Aruba Airwave 8.2.10.1 User Manual

AirWave 8.2.10.1
User Guide
Copyright Information
© Copyright 2019 Hewlett Packard Enterprise Development LP
Open Source Code
This product includes code licensed under the GNU General Public License, the GNU Lesser General Public License, and/or certain other open source licenses. A complete machine-readable copy of the source code corresponding to such code is available upon request. This offer is valid to anyone in receipt of this information and shall expire three years following the date of the final distribution of this product version by Hewlett­Packard Enterprise Company. To obtain such source code, send a check or money order in the amount of US $10.00 to:
Hewlett-Packard Enterprise Company Attn: General Counsel 6280 America Center Drive San Jose, CA 95002 USA
Please specify the product and version for which you are requesting source code.
You may also request a copy of this sourcecode free of charge at: http://hpe.com/software/opensource.
Nove mber 2019 | Rev. 01 AirWave 8.2.10.1 | User Guide
Contents
Introduction 15
Aruba Mobility Controllers 15 Instant Access Points 15 ArubaOS-S Switches and ArubaOS-CX Switches 16
Configuring AirWave 17
Defining General AirWave Server Settings 17
Configuring the AirWave Server 17
General Settings 18 Automatic Authorization Settings 19 Aruba Instant Settings 20 Top Header Settings 21 Search Method 22 Home Overview Preferences 22 Display Settings 23 Device Configuration Settings 24 AMP Features 24 External Logging Settings 25 Historical Data Retention Settings 26 Firmware Upgrade/Reboot Options 28 Additional AMP Services 29 Performance Settings 32
Defining Network Settings 33
Primary Network Interface Settings 34 Secondary Network Interface Settings 35 Network Time Protocol (NTP) Settings 35
Static Routes 36 Creating AirWave Users 36 Configuring AirWave User Roles 38
User Roles and VisualRF 38
Creating AirWave User Roles 38 Configuring the User Login and Authentication 43
Configuring the User Login 44
Configuring Whitelists 44
Setting Up Single Sign-On 45
Specifying the Authentication Priority 45
Integrating a RADIUS Accounting Server 45
Configuring RADIUS Authentication and Authorization 46
Configuring TACACS+ Authentication 48
Configuring LDAP Authentication and Authorization 50 Enabling AirWave to Manage Your Devices 53
Configuring Communication Settings for Newly Discovered Devices 53
Uploading Firmware and Files 54 Managing Certificates 59
Uploading Certificates 59
Changing the SSL Certificate for Aruba Instant 61
AirWave 8.2.10.1 | User Guide Contents | iii
Generating Certificate Signing Requests (CSRs) 61
Setting Up Certificate Authentication 62
Disabling the Certificate Authentication Requirement 63
Installing Signed Certificates 64
Regenerating Self-Signed Certificates 64
Adding DTLS Certificates 65
Configuring Certificate Revocation Lists (CRLs) 65 Setting Up Device Types 66
Configuring Cisco WLSE and WLSE Rogue Scanning 66
Introduction to Cisco WLSE 66 Initial WLSE Configuration 67
Adding an ACS Server for WLSE 67
Enabling Rogue Alerts for Cisco WLSE 67
Configuring WLSE to Communicate with APs 67
Discovering Devices 68
Managing Devices 68
Inventory Reporting 68
Defining Access 68
Grouping 68 Configuring IOS APs for WDS Participation 69
WDS Participation 69
Primary or Secondary WDS 69 Configuring ACS for WDS Authentication 69 Configuring Cisco WLSE Rogue Scanning 70
Configuring ACS Servers 71 Integrating NMS Servers 72
Add an NMS Server 72 Download the MIB Files 72
PCI Compliance Monitoring 72
Check Compliance 72 Enabling PCI Compliance Monitoring 73
Supported PCI Requirements 74
Deploying WMS Offload 74
WMS Offload Configuration 75
Integrating External Servers 75
Add a Juniper Network Director 75 Add a BrocadeNetwork Advisor 76 Add an HPE Intelligent Management Center 76
Using Device Groups 77
Navigation Basics 77
Viewing Device Groups 78
Comparing Device Groups 80 Changing Group Configurations 81 Using Global Groups for Group Configuration 83
About Global Group Membership 83 Creating a Global Group 83 Subscribing other Groups to a Global Group 84
Deleting a Group 85
Monitoring Device Groups 85
Modifying Multiple Devices 86
iv | Contents AirWave 8.2.10.1 | User Guide
Configuring Basic Settings for Device Groups 89
Basic Settings 90 Global Groups 90 SNMP Polling Periods 91 Routers and Switches 92 Notes 92 GroupDisplay Options 93 Automatic Static IP Assignment 93 Spanning Tree Protocol 94 NTP 94 Aruba Switch Configuration 94 Aruba 95 Aruba Instant 95 Cisco IOS/Catalyst 97 Cisco WLC 97 Proxim/ Avaya 97 HP ProCurve 98 Symbol 98 Juniper/3Com/Enterasys/Nortel/Trapeze 99 Universal Devices, Routers and Switches 99 Automatic Authorization 99 Maintenance Windows 100
Configuring AAA Servers for Device Groups 100 Configuring Security for Device Groups 101 Configuring SSIDs and VLANs for Device Groups 106 Configuring Group Radio Settings 110 Configuring Cisco WLC Device Groups 114
Accessing Cisco WLC Configuration 114 Configuring WLANs for Cisco WLC Devices 114 Defining and Configuring LWAPP AP Groups for Cisco Devices 118 Viewing and Creating Cisco AP Groups 118 Configuring Cisco Controller Settings 118 Configuring Wireless Parameters for Cisco Controllers 119 Configuring Cisco WLC Security Parameters and Functions 119 Configuring Management Settings for Cisco WLC Controllers 120
Configuring PTMP Settings for DeviceGroups 120 Configuring Proxim Mesh Radio Settings 121 Configuring Group MAC ACLs for Device Groups 123 Specifying the Minimum Firmware Version for Device Groups 124
Discovering, Adding, and Auditing Devices 126
How to Set Up Device Discovery 126
Adding Networks for SNMP/HTTP Scanning 126 Adding Credentials for Scanning 127 Defining a Scan Set 128 Running a Scan Set 128 The Cisco Discovery Protocol (CDP) 130 Adding Devices into AirWave 130
Adding Devices Manually 130
Adding Devices from a CSV File 133
Setting the Management Mode 133
AirWave 8.2.10.1 | User Guide Contents | v
Verifying the Device Configuration 134 Ignoring Discovered Devices 135
Unignoring a Device 135 Troubleshooting a Newly Discovered Down Device 136
Using ZTP Orchestrator Beta 138
Before You Begin 138
Minimum Requirements 138
Network Setup 138
Step 1: Create Groups for ZTP 139 Step 2: Add ClearPass Policy Manager 140 Step 3: Add Mobility Master 142 Step 4: Add the ArubaOS-CX Switch 143
Deployment 144
Step 1: Deploying Mobility Controllers 144 Step 2: Deploying ArubaOS-S Switches 144
Automated Workflow 145
Deployment Verification 146 Post Deployment 146
Monitoring the Network 147
Monitoring Basics 147
Customizing the Monitoring Page 148
First 25 Results 148
Creating Filtered Views 148
Editing Filtered Views 149
Showing Filters, Clearing Filters, Resetting Grouping 149 Using Device Folders 150
Adding Device Folders 150
Moving Folders 150
Expanding Folders 150
Changing Default Views 151
Monitoring Access Points, Mesh Devices, and Controllers 152
Device Information for Access Points, Mesh Devices, and Controllers 152
Radios 154
Wired Interfaces 155
Graphs for Access Points, Mesh Devices, and Controllers 156
Location 157 Clients 157 AirMesh Links 158 Neighbors 158 RF Neighbors 160 Alerts & Events 160 Advanced Monitoring 160 Viewing the Radio Statistics Page 160 Running Commands from the Radio Statistics Page 160
Issues Summary section 161
802.11 Radio Counters Summary 161
Radio Statistics Interactive Graphs 162
Recent ARM Events Log 163
Detected Interfering Devices Table 164
Active BSSIDs Table 165
vi | Contents AirWave 8.2.10.1 | User Guide
AirMatch Statistics for Mobility Master 166 Monitoring Mesh Devices 166 Setting up Spectrum Analysis 167
Spectrum Configurations and Prerequisites 168 Setting up a Permanent Spectrum Aruba AP Group 168
Configuring an Individual AP to run in Spectrum Mode 169
Configuring a Controller to use the Spectrum Profile 170
Monitoring ArubaOS-CX and Mobility Access Switches 171
Device Information 171 Graphs 172 Detailed Summary Tables 172
Neighbors 172
Connected Devices 174
Interfaces 175
Monitoring ArubaOS Switches 177
Getting Started 177
Color-Coded Status 177
Navigate Using Quick Links 178
Get Details from Tooltips 179 SummaryTab 180 Ports Tab 181
See Port Counts 182
Open a Port Status Pop-Up 182
Edit a Physical Interface 183
Get Interface Details 184 PoE Tab 184
See PoE Statistics 185
Change the Faceplate Using Overlays 185
Get Port Details 186
View Power Consumption 186 VLANs Tab 186
Change the VLANs View in the Faceplate 187
Get Trunk Details 187
Get Virtual Interface Details 187
Edit a Virtual Interface 187 Connected Tab 188
See Connected Device and Neighbor Counts 188
Determine Which Device Is Connected to a Port 188
View Dynamic Segmentation Information 189
Get Connected Devices Details 189
Edit a Connected Device 190
Get Neighbor Details 191 Hardware Tab 192 Alerts & Events Tab 193
Acknowledge an Alert 194 Troubleshooting Tab 195
Run a Command 195
Test a Cable 196
Monitoring 7000 Controllers 196
SummaryTab 197
AirWave 8.2.10.1 | User Guide Contents | vii
WANTab 198
See WAN Ports 198
Open the Port Details Pop-Up 198
WAN Interface Summary 199
Get WANInterface Details 199 Tunnel Tab 200
See Tunnel Counts and Details 200
Tunnel Details 200
Monitoring Controller Clusters 201
Viewing Details about the Controller Cluster 202
Capacity Graphs 202
Controller Statistics 202
Monitoring Cluster Events 203 Where to Find Additional Cluster Information 203
Monitoring Clients 204
Monitoring Wired and Wireless Clients 205 Monitoring Rogue Clients 206 Supporting Wireless Guest Users 207 Supporting VPN Users 210 Monitoring RFID Tags 211
Managing Mobile Devices with SOTI MobiControl and AirWave 212
Overview of SOTI MobiControl 212 Prerequisites for Using MobiControl with AirWave 213 Adding a Mobile Device Management Server for MobiControl 213 Accessing MobiControl from the Clients > Client Detail Page 214
Troubleshooting Client Issues 214
Evaluating User Status 214
Enabling Mobile Device Access Control 215
Classifying Aruba Devices 216
Quick Links for Clients on Aruba Devices 216
Using the Deauthenticate Client Feature 217
Viewing the Client Association History 217
Viewing the Rogue Association History 217 Diagnosing Status and Connectivity 218
Configuring and Managing Devices 219
Moving a Device from Monitor Only to Manage Read/Write Mode 219 Configuring Device Settings 220 Adding a Maintenance Window for a Device 228 Creating Dynamic Variables 229 Configuring Device Interfaces for Switches 230 Individual Device Support and Firmware Upgrades 231
Using Configuration Templates 234
Group Templates 234
Supported Devices 234 Template Variables 234
Viewing, Adding and Editing Templates 236 Configuring General Template Files and Variables 239
Configuring General Templates 240
IOS Configuration File Template 241
Device Configuration File on Devices > Device Configuration Page 241
viii | Contents AirWave 8.2.10.1 | User Guide
Template Syntax 241
Using AP-Specific Variables 241
Using Directives to Eliminate Reporting of Configuration Mismatches 242
Using Conditional Variables in Templates 242
Using Substitution Variables in Templates 243
Configuring Templates for Aruba Instant 245 Configuring Templates for AirMesh 246 Configuring Cisco IOS Templates 246
Applying Startup-config Files 246 WDS Settings in Templates 247 SCP Required Settings in Templates 247 Supporting Multiple Radio Types via a Single IOS Template 247 Configuring Singleand Dual-Radio APs via a Single IOS Template 248
Configuring Cisco Catalyst Switch Templates 248 Configuring Symbol Controller / HPE WESM Templates 248 Configuring a Global Template 250
Using the Home Pages 253
Customizing the Dashboard 253
Available Widgets 253 Adding Widgets 257 Available Widgets 257 Defining Graph Display Preferences 261 Monitoring Your Network Health 262 Monitoring Application Traffic 265 Using the UCC Dashboard 266
Viewing Call Details 266
Viewing UCC Charts, Graphs, and Tables 267
Viewing End-to-End Call Details 268
Get Call Summary 268
Using the UCCReport 269
Viewing RF Performance 270 Viewing RFCapacity 271 Using the AirMatch Dashboard 272 Viewing Network Deviations 273
How Standard Deviation is Calculated 274
Using Clarity 275
View Clarity Charts 275
Failures Rates 275
Process Times 275
Clarity Thresholds 276 View User Details from the Summary Table 276 View Authentication Failure Data 278 View DHCP Failure Data 278 View DNS Failure Data 279 View Association Data 279 Working with Clarity Data 279
First 25 Results 279
Sorting and Filtering Clarity Data 280
Selecting a Folder from the Navigation Bar 280
Exporting Clarity Data 280
AirWave 8.2.10.1 | User Guide Contents | ix
Changing the Time Range 280 Evaluate User Status 281
Using Topology 282
Getting Started 282
Navigate the Map 283
Respond to Alerts 283 Setting up Your Map 284
Locate Your Device 284
Select Your Layout 285
Arrange Devices on the Map 285
Show Spanning Tree Members 286
Show VLANs 288
Apply Filters 289
Set the Root Node 291
Saving Your Preferences 291
Changing the Default Expansion 292 Checking the Status of Your Network 292
Device Status 292
Health Status 292
Link Status 293 Taking Action from Quick Links 293
View Tooltips 293 Viewing Device and Stack Membership Details 294 Running a Command 295
Accessing AirWave Documentation 296 Working with Licenses 296
Adding licenses 297 Viewing licenses 297
Configuring License Expiration Email Notifications 298
Configuring User Information and Customizing the WebUI 298
Configure Your User Information 298 Customizing the WebUI 298
Setting Severe Alert Warning Behavior 301
Using the System Pages 302
Checking the Status of AirWave Services 302
Important AirWave Logs 303
Downloading Log Files 303 Viewing Device Events 303 Using the Event Log 305 Viewing Triggers 305 Creating New Triggers 306
Types of Triggers 308
Device Triggers 308
Interfaces and Radios Triggers 311 About Alerts 316 Viewing System Alerts 317
Delivering Triggered Alerts 318
Responding to Alerts 319
Backing Up Your Data 319
Viewing and Downloading Backups 319
x | Contents AirWave 8.2.10.1 | User Guide
Using the System > Configuration Change Jobs Page 319 Using the System > Firmware Upgrade Jobs Page 320 Viewing DRT Upgrade Jobs 321 Using the System > Performance Page 321
Creating, Running, and Sending Reports 326
What You Can Do With Reports 326
Track licenses 326
Improve Network Efficiency and User Experience 326
Monitor Clients and Devices 327
Show Compliance 327
Troubleshoot Device and Network Issues 327 Sorting Reports 328
About the Default Reports 328
Using the LicenseReport 328 Using the Capacity Planning Report 329
Example Custom Report 329 Using the Memory and CPU Utilization Report 331 Using the Network Usage Report 331 Using the Port Usage Report 333 Using the RF Health Report 335
Thresholds 335
Top Folders and Radio Statistics 336
Lists of Top Radio Issues 337 Using the Client Inventory Report 337
Example Custom Report 338 Using the Client Session Report 339 Using the Configuration Audit Report 341 Using the Device Summary Report 343 Using the Device Uptime Report 344 Using the Inventory Report 345
Example Custom Report 345 Using the Rogue Containment Audit Report 347 Using the PCI Compliance Report 348 Using the IDS Events Report 348 Using the Match Event Report 350 Using the New Clients Report 350 Using the New Rogue Devices Report 352 Using the RADIUS Reports 354
RADIUS Authentication Issues 354
RADIUSAccounting Issues 354 Using the Rogue Clients Report 355 Using the VPN Session Report 357
Creating Custom Reports 358
Tips for Restricting Time Ranges 358
Running Reports on Selected Devices 359 Cloning Reports 359
Selecting the Report Definition 359 Selecting the Devices and a Report Template 360 Selecting the Devices Without Using a Report Template 361
Viewing Generated Reports 361
AirWave 8.2.10.1 | User Guide Contents | xi
Get an Updated Report 362
Sending Reports 363
Exporting Reports in CSV Format 363
Exporting a Report 363
Exporting Multiple Reports 364 Sending Reports to a Smart Host 365
Using VisualRF 366
Features 367 Useful Terms 367 Starting VisualRF 368 Basic VisualRF Navigation 368
Network View Navigation 368 Customize Your Floor Plan View 369
Devices 369
Client Overlays 370
AP Overlays 370
Relation Lines 370
Floor Plan Features 371 Mesh View Navigation 371
Advanced VisualRF Settings 373
Server Settings 373 Location Settings 374 Location Calculation Timer Settings 375 Disabling Client Calculation 378 Wall Attenuation Settings 379
Adding a Wall Attenuation 379 VisualRF Resource Utilization 380
Planning and Provisioning 380
Creating a New Campus 381 Creating a New Building 381 Adding a Floor Plan 382
Change Settings in VisualRF Floor Plans 383 Editing a Floor Plan Image 383
Replacing the Background 383
Cropping the Floor Plan Image 384
Copying a Floor Plan in the Same Building 385
Sizing a Non-CAD Floor Plan 385
Defining Floor Plan Boundaries 385 Defining Floor Plan Regions 386
Adding Region to a New Floor using the Floor Upload Wizard 386
Adding a Region to an Existing Floor Plan 386 Editing a Planning Region 387 Floor Plan Properties 387 Adding Deployed Access Points onto the Floor Plan 388 Adding Planned APs onto the Floor Plan 389 Auto-Matching Planned Devices 390 Printing a Bill of Materials Report 390
Increasing Location Accuracy 390
Adding Exterior Walls 391 Fine-Tuning Location Service in VisualRF > Setup 392
xii | Contents AirWave 8.2.10.1 | User Guide
Decreasing Grid Size 392
Enabling Dynamic Attenuation 393
Configuring Infrastructure 393
Deploying APs for Client Location Accuracy 393
Using VisualRF to Assess RF Environments 394
Viewing a Wireless User’s RF Environment 394
Tracking Location History 395
Checking Signal Strength to Client Location 396 Viewing an AP’s Wireless RF Environment 396 Viewing a Floor Plan’s RF Environment 397 Viewing a Network, Campus, Building’s RF Environment 398 Viewing Campuses, Buildings, or Floors from a List View 398
Importing and Exporting in VisualRF 399
Importing from CAD 400 Batch Importing CAD Files 400
Requirements 400
Pre Processing Steps 400
Upload Processing Steps 401
Post Processing Steps 401
Sample Upload Instruction XML File 401
Common Importation Problems 402 Importing from an Aruba Controller 402
Pre-Conversion Checklist 402
Process on Controller 402
Process on AirWave 402 Importing from Ekahau Backups 402 Before you begin 402
Using the VisualRF Audit Log 403 VisualRF Location APIs 403
Sample Device Location Response 403 Sample Site Inventory Response 404
About VisualRF Plan 404
Overview 404 Minimum requirements 405 VisualRF Plan Installation 405 Differences between VisualRF and VisualRF Plan 405
Using RAPIDS 407
Introduction to RAPIDS 407 Viewing RAPIDS Summary 408 Setting Up RAPIDS 409
RAPIDS Setup 409
Basic Configuration 409
Classification Options 410
Containment Options 410
Filtering Options 411 Additional Settings 412
Defining RAPIDS Rules 412
Controller Classification with WMS Offload 412 Device OUI Score 413 Rogue Device Threat Level 413
AirWave 8.2.10.1 | User Guide Contents | xiii
Viewing and Configuring RAPIDS Rules 414
RAPIDS Classification Rule Properties 416
Deleting or Editing a Rule 417
Changing the Rule Priority 418 Recommended RAPIDS Rules 418 Using RAPIDS Rules with Additional AirWave Functions 418
Viewing Rogues 418
Predefined, Default Views for Rogue Devices 419 Filtered Views for Rogue Devices 420
Overview of the RAPIDS > Detail Page 422
Important Considerations 423 Filter the Device Data 423 Update Rogue Devices 423 Viewing Ignored Rogue Devices 424 Using RAPIDS Workflow to Process Rogue Devices 424
Score Override 424 Using the Audit Log 425 Additional Resources 426
Using the Master Console 427
Using the Public Portal on Master Console 427 Adding a Managed AMP with the Master Console 428 Using Global Groups with Master Console 429
Appendix A Using FIPS Encryption 430
Enabling FIPS 140-2 Approved Mode 430
Appendix B AMP Command Line Interface 431
About the Command Line Interface 431
CLI Access 431
How to Reset Your Password 431 CLI Options 432
Appendix C VisualRF and Performance 440
How Floor Components Impact Performance 440 Identifying Performance Problems 440 Resolving Performance Problems 440 Contacting Support 441
Index 442
xiv | Contents AirWave 8.2.10.1 | User Guide
Chapter 1

