated bandwidth share is appropriately used: (host) (config) #wlan wmm-traffic-management-profile default (host) (WMM Traffic management profile "default") # enable-shaping b. Set a bandwidth percentage for the following categories: (host) (WMM Traffic management profile "default") # background 10 (host) (WMM Traffic management profile "default") # best-effort 20 (host) (WMM Traffic management profile "default") # video 50 (host) (WMM Traffic management profile "default") # voice 20 After you configure the WMM bandwidth management profile, apply it to the virtual AP profile: (host) (config) #wlan virtual-ap default (host) (Virtual AP profile "default") #wmm-traffic-management-profile default 9. Enable multicast shaping on the firewall: (host) (config) #firewall shape-mcast
Working with QoS for Voice and Video
QoS settings for voice and video applications are configured when you configure firewall roles and policies.
Understanding VoIP Call Admission Control Profile
VoIP call admission control prevents any single AP from becoming congested with voice calls. You configure call admission control options in the VoIP Call Admission Control profile, which you apply to an AP group or a specific AP.
In the WebUI
To configure a VoIP Call Admission Control profile: 1. Navigate to Configuration > WIRELESS > AP Configuration. Select either AP Group or AP Specific.
l If you select AP Group, click Edit for the AP group name for which you want to configure VoIP CAC. l If you select AP Specific, select the name of the AP for which you want to configure VoIP CAC. 2. In the Profiles list, expand the QoS menu, then select the VoIP Call Admission Control profile. 3. In the Profile Details window pane, click the VoIP Call Admission Control profile drop-down list and select the profile you want to edit. -orTo create a new profile, click the VoIP Call Admission Control profile drop-down list and select New. Enter

974 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

a new profile name in the field to the right of the drop-down list. You cannot use spaces in VoIP profile names.
4. Configure your desired VoIP Call Admission Control profile settings. Table 209 describes the parameters you can configure in this profile:

Table 209: VoIP Call Admission Control Configuration Parameters

Parameter

Description

VoIP Call Admission Control

Select the Voip Call Admission Control check box to enable Wi-Fi VoIP Call Admission Control features.

VoIP Bandwidth based CAC

Select the VoIP Bandwidth based CAC check box to enable call admission controls based upon bandwidth. If this option is not selected, call admission controls are based on call counts.

VoIP Call Capacity

The maximum number of simultaneous calls that the AP radio can handle. You can use the bandwidth calculator in the WebUI to calculate the call capacity. To access the bandwidth calculator, navigate to Configuration > Management > Bandwidth Calculator. Default value: 10.

VoIP Bandwidth Capacity (kbps)

Enter a rate from 1 to 600000 (inclusive) to specify the maximum bandwidth rate that a radio can handle, in kbps. Default value is 2000 kbps.

VoIP Call Handoff Reservation

Specify the percentage of call capacity reserved for mobile VoIP clients on an active call. Default value is 20%.

VoIP Send SIP 100 Trying

The SIP invite call setup message is time-sensitive, as the originator retries the call as quickly as possible if it does not proceed. You can direct the controller to immediately reply to the call originator with a "SIP 100 - trying" message to indicate that the call is proceeding and to avoid a possible timeout. This is useful in conditions where the SIP invite may be redirected through a number of servers before reaching the controller.
Select the VoIP Send SIP 100 Trying check box to send "SIP 100-trying" messages to a call originator to indicate that the call is proceeding. This is a useful option when the SIP invite is directed through many servers before reaching the controller.

VoIP Disconnect Extra Call

In the VoIP Call Admission Control (CAC) profile, you can limit the number of active voice calls allowed on a radio. This feature is disabled by default. When you enable the disconnect extra call feature, the system monitors the number of active voice calls, and if the defined threshold is reached, any new calls are disconnected. The AP denies association requests from a device that is on call.
To enable this feature, select the VoIP Disconnect Extra Call check box. You also need to enable call admission control in this profile.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 975

Parameter VOIP TSPEC Enforcement

Description
A WMM client can send a Traffic Specification (TSPEC) signaling request to the AP before sending traffic of a specific AC type, such as voice. You can configure the controller so that the TSPEC signaling request from a client is ignored if the underlying voice call is not active. This feature is disabled by default. If you enable this feature, you can also configure the time duration within which the station should start the voice call after sending the TSPEC request (the default is one second).
Select the VoIP TSPEC Enforcement check box to validate TSPEC requests for CAC.

VOIP TSPEC Enforcement Period

Select the maximum time, in seconds, for the station to start the call after the TSPEC request.

VoIP Drop SIP Invite and send status code (client)

Click the VoIP Drop SIP Invite and send status code (client) dropdown list and select one of the following status codes to be sent back to the client:
l 480: Temporary Unavailable
l 486: Busy Here
l 503: Service Unavailable
l none: Don't send SIP status code

VoIP Drop SIP Invite and send status code (server)

Click the VoIP Drop SIP Invite and send status code (client)dropdown list and select one of the following status codes to be sent back to the server:
l 480: Temporary Unavailable
l 486: Busy Here
l 503: Service Unavailable
l none: Don't send SIP status code

5. Click Apply.
In the CLI
To configure a VoIP Call Admission Control profile: (host)(config) #wlan voip-cac-profile <profile>
bandwidth-cac bandwidth-capacity <bandwidth-capacity> call-admission-control call-capacity call-handoff-reservation <percent> disconnect-extra-call send-sip-100-trying send-sip-status-code client|server <code> wmm-tspec-enforcement wmm-tspec-enforcement-period <seconds>
Understanding Wi-Fi Multimedia
Wi-Fi Multimedia (WMM), is a Wi-Fi Alliance specification based on the IEEE 802.11e wireless Quality of Service (QoS) standard. WMM works with 802.11a, b, g, n, and ac physical layer standards.

976 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

WMM supports four access categories (ACs): voice, video, best effort, and background. Table 210 shows the mapping of the WMM access categories to 802.1p priority values. The 802.1p priority value is contained in a two-byte QoS control field in the WMM data frame.

Table 210: WMM Access Category to 802.1p Priority Mapping

Priority

802.1p Priority WMM Access Category

Lowest

1

Background

2

0

Best effort

3

4

Video

5

6

Voice

Highest

7

In non-WMM, or hybrid environments where some clients are not WMM-capable, Dell uses voice and best effort to prioritize traffic from these clients. Unscheduled Automatic Power Save Delivery (U-APSD) is a component of the IEEE 802.11e standard that extends the battery life on voice over WLAN devices. When enabled, clients trigger the delivery of buffered data from the AP by sending a data frame. For the environments in which the wireless clients support WMM, you can enable both WMM and U-APSD in the SSID profile.
Enabling WMM
You can use the WebUI or CLI to enable WMM for wireless clients.
In the WebUI To enable WMM for wireless clients: 1. Navigate to the Configuration > Wireless > AP Configuration page. 2. Select either the AP Group or AP Specific tab. Click Edit for the AP group or AP name. 3. In the Profiles list, select Wireless LAN, then Virtual AP, then the applicable virtual AP profile. Select the
SSID profile. 4. In the Profile Details, select the Advanced tab. 5. Select the Wireless Multimedia (WMM) option. Or, select the Wireless Multimedia U-APSD (WMM-
UAPSD) Powersave option if you want to enable WMM in power save mode. 6. Click Apply.
In the CLI To enable WMM for wireless clients:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 977

(host)(config) #wlan ssid-profile <profile> wmm wmm-uapsd
Configuring WMM AC Mapping
The IEEE 802.11e standard defines the mapping between WMM ACs and Differentiated Services Code Point (DSCP) tags. The WMM AC mapping commands allow you to customize the mapping between WMM ACs and DSCP tags to prioritize various traffic types. You apply and configure WMM AC mappings to a WMM-enabled SSID profile.
Ensure that you enable WMM for legacy APs for the mapping to take effect. For 802.11n APs, ensure that you enable either WMM or high throughput.
DSCP classifies packets based on network policies and rules, not priority. The configured DSCP value defines per hop behaviors (PHBs). The PHB is a 6-bit value added to the 8-bit Differentiated Services (DS) field of the IP packet header. The PHB defines the policy and service applied to a packet when traversing the network. You configure these services in accordance with your network policies. Table 211 shows the default WMM AC to DSCP decimal mappings and the recommended WMM AC to DSCP mappings.

Table 211: WMM Access Category to DSCP Mappings

DSCP Decimal Value

WMM Access Category

8

Background

16

0

Best effort

24

32

Video

40

48

Voice

56

By customizing WMM AC mappings, both the controller and AP maintain a customized WMM AC mapping table for each configured SSID profile. All packets received are matched against the entries in the mapping table and prioritized accordingly. The mapping table contains information for upstream (client to AP) and downstream (AP to client) traffic.
In earlier releases, the default mappings exist for all SSIDs. After you customize a WMM AC mapping and apply it to the SSID, the controller overwrites the default mapping values and uses the configured values . If a controller is upgraded to 6.2 from an older version, the default and the user configured WMM-DSCP mappings in the existing SSID profiles are retained. There are no default mappings for a newly created SSID profile and for a factory default controller running 6.2 image.

978 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

When planning your mappings, make sure that any immediate switch or router does not have conflicting 802.1p or DSCP configurations/mappings. If this occurs, your traffic may not be prioritized correctly.
To view the mapping settings, use the following command: (host) #show wlan ssid-profile <profile>
In the WebUI
To map WMM AC with DSCP: 1. Navigate to the Configuration > Wireless > AP Configuration page. 2. Select either the AP Group or AP Specific tab. Click Edit for the AP group or AP name. 3. In the Profiles list, select Wireless LAN, then Virtual AP, then the applicable virtual AP profile. Select the
SSID profile. 4. In the Profile Details, select the Advanced tab. 5. Scroll down to the Wireless Multimedia (WMM) option. Select this option. 6. Modify the DSCP mapping settings, as needed:
n DSCP mapping for WMM voice AC--DSCP used to map voice traffic n DSCP mapping for WMM video AC--DSCP used to map video traffic n DSCP mapping for WMM best-effort AC--DSCP used to map best-effort traffic n DSCP mapping for WMM background AC--DSCP used to map background traffic 7. Click Apply.
In the CLI
To map WMM AC with DSCP: (host)(config) #wlan ssid-profile <profile>
wmm-be-dscp <best-effort> wmm-bk-dscp <background> wmm-vi-dscp <video> wmm-vo-dscp <voice>
The following enhancements have been made to the WMM-DSCP mapping functionality:
l When a controller is upgraded to the 6.2 version from an older version, the default and the user configured WMM-DSCP mappings in the existing SSID profiles are retained.
l Default mappings are not there for a newly created SSID profile and for a factory default controller a running 6.2 image.
l If the mapping has no value, the original DSCP for upstream traffic is retained. l The maximum number of values that can be configured for WMM-DSCP is 8. l For the upstream traffic, if the mapping exists and incoming DSCP value matches one of the mapped
values, then the DSCP value is retained. l For the upstream traffic, if the mapping exists and incoming DSCP value does not match any of the mapped
values, then the DSCP value is overwritten with the first value in the WMM- DSCP list l For Wireless to Wireless Traffic: If the AC of the incoming packet has no mapping and the incoming DSCP
value is mapped to a different AC, then the DSCP value is retained and WMM priority is changed to the corresponding AC where incoming DSCP is mapped.
Configuring DSCP Priorities
You can configure DSCP priorities for WMM packets in the following ways:
l configure the DSCP mappings in the SSID profile l set a ToS value in the ACL

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 979

l set the ToS value and the 802.1p priority in the ACL Setting a ToS value in the ACL overrides the default DSCP mappings configured in the SSID profile. Configuring a DSCP priority in both the L2 and L3 header prioritizes the WMM packets with the higher value. For example, you can have different ToS values set for different voice traffic in a network. To prioritize all of them in the voice queue, we can set the 802.1p priority to voice. Consider a deployment where Cisco Softphone, Lync, and Scopia are configured with the following DSCP : l Cisco Softphone - DSCP 46 l Lync - DSCP 44 l Scopia - DSCP 42 In the absence of doing anything, all of the DSCP above would map into the Video queue. To map all the traffic into voice queue, you can use the following ACL configuration: wlan ssid-profile VOICE
wmm-vo-dscp 46 ip access-list session VOICE
any destination [LYNC_SERVER] [LYNC_PORTS] permit tos 44 dot1p-priority 6 any destination [SCOPiA_SERVER] [SCOPIA _PORTS] permit tos 42 dot1p-priority 6
You must know the ports on which each traffic is sent so that the correct traffic is identified.
Configuring Dynamic WMM Queue Management
Traditional wireless networks provide all clients with equal bandwidth access. However, delays or reductions in throughput can adversely affect voice and video applications, resulting in disrupted VoIP conversations or dropped frames in a streamed video. Thus, data streams that require strict latency and throughput need to be assigned higher traffic priority than other traffic types. The Wi-Fi Alliance defined the Wi-Fi Multimedia (WMM) standard in response to industry requirements for Quality of Service (QoS) support for multimedia applications for wireless networks. This is defined as per the IEEE 802.11e standards. WMM requires: l the access point be Wi-Fi Certified and has WMM enabled l the client device be Wi-Fi Certified l the application support WMM
Enhanced Distributed Channel Access WMM provides media access prioritization through Enhanced Distributed Channel Access (EDCA). EDCA defines four access categories (ACs) to prioritize traffic: voice, video, best effort, and background. These ACs correspond to 802.1p priority tags, as shown in Table 212.

980 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 212: WMM Access Categories and 802.1p Tags WMM Access Category Description

Voice

Highest priority

Video

Prioritize video traffic above other data traffic

Best Effort

Traffic from legacy devices or traffic from applications or devices that do not support QoS

Background

Low priority traffic (file downloads, print jobs)

802.1p Tag 7, 6 5, 4 0, 3
2, 1

While the WMM ACs designate specific types of traffic, you can determine the priority of the ACs. For example, you can choose to give video traffic the highest priority. With WMM, applications assign data packets to an AC. In the client, the data packets are then added to one of the transmit queues for voice, video, best effort, or background.
WMM is an extension to the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol's Distributed Coordination Function (DCF). The collision resolution algorithm responsible for traffic prioritization depends on the following configurable parameters for each AC:
l arbitrary inter-frame space number (AIFSN) l minimum and maximum contention window (CW) size
For each AC, the backoff time is the sum of the AIFSN and a random value between 0 and the CW value. The AC with the lowest backoff time is granted the opportunity to transmit (TXOP). Frames with the highest-priority AC are more likely to get TXOP, because they tend to have the lowest backoff times (a result of having smaller AIFSN and CW parameter values). The value of the CW varies through time as the CW doubles after each collision up to the maximum CW. The CW is reset to the minimum value after successful transmission. In addition, you can configure the TXOP duration for each AC.
On the controller, you configure the AC priorities in the WLAN EDCA parameters profile. There are two sets of EDCA profiles you can configure:
l AP parameters affecting traffic from the AP to the client. l STA parameters affecting traffic from the client to the AP.
Using the WebUI to configure EDCA parameters
Use the following procedure to define an Enhanced Distributed Channel Access (EDCA) profile for APs or for clients (stations).
1. Navigate to the Configuration > AP Configuration page. Select either the AP Group tab or AP Specific tab: l If you selected AP Group, click Edit for the AP group name for which you want to configure EDCA parameters. l If you selected AP Specific, select the name of the AP for which you want to configure EDCA parameters.
2. Under Profiles, select the Wireless LAN, then Virtual AP. In the Virtual AP list, select the appropriate virtual AP.
3. Expand the SSID profile. Select the EDCA Parameters Station or EDCA Parameters AP profile.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 981

4. Configure your desired EDCA Profile Parameters. Table 213 describes the parameters you can configure in this profile.

Table 213: EDCA Parameters Station and EDCA Parameters AP Profile Settings

Parameter

Description

Best Effort

Set the following parameters to define the best effort queue:
l aifsn: arbitrary inter-frame space number. Range: 1-15.
l ecw-max: the exponential (n) value of the maximum contention window size, as expressed by 2n-1. A value of 4 computes to 24-1 = 15. Range: 1-15.
l ecw-min: the exponential (n) value of the minimum contention window size, as expressed by 2n-1. A value of 4 computes to 24-1 = 15. Range: 0-15.
l txop: transmission opportunity, in units of 32 microseconds. Divide the desired transmission duration by 32 to determine the value to configure. For example, for a transmission duration of 3008 microseconds, enter 94 (3008/32). Range: 02047.
l acm: this parameter specifies mandatory admission control. With a value of 1, the client reserves the access category through traffic specification (TSPEC) signaling. A value of 0 disables this option.

Background

Set the following parameters to define the background queue:
l aifsn: arbitrary inter-frame space number. Range: 1-15.
l ecw-max: the exponential (n) value of the maximum contention window size, as expressed by 2n-1. A value of 4 computes to 24-1 = 15. Range: 1-15.
l ecw-min: the exponential (n) value of the minimum contention window size, as expressed by 2n-1. A value of 4 computes to 24-1 = 15. Range: 0-15.
l txop: transmission opportunity, in units of 32 microseconds. Divide the desired transmission duration by 32 to determine the value to configure. For example, for a transmission duration of 3008 microseconds, enter 94 (3008/32). Range: 02047.
l acm: this parameter specifies mandatory admission control. With a value of 1, the client reserves the access category through traffic specification (TSPEC) signaling. A value of 0 disables this option.

Video

Set the following parameters to define the background queue:
l aifsn: trbitrary inter-frame space number. Range: 1-15.
l ecw-max: The exponential (n) value of the maximum contention window size, as expressed by 2n-1. A value of 4 computes to 24-1 = 15. Range: 1-15.
l ecw-min: the exponential (n) value of the minimum contention window size, as expressed by 2n-1. A value of 4 computes to 24-1 = 15. Range: 0-15.
l txop: transmission opportunity, in units of 32 microseconds. Divide the desired transmission duration by 32 to determine the value to configure. For example, for a transmission duration of 3008 microseconds, enter 94 (3008/32). Range: 02047.
l acm: this parameter specifies mandatory admission control. With a value of 1, the client reserves the access category through traffic specification (TSPEC) signaling. A value of 0 disables this option.

Voice

Set the following parameters to define the background queue:

982 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter

Description
l aifsn: trbitrary inter-frame space number. Range: 1-15.
l ecw-max: the exponential (n) value of the maximum contention window size, as expressed by 2n-1. A value of 4 computes to 24-1 = 15. Range: 1-15.
l ecw-min: the exponential (n) value of the minimum contention window size, as expressed by 2n-1. A value of 4 computes to 24-1 = 15. Range: 0-15.
l txop: transmission opportunity, in units of 32 microseconds. Divide the desired transmission duration by 32 to determine the value to configure. For example, for a transmission duration of 3008 microseconds, enter 94 (3008/32). Range: 02047.
l acm: this parameter specifies mandatory admission control. With a value of 1, the client reserves the access category through traffic specification (TSPEC) signaling. A value of 0 disables this option.

5. Click Apply.
Using the CLI to configure EDCA parameters Use the following commands:
wlan edca-parameters-profile {ap|station} <profile> {background | best-effort | video | voice} [acm][aifsn <number>] [ecw-max <exponent> [ecw-min <exponent>] [txop <number>] To associate the EDCA profile instance to a SSID profile: wlan ssid-profile <profile> edca-parameters-profile {ap|sta} <profile>
Enabling WMM Queue Content Enforcement
WMM queue content enforcement is a firewall setting that you can enable to ensure that the voice priority is used for voice traffic. When you enable this feature, if traffic to or from the user is inconsistent with the associated QoS policy for voice, the traffic is reclassified to best effort and data path counters incremented. If TSPEC admission were used to reserve bandwidth, then TSPEC signaling informs the client that the reservation is terminated. You can use the WebUI or CLI to enable WMM queue content enforcement.
In the WebUI
1. Navigate to the Configuration > Advanced Services > Stateful Firewall page. 2. Select Enforce WMM Voice Priority Matches Flow Content. 3. Click Apply.
In the CLI
Use the following command: firewall wmm-voip-content-enforcement
Unified Communication and Collaboration
This section describes the Unified Communication and Collaboration (UCC) feature. The Unified Communications Manager (UCM) is the core solution component of this feature. UCC addresses the onslaught of mobile devices that use voice, video, and collaboration applications. UCC solution reduces the cost of infrastructure for enterprise communication and collaboration.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 983

The UCC feature requires the PEFNG license.
UCC continues to support all existing functionality provided by ArubaOS 6.3.x. This section includes the following sub-sections: l Microsoft® Lync Visibility and Granular QoS Prioritization on page 984 l UCC Dashboard in the WebUI on page 993 l Viewing UCC Information on page 997 l UCC-W-AirWave Integration on page 998 l UCC Call Quality Metrics on page 998 l Changes to Call Admission Control on page 1001 l Troubleshooting and Log Messages on page 1001 l UCC Limitations on page 1001
Microsoft® Lync Visibility and Granular QoS Prioritization
This release of ArubaOS provides a seamless user experience for Microsoft® Lync users using voice or video calls, desktop sharing, and file transfer in a wireless environment. Microsoft Lync is an enterprise solution for UCC. It provides support for voice, video, desktop-sharing, and file-transfer.
Microsoft Lync uses SIP over TLS for call signaling.
ArubaOS provides value added services such as prioritization of Lync sessions, call quality metrics, and visibility by implementing Lync Application Layer Gateway (ALG). This solution also provides a dedicated visibility and troubleshooting framework that allows network administrators to fine-tune and troubleshoot Lync traffic flow in the network. As Microsoft Lync deployments are more widely implemented on wireless networks, it is important to provide Quality of Service (QoS) for Lync voice or video calls, desktop sharing, and file transfer so that there is no visible difference in the user experience between wireless and wired networks. Lync ALG offers an enriched solution in terms of QoS, scalable voice, video, desktop-sharing, and file-transfer. The ALG based solution provides the following value-added services: l Call Quality Metrics: Call quality details such as Mean Opinion Score (MOS), delay, jitter, and packet loss. l Call Priority: Call priority is provided for all Lync sessions irrespective of Call Admission Control (CAC) limit.
In ArubaOS 6.4.x, Lync sessions are prioritized based on session-specific requirements. Voice calls get highest priority, followed by video and desktop sharing. File-transfer gets the least priority. l Call and Client information: Details about Lync call types and statistics through CLI. The commands are discussed later in this section. l Deterministic Solution: A dedicated visibility and troubleshooting framework that allows network administrators to fine-tune and troubleshoot Lync traffic flow in the network. This solution provides an enriched performance which uses Deep Packet Inspection (DPI). l Call Admission Control: In ArubaOS 6.4.x, Lync sessions do not come under the purview of call count based CAC and bandwidth based CAC. For more information, see Changes to Call Admission Control on page 1001. To take advantage of ArubaOS 6.4.x UCC Lync ALG, it is recommended to use the Microsoft Lync SDN API. ArubaOS 6.4.x supports all versions of Lync SDN API up to version 2.0. Microsoft Lync SDN API works with Microsoft Lync server to export details about voice or video calls, desktop-sharing, and file-transfer to Dell

984 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

controller's Web server. The communication between the Lync SDN API and Web server occurs over HTTP or HTTPS. This section includes the following sub-sections: l Lync ALG Compatibility Matrix on page 985 l Configuration Prerequisites on page 985 l Lync SDN API 2.1 Support on page 985 l Lync SDN API - ArubaOS Compatibility Matrix on page 986 l Configuring Lync ALG on page 986 l Viewing Lync ALG Statistics using the CLI l Viewing Lync ALG Statistics Using the WebUI on page 991 l Troubleshooting Lync ALG Issues on page 992
Lync ALG Compatibility Matrix
The following table displays the Lync clients that support voice, video, desktop sharing, and file transfer applications in ArubaOS 6.4.x:
Table 214: Compatibility Matrix

Lync Client Lync Server 2010

Android

No

iOS

No

OS X (Mac)

Yes

Windows

Yes

Lync Server 2013 Yes Yes Yes Yes

Configuration Prerequisites
l Microsoft Lync server supporting Lync SDN API versions up to 2.1. l Dell controller running ArubaOS 6.4.x. If you are running Lync SDN API 2.1, the controller must run
ArubaOS 6.4.3.0 or later.
If your setup does not have a Lync SDN API, use Media Classification as described in Understanding Extended Voice and Video Features on page 1001.
Lync SDN API 2.1 Support
The controller supports Lync SDN API version 2.1. As part of Lync SDN API 2.1, Lync SDN Manager (LSM) sends In-Call quality update messages to the controller. The In-Call quality update message provides visibility on the end-to-end delay, jitter, packet loss, and MOS periodically for VoIP calls that are active. In earlier versions of Lync SDN API, LSM sent end-to-end quality updates to the controller at the end of a VoIP call.
Certain Lync clients can generate in-call quality reports that can be processed by the Lync SDN server and forwarded to the controller for further processing. For a list of Lync clients that support In-Call quality report, contact Microsoft® support.
Some characteristics of the In-Call quality reports are as follows:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 985

l Lync client supporting this enhancement sends an InCallQuality message every 35 seconds (by default). Lesser messages are sent for stable VoIP calls.
l InCallQuality message provides cumulative values of call quality metrics like delay, jitter, packet loss, MOS, and more while the VoIP call is active.
l In a good call quality, the controller receives only a single InCallQuality message after the first period. No further InCallQuality messages are sent until the end of call QualityUpdate message.
l If the call quality fluctuates and crosses the threshold, these events are collected and the sent message is delayed until the least period of time has passed since the last InCallQuality message is sent.
Lync SDN API - ArubaOS Compatibility Matrix
The following table displays the version compatibility matrix between Lync SDN API and ArubaOS.
Table 215: Lync SDN API - ArubaOS Compatibility Matrix

Lync SDN API Version Backward Compatibility
True 2.0
False

2.1

NA

ArubaOS Version 6.3.1.x, 6.4.1.x, and 6.4.2.x 6.4.3.x 6.4.3.x

Configuring Lync ALG
This section describes the procedures to configure Lync ALG on the controller: l Configuring the Lync Listening Port on page 986 l Configuring Lync ALG Status on page 987 l Dynamically Open Firewall for UCC Clients using STUN on page 987 l Configuring Per User Role Lync Call Prioritization on page 988 l Disable Media Classification on page 990 When upgrading from ArubaOS 6.x to 6.4: l Lync ALG is enabled by default. l If media classification is configured before upgrading to ArubaOS 6.4, disable media classification.
Configuring the Lync Listening Port Configure the port number on which Microsoft Lync SDN API sends HTTP or HTTPS call information (XML) messages to Dell controller.
Before you configure Lync listening port, disable classify-media. To disable classify-media, see Disable Media Classification on page 990.
Using the WebUI 1. Navigate to the Configuration > Management > General page. 2. Under the Configure Lync section, select the HTTP or HTTPS protocol from the drop-down list and enter
the port number in the Web lync listening port text box. The port range is from 1024 to 65535.

986 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The Web lync listening port is automatically permitted by the firewall. The user does not have to explicitly define a firewall policy to permit this port.
3. Click Apply. Using the CLI Use the following command: (host) (config) #web-server profile Listen Lync XML messages on HTTP: (host) (Web Server Configuration) #web-lync-listen-port http <listen-port> Or Listen Lync XML messages on HTTPS:
Before configuring the controller to receive Lync SDN API messages using HTTPS, a server certificate must be generated and installed on the controller. Server certificate can be generated either by the controller or Certificate Authority (CA). For more information, see Obtaining a Server Certificate on page 879.
(host) (Web Server Configuration) #web-lync-listen-port https <listen-port> To verify if the port is automatically permitted by the firewall, use the following command: (host) #show firewall-cp
Configuring Lync ALG Status Configure the controller to read Secure SIP signaling messages sent by the Lync clients on port 5061. You can enable or disable Stateful SIPS processing using the following CLI commands. This is enabled by default.
Before you configure Lync ALG status, disable classify-media. To disable classify-media, see Disable Media Classification on page 990.
Enabling Lync ALG (host) (config) #no firewall disable-stateful-sips-processing Disabling Lync ALG (host) (config) #firewall disable-stateful-sips-processing
Dynamically Open Firewall for UCC Clients using STUN Prior to ArubaOS 6.4, the administrator explicitly added ACLs in the user role to allow Lync traffic on the controller. Starting from ArubaOS 6.4, the controller automatically allows firewall sessions for Lync voice and video calls. Firewall sessions for Lync desktop-sharing and file-transfer are not allowed. The administrator should manually open a range of TCP ports under the user role to allow Lync desktop-sharing and file-transfer traffic.To allow a specific range of ports in the user role, refer the Microsoft Technet article which describes the port ranges used by Lync clients and servers. Before media transmission, a Lync client initiates a Session Traversal Utilities for NAT (STUN) connectivity check. Sessions created by STUN are subjected to media classification that classifies the media as Real-time Transport Protocol (RTP) or non-RTP. The firewall automatically allows the RTP session on the controller and denies the non-RTP sessions. For the controller to accept STUN messages, you must allow ICE-STUN based firewall traversal on the controller and allow UDP 3478 and TCP 443 ports in the user role. Allowing ICE-STUN To allow ICE-STUN based firewall traversal, issue the following CLI command: (host) (config) #firewall allow-stun

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 987

Allowing UDP Port 3478 STUN uses UDP port 3478. To allow UDP port 3478 in the user role, issue the following CLI commands. (host) (config) #user-role <STRING> (host) (config-role) #ip access-list session stun (host) (config-sess-stun)#any any udp 3478 permit Allowing TCP Port 443 HTTP Secure (HTTPS) uses TCP port 443. To allow TCP port 443 in the user role, issue the following CLI commands. (host) (config) #user-role <STRING> (host) (config-role) #ip access-list session https-acl (host) (config-sess-stun)#any any svc-https permit
Configuring Per User Role Lync Call Prioritization In ArubaOS 6.3.x, you can configure the UCC call prioritization system-wide only. For example, Lync voice, video, and collaboration applications can be configured system-wide on the controller. Starting from ArubaOS 6.4, an administrator can configure Lync call prioritization on a per user-role basis. With this feature, you can have one set of users have priority on real-time media traffic over another set of users. An administrator can configure the per user-role Lync call prioritization based on the deployment needs. Important Points to Remember If two clients in an active call are in different user-roles and traffic prioritization, the traffic prioritization is based on the following order: 1. Voice 2. Video 3. Best-effort 4. Background The above is applicable for both; the caller and called parties. Example Client 1 (C1) is assigned user-role 1 with voice priority enabled. Client 2 (C2) is assigned user-role 2 with voice priority disabled. When C1 makes a voice call to C2, both parties have prioritized voice call.
Traffic prioritization may not apply if it is a conference call or the caller and called parties are in multiple controllers.
You can configure the per user-role UCC call prioritization for Lync ALG using the WebUI or CLI. Using the WebUI Configure the Lync traffic control profile: 1. Navigate to the Configuration > Advanced Services > All Profiles page. 2. Select Other Profiles to expand the Other Profiles section. 3. Click the Traffic Control Prioritization profile. 4. Under the Traffic Control Prioritization Profile section, enter the profile name and click Add. 5. Click the newly created profile. 6. Select the appropriate check box to prioritize Lync traffic. See Table 216.
By default, Lync ALG prioritizes all the four application types.

988 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 216: Lync ALG Traffic Priority Parameters

Traffic Control Parameter Description

Prioritize voice

Prioritizes voice sessions by Lync ALG.

Prioritize video

Prioritizes video sessions by Lync ALG.

Prioritize desktop-sharing

Prioritizes desktop sharing sessions by Lync ALG.

Prioritize file-transfer

Prioritizes file transfer sessions by Lync ALG.

Link the newly created Lync traffic control profile to the user-role: 1. Navigate to the Configuration > Security > Access Control > User Roles page. 2. Select an existing user role, and click Edit. 3. Under the Misc. Configuration section, select the newly created Lync traffic control profile from the
Traffic Control Profile drop-down list. Using the CLI Configure the Lync traffic control profile: (host) (config) #app lync traffic-control <profile-name> (host) (Traffic Control Prioritization Profile "default") #prioritize-voice (host) (Traffic Control Prioritization Profile "default") #prioritize-video (host) (Traffic Control Prioritization Profile "default") #prioritize-desktop-sharing (host) (Traffic Control Prioritization Profile "default") #prioritize-file-transfer To verify the configuration, use the following command: (host) #show ucc configuration traffic-control lync <profile-name> Link the newly created Lync traffic control profile to the user-role. (host) (config) #user-role <STRING> (host) (config-role) #traffic-control-profile <STRING> Recommended DSCP Mapping for Lync Traffic in Dell Controller The following DSCP values for Lync ALG are recommended:
Table 217: DSCP Values

Lync Application Voice

DSCP Mapping 56

Video and desktop

40

sharing

File transfer

24 (Best-effort)

You can configure the DSCP mappings in the SSID profile using the following CLI command:
(host)(config) #wlan ssid-profile Lync_ALG (host) (SSID Profile "Lync_ALG") #wmm (host) (SSID Profile "Lync_ALG") #wmm-vo-dscp 56

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 989

(host) (SSID Profile "Lync_ALG") #wmm-vi-dscp 40 (host) (SSID Profile "Lync_ALG") #wmm-be-dscp 24 Disable Media Classification
Media classification is not supported when clients are accessed through a network address translation (NAT).

Media classification should not be configured on session ACL for Secure SIP used by Lync clients. The following example verifies if media classification is configured on session ACL that is associated with the user-role, "employee":
(host) #show rights employee

Derived Role = 'employee' Up BW:No Limit Down BW:No Limit L2TP Pool = default-l2tp-pool PPTP Pool = default-pptp-pool Periodic reauthentication: Disabled ACL Number = 64/0 Max Sessions = 65535

access-list List

----------------

Position Name

-------- ----

1

employee

Type

Location

----

--------

session

employee

---------

Priority Source

-------- ------

1

any

Destination ----------any

Service ------svc-sips

Action TimeRange Log ------ --------- --permit

Expired Queue TOS 8021P Blacklist Mirror DisScan ClassifyMedia

------- ----- --- ----- --------- ------ ------- -------------

High

Yes

IPv4/6 -----4

Expired Policies (due to time constraints) = 0
Under ClassifyMedia column, Yes indicates media classification is configured. To disable it, you must first delete the ACL. Use the following commands: (host) (config) #ip access-list session employee (host) (config-sess-employee) #no any any svc-sips permit
You must add the rule any any svc-sips permit back to the ACL without the classify-media parameter: (host) (config-sess-employee) #any any svc-sips permit

Viewing Lync ALG Statistics using the CLI
This section describes the procedures to view Lync ALG statistics using the CLI.

For detailed command parameters, see the ArubaOS 6.4.x CLI Reference Guide.

l Viewing the list of Lync Clients on page 991

990 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l Viewing Call Detail Record for Lync Calls on page 991 l Viewing Call Quality for Lync Calls on page 991 l Viewing Lync Call Trace Buffer on page 991
Viewing the list of Lync Clients Use the following command to display details of clients that are actively using Lync. An entry is created for clients that have actively participated in voice, video, desktop-sharing, or file-sharing sessions. (host) #show ucc client-info app lync
Viewing Call Detail Record for Lync Calls Use the following command to view the Call Detail Record for Lync calls on the controller. This command displays the last 128 call records for W-600 Series controller platform and 512 call records for rest of the controller platforms. (host) #show ucc call-info cdrs app lync
Viewing Call Quality for Lync Calls Use the following command to view the call quality information for Lync voice and video calls. (host) #show ucc call-info cdrs detail
Viewing Lync Call Trace Buffer Use the following command to display the Lync message trace buffer for the first 256 events. Events such as establishing voice, video, desktop sharing, and file transfer are recorded. (host) #show ucc trace-buffer lync
Viewing Lync ALG Statistics Using the WebUI
This section describes the procedures to view Lync ALG statistics using the WebUI. l Viewing Voice Status on page 991 l Viewing Call Performance Report on page 991 l Viewing Call Density Report on page 992 l Viewing Call Detail Report on page 992 l Viewing Voice Client Call Statistics on page 992 l Viewing Voice Client HandOff Information on page 992 l Viewing Voice Client Troubleshooting Information on page 992
Viewing Voice Status To view the status of Lync calls: 1. Navigate to the Monitoring > VOICE > Voice Status page. 2. Select Lync from the Protocol drop-down list.
Viewing Call Performance Report This report displays the performance of voice calls of Lync clients connected to the controller. You can filter the report based on AP IP address, BSSID, Client Extension, ESSID, or the VOIP protocol type. To view the performance of Lync calls: 1. Navigate to the Monitoring > VOICE > Call Performance Report page. 2. Select Lync from the Protocol drop-down list.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 991

Viewing Call Density Report To view the call density report of Lync calls: 1. Navigate to the Monitoring > VOICE > Call Density Report page. 2. Select Lync from the Protocol drop-down list.
Viewing Call Detail Report This report displays detailed call records of Lync clients. To view the report: 1. Navigate to the Monitoring > VOICE > Call Detail Report page. 2. Select Lync from the Protocol drop-down list.
Viewing Voice Client Call Statistics To view call statistics of a Lync client: 1. Navigate to the Monitoring > VOICE > Voice Clients page. 2. Select Lync from the Protocol drop-down list. 3. Select a client from the list of client IP and click View Call Statistics button.
Viewing Voice Client HandOff Information To view the handoff information of a Lync client: 1. Navigate to the Monitoring > VOICE > Voice Clients page. 2. Select Lync from the Protocol drop-down list. 3. Select a client from the list of client IP and click HandOff Information.
Viewing Voice Client Troubleshooting Information To view troubleshooting information of a Lync client: 1. Navigate to the Monitoring > VOICE > Voice Clients page. 2. Select Lync from the Protocol drop-down list. 3. Select a client from the list of client IP and click Troubleshooting.
Troubleshooting Lync ALG Issues
The following sections describe the CLI commands to troubleshoot Lync ALG issues.
Enabling Lync ALG Debug Logs Lync ALG related debug logs are available under logs. Use the following command to enable this: (host) (config) #logging level debugging user process stm subcat voice
Viewing Lync ALG Debug Logs To view the Lync ALG debug logs, use the following command: (host) (config) #show log user all Jul 18 15:33:09 :503188: <DBUG> |stm| |voice| vm_lync_create_call: mac(1c:ab:a7:2d:75:6b) num_ sessions(0) curr_session(0x1064f144)
Jul 18 15:33:09 :503188: <DBUG> |stm| |voice| VM: vm_lync_create_call:1001 LYNC INFO: Headers are 2b00b11f-71e3-40a5-a1bf-386dc9d49eb6 sip:user@lyncqa.com sip:user1@lyncqa.com
Jul 18 15:33:09 :503188: <DBUG> |stm| |voice| vm_lync_update_session_sdp:1869 -- vc (1c:ab:a7:2d:75:6b)
Jul 18 15:33:09 :503188: <DBUG> |stm| |voice| VM: vm_lync_update_session_sdp:1961 LYNC INFO: copied 1 staus to call_info

992 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Jul 18 15:33:09 :503162: <DBUG> |stm| |voice| VM: vm_lync_update_session_sdp 1963: Tx params changed
Jul 18 15:33:09 :503188: <DBUG> |stm| |voice| vm_lync_update_session_sdp:1869 -- vc (1c:ab:a7:2d:75:6b)
Jul 18 15:33:09 :503188: <DBUG> |stm| |voice| VM: vm_lync_update_session_sdp:1961 LYNC INFO: copied 1 staus to call_info
Jul 18 15:33:09 :503162: <DBUG> |stm| |voice| VM: vm_lync_update_session_sdp 1963: Tx params changed Jul 18 15:33:09 :503126: <DBUG> |stm| |voice| VM: vm_lync_create_call 1023: Session created and inserted successfully for call id 2b00b11f-71e3-40a5-a1bf-386dc9d49eb6, 10.XX.XX.208
Jul 18 15:33:09 :503188: <DBUG> |stm| |voice| VM: vm_lync_idle_startdialog_req:301 LYNC INFO: vm_lync_create_call is success..
Jul 18 15:33:09 :503188: <DBUG> |stm| |voice| VM: vm_lync_idle_startdialog_req:309 LYNC INFO: vm_lync_create_call() is success..
UCC Dashboard in the WebUI
The UCC dashboard gives a complete view of the UCC deployment in the controller. The UCC dashboard has two levels of displaying statistics: l UCC Dashboard Aggregated Display l UCC Dashboard Per Client Display
UCC Dashboard Aggregated Display
The UCC Dashboard Aggregated Display shows an aggregated view of the UCC calls made in the controller. The administrator can see a top level view of the call quality assessment, and further drill-down into a specific view based on the analysis required.
Chart View Navigate to Dashboard > UCC. The UCC page displays the overall health (in graphical format) of the UCC deployment in the controller as shown in Figure 202.
Figure 202 UCC Dashboard

Each graphical section of the UCC dashboard is explained below:
Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 993

n Call Volume ­ This graph displays the total number of calls made based on the UCC application type. For example, SIP, Lync, SCCP, H.323, NOE, SVP, VOCERA, and FaceTime.
n Call Quality ­ This graph displays the AP-to-Client call quality under the WLAN tab and the end-to-end quality including wired and wireless legs of the call under the End-to-End tab. The number of UCC calls are categorized by the following call quality: n Good n Fair n Poor n Not Available: Under WLAN tab, short duration voice calls (less than 60 seconds), video calls, and file-transfer session are categorized as Not Available. Under End-to-End tab, short duration voice calls (less than 60 seconds), video calls, file-transfer, and desktop-sharing sessions are categorized as Not Available.
When VoIP calls are prioritized using media classification, the End-to-End call quality is not available.
n Call Quality vs. Client Health - This graph displays the co-relation between the VoIP call quality and the VoIP client health of every UCC call. This graph displays the UCC score under the WLAN tab and MOS under the End-to-End tab.
When VoIP calls are prioritized using media classification, the End-to-End call quality is not available.
n Calls Per Device Type ­ This graph displays the calls made per device type. For example, Windows 7, Mac OS X, iPhone, or Android.
n Roaming ­ Roaming status of UCC clients. The status can be: n No ­ Number of calls where the client did not roam to a new AP. n Yes - Number of calls where the client has roamed to a new AP.
n QoS Correction ­ If the DSCP value of the Real-time Transport Protocol (RTP) packets sent by the client differs from the WMM-DSCP configured in the corresponding SSID profile definition, the controller corrects this value as per the SSID profile definition and classifies the call as QoS corrected. This graph displays the number of UCC calls where the controller has corrected the WMM-DSCP value for such calls. The QoS correction is categorized as: n No ­ No WMM-DSCP value correction. n Yes ­ WMM-DSCP value corrected by the controller. n Not Available ­ WLAN short duration voice calls (less than 60 seconds), video calls, and file-transfer session are categorized as Not Available.
Details View To display an aggregated list of all the UCC call data metrics in the controller, navigate to the Dashboard > UCC page of the WebUI and click any of the following hyperlinks:
n Call Volume Details n Call Quality Details n Client Health Details n Device Details n Roaming Details n QoS Details

994 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 203 displays an aggregated list of all the UCC call data metrics in the controller. Figure 203 Wireless Call List

VoIP calls made to/from clients outside the local controller are displayed in the External Call List pane. This pane lists all the external and wired client call CDRs. See Figure 204. Figure 204 External Call List
UCC Dashboard Per Client Display
On the Dashboard > Clients page of the WebUI, clicking the client IP hyperlink displays the details page of the client. Click the UCC tab. This tab displays an aggregated list of UCC call data metrics of a client. See Figure 205. Figure 205 UCC Client Page

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 995

Figure 206 displays all the VoIP call statistics made by a particular client. This graph displays the AP-to-Client metrics under the WLAN tab and the end-to-end quality including wired and wireless legs of the call under the End-to-End tab.
When VoIP calls are prioritized using media classification, the End-to-End call quality is not available.
Figure 206 All Calls

Figure 207 displays the VoIP call summary for a selected call of a client. Figure 207 Selected Call Summary

Figure 208 displays the VoIP call details for a selected call of a client. Figure 208 Selected Call Details

996 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

On the Dashboard > Usage page of the WebUI, the Call Quality vs. Client Health graph displays the corelation between the VoIP call quality (UCC-Band) and the VoIP client health of every UCC call. See Figure 209.
Figure 209 Call Quality vs. Client Health

Viewing UCC Information
This section describes the commands to view UCC clients, calls, and configuration information in the controller.
For detailed command parameters, see the ArubaOS 6.4.x CLI Reference Guide.

l Viewing the list of Lync Clients on page 991 l Viewing UCC Client Information on page 997 l Viewing UCC Configuration on page 997 l Viewing UCC Statistics on page 998 l Viewing UCC Trace Buffer on page 998
Viewing UCC Call Detailed Record
Use the following command to display the CDR statistics for UCC: (host) #show ucc call-info cdrs [ap | app | cid | detail]
Viewing UCC Client Information
Use the following command to display the UCC client status and CDR statistics: (host) #show ucc client-info [app | detail | sta]
Viewing UCC Configuration
Use the following command to display the UCC configuration in the controller:
Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 997

(host) #show ucc configuration [cac-alg | dialplan | logging | midcall-timeout | realtimeanalysis | rtcp-inactivity | sip | traffic-control]
Viewing UCC Statistics
Use the following command to display the UCC call statistics in the controller: (host) #show ucc statistics {counter | dial-plan | remote | tspec-enforcement | wmm-flow}
Viewing UCC Trace Buffer
Use the following command to display the UCC call message trace buffer for Lync, SCCP, and SIP ALGs. Events such as establishing voice, video, desktop sharing, and file transfer are recorded: (host) #show ucc trace-buffer {lync | sccp | sip}
UCC-W-AirWave Integration
The UCC-W-AirWave integration provides a multi-controller visibility into the UCC solution across deployments. The controller sends raw UCC data using Application MONitoring (AMON) periodically. W-AirWave Management Platform (AMP) receives these AMON messages and uses this data to display user-friendly aggregated and perclient UCC statistics in W-AirWave. This helps the administrator to assess the overall health and troubleshoot UCC deployments in a multi-controller environment. The UCC dashboard is supported in W-AirWave 8.0 onwards.
To register the AMP server with the controller, use the following command to enter the IP address of the AMP server that should receive the AMON messages from the controller: (host) (config) #mgmt-server type amp primary-server <primary-server-ip>
UCC Call Quality Metrics
Computing the call quality metrics is an important aspect of troubleshooting. The metrics enable administrators to get an idea of the quality of service on the network and troubleshoot network congestion whenever required. ArubaOS 6.3.x provides UCC call quality metrics for Lync voice calls only at the end of the call. In addition to capturing call quality metrics at the end of the call, ArubaOS 6.4.x captures call quality metrics for active calls. The call quality metrics are extended to voice, video, desktop-sharing, and file-transfer applications.
A new metric, UCC score is introduced in ArubaOS 6.4. UCC score computes the quality of voice calls. It takes delay, jitter, and packet loss of RTP packets into account. UCC score is computed on a scale of 0 to 100. This feature works in tunnel, decrypt-tunnel, and split-tunnel forward modes. To compute the UCC score, you must enable RTP Analysis on the master controller. Issue the following CLI commands: (host) (config) #voice real-time-config (host) (Configure Real-Time Analysis) #config-enable
Table 218 shows the call quality parameters displayed on the controller for various UCC ALGs.

