This product includes code licensed under the GNU General Public License, the GNU Lesser General Public
License, and/or certain other open source licenses. A complete machine-readable copy of the source code
corresponding to such code is available upon request. This offer is valid to anyone in receipt of this information
and shall expire three years following the date of the final distribution of this product version by HewlettPackard Enterprise Company. To obtain such source code, send a check or money order in the amount of US
$10.00 to:
Hewlett-Packard Enterprise Company
Attn: General Counsel
6280 America Center Drive
San Jose, CA 95002
USA
Please specify the product and version for which you are requesting source code.
You may also request a copy of this sourcecode free of charge at: http://hpe.com/software/opensource.
Nove mber 2019 | Rev. 01AirWave 8.2.10.1 | User Guide
Add a Juniper Network Director75
Add a BrocadeNetwork Advisor76
Add an HPE Intelligent Management Center76
Using Device Groups77
Navigation Basics77
Viewing Device Groups78
Comparing Device Groups80
Changing Group Configurations81
Using Global Groups for Group Configuration83
About Global Group Membership83
Creating a Global Group83
Subscribing other Groups to a Global Group84
Deleting a Group85
Monitoring Device Groups85
Modifying Multiple Devices86
iv | ContentsAirWave 8.2.10.1 | User Guide
Configuring Basic Settings for Device Groups89
Basic Settings90
Global Groups90
SNMP Polling Periods91
Routers and Switches92
Notes92
GroupDisplay Options93
Automatic Static IP Assignment93
Spanning Tree Protocol94
NTP94
Aruba Switch Configuration94
Aruba95
Aruba Instant95
Cisco IOS/Catalyst97
Cisco WLC97
Proxim/ Avaya97
HP ProCurve98
Symbol98
Juniper/3Com/Enterasys/Nortel/Trapeze99
Universal Devices, Routers and Switches99
Automatic Authorization99
Maintenance Windows100
Configuring AAA Servers for Device Groups100
Configuring Security for Device Groups101
Configuring SSIDs and VLANs for Device Groups106
Configuring Group Radio Settings110
Configuring Cisco WLC Device Groups114
Accessing Cisco WLC Configuration114
Configuring WLANs for Cisco WLC Devices114
Defining and Configuring LWAPP AP Groups for Cisco Devices118
Viewing and Creating Cisco AP Groups118
Configuring Cisco Controller Settings118
Configuring Wireless Parameters for Cisco Controllers119
Configuring Cisco WLC Security Parameters and Functions119
Configuring Management Settings for Cisco WLC Controllers120
Configuring PTMP Settings for DeviceGroups120
Configuring Proxim Mesh Radio Settings121
Configuring Group MAC ACLs for Device Groups123
Specifying the Minimum Firmware Version for Device Groups124
Discovering, Adding, and Auditing Devices126
How to Set Up Device Discovery126
Adding Networks for SNMP/HTTP Scanning126
Adding Credentials for Scanning127
Defining a Scan Set128
Running a Scan Set128
The Cisco Discovery Protocol (CDP)130
Adding Devices into AirWave130
Adding Devices Manually130
Adding Devices from a CSV File133
Setting the Management Mode133
AirWave 8.2.10.1 | User GuideContents | v
Verifying the Device Configuration134
Ignoring Discovered Devices135
Unignoring a Device135
Troubleshooting a Newly Discovered Down Device136
Using ZTP Orchestrator Beta138
Before You Begin138
Minimum Requirements138
Network Setup138
Step 1: Create Groups for ZTP139
Step 2: Add ClearPass Policy Manager140
Step 3: Add Mobility Master142
Step 4: Add the ArubaOS-CX Switch143
Showing Filters, Clearing Filters, Resetting Grouping149
Using Device Folders150
Adding Device Folders150
Moving Folders150
Expanding Folders150
Changing Default Views151
Monitoring Access Points, Mesh Devices, and Controllers152
Device Information for Access Points, Mesh Devices, and Controllers152
Radios154
Wired Interfaces155
Graphs for Access Points, Mesh Devices, and Controllers156
Location157
Clients157
AirMesh Links158
Neighbors158
RF Neighbors160
Alerts & Events160
Advanced Monitoring160
Viewing the Radio Statistics Page160
Running Commands from the Radio Statistics Page160
Issues Summary section161
802.11 Radio Counters Summary161
Radio Statistics Interactive Graphs162
Recent ARM Events Log163
Detected Interfering Devices Table164
Active BSSIDs Table165
vi | ContentsAirWave 8.2.10.1 | User Guide
AirMatch Statistics for Mobility Master166
Monitoring Mesh Devices166
Setting up Spectrum Analysis167
Spectrum Configurations and Prerequisites168
Setting up a Permanent Spectrum Aruba AP Group168
Configuring an Individual AP to run in Spectrum Mode169
Configuring a Controller to use the Spectrum Profile170
Monitoring ArubaOS-CX and Mobility Access Switches171
Get Details from Tooltips179
SummaryTab180
Ports Tab181
See Port Counts182
Open a Port Status Pop-Up182
Edit a Physical Interface183
Get Interface Details184
PoE Tab184
See PoE Statistics185
Change the Faceplate Using Overlays185
Get Port Details186
View Power Consumption186
VLANs Tab186
Change the VLANs View in the Faceplate187
Get Trunk Details187
Get Virtual Interface Details187
Edit a Virtual Interface187
Connected Tab188
See Connected Device and Neighbor Counts188
Determine Which Device Is Connected to a Port188
View Dynamic Segmentation Information189
Get Connected Devices Details189
Edit a Connected Device190
Get Neighbor Details191
Hardware Tab192
Alerts & Events Tab193
Acknowledge an Alert194
Troubleshooting Tab195
Run a Command195
Test a Cable196
Monitoring 7000 Controllers196
SummaryTab197
AirWave 8.2.10.1 | User GuideContents | vii
WANTab198
See WAN Ports198
Open the Port Details Pop-Up198
WAN Interface Summary199
Get WANInterface Details199
Tunnel Tab200
See Tunnel Counts and Details200
Tunnel Details200
Monitoring Controller Clusters201
Viewing Details about the Controller Cluster202
Capacity Graphs202
Controller Statistics202
Monitoring Cluster Events203
Where to Find Additional Cluster Information203
Monitoring Clients204
Monitoring Wired and Wireless Clients205
Monitoring Rogue Clients206
Supporting Wireless Guest Users207
Supporting VPN Users210
Monitoring RFID Tags211
Managing Mobile Devices with SOTI MobiControl and AirWave212
Overview of SOTI MobiControl212
Prerequisites for Using MobiControl with AirWave213
Adding a Mobile Device Management Server for MobiControl213
Accessing MobiControl from the Clients > Client Detail Page214
Troubleshooting Client Issues214
Evaluating User Status214
Enabling Mobile Device Access Control215
Classifying Aruba Devices216
Quick Links for Clients on Aruba Devices216
Using the Deauthenticate Client Feature217
Viewing the Client Association History217
Viewing the Rogue Association History217
Diagnosing Status and Connectivity218
Configuring and Managing Devices219
Moving a Device from Monitor Only to Manage Read/Write Mode219
Configuring Device Settings220
Adding a Maintenance Window for a Device228
Creating Dynamic Variables229
Configuring Device Interfaces for Switches230
Individual Device Support and Firmware Upgrades231
Using Configuration Templates234
Group Templates234
Supported Devices234
Template Variables234
Viewing, Adding and Editing Templates236
Configuring General Template Files and Variables239
Configuring General Templates240
IOS Configuration File Template241
Device Configuration File on Devices > Device Configuration Page241
viii | ContentsAirWave 8.2.10.1 | User Guide
Template Syntax241
Using AP-Specific Variables241
Using Directives to Eliminate Reporting of Configuration Mismatches242
Using Conditional Variables in Templates242
Using Substitution Variables in Templates243
Configuring Templates for Aruba Instant245
Configuring Templates for AirMesh246
Configuring Cisco IOS Templates246
Applying Startup-config Files246
WDS Settings in Templates247
SCP Required Settings in Templates247
Supporting Multiple Radio Types via a Single IOS Template247
Configuring Singleand Dual-Radio APs via a Single IOS Template248
Configuring Cisco Catalyst Switch Templates248
Configuring Symbol Controller / HPE WESM Templates248
Configuring a Global Template250
Using the Home Pages253
Customizing the Dashboard253
Available Widgets253
Adding Widgets257
Available Widgets257
Defining Graph Display Preferences261
Monitoring Your Network Health262
Monitoring Application Traffic265
Using the UCC Dashboard266
Viewing Call Details266
Viewing UCC Charts, Graphs, and Tables267
Viewing End-to-End Call Details268
Get Call Summary268
Using the UCCReport269
Viewing RF Performance270
Viewing RFCapacity271
Using the AirMatch Dashboard272
Viewing Network Deviations273
How Standard Deviation is Calculated274
Using Clarity275
View Clarity Charts275
Failures Rates275
Process Times275
Clarity Thresholds276
View User Details from the Summary Table276
View Authentication Failure Data278
View DHCP Failure Data278
View DNS Failure Data279
View Association Data279
Working with Clarity Data279
First 25 Results279
Sorting and Filtering Clarity Data280
Selecting a Folder from the Navigation Bar280
Exporting Clarity Data280
AirWave 8.2.10.1 | User GuideContents | ix
Changing the Time Range280
Evaluate User Status281
Using Topology282
Getting Started282
Navigate the Map283
Respond to Alerts283
Setting up Your Map284
Locate Your Device284
Select Your Layout285
Arrange Devices on the Map285
Show Spanning Tree Members286
Show VLANs288
Apply Filters289
Set the Root Node291
Saving Your Preferences291
Changing the Default Expansion292
Checking the Status of Your Network292
Device Status292
Health Status292
Link Status293
Taking Action from Quick Links293
View Tooltips293
Viewing Device and Stack Membership Details294
Running a Command295
Accessing AirWave Documentation296
Working with Licenses296
Configuring User Information and Customizing the WebUI298
Configure Your User Information298
Customizing the WebUI298
Setting Severe Alert Warning Behavior301
Using the System Pages302
Checking the Status of AirWave Services302
Important AirWave Logs303
Downloading Log Files303
Viewing Device Events303
Using the Event Log305
Viewing Triggers305
Creating New Triggers306
Types of Triggers308
Device Triggers308
Interfaces and Radios Triggers311
About Alerts316
Viewing System Alerts317
Delivering Triggered Alerts318
Responding to Alerts319
Backing Up Your Data319
Viewing and Downloading Backups319
x | ContentsAirWave 8.2.10.1 | User Guide
Using the System > Configuration Change Jobs Page319
Using the System > Firmware Upgrade Jobs Page320
Viewing DRT Upgrade Jobs321
Using the System > Performance Page321
Creating, Running, and Sending Reports326
What You Can Do With Reports326
Track licenses326
Improve Network Efficiency and User Experience326
Monitor Clients and Devices327
Show Compliance327
Troubleshoot Device and Network Issues327
Sorting Reports328
About the Default Reports328
Using the LicenseReport328
Using the Capacity Planning Report329
Example Custom Report329
Using the Memory and CPU Utilization Report331
Using the Network Usage Report331
Using the Port Usage Report333
Using the RF Health Report335
Thresholds335
Top Folders and Radio Statistics336
Lists of Top Radio Issues337
Using the Client Inventory Report337
Example Custom Report338
Using the Client Session Report339
Using the Configuration Audit Report341
Using the Device Summary Report343
Using the Device Uptime Report344
Using the Inventory Report345
Example Custom Report345
Using the Rogue Containment Audit Report347
Using the PCI Compliance Report348
Using the IDS Events Report348
Using the Match Event Report350
Using the New Clients Report350
Using the New Rogue Devices Report352
Using the RADIUS Reports354
RADIUS Authentication Issues354
RADIUSAccounting Issues354
Using the Rogue Clients Report355
Using the VPN Session Report357
Creating Custom Reports358
Tips for Restricting Time Ranges358
Running Reports on Selected Devices359
Cloning Reports359
Selecting the Report Definition359
Selecting the Devices and a Report Template360
Selecting the Devices Without Using a Report Template361
Viewing Generated Reports361
AirWave 8.2.10.1 | User GuideContents | xi
Get an Updated Report362
Sending Reports363
Exporting Reports in CSV Format363
Exporting a Report363
Exporting Multiple Reports364
Sending Reports to a Smart Host365
Adding a Wall Attenuation379
VisualRF Resource Utilization380
Planning and Provisioning380
Creating a New Campus381
Creating a New Building381
Adding a Floor Plan382
Change Settings in VisualRF Floor Plans383
Editing a Floor Plan Image383
Replacing the Background383
Cropping the Floor Plan Image384
Copying a Floor Plan in the Same Building385
Sizing a Non-CAD Floor Plan385
Defining Floor Plan Boundaries385
Defining Floor Plan Regions386
Adding Region to a New Floor using the Floor Upload Wizard386
Adding a Region to an Existing Floor Plan386
Editing a Planning Region387
Floor Plan Properties387
Adding Deployed Access Points onto the Floor Plan388
Adding Planned APs onto the Floor Plan389
Auto-Matching Planned Devices390
Printing a Bill of Materials Report390
Increasing Location Accuracy390
Adding Exterior Walls391
Fine-Tuning Location Service in VisualRF > Setup392
xii | ContentsAirWave 8.2.10.1 | User Guide
Decreasing Grid Size392
Enabling Dynamic Attenuation393
Configuring Infrastructure393
Deploying APs for Client Location Accuracy393
Using VisualRF to Assess RF Environments394
Viewing a Wireless User’s RF Environment394
Tracking Location History395
Checking Signal Strength to Client Location396
Viewing an AP’s Wireless RF Environment396
Viewing a Floor Plan’s RF Environment397
Viewing a Network, Campus, Building’s RF Environment398
Viewing Campuses, Buildings, or Floors from a List View398
Importing and Exporting in VisualRF399
Importing from CAD400
Batch Importing CAD Files400
Requirements400
Pre Processing Steps400
Upload Processing Steps401
Post Processing Steps401
Sample Upload Instruction XML File401
Common Importation Problems402
Importing from an Aruba Controller402
Pre-Conversion Checklist402
Process on Controller402
Process on AirWave402
Importing from Ekahau Backups402
Before you begin402
Using the VisualRF Audit Log403
VisualRF Location APIs403
Sample Device Location Response403
Sample Site Inventory Response404
About VisualRF Plan404
Overview404
Minimum requirements405
VisualRF Plan Installation405
Differences between VisualRF and VisualRF Plan405
Using RAPIDS407
Introduction to RAPIDS407
Viewing RAPIDS Summary408
Setting Up RAPIDS409
Changing the Rule Priority418
Recommended RAPIDS Rules418
Using RAPIDS Rules with Additional AirWave Functions418
Viewing Rogues418
Predefined, Default Views for Rogue Devices419
Filtered Views for Rogue Devices420
Overview of the RAPIDS > Detail Page422
Important Considerations423
Filter the Device Data423
Update Rogue Devices423
Viewing Ignored Rogue Devices424
Using RAPIDS Workflow to Process Rogue Devices424
Score Override424
Using the Audit Log425
Additional Resources426
Using the Master Console427
Using the Public Portal on Master Console427
Adding a Managed AMP with the Master Console428
Using Global Groups with Master Console429
AirWave is a network management platform that provides a single console whereyou can monitor, analyze, and
configure wired and wireless networks. Whether your network is simple or a large, complex, multi-vendor
installation, AirWave makes it easy to monitor your network with features like AppRF, Clarity, and VisualRF.
AirWave also provisions Aruba switches, provides CPU, memory and interface monitoring, configuration
management, and upgrades switch firmware. AirWave can be used to implement zero-touch provisioning for
Aruba Instant APs (IAP), Aruba switches and branch controllers.
With AirWave, you can configure:
l "Aruba Mobility Controllers" on page 15
l "Instant Access Points" on page 15
l "ArubaOS-S Switches and ArubaOS-CX Switches" on page 16
Aruba Mobility Controllers
AirWave supports global and group-level configuration of Aruba mobility controllers. Several controllers can
work together with APs to provide a hierarchical and redundant mobility controller system.
The mobility controller system provides:
l AP tunnel termination and translational bridging
l GRE tunnel between each AP and a mobility controller
l A virtual connection point to wireless clients
l Frame translation from 802.11 to 802.3 and 802.3 to 802.11, including encryption and decryption of
wireless traffic
l Quality of service(QoS) and traffic prioritization
Working alone or in conjunction with ClearPass, the mobility controller authenticates wireless clients and includes
a stateful firewall that can be configured to filter wireless traffic.
In this document, mobility controllers are also called access devices. For information about controller
configuration, refer to the AirWave 8.2.10.1 Controller Configuration Guide.
Instant Access Points
Aruba Instant (Instant) is a system of access points in a Layer 2 subnet. The Instant APs (IAPs) are controlled by a
single IAP that serves a dual role as both an IAP and primary Virtual Controller (VC), eliminating the need for
dedicated controller hardware. This system can be deployed through a simplified setup process appropriate for
smaller organizations, or for multiplegeographically dispersed locations without an on-site administrator.
With AirWave, IT can centrally configure, monitor, and troubleshoot ArubaInstant WLANs, upload new software
images, track devices, generate reports, and perform other vital management tasks, all from a remote location.
A Virtual Controller or Instant AP can authenticate to the AirWave server using a pre-shared key, or using twoway certificate-based authentication using an SSL certificate sent from AirWave to the Instant device. Virtual
Controllers push data to AirWave via HTTPS. If your enterprise has a security policy that restricts the use of port
443 for inbound communication, you can change the port AirWave uses to communicate with Instant devices.
For additional information about Instant AP configuration, refer to the Aruba Instant in AirWave 8.2.8.2Deployment Guide.
AirWave 8.2.10.1 | User GuideIntro duction | 15
ArubaOS-S Switches and ArubaOS-CX Switches
AirWave supports group-level configuration of ArubaOS-S Switches andArubaOS-CX Switches. These switches
connect APs, wired clients and other endpoints to the network. Working alone or in conjunction with ClearPass,
the ArubaOS-S Switches provide authentication, authorization and accounting.
In this document, ArubaOS-S Switches are also called access switches, and ArubaOS-CX Switches are also called
core and aggregation switches. For informationabout switch configuration, refer to the AirWave 8.2 SwitchConfiguration Guide.
16 | IntroductionAirWave 8.2.10.1 | User Guide
Chapter 2
Configuring AirWave
After you install the AirWave software, or any time you need to make changes to network settings, refer to the
following procedures:
l "Defining Network Settings" on page 33
l "Configuring Cisco WLSE Rogue Scanning" on page 70
l "Configuring ACS Servers" on page 71
l "Integrating NMS Servers" on page 72
l "PCI Compliance Monitoring" on page 72
l "Deploying WMS Offload" on page 74
l "Integrating External Servers" on page 75
Defining General AirWave Server Settings
The initial tasks to configure the AirWave server include:
l "Configuring the AirWave Server" on page 17
l "Defining Network Settings" on page 33
l "Creating AirWave Users" on page 36
l "Configuring AirWave User Roles" on page 38
l "Configuring the User Login and Authentication" on page 43
l "Enabling AirWave to Manage Your Devices" on page 53
l "Managing Certificates" on page 59
l "Setting Up Device Types" on page 66
Configuring the AirWave Server
The following topics describe how to configure the general settings for the AirWave server. Figure 1 illustrates theAMP Setup > General page.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 17
Figure 1: AMP Setup > General Settings
Whenever you save changes to these settings, AirWave applies them globally across the product for all users.
General Settings
Browse to the AMP Setup > General page, locate the General section, and enter the information described in
Table 1:
Table 1: AMP Setup >General > General Section Fields and Default Values
SettingDefault Description
System NameDefines your name for your AirWave server using alphanumeric
characters.
Default GroupAccess
Points
Sets the device group that this AirWave server uses as the default for
device-level configuration. Select a device group from the drop-down
menu. A group must first be defined on the Groups > List page to
appear in this drop-down menu. For additional information, refer to
"Using Device Groups" on page 77.
18 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Table 1: AMP Setup >General > General Section Fields and Default Values (Continued)
SettingDefault Description
Device
Configuration
Audit Interval
Automatically
repair
misconfigured
devices
Help improve
AirWave by
sending
anonymous usage
data
Nightly
Maintenance
Time (00:00 23:59)
DailyThis setting defines the interval of queries which compares actual
device settings to the Group configuration policies stored in the
AirWave database. If the settings do not match, the AP is flagged as
mismatched and AirWave sends an alert via email, log, or SNMP.
