Aruba_Instant_VRD_2016

advertisement
Aruba Instant Validated
Reference Design
Version 1.0.1
Authors:
Vishal Mann
Sathya Narayana Gopal
Aruba Instant Validated Reference Design
Contributors:
Yan Liu
Naveen Manjunath
|1
Copyright
© Copyright 2016 Hewlett Packard Enterprise Development LP
Open Source Code
This product includes code licensed under the GNU General Public License, the GNU Lesser General Public
License, and/or certain other open source licenses. A complete machine-readable copy of the source code
corresponding to such code is available upon request. This offer is valid to anyone in receipt of this information and
shall expire three years following the date of the final distribution of this product version by Hewlett-Packard
Company. To obtain such source code, send a check or money order in the amount of US $10.00 to:
Hewlett-Packard Company
Attn: General Counsel
3000 Hanover Street
Palo Alto, CA 94304
USA
Please specify the product and version for which you are requesting source code. You may also request a copy of
this source code free of charge at dl-gplquery@arubanetworks.com.
Aruba Instant Validated Reference Design
|2
Contents
About this Guide
9
Intended Audience
9
Scope
9
Related Documents
9
Conventions
9
Introduction to Aruba Instant
11
11
Introduction
11
Aruba Instant
12
Aruba Instant Architecture
12
Management Plane
12
Control Plane
12
Data Plane
13
Virtual Controller
13
Preferred Master
13
Cluster mechanics
14
Virtual Controller IP Address
14
Role of a Virtual Controller
14
Management plane functions of a virtual controller:
14
Instant communications
15
Intra cluster communication
16
Inter cluster communication
17
IAP & AirWave
17
IAP & RADIUS server
17
IAP & XML API
18
IAP & Activate/Provisioning server
18
IAP & VPN end point
18
IAP & Web CC lookup
18
IAP & SNMP/syslog communication
18
Instant Access Points Portfolio
19
How Instant Solution fits into needs of various Enterprises
22
Aruba Instant Solution for Small and Medium Enterprises
22
Aruba Instant Solution for Distributed Enterprises
25
Aruba Instant Solution for Hybrid Deployments
27
Designing Enterprise Networks with Aruba Instant
28
Aruba Instant Solution Basic Concepts
28
VLANs in an Aruba Instant Cluster
28
Client IP assignment with the “Virtual Controller assigned” option
29
Client IP assignment with the “Network assigned” option
30
Aruba Instant Validated Reference Design
|3
Traffic Flows in an Aruba Instant Cluster
31
AP Traffic
31
Client Traffic
31
Dynamic RADIUS Proxy
32
Layer 3 Mobility
33
Physical and Logical Design
33
Wired Infrastructure Design
Recommendations for an Uplink Management VLAN
35
Uplink Management VLAN
35
Client VLAN Design
35
Cluster Design
36
Cluster Design for Single-Building Layout
36
Cluster Design for a Multi-Building Layout within a Contiguous RF Domain
37
Cluster Design for a Multi-Building Layout with a Non-Continuous RF Domain
37
Cluster Design for a K-12 School District
37
Cluster Security Recommendations
38
RF Design
39
Radio Modes on Aruba Instant
40
Scanning of IAPs
40
AP Scanning (Access Mode)
41
AM Scanning (Monitoring Mode)
41
Spectrum Monitoring (Spectrum Monitor mode)
42
Adaptive Radio Management
42
Additional RF Optimization Features
44
Client Match
47
Recommended IAP Settings
48
QoS Design
50
End-to-End QoS
50
QoS on the WLAN
51
QoS on the LAN Edge and Core
51
Aruba QoS Features
51
Stateful Firewall
51
Media Classification
52
Bandwidth Management
52
Application Bandwidth Management
52
User and Network Bandwidth Management
53
Dynamic Multicast Optimization (DMO)
57
ARP Broadcast Filter
58
Design for Plug-and-Play Services
59
Challenges with Multicast DNS
59
The AirGroup Solution
60
AirGroup Capabilities Supported by Aruba Instant
60
AirGroup Solution Architecture
61
AirGroup in a Single IAP Cluster
4|
34
61
Aruba Instant Validated Reference Design
AirGroup in a Single IAP Cluster with ClearPass Policy Manager
61
AirGroup in Multiple IAP Clusters
62
AirGroup Recommendations
64
Configuring AirGroup
65
Enabling AirGroup
65
Filtering Services Based on User Role
66
Filtering Services Based on VLANs
67
Creating a “Personalized” WLAN: Registering Personal and Shared Devices on ClearPass
69
Extending an AirGroup across Instant Clusters
71
Content Filtering using Open DNS
73
Security Design
75
Authentication and Encryption
75
Authentication and Encryption for an Employee SSID
75
Authentication Methods
75
Authentication Recommendations
76
Encryption Levels
77
Encryption Recommendations
78
Authentication and Encryption for a Guest SSID
78
Authentication Methods
78
Authentication Recommendations
79
Encryption Levels
79
Encryption Recommendations
79
Wireless Intrusion Detection and Prevention
Intrusion Detection System (IDS)
80
80
IDS Dashboard
80
IDS Wizard
81
Aruba IDS Recommendations
Intrusion Prevention System (IPS)
81
82
IPS Wizard
82
Aruba IPS Recommendations
83
Designing Distributed Enterprise Networks with Aruba Instant
Branch Office Deployments
84
84
Single AP Branch
85
Multi AP Branch
85
Hierarchical Mode Design
86
Flat Mode Design
87
MPLS-Based Branch Deployments with Aruba Instant
Use Case 1: Wireless Employee Access and Guest Access
88
89
Use Case 2: Wireless Employee Access and Guest Access with the Ability to Tunnel the Guest Traffic to
a Central DMZ
89
VPN-Based Branch Deployments with Aruba Instant
91
Understanding Instant-VPN (Aruba Instant-VPN in a Nutshell)
92
Licensing
92
WLAN Controller Scalability for Instant-VPN deployments
93
Aruba Instant Validated Reference Design
|5
AP Selection for Instant-VPN Deployments
94
Firewall Ports
94
Understanding Instant-VPN Modes
94
Instant-VPN: Local Mode
97
Instant-VPN: Centralized L2 Mode
98
Instant-VPN: Distributed L3 Mode
100
Branch-ID Allocation Algorithm
102
BID Allocation Process Details
102
MAX-BID Calculation Examples
104
Traffic Flow and Uplink Switch Requirements for a Multi-AP Aruba Instant-VPN Network
105
802.1X and RFC 3576 Handling in an Aruba Instant-VPN Network
106
DNS Handling in an Aruba Instant-VPN Network
107
Control Traffic between an Aruba Instant-VPN Branch and the WLAN Controller
108
Redundancy Design for Aruba Instant-VPN Deployments
109
Single Data Center Deployment with Redundancy
110
Multiple Data Center Redundancy (Geographical Redundancy)
110
Designing Instant-VPN Deployments
111
Single-AP Branch with a Single Data Center
112
IAP Setup (Single-AP Branch with a Single Data Center)
113
Data Center Configuration (Single-AP Branch with a Single Data Center)
114
Single-AP Deployment with Multiple Data Centers
115
IAP Setup (Single-AP Branch with Multiple Data Centers)
116
Data Center Configuration (Single-AP Branch with Multiple Data Centers)
118
Multi-AP Deployment with Single Data Center
118
IAP Setup (multi-AP Deployment with a Single Data Center)
120
Data Center Configuration (Multi-AP Deployment with a Single Data Center)
122
Uplink Switch Setup (Multi-AP Deployment with a Single Data Center)
122
Multi-AP Deployment with Multiple Data Centers
IAP Setup (multi-AP Deployment with Multiple Data Centers)
124
Data Center Configuration (Multi-AP Deployment with Multiple Data Centers)
126
Uplink Switch Setup (Multi-AP Deployment with Multiple Data Centers)
126
Designing Home Office Deployments with Aruba Instant
127
Configuring the WLAN Controller for Instant-VPN Deployment
127
Defining the VPN Pool on a WLAN Controller
128
Adding IAPs to RAP Whitelist
130
Configuring VLANs for Layer 2 Modes
131
Configuring OSPF Route Redistribution of Layer 3 Branch Routes
131
Configuring the Controller to Perform Source NATing for 802.1X and RADIUS Traffic from Branches
132
Configuring an IAP for Instant-VPN Deployment
136
Defining the VPN Host Settings
136
Configuring a Routing Profile
138
Controller Redundancy Example 1
139
Controller Redundancy Example 2
139
Configuring DHCP Profiles for Instant-VPN Modes
6|
122
141
Aruba Instant Validated Reference Design
DHCP Profile for Local Mode
142
DHCP Profile for Centralized L2 Mode
144
Network Tab
145
Branch Size Tab
147
Static IP Tab
148
Configuring an SSID or Wired Port for Instant-VPN
149
Enabling Dynamic RADIUS Proxy (DRP)
150
Configuring Enterprise Domains (Split-DNS)
151
Aruba Instant management using Aruba AirWave
152
Communication Concepts
152
Adding IAPs to AirWave
153
Manually Adding an IAP through the VC WebUI
153
Provisioning an IAP through Aruba Activate
154
Add Devices in Activate
154
Create Folders in Activate
155
Create provisioning rules in Activate
156
Assign Devices to Folders in Activate
158
Provisioning an IAP through DHCP Options
160
AirWave prerequisites
162
AirWave whitelist
163
Adding devices to the whitelist
163
Manually on AMP GUI
164
Import through Activate
164
In bulk through CSV file
165
AirWave in DMZ
165
Organization String
167
Setting up Groups, Folders and Roles in AirWave
167
Groups
168
Folders
168
Roles
169
Managing Device Firmware with AirWave
170
Setting up AirWave to Automatically Update Firmware on New Devices
170
Bulk Upgrades of IAPs
171
Monitoring Firmware Upgrade Jobs
172
Managing Device Configurations with AirWave
173
AirWave use cases
175
AirWave for the Distributed Enterprise
175
AirWave for the Small and Medium Enterprise
176
AirWave for a Home Office
178
Network Visibility using AppRF on Aruba Instant
AppRF on Instant Access Points
Introduction
179
179
179
DPI
180
Web Content Filtering
181
Aruba Instant Validated Reference Design
|7
Categories
181
Reputation
181
Configuration
184
Enforcement through policies
184
Visibility in UI
185
Per AP view
185
Per client view
186
Per SSID view
186
App RF tab details
186
Troubleshooting
Show commands
188
Traces
189
Appendix
191
Performance impact due to DPI
191
Custom error page
191
Websites dependency on web category
193
Terminology
8|
188
196
Acronyms and Abbreviations
196
Glossary
197
Aruba Instant Validated Reference Design
Chapter 1
About this Guide
The Aruba Validated Reference Design (VRD) series is a collection of technology deployment guides that include
descriptions of Aruba technology, recommendations for product selections, network design decisions, configuration
procedures, and best practices for deployment. Together these guides comprise a reference model for understanding
Aruba technology and designs for common customer deployment scenarios. Each Aruba VRD network design has
been constructed in a lab environment and thoroughly tested by Aruba engineers. Our customers use these proven
designs to rapidly deploy Aruba solutions in production with the assurance that they will perform and scale as
expected.
This VRD describes Aruba Instant, the easiest way to get enterprise-grade Wi-Fi up and running. Aruba Instant,
delivers a controller-less Wi-Fi solution that is easy to set-up, and loaded with security and smarts needed to
accelerate your business without breaking your budget.This guide provides an overview of Aruba Instant solution,
and describes the different use cases and deployments, as well as configurations and recommendations.
Intended Audience
This guide is intended for administrators who are responsible for deploying and configuring Aruba Instant devices in
customer premises.
Scope
This is a base design guide for Aruba Instant, and hence will not cover the fundamental wireless concepts. Readers
should have a good understanding of wireless concepts and the Aruba technology.
Related Documents
In addition to this document, the IAP product documentation includes the following:
l
Aruba Instant User Guide
l
Aruba Instant CLI Reference Guide
Conventions
The following conventions are used throughout this manual to emphasize important concepts:
Aruba Instant Validated Reference Design
About this Guide | 9
Table 1: Typographical Conventions
Style Type
Description
Italics
This style is used to emphasize important terms and to mark the titles of books.
System items
This fixed-width font depicts the following:
l
Sample screen output
l
System prompts
l
Filenames, software devices, and specific commands when mentioned in the text.
Commands
In the command examples, this style depicts the keywords that must be typed exactly as
shown.
<Arguments>
In the command examples, italicized text within angle brackets represents items that you
should replace with information appropriate to your specific situation. For example:
# send <text message>
In this example, you would type “send” at the system prompt exactly as shown, followed by
the text of the message you wish to send. Do not type the angle brackets.
[Optional]
Command examples enclosed in brackets are optional. Do not type the brackets.
{Item A |
Item B}
In the command examples, items within curled braces and separated by a vertical bar
represent the available choices. Enter only one choice. Do not type the braces or bars.
The following informational icons are used throughout this guide:
Indicates helpful suggestions, pertinent information, and important things to remember.
Indicates a risk of damage to your hardware or loss of data.
Indicates a risk of personal injury or death.
10 | About this Guide
Aruba Instant Validated Reference Design
Chapter 2
Introduction to Aruba Instant
This VRD provides details about the Aruba Instant solution. Table 1 Software Versions lists the software version for
this guide.
Figure 1 Table 1 Software Versions
Product
Version
ArubaOS (Mobility Controller)
6.4
Aruba InstantOS
4.2
Introduction
During the early days of Wi-Fi, wireless networks were designed to be convenience networks and they were not
mission-critical. It was very common even for a large organization to deploy just a few APs in areas such as lobbies,
cafes, and CTO offices. This deployment allowed network administrators to build wireless networks using fat APs
(also known as autonomous APs) because performance, quality of service (QoS), mobility scalability, and
manageability were not critical. To deploy fat APs, the IT staff had to manually configure each and every AP that
was deployed. However, as wireless technology progressed and as organizations discovered the advantages of
wireless networks, the scale of wireless deployment grew. As deployment sizes grew, scalability and manageability
became major issues with the fat AP technology. This demand led to the evolution of controller-based WLANs with
thin APs.
In controller-based WLAN technology with thin APs, the management and control plane functions are centralized at
the controller and the data plane is either centralized or switched locally at the APs, based on the mode of operation.
Controller-based WLANs allow WLANs to scale to thousands of APs and provide a single point of management and
configuration for the entire network. The development of controller-based WLAN technology greatly helped in the
adoption of wireless networks. The controller-based solution could be deployed easily as overlay architecture
without any overhaul to the existing wired network. Today, WLAN-based controller networks are, in fact, the
architecture that is used in these environments:
l
Government, department of defense, and other security conscious organizations that require central encryption
and decryption of wireless data
l
Large campuses such as university and enterprises, which scale to thousands of APs at a single location
l
Organizations with large Layer 2 domains that do not want a major overhaul, such as adding and deleting VLANs,
to their edge network
The Aruba controller-based architecture includes the ArubaOS™, Aruba controllers, and Aruba APs.
In the past few years, the advancements in AP hardware technology (such as chipsets and memory) have opened
up the possibility of a distributed WLAN system. Modern APs allow wireless vendors to distribute the management,
control, and data paths amongst APs without the need for a physical controller. This architecture is suitable for small
and medium-sized WLAN deployments and distributed enterprises that do not require the additional benefits of a
controller-based architecture but still require a feature-rich, enterprise-grade solution that can be managed from a
single interface. The Aruba answer to the controller-less architecture is Aruba InstantOS™ and Aruba Instant™ APs
(IAPs).
Aruba Instant Validated Reference Design
Introduction to Aruba Instant | 11
Aruba understands that the WLAN requirements of organizations vary and that the choice between a controller-less
and controller-based architecture depends on the type of organization and their WLAN requirements. Aruba is the
only WLAN vendor to offer the flexibility of both controller-less and controller-based architecture with no architecture
lock-in. Aruba also recognizes that, as organizations grown in size, they might want to move from a controller-less to
a controller-based architecture. In that respect, Aruba provides investment protection: if the requirements of your
organization change, you can convert Aruba IAPs to controller-based mode, which allows them to function with
ArubaOS controllers.
Aruba Instant
Providing wireless connectivity at remote sites has been a challenge for organizations with distributed locations,
such as retail chains and K-12 school districts. These organizations need robust WLAN functionality, including voice
and video optimization, high reliability, and strong security. They also need a solution that is affordable both to buy
and to operate in a distributed environment. The solution must be able to be deployed rapidly, and configured and
managed centrally. In addition to these requirements, certain organizations, like hotel operators, restaurant owners,
retailers, and other distributed enterprises, must comply with data privacy regulations such as the Payment Card
Industry (PCI), Data Security Standard, and HIPAA for healthcare. In general, these organizations need a featurerich, enterprise-grade WLAN that can be deployed rapidly at geographically-dispersed locations that have limited or
no on-site IT resources.
The Aruba Instant architecture is designed to address these situations. Aruba Instant combines enterprise-grade
WLAN performance, security, and scalability with industry-leading ease-of-use and affordability. With Aruba Instant,
the entire deployment process is automated, including zero-touch provisioning, firmware upgrades, and inventory
management. You can deploy thousands of Aruba IAPs cost-effectively anywhere in the world with unprecedented
speed and ease.
Aruba Instant Architecture
Aruba Instant consists of a family of high-performance controller-less Instant Access Points (IAPs) that run the
Aruba InstantOS to provide a distributed WLAN system. In an Instant deployment, all IAPs on the same Layer 2
domain form a cluster with one dynamically-elected AP that functions as the master. The master AP assumes the
role of virtual controller (VC) within a cluster. Aruba Instant is a distributed WLAN system with a completely
distributed control and data plane. However, certain network functions, such as monitoring, firmware management,
and source Network Address Translation (NAT) require a central entity within a cluster. The VC within a cluster
functions as this central entity. In an Aruba Instant cluster, if the master fails, another AP is elected as the master
and assumes the role of VC.
In general, you can divide the functions of a WLAN system into three planes: the management plane, control plane,
and data plane. Each Aruba Instant cluster handles the management, control, and data plane functions as described
in the following sections.
Management Plane
Aruba Instant has a centralized management plane. At a cluster level, the self-elected VC functions as the single
point of configuration for an IAP cluster. The graphical user interface (GUI) to the VC provides local configuration and
monitoring of an IAP cluster. Centralized configuration and management for multi-cluster networks are available
using AirWave® or Aruba Central™ (public cloud).
Control Plane
The control plane in an Aruba Instant cluster is completely distributed and handled by the individual IAPs. The
distributed control plane functions include:
l
Adaptive Radio Management (ARM)
l
Auto Channel/Power assignment
12 | Introduction to Aruba Instant
Aruba Instant Validated Reference Design
l
Intrusion detection system (IDS)/ intrusion prevention system (IPS)
l
Client handover
l
Deep Packet Inspection
The VC is not responsible for any of these functions. For example, the client database is entirely maintained in the
AP to which the client is connected. When a client roams, the new AP determines the last associated AP for the
client and requests all client information from that AP. The other IAPs send updates to the VC IAP periodically, only
for management plane reporting.
Data Plane
The data plane in an Aruba Instant cluster is also fully distributed, with a few exceptions. Each individual IAP
handles the traffic for the clients that are associated to that IAP. Firewall policies and bandwidth control are also
applied on a per-IAP basis. The flow of user traffic is not centralized to the VC. An exception to this rule is a magic
VLAN (also known as a VC-assigned VLAN). On an SSID that uses a magic VLAN for its clients, all IAPs forward
the traffic on that SSID to the VC, which performs NAT for the traffic. This process allows Layer 2 mobility for the
VC-assigned VLAN. Similarly, any traffic that must be source NATed by the Aruba Instant cluster also flows through
the VC. It is common to source NAT user traffic in remote deployments that have split-tunnel or bridging
requirements. For more information on the traffic flow in an Aruba Instant cluster, see Traffic Flows in an Aruba
Instant Cluster.
Virtual Controller
Aruba IAPs on the same Layer 2 domain form a cluster by electing one AP as the master AP, which functions as the
virtual controller (VC). The master election is based on a master election protocol. The election process to select a
master AP/VC is simple; the first IAP that comes online on the network is elected as the master AP/VC. If a master
AP/VC fails, a new AP is reelected as the master AP of the cluster. The master-reelection algorithm uses these
conditions during a VC failover:
1. An IAP with an alternative uplink (3G or 4G only) receives preference.
2. If an IAP with an alternative uplink is not available, an IAP with the more capable hardware/a newer model
receives preference in the following descending order:
[IAP225 & all the other newer models] > [IAP134/5 = RAP155] > [IAP104/5 = IAP175 = RAP108/9 = RAP3]
This rule is being used to distinguish only between older models & newer models.
3. If both of the previous considerations are not applicable, an IAP with the longest uptime receives preference.
In an Aruba Instant cluster, the master AP/VC failover time varies from 13 seconds to 100 seconds because the VC
election algorithm also takes the CPU load on the IAPs in the network into account.
The criteria for new VC election are used only in case of a VC failover for a new VC election. There is no preemption
if a new IAP is plugged into an existing network and meets any of the above-mentioned criteria.
Preferred Master
The master election and re-election process is the default behavior for IAP clusters. In addition to the default master
election algorithm, Aruba InstantOS 4.0 lets you manually assign the master AP role. Manual assignment works well
in an environment that requires a specific AP with a lower load, an AP with more capable hardware, or an AP with an
alternate uplink to always function as the master. The AP that you manually select as the master is known as the
preferred master. As long as the preferred master is online, it is the cluster master. If the preferred master goes down
because of an uplink failure, the default reelection algorithm elects a new AP as the master. When the preferred
master comes back online, it becomes the cluster master again, and the AP that was automatically elected as the
master through the reelection algorithm reboots to rejoin the cluster as a regular member AP.
Aruba Instant Validated Reference Design
Introduction to Aruba Instant | 13
Cluster mechanics
A preferred master will never lose its configuration or become a slave AP of another master, unless it is on factory
default configuration. It will either take over as master or become a single-AP cluster by itself. An existing AP that is
not a ‘preferred master’ can be pre-empted by a preferred master.
An IAP x, if connected to an active cluster (with an already elected master IAP y):
l
IAP x will have its configuration replaced by the master’s configuration, if the IAP x does not have ‘preferred
master’ enabled.
l
If IAP x, has preferred master enabled, then it will check if the existing cluster’s master AP y, has ‘preferred
master’ enabled or not.
l
If the existing cluster’s master IAP y, does not have ‘preferred master’ set, the new IAP x will take over as the
new master of the cluster & its configuration will be propagated.
l
If the existing cluster’s master IAP y, also has ‘preferred master’ set, then the new IAP x will come up as a singleIAP cluster by itself, if IAP x has a non-default configuration.
l
If the existing cluster’s master IAP y, also has ‘preferred master’ set, then the new IAP x will join the cluster as
slave, if IAP x has factory default configuration. IAP x will download the configuration of IAP y.
Virtual Controller IP Address
Like any other networking device, every AP in an Aruba Instant cluster has its own physical IP address. When an
IAP is connected to a Layer 2 network, the IAP uses a DHCP service to receive an IP address on the default VLAN
of the uplink port. You can also statically assign a physical IP address to individual APs. For information about
assigning IP addresses statically to an IAP, see the Aruba Instant User Guide that is available at the Aruba support
website. Aruba recommends the use of DHCP services to assign IP addresses to APs because it simplifies AP
deployment.
The master AP of the cluster assumes the role of the virtual controller. Every AP in an Aruba Instant cluster,
including the master AP, has its own physical IP address. In addition to the physical IP addresses of APs, an Aruba
Instant cluster also can be assigned a static IP address, known, for management purposes, as the VC IP address.
The VC IP address is a floating IP address (that is, a virtual IP address) that is used by an IAP if it is elected as the
master AP. The VC IP address is different from the physical IP address of the master AP. If an IAP is elected as the
master AP of a cluster, it takes ownership of the VC IP address. The master AP assumes the VC IP address and
updates the ARP cache of the upstream network by sending three gratuitous ARP messages with the VC IP
address and Ethernet MAC address of its uplink port (enet0).
By default, any other traffic from the AP is sent untagged by the IAPs. Examples of this traffic are RADIUS,
Syslog, and SNMP traffic as well as DHCP discover and request messages that are used to obtain the IP address
of the AP. You can modify this behavior in certain environments by changing the setting of the Uplink Management
VLAN feature. Aruba recommends that you set the uplink management to its default value and change it only in
environments that absolutely require it. For more information, see Uplink Management VLAN.
Role of a Virtual Controller
If an AP is selected as the master and it assumes the virtual controller role, the master AP performs the VC function
in addition to all the regular functions that are also performed by the member APs in the cluster. These functions are
the VC functions of a master AP in an Aruba Instant cluster:
Management plane functions of a virtual controller:
l
Aruba Instant cluster configuration synching: In an IAP cluster, you only need to configure the master AP that
functions as the VC. All other APs in the cluster download their configuration from the master AP. Any
14 | Introduction to Aruba Instant
Aruba Instant Validated Reference Design
configuration change that is pushed from the management platform or configured over the GUI of the VC is
synchronized to the other APs in the cluster.
l
Aruba Instant cluster monitoring: In an IAP cluster, the VC assumes the monitoring role. All APs in the cluster
periodically update the VC with their status. The VC consolidates all of this monitoring data, presents the data on
its local WebUI, and pushes the data to management platforms, such as AirWave and Aruba Central.
l
Aruba Instant firmware image management: The VC handles the image management in an IAP cluster. The
VC ensures that all APs in the cluster are upgraded to the correct image version before rebooting the cluster.
l
Communication with management platforms: Management platforms, such as AirWave and Aruba Central,
communicate only with the VC of the cluster. The VC sends periodic updates of cluster monitoring data to the
management platforms. Management platforms also push cluster configuration changes to the VC, which, in
turn, updates the other APs in the cluster.
Control plane functions of a virtual controller:
l
Dynamic RADIUS proxy (DRP): In an Aruba Instant cluster, the initial client authentication is handled by the AP
to which the client is connecting to and not by the master AP. This means that you must add each AP in an Aruba
Instant as a NAS client on a RADIUS server. In certain environments, you might not want to add each AP as a
NAS client. DRP makes the VC the proxy for RADIUS exchanges. When you enable DRP, all APs in a cluster
forward RADIUS exchange messages to the VC, which acts as a RADIUS proxy. For more information, see
Dynamic RADIUS Proxy.
l
Handling Change of Authorization (CoA): The RADIUS protocol, which is defined in RFC 2865, does not
support unsolicited messages that are sent from a RADIUS server to a network access server (NAS). However,
in certain circumstances, session characteristics might need to be changed without requiring the NAS to initiate
the exchange. The extensions that are defined in RFC 3576 allow a RADIUS server to send unsolicited
disconnect or CoA messages to a NAS. In an Aruba Instant cluster, the RADIUS server sends RFC 3576compliant messages to the VC, which then performs the necessary action.
l
DHCP server for client VLANs: When you configure the Aruba Instant cluster as the DHCP server for a specific
client VLAN, the DHCP server functions are handled by the VC.
Data plane functions of a virtual controller:
l
Handling traffic for magic VLANs and VLANs that are local to the Aruba Instant cluster: When you set up
an SSID on an Aruba Instant network, client IP address assignment can be set to the VC-assigned option. (This
configuration is also referred to as a magic VLAN.) If you select this option, the client obtains its IP address from
the magic VLAN of the master AP (that is, the VC). A magic VLAN is a private subnet that is created on the
master AP for client IP address assignment. A magic VLAN differs from a traditional VLAN. The client traffic on a
magic VLAN is always source NATed by the master AP and the master AP functions as the DHCP server for
magic VLAN. For more information about client IP address assignment using the VC-assigned option, see Virtual
Controller-Assigned IP Addresses.
l
Handling traffic for VLANs that are local to the Aruba Instant cluster: The Aruba Instant cluster lets you
define VLANs such as local, centralized Layer 2, distributed Layer 2, centralized Layer 3, and distributed Layer 3
VLANs. (For more information, see Understanding Instant-VPN Modes and Configuring VLANs for Layer 2
Modes.) The DHCP definitions for these VLANs reside on the Aruba Instant cluster. The client traffic on these
VLANs flows through the VC of the cluster. For more information about the traffic flow for these VLANs, see
Traffic Flows in an Aruba Instant Cluster.
l
Handling traffic when source NATing is required: In an Aruba Instant network, the VC performs source
NATing of any client traffic that requires it.
Instant communications
The following are the major entities with which an IAP in cluster communicates:
Aruba Instant Validated Reference Design
Introduction to Aruba Instant | 15
l
Master and Slave APs – Intra cluster
l
Between Master APs in a cluster – Inter cluster
l
IAP and Airwave server
l
IAPs and Radius server
l
IAPs and XML API server
l
IAPs and Provisioning server
l
IAP and VPN end point
l
IAPs and External Web Content classification lookup servers
l
IAPs and Monitoring servers (Syslog/SNMP)
Intra cluster communication
There are two major types of communication between APs in a cluster:
l
L2 Broadcast messages for cluster maintenance and roaming
Master AP sends out a Layer 2 “beacon” message every second to notify that the master AP is currently active. This
helps in new APs discovering the master and join the cluster & existing APs detecting master failover and take over
as master of cluster.
There is also a session request message for Layer 2 roaming. When a client roams between APs in a cluster, a
session request message is used to transfer client session and role data between APs
Sample frame for L2 communication:
l
L3 unicast messages between IAPs (master and slave)
UDP messages on port 8211 between master and slave APs for config sync, firmware upgrade and control-plane
messaging between APs.
Sample frame for L3 unicast communication:
16 | Introduction to Aruba Instant
Aruba Instant Validated Reference Design
Inter cluster communication
With L3 mobility is enabled, the master APs of each cluster communicate with each other to enable roaming of
clients. Mobility messages use a UDP message on port 8211 between the two master APs of the cluster. Following
the initial exchange, the Foreign AP sets up a GRE tunnel with the Home AP.
IAP & AirWave
IAP & RADIUS server
Based on the Radius proxy configuration, either the individual AP or the master AP communicate with Radius
server.
Two specific radius communication messages are possible:
l
Radius authentication requests using a configurable UDP port
l
Radius accounting requests using a configurable UDP port
Aruba Instant Validated Reference Design
Introduction to Aruba Instant | 17
RADSEC is a special type of Radius communication whose primary use case is to interface with Cloud Guest
Server. However, it is also possible to use RADSEC with any servers using a configurable TCP port.
IAP & XML API
l
IAP supports XML API interface to authorize role changes
l
XML API server communicates with IAP using SSL – TCP port 443
l
The communication can be secured using a shared key or can use clear-text
l
The servers allowed to communicate can be controlled by using a list of server IPs/subnets which can authorize
a change using XML API interface
IAP & Activate/Provisioning server
l
IAP communicates with an Aruba owned provisioning server for provisioning, periodic reporting and firmware
checks
l
This uses DNS for resolution of server IP and all communication uses SSL (TCP port 443)
IAP & VPN end point
l
IAP supports VPN termination using either IPSec or GRE
l
GRE termination is supported with both Aruba and Non-Aruba devices supporting standard EoGRE
l
GRE using Aruba GRE uses UDP 4500 for secure control channel establishment with controller and uses GRE
with configurable GRE type for all data connection
l
GRE using Manual GRE uses GRE with configurable GRE type for all data connection
l
IPSec termination is supported using either Aruba controller with Certs or Standard VPN end points for PSK
l
IPSec with Aruba controller uses certs stored in secure TPM of AP for IKEv2 using NATT (UDP 4500)
l
IPSec with Third-party devices only supports PSK based IKEv2
IAP & Web CC lookup
l
AppRF service on IAP uses a third party lookup service.
l
The communication with that service involves DNS resolution to aruba.brightcloud.com and a HTTP lookup for
content classification
IAP & SNMP/syslog communication
l
IAP can be configured to use syslog server which uses UDP port 514 for communication
l
IAP uses UDP ports 161/162 for SNMP services (polling and sending traps)
18 | Introduction to Aruba Instant
Aruba Instant Validated Reference Design
Instant Access Points Portfolio
The Aruba AP product line includes the traditional controlled-based APs, Aruba Instant APs (IAPs), and remote APs
(RAPs). Aruba controller-based APs start with part number AP-xxx, the IAPs with part number IAP-xxx, and RAPs
with part number RAP-xxx. A controller-based AP that has the same model number (that is, the xxx in the part
number) as an Instant-based AP has the same hardware specifications. For example, the controller-based AP with
part number AP-135 has the same hardware specifications as the Instant-based AP with part number IAP-135. The
key difference with an IAP is that it ships with Aruba InstantOS and, if needed, can be converted to a controllerbased AP. All new RAP models also ship with Aruba InstantOS and, if needed, can be converted to controller-based
RAPs.
You cannot convert a controlled-based AP (for example, the AP-135) to an Instant-based AP.
Aruba Instant summarizes the different Aruba Instant AP models.
Table 2: Aruba Instant APs
Radius
RF
Band
(GHz)
802.11
modes
TxR:S
IAP325
2
2.4 & 5
a/b/g/n/ac
4x4:4
Internal Omni
downtilt - Ceiling
Mount
IAP324
2
2.4 & 5
a/b/g/n/ac
4x4:4
IAP225
2
2.4 & 5
a/b/g/n/ac
IAP224
2
2.4 & 5
IAP215
2
IAP214
2
IAP
Model
Ethernet
Ports
USB
Ports
PoE/ PoE+
(3af/3at) or
External
Adapter
2xGE
1
External Antennas Wall, Ceiling, and
Flat Surfaces Mount
PoE/ PoE+
(3af/3at) or
External
Adapter
2xGE
1
3x3:3
Internal Omni
downtilt - Ceiling
Mount
PoE/ PoE+
(3af/3at) or
External
Adapter
2xGE
1
a/b/g/n/ac
3x3:3
External Antennas Wall, Ceiling, and
Flat Surfaces Mount
PoE/ PoE+
(3af/3at) or
External
Adapter
2xGE
1
2.4 & 5
a/b/g/n/ac
3x3:3
Internal Omni
downtilt - Ceiling
Mount
PoE/ PoE+
(3af/3at) or
External
Adapter
2xGE
1
2.4 & 5
a/b/g/n/ac
3x3:3
External Antennas Wall, Ceiling, and
Flat Surfaces Mount
PoE/ PoE+
(3af/3at) or
External
Adapter
2xGE
1
Aruba Instant Validated Reference Design
Antenna and
Mounting Type
Power
Introduction to Aruba Instant | 19
Radius
RF
Band
(GHz)
802.11
modes
TxR:S
Antenna and
Mounting Type
IAP205H
2
2.4 & 5
a/b/g/n/ac
2x2:2
Internal Omni –
IAP205
2
2.4 & 5
a/b/g/n/ac
2x2:2
IAP204
2
2.4 & 5
a/b/g/n/ac
IAP103H
2
2.4 & 5
a/b/g/n
IAP103
2
2.4 & 5
a/b/g/n
2x2:2
IAP228
2
2.4 & 5
a/b/g/n/ac
3x3:3
IAP
Model
Ethernet
Ports
USB
Ports
PoE/ PoE+
(3af/3at) or
External
Adapter
1xGE +
3xGE
1
External Antennas Wall, Ceiling, and
Flat Surfaces Mount
PoE/ PoE+
(3af) or
External
Adapter
2xGE
1
2x2:2
External Antennas Wall, Ceiling, and
Flat Surfaces Mount
PoE/ PoE+
(3af) or
External
Adapter
2xGE
1
2x2:2
Internal Omni –
PoE/ PoE+
(3af) or
External
Adapter
1xGE +
2xFE
No
Internal Omni
downtilt - Ceiling
Mount
PoE/ PoE+
(3af) or
External
Adapter
1xGE
No
External Antennas -
PoE+ (3at)
or External
Power
2xGE
No
PoE+ (3at)
or External
Power
2xGE
No
PoE+ (3at)
or External
Power
2xGE
No
PoE+ (3at)
or External
Power
2xGE
No
External
Power
5xGE
Yes
Desktop & Wall
mount
Wall mount
6xRP-SMA type
connectors
Power
(3 per radio)
IAP274
2
2.4 & 5
a/b/g/n/ac
3x3:3
External Antennas 6xN type
connectors
(3 per radio)
IAP275
2
IAP277
2
RAP155P
2
2.4 & 5
a/b/g/n/ac
3x3:3
Internal Omni –
5dBi
2.4 & 5
a/b/g/n/ac
3x3:3
Internal Omni –
6.5dBi
20 | Introduction to Aruba Instant
2.4 & 5
a/b/g/n
2x2:2
Internal Omni –
Aruba Instant Validated Reference Design
IAP
Model
Radius
RF
Band
(GHz)
802.11
modes
TxR:S
(2.4GHz)
3x3:3
(5GHz)
Antenna and
Mounting Type
Desktop mount
Power
54 VDC
power
interface.
Ethernet
Ports
USB
Ports
802.3af on
E1 & E2.
uplink
OR
802.3at on
E1 or E2.
RAP155
RAP3WNP
2
1
2.4 & 5
2.4
a/b/g/n
b/g/n
2x2:2
(2.4GHz)
3x3:3
(5GHz)
Internal Omni –
2x2:2
(2.4GHz)
Internal Omni –
AC input:
3xFE
Yes
Desktop mount
100-240
volts
AC/0.75 A
802.3af PoE
(15.4 watts)
on the E2
port.
uplink
3xFE
Yes
Desktop mount
External
Power
5xGE
Yes
uplink
12 VDC
power
interface.
DC output:
48 volts
DC/0.75 A
RAP3WN
1
2.4
b/g/n
2x2:2
(2.4GHz)
Internal Omni –
AC input:
Desktop mount
100-240
volts AC/0.5
A
Uplink
DC output:
12 volts
DC/1.5 A
RAP109
2
2.4 & 5
a/b/g/n
2x2:2
Internal Omni and
Desktop & Wall
Mount
PoE or
External
adapter
2
1
RAP108
2
2.4 & 5
a/b/g/n
2x2:2
External Antennas
and Desktop & Wall
and Flat Surfaces
Mount
PoE or
External
adapter
2
1
To prevent inconsistent client connections, Aruba recommends that you do not enable band steering when you
combine single and dual-radio APs in the same area. Dual-radio APs and single radio air monitors (AMs) can be
used in the same area.
Aruba Instant Validated Reference Design
Introduction to Aruba Instant | 21
How Instant Solution fits into needs of various Enterprises
Aruba Instant Solution for Small and Medium Enterprises
An organization with a workforce that ranges from a hundred to a few thousand users is often categorized as a small
or medium enterprise. Although the density of users and devices in these organizations is not as concentrated as in
large enterprises, the demand for a high-performing WLAN is the same as in a large enterprise. Like IT teams of large
enterprise, the IT teams in small or medium enterprises must provide a high performance WLAN that can support the
continuing growth in mobile devices, including bring your own devices (BYODs). Unlike large enterprises, small and medium enterprise are often faced with the challenge of limited IT staff with little
or no expertise in deploying secure WLAN systems. So, the key requirement of small and medium enterprises is an
enterprise-grade WLAN solution that is easy to deploy and maintain. The secure and scalable Aruba Instant solution
with its enterprise-grade features and ease of deployment and management is an ideal choice for these small and
medium enterprises.
The design of an Aruba Instant network for a small or medium enterprise depends on the size and physical layout of
the organization. From a physical layout perspective, most small enterprises are single building campuses that host
a few hundred users. These small enterprises can usually be covered by a single Aruba Instant cluster.
Medium enterprises usually consist of a collection of buildings that are interconnected by dark fiber within the same
geography. The buildings of a medium enterprise are typically within a contiguous RF domain and can be deployed
as a single Aruba Instant cluster or as multiple Aruba Instant clusters, depending on the physical layout, size, and
device density.
Diagram of an Aruba Instant design for a medium enterprise and Aruba Instant show an overview of an Aruba Instant
design for a small and medium enterprise.
Figure 2 Diagram of an Aruba Instant design for a small enterprise
22 | Introduction to Aruba Instant
Aruba Instant Validated Reference Design
Figure 3 Diagram of an Aruba Instant design for a medium enterprise
An Aruba Instant solution for small and medium enterprises includes these key components:
l
Instant Access Points: IAPs are the basis of an Aruba Instant WLAN system. In a campus deployment, IAPs
provide all core functionalities of a WLAN, such as client access for employees and guests, traffic engineering, a
stateful firewall, QoS, mobility, Adaptive Radio Management (ARM), a wireless intrusion prevention system
(WIPS), Airgroup services (for example, plug-and-play services), and spectrum analysis.
l
ClearPass: The ability to support BYOD initiatives and guest services is essential in enterprise deployments. Aruba ClearPass is the only standards-based BYOD solution that integrates every critical aspect of BYOD—
network access control (NAC), mobile device management (MDM), and mobile application management (MAM)—
into a single platform. With ClearPass, IT can manage network policies, onboard and manage devices, admit
guest users, assess device health, and even securely distribute and manage work applications through a single
pane of glass, on any network.
l
AirWave or Aruba Central: You can manage small deployments that are served with a single Aruba Instant
cluster through the local WebUI of a VC. However, when a deployment includes multiple Aruba Instant clusters,
you need a central management platform to manage the different Aruba Instant clusters. Aruba provides two
management options for Aruba Instant deployments: AirWave and Aruba Central. AirWave is an in-house
appliance (much like a private cloud) that that provides monitoring, configuration, firmware management, and
troubleshooting for Aruba Instant networks. Aruba Central is a public cloud-based management platform that
provides monitoring, configuration, firmware management, and troubleshooting for Aruba Instant networks. (For
more information, see Diagram of a K-12 district with Aruba Central management and Aruba Instant.)
l
Aruba Activate: One of the key challenges in deployments that include multiple interconnected buildings is
deployment of APs. Aruba addresses this challenge with Aruba Activate, which is a cloud based, zero-touch
provisioning system. Aruba Activate provides plug-and-play capability to an Aruba Instant cluster, which allows
rapid deployment of Aruba Instant clusters with minimal or no IT expertise.