Introduction

AirWave is a network management platform that provides a single console whereyou can monitor, analyze, and configure wired and wireless networks. Whether your network is simple or a large, complex, multi-vendor installation, AirWave makes it easy to monitor your network with features like AppRF, Clarity, and VisualRF.
AirWave also provisions Aruba switches, provides CPU, memory and interface monitoring, configuration management, and upgrades switch firmware. AirWave can be used to implement zero-touch provisioning for Aruba Instant APs (IAP), Aruba switches and branch controllers.
With AirWave, you can configure:
l "Aruba Mobility Controllers" on page 15
l "Instant Access Points" on page 15
l "ArubaOS-S Switches and ArubaOS-CX Switches" on page 16

Aruba Mobility Controllers

AirWave supports global and group-level configuration of Aruba mobility controllers. Several controllers can work together with APs to provide a hierarchical and redundant mobility controller system.
The mobility controller system provides:
l AP tunnel termination and translational bridging
l GRE tunnel between each AP and a mobility controller
l A virtual connection point to wireless clients
l Frame translation from 802.11 to 802.3 and 802.3 to 802.11, including encryption and decryption of
wireless traffic
l Quality of service(QoS) and traffic prioritization
Working alone or in conjunction with ClearPass, the mobility controller authenticates wireless clients and includes a stateful firewall that can be configured to filter wireless traffic.
In this document, mobility controllers are also called access devices. For information about controller configuration, refer to the AirWave 8.2.10.1 Controller Configuration Guide.

Instant Access Points

Aruba Instant (Instant) is a system of access points in a Layer 2 subnet. The Instant APs (IAPs) are controlled by a single IAP that serves a dual role as both an IAP and primary Virtual Controller (VC), eliminating the need for dedicated controller hardware. This system can be deployed through a simplified setup process appropriate for smaller organizations, or for multiplegeographically dispersed locations without an on-site administrator.
With AirWave, IT can centrally configure, monitor, and troubleshoot ArubaInstant WLANs, upload new software images, track devices, generate reports, and perform other vital management tasks, all from a remote location.
A Virtual Controller or Instant AP can authenticate to the AirWave server using a pre-shared key, or using two­way certificate-based authentication using an SSL certificate sent from AirWave to the Instant device. Virtual Controllers push data to AirWave via HTTPS. If your enterprise has a security policy that restricts the use of port 443 for inbound communication, you can change the port AirWave uses to communicate with Instant devices.
For additional information about Instant AP configuration, refer to the Aruba Instant in AirWave 8.2.8.2 Deployment Guide.
AirWave 8.2.10.1 | User Guide Intro duction | 15

ArubaOS-S Switches and ArubaOS-CX Switches

AirWave supports group-level configuration of ArubaOS-S Switches andArubaOS-CX Switches. These switches connect APs, wired clients and other endpoints to the network. Working alone or in conjunction with ClearPass, the ArubaOS-S Switches provide authentication, authorization and accounting.
In this document, ArubaOS-S Switches are also called access switches, and ArubaOS-CX Switches are also called core and aggregation switches. For informationabout switch configuration, refer to the AirWave 8.2 Switch Configuration Guide.
16 | Introduction AirWave 8.2.10.1 | User Guide
Chapter 2

Configuring AirWave

After you install the AirWave software, or any time you need to make changes to network settings, refer to the following procedures:
l "Defining Network Settings" on page 33
l "Configuring Cisco WLSE Rogue Scanning" on page 70
l "Configuring ACS Servers" on page 71
l "Integrating NMS Servers" on page 72
l "PCI Compliance Monitoring" on page 72
l "Deploying WMS Offload" on page 74
l "Integrating External Servers" on page 75

Defining General AirWave Server Settings

The initial tasks to configure the AirWave server include:
l "Configuring the AirWave Server" on page 17
l "Defining Network Settings" on page 33
l "Creating AirWave Users" on page 36
l "Configuring AirWave User Roles" on page 38
l "Configuring the User Login and Authentication" on page 43
l "Enabling AirWave to Manage Your Devices" on page 53
l "Managing Certificates" on page 59
l "Setting Up Device Types" on page 66

