SlideShare a Scribd company logo
1 of 62
Download to read offline
Guest Access with ArubaOS
Version 1.0
www.arubanetworks.com
1344 Crossman Avenue
Sunnyvale, California 94089
Phone: 408.227.4500
Fax 408.227.4550
Aruba Networks, Inc. 2
Guest Access with ArubaOS Application Note
Copyright
© 2012 Aruba Networks, Inc. AirWave®, Aruba Networks®, Aruba Mobility Management System®, Bluescanner, For Wireless That
Works®, Mobile Edge Architecture®, People Move. Networks Must Follow®, RFprotect®, The All Wireless Workplace Is Now Open For
Business, Green Island, and The Mobile Edge Company® are trademarks of Aruba Networks, Inc. All rights reserved. Aruba Networks
reserves the right to change, modify, transfer, or otherwise revise this publication and the product specifications without notice. While
Aruba uses commercially reasonable efforts to ensure the accuracy of the specifications contained in this document, Aruba will assume
no responsibility for any errors or omissions.
Open Source Code
Certain Aruba products include Open Source software code developed by third parties, including software code subject to the GNU
General Public License (“GPL”), GNU Lesser General Public License (“LGPL”), or other Open Source Licenses. The Open Source code
used can be found at this site:
http://www.arubanetworks.com/open_source
Legal Notice
ARUBA DISCLAIMS ANY AND ALL OTHER REPRESENTATIONS AND WARRANTIES, WEATHER EXPRESS, IMPLIED, OR
STATUTORY, INCLUDING WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE,
NONINFRINGEMENT, ACCURACY AND QUET ENJOYMENT. IN NO EVENT SHALL THE AGGREGATE LIABILITY OF ARUBA
EXCEED THE AMOUNTS ACUTALLY PAID TO ARUBA UNDER ANY APPLICABLE WRITTEN AGREEMENT OR FOR ARUBA
PRODUCTS OR SERVICES PURSHASED DIRECTLY FROM ARUBA, WHICHEVER IS LESS.
Warning and Disclaimer
This guide is designed to provide information about wireless networking, which includes Aruba Network products. Though Aruba uses
commercially reasonable efforts to ensure the accuracy of the specifications contained in this document, this guide and the information in
it is provided on an “as is” basis. Aruba assumes no liability or responsibility for any errors or omissions.
ARUBA DISCLAIMS ANY AND ALL OTHER REPRESENTATIONS AND WARRANTIES, WHETHER EXPRESSED, IMPLIED, OR
STATUTORY, INCLUDING WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE,
NONINFRINGEMENT, ACCURACY, AND QUIET ENJOYMENT. IN NO EVENT SHALL THE AGGREGATE LIABILITY OF ARUBA
EXCEED THE AMOUNTS ACTUALLY PAID TO ARUBA UNDER ANY APPLICABLE WRITTEN AGREEMENT OR FOR ARUBA
PRODUCTS OR SERVICES PURCHASED DIRECTLY FROM ARUBA, WHICHEVER IS LESS.
Aruba Networks reserves the right to change, modify, transfer, or otherwise revise this publication and the product specifications without
notice.
Aruba Networks, Inc. Table of Contents | 3
Guest Access with ArubaOS Application Note
Table of Contents
Chapter 1: Introduction 5
Reference Material 5
Chapter 2: ArubaOS or Amigopod for Visitor Management 6
Chapter 3: Guest Networks with Captive Portal Authentication 9
Captive Portal 9
Captive Portal Authentication Process 9
Guest Provisioning 11
Licenses Required 11
Certificates 11
Chapter 4: Captive Portal Configuration 12
Guest VLAN and Related DHCP Services 12
Guest User Roles 17
Network Destination Alias 18
Defining Guest Access Policies 20
Configuring the guest-logon Role 24
Configuring the auth-guest Role 25
Configuring the SSID Profile for Guest WLAN 27
Configuring the Internal Database for Guest Authentication 29
Configuring the Captive Portal Authentication Profile 30
Configuring the AAA Profile for Guest WLAN 36
Chapter 5: Guest Provisioning 37
Configuring Guest Provisioning User 37
Configuring the Guest-Provisioning Page 38
Modifying Guest Fields on the GPP 38
Modifying Page Design of the GPP 42
Email Options for the GPP 42
Creating Guest User Accounts 44
Chapter 6: Optional Configurations for Guest Network 47
Time Range 47
Bandwidth Contracts 51
Maximum User Sessions for Guest Role 54
Walled Garden 56
Prioritizing Employee Traffic Using Traffic Management Profile 58
Aruba Networks, Inc. Table of Contents | 4
Guest Access with ArubaOS Application Note
Optional SSID and VAP Profile Parameters for Guest Network 58
Disabling lower Data Rates 58
Denying Inter User Traffic 60
Appendix A: Contacting Aruba Networks 61
Contacting Aruba Networks 61
Aruba Networks, Inc. Introduction | 5
Guest Access with ArubaOS Application Note
Chapter 1: Introduction
Every organization, big or small, wants to provide some sort of network access to visitors. The visitors
may be guests, contractors, auditors, or partners. The Aruba guest access solution provides role-
based access to each category of visitors and secures the sensitive corporate resources. In typical
Aruba guest access deployment, the guest users are prevented from accessing private network
resources, and the contractors and partners can be give restricted access to some corporate
resources. Managing visitor accounts has always been difficult for IT teams. The Aruba guest access
solution simplifies guest provisioning by allowing authorized non-IT professionals, such as
receptionists, to create and delete guest accounts. Additional features include customizable captive
portal pages and the ability to gather detailed account information.
This guide explains the configuration of enterprise guest access using the captive portal capabilities of
the base ArubaOS software.
Table 1 lists the current software versions for this guide.
Reference Material
This technical document assumes that the reader is familiar with the Aruba technology and knows how
to set up a working WLAN using profiles such as SSID, VAP, and AAA profiles. The following
prerequisite documentation is highly recommended before reading this document:
 Aruba 802.11n Networks Validated Reference Design, available at www.arubanetworks.com/vrd
 Aruba Campus Wireless Networks Validated Reference Design, available at
www.arubanetworks.com/vrd.
 The complete suite of Aruba technical documentation is available for download from the Aruba
support site. These documents present complete, detailed feature and functionality explanations
outside the scope of the VRD series. The Aruba support site is located at:
https://support.arubanetworks.com/. This site requires a user login and is for current Aruba
customers with support contracts.
Table 1 Aruba Software Versions
Product Version
ArubaOS™ (mobility controllers) 6.1
ArubaOS (mobility access switch) 7.0
Aruba Instant™ 1.1
MeshOS 4.2
AirWave® 7.3
AmigopodOS 3.3
Aruba Networks, Inc. ArubaOS or Amigopod for Visitor Management | 6
Guest Access with ArubaOS Application Note
Chapter 2: ArubaOS or Amigopod for Visitor Management
Businesses provide guest access for different reasons. Some organizations provide free guest access
while others provide it as a paid service. Depending on the type of business, the guess access service
has a varying degree of impact. Most large enterprises provide guest access as an amenity. Some
businesses such as cafés and restaurant chains provide free guest access as a means to drive their
core business, while others such as airports and hotels use it as a form of revenue. The Aruba guest
access solution is designed to meet the guest access needs of all businesses. Aruba supports two
methods of guest access, using just the mobility controller or using the mobility controller plus
Amigopod. ArubaOS supports basic guest management and captive portal functionality, with guest
access limited to a single master-local cluster. Aruba Amigopod extends the standard ArubaOS
captive portal functionality by providing many advanced features, including:
 A fully branded user interface
 Short Message Service (SMS) integration for delivery of receipts
 Bulk upload of visitors for conference management
 Self-provisioning of users for public space environments
Choosing the right solution for your deployment depends on your guest access requirements.
Table 2 summarizes the capabilities of the two Aruba guest access solutions.
Table 2 Comparison of ArubaOS Guest Access and Amigopod
Feature ArubaOS
ArubaOS Plus
Amigopod
Not supported = Limited support = Supported =
Captive Portal Customization
Captive portal customization
Captive portal per-SSID customization
Anonymous logon
One time tokens/access codes
Welcome page with session statistics and logout
Mobile browser aware captive portal pages
Skins: UI branding customization
Guest Account Provisioning
Single point of management for guest account and captive
portal in multiple master controller deployments
Non-IT staff do not require IP access to master controller for
provisioning guest accounts
Guest-provisioning operator role
Aruba Networks, Inc. ArubaOS or Amigopod for Visitor Management | 7
Guest Access with ArubaOS Application Note
Customizable guest-provisioning operator role
External servers for operator logins
Provisioning of nonguest user roles by operators
Limit operators to view only the account they created
Self-registration workflow with automated login
Sponsor-approved self-registration
Time zone support for guest access in distributed
deployments
Bulk provisioning of guest accounts (CSV import and
automatic generation)
Export/import of user database
Mandatory and nonmandatory fields
Guest password complexity requirements
Guest account information printing via templates
Guest credential delivery through email and SMS
Force password change on first login
Delete and/or disable guest accounts on expiration
Guest Session Management
Time and day policy
Guest access expiry timer starts on first login
Limit access based on total session time across multiple
logins
Limit guest session data (total bytes)
Limit guest session bandwidth (Mb/s)
Limit guest session to single concurrent login
Hotspot and Hospitality Features
Walled garden
Plug-and-play clients, any IP
VPN NAT (static NAT per client using public IP)
Credit card billing
Surveys and feedback forms
Target ads and promotions
Table 2 Comparison of ArubaOS Guest Access and Amigopod (Continued)
Feature ArubaOS
ArubaOS Plus
Amigopod
Aruba Networks, Inc. ArubaOS or Amigopod for Visitor Management | 8
Guest Access with ArubaOS Application Note
Visitor data mining
MAC or cookie-based reauthentication (portal bypass)
Reporting and Notification
Peak guest network usage
Total guest sessions (per day, per week, etc.)
Bandwidth usage on guest network
Top x users (session time and bandwidth)
Expiring passwords
Enterprise Features and Scalability
Managing 1000s of accounts
High availability/redundancy
Expandability (plug-in architecture)
Table 2 Comparison of ArubaOS Guest Access and Amigopod (Continued)
Feature ArubaOS
ArubaOS Plus
Amigopod
Aruba Networks, Inc. Guest Networks with Captive Portal Authentication | 9
Guest Access with ArubaOS Application Note
Chapter 3: Guest Networks with Captive Portal Authentication
Guest networks are often defined by what the guest is not allowed to do and where they are not
allowed to go. These are the most common guest usage requirements in enterprises deployments:
 Guest users must be separated from employee users.
 Guests must be limited by:
 What resources they can access
 What protocols they are allowed to use
 What time of the day they can access the network
 The amount of bandwidth or air time they can use
 Guests should be allowed to access only the local resources that are required for IP
connectivity. These resources include DHCP and possibly DNS if an outside DNS server is not
available. Aruba recommends the use of a public DNS server for guest networks.
 All other internal resources should be unavailable for the guest.
 Employee traffic should be prioritized on the wireless medium.
The native ArubaOS can be configured to address these requirements of an enterprise network.
Captive Portal
Wireless networks used by corporate employees should always be secured using Layer 2 methods
such as WPA2. For guest access, providing Layer 2 authentication using pre-shared keys (PSK) or
802.1X is not a viable solution due to the technical complexity. Instead authentication is moved to
Layer 3. Captive portal authentication is a Layer 3 authentication method that redirects users to a
captive portal page when they start a web session. The captive portal page can be used for various
purposes, such as authenticating the guest using a user name and password, providing an acceptable
use policy, or self registration with an email address.
Captive portal on ArubaOS can be configured to authenticate guest users based on user/password or
valid email ID information. The system can also be configured simply to present an acceptable use
policy and an accept button through custom configuration of the HTML page. ArubaOS does not
support the use of advanced features such as payment services, but it can redirect to other portals
such as Amigopod for additional services.
Captive Portal Authentication Process
Captive portal is a Layer 3 authentication, which requires that the devices connect to the network and
obtain an IP address and related DNS information before authenticating through the captive portal.
The following steps explain the entire captive portal process when the native ArubaOS is used for
captive portal authentication:
1. The device that is associating to the guest SSID is assigned an initial role (guest-logon role in
the example configuration). This initial role allows DHCP, so the user gets an IP address.
2. The user opens a browser and makes an HTTP (or HTTPS) request to some destination (for
example, www.bbc.com).
Aruba Networks, Inc. Guest Networks with Captive Portal Authentication | 10
Guest Access with ArubaOS Application Note
3. The resolver in the device sends a DNS request to resolve the www.bbc.com. The initial role
(guest-logon role) permits DNS services, so the resolver can communicate with the DNS server.
4. The DNS server replies with the correct address to www.bbc.com.
5. The resolver tells the browser which IP address to use based on the DNS reply.
6. The browser initiates a TCP connection to port 80 of the www.bbc.com address.
7. The controller intercepts the connection and spoofs the initial TCP handshakes of the HTTP
process. At this moment, the client browser thinks it is communicating with the bbc.com server.
8. When the browser sends the HTTP GET request for the web page, the controller replies saying
that bbc.com has “temporarily moved” to <https://securelogin.arubanetworks.com/[string that
identifies client]>.
9. The browser closes the connection.
10.The browser attempts to connect with <https://securelogin.arubanetworks.com/[string that
identifies client]>, but it first needs to send a DNS request for the address.
11.The actual DNS server responds that it cannot resolve
<https://securelogin.arubanetworks.com>, but the controller intercepts that reply and changes
the packet to say that securelogin.arubanetworks.com is at the IP address of the controller itself.
Remember that it is critical that the DNS server sends back a reply to the query.  It is only then
that the controller can spoof the reply back from the DNS server.  Sending a DNS request
without receiving a reply is not sufficient, since without a reply the controller will never help the
client resolve securelogin.arubanetworks.com.
12.The browser initiates an HTTPS connection to address of controller, which responds with the
captive portal login page, where the guest authenticates.
13.After successful authentication, the user is assigned the post authentication role (auth-guest
role in the example configuration). This is the default role in the captive portal profile.
14.After authentication, the browser is redirected to bbc.com at the address originally resolved by
the DNS. Alternatively, if a welcome page is configured, the browser is redirected to the
welcome page.
15.To successfully redirect to the original web page the controller spoofs a reply from bbc.com to
tell the client that bbc.com has “permanently moved” to bbc.com. This step corrects the
“temporary relocation” that occurred as part of the captive portal login.
16.This causes the client to re-query DNS for the address of www.bbc.com.
17.The browser starts to communicate with the actual bbc.com server.
Aruba Networks, Inc. Guest Networks with Captive Portal Authentication | 11
Guest Access with ArubaOS Application Note
Guest Provisioning
Usually, guest users are required to provide a username and password for captive portal
authentication. These guest accounts must be created on the authentication server against which the
guest users are authenticated. Every time a guest user account has to be created, an IT staff must
login to the authentication server and create it. Adding guest accounts to the authentication server
quickly becomes a cumbersome task for the IT team. Aruba guest provisioning solves this problem by
allowing non-IT professionals, such as receptionists, to create and delete guest accounts.
The Amigopod and base ArubaOS software have guest provisioning capabilities. Any authentication
server type available on ArubaOS can be used as the authentication server for captive portal
authentication. However, if the base ArubaOS software is used for guest provisioning, only the internal
database of the controller can be used as the authentication server for captive portal authentication.
Licenses Required
Captive portal authentication is supported on the base ArubaOS software and it does not require any
separate license. However, configuration of guest specific user roles requires the PEFNG license to be
present on the mobility controller.
Certificates
The Aruba controller ships with a default server certificate. This certificate demonstrates the secure
login process of the controller for captive portal, secure shell (SSH), and WebUI management access.
This certificate is not recommended for use in a production network. Aruba strongly recommends that
you replace this certificate with a unique certificate that is issued to the organization or its domain by a
trusted certificate authority (CA).
Aruba Networks, Inc. Captive Portal Configuration | 12
Guest Access with ArubaOS Application Note
Chapter 4: Captive Portal Configuration
A number of tasks are necessary to configure a fully functional guest WLAN. Some of this work is
simplified through the use of the configuration wizards, and Aruba highly recommends that you use the
wizard where possible. The following list outlines the tasks necessary to configure captive portal
authentication:
1. Configure the guest VLAN and related DHCP services (required)
2. Configure guest user roles (required)
3. Configure captive portal profile (required)
4. Configure an SSID profile (required)
5. Configure a AAA profile (required)
6. Configure a VAP profile (required)
7. Configure guest provisioning and create guest user accounts (required)
8. Configure time restrictions (optional)
9. Configure bandwidth contracts (optional)
10.Configure maximum session count (optional)
11.Configure walled garden (optional)
12.Configure traffic management profile (optional)
Guest VLAN and Related DHCP Services
The guest users must be isolated to a subnet that is hidden from the corporate network. Defining a
VLAN (subnet) that is local to the controller restricts the guests to a subnet that is not routable in the
core network. This VLAN adds an additional layer of security to the design by hiding the IP addressing
scheme used in the core network from guests and users who accidentally associate with the guest
WLAN.
The guest VLAN is local to the controller, so it is essential to source-NAT this VLAN and define the
required DHCP and DNS services. The controller should be the DHCP server for the guest VLAN and
this VLAN should be source-NATed by the IP address of the controller to which the VLAN belongs.
Source-NATing allows the guest users to reach the allowed destinations while they are still isolated
from the core network.
N O T E
The VLAN and DHCP services required for the guest network should be
configured on the controller that terminates the APs. In a master/local
deployment, this is usually the local controller.
Aruba Networks, Inc. Captive Portal Configuration | 13
Guest Access with ArubaOS Application Note
Table 3 and Table 4 and Figure 1 through Figure 5 show the configuration of a guest VLAN and the
related DHCP services.
Guest VLAN Configuration
!
interface vlan 900
interface vlan 900 ip address 192.168.200.1 255.255.255.0
!
Figure 1 Creating a VLAN
Table 3 Guest VLAN
VLAN ID IP
900 192.168.200.1
Aruba Networks, Inc. Captive Portal Configuration | 14
Guest Access with ArubaOS Application Note
Figure 2 Configuring IP parameters for the guest VLAN
Figure 3 Guest VLAN
Aruba Networks, Inc. Captive Portal Configuration | 15
Guest Access with ArubaOS Application Note
Source-NAT Configuration for the Guest VLAN
!
interface vlan 900
ip nat inside
!
Figure 4 Source-NATing the guest VLAN
Table 4 DHCP Services for the Guest VLAN
Pool Name Default Router DNS Server Network Netmask
guestpool 192.168.200.1 208.67.222.222 (Public DNS server)
208.67.222.220 (Public DNS server)
192.168.200.0 255.255.255.0
N O T E
Test that the DNS services are working properly from the guest subnet. A
functional DNS service is an integral part of captive portal authentication
process.
Aruba Networks, Inc. Captive Portal Configuration | 16
Guest Access with ArubaOS Application Note
DHCP Server Configuration for the Guest VLAN
!
ip dhcp pool "guestpool"
default-router 192.168.200.1
dns-server 208.67.222.222 208.67.222.220
network 192.168.200.0 255.255.255.0
!
service dhcp
!
Figure 5 Configuring the DHCP pool
Aruba Networks, Inc. Captive Portal Configuration | 17
Guest Access with ArubaOS Application Note
Figure 6 Enabling the DHCP server
Guest User Roles
In the Aruba user-centric network, every client is associated with a user role. The user roles that are
enforced through the firewall policies determine the network privileges of a user. A policy is a set of
