Dell 6.2 manual Redirection Policies and User Role

Page 755

In the CLI

Use these CLI commands to configure an ESI server group, identify its associated ping health-check method, and associate a server with this group:

esi group name

ping profile_name server server_identity

For example:

esi group fortinet ping default server forti_1

Redirection Policies and User Role

The following sections describe how to configure the redirection policies and user role using the WebUI and CLI.

In the WebUI

To configure user roles to redirect the required traffic to the server(s), navigate to the Configuration > Access Control > User Roles view.

1.To add a new role, click Add.

To change an existing role, click Edit for the firewall policy to be changed. The WebUI displays the User Roles tab on top.

2.Role Name. Enter the name for the role.

3.To add a policy for the new role, click Add in the Firewall Policies section. The WebUI expands the Firewall Policies section.

Choose from existing configured policies, create a new policy based on existing policies, or create a new policy.

a.If you elect to create a new policy, click on the radio button for Create New Policy and then click Create. The WebUI displays the Policiestab.

b.In the Policies tab:

Policy Name. Provide the policy name and select the IPv4 Session policy type from the drop-down list. The WebUI expands the Policies tab.

c.In the drop-down lists, choose parameters such as source, destination, service in the same way as other firewall policy rules. For certain choices, the WebUI expands and adds drop-down lists.

d.In the Action drop-down menu, select the redirect to ESI group option.

e.In the Action drop-down menu, select the appropriate ESI group.

f.Select the traffic direction. Forward refers to the direction of traffic from the (untrusted) client or user to the (trusted) server (such as the HTTP server or email server).

g.To add this rule to the policy, click Add.

h.Repeat the steps to configure additional rules.

i.Click Done to return to the User Roles tab. The WebUI returns to the User Roles tab.

4.Click Apply to apply the configuration changes.

5.Refer to Roles and Policies on page 296, for directions on how to apply a policy to a user role.

In the CLI

Use these commands to define the redirection filter for sending traffic to the ESI server and apply the firewall policy to a user role.