Configuring the AirWave Server

The following topics describe how to configure the general settings for the AirWave server. Figure 1 illustrates the AMP Setup > General page.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 17
Figure 1: AMP Setup > General Settings
Whenever you save changes to these settings, AirWave applies them globally across the product for all users.
General Settings
Browse to the AMP Setup > General page, locate the General section, and enter the information described in
Table 1:
Table 1: AMP Setup >General > General Section Fields and Default Values
Setting Default Description
System Name Defines your name for your AirWave server using alphanumeric
characters.
Default Group Access
Points
Sets the device group that this AirWave server uses as the default for device-level configuration. Select a device group from the drop-down menu. A group must first be defined on the Groups > List page to appear in this drop-down menu. For additional information, refer to
"Using Device Groups" on page 77.
18 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Table 1: AMP Setup >General > General Section Fields and Default Values (Continued)
Setting Default Description
Device Configuration Audit Interval
Automatically repair misconfigured devices
Help improve AirWave by sending anonymous usage data
Nightly Maintenance Time (00:00 ­23:59)
Daily This setting defines the interval of queries which compares actual
device settings to the Group configuration policies stored in the AirWave database. If the settings do not match, the AP is flagged as mismatched and AirWave sends an alert via email, log, or SNMP.
NOTE: Enabling this feature with a frequency of Daily or more frequently is recommended to ensure that your AP configurations comply with your established policies. Specifying Never is not recommended.
Disabled If enabled, this setting automatically reconfigures the settings on the
device when the device is in Manage mode and AirWave detects a variance between actual device settings and the Group configuration policy in the AirWave database.
Disabled If enabled, AirWave will send anonymous data to Aruba, which may be
used to improve the AirWave software.
04:15 Specifies the local time of day AirWave should perform daily
maintenance. During maintenance, AirWave cleans the database, performs backups, and completes a few other housekeeping tasks. Such processes should not be performed during peak hours of demand.
License APs Usage Threshold
Check for software updates
90
Yes Enables AirWave to check automatically for multiple update types.
Sets a threshold to display an alert on the controller monitor page when the license usage has reached this number.
Check daily for AirWave updates, to include enhancements, device template files, important security updates, and other important news. This setting requires a direct Internet connection via AirWave.
Automatic Authorization Settings
On the AMP Setup > General page, locate the Automatic Authorization section. These settings allow you to control the conditions by which devices are automatically authorized into AP groups and folders. AirWave validates the Folder and Group to ensure that both settings have been set to valid drop down options. Table 2 describes the settings and default values in this section.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 19
Table 2: AMP Setup > General > Automatic Authorization Fields and Default Values
Setting Default Description
Add New
New Device List Globally add new controllers and autonomous devices to: Controllers and Autonomous Devices Location
Add New Thin APs
New Device List Globally add new thin APs to: Location
Automatically Authorized Virtual
Manage
Read/Write Controller Mode
Aruba Instant Settings
l The New Device List (located in Devices > New). l The same folder and group as the discovering device. l The same group and folder of their closest IP neighbor on the
same subnet.
l Choose a group and folder. If you select this option, enter the
folder/group in the Auto Authorization Group and Auto Authorization Folder fields that display.
NOTE: This setting can be overridden in Groups > Basic.
l The New Devices list. l The same folder and group as the discovering device. l The same group and folder of their closest IP neighbor on the
same subnet.
l Choose a group and folder. If you select this option, enter the
folder/group in the Auto Authorization Group and Auto Authorization Folder fields that display.
NOTE: This setting can be overridden in Groups > Basic.
Specify whether Virtual Controller mode for Instant APs will be in Manage Read/Write mode or Monitor Only mode.
A Virtual Controller can communicate with the AirWave server over a configurable communication port, and authenticate to the server using a pre-shared key, and/or two-way certificate-based authentication using an SSL certificate sent from AirWave to the Instant device.
The AMP Setup > General > Aruba Instant Options page includes the following Configuration settings:
Table 3: AMP Setup > General > ArubaInstantOptions Fields and Default Values
Setting Default Description
Communication port (443,1000-65534):
Security method for adding new Virtual Controllers:
443 By default, an Instant Virtual Controller communicates with AirWave
over port 443. If your enterprise has a security policy that restricts the use of port 443 for inbound communication, use this field to change the port the Virtual Controller uses to communicate with AirWave.
PSK Only
AirWave can use the following security methods to authenticate a Virtual Controller to the AirWave server:
l PSK Only l PSK and Certificate l Certificate Only
If you enable certificate-based authentication, you are directed to the AMP Setup > General > Upload SSLCertificate page, where you are prompted to upload an certificate file in PEM format that contains both a private key and certificate.
20 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Table 3: AMP Setup > General > ArubaInstantOptions Fields and Default Values (Continued)
Setting Default Description
Allow None-TPM Devices
Configuration Only No By default, AirWave will push Instant configuration settings as well as
Yes If certificate-based authentication is enabled for the Virtual Controller,
AirWave allows low assurance, non-TPM device. This setting is unavailable when PSK authentication is used.
AirWave settings such as RAPIDS settings and traps from an AirWave group to a Virtual Controller assigned to that group. Select the Yes option to push Instant configuration settings only.
If you select a security method that includes Certificate-based authentication, you must upload the a certificate from a supported certificate authority to the AirWave server, as the default AirWave certificate will not be recognized by the Instant AP, and will cause the SSL handshake to fail. Certificate authentication also requires that the AMP IPaddress information configured on the Instant AP is a domain name, and not an IP address.
AirWave supports the following trusted certificate authorities:
l Chain 1: Trusted Root CA: C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External
CA Root Intermediate CA: C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO High-Assurance Secure Server CA
l Chain 2: Trusted Root CA: C=US, O=GeoTrust Inc., CN=GeoTrust Global CA Intermediate CA: Subject: C=US,
O=Google Inc, CN=Google Internet Authority G2
l Chain 3: Trusted Root CA: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 2006 VeriSign, Inc. -
For authorized use only, CN=VeriSign Class 3 Public Primary Certification Authority - G5 Intermediate CA: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=Terms of use at https://www.verisign.com/rpa (c)10, CN=VeriSign Class 3 Secure Server CA - G3
l Root CA: Trusted Root CA: C=US, O=Equifax, OU=Equifax Secure Certificate Authority
If you enable certificate authentication, you are prompted to upload an SSLcertificate. you can view the current AirWave certificate using the View Certificate link on that page, or click Change to upload a new certificate file to the AirWave server.
Top Header Settings
The top header of each AirWave WebUI page displays icons that provide counts on newly discovered devices, device status, mismatches, rogues, clients, and both unacknowledged and severe alerts. These icons also provide direct links for immediate access to key system components.
Figure 2: Header Statistics Icons
You can configure what is displayed in the top header for all pages, or for individual AirWave users.
To change the header statistic icons:
1. Navigate to AMP Setup > General, then scroll down to Top Header.
2. Choose the statistics.
3. Choose the devices.
4. Click Save.
A confirmation message does not appear when you make modifications to the top header statistic icons.
To change statistics that display for an AirWave user:
AirWave 8.2.10.1 | User Guide Configuring AirWave | 21
1. Navigate to Home > User Info page, then scroll down to Top Header Stats.
2. Choose the statistics.
3. Choose the devices.
4. Click Save. These user settings will override the general settings on the AMP Setup page.
Search Method
On the AMP Setup > General page, locate the Search Method section. Select one of the following drop down options as the system-wide default search method. This default search type will be used when a user types an entry in the Search field and then clicks Enter without selecting a specific search type.
l Use System Defaults: The Search Method will be based on the system-wide configuration setting. This
method is configured on the AMP Setup > General page.
l Active clients + historical clients (exact match) + all devices: Commonly referred to as Quick Search, this looks
at all active and historical clients and all devices. This search is not case-sensitive. The results of this search display in a pop up window rather than on the Home > Search page. This pop up window includes top-level navigation that allows you to filter the results based on Clients, APs, Controllers, and Switches.
l Active clients + all categories: This looks at all active clients (not historical) and all categories. This search is not
case-sensitive.
l Active clients + all categories (exact match): This looks at all active clients (not historical) and all categories.
This search returns only matches that are exactly as typed (IP, user name, device name, etc). This search is case-sensitive for all searched fields.
l Active + historical clients + all categories: This looks at all active and historical clients and all categories. This
search is not case-sensitive.
l Active + historical clients + all categories (exact match): This looks at all active and historical clients and all
categories. This search returns only matches that are exactly as typed (IP, user name, device name, etc). This search is case-sensitive for all searched fields.
A confirmation message does not appear after you make modifications to Search Preferences.
Per-user search preferences can be set in the Home > User Info page.
Home Overview Preferences
On the AMP Setup > General page, locate the Home Overview Preferences section. Table4 describes the settings and default values in this section.
Table 4: AMP Setup > General > Home Overview Preferences Fields and Default Values
Setting Default Description
Configure Channel Busy Threshold
Channel Busy Threshold (%)
Yes Whether you want to configure the threshold at which a channel is
considered to be busy at the Top Folders By Radio Channel Usage Overview widget.
n/a The threshold percent at which the radio channel is considered busier
than normal. This field is only available if the Configure Channel Busy Threshold setting is Yes.
22 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Display Settings
On the AMP Setup > General page, locate the Display section and select the options to appear by default in new device groups.
Changes to this section apply across all of AirWave. These changes affect all users and all new device groups.
Table 5 describes the settings and default values in this section.
Table 5: AMP Setup > General > Display Fields and Default Values
Setting Default Description
AP Fully Qualified Domain Name Options
Show vendor­specific device settings for
No Sets AirWave to use fully qualified domain names for APs instead of the
AP name. For example, ‘testap.yourdomain.com; would be used instead of ‘testap.’ Select one of the following options:
l Don’t use FQDN - This default value specifies that the fully qualified
domain name will not be used.
l Use AP Name with FQDN - The AP name will prepend the FQDN, for
example “somehostname (my.hostname.com).” Note that if the AP name is not present, then the FQDN will still appear in parenthesis.
l Use only FQDN - Only the fully qualified domain name will be used.
NOTE: This option is supported only for Cisco IOS, Dell Networking W­Series, Aruba Networks, and Alcatel-Lucent devices.
All Devices Displays a drop-down menu that determines which Group tabs and
options are viewable by default in new groups, and selects the device types that use fully qualified domain names. This field has three options, as follows:
l All devices—When selected, AirWave displays all Group tabs and
setting options.
l Only devices on this AMP—When selected, AirWave hides all
options and tabs that do not apply to the APs and devices currently on AirWave.
l Selected device type—When selected, a new field appears listing
many device types. This option allows you to specify the device types for which AirWave displays group settings. You can override this setting.
Look up device and wireless user
Yes Enables AirWave to look up the DNS for new user hostnames. This setting
can be turned off to troubleshoot performance issues.
hostnames
DNS Hostname Lifetime
Device Troubleshooting Hint
AirWave 8.2.10.1 | User Guide Configuring AirWave | 23
24 hours Defines the length of time, in hours, for which a DNS server hostname
remains valid on AirWave, after which AirWave refreshes DNS lookup:
l 1 hour l 2 hours l 4 hours l 12 hours l 24 hours
N/A The message included in this field is displayed along with the Down if a
device’s upstream device is up. This applies to all APs and controllers but not to routers and switches.
Device Configuration Settings
Locate the Device Configuration section and adjust the settings. Table 6 describes the settings and default values of this section.
Table 6: AMP Setup > General > Device Configuration Section Fields and Default Values
Setting Default Description
Guest User Configuration
Allow WMS Offload configuration in monitor-only mode
Allow disconnecting users while in monitor-only mode
Use Global Aruba Configuration
Disabled Enables or prevents guest users to/from pushing configurations to
devices. Options are Disabled (default), Enabled for Devices in Manage(Read/Write), Enabled for all Devices.
No When Yes is selected, you can enable the ArubaOS WMS offload
feature on the Groups > Basic page for WLAN switches in Monitor Only mode. Enabling WMS offload does not cause a controller to reboot. This option is supported only for Aruba and Dell Networking W-Series devices.
No Sets whether you can deauthenticate a user for a device in monitor-
only mode. If set to No, the Deauthenticate Client button for in a Clients > Client Detail page is enabled only for Managed devices.
No Enables Aruba configuration profile settings to be globally configured
and then assigned to device groups. If disabled, settings can be defined entirely within Groups > Controller Configand Groups
>Switch Config instead of globally.
NOTE: Changing this setting may require importing configuration on
your devices. When an existing Aruba configuration setup is to be converted from global to group, follow these steps:
1. Set all the devices to Monitor Only mode before setting the flag.
2. Each device Group will need to have an import performed from the Device Configuration page of a controller in the AMP group.
3. All of the thin APs need to have their settings imported after the device group settings have finished importing.
4. If the devices were set to Monitor Only mode, set them back to Managed mode.
AMP Features
Locate the AMPFeatures section and adjust settings for VisualRF, RAPIDS, and AirWave Glass. Table 7 describes these settings and default values.
Table 7: AMP Setup Setup > General > AMP Features Fields and Default Values
Setting Default Description
Display VisualRF No Enable or disable the VisualRF navigation tab.
Display RAPIDS No Enable or disable the RAPIDS navigation tab.
24 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Table 7: AMP Setup Setup > General > AMP Features Fields and Default Values (Continued)
Setting Default Description
Hide setup pages from non-admin users
Allow role based report visibility
Enable Central Authentication
Yes Restrict access to following pages to users with the AMP Administration
role only:
l VisualRF > Setup l AMP Setup > NMS l RAPIDS > Score Override l RAPIDS > Rules l RAPIDS > Setup l System > Triggers
Yes Enable or disable role-based reporting in AMP. When disabled, reports
can only be generated with by-subject visibility.
Yes Toggles on or off single-sign on (SSO) authentication between AirWave
and AirWave Glass.
Service
Central Authentication Hostname
If the Central Authentication Service is enabled and the managed AMP is attached to AirWave Glass, this field is automatically populated, and you don't need to configure the hostname.
External Logging Settings
Locate the External Logging section and adjust settings to send audit and system events to an external syslog server. Table 8 describes these settings and default values. You can also send a test message using the Send Test Message button after enabling any of the logging options.
For information about creating triggers in order to receive event notifications, see "Creating New Triggers" on
page306.
Table 8: AMP Setup > General > External Logging Section Fields and Default Values
Setting Default Description
Include event log messages
Syslog Server N/A Enter the IP address of the syslog server. Note that this field is hidden if
Syslog Port 514 Enter the port of the syslog server. Note that this field is hidden if both
Event log facility local1 Select the facility for the event log from the drop-down menu. This field is
Include audit log messages
No Select Yes to send event log messages to an external Syslog server.
NOTE: If you enable event logging, other options to configure the Syslog server and enable logging using Common Event Format (CEF) become available.
both "Include event log messages" and "Include audit log messages" are set to No.
"Include event log messages" and "Include audit log messages" are set to No.
only available if the "Include event log messages" setting is Yes.
No Select Yes to send audit log messages to an external syslog server.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 25
Table 8: AMP Setup > General > External Logging Section Fields and Default Values (Continued)
Setting Default Description
Audit log facility local1 Select the facility for the audit log from the drop-down menu. This field is
only available if the "Include audit log messages" setting is Yes
Send Test Message N/A If messaging is enabled and a server and port are configured, click this
button to send a test message. Upon completion, a message will appear at the top of this page indicating that the message was sent successfully.
Historical Data Retention Settings
Locate the Historical Data Retention section and specify the number of days you want to keep client session records and rogue discovery events. Table 9 describes the settings and default values of this section. Many settings can be set to have no expiration date.
Table 9: AMP Setup > General > Historical Data Retention Fields and Default Values
Setting Default Description
Inactive Client and VPN User Data (0­1500 days, zero disables)
Client Association and VPN Session History (0-550 days, zero disables)
Tag History (0-550 days, zero disables)
Rogue AP Discovery Events (14-550 days, zero disables)
Reports (0-550 days, zero disables)
Automatically Acknowledge Alerts(0-550 days, zero disables)
60 Defines the number of days AirWave stores basic information about
inactive clients and VPN users. A shorter setting of 60 days is recommended for customers with high user turnover such as hotels. The longer you store inactive user data, the more hard disk space you require.
14 Defines the number of days AirWave stores client and VPN session
records. The longer you store client session records, the more hard disk space you require.
14 Sets the number of days AirWave retains location history for Wi-Fi tags.
14 Defines the number of days AirWave stores Rogue Discovery Events. The
longer you store discovery event records, the more hard disk space you require.
60 Defines the number of days AirWave stores Reports. Large numbers of
reports, over 1000, can cause the Reports > Generated page to be slow to respond.
14 Defines automatically acknowledged alerts as the number of days AirWave
retains alerts that have been automatically acknowledged. Setting this value to 0 disables this function, and alerts will never expire or be deleted from the database.
Acknowledged Alerts(0-550 days, zero disables)
26 | Configuring AirWave AirWave 8.2.10.1 | User Guide
60 Defines the number of days AirWave retains information about
acknowledged alerts. Large numbers of Alerts, over 2000, can cause the System > Alerts page to be slow to respond.
Table 9: AMP Setup > General > Historical Data Retention Fields and Default Values (Continued)
Setting Default Description
Radius/ARM/IDS Events(0-550 days, zero disables)
Archived Device Configurations (0­100, zero disables)
Archive device configs even if they only have rogue classifications
Guest Users (0-550 days, zero disables)
Inactive SSIDs (0­550 days, zero disables)
Inactive Interfaces (0-550 days, zero disables)
14 Defines the number of days AirWave retains information about RADIUS,
ARM, and IDS events. Setting this value to 0 disables this function, and the information will never expire or be deleted from the database.
10 Defines the number of configurations that will be retained for archived
devices. Whether rogue information is included depends on the setting of the Archive device configs even if they only have rogue classifications setting.
No Sets whether to archive device configurations even if the device only has
rogue classifications.
30 Sets the number of days that AirWave is to support any guest user. A value
of 0 disables this function, and guest users will never expire or be deleted from the AirWave database.
425 Sets the number of days AirWave retains historical information after
AirWave last saw a client on a specific SSID. Setting this value to 0 disables this function, and inactive SSIDs will never expire or be deleted from the database.
425 Sets the number of days AirWave retains inactive interface information
after the interface has been removed or deleted from the device. Setting this value to 0 disables this function, and inactive interface information will never expire or be deleted from the database.
Interface Status History (0-550 days, zero disables)
Interfering Devices (0-550 days, zero disables)
Device Events (Syslog, Traps)(1­31 days)
Mesh Link History (0-550 days)
Device Uptime (0­120 months, zero disables)
425 Sets the number of days AirWave retains historical information on
interface status. Setting this value to 0 disables this function.
14 Sets the number of days AirWave retains historical information on
interfering devices. Setting this value to 0 disables this function.
2 Sets the number of days AirWave retains historical information on device
events such as syslog entries and SNMP traps. Setting this value to 0 disables this function. Refer to "Viewing Device Events" on page 303.
NOTE: If your data table has more than 5 million rows, AirWave will truncate the device event retention data. In this case, the "number of days" setting becomes "number of hours."
30 Sets the number of days AirWave retains historical information for mesh
links.
60 Sets the number of months AirWave retains historical information on
device uptime. Setting this value to 0 disables this function.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 27
Table 9: AMP Setup > General > Historical Data Retention Fields and Default Values (Continued)
Setting Default Description
Client Data Retention Interval (1-425 days)
UCC Call History (1-30 days)
UCC Call Details (1-7 days)
Config Job Retention Interval (1-31 days)
425 Sets the number of days AirWave retains historical information for clients.
30 Sets the number of days that calls remain in AirWave's call history.
2 Sets the number if days that the AirWave retains details for individual calls.
31 Sets the number of days AirWave retains information about configuration
jobs.
Firmware Upgrade/Reboot Options
Locate the Firmware Upgrade/Reboot Options section and adjust settings as required. This section allows you to configure the default firmware upgrade behavior for AirWaveTable 10
Table 10 describes the firmware upgrade and reboot options.
Table 10: AMP Setup > General > Firmware Upgrade Defaults Fields and Default Values
Setting Default Description
Allow firmware upgrades in monitor-only mode
No If Yes is selected, AirWave upgrades the firmware for APs in Monitor
Only mode. When AirWave upgrades the firmware in this mode, the desired configuration are not be pushed to AirWave. Only the firmware is applied. The firmware upgrade may result in configuration changes AirWave does not correct those changes when the AP is in Monitor Only mode.
Allow Rebooting Monitor Only Devices
Enable firmware distribution via http
Fast Download No When fast download is enabled, standalone IAPs in the same RF zone are
Sequential Reboot No When sequential reboot is enabled, the APs in the same RF zone will
No If Yes is selected, AirWave can reboot devices in Monitor Only mode.
No By default, we use HTTPS and require user log in for firmware updates.
NOTE: For IAPs running versions earlier than Instant 3.4.0.0, set this option to "Yes" in order to get firmware updates using HTTP.
grouped so that they can download the image from each other. This assumes that the APs are behind the same firewall so that they can reach each other, thereby making the firmware download faster.
reboot sequentially. At any given time, only one AP is being rebooted. As a result, users can use another AP that is visible in RF and have uninterrupted service.
28 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Table 10: AMP Setup > General > Firmware Upgrade Defaults Fields and Default Values (Continued)
Setting Default Description
Maximum Interleaved Jobs (1-
20)
Maximum Interleaved Devices Per Job (1-1000)
Failures before stopping (0-20, zero disables)
Failure timeout (5­60 mins)
DRT upgrade failure timeout (2-30 mins)
Number of tries in failure (1-4)
Periodic run failed upgrade interval
20 Defines the number of jobs AirWave runs at the same time. A job can
include multiple APs. When jobs are started by multiple users, AirWave will interleave upgrades so that one user's job does not completely block another’s.
20 Defines the number of devices that can be in the process of upgrading at
the same time. Within a single job, AirWave may start the upgrade process for up to this number of devices at the same time. However, only one device will be actively downloading a firmware file at any given time.
1 Sets the default number of upgrade failures before AirWave pauses the
upgrade process. User intervention is required to resume the upgrade process. Setting this value to 0 disables this function.
60 Sets the timeout for an upgrade attempt.
6 Sets the timeout for a Downloadable Regulatory Table (DRT) upgrade
attempt.
1 Sets the number of retry attempts.
Disabled Set the length of time AirWave retries running a failed upgrade.
Additional AMP Services
Locate the AdditionalAMP Services section, and adjust settings as required. Table 11 describes the settings and default values of this section.
Table 11: AMP Setup > General > Additional AMP Services Fields and Default Values
Setting Default Description
Enable FTP Server No Enables or disables the FTP server on AirWave. The FTP server is only
used to manage Aruba AirMesh and Cisco Aironet 4800 APs. Best practice is to disable the FTP server if you do not have any supported devices in the network.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 29
Table 11: AMP Setup > General > Additional AMP Services Fields and Default Values (Continued)
Setting Default Description
Enable RTLS Collector
No Enables or disables the RTLS Collector, which is used to allow
ArubaOScontrollers to send signed and encrypted RTLS (real time locating system) packets to VisualRF; in other words, AirWave becomes the acting RTLS server. The RTLS server IP address must be configured on each controller. This function is used for VisualRF to improve location accuracy and to locate chirping asset tags. This function is supported only for Dell Networking W-Series, Alcatel-Lucent, and Aruba Networks devices.
If Yes is specified, the following additional fields appear. These configuration settings should match the settings configured on the controller:
l RTLS Port—Specify the port for the AirWave RTLS server. l RTLS Username—Enter the user name used by the controller to
decode RTLS messages.
l RTLS Password—Enter the RTLS server password that matches the
controller’s value.
l Confirm RTLS Password—Re-enter the RTLS server password.
Use Embedded Mail Server
Yes Enables or disables the embedded mail server that is included with
AirWave.
Mail Relay Server Optional If you enable the "Use embedded mail server" option, enter information
for an optional mail relay server. This field supports a Send Test Email button for testing server functionality. Click this button to enter valid email addresses.
Process user roaming traps from Cisco WLC
Enable AMON data collection
Enable Clarity Data Collection
Enable Traffic Analysis Data Collection
Yes Whether AirWave should parse client association and authentication traps
from Cisco WLC controllers to give real time information on users connected to the wireless network.
Yes Allows AirWave to collect enhanced data from Aruba devices on certain
firmware versions. See the Best Practices Guide on the Home >
Documentation page for more details
NOTE:
l When enabling AMON, auditing should be set to daily and have been
successful at least once to allow AirWave to calculate the proper BSSIDs per radio. If these BSSIDs do not exist, clients are dropped because they do not have any corresponding BSSIDs in the AirWave database. Auditing should be set to daily because the BSSIDs are kept in cache memory and cleared every 24 hours.
l To view usage data on a standalone controller or managed device, set
the Enable AMON Data Collection option to No to allow usage data to be aggregated from the AP level.
Yes Allows AirWave to collect enhanced Clarity Monitoring data from Aruba
devices running ArubaOS 6.4.3 and later versions
Yes If AMON is enabled for a controller, you can enable AirWave to collect
Traffic Analysis data from the controller by setting this to Yes. When enabled, the Home > Traffic Anaylsis dashboard is available in the WebUI.
30 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Table 11: AMP Setup > General > Additional AMP Services Fields and Default Values (Continued)
Setting Default Description
Traffic Analysis Storage Allocated (GiB)
Enable UCC Data Collection
Enable UCC Calls Stitching (Heuristics)
Prefer AMONvs SNMP Polling
50 If Traffic Analysis Data Collection is enabled, you can specify the amount
of storage to allocate.
Yes Enables controllers to send UCC data to AirWave. For this feature to work,
AirWave must be a management server on the controller, the AMON port is set up for UDP port 8211, and the controller profile has UCC monitoring enabled.
Yes Enables caller-to-callee call stitching for non-SDN deployments. You
should turn off this option for NATand BOC deployments.
Yes
Prefer AMON is a configuration setting which causes AirWave to use an AMON feed to obtain client monitoring information from a controller rather than polling it via SNMP. When you enable this setting, values such as AP lists and rogue AP lists are still polled via SNMP, but the bulk of client monitoring information is delivered via AMON.
NOTE:
l Auditing needs to have been successful at least once to allow AirWave
to calculate the proper BSSIDs per radio.
l When Prefer AMON is enabled, the controller must be configured to
send AMON to AirWave by issuing the controller-amon bssid­tunnel-stats command from the command-line interface of the
standalone controller or managed device (not mobility master).
l To view bandwidth usage data on a standalone controller or managed
device, you must set Prefer AMON vs SNMP Polling to No and also set the Enable AMON Collection setting to No. For more information, see "Enable AMON data collection" on page 30.
l The network path from the controller to the AirWave server must allow
traffic on UDP port 8211.
l The controller routinely sends AMON in large UDP packets, (up to 30K
bytes). Before enabling this setting, ensure the network path from the controller to AirWave can pass such large packets intact.
l This setting should only be used in a network environment with low
levels of UDPpacket loss, as the loss of a single Ethernet frame will potentially result in the loss of up to 30K bytes worth of data.
l
Enable Syslog and SNMP Trap Collection
Require SSH host
Yes This option specifies whether traps used to detect roaming events, auth
failures, AP up/down status, and IDS events will still be collected if they are sent by managed devices.
No
This setting reserved for future use.
key verification
Validate PAPI key No Security improvements in AirWave 8.2.1 and later releases allow you to
specify a custom PAPIkey and require PAPI key validation. If you select the Yes option, you are prompted to enter a custom PAPI key
Disable TLS 1.0 and
1.1
Yes This option is set to Yes by default. In order for Aruba switches to
automatically check-in to AirWave by ZTP, you must change this option to No. If you select No, you must restart AMP.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 31
Performance Settings
Locate the Performance section. Performance tuning is unlikely to be necessary for many AirWave deployments, and likely provides the most improvements for customers with extremely largePro or Enterprise installations. Please contact Aruba support if you think you might need to change any of these settings. Table 12 describes the settings and default values of this section.
Table 12: AMP Setup> General > Performance Fields and Default Values
Setting Default Description
Monitoring Processes
Maximum number of configuration processes
Maximum number of audit processes
SNMP Fetcher Count (2-6)
Verbose Logging of SNMP Configuration
Based on the number of cores for your server
5 Increases the number of processes that are pushing configurations
3 Increases the number of processes that audit configurations for
2 Specify the number of SNMPv2 fetchers.
No Enables or disables logging detailed records of SNMP configuration
Optional setting configures the throughput of monitoring data. Increasing this setting allows AirWave to process more data per second, but it can take resources away from other AirWave processes. Contact Aruba support if you think you might need to increase this setting for your network. Also note that the value range varies based on the number of available process cores.
to your devices, as an option. The optimal setting for your network depends on the resources available, especially RAM. Contact Aruba support if you think you might need to increase this setting for your network.
your devices, as an option. The optimal setting for your network depends on the resources available, especially RAM. Contact Aruba support if you are considering increasing this setting for your network.
information.
SNMP Rate Limiting for Monitored Devices
Client Association Relevance Factor
32 | Configuring AirWave AirWave 8.2.10.1 | User Guide
No When enabled, AirWave fetches SNMP data more slowly, potentially
reducing device CPU load.
We recommend enabling this global setting if your network contains a majority of legacy controllers (800, 2400, 5000, or controllers that use Supervisor Module II). If your network mainly uses newer (30000 Series, 600 Series, or the M3 module in the 6000 series), we strongly recommend disabling this setting.
0 days (disabled)
Use this setting to hide old client information from clients lists and client search results. For example, a setting of 3 limits the historical client data displayed in client lists and search results to client sessions that have been disconnected within the last three days. When this value is set to 1, client lists and search results display only the client history for the previous day.
This time range can be set from 0-550 days, where a value of zero disables this feature and makes available all historical client data. A shorter time period improves search performance and allows client lists to display more rapidly, though it will also display fewer results.
Table 12: AMP Setup> General > Performance Fields and Default Values (Continued)
Setting Default Description
RAPIDS Processing Priority
RAPIDS custom process limit (1-
16)
Low Defines the processing and system resource priority for RAPIDS in
relation to AirWave as a whole.
When AirWave is processing data at or near its maximum capacity, reducing the priority of RAPIDS can ensure that processing of other data (such as client connections and bandwidth usage) is not adversely impacted.
The default priority is Low. You can also tune your system performance by changing group poll periods.
If you select Custom for the priority, then also specify the RAPIDS custom process limit.
1 when Custom is specified for the RAPIDS Processing Priority.
Sets the maximum number of monitoring process assigned to RAPIDS work. Note that this option is only available if Custom is specified for the RAPIDS Processing Priority.