rules that applies to the traffic that passes through the Aruba devices. The rules and policies are
processed in a top-down fashion, so the position of a rule within a policy and the position of a policy
within a role determine the functionality of the user role. When you construct a role, you must put the
rules and policies in the proper order.
Usually, guests are assigned two different roles. The first role is assigned when they associate to the
guest SSID, and the other is assigned when they authenticate successfully through the captive portal.
Only the guests who successfully authenticate are allowed to use to the services needed to connect to
the Internet.
Consider the guest-logon role as the initial role and the auth-guest role for authenticated guests.
Before these two roles are configured, the policies that are associated with them must be configured.
The guest-logon role uses these policies:
 captiveportal (predefined policy)
 guest-logon-access
N O T E
Use the public DNS server in your location. If a public DNS server is not
available in your region, the guest users should be allowed access to the
internal DNS server.
Aruba Networks, Inc. Captive Portal Configuration | 18
Guest Access with ArubaOS Application Note
The auth-guest role uses these policies:
 cplogout (predefined)
 guest-logon-access
 block-internal-access
 auth-guest-access
 drop-and-log
A policy might have one or more rules that apply to several networks or hosts. Creating a separate rule
for each host or network might be laborious and will increase the number of rules in the policy. The
network destination alias feature in the ArubOS can be used to simplify firewall polices that have a set
of rules that are common to a group of hosts, domains, or networks.
Network Destination Alias
The network destination alias feature in the ArubaOS can be used to group several hosts or networks.
Aliases can be used when several rules have protocols and actions common to multiple hosts or
networks. Alias allows the addition of domain/host names and IP addresses. The IP addresses can be
added by host, network, or range. When the invert parameter of an alias is enabled, the rules that use
that alias are applied to all the IP addresses, domains and hostnames except those specified in the
alias.
Table 5 lists the aliases that will be useful in configuration of user roles.
Network Destination Alias Configuration
!
netdestination Internal-Network
network 10.0.0.0 255.0.0.0
network 172.16.0.0 255.240.0.0
network 192.168.0.0 255.255.255.0
!
netdestination Public-DNS
host 208.67.222.222
host 208.67.222.220
!
Table 5 Aliases
Alias Name Purpose IP Address/ Range
Public-DNS Defines the public DNS servers Host
208.67.222.222
208.67.222.220
These are OpenDNS servers. For more details on OpenDNS
see www.opendns.com
Internal-Network Defines the private IPv4 address range Network
10.0.0.0/8
172.16.0.0/12
192.168.0.0/16
Aruba Networks, Inc. Captive Portal Configuration | 19
Guest Access with ArubaOS Application Note
Figure 7 Aliases
Aruba Networks, Inc. Captive Portal Configuration | 20
Guest Access with ArubaOS Application Note
Defining Guest Access Policies
Guest roles are made up of a number of polices that can be predefined and reused in the system. The
following sections describe the policies that will be used to define the rights of the guest in their various
roles.
Configuring the guest-logon-access Policy
The guest-logon-access policy is similar to predefined logon-control policy, but it is much more
restrictive. The guest-logon-access policy is a part of the guest-logon and auth-guest roles. The rules
defined in this policy allow these exchanges:
 Allow DHCP exchanges between the user and the DHCP server, but block other users from
responding to DHCP requests.
 Allow DNS exchanges between the user and the public DNS server.
Remember that the guests should be allowed to access only the local resources that are required for
IP connectivity. These resources include DHCP and possibly DNS if an outside DNS server is not
available.
Table 6 summarizes the rules used by the guest-logon-access policy.
guest-logon-access Policy Configuration
!
ip access-list session guest-logon-access
user any udp 68 deny position 1
any any svc-dhcp permit position 2
user alias Public-DNS svc-dns permit position 3
!
Table 6 guest-logon-access Policy
Rule
Number
Source Destination Service Action Purpose
1 User Any UDP
min port = 68
max port = 68
Drop This rule drops responses from a
personal DHCP server. This action
prevents the clients from acting as DHCP
servers.
2 Any Any Service
svc-dhcp (udp 67 68)
Permit This rule allows clients to request and
discover DHCP IP addresses over the
network. The DHCP server on the
network does not fall under the user
category. Therefore, its response on port
68 is not dropped by the first rule. The first
two rules guarantee that DHCP is
processed only by legitimate DHCP
servers on the network.
3 User Alias
Public-DNS
Service
svc-dns (udp 53)
permit This rule allows DNS queries only to the
DNS servers that are defined in the
Public-DNS alias.
Aruba Networks, Inc. Captive Portal Configuration | 21
Guest Access with ArubaOS Application Note
Figure 8 guest-logon-access policy
Configuring the block-internal-access Policy
The internal resources of an organization should be available only to employees or to trusted groups.
Guest users are not part of the trusted entity, so they must be denied access to all internal resources.
As the name implies, the block-internal-access policy denies access to all internal resources. This
policy is a part of the guest-logon and auth-guest roles.
Table 7 summarizes the rules used by the block-internal-access policy.
block-internal-access Policy Configuration
!
ip access-list session block-internal-access
user alias Internal-Network any deny position 1
!
Table 7 block-internal-access Policy
Rule
Number
Source Destination Service Action Purpose
1 user Alias
Internal-Network
any drop This rule denies access to all the
addresses that are in the Internal-
Network alias.
Aruba Networks, Inc. Captive Portal Configuration | 22
Guest Access with ArubaOS Application Note
Figure 9 block-internal-access policy
Configuring the auth-guest-access Policy
The most important purpose of the auth-guest-access policy is to define the protocols and ports that
the users are allowed to access. This policy is an integral part of the auth-guest role. The auth-guest-
access policy allows HTTP and HTTPS traffic to go to any destination from the user. When this policy
is combined with the block-internal-access policy in the auth-guest role, the users will be allowed
HTTP and HTTPS access to the public websites only.
Table 8 summarizes the rules used by the auth-guest-access policy.
N O T E
If you want your guest users to use their IPsec clients, create rules in this policy
that allows the use of ports 4500 (for IPsec NAT-T) and 500 (for IKE).
Table 8 auth-guest-access Policy
Rule
Number
Source Destination Service Action Purpose
1 User Any Service
svc-http
permit This rule allows HTTP traffic from the
users to any destination.
2 User Any Service
svc-https
permit This rule allows HTTPS traffic from the
users to any destination.
Aruba Networks, Inc. Captive Portal Configuration | 23
Guest Access with ArubaOS Application Note
auth-guest-access Policy Configuration
!
ip access-list session auth-guest-access
user any svc-http permit position 1
user any svc-https permit position 2
!
Figure 10 auth-guest-access policy
Configuring the drop-and-log Policy
The drop-and-log policy denies all traffic and records the network access attempt.
Table 9 summarizes the rule used by the drop-and-log policy.
N O T E
The logging function in this policy increases your syslog repository. If you do
not require logging, remove the log action from the firewall rule of this policy.
Table 9 drop-and-log Policy
Rule
Number
Source Destination Service Action Log Purpose
1 User Any Any Deny Yes This rule denies access to all
services on the network and logs
the network access attempt.
Aruba Networks, Inc. Captive Portal Configuration | 24
Guest Access with ArubaOS Application Note
drop-and-log Policy Configuration
!
ip access-list session drop-and-log
user any any deny log position 1
!
Figure 11 drop-and-log policy
Configuring the guest-logon Role
The guest-logon role is the first role that is assigned to the users when they associate with the guest
SSID. Users in this role have access only to the DHCP/DNS services and are redirected to the captive
portal page whenever they try to access a web page. The captive portal page requires login
credentials. The captive portal authentication profile that is appended to this role specifies the captive
portal login page and other configurable parameters such as the default role and the type of login. To
create and add the captive portal authentication profile to this guest role, see Configuring the Captive
Portal Authentication Profile on page 30. Table 10 describes the policies in the guest-logon role.
Table 10 guest-logon Role
Policy
Number
Policy Name Purpose
1 captiveportal (predefined policy) This predefined policy initiates captive portal authentication. This policy
redirects any HTTP or HTTPS traffic to port 8080, 8081, or 8088 of the
controller. When the controller sees traffic on these ports, it checks the
captive portal authentication profile associated with the current role of the
user and processes the values specified on this profile.
2 guest-logon-access This policy allows DHCP and DNS services. For details, see Configuring the
guest-logon-access Policy on page 20.
Aruba Networks, Inc. Captive Portal Configuration | 25
Guest Access with ArubaOS Application Note
guest-logon Role Configuration
!
user-role guest-logon
access-list session captiveportal position 1
access-list session guest-logon-access position 2
!
Figure 12 guest-logon role
Configuring the auth-guest Role
The auth-guest role is assigned to users after they authenticate successfully through the captive
portal. This role is the default role in the captive portal authentication profile. This role allows only
HTTP and HTTPS services to Internet.
Sometimes an organization wants its guest users to use the printers in the internal network. In such
cases, create a separate policy that allows user traffic to an alias called printers. This alias must
include only the IP address of the printers that the guests are allowed to use. Place this policy in the
auth-guest user role just above the block-internal-access policy.
Aruba Networks, Inc. Captive Portal Configuration | 26
Guest Access with ArubaOS Application Note
Table 11 describes the policies in the auth-guest role.
auth-guest Role Configuration
!
user-role auth-guest
access-list session cplogout position 1
access-list session guest-logon-access position 2
access-list session block-internal-access position 3
access-list session auth-guest-access position 4
access-list session drop-and-log position 5
!
Table 11 auth-guest Role
Policy
Number
Policy Name Purpose
1 cplogout (predefined policy) This policy makes the controller present the captive portal logout window. If the user
attempts to connect to the controller on the standard HTTPS port (443), the client is
NATed to port 8081, where the captive portal server will answer. If this rule is not
present, a wireless client may be able to access the administrative interface of the
controller.
2 guest-logon-access This policy denies personal DHCP servers and provides legitimate DHCP services
and DNS.
3 block-internal-access This policy blocks access to internal network. This policy should be placed before
the next policy that allows HTTP and HTTPS service, otherwise guest users will
have access to the internal websites.
4 auth-guest-access This policy allows HTTP and HTTPS services to any destination.
5 drop-and-log Any traffic that does not match the previous policies encounters this policy. This
policy denies all services and logs the network access attempt.
Aruba Networks, Inc. Captive Portal Configuration | 27
Guest Access with ArubaOS Application Note
Figure 13 auth-guest
Configuring the SSID Profile for Guest WLAN
As previously mentioned, guest SSIDs typically do not provide any Layer 2 authentication and
encryption. The Layer 2 authentication type used is open. In open authentication, hello messages are
exchanged with the client before it is allowed to associate and obtain necessary IP information. All the
user traffic is unencrypted. The users that associate to this SSID are placed in the guest VLAN. This
WLAN uses captive portal to authenticate the users. Captive portal with open Layer 2 authentication
should never be used for employee networks, because captive portal does not provide encryption. The
wireless traffic is visible to anyone doing a passive packet capture unless the data is encrypted by
higher-layer protocols such as HTTPS and IPsec.
N O T E
If you require encryption of data for guest users, other Layer 2 authentication
types such as WPA2-PSK can be used before the users are redirected to the
captive portal. However, this approach requires that credentials such as the
pre-shared key are distributed to all guest users.
Aruba Networks, Inc. Captive Portal Configuration | 28
Guest Access with ArubaOS Application Note
Table 12 summarizes the parameter in the sample guest SSID profile.
Guest SSID Profile Configuration
!
wlan ssid-profile "guestnet"
essid "Guest"
opmode opensystem
!
Figure 14 Guest SSID profile configuration
Table 12 Guest SSID Profile
SSID Profile
Network
Name (SSID)
Authentication Encryption WMM Purpose
guestnet Guest Open none __ Guest users. (Captive portal is
used to provide Layer 3
authentication.)
Aruba Networks, Inc. Captive Portal Configuration | 29
Guest Access with ArubaOS Application Note
Configuring the Internal Database for Guest Authentication
The user credentials provided by the captive portal users must be authenticated against an
authentication server. Any server type available in ArubaOS can be used as an authentication server,
including the internal database. If the guest provisioning feature of ArubaOS is required, the internal
database must be used as the authentication server.
Create a server group that defines the internal database of the controller as the authentication server.
By default, the credentials entered on the captive portal page by the guests are validated against the
user credentials in the database of the master controller. So, in a master/local operation all the guest
user accounts are created in the internal database of the master controller. For details about using the
internal database of the local controllers for guest accounts in master/local deployments, see Chapter
5: Guest Provisioning.
Table 13 lists the parameter in the Guest-internal server group.
Server Group Configuration
!
aaa server-group "Guest-internal"
auth-server Internal
!
Figure 15 Server group
Table 13
Server Group Server
Guest-internal Internal (predefined)
Aruba Networks, Inc. Captive Portal Configuration | 30
Guest Access with ArubaOS Application Note
Configuring the Captive Portal Authentication Profile
As discussed earlier, to authenticate the users who are associated with the guest SSID via captive
portal, you must define and attach a captive portal profile to the initial role that is assigned to the guest
users. Configurable parameters such as the default role, type of login (user or guest), welcome page,
and others are available in a captive portal profile. The default captive portal page in the ArubaOS is
customizable.
Table 14 summarizes the most important parameters of the captive portal profile and the configuration
used in the example.
Table 14 Captive portal profile
Parameter Purpose
Sample Configuration
(guestnet captive portal profile)
User login A username and password is necessary to pass captive
portal authentication when user login is enabled. Users
authenticating through user login are assigned the role
specified in the default role field of the captive portal
profile.
enabled
Default role This role is assigned to users after successful
authentication through user login.
auth-guest
Guest login The captive portal does not request any credentials and
the users can login by providing a valid email address.
Users authenticating through guest login are assigned
the role specified in the default guest role field of the
captive portal profile. When user login and guest login is
enabled, users can login using either credentials or valid
email address.
diasbled
Default Guest role This role is assigned to users after successful
authentication through guest login.
_
Logout popup window Presents a logout window after the user is authenticated.
If this is disabled, the user will be logged in until the user
age-out is reached or until the client device is rebooted.
Pop-up blockers in the browsers may block this pop-up.
enabled
Login page This is the captive portal page that is displayed to the
users. This can be the default page, the new customized
page, or any external captive portal page such as the
one hosted on Amigopod.
/auth/index.html
Welcome page This is the welcome page that is displayed after
successful authentication.
/auth/welcome.html
Show Welcome Page This enables the welcome page. If disabled, the
authenticated user is redirected automatically to the
page he was trying to browse initially.
enabled
Allow only one active
user session
If enabled, only one active session is allowed per
username/password.
enabled
White List Lists the aliases to which the unauthenticated users are
allowed access. For details, see Walled Garden on
page 56.
--
Aruba Networks, Inc. Captive Portal Configuration | 31
Guest Access with ArubaOS Application Note
Remember to add a server group, which defines internal database as the authentication server, to the
captive portal profile.
Captive Portal Configuration
!
aaa authentication captive-portal "guestnet"
default-role "auth-guest"
no guest-logon
server-group "Guest-internal"
logout-popup-window
login-page "/auth/index.html"
welcome-page "/auth/welcome.html"
show-acceptable-use-policy
!
Black List Lists the aliases to which the unauthenticated users are
denied access. For details, see Walled Garden on
page 56.
--
Show the acceptable use
policy page
If enabled, it displays the acceptable use policy during
captive portal authentication. For detail, see Walled
Garden on page 56.
enabled
Table 14 Captive portal profile (Continued)
Parameter Purpose
Sample Configuration
(guestnet captive portal profile)
Aruba Networks, Inc. Captive Portal Configuration | 32
Guest Access with ArubaOS Application Note
Figure 16 Captive portal profile (using the sample configuration in Table 14)
Aruba Networks, Inc. Captive Portal Configuration | 33
Guest Access with ArubaOS Application Note
Figure 17 Captive portal page when user and guest login are enabled
Figure 18 Captive portal page for user login
Aruba Networks, Inc. Captive Portal Configuration | 34
Guest Access with ArubaOS Application Note
Figure 19 Captive portal page for guest login
After you configure the captive portal profile, append it to the initial role, which is the guest-logon role in
the example configuration.
Appending Captive Portal Profile to Initial Guest Role
!
user-role guest-logon
captive-portal guestnet
!
Aruba Networks, Inc. Captive Portal Configuration | 35
Guest Access with ArubaOS Application Note
Figure 20 Appending the captive portal profile to the initial guest role
Aruba Networks, Inc. Captive Portal Configuration | 36
Guest Access with ArubaOS Application Note
Configuring the AAA Profile for Guest WLAN
The AAA profile defines the user role assigned to authenticated and unauthenticated users. Since the
guest SSID is open, any user associating is given the user role specified as the initial role in the AAA
profile. The initial guest role should be the initial role in the AAA profile. In the example configuration
this is the guest-logon role.
Table 15 lists the initial role of the guest AAA profile.
Guest AAA Profile Configuration
!
aaa profile "guestnet"
initial-role "guest-logon"
!
Figure 21 Guest AAA profile configuration
After completing all the above configurations, create the required VAP profile and attach it to an AP
group. For details about configuring the VAP profiles and AP groups, see the Aruba Campus Wireless
Networks Validated Reference Design.
Table 15 Guest AAA Profile
AAA Profile Name Initial Role
guestnet guest-logon
Aruba Networks, Inc. Guest Provisioning | 37
Guest Access with ArubaOS Application Note
Chapter 5: Guest Provisioning
Guest provisioning allows authenticated non-IT members to create and delete visitor accounts. Guest
provisioning eliminates the need for an IT staff to be involved every time a user account has to be
created. A guest-provisioning user is usually a front-desk person, such as a receptionist, but it can be
anyone in the organization. As mentioned before, to use the guest-provisioning capabilities of the base
ArubaOS software, the internal database on the controller must be used as the authentication server
for captive portal authentication. The user accounts can be created in the internal database of the
controller by the members of the IT team who have root access to the controller and by authenticated
guest-provisioning users. An authenticated guest-provisioning user can only create guest accounts. A
guest-provisioning user does not see the same interface seen by a root user, but instead he is
presented with a guest provisioning page. The guest provisioning user can create, delete, or modify
the guest accounts that they create.
Configuring Guest Provisioning User
You can configure and authenticate a guest-provisioning user in one of three ways:
 Local authentication on the controller using user name and password
 Smart cards
 Other External authentication servers supported on ArubaOS