ip access-list session policy

755 External Services Interface

Dell PowerConnect W-Series ArubaOS 6.2 User Guide

Image 755
Contents User Guide Legal Notice Copyright InformationOpen Source Code Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents 490 477485 Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide Contents Contents Dell PowerConnect W-Series ArubaOS 6.2 User Guide About this Guide Feature DescriptionWhat’s New In ArubaOS Spectrum recording information Users using them in a given networkIssued Spectrum enhancementsWebUI FundamentalsType Style Description Related DocumentsConventions Page Deployment Scenario #1 Controller and APs on Same Subnet Understanding Basic Deployment and Configuration TasksBasic User-Centric Networks APs All on One Subnet Different from Controller Subnets APs on Multiple Different Subnets from Controllers Running Initial Setup Configuring the ControllerNew Port Numbering Scheme Using the LCD ScreenConnecting to the Controller after Initial Setup Dell W-7200 Series ControllerDisplays Upgrading an Image Using the LCD and USB DriveUploading a Pre-saved Configuration Disabling LCD Menu Functions Configuring a Vlan to Connect to the NetworkCreating, Updating, and Deleting Vlan Pools Assigning and Configuring the Trunk PortCreating, Updating, and Viewing VLANs and Associated IDs WebUI Configuring the Default GatewayConfiguring the Loopback IP Address for the Controller To confirm the port assignments, use the show vlan commandController returns the following messages Configuring the System ClockEnter y to reboot the controller or n to cancel Connecting the Controller to the Network Enabling Wireless ConnectivityConfiguring Your User-Centric Network Installing LicensesMust explicitly enable Telnet on the controller Control Plane Security Parameter Description Configuring Control Plane SecurityConfigure the following control plane security parameters Control Plane Security OverviewExample CLIAdding APs to the Campus and Remote AP Whitelists Managing AP WhitelistsControl Plane Security Campus AP Whitelist status only Viewing Whitelist StatusStatus Entry Address as a nameStatus Entry Description Click the Campus AP Whitelist tab Command DescriptionModifying an AP in the Campus AP Whitelist Purging the Campus AP Whitelist Revoking an AP via the Campus AP WhitelistDeleting an AP Entry from the Campus AP Whitelist With local Dell Campus AP whitelist contains Master switchManaging Whitelists on Master and Local Controllers Data Column Description Viewing and Managing the Master or Local Switch WhitelistsViewing the Master or Local Switch Whitelist Campus AP Whitelist SynchronizationDeleting an Entry from the Master or Local Switch Whitelist Working in Environments with Multiple Master Controllers Configuring Networks with a Backup Master ControllerConfiguring Networks with Clusters of Master Controllers Purging the Master or Local Switch WhitelistCreating a Cluster Root Click the Cluster Setting tabCreating a Cluster Member Viewing Controller Cluster SettingsTo view your current cluster configuration via the WebUI Replacing a Local Controller Replacing a Controller on a Multi-Controller NetworkReplacing Controllers in a Single Master Network Replacing a Redundant Master Controller Replacing a Master Controllerwith No BackupReplacing a Redundant Cluster Member Controller Replacing a Cluster Member Controller with no BackupReplacing Controllers in a Multi-Master Network Replacing a Local Controller in a Multi-Master NetworkReplacing a Redundant Cluster Root Controller Manually Certify Campus APs Configuring Control Plane Security after UpgradingTroubleshooting Control Plane Security Identifying Certificate ProblemsVerifying Whitelist Synchronization Verifying CertificatesDisabling Control Plane Security Rogue APs Supported APsSoftware Licenses Understanding License TerminologyWorking with Licenses Basis What Consumes One License Using LicensesWorking with Licenses on a Multiple Controller Network LicenseController Total AP Count Campus APs Remote APs Understanding License InteractionEnabling a new license on your controller License Installation Best Practices and ExceptionsInstalling a License Creating a Software License Key Requesting a Software License in EmailLocating the System Serial Number Obtaining a Software License KeyApplying the Software License Key in the WebUI Resetting the ControllerDeleting a License Moving LicensesPage Navigate to the Configuration Network VLANs Configuring VLANsNetwork Configuration Parameters You can create and update a single Vlan or bulk VLANsCreating Bulk VLANs In the WebUI Navigate to Configuration Network VLANsCreating Named VLANs Creating a Named Vlan not in a PoolThis example assigns a Vlan name in a virtual AP Using the WebUICreating a Vlan Pool This example assigns a name to an existing Vlan IDCreating a Vlan Pool Distinguishing Between Even and Hash Assignment TypesUpdating a Vlan Pool Creating a Vlan Pool Using the CLIViewing and Adding Vlan IDs Using the CLI Following example shows how to view Vlan IDs to a Vlan poolOptimizing Vlan Broadcast and Multicast Traffic Adding a Bandwidth Contract to the VlanNavigate to Configuration Network IP Configuring PortsUsing the CLI Proxy Arp is disabled for the InterfaceAbout Trusted and Untrusted VLANs Configuring Trusted/Untrusted Ports and VLANsClassifying Traffic as Trusted or Untrusted About Trusted and Untrusted Physical PortsThis example For Port Mode select TrunkAssigning a Static Address to a Vlan Understanding Vlan AssignmentsHow a Vlan Obtains an IP Address Enabling the Dhcp Client Configuring a Vlan to Receive a Dynamic AddressConfiguring Multiple Wired Uplink Interfaces Active-Standby Navigate to the Configuration Network IP IP InterfacesSelect Obtain an IP address with PPPoE Enabling the PPPoE ClientSelect Apply Default Gateway from DHCP/PPPoEConfiguring DNS/WINS Server from DHPC/PPPoE Configuring Source NAT for Vlan Interfaces Configuring Source NAT to Dynamic Vlan AddressInter-VLAN Routing Example ConfigurationNavigate to the Configuration Network IP IP Interface Configuring Static RoutesUsing the WebUI to restrict Vlan routing Apply Configuring the Loopback IP AddressModify the IP Address as required Click Using the CLI Configuring the Controller IP AddressConfiguring GRE Tunnels Static Routes Navigate to the Configuration Network IP GRE TunnelsCreating a Tunnel Interface Directing Traffic into the TunnelCLI Tunnel KeepalivesWebUI IPv6 Support This chapter describes ArubaOS support for IPv6 featuresUnderstanding IPv6 Notation Understanding IPv6 TopologyEnabling IPv6 Support for Controller and APs Enabling IPv6Features Supported on IPv6 APs? Yes Limited Configuring IPv6 AddressesTo Configure Link Local Address To Configure Global Unicast AddressTo Configure Loopback Interface Address Configuring IPv6 Static NeighborsManaging Controller IP Addresses Configuring IPv6 Default Gateway and Static IPv6 RoutesTo Configure IPv6 Default Gateway To Configure Static IPv6 RoutesTo Modify IPv6 MLD Parameters Configuring Multicast Listener Discovery MLDProvisioning an IPv6 AP Debugging an IPv6 ControllerTo view the EH types denied Configuring a Captive Portal over IPv6Filtering an IPv6 Extension Header EH Working with IPv6 Router Advertisements RAsYou can use the WebUI or CLI to configure IPv6 RA on a Vlan Configuring an IPv6 RA on a VlanUsing WebUI Using CLI Configuring Optional Parameters for RAsTo configure RA hop-limit Navigate to the ConfigurationNetworkIPTo configure neighbor discovery retransmit time To configure IPv6 recursive DNS serverViewing IPv6 RA Status Supported Network ConfigurationXSec No not tested MAC-based Yes Understanding AuthenticationAuthentication Method Supported for IPv6 Clients? Authentication Description Method Working with Firewall FeaturesUnderstanding Firewall Policies Field Description For Host IP, enter 2002d81ff9f01000 To assign an IPv6 policy using the WebUICreating an IPv6 Firewall Policy Assigning an IPv6 Policy to a User RoleUnderstanding IPv6 Exceptions and Best Practices Managing IPv6 User AddressesHost config #ipv6 enable Link Aggregation Control Protocol Lacp Understanding Lacp Best Practices and ExceptionsSet the port priority Configuring LacpLacp Sample Configuration 151 OSPFv2 Understanding Ospf Deployment Best Practices and ExceptionsBelow is the routing table for Router Understanding OSPFv2 by Example using a Wlan ScenarioWlan Topology Wlan Routing TableBranch Office Ospf Topology Branch Office TopologyRouting table for Router 1 is below Configuring OspfBranch Office Routing Table Routing table of the Central office controller is belowSelect the Add button to add an area see Figure General Ospf ConfigurationRemote Branch Sample Topology and ConfigurationRemote Branch Central Office Controller-Active Central Office Controller-Backup OSPFv2 Dell PowerConnect W-Series ArubaOS 6.2 User Guide Dell PowerConnect W-Series ArubaOS 6.2 User Guide OSPFv2 Tunneled Nodes Understanding Tunneled Node ConfigurationWebUI Configuring a Wired Tunneled Node ClientNavigate to ConfigurationAdvanced ServicesWired Access For exampleVerify the configuration Configuring an Access Port as a Tunneled Node PortConfiguring a Trunk Port as a Tunneled Node Port Locate the Wired Access Concentration Configuration sectionOn the tunneled node client Sample OutputPage Understanding Servers and Server Groups Authentication ServersDescribes the parameters you configure for a Radius server Configuring ServersConfiguring a Radius Server NAS IP address to send in Radius packets TimeoutDefault 5 seconds Override the global configurationSet a DNS Query Interval Configuring an RFC-3576 Radius ServerRadius Server Authentication Codes Radius Server Fully Qualified Domain NamesHost IP address of the Ldap server Default N/A Admin-DN Configuring an Ldap ServerDescribes the parameters you configure for an Ldap server Type Connection type is Ldap-s Start-tls Clear-text Configuring a TACACS+ ServerEnter parameters as described in Table Defines the TACACS+ server parametersConfiguring a Windows Server Parameters Configuring the Internal DatabaseManaging the Internal Database Parameters Description Enter the following command in enable modeManaging Internal Database Files Exporting Files in the WebUIWorking with Internal Database Utilities Configuring Server GroupsConfiguring Server List Order and Fail-Through Configuring Server GroupsSelect Fail Through Configuring Dynamic Server SelectionScroll to the right and click Add Server Click Apply Click Add RuleTrimming Domain Information from Requests Configuring Match Fqdn OptionConfiguring Server-Derivation Rules Top Controller when the rule is appliedDefault bottom Assigning Server Groups User AuthenticationManagement Authentication Navigate to the Configuration Management AdministrationRadius Accounting AccountingSelect AAA Profile, then select the AAA profile instance TACACS+ Accounting Configuring Authentication TimersTimer Description Range Setting an Authentication TimerDefault 5 minutes Logon User LifetimeParameter Configuring MAC-Based AuthenticationMAC-based Authentication Configuring the MAC Authentication