NOTE: Enabling this feature with a frequency of Daily or more
frequently is recommended to ensure that your AP configurations
comply with your established policies. Specifying Never is not
recommended.
DisabledIf enabled, this setting automatically reconfigures the settings on the
device when the device is in Manage mode and AirWave detects a
variance between actual device settings and the Group configuration
policy in the AirWave database.
DisabledIf enabled, AirWave will send anonymous data to Aruba, which may be
used to improve the AirWave software.
04:15Specifies the local time of day AirWave should perform daily
maintenance. During maintenance, AirWave cleans the database,
performs backups, and completes a few other housekeeping tasks.
Such processes should not be performed during peak hours of
demand.
License APs
Usage Threshold
Check for
software updates
90
YesEnables AirWave to check automatically for multiple update types.
Sets a threshold to display an alert on the controller monitor page
when the license usage has reached this number.
Check daily for AirWave updates, to include enhancements, device
template files, important security updates, and other important news.
This setting requires a direct Internet connection via AirWave.
Automatic Authorization Settings
On the AMP Setup > General page, locate the Automatic Authorization section. These settings allow you to
control the conditions by which devices are automatically authorized into AP groups and folders. AirWave
validates the Folder and Group to ensure that both settings have been set to valid drop down options. Table 2
describes the settings and default values in this section.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 19
Table 2: AMP Setup > General > Automatic Authorization Fields and Default Values
SettingDefaultDescription
Add New
New Device ListGlobally add new controllers and autonomous devices to:
Controllers and
Autonomous
Devices Location
Add New Thin APs
New Device ListGlobally add new thin APs to:
Location
Automatically
Authorized Virtual
Manage
Read/Write
Controller Mode
Aruba Instant Settings
l The New Device List (located in Devices > New).
l The same folder and group as the discovering device.
l The same group and folder of their closest IP neighbor on the
same subnet.
l Choose a group and folder. If you select this option, enter the
folder/group in the Auto Authorization Group and Auto
Authorization Folder fields that display.
NOTE: This setting can be overridden in Groups > Basic.
l The New Devices list.
l The same folder and group as the discovering device.
l The same group and folder of their closest IP neighbor on the
same subnet.
l Choose a group and folder. If you select this option, enter the
folder/group in the Auto Authorization Group and Auto
Authorization Folder fields that display.
NOTE: This setting can be overridden in Groups > Basic.
Specify whether Virtual Controller mode for Instant APs will be in
Manage Read/Write mode or Monitor Only mode.
A Virtual Controller can communicate with the AirWave server over a configurable communication port, and
authenticate to the server using a pre-shared key, and/or two-way certificate-based authentication using an SSL
certificate sent from AirWave to the Instant device.
The AMP Setup > General > Aruba Instant Options page includes the following Configuration settings:
Table 3: AMP Setup > General > ArubaInstantOptions Fields and Default Values
SettingDefault Description
Communication
port
(443,1000-65534):
Security method
for adding new
Virtual Controllers:
443By default, an Instant Virtual Controller communicates with AirWave
over port 443. If your enterprise has a security policy that restricts the
use of port 443 for inbound communication, use this field to change the
port the Virtual Controller uses to communicate with AirWave.
PSK Only
AirWave can use the following security methods to authenticate a
Virtual Controller to the AirWave server:
l PSK Only
l PSK and Certificate
l Certificate Only
If you enable certificate-based authentication, you are directed to the
AMP Setup > General > Upload SSLCertificate page, where you are
prompted to upload an certificate file in PEM format that contains both a
private key and certificate.
20 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Table 3: AMP Setup > General > ArubaInstantOptions Fields and Default Values (Continued)
SettingDefault Description
Allow None-TPM
Devices
Configuration OnlyNoBy default, AirWave will push Instant configuration settings as well as
YesIf certificate-based authentication is enabled for the Virtual Controller,
AirWave allows low assurance, non-TPM device. This setting is
unavailable when PSK authentication is used.
AirWave settings such as RAPIDS settings and traps from an AirWave
group to a Virtual Controller assigned to that group. Select the Yes
option to push Instant configuration settings only.
If you select a security method that includes Certificate-based authentication, you must upload the a certificate
from a supported certificate authority to the AirWave server, as the default AirWave certificate will not be
recognized by the Instant AP, and will cause the SSL handshake to fail. Certificate authentication also requires
that the AMP IPaddress information configured on the Instant AP is a domain name, and not an IP address.
AirWave supports the following trusted certificate authorities:
CA Root Intermediate CA: C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO
High-Assurance Secure Server CA
l Chain 2: Trusted Root CA: C=US, O=GeoTrust Inc., CN=GeoTrust Global CA Intermediate CA: Subject: C=US,
O=Google Inc, CN=Google Internet Authority G2
l Chain 3: Trusted Root CA: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 2006 VeriSign, Inc. -
For authorized use only, CN=VeriSign Class 3 Public Primary Certification Authority - G5 Intermediate CA:
C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=Terms of use at https://www.verisign.com/rpa (c)10,
CN=VeriSign Class 3 Secure Server CA - G3
If you enable certificate authentication, you are prompted to upload an SSLcertificate. you can view the current
AirWave certificate using the View Certificate link on that page, or click Change to upload a new certificate file
to the AirWave server.
Top Header Settings
The top header of each AirWave WebUI page displays icons that provide counts on newly discovered devices,
device status, mismatches, rogues, clients, and both unacknowledged and severe alerts. These icons also provide
direct links for immediate access to key system components.
Figure 2: Header Statistics Icons
You can configure what is displayed in the top header for all pages, or for individual AirWave users.
To change the header statistic icons:
1. Navigate to AMP Setup > General, then scroll down to Top Header.
2. Choose the statistics.
3. Choose the devices.
4. Click Save.
A confirmation message does not appear when you make modifications to the top header statistic icons.
To change statistics that display for an AirWave user:
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 21
1. Navigate to Home > User Info page, then scroll down to Top Header Stats.
2. Choose the statistics.
3. Choose the devices.
4. Click Save. These user settings will override the general settings on the AMP Setup page.
Search Method
On the AMP Setup > General page, locate the Search Method section. Select one of the following drop down
options as the system-wide default search method. This default search type will be used when a user types an
entry in the Search field and then clicks Enter without selecting a specific search type.
l Use System Defaults: The Search Method will be based on the system-wide configuration setting. This
method is configured on the AMP Setup > General page.
l Active clients + historical clients (exact match) + all devices: Commonly referred to as Quick Search, this looks
at all active and historical clients and all devices. This search is not case-sensitive. The results of this search
display in a pop up window rather than on the Home > Search page. This pop up window includes top-level
navigation that allows you to filter the results based on Clients, APs, Controllers, and Switches.
l Active clients + all categories: This looks at all active clients (not historical) and all categories. This search is not
case-sensitive.
l Active clients + all categories (exact match): This looks at all active clients (not historical) and all categories.
This search returns only matches that are exactly as typed (IP, user name, device name, etc). This search is
case-sensitive for all searched fields.
l Active + historical clients + all categories: This looks at all active and historical clients and all categories. This
search is not case-sensitive.
l Active + historical clients + all categories (exact match): This looks at all active and historical clients and all
categories. This search returns only matches that are exactly as typed (IP, user name, device name, etc). This
search is case-sensitive for all searched fields.
A confirmation message does not appear after you make modifications to Search Preferences.
Per-user search preferences can be set in the Home > User Info page.
Home Overview Preferences
On the AMP Setup > General page, locate the Home Overview Preferences section. Table4 describes the
settings and default values in this section.
Table 4: AMP Setup > General > Home Overview Preferences Fields and Default Values
SettingDefault Description
Configure Channel
Busy Threshold
Channel Busy
Threshold (%)
YesWhether you want to configure the threshold at which a channel is
considered to be busy at the Top Folders By Radio Channel Usage
Overview widget.
n/aThe threshold percent at which the radio channel is considered busier
than normal. This field is only available if the Configure Channel Busy
Threshold setting is Yes.
22 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Display Settings
On the AMP Setup > General page, locate the Display section and select the options to appear by default in
new device groups.
Changes to this section apply across all of AirWave. These changes affect all users and all new device groups.
Table 5 describes the settings and default values in this section.
Table 5: AMP Setup > General > Display Fields and Default Values
SettingDefaultDescription
AP Fully Qualified
Domain Name
Options
Show vendorspecific device
settings for
NoSets AirWave to use fully qualified domain names for APs instead of the
AP name. For example, ‘testap.yourdomain.com; would be used instead
of ‘testap.’ Select one of the following options:
l Don’t use FQDN - This default value specifies that the fully qualified
domain name will not be used.
l Use AP Name with FQDN - The AP name will prepend the FQDN, for
example “somehostname (my.hostname.com).” Note that if the AP
name is not present, then the FQDN will still appear in parenthesis.
l Use only FQDN - Only the fully qualified domain name will be used.
NOTE: This option is supported only for Cisco IOS, Dell Networking WSeries, Aruba Networks, and Alcatel-Lucent devices.
All DevicesDisplays a drop-down menu that determines which Group tabs and
options are viewable by default in new groups, and selects the device
types that use fully qualified domain names. This field has three options,
as follows:
l All devices—When selected, AirWave displays all Group tabs and
setting options.
l Only devices on this AMP—When selected, AirWave hides all
options and tabs that do not apply to the APs and devices currently on
AirWave.
l Selected device type—When selected, a new field appears listing
many device types. This option allows you to specify the device types
for which AirWave displays group settings. You can override this
setting.
Look up device and
wireless user
YesEnables AirWave to look up the DNS for new user hostnames. This setting
can be turned off to troubleshoot performance issues.
hostnames
DNS Hostname
Lifetime
Device
Troubleshooting
Hint
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 23
24 hoursDefines the length of time, in hours, for which a DNS server hostname
remains valid on AirWave, after which AirWave refreshes DNS lookup:
l 1 hour
l 2 hours
l 4 hours
l 12 hours
l 24 hours
N/AThe message included in this field is displayed along with the Down if a
device’s upstream device is up. This applies to all APs and controllers but
not to routers and switches.
Device Configuration Settings
Locate the Device Configuration section and adjust the settings. Table 6 describes the settings and default
values of this section.
Table 6: AMP Setup > General > Device Configuration Section Fields and Default Values
SettingDefaultDescription
Guest User
Configuration
Allow WMS Offload
configuration in
monitor-only mode
Allow disconnecting
users while in
monitor-only mode
Use Global Aruba
Configuration
DisabledEnables or prevents guest users to/from pushing configurations to
devices. Options are Disabled (default), Enabled for Devices inManage(Read/Write), Enabled for all Devices.
NoWhen Yes is selected, you can enable the ArubaOS WMS offload
feature on the Groups > Basic page for WLAN switches in MonitorOnly mode. Enabling WMS offload does not cause a controller to
reboot. This option is supported only for Aruba and Dell Networking
W-Series devices.
NoSets whether you can deauthenticate a user for a device in monitor-
only mode. If set to No, the Deauthenticate Client button for in aClients > Client Detail page is enabled only for Managed devices.
NoEnables Aruba configuration profile settings to be globally configured
and then assigned to device groups. If disabled, settings can be
defined entirely within Groups > Controller Configand Groups
>Switch Config instead of globally.
NOTE: Changing this setting may require importing configuration on
your devices. When an existing Aruba configuration setup is to be
converted from global to group, follow these steps:
1. Set all the devices to Monitor Only mode before setting the flag.
2. Each device Group will need to have an import performed from
the Device Configuration page of a controller in the AMP group.
3. All of the thin APs need to have their settings imported after the
device group settings have finished importing.
4. If the devices were set to Monitor Only mode, set them back to
Managed mode.
AMP Features
Locate the AMPFeatures section and adjust settings for VisualRF, RAPIDS, and AirWave Glass. Table 7 describes
these settings and default values.
Table 7: AMP Setup Setup > General > AMP Features Fields and Default Values
SettingDefault Description
Display VisualRFNoEnable or disable the VisualRF navigation tab.
Display RAPIDSNoEnable or disable the RAPIDS navigation tab.
24 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Table 7: AMP Setup Setup > General > AMP Features Fields and Default Values (Continued)
SettingDefault Description
Hide setup pages
from non-admin
users
Allow role based
report visibility
Enable Central
Authentication
YesRestrict access to following pages to users with the AMP Administration
role only:
l VisualRF > Setup
l AMP Setup > NMS
l RAPIDS > Score Override
l RAPIDS > Rules
l RAPIDS > Setup
l System > Triggers
YesEnable or disable role-based reporting in AMP. When disabled, reports
can only be generated with by-subject visibility.
YesToggles on or off single-sign on (SSO) authentication between AirWave
and AirWave Glass.
Service
Central
Authentication
Hostname
If the Central Authentication Service is enabled and the managed AMP is
attached to AirWave Glass, this field is automatically populated, and you
don't need to configure the hostname.
External Logging Settings
Locate the External Logging section and adjust settings to send audit and system events to an external syslog
server. Table 8 describes these settings and default values. You can also send a test message using the SendTest Message button after enabling any of the logging options.
For information about creating triggers in order to receive event notifications, see "Creating New Triggers" on
page306.
Table 8: AMP Setup > General > External Logging Section Fields and Default Values
SettingDefault Description
Include event log
messages
Syslog ServerN/AEnter the IP address of the syslog server. Note that this field is hidden if
Syslog Port514Enter the port of the syslog server. Note that this field is hidden if both
Event log facilitylocal1Select the facility for the event log from the drop-down menu. This field is
Include audit log
messages
NoSelect Yes to send event log messages to an external Syslog server.
NOTE: If you enable event logging, other options to configure the Syslog
server and enable logging using Common Event Format (CEF) become
available.
both "Include event log messages" and "Include audit log messages" are
set to No.
"Include event log messages" and "Include audit log messages" are set to
No.
only available if the "Include event log messages" setting is Yes.
NoSelect Yes to send audit log messages to an external syslog server.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 25
Table 8: AMP Setup > General > External Logging Section Fields and Default Values (Continued)
SettingDefault Description
Audit log facilitylocal1Select the facility for the audit log from the drop-down menu. This field is
only available if the "Include audit log messages" setting is Yes
Send Test MessageN/AIf messaging is enabled and a server and port are configured, click this
button to send a test message. Upon completion, a message will appear
at the top of this page indicating that the message was sent successfully.
Historical Data Retention Settings
Locate the Historical Data Retention section and specify the number of days you want to keep client session
records and rogue discovery events. Table 9 describes the settings and default values of this section. Many
settings can be set to have no expiration date.
Table 9: AMP Setup > General > Historical Data Retention Fields and Default Values
SettingDefault Description
Inactive Client and
VPN User Data (01500 days, zero
disables)
Client Association
and VPN Session
History (0-550
days, zero
disables)
Tag History (0-550
days, zero
disables)
Rogue AP
Discovery Events
(14-550 days, zero
disables)
Reports (0-550
days, zero
disables)
Automatically
Acknowledge
Alerts(0-550 days,
zero disables)
60Defines the number of days AirWave stores basic information about
inactive clients and VPN users. A shorter setting of 60 days is
recommended for customers with high user turnover such as hotels. The
longer you store inactive user data, the more hard disk space you require.
14Defines the number of days AirWave stores client and VPN session
records. The longer you store client session records, the more hard disk
space you require.
14Sets the number of days AirWave retains location history for Wi-Fi tags.
14Defines the number of days AirWave stores Rogue Discovery Events. The
longer you store discovery event records, the more hard disk space you
require.
60Defines the number of days AirWave stores Reports. Large numbers of
reports, over 1000, can cause the Reports > Generated page to be slow to
respond.
14Defines automatically acknowledged alerts as the number of days AirWave
retains alerts that have been automatically acknowledged. Setting this
value to 0 disables this function, and alerts will never expire or be deleted
from the database.
Acknowledged
Alerts(0-550 days,
zero disables)
26 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
60Defines the number of days AirWave retains information about
acknowledged alerts. Large numbers of Alerts, over 2000, can cause the
System > Alerts page to be slow to respond.
Table 9: AMP Setup > General > Historical Data Retention Fields and Default Values (Continued)
SettingDefault Description
Radius/ARM/IDS
Events(0-550 days,
zero disables)
Archived Device
Configurations (0100, zero disables)
Archive device
configs even if they
only have rogue
classifications
Guest Users (0-550
days, zero
disables)
Inactive SSIDs (0550 days, zero
disables)
Inactive Interfaces
(0-550 days, zero
disables)
14Defines the number of days AirWave retains information about RADIUS,
ARM, and IDS events. Setting this value to 0 disables this function, and the
information will never expire or be deleted from the database.
10Defines the number of configurations that will be retained for archived
devices. Whether rogue information is included depends on the setting of
the Archive device configs even if they only have rogueclassifications setting.
NoSets whether to archive device configurations even if the device only has
rogue classifications.
30Sets the number of days that AirWave is to support any guest user. A value
of 0 disables this function, and guest users will never expire or be deleted
from the AirWave database.
425Sets the number of days AirWave retains historical information after
AirWave last saw a client on a specific SSID. Setting this value to 0 disables
this function, and inactive SSIDs will never expire or be deleted from the
database.
425Sets the number of days AirWave retains inactive interface information
after the interface has been removed or deleted from the device. Setting
this value to 0 disables this function, and inactive interface information will
never expire or be deleted from the database.
Interface Status
History (0-550
days, zero
disables)
Interfering Devices
(0-550 days, zero
disables)
Device Events
(Syslog, Traps)(131 days)
Mesh Link History
(0-550 days)
Device Uptime (0120 months, zero
disables)
425Sets the number of days AirWave retains historical information on
interface status. Setting this value to 0 disables this function.
14Sets the number of days AirWave retains historical information on
interfering devices. Setting this value to 0 disables this function.
2Sets the number of days AirWave retains historical information on device
events such as syslog entries and SNMP traps. Setting this value to 0
disables this function. Refer to "Viewing Device Events" on page 303.
NOTE: If your data table has more than 5 million rows, AirWave will
truncate the device event retention data. In this case, the "number of days"
setting becomes "number of hours."
30Sets the number of days AirWave retains historical information for mesh
links.
60Sets the number of months AirWave retains historical information on
device uptime. Setting this value to 0 disables this function.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 27
Table 9: AMP Setup > General > Historical Data Retention Fields and Default Values (Continued)
SettingDefault Description
Client Data
Retention Interval
(1-425 days)
UCC Call History
(1-30 days)
UCC Call Details
(1-7 days)
Config Job
Retention Interval
(1-31 days)
425Sets the number of days AirWave retains historical information for clients.
30Sets the number of days that calls remain in AirWave's call history.
2Sets the number if days that the AirWave retains details for individual calls.
31Sets the number of days AirWave retains information about configuration
jobs.
Firmware Upgrade/Reboot Options
Locate the Firmware Upgrade/Reboot Options section and adjust settings as required. This section allows
you to configure the default firmware upgrade behavior for AirWaveTable 10
Table 10 describes the firmware upgrade and reboot options.
Table 10: AMP Setup > General > Firmware Upgrade Defaults Fields and Default Values
SettingDefaultDescription
Allow firmware
upgrades in
monitor-only mode
NoIf Yes is selected, AirWave upgrades the firmware for APs in Monitor
Only mode. When AirWave upgrades the firmware in this mode, the
desired configuration are not be pushed to AirWave. Only the firmware is
applied. The firmware upgrade may result in configuration changes
AirWave does not correct those changes when the AP is in Monitor Only
mode.
Allow Rebooting
Monitor Only
Devices
Enable firmware
distribution via http
Fast DownloadNoWhen fast download is enabled, standalone IAPs in the same RF zone are
Sequential RebootNoWhen sequential reboot is enabled, the APs in the same RF zone will
NoIf Yes is selected, AirWave can reboot devices in Monitor Only mode.
NoBy default, we use HTTPS and require user log in for firmware updates.
NOTE: For IAPs running versions earlier than Instant 3.4.0.0, set this
option to "Yes" in order to get firmware updates using HTTP.
grouped so that they can download the image from each other. This
assumes that the APs are behind the same firewall so that they can reach
each other, thereby making the firmware download faster.
reboot sequentially. At any given time, only one AP is being rebooted. As a
result, users can use another AP that is visible in RF and have
uninterrupted service.