998 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 218: Voice and Video Call Quality Parameters

UCC Application Lync
SIP
SCCP NOE

Media Type Audio
Video Audio Video Audio Audio

Call Quality Parameters
l Mean Opinion Score (MOS) l UCC Score l Delay l Jitter l Packet Loss
Following end-to-end call quality parameters are available: l Delay l Jitter l Packet Loss
l UCC Score l Delay l Jitter l Packet Loss
l Delay l Jitter l Packet Loss
l UCC Score l Delay l Jitter l Packet Loss
l UCC Score l Delay l Jitter l Packet Loss

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 999

UCC Application Vocera
H.323

Media Type Audio
Audio
Video

Call Quality Parameters
l UCC Score l Delay l Jitter l Packet Loss
l UCC Score l Delay l Jitter l Packet Loss
l Delay l Jitter l Packet Loss

Table 219 shows the quality parameters displayed for Lync collaborative services. Table 219: Quality Parameters for Collaborative Services

Lync Collaborative Services Lync Desktop-sharing
Lync File-transfer

Quality Parameters
l UCC Score l Quality band l Delay (msec) l Jitter (msec) l Signal to Noise Ratio (SNR) l Avg Tx Rate (Mbps) l Tx Drop (%) l Tx Retry (%) l Avg Rx Rate (Mbps) l Rx Retry (%) NOTE: Delay and Jitter call quality parameters are measured endto-end.
l SNR l Avg Tx Rate (Mbps) l Tx Drop (%) l Tx Retry (%) l Avg Rx Rate (Mbps) l Rx Retry (%) NOTE: The quality parameters are computed by the AP and does not have any dependency on the quality update message from the Microsoft Lync server.

1000 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Changes to Call Admission Control
In ArubaOS 6.4.x,CAC is not applied for Lync calls. Lync calls are allowed to flow with high priority irrespective of the call count or bandwidth based CAC limit. This applies to calls prioritized by both media classification and SDN API based Lync ALG. CAC configured under wlan voip-cac-profile and Virtual AP (VAP) based bandwidth limitation under wlan traffic-management-profile does not apply to Lync calls.
Troubleshooting and Log Messages
When you report any UCC related issues, collect the STM, UCM, and tech-support logs. To enable VoIP ALG related debug logs: (host) (config) # logging level debugging user process stm subcat voice To enable UCM related debug logs: (host) (config) #logging level debugging user process ucm (host) (config) #logging level debugging system process ucm Collect the output of the following commands: l show datapath session table
The RTP sessions are tagged with the Q flag indicating real time analysis is computed for the session. l show datapath application l show datapath user l show rights l show datapath acl <id> l show datapath session l show voice real-time-config Verify the RTP analysis for an active call by issuing the following command: (host) #show voice real-time-analysis While a Lync call is active, the output of this command displays the current delay, jitter, packet loss, and UCC score of the client. This command displays any data only if the client is on an active call.
UCC Limitations
l Voice ALGs should not be enabled when voice clients are behind a NAT. l Media classification does not work when user VLAN has IP NAT configured. l When using media classification, UCC score, jitter, delay, and packet loss is calculated only for voice RTP
streams. These metrics are not available for video streams. l Media classification does not work in split-tunnel forwarding mode. l When VoIP calls are prioritized using media classification, end-to-end call quality metrics such as Mean
Opinion Score (MOS), delay, jitter, and packet loss are not available. l UCC score is calculated for voice calls and desktop-sharing sessions only. l For Lync calls, MOS is generated only for voice calls. Lync server does not generate MOS for video calls,
desktop-sharing, and file-transfer sessions.
Understanding Extended Voice and Video Features
This section describes the other voice and video-related functionalities that are available on the controller.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 1001

Understanding QoS for Microsoft Lync and Apple Facetime
Voice and video devices use a signaling protocol to establish, control, and terminate voice and video calls. These control or signaling sessions are usually permitted using pre-defined ACLs. If, however, the control signaling packets are encrypted, the controller cannot determine which dynamic ports are used for voice or video traffic. In these cases, the controller has to use an ACL with the classify-media option enabled to identify the voice or video flow based on a deep packet inspection and analysis of the actual traffic.
Microsoft Lync
Microsoft Lync uses SIPS to establish, control, and terminate voice and video calls. The following example creates an ACL named lync acl for Microsoft Lync traffic that identifies port 5061 as the reserved SIP-TLS port. (host) (config) #ip access-list session lync-acl (host) (config-sess-lync-acl)#any any tcp 5061 permit position 1 queue high classify-media (host) (config-sess-lync-acl)#any any udp 1025-65535 permit position 2 queue low
UCC Score for Lync Media Classification
The controller supports UCC score for Lync calls prioritized using media classification. As part of this feature, Unified Communication Manager (UCM) supports the following:
l Real-time quality analysis for Lync voice and video calls (voice RTP streams only) l Real-time computation of UCC score (delay, jitter, and packet loss) for Lync VoIP calls prioritized using media
classification. The UCC score is computed by the AP in the downstream direction. l Call Quality vs. Client Health chart in the UCC dashboard of the controller.
When VoIP calls are prioritized using media classification, end-to-end call quality metrics such as Mean Opinion Score (MOS), delay, jitter, and packet loss are not available.

UCC score computes the quality of voice calls. It takes delay, jitter, and packet loss of Real-time Transport Protocol (RTP) packets into account. UCC score is computed on a scale of 0 to 100. To compute the UCC score, you must enable RTP Analysis on the master controller.
In the CLI
To enable RTP analysis in the CLI: (host) (config) #voice real-time-config (host) (Configure Real-Time Analysis) #config-enable
In the WebUI
To enable RTP Analysis in the WebUI:
1. Navigate to Configuration > Advanced Services > All Profiles. 2. In Profiles section, expand Other Profiles > Configure Real-Time Analysis. 3. In Profile Details section, check the Real-Time Analysis of voice calls check box. 4. Click Apply.
Available Call Quality Metrics
Following call quality metrics are available for Lync calls prioritized by media classification:
Client IP, Client Mac, ALG, Duration(approximate), Orig time(approximate), Status, Reason, Call Type (voice/video), Client Health, UCC Score, UCC Band, Source port, Destination port, Originated and modified DSCP & WMM values, delay, jitter, and packet loss.
As the RTP packets are encrypted, following call quality metrics are not available for Lync calls prioritized by media classification:
Client Name, Direction, Called to, MOS, MOS band, End-to-end Delay, jitter and packet loss.

1002 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

File transfer and desktop sharing CDRs are also not available. WLAN delay, jitter, and packet loss are not available for video sessions.
The show ucc commands are extended to media classification based Lync ALG. For more information on the list of commands, see Viewing UCC Information on page 997.
The UCC dashboard is extended to media classification based Lync ALG. For more information on UCC dashboard, see UCC Dashboard in the WebUI on page 993.
Important Points to Remember
l You must disable Lync ALG if you use the classify-media option. More more information on Lync ALG, see Lync ALG.
l When using media classification, UCC score, jitter, delay, and packet loss is calculated only for voice RTP streams. These metrics are not available for video streams.
l Media classification does not work in split-tunnel forwarding mode. l When VoIP calls are prioritized using media classification, end-to-end call quality metrics such as Mean
Opinion Score (MOS), delay, jitter, and packet loss are not available. l Media classification is not supported when clients are behind a Network Address Translation (NAT) device.
Microsoft Lync Support for Mobile Devices
Microsoft Lync supports the mobile devices that are running on the following operating systems:
l Windows l Android l iOS
You can configure the following ACLs to support the media classification:
l TCP Port 5061 for SIPS signaling sessions initiated by the Lync clients l TCP Port 443 for signaling sessions initiated by Lync application running on mobile devices l UDP and TCP traffic on port range 1024 to 65535 for sessions initiated by the Lync applications
The following example shows how to configure an ACL to identify and monitor the mobile devices supported by Lync: (host) (config) #ip access-list session Lync-Smart-Device (host) (config-sess-Lync-Smart-Device)#any ? (host) (config-sess-Lync-Smart-Device)#any alias Lync-Servers ? (host) (config-sess-Lync-Smart-Device)#any alias Lync-Servers tcp 443 ? (host) (config-sess-Lync-Smart-Device)#any alias Lync-Servers tcp 443 permit classify-media (host) (config-sess-Lync-Smart-Device)#any any ? (host) (config-sess-Lync-Smart-Device)#any any udp 1025-65535 permit position 3 queue low
Apple Facetime
When an Apple device starts a Facetime video call, it initiates a TCP session to the Apple Facetime server over port 5223, then sends SIP signaling messages over a non-default port. When media traffic starts flowing, audio and video data are sent through that same port using RTP. (The audio and video packets are interleaved in the air, though individual sessions can be uniquely identified using their payload type and sequence numbers.) The RTP header and payload also get encapsulated under the TURN ChannelData Messages. The Facetime call is terminated with a SIP BYE message that can be sent by either party.
Table 220 lists the ports used by Apple Facetime. Facetime users need to be assigned a role where traffic is allowed on these ports:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 1003

Table 220: Ports used by the Apple Facetime Application

Port

Packet Type

53

TCP/UDP

443

TCP

3478-3497

UDP

5223

TCP

16384-16387

UDP

16393-16402

UDP

The example below shows how to configure an ACL to identify and monitor Apple Facetime traffic:
(host) (config) #ip access-list session facetime-acl (host) (config-sess-facetime-acl)#any any tcp 80 permit position 1 queue low (host) (config-sess-facetime-acl)#any any tcp 443 permit position 2 queue low (host) (config-sess-facetime-acl)#any network 17.0.0.0 255.0.0.0 tcp 5223 permit position 3 queue low classify-media (host) (config-sess-facetime-acl)#any any UDP 80 permit position 4 queue low (host) (config-sess-facetime-acl)#any network 17.0.0.0 255.0.0.0 UDP 16384-16387 permit position 5 queue low
You can use the WebUI or CLI for enabling the Classify Media option for the encrypted signaling protocols. In our example, we will configure this support for Microsoft Lync:
In the WebUI
1. Navigate to the Configuration > Security > Access control page. 2. Click the Policies tab.
Figure 210 Firewall Policies Tab

3. Click Add to create a new policy. 4. Enter a name for the policy in the Policy Name field and choose Session in the Policy Type drop down
menu. 5. Select IPv4 in the IP Version drop down menu and click Add. 6. In the Service column, choose service and Select svc-sips (tcp-5061) from the Service drop-down
menu.

1004 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

7. Select the Classify Media check box. There will be a performance impact if you choose any in the Service column and enable the Classify Media flag for the deep packet inspection.
Figure 211 Enabling Classify Media

8. Click Apply.
Enabling WPA Fast Handover
In the 802.1x Authentication profile, the WPA fast handover feature allows certain WPA clients to use a preauthorized PMK, significantly reducing handover interruption. Check with the manufacturer of your handset to see if this feature is supported. This feature is disabled by default.
This feature supports WPA clients, while opportunistic key caching (also configured in the 802.1x Authentication profile) supports WPA2 clients.
In the WebUI
1. Navigate to the Configuration > AP Configuration page. Select either AP Group or AP Specific. l If you select AP Group, click Edit for the AP group name for which you want to enable WPA fast handover. l If you select AP Specific, select the name of the AP for which you want to enable WPA fast handover.
2. Under Profiles, select Wireless LAN, then Virtual AP. In the Virtual AP list, select the appropriate virtual AP instance.
3. Select AAA profile. Select the 802.1x Authentication Profile to display in the Profile Details section. 4. Scroll down to select the WPA-Fast-Handover check box. 5. Click Apply.
In the CLI
Use the following commands: aaa authentication dot1x <profile>
wpa-fast-handover For deployments where there are expected to be considerable delays between the controller and APs (for example, in a remote location where an AP is not in range of another Dell AP) you can increase the value for the bootstrap threshold in the AP System profile to minimize the chance of the AP rebooting due to temporary loss of connectivity with the Dell controller.
Enabling Mobile IP Home Agent Assignment
When you enable IP mobility in a mobility domain, the proxy mobile IP module determines the home agent for a roaming client. An option related to voice clients that you can enable allows on-hook phones to be assigned a

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 1005

new home agent to load balance voice client home agents across controllers in the mobility domain. See IP Mobility on page 689 for more information about mobility.
Scanning for VoIP-Aware ARM
ARM scanning on an AP during a call affects the voice quality. You can pause the ARM scanning on the AP when a call is active by turning on the VoIP-Aware ARM Scanning support to avoid voice quality issues. You can use the WebUI or CLI to enable VoIP-aware ARM scanning in the ARM profile.
In the WebUI
1. Navigate to the Configuration > AP Configuration page. Select either the AP Group or AP Specific. l If you selected the AP Group tab, click Edit by the name of the AP group with the ARM profile you want to configure. l If you selected the AP Specific tab, click Edit by the name of the AP with the ARM profile you want to configure.
2. In the Profiles list, Expand the RF Management section. 3. Select Adaptive Radio Management (ARM) Profile. 4. Select a profile instance from the drop-down menu to edit that profile. 5. Select the VoIP Aware Scan option. 6. Click Apply. For additional information on configuring an Adaptive Radio Management profile, see Configuring ARM Profiles on page 514.
In the CLI
rf arm-profile <profile-name> voip-aware-scan
Disabling Voice-Aware 802.1x
The Voice-Aware 802.1x support is deprecated for ArubaOS 5.0 and later releases.
Although reauthentication and rekey timers are configurable on a per-SSID basis, an 802.1x transaction during a call can affect voice quality. If a client is on a call, 802.1x reauthentication and rekey are disabled by default until the call is completed. You disable or re-enable the "voice aware" feature in the 802.1x authentication profile.
In the WebUI
1. Navigate to the Configuration > AP Configuration page. Select either AP Group or AP Specific. l If you select AP Group, click Edit for the AP group name for which you want to disable voice awareness for 802.1x. l If you select AP Specific, select the name of the AP for which you want to disable voice awareness for 802.1x.
2. Under Profiles, select Wireless LAN, then select Virtual AP. In the Virtual AP list, select the appropriate virtual AP instance.
3. Select AAA profile. Select the 802.1x Authentication Profile to display in the Profile Details section. 4. Scroll down and deselect the Disable rekey and reauthentication for clients on call check box.

1006 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

5. Click Apply.
In the CLI
Use the following commands: aaa authentication dot1x <profile>
no voice-aware
Configuring SIP Authentication Tracking
The controller supports the stateful tracking of session initiation protocol (SIP) authentication between a SIP client and a SIP registry server. Upon successful registration, a user role is assigned to the SIP client. You specify a configured user role for the SIP client in the AAA profile.
In the WebUI
1. Navigate to the Configuration > AP Configuration page. Select either AP Group or AP Specific. l If you select AP Group, click Edit for the AP group name for which you want to configure the SIP client user role. l If you select AP Specific, select the name of the AP for which you want to configure the SIP client user role.
2. Under Profiles, select Wireless LAN, then Virtual AP. In the Virtual AP list, select the appropriate virtual AP instance.
3. Select the AAA profile. Enter the configured user role for SIP authentication role. 4. Click Apply.
In the CLI
Use the following commands: aaa profile <profile>
sip-authentication-role <role> Use the show voice client-status command to view the state of the client registration.
Enabling Real Time Call Quality Analysis
Real Time Call Quality Analysis (RTCQA) enables the controller to compute the call quality parameters such as jitter, delay, packet loss, and call quality score (R-value) directly from the RTP media stream. Additionally, the controller saves the periodic samples of the quality parameters for detailed analysis of the results. You can monitor up to 30 active calls that are initiated after enabling RTCQA. You can avail the full benefits of RTCQA by setting the AP in tunnel, decrypt-tunnel, or split-tunnel forwarding mode. Enabling RTCQA is helpful in cases where the VOIP clients do not use RTP Control Protocol (RTCP) or use encrypted RTCP (in the case of Lync) which the controller cannot get the quality information from the RTCP frames.
Important Points to Remember
RTCQA for voice calls is supported only in the following cases: l when the signaling messages are not encrypted. l when the signaling messages are encrypted for Lync. l when the voice client does not roam from one controller to another controller. In other words, when a client
moves to a foreign agent controller, RTCQA does not take effect. You can use the WebUI or CLI to enable RTCQA and view the call quality reports based on the analysis.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 1007

To generate Lync UCC score, you must enable RTCQA. For more information on UCC score, see UCC Call Quality Metrics on page 998
In the Web UI
1. Navigate to the Configuration > Advanced services > All Profiles page. 2. Expand Other Profiles under the Profiles section and click Configure Real-Time Analysis. 3. Enable Real Time call quality analysis for the voice calls by selecting the Real-Time Analysis of voice calls
check box. Figure 212 Enable Real Time Analysis

4. Click Apply. Viewing Real Time Call Quality Reports 1. To view the average Real Time analysis reports, navigate to the Monitoring > Voice > Real-Time Quality
Analysis page. 2. To view the detailed Real Time analysis report of a specific client, select the client and click View Details.
Real Time analysis report is not available for clients in tunnel or bridge mode.

In the CLI
To configure Real Time analysis on voice calls: (host) (config) #voice real-time-config (host) (Configure Real-Time Analysis) #config-enable To view the average Real Time analysis reports for the voice clients: (host) #show voice real-time-analysis

Real-Time Analysis Call Quality Report

--------------------------------------

Client(IP) Client(MAC)

Client(Name)

---------- -----------

------------

10.16.33.251 00:1f:6c:7a:d4:fd 6005

10.15.16.201 1c:ab:a7:2d:75:6b 7129

ALG --sccp Lync

Jitter(D)(usec) --------------16.980 10.934

Pkt-loss(D)(%) -------------0.625 0.120

Delay(D)(usec) -------------421.125 454.163

UCC Score(D) -----------78.985 86.250

Forward mode -----------decrypt-tunnel tunnel

Num Records:2 To view the detailed Real Time analysis report for a specific client: (host) #show voice real-time-analysis sta 1c:ab:a7:2d:75:6b

1008 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

WARNING: This command will be deprecated, please use show ucc commands instead

Real-Time Analysis Detailed Report

----------------------------------

Time

Jitter(D)(usec) Pkt-loss(D)(%)

---------------- --------------- --------------

Mar 15 17:05:34 2.000

1.000

Mar 15 17:05:32 2.000

5.000

Mar 15 17:05:30 3.000

7.000

Mar 15 17:05:28 2.000

2.000

Delay(D)(usec) -------------255.000 211.000 203.000 271.000

UCC Score(D) --------88.360 78.360 73.360 86.360

Forward mode -----------tunnel tunnel tunnel tunnel

Enabling SIP Session Timer
SIP session timer is implemented in the SIP ALG as per RFC 4028.
SIP session timer defines a keep alive mechanism for the SIP sessions using the periodic session refresh requests from the user agents. The interval for the session refresh requests is determined through a negotiation mechanism. If a session refresh request is not received within the negotiated interval, the session is assumed to be terminated.
For more information on the SIP session timer support, See section 8.0, Proxy Behaviour in the RFC 4028.
This release of ArubaOS does not support the configurable Min-SE parameter for SIP ALG. Therefore, the ALG will not generate the 422 responses for the session refresh requests.

You can use the WebUI or CLI to enable the SIP session timer and set the session-expiry timer value using the WebUI and CLI.

SIP Session Timer can be configured only for SIP over UDP.

In the WebUI
1. Navigate to the Configuration > Advanced services > All Profiles page. 2. Expand Other profiles under the Profiles section and click SIP Settings. 3. Enable the session timer by selecting the Session Timer check box under the Profile Details section. 4. Specify a timeout value in seconds in the Session Expiry field. The range is 240- 1200 seconds. The default
value is 300 seconds.
Figure 213 Enabling SIP Session Timer

5. Click Apply.
In the CLI
To configure the session timer and the timeout value: (host) #configure terminal
Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 1009

(host) (config) #voice sip (host) (SIP settings) #session-timer (host) (SIP settings) #session-expiry 400
To view the SIP settings on the controller:
(host) #show voice sip

SIP settings -----------Parameter --------Session Timer Session Expiry Dialplan Profile

Value ----Enabled 400 sec N/A

Enabling Wi-Fi Edge Detection and Handover for Voice Clients
Voice clients in an infrastructure can be switched to an alternate carrier or connection when they leave their active Wi-Fi coverage or roam to an area with poor Wi-Fi coverage. The controller uses the best Wi-Fi signal strength (dbm value) reported by the voice clients (received from all APs) to determine if the voice clients are within or leaving their active Wi-Fi connection. If the signal strength is weak, the controller will trigger the handover process to switch the voice client to an alternate carrier or connection. This process ensures QoS for voice calls.
l The handover process is available for voice clients supporting the 802.11K standard and with the ability to transmit and receive beacon reports. l The voice clients should have dual mode capabilities to ensure that they can switch to an alternate network in case of a loss in Wi-Fi coverage.

The handover process can be configured using the wlan handover-trigger-profile command. Use the handover-threshold parameter to specify the threshold value (dbm) and enable the handover-trigger parameter. If the best signal strength reported by a voice client is equal to or less than the threshold value, the handover process is initiated.
In the WebUI
1. Navigate to the Configuration > Advanced Services > All Profiles page. 2. Expand Wireless Lan under the Profiles section. 3. Expand 802.11 K profile under Wireless Lan. 4. Select the default profile. 5. Select Advertise 802.1k Capability. 6. In the profiles list, note which Handover Trigger Feature Settings profile is associated with the selected
802l11k profile. 7. Expand Handover Trigger under Wireless Lan. 8. Select the handover trigger profile associated with the default 802.11k profile. 9. Select the Enable Handover Trigger feature checkbox 10.Specify the handover threshold value in the Threshold signal strength value at which handover
Trigger should be sent to the client field. The handover threshold value should be within the range 20 to 70 dbm. The default threshold value is -60 dbm. 11.Click Apply.
In the CLI
The following command enables the dot11k profile and sets the handover threshold at -60dbm.

1010 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

(host) (config) #wlan handover-profile default (host) (802.11K Profile "default") #dot11k-enable (host) (802.11K Profile "default") #handover-trigger-profile default (host) (802.11K Profile "default") #exit (host) (config) #wlan handover-trigger-profile default (host) (Handover Trigger Profile) #handover-trigger (host) (Handover Trigger Profile) #handover-threshold 60
The handover threshold value is a negative dbm value. In the CLI, enter the value without the negative (-) sign.
Working with Dial Plan for SIP Calls
A PSTN call from a SIP device usually requires the user to prefix 9 or 0 before the destination number. You can configure dial plans (prefix codes) on the controller that are required by the local EPABX system to provide outgoing PSTN call facility from a SIP device. After the dial plan is configured, a user can make SIP calls by dialing the destination number without any prefixes.
Dial plan can be configured only for SIP over UDP.
Understanding Dial Plan Format
The format of a SIP dial plan is <sequence> <pattern> <action>. l sequence--is a number between 100 and 65535. The sequence number positions the dial plan in the list of
dial plans configured in the controller. l pattern--is the digit pattern or the number of digits that will be dialed by the user. You can specify digit
pattern using `X', `Z', `N', `[]', and `.'. n X is a wild card that represents any character from 0 to 9. n Z is a wild card that represents any character from 1 to 9. n N is a wild card that represents any character from 2 to 9. n . (period) is a wild card that represents any-length digit strings. l action--is the prefix code that is automatically prefixed to the dialed number. This is specified as <prefixcode>%e. Examples of prefix codes are: n 9%e: The number 9 is prefixed to the dialed number. n 91%e: The number 91 is prefixed to the dialed number.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 1011

Table 221: Examples of Dial Plans

Dialplan Pattern

Action Description

XXXX

%e

When the user dials a four digit number, no action is taken and the call is

allowed.

XXXXXXX

9%e

When the user dials a seven digit number, a nine (9) is prefixed to that number and the call is executed.
Example, if the user dials 2274500, the call is executed by adding 9 to the number, 92274500.

XXXXXXXXXX

91%e

This dial plan prefixes 91 to the dialed number. Example, call to 4082274500 will be executed as 914082274500.

+1XXXXXXXXXX

9%e

This dial plan replaces `+' with 9 and executes the call. Example, call to +14082274500 is executed as 914082274500.

+.

9011

This dial plan removes `+' and prefixes 9011 for an international call.

%e

Example, call to +886212345678 is executed as 9011886212345678.

Configuring Dial Plans
You can configure a maximum of two dial plan profiles and maximum of 20 dial plans per profile. The dial plan must be associated to a SIP ALG configuration. To configure a dial plan for SIP devices: 1. Create a voice dial plan. 2. Associate the dial plan with SIP ALG.
In the WebUI 1. In the WebUI, navigate to Configuration > Advanced Services > All Profiles > Controller > Dialplan
Profile. Enter a name for the dial plan profile and click Add.
Figure 214 Dialplan Profile

1012 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

2. Under Profiles, expand Controller and select the newly created dial plan profile. Enter the following dial plan details and click Add. l Sequence number: the dial plan position in the list of dial plans l Pattern: the number that the user will dial l Action: prefix to be added by the controller before forwarding the call to the EPABX
Figure 215 Dialplan Details

3. Click Apply. 4. Under Profile, navigate to Controller > SIP settings and select Dialplan Profile. In the Profile Details
section, select the Dialplan Profile from the drop-down list and click Apply .
Figure 216 Select Dialplan Profile

The Dialplan Profile displays the dial plan details:
Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 1013

Figure 217 View Dialplan Details

In the CLI
To create a voice dial plan profile: (host) (config) #voice dialplan-profile local (host) (Dialplan Profile "local") #dialplan 100 XXXXXXX 9%e (host) (Dialplan Profile "local") #!
To associate the dial plan with SIP ALG: (host) (config) #voice sip (host) (SIP settings) #dialplan-profile local (host) (SIP settings) #!
To view the SIP dial plan profile: (host) (config) #show voice sip

SIP settings -----------Parameter --------Dialplan Profile

Value ----local

To view the dial plan details:

(host) (config) #show voice dialplan-profile local

Dialplan Profile "local" --------------------------Parameter Value --------- ----dialplan 100 XXXXXXX 9%e

Enabling Enhanced 911 Support
ArubaOS provides seamless support for emergency calls in the Dell network by interoperating with RedSky emergency call server. The controller uses SNMP to interoperate with RedSky call handling system.

This release of ArubaOS supports only RedSky emergency call server.

You must configure the RedSky server as an SNMP host and enable SNMP traps to activate the E911 feature on the controller. For more information on configuring the RedSky server as SNMP host, see Configuring SNMP on page 884.

1014 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The E911 support has the following basic functions:
l location tracking l call handling l caller identification and callback capability
For information on call handling, caller identification and callback capability, see the RedSky documentation.
The controller tracks the location of the voice clients and notifies the emergency call server using SNMP traps. The controller notifies the location of a voice client to the emergency server:
l when it identifies a voice client l when a voice client roams from one access point to another access point in the same controller l when a voice client roams from one access point to another access point in a different controller l when a voice client registers with a PBX system
The notification process ensures that the emergency call server is notified whenever a voice client is identified or the location of the client is updated. If a voice client roams outside of a WLAN coverage, the controller does not send any notifications to the emergency call handling system. This may happen when there is a sudden loss of WLAN coverage due to extreme conditions such as fire accident. In such cases, the last associated access point will be the location of the voice client.
The controller tracks the location only for voice clients. To track the location of a remote voice client, the administrator must configure the location of the remote access point in the controller or emergency call server.
The emergency call server queries the controller using the SNMP :get: request to get the location of a specific emergency caller. In response to the location query, the controller sends the following parameters to the emergency server:
l Client IP Address l Client Mac Address l AP Name l AP Wired MAC l AP Location l AP Mode l Controller IP Address
The controller also supports location queries for the clients that are not identified as voice clients on the controller.
Working with Voice over Remote Access Point
Voice traffic support is enhanced on split tunnel mode over a remote access point. The voice traffic management for remote and local users are done on the controller. However, the sessions are created differently for both users. For remote users, the sessions are created on the remote access point and for local users, the sessions are created on the controller. This enhancement provides the following support for the voice traffic in the split tunnel over remote access point:
l voice traffic QoS is consistent for both local and remote users l all voice ALGs work reliably in split tunnel mode when the PBX traffic is destined to flow through the
corporate network. l provides voice statistics and counters for remote voice clients in the split tunnel mode
The flag parameter in the show voice client-status command is updated to indicate remote users: (host) #show voice client-status

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 1015

Voice Client(s) Status

----------------------

AP Name BSSID

ESSID Client(MAC)

Registration State Call Status ALG Flags

Client(IP)

Client Name Server(IP)

------- -----

----- -----------

---------------- ---------- --- -----

---------- ----------- ---------- --

moscato 00:0b:11:5c:d6:80 home 00:00:5c:04:b3:10 10.20.1.100 Client

REGISTERED

Idle

h323 R

Num Clients:1 Flags: R - Remote user

10.13.8.1

Understanding Battery Boost
Battery boost is an optional feature that can be enabled for any SSIDs that support voice traffic. This feature converts all broadcast and multicast traffic to unicast before delivery to the client. Enabling battery boost on an SSID allows you to set the DTIM interval from 10 to 100 (the previous allowed values were 1 or 2), equating to 1,000 to 10,000 milliseconds. This longer interval keeps associated wireless clients from activating their radios for multicast indication and delivery, leaving them in power-save mode longer, and thus lengthening battery life. The DTIM configuration is performed on the WLAN, so no configuration is necessary on the client.
An associated parameter available on some clients is the Listening Interval (LI). This defines the interval (in number of beacons) after which the client must wake to read the Traffic Indication Map (TIM). The TIM indicates whether there is buffered unicast traffic for each sleeping client. With battery boost enabled, the DTIM is increased but multicast traffic is buffered and delivered as unicast. Increasing the LI can further increase battery life, but can also decrease client responsiveness.

Do not enable battery boost if your network includes Polycom SpectraLink devices that use the Push-to-Talk feature.

You can use the WebUI or CLI to enable the battery boost feature and set the DTIM interval in the SSID profile.
In the WebUI
1. Navigate to the Configuration > AP Configuration page. Select either the AP Group tab or AP Specific tab. n If you selected AP Group, click Edit by the AP group name for which you want to enable battery boost. n If you selected AP Specific, select the name of the AP for which you want to enable battery boost.
2. Under Profiles, select Wireless LAN, then Virtual AP. In the Virtual AP list, select the appropriate virtual AP instance.
3. In the Profile Details section, select the SSID profile you want to configure. 4. Click the Advanced tab. 5. Scroll down the Advanced options and select the Battery Boost check box. 6. Scroll up to change the DTIM Interval to a longer interval time. 7. Click Apply.
In the CLI
Use the following commands: wlan ssid-profile <profile> battery-boost dtim-period <milliseconds>

1016 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Enabling LLDP
Link Layer Discovery Protocol (LLDP), is a Layer-2 protocol that allows network devices to advertise their identity and capabilities on a LAN. Wired interfaces on Dell APs support LLDP by periodically transmitting LLDP Protocol Data Units (PDUs) comprised of selected type-length-value (TLV) elements. For a complete list of supported, see Table 222 and Table 223. LLDP-MED (media endpoint devices) is an extension to LLDP that supports interoperability between VoIP and video streaming devices and other networking clients. LLDP-MED network policy discovery lets end-points and network devices advertise the VLAN, priority levels, and DSCP values used by a voice or video application.
In the WebUI
Use the procedure below to configure the LLDP and LLDP-MED profiles and select the TLVs to be sent by the AP. 1. Navigate to the Configuration > AP Configuration page. Select either the AP Group or AP Specific .
n If you selected AP Group, click Edit by the AP group name for which you want to enable LLDP. n If you selected AP Specific, select the name of the AP for which you want to enable LLDP. 2. In the Profiles window, expand AP, then expand the Ethernet interface port configuration profile for the port for which you want to configure LLDP. 3. Select the AP LLDP Profile. Figure 218 AP LLDP Profile Details
4. The AP LLDP profile is divided into two tabs, Basic and Advanced. The Basic tab displays only those configuration settings that often need to be adjusted to suit a specific network. The Advanced tab shows all configuration settings, including settings that do not need frequent adjustment or should be kept at their default values. If you change a setting on one tab, then click and display the other tab without saving your configuration, that setting will revert to its previous value. Both basic and advanced settings are described in Table 190.
5. Configure the LLDP profile parameters as desired then click

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 1017

Table 222: LLDP Profile Configuration Parameters

Parameter

Description

Basic Settings

PDU Transmission

Select this checkbox to enable LLDP PDU Transmission. PDU Transmission is enabled by default.

Reception of LLDP PDUs

Select this checkbox to enable LLDP PDU Reception. PDU Reception is enabled by default.

Advanced Settings

Transmit Interval (seconds)

The interval between LLDP TLV transmission seconds. Range: 1-3600, seconds and Default: 30 seconds.

Transmit hold multiplier

The Transmit hold multiplier is a value that is multiplied by the transmit interval to determine the number of seconds to cache learned LLDP information before that information is cleared.
If the Transmit hold multiplier value is set at its default value of 4, and the Transmit interval is at its default value of 30 seconds, then learned LLDP information will be cached for 4x30 seconds, or 120 seconds.

Optional TLVs

Click the checkboxes in this section to select the optional TLVs the AP interface sends in LLDP PDUs. The AP will send all optional TLVs by default.
l port-description: transmit a TLV that gives a description of the AP's wired port in an alphanumeric format.
l system-description: transmit a TLV that describes the AP's model number and software version.
l system-name: transmit a TLV that sends the AP name or wired MAC address.
l capabilities: transmit the system capabilities TLV to indicate which capabilities are supported by the AP.
l management-address: transmit a TLV that indicates the AP's management IP address, in either IPv4 or IPV6 format.

1018 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter 802.1 TLVs 802.3 TLVs
LLDP-MED TLVs

Description
Click the checkboxes in this section to select the 802.1 TLVs the AP interface sends in LLDP PDUs. The AP will send all 802.1 TLVs by default:
l port-vlan: transmit the LLDP 802.1 port VLAN TLV. If the native VLAN is configured on the port, the port-vlan TLV will send that value, otherwise it will send a value of "0".
l vlan-name: transmit the LLDP 802.1 VLAN name TLV. The AP sends a value of "Unknown" for VLAN 0, or "VLAN <number>" for all non-zero VLAN numbers.
Click the checkboxes in this section to select the 802.3 TLVs the AP interface sends in LLDP PDUs. The AP will send all 803.2 TLVs by default:
l mac: transmit the 802.3 MAC/PHY Configuration/Status TLV to indicate the AP interface's duplex and bit rate capacity and current duplex and bit rate settings.
l link-aggregation: transmit the 802.3 link aggregation TLV to indicate that link aggregation is not supported.
l mfs: transmit the 802.3 Maximum Frame Size (MFS) TLV to show the AP's maximum frame size capability.
l power:transmit the 802.3 Power Via media dependent interface (MDI) TLV to show the power support capabilities of the AP interface. This parameter is supported by the W-AP130 Seriesonly.
Once you have associated an LLDP-MED Network policy profile with this LLDP profile, you can click the checkboxes in this section to select the LLDP-MED TLVs the AP interface sends in LLDP PDUs. The AP does not send any LLDP-MED TLVs by default:
l capabilities: transmit the LLDP-MED capabilities TLV. The AP will automatically send this TLV if it sends any other LLDP-MED TLVs.
l inventory: transmit the LLDP-MED inventory TLV.
l network-policy: transmit the LLDP-MED network-policy TLV. NOTE: The TLVs in this section cannot be enabled unless you have associated an LLDP-MED Network policy profile

6. Click Apply. 7. To associate an LLDP-MED network policy profile with the LLDP profile and select the LLDP-MED TLVs to be
sent by the AP interface, click the LLDP-MED network policy profile that appears below the AP LLDP profile in the profile list:
Figure 219 AP LLDP Profile Details

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 1019

8. If the LLDP profile does not currently reference an LLDP-MED profile, you must associate an LLDP-MED profile with the LLDP profile before you can configure any LLDP-MED settings. Click the Add a profile drop-down list in the Profile Details window.
l To associate an existing LLDP-MED network policy, click an LLDP-MED policy name, then click Add.
l To create a new LLDP-MED policy, click NEW, enter a name for the LLDP-MED network policy, then click Add.
9. Click Apply .
10.Next, expand the LLDP-MED network policy profile in the Profiles list, and select the profile you want to configure.
11.The LLDP-MED network policy profile is divided into two tabs, Basic and Advanced. The Basic tab displays only those configuration settings that often need to be adjusted to suit a specific network. The Advanced tab shows all configuration settings, including settings that do not need frequent adjustment or should be kept at their default values. If you change a setting on one tab, then click and display the other tab without saving your configuration, that setting will revert to its previous value. Both basic and advanced settings are described in Table 223.
12.Configure the LLDP-MED profile parameters as desired then click

1020 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 223: LLDP-MED Profile Configuration Parameters

Parameter

Description

Basic Settings

LLDP-MED application type

Click the LLDP-MED application type drop-down list and select the application type managed by this profile.
l guest-voice: if the AP services a separate voice network for guest users and visitors.
l guest-voice-signaling: if the AP is part of a network that requires a different policy for guest voice signaling than for guest voice media. Do not use this application type if both the same network policies apply to both guest voice and guest voice signaling traffic.
l softphone-voice: if the AP supports voice services using softphone software applications on devices such as PCs or laptops.
l streaming-video: if the AP supports broadcast or multicast video or other streaming video services that require specific network policy treatment. This application type is not recommended for video applications that rely on TCP with buffering.
l video-conferencing: of the AP supports video conferencing equipment that provides real-time, interactive video/audio services.
l video-signaling: if the AP is part of a network that requires a different policy for video signaling than for the video media. Do not use this application type if both the same network policies apply to both video and video signaling traffic.
l voice: if the AP services IP telephones and other appliances that support interactive voice services. This is the default application type.
l voice-signaling: Select this application type if the AP is part of a network that requires a different policy for voice signaling than for the voice media. Do not use this application type if both the same network policies apply to both voice and voice signaling traffic.