ProfileDisables blacklisting Configuring ClientsUsing the WebUI to configure a MAC authentication profile Using the CLI to configure a MAC authentication profileCLI 802.1X Authentication Understanding 802.1X AuthenticationSupported EAP Types Configuring Authentication with a Radius Server802.1X Authentication with Radius Server Configuring Authentication Terminated on ControllerConfiguring 802.1X Authentication This option is disabled by default Failures, and the default value is 0 failuresDefault User Role Guest role Reauthentication Timer per role overrides this settingRequests Interval Seconds, and the default value is 30 secondsDefault value is CountOption is disabled by default Key Exchange Delay between WPA/WPA2Disable this feature Authentication takes placeNegotiation Disabled by default WPA-Fast-Handover For the cached information. The default value is 24 hoursUse to authenticate itself to the client Disabled by defaultConfiguring and Using Certificates with AAA FastConnect Machine User Auth Description Role Assigned Status Configuring User and Machine AuthenticationVirtual AP profile Authenticated Vlan configured Virtual AP profileEnabling 802.1x Supplicant Support on an AP Machine Auth User Auth Description Vlan Assigned StatusProvisioning an AP as a 802.1X Supplicant To view the 802.1x authentication details on the controllerPrerequisites Creating the Student Role and Policy Sample ConfigurationsConfiguring Authentication with an 802.1X Radius Server Configuring Roles and PoliciesCan use the alias for other rules and policies Creating the Guest Role and Policy Using the WebUICreating the Faculty Role and Policy Under Time Range, select working-hours Using the WebUI to create the computer role Configuring the Radius Authentication ServerCreating Roles and Policies for Sysadmin and Computer Creating an Alias for the Internal Network Using the CLISelect Enforce Machine Authentication Configuring 802.1X AuthenticationConfiguring VLANs Navigate to the Configuration Wireless AP Configuration Configuring the WLANsConfiguring the Guest Wlan AP Group list, click Edit for the first-floor Configuring the Non-Guest WLANsCLI Configuring a Server Rule Using the CLI Configuring a Server Rule Using the WebUISelect Termination Configuring WLANs Configuring the Guest Wlan Configuring the Non-Guest WLANs 802.1x Logon Configuring Mixed Authentication ModesAuthentication Describes the different authentication possibilitiesConfiguring Reauthentication with Unicast Key Rotation Performing Advanced Configuration Options forStateful and WISPr Authentication Working With Stateful AuthenticationConfiguring Stateful 802.1x Authentication Working With WISPr AuthenticationUnderstanding Stateful Authentication Best Practices Configuring Stateful Ntlm Authentication Configuring Stateful Kerberos Authentication Configuring WISPr Authentication Profiles list, expand the WISPr Authentication Profile Dell PowerConnect W-Series ArubaOS 6.2 User Guide 227 Certificate Revocation Configuring a Controller as Ocsp and CRL ClientsConfiguring an Ocsp Controller as a Responder Understanding Ocsp and CRLNavigate to the Configuration Management Certificates Upload Configuring the Controller as an Ocsp ClientSelect the Revocation Checkpoint tab Configuring the Controller as a CRL ClientConfiguring the Controller as an Ocsp Responder Select Enable next to Enable Ocsp Responder Understanding Captive Portal Captive Portal AuthenticationController Server Certificate Configuring Captive Portal in the Base Operating SystemNavigate to the Configuration Management General Policy Enforcement Firewall Next Generation Pefng LicenseWebUI CLI Using Captive Portal with a Pefng License To configure captive portal with Pefng license via the WebUI Configuring Captive Portal in the WebUICreating a Guest User Role Sample Authentication with Captive PortalConfiguring Captive Portal in the CLI Creating a Time Range Configuring Policies and Roles in the WebUISelect Add to add the guest-logon-access policy Creating an Auth-guest User RoleCreating Aliases Creating an Auth-Guest-Access PolicyTo configure the auth-guest-access policy via the WebUI To create the block-internal-access policy via the WebUI Creating an Block-Internal-Access PolicyTo create a guest role via the WebUI Creating a Drop-and-Log PolicyCreating a Guest Role To create the drop-and-log policy via the WebUITo create the guest-logon role via the WebUI Configuring Policies and Roles in the CLICreating an Auth-Guest Role Defining a Time RangeCreating a Guest-Logon Role Configuring Guest VLANsCreating a Guest-Logon-Access Policy Creating a Block-Internal-Access PolicyClick Add For Vlan ID, enter Click Apply Configuring Captive Portal Authentication ProfilesModifying the Initial User Role Configuring the AAA ProfileManaging User Accounts Configuring the WlanRole Configuring Captive Portal Configuration ParametersUnauthenticated that a guest cannot access Utilization Logon Threshold Default 60% Logon waitFollowing are optional captive portal configurations Enabling Optional Captive Portal ConfigurationsSpecify the fac-logon user Uploading Captive Portal Pages by Ssid AssociationChanging the Protocol to Http Entity Engineering Business FacultySecurity Access Control Policies Configuring Redirection to a Proxy ServerL3 Authentication For captive portal with Pefng license For captive portal with role-based accessRedirecting Clients on Different VLANs Personalizing the Captive Portal Web Client Configuration with Proxy ScriptSelect the Your Custom Background To customize the page backgroundCreating a New Internal Web Creating and Installing an Internal Captive PortalVariable Password ExampleUsername Example Fqdn ExampleBasic Html Example Installing a New Captive PortalDisplaying Authentication Error Messages Configuring Localization Reverting to the Default Captive PortalThis should be replaced with a link like this Insert javascript to handle error casesThis should be replaced with a link like the following Div id=errorbox style=display none /div Sample Translated Customizing the WelcomeCustomizing the Pop-Up box Customizing the Logged Out Box Navigate to Advanced Services Stateful Firewall Destination Creating Walled Garden AccessEnabling Captive Portal Enhancements Configuring the Redirect-URLConfiguring the Login URL Associating a Whitelist to Captive Portal Profile Configuring a WhitelistConfiguring the Netdestination for a Whitelist Defining Netdestination DescriptionsVerifying Dynamic ACLs for a Whitelist Verifying a Whitelist ConfigurationUse the following commands to verify the whitelist alias Verifying a Captive Portal Profile Linked to a WhitelistTOS Verifying DNS Resolved IP Addresses for Whitelisted URLsExample Virtual Private Networks Planning a VPN Configuration384 Suite-B certificates ECDSA-256, ECDSA-384 Selecting an IKE protocolUnderstanding Suite-B Encryption Licensing IKE Policies Suite-B for IPsec tunnelsUnderstanding Supported VPN AAA Deployments Working with IKEv2 ClientsVPN Client Working with VPN Authentication ProfilesParameter Default Default-rap Default-cap Working with Certificate GroupsConfiguring a Basic VPN for L2TP/IPsec in the WebUI Enabling Source NAT Defining Authentication Method and Server AddressesNavigate to Configuration IP NAT Pools Defining Address PoolsDefining IKEv1 Shared Keys Configuring IKE PoliciesFinalizing WebUI changes Setting the IPsec Dynamic MapCreate address pools Configuring a VPN for L2TP/IPsec with IKEv2 in the WebUIEnable authentication methods for IKEv1 clients Configure source NATDefining Address Pools PRF-HMAC-MD5 PRF-HMAC-SHA1 PRF-HMAC-SHA256 PRF-HMAC-SHA384 Define IKEv2 Policies Configuring a VPN for Smart Card ClientsWorking with Smart Card clients using IKEv2 Enable authentication methods for IKEv2 clientsSelect Enable L2TP Configuring a VPN for Clients with User PasswordsWorking with Smart Card Clients using IKEv1 Click Add User Configuring Remote Access VPNs for XAuthConfiguring VPNs for XAuth Clients using Smart Cards Certificates or Common Name as it appears on the certificate Working with Remote Access VPNs for Pptp Working with Third-Party Devices Working with Site-to-Site VPNsUnderstanding VPN Topologies Configuring Site-to-Site VPNsWorking with Site-to-Site VPNs with Dynamic IP Addresses Show crypto-local pki servercert certname subject Click Doneto activate the changes Click Apply For certificate authenticationFor the Pre-shared-key for All FQDNs For preshared key authenticationDetecting Dead Peers For the Pre-shared-keyWorking with VPN Dialer Understanding Default IKE policiesAssigning a Dialer to a User Role Configuring VPN DialerHost config #user-role role dialer name Roles and Policies Configuring Firewall PoliciesCreating a Firewall Policy Working With Access Control Lists ACLsSupport for Desktop Virtualization Protocols This can be one of the following Configure the NAT pool in the controllerIP address of the host White List When it leaves the controllerQueue in which a packet matching this rule should be placed Pause ARMCreating an ACL White List Creating a Network Service AliasUse the following CLI command to create ACL White Lists Configuring the ACL White List in the WebUIConfiguring the White List Bandwidth Contract in the CLI Configuring the ACL White List in the CLICreating User Roles Click the Delete button against the role you want to delete Creating a User RoleBandwidth Contracts Assigning a Bandwidth Contract to a User Role in the WebUI Configuring a Bandwidth Contract in the WebUIConfiguring and Assigning Bandwidth Contracts in the CLI Bandwidth Contract ExceptionsViewing the Current Exceptions List Configuring Bandwidth Contract ExceptionsAssigning User Roles Assigning User Roles in AAA ProfilesDhcp server Working with User-Derived VLANsRule Type Condition Value Equals StringDhcp Option Description Hexadecimal Equivalent Configuring a User-derived Vlan in the WebUIUnderstanding Device Identification See for descriptions of these parameters Configuring a User-derived Role or Vlan in the CLIUser-Derived Role Example Controller’s log files Configuring a Default Role for Authentication MethodNavigate to the Configuration Security Authentication Monitor TCP SYN Attack rate Configuring a Server-Derived RoleConfiguring a VSA-Derived Role Understanding Global Firewall ParametersPortal configuration Or disabledLog Icmp Errors Default Disabled stateful SIP processing is enabledDefault Disabled FTP server is enabled Session Idle Timeout secDefault 15 seconds Disable FTP ServerSession mirror Ipsec Session-tunnel FIB Enable session,tunnel based forwardingMbps Default 1 Mbps Rate limit CP auth process traffic Mbps Is 1-200 Mbps Default 1 MbpsPage Virtual APs Configuring Virtual AP ProfilesWlan Profiles Default AP Group Toronto AP Group Excluding a Virtual AP Profile From an AP in the CLI Configuring a Virtual APExcluding a Virtual AP Profile From an AP in the WebUI Ssid profile guest Configuring the User RoleBuilding3-lobby Guest Deny Time RangeDone Configuring Authentication ServersConfiguring Authentication Side of the network. This feature is enabled by default Users. The default role for