Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16...

321
Aruba Central User Guide

Transcript of Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16...

Page 1: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Aruba Central

Use

rG

uide

Page 2: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Revision 01 | June 2018 Aruba Central | User Guide

Copyright Information

© Copyright 2018 Hewlett Packard Enterprise Development LP.

Open Source Code

This product includes code licensed under the GNU General Public License, the GNU Lesser General PublicLicense, and/or certain other open source licenses. A complete machine-readable copy of the source codecorresponding to such code is available upon request. This offer is valid to anyone in receipt of this informationand shall expire three years following the date of the final distribution of this product version by HewlettPackard Enterprise Company. To obtain such source code, send a check or money order in the amount of US$10.00 to:

Hewlett Packard Enterprise CompanyAttn: General Counsel3000 Hanover StreetPalo Alto, CA 94304USA

Page 3: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Contents

Contents 3

About this Guide 16

Intended Audience 16

Related Documents 16

Conventions 16

Contacting Support 17

About Aruba Central 18

Key Features 18

Operational Modes and Interfaces 18

Supported Instant AP Platforms 19

Supported Instant AP Firmware Versions 20

Supported Switch Platforms 21

Getting Started 23

Signing up for Aruba Central 23

Accessing Portal 24

Adding Devices to Central 24

Zero Touch Provisioning 24

Manually Adding Devices 24

Creating Users 25

Adding Customer Accounts 26

Assigning Subscriptions 26

Enabling Automatic Assignment of Device Subscriptions 26

Manually Assigning Subscriptions to Devices 27

Provisioning Devices 27

Verifying and Configuring Ports 27

Aruba Central | User Guide Contents | 3

Page 4: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

4 | Contents Aruba Central | User Guide

Provisioning Instant APs 29

Provisioning Aruba Switches 29

Setting up Sites 29

Assigning Devices to Groups 30

Creating Additional Customer Accounts 31

Setting Country Code 31

Country Code Configuration in Central from UI 31

Setting Country Code At Group Level 32

Setting Country Code At Device Level 32

Country Code Configuration at Group Level from API 33

Removing Device(s) 34

Removing an Instant AP from the Access Points Table 34

Removing a Switch from the Switches Table 34

Removing a Device from the Device Inventory Page 34

User Interface 35

Standard Enterprise Portal 35

Left Navigation Pane 35

Filter bar 39

Data Pane 39

Notifications Pane 39

Need Help Bubble 39

Managed Service Portal 40

Left Navigation Pane 40

Filter bar 43

Data Pane 43

Notifications Pane 43

Need Help Bubble 43

Global Settings 44

Page 5: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Managing Groups 44

About Groups 44

Overview 44

Groups in the Managed Service Portal 46

Deployment Scenarios 46

Best Practices and Recommendations 53

Group Operations 53

Groups Dashboard 53

Creating a Group 54

Cloning a Group 54

Moving Devices between Groups 54

Deleting a Group 55

Assigning Devices to a Group in Standard Enterprise Portal 55

Mapping Devices to Groups in Managed Service Portal 55

Configuring Devices in Template Groups 55

Creating a Template Group 55

Creating a Configuration Template for Instant APs 56

Creating a Configuration Template for Aruba Switches 58

Editing a Template 59

Managing Variable Files 59

Viewing Configuration Status 63

Viewing Configuration Audit Page 64

Configuration Synchronization Errors 64

Template Errors 64

Local Overrides 64

Viewing Status for a Template Group 64

Viewing Status for Devices Assigned to a Template Group 65

Viewing Configuration Status for a UI Group 66

Viewing Configuration Status for Devices Assigned to a UI Group 66

Aruba Central | User Guide Contents | 5

Page 6: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

6 | Contents Aruba Central | User Guide

Backing up and Restoring Configuration Templates 66

Managing Sites 69

Overview 69

Sites Page 71

Creating a Site 71

Add Multiple Sites in Bulk 71

Assigning a Device to a Site 72

Converting Existing Labels to Sites 72

Editing a Site 72

Deleting a Site 73

Managing Labels 73

Device Classification 73

Labels Page 73

Device Inventory 75

Viewing Devices 75

Synchronizing Device Inventory 75

Adding Devices 76

Assigning Devices 76

Assigning Devices to a Group 77

Managing Subscriptions 78

Key Management 78

Subscription Assignment 79

Unassigning Subscription from Specific Device 80

Unassinging Subscription from Multiple Devices 80

Managing User Accounts and Roles 81

Role-Based Access 81

Application Permissions 82

Configuring Users 82

Adding a User 82

Page 7: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Editing a User 82

Deleting a User 82

Configuring Roles 83

Adding a Custom Role 83

Viewing User Role Details 83

Two-Factor Authentication 84

Monitoring & Reports 86

Network Overview 86

APs 87

APs Pane 87

AP Details 88

Switches 91

Switches Dashboard 91

Switches Pane 92

Switch Details 92

Stacks Dashboard 94

Stacks Pane 94

Stacks Details 95

Security 96

Viewing Rogue AP Detectors 96

Viewing Interfering AP Detectors 96

Viewing Intrusion Detection Attacks 97

Viewing WIDS Events 97

Label Health 98

Data Source 98

Page Views 98

Summary 99

Per Label Details 99

Aruba Central | User Guide Contents | 7

Page 8: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

8 | Contents Aruba Central | User Guide

Client Overview 101

Client Overview Page 102

Client Details 103

AppRF 104

Enabling AppRF™ Service 105

VisualRF 109

VisualRF Dashboard 109

Viewing Rogue Devices 113

Planning and Provisioning Devices 113

Printing a Bill of Materials Report 116

Alerts 117

Viewing the Alerts Summary and Acknowledging Alerts 117

Configuring Alerts 117

Reports 121

Types of reports 121

Creating a report 123

Generated Reports 124

Viewing generated reports 125

Editing a report 125

Deleting report(s) 125

Exporting a report 126

Wireless Management 127

Configuring AP Settings 127

Configuring External Antenna 129

EIRP and Antenna Gain 129

Configuring Antenna Gain 130

Adding an Instant AP 130

Deleting an Instant AP from the Network 130

Page 9: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Configuring System Parameters for Instant APs 130

Viewing Dual 5GHz Band Details for Instant APs 134

Enabling 802.1X Authentication on Uplink Ports of an Instant AP 135

Configuring Networks 135

Configuring a WLAN SSID Profile 135

Configuring Captive Portal Profiles for Guest Network 143

Splash Page Profiles 143

Configuring Wired Port Profiles for an Instant AP 149

Editing a Network Profile 151

Deleting a Network Profile 152

Configuring Time-Based Services 152

Before You Begin 152

Creating a Time Range Profile 152

Configuring ARM and RF Parameters 154

ARM Overview 154

Configuring ARM Features 155

Configuring Radio Parameters 157

Configuring IDS Parameters 158

Rogue APs 158

Configuring Wireless Intrusion Detection and Protection Policies 159

Containment Methods 161

Configuring Authentication and Security Parameters 162

Supported Authentication Methods 162

Supported Authentication Servers 166

External RADIUS Server 166

RADIUS Server Authentication with VSA 166

Internal RADIUS Server 167

Authentication Termination on Instant AP 167

Dynamic Load Balancing between Authentication Servers 167

Aruba Central | User Guide Contents | 9

Page 10: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

10 | Contents Aruba Central | User Guide

Configuring External Servers for Authentication 168

Configuring Authentication Parameters for Instant AP Management Users 170

Configuring Users 171

Configuring Roles and Policies for User Access Control 172

ACL Rules 172

Configuring Network Address Translation Rules 173

Configuring Access Rules for Network Services 173

Configuring User Roles 175

Configuring Derivation Rules 175

Configuring Firewall Settings for Protection from ARP Attacks 177

Configuring ACL Rules for Application Analytics 177

Configuring Web Policy Enforcement 178

Creating Custom URLs for Redirection 180

Creating a List of Error Page URLs 180

Configuring ACL Rules to Redirect Users to a Specific URL 180

Managing Inbound Traffic 180

Configuring ALG Protocols 181

Blacklisting Clients 182

Configuring VPN Networks 183

VPN Overview 183

Supported VPN Protocols 184

Configuring VPN Tunnels 184

Configuring IPsec Tunnel 184

Enabling Automatic Configuration of GRE Tunnel 185

Configuring GRE Tunnel Manually 186

Configuring an L2TPv3 Tunnel 187

Configuring Routing Profiles 188

Configuring DHCP and Client IP Assignment Modes 188

Configuring DHCP Scopes 188

Page 11: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Configuring DHCP Server for Client IP Assignment 193

Configuring Services 194

Configuring AirGroup Services 194

Configuring an Instant AP for RTLS Support 196

Configuring an Instant AP for ALE Support 196

ALE with Central 197

Enabling ALE support on an Instant AP 197

Managing BLE Beacons 197

Support for BLE Asset Tracking 197

Configuring OpenDNS Credentials 198

Configuring CALEA Server for Lawful Intercept Compliance 198

Configuring CALEA Server Details on an Instant AP 199

Integrating a Third-Party Network Firewall 199

Configuring an Instant AP for Network Integration 199

Configuring XML API Interface 200

Enabling AppRF™ Service 200

Configuring Uplinks 201

Uplink Interfaces 201

Uplink Preferences and Switching 204

Enforcing Uplinks 205

Setting an Uplink Priority 205

Enabling Uplink Pre-emption 205

Switching Uplinks based on the Internet Availability 206

Mobility and Client Management 206

Layer-3 Mobility for Instant AP Clients 206

Home agent load balancing 206

Configuring L3 mobility domain 207

Configuring Enterprise Domains 207

Configuring SNMP Parameters 208

Aruba Central | User Guide Contents | 11

Page 12: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

12 | Contents Aruba Central | User Guide

Configuring Community String for SNMP 208

Configuring SNMP Traps 209

Configuring Logs and TFTP Dump Servers 210

Configuring a Syslog Server 210

Configuring TFTP Dump Server 211

Resetting an AP 211

Rebooting APs 212

Configuring HTTP Proxy on Instant APs 212

Uploading and Mapping Instant AP Certificates 213

Uploading Certificate 213

Mapping Certificates 213

Wired Management 215

Aruba Switches 215

Adding Switches to Central 216

Assigning Groups 217

Configuring Devices in Template Groups 217

Creating a Template Group 217

Creating a Configuration Template for Instant APs 217

Creating a Configuration Template for Aruba Switches 220

Editing a Template 221

Managing Variable Files 221

Configuring Switches in UI Groups 225

Viewing Switch Details 225

Configuring Ports 226

Configuring VLANs 227

Adding VLAN Details 227

Editing the VLAN Details 228

Deleting VLAN Details 228

Page 13: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Configuring Access Policies 228

Configuring DHCP Pools 229

Adding a New DHCP Pool 229

Applying Configuration Changes through CLI Snippets 230

Configuring System Parameters for a Switch 231

Aruba Switch Stack 233

Provisioning Switch Stacks in Central 233

Configuring Switch Stacks 233

Monitoring Switch Stacks 234

Aruba Central APIs 237

API Gateway and NB APIs 237

API Gateway 238

Using OAuth 2.0 to Access API 238

Access and Refresh Tokens 238

Obtaining Tokens 239

Offline Token Mechanism 239

Authorization Code Grant 240

Refreshing a token 241

Example 242

Accessing APIs 243

Example 243

Viewing APIs 244

Viewing Tokens 244

Revoking Tokens 244

Adding a New Token 244

API Documentation 245

Maintenance 246

Managing Firmware Upgrades 246

Aruba Central | User Guide Contents | 13

Page 14: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

14 | Contents Aruba Central | User Guide

Viewing Firmware Details 246

Upgrading a Device 247

Forcing Firmware Upgrade 248

Viewing Audit Trails 248

Viewing Audit Trails in the Standard Enterprise Portal 248

Troubleshooting Devices 249

Troubleshooting Overview 249

Troubleshooting a Device 250

Guest Access 253

Guest Access Dashboard 253

Creating Apps for Social Login 254

Creating a Facebook App 254

Creating a Google App 255

Creating a Twitter App 256

Creating a LinkedIn App 256

Configuring a Cloud Guest Splash Page Profile 257

Adding a Cloud Guest Splash Page Profile 257

Customizing a Splash Page Design 261

Previewing and Modifying a Splash Page Profile 261

Localizing a Cloud Guest Portal 262

Associating a Splash Page Profile to an SSID 265

Configuring Visitor Accounts 266

Adding a visitor 266

Deleting Visitors 267

Downloading Visitor Account Details 267

Presence Analytics 268

Presence Analytics Overview 268

Service Subscription 268

Page 15: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Data Aggregation and Display 268

Using the Presence Analytics App 269

Analyzing Dashboard Contents 270

Setting RSSI Threshold and Dwell Time 273

Clarity 275

Clarity Application Overview 275

Enabling Clarity Service 275

Clarity Monitoring Dashboard 275

Activity 276

Insights 277

Troubleshooting 278

Glossary of Terms 279

Aruba Central | User Guide Contents | 15

Page 16: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Chapter 1About this Guide

This user guide describes the features supported by Aruba Central and provides detailed instructions to set upand configure devices such as Instant APs and Switches.

Intended AudienceThis guide is intended for system administrators who configure and monitor their wireless network usingCentral.

Related DocumentsIn addition to this document, the Central product documentation includes the following documents:

n Aruba Central Getting Started Guide

n Aruba Central Release Notes

ConventionsThe following conventions are used throughout this guide to emphasize important concepts:

Type Style Description

Italics This style is used to emphasize important terms and to mark the titles ofbooks.

System items This fixed-width font depicts the following:n Sample screen outputn System prompts

Table 1: Typographical Conventions

The following informational icons are used throughout this guide:

Indicates helpful suggestions, pertinent information, and important things to remember.

Indicates a risk of damage to your hardware or loss of data.

Indicates a risk of personal injury or death.

Aruba Central | User Guide About this Guide | 16

Page 17: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

17 | About this Guide Aruba Central | User Guide

Contacting Support

Main Site arubanetworks.com

Support Site support.arubanetworks.com

Airheads Social Forums and KnowledgeBase

community.arubanetworks.com

North American Telephone 1-800-943-4526 (Toll Free)1-408-754-1200

International Telephone arubanetworks.com/support-services/contact-support/

Software Licensing Site hpe.com/networking/support

End-of-life Information arubanetworks.com/support-services/end-of-life/

Security Incident Response Team Site: arubanetworks.com/support-services/security-bulletins/Email: [email protected]

Table 2: Contact Information

Page 18: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Chapter 2About Aruba Central

Aruba Central is a cloud-based platform that enables you to manage your Aruba Wi-Fi network. Designed as asoftware-as-a-service (SAAS) subscription, Central provides a standard web-based interface that allows you toconfigure and monitor multiple Aruba Wi-Fi networks from anywhere.

Key FeaturesCentral offers the following key features:

n Streamlined management of devices

n Dashboard for network view and client monitoring

n Application Analytics

n Easy grouping of devices

n Centralized configuration of APs and Switches

n Easy management of user accounts

n Subscription based access to devices

n Guest Wi-Fi access configuration

n Report Generation

n Troubleshooting devices

Operational Modes and InterfacesAruba offers the following variants of the Central web interface:

n Standard Enterprise mode—The Standard Enterprise interface is intended for customers who manage theirrespective accounts end to end. In the Standard Enterprise mode, the customers have complete access totheir accounts. They can also provision and manage their respective accounts.

n Managed Service mode—Central offers the Managed Service Portal for managed service providers whoneed to manage multiple customer networks. With Managed Service Portal, the MSP administrators canprovision customer accounts, allocate devices, assign licenses, and monitor customer accounts and theirnetworks. The administrators can also drill down to a specific tenant account and perform administrationand configuration tasks. The tenants can access only their respective accounts, and only those features andapplication services to which they have subscribed.

Browser Compatibility Matrix

To view the Central UI, ensure that JavaScript is enabled on the web browser.

Aruba Central | User Guide About Aruba Central | 18

Page 19: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

19 | About Aruba Central Aruba Central | User Guide

Browser Versions Operating System

Google Chrome 39.0.2171.65 or later Windows and Mac OS

Mozilla FireFox 34.0.5 or later Windows and Mac OS

Internet Explorer 11 Windows

Internet Explorer 10 Windows

Safari 8 Mac OS

Safari 7 Mac OS

Safari 5.1.7 Windows

Table 3: Browser compatibility matrix

Supported Instant AP PlatformsCentral supports the following Instant AP platforms:

n AP-344

n AP-345

n AP-374

n AP-375

n AP-377

n AP-318

n AP-303

n AP-303H

n AP-203H

n AP-203R/ AP-203RP

n AP-365

n AP-367

n IAP-304/305

n IAP-207

n IAP-334/335

n IAP-314/315

n IAP-324/325

n IAP-277

n IAP-228

n IAP-205H

n IAP-103

n IAP-114/115

n IAP-204

n IAP-205

n IAP-214/215

Page 20: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

n IAP-274/275

n IAP-224/225

n RAP-3WNP

n RAP-108/109

n RAP-155/155P

n IAP-175

n IAP-134/135

n IAP-104

n IAP-105

n IAP-92/93

The minimum supported software version for AP-374, AP-375,AP-377,AP-318,AP-303 devices is Aruba Instant 8.3.0.0.

Supported Instant AP Firmware VersionsThe current release of Central supports only the following Instant AP firmware versions:

n 8.3.0.0

n 6.5.4.7

n 6.5.4.6

n 6.5.4.5

n 6.5.4.4

n 6.5.4.0

n 6.5.3.6

n 6.5.3.5

n 6.5.3.4

n 6.5.3.0

n 6.5.2.0

n 6.5.1.5-4.3.1.7

n 6.5.1.0-4.3.1.1

n 6.5.1.0-4.3.1.0

n 6.5.0.0-4.3.0.1

n 6.5.0.0-4.3.0.0

n 6.4.4.8-4.2.4.10

n 6.4.4.8-4.2.4.5

n 6.4.4.8-4.2.4.4

n 6.4.4.6-4.2.4.0

n 6.4.4.4-4.2.3.2

n 6.4.4.4-4.2.3.1

n 6.4.4.4-4.2.3.0

n 6.4.4.3-4.2.2.0

n 6.4.3.4-4.2.1.0

n 6.4.3.1-4.2.0.3

Aruba Central | User Guide About Aruba Central | 20

Page 21: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

21 | About Aruba Central Aruba Central | User Guide

n 6.4.2.3-4.1.2.3

n 6.4.2.0-4.1.1.9 or later

AP-204, AP-205, AP-205H, RAP-108, RAP-109, AP-103, AP-114,and AP-115 Instant APs are no longer supported fromAruba Instant 8.3.0.0 onwards.

Supported Switch PlatformsCentral uses the SSL certificate by GeoTrust Certificate Authority for device termination and web services. As the SSLcertificate is about to expire, Aruba is replacing it with a new certificate from another trusted Certificate Authority.During the certificate upgrade window, all devices managed by Central will be disconnected. After the upgrade, thedevices reconnect to Central and resume their services with Central. However, for Aruba switches to reconnect toCentral after the certificate upgrade, you must ensure that the switches are upgraded to the recommended softwareversion listed in .

The following tables list the switch platforms and the corresponding software versions supported in Central:

Switch Platform Supported Software Versions Recommended Software Versions

Aruba 2530 Switch Series YA/YB.16.04.0008 or later YA/YB.16.05.0008 or later

Aruba 2540 Switch Series YC.16.03.0003 or later YC.16.05.0007 or later

Aruba 2920 Switch Series WB.16.03.0003 or later WB.16.05.0007 or later

Aruba 2930F Switch Series WC.16.03.0003 or later WC.16.05.0007 or later

Aruba 2930M Switch Series WC.16.04.0004 or later WC.16.05.0007 or later

Aruba 3810 Switch Series KB.16.03.0003 or later WC.16.05.0007 or later

Aruba 5400R Switch Series KB.16.04.0008 or later KB.16.05.0007 or later

Table 4: Supported Aruba Switch Series and Software Versions

Mobility Access Switch Series Supported Software Versions

n S1500-12Pn S1500-24Pn S2500-24Pn S3500-24T

ArubaOS 7.3.2.6ArubaOS 7.4.0.3ArubaOS 7.4.0.4ArubaOS 7.4.0.5ArubaOS 7.4.0.6

Table 5: Supported Aruba Mobility Access Switch Series and Software Versions

Provisioning and configuration of Aruba 5400R Switch Series and switch stacks is supported only throughconfiguration templates.

Central offers a 90-day evaluation subscription for customers who want to try the Aruba cloud solution formanaging their Wi-Fi networks. When you sign up for Central, an evaluation subscription is automaticallyassigned, unless you have bought a paid subscription. To obtain subscriptions, contact the Aruba Central

Page 22: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

support team.

Aruba Central supports the following types of subscriptions:

n Device management subscriptions—Allows you to add and manage devices (Instant APs and Switches), andavail basic services such as device configuration, monitoring dashboard, reports, and application analytics.The device subscriptions can be assigned only to the devices managed by Central. For example, if youraccount has any Instant APs managed by AirWave, you can assign only service subscription to these devices.

n Cloud service subscriptions—Enables access to a cloud service on any capable device. For example, access toapplication services such as Presence Analytics is based on the cloud service subscription. As of today, thecloud services portfolio includes Clarity, Guest Access, and Presence Analytics.

Aruba Central | User Guide About Aruba Central | 22

Page 23: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Chapter 3Getting Started

Before you begin, browse through the help pages to view the subscription policy and supported devices.

n Signing up for Aruba Central on page 23

n Accessing Portal on page 24

n Adding Devices to Central on page 24

n Assigning Subscriptions on page 26

n Provisioning Devices on page 27

Signing up for Aruba CentralTo sign up as a customer for Central:

1. Go to http://www.arubanetworks.com/products/sme/eval/.

2. Click SIGN UP NOW.

3. Select a display language. The registration page is displayed in the language you selected. The samelanguage settings are applied to the Central UI as well.

4. Enter your email address and click Continue.

n If you are signing up for Central for the first time, the registration page is displayed. Complete theregistration process (see step 3 through step 8).

n If you are a registered customer of Aruba and you have already verified your email address, the Centrallogin page opens.

n If your email address already exists in the Central database and you have not verified your emailaddress, click Resend Verification Email, and verify your email address by clicking the Activate YourAccount link.

n If you are an existing Aruba customer with SSO login credentials and you are signing up for Central forthe first time:

l Validate your account by providing your SSO password. On successful authentication, the registrationpage is displayed. Complete the registration process to gain access to Central (see step 3 through step8).

l If you have forgotten your SSO password, click Forgot Password and complete the steps to retrieveyour password.

l To sign up again, click Try Signing up again and complete the steps to sign up for a Central account.

5. On the registration page, enter first name, last name, and address details. If you are a new user, enter thepassword. For registered users and those with SSO login credentials, the Password field is disabled.

6. If you have Aruba Activate user credentials, select I have an Aruba Activate account check box andenter your user name and password for the Activate account.

7. Select the I agree to the Terms and Conditions check box.

8. Click Sign Up. On successfully completing the registration, a verification email is sent to your emailaddress.

9. Access your email account and click the Activate Your Account link. If the email verification issuccessful, you can log in to Central.

Aruba Central | User Guide Getting Started | 23

Page 24: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

24 | Getting Started Aruba Central | User Guide

Accessing PortalCentral is available as a web application and a mobile app.

The Aruba Central mobile app can be downloaded from the Apple® App Store or Google® Play store. Themobile app offers limited functions such as device onboarding and provisioning, whereas the web applicationoffers extensive features for device onboarding, provisioning, management, and maintenance. It also hostsapplication services that can be enabled on the devices provisioned in Central.

Aruba offers the following variants of the Central web interface:

n Standard Enterprise mode—The Standard Enterprise interface is intended for customers who manage theirrespective accounts end-to- end. In the Standard Enterprise mode, the customers have complete access totheir accounts. They can also provision and manage their respective accounts.

n Managed Service mode—Central offers the Managed Service Portal for managed service providers whoneed to manage multiple customer networks. With Managed Service Portal, the MSP administrators canprovision customer accounts, allocate devices, assign licenses, and monitor customer accounts and theirnetworks. The administrators can also drill down to a specific tenant account and perform administrationand configuration tasks. The tenants can access only their respective accounts, and only those features andapplication services to which they have subscribed.

To start using Central, log in to Aruba Central with your credentials.

Adding Devices to CentralAfter you successfully log in to Central, a welcome message is displayed in the UI. To bind devices to yoursubscription, click Manage My Subscriptions. The Subscription Assignment page opens.

Before assigning the subscription keys, ensure that you check the device inventory to view if all your devicesare added in Central.

The evaluation subscription with device subscription tokens allows you to add up to 10 Instant APs or 10 Switches, ora combination of 10 Instant APs and Switches. With device subscription tokens, you can access basic networkmanagement services such as monitoring, configuration, and report generation.

The service evaluation subscription allows you to access application services, for example, Presence Analytics. Withthis subscription, you can add up to 20 Instant APs.

For Instant APs that dynamically form a cluster, the users must add the master Instant AP from the DeviceInventory page whenever a slave Instant AP joins the cluster, in order for the slave Instant AP to inherit theconfiguration from the master Instant AP.

If you are adding a device and if you get the Blocked Device error message, another Central user would havealready added the device and assigned a license in Central.

Zero Touch ProvisioningCentral supports zero touch provisioning of the devices. It automatically retrieves the devices associated to acustomer account. To synchronize the devices from the inventory, click Sync Now. If the retrieval of devices isnot complete or successful due to process errors, you can manually add the devices.

Manually Adding DevicesCentral allows you to add up to 32 devices manually. To manually add a device, complete the following steps:

1. From the app selector, click Global Settings.

Page 25: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

2. Click Devices Inventory. Under Add Devices, click any of the following options:

DeviceAdditionMethod

Description

Add byMAC/SN

Allows you to add devices using MAC address and serial numbers. You can add up to 32 devices.

Add withCloudActivationKey

Allows you add multiple devices from a single purchase order by providing the cloud activation key.To add devices:

1. Note the Cloud Activation Key and MAC address of the device. To obtain these details:l For Instant APs, execute the show about command at the Instant AP CLI or clickMaintenance > About in the Instant AP UI.l For Aruba Mobility Access Switches, execute the show inventory | include HW and showversion commands on the Mobility Access Switch CLI console. You can also view the cloudactivation key in the Maintenance >About tab in the UI. The activation key is enabled only ifthe switch has access to the Internet.l For other ArubaSwitches, to view the MAC address and the serial number, run the shsystem | in Base and sh system | in Serial commands at the Switch CLI console.

2. Enter the Cloud Activation Key and MAC address of the device.3. Click Add. The Central retrieves all devices that belong to the same purchase order and displaysthe list. If any of the device belongs to another customer account or is used by other services, it isdisplayed as a blocked device. As Central does not allow you to add blocked devices, you may haveto release the blocked devices from another customer account.

AddUsingActivate

Allows you to retrieve the devices associated with an Activate user account.To add devices:

1. Enter the username and password of the Activate user account.2. Click Add. The devices associated with the Activate account are retrieved and added to the listof devices displayed on the Device Inventory page.

NOTE: You can use this option only once. After the devices are added, Central does not allow you tomodify or re-import the devices using your Aruba Activate credentials.

Table 6: Adding Devices

Creating UsersAfter you sign up for Central, a user with the administrator privileges is created by default.

To create additional users, complete the following steps:

1. From the app selector, click Global Settings, and then click Users & Roles.

2. Click the Users tab.

3. To add a new user, click +. The New User window opens.

4. Enter a valid email address of the user in the Username text box. You can create users with the followingpredefined roles:

Standard Enterprise Portal Managed Service Portal

n Adminn Read/Writen Read onlyn Guest operator

n Adminn Read Only

Central also supports the creation of custom roles to control user access to various network managementmodules and application services.

Aruba Central | User Guide Getting Started | 25

Page 26: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

26 | Getting Started Aruba Central | User Guide

5. Select a user role from the Role drop-down list.

6. For Standard Enterprise portal users, you can also assign a group from the Allowed Groups drop-downlist.

7. Click Save.

n New users will receive a welcome email with the registration link. Users can complete the registrationprocess to access the Central UI.

n Users with an existing Central account receive an email invite with a link to the Central portal.

If the user has not received the registration email, click Resend Invite Email in the Users and Roles page to resendthe invite.

Adding Customer AccountsIf you are a managed service provider and you want to maintain multiple customer accounts in your setup, usethe Central application in the Managed Service mode.

To add customer accounts in the Managed Service Portal mode, complete the following steps:

1. Ensure that you have enabled the Managed Service Mode. To enable access to the Managed ServicePortal mode, click the Managed Service Mode menu from the user settings menu located at the bottomof the left navigation pane. The Managed Service Portal opens.

2. Under Monitoring & Reports, click Customers. The Customers page opens.

3. Click + Add Customer. The Customer > Create Customer window opens.

4. Enter the name of the customer in the Customer Name text box.

5. Assign a group to the customer.

6. Click Save. When the account is created successfully, an email invitation is sent to the email address ofthe customer you just created.

7. To add users to the customer account you just created, complete the following steps:

a. Click the customer ID and drill down to the tenant account.

b. In the tenant account interface, from the app selector, click Global Settings.

c. Click Users & Roles.

d. To create custom roles, click the Roles tab and add new role. You can also set permissions to view ormodify a specific application, device or network management function.

e. Click the Users tab. Add a new user and assign a role.

f. Assign a group to user.

g. Click Save. An invite is sent to the user.

Assigning SubscriptionsCentral allows you to enable automatic assignment of device subscriptions for the devices joining Central. Youcan also manually assign subscriptions to a device to enable access to an application service.

Enabling Automatic Assignment of Device SubscriptionsWhen a subscription assigned to a device expires or is canceled, Central checks the inventory for the availablesubscription tokens for the device and verifies if the subscription has adequate license tokens. If thesubscription has adequate capacity, Central automatically assigns the longest available subscription token tothe device. If not, Central ensures that the subscriptions are utilized to the full capacity by assigning as manydevices as possible.

Page 27: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Central does not support automatic assignment of subscriptions in the Managed Service Mode.

To enable automatic assignment of subscriptions:

1. From the app selector, click Global Settings.

2. Click Subscription Assignment.

3. On the Subscription Assignment page, click Select Devices under Device Subscriptions.

4. Select the devices.

5. Click Save.

Manually Assigning Subscriptions to DevicesTo manually assign subscription to a device, complete the following steps:

1. From the app selector, click Global Settings.

2. Click Subscription Assignment.

3. On the Subscription Assignment page, select a subscription from the table on the left.

4. From the table on the right, select the devices to which you want to assign subscriptions.

5. Drag and drop the device to the subscription selected in the table on the left.

6. To unassign a subscription from a device, select the devices and click Batch Remove Label. Thesubscription is unassigned.

Provisioning DevicesIn Central, devices are assigned to groups for configuration, monitoring, and management purposes.Therefore, a group in Central is a primary configuration element.

When devices join Central, based on their running configuration, they are assigned to either a default group oran existing UI group. For the devices to join Central, ensure that the required ports are open forcommunication.

Verifying and Configuring PortsMost of the communication between devices on the remote site and Central server in the cloud is carried outthrough HTTPS (TCP 443). However, you may need to configure the following ports:

n TCP port 443 for configuration and management of devices.

n TCP port 80 for firmware upgrade on devices.

n UDP port 123 for NTP server to configure timezone when factory default Instant AP comes up.

n TCP port 2083 for RADIUS authentication for guest management. If 2083 port is blocked, the HTTPSprotocol is used.

By default, Instant AP contacts pool.ntp.org to synchronize using NTP. The administrators can configure anyother NTP server or IP address. For more information, see Configuring System Parameters for Instant APs.

Aruba Central | User Guide Getting Started | 27

Page 28: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

28 | Getting Started Aruba Central | User Guide

The following domain names and ports are used by Central:

Domain NameProtocolandport

Description

pool.ntp.org UDP port123

To update internal clock on APs.

device.arubanetworks.com TCP port443

To get provisioning rule from Aruba Activate.

NOTE: Devices such as Instant APs must be able toresolve device.arubanetworks.com using a valid DNSserver.

activate.arubanetworks.com TCP port443

To configure provisioning rules in Aruba Activate.

portal.central.arubanetworks.comsso.arubanetworks.com

TCP port443

To access Central login portal and authenticate.  Aftera successful authentication, the users are redirectedto their respective accounts from which they canmanage, configure, and monitor devices.

app1.central.arubanetworks.com forexternal/prod

TCP port443 To allow devices to communicate with Central.

internal.central.arubanetworks.com forinternal

app2.central.arubanetworks.com forexternal/prod

TCP port443 To allow users to access Central portal.

internal2.central.arubanetworks.com forinternal

naw2.cloudguest.central.arubanetworks.com TCP port443, 2083

To allow access to Cloud Guest server fromnaw3.arubanetworks.com andnaw2.arubanetworks.com CDPs.

nae1.cloudguest.central.arubanetworks.com TCP port443, 2083

To allow access to Cloud Guest server fromnae1.arubanetworks.com.

asw1.cloudguest.central.arubanetworks.com TCP port443, 2083

To allow access to Cloud Guest server fromasw1.arubanetworks.com

euw1.cloudguest.central.arubanetworks.com TCP port443, 2083

To allow access to Cloud Guest server fromeuw1.arubanetworks.com.

images.arubanetworks.com TCP port80

To access the first server for firmware image upgrade.

d2vxf1j0rhr3p0.cloudfront.net TCP port80

To access the second server for firmware imageupgrade.

rcs-m.central.arubanetworks.com TCP port443

To access an AP console through SSH.

Table 7: Domain Names and Ports for Central

Page 29: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Domain NameProtocolandport

Description

http://h30537.www3.hpe.com TCP port80

To access firmware images for switches hosted onHPE My Network Portal (MNP).

cloud.arubanetworks.com TCP port80

To open up Central evaluation sign-up page.

aruba.brightcloud.com TCP port443

To access the Brightcloud WebCC server for websitecontent classification.

To open communication ports to Central, Aruba recommends that you use the domain names and not IP addressesin the firewall.

Provisioning Instant APsIf an Instant AP joins Central with the factory default configuration, it is automatically assigned to the defaultgroup.

However, if the Instant AP is part of an existing cluster provisioned in Central, it is assigned to the group inwhich the cluster, or the Virtual Controller (VC) is already provisioned.

If the Instant AP joins with custom configuration, it is assigned to the unprovisioned group. The administratorscan move this device to a user-defined group if required.

For a complete list of Instant AP models and firmware versions supported by Central, see Supported Instant APPlatforms on page 19.

Provisioning Aruba SwitchesAruba Switches can join Central only if they are running the factory default configuration. The switches alsomust have a valid IP address and DNS server settings from a DHCP server.

For Aruba Mobility Access Switches, ensure that the a static IP is configured on the switch.

If the switches ship with a version lower than the minimum supported firmware version, a factory reset may berequired, so that the switch can initiate a connection to Central. For information, on the minimum firmware versionssupported on the switches, see Supported Aruba Switch Series and Software Versions on page 215.

Setting up SitesCentral allows you to create a site with a location context. You can create a site a physical location where a setof devices are installed; for example, campus, branch, or venue. Creating sites will help in filtering statisticswhen monitoring device and network health.

Creating a SiteTo create a site, complete the following steps:

1. From the app selector, click Global Settings.

Aruba Central | User Guide Getting Started | 29

Page 30: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

30 | Getting Started Aruba Central | User Guide

2. Click Labels and Sites. The Labels and Sites page opens.

3. Set the toggle switch to Sites. The site management options are displayed.

4. To add a new site, click (+) New Site. The Create New Site pop-up window opens.

5. Enter a name for the site, add address details, and the postal code.

6. Click Add. The new site is added to the All Sites table.

Assigning a Device to a SiteTo assign devices to a site, complete the following steps:

1. On the Global Settings > Labels and Sites > Sites page, locate the site to which you want to assign adevice.

2. In the table that lists the sites, you can perform one of the following actions:

n Click All Devices to view all devices.

n Click Unassigned to view all the devices that are not assigned to any sites.

3. Select Unassigned. The list of devices that are not assigned to any site is displayed.

4. Select one or several devices from the list of devices.

5. Drag and drop the devices to the site on the left. A pop-up window asking you to confirm the siteassignment opens.

6. Click Yes.

Assigning Devices to GroupsThe following sections describe the device assignment procedures:

Device Assignment in the Managed Service PortalIf you are a Managed Service Portal user, you must assign the devices to the tenant accounts.

In the Managed Service Mode, customer accounts are mapped to groups, therefore devices are assigned to thegroup mapped to a customer account.

To assign a device to a customer account, complete the following steps:

1. From the app selector, click Global Settings.

2. Click Device Inventory. The Device Inventory page opens.

3. Select one or several devices that are not assigned to any customer yet.

4. Click Assign Customer.

5. Select a customer account from the list. You can also search for customer accounts.

On selecting a customer account, the Managed Service Portal shows the groups associated with theaccount.

6. Select the group to which you want to assign the device.

7. Click Assign Device (s).8. Click Yes when prompted for confirmation.

Device Assignment in Standard Enterprise PortalTo assign devices to a group, complete the following steps:

1. From the app selector, click Global Settings.

Page 31: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

2. Click Manage Groups. The Groups page opens.

3. In the groups table on the left, click Unassigned Devices. A list of unassigned devices is displayed in thedevices table.

4. Select the group to which you want to move the devices.

5. From the devices table on the right, select one or several devices to assign.

6. Drag and drop the devices to the group that you selected.

Creating Additional Customer AccountsIf you want to manage devices from multiple geographical locations or enterprises, you can create additionalcustomer accounts in the Standard Enterprise portals. Central allows you to create up to five customeraccounts.

To create an additional customer account:

1. Click the Settings icon next to your user name on the main pane. Click Switch Customer. The customeraccount selection page is displayed.

2. Click the + icon to add a new account. The Sign up with Aruba Central page is displayed.

3. Enter your address, and select the country and state.

4. Enter the city and ZIP code details.

5. Select the I agree to the Terms and Conditions check box.

6. Click Sign Up. The customer account is added.

7. Repeat the procedure to add another customer account.

To log in with a different customer account, click Switch Customer and click the account that you want toaccess.

Setting Country CodeThe initial Wi-Fi setup of an Instant AP requires you to specify the country code for the country in which theInstant AP operates. This configuration sets the regulatory domain for the radio frequencies that the InstantAP uses. The available 20 MHz, 40 MHz, or 80 MHz channels are dependent on the specified country code.

Country Code Configuration in Central from UIIf you provision a new Instant AP without the country code, Central exhibits the following behavior:

Aruba Central | User Guide Getting Started | 31

Page 32: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

32 | Getting Started Aruba Central | User Guide

Country Code Configuredat Instant AP

Country CodeConfigured inGroup

Behavior

No Yes The country code of the group is pushed to the newlyadded Instant AP.

No No Central displays the Country Code not set. Config notupdated message in the Audit Trail. A notification isalso displayed at the bottom of the main window to setthe country code of the new Instant AP.To set the country code, perform the following actions:

1. Click Set Country Code Now link on thenotifications pane. The Set Country Code pop upopens.2. Select the device and click the edit icon.3. Specify a country code from the Country Codedrop-down list.4. Click Save.

Table 8: Instant AP Provisioned To Central

Setting Cory Code At Group Level

If an Instant AP already has a country code, and then joins the Central using ZTP configuration, the country code ofthe Instant AP is retained. In this case, Central would not push the group’s country code.

Setting Country Code At Group LevelTo set the country code of the Instant AP at the group level, perform the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select the group to be modified.

3. Click System > General. The page to set the configurations for the group is displayed.

4. Select the country code for Instant AP from the Set Country code for group drop-down list.

5. Click Save Settings.6. Reboot Instant AP for changes to take effect.

By default, the value corresponding to the Set Country code for group field is empty. This indicates that anyInstant AP with different country codes can be a part of the group.

Once the Set Country code for group field is set, the field cannot revert to the default value. When the country codeof the group is changed, the country code of the already connected Instant AP also will be updated accordingly.

Setting Country Code At Device LevelTo set the country code of the Instant AP at the device level, perform the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select the Instant AP device for which the country code must be modified.

3. Click System > General. The page to set the configuration for the device is displayed.

4. Click the edit icon.

5. Select the new country code from the Country Code drop-down list.

6. Click Ok.

7. Reboot Instant AP for changes to take effect.

Page 33: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

By default, the value corresponding to the Country code is the country code set at the group level which can be thenmodified at the device level from the drop-down list. The country code of the Instant AP will always be the mostrecently set country code at the group level or device level.

Country Code Configuration at Group Level from APICentral provides an option to set and get the country code at group level through the APIs in Maintenance >API Gateway.

To set or get the country code at group level through API:

1. Go to Maintenance > API Gateway.

2. Click Authorized Apps & Tokens tab and generate a token key.

3. Download and copy the generated token.

4. Click the link displayed in the APIs tab of the API Gateway. The Central Network Management APIspage opens.

5. On the left navigation pane, select Configuration from the URL drop-down list.

6. Paste the token key in the Token field and press enter.

7. Click NB UI Group Configuration. The following options are displayed:l Set country code at group level ([PUT]/configuration/v1/country) — This API allows to set

country code for multiple groups at once. Central currently allows country codes of up to 50 Instant APdevice groups to be configured simultaneously. To set the country codes of multiple groups, enter thegroup names and country code as inputs corresponding to the groups and country labels respectivelyin the script { "groups": [ "string" ], "country": "string" } within the set_ group_config_ country_ codetext box.

l Get country code set for group ([GET]/configuration/v1/{group}/country) — This API allows toretrieve the country code set for a specific Instant AP group. To get the country code information of theInstant AP group, enter the name of the group for which the country code is being queriedcorresponding to the country label in the script { "country": "string"} within the group text box.

The APIs for setting and retrieving country code information are not available for the Instant AP devices deployed intemplate groups.

The following are the response messages displayed in the Set country code at group level and Getcountry code set for group sections:

Set country code at group level Get country code set for group

n 201 - Successful operationn 400 - Bad Requestn 401 - Unauthorized access, authentication requiredn 403 - Forbidden, do not have write access for groupn 413 - Request-size limit exceededn 417 - Request-size limit exceededn 429 - API Rate limit exceededn 500 - Internal Server Errorn 503 - Service unavailable, configuration update inprogress

n 400 - Bad Requestn 401 - Unauthorized access authenticationrequiredn 403 - Forbidden, do not have read access forgroupn 413 - Request-size limit exceededn 417 - Request-size limit exceededn 429 - API Rate limit exceededn 500 - Internal Server Errorn 503 - Service unavailable, configuration updatein progress

Table 9: Response Messages

For further details on API help, refer to https://app1-apigw.central.arubanetworks.com/swagger/central.

Aruba Central | User Guide Getting Started | 33

Page 34: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

34 | Getting Started Aruba Central | User Guide

Removing Device(s)In Aruba Central, you can remove a device entry from the Access Points table or Switches table. However,you will not be able to remove a device completely from Central because the device entry remains in theDevice Inventory page. The devices appearing in the Device Inventory page reflects the hardwareownership and is not a list of devices managed by Central. This page only shows a list of hardware you own.This section describes the various use cases.

Removing an Instant AP from the Access Points TableTo remove an Instant AP from the Access Points table:

1. From the App selector, click Monitoring & Reports and go to Network Overview > APs > List ofDown APs.

2. Do one of the following:

n In the Access Points table:

l Hover your mouse over the row that you want to remove.

l Click the Delete icon.

l Click Yes. The access point entry is removed from the table.

n Click the Instant AP entry in the table. The Access Points Details page opens. From the Actions drop-down, select Delete AP and click Yes. The access point entry is removed from the table.

Removing a Switch from the Switches TableTo remove a Switch from the Switches table:

1. From the App selector, click Monitoring & Reports and go to Network Overview > Switches > Listof Down Switches.

2. Do one of the following:

n In the Switches table:

l Hover your mouse over the row that you want to remove.

l Click the Delete icon.

l Click Yes. The switch entry is removed from the table.

n Click the Switch entry in the table. The Switch Details page opens. From the Actions drop-down, selectDelete Switch and click Yes. The switch entry is removed from the table.

Removing a Device from the Device Inventory PageYou cannot remove a device completely from Central, but you can unsubscribe the device. After youunsubscribe, the device status changes to Unsubscribed in the Device Inventory page. If you have morethan one Central account and if another Central user adds this unsubscribed device to another Centralaccount, the device entry is removed from the Device Inventory page in your Central account.

Page 35: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Chapter 4User Interface

Central is available as a web application and a mobile app.

The Aruba Central mobile app can be downloaded from the Apple® App Store or Google® Play Store. Themobile app offers limited functions such as device onboarding and provisioning, whereas the web applicationoffers extensive features for device onboarding, provisioning, management, and maintenance. It also hostsapplication services that can be enabled on the devices provisioned in Central.

Aruba offers the following variants of the Central web interface:

n Standard Enterprise mode—The Standard Enterprise interface is intended for customers who manage theirrespective accounts end-to-end. In the Standard Enterprise mode, the customers have complete access totheir accounts. They can also provision and manage their respective accounts. For more information, seeStandard Enterprise Portal.

n Managed Service mode—Central offers the Managed Service Portal for managed service providers whoneed to manage multiple customer networks. With Managed Service Portal, the MSP administrators canprovision customer accounts, allocate devices, assign licenses, and monitor customer accounts and theirnetworks. The administrators can also drill down to a specific tenant account and perform administrationand configuration tasks. The tenants can access only their respective accounts, and only those features andapplication services to which they have subscribed. For more information, see Managed Service Portal onpage 40.

Standard Enterprise PortalAfter you log in to the Central web interface, the Standard Enterprise portal opens.

The main window consists of the following elements:

n Left Navigation Pane on page 35

n Filter bar on page 39

n Data Pane on page 39

n Notifications Pane on page 39

n Need Help Bubble on page 39

Left Navigation PaneThe left navigation pane shows the company logo at the top. It includes the following UI elements:

App SelectorThe app selector lists the apps available for the Central users.

Most of the apps require service subscriptions to be enabled on the devices. Contact your administratorand the Aruba Central Support team to obtain access to any application service.

Aruba Central | User Guide User Interface | 35

Page 36: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

36 | User Interface Aruba Central | User Guide

Monitoring & Reports

The following menu options are available for the Monitoring and Reports app:

n Network Overview—This page includes the following tabs:

l Network Overview—Displays a summary of bandwidth usage, client count, top devices in use, top 5clients in the network, and a list of network profiles configured on the devices in the network.

l APs—Displays a dashboard for monitoring APs provisioned in the network. You can also view the usagegraphs, top N APs by usage, and a complete list of list of APs in the network. To view the details of an AP,click MAC address of the AP in the list.

l Switches—Displays a dashboard for monitoring switches and switch stacks provisioned in the network.You can also view the usage graphs, top N switches s by usage, and a complete list of list of switches inthe network. To view the details of a switch or switch stack, click name of the switch or the switch stackfrom the list view.

l Security—Displays a summary of the rogue devices and intrusion detected in the network. You canview a list of rogue devices, WIDS events, and interferences detected in the network.

n Label Health—Displays an overall summary of the health and performance of devices tagged to a label.

n Client Overview—Provides a summary of wireless and wired clients associated with the devicesprovisioned in your Central account.

n AppRF—Provides a summary of application usage by clients and charts that show trends for applications,application categories, websites category, and website reputation score.

n VisualRF—Provides a real-time picture of the radio environment of your wireless network and the ability toplan the wireless coverage of new sites.

n Alerts—Displays a list of alerts. The Alerts page also allows you to acknowledge these alerts.

n Reports—Allows you to generate reports such as Network Summary, Security, PCI Compliance, ClientInventory, Infra Inventory, Client Usage, Capacity Planning, New Infra Inventory, and AppRF reports.

Wireless Management

The Wireless Management app allows you to configure SSIDs, radio profiles, security and firewall settings,and enable services on Instant APs. It also allows you to configure Instant APs provisioned under templategroups through configuration templates.

Wired Management

The Wired Management app allows you to configure Aruba Switches and switch stacks. It also allows you toconfigure switches provisioned in a template group through configuration templates.

Maintenance

The Maintenance app allows you to maintain network, view reports and audit trails, and manage APIs:

. The app includes the following menu options:

n Firmware—Allows you to view the current firmware version of the devices and provides options toupgrade the devices to the latest firmware version.

n Troubleshooting—Allows you to run troubleshooting commands for devices.

n Audit Trail—Shows audit trail for the events pertaining to device allocation, configuration, user additiondeletion, and firmware upgrade status.

n API Gateway—Allows you to view APIs and manage OAuth tokens.

Page 37: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Guest Access

The Guest Access app includes the following menu options:

n Overview—Displays a dashboard that shows the details of the cloud guest SSIDs, duration for which theguest users are connected, client count, and the type of client devices connected to the cloud guest SSIDs.

n Splash Page—Allows you to configure splash page profiles for guest network profiles.

n Visitors—Allows you create guest user accounts and assign these users to a guest SSID.

Global Settings

The Global Settings tab includes the following menu options:

n Manage Groups—Displays menu options for viewing, adding and modifying groups.

n Device Inventory—Displays a list of devices added in Central. The Device Inventory page also allowsyou to add devices and assign devices to groups.

n Key Management—Allows you to track the subscription keys in use and the available keys.

n Subscription Assignment—Allows you to assign subscription key to devices. You can also enableautomatic assignment of subscriptions for devices joining the Central inventory.

n Cluster Management—Allows the administrators to provision and manage the on-premise cluster ofnodes.

n Labels and Sites—Allows you to create and manage labels and sites. The administrators can create sites tomonitor devices installed inn a specific physical location. They can also use labels to tag devices to a specificarea in a physical location, specific owners, or departments.

n Users & Roles—Allows the Managed Service Portal administrators create and modify users and roles. Theadministrators can control user access to applications and network management functions by creating acustom role and assigning to the users.

Presence Analytics

The Presence Analytics app allows you to analyze client presence patterns in public venues and enterpriseenvironments.

The Presence Analytics app includes the following menu options:

n Activity—Displays a dashboard with the client presence details and loyalty metrics.

n Settings—Allows you to configure RSSI threshold and dwell time settings for the clients .

Clarity

The Clarity app view provides an analytical dashboard for real-time monitoring of the client on-boarding, clientassociation and authentication transactions, and DHCP and DNS service request and responses.

The Clarity application view includes the following menu options:

n Activities— Displays graphs showing connectivity health, latency, performance of the network and thedevice, and the association and authentication transactions between the client device and the network.

n Insights—Displays insights for the onboarding performance of the clients for a time range of 1 day or 1month.

n Troubleshooting—Allows you to view the onboarding details for a specific client device for debuggingpurpose.

n Health Checks—Allows you to configure health check parameters, run periodic health checks, and viewreports.

Aruba Central | User Guide User Interface | 37

Page 38: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

38 | User Interface Aruba Central | User Guide

Search barThe search bar allows portal users to search for devices, clients, or a specific network profile. When you enter atext string in the search box, the search function suggests matching keywords and automatically completes thesearch text entry. The search bar is available for the following apps only:

n Monitoring & Reports

n Wireless Management

n Wired Management

n Maintenance

Icons at the bottom panen The mobile icon—Allows you to download the Aruba Central mobile app from the following sites:

l App Store—For Apple devices running iOS 9.0 or later.

l Google Play Store—For mobile devices running Android 5.0 Lollipop or later.

n The bubble icon—Displays the following options:

l Documentation—Opens the Central user documentation portal.

l View / Update Case—Directs you to the support site to view or update an existing support case.

l Open New Case—Directs you to the support site to open a new support case.

n The Help Icon—Click the ? icon to view a short description or definition of the selected terms and fields in apane or dialog box. To view the online help:

a. Click the (?) at the top.

b. Move your cursor over a data pane item to view the help text.

c. To disable the help mode, click (?) again.

n The user icon—A drop-down menu with the following options for managing the Central user and customeraccounts:

l Switch Customer—Allows you to switch to another customer account.

l Change Password—Allows you to change the password of account.

l User Settings—Displays the date, time and timezone. The administrators can also set a timeout valuefor inactive user sessions.

The Central web interface is available in English, French, Spanish, German, Brazilian Portuguese, and Japaneselanguages. You can now set your language preference through the User Settings menu from the drop-down list onthe header pane. Central saves your language preference and displays the UI in the language set by you.

l Terms of Service—Displays the terms and conditions for using Aruba Central services.

l Managed Service Mode—Enables Managed Service Portal mode and switches the interface to theManaged Service Portal.

l Logout—Allows you to log out your account.

Page 39: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Filter barThe filter bar on the left of data pane includes the following UI elements:

Groups SelectionThe groups selection filter bar on the left side of the data pane displays the following:

n Name of group. If no group filter is applied, the data pane view is set to All Devices.

n Total number devices provisioned in the network.

n The number of APs and switches that are currently down.

The groups filter supports the following functions:

n Filter the data pane view by group or devices

n Perform configuration tasks at the group or device level

n Perform maintenance tasks at the group or device level

n Run reports at the group level

Label Selection

The filter bar also lists the labels to which the devices are assigned. You can also filter your dashboard view andrun reports per label.

Site Selection

The filter bar now allows you to filter your monitoring dashboard contents per sites. The filter bar shows a listof sites created in your setup.

Temporal FilterThe Temporal filter at the top right corner of the data pane is available for Monitoring & Reports app. Thefilter allows you to set a time range for pages showing monitoring and reports data. You can set the filter toany of the following time ranges:

n 3 hours

n 1 day

n 1 week

n 1 month

n 3 months

Data PaneDisplays detailed information of the tabs and data for the selected menu commands.

Notifications PaneThe Notifications pane at the bottom of the UI shows alerts for device addition, provisioning, and country codeconfiguration.

Need Help BubbleThe Need Help? bubble is a new feature that provides contextual information on the UI elements and featuresavailable on a page.

Aruba Central | User Guide User Interface | 39

Page 40: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

40 | User Interface Aruba Central | User Guide

Managed Service PortalThe Managed Service Portal is intended for the managed service providers who manage multiple distinctcustomer accounts. The Managed Service Portal allows the MSP customers to provision and manage customeraccounts, assign devices to customer accounts, manage subscription keys and other functions such asconfiguring network profiles and viewing alerts.

To access the Central web interface in the managed service mode:

1. Log in to the Central portal.

2. Locate the user icon at the bottom of the left navigation pane.

3. Click the user icon to expand the user settings menu and select Managed Service Mode. The UIswitches to the Managed Service Portal UI.

The Managed Service Portal UI consists of the following elements:

n Left Navigation Pane on page 40

n Filter bar on page 43

n Data Pane on page 43

n Notifications Pane on page 43

n Need Help Bubble on page 43

Left Navigation PaneThe left navigation pane shows the company logo at the top. It includes the following UI elements:

App SelectorThe app selector lists the apps available for the Managed Service Portal portal users.

Most of the apps require service subscriptions to be enabled on the devices. Contact your administratorand the Aruba Central Support team to obtain access to any application service.

Monitoring and Reports

The following menu options are available for the Monitoring and Reports app:

n Overview—Displays the following information:

l Number of APs provisioned in the Managed Service Portal.

l Number of switches provisioned in the Managed Service Portal.

l Number of customers provisioned in the Managed Service Portal.

l Number of available subscriptions and used subscriptions for devices provisioned in the ManagedService Portal.

l Charts showing a list of top customers, the subscription renewal, devices under management and thecustomer accounts provisioned in the last six months.

n All Customers—Displays a complete list of customers accounts provisioned in the Managed Service Portal,the total number of devices assigned to each customer account, the number of licensed devices in eachcustomer account, and the device provisioning status.

Page 41: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

n Customers—Displays a complete list of customer accounts provisioned in the Managed Service Portal. TheCustomers page also allows the Managed Service Portal administrators to add new customer accounts anddrill down a specific customer account.

n Notification—Displays a list of alerts. The Notifications page also allows you to acknowledge thesealerts.

Wireless Configuration

The Wireless Configuration app allows you to configure SSIDs, radio profiles, security and firewall settings,and enable services on Instant APs. It also allows you to configure Instant APs provisioned under templategroups through configuration templates.

Wired Configuration

The Wired Configuration app allows you to configure Aruba Switches and switch stacks. It also allows you toconfigure switches provisioned in a template group through configuration templates.

Maintenance

The Maintenance app allows you to maintain the devices associated with customer accounts provisioned inManaged Service Portal. The app includes the following menu options:

n Firmware—Allows you to view the current firmware version of the devices and provides options toupgrade the devices to the latest firmware version.

n Portal Customization—Allows you to customize the look and feel of the email notifications and the userinterface.

n Audit Trail—Shows audit trail for the events pertaining to device allocation, configuration, and firmwareupgrade status.

n API Gateway—Allows you to view APIs and manage OAuth tokens.

Guest Access

The Guest Access app displays a list of cloud guest splash page profiles. You can also create new splash pageprofiles for a device group.

Global Settings

The Global Settings tab includes the following menu options:

n Manage Groups—Displays menu options for viewing, adding and modifying groups.

n Device Inventory—Displays a list of devices and allows you to assign devices to tenant accountsprovisioned in the Managed Service Portal.

n Key Management—Displays details of the subscription key assigned to customer accounts provisioned inthe Managed Service Portal. The Key Management page also allows users to track the subscription keysassociated with the customer accounts.

n Subscription Assignment—Allows the Managed Service Portal users to assign device managementsubscription and enable network service subscriptions for the devices provisioned in the network.

n Cluster Management—Allows the administrators to provision and manage the on-premise cluster ofnodes.

n Users & Roles—Allows the Managed Service Portal administrators create and modify users and roles. Theadministrators can control user access to applications and network management functions by creating acustom role and assigning to the users.

Search barThe search bar allows portal users to search for devices, clients, or a specific network profile. When you enter a

Aruba Central | User Guide User Interface | 41

Page 42: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

42 | User Interface Aruba Central | User Guide

text string in the search box, the search function suggests matching keywords and automatically completes thesearch text entry. The search bar is available for the following apps only:

n Monitoring & Reports

n Wireless Configuration

n Wired Configuration

n Gateway Configuration

n Maintenance

Icons at the bottom panen The mobile icon—Allows you to download the Aruba Central mobile app from the following sites:

l App Store—For Apple devices running iOS 9.0 or later.

l Google Play Store—For mobile devices running Android 5.0 Lollipop or later.

n The bubble icon—Displays the following options:

l Documentation—Opens the Central user documentation portal.

l View / Update Case—Directs you to the support site to view or update an existing support case.

l Open New Case—Directs you to the support site to open a new support case.

n The Help Icon—Click the ? icon to view a short description or definition of the selected terms and fields in apane or dialog box. To view the online help:

a. Click the (?) at the top.

b. Move your cursor over a data pane item to view the help text.

c. To disable the help mode, click (?) again.

n The user icon—A drop-down menu with the following options for managing the Central user and customeraccounts:

l Switch Customer—Allows you to switch to another customer account. For more information, seeCreating Additional Customer Accounts in the Aruba Central User Guide.

l Change Password—Allows you to change the password of account.

l User Settings—Displays the date, time and timezone. The administrators can also set a timeout valuefor inactive user sessions.

The Managed Service Portal UI is available in English, French, Spanish, Deutsche, Brazilian Portuguese, and Chineselanguages. You can now set your language preference through the User Settings menu from the drop-down list onthe header pane. Central saves your language preference setting and displays the UI in the language set by you.

l Terms of Service—Displays the terms and conditions for using Aruba Central services.

l Disable MSP—Disables the Managed Service Portal and opens the Central standard interface. TheManaged Service Portal mode can be disabled only if there are no active customer accounts in ManagedService Portal.

l Logout—Allows you to log out your account.

Page 43: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Filter barThe filter bar on the left of data pane includes the following UI elements:

Groups Selection FilterThe groups selection filter bar on the left side of the data pane displays the following:

n Name of group. If no group filter is applied, the data pane view is set to All Devices.

n Total number devices provisioned in the network.

n The number of APs and switches that are currently down.

The groups filter supports the following functions:

n Filter the data pane view by group or devices

n Perform configuration tasks at the group or device level

n Perform maintenance tasks at the group or device level

n Run reports at the group level

Temporal FilterThe Temporal filter at the top right corner of the data pane is available for Monitoring & Reports app. Thefilter allows you to set a time range for pages showing monitoring and reports data. You can set the filter toany of the following time ranges:

n 3 hours

n 1 day

n 1 week

n 1 month

n 3 months

Data PaneDisplays detailed information of the tabs and data for the selected menu commands.

Notifications PaneThe Notifications pane at the bottom of the UI shows alerts for device addition, provisioning, and country codeconfiguration.

Need Help BubbleThe Need Help? bubble is a new feature that provides contextual information on the UI elements and featuresavailable on a page.

Aruba Central | User Guide User Interface | 43

Page 44: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Chapter 5Global Settings

The Global Settings app allows you to perform the following actions:

n Manage Groups

n Manage Devices

n Manage Subscriptions

n Manage Labels

n Manage Sites

n Manage User Accounts

Managing GroupsThis section includes the following topics:

n About Groups on page 44

n Group Operations on page 53

n Configuring Devices in Template Groups on page 217

n Viewing Configuration Status on page 63

About GroupsCentral supports allocating devices to a groups for the ease of configuration and maintenance.

This chapter includes the following sections:

n Overview

n Deployment Scenarios

n Best Practices and Recommendations

n Group Operations

OverviewCentral supports allocating devices to a groups for the ease of configuration and maintenance. A group inCentral is a primary configuration element that acts like a container. In other words, groups are a subset of oneor several devices that share some common configuration settings.

The device groups in Central are mutually exclusive (independent) and do not follow a hierarchical model.

The device groups feature in Central offers the following functions and benefits:

n Combine different types of devices under a group. For example, a group can have Instant APs and Switches.Central allows you to manage configuration of these devices in separate containers (wireless and wired)within the same group. Similarly, Aruba Switches and the Mobility Access Switches can be managedseparately within the same group.

n Assign multiple devices to a single group. For example, a group can consists of multiple Instant AP virtualcontrollers. These virtual controllers share common configuration settings and push these changes to slaveInstant AP in their respective clusters. You can create a device group with virtual controllers deployed atdifferent geographical locations.

Aruba Central | User Guide Global Settings | 44

Page 45: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

45 | Global Settings Aruba Central | User Guide

n Manage configuration settings of devices at the group level. For example, you can apply a common securitypolicy for the devices deployed in a specific location.

A device can be part of only one group at any given time.

Group OperationsCentral allows you to perform various functions at the All Devices or an individual group level. The following listshows the most common tasks performed at a group level.

n Configuration—Add, modify or delete configuration parameters for devices in a group.

n User management—Control user access to device groups and group operations based the type of user role.

n Device status and health monitoring—View device health and performance for devices in a specific group.

n Report generation—Run reports per group.

n Alerts and notifications—View and configure notification settings per group.

n Firmware upgrades—Enforce firmware compliance across all devices in a group.

Types of GroupsCentral supports the following types of device groups:

n UI groups—Groups that allow you to customize and manage device configuration through the UIworkflows. For example, the APs in a group can be configured using the menu options under the WirelessManagement app. Similarly, Aruba switches can be configured using Wired Management app.

n Template groups—Groups that allow you to manage device configuration through CLI configurationtemplates. The devices in a template group are managed and maintained by a set of CLI-basedconfiguration templates and variable definitions.

Terminology Used in Central for Device Group OperationsThe following list describes the key terms associated with group operations in Central:

n User-defined Groups—Refers to the custom groups created by the administrators of a customer account.The administrators can use the custom groups to apply configuration changes unique to a cluster or agroup.

n Default groups—Refers to the system-defined group that consists of devices with factory defaultconfiguration. When a device running factory default configuration joins Central, it is automatically addedto the default group.

n Unprovisioned—Refers to the system-defined group, which consists of devices that are pre-configuredoutside Central. When a device joins Central with non-default or custom configuration, the device isautomatically assigned to the Unprovisioned group. However, Aruba switches joins Central only if they arerunning factory default configuration. Therefore, the unprovisioned state does not apply to ArubaSwitches.

Page 46: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Groups in the Managed Service PortalIn the Managed Service Portal, the provisioning status of the devices for each customer account is displayed inthe All Customers table. To move a device from the unprovisioned group to the default group of a tenantaccount, the Managed Service Portal administrators must drill down to the customer account and move thedevice to the default group in the Standard Enterprise mode.

If a customer account is associated to a specific group in the Managed Service Portal, the configuration changesto the devices associated with this customer account are pushed only to the default group in the tenantaccount view. However, the Managed Service Portal administrators can create more groups for a specificcustomer by drilling down to a customer account.

Deployment ScenariosThis section describes typical deployment scenarios for provisioning groups:

Scenario 1— Instant AP Provisioning and Configuration through UI GroupsIn this example scenario, the Instant APs from three different geographical locations are grouped under theCalifornia, Texas, and New York states. Each state has unique SSIDs and can support devices from multiplelocations in a state.

As shown in Figure 1, the California group has devices from different locations and has the same SSID, whiledevices in the other states/groups have different SSIDs.

The devices in each of these states are pre-provisioned to share the common configuration settings.

Figure 1 Instant AP provisioning

As illustrated in Figure 1, when the APs that are not pre-provisioned to any group join Central, they are assignedto the groups based on their current configuration.

Aruba Central | User Guide Global Settings | 46

Page 47: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

47 | Global Settings Aruba Central | User Guide

APs with Default Configuration APs with Non-Default Configuration

If an Instant AP with factory default configuration joins Central, itis automatically assigned to the default group or an existinggroup with similar configuration settings.

The administrators can perform any of the following actions:n Manually assign them to a pre-provisioned group.n Create a new group.

If an Instant AP with non-default or customconfiguration joins Central, it is automaticallyassigned to an unprovisioned group.

The administrators can perform any of thefollowing actions:

n Create a new group for the device andpreserve device configuration.n Move the device to an existing group andoverride the device configuration.

Table 10: Instant AP Provisioning

When an Instant AP cluster joins Central:

n If the new cluster was previously a part of a cluster provisioned in Central, the devices are assigned to thesame cluster group.

n If the cluster is new to Central, the devices in the cluster are moved to the unprovisioned group.

Device Configuration

An Instant AP device group may consist of any of the following:

n Instant AP Cluster—Consists of a master Instant AP and slave Instant APs in the same VLAN.

n Virtual Controller—A virtual controller provides an interface for entire cluster. The slave Instant APs andmaster Instant APs function together to provide a virtual interface.

n Master Instant AP and Slave Instant AP—In typical Instant AP deployment scenario, the first Instant AP thatcomes up is elected as the master Instant AP. All other Instant APs joining the cluster function as the slaveInstant APs. When a master Instant AP is configured, the slave Instant APs download the configurationchanges. The master Instant AP may change as necessary from one device to another without impactingnetwork performance.

Central allows configuration operations at the following levels for a device group with Instant APs.

n Per group configuration—Central allows you to maintain unique configuration settings for each group.However, these settings are applied to all devices within that group. For example, all VCs within a group canhave common SSID settings.

n Per VC Configuration—Any changes that need to applied at the Instant AP cluster level can be configuredon a VC within a group. For example, virtual controllers within a group can have different VLANconfiguration for the SSIDs.

n Per Device Configuration—Although devices are assigned to a group, the users can maintain device -specific configuration such as radio, power, or uplink settings for an individual AP within a group.

Configuration Overrides

Central displays an override icon next to the device in the group selector view to indicate the discrepancies ordifferences in the device configuration.

n To view the configuration overrides, click the override icon.

n To resolve overrides and enforce group configuration, click Apply Group Configuration.

Scenario 2—Switch Provisioning through UI GroupsCentral allows switches to join groups only if the switches are running factory default configuration. Switches

Page 48: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

with factory default configuration are automatically assigned to the default group.

The administrators can either move the switch to an existing group or create a new group.

Central does not support provisioning or configuring Aruba 5400R Switch Series and switch stacks through the UIgroups. These devices can only be provisioned under template groups and configured using templates. You cannotmove Aruba 5400R Switch Series from the template group to the UI group. If Aruba 5400R Switch Series is pre-assigned to a UI group, the device is moved to an unprovisioned group after it joins Central.

Device Configuration

Central allows the following configuration operations at the following levels for switches in a group: 

n Per group configuration— Central allows you to maintain unique configuration settings for each group.However, these settings are applied to all devices within that group. For example, all switches within a groupcan have common VLAN settings.

n Per Device Configuration—Although the Switches inherit group configuration, the users can maintaindevice-specific configuration, for example, ports or DHCP pools.

Configuration Overrides

The configuration overrides are indicated with an override icon next to the switches in the group selector view.

n To view the configuration overrides, click the override icon.

n To resolve overrides and enforce group configuration, click Apply Group Configuration.

CLI Snippets

For switches, Central currently includes limited configuration options in the UI. If certain configurationparameters, are not available in the UI, Aruba recommends that you use CLI snippets to push configurationchanges to switches.

Central does not support CLI snippets for Aruba Mobility Access Switches and Instant APs.

The following configuration conditions apply to CLI snippets:

n The UI configuration overrides the configuration changes pushed through the CLI snippets. Hence, CLIsnippets must be used only if the configuration parameters are not available in the UI menu options forswitch configuration.

n The configuration changes pushed through CLI snippets are stored in the flash memory of a switch. Whenthis switch reloads, the configuration changes applied through the CLI snippet persist.

n If the switch resets to factory default configuration, the configuration changes applied through the CLIsnippets are overwritten.

n If the CLI snippet configuration changes are applied on a device in a group, the new devices joining thisgroup will not inherit these changes.

For more information on how to use CLI snippets, see Applying Configuration Changes through CLI Snippetson page 230.

Scenario 3—Device Provisioning through Template GroupsYou can set a group as a template group, so that a common configuration is applied through CLI configurationtemplates for all devices in that group. For the devices in a template group, you can use a configurationtemplate with a standard set of CLI scripts, configuration commands, and variables to push changes to adevice.

Aruba Central | User Guide Global Settings | 48

Page 49: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

49 | Global Settings Aruba Central | User Guide

Configuration Templates and Variable Definitions

You can also provision devices using CLI configuration templates. To use the CLI configuration templates, thedevices must be provisioned in a template group. The configuration options for the devices in a templategroup include adding and uploading CLI configuration templates and variable definitions.

For configuring devices in a template group, ensure that the configuration templates and variable definitionsadhere to the following guidelines:

n The command text indentation in the templates must match the indentation in the running configuration.

n The commands in the template are case-sensitive. The following example with switch configurationcommands illustrates the case discrepancies that the users must avoid in templates and variable definitions.trunk E1-E4 trk1 trunk

interface Trk1dhcp-snooping trust

exit

trunk E1-E4 trk1 trunk

switch-interconnect trk1

trunk E5-E6 trk2 trunk

vlan 5

name "VLAN5"

untagged Trk2tagged Trk1isolate-list Trk1ip igmp forcedfastleave Trk1ip igmp blocked Trk1ip igmp forward Trk1forbid Trk1

loop-protect Trk2

trunk E1-E4 trk1 trunk

trunk E4-E5 trk2 trunk

spanning-tree Trk1 priority 4

spanning-tree Trk2 admin-edge-port

trunk A2-A4 trk1 trunk

igmp fastlearn Trk1

trunk E4-E5 trk2 trunk

ip source-binding 2 4.5.6.7 b05ada-96a4a0 Trk2

[no] ip source-binding trap OutOfResources

snmp-server mib hpSwitchAuthMIB ..

snmp-server mib hpicfMACsec unsecured-access ..

[no] lldp config <P-PORT-LIST> dot1TlvEnable ..

[no] lldp config <P-PORT-LIST> medTlvEnable ..

no lldp config <P-PORT-LIST> medPortLocation..

[no] lldp config <P-PORT-LIST> dot3TlvEnable ..

[no] lldp config <P-PORT-LIST> basicTlvEnable ..

[no] lldp config <P-PORT-LIST> ipAddrEnable <lldp-ip>

Page 50: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

trunk-load-balance L4-based

trunk-load-balance L3-based

n The variable names must be on the left side of condition and its value must be defined on the right side. Forexample, %if var=100% is supported and %if 100=var% is not supported.

n The < or <= or > or >= operators should have only numeric integer value on the right side. The variablesused in these 4 operations are compared as integer after flooring. For example, if any float value is set as%if dpi_value > 2.8%, it is converted as %if dpi_value > 2 for comparison.

n The variable names should not include white space, and the & and % special characters. The variable namesmust match regular expression [a-zA-Z0-9_]. If the variables values with % are defined, ensure that thevariable is surrounded by space. For example, wlan ssid-profile %ssid_name%.

n The first character of the variable name must be an alphabet. Numeric values are not accepted.

n The values defined for the variable must not include spaces. If quotes are required, they must be includedas part of the variable value. For example, if the intended template and variable name iswlan ssid-profile"emp ssid”, the template must be defined template as "wlan ssid-profile %ssid_name%” and variable as“ssid_name”: "\"emp ssid\"".

n For Instant APs:

l You can use a single configuration template to apply changes to all Instant AP devices and firmwareversions.

l The variables configured for the Instant AP devices functioning as the virtual controllers are replacedwith the values configured at the template level.

l For Instant APs, the template allows only one per-ap settings block. The per-ap-settings block usesthe variables for the individual APs. The VC uses the variables for the master AP to generate the finalconfiguration from the provided template. Hence, Aruba recommends that you upload all variables forall devices in a cluster and change values for individual AP variables as required.

l If any device in the cluster has any missing variables, the configuration push to those AP devices in thecluster fails. The audit trail for such instances shows the missing variables.

n For Aruba Switches:

l The configuration changes can be applied to all platforms and firmware versions or to a specific switchmodel and a firmware version. The changes applied for a specific switch model or firmware version takeprecedence over the changes pushed for all platforms and versions through a template.

l The templates must include the following information:

n Header that includes a few lines of the show running-config command output.

n Module information

The following example shows the mandatory lines required in the template:

; J9727A Configuration Editor; Created on release #WB.16.03.0000x

; Ver #0e:73.b8.ee.34.79.3c.29.eb.9f.fc.f3.ff.37.ef:2f

module 1 type j9727a

include-credentials

Sample TemplateThe following example shows the typical contents allowed in a template file for Instant APs:organization %org%

virtual-controller-ip 1.1.1.1

syslog-level debug

syslog-level warn ap-debug

per-ap-settings %_sys_lan_mac%

hostname %hostname%

Aruba Central | User Guide Global Settings | 50

Page 51: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

51 | Global Settings Aruba Central | User Guide

zonename %zonename%

wlan ssid-profile %ssid_name%

%if disable_ssid=true%

disable-ssid

%endif%

%if ssid_security=wpa2%

opmode wpa2-aes

%else%

opmode opensystem

%endif%

%if condition1=true%

routing-profile 10.10.0.0 255.255.255.0 10.10.0.255

%if condition2=true%

routing-profile 10.20.0.0 255.255.255.0 10.20.0.255

%else%

routing-profile 10.30.0.0 255.255.255.0 10.30.0.255

%endif%

%else%

routing-profile 10.40.0.0 255.255.255.0 10.40.0.255

%if condition3=true%

routing-profile 10.50.0.0 255.255.255.0 10.50.0.255

%else%

routing-profile 10.60.0.0 255.255.255.0 10.60.0.255

%endif%

%endif%

Sample Variable File

The following example shows the typical contents of a variable file for Instant APs:{

"CK0036968": {

"_sys_serial": "CK0036968",

"ssid": "s1",

"_sys_lan_mac": "ac:a3:1e:c5:db:7a",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

"hostname": "Uber_1"

},

"CJ0219729": {

"_sys_serial": "CJ0219729",

"ssid": "s1",

"_sys_lan_mac": "ac:a3:1e:cb:04:92",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

"hostname": "Uber_2"

},

"CK0112486": {

"_sys_serial": "CK0112486",

"ssid": "s1",

Page 52: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

"_sys_lan_mac": "ac:a3:1e:c8:29:76",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

"hostname": "Uber_3"

},

"CT0779001": {

"_sys_serial": "CT0779001",

"ssid": "s1",

"_sys_lan_mac": "84:d4:7e:c5:c6:b0",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

"hostname": "Uber_4"

},

"CM0640401": {

"_sys_serial": "CM0640401",

"ssid": "s1",

"_sys_lan_mac": "84:d4:7e:c4:8f:2c",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

"hostname": "Uber_6"

},

"CK0037015": {

"_sys_serial": "CK0037015",

"ssid": "s1",

"_sys_lan_mac": "ac:a3:1e:c5:db:d8",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

"hostname": "Uber_7"

},

"CK0324517": {

"_sys_serial": "CK0324517",

"ssid": "s1",

"_sys_lan_mac": "f0:5c:19:c0:71:24",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

"hostname": "Uber_8"

}

Aruba Central | User Guide Global Settings | 52

Page 53: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

53 | Global Settings Aruba Central | User Guide

}

Best Practices and RecommendationsUse the following best practices and recommendations for deploying devices in groups:

n Determine the use of UI or template groups based on your deployment, configuration, and devicemanagement requirements.

n If there are multiple sites with similar characteristics—for example, with the same device management andconfiguration requirements—assign the devices deployed in these sites to a single group.

n Apply device-level or cluster-level configuration changes if necessary.

n Use groups cloning feature if you need create a group with an existing group configuration settings.

n If the user access to a particular site must be restricted, create separate groups for each site.

n Use CLI snippets for Aruba switches if the configuration parameters are not available in configuration menuoptions for the UI group. However, do consider the limitations associated with the CLI snippet basedconfigurations.