LLDP-MED application VLAN

Specify a VLAN by VLAN ID (0-4094) or VLAN name.

LLDP-MED application VLAN tagging
Advanced Settings

Click this checkbox if the LLDP-MED policy applies to a to a VLAN that is tagged with a VLAN ID or untagged. The default value is untagged.
NOTE: When an LLDP-MED network policy is defined for use with an untagged VLAN, then the L2 priority field is ignored and only the DSCP value is used.

LLDP-MED application Layer2 priority

Specify a 802.1p priority level for the specified application type, by entering a value from 0 to 7, where 0 is the lowest priority level and 7 is the highest priority.

LLDP-MED application Differentiated Services Code Point

Select a Differentiated Services Code Point (DSCP) priority value for the specified application type by specifying a value from 0 to 63, where 0 is the lowest priority level and 63 is the highest priority.

13.Click Apply.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 1021

In the CLI
Use the following command:
ap lldp profile <profile> clone <profile> dot1-tlvs port-vlan|vlan-name dot3-tlvs link-aggregation|mac|mfs|power lldp-med-network-policy-profile <profile> lldp-med-tlvs capabilities|inventory|network-policy no ... optional-tlvs capabilities|management-address|port-description|system-description|systemname receive transmit transmit-hold <transmit-hold> transmit-interval <transmit-interval>
ap lldp med-network-policy-profile <profile> application-type guest-voice|guest-voice-signaling|softphone-voice|streaming-video|videoconferencing|video-signaling|voice|voice-signaling clone <profile> dscp <dscp> l2-priority <l2-priority> no ... tagged vlan <vlan>
The following commands create a LLDP MED network policy profile for streaming video applications and marks streaming video as high-priority traffic:
(host) (config) ap lldp med-network-policy-profile vid-stream (host) (AP LLDP-MED Network Policy Profile "vid-stream") dscp 48 (host) (AP LLDP-MED Network Policy Profile "vid-stream")l2-priority 6 (host) (AP LLDP-MED Network Policy Profile "vid-stream")tagged (host) (AP LLDP-MED Network Policy Profile "vid-stream")vlan 10 (host) (AP LLDP-MED Network Policy Profile "vid-stream")!
Next, the LLDP MED network policy profile is assigned to an LLDP profile, and the LLDP profile is associated with an AP wired-port profile:
(host) (config) ap lldp profile video1 (host) (AP LLDP Profile "video1")lldp-med-network-policy-profile vid-stream (host) (AP LLDP Profile "video1")! (host) (config)ap wired-port-profile corp2 (host) (AP wired port profile "corp2")lldp-profile video1
Advanced Voice Troubleshooting
ArubaOS enables you to debug voice issues more efficiently and quickly by providing detailed information about the voice calls, voice client status, and Call Detail Records (CDR). You can obtain the advanced troubleshooting information such as time of failure of the call, status of the client during the call failure, signal strength of the call, AP handoff information, and signaling message issues.
The following options allow you to easily troubleshoot voice call issues:
l View troubleshooting information on voice client status l View troubleshooting information on voice call CDRs l Debug voice logs l View voice traces l View voice configuration details

1022 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Viewing Troubleshooting Details on Voice Client Status
ArubaOS enables you to view the status of the voice clients. Additionally, it allows you to view more details such as AP handoff information and AP station report of an active call based on the client's IP address, or the MAC address.
The AP handoff information includes the AP events such as association request, re-association request, and deauthentication request with timestamps. The AP station report includes the AP MAC address, association time, average RSSI value, and retries count.
You can use the WebUI or CLI to view up to 60 entries of AP events and 30 entries of AP station reports for a voice client.

In the WebUI
1. Navigate to the Monitoring > Voice > Voice Clients page and select the voice client. 2. Click HandOff Information to view the AP station report and AP handoff information of the selected voice
client.

In the CLI
To view the details of a voice client based on its IP address: (host) #show voice client-status ip 10.15.20.63

Voice Client(s) Status

----------------------

Client(IP) Client(MAC)

Client Name ALG Server(IP)

Status BSSID

ESSID

AP Name Flags

---------- -----------

----------- --- ----------

-- -----

-----

------- -----

10.15.20.63 00:00:f0:05:c9:e3 7812

h323 10.3.113.239

00:0b:86:b7:83:91 st-voice-raj RAP2-Lab R

Num Clients:1

Flags: V - Visitor, W - Wired, R - Remote

Registration State -----------------REGISTERED

Call --------In-Call

AP Events --------Timestamp --------Aug 13 09:22:57 Aug 13 11:29:34 Aug 13 11:29:41 Aug 13 11:30:29 Aug 13 11:30:39

BSS Id -----00:0b:86:b7:83:91 00:0b:86:b7:83:91 00:0b:86:b7:83:91 00:0b:86:b7:83:91 00:0b:86:b7:83:91

Category -------Call Call Call Call Call

Event ----Call Start Call End Call Start Call End Call Start

AP Station Reports

------------------

Timestamp

BSS Id

RSSI

Bytes Tx-Data-Time Rx

Rx-Retry

---------

------

----

-- ------------ --

--------

Aug 13 12:35:05 00:0b:86:b7:83:91 61

0

55171662 0

Tx -253845

Tx-Drop ------6904

Tx-Data ------253469

Tx-Data-Retry ------------59805

Tx-Data----------22945603

Current Active Calls

--------------------

Session Information

Peer Party Dir Status

Dur(sec) Orig time

R-

value Codec Band Setup Time(sec) Re-Assoc

-------------------

---------- --- ------

-------- ---------

--

----- ----- ---- --------------- --------

10.15.20.56:3034 - 10.15.20.63:3140 -

IC CONNECTED 3925

Aug 13 11:30:39 NA

NA

NA NA

0

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 1023

To view the details of a voice client based on its MAC address: (host) #show voice client-status sta 00:00:f0:05:c9:dc

Voice Client(s) Status ----------------------

Client(IP) Client(MAC)

Client Name ALG Server(IP) Registration State

Status BSSID

ESSID AP Name Flags

---------- -----------

----------- --- ---------- ------------------

-- -----

----- ------- -----

10.15.20.56 00:00:f0:05:c9:dc 7811

sh323 10.3.113.239 REGISTERED

00:1a:1e:a8:2d:80 legap W-AP65-2

Call ---------
In-Call

Num Clients:1 Flags: V - Visitor, W - Wired, R - Remote

AP Events --------Timestamp --------Aug 13 09:22:54 Aug 13 09:22:58 Aug 13 09:26:22 Aug 13 11:29:33 Aug 13 11:29:39 Aug 13 11:30:29 Aug 13 11:30:36

BSS Id -----00:1a:1e:a8:2d:80 00:1a:1e:a8:2d:80 00:1a:1e:a8:2d:80 00:1a:1e:a8:2d:80 00:1a:1e:a8:2d:80 00:1a:1e:a8:2d:80 00:1a:1e:a8:2d:80

Category -------Call Call Call Call Call Call Call

Event ----Call Start Call End Call Start Call End Call Start Call End Call Start

AP Station Reports

------------------

Timestamp

BSS Id

RSSI

Bytes Tx-Data-Time Rx

Rx-Retry

---------

------

----

-- ------------ --

--------

Aug 13 12:38:03 00:1a:1e:a8:2d:80 44

0

58366710 0

Tx -795216

Tx-Drop ------44158

Tx-Data ------794838

Tx-Data-Retry ------------147824

Tx-Data----------78010395

Current Active Calls

--------------------

Session Information

Peer Party Dir Status

Dur(sec) Orig time

R-

value Codec Band Setup Time(sec) Re-Assoc

-------------------

---------- --- ------

-------- ---------

--

----- ----- ---- --------------- --------

10.15.20.63:3140 - 10.15.20.56:3034 -

OG CONNECTED 4079

Aug 13 11:30:36 93

NA

GREEN NA

0

Viewing Troubleshooting Details on Voice Call CDRs
ArubaOS allows you to view the voice CDRs for the completed calls. Additionally, it enables you to view more details such as AP handoff information and AP station reports for a specific terminated call based on the CDR Id.
The AP handoff information includes the AP events such as association request, re-association request, and deauthentication request with timestamps. The AP station report includes the AP MAC address, association time, average RSSI value, and retries count.
ArubaOS pushes the generated CDRs to the syslog server to retain the older CDR data for a later analysis. The CDR data pushed to the syslog server do not contain the details of the AP stats and AP events.

1024 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

You can use the WebUI or CLI to view the troubleshooting information on a voice call based on the CDR Id.

In the WebUI
1. Navigate to the Monitoring > Voice > Call Detail Report page. This page displays the CDRs of the completed calls. 2. Click the CDR Id of a call to view the AP station reports, and the AP handoff information of the call.

In the CLI
To view the details of a completed call based on the CDR Id: (host) #show voice call-cdrs cid 4

Voice Client(s) CDRs (Detail) -----------------------------

CDR Id Client IP Client Name ALG Dir Called/Calling Party Status Dur(sec) Orig time

R-value Reason Codec Band Setup Time(sec) Re-Assoc Initial-BSSID

Initial-

ESSID Initial-AP Name

------ --------- ----------- --- --- -------------------- ------ -------- ---------

------- ------ ----- ---- --------------- -------- -------------

---------

---- ---------------

4

10.15.20.62 3011

sccp IC 3042

SUCC 34

Aug 14

06:48:44 77

G711 YELLOW 0

1

00:1a:1e:a8:2d:80 legap

W-AP65-2

AP Events --------Timestamp --------Aug 14 06:48:53 Aug 14 06:48:53

BSS Id -----00:1a:1e:a8:2d:80 00:1a:1e:a8:2d:80

Category -------AP Management AP Management

Event ----Assoc Req Assoc Resp

AP Station Reports

------------------

Timestamp

BSS Id

RSSI

Bytes Tx-Data-Time Rx

Rx-Retry

---------

------

----

- ------------ --

--------

Aug 14 06:49:08 00:1a:1e:a8:2d:80 27

0

26245 0

Tx -20466

Tx-Drop ------6154

Tx-Data ------20460

Tx-Data-Retry ------------2522

Tx-Data-----------2310190

Enabling Voice Logs
ArubaOS allows you to debug voice logs. Additionally, it allows you to debug the voice logs for a specific voice client based on the client's MAC address. You can use the WebUI or CLI to set the voice logging level to debugging.
In the WebUI
1. Navigate to the Configuration > Management > Logging page. 2. Click Levels. 3. Select the voice check box under the User Logs category. 4. Select Debugging from the Log Level drop down menu and click the Done button.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 1025

Figure 220 Enable Voice Logging
5. Click Apply. Enabling Logging for a Specific Client 1. Navigate to the Configuration > Advanced Services > All Profiles page. 2. Expand Other Profiles under the Profiles section and click VoIP Logging. 3. Enter the MAC address of the voice client in the Client's MAC address for logging field. Figure 221 Enable Logging for a Voice Client

4. Click Apply . To enable logging on a specific voice client, you must enable voice logs.

In the CLI
To set the voice logging level to debugging: (host) #configure terminal (config) #logging level debugging user subcat voice
To debug voice logs for a specific client: (config) #voice logging (VoIP Logging) #client-mac 11:22:33:44:55:67
To view the client's MAC address for logging: (host) #show voice logging

VoIP Logging -----------Parameter --------Client's MAC Address for Logging

Value ----11:22:33:44:55:67

Viewing Voice Traces
ArubaOS enables you to view the voice signaling message traces. You can view up to 8000 entries of trace messages. The trace message displays the ALG, client name, client's IP, event time, and the message direction. Additionally, it displays the BSSID information to help troubleshooting roaming issues.

1026 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

You can use the WebUI or CLI to view the trace messages.

In the WebUI
1. Navigate to the Monitoring > Voice > Voice Clients page and select the voice client. 2. Click Troubleshooting to view the voice traces.

In the CLI
To view the voice signaling message traces: (host)#show voice trace sip count 5

SIP Voice Client(s) Message Trace

---------------------------------

ALG Client Name Client(MAC)

BSSID

--- ----------- -----------

-----

SIP 6202

00:03:2a:02:75:cc

00:0b:86:b7:83:91

SIP 6202

00:03:2a:02:75:cc

00:0b:86:b7:83:91

SIP 6202

00:03:2a:02:75:cc

00:0b:86:b7:83:91

SIP 6202

00:03:2a:02:75:cc

00:0b:86:b7:83:91

SIP 6202

00:03:2a:02:75:cc

REQUEST_FAILURE 00:0b:86:b7:83:91

Num of Rows:5

Client(IP) ---------10.15.20.123 10.15.20.123 10.15.20.123 10.15.20.123 10.15.20.123

Event Time ---------Aug 14 13:14:32 Aug 14 13:14:32 Aug 14 13:14:31 Aug 14 13:14:31 Aug 14 13:14:29

Direction --------Server-To-Client Client-To-Server Server-To-Client Client-To-Server Server-To-Client

Msg --200_OK REGISTER 200_OK REGISTER 4XX_

Viewing Voice Configurations
ArubaOS allows you to view the details of the voice related configurations on your controller such as firewall policies, AP group profiles, SSID profiles, virtual AP group profiles, VoIP Call Admission Control profiles, 802.11k profiles, and SIP settings. Additionally, you can view the status of RTCP analysis, and SIP mid-call request timeout.

This release of ArubaOS does not support viewing the voice configuration details using the WebUI.

In the CLI
To view the voice configuration details on your controller: (host) #show voice configurations

Voice firewall policies ----------------------Policy -----Stateful SIP Processing Broadcast-filter ARP

Action -----Enabled Disabled

SSID Profiles

-------------

Profile Name

WMM

EDCA AP prof Strict SVP

------------

---

----------- ----------

default

Enabled

default

Disabled

WMM-UAPSD TSPEC Min Inactivity(msec) ... EDCA STA prof

--------- -------------------------- ... ------------- -

Enabled 100000

... default

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Voice and Video | 1027

qa-ma-vocera

Enabled Enabled 0

default

Disabled

default

AP Group Profiles

-----------------

Profile Name VoIP CAC Profile

------------ ----------------

default

default

local

default

Virtual AP Group Profiles

-------------------------

Profile Name

802.11K Profile

Broadcast ARP to Unicast

------------

---------------

------------------

abcd

default

Disabled

HA Discovery on-assoc. ---------------------Disabled

Drop Broadcast/Multicast -----------------------Disabled

----

VoIP Call Admission Control Profiles

------------------------------------

Profile Name VoIP CAC

------------ ---------

default

Disabled

802.11K Profiles

----------------

Profile Name Advertise 802.11K Capability

------------ ----------------------------

default

Disabled

SIP settings -----------Parameter --------Session Timer Session Expiry Dialplan Profile

Value ----Disabled 300 sec N/A

Voice rtcp-inactivity:disable Voice sip-midcall-req-timeout:disable

1028 | Voice and Video

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Chapter 40 AirGroup

AirGroup is a unique enterprise-class capability that leverages zero configuration networking to allow mobile device technologies, such as the AirPrint wireless printer service and the AirPlay mirroring service, to communicate over a complex access network topology.
The W-600 Series controllers do not support AirGroup.
Zero Configuration Networking
Zero configuration networking is a technology that enables service discovery, address assignment, and name resolution for desktop computers, mobile devices, and network services. It is designed for flat, single-subnet IP networks such as the home network of a user.
The suite of protocols introduced by Apple® for zero configuration networking over IP is referred to as Bonjour®. Bonjour is supported by most of the Apple product lines including the Mac OS X® operating system, iPhone®, iPod®, iPad®, Apple TV® and AirPort Express®. Bonjour is also included within popular software programs such as Apple iTunes®, Safari, and iPhoto®. Bonjour® can be installed on computers running Microsoft Windows® and is supported by most new network-capable printers.
Bonjour locates devices such as printers, other computers, and the services offered by these devices by using multicast Domain Name System (mDNS) service records. Bonjour uses the link-scope multicast addresses, so each query or advertisement is limited to a specific VLAN. In large universities and enterprise networks, Bonjour capable devices connect to the network using different VLANs. As a result, an iPad on one enterprise VLAN will not be able to discover the Apple TV that resides on another VLAN. Broadcast and multicast traffic is filtered out of a wireless LAN network in an effort to reduce network traffic. This inhibits Bonjour (mDNS) services, which rely on multicast traffic.
ArubaOS supports DLNA (Digital Living Network Alliance); a network standard that is derived from UPnP (Universal Plug and Play) in addition to the mDNS protocol. DLNA uses the Simple Service Discovery Protocol (SSDP) for service discovery on the network. DLNA provides the ability to share digital media between multimedia devices, like Windows and Android, similar to how mDNS supports Zero Configuration Networking to Apple devices and services. ArubaOS ensures that DLNA seamlessly works with the current mDNS implementation. All the features and policies that are applicable to mDNS are extended to DLNA. This ensures full interoperability between compliant devices.
AirGroup Solution
AirGroup leverages key elements of Dell's solution portfolio including the ArubaOS software for Dell controllers and Dell ClearPass Policy Manager (CPPM).
AirGroup performs the following functions:
l Enables users to discover network services across IP subnet boundaries in enterprise wireless and wired networks.
l Enables users to access the available AirGroup services such as AirPrint and AirPlay. l Permits users to access conference room Apple TV during presentations, based on group-based access
privileges.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

AirGroup | 1029

l Provides and maintains seamless connectivity of clients and services across VLANs and SSIDs. It minimizes the mDNS traffic across the wired and wireless network, thereby preserving wired network bandwidth and WLAN airtime.
With AirGroup:
l An AirGroup operator--an end user such as a student can register personal devices. The devices registered by the operator can then automatically be shared with each other.
l Each user can create a user group, such as friends and roommates with whom the user can share the registered devices.
l AirGroup administrators can register and manage an organization's shared devices such as printers or conference room Apple TV. The administrator can grant global access to each device, or limit access based on user name, role, or location.
This chapter provides configuration information for network administrators to enable AirGroup on a Dell controller and CPPM and to register devices with ClearPass Guest.
AirGroup also enables context awareness for services across the network:
l AirGroup is aware of personal devices. An Apple TV in a dorm room, for example, can be associated with the student who owns it.
l AirGroup is aware of shared resources, such as an Apple TV in a meeting room, a printer available to multiple users, or AirPlay in a classroom where a laptop screen is projected on HDTV monitor.
l AirGroup is aware of the location of services--for example, an iPad is presented with the closest printer location instead of all the printers in the building. If a user in a conference room wants to use an Apple TV receiver to project a MacBook screen on an HDTV monitor, the location-aware controller shows the Apple TV that is closest to that user.
AirGroup Services
The AirGroup supports zero configuration services. The services are pre configured and are available as part of the factory default configuration. The administrator can also enable or disable individual services by using the controller WebUI.
The following services are enabled by default on the controller:
l AirPlay -- Apple AirPlay allows wireless streaming of music, video, and slide shows from your iOS device to Apple TV and other devices that support the AirPlay feature.
l AirPrint -- Apple AirPrint allows you to print from an iPad, iPhone, or iPod Touch directly to any AirPrint compatible printers.
l DIAL -- Wi-Fi-enabled streaming devices like Google Chromecast, Roku, Amazon FireTV, and more advertise the Discovery and Launch (DIAL) protocol for clients to search for an available device on a wireless network. Once a device is discovered, the protocol synchronizes information on how to connect to the device. The streaming device connects to a television through an HDMI port to wirelessly stream video and music content to the TV screen from smart phone (both Android and Apple iOS), tablet, laptop or desktop computer devices.
The following services are disabled by default on the controller:
l iTunes -- iTunes service is used by iTunes Wi-Fi sync and iTunes home-sharing applications across all Apple devices. For best practices, see the Apple iTunes Wi-Fi Synchronization and File Sharing on page 1041.
l RemoteMgmt -- Use this service for remote login, remote management, and FTP utilities on Apple devices. l Sharing -- Applications such as disk sharing and file sharing, use the service ID that are part of this service
on one or more Apple devices. For best practices, see the Apple iTunes Wi-Fi Synchronization and File Sharing on page 1041. l Chat -- The iChat (Instant Messenger) application on Apple devices uses this service.

1030 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l GoogleCast -- Google Chromecast uses this service to stream video and music content from a smart phone to a TV screen using a wireless network. If this service is manually configured before the controller is upgraded to ArubaOS 6.4.1, the service continues to remain in the existing state.
l DLNA Media -- Applications such as Windows Media Player use this service to browse and play media content on a remote device.
l DLNA Print -- This service is used by printers which support DLNA.
AirGroup also supports custom and allowall services. For more information, see Integrated Deployment Model on page 1045 and Integrated Deployment Model on page 1045.
AirGroup Solution Components
AirGroup leverages key elements of Dell's solution portfolio that includes the ArubaOS software for Dell controllers, CPPM, and ClearPass Guest. Table 224 describes the supported versions for each portfolio.

Table 224: AirGroup Solution Component Supported Version

Component

Minimum Version

ArubaOS ( Controller)

6.4

CPPM and ClearPass Guest 6.0.2

It is recommended to use CPPM and ClearPass Guest version 6.3.
AirGroup and ClearPass Policy Manager
The AirGroup feature and CPPM work together to allow users to share personal devices. l An AirGroup administrator uses ClearPass Policy Manager to authorize end users to register their personal
devices. l An AirGroup operator, an end user, registers devices (such as an Apple TV). l Dell controllers query ClearPass Policy Manager to associate the access privileges of each mobile device to
its allowed services. Figure 222 shows the AirGroup workflow that allows a user to register personal devices and use AirPlay to send an image from an iPhone to an Apple TV.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1031

Figure 222 AirGroup Enables Personal Device Sharing

AirGroup enables context awareness for services across the network and supports a typical customer environment with shared, local, and personal services available to mobile devices. For example, in Figure 223, an AirGroup administrator registers the shared devices in ClearPass, and AirGroup operators register their personal devices in the ClearPass Guest portal. The AirGroup-enabled controller sends AirGroup queries to ClearPass for the registered devices' information. ClearPass sends the Change of Authorization (CoA) to notify the controller about the registered devices.
Figure 223 AirGroup in a Typical Wireless Deployment

AirGroup deployments that include both CPPM and an AirGroup controller support features that are described in AirGroup Services on page 1030.

1032 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup Deployment Models
Integrated Deployment Model
In the integrated deployment model, AirGroup features are integrated with WLAN controllers that terminate APs and provide WLAN services. This deployment model also supports optional integration with ClearPass Policy Manager. If AirGroup is deployed in an integrated environment, you should upgrade all the controllers in your network to ArubaOS 6.4. For more information, see Integrated Deployment Model on page 1045.
ArubaOS 6.4 supports a multi-controller AirGroup cluster. An AirGroup cluster consists of multiple controllers in various possible configuration combinations such as master-master, master-local, and local-local. If you are deploying AirGroup in a master-local topology with multiple local controllers that share the same user VLANs, use AirGroup in an integrated mode. Figure 224 shows an example of a master-local topology with shared, local, and personal services that are available to mobile devices. With AirGroup, the context-based policies determine the services visible to the end-user devices.
Figure 224 Integrated AirGroup Network Topology

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1033

Table 225: Sample policies for AirGroup mDNS Services

Faculty

Student

User X's iPad

User B's MacBook

Apple TV in the lab, registered to user role

Yes

No

"Faculty"

Apple TV in the dorm room, registered to User No

Yes

B

Apple TV in a lecture hall accessible to Faculty Yes

No

Printer located in a lab accessible to faculty

Yes

Yes

and students

Visitor Windows Laptop No
No
No No

AirGroup with ClearPass Policy Manager
CPPM delivers identity and device-based network access control across any wired, wireless, and VPN infrastructure. AirGroup can be deployed with Dell ClearPass Policy Manager (recommended for large WLANs), or without ClearPass in smaller networks. If your deployment does not include ClearPass Policy Manager, features described in AirGroup Services on page 1030 are not available.

Features Supported in AirGroup
The following AirGroup features are supported in ArubaOS:
Multi-Controller AirGroup Cluster
ArubaOS supports multiple controllers running AirGroup to form a cluster. This feature enables iPad users on one controller to discover Apple TV available on another controller, if both controllers are part of the same cluster.
Multi-Controller AirGroup Cluster--Terminologies
AirGroup Domain An AirGroup domain is a set of controllers that are part of an AirGroup cluster. An administrator can configure multiple AirGroup domains for a site-wide deployment. Individual local controllers can independently select relevant multiple AirGroup domains to form a multi-controller AirGroup cluster.
AirGroup Cluster One or several AirGroup domains can form an AirGroup cluster. AirGroup cluster can have 100 AirGroup domains. An AirGroup domain can include a list of likely controllers which may participate in the multicontroller AirGroup cluster. Figure 225 shows the AirGroup cluster and domain relationship:

1034 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 225 AirGroup cluster and domain relationship
Active-Domain AirGroup allows one or more AirGroup domains to be a part of the AirGroup active-domain list on a controller. A master or local controller may participate in one or more AirGroup clusters based on its active-domain list. The controller must set the corresponding domain as active for the controller to be part of the AirGroup cluster. In Figure 225, Controller 1, 2, and 3 belong to AirGroup Domain 1.
Sample AirGroup Cluster Topology
Figure 226 shows a typical master-local multi-controller deployment. In this topology, four local controllers terminate on a single master controller.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1035

Figure 226 Typical Master-Local Multi-Controller Deployment

Depends on the need, the administrator can configure the following topology:
Domain Definition The administrator can define two domains with the following controllers in each domain: l Domain 1: Local 1 (L1), Master (M), Local 3 (L3) l Domain 2: Local 2 (L2), M, Local 4 (L4) To configure an AirGroup domain, see Configuring an AirGroup Domain on page 1052.
Active-Domain Definition Based on the domain definition, each controller belongs to the following active-domain lists: l Active-Domain 1: L1, M, L3 l Active-Domain 2: L2, M, L4 To configure an active domain, see Configuring an AirGroup active-domain on page 1053.
AirGroup Controller Communication Based on the domain and active-domain definitions, the AirGroup controller communication takes place in the following manner: l L1, M, and L3 can communicate with each other as they are part of active-domain 1. l L2, M, and L4 can communicate with each other as they are part of active-domain 2. l M can communicate with L1, L2, L3, and L4 as M is part of active-domain 1 and 2. l L1 and L3 cannot communicate with L3 and L4, because they do not have a common active-domain and
they do not share the same VLAN.
AirGroup Server Discovery l iPad users in L1, M, and L3 can discover any Apple TV or AirPrint Printer in L1, M, and L3.

1036 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l iPad users in L2, M, and L4 can discover any Apple TV or AirPrint Printer in L2, M, and L4. l iPad users in M can discover any Apple TV or AirPrint printer in L1, L2, L3, and L4 and vice-versa. l iPad users in L1 and L3 cannot discover any Apple TV or AirPrint printer in L2 and L4 and vice-versa.
Scalability In a multi-controller deployment, there is a scaling limit of 2,000 AirGroup servers and 16,000 AirGroup users for all controllers in a cluster. If you require more servers and users than the prescribed limit, configure multiple clusters so that each cluster is within the prescribed limit. For detailed scalability information, see AirGroup Scalability Limits on page 1043.
An AirGroup domain can include a list of controllers, which may participate in the multi-controller AirGroup cluster. Depending on the deployment setup, the IP address in the AirGroup domain could either be the controller IP or VRRP IP address. The configuration elements are defined by the administrator on a master controller and its associated local controllers that share the same configuration. The actual AirGroup multicontroller cluster may include one or several local controllers, and this cluster is defined by including one or several relevant AirGroup domains, on the respective local controller, in the active-domain list. As a result, a master or local controller may participate in one or more AirGroup clusters based on its active-domain list.
Incorrect or incomplete configuration of the controllers participating in an AirGroup cluster can lead to disjoint clusters. In a disjoint cluster, an AirGroup user will not have a seamless view of the AirGroup servers spanning multiple controllers. Therefore ensure that the participating controllers in an AirGroup cluster are configured appropriately.
The AirGroup domain configurations are restricted to the master controller. This ensures all local controllers in a master-local setup have unique AirGroup domain names. If duplicate AirGroup domain names on multiple master controllers are encountered, ensure that the duplicate AirGroup domain names have the same values to participate in a single AirGroup cluster.
Any controller that shares VLANs with another controller must be part of the same AirGroup multi-controller cluster.
When an AirGroup controller has the list of all the controllers in the multi-controller table, it uses a Dell proprietary protocol called Process Application Programming Interface (PAPI) to communicate with other controllers in the table. The PAPI control channel carries AirGroup specific packets only. For configuration details, see Configuring an AirGroup Domain on page 1052.
Master-Local Controller Synchronization
Administrators can configure AirGroup from the master controller to ease deployment. The master controller then synchronizes the AirGroup configuration elements with all the local controllers it manages. For more information, see Master-Local Controller Synchronization on page 1045.
Pre-configured AirGroup Services
The following services are pre-configured and available as part of the factory default configuration:
l AirPlay l AirPrint l iTunes l RemoteMgmt l Sharing l Chat l GoogleCast

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1037

l DIAL l DLNA Print l DLNA Media
DIAL is enabled by default. DLNA Print and DLNA Media are disabled by default.
For more information, see Integrated Deployment Model on page 1045.
AirGroup IPv6 Support
A controller supports IPv6 enabled users (for example, iPad) and servers (Apple TV, AirPrint printers). All the AirGroup features are available for both IPv4 and IPv6 clients. On any dual stack client, you must restart the client if the IPv4 interface is disabled.
Limitations
IPv6 support is limited to AirGroup users and servers only. The IPv4 addresses are supported only in the following scenarios: l When forming an AirGroup cluster, only IPv4 controller addresses are supported. l AirGroup supports IPv4 RADIUS clients only.
The controller can identify any IPv6 AirGroup servers, only when they proactively advertise their services.
To enable or disable AirGroup IPv6 support on the controller, see Enabling or Disabling AirGroup Global Setting on page 1046.
DLNA UPnP Support
AirGroup supports DLNA (Digital Living Network Alliance); a network standard that is derived from UPnP (Universal Plug and Play) in addition to the mDNS protocol. For more information, see Zero Configuration Networking on page 1029.
AirGroup mDNS Static Records
AirGroup provides the ability for an administrator to create mDNS static records as group and individual records and add them to cache. For more information, see AirGroup mDNS Static Records on page 1064.
Group Based Device Sharing
AirGroup supports User Group and this is an add-on to the existing device sharing mechanisms such as username, user-role, and location based device sharing using CPPM. For more information, see Group-Based Device Sharing on page 1063.
Dashboard Monitoring Enhancements
l The AirGroup service names in the AirGroup row are clickable in the AirGroup section of the Dashboard > Usage page of the WebUI. If you click the service name, you are redirected to the Dashboard > AirGroup page which displays a list of AirGroup servers filtered by Service Name.
l In the Dashboard > Clients page, the AirGroup column is added to display the devices that are listed as mDNS, DLNA or both. If a device does not support both mDNS and DLNA, this field is blank.
l The following enhancements are added in the Dashboard > AirGroup page of the WebUI:

1038 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

n A new AirGroup type column is added and this column specifies if the type of the AirGroup device is mDNS, DLNA or both.
n The MAC address of each AirGroup user and server is now clickable. If you click MAC link, you are redirected to the Dashboard > Clients > Summary page > AirGroup tab. If an AirGroup user or AirGroup server is a wired trusted client, the MAC address is not clickable.
ClearPass Policy Manager and ClearPass Guest Features
With CPPM portal for WLAN administrators, you can register shared device such as conference room Apple TV and printers. The ClearPass Guest portal for WLAN users allows end users to register their personal devices. For more information on AirGroup configuration on CPPM, see the ClearPass Policy Manager User Guide and ClearPass Guest Deployment Guide.
Auto-association and Controller-based Policy
Auto-association allows AirGroup users to discover nearby AirGroup servers. Auto-association ensures that all the AirGroup users associated to an AP-group, AP-FQLN, or AP and its neighbors discover the AirGroup servers. By default, auto-association is disabled on all AirGroup servers. An administrator can enable auto-association for each AirGroup server separately and configure AP-name, AP-group, or AP-FQLN for auto-association. Autoassociation can be enabled for a complete service, which allows all the AirGroup servers who advertise that service to be auto-associated with the configured parameter. If auto-association is enabled, other locationbased policy configuration for the AirGroup server on CPPM or CLI is not honored. Auto-association is applicable only for wireless AirGroup servers.
By default, all AirGroup servers are visible to every AirGroup user. AirGroup allows an administrator to configure controller-based policies for AirGroup servers to limit the visibility of AirGroup servers to destined AirGroup users. To limit the AirGroup server's visibility to intended AirGroup users, administrator can configure shared user-list, shared role-list, and shared group-list for each AirGroup server.
Administrator can also configure location-based policies for AirGroup devices. For example, administrator can configure if an AirGroup server is visible over a broader area than auto-association configuration. In locationbased configuration, administrator can configure AP names, AP groups, and AP FQLNs. Location-based policy configuration limits the AirGroup server's visibility to AirGroup users who are associated to configured APs, its neighbors, AP-groups, or AP-FQLNs. Administrator can choose whether to consider the neighborhood of the configured AP names.
Controller-based policy configuration is available only on standalone controller and does not synchronize to local or other AirGroup controllers. If a policy for an AirGroup device is configured on CPPM and CLI, then CLI configuration takes precedence over CPPM configuration. Controller-based policy configuration is persistent when controllerrestarts.
Configuring Auto-association and Controller-based Policy
Configuring Mac Address-based Policy
(host)(config) #airgroup policy <mac> (host)(config-airgroup-policy) #
Configuring Shared Group-list
(host) (config-airgroup-policy) #grouplist
Adding Role to Shared Group-list (host) (config-airgroup-policy) #grouplist add <name-string>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1039

Deleting Role from Shared Group-list (host) (config-airgroup-policy) #grouplist remove <name-string>
Deleting Shared Group-list (host) (config-airgroup-policy) #no grouplist
Configuring Shared Role-list
(host) (config-airgroup-policy) #rolelist
Adding Role to Shared Role-list (host) (config-airgroup-policy) #rolelist add <name-string>
Deleting Role from Shared Role-list (host) (config-airgroup-policy) #rolelist remove <name-string>
Deleting Shared Role-list (host) (config-airgroup-policy) #no rolelist
Configuring Shared User-list
(host) (config-airgroup-policy) #userlist
Adding User to Shared User-list (host) (config-airgroup-policy) #userlist add <name-string>
Deleting User from Shared User-list (host) (config-airgroup-policy) #userlist remove <name-string>
Deleting Shared User-list (host) (config-airgroup-policy) #no userlist
Configuring Shared Location
(host) (config-airgroup-policy) #location {ap-fqln|ap-group|ap-name}
Adding Shared Location (host) (config-airgroup-policy) #location ap-fqln add <string> (host) (config-airgroup-policy) #location ap-group add <string> (host) (config-airgroup-policy) #location ap-name add <string>
Deleting Shared Location (host) (config-airgroup-policy) #location ap-fqln remove <string> (host) (config-airgroup-policy) #location ap-group remove <string> (host) (config-airgroup-policy) #location ap-name remove <string>
Enabling Location Auto-association (host) (config-airgroup-policy) #location ap-fqln autoassociate (host) (config-airgroup-policy) #location ap-group autoassociate (host) (config-airgroup-policy) #location ap-name autoassociate
This command returns an error message for wired devices.
Disabling Location Auto-association (host) (config-airgroup-policy) #no location ap-fqln autoassociate (host) (config-airgroup-policy) #no location ap-group autoassociate (host) (config-airgroup-policy) #no location ap-name autoassociate

1040 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

This command returns an error message for wired devices. The error message indicates that auto location configuration for a wired device is unfeasible. The ap-fqln and ap-name use the same syntax as ap-group.
Configuring Service Level-based Auto-association
(host) (config) #airgroupservice airplay (host) (config-airgroupservice) #autoassociate
(host) (config-airgroupservice) #autoassociate apfqln (host) (config-airgroupservice) #autoassociate apgroup (host) (config-airgroupservice) #autoassociate apname
Best Practices and Limitations
Apple iTunes Wi-Fi Synchronization and File Sharing
When the controller receives mDNS response for a service, the controller caches such records and does not propagate to other users. But for services like iTunes Wi-Fi synchronization and File Sharing to work seamlessly, such mDNS responses must be propagated to other users on the controller even if they do not query for it. To ensure that applications such as iTunes Wi-Fi synchronization and File Sharing work seamlessly, ArubaOS selectively forwards these mDNS responses to AirGroup users, based on the user-name CPPM policy of the AirGroup server. Hence, for a customer to use these services, it is necessary to configure user-name based CPPM policies for the AirGroup devices.
Firewall Configuration
The following firewall configuration settings are recommended:
Disable Inter-User Firewall Settings
Some firewall settings can prevent the untrusted clients from communicating with each other. When these settings are enabled, an untrusted client such as an iPad may not be able to send its image to an Apple TV on the same controller. Use the following commands to disable the virtual AP global firewall options and allow Bonjour services to use AirGroup. l no firewall deny-inter-user-bridging l no firewall deny-inter-user-traffic l no ipv6 firewall deny-inter-user-bridging
ValidUser ACL Configuration
The ValidUser Access Control list (ACL) must allow mDNS packets with the source IP as a link local address. Do not use a ValidUser ACL if the user VLAN interfaces of the AirGroup controller are not configured with an IP address.
Allow GRE and UDP 5353
mDNS discovery uses the predefined port UDP 5353. If there is a firewall between the AirGroup controller and WLAN controller, ensure that your firewall policies allow GRE and UDP 5353. DLNA uses the predefined port UDP 1900.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1041

Recommended Ports
The ArubaOS role-based access controls for wireless clients use ACLs to allow or deny user traffic on specific ports. Even though mDNS discovery uses the predefined port UDP 5353, application-specific traffic for services like AirPlay may use dynamically selected port numbers. As a best practice, add or modify ACLs to allow traffic on the ports as described in Table 226 and Table 227.
AirPlay operates using dynamic ports, however, printing protocols like AirPrint use fixed ports.

Ports for AirPlay Service
Enable the following ports for the AirPlay services.

Table 226: Ports for AirPlay Service

Protocol

Ports

TCP

l 5000

l 7000

l 7100

l 8612

l 49152-65535

UDP

l 7010 l 7011 l 8612 l 49152-65535

Ports for AirPrint Service
Enable the following ports to allow AirGroup devices to access AirPrint services.

Table 227: Ports for AirPrint Service

Protocol

Print Service

TCP

Datastream

TCP

IPP

TCP

HTTP

TCP

Scanner

TCP

HTTP-ALT

Port 9100 631 80 9500 8080

1042 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup Services for Large Deployments
All Bonjour services are enabled in AirGroup by default. Large deployments with many wireless and wired users often support a large number of advertised Bonjour services, which can consume a significant amount of system resources. For large scale deployments, enable the AirPlay and AirPrint services, disable the allowall service, and then block all other Bonjour services. See Integrated Deployment Model on page 1045 for a complete list of AirGroup configuration options.
AirGroup Scalability Limits
Table 228 displays the total number of AirGroup servers (Apple TV, AirPrint printer) and users (iPad) supported in individual controllers:

Table 228: AirGroup Server and User Limits in Controller

Controller Model

Number of AirGroup Servers

Number of AirGroup Users

W-7240

10000

20000

W-7220

7000

15000

W-7210

5000

10000

W-7205

2000

6000

W-7030

1000

3000

W-7024

600

1400

W-7010

500

1500

W-7005

300

700

W-6000

2500

5500

W-3600

2000

6000

W-3400

2000

2000

W-3200

600

1500

In a multi-controller deployment, there is a scaling limit of 2,000 AirGroup servers and 16,000 AirGroup users for all controllers in a cluster. If you require more servers and users than the prescribed limit, configure multiple clusters, so that each cluster is within the prescribed limit.

The ArubaOS scaling limits are based on the following metrics: l Memory Utilization l CPU Utilization

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1043

Memory Utilization
The memory utilization is affected by the number of AirGroup servers and users in an AirGroup cluster. In an AirGroup cluster, the total number of AirGroup servers and users cannot exceed the limit defined by the topend controller. For example, in an AirGroup cluster of one W-3200 controller and two W-6000M3 controllers, the cluster limit is determined as per the scaling limit of the top-end controller which is the W-6000M3 controller. For the W-3200 controller in the cluster, the controller platform limit of the W-3200 controller is applied. Based on the memory utilization, Table 228 summarizes the maximum number of AirGroup servers and users for all supported controller platforms.
CPU Utilization
The CPU utilization is measured by the rate at which the controller receives mDNS packets. The rate of mDNS packets in the cluster depends on the number of AirGroup servers, users, and number of applications installed on these devices. The rate of mDNS packets handled by the supported controller platform varies. Table 229 displays the total number of mDNS packets received per second by supported the controller platforms:

Table 229: mDNS Packet Limits in Controller

Controller Model

mDNS packets per second (pps)

W-7240

100

W-7220

60

W-7210

60

W-7205

40

W-7030

50

W-7024

50

W-7010

30

W-7005

30

W-6000

20

W-3600

20

W-3400

20

W-3200

20

Use the following command to determine the number of mDNS packets received per second by the controller: show airgroup internal-state statistics
Issue this command multiple times to measure the time difference and the mDNS packet count.