Aruba Instant Validated Reference Design
Introduction to Aruba Instant | 23
In addition to small and medium enterprises, Aruba Instant is also ideal for certain deployments such as K-12 school
districts that mimic a collection of small or medium enterprises. K-12 school districts include a group of high schools,
middle schools, and elementary schools that are geographically spread within a limited area such as a district. Most
of these schools are interconnected by dark fiber or Metro Ethernet and represent a network that serves several
thousands of users and devices. Schools in a K-12 school district are usually spread out in such a way that they do
not fall under a contiguous RF domain. However, the individual schools themselves often mimic a small or medium
enterprise. In other words, each of these schools can be a single or multi-building site within a contiguous RF
domain, hosting hundreds or a few thousands of users and devices. Similar to small or medium enterprises, K-12
school districts have limited IT staff and require a high performance WLAN that is easy to deploy and manage. The
Aruba Instant solution is well suited for K-12 deployments.
Diagram of a K-12 district with Aruba Central management and Aruba Instant show a K-12 school district with an
AirWave and Aruba Central management deployment.
Figure 4 Diagram of a K-12 district with AirWave management
Figure 5 Diagram of a K-12 district with Aruba Central management
24 | Introduction to Aruba Instant
Aruba Instant Validated Reference Design
Aruba Instant Solution for Distributed Enterprises
A distributed enterprise is an operation with multiple locations that are geographically distributed across a limited
geography or across the entire globe. These days, organizations are more distributed than ever because of the cost
saving and increased productivity that is associated with employing a distributed workforce. A distributed enterprise
might be a collection of branch offices, home offices, or a combination of both. The number of distributed sites and
the user density at these sites vary across organizations. The way in which the remote sites connect to the data
center or headquarters also varies. Some enterprises use services such as MPLS, while others use VPNs. In
general, distributed enterprises can be classified as follows:
l
Branch office deployments
l
Home offices deployments
Because distributed enterprises often include remote sites that have limited or no IT support, the Aruba Instant
solution with its zero-touch provision, multiple uplink options, enterprise features, and VPN capabilities is ideal for
distributed enterprise deployments.
The following figures show Aruba Instant designs for distributed enterprises that use MPLS with AirWave
management (Distributed enterprise that uses MPLS and Aruba Central), MPLS with Aruba Central management
(Distributed enterprise with home or branch offices connecting over VPN), home offices with VPNs (Aruba Instant),
and branch office with VPNs (Figure 9).
Figure 6 Distributed enterprise that uses MPLS and AirWave
Aruba Instant Validated Reference Design
Introduction to Aruba Instant | 25
Figure 7 Distributed enterprise that uses MPLS and Aruba Central
Figure 8 Distributed enterprise with home or branch offices connecting over VPN
An Aruba Instant solution for a distributed enterprise includes the following key components:
l
Instant Access Points: IAPs are the basis of an Aruba Instant WLAN system. In a remote deployment, IAPs
provide all core functionalities such as VPN capabilities, uplink redundancy, client access for employees and
guests, traffic engineering, a stateful firewall, QoS, mobility, Adaptive Radio Management (ARM), a wireless
intrusion prevention system (WIPS), and spectrum analysis.
l
Aruba Controllers: In distributed enterprises that require an Aruba Instant-VPN solution, the Aruba controllers
function as VPN concentrators that terminate VPN tunnels from Aruba Instant clusters at remote sites.
Depending on the Aruba controller platform, each controller can support thousands of Aruba Instant-VPN
branches. For information about controller limits, see WLAN Controller Scalability for Instant-VPN deployments.
l
ClearPass: Depending on the type of distributed enterprise deployment, network administrators must be able to
support employee access, BYOD initiatives, and guest services. Aruba ClearPass is the only standards-based
26 | Introduction to Aruba Instant
Aruba Instant Validated Reference Design
BYOD solution that integrates every critical aspect of BYOD—network access control (NAC), mobile device
management (MDM), and mobile application management (MAM)—into a single platform. With ClearPass,
network administrators of distributed enterprises can manage network policies, onboard and manage devices,
admit guest users, assess device health, and even securely distribute and manage work applications through a
single pane of glass.
l
AirWave or Aruba Central: Most organizations with remote networking have hundreds or even thousands of
remote sites. Managing each of these remote locations using the Local WebUI on a VC is not feasible. Aruba
provides two management options to manage, monitor, and troubleshoot these remote networks: AirWave and
Aruba Central. AirWave is an in-house appliance (much like a private cloud) that that provides monitoring,
configuration, firmware management, and troubleshooting for Aruba instant networks. Aruba Central is a public
cloud-based management platform that provides monitoring, configuration, firmware management, and
troubleshooting for Aruba Instant networks.
l
Aruba Activate: One of the key challenges in deployments with remote networks is the lack of on-site IT
support. The ability to roll out thousands of remote sites with minimal effort is critical to IT teams. Aruba Activate
addresses the deployment challenges of remote networks. Aruba Activate is a cloud-based, zero-touch
provisioning system that provides plug-and-play capability to an Aruba Instant network and allows rapid
deployment of Aruba Instant-based remote sites.
Aruba Instant Solution for Hybrid Deployments
As organizations become more distributed, network administrators might need to support large sites that resemble a
campus network and also remote workers. Organizations that have large campus sites and remote networks are
considered hybrid deployments. Hybrid deployments are becoming common, so network administrators need a
solution that addresses the demands of both campus and remote networks. The Aruba WLAN offering is an ideal
solution for hybrid networks.
Aruba Instant is ideal for hybrid organizations with small-to-medium campuses and thousands of remote sites. If a
campus in a hybrid organization grows to thousands of APs, Aruba Instant can be Distributed enterprise with home
or branch offices connecting over VPN.
Figure 9 Distributed enterprise with home or branch offices connecting over VPN
Aruba Instant Validated Reference Design
Introduction to Aruba Instant | 27
Chapter 3
Designing Enterprise Networks with Aruba Instant
The needs and requirements of small and medium enterprises make Aruba Instant the ideal choice in these
deployments. Design of an enterprise WLAN is influenced by several factors such as the number of users and
devices, types of devices and applications, type of facility and its RF coverage zones, security, QoS requirements,
and so on. Designing and optimizing a WLAN network can easily become a complex assignment. To simplify the
design of an enterprise WLAN, you can apply a phased approach to a WLAN design. In general, you can divide a
WLAN design into the following categories:
l
Physical and logical design: In a distributed architecture, the APs work together to provide the necessary
functionality without a dedicated physical controller. The physical and logical design in a distributed architecture
includes the AP selection process, Layer 2 and Layer 3 design for the end users and APs, and the logical
clustering of APs based on roaming patterns and physical boundaries.
l
RF design: The RF design determines the number of required APs, the optimal AP locations, and how the RF
feature set can be optimized.
l
Authentication and security design: The authentication and security design includes selecting the appropriate
type of authentication for users and devices, integrating the AAA servers, and securing the network against rogue
APs and wireless attacks.
l
Quality of Service (QoS) design: The QoS design includes optimizing the WLAN and underlying infrastructure
for latency-sensitive applications such as voice and video.
l
Design for plug-and-play services: This design includes determining the plug-and-play services such as
Bonjour and optimizing the network for such services.
This chapter describes the Aruba Instant design for small and medium enterprises under these categories.
Aruba Instant Solution Basic Concepts
Before you start a WLAN design with Aruba Instant, you must understand some of the basic concepts of the Aruba
Instant solution.
VLANs in an Aruba Instant Cluster
An Aruba Instant cluster has two basic types of VLANs:
l
AP VLAN: The VLAN to which the APs in a cluster are connected is called the AP VLAN. In most deployments,
this VLAN is the native VLAN of the trunk port to which an AP connects. Aruba recommends that you enable
DHCP services on the AP VLAN to facilitate AP deployment. However, if required, you can assign static IP
addresses to IAPs.
l
Client VLAN: This VLAN is assigned to the clients that connect to the Aruba Instant cluster. These clients
receive their IP address on the client VLAN that is assigned to them. In an Aruba Instant cluster, the client VLAN
and client IP addresses can be assigned in the following ways:
l
Virtual-controller assigned
l
Network-assigned
Aruba Instant Solution Basic Concepts shows the client IP assignment and VLAN assignment options.
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 28
Client IP assignment with the “Virtual Controller assigned” option
In an Aruba Instant network, if a client connects to an SSID that is configured for the “Virtual Controller assigned”
option (see Aruba Instant Solution Basic Concepts), the VLAN that is assigned to the client is called a magic VLAN.
A magic VLAN has the following characteristics:
l
The master AP (virtual controller) is the DHCP server and the default gateway for the clients on the VLAN.
l
DHCP requests on the magic VLAN are forwarded to the master AP of the cluster on the AP VLAN.
l
Unicast packets from the clients are forwarded to the master AP and the master AP performs source NATing.
l
If a client on a magic VLAN is connected to a member AP, the traffic from the clients is forwarded to the master
AP on the AP VLAN. Therefore, do not use a magic VLAN in environments that require VLAN-based segregation
between client traffic and AP traffic.
l
Broadcast and multicast packets from the client are not allowed to go through the uplink port of an IAP. In other
words, the broadcast and multicast traffic on the magic VLAN is not forwarded to the uplink by individual IAPs.
l
Communication between clients on a magic VLAN is through the master AP, that is, clients on the magic VLAN
cannot directly communicate with each other.
l
In an Aruba Instant cluster, you can define only a single DHCP scope for a magic VLAN. In other words, you
cannot use multiple magic VLANs in an Aruba Instant cluster.
29 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
DHCP scope definition for a magic VLAN is a screen shot of the DHCP server options for a magic VLAN.
Figure 10 DHCP scope definition for a magic VLAN
l
You do not need to add a magic VLAN to the uplink switches that connect the IAPs of an Aruba Instant cluster.
A magic VLAN is designed to simplify guest WLAN implementation. When you add a guest WLAN, a magic VLAN
can process the guest traffic on the network without any modification the underlying wired infrastructure (that is,
you do not need to add a VLAN). When you use the “Virtual Controller assigned” option for an SSID, all client
traffic on that SSID is forwarded on the AP VLAN to the master AP and the master AP performs source NATing.
Do not use theVC-assigned IP address option if you need VLAN-based segregation between guest traffic and the
AP VLAN.
Client IP assignment with the “Network assigned” option
The network can also assign a client IP address in an Aruba Instant cluster. Client IP address assignment by the
network includes the following options (see also Aruba Instant Solution Basic Concepts):
l
Default: The default VLAN to which the IAP is connected is also assigned to clients, that is, the AP VLAN is the
same as the client VLAN. Aruba does not recommend this option for an Aruba Instant cluster because user traffic
is forwarded on the same VLAN that is used to manage the IAPs.
l
Static: A specific VLAN ID must be assigned to the clients that connect to the SSID. This VLAN ID can be either
a VLAN that connects to a DHCP server on the wired network or a VLAN for which the Aruba Instant cluster is
the DHCP server. For information about defining a DHCP server and its associated VLANs on an Aruba Instant
cluster, see Understanding Instant-VPN Modes. As part of the static settings, you can also define VLAN pools.
For more information about defining VLAN pools, see the Aruba Instant User Guide that is available at the Aruba
support website.
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 30
l
Dynamic: You can define VLAN derivation rules to assign users dynamically to different VLANs based on
several attributes. For more information about dynamic VLAN assignment, see the Aruba Instant User Guide that
is available at the Aruba support website.
If a client belongs to a VLAN for which the master AP is not the DHCP server or the default gateway, the client
traffic leaves from the IAP to which the client is connected and does not flow through the master AP. However, if a
client belongs to a VLAN for which the master AP is the DHCP server, the client traffic flows through the master
AP. Client traffic from a member AP to the master AP is always bridged and not tunneled.
For recommendations about client IP address assignment, see Physical and Logical Design.
Traffic Flows in an Aruba Instant Cluster
In a WLAN network, two primary types of traffic exist: AP-generated traffic and client-generated traffic.
AP Traffic
In an Aruba Instant cluster, AP-generated traffic includes RADIUS transactions, management traffic,
communications between APs, SNMP traffic, Syslog traffic, and so on. This AP-generated traffic is forwarded on
the AP VLAN. The AP VLAN in an Aruba Instant cluster is the default VLAN of the port (that is, the native VLAN of a
trunk port) to which the AP is connected. Therefore, any AP-generated traffic is untagged. However, certain
environments might require AP traffic to be tagged. The uplink VLAN management feature allows you to tag AP
traffic. For more information, see Uplink Management VLAN.
Client Traffic
Each device in an Aruba Instant cluster is assigned a user role. Client traffic in an Aruba Instant cluster is first
examined by the stateful firewall of the IAP to which the client is connected before being forwarded to the uplink
network with the appropriate client VLAN tag. For example, if a client is assigned an IP address in VLAN 20 using
the static network-assigned IP address option (for more information, see Network-Assigned IP Addresses), the
client traffic is forwarded to the uplink of the AP with VLAN tag 20. The uplink switch that connects the IAPs in an
Aruba Instant cluster must support all client VLANs on that cluster. For example, if VLAN 10, VLAN 20, and VLAN
30 are used as client VLANs in an Aruba Instant cluster, the uplink network that connects the IAPs must support
tagged VLANs 10, 20, and 30. The only exception to this rule is the WLAN configuration, which uses a magic VLAN
for clients (for more information, see Virtual Controller-Assigned IP Addresses).
The client traffic flow in an Aruba Instant cluster also depends on whether the master AP is the DHCP server for the
client VLAN. Aruba Instant deployments typically have these types of client VLANs and traffic:
l
VLAN managed by an uplink network: A VLAN that is managed by the uplink network -For example, if VLAN
20 is managed by the uplink network and is mapped to the “Employee” SSID, the client traffic is examined by the
firewall of the IAP to which the client is connected, bridged to VLAN 20, and does not flow through the master AP
of the cluster.
l
VLAN with a DHCP server on an Aruba Instant network: A VLAN for which the DHCP server is on the master
AP of the Aruba Instant cluster. This type of VLAN includes a VLAN in local mode, centralized Layer 2 mode,
distributed Layer 2 mode, centralized Layer 3 mode, or distributed Layer 3 mode. (For more information about
these modes, see Understanding Instant-VPN Modes.) If an Aruba Instant SSID is mapped to such a VLAN, the
client traffic on that SSID leaves (with the appropriate VLAN tag) from the IAP to which the client is connected,
but the traffic flows through the master AP. The VLAN ID that is used in the DHCP configuration for these
VLANs must be supported on the uplink switch that connects the IAPs.
For more information about traffic flows in an Aruba Instant cluster that is configured for Instant-VPN, see Traffic
Flows in an Aruba Instant Cluster.
The only exception to this behavior is a magic VLAN. The DHCP server for a magic VLAN is on the Aruba Instant
31 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
network and the client traffic on the magic VLAN flows through the master AP. However, the client traffic on the
magic VLAN reaches the master AP on the AP VLAN and not on a specific client VLAN. For more information
about a magic VLAN, see Virtual Controller-Assigned IP Addresses.
Dynamic RADIUS Proxy
In a distributed architecture, each AP functions as a RADIUS authenticator for its clients, which means that you
must configure each AP as a RADIUS client on the authentication server. However, adding all APs as NAS clients
to a RADIUS server might not always be feasible. The dynamic RADIUS proxy (DRP) feature of Aruba Instant
provides an alternative to adding all APs as NAS clients. When DRP is enabled, the master AP becomes a single
anchor for RADIUS requests for all users on an Aruba Instant cluster, regardless of the AP to which a user connects.
The master AP acts as the RADIUS proxy for all RADIUS transactions in an Aruba Instant cluster. When DRP is
enabled, all RADIUS packets that originate form an Aruba Instant cluster are sourced with the virtual controller (VC)
IP address that is assigned to the cluster. You only need to add the VC IP address to the RADIUS client list on the
authentication server.
Virtual Controller IP address for DRP shows the VC IP address and DRP configuration.
Figure 11 Virtual Controller IP address for DRP
By default, when DRP is enabled, all RADIUS packets are sourced with the VC IP address. Using the VC IP
address for RADIUS transactions works well in most environments, but in certain situations the RADIUS server
might be on a network or VLAN that cannot be reached from the AP VLAN. For these situations, Aruba InstantOS
lets you define a DRP VLAN, IP address, and subnet on a per-RADIUS server basis. This capability allows network
administrators to define the VLAN and source IP address for transactions with a specific RADIUS server. If DRP is
enabled and if the RADIUS server on an Aruba Instant network does not include the DRP VLAN and IP configuration
for a RADIUS sever, the transactions with that RADIUS server are sourced with the default VC IP address and
VLAN. For more information about DRP, see the Aruba Instant User Guide that is available at the Aruba support
website.
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 32
DRP options for a RADIUS server shows how you can configure the DRP settings on a per-RADIUS server basis.
Figure 12 DRP options for a RADIUS server
In Aruba Instant VPN deployments, DRP is essential to tunnel the RADIUS traffic to the centralized authentication
server in the data center. For more information on DRP in Aruba Instant-VPN deployments, see 802.1X and RFC
3576 Handling in an Aruba Instant-VPN Network.
Layer 3 Mobility
IAPs within the same Layer 2 domain form a single Aruba Instant cluster. In some situations, because of the
physical building layout or the roaming patterns, Aruba Instant deployments within a contiguous RF domain might
need to be broken up into multiple clusters. The Layer 3 mobility feature lets clients roam away from the Aruba
Instant cluster to which they first connected (home network) to another Aruba Instant cluster (foreign network) that
supports the same WLAN access parameters, and continue their existing sessions.
Layer 3 mobility allows clients to roam without losing their IP address and sessions across IAP clusters within a
contiguous RF domain. If WLAN access parameters are same across the clusters, clients that are connected to
IAPs in an Aruba Instant network can roam to APs in a foreign Aruba Instant network and continue their existing
sessions. Layer 3 mobility enables seamless roaming in a multi-cluster Aruba Instant deployment. For more
information about Layer 3 mobility and how to configure it, see the Aruba Instant User Guide that is available at the
Aruba support website.
Physical and Logical Design
One of the key differences of a distributed architecture when compared to a centralized controller-based architecture
is the need to create wireless user VLANs at the edge of the network. Unlike a centralized controller-based
architecture, in a distributed architecture you must configure the wireless user VLANs on the uplink switches that
connect the APs. This requirement influences the logical design of an Aruba Instant network.
As described in Chapter 1, the physical layout of the small and medium enterprise falls in one of these categories:
l
Single-building layout: This layout is typical for most small enterprises with head-quarters in a single building
with one or more floors.
33 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
l
l
Multi-building layout within a contiguous RF domain: The physical layout of the buildings in this category is
such that the users expect to roam seamlessly across the buildings. The buildings in this type of layout are
usually connected by dark fiber or Metro Ethernet. Examples of this type of layout include:
n
A medium enterprise with a few buildings in close proximity
n
Individual schools of a K-12 school district that has multiple buildings in close proximity
Multi-building layout with a non-continuous RF domain: The physical layout of the buildings in this category
is such that seamless roaming across buildings is not practical. A typical example is a medium enterprise that
has offices in two cities. Another example is a K-12 school district with elementary, middle, and high schools that
are geographically separated in such a way that seamlessly roaming of users across the schools is not practical
without a Metro Wi-Fi solution. The buildings in this type of layout are usually connected by Metro Ethernet or
MPLS.
To select the optimal physical and logical design for any of these environments, you must combine these design
elements:
l
Wired infrastructure design
l
Client VLAN deign
l
Cluster design
Wired Infrastructure Design
There is a fundamental difference in designing a network with a centralized architecture that is controller-based as
opposed to a distributed architecture such as Aruba Instant. In a distributed architecture, the user VLANs and the AP
management VLANs must be configured and extended to the edge (access layer) of the network.
To design the wired infrastructure and VLANs in an Aruba Instant deployment, consider these guidelines:
l
Create a separate VLAN (that is, subnet) to manage the Aruba Instant cluster and ensure that the AP VLAN does
not carry any multicast and user traffic. To simplify IAP deployment, enable DHCP for the AP VLAN. If the AP
VLAN does not support DHCP, stage and configure each AP with a static IP address.
l
Configure all switch ports that are used for IAP connections as trunk ports. Configure the AP VLAN as the native
VLAN of the trunk port and add user VLANs to the allowed VLANs list on the trunk port. All client VLANs, except
magic VLANs, must be tagged VLANs on the trunk port.
l
Ensure that the native VLAN of the trunk port to which the AP connects is functional because all traffic that is
generated by the AP is carried on the native VLAN of the trunk port.
l
Do not modify the uplink management VLAN settings from its default settings. An exception to this guideline is
described in Recommendations for an Uplink Management VLAN.
l
Segregate the wireless VLANs from the wired VLANs. Maintaining separate VLANs for wireless clients
eliminates unnecessary broadcast and multicast traffic from the wired VLAN occupying the airtime.
l
DRP is not required if you can add the entire AP VLAN subnet as a NAS client on the RADIUS server.
l
Enable DRP if your security policy requires a single entity to function as a NAS client for a cluster. If DRP is
enabled, assign a static VC IP address on the same subnet as the AP VLAN and ensure that the RADIUS server
can be reached from that VLAN. If the AP VLAN cannot reach the RADIUS server, enable DRP and configure
the DRP IP address on a VLAN that can reach the RADIUS server. For more information, see Dynamic RADIUS
Proxy.
If an IAP is the DHCP server for a VLAN such as a local-mode VLAN, the uplink switches that connect the IAPs
in a cluster must support the VLAN. The master AP is the DHCP server and gateway for the local VLAN, so if the
uplink switches do not support the VLAN, other IAPs in the cluster cannot forward traffic to the master AP. (For
more information, see Traffic Flows in an Aruba Instant Cluster.) This requirement does not apply to a magic
VLAN.
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 34
Recommendations for an Uplink Management VLAN
By default, traffic that is generated by an AP is untagged. The native VLAN of the trunk port that connects the AP
must be functional. If the native VLAN of the trunk port to which an IAP is connected is a dummy VLAN, you might
have to use a tagged VLAN on the port as the AP VLAN. In such a situation, the AP traffic must be tagged to ensure
that the IAP receives its IP address from the tagged AP VLAN and that all traffic that is generated by the AP is
carried on the tagged AP VLAN. To accommodate this type of configuration, Aruba Instant supports the Uplink
Management VLAN feature.
Uplink Management VLAN
The Uplink Management VLAN feature determines if the AP traffic is tagged or untagged.
By default, the setting for this feature is 0, which means that the AP traffic is untagged. Aruba recommends this
default setting. Aruba also recommends that you make sure that your native VLAN is not a dummy VLAN. However,
in an environment in which you cannot modify the native VLAN to be functional, use the Uplink Management Feature
to tag the AP traffic with the appropriate VLAN tag. For example, if the native VLAN is a dummy VLAN and VLAN 20
must be the management VLAN for APs, set the uplink management VLAN to 20. An uplink management VLAN is a
“per AP” configuration and you must modify it only in an environment in which you cannot modify the native VLAN of
a trunk to be functional. Click on the IAP’s edit link and update the Uplink tab.
Client VLAN Design
As discussed in Traffic Flows in an Aruba Instant Cluster, Aruba Instant provides multiple options to assign client IP
addresses. Below mentioned are some of the guidelines for a client VLAN design:
l
Aruba strongly recommends the network-assigned IP addressing option for client IP assignment.
l
Aruba recommends separating the AP VLAN and client VLANs. Use the “Default-Network Assigned IP Address”
option only in an environment in which a separate AP VLAN and client VLAN are not possible.
l
Use VC-assigned IP addressing only in the following situations:
35 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
l
n
The switch that the IAP connects to is an unmanaged Layer 2 switch on which VLANs cannot be defined.
n
You do not want to configure additional VLANs for guest traffic across all switches.
Do not use the VC-assigned IP option in an environment in which a VLAN-based segregation is required between
a client VLAN (that is, a guest user VLAN) and the AP VLAN. A good example of such a situation is an
environment in which PCI compliance is required.
Cluster Design
By default, all Aruba IAPs on a Layer 2 domain form a cluster. No hard limit exists on the number of APs or clients
that you can support on a single cluster. However, the maximum tested IAP cluster size is 128 IAPs in a cluster.
Guidelines for cluster and mobility design include the following guidelines:
l
Aruba recommends that you use the validated cluster size of 128 APs and 2048 clients per cluster for your cluster
design. To allow for some future growth, design a cluster at 80 to 90 % (about 110 APs) of the validated capacity.
l
If a deployment within a contiguous RF domain requires more than 110 APs, divide the deployment into multiple
clusters and enable Layer 3 mobility between them.
Although the validated cluster size limit applies to a cluster, you can expand a deployment to more than 128 APs
by deploying multiple clusters that have Layer 3 mobility enabled between them.
l
Layer 3 roaming has little to no impact on performance if you enable the Home Agent Load Balancing feature that
is part of the Aruba Instant architecture. If you enable this feature, the VC assigns the home AP for roamed
clients by using a round robin policy. With this policy, the load for the APs acting as home agents for roamed
clients is uniformly distributed across all the IAPs in the cluster.
NOTE: Aruba recommends that you enable the Home Agent Load Balancing feature in deployments in which you expect
a high volume of Layer 3 roaming between clusters.
Cluster Design for Single-Building Layout
A single-building layout might be an office on one level or multiple levels. You must base the cluster design in these
environments on the AP and client density. If you can support the building with fewer than 110 APs, Aruba
recommends a single cluster. Most single-building layouts can be accommodated with a single cluster. However, if
you have a multi-storey building that exceeds the recommended AP and client limit for a single cluster, divide the
deployment into two clusters with Layer 3 mobility enabled between the clusters. If you enable Layer 3 mobility,
Aruba recommends that you also enable the Home Agent Load Balancing feature. By default, Home Agent Load
Balancing is disabled. Go to System>Show advanced options>L3 Mobility to enable it.
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 36
Cluster Design for a Multi-Building Layout within a Contiguous RF Domain
In this layout, users are expected to roam seamlessly across buildings. You must base the cluster design in these
environments on the AP and client density. If the layout includes three buildings that can be covered by fewer than
110 APs, Aruba recommends that you deploy the IAPs as a single cluster. However, if these three buildings require
50 APs per building, deploy the IAPs as two clusters with Layer 3 mobility enabled between them. In a multi cluster
design, take the roaming patterns into consideration.
Cluster Design for a Multi-Building Layout with a Non-Continuous RF Domain
In this layout, the buildings are geographically separated in such a way that seamless roaming across buildings is
not practical. In this case, support each building with a single cluster. The geographical separation means that
seamless roaming across buildings is not required.
Cluster Design for a K-12 School District
A K-12 school district is a combination of high schools, middle schools, and elementary schools. The individual
schools that make up the K-12 school district can represent a single-building layout or a multi-building layout with a
contiguous RF domain. Apply the cluster design for a single-building layout or a multi-building layout with a
contiguous RF domain to the individual schools.
The different schools in a K-12 school district are typically separated geographically such that seamless roaming
across schools is not practical. A typical K-12 school district design has these characteristics:
l
Each individual school is a single or multi-cluster design that is based on the number of APs that are required to
provide a capacity-based RF design.
l
Seamless roaming across schools is not required because of the geographical separation.
l
The entire school district is managed by a single management platform–AirWave or Aruba Central.
37 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Cluster Security Recommendations
When you add a new IAP to a Layer 2 network that is hosting an Aruba Instant cluster, the new AP joins the cluster
automatically. This behavior is enabled by the Auto-Join feature that is enabled by default on an Aruba Instant
cluster. The Auto-Join feature simplifies the deployment of Aruba Instant networks. However, after the initial
deployment of the network, Aruba recommends that you disable the Auto-Join feature to prevent unauthorized APs
from joining the cluster. If you must add additional authorized APs to the network, you have these options:
l
Manually add new APs to an existing cluster by adding the MAC addresses of the new APs to the Instant cluster
configuration (see Physical and Logical Design).
l
Temporarily enable the Auto-Join feature to allow new authorized APs to be added automatically during the AP
deployment window. By default, Auto Join is enabled. Change it in System>show advanced settings.
Below is the screen shot of the New Access Point pop-up screen that lets you add the MAC address of a new
authorized IAP.
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 38
Figure 13 Manually adding an AP by specifying its MAC address
RF Design
Good RF design is one of the most essential aspects of designing an enterprise WLAN because RF design relates
directly to the user experience. With the proliferation of mobile devices and applications in the network, it is important
to ensure that a WLAN can accommodate them and can provide optimal performance over the air. Good RF design
includes these recommendations:
l
WLANs can be designed as either capacity-based networks or coverage-based networks. Coverage-based
networks have fewer APs deployed and further apart from each other. Capacity-based networks have more
densely deployed APs that are capable of serving a higher number of clients and provide better speeds.
To accommodate the influx of wireless devices in the near future, Aruba highly recommends that you design your
enterprise network for capacity rather than coverage.
l
Before you deploy APs, Aruba recommends that you run a site survey on your floor plan (either a virtual or
physical site survey) to determine the ideal number of APs that can provide a targeted minimum data rate and to
identify where to place the APs for optimal performance.
l
Select the types of APs (2-stream or 3-stream) based on application requirements.
l
Select the types of antennas (internal or external), based on the type of environment (warehouse or cubicles,
presence of concrete walls, metal drawers and cabinets, and so on).
l
After you have placed the APs optimally, fine-tune them with the appropriate channel and power assignments.
For detailed information about RF planning requirements, see the Site Survey and Planning Validated Reference
Design.
One of challenges with RF environments is their ever-changing nature. Even when you follow good design
recommendations to deploy the APs, RF performance can degrade. RF performance can degrade due to many
factors: an RF coverage hole might occur when an AP goes down, Wi-Fi or non-Wi-Fi interference might be present
in the air, legacy 802.11 a/b/g devices might be present in the network, and so on.
It is critical that you have certain mechanisms in place to allow for dynamic adjustment to the constantly changing
RF environment. Adaptive Radio Management (ARM) is such a mechanism. For more information, see Adaptive
Radio Management.
39 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Radio Modes on Aruba Instant
You can set each AP in an Aruba Instant cluster to one of the below mentioned modes of operation:
l
Access: The AP serves clients while also monitoring for rogue APs in the background.
l
Monitor: The AP functions as a dedicated monitor, scanning all channels for rogue APs and clients. In the
Monitor mode, the AP cannot serve any clients.
l
Spectrum Monitor: The AP functions as a dedicated full-spectrum RF monitor, scanning all channels to detect
interference, whether from neighboring APs or from non-WiFi devices such as microwaves and cordless phones.
In the Spectrum Monitor mode, the AP cannot serve any clients.
You configure the radio mode per individual AP. By default, all APs function in access mode.
RF Design is a screen shot of the radio operation modes for an AP.
Figure 14 Setting the radio operation mode for an AP
Scanning of IAPs
IAPs can work in various modes, on each of its radio 2.4 GHz or 5GHz.
Select the IAP and click on edit to bring the following box:-
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 40
AP Scanning (Access Mode)
The primary duty of an AP is to serve clients. However, an AP also scans the air to perform the following tasks:
l
Looking for better channels
l
Monitoring for Intrusion Detection System (IDS) events
l
Listening for clients
l
Searching for rogue devices
l
Participating in containment of rogue devices
By default, an AP scans its current channel in the normal course of operation and goes off channel to scan every 10
seconds. A small amount of jitter occurs to ensure that a full beacon period is examined. The AP spends 85
milliseconds scanning off-channel, that is, the AP scans the foreign channel for approximately 65 milliseconds (with
20 milliseconds of overhead used as the radio changes channels) and then reverts to its home channel.
The scanning behavior in an IAP is the same as that in a campus AP, which is to perform off-channel scanning
every 10 seconds. The only difference is at boot-up: an IAP scans more aggressively (1 scan per second) during
the first 10 minutes after boot-up.
AM Scanning (Monitoring Mode)
AM scanning is similar to AP scanning, except that the air monitor (AM) constantly scans other networks and does
not serve clients. The AM listens, and transmits only to contain rogue APs or clients. When a rogue device must be
contained, the AM can spend more time containing the rogue device than scanning, which results in more consistent
enforcement.
When you deploy AMs on AP hardware that has only one radio, the AM alternates between the 2.4 and 5 GHz band
on the single radio AP.
41 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Spectrum Monitoring (Spectrum Monitor mode)
In most WLAN deployments, the primary source of any performance degradation starts at Layer 1, that is, the RF
spectrum or physical layer. Aruba Instant offers integrated spectrum analysis, which adds a layer of visibility into
802.11 WLANs. Visibility into the RF allows you to see what is occurring in the air and is a key requirement for
troubleshooting RF issues.
Spectrum analysis can classify and identify non-802.11 interference sources, providing real-time analysis at the
point where the problem occurs. Spectrum analysis is best utilized when integrated into the WLAN infrastructure,
because hand-held tools are useful only when IT staff are on-site and interference is present – an unlikely
combination in distributed enterprises.
The solution to the problem is a set of integrated tools that enable visibility when using the existing infrastructure.
Instant offers spectrum monitoring in two modes of operation:
l
Hybrid Spectrum (Background Spectrum Monitoring: An AP radio in hybrid AP mode continues to serve
clients as an AP while it analyzes spectrum analysis data for the channel that the radio uses to serve clients. You
can record data for both types of spectrum monitor devices. However, the recorded spectrum is not reported to
the virtual controller (VC).
If a non-Wi-Fi interference device is detected, a spectrum alert is sent to the VC.
l
Dedicated Spectrum Monitor (SM): SMs are IAP radios that gather spectrum data but do not service clients.
Each SM scans and analyzes the spectrum band that is used by the SM radio (2.4 GHz or 5 GHz).
The main difference between Hybrid Spectrum mode and Dedicated Spectrum Monitor mode is that in Hybrid
Spectrum mode, the AP reports only spectrum data for its home channel. In Dedicated Spectrum Monitor mode,
spectrum data for all channels is reported.
For more information about spectrum monitoring, see the Aruba Instant User Guide that is available at the Aruba
support website.
Adaptive Radio Management
If channels and power are updated only when an AP boots up or only every 24 hours, then radio management is
insufficient and based on a snapshot of the RF environment only. Devices, walls, cubes, office doors that open and
close, microwave ovens, and even the human body all have an effect on the RF environment. Generally, you cannot
test and compensate for such a fluid environment in a static channel and power plan. You need a system that can
dynamically adjust to and optimize the ever changing RF environment. Adaptive Radio Management (ARM) is such
a system.
At the most basic level, before ARM configures power and channel settings for APs, it allows the network to
consider Wi-Fi interference, non-Wi-Fi interference, and the presence of other APs. APs and air monitors (AMs)
continuously scan the environment. If an AP goes down, ARM automatically fills in the RF hole and increases the
power on the surrounding APs until the original AP is restored. When the AP is restored, ARM sets the network to a
new optimal setting. If an interfering device (Wi-Fi or non-Wi-Fi) appears on the network, such as a wireless camera
that consumes a channel, ARM adjusts the AP channels appropriately.
Some of the functionalities that ARM provides are shown in RF Design and described in Selected ARM Settings.
(For recommendations about ARM settings, see Recommended IAP Settings.)
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 42
Figure 15 Configuring the ARM settings
Table 3: Selected ARM Settings
ARM Setting
Description
Auto Channel and
Power setting
These settings are enabled by default on IAPs. You also can manually set the
channel or power for APs.
Scanning
When enabled, the APs periodically scan other channels for RF management
and WIPS enforcement.
Client-aware
scanning
When enabled, ARM does not change channels for APs when clients are
active, except for high-priority events such as radar or excessive noise. To
ensure a stable WAN experience, Aruba recommends that you enable clientaware scanning for most deployments.
Supports these four modes:
l
Band steering mode
l
l
43 | Designing Enterprise Networks with Aruba Instant
Prefer mode: If the client supports both the 5 GHz and 2.4 GHz bands,
the AP directs the client to use the 5 GHz band.
Force mode : If the client supports both the 5 GHz and 2.4 GHz bands,
the AP allows the client to use only the 5 GHz band. However, clients
that support only the 2.4 GHz band can still connect to the 2.4 GHz band.
Balance mode : Attempts to balance clients between the two bands
within an approximate ratio of four 5 GHz clients for each single 2.4
GHz client.
Aruba Instant Validated Reference Design
l
Client match
Disabled mode : The client selects which band to use.
Continuously monitors the RF neighborhoods of the clients and provides band
steering and load balancing of the clients while they are associated to the
network. Helps sticky clients roam to better APs.
Supports these three modes:
l
Airtime fairness mode
l
l
Default Access: Airtime fairness algorithms are disabled.
Fair Access: All clients get the same airtime irrespective of their
capabilities.
Preferred Access: 11n/11ac clients get more airtime than 11a/11g
clients, which get more airtime than 11b clients. The ratio is 16:4:1.
Additional RF Optimization Features
In addition to the ARM settings that are described in the previous section, you can enable these features on an IAP
to further optimize the performance over the air. For a complete list of recommendations for ARM settings and each
of these features, see Recommended IAP Settings.
l
Broadcast Filtering: This feature is available in the Network (SSID) settings on the virtual controller and
supports the following settings:
n
All: The APs drop all broadcast and multicast frames except DHCP and ARP.
n
ARP: In addition to dropping all broadcast and multicast frames except DHCP and ARP, the APs convert
ARP requests to unicast and send these packets to the associated clients.
n
Disabled: All broadcast and multicast traffic is forwarded.
Figure 16 Configuring broadcast filtering
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 44
Aruba recommends that you set broadcast filtering to ARP. However, if you run multicast applications on the
network, disable broadcast filtering to prevent multicast traffic from being dropped from the WLAN.
l
Multicast Transmission Optimization: If you enable multicast optimization, the AP selects the optimal rate for
sending broadcast and multicast frames based on the lowest transmission rate that is indicated by the rate
adaptation state of each associated client. (See RF Design.)
l
Dynamic Multicast Optimization (DMO): The 802.11 standard states that multicast traffic over WLAN must be
transmitted at the lowest supported rate so that all clients can decode it. The low transmission rate results in
increased airtime utilization, and therefore decreased overall throughput for transmissions. Because of the slower
speed, it is desirable to transform multicast traffic to unicast traffic when a few clients have subscribed to a
multicast stream. Transforming multicast traffic to unicast traffic increases the speed of wireless transmissions
by using the higher unicast rates. (See RF Design.)
For more information, see Aruba QoS Features.
Figure 17 Configuring multicast optimization
l
Local Probe Request Threshold: A station that is trying to join any WLAN can search for available wireless
networks by performing an active scan or a passive scan. During a passive scan, the client listens to beacon
frames that are sent by the APs on every possible channel to discover the available wireless networks. During a
passive scan, the station must wait until it can detect a beacon from the AP. During an active scan, the client
sends a probe request to detect the presence of an AP on a channel. An AP that detects a probe request must
respond with the probe response. The probe response provides the client with all the required information about
the network that is broadcasted by the AP.
45 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
In dense environments, some clients might join an AP with a lower SNR, even in the presence of APs with a better
SNR. The local probe threshold feature defines the SNR value below which the AP ignores the incoming probe
requests. As a result, the clients get a probe response only from APs that have a good SNR with the client. This
feature encourages proper roaming in dense deployments. The supported range for the SNR value is 0-100 dB. A
value of 0 disables this feature.
Aruba recommends that you enable this feature in dense environments (an AP every 3600 sq. ft) with the value set to
25 dB. (See RF Design).
Figure 18 Configuring the local probe request threshold
l
Interference Immunity Level: If an AP attempts to decode a non-802.11 signal, its ability to receive traffic can
be interrupted momentarily. The noise immunity feature helps improve the network performance in environments
with a high level of non-802.11 noise from devices such as Bluetooth headsets, video monitors, and cordless
phones. You can configure the noise immunity feature form level 0 through level 5. For more information about
interference immunity levels, see the Aruba Instant User Guide that is available at the Aruba support website.
Increasing the immunity level makes the AP slightly “deaf” to its surroundings, that is, it causes the range of the
AP to decrease slightly. The default and recommended immunity level for most deployments is level 2. (See RF
Design).
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 46
Figure 19 Configuring the interference immunity level
Client Match
ARM helps the WLAN to steer clients to the best APs, and it does so during the time of client association. It does not
trigger AP changes for clients that are already associated to an IAP.
The Aruba Client Match feature continually monitors the RF neighborhood of a client to provide ongoing client band
steering and load balancing for associated clients, and enhanced AP reassignment for roaming clients.
When the Client Match feature is enabled on an IAP, the AP measures the RF health of its associated clients. If one
of these three mismatch conditions is met, clients are moved from one AP to another for better performance and
client experience:
l
Dynamic Load Balancing: The Client Match feature balances clients across IAPs on different channels, based
upon the client load on the APs and the SNR levels that the client detects from an underutilized AP. If an AP radio
can support additional clients, the AP participates in Client Match load balancing, and clients are directed to that
AP radio, subject to predefined SNR thresholds.
47 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
As of Instant 6.3.1.1-4.2., spectrum load balancing is integrated with the Client Match feature.
l
Sticky Clients: The Client Match feature helps mobile clients that tend to stay associated to an AP despite low
signal levels. IAPs using the Client Match feature continually monitor the RSSI of a client as it roams between
APs, and move the client to an AP when a better radio match is found. This feature prevents mobile clients from
remaining associated to APs with a less than ideal RSSI, which can cause poor connectivity and reduce
performance for other clients that are associated with that IAP.
l
Band Steering: IAPs that use the Client Match feature monitor the RSSI for clients that advertise a dual-band
capability. If a client is associated to the 2.4 GHz radio and the AP detects that the client has a good RSSI from
the 5 GHz radio, the AP attempts to steer the client to the 5 GHz radio, as long as the 5 GHz RSSI is not
significantly worse than the 2.4 GHz RSSI, and the IAP retains a suitable distribution of clients on each of its
radios.