28 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Table 10: AMP Setup > General > Firmware Upgrade Defaults Fields and Default Values (Continued)
SettingDefaultDescription
Maximum
Interleaved Jobs (1-
20)
Maximum
Interleaved Devices
Per Job (1-1000)
Failures before
stopping (0-20, zero
disables)
Failure timeout (560 mins)
DRT upgrade failure
timeout (2-30 mins)
Number of tries in
failure (1-4)
Periodic run failed
upgrade interval
20Defines the number of jobs AirWave runs at the same time. A job can
include multiple APs. When jobs are started by multiple users, AirWave will
interleave upgrades so that one user's job does not completely block
another’s.
20Defines the number of devices that can be in the process of upgrading at
the same time. Within a single job, AirWave may start the upgrade
process for up to this number of devices at the same time. However, only
one device will be actively downloading a firmware file at any given time.
1Sets the default number of upgrade failures before AirWave pauses the
upgrade process. User intervention is required to resume the upgrade
process. Setting this value to 0 disables this function.
60Sets the timeout for an upgrade attempt.
6Sets the timeout for a Downloadable Regulatory Table (DRT) upgrade
attempt.
1Sets the number of retry attempts.
DisabledSet the length of time AirWave retries running a failed upgrade.
Additional AMP Services
Locate the AdditionalAMP Services section, and adjust settings as required. Table 11 describes the settings
and default values of this section.
Table 11: AMP Setup > General > Additional AMP Services Fields and Default Values
SettingDefaultDescription
Enable FTP ServerNoEnables or disables the FTP server on AirWave. The FTP server is only
used to manage Aruba AirMesh and Cisco Aironet 4800 APs. Best
practice is to disable the FTP server if you do not have any supported
devices in the network.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 29
Table 11: AMP Setup > General > Additional AMP Services Fields and Default Values (Continued)
SettingDefaultDescription
Enable RTLS
Collector
NoEnables or disables the RTLS Collector, which is used to allow
ArubaOScontrollers to send signed and encrypted RTLS (real time
locating system) packets to VisualRF; in other words, AirWave becomes
the acting RTLS server. The RTLS server IP address must be configured on
each controller. This function is used for VisualRF to improve location
accuracy and to locate chirping asset tags. This function is supported only
for Dell Networking W-Series, Alcatel-Lucent, and Aruba Networks
devices.
If Yes is specified, the following additional fields appear. These
configuration settings should match the settings configured on the
controller:
l RTLS Port—Specify the port for the AirWave RTLS server.
l RTLS Username—Enter the user name used by the controller to
decode RTLS messages.
l RTLS Password—Enter the RTLS server password that matches the
controller’s value.
l Confirm RTLS Password—Re-enter the RTLS server password.
Use Embedded
Mail Server
YesEnables or disables the embedded mail server that is included with
AirWave.
Mail Relay ServerOptionalIf you enable the "Use embedded mail server" option, enter information
for an optional mail relay server. This field supports a Send Test Email
button for testing server functionality. Click this button to enter valid email
addresses.
Process user
roaming traps from
Cisco WLC
Enable AMON data
collection
Enable Clarity Data
Collection
Enable Traffic
Analysis Data
Collection
YesWhether AirWave should parse client association and authentication traps
from Cisco WLC controllers to give real time information on users
connected to the wireless network.
YesAllows AirWave to collect enhanced data from Aruba devices on certain
firmware versions. See the Best Practices Guide on the Home >
Documentation page for more details
NOTE:
l When enabling AMON, auditing should be set to daily and have been
successful at least once to allow AirWave to calculate the proper
BSSIDs per radio. If these BSSIDs do not exist, clients are dropped
because they do not have any corresponding BSSIDs in the AirWave
database. Auditing should be set to daily because the BSSIDs are kept
in cache memory and cleared every 24 hours.
l To view usage data on a standalone controller or managed device, set
the Enable AMON Data Collection option to No to allow usage data
to be aggregated from the AP level.
YesAllows AirWave to collect enhanced Clarity Monitoring data from Aruba
devices running ArubaOS 6.4.3 and later versions
YesIf AMON is enabled for a controller, you can enable AirWave to collect
Traffic Analysis data from the controller by setting this to Yes. When
enabled, the Home > Traffic Anaylsis dashboard is available in the
WebUI.
30 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Table 11: AMP Setup > General > Additional AMP Services Fields and Default Values (Continued)
SettingDefaultDescription
Traffic Analysis
Storage Allocated
(GiB)
Enable UCC Data
Collection
Enable UCC Calls
Stitching
(Heuristics)
Prefer AMONvs
SNMP Polling
50If Traffic Analysis Data Collection is enabled, you can specify the amount
of storage to allocate.
YesEnables controllers to send UCC data to AirWave. For this feature to work,
AirWave must be a management server on the controller, the AMON port
is set up for UDP port 8211, and the controller profile has UCC monitoring
enabled.
YesEnables caller-to-callee call stitching for non-SDN deployments. You
should turn off this option for NATand BOC deployments.
Yes
Prefer AMON is a configuration setting which causes AirWave to use an
AMON feed to obtain client monitoring information from a controller
rather than polling it via SNMP. When you enable this setting, values such
as AP lists and rogue AP lists are still polled via SNMP, but the bulk of
client monitoring information is delivered via AMON.
NOTE:
l Auditing needs to have been successful at least once to allow AirWave
to calculate the proper BSSIDs per radio.
l When Prefer AMON is enabled, the controller must be configured to
send AMON to AirWave by issuing the controller-amon bssidtunnel-stats command from the command-line interface of the
standalone controller or managed device (not mobility master).
l To view bandwidth usage data on a standalone controller or managed
device, you must set Prefer AMON vs SNMP Polling to No and also
set the Enable AMON Collection setting to No. For more information,
see "Enable AMON data collection" on page 30.
l The network path from the controller to the AirWave server must allow
traffic on UDP port 8211.
l The controller routinely sends AMON in large UDP packets, (up to 30K
bytes). Before enabling this setting, ensure the network path from the
controller to AirWave can pass such large packets intact.
l This setting should only be used in a network environment with low
levels of UDPpacket loss, as the loss of a single Ethernet frame will
potentially result in the loss of up to 30K bytes worth of data.
l
Enable Syslog and
SNMP Trap
Collection
Require SSH host
YesThis option specifies whether traps used to detect roaming events, auth
failures, AP up/down status, and IDS events will still be collected if they
are sent by managed devices.
No
This setting reserved for future use.
key verification
Validate PAPI keyNoSecurity improvements in AirWave 8.2.1 and later releases allow you to
specify a custom PAPIkey and require PAPI key validation. If you select the
Yes option, you are prompted to enter a custom PAPI key
Disable TLS 1.0 and
1.1
YesThis option is set to Yes by default. In order for Aruba switches to
automatically check-in to AirWave by ZTP, you must change this option to
No. If you select No, you must restart AMP.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 31
Performance Settings
Locate the Performance section. Performance tuning is unlikely to be necessary for many AirWave
deployments, and likely provides the most improvements for customers with extremely largePro or Enterprise
installations. Please contact Aruba support if you think you might need to change any of these settings. Table 12
describes the settings and default values of this section.
Table 12: AMP Setup> General > Performance Fields and Default Values
SettingDefaultDescription
Monitoring
Processes
Maximum number
of configuration
processes
Maximum number
of audit processes
SNMP Fetcher
Count (2-6)
Verbose Logging
of SNMP
Configuration
Based on
the number
of cores for
your server
5Increases the number of processes that are pushing configurations
3Increases the number of processes that audit configurations for
2Specify the number of SNMPv2 fetchers.
NoEnables or disables logging detailed records of SNMP configuration
Optional setting configures the throughput of monitoring data.
Increasing this setting allows AirWave to process more data per
second, but it can take resources away from other AirWave
processes. Contact Aruba support if you think you might need to
increase this setting for your network. Also note that the value
range varies based on the number of available process cores.
to your devices, as an option. The optimal setting for your network
depends on the resources available, especially RAM. Contact Aruba
support if you think you might need to increase this setting for your
network.
your devices, as an option. The optimal setting for your network
depends on the resources available, especially RAM. Contact Aruba
support if you are considering increasing this setting for your
network.
information.
SNMP Rate
Limiting for
Monitored
Devices
Client Association
Relevance Factor
32 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
NoWhen enabled, AirWave fetches SNMP data more slowly, potentially
reducing device CPU load.
We recommend enabling this global setting if your network contains
a majority of legacy controllers (800, 2400, 5000, or controllers that
use Supervisor Module II). If your network mainly uses newer
(30000 Series, 600 Series, or the M3 module in the 6000 series), we
strongly recommend disabling this setting.
0 days
(disabled)
Use this setting to hide old client information from clients lists and
client search results. For example, a setting of 3 limits the historical
client data displayed in client lists and search results to client
sessions that have been disconnected within the last three days.
When this value is set to 1, client lists and search results display
only the client history for the previous day.
This time range can be set from 0-550 days, where a value of zero
disables this feature and makes available all historical client data. A
shorter time period improves search performance and allows client
lists to display more rapidly, though it will also display fewer results.
Table 12: AMP Setup> General > Performance Fields and Default Values (Continued)
SettingDefaultDescription
RAPIDS
Processing
Priority
RAPIDS custom
process limit (1-
16)
LowDefines the processing and system resource priority for RAPIDS in
relation to AirWave as a whole.
When AirWave is processing data at or near its maximum capacity,
reducing the priority of RAPIDS can ensure that processing of other
data (such as client connections and bandwidth usage) is not
adversely impacted.
The default priority is Low. You can also tune your system
performance by changing group poll periods.
If you select Custom for the priority, then also specify the RAPIDS
custom process limit.
1 when
Custom is
specified for
the RAPIDS
Processing
Priority.
Sets the maximum number of monitoring process assigned to
RAPIDS work. Note that this option is only available if Custom is
specified for the RAPIDS Processing Priority.
Defining Network Settings
The next steps in setting up AirWave are to configure the network interface, DNS settings, NTP servers, and static
routes.
Figure 3 illustrates the contents of the AMP Setup > Network page when setting up an IPv4 interface.
Optionally, you can configure an IPv6 interface. For information, see "Primary Network Interface Settings" on
page34.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 33
Figure 3: Network Page
Specify the network configuration options described in the sections that follow to define the AirWave network
settings. Select Save when you have completed all changes on the AMP Setup > Network page, or selectRevert to return to the last settings. Save restarts any affected services and may temporarily disrupt your
network connection.
Refer to the following topics for configuration information:
l "Primary Network Interface Settings" on page 34
l "Secondary Network Interface Settings" on page35
l "Network Time Protocol (NTP) Settings" on page 35
l "Static Routes" on page 36
Primary Network Interface Settings
Locate the Primary Network Interface section. The information in this sections should match what you
defined during initial network configuration and should not require changes. Table 13 describes the settings and
default values.
Table 13: Primary Network Interface Fields and Default Values
SettingDefaultDescription
IPv4 AddressNoneSets the IPv4 address of the AirWave network interface.
NOTE: This address must be a static IP address.
HostnameNoneSets the DNS name assigned to the AirWave server.
Subnet MaskNoneSets the subnet mask for the primary network interface.
34 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Table 13: Primary Network Interface Fields and Default Values (Continued)
SettingDefaultDescription
IPv4 GatewayNoneSets the default gateway for the network interface.
IPv6 EnabledNoBy selecting Yes, you can enter an optional IPv6 address and gateway
address.
IPv6 AddressNoneSets the IPv6 address of the AirWave network interface.
IPv6 GatewayNoneSets the default gateway for the network interface.
Primary DNS IPNoneSets the primary DNS IP address for the network interface.
Secondary DNS IPNoneSets the secondary DNS IP address for the network interface.
Secondary Network Interface Settings
Locate the Secondary Network Interface section. The information in this section should match what you
defined during initial network configuration and should not require changes. Table 14 describes the settings and
default values.
Table 14: Secondary Network Interface Fields and Default Values
SettingDefault Description
EnabledNoSelect Yes to enable a secondary network interface. You will be
prompted to define the IP address and subnet mask.
IP AddressNoneSpecify the IP address of the AirWave secondary network.
NOTE: This address must be a static IP address. AirWave supports
IPv4 and IPv6 addresses.
Subnet MaskNoneSpecify the subnet mask for the secondary network interface.
Network Time Protocol (NTP) Settings
On the AMP Setup > Network page, locate the Network Time Protocol (NTP) section. The Network Time
Protocol is used to synchronize the time between AirWave and your network’s NTP server. NTP servers
synchronize with external referencetime sources, such as satellites, radios, or modems.
Specifying NTP servers is optional. NTP servers synchronize the time on the AirWave server, not on individual
access points.
To disable NTP services, clear both the Primary and Secondary NTP server fields. Any problem related to
communication between AirWave and the NTP servers creates an entry in the event log. Table 15 describes the
settings and default values in more detail. For more information on ensuring that AirWave servers have the
correct time, please see http://support.ntp.org/bin/view/Servers/NTPPoolServers.
Secondaryntp2.yourdomain.comSets the IP address or DNS name for the secondary NTP server.
Static Routes
On the AMP Setup > Network page, locate the Static Routes area. This section displays network, subnet
mask, and gateway settings that you have defined elsewhere from a command-line interface.
This section does not enable you to configure new routes or remove existing routes.
What Next?
l Go to additional tabs in the AMP Setup section to continue additional setup configurations. The next section
describes AirWave roles.
l Complete the required configurations in this chapter before proceeding. Aruba support remains available to
you for any phase of AirWave configuration.
Creating AirWave Users
AirWave installs with only one user—the admin, who is authorized to perform the following functions:
l Define additional users with varying levels of privilege, be it manage read/write or monitoring.
l Limit the viewable devices as well as the level of access a user has to the devices.
Each general user that you add must have a user name, a password, and a role. Use unique and meaningful user
names as they are recorded in the log files when you or other users make changes in AirWave.
User name and password are not required if you configure AirWave to use RADIUS, TACACS, or LDAP
authentication. You do not need to add individual users to the AirWave server if you use RADIUS, TACACS, or
LDAP authentication.
The user role defines the user type, access level, and the top folder for that user. User roles are defined on the
AMP Setup > Roles page. Refer to the previous procedure in this chapter for additional information, "Creating
AirWave User Roles" on page 38.
The admin user can provide optional additional information about the user, including the user's real name, email
address, phone number, and so forth.
Perform the following steps to display, add, edit, or delete AirWave users of any privilege level. You must be an
admin user to complete these steps.
1. Go to the AMP Setup > Users page. This page displays all users currently configured in AirWave, as shown in
Figure 4.
Figure 4: AMP Setup > Users Page
36 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
2. Select Add to create a new user, select the pencil icon to edit an existing user, or select a user and select
Delete to remove that user from AirWave. When you select Add or the edit icon, the Add User page appears,
illustrated in Figure 5.
Current users cannot change their own role. The Role drop-down field is disabled to prevent this.
Figure 5: AMP Setup > Users > Add/Edit User Page
3. Enter or edit the settings on this page. Table 16 describes these settings.
Table 16: AMP Setup > Users > Add/Edit User Fields and Default Values
SettingDefaultDescription
UsernameNoneSets the user name for the user who logs in to AirWave. This user name is
displayed in AirWave log files.
RoleNoneSpecifies the user’s Role, which defines the Top viewable folder as well as the
type and access level of the user specified in the previous field.
The admin user defines user roles on the AMP Setup > Roles page, and each
user in the system is assigned to a role.
PasswordNoneSets the password for the user being created or edited. Enter an alphanumeric
string without spaces, and enter the password again in the Confirm Password
field. AirWave strengthens user passwords with SHA512 encryption.
NOTE: Because the default user's password is identical to the Name, you should
change this password. You will be logged out and asked to enter your new
password.
NameNoneAllows you to define an optional and alphanumeric text field that takes note of the
user's actual name.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 37
Table 16: AMP Setup > Users > Add/Edit User Fields and Default Values (Continued)
SettingDefaultDescription
Email
Address
PhoneNoneAllows you to enter an optional phone number for the user.
NotesNoneEnables you to cite any additional notes about the user, including the reason they
NoneAllows you to specify a specific email address that will propagate throughout
many additional pages in AirWave for that user, including reports, triggers, and
alerts.
were granted access, the user's department, or job title.
4. Select Add to create the new user, Save to retain changes to an existing user, or Cancel to cancel out of this
screen. The user information you have configured appears on the AMP Setup > Users page, and the user
propagates to all other AirWave pages and relevant functions.
AirWaveenables user roles to be created with access to folders within multiple branches of the overall
hierarchy. This feature assists non-administrator users who support a subset of accounts or sites within a single
AirWave deployment, such as help desk or IT staff.
Configuring AirWave User Roles
The AMP Setup > Roles page defines the viewable devices, the operations that can be performed on devices,
and general AirWave access. User roles can be created that provide users with access to folders within multiple
branches of the overall hierarchy. This feature assists non-administrative users, such as help desk or IT staff, who
support a subset of accounts or sites within a single AirWave deployment. You can restrict user roles to multiple
folders within the overall hierarchy even if they do not share the sametop-level folder. Non-admin users are only
able to see data and users for devices within their assigned subset of folders.
Refer to the following additional topics:
l "User Roles and VisualRF" on page 38
l "Creating AirWave User Roles" on page38
User Roles and VisualRF
VisualRF uses the same user roles as defined for AirWave. Users can see floor plans that contain an AP to which
they have access in AirWave, although only visible APs appear on the floor plan. VisualRF users can also see any
building that contains a visible floor plan and any campus that contains a visible building.
In VisualRF > Setup > Server Settings, the Restrict visibility of empty floor plans to the user thatcreated them configuration option allows you to restrict the visibility of empty floor plans to the role of the
user who created them. By default, this setting is set to No.
When a new role is added to AirWave, VisualRF must be restarted for the new user to be enabled.
Creating AirWave User Roles
Roles define the capabilities a user has access to and the privileges and views available for device groups and
devices in AirWave. The available configuration options differ for each role type.
Most users will see two sections on this page: Role and Guest User Preferences. The Guest UserPreferences section appears only if Guest User Configuration is enabled in AMP Setup > General.
If you want to create a user role, log in to AirWave as admin and follow these steps:
1. Go to the AMP Setup > Roles and click Add.
38 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
2. Enter a name for the user role, select options, and click Add. Figure 6 shows a rolenamed Traffic Analysis
being created.
Figure 6: Adding a Non-Admin Role Named Traffic Analysis
3. Enter additional settings on this page.
Figure 7 shows the newly created Traffic Analysis Admin role in the Role page.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 39
Figure 7: Newly Created Traffic Analysis Admin Role
AMPAdministrator Role
The following table describes the available settings and default values for the AMP Administrator role.
Table 17: AMP Setup > Roles > Add/Edit Roles Fields and Default Values for AMP Administrator Role
SettingDefaultDescription
NameNoneSets the administrator-definable string that names the role. The role
name should indicate the devices and groups that are viewable, as well
as the privileges granted to that role.
EnabledYesDisables or enables the role. Disabling a role prevents all users of that
role from logging in to AirWave.
TypeDevice
Manager
Aruba Controller
Role
Allow user to
disable timeout
Custom MessagenoneA custom message can also be included.
DisabledEnables or disables Single Sign-On for the role. If enabled, allows the
NoWhether a user can disable AirWave’s timeout feature.
Defines the type of role.
AirWave Administrator—Grants full access to AirWave and all the
devices, thecapability to create new users, and access to AMP Setup,
VisualRF > Setup, VisualRF > Audit Log, System > Event Log, and
System > Performance pages.
user read-only access or direct access to the Aruba controller UIs from
quick links in the WebUI without having to enter credentials for the
controller.
Table 18: AMP Setup > Roles > Add/Edit Roles Fields and Default Values for Device Manager Role
SettingDefaultDescription
NameNoneSets the administrator-definable string that names the role. The role name
should indicate the devices and groups that are viewable, as well as the
privileges granted to that role.
EnabledYesDisables or enables the role. Disabling a role prevents all users of that role
from logging in to AirWave.
40 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Table 18: AMP Setup > Roles > Add/Edit Roles Fields and Default Values for Device Manager Role
(Continued)
SettingDefaultDescription
TypeDevice
Manager
Defines the type of role.
Device Manager—Provides access to a limited number of devices and groups
based on the Top folder and varying levels of control based on the Access
Level.
Access LevelMonitor
(Read Only)
Defines the privileges the role has over the viewable device. AirWave supports
three privilege levels, as follows:
l Manage (Read/Write)—Provides the capability to modify, remove, and
view information for devices and groups. Selecting this option causes a new
field, Allow authorization of Devices, to appear on the page, and is
enabled by default.
l Audit (Read Only)—Provides the capability to view devices and groups
and the Device Configuration page, which may contain sensitive
information like AP passwords.
l Monitor (Read Only)—Provides the capability to view devices and groups
and VisualRF.