Group OperationsThe Groups page in the UI allows you to create, edit, or delete a group, view the list of groups provisioned inCentral, and assign devices to groups.

This section describes the following topics:

n Groups Dashboard on page 53

n Assigning Devices to a Group in Standard Enterprise Portal on page 55

n Mapping Devices to Groups in Managed Service Portal on page 55

n Creating a Group on page 54

n Cloning a Group on page 54

n Moving Devices between Groups on page 54

n Deleting a Group on page 55

Groups DashboardTo view the groups dashboard, complete the following steps:

1. From the app selector, click Global Settings.

2. Click Manage Groups. The Groups page opens. The groups table on the left side of the page displaysthe following information:

n Group Name—Name of the group.

n Devices—Number of devices assigned to a group.

n All Connected Devices—Total number of devices provisioned in Central. The devices table on rightside of the page show all the devices provisioned in Central.

n Unassigned Devices—Total number of devices that are yet to be assigned. The devices table on theright shows the devices are not assigned any group.

In the Standard Enterprise portal view, users can also view the devices assigned to a group. The devicestable is not available in the Managed Service Portal as the devices are primarily assigned to customeraccounts. However, the administrators can drill down to a tenant account and provision groups, if required.

3. To view the devices assigned to a group, select the group from the table on the left. The devices tabledisplays the following information:

Page 54: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

n Name—Name of the device.

n Location—Physical location of the device.

n Type—Type of the device such as Instant AP or Switch.

n Serial—Serial number of the device.

n MAC address—MAC address of the device.

4. To configure a group, select a group and click the configure button in the selected table row. Theconfiguration page for group opens. For example, if you select template group and click configure, theconfiguration menu options for the devices in a template group, such as configuration templates andvariables, are displayed.

Creating a GroupTo create a group, complete the following steps:

1. From the app selector, click Global Settings.

2. Click Manage Groups. The Groups page opens.

3. To create a new group, click the New Group to create a new group. The Create New Group paneappears.

4. Enter a name for the group in Enter Group Name5. If you are creating a UI group, configure a password.

6. To create a template group, select the Set this group as a template group check box.

7. Click Add Group.

If the group is set as a template group, the configuration is applied to all the devices in the group. For devices in suchgroups, the configuration wizards in the UI are disabled.

Cloning a GroupTo clone a group, complete the following steps:

1. From the app selector, click Global Settings.

2. Click Manage Groups. The Groups page opens.

3. To create a clone of an existing group, select UI group from the groups table, and then click the CloneSelected Group link.

4. Enter a name for the cloned group.

5. Click Add Group.

The cloning feature is supported only for the UI groups.

Moving Devices between GroupsTo move a device from one group to another group:

1. From the app selector, click Global Settings.

2. Click Manage Groups. The Groups page opens.

3. From the devices table on the right, select the device to move.

4. Drag and drop the device to group to which you want to assign the device.

5. Click Yes when the system prompts you to confirm device movement.

Aruba Central | User Guide Global Settings | 54

Page 55: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

55 | Global Settings Aruba Central | User Guide

The Managed Service Portal does not support moving devices across different groups.

Deleting a GroupTo delete a group, select the group to delete and click the delete icon.

Assigning Devices to a Group in Standard Enterprise PortalTo assign devices to a group, complete the following steps:

1. From the app selector, click Global Settings.

2. Click Manage Groups. The Groups page opens.

3. In the Groups page, you can perform one of the following actions:

l In the groups table on the left, click Unassigned Devices. A list of unassigned devices is displayed in thedevices table.

l Select the group from which you want to move the devices. The Device table lists the devices present inthe group.

4. From the devices table on the right, select one or several devices to assign.

5. Drag and drop the devices to the group that you want to assign them to.

Mapping Devices to Groups in Managed Service PortalTo map devices to customer accounts, complete the following steps:

1. From the app selector, click Global Settings.

2. Click Device Inventory. A list of devices provisioned in the Managed Service Portal is displayed.

3. Select one or several devices from the table. The Assign To Customer button shows up under the table.

4. Click Assign To Customer. A window showing a list of customer accounts provisioned in the ManagedService Portal appears.

5. Select the customer account to which you want to assign the device. The groups associated with thecustomer accounts are displayed.

6. Click Assign Device(s).7. Click Yes when prompted for confirmation.

Configuring Devices in Template GroupsCentral allows you to provision devices in UI or template groups. For devices mapped to a template group, youcan create a template with a standard set of CLI scripts, configuration commands, and variables. If a group isset as a template group, the UI configuration wizards for the devices in that group are disabled.

The Aruba 5400R Switch Series and switch stacks can be configured only by using the configuration templates.

You can set a group as a template group, so that a common configuration is applied for all devices in the group.

Creating a Template GroupTo create a template group, complete the following steps:

1. From the app selector on the left pane, select the Global Settings app.

2. Click Manage Groups.

Page 56: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

3. Click (+) to create a new group. The Create New Group pane appears.

4. To set the group as a template group, select the Use As a Template Group check box.

5. Click Save.

Creating a Configuration Template for Instant APsTo create a template for the devices in a template group, complete the following steps:

1. From the app selector, click Wireless Configuration.

2. Select a template group. The template configuration menu options are displayed.

3. Click Templates. The Templates page opens.

4. Click + to add a new template. The Add Template window opens.

5. Add the template name.

6. Ensure that the device category is set to Instant AP.

7. Set the model and firmware version parameters to ALL.

8. Add the CLI script content. Note the following points for adding contents to the template:

n Ensure that the command text indentation matches the indentation in the running configuration.

n The template allows only one per-ap settings block. It must include the per-ap-settings %_sys_lan_mac% variable. The per-ap-settings block uses the variables for the individual APs. The generalVC configuration uses variables for master AP to generate the final configuration from the providedtemplate. Hence, Aruba recommends that you upload all variables for all devices in a cluster andchange values as required for individual AP variables.

n The commands in the template are case-sensitive.

n IF ELSE ENDIF conditions are supported in the template. If the template text includes the if condition,% sign is required at the beginning and the end of the text. For example, %if guest%. The followingexample shows the template text with the IF ELSE ENDIF condition.

wlan ssid-profile %ssid_name%

%if disable_ssid=true%

disable-ssid

%endif%

%if ssid_security=wpa2%

opmode wpa2-aes

%else%

opmode opensystem

%endif%

n Templates also support nesting of the IF ELSE END IF condition blocks. The following example showshow to nest such blocks:

%if condition1=true%

routing-profile 10.10.0.0 255.255.255.0 10.10.0.255

%if condition2=true%

routing-profile 10.20.0.0 255.255.255.0 10.20.0.255

%else%

routing-profile 10.30.0.0 255.255.255.0 10.30.0.255

%endif%

%else%

routing-profile 10.40.0.0 255.255.255.0 10.40.0.255

%if condition3=true%

routing-profile 10.50.0.0 255.255.255.0 10.50.0.255

%else%

routing-profile 10.60.0.0 255.255.255.0 10.60.0.255

Aruba Central | User Guide Global Settings | 56

Page 57: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

57 | Global Settings Aruba Central | User Guide

%endif%

%endif%

n For profile configuration CLI text, for example, vlan, interface, access-list, ssid and so on, the firstcommand must start with no whitespace. The subsequent local commands in given profile must startwith at least one initial space (' ') or indented as shown in the following examples:

Example 1

vlan 1

name "vlan1"

no untagged 1-24

ip address dhcp-bootp

exit

Example 2%if vlan_id1%

vlan %vlan_id1%

%if vlan_id1=1%

ip address dhcp-bootp

%endif%

no untagged %_sys_vlan_1_untag_command%

exit

%endif%

n To comment out a line in the template text, use the pound sign (#). Any template text preceded by #is ignored when processing the template.

9. Click OK.

The variables configured for the Instant AP devices functioning as the VCs are replaced with the values configured atthe template level.

If any device in the cluster has any missing variables, the configuration push to those AP devices in the cluster fails.The audit trail for such instances shows the missing variables.

Sample Template

The following example shows the typical contents allowed in a template file for Instant APs:organization %org%

virtual-controller-ip 1.1.1.1

syslog-level debug

syslog-level warn ap-debug

per-ap-settings %_sys_lan_mac%

hostname %hostname%

zonename %zonename%

wlan ssid-profile %ssid_name%

%if disable_ssid=true%

disable-ssid

%endif%

%if ssid_security=wpa2%

opmode wpa2-aes

%else%

opmode opensystem

%endif%

%if condition1=true%

routing-profile 10.10.0.0 255.255.255.0 10.10.0.255

%if condition2=true%

routing-profile 10.20.0.0 255.255.255.0 10.20.0.255

%else%

Page 58: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

routing-profile 10.30.0.0 255.255.255.0 10.30.0.255

%endif%

%else%

routing-profile 10.40.0.0 255.255.255.0 10.40.0.255

%if condition3=true%

routing-profile 10.50.0.0 255.255.255.0 10.50.0.255

%else%

routing-profile 10.60.0.0 255.255.255.0 10.60.0.255

%endif%

%endif%

Creating a Configuration Template for Aruba SwitchesTo create a template for the devices in a template group, complete the following steps:

1. From the app selector, click Wired Configuration.

2. Select a template group. The template configuration menu options are displayed.

3. Click Templates. The Templates page opens.

4. Click + to add a new template.

5. Add the template name.

6. Select Aruba Switches for the device type.

7. Specify the model and the firmware version.

n To create a single template for all Switch platforms and firmware versions, select ALL.

n To create a template for a specific model and firmware version, select the Switch model and the firmwareversion. The template created for a specific switch model and a firmware version takes precedence overthe template created for all platforms and versions.

8. Add the CLI script content. Note the following points for adding contents to the template:

n Ensure that the command text indentation matches the indentation in the running configuration.

n The commands in the template are case-sensitive. The following example illustrates the casediscrepancies that the users must avoid in templates and variable definitions.

trunk E1-E4 trk1 trunk

interface Trk1dhcp-snooping trust

exit

trunk E1-E4 trk1 trunk

switch-interconnect trk1

trunk E5-E6 trk2 trunk

vlan 5

name "VLAN5"

untagged Trk2tagged Trk1isolate-list Trk1ip igmp forcedfastleave Trk1ip igmp blocked Trk1ip igmp forward Trk1forbid Trk1

loop-protect Trk2

trunk E1-E4 trk1 trunk

trunk E4-E5 trk2 trunk

Aruba Central | User Guide Global Settings | 58

Page 59: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

59 | Global Settings Aruba Central | User Guide

spanning-tree Trk1 priority 4

spanning-tree Trk2 admin-edge-port

trunk A2-A4 trk1 trunk

igmp fastlearn Trk1

trunk E4-E5 trk2 trunk

ip source-binding 2 4.5.6.7 b05ada-96a4a0 Trk2

[no] ip source-binding trap OutOfResources

snmp-server mib hpSwitchAuthMIB ..

snmp-server mib hpicfMACsec unsecured-access ..

[no] lldp config <P-PORT-LIST> dot1TlvEnable ..

[no] lldp config <P-PORT-LIST> medTlvEnable ..

no lldp config <P-PORT-LIST> medPortLocation..

[no] lldp config <P-PORT-LIST> dot3TlvEnable ..

[no] lldp config <P-PORT-LIST> basicTlvEnable ..

[no] lldp config <P-PORT-LIST> ipAddrEnable <lldp-ip>

trunk-load-balance L4-based

trunk-load-balance L3-based

9. Ensure that the template contains the following mandatory information:

n Header that includes a few lines of the show running-config command output.

n Module information

The following example shows the mandatory lines required in the template:; J9727A Configuration Editor; Created on release #WB.16.03.0000x

; Ver #0e:73.b8.ee.34.79.3c.29.eb.9f.fc.f3.ff.37.ef:2f

module 1 type j9727a

include-credentials

10. Click OK.

A configuration template push does not reboot the Aruba switches running 16.05.0007 or a later software version,unless the configuration changes applied through the template require a reboot.

Editing a TemplateTo edit or delete a template, select the template row and click the edit or delete icon, respectively.

Managing Variable FilesThe variable files consist of a set of configuration values defined for devices in the network.

For Instant APs, you can configure a variable file with a set of values defined for a specific AP device that functions asthe VC in the network. When the variable file is uploaded, the configuration values are applied on the Instant APdevices in the cluster.

Page 60: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

The following conditions apply to the variable files:

n The variable names must be on the left side of condition and its value must be defined on the right side. Forexample, %if var=100% is supported and %if 100=var% is not supported.

n The < or <= or > or >= operators should have only numeric integer value on the right side. The variablesused in these 4 operations are compared as integer after flooring. For example, if any float value is set as%if dpi_value > 2.8%, it is converted as %if dpi_value > 2 for comparison.

n The variable names should not include white space, and the & and % special characters. The variable namesmust match regular expression [a-zA-Z0-9_]. If the variables values with % are defined, ensure that thevariable is surrounded by space. For example, wlan ssid-profile %ssid_name%.

n The first character of the variable name must be an alphabet. Numeric values are not accepted.

n The values defined for the variable must not include spaces. If quotes are required, they must be includedas part of the variable value. For example, if the intended template and variable name iswlan ssid-profile"emp ssid”, the template must be defined template as "wlan ssid-profile %ssid_name%” and variable as“ssid_name”: "\"emp ssid\"".

n If the configuration text has the percentile % in it—for example, "url "/portal/scope.cust-5001098/Splash%20Profile%201/capture"—Central treats it as a variable when you save the template.To allow the use of percentile % as an escape character, use \" in the variable definition as shown in thefollowing example:

Template textwlan external-captive-portal "Splash Profile 1_#guest#_"

server naw1.cloudguest.central.arubanetworks.com

port 443

url %url%

Variable"url": "\"/portal/scope.cust-5001098/Splash%20Profile%201/capture\""

Predefined Variables for Aruba Switches

Although all Aruba Switches can be configured by using common configuration templates, the configuration ofthese switches may need to change per device. Central uses the predefined variables to address the per deviceconfiguration requirements.

Central parses a set of predefined variables from the running configuration of the switches and identifies theseas the variables per device. All the pre-defined variables are prefixed by sys..

The following is the list of predefined variables used for configuring switches.

n sys_template_header_ —Represents the first two lines of the configuration file. Ensure that this variable isthe first line in the template.

n snmpv3 engineid "%_sys_snmpv3_engineid%"—Populates engine ID.

n _sys_module_command—Populates module lines.

n ip default-gateway _sys_gateway—Populates gateway IP address.

n hostname _sys_hostname—Maintains unique host name.

n _sys_oobm_command—Represents Out of Band Management (OOBM) block.

n _sys_ip_address—Indicates the IP address of the device.

n _sys_netmask—Netmask of the device.

n _sys_use_dhcp—DHCP status (true or false) of VLAN 1.

n _sys_vlan_1_untag_command—Untagged ports of VLAN 1.

n _sys_vlan_1_tag_commandn _sys_stack_command— Represents stack block.

Aruba Central | User Guide Global Settings | 60

Page 61: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

61 | Global Settings Aruba Central | User Guide

The _sys_template_header_ and snmpv3 engineid "%_sys_snmpv3_engineid%" are mandatory variables that musthave the values populated, irrespective of their use in the template. If there is no value set for these variables, Centralre-imports the values for these mandatory variables when it processes the running configuration of the device.

Example

The following table provides an example for the predefined variable definitions:

Variable Name Variable Value

_sys_oobm_command oobm                          ip address dhcp-bootp        exit

_sys_template_header  ; J9729A Configuration Editor; Created on release #WB.16.03.0003+; Ver #0f:3f.f3.b8.ee.34.79.3c.29.eb.9f.fc.f3.ff.37.ef:91

_sys_hostname  HP-2920-48G-POEP

_sys_gateway  10.22.159.1

_sys_vlan_1_untag_command  1-28,A1-A2

_sys_ip_address  10.22.159.201

_sys_use_dhcp  0

_sys_module_command  module 1 type j9729a

_sys_stack_command stackingmember 1 type "J9729A" mac-address 5cb901-224c00exit

_sys_vlan_1_tag_command  28-48

_sys_netmask  255.255.255.0

_sys_snmpv3_engineid  00:00:00:0b:00:00:5c:b9:01:22:4c:00

Table 11: Predefined Variables Example

Uploading Variable FilesTo upload a variable file, complete the following steps:

1. Click Download Sample Variables File. Save the JSON file with the sample variables.

2. Edit the variable file to customize the definitions.

3. Ensure that the _sys_serial and _sys_lan_mac variables are defined with the serial number and MACaddress of the devices, respectively.

4. Click Wireless Management > Configuration > Variables. The Variables page opens.

5. Click Upload Variables File and select the variable file to upload.

6. Click Open. The content of the variable file is displayed in the Variables table.

7. To search for a variable, specify a search term and click the Search icon.

Page 62: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Downloading Variable FilesTo download the variable file applied for the devices, click the download icon in the Variables table.

Sample Variable FileThe following example shows the typical contents of a variable file for Instant APs:{

"CK0036968": {

"_sys_serial": "CK0036968",

"ssid": "s1",

"_sys_lan_mac": "ac:a3:1e:c5:db:7a",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

"hostname": "Uber_1"

},

"CJ0219729": {

"_sys_serial": "CJ0219729",

"ssid": "s1",

"_sys_lan_mac": "ac:a3:1e:cb:04:92",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

"hostname": "Uber_2"

},

"CK0112486": {

"_sys_serial": "CK0112486",

"ssid": "s1",

"_sys_lan_mac": "ac:a3:1e:c8:29:76",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

"hostname": "Uber_3"

},

"CT0779001": {

"_sys_serial": "CT0779001",

"ssid": "s1",

"_sys_lan_mac": "84:d4:7e:c5:c6:b0",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

Aruba Central | User Guide Global Settings | 62

Page 63: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

63 | Global Settings Aruba Central | User Guide

"hostname": "Uber_4"

},

"CM0640401": {

"_sys_serial": "CM0640401",

"ssid": "s1",

"_sys_lan_mac": "84:d4:7e:c4:8f:2c",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

"hostname": "Uber_6"

},

"CK0037015": {

"_sys_serial": "CK0037015",

"ssid": "s1",

"_sys_lan_mac": "ac:a3:1e:c5:db:d8",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

"hostname": "Uber_7"

},

"CK0324517": {

"_sys_serial": "CK0324517",

"ssid": "s1",

"_sys_lan_mac": "f0:5c:19:c0:71:24",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

"hostname": "Uber_8"

}

}

Check the audit trail to troubleshoot issues pertaining to template-based configuration.

Central supports backing up and restoring configuration templates and variables for devices deployed in templategroups. For more information, see Backing up and Restoring Configuration Templates.

Viewing Configuration StatusCentral provides an audit dashboard for reviewing configuration changes for the devices provisioned in UI andtemplate groups. The Configuration Audit menu option in the Wireless Management and WiredManagement apps allows you to view the configuration template errors, configuration sync, and device levelconfiguration overrides.

Page 64: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Viewing Configuration Audit PageTo access the Configuration Audit page:

n For Instant APs:

a. From the app selector, click Wireless Management.

b. From the group selection filter, select a group or device.

c. Click Configuration Audit.

n For switches:

a. From the app selector, click Wired Management.

b. From the group selection filter, select a group or device.

c. Click Configuration Audit.

Configuration Synchronization ErrorsThe devices managed by Central receive the configuration changes from Central. Occasionally, a Central-managed device may fail to receive a configuration change from Central. Such instances are marked as Failedchanges in the Configuration Audit dashboard. If the condition persists, contact ArubaCentral TechnicalAssistance.

Template ErrorsDevices deployed in the template group are provisioned using configuration templates. If there are errors inthe templates or variable definitions, the configuration push to the devices fails. Central records such failedinstances as template errors and displays these errors on the Configuration Audit page.

Local OverridesIn Central, devices are assigned to groups that serve as the primary configuration elements. Occasionally,based on the network provisioning requirements, the administrators may need to modify the configuration ofa specific device in a group. As these modifications override the configuration settings that the device hasinherited from the group, Central marks these as local overrides.

Viewing Status for a Template GroupOn selecting a template group from the filter bar, the Configuration Audit page displays the options listed inTable 12:

Aruba Central | User Guide Global Settings | 64

Page 65: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

65 | Global Settings Aruba Central | User Guide

Data PaneContent

Description

TemplateErrors

Displays the number of template errors for the selected template group.Devices deployed in the template group are provisioned using configuration templates. If thereare errors in the templates or variable definitions, the configuration push to the devices fails.Central records such failed instances as template errors and displays these errors on theConfiguration Audit pageTo view a complete list of errors, click View Template Errors. The Template Errors pop-upwindow allows you view and resolve the template errors issues if any.

FailedChanges

Displays the number configuration sync errors for the selected template group. To view andresolve the configuration sync errors, click the Failed Config Difference link.

ConfigurationBackup andRestore

Allows you create a backup of templates and variables applied to the devices in the templategroup. For more information, see Backing up and Restoring Configuration Templates.

All Devices The All Devices table provides the following device information for the selected group:n Name—The name of the device.n Type—The type of the device.n Config Sync—Indicator showing configuration sync errors.n Template Errors—Indicator showing configuration template errors for the devicesdeployed in template groups.

Table 12: Configuration Audit Status for a Template Group

Viewing Status for Devices Assigned to a Template GroupOn selecting a device that is provisioned in a template group, the Configuration Audit page displays theoptions listed in Table 12:

Data PaneContent

Description

TemplateApplied

Displays the template that is currently applied on the selected device.

TemplateErrors

Displays the number of template errors for the selected device. To view a complete list of errors,click View Template Errors.

FailedChanges

Displays the number of configuration sync errors for the selected device. To view and resolve theconfiguration sync errors, click the Failed Config Difference link.

ConfigComparisonTool

Allows you to view the difference between the current configuration and the configuration that isyet to be pushed to the device (pending configuration).To view the current and pending configuration changes side by side, click View.

Table 13: Configuration Audit Status for Devices in Template Groups

Page 66: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Viewing Configuration Status for a UI GroupOn selecting a UI group, the Configuration Audit page displays the options listed in Table 12.

DataPaneContent

Description

FailedChanges

Displays the number of devices with configuration sync errors for the selected UI group.To view and resolve the configuration sync errors, click the Failed Config Difference link.

LocalOverrides

Displays the number of devices with local overrides. To view a complete list of overrides, click theManage Local Overrides link. The Local Overrides pop-up window opens.

n To preserve the overrides, click Close.n To remove the overrides, select the group name with local override, click Remove and clickOK.

All Devices The All Devices table provides the following device information for the selected group:n Name—The name of the device.n Type—The type of the device.n Config Sync—Indicator showing configuration sync errors.n Local Override—Indicator showing configuration overrides for the devices deployed in UIgroups.

Table 14: Configuration Audit Status for a UI Group

Viewing Configuration Status for Devices Assigned to a UI GroupOn selecting a device assigned to a UI group, the Configuration Audit page displays the options listed in Table12.

Data PaneContent

Description

Failed Changes Displays the number of devices with configuration sync errors for the selected device.To view and resolve the configuration sync errors, click the Failed Config Difference link.

Local Overrides Displays the number of local overrides. To view a complete list of overrides, click the ManageLocal Overrides link.The Local Overrides pop-up window opens.

n To preserve the overrides, click Close.n To remove the overrides, click Remove, and click OK.

Table 15: Configuration Audit Status for a Device Assigned to a UI Group

Backing up and Restoring Configuration TemplatesCentral now includes the Configuration Backup and Restore feature for the Wireless Management andWired Management applications. The backup and restoration options are available for devices deployed intemplate groups.

The backup and restore feature allows the administrators to perform the following functions:

n Back up templates and variable files applied to the devices in template groups. You can create and maintainup to 20 backed up configuration files. If the number of backup files exceed 20, the old backed up

Aruba Central | User Guide Global Settings | 66

Page 67: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

67 | Global Settings Aruba Central | User Guide

configuration files are overwritten. However, if the backed up files are marked as Do not Delete, Centralwill not overwrite the backed up configuration files.

n Restore an earlier known working combination of the configuration template and device variables in theevent of a failure.

Note the following points when using this feature:

n When the backup or restore for a template group is in progress, you cannot make configuration changes tothat group.

n The restore operation restores the variables only for the devices that are currently provisioned or pre-provisioned to the group.

n The restore operation is terminated if the firmware version running on any one device in the group does notmatch the firmware version in the backed up file that is being restored. For example, if the configuration filewas backed up when a switch was running 16.03.0003 and was later upgraded to 16.04.0003, the restoreoperation fails for the group.

n The restore operation deletes any templates applied to the group before the restore. It also deletes andreplaces device variables with the backed up version that is being restored.

n The details pertaining to the actions carried out during the backup and restore operations are logged underAudit Trail.

Aruba recommends that the administrators take a backup of the current configuration of the template group beforerestore.

Viewing the Contents of a Backed up ConfigurationTo view the contents of a backed up configuration:

1. Click the Manage Backup option.

2. Download the backup and untar the downloaded file. The following example shows the tree structure ofa typical backup download.<backup-name_timestamp>

├── templates

│ ├──<hppctemplate1.tmpl>

│ ├──<iaptemplate1.tmpl>

│ ├──template_meta.json

└── variables

├──HPPC_variables_1.json

├──IAP_variables_1.json

└──devices_meta.json

The variables in the tree structure are stored per device type, that is, Instant APs and Aruba Switches. For example,for all Instant APs, the variables are aggregated and stored together.

The aggregated file can include variables for up to 80 devices or up to 5 MB of variables data, based on whichevercondition is met first. When the number of variables or the data size exceeds this limit, new aggregate files arecreated and added to the backup until all the variables in the selected group are backed up. The variable data limitapplies only to the aggregated files. Central does not impose any limit on the number of devices or the devicevariables that can be backed up.

The backup and restore feature supports the following functions:

n Backups—provides details of the number of available and allowed backup and allows you to perform thefollowing actions:

l Manage group configuration backups

Page 68: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

l Create new configuration backups

l Backup delete protection

n Last Backup—provides details of the status and the timestamp of the last backup.

n Last Restore—provides details of the status and the timestamp of the last restore.

Creating a Configuration BackupTo create a backup for a template group configuration:

1. From the group selector, select the required template group.

2. Depending on the template group selected, go to one of the following paths:

a. For Instant AP templates, go to Wireless Management > Configuration Audit.

b. For Switch templates, go to Wired Management > Configuration Audit.

3. Click New Configuration Backup under Configuration Backup and Restore. The Create NewBackup pop-up box opens.

4. Enter a name for Backup Name.

5. Select Do Not Delete if you do not want the backed up file to be deleted by new backup after athreshold of 20 backups is exceeded.

You can store up to 20 configuration backups in Central. When this threshold is exceeded, older backups aredeleted.

6. Click OK. The Confirm Backup pop-up window opens.

7. Read through the information. Select the check box to confirm that configuration changes to the groupcannot be done when the backup is in progress.

8. Click Proceed. The backup for the group configuration is created.

Restoring a Backed up ConfigurationTo restore a configuration backup for the group:

1. From the group selector, select the required template group.

2. Depending on the template group selected, go to one of the following paths:

a. For Instant AP templates, go to Wireless Management > Configuration Audit.

b. For Switch templates, go to Wired Management > Configuration Audit.

3. Click Restore Configuration Backup under Configuration Backup and Restore. The Restore fromBackup pop-up window opens.

4. Select the backup name that you want to restore from Backup Name drop-down list.

5. Click OK. The Confirm Configuration Restore pop-up box opens.

6. Read the instructions. Then, click the check boxes to confirm your configuration restore.

7. Click Proceed. The selected backup configuration is restored.

Managing BackupsTo manage the backed up configuration files:

1. From the group selector, select the required template group.

2. Depending on the template group selected, go to one of the following paths:

a. For Instant AP templates, go to Wireless Management > Configuration Audit.

Aruba Central | User Guide Global Settings | 68

Page 69: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

69 | Global Settings Aruba Central | User Guide

b. For Switch templates, go to Wired Management > Configuration Audit.

3. Click Manage Backup under Configuration Backup and Restore. The Last <#> Backups pop-upwindow opens.

4. View the backup details such as date and time of backup, backup name, username, and the deleteprotection status for each configuration backup.

5. Click Close.

6. Click Last Backup Log to view the details of the latest backup. The Last Backup Log pop-up boxdisplays the following details:

l Group name

l Backup name

l Username that initiated the configuration backup

l Details on whether templates and device variables are being saved, and completion of the configurationbackup process.

7. To get the status of the last restore, click Last Restore Log. To get the error log for a restore error event,click Last Restore Error Log.

Creating a Backup using APIsYou can back up a template group configuration using the NB API Gateway. Use the following API to create abackup for a template group:

n Create New Configuration Backup for Group

[POST] /configuration/v1/groups/snapshot/{group}

Managing SitesCentral allows grouping of devices provisioned in the same physical location. A site in Central refers to aphysical location where a set of devices are installed; for example, campus, branch, or venue.

OverviewCentral allows you to use sites as a primary navigation element. For example, if your devices are deployed in acampus, you could create a site called CampusA. You can also tag the devices within CampusA using labels. Forexample, if the campus consists of multiple buildings, the devices deployed in the campus can be labeled asBuilding1 or Lobby. If the devices in a specific location or an area within a specific location must have similarconfiguration, the devices can be grouped together.

How are sites different from labels?In the previous versions of Central, the administrators could create the following types of labels:

n Default—Label category for tagging devices

n Sites—Label category used for devices deployed in a specific site. This category was used in datapresentation for the Presence Analytics app.

Although labels could be used to provide a location context, a hierarchical distinction of physical sites andspecific areas within a site is required for filtering devices for monitoring and reporting purposes.

Page 70: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

The Sites feature introduced in the current version of Central allows you to explicitly tag devices to a physicallocation, for example, Campus, Branch, or Venue. You can use sites as a primary navigation element formonitoring and reporting purposes.

Central allows you to assign up to five label tags per device. However, each device can be assigned to only one site.

How do sites work in Central?Central allows you to create new sites on the Global Settings > Labels and Sites > Sites page.

Sites offer the following features and benefits:

n Moving devices from inventory to a specific site based on the device name

n Filtering devices per site for monitoring and viewing reports

n Converting existing labels to sites

n Bulk import of sites from a CSV file

When to use sites?If your setup requires Central applications to filter devices based on a physical location, use the sites feature.Central allows you to use sites as a primary navigation element and as a filter criterion for the followingapplications and functions:

n Monitoring

n Reports

n Presence Analytics

n Clarity

What workflows for sites are available in the UI?The Central UI introduces the following workflows in the user interface:

UIFunctions /Applications

Enhancements and Changes

GlobalSettings >Labels andSites

The Labels and Sites page offers a separate workflow for labels and sites. To switch betweenlabels and sites, use the toggle switch on the Labels and Sites page.

n Labels—Allows you to create and assign labels to devices. All new labels are tagged to theDefault label category.n Sites—Allows you to create sites, add devices to a site, and migrate and labels to sites.

Filter bar The filter bar on the main window displays a list of sites configured in your setup. You can alsofilter data pane contents per site.

Clarity The Clarity app now allows you to filter data per site.

Monitoring &Reports

The Monitoring & Reports app now includes the following changes:n Label Health—Provides a dashboard view of devices that are tagged to labels.n Network Overview, Client Overview, AppRF, VisualRF, and Reports—Allow you to filterdevice details for sites. For example, to view details of the Instant APs provisioned on a specificsite, select the site from the filter bar.

Aruba Central | User Guide Global Settings | 70

Page 71: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

71 | Global Settings Aruba Central | User Guide

Sites PageThe Sites page in the UI allows you to create sites, view the list of sites configured in your setup, and assigndevices to sites.

The Sites page includes the following functions:

Name Contents of the Table

ConvertLabels toSites

Allows you to convert existing labels to sites. To convert labels, download the CSV file with the listof labels configured in your setup, add the site information, and upload the CSV file. For moreinformation, see Creating a Site on page 71.

Sites Table Displays a list of sites configured in Central. It provides the following information:n Site Name—Name of the site.n Address—Physical address of the site.n Device Count—Number of devices assigned to a site.

The table also includes the following sorting options to reset the table view on the right:n All Devices—Displays all the devices provisioned in Central.n Unassigned—Displays the list of devices that are not assigned to any site.

You can also use the filter and sort icons on the Sites and Address columns to filter and sort sitesrespectively.

New Site Allows you to create a new site.

Bulk upload Allows you to add sites in bulk from a CSV file.

Devices Table Displays a list of devices provisioned in Central. It provides the following information:n Name—Name of the devicen Group—Group to which the device is assigned.n Type—Type of the device.

Table 16: Sites Page

Creating a SiteTo create a site, complete the following steps:

1. From the app selector, click Global Settings.

2. Click Labels and Sites. The Labels and Sites page opens.

3. Set the toggle switch to Sites. The site management options are displayed.

4. To add a new site, click (+) New Site. The Create New Site pop-up window opens.

5. Enter a name for the site, add address details, and the postal code.

6. Click Add. The new site is added to the Sites table.

Add Multiple Sites in BulkTo import site information from a CSV file in bulk, complete the following steps:

1. From the app selector, click Global Settings.

2. Click Labels and Sites. The Labels and Sites page opens.

3. Set the toggle switch to Sites. The site management options are displayed.

4. Click (+) Bulk upload. The Bulk Upload pop-up opens.

5. Download a sample file.

6. Fill the site information and save the CSV file in your local directory.

Page 72: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

7. On the Global Settings > Labels and Sites > Sites > (+) Bulk upload window, click Browse and addthe file from your local directory.

8. Click Upload. The sites from the CSV file are added to the site table.

Assigning a Device to a SiteTo assign devices to a site, complete the following steps:

1. On the Global Settings > Labels and Sites > Sites page, locate the site to which you want to assign adevice.

2. SelectUnassigned. The list of devices that are not assigned to any site is displayed.

3. Select one or several devices from the list of devices.

4. Drag and drop the devices to the site on the left. A pop-up window opens and prompts you to confirmthe site assignment.

5. Click Yes.

Converting Existing Labels to SitesTo convert existing labels to sites, complete the following steps:

1. From the app selector, click Global Settings.

2. Click Labels and Sites. The Labels and Sites page opens.

3. Set the toggle switch to Sites. The site management options are displayed.

4. Click Convert Labels to Sites. The Confirm Conversion pop-up window opens.

5. To download a CSV file with the list of labels configured in your setup, click Download a File. A CSV filewith a list of all the labels in your setup is downloaded to your local directory.

6. Enter address, city, state, country, and ZIP code details for the labels that you want to convert to sites.

7. Save the CSV file.

8. On the Confirm Conversion pop-up window, click Browse and select the CSV file with the list of labelsto convert.

9. Click Upload.

10. Click Convert. The labels are converted to sites.

If the conversion process fails for some labels, Central generates and opens an Excel file showing a list of labels thatcould not be converted to sites. Verify the reason for the errors, update the CSV file, and re-upload the file.

Central does not allow conversion of sites to labels. If the existing labels are converted to sites, you cannot revertthese sites to labels.

When the existing labels are converted to sites, Central retains only the historical data for these labels. Centraldisplays the historical data for these labels only in reports and on the monitoring dashboard.

Editing a SiteTo modify site details, complete the following steps:

1. On the Global Settings > Labels and Sites > Sites page, select the site to edit.

2. Click the edit icon.

3. Modify the site information and click Update.

Aruba Central | User Guide Global Settings | 72

Page 73: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

73 | Global Settings Aruba Central | User Guide

Deleting a SiteTo delete a site, complete the following steps:

1. On the Global Settings > Labels and Sites > Labels page, select the site to delete.

2. Click the delete icon.

3. Confirm deletion.

Managing LabelsLabels are tags attached to a device provisioned in the network. Labels determine the ownership, departments,and functions of the devices. You can use labels for creating a logical set of devices and use these labels asfilters when monitoring devices and generating reports.

For example, consider an Instant AP labeled as Building 25 and Lobby. These tags identify the location of theInstant AP within the enterprise campus or a building. The Instant APs in other buildings within the samecampus can also be tagged as Lobby. To filter and monitor Instant APs in the lobbies of all the campusbuildings, you can tag all the Instant APs in a lobby with the label Lobby.

Device ClassificationThe devices can also be classified using Groups and Sites.

n The group classification can be used for role-based access to a device, while labels can be used for tagging adevice to a location or a specific area at a physical site. However, if a device is already assigned to a groupand has a label associated with it, it is classified based on both groups and labels.

n The site classification is used for logically grouping devices deployed at a given physical location. You canalso convert labels to sites.

Labels PageThe Labels page in the UI allows you to create labels, view a list of labels, and assign devices to labels. The pageincludes two tables. The table on the left lists the labels, whereas the table on the right lists the devices. Thesetables provide the following information:

Name Contents of the Table

Labels This table displays a list of labels configured in Central. It provides the following information:n Name of the labeln Number of devices assigned to a label

The table also includes the following sorting options to reset the table view on the right:n All Devices—Displays all the devices provisioned in Central.n Unassigned—Displays the list of devices that are not assigned to any label.

Devices This table displays a list of devices provisioned in Central. It provides the following information about thedevices:

n Name—Name of the devicen Group—Group to which the device is assignedn Type—Type of the devicen Labels—Number of labels assigned to a device

Table 17: Labels

Page 74: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Creating a LabelTo create a label, complete the following steps:

1. From the app selector, click Global Settings.

2. Click Labels and Sites. The Labels and Sites page opens.

3. Ensure that the Label option is enabled.

4. To add a new label, click (+) Add Label. The Create New Label pop-up window opens.

5. Enter a name for the label.

6. Click Add. The new label is added to the All Labels table.

Assigning a Device to a LabelTo assign a label to a device, complete the following steps:

1. On the Global Settings > Labels and Sites > Labels page, locate the label to which you want to assigna device.

2. In the table that lists the labels, you can perform one of the following actions:

n Click All Devices to view all devices.

n Click Unassigned to view all the devices that are not assigned to any labels.

3. Select Unassigned. The list of devices that are not assigned to any label is displayed.

4. Select one or several devices from the list of devices.

5. Drag and drop the selected devices to a specific label. A pop-up window asking you to confirm the labelassignment opens.

6. Click Yes.

Central allows you to assign up to five label tags per device.

Detaching a Device from a LabelTo remove a label assigned to a device, complete the following steps:

1. On the Global Settings > Labels and Sites > Labels page, select the device from the table on theright.

2. Click the delete icon.

3. To detach labels from the multiple devices at once, select the devices, and click Batch Remove Labels.

4. Confirm deletion.

Editing a LabelTo edit a label, complete the following steps:

1. On the Global Settings > Labels and Sites > Labels page, select the label to edit.

2. Click the edit icon.

3. Edit the label and click Update.

Deleting a LabelTo delete one or several labels, complete the following steps:

Aruba Central | User Guide Global Settings | 74

Page 75: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

75 | Global Settings Aruba Central | User Guide

1. On the Global Settings > Labels and Sites > Labels page, select the label to delete.

2. Click the delete icon.

3. Confirm deletion.

Device InventoryThe devices purchased by the customers are automatically added the device inventory in their respectiveCentral accounts. If the device you purchased does not show up in the inventory, you can manually add it.

Central allows you to add up to 32 devices manually by entering the valid MAC and serial number combinationfor each device.

Users having roles with Modify permission can add devices. Users having roles with View Only permission can onlyview the Device Inventory module.

Viewing DevicesThe devices provisioned in your account are listed in the Global Settings > Device Inventory page.

Table 18 shows the contents of the Device Inventory page.

Parameter Description

SerialNumber

Serial number of the device.

MACAddress

MAC address of the device.

Type Type of the device, for example Instant AP or Switch.

IP address IP address of the device.

DeviceName

Name of the device.

Labels Name of the label to which the device are assigned.

Model Hardware model of the device.

Group Name of the group to which the device is assigned. This column is displayed only for the CentralStandard Enterprise portal users.

Status Status of the subscription assignment

Table 18: Details of Devices

Synchronizing Device InventoryCentral automatically adds devices to inventory as soon as the purchase order is processed. However, if youwant to add new devices that have been recently purchased, you can manually synchronize the deviceinventory by clicking Sync Now.

Page 76: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Adding DevicesCentral supports zero touch provisioning of the devices. It automatically retrieves the devices associated to acustomer account. To synchronize the devices from the inventory, click Sync Now. If the retrieval of devices isnot complete or successful due to process errors, you can manually add the devices.

Central allows you to add up to 32 devices manually. For bulk addition of devices, use the Aruba cloudactivation key of the devices.

DeviceAdditionMethod

Description

Add byMAC/SN

Allows you to add devices using MAC address and serial numbers. You can add up to 32 devices.

Add withCloudActivationKey

Allows you add multiple devices from a single purchase order by providing the cloud activation key.To add devices:

1. Note the Cloud Activation Key and MAC address of the device. To obtain these details:l For Instant APs, execute the show about command at the Instant AP CLI or clickMaintenance > About in the Instant AP UI.l For Aruba Mobility Access Switches, execute the show inventory | include HW and showversion commands on the Mobility Access Switch CLI console. You can also view the cloudactivation key in the Maintenance >About tab in the UI. The activation key is enabled only ifthe switch has access to the Internet.l For other ArubaSwitches, to view the MAC address and the serial number, run the shsystem | in Base and sh system | in Serial commands at the Switch CLI console.

2. Enter the Cloud Activation Key and MAC address of the device.3. Click Add. The Central retrieves all devices that belong to the same purchase order and displaysthe list. If any of the device belongs to another customer account or is used by other services, it isdisplayed as a blocked device. As Central does not allow you to add blocked devices, you may haveto release the blocked devices from another customer account.

AddUsingActivate

Allows you to retrieve the devices associated with an Activate user account.To add devices:

1. Enter the username and password of the Activate user account.2. Click Add. The devices associated with the Activate account are retrieved and added to the listof devices displayed on the Device Inventory page.

NOTE: You can use this option only once. After the devices are added, Central does not allow you tomodify or re-import the devices using your Aruba Activate credentials.

Table 19: Adding Devices

Assigning DevicesThe following points describe the device assignment workflow in Central:

Standard Enterprise Portaln Devices are mapped to groups. The administrators can assign the device to groups on the Global Settings

> Manage Groups Page. For more information, see Group Operations on page 53.

n Devices can be assigned two types of subscriptions—Device Management and Network Services. Theadministrators can assign subscription keys to devices on the Global Settings > SubscriptionAssignment page. For information on assigning subscriptions, see Managing Subscriptions on page 78.

Aruba Central | User Guide Global Settings | 76

Page 77: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

77 | Global Settings Aruba Central | User Guide

Managed Service Portaln Devices are mapped to customer accounts and groups. Devices are assigned to customer accounts on the

Global Settings > Device Inventory page.

n Devices can be assigned two types of subscriptions—Device Management and Network Services. Theadministrators can assign subscription keys to devices on the Global Settings > SubscriptionAssignment page. Access to application services and device configuration are also determined by the rolesassigned to the users of the tenant accounts. For information on assigning subscriptions, see ManagingSubscriptions on page 78.

Assigning Devices to Customer Accounts

To map devices to customer accounts, complete the following steps:

1. From the app selector, click Global Settings.

2. Click Device Inventory. A list of devices provisioned in the Managed Service Portal is displayed.

3. Select one or several devices from the table and click the settings icon in the table row. The AssignCustomer button shows up under the table.

4. Click Assign Customer. A window showing a list of customer accounts provisioned in the ManagedService Portal appears.

5. Select the customer account to which you want to assign the device. The groups associated with thecustomer accounts are displayed.

6. Click Assign Device (s).7. Click Yes when prompted for confirmation.

In the Managed Service Portal, the groups are assigned to a customer account. The provisioning status of thedevices for each customer account is displayed in the All Customers table on the Monitoring > AllCustomers page. If a device is listed under the unprovisioned group for the customer account in the StandardEnterprise mode, the status of this device is displayed in the All Customers. To move the device from theunprovisioned group to the default group, the Managed Service Portal administrators must drill down to thecustomer account and move the device to the default group.

Assigning Devices to a GroupWhen the devices are added to Central, they are automatically provisioned. The devices connected to Centralare indicated in green.

Group Assignment in the Standard Interface View

When the devices are added to Central, they are automatically provisioned. The devices connected to Centralare indicated in green. The group assignment depends on the following conditions:

n If the device is connected to Central, irrespective of the operational status of the device, the Assign Groupbutton is not displayed.

n If the device is not connected to Central, the Assign Group button is displayed.

n When a user selects devices that are not connected to Central along with another device that is connectedto Central, although the Assign Group button is displayed, the group assignment operation is carried outonly for the device that is not connected to Central.

n When the device is moved from one group to another, the group column in the Device Managementpage shows the new group name.

For more information on configuring and managing devices, see the following topics:

Page 78: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Managing SubscriptionsCentral offers a 90-day evaluation subscription for customers who want to try the Aruba cloud solution formanaging their Wi-Fi networks. When you sign up for Central, an evaluation subscription is automaticallyassigned, unless you have bought a paid subscription. To obtain subscriptions, contact the Aruba Centralsupport team.

Aruba Central supports the following types of subscriptions:

n Device management subscriptions—Allows you to add and manage devices (Instant APs and Switches), andavail basic services such as device configuration, monitoring dashboard, reports, and application analytics.The device subscriptions can be assigned only to the devices managed by Central. For example, if youraccount has any Instant APs managed by AirWave, you can assign only service subscription to these devices.

n Cloud service subscriptions—Enables access to a cloud service on any capable device. For example, access toapplication services such as Presence Analytics is based on the cloud service subscription. As of today, thecloud services portfolio includes Clarity, Guest Access, and Presence Analytics.

This section describes the following procedures:

Key ManagementThe Key Management menu option in the Global Settings app allows you to view and track subscriptionskey.

Users having roles with Modify permission can

Users having roles with Modify permission can add subscription keys or assign licenses. Users having roles withView Only permission can only view the Subscription Assignment module.

Viewing Subscription Key DetailsTo view the subscription key details, complete the following steps:

1. From the app selector, click Global Settings.

2. Click Key Management. The Key Management page opens.

Table 20 describes the contents of the Manage Keys table on the Key Management page.

DataPaneItem

Description

KeyNumber

Subscription key number.

Type Type of the subscription. For example device subscriptions provide access to device monitoring andmanagement functions, whereas network services subscription allows access to application serviceshosted on Central.

TillExpiration

Time till expiration.

Table 20:

Aruba Central | User Guide Global Settings | 78

Page 79: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

79 | Global Settings Aruba Central | User Guide

DataPaneItem

Description

Quantity Number of licenses keys available for a subscription.Each Central subscription holds a specific number of tokens. For example, when a subscription isassigned to a device, the device is bound with a token from the existing pool of subscriptions. To availservices, you may need to assign a set of tokens to the devices provisioned in Central.

Adding a Subscription KeyWhen a subscription is extended or renewed, a new subscription key is assigned and is sent to the user. Toactivate the subscription key:

1. From the app selector, click Global Settings.

2. Click Key Management. The Key Management page opens.

3. Click Add Another Subscription Key and enter the subscription key.

4. Click Activate. The subscription key is added to the list.

Subscription AssignmentThe Subscription Assignment menu option in the Global Settings app allows you to perform the followingactions:

Viewing Subscription DetailsThe Subscription Assignment page allows you to view a list of subscriptions and enable automaticassignment of subscriptions to devices.

Data Pane Item Description

Subscriptions Name of the subscription.

All Devices Total number of devices provisioned in Central.

No Subscriptions Total number of devices that do not have a subscription key assigned.

Subscriptions Total Total number of subscriptions purchased by the customer.

Available Number subscriptions available for assignment in a customer account.

Table 21: Subscription Details

Assigning Subscriptions

Central allows you to enable automatic assignment of device subscriptions for the devices joining Central. Youcan also manually assign subscriptions to a device to enable access to an application service.

Enabling Automatic Assignment of Device Subscriptions

When a subscription assigned to a device expires or is canceled, Central checks the inventory for the availablesubscription tokens for the device and verifies if the subscription has adequate capacity. If the subscription has

Page 80: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

adequate capacity, Central automatically assigns the longest available subscription token to the device. If not,Central ensures that the subscriptions are utilized to the full capacity by assigning as many devices as possible.

To enable automatic assignment of subscriptions:

1. On the Subscription Assignment page, click Select Devices under Device Subscriptions.

2. Select the devices.

3. Click Save.

Manually Assigning Subscriptions to Devices

To manually assign subscription to a device, complete the following steps:

1. On the Subscription Assignment page, select a subscription from the table on the left.

2. From the table on the right, select the devices to which you want to assign subscriptions.

3. Drag and drop the device the subscription selected in table on the left.

Unassigning Subscriptions

Central also allows you to unassign subscriptions for the devices connected to Central. Following are the twomethods to unassign subscription from a specific device, or multiple devices:

Unassigning Subscription from Specific Device

To unassign subscriptions from a specific device, complete the following steps:

1. On the Subscription Assignment page, select a subscription from the table on the left.

2. From the table on the right, select the devices that must be removed from the service.

3. Click the trash icon corresponding to the selected device. The subscription is unassigned for a specificdevice.

Unassinging Subscription from Multiple Devices

To unassign subscription from multiple devices as a batch, complete the followingsteps:

1. On the Subscription Assignment page, select a subscription from the table on the left.

2. From the table on the right, select the multiple devices to be removed from the service using theshift+click, or ctrl+click keys.

3. Click Batch Remove Label. The subscription is unassigned for the batch of selected devices.

Acknowledging Subscription Expiry NotificationsThe Subscription Keys page displays the subscriptions that are about to expire in 90 days. The users withevaluation subscription receive subscription expiry notifications on the 30th, 15th and 1 day before thesubscription expiry and on day 1 after the subscription expires.

The users with paid subscriptions receive subscription expiry notifications on the 90th, 60th, 30th, 15th, and 1day before expiry and two notifications per day on the day 1 and day 2 after the subscription expiry.

Acknowledging Notifications through Email

If the user has multiple subscriptions, a consolidated email with the expiry notifications for all subscriptions issent to the user. The users can also acknowledge these notifications by clicking Acknowledge orAcknowledge All links in the email notification.

Aruba Central | User Guide Global Settings | 80

Page 81: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

81 | Global Settings Aruba Central | User Guide

Acknowledging Notifications in the UI

If a subscription has already expired or is about to expire within 24 hours, a subscription expiry notificationmessage is displayed in a pop-up window when the customer logs in to Central.

To prevent Central from generating expiry notifications, click Acknowledge. Central does not generate expirynotification messages either in the UI or through email for the acknowledged subscriptions.

Managing User Accounts and RolesIn the previous releases, Central mapped users to groups and these groups were in turn used for managingdevices. Central supports a role-based access control that allows you to configure various types of users with aspecific level of access control.

Role-Based AccessCentral supports the following types of roles:

Predefined User RolesThe Users & Roles page in the Central allows you to configure the following types of users with system-defined roles:

User Role Standard Enterprise Portal Managed Service Portal

Administrator n Has full access to all devices.n Can provision devices and enable accessto application services.n Can create or update users, groups, andlabels.

n Has full access to tenant accountsn Can create, modify, provision, andmanage customer accounts

Read/Write n Has access to the groups and devicesassigned in the account.n Can add, modify, configure, and delete adevice in the account.

Can access and modify tenant accounts.

Read Only n Can view the groups and devices.n Can run reports.

Can view tenant accounts.

GuestOperator

n Can access and modify cloud guestsplash page profiles.n Can configure visitor accounts for thecloud guest splash page profiles.

n Can access and modify cloud guestsplash page profiles.n Can configure visitor accounts for thecloud guest splash page profiles.

Custom RolesAlong with the predefined user roles, Central also allows you to create custom roles with specific securityrequirements and access control. However, only the users with the administrator role and privileges can create,modify, clone, or delete a custom role in Central.

With custom roles, you can configure access control at the application level and specify access rights to view ormodify specific application services or modules. For example, you can create a custom role that allows accessto a specific applications like Guest Access or network management and assign it to a user.

Page 82: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Application PermissionsCentral allows you to define user roles with view or modify permissions. You can also block user access tosome applications. For example, if the Guest Access application is blocked for a specific user role, the appselector will not display this application.

You can set application permissions for the following application modules:

n Group management—Allows you to define user access to device groups.

n Device inventory—Allows to define user access for managing devices.

n Network management—Allows you to define user access to network monitoring, configuration, andtroubleshooting.

n Guest management—Allows you to define or block user access to Guest Access application.

n Clarity—Allows you to define or block user access to Clarity application.

n Presence Analytics—Allows you to define or block user access to Presence Analytics application.

n Other Applications—Allows you to define or block access to other applications.

Configuring UsersThe Users & Roles menu option in the Global Settings application allows you to create, modify, and deleteusers, and view the number of users assigned to user role.

Adding a UserTo add a new user, complete the following steps:

1. From the app selector, click Global Settings and then click Users & Roles.

2. Click the Users tab.

3. To add a new user, click +. The New User window is displayed.

4. Enter the name of the user in the Username text box. The username you enter must be a valid emailaddress.

5. Select a user role from the Role drop-down list.

6. Select a group to which you want to assign the user, from the Allowed Groups drop-down list.

7. Click Save. An email invite is sent to the user with a registration link.

8. If the user has not received an email invite, click Actions > Resend Invite Email to resend the invitation.

Editing a UserTo edit a user account, complete the following steps:

1. From the app selector, click Global Settings and then click Users & Roles.

2. In the Users tab, select the user and click the edit icon.

3. In the Edit User <"Username"> window, edit Role and Allowed Groups.

4. Click Save.

Deleting a UserTo delete a user account:

1. From the app selector, click Global Settings and then click Users & Roles.

Aruba Central | User Guide Global Settings | 82

Page 83: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

83 | Global Settings Aruba Central | User Guide

2. In the Users tab, select the user and click the delete icon.

3. Confirm user deletion in the Confirm Action dialog box.

Configuring RolesThe Users & Roles menu in the Global Settings application allows you to create custom roles and configureaccess rights for these roles.

Adding a Custom RoleTo add a custom role, complete the following steps:

1. From the app selector, click Global Settings and then click Users & Roles.

2. Click the Roles tab.

3. To add a new role, click +. The New Role window is displayed.

4. Specify a name for the role.

5. Set permissions at the application level.

6. For Network Management, you can set access rights at the module level.

To set view or edit permissions or block the users from accessing a specific module, complete thefollowing steps:

a. Click Customize.

b. Select one of the following options for each module as required:

n View Onlyn Modifyn Block

7. Click Save.

8. Assign the role to a user account as required.

User roles with Modify permission can perform add, edit, or delete actions within the specific module.

User roles with View Only permission can only view the specific module.

User roles with Block permission cannot view that particular module.

Viewing User Role DetailsTo view the details of a user role, complete the following steps:

1. From the app selector, click Global Settings and then click Users & Roles.

2. Click the Roles tab. The Roles tab displays the following information:

n Role Name—Name of the user role.

n Allowed Applications—The applications to which the users have access.

n Assigned Users—Number of users assigned to a role.

The User & Roles pane also includes the Support Access and Two-factor Authentication (2FA) options underActions. For more information on two-factor authentication, see Two-Factor Authentication on page 84.

When Support Access is enabled, the Aruba support team can access your Central account remotely.

Page 84: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Two-Factor AuthenticationCentral now supports two-factor authentication to offer a second layer of security to your login, in addition topassword. When two-factor authentication is enabled on a user account, the users can sign in to their Centralaccount either through the mobile app or the web application, only after providing their password and the six-digit verification code displayed on their trusted devices.

When two-factor authentication is enabled at the customer account level, all the users belonging to thecustomer account are required to complete the authentication procedure when logging in to Central. If a useraccount is associated with multiple customer accounts and if two-factor authentication is enabled on one ofthese accounts, the user must complete the two-factor authentication during the login procedure.

If two-factor authentication is enabled on your accounts, you must install the Google Authenticator app onyour devices such as mobile phones to access the Central application. When the users attempt to log in toCentral with their credentials, the Google Authenticator app provides a six-digit verification code to completethe login procedure.

Installing Google Authenticator App

For two-factor authentication, ensure that the Google Authenticator app is installed on your mobile device.

During the registration process, the Central application shares a secret key with the mobile device of the userover a secure channel when the user logs in to Central. The key is stored in the Google Authenticator app andused for future logins to the application. This prevents unauthorized access to a user account as thisauthentication procedure involves two-levels for secure transaction.

When you register your mobile device successfully, the Google Authenticator app generates a six-digit tokenfor the second level authentication. The token is generated every thirty seconds.

Enabling Two-factor Authentication for User Accounts

To enable two-factor authentication, complete the following steps:

1. Click Global Settings > User& Roles. The User & Roles page opens.

2. From the Actions menu, set Two-Factor Authentication (2FA) to ON. The two-factor authenticationis enabled for all the users associated with a customer account.

Two-factor Authentication for Central Web Application

When two-factor authentication is enabled for a customer account, the users associated with that customeraccount are prompted for two-factor authentication when they log in to Central.

To complete two-factor authentication, perform the following actions:

1. Access the Central website.

2. Log in with your credentials. If two-factor authentication is enforced on your account, the two-factorauthentication page opens.

3. Install the Google Authenticator app on your mobile device if not already installed.

4. Click Next.

5. If this is your first login since two-factor authentication is enforced on your account, open GoogleAuthenticator on your mobile device.

6. Scan the QR Code. If you are unable to scan the QR code, perform the following actions:

a. Click the Problem in Reading QR Code link. The secret key is displayed.

b. Enter this secret key in the Google Authenticator app.

c. Ensure that the Time-Based parameter is set. Aruba Central is added to the list of supported clientsand a six-digit token is generated.

7. Click Next.

Aruba Central | User Guide Global Settings | 84

Page 85: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

85 | Global Settings Aruba Central | User Guide

8. Enter the six-digit token.

9. Select the Remember 2FA for 30 Days check box if you want the authentication to expire only after 30days.

10. Click Finish.

Two-factor Authentication for the Central Mobile App

To log in to Central app on your mobile device, perform the following actions:

1. Open the Central app on your mobile device.

2. Enter your username and password and click Log in. If the registration process is pending, an errormessage is displayed.

The registration process for two-factor authentication must be completed only through a web browser on yourDesktop. Ensure that this procedure is completed before accessing the Central app on your mobile device if two-factor authentication is enabled on your account.

3. Enter the token.

4. Click Authenticate. On successful authentication, the Central app opens.

Registering a New Mobile Device

If you have changed your mobile device, you need to install Google Authenticator app on your new device andregister again using a web browser on your Desktop for two-factor authentication.

To register your new mobile device, complete the following steps:

1. Log in to Central web application. The two-factor authentication page is displayed.

2. Click the Changed Your Mobile Device? link.

3. To register your new device and receive a reset email with instructions, click Send 2FA Reset Email. Areset email with instructions will be sent to your registered email address.

4. Follow the instructions in the email and complete the registration.

Page 86: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Chapter 6Monitoring & Reports

The Monitoring & Reports app includes the following functional menu options for viewing the device andnetwork details.

n Network Overview on page 86

n Label Health

n Client Overview on page 101

n AppRF on page 104

n VisualRF on page 109

n Alerts on page 117

n Reports on page 121

Network OverviewThe Monitoring & Reports > Network Overview pane displays a summary of the bandwidth usage, clientcount, top APs by usage, top 5 clients, top Instant AP clusters by usage, top Instant AP clusters by clients,application usage, and WLAN network details of the selected group. By default, the graphs are plotted for atime range of 3 hours. To view the graphs for a different time range, click the Temporal Filter link.

The Network Overview page includes the following tabs:

n Network Overview

n APs

n Switches

n Security

Data PaneItem

Description

TemporalFilter

Allows you to select a time range for the graphs displayed on the Overview pane. You can choose toview graphs for a time period of 3 hours, 1 day, 1 week, 1 month and 3 months.

BandwidthUsageGraph

Displays the aggregate incoming and outgoing data traffic of all clients in the selected group.

Clientscount

Displays the total number of clients connected to an Instant AP over a specific duration.

Top APs ByUsage

Displays the list of top Instant APs that utilize the maximum bandwidth in the network.

ApplicationUsage

If Deep Packet Inspection is enabled, the Application Usage graphs display the applications,application categories, and web categories accessed by the clients in the network. The WebReputation graph displays the web reputation score for the websites accessed by the clientsconnected to the network.

Table 22: Network Overview pane

Aruba Central | User Guide Monitoring & Reports | 86

Page 87: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

87 | Monitoring & Reports Aruba Central | User Guide

Data PaneItem

Description

Top 5Clients

Displays the top five clients connected to the currently available SSIDs that utilize the maximumbandwidth in the network.The Top 5 Clients table displays data only for the clients that are connected to the network for atotal duration of two or more hours.

TopIAP ClustersBy Usage

Displays the list of top Instant AP clusters that utilize the maximum bandwidth in the network.

TopIAP Clustersby Clients

Displays the list of top Instant AP clusters connected to the client that utilize the maximum band-width in the network.

WLANs Displays the list of SSIDs configured. The WLANs table displays the SSID details such the name,type, security settings, and the clients connected on the network. To expand or collapse the columnview, click the column settings icon next to the last column in the table.

APsFrom the app selector, click Monitoring & Reports and go to Network Overview > APs. The APs pagedisplays the following:

n Consolidated bandwidth usage and client count.

n Bandwidth usage and client count per network.

n Application usage for the APs provisioned in Central.

The APs pane consists of the following tabs:

n Usage—Displays the usage graphs for all APs in the group.

n Top N—Displays the top APs based on usage.

n List of Up APs—Displays the total number of Instant APs that are up.

n List of Down APs—Displays the total number of Instant APs that are down.

APs PaneThe APs pane displays the following information:

Page 88: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Data PaneContent

Description

BandwidthUsage

Displays the incoming and outgoing data traffic of all Instant APs over a specific duration.

ClientsCount

Displays the number of clients connected to an Instant AP over a specific time period.

BandwidthUsage perNetwork

Displays the incoming and outgoing traffic for all Instant APs per SSID over a specific duration.

ClientCount perNetwork

Displays the number of clients connected to an access point as per SSID over a specified timeperiod.

ApplicationUsage

If deep packet inspection is enabled, the Application Usage graphs display the applications,application categories, and web categories accessed by the clients in the network. The WebReputation graph displays the web reputation score for the websites accessed by the clientsconnected to the network.

Top N Displays a list of Instant APs with maximum bandwidth usage.

List of UpAPs

Displays a list of Instant APs that are up. To view the details of an AP, click the AP entry in the AccessPoints table.

List ofDown APs

Displays a list of Instant APs that are down. To view the details of an AP, click the AP entry in theAccess Points table.To delete an Instant AP:

1. In the Access Points table, hover your mouse over the row.2. Click the delete icon.3. Click Yes in the Confirm Action dialog box.

List view—AccessPointstable

The Access Points table displays the following information:n Name—Name of the Instant AP.n Location—Location of the Instant AP.n Group—Group to which the Instant AP belongs.n Clients—Clients connected to the Instant AP.n IP Address—IP address of the Instant AP.n 2.4 GHz—Channels assigned under the 2.4 GHz band.n 5.0 GHz—Channels assigned under the 5 GHz band.n Virtual Controller—Name of the Virtual controller (VC).n Uptime—Time since which the Instant AP is operational.n Labels—Labels associated with the Instant AP. You can also add a new label to the Instant APby clicking on the edit icon.n Search box—The Search text box that allows you to specify a criteria for searching devices.Central supports single column search. It filters the search results and sorts the list of devicesbased on the search string specified from a single column.

To expand or collapse the column view, click the column settings icon next to the last column of thetable.

Table 23: APs Pane

AP DetailsThe Access Points table displays a list of Instant APs in the group. To view the details of an Instant AP, clickthe Instant AP entry in the Access Points table. The following details of the selected Instant AP are displayed.

Aruba Central | User Guide Monitoring & Reports | 88

Page 89: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

89 | Monitoring & Reports Aruba Central | User Guide

Parameter Description

TemporalFilter

By default, the graphs are plotted for a time range of 3 hours. To view the graphs for a differenttime range, click the Temporal Filter link. You can choose to view graphs for a time period of 3hours, 1 day, 1 week, 1 month and 3 months.However, the application usage graphs display data for a time period of 3 hours or 1 day only.

Status Displays the current status of the Instant AP.

SSID Displays the SSIDs configured on the Instant AP.

Uptime Displays the time since which the Instant AP is operational.

CPU Displays the percentage of processing resources utilized on the Instant AP.

Memory Displays the percentage of memory utilized on the Instant AP.

UsageGraphs

Displays the following graphs:n Bandwidth Usage—Displays the incoming and outgoing data traffic of the Instant AP over aspecific duration. The UI provides 2.4 GHz, and 5 GHz options to view graphs with bandwidthdata for 2.4 or 5 GHz radios.n Client Count—Displays the total number of clients connected to an Instant AP over a specificduration.

NOTE: The UI provides 2.4 GHz, and 5 GHz options to view only the Bandwidth Usage and ClientCount graphs with data for 2.4 or 5 GHz radios for Instant APs that does not operate in dual-5GHzradio mode. You can also click the Wired tab to view the wired client count for the selected InstantAP.

n Application Usage graphs—If deep packet inspection is enabled, the following graphs aredisplayed:

l Apps—Displays the applications used by the clients connected to the Instant AP.l App Categories—Displays the application categories that are accessed by the clientsconnected to the Instant AP.l Web Categories—Displays the web categories accessed by the clients connected to theInstant AP.l Web Reputation—Displays the Web reputation score for the websites accessed by theclients connected to the Instant AP

NOTE: For all the Instant APs with dual 5 GHz band the Usage tab shows graphs related to 5 GHz-Radio 0 and 5 GHz-Radio 1. The optional dual-5GHz radio mode is supported only on Instant APsrunning version 8.3.0.0 or later. Central displays the complete statistics of the radio in both 2.4GHzand 5GHz mode even if the radio mode was changed from 2.4GHz to 5GHz or vice versa, within aspecified time period.

RF HealthGraphs

Displays the following graphs:n RF Channel Utilization—Shows channel utilization statistics.n Noise Floors—Shows the noise floor detected in the network to which the Instant AP belongs.n Neighboring Clients—The number of clients in the Instant AP neighborhood.

NOTE: For all the Instant APs with dual-5GHz band, the RF Health tab shows graphs for 5 GHz-Radio 0 and 5 GHz-Radio 1. The optional dual-5GHz radio mode is supported only on Instant APsrunning version 8.3.0.0 or later. Central displays the complete statistics of the radio in both 2.4GHzand 5GHz mode even if the radio mode was changed from 2.4GHz to 5GHz or vice versa, within aspecified time period.

Interface Displays the wired and wireless network interface details.n Wired Interface—Displays wired interface details such as Ethernet ports, MAC and IPaddresses of the Ethernet interface link type, and duplex mode.n Wireless Interface—Displays wireless interface details such as the type of radio, status ofthe AP, the number of clients connected to the AP, SSIDs configured on the AP, channels andpower settings configured on the AP, type of the AP antenna, and the radio mode in which the APoperates.

Table 24: Access Points Details Page

Page 90: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Parameter Description

n Interface Bandwidth Usage—Displays a graph that shows the bandwidth usage details forthe selected wired interface. Click on the type of interface for which you want to view the graphfor a given time range. By default, the graphs are plotted for a time range of 3 hours. To view thegraphs for a different time range, click the 3 Hours link. You can choose to view graphs for atime period of 3 hours, 1 day, 1 week, 1 month and 3 months.

NOTE: For all the Instant APs with dual-5GHz band, the Interface tab shows interface details usedfor Radio 0 and Radio 1 of 5GHz only on wireless network. The optional dual-5GHz radio mode issupported only on Instant APs running version 8.3.0.0 or later.

Clients Displays the details of wired and wireless clients connected to the Instant AP. If the wired clientsfeature is enabled for your account and there are no WLAN SSIDs configured in the provisionednetwork, only the wired clients are displayed.If the WLAN SSIDs are configured in the provisioned network, assign the wired network profiles tothe Ethernet ports of an Instant AP to view the wired clients information. For more information onwired network profiles, see Configuring Wired Port Profiles for an Instant AP on page 149.

Event Logs Displays the alerts generated for the Instant AP and the list of events associated with the Instant AP.

VPN Displays the following information:n Bandwidth Usage per VPN graph—Shows the bandwidth usage by VPN. It displays theinbound and outbound traffic for both primary and backup VPNs for the last 3 hours (default).n VPN table—Provides details about the Primary and Backup VPNs, their corresponding peernames, and indicates which VPN is active at any point of time.

UplinkHistory

Displays uplink connection history for the Instant AP.

Aruba Central | User Guide Monitoring & Reports | 90

Page 91: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

91 | Monitoring & Reports Aruba Central | User Guide

Parameter Description

Info Displays general information about the Instant AP:n AP Name—Name of the Instant AP.n Serial Number—Serial number of the Instant AP.n MAC Address—MAC address of the Instant AP.n IP Address—IP address of the Instant AP.n Mode—The radio mode in which the Instant AP operates.n Mesh Role—Role of the mesh Instant AP.n Country Code—Country code in which the Instant AP operates.n VC Name—Name of the VC to which the Instant AP is connected.n VC MAC—The MAC address of the VC.n AP Model Type—The Instant AP hardware model.n Firmware Version—The firmware version running on the Instant AP.n Modem status—Status of the cellular modems connected to the Instant AP.n Current Uplink—Current uplink connection on the Instant AP.n Group Name—The group to which the Instant AP belongs.n Location—Location of the Instant AP.

Map Displays the geographical location of the Instant AP.

Actionsdrop-down

Displays the following menu options:n Delete AP—Deletes an inactive Instant AP. This option is visible only when the Instant AP isdown.n Reboot AP—Reboots the Instant AP.n Reboot Swarm—Reboots the Instant AP cluster.n Console—Opens the remote console for a CLI session through SSH. The default user ID isadmin, but you can edit and customize the user ID. This custom user ID must be mapped to thedevice. Remote console access is supported only on VCs.

NOTE: If the Copy and Paste function from the keyboard shortcut keys (CTRL+C and CTRL+V) do notwork in your web browser, use the Copy and Paste functions available under the menu options in theweb browser.

n Troubleshoot—Allows administrators and users with read-write permissions to runtroubleshooting or diagnostics commands Instant AP without logging in to the Instant AP. Formore information on troubleshooting Instant APs, see Troubleshooting Devices on page 249.n Tech. Support—Allows administrators to generate a tech support dump required fortroubleshooting the device.

SwitchesFrom the app selector, click Monitoring & Reports and go to Network Overview > Switches. The Switchespage displays the status and usage of all switches and switch stacks provisioned in Central.

Switches DashboardThe Switches dashboard displays the status and usage of all switches provisioned in Central.

Page 92: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Switches PaneTable 25 describes the contents of the Switches table.

DataPaneContent

Description

Usage Displays the following graphs:n Throughput—Indicates aggregate client data traffic detected on the switches.n Client—Indicates the number of clients connected to the switch.

Top N Displays a list of Switches sorted based on maximum usage. It also shows the data traffic transmitted(Tx) and received (Rx) from clients.

List ofUpSwitches

Displays a list of switches that are up. To view the details of a Switch, click the Switch entry in theSwitches table.

List ofDownSwitches

Displays a list of switches that are down. To view the details of a Switch, click the Switch entry in theSwitches table.To delete a Switch:

1. In the Switches table, hover your mouse over the row.2. Click the delete icon.3. Click Yes in the Confirm Action dialog box.

Listview—Switchestable

Displays a list of Switches provisioned under the selected group. The Switches table provides thefollowing information:

n Name—Name of the Switch.n Location—Location of the Switch.n Group—Group under which the Switch is provisioned.n Clients—Number of clients connected to the Switch.n IP Address—IP address of the Switch.n Avg Usage—Average usage of the Switch.n Uptime—Time since which the Switches are operational.n Labels—Labels associated with the AP. You can also add a new label to the AP by clicking on theedit icon.n Uplink Ports—Uplink ports configured on the Switch. To manually assign a port, click the editicon.n Search—The Search text box that allows you to specify a criteria for searching devices. Centralsupports single column search. It filters the search results and sorts the list of devices based on thesearch string specified from a single column.

To expand or collapse the column view, click the column settings icon next to the last column of thetable.

Table 25: Switches pane

Switch DetailsTo view the details of the Switch, go to Monitoring & Reports > Network Overview > Switches > Listpane and click the Switch for which you want to view the details. The Switch Details pane is displayed.

Aruba Central | User Guide Monitoring & Reports | 92

Page 93: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

93 | Monitoring & Reports Aruba Central | User Guide

DataPaneContent

Description

Status Indicates the operational status of the Switch.

Uptime Indicates the time since which the Switches are operational.

CPU Displays the percentage of processing resources utilized on the switch.

Memory Displays the percentage of memory utilized on the switch.