A guest-provisioning users should always authenticate to the mobility controller that holds the account
database, usually the master. The guest accounts created by a guest-provisioning user are always
added to the internal database of the controller to which the guest-provisioning user authenticated.
In master/local deployments, the guest credentials are authenticated against the internal database of
the master controller by default. However, certain deployments may require that the guest accounts in
a region reside on the local controller for that region. The requirements for using the internal database
of the local controller for guest authentication in a master/local deployment are these:
1. The local controller must be configured to use the internal database of the local controllers and
not the master to authenticate the users terminating on that local controller. To configure this,
issue the “aaa authentication-server internal use-local-switch” command in the command line
interface (CLI) of the local controller that has to use its internal database to authenticate users.
2. Guest-provisioning accounts must be created on the local controller that will be using its internal
database for guest authentication. These guest-provisioning users authenticate to the local
controller and the guest accounts created by them are added to the internal database on the
local controller.
N O T E
A guest user account that is created by a guest provisioning user can only be
viewed, modified, or deleted by the guest-provisioning user who created the
account or by the network administrator. A guest user account that is created
by the network administrator can only be viewed, modified, or deleted by the
network administrator.
Aruba Networks, Inc. Guest Provisioning | 38
Guest Access with ArubaOS Application Note
A network administrator with root access to the controller can create a guest-provisioning user on the
controller for local authentication. To create guest-provisioning user, add a management user account
with the role set to guest-provisioning. The predefined guest-provisioning role available on the
ArubaOS software cannot be edited.
Creating a Guest-Provisioning User Account on the Controller
!
mgmt-user "receptionist" "guest-provisioning" ******
!
Figure 22 Creating a guest-provisioning user on the Aruba controller
Configuring the Guest-Provisioning Page
The guest-provisioning page (GPP) is the web page that is displayed to the authenticated guest-
provisioning users. GPP is used by the guest-provisioning users to create, delete, and modify
accounts. The GPP that is displayed to an authenticated guest-provisioning user can be modified. The
network administrator can modify the fields displayed in the GPP, the design of the GPP, and the email
options for the created accounts.
Modifying Guest Fields on the GPP
When a guest-provisioning user creates a guest user account, he is required to enter certain
information about the guest such as the guest username, password, company name, email ID, and
phone number. The guest fields on the GPP define the information that a guest-provisioning user has
to supply when he creates a guest account. These guest fields can be modified.
Aruba Networks, Inc. Guest Provisioning | 39
Guest Access with ArubaOS Application Note
The Guest Fields tab has these columns:
 Internal Name: The unique identifier that is mapped to the label in the UI. This filed cannot be
edited.
 Label in UI: Name of the field display on the main GPP and while creating guest accounts.
 Display in Details: The fields of the guest account that are selected as “display in details” are
hidden from the main GPP. These fields are shown only when the show details parameter in the
GPP is enabled and a user account is selected.
 Display in Listing: These fields of the guest account are displayed on the main GPP by default.
Figure 23 Editing guest-provisioning fields
Aruba Networks, Inc. Guest Provisioning | 40
Guest Access with ArubaOS Application Note
Figure 24 Guest-provisioning fields displayed on the GPP
Figure 25 Display In Listing fields shown on the GPP
Aruba Networks, Inc. Guest Provisioning | 41
Guest Access with ArubaOS Application Note
Figure 26 Display In Details fields shown only when the Show details field
is enabled on the GPP
Aruba Networks, Inc. Guest Provisioning | 42
Guest Access with ArubaOS Application Note
Modifying Page Design of the GPP
The page design of the GPP can be modified to add or change the company banner, heading and text,
and background colors that appear on the GPP.
Figure 27 GPP Page Design
Email Options for the GPP
The email options of guest provisioning allows you to edit the subject, from address field and the body
of the email send, to the guests and sponsors. Emails can be chosen to be sent automatically when an
account is created or manually from the GPP at any time.
To send emails to the guests and sponsors from the controller, the simple mail transfer protocol
(SMTP) parameters on the controller must be configured. To configure SMTP on the controller, this
information is required:
 IP address of the SMTP server
 SMTP port number (port 25)
Aruba controller does not support the use of secure simple mail transfer protocol (SMTPS).
Aruba Networks, Inc. Guest Provisioning | 43
Guest Access with ArubaOS Application Note
SMTP Configuration
!
guest-access-email
smtp-server "10.10.10.100"
smtp-port 25
!
Figure 28 SMTP configuration for sending guest-provisioning emails
Aruba Networks, Inc. Guest Provisioning | 44
Guest Access with ArubaOS Application Note
Modifying Email Options
Figure 29 Guest-provisioning email options
Creating Guest User Accounts
The users with root access to the controller can create the guest accounts directly in the internal
database or they can navigate to the < https://<controller IP or FQDN>/switch/gpp.html> and login
using their root access credential to view the GPP and create guest accounts on it.
For guest-provisioning users, the guest accounts created in the GPP are added automatically to the
internal database of the controller to which the guest-provisioning users authenticated. ArubaOS
provides the option of importing a list of guest user accounts in CSV file format. Remember that a
guest-provisioning user can create only guest accounts.
Aruba Networks, Inc. Guest Provisioning | 45
Guest Access with ArubaOS Application Note
To create a guest account on the GPP, the guest-provisioning user must perform these tasks:
1. Click the New tab on the GPP.
2. Fill the guest fields.
3. If required, send emails manually.
Figure 30 Creating guest accounts using guest provisioning (step 1)
Figure 31 Creating guest accounts using guest provisioning (step 2)
N O T E
Guest user accounts are automatically removed from the internal database
when they expire.
Aruba Networks, Inc. Guest Provisioning | 46
Guest Access with ArubaOS Application Note
Figure 32 Manually sending emails for guests and sponsors from GPP
Figure 33 Creating guest accounts directly on the internal database using root access
Aruba Networks, Inc. Optional Configurations for Guest Network | 47
Guest Access with ArubaOS Application Note
Chapter 6: Optional Configurations for Guest Network
All the configurations explained in Chapter 4: Captive Portal Configuration and Chapter 5: Guest
Provisioning are necessary to build a functional guest network with guest provisioning. In addition,
ArubaOS provides features such as bandwidth contracts, walled garden, and time range that are
optional and are not critical for the operation for a guest WLAN. This chapter explains these optional
features in detail.
Time Range
A time-of-day restriction policy can be used to allow guests to access the network only during normal
working hours, because they should be using the network only while conducting official business. A
time-of-day restriction policy prevents guest users from using the network after normal working hours.
You can define a time range in ArubaOS that can be used in firewall policies to allow users to
associate to the guest network only during certain hours of the day.
Figure 34 Guest access with a time limit
The types of time ranges available are these:
1. Absolute: This time range starts and ends on a specific date and at a specific time.
2. Periodic: This recurring time-range starts and ends at a specific time. The recurring interval can
to set to be daily, weekdays, weekends, or any particular day of the week.
Table 16 lists the parameters used in the configuration of a time range named Working-hours.
Time Range Configuration
!
time-range "Working-hours" periodic Weekday 07:00 to 17:30
!
Table 16 Time Range
Name Type Start Date Start Time End Time
Working-hours periodic weekday 07:00 17:30
arun_060
No access
after hours
Access controlled
Aruba Networks, Inc. Optional Configurations for Guest Network | 48
Guest Access with ArubaOS Application Note
Figure 35 Time range
Time range can be used as a part of the rules in a firewall policy to impose an action during a particular
time. For example, if the guest access is to be allowed only during 7:30 am to 5:30 pm on weekdays,
then a time range should be attached to certain rules of some guest firewall policies. To impose a time
range for guest access, add a time range to rules 2 and 3 in the guest-logon-access policy and to the
both the rules in the auth-guest-access policy.
Time Range Configuration for guest-logon-access and auth-guest-access Policies
!
ip access-list session guest-logon-access
user any udp 68 deny position 1
any any svc-dhcp permit time-range Working-hours position 2
user alias Public-DNS svc-dns permit time-range Working-hours position 3
!
!
ip access-list session auth-guest-access
user any svc-http permit time-range Working-hours position 1
user any svc-https permit time-range Working-hours position 2
!
Aruba Networks, Inc. Optional Configurations for Guest Network | 49
Guest Access with ArubaOS Application Note
Figure 36 guest-logon-access policy with time range
Figure 37 auth-guest-access policy with time range
Aruba Networks, Inc. Optional Configurations for Guest Network | 50
Guest Access with ArubaOS Application Note
An alternative method of using time range to restrict guest access to business hours or a particular
time is by using the deny time range parameter of the VAP profile. If configured, the deny time range
parameter of the VAP profile will deny access to the associated SSID during the defined time range. If
guest access is to be restricted to business hours then define a time range that includes the non-
business hours and add it to the deny time range parameter of the VAP profile.
Table 17 shows the parameters used in the configuration of deny-access time range.
Deny Time Range Parameter Configuration
!
time-range "deny-access" periodic Weekday 17:30 to 23:59
time-range "deny-access" periodic Weekday 00:00 to 07:30
time-range "deny-access" periodic Weekend 00:00 to 23:59
!
wlan virtual-ap "guestnet"
deny-time-range deny-access
Figure 38 Deny access time range
Table 17 deny-access time range
Name Type Start Date Start Time End Time
deny-access periodic weekday 17:30 23:59
deny-access periodic weekday 00:00 07:30
deny-access periodic weekend 00:00 23:59
Aruba Networks, Inc. Optional Configurations for Guest Network | 51
Guest Access with ArubaOS Application Note
Figure 39 Deny time range parameter of the VAP profile
Bandwidth Contracts
The amount of upstream and downstream bandwidth used by guests can be limited using bandwidth
contracts. A bandwidth contract policy rate limits the traffic to the configured value as it flows through
the controller. Bandwidth contracts can be assigned on per role or per user basis. When a bandwidth
contract is created on per user basis, each user can pass traffic equivalent or less than the configured
rate. If the bandwidth contract is created on per role basis, then the bandwidth pool is shared by all the
users that belong to that role. The bandwidth is configurable in Kb/s or Mb/s and separate bandwidth
contracts can be assigned for upstream and downstream traffic.
Figure 40 Guest access with bandwidth limit
arun_061
Mobility
controller
Data Controlled
data
Aruba Networks, Inc. Optional Configurations for Guest Network | 52
Guest Access with ArubaOS Application Note
Table 18 lists the parameters used in the configuration of separate per role bandwidth contracts for
upstream and downstream traffic.
Bandwidth Contracts Configuration for Authenticated Guest Role
!
aaa bandwidth-contract "guest-upstream" mbits 1
!
aaa bandwidth-contract "guest-downstream" mbits 3
!
user-role "auth-guest"
bw-contract "guest-upstream" upstream
bw-contract "guest-downstream" downstream
!
Table 18 Bandwidth Contracts
Name Type Rate Purpose
guest-upstream per role 1 Mb/s used as upstream bandwidth contract for authenticated guest
role (auth-guest)
guest-downstream per role 3 Mb/s used as downstream bandwidth contract for authenticated guest
role (auth-guest)
Aruba Networks, Inc. Optional Configurations for Guest Network | 53
Guest Access with ArubaOS Application Note
Figure 41 Bandwidth contracts for authenticated guest role
Aruba Networks, Inc. Optional Configurations for Guest Network | 54
Guest Access with ArubaOS Application Note
Maximum User Sessions for Guest Role
Though it is a very small possibility, a malicious user can connect to the guest network and initiate a
denial of service (DoS) attack by using up all of the 65535 sessions available. To defend against such
an attack, restrict the maximum number of sessions per user in a role. Aruba recommends that you
restrict the maximum sessions per user in the guest role to 128. This limitation should be placed on all
the roles used in the guest network.
Maximum User Sessions Configuration
!
user-role guest-logon
max-sessions 128
!
user-role auth-guest
max-sessions 128
!
Aruba Networks, Inc. Optional Configurations for Guest Network | 55
Guest Access with ArubaOS Application Note
Figure 42 Maximum user sessions for guest role
Aruba Networks, Inc. Optional Configurations for Guest Network | 56
Guest Access with ArubaOS Application Note
Walled Garden
The walled garden feature of the ArubaOS, which is a part of captive portal authentication, allows
access by unauthenticated guest to certain websites. The whitelist feature of walled garden (available
in the captive portal profile) allows you to define a list of websites to which unauthenticated users are
allowed access. The blacklist feature of walled garden can be configured to explicitly block navigation
to certain websites from unauthenticated guests. This feature is very useful for businesses such as
hotels, which want guests to access their websites for free, but require them to pay for Internet
services.
Configuring walled garden includes the following two steps:
1. Create an alias for the allowed or disallowed websites.
2. To allow unauthenticated guests to access the websites defined in the alias, add the alias to the
whitelist of the captive portal profile used for guest access. If you want to deny access, add the
alias to the blacklist of the captive portal profile.
Table 19 summarizes the configuration of the walled-garden-access alias, which defines the hostname
www.arubanetwoks.com.
Walled Garden Configuration
!
netdestination walled-garden-access
name www.arubanetworks.com
!
aaa authentication captive-portal "default"
white-list walled-garden-access
!
!CAUTION
If you want to allow or deny access using walled garden to just a website,
include the entire hostname in the alias such as www.arubanetwoks.com
(include all prefixes, such as WWW). If you just use the domain name such as
arubanetworks.com in the alias, then all of the domain and subdomain
hostnames that can be resolved are accessible by the unauthenticated guest
users. In deployments that use internal DNS servers for guest networks,
whitelisting the entire domain allows unauthenticated guests access to all the
internal hostnames that can be resolved by the internal DNS server.
Table 19 walled-garden-access Alias
Alias Name IP Address/ Range Purpose
walled-garden-access www.arubanetworks.com Define the websites to which unauthenticated guests are
allowed access.
Aruba Networks, Inc. Optional Configurations for Guest Network | 57
Guest Access with ArubaOS Application Note
Figure 43 walled-garden-access alias
Figure 44 walled-garden (captive portal whitelist)
Aruba Networks, Inc. Optional Configurations for Guest Network | 58
Guest Access with ArubaOS Application Note
Prioritizing Employee Traffic Using Traffic Management Profile
While a rate limit can be put on each guest user, you may also want to limit access to the wireless
medium to keep the guest from using up the limited wireless airtime. Rate limiting on wireless medium
can be implemented using the traffic management profile. The traffic management profile is used to
provide a service level agreement (SLA). The SLA guarantees a minimum percentage of available
bandwidth to be allocated to a VAP when the wireless network is congested. During congestion the
traffic is shaped depending on the configured percentage. Remember to leave enough bandwidth to
keep the system usable by guests. Aruba recommends a minimum of 10% of total bandwidth be made
available to guests. Guests can always burst when the medium is idle.
For more information on traffic management profile and its configuration, see the Aruba Campus
Wireless Networks Validated Reference Design.
Optional SSID and VAP Profile Parameters for Guest Network
In addition to the standard SSID and VAP profile configurations used for guest WLANs, certain
parameters in these profiles can be tweaked depending on the guest network requirements of an
organization.
Disabling lower Data Rates
In the SSID profile, network administrators might choose to disable lower transmit rates of 1 and 2 to
prevent clients in the parking lot being associated to the network and consuming DHCP leases. This
behavior is quite common with devices such as smartphones. Disabling the lower rates forces the
clients to get closer to the building in order to get associated and eliminates the possibility of the
parking lot clients consuming the DHCP leases of your guest network. To disable lower transmit rates,
make these changes to the SSID profile
1. Disable the 802.11g transmit rates of 1 and 2
2. Change the 802.11g basic rates from 1 and 2 to 5 and 11.
Remember that disabling the lower rates causes connectivity issues with some handheld devices and
most games consoles such as PS3, Nintendo Wii and Xbox. Most guest networks are not built to
support such devices, so disabling the lower data rates might be an acceptable option in guest
networks. However, turning off lower data rates in student dormitories will result in huge volume of
support calls due to the behavior of most gaming consoles. Aruba strongly recommends that you test
the devices that are expected to connect to a WLAN for connectivity issues before turning off the lower
data rates in that WLAN.
Aruba Networks, Inc. Optional Configurations for Guest Network | 59
Guest Access with ArubaOS Application Note
Figure 45 Disabling lower data rates
Aruba Networks, Inc. Optional Configurations for Guest Network | 60
Guest Access with ArubaOS Application Note
Denying Inter User Traffic
Usually, there is no need for guests to share anything with other guests. Organizations which want to
deny inter user communication between the guests can use the deny inter user traffic parameter of the
VAP profile. If the deny inter user traffic parameter is enabled on a VAP, traffic between users
connected to that VAP is denied.
Figure 46 Deny inter user traffic on guest VAP
Aruba Networks, Inc. Contacting Aruba Networks | 61
Guest Access with ArubaOS Application Note
Appendix A: Contacting Aruba Networks
Contacting Aruba Networks
Web Site Support
Main Site http://www.arubanetworks.com
Support Site https://support.arubanetworks.com
Software Licensing Site https://licensing.arubanetworks.com/login.php
Wireless Security Incident
Response Team (WSIRT)
http://www.arubanetworks.com/support/wsirt.php
Support Emails
Americas and APAC support@arubanetworks.com
EMEA emea_support@arubanetworks.com
WSIRT Email
Please email details of any security
problem found in an Aruba product.
wsirt@arubanetworks.com
Validated Reference Design Contact and User Forum
Validated Reference Designs http://www.arubanetworks.com/vrd
VRD Contact Email referencedesign@arubanetworks.com
AirHeads Online User Forum http://community.arubanetworks.com
Telephone Support
Aruba Corporate +1 (408) 227-4500
FAX +1 (408) 227-4550
Support
 United States +1-800-WI-FI-LAN (800-943-4526)
 Universal Free Phone Service Numbers (UIFN):
 Australia Reach: 1300 4 ARUBA (27822)
 United States 1 800 9434526
1 650 3856589
 Canada 1 800 9434526
1 650 3856589
 United Kingdom BT: 0 825 494 34526
MCL: 0 825 494 34526
Aruba Networks, Inc. Contacting Aruba Networks | 62
Guest Access with ArubaOS Application Note
 Universal Free Phone Service Numbers (UIFN):
 Japan IDC: 10 810 494 34526 * Select fixed phones
IDC: 0061 010 812 494 34526 * Any fixed, mobile & payphone
KDD: 10 813 494 34526 * Select fixed phones
JT: 10 815 494 34526 * Select fixed phones
JT: 0041 010 816 494 34526 * Any fixed, mobile & payphone
 Korea DACOM: 2 819 494 34526
KT: 1 820 494 34526
ONSE: 8 821 494 34526
 Singapore Singapore Telecom: 1 822 494 34526
 Taiwan (U) CHT-I: 0 824 494 34526
 Belgium Belgacom: 0 827 494 34526
 Israel Bezeq: 14 807 494 34526
Barack ITC: 13 808 494 34526
 Ireland EIRCOM: 0 806 494 34526
 Hong Kong HKTI: 1 805 494 34526
 Germany Deutsche Telkom: 0 804 494 34526
 France France Telecom: 0 803 494 34526
 China (P) China Telecom South: 0 801 494 34526
China Netcom Group: 0 802 494 34526
 Saudi Arabia 800 8445708
 UAE 800 04416077
 Egypt 2510-0200 8885177267 * within Cairo
02-2510-0200 8885177267 * outside Cairo
 India 91 044 66768150
Telephone Support

