DellPowerConnect W- Series ArubaOS 6.2 | User Guide RemoteAccessPoints | 510
Chapte r 30

Remote A ccess Points

The SecureRemote A ccess Point Service allows AP users, at remote locations, to connect to a D ell controller over
the Internet.Since the Internet is i nvolved,data traffic between the controller and the remote AP is VPN
encapsulated.That is, the traffic between the controller and AP is encrypted. Remote AP operations are supported
on all of Dell’s APs.
Topics in this chapter include:
l"About Remote Access Poi nts" on page 510
l"Configuringthe Secure Remote Access Point Service" on page 512
l"Deploying a BranchOffice/Home Office Solution" on page 517
l"EnablingRemote AP Advanced Configuration Options" on page 521
l"UnderstandingSplit Tunneling" on page 535
l"Provisioning Wi-Fi Multimedia" on page 541
l"ReservingUplink Bandwidth" on page 542
l"Provisioning 4G USB Modems on Remote Access P oints" on page 543
l"ConfiguringW-IAP3WN A ccess Points" on page 545
l"Convertingan I AP to RAP or CAP" on page 546
l"EnablingBandwidth Contract Support for RAPs" on page 547

About Remote Acc ess Points

Remote APs connect to a controller using ExtendedA uthentication and Internet Protocol Security (XAuth/IPSec).
AP control and 802.11 data traffic are carried throughthis tunnel.Secure Remote Ac cess Point Service extends the
corporate office to the remote site. Remote users can use the same featuresas co rporateoffice users. For example,
voice over IP (VoIP) applicatio nscan be extended to remote sites while the servers and the PBX remain secure in
the corporate office.
SecureRemote Access Point Service can also be used to secure control traffic between an AP and the controller in a
corporate environment.In this case, both the AP and controllerare in the company’s private address space.
The remote AP must be configured with the IPSec VPN tunnel termination point. Once the VPN t unnelis
established,t heA P bootstraps and becomes operational. Thetunnel termination point used by the remote AP
dependsupon the AP deployment, as shown in the following scenarios:
lDeployment Scenario 1: The remote AP and controller reside in a private network which is used to secure AP-to-
controllercommunication. (Dell recommends this deployment when AP-to-controller communications on a
private network needto be secured.)I nt his scenario,t heremote A P uses the controller’sIP address on the
private network to establish the IPSec VPN tunnel.