1044 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

General AirGroup Limitations
The AirGroup feature has the following limitations:
l AirGroup is supported only in tunnel and decrypt-tunnel forwarding modes. l If you use CPPM to define AirGroup users, the shared user and role lists, and location attributes cannot
exceed 1000 characters. l The RTSP protocol does not support AirPlay on an Apple TV receiver if you enable NAT on the user VLAN
interface. l The location-based access feature only supports AP FQLNs (Fully Qualified Location Names) configured in
the format <ap name>.floor <number>.<building>.<campus>. The AP names cannot contain periods. l AirGroup's DLNA discovery works across VLANs, however, media streaming from Windows Media Server
does not work across VLANs. This limitation is because of Digital Rights Management (DRM) support in Windows Media Server, which restricts media sharing across VLANs. Media streaming works only when both client and server are connected to the same VLAN. l Android devices cannot discover media server while using the native music and video player applications and when they are connected across VLANs. For example, Samsung Tab 3 cannot discover the media server on Samsung Galaxy S4 while using the native music and video player applications. Android devices can discover media server when they are connected in the same VLAN. This restriction is forced by Samsung devices. l Xbox cannot be added as an extender to the Windows clients using the Windows Media Center application with the AirGroup feature enabled. You need to disable the AirGroup feature to add Xbox as an extender. l Wireless Clients such as iPad and iPhone running the Sonos Controller application cannot discover Sonos music system with the AirGroup is enabled.
Integrated Deployment Model
In the integrated deployment model, AirGroup features are integrated with the WLAN controller that terminates all APs and provides WLAN services. This deployment model also supports optional integration with CPPM. When you implement AirGroup in an integrated deployment, upgrade the controller to ArubaOS 6.4 or later, and trunk all VLANs with wired devices (such as printers) to the AirGroup controller.
If your deployment requires ClearPass Policy Manager integration, complete the procedures described in ClearPass Policy Manager User Guide and ClearPass Guest Deployment Guide before performing the steps described in this section.
Master-Local Controller Synchronization
You can configure AirGroup from the master controller to ease the deployment. The master controller then synchronizes the AirGroup configuration elements on all associated local controllers it manages. AirGroup configurations can belong to any of the following categories:
Master -- These commands must be configured from a master controller. The master controller pushes the AirGroup configurations to all the applicable local controllers.
l AirGroup custom service definition. For more information, see Integrated Deployment Model on page 1045.
l AirGroup disallow user-role (service filtering) definition. For more information, see Configuring the disallowrole for an AirGroup Service on page 1050.
l AirGroup disallow VLAN (service filtering) definition. For more information, see Restricting AirGroup Servers on a VLAN based on an AirGroup Service on page 1050.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1045

l AirGroup CPPM enforce registration. For more information, see Configuring CPPM to Enforce Registration on page 1062.
l AirGroup controller-CPPM Interface definition. For more information, see Configuring the AirGroup-CPPM Interface on page 1057.
l AirGroup multi-controller domain definition. For more information, see Configuring an AirGroup Domain on page 1052.
l AirGroup CPPM query interval definition. For more information, see Configuring the CPPM Query Interval on page 1057.
Local -- There are a few configuration limitations on the local controller. The local controller can only include the existing AirGroup domains in the AirGroup active-domain list, applicable for this controller. The local controller cannot define or edit an AirGroup domain.
These configuration commands are applicable to both master and local controllers. The master controller does not push the following AirGroup configuration commands to all applicable local controllers.
l AirGroup enable/disable parameter. For more information, see Enabling or Disabling AirGroup Global Setting on page 1046.
l AirGroup service enable/disable parameter. For more information, see Enabling or Disabling an AirGroup Service on page 1051.
l AirGroup allowall service status. For more information, see Integrated Deployment Model on page 1045. l AirGroup disallow VLAN (global) definition. For more information, see Restricting AirGroup Servers for a
VLAN on page 1050. l AirGroup multi-controller active-domain definition. For more information, see Configuring an AirGroup
active-domain on page 1053.
Configuring an AirGroup Integrated Deployment Model
Use the following procedures to enable the AirGroup feature and configure AirGroup services.
Enabling or Disabling AirGroup Global Setting
Starting from ArubaOS 6.4, AirGroup is disabled by default. To configure AirGroup global parameters, use the following procedure:
In the WebUI
To enable or disable the AirGroup global setting using the controller WebUI:
1. Navigate to Configuration > Advanced Services > AirGroup. 2. Select the AirGroup Settings tab. 3. Under Global Setting > AirGroup Status, select enable from the drop-down list to enable the AirGroup
feature. 4. Under Global Settings > AirGroup MDNS Status, select enabled from the drop-down list to enable the
MDNS. 5. Under Global Settings > AirGroup DLNA Status, select enabled from the drop-down list to enable the
DLNA. 6. Under Global Setting > AirGroup CPPM enforce registration, select enable from the drop-down list to
register an AirGroup server on a CPPM server. For more information on AirGroup CPPM enforce registration, see Configuring CPPM to Enforce Registration on page 1062. 7. Under Global Setting > AirGroup IPV6 Support, select enable from the drop-down list.

1046 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

The global AirGroup status must be enabled on the controller to enable AirGroup IPv6 support. For more information, see AirGroup IPv6 Support on page 1038.
8. Under Global Setting > AirGroup CPPM query interval, enter a value in the range of 1 to 24 hours. The default value is 10. For more information on AirGroup CPPM query interval, see Configuring the CPPM Query Interval on page 1057.
9. Under Global Setting > AirGroup location discovery, select enable from the drop-down list. If enabled, AirGroup user can discover shared devices based on the user's proximity to the AirGroup server. If disabled, location based filtering does not apply. Users can discover far servers. For more information on location attributes in CPPM, see Table 230.
10.Under Global Setting > AirGroup Active Wireless Discovery, select enable from the drop-down list. If enabled, AirGroup controller actively sends refresh requests to discover wireless servers. If disabled, the controller sends refresh requests to wired AirGroup servers only.
11.Click Apply.
AirGroup CPPM enforce registration, AirGroup CPPM query interval, AirGroup location discovery, and AirGroup Active Wireless Discovery parameters are available on the master controller only. The master controller pushes these configurations to all the applicable local controllers.
Table 230 shows the location attributes a device can register with CPPM and the corresponding behavior on the controller:

Table 230: Location Attributes in CPPM

Location Attribute Tag=Value Format

AP-Name based

ap-name=<name>

AP-Group based AP-FQLN based

ap-group=<group> fqln=<fqln>

Description
When the location is set to ap-name, all AirGroup users connected to this AP and other APs that are in the same RF neighborhood can access the shared device.
When the location attribute is set to ap-group, all AirGroup users associated to the APs in the specified AP group can access the shared device.
When the location attribute is set to ap-FQLN, all AirGroup users connected to APs on the same floor, and to the APs on a floor above or below the configured APs can access the shared device.

In the CLI
Access the controller's command-line interface and use the following command to enable or disable the AirGroup Global Setting:
(host) (config) #airgroup {enable | disable} (host) (config) #airgroup cppm-server enforce-registration (host) (config) #airgroup ipv6 (host) (config) #airgroup query-interval <1..24> (host) (config) #airgroup location-discovery {enable | disable} (host) (config) #airgroup active-wireless-discovery {enable | disable}

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1047

Enabling or Disabling mDNS and DLNA
You can enable and disable mDNS and DLNA using CLI commands and WebUI. In the CLI Use the following command to enable or disable the mDNS or DLNA for an AirGroup service: airgroup [mdns|dlna] enable|disable
Both mDNS and DLNA are disabled by default.

Use the following command to view the status of mDNS and DLNA features: #show airgroup status
Viewing AirGroup Global Setting on Controller
In the WebUI To view the global setting of AirGroup in the controller WebUI: 1. Navigate to Configuration > Advanced Services > AirGroup. 2. Select the AirGroup Settings tab to view the AirGroup Global Setting in the controller.
In the CLI Use the following command to view the global settings of the AirGroup configuration and AirGroup services configured in your WLAN controller. (host) #show airgroup status For more information, see Dell Networking W-Series ArubaOS 6.4 Command-Line Interface Reference Guide.
Defining an AirGroup Service
The AirGroup solution defines the concept of configurable AirGroup services. One or more mDNS and DLNA services can be configured on the controller. When you define an mDNS service as an AirGroup service, you can implement policies to restrict its availability to a specific user role or VLAN. The following services are preconfigured and available as part of the factory default configuration: l AirPlay l AirPrint l iTunes l RemoteMgmt l Sharing l Chat l GoogleCast l DIAL l DLNA Media l DLNA Print
In the WebUI An administrator can configure and use up to 100 AirGroup services, and each AirGroup service can support up to 100 service elements. To define an AirGroup service using the controller WebUI: 1. Navigate to Configuration > Advanced Services > AirGroup. 2. On the AirGroup service details tab, click Add New.

1048 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

3. Enter the name of the AirGroup profile in the Name field. 4. Enter the description for the AirGroup profile in the Description field. 5. Select Enable to enable this service. 6. Enter the VLANs that need to be restricted in the Disallow VLANs field. 7. Enter the roles that need to be restricted in the Disallow Roles field. 8. Enter the Service ID of the AirGroup service in the Services IDs field. 9. Click OK and then click Apply.
Table 231 describes the configuration parameters of an AirGroup service:

Table 231: AirGroup Service Parameters

Parameter

Description

Name

Name of the AirGroup Service.

Description

Enter the description for the AirGroup Service.

Enable

Enables the AirGroup service.

Disallow VLANs

User VLANs restricted from accessing the service.

Disallow Roles

User Roles restricted from accessing the service.

Service IDs

Specifies the mDNS or DLNA service IDs.
An AirGroup mDNS service ID is the name of a Bonjour service offered by a Bonjour-enabled device or application. Bonjour defines mDNS service ID strings using the following format <underscore>servicename<period><underscore>protocol.local
Example: _airplay._tcp.local
The mDNS service ID string is case sensitive and must be entered as is without any modification, with the exception of the .local portion of the service ID which is optional.
When you add an existing mDNS service ID to a new service, Airgroup automatically deletes the mDNS service ID from the old service and displays a warning message. A sample warning message is as follows:
service id <_ssh._tcp> removed from <remotemgmt> and added to <remotelogin>
The DLNA service IDs are colon separated and the service ID should have the following format to discover DLNA server or devices with the maximum label size of 128 characters:
urn:domain-name:device:deviceType:ver urn:domain-name:service:serviceType:ver
For example, you can use the following service ID to support DLNA media server under AirGroup:
urn:schemas-upnp-org:device:MediaServer:1
NOTE: Cache refresh mechanism is not required for DLNA, as the DLNA devices advertise their service periodically.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1049

In the CLI Use the airgroupservice command to define an AirGroup service using the command-line interface. airgroupservice <name> Sample Configuration The following example configures the iPhoto service with access to the _dpap._tcp service ID to share photos across MacBooks: (host) (config) #airgroupservice iPhoto (host) (config-airgroupservice) #description "Share Photos" (host) (config-airgroupservice) #id _dpap._tcp Configuring the disallow-role for an AirGroup Service An AirGroup service is accessible to all user devices associated to your controller by default. The disallow-role parameter prevents devices with the specified user roles from accessing AirGroup services. airgroupservice <string>
disallow-role <string> Sample Configuration (host) (config) #airgroupservice iPhoto (host) (config-airgroupservice) #disallow-role guest Restricting AirGroup Servers for a VLAN An AirGroup service is accessible to user devices in all VLANs configured on your controller by default. Use the following command to enable or disable AirGroup access to devices in a specific VLAN: airgroup vlan <VLAN ID> {allow | disallow} Sample Configuration (host) (config) #airgroup vlan 5 disallow Restricting AirGroup Servers on a VLAN based on an AirGroup Service To prevent user devices on a specific VLAN from accessing a specific AirGroup service, use the disallow-vlan option. airgroupservice <string>
disallow-vlan <string> Sample Configuration (host) (config) #airgroupservice airplay (host) (config-airgroupservice) #disallow-vlan 5 Viewing AirGroup Disallowed VLAN Policy Details Use the following command to view the status of a disallowed VLAN policy. show airgroupservice [dlna|mdns] [verbose] Viewing An AirGroup Disallowed VLAN Use the following command to view the status of the disallowed AirGroup VLANs: show airgroup vlan For more information, see Dell Networking W-Series ArubaOS 6.4 Command-Line Interface Reference Guide.
Enabling the allowall Service
The allowall service is a preconfigured AirGroup service that enables the controller to permit all AirGroup services by default, without requiring an administrator to configure an AirGroup service.

1050 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the WebUI Use the following steps to enable the allowall service using the controller WebUI: 1. Navigate to Configuration > Advanced Services > AirGroup. 2. In the AirGroup service details tab, select the checkbox next to the allowall service and click Enable.
To disable this service, select the allowall checkbox and click Disable. 3. Click Apply.
In the CLI Use the following command to enable or disable the allowall service: airgroup service allowall {enable | disable} Sample Configuration (host) (config) #airgroup service allowall enable
Enabling or Disabling an AirGroup Service
In the WebUI To enable or disable an AirGroup service using the controller WebUI: 1. Navigate to Configuration > Advanced Services > AirGroup. 2. On the AirGroup service details tab, select the AirGroup service and click Enable or Disable. 3. Click Apply.
In the CLI Use the following command to enable or disable an AirGroup service: airgroup service <string> {enable | disable} Sample Configuration (host) (config)#airgroup service airplay disable
Viewing AirGroup Service Status
In the WebUI Use the following steps to view the status of AirGroup services using the controller WebUI: 1. Navigate to Configuration > Advanced Services > AirGroup. 2. Under the AirGroup service details tab, view the status of all the AirGroup services.
In the CLI Use the following command to verify the status of an AirGroup Service: show airgroup status Sample Configuration For sample configuration, see show airgroup status.
Viewing Blocked Services
The airgroup service <servicename> disable command blocks an AirGroup service by blocking the service IDs for that service. When you enable an AirGroup service, service IDs of that service are enabled automatically. To view the list of blocked services, use the show airgroup blocked-service-id command.
In the CLI show airgroup blocked-service-id [mdns|dlna]

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1051

Viewing AirGroup Service Details
In the WebUI To view the AirGroup service details using the controller WebUI: 1. Navigate to Configuration > Advanced Services > AirGroup service details. 2. Under AirGroup service details tab, click on any of the service name to view the service details.
In the CLI Use the following command to view the service details of all AirGroup services: show airgroupservice Sample Configuration For sample configuration, see Viewing AirGroup Disallowed VLAN Policy Details on page 1050.
Configuring an AirGroup Domain
An administrator can configure multiple AirGroup domains for a site-wide deployment. Individual local controller can independently choose relevant multiple AirGroup domains to form a multi-controller AirGroup cluster.
An administrator can configure and use up to 100 AirGroup domains, and each AirGroup domain can support up to 100 IP addresses.

A domain can be configured only on a master controller only. However, active domains can be added/removed on any controllers.
The following procedure configures a cluster of controllers for a domain:
In the WebUI 1. Navigate to Configuration > Advanced Services > AirGroup. 2. Select the AirGroup Settings tab. 3. Under the AirGroup Domains section, click Add New. 4. In the Name field, enter the domain name. 5. In Description field, enter a short description of the domain name. 6. Select the Active checkbox to enlist the domain in the active-domain list of a controller. 7. Under the IP Address section, enter the controller or VRRP IP to be a part of this domain and click Add.
If the deployment includes master or local redundancies, use the VRRP IP address in the domain definition. Else, use the controller IP address.
8. Click Ok and Apply.
In the CLI [no] airgroup domain <string>
[no] ip-address <A.B.C.D> [no] description <string> Sample Configuration (host) (config) #airgroup domain Campus1 (host) (config-airgroup-domain) #ip-address 10.10.10.1 (host) (config-airgroup-domain) #ip-address 11.11.11.1 (host) (config-airgroup-domain) #description AirGroup_campus1

1052 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Viewing an AirGroup Domain
The following procedure displays a list of AirGroup domains configured:
In the WebUI 1. Navigate to Configuration > Advanced Services > AirGroup. 2. Select the AirGroup Settings tab. The list of AirGroup domains are displayed under the AirGroup
Domains section.
In the CLI show airgroup domain
Configuring an AirGroup active-domain
AirGroup allows one or more AirGroup domains to be a part of the AirGroup active-domain list of a controller. A master or local controller may participate in one or more AirGroup cluster based on its active-domain list. The controller must set the corresponding domain as active for the controller to be part of the AirGroup cluster. The following procedure configures an AirGroup active-domain for AirGroup cluster:
In the WebUI For the WebUI procedure, see Configuring an AirGroup Domain on page 1052.
In the CLI [no] airgroup active-domain <string> Sample Configuration (host) (config) #airgroup active-domain campus1 (host) (config) #airgroup active-domain campus2
Viewing an AirGroup active-domains
The following procedure displays a list of AirGroup active-domains configured:
In the WebUI 1. Navigate to Configuration > Advanced Services > AirGroup. 2. Select the AirGroup Settings tab. The Active-Domain and Status column displays a list of AirGroup
active-domains under the AirGroup Domains section.
In the CLI show airgroup active-domains
Viewing AirGroup VLAN Table
The following procedure displays the disallowed AirGroup VLANs.
In the WebUI 1. Navigate to Configuration > Advanced Services > AirGroup. 2. Select the AirGroup Settings tab. The list of disallowed AirGroup VLANs are displayed under the VLAN
Table section.
In the CLI For the CLI command, see Viewing An AirGroup Disallowed VLAN on page 1050

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1053

Viewing AirGroup Multi-Controller Table
All controllers communicate with each other based on the multi-controller table in an AirGroup cluster. This table is a combination of controllers specified in each domain, as part of active-domains. The following command displays the IP address of all the controllers participating in an AirGroup multicontroller environment:
In the CLI show airgroup multi-controller-table
Controller Dashboard Monitoring
The Dashboard > Usage page of the WebUI has an additional AirGroup section, which displays all the AirGroup services available and number of servers offering the service. It is aggregated by the total number of AirGroup servers sorted by the services they advertise. Figure 227 AirGroup Dashboard Usage

Table 232: AirGroup Dashboard Usage

Column

Description

Service

Displays the services advertised by AirGroup servers discovered by the controller.

Devices

Displays the number of AirGroup servers advertising a particular service.

Click the IP link to view the client details in the Dashboard > Clients page of the WebUI. The client details page has a tab called AirGroup. The AirGroup tab in the details page displays a list of all the far and near end devices that are either accessible or not accessible by the specific client.
In a multi-controller topology, only AirGroup clients and servers that are connected to the same controller are listed under the near or far devices categories. AirGroup does not fetch this information from other controllers that are part of the same multi-controller domain.

1054 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l A device is classified as a Near Device if it is registered with CPPM and the location is set to any one of the following: n AP-Group same as the client n AP-FQLN same as the client n AP-FQLN corresponding to adjacent floors of the client n AP-Name same as the client n AP-Name which is an RF neighbor of the client For more information on location, see Location Attributes in CPPM.
l A device is classified as a Far Device if none of the above criteria is met. Devices that are neither registered nor have a location defined in CPPM are classified as Far Devices by default.
l A device is classified as Accessible or Non Accessible based on the CPPM policies and disallow-role configuration.
Figure 228 Near and Far Accessible Devices

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1055

Table 233: Near and Far Accessible Devices

Column

Description

MAC Address

Displays the MAC address of the near or far AirGroup server that is accessible by an AirGroup client.

Name

Displays the hostname of the near and far AirGroup server that is accessible by an AirGroup client.

Service

Displays the AirGroup service advertised by an AirGroup server.

Figure 229 Near and Far Non Accessible Devices

Table 234: Near and Far Non Accessible Devices

Column

Description

MAC Address

Displays the MAC address of the near or far AirGroup server that is not accessible by an AirGroup client.

Name

Displays the hostname of the near and far AirGroup server that is not accessible by an AirGroup client.

Service

Displays the AirGroup service advertised by an AirGroup server.

Why Not Accessible

Displays the reason for not accessing the AirGroup server.

1056 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Configuring the AirGroup-CPPM Interface
Configure the AirGroup and ClearPass Policy Manager (CPPM) interface to allow an AirGroup controller and CPPM to exchange information about the owner, visibility, and status for each mobile device on the network. The following procedures configure the AirGroup-CPPM interface:
l Configuring the CPPM Query Interval on page 1057 l Defining a CPPM and RFC3576 Server on page 1058 l Assigning CPPM and RFC 3576 Servers to AirGroup on page 1060 l Viewing the CPPM Server Configuration on page 1061 l Configuring CPPM to Enforce Registration on page 1062 l Group-Based Device Sharing on page 1063

Configuring the CPPM Query Interval
The AirGroup CPPM query interval refreshes the CPPM entries at periodic intervals. The minimum value is 1 hour and the maximum value is 24 hours. The default value is 10 hours.

In the WebUI 1. Navigate to the Configuration > Advanced Services > AirGroup page. 2. Select the AirGroup Settings tab. 3. Under Global Setting > AirGroup CPPM query interval, enter a value in the range of 1 to 24 hours. 4. Click Apply.

In the CLI [no] airgroup cppm-server query-interval <1..24> Sample Configuration (host) (config) #airgroup cppm-server query-interval 9

Viewing the CPPM Query Interval
The following procedure displays the configured CPPM query interval value.

In the WebUI
1. Navigate to the Configuration > Advanced Services > AirGroup page. 2. Select the AirGroup Settings tab. The AirGroup CPPM query interval displays the value in hours under
the Global Setting section.

In the CLI show airgroup cppm-server query-interval Sample Configuration (host) #show airgroup cppm-server query-interval

CPPM Server Query Interval

--------------------------

Timer Value Unit

----------- ----

9

hours

The output of this command includes the following information:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1057

Table 235: show airgroup cppm-server query-interval

Column

Description

Timer Value

Displays the number of hours.

Unit

Displays the unit in hours.

Defining a CPPM and RFC3576 Server
You must define one or more CPPM servers to be used by the AirGroup RADIUS client, and an RFC 3576 (dynamic authorization) server. If multiple CPPM servers are defined, the servers are listed in a sequential order. The AirGroup RADIUS client will use the first available server on this list.
Table 236 describes the configuration parameters for a CPPM server.

Table 236: CPPM Server Configuration Parameters

Parameter

Description

Host

IP address or fully qualified domain name (FQDN) of the authentication server. The maximum supported FQDN length is 63 characters.

Key

Shared secret between the controller and the authentication server. The

maximum length is 128 characters.

Authentication Ports

Authentication port on the server. Default: 1812

Accounting Ports

Accounting port on the server. Default: 1813

Retransmits

Maximum number of retries sent to the server by the controller before the server is marked as down.
Default: 3

Timeout

Maximum time, in seconds, that the controller waits before timing out the request and resending it.
Default: 5 seconds

NAS ID

Network Access Server (NAS) identifier to use in RADIUS packets.

NAS IP

NAS IP address to send in RADIUS packets.
You can configure a "global" NAS IP address that the controller can use for communications with all CPPM servers. However, that the controller will only use this global NAS IP if you do not configure a server-specific NAS IP. To set the global NAS IP in the WebUI, navigate to the Configuration > Security > Authentication > Advanced page.

1058 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Parameter

Description

To set the global NAS IP in the CLI, use the ip radius nas-ip <A.B.C.D> command.

Source Interface

Enter a VLAN number ID.
This value allows you to use source IP addresses to differentiate RADIUS requests, and associates a VLAN interface with the RADIUS server to allow the server-specific source interface to override the global configuration.
l If you associate a Source Interface (by entering a VLAN number) with a configured server, the source IP address of the packet will be the same as the IP address of the interface.
l If you do not associate the Source Interface with a configured server (leave the field blank), the IP address of the global Source Interface will be used.

Use MD5

Use a MD5 hash of the cleartext password.

Use IP address for calling station ID
Mode

Select this checkbox to use an IP address instead of a MAC address for the calling station ID.
Enables or disables the server.

Configuring a CPPM Server
You can configure a CPPM server for AirGroup using the WebUI or CLI.
Server-derived user roles or VLANs configured in this server group are not applicable to AirGroup.

In the WebUI
To configure a CPPM server using the controller WebUI:
1. Navigate to Configuration > Security > Authentication > Servers. 2. Select Radius Server to display the CPPM Server List. 3. To configure a CPPM server, enter the name for the server and click Add. 4. Select the name to configure server parameters. Select the Mode checkbox to activate the authentication
server. 5. Click Apply.
In the CLI
Use the following commands to configure a CPPM server using the CLI: aaa authentication-server radius <name>
host <ipaddr> key <key> enable
Sample Configuration (host)(config) #aaa authentication-server radius emp_accounts (host)(RADIUS Server "emp_accounts") #host 10.100.8.32 (host)(RADIUS Server "emp_accounts") #key employee123 (host)(RADIUS Server "emp_accounts") #enable

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1059

Configuring the CPPM Server Group
In the WebUI To configure a CPPM server group using the controller WebUI: 1. Navigate to Configuration > Security > Authentication > Servers. 2. Select Server Group to display the Server Group list. 3. Enter the name of the new server group and click Add. 4. Select the name to configure the server group. 5. Under Servers, click New to add a server to the group.
a. Select a server from the drop-down list and click Add Server. b. Repeat the above step to add other servers to the group. 6. Click Apply.
In the CLI Use the following commands to configure a CPPM server group using the CLI: aaa server-group <name> auth-server <name> Sample Configuration (host) (config) #aaa server-group employee (host) (Server Group "employee") #auth-server emp_accounts
Configuring an RFC 3576 Server
In the WebUI To configure an RFC 3576 server by using the controller WebUI: 1. Navigate to Configuration > Security > Authentication > Servers. 2. Select RFC 3576 Server. 3. Enter the IP address and click Add. 4. Select the IP address to enter the shared secret key in the Key text box. 5. Retype the shared secret key in the Retype text box.
In the CLI Use the following commands to configure an RFC 3576 server using the CLI: aaa rfc-3576-server <server_ip>
key <string> Sample Configuration (host) (config) #aaa rfc-3576-server 10.100.8.32 (host) (RFC 3576 Server "10.100.8.32") #key employee123
Assigning CPPM and RFC 3576 Servers to AirGroup
Use the following procedures to assign CPPM and RFC 3576 servers to AirGroup.
An AirGroup RFC 3576 server cannot use the same port as an authentication module RFC 3576 server. To avoid conflicts, use a non-standard port for the AirGroup RFC 3576 server.
In the WebUI
Use the following procedure to configure the AirGroup AAA profile by using the controller WebUI:

1060 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

1. Navigate to Configuration > Advanced Services > All Profiles. 2. Expand the Other Profiles menu and select AirGroup AAA Profile. 3. In the Configure dead time for a down Server text box in the Profile Details window, enter a
maximum period in minutes, so that a client that does not send user traffic for the given period is considered idle. 4. Enter the UDP port number in the Configure UDP port to receive RFC 3576 server requests field. If your network uses an RFC 3576 server for authentication, select a different port for the AirGroup 3576 server. The default in ClearPass Guest is 5999.
In this release of ArubaOS, the user-defined UDP port number for RFC3576 server is automatically permitted by the firewall. The administrator does not have to explicitly define a firewall policy to permit this port.
5. Identify the AirGroup CPPM server group. In the Profiles list, select the Server Group under the AirGroup AAA Profile menu.
6. In the Profile Details window, click the Server Group drop-down list to select the desired CPPM server group.
7. Click Apply. 8. Identify the RFC 3576 server. In the Profiles list, select RFC 3576 Server under the AirGroup AAA Profile
menu. 9. Enter the IP address of the RFC 3576 server in the Add a profile text box. 10.Click Add and Apply.
In the CLI
Execute the following commands to configure the AirGroup AAA profile using the CLI: airgroup cppm-server aaa
rfc-3576-server <ip address> rfc-3576_udp_port <port number> server-dead-time <time> server-group <server group name>
If your network uses an RFC 3576 server for authentication, select a different port for the AirGroup 3576 server. The default port in ClearPass Guest is 5999.
Sample Configuration (host) (config) # airgroup cppm-server aaa (host) (Airgroup AAA profile) #rfc-3576-server 10.15.16.25 (host) (Airgroup AAA profile) #rfc3576_udp_port 21334 (host) (Airgroup AAA profile) #server-dead-time 10 (host) (Airgroup AAA profile) #server-group employee
Viewing the CPPM Server Configuration
In the WebUI
To view the CPPM server configuration by using the controller WebUI: 1. Navigate to Configuration > Advanced Services > AirGroup. 2. Under the AirGroup Settings tab, the AirGroup CPPM server aaa section displays the CPPM Server
configuration.;
In the CLI
Use the following CLI command to view data for the ClearPass Policy Manager servers:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1061

(host) #show airgroup cppm-server aaa

Config-cppm-server-aaa ---------------------Parameter --------Server Group RFC 3576 server Configure dead time for a down Server Configure UDP port to receive RFC 3576 server requests

Value ----RADIUS_4 Test1 10 N/A

The output of this command includes the following information:

Table 237: show airgroup cppm-server aaa

Column

Description

Parameter

Displays the AAA parameters for AirGroup.

Value

Displays the value entered for each AAA parameter.

Verifying CPPM Device Registration
Use the following command to display information for devices registered in ClearPass Policy Manager. (host) #show airgroup cppm entries For more information, see Dell Networking W-Series ArubaOS 6.4 Command-Line Interface Reference Guide.
Configuring CPPM to Enforce Registration
The AirGroup solution allows the users to view all mDNS devices by default. AirGroup provides a set of policy definitions to allow or disallow one of more AirGroup servers from being visible to specific AirGroup users. If an AirGroup server is not registered on a CPPM server, by default, the server will be visible to all AirGroup users. The administrator must register an AirGroup server to allow or disallow this server from being visible to specific AirGroup users. The following procedure registers an AirGroup server on a CPPM server:
In the WebUI
To configure using the controller WebUI: 1. Navigate to Configuration > Advanced Services > AirGroup. 2. Select the AirGroup Settings tab. 3. Under Global Setting > AirGroup CPPM enforce registration, select Enabled from the drop-down list. 4. Click Apply.
In the CLI
Use the following command to force AirGroup servers to register with CPPM. This option is disabled by default: (host) (config) #airgroup cppm-server enforce-registration To verify the CPPM Registration Enforcement status, use the following command: (host) #show airgroup status

For more information, see Dell Networking W-Series ArubaOS 6.4 Command-Line Interface Reference Guide.

1062 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Group-Based Device Sharing
Dell Networking W-Series ArubaOS 6.4.x AirGroup supports sharing AirGroup devices such as AppleTV, Printer, and so on to a User Group using CPPM. This is an add-on to the existing device sharing mechanisms such as username, user-role, and location based device sharing. A User Group is a logical association of users.
A user can be a part of groups that are defined in Active Directory. User group attribute for each user in a controller is learnt, when a user is associated to wireless network. In ArubaOS, this is initially learnt in auth module (authentication process). Auth module sends RADIUS request to RADIUS server as a part of 802.1x authentication and the RADIUS server fetches the user group attribute in the form of vendor specific attribute (VSA) from the Active Directory. Subsequently, AirGroup obtains this information from Auth module. This is similar to user's role, however, a user can be a part of more than one groups.
When AirGroup learns about a new device, it interacts with ClearPass Guest to obtain the shared attributes. Starting from Dell Networking W-Series ArubaOS 6.4.x, the shared group(s) attribute is also obtained along with the following attributes:
l Device owner l Shared location(s) l Shared user(s) l Shared role(s)

The group based device sharing feature is supported in CPPM 6.3 and higher versions.

A user can be a part of maximum 32 user groups. This needs to be defined as comma separated string in Active directory. Each group name can contain a maximum of 63 characters and the entire group name strings cannot exceed 320 characters.

The AirGroup policy engine is enhanced to compare the user's group membership (obtained using auth module) and shared groups to determine if a user can discover the specific AirGroup server or not.

Sample Configuration

The following example displays the status of the AirGroup server (Apple TV, AirPrint Printer, Google ChromeCast, and so on) in a controller:

(host) #show airgroup servers

AirGroup Servers ---------------MAC --5c:3c:27:14:6e:01

IP

Type Host Name

--

---- ---------

10.15.121.240 mDNS

Service ------airplay

VLAN Wired/Wireless ---- --------------
2 wireless

Role

Group

Username AP-Name

----

-----

-------- -------

authenticated Mathematics Mike

104_AP105

Num Servers: 1, Max Servers: 2000. The following example displays the shared group information for devices registered in ClearPass Guest: (host) #show airgroup cppm entries

ClearPass Guest Device Registration Information

-----------------------------------------------

Device

device-owner shared location-id AP-name

------

------------ --------------------------

00:1e:65:2d:ae:44 N/A

shared location-id AP-FQLN --------------------------

shared location-id AP-group shared user-list shared group-list shared role-list

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1063

--------------------------- ---------------- ----------------- ---------------Physics

CPPM-Req CPPM-Resp

-------- ---------

1

1

Num CPPM Entries:1
The following example describes the user Alice is the member of Mathematics group and hence cannot discover the 00:1e:65:2d:ae:44 appleTv (specified in the example above) as it is not shared with the Mathematics group. Similarly, the user Bob can view the appleTv as it is shared with the Physics group.
(host) #show airgroup users

AirGroup Users -------------MAC AP-Name --------74:e1:b6:15:25:7e 104_AP105 b0:65:bd:09:b6:79 104_AP105

IP

Type Host Name

--

---- ---------

10.15.121.240 mDNS iPad-358

10.15.121.240 mDNS

VLAN ----
2 2

Role

Group

Username

----

-----

--------

authenticated Mathematics Alice

authenticated Physics

Bob

Num Users: 2, Max Users: 6000.

Bluetooth-Based Discovery and AirGroup
Apple devices support Bluetooth-based device discovery mechanism, which allows an Apple device to discover an Apple TV that is within the Bluetooth range.
AirGroup supports only mDNS-based device discovery and does not support Bluetooth-based device discovery mechanism.

AirGroup mDNS Static Records
AirGroup processes mDNS packets advertised by servers and creates the relevant cache entries. When a query comes from a user, AirGroup responds with the appropriate cache entries with the relevant policies applied. Starting with ArubaOS 6.4, AirGroup provides the ability for an administrator to add the mDNS static records to cache, when a server is:
l not mDNS compliant. l connected to a VLAN that is not trunked to the AirGroup supported controller.
The administrator can add these records manually to the cache using CLI commands for the servers that adhere to the above conditions.
Important Points to Remember
Remember the following points when you create mDNS static records and add them to the cache:
l The mDNS static records do not expire as there is no cache refresh for static records. These static records can be deleted by an administrator.
l The Administrator needs to ensure that the relevant records are updated manually, when the IP address of a server is changed.

1064 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l The Disallow role policy configured on the CLI is accepted for static records. The Disable service policy is accepted while responding to a query. Administrator has the privilege to configure static records of a disabled service. Disallow vlan is not applicable for static records.
l ClearPass Policy Manager policies work with static servers.
Creating mDNS Static Records on a Controller
The Administrator can create the static records using the following methods: l Group mDNS static records l Individual mDNS static records
Group mDNS Static Records
You can create a group of mDNS records for a device. This section describes how to create static records of a server as a group using the CLI. Creating a PTR Record Use the following command to create a PTR record: (config) # airgroup static mdns-record ptr <mac_addr> <mdns_id> <domain_name> [server_ipaddr] (config-airgroup-record) #
After creating a PTR record, controller displays the (config-airgroup-record) # prompt and you can create SRV, A, AAAA, and TXT records under this prompt. After creating a PTR, SRV, TXT, A, and AAAA static record, you can use the show airgroup cache entries command to view and verify the records created. You can view only the static records in the output of the show airgroup cache entries static command.
Creating an SRV Record Use the following command to create an SRV record: (config-airgroup-record) # srv <port> <priority> <weight> <host_name> Creating an A Record Use the following command to create an A record: (config-airgroup-record) #a <ipv4addr>
You can create/delete an A record if a corresponding SRV record is available.
Creating an AAAA Record Use the following command to create an AAAA record: (config-airgroup-record) #aaaa <ipv6addr>
You can create/delete an AAAA record if a corresponding SRV record is available.
Creating a TEXT Record Use the following command to create a TEXT record: (config-airgroup-record) #txt <text>

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1065

Individual Static mDNS Records
You can create individual static records independently for each record type. Creating an Individual SRV Record Use the following command to configure an individual SRV record: airgroup static mdns-record srv <mac_addr> <domain_name> <port> <priority> <weight> <host_ name> [ server_ipaddr]
Creating an Individual TEXT Record Use the following command to configure an individual TEXT record: airgroup static mdns-record txt <mac_addr> <domain_name> <text> [server_ipaddr]
Creating an Individual A Record Use the following command to configure an individual A record: airgroup static mdns-record a <mac_addr> <host_name> <ipv4addr> [server_ipaddr]
Creating an Individual AAAA Record Use the following command to configure an individual AAAA record: airgroup static mdns-record aaaa <mac_addr> < host_name> <ipv6addr> [server_ipaddr]
You can delete the mDNS records by appending no at the beginning of the command. Ensure that the [server_ ipaddr] parameter is not added while deleting mDNS records.
For more information, see Dell Networking W-Series ArubaOS 6.4 Command-Line Interface Reference Guide.

mDNS AP VLAN Aggregation
In the AirGroup solution, all mDNS/SSDP packets are terminated in a controller. The AirGroup solution works as a unicast querier and responder on behalf of mDNS/SSDP devices and eliminates the propagation of multicast mDNS/SSDP traffic in the WLAN.
When a wired mDNS/SSDP device is part of a VLAN which is not trunked in a controller, L2 connectivity does not exist between the wired mDNS/SSDP device and the controller. In such a scenario, the mDNS/SSDP packets from the wired mDNS/SSDP device does not reach the controller or from the controller to the wired mDNS/SSDP device. Hence, AirGroup does not discover these wired mDNS/SSDP devices.
The mDNS AP VLAN aggregation allows the discovery of wired mDNS/SSDP devices which do not have L2 connectivity with the controller or which do not trunk in the controller. An AP, which is in the same VLAN as the wired mDNS/SSDP device which does not trunk in the controller, receives and forwards the mDNS/SSDP packets from the wired mDNS/SSDP devices to the controller and from the controller to the wired mDNS/SSDP device. The AP forms a separate split tunnel (0x8000) with the controller and aggregates all mDNS/SSDP traffic to and from the controller.
l The split tunnel is formed only when both AP Multicast Aggregation (under AP System Profile) and AirGroup parameters are enabled. If either AP Multicast Aggregation or AirGroup parameter is disabled, the split tunnel is not formed.
l The AP Multicast Aggregation parameter is disabled by default.
l When AP Multicast Aggregation parameter is enabled from disabled state, an mDNS/SSDP device discovery packet is sent to the VLAN in which the split tunnel is created if the AirGroup parameter is also enabled.
l If an AP is provisioned with an uplink VLAN, then the split tunnel between the AP and the controller is formed with the uplink VLAN, otherwise the native VLAN is used.

1066 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l When the native VLAN is changed, the tunnel is recreated. l Irrespective of which VLAN (uplink VLAN or native VLAN) is used, the split tunnel is in the same VLAN as the
wired mDNS/SSDP devices. l Configure the VLAN in which the wired mDNS/SSDP device terminates in the controller. Do not create an
SVI or attach a port to the VLAN.
Configuring mDNS AP VLAN Aggregation
Use the following procedures to configure mDNS AP VLAN aggregation:
In the WebUI
Following different network topologies are possible to configure AP multicast aggregation for allowed VLANs: 1. If AP uplink is an access port with access VLAN x, the AP performs mDNS aggregation for VLAN x. Perform
following configuration: n Create VLAN on controller using command vlan x. n Configure native VLAN ID in system profile as vlan x. n Enable parameter AP Multicast Aggregation in ap-system profile. 2. If AP uplink is a trunk port with native VLAN as x (that is, uplink-VLAN is not configured for AP), the AP performs mDNS aggregation for VLAN x. Perform following configuration: n Create VLAN on controller using command vlan x. n Configure native VLAN ID in system profile as vlan x. n Enable parameter AP Multicast Aggregation in ap-system profile. 3. If AP uplink is a trunk port with native VLAN as x, allowed VLANs as x, y, and z, and if the uplink-VLAN is configured as VLAN y for AP, the AP performs mDNS aggregation for VLAN y. Perform following configuration: n Configure uplink-VLAN as VLAN y in the provisioning parameters of the AP and reboot the AP. n Create VLAN on controller using command vlan y. n Configure native VLAN in system profile as VLAN x. n Enable parameter AP Multicast Aggregation in ap-system profile.
In the CLI
1. Create VLAN for AP on the controller by using the following command: (host) (config) #vlan <vlan id>
If an AP is connected on the trunk port, then configure the native VLAN of the trunk port using this command. If uplink-VLAN is configured for the AP, then use this VLAN.
2. Configure the native VLAN ID for AP by using the following command: (host) (config) #ap system-profile <profile-name> (host) (ap system-profile "<profile-name>") #native-vlan-id <vlan-id>
If an AP is connected on the trunk port, then configure the native VLAN of the trunk port using this command.

