Named-MPSK v0.2
Named-MPSK v0.2
1|Page
2 Personal Wireless Network with Aruba Central
Personal Wireless Networks (PWN) are groups of user-owned Wi-Fi devices that connect and operate together in a
VLAN, enabling communication within that network. It’s essential to ensure that only devices within the designated
group can interact in one another, along with an added ability for the device owners to permit Multicast DNS (mDNS)
and Simple Service Discovery Protocol (SSDP) based services to be shared with their friends.
In this technote I’ll be demonstrating PWN solution, using Multi Pre-Shared Key (MPSK) on AOS10 APs and CloudAuth to
provide user role-based policies for segmentation without any dependency on an identity store. There are two parts to
this solution, one is the automating the operation workflow for user device registration and the second is the access
policy part to provide segmentation.
2.2 Assumptions
• Aruba AP is added to the Aruba Central account and has a valid subscription.
• Aruba AP is visible and online in Aruba Central.
• Deny Intra VLAN Traffic is not enabled as it is mutually exclusive with PWN
2|Page
3 CloudAuth and Personal Wireless networks
PWN with Aruba Central is a solution that uses several features to provide the outcome and those features include
• MPSK with AOS10 APs
• Cloud Auth
• AirGroup
• User roles-based policies for North-south traffic
• VXLAN and Group Based Policy (GBP) for East-West Traffic
First you need to configure MPSK to be the authentication mode for a WLAN. Note that MPSK and MAC authentication
are mutually exclusive and AOS 10.4 and above is needed to support the MPSK feature.
The unique PSKs are assigned based on two methods
1. Admin Managed MPSK - This is also known as Named MPSK, in which PSKs are auto-generated when the
administrator creates a named MPSK entry that can be shared with one or more users or use it to configure
multiple devices without dependency on identity store. This is for the use cases where devices that may need to
connect to MPSK network do not have any user identity associated
2. User Managed MPSK - These PSKs are specific to the user in the identity store and are auto-generated when the
user signs in to the MPSK portal with their credentials. Then the users can connect multiple devices with this
MPSK. So, there is a dependency on identity store.
Note that an identity provider should be configured before using the user-managed MPSK. Only the admin-managed
MPSK (named MPSK) will work without configuring the identity provider.
We’ll be covering Admin Managed MPSK here.
3|Page
The important thing here is that we have selected MPSK AES and Personal Wireless Network (PWN). By selecting PWN
Aruba Central’s Cloud auth will auto generate a Personal Area Network id (PAN-id) for each user community and shares
it with the APs. Then devices with the same PAN-id can communicate together while devices with different PAN-id
cannot have any access to one another. This is how the micro segmentation is achieved.
Using PWN, user’s devices can roam from one AP to another while maintaining access to their devices with no risk of
access of their devices to other end users. This is done using a PAN ID that is embedded into network traffic and restricts
traffic to flow only between devices that belong to the same user.
4|Page
Now that it is saved, we have our MPSK WLAN as shown below.
Next, we’ll also configure a new user-role “Student-MPSK” that we’ll be using for our PWN based MPSK wireless
network.
5|Page
Fron the drop down select the options.
Here we have used [email protected] and chosen the Student-MPSK client role that we had previously created in our
AOS10 group.
6|Page
We’ll create the second user “[email protected]” as well.
Note that you can use CSV files to upload bulk info and export the named MPSK info as well. As clients connect to the
PWN based MPSK their authentication sessions are listed here.
So now we have 3x clients connected that are all from [email protected] and [email protected] as shown above.
7|Page
4 PWN Testing
We have connected two APs in the AOS10 group that are configured with PWN.
We now have 3x connected clients as well, in which 2x devices are from Strunet-1 and 1x device is from student-2. Note
that the clients are distributed on both APs.
Client List
-----------
Name IP Address MAC Address OS ESSID Access Point
Channel Type Role IPv6 Address Signal(dB) Speed (Mbps)
---- ---------- ----------- -- ----- ------------ ---
---- ---- ---- ------------ ---------- ------------
[email protected] 10.10.22.20 ce:55:81:30:f8:3c Win 10 test-mpsk AP-605H-5d:6b
100E AC Student-MPSK -- 43(good) 780(good)
[email protected] 10.10.22.31 2c:1f:23:d0:2f:48 Apple test-mpsk AP-605H-5d:6b
100+ AN Student-MPSK -- 46(good) 135(good)
Number of Clients :2
Info timestamp :5959
AP-605H-5d:6b#
The phy column shows client's operational capabilities for current association
Flags: H: Hotspot(802.11u) client, K: 802.11K client, M: Mu beam formee, R: 802.11R client, W: WMM client, w:
802.11w client, V: 802.11v BSS trans capable, P: Punctured preamble, U: HE UL Mu-mimo, O: OWE client, S: SAE
client, E: Enterprise client, m: Agile Multiband client, C: Cellular Data Capable - network available, c:
Cellular Data Capable - network unavailable, T: Individual TWT client, t: Broadcast TWT client
PHY Details: HT : High throughput; 20: 20MHz; 40: 40MHz; t: turbo-rates (256-QAM)
8|Page
VHT : Very High throughput; 80: 80MHz; 160: 160MHz; 80p80: 80MHz + 80MHz
HE : High Efficiency; 80: 80MHz; 160: 160MHz; 80p80: 80MHz + 80MHz
EHT : Extremely High throughput; 80: 80MHz; 160: 160MHz; 80p80: 80MHz + 80MHz; 320: 320MHz
<n>ss: <n> spatial streams
MLO Bands: Indicates the band of each link. * indicates the band where the association occurred.