Top FolderTopDefines the highest viewable folder for the role. The role is able to view all
devices and groups contained by the specified top folder. The top folder and its
subfolders must contain all of the devices in any of the groups it can view.
NOTE: AirWave enables user roles to be created with access to folders within
multiple branches of the overall hierarchy. This feature assists nonadministrator users who support a subset of accounts or sites within a single
AirWave deployment, such as help desk or IT staff.
User roles can be restricted to multiple folders within the overall hierarchy,
even if they do not share the same top-level folder. Non-administrator users
are only able to see data and users for devices within their assigned subset of
folders.
Allow
Authorization
Yes
NOTE: This option is only available when the AP/Device Access Level is
specified as Manage (Read/Write).
of Devices
RAPIDSNoneSets the RAPIDS privileges. This field specifies the RAPIDS privileges for the
user role and includes these options:
l None— Cannot view the RAPIDS tab or any rogue devices.
l Read Only—The user can view the RAPIDS pages but cannot make any
changes to rogue devices or perform OS scans.
l Read/Write—The user may edit individual rogues, classification, threat
levels and notes, and perform OS scans.
l Administrator—Has the same privileges as the Read/Write user, but can
also set up RAPIDS rules, override scores and is the only user who can
access the RAPIDS > Setup page.
VisualRFRead OnlySets the VisualRF privileges, which are set separately from the Devices:
l Read Only—The user can view the VisualRF pages but cannot make any
changes to floor plans.
l Read/Write—The user may edit individual floor plans, buildings, and
campuses.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 41
Table 18: AMP Setup > Roles > Add/Edit Roles Fields and Default Values for Device Manager Role
(Continued)
SettingDefaultDescription
UCCYes
Traffic
Analysis
Aruba
Controller
Single SignOn Role
Display Client
Diagnostics
Screens By
Default
Allow User to
Disable
Timeout
Allow Reboot
of Devices
Allow
Creation of
Guest Users
Yes
DisabledIf enabled, the user has read-only or root access to Aruba controller UIs from
NoSets the role to support helpdesk users with parameters that are specific to
NoWhether a user can disable AirWave’s timeout feature.
NoAllows user to reboot devices in AirWave.
YesIf this option is enabled, users with an assigned role of Monitoring or Audit can
Permits access to UCC views and tables. Monitoring and managing privileges
are set at the device level.
Permits access to Traffic Analysis views and tables. Monitoring and managing
privileges are set at the AP/Device level.
quick links without having to enter credentials for the controller.
the needs of helpdesk personnel supporting users on a wireless network.
be given access to guest user account creation along with the option to allow a
sponsor to change its user name.
NOTE: This option is not available if the AP/Device Access Level is specified
as Manage (Read/Write).
Allow
Accounts
With No
Expiration
Allow
Sponsor to
Change
Sponsorship
User Name
Custom
Message
YesSpecifies whether to allow accounts that have no expiration set. If this is set to
No, then enter the amount of time that can elapse before the access expires.
NoSpecifies whether a sponsor can change the sponsorship user name.
noneA custom message can also be included.
Guest Access Sponsor Role
The following table describes the available settings and default values for the Guest Access Sponsor role.
42 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Table 19: AMP Setup > Roles > Add/Edit Roles Fields and Default Values for Guest Access Sponsor Role
SettingDefaultDescription
NameNoneSets the administrator-definable string that names the role. The role name
should indicate the devices and groups that are viewable, as well as the
privileges granted to that role.
EnabledYesDisables or enables the role. Disabling a role prevents all users of that role
from logging in to AirWave.
TypeAP/Device
Manager
Top FolderTopDefines the Top viewable folder for the role. The role is able to view all devices
Allow user
to disable
timeout
Allow
accounts
with no
expiration
NoWhether a user can disable AirWave’s timeout feature.
YesSpecifies whether to allow accounts that have no expiration set. If this is set to
Defines the type of role.
Guest Access Sponsor—Limited-functionality role to allow helpdesk or
reception desk staff to grant wireless access to temporary personnel. This role
only has access to the defined top folder.
and groups contained by the Top folder. The top folder and its subfolders must
contain all of the devices in any of the groups it can view.
NOTE: AirWave enables user roles to be created with access to folders within
multiple branches of the overall hierarchy. This feature assists nonadministrator users who support a subset of accounts or sites within a single
AirWave deployment, such as help desk or IT staff.
User roles can be restricted to multiple folders within the overall hierarchy,
even if they do not share the same top-level folder. Non-administrator users
are only able to see data and users for devices within their assigned subset of
folders.
No, then enter the amount of time that can elapse before the access expires.
Allow
sponsor to
change
sponsorship
user name
Custom
Message
NoSpecifies whether a sponsor can change the sponsorship user name.
noneA custom message can also be included.
Configuring the User Login and Authentication
AirWave uses session-based authentication with a configurable login message and idle timeout. As an option,
you can set AirWave to use an external user database to simplify password management for AirWave
administrators and users.
This section contains the following procedures to be followed in AMP Setup > Authentication:
l "Configuring the User Login" on page44
l "Configuring Whitelists" on page 44
l Setting up Certificate Authentication
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 43
l "Setting Up Single Sign-On" on page 45
l "Specifying the Authentication Priority" on page 45
l "Configuring RADIUS Authentication and Authorization" on page 46
l "Integrating a RADIUS Accounting Server" on page 45
l "Configuring TACACS+ Authentication" on page48
l "Configuring LDAP Authentication and Authorization" on page 50
Configuring the User Login
Follow these steps to configure the login banner message, idle timeout, and persistent cookies which are sessionbased:
To configure user login:
1. Navigate to AMP Setup > Authentication > Login Configuration.
2. To clear information such as user logins, select No for the "Use Persistent Cookies" option.
3. Enter the length of time that passes before AirWave ends an idle user session. 5 minutes is the lowest idle
setting.
Figure 8: Example Settings for the Login Configuration Page
4. In the Login Message and Click Through Agreement fields, type the login banner message and login
agreement message that will display before the user logs in to AirWave, requiring the user to accept the terms
of usage before granting full access to the WebUI.
5. Click Save at the bottom of the page.
Configuring Whitelists
By adding subnets to a whitelist, you can limit AirWave access to users on a list of trusted subnets.
Do not delete the current client network from the AirWave whitelist, or you might lose access to the AirWave WebUI.
To configure the whitelist:
1. Navigate to AMP Setup > Authentication.
2. In the Login Configuration section, select Yes for the "Enable AMP Whitelist" option. When you enable this
functionality, AirWave displays the whitelist with the current client network as the first entry.
44 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Figure 9: Enabling Whitelists
3. Enter additional subnets, one subnet per line.
4. Scroll down the page, then click Save.
Setting Up Single Sign-On
On the AMP Setup > Authentication page, administrators can set up single sign-on (SSO) for users that have
access to AirWave controllers. This allows users to log in to AirWave and use the IP Address or Quick Links
hypertext links across AirWave to access the controller’s WebUI without having to enter credentials again. The
links the user can select to access a controller can be found on the Devices > Monitor page in the Device Info
section, and on device list pages.
Perform the following steps to enable this feature for this AirWave.
1. Locate the Single Sign-On section in AMP Setup > Authentication.
2. In the Enable Single Sign-On field, select Yes.
3. Select Save if you are finished or follow the next procedure to specify the authentication priority.
Specifying the Authentication Priority
To specify the authentication priority for this AirWave server, locate the Authentication Priority section in
AMP Setup > Authentication, and select either Local or Remote as the priority.
If Local is selected, then remote will be attempted if a user is not available. If Remote is selected, then the local
database is searched if remote authentication fails. The order of remote authentication is RADIUS first, followed
by TACACS, and finally LDAP.
Select Save if you are finished or follow the next procedure to configure RADIUS, TACACS+, and LDAP
Authentication options.
Integrating a RADIUS Accounting Server
AirWave checks the local user name and password before checking with the RADIUS server. If the user is found
locally, the local password and role apply. When using RADIUS, it’s not necessary or recommended to define
users on the AirWave server. The only recommended user is the backup admin, in case the RADIUS server goes
down.
Optionally, you can configure RADIUS server accounting on AMP Setup > RADIUS Accounting. This capability
is not required for basic AirWave operation, but can increase the user-friendliness of AirWave administration in
large networks. Figure 10 illustrates the settings of this optional configuration interface.
Perform the following steps and configurations to enable AirWave to receive accounting records from a separate
RADIUS server. Figure 10 illustrates the display of RADIUS accounting clients already configured.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 45
1. To define a the RADIUS authentication server or network, browse to the AMP Setup > RADIUS Accounting
page, select Add, and provide the information in Table 20.
Table 20: AMP Setup > Radius Accounting Fields and Default Values for LDAP Authentication
SettingDefaultDescription
IP/NetworkNoneSpecify the IP address for the authentication server if you only want to accept
packets from one device. To accept packets from an entire network enter the
IP/Netmask of the network (for example, 10.51.0.0/24).
NicknameNoneSets a user-defined name for the authentication server.
Shared Secret
(Confirm)
NoneSets the Shared Secret that is used to establish communication between
AirWave and the RADIUS authentication server.
2. Click Add to save your settings.
Configuring RADIUS Authentication and Authorization
For RADIUS capability, you must configure the IP/Hostname of the RADIUS server, the TCP port, and the server
shared secret. Perform these steps to configure RADIUS authentication:
1. Go to the AMP Setup > Authentication page. This page displays current status of RADIUS. Figure 11
illustrates this page.
46 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Figure 11: AMP Setup > Authentication Page Illustration for RADIUS
2. Select No to disable or Yes to enable RADIUS authentication. If you select Yes, several new fields appear.
Complete the fields described in Table 21.
Table 21: AMP Setup > Authentication Fields and Default Values for RADIUS Authentication
FieldDefaultDescription
Primary Server
Hostname/IP Address
Primary Server Port
(1-65535)
Primary Server SecretN/ASpecify and confirm the primary shared secret for the primary RADIUS
Confirm Primary
Server Secret
Secondary Server
Hostname/IP Address
Secondary Server Port
(1-65535)
N/AEnter the IP address or the hostname of the primary RADIUS server.
1812Enter the TCP port for the primary RADIUS server.
server.
N/ARe-enter the primary server secret.
N/AEnter the IP address or the hostname of the secondary RADIUS server.
1812Enter the TCP port for the secondary RADIUS server.
Secondary Server
Secret
Confirm Secondary
Server Secret
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 47
N/AEnter the shared secret for the secondary RADIUS server.
N/ARe-enter the secondary server secret.
Table 21: AMP Setup > Authentication Fields and Default Values for RADIUS Authentication (Continued)
FieldDefaultDescription
Authentication Method PAPSelect one of the following authentication methods:
l PAP
l PEAP-MSCHAPv2
If you use the PEAP-MSCHAPv2 authentication method with the default
"Read-Only Monitoring and Auditing" user role, note that the name of
this role has been slightly modified in AirWave 8.2.3 to allow support
the PEAP-MSCHAPv2 authentication method: the ampersand
(&)symbol has been changed to the word and.
l Role Name in 8.2.2.x and earlier releases: Read-Only Monitoring
& Auditing
l Role Name in AirWave 8.2.3: Read-Only Monitoring and Auditing
If you used the Read-Only Monitoring & Auditing user role prior to
upgrading to AirWave 8.2.3 or later releases, you must modify the user
role name on the RADIUS server to ensure that the user role name on
the RADIUS server exactly matches the user role name in AirWave.
3. Select Save to retain these configurations, and continue with additional steps in the next procedure.
Configuring TACACS+ Authentication
For TACACS+ capability, you must configure the IP/Hostname of the TACACS+ server, the TCP port, and the
server shared secret. This TACACS+ configuration is for AirWave users and does not affect APs or users logging
into APs.
1. Go to the AMP Setup > Authentication page. This page displays current status of TACACS+. Figure 12
illustrates this page when neither TACACS+, LDAP, nor RADIUS authentication is enabled in AirWave.
Figure 12: AMP Setup > Authentication Page Illustration for TACACS+
2. Select No to disable or Yes to enable TACACS+ authentication. If you select Yes, several new fields appear.
Complete the fields described in Table 22.
48 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Table 22: AMP Setup > Authentication Fields and Default Values for TACACS+ Authentication
FieldDefaultDescription
Primary Server Hostname/IP
Address
Primary Server Port (1-65535)49Enter the port for the primary TACACS+ server.
Primary Server SecretN/ASpecify and confirm the primary shared secret for the primary
Confirm Primary Server
Secret
Secondary Server
Hostname/IP Address
Secondary Server Port (1-
65535)
Secondary Server SecretN/AEnter the shared secret for the secondary TACACS+ server.
Confirm Secondary Server
Secret
N/AEnter the IP address or the hostname of the primary TACACS+
server.
TACACS+ server.
N/ARe-enter the primary server secret.
N/AEnter the IP address or hostname of the secondary TACACS+
server.
49Enter the port for the secondary TACACS+ server.
N/ARe-enter the secondary server secret.
3. Select Save and continue with additional steps.
Configuring Cisco ACS to Work with AirWave
To configure Cisco ACS to work with AirWave, you must define a new service named AMP that uses HTTPS on the
ACS server.
1. The AMP HTTPS service is added to the TACACS+ (Cisco) interface under the Interface Configuration tab.
2. Select a checkbox for a new service.
3. Enter AMP in the service column and https in the protocol column.
4. Select Save.
5. Edit the existing groups or users in TACACS to use the AMP service and define a role for the group or user.
l The role defined on the Group Setup page in ACS must match the exact name of the role defined on the
AMP Setup > Roles page.
n The defined roleshould use the format: role=<name_of_AMP_role>. For example role=DormMonitoring.
As with routers and switches, AirWave does not need to know user names.
6. AirWave also needs to be configured as an AAA client.
l On the Network Configuration page, select Add Entry.
l Enter the IP address of AirWave as the AAA Client IP Address.
l The secret should be the same value that was entered on the AMP Setup > TACACS+ page.
7. Select TACACS+ (Cisco IOS) in the Authenticate Using drop down menu and select submit + restart.
AirWave checks the local user name and password store before checking with the TACACS+ server. If the user is
found locally, the local password and local role apply. When using TACACS+, it is not necessary or
recommended to define users on the AirWave server. The only recommended user is the backup administrator,
in the event that the TACACS+ server goes down.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 49
Configuring LDAP Authentication and Authorization
LDAP (Lightweight Directory Access Protocol) provides users with a way of accessing and maintaining distributed
directory information services over a network. When LDAP is enabled, a client can begin a session by
authenticating against an LDAP server which by default is on TCP port 389.
Perform these steps to configure LDAP authentication:
1. Go to the AMP Setup> Authentication page.
2. Select the Yes radio button to enable LDAP authentication and authorization. Once enabled, the available
LDAP configuration options will display. Figure 13 illustrates this page.
Figure 13: AMP Setup > Authentication Page Illustration for LDAP
3. Complete the fields described in Table 23.
50 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Table 23: AMP Setup > Authentication Fields and Default Values for LDAP Authentication
FieldDefaultDescription
Support Deprecated
Ciphers
Primary Server
Hostname/IP Address
DisabledBy default, AirWave supports the following strong ciphers.
l DHE-RSA-AES128-SHA
l DHE-RSA-AES256-SHA
l DHE-RSA-AES128-SHA256
l DHE-RSA-AES256-SHA256
l ECDHE-ECDSA-AES128-SHA256
l ECDHE-ECDSA-AES256-SHA384
l ECDHE-ECDSA-AES128-GCM-SHA256
l ECDHE-ECDSA-AES256-GCM-SHA384
Enable this Support Deprecated Ciphers option to allow
AirWave to also use following legacy ciphers:
l AES128-SHA
l AES256-SHA
l DES-CBC3-SHA
l DHE-DSS-AES128-SHA
l DHE-DSS-AES256-SHA
l EDH-DSS-DES-CBC3-SHA
l EDH-RSA-DES-CBC3-SHA
l KRB5-DES-CBC3-MD5
l KRB5-DES-CBC3-SHA
NOTE: AirWave does not recommend using legacy ciphers
for an extended length of time.
noneEnter the IP address or the hostname of the primary LDAP
server.
Primary Server Port
(1-65535)
Secondary Server
Hostname/IP Address
389Enter the port where the LDAP server is listening. The default
port is 389.
noneOptionally enter the IP address or hostname of the
secondary LDAP server. This server will be contacted in the
event that the primary LDAP server is not reachable.
Secondary Server Port
(1-65535)
389Enter the port where the LDAP service is listening on the
secondary LDAP server. The default port is 389.
Connection Typeclear-textSpecify one of the following connection types AirWave and
the LDAP server:
l clear-text results in unencrypted communication.
l ldap-s results in communication over SSL.
l start-tls uses certificates to initiate encrypted
communication.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 51
Table 23: AMP Setup > Authentication Fields and Default Values for LDAP Authentication (Continued)
FieldDefaultDescription
View Server
Certificate
noneIf Connection Type is configured as start-tls, then also
specify whether the start-tls connection type uses a
certificate.
l none - The server may provide a certificate, but it will not
be verified. This may mean that you are connected to the
wrong server.
l optional - Verifies only when the servers offers a valid
certificate.
l require - The server must provide a valid certificate.
A valid LDAP Server CA Certificate must be provided in
case of optional or require. Certificates uploaded on the
Device Setup > Certificates page with a type of
Intermediate CA or Trusted CA are listed in the drop down
for LDAP Server CA Certificate.
LDAP Server CA
Certificate
noneSpecify the LDAP server certificate to use to initiate
encrypted communication. Only certificates that have been
uploaded with a type of Intermediate CA or Trusted CA will
appear in this drop down.
NOTE: This LDAP Server CA Certificate drop down menu
only appears if View Server Certificate is specified asoptional or require.
Bind DNnoneSpecify the Distinguished Name (DN) of the administrator
account, such as
‘cn=admin01,cn=admin,dn=domain,dn=com’. Note that for
the Active directory, the bind DN can also be in the
administrator@domain format (for example,
administrator@acme.com).
Bind PasswordnoneSpecify the bind DN account password.
Confirm Bind
noneRe-enter the bind password.
Password
Base DNnoneThe DN of the node in your directory tree from which to start
searching for records. Generally, this would be the node that
contains all the users who may access AirWave, for example
cn=users,dc=domain,dc=com.
Key AttributesAMAccountNameThe LDAP attribute that identifies the user, such as
‘sAMAccountName’ for Active Directory
Role AttributenoneThe LDAP attribute that contains the AirWave role. Users
who log in to AirWave using this LDAP authentication will be
granted permissions based on this role. Refer to Configuring
AirWave User Roles for more information about AirWave
User Roles.
Filter(objectclass=*)This option limits the object classes in which the key,role
attributes would be searched.
52 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Table 23: AMP Setup > Authentication Fields and Default Values for LDAP Authentication (Continued)
FieldDefaultDescription
Add New LDAP RulenoneThe LDAP rule parameters are
Operation,Value
LDAP rules, rules are processed in order based on the rule
position value, so the position you assign to the LDAP rule
represents the order in which the LDAP rule is applied to
determine the AirWave role. LDAP rules can only be
configured and applied after LDAP authentication is enabled.
The LDAP rules are similar to the rules used by the controller
to derive the AirWave role.
, and
AirWave
Position,Role Attribute
role. If you create multiple
,
4. Select Save to retain these configurations, and continue with additional steps in the next procedure.
What Next?
l Go to additional subtabs in AMP Setup to continue additional setup configurations.
l Complete the required configurations in this chapter before proceeding. Aruba support remains available to
you for any phase of AirWave configuration.
Enabling AirWave to Manage Your Devices
After you install AirWave, configure the communication settings that enable AirWave to monitor and manage
your devices and download firmware as described in the following sections:
l "Configuring Communication Settings for Newly Discovered Devices" on page 53
l "Uploading Firmware and Files" on page 54
Configuring Communication Settings for Newly Discovered Devices
You can configure AirWave to communicate with your devices by defining default shared secrets and SNMP
settings. In order for AirWave to configure the devices, community strings and shared secrets must have readwrite access.
To modify the credentials for existing devices, go to Devices > Manage, or go to Devices > List and click
Modify Devices.
To configure communication settings for newly discovered devices:
1. Go to Device Setup > Communication page, then scroll down the page.
2. Enter the following SNMPsettings:
l SNMP Timeout. The length of time (three to 60 seconds) that AirWave waits for a response from a device
after sending the device an SNMP request. The default time is three seconds.
l SNMP Retries. The number of times (one to 40) that AirWave polls a device when the device doesn't
respond to an SNMPrequest. Optionally, AirWave uses the number of times set for the device group by the
Missed SNMP Poll Threshold option. AirWave will classify the device as being down if the device doesn't
respond after reaching this number. If an SNMP library has a limit of 20 retries, AirWave will stop at 20. The
default is three times.