Ports Displays the following details of the Switch ports:Graphs

n Throughput—The aggregate client data traffic detected on the Switches.n Connected Clients—Number of clients connected to the Switch.

Tablen Port#—Port number.n Oper Stat—Operational status of the Switch.n PoE—PoE status of the port.n PoE Consumption—PoE consumption of the port.n Type—Type of Switch port.n Mode—Operational mode of the port.n Tx Usage—Client data transmission details.n Rx Usage—Data traffic received from the clients connected to the port.n Duplex—Duplex mode of the port.n Trusted—Ports marked as trusted.

Switch Port Pane—Displays the ports of the selected switch. Select a port to view the correspondinginput and output errors.Errors (In) graph—Displays the input errors for the selected port.

n The following error types are displayed for MAS switches:l in_crcl in_errorl in_giantl in_runtl in_throttle

n The following error types are displayed for Aruba switches:l in_discardl in_error

Errors (Out) graph—Displays the output errors for the selected port.n The following error types are displayed for MAS switches:

l out_collisionl out_deferredl out_errorl out_late_collisionl out_multiple_collisionl out_throttle

n The following error types are displayed for Aruba switches:l out_discardl out_error

Uplink Displays the Uplink Stats graph. The graph displays the uplink statistics for the inbound and outbounddata traffic.

Eventlogs

Displays the list of events associated with the Switch.

Table 26: Switch Details Pane

Page 94: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

DataPaneContent

Description

Info Displays the following details for the Switch:n Hostname—Host name of the Switch.n Serial Number—Serial number of the Switch.n Public IP— The public IP address of the Switch.n Management IP—Management IP address of the Switchn MAC address—MAC address of the Switch.n Power Consumption—Power drawn from the switch stack in watts (W).n Temperature—Temperature of the Switch.n Switch Model Type—Hardware model of the Switch.n Firmware Version—Firmware version of the Switch.n Fan Status—Status of the fan.n Group Name—Name of the group to which the Switch belongs.n Location—Location in which the Switch is installed.n PoE Consumption— PoE power drawn from the Switch in watts (W).

Map Displays the geographical location of the Switch.

Actions Displays the following menu options:n Delete Switch—Deletes the Switch. This option is visible only when the Switch is down.n Reboot Switch—Reboots the Switch.n Console—Opens the remote console for a CLI session through SSH. The default user ID is admin,but you can edit and customize the user ID. This custom user ID must be mapped to the device. Forthe Aruba Switch platforms, the remote console access is enabled only when the user credentialsare configured in the Wired Management app.

NOTE: If the Copy and Paste function from the keyboard shortcut keys (CTRL+C and CTRL+V) do notwork in your web browser, use the Copy and Paste functions available under the menu options in theweb browser.

n Manage Access—This menu option is available only for the legacy Aruba Switches such asMobility Access Switches. This menu command allows you to set the access mode for Switchoperation. Before a Switch is connected to Central, the switch is in Monitored mode. In themonitored mode, the Switch has the configurations that can be modified only through the switchconsole. When a Switch is connected to Central for the first time, the switch is in the managedmode. When Switch access is changed to managed mode, you can configure the Switch featuresonly through Central.n Troubleshoot—Opens the Troubleshooting Devices page for running troubleshootingcommands on the device.n Tech. Support—Allows the administrators to generate a tech support dump for troubleshootingthe device.

NOTE: If a switch is in the monitored mode, the configuration changes at the group or device level willnot be applied to the switch. When any configuration is modified at the group or device level for theswitches in the monitored mode, the Configuration cannot be pushed to device as device is monitoringmode message is displayed.

Stacks DashboardFrom the app selector, click Monitoring & Reports and go to Network Overview > Switches. TheSwitches page displays the status and usage of all switches and switch stacks provisioned in Central. To viewinformation pertaining to switch stacks, on the Switches page, click the Stacks tab.

Stacks PaneTable 27 describes the contents of the Stacks table.

Aruba Central | User Guide Monitoring & Reports | 94

Page 95: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

95 | Monitoring & Reports Aruba Central | User Guide

Stacks PaneContent Description

Name Displays the name of the switch stack. A green bullet preceding the stack name indicates that it isUP. A red bullet indicates that the stack is DOWN.

Location Displays the location of the switch stack.

Group Displays a list of switch stacks sorted based on maximum usage. It also shows the data traffictransmitted (Tx) and received (Rx) from clients.

Clients Displays the number of clients connected to the switch stack.

IP Address Displays the IP address of the switch stack.

Table 27: Stacks Page

Stacks DetailsTo view the details of the switch stack:

1. From the app selector, click Monitoring & Reports.

2. Go to Network Overview > Switches > Stacks.

3. Click the stack for which you want to view the details. The Stack Details page opens.

Table 28 describes the contents of Stack Details page.

Data PaneContent Description

Status Indicates the operational status of the switch stack.

Uptime Indicates the time since which the switch stack is operational.

Individual stackmembers

Indicates the number of switches forming the switch stack (categorized as member,commander, and standby).

Ports Displays the following details of the switch ports:Graphs

n Throughput—Aggregate client data traffic detected on the switch stackn Connected Clients—Number of clients connected to the switch stack

Tablen Port#—Port number.n Oper Stat—Operational status of the switch stack.n PoE—PoE status of the port.n Type—Type of switch stack port.n Mode—Operational mode of the port.n Tx Usage—Client data transmission details.n Rx Usage—Data traffic received from the clients connected to the port.n Trusted—Ports marked as trusted.

Uplink Displays the Uplink Stats graph. The graph displays the uplink statistics for the inbound andoutbound data traffic.

Info Displays the following details for the switch stack:Stack Details

Table 28: Stack Details Page

Page 96: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Data PaneContent Description

n Stack Name—Name of the switch stack.n Split Policy—Details on how the stack is split.n Stack Status—Shows if the switch stack is active or not.n Member Count—Shows number of members on the switch stack.n Topology—Type of switch stack topology.

Member Detailsn Member Serial Number—Serial number of member switch.n Member ID—Member identification number.n Member Status—Status of the member.n Serial Number—Serial number of the switch stack.n Public IP— The public IP address of the switch stack.n Management IP— Management IP address of the switch stack.n MAC address—MAC address of the switch stack.n Power Consumption— Power drawn from the switch stack in watts (W).n CPU (graph)—percentage of CPU utilization with pointer to Green, Amber, or Redportion of the graph.n Uplink Ports—Displays the uplink statistics of ports.n Member Role—Displays member role.n Switch Model Type—Hardware model of the switch stack.n Firmware Version—Firmware version of the switch stack.n Fan Speed—Fan speed of the switch stack. For the other switches, the Fan Speed fieldshows Ok to indicate that the fan speed is fine.n Group Name—Name of the group to which switch is assigned.n Location—Location in which the switch stack is installed.n Memory (graph)—Percentage of memory utilization with an indicator to Green, Amber,or Red portion of the graph.

Alerts and Eventlogs

Displays the alerts details and event log generated for this switch stack.Alerts table—Shows Date/Time at which alert is generated and the description for the alert.Event Log table—Shows Date/Time at which the event occurred and a description of theevent.

Map Displays the geographical location of the switch stack.

Table 28: Stack Details Page

SecurityThe Security tab provides details on rogue APs, interfering APs, infrastructure attacks, and WIDS events.

Viewing Rogue AP DetectorsTo view detectors of rogue APs:

1. From the app selector, click Monitoring & Reports.

2. In the default Network Overview page, click Security > Rogues. A graph showing Top 5 detectors ofRogue APs is displayed.

Viewing Interfering AP DetectorsTo view detectors of interfering APs:

1. From the app selector, click Monitoring & Reports.

2. In the default Network Overview page, click Security > Interferences. A graph showing Top 5detectors of interferences is displayed.

Aruba Central | User Guide Monitoring & Reports | 96

Page 97: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

97 | Monitoring & Reports Aruba Central | User Guide

Viewing Intrusion Detection AttacksTo view detectors of rogue APs:

1. From the app selector, click Monitoring & Reports.

2. In the default Network Overview page, click Security > Intrusion Detection. The following graphsare displayed:

a. Top 5 detectors of infrastructure attacks.

b. Top 5 detectors of client attacks.

c. Detected intrusion detection system attacks.

Viewing WIDS EventsTo view WIDS events:

1. From the app selector, click Monitoring & Reports.

2. In the default Network Overview page, click Security > WIDS Events. The WIDS Events pane isdisplayed.

The Security pane provides a summary of the rogue Instant APs, interfering Instant APs, and the total numberof wireless attacks detected on an AP and client devices for a given duration.

Data PaneContent

Description

TemporalFilter

By default, the graphs are plotted for a time range of 3 hours. To view the graphs for a differenttime range, click the Temporal Filter link. You can choose to view graphs for a time period of 3hours, 1 day, and 1 week.

Rogues Displays a graph showing the top 5 rogue AP detectors in the network.

Interferences Displays a graph showing the top 5 interferences detected in the network.

Table 29: Security pane

Page 98: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Data PaneContent

Description

IntrusionDetection

Displays graphs showing the top 5 infrastructure, client, and intrusion detection attacks.

WIDS Events Displays a list of the WIDS events. The table displays information for the following types of WIDSevents:

n Roguesn Interferencesn Infrastructure Attacksn Client Attacks

The Rogues table displays the following information for the WIDS events:n First Seen—The time relative to the current moment (for example, 6 minutes; an hour) atwhich the rogue device was f detected in the network.n Last Seen—The time relative to the current moment (for example, 6 minutes; an hour) atwhich the rogue device was last detected in the network.n Reason For Classification—Reason for classification of the rogue device (Instant AP).n Detecting AP—The AP that detected the rogue device in the network.n Station MAC—MAC address of the station.n Containment Status—Details of the containment status.n ESSID—The ESSIDs broadcast by the rogue device.n Channel—Number of radio channels detected on the rogue device.n Radio—Radio band on which the interference was detected.

The Interferences table, Infrastructure Attacks table, and the Client Attacks table display thefollowing information:

n Type—The type of the interference, infrastructure attack, or client attack detected.n Level—The level of the interference, infrastructure attack, or client attack detected.n Date/Time—Date and time of the interference, infrastructure attack, or client attackdetected.n Description—A description of the interference, infrastructure attack, or client attackdetected.n Detecting AP—The MAC address of the AP that detected the interference or attack.n Virtual Controller—The VC name of the Instant AP cluster in which the interference orattack was detected.n Station MAC—The MAC address of the station.n Radio—The radio band on which the interference or attack was detected.

Table 29: Security pane

Label HealthThe Label Health menu option in the Monitoring & Reports application provides detailed information onthe health and performance of the devices attached to each label in your setup.

Data SourceThe Label Health page displays details for all the wired and WLAN devices attached to the labels configured inyour setup.

Page ViewsThe Label Health page offers the following views:

n Grid—The grid view displays label health information in numerical values.

Aruba Central | User Guide Monitoring & Reports | 98

Page 99: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

99 | Monitoring & Reports Aruba Central | User Guide

n Status—The status view displays health indicators. The following indicators are used present informationon status of network health:

l Small black bullet icon—Indicates no issues.

l Big red bullet icon—Indicates potential issues.

SummaryIf the data source is set to Summary, the Label Health page displays the following information:

Header Description

Name Name of the label. Clicking on the label name opens the per label details.

NumberofDevices

The page displays the following details for devices:n Status—Number of devices that are in Up or Down.n High Memory Usage—Number of devices with high memory utilization.n High CPU Usage—Number of devices with high CPU usage.n RF High Channel Usage—Number of APs with a higher channel utilization per radio band.n RF High Noise—Number of APs with a high RF noise.

User The page displays the connectivity health score details for WLAN clients. You can set the minimum andmaximum filters to view clients within a specific range of connectivity score. The client connectivityhealth score refers to a cumulative score that is computed based on client onboarding performance ofthe network. The connectivity score below 69% is indicated in red and hints at potential issues in theclient onboarding experience.

Table 30: Summary Page View

Per Label DetailsTo view device health and performance details per labels, click the label name in the Label Health page.

Content Description

Name Name of the label. To search for a label, click the drop-down and enter the search text.

Data View Data source. For example, if the data view is set Summary, the page displays data for the wiredand WLAN devices attached to a label.

TimerangePicker

Time range selection drop-down for viewing device health per label. You can set the time rangeto 3 hours, 1 day, 1 week, 1 month, or 3 months.

Details The following details are available:n Change Log—A visual representation of change logs for configuration, firmware, andreboot changes in the selected time range. The number of changes logged for configuration,firmware upgrades and reboots are represented in grey, green, and red indicators.n Summary Statistics—A graphical representation of the number of clients and bandwidthusage for the selected time range.

System HealthIndicatorsGraphs

The following details are displayed:Down Devices—This graph shows the count or percentage of devices with DOWN status. Thegraph displays the following information:

n Total number of devicesn Number of unique devices that are DOWN

Table 31: Label Health Summary Page

Page 100: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Content Description

n Minimum and maximum device downtime.When you click any point in time range within the graph, the See Devices option is displayed.Click See Devices. A pop-up window opens and displays the details of devices with DOWN statusand their UP and Down Time in percentage. You can also add other metrics such as CPU,Memory, Channel Utilization (5 GHz, 2.4 GHz), or Noise Floor (5 GHz, 2.4 GHz) for this deviceslist.

High Memory Utilization—This graph shows the total count or percentage of devices withhigh memory utilization.

n Filter—You can set the filter to count or percentage to view the total count or percentageof devices with a higher memory utilization.n Device Details—The graph also displays the total number of devices, number of uniquedevices, the minimum and maximum number of devices with high memory utilization. Youcan also view the total count or percentage of maximum and minimum number of deviceswith high memory utilization for specific time when you hover your mouse over the graph.n Threshold Setting—You can also choose to view the graph details based on one of thefollowing criteria by selecting an option from the Temporary Baseline Override list(threshold setting widget):

l >70% memory utilizationl >80% memory utilizationl >90% memory utilization

To view more details, click See Devices. A pop-up window opens and provides the details ofdevices with high memory utilization and their minimum and maximum memory utilizationvalues. You can add other metrics such as CPU, Channel Utilization (5 GHz, 2.4 GHz), Noise Floor(5 GHz, 2.4 GHz), or Device Downtime for the devices.

High CPU Utilization—This graph shows the total count or percentage of devices with high CPUutilization.

n Filter—You can set the filter to total count or percentage to view the total count orpercentage of devices with a higher CPU utilization.n Device Details—The graph also displays the total number of devices, number of uniquedevices with high CPU utilization, and minimum and maximum number of devices with highCPU utilization. You can also view the total count or percentage of maximum and minimumnumber of devices with high CPU utilization for a specific time when you hover your mouseover the graph.n Threshold setting—You can also choose to view the graph details based on one of thefollowing criteria by selecting an option from the Temporary Baseline Override list(threshold setting widget):

l >70% CPU utilizationl >80% CPU utilizationl >90% CPU utilization

To view more details, click See Devices. A pop-up window opens and displays the details ofdevices with high CPU utilization and their individual minimum and maximum CPU utilizationvalues. You can add other metrics such as Memory , Channel Utilization (5 GHz, 2.4 GHz), NoiseFloor (5 GHz, 2.4 GHz), and Device Downtime for the devices.

RF HealthIndicatorsGraphs

You can view the following RF health status for the 2.4GHz and 5GHz bands:5 GHz Utilization and Noise—This graph displays the total count or percentage of devices withhigh channel utilization and high noise floor levels for 5GHz band.

n Filter—You can set the filter to total count or percentage to view the total count orpercentage of devices with a higher channel utilization for the 5GHz radio band.n Device Details—The graph displays total number of devices, number of unique deviceswith high 5 GHz channel utilization and high noise floor levels, and the minimum andmaximum number of devices with high channel utilization. You can also view the total countor percentage of maximum and minimum number of devices with high CPU utilization for aspecific time when you hover your mouse over the graph.n Threshold setting—You can also choose to view the graph details based one of thefollowing criteria by selecting an option from the Temporary Baseline Override list (threshold

Table 31: Label Health Summary Page

Aruba Central | User Guide Monitoring & Reports | 100

Page 101: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

101 | Monitoring & Reports Aruba Central | User Guide

Content Description

setting widget):l >60% 5 GHz Utilizationl >70% 5 GHz Utilizationl >80% 5 GHz Utilizationl >-75 dBm 5 GHz Noisel >-80 dBm 5 GHz Noisel >-85 dBm 5 GHz Noise

To view more details, click See Devices. A pop-up window opens and displays details of deviceswith high 5 GHz channel utilization (minimum and maximum values) and Noise Floor (minimumand maximum) values. You can add other metrics such as 2.4 GHz Channel Utilization, 2.4 GHzNoise Floor, CPU, Device Downtime, or Memory for the list of devices.

2.4 GHz Utilization and Noise: —This graph displays the total count or percentage of deviceswith a higher channel utilization and high noise floor levels for 2.4 GHz channel.

n Filter—You can set the filter to total count or percentage to view the total count orpercentage of devices with a higher channel utilization for the 2GHz radio band.n Device Details—The graph displays the total number of devices, number of unique deviceswith high 2.4 GHz channel utilization and noise floor levels, minimum and maximum numberof devices with high channel utilization and noise levels. You can also view the total count orpercentage of maximum and minimum number of devices with high 2.4 GHz Utilization andNoise.n Threshold Setting—You can also choose to view the graph details based one of thefollowing criteria by selecting an option from the Temporary Baseline Override list (thresholdsetting widget):

l >60% 2.4 GHz Utilizationl >70% 2.4 GHz Utilizationl >80% 2.4 GHz Utilizationl >-75 dBm 2.4 GHz Noisel >-80 dBm 2.4 GHz Noisel >-85 dBm 2.4 GHz Noise

To view more details, click See Devices. A pop-up window opens and provides the details ofdevices with high 2.4 GHz channel utilization (minimum and maximum values) and Noise Floor(minimum and maximum) values. You can add other metrics such as CPU, Memory, 5 GHzChannel Utilization, 5 GHz Noise Floor, and Device Downtime for the list of devices.

Client HealthIndicatorsGraph

Displays the graph showing the overall health indicators for the clients connected to the devices.The devices with low client connectivity scores are displayed for the selected time range.

NOTE: The threshold setting widget ( ) is visible only when you bring the mouse pointer closer to its positionslightly above the right-hand side of each graph.

Table 31: Label Health Summary Page

Client OverviewThe Monitoring & Reports > Client Overview page displays the details of clients connected to the devices inCentral.

Page 102: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Client Overview PageThe Client Overview page displays the total number of clients, bandwidth usage, and the application usageby the clients connected to the wired and wireless networks.

Data PaneContent

Description

Total Displays the total number of clients.

Wired Displays the total number of clients connected to the wired network.

Wireless Displays the total number of clients connected to wireless network.

Usage Displays the following graphs:n Bandwidth Usage graph—Displays the incoming and outgoing throughput traffic for all theclients during a specific time range. The graph will not show any data for the clients that areconnected to the network for less than two hours.n Application Usage graphs:

l Apps—Displays the applications used by the clients.l App Categories—Displays the application categories that are accessed by the clients.l Web Categories—Displays the web categories accessed by the clients.l Web Reputation—Displays the Web reputation score for the websites accessed by theclients.

Distribution Displays the type of client device connected to the wireless network.

Top N Displays a list of clients connected to the currently available SSIDs that utilize the maximumbandwidth in the network.The Top Clients by Usage table displays data only for the clients that are connected to the networkfor a total duration of two or more hours.

List Displays wireless and wired client details.If the wired clients feature is enabled on your account and there are no WLAN SSIDs configured inthe provisioned network, the details of the wired clients are displayed. If your provisioned networkhas WLAN SSIDs configured and the wired clients feature enabled on your account, assign the wirednetwork profiles to the Ethernet ports of an Instant AP to view the wired clients.The clients dashboard displays the following details for the wireless and wired clients.

n MAC Address—MAC address of the client.n IP Address—IP address of the client.n Username—User name of the client.n Hostname—Host name of the client.n Device Type—Type of the client device.n SSID—Applicable for a wireless client only. The SSID to which the clients are connected.n Labels—Labels associated with the clients.n Connected To—MAC address of the device to which the client is connected.n Connection—Type of the client.

To expand or collapse the column view, click the column settings icon next to the last column of thetable.

n Export CSV—Allows you to export client details to a CSV file.

Table 32: Client Overview Page

Aruba Central | User Guide Monitoring & Reports | 102

Page 103: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

103 | Monitoring & Reports Aruba Central | User Guide

Client DetailsTo view the details of a client, click a client from the Clients table on the Monitoring & Reports > ClientOverview > List page.

Data PaneContent Description

Current AP Displays the AP to which the client is currently connected.

SSID Displays the SSID to which the client is connected.

Role Displays the user role assigned to the client.

OS Displays the OS running on the client device.

Usage Displays the following graphs:n Bandwidth Usage graph—Displays the incoming and outgoing throughput traffic for theclient during a specific time range.n Application Usage graphs—If deep packet inspection is enabled, the following graphsare displayed:

l Apps—Displays the applications used by the client.l App Categories—Displays the application categories that are accessed by the client.l Web Categories—Displays the web categories accessed by the client.l Web Reputation—Displays the Web reputation score for the websites accessed bythe client.

RF Health Displays the following RF health statistics:n Signal Strength—Indicates signal strength of the client device in dB as measured by theAPn Speed—Indicates the connection speed of the client.n Signal-to-Noise Ratio (SNR)—Indicates the signal-to-noise ratio of the client device.n Channel/Band—Displays the channel and the radio band to which the client is assigned.

Mobility Displays the time stamp and details of the Instant AP and client association.

Event Log Displays the alerts and events generated for the client.

Info Displays the following details about the client device:n Connection rate—Data rate for client connection.n Name—Name of the client device.n IP Address—IP address of the client device.n Username—Username for the client device.n Manufacturer—Client device manufacturer details.

Table 33: Wireless Client Details

Data PaneContent Description

OS Displays the OS running on the client device.

IP Address Displays the IP address of the client.

Usage Graphs Displays the following graphs:

Table 34: Wired Client Details

Page 104: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Data PaneContent Description

n Bandwidth Usage graph—Displays the incoming and outgoing throughput traffic for theclient during a specific time range.n Application Usage graphs—If deep packet inspection is enabled, the following graphsare displayed:

l Apps—Displays the applications used by the client.l App Categories—Displays the application categories that are accessed by the client.l Web Categories—Displays the web categories accessed by the client.l Web Reputation—Displays the Web reputation score for the websites accessed bythe client.

Event Log Displays the alerts and events generated for the client.

Info Displays the following details about the client device:n Port—Port to which the client is connected.n Device Name—Device name of the client.n MAC Address—MAC address of the client.n Username—User name of the client.n Role—User role assigned to the client.n Connection Duration—Duration for which the client is connected.n Vlan—VLAN ID of the port that the client is connected to.n Authentication Type—Authentication type configured on the client.

AppRFThe Monitoring & Reports > AppRF pane provides a detailed information on application usage by the clientsconnected to APs in the network. On clicking AppRF, a dashboard that provides a summary of client traffic toapplication and application categories is displayed. You can analyze the client traffic flow using the graphsdisplayed in the AppRF dashboard.

To view the graphs on the AppRF pane, ensure that the AppRF service is enabled.

Application Visibility is supported for Instant APs running 6.4.3.1-4.2.0.0 or later release version.

Central supports AppRF monitoring, DPI configuration, and web filtering for IAP-103, RAP-108/109, IAP-114/115, RAP-155, IAP-224/225, IAP-274/275, IAP-228, IAP-277, IAP-205, IAP-214, and IAP-324/325, IAP-304/305. IAP-207, IAP-334, and IAP-314/315.

The Instant AP-104/105, Instant AP-134/135, RAP3WNP, and Instant AP-175 devices support only webpolicy enforcement.

The AppRF dashboard displays application information in Overview, Analyze, and Blocked Traffic tabs. Toview the client traffic details, ensure that the DPI access rules are enabled on the Instant AP device. For moreinformation, see Configuring ACL Rules for Application Analytics and Configuring Web Policy Enforcement .

You can view the client traffic to Applications, Application Categories, Website Categories, and WebReputation graphs for a specific time frame (3 Hours, 1 Day, 1 Week, 1 Month, 3 Months). By default, thegraphs display real-time client traffic data or usage trend in the last three hours.

The application (Apps) and Web Categories graphs are also displayed in the Monitoring & Reports > NetworkOverview > APs and Monitoring & Reports > Client Overview pages.

AppRF data is updated every 0th minute of every hour. The data population on the AppRF dashboard may be delayedby an hour when compared to the AppRF data displayed in the Monitoring & Reports > Network Overview > APs

Aruba Central | User Guide Monitoring & Reports | 104

Page 105: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

105 | Monitoring & Reports Aruba Central | User Guide

and Monitoring & Reports > Client Overview pages.

Enabling AppRF™ ServiceTo view the application details for the clients associated with an Instant AP, you must enable the AppRF service.

To enable AppRF, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Services. The Services page opens.

4. Click AppRF™5. Select any of the following options for Deep Packet Inspection:

n All—Performs deep packet inspection on client traffic to application, application categories, websitecategories, and websites with a specific reputation score.

n App—Performs deep packet inspection on client traffic to applications and application categories.

n WebCC—Performs deep packet inspection on client traffic to specific website categories and websiteswith specific reputation ratings.

n None—Disables deep packet inspection.

OverviewThe Overview tab provides a summary of client traffic to applications, application categories, websitecategories, and web reputation. The Overview pane displays four different graph areas with data graphs on allclient traffic flowing to application (Apps), application category (App Categories), Web Categories, and WebsiteReputation.

App Categories Chart

The App Categories chart displays details on the client traffic towards the application categories. When thecursor is placed on the chart, the app category and percentage of client traffic flowing to that app category isdisplayed. The legend below the chart displays the list of application categories to which the client traffic flow isdetected. On clicking an app category from legend, the chart hides that app category and displays data for theremaining app categories.

Apps Chart

The Apps chart displays details on the client traffic flow to specific applications. When the cursor is placed onthe chart, the application and percentage of traffic to that application is displayed. The legend below the chartdisplays the list of applications to which the client traffic flow is detected. On selecting an app from the legend,the chart hides that app and displays data for the remaining apps.

Web Categories Chart

The Web Categories chart displays details of the client traffic to web categories. When the cursor is placed onthe chart, the web category and percentage of traffic to the web category is displayed. The legend below thechart displays the list of website categories to which the client traffic flow is detected. On selecting a webcategory from the legend, the chart hides that web category from the chart and displays data for the remainingweb categories.

Web Reputation Charts

The Web Reputation chart displays details of the client traffic flow to the URLs that are assigned a web

Page 106: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

reputation score. When the cursor is placed on the chart, the web reputation type and percentage of traffic tothe web reputation is displayed. On selecting a web reputation type from the legend, the chart hides the webreputation type and displays data for the remaining web reputation types.

AnalyzeThe Analyze tab provides a detailed view of client traffic per application, application category, websitecategories, web reputation, SSID, device type, and user roles.

The SSID, Device Type, and User Role widgets are not displayed by default. These can be displayed by selectingthem from the Display drop-down list.

Views

All widgets provide the following view options:

n List view—Displays data usage for applications, application categories, web categories, and web reputationin the list format.

n Chart view—Presents the data usage information for applications, application categories, web categories,and web reputation in the graphical format. Place the cursor on the chart provides to view the data usagedetails.

n Full screen—Displays the data in the full screen mode.

Filter

To filter the network traffic, ensure that you are in the list view. If you want to add multiple filters fromdifferent widgets, do not use the full screen mode. To add filters, click the line items in each widget and noticethat the data in surrounding widgets change.

The filtered categories are displayed as filters above widgets. To remove a filter, click the filter or click X next tofiltered category.

Detail Pages

The details pages for apps and web categories display the following information:

n Details in the Apps widget—Applications and client traffic to all these applications.

Parameter Description

Category Name of the application.

Total Usage The total usage of the application bandwidth.

Usage(%) Percentage of client traffic to an application.

#SSID Number of SSIDs through which the clients access an application.

Table 35: Details—Apps

n Clicking on Details in the Web Categories widget displays a table that shows the details of the client trafficto all web categories the last three hours or one day. By default, the details are displayed for the last 3hours.

Aruba Central | User Guide Monitoring & Reports | 106

Page 107: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

107 | Monitoring & Reports Aruba Central | User Guide

Parameter Description

Category Name of the web category.

Total Usage The total bandwidth used by clients accessing the web category.

Usage(%) Percentage of client traffic to the web category.

#SSID Number of SSIDs used for accessing the web category.

Table 36: Details—Web Categories

Blocked TrafficThe Blocked Traffic tab allows you view the blocked devices and user sessions. The blocked traffic details areshown only for the APs on which the AppRF or DPI ACLs are enabled. For more information, see ConfiguringACL Rules for Application Analytics and Configuring Web Policy Enforcement .

Downloading Blocked Session Details

To download the blocked session details in the CSV format, complete the following steps:

1. Go to Monitoring & Reports > AppRF > Blocked Traffic.

If the group filter is set to All Devices, select the device group from the Device Group drop-down.

If the device group is already selected from the Groups drop-down on the filter bar, the page displays thegroup name and the number of sessions blocked for the clients connected to devices in that group.

2. To download the blocked sessions report, click Download CSV. Central generates the CSV report withdata from the last 7 days.

The following example shows the typical content of the Blocked Sessions CSV report:

Ti

me

st

am

p

Clien

t Mac

U

s

e

r

N

a

m

e

SwarmID SSID

Use

rRo

le

Ap

Se

ri

al

De

vi

ce

Ty

pe

App

Nam

e

Ap

pC

at

WebCat

We

bR

ep

To

ta

lB

yt

es

00

:4

4.

8

08:6d

:41:d

1:c1:

ca

5f7c4d1401213d9e0

5dc19b9a97c40f64a

457c8479dfa511b3

app

rf-

pra

tee

k2

app

rf-

pra

tee

k2

CJ

01

63

54

2

OS

X

Hul

u

St

re

am

in

g

Enterta

inment

and

Arts

Tr

us

tw

or

th

y

6

00

:4

4.

8

08:6d

:41:d

1:c1:

ca

5f7c4d1401213d9e0

5dc19b9a97c40f64a

457c8479dfa511b3

app

rf-

pra

tee

k2

app

rf-

pra

tee

k2

CJ

01

63

54

2

OS

X

net

fli

x.c

om

St

re

am

in

g

Enterta

inment

and

Arts

Tr

us

tw

or

th

y

1

00

:4

4.

08:6d

:41:d

1:c1:

5f7c4d1401213d9e0

5dc19b9a97c40f64a

457c8479dfa511b3

app

rf-

pra

app

rf-

pra

CJ

01

63

OS

X

net

fli

x.c

St

re

am

Enterta

inment

and

Tr

us

tw

2

Page 108: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

8 catee

k2

tee

k2

54

2om

in

gArts

or

th

y

00

:4

4.

8

08:6d

:41:d

1:c1:

ca

5f7c4d1401213d9e0

5dc19b9a97c40f64a

457c8479dfa511b3

app

rf-

pra

tee

k2

app

rf-

pra

tee

k2

CJ

01

63

54

2

OS

X

net

fli

x.c

om

St

re

am

in

g

Enterta

inment

and

Arts

Tr

us

tw

or

th

y

2

15

:5

5.

5

d8:50

:e6:7

7:6e:

0d

5f7c4d1401213d9e0

5dc19b9a97c40f64a

457c8479dfa511b3

app

rf-

pra

tee

k2

app

rf-

pra

tee

k2

CN

BV

HM

G0

NJ

An

dr

oi

d

Unk

now

n

Un

kn

ow

n

Streami

ng

Media

Tr

us

tw

or

th

y

3

15

:5

5.

5

00:24

:d7:e

b:22:

68

5f7c4d1401213d9e0

5dc19b9a97c40f64a

457c8479dfa511b3

app

rf-

pra

tee

k2

app

rf-

pra

tee

k2

CN

BV

HM

G0

NJ

Wi

nd

ow

s

Unk

now

n

Un

kn

ow

n

Enterta

inment

and

Arts

Tr

us

tw

or

th

y

3

15

:5

5.

5

00:24

:d7:e

b:22:

68

5f7c4d1401213d9e0

5dc19b9a97c40f64a

457c8479dfa511b3

app

rf-

pra

tee

k2

app

rf-

pra

tee

k2

CN

BV

HM

G0

NJ

Wi

nd

ow

s

Unk

now

n

Un

kn

ow

n

Streami

ng

Media

Tr

us

tw

or

th

y

2

15

:5

5.

5

d8:50

:e6:7

7:6e:

0d

5f7c4d1401213d9e0

5dc19b9a97c40f64a

457c8479dfa511b3

app

rf-

pra

tee

k2

app

rf-

pra

tee

k2

CN

BV

HM

G0

NJ

An

dr

oi

d

Unk

now

n

Un

kn

ow

n

Streami

ng

Media

Tr

us

tw

or

th

y

9

15

:5

5.

5

d8:50

:e6:7

7:6e:

0d

5f7c4d1401213d9e0

5dc19b9a97c40f64a

457c8479dfa511b3

app

rf-

pra

tee

k2

app

rf-

pra

tee

k2

CN

BV

HM

G0

NJ

An

dr

oi

d

Unk

now

n

Un

kn

ow

n

Streami

ng

Media

Tr

us

tw

or

th

y

2

45

:4

8.

9

00:24

:d7:e

b:22:

68

5f7c4d1401213d9e0

5dc19b9a97c40f64a

457c8479dfa511b3

app

rf-

pra

tee

k2

app

rf-

pra

tee

k2

CJ

01

63

54

2

Wi

nd

ow

s

Goo

gle

Dri

ve

We

b

Streami

ng

Media

Lo

w

Ri

sk

11

45

:4

8.

9

00:24

:d7:e

b:22:

68

5f7c4d1401213d9e0

5dc19b9a97c40f64a

457c8479dfa511b3

app

rf-

pra

tee

k2

app

rf-

pra

tee

k2

CJ

01

63

54

2

Wi

nd

ow

s

goo

gle

.co

m

We

b

Streami

ng

Media

Tr

us

tw

or

th

y

10

The CSV file shows up to 50000 blocked sessions for a single Instant AP cluster.

Aruba Central | User Guide Monitoring & Reports | 108

Page 109: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

109 | Monitoring & Reports Aruba Central | User Guide

VisualRFVisualRF allows you to plan sites, create and manage floor plans, and provision APs. You can use VisualRF Planto do basic planning procedures, such as, creating a floor plan and provisioning APs.

VisualRF provides a real-time picture of the radio environment of your wireless network and the ability to planthe wireless coverage of new sites. For a better understanding of your wireless network, you must know thelocation of your devices and users, and the RF environment of your network. The VisualRF puts thisinformation at your fingertips through integrated mapping and location data.

VisualRF uses sophisticated RF fingerprinting to accurately display coverage patterns and calculate the locationof every wireless device in range. VisualRF does not require dedicated RF sensors or a costly additional locationappliance, because it gathers all the necessary information from your existing devices.

VisualRF is supported only on Instant APs running 6.5.2.0 or later.

VisualRF offers the following features:

n Floor plan import and creation

n Pictorial navigation that allows you to view the floor plans associated with Instant APs, clients, buildings, andfloors.

n Accurate calculation of the location of all client devices (laptops and Phones) using RF data from yourdevices.

n A tree view that allows you to navigate to a specific campus.

n A map view that shows the location of devices and heatmaps that depict the strength of RF coverage ineach location.

VisualRF DashboardTo view the VisualRF dashboard:

1. From the app selector, click Monitoring & Reports.

2. Click VisualRF. The VisualRF dashboard opens.

The VisualRF dashboard allows you set your view to one of the following options:

n Network—The network icon allows you to navigate to a specific site.

n Map—The map view shows the location of the sites. Clicking on a specific site leads you to a campus,buildings, floor plans, and devices.

l You can also search for a specific site in the search box.

l To move or drag a site to different location on the map, click the lock icon.

n List—The list view provides a complete list of sites, links to the corresponding buildings and floor plans,size of the floor, grid size, the number of APs on the floor, and the number of clients connected to APson the floor.

Page 110: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Viewing Network InformationThe Network link displays a page for viewing campuses, buildings, and floors within a network. You can clickthe Map link to view the site map. Click the List link to view the list of sites.

To view more information, perform the following actions:

n To view the details of a network within a campus, select a campus, and click on a building within the selectedcampus.

n To view the floor plan, select a floor. The floor plan displays the Instant APs and clients on that floor.

n To view information about the devices, select an AP or client.

Customizing the Floor Plan ViewTo customize your floor plan view, click the View tab on the right sliding panel. The View tab displays the list ofcampuses and the devices.

n To increase the icon size of campus, click the arrow next to Campuses.

n Click APs to view the details of the Instant AP and the RF environment.

n Click Clients to view the client details.

Viewing Campus, Sites, Buildings, and FloorsThe VisualRF navigation menu on the right pane consists of the Properties, View, and Edit tabs. The followingtable describes the menu options available for network locations such as campus, building, and floor.

Aruba Central | User Guide Monitoring & Reports | 110

Page 111: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

111 | Monitoring & Reports Aruba Central | User Guide

Category Property Tab View Tab Edit Tab

Network Displays thetotal number ofAPs, buildings,clients, andfloors

Displays the following menuoptions:

n Campusesl Displays thecomplete list of campussites within yournetwork. Click the linksto view details of thecampus sites.l Enables or disablesthe campus icons onthe map.l Allows you todecrease or increasecampus icon size on themap

n Labels—Shows or hidesthe labels assigned tocampus sites.

Displays the following menu options:n Select All—Selects all campus sites. Youcan perform the following actions when thecampus sites are selected:

l Remove—Removes the selected sites.l Bill of Materials—Enables showing orhiding heatmap, speed, sensor coverage,wired range and other details.l Auto match planned devices—Automatically matches the devices thatare planned for deployment and reloadsthe page.

n Undo—Cancels the previous action.n New Floorplan—Allows you to create anew floor plann Set Background—Allows you set abackground image. You can upload a customimage or set a specific location from theworld map as a background.n New Campus—Allows you create a newcampus.n Auto-arrange Campuses—Arrangescampus icons on the map.

Campus Displays thename ofcampus and thetotal number ofAPs in thecampus site.

Displays the following menuoptions:

n Buildingsl Displays thecomplete list ofbuildings within thecampus. Click the linksto view the details ofthe buildings in thecampus site.l Enables or disablesthe building icons onthe map.l Allows you todecrease or increasethe building icon size onthe map

n Labels—Shows or hidesthe labels assigned tobuildings.

Displays the following menu options:n Select All—Selects all buildings. You canperform the following actions when buildingsare selected:

l Remove—Removes the selectedbuildings.l Navigate—Navigates to the building.l Bill of Materials—Enables showing orhiding heatmap, speed, sensor coverage,wired range and other details.l Auto match planned devices—Automatically matches the devices thatare planned for deployment and reloadsthe page.

n Export Floor Plans—Exports the floorplan of a specific floor.n Undo—Cancels the previous actionn New Floorplan—Allows you to create anew floor plan.n Set Background—Allows you set abackground image. You can upload a customimage or set a specific location from theworld map as a background.n New Building—Allows you to create anew building.n Auto-arrange Buildings—Arrangesbuilding cons on the map.

Table 37: VisualRF Menu Options

Page 112: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Category Property Tab View Tab Edit Tab

Building Displays thename andlocation detailsof the building,and the totalnumber offloors and APsin the building.

Displays the complete list offloors in the building. Click thelinks to view the floor plan ofthe floors in the building.

Displays the following menu options:n Select All—Selects all floors. You canperform the following actions when floorsare selected:

l Remove—Removes the selectedbuildings.l Navigate—Navigates to the building.l Bill of Materials—Enables showing orhiding heatmap, speed, sensor coverage,wired range and other details.l Auto match planned devices—Automatically matches the devices thatare planned for deployment and reloadsthe page.l Duplicate—Creates a duplicate of theselected floor.

n Export Floor Plans—Exports the floorplan of a specific floor.n Undo—Cancels the previous action.n New Floorplan—Allows you to create anew floor plan.

Floor Displays thefloor details,total number ofAPs on thefloor, andclients.The Advancedoption allowsyou to set thevalues toindicate if theenvironment isrelated to anoffice space,cubicles,offices, orconcrete.

Displays the following menuoptions:

n Devices—Displays APs,Clients, and rogues devicesdetected on the floor.n AP Overlay—Shows theheatmap for the currentand adjacent floors.n Floor Plan Features—Displays the followingdetails:

l Grid Lines—Allowsyou to change the gridsize and color.l Labels—Shows orhides the labels taggedto the devices on thefloor.l Origin—To ensurethat multi-floorheatmaps displayproperly, ensure thatyour floor plans arevertically aligned.VisualRF uses theorigination point for thisalignment. By default,the origin appears inthe upper left corner ofthe floor plan. You candrag and drop theorigin point to thecorrect position.l Regions—Displaysthe regions definedwithin a floor plan. Forexample, you can

Displays the following menu options:n Drawing—Allows you to draw a region orwall for the floor.n Devices—Allows you to add and delete thealready deployed or planned devices.n Actions—Displays the following options:

l Select All—Selects all floors.l Export Floor Plans—Exports the floorplan of a specific floor.l Undo—Cancels the previous action.l New Floorplan—Allows you to createa new floor plan.l Auto Match Planned Devices—Automatically matches the devices thatare planned for deployment and reloadsthe page.l Refresh—Refreshes the page.

Table 37: VisualRF Menu Options

Aruba Central | User Guide Monitoring & Reports | 112

Page 113: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

113 | Monitoring & Reports Aruba Central | User Guide

Category Property Tab View Tab Edit Tab

define two smallregions of high densityclients within a largerfloor plan with lowerclient density.l Walls—Displayswalls drawn on thefloor.

Table 37: VisualRF Menu Options

Viewing AP Overlay InformationThe AP Heatmap overlay displays information for adjacent floors to determine how the bleed through fromadjacent floors affects the viewed floor. Besides the current floor, you can view all floors, or data from APslocated on the floor above or below.

The AP Overlay > Heatmap option that allows you to view details of signal cutoff, and for each radio bandand floors. The Heatmap option also allows you to change the overlay display to grid.

Viewing Rogue DevicesTo view the rogue devices on a floor plan, navigate to the floor plan and click the Devices > Rogues in theProperties tab. Clicking on Rogues shows or hides the rogue icons on the floor plan. The rogue devicepresence is marked with orange circle. The floor plan also shows if the rogue devices is associated with anyInstant AP.

Planning and Provisioning DevicesVisualRF provides the capability to plan campuses, buildings, floors, and location for device provisioning beforethe actual deployment. Using VisualRF, you can create a floor plan and add devices to this floor plan.

The planning and provisioning workflow includes the following procedures:

n Creating a Campus

n Creating a Building

n Creating a Floor Plan

n Modifying Floor Plan Properties

n Adding Devices to the Floor Plan

n Printing a Bill of Materials Report

Creating a CampusTo create a new campus, perform the following actions:

1. From the app selector, click Monitoring & Reports > VisualRF. The VisualRF dashboard opens.

2. Click Floor Plans > Network view. 

3. Click the Network slide out pane on the right and then click the Edit link.

4. Click New Campus.

5. Enter the name of the campus and click Save. The new campus icon appears on the campus background.

6. To set a background image for the campus, complete the following steps:

Page 114: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

a. Click Set Background.

n To set a custom background, select the Custom Image option and upload the image file.

n To set the background to a specific geographical map, click the World Map option and select thecountry map from the drop-down list.

b. Click Save.

c. Drag the new campus icon to the appropriate location on the map background, or right-click thebackground or

Or

Click Auto Arrange Campuses to arrange the campus in alphabetical order across the background.

Creating a BuildingTo create a building, complete the following steps:

1. From the app selector, click Monitoring & Reports > VisualRF. The VisualRF dashboard opens.

2. Click Floor Plans > Network view. 

3. Select the campus under which you want to create a building. The Campus slide out pane opens.

4. Click the Edit tab.

5. Click New Building. Enter the following information:

Field Description

Name Name of the building located in an existing campus.

Address Building or Campus address.

Latitude Latitude as seen from Google Earth.

Longitude Longitude as seen from Google Earth.

CeilingHeight

The normal distance between floors in the building (in feet). This value can be overridden as eachfloor is created, but this is the default value for every new floor added to the system.

Attenuation Enter the attenuation loss (in dBm) between floors. This value can be overridden as each floor iscreated, but this is the default value for every new floor added to the system.

Table 38: New Building Configuration Parameters

6. Click Save. You can add multiple buildings if required.

7. To automatically arrange buildings, click Auto-arrange Buildings.

Creating a Floor PlanVisualRF allows you to add, modify, and import a floor plan background image file. When importing RF plansensure that the devices from the device catalog are included.

To create a new floor plan, complete the following steps:

1. From the app selector, click Monitoring & Reports > VisualRF. The VisualRF dashboard opens.

2. Click Floor Plans > Network view.

3. Click the Edit tab in the Network slide out panel.

4. Click New Floorplan. The New Floorplan pop-up window opens.

Aruba Central | User Guide Monitoring & Reports | 114

Page 115: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

115 | Monitoring & Reports Aruba Central | User Guide

5. Click Browse and locate a floor plan image file from your local file system. You can import the floor planimage file in the bmp, jpg, png, jpeg, and gif format.

6. Select the campus and building from the Campus and Building drop-down lists, respectively.

7. Assign a floor name and a floor number in the Floor name and Floor number text boxes, respectively.

8. Click Save.

Importing a Floor Plan

To import a floor plan exported from VisualRF Plan, AirWave, or Central, complete the following steps:

1. From the app selector, click Monitoring & Reports > VisualRF. The VisualRF dashboard opens.

2. Click the Import menu option.

3. Click Browse and select the floor plan zip file to import.

4. Click Upload.

Modifying Floor Plan Properties

To edit the properties of an existing floor plan, complete the following steps:

1. From the app selector, click Monitoring & Reports > VisualRF. The VisualRF dashboard opens.

2. Click Floor Plans > Network view.

3. Click List. The list of sites is displayed.

4. Click the floor number or floor name link. The <Floor Name> slide out pane is displayed.

5. Click Properties and modify the following properties.

Setting Default Description

Floor Name Floor[Number]

A descriptive name for the floor. It inherits the floor number as a name if nothing isentered.

FloorNumber

0.0 The floor number. You can enter negative numbers for basements.NOTE: Each floor plan within a building must have a unique floor number.

WidthHeight N/A These fields display the current width and height of the floor plan. To change thesesettings, click the Measure icon and measure a portion of the floor.

Gridsize 5 x 5 feet Size of the grid. Decreasing the grid size will enable the location to place clients in asmall grid which will increase accuracy.

Advanced

Environment N/A Environment indicator. The values on the slider range from 1–4 to indicate if theenvironment is related to an office space, cubicles, offices, or concrete.

Table 39: Floor Plan Properties

6. Click Save.

Adding Devices to the Floor PlanYou can add the planned devices (for example, APs) or the already deployed devices to floor plan.

To add the already deployed devices to the floor plan, complete the following steps:

1. From the app selector, click Monitoring & Reports > VisualRF. The VisualRF dashboard opens.

2. Click Floor Plans > Network view.

Page 116: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

3. Click List. The list of sites is displayed.

4. Click the floor number or name link. The <Floor Name> slide out pane is displayed.

5. Click Edit.

6. Click the Add Deployed Devices icon. A list of devices is displayed.

7. Expand the group containing the APs which need to be provisioned on this floor plan. Note that bydefault, devices that have already been added to VisualRF are hidden. To show them, clear the HideDevices that are already added check box at the bottom of the list.

8. Click and drag an AP (or a Group or Folder of APs) to its proper location on the floor.

9. Click Save.

10. To remove a device from the floor plan, right-click that device and then click Remove.

To provision new devices when creating a new floor plan, complete the following steps:

1. From the app selector, click Monitoring & Reports > VisualRF. The VisualRF dashboard opens.

2. Click Floor Plans > Network view.

3. Click List. The list of sites is displayed.

4. Click the floor number or name link. The <Floor Name> slide out pane is displayed.

5. Click Edit.

6. Click Planned Devices and select a device type (model) from the list of available devices.

7. In the Count field, enter the number of devices of that type to add to the new floor.

8. (Optional) Click and drag the Deployment Type slider bar to adjust data rates for a high-density or low-density environment.

9. (Optional) Click the Advanced link and configure the advanced deployment options

n Service level: Select Speed or Signal to plan coverage by adjusting data rate requirements (Speed) orAP signal strength settings. Click Calculate AP count to recalculate the suggested number of APs basedon these advanced settings.

n Client Density: In the Max Clients field, set the anticipated number of clients that will be stationed inthe floor. in the Clients per AP field, enter the maximum number of clients supported by each radio.Click Calculate AP count to recalculate the suggested number of APs based on these advanced settings.

10. Click Add APs to Floorplan.

11. Click and drag the device, to the desired location.

12. Click Finish.

13. To remove a planned device from the floor plan, right-click that device and then click Remove.

Printing a Bill of Materials ReportTo generate a Bill of Materials (BOM) Report from within VisualRF, complete the following steps:

1. From the app selector, click Monitoring & Reports > VisualRF. The VisualRF dashboard opens.

2. Click Floor Plans > Network.

3. Right-click a campus icon, a building icon, or a building floor and select Show Bill of Materials. A reportpop-up window opens.

4. Select options such as heat map, speed, sensor coverage, wired range, and summary.

5. Select OK.

VisualRF APIs

Central supports the following APIs for retrieving client location and floor plan information:

n GET /visualrf_api/v1/campus—Retrieves a list of all campus sites.

Aruba Central | User Guide Monitoring & Reports | 116

Page 117: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

117 | Monitoring & Reports Aruba Central | User Guide

n GET /visualrf_api/v1/campus/{campus_id}—Retrieves information about a specific campus and itsbuildings.

n GET /visualrf_api/v1/building/{building_id}—Retrieves information about specific building and itsfloors.

n GET /visualrf_api/v1/floor/{floor_id}—Retrieves details about a specific floor.

n GET /visualrf_api/v1/floor/{floor_id}/image—Retrieves background image from a specific floor plan.

n GET /visualrf_api/v1/floor/{floor_id}/access_point_location—Retrieves information about the locationof the APs on a specific floor plan.

n GET /visualrf_api/v1/access_point_location/{macaddr}—Retrieves location details of a specific AP.

n GET /visualrf_api/v1/client_location/{macaddr}—Retrieves location details of a specific client.

n GET /visualrf_api/v1/floor/{floor_id}/client_location—Retrieves information about the location ofclients on a specific floor.

For more information on APIs, see Aruba Central APIs and refer to API documentation at https://app1-apigw.central.arubanetworks.com/swagger/central.

AlertsThe Alerts pane displays all types of alerts generated for events pertaining to device provisioning,configuration, and user management.

Viewing the Alerts Summary and Acknowledging AlertsTo view a summary of alerts and acknowledge alerts, complete the following steps:

1. From the app selector, click Monitoring & Reports.

2. Click Alerts. The Alerts page shows a summary of alerts and the Configure Alerts and AcknowledgeAll buttons.

Data PaneContent

Description

Open n Displays the number of alerts in the following categories:l Criticall Majorl Minorl Warning

n Search box—Allows you to search for alerts using keywords.n Acknowledge—The Acknowledge button appears when you hover your mouse over anyalert. Click Acknowledge to acknowledge that specific alert.n Acknowledge All—Allows you to acknowledge all alerts at once.

Acknowledged Displays a list of acknowledged alerts. Use the search box to search for an alert.

Table 40: Alerts pane

Configuring AlertsTo configure alerts, complete the following steps:

1. From the app selector, go to Monitoring & Reports > Alerts.

2. On the Alerts page, click Configure Alerts.

Page 118: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

3. In the Configure Alerts page, click All.4. In the All tab, select an alert and click + to enable the alert with default settings. In any alert category, click...More to expand the list of alerts. See Table 41 for a complete list of alerts that you can configure.

To configure alert parameters, click on the alert tile (anywhere within the rectangular box) and do thefollowing:

a. Severity—Set the severity. The available options are Critical, Major, Minor, and Warning.

For a few alerts, you can configure threshold value for one or more alert severities. To set the threshold value, selectthe alert and in the exceeds text box, enter the value. The alert is triggered when one of the threshold values exceedthe duration.

b. Duration—Enter the duration in minutes.

c. Device Filter Options—(Optional) You can restrict the scope of an alert by setting one or more ofthe following parameters:

n Group—Select a group to limit the alert to a specific group.

n Label—Select a label to limit the alert to a specific label.

n Device—Select a device to limit the alert to a specific device.

d. Select the Email check box and enter an email address to receive notifications when an alert isgenerated. You can enter multiple email addresses, separate each value with a comma.

e. Click Save.

f. Add Rule—(Optional) For a few alerts, the Add Rule option appears. For such alerts, you can addadditional rule(s). The rule summaries appear at the top of the page.

Aruba Central | User Guide Monitoring & Reports | 118

Page 119: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

119 | Monitoring & Reports Aruba Central | User Guide

Table 41 lists and describes the various alerts that you can configure:

AlertCategory

Types & Description

IAP n New Virtual Controller Detected—Generates an alert when a new virtual controller isdetected.n Virtual Controller Disconnected—Generates an alert when a virtual controller isdisconnected. In the Duration field, enter the duration after which the alert must be generated.The default value is 10 minutes.n New AP Detected—Generates an alert when a new Instant AP is detected.n AP Disconnected—Generates an alert when an Instant AP is disconnected. In the Durationfield, enter the duration after which the alert must be generated. The default value is 15 minutes.n Rogue AP Detected—Generates an alert when a rogue Instant AP is detected.n Infrastructure Attack Detected—Generates an alert when an infrastructure attack isdetected.n Client Attack Detected—Generates an alert when a client attack is detected.n Uplink Changed—Generates an alert when an uplink has changed.n Modem Plugged—Generates an alert when the modem is plugged.n Modem Unplugged—Generates an alert when the modem is unplugged.n AP CPU Utilization—Generates an alert when the Instant AP CPU utilization exceeds thethreshold value. In the Duration field, enter the duration after which the alert must be generated.You can add additional rule(s) for this alert.n AP Memory Utilization—Generates an alert when the Instant AP memory utilization exceedsthe threshold value. In the Duration field, enter the duration after which the alert must begenerated. You can add additional rule(s) for this alert.n Radio Channel Utilization—Generates an alert when the Instant AP radio channel utilizationexceeds the threshold value. In the Duration field, enter the duration after which the alert must begenerated. From the Band drop-down, select the spectrum band: 2.4 GHz or 5 GHz. You can addadditional rule(s) for this alert.n Radio Noise Floor—Generates an alert when the Noise Floor (dBm) exceeds the thresholdvalue. In the Duration field, enter the duration after which the alert must be generated. From theBand drop-down, select the spectrum band: 2.4 GHz or 5 GHz. You can add additional rule(s) forthis alert.n Connected Clients—Generates an alert when the number of connected clients exceed thethreshold value. In the Duration field, enter the duration after which the alert must be generated.You can add additional rule(s) for this alert.

User n New User Account Added—Generates an alert when a new user account is added.n User Account Deleted—Generates an alert when a user account is deleted.n User Account Edited—Generates an alert when a user account is edited.

Switch n New Switch Connected—Generates an alert when a new switch is connected.n Switch Disconnected—Generates an alert when a switch is disconnected. In the Durationfield, enter the duration after which the alert must be generated. The default value is 10 minutes.n Switch Mismatch Config—Generates an alert when there is a mismatch in switchconfiguration.n Switch Hardware Failure—Generates an alert when the switch hardware fails. The followingare the typical hardware failures for Aruba and MAS switches:Aruba switches

l Fan failure.l Power supply failure.l Redundant power supply failure.l High temperature.l Management module failures—Management module failed self-test or lost communicationwith management module.l Slot failure—Lost communications detected, slot self-test failure or unsupported module, orchassis hot swap failure.l Fabric power failure.

Table 41: Alert Types

Page 120: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

AlertCategory

Types & Description

l Internal power supply: Fan failure.l Internal power supply failure.l Internal power supply main PoE power failure.l Internal power supply: Main inlet exceeds/within total fault count.l Bad driver—Too many undersized/giant packets.l Bad transceiver—Excessive jabbering.l Bad cable—Excessive CRC/alignment errors.l Too long cable—Excessive late collisions.l Over bandwidth—High collision or drop rate.l Broadcast storm—Excessive broadcasts.l Duplex mismatch HDx—Duplex mismatch. Reconfigure to Full Duplex.l Duplex mismatch FDx—Duplex mismatch. Reconfigure port to Auto.l Link flap—Rapid detection of link faults and recoveries.

MAS switchesl Fan failure.l High temperature.

n Switch CPU Utilization—Generates an alert when the switch CPU utilization exceeds thethreshold value. In the Duration field, enter the duration after which the alert must be generated.You can add additional rule(s) for this alert.n Switch Memory Utilization—Generates an alert when the switch memory utilization exceedsthe threshold value. In the Duration field, enter the duration after which the alert must begenerated. You can add additional rule(s) for this alert.n Switch Port Tx Rate—In the Transform Function drop-down, select either absolute orpercentage. Select absolute to generate an alert if the data transmission rate of the port (interms of Mbps) exceeds the threshold value. Select percentage to generate an alert if the datatransmission rate of the port (in terms of utilization as a percentage of total bandwidth available)exceeds the threshold value. In the Interface field, enter the interface name. You can addadditional rule(s) for this alert.n Switch Port Rx Rate—In the Transform Function drop-down, select either absolute orpercentage. Select absolute to generate an alert if the data reception rate of the port (in terms ofMbps) exceeds the threshold value. Select percentage to generate an alert if the data receptionrate of the port (in terms of utilization as a percentage of total bandwidth available) exceeds thethreshold value. In the Interface field, enter the interface name. You can add additional rule(s) forthis alert.n Switch Port Input Errors—Generates an alert when the percentage of input errors on the portexceeds the threshold value. In the Interface field, enter the interface name. You can addadditional rule(s) for this alert.n Switch Port Output Errors—Generates an alert when the percentage of output errors on theport exceeds the threshold value. In the Interface field, enter the interface name. You can addadditional rule(s) for this alert.n Switch Port Duplex Mode—Generates an alert when the port is operating in half-duplexmode. In the Interface field, enter the interface name.

Clarity n DNS Delay Detected—Generates an alert when DNS delay is detected. The Duration fielddisplays the duration after which the alert is generated. The default value is 30 minutes. You canadd additional rule(s) for this alert.n DNS Failure Detected—Generates an alert when DNS failure is detected. The Duration fielddisplays the duration after which the alert is generated. The default value is 30 minutes. You canadd additional rule(s) for this alert.n DHCP Delay Detected—Generates an alert when DHCP delay is detected. The Duration fielddisplays the duration after which the alert is generated. The default value is 30 minutes. You canadd additional rule(s) for this alert.n DHCP Failure Detected—Generates an alert when DHCP failure is detected. The Durationfield displays the duration after which the alert is generated. The default value is 30 minutes. Youcan add additional rule(s) for this alert.n Authentication Delay Detected—Generates an alert when authentication delay is detected.The Duration field displays the duration after which the alert is generated. The default value is 30minutes. You can add additional rule(s) for this alert.

Aruba Central | User Guide Monitoring & Reports | 120

Page 121: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

121 | Monitoring & Reports Aruba Central | User Guide

AlertCategory

Types & Description

n Authentication Failure Detected—Generates an alert when authentication failure is detected.The Duration field displays the duration after which the alert is generated. The default value is 30minutes. You can add additional rule(s) for this alert.n Association Delay Detected—Generates an alert when client association delay is detected.The Duration field displays the duration after which the alert is generated. The default value is 30minutes. You can add additional rule(s) for this alert.n Association Failure Detected—Generates an alert when client association failure is detected.The Duration field displays the duration after which the alert is generated. The default value is 30minutes. You can add additional rule(s) for this alert.

Viewing Enabled Alerts

To view alerts that you have enabled:

1. From the app selector, go to Monitoring & Reports > Alerts.

2. On the Alerts page, click Configure Alerts.

3. In the Configure Alerts page, click the Enabled tab.

The Enabled tab lists the alerts that you have enabled.

ReportsThe Reports pane allows you to create various reports. You can configure the reports to be run on demand orperiodically. You must have read/write privileges or you must be an Admin user to be able to create reports.The Reports page has the following sections:

n Configure Reports—Displays the reports configured using the Create Report option.

n Generated Reports—Displays the reports generated.

This section includes the following topics:

n Types of reports on page 121

n Creating a report on page 123

n Generated Reports on page 124

n Viewing generated reports on page 125

n Reports on page 121

Types of reportsThe following table lists the different types of reports that you can generate in Central.

Page 122: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Report Type Parameters Displayed

All Displays all scheduled and generated reports.

Network Displays the following parameters:n Number of Instant APsn Instant AP Modeln Top Ten Wireless Clients By Usagen Top Ten Instant APs By Usagen Total Usage By SSIDn Device Typesn Wireless Clientsn Wireless Data Usagen Wireless Data Peak Usagen Top Ten Applications By Usagen Top Ten Web Categories By Usagen Switchesn Switch Modeln Top Ten Switches By Usage (Tx/Rx)n Top Ten Ports By Usage (Tx/Rx)n Wired Uplink Statsn Wired Peak Uplink Stats

Security Displays the following parameters:n Rogue APsn Total Rogue APs Detectedn Wireless Intrusionsn Total Wireless Intrusions

PCI Compliance Displays the PCI Compliance result as Fail or Pass.

ClientInventory

Displays the client details summarized by all aggregation fields. The report includes thefollowing details:

n Number of APs, APs and the AP modeln Number of Clients, Top 10 Clients by Usage, and the type of client devicen Top Ten APs by Usagen Total Usage by SSIDn Wireless Clientsn Wireless Data Usage graphs such as Top Ten APs by Usage, Total Usage by SSID,Wireless Clients, Wireless Data Usage, Wireless Data Peak Usage, Top 10 applications byusage, Top 10 web categories by usagen Switch information such as the Switches in the network, Switch model, Top 10 Switches byUsage, Top 10 Ports by Usage, wired uplink stats, and wired peak uplink stats graphs.

Infra Inventory Displays the inventory and subscription information for the devices that are online during aspecific duration. The report includes the following details:

n Number of Instant APsn Number of Switchesn AP interfaces summaryn Model and Firmware version for APsn Model and Firmware version for Switchesn Instant AP and Switches subscription informationn Subscription utilization graph

Client Usage Displays information about the client usage, client count, and client traffic to applications,application categories, web categories, and applications with web reputation score assigned.

Table 42: Types of reports

Aruba Central | User Guide Monitoring & Reports | 122

Page 123: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

123 | Monitoring & Reports Aruba Central | User Guide

Report Type Parameters Displayed

New InfraInventory

Displays the inventory and subscription information to the devices that are newly added inCentral.

CapacityPlanning

Displays the throughput and client density information for devices provisioned in Central. Thereport includes the following details:

n Top 25 APs by throughputn Top-25 APs by peak client densityn Top-25 APs by average client densityn Top-25 Switches by throughputn Subscription usage

AppRF Displays application usage report for a specific device group. The report displays the followingwidgets:

n Top 10 applications accessed by the clientsn Top 10 web categories accessed by the clientsn Top 10 applications accessed by each type of the client device.n Top 10 applications for the user roles assigned to the client devices.n Top 10 applications for the SSIDs on which the client devices are connected.

Client Session Displays the details of client sessions for the SSIDs provisioned on Instant APs. The report alsodisplays the client count, the number of sessions, cumulative duration, and the usage based onthe following parameters :

n Client Device OSn Connection moden SSIDsn User rolesn MAC address vendors of the device

RF Health Displays the following RF usage statistics for the AP radios.

n Channel changesn Transmission power changesn Average Noise (in dBm)n Average channel utilization (%)n Total error (%)n Interfering devicesn Clientsn Usage

NOTE: For APs that support 5GHz dual band in synchronization with Aruba Instant 8.3.0.0, theDevice column in the RF Health Report shows the radio number of the operating radio alongwith the model number of the device.

ConfigurationAudit Status

Displays the last configuration action audited for devices assigned to groups in Central. Thisreport shows the following information categories:

n Aggregate Statistics—Shows configuration status for all the devices.n Detailed Statistics—Shows detailed configuration status for each device.

Creating a reportYou can generate reports for devices associated with a group, site, or label. You can also set a periodicity forrunning the reports.

Although your page view is set to a specific group, site, or label, you can create reports for a different group, site, orlabel. However, if your page view is set to an Instant AP cluster or Switch, you can schedule report generation only forthat Instant AP cluster or Switch.

Page 124: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

To create a report, complete the following steps:

1. From the App selector, click Monitoring & Reports and select Reports. The Reports page is displayed.

2. Click Create Report. The

l To generate reports for the devices attached to a group, select Groups and then select a device group.

l To generate reports for devices attached to a label, click Labels and then select a label.

l To generate reports for devices deployed on a specific site, click Sites and select a site.

3. Enter the name for the report in Title.

4. From the Report Type drop-down, select the type of the report to generate.

5. From the Period drop-down, select the period for which you want to view the report.

6. Select Now from Schedule to generate the report immediately. To run reports at a later time, selectLater and specify the date and time.

7. From the Run Report drop-down, select how often you want to generate the report by choosing OneTime, Daily Interval, Weekly Interval, or Monthly Interval.8. If you are creating a PCI Compliance report, specify the Cardholder Data Environment (CDE) subnets orCDE SSIDs for which you want to generate the report. You can also run report on all SSIDs.

Central does not support creating or filtering AppRF and PCI Compliance reports based on labels or sites.

9. To email the generated report, specify the email address of the recipient in Email Report.

10. Click Create.

Generated ReportsIn the Generated Reports section of the Reports page, a table listing the parameters used for generating areport is displayed.

Parameter Description

Title Displays the title name of the report generated.

Date Run Displays the date on which report was generated.

Saved By Indicates the user login name using which the report was generated.

Device Group Indicates the device group or groups for which the report was generated.

Labels Indicates the labels for which the report was generated.

Report Type Indicates the type of report.

Status Displays the current status of the report generated.

Periodicity Indicates when the report is triggered.

Table 43: Reports Pane

Aruba Central | User Guide Monitoring & Reports | 124

Page 125: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

125 | Monitoring & Reports Aruba Central | User Guide

Viewing generated reportsTo view a generated report, complete the following steps:

1. From the App selector, click Monitoring & Reports and select Reports.

2. From the Report Type drop-down in the Generated Reports section of the Reports page, select thereport type. The following types of reports are available:

n Network

n PCI Compliance

n Security

n Client Inventory

n Infra Inventory

n Client Usage

n New Infra Inventory

n Capacity Planning

n AppRF

n Client Session

n RF Health

n Configuration Audit Status

3. To send the report through email, click the email icon, enter the email address, and then click Sendemail.

Editing a reportTo edit view a configured report, complete the following steps:

1. In the Reports page, go to the Configure Reports table.

2. Select the report that you want to edit and click the edit icon.

3. Edit the field(s) as necessary and click Update.

Deleting report(s)In the Reports page, go to the Configure Reports table.

n To delete a configured report, complete the following steps:

l Select the report that you want to delete and click the delete icon.

l In the Confirm Action pop-up, click Yes.

n To delete multiple configured reports, complete the following steps:

l Press and hold the Ctrl key and select the reports that you want to delete and click Batch RemoveReports.

l In the Confirm Action pop-up, click Yes.

In the Reports page, go to the Generated Reports table.

n To delete a generated report, complete the following steps:

l Select the report that you want to delete and click the delete icon.

l In the Confirm Action pop-up, click Yes.

n To delete multiple generated reports, complete the following steps:

Page 126: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

l Press and hold the Ctrl key and select the reports that you want to delete and click Batch RemoveReports.

l In the Confirm Action pop-up, click Yes.

Exporting a reportTo export a generated report, complete the following steps:

1. In the Reports page, go to the Generated Reports table.

2. Select the report that you want to export and click the export icon.

Aruba Central | User Guide Monitoring & Reports | 126

Page 127: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Chapter 7Wireless Management

This section describes how to configure WLAN SSIDs, radio profiles, DHCP profiles, VPN routes, security andfirewall settings, uplink interfaces, logging servers on Instant APs.

For more information on Instant AP configuration, see the following topics:

n Configuring AP Settings on page 127

n Configuring Networks on page 135

n Configuring Time-Based Services on page 152

n Configuring ARM and RF Parameters on page 154

n Configuring IDS Parameters on page 158

n Configuring Authentication and Security Parameters on page 162

n Configuring VPN Networks on page 183

n Configuring DHCP and Client IP Assignment Modes on page 188

n Configuring Services on page 194

n Configuring Uplinks on page 201

n Mobility and Client Management on page 206

n Configuring Enterprise Domains on page 207

n Configuring Logs and TFTP Dump Servers on page 210

n Resetting an AP on page 211

n Uploading and Mapping Instant AP Certificates on page 213

n Configuring HTTP Proxy on Instant APs

Configuring AP SettingsThis section describes the procedures for configuring settings that are specific to an Instant AP in the cluster.

To customize Instant AP parameters, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the navigation pane, click Access Points. The Access Points page opens.

4. To edit an AP, click the edit icon Edit on the Access Point row. The Edit pane for modifying the Instant APparameters opens.

5. Configure the parameters described in Table 44.

Aruba Central | User Guide Wireless Management | 127

Page 128: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

128 | Wireless Management Aruba Central | User Guide

UI Parameters Description

Basic Info Name Configures a name for the Instant AP. You can specify a character string of up to 32ASCII characters.

AP Zone Configures the Instant AP zone. For Instant APs running firmware versions 6.5.4.7or later, and 8.3.0.0 or later, you can configure multiple AP zones by adding zonenames as comma separated values.

Swarm Mode Allows to set one of the following operation modes:n Cluster—Allows Instant AP join an Instant AP cluster.n Standalone—Allows Instant AP to function in the standalone mode.

After changing the AP operation mode, ensure that you reboot the AP.

PreferredMaster

Provisions the Instant AP as a master Instant AP.

IP Addressfor AccessPoint

Allows IP to get an IP address from the DHCP server. By default, the Instant APsobtain IP address from a DHCP server.The users can also assign a static IP address to the Instant AP. To specify a static IPaddress for the Instant AP, complete the following steps:

1. Enter the new IP address for the Instant AP in the IP Address text box.2. Enter the subnet mask of the network in the Netmask text box.3. Enter the IP address of the default gateway in the Default Gateway text box.4. Enter the IP address of the DNS server in the DNS Server text box.5. Enter the domain name in the Domain Name text box.

RADIO Mode Select any of the following options:n Access—In the Access mode, the Instant AP serves clients, while alsomonitoring for rogue Instant APs in the background.n Monitor—In the Monitor mode, the Instant AP acts as a dedicated monitor,scanning all channels for rogue Instant APs and clients.n Spectrum Monitor—In the Spectrum Monitor mode, the Instant APfunctions as a dedicated full-spectrum RF monitor, scanning all channels todetect interference, whether from the neighboring Instant APs or from non-Wi-Fi devices such as microwaves and cordless phones.

NOTE: In the Monitor and Spectrum Monitor modes, the Instant APs do notprovide access services to clients.NOTE: In the dual-5Ghz band, the Mode remains as Access and is non-editable.This dual 5 GHz band is only supported on AP-344 and AP-345 that run on InstantAP 8.3.0.0. For more information, see the Viewing Dual 5GHz Band Details forInstant APs section. To get accurate monitoring details and statistics, it is highlyrecommended to reboot the Instant APs once the Instant APs are toggled from the2.4/5GHz mode to dual-5GHz radio mode or vice-versa.

You can configure a radio profile on an Instant AP either manually or by using theARM feature.ARM is enabled on Central by default. It automatically assigns appropriate channeland power settings for the Instant APs.

ExternalAntenna

AntennaGain

If the Instant AP has external antenna connectors, you need to configure thetransmit power of the system. You can also measure or calculate additionalattenuation between the device and the antenna before configuring the antennagain. For more information, see the Configuring External Antenna section.

Table 44: Access Points Configuration

Page 129: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

UI Parameters Description

AntennaPolarizationType

The wireless bridge’s integrated antenna sends a radio signal that is polarized in aparticular direction. The antenna’s receive sensitivity is also higher for radio signalsthat have the same polarization. To maximize the performance of the wireless link,both antennas must be set to the same polarization direction. To maximize theperformance of the wireless link, both antennas must be set to the samepolarization direction.

InstallationType

InstallationType

Configure the Installation Type of the Instant AP you have selected. The InstallationType drop-down consists of the following options:

n Indoorn Outdoor

You can either select the Indoor option to change the installation to Indoor mode orselect the Outdoor option to change the installation to the Outdoor mode.NOTE: The options in the Installation Type drop-down are listed based on theInstant AP model.

Uplink UplinkManagementVLAN

The uplink traffic on Instant AP is carried out through a management VLAN.However, you can configure a non-native VLAN as an uplink managementVLAN. After an Instant AP is provisioned with the uplink management VLAN, allmanagement traffic sent from the Instant AP is tagged to the management VLAN.To configure a non-native uplink VLAN, click Uplink and specify the VLAN in UplinkManagement VLAN.

Eth0Bridging

If you want to convert the Eth0 uplink port to a downlink port, enable Eth0Bridging.

USB Port Enable the USB port if you do not want to use the cellular uplink or 3G/4G modemin your current network setup.

PEAP User Create the PEAP user credentials for certificate based authentication. Provide theuser name and password in the Username and Password field for creating thePEAP user.

6. Click Save Settings.

7. Reboot the Instant AP if required.

Configuring External AntennaIf your Instant AP has external antenna connectors, you need to configure the transmit power of the system.The configuration must ensure that the system’s EIRP is in compliance with the limit specified by the regulatoryauthority of the country in which the Instant AP is deployed. You can also measure or calculate additionalattenuation between the device and antenna before configuring the antenna gain. To know if your Instant APdevice supports external antenna connectors, see the Installation Guide that is shipped along with the InstantAP device.

EIRP and Antenna GainThe following formula can be used to calculate the EIRP limit related RF power based on selected antennas(antenna gain) and feeder (Coaxial Cable loss):

EIRP = Tx RF Power (dBm)+GA (dB) - FL (dB)

The following table describes this formula:

Aruba Central | User Guide Wireless Management | 129

Page 130: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

130 | Wireless Management Aruba Central | User Guide

Formula Element Description

EIRP Limit specific for each country of deployment

Tx RF Power RF power measured at RF connector of the unit

GA Antenna gain

FL Feeder loss

Table 45: Formula Variable Definitions

Configuring Antenna GainTo configure antenna gain for Instant APs with external connectors, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the navigation pane, click Access Points. The Access Points page opens.

4. Under Basic Info, select the access point to configure and then click Edit.

5. Select Radio and select External Antenna to configure the antenna gain value. This option is availableonly if the selected AP supports external antennas.

6. Enter the antenna gain values in dBm for the 2.4 GHz and 5 GHz bands.

7. Click Save Settings.

Adding an Instant APTo add an Instant AP to Central, assign an IP address and a subscription.

