Small Campus Shared Profiles
Network infrastructure is configured using HPE Aruba Central’s Element Profile model. Instead of managing device settings in a monolithic, CLI-oriented configuration file, settings are defined in subject-matter specific profiles for easy reference. Multiple profiles can be created for a particular subject for flexibility in applying different settings based on network role or location. Each profile can be applied globally to assign a standardized configuration at large scale, applied to a site to standardize configuration for a specific location, or applied to a specific device to handle exceptions or unique requirements.
This model reduces overall administrative overhead and facilitates standardized configuration, which helps network operators adhere to best practices and speed up the troubleshooting process. General information about creation and management of element profiles is described in the Central Configuration Model guide.
This chapter describes the configuration of element profiles that are assigned to both wired switches and wireless access points for the small campus deployment. The profiles assign device hostnames, administrative credentials, and the servers implemented to authenticate device administrators, network users, and devices.
Table of contents
Element Profile Summary
The table below summarizes the shared element profiles defined in this chapter and their scope of application.
| Profile Name | Central Profile Path | Type/Scope | Device Function | Primary Purpose |
|---|---|---|---|---|
| [ No Assigned Name ] | System > System Information | Device | Set device hostnames and descriptions. | |
| SC-ADMIN | System > User Administration | Site | - Access Switch - Campus Access Point | Set local admin credentials for switches and APs. |
| ADMIN-AUTH-SERVER-1 | Security > Authentication Server | Global | - Access Switch - Campus Access Point | Define individual TACACS+ servers used for device administration, and RADIUS servers used to authenticate and authorize network users and devices. |
| ADMIN-AUTH-SERVER-2 | ||||
| USER-AUTH-SERVER-1 | ||||
| USER-AUTH-SERVER-2 | ||||
| ADMIN-AUTH-SERVERS | Security > Authentication Server Group | Global | - Access Switch - Campus Access Point | Assign individual TACACS+ and RADIUS servers to groups for easier reference in other configuration. |
| USER-AUTH-SERVERS | ||||
| SYSTEM-ADMIN-OPTIONS | Security > System Administration | Global | - Access Switch - Campus Access Point | Define RADIUS server connectivity (CPPM). |
Entering Configuration Mode
In the upper right corner of the Central web application, click the Configuration gear icon.

Several Central contexts do not allow direct navigation into the configuration context, including Central’s Menu context that provides access to Central’s Audit Trail. The Audit Trail is often used in the configuration process, as it provides logs on profile configuration changes and that status of configuration pushes to devices. After selecting Central’s Menu context, the Configuration gear is not available for selection.

To return to the Configuration context after navigating to a context that does not display the Configuration gear icon, first click on the Home button in the upper left of the Central web application, and then click on the Configuration gear.

The following procedures assume the reader is in the Configuration context and does not explicitly include steps for entering the configuration context.
Assign Device Hostnames
Assign hostnames to devices to easily identify them for monitoring and configuration purposes. Consider using a standardized naming convention that makes it easy to identify the location and role of a device.
The table below summarizes the device names used in this example topology:
| Device Name | Location in Network |
|---|---|
| SC-AG1 | Small Campus - Aggregation VSF switch stack (L2 collapsed core of network) |
| SC-AG1-AC1 | Small Campus - Access VSF switch stack 1, connected to SC-AG1 |
| SC-AG1-AC2 | Small Campus - Access VSF switch stack 2, connected to SC-AG1 |
| SC-AC1-AP1 | Small Campus - Access point 1, connected to SC-AG1-AC1 |
| SC-AC1-AP2 | Small Campus - Access point 2, connected to SC-AG1-AC1 |
| SC-AC2-AP3 | Small Campus - Access point 3, connected to SC-AG1-AC2 |
| SC-AC2-AP4 | Small Campus - Access point 4, connected to SC-AG1-AC2 |
Devices hostnames are assigned in the System Information profile scoped to an individual device, as hostnames are unique per device. The following procedure details assigning hostnames. The same procedure is used for all device types.
Step 1 In the left configuration menu, click Devices.

Step 2 In the Search box, enter the serial number or MAC address of a device, hit return, and then click on the name of the device.

Note: By default, switches are assigned their model series number as a name, and each access point is assigned its unique MAC address. When searching for a VSF stack, you must enter the serial number or MAC address of the conductor. When auto-stacking with the LED Mode button, the switch that had its LED Mode button pressed is selected is the conductor.
Step 3 On the System card, click System Information.

Step 4 To edit the System Information profile, click anywhere in the row that contains dashes.

Note: The row displayed is an empty System Information profile.
Step 5 Enter a Hostname and System Description, then click Update.

Step 6 A popup dialogue box confirms the changes were successful. Review the updated System Information profile.


Note: If the new profile information does not appear, refresh the browser. Note the additional information presented regarding the assigned scope, device function, and inheritance. When a profile is assigned at a device level, the assigned scope appears as Central’s internal device ID.
Step 7 Repeat steps 1 through 6 for each device.
Note: Automation of hostname assignment can be performed using the HPE Aruba Networking Central API.
Assign Device Administrators
Assign the Local Admin Password
The local admin password should be configured consistently across an organization. In this small campus example, a User Administration profile is applied to the small campus site for all device functions (aggregation switches, access switches, and campus access points). A larger organization could apply the profile to the Global scope to ensure consistency across all sites.
The following procedure provides a complete set of steps needed to create a new User Administration profile and assign both device functions and a scope. Additional profiles used to build the small campus solution omit this detailed list of steps to enhance readability. The path to the profile’s location, the profile’s device and scope assignment, a summary of profile values, and a screenshot of the completed profile are provided for all profiles used in this guide.
Profile Path: System > User Administration Device Functions: Aggregation Switch, Access Switch, Campus Access Point Scope: Site: SMALL-CAMPUS-SITE
Step 1 On the left-hand Configuration menu, click Library.