3. Enable mDNS aggregation feature. (host) (config) #ap system-profile <profile-name> (host) (ap system-profile "<profile-name>") #mcast-aggr 4. Map the AP system-profile to AP name. (host) (config) #ap-name <ap-name>
Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1067

(host) (ap-name "<ap-name>") #ap-system-profile <profile-name>
In the WebUI
To enable AirGroup using the controller WebUI: 1. Navigate to Configuration > Advanced Services > AirGroup. 2. Select Settings tab. 3. Under Global Setting > AirGroup Status, select Enabled from the drop-down list. 4. Click Apply. To enable mDNS AP VLAN aggregation using the controller WebUI: 1. Navigate to Configuration > Advanced Services > All Profiles. 2. Under Profiles, select AP > AP System > <Profile-Name>. 3. Under Basic > General, select the checkbox next to AP multicast aggregation. 4. Click Apply.
In the CLI
To enable AirGroup using the controller CLI: (host) (config) #airgroup enable To enable mDNS AP VLAN aggregation using the controller CLI: (host) (config) #ap system-profile <profile-name> mcast-aggr
Disable AirGroup using WebUI
To disable AirGroup using the controller WebUI: 1. Navigate to Configuration > Advanced Services > AirGroup. 2. Select Settings tab. 3. Under Global Setting > AirGroup Status, select Disabled from the drop-down list. 4. Click Apply.
Disable mDNS AP VLAN aggregation using WebUI
To disable mDNS AP VLAN aggregation using the controller WebUI: 1. Navigate to Configuration > Advanced Services > All Profiles. 2. Under Profiles, select AP > AP System > <Profile-Name>. 3. Under Basic > General, deselect the checkbox next to AP multicast aggregation. 4. Click Apply.
Disable AirGroup using CLI
To disable AirGroup using the controller CLI: (host) (config) #airgroup disable
Disable mDNS AP VLAN Aggregation using CLI
To disable mDNS AP VLAN aggregation using the controller CLI: (host) (config) #ap system-profile <profile-name> no mcast-aggr

1068 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

mDNS Multicast Response Propagation
In the AirGroup solution, all mDNS packets are terminated on the controller. The AirGroup solution works as a unicast querier and responder on behalf of mDNS capable devices and eliminates the propagation of multicast mDNS traffic in the WLAN.
For some services, terminating the mDNS packets at the controller does not allow the initial advertisement to reach other devices. For example, the iChat or Messages Application uses mDNS response packet to announce the arrival of a new user. The new user entry does not reach the existing users if the announcement or response packet is not multicast. The exiting users get to know about the new user only after they send a periodic query.
mDNS multicast response propagation allows services to multicast the response packet. This allows the existing users to instantly see a new user when a new user logs in.
The mDNS response packet for iChat or Messages Application is multicast across all VLANs that are trunked in the controller except:
l If the VLAN is globally disallowed. l If the iChat service is disallowed for a VLAN.
In both scenarios, the mDNS response message is not propagated and:
l mDNS queries for iChat records from a disallowed VLAN are dropped. l mDNS responses are not propagated to a disallowed VLAN. l When an allowed VLAN is disallowed, users disappear from the buddy list of other users when they query
for the service next time. This may take a maximum of one hour. l When a disallowed VLAN is allowed, wildcard queries are sent to all users for discovery.
The AirGroup cache is updated with iChat records thus ensuring that the cache of the existing users is also updated. CPPM/CLI policies are not applied to iChat records because the mDNS response is multicast. The mDNS response messages are multicast whenever the status of a user changes and similar messages are also multicast.
The response for mDNS iChat queries is L2 unicast back to the sender from the AirGroup cache while the mDNS response packets are L3 multicast.
When the iChat service is disabled from enabled state, new messages are neither propagated nor responded until they query for the service again. After an hour, the existing users disappear because query and responses are not honored. When the iChat service is enabled, discovery packets are sent to determine all iChat users.
The performance of an iChat server is not the same as the performance of an AirGroup server. The number of iChat servers supported is less than the number of AirGroup servers supported.
Maximum Number of iChat Users
The maximum number of iChat users is limited to 2000. Each iChat user is an mDNS server and their announcement messages are L2 multicast. The following table lists the number of mDNS servers supported in different controller models:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1069

Table 238: Controller model and number of supported mDNS servers

Controller Model

Number of mDNS Servers

W-7240

10000

W-7220

7000

W-7210

5000

W-7205

2000

W-7030

1000

W-7024

600

W-7010

500

W-7005

300

W-6000

2500

W-3600

2000

W-3400

2000

W-3200

600

In a multi-controller deployment with AirGroup solution: l The local controller sends the response from an mDNS device for iChat service to other controllers in the
cluster. This is in addition to local controller performing L2 multicast of the message to all VLANs. l The corresponding controller multicasts the message to all the VLANs that are trunked in it. l When a user moves from one controller to another controller, two user entries exist in the user cache for
the same user until the user entry is deleted from the first controller. The two user entries exist because the IP address, which is part of the mDNS payload, changes when a user moves from one controller to another controller. If IP mobility is enabled, only one user entry exists because the user retains the IP address across the controllers.
Configuring mDNS Multicast Response Propagation
Use the following procedures to enable or disable mDNS multicast response propagation:
In the WebUI
To enable iChat using the controller WebUI: 1. Navigate to Configuration > Advanced Services > AirGroup. 2. Under Services, select the checkbox next to chat. 3. Click Enable. 4. Click Apply.

1070 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the CLI
To enable iChat using the controller WebUI: (host) (config) #airgroup service chat enable

Troubleshooting and Log Messages
Controller Troubleshooting Steps
Use the following procedure to prevent potential errors in a controller: 1. Execute the show airgroup internal-state statistics CLI command and ensure that the Sibyte
Messages Sent/Recv counters increment over a period of time. 2. Enable mDNS logs using the logging level debugging system process mdns command, and capture the
output of show log system all when the issue occurs. Review any obvious error print statements. 3. Save the output of show airgroup cache entries and show airgroup cppm entries and look for any
discrepancies.
ClearPass Guest Troubleshooting Steps
ClearPass Guest includes AirGroup-related events in the application log files. You can configure logging levels to provide debugging information. To show debugging information in event logs: 1. In ClearPass Guest, go to Administration > AirGroup Services and click the Configure AirGroup
Services command link. The Configure AirGroup Services form opens. 2. In the AirGroup Logging drop-down list, select either Debug--log debug information or Trace--log all
debug information. When one of these options is selected, debugging information is provided in the events log. 3. Click Save Configuration. For up-to-date information, see the ClearPass Guest Deployment Guide.
ClearPass Policy Manager Troubleshooting Steps
Monitoring and reporting services in ClearPass Policy Manager provide insight into system events and performance. To show incoming AirGroup requests from the controller: 1. In ClearPass Policy Manager, navigate to Monitoring > Live Monitoring > Access Tracker. The Access
Tracker list view opens. 2. Click an event's row to view details. The Summary tab of the Request Details view opens. Additional
details may be viewed on the Input, Output, or Alerts tabs, or you can click Show Logs to view logging details. For up-to-date information, see the ClearPass Policy Manager User Guide.
Log Messages
Display AirGroup logs by issuing the following commands in the controller CLI: l show log all l show log system all l show log user all l show log user-debug all

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1071

The log debug messages for the mDNS process are not enabled by default. To enable specific logging levels, use the following CLI commands in configuration mode: To enable high level mDNS debug messages: (host)(config) #logging level debugging system process mdns To enable mDNS packet processing messages: (host)(config) #logging level debugging system process mdns subcat messages To enable mDNS CLI configuration messages: (host)(config) #logging level debugging system process mdns subcat configuration To enable mDNS Auth and CPPM user messages: (host)(config) #logging level debugging user process mdns
Show Commands
Use the following show commands to view AirGroup configuration data and statistics in the controller:
Viewing AirGroup mDNS and DLNA Cache
show airgroup cache entries [mdns|dlna|static]
Viewing AirGroup mDNS and DLNA Statistics
show airgroup internal-state statistics [mdns|dlna]
Viewing AirGroup VLANs
(host) #show airgroup vlan
Viewing AirGroup Servers
Use the following command to view the AirGroup server (Apple TV, AirPrint Printer, Google ChromeCast, and so on) status in the controller: show airgroup servers [dlna|mdns] [verbose]
Viewing AirGroup Users
show airgroup users [mdns|dlna] [verbose]
Viewing Service Queries Blocked by AirGroup
This command displays the service ID that was queried but not available in the AirGroup service table. show airgroup blocked-queries [mdns|dlna]
Viewing Blocked Services
The airgroup service <servicename> disable command disables an AirGroup service by blocking the service IDs for that service. When you enable an AirGroup service, service IDs of that service are enabled automatically. To view the list of blocked services, use the following command: show airgroup blocked-service-id [mdns|dlna]
AirGroup Global Tokens
In an AirGroup network, AirGroup devices generate excess mDNS query and response packets. Using airgroup global-credits command, the AirGroup controller restricts these packets by assigning tokens. The controller processes these mDNS packets based on this token value. The controller rejects any packets beyond this token limit. The token renews every 15 seconds. The renewal interval is not a configurable parameter.

1072 | AirGroup

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the following example, the AirGroup controller restricts the number of query packets to 450 and response packets to 90 from AirGroup devices in a time frame of 15 seconds. (host)(config) #airgroup global-credits 450 90 The following command displays tokens assigned to query and response packets. It displays the current and user configured global tokens. (host) #show airgroup global-credits
For more information, see Dell Networking W-Series ArubaOS 6.4 Command-Line Interface Reference Guide.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

AirGroup | 1073

Chapter 41 Instant AP VPN Support

ArubaOS is the companion controller release for the Dell Instant release. This release provides an ability to terminate VPN and GRE tunnels from Instant AP and provide corporate connectivity to the branch Instant AP network. For more details, see the Dell Networking W-Series Instant Access Point User Guide . VPN features are ideal for: l enterprises with many branches that do not have a dedicated VPN connection to the Head Quarter. l branch offices that require multiple APs. l individuals working from home, connecting to the VPN. This new architecture and form factor seamlessly adds the survivability feature of Instant APs with the VPN connectivity of RAPs -- providing corporate connectivity to branches.
This documentation for this feature includes the following topics: l Overview on page 1074 l VPN Configuration on page 1078 l Viewing Branch Status on page 1079

Overview
This section provides a brief summary of the new features included in ArubaOS to support VPN termination from Instant AP.
Improved DHCP Pool Management
Instant AP (IAP) allows you to configure the DHCP address assignment for the branches connected to the corporate network through VPN. In distributed DHCP mode, ArubaOS 6.3 allows designated blocks of IP addresses for static IP users by excluding them from the DHCP scope. In addition, it allows creation of scope of any required size, thereby enabling more efficient utilization of IP address across branches. For detailed information on Distributed DHCP for IAP-VPN, see Dell Networking W-Series Instant Access Point User Guide.
Termination of Instant AP VPN Tunnels
Instant AP (IAP) has the ability to terminate VPN tunnels on controllers. The IAP cluster creates a tunnel from the Virtual Controller to aDell controller in your corporate office. The controller only acts as a VPN end-point and does not configure the IAP. For more information on how to create a VPN tunnel from Virtual Controller to aDell controller, see Dell Networking W-Series Instant Access Point User Guide.
Termination of IAP GRE Tunnels
IAPs have the ability to terminate GRE tunnels on controllers. The IAP cluster creates a tunnel from the Virtual Controller to the controller in your corporate office. The controller only acts as a GRE end-point and does not configure the IAP. For more information on how to create a GRE tunnel from Virtual Controller to the controller, see the Dell Networking W-Series Instant Access Point User Guide.
L2/L3 Network Mode Support
The Virtual Controller on an Instant AP enables different DHCP pools (various deployment models) in addition to allocating IP subnets to each branch. The following modes of DHCP server are supported:

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Instant AP VPN Support | 1074

l L2 Switching Mode: In this mode, Instant supports distributed L2 and centralized L2 switching modes of connection to corporate. When an Instant AP registers with the controller and has a L2 mode DHCP pool configured, the controller automatically adds the GRE or VPN tunnel associated to this IAP into the VLAN multicast table. This allows the clients connecting to this L2 mode VLAN to be part of the same L2 domain on controller.
l L3 Routing Mode: In this mode, Instant supports L3 routing mode of connection to corporate. The VC assigns an IP addresses from the configured subnet and forwards traffic to both corporate and noncorporate destinations. Instant AP takes care of routing on the subnet and also adds a route on the controller after the VPN tunnel is set up during the registration of the subnet. When the Instant AP registers with a L3 mode DHCP pool, the controller automatically adds a route to this DHCP subnet enabling routing of traffic from the corporate to clients on this VLAN in the branch.
Instant AP VPN Scalability Limits
ArubaOS provides enhancements to the scalability limits for the IAP VPN branches terminating on the controller. The following table provides the IAP VPN scalability information for various controller platforms:
Table 239: Instant AP VPN Scalability Limits

Platforms W-3200 W-3400 W-3600 W-6000M3 W-7210

Branches 1000 2000 8000 8000 8000

Routes 1000 2000 8000 8000 8000

L3 Mode Users N/A

NAT Users N/A

Total L2 Users 64000 64000 64000 64000 64000

W-7220 W-7240

16000 32000

16000 32000

128000 128000

l Branches--The number of IAP VPN branches that can be terminated on a given controller platform. l Routes--The number of L3 routes supported on the controller. l L3 mode and NAT mode users--The number of trusted users supported on the controller. There is no
scale impact on the controller. They are limited only by the number of clients supported per Instant AP. l L2 mode users--The number of L2 mode users are limited to128000 for W-7220 and W-7240 and 64000
across all other platforms.
Instant AP VPN OSPF Scaling
ArubaOS allows each IAP VPN to define a separate subnet derived from a corporate intranet pool to allow IAP VPN devices to work independently. For information on sample topology and configuration, see OSPFv2. To redistribute IAP VPN routes into the OSPF proces, use the following command :
(host)(config) # router ospf redistribute rapng-vpn To verify if the redistribution of the IAP VPN is enabled, use following command: (host) #show ip ospf redistribute

1075 | Instant AP VPN Support

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Redistribute RAPNG

To configure aggregate route for IAP VPN routes, use the following command:

(host) (config) # router ospf aggregate-route rapng-vpn

To view the aggregated routes for IAP VPN routes, use the following command:

(host) #show ip ospf rapng-vpn aggregate-routes RAPNG VPN aggregate routes -------------------------Prefix Mask Contributing routes Cost ------ ---- ------------------- ---201.201.200.0 255.255.252.0 5 268779624 100.100.2.0 255.255.255.0 1 10

To verify the details of configured aggregated route, use the following command:

(host) # show ip ospf rapng-vpn aggregated-routes <net> <mask> (host) #show ip ospf rapng-vpn aggregate-routes 100.100.2.0 255.255.255.0 Contributing routes of RAPNG VPN aggregate route -----------------------------------------------Prefix Mask Next-Hop Cost ------ ---- -------- ---100.100.2.64 255.255.255.224 5.5.0.10 10

To view all the redistributed routes:

(host) #show ip ospf database

OSPF Database Table

-------------------

Area ID LSA Type

Link ID

Adv Router

Age Seq#

Checksum

------- --------

-------

----------

--- ----

--------

0.0.0.15 ROUTER

9.9.9.9

9.9.9.9

159 0x80000016 0xee92

0.0.0.15 ROUTER

10.15.148.12 10.15.148.12 166 0x80000016 0x4c0d

0.0.0.15 NETWORK

10.15.148.12 10.15.148.12 167 0x80000001 0x9674

0.0.0.15 NSSA

12.12.2.0

9.9.9.9

29 0x80000003 0x7b54

0.0.0.15 NSSA

12.12.12.0

9.9.9.9

164 0x80000008 0x63a

0.0.0.15 NSSA

12.12.12.32 9.9.9.9

164 0x80000008 0x7b8

0.0.0.15 NSSA

50.40.40.0

9.9.9.9

164 0x80000007 0x8ed4

0.0.0.15 NSSA

51.41.41.128 9.9.9.9

164 0x80000007 0x68f6

0.0.0.15 NSSA

53.43.43.32 9.9.9.9

164 0x80000007 0x2633

0.0.0.15 NSSA

54.44.44.16 9.9.9.9

164 0x80000007 0x353

N/A

AS_EXTERNAL 12.12.2.0

9.9.9.9

29 0x80000003 0x8c06

N/A

AS_EXTERNAL 12.12.12.0

9.9.9.9

169 0x80000001 0x25e4

N/A

AS_EXTERNAL 12.12.12.32 9.9.9.9

169 0x80000001 0x2663

N/A

AS_EXTERNAL 50.40.40.0

9.9.9.9

169 0x80000001 0xab80

N/A

AS_EXTERNAL 51.41.41.128 9.9.9.9

169 0x80000001 0x85a2

N/A

AS_EXTERNAL 53.43.43.32 9.9.9.9

169 0x80000001 0x43de

N/A

AS_EXTERNAL 54.44.44.16 9.9.9.9

169 0x80000001 0x20fe

To verify if the redistributed routes are installed or not.

(host) #show ip route Codes: C - connected, O - OSPF, R - RIP, S - static M - mgmt, U - route usable, * - candidate default, V - RAPNG VPN Gateway of last resort is Imported from DHCP to network 0.0.0.0 at cost 10 Gateway of last resort is Imported from CELL to network 0.0.0.0 at cost 10 Gateway of last resort is Imported from PPPOE to network 0.0.0.0 at cost 10 Gateway of last resort is 10.15.148.254 to network 0.0.0.0 at cost 1 S* 0.0.0.0/0 [1/0] via 10.15.148.254* V 12.12.2.0/24 [10/0] ipsec map V 12.12.12.0/25 [10/0] ipsec map V 12.12.12.32/27 [10/0] ipsec map V 50.40.40.0/24 [10/0] ipsec map V 51.41.41.128/25 [10/0] ipsec map V 53.43.43.32/27 [10/0] ipsec map

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Instant AP VPN Support | 1076

V 54.44.44.16/28 [10/0] ipsec map C 9.9.9.0/24 is directly connected, VLAN9 C 10.15.148.0/24 is directly connected, VLAN1 C 43.43.43.0/24 is directly connected, VLAN132 C 42.42.42.0/24 is directly connected, VLAN123 C 44.44.44.0/24 is directly connected, VLAN125 C 182.82.82.12/32 is an ipsec map 10.15.149.69-182.82.82.12 C 182.82.82.14/32 is an ipsec map 10.17.87.126-182.82.82.14
Branch-ID Allocation
For branches deployed in distributed L3 and distributed L2 mode, the master AP in the branch and the controller should agree upon a subnet/IP addresses to be used for DHCP services in the branch. The process or protocol used by the master AP and the controller to determine the subnet/IP addresses used in a branch is called BID allocation. The BID allocation process is not essential for branches deployed in local or centralized L2 mode. The following are some of the key functions of the BID allocation process:
l Determines the IP addresses used in a branch for distributed L2 mode l Determines the subnet used in a branch for distributed L3 mode l Avoids IP address or subnet overlap (that is, avoids IP conflict) l Ensures that a branch is allocated the same subnet or range of IP addresses irrespective of which AP in the
branch becomes the master in the IAP cluster
Centralized BID Allocation
In Master-Local controller set-up, the Master controller runs the BID allocation algorithm and allocates BID to the branches terminating on it and to the Local controllers. The Master controller saves the BIDs in it's memory IAP database to avoid the collision of BID (per subnet) whereas the Local controller saves the BIDs only in it's in memory data structures. The IAP manager in Local controller forwards only the new register request (branch coming for the first time with BIDs as -1) message to the Master controller. For existing branch's register request, the Local controller tries to honor the requested BIDs first. The master and local communication is within the existing IPSec tunnel. The Master controller gets the register request and allocates BIDs using the BID allocation algorithm. Finally, the Master controller sends back the allocated BIDs to the Local controller and the Local controller updates its data structure and sends the response to the IAP.
General guidelines for upgrading from existing IAP-VPN release to ArubaOS 6.4:
1. Ensure that all the branches are upgraded to Instant 4.0. 2. Upgrade the data-center to ArubaOS 6.4.
If you have a Master-Local setup; upgrade the Master controller first and then the Local controller.
3. Ensure that always the IAP-VPN branches are configured using authorized tools like W-AirWave, else you must trust all branches or the required branch using the following command, iap trusted-branch-db allow-all or iap trusted-branch-db add mac-address<mac-address>
Instant version earlier than 4.0 also need the previous command to be executed for the controller to come up with ArubaOS 6.4.

1077 | Instant AP VPN Support

Dell Networking W-Series ArubaOS 6.4.x | User Guide

VPN Configuration
The following VPN configuration steps on the controller, enable IAPs to terminate their VPN connection on the controller:
Whitelist DB Configuration
Controller Whitelist DB
You can use the following CLI command to configure the whitelist DB if the controller is acting as the whitelist entry: (host) #whitelist-db rap add mac-address 00:11:22:33:44:55 ap-group test The ap-group parameter is not used for any configuration, but needs to be configured. The parameter can be any valid string. If an external whitelist is being used, the MAC address of the AP needs to be saved in the Radius server as a lower case entry without any delimiter.
External Whitelist DB
The external whitelist functionality enables you to configure the RADIUS server to use an external whitelist for authentication of MAC addresses of RAPs. If you are using Windows 2003 server, perform the following steps to configure external whitelist on it. There are equivalent steps available for Windows Server 2008 and other RADIUS servers. 1. Add the MAC addresses for all the RAPs in the Active Directory of the Radius server:
a. Open the Active Directory and Computers window, add a new user and specify the MAC address (without the colon delimiter) of the RAP for the user name and password.
b. Right-click the user that you have just created and click Properties. c. In the Dial-in tab, select Allow access in the Remote Access Permission section and click OK. d. Repeat Step a through Step b for all RAPs. 2. Define the remote access policy in the Internet Authentication Service: a. In the Internet Authentication Service window, select Remote Access Policies. b. Launch the wizard to configure a new remote access policy. c. Define filters and select select grant remote access permission in the Permissions window. d. Right-click the policy that you have just created and select Properties. e. In the Settings tab, select the policy condition, and Edit Profile.... f. In the Advanced tab, select Vendor Specific, and click Add to add new vendor specific attributes. g. Add new vendor specific attributes and click OK. h. In the IP tab, provide the IP address of the RAP and click OK.
VPN Local Pool Configuration
The VPN local pool is used to assign an IP Address to the IAP after successful XAUTH VPN. (host) # ip local pool "rapngpool" <startip> <endip>
Role Assignment for the Authenticated IAPs
Define a role that includes a source NAT rule to allow connections to the RADIUS server and for the Dynamic Radius Proxy in the IAP to work. This role is assigned to IAPs after successful authentication. (host) (config) #ip access-list session iaprole (host) (config-sess-iaprole) #any host <radius-server-ip> any src-nat (host) (config-sess-iaprole) #any any any permit (host) (config-sess-iaprole) #!

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Instant AP VPN Support | 1078

(host) (config) #user-role iaprole (host) (config-role) #session-acl iaprole
VPN Profile Configuration
The VPN profile configuration defines the server used to authenticate the IAP (internal or an external server) and the role assigned to the IAP after successful authentication. (host) (config) #aaa authentication vpn default-iap (host) (VPN Authentication Profile "default-iap") #server-group default (host) (VPN Authentication Profile "default-iap") #default-role iaprole
The default role parameter of the aaa authentication vpn command requires Policy Enforcement Firewall for VPN users (PEFV) license.
By default, the controller uses the default IAP role. If the administrator changes the IAP role name when the IAP's status is UP, then the controller or the IAP must be rebooted.
For more information on VPN profile configuration, see the VPN Configuration chapter of the Dell Networking W-Series Instant Access Point User Guide.

Viewing Branch Status
To view the details of the branch information connected to the controller, execute the show iap table command. Sample Configuration This example shows the details of the branches connected to the controller: (host) #show iap table long

IAP Branch Table

----------------

Name

VC MAC Address

----

--------------

Tokyo-CB:D3:16 6c:f3:7f:cc:42:f8

Paris-CB:D3:16 6c:f3:7f:cc:3d:04

LA

6c:f3:7f:cc:42:25

Munich

d8:c7:c8:cb:d3:16

London-c0:e1

6c:f3:7f:c0:e1:b1

Instant-CB:D3 6c:f3:7f:cc:42:1e

Delhi

6c:f3:7f:cc:42:ca

Singapore

6c:f3:7f:cc:42:cb

Status -----DOWN UP UP DOWN UP DOWN DOWN UP

Inner IP -------0.0.0.0 10.15.207.140 10.15.207.111 0.0.0.0 10.15.207.120 0.0.0.0 0.0.0.0 10.15.207.122

Assigned Subnet Assigned Vlan --------------- ------------10.15.206.99/29 2 10.15.206.24/29 2 10.15.206.64/29 2
10.15.206.120/29 2

Key --b3c65c... b3c65c... b3c65c... a2a65c... b3c65c... b3c65c... b3c65c... b3c65c...

Bid(Subnet Name) ----------------
2(10.15.205.0-10.15.205.250,5),1(10.15.206.1-10.15.206.252,5) 0 7(10.15.205.0-10.15.205.250,5),8(10.15.206.1-10.15.206.252,5)
1(10.15.205.0-10.15.205.250,5),2(10.15.206.1-10.15.206.252,5) 14(10.15.205.0-10.15.205.250,5),15(10.15.206.1-10.15.206.252,5)

The output of this command includes the following parameters:

1079 | Instant AP VPN Support

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 240: IAP Table Parameters

Parameter

Description

Name

Displays the name of the branch.

VC MAC Address

Displays the MAC address of the Virtual Controller of the branch.

Status

Displays the current status of the branch (UP/DOWN).

Inner IP

Displays the internal VPN IP of the branch.

Assigned Subnet Displays the subnet mask assigned to the branch.

Assigned Vlan

Displays the VLAN ID assigned to the branch.

Key

Displays the key for the branch, which is unique to each branch.

Bid(Subnet Name)

Displays the Branch ID (BID) of the subnet.
l In the example above, the controller displays bid-per-subnet-per-branch i.e., for "LA" branch, BID "2" for the ip-range "10.15.205.0-10.15.205.250" with client count per branch "5"). If a branch has multiple subnets, it can have multiple BIDs.
l Branches that are in UP state and do not have a Bid(Subnet Name) means that the IAP is connected to a controller which did not assign any bid for any subnet. In the above example, "Paris-CB:D3:16" branch is UP and does not have a Bid (Subnet Name) information. This means that either the IAP is connected to a backup controller or connected to a primary controller without any distributed L2 or L3 subnets.
For more information on bid-per-subnet-per-branch and distributed L2 and L3 subnets, see the DHCP Configuration chapter of the Dell Instant Access Point 6.2.1.03.3 User Guide.

Executing the show iap table command does not display the Key and Bid(Subnet Name) parameters.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Instant AP VPN Support | 1080

Chapter 42 W-600 Series Controllers

The W-600 Series Controller is designed for compact, cost-effective "all-in-one" networking solutions. The W600 Series includes a firewall, wireless LAN controller, Ethernet switch with PoE+, IP router, site-to-site VPN edge device, file server, and print server.
The W-600 Series is an enterprise-class, wireless LAN controller that connects, controls, and integrates wireless APs and Air Monitors (AMs) into a wired LAN system. Table 241 lists some of the hardware features by the numbers.

Table 241: W-600 Series Controller by the Numbers

Controller

USB Ports

Maximum External APs

W-620

1

8

W-650

4

16

Remote APs 8 16

Topics in this chapter include: l Connecting with a USB Cellular Modems on page 1081 l Configuring a Supported USB Modem on page 1082 l Configuring a New USB Modem on page 1083

Connecting with a USB Cellular Modems
USB Cellular Modems are supported via a USB port. ArubaOS supports several EVDO (Evolution Data Optimized, up to 3.1 Mbps, CDMA) and 3G HSPA (High-Speed Packet Access, 3G data service), and 4G LTE (Fourth Generation, Long Term Evolution) modems. The 3G HSPA is provided by AT&T in the United States and numerous other 3G providers worldwide.
How it Works
Plug the USB Cellular Modem into the USB port of the W-600 Series controller. The USB Cellular Modem is automatically detected and negotiates a PPP IP address. If the modem fails to obtain a PPP IP address within 45 seconds, the controller ignores the modem's presence, and boots as if the modem is not present.
Switching Modes
Many of the newer modems contain multiple USB devices; creating a very elegant plug-n-play solution. When your USB Cellular Modem is first powered on, a storage device is registered. This storage device contains the software driver/executable necessary to install and operate the modem.
Once the software installation is complete, the modem must mode-switch from a storage device to a registered modem device. Mode-switching varies by manufacturer. For example, The Novatel modem mode-switches via a SCSI eject command; the Huawei modem mode-switches via a SCSI rezero command, while the Sierra modem mode-switches via a specific USB command. Once the mode-switching is complete, the modem automatically registers itself.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

W-600 Series Controllers | 1081

The controller can dial (via the modem) your service provider to initiate a PPP session. During the boot sequence, the controller issues your device's mode-switching command, every few seconds, until the PPP link connects.
Finding USB Modem Commands
To support the USB cellular modems on the W-600 Series, the cellular profile <profile> and uplink commands are available at the command line interface. For more information, refer to ArubaOS 6.4.x Command-Line Interface. You can view connected USB cellular devices using the Controller > Universal Serial Bus > USB Devices in the WebUI. Navigating to this page is the equivalent of executing the show usb command at the command prompt.
Uplink Manager
Access the Uplink Manager feature from the WebUI Configuration tab. Navigate to this feature using Uplink > Uplink Manager. You can enable/disable the uplink to overwrite cellular and wired uplink priority. The corresponding commands are:
(host) (config)# uplink [enable | disable] (host) (config)# uplink [cellular | wired] priority [x]
Cellular Profile
The Cellular Profile tab allows you to add/modify/delete one or more cellular profiles. The WebUI screen for Cellular Profile is divided into the Cellular Profile Table (the top portion) and the Modify Cellular Profile (the bottom portion). When a cellular profile is selected for modification the Modify Cellular Profile screen is displayed. All changes are entered into the buffer until the Apply button is executed.
Dialer Group
Use the Dialer Group command to configure EVDO devices that require specific input for the initial string (initstring) and dial string. When adding or modifying an existing dialer group, the Modify Dialer screen is displayed and the WebUI executes the following commands:
(host) (config-cellular profile_name)# dialer group <name> init-string <string> (host) (config-cellular profile_name)# dialer group <name> dial-string <string>
Configuring a Supported USB Modem
If your USB Modem is a validated modem, then no configuration is needed. Just follow the "plug and play" steps below. 1. Insert the USB Modem into an open USB port. 2. From the controller command-line interface, issue the show usb command to the modem that is detected.
(host) (config-cellular new_modem)# show usb
3. If your modem is not recognized (such as "type is unknown", "no matching profile", or "device not ready"), use the show usb verbose command to verify your modem is listed. (host) #show usb verbose
4. Issue the show uplink command to verify the modem as an active status, and is registered with the Uplink Manager.

1082 | W-600 Series Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Cellular uplinks have a lower priority than wired links by default. You can change the default by changing the profile-specific priority or by changing the default cell priority. (host) (config) #cellular priority <prior>
5. Check the modem dialing status. The connection may take up to a 45 seconds to establish. To see the connection progress, execute the show uplink connection uplink id command.
6. Verify the connection is established and IP addressed is programmed. l Once the cellular link state is Connected, you can find the PPP dynamic entries by executing the show uplink connection id command l The IP address can be found using the show ip interface brief command l The Gateway can be found using the show ip route command l The DNS entries can be found using the show ip domain-name command
Configuring a New USB Modem
Cellular modems must be activated before they can communicate on the cellular network. Typically, the activation is done by the carrier. Some carriers use a proprietary PC client. In all cases, ensure that your modem works on your PC before using it on the W-600 Series controller.
Verify your modem is activated and works with your Microsoft Windows or Apple Mac computers.
Each time a USB device is inserted, Linux assigns it a new USB address. This is true even if the same device is reinserted. Modem ports are organized under their individual addresses. For example, ttyUSB0 at address 3 is separate than ttyUSB0 at address 7. The address is displayed when you execute the commands, show usb and show usb verbose (the Dev# field).
Configuring the Profile and Modem Driver
1. Insert the USB Modem into an open USB port. 2. Verify that the modem is detected using the show usb command. 3. If your modem is not recognized (such as "type is unknown", "no matching profile", or "device not ready"),
use the show usb verbose command to verify your modem is listed. 4. From the command-line interface, issue the cellular profile <profile> command to create a cellular profile
and import the identifiers. The Dialer, TTY, and Driver fields are the new profile defaults. 5. Configure the modem driver.
The default option driver is a catch-all for cellular modems. Nearly all cards use this driver and support for new modems are added here. Once option driver is configured to work with this device, it recognizes the modem and exposes its ports. If you get entries similar to the example below, it means the driver does not work with these ports. Try the other drivers and see if they pick up the device. Airprime is the reliable catch-all driver, Sierra is for certain Sierra cards, and cdc-acm is a legacy abstract control modem driver. Your goal is to assign a driver for the unclaimed (none) interfaces (If#). (host) #show usb verbose ... I: If#= 0 Alt=0 # EPs= 3 Cls=ff (vend.) Sub=ff Prot=ff Driver=(none) I: If#= 1 Alt=0 # EPs= 2 Cls=ff (vend.) Sub=ff Prot=ff Driver=(none) If no option driver appears or only storage interfaces appear, then the modem must be switched to data mode. For more information, see Switching Modes on page 1081

Dell Networking W-Series ArubaOS 6.4.x | User Guide

W-600 Series Controllers | 1083

Configuring the TTY Port
1. View the exposed TTY ports by executing the show usb ports 13 command. (host) (config-cellular new_card)# show usb ports 13 ttyUSB0 ttyUSB1 ttyUSB2 ttyUSB3 In the example above, the command reveals four exposed TTY ports. One is the modem port, while the other ports are for GPS, real-time statistics, or diagnostics. If the command does not reveal any ports or if only storage devices (such as `sr0') appear, then the device must be switched to data mode before proceeding. For more information, see Switching Modes on page 1081.
2. Execute the test AT command to determine the correct modem port. (host) (support) #show usb test 16 ttyUSB0 AT OK TTY port responded to modem AT commands In the example above, the TTY port responds with an OK. This indicates that ttyUSB0 is a valid modem port. There may be more than one modem port; you can continue to send AT commands to determine which ports are modem ports. If the port is not a valid modem port, a time out error is generated as shown in the example below. (host) (support) #show usb test 16 ttyUSB1 Error: Timed out while waiting for modem to respond to AT commands In the following example, the TTY port does not exist, or is busy with a previous PPP session. (host) (support) #show usb test 16 ttyUSB4 Error: Port I/O error. TTY port usb/16/ttyUSB4 inaccessible Once you find one (or more) modem TTY port, configure it in the cellular profile and test the port.
Testing the TTY Port
After your TTY port is correctly configured, the port is in the 'Device Ready' state. This state indicates that the port has passed the diagnostic test and is ready.
You can also run extended diagnostics to displays more information about the modem.
Not all modems support the extended AT command set. If the modem hangs after sending an extended AT command; removing the device and then re-inserting it usually fixes the problem
The AT+CSQ command queries is the modem's current signal strength. The first number represents the signal ranging from 1 (poor) to 33 (excellent).
Selecting the Dialer Profile
The phone number, user name, and password (if any) are set in the dialer setting. In the United States, AT&T and T-Mobile use the 'gsm_us' profile, while Sprint and Verizon use the 'evdo_us' profile. User names and passwords are not typically used by U.S. carriers, but they may be required by International carriers.
Choose the dialer group that matches your carrier. If one doesn't exist, create a new dialer group with information from your carrier.
The ATD, in the Dial String column specifies the number to dial, and is typically the same among respective CDMA/GSM carriers. The information under the Init String column typically just resets the modem to the factory default state, but may contain carrier specific options. You can often find these settings in online forums or from your ISP.

1084 | W-600 Series Controllers

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Linux Support
The Internet is a great place to research Linux support for your modem. Chances are someone already got it working on their system and their configuration can be leveraged. The following sites provide useful information:
l evdoforums.com/ l ubuntuforums.org l linux.com/forums l kenkinder.com/

Dell Networking W-Series ArubaOS 6.4.x | User Guide

W-600 Series Controllers | 1085

Chapter 43 External Services Interface
The External Services Interface (ESI) provides an open interface that is used to integrate security solutions that solve interior network problems such as viruses, worms, spyware, and corporate compliance. ESI allows selective redirection of traffic to external service appliances such as anti-virus gateways, content filters, and intrusion detection systems. When "interesting" traffic is detected by these external devices, it can be dropped, logged, modified, or transformed according to the rules of the device. ESI also permits configuration of different server groups--with each group potentially performing a different action on the traffic. You can configure ESI to do one or more of the following for each group: l Redirect specified types of traffic to the server l Perform health checks on each of the servers in the group l Perform per-session load balancing between the servers in each group l Provide an interface for the server to return information about the client that can place the client in special
roles such as "quarantine"
ESI cannot function or send information across an IPSec tunnel.
ESI also provides the ESI syslog parser, which is a mechanism for interpreting syslog messages from third-party appliances such as anti-virus gateways, content filters, and intrusion detection systems. The ESI syslog parser is a generic syslog parser that accepts syslog messages from external devices, processes them according to userdefined rules, and then takes configurable actions on system users. Topics in this chapter include: l Sample ESI Topology on page 1086 l Understanding the ESI Syslog Parser on page 1088 l Configuring ESI on page 1091 l Sample Route-Mode ESI Topology on page 1098 l Sample NAT-mode ESI Topology on page 1102 l Understanding Basic Regular Expression (BRE) Syntax on page 1107
The ESI feature requires that the Policy Enforcement Firewall Next Generation (PEFNG) license is installed on the controller.
Sample ESI Topology
In the example shown in this section, ESI is used to provide an interface to the AntiVirusFirewall (AVF) server device for providing virus inspection services. An AVF server device is one of many different types of services supported in the ESI.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

External Services Interface | 1086

Figure 230 ESI-Fortinet Topology

In the ESI­Fortnet topology, the clients connect to access points (both wireless and wired). The wired access points tunnel all traffic back to the controller over the existing network.
The controller receives the traffic and redirects relevant traffic (including but not limited to all HTTP/HTTPS and email protocols such as SMTP and POP3) to the AVF server device to provide services such as anti-virus scanning, email scanning, web content inspection, etc. This traffic is redirected on the "untrusted" interface between the controller and the AVF server device. The controller also redirects the traffic intended for the clients coming from either the Internet or the internal network. This traffic is redirected on the "trusted" interface between the controller and the AVF server device. The controller forwards all other traffic (for which the AVF server does not perform any of the required operations such as AV scanning). An example of such traffic would be database traffic running from a client to an internal server.
The controller can also be configured to redirect traffic only from clients in a particular role such as "guest" or "non-remediated client" to the AVF server device. This might be done to reduce the load on the AVF server device if there is a different mechanism such as the Dell-Sygate integrated solution to enforce client policies on the clients that are under the control of the IT department. These policies can be used to ensure that an antivirus agent runs on the clients and the client can get access to the network only if this agent reports a "healthy" status for the client. Refer to the paper (available from Sygate) on Sygate integrated solutions for more details on this solution.
The controller is also capable of load balancing between multiple external server appliances. This provides more scalability as well as redundancy by using multiple external server appliances. Also, the controller can be configured to have multiple groups of external server devices and different kinds of traffic can be redirected to different groups of devices with load balancing occurring within each group (see Figure 231 for an example).

1087 | External Services Interface

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 231 Load Balancing Groups

Understanding the ESI Syslog Parser
The ESI syslog parser adds a UNIX-style regular expression engine for parsing relevant fields in messages from third-party appliances such as anti-virus gateways, content filters, and intrusion detection systems.
The user creates a list of rules that identify the type of message, the username to which this message pertains, and the action to be taken when there is a match on the condition.
ESI Parser Domains
The ESI servers are configured into ESI parser domains (see Figure 232) to which the rules will be applied. This condition ensures that only messages coming from configured ESI parser domains are accepted, and reduces the number of rules that must be examined before a match is detected (Syslog Parser Rules on page 1090). messages.When a syslog message is received, it is checked against the list of defined ESI servers. If a server match is found, the message is then tested against the list of predefined rules.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External Services Interface | 1088

Figure 232 ESI Parser Domains
The ESI syslog parser begins with a list of configured IP interfaces which listen for ESI messages. When a syslog message is received, it is checked against the list of defined ESI servers. If a server match is found, the message is then tested against the list of predefined rules. Within the rule-checking process, the incoming message is checked against the list of rules to search first for a condition match (see Syslog Parser Rules on page 1090). If a condition match is made, and the user name can be extracted from the syslog message, the resulting user action is processed by first attempting to look up the user in the local user table. If the user is found, the appropriate action is taken on the user. The default behavior is to look for users only on the local controller. If the user is not found, the event is meaningless and is ignored. This is the typical situation when a single controller is connected to a dedicated ESI server.
Peer Controllers
As an alternative, consider a topology where multiple controllers share one or more ESI servers. Figure 233 ESI Peer Controllers

In this scenario, several controllers (master and local) are defined in the same syslog parser domain to act as peers. From the standpoint of the ESI servers, because there is no accurate way of determining from which

1089 | External Services Interface

Dell Networking W-Series ArubaOS 6.4.x | User Guide

controller a given user came. Thus, the event is flooded out to all controllers defined as peers within this ESI parser domain. The corresponding controller holding the user entry acts on the event, while other controllers ignore the event.
Syslog Parser Rules
The user creates an ESI rule by using characters and special operators to specify a pattern (regular expression) that uniquely identifies a certain amount of text within a syslog message. (Regular expression syntax is described in Understanding Basic Regular Expression (BRE) Syntax on page 1107.) This "condition" defines the type of message and the ESI domain to which this message pertains. The rule contains three major fields: l Condition: The pattern that uniquely identifies the syslog message type. l User: The username identifier. It can be in the form of a name, MAC address, or IP address. l Action: The action to take when a rule match occurs. Once a condition match has been made, no further rule-matching will be made. For the rule that matched, only one action can be defined. After a condition match has been made, the message is parsed for the user information. This is done by specifying the target region with the regular expression (REGEX) regex() block syntax. This syntax generates two blocks: The first block is the matched expression; the second block contains the value inside the parentheses. For username matching, the focus is on the second block, as it contains the username.
Condition Pattern Matching
The following description uses the Fortigate virus syslog message format as an example to describe condition pattern matching. The Fortigate virus syslog message takes the form: Sep 26 18:30:02 log_id=0100030101 type=virus subtype=infected src=1.2.3.4
This message example contains the Fortigate virus log ID number 0100030101 ("log_id=0100030101"), which can be used as the condition--the pattern that uniquely identifies this syslog message. The parser expression that matches this condition is "log_id=0100030101". This is a narrow match on the specific log ID number shown in the message, or "log_id=[0­9]{10}[ ]" ,which is a regular expression that matches any Fortigate log entry with a ten-digit log ID followed by a space.
User Pattern Matching
To extract the user identifier in the example Fortigate virus message shown above ("src=1.2.3.4"), use the following expression, "src=(.*)[ ]" to parse the user information contained between the parentheses. The () block specifies where the username will be extracted. Only the first block will be processed. More examples: Given a message wherein the username is a MAC address: Sep 26 18:30:02 log_id=0100030101 type=virus subtype=infected mac 00:aa:bb:cc:dd:00
The expression "mac[ ](.{17})" will match "mac 00:aa:bb:cc:dd:00" in the example message. Given a message wherein the username is a user name: Sep 26 18:30:02 log_id=0100030101 type=virus subtype=infected user<johndoe>
The expression "user<(.*)>" will match "user<johndoe>" in the example message.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External Services Interface | 1090

Configuring ESI
You can use the following interfaces to configure and manage ESI and ESI syslog parser behavior:
l The Web user interface (WebUI), which is accessible through a standard Web browser from a remote management console or workstation.
l The command line interface (CLI), which is accessible from a local console device connected to the serial port on the controller or through a Telnet or Secure Shell (SSH) connection from a remote management console or workstation.
By default, you can access the CLI only from the serial port or from an SSH session. To use the CLI in a Telnet session, you must explicitly enable Telnet on the controller. The general configuration descriptions in the following sections include both the WebUI pages and the CLI configuration commands. The configuration overview section is followed by several examples that show specific configuration procedures.
In general, there are three ESI configuration "phases" on the controller as a part of the solution:
l The first phase configures the ESI ping health-check method, servers, and server groups.The term server here refers to external server devices, for example, an AVF.
l The second phase configures the redirection policies instructing the controller how to redirect the different types of traffic to different server groups.
l The final phase configures the ESI syslog parser domains and the rules that interpret and act on syslog message contents.
The procedures shown in the following sections are general descriptions. Your application might be broader or narrower than this example, but the same general operations apply.