More Related Content

What's hot

What's hot (20)

Aruba ClearPass Guest 6.3 User Guide
Aruba ClearPass Guest 6.3 User GuideAruba ClearPass Guest 6.3 User Guide
Aruba ClearPass Guest 6.3 User Guide
 
EMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP DeploymentEMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP Deployment
 
Bringing up Aruba Mobility Master, Managed Device & Access Point
Bringing up Aruba Mobility Master, Managed Device & Access PointBringing up Aruba Mobility Master, Managed Device & Access Point
Bringing up Aruba Mobility Master, Managed Device & Access Point
 
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard AgentsAirheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
 
EMEA Airheads How licensing works in Aruba OS 8.x
EMEA Airheads  How licensing works in Aruba OS 8.xEMEA Airheads  How licensing works in Aruba OS 8.x
EMEA Airheads How licensing works in Aruba OS 8.x
 
EMEA Airheads- ArubaOS - Cluster Manager
EMEA Airheads- ArubaOS - Cluster ManagerEMEA Airheads- ArubaOS - Cluster Manager
EMEA Airheads- ArubaOS - Cluster Manager
 
Wireless LAN Design Fundamentals in the Campus
Wireless LAN Design Fundamentals in the CampusWireless LAN Design Fundamentals in the Campus
Wireless LAN Design Fundamentals in the Campus
 
Real-world 802.1X Deployment Challenges
Real-world 802.1X Deployment ChallengesReal-world 802.1X Deployment Challenges
Real-world 802.1X Deployment Challenges
 
Aruba WLANs 101 and design fundamentals
Aruba WLANs 101 and design fundamentalsAruba WLANs 101 and design fundamentals
Aruba WLANs 101 and design fundamentals
 
EMEA Airheads- Aruba Instant AP- VPN Troubleshooting
EMEA Airheads- Aruba Instant AP-  VPN TroubleshootingEMEA Airheads- Aruba Instant AP-  VPN Troubleshooting
EMEA Airheads- Aruba Instant AP- VPN Troubleshooting
 
ClearPass Policy Model - An Introduction
ClearPass Policy Model - An IntroductionClearPass Policy Model - An Introduction
ClearPass Policy Model - An Introduction
 
EMEA Airheads- ArubaOS - Rogue AP troubleshooting
EMEA Airheads- ArubaOS - Rogue AP troubleshootingEMEA Airheads- ArubaOS - Rogue AP troubleshooting
EMEA Airheads- ArubaOS - Rogue AP troubleshooting
 
Network management with Aruba AirWave
Network management with Aruba AirWaveNetwork management with Aruba AirWave
Network management with Aruba AirWave
 
Enabling AirPrint & AirPlay on Your Network
Enabling AirPrint & AirPlay on Your NetworkEnabling AirPrint & AirPlay on Your Network
Enabling AirPrint & AirPlay on Your Network
 
Aruba instant 6.4.0.2 4.1 user guide
Aruba instant 6.4.0.2 4.1 user guideAruba instant 6.4.0.2 4.1 user guide
Aruba instant 6.4.0.2 4.1 user guide
 
Campus Network Design version 8
Campus Network Design version 8Campus Network Design version 8
Campus Network Design version 8
 
Aruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep DiveAruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep Dive
 
EMEA Airheads - Aruba Remote Access Point (RAP) Troubleshooting
EMEA Airheads - Aruba Remote Access Point (RAP) TroubleshootingEMEA Airheads - Aruba Remote Access Point (RAP) Troubleshooting
EMEA Airheads - Aruba Remote Access Point (RAP) Troubleshooting
 
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba CentralAirheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
 
Optimizing Aruba WLANs for Roaming Devices
Optimizing Aruba WLANs for Roaming DevicesOptimizing Aruba WLANs for Roaming Devices
Optimizing Aruba WLANs for Roaming Devices
 

Similar to Guest Access with ArubaOS

M controller vrdv10
M controller vrdv10M controller vrdv10
M controller vrdv10Minh Hoàng
 
Indoor80211n Aruba Wifi
Indoor80211n Aruba Wifi Indoor80211n Aruba Wifi
Indoor80211n Aruba Wifi CHai Yo Song
 

Similar to Guest Access with ArubaOS (20)