Defining Network Settings

The next steps in setting up AirWave are to configure the network interface, DNS settings, NTP servers, and static routes.
Figure 3 illustrates the contents of the AMP Setup > Network page when setting up an IPv4 interface.
Optionally, you can configure an IPv6 interface. For information, see "Primary Network Interface Settings" on
page34.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 33
Figure 3: Network Page
Specify the network configuration options described in the sections that follow to define the AirWave network settings. Select Save when you have completed all changes on the AMP Setup > Network page, or select Revert to return to the last settings. Save restarts any affected services and may temporarily disrupt your network connection.
Refer to the following topics for configuration information:
l "Primary Network Interface Settings" on page 34
l "Secondary Network Interface Settings" on page35
l "Network Time Protocol (NTP) Settings" on page 35
l "Static Routes" on page 36
Primary Network Interface Settings
Locate the Primary Network Interface section. The information in this sections should match what you defined during initial network configuration and should not require changes. Table 13 describes the settings and default values.
Table 13: Primary Network Interface Fields and Default Values
Setting Default Description
IPv4 Address None Sets the IPv4 address of the AirWave network interface.
NOTE: This address must be a static IP address.
Hostname None Sets the DNS name assigned to the AirWave server.
Subnet Mask None Sets the subnet mask for the primary network interface.
34 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Table 13: Primary Network Interface Fields and Default Values (Continued)
Setting Default Description
IPv4 Gateway None Sets the default gateway for the network interface.
IPv6 Enabled No By selecting Yes, you can enter an optional IPv6 address and gateway
address.
IPv6 Address None Sets the IPv6 address of the AirWave network interface.
IPv6 Gateway None Sets the default gateway for the network interface.
Primary DNS IP None Sets the primary DNS IP address for the network interface.
Secondary DNS IP None Sets the secondary DNS IP address for the network interface.
Secondary Network Interface Settings
Locate the Secondary Network Interface section. The information in this section should match what you defined during initial network configuration and should not require changes. Table 14 describes the settings and default values.
Table 14: Secondary Network Interface Fields and Default Values
Setting Default Description
Enabled No Select Yes to enable a secondary network interface. You will be
prompted to define the IP address and subnet mask.
IP Address None Specify the IP address of the AirWave secondary network.
NOTE: This address must be a static IP address. AirWave supports IPv4 and IPv6 addresses.
Subnet Mask None Specify the subnet mask for the secondary network interface.
Network Time Protocol (NTP) Settings
On the AMP Setup > Network page, locate the Network Time Protocol (NTP) section. The Network Time Protocol is used to synchronize the time between AirWave and your network’s NTP server. NTP servers synchronize with external referencetime sources, such as satellites, radios, or modems.
Specifying NTP servers is optional. NTP servers synchronize the time on the AirWave server, not on individual access points.
To disable NTP services, clear both the Primary and Secondary NTP server fields. Any problem related to communication between AirWave and the NTP servers creates an entry in the event log. Table 15 describes the settings and default values in more detail. For more information on ensuring that AirWave servers have the correct time, please see http://support.ntp.org/bin/view/Servers/NTPPoolServers.
Table 15: AMP Setup > Network > Secondary Network Fields and Default Values
Setting Default Description
Primary ntp1.yourdomain.com Sets the IP address or DNS name for the primary NTP server.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 35
Table 15: AMP Setup > Network > Secondary Network Fields and Default Values (Continued)
Setting Default Description
Secondary ntp2.yourdomain.com Sets the IP address or DNS name for the secondary NTP server.
Static Routes
On the AMP Setup > Network page, locate the Static Routes area. This section displays network, subnet mask, and gateway settings that you have defined elsewhere from a command-line interface.
This section does not enable you to configure new routes or remove existing routes.
What Next?
l Go to additional tabs in the AMP Setup section to continue additional setup configurations. The next section
describes AirWave roles.
l Complete the required configurations in this chapter before proceeding. Aruba support remains available to
you for any phase of AirWave configuration.