Aruba recommends that you use the default settings for the Client Match feature.
Recommended IAP Settings
Aruba recommends the IAP settings that are summarized in Recommended Settings for an IAP.
Table 4: Recommended Settings for an IAP
Feature
Default
Setting
Sparse
AP with
Data
only
Dense AP
with Data
Only
Recommended
settings for Video
and Voice
High Interference
Environment
Scanning
Enabled
Default
Default
Default
Default
(Disable scanning on
detecting voice or video
traffic under ACL)
Client Aware
Scanning
Enabled
Default
Default
Default
Disabled
Background
Spectrum
Monitoring
Disabled
Default
Default
Default
Enabled (to show the
sources of interference)
Client Match
Disabled
Default
Default
Default
Default
Band Steering
Prefer
5Ghz
Default
Default
Default
Default
Airtime fairness
Fair
Access
Default
Default
Default
Default
Min Transmit
Power
18
Default
9
Default
12
Broadcast filtering
Disabled
All
ARP
ARP
ARP
(Disabled if running
multicast applications)
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 48
Default
Setting
Sparse
AP with
Data
only
Dense AP
with Data
Only
Recommended
settings for Video
and Voice
High Interference
Environment
Multicast
Optimization
Disabled
Enabled
Enabled
Enabled
Enabled
Dynamic Multicast
Optimization
Disabled
Default
Default
Enabled
Default
Local Probe
Request
Threshold
0=
Disabled
Default
Enabled
(value=25db)
Enabled (value=25db)
Enabled (value=25db)
Interference
Immunity Level
2
Default
Default
Default
Default
Wide Channel
Bands
5 GHz
Default
Default
Default
Default
Beacon Interval
100ms
Default
Default
Default
Default
Dynamic CPU
Management
Automatic
Default
Default
Default
Default
Min Legacy (non11n) Transmit
Rates 2.4 GHz
1
2
11
Default
11
Min Legacy (non11n) Transmit
Rates 5 GHz
6
Default
Default
Default
Default
Feature
Modify this value only if the
Aruba Support Team
advises that you do so.
4.2 is required for IAP Client Match and IAP software 4.2.1 onwards is recommended. On IAP softwares 4.1.1 and
earlier, client match is not recommended.
Band steering requires equal coverage between the 2.4 GHz and 5 GHz bands to be effective. A larger 2.4 GHz
coverage model results in unpredictable results for clients, especially if band steering is set to the “Force 5Ghz”
mode. Examine the network coverage using VisualRF™ Plan before you set band steering to the “Force 5Ghz”
mode. Plan new networks using a
5 GHz coverage model and deploy the network with dual-mode APs at each location. Such a deployment allows
ARM to decrease power in the 2.4 GHz band to compensate for the dense deployment.
49 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Starting 4.2, you can set different max & minimum level of transmit power, for 2.4 GHz & 5 GHz bands, you can do it
through the following settings:
QoS Design
Depending upon what type of applications are expected in your network, it might be important to have certain
mechanisms in place that treat real-time applications differently than other applications. For example, voice and
video applications that are sensitive to jitter and latency must traverse the network faster, so they are given
precedence over best-effort applications such as email and print jobs.
Quality of service (QoS) is a set of packet markings and queuing mechanisms that prioritize classes of traffic
through the network. Wi-Fi Multimedia (WMM) is based on the 802.11e amendment. WMM is a system for marking
traffic as higher priority and adjusting the packet timers to allow delay-sensitive data to have precedence on the air.
End-to-End QoS
For QoS and WMM to work effectively, they must be deployed end-to-end throughout the network. All components
must recognize the packet marking and must react in the same way to ensure proper handling. Complete
deployment of QoS ensures consistent delivery of data. With proper planning, high-quality voice and video can be
achieved over the WLAN.
QoS Design shows how DSCP, 802.11p, and WMM marking are used in an Aruba Instant deployment.
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 50
Figure 20 DSCP, 802.11p, and WMM marking
Two mechanisms are involved: WMM/802.11e on the wireless side and DiffServ Code Point (DSCP) and 802.1p
tagging on the wired side. WMM handles prioritization, queuing of packets, and servicing of queues. WMM also has
additional power-saving mechanisms to extend battery life. DSCP/802.1p tagging ensures appropriate delivery on
the wired side of the network. To be effective, this tagging must be implemented throughout the network with the
same values at all nodes.
QoS on the WLAN
Aruba Instant uses WMM to provide the correct level of service to wireless clients. WMM specifies four classes of
traffic: voice, video, best effort, and background. WMM also enables shorter wait times for higher-priority traffic by
adjusting the interframe spacing for these packets. The traffic classes map directly to DSCP traffic classes and
marks, which enables traffic to be easily translated between the two mechanisms. When a packet with a DSCP/802.1p marked packet arrives from the wired side of the network, that marking is
translated into a WMM marker. When a wireless frame that is marked with WMM is received from a wireless client,
the IAP includes the marking in the Ethernet frame header before forwarding it on the wired network. The IAP has
queues to ensure that traffic is processed with the proper priority.
The Aruba infrastructure can set the appropriate tagging from the IAP to the WLAN client, and from the IAP into the
access layer. However, the client must also understand WMM and use the proper tagging and sending mechanisms
to ensure that traffic flows appropriately.
QoS on the LAN Edge and Core
The LAN between the IAP and the core must recognize and prioritize DSCP-marked traffic through the network.
Similarly, the core must respect the QoS marks from the LAN edge to any multimedia servers.
Aruba QoS Features
In addition to the standard-based features, Aruba supports features that are specific to the Instant solution.
Stateful Firewall
The Aruba Instant firewall module allows policies to be applied to user traffic sessions.
51 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
In addition to the functions that are typically associated with firewalls, the Aruba firewall can also reclassify traffic.
Firewall policies and Application Layer Gateways (ALGs) allow traffic that is not marked with the correct priority to be
dynamically reclassified for proper prioritization.
Media Classification
Apart from ALG support for applications such as SIP and Vocera, the Classify Media feature can also be enabled
inside the firewall rule of an IAP to classify and prioritize hard-to-detect applications such as Lync voice and video.
These Lync applications use Session Initiation Protocol-Transport Layer Security (SIP-TLS) as the signaling
protocol, which means the signaling traffic is encrypted. Encryption makes it harder to detect the type of the
application and thus apply any markings on encrypted traffic. Using the Classify Media feature enables the firewall
on the IAP to perform a deep packet inspection (DPI) to analyze the packet flows and accurately classify the traffic
as Lync voice or video.
It is critical that all devices in the network are capable of QoS and are configured for QoS. Switches and the
multimedia servers themselves must mark traffic appropriately. Failure to ensure end-to-end prioritization can cause
unpredictable performance for these applications. Bandwidth Management
Bandwidth management, in general, ensures that each traffic class gets the proper prioritization, but consideration
should also be given to the overall bandwidth of the system. Bandwidth management on Aruba Instant can be
loosely divided into two categories listed below:
l
Application bandwidth management
l
User and network bandwidth management
Application Bandwidth Management
Application bandwidth management is based on WMM classification.
Each traffic class (voice, video, best effort, and background) is allocated a certain percentage of the traffic. This
mechanism takes effect during congestion to service queues on a percentage basis. (See QoS Design .)
In the absence of congestion (that is, no traffic queues exist), all four traffic classes are allowed to use the entire
available network bandwidth.
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 52
Figure 21 Configuring WMM for traffic classes
Configure WMM percentages in networks that have special requirements or when Aruba Technical Support
advises you to do so.
User and Network Bandwidth Management
Aruba Instant provides the following user and bandwidth management options:
l
SSID-based bandwidth management: Airtime is allocated to each SSID on the system as a percentage. Each
individual SSID is allowed some percentage with the ability to burst if there is no contention for the medium. (See
QoS Design .)
53 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Figure 22 Configuring airtime for SSIDs
Configure an airtime percentage only in networks that have special requirements or when Aruba Technical Support
advises you to do so.
l
Radio-based bandwidth management: Each radio is allocated a bandwidth amount, which is the aggregate
throughput that is provided to all clients that are connected to that radio. (See QoS Design ).
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 54
Figure 23 Configuring radio-based bandwidth
Configure radio bandwidth only in networks that have special requirements or when Aruba Technical Support
advises you to do so.
l
User-based bandwidth management: Each user is allocated a portion of the available bandwidth for their use.
(See QoS Design .)
55 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Figure 24 Configuring user-based bandwidth
Role-based bandwidth management: All users on the Aruba system are assigned a role, and a bandwidth
contract is allocated to all users for that particular role. (See QoS Design ).
Figure 25 Configuring role-based bandwidth
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 56
Dynamic Multicast Optimization (DMO)
The 802.11 standard states that multicast over WLAN must be transmitted at the lowest supported rate so that all
clients can decode it. Also, broadcast and multicast frames are not acknowledged, so these transmission methods
use lower (that is, slower) data rates to provide a better chance of reception. The low transmission rate results in
increased airtime utilization, and therefore decreased overall throughput for transmissions.
Multicast is transmitted at slower speed, so it is beneficial to transform multicast traffic to unicast traffic if a few
clients have subscribed to a multicast stream. Transforming multicast traffic to unicast traffic increases the speed of
wireless transmissions by using the higher unicast rates.
QoS Design shows a non-DMO flow versus a DMO flow. QoS Design is a screen shot of the WLAN settings
screen that lets you configure DMO.
Figure 26 Non-DMO flow (left image) versus DMO flow (right image)
57 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Figure 27 Configuring DMO
ARP Broadcast Filter
The ARP broadcast filter converts broadcast ARP requests to unicast requests. The ARP request is directed only to
the client that must receive the request. This feature reduces the need to broadcast requests to multiple clients for
data that only one client must receive.
If you run multicast applications on the network, disable ARP broadcast filtering to prevent multicast traffic from
being dropped on the WLAN. (See QoS Design .)
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 58
Figure 28 Configuring ARP broadcast filtering
Design for Plug-and-Play Services
This section describes a particular plug-and-play protocol: Apple Bonjour.
AirGroup is a unique enterprise-class Aruba capability that leverages zero-configuration networking to efficiently
enable Bonjour services such as Apple AirPrint and AirPlay from mobile devices. Apple AirPlay and AirPrint services
are based on the Bonjour protocol and are essential services in campus Wi-Fi networks.
Zero-configuration networking enables, address assignment, service discovery, and name resolution for desktop
computers, mobile devices, and network services. Zero-configuration networking is designed for a flat, single-subnet
IP network such as a wireless home network.
Bonjour is the trade name for the zero-configuration implementation that Apple introduced. Bonjour is supported by
most of the Apple product lines, including the Mac OS X operating system, iPhone, iPod Touch, iPad, Apple TV, and
AirPort Express.
Challenges with Multicast DNS
Multicast DNS (mDNS) is a host name resolution service that is implemented by Apple as an alternative to the
popular DNS service. When mDNS was introduced, it was intended primarily for local shared networks in which
devices could find each other without requiring additional infrastructure on the network such as a DNS server.
The addresses that Bonjour uses are link-scope multicast addresses, so each query or advertisement can be
forwarded only on its respective VLAN, but not across different VLANs.
As Bonjour-capable products such as iPods, iPads, iPhones and MacBooks started penetrating enterprise networks,
they presented certain challenges:
l
In K-12 schools, universities and enterprise networks, it is common for Bonjour-capable devices to connect to the
network across VLANs. As a result, an iPad on one VLAN cannot discover an Apple TV that resides on another
59 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
VLAN because mDNS traffic in its native form is limited to a Layer 2 network and does not propagate across
VLANs.
l
Broadcast and multicast traffic are usually filtered out from a WLAN to preserve the airtime and battery life. This
limitation inhibits the performance of Bonjour services because they rely on multicast traffic.
l
Other users on the same VLAN can discover personal devices, which might not be desirable.
The AirGroup Solution
AirGroup is an Aruba-proprietary solution that helps to address the above-mentioned mDNS challenges as follows:
l
AirGroup maintains seamless connectivity between clients and services across VLANs and SSIDs.
l
Even if broadcast and multicast controls are enabled on an SSID, AirGroup creates special exceptions to send
select mDNS traffic across the WLAN to learn about Bonjour services.
l
AirGroup on an IAP sends unicast mDNS responses to clients requesting mDNS services on the WLAN. The
WLAN carries no downstream multicast traffic, so airtime, and client battery life are significantly improved.
You can also integrate AirGroup with the ClearPass Policy Manager (CPPM) to provide these benefits:
l
Users can register their personal devices on the network in such a way that they have exclusive access to these
devices. They can also define a group of users who can share the registered devices.
l
Administrators can register and manage the shared devices of an organization, such as conference room printers
and classroom Apple TVs. An administrator can grant global access to each device (for example, Apple TV
access for both teachers and students), or restrict access according to the user name, role, or user location.
In Aruba Instant 4.2 release, Digital Living Network Alliance (DLNA)/ Universal Plug and Play (UPnP) devices (that
use Simple Service Discovery Protocol [SSDP] for discovering other DLNA/UPnP based services) are also
supported in their native form, that is, DLNA devices can interconnect on the same VLAN. A future Aruba Instant
release would support AirGroup functionality for DLNA devices on Aruba Instant, in the same way it is currently
supported for mDNS-based Bonjour devices.
AirGroup Capabilities Supported by Aruba Instant
AirGroup Capabilities summarizes some of the AirGroup capabilities. The Integrated column shows whether the
capabilities are supported in Aruba Instant. The Integrated with CCPM column shows capabilities that require
ClearPass Policy Manager.
Table 5: AirGroup Capabilities
Features
Instant Deployment Models
Integrated
Integrated with
CPPM
Allow mDNS to propagate across subnets and
VLANs
Yes
Yes
Limit multicast mDNS traffic on the network
Yes
Yes
VLAN based mDNS service filtering
Yes
Yes
User-role based mDNS service filtering
Yes
Yes
Portal to self-register personal devices
No
Yes
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 60
Features
Instant Deployment Models
Integrated
Integrated with
CPPM
Device owner based policy enforcement
No
Yes
Location based policy enforcement
No
Yes
Shared user list based policy enforcement
No
Yes
Shared role list based policy enforcement
No
Yes
AirGroup Solution Architecture
The distributed AirGroup architecture allows each IAP to handle Bonjour queries and responses individually instead
of overloading a virtual controller with these tasks. This type of traffic handling results in a scalable AirGroup
solution.
AirGroup in a Single IAP Cluster
Below mentioned is a configuration example in which IAP1 discovers Air Printer (P1) and IAP3 discovers Apple TV
(TV1). IAP1 advertises information about P1 to the other IAPs (IAP2 and IAP3). Similarly, IAP3 advertises TV1 to
IAP1 and IAP2. This type of distributed architecture allows any IAP to respond to its connected devices locally. In
this example, the iPad that is connected to IAP2 obtains a direct response from the same IAP about the other
Bonjour-enabled services in the network.
Figure 29 Example of an AirGroup in a single IAP cluster
AirGroup in a Single IAP Cluster with ClearPass Policy Manager
You can use ClearPass Policy Manager (CPPM) in an IAP cluster to provide users with a personalized AirGroup
experience. You can use the device registration portal under CPPM to register AirGroup devices on the network.
These devices can then be used as personal or shared devices on the network.
61 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Below is a configuration example in which a network administrator registers an AirPrint printer (P1) and an Apple TV
(TV1) on the network through the ClearPass device registration portal, using IT admin credentials. The printer P1 is
visible to both users X and Y, whereas TV1 is visible only to user X.
Figure 30 Example of an AirGroup in a single IAP cluster with CPPM
AirGroup in Multiple IAP Clusters
You can configure AirGroup domains to enable AirGroup users on one cluster to access AirGroup servers on another
cluster. AirGroup server databases are synchronized between IAP clusters every two minutes.
Below Design for Plug-and-Play Services is a configuration example in which clusters (also referred to as swarms) 1
and 2 are configured as members of an AirGroup domain. (You configure this on the VC of each cluster.) An iPad that
is connected to IAP2 not only has access to servers P1 and TV1 within its own cluster (Swarm 1) but also to servers
P2 and TV2 that are connected to IAPs in the neighboring cluster (Swarm 2).
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 62
Figure 31 Example of an AirGroup in multiple IAP clusters
When you enable an AirGroup across multiple clusters, the DNS records in the virtual controller of one cluster can be
shared with all virtual controllers that are configured for Layer 3 Mobility. (By default, Layer 3 Mobility is disabled).
Design for Plug-and-Play Services is a screen shot of the screen that lets you enable an AirGroup and AirGroup
services, and define a ClearPass Policy Manager server.
Figure 32 Configuring AirGroup settings
63 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
AirGroup Recommendations
Aruba has the following recommendations for AirGroup:
l
In large deployments with many wireless and wired users, often many Bonjour services are advertised, which
can consume a significant amount of system resources. In such large deployments, Aruba recommends that you
initially enable only the most commonly used AirGroup services, such as AirPlay and AirPrint, and disable the
“allowall” service.
l
Wired AirGroup devices:
n
All AirGroup devices that are wired on the network must have their VLANs trunked on the access switch to
the IAP on which AirGroup is configured. If you do not follow this recommendation, AirGroup does not detect
mDNS activity from these wired devices.
n
Tag a wired AirGroup server with location-based attributes such as AP name, AP group, or AP FQLN. For
example, if you tag a wired AirGroup server with an AP named AP1, both users that are connected to AP1 and
users that are connected to APs that are in the RF neighborhood of AP1 can detect the wired AirGroup server.
n
Port recommendations: Bonjour uses UDP port 5353 for mDNS discovery, whereas application-specific
traffic for services such as AirPlay can use dynamically selected port numbers. If you configure role-based or
network-based access rules on an SSID, modify these access rules to allow traffic on these ports. Static and
Dynamic Ports for AirPlay Service lists the port numbers for AirPlay service. Static Ports for AirPrint Service
lists the port for AirPrint service.
AirGroup is not supported on a 3G uplink.
Table 6: Static and Dynamic Ports for AirPlay Service
Ports for AirPlay Service
Protocol
Ports
TCP
554
5000
7000
7100
8612
49152-65535
UDP
554
7010
7011
8612
49152-65535
AirPlay operates using dynamic ports, but printing protocols such as AirPrint use static ports.
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 64
Table 7: Static Ports for AirPrint Service
Ports for AirPrint Service
Protocol
Print Service
Port
TCP
Data stream
9100
TCP
IPP
631
TCP
HTTP
80
TCP
Scanner
9500
TCP
HTTP-ALT
8080
Configuring AirGroup
This section provides sample procedures of how you can configure AirGroup, AirGroup services, and associated
features on a Virtual Controller.
Enabling AirGroup
You can enable AirGroup and AirGroup services to advertise services across VLANs:
1. Choose More > Services and then click the Air Group tab.
2. Select the Enable AirGroup check box.
3. Choose the desired AirGroup services (for example, AirPlay and AirPrint) by selecting their check boxes.
4. Click OK.
65 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Filtering Services Based on User Role
You can filter AirGroup services based on a user role. For example, you can prevent students from seeing any Apple
TVs on the network:
1. Choose More > Services and then click the Air Group tab.
2. Select the Enable AirGroup check box.
3. Select the airplay check box.
4. Next to airplay disallowed roles, click the Edit link.
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 66
5. Select student (which, in this case, is the role to disallow).
6. Click OK.
7. Verify the configuration.
8. Click OK.
Filtering Services Based on VLANs
You can prevent a service such as AirPrint that originates from a particular VLAN from being advertised to other
users on the network:
1. Choose More > Services and then click the Air Group tab.
2. Select the Enable AirGroup check box.
67 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
3. Select the airprint check box.
4. Next to airplay disallowed vlans, click the Edit link.
5. Enter the VLAN ID.
6. Click OK.
7. Verify the configuration.
8. Click OK.
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 68
Creating a “Personalized” WLAN: Registering Personal and Shared Devices on ClearPass
When you enable AirGroup, by default, all users in an Instant cluster can see all services that originate within the
cluster, irrespective of what user role or VLAN they belong to. However, in many environments, users must have
exclusive access to the services that they own.
For example, a student in a campus dorm room might want exclusive access to his Apple TV and AirPrint-enabled
printer. Students from neighboring dorm rooms should not be allowed to see these devices.
The student can register these devices on the ClearPass device registration portal and specify whether the devices
can be shared by other students or not.
To allow such a configuration, ensure that the Instant VC and ClearPass Guest are properly configured to
communicate with each other.
As a network administrator, you can register a classroom Apple TV on the ClearPass “Device Registration Portal” by
first configuring the VC and then the ClearPass settings:
1. Choose More > Services and then click the Air Group tab.
2. Select the Enable AirGroup check box.
3. Select the airplay and airprint check boxes.
4. Add a ClearPass server to exchange AirGroup messages between the VC and the ClearPass server.
In the ClearPass Settings section of the screen, next to CCPM server 1, choose New from the dropdown box.
69 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
5. On the New Server Screen, enter the IP address and shared key for the ClearPass server.
6. To query and receive updates from the ClearPass server, define an RFC 3576-compliant AirGroup server, which
is different from an RFC 3576-complaint authentication server. If a port is already defined for an authentication
server, you cannot use that same port for an AirGroup server.
On the New Server screen, enable RFC 3576, specify the AirGroup CoA port, and click OK.
By default, Aruba Instant and the ClearPass server use port 5999 to communicate with each other. You can use
another port, provided that you specify the same port on both the Instant VC and the ClearPass server.
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 70
7. On the AirGroup screen, in the ClearPass Settings section, select the Enforce ClearPass registration check
box.
8. Click OK.
Essentially, on the ClearPass server, you define the AirGroup controller that ClearPass must communicate with
and assign the correct AirGroup privileges to users. These users can then log in to the device registration portal
and register their devices.
For information about configuring AirGroup settings on ClearPass, including best-practice recommendations, see the
AirGroup Deployment Guide and ClearPass User Guide that are available at http://support.arubanetworks.com.
Extending an AirGroup across Instant Clusters
By default, AirGroup services are advertised among IAPs that belong to the same cluster. An iPad that is connected
to an IAP in one cluster cannot detect an Apple TV that is connected to an IAP in another cluster.
You can enable sharing of AirGroup services across Instant clusters by completing these configuring steps on the
VC of each Aruba Instant cluster:
1. Choose System > Show advanced options and then click the L3 Mobility tab.
71 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
2. Define the VCs of all Instant clusters across which AirGroup must be enabled.
3. Click OK.
4. Choose More > Services and then click the Air Group tab.
5. Select the Enable AirGroup across mobility domains check box.
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 72
6. Click OK.
Make sure that you complete these configuration steps on the VC for each cluster that participates in AirGroup
service sharing.
Content Filtering using Open DNS
The Content Filtering feature lets you create Internet access policies that allow or deny user access to websites
based on website categories and security ratings. With this feature, you can take the following actions:
l
Prevent known malware hosts from accessing your wireless network.
l
Improve employee productivity by limiting access to certain websites.
l
Reduce bandwidth consumption significantly.
Aruba Instant can use the OpenDNS credentials to access OpenDNS and provide enterprise-level content filtering.
You can configure content filtering on an SSID and you can manually configure up to four enterprise domains. When
enabled, all DNS requests to non-corporate domains on this wireless network are sent to the open DNS server. (See
Entering credentials for OpenDNS and Content Filtering using Open DNS.)
73 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Figure 33 Entering credentials for OpenDNS
Figure 34 Enabling content filtering
To create corporate domain exceptions, ensure that you configure enterprise domains on the VC. When you enable
content filtering, all client DNS requests to non-corporate domains are routed to the OpenDNS server. (See Content
Filtering using Open DNS.)
Figure 35 Configuring enterprise domain names
For information about configuring content filtering, see the Aruba Instant User Guide that is available at the Aruba
support website. You can also create policies using AppRF feature on IAP.
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 74
Security Design
When you design an enterprise WLAN, you must determine the following important security aspects:
l
How are users authenticated on the network and how is data secured over the air?
l
How is the air monitored and how do you protect your infrastructure and users from malicious attacks?
In addition, you also can restrict user access to the network based on their identity. After users are authenticated on
a network, you can assign them different user roles. A user role determines the resources that a user can access on
the network.
You can also combine Aruba Instant with the ClearPass system to enforce more granular security policies across
the network based on the identity and device type of the user.
For information about ClearPass and how to integrate it with Aruba Instant, see the ClearPass User Guide that is
available at the Aruba support website.
Authentication and Encryption
A strong understanding of authentication and encryption is essential to deploy a secure and functional WLAN.
Evaluate the different options against the goals of the organization and the security and operational requirements that
the organization operates under. The number of different authentication and encryption options that must be
supported also influences the design of the WLAN and the number of SSIDs that must be broadcast.
In general, each new authentication type or encryption mode that is required means that you must deploy an
additional SSID. Each SSID that you deploy appears as an individual AP, and it must send beacons, which uses up
valuable airtime. To preserve radio resources, organizations should consider the types of devices to be deployed and
attempt to limit the number of SSIDs.
Depending upon whether you configure an SSID for employee or guest usage, Aruba Instant provides different
authentication and encryption methods:
l
Authentication: Aruba Instant supports multiple authentication methods. Which method you use depends on the
network goals, security requirements, user types, and device types on the network.
Authentication is typically separated into two models, Layer 2 and Layer 3. These models can be combined for
additional authentication.
l
Encryption: In addition to authentication, you must choose an encryption method that protects the over-the-air
transmissions. Aruba strongly recommends using encryption because the wireless transmissions of an
organization can easily be captured or “sniffed” directly in the air during transmission.
Authentication and Encryption for an Employee SSID
This section describes the authentication methods and encryption levels that are available for an SSID for employee
usage and provides recommendations for authentication and encryption.
Authentication Methods
When you configure an SSID for employee usage, select one of the following authentication methods:
l
Open authentication: Open authentication really means no authentication. The network is available for anyone
to join and no keys are required. This form of authentication is often combined with MAC authentication or a Layer
3 authentication method that is used after connection to the network.
Aruba strongly advises against using open authentication in employee networks.
l
MAC authentication: MAC authentication is a legacy form of filtering that requires the MAC address of a
machine to match a manually defined list of addresses. This form of authentication does not scale past a handful
of devices because it is difficult to maintain the list of MAC addresses.
75 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
In addition, never rely on MAC authentication as the primary authentication method. With the help of built-in driver
tools, it is easy to change the MAC address of a station to match one on the accepted list.
l
Personal authentication: Each of the following Layer 2 authentication methods is available as the primary
authentication method on an Aruba Instant network and can be combined with MAC authentication. In the latter
case, all users that are subject to any of these authentication methods must first pass MAC authentication.
n
Wired Equivalent Privacy (WEP): The most common version of WEP is static WEP, for which all stations
share a single key for authentication and encryption. Other versions of WEP have different key lengths and
dynamic key assignments.
As an authentication (and encryption) protocol, WEP was fully compromised in 2001. Aruba recommends that
all organizations discontinue the use of WEP and opt for stronger authentication methods.
n
Pre-Shared Key (PSK): PSK is part of the WPA/WPA2 personal certifications. PSK authentication is the
most common form of authentication for consumer Wi-Fi routers. Like WEP, the key is used both for
authentication and encryption.
In enterprise deployments, PSK is often limited to devices that cannot perform stronger authentication. All
devices share the same network key, which must be kept confidential. This form of authentication is easy to
configure for a small number of devices. However, when more than a few devices must use the key, key
management quickly becomes difficult.
The key usually must be changed manually on devices, which poses more problems if the number of devices
that share a key is very large. When an attacker knows the key, they can connect to the network and decrypt
user traffic. Good security practice mandates that the key should be changed whenever someone with access
to the key leaves the organization. This key should be complex and be rotated on a regular basis.
n
Enterprise authentication: This form of authentication includes 802.1X/EAP, which is part of the
WPA/WPA2 Enterprise certifications.
802.1X was developed to secure wired ports by placing the port in a “blocking” state until authentication is completed
using the Extensible Authentication Protocol (EAP). The EAP framework allows many different authentication types
to be used, the most common being Protected EAP (PEAP), followed by EAP-TLS that uses server- and client-side
certificates.
To secure user credentials, a Transport Layer Security (TLS) tunnel is created and user credentials are passed to the
authentication server within the tunnel. When the authentication is complete, the client and the IAP have copies of
the keys that are used to protect the user session.
Users can be authenticated using the internal server on Aruba Instant or by redirecting client authentication requests
to an external authentication server. Using an external server such as ClearPass provides additional features and
additional granularity. Aruba strongly recommends that you use WPA2 for employee authentication.
Authentication Recommendations
Aruba Authentication Recommendations for an Employee SSID summarizes the authentication methods that Aruba
recommends for an employee SSID.
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 76
Table 8: Aruba Authentication Recommendations for an Employee SSID
Authentication
Method
Recommendation
Open
Not recommended
MAC Auth
Not recommended as the only authentication method. If required, combine with restricted user
role.
WEP
Not recommended.
PSK
Recommended only for devices that do not support stronger authentication.
802.1X/EAP
Recommended for use on all networks. Use TLS if client-side certificate distribution is practical,
and use PEAP for all other deployments.
Encryption Levels
When you configure an SSID for employee usage, the following encryption levels are available:
l
Open: As the name implies, open networks have no encryption and offer no protection from wireless packet
captures. Most hot spot or guest networks are open networks, and the end user is expected to use their own
protection methods to secure their transmissions, such as VPN or SSL.
l
Personal: The same pre-shared key that is used for authentication is also used for encryption. Based on whether
you select WPA Personal or WPA2 Personal for authentication, either TKIP or AES is used for encryption.
l
n
Temporal Key Integrity Protocol (TKIP): The Temporal Key Integrity Protocol (TKIP, part of the WPA
Personal certification) was a stopgap measure to secure wireless networks that previously used WEP
encryption and whose 802.11 adapters were not capable of supporting AES encryption. TKIP uses the same
encryption algorithm as WEP, but TKIP is much more secure and has an additional message integrity check
(MIC). Recently some cracks have begun to appear in the TKIP encryption methods.
Aruba recommends that all users who use TKIP migrate to AES as soon as possible.
n
Advanced Encryption Standard (AES): The Advanced Encryption Standard (AES) encryption algorithm
(part of the WPA2 Personal certification) is now widely supported and is the recommended encryption type for
all wireless networks that contain any confidential data. AES in Wi-Fi leverages 802.1X or PSK to generate
per-station keys for all devices. AES provides a high level of security, similar to what is used by IP Security
(IPSec) clients.
Aruba recommends that all devices are upgraded or replaced so that they are capable of AES encryption.
n
WEP: Though WEP is an authentication method, it is also an encryption algorithm for which all users typically
share the same key. As mentioned previously, WEP is easily broken with automated tools, and should be
considered no more secure than an open network. Aruba recommends against deploying WEP encryption and
strongly encourages organizations that use WEP to migrate to Advanced Encryption Standard (AES)
encryption.
Enterprise: Based on whether you have chosen WPA Enterprise or WPA2 Enterprise for authentication, either
TKIP or AES is used for encryption. Dynamic WEP with 802.1X is also an option but not recommended.
Dynamic WEP with 802.1X was intended as an enhancement to make WEP more secure. However, dynamic
WEP with 802.1X has many security shortcomings and is not secure. Aruba recommends against deploying
dynamic WEP with 802.1X.
77 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Encryption Recommendations
Aruba Encryption Recommendations for an Employee SSID summarizes the Aruba recommendations for encryption
on Wi-Fi networks. Full 802.11ac and 802.11n rates are available only when you use either open (that is, no
encryption) or AES encryption because WEP and TKIP limit the WLAN connection speed to 54 Mb/s.
Table 9: Aruba Encryption Recommendations for an Employee SSID
Encryption Type
Recommendation
Open
Not recommended for use.
WEP
Not recommended for use.
TKIP
Not recommended for use.
AES
Recommended for all deployments
Authentication and Encryption for a Guest SSID
This section describes the authentication methods and encryption levels that are available for an SSID for guest
usage and provides recommendations for authentication and encryption.
Authentication Methods
When you configure an SSID for guest usage, select one of the following authentication methods:
l
Open authentication: Open authentication actually means no authentication. The network is available for
anyone to join and no keys are required. This form of authentication is often combined with a Layer 3
authentication method (a captive portal) that is used after connection to the network. You can combine MAC
authentication with Layer 3 authentication.
l
PSK authentication: In some guest deployments, PSK is used to provide a minimum amount of protection for
guest sessions, and authentication is performed by a Layer 3 mechanism. The PSK key should also be rotated on
a regular basis.
l
Wireless Internet Service Provider roaming (WISPr) authentication: This type of authentication allows
WISPr-enabled clients to connect to the guest network.
l
Captive portal (splash page): After guest users access the network, they can be presented with a captive
portal on their web browser. The captive portal requires the guest user to register or supply guest login credentials
before allowing them to browse the web. After registration and authentication, guests are usually placed in
limited-access roles that allow basic web browsing but deny access to any of the internal resources of the
enterprise.
As a network administrator, you can choose between the internal captive portal and an external captive portal. Aruba
Instant supports a built-in internal captive portal with limited customization. For advanced guest services and highly
customizable captive portal pages, Aruba recommends that you use an external captive portal server such as
ClearPass Guest.
l
Captive portal plus MAC authentication: When MAC authentication is enabled, MAC authentication will be
performed before captive portal authentication. If MAC authentication passes, captive portal authentication can
be skipped.
The internal captive portal on Aruba Instant is customizable, but Aruba recommends that you use ClearPass
Guest for advanced guest services.
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 78
Authentication Recommendations
Aruba Authentication Recommendations for a Guest SSID summarizes the authentication methods that Aruba
recommends for a guest SSID.
Table 10: Aruba Authentication Recommendations for a Guest SSID
Authentication
Method
Recommendation
Open
Recommended for guest networks in conjunction with a higher-level authentication method, such
as captive portal
PSK
Can be used if you must restrict who connects to the guest network or if you must limit the DHCP
scope exhaustion by drive-by devices. PSK on the guest network increases the management
overhead and does not guarantee security.
WISPr
Used in WISPr deployments, common in public venues such as airports.
Captive Portal
Recommended for guest networks if certain policies must be accepted to use the network or a
common logon page is required.
Encryption Levels
When you configure an SSID for guest usage, select one of the following encryption levels:
l
Open: As the name implies, open networks have no encryption and offer no protection from wireless packet
captures. Most hot spot or guest networks are open networks, and the end user is expected to use their own
protection methods to secure their transmissions, such as VPN or SSL.
l
Personal: The same pre-shared key that is used for authentication is also used for encryption. Based on whether
you select WPA Personal or WPA2 Personal for authentication, either TKIP or AES is used for encryption. You
can also select WEP but this is is not recommended.
Encryption Recommendations
Aruba Encryption Recommendations for a Guest SSID summarizes the Aruba recommendations for encryption on
Wi-Fi networks. Full 802.11ac and 802.11n rates are available only when you use either open (that is, no encryption)
or AES encryption because WEP and TKIP limit the WLAN connection speed to 54 Mb/s.
Table 11: Aruba Encryption Recommendations for a Guest SSID
Encryption
Type
Recommendation
Open
Recommended for guest networks.
PSK
Using PSK on the guest network increases the management overhead and does not guarantee
security.
l
l
l
WPA 2 Personal: Recommended for all deployments that use PSK for guest SSID.
WPA personal: Not recommended for use.
WEP: Not recommended for use
79 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Wireless Intrusion Detection and Prevention
Intrusion detection and prevention features are built into an Aruba IAP to help monitor the RF spectrum and the
infrastructure network for the presence of unauthorized network devices (intrusion detection) and take appropriate
measures to prevent any security breaches on the network (intrusion prevention).
Wireless security can be a complex topic with many different options, and it can be difficult to manage the wide
range of Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) options that are available. To
make things easier for users, a set of powerful, yet simple-to-use wizards are available in Aruba Instant. These
wizards provide reasonable default values and help you step through the available configuration options.
You can select a default template that provides an acceptable level of security for the network or create a
customized set of options. The wizard simplifies the selection of security options and helps to eliminate errors in the
configuration. For more information about these wizards, see IDS Wizard and IPS Wizard.
Intrusion Detection System (IDS)
The Intrusion Detection System (IDS) on the IAP monitors the network for the presence of unauthorized APs and
clients, logs information about these devices, and generates reports based on the logged information. The IDS lets
you detect rogue APs, interfering APs, and other devices that can potentially disrupt network operations.
The IDS function is divided into the following components:
l
Infrastructure IDS: For the network to function as intended, attacks on the infrastructure must be detected and
mitigated. Aruba considers the infrastructure to consist of authorized APs, the RF medium itself, and the wired
network that the APs attach to.
l
Client IDS: The Aruba system must also monitor the clients that attach to the network. Any client that
associates to the network, passes authentication, and is using encryption is considered a valid station. The
system looks for various attack signatures, such as hotspotter and TKIP replay attacks that are targeted at
clients that are attached to the wireless network. The system can also watch for valid stations that attempt to
attach to rogue or neighboring APs.
IDS Dashboard
The IDS dashboard presents an overview of the security for the whole network. This dashboard provides a view into
the status of APs and clients and provides a classification of rogue and interfering APs.
The built-in IDS scans for APs that are not controlled by the virtual controller (VC). These APs are listed and
classified as either interfering or rogue, depending on whether they are on a foreign network (that is, a different VLAN
or subnet than that of the IAP) or on the same network (that is, the same VLAN or subnet as the IAP):
l
Interfering AP: An AP that is detected in the RF environment but that is not connected to the wired network.
Although an interfering AP can potentially cause RF interference, it is not considered a direct security threat,
because it is not connected to the wired network. However, an interfering AP can be reclassified as a rogue AP.
l
Rogue AP: An unauthorized AP that is connected to the wired side of the network.
For classification to work, all potential VLANs on which a rogue AP could be connected must be trunked to IAPs.
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 80
Figure 36 Detected foreign access point and clients
IDS Wizard
The WIP wizard that is shown Security Design provides the options to enable, define, and change these items:
l
Detection options for infrastructure attacks
l
Detection options for WLAN clienxts attacks
Figure 37 Detection settings of the WIP wizard
The detection setting on the WIP wizard for the infrastructure and the client can be turned off or set to a predefined
high, medium, or low level. The WIP wizard also allows custom settings. The high detection setting enables all
applicable detection mechanisms. The medium setting enables some important detection mechanisms, and the low
setting enables only the most critical detection mechanisms.
Aruba IDS Recommendations
Aruba recommends this WIP wizard setting for detection:
To ensure that most critical attacks are detected, set the detection to “Low” and then customize the settings based
on your needs. Setting the detection to “Medium” or “High” results in false positives or too many alerts.
81 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Intrusion Prevention System (IPS)
The Intrusion Prevention System (IPS) is the second security function built into the IAP. The IPS determines the
measures that must be taken to mitigate the security breaches that are identified on the Aruba Instant network.
IPS Wizard
The WIP wizard that is shown Security Design provides the options to enable, define, and change these items:
l
Protection options for infrastructure attacks
l
Protection options for WLAN clients attacks
Figure 38 Protection settings of the WIP wizard
The protection setting on the WIP wizard for the infrastructure and the client can be turned off or set to a predefined
high or low level. The WIP wizard also allows custom settings. The high setting enables all applicable protection
mechanisms, and the low setting enables only the most critical protection mechanisms.
Security requirements are specific to each organization. To enable rogue AP containment, you can set the slider bar
under Infrastructure to “Low” or you can enable “rogue-containment” using the custom settings.
Under Advanced Options, these two containment methods are available:
l
Wired containment: When enabled, IAPs generate ARP packets on the wired network to contain wireless
attacks. These ARP packets poison rogue devices.
l
Wireless containment: When enabled, Aruba Instant attempts to disconnect all clients that are connected or
that are attempting to connect to an identified AP. Two wireless containment mechanisms are supported:
n
Deauthentication containment: The AP or client is contained by disrupting the client association on the
wireless interface.
n
Tarpit containment: The AP is contained by luring clients that are attempting to associate with it to a tarpit.
The tarpit can be on the same channel or a different channel as the AP that is being contained.
Aruba Instant Validated Reference Design
Designing Enterprise Networks with Aruba Instant | 82
For containment, you do not need to have a dedicated AM. An IAP that functions in access mode can contain
rogue devices. For wireless containment with an IAP that functions in access mode, the preferred method is tarpit
containment. Deauthentication containment works more effectively for AMs. Wired containment with ARP
poisoning is also effective for wireless clients and works for both AMs and IAPs that functions in access mode.
Aruba IPS Recommendations
Consult an RF security expert and your legal department to determine the security needs and legal implications
before enabling containment.
Aruba recommends this WIP wizard setting for protection:
Enable all critical attacks that are defined in the lowest setting and then customize them to meet the needs of your
network. If you enable all WIP protection features, too many alarms can interfere with the performance of your
network and neighboring WLANs.
83 | Designing Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Chapter 4
Designing Distributed Enterprise Networks with Aruba Instant
You can broadly classify distributed enterprise deployments into branch office deployments and home office
deployments, both of which differ in design and requirements. This chapter describes in detail how you can use
Aruba Instant to design a branch office deployment and a home office deployment.
Branch Office Deployments
A branch office is a location other than the main office, where business is conducted. The term, ‘branch’ means
different things to different organizations. For a retail chain, the term, ‘branch’ represents all the stores that serve
customers, whereas for a traditional hi-tech enterprise, a branch represents an offsite location where employees and
contractors come to accomplish day-to-day work.