After an Instant AP is connected to the network and if the Auto Join Mode feature is enabled, the Instant APinherits the configuration from the virtual controller and is listed in the Access Points tab.

Deleting an Instant AP from the NetworkTo delete an Instant AP from the network:

1. From the app selector, click Monitoring & Reports.The Network Overview page opens.

2. Click APs and select List from the APs drop-down. The list of APs in the network is displayed.

3. Click the AP to delete. The AP details page opens.

4. From the Actions drop-down, click Delete AP.

The Delete AP button is available only if the AP is down.

Configuring System Parameters for Instant APsTo configure system parameters:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. Click System. The System details for the selected group or the device are displayed.

4. Click General and configure the following parameters:

Page 131: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Data Pane Item Description

Virtual Controller To configure the virtual controller name and IP address, click edit icon and update thename and IP address. The IP address serves as a static IP address for the multi-APnetwork. When configured, this IP address is automatically provisioned on a shadowinterface on the Instant AP that takes the role of a virtual controller. The AP sends threeARP messages with the static IP address and its MAC address to update the networkARP cache.

n Name—Name of the virtual controller.n IP address—IPv4 address configured for the virtual controller. The IPv4 addressuses the 0.0.0.0 notation.n IPv6 address—IPv6 address configured for the virtual controller. You canconfigure IPv6 address for the virtual controller only if the Allow IPv6 Managementfeature is enabled.IPv6 is the latest version of IP that is suitable for large-scale IP networks. IPv6supports a 128-bit address to allow 2128, or approximately 3.4×1038 addresseswhile IPv4 supports only 232 addresses.The IP address of the IPv6 host is always represented as eight groups of fourhexadecimal digits separated by colons. For example2001:0db8:0a0b:12f0:0000:0000:0000:0001. However, the IPv6 notation can beabbreviated to compress one or more groups of zeroes or to compress leading ortrailing zeroes; for example 2001:db8:a0b:12f0::0:0:1.

Set Country code forgroup

To configure the country code for the Instant AP at the group level, select the countrycode from the Set Country code for group drop-down list. By default, the field isempty. This indicates that a Instant AP with any country code can be a part of the groupto which it is added.Once a country code is selected from the drop-down , the value in the Set Countrycode for group drop-down can not be reverted to default value thereafter.Even if the country code for an Instant AP is set at the device level, latest changes doneto the country code at the group level will be pushed to Instant AP.

Timezone To configure a timezone, select a timezone from the Timezone drop-down list.If the selected timezone supports DST, the UI displays the "The selected countryobserves Daylight Savings Time" message.

Preferred Band Assign a preferred band by selecting an appropriate option from the Preferred Banddrop-down list.NOTE: Reboot the Instant AP after modifying the radio profile for changes to take effect.

NTP Server To facilitate communication between various elements in a network, timesynchronization between the elements and across the network is critical. Timesynchronization allows you to:

n Trace and track security gaps, network usage, and troubleshoot network issues.n Validate certificates.n Map an event on one network element to a corresponding event on another.n Maintain accurate time for billing services and similar.

NTP helps obtain the precise time from a server and regulate the local time in eachnetwork element. Connectivity to a valid NTP server is required to synchronize theInstant AP clock to set the correct time. If NTP server is not configured in the Instant APnetwork, an Instant AP reboot may lead to variation in time data.By default, the Instant AP tries to connect to pool.ntp.org to synchronize time. The NTPserver can also be provisioned through the DHCP option 42. If the NTP server isconfigured, it takes precedence over the DHCP option 42 provisioned value. The NTPserver provisioned through the DHCP option 42 is used if no server is configured. Thedefault server pool.ntp.org is used if no NTP server is configured or provisionedthrough DHCP option 42.To configure an NTP server, enter the IP address or the URL of the NTP server andreboot the AP to apply the configuration changes.

Table 46: System parameters

Aruba Central | User Guide Wireless Management | 131

Page 132: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

132 | Wireless Management Aruba Central | User Guide

Data Pane Item Description

Virtual ControllerNetmask

Virtual ControllerGateway

Virtual ControllerVLAN

NOTE: The IP configured for the virtual controller can be in the same subnet as InstantAP or can be in a different subnet. Ensure that you configure the virtual controller VLAN,gateway, and subnet mask details only if the virtual controller IP is in a different subnet.NOTE: Ensure that virtual controller VLAN is not the same as native VLAN of the InstantAP.

Dynamic CPUUtilization

Instant APs perform various functions such as wired and wireless client connectivity andtraffic flows, wireless security, network management, and location tracking. If an AP isoverloaded, prioritize the platform resources across different functions. Typically, theInstant APs manage resources automatically in real time. However, under specialcircumstances, if dynamic resource management needs to be enforced or disabledaltogether, the dynamic CPU management feature settings can be modified.To configure dynamic CPU management, select any of the following options fromDynamic CPU Utilization.

n Automatic—When selected, the CPU management is enabled or disabledautomatically during run-time. This decision is based on real time load calculationstaking into account all different functions that the CPU needs to perform. This is thedefault and recommended option.n Always Disabled in all APs— When selected, this setting disables CPUmanagement on all APs, typically for small networks. This setting protects userexperience.n Always Enabled in all APs—When selected, the client and networkmanagement functions are protected. This setting helps in large networks with highclient density.

Auto Join Mode When enabled, Instant APs can automatically discover the virtual controller and join thenetwork. The Auto Join Mode feature is enabled by default.

APs allowed for Auto-Join Mode

When Auto Join is enabled, the Instant APs are automatically discovered and are allowedto join the cluster.When the Auto Join feature is disabled on the Instant AP, the list of allowed APs onCentral may not be synchronized or up-to-date. In such cases, you can manually add alist of APs that can join the Instant AP cluster in the Central UI.To manually add the list of allowed AP devices, complete the following steps:

1. From the group selector, select the desired AP.2. Under System, click the Manage APs link next to APs allowed for Auto-JoinMode field.3. Add the MAC address of AP that you want to allow.4. Click Save Settings.

Allow IPv6 Man-agement

Enables IPv6 address configuration for the virtual controller.NOTE: You can configure an IPv6 address for a virtual controller IP only when AllowIPv6 Management feature is enabled.

Uplink switch nativeVLAN

Allows you to specify a VLAN ID, to prevent the AP from sending tagged frames forclients connected on the SSID that uses the same VLAN as the native VLAN of the switch.By default, the AP considers the native VLAN of the upstream switch, to which it isconnected, as the VLAN ID 1.

Terminal Access When enabled, the users can access the Instant AP CLI through SSH.

Console Access When enabled, the users can access Instant AP through the console port.

Table 46: System parameters

Page 133: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Data Pane Item Description

Telnet Server When enabled, the users can start a Telnet session with the Instant AP CLI.

LED Display Enables or disables the LED display for all Instant APs in a cluster.NOTE: The LED display is always enabled during the Instant AP reboot.

Extended SSID Extended SSID is enabled by default in the factory default settings of Instant APs. Thisdisables mesh in the factory default settings.

Deny Inter-userBridging

If you have security and traffic management policies defined in upstream devices, youcan disable bridging traffic between two clients connected to the same AP on the sameVLAN. When inter-user bridging is denied, the clients can connect to the Internet butcannot communicate with each other, and the bridging traffic between the clients is sentto the upstream device to make the forwarding decision.To disable inter-user bridging, move the slider to the right.

Deny Local Routing If you have security and traffic management policies defined in upstream devices, youcan disable routing traffic between two clients connected to the same Instant AP ondifferent VLANs. When local routing is disabled, the clients can connect to the Internetbut cannot communicate with each other, and the routing traffic between the clients issent to the upstream device to make the forwarding decision.To disable local routing, move the slider to the right.

DynamicRADIUS Proxy

If your network has separate RADIUS authentication servers (local and centralizedservers) for user authentication, you may want to enable Dynamic RADIUS proxy toroute traffic to a specific RADIUS server. When Dynamic RADIUS proxy is enabled, theIP address of the virtual controller is used for communication with external RADIUSservers.To enable Dynamic RADIUS Proxy, you must configure an IP address for the VirtualController and set it as a NAS client in the RADIUS server profile.

Dynamic TACACSProxy

If you want to route traffic to different TACACS servers, enable DynamicTACACS Proxy. When enabled, the Instant AP cluster uses the IP address of the VirtualController for communication with external TACACS servers.If an IP address is not configured for the Virtual Controller, the IP address of the bridgeinterface is used for communication between the Instant AP and TACACS servers.However, If a VPN tunnel exists between the Instant AP and TACACS server, the IPaddress of the tunnel interface is used.

Cluster Security Enables or disables the cluster security feature. When enabled, the the control planecommunication between the Instant AP cluster nodes is secured.For secure communication between the cluster nodes, the Internet connection must beavailable, or at least a local NTP server must be configured.NOTE: After enabling or disabling cluster security, ensure that the configuration issynchronized across all devices in the cluster, and then reboot the cluster.

Mobility Access SwitchIntegration

Enables LLDP protocol for Mobility Access Switch integration. With this protocol, InstantAPs can instruct the Switch to turn off ports where rogue access points are connected,as well as take actions such as increasing PoE priority and automatically configuringVLANs on ports where Instant APs are connected.

URL Visibility Enables URL data logging for client HTTP and HTTPS sessions and allows Instant APs toextract URL information and periodically log them on ALE for DPI and applicationanalytics.

Table 46: System parameters

Aruba Central | User Guide Wireless Management | 133

Page 134: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

134 | Wireless Management Aruba Central | User Guide

Viewing Dual 5GHz Band Details for Instant APsCentral provides an option to retrieve the radio numbers of Instant AP through the APIs. It also provides anoption to filter AP details using radio numbers in the Monitoring & Reports dashboard.

For Instant APs that do not support dual 5GHz bands, Central automatically assigns radio 1 and radio 0 to 2.4GHzand 5GHz bands respectively.

To get the radio numbers through API:

1. Go to Maintenance > API Gateway.

2. Click Authorized Apps & Tokens tab and generate a token key.

3. Download and copy the generated token.

4. Click the link displayed in the APIs tab of the API Gateway. The Central Network Management APIspage opens.

5. On the left navigation pane, select Monitoring from the URL drop-down list.

6. Paste the token key in the Token field and press enter.

7. Click API Reference > AP. The following are the APIs related to access points that allow to retrieve andfilter data for a specific radio number:

API Description

[GET]/monitoring/v1/aps/{serial}/neighbouring_clients

Allows you to filter data of neighbouring clients for a specific radionumber in a given time period.When there is no radio number entered in the radio_number field, theAPI filters the data of neighbouring clients for both radio 0 and radio 1. Itis mandatory to provide the serial number of the AP to get the data ofneighbouring clients for a specific radio number.

[GET]/monitoring/v1/aps/rf_summary

Retrieves information on RF summary such as channel utilization andnoise floor in positive, errors, drops for a given time period.This API can also be used to filter RF health statistics for a specific radionumber in a given time period.When there is no radio number entered in the radio_number field, theAPI filters the RF health statistics for both radio 0 and radio 1. It ismandatory to provide the serial number of the AP to get the RF healthstatistics for a specific radio number.

[GET]/monitoring/v1/aps/bandwith_usage

This API can also be used to filter out bandwidth usage data for a specificradio number in a given time period.When there is no radio number entered in the radio_number field, theAPI filters the bandwidth usage for both radio 0 and radio 1. It ismandatory to provide the serial number of the AP to get the bandwidthusage for a specific radio number.

Table 47: APIs to Get Radio Number in APs

8. On the left navigation pane, click API Reference > Client.9. The following APIs allows to retrieve the radio number for the total connected clients:

Page 135: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

API Description

[GET]/monitoring/v1/clients/count This API is used to filter out the data for connected clients for a specificradio number of AP in a given time period.When there is no radio number entered in the radio_number field, the APIfilters the clients count for both radio 0 and radio 1. It is mandatory toprovide the serial number of the AP to get the total count of clients for aspecific radio number.

Table 48: APIs to Get Radio Number in Connected Clients

For further details on API help, refer to https://app1-apigw.central.arubanetworks.com/swagger/central.

Enabling 802.1X Authentication on Uplink Ports of an Instant APIf your network requires all wired devices to authenticate using PEAP or TLS protocol, you must enable 802.1Xauthentication type on uplink ports of an Instant AP, so that the Instant APs are granted access only aftercompleting the authentication as a valid client.

To enable 802.1X authentication on uplink ports using PEAP or TLS protocol, perform the following steps:

1. From the app selector, click Wireless Management.

2. From the filter bar, select an Instant AP.

3. Go to System > Uplink > AP1X.

n To set PEAP based authentication, in the AP1X Type drop-down list, select PEAP.

If you select PEAP protocol, ensure that the PEAP user is configured on the uplink port (Wireless Management >Edit Access Point > Uplink).

n To set TLS based authentication:

a. In the AP1X Type drop-down list, select TLS.

b. In the Certificate Type drop-down list, select User.

4. If you want to validate the server credentials using server certificate, select the Validate Server checkbox. Ensure that the server certificates for validating server credentials are available in the Instant APdatabase.

5. Click Save Settings.

Configuring NetworksThis section describes the following procedures:

n Configuring a WLAN SSID Profile on page 135

n Configuring Captive Portal Profiles for Guest Network on page 143

n Configuring Wired Port Profiles for an Instant AP on page 149

n Editing a Network Profile on page 151

n Deleting a Network Profile on page 152

Configuring a WLAN SSID Profile

You can configure up to six wireless networks. By enabling Extended SSID (Configuration >Wireless >System > General), you can create up to 16 networks.

Aruba Central | User Guide Wireless Management | 135

Page 136: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

136 | Wireless Management Aruba Central | User Guide

Configuring WLAN SettingsTo configure WLAN settings, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Networks. The Networks page opens.

4. To create a new SSID profile, click the + icon. The Create a New Network pane opens.

5. Under Basic Settings, configure the following parameters:

a. Enter a name that is used to identify the network in the Name (SSID) box.

b. Enter the name for ESSID in the ESSID box. If the ESSID value defined is not the same as the profilename, the SSID can be searched based on the ESSID value and not by its profile name.

c. From the Type list, select Wireless.

d. Based on the type of network profile, select any of the following options under Primary Usage:

n Employee—An Employee network is a classic Wi-Fi network. This network type is used by theemployees in an organization and it supports passphrase-based or 802.1X-based authenticationmethods. Employees can access the protected data of an enterprise through the employee networkafter successful authentication. The employee network is selected by default during a network profileconfiguration.

n Guest—The Guest wireless network is created for guests, visitors, contractors, and any non-employee users who use the enterprise Wi-Fi network. The VC assigns the IP address for the guestclients. Captive portal or passphrase-based authentication methods can be set for this wirelessnetwork. Typically, a guest network is an unencrypted network. However, you can specify theencryption settings when configuring a guest network.

n Voice—The Voice network type allows you to configure a network profile for devices that provideonly voice services such as handsets or applications that require voice traffic prioritization.

When a client is associated to the voice network, all data traffic is marked and placed into the high priorityqueue in QoS.

6. Configure the following SSID parameters as required.

Parameter Description

Broadcast/Multicast

BroadcastFiltering

Select any of the following values:n All—The Instant AP drops all broadcast and multicast frames except DHCP and ARP,IGMP group queries, and IPv6 neighbor discovery protocols.n ARP—The Instant AP drops broadcast and multicast frames except DHCP and ARP,IGMP group queries, and IPv6 neighbor discovery protocols. Additionally, it converts ARPrequests to unicast and sends frames directly to the associated clients.n Disabled—All broadcast and multicast traffic is forwarded to the wireless interfaces.

DTIM Interval The DTIM Interval indicates the DTIM period in beacons, which can be configured for everyWLAN SSID profile. The DTIM interval determines how often the Instant AP delivers thebuffered broadcast and multicast frames to the associated clients in the power save mode.The default value is 1, which means the client checks for buffered data on the Instant AP atevery beacon. You can also configure a higher DTIM value for power saving.

Table 49: WLAN Configuration Parameters

Page 137: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Parameter Description

MulticastTransmissionOptimization

Select Enabled if you want the Instant AP to select the optimal rate for sending broadcast andmulticast frames based on the lowest of unicast rates across all associated clients. When thisoption is enabled, multicast traffic can be sent up to a rate of 24 Mbps. The default rate forsending frames for 2.4 GHz is 1 Mbps and that for 5 GHz is 6 Mbps. This option is disabled bydefault.

DynamicMulticastOptimization

Select Enabled to allow Instant AP to convert multicast streams into unicast streams over thewireless link. Enabling DMO enhances the quality and reliability of streaming video, whilepreserving the bandwidth available to the non-video clients.NOTE: When you enable DMO on multicast SSID profiles, ensure that the DMO feature isenabled on all SSIDs configured in the same VLAN.

DynamicMulticastOptimizationChannelUtilizationThreshold

Specify a value to set a threshold for DMO channel utilization. With DMO, the Instant APconverts multicast streams into unicast streams as long as the channel utilization does notexceed this threshold. The default value is 90% and the maximum threshold value is 100%.When the threshold is reached or exceeds the maximum value, the Instant AP sends multicasttraffic over the wireless link.

Transmit Rates

2.4 GHz If the 2.4 GHz band is configured on the Instant AP, specify the minimum and maximumtransmission rates. The default value for minimum transmission rate is 1 Mbps and maximumtransmission rate is 54 Mbps.

5 GHz If the 5 GHz band is configured on the Instant AP, specify the minimum and maximumtransmission rates. The default value for minimum transmission rate is 6 Mbps and maximumtransmission rate is 54 Mbps.

Zone

Zone Specify the zone for the SSID. If a zone is configured in the SSID, only the Instant AP in thatzone broadcast this SSID. If there are no Instant APs in the zone, SSID is broadcast.If the Instant AP cluster has devices running Aruba Instant firmware versions 6.5.4.7 or later,and 8.3.0.0 or later, you can configure multiple AP zones by adding zone names as commaseparated values.

Bandwidth Limits

Airtime Select this to specify an aggregate amount of airtime that all clients in this network can use forsending and receiving data. Specify the airtime percentage.

Each Radio Select this to specify an aggregate amount of throughput that each radio is allowed to providefor the connected clients.

WiFi Multimedia

BackgroundWMM Share

Allocates bandwidth for background traffic such as file downloads or print jobs.

BEST EffortWMM Share

Allocates bandwidth or best effort traffic such as traffic from legacy devices or traffic fromapplications or devices that do not support QoS.

Video WMMShare

Allocates bandwidth for video traffic generated from video streaming.

Voice WMMShare

Allocates bandwidth for voice traffic generated from the incoming and outgoing voicecommunication.NOTE: In a non-WMM or hybrid environment, where some clients are not WMM-capable, you

Aruba Central | User Guide Wireless Management | 137

Page 138: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

138 | Wireless Management Aruba Central | User Guide

Parameter Description

can allocate higher values for Best Effort WMM share and Voice WMM Share to allocate ahigher bandwidth to clients transmitting best effort and voice traffic.

Miscellaneous

Content Filtering Select Enabled to route all DNS requests for the non-corporate domains to OpenDNS on thisnetwork.

Band Select a value to specify the band at which the network transmits radio signals. You can set theband to 2.4 GHz, 5 GHz, or All. The All option is selected by default.

InactivityTimeout

Specify an interval for session timeout. If a client session is inactive for the specified duration,the session expires and the users are required to log in again. You can specify a value withinthe range of 60–3600 seconds. The default value is 1000 seconds.

Deauth InactiveClients

Select Enabled to allow the Instant AP to send a deauthentication frame to the inactive clientand clear client entry.

Hide SSID Select this check box if you do not want the SSID to be visible to users.

Disable Network Select this check box if you want to disable the SSID. When selected, the SSID will be disabled,but will not be removed from the network. By default, all SSIDs are enabled.

Can Be UsedWithout Uplink

Select this check box if you do not want the SSID profile to use uplink.

Max ClientsThreshold

Specify the maximum number of clients that can be configured for each BSSID on a WLAN.You can specify a value within the range of 0– 255. The default value is 64.

Out of service(OOS)

Enable or disable the SSID based on the following OOS states of the Instant AP:n VPN downn Uplink downn Internet downn Primary uplink down

The network will be out of service when selected event occurs and the SSID is enabled ordisabled as per the configuration settings applied. For example, if you select the VPN downoption from the drop-down list and set the status to enabled, the SSID is enabled when theVPN connection is down and is disabled when the VPN connection is restored.

OOS time(global)

Configure a hold time interval in seconds within a range of 30–300 seconds, after which theout-of-service operation is triggered. For example, if the VPN is down and the configured holdtime is 45 seconds, the effect of this out-of-service state impacts the SSID availability after 45seconds.

Local ProbeRequestThreshold

Specify a threshold value to limit the number of incoming probe requests. When a client sendsa broadcast probe request frame to search for all available SSIDs, this option controls systemresponse for this network profile and ignores probe requests if required. You can specify aRSSI value within range of 0–100 dB.

SSID Encoding To encode the SSID, select UTF-8.

Deny Inter UserBridging

Disables bridging traffic between two clients connected to the same SSID on the same VLAN.When this option is enabled, the clients can connect to the Internet, but cannot communicatewith each other, and the bridging traffic between the clients is sent to the upstream device tomake the forwarding decision.

Time Range Profiles

Time RangeProfiles

Click + New Time Range Profile to create a new time range profile.

Page 139: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

7. Click Next to configure VLAN settings.

Configuring VLAN SettingsTo configure VLAN settings for an SSID, complete the following steps:

1. In the VLAN tab, select any of the following options for Client IP Assignment:

n Virtual Controller Assigned—When selected, the client obtains the IP address from the VC.

n Network Assigned—When selected, the client obtains the IP address from the network.

2. Based on the type of client IP assignment mode selected, you can configure the VLAN assignment forclients as described in the following table:

Parameter Description

Virtual Controller Assigned On selecting this option, the client obtains the IP address from the VC. The VCcreates a private subnet and VLAN on the Instant AP for the wireless clients.The network address translation for all client traffic that goes out of thisinterface is carried out at the source. This setup eliminates the need forcomplex VLAN and IP address management for a multi-site wireless network.For more information on DHCP scopes and server configuration, seeConfiguring DHCP and Client IP Assignment Modes on page 188.

Network Assigned If this option is selected, , specify any of the following options:n Default—Assigns IP address to the client in the same subnet as theInstant APs. By default, the client VLAN is assigned to the native VLAN onthe wired network.n Static —Allows you to specify a single VLAN, a comma separated list ofVLANS, or a range of VLANs for all clients on this network. If a largenumber of clients need to be in the same subnet, you can select thisoption to configure VLAN pooling. VLAN pooling allows randomassignment of VLANs from a pool of VLANs to each client connecting tothe SSID.n Dynamic—Assigns the VLANs dynamically from a DHCP server. Youcan also create a new VLAN assignment rules.

Table 50: VLAN Assignment

3. Click Next to configure security settings.

Configuring Security SettingsTo configure security settings for an employee or voice network, complete the following steps:

1. In Security, specify any of the following for Security Level:n Enterprise—On selecting Enterprise security level, the authentication options applicable to the

enterprise network are displayed.

n Personal—On selecting Personal security level, the authentication options applicable to thepersonalized network are displayed.

n Open—On selecting Open security level, the authentication options applicable to an open networkare displayed:

The default security setting for a network profile is Personal.

2. Based on the security level specified, specify the following parameters:

Aruba Central | User Guide Wireless Management | 139

Page 140: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

140 | Wireless Management Aruba Central | User Guide

Data pane item Description

Encryption > KeyManagement

For Enterprise security level, select any of the following options from Key Management:n WPA-2 Enterprisen Both (WPA-2 & WPA)n WPA Enterprisen Dynamic WEP with 802.1X—If you do not want to use a session key from the RADIUSServer to derive pairwise unicast keys, set Session Key for LEAP to Enabled. This isrequired for old printers that use dynamic WEP through LEAP authentication. The SessionKey for LEAP feature is Disabled by default.

NOTE: When WPA-2 Enterprise and Both (WPA2-WPA) encryption types are selected and if802.1x authentication method is configured, OKC is enabled by default. If OKC is enabled, acached PMK is used when the client roams to a new AP. This allows faster roaming of clientswithout the need for a complete 802.1x authentication. OKC roaming can be configured onlyfor the Enterprise security level.

For Personal security level, select an encryption key from Key Management. For WPA-2Personal, WPA Personal, and Both (WPA-2&WPA) keys, specify the following parameters:

n Passphrase Format: Select a passphrase format. The options are available are 8-63alphanumeric characters and 64 hexadecimal characters.n Enter a passphrase in Passphrase and reconfirm.

For Static WEP, specify the following parameters:n Select an appropriate value for WEP Key Size from the WEP key size. You can specify64-bit or 128-bit.n Select an appropriate value for Tx key from Tx Key.n Enter an appropriate WEP Key and reconfirm.

Authentication Configure the following parameters:n MAC Authentication—To enable MAC address based authentication for Personal andOpen security levels, set MAC Authentication to Enabled.n Termination—Terminates the EAP portion of 802.1X authentication on the Instant APinstead of the RADIUS Server. When enabled, the Instant AP acts as an authenticationserver and terminates the outer layers of the EAP and relays only the innermost layer tothe external RADIUS Server. If you are using LDAP for authentication, ensure that APtermination is configured to support EAP.n Primary Server—Sets a primary authentication server.

l To use an internal server, select Internal server and add the clients that arerequired to authenticate with the internal RADIUS Server. Click Users to add the users.l To add a new server, click +. For information on configuring external servers, seeConfiguring External Servers for Authentication on page 168.

n Secondary Server—To add another server for authentication, configure anotherauthentication server.n Authentication Survivability—If an external server is configured for authentication,you can enable authentication survivability. Specify a value in hours for Cache Timeoutto set the duration after which the authenticated credentials in the cache expires. Whenthe cache expires, the clients are required to authenticate again. You can specify a valuewithin range of 1 to 99 hours and the default value is 24 hours. By default, authenticationsurvivability is disabled.n Load Balancing—Set this to Enabled if you are using two RADIUS authenticationservers, to balance the load across these servers. For more information on the dynamicload balancing mechanism, see Dynamic Load Balancing between Authentication Serverson page 167.

Fast Roaming Enable the following fast roaming features as per your requirement:n 802.11r—To enable 802.11r roaming, select 802.11r. Selecting this enables fast BSStransition. The fast BSS transition mechanism minimizes the delay when a clienttransitions from one BSS to another within the same cluster.n 802.11k—To enable 802.11k roaming on the, select 802.11k. The 802.11k protocolenables Instant APs and clients to dynamically measure the available radio resources.When 802.11k is enabled, Instant APs and clients send neighbor reports, beacon reports,

Table 51: WLAN security settings

Page 141: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Data pane item Description

and link measurement reports to each other.n 802.11v—To enable 802.11v based BSS transition, select 802.11v. 802.11v standarddefines mechanisms for wireless network management enhancements and BSStransition management. It allows the client devices to exchange information about thenetwork topology and RF environment. The BSS transition management mechanismenables an AP to request a voice client to transition to a specific AP, or suggest a set ofpreferred APs to a voice client, due to network load balancing or BSS termination. It alsohelps the voice client identify the best AP to transition to as they roam.

Accounting To enable accounting, select Enabled from Accounting. On setting this option to Enabled,APs post accounting information to the RADIUS server at the specified Accounting Interval.

Advanced > MACAuthenticationfor EnterpriseNetworks

To enable MAC address based authentication for Personal and Open security levels, setMAC Authentication to Enabled. For Enterprise security level, the following options areavailable:

n Perform MAC Authentication Before 802.1X — Select this to use 802.1Xauthentication only when the MAC authentication is successful.n MAC Authentication Fail-Thru — On selecting this, the 802.1X authentication isattempted when the MAC authentication fails.

If MAC authentication is enabled, configure the following parameters:n Delimiter Character—Specify a character (for example, colon or dash) as a delimiterfor the MAC address string. When configured, the Instant AP uses the delimiter in theMAC authentication request. For example, if you specify the colon as a delimiter, MACaddresses in the xx:xx:xx:xx:xx:xx format are used. If the delimiter is not specified, theMAC address in the xxxxxxxxxxxx format is used. This option is available only when MACauthentication is enabled.n Uppercase Support—Set to Enabled to allow the Instant AP to use uppercase lettersin MAC address string for MAC authentication. This option is available only if MACauthentication is enabled.

Advanced >Reauth Interval

Specify a value for Reauth Interval. When set to a value greater than zero, APs periodicallyre-authenticate all associated and authenticated clients.If the re-authentication interval is configured:

n On an SSID performing L2 authentication (MAC or 802.1X authentication): When re-authentication fails, the clients are disconnected. If the SSID is performing only MACauthentication and has a pre-authentication role assigned to the client, the client will get apost-authentication role only after a successful re-authentication. If re-authenticationfails, the client retains the pre-authentication role.n On an SSID performing both L2 and L3 authentication (MAC with captive portalauthentication): When re-authentication succeeds, the client retains the role that isalready assigned. If re-authentication fails, a pre-authentication role is assigned to theclient.n On an SSID performing only L3 authentication (captive portal authentication): When re-authentication succeeds, a pre-authentication role is assigned to the client that is in apost-authentication role. Due to this, the clients are required to go through captive portalto regain access.

Aruba Central | User Guide Wireless Management | 141

Page 142: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

142 | Wireless Management Aruba Central | User Guide

Data pane item Description

Advanced >Blacklisting

To enable blacklisting of the clients with a specific number of authentication failures, selectEnabled from Blacklisting and specify a value for Max Authentication Failures. The userswho fail to authenticate the number of times specified in Max Authentication Failures fieldare dynamically blacklisted.

Advanced> Enforce DHCP

Enforces WLAN SSID on Instant AP clients. When DHCP is enforced:n A layer-2 user entry is created when a client associates with an Instant AP.n The client DHCP state and IP address are tracked.n When the client obtains an IP address from DHCP, the DHCP state changes tocomplete.n If the DHCP state is complete, a layer-3 user entry is created.n When a client roams between the Instant APs, the DHCP state and the client IP addresswill be synchronized with the new Instant AP.

Advanced > UseIP for CallingStation

Enable this option to configure client IP address as calling station ID. When enabled thefollowing options are displayed:

n Called Station ID Type—Select any of the following options for configuring calledstation ID:

l Access Point Group—Uses the VC ID as the called station ID.l Access Point Name—Uses the host name of the Instant AP as the called station ID.l VLAN ID—Uses the VLAN ID of as the called station ID.l IP Address—Uses the IP address of the Instant AP as the called station ID.l MAC address—Uses the MAC address of the Instant AP as the called station ID.

n Called Station Include SSID—Appends the SSID name to the called station ID.n Called Station ID Delimiter—Sets delimiter at the end of the called station ID.

3. Click Next to configure access rules.

Configuring Access RulesYou can configure up to 64 access rules for a wireless network profile. To configure access rules for anemployee or voice network, complete the following steps:

1. In Access Rules, select any of the following types of access control:

n Unrestricted—Select this to set unrestricted access to the network.

n Network-based—Select Network-based to set common rules for all users in a network. The Allowany to all destinations access rule is enabled by default. This rule allows traffic to all destinations. Todefine an access rule:

a. Click (+) icon.

b. Select appropriate options in the New Rule pane.

c. Click Save.

n Role based—Select Role based to enable access based on user roles. For role-based access control:

l Create a user role if required.

l Create access rules for a specific user role.

l Create a role assignment rule.

2. Click Save Settings.

Page 143: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Configuring Captive Portal Profiles for Guest NetworkCentral supports the captive portal authentication method in which a webpage is presented to the guest users,when they try to access the Internet in hotels, conference centers, or Wi-Fi hotspots. The webpage alsoprompts the guest users to authenticate or accept the usage policy and terms. Captive portals are used at Wi-Fihotspots and can be used to control wired access as well.

The Central captive portal solution consists of the following:

n The captive portal web login page hosted by an internal or external server.

n The RADIUS authentication or user authentication against internal database of the AP.

n The SSID broadcast by the Instant AP.

With Central, administrators can create a wired or WLAN guest network based on captive portal authenticationfor guests, visitors, contractors, and any non-employee users who can use the enterprise Wi-Fi network.Administrators can also create guest accounts and customize the captive portal page with organization-specificlogo, terms, and usage policy. With captive portal authentication and guest profiles, the devices associatingwith the guest SSID are assigned an initial role and are assigned IP addresses. When a guest user tries to accessa URL through HTTP or HTTPS, the captive portal webpage prompts the user to authenticate with a user nameand password.

Splash Page ProfilesCentral supports the following types of splash page profiles:

n Internal Captive portal— Select this splash page to use an internal server for hosting the captive portalservice. Internal captive portal supports the following types of authentication:

l Internal Authenticated— When Internal Authenticated is enabled, a guest user who is pre-provisioned in the user database has to provide the authentication details.

l Internal Acknowledged—When Internal Acknowledged is enabled, a guest user has to accept theterms and conditions to access the Internet.

n External Captive portal—Select this splash page to use an external portal on the cloud or on a serveroutside the enterprise network for authentication.

n Cloud Guest—Select this splash page to use the cloud guest profile configured through the GuestManagement tab.

Selecting None disables the captive portal authentication.

For information on how to creating splash page profiles, see the following sections:

n Configuring a WLAN SSID for Guest Access on page 143

n Configuring Internal Captive Portal Splash Page Profile on page 144

n Configuring External Captive Portal Splash Page Profile on page 146

n Associating a Cloud Guest Splash Page Profile to a Guest SSID on page 148

n Disabling Captive Portal Authentication on page 149

Configuring a WLAN SSID for Guest AccessTo create an SSID for guest access, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Networks. The Networks page opens.

4. To create a new SSID profile, click the + icon. The Create a New Network pane opens.

Aruba Central | User Guide Wireless Management | 143

Page 144: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

144 | Wireless Management Aruba Central | User Guide

5. Under Basic Settings, configure the following parameters:

a. From the Type list, select Wireless.

b. Enter a name that is used to identify the network in the Name (SSID) box.

c. Select the Primary Usage as Guest.

6. If configuring a wireless guest profile, set the required WLAN configuration parameters described in Table49.

7. Click Next to configure VLAN settings. The VLAN details are displayed.

8. Select any of the following options for Client IP Assignment:

n Virtual Controller Assigned—Allows the VC to assign IP address to the clients. The VC creates a privatesubnet and VLAN on the Instant AP for the wireless clients. The NAT for all client traffic that goes out ofthis interface is carried out at the source. This setup eliminates the need for complex VLAN and IPaddress management for a multi-site wireless network. For more information on DHCP scopes andserver configuration, see Configuring DHCP and Client IP Assignment Modes on page 188.

n Network Assigned—If the Network Assigned is selected, specify any of the following options:

l Default— On selecting this option, the client obtains the IP address in the same subnet as theInstant APs. By default, the client VLAN is assigned to the native VLAN on the wired network.

l Static— On selecting this option, you need to specify a single VLAN, a comma separated list ofVLANS, or a range of VLANs for all clients on this network. Select this option for configuring VLANpooling.

Configuring Internal Captive Portal Splash Page ProfileTo configure internal captive portal profile, complete the following steps:

1. Open the guest SSID to edit and configure the following parameters in the Networks > Security page.

Page 145: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Parameter Description

Splash Page Type Select any of the following:n Internal - Authenticated—When Internal Authenticated is enabled, theguest users are required to authenticate in the captive portal page to access theInternet. The guest users who are required to authenticate must already beadded to the user database.n Internal - Acknowledged— When Internal Acknowledged is enabled, theguest users are required to accept the terms and conditions to access theInternet.

Splash Page Properties Under Splash Page Properties, use the editor to specify text and colors for theinitial page that is displayed to the users connecting to the network. The initial pageasks for user credentials or email, depending on the splash page type (Internal -Authenticated or Internal -Acknowledged) for which you are customizing the splashpage design. Perform the following steps to customize the splash page design.

n Top Banner Title—Enter a title for the banner. To preview the page with thenew banner title, click Preview Splash Page.n Header fill color—Specify a background color for the header.n Welcome Text—To change the welcome text, click the first square box in thesplash page, enter the required text in the Welcome Textbox, and click OK.Ensure that the welcome text does not exceed 127 characters.n Policy Text—To change the policy text, click the second square in the splashpage, enter the required text in the Policy Text box, and click OK. Ensure that thepolicy text does not exceed 255 characters.n Page Fill Color—To change the color of the splash page, click the Splash pagerectangle and select the required color from the color palette.n Redirect URL—To redirect users to another URL, specify a URL in RedirectURL.n Logo Image—To upload a custom logo, click Upload, browse the image file,and click upload image. Ensure that the image file size does not exceed 16 KB.To delete an image, click Delete.n To preview the captive portal page, click Preview splash page.n Captive-portal proxy server IP and Port—If you want to configure a captiveportal proxy server or global proxy server to match your browser configuration,enter the IP address and port number in the Captive-portal proxy server IP andCaptive Portal Proxy Server Port fields.

Encryption Select Enabled and configure the following encryption parameters:n Key Management—Specify an encryption and authentication keyn Passphrase format—Specify a passphrase format.n Passphrase—Enter a passphrase and retype to confirm.

Authentication Configure the following parameters:n MAC Authentication—To enable MAC address based authentication forPersonal and Open security levels, set MAC Authentication to Enabled.n Primary Server—Sets a primary authentication server.

l To use an internal server, select Internal server and add the clients thatare required to authenticate with the internal RADIUS Server. Click Users toadd the users.l To add a new server, click +. For information on configuring externalservers, see Configuring External Servers for Authentication on page 168.

n Secondary Server—To add another server for authentication, configureanother authentication server.n Load Balancing—Set this to Enabled if you are using two RADIUSauthentication servers, to balance the load across these servers. For moreinformation on the dynamic load balancing mechanism, see Configuring DHCPand Client IP Assignment Modes on page 188.

Reauth Interval Specify a value for Reauth Interval. When set to a value greater than zero, APsperiodically re-authenticate all associated and authenticated clients.

Table 52: Internal Captive Portal Configuration Parameters

Aruba Central | User Guide Wireless Management | 145

Page 146: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

146 | Wireless Management Aruba Central | User Guide

Parameter Description

Accounting Select an accounting mode for posting accounting information at the specifiedAccounting interval. When the accounting mode is set to Authentication, theaccounting starts only after client authentication is successful and stops when theclient logs out of the network. If the accounting mode is set to Association, theaccounting starts when the client associates to the network successfully and stopswhen the client disconnects. This is applicable for WLAN SSIDs only.

Blacklisting If you are configuring a wireless network profile, select Enabled to enableblacklisting of the clients with a specific number of authentication failures. This isapplicable for WLAN SSIDs only.

Disable If Uplink Type Is To exclude uplink, select an uplink type.

Table 52: Internal Captive Portal Configuration Parameters

2. Click Save Settings.

Configuring External Captive Portal Splash Page ProfileYou can configure external captive portal profiles and associate these profiles to a user role or SSID. You cancreate a set of captive portal profiles in the Security > External Captive Portal data pane and associatethese profiles with an SSID or a wired profile. You can also create a new captive portal profile under theSecurity tab of the WLAN wizard or a Wired Network pane. You can configure up to eight external captiveportal profiles.

When the captive portal profile is associated to an SSID, it is used before user authentication. If the profile isassociated to a role, it is used only after the user authentication. When a captive portal profile is applied to anSSID or wired profile, the users connecting to the SSID or wired network are assigned a role with the captiveportal rule. The guest user role allows only DNS and DHCP traffic between the client and network, and directsall HTTP or HTTPS requests to the captive portal unless explicitly permitted.

To configure an external captive portal profile, complete the following steps:

1. Open the guest SSID to edit and configure the following parameters in the Networks > Security page.

2. Select the Splash Page type as External.3. To configure a captive portal proxy server or a global proxy server to match your browser configuration,enter the IP address and port number in the Captive-portal proxy server IP and Captive Portal ProxyServer Port fields.

4. Select a captive portal profile. To add a new profile, click + and configure the following parameters:

Page 147: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Data Pane Item Description

Name Enter a name for the profile.

Type Select any one of the following types of authentication:n Radius Authentication—Select this option to enable user authentication against aRADIUS server.n Authentication Text—Select this option to specify an authentication text. Thespecified text will be returned by the external server after a successful userauthentication.

IP or Hostname Enter the IP address or the host name of the external splash page server.

URL Enter the URL of the external captive portal server.

Port Enter the port number that is used for communicating with the external captive portalserver.

Use HTTPS Select this to enforce clients to use HTTPS to communicate with the captive portal server.This option is available only if RADIUS Authentication is selected.

Captive PortalFailure

This field allows you to configure Internet access for the guest users when the externalcaptive portal server is not available. Select Deny Internet to prevent guest users fromusing the network, or Allow Internet to access the network.

Server Offload Select the check box to enable the server offload feature. The server offload featureensures that the non-browser client applications are not unnecessarily redirected to theexternal captive portal server, thereby reducing the load on the external captive portalserver.

Prevent FrameOverlay

Select this check box to prevent the overlay of frames. When enabled, the frames displayonly those pages that are in the same domain as the main page.

Automatic URLWhitelisting

On enabling this for the external captive portal authentication, the URLs that are allowed forthe unauthenticated users to access are automatically whitelisted.

Auth Text If the External Authentication splash page is selected, specify the authentication text thatis returned by the external server after successful authentication. This option is availableonly if Authentication Text is selected.

Redirect URL Specify a redirect URL if you want to redirect the users to another URL.

Table 53: External Captive Portal Profile Configuration Parameters

5. Click Save.

6. On the external captive portal splash page configuration page, specify encryption settings if required.

7. Specify the following authentication parameters:

n MAC Authentication—To enable MAC address based authentication for Personal and Open securitylevels, set MAC Authentication to Enabled.

n Primary Server—Sets a primary authentication server.

l To use an internal server, select Internal server and add the clients that are required to authenticatewith the internal RADIUS Server. Click Users to add the users.

l To add a new server, click +. For information on configuring external servers, see Configuring ExternalServers for Authentication on page 168.

n Secondary Server—To add another server for authentication, configure another authentication server.

n Load Balancing—Set this to Enabled if you are using two RADIUS authentication servers, to balancethe load across these servers.

Aruba Central | User Guide Wireless Management | 147

Page 148: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

148 | Wireless Management Aruba Central | User Guide

8. If required, under Walled Garden, create a list of domains that are blacklisted and also a white list ofwebsites that the users connected to this splash page profile can access.

9. To exclude uplink, select an uplink type.

10. If MAC authentication is enabled, you can configure the following parameters:

n Delimiter Character—Specify a character (for example, colon or dash) as a delimiter for the MACaddress string. When configured, the Instant AP uses the delimiter in the MAC authentication request.For example, if you specify the colon as a delimiter, MAC addresses in the xx:xx:xx:xx:xx:xx format areused. If the delimiter is not specified, the MAC address in the xxxxxxxxxxxx format is used. This option isavailable only when MAC authentication is enabled.

n Uppercase Support—Set to Enabled to allow the Instant AP to use uppercase letters in MAC addressstring for MAC authentication. This option is available only if MAC authentication is enabled.

11. Configure the Reauth Interval. Specify a value for Reauth Interval. When set to a value greater thanzero, Instant APs periodically re-authenticate all associated and authenticated clients.

12. If required, enable blacklisting. Set a threshold for blacklisting clients based on the number of failedauthentication attempts.

13. Click Save Settings.

Associating a Cloud Guest Splash Page Profile to a Guest SSIDTo use the Cloud Guest Splash page profile for the guest SSID, ensure that the Cloud Guest Splash Page profileis configured through the Guest Access app.

To associate a Cloud Guest splash page profile to a guest SSID, complete the following steps:

1. Open the guest SSID to edit and click Security:

a. Select Cloud Guest from the Splash Page Type list.

b. Select the splash page profile name from the Guest Captive Portal Profile list and click Next.

c. To enable encryption, set Encryption to Enabled and configure the encryption parameters.

d. To exclude uplink, select an uplink from Disable If Uplink Type Is.

e. Click Next.

2. Click Save Settings.

Configuring Access Rules for Guest UsersTo configure access rules for a guest network, complete the following steps:

1. Open the guest SSID that you want to edit.

2. Under Access, select any of the following types of access control:

n Unrestricted — Select this to set unrestricted access to the network.

n Network Based — Select Network Based to set common rules for all users in a network. By default,Allow any to all destinations access rule is enabled. This rule allows traffic to all destinations. Todefine an access rule:

a. Click (+) icon and select appropriate options for Rule Type, Service, Action,Destination, and Options fields.

b. Click Save.

n Role Based — Select Role Based to enable access based on user roles.

For role-based access control:

Page 149: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

1. Create a user role:

a. Click New in Role pane.

b. Enter a name for the new role and click OK.

2. Create access rules for a specific user role:

a. Click (+) icon and select appropriate options for RuleType, Service, Action,Destination, and Options fields.

b. Click Save.

3. Create a role assignment rule.

a. Under Role Assignment Rule, click New. The New Role Assignment Rule pane isdisplayed.

b. Select appropriate options in Attribute, Operator, String, and Role fields.

c. Click Save.

3. Click Save Settings.

Disabling Captive Portal AuthenticationTo disable captive portal authentication, perform the following steps:

1. Select the guest network profile for which you want to disable captive portal authentication.

2. Under Security, select None for Splash Page Type.

3. Click Save Settings.

Configuring Wired Port Profiles for an Instant APIf the wired clients must be supported on the Instant APs, configure wired port profiles and assign theseprofiles to the Ethernet ports of an Instant AP.

The Ethernet ports of an Instant AP allow third-party devices such as VoIP phones or printers (which supportonly wired connections) to connect to the wireless network. You can also configure an ACL for additionalsecurity on the Ethernet downlink.

To configure wired settings, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Networks. The Networks page is displayed.

4. To create a new SSID profile, click the + icon. The Create a New Network pane is displayed.

5. Enter a name that is used to identify the network in the Name (SSID) box.

6. From the Type list, select Wired and configure the following parameters:

a. Speed/Duplex—Ensure that appropriate values are selected for Speed/Duplex. Contact yournetwork administrator if you need to assign speed and duplex parameters.

b. PoE—Set PoE to Enabled to enable Power over Ethernet.

c. Admin Status—Ensure that an appropriate value is selected. The Admin Status indicates if the portis up or down.

d. Content Filtering— To ensure that all DNS requests to non-corporate domains on this wirednetwork are sent to OpenDNS, select Enabled for Content Filtering.

Aruba Central | User Guide Wireless Management | 149

Page 150: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

150 | Wireless Management Aruba Central | User Guide

e. Uplink—Select Enabled to configure uplink on this wired profile. If Uplink is set to Enabled and thisnetwork profile is assigned to a specific port, the port will be enabled as Uplink port.

f. Spanning Tree—Select the Spanning Tree check box to enable STP on the wired profile. STP ensuresthat there are no loops in any bridged Ethernet network and operates on all downlink ports, regardlessof forwarding mode. STP will not operate on the uplink port and is supported only on Instant APs withthree or more ports. By default, STP is disabled on wired profiles.

7. Click Next. The VLANs pane details are displayed.

8. On the VLANs pane, configure VLANs for the wired network:

a. Mode—Specify any of the following modes:

n Access—Select this mode to allow the port to carry a single VLAN specified as the native VLAN.

n Trunk—Select this mode to allow the port to carry packets for multiple VLANs specified as allowedVLANs.

b. Specify any of the following values for Client IP Assignment:

n Virtual Controller Assigned—Select this option to allow the Virtual Controller to assign IPaddresses to the wired clients. When the Virtual Controller assignment is used, the source IP addressis translated for all client traffic that goes through this interface. The Virtual Controller can also assigna guest VLAN to a wired client.

n Network Assigned—Select this option to allow the clients to receive an IP address from the networkto which the Virtual Controller is connected. On selecting this option, the New button to create aVLAN is displayed. Create a new VLAN if required.

c. If the Trunk mode is selected:

n Specify the Allowed VLAN, enter a list of comma separated digits or ranges 1,2,5 or 1-4, or all. TheAllowed VLAN refers to the VLANs carried by the port in Access mode.

n If the Client IP Assignment is set to Network Assigned, specify a value for Native VLAN. A VLANthat does not have a VLAN ID tag in the frames is referred to as Native VLAN. You can specify a valuewithin the range of 1-4093.

d. If the Access mode is selected:

n If the Client IP Assignment is set to Virtual Controller Assigned, proceed to step 6.

n If the Client IP Assignment is set to Network Assigned, specify a value for Access VLAN toindicate the VLAN carried by the port in the Access mode.

9. Click Next. The Security pane details are displayed.

10. On the Security pane, select the security options as per your requirement:

n MAC Authentication—To enable MAC authentication, select Enabled. The MAC authentication isdisabled by default.

n 802.1X Authentication—To enable 802.1X authentication, select Enabled.

n MAC Authentication Fail-Through—To enable authentication fail-through, select Enabled. When thisfeature is enabled, 802.1X authentication is attempted when MAC authentication fails. The MACAuthentication Fail-Through check box is displayed only when both MAC Authentication and802.1X Authentication are Enabled.

n Select any of the following options for Authentication Server 1:

l New—On selecting this option, an external RADIUS server must be configured to authenticate theusers. For information on configuring an external server, see Configuring External Servers forAuthentication on page 168.

l Internal Server— If an internal server is selected, add the clients that are required to authenticatewith the internal RADIUS server. Click the Users link to add the users.

Page 151: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

n Reauth Interval—Specify the interval at which all associated and authenticated clients must bereauthenticated.

n Load Balancing— Set this to Enabled if you are using two RADIUS authentication servers, so that theload across the two RADIUS servers is balanced. For more information on the dynamic load balancingmechanism, see Dynamic Load Balancing between Authentication Servers on page 167.

11. Click Next. The Access pane is displayed.

12. On the Access pane, configure the access rule parameters.

a. Select any of the following types of access control:

n Role-based— Allows the users to obtain access based on the roles assigned to them.

n Unrestricted— Allows the users to obtain unrestricted access on the port.

n Network-based— Allows the users to be authenticated based on access rules specified for anetwork.

b. If the Role-based access control is selected:

n Under Role, select an existing role for which you want to apply the access rules, or click New and addthe required role. To add a new access rule, click Add Rule under Access Rules For Selected Roles.

The default role with the same name as the network is automatically defined for each network. The default rolescannot be modified or deleted.

n Configure role assignment rules. To add a new role assignment rule, click New under RoleAssignment Rules. Under New Role Assignment Rule:

a. Select an attribute.

b. Specify an operator condition.

c. Select a role.

d. Click Save.

13. Click Next. The Network Assignment pane is displayed.

14. On the Network Assignment pane, assign wired profiles to Ethernet ports:

e. Select a profile from the 0/0 drop down list.

f. Select the profile from the 0/1 drop down list.

g. If the Instant AP supports Enet2, Enet3 and Enet4 ports, assign profiles to these ports by selecting aprofile from the 0/2, 0/3, and 0/4 drop-down list respectively.

15. Click Finish.

Editing a Network ProfileTo edit a network profile, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Networks. The Networks page is displayed.

4. Select the network that you want to edit.

5. Click the Edit icon under the Actions column. The network details are displayed.

6. Modify the profile.

7. Save the changes.

Aruba Central | User Guide Wireless Management | 151

Page 152: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

152 | Wireless Management Aruba Central | User Guide

Deleting a Network ProfileTo delete a network profile, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Networks. The Networks page is displayed.

4. Select the network that you want to delete.

5. Click the Delete icon under Actions column.

6. Click OK to confirm deletion.

Configuring Time-Based ServicesCentral allows you to configure the availability of a WLAN SSID at a particular time of the day. You can nowcreate a time range profile and assign it to a WLAN SSID, so that you can enable or disable access to the SSIDand thus control user access to the network during a specific time period.

Instant APs support the configuration of both absolute and periodic time range profiles. You can configure anabsolute time range profile to execute during a specific time frame, or create a periodic profile to execute atregular intervals based on the periodicity specified in the configuration.

Before You BeginBefore you configure time-based services, ensure that the NTP server connection is active.

Creating a Time Range ProfileTo create a time range profile, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click System. The System page opens.

4. Click Time-Based Services.

5. Click + under the time range profiles in the Time-Based Profiles table. The New profile window forcreating a time range profile opens. Configure the parameters that are listed in the following table:

Parameter Description

Name Specify a name for the time range profile.

Type Select the type of time range profile:n Periodic—Allows you configure a specific periodicity and recurrence pattern fora time range profile.n Absolute—Allows you to configure an absolute day and time range.

Repeat Specify the frequency for the periodic time range profile:n Daily—Enables daily recurrence.n Weekly—Allows you define a specific time range with specific start and enddays in a week.

Table 54: Time Range Profile Configuration Parameters

Page 153: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Parameter Description

Day Range Absolute Time RangeFor an absolute time range profile, this field allows you to specify the start day and endday, both in mm/dd/yyyy format. You can also use the calendar to specify the start andend days.

Periodic Time RangeFor a periodic time range profile, the following Day Range options are available:

n For daily recurrence—If the Repeat option is set to Daily, this field allows you toselect the following time ranges:

l Monday—Sunday (All Days)l Monday—Friday (Weekdays)l Saturday—Sunday (Weekend)

For example, if you set the Repeat option to Daily and then selectMonday –Friday (Weekday) for Day Range, and Start Time as 1 andEnd time as 2, the applied time range will be Monday to Friday from 1 amto 2 am; that is, on Monday at 3 am, the profile will not be applied ordisabled.

n For weekly occurrence—If the Repeat option is set to Weekly, this field allows youto select the start and end days of a week and time range.

For example, if you set Start day as Monday and End day as Friday, andStart time as 1 and End time as 2, the applied time range profile isMonday 1 am to Friday 2 am every week; that is, on Monday at 3 am, theprofile will be applied or enabled.

Start Time Select the start time for the time range profile from the Hours and Minutes drop-down lists, respectively.

End Time Select the end time for the time range profile from the Hours and Minutes drop-downlists, respectively.

Visualization Graph forTime

The Visualization graph (approximated to the hour) provides a visual display of theselected time range (Day range, Start Time, and End Time) for periodic profiles.

Table 54: Time Range Profile Configuration Parameters

Associating a Time Range Profile to an SSID

To apply a time range profile to an SSID, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Networks. The Networks page is displayed.

4. Click the edit icon next to the SSID for which you want to apply the time range profile. You can also add atime range profile when configuring an SSID.

5. Click Time Range Profiles.

6. Select a time range profile from the list and select a value from the Status drop-down list.

n When a time range profile is enabled on SSID, the SSID is made available to the users for the configuredtime range. For example, if the specified time range is 12:00 to 13:00, the SSID becomes available onlybetween 12 PM to 1 PM on a given day.

n If a time range is disabled, the SSID becomes unavailable for the configured time range. For example, ifconfigured time-range is 14:00 to 17:00, the SSID is made unavailable from 2 PM to 5 PM on a givenday.

7. Click Save.

Aruba Central | User Guide Wireless Management | 153

Page 154: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

154 | Wireless Management Aruba Central | User Guide

For more information on time range configuration, see the Aruba Instant User Guide.

Configuring ARM and RF ParametersThis section provides the following information:

n ARM Overview on page 154

n Configuring ARM Features on page 155

n Configuring Radio Parameters on page 157

ARM OverviewARM is a radio frequency management technology that optimizes WLAN performance even in the networkswith highest traffic by dynamically and intelligently choosing the best 802.11 channel and transmitting powerfor each Instant AP in its current RF environment. ARM works with all standard clients, across all operatingsystems, while remaining in compliance with the IEEE 802.11 standards. It does not require any proprietaryclient software to achieve its performance goals. ARM ensures low-latency roaming, consistently highperformance, and maximum client compatibility in a multi-channel environment. By ensuring the fairdistribution of available Wi-Fi bandwidth to mobile devices, ARM ensures that data, voice, and videoapplications have sufficient network resources at all times. ARM allows mixed 802.11a, b, g, n, and ac clienttypes to inter operate at the highest performance levels.

When ARM is enabled, an Instant AP dynamically scans all 802.11 channels within its 802.11 regulatory domainat regular intervals and sends reports on WLAN coverage, interference, and intrusion detection to the VirtualController. ARM computes coverage and interference metrics for each valid channel, chooses the bestperforming channel, and transmit power settings for each Instant AP RF environment. Each Instant AP gathersother metrics on its ARM-assigned channel to provide a snapshot of the current RF health state.

Instant APs support the following ARM features:

n Channel or Power Assignment—Assigns channel and power settings for all the Instant APs in the networkaccording to changes in the RF environment.

n Voice Aware Scanning—Improves voice quality by preventing an Instant AP from scanning for otherchannels in the RF spectrum during a voice call and by allowing an Instant AP to resume scanning whenthere are no active voice calls.

n Load Aware Scanning—Dynamically adjusts the scanning behavior to maintain uninterrupted data transferon resource intensive systems when the network traffic exceeds a predefined threshold.

n Bandsteering—Assigns the dual-band capable clients to the 5 GHz band on dual-band Instant APs therebyreducing co-channel interference and increasing the available bandwidth for dual-band clients.

n Client Match—Continually monitors the RF neighborhood of the client to support the ongoing bandsteering and load balancing of channels, and enhanced Instant AP reassignment for roaming mobile clients.

When Client Match is enabled on 802.11n capable Instant APs, the Client Match feature overrides any settingsconfigured for the legacy band steering, station hand-off assist or load balancing features. The 802.11ac capableInstant APs do not support the legacy band steering, station hand off or load balancing settings, so these Instant APsmust be managed using Client Match.

n Airtime Fairness—Provides equal access to all clients on the wireless medium, regardless of client type,capability, or operating system to deliver uniform performance to all clients.

For more information on ARM features supported by the APs, see the Aruba Instant User Guide.

Page 155: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Configuring ARM FeaturesTo configure ARM features such as band steering, and airtime fairness mode and Client Match, complete thefollowing steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click RF. The RF page opens.

4. Under Adaptive Radio Management(ARM), click Client Control.5. For Band Steering Mode, configure the following parameters:

Datapaneitem

Description

Prefer5 GHz

Enables band steering in the 5 GHz mode. On selecting this, the Instant AP steers the client to the 5 GHzband (if the client is 5 GHz capable), but allows the client connection on the 2.4 GHz band if the clientpersistently attempts for 2.4 GHz association.

Force 5GHz

Enforces 5 GHz band steering mode on the Instant APs.

BalanceBands

Allows the Instant AP to balance the clients across the two radios to best utilize the available 2.4 GHzbandwidth. This feature takes into account the fact that the 5 GHz band has more channels than the 2.4GHz band, and that the 5 GHz channels operate in 40 MHz, while the 2.5 GHz band operates in 20 MHz.

Disable Allows the clients to select the band to use.

Table 55: Band Steering Mode Configuration Parameters

6. For Airtime Fairness Mode, specify any of the following values:

Data PaneItem Description

Default Access Allows access based on client requests. When Air Time Fairness is set to default access, peruser and per SSID bandwidth limits are not enforced.

Fair Access Allocates air time evenly across all the clients.

Preferred Access Sets a preference where 802.11n clients are assigned more air time than 802.11a/11g. The802.11a/11g clients get more airtime than 802.11b. The ratio is 16:4:1.

Table 56: Airtime Fairness Mode Configuration Parameters

7. For Client Match, configure the following parameters:

Aruba Central | User Guide Wireless Management | 155

Page 156: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

156 | Wireless Management Aruba Central | User Guide

DataPane Item Description

ClientMatch

Enables the Client Match feature on APs. When enabled, client count is balanced among all thechannels in the same band. When Client Match is enabled, ensure that scanning is enabled.NOTE: When the Client Match is disabled, channels can be changed even when the clients are activeon a BSSID.

CMCalculatingInterval

Configures a value for the calculating interval of Client Match. The interval is specified in secondsand the default value is 30 seconds. You can specify a value within the range of 10-600.

CMNeighborMatching%

Configures the calculating interval of Client Match. This number takes into account the leastsimilarity percentage to be considered as in the same virtual RF neighborhood of Client Match. Youcan specify a percentage value within the range of 20-100. The default value is 75%.

CMThreshold

Configures a Client Match threshold value. This number takes acceptance client count differenceamong all the channels of Client Match. When the client load on an AP reaches or exceeds thethreshold in comparison, Client Match is enabled on that AP. You can specify a value within range of1-20. The default value is 2.

SLB Mode Enables the SLB Mode to determine the balancing strategy for Client Match. The following optionsare available:

n Channeln Radion Channel + Radio

Table 57: Additional ARM Configuration Parameters

8. Click Access Point Control, and configure the following parameters:

Datapaneitem

Description

CustomizeValidChannels

Allows you to select a custom list of valid 20 MHz and 40 MHz channels for 2.4 GHz and 5 GHz bands.By default, the AP uses valid channels as defined by the Country Code (regulatory domain). Onselecting Customize Valid Channels, a list of valid channels for both 2.4.GHz and 5 GHz aredisplayed. The valid channel customization feature is disabled by default.The valid channels automatically show in the static channel assignment data pane.

MinimumTransmitPower

Allows you to configure a minimum transmission power within a range of 3 to 33 dBm in 3 dBmincrements. If the minimum transmission EIRP setting configured on an AP is not supported by the APmodel, this value is reduced to the highest supported power setting. The default value for minimumtransmit power is 18 dBm.

MaximumTransmitPower

Allows you to configure the maximum transmission power within a range of 3 to 33 dBm in 3 dBmincrements. If the maximum transmission EIRP configured on an AP is not supported by the localregulatory requirements or AP model, the value is reduced to the highest supported power settings.

ClientAware

Allows ARM to control channel assignments for the Instant APs with active clients. When the ClientMatch mode is set to Disabled, an Instant AP may change to a more optimal channel, which disruptscurrent client traffic. The Client Aware option is Enabled by default.

Table 58: AP Control Configuration Parameters

Page 157: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Datapaneitem

Description

Scanning Allows the Instant AP to dynamically scan all 802.11 channels within its 802.11 regulatory domain atregular intervals. This scanning report includes WLAN coverage, interference, and intrusion detectiondata.NOTE: For Client Match configuration, ensure that scanning is enabled.

WideChannelBands

Allows the administrators to configure 40 MHz channels in the 2.4 GHz and 5.0 GHz bands. 40 MHzchannels are two 20 MHz adjacent channels that are bonded together. The 40 MHz channeleffectively doubles the frequency bandwidth available for data transmission. For high performance,you can select 5 GHz. If the AP density is low, enable in the 2.4 GHz band.

80 MHzSupport

Enables or disables the use of 80 MHz channels on APs. This feature allows ARM to assign 80 MHzchannels on APs with 5 GHz radios, which support a very high throughput. This setting is enabled bydefault.NOTE: Only the APs that support 802.11ac can be configured with 80 MHz channels.

9. Click Save Settings.

Configuring Radio ParametersTo configure RF parameters for the 2.4 GHz and 5 GHz radio bands on an Instant AP, complete the followingsteps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click RF. The RF page opens.

4. Click Radio.

5. Under 2.4 GHz, 5 GHz, or both, configure the following parameters.

Data PaneItem Description

Legacy Only When set to ON, the Instant AP runs the radio in the non-802.11n mode. This option is set to OFFby default.

802.11d /802.11h

When set to ON, the radios advertise their 802.11d (Country Information) and 802.11h (TransmitPower Control) capabilities. This option is set to OFF by default.

BeaconInterval

Configures the beacon period for the Instant AP in milliseconds. This indicates how often the802.11 beacon management frames are transmitted by the AP. You can specify a value withinthe range of 60–500. The default value is 100 milliseconds.

InterferenceImmunityLevel

Configures the immunity level to improve performance in high-interference environments. Thedefault immunity level is 2.

n Level 0 — No ANI adaptation.n Level 1 — Noise immunity only. This level enables power-based packet detection bycontrolling the amount of power increase that makes a radio aware that it has received apacket.n Level 2 — Noise and spur immunity. This level also controls the detection of OFDMpackets, and is the default setting for the Noise Immunity feature.

Table 59: Radio Configuration Parameters

Aruba Central | User Guide Wireless Management | 157

Page 158: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

158 | Wireless Management Aruba Central | User Guide

Data PaneItem Description

n Level 3 — Level 2 settings and weak OFDM immunity. This level minimizes false detectson the radio due to interference, but may also reduce radio sensitivity. This level isrecommended for environments with a high-level of interference related to 2.4 GHzappliances such as cordless phones.n Level 4 — Level 3 settings, and FIR immunity. At this level, the AP adjusts its sensitivity toin-band power, which can improve performance in environments with high and constantlevels of noise interference.n Level 5 — The AP completely disables PHY error reporting, improving performance byeliminating the time the Instant AP spends on PHY processing.

NOTE: Increasing the immunity level makes the AP lose a small amount of range.

ChannelSwitchAnnouncementCount

Configures the number of channel switching announcements to be sent before switching to anew channel. This allows the associated clients to recover gracefully from a channel change.

BackgroundSpectrumMonitoring

When set to ON, the APs in the access mode continue with their normal access service toclients, while performing additional function of monitoring RF interference (from bothneighboring APs and non Wi-Fi sources such as, microwaves and cordless phones) on thechannel they are currently serving the clients.

CustomizeARM PowerRange

Configures a minimum (Min Power) and maximum (Max Power) power range value for the 2.4GHz and 5GHz band frequencies. The default value is 3 dBm. Unlike the configuration in theARM profile, the transmit power of all radios in the Radio profile do not share the sameconfiguration.

Very highthroughput

When set to ON, VHT is enabled on the 802.11ac devices for the 5GHz radio band. If VHT isenabled for the 5 GHz radio profile on an Instant AP, it is automatically enabled for all SSIDsconfigured on an Instant AP. By default, VHT is enabled on all SSIDs.NOTE: If you want the 802.11ac Instant APs to function as 802.11n Instant APs, clear this checkbox to disable VHT on these devices.

Table 59: Radio Configuration Parameters

6. Click Save Settings.

Configuring IDS ParametersCentral supports the IDS feature that monitors the network for the presence of unauthorized Instant APs andclients. It also logs information about the unauthorized Instant APs and clients, and generates reports basedon the logged information.

Rogue APsThe IDS feature in the Central network enables you to detect rogue APs, interfering APs, and other devices thatcan potentially disrupt network operations. A rogue AP is an unauthorized AP plugged into the wired side ofthe network. An interfering AP is an AP seen in the RF environment, but it is not connected to the wirednetwork. While the interfering AP can potentially cause RF interference, it is not considered a direct securitythreat, because it is not connected to the wired network. However, an interfering AP may be reclassified as arogue AP.

The built-in IDS scans for APs that are not controlled by the VC. These are listed and classified as eitherInterfering or Rogue, depending on whether they are on a foreign network or your network.

Page 159: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Configuring Wireless Intrusion Detection and Protection PoliciesTo configure a Wireless Intrusion Detection and Protection policy:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Wireless IDS/IPS. The IDS page opens.

4. Configure the following options:

n Infrastructure Detection Policies—Specifies the policy for detecting wireless attacks on APs.

n Client Detection Policies—Specifies the policy for detecting wireless attacks on clients.

n Infrastructure Protection Policies—Specifies the policy for protecting APs from wireless attacks.

n Client Protection Policies—Specifies the policy for protecting clients from wireless attacks.

n Containment Methods—Prevents unauthorized stations from connecting to your Central network.

Each of these options contains several default levels that enable different sets of policies. An administratorcan customize enable or disable these options accordingly. The detection levels can be configured using theIDS pane. The following levels of detection can be configured in the WIP Detection page:

n Offn Lown Mediumn High

The following table describes the detection policies enabled in the Infrastructure Detection Custom settingsfield.

Detectionlevel Detection policy

Off Rogue Classification

Low n Detect AP Spoofingn Detect Windows Bridgen IDS Signature — Deauthentication Broadcastn IDS Signature — Deassociation Broadcast

Medium n Detect ad hoc networks using VALID SSID — Valid SSID list is auto-configured based on APconfigurationn Detect Malformed Frame — Large Duration

High n Detect AP Impersonationn Detect ad hoc Networksn Detect Valid SSID Misusen Detect Wireless Bridgen Detect 802.11 40 MHz intolerance settingsn Detect Active 802.11n Greenfield Moden Detect AP Flood Attackn Detect Client Flood Attackn Detect Bad WEPn Detect CTS Rate Anomalyn Detect RTS Rate Anomalyn Detect Invalid Address Combinationn Detect Malformed Frame — HT IE

Table 60: Infrastructure Detection Policies

Aruba Central | User Guide Wireless Management | 159

Page 160: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

160 | Wireless Management Aruba Central | User Guide

Detectionlevel Detection policy

n Detect Malformed Frame — Association Requestn Detect Malformed Frame — Authn Detect Overflow IEn Detect Overflow EAPOL Keyn Detect Beacon Wrong Channeln Detect devices with invalid MAC OUI

Table 60: Infrastructure Detection Policies

The following table describes the detection policies enabled in the Client Detection Custom settings field.

Detection level Detection policy

Off All detection policies are disabled.

Low Detect Valid Station Misassociation

Medium n Detect Disconnect StationAttackn Detect Omerta Attackn Detect FATA-Jack Attackn Detect Block ACK DOSn Detect Hotspotter Attackn Detect unencrypted ValidClientn Detect Power Save DOSAttack

High n Detect EAP Rate Anomalyn Detect Rate Anomalyn Detect Chop Chop Attackn Detect TKIP Replay Attackn IDS Signature — Air Jackn IDS Signature — ASLEAP

Table 61: Client Detection Policies

The following levels of detection can be configured in the WIP Protection page:

n Offn Lown High

Page 161: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

The following table describes the protection policies that are enabled in the Infrastructure Protection Customsettings field.

Protection level Protection policy

Off All protection policies are disabled

Low n Protect SSID — Valid SSID list is auto derived from APconfigurationn Rogue Containment

High n Protect from Adhoc Networksn Protect AP Impersonation

Table 62: Infrastructure Protection Policies

The following table describes the detection policies that are enabled in the Client Protection Custom settingsfield.

Protection level Protection policy

Off All protection policies are disabled

Low Protect Valid Station

High Protect Windows Bridge

Table 63: Client Protection Policies

Containment MethodsYou can enable wired and wireless containment measures to prevent unauthorized stations from connecting toyour Central network.

Central supports the following types of containment mechanisms:

n Wired containment — When enabled, Instant APs generate ARP packets on the wired network to containwireless attacks.

n Wireless containment — When enabled, the system attempts to disconnect all clients that are connected orattempting to connect to the identified AP.

l None — Disables all the containment mechanisms.

l Deauthenticate only — With deauthentication containment, the AP or client is contained by disruptingthe client association on the wireless interface.

l Tarpit containment — With tarpit containment, the AP is contained by luring clients that are attemptingto associate with it to a tarpit. The tarpit can be on the same channel or a different channel as the APbeing contained.

The FCC and some third parties have alleged that under certain circumstances, the use of containmentfunctionality violates 47 U.S.C. §333. Before using any containment functionality, ensure that yourintended use is allowed under the applicable rules, regulations, and policies. Aruba is not liable for anyclaims, sanctions, or other direct, indirect, special, consequential or incidental damages related to youruse of containment functionality.

Aruba Central | User Guide Wireless Management | 161

Page 162: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

162 | Wireless Management Aruba Central | User Guide

Configuring Authentication and Security ParametersThisCentral section describes the authentication and security parameters to configure on an Instant APprovisioned in:

n Supported Authentication Methods on page 162

n Supported Authentication Servers on page 166

n Configuring External Servers for Authentication on page 168

n Configuring Authentication Parameters for Instant AP Management Users on page 170

n Configuring Users on page 171

n Configuring Roles and Policies for User Access Control on page 172

n Configuring ALG Protocols on page 181

n Blacklisting Clients on page 182

Supported Authentication MethodsAuthentication is a process of identifying a user through a valid username and password. Clients can also beauthenticated based on their MAC addresses.

The authentication methods supported by the Instant APs managed through Central are described in thefollowing sections.

802.1X Authentication

802.1X is a method for authenticating the identity of a user before providing network access to the user. TheCentral network supports internal RADIUS server and external RADIUS server for 802.1X authentication. Forauthentication purpose, the wireless client can associate to a NAS or RADIUS client such as a wireless InstantAP. The wireless client can pass data traffic only after successful 802.1X authentication.

The NAS acts as a gateway to guard access to a protected resource. A client connecting to the wireless network firstconnects to the NAS.

Configuring 802.1X Authentication for a Network Profile

To configure 802.1X authentication for a wireless network profile, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Networks. The Networks page opens.

4. Select a network profile for which you want to enable 802.1X authentication, and click Edit.

5. In Edit <profile-name>, ensure that all required WLAN and VLAN attributes are defined, and then clickthe Security tab.

6. Under Security, for the Enterprise security level, select the preferred option from Key Management.

7. To terminate the EAP portion of 802.1X authentication on the Instant AP instead of the RADIUS server,set Termination to Enabled.

For 802.1X authorization, by default, the client conducts an EAP exchange with the RADIUS server, and theAP acts as a relay for this exchange. When Termination is enabled, the Instant AP itself acts as anauthentication server, terminates the outer layers of the EAP protocol, and only relays the innermost layerto the external RADIUS server.

8. Specify the type of authentication server to use.

9. Click Save Settings.

Page 163: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

MAC Authentication

MAC authentication is used for authenticating devices based on their physical MAC addresses. MACauthentication requires that the MAC address of a machine matches a manually defined list of addresses. Thisauthentication method is not recommended for scalable networks and the networks that require stringentsecurity settings.

MAC authentication can be used alone or it can be combined with other forms of authentication such as WEPauthentication.

Configuring MAC Authentication for a Network Profile

To configure MAC authentication for a wireless profile, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Networks. The Networks page opens.

4. Select a network profile for which you want to enable MAC authentication and click Edit.

5. In the Edit <profile-name>, ensure that all required WLAN and VLAN attributes are defined, and thenclick the Security tab.6. In Security, for MAC Authentication, select Enabled for Personal or Open security level.

7. Specify the type of authentication server to use.

8. Click Save Settings.

MAC Authentication with 802.1X Authentication

The administrators can enable MAC authentication for 802.1X authentication. MAC authentication shares allthe authentication server configurations with 802.1X authentication. If a wireless or wired client connects tothe network, MAC authentication is performed first. If MAC authentication fails, 802.1X authentication doesnot trigger. If MAC authentication is successful, 802.1X authentication is attempted. If 802.1X authenticationis successful, the client is assigned an 802.1X authentication role. If 802.1X authentication fails, the client isassigned a deny-all role or mac-auth-only role.

You can also configure the following authentication parameters for MAC+802.1X authentication:

n MAC authentication only role—Allows you to create a mac-auth-only role to allow role-based access ruleswhen MAC authentication is enabled for 802.1X authentication. The mac-auth-only role is assigned to aclient when the MAC authentication is successful and 802.1X authentication fails. If 802.1X authenticationis successful, the mac-auth-only role is overwritten by the final role. The mac-auth-only role is primarilyused for wired clients.

n L2 authentication fall-through—Allows you to enable the l2-authentication-fallthrough mode. Whenthis option is enabled, the 802.1X authentication is allowed even if the MAC authentication fails. If thisoption is disabled, 802.1X authentication is not allowed. The l2-authentication-fallthrough mode isdisabled by default.