Creating AirWave Users

AirWave installs with only one user—the admin, who is authorized to perform the following functions:
l Define additional users with varying levels of privilege, be it manage read/write or monitoring.
l Limit the viewable devices as well as the level of access a user has to the devices.
Each general user that you add must have a user name, a password, and a role. Use unique and meaningful user names as they are recorded in the log files when you or other users make changes in AirWave.
User name and password are not required if you configure AirWave to use RADIUS, TACACS, or LDAP authentication. You do not need to add individual users to the AirWave server if you use RADIUS, TACACS, or LDAP authentication.
The user role defines the user type, access level, and the top folder for that user. User roles are defined on the AMP Setup > Roles page. Refer to the previous procedure in this chapter for additional information, "Creating
AirWave User Roles" on page 38.
The admin user can provide optional additional information about the user, including the user's real name, email address, phone number, and so forth.
Perform the following steps to display, add, edit, or delete AirWave users of any privilege level. You must be an admin user to complete these steps.
1. Go to the AMP Setup > Users page. This page displays all users currently configured in AirWave, as shown in
Figure 4.
Figure 4: AMP Setup > Users Page
36 | Configuring AirWave AirWave 8.2.10.1 | User Guide
2. Select Add to create a new user, select the pencil icon to edit an existing user, or select a user and select Delete to remove that user from AirWave. When you select Add or the edit icon, the Add User page appears,
illustrated in Figure 5.
Current users cannot change their own role. The Role drop-down field is disabled to prevent this.
Figure 5: AMP Setup > Users > Add/Edit User Page
3. Enter or edit the settings on this page. Table 16 describes these settings.
Table 16: AMP Setup > Users > Add/Edit User Fields and Default Values
Setting Default Description
Username None Sets the user name for the user who logs in to AirWave. This user name is
displayed in AirWave log files.
Role None Specifies the user’s Role, which defines the Top viewable folder as well as the
type and access level of the user specified in the previous field.
The admin user defines user roles on the AMP Setup > Roles page, and each user in the system is assigned to a role.
Password None Sets the password for the user being created or edited. Enter an alphanumeric
string without spaces, and enter the password again in the Confirm Password field. AirWave strengthens user passwords with SHA512 encryption.
NOTE: Because the default user's password is identical to the Name, you should change this password. You will be logged out and asked to enter your new password.
Name None Allows you to define an optional and alphanumeric text field that takes note of the
user's actual name.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 37
Table 16: AMP Setup > Users > Add/Edit User Fields and Default Values (Continued)
Setting Default Description
Email Address
Phone None Allows you to enter an optional phone number for the user.
Notes None Enables you to cite any additional notes about the user, including the reason they
None Allows you to specify a specific email address that will propagate throughout
many additional pages in AirWave for that user, including reports, triggers, and alerts.
were granted access, the user's department, or job title.
4. Select Add to create the new user, Save to retain changes to an existing user, or Cancel to cancel out of this screen. The user information you have configured appears on the AMP Setup > Users page, and the user propagates to all other AirWave pages and relevant functions.
AirWaveenables user roles to be created with access to folders within multiple branches of the overall hierarchy. This feature assists non-administrator users who support a subset of accounts or sites within a single AirWave deployment, such as help desk or IT staff.

Configuring AirWave User Roles

The AMP Setup > Roles page defines the viewable devices, the operations that can be performed on devices, and general AirWave access. User roles can be created that provide users with access to folders within multiple branches of the overall hierarchy. This feature assists non-administrative users, such as help desk or IT staff, who support a subset of accounts or sites within a single AirWave deployment. You can restrict user roles to multiple folders within the overall hierarchy even if they do not share the sametop-level folder. Non-admin users are only able to see data and users for devices within their assigned subset of folders.
Refer to the following additional topics:
l "User Roles and VisualRF" on page 38
l "Creating AirWave User Roles" on page38
User Roles and VisualRF
VisualRF uses the same user roles as defined for AirWave. Users can see floor plans that contain an AP to which they have access in AirWave, although only visible APs appear on the floor plan. VisualRF users can also see any building that contains a visible floor plan and any campus that contains a visible building.
In VisualRF > Setup > Server Settings, the Restrict visibility of empty floor plans to the user that created them configuration option allows you to restrict the visibility of empty floor plans to the role of the user who created them. By default, this setting is set to No.
When a new role is added to AirWave, VisualRF must be restarted for the new user to be enabled.
Creating AirWave User Roles
Roles define the capabilities a user has access to and the privileges and views available for device groups and devices in AirWave. The available configuration options differ for each role type.
Most users will see two sections on this page: Role and Guest User Preferences. The Guest User Preferences section appears only if Guest User Configuration is enabled in AMP Setup > General.
If you want to create a user role, log in to AirWave as admin and follow these steps:
1. Go to the AMP Setup > Roles and click Add.
38 | Configuring AirWave AirWave 8.2.10.1 | User Guide
2. Enter a name for the user role, select options, and click Add. Figure 6 shows a rolenamed Traffic Analysis being created.
Figure 6: Adding a Non-Admin Role Named Traffic Analysis
3. Enter additional settings on this page.
Figure 7 shows the newly created Traffic Analysis Admin role in the Role page.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 39
Figure 7: Newly Created Traffic Analysis Admin Role
AMPAdministrator Role
The following table describes the available settings and default values for the AMP Administrator role.
Table 17: AMP Setup > Roles > Add/Edit Roles Fields and Default Values for AMP Administrator Role
Setting Default Description
Name None Sets the administrator-definable string that names the role. The role
name should indicate the devices and groups that are viewable, as well as the privileges granted to that role.
Enabled Yes Disables or enables the role. Disabling a role prevents all users of that
role from logging in to AirWave.
Type Device
Manager
Aruba Controller Role
Allow user to disable timeout
Custom Message none A custom message can also be included.
Disabled Enables or disables Single Sign-On for the role. If enabled, allows the
No Whether a user can disable AirWave’s timeout feature.
Defines the type of role.
AirWave Administrator—Grants full access to AirWave and all the devices, thecapability to create new users, and access to AMP Setup,
VisualRF > Setup, VisualRF > Audit Log, System > Event Log, and System > Performance pages.
user read-only access or direct access to the Aruba controller UIs from quick links in the WebUI without having to enter credentials for the controller.
Table 18: AMP Setup > Roles > Add/Edit Roles Fields and Default Values for Device Manager Role
Setting Default Description
Name None Sets the administrator-definable string that names the role. The role name
should indicate the devices and groups that are viewable, as well as the privileges granted to that role.
Enabled Yes Disables or enables the role. Disabling a role prevents all users of that role
from logging in to AirWave.
40 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Table 18: AMP Setup > Roles > Add/Edit Roles Fields and Default Values for Device Manager Role (Continued)
Setting Default Description
Type Device
Manager
Defines the type of role.
Device Manager—Provides access to a limited number of devices and groups based on the Top folder and varying levels of control based on the Access Level.
Access Level Monitor
(Read Only)
Defines the privileges the role has over the viewable device. AirWave supports three privilege levels, as follows:
l Manage (Read/Write)—Provides the capability to modify, remove, and
view information for devices and groups. Selecting this option causes a new field, Allow authorization of Devices, to appear on the page, and is enabled by default.
l Audit (Read Only)—Provides the capability to view devices and groups
and the Device Configuration page, which may contain sensitive information like AP passwords.
l Monitor (Read Only)—Provides the capability to view devices and groups
and VisualRF.
Top Folder Top Defines the highest viewable folder for the role. The role is able to view all
devices and groups contained by the specified top folder. The top folder and its subfolders must contain all of the devices in any of the groups it can view.
NOTE: AirWave enables user roles to be created with access to folders within multiple branches of the overall hierarchy. This feature assists non­administrator users who support a subset of accounts or sites within a single AirWave deployment, such as help desk or IT staff.
User roles can be restricted to multiple folders within the overall hierarchy, even if they do not share the same top-level folder. Non-administrator users are only able to see data and users for devices within their assigned subset of folders.
Allow Authorization
Yes
NOTE: This option is only available when the AP/Device Access Level is specified as Manage (Read/Write).
of Devices
RAPIDS None Sets the RAPIDS privileges. This field specifies the RAPIDS privileges for the
user role and includes these options:
l None— Cannot view the RAPIDS tab or any rogue devices. l Read Only—The user can view the RAPIDS pages but cannot make any
changes to rogue devices or perform OS scans.
l Read/Write—The user may edit individual rogues, classification, threat
levels and notes, and perform OS scans.
l Administrator—Has the same privileges as the Read/Write user, but can
also set up RAPIDS rules, override scores and is the only user who can access the RAPIDS > Setup page.
VisualRF Read Only Sets the VisualRF privileges, which are set separately from the Devices:
l Read Only—The user can view the VisualRF pages but cannot make any
changes to floor plans.
l Read/Write—The user may edit individual floor plans, buildings, and
campuses.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 41
Table 18: AMP Setup > Roles > Add/Edit Roles Fields and Default Values for Device Manager Role (Continued)
Setting Default Description
UCC Yes
Traffic Analysis
Aruba Controller Single Sign­On Role
Display Client Diagnostics Screens By Default
Allow User to Disable Timeout
Allow Reboot of Devices
Allow Creation of Guest Users
Yes
Disabled If enabled, the user has read-only or root access to Aruba controller UIs from
No Sets the role to support helpdesk users with parameters that are specific to
No Whether a user can disable AirWave’s timeout feature.
No Allows user to reboot devices in AirWave.
Yes If this option is enabled, users with an assigned role of Monitoring or Audit can
Permits access to UCC views and tables. Monitoring and managing privileges are set at the device level.
Permits access to Traffic Analysis views and tables. Monitoring and managing privileges are set at the AP/Device level.
quick links without having to enter credentials for the controller.
the needs of helpdesk personnel supporting users on a wireless network.
be given access to guest user account creation along with the option to allow a sponsor to change its user name.
NOTE: This option is not available if the AP/Device Access Level is specified as Manage (Read/Write).
Allow Accounts With No Expiration
Allow Sponsor to Change Sponsorship User Name
Custom Message
Yes Specifies whether to allow accounts that have no expiration set. If this is set to
No, then enter the amount of time that can elapse before the access expires.
No Specifies whether a sponsor can change the sponsorship user name.
none A custom message can also be included.
Guest Access Sponsor Role
The following table describes the available settings and default values for the Guest Access Sponsor role.
42 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Table 19: AMP Setup > Roles > Add/Edit Roles Fields and Default Values for Guest Access Sponsor Role
Setting Default Description
Name None Sets the administrator-definable string that names the role. The role name
should indicate the devices and groups that are viewable, as well as the privileges granted to that role.
Enabled Yes Disables or enables the role. Disabling a role prevents all users of that role
from logging in to AirWave.
Type AP/Device
Manager
Top Folder Top Defines the Top viewable folder for the role. The role is able to view all devices
Allow user to disable timeout
Allow accounts with no expiration
No Whether a user can disable AirWave’s timeout feature.
Yes Specifies whether to allow accounts that have no expiration set. If this is set to
Defines the type of role.
Guest Access Sponsor—Limited-functionality role to allow helpdesk or reception desk staff to grant wireless access to temporary personnel. This role only has access to the defined top folder.
and groups contained by the Top folder. The top folder and its subfolders must contain all of the devices in any of the groups it can view.
NOTE: AirWave enables user roles to be created with access to folders within multiple branches of the overall hierarchy. This feature assists non­administrator users who support a subset of accounts or sites within a single AirWave deployment, such as help desk or IT staff. User roles can be restricted to multiple folders within the overall hierarchy, even if they do not share the same top-level folder. Non-administrator users are only able to see data and users for devices within their assigned subset of folders.
No, then enter the amount of time that can elapse before the access expires.
Allow sponsor to change sponsorship user name
Custom Message
No Specifies whether a sponsor can change the sponsorship user name.
none A custom message can also be included.