3. Click Add, then enter the following information for the SNMPv3 user:
l Username. User name of the SNMPv3 user, as it is configured on the controller. The SNMP Inform
receiver will restart when users are changed or added to the controller.
l Auth Protocol. MD5 or SHA. The default setting is SHA.
l Auth Passphrase. Authentication and privilege protocol passphrase for the SNMPv3 user, as it is
configured on the controller. Re-enter the passphrase.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 53
l Priv Protocol. The symmetric-key algorithm used to encrypt data, Data Encryption Standard (DES) or
Advanced Encryption Standard (AES). The default standard is DES.
l Priv Protocol Passphrase. Privilege protocol passphrase for the SNMPv3 user, as it is configured on the
controller. Re-enter the passphrase.
4. For the Telnet/SSH Timeout option, enter the timeout period (zero to 600 seconds) to apply when
performing Telnet and SSH commands. The default timeout is 10 seconds.
5. For the HTTP Timeout option, enter the timeout period (three to 120 seconds) used when running an HTTP
discovery scan. The default timeout is five seconds.
6. For the Attempt to ping devices that were unreachable via SNMP option, select No if ICMP is disabled
on the network. By default, this option is enabled. When there are more than 100 devices, and many are
unreachable by ICMP, the timeouts will impede network performance, and you should turn off this option.
7. For Symbol 4131 and Cisco IOS devices that don't have SNMPinitialized, select one of the following options:
n Do not modify SNMP settings. AirWave will not modify any SNMPsettings for these devices when you
select this option. By default, this option is enabled.
n Enable read-write SNMP. AirWave will manage these devices using SNMP when you select this option.
By default, this option is disabled.
Uploading Firmware and Files
AirWave automates firmware distribution to the devices on your network. Once you have downloaded the
firmware from the vendor, you can upload the firmware to AirWave for distribution to devices from the UploadFirmware & Files page. After you upload the firmware, AirWave lists them in the Firmware Files table on this
page.
For more information about specifying firmware versions for devices in a group, see "Specifying the Minimum
Firmware Version for Device Groups" on page 124.
Table 24 below itemizes the contents, settings, and default values for the Upload Firmware & Files page.
HTML FilenameNoneSupporting HTML, displays the name of the file that was
HTML MD5
Checksum
NoneDisplays the name of the file that was uploaded to AirWave
and to be transferred to an AP when the file is used in an
upgrade.
NoneDisplays the MD5 checksum of the file after it was uploaded to
AirWave. The MD5 checksum is used to verify that the file was
uploaded to AirWave without issue. The checksum should
match the checksum of the file before it was uploaded.
NoneDisplays the size of the firmware file in bytes.
NoneDisplays the firmware version number. This is a user-
configurable field.
uploaded to AirWave and to be transferred to an AP when the
file is used in an upgrade.
NoneSupporting HTML, displays the MD5 checksum of the file after
it was uploaded to AirWave. The MD5 checksum is used to
verify that the file was uploaded to AirWave without issue. The
checksum should match the checksum of the file before it was
uploaded.
HTML File SizeNoneSupporting HTML, displays the size of the file in bytes.
HTML VersionNoneSupporting HTML, displays the version of HTML used for file
transfer.
Desired
Firmware File for
Specified Groups
NoneThe firmware file is set as the desired firmware version on the
Groups > Firmware Files page of the specified groups. You
cannot delete a firmware file that is set as the desired
firmware version for a group.
Loading Firmware Files onto AirWave
Perform the following steps to load a device firmware file onto AirWave:
1. Go to the Device Setup > Upload Firmware & Files page.
2. Select Add by the New Firmware File option. The Add Firmware File page appears. Figure 14 illustrates this
page.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 55
3. Select the Supported Firmware Versions and Features link to view supported firmware versions.
Unsupported and untested firmware may cause device mismatches and other problems. Please contact Aruba
support before installing non-certified firmware.
4. Enter the appropriate information and select Add. The file uploads to AirWave and once complete, this file
appears on the Device Setup > Upload Firmware & Files page. This file also appears on additional pages
that display firmware files (such as the Group > Firmware pageand on individual Devices > Manage
pages).
5. You can also import a CSV list of groups and their external TFTP firmware servers. Table 25 itemizes the
settings of this page.
Table 25: Supported Firmware Versions and Features Fields and Default Values
SettingDefaultDescription
TypeAruba Networks
controller
Firmware Version NoneProvides a user-configurable field to specify the firmware
DescriptionNoneProvides a user-configurable text description of the
Upload firmware
files (and use
built-in firmware)
Use an external
firmware file
server
EnabledAllows you to select a firmware from your local machine
N/AYou can also choose to assign the external TFTP server on
Indicates the firmware file is used with the specified type.
With selection of some types, particularly Cisco
controllers, you can specify the boot software version.
version number. This open appears if Use an externalfirmware file server is enabled.
firmware file.
and upload it via TFTP or FTP.
a per-group basis. If you select this option, you must enter
the IP address on the Groups > Firmware page.
Complete the Firmware File Server IP Address field.
Server ProtocolTFTPSpecify whether to use a built-in TFTP server or FTP, HTTP,
or HTTPS to upload a firmware file. TFTP is
recommended. If you select FTP, AirWave uses an
anonymous user for file upload.
56 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Table 25: Supported Firmware Versions and Features Fields and Default Values (Continued)
SettingDefaultDescription
Use Group File
Server
Firmware File
Server IP
Address
Firmware
Filename
HTMLFilenameNoneBrowse to the HTMLfile that will accompany the firmware
Patch FilenameNoneIf you selected Symbol WS5100 as the Firmware File Type,
Boot Software
Version
DisabledIf you opt to use an external firmware file server, this
additional option appears. This setting instructs AirWave
to use the server that is associated with the group instead
of defining a server.
NoneProvides the IP address of the External TFTP Server (like
SolarWinds) used for the firmware upgrade. This option
displays when the user selects the Use an externalfirmware file option.
NoneEnter the name of the firmware file that needs to be
uploaded. Ensure that the firmware file is in the TFTP root
directory. If you are using a non-external server, you
select Choose File to find your local copy of the file.
upload. Note that this field is only available for certain
Firmware File Types (for example, Symbol 4121).
and you are upgrading from version 3.0 to 3.1, then
browse to the path where the patch file is located.
NoneIf you specified a Cisco WLC device as the Firmware File
Type, then also enter the boot software version.
Additional fields may appear for multiple device types. AirWave prompts you for additional firmware
information as required. For example, Intel and Symbol distribute their firmware in two separate files: an image
file and an HTML file. Both files must be uploaded to AirWave for the firmware to be distributed successfully
via AirWave.
6. Select Add to import the firmware file.
Deleting Firmware Files
To delete a firmware file that has already been uploaded to AirWave, return to the Device Setup > Upload
Firmware & Files page, select the checkbox for the firmware file and select Delete.
A firmware file may not be deleted if it is the desired version for a group. Use the Group > Firmware page to
investigate this potential setting and status.
Adding Web Auth Bundles
Web authentication bundles are configuration files that support Cisco WLC wireless LAN controllers. This
procedure requires that you have local or network access to a Web Auth configuration file for Cisco WLC devices.
To add or edit a Web Authentication Bundle:
1. Go to the Device Setup > Upload Firmware & Files page.
2. Click Add by the New Web Auth Bundle option. This page displays any existing web authentication bundles
that are currently configured in AirWave.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 57
3. Select Add to create a new bundle (see Figure 15), or select the pencil icon next to an existing bundle to edit.
You may also delete a bundle by selecting that bundle with the checkbox, and selecting Delete.
Figure 15: Adding a Web Auth Bundle
4. Enter a descriptive label in the description field. This is the label used to identify and track web authentication
bundles on the page.
5. Enter the path and file name of the web authentication bundle, or select Choose File to locate the file.
6. Select Add to complete the web authentication bundle creation, or Save if replacing a previous Web Auth
configuration file, or Cancel to abort the Web Auth integration.
For additional information about using web authentication bundles with Cisco WLC controllers, refer to the
Wireless LAN controller Web Authentication Configuration Example, Document ID: 69340 on Cisco’s Web site.
Adding a New Captive Portal Logo
If you want to use a company logo for a guest account that uses a captive portal for network authentication, you
upload the logo to AirWave and then set a group of devices to use the captive portal logo.
To upload a company logo image file:
1. Click Add at the bottom of the Upload Firmware & Files page next to New Captive Portal Logo.
Figure 16: Adding a Captive Portal Logo
2. Enter a logo description.
3. Click Choose File to select the image file, then click Open.
4. Click Add. AirWave displays the newly added imagefile in the Firmware Files table.
Adding a New DRT File
You can use the downloadable regulatory table (DRT) to update country domain options without upgrading the
ArubaOS software version on an AP.
To add a DRT fileto AirWave:
1. Click Add at the bottom of the Upload Firmware & Files page next to New DRT File.
58 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Figure 17: Adding a DRT File
2. Enter a DRT file description.
3. Click Choose File to select the DRT file, then click Open.
4. Click Add. AirWave displays the newly added DRT file in the Firmware Files table.
Managing Certificates
After installing AirWave, you can install a new SSL certificate, or generate a CSR to install a signed certificate from
the AMP CLI. Some certificate management tasks can only be done using the AMP CLI whileothers can be done
using the WebUI, and the tasks are described in the following topics:
l "Uploading Certificates" on page 59
l "Changing the SSL Certificate for Aruba Instant" on page 61
l "Generating Certificate Signing Requests (CSRs) " on page 61
l "Setting Up Certificate Authentication" on page 62
l "Disabling the Certificate Authentication Requirement" on page 63
l "Installing Signed Certificates" on page 64
l "Regenerating Self-Signed Certificates" on page 64
l "Adding DTLS Certificates" on page 65
l "Configuring Certificate Revocation Lists (CRLs)" on page 65
Uploading Certificates
AirWave can help you manage your certificates when you upload them to the AirWave server. AirWave verifies
basic certificate information before accepting the certificate and pushing it to a device.
WebUI
You can upload the following certificates from the WebUI:
l CRL
l Intermediate Certificate Authority (CA)
l Online Certificate Status Protocol (OCSP) Responder
l OCSP Signer
l Public certificates
l Server certificates
l Trusted CA certificates
l Captive Portal (CP) certificates
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 59
After you upload a certificate to AirWave, the certificate file becomes available on additional pages where you can
select certificate files, including AMP Setup > Authentication and Groups > Basic > Certificates. For self-
signed certificates, refer to "Installing Signed Certificates" on page 64.
For example, Figure 18 shows a certificate named IAP CPCert being added. You can later choose this certificate
for an IAP by navigating to the Group > Basic page for the device group that contains IAPs.
To add a certificate:
1. Go to the Device Setup > Certificates, then click Add.
Figure 18: Adding a Captive Portal Certificate
2. Enter a name for the certificate.
3. Click Choose File to find your local copy of the certificate.
4. Enter the passphrase, if any, and renter the passphrase.
5. Select the format that matches the certificate file.
6. Select the certificate type.
7. Click Add.
AMP CLI
1. From the AMP CLI, enter 3-4 to open the Configuration > Certificates menu.
Figure 19: Opening the Certificates Menu
2. Enter 1 to open the Add SSL Certificate menu.
60 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Figure 20: Opening the Add SSLCertificate Menu
3. Follow the prompt to install the SSL certificate on your AirWave server. The signed certificate should be in
PKCS12 format with a *.pfx or *.p12 file extension.
Changing the SSL Certificate for Aruba Instant
In order to use certificate-based authentication, you must upload a certificate issued from a supported
certificate authority (CA) to the AMP server or else the SSL handshake will fail. You must also configure the AMP
IP address on the Instant AP with a domain name and not an IP address. For more information about security
methods for Aruba Instant, see "Aruba Instant Settings" on page 20.
CA Root Intermediate CA: C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO
High-Assurance Secure Server CA
l Chain 2: Trusted Root CA: C=US, O=GeoTrust Inc., CN=GeoTrust Global CA Intermediate CA: Subject: C=US,
O=Google Inc, CN=Google Internet Authority G2
l Chain 3: Trusted Root CA: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 2006 VeriSign, Inc. -
For authorized use only, CN=VeriSign Class 3 Public Primary Certification Authority - G5 Intermediate CA:
C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=Terms of use at https://www.verisign.com/rpa (c)10,
CN=VeriSign Class 3 Secure Server CA - G3
To change the certificate for Aruba Instant device authentication:
1. 1. Go to AMP Setup > General, then scroll down to Aruba Instant Options.
2. Select PSK and Certificate or Certificate only.
Figure 21: Selecting a Certificate Authentication Option
3. Click Change to find the certificate file on the AMP server. The certificate should be in PEM format and with a
private key.
4. Click Upload.
Generating Certificate Signing Requests (CSRs)
To generate the CSR to request a certificate from AirWave:
1. From the AMP CLI, enter 3-4-2 to open the Configuration > Certificates > Generate Certificate SigningRequest menu.
2. Enter 2 to generate a CSR.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 61
Figure 22: Figure 22: Opening the Generate Certificate Signing Request Menu
3. Follow the prompts to enter the data associated with the organization:
a. 2-letter country code
b. State or province
c. Locality or city
d. Organization or company
e. Organization unit or department
f. Common name or server host name
g. Email address
h. Fully qualified DNS name
i. IP addresses
Figure 23: Entering Certificate Data
4. Enter a to accept the changes and save the data.
Setting Up Certificate Authentication
On the AMP Setup > Authentication page, you can specify whether to use two-factor authentication. With
two-factor authentication, the AirWave user name and password and a PEM-encoded certificate bundle is
required. When using the Smart Card or tokencommon access card (CAC), AirWave will prompt you to enter the
PIN.
62 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
This feature must be enabled per role in AMP Setup > Roles.
When entering the PEM bundle, you must install every member in the certificate chain provided by the SSL
vendor in order for smart card or tokenCAC authentication to work.
To set up certificate authentication:
1. Go to AMP Setup > Authentication.
2. Select Yes to enable certificate authentication. Once enabled, certificate authentication options will display.
3. Select Yes to turn on the Use Two-factor Authentication option.
4. Enter your PEM certificate bundle in the text field. For example, in Figure 24, two intermediate certificates are
bundled with the two root certificates, one being at the top of the chain.
Figure 24: Two-Factor Authentication Configuration Example
5. Scroll to the bottom of the page, then click Save.
Disabling the Certificate Authentication Requirement
You might want to configure local databaseauthentication, and in order to do so you should turn off the
certificate authentication requirement and add your PEM bundle. Although certificate authentication is not
required when disabled, certificate authentication, or OCSP validation, will occur for users with certificates.
To disable certificate authentication:
1. From the WebUI, go to AMP Setup > Authentication, select Yes to enable certificate authentication.
2. For the Require Certificate Authentication option, select No.
3. Enter your PEM certificate bundle in the text field.
Figure 25: Entering the PEM Certificate Bundle
4. Scroll down, then click Save.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 63
Installing Signed Certificates
Before you install the signed certificate, you must export the CSR created in "Generating Certificate Signing
Requests (CSRs) " on page 61 to a third-party certificate authority (CA) and then upload the returned certificate
to the AirWave server.
To install the signed certificate:
1. From the AMP CLI, enter 3-4-3 to open the Configuration > Certificates > Install Signed Certificate
menu.
Figure 26: Opening the Install Signed Certificate Menu
2. Follow the prompt to select the certificate, then press Enter. The signed certificate should be PEM-encoded
with a *.crt file extension.
Regenerating Self-Signed Certificates
AirWave automatically generates a self-signed certificate during installation and when the host name is changed
from the CLI. If you need to regenerate the self-signed certificate for any reason, you can regenerate the selfsigned certificate on AMP using the CLI.
To regenerate the self-signed certificate:
1. From the AMP CLI, enter 3-4-4 to open the Configuration > Certificates > Regenerate Self-SignedCertificate menu.
Figure 27: Opening the Regenerate Self-Signed Certificate Menu
2. Enter y when prompted.
64 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Adding DTLS Certificates
DTLS certificates can be used to encrypt secure AMON traffic on your AMP server.
To install the DTLS certificate:
1. From the AMP CLI, enter 3-4-5 to open the Configuration > Certificates > Add DTLS Certificate menu.
Figure 28: Opening the Add DTLS Certificate Menu
2. Follow the prompt to select the certificate, then press Enter. The signed certificate should be in PKCS12
format with a *.pfx or *.p12 file extension and contain the private key, root certificate, and intermediate
certificates.
Configuring Certificate Revocation Lists (CRLs)
When you configure a CRL, AirWave checks to see if the certificate sent by the requesting device is revoked. You
could also use a CRL to skip the OCSP check when an OCSP server is not accessible to perform certificate
validation.
To configure the CRL:
1. From the AMP CLI, enter 3-4-7 to open the Configuration > Certificates > CRL menu.
Figure 29: Opening the CRL Menu
2. Enter 1 to make CRL required, then follow the prompts to run the function and return to the CRL menu.
3. Enter 2 to configure a CRL distribution URL, then follow the prompt to add the CRL distribution URL.
4. Enter 3 to add a CRL files and follow the prompt to add the file.
5. Enter the password for the AMP server.
6. Click Update to save the configuration.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 65
Setting Up Device Types
On the AMP Setup > Device Type Setup page, you can define how the device types displayed for users on
your network is calculated from available data. The first matching property is used. These rules cannot be edited
or deleted, but only reordered or enabled.
You can change the priority order of rules by clicking on a row and dragging and dropping it into a new location,
as shown in Figure 30.
Select the checkbox under the Enabled column to turn on device setup rules.
Refer to "Monitoring Wired and Wireless Clients" on page205 for more information on the Device Type column
that appears in Clients list tables.
Figure 30: AMP Setup > Device Type Setup Page Illustration
Configuring Cisco WLSE and WLSE Rogue Scanning
The Cisco Wireless LAN Solution Engine (WLSE) includes rogue scanning functions that AirWave supports. This
section contains the following topics and procedures, and several of these sections have additional subprocedures:
l "Introduction to Cisco WLSE" on page 66
l "Initial WLSE Configuration" on page 67
l "Configuring IOS APs for WDS Participation" on page 69
l "Configuring ACS for WDS Authentication" on page 69
l "Configuring Cisco WLSE Rogue Scanning" on page 70
You must enter one or more CiscoWorks WLSE hosts to bepolled for discovery of Cisco devices and rogue AP
information.
Introduction to Cisco WLSE
Cisco WLSE functions as an integral part of the Cisco Structured Wireless-Aware Network (SWAN) architecture,
which includes IOS Access Points, a Wireless Domain Service, an Access Control Server, and a WLSE. In order for
AirWave to obtain Rogue AP information from the WLSE, all SWAN components must be properly configured.
Table 26 describes these components.
66 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Table 26: Cisco SWAN Architecture Components
SWAN
Requirements
Component
WDS (Wireless Domain
Services)
WLSE (Wireless LAN
Solution Engine)
ACS (Access Control
Server)
APs
l WDS Name
l Primary and backup IP address for WDS devices (IOS AP or WLSM)
l WDS Credentials APs within WDS Group
NOTE: WDS can be either a WLSM or an IOS AP. WLSM (WDS) can control up to 250
access points. AP (WDS) can control up to 30 access points.
l IP Address
l Login
l IP Address
l Login
l APs within WDS Group
Initial WLSE Configuration
Use the following general procedures to configure and deploy a WLSE device in AirWave:
l "Adding an ACS Server for WLSE" on page 67
l "Enabling Rogue Alerts for Cisco WLSE" on page 67
l "Configuring WLSE to Communicate with APs" on page 67
l "Discovering Devices" on page 68
l "Managing Devices" on page 68
l "Inventory Reporting" on page 68
l "Defining Access" on page68
l "Grouping" on page 68
Adding an ACS Server for WLSE
1. Go to the Devices > Discover > AAA Server page.
2. Select New from the drop-down list.
3. Enter the server name, server port (default 2002), user name, password, and a secret.
4. Select Save.
Enabling Rogue Alerts for Cisco WLSE
1. Go to the Faults > Network Wide Settings > Rogue AP Detection page.
2. Select the Enable.
3. Select Apply.
Additional information about rogue devicedetection is available in "Configuring Cisco WLSE Rogue Scanning" on
page70.
