AOS10-demo v0.3
AOS10-demo v0.3
1|P a ge
2 Demo Topology
The aim here is to provide the starting point to put together a solution that include the AOS10 APs, two gateways,
ClearPass and obviously Aruba Central.
Note that APs in AOS10 support bridged, tunnelled and mix mode wireless LANs (WLAN) however in this technote
we’ll be deploying tunnelled mode WLANs. We’ll also demonstrate the gateway clustering with AOS10.
This is type of deployment is particularly useful when all the buildings in a school/college campus have L3 IP
demarcation and are routed to various part of the campus.
As you can see in the above diagram, the classic components that would normally run on mobility master or instant
APs are now run as services in Aruba Central. I am talking about Airmatch, Roaming, clientmatch, etc.
Here we’ll not go to the details of the architecture for that please refer to this link
https://www.arubanetworks.com/techdocs/AOS10X_OLH/Content/overview/architecture-overview.htm
2|P a ge
3 Aruba Central Account
You need an Aruba Central account with appropriate licenses for APs and gateways. You can sign up for a 90 days
trial from this link
https://www.arubanetworks.com/products/network-management-operations/central/eval/
Once you login to your Central account you need to add your devices (APs and Gateways) to the device inventory
You do the same for the gateways as well. Then you need to assign the licenses to the devices, for this from Account
home you need to go to “License Assignment”
3|P a ge
Now, we’ll go the network operations App in Aruba Central.
Here we’ll create a group and move the devices into it. The groups are used for device configurations.
4|P a ge
Then you need to convert the group to AOS10.
Once the group is converted, you can then drag and drop the devices from the right hand side table.
5|P a ge
4 Aruba Central Configuration
For this demo, I have also added Aruba 2930F switch to Aruba Central’s AOS10 group. We’ll start with the
configuration of the LAN switch to which we’ll connect the APs and the gateways.
As the names suggests, APs are connected to AP-VLAN, gateways and ClearPass are connected to Server VLAN.
The gateways are connected to port 5 and 7 that are configured for VLAN trunking. DHCP for AP, staff, and student
VLANs are configured on the switch.
Aruba-2930F-8G-PoEP-2SFPP#
7|P a ge
Disabling spanning tree
I am planning to sue interface 0/0/0 as my gateway uplink. This port needs to be in trunk mode and here we’ll add
the relevant VLANs.
8|P a ge
Adding the default route
9|P a ge
Here we’ll add the allow-all policy.
10 | P a g e
We’ll create a new user role staff and as before, we’ll add a allow-all policy and assign VLAN 44 to it.
We’ll configure the authentication server and RFC3576 for RADIUS CoA
11 | P a g e
Note that they are not assigned to any authentication server groups.
4.3 AP Configuration
Here we’ll go through the AP configuration. As always, we’ll do the bulk of configuration at the group level.
12 | P a g e
As we did with gateways, we’ll create various user roles here as well.
13 | P a g e
This is in case we want to change from tunnel mode to bridge mode for user traffic, otherwise we don’t need these
roles here.
Are you sure that you want to stop auto-provisioning and start full setup dialog?
(yes/no): yes
[12:55:07]:Starting rebootme
[12:55:07]:Shutdown processing started
Once the APs and gateways are online in Aruba Central, we’ll upgrade them to AOS10 image. In the next release SD-
branch and AOS10 firmware will merge. I have already upgraded my APs, but this is how you can do it.
15 | P a g e
We’ll use the same firmware version for the gateways as well.
Here we’ll check to see if the APs and gateways are online with the correct firmware
Notice that there is one gateway cluster. The cluster will automatically be formed between gateways on the network
using their system IP addresses.
16 | P a g e
4.6 Gateway Cluster
Cluster is a combination of multiple MDs working together to provide high availability to all the clients and ensure
service continuity when a failover occurs. The gateways need not be identical and can be either L2- connected or L3-
connected with a mixed configuration. In case of failover, the client SSO works for the L2- connected managed
devices and the clients are de-authenticated for L3-connected managed devices in a cluster.
The aims of clustering are
• seamless Campus Roaming: When a client roams between APs of different managed devices within a large L2
domain, the client retains the same subnet and IP address to ensure seamless roaming. The clients remain
anchored to a single managed device in a cluster throughout their roaming area which makes their roaming
experience seamless because their L2 or L3 information and sessions remain on the same managed device.
• Hitless Client Failover: When a managed device fails, all the users fail over to their standby managed device
seamlessly without any disruption to their wireless connectivity or existing high-value sessions.
• Client and AP Load Balancing: When there is excessive workload among the managed devices, the client and
AP load is evenly balanced among the cluster members. Both clients and APs are load balanced seamlessly.
17 | P a g e
Here is the CLI command to check the operation of the cluster.
(7005_AOS10_gwy1) #show lc-cluster group-membership
(7005_AOS10_gwy1) #
(7005_AOS10_gwy1) #show lc-cluster load distribution ap
(7005_AOS10_gwy1) #
Now checking the second gateway. Note we have 1x client and 2x APs that are connected.