Configuring MAC Authentication with 802.1X Authentication

To configure MAC authentication with 802.1X authentication for wireless network profile, configure thefollowing parameters:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Networks. The Networks page opens.

4. Select a network profile for which you want to enable MAC and 802.1X authentication and click Edit.

5. Click Security.

Aruba Central | User Guide Wireless Management | 163

Page 164: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

164 | Wireless Management Aruba Central | User Guide

6. Select Perform MAC Authentication Before 802.1X to use 802.1X authentication only when the MACauthentication is successful.

7. Select MAC Authentication Fail Through to use 802.1X authentication even when the MACauthentication fails.

8. Click Save Settings.

Captive Portal Authentication

Captive portal authentication is used for authenticating guest users. For more information, see ConfiguringCaptive Portal Profiles for Guest Network on page 143.

MAC Authentication with Captive Portal Authentication

The following conditions apply to a network profile with MAC authentication and Captive Portal authenticationenabled:

n If the captive portal splash page type is Internal-Authenticated or External-RADIUS Server, MACauthentication reuses the server configurations.

n If the captive portal splash page type is Internal-Acknowledged or External-Authentication Text andMAC authentication is enabled, a server configuration page is displayed.

n If the captive portal splash page type is none, MAC authentication is disabled.

The MAC authentication with captive portal authentication supports the mac-auth-only role.

Configuring MAC Authentication with Captive Portal Authentication

To configure the MAC authentication with captive portal authentication for a network profile, complete thefollowing steps:

1. Select an existing wireless profile for which you want to enable MAC with captive portal authentication.

2. Under Access, specify the following parameters for a network with Role Based rules:

a. Select Enforce Machine Authentication when MAC authentication is enabled for captive portal. Ifthe MAC authentication fails, the captive portal authentication role is assigned to the client.

b. For wireless network profile, select Enforce MAC Auth Only Role when MAC authentication isenabled for captive portal. After successful MAC authentication, the MAC auth only role is assigned tothe client.

3. Click Next and then click Save Settings.

802.1X Authentication with Captive Portal Authentication

This authentication method allows you to configure different captive portal settings for clients on the sameSSID. For example, you can configure an 802.1X SSID and create a role for captive portal access, so that someof the clients using the SSID derive the captive portal role. You can configure rules to indicate access to externalor internal Captive portal, or none.

For more information on configuring captive portal roles for an SSID with 802.1X authentication, seeConfiguring Captive Portal Profiles for Guest Network on page 143.

WISPr Authentication

WISPr authentication allows a smart client to authenticate on the network when they roam between wirelessInternet service providers, even if the wireless hotspot uses an ISP with whom the client may not have anaccount.

If a hotspot is configured to use WISPr authentication in a specific ISP and a client attempts to access theInternet at that hotspot, the WISPr AAA server configured for the ISP authenticates the client directly andallows the client to access the network. If the client only has an account with a partner ISP, the WISPr AAAserver forwards the client’s credentials to the partner ISP’s WISPr AAA server for authentication. When the

Page 165: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

client is authenticated on the partner ISP, it is also authenticated on your hotspot’s own ISP as per their serviceagreements. The Instant AP assigns the default WISPr user role to the client when your ISP sends anauthentication message to the Instant AP.

Instant APs support the following smart clients:

l iPass

l Boingo

These smart clients enable client authentication and roaming between hotspots by embedding iPass GenericInterface Specification (GIS) redirect, authentication, and logoff messages within HTML messages that are sentto the Instant AP.

Configuring WISPr Authentication

To configure WISPr authentication, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click System. The System page opens.

4. Under WISPr, configure the following parameters:

n ISO Country Code—The ISO Country Code for the WISPr Location ID.

n E.164 Area Code—The E.164 Area Code for the WISPr Location ID.

n Operator Name—The operator name of the hotspot.

n E.164 Country Code—The E.164 Country Code for the WISPr Location ID.

n SSID/Zone—The SSID/Zone for the WISPr Location ID.

n Location Name—Name of the hotspot location. If no name is defined, the name of the Instant AP, towhich the user is associated, is used.

5. Click Save Settings to apply the changes.

The WISPr RADIUS attributes and configuration parameters are specific to the RADIUS server used by your ISPfor the WISPr authentication. Contact your ISP to determine these values. You can find a list of ISO and ITUcountry and area codes at the ISO and ITU websites (www.iso.org and http://www.itu.int).

A Boingo smart client uses a NAS identifier in the format <CarrierID>_<VenueID> for locationidentification. To support Boingo clients, ensure that you configure the NAS identifier parameter in theRADIUS server profile for the WISPr server.

Walled Garden

On the Internet, a walled garden typically controls access to web content and services. The Walled gardenaccess is required when an external captive portal is used. For example, a hotel environment where theunauthenticated users are allowed to navigate to a designated login page (for example, a hotel website) and allits contents.

The users who do not sign up for the Internet service can view the allowed websites (typically hotel propertywebsites). The website names must be DNS-based and support the option to define wildcards. When a userattempts to navigate to other websites that are not in the whitelist of the walled garden profile, the user isredirected to the login page. Instant AP supports Walled Garden only for the HTTP requests. For example, ifyou add yahoo.com in Walled Garden whitelist and the client sends an HTTPS request (https://yahoo.com), therequested page is not displayed and the users are redirected to the captive portal login page.

In addition, a blacklisted walled garden profile can also be configured to explicitly block the unauthenticatedusers from accessing some websites.

Aruba Central | User Guide Wireless Management | 165

Page 166: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

166 | Wireless Management Aruba Central | User Guide

Configuring Walled Garden Access

To configure walled garden access, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Security. The Security page opens.

4. Click Walled Garden.

5. To allow access to a specific set of websites, create a whitelist, click + and add the domain names. Thisallows access to a domain while the user remains unauthenticated. Specify a POSIX regular expression(regex(7)). For example:

n yahoo.com matches various domains such as news.yahoo.com, travel.yahoo.com andfinance.yahoo.com

n www.apple.com/library/test is a subset of www.apple.com site corresponding to path /library/test/*

n favicon.ico allows access to /favicon.ico from all domains.

6. To deny users access to a domain, click + under Blacklist, and enter the domain name in the window. Thisprevents the unauthenticated users from viewing specific websites. When a URL specified in the blacklist isaccessed by an unauthenticated user, Instant AP sends an HTTP 403 response to the client with an errormessage.

7. Save the changes.

Supported Authentication ServersBased on the security requirements, you can configure internal or external RADIUS servers. This sectiondescribes the types of authentication servers and authentication termination, that can be configured for anetwork profile:

External RADIUS ServerIn the external RADIUS server, the IP address of the VC is configured as the NAS IP address. Central RADIUS isimplemented on the VC, and this eliminates the need to configure multiple NAS clients for every Instant AP onthe RADIUS server for client authentication. Central RADIUS dynamically forwards all the authenticationrequests from a NAS to a remote RADIUS server. The RADIUS server responds to the authentication requestwith an Access-Accept or Access-Reject message, and users are allowed or denied access to the networkdepending on the response from the RADIUS server.

When you enable an external RADIUS server for the network, the client on the Instant AP sends a RADIUSpacket to the local IP address. The external RADIUS server then responds to the RADIUS packet.

Central supports the following external authentication servers:

n RADIUS

n LDAP

To use an LDAP server for user authentication, configure the LDAP server on the VC, and configure user IDsand passwords.

To use a RADIUS server for user authentication, configure the RADIUS server on the VC.

RADIUS Server Authentication with VSAAn external RADIUS server authenticates network users and returns to the Instant AP the VSA that contains thename of the network role for the user. The authenticated user is placed into the management role specified bythe VSA.

Page 167: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Internal RADIUS ServerEach Instant AP has an instance of free RADIUS server operating locally. When you enable the internal RADIUSserver option for the network, the client on the Instant AP sends a RADIUS packet to the local IP address. Theinternal RADIUS server listens and replies to the RADIUS packet.

The following authentication methods are supported in the Central network:

n EAP-TLS—The EAP-TLS method supports the termination of EAP-TLS security using the internal RADIUSserver. The EAP-TLS requires both server and CA certificates installed on the Instant AP. The client certificateis verified on the virtual controller (the client certificate must be signed by a known CA), before theusername is verified on the authentication server.

n EAP-TTLS (MSCHAPv2)—The EAP-TTLS method uses server-side certificates to set up authenticationbetween clients and servers. However, the actual authentication is performed using passwords.

n EAP-PEAP (MSCHAPv2)—EAP-PEAP is an 802.1X authentication method that uses server-side public keycertificates to authenticate clients with server. The PEAP authentication creates an encrypted SSL / TLStunnel between the client and the authentication server. Exchange of information is encrypted and storedin the tunnel ensuring the user credentials are kept secure.

n LEAP—LEAP uses dynamic WEP keys for authentication between the client and authentication server.

To use the internal database of an AP for user authentication, add the names and passwords of the users to beauthenticated.

Aruba does not recommend the use of LEAP authentication because it does not provide any resistance to networkattacks.

Authentication Termination on Instant APCentral allows EAP termination for PEAP-Generic Token Card (PEAP-GTC) and Protected ExtensibleAuthentication Protocol-Microsoft Challenge Authentication Protocol version 2 (PEAP-MSCHAPv2). PEAP-GTCtermination allows authorization against an LDAP server and external RADIUS server while PEAP-MSCHAPv2allows authorization against an external RADIUS server.

This allows the users to run PEAP-GTC termination with their username and password to a local MicrosoftActive Directory server with LDAP authentication.

n EAP-GTC—This EAP method permits the transfer of unencrypted usernames and passwords from client toserver. The EAP-GTC is mainly used for one-time token cards such as SecureID and the use of LDAP orRADIUS as the user authentication server. You can also enable caching of user credentials on the Instant APto an external authentication server for user data backup.

n EAP-MSCHAPv2—This EAP method is widely supported by Microsoft clients. A RADIUS server must be usedas the back-end authentication server.

Dynamic Load Balancing between Authentication ServersYou can configure two authentication servers to serve as a primary and backup RADIUS server and enable loadbalancing between these servers. Load balancing of authentication servers ensures that the authenticationload is split across multiple authentication servers and enables the Instant APs to perform load balancing ofauthentication requests destined to authentication servers such as RADIUS or LDAP.

The load balancing in Instant AP is performed based on the outstanding authentication sessions. If there areno outstanding sessions and if the rate of authentication is low, only primary server will be used. Thesecondary is used only if there are outstanding authentication sessions on the primary server. With this, theload balance can be performed across asymmetric capacity RADIUS servers without the need to obtain inputsabout the server capabilities from the administrators.

Aruba Central | User Guide Wireless Management | 167

Page 168: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

168 | Wireless Management Aruba Central | User Guide

Configuring External Servers for AuthenticationYou can configure an external RADIUS server, TACACS or LDAP server for user authentication. To configure aserver, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Security. The Security page opens.

4. Click Authentication Server.

5. To create a new server, click +.

6. Configure any of the following types of server for authentication:

Page 169: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Type ofServer Parameters

RADIUS Configure the following parameters:n Name—Name of the external RADIUS server.n IP Address— IP address or the FQDN of the external RADIUS server.n Auth Port—Authorization port number of the external RADIUS server. The default portnumber is 1812.n Accounting Port—The accounting port number used for sending accounting records to theRADIUS server. The default port number is 1813.n Shared Key and Retype Shared Key—Shared key for communicating with the externalRADIUS server.n Timeout—The timeout duration for one RADIUS request. The Instant AP retries sending therequest several times (as configured in the Retry count) before the user is disconnected. Forexample, if the Timeout is 5 seconds, Retry counter is 3, user is disconnected after 20seconds. The default value is 5 seconds.n Retry Count—The maximum number of authentication requests that can be sent to theserver group by the Instant AP. You can specify a value within the range of 1–5. The defaultvalue is 3 requests.n RFC 3576—To allow the APs to process RFC 3576-compliant CoA and disconnect messagesfrom the RADIUS server, select Enabled. Disconnect messages terminate the user sessionimmediately, whereas the CoA messages modify session authorization attributes such as datafilters.n NAS IP Address—Enter the VC IP address. The NAS IP address is the VC IP address that issent in data packets.n NAS Identifier—Use this to configure strings for RADIUS attribute 32, NAS Identifier, to besent with RADIUS requests to the RADIUS server.n Dead Time—Specify a dead time for authentication server in minutes. When two or moreauthentication servers are configured on the Instant AP and a server is unavailable, the deadtime configuration determines the duration for which the authentication server is available ifthe server is marked as unavailable.n Dynamic RADIUS Proxy Parameters—If Dynamic RADIUS Proxy is enabled in the systemparameters of the Instant AP, configure the following dynamic RADIUS proxy parameters:

l DRP IP—IP address to be used as source IP for RADIUS packets.l DRP MASK—Subnet mask of the DRP IP address.l DRP VLAN—VLAN in which the RADIUS packets are sent.l DRP GATEWAY—Gateway IP address of the DRP VLAN.

n Service Type Framed User—Select any of the following check boxes to send the servicetype as Framed User in the access requests to the RADIUS server:

l 802.1Xl MACl Captive Portal

LDAP Configure the following parameters:n Name—Name of the LDAP servern IP Address—IP address of the LDAP servern Auth Port—Authorization port number of the LDAP server. The default port number is 389.n Admin-DN—A distinguished name for the admin user with read and search privilegesacross all the entries in the LDAP database (the admin user need not have write privileges, butthe admin user must be able to search the database, and read attributes of other users in thedatabase).n Admin Password and Retype Admin Password—Password for the admin user.n Base-DN— Distinguished name for the node that contains the entire user database.n Filter—The filter to apply when searching for a user in the LDAP database. The default filterstring is (objectclass=*)n Key Attribute— The attribute to use as a key while searching for the LDAP server. ForActive Directory, the value is sAMAccountName.n Timeout—Timeout interval within a range of 1–30 seconds for one RADIUS request. Thedefault value is 5.

Table 64: Authentication Server Configuration

Aruba Central | User Guide Wireless Management | 169

Page 170: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

170 | Wireless Management Aruba Central | User Guide

Type ofServer Parameters

n Retry Count—The maximum number of authentication requests that can be sent to theserver group. You can specify a value within the range of 1–5. The default value is 3.

TACACS Configure the following parameters:n Name—Name of the server.n Shared Key and Retype Key—The secret key to authenticate communication between theTACACS client and server.n Auth Port—The TCP IP port used by the server. The default port number is 49.n Timeout—A number between 1 and 30 seconds to indicate the timeout period for TACACS+requests. The default value is 20 seconds.n IP Address—IP address of the server.n Retry Count—The maximum number of authentication attempts to be allowed. The defaultvalue is 3.n Dead Time (in mins)—Specify a dead time for authentication server in minutes. When twoor more authentication servers are configured on the Instant AP and a server is unavailable,the dead time configuration determines the duration for which the authentication server isavailable if the server is marked as unavailable.

Change ofAuthorizationOnly

Configure the following parameters:n Name—Name of the server.n IP Address—IP address of the server.n AirGroup CoA Port—A port number for sending Bonjour support CoA on a different portthan on the standard CoA port. The default value is 5999.n Shared Key and Retype Key—A shared key for communicating with the external RADIUSserver.

7. Click Save Server.

To assign the authentication server to a network profile, select the newly added server when configuringsecurity settings for a wireless or wired network profile.

You can also add an external RADIUS server by selecting New for Authentication Server when configuring a WLAN orwired profile.

Configuring Authentication Parameters for Instant AP Management UsersYou can configure RADIUS or TACACS authentication servers to authenticate and authorize the managementusers of an Instant AP. The authentication servers determine if the user has access to administrative interface.The privilege level for different types of management users is defined on the RADIUS or TACACS server. TheInstant APs map the management users to the corresponding privilege level and provide access to the usersbased on the attributes returned by the RADIUS or TACACS server.

In Central, the Instant AP management user passwords are stored and displayed as hash instead of plain text. Thehash-mgmt-user command is enabled by default on the Instant APs provisioned in the template and UI groups. If apre-configured Instant AP joins Central and is moved to a new group, Central uses the hash-mgmt-userconfigruation settings and discards mgmt-user configuration settings, if any, on the Instant AP. In other words,Central hashes management user passwords irrespective of the management user configuration settings running onan Instant AP.

To configure authentication parameters for local admin, read-only, and guest management administratoraccount settings.

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

Page 171: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

3. On the left navigation pane, click System. The System page opens.

4. Under Administrator, configure the following parameters:

Type ofthe User

AuthenticationOptions Steps to Follow

ClientControl

Internal Select Internal if you want to specify a single set of user credentials. If usingan internal authentication server:

1. Enter a Username and Password.2. Retype the password to confirm.

Authenticationserver

Select the RADIUS or TACACS authentication servers. You can also create anew server by selecting New from the Authentication server drop-down list.

Authenticationserver w/fallback tointernal

Select Authentication server w/ fallback to internal option if you want touse both internal and external servers. When enabled, the authenticationswitches to Internal if there is no response from the RADIUS server (RADIUSserver timeout).To use this option, select the authentication servers and configure the usercredentials (username and password) for internal server basedauthentication.

Load Balancing If two servers are configured, the users can use them in the primary or backupmode, or load balancing mode. To enable load balancing, select Enabled fromthe Load balancing drop-down list. For more information on load balancing,see Dynamic Load Balancing between Authentication Servers on page 167.

TACACSaccounting

If a TACACS server is selected, enable TACACS accounting to reportmanagement commands if required.

View Only To configure a user account with the read-only privileges:1. Specify a Username and Password.2. Retype the password to confirm.

GuestRegistrationOnly

To configure a guest user account with the read-only privileges:1. Specify the Username and Password.2. Retype the password to confirm.

Table 65: Configuration Parameters for the Instant AP Users

3. Click Save Settings.

Configuring UsersThe local database of an Instant AP consists of a list of guest and employee users. The addition of a userinvolves specifying a login credentials for a user. The login credentials for these users are provided outside theCentral system.

A guest user can be a visitor who is temporarily using the enterprise network to access the Internet. However, ifyou do not want to allow access to the internal network and the Intranet, you can segregate the guest trafficfrom the enterprise traffic by creating a guest WLAN and specifying the required authentication, encryption,and access rules.

An employee user is the employee who is using the enterprise network for official tasks. You can createEmployee WLANs, specify the required authentication, encryption and access rules and allow the employees touse the enterprise network.

Aruba Central | User Guide Wireless Management | 171

Page 172: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

172 | Wireless Management Aruba Central | User Guide

The user database is also used when an Instant AP is configured as an internal RADIUS server.

The local user database of APs can support up to 512 user entries except IAP-92/93. IAP-92/93 supportsonly 256 user entries. If there are already 512 users, IAP-92/93 will not be able to join the cluster.

To configure users, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Security. The Security page opens.

4. Click Users for Internal Server.

5. Enter the username in the Username text box.

6. Enter the password in the Password text box and reconfirm.

7. Select a type of network from the Type drop-down list.

8. Click Add and click OK. The users are listed in the Users list.

9. To edit user settings:

a. Select the user to modify under Usersb. Click Edit to modify user settings.

c. Click OK.

10. To delete a user:

a. In the Users section, select the username to delete

b. Click Delete.

c. Click OK.

11. To delete all or multiple users at a time:

a. Select the user names that you want to delete

b. Click Delete All.c. Click OK.

Deleting a user only removes the user record from the user database, and will not disconnect the online userassociated with the username.

Configuring Roles and Policies for User Access ControlThe Central firewall provides identity-based controls to enforce application-layer security, prioritization, trafficforwarding, and network performance policies for wired and wireless networks. Using the Central firewall, youcan enforce network access policies that define access to the network, areas of the network that users mayaccess, and the performance thresholds of various applications.

Central supports a role-based stateful firewall. Central firewall recognizes flows in a network and keeps track ofthe state of sessions. The Central firewall manages packets according to the first rule that matches packet. Thefirewall logs on the Instant APs are generated as syslog messages. The Central firewall also supports ALGfunctions such as SIP, Vocera, Alcatel NOE, and Cisco Skinny protocols.

ACL RulesYou can use ACL rules to either permit or deny data packets passing through the Instant AP. You can also limitpackets or bandwidth available to a set of user roles by defining access rules. By adding custom rules, you canblock or allow access based on the service or application, source or destination IP addresses.

Page 173: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

You can create access rules to allow or block data packets that match the criteria defined in an access rule. Youcan create rules for either inbound traffic or outbound traffic. Inbound rules explicitly allow or block theinbound network traffic that matches the criteria in the rule. Outbound rules explicitly allow or block thenetwork traffic that matches the criteria in the rule. For example, you can configure a rule to explicitly blockoutbound traffic to an IP address through the firewall.

The Instant AP clients are associated with user roles, which determine the client’s network privileges and thefrequency at which clients re-authenticate. Central supports the following types of ACLs:

n ACLs that permit or deny traffic based on the source IP address of the packet.

n ACLs that permit or deny traffic based on source or destination IP address, or source or destination portnumber.

You can configure up to 64 access control rules for a firewall policy.

Configuring Network Address Translation RulesNAT is the process of modifying network address information when packets pass through a routing device. Therouting device acts as an agent between the public (the Internet) and private (local network), which allowstranslation of private network IP addresses to a public address space.

Central supports the NAT mechanism to allow a routing device to use the translation tables to map the privateaddresses into a single IP address and packets are sent from this address, so that they appear to originate fromthe routing device. Similarly, if the packets are sent to the private IP address, the destination address istranslated as per the information stored in the translation tables of the routing device.

For more information on roles and policies, see the following topics:

n Configuring Access Rules for Network Services on page 173

n Configuring User Roles on page 175

n Configuring Derivation Rules on page 175

n Managing Inbound Traffic on page 180

Configuring Access Rules for Network ServicesThis section describes the procedure for configuring ACLs to control access to network services. Forinformation on:

n Configuring ACLs for DPI, see Configuring ACL Rules for Application Analytics on page 177.

n Configuring ACLs website content classification, see Configuring Web Policy Enforcement on page 178.

To configure access rules, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Security. The Security page opens.

4. Click Roles.

5. Under Access Rules For Selected Roles, click + Add Rule to add a new rule. The new rule window isdisplayed.

6. In the new rule window, specify the following parameters:

Aruba Central | User Guide Wireless Management | 173

Page 174: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

174 | Wireless Management Aruba Central | User Guide

Data Pane Item Description

Rule Type Select a rule type from the list, for example Access Control.

Service Select a service from the list of available services. You can allow or deny access to any orall of the following services based on your requirement:

n any—Access is allowed or denied to all services.n custom—Available options are TCP, UDP, and Other. If you select the TCP or UDPoptions, enter appropriate port numbers. If you select the Other option, enter theappropriate ID.

NOTE: If TCP and UDP uses the same port, ensure that you configure separate accessrules to permit or deny access.

Action Select any of following attributes:n Select Allow to allow access users based on the access rule.n Select Deny to deny access to users based on the access rule.n Select Destination-NAT to allow changes to destination IP address.n Select Source-NAT to allow changes to the source IP address.

Destination Select a destination option. You can allow or deny access to any the following destinationsbased on your requirements.

n To all destinations — Access is allowed or denied to all destinations.n To a particular server — Access is allowed or denied to a particular server. Afterselecting this option, specify the IP address of the destination server.n Except to a particular server — Access is allowed or denied to servers other thanthe specified server. After selecting this option, specify the IP address of the destinationserver.n To a network — Access is allowed or denied to a network. After selecting this option,specify the IP address and netmask for the destination network.n Except to a network — Access is allowed or denied to networks other than thespecified network. After selecting this option, specify the IP address and netmask of thedestination network.n To a Domain Name — Access is allowed or denied to the specified domains. Afterselecting this option, specify the domain name in the Domain Name text box.

Log Select Log to create a log entry when this rule is triggered. The Central firewall supportsfirewall based logging. Firewall logs on the Instant APs are generated as security logs.

Blacklist Select Blacklist to blacklist the client when this rule is triggered. The blacklisting lasts forthe duration specified as Auth failure blacklist time on the BLACKLISTING tab of theSecurity window. For more information, see Blacklisting Clients on page 182.

Classify Media Select Classify Media to prioritize video and voice traffic. When enabled, a packetinspection is performed on all non-NAT traffic and the traffic is marked as follows:

n Video: Priority 5 (Critical)n Voice: Priority 6 (Internetwork Control)

Disable Scanning Select Disable Scanning to disable ARM scanning when this rule is triggered.The selection of the Disable Scanning applies only if ARM scanning is enabled. For moreinformation, see Configuring Radio Parameters on page 157.

DSCP Tag Select DSCP Tagto specify a DSCP value to prioritize traffic when this rule is triggered.Specify a value within the range of 0 to 63.

802.1 priority Select 802.1 priority to specify an 802.1 priority. Specify a value between 0 and 7.

Table 66: Access rule configuration parameters

7. Save the changes.

Page 175: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Configuring User RolesEvery client in the Central network is associated with a user role, which determines the client’s networkprivileges, the frequency of re-authentication, and the applicable bandwidth contracts. The user roleconfiguration on an Instant AP involves the following procedures:

n Creating a User Role on page 175

n Assigning Bandwidth Contracts to User Roles on page 175

Creating a User Role

To create a user role, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Security. The Security pane is displayed.

4. Click Roles. The Roles pane contents are displayed.

5. Under Roles, click New.

6. Enter a name for the new role and click OK.

You can also create a user role when configuring wireless profile. For more information, seeConfiguring Access Rules on page 142.

Assigning Bandwidth Contracts to User Roles

The administrators can manage bandwidth utilization by assigning maximum bandwidth rates, or bandwidthcontracts to user roles. The administrator can assign a bandwidth contract configured in Kbps to upstream(client to the Instant AP) or downstream (Instant AP to clients) traffic for a user role. The bandwidth contractwill not be applicable to the user traffic on the bridged out (same subnet) destinations. For example, if clientsare connected to an SSID, you can restrict the upstream bandwidth rate allowed for each user to 512 Kbps.

By default, all users that belong to the same role share a configured bandwidth rate for upstream ordownstream traffic. The assigned bandwidth will be served and shared among all the users. You can also assignbandwidth per user to provide every user a specific bandwidth within a range of 1 to 65535 Kbps. If there is nobandwidth contract specified for a traffic direction, unlimited bandwidth is allowed.

To assign bandwidth contracts to a user role:

1. Select Configuration > Wireless > Security. The Security pane contents are displayed.

2. Click Roles. The Roles pane contents are displayed.

3. Create a new role or select an existing role.

4. Under Access Rues For Selected Roles, click (+).5. Select Bandwidth Contract under Rule-Type.

6. Specify the downstream and upstream rates in Kbps. If the assignment is specific for each user, selectPeruser.

7. Click Save.

8. Associate the user role to a WLAN SSID or wired profile.

You can also create a user role and assign bandwidth contracts while Configuring an SSID.

Configuring Derivation RulesCentral allows you to configure role and VLAN derivation-rules. You can configure these rules to assign a userrole or VLAN to the clients connecting to an SSID or a wired profile. For more information on derivation rules,

Aruba Central | User Guide Wireless Management | 175

Page 176: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

176 | Wireless Management Aruba Central | User Guide

see Aruba Instant User Guide.

Creating a Role Derivation RuleYou can configure rules for determining the role that is assigned for each authenticated client.

When creating more than one role assignment rule, the first matching rule in the rule list is applied.

To create a role assignment rule, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Networks. The Networks page opens.

4. Select a network profile and click Edit.

5. Under Access, set the slider to Role Based.

6. Under Role Assignment Rules, click New. In New Role Assignment Rule, define a match method bywhich the string in Operand is matched with the attribute value returned by the authentication server.

7. Select the attribute from the Attribute list that the rule it matches against. The list of supportedattributes includes RADIUS attributes, dhcp-option, dot1x-authentication-type, mac-address, and mac-address-and-dhcp-options. For information on a list of RADIUS attributes, see RADIUS ServerAuthentication with VSA on page 166.

8. Select the operator from the Operator list. The following types of operators are supported:

n contains— The rule is applied only if the attribute value contains the string specified in Operand.

n Is the role— The rule is applied if the attribute value is the role.

n equals— The rule is applied only if the attribute value is equal to the string specified in Operand.

n not-equals— The rule is applied only if the attribute value is not equal to the string specified inOperand.

n starts-with— The rule is applied only if the attribute value starts with the string specified in Operand.

n ends-with— The rule is applied only if the attribute value ends with string specified in Operand.

n matches-regular-expression— The rule is applied only if the attribute value matches the regularexpression pattern specified in Operand. This operator is available only if the mac-address-and-dhcp-options attribute is selected in the Attribute list. The mac-address-and-dhcp-options attribute andmatches-regular-expression are applicable only for WLAN clients.

9. Enter the string to match in the String box.

10. Select the appropriate role from the Role list.

11. Click Save.

Configuring VLAN Derivation RulesThe users are assigned to a VLAN based on the attributes returned by the RADIUS server after usersauthenticate.

To configure VLAN derivation rules for an SSID profile:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Networks. The Networks page opens.

4. Select a network profile and click Edit.

Page 177: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

5. Under VLAN, select Dynamic under Client VLAN Assignment.

6. Click New to create a VLAN assignment rule. The New VLAN Assignment Rule window is displayed. Inthis window, you can define a match method by which the string in Operand is matched with the attributevalues returned by the authentication server.

7. Select an attribute from the Attribute list.

8. Select an operator from the Operator list. The following types of operators are supported:

n contains— The rule is applied only if the attribute value contains the string specified in Operand.

n equals— The rule is applied only if the attribute value is equal to the string specified in Operand.

n not-equals — The rule is applied only if the attribute value is not equal to the string specified inOperand.

n starts-with — The rule is applied only if the attribute value starts with the string specified in Operand.

n ends-with — The rule is applied only if the attribute value ends with string specified in Operand.

n matches-regular-expression — The rule is applied only if the attribute value matches the regularexpression pattern specified in Operand. This operator is available only if the mac-address-and-dhcp-options attribute is selected in the Attribute list. The mac-address-and-dhcp-options attribute andmatches-regular-expression are applicable only for the WLAN clients.

9. Enter the string to match in the String field.

10. Select the appropriate VLAN ID from VLAN.

11. Ensure that all other required parameters are configured.

12. Click Save to apply the changes.

Configuring Firewall Settings for Protection from ARP AttacksTo configure firewall settings, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Security. The Security page opens.

4. Click Firewall Settings and set the following options to Enabled:

n Drop Bad ARP—Drops the fake ARP packets.

n Fix Malformed DHCP—Fixes the malformed DHCP packets.

n ARP poison check—Triggers an alert on ARP poisoning caused by the rogue APs.

5. Click Save Settings.

Configuring ACL Rules for Application AnalyticsThis section describes the procedure for configuring access rules for application analytics. For information onconfiguring access rules based on web categories and web reputation, see Configuring Web Policy Enforcementon page 178.

To configure ACL rules for a user role, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device for which you want to configure the ACL rules.

3. On the navigation pane, click Security.

4. Under Roles, select the role for which you want to configure access rules.

5. Under Access Rules For Selected Roles, click (+) to add a new rule. The new rule window is displayed.

6. Under Rule Type, select Access Control.

Aruba Central | User Guide Wireless Management | 177

Page 178: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

178 | Wireless Management Aruba Central | User Guide

7. To configure access to applications or application categories, select a service category from the followinglist:

n Application category

n Application

8. Based on the selected service category, configure the following parameters:

Servicecategory Description

ApplicationCategory

Select the application categories to which you want to allow or deny access.

Application Select the applications to which you want to allow or deny access.

ApplicationThrottling

Application throttling allows you to set a bandwidth limit for an application and applicationcategories. For example, you can limit the bandwidth rate for video streaming applications such asYouTube or Netflix, or assign a low bandwidth to high risk sites.To specify a bandwidth limit:

1. Select the Application Throttling check box.2. Specify the Downstream and Upstream rates in Kbps.

Action Select one of the following actions:n Select Allow to allow access users based on the access rule.n Select Deny to deny access to users based on the access rule.

Log Select this check box if you want a log entry to be created when this rule is triggered. Centralsupports firewall based logging. Firewall logs on the Instant APs are generated as security logs.

Blacklist Select the Blacklist check box to blacklist the client when this rule is triggered. The blacklisting lastsfor the duration specified as Auth failure blacklist time on the Blacklisting tab of the Securitywindow. For more information, see Blacklisting Clients on page 182.

DisableScanning

Select Disable scanning check box to disable ARM scanning when this rule is triggered.The selection of the Disable scanning applies only if ARM scanning is enabled, For moreinformation, see Configuring Radio Parameters on page 157.

DSCP Tag Select this check box to add a DSCP tag to the rule. DSCP is an L3 mechanism for classifying andmanaging network traffic and providing QoS on the network. To assign a higher priority, specify ahigher value.

802.1priority

Select this check box to enable 802.1 priority. 802.1p is an L2 protocol for traffic prioritization tomanage QoS on the network. There are eight levels of priority, 0-7. To assign a higher priority,specify a higher value.

Table 67: Access Rule Configuration Parameters

3. Click Save.

Configuring Web Policy EnforcementYou can configure web policy enforcement on an AP to block certain categories of websites based on yourorganization specifications by defining ACL rules.

To configure web policy enforcement:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device for which you want to configure web policyenforcement rules.

Page 179: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

3. On the navigation pane, click Security.

4. Under Roles, select the role to modify.

5. Under Access Rules For Selected Roles, click (+) to add a new rule. The new rule window is displayed.

6. Under Rule Type, select Access Control.7. To set an access policy based on web categories:

a. Under Service, select Web Category.

b. Select the categories to which you want to deny or allow access. You can also search for a webcategory and select the required option.

c. Under Action, select Allow or Deny.

d. Click Save.

8. To filter access based on the security ratings of the website:

a. Select Web Reputation under Service.

b. Move the slider to select a specific web reputation value to deny access to websites with a reputationvalue lower than or equal to the configured value or to permit access to websites with a reputation valuehigher than or equal to the configured value. The following options are available:

n Trustworthy WRI > 81—These are well known sites with strong security practices and may not exposethe user to security risks. There is a very low probability that the user will be exposed to malicious links orpayloads.

n Low Risk WRI 61-80—These are benign sites and may not expose the user to security risks. There is alow probability that the user will be exposed to malicious links or payloads.

n Moderate WRI 41-60—These are generally benign sites, but may pose a security risk. There is someprobability that the user will be exposed to malicious links or payloads.

n Suspicious WRI 21-40—These are suspicious sites. There is a higher than average probability that theuser will be exposed to malicious links or payloads.

n High Risk WRI < 20—These are high risk sites. There is a high probability that the user will be exposedto malicious links or payloads.

c. Under Action, select Allow or Deny as required.

9. To set a bandwidth limit based on web category or web reputation score, select the ApplicationThrottling check box and specify the downstream and upstream rates in Kbps. For example, you can set ahigher bandwidth for trusted sites and a low bandwidth rate for high risk sites.

10. If required, select the following check boxes:

n Log — Select this check box if you want a log entry to be created when this rule is triggered. Centralsupports firewall based logging. Firewall logs on the Instant APs are generated as security logs.

n Blacklist — Select this check box to blacklist the client when this rule is triggered. The blacklisting lastsfor the duration specified as Auth Failure Blacklist Time on the Blacklisting pane of the Securitywindow. For more information, see Blacklisting Clients on page 182.

n Disable Scanning—Select Disable scanning check box to disable ARM scanning when this rule istriggered. The selection of the Disable scanning applies only if ARM scanning is enabled, For moreinformation, see Configuring Radio Parameters on page 157.

n DSCP Tag—Select this check box to add a DSCP tag to the rule. DSCP is an L3 mechanism for classifyingand managing network traffic and providing QoS on the network. To assign a higher priority, specify ahigher value.

n 802.1 priority—Select this check box to enable 802.1 priority. 802.1p is an L2 protocol for trafficprioritization to manage QoS on the network. There are eight levels of priority, 0-7. To assign a higherpriority, specify a higher value.

11. Click Save to save the rules.

Aruba Central | User Guide Wireless Management | 179

Page 180: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

180 | Wireless Management Aruba Central | User Guide

12. Click Save Settings in the Roles pane to save the changes to the role for which you defined ACL rules.

Creating Custom URLs for RedirectionYou can create a list of URLs to redirect users to when they access blocked websites. You can define an accessrule to use these redirect URLs and assign the rule to a user role in the WLAN network.

Creating a List of Error Page URLsTo create a list of error page URLs, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the navigation pane, click Security.

4. Under Custom Blocked Page URL, click + and enter the URL to block.

5. Repeat the procedure to add more URLs. You can add up to 8 URLs to the list of blocked web pages.

6. Click OK.

Configuring ACL Rules to Redirect Users to a Specific URLTo configure ACL rules to redirect users to a specific URL:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device for which you want to configure the ACL rules.

3. On the navigation pane, click Security.

4. Under Roles, select the role for which you want to configure access rules.

5. Click + in the Access Rules section. The New Rule window opens.

6. Select the rule type as Blocked Page URL.

7. Select the URLs from the existing list of custom redirect URLs. To add a new URL, click +.

8. Save the changes.

Managing Inbound TrafficCentral supports an enhanced inbound firewall by allowing the configuration of management subnets andrestricting corporate access through an uplink switch.

To allow flexibility in firewall configuration, Central supports the following features:

n Configurable management subnets

n Restricted corporate access

Configuring Management SubnetsYou can configure subnets to ensure that the Instant AP management is carried out only from these subnets.When the management subnets are configured, Telnet, SSH, and UI access is restricted to these subnets only.

To configure management subnets, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Security. The Security page opens.

4. Click Firewall Settings.

Page 181: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

5. To add a new management subnet, complete the following steps:

n Enter the subnet address in Subnet.

n Enter the subnet mask in Mask.n Click Add.

6. To add multiple subnets, repeat step 2.

7. Click Save Settings.

Configuring Restricted Access to Corporate NetworkYou can configure restricted corporate access to block unauthorized users from accessing the corporatenetwork. When restricted corporate access is enabled, corporate access is blocked from the uplink port ofmaster Instant AP, including clients connected to a slave Instant AP.

To configure restricted corporate access, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Security. The Security page opens.

4. Click Firewall Settings5. Enable Restrict Corporate Access.

6. Click Save Settings.

Disabling Auto Topology RulesIf the firewalls rules are configured, the Auto Topology Rules are enabled by default. When the inboundfirewall settings are enabled:

n ACEs must be configured to block auto topology messages, as there is no default rule at the top ofpredefined ACLs.

n ACEs must be configured to override the guest VLAN auto-expanded ACEs. In other words, the user definedACEs take higher precedence over guest VLAN ACEs.

To disable the auto topology rules, set the Auto Topology Rules to OFF.

Configuring ALG ProtocolsTo configure protocols for ALG, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Security. The Security page opens.

4. Click Firewall Settingss5. Under Application Layer Gateway (ALG) Algorithms, select Enabled against the correspondingprotocol to enable SIP, VOCERA, ALCATEL NOE, and CISCO SKINNY protocols.

6. Click Save Settings.

When the protocols for the ALG are Disabled the changes do not take effect until the existing usersessions have expired. Reboot the Instant AP and the client, or wait a few minutes for changes to takeeffect.

Aruba Central | User Guide Wireless Management | 181

Page 182: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

182 | Wireless Management Aruba Central | User Guide

Blacklisting ClientsThe client blacklisting denies connection to the blacklisted clients. When a client is blacklisted, it is not allowedto associate with an Instant AP in the network. If a client is connected to the network when it is blacklisted, adeauthentication message is sent to force client disconnection.

Blacklisting Clients ManuallyManual blacklisting adds the MAC address of a client to the blacklist. These clients are added into a permanentblacklist. These clients are not allowed to connect to the network unless they are removed from the blacklist.

To add a client to the blacklist manually:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Security. The Security page opens.

4. Click Blacklisting.

5. Click + and enter the MAC address of the client to be blacklisted in Enter A New MAC Address.

6. Click Ok. The Blacklisted Since field displays the time at which the current blacklisting has started forthe client.

To delete a client from the manual blacklist, select the MAC Address of the client under the ManualBlacklisting, and then click Delete.

Blacklisting Clients DynamicallyThe clients can be blacklisted dynamically when they exceed the authentication failure threshold or when ablacklisting rule is triggered as part of the authentication process.

When a client takes time to authenticate and exceeds the configured failure threshold, it is automaticallyblacklisted by an Instant AP.

In session firewall based blacklisting, an ACL rule automates blacklisting. When the ACL rule is triggered, it sendsout blacklist information and the client is blacklisted.

To configure the blacklisting duration:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Security. The Security page opens.

4. Click Blacklisting5. Under Dynamic Blacklisting:

a. For Auth Failure Blacklist Time, enter the duration after which the clients that exceed theauthentication failure threshold must be blacklisted.

b. For PEF Rule Blacklised Time, enter the duration after which the clients can be blacklisted due to anACL rule trigger.

You can configure a maximum number of authentication failures by the clients, after which aclient must be blacklisted. For more information on configuring maximum authentication failureattempts, see Configuring Security Settings on page 139.

Page 183: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Configuring VPN NetworksThis section describes the following VPN configuration procedures:

n VPN Overview on page 183

n Configuring VPN Tunnels on page 184

n Configuring Routing Profiles on page 188

VPN OverviewAs Instant APs use a Virtual Controller architecture, the Instant AP network does not require a physicalcontroller to provide the configured WLAN services. However, a physical controller is required for terminatingVPN tunnels from the Instant AP networks at branch locations or data centers, where the Aruba controller actsas a VPN Concentrator.

When the VPN is configured, the Instant AP acting as the Virtual Controller creates a VPN tunnel to ArubaMobility Controller in your corporate office. The controller acts as a VPN endpoint and does not supply theInstant AP with any configuration.

The VPN features are recommended for:

n Enterprises with many branches that do not have a dedicated VPN connection to the corporate office.

n Branch offices that require multiple APs.

n Individuals working from home, connecting to the VPN.

Aruba Central | User Guide Wireless Management | 183

Page 184: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

184 | Wireless Management Aruba Central | User Guide

Supported VPN ProtocolsInstant APs support the following VPN protocols for remote access:

VPN Protocol Description

Aruba IPsec IPsec is a protocol suite that secures IP communications by authenticating and encrypting each IPpacket of a communication session.You can configure an IPsec tunnel to ensure that to ensure that the data flow between thenetworks is encrypted. However, you can configure a split-tunnel to encrypt only the corporatetraffic.When IPsec is configured, ensure that you add the Instant AP MAC addresses to the whitelistdatabase stored on the controlleror an external server. IPsec supports Local, L2, and L3 modes ofIAP-VPN operations.NOTE: The Instant APs support IPsec only with Aruba Controllers.

Layer-2 (L2)GRE

GRE is a tunnel protocol for encapsulating multicast, broadcast, and L2 packets between a GRE-capable device and an endpoint. Instant APs support the configuration of L2 GRE (Ethernet overGRE) tunnel with an ArubaController to encapsulate the packets sent and received by the InstantAP.You can use the GRE configuration for L2 deployments when there is no encryption requirementbetween the Instant AP and controller for client traffic.Instant APs support two types of GRE configuration:

n Manual GRE—The manual GRE configuration sends unencrypted client traffic with anadditional GRE header and does not support failover. When manual GRE is configured on theInstant AP, ensure that the GRE tunnel settings are enabled on the controller.n Aruba GRE—With Aruba GRE, no configuration on the controller is required except foradding the Instant AP MAC addresses to the whitelist database stored on the controller or anexternal server. Aruba GRE reduces manual configuration when Per-AP tunnel configurationis required and supports failover between two GRE endpoints.

NOTE: Instant APs support manual and Aruba GRE configuration only for L2 mode of operations.Aruba GRE configuration is supported only with Aruba Controllerss.

L2TP The L2TP version 3 feature allows Instant AP to act as L2TP Access Concentrator (LAC) and tunnelall wireless clients L2 traffic from AP to LNS. In a centralized L2 model, the VLAN on the corporateside are extended to remote branch sites. Wireless clients associated with Instant AP gets the IPaddress from the DHCP server running on LNS. For this, AP has to transparently allow DHCPtransactions through the L2TPv3 tunnel.

Table 68: VPN Protocols

Configuring VPN TunnelsInstant AP supports the configuration of tunneling protocols such as GRE, IPsec, and L2TPv3. This sectiondescribes the procedure for configuring VPN host settings on an Instant AP to enable communication with acontroller in a remote location:

n Configuring IPsec Tunnel on page 184

n Enabling Automatic Configuration of GRE Tunnel on page 185

n Configuring GRE Tunnel Manually on page 186

n Configuring an L2TPv3 Tunnel on page 187

Configuring IPsec TunnelAn IPsec tunnel is configured to ensure that the data flow between the networks is encrypted. Whenconfigured, the IPsec tunnel to the controller secures corporate data. You can configure an IPsec tunnel fromVirtual Controller using Central.

To configure a tunnel using the IPsec Protocol, complete the following steps:

1. From the app selector, click Wireless Management.

Page 185: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

2. From the group selector, select a group or a device.

3. On the left navigation pane, click VPN.

4. Click Controller.

5. Select Aruba IPSec from the Protocol drop-down list.

6. Enter the IP address or FQDN for the main VPN/IPsec endpoint in the Primary host field.

7. Enter the IP address or FQDN for the backup VPN/IPsec endpoint in the Backup host field. This entry isoptional. When you specify the primary and backup host details, the other fields are displayed.

8. Specify the following parameters.

a. To allow the VPN tunnel to switch back to the primary host when it becomes available again, select thePreemption check box. This step is optional.

b. If Preemption is enabled, specify a value in seconds for Hold time. When preemption is enabled andthe primary host comes up, the VPN tunnel switches to the primary host after the specified hold-time.The default value for Hold time is 600 seconds.

c. To allow the Instant AP to create a backup VPN tunnel to the controller along with the primary tunnel,and maintain both the primary and backup tunnels separately, select the Fast failover check box. Whenfast failover is enabled and if the primary tunnel fails, the Instant AP can switch the data stream to thebackup tunnel. This reduces the total failover time to less than one minute.

d. Specify a value in seconds for Secs between test packets. Based on the configured frequency, theInstant AP can verify if an active VPN connection is available. The default value is 5 seconds, whichmeans that the Instant AP sends one packet to the controller every 5 seconds.

e. Enter a value for Max allowed test packet loss, to define a number for lost packets, after which theInstant AP can determine that the VPN connection is unavailable. The default value is 2.

f. To disconnect all wired and wireless users when the system switches during VPN tunnel transition fromprimary to backup and backup to primary, select the Reconnect user on failover check box.

g. To configure an interval for which wired and wireless users are disconnected during a VPN tunnelswitch, specify a value in seconds for Reconnect time on failover within a range of 30-900 seconds.By default, the reconnection duration is set to 60 seconds. The Reconnect time on failover field isdisplayed only when Reconnect user on failover is enabled.

9. When the IPsec tunnel configuration is completed, the packets that are sent from and received by anInstant AP are encrypted.

Enabling Automatic Configuration of GRE TunnelYou can configure an Instant AP to automatically set up a GRE tunnel from the Instant AP to controller by usingCentral.

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click VPN.

4. Click Controller.

5. Select Aruba GRE from the Protocol drop-down list.

6. Enter the IP address or FQDN for the main VPN/IPsec endpoint in the Primary host field.

7. Enter the IP address or FQDN for the backup VPN/IPsec endpoint in the Backup host field. This entry isoptional. When you enter the primary host IP address and backup host IP address, other fields aredisplayed.

8. Specify the following parameters. A sample configuration is shown in .

a. To allow the VPN tunnel to switch back to the primary host when it becomes available again, select thePreemption check box. This step is optional.

Aruba Central | User Guide Wireless Management | 185

Page 186: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

186 | Wireless Management Aruba Central | User Guide

b. If Preemption is enabled, specify a value in seconds for Hold time. When preemption is enabled andthe primary host comes up, the VPN tunnel switches to the primary host after the specified hold time.The default value for Hold time is 600 seconds.

c. To allow the Instant AP to create a backup VPN tunnel to the controller along with the primary tunnel,and maintain both the primary and backup tunnels separately, select the Fast failover check box. If theprimary tunnel fails, the Instant AP can switch the data stream to the backup tunnel. This reduces thetotal failover time to less than one minute.

d. To disconnect all wired and wireless users when the system switches during VPN tunnel transitionfrom primary to backup and backup to primary, select the Reconnect user on failover.

e. To configure an interval for which wired and wireless users are disconnected during a VPN tunnelswitch, specify a value in seconds for Reconnect time on failover within the range of 30—900seconds. By default, the reconnection duration is set to 60 seconds.

f. Specify a value in seconds for Secs between test packets. Based on the configured frequency, theInstant AP can verify if an active VPN connection is available. The default value is 5 seconds, whichmeans that the Instant AP sends one packet to the controller every 5 seconds.

g. Enter a value for Max allowed test packet loss, to define a number for lost packets, after which theInstant AP can determine that the VPN connection is unavailable. The default value is 2.

h. Select the Per-AP tunnel check box. The administrator can enable this option to create a GRE tunnelfrom each Instant AP to the VPN/GRE Endpoint rather than the tunnels created just from the masterInstant AP. When enabled, the traffic to the corporate network is sent through a Layer-2 GRE tunnelfrom the Instant AP itself and need not be forwarded through the master Instant AP.

9. Click Next to continue.

Configuring GRE Tunnel ManuallyYou can also manually configure a GRE tunnel by configuring the GRE tunnel parameters on the Instant AP andcontroller. This procedure describes the steps involved in the manual configuration of a GRE tunnel fromVirtual Controller by using Central.

During the manual GRE setup, you can either use the Virtual Controller IP or the Instant AP IP to create the GREtunnel at the controller side depending upon the following Instant AP settings:

n If a Virtual Controller IP is configured and if Per-AP tunnel is disabled, the Virtual Controller IP is used tocreate the GRE tunnel.

n If a Virtual Controller IP is not configured or if Per-AP tunnel is enabled, the Instant AP IP is used to createthe GRE tunnel.

To configure the GRE tunnel manually, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click VPN.

4. Click Controller.

5. Select Manual GRE from the Protocol drop-down list.

6. Specify the following parameters.

a. Enter an IP address or the FQDN for the main VPN/GRE endpoint.

b. Enter a value for the GRE type parameter.

c. Select the Per-AP tunnel check box. The administrator can enable this option to create a GRE tunnelfrom each Instant AP to the VPN/GRE Endpoint rather than the tunnels created just from the masterInstant AP. When enabled, the traffic to the corporate network is sent through a Layer-2 GRE tunnelfrom the Instant AP itself and need not be forwarded through the master Instant AP.

Page 187: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

By default, the Per-AP tunnel option is disabled.

7. When the GRE tunnel configuration is completed on both the Instant AP and Controller, the packets sentfrom and received by an Instant AP are encapsulated, but not encrypted.

Configuring an L2TPv3 TunnelThe Layer 2 Tunneling Protocol version 3 (L2TPv3) feature allows Instant AP to act as L2TP Access Concentrator(LAC) and tunnel all wireless clients L2 traffic from AP to LNS. In a centralized L2 model, the VLAN on thecorporate side are extended to remote branch sites. Wireless clients associated with Instant AP gets the IPaddress from the DHCP server running on LNS. For this, AP has to transparently allow DHCP transactionsthrough the L2TPv3 tunnel.

To configure an L2TPv3 tunnel by using Central, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click VPN.

4. Click Controller.

5. Select L2TPv3 from the Protocol drop-down list.

6. To configure a tunnel profile:

a. Turn on the Enable Tunnel Profile toggle switch.

b. Enter the profile name.

c. Enter the primary server IP address.

d. Enter the remote end backup tunnel IP address. This is an optional field and is required only whenbackup server is configured.

e. Enter the peer UDP and local UDP port numbers. The default value is 1701.

f. Enter the interval at which the hello packets are sent through the tunnel. The default value is 60seconds.

g. Select the message digest as MD5 or SHA used for message authentication.

h. Enter a shared key for the message digest. This key should match with the tunnel end point sharedkey.

i. If required, set the failover mode. The following two failover modes are supported:

n Preemptive—In this mode, if the primary comes up when the backup is active, the backup tunnel isdeleted and the primary tunnel resumes as an active tunnel. If you configure the tunnel to bepreemptive, and when the primary tunnel goes down, it starts the persistence timer which tries tobring up the primary tunnel.

n Non-Preemptive—In this mode, when the backup tunnel is established after the primary tunnel goesdown, it does not make the primary tunnel active again.

j. Set an interval between every failover retry. The default value is 60 seconds.

k. Configure a number of retries before the tunnel fails over.

l. Ensure that Checksum is disabled.

m. Specify a value for the tunnel MTU value if required. The default value is 1460.

n. Click Save.

7. To configure a session profile:

a. Turn on the Enable Tunnel Profile toggle switch.

b. Enter the session profile name.

Aruba Central | User Guide Wireless Management | 187

Page 188: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

188 | Wireless Management Aruba Central | User Guide

c. Enter the tunnel profile name where the session will be associated.

d. Configure the tunnel IP address with the corresponding network mask and VLAN ID. This is requiredto reach an AP from a corporate network. For example, SNMP polling.

e. Select the cookie length and enter a cookie value corresponding to the length. By default, the cookielength is not set.

f. Click Save.

Configuring Routing ProfilesCentral can terminate a single VPN connection on Aruba Mobility Controller. The routing profile defines thecorporate subnets which need to be tunneled through IPsec.

You can configure routing profiles to specify a policy based on routing into the VPN tunnel.

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click VPN.

4. Click Routing.

5. Click New. The route parameters to configure are displayed.

6. Update the following parameters:

n Destination— Specify the destination network that is reachable through the VPN tunnel. This definesthe IP or subnet that must reach through the IPsec tunnel. Traffic to the IP or subnet defined here will beforwarded through the IPsec tunnel.

n Netmask— Specify the subnet mask to the destination defined for Destination.

n Gateway— Specify the gateway to which traffic must be routed. This IP address must be the controllerIP address on which the VPN connection is terminated. If you have a primary and backup host, configuretwo routes with the same destination and netmask, but ensure that the gateway is the primarycontroller IP for one route and the backup controller IP for the second route.

7. Click OK.

8. Click Finish.

Configuring DHCP and Client IP Assignment ModesThis section provides the following information:

n Configuring DHCP Scopes on page 188

n Configuring DHCP Server for Client IP Assignment on page 193

Configuring DHCP ScopesThe VC supports the following types different modes of DHCP address assignment:

n Configuring Distributed DHCP Scopes on page 188

n Configuring a Centralized DHCP Scope on page 190

n Configuring Local DHCP Scopes on page 192

Configuring Distributed DHCP ScopesCentral allows you to configure the DHCP address assignment for the branches connected to the corporatenetwork through VPN. You can configure the range of DHCP IP addresses used in the branches and thenumber of client addresses allowed per branch. You can also specify the IP addresses that must be excluded

Page 189: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

from those assigned to clients, so that they are assigned statically.

Central supports the following distributed DHCP scopes:

n Distributed, L2 — In this mode, the VC acts as the DHCP server, but the default gateway is in the datacenter. Based on the number of clients specified for each branch, the range of IP addresses is divided.Based on the IP address range and client count configuration, the DHCP server in the VC controls a scopethat is a subset of the complete IP Address range for the subnet distributed across all the branches. ThisDHCP Assignment mode is used with the L2 forwarding mode.

n Distributed, L3 — In this mode, the VC acts as the DHCP server and the default gateway. Based on thenumber of clients specified for each branch, the range of IP addresses is divided. Based on the IP addressrange and client count configuration, the DHCP server in the VC is configured with a unique subnet and acorresponding scope.

To configure distributed DHCP scopes such as Distributed, L2 or Distributed, L3.

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click DHCP.

4. To configure a distributed DHCP mode, click + under Distributed DHCP Scopes. The New DHCP Scopepane is displayed.

5. Based on the type of distributed DHCP scope, configure the following parameters:

Data paneitem Description

Name Enter a name for the DHCP scope.

Type Select any of the following options:n Distributed, L2— On selecting Distributed, L2, the VC acts as the DHCP Server but thedefault gateway is in the data center. Traffic is bridged into VPN tunnel.n Distributed, L3— On selecting Distributed, L3, the VC acts as both DHCP Server anddefault gateway. Traffic is routed into the VPN tunnel.

VLAN Specify a VLAN ID. To use this subnet, ensure that the VLAN ID specified here is assigned to anSSID profile.

Netmask If Distributed, L2 is selected for type of DHCP scope, specify the subnet mask. The subnet maskand the network determine the size of subnet.

Default Router If Distributed, L2 is selected for type of DHCP scope, specify the IP address of the defaultrouter.

DNS Server If required, specify the IP address of a DNS server.

Domain Name If required, specify the domain name.

Table 69: Distributed DHCP scope configuration parameters

Aruba Central | User Guide Wireless Management | 189

Page 190: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

190 | Wireless Management Aruba Central | User Guide

Data paneitem Description

Lease Time Specify a lease time for the client in minutes.

IPAddress Range

Specify a range of IP addresses to use. To add another range, click the + icon. You can specify upto four different ranges of IP addresses.

n For Distributed, L2 mode, ensure that all IP ranges are in the same subnet as the defaultrouter. On specifying the IP address ranges, a subnet validation is performed to ensure thatthe specified ranges of IP address are in the same subnet as the default router and subnetmask. The configured IP range is divided into blocks based on the configured client count.n For Distributed, L3 mode, you can configure any discontiguous IP ranges. The configured IPrange is divided into multiple IP subnets that are sufficient to accommodate the configuredclient count.

NOTE: You can allocate multiple branch IDs (BID) per subnet. The Instant AP generates a subnetname from the DHCP IP configuration, which the controller can use as a subnet identifier. If staticsubnets are configured in each branch, all of them are assigned the with BID 0, which is mappeddirectly to the configured static subnet.

Option Specify the type and a value for the DHCP option. You can configure the organization-specificDHCP options supported by the DHCP server. For example, 176, 242, 161, and so on. To addmultiple DHCP options, click the + icon. You can add up to eight DHCP options.

Table 69: Distributed DHCP scope configuration parameters

6. Click Next.

7. Specify the number of clients to use per branch. The client count configured for a branch determines theuse of IP addresses from the IP address range defined for a DHCP scope. For example, if 20 IP addressesare available in an IP address range configured for a DHCP scope and a client count of 9 is configured, only afew IP addresses (in this example, 9) from this range will be used and allocated to a branch. The Instant APdoes not allow the administrators to assign the remaining IP addresses to another branch, although a lowervalue is configured for the client count.

8. Click Next. The Static IP tab is displayed. Specify the number of first and last IP addresses to reserve inthe subnet.

9. Click Finish.

Configuring a Centralized DHCP ScopeThe centralized DHCP scope supports L2 and L3 clients.

When a centralized DHCP scope is configured:

n The Virtual Controller does not assign an IP address to the client and the DHCP traffic is directly forwardedto the DHCP Server.

n For L2 clients, the Virtual Controller bridges the DHCP traffic to the controller over the VPN/GRE tunnel. TheIP address is obtained from the DHCP server behind the controller serving the VLAN/GRE of the client. ThisDHCP assignment mode also allows you to add the DHCP option 82 to the DHCP traffic forwarded to thecontroller.

n For L3 clients, the Virtual Controller acts as a DHCP relay agent that forwards the DHCP traffic to the DHCPserver located behind the controller in the corporate network and reachable through the IPsec tunnel. Thecentralized L3 VLAN IP is used as the source IP. The IP address is obtained from the DHCP server.

To configure a centralized DHCP scope:

1. From the app selector, click Wireless Management.

Page 191: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

2. From the group selector, select a group or a device.

3. On the left navigation pane, click DHCP.

4. To configure Centralized DHCP scopes, click + under Centralized DHCP Scopes. The New DHCPScope data pane is displayed.

5. Based on type of DHCP scope, configure the following parameters:

Datapaneitem

Description

Name Enter a name for the DHCP scope.

VLAN Specify a VLAN ID. To use this subnet, ensure that the VLAN ID specified here is assigned to an SSIDprofile.

SplitTunnel

Enable the split tunnel function if you want allow a VPN user to access a public network and a local LANorWAN network at the same time through the same physical network connection. For example, a user canuse a remote access VPN software client connecting to a corporate network using a home wirelessnetwork. When the split tunnel function is enabled, the user can connect to file servers, databaseservers, mail servers, and other servers on thecorporate network through the VPN connection.When the user connects to resources on the Internet (websites, FTP sites, and so on), the connectionrequest goes directly to the gateway provided by the home network. The split DNS functionalityintercepts DNS requests from clients for non-corporate domains (as configured in Enterprise Domainslist) and forwards to the Instant AP's own DNS server.When split tunnel is disabled, all the traffic including the corporate and the Internet traffic is tunneledirrespective of the routing profile specifications. If the GRE tunnel is down and when the corporatenetwork is not reachable, the client traffic is dropped.

DHCPRelay

Select Enabled to allow the Instant APs to intercept the broadcast packets and relay DHCP requests.

HelperAddress

Enter the IP address of the DHCP server.

VLANIP

Specify the VLAN IP address of the DHCP relay server.

VLANMask

Specify the VLAN subnet mask of the DHCP relay server.

Option82

This option is available only if Centralized is selected. Select Alcatel to enable DHCP Option 82 to allowclients to send DHCP packets with the Option 82 string.The Option 82 string is available only in the Alcatel (ALU) format. The ALU format for the Option 82string consists of the following:Remote Circuit ID; X AP-MAC; SSID; SSID-TypeRemote Agent; X IDUE-MAC

Table 70: DHCP mode configuration parameters

6. Click OK.

The Option 82 is specific to Alcatel and is not configurable in this version of Central.

The following table describes the behavior of the DHCP Relay Agent and Option 82 in the Instant AP.

Aruba Central | User Guide Wireless Management | 191

Page 192: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

192 | Wireless Management Aruba Central | User Guide

DHCP relay Option 82 Behavior

Enabled Enabled DHCP packet relayed with the ALU-specific Option 82 string

Enabled Disabled DHCP packet relayed without the ALU-specific Option 82 string

Disabled Enabled DHCP packet not relayed, but broadcast with the ALU-specific Option 82 string

Disabled Disabled DHCP packet not relayed, but broadcast without the ALU-specific Option 82 string

Table 71: DHCP relay and option 82

Configuring Local DHCP ScopesYou can configure the following types of local DHCP scopes on an Instant AP:

n Local—In this mode, the VC acts as both the DHCP Server and default gateway. The configured subnet andthe corresponding DHCP scope are independent of subnets configured in other Instant AP clusters. The VCassigns an IP address from a local subnet and forwards traffic to both corporate and non-corporatedestinations. The network address is translated appropriately and the packet is forwarded through theIPsec tunnel or through the uplink. This DHCP assignment mode is used for the NAT forwarding mode.

n Local, L2—In this mode, the VC acts as a DHCP server and the gateway is located outside the Instant AP.

n Local, L3—In this mode, the VC acts as a DHCP server and default gateway, and assigns an IP address fromthe local subnet. The Instant AP routes the packets sent by clients on its uplink. This DHCP assignmentmode is used with the L3 forwarding mode.

To configure a new local DHCP scope, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click DHCP.

4. Click Local DHCP Scopes.

5. Click + to add new local DHCP scope. The New DHCP Scope pane opens.

6. Based on type of DHCP scope, configure the following parameters:

Data paneitem Description

Name Enter a name for the DHCP scope.

Type Select any of the following options:n Local— On selecting Local, the DHCP server for local branch network is used for keepingthe scope of the subnet local to the Instant AP. In the NAT mode, the traffic is forwardedthrough the uplink.n Local, L2—On selecting Local, L2, the VC acts as a DHCP server and a default gateway inthe local network is used.n Local, L3—On selecting Local, L3, the VC acts as a DHCP server and gateway.

VLAN Enter the VLAN ID. To use this subnet, ensure that the VLAN ID specified here is assigned to anSSID profile.

Table 72: Local DHCP configuration parameters

Page 193: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Data paneitem Description

Network Specify the network to use.

Netmask Specify the subnet mask. The subnet mask and the network determine the size of subnet.

ExcludedAddress

Specify a range of IP addresses to exclude. You can add up to two exclusion ranges. Based on thesize of the subnet and the value configured for Excluded address, the IP addresses eitherbefore or after the defined range are excluded.

DefaultRouter

Enter the IP address of the default router.

DNS Server Enter the IP address of a DNS server.

Domain Name Enter the domain name.

Lease Time Enter a lease time for the client in minutes.

Option Specify the type and a value for the DHCP option. You can configure the organization-specificDHCP options supported by the DHCP server. To add multiple DHCP options, click the (+) icon.

Table 72: Local DHCP configuration parameters

7. Click OK.

Configuring DHCP Server for Client IP AssignmentThe DHCP server is a built-in server, used for networks in which clients are assigned IP address by the VC. Youcan customize the DHCP pool subnet and address range to provide simultaneous access to more number ofclients. The largest address pool supported is 2048. The default size of the IP address pool is 512.

When the DHCP server is configured and if the Client IP assignment parameter for an SSID profile is setto Virtual Controller Assigned, the Virtual Controller assigns the IP addresses to the WLAN or wiredclients. By default, the Instant AP automatically determines a suitable DHCP pool for Virtual ControllerAssigned networks.The Instant AP typically selects the 172.31.98.0/23 subnet. If the IP address of the Instant AP is within the172.31.98.0/23 subnet, the Instant AP selects the 10.254.98.0/23 subnet. However, this mechanism doesnot avoid all possible conflicts with the wired network. If your wired network uses either 172.31.98.0/23 or10.254.98.0/23, and you experience problems with the Virtual Controller Assigned networks afterupgrading to Aruba Central, manually configure the DHCP pool by following the steps described in thissection.

To configure a domain name, DNS server, and DHCP server for client IP assignment.

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click System. The System page for the selected group or device opens.

4. Click DHCP.

5. Enter the domain name of the client in Domain Name.

6. Enter the IP addresses of the DNS servers in DNS Server. To add another DNS server, click the + icon.

7. Enter the duration of the DHCP lease in Lease Time.

Aruba Central | User Guide Wireless Management | 193

Page 194: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

194 | Wireless Management Aruba Central | User Guide

8. Select Minutes, Hours, or Days for the lease time from the list next to Lease Time. The default leasetime is 0.

9. Enter the network in the Network box.

10. Enter the mask in the Mask box.

To provide simultaneous access to more than 512 clients, use the Network and Mask fields to specify alarger range. While the network (or prefix) is the common part of the address range, the mask (suffix)specifies how long the variable part of the address range is.

11. Click Save Settings.

Configuring ServicesThis section describes how to configure AirGroup, location services, Lawful Intercept, OpenDNS, and Firewallservices.

n Configuring AirGroup Services on page 194

n Configuring an Instant AP for RTLS Support on page 196

n Configuring an Instant AP for ALE Support on page 196

n Managing BLE Beacons on page 197

n Configuring OpenDNS Credentials on page 198

n Configuring CALEA Server for Lawful Intercept Compliance on page 198

n Integrating a Third-Party Network Firewall on page 199

n Configuring XML API Interface on page 200

n Enabling AppRF™ Service on page 200

Configuring AirGroup ServicesAirGroup is a zero configuration networking protocol that enables service discovery, address assignment, andname resolution for desktop computers, mobile devices, and network services. It is designed for flat, single-subnet IP networks such as wireless networking at home.

Bonjour can be installed on computers running Microsoft Windows and is supported by the new network-capable printers. Bonjour uses multicast DNS (mDNS) to locate devices and the services offered by thesedevices. The AirGroup solution supports both wired and wireless devices. Wired devices that support Bonjourservices are part of AirGroup when connected to a VLAN that is terminated on the Virtual Controller.

In addition to the mDNS protocol, Instant APs also support UPnP, and DLNA enabled devices. DLNA is anetwork standard derived from UPnP, which enables devices to discover the services available in a network.

DLNA also provides the ability to share data between the Windows or Android-based multimedia devices. Allthe features and policies applicable to mDNS are extended to DLNA to ensure full interoperability betweencompliant devices.

AirGroup FeaturesAirGroup provides the following features:

n Send unicast responses to mDNS queries and reduces mDNS traffic footprint.

n Ensure cross-VLAN visibility and availability of AirGroup devices and services.

n Allow or block AirGroup services for all users.

n Allow or block AirGroup services based on user roles.

Page 195: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

n Allow or block AirGroup services based on VLANs.

For more information on AirGroup solution, see Aruba Instant User Guide.

AirGroup ServicesBonjour supports zero-configuration services. The services are pre-configured and are available as part of thefactory default configuration. The administrator can also enable or disable any or all services.

The following services are available for Instant AP clients:

n AirPlay — Apple AirPlay allows wireless streaming of music, video, and slide shows from your iOS device toApple TV and other devices that support the AirPlay feature.

n AirPrint — Apple AirPrint allows you to print from an iPad, iPhone, or iPod Touch directly to any AirPrintcompatible printer.

n iTunes— The iTunes service is used by iTunes Wi-Fi sync and iTunes home-sharing applications across allApple devices.

n RemoteMgmt— Use this service for remote login, remote management, and FTP utilities on Apple devices.

n Sharing— Applications such as disk sharing and file sharing, use the service ID that are part of this service onone or more Apple devices.

n Chat— The iChat® (Instant Messenger) application on Apple devices uses this service.

n ChromeCast—The ChromeCast service allows you to use a ChromeCast device to play audio or videocontent on a high-definition television by streaming content through Wi-Fi from the Internet or localnetwork.

n DLNA Media—Applications such as Windows Media Player use this service to browse and play content on aremote device.

n DLNA Print—This service is used by printers that support DLNA.

Configuring AirGroup and AirGroup ServicesTo enable AirGroup and its services:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Services. The Services page opens.

4. Under AirGroup, select the AirGroup check box. The AirGroup configuration parameters are displayed.

5. To allow the users to use AirGroup services enabled in a guest VLAN, select the Guest BonjourMulticast check box. However, the AirGroup devices are visible in the guest VLAN and AirGroup does notdiscover or enforce policies in the guest VLAN.

6. Select AirGroup Across Mobility Domains to enable Inter cluster mobility.

7. Select required services. To allow all services, select Allow All.8. To add a new service, click + Add New Service.

9. Based on the services configured, you can block any user roles and VLAN from accessing a AirGroupservice. The user roles and VLANs marked as disallowed are prevented from accessing thecorresponding AirGroup service. You can create a list of disallowed user roles and VLANs for all AirGroupservices configured on the Instant AP. For example, If the AirPlay service is selected, the Edit links for theAirPlay Disallowed Roles and AirPlay Disallowed VLANS are displayed. Similarly, if sharing service isselected, the Edit links for the Sharing Disallowed Roles and Sharing Disallowed VLANS are displayed.

Aruba Central | User Guide Wireless Management | 195

Page 196: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

196 | Wireless Management Aruba Central | User Guide

n To block user roles from accessing a AirGroup service, click the corresponding Edit link and select theuser roles for which you want to restrict access. By default, an AirGroup service is accessible by all userroles configured in your Instant AP cluster.

n To select VLANs from allowing access to AirGroup service, click the corresponding Edit link and select theVLANs to exclude. By default, the AirGroup services are accessible by users or devices in all VLANsconfigured in your Instant AP cluster.

10. To enable DLNA support, select the DLNA check box and select the DLNA services such as Amazon TV,Google Cast, DLNA print or media. DLNA is a network standard derived from UPnP, which enables devicesto discover the services available in a network. DLNA also provides the ability to share data between theWindows or Android-based multimedia devices.

11. Configure ClearPass Settings to set up ClearPass Policy Manager server, CoA server, and enforceClearPass registering.

n ClearPass Policy Manager Server 1—Indicates the ClearPass Policy Manager server information forthe AirGroup policy.

n Enforce ClearPass registering—When enabled, only devices registered with ClearPass Policy Managerwill be discovered by Bonjour devices, based on the ClearPass Policy Manager policy.

12. Click Save Settings.

Configuring an Instant AP for RTLS SupportCentral supports the real time tracking of devices. With the help of the RTLS, the devices can be monitored inreal time or through history.

To configure RTLS, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Services. The Services page opens.

4. Click Real Time Locating System.

5. Select Aruba RTLS to send the RFID tag information to the Aruba RTLS server.

6. Click 3rd Party and select Aeroscout to send reports on the stations to a third-party server.

7. Specify the IP address and port number of the RTLS server, to which location reports must be sent.

8. If Aruba RTLS is selected, enter the passphrase required for connecting to the RTLS server.

9. Select Include Unassociated Stations to send reports on the stations that are not associated to anyInstant AP.

10. Click Save Settings.

Configuring an Instant AP for ALE SupportALE is designed to gather client information from the network, process it and share it through a standard API.The client information gathered by ALE can be used for analyzing a client’s Internet behavior for business suchas shopping preferences.

ALE includes a location engine that calculates the associated and unassociated device location every 30seconds by default. For every device on the network, ALE provides the following information through theNorthbound API:

n Client user name

n IP address

n MAC address

n Device type

Page 197: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

n Application firewall data, showing the destinations and applications used by associated devices.

n Current location

n Historical location

ALE requires the AP placement data to be able to calculate location for the devices in a network.

ALE with CentralCentral supports Analytics and Location Engine (ALE). The ALE server acts as a primary interface to all third-party applications and the Instant AP sends client information and all status information to the ALE server.

To integrate Instant AP with ALE, the ALE server address must be configured on an Instant AP. If the ALE severis configured with a host name, the Virtual Controller performs a mutual certificated-based authentication withALE server, before sending any information.

Enabling ALE support on an Instant APTo configure an Instant AP for ALE support:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Services. The Services pane is displayed.

4. Under Real Time Locating System, click Aruba, and then select Analytics & Location Engine.

5. Specify the ALE server name or IP address.

6. Specify the reporting interval within the range of 6–60 seconds. The Instant AP sends messages to theALE server at the specified interval. The default interval is 30 seconds.

7. Click OK.

Managing BLE BeaconsInstant APs running the 6.4.3.4-4.2.1.0 firmware version support Aruba BLE devices, such as BT-100 and BT-105, which are used for location tracking and proximity detection. The BLE devices can be connected to anInstant AP and are managed by a cloud-based Beacon Management Console. The BLE Beacon Managementfeature allows you to configure parameters for managing the BLE beacons and establishing securecommunication with the Beacon Management Console.

Support for BLE Asset TrackingInstant APs assets can be tracked using BLE tags, Instant AP beacons scan the network. When a tag is detected,the Instant AP beacon sends information about the tag to the Virtual Controller including the MAC address andRSSI of the tag.

To manage beacons and configure BLE operation mode, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Services. The Services page opens.

4. Click Real Time Locating System > Aruba.

5. To manage the BLE devices using BMC, select the Manage BLE Beacons check box.

6. Enter the authorization token. The authorization token is a text string of 1–255 characters used by theBLE devices in the HTTPS header when communicating with the BMC. This token is unique for eachdeployment.