Amigopod and ArubaOS Integration
Amigopod and ArubaOS IntegrationAmigopod and ArubaOS Integration
Amigopod and ArubaOS Integration
 
Apple Captive Network Assistant Bypass with ClearPass Guest
Apple Captive Network Assistant Bypass with ClearPass GuestApple Captive Network Assistant Bypass with ClearPass Guest
Apple Captive Network Assistant Bypass with ClearPass Guest
 
ArubaOS DHCP Fingerprinting
ArubaOS DHCP FingerprintingArubaOS DHCP Fingerprinting
ArubaOS DHCP Fingerprinting
 
M controller vrdv10
M controller vrdv10M controller vrdv10
M controller vrdv10
 
Virtual Intranet Access (VIA)
Virtual Intranet Access (VIA)Virtual Intranet Access (VIA)
Virtual Intranet Access (VIA)
 
Campus Redundancy Models
Campus Redundancy ModelsCampus Redundancy Models
Campus Redundancy Models
 
RAP Networks Validated Reference Design
RAP Networks Validated Reference DesignRAP Networks Validated Reference Design
RAP Networks Validated Reference Design
 
Aruba Remote Access Point (RAP) Networks Validated Reference Design
Aruba Remote Access Point (RAP) Networks Validated Reference DesignAruba Remote Access Point (RAP) Networks Validated Reference Design
Aruba Remote Access Point (RAP) Networks Validated Reference Design
 
Aruba 650 Hardware and Installation Guide
Aruba 650 Hardware and Installation GuideAruba 650 Hardware and Installation Guide
Aruba 650 Hardware and Installation Guide
 
Outdoor Point-to-Point Deployments
Outdoor Point-to-Point DeploymentsOutdoor Point-to-Point Deployments
Outdoor Point-to-Point Deployments
 
ClearPass 6.3.2 Release Notes
ClearPass 6.3.2 Release NotesClearPass 6.3.2 Release Notes
ClearPass 6.3.2 Release Notes
 
Indoor80211n Aruba Wifi
Indoor80211n Aruba Wifi Indoor80211n Aruba Wifi
Indoor80211n Aruba Wifi
 
VRD-Indoor80211n 2012 05-31
VRD-Indoor80211n 2012 05-31VRD-Indoor80211n 2012 05-31
VRD-Indoor80211n 2012 05-31
 
Virtual Branch Networks
Virtual Branch NetworksVirtual Branch Networks
Virtual Branch Networks
 
Voice Support for Fixed Telecommuter Deployments
Voice Support for Fixed Telecommuter DeploymentsVoice Support for Fixed Telecommuter Deployments
Voice Support for Fixed Telecommuter Deployments
 
Voice over IP (VoIP) Deployment with Aruba Mobility Access Switch
Voice over IP (VoIP) Deployment with Aruba Mobility Access SwitchVoice over IP (VoIP) Deployment with Aruba Mobility Access Switch
Voice over IP (VoIP) Deployment with Aruba Mobility Access Switch
 
Airwaveand arubabestpracticesguide
Airwaveand arubabestpracticesguideAirwaveand arubabestpracticesguide
Airwaveand arubabestpracticesguide
 
Aruba Campus Wireless Networks
Aruba Campus Wireless NetworksAruba Campus Wireless Networks
Aruba Campus Wireless Networks
 
Aruba ClearPass_Onboard
Aruba ClearPass_OnboardAruba ClearPass_Onboard
Aruba ClearPass_Onboard
 
Aruba 802.11n Networks Validated Reference Design
Aruba 802.11n Networks Validated Reference DesignAruba 802.11n Networks Validated Reference Design
Aruba 802.11n Networks Validated Reference Design
 

More from Aruba, a Hewlett Packard Enterprise company

EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...
EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...
EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...Aruba, a Hewlett Packard Enterprise company
 

More from Aruba, a Hewlett Packard Enterprise company (20)

Airheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.xAirheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.x
 
EMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba CentralEMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba Central
 
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.xEMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
 
EMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS SwitchEMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS Switch
 
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS SwitchEMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
 
Introduction to AirWave 10
Introduction to AirWave 10Introduction to AirWave 10
Introduction to AirWave 10
 
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS SwitchEMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
 
EMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant APEMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant AP
 
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.xEMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
 
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
EMEA Airheads-  Getting Started with the ClearPass REST API – CPPMEMEA Airheads-  Getting Started with the ClearPass REST API – CPPM
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
 
EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)
 
EMEA Airheads - What does AirMatch do differently?v2
 EMEA Airheads - What does AirMatch do differently?v2 EMEA Airheads - What does AirMatch do differently?v2
EMEA Airheads - What does AirMatch do differently?v2
 
Airheads Meetups: 8400 Presentation
Airheads Meetups: 8400 PresentationAirheads Meetups: 8400 Presentation
Airheads Meetups: 8400 Presentation
 
Airheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau PresentationAirheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau Presentation
 
Airheads Meetups- High density WLAN
Airheads Meetups- High density WLANAirheads Meetups- High density WLAN
Airheads Meetups- High density WLAN
 
Airheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes ArubaAirheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes Aruba
 
EMEA Airheads - Configuring different APIs in Aruba 8.x
EMEA Airheads - Configuring different APIs  in Aruba 8.x EMEA Airheads - Configuring different APIs  in Aruba 8.x
EMEA Airheads - Configuring different APIs in Aruba 8.x
 
EMEA Airheads - Multi zone ap and centralized image upgrade
EMEA Airheads - Multi zone ap and centralized image upgradeEMEA Airheads - Multi zone ap and centralized image upgrade
EMEA Airheads - Multi zone ap and centralized image upgrade
 
EMEA Airheads- Aruba 8.x Architecture overview & UI Navigation
EMEA Airheads- Aruba 8.x Architecture overview & UI NavigationEMEA Airheads- Aruba 8.x Architecture overview & UI Navigation
EMEA Airheads- Aruba 8.x Architecture overview & UI Navigation
 
EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...
EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...
EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Guest Access with ArubaOS