unauthenticated users is logonMAC Authentication Default Role Wired to Wireless RoamingEnforce Dhcp Click Edit for the default AP groupSelect Wireless LAN under Profiles, then select Virtual AP Applying the Virtual APEnforcement, 802.11k and station blacklisting Forward modeCan be configured in tunnel mode Campus APs in decrypt-tunnel forward modeBand Steering Enable this settingClick the Global Setting tab Setting on each individual local controllerAPs. Default Disabled Default 6 stationsDefault 3600 seconds 1 hour Authentication FailureCreating a new Ssid Profile Select Wireless LAN underProfiles, then select Virtual AP Dtim Interval KeysXSec license in each controller Period to receive broadcasts Other wireless clients are transmittingDefault value is 2333 bytes Powersave WMM Tspec MinAt the lowest configured rate Frames is disabledBattery Boost Lengthening battery lifeConfiguring an Ssid for Suite-B Cryptography Configuring a Guest Role Configuring a Guest WlanConfiguring a Vlan Select Virtual AP Configuring a Guest Virtual APEnabling bSec Ssid Support Sample ConfigurationTo enable bSec Ssid using bSec-128 or bSec-256 Enabling 802.11k Support Advertise 802.11K Capability Measurement Mode for Beacon ReportsMeasurement Report Mode field Default Mode beacon-tableTSM Report Request Settings Profile Handover Trigger Feature Settings ProfileHandover of Voice Clients’ feature Beacon Report Request Settings ProfileWorking with Radio Resource Management Information Elements Working with Beacon Report Requests Randomization Interval Con when Measurement Mode is set to Active-Channel ReportMeasurement Mode for Range from 0 to 255. The default value isNumber of repetitions Gered. When the triggered option is selected,Request frame. The default value is enabled Working with a Traffic Stream Measurement ReportBin 0 Range Configuring a High-Throughput Virtual APRange 0, 65535. The default value is Range 0, 255. The default value is40MHz intolerance Select the 802.11a radio profileSelect the 802.11g radio profile Transmission Maximum number of spatialCapabilities Streams usable for StbcSupported MCS set Mode Is enabled by defaultShort guard interval in 20 MHz Short guard interval in 40 MHzManaging High-Throughput Profiles Adaptive Radio Management ARM Understanding ARMUnderstanding ARM Application Awareness Configuring ARM ScanningARM Support for 802.11n Monitoring Your Network with ARMSelect RF Management to expand the RF Management section Configuring ARM ProfilesCreating a New ARM Profile ARM Profiles Example Wlan DescriptionSelect Adaptive Radio Management ARM Profile Configuring ARM SettingsCopying an Existing Profile Deleting a ProfileSetting Description Default 8 scans That Scanning is also enabledPower Save Aware Scan Mode Default disabled Video AwareClient Aware setting is disabled Default 9 dBmScan That Scanning is also enabled Enabled, that device will ignore this settingTime Channel change Default 30 seconds Noise Threshold Default 240 secondsError Rate Threshold Change Default 50% Error Rate WaitScanning if the load for the AP gets too high Default 1250000 BpsMode Aware Load AwareAssigning an ARM Profile to an AP Group Select Configuration AP ConfigurationSteering Modes Using Multi-Band ARM for 802.11a/802.11g TrafficEnabling Band Steering Enabling Band Steering Select Wireless LAN to expand the Wireless LAN sectionTo disable band steering, include the no parameter Select QoS to expand the QoS section To configure traffic shaping via the WebUIEnabling Traffic Shaping Enabling Traffic ShapingEnabling Spectrum Load Balancing To disable traffic shaping, use the default-accessparameterConfiguring Non-802.11 for Noise Interference Immunity Reusing Channels to Control RX Sensitivity TuningARM Metrics Too many APs on the Same Channel Troubleshooting ARMWireless Clients Report a Low Signal Level Transmission Power Levels Change Too OftenAPs Don’t Change Channels Due to Channel Noise APs Detect Errors but Do Not Change ChannelsThis chapter contains the following sections Wireless Intrusion PreventionWorking with the Reusable Wizard Understanding Wizard Intrusion Detection Protection features for Wlan clientsProtecting Your Clients Understanding Wizard Intrusion ProtectionProtecting Your Infrastructure WIP Wizard Intrusion Protection Monitoring the DashboardClassification Description Detecting Rogue APsUnderstanding Classification Terminology Understanding Classification MethodologyUnderstanding Suspected Rogue Confidence Level Understanding Match MethodsUnderstanding Match Types Understanding Rule Matching Understanding AP Classification RulesUnderstanding Infrastructure Intrusion Detection Feature Command Trap Syslog IDWorking with Intrusion Detection 126086 Ids impersonation-profile WlsxAPSpoofingDetected 126069Detect-bad-wep WlsxStaRepeatWEPIVViolation 126016 Ids impersonation-profileDetect-malformed-large-duration Detected Require-wpa WlsxChannelMisconfiguration 127028Ids unauthorized-device-profile WlsxWirelessBridge 126036 Detect-wireless-bridge Wireless-bridge-quiet-timeDetecting Ad hoc Networks Detecting an 802.11n 40MHz Intolerance SettingDetecting Active 802.11n Greenfield Mode Detecting an Ad hoc Network Using a Valid SsidDetecting an RTS Rate Anomaly Detecting Bad WEP InitializationDetecting a Beacon Frame Spoofing Attack Detecting a Client Flood AttackDetecting Malformed Frame-Auth Detecting a Misconfigured APDetecting a Wireless Bridge Detecting Broadcast DeauthenticationDetecting Wellenreiter Understanding Client Intrusion DetectionIds dos-profile WlsxOmertaAttack 126071 Ids dos-profile WlsxPowerSaveDoSAttack 126109Detect-power-save-dos-attack Detect-hotspotter-attack Hotspotter-quiet-timeDetecting a Disconnect Station Attack Detecting a Meiners Power Save DoS AttackDetecting a Block ACK DoS Detecting a ChopChop AttackDetecting Unencrypted Valid Clients Detecting an Omerta AttackDetecting Rate Anomalies Detecting a Tkip Replay AttackUnderstanding Infrastructure Intrusion Protection Configuring Intrusion ProtectionUnderstanding Client Intrusion Protection Protecting Windows Bridge Configuring the Wlan Management System WMSNavigate to the Configuration Advanced Services Wireless Protecting Valid StationsStation Ageout Interval Configuring Local WMS SettingsNot configured Managing the WMS DatabaseBlacklisting Manually Understanding Client BlacklistingMethods of Blacklisting Captive portal Blacklisting by Authentication FailureEnter a value in the Max Authentication failures field Enabling Attack BlacklistingProfiles list, expand the IDS menu, then select IDS profile Working with WIP Advanced FeaturesSetting Blacklist Duration Removing a Client from BlacklistingUnderstanding TotalWatch Channel Types and Qualifiers Configuring TotalWatchFrequency Channel Understanding TotalWatch Monitoring FeaturesUnderstanding TotalWatch Scanning Spectrum Features Understanding TotalWatch Channel Dwell TimeUnderstanding TotalWatch Channel Visiting Administering TotalWatchConfiguring Per Radio Settings Configuring Per AP SettingDOS Licensing Configuring Tarpit ShieldingUnderstanding Tarpit Shielding Licensing CLI Commands Working with Tarpit ShieldingFollowing topics are included in this chapter Basic Functions and FeaturesAccess Points APs FunctionNaming and Grouping APs You can use the WebUI or the CLI to create a new AP group Use the following command to create an AP groupCreating an AP group Assigning APs to an AP GroupClick Apply and Reboot Understanding AP Configuration ProfilesWorking with Wireless LAN Profiles Page Page Working with QoS Profiles Working with AP ProfilesProvisioning Mesh Profiles Working with RF Management ProfilesOther Profiles Viewing Profile ErrorsProfile Hierarchy AP Specific and AP Group Profile Hierarchies Other Profile Hierarchies Verifying that APs Can Connect to the Controller Configuring Firewall SettingsDeploying APs Running the RF PlanEnabling Controller Discovery Configuring DNS ResolutionConfiguring Dhcp Server Communication with APs Verifying that APs Are Receiving IP Addresses Using the Aruba Discovery Protocol ADPNavigate to the Configuration Network IP Dhcp Server window AP92 4GHz or 5GHz Provisioning APs for MeshProvisioning 802.11n APs for Single-Chain Transmission AP Model Freqency Band Antenna PortAP134 4GHz or 5GHz Installing APs on the NetworkAP Model Freqency Band 5GHzWorking with the AP Provisioning Wizard Provisioning Installed APsUpdating the RF Plan Designation an AP as Remote RAP versus Campus CAPProvisioning an Individual AP AP Provisioning Window Page AP is associated Provisioning Multiple APs using a Provisioning ProfileLMS or backup LMS values Assigning Provisioning Profiles Troubleshooting Configuring a Provisioned APAP Installation Modes Renaming an AP Clear gap-db wired-macOptimize APs Over Low-Speed Links Configuring the Bootstrap ThresholdTo configure the bootstrap threshold using the WebUI LMS IPv6 Backup LMS IPv6 LMS Preemption RF Band for AM Mode scanningConfiguring split-tunnel forwarding Backup LMS IPWhen an AP process crashes Bootstrap thresholdFrom a wireless client that is connected to a tunneled Ssid Wireless frame is only encapsulated inside the IPsec tunnelPrioritizing AP heartbeats AP Redundancy AP Maintenance ModeEnergy Efficient Ethernet To enable AP maintenance modeAP130 Series only Managing AP LEDs802.11a and 802.11g RF Management Profiles RF ManagementRadio Managing 802.11a/802.11g Profiles Using the WebUIEnable CSA Creating or Editing a ProfileMHz and 40 MHz modes Level 5 disable PHY reportingReuse feature Balancing mode Select one of the following optionsRadio Management ARM scanning and channel assignment Load-balancing modeChannel. The default CSA count is 4 announcements Balancing thresholdDefault, allowing 40 MHz operation RX Sensitivity TuningRX sensitivity tuning based channel reuse threshold, in dBm Signal strengthAM Scanning Profile Assigning an 802.11a/802.11g ProfileAssigning a High-throughput Profile Profile Spectrum monitor radioAssigning an ARM Profile Creating or Modifying a Profile Managing 802.11a/802.11g Profiles Using the CLIDeleting a Profile Assigning a 802.11a/802.11g Profile Viewing RF Management SettingsTo view the settings of a specific RF management profile RF OptimizationMaximum value 8 seconds RF Event ConfigurationDefault value 0 seconds Is sent to the clientRecommended value is 85% Frame Error Rate HighFrame Error Rate Low Detect Frame Rate AnomaliesFrame Retry Rate Low Configuring AP Channel AssignmentsSelect the Regulatory Domain profile named default Frame Retry Rate HighChannel Switch Announcement CSA Automatic Channel and Transmit Power Selection Managing AP Console SettingsDomain name used by the AP IP address of the AP’s master controllerIP address of the DNS server used by the AP Secure Enterprise Mesh Understanding Mesh Access PointsMesh Points Mesh PortalsMesh Clusters Understanding Mesh LinksComponent Description Link MetricsOptimizing Links RF Management 802.11a and 802.11g Profiles Understanding Mesh ProfilesMesh Cluster Profile Mesh Radio ProfileHigh-Throughput Profiles Mesh High-Throughput Ssid ProfileAdaptive Radio Management Profiles Mesh Recovery Profile Understanding