7. In Endpoint URL, enter the URL of the server to which the BLE sends the monitoring data.

Aruba Central | User Guide Wireless Management | 197

Page 198: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

198 | Wireless Management Aruba Central | User Guide

8. Select any of the following options from BLE Operation Mode drop-down list:

Mode Description

beaconing The built-in BLE chip in the Instant AP functions as an iBeacon combined with the beaconmanagement functionality.

disabled The built-in BLE chip of the Instant AP is turned off. The BLE operation mode is set to Disabled bydefault.

dynamic-console

The built-in BLE chip of the Instant AP functions in the beaconing mode and dynamically enablesaccess to Instant AP console over BLE when the link to LMS is lost.

persistent-console

The built-in BLE chip of the Instant AP provides access to the Instant AP console over BLE and alsooperates in the Beaconing mode.

Table 73: BLE Operation Modes

9. To configure BLE web socket management server, click BLE Asset Tag Mgmt field and enter the URL ofBLE web socket management server.

10. To configure BLE HTTPS management server, select the BLE Asset Tag Mgmt check box to enter theBLE HTTPS management server URL.

11. Enter the URL of BLE HTTPS management server corresponding to the Server URL field.

12. Click Save Settings.

Configuring OpenDNS CredentialsCentral uses the OpenDNS credentials to provide enterprise-level content filtering.

To configure OpenDNS credentials:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Services. The Services page opens.

4. Click OpenDNS.

5. Enter the Username and Password.

6. Click Save Settings.

Configuring CALEA Server for Lawful Intercept ComplianceLI allows the Law Enforcement Agencies to perform an authorized electronic surveillance. Depending on thecountry of operation, the ISPs are required to support LI in their respective networks.

In the United States, Service Providers are required to ensure LI compliance based on CALEA specifications.

Central supports CALEA integration with an Instant AP in a hierarchical and flat topology, mesh Instant APnetwork, the wired and wireless networks.

Enable this feature only if lawful interception is authorized by a law enforcement agency.

For more information on the communication and traffic flow from an Instant AP to CALEA server, see ArubaInstant User Guide.

Page 199: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Configuring CALEA Server Details on an Instant APTo enable an Instant AP to communicate with the CALEA server, complete the following steps:

n Creating a CALEA Profile

n Creating an Access Rule for CALEA

Creating a CALEA Profile

To create a CALEA profile, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Services. The Services page opens.

4. Click CALEA. The CALEA tab details are displayed.

5. Specify the following parameters:

n IP address— Specify the IP address of the CALEA server.

n Encapsulation type— Specify the encapsulation type. The current release of Central supports GREonly.

n GRE type— Specify the GRE type.

n MTU— Specify a size for the MTU within the range of 68—1500. After GRE encapsulation, if packetlength exceeds the configured MTU, IP fragmentation occurs. The default MTU size is 1500.

6. Click OK.

Creating an Access Rule for CALEA

To create an access rule for CALEA, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Security. The Security page opens.

4. Click Roles.

5. Under Access Rules for Selected Roles, click New. The New Rule window is displayed.

6. Set the Rule Type to CALEA.

7. Click OK.

8. Create a role assignment rule if required.

9. Click Finish.

Integrating a Third-Party Network FirewallInstant APs maintains the network (such as mapping IP address) and user information for its clients in thenetwork. To integrate the Instant AP network with a third-party network, you can enable an Instant AP toprovide this information to the third-party servers.

To integrate an Instant AP with a third-party network, you must add a global profile. This profile can beconfigured on an Instant AP with information such as IP address, port, user name, password, firewall enabledor disabled status.

Configuring an Instant AP for Network IntegrationTo configure an Instant AP for network integration:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

Aruba Central | User Guide Wireless Management | 199

Page 200: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

200 | Wireless Management Aruba Central | User Guide

3. On the left navigation pane, click Services. The Services page opens.

4. Click Network Integration. The PAN firewall configuration options are displayed.

5. Select Enable to enable PAN firewall.

6. Specify the User Name and Password. Ensure that you provide user credentials of the PAN firewalladministrator.

7. Enter the PAN firewall IP Address.

8. Enter the port number within the range of 1—65535. The default port is 443.

9. Click Save Settings.

Configuring XML API InterfaceThe XML API interface allows Instant APs to communicate with an external server. The communication processusing the XML API Interface is as follows:

n An API command is issued in the XML format from the server to the virtual controller.

n The virtual controller processes the XML request and identifies where the client is and sends the commandto the correct slave Instant AP.

n Once the operation is completed, the virtual controller sends the XML response to the XML server.

n The administrators can use the response and take appropriate action to suit their requirements. Theresponse from the virtual controller is returned using the predefined formats.

To configure XML API for servers, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Services. The Services page opens.

4. Go to Network Integration > XML API Server Configuration.

5. Click + to add a new XML API server.

6. Enter a name for the XML API server in the Name text box.

7. Enter the IP address of the XML API server in the IP Address text box.

8. Enter the subnet mask of the XML API server in the Mask text box.

9. Enter a passcode in the Passphrase text box, to enable authorized access to the XML API Server.

10. Re-enter the passcode in the Retype box.

11. To add multiple entries, repeat the procedure.

12. Click OK.

13. To edit or delete the server entries, use the Edit and Delete buttons, respectively.

For information on adding an XML API request, see Aruba Instant User Guide.

Enabling AppRF™ ServiceTo view the application details for the clients associated with an Instant AP, you must enable the AppRF service.

To enable AppRF, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Services. The Services page opens.

4. Click AppRF™5. Select any of the following options for Deep Packet Inspection:

Page 201: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

n All—Performs deep packet inspection on client traffic to application, application categories, websitecategories, and websites with a specific reputation score.

n App—Performs deep packet inspection on client traffic to applications and application categories.

n WebCC—Performs deep packet inspection on client traffic to specific website categories and websiteswith specific reputation ratings.

n None—Disables deep packet inspection.

Configuring UplinksThis section provides the following information:

n Uplink Interfaces on page 201

n Uplink Preferences and Switching on page 204

Uplink InterfacesCentral supports 3G and 4G USB modems, and the Wi-Fi uplink to provide access to the corporate network.

Figure 2 illustrates a scenario in which the Instant APs join the Virtual Controller as slave Instant APs through awired or mesh Wi-Fi uplink:

Figure 2 Uplink Types

The following types of uplinks are supported on Central:

n 3G/4G Uplink

n Ethernet Uplink on page 203

n Wi-Fi Uplink on page 204

3G/4G UplinkCentral supports the use of 3G/4G USB modems to provide the Internet backhaul to Central. The 3G/4G USBmodems can be used to extend client connectivity to places where an Ethernet uplink cannot be configured.This enables the Instant APs to automatically choose the available network in a specific region.

Types of Modems

Central supports the following three types of 3G modems:

Aruba Central | User Guide Wireless Management | 201

Page 202: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

202 | Wireless Management Aruba Central | User Guide

n True Auto Detect — Modems of this type can be used only in one country and for a specific ISP. Theparameters are configured automatically and hence no configuration is necessary.

n Auto-detect + ISP/country — Modems of this type require the user to specify the Country and ISP. Thesame modem is used for different ISPs with different parameters configured for each of them.

n No Auto-detect — Modems of this type are used only if they share the same Device-ID, Country, and ISPdetails. You need to configure different parameters for each of them. These modems work with Centralwhen the appropriate parameters are configured.

Modem Type Supported 4G Modem

True Auto Detect n Pantech UML290n Ether-lte

Table 74: 4G supported modem

When UML290 runs in auto detect mode, the modem can switch from 4G network to 3G network orvice-versa based on the signal strength. To configure the UML290 for the 3G network only, manuallyset the USB type to pantech-3g. To configure the UML290 for the 4G network only, manually set the4G USB type to pantech-lte.

Configuring Cellular Uplink Profiles

You can configure 3G or 4G uplinks using Central.

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click System. The System page for the selected group or device opens.

4. Click Uplink and perform any of the following steps:

n To configure a 3G or 4G uplink automatically, select the Country and ISP. The parameters areautomatically populated.

n To configure a 3G or 4G uplink manually, perform the following steps:

a. Obtain the modem configuration parameters from the local IT administrator or the modemmanufacturer.

b. Enter the type of the 3G/4G modem driver type:

n For 3G — Enter the type of 3G modem in the USB type text box.

n For 4G — Enter the type of 4G modem in the 4G USB type text box.

c. Enter the device ID of modem in the USB dev text box.

d. Enter the TTY port of the modem in the USB tty text box.

e. Enter the parameter to initialize the modem in the USB init text box.

f. Enter the parameter to dial the cell tower in the USB dial text box.

g. Enter the username used to dial the ISP in the USB user text box.

h. Enter the password used to dial the ISP in the USB password text box.

i. Enter the parameter used to switch a modem from the storage mode to modem mode in the USBmode switch text box.

5. To configure 3G/4G switch network, provide the driver type for the 3G modem in the USB type text boxand the driver type for 4G modem in the 4G USB type text box.

6. Click OK.

7. Reboot the Instant AP for changes to affect.

Page 203: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Ethernet UplinkThe Ethernet 0 port on an Instant AP is enabled as an uplink port by default. The Ethernet uplink supports thefollowing:

l PPPoE

l DHCP

l Static IP

You can use PPPoE for your uplink connectivity in a single AP deployment.

Uplink redundancy with the PPPoE link is not supported.

When the Ethernet link is up, it is used as a PPPoE or DHCP uplink. After the PPPoE settings are configured,PPPoE has the highest priority for the uplink connections. The Instant AP can establish a PPPoE session with aPPPoE server at the ISP and get authenticated using PAP or the CHAP. Depending upon the request from thePPPoE server, either the PAP or the CHAP credentials are used for authentication. After configuring PPPoE,reboot the Instant AP for the configuration to take effect. The PPPoE connection is dialed after the AP comesup. The PPPoE configuration is checked during Instant AP boot and if the configuration is correct, Ethernet isused for the uplink connection.

When PPPoE is used, do not configure Dynamic RADIUS Proxy and IP address of the VC. An SSID created with defaultVLAN is not supported with PPPoE uplink.

You can also configure an alternate Ethernet uplink to enable uplink failover when an Ethernet port fails.

Configuring PPPoE uplink profile

To configure PPPOE settings:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click System. The System page for the selected group or device opens.

4. Click Uplink. Under PPPoE, configure the following parameters:

a. Enter the PPPoE service name provided by your service provider in Service Name.

b. In the Chap Secret and Retype CHAP Secret fields, enter the secret key used for CHAPauthentication. You can use a maximum of 34 characters for the CHAP secret key.

c. Enter the user name for the PPPoE connection in the USER field.

d. In the Password and Retype Password fields, enter a password for the PPPoE connection andconfirm it.

5. To set a local interface for the PPPoE uplink connections, select a value from Local Interface. Theselected DHCP scope is used as a local interface on the PPPoE interface and the Local, L3 DHCP gateway IPaddress as its local IP address. When configured, the local interface acts as an unnumbered PPPoE interfaceand and allocated the entire Local, L3 DHCP subnet to the clients.

The options in Local Interface are displayed only if a Local, L3 DHCP scope is configured on the Instant AP.

6. Click Save Settings.

Aruba Central | User Guide Wireless Management | 203

Page 204: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

204 | Wireless Management Aruba Central | User Guide

7. Reboot the Instant AP.

Wi-Fi UplinkThe Wi-Fi uplink is supported for all Instant AP models, except 802.11ac APs. Only the master Instant AP usesthe Wi-Fi uplink. The Wi-Fi allows uplink to open, PSK-CCMP, and PSK-TKIP SSIDs.

n For single radio Instant APs, the radio serves wireless clients and Wi-Fi uplink.

n For dual radio Instant APs, both radios can be used to serve clients but only one of them can be used for Wi-Fi uplink.

When Wi-Fi uplink is in use, the client IP is assigned by the internal DHCP server.

Configuring a Wi-Fi Uplink Profile

The following configuration conditions apply to the Wi-Fi uplink:

n To bind or unbind the Wi-Fi uplink on the 5 GHz band, reboot the Instant AP.

n If Wi-Fi uplink is used on the 5 GHz band, mesh is disabled. The two links are mutually exclusive.

To provisionan Instant AP with Wi-Fi Uplink, complete the following steps:

1. If you are configuring a Wi-Fi uplink after restoring factory settings on an Instant AP, connect the InstantAP to an Ethernet cable to allow the Instant AP to get the IP address. Otherwise, go to step 2.

2. From the app selector, click Wireless Management.

3. From the group selector, select a group or a device.

4. On the left navigation pane, click System. The System page for the selected group or device opens.

5. Click Uplink, under WiFi, enter the name of the wireless network that is used for Wi-Fi uplink in theName (SSID) box.

6. From Management, select the type of key for uplink encryption and authentication. If the uplinkwireless router uses mixed encryption, WPA-2 is recommended for Wi-Fi uplink.

7. From Band, select the band in which the VC currently operates. The following options are available:

n 2.4 GHz (default)

n 5 GHz

8. From Passphrase Format, select a Passphrase format. The following options are available:

n 8 - 63 alphanumeric characters

n 64 hexadecimal characters

Ensure that the hexadecimal password string is exactly 64 digits in length.

9. Enter a PSK passphrase in Passphrase and click OK.

Uplink Preferences and SwitchingThis topic describes the following procedures:

n Enforcing Uplinks on page 205

n Setting an Uplink Priority on page 205

n Enabling Uplink Pre-emption on page 205

Page 205: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Enforcing UplinksThe following conditions apply to the uplink enforcement:

n When an uplink is enforced, the Instant AP uses the specified uplink regardless of uplink pre-emptionconfiguration and the current uplink status.

n When an uplink is enforced and multiple Ethernet ports are configured and uplink is enabled on the wiredprofiles, the Instant AP tries to find an alternate Ethernet link based on the priority configured.

n When no uplink is enforced and pre-emption is not enabled, and if the current uplink fails, the Instant APtries to find an available uplink based on the priority configured.

n When no uplink is enforced and pre-emption is enabled, and if the current uplink fails, the Instant AP tries tofind an available uplink based on the priority configured. If current uplink is active, the Instant APperiodically tries to use a higher priority uplink and switches to the higher priority uplink even if the currentuplink is active.

To enforce a specific uplink on an Instant AP, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click System. The System page for the selected group or device opens.

4. Click Uplink.

5. Under Management, select the type of uplink from Enforce Uplink. If Ethernet uplink is selected, thePort field is displayed.

6. Specify the Ethernet interface port number.

7. Click OK. The selected uplink is enforced on the Instant AP.

Setting an Uplink PriorityTo set an uplink priority:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click System. The System page for the selected group or device opens.

4. Click Uplink.

5. Under Uplink Priority List, select the uplink, and increase or decrease the priority. By default, the Eth0uplink is set as a high priority uplink.

6. Click OK. The selected uplink is prioritized over other uplinks.

Enabling Uplink Pre-emptionThe following configuration conditions apply to uplink pre-emption:

n Pre-emption can be enabled only when no uplink is enforced.

n When pre-emption is disabled and the current uplink fails, the Instant AP tries to find an available uplinkbased on the uplink priority configuration.

n When pre-emption is enabled and if the current uplink is active, the Instant AP periodically tries to use ahigher priority uplink, and switches to a higher priority uplink even if the current uplink is active.

To enable uplink pre-emption:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click System. The System page for the selected group or device opens.

4. Click Uplink.

Aruba Central | User Guide Wireless Management | 205

Page 206: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

206 | Wireless Management Aruba Central | User Guide

5. Under Management, ensure that the Enforce Uplink is set to None.

6. Set Pre-Emption to ON.

7. Click OK.

Switching Uplinks based on the Internet AvailabilityYou can configure Central to switch uplinks based on the Internet availability.

When the uplink switchover based on Internet availability is enabled, the Instant AP continuously sends ICMPpackets to some well-known Internet servers. If the request is timed out due to a bad uplink connection oruplink interface failure, and the Internet is not reachable from the current uplink, the Instant AP switches to adifferent connection.

To configure uplink switching, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click System. The System page for the selected group or device opens.

4. Click Uplink.

5. Under Management, set Internet Failover to ON.

6. Specify values for Failover Internet Packet Send Frequency, Failover Internet Packet LostCount, and Internet Check Count.

7. Click OK.

When Internet failover is enabled, the Instant AP ignores the VPN status, although uplink switching based on VPNstatus is enabled.

Mobility and Client ManagementThis section provides the following information on layer-3 mobility for Instant AP clients:

n Layer-3 Mobility for Instant AP Clients on page 206

n Configuring L3 mobility domain on page 207

Layer-3 Mobility for Instant AP ClientsInstant APs form a single Central network when they are in the same Layer-2 (L2) domain. As the number ofclients increase, multiple subnets are required to avoid broadcast overhead. In such a scenario, a client must beallowed to roam away from the Central network to which it first connected (home network) to anothernetwork supporting the same WLAN access parameters (foreign network) and continue its existing sessions.

Layer-3 (L3) mobility allows a client to roam without losing its IP address and sessions. If WLAN accessparameters are the same across these networks, clients connected to Instant APs in a given Central networkcan roam to Instant APs in a foreign Central network and continue their existing sessions using their IPaddresses. You can configure a list of Virtual Controller IP addresses across which L3 mobility is supported.

Home agent load balancingHome Agent Load Balancing is required in large networks where multiple tunnels might terminate on a singleborder or lobby AP and overload it. When load balancing is enabled, the VC assigns the home AP for roamedclients by using a round robin policy. With this policy, the load for the APs acting as Home Agents for roamedclients is uniformly distributed across the Instant AP cluster.

Page 207: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Configuring L3 mobility domainTo configure a mobility domain, you have to specify the list of all Central networks that form the mobilitydomain. To allow clients to roam seamlessly among all the APs, specify the VC IP for each foreign subnet. Youmay include the local Central or VC IP address, so that the same configuration can be used across all Centralnetworks in the mobility domain.

Aruba recommends that you configure all client subnets in the mobility domain. When client subnets areconfigured:

n If a client is from a local subnet, it is identified as a local client. When a local client starts using the IP address,the L3 roaming is terminated.

n If the client is from a foreign subnet, it is identified as a foreign client. When a foreign client starts using theIP address, the L3 roaming is set up.

To configure L3 mobility domain, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click System. The System page for the selected group or device opens.

4. Click L3 Mobility.

5. From Home Agent Load Balancing, select Enabled. By default, home agent load balancing is disabled.

6. Click New in Virtual Controller IP Addresses, add the IP address of a VC that is part of the mobilitydomain, and click OK.

7. Repeat Step 2 to add the IP addresses of all VCs that form the L3 mobility domain.

8. Click New in Subnets and specify the following:

a. Enter the client subnet in the IP Address box.

b. Enter the mask in the Subnet Mask box.

c. Enter the VLAN ID in the home network in the VLAN ID box.

d. Enter the home VC IP address for this subnet in the Virtual Controller IP box.

9. Click OK.

Configuring Enterprise DomainsThe enterprise domain names list displays the DNS domain names that are valid on the enterprise network.This list is used to determine how client DNS requests are routed. When Content Filtering is enabled, the DNSrequest of the clients is verified and the domain names that do not match the names in the list are sent to theOpenDNS server.

To configure an enterprise domain, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click System. The System page for the selected group or device opens.

4. Click Enterprise Domains.

5. Click New and enter a name in the New Domain Name.

6. Click OK.

To delete e a domain, select the domain and click Delete.

Aruba Central | User Guide Wireless Management | 207

Page 208: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

208 | Wireless Management Aruba Central | User Guide

Configuring SNMP ParametersThis section provides the following information:

n SNMP Configuration Parameters on page 208

n Configuring Community String for SNMP on page 208

n Configuring SNMP Traps on page 209

SNMP Configuration Parameters

Central supports SNMPv1, SNMPv2c, and SNMPv3 for reporting purposes only. An Instant AP cannot useSNMP to set values in an Aruba system.

You can configure the following parameters for an Instant AP:

Data Pane Item Description

Community Stringsfor SNMPV1 andSNMPV2

An SNMP Community string is a text string that acts as a password, and is used toauthenticate messages sent between the Virtual Controller and the SNMP agent.

If you are using SNMPv3 to obtain values from the Instant AP, you can configure the following parameters:

Name A string representing the name of the user.

AuthenticationProtocol

An indication of whether messages sent on behalf of this user can be authenticated, and ifso, the type of authentication protocol used. This can take one of the two values:

n MD5—HMAC-MD5-96 Digest Authentication Protocoln SHA—HMAC-SHA-96 Digest Authentication Protocol

Authenticationprotocol password

If messages sent on behalf of this user can be authenticated, the (private) authenticationkey for use with the authentication protocol. This is a string password for MD5 or SHAdepending on the choice above.

Privacy protocol An indication of whether messages sent on behalf of this user can be protected fromdisclosure, and if so, the type of privacy protocol which is used. This takes the value DES(CBC-DES Symmetric Encryption).

Privacy protocolpassword

If messages sent on behalf of this user can be encrypted/decrypted with DES, the (private)privacy key for use with the privacy protocol.

Table 75: SNMP parameters

Configuring Community String for SNMPThis section describes the procedure for configuring SNMPv1, SNMPv2, and SNMPv3 community strings usingthe Central.

Creating Community strings for SNMPv1 and SNMPv2 using CentralTo create community strings for SNMPv1 and SNMPv2, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click System. The System page for the selected group or device opens.

4. Click SNMP.

Page 209: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

5. To add a new community string, click + and enter the string in the New Community String text box.

6. Click OK.

7. To delete a community string, select the string, and click Delete.

Creating community strings for SNMPv3 using CentralTo create community strings for SNMPv3, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click System. The System page for the selected group or device opens.

4. Click SNMP.

5. Select the type of authentication protocol from the Auth protocol drop-down list.

6. Enter the authentication password in the Password text box and retype the password in the Retypetext box.

7. Select the type of privacy protocol from the Privacy protocol drop-down list.

8. Enter the privacy protocol password in the Password text box and retype the password in the Retypetext box.

9. Click OK.

10. To edit the details for a particular user, select the user and click Edit.

11. To delete a particular user, select the user and click Delete.

Configuring SNMP TrapsCentral supports the configuration of external trap receivers. Only the Instant AP acting as the VC generatestraps. The OID of the traps is 1.3.6.1.4.1.14823.2.3.3.1.200.2.X.

To configure SNMP traps, complete the following steps.

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click System. The System page for the selected group or device opens.

4. Click SNMP.

5. Under SNMP Traps, enter a name in the SNMP Engine ID text box. It indicates the name of the SNMPagent on the access point. The SNMPV3 agent has an engine ID that uniquely identifies the agent in thedevice and is unique to that internal network.

6. Click + and update the following fields:

n IP Address— Enter the IP Address of the new SNMP Trap receiver.

n Version— Select the SNMP version— v1, v2c, v3 from the drop-down list. The version specifies theformat of traps generated by the access point.

n Community/Username— Specify the community string for SNMPv1 and SNMPv2c traps and ausername for SNMPv3 traps.

n Port— Enter the port to which the traps are sent. The default value is 162.

n Inform— When enabled, traps are sent as SNMP INFORM messages. It is applicable to SNMPv3 only.The default value is Yes.

7. Click OK to view the trap receiver information in the SNMP Trap Receivers window.

Aruba Central | User Guide Wireless Management | 209

Page 210: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

210 | Wireless Management Aruba Central | User Guide

Configuring Logs and TFTP Dump ServersThis section provides the following information:

n Configuring a Syslog Server on page 210

n Configuring TFTP Dump Server on page 211

Configuring a Syslog ServerTo specify a syslog server for sending syslog messages to the external servers:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click System. The System page for the selected group or device opens.

4. Click Logging.

5. Under Servers, enter the IP address of the server to which you want to send system logs in the SyslogServer box.

6. Select the required values to configure Syslog Facility Levels. Syslog facility is an information fieldassociated with a syslog message. It is an application or operating system component that generates a logmessage. The Instant AP supports the following syslog facilities:

n AP-Debug—Detailed log about the AP device.

n Network— Log about change of network, for example, when a new Instant AP is added to a network.

n Security—Log about network security, for example, when a client connects using wrong password.

n System—Log about configuration and system status.

n User—Important logs about client.

n User-Debug— Detailed log about client.

n Wireless— Log about radio.

Table 76 describes the logging levels in order of severity, from the most severe to the least.

Logging level Description

Emergency Panic conditions that occur when the system becomes unusable.

Alert Any condition requiring immediate attention and correction.

Critical Any critical condition such as a hard drive error.

Error Error conditions.

Warning Warning messages.

Notice Significant events of a non-critical nature. The default value for all syslog facilities.

Information Messages of general interest to system users.

Debug Messages containing information useful for debugging.

Table 76: Logging levels

7. Click Save Settings.

Page 211: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Configuring TFTP Dump ServerTo configure a TFTP server for storing core dump files, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click System. The System page for the selected group or device opens.

4. Click Logging.

5. Under Servers, enter the IP address of the TFTP server in the TFTP Dump Server box.

6. Click Save Settings.

Resetting an APYou can reset the system configuration of an Instant AP by erasing the existing configuration on the InstantAP. To erase the existing configuration on an Instant AP, perform any of the following procedures:

Clearing Instant AP Configuration Using GroupsTo reset an Instant AP using groups, complete the following steps:

1. Create a new group. Ensure that the group has no additional configuration.

2. Move the Instant AP that you want to reset, under the new group. After the Instant AP is moved to a newgroup, the configuration on the Instant AP is erased and the default group configuration is pushed to theInstant AP. However, in this procedure, only the system configuration is cleared and the Per AP Settingson the Instant AP are retained.

Resetting an AP through the ConsoleTo reset an Instant AP from the console, complete the following steps:

1. Log in to the Instant AP console. To access the Instant AP console:

2. Select Monitoring & Reporting app.

3. Click APs and select List from the APs drop-down.

4. Select the AP to reset.

5. From the Actions drop-down, click Console.

6. Execute the write erase all command at the command prompt.

7. Reboot the Instant AP. With this procedure, the complete configuration including the Per AP Settingson the Instant AP is reset.

After the reboot, the Instant AP is moved to default group and will not be present in the group to which itwas previously attached.

For information on resetting an Instant AP to factory default configuration by using the reset button on thedevice, see Aruba Instant User Guide.

Aruba Central | User Guide Wireless Management | 211

Page 212: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

212 | Wireless Management Aruba Central | User Guide

Rebooting APsYou can reboot an Instant AP or an Instant AP cluster using the Central UI.

Perform any of the following procedures:

Reboot an Instant APTo reboot an Instant AP:

1. From the app selector, click Monitoring & Reports and go to Network Overview > APs.

2. Select List of Up APs. The Access Points table displays a list of Instant APs in the group.

3. In the Access Points table, select the Instant AP to reboot.

4. In the Actions drop-down list, click Reboot AP.

5. In the Reboot dialog box, click Continue.

Reboot an Instant AP clusterTo reboot an Instant AP cluster:

1. From the app selector, click Monitoring & Reports and go to Network Overview > APs.

2. Select List of Up APs. The Access Points table displays a list of Instant APs in the group.

3. In the Access Points table, select the master Instant AP to reboot.

4. In the Actions drop-down list, click Reboot Swarm.

5. In the Reboot dialog box, click Continue.

Configuring HTTP Proxy on Instant APsIf your network requires a proxy server for Internet access, ensure that you configure the HTTP proxy on theInstant AP to download the image from the cloud server. After setting up the HTTP proxy settings, the InstantAP connects to the Activate server, AMP, Central, or OpenDNS server through a secure HTTP connection. Youcan also exempt certain applications from using the HTTP proxy (configured on an Instant AP ) by providingtheir host name or IP address under exceptions. Central allows the user to configuring HTTP proxy on anInstant AP.

To configure HTTP proxy on Instant AP through Central, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click System. The System page for the selected group or device opens.

4. Click Proxy and specify the following:

a. Enter the HTTP proxy server IP address in the Server box.

b. Enter the port number in the Port box.

5. Click OK.

Central supporting the Aruba Instant 8.3.0.0 firmware includes Username, Password, and Retype Password box inthe Wireless Management > System > Proxy section since Instant APs that run Aruba Instant 8.3.0.0 firmwareauthenticates the proxy server using user-based authentication.

Page 213: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Uploading and Mapping Instant AP CertificatesWhen an Instant AP joins a group that does not have a certificate, the Instant AP's existing certificate isretained. When an Instant AP joins a group that already has a certificate, the Instant AP's certificate isoverwritten by the group's certificate.

Uploading CertificateYou can upload a CA certificate or a Server certificate for an Instant AP from the Central UI. When a certificate isuploaded at the group level, the same certificate can be used for different groups, devices, or templates.

To upload a certificate for an Instant AP, perform any of the following procedures:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Security. The Security page for the selected group or device opens.

4. Click Certificate. The Certificate Store pane opens.

5. To add a new certificate, click Add. The Add Certificate dialog box opens.

6. Enter the certificate name in the Name text box.

7. Select the certificate type from the Type list.

8. Select the certificate format from the Format drop-down.

9. Click Choose File to browse to the location and select the certificate.

10. Click Save.

Mapping CertificatesTo map an Instant AP certificate name to a specific certificate type or category, complete the following steps:

1. From the app selector, click Wireless Management.

2. From the group selector, select a group or a device.

3. On the left navigation pane, click Security. The Security page for the selected group or device opens.

4. Click Certificate.

5. To map a certificate to a specific certificate category, click Certificate Usage.

6. Select the required certificate from the corresponding drop-down list. Central supports the followingtypes of certificates:

n Server certificates for RADIUS, Captive Portal, and RadSec (for cloud guest networks) authentication.

n CA certificates—To validate the identity of a client.

n Authentication Server—To verify the identity of the server to a client.

n Captive portal server—To verify the identity of internal captive portal server.

n RadSec—To verify the identity of the TLS server.

n RadSec CA—For mutual authentication between the Instant AP and the TLS server.

7. Save the changes. Central pushes the certificate to all Instant APs in that group.

To enable certificates for the Cloud Guest Service, contact the Aruba Central support team.

Aruba Central | User Guide Wireless Management | 213

Page 214: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

214 | Wireless Management Aruba Central | User Guide

For more information on the Wireless Management app and Instant AP procedures, seeWirelessManagement in the Aruba Central Help Center.

Page 215: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Chapter 8Wired Management

This chapter provides an overview of the supported Aruba switches and describes the procedures forprovisioning, configuring, monitoring, and troubleshooting switches from the Central UI.

n Aruba Switches on page 215

n Adding Switches to Central on page 216

n Configuring Devices in Template Groups on page 217

n Configuring Switches in UI Groups on page 225

n Aruba Switch Stack on page 233

Aruba SwitchesThe Aruba switches enable secure, role-based network access for wired users and devices, independent of theirlocation or application.

The switch operates as a wired access point when deployed with an Aruba Mobility Controller. As a wired accesspoint, users and their devices are authenticated and assigned a unique role by the Mobility Controller. Theseroles are applied irrespective of whether the user is a Wi-Fi client, or is connected to a port on the switch. Theuse of switches allows an enterprise workforce to have consistent and secure access to network resourcesbased on the type of users, client devices, and connection method used.

Supported Switch Platforms

Central uses the SSL certificate by GeoTrust Certificate Authority for device termination and web services. As the SSLcertificate is about to expire, Aruba is replacing it with a new certificate from another trusted Certificate Authority.During the certificate upgrade window, all devices managed by Central will be disconnected. After the upgrade, thedevices reconnect to Central and resume their services with Central. However, for Aruba switches to reconnect toCentral after the certificate upgrade, you must ensure that the switches are upgraded to the recommended softwareversion listed in Table 77.

The following tables list the switch platforms and the corresponding software versions supported in Central:

Switch Platform Supported Software Versions Recommended Software Versions

Aruba 2530 Switch Series YA/YB.16.04.0008 or later YA/YB.16.05.0008 or later

Aruba 2540 Switch Series YC.16.03.0003 or later YC.16.05.0007 or later

Aruba 2920 Switch Series WB.16.03.0003 or later WB.16.05.0007 or later

Aruba 2930F Switch Series WC.16.03.0003 or later WC.16.05.0007 or later

Aruba 2930M Switch Series WC.16.04.0004 or later WC.16.05.0007 or later

Aruba 3810 Switch Series KB.16.03.0003 or later WC.16.05.0007 or later

Aruba 5400R Switch Series KB.16.04.0008 or later KB.16.05.0007 or later

Table 77: Supported Aruba Switch Series and Software Versions

Aruba Central | User Guide Wired Management | 215

Page 216: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

216 | Wired Management Aruba Central | User Guide

Mobility Access Switch Series Supported Software Versions

n S1500-12Pn S1500-24Pn S2500-24Pn S3500-24T

ArubaOS 7.3.2.6ArubaOS 7.4.0.3ArubaOS 7.4.0.4ArubaOS 7.4.0.5ArubaOS 7.4.0.6

Table 78: Supported Aruba Mobility Access Switch Series and Software Versions

Provisioning and configuration of Aruba 5400R Switch Series and switch stacks is supported only throughconfiguration templates.

Adding Switches to CentralCentral supports zero touch provisioning of the devices. It automatically retrieves the devices associated to acustomer account. To synchronize the devices from the inventory, click Sync Now. If the retrieval of devices isnot complete or successful due to process errors, you can manually add the devices.

To manually add a device, complete the following steps:

1. From the app selector, click the Global Settings app.

2. Click Devices Inventory. The Device Inventory page opens.

3. Click Add Manual.4. Follow the instructions described on the following table:

DeviceAdditionMethod

Description

Add byMAC/SN

Allows you to add devices using MAC address and serial numbers. You can add up to 32 devices.

Add withCloudActivationKey

Allows you add multiple devices from a single purchase order by providing the cloud activation key.To add devices:

1. Note the Cloud Activation Key and MAC address of the device. To obtain these details:l For Instant APs, execute the show about command at the Instant AP CLI or clickMaintenance > About in the Instant AP UI.l For Aruba Mobility Access Switches, execute the show inventory | include HW and showversion commands on the Mobility Access Switch CLI console. You can also view the cloudactivation key in the Maintenance >About tab in the UI. The activation key is enabled only ifthe switch has access to the Internet.l For other ArubaSwitches, to view the MAC address and the serial number, run the shsystem | in Base and sh system | in Serial commands at the Switch CLI console.

2. Enter the Cloud Activation Key and MAC address of the device.3. Click Add. The Central retrieves all devices that belong to the same purchase order and displaysthe list. If any of the device belongs to another customer account or is used by other services, it isdisplayed as a blocked device. As Central does not allow you to add blocked devices, you may haveto release the blocked devices from another customer account.

AddUsingActivate

Allows you to retrieve the devices associated with an Activate user account.To add devices:

1. Enter the username and password of the Activate user account.2. Click Add. The devices associated with the Activate account are retrieved and added to the list

Table 79: Adding Devices

Page 217: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

DeviceAdditionMethod

Description

of devices displayed on the Device Inventory page.NOTE: You can use this option only once. After the devices are added, Central does not allow you tomodify or re-import the devices using your Aruba Activate credentials.

Table 79: Adding Devices

The provisioning of the Aruba Mobility Access Switch fails when the provisioning process is interruptedduring the initial booting and if the switch has a static IP address with no DNS server configured.

During Zero Touch Provisioning, the Aruba switches can join Central only if they are running the factorydefault configuration, and have a valid IP address and DNS settings from a DHCP server.

If the switches ship with a version lower than the minimum supported firmware version, a factory resetmay be required, so that the switch can initiate a connection to Central. For information, on the minimumfirmware versions supported on the switches, see Aruba Switches.

Assigning GroupsAfter the switches are added in Central, you can assign the switches to groups. Central does not supportconfiguring switches such as Aruba 5400R Switch Series and switch stacks through the UI. These devices canonly be configured using templates and are assigned to the template group by default. You cannot moveAruba 5400R Switch Series from the template group to the UI group. If Aruba 5400R Switch Series is pre-assigned to a UI group, the device is moved to an unprovisioned group after it joins Central.

Configuring Devices in Template GroupsCentral allows you to provision devices in UI or template groups. For devices mapped to a template group, youcan create a template with a standard set of CLI scripts, configuration commands, and variables. If a group isset as a template group, the UI configuration wizards for the devices in that group are disabled.

The Aruba 5400R Switch Series and switch stacks can be configured only by using the configuration templates.

You can set a group as a template group, so that a common configuration is applied for all devices in the group.

Creating a Template GroupTo create a template group, complete the following steps:

1. From the app selector on the left pane, select the Global Settings app.

2. Click Manage Groups.

3. Click (+) to create a new group. The Create New Group pane appears.

4. To set the group as a template group, select the Use As a Template Group check box.

5. Click Save.

Creating a Configuration Template for Instant APsTo create a template for the devices in a template group, complete the following steps:

1. From the app selector, click Wireless Configuration.

2. Select a template group. The template configuration menu options are displayed.

Aruba Central | User Guide Wired Management | 217

Page 218: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

218 | Wired Management Aruba Central | User Guide

3. Click Templates. The Templates page opens.

4. Click + to add a new template. The Add Template window opens.

5. Add the template name.

6. Ensure that the device category is set to Instant AP.

7. Set the model and firmware version parameters to ALL.

8. Add the CLI script content. Note the following points for adding contents to the template:

n Ensure that the command text indentation matches the indentation in the running configuration.

n The template allows only one per-ap settings block. It must include the per-ap-settings %_sys_lan_mac% variable. The per-ap-settings block uses the variables for the individual APs. The generalVC configuration uses variables for master AP to generate the final configuration from the providedtemplate. Hence, Aruba recommends that you upload all variables for all devices in a cluster andchange values as required for individual AP variables.

n The commands in the template are case-sensitive.

n IF ELSE ENDIF conditions are supported in the template. If the template text includes the if condition,% sign is required at the beginning and the end of the text. For example, %if guest%. The followingexample shows the template text with the IF ELSE ENDIF condition.

wlan ssid-profile %ssid_name%

%if disable_ssid=true%

disable-ssid

%endif%

%if ssid_security=wpa2%

opmode wpa2-aes

%else%

opmode opensystem

%endif%

n Templates also support nesting of the IF ELSE END IF condition blocks. The following example showshow to nest such blocks:

%if condition1=true%

routing-profile 10.10.0.0 255.255.255.0 10.10.0.255

%if condition2=true%

routing-profile 10.20.0.0 255.255.255.0 10.20.0.255

%else%

routing-profile 10.30.0.0 255.255.255.0 10.30.0.255

%endif%

%else%

routing-profile 10.40.0.0 255.255.255.0 10.40.0.255

%if condition3=true%

routing-profile 10.50.0.0 255.255.255.0 10.50.0.255

%else%

routing-profile 10.60.0.0 255.255.255.0 10.60.0.255

%endif%

%endif%

n For profile configuration CLI text, for example, vlan, interface, access-list, ssid and so on, the firstcommand must start with no whitespace. The subsequent local commands in given profile must startwith at least one initial space (' ') or indented as shown in the following examples:

Example 1

vlan 1

name "vlan1"

no untagged 1-24

ip address dhcp-bootp

Page 219: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

exit

Example 2%if vlan_id1%

vlan %vlan_id1%

%if vlan_id1=1%

ip address dhcp-bootp

%endif%

no untagged %_sys_vlan_1_untag_command%

exit

%endif%

n To comment out a line in the template text, use the pound sign (#). Any template text preceded by #is ignored when processing the template.

9. Click OK.

The variables configured for the Instant AP devices functioning as the VCs are replaced with the values configured atthe template level.

If any device in the cluster has any missing variables, the configuration push to those AP devices in the cluster fails.The audit trail for such instances shows the missing variables.

Sample Template

The following example shows the typical contents allowed in a template file for Instant APs:organization %org%

virtual-controller-ip 1.1.1.1

syslog-level debug

syslog-level warn ap-debug

per-ap-settings %_sys_lan_mac%

hostname %hostname%

zonename %zonename%

wlan ssid-profile %ssid_name%

%if disable_ssid=true%

disable-ssid

%endif%

%if ssid_security=wpa2%

opmode wpa2-aes

%else%

opmode opensystem

%endif%

%if condition1=true%

routing-profile 10.10.0.0 255.255.255.0 10.10.0.255

%if condition2=true%

routing-profile 10.20.0.0 255.255.255.0 10.20.0.255

%else%

routing-profile 10.30.0.0 255.255.255.0 10.30.0.255

%endif%

%else%

routing-profile 10.40.0.0 255.255.255.0 10.40.0.255

%if condition3=true%

routing-profile 10.50.0.0 255.255.255.0 10.50.0.255

%else%

routing-profile 10.60.0.0 255.255.255.0 10.60.0.255

%endif%

%endif%

Aruba Central | User Guide Wired Management | 219

Page 220: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

220 | Wired Management Aruba Central | User Guide

Creating a Configuration Template for Aruba SwitchesTo create a template for the devices in a template group, complete the following steps:

1. From the app selector, click Wired Configuration.

2. Select a template group. The template configuration menu options are displayed.

3. Click Templates. The Templates page opens.

4. Click + to add a new template.

5. Add the template name.

6. Select Aruba Switches for the device type.

7. Specify the model and the firmware version.

n To create a single template for all Switch platforms and firmware versions, select ALL.

n To create a template for a specific model and firmware version, select the Switch model and the firmwareversion. The template created for a specific switch model and a firmware version takes precedence overthe template created for all platforms and versions.

8. Add the CLI script content. Note the following points for adding contents to the template:

n Ensure that the command text indentation matches the indentation in the running configuration.

n The commands in the template are case-sensitive. The following example illustrates the casediscrepancies that the users must avoid in templates and variable definitions.

trunk E1-E4 trk1 trunk

interface Trk1dhcp-snooping trust

exit

trunk E1-E4 trk1 trunk

switch-interconnect trk1

trunk E5-E6 trk2 trunk

vlan 5

name "VLAN5"

untagged Trk2tagged Trk1isolate-list Trk1ip igmp forcedfastleave Trk1ip igmp blocked Trk1ip igmp forward Trk1forbid Trk1

loop-protect Trk2

trunk E1-E4 trk1 trunk

trunk E4-E5 trk2 trunk

spanning-tree Trk1 priority 4

spanning-tree Trk2 admin-edge-port

trunk A2-A4 trk1 trunk

igmp fastlearn Trk1

trunk E4-E5 trk2 trunk

ip source-binding 2 4.5.6.7 b05ada-96a4a0 Trk2

[no] ip source-binding trap OutOfResources

Page 221: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

snmp-server mib hpSwitchAuthMIB ..

snmp-server mib hpicfMACsec unsecured-access ..

[no] lldp config <P-PORT-LIST> dot1TlvEnable ..

[no] lldp config <P-PORT-LIST> medTlvEnable ..

no lldp config <P-PORT-LIST> medPortLocation..

[no] lldp config <P-PORT-LIST> dot3TlvEnable ..

[no] lldp config <P-PORT-LIST> basicTlvEnable ..

[no] lldp config <P-PORT-LIST> ipAddrEnable <lldp-ip>

trunk-load-balance L4-based

trunk-load-balance L3-based

9. Ensure that the template contains the following mandatory information:

n Header that includes a few lines of the show running-config command output.

n Module information

The following example shows the mandatory lines required in the template:; J9727A Configuration Editor; Created on release #WB.16.03.0000x

; Ver #0e:73.b8.ee.34.79.3c.29.eb.9f.fc.f3.ff.37.ef:2f

module 1 type j9727a

include-credentials

10. Click OK.

A configuration template push does not reboot the Aruba switches running 16.05.0007 or a later software version,unless the configuration changes applied through the template require a reboot.

Editing a TemplateTo edit or delete a template, select the template row and click the edit or delete icon, respectively.

Managing Variable FilesThe variable files consist of a set of configuration values defined for devices in the network.

For Instant APs, you can configure a variable file with a set of values defined for a specific AP device that functions asthe VC in the network. When the variable file is uploaded, the configuration values are applied on the Instant APdevices in the cluster.

The following conditions apply to the variable files:

n The variable names must be on the left side of condition and its value must be defined on the right side. Forexample, %if var=100% is supported and %if 100=var% is not supported.

n The < or <= or > or >= operators should have only numeric integer value on the right side. The variablesused in these 4 operations are compared as integer after flooring. For example, if any float value is set as%if dpi_value > 2.8%, it is converted as %if dpi_value > 2 for comparison.

n The variable names should not include white space, and the & and % special characters. The variable namesmust match regular expression [a-zA-Z0-9_]. If the variables values with % are defined, ensure that thevariable is surrounded by space. For example, wlan ssid-profile %ssid_name%.

Aruba Central | User Guide Wired Management | 221

Page 222: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

222 | Wired Management Aruba Central | User Guide

n The first character of the variable name must be an alphabet. Numeric values are not accepted.

n The values defined for the variable must not include spaces. If quotes are required, they must be includedas part of the variable value. For example, if the intended template and variable name iswlan ssid-profile"emp ssid”, the template must be defined template as "wlan ssid-profile %ssid_name%” and variable as“ssid_name”: "\"emp ssid\"".

n If the configuration text has the percentile % in it—for example, "url "/portal/scope.cust-5001098/Splash%20Profile%201/capture"—Central treats it as a variable when you save the template.To allow the use of percentile % as an escape character, use \" in the variable definition as shown in thefollowing example:

Template textwlan external-captive-portal "Splash Profile 1_#guest#_"

server naw1.cloudguest.central.arubanetworks.com

port 443

url %url%

Variable"url": "\"/portal/scope.cust-5001098/Splash%20Profile%201/capture\""

Predefined Variables for Aruba Switches

Although all Aruba Switches can be configured by using common configuration templates, the configuration ofthese switches may need to change per device. Central uses the predefined variables to address the per deviceconfiguration requirements.

Central parses a set of predefined variables from the running configuration of the switches and identifies theseas the variables per device. All the pre-defined variables are prefixed by sys..

The following is the list of predefined variables used for configuring switches.

n sys_template_header_ —Represents the first two lines of the configuration file. Ensure that this variable isthe first line in the template.

n snmpv3 engineid "%_sys_snmpv3_engineid%"—Populates engine ID.

n _sys_module_command—Populates module lines.

n ip default-gateway _sys_gateway—Populates gateway IP address.

n hostname _sys_hostname—Maintains unique host name.

n _sys_oobm_command—Represents Out of Band Management (OOBM) block.

n _sys_ip_address—Indicates the IP address of the device.

n _sys_netmask—Netmask of the device.

n _sys_use_dhcp—DHCP status (true or false) of VLAN 1.

n _sys_vlan_1_untag_command—Untagged ports of VLAN 1.

n _sys_vlan_1_tag_commandn _sys_stack_command— Represents stack block.

The _sys_template_header_ and snmpv3 engineid "%_sys_snmpv3_engineid%" are mandatory variables that musthave the values populated, irrespective of their use in the template. If there is no value set for these variables, Centralre-imports the values for these mandatory variables when it processes the running configuration of the device.

Example

The following table provides an example for the predefined variable definitions:

Page 223: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Variable Name Variable Value

_sys_oobm_command oobm                          ip address dhcp-bootp        exit

_sys_template_header  ; J9729A Configuration Editor; Created on release #WB.16.03.0003+; Ver #0f:3f.f3.b8.ee.34.79.3c.29.eb.9f.fc.f3.ff.37.ef:91

_sys_hostname  HP-2920-48G-POEP

_sys_gateway  10.22.159.1

_sys_vlan_1_untag_command  1-28,A1-A2

_sys_ip_address  10.22.159.201

_sys_use_dhcp  0

_sys_module_command  module 1 type j9729a

_sys_stack_command stackingmember 1 type "J9729A" mac-address 5cb901-224c00exit

_sys_vlan_1_tag_command  28-48

_sys_netmask  255.255.255.0

_sys_snmpv3_engineid  00:00:00:0b:00:00:5c:b9:01:22:4c:00

Table 80: Predefined Variables Example

Uploading Variable FilesTo upload a variable file, complete the following steps:

1. Click Download Sample Variables File. Save the JSON file with the sample variables.

2. Edit the variable file to customize the definitions.

3. Ensure that the _sys_serial and _sys_lan_mac variables are defined with the serial number and MACaddress of the devices, respectively.

4. Click Wireless Management > Configuration > Variables. The Variables page opens.

5. Click Upload Variables File and select the variable file to upload.

6. Click Open. The content of the variable file is displayed in the Variables table.

7. To search for a variable, specify a search term and click the Search icon.

Downloading Variable FilesTo download the variable file applied for the devices, click the download icon in the Variables table.

Sample Variable FileThe following example shows the typical contents of a variable file for Instant APs:{

"CK0036968": {

Aruba Central | User Guide Wired Management | 223

Page 224: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

224 | Wired Management Aruba Central | User Guide

"_sys_serial": "CK0036968",

"ssid": "s1",

"_sys_lan_mac": "ac:a3:1e:c5:db:7a",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

"hostname": "Uber_1"

},

"CJ0219729": {

"_sys_serial": "CJ0219729",

"ssid": "s1",

"_sys_lan_mac": "ac:a3:1e:cb:04:92",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

"hostname": "Uber_2"

},

"CK0112486": {

"_sys_serial": "CK0112486",

"ssid": "s1",

"_sys_lan_mac": "ac:a3:1e:c8:29:76",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

"hostname": "Uber_3"

},

"CT0779001": {

"_sys_serial": "CT0779001",

"ssid": "s1",

"_sys_lan_mac": "84:d4:7e:c5:c6:b0",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

"hostname": "Uber_4"

},

"CM0640401": {

"_sys_serial": "CM0640401",

"ssid": "s1",

"_sys_lan_mac": "84:d4:7e:c4:8f:2c",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

Page 225: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

"hostname": "Uber_6"

},

"CK0037015": {

"_sys_serial": "CK0037015",

"ssid": "s1",

"_sys_lan_mac": "ac:a3:1e:c5:db:d8",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

"hostname": "Uber_7"

},

"CK0324517": {

"_sys_serial": "CK0324517",

"ssid": "s1",

"_sys_lan_mac": "f0:5c:19:c0:71:24",

"vc_name": "test_config_CK0036968",

"org": "Uber_org_test",

"vc_dns_ip":"22.22.22.22",

"zonename": "Uber_1",

"uplinkvlan": "0",

"swarmmode": "cluster",

"md5_checksum": "ed8a67a3d1be58261640ca53f8fd3bb8",

"hostname": "Uber_8"

}

}

Check the audit trail to troubleshoot issues pertaining to template-based configuration.

Central supports backing up and restoring configuration templates and variables for devices deployed in templategroups. For more information, see Backing up and Restoring Configuration Templates.

Configuring Switches in UI GroupsThis section describes the configuration procedures for the switches in the UI groups:

n Viewing Switch Details on page 225

n Configuring Ports on page 226

n Configuring Access Policies on page 228

n Configuring VLANs on page 227

n Configuring DHCP Pools on page 229

n Applying Configuration Changes through CLI Snippets on page 230

n Configuring System Parameters for a Switch on page 231

Viewing Switch DetailsYou can export configurations from an existing switch to a new switch within the same group. In this case, thenew configuration of the switch overwrites the existing configuration (including the device override).

You can configure parameters of a switch through the UI. By default, these parameters have the valuesconfigured using the switch.

If the switch inherits the group configuration, the configuration parameters are already defined. However, ifrequired, you can edit these parameters.

Aruba Central | User Guide Wired Management | 225

Page 226: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

226 | Wired Management Aruba Central | User Guide

To view the configuration parameters for the switch, complete the following steps:

1. From the app selector, click Wired Management.

2. From the group selector, select a group or a device. The Switches page opens and displays the followinginformation.

Name Description

MAC Address MAC address of the switch.

Hostname Name of the host.

IP Assignment Method of IP assignment as static or DHCP.

IP Address IP address for static IP assignment.

Netmask Netmask for static IP assignment.

Default Gateway Default gateway for static IP assignment.

Table 81: Switches Pane

3. To view the details of the switch, click the MAC address of the switch.

4. To edit the switch configuration parameters, click the edit icon.

Configuring PortsTo view the port details of a switch, complete the following steps:

1. From the app selector, click Wired Management.

2. From the group selector, select a group or a device.

n To configure a Mobility Access Switch, click Switch-MAS.

n To configure other Aruba switches, click Switch-Aruba.

3. Click  Ports. The Ports page displays the list of ports configured on the switch.

For the Aruba Mobility Access Switches, the Ports page displays the following information:

Name Description

Port Number Indicates the number assigned to the switch port.

Admin Status Indicates the operational status of the port.

Port Mode Indicates the mode of operation. The port can be configured to function in Trunk or Access mode.

VLAN Shows the VLAN to which the port is assigned. Based on the port mode, you can assign differenttypes of VLAN.

n For Access mode, an Access VLAN can be specified.n For Trunk mode, the Native VLAN and Allowed VLAN can be configured.

Power overEthernet

Displays the enabled or disabled status of PoE.

AutoNegotiation

Indicates the status of the Auto Negotiation.n If auto negotiation is enabled, the Speed and Duplex fields are automatically set to Auto.

Table 82: Ports Page—Mobility Access Switches

Page 227: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Name Description

n If auto negotiation is disabled, the speed can be set to 10 Mbps, 100 Mbps, or 1 Gbps andthe duplex mode can be set to half or full.

Speed/Duplex Displays the speed and duplex configuration settings for the client traffic.

Trusted Indicates if the port is trusted.

For the other Aruba switches, the Ports page displays the following information:

Name Description

Port Number Indicates the number assigned to the switch port.

Admin Status Indicates the operational status of the port.

Power overEthernet

Displays the enabled or disabled status of PoE.

Access Policy (In) Allows you to apply an existing access policy for the inbound traffic on theport.

Access Policy(Out)

Allows you to apply an existing access policy for the outbound traffic on theport.

Table 83: Ports Page—Aruba Switches

4. To edit port details, click Edit, and configure the port parameters.

5. Click Save.

Configuring VLANsThe Aruba switches support the following types of VLANs:

n Port-based VLANs — In the case of trusted interfaces, all untagged traffic is assigned a VLAN based on theincoming port.

n Tag-based VLANs — In the case of trusted interfaces, all tagged traffic is assigned a VLAN based on theincoming tag.

The Aruba Mobility Access Switch also supports the following types of VLANs.

n Voice VLANs — You can use voice VLANs to separate voice traffic from data traffic when the voice and datatraffic are carried over the same Ethernet link.

n MAC-based VLANs — In the case of untrusted interfaces, you can associate a client to a VLAN based on thesource MAC of the packet. Based on the MAC, you can assign a role to the user after authentication.

Adding VLAN DetailsBy default, all the ports in the Switches are assigned to VLAN 1. However, if the ports are assigned to differentVLANs, the VLANs page displays these details.

To add a VLAN, complete the following steps:

1. From the app selector, click Wired Management.

2. From the group selector, select a group or a device.

Aruba Central | User Guide Wired Management | 227

Page 228: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

228 | Wired Management Aruba Central | User Guide

n To configure a Mobility Access Switch, click Switch-MAS.

n To configure other Aruba switches, click Switch-Aruba.

3. Click VLANs. The VLANs page is displayed.

4. Click + to add a VLAN. The Add VLAN window opens.

5. Configure the following parameters:

n ID—The VLAN ID.

n Description—A short description for VLAN.

n IP Address—IP address of the VLAN interface.

n Netmask—Netmask of the IP address of the VLAN interface.

n DHCP— Slider for enabling DHCP pool associated with the VLAN.

n Access Policy (In)—Access policy assignment to VLAN for the inbound traffic (vlan-in). The VLAN-IN rule is applied for the bridged and routed inbound packets on a VLAN.

n VLAN Port Mode—Port mode to apply on the VLAN. To apply a port, complete the following steps:

a. Select the port number.

b. Select any of the following port modes:

l Tagged Ports—Tagged ports if any. A tagged port will normally carry traffic for multiple VLANs fromthe switch to other network devices such as an upstream router or an edge switch.

l Untagged Ports—Untagged ports if any. In case of untagged ports, the Ethernet frames are notVLAN tagged.

c. Click Apply.

6. Click OK.

Editing the VLAN DetailsTo edit the VLAN details, select the VLAN row and click the edit icon.

Deleting VLAN DetailsTo delete the VLAN details, complete the following steps:

1. Ensure that the VLANs are not tagged to any ports.

2. Click the delete icon for the VLAN you want to delete.

VLAN 1 is the primary VLAN and cannot be deleted.

Configuring Access PoliciesTo restrict certain types of traffic on physical ports of Aruba switches, you can configure ACLs from the CentralUI.

To create an access policy, complete the following steps:

1. From the app selector, click Wired Management.

2. From the group selector, select a group or a device.

3. Click Switch-Aruba> Security. The Security page opens.

Central does not support access policy configuration on Aruba Mobility Access Switches.

4. Click +. The New Access Policy pop-up opens.

Page 229: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

5. Enter a name for the policy.

6. To add a rule to the access policy, click + under Rules, and configure the following parameters:

a. Source—Select a source of the traffic for which you want to an access rule.

b. Destination—Select a destination port.

c. Protocol—Select the type of network port or protocol.

d. Action—Allow or deny access as required.

7. Click Ok.

The access policies must be applied to a Switch port and the VLAN assigned to a port. For more information on,access policy assignment to ports and VLANs, see the following topics:

n Configuring Ports on page 226

n Configuring VLANs on page 227

Configuring DHCP PoolsTo configure a new DHCP pool on a switch, complete the following steps:

1. From the app selector, click Wired Management.

2. From the group selector, select a group or a device.

n To configure a DHCP pool on a Mobility Access Switch, click Switch-MAS > DHCP Pools.

n To configure a DHCP pool on other Aruba switches, click Switch-Aruba > DHCP Pools.

Central does not support DHCP pool configuration on Aruba 2530 Switch Series.

If any of the devices is running a lower version, a warning message is displayed, and the DHCP configurationchanges are pushed only to the devices that support the DHCP. If the devices are upgraded to a supported version ormoved out of the group, the warning message will not be displayed.

3. To activate the DHCP service, select the Enable DHCP service check box. The DHCP service can beenabled only if there is a valid DHCP pool.

4. To edit the DHCP pool details, click the edit icon.

5. To delete a DHCP pool, click the delete icon. When the Do you want to delete <DHCP Pool Name>?pop-up window prompts you, click Yes.

Adding a New DHCP Pool1. To add a new DHCP pool, click New and configure the following parameters:

n Name—Name of the pool.

n Network—A valid network IP address to assigned to the DHCP pool.

n Netmask—Netmask of the DHCP pool.

n Lease Time—The lease time for the DHCP pool in days-hours-minutes format. You can set a maximumvalue of 365 days 23 hours and 59 minutes in the DD-HH-MM format.

n Default Router—IP address of the default router in the subnet. You can add up to 8 IP addresses.

n DNS Server—Address of the DNS server. To add multiple DNS servers, click +. You can add up to 8 DNSservers.

n WINS Server—Address of the WINS server. The WINS server address is required only for the MobilityAccess Switches. To add multiple WINS servers, click +.

n Netbios server—Address of the Netbios server. The Netbios server address configuration is notrequired for Mobility Access Switches. To add multiple WINS servers, click +. You can add up to 8 Netbiosservers.

Aruba Central | User Guide Wired Management | 229

Page 230: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

230 | Wired Management Aruba Central | User Guide

n IP address Range—IP address range within the network and network mask combination.

n Exclude Address Range—IP address range to exclude. This field is available only for the MobilityAccess Switches. To add multiple excluded address range, click +.

n Option—The code and type of the DHCP option to configure. A value within the range of 2-254 withtype as hexadecimal and ASCII is valid.

n Value—The value to assign to the DHCP option. To add multiple values, click +.

2. Click Add.

Applying Configuration Changes through CLI SnippetsCentral allows you to modify switch configuration through the UI menu options. However, if certainparameters are not available for configuration in the UI, Aruba recommends that you use CLI snippets to pushconfiguration changes to switches. You can apply configuration changes from CLI snippets to an individualswitch or for switches provisioned in a UI or template group.

Central does not support CLI snippets for Aruba Mobility Access Switches.

Central does not support CLI snippet based configuration for Aruba switches with 16.05.0000 or later softwareversion if these devices are deployed in template groups.

Central supports variable definitions in CLI snippets only for the switches provisioned in a template group. You canalso use the CLI snippets to override the variable definitions for each device in a template group.

Adding CLI Snippets for Template GroupsTo add a CLI snippet to devices in a template group, complete the following steps:

1. From the app selector, click Wired Management.

2. From the group selector, select a template group. The template configuration menu options aredisplayed.

3. Click Advanced Settings.

n To apply the configuration changes to a specific switch model or firmware version, select the desiredvalues for Model and Version.

n To apply the configuration changes to all Switches provisioned in the template group, select All forModel and Version.

4. Paste the CLI snippet.

5. The configuration in the CLI snippet is applied to the devices matching the selected criteria. The variablesin the CLI snippet are applied to the configuration templates.

Adding CLI Snippets to Switches Provisioned in UI GroupsYou can apply a CLI snippet to a switch both at the group and device levels.

To push configuration changes through the CLI snippet, complete the following steps:

1. From the app selector, click Wired Management.

2. From the group selector, select a UI group. The configuration menu options are for the UI groups aredisplayed.

3. Click Advanced Settings.

n To apply the configuration changes to a specific switch model or firmware version, select the desiredvalues for Model and Version.

Page 231: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

n To apply the configuration changes to all Switches provisioned in the template group, select All forModel and Version.

4. Paste the CLI snippet.

5. Ensure that the CLI snippet does not include variable definitions.

6. Click Save. The configuration changes are added to the devices matching the selected criteria.

Configuring System Parameters for a SwitchThe System menu under Switch-MAS and Switch-Aruba allows you to configure administrator credentialsand enable mode for the switch users.

Configuring Administrator Credentials for Mobility Access SwitchTo configure administrator credentials for a Mobility Access Switch, complete the following steps:

1. From the app selector, click Wired Management.

2. From the group selector, select a group or a device.

3. Click Switch-MAS > System. The System page opens.

4. Enter the password for admin in the Admin Password text box and confirm the administratorpassword.

5. Enter the password for enable mode in the Enable Mode Password text box and confirm the password.

6. Click Save Settings.

Configuring Administrator and Operator Credentials for Other Aruba SwitchesTo configure administrator credentials for other Aruba switches, complete the following steps:

1. From the app selector, click Wired Management.

2. From the group selector, select a group or a device.

3. Enter the username for the administrator user.

4. Enter the password for admin in the Admin Password text box and confirm the administratorpassword.

5. Enter the password for enable mode in the Enable Mode Password text box and confirm the password.

6. To configure the operator user credentials, complete the following steps:

7. Select the Set Operator Username check box.

8. Enter a username and password for the operator user.

9. Confirm the password.

10. Click Save Settings.

Configuring a Name ServerTo set a static IP switches, you must configure a name server. To configure a name server, complete thefollowing steps:

1. From the app selector, click Wired Management.

2. From the group selector, select a group or a device. The switch configuration options are displayed.

n For Aruba Mobility Access Switches, click Switch-MAS.

n To configure other Aruba switches, click Switch-Aruba.

3. Enter the IP address of the name server obtained from the DNS server in the Name Server text box.

Aruba Central | User Guide Wired Management | 231

Page 232: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

232 | Wired Management Aruba Central | User Guide

4. Click Save Settings.

Page 233: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Aruba Switch StackThe Aruba 2920 Switch Series and Aruba 2930M Switch Series devices support stacking. A switch stack is a setof switches that are interconnected through stacking ports. In a switch stack, the switches in the same subnetare configured to use a single IP address. The switches in a stack elect a primary member called commanderand the remaining switches in the stack function as secondary members.

n Aruba 2920 Switch Series—A maximum of four switches can be used for forming a switch stack. Centralsupports management of Aruba 2920 switch stacks running WB.16.04.0008 or later.

n Aruba 2930M Switch Series—A maximum of ten switches can be used for forming a switch stack. Centralsupports management of Aruba 2930M switch stacks running WC.16.06.0000 or later.

For more information on topology and configuration of switch stacks, seeHPE ArubaOS-Switch Managementand Configuration Guide for Aruba 2920 Switch Series and Aruba 2930M Switch Series.

Provisioning Switch Stacks in CentralThe switch elected as the commander establishes a WebSocket connection to Central. The following criteriaapply to provisioning and management of switch stacks in Central.

n Switch stacks can be added only to a template group and cannot be moved to a UI group.

n If the standalone switches in a group join to form a switch stack, the switch is moved to the Unprovisionedstate.

n If a switch stack is moved from a pre-provisioned group to an existing group in the UI, it will be moved toUnprovisioned state.

n After forming a switch stack, you can remove a member and erase its stacking configuration. However, themember can join Central as a standalone switch only after it is deleted from the switch stack.

Configuring Switch StacksThe switch stacks are provisioned under template groups in Central. The template groups allow you toconfigure and modify the settings of a switch stack using configuration templates.

When uploading a configuring template, ensure that the variables are uploaded for all the members of thestack. The template is applied with the variables of the member that is elected as the commander.

To create a configuration template for switch stack, complete the following steps:

1. From the app selector, click Wired Management.

2. From the group selector, select template group to which the switch stack is assigned. The menu optionsfor configuring devices in the template groups are displayed.

3. Click Templates. The Templates page opens.

4. Click + to create a template for the Aruba switch stack.

5. Specify a name for the template.

6. Select Aruba Switch from the Device drop-down list.

7. Select the Aruba Switch model in the Model drop-down list.

8. Select the Aruba Switch software version in the Version drop-down list.

9. Enter the template text in the Template box.

10. Click Save.

Central does not support the use of part number (J-number) in place of Switch model number in configurationtemplates for the Aruba switch stack.

Aruba Central | User Guide Wired Management | 233

Page 234: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

234 | Wired Management Aruba Central | User Guide

The following pre-defined variables are refreshed and re-imported from a switch stack when a new stackmember is added or removed, or when a failover occurs.

n _sys_template_header

n _sys_module_command

n _sys_stack_command

n _sys_oobm_command

n _sys_vlan_1_untag_command

n _sys_vlan_1_tag_command

Monitoring Switch Stacks

StacksThe Monitoring > Switches page displays the status and usage of all switches and switch stacks provisionedin Central. To view information pertaining to switch stacks, on the Switches page, click the List tab and selectthe Stacks option.

The following table describes the information displayed on the Stacks page:

Stacks PaneContent Description

Name Displays the name of the switch stack. A green bullet preceding the stack name indicates that it isUP. A red bullet indicates that the stack is DOWN.

Location Displays the location of the switch stack.

Group Displays a list of switch stacks sorted based on maximum usage. It also shows the data traffictransmitted (Tx) and received (Rx) from clients.

Clients Displays the number of clients connected to the switch stack.

IP Address Displays the IP address of the switch stack.

Table 84: Stacks Page

Stack Details

To view the details of the switch stack, select Monitoring > Switches > List > Stacks pane and click the stackfor which you want to view the details. The Stack Details page opens.

Page 235: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

The following table describes the contents of Stack Details page:

Data PaneContent Description

Status Indicates the operational status of the switch stack.

Uptime Indicates the time since which the switch stack is operational.

Individual stackmembers

Indicates the number of switches forming the switch stack (categorized as member,commander, and standby)

Ports Displays the following details of the switch ports:Graphs

n Throughput—Aggregate client data traffic detected on the switch stackn Connected Clients—Number of clients connected to the switch stack

Table column headersn Port#—Port numbern Oper Stat—Operational status of the switch stackn PoE—PoE status of the portn Type—Type of switch stack portn Mode—Operational mode of the portn Tx Usage—Client data transmission detailsn Rx Usage—Data traffic received from the clients connected to the portn Trusted—Ports marked as trusted.

Uplink Displays the Uplink Stats graph. The graph displays the uplink statistics for the inbound andoutbound data traffic.

Table 85: Stack Details Page

Aruba Central | User Guide Wired Management | 235

Page 236: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

236 | Wired Management Aruba Central | User Guide

Data PaneContent Description

Info Displays the following details for the switch stack:Stack Details

n Stack Name—Name of the switch stackn Split Policy—Details on how the stack is splitn Stack Status—Shows if the switch stack is active or notn Member Count—Shows number of members on the switch stackn Topology—Type of switch stack topology

Member Detailsn Member Serial Number—Serial number of member switch.n Member ID—Member identification numbern Member Status—Status of the membern Serial Number—Serial number of the switch stackn Public IP— The public IP address of the switch stackn Management IP— Management IP address of the switch stackn MAC address—MAC address of the switch stackn Power Consumption— Power drawn from the switch stack in watts (W).n CPU (graph)—percentage of CPU utilization with pointer to Green, Amber, or Redportion of the graph.n Uplink Ports—Displays the uplink statistics of portsn Member Role—Displays member rolen Switch Model Type—Hardware model of the switch stackn Firmware Version—Firmware version of the switch stackn Fan Speed—Fan speed of the switch stack. For the other switches, the Fan Speed fieldshows Ok to indicate that the fan speed is fine.n Group Name—Name of the group to which switch is assignedn Location—Location in which the switch stack is installedn Memory (graph)—Percentage of memory utilization with an indicator to Green, Amber,or Red portion of the graph.

Alerts and Eventlogs

Displays the alerts details and event log generated for this switch stack.Alerts table—Shows Date/Time at which alert is generated and the description for the alertEvent Log table—Shows Date/Time at which the event occurred and a description of theevent.

Map Displays the geographical location of the switch stack.

Table 85: Stack Details Page

Page 237: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Chapter 9Aruba Central APIs

Central supports an API to allow developers to create and manage APIs. It supports polling-based and REST-based APIs. The REST APIs support HTTP GET operations by providing a specific URL for each query. Theoutput for these operations is returned in the JSON format.

API Gateway and NB APIsThe API Gateway feature in Central supports the REST API for all Central services. This feature allows Centralusers to write custom applications, embed, or integrate the APIs with their own applications. For secure accessto the APIs, the Central API Framework plug­-in supports OAuth protocol for authentication and authorization.The access tokens provide a temporary and secure access to the APIs. The access tokens have a limited lifetimefor security reasons and the applications should use the refresh API to obtain new tokens periodically (every 2hours).

List of Supported APIsCentral supports the following APIs for the APs and switches listed in the About Aruba Central section.

API Description

Monitoring Gets network, client, and event details. It also allows you to manage labels and switches.

Configuration Allows you to configure and retrieve the following:n Groupsn Templatesn Devices

AppRF Gets Top N AppRF statistics.

Guest Gets visitor and session details of the portal.

MSP Allows you to manage and retrieve the following of a MSP account:n Customersn Usersn Devices

UserManagement

Allows you to manage users and also allows you to configure various types of users with aspecific level of access control.

Audit EventLogs

Gets a list of audit events and the details of an audit event.

DeviceInventory

Gets device details and device statistics.

Licensing Allows you to manage and retrieve subscription keys.

PresenceAnalytics

Allows you to configure the Presence Analytics application. It also retrieves site and loyaltydata.

Table 86: APIs and Description

Aruba Central | User Guide Aruba Central APIs | 237

Page 238: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

238 | Aruba Central APIs Aruba Central | User Guide

API Description

DeviceManagement

Allows you to manage devices.

Firmware Allows you to manage firmware.

Troubleshooting Gets a list of troubleshooting commands for a specific type of device.

Notification Gets notification alerts generated for events pertaining to device provisioning, configuration,and user management.

Clarity Allows you to retrieve the status of the wireless connection for the devices added in Centraland troubleshoot issues detected in the network.

Refresh APIToken

Allows you to refresh the API token.

Webhook Allows you to add, or delete Webhooks, and get or refresh Webhook tokens.

VisualRF Allows you retrieve information on floor plans, location of APs, clients and rogue devices.

Table 86: APIs and Description

API GatewayTo access API Gateway:

1. From the app selector, click Maintenance.

2. Click the API Gateway menu option. The API Gateway page is opens. The API Gateway page allowsyou to get new tokens and refresh the old tokens. To obtain a new token application, you must setauthentication parameters for a user session.

For enabling API Gateway license, contact your Aruba sales representative.

Using OAuth 2.0 to Access APIFor secure access to the APIs, the Central API Framework plug-in supports OAuth protocol for authenticationand authorization. OAuth 2.0 is a simple and secure authorization framework. It allows applications to acquirean access token for Central through a variety of work flows supported within the OAuth2 specification.

All OAuth2 requests must use the SSL endpoint available at https://app1-apigw.central.arubanetworks.com.

Access and Refresh TokensThe access token is a string that identifies a user, app, or web page and is used by the app to access an API. Theaccess tokens provide a temporary and secure access to the APIs.

The access tokens have a limited lifetime. If the application uses web server or user-agent OAuthauthentication flows, a refresh token is provided during authorization that can be used to get a new accesstoken.

If you are writing a long running applications (web app) or native mobile application you should refresh thetoken periodically. For more information, see Refreshing a token on page 241.

Creating an application

Page 239: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

To create an application, complete the following steps:

1. From the app selector, click Maintenance.

2. Click the API Gateway menu option. The API Gateway page is displayed.

3. Click Authorized Apps & Tokens.

4. Click + Add Apps & Tokens.

5. Enter a name for the application in the Application Name field and click Generate. A new application iscreated and added to the Authorized Apps & Tokens table. The Authorized Apps & Tokens tabledisplays the following:

n Name—Name of the application.

n Client ID—Unique ID for each application.

n Client Secret—Unique secret ID for each application.

n Tokens—An application can have multiple tokens. Click View Tokens to view the list of tokens.

n Created At—Date on which the application was created.

n Actions—Click the Delete icon on the row corresponding to an application and click Yes to delete thatapplication.

After an application is created, go to the Authorized Apps & Tokens page and click View Tokens. In the Token Listpop-up window, you can view the user ID(s) associated to the application in the User Name column. An application can beassociated to multiple users.

Obtaining TokensThe users can generate the OAuth token using one of the following methods:

n Offline token download

n Authorization code grant

Offline Token MechanismTo obtain tokens using the offline token method, complete the following steps:

1. From the app selector, click Maintenance.

2. Click the API Gateway menu option. The API Gateway page is displayed.

3. Click Authorized Apps & Tokens.

4. Click + Add Apps & Tokens.

5. Click View Tokens to view the tokens associated to a specific application. The Token List pop-upwindow opens and displays the following:

n Token ID—Token ID of the application.

n User Name—Name of the user to whom this token is associated to. An application can be associated tomultiple users.

n Generated At—Date on which the token was generated.

n Revoke Token—Click Revoke Token and click Yes to revoke the token associated to a particular user.For example, if two users are associated to an application and if you want to remove access to aparticular user, revoke the token associated to that user.

n Download Token—Click Download Token to download the token.

Aruba Central | User Guide Aruba Central APIs | 239

Page 240: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

240 | Aruba Central APIs Aruba Central | User Guide

Authorization Code GrantThe following section describes the procedure for obtaining the access token and refresh token using theauthorization code grant mechanism:

Step 1: Create an ApplicationCreate an application in Aruba Central. For more information, see Creating an application on page 238.