  • 1. Guest Access with ArubaOS Version 1.0
  • 2. www.arubanetworks.com 1344 Crossman Avenue Sunnyvale, California 94089 Phone: 408.227.4500 Fax 408.227.4550 Aruba Networks, Inc. 2 Guest Access with ArubaOS Application Note Copyright © 2012 Aruba Networks, Inc. AirWave®, Aruba Networks®, Aruba Mobility Management System®, Bluescanner, For Wireless That Works®, Mobile Edge Architecture®, People Move. Networks Must Follow®, RFprotect®, The All Wireless Workplace Is Now Open For Business, Green Island, and The Mobile Edge Company® are trademarks of Aruba Networks, Inc. All rights reserved. Aruba Networks reserves the right to change, modify, transfer, or otherwise revise this publication and the product specifications without notice. While Aruba uses commercially reasonable efforts to ensure the accuracy of the specifications contained in this document, Aruba will assume no responsibility for any errors or omissions. Open Source Code Certain Aruba products include Open Source software code developed by third parties, including software code subject to the GNU General Public License (“GPL”), GNU Lesser General Public License (“LGPL”), or other Open Source Licenses. The Open Source code used can be found at this site: http://www.arubanetworks.com/open_source Legal Notice ARUBA DISCLAIMS ANY AND ALL OTHER REPRESENTATIONS AND WARRANTIES, WEATHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NONINFRINGEMENT, ACCURACY AND QUET ENJOYMENT. IN NO EVENT SHALL THE AGGREGATE LIABILITY OF ARUBA EXCEED THE AMOUNTS ACUTALLY PAID TO ARUBA UNDER ANY APPLICABLE WRITTEN AGREEMENT OR FOR ARUBA PRODUCTS OR SERVICES PURSHASED DIRECTLY FROM ARUBA, WHICHEVER IS LESS. Warning and Disclaimer This guide is designed to provide information about wireless networking, which includes Aruba Network products. Though Aruba uses commercially reasonable efforts to ensure the accuracy of the specifications contained in this document, this guide and the information in it is provided on an “as is” basis. Aruba assumes no liability or responsibility for any errors or omissions. ARUBA DISCLAIMS ANY AND ALL OTHER REPRESENTATIONS AND WARRANTIES, WHETHER EXPRESSED, IMPLIED, OR STATUTORY, INCLUDING WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NONINFRINGEMENT, ACCURACY, AND QUIET ENJOYMENT. IN NO EVENT SHALL THE AGGREGATE LIABILITY OF ARUBA EXCEED THE AMOUNTS ACTUALLY PAID TO ARUBA UNDER ANY APPLICABLE WRITTEN AGREEMENT OR FOR ARUBA PRODUCTS OR SERVICES PURCHASED DIRECTLY FROM ARUBA, WHICHEVER IS LESS. Aruba Networks reserves the right to change, modify, transfer, or otherwise revise this publication and the product specifications without notice.
  • 3. Aruba Networks, Inc. Table of Contents | 3 Guest Access with ArubaOS Application Note Table of Contents Chapter 1: Introduction 5 Reference Material 5 Chapter 2: ArubaOS or Amigopod for Visitor Management 6 Chapter 3: Guest Networks with Captive Portal Authentication 9 Captive Portal 9 Captive Portal Authentication Process 9 Guest Provisioning 11 Licenses Required 11 Certificates 11 Chapter 4: Captive Portal Configuration 12 Guest VLAN and Related DHCP Services 12 Guest User Roles 17 Network Destination Alias 18 Defining Guest Access Policies 20 Configuring the guest-logon Role 24 Configuring the auth-guest Role 25 Configuring the SSID Profile for Guest WLAN 27 Configuring the Internal Database for Guest Authentication 29 Configuring the Captive Portal Authentication Profile 30 Configuring the AAA Profile for Guest WLAN 36 Chapter 5: Guest Provisioning 37 Configuring Guest Provisioning User 37 Configuring the Guest-Provisioning Page 38 Modifying Guest Fields on the GPP 38 Modifying Page Design of the GPP 42 Email Options for the GPP 42 Creating Guest User Accounts 44 Chapter 6: Optional Configurations for Guest Network 47 Time Range 47 Bandwidth Contracts 51 Maximum User Sessions for Guest Role 54 Walled Garden 56 Prioritizing Employee Traffic Using Traffic Management Profile 58
  • 4. Aruba Networks, Inc. Table of Contents | 4 Guest Access with ArubaOS Application Note Optional SSID and VAP Profile Parameters for Guest Network 58 Disabling lower Data Rates 58 Denying Inter User Traffic 60 Appendix A: Contacting Aruba Networks 61 Contacting Aruba Networks 61
  • 5. Aruba Networks, Inc. Introduction | 5 Guest Access with ArubaOS Application Note Chapter 1: Introduction Every organization, big or small, wants to provide some sort of network access to visitors. The visitors may be guests, contractors, auditors, or partners. The Aruba guest access solution provides role- based access to each category of visitors and secures the sensitive corporate resources. In typical Aruba guest access deployment, the guest users are prevented from accessing private network resources, and the contractors and partners can be give restricted access to some corporate resources. Managing visitor accounts has always been difficult for IT teams. The Aruba guest access solution simplifies guest provisioning by allowing authorized non-IT professionals, such as receptionists, to create and delete guest accounts. Additional features include customizable captive portal pages and the ability to gather detailed account information. This guide explains the configuration of enterprise guest access using the captive portal capabilities of the base ArubaOS software. Table 1 lists the current software versions for this guide. Reference Material This technical document assumes that the reader is familiar with the Aruba technology and knows how to set up a working WLAN using profiles such as SSID, VAP, and AAA profiles. The following prerequisite documentation is highly recommended before reading this document:  Aruba 802.11n Networks Validated Reference Design, available at www.arubanetworks.com/vrd  Aruba Campus Wireless Networks Validated Reference Design, available at www.arubanetworks.com/vrd.  The complete suite of Aruba technical documentation is available for download from the Aruba support site. These documents present complete, detailed feature and functionality explanations outside the scope of the VRD series. The Aruba support site is located at: https://support.arubanetworks.com/. This site requires a user login and is for current Aruba customers with support contracts. Table 1 Aruba Software Versions Product Version ArubaOS™ (mobility controllers) 6.1 ArubaOS (mobility access switch) 7.0 Aruba Instant™ 1.1 MeshOS 4.2 AirWave® 7.3 AmigopodOS 3.3
  • 6. Aruba Networks, Inc. ArubaOS or Amigopod for Visitor Management | 6 Guest Access with ArubaOS Application Note Chapter 2: ArubaOS or Amigopod for Visitor Management Businesses provide guest access for different reasons. Some organizations provide free guest access while others provide it as a paid service. Depending on the type of business, the guess access service has a varying degree of impact. Most large enterprises provide guest access as an amenity. Some businesses such as cafés and restaurant chains provide free guest access as a means to drive their core business, while others such as airports and hotels use it as a form of revenue. The Aruba guest access solution is designed to meet the guest access needs of all businesses. Aruba supports two methods of guest access, using just the mobility controller or using the mobility controller plus Amigopod. ArubaOS supports basic guest management and captive portal functionality, with guest access limited to a single master-local cluster. Aruba Amigopod extends the standard ArubaOS captive portal functionality by providing many advanced features, including:  A fully branded user interface  Short Message Service (SMS) integration for delivery of receipts  Bulk upload of visitors for conference management  Self-provisioning of users for public space environments Choosing the right solution for your deployment depends on your guest access requirements. Table 2 summarizes the capabilities of the two Aruba guest access solutions. Table 2 Comparison of ArubaOS Guest Access and Amigopod Feature ArubaOS ArubaOS Plus Amigopod Not supported = Limited support = Supported = Captive Portal Customization Captive portal customization Captive portal per-SSID customization Anonymous logon One time tokens/access codes Welcome page with session statistics and logout Mobile browser aware captive portal pages Skins: UI branding customization Guest Account Provisioning Single point of management for guest account and captive portal in multiple master controller deployments Non-IT staff do not require IP access to master controller for provisioning guest accounts Guest-provisioning operator role
  • 7. Aruba Networks, Inc. ArubaOS or Amigopod for Visitor Management | 7 Guest Access with ArubaOS Application Note Customizable guest-provisioning operator role External servers for operator logins Provisioning of nonguest user roles by operators Limit operators to view only the account they created Self-registration workflow with automated login Sponsor-approved self-registration Time zone support for guest access in distributed deployments Bulk provisioning of guest accounts (CSV import and automatic generation) Export/import of user database Mandatory and nonmandatory fields Guest password complexity requirements Guest account information printing via templates Guest credential delivery through email and SMS Force password change on first login Delete and/or disable guest accounts on expiration Guest Session Management Time and day policy Guest access expiry timer starts on first login Limit access based on total session time across multiple logins Limit guest session data (total bytes) Limit guest session bandwidth (Mb/s) Limit guest session to single concurrent login Hotspot and Hospitality Features Walled garden Plug-and-play clients, any IP VPN NAT (static NAT per client using public IP) Credit card billing Surveys and feedback forms Target ads and promotions Table 2 Comparison of ArubaOS Guest Access and Amigopod (Continued) Feature ArubaOS ArubaOS Plus Amigopod
  • 8. Aruba Networks, Inc. ArubaOS or Amigopod for Visitor Management | 8 Guest Access with ArubaOS Application Note Visitor data mining MAC or cookie-based reauthentication (portal bypass) Reporting and Notification Peak guest network usage Total guest sessions (per day, per week, etc.) Bandwidth usage on guest network Top x users (session time and bandwidth) Expiring passwords Enterprise Features and Scalability Managing 1000s of accounts High availability/redundancy Expandability (plug-in architecture) Table 2 Comparison of ArubaOS Guest Access and Amigopod (Continued) Feature ArubaOS ArubaOS Plus Amigopod
  • 9. Aruba Networks, Inc. Guest Networks with Captive Portal Authentication | 9 Guest Access with ArubaOS Application Note Chapter 3: Guest Networks with Captive Portal Authentication Guest networks are often defined by what the guest is not allowed to do and where they are not allowed to go. These are the most common guest usage requirements in enterprises deployments:  Guest users must be separated from employee users.  Guests must be limited by:  What resources they can access  What protocols they are allowed to use  What time of the day they can access the network  The amount of bandwidth or air time they can use  Guests should be allowed to access only the local resources that are required for IP connectivity. These resources include DHCP and possibly DNS if an outside DNS server is not available. Aruba recommends the use of a public DNS server for guest networks.  All other internal resources should be unavailable for the guest.  Employee traffic should be prioritized on the wireless medium. The native ArubaOS can be configured to address these requirements of an enterprise network. Captive Portal Wireless networks used by corporate employees should always be secured using Layer 2 methods such as WPA2. For guest access, providing Layer 2 authentication using pre-shared keys (PSK) or 802.1X is not a viable solution due to the technical complexity. Instead authentication is moved to Layer 3. Captive portal authentication is a Layer 3 authentication method that redirects users to a captive portal page when they start a web session. The captive portal page can be used for various purposes, such as authenticating the guest using a user name and password, providing an acceptable use policy, or self registration with an email address. Captive portal on ArubaOS can be configured to authenticate guest users based on user/password or valid email ID information. The system can also be configured simply to present an acceptable use policy and an accept button through custom configuration of the HTML page. ArubaOS does not support the use of advanced features such as payment services, but it can redirect to other portals such as Amigopod for additional services. Captive Portal Authentication Process Captive portal is a Layer 3 authentication, which requires that the devices connect to the network and obtain an IP address and related DNS information before authenticating through the captive portal. The following steps explain the entire captive portal process when the native ArubaOS is used for captive portal authentication: 1. The device that is associating to the guest SSID is assigned an initial role (guest-logon role in the example configuration). This initial role allows DHCP, so the user gets an IP address. 2. The user opens a browser and makes an HTTP (or HTTPS) request to some destination (for example, www.bbc.com).
  • 10. Aruba Networks, Inc. Guest Networks with Captive Portal Authentication | 10 Guest Access with ArubaOS Application Note 3. The resolver in the device sends a DNS request to resolve the www.bbc.com. The initial role (guest-logon role) permits DNS services, so the resolver can communicate with the DNS server. 4. The DNS server replies with the correct address to www.bbc.com. 5. The resolver tells the browser which IP address to use based on the DNS reply. 6. The browser initiates a TCP connection to port 80 of the www.bbc.com address. 7. The controller intercepts the connection and spoofs the initial TCP handshakes of the HTTP process. At this moment, the client browser thinks it is communicating with the bbc.com server. 8. When the browser sends the HTTP GET request for the web page, the controller replies saying that bbc.com has “temporarily moved” to <https://securelogin.arubanetworks.com/[string that identifies client]>. 9. The browser closes the connection. 10.The browser attempts to connect with <https://securelogin.arubanetworks.com/[string that identifies client]>, but it first needs to send a DNS request for the address. 11.The actual DNS server responds that it cannot resolve <https://securelogin.arubanetworks.com>, but the controller intercepts that reply and changes the packet to say that securelogin.arubanetworks.com is at the IP address of the controller itself. Remember that it is critical that the DNS server sends back a reply to the query.  It is only then that the controller can spoof the reply back from the DNS server.  Sending a DNS request without receiving a reply is not sufficient, since without a reply the controller will never help the client resolve securelogin.arubanetworks.com. 12.The browser initiates an HTTPS connection to address of controller, which responds with the captive portal login page, where the guest authenticates. 13.After successful authentication, the user is assigned the post authentication role (auth-guest role in the example configuration). This is the default role in the captive portal profile. 14.After authentication, the browser is redirected to bbc.com at the address originally resolved by the DNS. Alternatively, if a welcome page is configured, the browser is redirected to the welcome page. 15.To successfully redirect to the original web page the controller spoofs a reply from bbc.com to tell the client that bbc.com has “permanently moved” to bbc.com. This step corrects the “temporary relocation” that occurred as part of the captive portal login. 16.This causes the client to re-query DNS for the address of www.bbc.com. 17.The browser starts to communicate with the actual bbc.com server.
  • 11. Aruba Networks, Inc. Guest Networks with Captive Portal Authentication | 11 Guest Access with ArubaOS Application Note Guest Provisioning Usually, guest users are required to provide a username and password for captive portal authentication. These guest accounts must be created on the authentication server against which the guest users are authenticated. Every time a guest user account has to be created, an IT staff must login to the authentication server and create it. Adding guest accounts to the authentication server quickly becomes a cumbersome task for the IT team. Aruba guest provisioning solves this problem by allowing non-IT professionals, such as receptionists, to create and delete guest accounts. The Amigopod and base ArubaOS software have guest provisioning capabilities. Any authentication server type available on ArubaOS can be used as the authentication server for captive portal authentication. However, if the base ArubaOS software is used for guest provisioning, only the internal database of the controller can be used as the authentication server for captive portal authentication. Licenses Required Captive portal authentication is supported on the base ArubaOS software and it does not require any separate license. However, configuration of guest specific user roles requires the PEFNG license to be present on the mobility controller. Certificates The Aruba controller ships with a default server certificate. This certificate demonstrates the secure login process of the controller for captive portal, secure shell (SSH), and WebUI management access. This certificate is not recommended for use in a production network. Aruba strongly recommends that you replace this certificate with a unique certificate that is issued to the organization or its domain by a trusted certificate authority (CA).
  • 12. Aruba Networks, Inc. Captive Portal Configuration | 12 Guest Access with ArubaOS Application Note Chapter 4: Captive Portal Configuration A number of tasks are necessary to configure a fully functional guest WLAN. Some of this work is simplified through the use of the configuration wizards, and Aruba highly recommends that you use the wizard where possible. The following list outlines the tasks necessary to configure captive portal authentication: 1. Configure the guest VLAN and related DHCP services (required) 2. Configure guest user roles (required) 3. Configure captive portal profile (required) 4. Configure an SSID profile (required) 5. Configure a AAA profile (required) 6. Configure a VAP profile (required) 7. Configure guest provisioning and create guest user accounts (required) 8. Configure time restrictions (optional) 9. Configure bandwidth contracts (optional) 10.Configure maximum session count (optional) 11.Configure walled garden (optional) 12.Configure traffic management profile (optional) Guest VLAN and Related DHCP Services The guest users must be isolated to a subnet that is hidden from the corporate network. Defining a VLAN (subnet) that is local to the controller restricts the guests to a subnet that is not routable in the core network. This VLAN adds an additional layer of security to the design by hiding the IP addressing scheme used in the core network from guests and users who accidentally associate with the guest WLAN. The guest VLAN is local to the controller, so it is essential to source-NAT this VLAN and define the required DHCP and DNS services. The controller should be the DHCP server for the guest VLAN and this VLAN should be source-NATed by the IP address of the controller to which the VLAN belongs. Source-NATing allows the guest users to reach the allowed destinations while they are still isolated from the core network. N O T E The VLAN and DHCP services required for the guest network should be configured on the controller that terminates the APs. In a master/local deployment, this is usually the local controller.
  • 13. Aruba Networks, Inc. Captive Portal Configuration | 13 Guest Access with ArubaOS Application Note Table 3 and Table 4 and Figure 1 through Figure 5 show the configuration of a guest VLAN and the related DHCP services. Guest VLAN Configuration ! interface vlan 900 interface vlan 900 ip address 192.168.200.1 255.255.255.0 ! Figure 1 Creating a VLAN Table 3 Guest VLAN VLAN ID IP 900 192.168.200.1
  • 14. Aruba Networks, Inc. Captive Portal Configuration | 14 Guest Access with ArubaOS Application Note Figure 2 Configuring IP parameters for the guest VLAN Figure 3 Guest VLAN
  • 15. Aruba Networks, Inc. Captive Portal Configuration | 15 Guest Access with ArubaOS Application Note Source-NAT Configuration for the Guest VLAN ! interface vlan 900 ip nat inside ! Figure 4 Source-NATing the guest VLAN Table 4 DHCP Services for the Guest VLAN Pool Name Default Router DNS Server Network Netmask guestpool 192.168.200.1 208.67.222.222 (Public DNS server) 208.67.222.220 (Public DNS server) 192.168.200.0 255.255.255.0 N O T E Test that the DNS services are working properly from the guest subnet. A functional DNS service is an integral part of captive portal authentication process.
  • 16. Aruba Networks, Inc. Captive Portal Configuration | 16 Guest Access with ArubaOS Application Note DHCP Server Configuration for the Guest VLAN ! ip dhcp pool "guestpool" default-router 192.168.200.1 dns-server 208.67.222.222 208.67.222.220 network 192.168.200.0 255.255.255.0 ! service dhcp ! Figure 5 Configuring the DHCP pool
