Legal Disclaimer: The resource assets in this website may include abbreviated and/or legacy terminology for HPE Aruba Networking products. See www.arubanetworks.com for current and complete HPE Aruba Networking product lines and names.
Configuring Wired Networks on IAPs
The wired ports of an IAP allow third-party devices such as VoIP Voice over IP. VoIP allows transmission of voice and multimedia content over an IP network. phones or printers (which support only wired port connections) to connect to the wireless network. You can also configure an ACL Access Control List. ACL is a common way of restricting certain types of traffic on a physical port. for additional security on the Ethernet Ethernet is a network protocol for data transmission over LAN. downlink.
To configure wired port profiles on IAP, complete the following steps:
- In the WebUI, set the filter to a group containing at least one AP.
The dashboard context for the group is displayed.
- Under , click > .
A list of APs is displayed in the view.
- Click the icon.
The tabs to configure the APs are displayed.
- Click .
- Click the tab.
The Interfaces page is displayed.
- Click the accordion.
- To create a new wired port profile, click .
The Create a New Network page is displayed.
Complete the configuration for each of the tabs in the Create a New Network page as described in the below sections:
Configuring General Network Profile Settings
To configure general network profile settings, complete the following steps in the tab:
- Under , enter the following information:
- —Enter a name.
- —Select ports form the drop-down list.
- Under section, configure the following parameters:
- —Select the appropriate value from the Speed and Duplex drop-down list. Contact your network administrator if you need to assign speed and duplex parameters.
- —Turn on the toggle switch to enable port bonding.
- —Turn on the toggle switch to enable PoE Power over Ethernet. PoE is a technology for wired Ethernet LANs to carry electric power required for the device in the data cables. The IEEE 802.3af PoE standard provides up to 15.4 W of power on each port..
- —The indicates if the port is up or down.
- —Turn on the toggle switch to ensure that all DNS Domain Name System. A DNS server functions as a phone book for the intranet and Internet users. It converts human-readable computer host names into IP addresses and IP addresses into host names. It stores several records for a domain name such as an address 'A' record, name server (NS), and mail exchanger (MX) records. The Address 'A' record is the most important record that is stored in a DNS server, because it provides the required IP address for a network peripheral or element. requests to non-corporate domains on this wired port network are sent to OpenDNS.
- —Turn on the toggle switch to configure uplink on this wired port profile. If the toggle switch is turned on and this network profile is assigned to a specific port, the port is enabled as an uplink port.
- —Turn on the toggle switch to enable STP Spanning Tree Protocol. STP is a network protocol that builds a logical loop-free topology for Ethernet networks. on the wired port profile. STP ensures that there are no loops in any bridged Ethernet network and operates on all downlink ports, regardless of forwarding mode. STP does not operate on uplink ports and is supported only on IAPs with three or more ports. By default, STP is disabled on wired port profiles.
- Loop Protection—Turn on the toggle switch to enable loop protection on the ports of an AP. By default, loop protection is disabled.
- Loop Detection Interval—Provides the time interval in seconds, to send loop detection packets on the ports of an AP. This option appears only when Loop Protection is enabled.
Storm Control Broadcast—Turn on the toggle switch to enable this option. If the AP detects a loop on one of its Ethernet port, it shuts down the Ethernet port. This prevents the AP from receiving or sending any frames.
Storm Control Threshold—Specifies the broadcast packets per second on each Ethernet port of an AP before the Ethernet port is shutdown.
Auto Recovery—Turn on the toggle switch to enable automatic recovery of the port in the AP, which is shutdown because of loop protection. After the automatic recovery, if the loop re-occurs, then the port is shut down again.
Auto Recovery Interval—Specifies the broadcast packets per second on each Ethernet port of an AP before the Ethernet port is shutdown.
- —Enter the time duration after which an inactive user needs to be disabled from the network. The user must undergo the authentication process to re-join the network.