(7005_AOS10_gwy2) #
(7005_AOS10_gwy2) #
(7005_AOS10_gwy2) #show lc-cluster load distribution client
18 | P a g e
Cluster Load Distribution for Clients
-------------------------------------
Type IPv4 Address Active Clients Standby Clients
---- --------------- -------------- ---------------
peer 192.168.1.243 0 1
self 192.168.1.242 1 0
Total: Active Clients 1 Standby Clients 1
(7005_AOS10_gwy2) #
(7005_AOS10_gwy2) #show lc-cluster load distribution ap
(7005_AOS10_gwy2) #
19 | P a g e
5 ClearPass Initial Configuration
Here we’ll do the basic ClearPass configuration and join it to the AD domain along with creation of dot1x service
policy. We’ll start with NTP and time zone.
20 | P a g e
5.1 Joining AD Domain
Configure the IP addresses and the rest as per your Lab setup but ensure you have the IP address of your domain
controller as the primary DNS. CPPM needs to join the AD domain, in order to authenticate against it. Make sure the
clock time for AD and CPPM are almost in sync. It is best to use NTP. If they are not in sync, then CPPM will not be
able to join the domain. When you click on the “join domain” button, you need to provide the FQDN of the DC and
that’s why you need the DNS entry to resolve the name of your domain controller.
21 | P a g e
5.2 ClearPass dot1x Service
Here we create a dot1x service for wireless access.
22 | P a g e
And here are the enforcement profiles that are being used in the enforcement policy
• AA Aruba 802.1X Wireless Default Profile RADIUS
• AA-Aruba 802.1X Wireless Staff Profile RADIUS
• AA-Aruba 802.1X Wireless Student Profile RADIUS
• AA Aruba 802.1X Wireless Update Endpoint Location Post_Authentication
23 | P a g e
5.3 NAD Configuration
Here we are adding Network Access Devices (NAD). This will be the AOS10 APs and gateways. Note that you need to
either add the AP IP addresses individually or just add their subnet as I have done here.
24 | P a g e
6 WLAN Configuration
Here we’ll configure the AOS10 APs to broadcast a tunnelled SSID. This is done at the group level.
6.1 Tunnelled Wireless Configuration
You can choose the cluster from the menu. Also note that the VLAN IDs are being displayed from the gateways.
25 | P a g e
Select the authentication server that we had configured on the gateways. It gets automatically populated using the
drop down menu. Note that this is not the RADIUS server that we configured in the AP group but rather from the
gateway group. Next select Accounting from the advance Setting section
26 | P a g e
6.2 Wireless dot1x Testing
First, we’ll check the gateway authentication server configuration, the highlighted lines were pushed form the AP’s
tunnel configuration.
Now we’ll get a laptop to connect to “school” SSID with staff1 user credentials and check ClearPass access tracker
Note that 192.168.1.242 is the IP address of the gateway-1 and 10.224.254.161 is the IP address of the AP.
27 | P a g e
And we also have the accounting tab, which indicates RADIUS accounting is working
Lastly, we need to test if CoA is working, click on the “change status” to terminate the session
28 | P a g e
Now looking at Aruba Central pages.
29 | P a g e
Clicking on the gateway symbol takes us to the gateway that is terminating the user traffic
Channel followed by "*" indicates channel selected due to unsupported configured channel.
"Spectrum" followed by "^" indicates Local Spectrum Override in effect.
Num APs:6
Num Associations:2
Flags: K = 802.11K Enabled; W = 802.11W Enabled; 3 = WPA3 BSS; O = Enhanced-open BSS with transition mode; o = Enhanced-open transition
mode open BSS; M = WPA3-SAE mixed mode BSS; E = Enhanced-open BSS without transition mode; m = Agile Multiband (MBO) BSS; c = MBO Cellular Data
Capable BSS; I = Imminent VAP Down; T = Individual TWT Enabled; t = Broadcast TWT Enabled
b4:5d:50:c6:82:4a#
30 | P a g e
7 RF Monitoring
Here we’ll just touch on some of the RF mgmt. info that are available in Central. To start with at the global level, you
can check the WiFi connectivity and then drill down on any specifics, like AI insights, associations, authentication ,
etc.
31 | P a g e
Next, we can check the usage summary
We can then go to the Site level and see some of the stats
32 | P a g e
Looking at 5GHz band
33 | P a g e
Next, we can have a look at the Live view, for that we’ll choose a specific AP.
34 | P a g e
35 | P a g e
Now you can click on go live to get real-time view of the RF counter for 15min.
36 | P a g e
8 Guest Access Configuration
Here we’ll start with AP configuration followed by ClearPass.
8.1 Guest Wireless Configuration
The Guest WLAN will be tunnelled to the gateways, for this scenario all the configuration will take place on the AP
group.
37 | P a g e
38 | P a g e
In the above we have also enabled MAC auth and RADIUS accounting. MAC auth is enabled because we want to also
enable MAC caching for the guest users.