Configuring WLSE to Communicate with APs
1. Go to the Device Setup > Discover page.
2. Configure SNMP Information.
3. Configure HTTP Information.
4. Configure Telnet/SSH Credentials
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 67
5. Configure HTTP ports for IOS access points.
6. Configure WLCCP credentials.
7. Configure AAA information.
Discovering Devices
The following three methods can be used to discover access points within WLSE:
l Using Cisco Discovery Protocol (CDP)
l Importing from a file
l Importing from CiscoWorks
Perform these steps to discover access points.
1. Go to the Device > Managed Devices > Discovery Wizard page.
2. Import devices from a file.
3. Import devices from Cisco Works.
4. Import using CDP.
Managing Devices
Prior to enabling radio resource management on IOS access points, the access points must be under WLSE
management.
AirWave becomes the primary management/monitoring vehicle for IOS access points, but for AirWave to gather
Rogue information, the WLSE must be an NMS manager to the APs.
Use these pages to make such configurations:
1. Go to Device > Discover > Advanced Options.
2. Select the method to bring APs into management Auto, or specify via filter.
Inventory Reporting
When new devices are managed, the WLSE generates an inventory report detailing the new APs. AirWave
accesses the inventory report via the SOAP API to auto-discover access points. This is an optional step to enable
another form of AP discovery in addition to AirWave, CDP, SNMP scanning, and HTTP scanning discovery for
Cisco IOS access points. Perform these steps for inventory reporting.
1. Go to Devices > Inventory > Run Inventory.
2. Run Inventory executes immediately between WLSE polling cycles.
Defining Access
AirWave requires System Admin access to WLSE. Use these pages to make these configurations.
1. Go to Administration > User Admin.
2. Configure Role and User.
Grouping
It’s much easier to generate reports or faults if APs are grouped in WLSE. Use these pages to make such
configurations.
1. Go to Devices > Group Management.
2. Configure Role and User.
68 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Configuring IOS APs for WDS Participation
IOS APs (1100, 1200) can function in three roles within SWAN:
l Primary WDS
l Backup WDS
l WDS Member
AirWave monitors AP WDS role and displays this information on AP Monitoring page.
APs functioning as WDS Master or Primary WDS will no longer show up as Down is the radios are enabled.
WDS Participation
Perform these steps to configure WDS participation.
1. Log in to the AP.
2. Go to the Wireless Services > AP page.
3. Select Enable participation in SWAN Infrastructure.
4. Select Specified Discovery, and enter the IP address of the Primary WDS device (AP or WLSM).
5. Enter the user name and password for the WLSE server.
Primary or Secondary WDS
Perform these steps to configure primary or secondary functions for WDS.
1. Go to the Wireless Services > WDS > General Setup page.
2. If the AP is the Primary or Backup WDS, select Use the AP as Wireless Domain Services.
n Select Priority (set 200 for Primary, 100 for Secondary).
n Configure the Wireless Network Manager (configure the IP address of WLSE).
3. If the AP is Member Only, leave all options unchecked.
4. Go to the Security > Server Manager page.
5. Enter the IP address and Shared Secret for the ACS server and select Apply.
6. Go to the Wireless Services > WDS > Server Group page.
7. Enter the WDS Group of the AP.
8. Select the ACS server in the Priority 1 drop-down menu and select Apply.
Configuring ACS for WDS Authentication
ACS authenticates all components of the WDS and must be configured first. Perform these steps to make this
configuration.
1. Login to the ACS.
2. Go to the System Configuration > ACS Certificate Setup page.
3. Install a New Certificate by selecting the Install New Certificate button, or skip to the next step if the
certificate was previously installed.
4. Select User Setup in the left frame.
5. Enter the user name that will be used to authenticate into the WDS and select Add/Edit.
6. Enter the password that will be used to authenticate into the WDS and select Submit.
7. Go to the Network Configuration > Add AAA Client page.
8. Add the host name and IP address associated with the AP and the key.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 69
9. Enter the password that will be used to authenticate into the WDS and select Submit.
For additional and more general information about ACS, refer to "Configuring ACS Servers" on page 71.
Configuring Cisco WLSE Rogue Scanning
The AMP Setup > WLSE page allows AirWave to integrate with the Cisco Wireless LAN Solution Engine (WLSE).
AirWave can discover APs and gather rogue scanning data from the Cisco WLSE.
Perform the following steps for optional configuration of AirWave for support of Cisco WLSE rogue scanning.
1. To add a Cisco WLSE server to AirWave , navigate to the AMP Setup > WLSE page and select Add. Complete
the fields in this page. Table 27 describes the settings and default values.
Table 27: AMP Setup > WLSE Fields and Default Values
SettingDefaultDescription
Hostname/IP AddressNoneDesignates the IP address or DNS Hostname for the WLSE server,
which must already be configured on the Cisco WLSE server.
ProtocolHTTPSpecify whether to use HTTP or HTTPS when polling the WLSE.
Port1741Defines the port AirWave uses to communicate with the WLSE
server.
UsernameNoneDefines the user name AirWave uses to communicate with the WLSE
server. The user name and password must be configured the same
way on the WLSE server and on AirWave.
The user needs permission to display faults to discover rogues and
inventory API (XML API) to discover manageable APs. As derived
from a Cisco limitation, only credentials with alphanumeric
characters (that have only letters and numbers, not other symbols)
allow AirWave to pull the necessary XML APIs.
PasswordNoneDefines the password AirWave uses to communicate with the WLSE
server. The user name and password must be configured the same
way on the WLSE server and on AirWave.
As derived from a Cisco limitation, only credentials with
alphanumeric characters (that have only letters and numbers, not
other symbols) allow AirWave to pull the necessary XML APIs.
Poll for AP Discovery; Poll
for Rogue Discovery
Polling Period10
YesSets the method by which AirWave uses WLSE to poll for discovery of
new APs and/or new rogue devices on the network.
Determines how frequently AirWave polls WLSE to gather rogue
minutes
scanning data.
2. After you have completed all fields, select Save. AirWave is now configured to gather rogue information from
WLSE rogue scans. As a result of this configuration, any rogues found by WLSE appear on the RAPIDS > List
page.
What Next?
l Go to additional tabs in the AMP Setup section to continue additional setup configurations.
l Complete the required configurations in this chapter before proceeding. Aruba support remains available to
you for any phase of AirWave installation.
70 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Configuring ACS Servers
This is an optional configuration. The AMP Setup > ACS page allows AirWave to poll one or more Cisco ACS
servers for wireless user name information. When you specify an ACS server, AirWave gathers information about
your wireless users. Refer to "Setting Up Device Types" on page 66 if you want to use your ACS server to manage
your AirWave users.
Perform these steps to configure ACS servers:
1. Go to the AMP Setup > ACS page. This page displays current ACS setup, as illustrated in Figure 31.
Figure 31: AMP Setup > ACS Page Illustration
2. Select Add to create a new ACS server, or select a pencil icon to edit an existing server. To delete an ACS server,
select that server and select Delete. When selecting Add or Edit, the Details page appears.
3. Complete the settings on AMP Setup > ACS > Add/Edit Details. Table 28 describes these fields:
IP/HostnameNoneSets the DNS name or the IP address of the ACS Server.
ProtocolHTTPLaunches a drop-down menu specifying the protocol AirWave uses when it polls
the ACS server.
Port2002Sets the port through which AirWave communicates with the ACS. AirWave
generally communicates over port 2002.
UsernameNoneSets the user name of the account AirWave uses to poll the ACS server.
PasswordNoneSets the password of the account AirWave uses to poll the ACS server.
Polling Period10 minLaunches a drop-down menu that specifies how frequently AirWave polls the
ACS server for user name information.
4. Select Add to finish creating the new ACS server, or Save to finish editing an existing ACS server.
5. The ACS server must have logging enabled for passed authentications. Enable the Log to CSV PassedAuthentications report option, as follows:
n Log in to the ACS server, select System Configuration, then in the Select frame, select Logging.
n Under Enable Logging, select CSV Passed Authentications. The default logging options include the
two columns AirWave requires: User-Name and Caller-ID.
What Next?
l Go to additional tabs in the AMP Setup section to continue additional setup configurations.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 71
l Complete the required configurations in this chapter before proceeding. Aruba support remains available to
you for any phase of AirWave installation.
Integrating NMS Servers
You can integrate AirWave with Network Management System (NMS) servers. Doing so enables AirWave to
forward SNMP traps to the NMS.
Add an NMS Server
AirWave communicates with the NMS server using the SNMPv1, SNMPv2c, or SNMPv3 protocol over Port 162.
To integrate an NMS server with AirWave:
1. Go to AMP Setup > NMS, then click Add.
2. Enter the NMS server hostname or IP address.
3. Use the default port, or you can enter a new port number.
4. Select the SNMP version:
n SNMPv1 or SNMPv2c, then enter the community string and confirm the string.
n SNMPv3, then enter the advanced security options (authentication and privacy protocols and
passphrases).
5. Click Add.
Download the MIB Files
The necessary AMP MIB files are available to download from the AMP Setup > NMS page.
AirWave provides integration with Netcool/OMNIbus and HP ProCurve Manager (PCM). To download the
integration files, go to AMP Setup > NMS.
PCI Compliance Monitoring
AirWave provides compliance monitoring tools that can help your organization be prepared for a PCI Data
Security Standard (DSS) audit. With use of AirWave, your organization can monitor firewalls, network devices,
and other services to show PCI compliance.
Check Compliance
The PCI compliance report displays which requirements AirWave monitors, provides links to device management
pages, and displays any actions required to resolve compliance failures. In addition to displaying pass or fail
status, AirWave provides diagnostic information and recommends actions required to achieve Pass status when
sufficient information is available.
You can find the PCI compliance report for a device by navigating to Devices > List, hovering the pointer over a
device, and clicking Compliance from the shortcut menu. If you created a PCI compliance report from the
Reports Definition page, AirWave displays the report on the Generated Reports page when it is available, as
shown in Figure 32. For information, see "Viewing Generated Reports" on page 361.
72 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Figure 32: PCI Compliance Report Example
You can schedule, view, and re-run custom PCI compliance reports. For information about working with reports,
see "Creating, Running, and Sending Reports" on page 326.
Enabling PCI Compliance Monitoring
When you enable PCI compliance monitoring, AirWave displays real-time information and generates PCI
compliance reports that can be used to verify whether a merchant is compliant with a PCI requirement.
For information security standards, refer to the PCI Quick Reference Guide, accessible online from the PCI
Security Council Document Library or see "Supported PCI Requirements" on page 74.
To enable PCI auditing:
1. Navigate to the AMP Setup > PCI Compliance page.
2. Find the PCI requirement that you want to monitor.
3. Clickto open the Default Credential Compliance page. The compliance settings vary depending on the
PCIrequirement.
4. Select Save.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 73
5. To view and monitor PCI auditing on the network, use generated or daily reports. See "Creating, Running, and
Sending Reports" on page 326. In addition, you can view the real-time PCI auditing of any given device online.
Perform these steps:
a. Go to the Devices > List page.
b. Select a specific device. The Monitor page for that device displays. The Devices page also displays a
Compliance subtab in the menu bar.
c. Select Compliance to view complete PCI compliance auditing for that specific device.
Supported PCI Requirements
AirWave currently supports the PCI 3.0. requirements described in Table 29. When the requirements are
disabled, AirWave does not check for PCI compliance or report on status.
AirWave users without RAPIDS visibility will not see the 11.1 PCI requirements in the PCI compliance report.
Table 29: PCI Requirements
Requirement Description
1.1Establishes firewall and router configuration standards. A device fails if there are
mismatches between the desired configuration and the configuration on the device.
1.2.3Monitors firewall installation between any wireless networks and the cardholder
data environment. A device fails if the firewall is not stateful.
2.1Changes vendor-supplied default passwords before a device connects to the
cardholder data environment or transmits data in the network. A device fails if the
user name, passwords or SNMP credentials used by AirWave are on the list of
forbidden default credentials. The list includes common vendor default passwords.
2.1.1Changes vendor-supplied defaults for wireless environments. A device fails if the
passwords, SSIDs, or other security-related settings are on a list of forbidden values
that AirWave establishes and tracks. The list includes common vendor default
passwords. The user can input new values to achieve compliance.
4.1.1Uses strong encryption in wireless networks before sending payment cardholder
data across open public networks. A device fails if the desired or actual configuration
reflect that WEP is enabled on the network, or if associated users can connect with
WEP.
11.1Uses RAPIDS to identify unauthorized devices. A device fails when a rogue device is
detected and unacknowledged, or when there are no rogues discovered in the last
three months.
11.4Uses intrusion-detection or intrusion-prevention systems to monitor traffic. Recent
IDS events are summarized in the PCI compliance report or the IDS report.
Deploying WMS Offload
The Wireless LAN Management Server (WMS) feature is an enterprise-level hardware device and server
architecture with managing software for security and network policy.
WMS components include:
l Air monitor. This operating mode provides wireless IDS, rogue detection and containment.
74 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
l WMS server. This server manages devices and network activity, such as roguedetection and network policy
enforcement.
l AirWave WebUI. This graphical user interface (GUI) provides access to the WMS offload feature.
Refer to the Aruba and AirWave 8.2.4 Best Practices Guide for additional information, including detailed concepts,
configuration procedures, restrictions, ArubaOS infrastructure, and AirWave version differences in support of
WMS Offload.
WMS Offload Configuration
WMS offload places the burden of the WMS server data and GUI functions on AirWave. WMS master controllers
provide this data so that AirWave can support rigorous network monitoring capabilities.
WMS Offload is supported with ArubaOS Version 2.5.4 or later and AirWave Version 6.0 or later
Follow these steps to configure WMS offload:
1. Configure WLAN switches for optimal AirWave monitoring:
a. Disable debugging.
b. Ensure the AirWave server is a trap receiver host.
c. Ensure proper traps are enabled.
2. Configure AirWave to optimally monitor the AirWave infrastructure:
a. Enable WMS offload on the AMP Setup > General page.
b. Configure SNMP communication.
c. Create a proper policy for monitoring the AirWave infrastructure.
d. Discover the infrastructure.
3. Configure device classification:
a. Set up rogue classification.
b. Set up rogue classification override.
c. Establish user classification override devices.
4. Deploy ArubaOS-specific monitoring features:
a. Enable remote AP and wired network monitoring.
b. View controller license information.
5. Convert existing floor plans to VisualRF to include the following elements:
l ArubaOS
l RF Plan
6. Use RTLS for increasing location accuracy (optional):
a. Enable RTLS service on the AirWave server.
b. Enable RTLS on ArubaOS infrastructure.
Integrating External Servers
AirWave supports integration with Juniper, Brocade or HPE Intelligent Management Center (IMC) servers. When a
device is monitored by AirWave and an external server, the Devices > Monitor page for that deviceprovides a
link to that external server.
Add a Juniper Network Director
AirWave supports integration with Juniper Network Director (ND) 2.0. Once integrated, the Devices > Monitor
pagefor that device provides access to a link the Juniper Network Director WebUI.
AirWave 8.2.10.1 | User GuideConfiguring AirWave | 75
To integrate Juniper Network Director with AirWave:
1. Log in to AirWave, then navigate to AMP Setup > External server.
2. In the Juniper Network Director section, enter the IP address or hostnameof the Juniper Network
Director.
3. Click Save.
Add a Brocade Network Advisor
AirWave can monitor and secure Brocade wired networks, while Brocade Network Advisor monitors Aruba
networks. Once integrated, the Brocade Network Advisor appears in the Devices list on the AirWave Devices >List page, and the Devices > Monitor page for that device provides access to the BrocadeNetwork Advisor
home page.
To integrate Brocade Network Advisor with AirWave:
1. Log in to AirWave, then navigate to AMP Setup > External server.
2. In the Brocade Network Advisor section, enter the IP address or hostname of the Brocade Network
Advisor.
3. Click Save.
Add an HPE Intelligent Management Center
When a managed device is monitored by both AirWave and the HPE Intelligent Management Center (IMC)
Enterprise Software Platform, the Devices > Monitor page for that device includes a link to the IMC server.
Figure 33: IMC Link on the Devices > Monitor page
To integrate an IMC server with AirWave:
1. Log in to AirWave, then navigate to AMP Setup > External server.
2. In the Intelligent Management Center section, enter the IP address or hostname of the IMC server.
3. (Optional) Click the IMCProtocol drop down list and select the HTTPS or HTTP protocol. The default setting
is HTTPS.
4. (Optional) Enter a port number in the IMC Port field. The default port number is 8443.
5. Enter the user name for accessing the IMC server, then confirm this password.
6. Click Save.
76 | Configuring AirWaveAirWave 8.2.10.1 | User Guide
Chapter 3
Using Device Groups
AirWave automates the processes of device configuration and compliance auditing using device groups. A Group
can include one device to hundreds of devices that share common configuration settings, and you can define
groups based on geography, usage or security policies, function, or another variable. Variables include basic
settings, security settings, and radio settings.
Navigation Basics
When you select a device group from the Groups List page, the navigation sidebar varies, depending on the
default group and type of devices that you added to AirWave. After you create additional device groups, you can
change the default group by navigating to AMP Setup > General and selecting a group from the Default Group
drop-down menu.
Figure 34 shows a navigation sidebar menu that is available when you select a group that contains Cisco WLCs.
Figure 34: Navigation Sidebar
The following WebUI pages support group monitoring and configuration:
l List. This page lists all groups configured in AirWave and provides the foundation for all group-level
configurations. For more information, see "Viewing Device Groups" on page 78
l Monitor. This page displays client and bandwidth usage information, lists devices in a given group, provides
an Alert Summary table for monitoring alerts for the group, and provides a detailed Audit Log for grouplevel activity. The default view of the Groups > Monitor page is predefined and cannot be modified.
However, you can create a new view, or edit and copy a view, and save the view to access information you
frequently use. For more information on filtering data from your view, see "Creating Filtered Views" on page
148.
l Basic. This page becomes available when you create a new group on the Groups > List page. For more
information, see "Configuring Basic Settings for Device Groups" on page89.
l Templates. This page manages templates for any device group. You can use templates to manage the
configuration of third-party devices in a group using a configuration file. Variables configure device-specific
and group-level properties. For more information, see "Using Configuration Templates" on page 234.
AirWave 8.2.10.1 | User GuideUsing Device Groups | 77
l Security. This page defines general security settings for device groups, to include RADIUS, encryption, and
additional security settings on devices. For more information, see "Configuring Security for Device Groups"
on page 101
l SSID. This page sets SSIDs, VLANs, and related parameters in device groups. Use this submenu is available
when you configure RADIUS servers on the Groups > AAA Servers page. For more information, see
"Configuring SSIDs and VLANs for Device Groups" on page 106.
l AAA Servers. This page configures authentication, authorization, and accounting settings in support of
RADIUS servers for device groups. For more information, see "Configuring AAA Servers for Device Groups" on
page100.
l Radio. This page defines general 802.11 radio settings for device groups. "Configuring Group Radio Settings"
on page 110
l Controller Config. This page manages ArubaOS Device Groups, AP Overrides, and other profiles specific to
Aruba devices on the network. Use this page as an alternative to the Device Setup > Aruba
>Configuration page. The appearance of this page varies depending on whether AirWave is configured for
global configuration or group configuration. For more information, see the Aruba Controller Configuration
Guide.
l Switch Config. This page manages ArubaOS Device Groups, AP Overrides, and other profiles specific to Aruba
switches on the network. For more information, see the Aruba Switch Configuration Guide.
l Instant Config. This page manages Aruba Instant devices on the network. For more information, see the
Aruba Instant in AirWave 8.2.8.2 Deployment Guide.
l Cisco WLC Config. This page becomes available when you select a device group that contains Cisco WLC
devices and consolidates controller-level settings from several pages (Group Radio, Security, SSIDs, Cisco WLC
Radio and AAA Server). For more information, see "Configuring Cisco WLC Device Groups" on page 114
l PTMP. This page defines settings specific to Proxim MP devices when present and is only available when a
Proxim MP device is added to this group. For more information, see "Configuring PTMP Settings for Device
Groups" on page 120.
l Proxim Mesh. This page defines mesh AP settings specific to Proxim devices when present. For more
information, see"Configuring Proxim Mesh Radio Settings" on page 121.
l MACACL. This page defines MAC-specific settings that apply to Proxim, Symbol, and ProCurve 520 devices
when present. For more information, see "Configuring Group MAC ACLs for Device Groups" on page 123.
l Firmware. This page enables you to manage firmware files for many device types in one location. For more
information, see "Specifying the Minimum Firmware Version for Device Groups" on page 124.
l Compare. This page allows you to compare line item-settings between two device groups. On the Groups >
List page, select the Compare two groups link, select the two groups from the drop-down menus, and thenselect Compare. For more information, see "Comparing Device Groups" on page 80.