Step 2 On the System card, click Manage.

Step 3 On the User Administration card, click Manage.

Step 4 Click Create Profile.

Step 5 Enter the following values and click Create:
- Name: SC-ADMIN
- Username: admin
- Password: < password >
- Retype Password: < password >
- Role: Admin

Step 6 Hover over the new profile and click the ••• context menu.

Step 7 On the context menu, select Assign.

Step 8 Under Device Function, check Access Switch, Aggregation Switch, and Campus Access Point.

Step 9 To the right of the Scopes heading, click the plus sign (+).
Step 10 On the Add Scope page, select the following values and click Add
- Scope Level: Sites
- Assign to Scope: SMALL-CAMPUS-SITE

Step 11 Click Assign.

Configure TACACS+ Authentication
A small, standalone campus may not require additional authentication methods. When a small campus is part of a larger organization, it is best practice to limit device access using a dynamic authentication protocol. TACACS+ provides authentication and granular authorization controls. Depending on the size and standards of an organization, the profile can be applied globally or to a site collection.
Create TACACS+ Authentication Server Profiles
Create an authentication server profile for each TACACS+ server in the environment. Typically, a minimum of two servers are defined, a primary and a backup. An individual profile is created for each server.
Profile Path: Security > Authentication Server
Device Functions: Aggregation Switch, Access Switch, Campus Access Point
Scope: Global
Configure the following non-default values for each server profile:
- Name: < Server Name >
- Description: < Server Description >
- Server Type: TACACS
- IP Address/FQDN: < IP or DNS Name of Server >
- Shared Secret: < Server Shared Secret >
- Retype Shared Secret: < Server Shared Secret >
- Device Specific Parameters: Switch
- AOS CX Specific Parameters > Auth Type: < Appropriate Authentication Method >

Note: CPPM supports CHAP and PAP. CHAP uses a challenge-response mechanism that is more secure than PAP. PAP is compatible with a broader set of TACACS+ servers.
Create TACACS+ Authentication Server Group
An Authentication Server Group contains the set of TACACS+ servers defined above. This profile will be referenced when creating the System Administration profile.
Profile Path: Security > Authentication Server Group
Device Functions: Aggregation Switch, Access Switch, Campus Access Point
Scope: Global
Configure the following non-default values for two different servers (primary and backup):
- Name: ADMIN-AUTH-SERVERS
- Authentication Servers: < Select primary and backup TACACS+ Authentication Server profiles >

Configure Network Infrastructure Administration Options
The System Administration profile defines access methods (console, SSH, and web) and authentication methods (local, RADIUS, TACACS) for network infrastructure. Login retries are limited and a delay is set to mitigate brute force login attempts.
Profile Path: System > System Administration
Device Functions: Aggregation Switch, Access Switch, Campus Access Point
Scope: Global
Configure the following non-default values:
- Name: SYSTEM-ADMIN-OPTIONS
- Description: Configure console and SSH access with TACACS
- Login Retries: 10
- Retry Delay Seconds: 300
- Authentication Type: TACACS+
- Check Fallback to Local Authentication
- Authentication Server Group: ADMIN-AUTH-SERVERS

Remove Imported System Administration Profile
When a switch is onboarded to Central, it auto-imports values associated with the System Administration profile and assigns them to a device-level configuration profile. The device-level profile blocks inheriting the profile values configured above, which were assigned a global scope. For each switch, the device-level profile must be deleted to allow inheriting the above profile settings.
Note: APs do not automatically import pre-existing values into a device level System Administration profile, so they do not require the following steps..
Step 1 On the left-hand configuration menu, click Devices, then enter a term in the Search field to limit the displayed switches, and then click on a switch name.

Step 2 On the System card, click Manage.

Step 3 On the System Administration card, click Manage.

Step 4 Hover over the default imported System Administration profile name, then click the trash can icon.

Note: The default profile name uses profile- as a prefix followed by the switch’s unique serial number.
Step 5 Verify the System Administration profile created above is inherited.

Step 6 Repeat steps 1-5 to delete the auto-imported System Administration profile on each switch.
Configure User Authentication Services
RADIUS servers provide 802.1X and MAC-based authentication services to switches and access points for authenticating users and devices.
Configure RADIUS Server Profiles
Create an Authentication Server profile for each RADIUS server in the environment. Typically two or more RADIUS servers are configured for redundancy. The following RADIUS servers are applied to the Global scope and inherited by all access switches and access points.
Profile Path: Security > Authentication Server
Device Functions: Access Switch, Campus Access Point
Scope: Global
Configure the following non-default values for two different servers (primary and backup):
- Name: < Server Name >
- Description: < Server Description >
- Auth Server Mode: RADIUS with CoA (Change of Authorization)
- IP Address/FQDN: < IP or DNS Name of Server >
- Shared Secret: < Server Shared Secret >
- Retype Shared Secret: < Server Shared Secret >

Configure RADIUS Server Group
Create an Authentication Server Group profile that contains the set of the RADIUS servers defined above. This group is referenced, when configuring authentication services in other profiles. The RADIUS server group profile is applied to the Global scope and inherited by all access switches and access points.
Profile Path: Security > Authentication Server Group
Device Functions: Access Switch, Campus Access Point
Scope: Global
Configure the following non-default values:
- Name: USER-AUTH-SERVERS
- Authentication Servers: < Select primary and backup authentication server profiles >