Configuring Health-Check Method, Groups, and Servers
To configure the ESI health-check method, servers, and server groups, navigate to the Configuration > Advanced Services > External Services view on the WebUI.
In the WebUI
1. Navigate to the Configuration > Advanced Services > External Services page. 2. Click Add in the Health Check Configuration section.
(To change an existing profile, click Edit.) 3. Provide the following details:
a. Enter a Profile Name. b. Frequency (secs)--Indicates how often the controller checks to see if the server is up and running.
Default: 5 seconds. c. Timeout (secs)--Indicates the number of seconds the controller waits for a response to its health
check query before marking the health check as failed. Default: 2 seconds. d. Retry count--Is the number of failed health checks after which the controller marks the server as being
down. Default: 2. 4. Click Done. 5. Click Apply.
In the CLI
esi ping profile_name frequency seconds retry-count count timeout seconds

1091 | External Services Interface

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Defining the ESI Server
The following sections describe how to configure an ESI server using the WebUI and CLI.
In the WebUI
1. Navigate to the Configuration > Advanced Services > External Services page on the WebUI. 2. Click Add in the External Servers section. 3. Provide the following details:
a. Server Name. b. Server Group. Use the drop-down list to assign this server to a group from the existing configured
groups. c. Server Mode. Use the drop-down list to choose the mode (bridge, nat, or route) your topology requires.
Refer to the description above to understand the differences between these modes. For routed mode, enter the Trusted IP Address (the IP address of the trusted interface on the external server device) and the Untrusted IP Address (the IP address of the untrusted interface on the external server device). (You can also choose to enable a health check on either or both of these interfaces.) For bridged mode, enter the Trusted Port number (the port connected to the trusted side of the ESI server) and the Untrusted Port number (the port connected to the untrusted side of the ESI server). For NAT mode, enter the Trusted IP Address (the trusted interface on the external server) and the NAT Destination Port number (the port a packet is redirected to rather than the original destination port in the packet). You can also choose to enable a health check on the trusted IP address interface. 4. Click Done. 5. Click Apply.
In the CLI
esi server server_identity dport destination_tcp/udp_port mode {bridge | nat | route} trusted-ip-addr ip-addr [health-check] trusted-port slot/port untrusted-ip-addr ip-addr [health-check] untrusted-port slot/port
Defining the ESI Server Group
The following sections describe how to configure an ESI server group using the WebUI and CLI.
In the WebUI
1. Navigate to the Configuration > Advanced Services > External Services page. 2. Click Add in the Server Groups section.
(To change an existing group, click Edit.) 3. Provide the following details:
a. Enter a Group Name. b. In the drop-down list, select a health check profile. 4. Click Done. 5. Click Apply.
In the CLI
esi group name ping profile_name

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External Services Interface | 1092

server server_identity
Policies and User Role
The following sections describe how to configure the redirection policies and user role using the WebUI and CLI.
In the WebUI
1. To configure user roles to redirect the required traffic to the server(s), navigate to the Configuration > Access Control > User Roles view.
2. To add a new role, click Add. To change an existing role, click Edit for the firewall policy to be changed. The WebUI displays the User Roles tab on top.
3. Role Name. Enter the name for the role. 4. To add a policy for the new role, click Add in the Firewall Policies section. The WebUI expands the Firewall
Policies section. Choose from existing configured policies, create a new policy based on existing policies, or create a new policy. a. If you elect to create a new policy, click on the radio button for Create New Policy and then click
Create. The WebUI displays the Policies tab. b. In the Policies tab:
Policy Name. Provide the policy name and select the IPv4 Session policy type from the drop-down list. The WebUI expands the Policies tab. c. In the drop-down lists, choose parameters such as source, destination, service in the same way as other firewall policy rules. For certain choices, the WebUI expands and adds drop-down lists. d. In the Action drop-down menu, select the redirect to ESI group option. e. In the Action drop-down menu, select the appropriate ESI group. f. Select the traffic direction. Forward refers to the direction of traffic from the (untrusted) client or user to the (trusted) server (such as the HTTP server or email server). g. To add this rule to the policy, click Add. h. Repeat the steps to configure additional rules. i. Click Done to return to the User Roles tab. The WebUI returns to the User Roles tab. 5. Click Apply. 6. Refer to Roles and Policies on page 438, for directions on how to apply a policy to a user role.
In the CLI
ip access-list session policy any any any redirect esi-group group direction both blacklist //For any incoming traffic, going to any destination, //redirect the traffic to servers in the specified ESI group. any any any permit //For everything else, allow the traffic to flow normally.
user-role role access-list {eth | mac | session} bandwidth-contract name captive-portal name dialer name pool {l2tp | pptp} reauthentication-interval minutes session-acl name

1093 | External Services Interface

Dell Networking W-Series ArubaOS 6.4.x | User Guide

vlan vlan_id
ESI Syslog Parser Domains and Rules
To configure the ESI syslog parser, navigate to the Configuration > Advanced Services > External Services view on the WebUI.The following sections describe how to manage syslog parser domains using the WebUI and CLI.
In the WebUI
Click on the Syslog Parser Domains tab to display the Syslog Parser Domains view. This view lists all the domains by domain name and server IP address, and includes a list of peer controllers (when peer controllers have been configured--as described in Understanding the ESI Syslog Parser on page 1088).
Adding a new syslog parser domain 1. Click Add in the Syslog Parser Domains section. The system displays the add domain view. 2. In the Domain Name text box, type the name of the domain to be added. 3. In the Server IP Address text box, type a valid IP address.
You must ensure that you type a valid IP address, because the IP address you type is not automatically validated against the list of external servers that has been configured.
4. Click Add. 5. Click Apply.
Deleting an existing syslog parser domain 1. Identify the target parser domain in the list shown in the Domain section of the Syslog Parser Domains
view. 2. Click Delete on the same row in the Actions column.
Editing an existing syslog parser domain 1. Identify the target parser domain in the list shown in the Syslog Parser Domains view .(see In the WebUI
on page 1094) 2. Click Edit on the same row in the Actions column.The system displays the edit domain view.
You cannot modify the domain name when editing a parser domain.
3. To delete a server from the selected domain, highlight the server IP address and click Delete, then click Apply to commit the change.
4. To add a server or a peer controller to the selected domain, type the server IP address into the text box next to the Add button, click Add, then click Apply to commit the change, or click Cancel to discard the changes you made and exit the parser domain editing process.
When you make a change in the domain, you can click the View Commands link in the lower right corner of the window to see the CLI command that corresponds to the edit action you performed.
In the CLI
Use these CLI commands to manage syslog parser domains.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External Services Interface | 1094

Adding a new syslog parser domain esi parser domain name
peer peer-ip server ipaddr
Showing ESI syslog parser domain information show esi parser domains
Deleting an existing syslog parser domain no esi parser domain name
Editing an existing syslog parser domain esi parser domain name
no peer peer-ip server ipaddr
Managing Syslog Parser Rules
The following sections describe how to manage syslog parser rules using the WebUI and CLI.
In the WebUI
Click on the Syslog Parser Rules tab to display the Syslog Parser Rules view.This view displays a table of rules with the following columns: l Name-- rule name l Ena--where "y" indicates the rule is enabled and "n" indicates the rule is disabled (not enabled) l Condition--Match condition (a regular expression) l Match--Match type (IP address, MAC address, or user) l User--Match pattern (a regular expression) l Set--Set type (blacklist or role) l Value--Set value (role name) l Domain--Parser domain to which this rule is to be applied l Actions--The actions that can be performed on each rule.
Adding a new parser rule To add a new syslog parser rule: 1. Click Add in the Syslog Parser Rules view. The system displays the new rule view. 1. In the Rule Name text box, type the name of the rule you want to add. 2. Click the Enable checkbox to enable the rule. 3. In the Condition Pattern text box, type the regular expression to be used as the condition pattern.
For example, "log_id=[0­9]{10}[ ]" to search for and match a 10-digit string preceded by "log_id=" and followed by one space. 4. In the drop-down Match list, use the drop-down menu to select the match type (ipaddr, mac, or user). 5. In the Match Pattern text box, type the regular expression to be used as the match pattern. For example, if you selected "mac" as the match type, type the regular expression to be used as the match pattern. You could use "mac[ ](.{17})" to search for and match a 17-character MAC address preceded by the word "mac" plus one space. 6. In the drop-down Set list, select the set type (blacklist or role).

1095 | External Services Interface

Dell Networking W-Series ArubaOS 6.4.x | User Guide

When you select role as the Set type, the system displays a second drop-down list. Click the list to display the possible choices and select the appropriate role value. Validation on the entered value will be based on the Set selection. 7. In the drop-down Parser Group list, select one of the configured parser domain names.
Deleting a syslog parser rule To delete an existing syslog parser rule: 1. Identify the target parser rule in the list shown in the Syslog Parser Rules view. 2. Click Delete on the same row in the Actions column.
Editing an existing syslog parser rule To change an existing syslog parser rule: 1. Identify the target parser rule in the list shown in the Syslog Parser Rules view. 2. Click Edit on the same row in the Actions column. The system displays the attributes for the selected rule
You cannot modify the rule name when editing a parser rule.

3. Change the other rule attributes as required: a. Click the Enable checkbox to enable the rule. b. In the Condition Pattern text box, type the regular expression to be used as the condition pattern. c. In the drop-down Match list, select the match type (ipaddr, mac, or user). d. In the Match Pattern text box, type the regular expression to be used as the match pattern. e. In the drop-down Set list, select the set type (blacklist or role). f. When you select role as the Set type, the system displays a second drop-down list. Click the list to display the possible choices and select the appropriate role value. Validation on the entered value will be based on the Set selection. g. In the drop-down Parser Group list, select one of the configured parser domain names.
At this point, you can test the rule you just edited by using the Test section of the edit rule view. You can also test rules outside the add or edit processes by using the rule test in the Syslog Parser Test view (accessed from the External Services page by clicking the Syslog Parser Test tab, described in Testing a Parser Rule on page 1096.
4. Click Apply to apply the configuration changes.
Testing a Parser Rule You can test or validate enabled Syslog Parser rules against a sample syslog message, or against a syslog message file containing multiple syslog messages. Access the parser rules test from the External Services page by clicking the Syslog Parser Test tab, which displays the Syslog Parser Rule Test view. To test against a sample syslog message:
a. In the drop-down Test Type list, select Syslog message as the test source type. b. In the Message text box, type the syslog message text. c. Click Test to start the test.
The test results are displayed in a box in the area below the Test button. The test results contain information about the matching rule and match pattern. l To test against a syslog message file: a. In the drop-down Test Type list, select Syslog file as the test type.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External Services Interface | 1096

b. In the Filename text box, type the syslog file name. c. Click Test to start the test.
The test results are displayed in a box in the area below the Test button. The test results contain information about the matching rule and match pattern.
In the CLI
Use these CLI commands to manage syslog parser rules.
Adding a new parser rule esi parser rule rule-name
condition expression domain name enable match {ipaddr expression | mac expression | user expression} position position set {blacklist | role role}
Showing ESI syslog parser rule information show esi parser rules
Deleting a syslog parser rule no esi parser rule rule-name
Editing an existing syslog parser rule esi parser rule rule-name
condition expression domain name enable match {ipaddr expression | mac expression | user expression} no position position set {blacklist | role role}
Testing a parser rule esi parser rule rule-name
test {file filename | msg message}
Monitoring Syslog Parser Statistics
The following sections describe how to monitor syslog parser statistics using the WebUI and CLI.
In the WebUI
You can monitor syslog parser statistics in the External Servers monitoring page, accessed by selecting Monitoring > Switch > External Services Interface > Syslog Parser Statistics. The Syslog Parser Statistics view displays statistics such as the number of matches and number of users per rule, as well as the number of respective actions fired by the syslog parser.
The Syslog Parser Statistics view also displays the last refresh time stamp and includes a Refresh Now button, to allow the statistics information to be refreshed manually. There is no automatic refresh on this page.
In the CLI
show esi parser stats

1097 | External Services Interface

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Sample Route-Mode ESI Topology
This section introduces the configuration for a sample route-mode topology using the controller and Fortinet Anti-Virus gateways. In route mode, the trusted and untrusted interfaces between the controller and the Fortinet gateways are on different subnets. The following figure shows an example route-mode topology.
ESI with Fortinet Anti-Virus gateways is supported only in route mode.
Figure 234 Example Route-Mode Topology

In the topology shown, the following configurations are entered on the controller and Fortinet gateway:
ESI server configuration on controller
l Trusted IP address = 10.168.172.3 (syslog source) l Untrusted IP address = 10.168.171.3 l Mode = route
IP routing configuration on Fortinet gateway
l Default gateway (core router) = 10.168.172.1 l Static route for wireless user subnet (10.168.173.0/24) through the controller (10.168.171.2)
Configuring the Example Routed ESI Topology
This section describes how to implement the example routed ESI topology shown in . The description includes the relevant configuration--both the WebUI and the CLI configuration processes are described--required on the controller to integrate with a AVF server appliance. The ESI configuration process will redirect all HTTP user traffic to the Fortinet server for examination, and any infected user will be blacklisted. The configuration process consists of these general tasks: l Defining the ESI server. l Defining the default ping health check method. l Defining the ESI group. l Defining the HTTP redirect filter for sending HTTP traffic to the ESI server. l Applying the firewall policy to the guest role.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External Services Interface | 1098

l Defining ESI parser domains and rules. There are three configuration "phases" on the controller as a part of the solution. l The first phase configures the ESI ping health-check method, servers, and server groups.The term server here
refers to external AVF server devices. l In the second phase of the configuration task, the user roles are configured with the redirection policies
(session ACL definition) instructing the controller to redirect the different types of traffic to different server groups. l In the final phase, the ESI parser domains and rules are configured.
The procedures shown in the following sections are based on the requirements in the example routed ESI topology. Your application might be broader or narrower than this example, but the same general operations apply.
Health-Check Method, Groups, and Servers
To configure the ESI health-check method, servers, and server groups, navigate to the Configuration > Advanced Services > External Services view on the WebUI.
Defining the Ping Health-Check Method
In the WebUI
1. Navigate to the Configuration > Advanced Services > External Services page on the WebUI. 2. Click Add in the Health Check Configuration section.
To change an existing profile, click Edit. 3. Provide the following details:
a. Enter enter the name default for the Profile Name. b. Frequency (secs)--Enter 5.) c. Timeout (secs)--Indicates the number of seconds the controller waits for a response to its health
check query before marking the health check as failed. Default: 2 seconds. (In this example, enter 3.) d. Retry count--Is the number of failed health checks after which the controller marks the server as being
down. Default: 2. (In this example, enter 3.) 4. Click Done when you are finished. 5. Click Apply.
In the CLI
esi ping profile_name frequency seconds retry-count count timeout seconds
Defining the ESI Server
The following sections describe how to configure an ESI server using the WebUI and CLI.
In the WebUI
1. Navigate to the Configuration > Advanced Services > External Services page on the WebUI. 2. Click Add in the External Servers section. 3. Provide the following details:
a. Server Name. (This example uses the name forti_1.)

1099 | External Services Interface

Dell Networking W-Series ArubaOS 6.4.x | User Guide

b. Server Group. Use the drop-down list to assign this server to a group from the existing configured groups. (This example uses fortinet.)
c. Server Mode. Use the drop-down list to choose the mode (bridge, nat, or route) your topology requires. Refer to the description above to understand the differences between the modes. (This example uses route mode.)
d. Trusted IP Address. Enter 10.168.172.3.) e. Untrusted IP Address. Enter 10.168.171.3.) 4. Click Done when you are finished. 5. Click Apply to apply the configuration changes.
In the CLI
esi server server_identity dport destination_tcp/udp_port mode {bridge | nat | route} trusted-ip-addr ip-addr [health-check] trusted-port slot/port untrusted-ip-addr ip-addr [health-check] untrusted-port slot/port
Defining the ESI Server Group
The following sections describe how to configure an ESI server group using the WebUI and CLI.
In the WebUI
1. Navigate to the Configuration > Advanced Services > External Services page. 2. Click Add in the Server Groups section. 3. Provide the following details:
a. Enter a Group Name. Enter fortinet.) b. In the drop-down list, select default as the health check profile. 4. Click Done when you are finished. 5. Click Apply to apply the configuration changes.
In the CLI
esi group name ping profile_name server server_identity
Redirection Policies and User Role
The following sections describe how to configure the redirection policies and user role using the WebUI and CLI.
In the WebUI
1. To configure user roles to redirect the required traffic to the server(s), navigate to the Configuration > Access Control > User Roles view (see 2).
2. To add a new role, click Add.The WebUI displays the Add Role view. Role Name. Enter "guest" as the name for the role.
3. To add a policy for the new role, click Add in the Firewall Policies section. The WebUI expands the Firewall Policies section.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External Services Interface | 1100

Choose from existing configured policies, create a new policy based on existing policies, or create a new policy. a. If you elect to create a new policy, click on the radio button for Create New Policy and then click
Create. The WebUI displays the Policies tab. b. In the Policies tab:
Policy Name. Enter the policy name fortinet and the IPv4 Session policy type.) Click Add to proceed. The WebUI expands the Policies tab. In the drop-down lists, choose parameters such as source, destination, service in the same way as other firewall policy rules. This example uses any source, any destination, service type svc-http (tcp 80). For certain choices, the WebUI expands and adds drop-down lists. c. In the Action drop-down menu, select the redirect to ESI group option. Select fortinet as the appropriate ESI group. The three steps above translate to "for any incoming HTTP traffic, going to any destination, redirect the traffic to servers in the ESI group named fortinet.") Select both as the traffic direction. Forward refers to the direction of traffic from the untrusted client or user to the trusted server, such as the HTTP server or email server. To add this rule to the policy, click Add. d. Repeat the steps to configure additional rules. This example adds a rule that specifies any, any, any, permit. e. Click Done to return to the User Roles tab. 4. Click Apply to apply the configuration changes. 5. Refer to Roles and Policies on page 438, for directions on how to apply a policy to a user role.
In the CLI
Use these commands to define the redirection filter for sending traffic to the ESI server and apply the firewall policy to a user role in the route-mode ESI topology example.
ip access-list session policy any any any redirect esi-group group direction both blacklist //For any incoming traffic, going to any destination, //redirect the traffic to servers in the specified ESI group. any any any permit //For everything else, allow the traffic to flow normally.
user-role role access-list {eth | mac | session} bandwidth-contract name captive-portal name dialer name pool {l2tp | pptp} reauthentication-interval minutes session-acl name vlan vlan_id
Syslog Parser Domain and Rules
The following sections describe how to configure the syslog parser domain and rules for the route-mode example using the WebUI and CLI.
In the WebUI
Adding a New Syslog Parser Domain
To add a new syslog parser domain for the routed example:

1101 | External Services Interface

Dell Networking W-Series ArubaOS 6.4.x | User Guide

1. Click Add in the Syslog Parser Domains tab (Advanced Services > External Services > Syslog Parser Domain). The system displays the new domain view.
2. In the Domain Name text box, type the name of the domain to be added. 3. In the Server (IP Address) text box, type a valid IP address.
You must ensure that you type a valid IP address, because the IP address you type is not automatically validated against the list of external servers that has been configured.
4. Click << Add. 5. Click Apply.
Adding a New Parser Rule To add a new syslog parser rule for the route-mode example: 1. Click Add in the Syslog Parser Rules tab (Advanced Services > External Services > Syslog Parser
Rule). The system displays the new rule view. 2. In the Rule Name text box, type the name of the rule to be added (in this example, "forti_virus"). 3. Click the Enable checkbox to enable the rule. 4. In the Condition Pattern text box, type the regular expression to be used as the condition pattern. (In this example, the expression "log_id=[0­9]{10}[ ]" searches for and matches a 10-digit string preceded by "log_ id=" and followed by one space.) 5. In the drop-down Match list, use the drop-down menu to select the match type (in this example, ipaddr). 6. In the Match Pattern text box, type the regular expression to be used as the match pattern (in this example, "src=(.*)[ ]"). 7. In the drop-down Set list, select the set type (in this example, blacklist). 8. In the drop-down Parser Group list, select one of the configured parser domain names (in this example, "forti_domain"). 9. Click Apply.
In the CLI
Use these CLI commands to define a syslog parser domain and the rule to be applied in the route-mode example shown in Figure 234 esi parser domain name
peer peer-ip server ipaddr
esi parser rule rule-name condition expression domain name enable match {ipaddr expression | mac expression | user expression } position position set {blacklist | role role}
Sample NAT-mode ESI Topology
This section describes the configuration for a sample NAT-mode topology using the controller and three external captive-portal servers. NAT mode uses a trusted interface for each external captive-portal server and a

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External Services Interface | 1102

different destination port to redirect a packet to a port other than the original destination port in the packet. An example topology is shown below in Figure 236.
Figure 235 Example NAT-Mode Topology

Figure 236

In this example, all HTTP traffic received by the controller is redirected to the external captive portal server group and load-balanced across the captive portal servers. All wireless client traffic with destination port 80 is redirected to the captive portal server group, with the new destination port 8080.
The external servers do not necessarily have to be on the subnet as the controller. The policy that redirects traffic to the external servers for load balancing is routed to the external servers if they are on a different subnet.

1103 | External Services Interface

Dell Networking W-Series ArubaOS 6.4.x | User Guide

In the topology shown, the following configurations are entered on the controller and external captive-portal servers:
ESI server configuration on the controller
l External captive-portal server 1: n Name = external_cp1 n Mode = NAT n Trusted IP address = 10.1.1.1 n Alternate destination port = 8080
l External captive-portal server 2: n Name = external_cp2 n Mode = NAT n Trusted IP address = 10.1.1.2
l External captive-portal server 3: n Name = external_cp3 n Mode = NAT n Trusted IP address = 10.1.1.3
l Health-check ping: n Name = externalcp_ping n Frequency = 30 seconds n Retry-count = 2 attempts n Timeout = 2 seconds (2 seconds is the default)
l ESI group = external_cps l Session access control list (ACL)
n Name = cp_redirect_acl n Session policy = user any svc-http redirect esi-group external_cps direction both
Configuring the Example NAT-mode ESI Topology
This section describes how to implement the example NAT-mode ESI topology shown in using both the WebUI, then the CLI. The configuration process consists of these general tasks: l Configuring captive portal (see the "Configuring Captive Portal" chapter). l Configuring the health-check ping method. l Configuring the ESI servers. l Configuring the ESI group. l Defining the redirect filter for sending traffic to the ESI server.
Configuring the NAT-mode ESI Example in the WebUI
Navigate to the Configuration > Advanced Services > External Services view on the WebUI (see ).
In the WebUI
Configuring a Health-Check Ping 1. Click Add in the Health-Check Configuration section External Services view on the WebUI.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External Services Interface | 1104

2. Provide the following details: a. Profile Name. This example uses externalcp_ping. b. Frequency seconds. This example uses 30. c. Retry Count. This example uses 3.
If you do not specify a value for a parameter, the WebUI assumes the default value. In this example, the desired timeout value is two seconds; therefore, not specifying the timeout causes the WebUI to use the default value of two seconds.

3. Click Done when you are finished.
To apply the configuration (changes), you must click Apply in the External Services view on the WebUI. In this example, you can wait until you finish configuring the servers and groups, or you can apply after each configuration portion.

Configuring the ESI Group
1. Click Add in the Server Groups section External Services view on the WebUI. 2. Provide the following details:
a. Group Name. This example uses external_cps. b. Health-Check Profile. Select the health-check ping from the drop-down list. This example uses
externalcp_ping. 3. Click Done when you are finished.
To apply the configuration (changes), you must click Apply in the External Services view on the WebUI. In this example, you can wait until you finish configuring the servers and groups, or you can apply after each configuration portion.

Configuring the ESI Servers
1. Click Add in the External Servers section. 2. Provide the following details:
a. Server Name. b. Server Group. Use the drop-down list to assign this server to a group from the existing configured
groups. c. Server Mode. Use the drop-down list to choose NAT mode.) d. Trusted IP Address. For nat mode, enter the IP address of the trusted interface on the external captive
portal server. e. NAT Destination Port. Enter the port number (to redirect a packet to a port other than the original
destination port in the packet). 3. Click Done when you are finished. 4. Repeat Step 1 through Step 3 for the remaining external captive portal servers. 5. Click Apply to apply the configuration changes.
Configuring the Redirection Filter
To redirect the required traffic to the server(s) using the WebUI, navigate to the Configuration > Access Control > User Roles view on the WebUI (see 2).
1. Click the Policies tab. 2. Click Add in the Policies section of the Policies view on the WebUI. 3. Provide the following details:

1105 | External Services Interface

Dell Networking W-Series ArubaOS 6.4.x | User Guide

a. Policy Name. (This example uses cp_redirect_acl.) b. Policy Type. Select IPv4 Session from the drop-down list. 4. Click Add in the Rules section of the Policies view. a. Source. Select user from the drop-down list. b. Destination. Accept any. c. Service. Select service from the drop-down list; select svc-http (tcp 80) from the secondary drop-
down list. d. Action. Select redirect to ESI group from the drop-down list; select external_cps from the secondary
drop-down list; click <-- to add that group. e. Click Add. 5. Click Done when you are finished. 6. Click Apply to apply the configuration changes.
In the CLI
The CLI configuration process consists of these general tasks:
l Configuring captive portal (see Captive Portal Authentication on page 372). l Configuring the health-check ping method. l Configuring the ESI servers. l Configuring the ESI group. l Defining the redirect filter for sending traffic to the ESI server.
Configuring a Health-Check Ping
The health-check ping will be associated with an ESI group, along with servers, so that controller will send ICMP echo requests to each server in the group and mark the server down if the controller does not hear from the server. The health-check parameters used in this example are:
l Frequency--30 seconds. (The default is 5 seconds.) l Retry-count--3. (The default is 2.) l Timeout--2 seconds. (The default is 2 seconds.)
Use these CLI commands to configure a health-check ping method: esi ping profile_name
frequency seconds retry-count count timeout seconds
Configuring ESI Servers
Here are the ESI server CLI configuration tasks:
l Configure server mode to be NAT. l Configure the trusted IP address (the server IP address to which packets should be redirected). l To redirect to a different port than the original destination port in the packet, configure an alternate
destination port.
Use these CLI commands to configure an ESI server and identify its associated attributes: esi server server_identity
dport destination_tcp/udp_port mode {bridge | nat | route} trusted-ip-addr ip-addr [health-check]

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External Services Interface | 1106

Configuring an ESI Group, Add the Health-Check Ping and ESI Servers
Use these CLI commands to configure an ESI server group, identify its associated ping health-check method, and associate a server with this group: esi group name
ping profile_name server server_identity
Using the ESI Group in a Session Access Control List
Use these CLI commands to define the redirection filter for sending traffic to the ESI server. ip access-list session policy
user any svc-http redirect esi-group group direction both

Understanding Basic Regular Expression (BRE) Syntax
The ESI syslog parser supports regular expressions created using the Basic Regular Expression (BRE) syntax described in this section. BRE syntax consists of instructions--character-matching operators (described in Table 242), repetition operators (described in Table 243), or expression anchors (described in Table 244)--used to defined the search or match target. This section contains the following topics: l "Character-Matching Operators" on page 512 l "Regular Expression Repetition Operators" on page 513 l "Regular Expression Anchors" on page 513 l "References" on page 514
Character-Matching Operators
Character-matching operators define what the search will match.

Table 242: Character-matching operators in regular expressions

Operator Description

Sample

.

Match any one character.

grep .ord sample.txt

Result
Matches ford, lord, 2ord, etc. in the file sample.txt.

[ ]

Match any one character

grep [cng]ord sample.txt Matches only cord, nord, and

listed between the brackets

gord

[^]

Match any one character not grep [^cn]ord sample.txt Matches lord, 2ord, etc., but

listed between the brackets

not cord or nord

grep [a-zA-Z]ord sample.txt

Matches aord, bord, Aord, Bord, etc.

grep [^0-9]ord sample.txt

Matches Aord, aord, etc., but not 2ord, etc.

1107 | External Services Interface

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Regular Expression Repetition Operators
Repetition operators are quantifiers that describe how many times to search for a specified string. Use them in conjunction with the character-matching operators in Table 243 to search for multiple characters.

Table 243: Regular expression repetition operators

Operator Description

Sample

?

Match any character one

egrep "?erd" sample text

time if it exists

Result Matches berd, herd, etc., erd

*

Match declared element

egrep "n.*rd" sample.txt

Matches nerd, nrd, neard, etc.

multiple times if it exists

+

Match declared element

egrep "[n]+erd" sample.txt Matches nerd, nnerd, etc., but

one or more times

not erd

{n}

Match declared element

egrep "[a-z]{2}erd"

exactly n times

sample.txt

Matches cherd, blerd, etc., but not nerd, erd, buzzerd, etc.

{n,}

Match declared element at egrep ".{2,}erd" sample.txt Matches cherd and buzzerd,

least n times

but not nerd

{n,N}

Match declared element at least n times, but not more than N times

egrep "n[e]{1,2}rd" sample.txt

Matches nerd and neerd

Regular Expression Anchors
Anchors describe where to match the pattern, and are a handy tool for searching for common string combinations. Some of the anchor examples use the vi line editor command :s, which stands for substitute. That command uses the syntax: s/pattern_to_match/pattern_to_substitute.

Table 244: Regular expression anchors Operator Description

^

Match at the beginning of a

line

$

Match at the end of a line

\<

Match at the beginning of a

word

Sample s/^/blah /

Result
Inserts "blah" at the beginning of the line

s/$/ blah/

Inserts " blah" at the end of the line

s/\</blah/

Inserts "blah" at the beginning of the word

egrep "\<blah" sample.txt

Matches blahfield, etc.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External Services Interface | 1108

Operator Description

\>

Match at the end of a word

\b

Match at the beginning or

end of a word

\B

Match in the middle of a

word

Sample s/\>/blah/

Result
Inserts "blah" at the end of the word

egrep "\>blah" sample.txt

Matches soupblah, etc.

egrep "\bblah" sample.txt

Matches blahcake and countblah

egrep "\Bblah" sample.txt

Matches sublahper, etc.

References
This implementation is based, in part, on the following resources: l Lonvick, C., "The BSD syslog Protocol", RFC 3164, August 2001 l Regular expression (regex) reference: en.wikipedia.org/wiki/Regular_expression l Regex syntax summary:greenend.org.uk/rjk/2002/06/regexp.html l Basic regular expression (BRE) syntax: builder.com.com/5100-6372-1050915.html

1109 | External Services Interface

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Chapter 44 External User Management

This chapter introduces the ArubaOS XML API interface and briefly discusses how you can use the simple API calls to perform external user management tasks. A sample code listing at the end of the chapter to help you get started with using the XML API. Topics in this chapter include: l Overview on page 1110 l Working with the ArubaOS XML API Works on page 1110 l Creating an XML Request on page 1110 l XML Response on page 1112 l Sample Code on page 1119
Overview
ArubaOS allows you to set up customized external captive portal user management using its native XML API interface. The XML API interface allows you to create and execute user management operations on behalf of the clients or users. You can use the XML API interface to add, delete, authenticate, or query a user or a client.
Before you Begin
l Enable the External Services Interface software module. This is available in the PEFNG license. l Ensure that you have connectivity between your captive portal server and the controllers via HTTP or
HTTPS.
Working with the ArubaOS XML API Works
The typical interaction between your external server and the controller happens over HTTPS post commands. A typical communication process using the XML API interface happens as follows: 1. An API command is issued from your server in XML format to the controller. The XML message or request
can be composed using a language of your choice using the format described in the Creating an XML Request on page 1110. Sample code in C gives a simple example. See the Sample Code on page 1119. 2. The controller processes the XML request and sends the response to the authentication server in the XML format. The XML request is sent using HTTPS post. The common format of the HTTPS post is https://<controller-ip>/auth/command.xml. See Creating an XML Request on page 1110 for more information. 3. You can use the response and take appropriate action that suit your requirements. The response from the controller is returned using predefined formats. See the XML Response on page 1112 for more information.
Creating an XML Request
You can create XML requests to add, delete, authenticate, blacklist, or query a user. This section provides XML request formats that you can use for each authentication tasks.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

External User Management | 1110

The XML API functionalities such as addition, deletion, role change, querying, authentication, and blacklisting has been extended to support IPv6 users in addition to IPv4 users. The XML API server is configured using only the IPv4 address.
Adding a User
This XML request uses the user_add command to create a new user entry in the controllers user table. If the user entry is already present in the user table, the command will modify the entry with the values defined in the XML request. The following options are mandatory when you execute the user_add command: l IP Address l Version
Deleting a User
This XML request uses the user_delete command to delete an existing user from the controllers user table. If the user entry contains multiple attributes these must be specified in the XML request. The following options are mandatory when you execute the user_add command: l IP Address l Version
Authenticating a User
This XML request uses the user_authenticate command to authenticate and derive a new for the user. The following options are mandatory when you execute the user_authenticate command: l IP Address l Version l Name l Password
Blacklisting a User
This XML request uses the user_blacklist command to blacklist a user from connecting to your network. The following options are mandatory when you execute the user_blacklist command: l IP Address l Version
Querying for User Status
This XML request uses the user_query command to get the status and details of a user connected to your network. The following options are mandatory when you execute the user_blacklist command: l IP Address l Version

1111 | External User Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

XML Response
For every successful XML request the controller will return the processed information as an XML response. There are two types of responses: Default response and Query response.
Default Response Format
The format of a default XML response from the controller is: <aruba>
<status>Ok | Error</status> <code>response_code</code> <reason>response_message</reason> </aruba> l Status specifies if the XML response was successful or failure. If the request was successful, the status tag will contain the Ok string. If the request was a failure, the status tag will contain the Error string. l Code is an integer number that represents the error in the request. This tag is populated only if there is an error in the request. l Reason is message that contain descriptive information about error.
Response Codes
The following response codes are returned if the XML request return an the Error string.

Table 245: ML Response Codes Code Reason message

Description

1

unknown user

Returned by the user_authenticate,

The user specified in the XML request does not exist or is incorrect.

user_delete, user_blacklist, and user_query commands.

2

unknown role

Returned by the user_add command.

The specified role in the XML request does not exist in the controller.

3

unknown external agent

Returned by all commands.

4

authentication failed

The username and the key does not match.

Returned by commands that contain the shared key in XML request.

5

invalid command

--

The XML request contains a command not supported by ArubaOS XML API interface.

6

invalid message authentication method

The authentication method specified in the XML request is not supported by the ArubaOS XML API interface.

Returned by commands that contain the authentication method in the XML request.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External User Management | 1112

Code Reason message

7

invalid message digest

Description
Returned by commands that contain the shared_key in the XML request.

8

missing message authentication

Returned by all commands that

The authentication method is not specified in the XML request.

require the authentication method in the XML request.

9

missing or invalid version number

Returned by all commands.

The XML request does not contain the version number or the version number is incorrect.

10

internal error

--

11

client not authorized

Returned by all commands that

The shared key in the XML request does not match or the XML API server is not defined in the appropriate

require shared key to be specified in the XML request.

AAA profile.

12

Cant use VLAN IP

--

13

Invalid IP

The XML request contains invalid IP address of the user or client.

Returned by all commands that required IP address to be specified in the XML request.

14

Cant use Switch IP

Returned by all commands that

The XML request contains the controllers IP address instead of the client IP address.

required IP address to be specified in the XML request.

15

missing MAC address

Returned by all commands that

The XML request does not contain the MAC address of the user or client.

required MAC address to be specified in the XML request.

16

Unsupported command for this user

Returned when the requested operation is invalid for the specified user.

17

Socket failed or timed out waiting for operation

Returned when the status of the reques-

to complete

ted operation is unavailable; usually sig-

nifies a socket communication failure or

timeout.

Query Command Response Format
The response of the XML request with the user_query command contains detailed information about the status of the user or client.
The status, code and reason values are similar to the default response. The following responses are returned only if the status code returns the Ok string.

1113 | External User Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 246: Query Response Code

Response Code

Description

status

Displays the status of the XML response.

code

Displays the code as an integer number that represents the error in the request. This tag is populated only if there is an error in the request.

macaddr

Displays the MAC address of the client.

ipaddr

Displays the IPv4 or IPv6 address of the client.

name

Displays the hostname of the user or client.

role

Displays the current role of the authenticated client.

type

Displays if the client is wired or wireless.

vlan

Displays the VLAN ID of the client.

location

Displays the name of the AP to which the client is associated.

age

Displays the age of the client in the controller. The age is displayed in DD:HH:MM

format (Day:Hours:Minutes).

auth_status

Displays the authentication status of the client. Available values are: authenticated or unauthenticated.

auth_server

Displays the name of the authentication server used for authenticating the client. This information is available only if the client is authenticated by the controller.

auth_method

Displays the authentication mechanism used to authenticate the client. This information is available only if the client is authenticated by the controller.

essid

Displays the ESSID to which the client is associated.

bssid

Displays the BSSID of the AP to which the client is associated.

phy_type

Displays the physical connection type. Available values are: a, b, g, a-HT, g-HT, and aVHT.

mobility_state in_packets

Displays the roaming state of the client. Available values are: Wired (Visitor), Visitor, Wired (Away), Away, Wired (Foreign VLAN), Foreign VLAN, Wired (Remote), Associated (Remote), Wired, and Wireless.
Displays the total number of incoming packets received by the client.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External User Management | 1114

Response Code in_octets
out_packets
out_octets

Description Displays the incoming packets (in bytes) received by the client. Displays the total number of outgoing packets received by the client. Displays the outgoing packets (in bytes) received by the client.

Using the XML API Server
Follow the steps below to use the XML API: 1. Configure an external XML API server. 2. Associate the XML API server to an appropriate AAA profile. 3. Configure a user role to direct un-authenticated users to the external captive portal server. 4. Configure Captive Portal profile and associate that to an initial role (example logon). 5. Create an XML request with the appropriate API call. 6. Process XML response appropriately.

The default logon role of a client or user must have captive-portal enabled.

Configuring the XML API Server
Configure an external XML API server in your AAA infrastructure. In this example, 10.11.12.13 is your server. The XML API interface on the controller will receive requests from this server.
l Define the XML API server and specify the key for verifying requests from your server (host) (config) #aaa xml-api server 10.11.12.13 l Verify the XML API server configuration (host) (config) #show aaa xml-api server

Associating the XML API Server to a AAA profile
After you define the XML API server profile associate it to the appropriate AAA profile. If the XML API server is not correctly configured in the appropriate profile, the controller will respond with the client not authorized error message. You can add XML API server references to the following AAA profile depending on your requirement:
l For wireless users associate the XML API server to the AAA profile of the virtual AP profile. (host) (config) #aaa profile wirelessusers (host) (AAA Profile "wirelessusers") #xml-api-server 10.11.12.13 (host) (XML API Server "10.11.12.13") #key Dell123 (host) (config) #show aaa profile wirelessusers

AAA Profile "wirelessusers" --------------------------Parameter --------Initial role MAC Authentication Profile MAC Authentication Default Role

Value ----logon N/A guest

1115 | External User Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

MAC Authentication Server Group 802.1X Authentication Profile 802.1X Authentication Default Role 802.1X Authentication Server Group RADIUS Accounting Server Group XML API server RFC 3576 server User derivation rules Wired to Wireless Roaming SIP authentication role

default N/A guest N/A N/A 10.11.12.13 N/A N/A Enabled N/A

(host) (config) #wlan virtual-ap wireless-vap (host) (Virtual AP profile "wireless-vap") #aaa-profile wirelessusers (host) (config) #show wlan virtual-ap wireless-vap

Virtual AP profile "wireless-vap" --------------------------------Parameter --------Virtual AP enable Allowed band AAA Profile 802.11K Profile SSID Profile VLAN Forward mode Deny time range Mobile IP HA Discovery on-association DoS Prevention Station Blacklisting Blacklist Time Dynamic Multicast Optimization (DMO) Dynamic Multicast Optimization (DMO) Threshold Authentication Failure Blacklist Time Multi Association Strict Compliance VLAN Mobility Remote-AP Operation Drop Broadcast and Multicast Convert Broadcast ARP requests to unicast Band Steering WMM Traffic Management Profile

Value ----Enabled all wirelessusers default default N/A tunnel N/A Enabled Disabled Disabled Enabled 3600 sec Disabled 6 3600 sec Disabled Disabled Disabled standard Disabled Disabled Disabled N/A

l For wired users associate the XML API server to the AAA profile of the appropriate wired profile. (host) (config) #aaa profile wiredusers (host) (AAA Profile "wiredusers") #xml-api-server 10.11.12.13 (host) (AAA Profile "wiredusers") #! (host) (config) #aaa authentication wired (host) (Wired Authentication Profile) #profile wiredusers (host) (Wired Authentication Profile) #show aaa authentication wired
Wired Authentication Profile ---------------------------Parameter Value --------- ----AAA Profile wiredusers

l For unknown wired users associate the XML API server to the default-xml-api AAA profile.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External User Management | 1116

The default-xml-api AAA profile is used only to add or authenticate new users.