- —Turn on the toggle switch to enable, to support 802.3az Energy Efficient Ethernet (EEE) standard on the device. This option allows the device to consume less power during periods of low data activity. This setting can be enabled for provisioned APs or AP groups through the wired port network. If this feature is enabled for an AP group, APs in the group that do not support 802.3.az ignore this setting. This option is available for IAPs that support a minimum of Aruba Instant 8.4.0.0 firmware version.
- —Turn on the toggle switch to disable intra VLAN Virtual Local Area Network. In computer networking, a single Layer 2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them through one or more routers; such a domain is referred to as a Virtual Local Area Network, Virtual LAN, or VLAN. traffic. It enables the client isolation and disables all peer-to-peer communication. Client isolation disables inter-client communication by allowing only client to gateway traffic from clients to flow in the network. All other traffic from the client that is not destined to the gateway or configured servers will not be forwarded by the Instant AP. This feature enhances the security of the network and protects it from vulnerabilities.
- Click .
The VLANs details page is displayed.
Configuring VLAN Network Profile Settings
To configure VLAN settings, complete the following steps in the tab:
- —Specify any of the following modes:
- Access—Select this mode to allow the port to carry a single VLAN specified as the native VLAN. If the mode is selected, perform one of the following options:
- If the is set to , proceed to step 6.
- If the is set to , specify a value for to indicate the VLAN carried by the port in the mode.
- Trunk—Select this mode to allow the port to carry packets for multiple VLANs specified as allowed VLANs. If the mode is selected:
- Specify the , enter a list of comma separated digits or ranges, for example 1, 2, 5, or 1-4, or all. The Allowed VLAN refers to the VLANs carried by the port in Access mode.
- Access—Select this mode to allow the port to carry a single VLAN specified as the native VLAN. If the mode is selected, perform one of the following options:
- —specify any of the following values:
- —Select this option to allow the virtual controller to assign IP addresses to the wired clients. When the virtual controller assignment is used, the source IP address is translated for all client traffic that goes through this interface. The virtual controller can also assign a guest VLAN to a wired client. In the section, select when the client VLAN must be assigned to the native VLAN on the network. Select to customize the client VLAN assignment to a specific VLAN, or a range of VLANs. Click the section to view all the named VLANs mapped to VLAN ID. Click and enter the VLAN Name and VLAN ID that is required to be mapped. Clicking populates the named VLAN in the VLAN Name to VLAN ID Mapping table.
- —Select this option to allow the clients to receive an IP address from the network to which the Virtual Controller is connected. On selecting this option, the button to create a VLAN is displayed. Create a new VLAN if required.
-
Client VLAN Assignment—select any of the following values:
-
Default—By default, it is selected.
-
Custom—Select this option to customize the VLAN settings. From the Native VLAN drop-down list, select the scope.
-
- Click .
The Security details page is displayed.
Configuring Security Settings
To configure security-specific settings, complete the following steps in the tab:
- On the pane, select the following security options as per your requirement:
- —Set the button to enable on the Security Level sliding bar. Configure the basic parameters such as the authentication server, and MAC Media Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. Authentication. Select any of the following options for authentication server:
- Cloud Auth—On selecting this option, an external RADIUS Remote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources. server must be configured to authenticate the users. For information on configuring an external server, see Configuring External Authentication Servers for IAPs
- —If an internal server is selected, add the clients that are required to authenticate with the internal RADIUS server. Click the Manage Users link to add the users.
- —To enable MAC authentication, set the button on the sliding bar. The MAC authentication is disabled by default.
- —Set the sliding button to enable visitors security level authentication. For more information on configuring security on visitors level, see Configuring Wired Networks for Guest Users on IAPs.
- —Set the toggle button to enable, to set security for open network.
- —Set the button to enable on the Security Level sliding bar. Configure the basic parameters such as the authentication server, and MAC Media Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. Authentication. Select any of the following options for authentication server:
- Enable the option to connect uplink and downlink to a trusted port only.