  • 17. Aruba Networks, Inc. Captive Portal Configuration | 17 Guest Access with ArubaOS Application Note Figure 6 Enabling the DHCP server Guest User Roles In the Aruba user-centric network, every client is associated with a user role. The user roles that are enforced through the firewall policies determine the network privileges of a user. A policy is a set of rules that applies to the traffic that passes through the Aruba devices. The rules and policies are processed in a top-down fashion, so the position of a rule within a policy and the position of a policy within a role determine the functionality of the user role. When you construct a role, you must put the rules and policies in the proper order. Usually, guests are assigned two different roles. The first role is assigned when they associate to the guest SSID, and the other is assigned when they authenticate successfully through the captive portal. Only the guests who successfully authenticate are allowed to use to the services needed to connect to the Internet. Consider the guest-logon role as the initial role and the auth-guest role for authenticated guests. Before these two roles are configured, the policies that are associated with them must be configured. The guest-logon role uses these policies:  captiveportal (predefined policy)  guest-logon-access N O T E Use the public DNS server in your location. If a public DNS server is not available in your region, the guest users should be allowed access to the internal DNS server.
  • 18. Aruba Networks, Inc. Captive Portal Configuration | 18 Guest Access with ArubaOS Application Note The auth-guest role uses these policies:  cplogout (predefined)  guest-logon-access  block-internal-access  auth-guest-access  drop-and-log A policy might have one or more rules that apply to several networks or hosts. Creating a separate rule for each host or network might be laborious and will increase the number of rules in the policy. The network destination alias feature in the ArubOS can be used to simplify firewall polices that have a set of rules that are common to a group of hosts, domains, or networks. Network Destination Alias The network destination alias feature in the ArubaOS can be used to group several hosts or networks. Aliases can be used when several rules have protocols and actions common to multiple hosts or networks. Alias allows the addition of domain/host names and IP addresses. The IP addresses can be added by host, network, or range. When the invert parameter of an alias is enabled, the rules that use that alias are applied to all the IP addresses, domains and hostnames except those specified in the alias. Table 5 lists the aliases that will be useful in configuration of user roles. Network Destination Alias Configuration ! netdestination Internal-Network network 10.0.0.0 255.0.0.0 network 172.16.0.0 255.240.0.0 network 192.168.0.0 255.255.255.0 ! netdestination Public-DNS host 208.67.222.222 host 208.67.222.220 ! Table 5 Aliases Alias Name Purpose IP Address/ Range Public-DNS Defines the public DNS servers Host 208.67.222.222 208.67.222.220 These are OpenDNS servers. For more details on OpenDNS see www.opendns.com Internal-Network Defines the private IPv4 address range Network 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16
  • 19. Aruba Networks, Inc. Captive Portal Configuration | 19 Guest Access with ArubaOS Application Note Figure 7 Aliases
  • 20. Aruba Networks, Inc. Captive Portal Configuration | 20 Guest Access with ArubaOS Application Note Defining Guest Access Policies Guest roles are made up of a number of polices that can be predefined and reused in the system. The following sections describe the policies that will be used to define the rights of the guest in their various roles. Configuring the guest-logon-access Policy The guest-logon-access policy is similar to predefined logon-control policy, but it is much more restrictive. The guest-logon-access policy is a part of the guest-logon and auth-guest roles. The rules defined in this policy allow these exchanges:  Allow DHCP exchanges between the user and the DHCP server, but block other users from responding to DHCP requests.  Allow DNS exchanges between the user and the public DNS server. Remember that the guests should be allowed to access only the local resources that are required for IP connectivity. These resources include DHCP and possibly DNS if an outside DNS server is not available. Table 6 summarizes the rules used by the guest-logon-access policy. guest-logon-access Policy Configuration ! ip access-list session guest-logon-access user any udp 68 deny position 1 any any svc-dhcp permit position 2 user alias Public-DNS svc-dns permit position 3 ! Table 6 guest-logon-access Policy Rule Number Source Destination Service Action Purpose 1 User Any UDP min port = 68 max port = 68 Drop This rule drops responses from a personal DHCP server. This action prevents the clients from acting as DHCP servers. 2 Any Any Service svc-dhcp (udp 67 68) Permit This rule allows clients to request and discover DHCP IP addresses over the network. The DHCP server on the network does not fall under the user category. Therefore, its response on port 68 is not dropped by the first rule. The first two rules guarantee that DHCP is processed only by legitimate DHCP servers on the network. 3 User Alias Public-DNS Service svc-dns (udp 53) permit This rule allows DNS queries only to the DNS servers that are defined in the Public-DNS alias.
  • 21. Aruba Networks, Inc. Captive Portal Configuration | 21 Guest Access with ArubaOS Application Note Figure 8 guest-logon-access policy Configuring the block-internal-access Policy The internal resources of an organization should be available only to employees or to trusted groups. Guest users are not part of the trusted entity, so they must be denied access to all internal resources. As the name implies, the block-internal-access policy denies access to all internal resources. This policy is a part of the guest-logon and auth-guest roles. Table 7 summarizes the rules used by the block-internal-access policy. block-internal-access Policy Configuration ! ip access-list session block-internal-access user alias Internal-Network any deny position 1 ! Table 7 block-internal-access Policy Rule Number Source Destination Service Action Purpose 1 user Alias Internal-Network any drop This rule denies access to all the addresses that are in the Internal- Network alias.
  • 22. Aruba Networks, Inc. Captive Portal Configuration | 22 Guest Access with ArubaOS Application Note Figure 9 block-internal-access policy Configuring the auth-guest-access Policy The most important purpose of the auth-guest-access policy is to define the protocols and ports that the users are allowed to access. This policy is an integral part of the auth-guest role. The auth-guest- access policy allows HTTP and HTTPS traffic to go to any destination from the user. When this policy is combined with the block-internal-access policy in the auth-guest role, the users will be allowed HTTP and HTTPS access to the public websites only. Table 8 summarizes the rules used by the auth-guest-access policy. N O T E If you want your guest users to use their IPsec clients, create rules in this policy that allows the use of ports 4500 (for IPsec NAT-T) and 500 (for IKE). Table 8 auth-guest-access Policy Rule Number Source Destination Service Action Purpose 1 User Any Service svc-http permit This rule allows HTTP traffic from the users to any destination. 2 User Any Service svc-https permit This rule allows HTTPS traffic from the users to any destination.
  • 23. Aruba Networks, Inc. Captive Portal Configuration | 23 Guest Access with ArubaOS Application Note auth-guest-access Policy Configuration ! ip access-list session auth-guest-access user any svc-http permit position 1 user any svc-https permit position 2 ! Figure 10 auth-guest-access policy Configuring the drop-and-log Policy The drop-and-log policy denies all traffic and records the network access attempt. Table 9 summarizes the rule used by the drop-and-log policy. N O T E The logging function in this policy increases your syslog repository. If you do not require logging, remove the log action from the firewall rule of this policy. Table 9 drop-and-log Policy Rule Number Source Destination Service Action Log Purpose 1 User Any Any Deny Yes This rule denies access to all services on the network and logs the network access attempt.
  • 24. Aruba Networks, Inc. Captive Portal Configuration | 24 Guest Access with ArubaOS Application Note drop-and-log Policy Configuration ! ip access-list session drop-and-log user any any deny log position 1 ! Figure 11 drop-and-log policy Configuring the guest-logon Role The guest-logon role is the first role that is assigned to the users when they associate with the guest SSID. Users in this role have access only to the DHCP/DNS services and are redirected to the captive portal page whenever they try to access a web page. The captive portal page requires login credentials. The captive portal authentication profile that is appended to this role specifies the captive portal login page and other configurable parameters such as the default role and the type of login. To create and add the captive portal authentication profile to this guest role, see Configuring the Captive Portal Authentication Profile on page 30. Table 10 describes the policies in the guest-logon role. Table 10 guest-logon Role Policy Number Policy Name Purpose 1 captiveportal (predefined policy) This predefined policy initiates captive portal authentication. This policy redirects any HTTP or HTTPS traffic to port 8080, 8081, or 8088 of the controller. When the controller sees traffic on these ports, it checks the captive portal authentication profile associated with the current role of the user and processes the values specified on this profile. 2 guest-logon-access This policy allows DHCP and DNS services. For details, see Configuring the guest-logon-access Policy on page 20.
  • 25. Aruba Networks, Inc. Captive Portal Configuration | 25 Guest Access with ArubaOS Application Note guest-logon Role Configuration ! user-role guest-logon access-list session captiveportal position 1 access-list session guest-logon-access position 2 ! Figure 12 guest-logon role Configuring the auth-guest Role The auth-guest role is assigned to users after they authenticate successfully through the captive portal. This role is the default role in the captive portal authentication profile. This role allows only HTTP and HTTPS services to Internet. Sometimes an organization wants its guest users to use the printers in the internal network. In such cases, create a separate policy that allows user traffic to an alias called printers. This alias must include only the IP address of the printers that the guests are allowed to use. Place this policy in the auth-guest user role just above the block-internal-access policy.
  • 26. Aruba Networks, Inc. Captive Portal Configuration | 26 Guest Access with ArubaOS Application Note Table 11 describes the policies in the auth-guest role. auth-guest Role Configuration ! user-role auth-guest access-list session cplogout position 1 access-list session guest-logon-access position 2 access-list session block-internal-access position 3 access-list session auth-guest-access position 4 access-list session drop-and-log position 5 ! Table 11 auth-guest Role Policy Number Policy Name Purpose 1 cplogout (predefined policy) This policy makes the controller present the captive portal logout window. If the user attempts to connect to the controller on the standard HTTPS port (443), the client is NATed to port 8081, where the captive portal server will answer. If this rule is not present, a wireless client may be able to access the administrative interface of the controller. 2 guest-logon-access This policy denies personal DHCP servers and provides legitimate DHCP services and DNS. 3 block-internal-access This policy blocks access to internal network. This policy should be placed before the next policy that allows HTTP and HTTPS service, otherwise guest users will have access to the internal websites. 4 auth-guest-access This policy allows HTTP and HTTPS services to any destination. 5 drop-and-log Any traffic that does not match the previous policies encounters this policy. This policy denies all services and logs the network access attempt.
  • 27. Aruba Networks, Inc. Captive Portal Configuration | 27 Guest Access with ArubaOS Application Note Figure 13 auth-guest Configuring the SSID Profile for Guest WLAN As previously mentioned, guest SSIDs typically do not provide any Layer 2 authentication and encryption. The Layer 2 authentication type used is open. In open authentication, hello messages are exchanged with the client before it is allowed to associate and obtain necessary IP information. All the user traffic is unencrypted. The users that associate to this SSID are placed in the guest VLAN. This WLAN uses captive portal to authenticate the users. Captive portal with open Layer 2 authentication should never be used for employee networks, because captive portal does not provide encryption. The wireless traffic is visible to anyone doing a passive packet capture unless the data is encrypted by higher-layer protocols such as HTTPS and IPsec. N O T E If you require encryption of data for guest users, other Layer 2 authentication types such as WPA2-PSK can be used before the users are redirected to the captive portal. However, this approach requires that credentials such as the pre-shared key are distributed to all guest users.
  • 28. Aruba Networks, Inc. Captive Portal Configuration | 28 Guest Access with ArubaOS Application Note Table 12 summarizes the parameter in the sample guest SSID profile. Guest SSID Profile Configuration ! wlan ssid-profile "guestnet" essid "Guest" opmode opensystem ! Figure 14 Guest SSID profile configuration Table 12 Guest SSID Profile SSID Profile Network Name (SSID) Authentication Encryption WMM Purpose guestnet Guest Open none __ Guest users. (Captive portal is used to provide Layer 3 authentication.)
  • 29. Aruba Networks, Inc. Captive Portal Configuration | 29 Guest Access with ArubaOS Application Note Configuring the Internal Database for Guest Authentication The user credentials provided by the captive portal users must be authenticated against an authentication server. Any server type available in ArubaOS can be used as an authentication server, including the internal database. If the guest provisioning feature of ArubaOS is required, the internal database must be used as the authentication server. Create a server group that defines the internal database of the controller as the authentication server. By default, the credentials entered on the captive portal page by the guests are validated against the user credentials in the database of the master controller. So, in a master/local operation all the guest user accounts are created in the internal database of the master controller. For details about using the internal database of the local controllers for guest accounts in master/local deployments, see Chapter 5: Guest Provisioning. Table 13 lists the parameter in the Guest-internal server group. Server Group Configuration ! aaa server-group "Guest-internal" auth-server Internal ! Figure 15 Server group Table 13 Server Group Server Guest-internal Internal (predefined)
  • 30. Aruba Networks, Inc. Captive Portal Configuration | 30 Guest Access with ArubaOS Application Note Configuring the Captive Portal Authentication Profile As discussed earlier, to authenticate the users who are associated with the guest SSID via captive portal, you must define and attach a captive portal profile to the initial role that is assigned to the guest users. Configurable parameters such as the default role, type of login (user or guest), welcome page, and others are available in a captive portal profile. The default captive portal page in the ArubaOS is customizable. Table 14 summarizes the most important parameters of the captive portal profile and the configuration used in the example. Table 14 Captive portal profile Parameter Purpose Sample Configuration (guestnet captive portal profile) User login A username and password is necessary to pass captive portal authentication when user login is enabled. Users authenticating through user login are assigned the role specified in the default role field of the captive portal profile. enabled Default role This role is assigned to users after successful authentication through user login. auth-guest Guest login The captive portal does not request any credentials and the users can login by providing a valid email address. Users authenticating through guest login are assigned the role specified in the default guest role field of the captive portal profile. When user login and guest login is enabled, users can login using either credentials or valid email address. diasbled Default Guest role This role is assigned to users after successful authentication through guest login. _ Logout popup window Presents a logout window after the user is authenticated. If this is disabled, the user will be logged in until the user age-out is reached or until the client device is rebooted. Pop-up blockers in the browsers may block this pop-up. enabled Login page This is the captive portal page that is displayed to the users. This can be the default page, the new customized page, or any external captive portal page such as the one hosted on Amigopod. /auth/index.html Welcome page This is the welcome page that is displayed after successful authentication. /auth/welcome.html Show Welcome Page This enables the welcome page. If disabled, the authenticated user is redirected automatically to the page he was trying to browse initially. enabled Allow only one active user session If enabled, only one active session is allowed per username/password. enabled White List Lists the aliases to which the unauthenticated users are allowed access. For details, see Walled Garden on page 56. --
  • 31. Aruba Networks, Inc. Captive Portal Configuration | 31 Guest Access with ArubaOS Application Note Remember to add a server group, which defines internal database as the authentication server, to the captive portal profile. Captive Portal Configuration ! aaa authentication captive-portal "guestnet" default-role "auth-guest" no guest-logon server-group "Guest-internal" logout-popup-window login-page "/auth/index.html" welcome-page "/auth/welcome.html" show-acceptable-use-policy ! Black List Lists the aliases to which the unauthenticated users are denied access. For details, see Walled Garden on page 56. -- Show the acceptable use policy page If enabled, it displays the acceptable use policy during captive portal authentication. For detail, see Walled Garden on page 56. enabled Table 14 Captive portal profile (Continued) Parameter Purpose Sample Configuration (guestnet captive portal profile)
  • 32. Aruba Networks, Inc. Captive Portal Configuration | 32 Guest Access with ArubaOS Application Note Figure 16 Captive portal profile (using the sample configuration in Table 14)
  • 33. Aruba Networks, Inc. Captive Portal Configuration | 33 Guest Access with ArubaOS Application Note Figure 17 Captive portal page when user and guest login are enabled Figure 18 Captive portal page for user login
  • 34. Aruba Networks, Inc. Captive Portal Configuration | 34 Guest Access with ArubaOS Application Note Figure 19 Captive portal page for guest login After you configure the captive portal profile, append it to the initial role, which is the guest-logon role in the example configuration. Appending Captive Portal Profile to Initial Guest Role ! user-role guest-logon captive-portal guestnet !
  • 35. Aruba Networks, Inc. Captive Portal Configuration | 35 Guest Access with ArubaOS Application Note Figure 20 Appending the captive portal profile to the initial guest role
  • 36. Aruba Networks, Inc. Captive Portal Configuration | 36 Guest Access with ArubaOS Application Note Configuring the AAA Profile for Guest WLAN The AAA profile defines the user role assigned to authenticated and unauthenticated users. Since the guest SSID is open, any user associating is given the user role specified as the initial role in the AAA profile. The initial guest role should be the initial role in the AAA profile. In the example configuration this is the guest-logon role. Table 15 lists the initial role of the guest AAA profile. Guest AAA Profile Configuration ! aaa profile "guestnet" initial-role "guest-logon" ! Figure 21 Guest AAA profile configuration After completing all the above configurations, create the required VAP profile and attach it to an AP group. For details about configuring the VAP profiles and AP groups, see the Aruba Campus Wireless Networks Validated Reference Design. Table 15 Guest AAA Profile AAA Profile Name Initial Role guestnet guest-logon
