Legal Disclaimer: The resource assets in this website may include abbreviated and/or legacy terminology for HPE Aruba Networking products. See www.arubanetworks.com for current and complete HPE Aruba Networking product lines and names.
Allowlisting Managed Devices on VPN Concentrator
In a hub and spoke VPN Virtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. topology, where remote branches connect to the VPN Virtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. Concentrator, newer branches are added in a staggered way. Each time a managed device is added to a branch, the branch information needs to be populated in the VPN Virtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. Concentrator to allowlist the branch device. With large-scale deployments, this method is error prone and very cumbersome. The automatic allowlisting feature enables automating the process of allowlisting the branch devices to avoid extra configuration for each device at the headend.
For automatic allowlisting of managed devices in the VPN Virtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. Concentrator, the authentication code method is used. In this method, the allowlisting of the device is achieved through the authentication token.
Configuring Passcode Based Allowlisting
You must configure the same VPN Virtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. peer authentication passcode on the managed devices as well as the VPN Virtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. Concentrator to allowlist the device in the database.
The following procedure describes how to allowlist a managed device automatically on a VPN Virtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. Concentrator:
- In the node hierarchy, navigate to .
- Expand the accordion.
- Enable the toggle switch.
- In , select .
- In , select .
- In the field, enter the same passphrase that is configured on the managed device for automatic allowlisting.
- Select an encryption method from the drop-down list.
- For encryption method, enter the and details.
- Select an ACL Access Control List. ACL is a common way of restricting certain types of traffic on a physical port. type from the Route ACL Access Control List. ACL is a common way of restricting certain types of traffic on a physical port. drop-down list.
- Select an ACL Access Control List. ACL is a common way of restricting certain types of traffic on a physical port. type from the Session ACL Access Control List. ACL is a common way of restricting certain types of traffic on a physical port. drop-down list.
- In Branch Pool, enter the branch pool details if you have overlapping uplink IP address across branches.
- Click .
The following CLI Command-Line Interface. A console interface with a command line shell that allows users to execute text input as commands and convert these commands to appropriate functions. command configures the authenticate code on the Mobility Conductor which is used for automatic allowlisting of managed devices on a VPN Virtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. concentrator where the same authenticate code is configured.
(host)[mynode] (config) #vpn-peer pass-code Aruba123 cert-auth factory-cert
Configuring MAC Address Based Allowlisting
The following procedure describes how to allowlist a managed device manually on a VPN Virtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. Concentrator:
- In the node hierarchy, navigate to .
- Expand the accordion.
- Enable the toggle switch.
- In , select .
- In , select .
- Click from the table to add the MAC Media Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. address of the managed devices:
- —Enter the MAC Media Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. address of the primary VPN Virtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. Concentrator.
- —Specify the encryption method. It can be or
- —Select the CA Certificate Authority or Certification Authority. Entity in a public key infrastructure system that issues certificates to clients. A certificate signing request received by the CA is converted into a certificate when the CA adds a signature generated with a private key. See digital certificate. certificate for the custom certificate.
- —Select the server certificate for the custom certificate.
- Click .
- Click .
- In the window, select the check-box and click .