Mesh SolutionsWired AP Profile Point-to-Multipoint Deployment Thin AP Services with Wireless Backhaul DeploymentPoint-to-Point Deployment Sample Point-to-Multipoint Deployment High-Availability DeploymentCollecting Required Information Planning a Wlan According to Your SpecificationsTask Overview AP Desired Rates 2.4 GHz Radio Properties Building DimensionsAM Desired Rates Working with Mesh Radio ProfilesManaging Mesh Profiles In the WebUI Creating a New ProfileAP goes through the list and uses the next highest rate Threshold Nodes Default 10 missed heartbeats. The range isIndicates the transmit rates for the 802.11a radio RatesUsed for user traffic Range 0-4094. Default 0 disabledDefault distributed-tree-rssi Recommends using this default startup-subthresholdvalueLink quality Default 2,333 bytes. The range is 256- 2,346Assigning a Profile to a Mesh AP or AP Group Editing a ProfileManaging Mesh Profiles In the CLI Viewing Profile SettingsTo view the settings of a specific mesh radio profile Deleting a Mesh Radio Profile Working with Mesh High Throughput Ssid ProfilesManaging Profiles In the WebUI Assigning a Profile to an AP GroupLaunch then software retries Temporal Diversity EnableEnabled legacy stations are allowed Configured value adjusts based on AP capabilitiesDifferent values, separate each value with a comma Mode Enabled by defaultΜsec, 2 µsec, 4 µsec Degrade throughputManaging Profiles In the CLI Deployments with Multiple Mesh Cluster Profiles Viewing High-throughput Ssid SettingsTo view the settings of a specific high-throughput profile Understanding Mesh Cluster ProfilesManaging Mesh Cluster Profiles In the WebUI Associating a Profile to Mesh APs Deleting a Mesh Cluster Profile Managing Mesh Cluster Profiles In the CLIAssociating Mesh Cluster Profiles Viewing Mesh Cluster Profile SettingsTo view the settings of a specific mesh cluster profile To exclude a specific mesh cluster profile from an AP Configuring Ethernet Ports for MeshConfiguring Bridging on the Ethernet Port Excluding a Mesh Cluster Profile from a Mesh NodeConfiguring Ethernet Ports for Secure Jack Operation Extending the Life of a Mesh Network Outdoor AP Parameters Provisioning Mesh NodesProvisioning Mesh Nodes Under Port Selection, click the port to configureIP settings section, select Obtain IP Address Using Dhcp Provisioning CaveatsBooting the Mesh Point Understanding the AP Boot SequenceBooting the Mesh Portal Air Monitoring and Mesh Verification ChecklistVerifying the Network CLI Examples Configuring Remote Mesh Portals RMPsCreating a Remote Mesh Portal In the WebUI How RMP WorksDefining the Mesh Private Vlan Provisioning the APAdding a Mesh Cluster Profile Selecting a Mesh Radio ProfileSelecting an RF Management Profile Profile Details window Configuring a Dhcp PoolConfiguring the Vlan ID of the Virtual AP Profile Additional Information Provisioning a Remote Mesh Portal In the CLIConfiguring Redundancy Parameters Configuring the Local Controller for Redundancy On the master controller Configuring the LMS IPConfiguring the Master Controller for Redundancy Controllers. Specify a key of up to 64 characters Command ExplanationEnter the master-redundancy context Router ID of the Vrrp instanceThis config mode command includes RF plan data when Configuring Database SynchronizationConfiguring Master-Local Controller Redundancy Enabling Incremental Configuration Synchronization CLI OnlyRedundant Topology Master-Local Redundancy Vrrp Dell PowerConnect W-Series ArubaOS 6.2 User Guide Working with Rapid Convergence Disabled Discarding BlockingUnderstanding Rstp Migration and Interoperability Rstp 802.1w Description Port Role Edge Port and Point-to-Point Configuring RstpFeature Default Value/Range Port Fast Troubleshooting RstpChange the default configurations via the command line Monitoring RstpDell PowerConnect W-Series ArubaOS 6.2 User Guide Rstp Enabling PVST+ in the CLI Understanding PVST+ Interoperability and Best PracticesEnabling PVST+ in the WebUI From the WebUI, add a Vlan instance and enable PVST+IP Mobility Understanding Dell Mobility ArchitectureOn all Dell controllers in the mobility domain Configuring Mobility DomainsEnable mobility disabled by default On a master controllerConfiguring a Mobility Domain Joining a Mobility Domain Example ConfigurationNavigate to the Configuration Advanced Services IP Mobility On controller a the master controller Configuring Mobility using the WebUISubnetwork Mask Home Agent Address or VripTracking Mobile Users Configuring Mobility using the CLIViewing mobile client status using the WebUI Viewing mobile client status using the CLIStatus Type Description Viewing user roaming status using the CLIViewing specific client information using the CLI Roaming Description Status TypeHA Discovery on Association Configuring Advanced Mobility FunctionsSetting up mobility association Using the CLI Mobile Client Roaming LocationsEnable standalone AP Is 0-5000 visitors. The default setting is 5000 visitorsDefault setting is 3 attempts Seconds. The default setting is 5000 secondsClick Apply after setting the parameter Proxy Dhcp Proxy Mobile IPRevocations Understanding Bridge Mode Mobility DeploymentsWorking with Inter controller Mobility Enabling Mobility MulticastWorking with Proxy Igmp and Proxy Remote Subscription Inter-controller Mobility Configuring Mobility MulticastStart at 0 from the left-most position Enable Igmp proxy on the FastEthernet Ieee 802.3 interfaceEnable Igmp snooping ExampleExternal Firewall Configuration Understanding Firewall Port Configuration Among Dell DevicesConfiguring Ports to Allow Other Traffic Types Enabling Network AccessPorts Used for Virtual Internet Access VIA Page Remote Access Points About Remote Access PointsRemote AP with a Private Network Configure the NAT Device Configuring the Secure Remote Access Point ServiceConfigure a Public IP Address for the Controller Using the WebUI to create a DMZ addressYou can use the CLI or the WebUI to configure Chap Configure the VPN ServerChap Authentication Support over PPPoE Using the WebUI to configure ChapCreating a Remote AP Whitelist Configuring Certificate RAPUsing the CLI to configure the Chap RAP Static Inner IP Address Configuring PSK RAPUsing WebUI Using CLIIP-Address parameter in the local database Provision the APDeployment Scenario Master IP Address Value Deploying a Branch Office/Home Office SolutionLocal Debugging Configuring the Branch Office APTroubleshooting Remote AP Provisioning the Branch Office APBasic View Information Advanced View Information Name Remote AP Connectivity Seamless failover from backup link to primary link on RAPMultihoming on remote AP RAP Data Description Enabling Remote AP Advanced Configuration OptionsRemote AP Diagnostics Understanding Remote AP Modes of Operation Remote Oper Forward Mode Setting AtionSSIDs Working in Fallback ModeOnly Ssid configuration Stored in flash on Essid is up when Same behavior as Not supported AP contactsConfiguring the AAA Profile for Fallback Mode in the WebUI Configuring Fallback ModeBackup Configuration Behavior for Wired Ports Configuring the AAA Profile for Fallback Mode in the CLI Configuring the Dhcp Server on the Remote AP Using the WebUI Configuring the Session ACL in the WebUI Configuring Advanced Backup OptionsConfiguring the AAA Profile in the WebUI Route src-nat Defining the Backup Configuration in the WebUIConfiguring the Session ACL in the CLI Configure the Remote-AP Dhcp Server fieldsYou can define other parameters as needed Specifying the DNS Controller SettingUsing the CLI to configure the AAA profile Defining the Backup Configuration in the CLIBackup Controller List Configuring the LMS and backup LMS IP addresses in the CLI Configuring Remote AP FailbackTo disable, enter Enabling RAP Local Network AccessConfiguring Remote AP Authorization Profiles To enable, enterUnderstanding Split Tunneling Working with Access Control Lists and Firewall PoliciesAdding or Editing a Remote AP Authorization Profile Sample Split Tunnel Environment Configuring Split TunnelingConfiguring the Session ACL Allowing Tunneling Configuring an ACL to Restrict Local Debug Homepage Access Enable Restricted Access to LD Homepage Configuring the AAA Profile for TunnelingInthe CLI Configuring the Tunneling Virtual AP ProfileDefining Corporate DNS Servers Provisioning Wi-Fi MultimediaNavigate to Configuration Wireless AP Configuration Reserving Uplink Bandwidth Configuring Bandwidth ReservationTo configure bandwidth reservation Navigate to Configuration Advanced Services All ProfilesProvisioning RAP for USB Modems Provisioning 4G USB Modems on Remote Access PointsNavigate to Configuration Wireless AP Installation 4G USB Modem Provisioning Best Practices and ExceptionsRAP 3G/4G Backhaul Link Quality Monitoring Pantech Configuring W-IAP3WN Access PointsConverting an IAP to CAP Converting an IAP to RAP or CAPConverting IAP to RAP Applying Contracts Configuring Bandwidth Contracts for RAPEnabling Bandwidth Contract Support for RAPs Defining Bandwidth ContractsVerifying Contracts Applied to Users Verifying Contracts on APVerifying Bandwidth Contracts During Data Transfer Following is a sample output for a per-user configurationPage How it Works Virtual Intranet AccessUnderstanding VIA Connection Manager User action / environment VIA’s behavior Installing the VIA Connection ManagerOn Microsoft Windows Computers On Apple MacBooksComplete Upgrade Configuring the VIA ControllerUpgrade Workflow Minimal UpgradeBefore you Begin Supported Authentication MechanismsAuthentication mechanisms supported in VIA Other authentication methodsSuite-B Configuring VIA SettingsCreate VIA User Roles Using the WebUI to Configure VIAEnable VPN Server Module Create VIA Authentication ProfileTo create VIA connection profile Create VIA Connection ProfileEnter a name for the server group Configuration Option Description Client Auto-Login To the support email-address for troubleshootingList of all IKEv2 authentication methods Default NoneUse Windows Credentials Enable SupplicantEnable Fips Module VIA Authentication Name\username instead of just usernameTo configure VIA web authentication profile Configure VIA Web AuthenticationTo associate a VIA connection profile to a user role Configure VIA Client Wlan ProfilesTo configure a VIA client Wlan profile Associate VIA Connection Profile to User RoleMschapv2-use-windows-credentials Option DescriptionCryptobinding TLV Servers or trusted certification authoritiesTo download the VIA installer and version file Rebranding VIA and Downloading the InstallerDownload VIA Installer and Version File Create VIA connection profiles Using the CLI to Configure VIACreate VIA authentication profiles Create VIA rolesRequires the following Microsoft KB on the end-user systems Customize VIA logo, landing page and downloading installerDownloading VIA Pre-requisitesDownloading VIA Login to Download VIAConnection Details Tab Installing VIAUsing VIA Settings Tab TroubleshootingDiagnostic Tab AP104 Yes Understanding Spectrum AnalysisSpectrum Analysis DeviceGraph Title Device Configurable as aHybrid AP? Graph Title Description Update Interval Swept