Though the use cases and requirements of branch office networks vary across organizations, the key goal of any
branch office network is to support some or all of the below mentioned tasks:
l
Provide secure employee access
l
Provide guest access
l
Support different applications types such as voice and video
l
Support different device types, from mobile devices to printers, kiosks, and security cameras
l
Comply with standards such as PCI, HIPPA, CALEA, and so on
l
Secure sensitive data
l
Provide high availability
In terms of user and device density, branch office deployments are usually small and can be supported with a few
APs. A key requirement that influences the design of a distributed enterprise is the need to secure sensitive
corporate data that traverses the link between the remote site and the data center. To securely interconnect
branches, organizations have multiple WAN options such as leased lines, MPLS networks, and VPN over public
internet. Connecting branches using leased lines is expensive and it does not justify the cost when compared to
other technologies. Common choices for organizations to interconnect their branches are MPLS networks and VPN
over Internet broadband services, such as DSL, 3G/4G, and cable services.
Though MPLS is a form of VPN, the term VPN in this document refers to the WAN that is created by using
encrypted tunnels over the public internet.
The decision to use VPN versus MPLS for branch connectivity is based on factors such as cost, security policies,
and service availability. To simplify the design discussion, this chapter describes branch office deployments in the
following categories:
l
MPLS-based branch deployments
l
VPN-based branch deployments
The physical design of a branch network, with Aruba Instant is often influenced by the number of IAPs that are
required to support a branch. Depending on the user and device density, and the size of the branch, the number of
IAPs that are required to support a branch office might vary from a single AP to a few IAPs. Typically, any branch
that requires more than 20 IAPs often falls in the realm of small enterprises. This section describes branch office
deployments of 20 or fewer IAPs. You can classify the physical design options that are available with Aruba Instant
for branch office networks as follows:
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 84
l
Single-AP branches
l
Multi-AP branch
Single AP Branch
Single-AP branches are those that are supported by a single AP. These are branches with 30 or less wireless users
and a few wired devices. Examples of a single-AP branch include home offices, home-based call centers, small
retail stores of a coffee or restaurant chain, mobile clinics, offsite offices of law firms, realty groups, and so on.
In addition to wireless access, some single-AP deployments require support for a few wired devices. Therefore, IAP
models with extra wired ports are ideal for these deployments because they simplify the network design and
eliminate the need for additional switching equipment. Select an IAP model based on whether a branch requires
wireless only or wired and wireless access and consider factors such as wireless performance, AP mounting
(ceiling, wall, or table mount), wired port requirements, and uplink type (Ethernet uplink or 3G/4G USB modem). For
information about the available IAP models, see Aruba Instant.
Branch Office Deployments shows a typical single-AP deployment. In a single-AP deployment, the IAP serves both
the wireless and wired clients. The uplink Ethernet port of the IAP is directly plugged into the WAN uplink,
eliminating the need for additional networking infrastructure at the branch.
Figure 39 Typical single-AP deployment
With Aruba Instant, you can choose between multiple uplinks. Aruba Instant supports Ethernet-based WAN uplinks,
3G/4G uplinks, and Wi-Fi uplinks. Being able to choose from multiple uplinks in a single AP deployment allows you
to select the appropriate uplink based on service availability and lets you set up uplink redundancy. For more
information about Aruba Instant uplinks, see the Aruba Instant User Guide that is available at the Aruba support
website.
You can apply a single-AP design to both MPLS and VPN-based branch deployments.
Multi AP Branch
Branches that require more than a single AP to support the end users and devices are considered multi-AP branches.
The number of IAPs that are required by a multi-AP branch depends on the size of the branch, and the user, and
device density. Aruba Instant provides the following physical design options for multi-AP branches:
l
Hierarchical mode design
85 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
l
Flat mode design
Whether you select one option over the other is related to the number of IAPs that are required to support the branch.
Hierarchical Mode Design
Some multi-AP branches are small enough to be covered by four or fewer APs and to be deployed in hierarchical
mode or flat mode. In hierarchical mode, you can use the downlink ports of a multi-port IAP that is connected to the
WAN uplink as an uplink for other IAPs and wired devices in order to extend the network. The IAP that is connected
to the WAN uplink (called the root IAP) functions as the wired device for the network, provides DHCP services, and
provides a Layer 3 connection to the ISP WAN uplink with NAT. The root IAP is always the master of the Aruba
Instant network. The downlink port of the root IAP that connects to other IAPs can be a trunk or an access port that
is configured with a VLAN in local mode without authentication. The local mode VLAN functions as the AP VLAN for
the members IAPs that are connected to the root IAP of the hierarchical mode design. For information about local
mode, see Instant-VPN: Local Mode.
Only one IAP (the root IAP) in the network uses its downlink port to connect to the other IAPs. That is, IAPs in
hierarchical mode should not be deployed in a daisy chain fashion.
For hierarchical mode, the IAP that connects to the branch uplink must be a multi-port IAP like RAP-155. Aruba does
not recommend using hierarchical mode for multi-AP branches that require five or more IAPs. Hierarchical mode is
useful if a managed uplink switch is not available. In hierarchical mode, you can configure the uplink IAP for uplink
redundancy with alternate uplinks such as a secondary Ethernet uplink or a 3G/4G uplink.
If a managed uplink switch is available, Aruba recommends that you deploy the IAPs in flat mode.
In general, hierarchical mode design is more applicable to VPN-based branch deployments than to MPLS-based
deployments. MPLS-based deployments have either a single-AP design or a multi-AP design in flat mode. A typical
hierarchical deployment consists of the following components:
l
A direct wired WAN ISP connection or a 3G/4G uplink to the root IAP.
l
One or more DHCP pools for member IAPs (that is, one or more AP VLANs for member IAPs) and wired and
wireless user VLANs.
l
One or more downlink ports that are configured on a private VLAN (in local mode) without authentication to
connect to member IAPs. Note the following guidelines for downlink ports:
n
If the AP VLAN and wireless user VLANs are different, which is true for many deployments, the downlink port
of the root IAP to which the member IAPs connect must be a trunk port with the AP VLAN as the native
VLAN.
n
You can configure additional downlink ports of the root IAP with an appropriate VLAN and authentication for
wired clients.
n
Ensure that the downlink port that is configured for IAP access is not used for any wired client connection.
Branch Office Deployments and Branch Office Deployments are examples of the hierarchical mode design.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 86
Figure 40 Hierarchical mode design with IAPs
Figure 41 Hierarchical mode design with IAPs and an unmanaged switch
Flat Mode Design
Flat mode design is a default deployment model for a multi-IAP network. This mode is recommended for all branch
networks that require five or more IAPs. In this mode, all IAPs that support a branch are plugged into an uplink
switch. This physical network design is the same as the design that is used in small and medium enterprises. If the
IAP must support multiple VLANs or if the client VLAN and the AP VLAN are separate, the IAPs must be trunked to
an uplink switch that is VLAN-aware. That is, if the Aruba Instant cluster is required to support multiple VLANs, the
uplink switch must be a managed switch. For example, if the AP VLAN is VLAN 10, the employee VLAN is VLAN
20, and the guest VLAN is VLAN 30, the IAP should be trunked to the uplink switch with native VLAN 10 and tagged
VLANs 20 and 30.
No encapsulation tunnels exist between IAPs in an Aruba Instant cluster. The traffic that is generated by the IAPs
and clients in a cluster is forwarded on the respective AP and client VLANs.
87 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Flat mode design is applicable to both MPLS-based and VPN-based branch deployments.
Branch Office Deployments shows an example of a flat mode design.
Figure 42 Flat mode design
The logical network design options that are available with Aruba Instant vary for MPLS-based branch deployments
and VPN-based branch deployments and are described in the following sections.
MPLS-Based Branch Deployments with Aruba Instant
MPLS is popular in distributed enterprises such as healthcare that have several critical latency-sensitive
applications. Some key benefits of MPLS are high-availability, security, guaranteed SLAs, and QoS. When
organizations use an MPLS backhaul for branch connectivity, the MPLS backbone is provided by a service provider.
In these deployments, the MPLS service provider is also responsible for securing the customer data traversing the
MPLS network, handling the complex WAN routing issues, and honoring the SLAs, QoS, and high-availability
requirements of the WAN.
Depending on the size of the branch, the physical design of the Aruba Instant network in an MPLS-based branch
deployment can either be a single-AP design or a multi-AP design in flat mode.
Aruba Instant supports VPN functionality. However, VPN functionality is not required in an MPLS-based deployment
because data security over the WAN is handled by the MPLS provider. Therefore, the logic design of an Aruba
Instant network in an MPLS-based branch deployment differs from that of a VPN-based branch deployment. A
typical branch office network that connects to the MPLS backbone has the following network components:
l
Network access devices: Network access devices include WLAN system and switches that provide network
access to IAPs and end-user devices.
l
Customer edge router: The customer edge (CE) router is the router that interfaces with the provider edge (PE)
router. The provider edge router is an interface between the MPLS-based backhaul and the customer branch
network. The CE router at each branch injects the branch routes to the PE router using protocols such as Open
Shortest Path First (OSPF). The PE router connects to the MPLS core of the provider (P) routers and other PE
routers and interconnects the branch networks.
l
Network services: Depending on the type and size of the branch, network services such as DHCP, DNS, and
RADIUS are localized to the branch or centralized at a data center.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 88
In MPLS-based deployments, the branches are served by a dedicated local or centralized DHCP server and the
Aruba Instant network need not provide any DHCP services. The main function of the Aruba Instant WLAN system
in these types of branches is to provide secure client access and forward the appropriate traffic to the uplink network.
The following use cases describe the most common logical design options for MPLS-based branch deployments.
Use Case 1: Wireless Employee Access and Guest Access
This is a typical use case in MPLS-based branch deployments in which the WLAN system is required to provide
employee and guest access, and forward traffic on the appropriate VLAN to an uplink managed switch.
The following requirements and components are common in this type of design:
l
Dedicated VLAN for employee access (with WPA2 security)
l
Role-based access and BYOD for employees
l
Dedicated VLAN for guests
l
Captive portal for guest authentication and authorization
l
Centralized or local DHCP and RADIUS services (a WLAN system is not required to provide DHCP services)
l
IAPs on a dedicated AP VLAN
l
Uplink managed switch for IAPs and wired clients
l
CE router to interface with the MPLS backbone
The Aruba Instant solution for this type of requirement is as follows:
l
Employee SSID with appropriate authentication (WPA2-Enterprise) that is mapped to the employee VLAN. After
enforcing the appropriate firewall policies, the IAPs bridge the employee traffic to the employee VLAN on the
uplink switch.
l
Role based access and BYOD for employees on the employee SSID. For more information about role-based
access and BYOD on an Aruba Instant network, see the Aruba Instant User Guide that is available at the Aruba
support website.
l
Guest SSID that is mapped to the appropriate VLAN and captive portal authentication. (This applies only to
environments that require guest access) Guests can be supported with the internal captive portal page and guest
management features that are supported by Aruba Instant or a centralized ClearPass server. For information
about guest access, see the Aruba Instant User Guide available at the Aruba support website. After enforcing the
appropriate firewall policies, the IAPs bridge the guest traffic to the guest VLAN on the uplink switch.
l
As an option, dynamic RADIUS proxy in environments in which adding all IAPs as NAS clients to a RADIUS
server is not feasible. For more information about dynamic RADIUS proxy, see Dynamic RADIUS Proxy.
l
Uplink switch and CE router for traffic engineering.
Use Case 2: Wireless Employee Access and Guest Access with the Ability to Tunnel the
Guest Traffic to a Central DMZ
Use case 2 is common if the security policy of an organization requires that all the guest traffic from branches is
handled at a central Demilitarized Zone (DMZ). These requirements and components are common in this type of
design:
l
Employee Access (WPA2 security) with a dedicated VLAN
l
Role-based access and BYOD for employees
l
Guest access on a dedicated VLAN.
l
Captive portal for guess access with a central captive portal server
l
Tunneling of all guest traffic to a DMZ for centralized handling of guest traffic
89 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
l
Dedicated centralized or local DHCP and RADIUS services for employee access
l
Central DHCP service for guest access
l
IAPs on a dedicated AP VLAN
l
Uplink managed switch for IAPs and wired clients
l
CE router to interface with the MPLS backbone
The typical Aruba Instant solution for this type of requirement is as follows:
l
Employee SSID with appropriate authentication (WPA2-Enterprise) that is mapped to the employee VLAN. After
enforcing the appropriate firewall policies, the IAPs bridge the employee traffic to the employee VLAN on the
uplink switch. For example, if all employee traffic on the employee SSID must be forwarded to employee VLAN
20 on the uplink switch, the employee SSID must be mapped to VLAN 20.
l
Role-based access and BYOD for employees on the employee SSID. For more information about role-based
access and BYOD on an Aruba Instant network, see the Aruba Instant User Guide that is available at the Aruba
support website.
l
Uplink switch and CE router for traffic engineering of employee traffic.
l
As an option, dynamic RADIUS proxy in environments in which adding all IAPs as NAS clients to a RADIUS
server is not feasible. For more information about dynamic RADIUS proxy, see Dynamic RADIUS Proxy.
l
Guest SSID with captive portal authentication to tunnel the guest traffic to an Aruba controller in the DMZ, using
the following Generic Routing Encapsulation (GRE) capabilities on Aruba Instant:
n
To tunnel guest traffic using GRE, the guest SSID must be configured with a VLAN in centralized Layer 2
mode and the Aruba Instant cluster must be configured for GRE. For more information about centralized Layer
2 mode, see Instant-VPN: Centralized L2 Mode.
n
Aruba Instant supports either Auto-GRE with Aruba controllers or a manual GRE configuration with Aruba
controllers and other GRE endpoints. Aruba recommends Auto-GRE because it simplifies the network design
by eliminating manual configuration of GRE tunnels for each branch or each individual IAP.
n
Aruba Instant supports either per-AP GRE tunnels or single GRE tunnels (that is, a setup from the master AP
of the cluster) for an Aruba Instant cluster. For information about GRE in Aruba Instant, see Appendix B: GRE
with Aruba Instant. n
If you configure a single GRE for an Aruba Instant cluster, the GRE tunnel is initiated by the master AP of that
cluster. If you use a multi-AP flat mode design with a single GRE tunnel, the guest traffic from the member
IAPs must first reach the master AP before it is tunneled to the DMZ controller. The uplink switch that
connects the IAPs must support the guest VLAN because the guest traffic from the member IAPs to the
master AP is forwarded on the guest VLAN.
n
If a per-IAP GRE tunnel is enabled, each IAP in a cluster forms a GRE tunnel to the DMZ controller and the
uplink switch that connects the IAPs does not need to support the guest VLAN. The IAP to which the guest is
connected tunnels the guest traffic directly to the DMZ controller.
n
All guest traffic can be tunneled to the DMZ controller using a routing profile of “0.0.0.0 0.0.0.0 <GRE tunnel IP
address of the DMZ controller>”. For more information about routing profiles, see Configuring a Routing
Profile.
The routing profile also affects any traffic that is generated by the IAP such as RADIUS and Syslog traffic.
Creating a routing profile of “0.0.0.0 0.0.0.0 <GRE tunnel IP address of the DMZ controller>” allows the
RADIUS traffic for employees to be forwarded through the tunnel. However, in certain deployments, it is not
necessary. Any traffic that should not be tunneled to the DMZ controller must be added to the routing profile
with the gateway IP address field set to 0.0.0.0.
For example, if traffic to the RADIUS server with IP address 10.10.10.10 and the Syslog server with IP
address 10.10.10.11 must be forwarded outside the tunnel by using the gateway of the IAP, the below entries
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 90
should be added to the routing profile:
10.10.10.10 255.255.255.255 0.0.0.0
10.10.10.11 255.255.255.255 0.0.0.0
This will ensure that the traffic to these destinations is forwarded through the default gateway of the IAP and
not through the GRE tunnel. Aruba InstantOS 4.x and greater is required for this configuration.
Since employee traffic is on the branch VLAN that is managed by the uplink infrastructure and not by the IAP,
the routing profile does not affect the employee traffic.
VPN-Based Branch Deployments with Aruba Instant
Connecting branches using MPLS has its advantages but is not the best option for some branch office deployments
because of cost and service availability. With cost savings being a key driver in the adoption of distributed enterprise
strategy, organizations seek a more affordable alternative to MPLS. Internet broadband service with better service
availability and affordability provide an attractive alternative to an MPLS-based WAN. Over the years, both the
consumer grade and business grade broadband services have become faster, more reliable, and more affordable.
Many organizations prefer switching to a broadband service for branch and home office connectivity. Especially for
organizations that support home-based employees, broadband is the only choice because connecting home offices
with an MPLS-based WAN is not a viable solution.
Data security over the WAN which is handled by the service provider in an MPLS-based deployment, is the
responsibility of the corporate IT team when a public Internet is used for branch connectivity. The most common
VPN technologies that provide secure remote access are SSL VPN and IPsec VPN. SSL VPN is suited to provide
remote access to a specific application but is not suitable for connecting networks. Therefore, IPsec VPN is the
most common choice for securely extending corporate networks and resources to remote sites. IPsec VPN protects
sensitive data by interconnecting the remote sites with secure encryption tunnels over the Internet.
Traditional implementation of IPsec VPN was site-to-site. Implementing IPsec VPN requires IPsec-capable
hardware at the remote site and involves complex configurations. Most branch sites have limited or no IT staff
onsite, so interconnecting branches using IPsec VPN can be a challenge.
Complexity is one of the main issues that is associated with the classic site-to-site VPN. To deploy a site-to-site
IPsec VPN, organizations configure and ship a branch router or VPN gateway to each location. To create a site-tosite VPN, the following tasks are involved:
l
Configuring the IPsec tunnel parameters, including the key management protocol (IKEv1 or IKEv2), security
protocol (AH or ESP), IPsec encapsulation mode (tunnel mode or transport mode), encryption key, encryption
algorithm (DES, 3DES, or AES), authentication key or certificates, and authentication algorithm (SHA or MD5)
l
Configuring a routing protocol such as OSPF between the data center and remote branches
l
Configuring a GRE tunnel within the IPsec tunnel to carry the multicast advertisements of routing protocols
In other words, the complexity and cost involved in deploying and managing a classic site-to-site IPsec VPN is a
challenge to IT departments.
Aruba Instant is designed to solve the complexity that is associated with site-to-site IPSec VPN. With the Aruba
Instant built-in VPN capabilities and zero-touch provisioning, VPN deployments are easy. The zero-touch
provisioning capability of Aruba Instant reduces deployment costs and eliminates the complexity that is associated
with traditional IPsec VPN deployments.
91 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Understanding Instant-VPN (Aruba Instant-VPN in a Nutshell)
This section describes how you can design a branch with Instant-VPN and what the different modes of operation are.
The Aruba Instant-VPN solution has three components:
l
Aruba IAPs at the branch sites
l
Aruba WLAN controller at the data center
l
AirWave and Aruba Central
The master AP (that is, the VC) at the branch functions as the VPN endpoint and the Aruba WLAN controller at the
data center functions as the VPN concentrator. If an Aruba Instant cluster is configured for VPN, the master AP of
the cluster establishes an IPsec tunnel (using IKEv2) with the WLAN controller to secure the sensitive corporate
data. The IPsec authentication and authorization between the WLAN controller and the IAP is based on TPM-based
Aruba certificates and the RAP whitelist in ArubaOS.
Only the master AP in an IAP cluster can establish a VPN tunnel.
From an Aruba WLAN controller perspective, the master AP that establishes the VPN tunnel is considered a VPN
client and not an AP. Therefore, the traditional AP count of a WLAN controller platform does not apply to this
architecture. Instead, the WLAN controller scalability in the Aruba Instant-VPN architecture depends on factors such
as the IPsec tunnel limit and routing table limit. Since the WLAN controller does not count the master AP as an AP,
controller licenses such as the AP capacity license, per-AP PEFNG license, and RFProtect license do not apply to
this architecture.
The function of the WLAN controller in the Aruba Instant-VPN architecture is to terminate VPN tunnels and route or
switch VPN traffic. The WLAN controller is not responsible for configuring, managing, reporting, or monitoring the
IAP networks in remote branches. Instead, these responsibilities are handled by AirWave or Aruba Central. Aruba
Instant uses a distributed architecture, so features and functions such as role-based access control, bandwidth
contracts, ARM, WIPS, mobility, and Application Level Gateways (ALGs) are local to the Aruba Instant network at
the branch and are not the responsibility of the WLAN controller.
Licensing
The WLAN controller considers the master AP that establishes a VPN tunnel a VPN client and not an AP, so
licenses such as the AP capacity license, per-AP PEFNG license, and RFProtect license are not required. When an
IPsec connection is established between the WLAN controller and an IAP, each end of the IPsec tunnel has two IPs
addresses: an inner IP address and an outer IP address. By default, the WLAN controller assigns these two roles to
the inner and outer IP addresses of an IAP that terminates its VPN tunnel on the WLAN controller:
l
Outer IP address: logon role
l
Inner IP address: default VPN role with an “allow all” access control list (ACL)
Although you do not need licenses to terminate an IAP-VPN tunnel on the WLAN controller, you need a PEFV
license in one of the following scenarios:
l
Changing the ACLs in the default VPN role: In this scenario, you need a PEFV license for each WLAN
controller. A common reason to change the ACL is to limit the number of RADIUS client entries in the RADIUS
server. For instance, an organization with 100 branches an 10 IAPs per branch should add all IP addresses that
are used as inner IP addresses for IAP VPN tunnels (that is, the IP addresses that are defined as the VPN
address pool on the WLAN controller) as RADIUS clients to allow 802.1X authentication with the RADIUS server
in the data center. Alternatively, you can modify the default VPN role to include a rule that source NATs all
RADIUS traffic to the IP address of the WLAN controller. With such a source NAT rule, you only need to add the
WLAN controller as a RADIUS client on the RADIUS server.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 92
l
Changing the role that is applied to the inner IP address and the ACLs within that role: In this scenario,
you need a PEFV license for the WLAN controller.
Aruba Instant-VPN License Requirements summarizes the licensing requirement.
Table 12: Aruba Instant-VPN License Requirements
Licenses
Features
Base
ArubaOS (no
licenses)
IAP can terminate a VPN tunnel and pass VPN traffic.
Roles and policies are not editable.
ArubaOS
with a PEFV
license
(PEFV is a
per-unit
license)
IAP can terminate a VPN tunnel and pass VPN traffic.
The default role in the default IAP VPN authentication profile of a WLAN controller can be edited and a
new user role with custom firewall policies can be applied to the default IAP VPN authentication
profile.
WLAN Controller Scalability for Instant-VPN deployments
The number of Instant-VPN branches that can be supported on a WLAN controller depends on the WLAN controller
model. Choose an appropriate controller model based on the size of your deployment. Instant-VPN scalability for
different Aruba WLAN controller models shows the Instant-VPN scalability for different Aruba WLAN controller
models.
Table 13: Instant-VPN scalability for different Aruba WLAN controller models
Controller
Maximum recommended IAP VPN branches
7240
8192
7220
4096
7210
2048
7205
1024
7030
256
7024
128 (Upcoming)
7010
128
7005
64
M3
2048
3600
512
3400
256
3200-XM
128
93 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
AP Selection for Instant-VPN Deployments
An Aruba Instant network that is configured for Instant-VPN establishes a single IPsec tunnel from the master AP of
the cluster to the WLAN controller. Therefore, it is important to choose the right IAP for your deployment. Although all
IAP models have gigabit uplink ports, the IPsec throughput for each IAP model varies. IAP Models and IPsec
Throughput shows the IPsec throughput for different IAP models.
Table 14: IAP Models and IPsec Throughput
IAP Model
IPsec Throughput (in Mb/s)
IAP-225
150
IAP-224
150
IAP-135
40
IAP-134
40
IAP-105
15
IAP-104
15
RAP -155
80
RAP -109
20
RAP -108
20
RAP-3
20
IAP-175
15
IAP-92
10
IAP-93
10
Firewall Ports
Instant-VPNs connect to the WLAN controller on UDP port 4500 for establishing the IPsec connection. UDP port
4500 must be open on all firewalls that lead up to the WLAN controllers in the DMZ.
Understanding Instant-VPN Modes
The classic RAP architecture has four forwarding modes: tunnel, split-tunnel, decrypt-tunnel, and bridge mode.
These forwarding modes control how user traffic is handled, including where decryption occurs and where role-based
firewall policies are applied. The ability to forward user traffic to corporate and local destinations also depends on the
selected forwarding mode. In tunnel, decrypt-tunnel, and split-tunnel modes, the classic RAP architecture extends
the corporate VLAN to the remote location, that is, the broadcast domain is extended to the branches. The default
gateway resides in the data center for the clients that connect to an SSID or wired port operating in one of these
modes. For clients that connect to a bridge-mode network, the default gateway is the RAP but corporate access is
not available. Forwarding Modes for Classic RAPs provides an overview of the capabilities of the different
forwarding modes that are available for classic RAPs. For more information about the forwarding modes of classic
RAPs, see the Aruba Remote Access Points (RAP) Validated Reference Design.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 94
Table 15: Forwarding Modes for Classic RAPs
Forwarding
Mode
Firewall
Processing
Traffic Engineering
Site Survivability
Tunnel
802.11
encryption
and
decryption
and firewall
processing
occur on the
WLAN
controller.
User traffic is forwarded to the WLAN
controller through the IPsec tunnel.
Traffic cannot be bridged to a local
destination.
WAN-dependent. If the connection to the
WLAN controller is lost, the SSIDs and
wired ports operating in this mode are shut
down.
Decrypt
tunnel
802.11
encryption
and
decryption
occur at the
AP, but
firewall
processing
occurs on the
WLAN
controller.
User traffic is forwarded to the WLAN
controller through the IPsec tunnel.
Traffic cannot be bridged to a local
destination
WAN-dependent. If the connection to the
WLAN controller is lost, the SSIDs and
wired ports operating in this mode are shut
down.
Split-tunnel
802.11
encryption
and
decryption
and firewall
processing
occur at the
AP.
With appropriate firewall policies, the
user traffic that is destined to
corporate servers can be forwarded
to the WLAN controller through the
IPsec tunnel. The traffic to local and
Internet destinations can be source
NATed by APs to the local network.
WAN-dependent. If the connection to the
WLAN controller is lost, the SSIDs and
wired ports operating in this mode are shut
down.
Bridge
802.11
encryption
and
decryption
and firewall
processing
occur at the
AP.
User traffic is bridged and
source NATed to local destinations.
Traffic cannot be forwarded to the
WLAN controller through the IPsec
tunnel.
Varies based on the operation mode.
Bridge-forwarding mode has four operation
modes (standard, always, persistent, and
backup). For more information about these
operation modes and their capabilities, see
the Aruba Remote Access Points (RAP)
Validated Reference Design .
Do not confuse the classic RAP solution with AP part numbers that start with a RAP prefix (that is, RAP-3, RAP109, and RAP-155). All latest APs with part numbers that start with a RAP prefix can operate in either the classic
RAP mode or the Instant-VPN mode. The RAP part number indicates that the AP is designed for table mount.
95 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
The Instant-VPN architecture differs from the classic RAP architecture in the following ways:
l
The 802.11 encryption and decryption and firewall processing in an Instant-VPN always occur at the IAP in the
branch.
l
Traffic forwarding behavior in an Instant-VPN is similar to that of split-tunnel mode in a classic RAP solution.
User traffic can be forwarded through the IPsec tunnel or bridged locally, based on the destination. If required,
traffic to any destination can be forwarded through the IPsec tunnel or bridged locally. (These options are
comparable to the traffic engineering behavior of tunnel, decrypt-tunnel, and bridge forwarding modes in a classic
a RAP solution).
l
The Instant-VPN architecture has five modes of operation. These modes do not determine how firewall
processing and traffic forwarding occur. Rather, they define whether a branch is a Layer 2 extension, Layer 3
extension, or independent, that is, these modes determine whether the DHCP server and default gateway for
clients reside at the branch or at the data center.
The following modes are available in the Instant-VPN architecture:
l
n
Local mode
n
Centralized L2 mode
n
Distributed L2 mode
n
Distributed L3 mode
n
Centralized L3 mode
Aruba Instant architecture provides site survivability in all modes of operation.
Aruba recommends Centralized L2 & Distributed L3 modes of operation, as they are a better fit for deployments &
traffic engineering objectives.CL3 and DL2 are meant for specialized use cases where there is a need achieved
centralized DHCP, with a routed network and Distributed DHCP with centralized forwarding and are not
discussed in detail, as they are not common use cases. Hence, these modes will not be explained or mentioned in
future sections.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 96
The table below, summarizes the key features of the different modes in the Instant-VPN architecture.
Table 16: Instant-VPN Modes
InstantVPN
Mode
Firewall
processing
Traffic
Engineering
Site Survivability
Branch Subnet
Local
Mode
802.11 encryption
and decryption
and firewall
processing occur
on the IAP in the
branch.
User traffic can be
forwarded through
the IPsec tunnel or
bridged locally,
based on the
destination.
Supported. (The IAP
authentication
survivability feature even
provides 802.1X
survivability when the
WAN is down.)
The branch subnet is
independent (that is, the
subnet is local to the branch,
similar to a home network
but with VPN capabilities.)
Centralized
L2
802.11 encryption
and decryption
and firewall
processing occur
on the IAP in the
branch.
User traffic can be
forwarded through
the IPsec tunnel or
bridged locally,
based on the
destination.
Supported. (The IAP
authentication
survivability feature even
provides 802.1X
survivability when the
WAN is down.)
The branch is a
Layer 2 extension.
Distributed
L3
802.11 encryption
and decryption
and firewall
processing occur
on the IAP in the
branch.
User traffic can be
forwarded through
the IPsec tunnel or
bridged locally,
based on the
destination.
Supported. (The IAP
authentication
survivability feature even
provides 802.1X
survivability when the
WAN is down.)
The branch is a
Layer 3 extension.
Instant-VPN: Local Mode
Local mode is similar to the local network of a home wireless router but with VPN capabilities and other enterprise
grade features. In this mode, the IAP cluster at the branch has a local subnet (for example, 192.168.200.0 /24) and
the master AP of the cluster functions as the DHCP server and gateway for clients. The local mode provides VPN
capabilities using the inner IP address of the Instant-VPN IPsec tunnel.
Client traffic that must be forwarded to the corporate destinations is source NATed by the master AP using the inner
IP address of the IPsec tunnel. Traffic that is destined for the Internet or local destinations is source NATed using
the local IP address of the master AP. It is essential that the IP addresses that are defined in the VPN address pool
of the WLAN controller (which is used for inner IP addresses of IPsec tunnels) are routable from the upstream router
in the data center. If required, all client traffic can be forwarded through the IPsec tunnel or bridged locally. For
information about VPN address pools, see Defining the VPN Pool on a WLAN Controller.
In local mode, clients in the branch can initiate connections to a server in the data center but the connections cannot
be initiated from the data center to remote clients. (This behavior is similar to that of a NAT device). The WLAN
controller and the upstream routers have no visibility or direct route to the branch subnet. Therefore, you cannot
initiate connections from the data center to remote clients for troubleshooting. The local mode is well suited for
branch guest networks that use a captive portal sever in the data center for guest authentication.
97 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Below figure shows the traffic flow in local mode.
Figure 43 Packet flow in Instant-VPN local mode
To summarize, the key features of the Instant-VPN local mode are as follows:
l
The master AP in the IAP cluster is the DHCP server for clients.
l
The master AP in the IAP cluster is the default gateway for clients.
l
Traffic to the data center is source NATed with the inner IP address of the IPsec tunnel.
l
Traffic to the Internet or a local destination is source NATed with the local IP address of the master AP in the IAP
cluster.
l
The VPN pool for inner IP addresses of the IPsec tunnel must be routable from the upstream router of the WLAN
controller in the data center.
l
Traffic can be initiated from the branch to the data center, but traffic cannot be initiated from the data center to the
branch.
For an example of a local mode configuration, see Configuring an IAP for Instant-VPN Deployment.
Instant-VPN: Centralized L2 Mode
Centralized L2 mode is analogous to the L2 extension in a classic RAP solution. This mode extends the corporate
VLAN and the broadcast domain to remote branches. The DHCP server and the gateway for the clients reside in the
data center. Either the WLAN controller or an upstream router can be the gateway for the clients. For DHCP services
in centralized L2 mode, Aruba recommends that you use an external DHCP server and not the DHCP server on the
WLAN controller.
Client traffic that is destined for data center resources is forwarded by the master AP through the IPsec tunnel to the
default gateway of the client in the data center. Any traffic that is destined for the Internet or a local destination is
source NATed using the local IP address of the master AP and bridged locally. If required, all client traffic can be
forwarded through the IPsec tunnel or bridged locally. An easier configuration method to, send all client traffic over
IPsec tunnel is introduced, called “Split tunnel mode->disable”.
In centralized L2 mode, you can initiate a connection from the data center to remote clients for troubleshooting.
If the RADIUS traffic is not source NATed at the WLAN controller, you must make the VPN pool for inner IP
addresses routable for RFC 3576-compliance and 802.1X. A routable VPN address pool also allows access to the
local WebUI of the Aruba Instant cluster from the data center. For information about VPN address pools, see
Defining the VPN Pool on a WLAN Controller.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 98
By default, the ARP messages of a client for its gateway are forwarded to the data center through the IPsec
tunnel. However, if the WAN is down, the master AP of the cluster does proxy ARP for the default gateway in the
data center.
The centralized L2 mode extends the corporate VLAN to remote branches, enabling broadcast and multicast traffic
to traverse the WAN between the branch and data center. However, in centralized L2 mode, broadcast and multicast
traffic might saturate the WAN link. Therefore, when you deploy a branch in centralized L2 mode, Aruba
recommends that you use smaller subnets for user VLANs. For example, use a /24 or /23 network for a user VLAN
instead of a /16 network that spans several thousand branches. If an organization with 1000 branches and a
maximum of 50 clients per branch has a mandate to extend the data center VLAN to remote branches, Aruba
recommends grouping the branches as follows:
l
5 branches per group, with each group sharing a /24 user VLAN, resulting in 200 groups
l
10 branches per group, with each group sharing a /23 user VLAN, resulting in 100 groups
Grouping the branches into smaller subsets increases the number VLANs and the number of groups and folders in
AirWave but minimizes WAN bandwidth consumption.
Aruba recommends the centralized L2 mode only if Layer 2 extension is mandatory for branches. The mode is well
suited for organizations that stream multicast videos to remote branches. Below Understanding Instant-VPN (Aruba
Instant-VPN in a Nutshell) shows the traffic flow in centralized L2 mode.
Distributed L3 mode is the recommended mode of operation for Instant-VPN networks. Use centralized L2 mode
only for organizations that mandate extension of corporate VLANs to branch networks.
Figure 44 Packet flow in instant-VPN centralized L2 mode
You can summarize the key features of the Instant-VPN centralized L2 mode as follows:
99 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
l
The DHCP server for the clients is in the data center.
l
The default gateway for the clients is in the data center.
l
ARP messages for the default gateway are forwarded to the data center, except if the WAN is down.
l
If the WAN is down, the master AP of the cluster does proxy ARP for the gateway of the client.
l
Traffic to the data center is forwarded to the default gateway of the client through the IPsec tunnel.
l
Traffic to the Internet or a local destination is source NATed with the local IP address of the master AP.
l
The split tunnel feature is enabled by default. If the split tunnel feature is disabled, then irrespective of any
configuration under the routing profile, all client traffic, for this VLAN, is sent to the data center over the IPSec
tunnel. This feature was introduced as a centralized L2 mode. This feature is useful when all traffic should be
tunneled over the IPSec tunnel to the data center and no traffic should be split tunneled and source NATed over
VC IP. This feature was introduced to achieve this easily for a particular VLAN.
l
Configuring a routable VPN address pool which is used for inner IP addresses of the IPsec tunnel, allows access
to the local WebUI of the Aruba Instant cluster from the data center.
l
If RADIUS traffic is not source NATed at the WLAN controller, configuring a routable VPN address pool is also
essential for 802.1X. To support RFC-3576, the RADIUS traffic must not be source NATed at the WLAN
controller and a routable VPN address pool is required.
l
Aruba recommends that you use small VLAN subnets as user VLANs to reduce the broadcast and multicast
traffic across the WAN.
Instant-VPN: Distributed L3 Mode
Aruba recommends distributed L3 mode for organizations that do not require Layer 2 extensions. Distributed L3
mode contains all broadcast and multicast traffic to a branch and eliminates any WAN bandwidth consumption
challenges that are associated with classic RAPs and Instant-VPN L2 modes. Distributed L3 mode reduces the cost
and eliminates the complexity that is associated with the classic site-to-site VPN. However, in terms of
functionality, distributed L3 mode is very similar to a classic site-to-site IPsec VPN in which two VPN endpoints
connect individual networks over a public network.
In distributed L3 mode, each branch location is assigned a dedicated subnet. The master AP in the branch manages
the dedicated subnet and functions as the DHCP server and gateway for clients. Client traffic that is destined for
data center resources is routed to the WLAN controller through the IPsec tunnel. The WLAN controller then routes
the traffic to the appropriate corporate destinations.
Any traffic to the Internet or a local destination is source NATed using the local IP address of the master AP and
bridged locally. The WLAN controller in the data center is aware of the Layer 3 subnet at each branch and can
redistribute these routes to upstream routers through OSPF. If required, all client traffic can be forwarded through the
IPsec tunnel or bridged locally.
In distributed L3 mode, you can initiate a connection from the data center to remote clients for troubleshooting.
If RADIUS traffic is not source NATed at the WLAN controller, the VPN pool that is used for inner IP addresses of
the IPsec tunnel must be routable for RFC 3576-compliance and 802.1X. For details about VPN address pools, see
Defining the VPN Pool on a WLAN Controller.
In distributed L2 mode, the BID allocation process is essential for the operation of distributed L3 mode. In distributed
L3 mode, after you configure a large subnet and define the number of clients per branch, the BID allocation algorithm
allocates a dedicated subnet to each branch by dividing the large address space into smaller subnets, based on
client count.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 100
For example, an organization with a configuration of 10.10.0.0 /16 with 250 clients per branch can support 256
branches with a /24 subnet for each branch. In this example, the BID allocation process determines the /24 network
that is allocated to each branch. The BID allocation algorithm is essential to avoid subnet overlap across branches.
The WLAN controller depends on the BID allocation process to determine the active branches and redistribute the
appropriate routes using OSPF. The WLAN controller redistributes routes through OSPF only for those branches that
are up and running. If a branch goes down, the WLAN controller removes that branch from its OSPF route
redistribution.
Organizations would like to upgrade their existing branch infrastructure while retaining the same address pool
because their branches include devices with static IP addresses. To accommodate this requirement, Aruba Instant
OS 3.3 and greater enables you to assign predefined subnets to branches in the distributed L3 mode. For information
about configuring distributed L3 mode, see Instant-VPN: Distributed L3 Mode.
You must run Aruba Instant OS 3.3 or greater and ArubaOS 6.3 to support the configuration of predefined subnets
per branch. For more information, see Configuring an IAP for Instant-VPN Deployment.
You must run ArubaOS 6.3 or greater to support redistribution of Instant-VPN branch routes through OSPF.
Below figure shows the traffic flow in distributed L3 mode.
Figure 45 Packet flow in instant-VPN distributed L3 mode
To summarize, the key features of the Instant-VPN distributed L3 mode as follows:
l
Contains broadcast and multicast traffic to a branch.
l
The BID allocation process must occur when the branch site comes up for the first time. Until BID allocation is
complete, the master AP cannot lease IP addresses to the clients in the branch.
l
The DHCP server for clients is the master AP in the cluster.
l
If the WAN is down, a client can renew its DHCP lease and a new client can receive an IP address.
l
The master AP in the cluster is the default gateway for the clients in the branch.
l
Traffic to the data center is routed through the IPsec tunnel to the WLAN controller.
101 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
l
Traffic to the Internet or a local destination is source NATed with the local IP address of the master AP.
l
Configuring a routable VPN address pool, which is used for inner IP addresses of the IPsec tunnel, allows
access to the local WebUI of the Aruba Instant cluster from the data center.
l
If RADIUS traffic is not source NATed at the WLAN controller, configuring a routable VPN address pool is also
essential for 802.1X. To support RFC-3576, the RADIUS traffic must not be source NATed at the WLAN
controller and a routable VPN address pool is required.
l
The WLAN controller uses OSPF to redistribute branch routes to the upstream router. (The WLAN controller must
run ArubaOS 6.3 or greater.)
l
In small deployments with a single master WLAN controller and a VRRP backup WLAN controller, the upstream
router can use a static route that points to the VRRP IP address between the WLAN controllers as the next hop
for branch subnets.
l
Static routes cannot be used in multi-WLAN controller environments. OSPF is required in a multi-WLAN
controller environment and for geographical redundancy.
l
Please note that DL3 does not have a split tunnel knob, like CL2. In CL2 deployments, this knob has more
frequent use case. To achieve similar objective in DL3, use routing profiles.
Branch-ID Allocation Algorithm
For branches that are deployed in distributed L3 mode, the master AP in the branch and the WLAN controller must
coordinate the subnet and IP addresses that are used for DHCP services in the branch. The VC and WLAN
controller determine the subnet and IP addresses that are used in a branch through BID allocation process. (The BID
allocation process is not essential for branches that are deployed in local or centralized L2.)
The BID allocation process includes the following key functions:
l
Determination of the IP addresses that are used in a branch for distributed L2 mode
l
Determination of the subnet that is used in a branch for distributed L3 mode
l
Prevention of IP address or subnet overlap (IP address conflicts must be prevented)
l
Allocation of the same subnet or range of IP addresses to a branch, irrespective of which AP in the branch is the
master AP in the cluster
l
Allocation of a branch subnet that remains consistent during failover to a backup WLAN controller
BID Allocation Process Details
The BID allocation process consists of these steps:
When a branch comes up for the first time, one AP in the branch is elected as the master AP through the election
algorithm.
The master AP in a cluster generates and distributes a branch key to all member IAPs in the cluster. This branch key
is generated by hashing the MAC address of the master AP. The branch key plays a significant role in ensuring that a
branch is allocated the same subnet and IP addresses, irrespective of which IAP becomes the master AP of the
cluster at a later stage. The branch key is generated even for IAP clusters that are not configured for Instant-VPN.