- In the field, perform one of the following steps:
- —To use an internal server, select Internal Server and add the clients that are required to authenticate with the internal RADIUS Server. Click to add the users. To add a new server, click . For information on configuring external servers, see Configuring External Authentication Servers for IAPs.
- —To add another server for authentication, configure another authentication server.
- —Set the toggle button to enable, to attempt 802.1X 802.1X is an IEEE standard for port-based network access control designed to enhance 802.11 WLAN security. 802.1X provides an authentication framework that allows a user to be authenticated by a central authority. authentication is attempted when the MAC authentication fails.
- Under the section, configure the following options:
- —Set the toggle button to enable, to configure client IP address as calling station ID.
- —Select one of the following options:
- —Uses the VC ID as the called station ID.
- —Uses the host name of the IAP as the called station ID.
- —Uses the VLAN ID of as the called station ID.
- —Uses the IP address of the IAP as the called station ID.
- —Uses the MAC address of the IAP as the called station ID.
The detail can be configured even if the is set to disabled.
- Reauth Interval—Specify the interval at which all associated and authenticated clients must be re-authenticated.
- Click .
The Access pane is displayed.
Configuring Access Settings
To configure access-specific settings, complete the following steps:
- In the tab, enable the toggle switch to allow downloading of pre-existing user roles. For more information, see Configuring Downloadable Roles.
- The feature is optional. The feature is available only for networks that include APs that run a minimum of Aruba Instant 8.4.0.0 firmware version with a minimum of ClearPass ClearPass is an access management system for creating and enforcing policies across a network to all devices and applications. The ClearPass integrated platform includes applications such as Policy Manager, Guest, Onboard, OnGuard, Insight, Profile, QuickConnect, and so on. server version 6.7.8.
- At least one radius server must be configured to apply the feature. For more information on configuring radius server, see Authentication Servers for IAPs.
- Click the action corresponding to the server.
The page is displayed.
The page displays the radius server name. The field is non-editable.
- Enter the CPPM username along with the CPPM authentication credentials for the radius server.
- Click .
- Under , configure the following access rule parameters:
- Select any of the following types of access control:
- —Allows the users to obtain access based on the roles assigned to them.
- —Allows the users to obtain unrestricted access on the port.
- —Allows the users to be authenticated based on access rules specified for a network.
- If the access control is selected:
- Under , select an existing role for which you want to apply the access rules, or click and add the required role. To add a new access rule, click under .
The default role with the same name as the network is automatically defined for each network. The default roles cannot be modified or deleted.
- Configure role assignment rules. To add a new role assignment rule, click under . Under :
- Under , select an existing role for which you want to apply the access rules, or click and add the required role. To add a new access rule, click under .
- Select an attribute.
- Specify an operator condition.
- Enter the string.
- Select a role.
- Click .
- Select any of the following types of access control:
- Click to create the wired port profile successfully.
Configuring Network Port Profile Assignment
To map the wired port profile to Ethernet ports, complete the following steps:
- In the WebUI, set the filter to a group containing at least one AP.
The dashboard context for the group is displayed.
- Under , click > .
A list of APs is displayed in the view.
- Click the icon.
The tabs to configure the APs are displayed.
- Click .
- Click the tab.
The Interfaces page is displayed.
- Click the accordion.
The Wired Port Profiles table is displayed.
- Select a port profile in the table , click the edit icon.
The Networks page is displayed.
- In the General section, assign the wired port profiles to Ethernet ports or USB Universal Serial Bus. USB is a connection standard that offers a common interface for communication between the external devices and a computer. USB is the most common port used in the client devices. port form the Ports drop-down list.
- Click .
Viewing Wired Port Profile Summary
In the tab, the page displays all the settings configured in the , , , and tabs. Click Save Settings to complete the network profile creation and save the settings.