Configuring the User Login and Authentication

AirWave uses session-based authentication with a configurable login message and idle timeout. As an option, you can set AirWave to use an external user database to simplify password management for AirWave administrators and users.
This section contains the following procedures to be followed in AMP Setup > Authentication:
l "Configuring the User Login" on page44
l "Configuring Whitelists" on page 44
l Setting up Certificate Authentication
AirWave 8.2.10.1 | User Guide Configuring AirWave | 43
l "Setting Up Single Sign-On" on page 45
l "Specifying the Authentication Priority" on page 45
l "Configuring RADIUS Authentication and Authorization" on page 46
l "Integrating a RADIUS Accounting Server" on page 45
l "Configuring TACACS+ Authentication" on page48
l "Configuring LDAP Authentication and Authorization" on page 50
Configuring the User Login
Follow these steps to configure the login banner message, idle timeout, and persistent cookies which are session­based:
To configure user login:
1. Navigate to AMP Setup > Authentication > Login Configuration.
2. To clear information such as user logins, select No for the "Use Persistent Cookies" option.
3. Enter the length of time that passes before AirWave ends an idle user session. 5 minutes is the lowest idle setting.
Figure 8: Example Settings for the Login Configuration Page
4. In the Login Message and Click Through Agreement fields, type the login banner message and login agreement message that will display before the user logs in to AirWave, requiring the user to accept the terms of usage before granting full access to the WebUI.
5. Click Save at the bottom of the page.
Configuring Whitelists
By adding subnets to a whitelist, you can limit AirWave access to users on a list of trusted subnets.
Do not delete the current client network from the AirWave whitelist, or you might lose access to the AirWave WebUI.
To configure the whitelist:
1. Navigate to AMP Setup > Authentication.
2. In the Login Configuration section, select Yes for the "Enable AMP Whitelist" option. When you enable this functionality, AirWave displays the whitelist with the current client network as the first entry.
44 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Figure 9: Enabling Whitelists
3. Enter additional subnets, one subnet per line.
4. Scroll down the page, then click Save.
Setting Up Single Sign-On
On the AMP Setup > Authentication page, administrators can set up single sign-on (SSO) for users that have access to AirWave controllers. This allows users to log in to AirWave and use the IP Address or Quick Links hypertext links across AirWave to access the controller’s WebUI without having to enter credentials again. The links the user can select to access a controller can be found on the Devices > Monitor page in the Device Info section, and on device list pages.
Perform the following steps to enable this feature for this AirWave.
1. Locate the Single Sign-On section in AMP Setup > Authentication.
2. In the Enable Single Sign-On field, select Yes.
3. Select Save if you are finished or follow the next procedure to specify the authentication priority.
Specifying the Authentication Priority
To specify the authentication priority for this AirWave server, locate the Authentication Priority section in AMP Setup > Authentication, and select either Local or Remote as the priority.
If Local is selected, then remote will be attempted if a user is not available. If Remote is selected, then the local database is searched if remote authentication fails. The order of remote authentication is RADIUS first, followed by TACACS, and finally LDAP.
Select Save if you are finished or follow the next procedure to configure RADIUS, TACACS+, and LDAP Authentication options.
Integrating a RADIUS Accounting Server
AirWave checks the local user name and password before checking with the RADIUS server. If the user is found locally, the local password and role apply. When using RADIUS, it’s not necessary or recommended to define users on the AirWave server. The only recommended user is the backup admin, in case the RADIUS server goes down.
Optionally, you can configure RADIUS server accounting on AMP Setup > RADIUS Accounting. This capability is not required for basic AirWave operation, but can increase the user-friendliness of AirWave administration in large networks. Figure 10 illustrates the settings of this optional configuration interface.
Perform the following steps and configurations to enable AirWave to receive accounting records from a separate RADIUS server. Figure 10 illustrates the display of RADIUS accounting clients already configured.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 45
Figure 10: AMP Setup > RADIUS Accounting Page Illustration
1. To define a the RADIUS authentication server or network, browse to the AMP Setup > RADIUS Accounting page, select Add, and provide the information in Table 20.
Table 20: AMP Setup > Radius Accounting Fields and Default Values for LDAP Authentication
Setting Default Description
IP/Network None Specify the IP address for the authentication server if you only want to accept
packets from one device. To accept packets from an entire network enter the IP/Netmask of the network (for example, 10.51.0.0/24).
Nickname None Sets a user-defined name for the authentication server.
Shared Secret (Confirm)
None Sets the Shared Secret that is used to establish communication between
AirWave and the RADIUS authentication server.
2. Click Add to save your settings.
Configuring RADIUS Authentication and Authorization
For RADIUS capability, you must configure the IP/Hostname of the RADIUS server, the TCP port, and the server shared secret. Perform these steps to configure RADIUS authentication:
1. Go to the AMP Setup > Authentication page. This page displays current status of RADIUS. Figure 11 illustrates this page.
46 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Figure 11: AMP Setup > Authentication Page Illustration for RADIUS
2. Select No to disable or Yes to enable RADIUS authentication. If you select Yes, several new fields appear. Complete the fields described in Table 21.
Table 21: AMP Setup > Authentication Fields and Default Values for RADIUS Authentication
Field Default Description
Primary Server Hostname/IP Address
Primary Server Port (1-65535)
Primary Server Secret N/A Specify and confirm the primary shared secret for the primary RADIUS
Confirm Primary Server Secret
Secondary Server Hostname/IP Address
Secondary Server Port (1-65535)
N/A Enter the IP address or the hostname of the primary RADIUS server.
1812 Enter the TCP port for the primary RADIUS server.
server.
N/A Re-enter the primary server secret.
N/A Enter the IP address or the hostname of the secondary RADIUS server.
1812 Enter the TCP port for the secondary RADIUS server.
Secondary Server Secret
Confirm Secondary Server Secret
AirWave 8.2.10.1 | User Guide Configuring AirWave | 47
N/A Enter the shared secret for the secondary RADIUS server.
N/A Re-enter the secondary server secret.
Table 21: AMP Setup > Authentication Fields and Default Values for RADIUS Authentication (Continued)
Field Default Description
Authentication Method PAP Select one of the following authentication methods:
l PAP l PEAP-MSCHAPv2
If you use the PEAP-MSCHAPv2 authentication method with the default "Read-Only Monitoring and Auditing" user role, note that the name of this role has been slightly modified in AirWave 8.2.3 to allow support the PEAP-MSCHAPv2 authentication method: the ampersand (&)symbol has been changed to the word and.
l Role Name in 8.2.2.x and earlier releases: Read-Only Monitoring
& Auditing
l Role Name in AirWave 8.2.3: Read-Only Monitoring and Auditing
If you used the Read-Only Monitoring & Auditing user role prior to upgrading to AirWave 8.2.3 or later releases, you must modify the user role name on the RADIUS server to ensure that the user role name on the RADIUS server exactly matches the user role name in AirWave.
3. Select Save to retain these configurations, and continue with additional steps in the next procedure.
Configuring TACACS+ Authentication
For TACACS+ capability, you must configure the IP/Hostname of the TACACS+ server, the TCP port, and the server shared secret. This TACACS+ configuration is for AirWave users and does not affect APs or users logging into APs.
1. Go to the AMP Setup > Authentication page. This page displays current status of TACACS+. Figure 12 illustrates this page when neither TACACS+, LDAP, nor RADIUS authentication is enabled in AirWave.
Figure 12: AMP Setup > Authentication Page Illustration for TACACS+
2. Select No to disable or Yes to enable TACACS+ authentication. If you select Yes, several new fields appear. Complete the fields described in Table 22.
48 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Table 22: AMP Setup > Authentication Fields and Default Values for TACACS+ Authentication
Field Default Description
Primary Server Hostname/IP Address
Primary Server Port (1-65535) 49 Enter the port for the primary TACACS+ server.
Primary Server Secret N/A Specify and confirm the primary shared secret for the primary
Confirm Primary Server Secret
Secondary Server Hostname/IP Address
Secondary Server Port (1-
65535)
Secondary Server Secret N/A Enter the shared secret for the secondary TACACS+ server.
Confirm Secondary Server Secret
N/A Enter the IP address or the hostname of the primary TACACS+
server.
TACACS+ server.
N/A Re-enter the primary server secret.
N/A Enter the IP address or hostname of the secondary TACACS+
server.
49 Enter the port for the secondary TACACS+ server.
N/A Re-enter the secondary server secret.
3. Select Save and continue with additional steps.
Configuring Cisco ACS to Work with AirWave
To configure Cisco ACS to work with AirWave, you must define a new service named AMP that uses HTTPS on the ACS server.
1. The AMP HTTPS service is added to the TACACS+ (Cisco) interface under the Interface Configuration tab.
2. Select a checkbox for a new service.
3. Enter AMP in the service column and https in the protocol column.
4. Select Save.
5. Edit the existing groups or users in TACACS to use the AMP service and define a role for the group or user.
l The role defined on the Group Setup page in ACS must match the exact name of the role defined on the
AMP Setup > Roles page.
n The defined roleshould use the format: role=<name_of_AMP_role>. For example role=DormMonitoring.
As with routers and switches, AirWave does not need to know user names.
6. AirWave also needs to be configured as an AAA client.
l On the Network Configuration page, select Add Entry.
l Enter the IP address of AirWave as the AAA Client IP Address.
l The secret should be the same value that was entered on the AMP Setup > TACACS+ page.
7. Select TACACS+ (Cisco IOS) in the Authenticate Using drop down menu and select submit + restart.
AirWave checks the local user name and password store before checking with the TACACS+ server. If the user is found locally, the local password and local role apply. When using TACACS+, it is not necessary or recommended to define users on the AirWave server. The only recommended user is the backup administrator, in the event that the TACACS+ server goes down.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 49
Configuring LDAP Authentication and Authorization
LDAP (Lightweight Directory Access Protocol) provides users with a way of accessing and maintaining distributed directory information services over a network. When LDAP is enabled, a client can begin a session by authenticating against an LDAP server which by default is on TCP port 389.
Perform these steps to configure LDAP authentication:
1. Go to the AMP Setup> Authentication page.
2. Select the Yes radio button to enable LDAP authentication and authorization. Once enabled, the available LDAP configuration options will display. Figure 13 illustrates this page.
Figure 13: AMP Setup > Authentication Page Illustration for LDAP
3. Complete the fields described in Table 23.
50 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Table 23: AMP Setup > Authentication Fields and Default Values for LDAP Authentication
Field Default Description
Support Deprecated Ciphers
Primary Server Hostname/IP Address
Disabled By default, AirWave supports the following strong ciphers.
l DHE-RSA-AES128-SHA l DHE-RSA-AES256-SHA l DHE-RSA-AES128-SHA256 l DHE-RSA-AES256-SHA256 l ECDHE-ECDSA-AES128-SHA256 l ECDHE-ECDSA-AES256-SHA384 l ECDHE-ECDSA-AES128-GCM-SHA256 l ECDHE-ECDSA-AES256-GCM-SHA384
Enable this Support Deprecated Ciphers option to allow AirWave to also use following legacy ciphers:
l AES128-SHA l AES256-SHA l DES-CBC3-SHA l DHE-DSS-AES128-SHA l DHE-DSS-AES256-SHA l EDH-DSS-DES-CBC3-SHA l EDH-RSA-DES-CBC3-SHA l KRB5-DES-CBC3-MD5 l KRB5-DES-CBC3-SHA
NOTE: AirWave does not recommend using legacy ciphers for an extended length of time.
none Enter the IP address or the hostname of the primary LDAP
server.
Primary Server Port (1-65535)
Secondary Server Hostname/IP Address
389 Enter the port where the LDAP server is listening. The default
port is 389.
none Optionally enter the IP address or hostname of the
secondary LDAP server. This server will be contacted in the event that the primary LDAP server is not reachable.
Secondary Server Port (1-65535)
389 Enter the port where the LDAP service is listening on the
secondary LDAP server. The default port is 389.
Connection Type clear-text Specify one of the following connection types AirWave and
the LDAP server:
l clear-text results in unencrypted communication. l ldap-s results in communication over SSL. l start-tls uses certificates to initiate encrypted
communication.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 51
Table 23: AMP Setup > Authentication Fields and Default Values for LDAP Authentication (Continued)
Field Default Description
View Server Certificate
none If Connection Type is configured as start-tls, then also
specify whether the start-tls connection type uses a certificate.
l none - The server may provide a certificate, but it will not
be verified. This may mean that you are connected to the wrong server.
l optional - Verifies only when the servers offers a valid
certificate.
l require - The server must provide a valid certificate.
A valid LDAP Server CA Certificate must be provided in case of optional or require. Certificates uploaded on the Device Setup > Certificates page with a type of Intermediate CA or Trusted CA are listed in the drop down for LDAP Server CA Certificate.
LDAP Server CA Certificate
none Specify the LDAP server certificate to use to initiate
encrypted communication. Only certificates that have been uploaded with a type of Intermediate CA or Trusted CA will appear in this drop down.
NOTE: This LDAP Server CA Certificate drop down menu only appears if View Server Certificate is specified as optional or require.
Bind DN none Specify the Distinguished Name (DN) of the administrator
account, such as ‘cn=admin01,cn=admin,dn=domain,dn=com’. Note that for the Active directory, the bind DN can also be in the administrator@domain format (for example, administrator@acme.com).
Bind Password none Specify the bind DN account password.
Confirm Bind
none Re-enter the bind password.
Password
Base DN none The DN of the node in your directory tree from which to start
searching for records. Generally, this would be the node that contains all the users who may access AirWave, for example cn=users,dc=domain,dc=com.
Key Attribute sAMAccountName The LDAP attribute that identifies the user, such as
‘sAMAccountName’ for Active Directory
Role Attribute none The LDAP attribute that contains the AirWave role. Users
who log in to AirWave using this LDAP authentication will be granted permissions based on this role. Refer to Configuring
AirWave User Roles for more information about AirWave
User Roles.
Filter (objectclass=*) This option limits the object classes in which the key,role
attributes would be searched.
52 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Table 23: AMP Setup > Authentication Fields and Default Values for LDAP Authentication (Continued)
Field Default Description
Add New LDAP Rule none The LDAP rule parameters are
Operation,Value
LDAP rules, rules are processed in order based on the rule position value, so the position you assign to the LDAP rule represents the order in which the LDAP rule is applied to determine the AirWave role. LDAP rules can only be configured and applied after LDAP authentication is enabled. The LDAP rules are similar to the rules used by the controller to derive the AirWave role.
, and
AirWave
Position,Role Attribute
role. If you create multiple
,
4. Select Save to retain these configurations, and continue with additional steps in the next procedure.
What Next?
l Go to additional subtabs in AMP Setup to continue additional setup configurations.
l Complete the required configurations in this chapter before proceeding. Aruba support remains available to
you for any phase of AirWave configuration.