The master AP forms an IPsec connection to the primary host (that is, the primary WLAN controller) and obtains an
inner IP address from the VPN address pool that is configured on the WLAN controller.
If the IAP cluster is configured for VPN in distributed L3 mode, the master AP starts the BID allocation process by
sending a registration message to the WLAN controller. This registration message includes these variables:
Inner IP: The inner IP address of the master AP that has established an IPsec tunnel to the WLAN controller.
Branch Key: The branch key that was generated and distributed to all member IAPs by the first master AP of the
cluster.
MAC: The MAC address of the master AP that participates in the BID process.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 102
MAX_BID and subnet name: The maximum number of subnets or IP address blocks that can be created based on
the subnet size and client count in the distributed L3 and distributed L2 configuration on IAP. For examples on MAX_
BID calculation, see MAX-BID Calculation Examples.
In addition to the MAX_BID, the IAP sends the corresponding subnet name. The subnet name is derived from the
start and end IP address configuration and the client count for each mode. For example, if an organization uses
10.10.0.0 /16 with 250 clients per branch, the IP configuration on the IAP is 10.0.0.0 – 10.10.255.255 instead of
10.10.0.0/16. The subnet name for this distributed L3 subnet is “10.0.0.0 – 10.10.255.255.250”. The subnet name
keeps track which MAX_BID applies to which distributed mode configuration. If a branch is configured for multiple
distributed modes, the IAP sends multiple combinations of MAX_BID and corresponding subnet names to the
WLAN controller. This method allows a branch to have multiple SSIDs that use different distributed modes and
different subnet sizes. For example an organization can have an SSID_1 with distributed L3 mode and a
configuration of "10.10.0.0 /16” with 250 clients per branch and SSID_2 with distributed L3 mode and a configuration
of "10.20.0.0 /16” with 100 clients per branch.
BID: The value that specifies whether a branch is new or already has a BID. A new branch uses a unique value in
this field to specify that it requires a BID from the MAX_BID range. In a branch that has already a BID allocated, the
master AP might go down and a new AP might be elected as the master AP. When the new master AP connects to
the WLAN controller, it uses the previously allocated BID in this field.
Backup: It is the value that specifies whether the master AP is communicating with a backup host. A backup host is
a backup WLAN controller to which the master AP can initiate an IPsec connection. A backup host is similar to a
backup local management switch (BLMS) controller in ArubaOS and it does not represent a VRRP backup to a
WLAN controller.
The BID allocation process occurs only between the primary host and the master AP. So when a branch comes up
for the first time, the WLAN controller that functions as the primary host must be up. That is, any Instant-VPN branch
that comes up from factory defaults and that is configured for distributed L3 mode must exchange its very first BID
process with its primary host for allocation of the address space or subnet that is required for the distributed L3
mode.
Upon receiving the BID registration message, the WLAN controller determines whether a branch is new by
examining the BID field. If the branch is new, the WLAN controller verifies whether the branch key in the registration
message is present in its database (DB). If the branch key is not in the DB, the WLAN controller selects an unused
BID from the MAX_BID range and returns it to the master AP. If the branch key is already present in the WLAN
controller DB, the WLAN controller returns the BID that is already associated with the branch key.
The possibility that a master AP represents itself as a new branch when the branch key is already registered in the
WLAN controller DB is very rare. However, the BID process is designed to prevent an IAP from losing its BID
because of a crash.
When the BID is allocated, the master AP uses the BID to determine the IP subnet or IP addresses that must be
used. The following examples describe how the subnets are determined, based on BID value:
Consider an organization that uses a “10.10.0.0 /16” configuration with 250 clients per branch as the distributed L3
mode configuration on IAPs in 200 branches. This configuration can support 256 branches. If a branch is assigned a
BID of 0, it takes the first available /24 subnet. The subnet for the branch is 10.10.<bid>.0/24 = 10.10.0.0 /24. If a
branch is assigned a BID of 50, the subnet for the branch is 10.10.<bid>.0 /24 = 10.10.50.0 /24.
After determining the IP address or the subnet that must be used, the master AP registers the IP addresses and IP
subnet with the WLAN controller, using the ROUTE ADD and VLAN ADD messages. The ROUTE ADD message
reports to the WLAN controller about the L3 subnet that is used by an IAP in the branch and the VLAN ADD
message reports to the WLAN controller about the L2 VLAN that is used in the branch.
103 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Even though the BID process is not used for the centralized L2 mode, the VLAN ADD and ROUTE ADD messages
are used by branches in centralized L2 and centralized L3 modes to report to the WLAN controller about the VLAN
and subnet that are in use. This information enables the WLAN controller to forward the traffic to appropriate
branches. The Route ADD and VLAN ADD messages are not part of the BID process. These data path
programming messages are used to add the appropriate VLAN and Route information to the WLAN controller data
path.
The master AP distributes the BID that is allocated to the branch to all member IAPs. If the master AP fails and a
member IAP becomes the new master AP, the branch key and BID do not change, and the branch continues to use
the same subnet and IP addresses. If a new member IAP becomes the master AP, it performs the BID process.
However, instead of registering as a new branch, the new master AP sends the existing BID in the registration
message.
Since the branch key is essential for the BID process, Aruba recommends that you reset an IAP to factory defaults
before you move it from one branch to another.
MAX-BID Calculation Examples
Consider an organization that uses “10.10.0.0 /16” with 250 clients per branch as the distributed L3 mode
configuration on IAPs in 200 branches. The master AP in each branch performs the following math to determine the
MAX_BID:
l
If each branch has 250 clients, in the equation 2^n = 250, n must be 8 (2^8 = 256). The master AP has the n value
that determines the subnet size required for a branch.
l
Subnet size in a branch = (total number of address bits in IPv4 minus the above-mentioned n). The equation is,
32-8 = 24. The master AP determines that it needs a /24 address space for that branch.
l
The MAX_BID is the number of /24 subnets that is possible with a 10.10.0.0 /16 address space. MAX-BID =
(total number of IP addresses in a /16 address space divided by the total number of IP addresses in a /24 address
space). The equation is 65536/256 = 256. So the MAX_BID is 255, because 0 is also considered a BID value.
Below Understanding Instant-VPN (Aruba Instant-VPN in a Nutshell) shows the BID allocation process between a
VC and a WLAN controller.
Figure 46 Allocating the BID
1. In a new branch, the master AP/VC generates a branch key from its mac.
2. Branch key generated by master/VC is distributed, to all member APs in the cluster.
3. VC forms IPSec tunnel to primary controller, and obtains inner IP address for IPSec.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 104
4. VC starts the BID allocation process, by sending a registration message to primary controller, that it’s a new
branch. The transaction also contains, Max-BID, subnet name, inner IP, mac address of VC, backup & branch
key.
The backup field indicates if the controller is primary or backup.
Max-BID determines the number of possible branches based on subnet size, and clients per branch config.
Subnet name maps Max-BID to a subnet configuration.
5. Controller ensures that the branch key does not already exist in DB. If it does not exist, the controller will send a
new BID. However if a branch key/BID combination exists on the controller, the controller will send the BID
already associated with that branch key.
6. After BID is allocated, the VC calculates the subnet for the branch and register it with the controller. BID plays an
important role in subnet calculation.
7. If the current master AP fails, and a member AP becomes the master, the member AP will have the same branch
key and BID. The member AP, after forming the IPSec connection, informs the controller of branch key and BID,
this ensures that the branch gets the same subnet irrespective of which AP becomes the master.
Aruba recommends that the WLAN controller for Aruba Instant-VPN termination runs 6.3.xx. or greater.
Traffic Flow and Uplink Switch Requirements for a Multi-AP Aruba Instant-VPN Network
In an Aruba Instant cluster that is configured for Instant-VPN, only the master AP establishes the VPN tunnel to the
WLAN controller. In a multi-AP network, traffic from clients that are connected to member IAPs always reaches the
master AP in local, centralized L2 and distributed L3 modes. In local and distributed L3 modes, the VC/master AP is
the default gateway for clients, so the client traffic reaches the master AP. When the traffic reaches the master AP,
the master AP forwards the traffic through the IPsec tunnel or bridges it locally based on the destination.
No GRE tunnels or proprietary tunnels exist between IAPs in an IAP cluster. A switch that connects all IAPs in a
multi-AP Aruba Instant network must be VLAN-aware and tag the traffic appropriately to ensure that the traffic from
clients on member IAPs reaches the master AP.
For example, consider a branch with 10 IAPs that are connected to a switch. The branch has two SSIDs:
l
A guest SSID that is configured in local mode with VLAN 20 to provide captive portal authentication using an
external server
l
An employee SSID that is configured in distributed L3 mode with VLAN 30
In this example, the switch that connects the IAPs must be aware of both VLAN 20 and VLAN 30. All IAPs must be
connected to a dot1q trunk port. Basically, the switch that connects the IAP cluster must be aware of all VLANs that
are used in the IAP configuration.
The only exception to this rule is a magic VLAN. (To configure magic VLAN, use “virtual controller managed” &
“Default Client VLAN assignment” in the VLAN option, while configuring SSID, as shown in figure below).
105 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
The master AP uses an IPsec tunnel to forward the traffic from clients in local and L3 mode. However, in centralized
L2 mode, the master AP uses an IPsec-GRE tunnel for clients. This IPsec-GRE tunnel provides multicast traffic
forwarding capabilities in distributed L2 and centralized L2 modes. Multicast traffic cannot be forwarded from a
WLAN controller to an IAP branch that operates in local or distributed L3 modes.
802.1X and RFC 3576 Handling in an Aruba Instant-VPN Network
In an Instant-VPN branch network, users can be authenticated through a local RADIUS server or a RADIUS server
in the data center. The master AP in an Instant-VPN branch determines whether a RADIUS server is local or located
in the data center by checking its routing profile. For more information about the IAP routing profile, see Configuring
an IAP for Instant-VPN Deployment. If the routing profile indicates that traffic to a subnet is in the data center (for
example, 10.0.0.0 /8) and if the IP address of the RADIUS server that is configured on the IAP belongs to that
address space (for example, the RADIUS server IP address is 10.68.32.40), the master AP forwards the 802.1X
traffic through the IPsec tunnel to the data center.
RADIUS traffic to a RADIUS server in the data center is sourced using the inner IP address of the IPsec tunnel.
Therefore, the VPN address pool that is used for inner IP addresses of IPsec tunnels must be routable from the
upstream router in the data center. If RFC 3576-compliance is not required, you can use a source NAT rule on the
WLAN controller to source NAT all RADIUS traffic with the IP address of that WLAN controller. If a branch network
has a local RADIUS server (for example, 192.168.10.20), and if dynamic RADIUS proxy (DRP) is enabled on the
IAP, the 802.1X traffic is source NATed with the VC IP address.
For RFC 3576-compliance, CoA messages are initiated by the RADIUS server. Therefore, you should not enable
a rule on the WLAN controller to source NAT all RADIUS traffic with the IP address of that WLAN controller. For
RFC 3576-compliance, if the RADIUS server is in the data center, the inner IP addresses of the IPsec tunnels
must be listed as RADIUS clients. If you use RFC 3576-compliance with a local RADIUS server, the VC IP
address must be added as the RADIUS client. DRP must be enabled on multi-AP Aruba Instant networks to
tunnel the RADIUS traffic from the member IAPs to the authentication server in the data center.
Table 17: DRP settings and RFC compliance
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 106
RADIUS
server
location
DRP
VPN pool
routable from
DC
DC
Enabled
Yes
DC
Enabled
Local
Local
ACL source NATs
traffic to controller
IP
RFC 3576
compliant
Source IP
NAS IP
No
Inner IP of
IPSec tunnel
VPN Tunnel
IP
Yes
No
Yes
Controller’s
IP
VPN Tunnel
IP
No
Enabled
N.A.
N.A.
VC/master
AP’s local IP
VC IP
Yes
Disabled
N.A.
N.A.
Each member
AP’s local IP
Master/Slave
AP IP
Yes
(DC/local
In a multi-AP Instant-VPN network, to tunnel the RADIUS traffic from member IAPs to the RADIUS server in the
data center, you must enable DRP. When DRP is enabled, the 802.1X transactions for clients connecting to the
member IAPs are forwarded to the master AP, which functions as a RADIUS proxy. With DRP enabled, the NAS-IP
attribute in RADIUS packets that are destined for the RADIUS server in the data center is set to the inner IP address
of the IPsec tunnel.
DRP is not required for single AP deployments. However, if DRP is disabled in single AP deployments, the NAS-IP
attribute in RADIUS packets that are destined to the RADIUS server in the data center is set to the local IP address
of the IAP and not to the inner IP address of the IPsec tunnel. Therefore, Aruba recommends that you enable DRP in
single AP deployments with RADIUS servers that use the NAS IP attribute as a filter for authentication.
DNS Handling in an Aruba Instant-VPN Network
By default, all DNS requests from a client are forwarded to the clients DNS server. In a typical IAP deployment
without VPN configuration, client DNS requests are resolved by the DNS server of the client. However, this
behavior changes if an IAP is configured for Instant-VPN.
The DNS behavior of an IAP network (with SSIDs or wired ports) that is configured for Instant-VPN is determined by
the enterprise domain settings. The enterprise domain setting on the IAP defines the domains for which the DNS
resolution must be forwarded to the default DNS server of the client. For example, if the enterprise domain is
configured for arubanetworks.com, the DNS resolution for host names in the arubanetworks.com domain is
forwarded to the default DNS server of the client. The DNS resolution for host names in all other domains is source
NATed to the local DNS server of the IAP.
If no configuration is present in enterprise domain section and the client is on an SSID for IAP VPN, all the DNS
traffic will be source NATed to DNS server of IAP. Apart from this VPN SSID, if there is a non VPN SSID, its traffic
will go to client’s DNS server.
If split tunnel knob is set to disabled, all DNS traffic will be sent over IPSec tunnel to DNS server of the client, no
matter what the configuration of enterprise domain is. Configuration is present at IAP GUI>>System>>show
advanced options>>Enterprise domains.
107 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
If you configure an asterisk (*) instead of a domain name in the enterprise domain list, all DNS requests are
forwarded to the default DNS server of the client. If you want all DNS requests to be processed by the DNS server
of the client, configure an asterisk (*) in the enterprise domain setting.
Control Traffic between an Aruba Instant-VPN Branch and the WLAN Controller
The bandwidth consumption on the tunnel between an Aruba Instant branch and the WLAN controller is a sum of all
client data traffic through the tunnel and the control traffic between the Aruba Instant branch and the WLAN
controller. The control traffic between an Aruba Instant branch and the WLAN controller is minimal. By default, the
master AP sends a 56-byte ICMP packet to the WLAN controller every 5 seconds to detect if the tunnel is up. You
can set the frequency of these ICMP packets to any value between 1-3600 seconds. If you set the value higher, the
downside is that the IAP requires more time to detect whether a tunnel is down and failed over to the backup WLAN
controller. Aruba recommends that you keep the ICMP packet frequency value at its default.
If you want to change them, please follow information on the link.
Recommendations for IAP-VPN Modes summarizes the usage recommendations for the IAP-VPN modes.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 108
Table 18: Recommendations for IAP-VPN Modes
IAP-VPN Mode
Usage Recommendations
Things to Remember
Local
Recommended if you there is no
requirement to access the clients
on remote location, where IAP VPN
is deployed, from Data center.
Any traffic for a corporate destination is source NATed
with the inner tunnel IP address, so the inner IP address
pool that is used for VPN must be routable from the
corporate network, or you can src NAT the traffic again.
Clients on remote location, where IAP VPN is deployed,
can always access resource at Data center. But reverse
way is not true, as all traffic is source NATed over inner IP
of VPN tunnel.
For more information, see Instant-VPN: Local Mode and
DHCP Profile for Local Mode.
Centralized L2
Recommended only if multicast
traffic to a branch is required. If it is
not required, use L3 modes.
The DHCP server is centralized, so DHCP services for
new clients and DHCP renewals fail if the WAN is down.
Aruba recommends a /24 or /23 subnet for user VLANs.
For more information, see Instant-VPN: Centralized L2
Mode and DHCP Profile for Centralized L2 Mode.
Distributed L3
Recommended for all deployments.
You can access the clients on
remote location, where IAP VPN is
deployed, from Data center.
Branch routes must be redistributed using OSPF on the
WLAN controller.
For more information, see Instant-VPN: Distributed L3
Mode and DHCP Profile for Distributed L3 Mode.
Redundancy Design for Aruba Instant-VPN Deployments
To ensure productivity in branch deployments, high availability of data center resources is essential. One of the core
principles of the Aruba Instant solution is redundancy and resiliency. The following data center redundancy options
are available with the Aruba Instant-VPN solution:
l
Single data center with redundancy
l
Multiple data centers with redundancy (geographical redundancy)
In a single data center deployment without redundancy, all Instant-VPNs terminate on a single WLAN controller in a
single data center. If the WLAN controller or the data center is down, the branch network loses access to all
centralized resources. Aruba strongly recommends that you design your Instant-VPN deployments with redundancy.
Below figure is an example of an Instant-VPN network without redundancy.
Figure 47 Instant-VPN network without redundancy
109 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Single Data Center Deployment with Redundancy
This design provides WLAN controller redundancy within a single data center deployment. All Instant-VPNs
terminate on a pair of redundant WLAN controllers in a data center and WLAN controllers are deployed in a VRRPbased master redundancy topology. The IAP-VPNs in this deployment terminate on the VRRP IP address of the
master redundancy topology. For information about master redundancy between WLAN controllers, see the Aruba
Campus Redundancy Models Validated Reference Design.
Below is an example of an Instant-VPN network with a single data center and redundancy.
Figure 48 Instant-VPN network with a single data center and redundancy
Multiple Data Center Redundancy (Geographical Redundancy)
Organizations that design high availability plan for geographical redundancy to ensure that data center network
problems, natural disasters, or calamities in one region do not affect the productivity of the distributed workforce.
Aruba Instant-VPN supports geographical redundancy with a primary and backup setup. Geographical redundancy
provides these two options:
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 110
l
Geographical redundancy without redundant WLAN controllers at each data center: In this setup,
Instant-VPNs terminate on a primary WLAN controller in one data center with another WLAN controller in a
geographically separate data center functioning as the backup. There is no redundancy for WLAN controllers at
every data center.
l
Geographical redundancy with redundant WLAN controller at each data center: In this setup, InstantVPNs terminate on a pair of redundant primary WLAN controllers in one data center with another pair of redundant
WLAN controllers in a geographically separate data center functioning as the backup.
The BID that is required for distributed L3 mode is allocated only by the primary host. The very first BID process
for an Instant-VPN branch in distributed L2 or distributed L3 mode with geographical redundancy must be
exchanged with the primary host. If the primary host of a branch goes down after the initial BID allocation process,
the branch fails over to the backup host and all modes function as expected. For more information, see Branch-ID
Allocation Algorithm
Below figure is an example of an Instant-VPN network with multiple data centers and redundant WLAN controller at
every data center.
Figure 49 Geographical redundancy with redundant WLAN controller at each data center
Designing Instant-VPN Deployments
Designing a VPN-based branch deployment with Aruba Instant is a combination of the following components:
l
Physical design of the branch (single-AP or multi-AP branch)
l
Data center redundancy (single data center or multiple data centers)
l
Logical design (Instant-VPN mode, traffic engineering, and so on)
To build a sound Instant-VPN deployment, it is critical that you understand the deployment requirements and select
the appropriate physical, logical, and redundancy design. To help you understand the considerations and
recommendations that are involved in designing an Instant-VPN deployment, consider the most common
deployment use cases:
l
Single-AP branch with a single data center
l
Single-AP deployment with multiple data centers
111 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
l
Multi-AP deployment with a single data center
l
Multi-AP Deployment with multiple data centers
These use cases are described in the following sections:
Single-AP Branch with a Single Data Center
For the deployment of a single-AP branch with a single data center, the common components and requirements are
as follows:
l
Small branches supported by single IAP
l
Single data center deployment with no geographical redundancy requirement
l
Secure wireless access for employees and access to corporate resources using VPN
l
Optional guest access in certain deployments
l
Optional support for corporate wired devices such as printers
l
WAN uplink (Ethernet or 3G/4G modem)
The typical Instant-VPN design and configuration for this deployment is as follows:
l
Physical design: The physical design for this deployment is a single-AP design. Uplink redundancy for the
branch network is optional. For information about uplink redundancy, see the Aruba Instant User Guide that is
available at the Aruba support website.
l
Data center redundancy: Based on the total number of branch sites, select the appropriate WLAN controller
platform. Because this deployment is designed for a single data center, Aruba recommends that you deploy
redundant WLAN controllers in the data center using master redundancy to safeguard against controller failure.
For more information, see Redundancy Design for Aruba Instant-VPN Deployments.
l
Logical design: The logical design for this deployment includes the following components and
recommendations:
n
Employee SSIDs with the appropriate authentication. The VLAN that is used for an employee SSID must
belong to the appropriate Instant-VPN mode. Aruba recommends that you use distributed L3 mode for all
deployments except for those that require support for multicast traffic from the data center to the branch. You
can use centralized L2 modes for deployments that require a centralized DHCP server. For more information
about Instant-VPN modes, see Understanding Instant-VPN Modes.
n
Wired ports that are used for corporate devices with the appropriate authentication. The VLAN that is used for
corporate wired devices must belong to the appropriate Instant-VPN mode. Aruba supports role-based
access, so separate VLANs are not required for employees and corporate devices. Both the employee SSID
and the wired ports for corporate devices can use the same VLAN in Instant-VPN mode. You can restrict
access using appropriate user roles.
n
As an option, you can use a separate VLAN in the appropriate Instant-VPN mode for wired clients. For
example, if you use “10.10.0.0 /16” with 50 clients per branch for an employee SSID in Layer 3 mode, you can
set up a separate address range of “10.11.0.0 /16” with 5 clients per branch for wired devices and a separate
VLAN in distributed L3 mode for the wired clients.
n
Split-tunnel traffic. You can use the routing profile to tunnel or split-tunnel traffic from employees and wired
devices. To meet the different traffic engineering requirements, you can use a combination of the routing
profile and source NAT ACLs in user roles.
n
Role-based access for wired and wireless devices.
n
BYOD for employees on the employee SSID with ClearPass.
n
In single-AP deployments, deny corporate access to any rogue clients on the IAP’s uplink device by using the
“Restrict Corporate Access” feature on Aruba Instant.
n
Modify split-DNS behavior according to the requirements. For more information, see DNS Handling in an
Aruba Instant-VPN Network.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 112
n
As an option, guest access using a guest SSID that is mapped to a local-mode VLAN and captive portal
authentication is supported. Guests can be supported with the internal captive portal page and guest
management features of Aruba Instant or ClearPass Guest Solution. For more information, see the Aruba
Instant User Guide that is available at the Aruba support website.
n
As an option, authentication survivability with ClearPass to address WAN failures.
An Aruba Instant network that is configured for Instant-VPN establishes only a single IPsec tunnel from the
master AP of the cluster to the WLAN controller. That is, an Aruba Instant cluster does not build separate IPsec
tunnels for each SSID or wired port that is configured for Instant-VPN. Below figure is an example of a single-AP deployment with a single data center with WLAN controller redundancy.
Figure 50 Single-AP deployment with a single data center with WLAN controller redundancy
The following sections provide an overview of the basic IAP and data center configurations that are required to
design a single-AP branch with a single data center.
This example uses distributed L3 mode for employees and wired devices.
IAP Setup (Single-AP Branch with a Single Data Center)
The key configurations that are required for the IAP include the following configurations:
1. Set up the VPN primary IP configuration.
2. Define the routing profile. This profile specifies the traffic that must be tunneled to the data center. For
more information about routing profiles, see Configuring an IAP for Instant-VPN Deployment.
3. Configure the enterprise domains on the IAP for split-DNS.
4. Configure the DHCP server for appropriate Instant-VPN mode. For example, set up a distributed L3 mode DHCP
configuration for the employee SSID and corporate wired devices.
5. Configure the authentication servers for user authentication. For example, set up a RADIUS server
configuration for ClearPass for employee authentication, BYOD, and wired device authentication.
DRP is not required in single AP Instant-VPN deployments. In single AP deployments, the RADIUS traffic is
sourced with the inner IP address of the IPsec tunnel or the VC IP address, based on the routing profile definition.
113 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
6. Configure the employee SSID with the appropriate authentication, RADIUS servers, and user roles and map it to
the VLAN in the appropriate Instant-VPN mode. For example, map the employee SSID and the wired ports to the
distributed L3 mode VLAN that you set up in step 4.
7. For some environments, set up a combination of a routing profile and a source NAT ACL in the user roles to meet
the different traffic engineering requirements. For example, if all traffic for corporate wired devices must be
tunneled but employee Internet traffic must be split-tunneled, set up a routing profile with a “0.0.0.0 0.0.0.0
<gateway IP>” configuration and an employee user role that tunnels traffic for corporate destinations but source
NATs traffic for all other destinations (that is, set up an ACL with a permit action for corporate destinations
followed by an ACL with a source NAT action for Internet destinations).
8. In single AP deployments, as part of the Firewall Settings screen, enable the “Restrict Corporate Access” setting
to restrict corporate access to only those devices that are downstream from the IAP. The “Restrict Corporate
Access” setting prevents corporate access to any rogue clients on the APs uplink switch. Do not enable the
“Restrict Corporate Access” setting in a multi-AP flat-mode design. By default, the “Restrict Corporate Access”
setting is disabled.
9. In environments that require guest access, perform the following steps:
n
Set up a DHCP configuration in local mode.
n
Map the configuration to the guest SSID that is set up for captive portal authentication.
10. Configure uplink redundancy in environments that require uplink redundancy.
Data Center Configuration (Single-AP Branch with a Single Data Center)
Aruba recommends that you plan for redundancy. The following procedure describes a redundant WLAN controller
configuration:
The key configurations that are required on the WLAN controller are listed below:
1. Configure the WLAN controllers with the basic settings such as VLANs, IP addresses, and the required license.
2. Configure the WLAN controller pair for master redundancy. For information about configuring master redundancy,
see the Aruba Campus Networks Validated Reference Design or the Aruba User Guide at the Aruba support
website.
3. Define the VPN address pool that is used to assign inner IP addresses to the IPsec tunnel that is established at
the branch.
4. Add IAPs in the branch to the RAP whitelist. This whitelist can be offloaded to a CCPM or other servers that
support authorization. For more information, see Adding IAPs to RAP Whitelist.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 114
5. Configure the appropriate VLANs for branches that are deployed in Layer 2 mode. (This step is required only if the
branch is configured for centralized L2 mode.) For more information, see Configuring VLANs for Layer 2 Modes.
6. Configure OSPF route redistribution of Layer 3 branch routes. (This step is required only if the branch is
configured for distributed L3 mode.) For more information, see Configuring OSPF Route Redistribution of Layer 3
Branch Routes.
7. As an option, configure the WLAN controller to perform source NATing of 802.1X and RADIUS traffic from IAP
branches. However, if RFC 3576-based CoA is a requirement, RADIUS traffic from the IAP branches must not
be source NATed at the WLAN controller. For CoA capabilities, all IP addresses and subnets that are used in the
VPN address pool must be added to the RADIUS server. For more information, see Configuring the Controller to
Perform Source NATing for 802.1X and RADIUS Traffic from Branches.
Single-AP Deployment with Multiple Data Centers
The requirements of this deployment are similar to those of the single-AP deployment with a single data center,
except that geographical redundancy is required. Below are the common requirements and components of this
deployment:
l
Small branches supported by single IAP
l
Multiple data center deployment with geographical redundancy requirement
l
Secure wireless access for employees and access to corporate resources using VPN
l
Optional guest access in certain deployments
l
Optional support for corporate wired devices such as printers
l
WAN uplink (Ethernet or 3G/4G modem)
The typical Instant-VPN design and configuration for this deployment is as follows:
l
Physical design: The physical design for this deployment is a single-AP design. Uplink redundancy for the
branch network is optional. For information about uplink redundancy, see the Aruba Instant User Guide that is
available at the Aruba support website.
l
Data center redundancy: Based on the total number of branch sites, select the appropriate WLAN controller
platform. Because this deployment requires geographical redundancy, the multi data center redundancy model
applies to this deployment. Aruba recommends that you consider redundant master WLAN controllers in the
individual data centers of a multi data center design to safeguard against controller failure in the individual data
centers. For more information, see Redundancy Design for Aruba Instant-VPN Deployments.
l
Logical design: The logical design for this deployment includes the following components and
recommendations:
n
Employee SSIDs with the appropriate authentication. The VLAN that is used for an employee SSID must
belong to the appropriate Instant-VPN mode. Aruba recommends that you use distributed L3 mode for all
deployments except for those that require support for multicast traffic from the data center to the branch. The
VLAN IP address that is configured in the centralized L3 mode definition is different for each branch, so you
must either modify the AirWave configuration on a per-branch level during the initial deployment, or use a
separate group in AirWave for each branch. For more information about Instant-VPN modes, see
Understanding Instant-VPN Modes.
n
Wired ports that are used for corporate devices with the appropriate authentication. The VLAN that is used for
corporate wired devices must belong to the appropriate Instant-VPN mode. Aruba supports role-based
access, so separate VLANs are not required for employees and corporate devices. Both the employee SSID
and the wired ports for corporate devices can use the same VLAN in Instant-VPN mode. You can restrict
access using appropriate user roles.
n
As an option, a separate VLAN in the appropriate Instant-VPN mode for wired clients. For example, if you use
“10.10.0.0 /16” with 50 clients per branch for an employee SSID in Layer 3 mode, you can set up a separate
115 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
address range of “10.11.0.0 /16” with 5 clients per branch for wired devices and a separate VLAN in distributed
L3 mode for the wired clients.
n
Split-tunnel traffic. You can use the routing profile to tunnel or split-tunnel traffic from employees and wired
devices. To meet the different traffic engineering requirements, you can use a combination of the routing
profile and source NAT ACLs in user roles.
n
Role-based access for wired and wireless devices.
n
BYOD for employees on the employee SSID with ClearPass.
n
In single-AP deployments, deny corporate access to any rogue clients on the IAPs uplink device using the
“Restrict Corporate Access” feature on Aruba Instant.
n
Modify split-DNS behavior according to the requirements. For more information, see DNS Handling in an
Aruba Instant-VPN Network.
n
As an option, guest access using a guest SSID that is mapped to a local-mode VLAN and captive portal
authentication. Guests can be supported with the internal captive portal page and guest management features
of Aruba Instant or ClearPass Guest Solution. For more information, see the Aruba Instant User Guide that is
available at the Aruba support website.
n
As an option, authentication survivability with ClearPass to address WAN failures.
An Aruba Instant network that is configured for Instant-VPN establishes only a single IPsec tunnel from the
master AP of the cluster to the WLAN controller. That is, an Aruba Instant cluster does not build separate IPsec
tunnels for each SSID or wired port that is configured for Instant-VPN.
Below is an example of a single-AP deployment with a multiple data centers with WLAN controller redundancy.
Figure 51 Single-AP deployment with multiple data centers and WLAN controller redundancy
The following sections provide an overview of the basic IAP and data center configurations that are required to
design a single-AP branch with multiple data centers.
This example uses distributed L3 mode for employees and wired devices.
IAP Setup (Single-AP Branch with Multiple Data Centers)
The key configurations that are required for the IAP are listed below:
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 116
1. Set up the VPN primary IP configuration.
2. Set up the VPN secondary IP configuration.
3. Set up a fast failover configuration if the environment requires a fast failover.
4. Define the routing profile. This profile specifies the traffic that must be tunneled to the data center. The routing
profile must have two sets of routes. One points to the primary data center and the other points to the backup data
center. The IAP selects a route based on the data center that it is terminating on. For example, if all 10.0.0.0 /8
networks must be tunneled back to the data center, the routing profile must have two routes: “10.0.0.0 255.0.0.0
<controller in data center 1>” and “10.0.0.0 255.0.0.0 <controller in data center 2>”. For more information about
routing profiles, seeConfiguring an IAP for Instant-VPN Deployment.
5. Configure the enterprise domains on the IAP for split-DNS.
6. Configure the DHCP server for appropriate Instant-VPN mode. For example, set up a distributed L3 mode DHCP
configuration for the employee SSID and corporate wired devices.
7. Configure the authentication servers for user authentication. For example, set up a RADIUS server configuration
for ClearPass for employee authentication, BYOD, and wired device authentication.
DRP is not required in single AP Instant-VPN deployments. In single AP deployments, the RADIUS traffic is
sourced with the inner IP address of the IPsec tunnel or the VC IP address, based on the routing profile definition.
8. Configure the employee SSID with the appropriate authentication, RADIUS servers, and user roles and map it to
the VLAN in the appropriate Instant-VPN mode. For example, map the employee SSID and the wired ports to the
distributed L3 mode VLAN that you set up in step 6.
9. For some environments, set up a combination of a routing profile and a source NAT ACL in the user roles to meet
the different traffic engineering requirements. For example, if all traffic for corporate wired devices must be
tunneled but employee Internet traffic must be split-tunneled, set up a routing profile with a “0.0.0.0 0.0.0.0
<gateway IP>” configuration and an employee user role that tunnels traffic for corporate destinations but source
NATs traffic for all other destinations (that is, set up an ACL with a permit action for corporate destinations
followed by an ACL with a source NAT action for Internet destinations).
10. In single AP deployments, as part of the Firewall Settings screen, enable the “Restrict Corporate Access” setting
to restrict corporate access to only those devices that are downstream from the IAP. The “Restrict Corporate
Access” setting prevents corporate access to any rogue clients on the APs uplink switch. Do not enable the
“Restrict Corporate Access” setting in a multi-AP flat-mode design, which is the most commonly used design. By
default, the “Restrict Corporate Access” setting is disabled.
117 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
11. In environments that require guest access, perform the following steps:
n
Set up a DHCP configuration in local mode.
n
Map the configuration to the guest SSID that is set up for captive portal authentication.
Data Center Configuration (Single-AP Branch with Multiple Data Centers)
In addition to geographical redundancy, Aruba recommends that you consider WLAN controller redundancy in every
data center of a geographically redundant design. If a WLAN controller failure occurs at the primary data center, the
backup WLAN controller in the primary data center takes over, which prevents the branch network from switching
over to the backup data center. This procedure describes a redundant WLAN controller configuration for a data
center.
The key configurations that are required on the WLAN controller are listed below:
1. Configure the WLAN controllers with the basic settings such as VLANs, IP addresses, and the required license.
2. Configure the WLAN controller pair for master redundancy. For information about configuring master redundancy,
see the Aruba Campus Networks Validated Reference Design or the Aruba User Guide at the Aruba support
website.
Define the VPN address pool that is used to assign inner IP addresses to the IPsec tunnel that is established at the
branch. Aruba recommends that you use a routable address space for the VPN address pool. For more information,
see Defining the VPN Pool on a WLAN Controller.
Aruba also recommends that you set up a unique VPN address pool for each WLAN controller in each data center.
3. Add IAPs in the branch to the RAP whitelist. This whitelist can be offloaded to a CCPM or other servers that
support authorization. For more information, see Adding IAPs to RAP Whitelist.
4. Configure the appropriate VLANs for branches that are deployed in Layer 2 mode. (This step is required only if the
branch is configured for centralized L2 or distributed L2 mode). For more information, see Configuring VLANs for
Layer 2 Modes.
5. Configure OSPF route redistribution of Layer 3 branch routes. (This step is required only if the branch is
configured for distributed L3 mode). For more information, see Configuring OSPF Route Redistribution of Layer 3
Branch Routes.
6. As an option, configure the WLAN controller to perform source NATing of 802.1X and RADIUS traffic from IAP
branches. However, if RFC 3576-based CoA is a requirement, RADIUS traffic from the IAP branches must not
be source NATed at the WLAN controller. For CoA capabilities, all IP addresses and subnets that are used in the
VPN address pool must be added to the RADIUS server. For more information, see Configuring the Controller to
Perform Source NATing for 802.1X and RADIUS Traffic from Branches.
Multi-AP Deployment with Single Data Center
For the deployment of a multi-AP branch with a single data center, the following components and requirements are
common:
l
Branches that require more than one IAP
l
Single data center deployment with no geographical redundancy requirement
l
Secure wireless access for employees and access to corporate resources using VPN
l
Optional guest access in certain deployments
l
Optional support for corporate wired devices such as printers
l
WAN uplink (Ethernet or 3G/4G modem)
The typical Instant-VPN design and configuration for this deployment is as follows:
l
Physical design: The physical design for this deployment is a multi-AP design. For branches that require 2 to 4
IAPs, use either hierarchical or flat mode design for AP deployment. In branches with 5 or more IAPs, use flat
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 118
mode design. Flat mode deployment requires a trusted managed switch to connect the IAPs. For more
information about multi-AP design, see Multi AP Branch. Uplink redundancy for the branch network is optional.
For information about uplink redundancy, see the Aruba Instant User Guide that is available at the Aruba support
website.
l
Data center redundancy: Based on the total number of branch sites, select the appropriate WLAN controller
platform. Because this deployment is designed for a single data center, Aruba recommends that you deploy
redundant WLAN controllers in the data center using master redundancy to safeguard against controller failure.
For more information, see Redundancy Design for Aruba Instant-VPN Deployments.
l
Logical design for hierarchical mode design: The logical design for this deployment includes the following
recommendations and components:
n
If deployed in hierarchical mode, the member IAPs connect to the downlink ports of the root IAP. Configure
the wired ports of the root IAP to which the member IAP connect with a VLAN in local mode. These ports
must be in trunk mode with the native VLAN set to the local mode VLAN that is used for member IAPs. This
setup allows the IAPs in hierarchical mode to support multiple VLANs.
n
In hierarchical mode, you can use the wired ports of the root IAP for corporate wired devices.
n
Employee SSIDs with the appropriate authentication. The VLAN that is used for an employee SSID must
belong to the appropriate Instant-VPN mode. Aruba recommends that you use distributed L3 mode for all
deployments except for those that require support for multicast traffic from the data center to the branch. You
can use centralized L3 modes for deployments that require a centralized DHCP server. The VLAN IP address
that is configured in the centralized L3 mode definition is different for each branch, so you must either modify
the AirWave configuration on a per-branch level during the initial deployment, or use a separate group in
AirWave for each branch. For more information about Instant-VPN modes, see Understanding Instant-VPN
Modes.
n
Wired ports that are used for corporate devices with the appropriate authentication. The VLAN that is used for
corporate wired devices must belong to the appropriate Instant-VPN mode. Aruba supports role-based
access, so separate VLANs are not required for employees and corporate devices. Both the employee SSID
and the wired ports for corporate devices can use the same VLAN in Instant-VPN mode. You can restrict
access using appropriate user roles.
n
As an option, a separate VLAN in the appropriate Instant-VPN mode for wired clients. For example, if you use
“10.10.0.0 /16” with 50 clients per branch for an employee SSID in Layer 3 mode, you can set up a separate
address range of “10.11.0.0 /16” with 5 clients per branch for wired devices and a separate VLAN in distributed
L3 mode for the wired clients.
n
Split-tunnel traffic. You can use the routing profile to tunnel or split-tunnel traffic from employees and wired
devices. To meet the different traffic engineering requirements, you can use a combination of the routing
profile and source NAT ACLs in user roles.
n
Role-based access for wired and wireless devices.
n
BYOD for employees on the employee SSID with ClearPass.
n
In hierarchical mode deployments, deny corporate access to any rogue clients on the IAPs uplink device
using the “Restrict Corporate Access” feature on Aruba Instant.
n
Modify split-DNS behavior according to the requirements. For more information see DNS Handling in an
Aruba Instant-VPN Network.
n
As an option, guest access using a guest SSID that is mapped to a local-mode VLAN and captive portal
authentication. Guests can be supported with the internal captive portal page and guest management features
of Aruba Instant or ClearPass Guest Solution. For more information, see the Aruba Instant User Guide that is
available at the Aruba support website.
n
As an option, authentication survivability with ClearPass to address WAN failures.
119 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
An Aruba Instant network that is configured for Instant-VPN establishes only a single IPsec tunnel from the
master AP of the cluster to the WLAN controller. That is, an Aruba Instant cluster does not build separate IPsec
tunnels for each SSID or wired port that is configured for Instant-VPN.
l
Logical design for flat mode design: The logical design for this deployment includes the following
recommendations and components:
n
In a multi-AP flat mode design, the trusted managed switch that connects the IAPs must support all VLANs
that are used by the Aruba Instant network. For example, if the Aruba-Instant network is configured with a
distributed L3 mode VLAN with VLAN ID 100 for corporate access, the trusted uplink switch that connects the
IAPs must support this VLAN.
n
In a multi-AP flat mode design, you can connect the corporate wired devices to the trusted managed switch.
The wired devices that connect to the switch have corporate access as long as the switch port is on the
Instant-VPN mode VLAN. For example, if the Aruba-Instant network is configured with a distributed L3 mode
VLAN with VLAN ID 100 for corporate access, the trusted uplink switch ports that are used for wired devices
must be on VLAN 100.
n
In flat mode deployment, disable the “Restrict Corporate Access” feature.
n
All other logical design elements for flat mode design are same as for the hierarchical mode design.
Designing Instant-VPN Deployments is an example of a multi-AP deployment with a single data center and
redundant WLAN controllers.
Figure 52 Multi-AP deployment with a single data center with WLAN controller redundancy
The following sections provide an overview of the basic IAP, data center, and uplink switch configurations that are
necessary to design a multi-AP deployment with a single data center. The example that is described in the following
sections uses distributed L3 mode for employees and wired devices.