Make a note of the following:

n Client ID

n Client Secret

Step 2: Identify the Base URLThe following example shows the base URL:

https://app1-apigw.central.arubanetworks.com

Step 3: Generating Client CredentialsTo generate client credentials, use the following URI and the request method:

Request Method—POST

URI—https://app02-azw-t hd.attwifi.com/oauth2/authorize/central/api/client_credentials?client_id=<msp_client_id>

POST Request Body(JSON):{

"customer_id": "<tenant_id>"

}

RequestHeader: (Values from login API request)Set-Cookie: csrftoken=xxxx;session=xxxx;

Response Body(JSON):{

"client_id": "<new-client-id>",

"client_secret": <new-client-secret>"

}

Step 4: Log in and Authenticate Using Your Aruba Central CredentialsAppend the base URL with the following:

/oauth2/authorize/central/api/login

URL:https://app1-apigw.central.arubanetworks.com/oauth2/authorize/central/api/login

This endpoint is accessible over SSL. The HTTP (non-SSL) connections are redirected to the SSL port. Theendpoint validates the user session. For Central, the SSO authentication page is presented. After successfulauthentication, a consent page is shown requesting the resource owner (the customer who has logged in) togive access to the APIs.

Request: Craft an HTTP POST request containing the username, password, and client ID of the application.

Response: The response contains the Cross-Site Request Forgery (CSRF) token and session key that arenecessary for obtaining the authorization code.

Page 241: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Step 5: Obtain an Authentication CodeAppend the base URL with the following:

/oauth2/authorize/central/api

URL:https://app1-apigw.central.arubanetworks.com/oauth2/authorize/central/api

This endpoint is accessible over SSL. The HTTP (non-SSL) connections are redirected to the SSL port. Thisendpoint is a POST call to get an authorization code.

Request: Craft an HTTP POST request containing the customer ID, client ID, CSRF token, and session key.

Response: The response contains the authorization code that is necessary for obtaining the access token andrefresh token.

Step 6: Exchange the Authentication Code for the Access and Refresh TokensAppend the base URL with the following:

/oauth2/token

URL:https://app1-apigw.central.arubanetworks.com/oauth2/token

This endpoint is accessible over SSL. The HTTP (non-SSL) connections are redirected to the SSL port. Theendpoint is a POST call to get the access token and refresh token using the authorization code obtained fromthe server. This exchange must be done within 300 seconds of obtaining the authorization code from step 4.Otherwise, the API returns an error.

Request: Craft an HTTP POST request containing the client ID, client secret, and authentication code.

Response: The response contains the access token and refresh token. The access token will expire in 2 hours.

Refreshing a tokenTo refresh the access token, access the following URL:

https://app1-apigw.central.arubanetworks.com/oauth2/token

This endpoint is accessible over SSL. The HTTP (non-SSL) connections are redirected to SSL port.

URL Description

https://app1-apigw.central.arubanetworks.com/oauth2/token

The endpoint is a POST call to refresh the access token using therefresh token obtained from the step 2.

Table 87: Refresh Tokens

Aruba Central | User Guide Aruba Central APIs | 241

Page 242: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

242 | Aruba Central APIs Aruba Central | User Guide

The query parameters for the API are as follows:

Parameter values Description

client_id A uniquehexadecimalstring

A unique identifier that identifies the caller. The application developers canrequest a client ID and client secret key by registering with the Aruba TechnicalSupport.

client_secret A uniquehexadecimalstring

The client secret is a unique identifier provided to each developer at the time ofregistration. The application developers can request a client ID and client secretby registering with the Aruba Technical Support.

grant_type refresh_token

The grant_type must be refresh_token to refresh the token.

refresh_token refresh_tokenreceivedfrom step 2

A string representing the authorization granted to the client by the resourceowner.

Table 88: Query Parameters for Refresh Tokens

A JSON dictionary with the following values is returned as a response.

Parameter values Description

token_type bearer Identifies the token type. Only the bearer token type is supported. For moreinformation, see https://tools.ietf.org/html/rfc6750.

refresh_token string Refresh tokens are credentials used to renew or refresh the access_token when itexpires without going through the complete authorization flow. A refresh token is astring representing the authorization granted to the client by the resource owner.

expires_in seconds The expiration duration of the access tokens in seconds.

access_token string Access tokens are credentials used to access the protected resources. An accesstoken is a string representing an authorization issued to the client.

ExampleRequest: ( Method = POST )

https://app1-apigw.central.arubanetworks.com/oauth2/token?client_id=98273576d558401581c425d5bd9df213&grant_type=refresh_token&refresh_token=1272ddc5f4c94683b7ac3080f39503f9&client_secret=e20f3fad10dc4c41bf291a49e85a3b29

Response{

"refresh_token": "bbf16f785a32435590627affd2a2ecdc",

"token_type": "bearer",

"access_token": "889479cac74e4b299723cc9a6f8f9d08",

"expires_in": 7200

}

Page 243: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Accessing APIsTo access the API, use the following URL:

https://app1-apigw.central.arubanetworks.com/.

This endpoint is accessible over SSL and the HTTP (non-SSL) connections are redirected to the SSL port.

URL Description

https://app1-apigw.central.arubanetworks.com/

The API gateway URL. All APIs can be accessed from this URL by providing acorrect access token.

Table 89: Accessing the API

The query parameters for the API are as follows:

Parameter values Description

request_path URL Path UTL path of an API, for example, to access monitoring APIs, use the path/monitoring/v1/aps.

access_token access_token

Pass the token string in URL parameter that is obtained in step 2.

Table 90: Query Parameters for the API

ExampleRequest: (Method=Get)

https://app1-apigw.central.arubanetworks.com/monitoring/v1/aps?access_token=e325c0fb3f1547b5b735de3221690c2f

Response:{

"aps": [

{

"firmware_version": "6.4.4.4-4.2.3.1_54637",

"group_name": "00TestVRK",

"ip_address": "10.29.18.195",

"labels": [

"Filter_242",

"Ziaomof",

"roster",

"242455",

"Diegso"

],

"macaddr": "6c:f3:7f:c3:5d:92",

"model": "AP-134",

"name": "6c:f3:7f:c3:5d:92",

"radios": [

{

"band": 0,

"index": 1,

"macaddr": "6c:f3:7f:b5:d9:20",

"status": "Down"

},

{

Aruba Central | User Guide Aruba Central APIs | 243

Page 244: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

244 | Aruba Central APIs Aruba Central | User Guide

"band": 1,

"index": 0,

"macaddr": "6c:f3:7f:b5:d9:30",

"status": "Down"

}

],

"serial": "AX0140586",

"status": "Down",

"swarm_id": "e3bf1ba201a6f85f4b5eaedeead5e502d85a9aef58d8e1d8a0",

"swarm_master": true

}

],

"count": 1

}

Viewing APIsTo view the APIs managed through Central, complete the following steps:

1. From the app selector, click Maintenance.

2. Click the API Gateway menu option. The API Gateway page with the list of published APIs is displayed.

3. To view the details of an API, click Details.

4. To view the API documentation, click the link in the Documentation column next to the specificpublished API name. The documentation is displayed in a new window.

Viewing TokensTo view tokens, complete the following steps:

1. From the app selector, click Maintenance.

2. Click the API Gateway menu option. The API Gateway page is displayed.

3. Click Authorized Apps & Tokens.

4. To view tokens, click the View Tokens link for the specific App & Token name. The Token List pop-upwindow opens..

Revoking TokensTo revoke tokens, complete the following steps:

1. From the app selector, click Maintenance.

2. Click the API Gateway menu option. The API Gateway page is displayed.

3. Click Authorized Apps & Tokens.

4. o view tokens, click the View Tokens link for the specific App & Token name. The Token List pop-upwindow opens.

5. To revoke tokens, click Revoke Token in the Token List window.

Adding a New TokenTo add a new token, complete the following steps:

1. From the app selector, click Maintenance.

2. Click the API Gateway menu option. The API Gateway page is displayed.

Page 245: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

3. Click Authorized Apps & Tokens.

4. Click + Add Apps & Tokens to add a new token.

5. Enter the application name and then click Generate.

API DocumentationFor a complete list of APIs and the corresponding documentation, see https://app1-apigw.central.arubanetworks.com/swagger/central.

Aruba Central | User Guide Aruba Central APIs | 245

Page 246: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Chapter 10Maintenance

The Maintenance application displays the maintenance-related menu options. The Maintenance applicationconsists of the following menus:

n Managing Firmware Upgrades

n Troubleshooting Devices

n Viewing Audit Trails

n Aruba Central APIs

Managing Firmware UpgradesThe Firmware menu in the Maintenance app provides an overview of the latest supported version offirmware for the device, details of the device, and the option to upgrade the device.

Viewing Firmware DetailsTo view the firmware details for devices provisioned in Central:

1. From the app selector, click Maintenance.

2. Click Firmware. The Firmware window opens and displays the following information:

Data Pane Item Description

Search Filter Allows you to define a filter criterion for searching devices based on the host name, MACaddress, location, firmware version, and the current upgrade status of the device.

Filter by UpgradeStatus

Filters the device list based on any of the following firmware upgrade status:n Show Alln Need upgraden Scheduledn In progressn Failedn Upgrade not required

Show All is selected by default.

Virtual Controllers Displays the following information:n VC Name—Name of the VC.n APs—Number of APs associated to VC.n Firmware Version—The current firmware version running on the device.n Latest Firmware Version—The latest firmware version available on the publicfirmware server.n Firmware compliance—Status of the firmware compliance setting.n Status—Firmware upgrade status.

Table 91: Firmware Maintenance

Aruba Central | User Guide Maintenance | 246

Page 247: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

247 | Maintenance Aruba Central | User Guide

Data Pane Item Description

Switch-MAS Displays the following details about Aruba switches managed through Central:n Host name—Host name of the switch.n MAC Address—MAC address of the switch.n Model—Hardware model of the switch.n Firmware Version—The current firmware version running on the switch.n Latest Available Version—The latest firmware version available for the switchplatform.n Firmware compliance—Status of the firmware compliance setting.n Status—The upgrade status of the switch.

Switch-Aruba

Continue Allows you to continue with firmware upgrade.

FirmwareComplianceSetting

Allows you to view a list of supported firmware versions for each device in a group.

Update All Allows you to simultaneously upgrade firmware for multiple devices.

Cancel Upgrade Cancels a scheduled upgrade.

Cancel All Cancels a scheduled upgrade for all devices.

Table 91: Firmware Maintenance

Upgrading a DeviceTo check for a new version on the image server in the cloud, complete the following steps:

1. From the app selector, click Maintenance app.

2. Click Firmware.

3. To upgrade firmware for devices in a specific group, select a group from the group selection filter bar.

4. Select one or several devices to upgrade.

5. Click Continue. The Upgrade <Device> Firmware pop-up window opens.

6. Select a firmware version. You can either select a recommended version or manually choose a specificfirmware version.

To obtain custom build details, contact Aruba Central Technical Support.

7. Select Auto Reboot if you want Central to automatically reboot after device upgrade.

The Auto Reboot option is available for Mobility Access Switches and Aruba Switches.

8. Specify if the upgrade must be carried out immediately or at a later date and time.

9. Click Upgrade. The device downloads the image from the server, saves it to flash, and reboots.Depending on the progress and success of the upgrade, one of the following messages is displayed:

n Upgrading — While image upgrade is in progress.

n Upgrade failed — When the upgrade fails.

10. If the upgrade fails, retry upgrading your device.

Page 248: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

After upgrading a switch, click Reboot.

Forcing Firmware UpgradeCentral now allows you to run a firmware compliance check and force firmware upgrade for devices in a group.To force a specific firmware version for all AP devices or Switches in a group, complete the following steps:

1. From the app selector, click the Maintenance app.

2. Click Firmware.

3. Verify the firmware upgrade status for the device.

4. Click the settings icon at the top right corner. The Firmware Compliance Setting window opens.

5. Select the devices and the firmware versions for upgrade.

6. Select Auto Reboot if you want Central to automatically reboot the device after a successful deviceupgrade.

7. Click Save. Central initiates a firmware upgrade operation only for the devices that support the selectedfirmware version. If any of selected devices do not support the firmware version selected for the upgrade, alist of unsupported devices is displayed.

Viewing Audit TrailsThe Audit Trail page shows the logs for all the device management, configuration, and user managementevents triggered in Central.

You can search or filter the audit trail records based on any of the following columns:

n Time (All, Today, Last 3 months, Custom Range)

n Username

n IP Address

n Classification

n Target

n Details

To view the audit trail log details in Central:

1. From the app selector, click Maintenance.

2. Click Audit Trail. By default, audit trails are displayed for all devices. Perform any of the followingactions:

n To view audit trails for a specific group, select a group from the group selection filter bar.

n To view audit trails for a specific device, select the device from the group selection filter.

n To view audit trails for a device from another group, switch to the group in which the device is available,and select the device from the list of devices in the group selection filter bar.

Viewing Audit Trails in the Standard Enterprise PortalThe Audit Trail logs are displayed for the following types of operations in the Standard Enterprise Portal:

n Device status and configuration

n Firmware upgrade

n Device assignment to subscriptions and groups

Aruba Central | User Guide Maintenance | 248

Page 249: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

249 | Maintenance Aruba Central | User Guide

n Label assignment to devices

n User addition and deletion

n License reconciliation

The Audit Trail page in the Standard Enterprise portal displays the following details:

Data PaneContent Description

Time Time stamp of the events for which the audit trails are shown.

Username The username of the admin user who applied the changes.

IP Address IP address of the client device.

Classification Type of modification and the affected device management category.

Target The group or device to which the changes were applied.

Details A short description of the changes such as subscription assignment, firmware upgrade, andconfiguration updates.NOTE: Complete details of the event can be seen by clicking the ellipsis. For example, if an eventwas not successful, clicking the ellipsis displays the reason for the failure.

Table 92: Audit Trail Pane in the Standard Enterprise View

Troubleshooting DevicesThis section includes the following topics:

n Troubleshooting Overview

n Troubleshooting a Device

Troubleshooting OverviewThe Troubleshooting menu in the Maintenance application allows the administrators and the users withread-write access to run the troubleshooting or diagnostics commands directly on the devices. When atroubleshooting session begins, Central establishes a session with the devices selected for the troubleshootingoperation, retrieves the output of the selected diagnostics commands, and displays the output in the UI.

Central supports the troubleshooting operations at the device level, group level, and also at the All Deviceslevel. If the user access is restricted to only certain groups within a network, Central allows the users to run thetroubleshooting commands only on the devices in these groups. Similarly, the users with the administrator orread-write access to All Devices can execute the troubleshooting commands on the entire list of devicesassociated with a user account.

The users can run commands at a given time or set a periodic interval at which the selected commands can berun.

If you want to run the troubleshooting commands on an Instant AP, ensure that the Instant AP is upgraded to 6.4.3.1-4.2.0.3 or later firmware versions.

Page 250: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Troubleshooting a DeviceTo run troubleshooting commands on a device, complete the following steps:

1. From the app selector, click Maintenance and select Troubleshooting. The Troubleshooting pageopens.

2. Select the device category. Table 93 describes the contents of the Troubleshooting page:

Data Pane Item Description

Access Points Allows you to run the troubleshooting commands on an AP.

AP Name Allows you to select the devices for troubleshooting. You can also search for a specificdevice by typing the first few letters of the device name. Central allows you to select up to 10devices for a troubleshooting operation.

Switches Allows you to run the troubleshooting commands on a Switch.

Switch Name Allows you to specify the devices for troubleshooting.

Tools Allows you to run the following commands from the UI:n Access Points

l Pingl Traceroutel Speed-Test

n Switch - MASl Pingl Traceroute

n Switch - Arubal Pingl Traceroutel LED Chassislocatel POE Bouncel Interface Bounce

To execute a command, complete the following steps:1. From the Tools drop-down list, select the type of command to run.2. Specify the following detail, as appropriate:

l Host name or IP address of the device on which you want to run the command.l Protocol over which the speed test must be performed.l In the Options field, enter any command parameter that needs to be executedafter the speed test. For example, bandwidth.l Status of the Chassis Locator LED. Possible values are on, off, or blink.

3. Click the command name.

Commands Category—Allows you to select a category. The troubleshooting commands are segregatedunder the following categories:Access Points

n Wirelessn Securityn Networkn Airgroupn Systemn ARMn Datapathn Logsn Centraln Cluster Security

Table 93: Contents of the Troubleshooting Page

Aruba Central | User Guide Maintenance | 250

Page 251: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

251 | Maintenance Aruba Central | User Guide

Data Pane Item Description

n Speed Testn OFC

Switch- MASn Physical Connectionn Trafficn Configurationn Media Access

Switch - ArubaOn selecting a category, the commands grouped under that category are displayed. You canselect one or several commands to run on the devices.

Run Executes the troubleshooting commands on the selected devices.

Auto Run Sets a schedule for running the troubleshooting commands at specific user-definedintervals.

Filter Sets a filter criteria for the command output. Enter a search text string to filter thecommand output. For example, if you enter DPI in the Filter text box, only the commandoutput with the DPI text is displayed.

Clear All Clears all the output.

Export All Exports the output files generated for each device in a zip file.

Send Email Allows you to send the output as an email.

Output pane Shows the output for the commands that are run. The output contains commands with theUTC time stamp and is segregated per device. To view the command output for a specificdevice, select the Instant AP from the list of devices in the Output pane.

Table 93: Contents of the Troubleshooting Page

4. To troubleshoot an AP, click the Access Points tab, specify the AP name. If the desired AP is not listed,type the first few letters or digits of the device name. The drop-down list displays a list of APs matching thetext string you typed.

5. To troubleshoot a Switch, click the Switch- MAS or Switch - Aruba tab and specify the name of theSwitch.

6. Select a category and the commands to run under that category.

7. To run commands from a different category, select another category and the commands grouped underthat category.

8. Click Run. The command output is displayed.

9. To set a frequency for automatically running the troubleshooting commands, perform the followingactions:

a. Click Auto Run.

b. Specify the interval within a range of 30 seconds to 1 hour.

c. Select the duration for running the troubleshooting commands within a range of 1 minute to 1 hour.

d. Click Start.

Troubleshooting Aruba Switches for Port Bounce

Bouncing means disabling and then enabling a port. Interface port bounce causes link flap to connecteddevices and there is no power reboot. The PoE port bounce recycles the power on port and hence devicespowered over this port are rebooted.

Page 252: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

The customer helpdesk has the ability to bounce any port that is configured for NAC. NAC refers to the RADIUSrequests sent to Central customers for authorizing devices on specific ports—say, IP cameras, PoS systems.The customer helpdesk will only be able to toggle the PoE status on these specific ports. POE Bounce andInterface Bounce options are available in the Central for troubleshooting Aruba Switches.

n POE Bounce: This option helps you to restart the PoE port and the device that is either connected to thePoE port or powered by it.

n Interface Bounce: This option helps you to restart the interface port.

To troubleshoot Aruba Switches for POE port bounce or interface port bounce:

1. From the app selector, click Maintenance and then click Troubleshooting.

2. Click the Switches tab.

3. Select an Aruba switch name from Switch Name.

4. Select Tools for Troubleshooting.

5. Select POE Bounce from Tools if you want to bounce a POE port.

To bounce an Interface port, select Interface Bounce from Tools.

6. Enter the port number for Port.

7. Click POE Bounce.

Had you selected Interface Bounce from Tools, you must click Interface Bounce.

Aruba Central | User Guide Maintenance | 252

Page 253: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Chapter 11Guest Access

The guest management feature allows guest users to connect to the network and at the same time, allows theadministrator to control guest user access to the network.

Central allows administrators to create a splash page profile for guest users. Guest users can access theInternet by providing either the credentials configured by the guest operators or their respective socialnetworking login credentials. For example, you can create a splash page that displays a corporate logo, colorscheme and the terms of service, and enable logging in from a social networking service such as Facebook,Google +, Twitter, and LinkedIn.

Businesses can also pair their network with the Facebook Wi-Fi service, so that the users logging into Wi-Fihotspots are presented with a business page, before gaining access to the network.

To enable logging using Facebook, Google+, Twitter, and LinkedIn credentials, ensure that you create anapplication (app) on the social networking service provider site and enable authentication for that app. Thesocial networking service provider will then issue a client ID and client secret key that are required forconfiguring guest profiles based on social logins.

Guest operators can also create guest user accounts. For example, a network administrator can create a guestoperator account for a receptionist. The receptionist creates user accounts for guests who require temporaryaccess to the wireless network. Guest operators can create and set an expiration time for user accounts. Forexample, the expiration time can be set to 1 day.

For more information, see the following topics:

n Guest Access Dashboard on page 253

n Creating Apps for Social Login on page 254

n Configuring a Cloud Guest Splash Page Profile on page 257

n Configuring Visitor Accounts on page 266

Guest Access DashboardThe Overview page in the Guest Access application provides a dashboard displaying the number of guests,guest SSID, client count, type of clients, application usage, and guest connection for the selected group.

Table 94 describes the contents of the Guest Access Overview page:

Data Pane Item Description

Time Range Time range for the graphs and charts displayed on the Overview pane. You can choose toview graphs for a time period of 1 day, 1 week, and 1 month.

Guests Number of guests connected to the SSIDs with Cloud Guest splash page profiles.

Guest SSID Number of guest SSIDs that are configured to use the Cloud Guest splash page profiles.

Table 94: Guest Access Overview Page

Aruba Central | User Guide Guest Access | 253

Page 254: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

254 | Guest Access Aruba Central | User Guide

Data Pane Item Description

Avg. Duration The average duration of client connection on the SSIDs with Cloud Guest splash pageprofiles.

Max ConcurrentConnections

Maximum number of client devices connected concurrently on the guest SSIDs.

Guest Connection(graph)

Time stamp for the client connections on the cloud guest for the selected time range.

Guest Count byAuthentication

Number of client devices based on the authentication type configured on the cloud guestSSIDs.

Guest Count bySSID

Number of guest connections per SSID.

Client Type Type of the client devices connected on the guest SSIDs.

Application Usage The application usage by the guest clients connected to the Instant APs on which the DeepPacket Inspection feature is enabled.

Creating Apps for Social LoginThe following topics describe the procedures for creating applications to enable the social login feature:

n Creating a Facebook App on page 254

n Creating a Google App on page 255

n Creating a Twitter App on page 256

n Creating a LinkedIn App on page 256

Creating a Facebook AppBefore creating a Facebook app, ensure that you have a valid Facebook account and you are registered as aFacebook developer with that account.

To create a Facebook app, complete the following steps:

1. Visit the Facebook app setup URL at https://developers.facebook.com/apps.

2. From My Apps, select Add a New App.

3. Enter the app name and your email address in the Display Name and Contact Email text boxes,respectively.

4. Click Create App ID.

5. Hover the mouse on Facebook Login and select Setup.

6. Click Web (that is, the WWW platform).

7. Enter the website URL in the Site URL box. This URL is the same as the server URL mapped in the splashpage configuration.

8. Click Save.

9. Read through the Next Steps section for further information on including Login Dialog, Access Tokens,Permissions, and App Review.

10. Go to PRODUCTS > Facebook Login > Settings from the left navigation menu.

Page 255: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

11. Click the Client OAuth Login toggle switch to turn to Yes.

12. Enter the OAuth URI in the Valid OAuth redirect URIs box. The URI is the server URL mapped in thesplash configuration with /oauth/reply appended to it. To get the valid Oauth redirect URL, go to theGuest Access > Splash Pages path and click the eye ( ) icon available against the specific splash pagename in the Splash Pages table.

Ensure that the URL is an HTTPS URL with a domain name and not the IP address. For example,https://example1.cloudguest.arubanetworks.com/oauth/reply.

13. From the left navigation menu, select App Review.

14. Select the Make <App Name> Public toggle switch to make your app available to public.

15. Click Category.

16. In the Choose a Category pop-up window, select a category.

17. Click Confirm.

18. Select other extra permissions you want to provide for the users of your app. There are 41 permissionsavailable for you to select from.

19. Click Add xx Items, where x represents the number of permissions you selected.

20. Enter the reason for providing specific permissions and click Save.

21. Click Submit for Review.

22. On the left navigation pane, click the Settings icon. Note the app ID and app secret key. Use the app IDand secret key when configuring Facebook login in the Central UI.

23. Under App Domains, enter the server URL.

Creating a Google AppBefore creating a an app for Google+ based login, ensure that you have a valid Google+ account.

To create a Google+ app, complete the following steps:

1. Access the Google Developer site at https://code.google.com/apis/console.

2. To select an existing project, click Select a project and select the desired project.

3. If the project is not created, click Create a project, enter the project name and click Create.

4. Click Enable APIs and Services.

5. Navigate to Social category, and then click Google+ API. The Google+ API window opens.

6. To enable the API, click Enable.

7. Click Create Credentials. If the credentials are already created, click Go to credentials.

8. In the Credentials pane, perform the following actions:

n Under the Where will you be calling the API from section, select Web Browser.

n Under the What data you will be accessing section, select User Data.

n Click What Credentials do I need.

9. Under Create an OAuth 2.0 client ID. Enter the OAuth 2.0 Client ID Name.

10. Under Authorized JavaScript Origins, enter the base URL with FQDN of the cloud guest instancethat will be hosting the captive portal. For example, https://%hostname%/.

11. Under Authorized Redirect URIs, enter the cloud server OAuth reply URL that includes the FQDN ofthe cloud server instance with /oauth/reply appended at the end of the URL.

Aruba Central | User Guide Guest Access | 255

Page 256: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

256 | Guest Access Aruba Central | User Guide

Ensure that the URL is an HTTPS URL with a domain name and not the IP address. For example,https://example1.cloudguest.examplenetworks.com/oauth/reply.

12. Click Create Client ID.

13. Under Set up the OAuth 2.0 consent screen, provide your Email Address and product name, andthen click Continue. The client ID is displayed.

14. Click Done. A page showing the OAuth Client IDs opens.

15. Click the Oauth client ID to view the client ID and client secret key. Use this client ID and client secretkey when configuring Google+ login in the Central UI.

Creating a Twitter AppBefore creating a Twitter app, ensure that you have a valid Twitter accosunt.

To create a Twitter app, complete the following steps:

1. Visit the Twitter app setup URL at https://apps.twitter.com.

2. Click Create New App. The Create an application web page is displayed.

3. Enter the application name and description.

4. For OAuth 2.0 Redirect URLs, enter the HTTPS URL of the cloud guest server to which you want toconnect this social authentication source, and append /oauth/reply at the end of the URL.

Ensure that the URL is an HTTPS URL with a domain name and not the IP address. For example,https://exa.example.com/oauth/reply.

5. Select Yes, I agree to accept the Developer Agreement terms.

6. Click Create a Twitter application.

7. Click Manage Keys and Access Tokens. The Keys and Access Tokens tab opens. The consumer key(API key) and consumer secret (API key) are displayed.

8. Note the ID and the secret key. The consumer key and consumer secret key when configuring Twitterlogin in Central UI.

Creating a LinkedIn AppBefore creating a LinkedIn app, ensure that you have a valid LinkedIn account.

To create a LinkedIn app, complete the following steps:

1. Visit the LinkedIn app setup URL at https://developer.linkedin.com.

2. Click My Apps. You will be redirected to https://www.linkedin.com/secure/developer/apps.

3. Click Create Application. The Create a New Application web page is displayed.

4. Enter your company name, application name, description, website URL, application logo with thespecification mentioned, application use, and contact information.

5. Click Submit. The Authentication page is displayed.

6. Note the client ID and client secret key displayed on the Authentication page.

7. For OAuth 2.0 Redirect URLs, enter the HTTPS URL of the cloud guest server to which you want toconnect this social authentication source and append /oauth/reply at the end of the URL.

8. Click Add and then click Update. The API and secret keys are displayed.

Page 257: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

9. Note the API and secret key details. Use the API ID and secret key when configuring LinkedIn login in theCentral UI.

Configuring a Cloud Guest Splash Page ProfileThis topic describes the following procedures:

n Adding a Cloud Guest Splash Page Profile on page 257

n Customizing a Splash Page Design on page 261

n Previewing and Modifying a Splash Page Profile on page 261

n Localizing a Cloud Guest Portal on page 262

n Associating a Splash Page Profile to an SSID on page 265

Adding a Cloud Guest Splash Page ProfileTo create a splash page profile:

1. From the app selector, click Guest Access. The guest access configuration and management menuoptions are displayed.

2. Click Splash Page. The Splash Page pane is displayed.

3. Select a group from the group selector. You can create splash page profiles only for the individual groups.The splash page creation function is not available if the page view is set to All Devices.

4. To create a new Splash page, Click the + icon. The New Splash Page pane is displayed.

5. On the Configuration tab, configure the parameters described in the following table:

Data PaneContent Description

Name Enter a unique name to identify the splash profile.NOTE: If you attempt to enter an existing splash profile's name, Central displays amessage stating that Splash page with this name already exists.

Type Configure any of the following authentication methods to provide a secure network accessto the guest users and visitors.

n Anonymousn Authenticatedn Facebook Wi-Fi

Anonymous Configure the Anonymous login method if you want to allow guest users to log in to theSplash page without providing any credentials.For anonymous user authentication, you can also enable a pre-shared key to allow access.To enable a pre-shared key based authentication, set the Guest Key to ON and specify apassword.

AuthenticatedConfigure authentication and authorization attributes, and login credentials that enableusers to access the Internet as guests. You can configure an authentication method basedon sponsored access and social networking login profiles.The authenticated options available for configuring the cloud guest splash page aredescribed in the following rows.

Table 95: Splash Page Configuration

Aruba Central | User Guide Guest Access | 257

Page 258: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

258 | Guest Access Aruba Central | User Guide

Data PaneContent Description

Username/Password

The Username/Password based authentication method allows pre-configured visitors toobtain access to wireless connection and the Internet. The visitors or guest users canregister themselves by using the splash page when trying to access the network. Thepassword is delivered to the users through print, SMS or email depending on the optionsselected during registration.To allow the guest users to register by themselves:

1. Enable Self-Registration.2. Set the Verification Required to ON if the guest user account must be verified.3. Specify a verification criteria to allow the self-registered users to verify throughemail or phone.n If email-based verification is enabled and the Send Verification Link is selected, averification link is sent to the email address of the user. The guest users can click thelink to obtain access to the Internet.n If phone-based verification is enabled, the guest users will receive an SMS. Theadministrators can also customize the content of the SMS by clicking on CustomizeSMS.4. Specify the duration within the range of 1-60 minutes, during which the users canaccess free Wi-Fi to verify the link. The users can log in to the network for the specifiedduration and click the verification link to obtain access to the Internet.

By default, the expiration date for the accounts of self-registered guest users is set toinfinite during registration. The administrator or the guest operator can set the expirationdate after registration.

Social Login

Social Login—Enable this option to allow guest users to use their existing login credentialsfrom social networking profiles such as Facebook, Twitter, Google+, or LinkedIn and signinto a third-party website. When a social login based profile is configured, a new loginaccount to access the guest network or third-party websites is not required.

n Facebook— Allows guest users to use their Facebook credentials to log in to thesplash page. To enable Facebook integration, you must create a Facebook app andobtain the app ID and secret key. For more information on app creation, see Creating aFacebook App. Enter the app ID and secret key for client ID and client Secretrespectively to complete the integration.n Twitter—Allows guest users to use their Twitter credentials to log in to the splashpage. To enable Twitter integration, you must create a Twitter app and obtain the appID and secret key. For more information, see Creating a Twitter App. Enter the app IDand secret key for client ID and client secret respectively to complete the integration.n Google+—Allows guest users to use their Google+ credentials to log in to the splashpage. To enable Google+ integration, you must create a Google app and obtain the appID and secret key. For more information, see Creating a Google App .

1. Enter the app ID and secret key for client ID and client secretrespectively.2. To restrict authentication attempts to only the members of a Googlehosted domain, enter the domain name in the Gmail for Work Domaintext box. Ensure that you have a valid domain account licensed byGoogle Domains or Google Apps. For more information see:n https://apps.google.com/intx/en_in/n https://domains.google.com/about/3. Specify a text for the Sign-In button.

n LinkedIn—Allows guest user to use their LinkedIn credentials to log in to the splashpage. To enable LinkedIn integration, you must create a LinkedIn app and obtain theapp ID and secret key. For more information, see Creating a LinkedIn App. Enter theapp ID and secret key for client ID and client secret respectively to complete theintegration.

Table 95: Splash Page Configuration

Page 259: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Data PaneContent Description

Facebook Wi-Fi

If you want to enable network access through the free Wi-Fi service offered by Facebook.Select the Facebook Wi-Fi option. The Facebook Wi-Fi feature allows you to pair yournetwork with a Facebook business page, thereby allowing the guest users to log in fromWi-Fi hotspots using their Facebook credentials.If the Facebook Wi-Fi business page is set up, when the users try to access the Internet, thebrowser redirects the user to the Facebook page. The user can log in with their Facebookaccount credentials and can either check in to access free Internet or skip checking in andthen continue.

Facebook Wifi Con-figuration

After selecting the Facebook Wi-Fi option, complete the following steps to continue with theFacebook Wi-Fi configuration.

1. Click the Configure Now link.2. Sign in to your Facebook account.3. If you do not have a business page, click Create Page. For more information onsetting Facebook Wi-Fi service, see Setting up Facebook Wi-Fi for Your Business athttps://www.facebook.com/help/126760650808045.

NOTE: Instant AP devices support Facebook Wi-Fi services on their own, without Central.However, for enabling social login based authentication, the guest splash pages must beconfigured in Central. For more information on Facebook Wi-Fi configuration on an InstantAP, see the Aruba Instant User Guide.

Allow Internet InFailure

To allow users access the Internet when the external captive portal server is not available,click the Allow Internet In Failure toggle switch. By default, this option is disabled.

Override CommonName

To override the default common name, click the Override Common Name toggle switchand specify a common name. The common name is the web page URL of the guest accessportal. By default, the common name is set to securelogin.arubanetworks.com. Theguest users can override this default name by adding their own common name.If your devices are managed by AirWave and you want to use your own certificate for thecaptive portal service, ensure that the captive portal certificate is pushed to the Instant APfrom the AirWave management system. When the appropriate certificate is loaded on theAP, perform the following actions:

1. Run the show captive-portal-domains command at the Instant AP commandprompt.2. Note the common name or the internal captive portal domain name.3. Add this domain name in the Override Common Name field on the Splash Pageconfiguration page.4. Save the changes.

Guest Key To set password for anonymous users, enable the Guest Key and enter a password.

Sponsored GuestEnable the Sponsored Guest option if you (network administrator) want to give theauthorization control to a guest sponsor to allow or deny a guest from accessing thenetwork.

Allowed SponsorDomains

This is a mandatory field. Enter accepted company domain names. The domain name mustmatch the suffix of the sponsor's email address. The domain names must be companynames and not any public domain names such as gmail, yahoomail, and so on. To addmore domain names, click the add icon and enter the domain name.

Allowed SponsorEmails

Optional field to enter allowed email addresses. If you leave this field empty, all emails thatcorrespond to the allowed domains list are permitted to sponsor guests. To add moresponsor emails, click the add icon and enter the sponsor's email address.

AuthenticationSuccess Behavior

If Anonymous or Authenticated option is selected as the guest user authenticationmethod, specify a method for redirecting the users after a successful authentication.Select one of the following options:

Table 95: Splash Page Configuration

Aruba Central | User Guide Guest Access | 259

Page 260: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

260 | Guest Access Aruba Central | User Guide

Data PaneContent Description

n Redirect to Original URL— When selected, upon successful authentication, theuser is redirected to the URL that was originally requested.n Redirect URL— Specify a redirect URL if you want to override the original request ofusers and redirect them to another URL.

AuthenticationFailure Message

If the Authenticated option is selected as the guest user authentication method, enter theauthentication failure message text string returned by the server when the userauthentication fails.

Session Timeout Enter the maximum time in Day(s): Hour(s): Minute(s) format for which a client sessionremains active. The default value is 0:8:00. When the session expires, the users must re-authenticate.If MAC caching is enabled, the users are allowed or denied access based on the MACaddress of the connective device.

Share This Profile Select this check box if you want to allow the users to share the Splash Page profile. TheSplash Page profiles under All Devices can be shared across all the groups.

Simultaneous LoginLimit

To set limit for the simultaneous logins from the same user for authenticated Splash Pageprofiles, select a value from the Simultaneous Login Limit drop-down list.

Daily Usage Limit To allow the guest users to access network either based on time or by data usage limit perday, specify the following parameters:

n By Time— Specify the time limit in hours and minutes for the data usage. When auser session exceeds the specified time limit, the user is disconnected from thenetwork and is allowed to reconnect with the same MAC address only after 24 hours.n By Data— Specify the data usage limit using any of the following options in the MBdrop-down:

l Per User— Select this option to set the data usage limit per day for a MACaddress.l Per Session— Select this option to set the data usage limit for a user session.

NOTE: The user will be disconnected from the network when the data usage limit isexceeded. Central allows the user to reconnect to the network multiple times using thesame MAC address only if the Per Session is selected in the MB drop-down. However, thePer User option allows the user to reconnect to the network only after 24 hours from thetime the user exceeds the data usage limit.When the option No Limit is selected, there is no daily usage limit set per day for a user.

Whitelist URL To allow a URL, click + and add the URL to the whitelist. For example, if the terms andconditions configured for the guest portal include URLs, you can add these URLs to thewhitelist, so that the users can access the required web pages.

Table 95: Splash Page Configuration

5. Click Next. The Customization pane appears. Customizing a Splash Page Design on page 261.

You can edit or delete a splash page profile by clicking the respective icons in the Splash Page Profile pane.

Page 261: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Customizing a Splash Page DesignTo customize a splash page design, on the Guest Access > Splash Page > New Splash Page >Customization pane, configure the parameters described in the following table:

Data PaneContent

Description

Background color To change the color of the splash page, select a color from the Background Color palette.

Button title Specify a title for the sign in button.

Button color To change the color of the sign in button, select a color from the Button Color palette.

Header fill color Select the fill color for the splash page header from the Header fill color palette.

Page font color To change the font color of the text on the splash page, select a color from the Page fontcolor palette.

Page font Color Select the font color of the splash page from the palette.

Logo To upload a logo, click Browse, and browse the image file. Ensure that the image file sizedoes not exceed 256 KB.

Background Image Click Browse to upload a background image. Ensure that the background image file sizedoes not exceed 512 KB.

Page Title Add a suitable title for the splash page.

Welcome Text Enter the welcome text to be displayed on the splash page. Ensure that the welcome textdoes not exceed 20,000 characters.

Terms &Conditions

Enter the terms and conditions to be displayed on the splash page. Ensure that the termsand conditions text does not exceed 20000 characters.The text box also allows you to use HTML tags for formatting text. For example, to highlighttext with italics, you can wrap the text with the <i> </i> HTML tag.Specify an acceptance criteria for terms and condition by selecting any of the followingoptions from the Display "I Accept" Checkbox:

n No, Accept by defaultn Yes, Display Checkbox

If the I ACCEPT check box must be displayed on the Splash page, select the display formatfor terms and conditions.Ensure that Display Option For Terms & Conditions has the Inline Text option auto-selected and displayed as an uneditable text.

Ad Settings If you want to display advertisements on the splash page, enter the URL in theAdvertisement URL.For Advertisement Image, click Browse and upload the image.

Table 96: Splash page customization

6. Click Preview to preview the customized splash page or click Finish.

Previewing and Modifying a Splash Page ProfileTo preview a splash page profile, complete the following steps:

1. From the app selector, click Guest Access.

2. Click the Splash Page menu option. A list of splash Page profiles is displayed.

Aruba Central | User Guide Guest Access | 261

Page 262: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

262 | Guest Access Aruba Central | User Guide

3. Ensure that the pop-up blocker on your browser window is disabled.

4. Click the preview icon next to the profile you want to preview. The Splash Page is displayed in a newwindow.

The Splash Pages page also allows you to perform any of the following actions:

n To view the Splash Page configuration text in an overlay window, click the settings icon next to the profile.You can copy the configuration text and apply it to AirWave managed APs using configuration templates.

n To modify a splash page profile, click the edit icon next to the profile form list of profiles displayed in theSplash Page Profiles pane.

n To delete a profile, select the profile and click the delete icon next to the profile.

Localizing a Cloud Guest PortalTo localize or translate the Cloud Guest portal content, on the Guest Access > Splash Page > New SplashPage > Localization pane, configure the parameters described in the following table:

These are optional settings unless specified as a required parameter explicitly.

Data PaneContent

Description Allowed Length of Text

Login Section

Login buttontitle

Enter the custom label text to be localized for the Loginbutton.

1–255 characters

Network logintitle

Enter the custom title text that you want to localize for theNetwork Login page.

1–255 characters

Login page title Enter the custom text for title in the Login page. 1–255 characters

Access deniedpage title

Enter the custom title text for the Access Denied page. 1–255 characters

Logged in title Enter the custom Logged in title text for the page that allowsaccess.

1–255 characters

Username label Enter the custom text for Username lable. 1–255 characters

Usernameplaceholder

Enter the custom text to show in in the Usernameplaceholder.

1–255 characters

Passwordplaceholder

Enter the custom text to show in in the Password placeholder. 1–255 characters

Email addressplaceholder

Enter the custom text to show in in the Email Addressplaceholder.

1–255 characters

Register buttontitle

Enter the custom title text for Register button. 1–255 characters

Network loginbutton title

Enter the custom title text for Network Login button. 1–255 characters

Table 97: Cloud Guest Portal Localization

Page 263: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Data PaneContent

Description Allowed Length of Text

Terms andConditions title

Enter the custom text to show in the Terms and Conditionstitle.

1–255 characters

'I accept theTerms andConditions' text

Enter the custom text to show for the 'I accept the Termsand Conditions' text adjacent to the check box.

Up to 20000 characters

Welcome Text Enter a custom Welcome text to the cloud guest portal user. Up to 20000 characters

Login failedmessage

Enter a custom text to show for the Login Failed messagewhen a user's login attempt gets denied or fails.

Up to 20000 characters

Logged inmessage

Enter a custom text to show for the Logged in message inthe access allowed page.

Up to 20000 characters

Register Section

Phone helpmessage

Enter a custom help message to show for the Phone helpfield.

Up to 20000 characters

Phone numberplaceholder

Enter the custom placeholder text for the Phone Numberinput UI control.

1–255 characters

'Back' buttontext

Enter the custom text label to show for the Back buttoncontrol.

1–255 characters

'Continue'button text

Enter the custom text label toshow for the Continue buttoncontrol.

1–255 characters

Email radiobutton

Enter a custom text label for the Email option. —

Phone radiobutton

Enter a custom label text for the Phone option. —

Register pagetitle

Enter a custom title text for the Register page. 1–255 characters

Accept buttontitle

Enter a custom title text for the Accept button. 1–255 characters

Register Pageinstructions

Enter a custom message to show in the Register page. Up to 20000 characters

Verification Section

Verification codelabel

Enter a custom text to show for the Verification code label. 1–255 characters

Verification codeplaceholder

Enter a custom text to show for the Verification codeplaceholder.

1–255 characters

Verificationemail checkmessage

Enter a custom text for the Verification Email Cheeckmessage. This is shown in the verification pending page.

Up to 20000 characters

Table 97: Cloud Guest Portal Localization

Aruba Central | User Guide Guest Access | 263

Page 264: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

264 | Guest Access Aruba Central | User Guide

Data PaneContent

Description Allowed Length of Text

Verificationemail noticemessage

Enter a custom text for the Verification Email Noticemessage. This is the message notifying the user when theemail will be sent.

Up to 20000 characters

Verificationemail sentmessage

Enter a custom text for the Verification Email Sentmessage.

Up to 20000 characters

Verificationphone noticemessage

Enter a custom text for the Verification Phone Noticemessage. This is the message notifying the user that an SMShas been sent.

Up to 20000 characters

Verified accountmessage

Enter a custom text for the Verified Account message. This isthe message that will be shown in the Verified page.

Up to 20000 characters

Verify accountmessage

Enter a custom text for the Verify Account message. This isthe message that will be shown in the Verify page.

Up to 20000 characters

Verify buttontitle

Enter a custom label text for the Verify button. 1–255 characters

Verify title Enter a custom text for Verify title. 1–255 characters

Network loginmessage

Enter a custom text message to show in the Network Loginpage.

Up to 20000 characters

Sponsored Guest Section

Sponsorapproval grantedtitle

Enter a custom title for the sponsor's Approval Grantedpage.

1–255 characters

Sponsorapprovalpending title

Enter a custom title for the sponsor's Approval Pendingpage.

1–255 characters

Sponsor approvebutton title

Enter a custom title for the sponsor's Approve button. 1–255 characters

Sponsor approvetitle

Enter a custom title for the sponsor's Approve page. 1–255 characters

Sponsorapproved title

Enter a custom title to be shown on the Approved page. 1–255 characters

Sponsor label Enter a custom text for the Sponsor label. 1–255 characters

Sponsorplaceholder

Enter a custom placeholder text for sponsor input control. 1–255 characters

Sponsorapproval grantedmessage

Enter a custom message to show in the Approval Grantedpage when the guest sponsor had grented approval for theguest to access the network.

Up to 20000 characters

Table 97: Cloud Guest Portal Localization

Page 265: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Data PaneContent

Description Allowed Length of Text

Sponsorapproval mailmessage

Enter an optional alternative email message to send when aguest requests for a Wi-Fi access. Ensure that the emailinlcudes the [account:username] and [account:sponsor-approval-url] tokens.To customize the contents of email message, or to change theemail message to a local language:

1. Click Customize Sponsor Approval Mail.2. Edit the email message.3. Click Save.

N/A

Sponsorapprovalpendingmessage

Enter a custom message to show in the Approval Pendingpage when the guest sponsor is yet to approve or deny theguest from accessing the network.

Up to 20000 characters

Sponsor approvemessage

Enter a custom message to show in the Approve page. Up to 20000 characters

Sponsorapprovedmessage

Enter a custom message to show in the Approved page whenthe guest sponsor had approved the guest to access thenetwork.

Up to 20000 characters

Sponsor message Enter a custom message to show in the Registration page forthe guest to know that sponsor's approval is required.

Up to 20000 characters

Table 97: Cloud Guest Portal Localization

4. Click Preview to preview the localized cloud guest portal page or click Finish.

Associating a Splash Page Profile to an SSIDTo associate a splash page profile with an SSID, complete the following steps:

1. Select Configuration > Access Points > Networks and then click Create New. The Create a NewNetwork pane is displayed.

2. For Type, select Wireless.

3. Enter a name that is used to identify the network in the Name(SSID) box.

4. For Primary Usage, select Guest and click Next.

5. In the VLANs tab, if required, configure a VLAN assignment mode, and then click Next.

6. In the Security tab:

a. Select Cloud Guest from the Splash Page Type list.

b. Select the splash page profile name from the Guest Captive Portal Profile list and click Next.

If the user configures the default Aruba certificate, the You are using Aruba default certificate. You shallconfigure new certificate alert message is displayed for the user to configure a new certificate.

c. To enable encryption, set Encryption to Enabled and configure encryption parameters.

d. To exclude uplink, select an uplink from Disable If Uplink Type Is.

e. Click Next.

Aruba Central | User Guide Guest Access | 265

Page 266: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

266 | Guest Access Aruba Central | User Guide

7. In the Access tab, if required, modify and create access rules set the configuration if required, and thenclick Finish.

Configuring Visitor AccountsThe Visitors pane displays information on the session and account details of the visitors who access the splashpage. It helps you monitor the guest sessions.

The Managed Service Portal does not support creating or modifying guest visitor accounts. To configurevisitors for WLAN networks and view visitor connection details, the administrators must drill down to thecustomer account and access it.

Adding a visitorTo add a new visitor:

1. From the Managed Service Portal view, drill down to a customer account.

2. From the app selector, click the Guest Access application.

3. Click the Visitors menu option, and then click Add Visitor. The Add Visitor pane is displayed.

4. Configure the parameters described in the following table:

Data PaneContent Description

Name Enter a unique name to identify the visitor.

Company Enter the company name of the visitor.

Email Enter the email ID of the visitor.

Phone Enter the phone number of the visitor.

Password n Click Generate. The automatically generated password is displayed in thePASSWORD text box.n Select Send Access Code to send the access code by email or SMS.

Valid Till Specify the duration for the visitor account to expire in Day(S): Hour(s): Minute(s) format.To allow users to access the network for unlimited period of time, select Unlimited.

Select this check box to activate the user account.

Table 98: Adding Visitors

5. Click Save.

6. Click Save and Print to print the details of the visitor.

To view the guest or visitor sessions:

1. From the Managed Service Portal view, drill down to a customer account.

2. From the app selector, click the Guest Access application.

3. Click the Visitors menu option. The Guest Access > Visitors page is displayed.

4. From the Show visitors for network drop-down list, select a network.

Page 267: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

The following table displays the session details of the visitor:

Parameter Description

Visitors Displays the name of the visitor.

Login Type Displays the login type of the client (Anonymous,Username/Password, Self-Registration, Facebook Wi-Fi).

Browser Displays the type of browser that the client is connected.

MAC Address Displays the MAC address of the connected client device.

Device Type Displays the type of the device.

OS Name Displays the OS on the client device.

Login Time Displays the login time of the client.

Session Time (Secs) Displays the duration for which the client is connected.

Table 99: Visitor Sessions Pane

The following table displays the account details of a visitor:

Parameter Description

Name Displays the name of the visitor.

Email Displays the email ID of the visitor.

Phone Displays the contact number of the visitor.

Company Displays the company name of the visitor.

Status Indicates if the user account is in active or inactive state.

Creation Displays the date and time on which the visitor account is created.

Expiration Displays the date and time on which the visitor account expired.

Actions Allows you to edit a specific visitor account.

Table 100: Visitor Accounts Pane

Deleting VisitorsTo delete one or more visitors:

1. Select the visitor or visitors you want to delete using the Multiselect box option.

2. Click Delete. The selected visitors get deleted.

Downloading Visitor Account DetailsTo download the visitor account details:

1. Click Download to download the visitor account details available in the Accounts List.

Aruba Central | User Guide Guest Access | 267

Page 268: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Chapter 12Presence Analytics

This section describes the Presence Analytics application:

n Presence Analytics Overview on page 268

n Configuring Sites on page 269

n Presence Analytics on page 268

n Using the Presence Analytics App on page 269

n Analyzing Dashboard Contents on page 270

n Setting RSSI Threshold and Dwell Time on page 273

Presence Analytics OverviewThe Presence Analytics application allows you to collect and analyze client data in public venues and enterpriseenvironments. Based on this analysis, businesses can perform the following:

n Determine network usage patterns.

n Develop or improve strategies for customer engagement thereby maximizing revenue opportunities,optimizing workspace, and increasing market presence.

Central supports Presence Analytics only on the APs running Aruba Instant 6.4.4.4-4.2.3.0 or a later version.

Service SubscriptionThe Presence Analytics application is available only if the Presence Analytics service is enabled on an Instant AP.To start using the Presence Analytics service, contact the Aruba Central Sales team and obtain a subscription.

If the Presence Analytics service subscription is enabled on one Instant AP in the cluster, the other Instant APs in thecluster inherit the Presence Analytics configuration settings, and send the RSSI feeds to Central. However, thePresence and Loyalty statistics are displayed only for the Instant APs on which the Presence Analytics feature isenabled.

Data Aggregation and DisplayIf you enable the Presence Analytics service on your devices, you can configure your WLAN APs in Central todetect the presence of Wi-Fi-enabled clients within the range of a particular site. Central aggregates the datagathered from APs and presents this data on the dashboard as graphs, trends, and statistics.

The analytics dashboard provides the following details:

n Clear and detailed view of presence classifications

n Criteria for classifying clients as passerby clients and visitors

n Time spent by the clients at a site

n Loyalty metrics for clients who frequently visit a site

n Metrics of the client devices that are associated to the employee and guest networks of the site

Aruba Central | User Guide Presence Analytics | 268

Page 269: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

269 | Presence Analytics Aruba Central | User Guide

Passersby and VisitorsBased on the proximity of the client device to a specific site, the Wi-Fi signal strength, and the time spent at thesites, the clients are classified as follows:

n Passersby—An associated or unassociated client who is in the vicinity of a specific site and has an RSSI valuegreater than -90 dBm. You can customize the RSSI value for Passerby on the Presence Analytics >Settings page.

n Visitors—The passerby clients who spend more than 5 minutes at the site and have an RSSI value greaterthan -65 dBm. You can customize dwell time and RSSI values on the Presence Analytics > Settings page.

If a client is idle for more than 30 minutes, Central removes the presence instance for that client. When the clientreappears, Central creates a new instance for that client and applies the same presence classification criteria.

The Presence graphs on the dashboard provide statistical analysis of the aggregate count of passerby clients,the dwell time of these clients at the sites, the rate at which the passerby clients converted to visitors, and theaggregate count of visitors over a specific duration.

Loyalty Metrics

Based on the engagement pattern and the time spent by the clients at the site, Central classifies clients asvisitors. It also maintains a record of the number of repeat visits made by these clients over a specific duration.Based on these records, it plots the frequency at which the visitors return to the sites, and classifies theserepeat visitors as loyal visitors.

The Loyalty graphs on the dashboard provide a statistical analysis of the clients classified as unique, new, andloyal visitors for a given time range.

Wi-Fi Connected Clients

The dashboard includes the Wi-Fi-Connected Clients as listed below:

n Connected Devices—A Wi-Fi client associated to a Guest or Employee network on the device.

n Guest Devices—A Wi-Fi client associated to the Guest networks on the device.

n Employee Devices—A Wi-Fi client associated to the Employee or Voice network on the device.

The Wi-Fi Connected Clients graphs on the dashboard provide statistical analysis of the aggregate count ofassociated clients over a specific duration.

Configuring Sites

A Site in Central refers to a physical location such as venue or store. The Presence Analytics dashboard displaysinformation for all devices associated with sites. If a site is not created, the filter bar displays a link to create asite. For more information on creating sites and adding devices, see Managing Sites on page 69.

In the Presence Analytics application view, the sites configured in Central are listed under All Sites. Theclients' presence analytics apply only if the sites are distributed across different locations.

Using the Presence Analytics AppFrom the app selector, click Presence Analytics. The following menu options are displayed:

n Activity—A dashboard that shows the client presence details, loyalty metrics, and connected client metrics.

n Settings—The configuration page in which the RSSI threshold and dwell time for the clients can be set.

Page 270: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Analyzing Dashboard ContentsThe Activity page displays the following details:

n Presence metrics for passerby clients and visitors

n Loyalty metrics for visitors

n Connected-client device metrics on Guest and Employee networks

By default, the Activity page displays data for all sites for a time range of 3 hours.

See Table 101 for general guidelines on filtering content and analyzing data:

Dashboard View Description

Temporal Filter You can view the clients' presence data for the following time ranges:n 3 Hours—Data from the current time to last 3 hours until the current time. This isthe default time range for which the data is presented.n 1 day—Data from the current time to last 1 day.n 1 week—Data from the 00:00 hour of the current week to 00:00 of last 1 week.n 1 Month—Data from the 00:00 hour of the current week to 00:00 of last 1 month.

The granularity of data points for activity trends is as follows:n 5 minutes for a time range of 3 hoursn 1 hour for a time range of 1 dayn 1 day for a time range of 1 week and 1 month

Baseline andChange Metrics

The Baseline and Change metrics are shown for most of the graphs displayed on theActivity page.The baseline metric for presence data is calculated for each time range in the followingway:

n 3 Hours—The baseline metric is not applicable.n 1 Day—The baseline value is derived from the average of the presence datacollected in the last 30 days.n 1 Week and 1 Month—The baseline value is derived from the presence datacollected in the last 6 months.

Baseline VersusAggregate trends

Displays the aggregate or average values across the selected time range in comparisonto the baseline value.

Table 101: Presence Analytics Data Metrics and Filters

The Activity page allows you to set your dashboard view so as to show a quick summary or detailedinformation. To view more details about presence, Wi-Fi-connected clients, or loyalty metrics, enable theAdvanced mode. See Table 102 for information on default and advanced views of the Activity dashboard.

Aruba Central | User Guide Presence Analytics | 270

Page 271: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

271 | Presence Analytics Aruba Central | User Guide

DashboardContent Description Default

ViewAdvancedView

Presence

Presence The Presence graphs displays presence metrics for passerby clientsand visitors. The following graphs with presence metrics are displayedfor all sites or a specific site.

n Passersby—Shows the aggregate count of passerby clients forthe selected time range. The graph also shows the baseline value forthe passerby clients based on the selected time range, and thepercentage of change in the count of passerby clients in comparisonto the baseline value.n Visitors—Shows the aggregate count of visitors. The graph alsoshows the baseline value for the visitors trend based on the selectedtime range, and the percentage of change in the count of visitors incomparison to the baseline value.n Draw Rate—Draw rate refers to the percentage of passerbyclients converted to visitors for a specific time duration. The DrawRate graph shows average draw rate. It also shows the baselinevalue for the draw rate metric based on the time range selection,and the percentage of change in draw rate compared to the baselinevalue.n Dwell Time—Dwell time refers to the average time spent byvisitors at a site at a given point in time. This graph shows theaverage dwell time of the visitors for all sites or a specific site. It alsoshows the baseline value for the dwell time metric based on the timerange selection, and the percentage of change in the dwell timecompared to the baseline value.

To view detailed presence information along with baseline changepercentage graph, switch to the Advanced mode.

Yes Yes

Passersby &Draw RateGraphs

n The Passersby chart plots the passerby clients' trend for theselected time range. For example, if the time range is set to 3 hours,it shows the passerby clients' count for every 5 minutes for the last 3hours. Similarly, when the time range is set to 1 day, the count isdisplayed for every one hour.n The Draw Rate shows the rate of conversion of passerby clientsto visitors for the selected time range. For example, if the time rangeis set to 3 hours, it shows the conversion count for every 5 minutesfor the last 3 hours. Similarly, when the time range is set to 1 day, thecount is displayed for every one hour.

l 5th Percentile—The 5th percentile is the value of draw ratebelow which 5% of the sites could be found. The graph plots thedraw rate trend at 5th percentile.l 95th Percentile—The 95th percentile is the value of draw ratebelow which 95% of the sites may be found. The graph plots drawrate trend at the 95th percentile.

No Yes

Top &Bottom 5

Displays the top 5 and bottom 5 sites and plots trends for these sites forcategories such as the following categories:

n Passersbyn Visitorsn Draw Raten Dwell Time

The graph also shows the median derived based on the values gatheredfrom the trends observed for a selected metric across all sites for theselected time period.NOTE: If the number of sites is less than 10, the graph does not showthe bottom 5 trends.

No Yes

Table 102: Activity Dashboard

Page 272: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

DashboardContent Description Default

ViewAdvancedView

ViewPresenceData

Displays the presence data for all sites. The All Sites table shows thepasserby clients, visitors count, draw rate, and dwell time metrics.Click the Download All Sites Data icon to download the presence datafor all sites for a given time range.

Yes Yes

Loyalty

Loyalty The Loyalty area displays the following graphs with loyalty metrics forvisitors:

n Unique Visitors—Shows the unique visitors count, which is thesum of new and loyal visitors for the selected time range. The graphalso shows the baseline metric calculated for a given time range andthe percentage of change in the unique visitors count in relation tothe baseline metric.n New Visitors—Shows the aggregate count of the new visitorscategorized. Visitors who have visited only once in the last 1 monthare referred to as the new visitors. The graph also shows thebaseline metric calculated for a given time range and thepercentage of change in the new visitors count in relation to thebaseline metric.n Loyal Visitors—Shows the aggregate count of the visitorscategorized as loyal. Visitors who have visited a site more than oncein last 1 month are referred to as loyal visitors. The graph also showsthe baseline metric calculated for a given time range and thepercentage of change in the loyal visitors count in relation to thebaseline metric.

To view detailed loyalty information along with baseline changepercentage graph, switch to the Advanced mode.

Yes Yes

VisitorLoyaltyComposition

Shows the number of visitors categorized as new and loyal visitors for aspecific time range.

No Yes

LoyalVisitors –Visits in thelast 3months

Shows the number of visits the loyal visitors made to a site in the lastthree months.

No Yes

Top &Bottom 5

Shows the top 5 sites and bottom 5 sites for:n New visitorsn Unique visitorsn Loyal visitors

The graph also shows the following:n Trends for the top and bottom sites for the selected category.n Median derived based on the values gathered from the trendsobserved for a selected metric across all sites for the selected timeperiod.

NOTE: If the number of sites is less than 10, the graph does not showthe bottom 5 trends.

No Yes

ViewLoyalty Data

Displays the loyalty metrics for all sites. The All Sites table showsunique visitors, new visitors, and loyal visitors.Click the Download All Sites Data icon to download the loyalty metricsfor all sites for a given time range.

Yes Yes

Table 102: Activity Dashboard

Aruba Central | User Guide Presence Analytics | 272

Page 273: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

273 | Presence Analytics Aruba Central | User Guide

DashboardContent Description Default

ViewAdvancedView

Wi-Fi Connected Devices

Wi-FiConnectedDevices

Displays the following graphs for Wi-Fi connected devices:n Connected Devices—Displays the aggregate count of associatedclients for the selected time range. The graph also shows thebaseline value for the associated clients based on the selected timerange, and the percentage of change in the count of the associatedclients in comparison to the baseline value.n Guest Devices—Displays the aggregate count of associatedclients on Guest Networks for the selected time range. The graphalso shows the baseline value for the associated clients on GuestNetworks based on the selected time range, and the percentage ofchange in the count of the associated clients on Guest Networks incomparison to the baseline value.n Employee Devices—Displays the average count of associatedclients on Employee Networks for the selected time range. Thegraph also shows the baseline value for the associated clients onEmployee Networks based on the selected time range, and thepercentage of change in the count of the associated clients onEmployee Networks in comparison to the baseline value.

To view detailed Wi-Fi connected device information along with baselinechange percentage graph, switch to the Advanced mode.

Yes Yes

ConnectedDevices VsVisitors

Displays the total count of client devices categorized as Employee,Guest and Visitor devices. This includes both associated andunassociated client devices.

No Yes

Top andBottom 5ConnectedDevices

Displays the top 5 and bottom 5 sites and plots trends for these sites forthe following categories:

n Connected Devicesn Guest Devicesn Employee Devices

The graph also shows the following:n Trends for the top and bottom sites for the selected category.n Median derived based on the values gathered from the trendsobserved for a selected metric across all sites for the selected timeperiod.

NOTE: If number of sites is 10 or lower than 10, the graph does notshow the bottom 5 trends.

No Yes

View Wi-FiConnectedDevicesData

Displays Wi-Fi connected devices data for all sites. The All Sites tableshows the metrics for Connected devices, Guest devices, and Employeedevices for all the sites.Click the Download All Sites Data icon to download the connectedclients data for all sites for a given time range.

Yes Yes

Table 102: Activity Dashboard

Setting RSSI Threshold and Dwell TimeThe RSSI and dwell time configuration allows the administrators to:

n Classify the type of client.

n Analyze presence patterns.

Page 274: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

n Determine if the usage has increased over a period of time.

To modify the default RSSI and dwell time configuration parameters, complete the following steps:

1. From the App selector, click Presence Analytics.

2. Click Settings.

3. Under Passersby, specify the RSSI threshold. By default, the RSSI threshold is set to -90 dBm. You canspecify a value within the range of -100 to 0.

4. Under Passersby to Visitor, specify the RSSI threshold and Dwell Time parameters. By default, theRSSI threshold is set to -65 dBm and the dwell time is set to 5 minutes.

5. Click Save Settings.

Aruba Central | User Guide Presence Analytics | 274

Page 275: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Chapter 13Clarity

This section provides an overview of Clarity application, and descriptions for all its features.

Clarity Application OverviewThe Aruba Clarity solution is an application(app) that allows you to monitor deployments and proactivelydetect network performance issues during the deployment. The administrators can use data from the Clarityapp to analyze all the devices in the network thereby monitoring the network performance, and plan forcorrective actions to resolve the onboarding issues detected in the network.

The Clarity app in Central allows you to monitor non-RF and connectivity issues that impact the wireless userexperience. With Clarity app, administrators can proactively monitor the client data flow, client association,authentication, DHCP, and DNS service response times in real time within 10-15 minutes.

Using the Clarity analytics dashboard, the administrators can view the status of the wireless connection for thedevices added in Central, and troubleshoot issues detected in the network.

Central supports the infrastructure for Clarity app. To view the network performance data using the Clarity app,ensure that the AP devices in your network are running the firmware version 6.5.1.0-4.3.1.0 or later.

The Clarity app filters network performance data based on the labels and sites to which the devices are assigned inyour network. Ensure that the devices that support Clarity are assigned to labels and sites. For more information, seeManaging Labels and Managing Sites.

Enabling Clarity ServiceTo access the Clarity app, you must obtain a valid subscription and enable the Clarity service on your devices.To obtain subscription for the Clarity app, contact the Aruba Central Sales team.

If you have a valid subscription, enable the Clarity service on your APs using the following steps:

1. From the app selector, click the Global Settings app.

2. Click Subscription Assignment.

3. Select the device from the devices table.

4. From the list of subscriptions, select the devices that requires the Clarity service subscription.

5. Drag and drop the device to the Clarity app in the subscriptions table.

6. Click Yes to confirm the subscription assignment.

Clarity Monitoring DashboardTo view the Clarity monitoring dashboard, from the app selector, click Clarity. You can use labels and sites asfilters to view data for the devices assigned a site or label.

Aruba Central | User Guide Clarity | 275

Page 276: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

276 | Clarity Aruba Central | User Guide

ActivityThe Activity dashboard displays graphs for connectivity health, latency, performance of the network and thedevice, and the association and authentication transactions between the client device and the network. Thisdashboard also displays the causes for network and transaction failures detected in the network.

DashboardView Description

Time range Allows you to view the charts and graphs in any of the following time ranges:n 3 Hours—Displays data from the current time to last 3 hours. This is the default timerange for which the data is displayed. When the time range is set to 3 hours, the graphsdisplay the aggregate data points for every 10 minutes.n 1 day—Displays data from the current time to last 1 day. When the time range is set to 1day, the graphs display the aggregate data points for every two hours.n 1 week—Displays data from the current day to last 1 week. When the time range is set to1 week, the graphs display the aggregate data points for every week.n 1 month—Displays data from the current day to last 1 month. If the time range is set to 1month, the graphs display the aggregate data points for every two days.

Search anddata displaycriteria

Allows you to specify a criterion based on the SSIDs on which the clients are connected, and thelabel, or site to which the AP devices are assigned. You can filter the monitoring data based onthe following criteria.

n All Devices—Displays data for all devices in the network. This option also displays themonitoring data for all the SSIDs enabled on the devices.n Label—Displays data for all the SSIDs enabled on the devices assigned to a specific label.You can select a label from the filter bar on the header pane.n Site—Displays data for all the SSIDs enabled on the devices assigned to a specific site. Youcan select a site from the filter bar on the header pane.n SSID—Displays data for a specific SSID enabled on the devices attached to a specific labelor site.

ConnectivityHealth

Displays a cumulative score that is computed based on the onboarding performance of thenetwork. The data is presented in the following colors to indicate the connectivity health scoreranges:

n Green—100-85n Orange—84-70n Red—69-0

The connectivity health index is calculated based on the following parameters:n Attempts—The number of attempts made by the client devices to connect to the network.n Success Rate—The percentage of successful onboarding of the client devices in thenetwork.n Timely—The number of client connections that were established on time, without anyfailure or delay.n Delayed—The number of delayed events detected in client connections and associationsto the Instant APs that are provisioned in your network.n Failed—The number of unsuccessful attempts made by client devices to connect to thenetwork.

ConnectivityPerformance

Displays a graph that summarizes the connectivity performance of the network for the selectedtime range. The graph plots the following data points:

n Number of timely and successful onboarding events for client devices.n Number of delays observed when onboarding a client device.n Number of failed attempts when onboarding a client device.n The connectivity health score for the network.

Stage-wisePerformance

Displays the connectivity health index for each category of network performance based onparameters such as timeliness, delays, and failed attempts detected when onboarding clientdevices.

Table 103: Activity Monitoring Dashboard

Page 277: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

DashboardView Description

n Association—Number of successful, timely, delayed, and failed association attemptsmade by the client devices to connect to the network.n Authentication—Number of successful, timely, delayed, and failed authenticationattempts made by the client devices to connect to the network.n DHCP—Number of successful, timely, delayed, and failed DHCP requests and responsesdetected when onboarding the client devices.n Captive Portal—Number of successful, timely, delayed, and failed attempts made by theclient devices to connect to the guest SSIDs in the network.n DNS—Number of successful, timely, delayed, or failed attempts in DNS resolutionsdetected when client devices connect to the network. The DNS chart is displayed only whenthe dashboard view is set to display the aggregate connectivity and network performancedata for all labels and SSIDs defined in the network.

Delay-Causes Displays a pie chart that provides a summary of the causes for the delays. The delays that aredetected are categorized in one of the following stages in the network:

n Client associationn 802.1X authenticationn MAC authenticationn Key-Exchangen Captivate portal authenticationn DHCP services

Failure-Causes Displays a pie chart that provides a summary of the causes for the failed attempts. The causesfor failed attempts are categorized in one of the following stages in the network:

n Client associationn 802.1X authenticationn MAC authenticationn Key-Exchangen Captivate portal authenticationn DHCP services

DevicePerformance

Displays a chart that shows the types of client devices that attempt to establish connection withthe network.

AuthenticationPerformance

Displays a chart that provides a summary of the connectivity health. It is based on the type ofauthentication methods used by client devices to establish connection with the network.

InsightsThe Insights dashboard displays the most relevant issues that are detected during the onboarding of clientdevices. The Insights page segregates these issues based on their impact on the onboarding performance ofthe network.

Cumulative Issue Impact ChartThe chart on the Insights page displays a cumulative impact of the issues on the onboarding performance ofthe network.

The color codes in the chart indicate the following:

n Dark blue—Indicates more number of insights

n Light blue—Indicates less number of insights

n White—No insights

Aruba Central | User Guide Clarity | 277

Page 278: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

278 | Clarity Aruba Central | User Guide

The insights include the following information:

n Failure instances

n Number of devices impacted

n Time stamp of the event

n Associated labels and SSIDs

n Impacted APs and client devicesFiltering Content for Insights Display

The Insights page allows you to view insights for all devices and filter insights for a specific label or site. Youcan also filter the insights for an onboarding stage, or an SSID.

n To view insights for a specific onboarding stage, select one or several stages from the Select Stage drop-down list as required.

n To view insights for a specific SSID, select the SSID from the Select SSID drop-down list.

Dynamic Range Selection

The chart on the Insights page allows you to dynamically select the time range and view insights specific tothat time range.

To view insights for a specific time range, use the slider and select the desired time period.

Performance SummaryThe Insights page also lists the alerts based on the onboarding experience of client devices. The insights canbe drilled down to view details such as time stamps of events, and causes for the delayed or failed onboardingof client devices. Using these insights, you can analyze the performance of the network and proactively plancorrective actions to restore and enhance the wireless user experience.

Exporting InsightsTo export the insights analytics data, complete the following steps:

1. Select the duration for which you want to view the Insights.

2. Click Export Insights (CSV). The insights information is exported in the CSV format.

TroubleshootingThe Troubleshooting page allows you to view details such as failure or delay in onboarding a specific clientdevice.

To view a log of the onboarding events associated with a client device, enter the MAC address of the clientdevice or the username, and then click the search icon. The search function on the Troubleshooting page alsosupports partial MAC address and username in the search text.

The event log for client devices displays the following information:

n Timestamp—Time stamp of the onboarding event.

n Stage—The stage of onboarding such as association with the AP, authentication, and DHCP status.

n SSID—The SSID to which the client device attempts to establish a connection.

n AP MAC—The MAC address of the AP.

n Status—The onboarding status of the client device.

n Reason—The reason for the delayed or failed onboarding.

Page 279: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Appendix A

Glossary of Terms

The following table provides a brief description of the terminology used in this guide.

3DES

Triple Data Encryption Standard. 3DES is a symmetric-key block cipher that applies the DES cipher algorithmthree times to each data block.

3G

Third Generation of Wireless Mobile Telecommunications Technology. See W-CDMA.

3GPP

Third Generation Partnership Project. 3GPP is a collaborative project aimed at developing globallyacceptable specifications for third generation mobile systems.

4G

Fourth Generation of Wireless Mobile Telecommunications Technology. See LTE.

802.11

802.11 is an evolving family of specifications for wireless LANs developed by a working group of theInstitute of Electrical and Electronics Engineers (IEEE). 802.11 standards use the Ethernet protocol andCarrier Sense Multiple Access with collision avoidance (CSMA/CA) for path sharing.

802.11 bSec

802.11 bSec is an alternative to 802.11i. The difference between bSec and standard 802.11i is that bSecimplements Suite B algorithms wherever possible. Notably, Advanced Encryption Standard-Counter withCBC-MAC is replaced by Advanced Encryption Standard - Galois/Counter Mode, and the Key DerivationFunction (KDF) of 802.11i is upgraded to support SHA-256 and SHA-384.

802.11a

802.11a provides specifications for wireless systems. Networks using 802.11a operate at radio frequenciesin the 5 GHz band. The specification uses a modulation scheme known as orthogonal frequency-divisionmultiplexing (OFDM) that is especially well suited to use in office settings. The maximum data transfer rateis 54 Mbps.

802.11ac

802.11ac is a wireless networking standard in the 802.11 family that provides high-throughput WLANs onthe 5 GHz band.

802.11b

802.11b is a WLAN standard often called Wi-Fi and is backward compatible with 802.11. Instead of thePhase-Shift Keying (PSK) modulation method used in 802.11 standards, 802.11b uses ComplementaryCode Keying (CCK) that allows higher data speeds and makes it less susceptible to multipath-propagationinterference. 802.11b operates in the 2.4 GHz band and the maximum data transfer rate is 11 Mbps.

Aruba Central | User Guide Glossary of Terms | 279

Page 280: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

280 | Glossary of Terms Aruba Central | User Guide

802.11d

802.11d is a wireless network communications specification for use in countries where systems using otherstandards in the 802.11 family are not allowed to operate. Configuration can be fine-tuned at the MediaAccess Control (MAC) layer level to comply with the rules of the country or district in which the network is tobe used. Rules are subject to variation and include allowed frequencies, allowed power levels, and allowedsignal bandwidth. 802.11d facilitates global roaming.

802.11e

802.11e is an enhancement to the 802.11a and 802.11b specifications that enhances the 802.11 MediaAccess Control layer with a coordinated Time Division Multiple Access (TDMA) construct. It adds error-correcting mechanisms for delay-sensitive applications such as voice and video. The 802.11e specificationprovides seamless interoperability between business, home, and public environments such as airports andhotels, and offers all subscribers high-speed Internet access with full-motion video, high-fidelity audio, andVoIP.

802.11g

802.11g offers transmission over relatively short distances at up to 54 Mbps, compared with the 11 Mbpstheoretical maximum of 802.11b standard. 802.11g employs Orthogonal Frequency Division Multiplexing(OFDM), the modulation scheme used in 802.11a, to obtain higher data speed. Computers or terminals setup for 802.11g can fall back to speed of 11 Mbps, so that 802.11b and 802.11g devices can be compatiblewithin a single network.

802.11h

802.11h is intended to resolve interference issues introduced by the use of 802.11a in some locations,particularly with military Radar systems and medical devices. Dynamic Frequency Selection (DFS) detectsthe presence of other devices on a channel and automatically switches the network to another channel ifand when such signals are detected. Transmit Power Control (TPC) reduces the radio frequency (RF) outputpower of each network transmitter to a level that minimizes the risk of interference.