39 | P a g e
We don’t need to do any configuration on the gateways as all the relevant configuration will be pushed to them,
which are:
- Authentication Servers and groups.
- L3 Captive Portal Authentication
- Pre-authentication user role
40 | P a g e
Lastly note that we have not use a publicly signed HTTPS server certificate for the controllers and hence the
redirection of a web page will issue a warning on the client’s web browser. In all deployment you need to have a
public cert for the controllers as well as ClearPass nodes.
41 | P a g e
Guest-guest-logon
42 | P a g e
And here are the enforcement profiles that are used here
43 | P a g e
We’ll look at the User Authentication with MAC caching service
44 | P a g e
The enforcement profiles
45 | P a g e
8.3 ClearPass Guest Portal Configuration
Here we’ll configure the portal pages.
Now we’ll create a guest user called cpguser with no expiration on the account.
46 | P a g e
Once created we’ll modify it to change the username and password
47 | P a g e
Next we’ll create a weblogin page, note that the page name will be in the redirection URL, also securelogin.hpe.com
will need to change to CN in the server certificate on Aruba controller.
48 | P a g e
49 | P a g e
You can test the page as well, when you’ll click on the launch a tab will open and you’ll see the captive portal note
the URL which in this case is https://victory.clearpass.info/guest/school.php?_browser=1
The “guest/school.php” is used in the URL redirection which we configured in MM
Now go to content manager and upload your terms and condition page.
50 | P a g e
We’ll have a look at the certificate, and we’ll see it is the default captive portal certificate which is on the controller.
We’ll accept this and carry on, but for all deployments you need to have a public server certificate for your
controllers. Once we accept the certificate, we’ll get redirected to the captive portal page on ClearPass
51 | P a g e
Before we login with our guest credentials, we’ll look at the MM dashboard and see the user is in guest-login role
with minimum access.
Then we’ll check the access tracker and see that we have a failed MAC authentication.
This is normal as this MAC address has not been seen before.
It should be noted that the redirection happens from the AP not the gateways
b4:5d:50:c6:82:4a# sh client
52 | P a g e
Client List
-----------
Name IP Address MAC Address OS ESSID Access Point Channel Type Role IPv6
Address Signal Speed (mbps)
---- ---------- ----------- -- ----- ------------ ------- ---- ---- ----------
-- ------ ------------
Number of Clients :0
Info timestamp :8460
b4:5d:50:c6:82:4a#
b4:5d:50:c6:82:4a#
b4:5d:50:c6:82:4a# sh client
Client List
-----------
Name IP Address MAC Address OS ESSID Access Point
Channel Type Role IPv6 Address Signal Speed (mbps)
---- ---------- ----------- -- ----- ------------
------- ---- ---- ------------ ------ ------------
a088b450c084 192.168.1.132 a0:88:b4:50:c0:84 Win 10 Schoo-Guest b4:5d:50:c6:82:4a
6 GN CP-Guest fe80::7d4a:2f07:955c:cd4f 54(good) 72(ok)
Number of Clients :1
Info timestamp :9155
b4:5d:50:c6:82:4a#
b4:5d:50:c6:82:4a# sh external-captive-portal
Name :CP-Guest
Server :victory.clearpass.info
Port :443
Url :/guest/school.php
Auth Text :
Redirect Url :http://www.arubanetworks.com
Server Fail Throuth :Disable
Disable Auto Whitelist :Enable
Use HTTPs :Yes
Server Offload :No
Prevent Frame Overlay :Disable
In Used :Yes
Redirect Mode :Yes
Switch IP :No
b4:5d:50:c6:82:4a#
Now when the user performs a successful the login (we are using username cpguser) process, they will be redirected
to the “redirect URL” that we specified.
53 | P a g e
Now let’s look at the Client dashboard and access tracker, note that the user role is now “guest”.
And the access tracker shows a successful authentication that matches with “GG User Authentication with MAC
Caching” policy.
54 | P a g e
Also note that one of the post authentication actions were to update the endpoint repository status for that MAC
address to be known.
Now because the status of this endpoint is known the next time, this client connects it will not be redirected to the
captive portal until its allotted time has expired. So now if we disconnect the client, we should see it will successfully
MAC auths. This uses RADIUS CoA. We can do that directly from the access tracker.
55 | P a g e
Looking at the details of that session
Here we can see the user in the gateway’s user table using tunnel forwarding mode and in guest user role.
Users
-----
IP MAC Name Role Age(d:h:m) Auth VPN link
Connected To Roaming Essid/Bssid/Phy Profile Forward
mode Type Host Name User Type
---------- ------------ ------ ---- ---------- ---- -------- -
----------------- ------- --------------- ------- --------
---- ---- --------- ---------
192.168.1.132 a0:88:b4:50:c0:84 a088b450c084 guest 00:00:03 MAC
b4:5d:50:c6:82:4a Wireless Schoo-Guest Schoo-Guest_#1615938135060_41#_ dtunnel
Win 10 WIRELESS
56 | P a g e