IAP Setup (multi-AP Deployment with a Single Data Center)
The key configurations that are required for the IAP are listed below:
1. Set up the VPN primary IP configuration.
2. Define the routing profile. This profile specifies the traffic that must be tunneled to the data center. For more
information about routing profiles, see Configuring an IAP for Instant-VPN Deployment.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 120
3. Configure the enterprise domains on the IAP for split-DNS.
4. Configure the DHCP server for appropriate Instant-VPN mode. For example, set up a distributed L3 mode DHCP
configuration for the employee SSID and corporate wired devices.
5. Configure the authentication servers for user authentication. For example, set up a RADIUS server configuration
for ClearPass for employee authentication, BYOD, and wired device authentication.
6. Enable DRP in multi AP Instant-VPN deployments to tunnel the RADIUS traffic from member IAPs. When DRP
is enabled in a multi-AP network, the RADIUS traffic is sourced with the inner IP address of the IPsec tunnel or
the VC IP address, based on the routing profile definition.
7. Configure the employee SSID with the appropriate authentication, RADIUS servers, and user roles and map it to
the VLAN in the appropriate Instant-VPN mode. For example, map the employee SSID and the wired ports to the
distributed L3 mode VLAN that you set up in step 4.
8. For some environments, set up a combination of a routing profile and a source NAT ACL in the user roles to meet
the different traffic engineering requirements. For example, consider an environment that requires all traffic for
corporate wired devices to be tunneled, but employee Internet traffic to be split-tunneled. In this case, set up a
routing profile with a “0.0.0.0 0.0.0.0 <gateway IP>” configuration and an employee user role that tunnels traffic
for corporate destinations but source NATs traffic for all other destinations. (That is, set up an ACL with a permit
action for corporate destinations followed by an ACL with a source NAT action for Internet destinations).
9. In flat mode design, disable the “Restrict Corporate Access” setting that is part of the Firewall Settings screen.
By default, the “Restrict Corporate Access” setting is disabled.However, in hierarchical design, you can enable
the “Restrict Corporate Access” setting to restrict corporate access to only those devices that are downstream
from the root IAP.
10. In environments that require guest access, perform the following steps:
n
Set up a DHCP configuration in local mode.
n
Map the configuration to the guest SSID that is set up for captive portal authentication.
11. As an option for hierarchical mode design, configure uplink redundancy. In hierarchical mode, the redundant
uplink must be on the root IAP.
121 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Data Center Configuration (Multi-AP Deployment with a Single Data Center)
Aruba recommends that you plan for redundancy. This procedure describes a redundant WLAN controller
configuration.
The key configurations that are required on the WLAN controller are listed below:
1. Configure the WLAN controllers with the basic settings such as VLANs, IP addresses, and the required license.
2. Configure the WLAN controller pair for master redundancy. For information about configuring master redundancy,
see the Aruba Campus Networks Validated Reference Design or the Aruba User Guide at the Aruba support
website.
3. Define the VPN address pool that is used to assign inner IP addresses to the IPsec tunnel that is established at
the branch.
4. Add IAPs in the branch to the RAP whitelist. This whitelist can be offloaded to a CCPM or other servers that
support authorization. For more information, see Adding IAPs to RAP Whitelist.
5. Configure the appropriate VLANs for branches that are deployed in Layer 2 mode. (This step is required only if the
branch is configured for centralized L2 or distributed L2 mode). For more information, see Configuring VLANs for
Layer 2 Modes.
6. Configure OSPF route redistribution of Layer 3 branch routes. (This step is required only if the branch is
configured for distributed L3 mode). For more information, see Configuring OSPF Route Redistribution of Layer 3
Branch Routes.
7. As an option, configure the WLAN controller to perform source NATing of 802.1X and RADIUS traffic from IAP
branches. However, if RFC 3576-based CoA is a requirement, RADIUS traffic from the IAP branches must not
be source NATed at the WLAN controller. For CoA capabilities, all IP addresses and subnets that are used in the
VPN address pool must be added to the RADIUS server. For more information, see Configuring the Controller to
Perform Source NATing for 802.1X and RADIUS Traffic from Branches.
Uplink Switch Setup (Multi-AP Deployment with a Single Data Center)
In a flat mode design, the trusted managed switch that connects the IAPs in the branch must support the client
VLANs that are defined in the Aruba Instant network. This support is required because any client traffic that must be
forwarded from the member IAP to the master AP is tagged with the appropriate client VLAN. For example, if the
Aruba-Instant network is configured with a distributed L3 mode VLAN with VLAN ID 100 for the employee SSID, the
trusted uplink switch must support VLAN 100. This configuration allows for traffic from the clients that are connected
to the employee SSID on the member APs to be forwarded to the master AP with VLAN tag 100. (VPN tunneling or
source NATing of client traffic is performed by the master AP). For more information about traffic forwarding
behavior, see Traffic Flows in an Aruba Instant Cluster.
Multi-AP Deployment with Multiple Data Centers
For the deployment of a multi-AP branch with multiple data centers, the common components and requirements are
as follows:
l
Branches that require more than one IAP
l
Multiple data center deployment with geographical redundancy requirement
l
Secure wireless access for employees and access to corporate resources using VPN
l
Optional guest access in certain deployments
l
Optional support for corporate wired devices such as printers
l
WAN uplink (Ethernet or 3G/4G modem)
The typical Instant-VPN design and configuration for this deployment is as follows:
l
Physical design: The physical design for this deployment is a multi-AP design. For branches that require 2 to 4
IAPs, use either hierarchical or flat mode design for AP deployment. In branches with 5 or more IAPs, use flat
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 122
mode design. Flat mode deployment requires a trusted managed switch to connect the IAPs. For more
information about multi-AP design, see Multi AP Branch. Uplink redundancy for the branch network is optional.
For information about uplink redundancy, see the Aruba Instant User Guide that is available at the Aruba support
website.
l
Data center redundancy: Based on the total number of branch sites, select the appropriate WLAN controller
platform. Since this deployment requires geographical redundancy, the multi data center redundancy model
applies to this deployment. Aruba recommends that you consider redundant master WLAN controllers in the
individual data centers of a multi data center design to safeguard against controller failure in the individual data
centers. For more information, see Redundancy Design for Aruba Instant-VPN Deployments.
l
Logical design for hierarchical mode design: The logical design for this deployment includes the below
recommendations and components:
n
If deployed in hierarchical mode, the member IAPs connect to the downlink ports of the root IAP. Configure
the wired ports of the root IAP to which the member IAP connects with a VLAN in local mode. These ports
must be in trunk mode with the native VLAN set to the local mode VLAN that is used for member IAPs. This
setup allows the IAPs in hierarchical mode to support multiple VLANs.
n
In hierarchical mode, you can use the wired ports of the root IAP for corporate wired devices.
n
Employee SSIDs with the appropriate authentication. The VLAN that is used for an employee SSID must
belong to the appropriate Instant-VPN mode. Aruba recommends that you use distributed L3 mode for all
deployments except for those that require support for multicast traffic from the data center to the branch. You
can use centralized L3 modes for deployments that require a centralized DHCP server. The VLAN IP address
that is configured in the centralized L3 mode definition is different for each branch, so you must either modify
the AirWave configuration on a per-branch level during the initial deployment, or use a separate group in
AirWave for each branch. For more information about Instant-VPN modes, see Understanding Instant-VPN
Modes.
n
Wired ports that are used for corporate devices with the appropriate authentication. The VLAN that is used for
corporate wired devices must belong to the appropriate Instant-VPN mode. Aruba supports role-based
access, so separate VLANs are not required for employees and corporate devices. Both the employee SSID
and the wired ports for corporate devices can use the same VLAN in Instant-VPN mode. You can restrict
access using appropriate user roles.
n
As an option, a separate VLAN in the appropriate Instant-VPN mode for wired clients. For example, if you use
“10.10.0.0 /16” with 50 clients per branch for an employee SSID in Layer 3 mode, you can set up a separate
address range of “10.11.0.0 /16” with 5 clients per branch for wired devices and a separate VLAN in distributed
L3 mode for the wired clients.
n
Split-tunnel traffic. You can use the routing profile to tunnel or split-tunnel traffic from employees and wired
devices. To meet the different traffic engineering requirements, you can use a combination of the routing
profile and source NAT ACLs in user roles.
n
Role-based access for wired and wireless devices.
n
BYOD for employees on the employee SSID with ClearPass.
n
In hierarchical mode deployments, deny corporate access to any rogue clients on the IAPs uplink device
using the “Restrict Corporate Access” feature on Aruba Instant.
n
Modify split-DNS behavior according to the requirements. For more information see DNS Handling in an
Aruba Instant-VPN Network.
n
As an option, guest access using a guest SSID that is mapped to a local-mode VLAN and captive portal
authentication. Guests can be supported with the internal captive portal page and guest management features
of Aruba Instant or ClearPass Guest Solution. For more information, see the Aruba Instant User Guide that is
available at the Aruba support website.
n
As an option, authentication survivability with ClearPass to address WAN failures is supported.
123 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
An Aruba Instant network that is configured for Instant-VPN establishes only a single IPsec tunnel from the
master AP of the cluster to the WLAN controller. That is, an Aruba Instant cluster does not build separate IPsec
tunnels for each SSID or wired port that is configured for Instant-VPN.
l
Logical design for flat mode design: The logical design for this deployment includes the following
recommendations and components:
n
In a multi-AP flat mode design, the trusted managed switch that connects the IAPs must support all VLANs
that are used by the Aruba Instant network. For example, if the Aruba-Instant network is configured with a
distributed L3 mode VLAN with VLAN ID 100 for corporate access, the trusted uplink switch that connects the
IAPs must support this VLAN.
n
In a multi-AP flat mode design, you can connect the corporate wired devices to the trusted managed switch.
The wired devices that connect to the switch have corporate access as long as the switch port is on the
Instant-VPN mode VLAN. For example, if the Aruba-Instant network is configured with a distributed L3 mode
VLAN with VLAN ID 100 for corporate access, the trusted uplink switch ports that are used for wired devices
must be on VLAN 100.
n
In flat mode deployment, disable the “Restrict Corporate Access” feature.
n
All other logical design elements for flat mode design are same as for the hierarchical mode design.
Designing Instant-VPN Deployments is an example of a mulrti-AP deployment with multiple data centers, each of
which include redundant WLAN controllers.
Figure 53 Multi-AP deployment with multiple data centers with WLAN controller redundancy
The following sections provide an overview of the basic IAP and data center configurations that are required to
design a multi-AP deployment with a single data center. The example that is described in the following sections uses
distributed L3 mode for employees and wired devices.
IAP Setup (multi-AP Deployment with Multiple Data Centers)
The key configurations that are required for the IAP are listed below:
1. Set up the VPN primary IP configuration.
2. Set up the VPN secondary IP configuration.
3. Set up a fast failover configuration if the environment requires a fast failover.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 124
4. Define the routing profile. This profile specifies the traffic that must be tunneled to the data center. The routing
profile must have two sets of routes. One points to the primary data center and the other points to the backup data
center. The IAP selects a route based on the data center that it is terminating on. For example, if all 10.0.0.0 /8
networks must be tunneled back to the data center, the routing profile must have two routes: “10.0.0.0 255.0.0.0
<controller in data center 1>” and “10.0.0.0 255.0.0.0 <controller in data center 2>”. For more information about
routing profiles, see Configuring an IAP for Instant-VPN Deployment.
5. Configure the enterprise domains on the IAP for split-DNS.
6. Configure the DHCP server for appropriate Instant-VPN mode. For example, set up a distributed L3 mode DHCP
configuration for the employee SSID and corporate wired devices.
7. Configure the authentication servers for user authentication. For example, set up a RADIUS server configuration
for ClearPass for employee authentication, BYOD, and wired device authentication.
8. Enable DRP in multi-AP Instant-VPN deployments to tunnel the RADIUS traffic from member IAPs. When DRP
is enabled in a multi-AP network, the RADIUS traffic is sourced with the inner IP address of the IPsec tunnel or
the VC IP address, based on the routing profile definition.
9. Configure the employee SSID with the appropriate authentication, RADIUS servers, and user roles and map it to
the VLAN in the appropriate Instant-VPN mode. For example, map the employee SSID and the wired ports to the
distributed L3 mode VLAN that you set up in step 6.
10. For some environments, set up a combination of a routing profile and a source NAT ACL in the user roles to meet
the different traffic engineering requirements. For example, if all traffic for corporate wired devices must be
tunneled but employee Internet traffic must be split-tunneled, set up a routing profile with a “0.0.0.0 0.0.0.0
<gateway IP>” configuration and an employee user role that tunnels traffic for corporate destinations but source
NATs traffic for all other destinations (that is, set up an ACL with a permit action for corporate destinations
followed by an ACL with a source NAT action for Internet destinations).
11. In flat mode design, disable the “Restrict Corporate Access” setting that is part of the Firewall Settings screen.
By default, the “Restrict Corporate Access” setting is disabled. However, in hierarchical design, you can enable
the “Restrict Corporate Access” setting to restrict corporate access to only those devices that are downstream
from the root IAP.
12. In environments that require guest access, perform these steps:
n
Set up a DHCP configuration in local mode.
n
Map the configuration to the guest SSID that is set up for captive portal authentication.
125 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
13. As an option for hierarchical mode design, configure uplink redundancy. In hierarchical mode, the redundant
uplink must be on the root IAP.
Data Center Configuration (Multi-AP Deployment with Multiple Data Centers)
In addition to geographical redundancy, Aruba strongly recommends that you consider WLAN controller redundancy
in each data center of a geographically redundancy design. If a WLAN controller failure occurs at the primary data
center, the backup WLAN controller in the primary data center takes over, preventing the branch network from
switching over to the backup data center. The following procedure describes a redundant WLAN controller
configuration for a data center.
The key configurations that are required on the WLAN controller are listed below:
1. Configure the WLAN controllers with the basic settings such as VLANs, IP addresses, and the required license.
2. Configure the WLAN controller pair for master redundancy. For information about configuring master redundancy,
see the Aruba Campus Networks Validated Reference Design or Aruba User Guide at theAruba support
website.
3. Define the VPN address pool that is used to assign inner IP addresses to the IPsec tunnel that is established at
the branch. Aruba recommends that you use a routable address space for the VPN address pool. For more
information, see Defining the VPN Pool on a WLAN Controller. Aruba also recommends that you set up a unique
VPN address pool for individual WLAN controllers in every data center.
4. Add IAPs in the branch to the RAP whitelist. This whitelist can be offloaded to a CCPM or other servers that
support authorization. For more information, see Adding IAPs to RAP Whitelist.
5. Configure the appropriate VLANs for branches that are deployed in Layer 2 mode. (This step is required only if the
branch is configured for centralized L2 or distributed L2 mode). For more information, see Configuring VLANs for
Layer 2 Modes.
6. Configure OSPF route redistribution of Layer 3 branch routes. (This step is required only if the branch is
configured for distributed L3 mode). For more information, see Configuring OSPF Route Redistribution of Layer 3
Branch Routes.
7. As an option, configure the WLAN controller to perform source NATing of 802.1X and RADIUS traffic from IAP
branches. However, if RFC 3576-based CoA is a requirement, RADIUS traffic from the IAP branches must not
be source NATed at the WLAN controller. For CoA capabilities, all IP addresses and subnets that are used in the
VPN address pool must be added to the RADIUS server. For more information, see Configuring the Controller to
Perform Source NATing for 802.1X and RADIUS Traffic from Branches.
Uplink Switch Setup (Multi-AP Deployment with Multiple Data Centers)
In a flat mode design, the trusted managed switch that connects the IAPs in the branch must support the client
VLANs that are defined in the Aruba Instant network. This support is required because any client traffic that must be
forwarded from the member IAP to the master AP is tagged with the appropriate client VLAN. For example, if the
Aruba-Instant network is configured with a distributed L3 mode VLAN with VLAN ID 100 for the employee SSID, the
trusted uplink switch must support VLAN 100. This configuration allows for traffic from the clients that are connected
to the employee SSID on the member APs to be forwarded to the master AP with VLAN tag 100 (VPN tunneling or
source NATing of client traffic is performed by the master AP). For more information about traffic forwarding
behavior, see Traffic Flows in an Aruba Instant Cluster.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 126
Designing Home Office Deployments with Aruba Instant
Employing a home-based work force is becoming common across many verticals. The cost saving on facility
expenses and the ability to source talent from a broad pool of applicants with specialized skill sets is an attractive
proposition. The affordability and availability of high speed broadband services has allowed many companies to take
advantage of the home-based workforce. In addition to employing a home-based work force, many companies want
to increase the productivity of their conventional office-based employees by providing them secure corporate access
from their homes.
One of the key requirements of a work-from-home model is to equip the work-from-home employees with all the
necessary tools and connect them securely to the corporate resources. The key requirement for these types of
deployments is the ability to securely and effortlessly extend the corporate resources to the homes of remote
workers. Aruba Instant with its zero-touch provisioning and VPN feature set is the ideal solution for these
deployments.
A home office deployment has the following requirements:
l
Wired and wireless access to laptops and VDI terminals
l
Wireless access to BYOD devices
l
Wired access for phones
l
Wired access to printers that are provided by the company or the ability to allow users to securely print to a
personal printer on the home network
l
Secure access to corporate resources
The solution and design for this deployment is similar to that of a single-AP branch office deployment. For the design
and recommendations of a single-AP branch office deployment, see Single-AP Branch with a Single Data Center.
Configuring the WLAN Controller for Instant-VPN Deployment
As discussed in Understanding Instant-VPN (Aruba Instant-VPN in a Nutshell), the WLAN controller considers the
IAP that establishes the VPN tunnel as a VPN client and all configurations such as SSIDs, user roles,
authentication servers, and WIPS are local to the Aruba Instant network.
To configure the WLAN controller for Instant-VPN deployments, perform the following steps:
1. Define the VPN address pool to assign inner IP addresses to the IPsec tunnel that is established by the IAP.
2. Add IAPs in the branch to the RAP whitelist. You can offload the whitelist to a CCPM or other server that
supports authorization.
3. Configure the appropriate VLANs for branches that are deployed in Layer 2 mode. (This step is required only if the
branch is configured for centralized L2 mode or distributed L2 mode).
4. Configuring OSPF route redistribution of Layer 3 branch routes (This step is required only if the branch is
configured for distributed L3 mode or centralized L3 mode).
5. As an option, configure the WLAN controller to perform source NATing of 802.1X and RADIUS traffic from an
IAP branch.
Each of these steps is described in detail in the following sections:
In small deployments, with a single master WLAN controller and a VRRP backup WLAN controller, the upstream
router can use a static route that points to the WLAN controller as the next hop for Layer 3 branch subnets.
However, you cannot use static routes in a multi-controller e
For classic RAPs on ArubaOS, the WLAN controller must be configured with the appropriate AP groups, which
define the SSIDs, user roles, WIPS settings, ARM settings, regulatory domain settings, and so on. However, the
AP group settings do not apply to an Instant-VPN.
127 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Aruba recommends that you run ArubaOS 6.3 or greater for Aruba Instant-VPN deployments.
Defining the VPN Pool on a WLAN Controller
Every IAP (Instant-VPN), RAP (classic), Virtual Intranet Access (VIA) client, and third-party VPN client that
authenticates and successfully terminates an IPsec tunnel on the VPN server module of the WLAN controller is
given a valid inner IP address. This inner IP address is issued from the address pool that is configured in the VPN
server module on the WLAN controller. More than one pool can be configured. Aruba recommends that you use
dedicated controllers for Instant-VPN because terminating a combination of Instant-VPN, classic RAPs, and VIA
clients on the same controller alters the scale limit of the controller and complicates the calculation of scale limits.
However, for testing purposes or during migration from a classic RAP to Instant-VPN architecture, you might prefer
to use the same controller for classic RAPs and Instant-VPNs. In such cases, you can use separate VPN
addresses pools for Instant-VPN and classic RAPs.
If only a single pool is configured, all the VPN clients (Instant-VPN, RAPs, and VIA) are issued an inner IP address
from the same pool. When multiple address pools are available, you can configure the controller to use distinct VPN
pools for Instant-VPN, RAPs, and VIA. You can achieve this configuration by appending a VPN pool to the role that
is assigned to the Instant-VPN, classic RAPs, and VIA clients. For Instant-VPN, the default role is “default-vpn-role”
for the inner IP address.
Aruba recommends that you use a routable IP subnet as the VPN pool because this allows you to access the local
WebUI of Aruba Instant from the data center. Having a routable address pool is also important for RADIUS
authentication. The inner IP address of the IAP is used as the RADIUS packet source IP address for
authentication servers in the data center, unless the WLAN controller is configured to source NAT the RADIUS
traffic from Aruba Instant branches. If RFC 3576-compliant CoA is a requirement, the RADIUS traffic form the
Aruba Instant branch must not be source NATed at the WLAN controller and the IP address space that is used for
the VPN address pool must be added to the NAS client list on the centralized authentication server.
When distinct VPN pools are not defined, the WLAN controller automatically uses the first pool in the VPN address
pool. When this pool expires, the next pool in the list is used, and so on. If the VPN address pool is exhausted, new
IAPs (Instant-VPN), RAPs (classic), or VIA clients cannot establish the IPsec tunnel until the required number of IP
addresses are added to the pool.
The VPN address pools are not synchronized from the active WLAN controller to its VRRP backup WLAN
controller during database synchronization. Create VPN address pools individually on both the active and standby
master WLAN controllers. The VPN pools that are used on the active and the VRRP backup WLAN controller can
be same or different. If the same VPN pool is used on active and the VRRP backup WLAN controller, the
upstream router must use the virtual IP address that is used between the two WLAN controllers as the next hop
address to reach this address pool.
Below figures and the corresponding CLI command examples illustrate how to configure a VPN address pool and
append it to a user role.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 128
Figure 54 Configuring VPN address pools
The CLI command to configure VPN address pools is as follows:
!
ip local pool "iap-pool-1" "10.68.61.6" "10.68.61.254"
ip local pool "iap-pool-2" "10.68.62.6" "10.68.62.254"
!
Figure 55 Appending a VPN address pool to a user role
The CLI command to configure VPN user roles is as follows:
!
user-role "default-vpn-role"
pool l2tp "iap-pool-2"
!
129 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Adding IAPs to RAP Whitelist
When an IAP establishes an IPsec tunnel to the WLAN controller, Aruba TPM certificates in the IAP and WLAN
controller are used for IPsec authentication. After authenticating the IAP, the WLAN controller authorizes the IAP by
comparing the CN in the certificate (the CN in the certificate is the MAC address of the IAP) to the MAC address in
the RAP whitelist. If the MAC address is not present in the RAP whitelist, the IAP is not allowed to terminate its
IPsec tunnel on the WLAN controller. This ensures that only an authorized IAP can establish the IPsec tunnel and
not any Aruba AP.
You can offload the RAP whitelist that is used for authorization of the IAPs to ClearPass or to an external server
that supports authorization.
The RAP whitelist on the WLAN controller has the following fields:
l
AP MAC address (required): The MAC address of the IAP that is authorized to establish an IPsec tunnel to the
WLAN controller.
l
User Name (optional): The name of the user or branch to which the IAP belongs.
l
AP Group (required): Although the AP group is not required for IAPs, the RAP whitelist requires that you use this
field to add the IAP to the database. Select the default AP group or any other AP group.
l
AP Name (optional): A name for the IAP.
l
Description (optional): A short description about the IAP.
l
Revoked (optional). You can use this field to revoke the secure status of an IAP.
l
IP address (optional): You can use this field to assign a specific IP address from the VPN address pool to a
specific IAP.
Below figure is a screen shot of the screen that lets you configure the whitelist on the WLAN controller.
Figure 56 Configuring the whitelist on the WLAN controller
The CLI command to configure the whitelist on the WLAN controller is as follows:
whitelist-db rap add mac-address 94:b4:0f:cb:dc:98 ap-group default remote-ip 192.168.100.100
show whitelist-db rap
The ap-group parameter is not used for any configuration, but needs to be configured. It can be any valid string, as it
is not used. If an external whitelist is being used, the AP MAC address needs to be saved in the Radius server as a
lower case entry without any delimiter.
The remote-ip parameter is optional. If you specify an IP here, the particular IP always chooses that IP address as
the inner IP of the IPSec tunnel from the VPN pool.
whitelist-db rap add mac-address 94:b4:0f:cb:dc:98 ap-group default ?
ap-name AP-Name
description Description
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 130
full-name Full Name
remote-ip IP-address assigned to remote peer
Rest of the arguments are present but are optional and do not provide any specific configuration enhancements. This
CLI is used for RAP as well, where these configurations provide additional enhancements, but in context of IAP
VPN, just configure ap-group and that should get the tunnel up.
When you use IAPs that are running Aruba InstantOS 4.0 or greater and Aruba WLAN controllers that are running
ArubaOS 6.4 or greater in a configuration with Auto-GRE, the WLAN controllers allow tunnels only from IAPs that
are configured through AirWave or Aruba Central. Tunnels are not allowed from other IAPs even if they are on the
RAP whitelist. This measure provides additional security. To allow tunnels from IAPs that are configured through
the local WebUI of Aruba Instant, use the WLAN controller CLI to add the IAPs to the “iap trusted-branch-db” list.
For example,
iap trusted-branch-db ? add Configure an IAP trusted branch entry
allow-all Allow all branches as trusted
del Delete an IAP trusted branch entry
del-all Delete all trusted branch entries
Configuring VLANs for Layer 2 Modes
In centralized L2 mode, the master AP adds the appropriate VLAN tag to the client traffic that is destined for the data
center and sends it to the WLAN controller through the IPsec-GRE tunnel. When the WLAN controller receives the
packet, it inspects the tag and forwards the packet accordingly. The VLAN that is defined in the centralized Layer 2
configuration of an IAP must exist on the WLAN controller. The VLAN that is defined on the WLAN controller can be
configured as a Layer 2 VLAN (that is, no IP address is configured on the VLAN interface) or a Layer 3 VLAN (that is,
an IP address is configured on the VLAN interface).
Depending on your network setup, you must enable the inter-VLAN routing between the VLANs on the WLAN
controller.
Configuring OSPF Route Redistribution of Layer 3 Branch Routes
In Layer 3 mode, each branch has a dedicated subnet. Only the WLAN controller can detect the branch each subnet
belongs to. The following example describes the need for OSPF redistribution:
Consider that an organization with 100 branches has designed an Instant-VPN network for geographical redundancy
and fast VPN failover. In such a network, the primary host (WLAN controller) is in data center 1 (DC1) and the
backup host (WLAN controller) is in data center 2 (DC2). Under ideal conditions, all 100 branches terminate on the
primary host in DC1. If branch 10 has WAN problems with DC1, it fails over to DC2. Now, 99 branches terminate on
DC1 but one branch terminates on DC2. This means that 99 branches can be reached through the primary host in
DC1, but the traffic to branch 10 goes through the backup host in DC2. The network that connects the two data
centers must be updated with the appropriate route information that could change dynamically.
Using OSPF and redistributing routes appropriately ensures that routing does not break. When OSPF redistribution
is enabled, the WLAN controller redistributes routes for the branches that are active on that WLAN controller. Even
with fast failover enabled, the OSPF process on the WLAN controller redistributes a branch route only if the IPsec
tunnel is in active state. This is because the master AP exchanges the route Add message, which is used to register
the subnet in the branch, only with the WLAN controller on which the VPN tunnel is active. For information about
configuring OSPF on the Aruba controller, see the ArubaOS User Guide at the Aruba support website.
131 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
By default, a master AP establishes a single IPsec tunnel, either to the primary or to the backup host. If the
communication to one host fails, the master AP establishes an IPsec tunnel to the other host. However, if fast
failover is enabled, the master AP can establish a backup VPN tunnel even while the primary VPN tunnel is still
up. The primary tunnel is in an active state and the backup tunnel is in an idle state. The purpose of fast failover is
to reduce the failover time by eliminating the tunnel setup time during failover.
The CLI command to redistribute Instant-VPN branch routes using OSPF is as follows:
!
router ospf redistribute rapng-vpn
!
Use the show ip route command on the WLAN controller to display the Instant-VPN routes that are redistributed by
the WLAN controller. All the routes with a “V” flag in the command output represent Instant-VPN branch routes. The
below sample output shows Instant-VPN branch routes:
(Aruba-Controller) #show ip route
Codes: C - connected, O - OSPF, R - RIP, S - static
M - mgmt, U - route usable, * - candidate default, V - RAPNG VPN
Gateway of last resort is Imported from DHCP to network 0.0.0.0 at cost 10
Gateway of last resort is Imported from CELL to network 0.0.0.0 at cost 10
Gateway of last resort is Imported from PPPOE to network 0.0.0.0 at cost 10
Gateway of last resort is 10.15.148.254 to network 0.0.0.0 at cost 1
S* 0.0.0.0/0 [1/0] via 10.15.148.254*
V 12.12.2.0/24 [10/0] ipsec map
V 12.12.12.0/25 [10/0] ipsec map
V 12.12.12.32/27 [10/0] ipsec map
V 50.40.40.0/24 [10/0] ipsec map
V 51.41.41.128/25 [10/0] ipsec map
V 53.43.43.32/27 [10/0] ipsec map
V 54.44.44.16/28 [10/0] ipsec map
C 9.9.9.0/24 is directly connected, VLAN9
C 10.15.148.0/24 is directly connected, VLAN1
C 43.43.43.0/24 is directly connected, VLAN132
C 42.42.42.0/24 is directly connected, VLAN123
C 44.44.44.0/24 is directly connected, VLAN125
C 182.82.82.12/32 is an ipsec map 10.15.149.69-182.82.82.12
C 182.82.82.14/32 is an ipsec map 10.17.87.126-182.82.82.14
When an Instant-VPN branch in distributed L3 mode fails over from one data center to another, the time that OSPF
route convergence requires depends on the user idle timeout setting on the WLAN controller. For faster
convergence in Instant-VPN deployments, Aruba recommends that you set the user idle timeout to 30 seconds.
Configuring the Controller to Perform Source NATing for 802.1X and RADIUS Traffic from
Branches
To establish an IPsec connection with the WLAN controller, a VPN client (IAP, RAP, VIA, or third-party VPN client)
submits the appropriate authentication credentials during the IPsec establishment process. The VPN server on the
WLAN controller validates these credentials and assigns a user role to the authenticated VPN clients. This user role
is defined by the VPN authentication profile on the WLAN controller. The four predefined VPN authentication profiles
are:
l
default: For third-party VPN clients
l
default-cap: For campus APs (CAPs)
l
default-rap: For RAPs
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 132
l
default-iap: For IAPs
You cannot add additional VPN profiles. The “default”, “default-iap,” and “default-rap” profiles are configurable, but
the “default-cap” profile cannot be edited.
To bring up the IAP VPN tunnel, no licenses are needed on the controller. However, to bring up the default-vpn-role,
for editing in the controller, PEFV license must be installed:-
Before installing PEFV license:-
After installing PEFV license:-
The “Add” icon to add a new role, and “default-vpn-role” for editing are now available.
The IPsec authentication between the WLAN controller and the IAP is based on Aruba TPM certificates on the
WLAN controller and the IAP. The TPM certificate-based authentication ensures that the IAP that establishes a
VPN connection to the WLAN controller is an Aruba IAP. This process does not guarantee that the authenticated
Aruba IAP is authorized. To ensure that the IAPs that connect to the WLAN controller are authorized, the RAP
whitelist is used. The RAP whitelist ensures that only authorized IAPs can establish a VPN tunnel to the WLAN
controller. After authenticating a RAP using the TPM certificate, the WLAN controller compares the Common Name
(CN) in the certificate to the list of authorized MAC addresses in the RAP whitelist. (The CN is the MAC address of
the IAP that presents the certificate to the WLAN controller.) If a MAC address is not present in the RAP whitelist,
the IAP is not allowed to terminate its IPsec tunnel on the WLAN controller.
ArubaOS 6.3 and greater allow the use of a CPPM or an external RADIUS server to authorize IAPs attempting to
connect to the WLAN controller. By default, the internal RAP whitelist database is used to authorize IAPs.
The “check certificate common name against AAA server” setting must be enabled to allow authorization of the
MAC address in the certificate CN against the RAP whitelist. If this setting is disabled, IAPs are authorized even
if their MAC addresses are not in the RAP whitelist. Aruba recommends that you enable this setting in all
deployments to ensure that only authorized IAPs connect to the WLAN controller.
133 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
After successfully authenticating and authorizing an IAP, the WLAN controller assigns the default role defined in the
“default-iap” VPN authentication profile. The default role defined under the “default-iap” VPN authentication profile is
the predefined “default-vpn-role” that has an “allow-all” firewall policy. All traffic from an IAP-VPN tunnel is forwarded
or routed by the WLAN controller.
In Instant-VPN deployments in which the authentication server is located in the data center, the IAP tunnels all
authentication traffic to the WLAN controller using the inner IP address of the IAPs IPsec tunnel. Because the
source IP address for RADIUS traffic from a master AP in the branch is the inner IP address of the IPsec tunnel, you
must add all IP addresses that are used in the VPN address pool as RADIUS clients on the RADIUS server. In
some environments, a security policy would not allow you to add all addresses in the VPN pool to the NAS client list
on the authentication server. In these situations, you can add a rule that source NATs all RADIUS traffic with the IP
address of the WLAN controller. With this rule, you only need to configure the WLAN controller as the NAS client on
the RADIUS server. Place the source NAT rule above the “allow-all” rule in the “default-vpn-role.”
Enable Dynamic RADIUS Proxy (DRP) on multi-AP Aruba Instant networks to ensure that the IAP tunnels the
authentication traffic to the RADIUS server in the data center. When DRP is enabled, RADIUS traffic that is
destined for a corporate authentication server is sourced with the inner IP address of the IPsec tunnel but RADIUS
traffic that is destined for local authentication servers is forwarded using the VC IP address.
The ArubaOS controller does not require any licenses to terminate IAP-VPN tunnels. However, a PEFV license is
needed to change the firewall policies or the user role that is applied to IAPs. For more information, see Licensing.
Configuring the WLAN Controller for Instant-VPN Deployment figure shows how to set up source NATing for
RADIUS traffic with the IP address of the WLAN controller.
Figure 57 Configuring a firewall policy for source NATing of RADIUS traffic
Configuring the WLAN Controller for Instant-VPN Deployment figure shows how to set up a user role (“iap-role”) with
the appropriate firewall policy to allow source NATing of RADIUS traffic.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 134
Figure 58 Configuring a user role for source NATing of RADIUS traffic
Below figure shows how you can apply a role to the “default-iap” VPN authentication profile.
Figure 59 Applying a role to the “default-iap” VPN authentication profile
Use the below command on controller CLI to find out IAP to user role mapping:(Aruba7030) #show user
Users
----IP MAC Name Role Age(d:h:m)
----------
------------
------
192.168.200.106 00:00:00:00:00:00
192.168.100.101 00:00:00:00:00:00
----
Auth
----------
----
logon 01:03:48 VPN 94:b4:0f:cb:dc:98 iap-role 135 | Designing Distributed Enterprise Networks with Aruba Instant
00:05:59 VPN Aruba Instant Validated Reference Design
VPN link AP name Roaming
--------
Essid/Bssid/Phy
Profile Forward mode Type Host Name
------- ------- --------------- ------------------ ---- --------N/A tunnel 192.168.200.106 N/A default-iap
tunnel User Entries: 2/2
Curr/Cum Alloc:2/3 Free:0/1 Dyn:2 AllocErr:0 FreeErr:0
In the above scenario, IAP VC’s IPSec’s inner IP, 192.168.100.101 is using the role, “iap-role” and profile is “defaultiap”. 192.168.200.106 is the actual IP of the same VC.
If CoA is a requirement, do not perform source NATing for RADIUS. For RFC 3576-compliance, CoA messages
are initiated by the RADIUS server. Therefore, do not configure a rule on the WLAN controller to source NAT
RADIUS traffic. If the RADIUS server is in the data center, for RFC 3576-compliance, list the inner IP addresses
that are used for the IPsec tunnels as RADIUS clients.
Configuring an IAP for Instant-VPN Deployment
You can configure an IAP network locally through the Instant WebUI, AirWave, or Aruba Central. Irrespective of how
you configure an IAP network, the entire IAP network configuration resides on the IAPs in a cluster. An IAP uses a
distributed architecture, so an IAP network does not require a physical controller to provide the configured WLAN
services. A physical Aruba WLAN controller is required only for terminating VPN tunnels from IAP networks at
branch locations. The WLAN controller in the data center functions only as a VPN concentrator and it is not required
for IAP branches that do not require VPN functionality.
In addition to configuring basic settings such as user roles and SSIDs, an IAP network requires you to perform the
following configuration tasks for Instant-VPN operation:
l
Defining the VPN host settings
l
Configuring the routing profile
l
Configuring DHCP profiles for different Instant-VPN modes
l
Configuring an SSID or wired port for Instant-VPN
l
Enabling Dynamic RADIUS Proxy (DRP)
l
Configuring enterprise domains
The sections below describe these tasks in detail.
Defining the VPN Host Settings
The VPN endpoint on which a master AP terminates its VPN tunnel is considered the host. You can configure a
master AP in an IAP network with two hosts; a primary and a backup. The primary and backup host configuration
provides VPN redundancy. Typically, the primary and backup hosts are WLAN controllers located in geographically
separate data centers. The VPN host controller within each data center can be configured with a VRRP based
backup controller. The primary and backup hosts are analogous to the LMS and BLMS controllers in a classic RAP
architecture.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 136
Below figure shows an Instant-VPN architecture designed for redundancy.
Figure 60 Instant-VPN architecture designed for redundancy
To configure the VPN settings, select the VPN menu on Instant WebUI, AirWave, or Aruba Central. The controller
tab in the VPN menu includes all the VPN host settings.
The controller tab provides the following settings:
l
Protocol: This setting defines whether the IAP establishes a GRE tunnel or an IPsec tunnel. Since the InstantVPN architecture defines a secure VPN tunnel, this field is set to IPsec.
l
Primary host: This setting defines the IP address of the WLAN controller that functions as the primary host. In
general, most organizations have a public IP address on the corporate firewall, which forwards the packets to the
controller in the DMZ. If two WLAN controllers are deployed as a VRRP redundant pair in the data center, the
firewall must be configured to forward the packets that are destined for the public IP address to the virtual IP
address that is used between the master and the VRRP backup WLAN controller. The only port that is required to
be open on the firewall for Instant-VPN is UDP port 4500 (IPsec NAT-T). The primary host IP address is an IP
address that can be reached through the Internet (that is, a public IP address). In general, an IP network should
be able to reach the primary host IP address without any tunneling.
l
Backup host: This setting defines the IP address of the WLAN controller that functions as the backup host. The
primary and backup hosts are deployed in geographically redundant data centers. Like the primary host IP
address, the backup host IP address must be reachable from an IAP network without any tunneling.
l
Preemption: Even when an IAP is on a backup host, it tests connectivity to the primary host in the background.
If preemption is enabled, an IAP that terminates its tunnel on the backup host switches back to the primary host
when the primary host becomes available again.
l
Hold time: This setting defines the time (in seconds), that an IAP waits before it switches back to the primary
host when preemption is enabled. This setting is visible on the Instant WebUI only if preemption is enabled.
l
Fast failover: By default, a master AP in an IAP cluster establishes only a single IPsec tunnel at any time, either
to the primary or to the backup host. If the communication to one host fails, the master AP establishes an IPsec
tunnel to the other host. However, if fast failover is enabled, the master AP can establish a backup VPN tunnel
even while the primary VPN tunnel is still up. The primary tunnel is in the active state and the backup tunnel is in
an ideal state. The purpose of fast failover is to reduce the failover time by eliminating the tunnel setup time during
failover.
137 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
l
Secs between test packets: This setting defines the frequency at which packets are sent to the controller to
detect the connection status. The unit is seconds per packet and the default value is 5 seconds, which means
that every 5 seconds the IAP sends one packet to the controller.
l
Max allowed test Packet loss: This setting defines the number of lost packets after which the IAP tears down
the tunnel. The default value is 6 packets.
Below is an example IAP configuration with these settings:
l
Protocol:IPsec
l
Primary Host: 199.xx.xx.137 (public IP)
l
Backup Host: 199.xx.xx.138 (public IP)
Figure 61 IAP IPSec configuration with primary and backup hosts
Configuring a Routing Profile
The second tab under the VPN settings menu is the routing profile tab. The routing profile on an IAP determines
whether the traffic that is destined for a subnet is forwarded through an IPsec tunnel or bridged locally. If the routing
profile is empty, the client traffic is bridged locally. If the routing profile is configured to tunnel 10.0.0.0 /8, traffic
destined for 10.0.0.0 /8 is forwarded through the IPsec tunnel and the traffic to all other destinations is bridged
locally.
An IAP network has only one active tunnel even if fast failover is enabled. At any time, traffic can be tunneled only to
one VPN host. (Policy-based routing and load balancing between the primary and backup hosts is currently not
supported).
To configure a route in the routing profile, define these settings:
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 138
l
Destination: This setting defines the IP address or subnet that must be reached through the IPsec tunnel. Traffic
is forwarded through the IPsec tunnel to the IP address or subnet that is defined by this setting.
l
Netmask: This setting defines the network mask to the destination that is defined in the Destination setting.
l
Gateway: This setting defines the WLAN controller to which the traffic must be tunneled. This address is the
actual WLAN controller IP address and not the public IP address that is defined as the VPN host. You can find
the actual IP address of the WLAN controller that functions as the primary or backup host through the controller
CLI in the output of the show controller-ip command or on the “controller IP details” screen on the WebUI of the
WLAN controller. If you have a primary and backup host, configure two routes with the same destination and
netmask, but for the primary route, configure the gateway as the IP address of the primary controller, and for the
backup route, configure the gateway as the IP address of the backup controller. The route that is selected from
the routing profile is based on the WLAN controller with which the VPN tunnel is established.