Spectrum Analysis ClientsSpectrogram Real-Time FFTHybrid AP Channel Changes Hybrid APs Using Mode-Aware ARMCreating Spectrum Monitors and Hybrid APs Converting an Individual AP to a Spectrum Monitor Converting APs to Hybrid APsSelect AP to expand the AP profiles section Converting a Group of APs to Spectrum MonitorsConnecting Spectrum Devices to the Spectrum Analysis Client To manually disconnect a spectrum monitor or hybrid AP Disconnecting a Spectrum DeviceView Connected Spectrum Analysis Devices Table Column DescriptionClick the Spectrum Dashboards tab Configuring the Spectrum Analysis DashboardsSelecting a Spectrum Monitor Click theSpectrum Dashboards tab Changing Graphs within a Spectrum ViewSelect Rename Renaming a Spectrum Analysis Dashboard ViewSaving a Dashboard View Resizing an Individual Graph Customizing Spectrum Analysis GraphsActive Devices Spectrum Analysis Graph Configuration OptionsShow Channel RangeColumn may display any of the following values Service set identifier of the device’s 802.11 wireless LANActive Devices Table Device TypeSelect the button by the Less than drop down list Select the button by the symbolRadio band or channel Column headingMHz Active Devices TrendDetects on the radio channel Center FrequencySelect one of the following device types Wi-Fi data as non-Wi-Fi dataChannel Metrics Show lines for theseRadio band displayed in this graph Channel Metrics GraphChannel Metrics Trend Unselect the checkbox to hide that information Drop-down list and select one of the following optionsMinutes HourMonitor Channel Summary TableBand Radio band displayed in this graph Device Duty CycleFollowing device types Channel Utilization TrendNumbering Identify a channel numbering scheme for the graph Uncheck the checkbox by that channel number As non-Wi-Fi dataDevices vs Channel IntervalsDevices vs Channel Options FFT Duty Cycle FFT Duty CycleInterference Power Interference Power Options Device types Quality SpectrogramData Real-Time FFTFrequencies for the graph AxisRight field, and the higher value in the left field Frequency Center of the x-axis of this chart SpanSwept Spectrogram CenterSimple Line Graph of FFT Power Data Swept Spectrogram Options Working with Non-Wi-Fi Interferers Device vs Channel Interference Power Non-Wi-Fi Description InterfererViewing Spectrum Analysis Data Understanding the Spectrum Analysis Session LogTo record spectrum analysis data for later analysis Recording Spectrum Analysis DataCreating a Spectrum Analysis Record To save the recording file Saving the RecordingPlaying a Spectrum Analysis Recording Playing a Recording in the Spectrum DashboardClick Load File For Playback Playing a Recording Using the RFPlayback ToolClick the Recording View/Play link at the top of the window Loading a Spectrum View Troubleshooting Spectrum AnalysisTroubleshooting Browser Issues Converting a Spectrum Monitor Back to an AP or Air MonitorUnderstanding Device Ageout Times Understanding Spectrum Analysis Syslog MessagesPlaying a Recording in the RFPlayback Tool Age Out Generic Frequency Hopper Age Out Generic Fixed FrequencyHopper Seconds APs Monitoring PerformanceDashboard Monitoring ClientsMonitoring Usage Using Dashboard HistogramsMonitoring WLANs Monitoring Potential IssuesMonitoring Security Monitoring Clients Monitoring Access PointsElement To disable this setting, include the no parameterMonitoring Firewalls Element ViewBytes Tx Bytes Rx Bytes Element DescriptionColumn User Bytes Packets Device Destination Details ViewElement Tab Element Summary ViewApplication Usage BreakdownUsage Breakdown Aggregated SessionsDestination Alias Column DescriptionSource IP Management Access Configuring Certificate Authentication for WebUI AccessEnabling Public Key Authentication for SSH Access Select the client certificate Click Apply Enabling Radius Server AuthenticationConfiguring Radius Server Authentication with VSA Configuring a set-value server-derivation rule Resetting the Admin or Enable Password Disabling Authentication of Local Management User AccountsVerifying the configuration User admin Password Bypassing the Enable Password PromptConfigure the settings described in Table Implementing a Specific Management Password PolicySetting an Administrator Session Timeout Defining a Management Password PolicyAllowed Characters Disallowed Characters Period Pipe Plus sign + Tilde ~ Comma Accent mark ` Management Authentication Profile ParametersAllowed Characters ColonAbout Digital Certificates Managing CertificatesEnter the following information Navigate to the Configuration Management Certificates CSRObtaining a Server Certificate Parameter Description RangePKCS7 encrypted PKCS12 encrypted Run the following commandObtaining a Client Certificate Importing CertificatesLocation Description Use the following command to import CSR certificatesViewing Certificate Information Imported Certificate LocationsSnmp Parameters for the Controller Configuring SnmpChecking CRLs Configuring Logging Category/Subcategory Description 802.1x messages Radius Radius user messages Category/SubcategoryLogging Level Description Enabling Guest Provisioning Configuring the Guest ProvisioningConfiguring the Guest Fields Guestcategory Guest FieldFields that follow Configuring the Page DesignGuest Field Description Provisioning page for the sponsor informationNavigate to the Configuration Management SMTPpage Configuring the Smtp Server and Port in the WebUIConfiguring Email Messages Creating Email Messages in the WebUI Configuring an Smtp server and port in the CLIClick Apply and then Save Configuration Management Users section, click Add Configuring a Guest Provisioning UserUsername and Password Authentication Method Static Authentication MethodClick Apply and Save Configuration Customizing the Guest Access PassSmart Card Authentication Method Username and Password MethodCustomized Guest Account Information Window Creating Guest AccountsCreating a Guest Account-New Guest Window Guest Provisioning User TasksCreating Multiple Guest Entries in a CSV File Importing Multiple Guest EntriesCVS File Format-Guest Entries Information Importing the CSV File into the DatabaseImporting a CSV file that contains Guest Entries Displaying the Guest Entries Log File Printing Guest Account Information Optional ConfigurationsRestricting one Captive Portal Session for each Guest Managing Files on the Controller Setting the Maximum Time for Guest AccountsUsing the WebUI to set the maximum time for guest accounts Using the CLI to set the maximum time for guest accountsUsername to log into server Server Type ConfigurationNavigate to the Maintenance Controller Image Management Transferring ArubaOS Image FilesCopying Log Files Backing Up and Restoring the Flash File SystemCopying Other Files Setting the System ClockManually Setting the Clock Navigate to the Configuration Management ClockClock Synchronization Configuring NTP AuthenticationThreshold Description Enabling Capacity AlertsTimestamps in CLI Output User-capacity Sent. The default threshold for this parameter is 80%Examples Adding Local Controllers Configuring Local ControllersUsing the Initial Setup Using the Web UI Configuring Layer-2/Layer-3 SettingsConfiguring Trusted Ports Configuring Local Controller SettingsMoving to a Multi-Controller Environment Configuring APsUsing the WebUI to configure the LMS IP Using the CLI to configure the LMS IPConfiguring a Preshared Key Using the CLI to configure a PSK Configuring a Controller CertificateUsing the WebUI to configure a Local Controller PSK Using the WebUI to configure a Master Controller PSKUsing the CLI to configure the Master Controller Certificate Advanced Security Securing Client TrafficWireless xSec Client Example Securing Wireless ClientsSecuring Wired Clients Navigate to the Configuration Advanced Services Wired Access Securing Wireless Clients Through Non-Dell APs Securing Clients on an AP Wired Port Succeed Time to wait for authentication toFor Controller Configuring Controllers for xSecSecuring Controller-to-Controller Communication Installing the Odyssey Client Configuring the Odyssey Client on Client MachinesModifying a regedit Policy Certificate Information Page Voice and Video License Requirements Configuring Voice and VideoSetting up Net Services Using Default Net ServicesNet Service Name Protocol Port Configuring User RolesCreating Custom Net Services Using the Default User RoleCreating or Modifying Voice User Roles Using the WebUI to configure user rolesService Name Navigate to the Configuration Security Access ControlClick Done Click Apply Using the CLI to configure a user roleUsing the WebUI to derive the role based on MAC OUI Using the User-Derivation RolesUsing the WebUI to derive the role based on Ssid Using the CLI to derive the role based on SsidConfiguring Video over Wlan enhancements Configuring Firewall Settings for Voice and Video ALGsAdditional Video Configurations Pre-requisites To enable Igmp snoopingTo add the ACL to a user role Configure multicast rate optimization for video trafficSet a bandwidth percentage for the following categories Configure and apply a bandwidth management profileEnable Igmp Proxy Enable multicast shaping on the firewallEnable Igmp Snooping Configure ARM scanning for video traffic Configure multicast rate optimization for the video trafficThis step is optional Configure and apply bandwidth management profileWorking with QoS for Voice and Video Understanding VoIP Call Admission Control Profile Voip Tspec Enforcement Understanding Wi-Fi MultimediaTo enable call admission control in this profile Lowest Background Best effort Video Voice Highest Configuring WMM AC MappingPriority 802.1p Priority WMM Access Category Enabling WMMBackground Best effort Video Voice Dscp Decimal Value WMM Access CategoryUsing the WebUI to map between WMM AC and Dscp Using the CLI to map between WMM AC and Dscp Configuring Dscp PrioritiesWMM Access Category Description 802.1p Tag Configuring Dynamic WMM Queue ManagementEnhanced Distributed Channel Access Microseconds, enter 94 3008/32. Possible values are Using the WebUI to configure Edca parametersDisables this option 1. a value of 4 computes to 2 4-1 = 15. Possible values areTo associate the Edca profile instance to a Ssid profile Enabling WMM Queue Content EnforcementUsing the CLI to configure Edca parameters Port Packet Type Understanding Extended Voice and Video FeaturesMicrosoft OCS Apple FacetimeScanning for VoIP-Aware ARM Enabling WPA Fast HandoverEnabling Mobile IP Home Agent Assignment Disabling Voice-Aware Configuring SIP Authentication TrackingViewing Real Time Call Quality Reports To configure Real Time analysis on voice callsEnabling Real Time Call Quality Analysis Web UISIP session timer is implemented in the SIP ALG as per RFC Enabling SIP Session TimerClick the Policies tab To configure the session timer and the timeout valueTo view the SIP settings on the controller Select the Classify Media check box Enabling Wi-Fi Edge Detection and Handover for Voice ClientsUnderstanding Dial Plan Format Expand Handover Trigger under Wireless LanClick the Apply button to save the configuration Working with Dial Plan for SIP