Enabling AirWave to Manage Your Devices

After you install AirWave, configure the communication settings that enable AirWave to monitor and manage your devices and download firmware as described in the following sections:
l "Configuring Communication Settings for Newly Discovered Devices" on page 53
l "Uploading Firmware and Files" on page 54
Configuring Communication Settings for Newly Discovered Devices
You can configure AirWave to communicate with your devices by defining default shared secrets and SNMP settings. In order for AirWave to configure the devices, community strings and shared secrets must have read­write access.
To modify the credentials for existing devices, go to Devices > Manage, or go to Devices > List and click Modify Devices.
To configure communication settings for newly discovered devices:
1. Go to Device Setup > Communication page, then scroll down the page.
2. Enter the following SNMPsettings:
l SNMP Timeout. The length of time (three to 60 seconds) that AirWave waits for a response from a device
after sending the device an SNMP request. The default time is three seconds.
l SNMP Retries. The number of times (one to 40) that AirWave polls a device when the device doesn't
respond to an SNMPrequest. Optionally, AirWave uses the number of times set for the device group by the Missed SNMP Poll Threshold option. AirWave will classify the device as being down if the device doesn't respond after reaching this number. If an SNMP library has a limit of 20 retries, AirWave will stop at 20. The default is three times.
3. Click Add, then enter the following information for the SNMPv3 user:
l Username. User name of the SNMPv3 user, as it is configured on the controller. The SNMP Inform
receiver will restart when users are changed or added to the controller.
l Auth Protocol. MD5 or SHA. The default setting is SHA.
l Auth Passphrase. Authentication and privilege protocol passphrase for the SNMPv3 user, as it is
configured on the controller. Re-enter the passphrase.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 53
l Priv Protocol. The symmetric-key algorithm used to encrypt data, Data Encryption Standard (DES) or
Advanced Encryption Standard (AES). The default standard is DES.
l Priv Protocol Passphrase. Privilege protocol passphrase for the SNMPv3 user, as it is configured on the
controller. Re-enter the passphrase.
4. For the Telnet/SSH Timeout option, enter the timeout period (zero to 600 seconds) to apply when performing Telnet and SSH commands. The default timeout is 10 seconds.
5. For the HTTP Timeout option, enter the timeout period (three to 120 seconds) used when running an HTTP discovery scan. The default timeout is five seconds.
6. For the Attempt to ping devices that were unreachable via SNMP option, select No if ICMP is disabled on the network. By default, this option is enabled. When there are more than 100 devices, and many are unreachable by ICMP, the timeouts will impede network performance, and you should turn off this option.
7. For Symbol 4131 and Cisco IOS devices that don't have SNMPinitialized, select one of the following options:
n Do not modify SNMP settings. AirWave will not modify any SNMPsettings for these devices when you
select this option. By default, this option is enabled.
n Enable read-write SNMP. AirWave will manage these devices using SNMP when you select this option.
By default, this option is disabled.
Uploading Firmware and Files
AirWave automates firmware distribution to the devices on your network. Once you have downloaded the firmware from the vendor, you can upload the firmware to AirWave for distribution to devices from the Upload Firmware & Files page. After you upload the firmware, AirWave lists them in the Firmware Files table on this page.
For more information about specifying firmware versions for devices in a group, see "Specifying the Minimum
Firmware Version for Device Groups" on page 124.
Table 24 below itemizes the contents, settings, and default values for the Upload Firmware & Files page.
Table 24: Device Setup > Upload Firmware & Files Fields and Default Values
Setting Default Description
Type Aruba Networks
Controller(any model)
Owner Role None Displays the user role that uploaded the firmware file. This is
Description None Displays a user-configurable text description of the firmware
Server Protocol None Displays the file transfer protocol by which the firmware file
Use Group File Server
None If enabled, displays the name of the file server supporting the
Displays a drop-down list of the primary AP makes and models that AirWave supports with automated firmware distribution.
the role that has access to the file when an upgrade is attempted.
file.
was obtained from the server. This can be FTP, TFTP, HTTP, HTTPS. or SCP.
group.
54 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Table 24: Device Setup > Upload Firmware & Files Fields and Default Values (Continued)
Setting Default Description
Firmware Filename
Firmware MD5 Checksum
Firmware File Size
Firmware Version
HTML Filename None Supporting HTML, displays the name of the file that was
HTML MD5 Checksum
None Displays the name of the file that was uploaded to AirWave
and to be transferred to an AP when the file is used in an upgrade.
None Displays the MD5 checksum of the file after it was uploaded to
AirWave. The MD5 checksum is used to verify that the file was uploaded to AirWave without issue. The checksum should match the checksum of the file before it was uploaded.
None Displays the size of the firmware file in bytes.
None Displays the firmware version number. This is a user-
configurable field.
uploaded to AirWave and to be transferred to an AP when the file is used in an upgrade.
None Supporting HTML, displays the MD5 checksum of the file after
it was uploaded to AirWave. The MD5 checksum is used to verify that the file was uploaded to AirWave without issue. The checksum should match the checksum of the file before it was uploaded.
HTML File Size None Supporting HTML, displays the size of the file in bytes.
HTML Version None Supporting HTML, displays the version of HTML used for file
transfer.
Desired Firmware File for Specified Groups
None The firmware file is set as the desired firmware version on the
Groups > Firmware Files page of the specified groups. You cannot delete a firmware file that is set as the desired firmware version for a group.
Loading Firmware Files onto AirWave
Perform the following steps to load a device firmware file onto AirWave:
1. Go to the Device Setup > Upload Firmware & Files page.
2. Select Add by the New Firmware File option. The Add Firmware File page appears. Figure 14 illustrates this page.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 55
Figure 14: Device Setup > Upload Firmware and Files > Add Page
3. Select the Supported Firmware Versions and Features link to view supported firmware versions.
Unsupported and untested firmware may cause device mismatches and other problems. Please contact Aruba support before installing non-certified firmware.
4. Enter the appropriate information and select Add. The file uploads to AirWave and once complete, this file appears on the Device Setup > Upload Firmware & Files page. This file also appears on additional pages that display firmware files (such as the Group > Firmware pageand on individual Devices > Manage pages).
5. You can also import a CSV list of groups and their external TFTP firmware servers. Table 25 itemizes the settings of this page.
Table 25: Supported Firmware Versions and Features Fields and Default Values
Setting Default Description
Type Aruba Networks
controller
Firmware Version None Provides a user-configurable field to specify the firmware
Description None Provides a user-configurable text description of the
Upload firmware files (and use built-in firmware)
Use an external firmware file server
Enabled Allows you to select a firmware from your local machine
N/A You can also choose to assign the external TFTP server on
Indicates the firmware file is used with the specified type.
With selection of some types, particularly Cisco controllers, you can specify the boot software version.
version number. This open appears if Use an external firmware file server is enabled.
firmware file.
and upload it via TFTP or FTP.
a per-group basis. If you select this option, you must enter the IP address on the Groups > Firmware page. Complete the Firmware File Server IP Address field.
Server Protocol TFTP Specify whether to use a built-in TFTP server or FTP, HTTP,
or HTTPS to upload a firmware file. TFTP is recommended. If you select FTP, AirWave uses an anonymous user for file upload.
56 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Table 25: Supported Firmware Versions and Features Fields and Default Values (Continued)
Setting Default Description
Use Group File Server
Firmware File Server IP Address
Firmware Filename
HTMLFilename None Browse to the HTMLfile that will accompany the firmware
Patch Filename None If you selected Symbol WS5100 as the Firmware File Type,
Boot Software Version
Disabled If you opt to use an external firmware file server, this
additional option appears. This setting instructs AirWave to use the server that is associated with the group instead of defining a server.
None Provides the IP address of the External TFTP Server (like
SolarWinds) used for the firmware upgrade. This option displays when the user selects the Use an external firmware file option.
None Enter the name of the firmware file that needs to be
uploaded. Ensure that the firmware file is in the TFTP root directory. If you are using a non-external server, you select Choose File to find your local copy of the file.
upload. Note that this field is only available for certain Firmware File Types (for example, Symbol 4121).
and you are upgrading from version 3.0 to 3.1, then browse to the path where the patch file is located.
None If you specified a Cisco WLC device as the Firmware File
Type, then also enter the boot software version.
Additional fields may appear for multiple device types. AirWave prompts you for additional firmware information as required. For example, Intel and Symbol distribute their firmware in two separate files: an image file and an HTML file. Both files must be uploaded to AirWave for the firmware to be distributed successfully via AirWave.
6. Select Add to import the firmware file.
Deleting Firmware Files
To delete a firmware file that has already been uploaded to AirWave, return to the Device Setup > Upload Firmware & Files page, select the checkbox for the firmware file and select Delete.
A firmware file may not be deleted if it is the desired version for a group. Use the Group > Firmware page to investigate this potential setting and status.
Adding Web Auth Bundles
Web authentication bundles are configuration files that support Cisco WLC wireless LAN controllers. This procedure requires that you have local or network access to a Web Auth configuration file for Cisco WLC devices.
To add or edit a Web Authentication Bundle:
1. Go to the Device Setup > Upload Firmware & Files page.
2. Click Add by the New Web Auth Bundle option. This page displays any existing web authentication bundles that are currently configured in AirWave.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 57
3. Select Add to create a new bundle (see Figure 15), or select the pencil icon next to an existing bundle to edit. You may also delete a bundle by selecting that bundle with the checkbox, and selecting Delete.
Figure 15: Adding a Web Auth Bundle
4. Enter a descriptive label in the description field. This is the label used to identify and track web authentication bundles on the page.
5. Enter the path and file name of the web authentication bundle, or select Choose File to locate the file.
6. Select Add to complete the web authentication bundle creation, or Save if replacing a previous Web Auth configuration file, or Cancel to abort the Web Auth integration.
For additional information about using web authentication bundles with Cisco WLC controllers, refer to the
Wireless LAN controller Web Authentication Configuration Example, Document ID: 69340 on Cisco’s Web site.
Adding a New Captive Portal Logo
If you want to use a company logo for a guest account that uses a captive portal for network authentication, you upload the logo to AirWave and then set a group of devices to use the captive portal logo.
To upload a company logo image file:
1. Click Add at the bottom of the Upload Firmware & Files page next to New Captive Portal Logo.
Figure 16: Adding a Captive Portal Logo
2. Enter a logo description.
3. Click Choose File to select the image file, then click Open.
4. Click Add. AirWave displays the newly added imagefile in the Firmware Files table.
Adding a New DRT File
You can use the downloadable regulatory table (DRT) to update country domain options without upgrading the ArubaOS software version on an AP.
To add a DRT fileto AirWave:
1. Click Add at the bottom of the Upload Firmware & Files page next to New DRT File.
58 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Figure 17: Adding a DRT File
2. Enter a DRT file description.
3. Click Choose File to select the DRT file, then click Open.
4. Click Add. AirWave displays the newly added DRT file in the Firmware Files table.

Managing Certificates

After installing AirWave, you can install a new SSL certificate, or generate a CSR to install a signed certificate from the AMP CLI. Some certificate management tasks can only be done using the AMP CLI whileothers can be done using the WebUI, and the tasks are described in the following topics:
l "Uploading Certificates" on page 59
l "Changing the SSL Certificate for Aruba Instant" on page 61
l "Generating Certificate Signing Requests (CSRs) " on page 61
l "Setting Up Certificate Authentication" on page 62
l "Disabling the Certificate Authentication Requirement" on page 63
l "Installing Signed Certificates" on page 64
l "Regenerating Self-Signed Certificates" on page 64
l "Adding DTLS Certificates" on page 65
l "Configuring Certificate Revocation Lists (CRLs)" on page 65
Uploading Certificates
AirWave can help you manage your certificates when you upload them to the AirWave server. AirWave verifies basic certificate information before accepting the certificate and pushing it to a device.
WebUI
You can upload the following certificates from the WebUI:
l CRL
l Intermediate Certificate Authority (CA)
l Online Certificate Status Protocol (OCSP) Responder
l OCSP Signer
l Public certificates
l Server certificates
l Trusted CA certificates
l Captive Portal (CP) certificates
AirWave 8.2.10.1 | User Guide Configuring AirWave | 59
After you upload a certificate to AirWave, the certificate file becomes available on additional pages where you can
select certificate files, including AMP Setup > Authentication and Groups > Basic > Certificates. For self-
signed certificates, refer to "Installing Signed Certificates" on page 64.
For example, Figure 18 shows a certificate named IAP CPCert being added. You can later choose this certificate for an IAP by navigating to the Group > Basic page for the device group that contains IAPs.
To add a certificate:
1. Go to the Device Setup > Certificates, then click Add.
Figure 18: Adding a Captive Portal Certificate
2. Enter a name for the certificate.
3. Click Choose File to find your local copy of the certificate.
4. Enter the passphrase, if any, and renter the passphrase.
5. Select the format that matches the certificate file.
6. Select the certificate type.
7. Click Add.
AMP CLI
1. From the AMP CLI, enter 3-4 to open the Configuration > Certificates menu.
Figure 19: Opening the Certificates Menu
2. Enter 1 to open the Add SSL Certificate menu.
60 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Figure 20: Opening the Add SSLCertificate Menu
3. Follow the prompt to install the SSL certificate on your AirWave server. The signed certificate should be in PKCS12 format with a *.pfx or *.p12 file extension.
Changing the SSL Certificate for Aruba Instant
In order to use certificate-based authentication, you must upload a certificate issued from a supported certificate authority (CA) to the AMP server or else the SSL handshake will fail. You must also configure the AMP IP address on the Instant AP with a domain name and not an IP address. For more information about security methods for Aruba Instant, see "Aruba Instant Settings" on page 20.
AirWave supports the following trusted CAs:
l Chain 1: Trusted Root CA: C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External
CA Root Intermediate CA: C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO High-Assurance Secure Server CA
l Chain 2: Trusted Root CA: C=US, O=GeoTrust Inc., CN=GeoTrust Global CA Intermediate CA: Subject: C=US,
O=Google Inc, CN=Google Internet Authority G2
l Chain 3: Trusted Root CA: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 2006 VeriSign, Inc. -
For authorized use only, CN=VeriSign Class 3 Public Primary Certification Authority - G5 Intermediate CA: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=Terms of use at https://www.verisign.com/rpa (c)10, CN=VeriSign Class 3 Secure Server CA - G3
l Root CA: Trusted Root CA: C=US, O=Equifax, OU=Equifax Secure Certificate Authority
To change the certificate for Aruba Instant device authentication:
1. 1. Go to AMP Setup > General, then scroll down to Aruba Instant Options.
2. Select PSK and Certificate or Certificate only.
Figure 21: Selecting a Certificate Authentication Option
3. Click Change to find the certificate file on the AMP server. The certificate should be in PEM format and with a private key.
4. Click Upload.
Generating Certificate Signing Requests (CSRs)
To generate the CSR to request a certificate from AirWave:
1. From the AMP CLI, enter 3-4-2 to open the Configuration > Certificates > Generate Certificate Signing Request menu.
2. Enter 2 to generate a CSR.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 61
Figure 22: Figure 22: Opening the Generate Certificate Signing Request Menu
3. Follow the prompts to enter the data associated with the organization:
a. 2-letter country code
b. State or province
c. Locality or city
d. Organization or company
e. Organization unit or department
f. Common name or server host name
g. Email address
h. Fully qualified DNS name
i. IP addresses
Figure 23: Entering Certificate Data
4. Enter a to accept the changes and save the data.
Setting Up Certificate Authentication
On the AMP Setup > Authentication page, you can specify whether to use two-factor authentication. With two-factor authentication, the AirWave user name and password and a PEM-encoded certificate bundle is required. When using the Smart Card or tokencommon access card (CAC), AirWave will prompt you to enter the PIN.
62 | Configuring AirWave AirWave 8.2.10.1 | User Guide
This feature must be enabled per role in AMP Setup > Roles.
When entering the PEM bundle, you must install every member in the certificate chain provided by the SSL vendor in order for smart card or tokenCAC authentication to work.
To set up certificate authentication:
1. Go to AMP Setup > Authentication.
2. Select Yes to enable certificate authentication. Once enabled, certificate authentication options will display.
3. Select Yes to turn on the Use Two-factor Authentication option.
4. Enter your PEM certificate bundle in the text field. For example, in Figure 24, two intermediate certificates are bundled with the two root certificates, one being at the top of the chain.
Figure 24: Two-Factor Authentication Configuration Example
5. Scroll to the bottom of the page, then click Save.
Disabling the Certificate Authentication Requirement
You might want to configure local databaseauthentication, and in order to do so you should turn off the certificate authentication requirement and add your PEM bundle. Although certificate authentication is not required when disabled, certificate authentication, or OCSP validation, will occur for users with certificates.
To disable certificate authentication:
1. From the WebUI, go to AMP Setup > Authentication, select Yes to enable certificate authentication.
2. For the Require Certificate Authentication option, select No.
3. Enter your PEM certificate bundle in the text field.
Figure 25: Entering the PEM Certificate Bundle
4. Scroll down, then click Save.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 63
Installing Signed Certificates
Before you install the signed certificate, you must export the CSR created in "Generating Certificate Signing
Requests (CSRs) " on page 61 to a third-party certificate authority (CA) and then upload the returned certificate
to the AirWave server.
To install the signed certificate:
1. From the AMP CLI, enter 3-4-3 to open the Configuration > Certificates > Install Signed Certificate menu.
Figure 26: Opening the Install Signed Certificate Menu
2. Follow the prompt to select the certificate, then press Enter. The signed certificate should be PEM-encoded with a *.crt file extension.
Regenerating Self-Signed Certificates
AirWave automatically generates a self-signed certificate during installation and when the host name is changed from the CLI. If you need to regenerate the self-signed certificate for any reason, you can regenerate the self­signed certificate on AMP using the CLI.
To regenerate the self-signed certificate:
1. From the AMP CLI, enter 3-4-4 to open the Configuration > Certificates > Regenerate Self-Signed Certificate menu.
Figure 27: Opening the Regenerate Self-Signed Certificate Menu
2. Enter y when prompted.
64 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Adding DTLS Certificates
DTLS certificates can be used to encrypt secure AMON traffic on your AMP server.
To install the DTLS certificate:
1. From the AMP CLI, enter 3-4-5 to open the Configuration > Certificates > Add DTLS Certificate menu.
Figure 28: Opening the Add DTLS Certificate Menu
2. Follow the prompt to select the certificate, then press Enter. The signed certificate should be in PKCS12 format with a *.pfx or *.p12 file extension and contain the private key, root certificate, and intermediate certificates.
Configuring Certificate Revocation Lists (CRLs)
When you configure a CRL, AirWave checks to see if the certificate sent by the requesting device is revoked. You could also use a CRL to skip the OCSP check when an OCSP server is not accessible to perform certificate validation.
To configure the CRL:
1. From the AMP CLI, enter 3-4-7 to open the Configuration > Certificates > CRL menu.
Figure 29: Opening the CRL Menu
2. Enter 1 to make CRL required, then follow the prompts to run the function and return to the CRL menu.
3. Enter 2 to configure a CRL distribution URL, then follow the prompt to add the CRL distribution URL.
4. Enter 3 to add a CRL files and follow the prompt to add the file.
5. Enter the password for the AMP server.
6. Click Update to save the configuration.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 65