The following example illustrates using the default-xml-api AAA profile.

(host) (config) #aaa profile default-xml-api

(host) (AAA Profile "default-xml-api") #xml-api-server 10.11.12.13

(host) (config) #show aaa profile default-xml-api

AAA Profile "default-xml-api" (Predefined (changed))

----------------------------------------------------

Parameter

Value

---------

-----

Initial role

logon

MAC Authentication Profile

N/A

MAC Authentication Default Role

guest

MAC Authentication Server Group

default

802.1X Authentication Profile

N/A

802.1X Authentication Default Role guest

802.1X Authentication Server Group N/A

RADIUS Accounting Server Group

N/A

XML API server

10.11.12.13

RFC 3576 server

N/A

User derivation rules

N/A

Wired to Wireless Roaming

Enabled

SIP authentication role

N/A

Your controller is now ready to receive API calls from your XML API server.

Set up Captive Portal profile
Set up a Captive Portal profile with a login page that will redirect users to the external Captive Portal server.
(host) (config-role) #aaa authentication captive-portal captive-portal-auth (host) (Captive Portal Authentication Profile "captive-portal-auth") #default-role authenticated (host) (Captive Portal Authentication Profile "captive-portal-auth") #login-page https://10.11.12.13/cgi-bin/login.pl (host) (Captive Portal Authentication Profile "captive-portal-auth") #switch-in-redirectionurl

Associating the Captive Portal Profile to an Initial Role
(host) (Captive Portal Authentication Profile "captive-portal-auth") #user-role logon

(host) (config-role) #captive-portal captive-portal-auth (host)(config-role) #session-acl captiveportal
You can either create a new ACL or append specific rules to an existing ACLs. To create session ACL for the logon role do the following:
(host) (config-role) #netdestination xCP #an alias for the external Captive Portal server (host) (config-dest) #host 10.11.12.13 #IP address of the external Captive Portal server (host) (config-dest) #ip access-list session captiveportal #append or add rules to session ACL (host) (config-sess-captiveportal)#user alias xCP svc-https permit (host) (config-sess-captiveportal)#user alias xCP svc-http permit

Creating an XML API Request
You can now create an XML request with an appropriate authentication command and send it to the controller via HTTPS post. The format of the URL to send the XML request is: https://<controller-ip/auth/command.xml l controller-ip is the IP address of the controller that will receive the authentication request

1117 | External User Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l command.xml is the XML request that contains the details of authentication.
The format of the XML API request is:
xml=<aruba command="<authentication_command>"> <options>Value</options> ... <options>Value</options>
</aruba>
You can specify any of the following commands in the XML request:

Table 247: XML API Authentication Command Authentication Command Description

user_add

This command adds the user to the controllers user table.

user_delete

This command deletes the user from the controller

user_authenticate

This command will authentication the user based on the authentication rules defined in the controllers configuration.

user_blacklist

This command will block a user from connection to your network.

user_query

This command will display the current status of the user connected to your network.

The authentication command requires certain mandatory options to successfully execute the authentication tasks. The list of all available options are:

Table 248: Authentication Command Options

Options

Description

ipaddr

IP address of the user in A.B.C.D format.

Range / Defaults --

macaddr

MAC address of the user aa:bb:cc:dd:ee:ff format.

Enter MAC address with colon.

user

Name of the user.

64 character string

role

Role name assigned after authenticating.

64 character string

password

The password of the user used for authentication. --

session_timeout

Session time-out in seconds. User will be

--

disconnected after this time.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External User Management | 1118

Options authentication key
version

Description

Range / Defaults

Authentication method used to authenticate the

--

message and the sender. You can use any of

MD5, SHA-1 or clear text methods of

authentication. This option is ignored if shared

secret is not configured. It is, however, mandatory

if it is configured.

This is the encoded SHA1/MD5 hash of shared secret or plaintext shared secret.
This option is ignored if shared secret is not configured on the switch.
The actual MD5/SHA-1 hash is 16/20 bytes and consists of binary data. It must be encoded as an ASCII based HEX string before sending. It must be present when the controller is configured with an xml-api key for the server. Encoded hash length is 32/40 bytes for MD5/SHA-1.

The version of the XML API interface available in the controller. This field is mandatory is all requests.

Current version 1.0

Monitoring External Captive Portal Usage Statistics
To check the external captive portal authentication statistics use the show aaa xml-api statistics command. This command displays the number of times an authentication command was executed per client. The command also displays the number of times an authentication event occurred and the number of new authentication events that occurred since the last status check.
(host) # show aaa xml-api statistics

Sample Code
This section lists a sample code that will help you get started in using the ArubaOS XML API interface. These codes have been tested in a controlled environment. We recommend that you test this code in a nonproduction environment before using it for actual user management tasks.
Using XML API in C Language
The example script is written in the C language. The example script (auth.c) sends an authentication request from your authentication server to the controller.
This is an example code and is provided for illustration purposes. If you plan to use this code in your environment, ensure that the code meets your IT guidelines. Also create an error free executable to successfully execute the script.

##### auth.c listing ##### Authentication Script Example -- Start -#include <stdio.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <getopt.h>
char *command, *ipaddr, *macaddr;

1119 | External User Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

char *name, *password, *role; char *tout, *secret; char *auth, *key, enchashbuf[41]; unsigned char hashbuf[20]; char *version;

char post[4096], cmdbuf[512], encbuf[1024];

#define DEBUG #ifdef DEBUG #define debug(x...) #else #define debug(x...) #endif

fprintf(stderr, x)

extern int cgi_escape_url(char *t, int tl, char *s, int sl, int b_newline); static void encode_message_digest (unsigned char *md, int mdlen, char *output);

static void usage (void) {
fprintf(stderr, "Usage: ecp [options] <switch> <command> [<secret>]\n");

fprintf(stderr, " fprintf(stderr, " fprintf(stderr, " fprintf(stderr, " fprintf(stderr, "

\n"); <switch> <command> <secret> \n");

Switch IP address.\n"); One of add, del, or authenticate.\n"); Shared secret.\n");

fprintf(stderr, " fprintf(stderr, " fprintf(stderr, " fprintf(stderr, " fprintf(stderr, " fprintf(stderr, " fprintf(stderr, " fprintf(stderr, "

-i ipaddr -m macaddr -n name -p passwd -r role -t timeout -v version -a method

User IP address in A.B.C.D format.\n"); User MAC address in aa:bb:cc:dd:ee:ff format.\n"); User name.\n"); User password.\n"); User role.\n"); User session timeout.\n"); API version number. Default is 1.0\n"); one of md5, sha-1 or cleartext.\n");

exit(1); }

main(int argc, char **argv) {
char c, *p; int fd, len, postlen; struct sockaddr_in sa;

while ((c = getopt(argc, argv, "a:i:m:n:p:r:t:v:")) != EOF) switch(c) {

case 'i':

/* ipaddr */

ipaddr = optarg;

break;

case 'm':

/* macaddr */

macaddr = optarg;

break;

case 'n':

/* name */

name = optarg;

break;

case 'p':

/* password */

password = optarg;

break;

case 'r':

/* role */

role = optarg;

break;

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External User Management | 1120

case 't':

/* session timeout */

tout = optarg;

break;

case 'v':

/* version */

version = optarg;

break;

case 'a':

/* authentication */

auth = optarg;

if (!strcasecmp(auth, "sha-1") &&

!strcasecmp(auth, "md5"))

usage();

break;

default:

usage();

break;

}

argc -= (optind - 1);

argv += (optind - 1);

if ((argc < 3)) { usage();
} if (version == NULL)
version = "1.0";

debug("server=%s, command=%s, version=%s, secret=%s\n", argv[1], argv[2], version, argv[3]?argv[3]:"<>");

if (argv[3]) secret = argv[3];

p = cmdbuf; sprintf(p, "xml=<aruba command=`%s'>", argv[2]); p += strlen(p); if (ipaddr) {
sprintf(p, "<ipaddr>%s</ipaddr>", ipaddr); p += strlen(p); } if (macaddr) { sprintf(p, "<macaddr>%s</macaddr>", macaddr); p += strlen(p); } if (name) { sprintf(p, "<name>%s</name>", name); p += strlen(p); } if (password) { sprintf(p, "<password>%s</password>", password); p += strlen(p); } if (role) { sprintf(p, "<role>%s</role>", role); p += strlen(p); } if (tout) { sprintf(p, "<session timeout>%s</session timeout>", tout); p += strlen(p); } if (secret) { if (auth == NULL) {
key = secret; auth = "cleartext"; #ifndef OPENSSL_NO_SHA1

1121 | External User Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

#endif

} else if (!strcasecmp(auth, "sha-1")) { key = enchashbuf; SHA1(secret, strlen(secret), hashbuf); encode_message_digest(hashbuf, 20, enchashbuf);
} else if (!strcasecmp(auth, "md5")) { key = enchashbuf; md5_calc(hashbuf, secret, strlen(secret)); encode_message_digest(hashbuf, 16, enchashbuf);
} debug("Message authentication is %s (%s)\n", auth, key); sprintf(p, "<authentication>%s</authentication><key>%s</key>",
auth, key); p += strlen(p); } debug("\n"); sprintf(p, "<version>%s</version>", version); sprintf(p, "</authresponse>"); cgi_escape_url(encbuf, sizeof(encbuf), cmdbuf, strlen(cmdbuf), 0);

postlen = sprintf(post, "POST /auth/command.xml HTTP/1.0\r\n" "User-Agent: ecp\r\n" "Host: %s\r\n" "Pragma: no-cache\r\n" "Content-Length: %d\r\n" /* "Content-Type: application/x-www-form-urlencoded\r\n" */ "Content-Type: application/xml\r\n" "\r\n" "%s", argv[1], strlen(encbuf), encbuf);

inet_aton(argv[1], &sa.sin_addr); sa.sin_family = AF_INET; sa.sin_port = htons(80); fd = socket(AF_INET, SOCK_STREAM, 0); if (fd < 0) {
perror("socket"); exit(1); } if (connect(fd, (struct sockaddr *) &sa, sizeof(sa)) < 0) { perror("connect"); exit(1); }

if (write(fd, post, postlen) != postlen) { perror("write"); exit(1);
}

while ((len = read(fd, post, sizeof(post))) > 0) write(1, post, len);
close(fd); exit(0); }

static void encode_message_digest (unsigned char *md, int mdlen, char *output) {
int i;

for (i=0; i<mdlen; i++) { sprintf(output, "%02x", md[i]);

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External User Management | 1122

output += 2; } }
} ##### Authentication Script Example -- END --
Understanding Request and Response
The controller processes the authentication task and sends a response to the authentication server in the XML format to the authentication server. The XML response contains the status of the request and a code in case of an error. Request format: <script_name> [options] <controller-ip> <command> <secret_key>
Understanding XML API Request Parameters
The Table 249 lists all parameters that you can use in a request.

Table 249: XML API Request Parameters and Descriptions

Parameter

Description

script_name

The name of the script executable.

Options

l -i <ip_addr>--Specify the client's IP address. l -m <mac_addr>--Specify the client's MAC address. l -n <name>--Specify the client's user name. l -p <passwd>--Specify the client password. l -r role--Specify the current user role of the client. l -t timeout--User session timeout. l -v version--API version number. Default is 1.0 l -a method--Specify the encryption method to send the secret key. You can specify
MD5 or SHA-1 or cleartext as the encryption method. By default, cleartext method is used to send the key. l -s sessid--Active session Id

controller-ip The IP address of the controller that will receive the authentication requests.

command

The authentication command sent to the controller. You can send one of the following commands per request: l add: Adds the client to your network. l delete: Deletes the client from your network l query: Fetches information about the client l blacklist: Blacklists or block the client from connecting to your network l authenticate: Authenticates the client and assigns the default authenticated role.

secret_key

The password used to validate the authentication request from your authentication server. See Configuring the XML API Server on page 1115 for more information.

1123 | External User Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Understanding XMl API Response
The response message from the controller is sent in an XML format. The default format of the response is:
[Message header] Displays the request parameters and other standard header details. .. ... ..

<response> <status>Status Message</status> <code>Code in case of an error</code>
</response>

Adding a Client
This command will add a client on your network. john@linux:/home/john/tools/xml-api# ./auth -i 10.10.10.249 -m 00:19:d2:01:0b:aa -r logon 10.11.12.13 add $abcd$1234$
The commands sends the following information in the authentication request to the controller: l Client IP address: 10.10.10.249 l Client MAC address: 00:19:d2:01:0b:aa l Authentication server IP address: 10.11.12.13 l Authentication command: add l Key to validate authentication request: $abcd$1234$ l Verification key is sent in cleartext format
Response from the controller server=10.11.12.13, command=add, version=1.0, secret=$abcd$1234$ sessid= Message authentication is cleartext ($abcd$1234$)

HTTP/1.1 200 OK Date: Tue, 03 Aug 2010 23:32:16 GMT Server: Connection: close Content-Type: text/xml

<authresponse> <status>Ok</status> <code>0</code>
</authresponse>

View the updated details of the client on the controller

(host) #show user-table

Users

-----

IP

MAC

Name Role Age(d:h:m) Auth VPN link AP name Roaming

Essid/Bssid/Phy Profile Forward mode Type Host Name

---------- ------------

------ ---- ---------- ---- -------- ------- --- ---- --

------------- ------- ------------ ---- ---------

10.10.10.249 00:19:d2:01:0b:aa

logon 00:00:00

User Entries: 1/1

Deleting a Client
This command will delete a client from your network.Deleting a client--request and response

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External User Management | 1124

john@linux:/home/john/tools/xml-api# ./auth -i 10.10.10.248 10.11.12.13 delete $abcd$1234$ This command sends the following information in the request to the controller: l Client IP address: 10.10.10.248 l Authentication server IP address: 10.11.12.13 l Authentication command: delete l Key to validate authentication request: $abcd$1234$ l Key is sent in cleartext format
Response from the controller server=10.11.12.13, command=delete, version=1.0, secret=$abcd$1234$ sessid= Message authentication is cleartext ($abcd$1234$)

HTTP/1.1 200 OK Date: Tue, 03 Aug 2010 23:30:32 GMT Server: Content-Length: 56 Connection: close Content-Type: text/xml

<authresponse> <status>Ok</status> <code>0</code>
</authresponse>

Authenticating a Client
This command will authenticate and change the role of a client. To illustrate the authentication command request process this section displays status of the client before and after the authentication command request.

Status of the client before authentication

The following show user command shows the role of the client is logon before the authentication request is processed by the controller.

(host) #show user

Users

-----

IP

MAC

Name Role Age(d:h:m) Auth VPN link AP name Roaming

Essid/Bssid/Phy Profile Forward mode Type Host Name

---------- ------------

------ ---- ---------- ---- -------- ------- --- ---- --

------------- ------- ------------ ---- ---------

10.10.10.248 00:19:d2:01:0b:84

logon 00:00:00

User Entries: 1/1 The following command shows the captive portal status of the logon role of the client. (host) (config-role) #show rights logon | include "Captive Portal profile"
Captive Portal profile = default
Sending the authentication command Use the authenticate keyword in the script to send the authentication command request. john@linux:/home/john/tools/xml-api# ./auth -i 10.10.10.248 -n john -p password 10.11.23.24 authenticate $abcd$1234$ This commands sends the following information in the request to the controller: l Client IP address: 10.10.10.248 l Client username: john

1125 | External User Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l Client password: password l Authentication server IP address: 10.11.12.13 l Authentication command: authenticate l Key to validate authentication request: $abcd$1234$ l Key is sent in cleartext format
Response from the controller server=10.11.12.13, command=authenticate, version=1.0, secret=$abcd$1234$ sessid= Message authentication is cleartext ($abcd$1234$)

HTTP/1.1 200 OK Date: Tue, 03 Aug 2010 23:23:42 GMT Server: Connection: close Content-Type: text/xml

<authresponse> <status>Ok</status> <code>0</code>
</authresponse>
Status of the client after authentication
The following show user command shows the role of the client is change to guest after the authentication request is processed by the controller. (host) #show user

Users

-----

IP

MAC

Name Role Age(d:h:m) Auth VPN link AP name Roaming

Essid/Bssid/Phy Profile Forward mode Type Host Name

---------- ------------

------ ---- ---------- ---- -------- ------- --- ---- --

------------- ------- ------------ ---- ---------

10.10.10.248 00:19:d2:01:0b:84 John guest 00:00:04 Web

User Entries: 1/1

Querying for Client Details
This command will fetch a all details about a client connected in your network. Querying Client Information-- request and response john@linux:/home/john/tools/xml-api# ./auth -i 10.10.10.249 10.11.12.13 query $abcd$1234$
This commands sends the following information in the request to the controller: l Client IP address: 10.10.10.249 l Client username: john l Client password: password l Authentication server IP address: 10.11.12.13 l Authentication command: query l Key to validate authentication request: $abcd$1234$ l Key is sent in cleartext format
Response from the controller server=10.11.12.13, command=query, version=1.0, secret=$abcd$1234$ sessid= Message authentication is cleartext ($abcd$1234$)

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External User Management | 1126

HTTP/1.1 200 OK Date: Tue, 03 Aug 2010 23:34:30 GMT Server: Connection: close Content-Type: text/xml

<authresponse> <status>Ok</status> <code>0</code> <macaddr>00:19:d2:01:0b:aa</macaddr> <name>john</name> <role>logon</role> <type>Wireless</type> <vlan>1</vlan> <location>N/A</location> <age>00:00:02</age> <auth_status>Unauthenticated</auth_status> <essid></essid> <bssid>00:00:00:00:00:00</bssid> <phy_type>b</phy_type> <mobility_state>Wireless</mobility_state> <in_packets>0</in_packets> <in_octets>0</in_octets> <out_packets>0</out_packets> <out_octets>0</out_octets>
</authresponse>
The output of the show user command displays the client information.
(host) #show user

Users

-----

IP

MAC

Name Role Age(d:h:m) Auth VPN link AP name Roaming

Essid/Bssid/Phy Profile Forward mode Type Host Name

---------- ------------

------ ---- ---------- ---- -------- ------- --- ---- --

------------- ------- ------------ ---- ---------

10.10.10.249 00:19:d2:01:0b:aa John logon 00:00:01

User Entries: 1/1

Blacklisting a Client
This command will blacklist a client and restrict it from connecting to your network. The show user-table lists the client connected on your network before processing the request to blacklist the client. (host) #show user

Users

-----

IP

MAC

Name Role Age(d:h:m) Auth VPN link AP name Roaming

Essid/Bssid/Phy Profile Forward mode Type Host Name

---------- ------------

------ ---- ---------- ---- -------- ------- --- ---- --

------------- ------- ------------ ---- ---------

10.10.10.248 00:19:d2:01:0b:84 John guest 00:00:00

User Entries: 1/1

john@linux:/home/john/tools/xml-api# ./auth -i 10.10.10.248 10.11.12.13 blacklist $abcd$1234$ This commands sends the following information in the request to the controller: l Client IP address: 10.10.10.248 l Authentication server IP address: 10.11.12.13

1127 | External User Management

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l Authentication command: blacklist l Key to validate authentication request: $abcd$1234$ l Key is sent in cleartext format
Response from the controller server=10.11.12.13, command=blacklist, version=1.0, secret=$abcd$1234$ sessid= Message authentication is cleartext ($abcd$1234$)

HTTP/1.1 200 OK Date: Tue, 03 Aug 2010 23:29:11 GMT Server: Content-Length: 56 Connection: close Content-Type: text/xml

<authresponse> <status>Ok</status> <code>0</code>
</authresponse>
The show user-table command does not list the blacklisted client. You can use the show ap blacklist-clients command on your controller to view the list of blacklisted clients
(host) (config) #show ap blacklist-clients

Blacklisted Clients

-------------------

MAC

reason

------------

------

00:19:d2:01:0b:84 user-defined

block-time (sec) remaining time (sec)

---------------- --------------------

5

3595

Dell Networking W-Series ArubaOS 6.4.x | User Guide

External User Management | 1128

Chapter 45 Behavior and Defaults
Topics in this chapter include: l Understanding Mode Support on page 1129 l Understanding Basic System Defaults on page 1131 l Understanding Default Management User Roles on page 1141 l Understanding Default Open Ports on page 1145
Understanding Mode Support
Most ArubaOS features are supported in all forwarding modes. However, there are a some features that are not supported in one or more forwarding modes. Campus APs do not support split-tunnel forwarding mode and the decrypt-tunnel forwarding mode does not support TKIP Counter measure management on campus APs or remote APs. Table 250 describes the features that are not supported in each forwarding mode.

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Behavior and Defaults | 1129

Table 250: Features not Supported in Each Forwarding Mode

Forwarding Mode

Feature Not Supported

Split Tunnel Mode on Remote APs

VLAN Pooling Named VLAN Voice over Mesh Video over Mesh Layer-2 Mobility Layer-3 Mobility IGMP Proxy Mobility Mobile IP TKIP countermeasure mgmt Bandwidth based CAC Dynamic Multicast Optimization

Bridge Mode on Campus APs or Remote APs

Firewall ­ SIP/SCCP/RTP/RTSP Voice Support Firewall ­ Alcatel NOE Support Voice over Mesh Video over Mesh Named VLAN Captive portal Rate Limiting for broadcast/multicast Power save: Wireless battery boost Power save: Drop wireless multicast traffic Power save: Proxy ARP (global) Power save: Proxy ARP (per-SSID) Automatic Voice Flow Classification

Bridge Mode on Campus APs or Remote APs (continued)

SIP ALG SIP: SIP authentication tracking SIP: CAC enforcement enhancements SIP: Phone number awareness SIP: R-Value computation SIP: Delay measurement Management: Voice-specific views Management: Voice client statistics Management: Voice client troubleshooting Voice protocol monitoring/reporting SVP ALG

1130 | Behavior and Defaults

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Forwarding Mode

Feature Not Supported
H.323 ALG Vocera ALG SCCP ALG NOE ALG Layer 3 Mobility IGMP Proxy Mobility Mobile IP TKIP countermeasure mgmt Bandwidth based CAC Dynamic Multicast Optimization

Understanding Basic System Defaults
The default administrator user name is admin, and the default password is also admin.The ArubaOS software includes several predefined network services, firewall policies, and roles.
Network Services
Table 251 lists the predefined network services and their protocols and ports.

Table 251: Predefined Network Services

Name

Protocol

Port(s)

svc-dhcp

udp

67 68

svc-snmp-trap

udp

162

svc-smb-tcp

tcp

445

svc-https

tcp

443

svc-ike

udp

500

svc-l2tp

udp

1701

svc-syslog

udp

514

svc-pptp

tcp

1723

svc-telnet

tcp

23

svc-sccp

tcp

2000

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Behavior and Defaults | 1131

Name svc-tftp svc-sip-tcp svc-kerberos svc-pop3 svc-adp svc-noe svc-noe-oxo svc-dns svc-msrpc-tcp svc-rtsp svc-http svc-vocera svc-nterm svc-sip-udp svc-papi svc-ftp svc-natt svc-svp svc-gre svc-smtp svc-smb-udp svc-esp

Protocol udp tcp udp tcp udp udp udp udp tcp tcp tcp udp tcp udp udp tcp udp 119 gre tcp udp esp

Port(s) 69 5060 88 110 8200 32512 5000 53 135 139 554 80 5002 1026 1028 5060 8211 21 4500 0 0 25 445 0

1132 | Behavior and Defaults

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Name svc-bootp svc-snmp svc-icmp svc-ntp svc-msrpc-udp svc-ssh svc-h323-tcp svc-h323-udp svc-http-proxy1 svc-http-proxy2 svc-http-proxy3 svc-sips svc-v6-dhcp svc-v6-icmp any

Protocol udp udp icmp udp udp tcp tcp udp tcp tcp tcp tcp udp icmp any

Port(s) 67 69 161 0 123 135 139 22 1720 1718 1719 3128 8080 8888 5061 546 547 0 0

Policies
The following are predefined policies.
Table 252: Predefined Policies Predefined Policy
ip access-list session allowall any any any permit
ip access-list session control user any udp 68 deny any any svc-icmp permit any any svc-dns permit any any svc-papi permit any any svc-cfgm-tcp permit

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Description
An "allow all" firewall rule that permits all traffic.
Controls traffic Apply to untrusted wired ports in order to allow Dell APs to boot up.
Behavior and Defaults | 1133

Predefined Policy
any any svc-adp permit any any svc-tftp permit any any svc-dhcp permit any any svc-natt permit
ip access-list session captiveportal user alias mswitch svc-https dst-nat 8081 user any svc-http dst-nat 8080 user any svc-https dst-nat 8081 user any svc-http-proxy1 dst-nat 8088 user any svc-http-proxy2 dst-nat 8088 user any svc-http-proxy3 dst-nat 8088

Description
NOTE: In most cases wired ports should be made "trusted" when attached to an internal network.
Enables Captive Portal authentication.
1. Any HTTPS traffic destined for the controller will be NATed to port 8081, where the captive portal server will answer.
2. All HTTP traffic to any destination will be NATed to the controller on port 8080, where an HTTP redirect will be issued.
3. All HTTPS traffic to any destination will be NATed to the controller on port 8081, where an HTTP redirect will be issued.
4. All HTTP proxy traffic will be NATed to the controller on port 8088.
NOTE: In order for captive portal to work properly, DNS must also be permitted. This is normally done in the "logon-control" firewall rule.

1134 | Behavior and Defaults

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Predefined Policy

Description

ip access-list session cplogout user alias mswitch svc-https dst-nat 8081

Used to enable the captive portal "logout" window. If the user attempts to connect to the controller on the standard HTTPS port (443) the client will be NATed to port 8081, where the captive portal server will answer. If this rule is not present, a wireless client may be able to access the controller's administrative interface.

ip access-list session vpnlogon any any svc-ike permit any any svc-esp permit any any svc-l2tp permit any any svc-pptp permit any any svc-gre permit

This policy permits VPN sessions to be established to any destination. IPsec (IKE, ESP, and L2TP) and PPTP (PPTP and GRE) are supported.

ip access-list session ap-acl any any udp 5000 any any udp 5555 any any svc-gre permit any any svc-syslog permit any user svc-snmp permit user any svc-snmp-trap permit user any svc-ntp permit

This is a policy for internal use and should not be modified. It permits APs to boot up and communicate with the controller.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Behavior and Defaults | 1135

Predefined Policy ip access-list session validuser
any any any permit
ip access-list session vocera-acl any any svc-vocera permit queue high ip access-list session icmp-acl
any any svc-icmp permit ip access-list session sip-acl any any svc-sip-udp permit queue high any any svc-sip-tcp permit queue high ip access-list session https-acl any any svc-https permit
1136 | Behavior and Defaults

Description
This firewall rule controls which users will be added to the user-table of the controller through untrusted interfaces. Only IP addresses permitted by this ACL will be admitted to the system for further processing. If a client device attempts to use an IP address that is denied by this rule, the client device will be ignored by the controller and given no network access. You can use this rule to restrict foreign IP addresses from being added to the user-table.
This policy should not be applied to any user role, it is an internal system policy.
Use for Vocera VoIP devices to automatically permit and prioritize Vocera traffic.
Permits all ICMP traffic.
Use for SIP VoIP devices to automatically permit and prioritize all SIP control and data traffic.
Permits all HTTPS traffic.
Dell Networking W-Series ArubaOS 6.4.x | User Guide

Predefined Policy ip access-list session dns-acl any any svc-dns permit ip access-list session logon-control user any udp 68 deny any any svc-icmp permit any any svc-dns permit any any svc-dhcp permit any any svc-natt permit
ip access-list session srcnat user any any src-nat
ip access-list session skinny-acl any any svc-sccp permit queue high
ip access-list session tftp-acl any any svc-tftp permit ip access-list session guest ip access-list session dhcp-acl any any svc-dhcp permit
Dell Networking W-Series ArubaOS 6.4.x | User Guide

Description
Permits all DNS traffic.
The default preauthentication role that should be used by all wireless clients. Prohibits the client from acting as a DHCP server. Permits all ICMP, DNS, and DHCP. Also permits IPsec NAT-T (UDP 4500). Remove NAT-T if not needed.
This policy can be used to sourceNAT all traffic. Because no NAT pool is specified, traffic that matches this policy will be source NATed to the IP address of the controller.
Use for Cisco Skinny VoIP devices to automatically permit and prioritize VoIP traffic.
Permits all TFTP traffic.
This policy is not used.
Permits all DHCP traffic. If DHCP is not allowed, clients will not be able to request or renew IP addresses.
Behavior and Defaults | 1137

Predefined Policy ip access-list session http-acl any any svc-http permit ip access-list session svp-acl any any svc-svp permit queue high user host 224.0.1.116 any permit
ip access-list session noe-acl any any svc-noe permit queue high
ip access-list session h323-acl any any svc-h323-tcp permit queue high any any svc-h323-udp permit queue high
ipv6 access-list session v6-control user any udp 68 deny any any svc-v6-icmp permit any any svc-v6-dhcp permit any any svc-dns permit any any svc-tftp permit ipv6 access-list session v6-icmp-acl any any svc-v6-icmp permit ipv6 access-list session v6-https-acl any any svc-https permit ipv6 access-list session v6-dhcp-acl any any svc-v6-dhcp permit ipv6 access-list session v6-dns-acl any any svc-dns permit ipv6 access-list session v6-allowall any any any permit
1138 | Behavior and Defaults

Description
Permits all HTTP traffic.
Use for Spectralink VoIP devices to automatically permit and prioritize Spectralink Voice Protocol (SVP).
Use for Alcatel NOE VoIP devices to automatically permit and prioritize NOE traffic.
Use for H.323 VoIP devices to automatically permit and prioritize H.323 traffic.
Provides equivalent functionality to the "control" policy, but for IPv6 clients.
Permits all ICMPv6 traffic.
Permits all IPv6 HTTPS traffic.
Permits all IPv6 DHCP traffic.
Permits all IPv6 DNS traffic.
Permits all IPv6 traffic.
Dell Networking W-Series ArubaOS 6.4.x | User Guide

Predefined Policy
ipv6 access-list session v6-http-acl any any svc-http permit
ipv6 access-list session v6-tftp-acl any any svc-tftp permit
ipv6 access-list session v6-logon-control user any udp 68 deny any any svc-v6-icmp permit any any svc-v6-dhcp permit any any svc-dns permit

Description
Permits all IPv6 HTTP traffic.
Permits all IPv6 TFTP traffic.
Provides equivalent functionality to the "logoncontrol" policy, but for IPv6 clients.

Validuser and Logon-control ACLs
Default firewall rules for both the validuser and logon-control ACLs prevent malicious users from ip spoofing source addresses the default firewall rule in the validuser ACL causes the packet to be dropped.
A client with the correct source address can send traffic to the below networks as a destination IP address. To deny traffic, the default firewall rule added to logon-control ACL denies traffic to the reserved addresses from user with the logon role.
The following networks can be blocked by the default firewall rules in both the validuser and logon-control ACLs:
l Network packets where the source address of the network packet is defined as being on a broadcast network (source address == 255.255.255.255)
l Network packets where the source address of the network packet is defined as being on a multicast network (source address = 224.0.0.0 ­ 239.255.255.255)
l Network packets where the source address of the network packet is defined as being a loopback address (127.0.0.1 through 127.255.255.254)
l Network packets where the source or destination address of the network packet is a link-local address (169.254.0.0/16)
l Network packets where the source or destination address of the network packet is defined as being an address "reserved for future use" as specified in RFC 5735 for IPv4; (240.0.0.0/4)
l Network packets where the source or destination address of the network packet is defined as an "unspecified address"(::/128) or an address "reserved for future definition and use"(addresses other than 2000::/3) as specified in RFC 3513 for IPv6. The IPv6 "an unspecified address"(::/128) is currently being checked in datapath and the packet is dropped. This is the default behavior and you can view the logs by enabling firewall enable-per-packet-logging configuration.
Roles
The following are predefined roles.
If you upgrade from a previous ArubaOS release, your existing configuration may have additional or different predefined roles. The information in this section only describes the predefined roles for this release.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Behavior and Defaults | 1139

Table 253: Predefined Roles Predefined Role
user-role ap-role session-acl control session-acl ap-acl
user-role default-vpn-role session-acl allowall ipv6 session-acl v6-allowall
user-role voice session-acl sip-acl session-acl noe-acl session-acl svp-acl session-acl vocera-acl session-acl skinny-acl session-acl h323-acl session-acl dhcp-acl session-acl tftp-acl session-acl dns-acl session-acl icmp-acl
user-role guest session-acl http-acl session-acl https-acl session-acl dhcp-acl session-acl icmp-acl session-acl dns-acl ipv6 session-acl v6-http-acl ipv6 session-acl v6-https-acl ipv6 session-acl v6-dhcp-acl ipv6 session-acl v6-icmp-acl ipv6 session-acl v6-dns-acl
user-role guest-logon captive-portal default session-acl logon-control session-acl captiveportal
1140 | Behavior and Defaults

Description This is an internal role and should not be edited. This is the default role used for VPN-connected clients. It is referenced in the default "aaa authentication vpn" profile. This role can be applied to voice devices in order to automatically permit and prioritize all VoIP protocols.
This is a default role for guest users. It permits only HTTP, HTTPS, DHCP, ICMP, and DNS for the guest user. To increase security, a "deny" rule for internal network destinations could be added at the beginning.
This role is used as the pre-authentication role for guest SSIDs. It allows control traffic such as DNS, DHCP, and ICMP, and also enables captive portal.
Dell Networking W-Series ArubaOS 6.4.x | User Guide

Predefined Role user-role <ssid>-guest-logon captive-portal default session-acl logon-control session-acl captiveportal
user-role stateful-dot1x
user-role authenticated session-acl allowall ipv6 session-acl v6-allowall
user-role logon session-acl logon-control session-acl captiveportal session-acl vpnlogon ipv6 session-acl v6-logon-control
user-role <ssid>-logon session-acl control session-acl captiveportal session-acl vpnlogon
user-role <ssid>-captiveportal-profile

Description
This role is only generated when creating a new WLAN using the WLAN Wizard. The WLAN Wizard creates this role when captive portal is enabled. This is the initial role that a guest will be placed in prior to captive portal authentication. By using a different guest logon role for each SSID, it is possible to enable multiple captive portal profiles with different customization.
This is an internal role used for Stateful 802.1x. It should not be edited.
This is a default role that can be used for authenticated users. It permits all IPv4 and IPv6 traffic for users who are part of this role.
This is a system role that is normally applied to a user prior to authentication. This applies to wired users and non-802.1x wireless users.
The role allows certain control protocols such as DNS, DHCP, and ICMP, and also enables captive portal and VPN termination/pass through. The logon role should be edited to provide only the required services to a preauthenticated user. For example, VPN pass through should be disabled if it is not needed.
This role is only generated when creating a new WLAN using the WLAN Wizard. The WLAN Wizard creates this role when captive portal is enabled and a PEFNG license is installed. This is the initial role that a client will be placed in prior to captive portal authentication. By using a different logon role for each SSID, it is possible to enable multiple captive portal profiles with different customization.
When utilizing the WLAN Wizard and you do not have a PEF NG installed and you are configuring an Internal or Guest WLAN with captive portal enabled, the controller creates an implicit user role with the same name as the captive portal profile, <ssid>-captiveportal-profile.
This implicit user role allows only DNS and DHCP traffic between the client and network and directs all HTTP or HTTPS requests to the captive portal. You cannot directly modify the implicit user role or its rules. Upon authentication, captive portal clients are allowed full access to their assigned VLAN. Once the WLAN configuration is pushed to the controller, the WLAN wizard will associate the new role with the initial user role that you specify in the AAA profile. This role will not be visible to the user in the WLAN wizard.

Understanding Default Management User Roles
The ArubaOS software includes predefined management user roles.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Behavior and Defaults | 1141

If you upgrade from a previous ArubaOS release, your existing configuration may have different management roles. The information in this section only describes the predefined management roles for this release.

Table 254: Predefined Management Roles

Predefined Role

Permissions

root

This role permits access to all management functions (commands and

operations) on the controller.

read-only

This role permits access to CLI show commands or WebUI monitoring pages only.

guest-provisioning

This role permits access to configuring guest users in the controller's internal database only. This user only has access via the WebUI to create guest accounts; there is no CLI access.
Guest-provisioning tasks include creating or generating the user name and password for a guest account as well as configuring when the account expires.

location-api-mgmt

This role permits access to location API information and the CLI; however, you cannot use any CLI commands. This role does not permit access to the WebUI.
Using a third-party location appliance, you can gather information about the location of 802.11 stations.
To log in to the controller using a third-party location appliance, enter: http[s]://<ipaddress>[:port]/screens/wms/wms.login.
You are prompted to enter your username and password (for example, the username and password associated with the location API management role). Once authenticated, you can use an API call to request location information from the controller, for example:
http[s]://<ipaddress>[:port]/screens/wms/wms.cgi?opcode=wlm-getspot&campus-name=<campus id>&building-name<building id>&mac=<client1>,<client2>....

network-operations

1142 | Behavior and Defaults

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Predefined Role
network-operations (continued)

Permissions
Monitoring > Network > All Access PointsMonitoring > Network > All Wired Access Points You can view the reports created by the following CLI commands: l DB:opcode=monitor-summary l DB:opcode=cr-load l DB:opcode=wlm-search&class=probes&start l DB:opcode=wlm-search&class=amii l DB:opcode=monitor-get-all-gps&status=any l show ap-group l show vlan status Monitoring > Controller > Controller Summary You can view the reports created by the following CLI commands: l show switches l show switches summary Monitoring > Controller > Air Monitors You can view the reports created by the following CLI commands: l show wlan-ap start* Monitoring > Controller > Clients You can view the reports created by the following CLI commands: l show ip mobile host l show ip mobile trail {<ipaddr> | <macaddr>} l <span class="CLI">show ap essid</span> l show esi servers l show esi ping l show esi parser stats l show private port status* l show vlan l show port stats l show spanning-tree interface fastethernet <slot/port> l show interface fastethernet <slot/port> counters l clear counters fastethernet <slot/port> l show snmp trap-queue <page> Monitoring > Controller > Clients > Packet CaptureMonitoring >Controller > Clients > LocateMonitoring > Controller > Clients > Debug You can view the reports created by the following CLI commands:

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Behavior and Defaults | 1143

Predefined Role

Permissions

l aaa user debug mac Monitoring > Controller> Clients > Disconnect You can view the reports created by the following CLI commands: l stm kick-off-sta <macaddr> l aaa user logout <ipaddr>

network-operations (continued)

Monitoring > Controller> Clients > Blacklist You can view the reports created by the following CLI commands: l stm add-blacklist-client <macaddr> l aaa user delete {<ipaddr> | all | mac <macaddr> | name
<username> | role <role>} Monitoring > Controller > Blacklist Clients You can view the reports created by the following CLI commands: l stm remove-blacklist-client <macaddr> Monitoring > Controller > External Services Interface You can view the reports created by the following CLI commands: l show esi groups l show esi servers l show esi ping l show esi parser stats Monitoring > Controller > Ports You can view the reports created by the following CLI commands: l show model-switch-internal* l show slots l show private port status* l show vlan Monitoring > Controller> Inventory You can view the reports created by the following CLI commands: l show keys Monitoring > WLAN You can view the reports created by the following CLI commands: l DB:opcode=get-permissions l DB:opcode=cr-load l show switches l show switches summary Monitoring > Voice

1144 | Behavior and Defaults

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Predefined Role

Permissions
You can view the reports created by the following CLI commands: l show ap association voip-only l show ap active voip-only l show voice call-counters l show voice client status l show voice call-quality l show voice call-density l show voice call-cdrs l show voice call-perf

Understanding Default Open Ports
By default, Dell controllers and access points treat ports as untrusted. However, certain ports are open by default only on the trusted side of the network. These open ports are listed in Table 255.

Table 255: Default (Trusted) Open Ports

Port Number

Protocol

Where Used

17

TCP

controller

Description
This is used for certain types of VPN clients that accept a banner (QOTD). During normal operation, this port will only accept a connection and immediately close it.

21

TCP

controller

22

TCP

controller

SSH

23

TCP

AP and

Telnet is disabled by default but the port is still open.

controller

53

UDP

controller

Internal domain.

67

UDP

AP (and

DHCP server.

controller if

DHCP server is

configured)

68

UDP

AP (and

DHCP client.

controller if

DHCP server is

configured)

69

UDP

controller

TFTP

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Behavior and Defaults | 1145

Port Number
80

Protocol TCP

123

UDP

161

UDP

443

TCP

500 514 1701 1723 2300

UDP UDP UDP TCP TCP

3306

TCP

4343, 443 TCP

4500

UDP

Where Used AP and controller controller AP and controller controller
controller controller controller controller controller controller controller
controller

Description
Used for remote packet capture where the capture is saved on the access point. Provides access to the WebUI on the controller.
NTP
SNMP. Disabled by default.
Used internally for captive portal authentication (HTTPS) and is exposed to wireless users. A default selfsigned certificate is installed in the controller. Users in a production environment are urged to install a certificate from a well known CA such as Verisign. Self-signed certs are open to man-in-the-middle attacks and should only be used for testing. Required for VIA: During the initializing phase, VIA uses HTTPS connections to perform trusted network and captive portal checks against the controller. It is mandatory that you enable port 443 on your network to allow VIA to perform these checks.
ISAKMP
Syslog
L2TP
PPTP
Internal terminal server opened by telnet soe command.
Remote wired MAC lookup.
HTTPS.Both port 4343 and 443 are supported. If port 4343 is used it redirects to port 443. If port 443 is used it continues to connect using this port. A default selfsigned certificate is installed in the controller. Users in a production environment are urged to install a certificate from a well known CA such as Verisign. Self-signed certs are open to man-in-the-middle attacks and should only be used for testing
sae-urn Required for VIA: During the initializing phase, VIA uses HTTPS connections to perform trusted network and captive portal checks against the controller. It is mandatory that you enable port 4500 on your network to allow VIA to perform these checks.