If a pair of controllers is configured for VRRP-based master-backup redundancy, every controller has a physical IP
address and there is a single virtual IP address. If the VPN host (primary or backup) is represented by a redundant
VRRP controller pair, the routing profile must have routes to the physical IP addresses of the VRRP master and
backup controllers or the virtual IP address of the VRRP redundant controllers. The following examples illustrate this
configuration:
Controller Redundancy Example 1
Consider an organization with two data centers: DC1 and DC2. The WLAN controller in the primary data center
(DC1) has a physical IP address of 10.68.33.6 and the public IP address of the firewall that is assigned to this
controller is 199.xx.xx.137. (The firewall forwards the traffic from 199.xx.xx.137 to 10.68.33.6). The controller in the
backup data center (DC2) has a physical IP address of 10.68.48.6 and the public IP address of the firewall that is
assigned to this controller is 199.xx.xx.138. (The firewall forwards the traffic from 199.xx.xx.138 to 10.68.48.6). In
this situation, the routing profile for an IAP branch that must establish a tunnel to 10.0.0.0 /8 contains these routes:
l
10.0.0.0 255.0.0.0 10.68.33.6
l
10.0.0.0 255.0.0.0 10.68.48.6
The master AP in the IAP cluster selects the route depending on whether the VPN tunnel is terminating on the
primary or backup host. The primary and backup host configurations under the VPN host settings are 199.xx.xx.137
for the primary host and 199.xx.xx.138 for the backup host.
Controller Redundancy Example 2
Consider an organization with two data centers: DC1 and DC2. Each data center has a pair of VRRP-based
redundant controllers.
l
l
l
Primary data center (DC1)
n
The physical IP address of the VRRP master controller in the primary data center is 10.68.33.6.
n
The physical IP address of the VRRP backup controller in the primary data center is 10.68.33.7.
n
The virtual IP address between the VRRP master and backup controller in the primary data center is
10.68.33.8.
n
The public IP address that is used for the primary host configuration is 199.xx.xx.137
Backup data center (DC2)
n
The physical IP address of the VRRP master controller in the backup data center is 10.68.48.6.
n
The physical IP address of the VRRP backup controller in the backup data center is 10.68.48.7.
n
The virtual IP address between the VRRP master and backup controller in the backup data center is
10.68.48.8.
n
The public IP address that is used for the backup host configuration is 199.xx.xx.138.
In this situation, the routing profile for an IAP branch that must establish a tunnel to 10.0.0.0 /8 contains these
routes:
139 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
n
10.0.0.0 255.0.0.0 10.68.33.6
n
10.0.0.0 255.0.0.0 10.68.33.7
n
10.0.0.0 255.0.0.0 10.68.48.6
n
10.0.0.0 255.0.0.0 10.68.48.7
The master AP in the IAP cluster selects the route depending on which controller is terminating the VPN tunnel. The
primary and backup host configurations under VPN host settings are 199.xx.xx.137 for the primary host and
199.xx.xx.138 for the backup host.
An alternative routing profile configuration for the above-mentioned example includes the gateway IP address as the
virtual IP address of the VRRP redundant controllers. In this situation, the routing profile for an IAP branch that must
establish a tunnel to 10.0.0.0 /8 contains these routes:
l
10.0.0.0 255.0.0.0 10.68.33.8
l
10.0.0.0 255.0.0.0 10.68.48.8
Below figure shows controller redundancy example 2 that is described above.
Figure 62 Routing profile configuration with VRRP-based redundant controllers
The routing profile on an IAP allows a total of 32 entries.
The routing profile is universal and applies to all SSIDs and wired ports that you configure in local mode,
centralized L2 mode and distributed L3 mode. For example, a routing profile that is configured to tunnel to 10.0.0.0
/8 applies to both the employee SSID that is configured for L3 mode and a guest SSID that is configured for local
mode. However, you can set up a user role to deny guests access to the 10.0.0.0 /8 network and source NAT all
other traffic locally to the Internet. User roles and firewall policies are applied to client traffic before the routing
profile is applied.
Below figure, is an example of the screen that lets you configure the routing profiles that are associated with
controller redundancy example 2 that is described above:
l
10.0.0.0 255.0.0.0 10.68.33.6
l
10.0.0.0 255.0.0.0 10.68.33.7
l
10.0.0.0 255.0.0.0 10.68.48.6
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 140
Figure 63 Configuring routing profiles
Configuring DHCP Profiles for Instant-VPN Modes
The DHCP server menu of the Instant WebUI lets you create DHCP profiles that determine the Instant-VPN mode
of operation. An Aruba Instant network can have multiple DHCP profiles configured for different modes of InstantVPN. You can create a total of 16 DHCP profiles for each Aruba Instant cluster and the DHCP profile definition
varies, based on the Instant-VPN mode. For information about the different Instant-VPN modes, see Understanding
Instant-VPN Modes.
The DHCP menu in Aruba Instant has three sections:
l
Distributed DHCP Scopes: This section includes the DHCP profile configuration for distributed L2 mode and
distributed L3 mode.
l
Centralized DHCP Scopes: This section includes the DHCP profile configuration for centralized L2 mode and
centralized L3 mode.
l
Local DHCP Scopes: This setting includes the DHCP profile configuration for Local mode.
141 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Below Configuring an IAP for Instant-VPN Deployment is an example of the screen that lets you configure DHCP
server scopes.
Figure 64 Configuring DHCP server scopes
DHCP Profile for Local Mode
In local mode, the master AP in an IAP cluster is both the default gateway and DHCP server for clients that connect
to an SSID or wired port that operates in this mode. In local mode, the master AP assigns an IP address from a
configured local subnet. The subnet is not a Layer 2 or Layer 3 extension of the corporate subnet and the WLAN
controller in the data center has no visibility to this subnet. Client traffic that must be forwarded to corporate
destinations is source NATed by the master AP using the inner IP address of the IPSec tunnel. Traffic that is
destined for the Internet or local destinations is source NATed using the physical IP address of the master AP.
The following configuration settings are used for a local mode DHCP profile:
l
Name: This setting defines a unique name for the DHCP profile.
l
Type: This setting defines the Instant-VPN mode for the DHCP profile. The available options are Local and Local
L3.
l
VLAN: This setting defines the VLAN ID for the subnet that is used in the DHCP profile. This VLAN ID must be
defined in the VLAN settings of an SSID or wired port to allow it to operate in the appropriate Instant-VPN mode.
This VLAN ID should also be configured on the switches and allowed on the trunk links, between VC/master &
slave IAPs.
l
Network: This setting defines the subnet that is used by the DHCP profile.
l
Netmask: This setting defines the netmask of the subnet that is defined in the Network field.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 142
l
Excluded Address: This setting defines the IP addresses that must be excluded from the DHCP lease. The
value that you enter in the field determines the exclusion range of the subnet. Specify a range of IP addresses to
exclude. You can add up to two exclusion ranges. Based on the size of the subnet and the value configured for
Excluded Address, the IP addresses either before or after the defined range are excluded. Excluded range should
have either the start IP of the subnet or the last IP of the subnet. For example:
Figure 65 Configuring a DHCP scope for local mode
This configures a DHCP scope of 192.168.12.12 – 192.168.12.199.
l
DNS server: This optional setting defines the DNS server IP address that is provided to the clients by the DHCP
server for this DHCP profile. If you do not configure a DNS server, client DNS requests are resolved by the DNS
server of the IAP (that is, the DNS server information that an IAP receives from the DHCP server in the branch or
from an ISP).
l
Domain name: This optional setting defines the domain name that is provided to the clients by the DHCP server
for this DHCP profile.
l
Lease time: This optional setting defines the lease time for clients.
l
Option: This optional setting defines additional DHCP options. You can configure a total of eight DHCP options.
One IP address from the configured network is used as the default gateway for clients. In most cases, the first
host IP address on the configured subnet is the default gateway. In the above example, the client got a default
gateway of 192.168.12.11.
143 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
DHCP Profile for Centralized L2 Mode
In centralized L2 mode, the DHCP server and gateway for the clients reside in the data center. The subnet that is
used in this mode is a Layer 2 extension of a corporate subnet. The client traffic that is destined for corporate
resources is forwarded to the WLAN controller with the appropriate VLAN tags inside an IPsec-GRE tunnel. Any
traffic that is destined for the Internet or a local resource is source NATed using the physical IP address of the
master AP.
These configuration settings are used for a centralized L2 mode DHCP profile:
l
Name: This setting defines a unique name for the DHCP profile.
l
VLAN: This setting defines the VLAN ID for the subnet that is used in the DHCP profile. The VLAN ID must be
defined in the VLAN settings of an SSID or wired port to allow it to operate in the appropriate Instant-VPN mode.
The VLAN must exist on the WLAN controller. The DHCP broadcasts from the clients are forwarded through the
IPsec-GRE tunnel to the WLAN controller in the data center. Any client traffic that is destined for corporate
resources is tagged with this VLAN ID and forwarded through the IPsec-GRE tunnel. This VLAN ID should also
be configured on the switches and allowed on the trunk links, between VC/master & slave IAPs.
l
Split tunnel: If split tunnel feature is disabled, (enabled by default), then inspite of any configuration under routing
profile, all traffic will be sent to the data center over IPSec tunnel. This feature was introduced as centralized L2
mode, most of the time has use case, where all the traffic needs to be tunneled over IPSec tunnel to the data
center and no traffic should be split tunneled and source NATed over VC IP. To achieve this objective, more
easily for a particular VLAN, this feature was introduced.
l
Option 82: This setting defines a method to enforce more security in the DHCP infrastructure. By default, the
DHCP server is vulnerable to a number of security threats, such as an attacker attempting to exhaust the DHCP
pool addresses by sending fake DHCP client packets. Enabling Option 82 ensures that the DHCP client is
authentic. Also, Option 82 allows the DHCP server to be anywhere in the intranet or cloud, while still assigning
addresses with the local context, that is, centralized control with local address assignment. For Option 82 to take
effect, the DHCP server must also be configured for Option 82.
The DHCP profile definition for centralized L2 mode does not require a network configuration, but the VLAN ID
determines the functionality. The VLAN ID that is defined in the DHCP profile configuration for centralized L2
mode must exist on the WLAN controller as a Layer 2 VLAN (that is, no IP address configured on the VLAN
interface) or a Layer 3 VLAN (that is, an IP address configured on the VLAN interface). In the data center, ensure
that inter-VLAN routing is enabled between the VLAN that is used for centralized L2 mode and other VLANs.
Below figure is an example of a screen that lets you configure a DHCP profile for centralized L2 mode using VLAN
ID 30.
Figure 66 Configuring a DHCP scope for centralized L2 mode
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 144
In distributed L3 mode, the master AP in an IAP cluster is the default gateway and DHCP server for clients. Unlike in
local mode, the subnet that is used in this mode is a Layer 3 extension of a corporate subnet and, therefore, the
WLAN controller and other upstream routers in the data center can reach this subnet. The client traffic that is
destined to corporate resources is routed through the IPsec tunnel to the WLAN controller. The traffic that is destined
to the Internet or local resources is source NATed using the physical IP address of the master AP.
In distributed L3 mode, you usually configure a large network, which is automatically broken down into smaller
subnets based on the client count configuration. The subnet that is dedicated to each branch depends on the client
count and network settings in the DHCP profile configuration. The master AP and WLAN controller use the Branch
ID (BID) process to determine the Layer 3 subnet that is used in a branch. For more information about the BID
process and distributed L3 mode, see Branch-ID Allocation Algorithm and Instant-VPN: Distributed L3 Mode.
Aruba Instant allows you to configure a dedicated Layer 3 subnet for each branch. Instead of configuring a large
subnet that is then divided into smaller subnets based on client count, you can definite a unique Layer 3 subnet for
each branch with the required subnet. However, this process slightly increases the management overhead
because the IP address range configuration must be modified on a per-branch basis.
The distributed scope configuration has three tabs: Network, Branch Size, and Static IP. These tabs are described in
the following three sections.
Network Tab
As part of the configuration of a DHCP profile for distributed L3 mode, the following configuration settings are
available under the Network tab:
l
Name: This setting defines a unique name for the DHCP profile.
l
Type: This setting defines the Instant-VPN mode for the DHCP profile. Available options are Distributed L3 and
Distributed L2. Select Distributed L3 for distributed L3 mode.
l
VLAN: This setting defines the VLAN ID for the subnet that is used in the DHCP profile. The VLAN ID must be
defined in the VLAN settings of an SSID or wired port to allow it operate in the appropriate Instant-VPN mode.
The distributed L3 mode VLAN need not be configured on the WLAN controller. The master AP replies to DHCP
broadcasts from the clients. Any client traffic with a corporate destination is routed through the IPsec tunnel.
l
Netmask: This setting defines the netmask for the DHCP profile.
l
DNS server: This optional setting defines the DNS server IP address that is provided to the clients by the DHCP
server for this DHCP profile. If you do not configure a DNS server, client DNS requests are resolved by the DNS
server of the IAP (that is, the DNS server information that an IAP receives from the DHCP server in the branch or
from an ISP). If you define a corporate DNS server in the data center, the Enterprise domain configuration (under
the Enterprise domain tab) of the IAP WebUI determines whether the DNS traffic is forwarded to this DNS server
or is source NATed to the DNS server of the IAP. For more information, see DNS Handling in an Aruba InstantVPN Network.
l
Domain name: This optional setting defines if the domain name is provided to the clients by the DHCP server for
this DHCP profile.
l
Lease time: This optional setting defines the lease time for clients.
l
IP Address Range: This setting defines the IP address range that is divided into smaller subnets based on the
Clients per branch setting under the Branch Size tab (see Branch Size Tab).
145 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
For example, an organization uses subnet 10.68.0.0 /16 with 250 clients per branch in a distributed L3 mode
configuration to support 256 branches. (250 over here is taken as an example. One /24 subnet can fit in 253 IP
addresses. You can use 253 here as well.) This organization configures the IP Address Range setting as 10.68.0.0 10.68.255.255. In this configuration, if the IP address range is configured as 10.68.0.1 - 10.68.255.254, only 254
branches can be supported because in Layer 3 mode each branch requires a /24 subnet to support 250 clients. With
an IP address range configuration of 10.68.0.1 - 10.68.255.254, subnets 10.68.0.0/24 and 10.68.255.0 /24 cannot be
used because 10.68.0.0 and 10.68.255.255 are not included in the IP address range. Instead of a single contiguous
address space, you can configure multiple address spaces (use the + icon).
If an organization requires a specific subnet at a specific branch, it is not useful to define a large subnet that is
automatically divided into smaller subnets based on client count. For example, an organization wants subnet
10.68.0.0 /24 at Site A and subnet 10.68.1.0 /24 at Site B. If they define a single large subnet that is automatically
allocated to the branches based on the BID algorithm, that configuration cannot guarantee that Site A is assigned
subnet 10.68.0.0 /24 and Site B is assigned subnet 10.68.1.0 /24. This requirement is very common among
organizations that want to upgrade their existing branch infrastructure and keep the same address scope because
those branches contain devices with static IP addresses. Aruba Instant 3.3 and greater support this requirement by
allowing you to define a pre-determined subnet on a per-branch basis. To achieve this subnet configuration, configure
the IP Address Range settings to include only the IP address range and client count for a specific branch. For
example, an organization wants subnet 10.68.0.0 /24 at Site A and subnet 10.68.1.0 /24 at Site B. The IP address
allocation and branch size configuration for the IAP network in Site A must be 10.68.0.0 – 10.68.0.255 with 253
clients per branch and in Site B must be 10.68.1.0 – 10.68.1.255 with 253 clients per branch.
You must include the network and broadcast address in the IP address range configuration for distributed L3 mode.
For example, if Site B is configured as 10.68.1.1 – 10.68.1.254 with 253 clients instead of 10.68.1.0 – 10.68.1.255
with 253 clients, then a /24 subnet cannot be formed and the clients at Site B cannot receive an IP address.
The BID allocation process is essential even if a predefined subnet is configured for a branch. Clients cannot
receive an IP address until the BID allocation process is successful.
The first host IP address in the subnet that is allocated to a branch is used as the default gateway for clients.
l
Option: This optional setting defines additional DHCP options. You can configure a total of eight DHCP options.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 146
Configuring an IAP for Instant-VPN Deployment figure is an example of the Network tab of the screen that lets you
configure a DHCP profile for distributed L3 mode.
Figure 67 Configuring the network settings for a DHCP scope for distributed L3 mode
Branch Size Tab
The Branch Size tab lets you define the number of client IP addresses that are required for each IAP branch in the
distributed L3 mode. This setting determines the number of distributed L3 branches that the network that you defined
under “Network” tab can support. For example, a configuration of 10.68.0.0 /16 with 250 clients per branch can
support a total of 256 branches. For more information, see Branch-ID Allocation Algorithm.
147 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Configuring an IAP for Instant-VPN Deployment figure is an example of the Branch tab of the screen that lets you
configure a DHCP profile for distributed L3 mode.
Figure 68 Configuring the branch size settings for a DHCP scope for distributed L3 mode
Static IP Tab
The Static IP tab lets you reserve a set of IP addresses from the subnet that is allocated to a branch for devices that
require static IP addresses. For example, if a branch is assigned a /24 subnet, based on a distributed L3
configuration of 10.68.0.0 /16 with 250 clients per branch, you can reserve a set of IP addresses at the start and at
the end of the subnet that is allocated to that branch.
Below figure is an example of the Static IP tab of the screen that lets you configure a DHCP profile for distributed L3
mode.
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 148
Figure 69 Configuring the static IP settings for a DHCP scope for distributed L3 mode
Configuring an SSID or Wired Port for Instant-VPN
For a client to be able to connect to an Instant-VPN network, you must configure an SSID or wired port on an IAP for
the appropriate Instant-VPN mode of operation. The VLAN configuration for an SSID or wired port determines
whether an SSID or wired port is set up for the Instant-VPN. When you configure an SSID or wired port for a specific
Instant-VPN mode, the VLAN ID that is defined in the configuration of the SSID or wired port must match the VLAN
ID that is defined in the DHCP profile. An Instant-VPN cannot function if the VLAN configuration on an SSID or
wired port is set to Virtual Controller assigned, Default, or Static with a VLAN ID that does not match the VLAN ID in
the DHCP profile. For example, consider an IAP configuration with these DHCP profiles:
l
Distributed L3 DHCP profile with VLAN ID 50
l
Local DHCP profile with VLAN ID 60
l
Centralized L2 DHCP profile with VLAN ID 30
To configure an SSID or wired port for distributed L3 mode on the IAP, set the VLAN configuration on the SSID to
Static with VLAN ID 50. Similarly, to configure an SSID or wired port in local mode, set the VLAN configuration to
Static with VLAN ID 60.
Below are examples of these VLAN configurations on the WebUI of an IAP. Note that once you create appropriate
DHCP profiles in DHCP server section, they come up in the drop down options, under “Custom” field.
149 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Figure 70 Configuring an SSID for VPN modes
In ArubaOS 6.3 and greater, all Instant-VPN tunnels are considered trusted. Therefore, the users in Instant-VPN
branches do not display in the user table of the WLAN controller. However, the users in the Instant-VPN branches
are always visible on AirWave and the Instant WebUI in each branch.
Enabling Dynamic RADIUS Proxy (DRP)
The location of the RADIUS server that is used to authenticate users in branch locations varies from organization to
organization. Most organizations have a centralized RADIUS server in the data center to authenticate remote users,
but some organizations might use a local RADIUS server at each location. Other organizations might also use a
local RADIUS server for employee authentication and a centralized RADIUS server with a captive portal for guest
authentication.
Enable DRP to ensure that RADIUS traffic is routed to the appropriate RADIUS server. When enabled, DRP also
ensures that the source address for all RADIUS traffic is the VC IP address or the inner IP address of the IPsec
tunnel from the master AP, depending on the IP address of the RADIUS server and the routing profile. If the routing
profile is configured to set up a tunnel to the 10.0.0.0 /8 network and if the RADIUS server has IP address
10.68.32.40, the RADIUS traffic is forwarded through the IPsec tunnel using the inner IP address of the IPsec tunnel
from the master AP. However, if the IP address of the RADIUS server is 192.168.32.40, the RADIUS traffic is
bridged locally using the VC IP address.
If you configure DRP, you must assign a static IP address to the VC. This IP address cannot be 0.0.0.0. In branch
office deployments that do not use local RADIUS resources, it might not be possible to determine the IP address
range that is used locally. In such a situation, configure the IP address of the VC as a random static IP address in
a non-corporate private IP address range (for example, 192.168.137.139, if the corporate network is 10.0.0.0 /8).
Such a configuration enables DRP to tunnel the RADIUS traffic to the central RADIUS server in the data center.
DRP is not required in single-AP Instant-VPN deployments. However, if DRP is disabled in single AP
deployments, the NAS-IP attribute in RADIUS packets that are destined for the RADIUS server in the data center
Aruba Instant Validated Reference Design
Designing Distributed Enterprise Networks with Aruba Instant | 150
is set to the local IP address of the IAP and not to the inner IP address of the IPsec tunnel. Therefore, Aruba
recommends that you enable DRP in single AP deployments with RADIUS servers that use the NAS IP attribute
as a filter for authentication.
Configuring Enterprise Domains (Split-DNS)
By default, all DNS requests from a client are forwarded to the DNS server of the client. In a typical IAP deployment
without VPN configuration, client DNS requests are resolved by the DNS server of the client. However, this
behavior changes if an IAP is configured for Instant-VPN.
The DNS behavior of an IAP network (with SSIDs or wired ports) that is configured for Instant-VPN is determined by
the enterprise domain settings. The enterprise domain setting on the IAP defines the domains for which the DNS
resolution must be forwarded to the default DNS server of the client. For example, if the enterprise domain is
configured for arubanetworks.com, the DNS resolution for host names in the arubanetworks.com domain is
forwarded to the default DNS server of the client. The DNS resolution for host names in all other domains is source
NATed to the local DNS server of the IAP. This configuration can provide faster DNS response times, and extra
privacy.
If you configure an asterisk (*) instead of a domain name in the enterprise domain list, all DNS requests are
forwarded to the default DNS server of the client. If you want all DNS requests to be processed by the DNS server
of the client, configure an asterisk (*) in the enterprise domain setting.
Below is an example of a screen that lets you configure enterprise domains.
Figure 71 Configuring enterprise domains
151 | Designing Distributed Enterprise Networks with Aruba Instant
Aruba Instant Validated Reference Design
Chapter 5
Aruba Instant management using Aruba AirWave
Communication Concepts
Essentially, all communication between Aruba Instant and AirWave occurs through standard HTTPS traffic on port
443 and is always initiated by the virtual controller (VC).This type of communication allows devices to be deployed
quickly and without changing firewall rules. During normal operation, the VC sends updates to AirWave every
minute. While an AirWave user is making configuration changes or running diagnostic commands, the VC checks in
every 5 seconds to improve the responsiveness for the user.
IAP can also communicate with AirWave on a specified port. In IAP side, configure Airwave IP as IP:Port,
meanwhile, set communication port in AMP Setup.
In an environment where the IAPs and data center are all on the same network you can deploy AirWave securely
inside the firewall. Below figure is an example of such a deployment.
Figure 72 IAPs and data center are all on the same network
In a distributed network, the AirWave Management Platform (AMP) needs to be reachable from outside the firewall,
to allow IAPs to communicate with the AMP through HTTPS. Below figure, is an example of such deployment.
The AirWave WebUI can also display data obtained through HTTPS traffic on port 443. Most network administrators
do not want their NMS systems to be exposed outside. To ensure that the WebUI is accessible only to users on a
trusted network, AirWave has an AMP whitelist feature. When you add internal networks to the whitelist and enable
the whitelist, networks that are not on the whitelist are denied access to the AirWave WebUI. Aruba Instant Validated Reference Design
Aruba Instant management using Aruba AirWave | 152
Figure 73 Adding a network to the AMP whitelist
Figure 74 Distributed network with IAPs outside the firewall
Adding IAPs to AirWave
You can add an IAP to AirWave by adding the AirWave communication parameters to the VC. These parameters
include the AirWave IP address, a shared secret, and the organization string, which is a colon-separated list of
strings that define the group and folder in which the device is placed. You can add these parameters through the VC
WebUI, through Aruba Activate, or through DHCP options. These options are described in the following sections.
For more information about the organization string and how it is used to authorize and place devices into groups and
folders in AirWave, see Provisioning an IAP through DHCP Options and Organization String.
Manually Adding an IAP through the VC WebUI You can add the AirWave communication parameters through the VC WebUI. The organization field has
communication parameters for group & folders.
153 | Aruba Instant management using Aruba AirWave
Aruba Instant Validated Reference Design
Figure 75 Adding AirWave communication parameters to the VC WebUI
Provisioning an IAP through Aruba Activate
Aruba Activate is a secure, cloud-based system that enables efficient deployment and maintenance of Aruba
devices, and is available online at https://activate.arubanetworks.com.
There are two key services offered by Aruba Activate:
l
Provisioning Service – Activate Provisioning service helps end users reduce cost and time to successfully deploy
Instant Access Points any place with network access.
l
Firmware Distribution Service – New Firmware are added by Aruba to remote servers for all versions of IAPs.
IAPs once provisioned and connected to the Internet, check in every 7 days to see if a new firmware is available.
Instant Access Points (IAPs) can utilize the remote server to download and automatically upgrade firmware
based on the device type.
Add Devices in Activate
When you order a new device from Aruba Networks, that device is automatically added to your inventory in Aruba
Activate. You need to create an account on activate.arubanetworks.com. You can also add an IAP into activate
using the “add device” option, if it’s not automatically added to your account. It will need you to add your IAP’s mac
address and Cloud activation key, which can be found in the Maintenance tab of IAP:
When a device is in your inventory, it can be automatically or manually associated with a folder and a provisioning
rule.
After a remote technician connects the IAP to the Internet, the IAP securely connects to Aruba Activate, retrieves its
provisioning information, uses the provisioning information to connect to either its AirWave server or to Aruba
Central, and updates its configuration and firmware.
Aruba Instant Validated Reference Design
Aruba Instant management using Aruba AirWave | 154
Key information such as Serial, MAC address, Status, IAP model number, and PO number are all listed in the Home
screen for easy access to users. Devices in the Activate home screen are either listed as shipped or provisioned.
Shipped means the devices have been shipped from Aruba but have not yet made contact with the Activate server.
All IAPs with status “Shipped” are part of the default folder. A device that is provisioned will have it listed under a
different user defined folder.
Figure 76 Provisioning an IAP through Aruba Activate
Create Folders in Activate
In order for the IAPs to receive the appropriate information from Activate, they must be part of a non-default folder
with at least one Provisioning Rule bound to this folder. Once you have your provisioning rules established in their
respective folders, you can start moving IAPs into these folders. When an IAP checks into Activate, the cloud
system will know that it belongs to a certain folder with provisioning rules that need to be applied to the device.
To create a new folder, click on the “Setup” icon and then, you can see three window boxes across the top - Folders,
Rules, and Users. Click on the New link in the “Folder” box and enter the following information:
l
Name - To keep it consistent, enter the same name as defined for the Group in AirWave. However, this does not
need to match.
l
Select parent folder - It can either be the default folder, or you can create a parent folder with customer name or
region and then all different templates that belong to the customer/region can reside under different folders
referenced to the parent folder. For most deployments, the default folder will be the parent folder. However, you
can create users with roles and assign them to certain folders. This could make sense if the customer wants to
delegate Activate responsibility for other regions or administrators.
l
Enter any Notes for future reference.
155 | Aruba Instant management using Aruba AirWave
Aruba Instant Validated Reference Design
Create provisioning rules in Activate
The next step is to create Provisioning Rules and apply them to this new folder. The rule specific to this use case
will be "IAP to AirWave". Note the other types available in Activate for other use cases like MAS wired switches,
IAP to CAP, and IAP to RAP.
To create a new provisioning rule, click on the New link in the middle box labeled Rules and supply the following
information:
l
Under Rule Type, select Provisioning Rule
l
Under Parent Folder, select the new folder that was created in the previous step
l
Under Provisioning type, select IAP to AirWave
l
Under AMP IP, enter the AirWave IP address. This should be a public IP address if provisioning home IAPs
using the RAP-NG architecture (IAP+VPN). If this is an IAP deployment with AirWave accessible from the APs,
then a public IP address on AirWave isn't needed.
l
Under Shared Secret, enter an alphanumeric key that will act as a trust mechanism between the Instant AP and
AMP. There is no requirement to set the same value anywhere in AMP. The first IAP to connect with secret
configured will set the secret on AirWave for all future connections. This cannot be changed (you must contact
TAC to reset the secret).
l
Under Organization, enter the exact same (case sensitive) value that is created (or will be created) on AMP. This
is one of the most important aspects of zero touch provisioning. In addition to this value, you can colon separate
additional values to create subfolders in AMP for further granularity in the AP/Devices tab. For example, if I
would like to create the group "US-East" but then have subfolders for smaller regions, I can do the following in
this field. "US-East:MA:Boston" This would create/provision from the US-East Group in AMP as well as
create/add folders as such in AMP - Top --> US-East --> MA --> Boston.
Aruba Instant Validated Reference Design
Aruba Instant management using Aruba AirWave | 156
From 4.2.0.1 onwards, you can also specify VPN server IP address in the “IAP to AirWave” provisioning rule. IAP
creates an IPSec tunnel to the IP of the controller you provide in VPN server field. Confirm that IAP has got the
VPN server info by, “show vpn config”..
Another rule you can apply to this folder is an email notification when a device gets provisioned. To create this rule,
select New again in the Rules box and provide the following information:
l
Under Rule Type, select Notification
l
Under Email On, select Provisioning
l
Under For Rule, select the provisioning rule from the previous step
l
Under Email to, enter an email address(es)
157 | Aruba Instant management using Aruba AirWave
Aruba Instant Validated Reference Design
We are now at a stage where the provisioning rules are complete. If required, repeat the process above to create
other folders and rules for different groups within AirWave. For RAP-NG, this would logically map to different
functional groups within the company or different regions where RAPs would be deployed. A sample Folder/Group
list may look like the following:
l
US-East
l
US-Central
l
US-West
l
EMEA
l
APAC
l
IT-Group
Folders contain provisioning rules for Instant devices.
Assign Devices to Folders in Activate
After the folders and rules are created, the next step is to return to the Device table on the Activate home screen and
assign devices into their respective folders. If the customer has a large amount of devices, it may help to filter using
the filter icon located to the right of each column header on this screen. For example, if you know the hardware type,
serial number, a portion of the MAC address, and/or a ship date after a specified date or within a date range, these
filters can help narrow down a large list of devices for assigning to folders. If filters are in use, you can easily see that
as the filter icon will change from its default grey color to a navy blue color.
An example of using filters is shown below:
Once you have the specific device you want to move or a list of devices you want to move, you can then assign
them to a folder. There are two methods to accomplish this.
1. If you want to move a single device, select it from the devices table and a Device Detail window will appear in the
bottom left of the screen with one clickable button. Click Edit and you will be able to select a Folder for this one
Aruba Instant Validated Reference Design
Aruba Instant management using Aruba AirWave | 158
device.
2. Most of the time, customers will want to move a whole list of devices. In order to select the right list of devices,
the use of filters is imperative. You use the filters to only display the devices you wish to move. Once you have
the desired list, you can click on the Move to Folder button at the top right and bulk move all devices listed on this
filtered screen.
The Move to Folder button invisible in certain browsers. If you are unable to see it (as shown below), please try
another browser.
Following CLI outputs on the master can show the status of provisioning & information received.
IAP# show log provision
Provisioning Log
---------------Time State Type Log Message
--------------------Tue Oct 13 20:43:20 2015 DHCP Option In progress Performing DHCP discovery
Tue Oct 13 20:43:20 2015 DHCP Option In progress DHCP lease of 192.168.200.106
obtained, lease time 3600 seconds
Tue Oct 13 20:44:55 2015 AirWave Auto Discovery In progress Performing DNS based AirWave
auto discovery, AMP Domain: aruba-AirWave
Tue Oct 13 20:44:55 2015 AirWave Auto Discovery Warning Failed to resolve AMP Domain
aruba-AirWave during AirWave auto discovery
Tue Oct 13 20:44:55 2015 DHCP Option Fail through No DHCP Option-based
provsioning information are present, failing-through to other provisioning options
Tue Oct 13 20:44:55 2015 Activate In progress Attempting provisioning via
Activate server: device.arubanetworks.com
Tue Oct 13 20:44:55 2015 Activate Debug Sent challenge response to
Activate Server: device.arubanetworks.com
Tue Oct 13 20:44:56 2015 Activate Completed Received instruction from
Activate Server to connect to AMP server at aruba using organization '2.2.2.2'
159 | Aruba Instant management using Aruba AirWave
Aruba Instant Validated Reference Design
IAP# show activate status
Activate Server :device.arubanetworks.com
Activate Status :success
Organization :aruba
AirWave Server :2.2.2.2
AirWave Shared Key :9243aeb0e944e53a50f0ad38ae603ecba20c33621b13ab07
Other useful commands on IAP:
l
Show datapath session | include 443
l
Show ap debug AirWave
l
AirWave Server List
------------------Domain/IP Address Type Mode Status
----------------- ---- ---- -----199.127.100.100 Primary Manage Login-done
l
Show ap debug AirWave-data-sent
l
If there is no communication, you will see "cat: /tmp/awc_buf.txt: No such file or directory"
l
Show log ap-debug
Useful tools on AirWave:
l
Check the System --> Event Log for any messages or communication timeouts
l
Check the System --> Status --> /var/log/pound (direct link - [https://]<amp IP>/display_
log?log=%2Fvar%2Flog%2Fpound)
l
This is a log for all HTTP/HTTPS communication into AirWave. Check to see that the IAP's public NAT'ed IP is
seen here and any errors encountered. Very useful to troubleshoot from AirWave if the IAP is even reaching
AirWave if there is no direct access to the IAP remotely.
l
In a working scenario, you should see this every minute or so:
Feb 4 04:02:25 amp pound: <public IP of IAP> POST /swarm HTTP/1.1 - HTTP/1.1 200 OK
Provisioning an IAP through DHCP Options
If a device does not have Internet access during initial provisioning, you can specify AirWave communication
settings to be configured through vendor class identifier (VCI) DHCP options 60 and 43. There can be potential
character limits for option 43 on the DHCP server, please keep them in mind during the deployment. An IAP receives
its AirWave settings from a DHCP server in the following way:
1. The DHCP client on the IAP adds DHCP option 60 to its DHCP request. The value of this option is
ArubaInstantAP. 2. The DHCP server detects DHCP option 60 in the request and checks for DHCP option 43. If the DHCP server
can locate DHCP option 43, the server sends it to the client. The value of this option is the organization string,
AirWave IP address, and shared secret.
3. If the IAP detects DHCP option 43 in the response from the DHCP server, the IAP contacts AirWave at the
supplied IP address and uses the shared secret and organization string.
Use the following values for the DHCP options:
l
For DHCP option 60, use ArubaInstantAP.
l
For DHCP option 43, use <organization string,AirWave IP address,shared secret>
Aruba Instant Validated Reference Design
Aruba Instant management using Aruba AirWave | 160
An example of VCI option 43 is: ArubaRetail:Sunnyvale:Store0001
Adding IAPs to AirWave shows the communication flow between the IAP, DHCP server, and AirWave.
Figure 77 Provisioning an IAP through DHCP options
Below figure shows the configuration of DHCP option 60 in a Microsoft Windows Server 2008.
Figure 78 Configuring DHCP option 60 in a Windows Server 2008
161 | Aruba Instant management using Aruba AirWave
Aruba Instant Validated Reference Design
Below figure shows the configuration of DHCP option 43 in a Microsoft Windows Server 2008.
Figure 79 Configuring DHCP option 43 in a Windows Server 2008
For more about DHCP options, see the Aruba Instant User Guide that is available at the Aruba support website.
AirWave prerequisites
If the devices are communicating from the Internet, AirWave must be visible with a public IP address on the internet.
The only port that needs to be open is 443.
AMP must have the same Group names configured as the provisioning rules in the Organization value in Activate. In
the example above, AMP must have a "US-East" Group. This is assuming that the devices are getting automatically
provisioned using an already established Group configuration.
If this is the first device to check into AirWave, then there are some special caveats to be aware of.
l
The first IAP will automatically create the group in AMP if it's not already created. This Group will be whatever is
the Organization value as entered in Activate.
l
If the first IAP has the desired config, it can be used as a "golden" template for subsequent IAPs following along
in the same group. This would entail configuring the IAP traditionally using the VC GUI on the IAP itself before
communicating with AMP. Then, when it does communicate with AMP for the first time, AMP will create this
group and use the configuration on the IAP as the Group config, which then the subsequent IAPs will get
provisioned with.
l
If the first IAP doesn't have a desired config, a new Group can be created and an existing config copied from an
already established IAP group within AMP. Let's say you already have a known, working IAP group within AMP.
You can create a new Group and then using Instant Config (IAP GUI in AMP), copy the config from the first group
into the newly created second group. This is done in the AirWave --> AirWave Settings screen. Use the field
"Copy Policy from Group" and select the first group with the existing desired config.
Aruba Instant Validated Reference Design
Aruba Instant management using Aruba AirWave | 162
l
If multiple IAPs communicate with AMP at the same time and there is no Group template or config, AMP will use
the first IAP that checked in as the "golden" template for the group. This introduces a bit of chance and a best
practice suggestion would be to have one IAP communicate first into a newly created group before the floodgates
are opened for the other IAPs.
AirWave whitelist
Traditionally, when Instant devices first communicate with AirWave, they have been authenticated using a shared
secret. That's still possible, and is the default behavior. But it's also possible to let them authenticate by whitelisting
them. This adds a level of security beyond what a shared secret provides. More importantly, since devices are
known to AirWave before they ever connect to it, it's possible to define configuration parameters before they are
online, providing a flexible and scalable way to do zero-touch provisioning of Instant.
l
To enable whitelisting, Go to the AMP Setup page and set "Authorize Aruba Instant APs connecting to AirWave"
to "Whitelist". Save the setting.
l
If you plan to use the custom variable feature, all the devices must go into groups using template-based
configuration rather than Instant GUI config.
Adding devices to the whitelist
When you enable Whitelist authorization, the APs/Devices>New page adds the below mentioned buttons:
163 | Aruba Instant management using Aruba AirWave
Aruba Instant Validated Reference Design
Manually on AMP GUI
From APs/Devices>New>Instant AP whitelist, if you choose “Add an Instant AP to the whitelist”, below screen shot
comes up:
For each record, the required fields are:
l
Name
l
Either serial number or MAC address
All other fields are optional.
Import through Activate
From APs/Devices>New>Instant AP whitelist, if you choose “Import Instant whitelist from Activate”, below screen
shot comes up:
Aruba Instant Validated Reference Design
Aruba Instant management using Aruba AirWave | 164
In bulk through CSV file
From the New Devices page, click Import Instant AP Whitelist from CSV. On the subsequent page, upload your csv
file. The file should be in the below format:
Name,LAN MAC Address,Serial Number,Virtual Controller Name,Group Name,Folder Name,custom_variable_
1,custom_variable_9
IAP_Canada_1,ff:c7:c8:c4:21:ff,BD0086086,Canada-Office,Canada,Vancouver:Downtown,abc,456
IAP_US_1,F0:0B:86:CF:93:FF,BE0542245,US-Office,US,San Fancisco:CenterTown:HillTop,cde,789
AirWave in DMZ
With RAP-NG architectures, there is a requirement to have AirWave available to IAPs on the public internet. This
presents some security concerns from our customers. In order to alleviate some of these concerns, there are two
options available to you.
1. Use the AMP Whitelist feature. AirWave 7.7.3 introduced support for AMP whitelists. On the AMP Setup >
Authentication page, you can now include a list of subnets that are able to log in to AMP. If this option is enabled,
then by default, the current client network will appear as the first entry in the list of subnets. Additional entries can
be added, one per line, in the text entry box. A customer would normally add their internal networks to this list.
Any access outside of this list will only be allowed from IAPs. Any user attempting access will get an error
message (see below). This feature effectively allows IAPs access to AirWave while only allowing browser
access to the hosts/subnets in the whitelist.
Do not delete the current client network line from the AMP whitelist. Doing so can result in the loss of access to the
AMP user interface.
165 | Aruba Instant management using Aruba AirWave
Aruba Instant Validated Reference Design
2. Use two AirWave servers. If the security requirements are strict, then there is another alternative to use a
"provisioning" AMP server in the DMZ and the "real" AMP server in the internal network. Here is how that
process would look like:
n
The provisioning AMP server would have the same Group names as the internal AMP server. However, the
provisioning AMP server would only configure the IAPs with the VPN peer address(es) and the internal
AirWave server.
n
The IAPs, when provisioned from Activate would be told where the Provisioning AMP server is located plus
the intended group. n
The Provisioning AMP server would automatically provision and sync firmware but it would only pass along
the VPN information and internal IP address of the internal AirWave server (non-routable on public internet).
Once the IAP comes up with this configuration, it creates a VPN tunnel and communicate with the internal AMP
server for the remainder of its configuration.
In this option, you reduce the risk of a public AMP server with the entire configuration in the DMZ. Since the
controller has to also whitelist the device terminating the VPN tunnel, there is an additional level of authentication
available as well before the IAP gets the rest of its configuration.
If IAP configuration is sending all traffic into the VPN tunnel, this may cause an issue with the firewall located at
datacenter. Consider that before the IAP has its config, it is using the local ISP connection to talk with AirWave.
After it gets its config, it will use the tunnel to talk with AirWave. This may introduce a spoofing error on the firewall
and block the traffic to AirWave. Starting in 4.0, IAP introduced an exception route in the VPN routing profile. For
example, you can have all traffic tunneled except for the AirWave host IP address which will workaround this
design. Below is the screen shot of VPN configuration on the IAP, which can be used to route traffic to
199.127.100.100 outside VPN tunnel.