Viewing Device Groups
You can view device groups by navigating to Groups > List . When you configure AirWave for the first time,
Access Points is the only group in the list.
From the Groups List page, you can:
l Create a group by clicking Add at the top of the page. Alternatively, you could create a group by selecting
group from the list and clickingto clone the group. The copied group will be added to the group list with
"copy of" appended in front of the group name.
l Compare two groups. For more information, see "Comparing Device Groups" on page 80.
l Clickor hover your mouse over the icon for quick access to other Groups pages. For information about
the Groups pages, see"Navigation Basics" on page 77.
78 | Using Device GroupsAirWave 8.2.10.1 | User Guide
For example, you can select Basic from the shortcut menu to change group configurations. Refer to
"Configuring Basic Settings for Device Groups" on page 89 .
l Add groups to a global group. For more information, see "Subscribing other Groups to a Global Group" on
page84.
l Delete a group. For more information, see "Deleting a Group" on page 85.
Table 30 describes the device group details available on the Groups > List page.
Table 30: Groups > List Fields and Descriptions
FieldDescription
NameUniquely identifies the group by location, vendor, department or any other identifier (such
as ‘Accounting APs,’ ‘Floor 1 APs,’ ‘Cisco devices,’ ‘802.1X APs,’ and so forth).
SSIDThe SSID assigned to supported device types within the group.
Total DevicesTotal number of devices contained in the group including APs, controllers, routers, or
switches.
ChangesThis field is available when a group has unapplied changes.
Is Global Group This field is available if a group is designated as global. A global group may not contain APs,
but it may be used as a template for other groups.
NOTE: This column might indicate Yes if this group has been pushed to AirWave from a
Master Console.
Global GroupSpecifies which group this Subscriber Group is using as its template.
DownThe number of access points within the group that are not reachable via SNMP or are no
longer associated to a controller. Note that thin APs are not directly polled with SNMP, but
are polled through the controller. That controller may report that the thin AP is down or is no
longer on the controller. At this point, AirWave classifies the device as down.
MismatchedThe number of devices within the group that are in a mismatched state.
IgnoredThe number of ignored devices in that group.
ClientsThe number of mobile users associated with all access points within the group. To avoid
double counting of clients, clients are only listed in the group of the AP with which they are
associated. Note that device groups with only controllers in them report no clients.
UsageA running average of the sum of bytes in and bytes out for the managed radio page.
VPN SessionsNumber of active (connected) VPN sessions under this group.
Up/Down
Status Polling
Period
DuplicateCreates a new group with the name Copy of <Group Name> with identical configuration
The time between Up/Down SNMP polling periods for each device in the group. Detailed
SNMP polling period information is available on the Groups > Basic configuration page. By
default, most polling intervals do not match the up/down period.
settings. (Aruba configuration settings will have to be manually added back.)
AirWave 8.2.10.1 | User GuideUsing Device Groups | 79
Comparing Device Groups
You can compare two existing device groups with a detailed line-item comparison. Group comparison allows
several levels of analysis including the following:
l Compare performance, bandwidth consumption, or troubleshooting metrics between two groups.
l Debug one device group against the settings of a similar and better performing device group.
l Use one group as a model by which to fine-tune configurations for additional device groups.
This topic presumes that at least two device groups areat least partly configured in AirWave, each with saved
configurations. Perform the following steps to compare two existing device groups:
1. From the Groups > List page, select the Compare two groups link. Two drop-down menus appear.
2. Select the two groups to compare in the drop-down menus, and select Compare. The Compare page
appears, displaying some or many configuration categories. Figure 35 illustrates this page.
Figure 35: Comparing Two Devices Groups on the Groups > List > Compare Page (Partial View)
3. Note the following factors when using the Compare page:
l The Compare page can be very long or very abbreviated, depending on how many configurations the
device groups share or do not share.
l When a configuration differs between two groups, the setting is flagged in red text for the group on the
right.
80 | Using Device GroupsAirWave 8.2.10.1 | User Guide
l The default setting of the Compare page is to highlight settings that differ between two groups.
n To display settings that are similar or identical between two device groups, select Show Similar Fields
at the top left of the page. The result may be a high volume of information.
n Select Hide Similar Fields to return to the default display, emphasizing configuration settings that
differ between two groups.
l You can change the configuration for either or both groups by selecting Edit in the corresponding column
heading. The appropriate configuration page appears.
l If you make and save changes to either or both groups, go back to the Groups > List page and select
Compare two groups. Select the same two groups again for updated information.
l Additional topics in this document describe the many fields that can appear on the Groups > List >
Compare page.
Changing Group Configurations
Perform the following steps to make any changes to an existing group's configuration:
1. Browse to the Groups > List configuration page.
2. Select the Modify button (the wrench icon) for the group you wish to edit. The Groups > Basic
configuration page appears.
3. Select the fields to be edited on the Basic configuration page. Other group configuration pages may be
available, depending upon the type of devices included in that group. or go to Radio, Security, VLANs, orMAC ACL configuration page and edit the fields. Use the Save button to store the changes prior to applying
them.
4. When all changes for the group are complete select the Save and Apply button to make the changes
permanent. Figure 36 illustrates the confirmation message that appears.
AirWave 8.2.10.1 | User GuideUsing Device Groups | 81
Figure 36: Groups > Basic Configuration Change Confirmation Page Illustration
5. AirWave displays a Configuration Change screen confirming the changes that will be applied to the group's
settings.
6. There are several action possibilities from within this confirmation configuration page.
l Apply Changes Now — Applies the changes immediately to access points within the group. If you wish to
edit multiple groups, you must use the Preview button.
You cannot apply Aruba Networks Config changes to other groups. If the only changes on the configuration
pageare to Aruba devices, the list of groups and the preview button will not appear.
l Scheduling Options — Schedules the changes to be applied to this group in the future. Enter the desired
change date in the Start Date/Time field. You can also specify if this is a one-time schedule or a recurring
schedule. Recurring options are Daily, Weekly, Monthly, and Annually. AirWave takes the time zone
into account for the group if a time zone other than AirWave System Time has been configured on the
Groups > Basic configuration page.
l Cancel — Cancels the application of changes (immediately or scheduled).
To completely nullify the changerequest, select Revert on one of the group configuration pages after you
have selected Cancel.
7. Apply changes to multiple groups by selecting the appropriate group or groups and selecting Preview.
82 | Using Device GroupsAirWave 8.2.10.1 | User Guide
Using Global Groups for Group Configuration
The AirWave group configuration feature allows you to push configurations defined on a global group to the
managed groups subscribed to that global group.
About Global Group Membership
To have Global Group status, a group must contain no devices; accordingly, access points can never be added to
a Global Group. Global groups are visible to users of all roles, so they may not contain devices, which can be
made visible only to certain roles. illustrates the Groups > List page.
Creating a Global Group
The Use Global Group option becomes available when you have at least two groups configured in AirWave. You
can configure AirWave to push a group configuration to a group when you enable this option.
To configure a global group:
1. Navigate to Groups > List.
2. Select a the group from the list.
3. Navigate to Groups > Basic. The Global Groups section of this page contains the Use Global Group
option.
4. Select Yes for the Use Global Group option.
Figure 37: Selecting the Use Global Group Option
5. To associate the group with a global group, select the group from the Global Group drop-down menu.
6. Click Save and Apply.
7. Click Apply Changes Now.
When the Groups list is updated with the global group, you will see Yes in the "Is Global Group" column, and
when you go to the Basic pagefor the global group, there will be checkboxes next to the basic settings. Figure 38
shows an example for a global group called "test".
AirWave 8.2.10.1 | User GuideUsing Device Groups | 83
Figure 38: Basic Settings for the Global Group
When AirWave pushes a global group configuration to subscriber groups, all settings are static except for those
with the checkbox selected; you can change the value or setting of the checked field on the corresponding tab
for each managed group. In the case of the Groups > SSIDs configuration page, override options are available
only on the Add configuration page (go to the Groups > SSIDs configuration page and select Add).
Global templates are also configurable as part of global groups; for more information, see"Using Configuration
Templates" on page 234.
Subscribing other Groups to a Global Group
Once oneor more global groups have been configured, other groups may subscribe to a particular Global Group.
To subscribe a (non-global) group to a Global Group:
1. Navigate to Groups > List.
2. Select a the group from the Groups table.
3. Navigate to Groups > Basic.
4. In the Global Groups section of this page, click the Global Group drop-down list and select a global group.
5. Select Save and Apply to make the changes permanent.
Figure 39: Subscribe to a Global Group
Once the configuration is pushed, the unchecked fields from the Global Group appears on the Subscriber Group
as static values and settings. Only fields that had the override checkbox selected in the Global Group appear as
fields that can be set at the level of the Subscriber Group. Any changes to a static field must be made on the
Global Group.
If you want to change a global group into a regular group and it has subscribers, you need to remove the
subscribers first before you can change the "Is Global Group" option to No on the Groups > Basic page.
84 | Using Device GroupsAirWave 8.2.10.1 | User Guide
Deleting a Group
Perform the following steps to delete an existing Group from the AirWave database:
1. Browse to the Groups > List configuration page.
2. Ensure that the group you wish to delete is not marked as the default group. (See the AMP Setup >General page.) AirWave does not permit you to delete the current default group.
3. Ensure that there are no devices in the group that you want to delete. AirWave does not permit you to delete
a group that still contains managed devices. You must move all devices to other groups before deleting a
group.
4. Ensure that the group is not a global group that has subscriber groups, and is not a group that was pushed
from a Master Console. AirWave will not delete a group in which either of those cases is true.
5. Select the checkbox, and click the Delete button.
Monitoring Device Groups
You can find the monitoring page by navigating to Groups > Monitor page and selecting a device group from
the list.
Figure 40 shows the main components of the monitoring page for the default device group called Access Points.
Figure 40: Group Monitoring Page
Here are some of the things you can view on or from the Groups > Monitor page:
l Group statistics. The total number of devices contained in the group includes APs, controllers, routers, or
switches. From the summary counts at the top of the page, you can click links to monitoring pages for devices
and connected clients.
l Graphs. The client and usage graphs show the attached clients and averagebandwidth or VPN session usage
for the devices in the group. You can change the sample interval, or show the maximum or average statistics
by clicking the menu options in the graph header.
l Group table. The default view of the devices group includes these columns:
AirWave 8.2.10.1 | User GuideUsing Device Groups | 85
n Device. This information shows the device MAC address and provides a quick link to the monitoring page
for the device. Hover over the blue link to access shortcuts to other pages, such as Manage, Config,
Monitor, and Compliance.
n Status. This information shows whether devices are up or down in the group.
n Configuration. This information shows whether the device configuration is good, or there is an error or
mismatch. Click the blue link to access the Device Configuration page and review the device configuration.
n Controller. This information shows the name of the controller and provides a quick link to the monitoring
pagefor the controller.
n Version. This information shows the firmware version running on the controller.
n Folder. This information shows the name of the folder the device belongs to and provides a quick link to
the list of devices for the folder.
n Clients. This information shows the number of clients per device.
n APs. This information shows the number of APs per device, if applicable.
n Usage. This information shows the total speed of all clients at that moment.
n IP Address. This information shows the IP address of the device.
n Type. This information shows the device model.
n Master Controller. If the controller role is master, AirWave displays the device type and provides a quick
link to the monitoring page for the device.
n Switch Role. For switches that support VSFstacking, this information shows whether the switch functions
as commander, standby, member, or has been provisioned to bea member of the stack.
l Alerts. From the alert summary table at the bottom of the page, you can click links to summary pages
forAMP, Intrusion Detection System (IDS), RADIUS accounting, and RADIUS authentication alerts received on
the devices in the group. You can also access the audit log and system event log from this table.
Modifying Multiple Devices
AirWave provides a Modify Devices tool that enables you to makebulk changes to devices, including controllers
that have thin APS. Some of the device actions you can make include deleting multiple devices, migrating devices
to another group or folder, updating credentials, and optimizing channels.
To modify multiple devices:
1. Navigate to one of the following pages that has a Device List:
n Devices > List. You can also click the Up, Down, Mismatched hyperlinks on the List page to open
monitoring pages for the devices with those devices states.
n Groups > Monitor.
2. Clickat the top right corner of the device list, then select the devices you want to modify.
3. Select as many changes as you want from the Device Actions drop-down menu.
86 | Using Device GroupsAirWave 8.2.10.1 | User Guide
Figure 41: Selecting the Device Actions
4. Click Apply All.
Table 31 describes the changes you can apply to multiple devices at the same time.
Table 31: Modify Multiple Devices Section Fields and Default Values
ActionDescription
System Actions
Change Device
Group/Folder
Poll selected devicesClick Poll Now to poll selected devices for current user count and bandwidth data.
Audit selected devicesFetches the current configuration from the device and compares it to the desired
Move the selected devices to a new group or folder. If the device is in managed
mode when it is moved to a new group, it will be reconfigured. When you select
this option, you must also click the Group and/or Folder drop down menu and
select the destination group or folder for the devices. Click Move and then select
Apply All to save your changes.
This action overrides default poll settings for the group. Polling numerous devices
may create a temporary performance load on your AirWave server.
AirWave configuration. The audit action updates the Configuration Status.
NOTE: If a group has audit disabled for its devices, AirWave does not show the
Audit button in the Modify devices list.
AirWave 8.2.10.1 | User GuideUsing Device Groups | 87
Delete selected devicesClick Delete to remove the selected devices from AirWave. A new window opens
and asks you to confirm your changes. Select Apply Changes Now. The deletions
will be performed in the background and it may take a minute to remove the
selected devices from the list.
Run report on selected
devices
Update the credentials
used to communicate
with these devices
Import settings from
selected devices (and
discard current predevice desired settings)
Management LevelWhen you select this action, you must select either Monitor Only + Firmware
Replace HardwareSelect the down device that will be replaced and view the list of AirWave devices
Takes you to the Reports > Definitions page where you can define or run a
custom report for selected devices. For more details and a procedure, see
"Running Reports on Selected Devices" on page 359.
NOTE: Some reports are not device-based and can't be run with the bulk selection
of devices from Modify Devices; these reports are New Rogue Device, Rogue
Clients, Rogue Containment Audit, Traffic Analysis, and UCC.
Update changes the credentials AirWave uses to communicate with the device. It
does not change the credentials on the AP.
Audit updates a number of the AP-specific settings that AirWave initially read off
of the AP including channel, power, antenna settings and SSL certifications.
AirWave recommends using this setting if APs have been updated outside of
AirWave. Most settings on the Devices > Manage configuration page are set to
the values currently read off of the devices.
Upgrade or Manage Read/Write to choose new the management level for the
devices.
that match the name or IP address of the selected device. The down devices can
be replaced with any device in the New Devices list or in the current folder or
group.
Planned Downtime ModeWhen you select this action, you must select either Enable or Disable to change
the downtime mode for the selected devices. When this option is enabled, the
selected devices are put into Planned Maintenance mode. When this mode is
enabled, no AP Down triggers will be deployed on these devices. Users will not be
able to delete folders that contain devices in Planned Maintenance. The devices in
Planned Maintenance will show the Up status, but will not be tracked in historical
graphs and logs as Up.
Add Maintenance
Window
Delete all Maintenance
Windows
Device Actions (Aruba)
Aruba AP GroupWhen you select this option then click Update Aruba AP Group, a new window
Automate the manual action of putting the selected devices into Manage mode at
once so that changes can be applied, and after the maintenance period is over,
the devices automatically revert to Monitor-Only mode.
Maintenance windows can be set as a one-time or recurring event.
Deletes all maintenance windows set for these devices.
opens that allows you to assign the devices to a new AP group.
88 | Using Device GroupsAirWave 8.2.10.1 | User Guide
Import unreferenced
Aruba profiles from
selected devices
Reprovision selected
Aruba devices
Device Actions
Rename devicesRename all the selected devices in bulk. Note that you can also rename the
Upgrade firmware for
selected devices
Cancel firmware
upgrade for selected
devices
Reboot selected devicesReboots the selected devices. Use caution when rebooting devices because this
Opens the Variable Editor page for selected Aruba Instant APs.
Select the devices that include unreferenced profiles, then click this button to
import those profiles from the selected devices.
Configures the controller to send provisioning parameters such as radio, antenna,
and IP address settings to the selected APs. Please note that APs will be rebooted
as part of reprovisioning.
devices one at a time using the editable Name fields in each row.
Upgrades firmware for the selected devices. Refer to the firmware upgrade help
under Devices > Manage configuration page for detailed help on Firmware job
options.
Cancels any firmware upgrades that are scheduled or in progress for the selected
APs.
can disrupt wireless users.
Factory resetResets the selected devices back to factory-default settings.
Desired Radio StatusEnables or disables the radios on the selected device. This parameter does not
apply to Cisco IOS APs.
Cisco Thin AP SettingsBulk configuration for per-thin AP settings, previously configured on the Group
LWAPP AP tab, can be performed from Modify Devices on the Devices > List
page. Make changes to LWAPP AP groups, including the option that was under
Modify Devices.
Configuring Basic Settings for Device Groups
The first default device group set up in AirWave is the Access Points group, but you can configure additional
device groups. After you definethe basic group settings, you can save the changes without pushing these
settings to the devices in the group. You might want to do this in order to push configuration changes at a later
time.
To access the Basic Group Settings page:
l Add a device group from the Groups > List page. The Groups > Basic page displays and becomes available
from the navigation sidebar.
l Navigate to Groups > List, locate the group and click.
l Navigate to Groups > List, locate the group and select Basic from the shortcut menu. The shortcut menu
varies depending on the group's settings.
AirWave 8.2.10.1 | User GuideUsing Device Groups | 89
Basic Settings
To set up the device group, you need to configure the basic settings described in Table 32.
Figure 42: Basic Settings
Table 32: Basic Settings, Default Values, and Descriptions
SettingDefaultDescription
NameDefined
when first
adding the
group
Missed SNMP
Poll Threshold
(1-100)
Regulatory
Domain
TimezoneAMP system
Allow One-toOne NAT
Audit
Configuration
on Devices
1Sets the number of Up/Down SNMP polls that must be missed before
US-United
States
time
NoAllows AirWave to talk to the devices on a different IP address than the one
YesAuditing and pushing of configuration to devices can be disabled on all the
Displays or changes the group name. Enter a name that helps to identify the
group. For example, Accounting APs, Cisco devices, and Aruba controllers).
AirWave considers a device to be down.
NOTE: Set the number of SNMP retries and the SNMP timeout of a poll on the
Device Setup > Communication page.
Sets the regulatory domain in AirWave, limiting the selectable channels for
APs in the group.
Allows group configuration changes to be scheduled relative to the time zone
in which the devices are located.
configured on the device.
NOTE: If enabled, the LAN IP Address listed on the Devices > Manage
configuration page under the Settings area is different than the IP Address
under the Device Communication area.
devices in the group.
NOTE: Once disabled, all the devices in the groups will not be counted
towards mismatched devices.
Global Groups
The global groups option becomes available on the Groups Basic page when you create a new group for the first
time and it is a global group.
90 | Using Device GroupsAirWave 8.2.10.1 | User Guide
Table 33 describes the global group options you can define in order to push configurations to group members.
Table 33: Global Groups Fields and Default Values
SettingDefaultDescription
Is Global GroupNoIf set to Yes, then this group can be selected in the Use Global Group
drop down menu for future group configurations. For more
information, refer to"Using Global Groups for Group Configuration"
on page 83 .
Use Global GroupNoClick this drop-down list to select a global group to which this (non-
global) group should be associated. For more information, refer to
"Subscribing other Groups to a Global Group" on page 84 .
NOTE: This field becomes available when there are more than one
groups configured in AirWave.
SNMP Polling Periods
You can override the override default SNMP polling settings with the SNMP polling period options described in
Table 34.
Table 34: SNMP Polling Periods Fields and Default Values
SettingDefaultDescription
Up/Down Status Polling
Period
Override Polling Period
for Other Services
AP Interface Polling
Period
Client Data Polling Period10
Thin AP Discovery Polling
Period
Device-to-Device link
Polling Period
5 minutesSets time between Up/Down SNMP polling for each device in the
group.
The Group SNMP Polling Interval overrides the global parameter
configured on the Device Setup > Communication page. An initial
polling interval of 5 minutes is best for most networks.
NoEnables or disables overriding the base SNMP Polling Period. If you
select Yes, the other settings in the SNMP Polling Periods section are
activated, and you can override default values.