  • 37. Aruba Networks, Inc. Guest Provisioning | 37 Guest Access with ArubaOS Application Note Chapter 5: Guest Provisioning Guest provisioning allows authenticated non-IT members to create and delete visitor accounts. Guest provisioning eliminates the need for an IT staff to be involved every time a user account has to be created. A guest-provisioning user is usually a front-desk person, such as a receptionist, but it can be anyone in the organization. As mentioned before, to use the guest-provisioning capabilities of the base ArubaOS software, the internal database on the controller must be used as the authentication server for captive portal authentication. The user accounts can be created in the internal database of the controller by the members of the IT team who have root access to the controller and by authenticated guest-provisioning users. An authenticated guest-provisioning user can only create guest accounts. A guest-provisioning user does not see the same interface seen by a root user, but instead he is presented with a guest provisioning page. The guest provisioning user can create, delete, or modify the guest accounts that they create. Configuring Guest Provisioning User You can configure and authenticate a guest-provisioning user in one of three ways:  Local authentication on the controller using user name and password  Smart cards  Other External authentication servers supported on ArubaOS A guest-provisioning users should always authenticate to the mobility controller that holds the account database, usually the master. The guest accounts created by a guest-provisioning user are always added to the internal database of the controller to which the guest-provisioning user authenticated. In master/local deployments, the guest credentials are authenticated against the internal database of the master controller by default. However, certain deployments may require that the guest accounts in a region reside on the local controller for that region. The requirements for using the internal database of the local controller for guest authentication in a master/local deployment are these: 1. The local controller must be configured to use the internal database of the local controllers and not the master to authenticate the users terminating on that local controller. To configure this, issue the “aaa authentication-server internal use-local-switch” command in the command line interface (CLI) of the local controller that has to use its internal database to authenticate users. 2. Guest-provisioning accounts must be created on the local controller that will be using its internal database for guest authentication. These guest-provisioning users authenticate to the local controller and the guest accounts created by them are added to the internal database on the local controller. N O T E A guest user account that is created by a guest provisioning user can only be viewed, modified, or deleted by the guest-provisioning user who created the account or by the network administrator. A guest user account that is created by the network administrator can only be viewed, modified, or deleted by the network administrator.
  • 38. Aruba Networks, Inc. Guest Provisioning | 38 Guest Access with ArubaOS Application Note A network administrator with root access to the controller can create a guest-provisioning user on the controller for local authentication. To create guest-provisioning user, add a management user account with the role set to guest-provisioning. The predefined guest-provisioning role available on the ArubaOS software cannot be edited. Creating a Guest-Provisioning User Account on the Controller ! mgmt-user "receptionist" "guest-provisioning" ****** ! Figure 22 Creating a guest-provisioning user on the Aruba controller Configuring the Guest-Provisioning Page The guest-provisioning page (GPP) is the web page that is displayed to the authenticated guest- provisioning users. GPP is used by the guest-provisioning users to create, delete, and modify accounts. The GPP that is displayed to an authenticated guest-provisioning user can be modified. The network administrator can modify the fields displayed in the GPP, the design of the GPP, and the email options for the created accounts. Modifying Guest Fields on the GPP When a guest-provisioning user creates a guest user account, he is required to enter certain information about the guest such as the guest username, password, company name, email ID, and phone number. The guest fields on the GPP define the information that a guest-provisioning user has to supply when he creates a guest account. These guest fields can be modified.
  • 39. Aruba Networks, Inc. Guest Provisioning | 39 Guest Access with ArubaOS Application Note The Guest Fields tab has these columns:  Internal Name: The unique identifier that is mapped to the label in the UI. This filed cannot be edited.  Label in UI: Name of the field display on the main GPP and while creating guest accounts.  Display in Details: The fields of the guest account that are selected as “display in details” are hidden from the main GPP. These fields are shown only when the show details parameter in the GPP is enabled and a user account is selected.  Display in Listing: These fields of the guest account are displayed on the main GPP by default. Figure 23 Editing guest-provisioning fields
  • 40. Aruba Networks, Inc. Guest Provisioning | 40 Guest Access with ArubaOS Application Note Figure 24 Guest-provisioning fields displayed on the GPP Figure 25 Display In Listing fields shown on the GPP
  • 41. Aruba Networks, Inc. Guest Provisioning | 41 Guest Access with ArubaOS Application Note Figure 26 Display In Details fields shown only when the Show details field is enabled on the GPP
  • 42. Aruba Networks, Inc. Guest Provisioning | 42 Guest Access with ArubaOS Application Note Modifying Page Design of the GPP The page design of the GPP can be modified to add or change the company banner, heading and text, and background colors that appear on the GPP. Figure 27 GPP Page Design Email Options for the GPP The email options of guest provisioning allows you to edit the subject, from address field and the body of the email send, to the guests and sponsors. Emails can be chosen to be sent automatically when an account is created or manually from the GPP at any time. To send emails to the guests and sponsors from the controller, the simple mail transfer protocol (SMTP) parameters on the controller must be configured. To configure SMTP on the controller, this information is required:  IP address of the SMTP server  SMTP port number (port 25) Aruba controller does not support the use of secure simple mail transfer protocol (SMTPS).
  • 43. Aruba Networks, Inc. Guest Provisioning | 43 Guest Access with ArubaOS Application Note SMTP Configuration ! guest-access-email smtp-server "10.10.10.100" smtp-port 25 ! Figure 28 SMTP configuration for sending guest-provisioning emails
  • 44. Aruba Networks, Inc. Guest Provisioning | 44 Guest Access with ArubaOS Application Note Modifying Email Options Figure 29 Guest-provisioning email options Creating Guest User Accounts The users with root access to the controller can create the guest accounts directly in the internal database or they can navigate to the < https://<controller IP or FQDN>/switch/gpp.html> and login using their root access credential to view the GPP and create guest accounts on it. For guest-provisioning users, the guest accounts created in the GPP are added automatically to the internal database of the controller to which the guest-provisioning users authenticated. ArubaOS provides the option of importing a list of guest user accounts in CSV file format. Remember that a guest-provisioning user can create only guest accounts.
  • 45. Aruba Networks, Inc. Guest Provisioning | 45 Guest Access with ArubaOS Application Note To create a guest account on the GPP, the guest-provisioning user must perform these tasks: 1. Click the New tab on the GPP. 2. Fill the guest fields. 3. If required, send emails manually. Figure 30 Creating guest accounts using guest provisioning (step 1) Figure 31 Creating guest accounts using guest provisioning (step 2) N O T E Guest user accounts are automatically removed from the internal database when they expire.
  • 46. Aruba Networks, Inc. Guest Provisioning | 46 Guest Access with ArubaOS Application Note Figure 32 Manually sending emails for guests and sponsors from GPP Figure 33 Creating guest accounts directly on the internal database using root access
  • 47. Aruba Networks, Inc. Optional Configurations for Guest Network | 47 Guest Access with ArubaOS Application Note Chapter 6: Optional Configurations for Guest Network All the configurations explained in Chapter 4: Captive Portal Configuration and Chapter 5: Guest Provisioning are necessary to build a functional guest network with guest provisioning. In addition, ArubaOS provides features such as bandwidth contracts, walled garden, and time range that are optional and are not critical for the operation for a guest WLAN. This chapter explains these optional features in detail. Time Range A time-of-day restriction policy can be used to allow guests to access the network only during normal working hours, because they should be using the network only while conducting official business. A time-of-day restriction policy prevents guest users from using the network after normal working hours. You can define a time range in ArubaOS that can be used in firewall policies to allow users to associate to the guest network only during certain hours of the day. Figure 34 Guest access with a time limit The types of time ranges available are these: 1. Absolute: This time range starts and ends on a specific date and at a specific time. 2. Periodic: This recurring time-range starts and ends at a specific time. The recurring interval can to set to be daily, weekdays, weekends, or any particular day of the week. Table 16 lists the parameters used in the configuration of a time range named Working-hours. Time Range Configuration ! time-range "Working-hours" periodic Weekday 07:00 to 17:30 ! Table 16 Time Range Name Type Start Date Start Time End Time Working-hours periodic weekday 07:00 17:30 arun_060 No access after hours Access controlled
  • 48. Aruba Networks, Inc. Optional Configurations for Guest Network | 48 Guest Access with ArubaOS Application Note Figure 35 Time range Time range can be used as a part of the rules in a firewall policy to impose an action during a particular time. For example, if the guest access is to be allowed only during 7:30 am to 5:30 pm on weekdays, then a time range should be attached to certain rules of some guest firewall policies. To impose a time range for guest access, add a time range to rules 2 and 3 in the guest-logon-access policy and to the both the rules in the auth-guest-access policy. Time Range Configuration for guest-logon-access and auth-guest-access Policies ! ip access-list session guest-logon-access user any udp 68 deny position 1 any any svc-dhcp permit time-range Working-hours position 2 user alias Public-DNS svc-dns permit time-range Working-hours position 3 ! ! ip access-list session auth-guest-access user any svc-http permit time-range Working-hours position 1 user any svc-https permit time-range Working-hours position 2 !
  • 49. Aruba Networks, Inc. Optional Configurations for Guest Network | 49 Guest Access with ArubaOS Application Note Figure 36 guest-logon-access policy with time range Figure 37 auth-guest-access policy with time range
  • 50. Aruba Networks, Inc. Optional Configurations for Guest Network | 50 Guest Access with ArubaOS Application Note An alternative method of using time range to restrict guest access to business hours or a particular time is by using the deny time range parameter of the VAP profile. If configured, the deny time range parameter of the VAP profile will deny access to the associated SSID during the defined time range. If guest access is to be restricted to business hours then define a time range that includes the non- business hours and add it to the deny time range parameter of the VAP profile. Table 17 shows the parameters used in the configuration of deny-access time range. Deny Time Range Parameter Configuration ! time-range "deny-access" periodic Weekday 17:30 to 23:59 time-range "deny-access" periodic Weekday 00:00 to 07:30 time-range "deny-access" periodic Weekend 00:00 to 23:59 ! wlan virtual-ap "guestnet" deny-time-range deny-access Figure 38 Deny access time range Table 17 deny-access time range Name Type Start Date Start Time End Time deny-access periodic weekday 17:30 23:59 deny-access periodic weekday 00:00 07:30 deny-access periodic weekend 00:00 23:59
  • 51. Aruba Networks, Inc. Optional Configurations for Guest Network | 51 Guest Access with ArubaOS Application Note Figure 39 Deny time range parameter of the VAP profile Bandwidth Contracts The amount of upstream and downstream bandwidth used by guests can be limited using bandwidth contracts. A bandwidth contract policy rate limits the traffic to the configured value as it flows through the controller. Bandwidth contracts can be assigned on per role or per user basis. When a bandwidth contract is created on per user basis, each user can pass traffic equivalent or less than the configured rate. If the bandwidth contract is created on per role basis, then the bandwidth pool is shared by all the users that belong to that role. The bandwidth is configurable in Kb/s or Mb/s and separate bandwidth contracts can be assigned for upstream and downstream traffic. Figure 40 Guest access with bandwidth limit arun_061 Mobility controller Data Controlled data
  • 52. Aruba Networks, Inc. Optional Configurations for Guest Network | 52 Guest Access with ArubaOS Application Note Table 18 lists the parameters used in the configuration of separate per role bandwidth contracts for upstream and downstream traffic. Bandwidth Contracts Configuration for Authenticated Guest Role ! aaa bandwidth-contract "guest-upstream" mbits 1 ! aaa bandwidth-contract "guest-downstream" mbits 3 ! user-role "auth-guest" bw-contract "guest-upstream" upstream bw-contract "guest-downstream" downstream ! Table 18 Bandwidth Contracts Name Type Rate Purpose guest-upstream per role 1 Mb/s used as upstream bandwidth contract for authenticated guest role (auth-guest) guest-downstream per role 3 Mb/s used as downstream bandwidth contract for authenticated guest role (auth-guest)
  • 53. Aruba Networks, Inc. Optional Configurations for Guest Network | 53 Guest Access with ArubaOS Application Note Figure 41 Bandwidth contracts for authenticated guest role
  • 54. Aruba Networks, Inc. Optional Configurations for Guest Network | 54 Guest Access with ArubaOS Application Note Maximum User Sessions for Guest Role Though it is a very small possibility, a malicious user can connect to the guest network and initiate a denial of service (DoS) attack by using up all of the 65535 sessions available. To defend against such an attack, restrict the maximum number of sessions per user in a role. Aruba recommends that you restrict the maximum sessions per user in the guest role to 128. This limitation should be placed on all the roles used in the guest network. Maximum User Sessions Configuration ! user-role guest-logon max-sessions 128 ! user-role auth-guest max-sessions 128 !
  • 55. Aruba Networks, Inc. Optional Configurations for Guest Network | 55 Guest Access with ArubaOS Application Note Figure 42 Maximum user sessions for guest role
  • 56. Aruba Networks, Inc. Optional Configurations for Guest Network | 56 Guest Access with ArubaOS Application Note Walled Garden The walled garden feature of the ArubaOS, which is a part of captive portal authentication, allows access by unauthenticated guest to certain websites. The whitelist feature of walled garden (available in the captive portal profile) allows you to define a list of websites to which unauthenticated users are allowed access. The blacklist feature of walled garden can be configured to explicitly block navigation to certain websites from unauthenticated guests. This feature is very useful for businesses such as hotels, which want guests to access their websites for free, but require them to pay for Internet services. Configuring walled garden includes the following two steps: 1. Create an alias for the allowed or disallowed websites. 2. To allow unauthenticated guests to access the websites defined in the alias, add the alias to the whitelist of the captive portal profile used for guest access. If you want to deny access, add the alias to the blacklist of the captive portal profile. Table 19 summarizes the configuration of the walled-garden-access alias, which defines the hostname www.arubanetwoks.com. Walled Garden Configuration ! netdestination walled-garden-access name www.arubanetworks.com ! aaa authentication captive-portal "default" white-list walled-garden-access ! !CAUTION If you want to allow or deny access using walled garden to just a website, include the entire hostname in the alias such as www.arubanetwoks.com (include all prefixes, such as WWW). If you just use the domain name such as arubanetworks.com in the alias, then all of the domain and subdomain hostnames that can be resolved are accessible by the unauthenticated guest users. In deployments that use internal DNS servers for guest networks, whitelisting the entire domain allows unauthenticated guests access to all the internal hostnames that can be resolved by the internal DNS server. Table 19 walled-garden-access Alias Alias Name IP Address/ Range Purpose walled-garden-access www.arubanetworks.com Define the websites to which unauthenticated guests are allowed access.
  • 57. Aruba Networks, Inc. Optional Configurations for Guest Network | 57 Guest Access with ArubaOS Application Note Figure 43 walled-garden-access alias Figure 44 walled-garden (captive portal whitelist)
  • 58. Aruba Networks, Inc. Optional Configurations for Guest Network | 58 Guest Access with ArubaOS Application Note Prioritizing Employee Traffic Using Traffic Management Profile While a rate limit can be put on each guest user, you may also want to limit access to the wireless medium to keep the guest from using up the limited wireless airtime. Rate limiting on wireless medium can be implemented using the traffic management profile. The traffic management profile is used to provide a service level agreement (SLA). The SLA guarantees a minimum percentage of available bandwidth to be allocated to a VAP when the wireless network is congested. During congestion the traffic is shaped depending on the configured percentage. Remember to leave enough bandwidth to keep the system usable by guests. Aruba recommends a minimum of 10% of total bandwidth be made available to guests. Guests can always burst when the medium is idle. For more information on traffic management profile and its configuration, see the Aruba Campus Wireless Networks Validated Reference Design. Optional SSID and VAP Profile Parameters for Guest Network In addition to the standard SSID and VAP profile configurations used for guest WLANs, certain parameters in these profiles can be tweaked depending on the guest network requirements of an organization. Disabling lower Data Rates In the SSID profile, network administrators might choose to disable lower transmit rates of 1 and 2 to prevent clients in the parking lot being associated to the network and consuming DHCP leases. This behavior is quite common with devices such as smartphones. Disabling the lower rates forces the clients to get closer to the building in order to get associated and eliminates the possibility of the parking lot clients consuming the DHCP leases of your guest network. To disable lower transmit rates, make these changes to the SSID profile 1. Disable the 802.11g transmit rates of 1 and 2 2. Change the 802.11g basic rates from 1 and 2 to 5 and 11. Remember that disabling the lower rates causes connectivity issues with some handheld devices and most games consoles such as PS3, Nintendo Wii and Xbox. Most guest networks are not built to support such devices, so disabling the lower data rates might be an acceptable option in guest networks. However, turning off lower data rates in student dormitories will result in huge volume of support calls due to the behavior of most gaming consoles. Aruba strongly recommends that you test the devices that are expected to connect to a WLAN for connectivity issues before turning off the lower data rates in that WLAN.
  • 59. Aruba Networks, Inc. Optional Configurations for Guest Network | 59 Guest Access with ArubaOS Application Note Figure 45 Disabling lower data rates
  • 60. Aruba Networks, Inc. Optional Configurations for Guest Network | 60 Guest Access with ArubaOS Application Note Denying Inter User Traffic Usually, there is no need for guests to share anything with other guests. Organizations which want to deny inter user communication between the guests can use the deny inter user traffic parameter of the VAP profile. If the deny inter user traffic parameter is enabled on a VAP, traffic between users connected to that VAP is denied. Figure 46 Deny inter user traffic on guest VAP
  • 61. Aruba Networks, Inc. Contacting Aruba Networks | 61 Guest Access with ArubaOS Application Note Appendix A: Contacting Aruba Networks Contacting Aruba Networks Web Site Support Main Site http://www.arubanetworks.com Support Site https://support.arubanetworks.com Software Licensing Site https://licensing.arubanetworks.com/login.php Wireless Security Incident Response Team (WSIRT) http://www.arubanetworks.com/support/wsirt.php Support Emails Americas and APAC support@arubanetworks.com EMEA emea_support@arubanetworks.com WSIRT Email Please email details of any security problem found in an Aruba product. wsirt@arubanetworks.com Validated Reference Design Contact and User Forum Validated Reference Designs http://www.arubanetworks.com/vrd VRD Contact Email referencedesign@arubanetworks.com AirHeads Online User Forum http://community.arubanetworks.com Telephone Support Aruba Corporate +1 (408) 227-4500 FAX +1 (408) 227-4550 Support  United States +1-800-WI-FI-LAN (800-943-4526)  Universal Free Phone Service Numbers (UIFN):  Australia Reach: 1300 4 ARUBA (27822)  United States 1 800 9434526 1 650 3856589  Canada 1 800 9434526 1 650 3856589  United Kingdom BT: 0 825 494 34526 MCL: 0 825 494 34526
  • 62. Aruba Networks, Inc. Contacting Aruba Networks | 62 Guest Access with ArubaOS Application Note  Universal Free Phone Service Numbers (UIFN):  Japan IDC: 10 810 494 34526 * Select fixed phones IDC: 0061 010 812 494 34526 * Any fixed, mobile & payphone KDD: 10 813 494 34526 * Select fixed phones JT: 10 815 494 34526 * Select fixed phones JT: 0041 010 816 494 34526 * Any fixed, mobile & payphone  Korea DACOM: 2 819 494 34526 KT: 1 820 494 34526 ONSE: 8 821 494 34526  Singapore Singapore Telecom: 1 822 494 34526  Taiwan (U) CHT-I: 0 824 494 34526  Belgium Belgacom: 0 827 494 34526  Israel Bezeq: 14 807 494 34526 Barack ITC: 13 808 494 34526  Ireland EIRCOM: 0 806 494 34526  Hong Kong HKTI: 1 805 494 34526  Germany Deutsche Telkom: 0 804 494 34526  France France Telecom: 0 803 494 34526  China (P) China Telecom South: 0 801 494 34526 China Netcom Group: 0 802 494 34526  Saudi Arabia 800 8445708  UAE 800 04416077  Egypt 2510-0200 8885177267 * within Cairo 02-2510-0200 8885177267 * outside Cairo  India 91 044 66768150 Telephone Support