802.11i

802.11i provides improved encryption for networks that use 802.11a, 802.11b, and 802.11g standards. Itrequires new encryption key protocols, known as Temporal Key Integrity Protocol (TKIP) and AdvancedEncryption Standard (AES).

802.11j

802.11j is a proposed addition to the 802.11 family of standards that incorporates Japanese regulatoryextensions to 802.11a; the main intent is to add channels in the radio frequency (RF) band of 4.9 GHz to5.0 GHz.

802.11k

802.11k is an IEEE standard that enables APs and client devices to discover the best available radioresources for seamless BSS transition in a WLAN.

802.11m

802.11m is an Initiative to perform editorial maintenance, corrections, improvements, clarifications, andinterpretations relevant to documentation for 802.11 family specifications.

Page 281: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

802.11n

802.11n is a wireless networking standard to improve network throughput over the two previousstandards, 802.11a and 802.11g. With 802.11n, there will be a significant increase in the maximum rawdata rate from 54 Mbps to 600 Mbps with the use of four spatial streams at a channel width of 40 MHz.

802.11r

802.11r is an IEEE standard for enabling seamless BSS transitions in a WLAN. 802.11r standard is alsoreferred to as Fast BSS transition.

802.11u

802.11u is an amendment to the IEEE 802.11 WLAN standards for connection to external networks usingcommon wireless devices such as smartphones and tablet PCs. The 802.11u protocol provides wirelessclients with a streamlined mechanism to discover and authenticate to suitable networks, and allows mobileusers to roam between partner networks without additional authentication. An 802.11u-capable devicesupports the Passpoint technology from the Wi-Fi Alliance Hotspot 2.0 R2 Specification that simplifies andautomates access to public Wi-Fi.

802.11v

802.11v is an IEEE standard that allows client devices to exchange information about the network topologyand RF environment. This information is used for assigning best available radio resources for the clientdevices to provide seamless connectivity.

802.1Q

802.1Q is an IEEE standard that enables the use of VLANs on an Ethernet network. 802.1Q supports VLANtagging.

802.1X

802.1X is an IEEE standard for port-based network access control designed to enhance 802.11 WLANsecurity. 802.1X provides an authentication framework that allows a user to be authenticated by a centralauthority.

802.3af

802.3af is an IEEE standard for Power over Ethernet (PoE) version that supplies up to 15.4W of DC power.See PoE.

802.3at

802.3at is an IEEE standard for PoE version that supplies up to 25.5W of DC power. See PoE+.

A-MPDU

Aggregate MAC Protocol Data Unit. A-MPDU is a method of frame aggregation, where several MPDUs arecombined into a single frame for transmission.

A-MSDU

Aggregate MAC Service Data Unit. A-MSDU is a structure containing multiple MSDUs, transported within asingle (unfragmented) data MAC MPDU.

Aruba Central | User Guide Glossary of Terms | 281

Page 282: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

282 | Glossary of Terms Aruba Central | User Guide

AAA

Authentication, Authorization, and Accounting. AAA is a security framework to authenticate users, authorizethe type of access based on user credentials, and record authentication events and information about thenetwork access and network resource consumption.

ABR

Area Border Router. ABR is used for establishing connection between the backbone networks and the OpenShortest Path First (OSPF) areas. ABR is located near the border of one or more OSPF areas.

AC

Access Category. As per the IEEE 802.11e standards, AC refers to various levels of traffic prioritization inEnhanced Distributed Channel Access (EDCA) operation mode. The WLAN applications prioritize trafficbased on the Background, Best Effort, Video, and Voice access categories. AC can also refer to AlternatingCurrent, a form of electric energy that flows when the appliances are plugged to a wall socket.

ACC

Advanced Cellular Coexistence. The ACC feature in APs enable WLANs to perform at peak efficiency byminimizing interference from 3G/4G/LTE networks, distributed antenna systems, and commercial smallcell/femtocell equipment.

Access-Accept

Response from the RADIUS server indicating successful authentication and containing authorizationinformation.

Access-Reject

Response from RADIUS server indicating that a user is not authorized.

Access-Request

RADIUS packet sent to a RADIUS server requesting authorization.

Accounting-Request

RADIUS packet type sent to a RADIUS server containing accounting summary information.

Accounting-Response

RADIUS packet sent by the RADIUS server to acknowledge receipt of an Accounting-Request.

ACE

Access Control Entry. ACE is an element in an ACL that includes access control information.

ACI

Adjacent Channel Interference. ACI refers to interference or interruptions detected on a broadcastingchannel, caused by too much power on an adjacent channel in the spectrum.

ACL

Access Control List. ACL is a common way of restricting certain types of traffic on a physical port.

Page 283: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Active Directory

Microsoft Active Directory. The directory server that stores information about a variety of things, such asorganizations, sites, systems, users, shares, and other network objects or components. It also providesauthentication and authorization mechanisms, and a framework within which related services can bedeployed.

ActiveSync

Mobile data synchronization app developed by Microsoft that allows a mobile device to be synchronizedwith either a desktop or a server running compatible software products.

ad hoc network

An ad hoc network is a network composed of individual devices communicating with each other directly.Many ad hoc networks are Local Area Networks (LANs) where computers or other devices are enabled tosend data directly to one another rather than going through a centralized access point.

ADO

Active X Data Objects is a part of Microsoft Data Access Components (MDACs) that enables clientapplications to access data sources through an (Object Linking and Embedding Database) OLE DB provider.ADO supports key features for building client-server and Web-based applications.

ADP

Aruba Discovery Protocol. ADP is an Aruba proprietary Layer 2 protocol. It is used by the APs to obtain theIP address of the TFTP server from which it downloads the AP boot image.

AES

Advanced Encryption Standard. AES is an encryption standard used for encrypting and protecting electronicdata. The AES encrypts and decrypts data in blocks of 128 bits (16 bytes), and can use keys of 128 bits, 192bits, and 256 bits.

AIFSN

Arbitrary Inter-frame Space Number. AIFSN is set by the AP in beacon frames and probe responses. AIFS is amethod of prioritizing a particular category of traffic over the other, for example prioritizing voice or videomessages over email.

AirGroup

The application that allows the end users to register their personal mobile devices on a local network anddefine a group of friends or associates who are allowed to share them. AirGroup is primarily designed forcolleges and other institutions. AirGroup uses zero configuration networking to allow Apple mobile devices,such as the AirPrint wireless printer service and the AirPlay mirroring service, to communicate over acomplex access network topology.

ALE

Analytics and Location Engine. ALE gives visibility into everything the wireless network knows. This enablescustomers and partners to gain a wealth of information about the people on their premises. This can bevery important for many different verticals and use cases. ALE includes a location engine that calculatesassociated and unassociated device location periodically using context streams, including RSSI readings,from WLAN controllers or Instant clusters.

Aruba Central | User Guide Glossary of Terms | 283

Page 284: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

284 | Glossary of Terms Aruba Central | User Guide

ALG

Application Layer Gateway. ALG is a security component that manages application layer protocols such asSIP, FTP and so on.

AM

Air Monitor. AM is a mode of operation supported on wireless APs. When an AP operates in the Air Monitormode, it enhances the wireless networks by collecting statistics, monitoring traffic, detecting intrusions,enforcing security policies, balancing wireless traffic load, self-healing coverage gaps, and more. However,clients cannot connect to APs operating in the AM mode.

AMON

Advanced Monitoring. AMON is used in Aruba WLAN deployments for improved network management,monitoring and diagnostic capabilities.

AMP

AirWave Management Platform. AMP is a network management system for configuring, monitoring, andupgrading wired and wireless devices on your network.

ANQP

Access Network Query Protocol. ANQP is a query and a response protocol for Wi-Fi hotspot services. ANQPincludes information Elements (IEs) that can be sent from the AP to the client to identify the AP networkand service provider. The IEs typically include information about the domain name of the AP operator, theIP addresses available at the AP, and information about potential roaming partners accessible through theAP. If the client responds with a request for a specific IE, the AP will send a Generic Advertisement Service(GAS) response frame with the configured ANQP IE information.

ANSI

American National Standards Institute. It refers to the ANSI compliance standards for products, systems,services, and processes.

API

Application Programming Interface. Refers to a set of functions, procedures, protocols, and tools thatenable users to build application software.

ARM

Adaptive Radio Management. ARM dynamically monitors and adjusts the network to ensure that all usersare allowed ready access. It enables full utilization of the available spectrum to support maximum numberof users by intelligently choosing the best RF channel and transmit power for APs in their current RFenvironment.

ARP

Address Resolution Protocol. ARP is used for mapping IP network address to the hardware MAC address ofa device.

Aruba Activate

Aruba Activate is a cloud-based service that helps provision your Aruba devices and maintain yourinventory. Activate automates the provisioning process, allowing a single IT technician to easily and rapidly

Page 285: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

deploy devices throughout a distributed enterprise network.

ASCII

American Standard Code for Information Interchange. An ASCII code is a numerical representation of acharacter or an action.

B-RAS

Broadband Remote Access Server. A B-RAS is a server that facilitates and converges traffic from multipleInternet traffic resources such as cable, DSL, Ethernet, or Broadband wireless.

band

Band refers to a specified range of frequencies of electromagnetic radiation.

BGP

Border Gateway Protocol. BGP is a routing protocol for exchanging data and information betweendifferent host gateways or autonomous systems on the Internet.

BLE

Bluetooth Low Energy. The BLE functionality is offered by Bluetooth® to enable devices to run for longdurations with low power consumption.

BMC

Beacon Management Console. BMC manages and monitors beacons from the BLE devices. The BLE devicesare used for location tracking and proximity detection.

BPDU

Bridge Protocol Data Unit. A BPDU is a data message transmitted across a local area network to detectloops in network topologies.

BRE

Basic Regular Expression. The BRE syntax standards designed by the IEEE provides extension to thetraditional Simple Regular Expressions syntax and allows consistency between utility programs such as grep,sed, and awk.

BSS

Basic Service Set. A BSS is a set of interconnected stations that can communicate with each other. BSS canbe an independent BSS or infrastructure BSS. An independent BSS is an ad hoc network that does notinclude APs, whereas the infrastructure BSS consists of an AP and all its associated clients.

BSSID

Basic Service Set Identifier. The BSSID identifies a particular BSS within an area. In infrastructure BSSnetworks, the BSSID is the MAC address of the AP. In independent BSS or ad hoc networks, the BSSID isgenerated randomly.

BYOD

Bring Your Own Device. BYOD refers to the use of personal mobile devices within an enterprise networkinfrastructure.

Aruba Central | User Guide Glossary of Terms | 285

Page 286: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

286 | Glossary of Terms Aruba Central | User Guide

CA

Certificate Authority or Certification Authority. Entity in a public key infrastructure system that issuescertificates to clients. A certificate signing request received by the CA is converted into a certificate when theCA adds a signature generated with a private key. See digital certificate.

CAC

Call Admission Control. CAC regulates traffic volume in voice communications. CAC can also be used toensure or maintain a certain level of audio quality in voice communications networks.

CALEA

Communications Assistance for Law Enforcement Act. To comply with the CALEA specifications and to allowlawful interception of Internet traffic by the law enforcement and intelligence agencies, thetelecommunications carriers and manufacturers of telecommunications equipment are required to modifyand design their equipment, facilities, and services to ensure that they have built-in surveillance capabilities.

captive portal

A captive portal is a web page that allows the users to authenticate and sign in before connecting to apublic-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffeeshops, and other venues that offer free Wi-Fi hotspots for the guest users.

CCA

Clear Channel Assessment. In wireless networks, the CCA method detects if a channel is occupied or clear,and determines if the channel is available for data transmission.

CDP

Cisco Discovery Protocol. CDP is a proprietary Data Link Layer protocol developed by Cisco Systems. CDPruns on Cisco devices and enables networking applications to learn about the neighboring devices directlyconnected to the network.

CDR

Call Detail Record. A CDR contains the details of a telephone or VoIP call, such as the origin and destinationaddresses of the call, the start time and end time of the call, any toll charges that were added through thenetwork or charges for operator services, and so on.

CEF

Common Event Format. The CEF is a standard for the interoperability of event or log-generating devicesand applications. The standard syntax for CEF includes a prefix and a variable extension formatted as key-value pairs.

CGI

Common Gateway Interface. CGI is a standard protocol for exchanging data between the web servers andexecutable programs running on a server to dynamically process web pages.

CHAP

Challenge Handshake Authentication Protocol. CHAP is an authentication scheme used by PPP servers tovalidate the identity of remote clients.

Page 287: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

CIDR

Classless Inter-Domain Routing. CIDR is an IP standard for creating and allocating unique identifiers fornetworks and devices. The CIDR IP addressing scheme is used as a replacement for the older IP addressingscheme based on classes A, B, and C. With CIDR, a single IP address can be used to designate many uniqueIP addresses. A CIDR IP address ends with a slash followed by the IP network prefix, for example,192.0.2.0/24.

CLI

Command-Line Interface. A console interface with a command line shell that allows users to execute textinput as commands and convert these commands to appropriate functions.

CN

Common Name. CN is the primary name used to identify a certificate.

CNA

Captive Network Assistant. CNA is a popup page shown when joining a network that has a captive portal.

CoA

Change of Authorization. The RADIUS CoA is used in the AAA service framework to allow dynamicmodification of the authenticated, authorized, and active subscriber sessions.

CoS

Class of Service. CoS is used in data and voice protocols for classifying packets into different types of traffic(voice, video, or data) and setting a service priority. For example, voice traffic can be assigned a higherpriority over email or HTTP traffic.

CPE

Customer Premises Equipment. It refers to any terminal or equipment located at the customer premises.

CPU

Central Processing Unit. A CPU is an electronic circuitry in a computer for processing instructions.

CRC

Cyclic Redundancy Check. CRC is a data verification method for detecting errors in digital data duringtransmission, storage, or retrieval.

CRL

Certificate Revocation List. CRL is a list of revoked certificates maintained by a certification authority.

cryptobinding

Short for cryptographic binding. A procedure in a tunneled EAP method that binds together the tunnelprotocol and the tunneled authentication methods, ensuring the relationship between a collection of dataassets. Cryptographic binding focuses on protecting the server; mutual cryptographic binding protects bothpeer and server.

Aruba Central | User Guide Glossary of Terms | 287

Page 288: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

288 | Glossary of Terms Aruba Central | User Guide

CSA

Channel Switch Announcement. The CSA element enables an AP to advertise that it is switching to a newchannel before it begins transmitting on that channel. This allows the clients, which support CSA, totransition to the new channel with minimal downtime.

CSMA/CA

Carrier Sense Multiple Access / Collision Avoidance. CSMA/CA is a protocol for carrier transmission innetworks using the 802.11 standard. CSMA/CA aims to prevent collisions by listening to the broadcastingnodes, and informing devices not to transmit any data until the broadcasting channel is free.

CSR

Certificate Signing Request. In PKI systems, a CSR is a message sent from an applicant to a CA to apply for adigital identity certificate.

CSV

Comma-Separated Values. A file format that stores tabular data in the plain text format separated bycommas.

CTS

Clear to Send. The CTS refers to the data transmission and protection mechanism used by the 802.11wireless networking protocol to prevent frame collision occurrences. See RTS.

CW

Contention Window. In QoS, CW refers to a window set for access categories based on the type of traffic.Based on the type and volume of the traffic, the minimum and maximum values can be calculated toprovide a wider window when necessary.

DAI

Dynamic ARP inspection. A security feature that validates ARP packets in a network.

DAS

Distributed Antenna System. DAS is a network of antenna nodes strategically placed around a geographicalarea or structure for additional cellular coverage.

dB

Decibel. Unit of measure for sound or noise and is the difference or ratio between two signal levels.

dBm

Decibel-Milliwatts. dBm is a logarithmic measurement (integer) that is typically used in place of mW torepresent receive-power level. AMP normalizes all signals to dBm, so that it is easy to evaluate performancebetween various vendors.

DCB

Data Center Bridging. DCB is a collection of standards developed by IEEE for creating a converged datacenter network using Ethernet.

Page 289: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

DCE

Data Communication Equipment. DCE refers to the devices that establish, maintain, and terminatecommunication network sessions between a data source and its destination.

DCF

Distributed Coordination Function. DCF is a protocol that uses carrier sensing along with a four-wayhandshake to maximize the throughput while preventing packet collisions.

DDMO

Distributed Dynamic Multicast Optimization. DDMO is similar to Dynamic Multicast Optimization (DMO)where the multicast streams are converted into unicast streams on the AP instead of the controller, toenhance the quality and reliability of streaming videos, while preserving the bandwidth available to non-video clients.

DES

Data Encryption Standard. DES is a common standard for data encryption and a form of secret keycryptography, which uses only one key for encryption and decryption.

designated router

Designated router refers to a router interface that is elected to originate network link advertisements fornetworks using the OSPF protocol.

destination NAT

Destination Network Address Translation. Destination NAT is a process of translating the destination IPaddress of an end route packet in a network. Destination NAT is used for redirecting the traffic destined toa virtual host to the real host, where the virtual host is identified by the destination IP address and the realhost is identified by the translated IP address.

DFS

Dynamic Frequency Selection. DFS is a mandate for radio systems operating in the 5 GHz band to beequipped with means to identify and avoid interference with Radar systems.

DFT

Discrete Fourier Transform. DFT converts discrete-time data sets into a discrete-frequency representation.See FFT.

DHCP

Dynamic Host Configuration Protocol. A network protocol that enables a server to automatically assign anIP address to an IP-enabled device from a defined range of numbers configured for a given network. 

DHCP snooping

DHCP snooping enables the switch to monitor and control DHCP messages received from untrusteddevices that are connected to the switch.

digital certificate

A digital certificate is an electronic document that uses a digital signature to bind a public key with anidentity—information such as the name of a person or an organization, address, and so forth.

Aruba Central | User Guide Glossary of Terms | 289

Page 290: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

290 | Glossary of Terms Aruba Central | User Guide

Digital wireless pulse

A wireless technology for transmitting large amounts of digital data over a wide spectrum of frequencybands with very low power for a short distance. Ultra Wideband radio can carry a huge amount of data overa distance up to 230 ft at very low power (less than 0.5 mW), and has the ability to carry signals throughdoors and other obstacles that tend to reflect signals at more limited bandwidths and a higher power.

distribution certificate

Distribution certificate is used for digitally signing iOS mobile apps to enable enterprise app distribution. Itverifies the identity of the app publisher.

DLNA

Digital Living Network Alliance. DLNA is a set of interoperability guidelines for sharing digital media amongmultimedia devices.

DMO

Dynamic Multicast Optimization. DMO is a process of converting multicast streams into unicast streamsover a wireless link to enhance the quality and reliability of streaming videos, while preserving thebandwidth available to non-video clients.

DN

Distinguished Name. A series of fields in a digital certificate that, taken together, constitute the uniqueidentity of the person or device that owns the digital certificate. Common fields in a DN include country,state, locality, organization, organizational unit, and the “common name”, which is the primary name usedto identify the certificate.

DNS

Domain Name System. A DNS server functions as a phone book for the intranet and Internet users. Itconverts human-readable computer host names into IP addresses and IP addresses into host names. Itstores several records for a domain name such as an address 'A' record, name server (NS), and mailexchanger (MX) records. The Address 'A' record is the most important record that is stored in a DNS server,because it provides the required IP address for a network peripheral or element.

DoS

Denial of Service. DoS is any type of attack where the attackers send excessive messages to flood trafficand thereby preventing the legitimate users from accessing the service.

DPD

Dead Peer Detection. A method used by the network devices to detect the availability of the peer devices.

DPI

Deep Packet Inspection. DPI is an advanced method of network packet filtering that is used for inspectingdata packets exchanged between the devices and systems over a network. DPI functions at the Applicationlayer of the Open Systems Interconnection (OSI) reference model and enables users to identify, categorize,track, reroute, or stop packets passing through a network.

Page 291: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

DRT

Downloadable Regulatory Table. The DRT feature allows new regulatory approvals to be distributed for APswithout a software upgrade or patch.

DS

Differentiated Services. The DS specification aims to provide uninterrupted quality of service by managingand controlling the network traffic, so that certain types of traffic get precedence.

DSCP

Differentiated Services Code Point. DSCP is a 6-bit packet header value used for traffic classification andpriority assignment.

DSL

Digital Subscriber Line. The DSL technology allows the transmission of digital data over telephone lines. ADSL modem is a device used for connecting a computer or router to a telephone line that offersconnectivity to the Internet.

DSSS

Direct-Sequence Spread Spectrum. DSSS is a modulation technique used for reducing overall signalinterference. This technique multiplies the original data signal with a pseudo random noise spreading code.Spreading of this signal makes the resulting wideband channel more noisy, thereby increasing the resistanceto interference. See FHSS.

DST

Daylight Saving Time. DST is also known as summer time that refers to the practice of advancing clocks, sothat evenings have more daylight and mornings have less. Typically clocks are adjusted forward one hournear the start of spring and are adjusted backward in autumn.

DTE

Data Terminal Equipment. DTE refers to a device that converts user information into signals or re-convertsthe received signals.

DTIM

Delivery Traffic Indication Message. DTIM is a kind of traffic indication map. A DTIM interval determineswhen the APs must deliver broadcast and multicast frames to their associated clients in power save mode.

DTLS

Datagram Transport Layer Security. DTLS communications protocol provides communications security fordatagram protocols.

dynamic authorization

Dynamic authorization refers to the ability to make changes to a visitor account’s session while it is inprogress. This might include disconnecting a session or updating some aspect of the authorization for thesession.

Aruba Central | User Guide Glossary of Terms | 291

Page 292: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

292 | Glossary of Terms Aruba Central | User Guide

dynamic NAT

Dynamic Network Address Translation. Dynamic NAT maps multiple public IP addresses and uses theseaddresses with an internal or private IP address. Dynamic NAT helps to secure a network by masking theinternal configuration of a private network.

EAP

Extensible Authentication Protocol. An authentication protocol for wireless networks that extends themethods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP cansupport multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication. 

EAP-FAST

EAP – Flexible Authentication Secure Tunnel (tunneled).

EAP-GTC

EAP – Generic Token Card. (non-tunneled).

EAP-MD5

EAP – Method Digest 5. (non-tunneled).

EAP-MSCHAP

EAP Microsoft Challenge Handshake Authentication Protocol.

EAP-MSCHAPv2

EAP Microsoft Challenge Handshake Authentication Protocol Version 2.

EAP-PEAP

EAP–Protected EAP. A widely used protocol for securely transporting authentication data across a network(tunneled).

EAP-PWD

EAP-Password. EAP-PWD is an EAP method that uses a shared password for authentication.

EAP-TLS

EAP–Transport Layer Security. EAP-TLS is a certificate-based authentication method supporting mutualauthentication, integrity-protected ciphersuite negotiation and key exchange between two endpoints. SeeRFC 5216.

EAP-TTLS

EAP–Tunneled Transport Layer Security. EAP-TTLS is an EAP method that encapsulates a TLS session,consisting of a handshake phase and a data phase. See RFC 5281.

EAPoL

Extensible Authentication Protocol over LAN. A network port authentication protocol used in IEEE 802.1Xstandards to provide a generic network sign-on to access network resources.

Page 293: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

ECC

Elliptical Curve Cryptography or Error correcting Code memory. Elliptical Curve Cryptography is a public-keyencryption technique that is based on elliptic curve theory used for creating faster, smaller, and moreefficient cryptographic keys. Error Correcting Code memory is a type of computer data storage that candetect and correct the most common kinds of internal data corruption. ECC memory is used in mostcomputers where data corruption cannot be tolerated under any circumstances, such as for scientific orfinancial computing.

ECDSA

Elliptic Curve Digital Signature Algorithm. ECDSA is a cryptographic algorithm that supports the use of publicor private key pairs for encrypting and decrypting information.

EDCA

Enhanced Distributed Channel Access. The EDCA function in the IEEE 802.11e Quality of Service standardsupports differentiated and distributed access to wireless medium based on traffic priority and AccessCategory types. See WMM and WME.

EIGRP

Enhanced Interior Gateway Routing Protocol. EIGRP is a routing protocol used for automating routingdecisions and configuration in a network.

EIRP

Effective Isotropic Radiated Power or Equivalent Isotropic Radiated Power. EIRP refers to the output powergenerated when a signal is concentrated into a smaller area by the Antenna.

ESI

External Services Interface. ESI provides an open interface for integrating security solutions that solveinterior network problems such as viruses, worms, spyware, and corporate compliance.

ESS

Extended Service Set. An ESS is a set of one or more interconnected BSSs that form a single sub network.

ESSID

Extended Service Set Identifier. ESSID refers to the ID used for identifying an extended service set.

Ethernet

Ethernet is a network protocol for data transmission over LAN.

EULA

End User License Agreement. EULA is a legal contract between a software application publisher or authorand the users of the application.

FCC

Federal Communications Commission. FCC is a regulatory body that defines standards for the interstateand international communications by radio, television, wire, satellite, and cable.

Aruba Central | User Guide Glossary of Terms | 293

Page 294: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

294 | Glossary of Terms Aruba Central | User Guide

FFT

Fast Fourier Transform. FFT is a frequency analysis mechanism that aims at faster conversion of a discretesignal in time domain into a discrete frequency domain representation. See also DFT.

FHSS

Frequency Hopping Spread Spectrum. FHSS is transmission technique that allows modulation andtransmission of a data signal by rapidly switching a carrier among many frequency channels in a randombut predictable sequence. See also DSSS.

FIB

Forwarding Information Base. FIB is a forwarding table that maps MAC addresses to ports. FIB is used innetwork bridging, routing, and similar functions to identify the appropriate interface for forwardingpackets.

FIPS

Federal Information Processing Standards. FIPS refers to a set of standards that describe documentprocessing, encryption algorithms, and other information technology standards for use within non-militarygovernment agencies, and by government contractors and vendors who work with these agencies.

firewall

Firewall is a network security system used for preventing unauthorized access to or from a private network.

FQDN

Fully Qualified Domain Name. FQDN is a complete domain name that identifies a computer or host on theInternet.

FQLN

Fully Qualified Location Name. FQLN is a device location identifier in the format:APname.Floor.Building.Campus.

frequency allocation

Use of radio frequency spectrum as regulated by governments.

FSPL

Free Space Path Loss. FSPL refers to the loss in signal strength of an electromagnetic wave that would resultfrom a line-of-sight path through free space (usually air), with no obstacles nearby to cause reflection ordiffraction.

FTP

File Transfer Protocol. A standard network protocol used for transferring files between a client and serveron a computer network.

GARP

Generic Attribute Registration Protocol. GVRP is a LAN protocol that allows the network nodes to registerand de-register attributes, such as network addresses, with each other.

Page 295: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

GAS

Generic Advertisement Service. GAS is a request-response protocol, which provides Layer 2 transportmechanism between a wireless client and a server in the network prior to authentication. It helps indetermining a wireless network infrastructure before associating clients, and allows clients to send queriesto multiple 802.11 networks in parallel.

Gbps

Gigabits per second.

GBps

Gigabytes per second.

GET

GET refers HTTP request method or an SNMP operation method. The GET HTTP request method submitsdata to be processed to a specified resource. The GET SNMP operation method obtains information fromthe Management Information Base (MIB).

GHz

Gigahertz.

GMT

Greenwich Mean Time. GMT refers to the mean solar time at the Royal Observatory in Greenwich, London.GMT is the same as Coordinated Universal Time (UTC) standard, written as an offset of UTC +/- 00:00.

goodput

Goodput is the application level throughput that refers to the ratio of the total bytes transmitted orreceived in the network to the total air time required for transmitting or receiving the bytes.

GPS

Global Positioning System. A satellite-based global navigation system.

GRE

Generic Routing Encapsulation. GRE is an IP encapsulation protocol that is used to transport packets over anetwork.

GTC

Generic Token Card. GTC is a protocol that can be used as an alternative to MSCHAPv2  protocol. GTCallows authentication to various authentication databases even in cases where MSCHAPv2  is notsupported by the database.

GVRP

GARP VLAN Registration Protocol or Generic VLAN Registration Protocol. GARP is an IEEE 802.1Q-compliantprotocol that facilitates VLAN registration and controls VLANs within a larger network.

H2QP

Hotspot 2.0 Query Protocol.

Aruba Central | User Guide Glossary of Terms | 295

Page 296: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

296 | Glossary of Terms Aruba Central | User Guide

hot zone

Wireless access area created by multiple hotspots that are located in close proximity to one another. Hotzones usually combine public safety APs with public hotspots.

hotspot

Hotspot refers to a WLAN node that provides Internet connection and virtual private network (VPN) accessfrom a given location. A business traveler, for example, with a laptop equipped for Wi-Fi can look up a localhotspot, contact it, and get connected through its network to reach the Internet.

HSPA

High-Speed Packet Access.

HT

High Throughput. IEEE 802.11n is an HT WLAN standard that aims to achieve physical data rates of close to600 Mbps on the 2.4 GHz and 5 GHz bands.

HTTP

Hypertext Transfer Protocol. The HTTP is an application protocol to transfer data over the web. The HTTPprotocol defines how messages are formatted and transmitted, and the actions that the w servers andbrowsers should take in response to various commands.

HTTPS

Hypertext Transfer Protocol Secure. HTTPS is a variant of the HTTP that adds a layer of security on the datain transit through a secure socket layer or transport layer security protocol connection.

IAS

Internet Authentication Service. IAS is a component of Windows Server operating systems that providescentralized user authentication, authorization, and accounting.

ICMP

Internet Control Message Protocol. ICMP is an error reporting protocol. It is used by network devices suchas routers, to send error messages and operational information to the source IP address when networkproblems prevent delivery of IP packets.

IDS

Intrusion Detection System. IDS monitors a network or systems for malicious activity or policy violationsand reports its findings to the management system deployed in the network.

IEEE

Institute of Electrical and Electronics Engineers.

IGMP

Internet Group Management Protocol. Communications protocol used by hosts and adjacent routers on IPnetworks to establish multicast group memberships.

Page 297: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

IGMP snooping

IGMP snooping prevents multicast flooding on Layer 2 network by treating multicast traffic as broadcasttraffic. Without IGMP snooping, all streams could be flooded to all ports on that VLAN. When multicastflooding occurs, end-hosts that happen to be in the same VLAN would receive all the streams only to bediscarded without snooping.

IGP

Interior Gateway Protocol. IGP is used for exchanging routing information between gateways within anautonomous system (for example, a system of corporate local area networks).

IGRP

Interior Gateway Routing Protocol. IGRP is a distance vector interior routing protocol used by routers toexchange routing data within an autonomous system.

IKE

Internet Key Exchange. IKE is a key management protocol used with IPsec protocol to establish a securecommunication channel. IKE provides additional feature, flexibility, and ease of configuration for IPsecstandard.

IKEv1

Internet Key Exchange version 1. IKEv1 establishes a secure authenticated communication channel by usingeither the pre-shared key (shared secret), digital signatures, or public key encryption. IKEv1 operates in Mainand Aggressive modes. See RFC 2409.

IKEv2

Internet Key Exchange version 2. IKEv2 uses the secure channel established in Phase 1 to negotiate SecurityAssociations on behalf of services such as IPsec. IKEv2 uses pre-shared key and Digital Signature forauthentication. See RFC 4306.

IoT

Internet of Things. IoT refers to the internetworking of devices that are embedded with electronics,software, sensors, and network connectivity features allowing data exchange over the Internet.

IPM

Intelligent Power Monitoring. IPM is a feature supported on certain APs that actively measures the powerutilization of an AP and dynamically adapts to the power resources.

IPS

Intrusion Prevention System. The IPS monitors a network for malicious activities such as security threats orpolicy violations. The main function of an IPS is to identify suspicious activity, log the information, attemptto block the activity, and report it.

IPsec

Internet Protocol security. IPsec is a protocol suite for secure IP communications that authenticates andencrypts each IP packet in a communication session.

Aruba Central | User Guide Glossary of Terms | 297

Page 298: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

298 | Glossary of Terms Aruba Central | User Guide

IPSG

Internet Protocol Source Guard. IPSG restricts IP address from untrusted interface by filtering traffic basedon list of addresses in the DHCP binding database or manually configured IP source bindings. It prevents IPspoofing attacks.

IrDA

An industry-sponsored organization set up in 1993 to create international standards for the hardware andsoftware used in infrared communication links. In this special form of radio transmission, a focused ray oflight in the infrared frequency spectrum, measured in terahertz (THz), or trillions of hertz (cycles persecond), is modulated with information and sent from a transmitter to a receiver over a relatively shortdistance.

ISAKMP

Internet Security Association and Key Management Protocol. ISAKMP is used for establishing SecurityAssociations and cryptographic keys in an Internet environment.

ISP

Internet Service Provider. An ISP is an organization that provides services for accessing and using theInternet.

JSON

JavaScript Object Notation. JSON is an open-standard, language-independent, lightweight data-interchangeformat used to transmit data objects consisting of attribute–value pairs. JSON uses a "self-describing" textformat that is easy for humans to read and write, and that can be used as a data format by anyprogramming language.

Kbps

Kilobits per second.

KBps

Kilobytes per second.

keepalive

Signal sent at periodic intervals from one device to another to verify that the link between the two devices isworking. If no reply is received, data will be sent by a different path until the link is restored. A keepalive canalso be used to indicate that the connection should be preserved so that the receiving device does notconsider it timed out and drop it.

L2TP

Layer-2 Tunneling Protocol. L2TP is a networking protocol used by the ISPs to enable VPN operations.

LACP

Link Aggregation Control Protocol. LACP is used for the collective handling of multiple physical ports thatcan be seen as a single channel for network traffic purposes.

Page 299: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

LAG

Link Aggregation Group . A LAG combines a number of physical ports together to make a single high-bandwidth data path. LAGs can connect two switches to provide a higher-bandwidth connection to a publicnetwork.

LAN

Local Area Network. A LAN is a network of connected devices within a distinct geographic area such as anoffice or a commercial establishment and share a common communications line or wireless link to a server.

LCD

Liquid Crystal Display. LCD is the technology used for displays in notebook and other smaller computers.Like LED and gas-plasma technologies, LCDs allow displays to be much thinner than the cathode ray tubetechnology.

LDAP

Lightweight Directory Access Protocol. LDAP is a communication protocol that provides the ability to accessand maintain distributed directory information services over a network.

LDPC

Low-Density Parity-Check. LDPC is a method of transmitting a message over a noisy transmission channelusing a linear error correcting code. An LDPC is constructed using a sparse bipartite graph.

LEAP

Lightweight Extensible Authentication Protocol. LEAP is a Cisco proprietary version of EAP used in wirelessnetworks and Point-to-Point connections.

LED

Light Emitting Diode. LED is a semiconductor light source that emits light when an electric current passesthrough it.

LEEF

Log Event Extended Format. LEEF is a type of customizable syslog event format. An extended log filecontains a sequence of lines containing ASCII characters terminated by either the sequence LF or CRLF.

LI

Lawful Interception. LI refers to the procedure of obtaining communications network data by the LawEnforcement Agencies for the purpose of analysis or evidence.

LLDP

Link Layer Discovery Protocol. LLDP is a vendor-neutral link layer protocol in the Internet Protocol suiteused by network devices for advertising their identity, capabilities, and neighbors on an IEEE 802 local areanetwork, which is principally a wired Ethernet.

LLDP-MED

LLDP–Media Endpoint Discovery. LLDP-MED facilitates information sharing between endpoints andnetwork infrastructure devices.

Aruba Central | User Guide Glossary of Terms | 299

Page 300: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

300 | Glossary of Terms Aruba Central | User Guide

LMS

Local Management Switch. In multi-controller networks, each controller acts as an LMS and terminates usertraffic from the APs, processes, and forwards the traffic to the wired network.

LNS

L2TP Network Server. LNS is an equipment that connects to a carrier and handles the sessions frombroadband lines. It is also used for dial-up and mobile links. LNS handles authentication and routing of theIP addresses. It also handles the negotiation of the link with the equipment and establishes a session.

LTE

Long Term Evolution. LTE is a 4G wireless communication standard that provides high-speed wirelesscommunication for mobile phones and data terminals. See 4G.

MAB

MAC Authentication Bypass. Endpoints such as network printers, Ethernet-based sensors, cameras, andwireless phones do not support 802.1X authentication. For such endpoints, MAC Authentication Bypassmechanism is used. In this method, the MAC address of the endpoint is used to authenticate the endpoint.

MAC

Media Access Control. A MAC address is a unique identifier assigned to network interfaces forcommunications on a network.

MAM

Mobile Application Management. MAM refers to software and services used to secure, manage, anddistribute mobile applications used in enterprise settings on mobile devices like smartphones and tabletcomputers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD.

Mbps

Megabits per second

MBps

Megabytes per second

MCS

Modulation and Coding Scheme. MCS is used as a parameter to determine the data rate of a wirelessconnection for high throughput.

MD4

Message Digest 4. MD4 is an earlier version of MD5 and is an algorithm used to verify data integritythrough the creation of a 128-bit message digest from data input.

MD5

Message Digest 5. The MD5 algorithm is a widely used hash function producing a 128-bit hash value fromthe data input.

Page 301: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

MDAC

Microsoft Data Access Components. MDAC is a framework of interrelated Microsoft technologies thatprovides a standard database for Windows OS.

MDM

Mobile Device Management. MDM is an administrative software to manage, monitor, and secure mobiledevices of the employees in a network.

mDNS

Multicast Domain Name System. mDNS provides the ability to perform DNS-like operations on the local linkin the absence of any conventional unicast DNS server. The mDNS protocol uses IP multicast UserDatagram Protocol (UDP) packets, and is implemented by the Apple Bonjour and Linux NSS-mDNS services.mDNS works in conjunction with DNS Service Discovery (DNS-SD), a companion zero-configurationtechnique specified. See RFC 6763.

MFA

Multi-factor Authentication. MFA lets you require multiple factors, or proofs of identity, whenauthenticating a user. Policy configurations define how often multi-factor authentication will be required, orconditions that will trigger it.

MHz

Megahertz

MIB

Management Information Base. A hierarchical database used by SNMP to manage the devices beingmonitored.

microwave

Electromagnetic energy with a frequency higher than 1 GHz, corresponding to wavelength shorter than 30centimeters.

MIMO

Multiple Input Multiple Output. An antenna technology for wireless communications in which multipleantennas are used at both source (transmitter) and destination (receiver). The antennas at each end of thecommunications circuit are combined to minimize errors and optimize data speed.

MISO

Multiple Input Single Output. An antenna technology for wireless communications in which multipleantennas are used at the source (transmitter). The antennas are combined to minimize errors and optimizedata speed. The destination (receiver) has only one antenna.

MLD

Multicast Listener Discovery. A component of the IPv6 suite. It is used by IPv6 routers for discoveringmulticast listeners on a directly attached link.

Aruba Central | User Guide Glossary of Terms | 301

Page 302: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

302 | Glossary of Terms Aruba Central | User Guide

MPDU

MAC Protocol Data Unit. MPDU is a message exchanged between MAC entities in a communication systembased on the layered OSI model.

MPLS

Multiprotocol Label Switching. The MPLS protocol speeds up and shapes network traffic flows.

MPPE

Microsoft Point-to-Point Encryption. A method of encrypting data transferred across PPP-based dial-upconnections or PPTP-based VPN connections.

MS-CHAP

Microsoft Challenge Handshake Authentication Protocol. MS-CHAP is Password-based, challenge-response,mutual authentication protocol that uses MD4 and DES encryption.

MS-CHAPv1

Microsoft Challenge  Handshake Authentication Protocol version 1. MS-CHAPv1 extends the userauthentication functionality provided on Windows networks to remote workstations. MS-CHAPv1 supportsonly one-way authentication.

MS-CHAPv2

Microsoft Challenge  Handshake Authentication Protocol version 2. MS-CHAPv2 is an enhanced version ofthe MS-CHAP protocol that supports mutual authentication.

MSS

Maximum Segment Size. MSS is a parameter of the options field in the TCP header that specifies the largestamount of data, specified in bytes, that a computer or communications device can receive in a single TCPsegment.

MSSID

Mesh Service Set Identifier. MSSID is the SSID used by the client to access a wireless mesh network.

MSTP

Multiple Spanning Tree Protocol. MSTP configures a separate Spanning Tree for each VLAN group andblocks all but one of the possible alternate paths within each spanning tree.

MTU

Maximum Transmission Unit. MTU is the largest size packet or frame specified in octets (eight-bit bytes)that can be sent in networks such as the Internet.

MU-MIMO

Multi-User Multiple-Input Multiple-Output. MU-MIMO is a set of multiple-input and multiple-outputtechnologies for wireless communication, in which users or wireless terminals with one or more antennascommunicate with each other.

Page 303: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

MVRP

Multiple VLAN Registration Protocol. MVRP is a Layer 2 network protocol used for automatic configurationof VLAN information on switches.

mW

milliWatts. mW is 1/1000 of a Watt. It is a linear measurement (always positive) that is generally used torepresent transmission.

NAC

Network Access Control. NAC is a computer networking solution that uses a set of protocols to define andimplement a policy that describes how devices can secure access to network nodes when they initiallyattempt to connect to a network.

NAD

Network Access Device. NAD is a device that automatically connects the user to the preferred network, forexample, an AP or an Ethernet switch.

NAK

Negative Acknowledgement. NAK is a response indicating that a transmitted message was received witherrors or it was corrupted, or that the receiving end is not ready to accept transmissions.

NAP

Network Access Protection. The NAP feature in the Windows Server allows network administrators to definespecific levels of network access based on identity, groups, and policy compliance. The NAP Agent is aservice that collects and manages health information for NAP client computers. If a client is not compliant,NAP provides a mechanism to automatically bring the client back into compliance and then dynamicallyincrease its level of network access.

NAS

Network Access Server. NAS provides network access to users, such as a wireless AP, network switch, or dial-in terminal server.

NAT

Network Address Translation. NAT is a method of remapping one IP address space into another bymodifying network address information in Internet Protocol (IP) datagram packet headers while they are intransit across a traffic routing device.

NetBIOS

Network Basic Input/Output System. A program that lets applications on different computerscommunicate within a LAN.

netmask

Netmask is a 32-bit mask used for segregating IP address into subnets. Netmask defines the class andrange of IP addresses.

Aruba Central | User Guide Glossary of Terms | 303

Page 304: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

304 | Glossary of Terms Aruba Central | User Guide

NFC

Near-Field Communication. NFC is a short-range wireless connectivity standard (ECMA-340, ISO/IEC 18092)that uses magnetic field induction to enable communication between devices when they touch or arebrought closer (within a few centimeters of distance). The standard specifies a way for the devices toestablish a peer-to-peer (P2P) network to exchange data.

NIC

Network Interface Card. NIC is a hardware component that allows a device to connect to the network.

Nmap

Network Mapper. Nmap is an open-source utility for network discovery and security auditing. Nmap uses IPpackets to determine such things as the hosts available on a network and their services, operating systemsand versions, types of packet filters/firewalls, and so on.

NMI

Non-Maskable Interrupt. NMI is a hardware interrupt that standard interrupt-masking techniques in thesystem cannot ignore. It typically occurs to signal attention for non-recoverable hardware errors.

NMS

Network Management System. NMS is a set of hardware and/or software tools that allow an IT professionalto supervise the individual components of a network within a larger network management framework.

NOE

New Office Environment. NOE is a proprietary VoIP protocol designed by Alcatel-Lucent Enterprise.

NTP

Network Time Protocol. NTP is a protocol for synchronizing the clocks of computers over a network.

OAuth

Open Standard for Authorization. OAuth is a token-based authorization standard that allows websites orthird-party applications to access user information, without exposing the user credentials.

OCSP

Online Certificate Status Protocol. OCSP is used for determining the current status of a digital certificatewithout requiring a CRL.

OFDM

Orthogonal Frequency Division Multiplexing. OFDM is a scheme for encoding digital data on multiple carrierfrequencies.

OID

Object Identifier. An OID is an identifier used to name an object. The OIDs represent nodes or managedobjects in a MIB hierarchy. The OIDs are designated by text strings and integer sequences and are formallydefined as per the ASN.1 standard.

Page 305: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

OKC

Opportunistic Key Caching. OKC is a technique available for authentication between multiple APs in anetwork where those APs are under common administrative control. Using OKC, a station roaming to anyAP in the network will not have to complete a full authentication exchange, but will instead just perform the4-way handshake to establish transient encryption keys.

OpenFlow

OpenFlow is an open communications interface between control plane and the forwarding layers of anetwork.

OpenFlow agent

OpenFlow agent. OpenFlow is a software module in Software-Defined Networking (SDN) that allows theabstraction of any legacy network element, so that it can be integrated and managed by the SDN controller.OpenFlow runs on network devices such as switches, routers, wireless controllers, and APs.

Optical wireless

Optical wireless is combined use of conventional radio frequency wireless and optical fiber fortelecommunication. Long-range links are provided by using optical fibers; the links from the long-rangeendpoints to end users are accomplished by RF wireless or laser systems. RF wireless at Ultra HighFrequencies and microwave frequencies can carry broadband signals to individual computers at substantialdata speeds.

OSI

Open Systems Interconnection. OSI is a reference model that defines a framework for communicationbetween the applications in a network.

OSPF

Open Shortest Path First. OSPF is a link-state routing protocol for IP networks. It uses a link-state routingalgorithm and falls into the group of interior routing protocols that operates within a single AutonomousSystem (AS).

OSPFv2

Open Shortest Path First version 2. OSPFv2 is the version 2 of the link-state routing protocol, OSPF. See RFC2328.

OUI

Organizationally Unique Identifier. Synonymous with company ID or vendor ID, an OUI is a 24-bit, globallyunique assigned number, referenced by various standards. The first half of a MAC address is OUI.

OVA

Open Virtualization Archive. OVA contains a compressed installable version of a virtual machine.

OVF

Open Virtualization Format. OVF is a specification that describes an open-standard, secure, efficient,portable and extensible format for packaging and distributing software for virtual machines.

Aruba Central | User Guide Glossary of Terms | 305

Page 306: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

306 | Glossary of Terms Aruba Central | User Guide

PAC

Protected Access Credential. PAC is distributed to clients for optimized network authentication. Thesecredentials are used for establishing an authentication tunnel between the client and the authenticationserver.

PAP

Password Authentication Protocol. PAP validates users by password. PAP does not encrypt passwords fortransmission and is thus considered insecure.

PAPI

Process Application Programming Interface. PAPI controls channels for ARM and Wireless IntrusionDetection System (WIDS) communication to the master controller. A separate PAPI control channelconnects to the local controller where the SSID tunnels terminate.

PBR

Policy-based Routing. PBR provides a flexible mechanism for forwarding data packets based on policesconfigured by a network administrator.

PDU

Power Distribution Unit or Protocol Data Unit. Power Distribution Unit is a device that distributes electricpower to the networking equipment located within a data center. Protocol Data Unit contains protocolcontrol Information that is delivered as a unit among peer entities of a network.

PEAP

Protected Extensible Authentication Protocol. PEAP is a type of EAP communication that addresses securityissues associated with clear text EAP transmissions by creating a secure channel encrypted and protected byTLS.

PEF

Policy Enforcement Firewall. PEF also known as PEFNG provides context-based controls to enforceapplication-layer security and prioritization. The customers using Aruba mobility controllers can avail PEFfeatures and services by obtaining a PEF license. PEF for VPN users—Customers with PEF for VPN licensecan apply firewall policies to the user traffic routed to a controller through a VPN tunnel.

PEFNG

Policy Enforcement Firewall. PEF also known as PEFNG provides context-based controls to enforceapplication-layer security and prioritization. The customers using Aruba mobility controllers can avail PEFfeatures and services by obtaining a PEF license. PEF for VPN users—Customers with PEF for VPN licensecan apply firewall policies to the user traffic routed to a controller through a VPN tunnel.

PEFV

Policy Enforcement Firewall. PEF also known as PEFNG provides context-based controls to enforceapplication-layer security and prioritization. The customers using Aruba mobility controllers can avail PEFfeatures and services by obtaining a PEF license. PEF for VPN users—Customers with PEF for VPN licensecan apply firewall policies to the user traffic routed to a controller through a VPN tunnel.

Page 307: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

PFS

Perfect Forward Secrecy. PFS refers to the condition in which a current session key or long-term private keydoes not compromise the past or subsequent keys.

PHB

Per-hop behavior. PHB is a term used in DS or MPLS. It defines the policy and priority applied to a packetwhen traversing a hop (such as a router) in a DiffServ network.

PIM

Protocol-Independent Multicast. PIM refers to a family of multicast routing protocols for IP networks thatprovide one-to-many and many-to-many distribution of data over a LAN, WAN, or the Internet.

PIN

Personal Identification Number. PIN is a numeric password used to authenticate a user to a system.

PKCS#n

Public-key cryptography standard n. PKCS#n refers to a numbered standard related to topics incryptography, including private keys (PKCS#1), digital certificates (PKCS#7), certificate signing requests(PKCS#10), and secure storage of keys and certificates (PKCS#12).

PKI

Public Key Infrastructure. PKI is a security technology based on digital certificates and the assurancesprovided by strong cryptography. See also certificate authority, digital certificate, public key, private key.

PLMN

Public Land Mobile Network. PLMS is a network established and operated by an administration or by aRecognized Operating Agency for the specific purpose of providing land mobile telecommunicationsservices to the public.

PMK

Pairwise Master Key. PMK is a shared secret key that is generated after PSK or 802.1X authentication.

PoE

Power over Ethernet. PoE is a technology for wired Ethernet LANs to carry electric power required for thedevice in the data cables. The IEEE 802.3af PoE standard provides up to 15.4 W of power on each port.

PoE+

Power over Ethernet+. PoE+ is an IEEE 802.3at standard that provides 25.5W power on each port.

POST

Power On Self Test. An HTTP request method that requests data from a specified resource.

PPP

Point-to-Point Protocol. PPP is a data link (layer 2) protocol used to establish a direct connection betweentwo nodes. It can provide connection authentication, transmission encryption, and compression.

Aruba Central | User Guide Glossary of Terms | 307

Page 308: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

308 | Glossary of Terms Aruba Central | User Guide

PPPoE

Point-to-Point Protocol over Ethernet. PPPoE is a method of connecting to the Internet, typically used withDSL services, where the client connects to the DSL modem.

PPTP

Point-to-Point Tunneling Protocol. PPTP is a method for implementing virtual private networks. It uses acontrol channel over TCP and a GRE tunnel operating to encapsulate PPP packets.

private key

The part of a public-private key pair that is always kept private. The private key encrypts the signature of amessage to authenticate the sender. The private key also decrypts a message that was encrypted with thepublic key of the sender.

PRNG

Pseudo-Random Number Generator. PRNG is an algorithm for generating a sequence of numbers whoseproperties approximate the properties of sequences of random numbers.

PSK

Pre-shared key. A unique shared secret that was previously shared between two parties by using a securechannel. This is used with WPA security, which requires the owner of a network to provide a passphrase tousers for network access.

PSU

Power Supply Unit. PSU is a unit that supplies power to an equipment by converting mains AC to low-voltage regulated DC power.

public key

The part of a public-private key pair that is made public. The public key encrypts a message and themessage is decrypted with the private key of the recipient.

PVST

Per-VLAN Spanning Tree. PVST provides load balancing of VLANs across multiple ports resulting in optimalusage of network resources.

PVST+

Per-VLAN Spanning Tree+. PVST+ is an extension of the PVST standard that uses the 802.1Q trunkingtechnology.

QoS

Quality of Service. It refers to the capability of a network to provide better service and performance to aspecific network traffic over various technologies.

RA

Router Advertisement. The RA messages are sent by the routers in the network when the hosts sendmulticast router solicitation to the multicast address of all routers.

Page 309: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

Radar

Radio Detection and Ranging. Radar is an object-detection system that uses radio waves to determine therange, angle, or velocity of objects.

RADIUS

Remote Authentication Dial-In User Service. An Industry-standard network access protocol for remoteauthentication. It allows authentication, authorization, and accounting of remote users who want to accessnetwork resources. 

RAM

Random Access Memory.

RAPIDS

Rogue Access Point identification and Detection System. An AMP module that is designed to identify andlocate wireless threats by making use of all of the information available from your existing infrastructure.

RARP

Reverse Address Resolution Protocol. RARP is a protocol used by a physical machine in a local area networkfor determining the IP address from the ARP table or cache of the gateway server.

Regex

Regular Expression. Regex refers to a sequence of symbols and characters defining a search pattern.

Registration Authority

Type of Certificate Authority that processes certificate requests. The Registration Authority verifies thatrequests are valid and comply with certificate policy, and authenticates the user's identity. The RegistrationAuthority then forwards the request to the Certificate Authority to sign and issue the certificate.

Remote AP

Remote APs extend corporate network to the users working from home or at temporary work sites.Remote APs are deplyed at branch office sites and are connected to the central network on a WAN link.

REST

Representational State Transfer. REST is a simple and stateless architecture that the web services use forproviding interoperability between computer systems on the Internet. In a RESTful web service, requestsmade to the URI of a resource will elicit a response that may be in XML, HTML, JSON or some other definedformat.

RF

Radio Frequency. RF refers to the electromagnetic wave frequencies within a range of 3 kHz to 300 GHz,including the frequencies used for communications or Radar signals.

RFC

Request For Comments. RFC is a commonly used format for the Internet standards documentss.

Aruba Central | User Guide Glossary of Terms | 309

Page 310: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

310 | Glossary of Terms Aruba Central | User Guide

RFID

Radio Frequency Identification. RFID uses radio waves to automatically identify and track the informationstored on a tag attached to an object.

RIP

Routing Information Protocol. RIP prevents the routing loops by limiting the number of hops allowed in apath from source to destination.

RJ45

Registered Jack 45. RJ45 is a physical connector for network cables.

RMA

Return Merchandise Authorization. RMA is a part of the product returning process that authorizes users toreturn a product to the manufacturer or distributor for a refund, replacement, or repair. The customerswho want to return a product within its Warranty period contact the manufacturer to initiate the productreturning process. The manufacturer or the seller generates an authorization number for the RMA, which isused by the customers, when returning a product to the warehouse.

RMON

Remote Monitoring. RMON provides standard information that a network administrator can use tomonitor, analyze, and troubleshoot a group of distributed LANs.

RoW

Rest of World. RoW or RW is an operating country code of a device.

RSA

Rivest, Shamir, Adleman. RSA is a cryptosystem for public-key encryption, and is widely used for securingsensitive data, particularly when being sent over an insecure network such as the Internet.

RSSI

Received Signal Strength Indicator. RSSI is a mechanism by which RF energy is measured by the circuitry ona wireless NIC (0-255). The RSSI is not standard across vendors. Each vendor determines its own RSSIscale/values.

RSTP

Rapid Spanning Tree Protocol. RSTP provides significantly faster spanning tree convergence after atopology change, introducing new convergence behaviors and bridge port roles to do this.

RTCP

RTP Control Protocol. RTCP provides out-of-band statistics and control information for an Real-TimeTransport Protocol session.

RTLS

Real-Time Location Systems. RTLS automatically identifies and tracks the location of objects or people inreal time, usually within a building or other contained area.

Page 311: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

RTP

Real-Time Transport Protocol. RTP is a network protocol used for delivering audio and video over IPnetworks.

RTS

Request to Send. RTS refers to the data transmission and protection mechanism used by the 802.11wireless networking protocol to prevent frame collision occurrences. See CTS.

RTSP

Real Time Streaming Protocol. RTSP is a network control protocol designed for use in entertainment andcommunications systems to control streaming media servers.

RVI

Routed VLAN Interface. RVI is a switch interface that forwards packets between VLANs.

RW

Rest of World. RoW or RW is an operating country code of a device.

SA

Security Association. SA is the establishment of shared security attributes between two network entities tosupport secure communication.

SAML

Security Assertion Markup Language. SAML is an XML-based framework for communicating userauthentication, entitlement, and attribute information. SAML enables single sign-on by allowing users toauthenticate at an identity provider and then access service providers without additional authentication.

SCEP

Simple Certificate Enrollment Protocol. SCEP is a protocol for requesting and managing digital certificates.

SCP

Secure Copy Protocol. SCP is a network protocol that supports file transfers between hosts on a network.

SCSI

Small Computer System Interface. SCSI refers to a set of interface standards for physical connection anddata transfer between a computer and the peripheral devices such as printers, disk drives, CD-ROM, and soon.

SDN

Software-Defined Networking. SDN is an umbrella term encompassing several kinds of network technologyaimed at making the network as agile and flexible as the virtualized server and storage infrastructure of themodern data center.

SDR

Server Derivation Rule. An SDR refers to a role assignment model used by the controllers running ArubaOSto assign roles and VLANs to the WLAN users based on the rules defined under a server group. The SDRsoverride the default authentication roles and VLANs defined in the AAA and Virtual AP profiles.

Aruba Central | User Guide Glossary of Terms | 311

Page 312: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

312 | Glossary of Terms Aruba Central | User Guide

SDU

Service Data Unit. SDU is a unit of data that has been passed down from an OSI layer to a lower layer andthat has not yet been encapsulated into a PDU by the lower layer.

SFP

The Small Form-factor Pluggable. SFP is a compact, hot-pluggable transceiver that is used for bothtelecommunication and data communications applications.

SFP+

Small Form-factor Pluggable+. SFP+ supports up to data rates up to 16 Gbps.

SFTP

Secure File Transfer Protocol. SFTP is a network protocol that allows file access, file transfer, and filemanagement functions over a secure connection.

SHA

Secure Hash Algorithm. SHA is a family of cryptographic hash functions. The SHA algorithm includes theSHA, SHA-1, SHA-2 and SHA-3 variants.

SIM

Subscriber Identity Module. SIM is an integrated circuit that is intended to securely store the InternationalMobile Subscriber Identity (IMSI) number and its related key, which are used for identifying andauthenticating subscribers on mobile telephony devices.

SIP

Session Initiation Protocol. SIP is used for signaling and controlling multimedia communication session suchas voice and video calls.

SIRT

Security Incident Response Team. SIRT is responsible for reviewing as well as responding to computersecurity incident reports and activity.

SKU

Stock Keeping Unit. SKU refers to the product and service identification code for the products in theinventory.

SLAAC

Stateless Address Autoconfiguration. SLAAC provides the ability to address a host based on a networkprefix that is advertised from a local network router through router advertisements.

SMB

Server Message Block or Small and Medium Business. Server Message Block operates as an application-layer network protocol mainly used for providing shared access to files, printers, serial ports, and formiscellaneous communications between the nodes on a network.

Page 313: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

SMS

Short Message Service. SMS refers to short text messages (up to 140 characters) sent and received throughmobile phones.

SMTP

Simple Mail Transfer Protocol. SMTP is an Internet standard protocol for electronic mail transmission.

SNIR

Signal-to-Noise-Plus-Interference Ratio. SNIR refers to the power of a central signal of interest divided bythe sum of the interference power and the power of the background noise. SINR is defined as the power ofa certain signal of interest divided by the sum of the interference power (from all the other interferingsignals) and the power of some background noise.

SNMP

Simple Network Management Protocol. SNMP is a TCP/IP standard protocol for managing devices on IPnetworks. Devices that typically support SNMP include routers, switches, servers, workstations, printers,modem racks, and more. It is used mostly in network management systems to monitor network-attacheddevices for conditions that warrant administrative attention. 

SNMPv1

Simple Network Management Protocol version 1. SNMPv1 is a widely used network management protocol.

SNMPv2

Simple Network Management Protocol version 2. SNMPv2 is an enhanced version of SNMPv1, whichincludes improvements in the areas of performance, security, confidentiality, and manager-to-managercommunications.

SNMPv2c

Community-Based Simple Network Management Protocol version 2. SNMPv2C uses the community-basedsecurity scheme of SNMPv1 and does not include the SNMPv2 security model.

SNMPv3

Simple Network Management Protocol version 3. SNMPv3 is an enhanced version of SNMP that includessecurity and remote configuration features.

SNR

Signal-to-Noise Ratio. SNR is used for comparing the level of a desired signal with the level of backgroundnoise.

SNTP

Simple Network Time Protocol. SNTP is a less complex implementation of NTP. It uses the same , but doesnot require the storage of state over extended periods of time.

SOAP

Simple Object Access Protocol. SOAP enables communication between the applications running on differentoperating systems, with different technologies and programming languages. SOAP is an XML-basedmessaging protocol for exchanging structured information between the systems that support web services.

Aruba Central | User Guide Glossary of Terms | 313

Page 314: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

314 | Glossary of Terms Aruba Central | User Guide

SoC

System on a Chip. SoC is an Integrated Circuit that integrates all components of a computer or otherelectronic system into a single chip.

source NAT

Source NAT changes the source address of the packets passing through the router. Source NAT is typicallyused when an internal (private) host initiates a session to an external (public) host.

SSH

Secure Shell. SSH is a network protocol that provides secure access to a remote device.

SSID

Service Set Identifier. SSID is a name given to a WLAN and is used by the client to access a WLAN network.

SSL

Secure Sockets Layer. SSL is a computer networking protocol for securing connections between networkapplication clients and servers over the Internet.

SSO

Single Sign-On. SSO is an access-control property that allows the users to log in once to access multiplerelated, but independent applications or systems to which they have privileges. The process authenticatesthe user across all allowed resources during their session, eliminating additional login prompts.

STBC

Space-Time Block Coding. STBC is a technique used in wireless communications to transmit multiple copiesof a data stream across a number of antennas and to exploit the various received versions of the data toimprove the reliability of data transfer.

STM

Station Management. STM is a process that handles AP management and user association.

STP

Spanning Tree Protocol. STP is a network protocol that builds a logical loop-free topology for Ethernetnetworks.

SU-MIMO

Single-User Multiple-Input Multiple-Output. SU-MIMO allocates the full bandwidth of the AP to a singlehigh-speed device during the allotted time slice.

subnet

Subnet is the logical division of an IP network.

SVP

SpectraLink Voice Priority. SVP is an open, straightforward QoS approach that has been adopted by mostleading vendors of WLAN APs. SVP favors isochronous voice packets over asynchronous data packets whencontending for the wireless medium and when transmitting packets onto the wired LAN.

Page 315: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

SWAN

Structured Wireless-Aware Network. A technology that incorporates a Wireless Local Area Network (WLAN)into a wired Wide Area Network (WAN). SWAN technology can enable an existing wired network to servehundreds of users, organizations, corporations, or agencies over a large geographic area. SWAN is said to bescalable, secure, and reliable.

TAC

Technical Assistance Center.

TACACS

Terminal Access Controller Access Control System. TACACS is a family of protocols that handles remoteauthentication and related services for network access control through a centralized server.

TACACS+

Terminal Access Controller Access Control System+. TACACS+ provides separate authentication,authorization, and accounting services. It is derived from, but not backward compatible with, TACACS. 

TCP

Transmission Control Protocol. TCP is a communication protocol that defines the standards for establishingand maintaining network connection for applications to exchange data.

TCP/IP

Transmission Control Protocol/ Internet Protocol. TCP/IP is the basic communication language or protocolof the Internet.

TFTP

Trivial File Transfer Protocol. The TFTP is a software utility for transferring files from or to a remote host.

TIM

Traffic Indication Map. TIM is an information element that advertises if any associated stations havebuffered unicast frames. APs periodically send the TIM within a beacon to identify the stations that areusing power saving mode and the stations that have undelivered data buffered on the AP.

TKIP

Temporal Key Integrity Protocol. A part of the WPA encryption standard for wireless networks. TKIP is thenext-generation Wired Equivalent Privacy (WEP) that provides per-packet key mixing to address the flawsencountered in the WEP standard.

TLS

Transport Layer Security. TLS is a cryptographic protocol that provides communication security over theInternet. TLS encrypts the segments of network connections above the Transport Layer by usingasymmetric cryptography for key exchange, symmetric encryption for privacy, and message authenticationcodes for message integrity.

TLV

Type-length-value or Tag-Length-Value. TLV is an encoding format. It refers to the type of data beingprocessed, the length of the value, and the value for the type of data being processed.

Aruba Central | User Guide Glossary of Terms | 315

Page 316: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

316 | Glossary of Terms Aruba Central | User Guide

ToS

Type of Service. The ToS field is part of the IPv4 header, which specifies datagrams priority and requests aroute for low-delay, high-throughput, or a highly reliable service.

TPC

Transmit Power Control. TPC is a part of the 802.11h amendment. It is used to regulate the power levelsused by 802.11a radio cards.

TPM

Trusted Platform Module. TPM is an international standard for a secure cryptoprocessor, which is adedicated microcontroller designed to secure hardware by integrating cryptographic keys into devices.

TSF

Timing Synchronization Function. TSF is a WLAN function that is used for synchronizing the timers for allthe stations in a BSS.

TSPEC

Traffic Specification. TSPEC allows an 802.11e client or a QoS-capable wireless client to signal its trafficrequirements to the AP.

TSV

Tab-Separated Values. TSV is a file format that allows the exchange of tabular data between applicationsthat use different internal data formats.

TTL

Time to Live. TTL or hop limit is a mechanism that sets limits for data expiry in a computer or network.

TTY

TeleTypeWriter. TTY-enabled devices allow telephones to transmit text communications for people who aredeaf or hard of hearing as well as transmit voice communication.

TXOP

Transmission Opportunity. TXOP is used in wireless networks supporting the IEEE 802.11e Quality ofService (QoS) standard. Used in both EDCA and HCF Controlled Channel Access modes of operation, TXOP isa bounded time interval in which stations supporting QoS are permitted to transfer a series of frames.TXOP is defined by a start time and a maximum duration.

U-APSD

Unscheduled Automatic Power Save Delivery. U-APSD is a part of 802.11e and helps considerably inincreasing the battery life of VoWLAN terminals.

UAM

Universal Access Method. UAM allows subscribers to access a wireless network after they successfully log infrom a web browser.

UDID

Unique Device Identifier. UDID is used to identify an iOS device.

Page 317: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

UDP

User Datagram Protocol. UDP is a part of the TCP/IP family of protocols used for data transfer. UDP istypically used for streaming media. UDP is a stateless protocol, which means it does not acknowledge thatthe packets being sent have been received.

UDR

User Derivation Rule. UDR is a role assignment model used by the controllers running ArubaOS to assignroles and VLANs to the WLAN users based on MAC address, BSSID, DHCP-Option, encryption type, SSID,and the location of a user. For example, for an SSID with captive portal in the initial role, a UDR can beconfigured for scanners to provide a role based on their MAC OUI.

UHF

Ultra high frequency. UHF refers to radio frequencies between the range of 300 MHz and 3 GHz. UHF isalso known as the decimeter band as the wavelengths range from one meter to one decimeter.

UMTS

Universal Mobile Telecommunication System. UMTS is a third generation mobile cellular system fornetworks. See 3G.

UPnP

Universal Plug and Play. UPnp is a set of networking protocols that permits networked devices, such aspersonal computers, printers, Internet gateways, Wi-Fi APs, and mobile devices to seamlessly discover eachother's presence on the network and establish functional network services for data sharing,communications, and entertainment.

URI

Uniform Resource Identifier. URI identifies the name and the location of a resource in a uniform format.

URL

Uniform Resource Locator. URL is a global address used for locating web resources on the Internet.

USB

Universal Serial Bus. USB is a connection standard that offers a common interface for communicationbetween the external devices and a computer. USB is the most common port used in the client devices.

UTC

Coordinated Universal Time. UTC is the primary time standard by which the world regulates clocks andtime.

UWB

Ultra-Wideband. UWB is a wireless technology for transmitting large amounts of digital data over a widespectrum of frequency bands with very low power for a short distance.

VA

Virtual Appliance. VA is a pre-configured virtual machine image, ready to run on a hypervisor.

Aruba Central | User Guide Glossary of Terms | 317

Page 318: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

318 | Glossary of Terms Aruba Central | User Guide

VBR

Virtual Beacon Report. VBR displays a report with the MAC address details and RSSI information of an AP.

VHT

Very High Throughput. IEEE 802.11ac is an emerging VHT WLAN standard that could achieve physical datarates of close to 7 Gbps for the 5 GHz band.

VIA

Virtual Intranet Access. VIA provides secure remote network connectivity for Android, Apple iOS, Mac OS X,and Windows mobile devices and laptops. It automatically scans and selects the best secure connection tothe corporate network.

VLAN

Virtual Local Area Network. In computer networking, a single Layer 2 network may be partitioned to createmultiple distinct broadcast domains, which are mutually isolated so that packets can only pass betweenthem through one or more routers; such a domain is referred to as a Virtual Local Area Network, VirtualLAN, or VLAN.

VM

Virtual Machine. A VM is an emulation of a computer system. VMs are based on computer architectures andprovide functionality of a physical computer.

VoIP

Voice over IP. VoIP allows transmission of voice and multimedia content over an IP network.

VoWLAN

Voice over WLAN. VoWLAN is a method of routing telephone calls for mobile users over the Internet usingthe technology specified in IEEE 802.11b. Routing mobile calls over the Internet makes them free, or atleast much less expensive than they would be otherwise.

VPN

Virtual Private Network. VPN enables secure access to a corporate network when located remotely. Itenables a computer to send and receive data across shared or public networks as if it were directlyconnected to the private network, while benefiting from the functionality, security, and managementpolicies of the private network. This is done by establishing a virtual point-to-point connection through theuse of dedicated connections, encryption, or a combination of the two.

VSA

Vendor-Specific Attribute. VSA is a method for communicating vendor-specific information between NASsand RADIUS servers.

VTP

VLAN Trunking Protocol. VTP is a Cisco proprietary protocol for propagating VLANs on a LAN.

W-CDMA

Wideband Code-Division Multiple Access. W-CDMA is a third-generation (3G) mobile wireless technologythat promises much higher data speeds to mobile and portable wireless devices.

Page 319: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

walled garden

Walled garden is a feature that allows blocking of unauthorized users from accessing network resources.

WAN

Wide Area Network. WAN is a telecommunications network or computer network that extends over a largegeographical distance.

WASP

Wireless Application Service Provider. WASP provides a web-based access to applications and services thatwould otherwise have to be stored locally and makes it possible for customers to access the service from avariety of wireless devices, such as a smartphone or Personal Digital Assistant (PDA).

WAX

Wireless abstract XML. WAX is an abstract markup language and a set of tools that is designed to helpwireless application development as well as portability. Its tags perform at a higher level of abstraction thanthat of other wireless markup languages such as HTML, HDML, WML, XSL, and more.

web service

Web services allow businesses to share and process data programmatically. Developers who want toprovide integrated applications can use the API to programmatically perform actions that would otherwiserequire manual operation of the user interface.

WEP

Wired Equivalent Privacy. WEP is a security protocol that is specified in 802.11b and is designed to provide aWLAN with a level of security and privacy comparable to what is usually expected of a wired LAN.

WFA

Wi-Fi Alliance. WFA is a non-profit organization that promotes Wi-Fi technology and certifies Wi-Fi productsif they conform to certain standards of interoperability.

Wi-Fi

Wi-Fi is a technology that allows electronic devices to connect to a WLAN network, mainly using the 2.4 GHzand 5 GHz radio bands. Wi-Fi can apply to products that use any 802.11 standard.

WIDS

Wireless Intrusion Detection System. WIDS is an application that detects the attacks on a wireless networkor wireless system.

WiMAX

Worldwide Interoperability for Microwave Access. WiMAX refers to the implementation of IEEE 802.16family of wireless networks standards set by the WiMAX forum.

WIP

Wireless Intrusion Protection. The WIP module provides wired and wireless AP detection, classification, andcontainment. It detects Denial of Service (DoS) and impersonation attacks, and prevents client and networkintrusions.

Aruba Central | User Guide Glossary of Terms | 319

Page 320: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

320 | Glossary of Terms Aruba Central | User Guide

WIPS

Wireless Intrusion Prevention System. WIPS is a dedicated security device or integrated software applicationthat monitors the radio spectrum of WLAN network for rogue APs and other wireless threats.

WISP

Wireless Internet Service Provider. WISP allows subscribers to connect to a server at designated hotspotsusing a wireless connection such as Wi-Fi. This type of ISP offers broadband service and allows subscribercomputers called stations, to access the Internet and the web from anywhere within the zone of coverageprovided by the server antenna, usually a region with a radius of several kilometers.

WISPr

Wireless Internet Service Provider Roaming. The WISPr framework enables the client devices to roambetween the wireless hotspots using different ISPs.

WLAN

Wireless Local Area Network. WLAN is a 802.11 standards-based LAN that the users access through awireless connection.

WME

Wireless Multimedia Extension. WME is a Wi-Fi Alliance interoperability certification, based on the IEEE802.11e standard. It provides basic QoS features to IEEE 802.11 networks. WMM prioritizes trafficaccording to four ACs: voice (AC_VO), video (AC_VI), best effort (AC_BE) and background (AC_BK). See WMM.

WMI

Windows Management Instrumentation. WMI consists of a set of extensions to the Windows Driver Modelthat provides an operating system interface through which instrumented components provide informationand notification.

WMM

Wi-Fi Multimedia. WMM is also known as WME. It refers to a Wi-Fi Alliance interoperability certification,based on the IEEE 802.11e standard. It provides basic QoS features to IEEE 802.11 networks. WMMprioritizes traffic according to four ACs: voice (AC_VO), video (AC_VI), best effort (AC_BE), and background(AC_BK).

WPA

Wi-Fi Protected Access. WPA is an interoperable wireless security specification subset of the IEEE 802.11standard. This standard provides authentication capabilities and uses TKIP for data encryption.

WPA2

Wi-Fi Protected Access 2. WPA2 is a certification program maintained by IEEE that oversees standards forsecurity over wireless networks. WPA2 supports IEEE 802.1X/EAP authentication or PSK technology, butincludes advanced encryption mechanism using CCMP that is referred to as AES.

WSDL

Web Service Description Language. WSDL is an XML-based interface definition language used to describethe functionality provided by a web service.

Page 321: Aruba Central User Guide · Contents Contents 3 AboutthisGuide 16 IntendedAudience 16 RelatedDocuments 16 Conventions 16 ContactingSupport 17 AboutArubaCentral 18 KeyFeatures 18

WSP

Wireless Service Provider. The service provider company that offers transmission services to users ofwireless devices through Radio Frequency (RF) signals rather than through end-to-end wire communication.

X.509

X.509 is a standard for a public key infrastructure for managing digital certificates and public-keyencryption. It is an essential part of the Transport Layer Security protocol used to secure web and emailcommunication.

XAuth

Extended Authentication. XAuth provides a mechanism for requesting individual authenticationinformation from the user, and a local user database or an external authentication server. It provides amethod for storing the authentication information centrally in the local network.

XML

Extensible Markup Language. XML is a markup language that defines a set of rules for encoding documentsin a format that is both human-readable and machine-readable.

XML-RPC

XML Remote Procedure Call. XML-RPC is a protocol that uses XML to encode its calls and HTTP as atransport mechanism. Developers who want to provide integrated applications can use the API toprogrammatically perform actions that would otherwise require manual operation of the user interface.

ZTP

Zero Touch Provisioning. ZTP is a device provisioning mechanism that allows automatic and quickprovisioning of devices with a minimal or at times no manual intervention.

Aruba Central | User Guide Glossary of Terms | 321