Aruba Instant Validated Reference Design
Aruba Instant management using Aruba AirWave | 166
When the device is turned on, it communicates with Aruba Activate at https://device.arubanetworks.com, receives
its provisioning settings based on the rules that you defined, and starts to communicate with AirWave. For example:
The rule above will instruct the IAP to create a tunnel to 3.3.3.3. Connect to AirWave on 2.2.2.2, with “aruba” as
organization string.
Organization String
When an IAP is added to AirWave, the device is authorized based on its organization string. The organization string
is a list of colon-separated strings that define the group and folder that the device is placed into. Additionally, a role is
created that gives access only to this folder. This example is a very simple organization string:
US
A device with an organization string of “US” is placed in an AirWave group that is called “US” and in a folder that is
called “US.” The folder is one level beneath the top folder. In addition, a role is created that grants access to devices
in the “US” folder. This example is a slightly more complex organization string:
US:California:Sunnyvale
A device with an organization string of “US:California:Sunnyvale” is placed in an AirWave group that is called “US”
and that has the below mentioned folder hierarchy:
In addition, a role is created that grants access to devices in the “US” group and all its subfolders.
Setting up Groups, Folders and Roles in AirWave
When a device is added to AirWave, it is placed in a group and a folder, each of which has a different purpose.
167 | Aruba Instant management using Aruba AirWave
Aruba Instant Validated Reference Design
Groups
AirWave groups are primarily for configuration. Devices that have the same configuration should be placed in the
same group. In a typical group configuration, you might have one group for IAPs, including the VC and one for thirdparty switches. When AirWave has too many groups for similar devices, managing configurations can become a
challenge. You might have difficulty determining if devices conform to a common standard, which can increase the
chance that you make a configuration error. To simplify configuration management, create as few groups as
possible. Groups within AirWave can be thought of as containers for common configuration profiles or templates.
With IAPs and RAP-NG architectures, each IAP that is part of a Group will have the same configuration minus some
obvious IAP settings that are unique to each device/cluster like virtual controller name and IP address as well as IAP
hostnames. These are accounted for in AirWave's Instant Config. The advantage of this solution is that once a
Group is established, the configuration and any future additions and/or changes are applied seamlessly to all virtual
controllers in that Group. Any new virtual controllers added through Activate or manually will obtain these settings
automatically.
It is recommended that a user configure a VC/IAP first using the IAP UI and once the configuration is certified, add it
manually into AirWave. First ensure that all SSIDs, RF settings, VPN settings, plus anything else you wish to mirror
to other VCs/IAPs are fully configured and working as expected. Once satisfied, navigate to System (top right) >
Admin.
This should look familiar as it's the same information Activate asks for when adding an IAP to AirWave provisioning
rule (see above).
Once you enter the AirWave settings, you should see this IAP contact AirWave in a few minutes. It will show up in
the New Devices List. If the Group is not created yet, the value placed in the Organization field from above will be
used as the Group name. For example, if you entered US-IAP:East, the Group name will be "US-IAP".
When you add this new IAP, the Group and Folder selectable values on this screen shouldn't be altered. Just leave
them at their defaults. The Group and Folder additions will be based on the Organization value entered either through
Activate or manually in the screen shown above. So, click Add and then Apply to fully add this IAP into AirWave.
Folders
AirWave folders are hierarchical and are used for these purposes:
Aruba Instant Validated Reference Design
Aruba Instant management using Aruba AirWave | 168
l
Controlling which AirWave users have access to which devices
l
Reporting
l
Alerting
You can organize folders in any way that makes sense to you. Typically, folders are organized by geography or
business unit as is shown in below figures:
Figure 80 Folder structure organized by geography
Figure 81 Folder structure organized by line of business
Roles
Each AirWave user is assigned a role, which is either created by an administrator, or created automatically based on
the organization string of a new IAP. The role determines the following user capabilities:
l
Devices that the user can view
l
Permissions that the user has, including whether the user can configure devices or reboot them
l
Access that the user has to VisualRF or information about rogue APs
169 | Aruba Instant management using Aruba AirWave
Aruba Instant Validated Reference Design
Below is an example of a role that grants a user read-only access to devices in the Distribution Centers folder and its
subfolders.
Figure 82 Configuring an AirWave role
Managing Device Firmware with AirWave
When you manage a large network, you must maintain common firmware versions for ease of troubleshooting and
maintenance. AirWave can automatically upgrade or downgrade IAP firmware as IAPs are added to AirWave. After
devices have been added, you can upgrade firmware in schedulable, multicluster jobs.
The first step in planning firmware updates is to load the required firmware version to the AirWave server. You can
either pick from the stable, generally available releases that are hosted in the cloud by Aruba Activate, or you can
manually upload any firmware version AirWave. If you select the manual method, you must load the correct firmware
image for each device type in your network.
New firmware images are added to Aruba Activate when Aruba determines that they are stable, typically a few
weeks after they are released. Setting up AirWave to Automatically Update Firmware on New Devices
Click on the Firmware tab on the top menu bar within the Instant Group. On this screen, be sure to toggle "Enforce
Group Firmware Version" to Yes and if desired, allow downgrades of devices. In the Desired Version box, select the
code version that the customer wants to standardize on for this Group. Once AirWave sees the IAPs show up in the
group, it will compare firmware versions, detect that the firmware version is not the same as the desired, and then
designate the next communication from the VC to be an attempt to upgrade firmware. During the upgrade, the VC
and APs will be marked as down (though you may see that you still have access while the APs are downloading the
image – so the down message is somewhat premature). Once all devices in the cluster are upgraded, then AirWave
will get a message to return the devices to up status.
Aruba Instant Validated Reference Design
Aruba Instant management using Aruba AirWave | 170
There are two places where Firmware files are stored - the image server in the cloud and in AirWave's local
database. There currently is a delay when Aruba released a code version until it is shown in the image server list. If
a desired version is not listed but is known to be GA, you must manually download all Instant firmware files related
to the specific release and upload them into AirWave.
If you select a file from the image server, AirWave will grab those files automatically, download them, and place
them in its local database. Any Instant AP that needs an upgrade from AirWave will be handled by AirWave and not
from the cloud service.
Bulk Upgrades of IAPs
Most device lists in AirWave have a Modify Devices feature that allows you to perform actions such as auditing,
rebooting, and reporting on any set of devices. The Modify Devices feature is the best way to perform and schedule
firmware upgrades on an unlimited number of devices, as shown in below figure.
171 | Aruba Instant management using Aruba AirWave
Aruba Instant Validated Reference Design
Figure 83 Configuring AirWave bulk firmware upgrade options
In groups that have the “Instant GUI Config” feature enabled, all devices must run the same firmware version.
Therefore, firmware must be updated on every cluster in a group. When Instant devices are managed by AirWave, each device downloads its own image from the AirWave server. Make sure that each AP in a cluster has access to AirWave through HTTPS or HTTP for firmware updates.
Monitoring Firmware Upgrade Jobs
You can track the status of current and scheduled upgrade jobs on the Firmware Upgrade Jobs screen of the
AirWave WebUI, as shown in below figure.
Figure 84 Displaying AirWave firmware upgrade jobs
Aruba Instant Validated Reference Design
Aruba Instant management using Aruba AirWave | 172
Managing Device Configurations with AirWave
Managing device configurations is one of the biggest challenges in a large network deployment. Nonstandard
configurations make it hard to maintain and troubleshoot the network. To adapt to the complexity of a large network,
a network administrator needs a simple way to configure some devices in a way that deviates from the standard
configuration policy. In addition, when a network administrator must make complicated changes in too many places,
there is always the risk of human error.
AirWave offers a GUI-based tool and a legacy template system for centralized management of Aruba Instant
configurations. This section describes configuration with the GUI-based tool.
First, the Instant Config needs to be enabled. This is done in the per Group Basic Settings. In AirWave, navigate to
Groups, hover over the wrench icon next to the Instant Group, and click "Basic".
Enable the Instant GUI Config. Wait a few minutes for the Instant Config service to start and you should be able to
click on "Instant Config" in the Group to enter the IAP GUI.
Second, on this same page, ensure that the Group Display options are set to "Only Devices in this Group" or
"Selected Device Types" with the selection set to Aruba Instant.
After you add devices to an IGC group, you can no longer use the internal device GUI to change the configuration, all
configuration changes are executed through AirWave.
At this point, AirWave has its first group created and the desired configuration from the first IAP. Subsequent Instant
APs should now automatically provision, sync firmware, and get the needed configuration.
For this AirWave IGC capability, you must run Aruba Instant 3.2 or greater and all devices in a group must be
173 | Aruba Instant management using Aruba AirWave
Aruba Instant Validated Reference Design
running the same firmware version.
IGC has a very similar look and feel to the VC WebUI and includes wizards such as the New Wireless Setup
Wizard. An important addition to IGC is the context. A user in IGC is either in a group context or in a cluster-specific
context. The current context is displayed at the top of the left panel in IGC.
To make configuration changes to every cluster in the group, start in the group context and select the settings that
you want to apply. Managing Device Configurations with AirWave shows how you can make changes to the
AirGroup settings for an entire group.
Figure 85 AirWave IGC: changing AirGroup settings for an entire group
After you made the change, AirWave immediately queues up the appropriate commands to send to each cluster. The
next time a cluster contacts AirWave (which it typically does every minute), the commands are sent, and the
devices start to check in every 5 seconds to speed up the confirmation and subsequent configuration changes.
If one cluster in a group has a different requirement and requires you to make cluster-specific overrides to the group
policy, enter cluster-specific mode by selecting the group name in the left pane and selecting the cluster to modify. Figure 86 AirWave IGC: Overriding a group policy for a cluster
Aruba Instant Validated Reference Design
Aruba Instant management using Aruba AirWave | 174
By dragging the sticky note icon to a field, you can add notes to any setting. (This method works for most fields.)
After you apply and confirm the override of the device, the override is highlighted in group mode with a yellow
asterisk.
Figure 87 AirWave IGC: Override with a sticky note
IGC ignore country code by default, for US/Japan/Israel code IAPs, users do not need to care about country code.
For non-US/Japan/Israel code IAPs, user needs to turn on [Allow Configuration of Country Code] under IGC>Airwave->Airwave Setting, then set correct country code under System->General page.
AirWave use cases
AirWave for the Distributed Enterprise
In a public facing deployment, such as a coffee shop chain or hotspot provider, a large number of users might access
the network. AirWave stores historical data, including usage and signal quality, on a per-user basis. This data is
stored in round-robin database (RRD) files that are created as users are detected. You can configure how many days
the data is stored, which impacts the size of the RDD files. In an environment with many unique users, it is critical
that you do not store the data too long to prevent the RDD files from becoming too large. Aruba recommends a
storage time of 4 weeks or shorter.
The AirWave Rogue Access Point Intrusion Detection System (RAPIDS) lets you to create customized rules to
identify and act upon rogue access points. If users have access to an open or captive-portal wireless network, it is
important to prevent an attacker from spoofing the network. Use a RAPIDS rule to identify such a network and take
action if necessary, as shown in below figure.
175 | Aruba Instant management using Aruba AirWave
Aruba Instant Validated Reference Design
Figure 88 Configuring a RAPIDS classification rule
AirWave for the Small and Medium Enterprise
If IAPs are deployed in clusters rather than as standalone devices, you must be able to receive cluster reports. By
placing each cluster in its own folder, reports and alerts can be generated for each individual folder.
If a user experiences connectivity problems and contacts the IT help desk, the IT engineer can search for the user in
AirWave through many fields, including user name and MAC address fields. Near-real-time information is available
about the status of the user connection, including the status of the user device and the VC. This capability can help
the IT engineer to quickly identify the source of a connectivity problem, as shown in below figure.
Figure 89 AirWave diagnostic capabilities
In a multi-AP environment, you must be able to check on the status of the RF. A common source of user complaints
stems from RF saturation. AirWave can provide reports and alerts that allow you to be informed about the health of
the network and be notified of unusual situations before problems occur.
Aruba Instant Validated Reference Design
Aruba Instant management using Aruba AirWave | 176
Below figure is a screen shot of the RF Health dashboard, which can help you to identify areas with excessive radio
utilization.
Figure 90 AirWave RF Health dashboard
Aruba recommends that you set up triggers to enable AMP to send alerts when a particular radio utilization threshold
is exceeded. Each RF environment is different. One common recommendation is to set up a trigger for interference
of over 50% or a busy time of over 75% for a 15-minute interval.
Figure 91 Setting up alert triggers in AirWave
177 | Aruba Instant management using Aruba AirWave
Aruba Instant Validated Reference Design
AirWave for a Home Office
AirWave can display the VPN IP address of an AP and link to it as well.
Figure 92 Viewing VPN IP addresses in AirWave
The AirWave Run command provides CLI access to remote networks and allows the network administrator to view
detailed network information such as VPN status of a RAP.
Figure 93 Displaying the VPN status with the AirWave Run command
Aruba Instant Validated Reference Design
Aruba Instant management using Aruba AirWave | 178
Chapter 6
Network Visibility using AppRF on Aruba Instant
AppRF on Instant Access Points
Introduction
AppRF is Aruba's custom-built Layer 7 (L7) firewall capability. It is introduced in Instant OS 4.1 and consists of an
on-board Deep Packet Inspection (DPI) and a cloud-based Web Policy Enforcement (WPE) service.
The WPE is hosted by aruba.brightcloud.com and allows creating local firewall policies based on the types of traffic
identified. The WPE capabilities require the IAP to have a WPE subscription.
IAPs with DPI capability analyze data packets to identify applications which are in use and allow creation of access
rules, to determine client access to applications, application categories, web categories, and website URLs based
on security ratings. You can also define traffic shaping policies such as bandwidth control and QoS per application,
for client roles. For example, you can block bandwidth monopolizing applications on a guest role within an enterprise.
In K-12, web-filtering is required for Children’s Internet Protection Act (CIPA) compliance and is a mandate for E-rate
funding.
The AppRF feature provides application visibility for analyzing client traffic flow. IAPs support both, the power
of in-device packet flow identification and dynamically updated cloud-based web categorization.
For application traffic, the initial packets pass through the DPI engine residing on the IAP for classification. Once the
session is classified, firewall actions are applied to that traffic based on the ACLs created by the admin. For web
URL traffic, IAP searches on BrightCloud, and gets the Web Category and Web Reputation information about the
sessions. Once the sessions are classified, we can create an ACL to perform the following actions on traffic:
l
Permit/Deny
l
Bandwidth Contracts
l
Log
l
Blacklist
l
DSCP Tag
l
802.1p priority
l
Disable Scanning
The universal knob to turn on AppRF is on Virtual Controller (VC):IAP UI - System > General > AppRF visibility
Aruba Instant Validated Reference Design
Network Visibility using AppRF on Aruba Instant | 179
IAP
IAP
IAP
IAP
# configure t
(config) # dpi
(config) #end
# commit apply
AppRF visibility configuration is enabled if visibility is required. Enforcement does not require this knob to be
enabled.
DPI
AppRF DPI is supported only on 32 MB platforms like IAP 103, 108, 109, 114, 115, 155, 204, 205, 214, 215, 224,
225, and 275. Due to hardware memory limitation, it is not supported on IAPs with 16 MB flash memory which
includes IAP 104, 105, Rap3, 134, 135 and 175. AppRF DPI engine resides on IAP and supports predefined apps
and app categories. The number of supported apps increases with upgrades. To view the list of applications and
application categories execute the following CLI command:IAP# show dpi app all
IAP# show dpi appcategory all
For mixed-class deployments (web-filtering-only-supported-APs and full-apprf-supported-APs) works as follows.
While configuring, there is no explicit check for AP capabilities. That is, you can configure application rules even on
an AP which supports only web filtering, but enforcement or visualization will take place only for web traffic.
Each AP visualizes and enforces the traffic as per its capability.
On IAPs that support only web filtering, for example, IAP 105, if application classification rules are configured, it is
considered a NO-OP; as if that rule does not exist.
On IAPs that support all AppRF functions, for example, IAP-225, the same application classification rules are
enforced.
For visualization, it is on a per-ap basis. You have to click on per ‘AP or client’ view to see the AppRF charts.
In IAP-105, the AppRF shows only 2 graphs – the web-category and web-reputation
In IAP-225, all the four charts such as Application, Application category, web-category and web-reputation are
shown.
180 | Network Visibility using AppRF on Aruba Instant
Aruba Instant Validated Reference Design
When clients roam, sessions are transferred from old AP to new AP. It works on already classified sessions. If
clients roam before the flow is classified, app classification will take longer because the new AP needs to reclassify
the session.
Web Content Filtering
Web Content Filtering or Web URL filtering is the ability to classify and enforce policies on web based traffic, that is,
all browser based URLs, HTTP, and HTTPS traffic accessed by the users on the network. It is managed on cloud by
BrightCloud, which updates its database real-time.
Categories
Web URLs are classified into one or more categories out of the existing 81 different web categories. For example,
Facebook can be classified into social-media, instant-messaging or gaming depending on what the user does with
the network. Current number of categories can be identified using:
IAP# show dpi webcategory all
Reputation
Web URLs are also classified into 5 web reputation groups based on the web reputation index score:
Reputation
WRI Score
Trustworthy
81-100
Moderate Risk
41-60
Moderate Risk
41-60
Suspicious
21-40
High Risk
1-20
Trustworthy: These are well-known sites with strong security practices and rarely exhibit characteristics that
expose the user to security risks. There is a low probability that a user will be exposed to a malicious payload.
Low Risks: These are benign sites, and rarely exhibit characteristics that expose the user to security risks. There is
a low probability that a user will be exposed to a malicious payload.
Moderate Risks: These sites have exhibited some characteristics that suggest security risk. These is some
probability that user will be exposed to malicious payload.
Suspicious Sites: There is a higher than average probability that the user will be exposed malicious links or
payloads.
High Risks: There is a high probability that the user will be exposed malicious links or payloads.
The current reputation and category of a site can be found out on link.
Aruba Instant Validated Reference Design
Network Visibility using AppRF on Aruba Instant | 181
The current reputation and category of a site can also be found out using IAP CLI:Here, we will try for www.cnn.com, which is already queried by the IAP due to previous traffic.
IAP# show dpi webcategory-lookup www.cnn.com
Input URL: www.cnn.com
Found CACHED RESULT:
URL: cnn.com REP: 81 A1: 0, Serial = 0x200001
Index: 0 Category: news-and-media (63) Confidence level: 99
Now, we will try a new site.
IAP# show dpi webcategory-lookup www.bbc.com
Input URL: www.bbc.com
Request sent for CLOUD LOOKUP, please try again.
Which is cached now.
IAP# show dpi webcategory-lookup www.bbc.com
Input URL: www.bbc.com
Found CACHED RESULT:
URL: bbc.com REP: 96 A1: 0, Serial = 0x200001
Index: 0 Category: news-and-media (63) Confidence level: 99
The high-end 256MB+ memory variant IAPs (115, 135, RAP-155, 215, 225) cache 500k (1/2 Million) entries, and the
low-end 128MB memory variant IAPs (103, 105, RAP-109, 205) cache 100k entries. These entries expire by default
after four days, or are dynamically replaced when under cache pressure.
182 | Network Visibility using AppRF on Aruba Instant
Aruba Instant Validated Reference Design
The web URL database is maintained by BrightCloud. Each IAP in the cluster can independently access the
database on aruba.brightcloud.com and maintain its own cache.
Any classification anomalies can be directly reported on BrightCloud’s online URL categorization and reputation
change request page.
URL categorization change request link.
URL reputation change request link.
Classification failure can happen if:
l
DPI engine fails
l
WAN uplink issues affect web classification
If sessions are not classified, they will follow the default rule specified in your user role. To create a strict
enforcement of unclassified session, you can manually create a rule to deny an "unknown" session.
Aruba Instant Validated Reference Design
Network Visibility using AppRF on Aruba Instant | 183
Configuration
Enforcement through policies
IAP UI-SSID Wizard > Access Tab OR IAP UI > Security > Roles and apply to SSID
The image below shows how to club multiple applications together.
The first image below provides instructions on how to deny Facebook and enable log. The second image provides
instructions on how to deny high risk websites and blacklist the user.
184 | Network Visibility using AppRF on Aruba Instant
Aruba Instant Validated Reference Design
If you enable log, the output of the show log security command displays the logs details as shown in the following
example:IAP# show log security 10
Oct 16 22:30:20 stm[2242]: <124006> <WARN> |AP 94:b4:0f:cb:dc:98@33.33.33.1 stm| TCP
srcip=199.59.149.198 srcport=443 dstip=192.168.200.109 dstport=50925, dpi-dst=facebook, action=deny
The below image provides instructions on how to throttle YouTube traffic and prioritize Lync.
Visibility in UI
Per AP view
Click on AP name and AppRF tab at the bottom right, as shown in the image below.
Aruba Instant Validated Reference Design
Network Visibility using AppRF on Aruba Instant | 185
Per client view
Click on client name and AppRF tab at the bottom right, as shown below.
Per SSID view
Click on SSID and AppRF tab at the bottom right, as shown below.
App RF tab details
Four charts for App, App Category, Web category, Web reputation. See image below.
186 | Network Visibility using AppRF on Aruba Instant
Aruba Instant Validated Reference Design
Hover the mouse over “Category” to see data utilization for a category/app. See image below.
Click on “Chart” to expand and see a table/chart view. See image below.
Click to filter on per-app and to see per-user data. See image below.
Aruba Instant Validated Reference Design
Network Visibility using AppRF on Aruba Instant | 187
Toggle to switch between list and chart view. See image below.
For more configuration examples, refer to the Aruba Instant User Guide that is available at the Aruba support
website.
Troubleshooting
Show commands
“show dpi app” showing a static list of supported apps
IAP# show dpi app all
Pre-defined Application List
---------------------------01net 050plus 0zz0 10050net 10086cn
104com 1111tw 114la 115com 118114cn
:
:
<truncated>
:
:
zol zonealarm-update zoo zoznam zshare
zum zynga
Total applications = 1957
“Show dpi app <app-name>” shows app category for specific apps:IAP# show dpi app facebook
Pre-defined Application
----------------------Name App ID App Category Default Ports
--------- -----------------------facebook 244 social-networking tcp 80 443
IAP# show dpi app bittorrent
Pre-defined Application
----------------------Name App ID App Category Default Ports
--------- ------------ ------------bittorrent 15 peer-to-peer tcp 1024-65535 udp 1024-65535
188 | Network Visibility using AppRF on Aruba Instant
Aruba Instant Validated Reference Design
To analyze the IAP and client traffic data when deep packet inspection is enabled, execute the “show data path
session dpi” command at the IAP CLI. The Show data path session dpi* command displays the flags in output that
allows you to analyze session classification. Use this command in conjunction with the “include” filter to see the
enhanced outputs.
To clear these sessions and see fresh sessions created by client, use:IAP#clear datapath session
You can always use the “Include” command with “Show” command to filter specific outputs.
Traces
Check the current trace settings through:
Show trace info
Turn on the sub components “BCA DATA” and “BCA CONTROL”. You will notice that there are other subcomponents as well.
IAP# trace component DPIMGR sub-component x
Invalid sub-component name(x). Valid sub-components for DPIMGR are:
GENERAL,
CLI,
QOSMOS DATA,
QOSMOS CONTROL,
DPIMGR CONTROL,
FW VISIBILITY,
BCA DATA,
BCA CONTROL,
Aruba Instant Validated Reference Design
Network Visibility using AppRF on Aruba Instant | 189
SYSLOG,
ALL
IAP# trace component DPIMGR sub-component "BCA DATA"
IAP# trace component DPIMGR sub-component "BCA CONTROL"
Perform a lookup as shown below:
IAP# show dpi webcategory-lookup www.time.com
Input URL: www.time.com
Request sent for CLOUD LOOKUP, please try again.
IAP# show trace log DPIMGR 100 Oct 15 19:50:30 trace_on: Tracing to "/var/log/trace/dpimgr.log" started
bcaruba: DPIMGR got trace config: mac(00:00:00:00:00:00), ip(0.0.0.0), level(7), sub_comp_
flag:0x00000000
bcaruba: <358000> <ERRS> |AP 94:b4:0f:cb:dc:98@33.33.33.1 dpimgr| ^[func bca_syslog] [line
209] [msg Upating smart cache to version 0.1]
bcaruba: DPIMGR got trace config: mac(00:00:00:00:00:00), ip(0.0.0.0), level(7), sub_comp_
flag:0x00000040
bcaruba: Tracing enabled for BCA DATA
bcaruba: DPIMGR got trace config: mac(00:00:00:00:00:00), ip(0.0.0.0), level(7), sub_comp_
flag:0x000000c0
bcaruba: Tracing enabled for BCA DATA
bcaruba: Tracing enabled for BCA CONTROL
Oct 15 23:21:24|94:b4:0f:cb:dc:98|---.---.---.---|BCA DATA|dpimgr_handle_brightcloud_
data:416|REQ URI:www.time.com for id = 0x200001
Oct 15 23:21:24|94:b4:0f:cb:dc:98|---.---.---.---|BCA DATA|bca_lookup:211|sent for cloud/cache
lookup.
Oct 15 23:21:25|94:b4:0f:cb:dc:98|---.---.---.---|BCA CONTROL|bca_print_req:123|URL: time.com
REP: 50 A1: 0, Serial = 0x200001
Oct 15 23:21:25|94:b4:0f:cb:dc:98|---.---.---.---|BCA CONTROL|bca_print_req:133|Index: 0
Category: news-and-media(63) Confidence level: 93
If traffic flow is huge, set filters using client mac or IP through:
IAP# trace mac 11:11:11:11:11:11
Got trace config for CLI_2: mac(11:11:11:11:11:11), ip(0.0.0.0), level(7), sub_comp_
flag:0x00000000
IAP# trace ip 1.1.1.1
Got trace config for CLI_2: mac(11:11:11:11:11:11), ip(1.1.1.1), level(7), sub_comp_
flag:0x00000000
Remove the trace filter by:
IAP# trace mac 00:00:00:00:00:00
IAP# trace ip 0.0.0.0
Disable the subcomponent trace through:
IAP# no trace component DPIMGR sub-component "ALL"
190 | Network Visibility using AppRF on Aruba Instant
Aruba Instant Validated Reference Design
Appendix
Performance impact due to DPI
The Virtual Controller shows management information pulled in from each IAP in a cluster. However, the DPI, Web
Policy Enforcement, and firewall policies are independently executed on each IAP in a cluster. Hence, the size of the
IAP cluster does not impact AppRF scalability.
Performance of an IAP is not affected due to its dynamic CPU management. Under normal network load, typical
deployments with 16 clients per AP, DPI module’s CPU utilization is very minimal even while classifying many
sessions. However, DPI processing is tied to IAP’s dynamic CPU management to ensure that this processing in a
loaded system does not affect control plane or management plane traffic. For example, on a heavily loaded IAP,
where IAP CPU becomes 80% busy, dynamic CPU management stops DPI/classifying sessions to allow other high
priority tasks to continue. The stopped sessions are marked as “incomplete”, while enforcement and visibility of
previously classified sessions are not affected. The classification is a function of a new session creation rate and
APs’ CPU capability. Hence, a higher end IAP 225 can classify 50 new sessions per second, while IAP 109 can only
classify 20 new sessions per second.
Custom error page
Using this feature starting 4.2 onwards, we can set redirect URL, when client access URL, which is denied by IAP.
Step 1:
Add a Custom Blocked Page URL “https://www.sohu.com/”
IAP UI - Security > Custom Blocked Page URL
Aruba Instant Validated Reference Design
Appendix | 191
URL must be absolute URL which starts with a scheme “http://” or “https://”.
Step2:binding the URL to a Roles “example”
IAP UI - Security > Roles > Rule type > Blocked Page URL
Step3: Also need to configure DPI ACL deny rule
IAP UI - Security > Roles > Rule type > Access control
192 | Appendix
Aruba Instant Validated Reference Design
If the clients access www.baidu.com, the following redirect URL “www.sohu.com” will happen on the browser as
mentioned below:http://www.sohu.com/?user_ip=%3C192.168.1.105%3E&dest_ip=%3C115.239.210.27%3E&app_
name=%3Cbaidu%3E&web_rep=%3Ctrustworthy-sites%3E&web_cat=%3Csearch-engines%3E
Check redirect URL for packet captured on the client:-
Custom error page feature only works for http sites as follows:
Send HTTP 302 with “Location” redirect URL to clients
Send HTTP 200 with deny page as HTML body to clients
It doesn’t work for https sites.
If the client has a standard browser, it could analyze HTTP 302/200 packets, and perform redirecting or displaying.
If the client has an app, it cannot process HTTP 302/200 as a standard browser.
Websites dependency on web category
A few websites initiate sessions to, many URLs and not just a few, which keep on changing dynamically. Let’s take
an example of bbc. If one wants to block www.bbc.com, using the application DPI rule, one would use the below
configuration:-
Aruba Instant Validated Reference Design
Appendix | 193
However, if the client opens www.bbc.com, it still works. This is because the browser initiates TCP connection to a
number of URLs, which spawn as a result. You can use “show datapath session dpi”, to find out all the TCP
connections initiated by client and how they are classified if blocked.
For example, below is the screen shot of when a client opens www.bbc.com. DNS query gets a resolution answer to
23.235.47.81. As you notice, the TCP connection starts smoothly and not blocked, despite the rules to block app,
bbc, and bbc-player.
If you look at show datapath session dpi for IP 23.235.47.81:
IAP205# show datapath session dpi
Datapath Session Table Entries
------------------------------
Flags: F - fast age, S - src NAT, N - dest NAT
D - deny, R - redirect, Y - no syn
H - high prio, P - set prio, T - set ToS
C - client, M - mirror, V - VOIP
194 | Appendix
Aruba Instant Validated Reference Design
I - Deep inspect, U - Locally destined
s - media signal, m - media mon, a - rtp analysis
E - Media Deep Inspect, G - media signal
A - Application Firewall Inspect
RAP Flags: 0 - Q0, 1 - Q1, 2 - Q2, r - redirect to master, t - time based
Source IP Destination IP Prot SPort Dport App Webcat
WebRep Packets Bytes PktsDpi Flags
---------------- -------------- ---- ----- ----- -------------------------- ------------------------- ------ ------- ----- ------- ----23.235.47.81 192.168.3.100 6 80 50841 http [67 ] news-and-media [63 ] 5 0 0 6 192.168.3.100 23.235.47.81 6 50841 80 http [67 ] news-and-media [63 ] 5 0 0 1 C
If you notice, the session has been classified as an app http and not as bbc or bbc-player. However, Webcategory is
news-and-media. Flags field indicates that this connection is not denied.
DPI signatures are not updated in real time and get updated when IAP code is upgraded. However, the Web content
filtering database, hosted by bright cloud, is a more up-to-date version of it. Hence, to block access to
www.bbc.com, in this case, we identified the other TCP connections that the client created to open up the webpage.
Found out that they were not getting blocked but were resulting in page being opened up on the browser. Also they
are being classified as HTTP in app category but as news-and-media in web category. Ideally it should have been
classified as bbc in app category, but due to limited signatures in inbuilt DPI engine, it could not be so.
These cases would always arise as numerous sites update their IP address and DNS resolutions quickly. To work
around these scenarios, please use web category to identify and block it. In the above scenario, the below rule would
work, and result into the “HTTP status 403 – Access is denied” webpage if client tries to access www.bbc.com:
Aruba Instant Validated Reference Design
Appendix | 195
Terminology
Acronyms and Abbreviations
The following table lists the abbreviations used in this document.
Table 19: List of abbreviations
Abbreviation
Expansion
AMP
AirWave Management Platform
ARM
Adaptive Radio Management
ARP
Address Resolution Protocol
BSS
Basic Server Set
BSSID
Basic Server Set Identifier
CA
Certification Authority
CLI
Command Line Interface
CoA
Change of Authorization
CL3
Centralized Layer 3
CL2
Centralized Layer 2
DL3
Distributed layer 3
DL2
Distributed layer 2
DPI
Deep Packet Inspection
DHCP
Dynamic Host Configuration Protocol
DMO
Dynamic Multicast Optimization
DMZ
Demilitarized Zone
DNS
Domain Name System
DRP
Dynamic Radius Proxy
EAP-TLS
Extensible Authentication Protocol- Transport Layer Security
EAP-TTLS
Extensible Authentication Protocol-Tunneled Transport
Layer Security
GRE
Aruba Instant Validated Reference Design
Generic Routing Encapsulation
Terminology | 196
Table 19: List of abbreviations
Abbreviation
Expansion
IAP
Instant Access Point
IDS
Intrusion Detection System
IGC
Instant GUI Config
IEEE
Institute of Electrical and Electronics Engineers
ISP
Internet Service Provider
LEAP
Lightweight Extensible Authentication Protocol
MX
Mail Exchanger
MAC
Media Access Control
NAS
Network Access Server
NAT
Network Address Translation
NS
Name Server
NTP
Network Time Protocol
PEAP
Protected Extensible Authentication Protocol
PEM
Privacy Enhanced Mail
PoE
Power over Ethernet
QoS
Quality of Service
RADIUS
Remote Authentication Dial In User Service
UI
User Interface
VC
Virtual Controller
VPN
Virtual Private Networks
VSA
Vendor-Specific Attributes
WLAN
Wireless Local Area Network
Glossary
The following table lists the terms and their definitions used in this document.
197 | Terminology
Aruba Instant Validated Reference Design
Table 20: List of Terms
Term
Definition
802.11
An evolving family of specifications for wireless LANs developed by a
working group of the Institute of Electrical and Electronics Engineers
(IEEE). 802.11 standards use the Ethernet protocol and CSMA/CA (carrier
sense multiple access with collision avoidance) for path sharing.
802.11a
Provides specifications for wireless systems. Networks using 802.11a
operate at radio frequencies in the 5GHz band. The specification uses a
modulation scheme known as orthogonal frequency-division multiplexing
(OFDM) that is especially well suited to use in office settings. The
maximum data transfer rate is 54 Mbps.
802.11b
WLAN standard often called Wi-Fi; backward compatible with 802.11.
Instead of the phase-shift keying (PSK) modulation method historically
used in 802.11 standards, 802.11b uses complementary code keying
(CCK), which allows higher data speeds and is less susceptible to
multipath-propagation interference. 802.11b operates in the 2.4 GHz band
and the maximum data transfer rate is 11 Mbps.
802.11g
Offers transmission over relatively short distances at up to 54 Mbps,
compared with the 11 Mbps theoretical maximum of 802.11b. 802.11g
operates in the 2.4 GHz band and employs orthogonal frequency division
multiplexing (OFDM), the modulation scheme used in 802.11a, to obtain
higher data speed. Computers or terminals set up for 802.11g can fall
back to speeds of 11 Mbps, so that 802.11b and 802.11g devices can be
compatible within a single network.
802.11n
Wireless networking standard to improve network throughput over the two
previous standards 802.11a and 802.11g with a significant increase in the
maximum raw data rate from 54 Mbps to 600 Mbps with the use of four
spatial streams at a channel width of 40 MHz. 802.11n operates in the 2.4
and 5.0 bands.
AP
An access point (AP) connects users to other users within the network and
also can serve as the point of interconnection between the WLAN and a
fixed wire network. The number of access points a WLAN needs is
determined by the number of users and the size of the network.
access point mapping
The act of locating and possibly exploiting connections to WLANs while
driving around a city or elsewhere. To do war driving, you need a vehicle,
a computer (which can be a laptop), a wireless Ethernet card set to work in
promiscuous mode, and some kind of an antenna which can be mounted
on top of or positioned inside the car. Because a WLAN may have a range
that extends beyond an office building, an outside user may be able to
intrude into the network, obtain a free Internet connection, and possibly
gain access to company records and other resources.
Aruba Instant Validated Reference Design
Terminology | 198
Table 20: List of Terms
Term
Definition
ad-hoc network
A LAN or other small network, especially one with wireless or temporary
plug-in connections, in which some of the network devices are part of the
network only for the duration of a communications session or, in the case
of mobile or portable devices, while in some close proximity to the rest of
the network.
band
A specified range of frequencies of electromagnetic radiation.
DHCP
The Dynamic Host Configuration Protocol (DHCP) is an auto-configuration
protocol used on IP networks. Computers or any network peripherals that
are connected to IP networks must be configured, before they can
communicate with other computers on the network. DHCP allows a
computer to be configured automatically, eliminating the need for a
network administrator. DHCP also provides a central database to keep
track of computers connected to the network. This database helps in
preventing any two computers from being configured with the same IP
address.
DNS Server
A Domain Name System (DNS) server functions as a phonebook for the
Internet and Internet users. It converts human readable computer
hostnames into IP addresses and vice-versa.
A DNS server stores several records for a domain name such as an
address 'A' record, name server (NS), and mail exchanger (MX) records.
The Address 'A' record is the most important record that is stored in a DNS
server, because it provides the required IP address for a network
peripheral or element.
DST
Daylight saving time (DST), also known as summer time, is the practice of
advancing clocks, so that evenings have more daylight and mornings
have less. Typically clocks are adjusted forward one hour near the start of
spring and are adjusted backward in autumn.
EAP
Extensible authentication protocol (EAP) refers to the authentication
protocol in wireless networks that expands on methods used by the pointto-point protocol (PPP), a protocol often used when connecting a
computer to the Internet. EAP can support multiple authentication
mechanisms, such as token cards, smart cards, certificates, one-time
passwords, and public key encryption authentication.
fixed wireless
Wireless devices or systems in fixed locations such as homes and offices.
Fixed wireless devices usually derive their electrical power from the utility
mains, unlike mobile wireless or portable wireless which tend to be
battery-powered. Although mobile and portable systems can be used in
fixed locations, efficiency and bandwidth are compromised compared with
fixed systems.
frequency allocation
Use of radio frequency spectrum regulated by governments.
frequency spectrum
Part of the electromagnetic spectrum.
199 | Terminology
Aruba Instant Validated Reference Design
Table 20: List of Terms
Term
Definition
hotspot
A WLAN node that provides Internet connection and virtual private
network (VPN) access from a given location. A business traveler, for
example, with a laptop equipped for Wi-Fi can look up a local hot spot,
contact it, and get connected through its network to reach the Internet and
their own company remotely with a secure connection. Increasingly, public
places, such as airports, hotels, and coffee shops are providing free
wireless access for customers.
IEEE 802.11 standards
The IEEE 802.11 is a set of standards that are categorized based on the
radio wave frequency and the data transfer rate.
POE
Power over Ethernet (PoE) is a method of delivering power on the same
physical Ethernet wire used for data communication. Power for devices is
provided in one of the following two ways:
l
Endspan— The switch that an AP is connected for power supply.
l
Midspan— A device can sit between the switch and APs
The choice of endspan or midspan depends on the capabilities of the
switch to which the IAP is connected. Typically if a switch is in place and
does not support PoE, midspan power injectors are used.
PPPoE
Point-to-Point Protocol over Ethernet (PPPoE) is a method of connecting
to the Internet typically used with DSL services where the client connects
to the DSL modem.
QoS
Quality of Service (QoS) refers to the capability of a network to provide
better service to a specific network traffic over various technologies.
RF
Radio Frequency (RF) refers to the portion of electromagnetic spectrum in
which electromagnetic waves are generated by feeding alternating current
to an antenna.
TACACS
Family of protocols that handle remote authentication and related services
for network access control through a centralized server.
TACACS+
Derived from TACACS but an entirely new and separate protocol to
handle AAA services. TACACS+ uses TCP and is not compatible with
TACACS. Because it encrypts password, username, authorization, and
accounting, it is less vulnerable than RADIUS.
VPN
A Virtual Private Network (VPN) network that uses a public
telecommunication infrastructure, such as the Internet, to provide remote
offices or individual users with secure access to their organization's
network. A VPN ensures privacy through security procedures and
tunneling protocols such as the Layer Two Tunneling Protocol ( L2TP ).
Data is encrypted at the sending end and decrypted at the receiving end.
Aruba Instant Validated Reference Design
Terminology | 200
Table 20: List of Terms
Term
Definition
W-CDMA
Officially known as IMT-2000 direct spread; ITU standard derived from
Code-Division Multiple Access (CDMA). Wideband code-division multiple
access (W-CDMA) is a third-generation (3G) mobile wireless technology
that promises much higher data speeds to mobile and portable wireless
devices than commonly offered in today's market.
Wi-Fi
A term for certain types of WLANs. Wi-Fi can apply to products that use
any 802.11 standard. Wi-Fi has gained acceptance in many businesses,
agencies, schools, and homes as an alternative to a wired LAN. Many
airports, hotels, and fast-food facilities offer public access to Wi-Fi
networks.
WEP
Wired equivalent privacy (WEP) is a security protocol specified in 802.11b,
designed to provide a WLAN with a level of security and privacy
comparable to what is usually expected of a wired LAN. Data encryption
protects the vulnerable wireless link between clients and access points;
once this measure has been taken, other typical LAN security
mechanisms such as password protection, end-to-end encryption, virtual
private networks (VPNs), and authentication can be put in place to ensure
privacy.
wireless
Describes telecommunications in which electromagnetic waves (rather
than some form of wire) carry the signal over part or all of the
communication path.
wireless network
In a Wireless LAN (WLAN), laptops, desktops, PDAs, and other computer
peripherals are connected to each other without any network cables.
These network elements or clients use radio signals to communicate with
each other. Wireless networks are set up based on the IEEE 802.11
standards.
WISP
Wireless ISP (WISP) refers to an internet service provider (ISP) that allows
subscribers to connect to a server at designated hot spots (access points)
using a wireless connection such as Wi-Fi. This type of ISP offers
broadband service and allows subscriber computers, called stations, to
access the Internet and the web from anywhere within the zone of
coverage provided by the server antenna, usually a region with a radius of
several kilometers.
wireless service provider
A company that offers transmission services to users of wireless devices
through radio frequency (RF) signals rather than through end-to-end wire
communication.
WLAN
Wireless local area network (WLAN) is a local area network (LAN) that the
users access through a wireless connection.
201 | Terminology
Aruba Instant Validated Reference Design
Download