10
minutes
minutes
15
minutes
5 minutesSets time between SNMP polls for Device-to-Device link polling.
Sets the interval at which AirWave polls for radio monitoring and
bandwidth being used by a device.
Sets time between SNMP polls for client data for devices in the
group.
Sets time between SNMP polls for Thin AP Device Discovery.
Controllers are the only devices affected by this polling interval.
Mesh APs are the only devices affected by this polling interval.
802.11 Counters Polling
Period
Rogue AP and Device
Location Data Polling
Period
AirWave 8.2.10.1 | User GuideUsing Device Groups | 91
15
minutes
30
minutes
Sets time between SNMP polls for 802.11 Counter information.
Sets time between SNMP polls for Rogue AP and Device Location
Data polling.
Table 34: SNMP Polling Periods Fields and Default Values (Continued)
SettingDefaultDescription
CDP Neighbor Data
Polling Period
Mesh Discovery Polling
Period
30
minutes
15
minutes
Sets the frequency in which this group polls the network for Cisco
Discovery Protocol (CDP) neighbors.
Sets time between SNMP polls for Mesh Device Discovery.
Routers and Switches
You can configure how often AirWave polls devices in the group with the routers and switches options described
in Table 35. You can also disable these options.
Table 35: Routers and Switches Fields and Default Values
SettingDefaultDescription
Read ARP Table4 hoursSets the frequency in which devices poll routers and switches for
Address Resolution Protocol (ARP) table information. This setting can
be disabled, or set to poll for ARP information in a range from every
15 seconds to 12 hours.
Read CDP Table for
Device Discovery
4 hoursFor Cisco devices, sets the frequency in which devices poll routers
and switches for Cisco Discovery Protocol (CDP) information. This
setting can be disabled, or set to poll for CDP neighbor information
in a range from every 15 seconds to 12 hours.
Read Bridge Forwarding
Table
Interface Up/Down
Polling Period
Interface Bandwidth
Polling Period
Interface Error Counter
Polling Period
Poll 802.3 error countersNoSets whether 802.3 error counters should be polled.
Poll Cisco interface error
counters
4 hoursSets the frequency in which devices poll the network for bridge
forwarding information. This setting can be disabled, or set to poll
bridge forwarding tables from switches in a range from every 15
seconds to 12 hours.
5 minutesSets the frequency in which network interfaces are polled for
up/down status. This setting can be disabled, or set to poll from
switches in a range from every 15 seconds to 30 minutes.
15
minutes
30
minutes
NoSets whether the interface error counters for Cisco devices should
Sets the frequency in which network interfaces are polled for
bandwidth usage. This setting can be disabled, or set to poll from
switches in a range from every 5 minutes to 30 minutes.
Sets the frequency in which network interfaces are polled for
up/down status. This setting can be disabled, or set to poll bridge
forwarding tables from switches in a range from every 5 minutes to
30 minutes.
be polled.
Notes
Use this optional section to record additional information and comments about the group.
92 | Using Device GroupsAirWave 8.2.10.1 | User Guide
GroupDisplay Options
You can configure the group display options as described in Table 36.
Table 36: Group Display Options Fields and Default Values
SettingDefault Description
Show device
settings for
Selected
Device Types
Only
devices
on this
AMP
N/AThis option appears if you chose to display selected device types, allowing you to
Drop-down menu determines which Group tabs and options are to be viewable
by default in new groups. Settings include the following:
l All Devices—AirWave displays all Group tabs and setting options.
l Only devices in this group—AirWave hides all options and tabs that do not
apply to the devices in the group. If you use this setting, then to get the group
list to display the correct SSIDs for the group, you must Save and Apply on
the group.
l Only devices on this AMP— hides all options and tabs that do not apply to
the APs and devices currently on AirWave.
l Use system defaults—Use the default settings on AMP Setup > General
l Selected device types—Allows you to specify the device types for which
AirWave displays Group settings.
select the device types to display group settings. Use Select devices in thisgroup to display only devices in the group being configured.
Automatic Static IP Assignment
Use the Automatic Static IP Assignment section on the Groups > Basic configuration page to automatically
assign a range of static IP addresses to new devices as they are added into the group.
These options are relevant for a small number of device types and will appear when they are present.
Table 37 describes the automatic static IPaddress options.
Table 37: Automatic Static IP Assignment Fields and Default Values
SettingDefault Description
Assign Static
IP Addresses
to Devices
Start IP
Address
Number of
Addresses
Subnet MasknoneSets the subnet mask to be assigned to the devices in the Group.
Subnet
Gateway
Next IP
Address
NoSpecify whether to enable AirWave to statically assign IP addresses from a
specified range to all devices in the Group.
NOTE: If this value is set to Yes, then the additional configuration fields
described in this table will become available.
noneSets the first address AirWave assigns to the devices in the Group.
noneSets the number of addresses in the pool from which AirWave can assign IP
addresses.
noneSets the gateway to be assigned to the devices in the Group.
noneDefines the next IP address queued for assignment. This field is disabled for the
initial Access Points group.
AirWave 8.2.10.1 | User GuideUsing Device Groups | 93
Spanning Tree Protocol
Use the Spanning Tree Protocol settings on the Groups > Basic page to configure the Spanning Tree Protocol
on Wireless LANController (WLC) devices and Proxim APs.
Table 38 describes the settings and default values in this section.
Table 38: Spanning Tree Protocol Fields and Default Values
SettingDefaultDescription
Spanning Tree
Protocol
Bridge Priority32768Sets the priority for the AP. Values range from 0 to 65535. Lower values have
Bridge
Maximum Age
Bridge Hello
Time
Bridge
Forward Delay
NoSpecify whether to enable STP on Proxim APs. When you set this option to Yes,
additional configuration fields described in this table become available.
higher priority. The lowest value is the root of the spanning tree. If all devices
are at default the device with the lowest MAC address will become the root.
20Sets the maximum time, in seconds, that the device stores protocol
information. The supported range is from 6 to 40.
2Sets the time, from 1 to 10 seconds, between Hello message broadcasts.
15Sets the time, from 4 to 30 seconds, that the port spends in listening and
learning mode if the spanning tree has changed.
NTP
Use the NTP Settings section of the Groups > Basic page to define an NTP server and configure Network Time
Protocol (NTP) settings.
Table 39 describes the NTP settings and default values.
Table 39: NTP Fields and Default Values
SettingDefault Description
NTP Server
#1,2,3
UTC Time
Zone
Daylight
Saving Time
NoneSets the IP address of the NTP servers to be configured on the AP.
0Sets the hour offset from UTC time to local time for the AP. Times displayed in
AirWave graphs and logs use the time set on the AirWave server.
NoEnables or disables the advanced daylight saving time settings in the Proxim
section of the Groups > Basic configuration page.
Aruba Switch Configuration
AirWave automates provisioning of several models of HPEOfficeConnect access points, which are mainly used
for Comware switches. Provisioning uses template-based configuration, zero-touch provisioning (ZTP), and
configuration snippets.
There are two methods of switch configuration:
l Full configuration. AirWave pushes a complete set of changes using a template to the group of devices. By
default, the full configuration mode is enabled whenever you create a device group.
l Config job. AirWave pushes a golden configuration to a group that contains factory-default ZTP devices.
94 | Using Device GroupsAirWave 8.2.10.1 | User Guide
You can also push any command supported by the switch CLI to the device group regardless of their device state
(factory or non-factory).
For help with switch configuration, refer to AirWave 8.2.8 Switch Configuration Guide.
Aruba
To configure settings specific to Aruba locate the Aruba section and adjust these settings as required.
Table 40 describes the settings and default values of this section of the Groups > Basic page.
Table 40: Aruba Fields and Default Values
SettingDefaultDescription
SNMP Version2cThe version of SNMP used by AirWave to communicate to the AP.
Offload WMS
Database
Aruba GUI
Config
Manage local
configuration on
controllers
Ignore Rogues
Discovered by
Remote APs
Delete
Certificates On
Controller
Archive
Controller/Switch
Backups
NoConfigures commands previously documented in the AirWave 8.2.10.1 Best
Practices Guide. When enabled, this feature allows AirWave to display
historical information for WLAN switches.
Changing the setting to Yes pushes commands via SSH to all WLAN switches
in Monitor Only mode without rebooting the controller. The command can
be pushed to controllers in manage mode (also without rebooting the
controller) if the Allow WMS Offload setting on AMP Setup > General is
changed to Yes.
YesThis setting selects whether you'd like to configure your devices using the
Groups > Controller method (either global or group) or using Templates.
NoEnables or disables the management of local configuration including audit,
push, and import operations.
NoConfigures whether to turn off RAPIDS rogue classification and rogue
reporting for RAPs in this group.
NoSpecifies whether to delete the current certificates on an
ArubaOScontroller.
YesThis setting enables AirWave to create config backups manually.
NOTE: After you enable this setting, you can go to the Device
Configuration page and click Create Backup Now. An archived config
backup is available only Aruba controllers and Mobility Access Switches.
Aruba Instant
To specify the Aruba Instant settings to be applied to this group, locate the Aruba Instant settings section of the
Groups > Basic page and adjust these settings as desired.
Table 41 describes the settings and default values.
AirWave 8.2.10.1 | User GuideUsing Device Groups | 95
Table 41: Virtual Controller Certificate Fields and Default Values
SettingDefault Description
Enable Instant GUI
Config
Configure AirWave
communication
settings:
Disable auto join
mode
Ignore DHCP
configuration
HTTPStimeout5 minutes the HTTPS timeout for Instant devices is the period for which AirWave
NoSelect this option to configure your Instant APs via the IGC feature on the
Groups > Instant Config pages of the AirWave WebUI, rather than via
Instant template configuration.
NoIf the Enable Instant GUIConfig setting is set to No, you can use this
option to configure the primary (and optionally, secondary) AirWave
server settings on an Instant AP via template configuration.
NoIf you enable the Disable auto join mode setting, then Instant APs will not
automatically join a group of Instant APs in AirWave when that device
becomes active on the network.
NoWhen this feature is enabled, AirWave will not run a DHCP configuration
audit when the device is added to AirWave. For IAP DHCP configuration,
from the IAP UI, go to DHCP Servers.
waits for an Instant heartbeat message.
The Missed SNMPPoll Threshold in the Basic Settings section at the
top of the Groups > Basic page sets the number of Up/Down SNMP polls
that must be missed before AirWave considers a device to be down.
If, for example, a group of Instant APs your group settings has a MissedSNMP Poll Threshold of 1, then an instant AP is considered to be down if
there is 1 missed heartbeat during this HTTPS timeout period, which could
be anywhere between 1-30 min.
CA CertNoneSpecify a CA certificate for the Instant virtual controller. The fields in this
drop down will populate when a certificate of type Intermediate CA orTrusted CA is added in the Device Setup > Certificates page.
Server CertNoneSpecify a server certificate for the virtual controller. The fields in this drop
down will populate when a certificate of type Server Cert is added in the
Device Setup > Certificates page.
Captive Portal CertNoneSpecify a Captive portal certificate for the virtual controller. The fields in
this drop down will populate when a certificate of type Captive PortalCert is added in the Device Setup > Certificates page.
Captive Portal LogoNoneYou can use AirWave to download a captive portal logo to your Instant
APs. Upload the image (which must be 16 KB or less) on the DeviceSetup > Upload page, then click the Captive Portal Logo drop down list
on the Groups > Basic page to select the image to send to the IAPs.
RadSec Server CertNoneSpecify a RadSec server certificate for the virtual controller. The fields in
this drop down will populate when a certificate of type Server Cert is
added in the Device Setup > Certificates page.
RadSec CA CertNoneSpecify a RadSec CA certificate for the virtual controller. The fields in this
drop down will populate when a certificate of type Intermediate CA orTrusted CA is added in the Device Setup > Certificates page.
96 | Using Device GroupsAirWave 8.2.10.1 | User Guide
Cisco IOS/Catalyst
Configure group settings specific to Cisco IOS/Catalyst devices, as described in Table 42.
Table 42: Cisco IOS/Catalyst Fields and Default Values
SettingDefaultDescription
SNMP Version2cThe version of SNMP used by AirWave to communicate to the AP.
Cisco IOS CLI
Communication
Cisco IOS Config
File
Communication
TelnetThe protocol AirWave uses to communicate with Cisco IOS devices.
Selecting SSH uses the secure shell for command line page (CLI)
communication and displays an SSH Version option. Selecting Telnet
sends the data in clear text via Telnet.
TFTPThe protocol AirWave uses to communicate with Cisco IOS devices.
Selecting SCP uses the secure copy protocol for file transfers and
displays an SCP Version option. Selecting TFTP will use the insecure
trivial file transfer protocol. The SCP login and password should be
entered in the Telnet user name and password fields.
Cisco WLC
Use the Cisco WLC section of the Groups > Basic page to configure settings specific to a Cisco Wireless
LANControllers (WLC).
Table 43 describes the settings and default values in this section.
Table 43: Cisco WLC Fields and Default Values
SettingDefaultDescription
SNMP Version2cSets the version of SNMP used by AirWave to communicate to WLC
controllers.
CLI CommunicationSSHSets the protocol AirWave uses to communicate with Cisco IOS devices.
Selecting SSH uses the secure shell for command line page (CLI)
communication. Selecting Telnet sends the data in clear text via Telnet.
When configuring Cisco WLC controllers, refer to "Configuring Wireless Parameters for Cisco Controllers" on
page119.
Proxim/ Avaya
To configure Proxim/Avaya specific settings locate the Proxim/Avaya section of the Groups > Basic page and
adjust these settings as required.
Table 44 describes the settings and default values.
Table 44: Proxim/Avaya Settings
SettingDefault Description
SNMP
Version
1Sets the version of SNMP used by AMP to communicate to the AP.
AirWave 8.2.10.1 | User GuideUsing Device Groups | 97
Table 44: Proxim/Avaya Settings (Continued)
SettingDefault Description
Enable
DNS
Client
Primary
DNS
server
Secondary
DNS
server
Default
DNS
domains
HTTP
Server
Port
Country
Code
NoEnables the DNS client on the AP. Enabling the DNS client allows you to set some values on
the AP by hostname instead of IP address. If you select Yes for this setting, additional DNS
fields display.
BlankSets the IP address of the Primary DNS server.
BlankSets the IP address of the Secondary DNS server.
BlankSets the default DNS domain used by the AP.
80Sets this port as the HTTP server port on all Proxim APs in the group.
United
States
Configures AMP to derive its time settings based on the country of location, as specified in
this field.
HP ProCurve
To configure HP ProCurve specific settings, locate the HP ProCurve section of the Groups > Basic page and
adjust these settings as required.
The Table 45 describes the settings and default values.
Table 45: HP ProCurve Settings
SettingDefault Description
SNMP Version2cSets the version of SNMP used by AirWaveto communicate to the AP.
ProCurve
XL/ZWeSM CLI
Communication
ControllerSNMP
Version
TelnetSets the protocol AirWave uses to communicate with ProCurve XLWeSM devices.
Selecting SSH will use the secure shell for command line (CLI) communication.
Selecting Telnet will send the data in clear text via telnet.
2cSpecifies the version of SNMP used by AirWaveto communicate to the controller.
Symbol
To configure settings for Symbol controllers, locate the Symbol section of the Groups > Basic page and adjust
these settings as required.
Table 46 describes the settings and default values.
Table 46: Symbol Settings
SettingDefault Description
SNMP Version2cSpecifies the version of SNMP used by AWMS to communicate to the device.
98 | Using Device GroupsAirWave 8.2.10.1 | User Guide
Table 46: Symbol Settings (Continued)
SettingDefault Description
Symbol Client
Inactivity Timeout
(3-600 min)
Symbol Controller
CLI
Communication
Web Config
Interface
3
TelnetThe connection type to support the command-line interface (CLI) connection. The
YesEnables or disables the http/https configuration page for the Symbol 4131 devices.
Sets the minutes of inactivity after which a client associated to a Symbol AP will be
considered "inactive." A lower value typically provides a more accurate
representation of current WLAN usage.
NOTE: For other APs, AWMS has more precise methods to determine when inactive
clients are no longer associated to an AP.
options are Telnet and secure shell (SSH). This is supported for WS5100, RFS4000,
RFS6000 and RFS7000 devices only.
Juniper/3Com/Enterasys/Nortel/Trapeze
To configure SNMP settings for 3Com, Enterasys, Nortel, or Trapeze devices, locate the
Juniper/3Com/Enterasys/Nortel/Trapeze section of the Groups > Basic page and click the SNMP Version
drop-down list to define the version of SNMP to besupported. The default setting is SNMPv2c.
Universal Devices, Routers and Switches
To configure settings for universal devices on the network, including routers and switches that support both
wired and wireless networks,, locate the Juniper/3Com/Enterasys/Nortel/Trapeze section of the Groups >Basic page and click the SNMP Version drop-down list to define the version of SNMP to be supported. The
default setting is SNMPv2c.
Automatic Authorization
To control the conditions by which devices are automatically authorized into this group, locate the Automatic
Authorization settings section of the Groups > Basic page and adjust these settings as required.
Table 47 describes the automatic authorization options for the device group.
Table 47: Automatic Authorization Fields and Default Values
SettingDefault Description
Add New Controllers
and Autonomous
Devices Location
Add New Thin APs
Location
Ignore Device's
Configured Folder
Use
Global
Setting
Use
Global
Setting
NoEnable this option to ignore the folder in the provisioning rule for Aruba
Whether to auto authorize new controllers to the New Devices List, the
same Group/Folder as the discovering devices, the same Group/Folder as
the closest IP neighbor, and/or a specified auto-authorization group and
folder. The Current Global Setting set in AMP Setup > General is shown
below this field. Selecting a different option overrides the global setting.
Whether to auto authorize new thin APs to the New Devices List, the same
Group/Folder as the discovering devices, the same Group/Folder as the
closest IP neighbor, and/or a specified auto-authorization group and
folder. The Current Global Setting set in AMP Setup > General is shown
below. Selecting a different option overrides the global setting for this
group.
switches configured via Activate, DHCP, or the switch comand-line
interface.
AirWave 8.2.10.1 | User GuideUsing Device Groups | 99
Maintenance Windows
You can use maintenance windows to put multiple devices into Management mode, apply configuration changes
to the devices in the group, and then reset them to Monitor-Only mode after the maintenance period is over. For
more information, see "Adding a Maintenance Window for a Device" on page 228.
Configuring AAA Servers for Device Groups
Configure RADIUS servers on the Groups > AAA Servers page. Once defined on this page, the Groups >
Security and Groups > SSIDs menus appear in the navigation bar, allowing you to select and configure your
RADIUS servers.
If the Groups > AAA Servers page does not appear in the navigation bar, select the group from the Groups >List page, select the Groups > Basic page, then choose the Show Device Settings for : All Devices option
in the Group Display Options section of the Groups > Basic page.
1. Go to the Groups > List page and select the group for which to define AAA servers by selecting the group
name. The Monitor page appears.
2. Select the AAA Servers page. The AAA Servers page appears, enabling you to add a RADIUS server.
3. To add a RADIUS server or edit an existing server, select Add New RADIUS Server or the corresponding
pencil icon to edit an existing server. Table 48 describes the settings and default values of the Add/Edit page.
Table 48: Adding a RADIUS Server Fields and Default Values
SettingDefault Description
Hostname/IP
Address
Secret and
Confirm Secret
AuthenticationNoSets the RADIUS server to perform authentication when this setting is
Authentication
Port (1-65535)
AccountingNoSets the RADIUS server to perform accounting functions when enabled with
Accounting Port (1-
65535)
Timeout (0-86400)NoneSets the time (in seconds) that the access point waits for a response from
NoneSets the IP Address or DNS name for RADIUS Server.
NOTE: IP Address is required for Proxim/ORiNOCO and Cisco Aironet IOS
APs.
NoneSets the shared secret that is used to establish communication between
AirWave and the RADIUS server.
NOTE: The shared secret entered in AirWave must match the shared secret
on the server.
enabled with Yes.
1812Appears when Authentication is enabled. Sets the port used for
communication between the AP and the RADIUS server.
Yes.
1813Appears when Accounting is enabled. Sets the port used for
communication between the AP and the RADIUS server.
the RADIUS server.
Max Retries
(0-20)
100 | Using Device GroupsAirWave 8.2.10.1 | User Guide
NoneSets the number of times a RADIUS request is resent to a RADIUS server
before failing.
NOTE: If a RADIUS server is not responding or appears to be responding
slowly, consider increasing the number of retries.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.