Association Table
-----------------
Name bssid mac auth assoc aid l-int essid vlan-id phy_cap
phy assoc. time num assoc Flags DataReady UAC user-panid mlo-bands
---- ----- --- ---- ----- --- ----- ----- ------- -------
--- ----------- --------- ----- --------- --- ---------- ---------
AP-605H-5d:6b 50:e4:e0:14:0e:51 ce:55:81:30:f8:3c y y 2 250 test-mpsk 22 5GHz-VHT-
80sgi-2ss-KV 5GHz-VHT-80sgi-2ss 15m:13s 1 WV Yes 0.0.0.0 4347809 -
AP-605H-5d:6b 50:e4:e0:14:0e:51 2c:1f:23:d0:2f:48 y y 1 20 test-mpsk 22 5GHz-HT-40sgi-
1ss-R 5GHz-HT-40sgi-1ss 1h:10m:23s 1 WR Yes 0.0.0.0 13984993 -
Num Clients:2
AP-605H-5d:6b#
Here you’ll see the mpskcache that Aruba Central sent to the APs.
AP-605H-5d:6b# sh ap mpskcache
AP-605H-5d:6b#
AP-605H-5d:6b#
AP-605H-5d:6b# sh ap mpskcache ce:55:81:30:f8:3c
9|Page
Expire :6m:19s
Vlanhow :254
Rolehow :0
ACL Rule Index :229374
User panid :4347809
Session timeout :28800
AP-605H-5d:6b#
Now I’ll check the other AP (AP-515) and we see that the PAN id is the same since they are the devices of the same user
([email protected])
AP-515-2b:30# sh clients
Client List
-----------
Name IP Address MAC Address OS ESSID Access Point
Channel Type Role IPv6 Address Signal(dB) Speed (Mbps)
---- ---------- ----------- -- ----- ------------ ----
--- ---- ---- ------------ ---------- ------------
[email protected] 10.10.22.30 5c:51:4f:e6:a9:83 Win 10 test-mpsk AP-515-2b:30 149E
AC Student-MPSK -- 49(good) 702(good)
Number of Clients :1
Info timestamp :2602
AP-515-2b:30#
The breakdown of the clients are as follows and all are on the same VLAN/IP subnet.
Now we’ll ping between the student-1’s devices, note that they are associated to different APs and we find that the ping
is successful.
10 | P a g e
Because the student-1’s devices are on different APs, under the hood, the APs will make a tunnel encapsulation for this
traffic.
Here is the datapath session table when we were pinging between 10.10.22.30 and .31
AP-605H-5d:6b# sh datapath session | incl 10.10.22.31
------------------------------
Flags: A - Application Firewall Inspect
C - client, D - deny, E - Media Deep Inspect
F - fast age, G - media signal, H - high prio
I - Deep inspect, L - ALG session, M - mirror, N - dest NAT
O - Session is programmed through SDN/Openflow controller
P - set prio, R - redirect, S - src NAT,
T - set ToS, U - Locally destined, V - VOIP
X - Http/https redirect for dpi denied session
Y - no syn
a - rtp analysis, h - Https redirect error page
i - in offload flow, m - media mon
p - Session is marked as permanent
s - media signal
d - DPI cache hit
f - FIB init pending in session
c - MSCS or SCS session
RAP Flags: 0 - Q0, 1 - Q1, 2 - Q2, r - redirect to conductor
t - time based, i - in flow, l - local redirect
Flow Offload Denylist Flags: O - Openflow, E - Default, U - User os unknown, T - Tunnel
R - L3 route
AP-605H-5d:6b#
Here is the pcap which was done on the switch to see the ICMP ping traffic between the two devices for student-1 that
are on different AP. Note that there is, indeed an UDP encapsulation between the two APs the port that is used is
VXLAN. Now when looked closer you’ll see that the VNI=0 but it also carries group Policy ID that is automatically
generated and assigned.
11 | P a g e
And this is the return traffic and note that the group policy Id are the same and hence the traffic is allowed.
Next, we’ll ping between student-1 and student-2’s devices that are on the same AP.
12 | P a g e
And as expected they pings fail as the devices have different PAN-id and drop happens on the destination AP.
Here we are looking for D flag (indicating drops) between 10.10.22.20 and 10.10.22.31. Note that PAN-id will not
change for the users even though one might change the MPSK.
AP-605H-5d:6b#
This is simple yet powerful way to enforce Microsegmentation for this specific use case.
13 | P a g e