CallsAction Description Configuring Dial PlansDialplan Profile displays the dial plan details Dialplan ProfileTo view the SIP dial plan profile Enabling Enhanced 911 SupportTo create a voice dial plan profile To associate the dial plan with SIP ALGWorking with Voice over Remote Access Point Enabling Lldp Understanding Battery BoostConfigure the Lldp profile parameters as desired then click Show the power support capabilities of the AP interface Lldp PDUs. The AP will send all optional TLVs by defaultLldp PDUs. The AP will send all 802.1 TLVs by default Lldp PDUs. The AP will send all 803.2 TLVs by defaultLLDP-MED Profile Configuration Parameters Apply to save your settings Viewing Troubleshooting Details on Voice Client Status Advanced Voice TroubleshootingConnected To view the details of a completed call based on the CDR Id Viewing Troubleshooting Details on Voice Call CDRsEnabling Logging for a Specific Client Navigate to the Configuration Management LoggingEnabling Voice Logs To debug voice logs for a specific client To view the voice signaling message tracesViewing Voice Traces To set the voice logging level to debuggingTo view the voice configuration details on your controller Viewing Voice ConfigurationsSIP settings Value Parameter Termination of Instant AP VPN tunnels L2/L3 network mode supportOverview Instant AP VPN SupportExternal Whitelist DB VPN ConfigurationWhitelist DB Configuration Controller Whitelist DBRadius proxy for VPN connected IAPs VPN Local Pool ConfigurationVPN Profile Configuration Viewing Branch StatusOutput of this command includes the following parameters USB Ports Understanding W-600 Series Best Practices and ExceptionsSeries Controllers ControllerFinding USB Modem Commands Connecting with a USB Cellular ModemsSwitching Modes Cellular Profile Uplink ManagerCellular Profile from the WebUI Dialer GroupVerify the modem is registered with the Uplink Manager Configuring a Supported USB ModemIf you get entries similar to the example below Configuring a New USB ModemConfiguring the Profile and Modem Driver Driver=none Configuring the TTY PortSelecting the Dialer Profile Testing the TTY PortLinux Support Setting Up NAS Network-Attached Storage DevicesNAS Device Setup View list of shares in a disk Configuring in the CLIManaging NAS Devices Controller wake-up Green-solid Button Mounting and Unmounting DevicesNAS Media Green-solid Press and hold media To view a list of printers mounted on the controller, type Connecting to a Print ServerPrinter Setup Using the CLI Additional Commands for Managing PrintersRemote Branch 1-W-650 Controller Series Sample Topology and ConfigurationRemote Branch 2-W-650 Controller Central Office Controller-Active Central Office Controller-Backup Page Sample ESI Topology External Services InterfaceESI-Fortinet Topology ESI Parser Domains Understanding the ESI Syslog ParserSyslog Parser Rules Peer ControllersUser Pattern Matching Configuring ESICondition Pattern Matching Enter a Profile Name Configuring Health-Check Method, Groups, and ServersDefining the ESI Server Enter a Group Name To configure an ESI server group on the controllerDefining the ESI Server Group Server NameRedirection Policies and User Role Deleting an existing syslog parser domain ESI Syslog Parser Domains and RulesManaging Syslog Parser Domains in the WebUI Adding a new syslog parser domainEditing an existing syslog parser domain Use these CLI commands to manage syslog parser domainsManaging Syslog Parser Domains in the CLI Managing Syslog Parser RulesEditing an existing syslog parser rule Adding a new parser ruleDeleting a syslog parser rule Use these CLI commands to manage syslog parser rules Testing a Parser RuleShowing ESI syslog parser rule information Sample Route-mode ESI TopologyMonitoring Syslog Parser Statistics IP routing configuration on Fortinet gateway Configuring the Example Routed ESI TopologyESI server configuration on controller Defining the Ping Health-Check Method Health-Check Method, Groups, and ServersEnter a Group Name. Enter fortinet Trusted IP Address. Enter Untrusted IP Address. EnterRedirection Policies and User Role To add a new syslog parser domain for the routed example Syslog Parser Domain and RulesAdd a New Syslog Parser Domain in the WebUI Adding a New Parser Rule in the WebUIExample NAT-Mode Topology Sample NAT-mode ESI TopologyESI server configuration on the controller Profile Name. This example uses externalcpping Configuring the Example NAT-mode ESI TopologyConfiguring the NAT-mode ESI Example in the WebUI Configuring the ESI Group in the WebUIPolicy Name. This example uses cpredirectacl Configuring the Example NAT-mode Topology in the CLIConfigure the ESI Servers in the WebUI Configuring the Redirection Filter in the WebUICLI Configuration Example Configuring a Health-Check PingConfiguring ESI Servers Using the ESI Group in a Session Access Control ListCharacter-Matching Operators Understanding Basic Regular Expression BRE SyntaxDescription Sample Result Regular Expression Repetition OperatorsRegular Expression Anchors References External User Management Working with the ArubaOS XML API WorksDeleting a User Authenticating a UserCreating an XML Request Adding a UserBlacklisting a User Default Response FormatFormat of a default XML response from the controller is XML ResponseCode Reason message Response CodesCode Reason message Description Query Command Response FormatAssociating the XML API Server to a AAA profile Using the XML API ServerConfiguring the XML API Server Verify the XML API server configurationVlan Associating the Captive Portal Profile to an Initial Role Set up Captive Portal profileDell controllers configuration Authentication Command DescriptionOptions Description Range / Defaults This command deletes the user from the controllerMonitoring External Captive Portal Usage Statistics Sample Code Using XML API in C LanguagePage Page List all parameter that you can use in a request Understanding Request and ResponseUnderstanding XML API Request Parameters Response from the controller This command will add a client on your networkUnderstanding XMl API Response Adding a ClientDeleting a Client Authenticating a ClientView the updated details of the client on the controller Status of the client after authentication Status of the client before authenticationSending the authentication command Querying for Client Details Blacklisting a Client-request and response Blacklisting a ClientRF Plan Supported PlanningOutdoor-Specific Deployment Considerations Configuration ConsiderationsPlanning Deployment Pre-Deployment ConsiderationsDual-Port AP Considerations Post-Deployment ConsiderationsButtons Description Launching the RF PlanCampus List Edit a campus from the building list pane Building List PaneButtons Building Dimension Building Specifications OverviewAP Modeling Parameters Radio Type Radio Description Button Design ModelOverlap Factor Radio Property Description Users/APRadio Properties Desired Rates and HT Support Options Overlap Description FactorValid values are 54, 48, 36, 24, 18, 12, 9, 6, 11, 5.5, 2 AM ModelingNumber of available channels Radio Button Description Planning FloorsDesign Models Monitor RatesZoom You can select or adjust the features as described in TableNaming Approximate Coverage MapFloor Editor Dialog Box LevelBackground Images Area Editor Dialog BoxArea Types Location and DimensionsFixed Access Point Editor Dialog BoxY Coordinates Power Levels802.11n Features Radio TypesMemo AP PlanInitialize OptimizeViewing the Results AM PlanFix All Suggested AP/AMs Exporting and Importing Files Export Buildings Export CampusImport Campus Import Buildings LocateProperty Description Fqln MapperSearch Results Using the Fqln Mapper in the AP ProvisionHeight Using the WebUIRF Plan Example Sample BuildingCreate a Building Campus Name Model the Access PointsText Box InformationAdding the background image and naming the second floor Model the Air MonitorsAdd and Edit a Floor Adding the background image and naming the first floorRunning the AP Plan Creating a Don’t Deploy AreaClick Initialize then Optimize Running the AM PlanClick Initialize Click OptimizeForwarding Mode Feature Not Supported Understanding Mode SupportBehavior and Defaults Name Protocol Understanding Basic System DefaultsNetwork Services Name Protocol Ports Following are predefined policies PoliciesPredefined Policy Description Network access. You can use this rule to Used to enable the captive portal logoutAccess the controllers administrative Be modified. It permits APs to boot upThis policy can be used to source-NAT all Permits all DNS trafficNAT-T UDP 4500. Remove NAT-T if not NeededFollowing are predefined roles RolesPredefined Role Description Profiles with different customization Enables captive portalShould be disabled if it is not needed BeginningArubaOS software includes predefined management user roles Understanding Default Management User RolesPredefined Role Permissions Show wlan-ap-count type access-points Show aaa state configurationShow aaa authentication-server all Show switches summaryMonitoring Controller Clients Packet CaptureMonitoring Port Protocol Where Used Description Number Understanding Default Open PortsExposed to wireless users Controller Remote wired MAC lookup 4343Testing Port is not exposed to wireless usersDhcp with Vendor-Specific Options Configuring a Windows-Based Dhcp ServerConfiguring Option To configure option 60 on the Windows Dhcp serverField Information To configure option 43 on the Windows Dhcp serverScope Options Dialog Box Enabling Linux Dhcp Servers Navigate to Configuration Network IP IP InterfacesEnabling Dhcp Relay Agent Information Option Option Range 10.200.10.200 Radius Client Configuration Configuring Microsoft IAS802.1X Configuration for IAS and Windows Clients Active Directory Database Remote Access PoliciesConfiguring Policies Click Configure to select additional properties IAS Remote Access PoliciesPolicy Configuration Wizard-Authentication Methods Radius class Attribute Configuration Configuring Radius AttributesNext, create a remote policy for your new Radius client Configuring Management Authentication using IASCreating a Remote Policy Creating a User Entry in Windows Active Directory Defining Properties for Remote PolicyConfiguring a Server Group for IAS Management Authentication Click Begin Test Window XP Wireless Client Sample ConfigurationNavigate to DiagnosticsAAA Test Server Wireless Networks Networks to Access Wireless Network Association Wireless Network Authentication Protected EAP Properties EAP MSCHAPv2 Properties Definition AcronymsAcronyms and Terms AcronymDoS Acronym MSCHAPv2 RoW PoEPPPoE QoSVoFI VoIP XAuth TermsTerm WISPrTerm Term Definition IR wireless Encryption authenticationFixed wireless Shops are providing free wireless access for customersNear field communicationNFC Optical wirelessHills, mountains, and large human-made structures Input, multiple outputStandards for broadband wireless access BWA networks. WiMAX Access W-CDMAWi-Fi Facilities offer public access to Wi-Fi networksYagi antenna Wireless service providerWired LAN Kilometers
Related manuals
Manual 8 pages 57.45 Kb