1146 | Behavior and Defaults

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Port Number
8080

Protocol TCP

8081

TCP

8082 8083 8088 8200 8211 8888

TCP TCP TCP UDP UDP TCP

Where Used controller controller
controller controller controller controller controller controller

Description
Used internally for captive portal authentication (HTTPproxy). This port is not exposed to wireless users.
Used internally for captive portal authentication (HTTPS). Not exposed to wireless users. A default selfsigned certificate is installed in the controller. Users in a production environment are urged to install a certificate from a well known CA such as Verisign. Self-signed certs are open to man-in-the-middle attacks and should only be used for testing.
Used internally for single sign-on authentication (HTTP). Not exposed to wireless users.
Used internally for single sign-on authentication (HTTPS). Not exposed to wireless users.
For internal use.
The Aruba Discovery Protocol (ADP)
For internal use.
Used for HTTP access.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Behavior and Defaults | 1147

Chapter 46 DHCP with Vendor-Specific Options
This chapter describes how to configure several DHCP vendor-specific options. Topics in this chapter include: l Configuring a Windows-Based DHCP Server on page 1148 l Enabling DHCP Relay Agent Information Option (Option 82) on page 1151 l Enabling Linux DHCP Servers on page 1152
Configuring a Windows-Based DHCP Server
Configuring a Microsoft Windows-based DHCP server to send option 43 to the DHCP client on a Dell AP consists of the following two tasks: l Configuring Option 60 l Configuring Option 43 DHCP servers are a popular way of configuring clients with basic networking information such as an IP address, a default gateway, network mask, DNS server, and so on. Most DHCP servers have the ability to also send a variety of optional information, including the Vendor-Specific Option Code, also called option 43. When a client or an AP requests for option 43 (Vendor Specific Information), the controller responds with the value configured by administrator in the DHCP pool.
Configuring Option 60
This section describes how to configure the Vendor Class Identifier Code (option 60) on a Microsoft Windowsbased DHCP server. As mentioned in the overview section, option 60 identifies and associates a DHCP client with a particular vendor. Any DHCP server configured to take action based on a client's vendor ID should also have this option configured. Since option 60 is not a predefined option on a Windows DHCP server, you must add it to the option list for the server.
Configuring Option 60 using the Windows DHCP Server
1. On the DHCP server, open the DHCP server administration tool by clicking Start > AdministrativeTools > DHCP.
2. Find your server and right-click on the scope to be configured under the server name. Select Set Predefined Options.
3. In the Predefined Options and Values dialog box, click Add. 4. In the Option Type dialog box, enter the following information

Dell Networking W-Series ArubaOS 6.4.x| User Guide

DHCP with Vendor-Specific Options | 1148

Table 256: Configuring Option 60 using the Windows DHCP Server

Field

Information

Name

Dell Access Point

Data Type

String

Code

60

Description

Dell AP vendor class identifier

5. Click OK to save this information. 6. In the Predefined Options and Values dialog box, make sure 060 Dell Access Point is selected from the
Option Name drop-down list. 7. In the Value field, enter the following information:
String : DellAP 8. Click OK to save this information. 9. Under the server, select the scope you want to configure and expand it. Select Scope Options, then select
Configure Options. 10.In the Scope Options dialog box, scroll down and select 060 Dell Access Point. Confirm the value is set to
DellAP and click OK. 11.Confirm that the option 060 Dell Access Point is listed in the right pane.
Configuring Option 43
Configuring Option 43 returns the IP address of the Dell master controller to a Dell DHCP client. This information allows Dell APs to auto-discover the master controller and obtain their configuration.
Configuring Option 43 using the Windows DHCP Server:
1. On the DHCP server, open the DHCP server administration tool by clicking Start > Administration Tools > DHCP.
2. Find your server and right-click on the scope to be configured under the server name. Click on the Scope Options entry and select Configure Options.
3. In the Scope Options dialog box (Figure 237), scroll down and select 043 Vendor Specific Info.

1149 | DHCP with Vendor-Specific Options

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Figure 237 Scope Options Dialog Box.

4. In the Data Entry field, click anywhere in the area under the ASCII heading and enter the following information: ASCII : Loopback address of the master controller
5. Click the OK to save the configuration.
Option 43 is configured for this DHCP scope. Note that even though you entered the IP address in ASCII text, it displays in binary form.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

DHCP with Vendor-Specific Options | 1150

Figure 238 DHCP Scope Values

Enabling DHCP Relay Agent Information Option (Option 82)
The DHCP Relay Agent Information option (Option 82) allows the DHCP Relay Agent to insert circuit specific information into a request that is being forwarded to a DHCP server. The controller, when acting as a DHCP relay agent, inserts information about the AP and SSID through which a client is connecting into the DHCP request. Many service providers use this mechanism to make access control decisions.
Configuring Option 82
You can configure Option 82 using the WebUI or the CLI. You can include only the MAC address or MAC address and ESSID. The MAC address is the hardware address and ESSID is an alphanumeric name that uniquely identifies a wireless network.
In the WebUI
1. Navigate to Configuration > Network > IP > IP Interfaces. 2. Click Edit next to the VLAN ID for which you want to configure Option 82. 3. Under DHCP Helper Address select Mac or Mac Essid from the Option-82 drop-down menu. 4. Click Apply.
In the CLI
Use the interface vlan option-82 option to enable Option 82 for a VLAN using ESSID. You can include only the MAC address or MAC address and ESSID.

1151 | DHCP with Vendor-Specific Options

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Enabling Linux DHCP Servers
The following is an example configuration for the Linux dhcpd.conf file. After you enter the configuration, you must restart the DHCP service.
option serverip code 43 = ip-address; class "vendor-class" {
match option vendor-class-identifier; } . . . subnet 10.200.10.0 netmask 255.255.255.0 {
default-lease-time 200; max-lease-time 200; option subnet-mask 255.255.255.0; option routers 10.200.10.1; option domain-name-servers 10.4.0.12; option domain-name "vlan10.aa.mycorpnetworks.com"; subclass "vendor-class" "ArubaAP" {
option vendor-class-identifier "ArubaAP"; # # option serverip <loopback-IP-address-of-master-controller> #
option serverip 10.200.10.10; } range 10.200.10.200 10.200.10.252; }

Dell Networking W-Series ArubaOS 6.4.x | User Guide

DHCP with Vendor-Specific Options | 1152

Chapter 47 802.1X Configuration for IAS and Windows Clients

This chapter provides examples of how to configure a Microsoft Internet Authentication Server, and a Windows XP wireless client for 802.1X authentication with the controller (see 802.1X Authentication on page 326). for information about configuring the controller For more information about configuring computers in a Windows environment for PEAP-MS-CHAPv2 and EAPTLS authentication, see the Microsoft document Step-by-Step Guide for Setting Up Secure Wireless Access in a Test Lab, available from Microsoft's Download Center (at microsoft.com/downloads. Additional information on client configuration is available at microsoft.com/technet/prodtechnol/winxppro/maintain/wificomp.mspx#EQGAC. This chapter describes the following topics: l Configuring Microsoft IAS on page 1153 l Configuring Management Authentication using IAS on page 1155 l Window XP Wireless Client Sample Configuration on page 1157
Configuring Microsoft IAS
Microsoft Internet Authentication Server (IAS) provides authentication functions for the wireless network. IAS implements the RADIUS protocol, which is used between the Dell controller and the server. IAS uses Active Directory as the database for looking up computers, users, passwords, and group information.
RADIUS Client Configuration
Each device in the network that needs to authenticate to a RADIUS server must be configured as a RADIUS client. You must configure the Dell controller as a RADIUS client.
The steps to perform this task may very depending on the version of Windows currently running on your server. For complete details on configuring Windows IAS, refer to the Windows documentation available (at microsoft.com/downloads).
To configure a RADIUS client: 1. From your windows server, navigate to Start > Settings > Control Panel > Administrative
Tools>Internet Authentication Service. 2. In the Internet Authentication Service window, select RADIUS Clients. 3. To configure a RADIUS client, select Action > New RADIUS Client from the menu at the top of the
window. 4. In the New RADIUS Client dialog window, enter the name and IP address for the controller. Click Next. 5. In the next window that appears, enter and confirm a shared secret. The shared secret is configured on
both the RADIUS server and client, and ensures that an unauthorized client cannot perform authentication against the server. 6. Click Finish.
Remote Access Policies
The IAS policy configuration defines all policies related to wireless access, including time of day restrictions, session length, authentication type, and group-related policies. See Microsoft product documentation for

Dell Networking W-Series ArubaOS 6.4.x| User Guide

802.1X Configuration for IAS and Windows Clients | 1153

detailed descriptions and explanations of IAS policy settings.
Active Directory Database
The Active Directory database serves as the master authentication database for both the wired and wireless networks. The IAS authentication server bases all authentication decisions on information in the Active Directory database. IAS is normally used as an authentication server for remote access and thus looks to the Active Directory "Remote Access" property to determine whether authentication requests should be allowed or denied. This property is set on a per-user or per-computer basis. For a user or computer to be allowed access to the wireless network, the remote access property must be set to "Allow access".
The authentication policy configured in IAS depends on the group membership of the computer or user in Active Directory. These policies are responsible for passing group information back to the controller for use in assigning computers or users to the correct role, which determines their network access privileges. When the IAS server receives a request for authentication, it compares the request with the list of remote access policies. The first policy to match the request is executed; additional policies are not searched.
Configuring Policies
The policies in this 802.1x authentication example are designed to work by examining the username portion of the authentication request, searching the Active Directory database for a matching name, and then examining the group membership for a computer or user entry that matches. For example, the following policies would operate with the controller configuration shown in Configuring Authentication with an 802.1X RADIUS Server on page 339:
l The Wireless-Computers policy matches the "Domain Computers" group. This group contains the list of all computers that are members of the domain. This group is used for all computers to authenticate to the network.
l The Wireless-Student policy matches the "Student" group. This group is used for all student users. l The Wireless-Faculty policy matches the "Faculty" group. This group is used for all faculty users. l The Wireless-Sysadmin policy matches the "Sysadmin" group. This group is used for system administrators.
In addition to matching the respective group, the policy also specifies that the request must be from an 802.11 wireless device. The policy instructs IAS to grant remote access permission if all the conditions specified in the policy match, a valid username/password is supplied, the user's or computer's remote access permission is set to "Allow".
To configure a policy:
1. In the Internet Authentication Service window, select Remote Access Policies. 2. To add a new policy, select Action > New Remote Access Policy. This launches a wizard that steps you
through configuring the remote access policy. 3. Click Next on the initial wizard window to proceed. 4. Enter the name for the policy, for example, "Wireless Computers" and click Next. 5. In the Access Method window, select the Wireless option, then click Next. 6. in the User or Group Access window, select Group and click Add to add the group of users to which this
policy applies (for example, "Domain Computers"). Click Next. 7. For Authentication Methods, select either Protected EAP (PEAP) or Smart Card or other certificate. 8. Click Configure to select additional properties. 9. Select a server certificate. The list of available certificates is taken from the computer certificate store on
which IAS is running. In this case, a self-signed certificate was generated by the local certificate authority and installed on the IAS system. On each wireless client device, the local certificate authority is added as a trusted certificate authority, thus allowing this certificate to be trusted.

1154 | 802.1X Configuration for IAS and Windows Clients

Dell Networking W-Series ArubaOS 6.4.x | User Guide

10.For PEAP, select the "inner" authentication method. The authentication method shown is MS-CHAPv2. (Because password authentication is being used on this network, this is the only EAP authentication type that should be selected.) You can also enable fast reconnect in this screen. If you enable fast reconnect here and also on client devices, additional time can be saved when multiple authentications take place (such as when clients are roaming between APs frequently) because the server will keep the PEAP encrypted tunnel alive.
11.Click OK.
Configuring RADIUS Attributes
In the configuration example for 802.1x, the controller restricts network access privileges based on the group membership of the computer or user. In order for this to work, the controller must be told to which group the user belongs. This is accomplished using RADIUS attributes returned by the authentication server.
To configure RADIUS attributes:
1. In the Internet Authentication Service window, select Remote Access Policies. 1. Open the remote access policy you want to configure, and select the Advanced tab. 2. Click Add to configure an attribute. 3. Select the Class attribute. 4. Enter the value for this attribute. For example, for the Wireless-Computers policy, the Class attribute
returned to the controller should contain the value "computer". 5. Click OK. 6. Click OK.
Another example of a Class attribute configuration is shown below for the "Wireless-Student" policy. This policy returns the RADIUS attribute Class with the value "student" upon successful completion.
Configuring Management Authentication using IAS
Before you can configure the controller for management authentication using Windows IAS, you must perform the following steps to configure a Windows IAS RADIUS server on your Windows client.
The steps to perform this task may very depending on the version of Windows currently running on your server. For complete details on configuring Windows IAS, refer to the Windows documentation available at microsoft.com/downloads).
1. From your windows server, navigate to Start > Settings > Control Panel > Administrative Tools>Internet Authentication Service. The Internet Authentication Service window opens.
2. Verify that the Internet Authentication Service is running. If it is running, a green arrow icon will appear at the top of this window. If it has stopped, a red stop icon will appear. If the service is not active, click the green arrow icon to restart the service.
3. From the Internet Authentication Service window, right click the Radius Clients folder and select New Radius Client. The New RADIUS Client window opens.
4. Define a friendly name for the RADIUS client and enter the controller's IP address or DNS name. Click Next. 5. Enter and confirm the Shared Secret key for the controller then click Finish.
Next, create a remote policy for your new RADIUS client.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.1X Configuration for IAS and Windows Clients | 1155

Creating a Remote Policy
1. From the Internet Authentication Service window, right click the Remote Access Policies folder and select New Remote Access Policy.
2. The New Remote Access Policy Wizard opens. Click Next on the first window to start the wizard. 3. Select Use the wizard to set up a typical Policy for a common scenario and enter a name for the
policy, e.g Remote-Policy. Click Next. 4. In the Access Method window of the wizard, select the method you will use to gain management access to
the network. Click Next. 5. In the User or Group Access window of the wizard, select either user or group, depending upon how
your user permissions are defined. Click Next.
6. In the Authentication Method window, click the Type drop-down list and select Protected EAP (PEAP). Click Next.
7. Click Finish.
Now you must define properties for the remote policy you just created.
Defining Properties for Remote Policy
1. In the Internet Authentication Service window, click the Remote Access Policy icon. All configured remote access policies will appear in the right window pane.
2. Right-click the policy you just created, and select Properties. The Properties window opens. 3. Select the Grant remote access permission radio button, and click Edit Profile. The Edit Profile
window opens. 4. Click the Authentication tab and select the authentication methods that include MS-CHAP, MS-CHAP V2
and PAP. 5. Click Apply. 6. Click the Advanced tab. 7. Click Add. The Add Attribute window opens. 8. Scroll down the list of attributes and select Vendor-Specific, then click Add. The MultiValued Attribute
Information window appears. 9. Click Add again. 10.Enter the vendor code 14823 and select the option Yes, It conforms. 11.Click Configure Attribute. The Configure VSA window opens. 12.In the Vendor-assigned attribute number field, enter 3. 13.In the Attribute value field, enter 7. 14.Click OK to save your settings. 15.Click Apply. 16.Click Apply.
Now that you have defined your remote policy properties, you must create a user entry in the Windows active directory. The steps to complete this process will vary, depending on the version of Windows currently running on your server. The procedure below should be used only as a guideline.
Creating a User Entry in Windows Active Directory
1. Open the "Active Directory Users and Computers" tool on your Windows server. 2. Create a new user entry on the Windows Active directory. 3. Once you have created the new user, right-click the user name and select Properties.

1156 | 802.1X Configuration for IAS and Windows Clients

Dell Networking W-Series ArubaOS 6.4.x | User Guide

4. Click the Dial-in tab and select "Allow access" for the user. 5. Click Ok to save your settings.
Configure the Controller to use IAS Management Authentication
The following procedure describes the steps to configure the controller to user IAS management authentication. 1. Access the controller WebUI and navigate to Configuration>Authentication. 2. Select the Servers tab. 3. Select RADIUS Server. 4. Enter a name for the RADIUS server in the entry field in the right window pane, then click Add. 5. Select the RADIUS server you just created from the list of servers in the left window pane to display
configuration details for that server. 6. In the Host field, enter the IP address of the RADIUS server you want to use for Management
Authentication. 7. Enter and then retype the shared key for the server. 8. Click Apply 9. Select Server Group from the server list on the left window pane. 10.In the entry blank on the right window pane, enter the name of a new server group (for example,
"Management_group"), then click Add. 11.Click Apply. 12.Select the server group you just created from the list of server groups in the left window pane. 13.In the Servers section, click New. 14.Click the Server Name drop-down list and select your RADIUS server. 15.Click Apply.
Verify Communication between the Controller and the RADIUS Server
After you have configured your Windows Server and the Dell controller for Windows IAS Management Authentication, you can verify that the controller and server are communicating. 1. Navigate to Diagnostics>AAA Test Server. 2. Click the Server Name drop-down list and select the RADIUS server. 3. Select either MSCHAP-V2 or PAP as the authentication method. 4. Enter the user name and password in the Username and Password fields. 5. Click Begin Test. 6. If the controller displays the words Authentication Successful, then the controller is able to
communicate with the RADIUS server.
Window XP Wireless Client Sample Configuration
This section shows an example of how to configure a Windows XP wireless client using Windows XP's Wireless Zero Configuration service.
The following steps apply to a computer running Windows XP Professional Version 2002 with Service Pack 2. To configure a wireless client on other Windows platforms, see your Microsoft Windows documentation.
1. On the desktop, right-click My Network Places and select Properties.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.1X Configuration for IAS and Windows Clients | 1157

2. In the Network Connections window, right-click on Wireless Network Connection and select Properties. 3. Select the Wireless Networks tab. This screen displays the available wireless networks and the list of
preferred networks. Windows connects to the preferred networks in the order in which they appear in the list. 4. Click the Advanced button to display the Networks to access window. This window determines what types of wireless networks the client can access. By default, Windows connects to any type of wireless network. Make sure that the option Computer-to-computer (ad hoc) networks only is not selected. Click Close. 5. In the Wireless Networks tab, click Add to add a wireless network. 6. Click the Association tab to enter the network properties for the SSID.
This tab configures the authentication and encryption used between the wireless client and the Dell user-centric network. Therefore, the settings for the SSID that you configure on the client must match the configuration for the SSID on the controller.
l For an SSID using dynamic WEP, enter the following: n Network Authentication: Open n Data Encryption: WEP n Select the option "The key is provided for me automatically". Each client will use a dynamicallygenerated WEP key that is automatically derived during the 802.1x process.
l For an SSID using WPA, enter the following: n Network Authentication: WPA n Data Encryption: TKIP
l For an SSID using WPA-PSK, enter the following: n Network Authentication: WPA-PSK n Data Encryption: TKIP n Enter the pre-shared key.
l For an SSID using WPA2, enter the following: n Network Authentication: WPA2 n Data Encryption: AES
l For an SSID using WPA2-PSK, enter the following: n Network Authentication: WPA2-PSK n Data Encryption: AES n Enter the pre-shared key

Do not select the option "This is a computer-to-computer (ad hoc) network; wireless access points are not used".
7. Click the Authentication tab to enter the 802.1x authentication parameters for the SSID. This tab configures the EAP type used between the wireless client and the authentication server. Configure the following, as shown in : l Select Enable IEEE 802.1x authentication for this network. l Select Protected EAP (PEAP) for the EAP type. l Select Authenticate as computer when computer information is available. The client will perform computer authentication when a user is not logged in.

1158 | 802.1X Configuration for IAS and Windows Clients

Dell Networking W-Series ArubaOS 6.4.x | User Guide

l Do not select Authenticate as guest when user or computer information is unavailable. The client will not attempt to authenticate as a guest.
l Select Validate server certificate. This instructs the client to check the validity of the server certificate from an expiration, identity, and trust perspective.
l Select the trusted Certification Authority (CA) that can issue server certificates for the network.
l Select Secured password (EAP-MSCHAP v2) -- the PEAP "inner authentication" mechanism will be an MSCHAPv2 password.
l Select Enable Fast Reconnect to speed up authentication in some cases.
8. Under Select Authentication Method, click Configure to display the EAP-MSCHAPv2 Properties window. Select the option Automatically use my Windows logon name and password (and domain if any). This option specifies that the user's Windows logon information is used for authentication to the wireless network. This option allows the same logon credentials to be used for access to the Windows domain as well as the wireless network.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

802.1X Configuration for IAS and Windows Clients | 1159

Acronyms and Terms

Acronyms
The following table lists the acronyms and their definitions used in this guide.

Table 257: List of acronyms Acronym
ABR AC ACI ACL ADP AES AIFSN ALG AM AP APM ARM AVF A-MSDU BCMC BRAS BRE

Definition area border router access category adjacent channel interference access control list Aruba Discovery Protocol (ADP) advanced encryption standard arbitrary inter-frame space number application level gateway air monitor access point AP air monitor adaptive radio management AntiVirus Firewall aggregate MAC service data unit broadcast and multicast broadband remote access server basic regular expression

Dell Networking W-Series ArubaOS 6.4.x| User Guide

Acronyms and Terms | 1160

Acronym BPDU BSSID CA CAC CAP CCA CDP CDR CHAP CRL CSA CSMA/CA CSR CTS CW DAS DCF DES DHCP DS DSCP DSSS

Definition bridge protocol data unit basic service set identifier certification authority call admission control campus AP clear channel assessment Cisco Discovery Protocol call detail records Challenge Handshake Authentication Protocol certificate revocation list channel switch announcement carrier sense multiple access with collision avoidance certificate signing request clear to send contention window distributed antenna systems distributed coordination function data encryption standard Dynamic Host Configuration Protocol differentiated services differentiated services codepoint direct sequence spread spectrum

1161 | Acronyms and Terms

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Acronym DNS DoS DPD DR DU DMO EAP EAP-TLS EDCA EIRP ESI ESS ESSID FE FFT FHSS FIB FRER FRR FSPL FTP FQLN

Definition domain name system denial of service dead peer detection designated router data unit dynamic multicast optimization Extensible Authentication Protocol EAP-transport layer security enhanced distributed channel access effective isotropic radiated power external service interfaces extended service set extended service set identifier fast ethernet fast fourier transform frequency-hopping spread spectrum forwarding information base frame receive error rate frame retry rate free space path loss File Transfer Protocol fully qualified location name

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Acronyms and Terms | 1162

Acronym GRE GIS GMT GPP HMD HSPA HT IAS IDS IE IEEE IGMP IGP IKE PSK ISAKMP LACP LAG LD LDAP LEAP LI L2TP

Definition generic routing encapsulation generic interface specification Greenwich Mean Time guest provisioning page high mobility device high-speed packet access high throughput internet authentication server intrusion detection system information element Institute of Electrical and Electronics Engineer Internet Group Management Protocol Interior Gateway Routing Protocol internet key exchange pre-shared key Internet Security Association and Key Management Protocol Link Aggregation Control Protocol link aggregation group local debug Lightweight Directory Access Protocol Lightweight Extensible Authentication Protocol listening interval Layer-2 Tunneling Protocol

1163 | Acronyms and Terms

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Acronym MAC MCS MDPU MIB MIMO MMS MP MPP MPV MSCHAP MSCHAPv2 MSSID MPPE MTU NAS NAT NIC NOE NTP OCSP OFDM OKC

Definition media access control modulation and coding scheme MAC protocol data unit management information base multiple input, multiple output mobility management system mesh point mesh portal mesh private VLAN Microsoft Challenge Handshake Authentication Protocol MSCHAP version 2 mesh service set identifier Microsoft point-to-point encryption maximum transmission unit network access server network address translation network interface card new office environment Network Time Protocol Online Certificate Status Protocol orthogonal frequency division multiplexing opportunistic key caching

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Acronyms and Terms | 1164

Acronym OSPF OUI PAC PAP PAPI PFS PHB PIN PKI PMK PoE PSK PPPoE PPTP PVST QoS RADIUS RAP REGEX RF RFID RoW

Definition open shortest path first organizationally unique identifier protected access credential Password Authentication Protocol proprietary access protocol interface perfect forward secrecy per hop behavior personal identification number public key infrastructure pairwise master key power over ethernet pre-shared key point-to-point protocol over ethernet Point-to-Point Tunneling Protocol per VLAN spanning tree quality of service remote authentication dial-in user service remote AP region with the regular expression radio frequency radio frequency identification rest of world

1165 | Acronyms and Terms

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Acronym RSSI RSTP RTLS RTS SA SDR SIM SIP SNIR SNMP SSID STP STRAP SVP TFTP TIM TLS TOS TPM TSPEC TXOP UDP

Definition received signal strength indication Rapid Spanning Tree Protocol real-time locating systems request to send security association software-defined radio subscriber identity module Session Initiation Protocol signal-to-noise-and-interference ratio Simple Network Management Protocol service set identifier Spanning Tree Protocol secure thin remote access point spectralink voice priority Trivial File Transfer Protocol traffic indication map transport layer security type of service trusted platform module traffic specification opportunity to transmit User Datagram Protocol

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Acronyms and Terms | 1166

Acronym UTMS U-APSD VBA VIA VoFI VoIP VPN VRD VRRP VSA VTP WIDS WINS WIPS WISPr WLAN WMM WMS WSIRT WZC XAuth

Definition universal mobile telecommunication systems unscheduled automatic power save delivery virtual branch networking virtual intranet access voice over Wi-Fi voice over IP virtual private network validated reference design Virtual Router Redundancy Protocol vendor specific attributes Virtual Trunking Protocol wireless intrusion detection system windows internet naming service wireless intrusion prevention system wireless internet service provider roaming wireless local area network wireless multimedia WLAN management system wireless security incident response team wireless zero config extended authentication

Terms
The following table lists the terms and their definitions used in this guide.

1167 | Acronyms and Terms

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Table 258: List of terms Term 802.11 802.11a 802.11b 802.11d
802.11e
802.11g
802.11h

Definition
An evolving family of specifications for wireless LANs developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE). 802.11 standards use the Ethernet protocol and CSMA/CA (carrier sense multiple access with collision avoidance) for path sharing.
Provides specifications for wireless systems. Networks using 802.11a operate at radio frequencies in the 5GHz band. The specification uses a modulation scheme known as orthogonal frequency-division multiplexing (OFDM) that is especially well suited to use in office settings.
WLAN standard often called Wi-Fi; backward compatible with 802.11. Instead of the phase-shift keying (PSK) modulation method historically used in 802.11 standards, 802.11b uses complementary code keying (CCK), which allows higher data speeds and is less susceptible to multipath-propagation interference.
A wireless network communications specification for use in countries where systems using other standards in the 802.11 family are not allowed to operate. Configuration can be fine-tuned at the Media Access Control layer (MAC layer) level to comply with the rules of the country or district in which the network is to be used. Rules subject to variation include allowed frequencies, allowed power levels, and allowed signal bandwidth. 802.11d facilitates global roaming.
A proposed adaptation to the 802.11a and 802.11b specifications that enhances the 802.11 Media Access Control layer (MAC layer) with a coordinated time division multiple access (TDMA) construct, and adds error-correcting mechanisms for delay-sensitive applications such as voice and video. The 802.11e specification provides seamless interoperability between business, home, and public environments such as airports and hotels and offers all subscribers high-speed Internet access with full-motion video, high-fidelity audio, and Voice over IP (VoIP).
Offers transmission over relatively short distances at up to 54 megabits per second (Mbps), compared with the 11 Mbps theoretical maximum of 802.11b. 802.11g employs orthogonal frequency division multiplexing (OFDM), the modulation scheme used in 802.11a, to obtain higher data speed. Computers or terminals set up for 802.11g can fall back to speeds of 11 Mbps, so that 802.11b and 802.11g devices can be compatible within a single network.
Intended to resolve interference issues introduced by the use of 802.11a in some locations, particularly with military radar systems and medical devices. Dynamic frequency selection (DFS) detects the presence of other devices on a channel and automatically switches the network to another channel if and when such signals are detected. Transmit power control (TPC) reduces the radio-frequency (RF) output power of each network transmitter to a level that minimizes the risk of interference.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Acronyms and Terms | 1168

Term 802.11i 802.11j 802.11k 802.11n 802.11m 802.11 bSec
802.1X 1169 | Acronyms and Terms

Definition
Provides improved encryption for networks that use 802.11a, 802.11b, and 802.11g standards. Requires new encryption key protocols, known as Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES). Other features include key caching, which facilitates fast reconnection to the server for users who have temporarily gone offline, and pre-authentication, which allows fast roaming and is ideal for use with advanced applications such as Voice over Internet Protocol (VoIP).
Proposed addition to the 802.11 family of standards that incorporates Japanese regulatory extensions to 802.11a; the main intent is to add channels in the radio-frequency (RF) band of 4.9 GHz to 5.0 GHz. WLANs using 802.11j will provide for speeds of up to 54 Mbps, and will employ orthogonal frequency division multiplexing (OFDM). The specification will define how Japanese 802.11 family WLANs and other wireless systems, particularly HiperLAN2 networks, can operate in geographic proximity without mutual interference.
Proposed standard for how a WLAN should perform channel selection, roaming, and transmit power control (TPC) to optimize network performance. In a network conforming to 802.11k, if the access point (AP) having the strongest signal is loaded to capacity, a wireless device is connected to one of the under used APs. Even though the signal may be weaker, the overall throughput is greater because more efficient use is made of the network resources.
Wireless networking standard to improve network throughput over the two previous standards 802.11a and 802.11g with a significant increase in the maximum raw data rate from 54 Mbit/s to 600 Mbit/s with the use of four spatial streams at a channel width of 40 MHz.
An initiative to perform editorial maintenance, corrections, improvements, clarifications, and interpretations relevant to documentation for 802.11 family specifications. 802.11m also refers to the set of maintenance releases itself.
The bSec protocol is a pre-standard protocol that has been proposed to the IEEE 802.11 committee as an alternative to 802.11i. The difference between bSec and standard 802.11i is that bSec implements Suite B algorithms whenever possible. Notably, AES-CCM is replaced by AESCGM, and the Key Derivation Function (KDF) of 802.11i is upgraded to support SHA-256 and SHA-384.
To provide interoperability with standard Wi-Fi software drivers, bSec is implemented as a shim layer between standard 802.11 Wi-Fi and a Layer 3 protocol such as IP. A controller configured to advertise a bSec SSID will advertise an open network, however only bSec frames will be permitted on the network.
Standard designed to enhance 802.11 WLAN security. 802.1X provides an authentication framework, allowing a user to be authenticated by a central authority. The actual algorithm that is used to determine whether a user is authentic is left open and multiple algorithms are possible.
Dell Networking W-Series ArubaOS 6.4.x | User Guide

Term access point (AP) access point mapping
adhoc network A-MSDU band digital wireless pulse
evil twin
extensible authentication protocol (EAP)

Definition
An access point connects users to other users within the network and also can serve as the point of interconnection between the WLAN and a fixed wire network. The number of access points a WLAN needs is determined by the number of users and the size of the network.
The act of locating and possibly exploiting connections to WLANs while driving around a city or elsewhere. To do war driving, you need a vehicle, a computer (which can be a laptop), a wireless Ethernet card set to work in promiscuous mode, and some kind of an antenna which can be mounted on top of or positioned inside the car. Because a WLAN may have a range that extends beyond an office building, an outside user may be able to intrude into the network, obtain a free Internet connection, and possibly gain access to company records and other resources.
A LAN or other small network, especially one with wireless or temporary plug-in connections, in which some of the network devices are part of the network only for the duration of a communications session or, in the case of mobile or portable devices, while in some close proximity to the rest of the network.
A structure containing multiple MSDUs , transported within a single (unfragmented) data medium access control (MAC) protocol data unit (MPDU).
A specified range of frequencies of electromagnetic radiation.
Wireless technology for transmitting large amounts of digital data over a wide spectrum of frequency bands with very low power for a short distance. Ultra wideband radio can carry a huge amount of data over a distance up to 230 feet at very low power (less than 0.5 milliwatts), and has the ability to carry signals through doors and other obstacles that tend to reflect signals at more limited bandwidths and a higher power.
A home-made wireless access point that masquerades as a legitimate one to gather personal or corporate information without the enduser's knowledge. It's fairly easy for an attacker to create an evil twin by simply using a laptop, a wireless card and some readily-available software. The attacker positions himself in the vicinity of a legitimate Wi-Fi access point and lets his computer discover what name and radio frequency the legitimate access point uses. He then sends out his own radio signal, using the same name.
Authentication protocol for wireless networks that expands on methods used by the point-to-point protocol (PPP), a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Acronyms and Terms | 1170

Term fixed wireless frequency allocation frequency spectrum goodput
hot spot
hot zone
Infrared Data Association (IrDA)

Definition
Wireless devices or systems in fixed locations such as homes and offices. Fixed wireless devices usually derive their electrical power from the utility mains, unlike mobile wireless or portable wireless which tend to be battery-powered. Although mobile and portable systems can be used in fixed locations, efficiency and bandwidth are compromised compared with fixed systems.
Use of radio frequency spectrum regulated by governments.
Part of the electromagnetic spectrum.
Goodput is the ratio of the total bytes transmitted or received in the network to the total air time required for transmitting or receiving the bytes. The air time includes the retransmission time taken for both successful and dropped frames.Suppose 1000 frames of 1500 bytes each are transmitted in the network as follows:
l 50% of frames are transmitted successfully at MCS index 11 at 108 Mbps.
l 25% of the frames were dropped in the 1st attempt at 108 Mbps but were successfully transmitted using MCS index 3 at 54 Mbps in the second attempt.
l The remaining 25% are dropped in both the attempts.
Then the effective rate is calculated as: The total bits transmitted / the total air time. In this example: (500 * 1500 + 250 * 1500) * 8 / (total air time for 50% frames + total air time for 25 % frames retransmitted + total air time for 25% dropped frames) = 40.5 Mbps.
A WLAN node that provides Internet connection and virtual private network (VPN) access from a given location. A business traveller, for example, with a laptop equipped for Wi-Fi can look up a local hot spot, contact it, and get connected through its network to reach the Internet and their own company remotely with a secure connection. Increasingly, public places, such as airports, hotels, and coffee shops are providing free wireless access for customers.
A wireless access area created by multiple hot spots located in close proximity to each other. Hot zones usually combine public safety access points with public hot spots. Each hot spot typically provides network access for distances between 100 and 300 feet; various technologies, such as mesh network topologies and fiber optic backbones, are used in conjunction with the hot spots to create areas of coverage.
An industry-sponsored organization set up in 1993 to create international standards for the hardware and software used in infrared communication links. In this special form of radio transmission, a focused ray of light in the infrared frequency spectrum, measured in terahertz, or trillions of hertz (cycles per second), is modulated with information and sent from a transmitter to a receiver over a relatively short distance

1171 | Acronyms and Terms

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Term IR wireless microwave
MIMO
MISO
near field communication (NFC) optical wireless
OCSP Client OCSP Responder radio frequency (RF)

Definition
The use of wireless technology in devices or systems that convey data through infrared (IR) radiation. Infrared is electromagnetic energy at a wavelength or wavelengths somewhat longer than those of red light. The shortest-wavelength IR borders visible red in the electromagnetic radiation spectrum; the longest-wavelength IR borders radio waves.
Electromagnetic energy having a frequency higher than 1 gigahertz (billions of cycles per second), corresponding to wavelength shorter than 30 centimeters. Microwave signals propagate in straight lines and are affected very little by the troposphere. They are not refracted or reflected by ionized regions in the upper atmosphere. Microwave beams do not readily diffract around barriers such as hills, mountains, and large human-made structures.
An antenna technology for wireless communications in which multiple antennas are used at both the source (transmitter) and the destination (receiver). The antennas at each end of the communications circuit are combined to minimize errors and optimize data speed. MIMO is one of several forms of smart antenna technology, the others being MISO (multiple input, single output) and SIMO (single input, multiple output).
An antenna technology for wireless communications in which multiple antennas are used at the source (transmitter). The antennas are combined to minimize errors and optimize data speed. The destination (receiver) has only one antenna. MISO is one of several forms of smart antenna technology, the others being MIMO (multiple input, multiple output) and SIMO (single input, multiple output).
A short-range wireless connectivity standard (Ecma-340, ISO/IEC 18092) that uses magnetic field induction to enable communication between devices when they're touched together, or brought within a few centimeters of each other. The standard specifies a way for the devices to establish a peer-to-peer (P2P) network to exchange data.
The combined use of conventional radio-frequency (RF) wireless and optical fiber for telecommunication. Long-range links are provided by optical fiber and links from the long-range end-points to end users are accomplished by RF wireless or laser systems. RF wireless at ultra-high frequencies (UHF) and microwave frequencies can carry broadband signals to individual computers at substantial data speeds.
The ArubaOScontroller can act as an OCSP client and issues OCSP queries to remote OCSP responders located on the intranet or Internet.
The OCSP client retrieves certificate revocation status from an OCSP responder. The responder may be the certificate authority (CA) that has issued the certificate in question or it may be some other designated entity which provides the service on behalf of the CA.
Portion of electromagnetic spectrum in which electromagnetic waves are generated by feeding alternating current to an antenna.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Acronyms and Terms | 1172

Term
structured wireless-aware network (SWAN)

Definition
A technology that incorporates a WLAN into a wired wide-area network (WAN). SWAN technology can enable an existing wired network to serve hundreds of users, organizations, corporations, or agencies over a large geographic area. A SWAN is said to be scalable, secure, and reliable.

secure copy (SCP) transponder

Secured encrypted command to copy files across an ssh connection, Files can be copied from or to a remote server, and also from one remote server to another.
A wireless communications, monitoring, or control device that picks up and automatically responds to an incoming signal. The term is a contraction of the words transmitter and responder. Transponders can be either passive or active.

ultra high frequency (UHF)

International Telecommunication Union (ITU) band 9, 300-3000 MHz, 1m - 100 mm frequency wavelength.

ultra wideband (UVB)

Is a wireless technology for transmitting large amounts of digital data over a wide spectrum of frequency bands with very low power for a short distance. Ultra wideband broadcasts very precisely timed digital pulses on a carrier signal across a very wide spectrum (number of frequency channels) at the same time. UWB can carry a huge amount of data over a distance up to 230 feet at very low power (less than 0.5 milliwatts), and has the ability to carry signals through doors and other obstacles that tend to reflect signals at more limited bandwidths and a higher power.

virtual private network (VPN)

A network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. A VPN ensures privacy through security procedures and tunneling protocols such as the Layer Two Tunneling Protocol ( L2TP ). Data is encrypted at the sending end and decrypted at the receiving end.

voice over WLAN (VoWLAN)

A method of routing telephone calls for mobile users over the Internet using the technology specified in IEEE 802.11b. Routing mobile calls over the Internet makes them free, or at least much less expensive than they would be otherwise.

wideband code-division multiple access (W-CDMA)

Officially known as IMT-2000 direct spread; ITU standard derived from Code-Division Multiple Access (CDMA). W-CDMA is a third-generation (3G) mobile wireless technology that promises much higher data speeds to mobile and portable wireless devices than commonly offered in today's market.

Wi-Fi

A term for certain types of WLANs. Wi-Fi can apply to products that use any 802.11 standard. Wi-Fi has gained acceptance in many businesses, agencies, schools, and homes as an alternative to a wired LAN. Many airports, hotels, and fast-food facilities offer public access to Wi-Fi networks.

1173 | Acronyms and Terms

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Term WiMAX

Definition
A wireless industry coalition whose members organized to advance IEEE 802.16 standards for broadband wireless access (BWA) networks. WiMAX 802.16 technology is expected to enable multimedia applications with wireless connection and, with a range of up to 30 miles, enable networks to have a wireless last mile solution. According to the WiMAX forum, the group's aim is to promote and certify compatibility and interoperability of devices based on the 802.16 specification, and to develop such devices for the marketplace.

wired equivalent privacy (WEP)

A security protocol specified in 802.11b, designed to provide a WLAN with a level of security and privacy comparable to what is usually expected of a wired LAN. Data encryption protects the vulnerable wireless link between clients and access points; once this measure has been taken, other typical LAN security mechanisms such as password protection, end-to-end encryption, virtual private networks (VPNs), and authentication can be put in place to ensure privacy.

wireless

Describes telecommunications in which electromagnetic waves (rather than some form of wire) carry the signal over part or all of the communication path.

wireless abstract XML (WAX)

Describes telecommunications in which electromagnetic waves (rather than some form of wire) carry the signal over part or all of the communication path.

wireless application service provider (WASP)

Provides Web-based access to applications and services that would otherwise have to be stored locally and makes it possible for customers to access the service from a variety of wireless devices, such as a smartphone or personal digital assistant (PDA).

wireless ISP (WISP)

An internet service provider (ISP) that allows subscribers to connect to a server at designated hot spots (access points) using a wireless connection such as Wi-Fi. This type of ISP offers broadband service and allows subscriber computers, called stations, to access the Internet and the Web from anywhere within the zone of coverage provided by the server antenna, usually a region with a radius of several kilometers.

wireless service provider

A company that offers transmission services to users of wireless devices through radio frequency (RF) signals rather than through endto-end wire communication.

wireless local area network (WLAN)

A local area network (LAN) that users access through a wireless connection. 802.11 standards specify WLAN technologies. WLANs are frequently some portion of a wired LAN.

yagi antenna

A unidirectional antenna commonly used in communications when a frequency is above 10 MHz.

Dell Networking W-Series ArubaOS 6.4.x | User Guide

Acronyms and Terms | 1174


MadCap Flare V10; modified using iTextSharp 5.1.3 (c) 1T3XT BVBA