6.2 specifications

Dell 6.2 is an advanced enterprise solution that caters to the needs of businesses seeking robust performance and efficiency. As a part of Dell's commitment to innovation, the 6.2 series combines cutting-edge technologies and features that enhance productivity and deliver reliable computing experiences.

One of the standout features of the Dell 6.2 is its impressive processing power. Equipped with the latest Intel processors, it offers exceptional speed and multitasking capabilities. This allows businesses to run demanding applications effortlessly, making it ideal for data-intensive tasks such as data analysis, software development, and virtualization. The series also supports substantial RAM configurations, enabling users to manage extensive workloads without experiencing slowdowns.

In terms of storage, the Dell 6.2 line includes advanced SSD options that significantly boost data access speeds compared to traditional hard drives. This rapid access to information is vital for businesses that require quick retrieval of large datasets. Furthermore, the devices support RAID configurations, which enhances data redundancy and security, protecting critical business information from loss.

Connectivity is another critical aspect of the Dell 6.2 series. It includes multiple USB ports, HDMI outputs, and high-speed Ethernet options, ensuring that users can easily connect to various peripherals and networks. The integration of Wi-Fi 6 technology enables faster wireless connections, resulting in improved internet speeds and bandwidth efficiency, which is crucial in today’s increasingly connected workplaces.

Dell has also prioritized security in the 6.2 series. It features enhanced biometric authentication and advanced encryption methods, safeguarding sensitive data from unauthorized access. Additionally, the system's BIOS protection and automatic updates provide an added layer of security, ensuring that the device remains safe from emerging threats.

The design of the Dell 6.2 is not only sleek and modern but also built for durability. Its robust chassis is engineered to withstand the rigors of daily use, making it suitable for various business environments. This durability ensures that the investment in Dell 6.2 will last for years while maintaining performance integrity.

In summary, the Dell 6.2 series embodies a blend of speed, storage efficiency, connectivity, and security, making it a top choice for enterprises looking to enhance their computing capabilities. With its modern features and durable design, Dell 6.2 is positioned as a reliable partner in driving business success.