Setting Up Device Types

On the AMP Setup > Device Type Setup page, you can define how the device types displayed for users on your network is calculated from available data. The first matching property is used. These rules cannot be edited or deleted, but only reordered or enabled.
You can change the priority order of rules by clicking on a row and dragging and dropping it into a new location, as shown in Figure 30.
Select the checkbox under the Enabled column to turn on device setup rules.
Refer to "Monitoring Wired and Wireless Clients" on page205 for more information on the Device Type column that appears in Clients list tables.
Figure 30: AMP Setup > Device Type Setup Page Illustration

Configuring Cisco WLSE and WLSE Rogue Scanning

The Cisco Wireless LAN Solution Engine (WLSE) includes rogue scanning functions that AirWave supports. This section contains the following topics and procedures, and several of these sections have additional sub­procedures:
l "Introduction to Cisco WLSE" on page 66
l "Initial WLSE Configuration" on page 67
l "Configuring IOS APs for WDS Participation" on page 69
l "Configuring ACS for WDS Authentication" on page 69
l "Configuring Cisco WLSE Rogue Scanning" on page 70
You must enter one or more CiscoWorks WLSE hosts to bepolled for discovery of Cisco devices and rogue AP information.

Introduction to Cisco WLSE

Cisco WLSE functions as an integral part of the Cisco Structured Wireless-Aware Network (SWAN) architecture, which includes IOS Access Points, a Wireless Domain Service, an Access Control Server, and a WLSE. In order for AirWave to obtain Rogue AP information from the WLSE, all SWAN components must be properly configured.
Table 26 describes these components.
66 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Table 26: Cisco SWAN Architecture Components
SWAN
Requirements
Component
WDS (Wireless Domain Services)
WLSE (Wireless LAN Solution Engine)
ACS (Access Control Server)
APs
l WDS Name l Primary and backup IP address for WDS devices (IOS AP or WLSM) l WDS Credentials APs within WDS Group
NOTE: WDS can be either a WLSM or an IOS AP. WLSM (WDS) can control up to 250 access points. AP (WDS) can control up to 30 access points.
l IP Address l Login
l IP Address l Login
l APs within WDS Group

Initial WLSE Configuration

Use the following general procedures to configure and deploy a WLSE device in AirWave:
l "Adding an ACS Server for WLSE" on page 67
l "Enabling Rogue Alerts for Cisco WLSE" on page 67
l "Configuring WLSE to Communicate with APs" on page 67
l "Discovering Devices" on page 68
l "Managing Devices" on page 68
l "Inventory Reporting" on page 68
l "Defining Access" on page68
l "Grouping" on page 68
Adding an ACS Server for WLSE
1. Go to the Devices > Discover > AAA Server page.
2. Select New from the drop-down list.
3. Enter the server name, server port (default 2002), user name, password, and a secret.
4. Select Save.
Enabling Rogue Alerts for Cisco WLSE
1. Go to the Faults > Network Wide Settings > Rogue AP Detection page.
2. Select the Enable.
3. Select Apply.
Additional information about rogue devicedetection is available in "Configuring Cisco WLSE Rogue Scanning" on
page70.
Configuring WLSE to Communicate with APs
1. Go to the Device Setup > Discover page.
2. Configure SNMP Information.
3. Configure HTTP Information.
4. Configure Telnet/SSH Credentials
AirWave 8.2.10.1 | User Guide Configuring AirWave | 67
5. Configure HTTP ports for IOS access points.
6. Configure WLCCP credentials.
7. Configure AAA information.
Discovering Devices
The following three methods can be used to discover access points within WLSE:
l Using Cisco Discovery Protocol (CDP)
l Importing from a file
l Importing from CiscoWorks
Perform these steps to discover access points.
1. Go to the Device > Managed Devices > Discovery Wizard page.
2. Import devices from a file.
3. Import devices from Cisco Works.
4. Import using CDP.
Managing Devices
Prior to enabling radio resource management on IOS access points, the access points must be under WLSE management.
AirWave becomes the primary management/monitoring vehicle for IOS access points, but for AirWave to gather Rogue information, the WLSE must be an NMS manager to the APs.
Use these pages to make such configurations:
1. Go to Device > Discover > Advanced Options.
2. Select the method to bring APs into management Auto, or specify via filter.
Inventory Reporting
When new devices are managed, the WLSE generates an inventory report detailing the new APs. AirWave accesses the inventory report via the SOAP API to auto-discover access points. This is an optional step to enable another form of AP discovery in addition to AirWave, CDP, SNMP scanning, and HTTP scanning discovery for Cisco IOS access points. Perform these steps for inventory reporting.
1. Go to Devices > Inventory > Run Inventory.
2. Run Inventory executes immediately between WLSE polling cycles.
Defining Access
AirWave requires System Admin access to WLSE. Use these pages to make these configurations.
1. Go to Administration > User Admin.
2. Configure Role and User.
Grouping
It’s much easier to generate reports or faults if APs are grouped in WLSE. Use these pages to make such configurations.
1. Go to Devices > Group Management.
2. Configure Role and User.
68 | Configuring AirWave AirWave 8.2.10.1 | User Guide

Configuring IOS APs for WDS Participation

IOS APs (1100, 1200) can function in three roles within SWAN:
l Primary WDS
l Backup WDS
l WDS Member
AirWave monitors AP WDS role and displays this information on AP Monitoring page.
APs functioning as WDS Master or Primary WDS will no longer show up as Down is the radios are enabled.
WDS Participation
Perform these steps to configure WDS participation.
1. Log in to the AP.
2. Go to the Wireless Services > AP page.
3. Select Enable participation in SWAN Infrastructure.
4. Select Specified Discovery, and enter the IP address of the Primary WDS device (AP or WLSM).
5. Enter the user name and password for the WLSE server.
Primary or Secondary WDS
Perform these steps to configure primary or secondary functions for WDS.
1. Go to the Wireless Services > WDS > General Setup page.
2. If the AP is the Primary or Backup WDS, select Use the AP as Wireless Domain Services.
n Select Priority (set 200 for Primary, 100 for Secondary).
n Configure the Wireless Network Manager (configure the IP address of WLSE).
3. If the AP is Member Only, leave all options unchecked.
4. Go to the Security > Server Manager page.
5. Enter the IP address and Shared Secret for the ACS server and select Apply.
6. Go to the Wireless Services > WDS > Server Group page.
7. Enter the WDS Group of the AP.
8. Select the ACS server in the Priority 1 drop-down menu and select Apply.

Configuring ACS for WDS Authentication

ACS authenticates all components of the WDS and must be configured first. Perform these steps to make this configuration.
1. Login to the ACS.
2. Go to the System Configuration > ACS Certificate Setup page.
3. Install a New Certificate by selecting the Install New Certificate button, or skip to the next step if the certificate was previously installed.
4. Select User Setup in the left frame.
5. Enter the user name that will be used to authenticate into the WDS and select Add/Edit.
6. Enter the password that will be used to authenticate into the WDS and select Submit.
7. Go to the Network Configuration > Add AAA Client page.
8. Add the host name and IP address associated with the AP and the key.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 69
9. Enter the password that will be used to authenticate into the WDS and select Submit.
For additional and more general information about ACS, refer to "Configuring ACS Servers" on page 71.

Configuring Cisco WLSE Rogue Scanning

The AMP Setup > WLSE page allows AirWave to integrate with the Cisco Wireless LAN Solution Engine (WLSE). AirWave can discover APs and gather rogue scanning data from the Cisco WLSE.
Perform the following steps for optional configuration of AirWave for support of Cisco WLSE rogue scanning.
1. To add a Cisco WLSE server to AirWave , navigate to the AMP Setup > WLSE page and select Add. Complete the fields in this page. Table 27 describes the settings and default values.
Table 27: AMP Setup > WLSE Fields and Default Values
Setting Default Description
Hostname/IP Address None Designates the IP address or DNS Hostname for the WLSE server,
which must already be configured on the Cisco WLSE server.
Protocol HTTP Specify whether to use HTTP or HTTPS when polling the WLSE.
Port 1741 Defines the port AirWave uses to communicate with the WLSE
server.
Username None Defines the user name AirWave uses to communicate with the WLSE
server. The user name and password must be configured the same way on the WLSE server and on AirWave.
The user needs permission to display faults to discover rogues and inventory API (XML API) to discover manageable APs. As derived from a Cisco limitation, only credentials with alphanumeric characters (that have only letters and numbers, not other symbols) allow AirWave to pull the necessary XML APIs.
Password None Defines the password AirWave uses to communicate with the WLSE
server. The user name and password must be configured the same way on the WLSE server and on AirWave.
As derived from a Cisco limitation, only credentials with alphanumeric characters (that have only letters and numbers, not other symbols) allow AirWave to pull the necessary XML APIs.
Poll for AP Discovery; Poll for Rogue Discovery
Polling Period 10
Yes Sets the method by which AirWave uses WLSE to poll for discovery of
new APs and/or new rogue devices on the network.
Determines how frequently AirWave polls WLSE to gather rogue
minutes
scanning data.
2. After you have completed all fields, select Save. AirWave is now configured to gather rogue information from WLSE rogue scans. As a result of this configuration, any rogues found by WLSE appear on the RAPIDS > List page.
What Next?
l Go to additional tabs in the AMP Setup section to continue additional setup configurations.
l Complete the required configurations in this chapter before proceeding. Aruba support remains available to
you for any phase of AirWave installation.
70 | Configuring AirWave AirWave 8.2.10.1 | User Guide

Configuring ACS Servers

This is an optional configuration. The AMP Setup > ACS page allows AirWave to poll one or more Cisco ACS servers for wireless user name information. When you specify an ACS server, AirWave gathers information about your wireless users. Refer to "Setting Up Device Types" on page 66 if you want to use your ACS server to manage your AirWave users.
Perform these steps to configure ACS servers:
1. Go to the AMP Setup > ACS page. This page displays current ACS setup, as illustrated in Figure 31.
Figure 31: AMP Setup > ACS Page Illustration
2. Select Add to create a new ACS server, or select a pencil icon to edit an existing server. To delete an ACS server, select that server and select Delete. When selecting Add or Edit, the Details page appears.
3. Complete the settings on AMP Setup > ACS > Add/Edit Details. Table 28 describes these fields:
Table 28: AMP Setup > ACS > Add/Edit Details Fields and Default Values
Field Default Description
IP/Hostname None Sets the DNS name or the IP address of the ACS Server.
Protocol HTTP Launches a drop-down menu specifying the protocol AirWave uses when it polls
the ACS server.
Port 2002 Sets the port through which AirWave communicates with the ACS. AirWave
generally communicates over port 2002.
Username None Sets the user name of the account AirWave uses to poll the ACS server.
Password None Sets the password of the account AirWave uses to poll the ACS server.
Polling Period 10 min Launches a drop-down menu that specifies how frequently AirWave polls the
ACS server for user name information.
4. Select Add to finish creating the new ACS server, or Save to finish editing an existing ACS server.
5. The ACS server must have logging enabled for passed authentications. Enable the Log to CSV Passed Authentications report option, as follows:
n Log in to the ACS server, select System Configuration, then in the Select frame, select Logging.
n Under Enable Logging, select CSV Passed Authentications. The default logging options include the
two columns AirWave requires: User-Name and Caller-ID.
What Next?
l Go to additional tabs in the AMP Setup section to continue additional setup configurations.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 71
l Complete the required configurations in this chapter before proceeding. Aruba support remains available to
you for any phase of AirWave installation.

Integrating NMS Servers

You can integrate AirWave with Network Management System (NMS) servers. Doing so enables AirWave to forward SNMP traps to the NMS.

Add an NMS Server

AirWave communicates with the NMS server using the SNMPv1, SNMPv2c, or SNMPv3 protocol over Port 162.
To integrate an NMS server with AirWave:
1. Go to AMP Setup > NMS, then click Add.
2. Enter the NMS server hostname or IP address.
3. Use the default port, or you can enter a new port number.
4. Select the SNMP version:
n SNMPv1 or SNMPv2c, then enter the community string and confirm the string.
n SNMPv3, then enter the advanced security options (authentication and privacy protocols and
passphrases).
5. Click Add.

Download the MIB Files

The necessary AMP MIB files are available to download from the AMP Setup > NMS page.
AirWave provides integration with Netcool/OMNIbus and HP ProCurve Manager (PCM). To download the integration files, go to AMP Setup > NMS.

PCI Compliance Monitoring

AirWave provides compliance monitoring tools that can help your organization be prepared for a PCI Data Security Standard (DSS) audit. With use of AirWave, your organization can monitor firewalls, network devices, and other services to show PCI compliance.

Check Compliance

The PCI compliance report displays which requirements AirWave monitors, provides links to device management pages, and displays any actions required to resolve compliance failures. In addition to displaying pass or fail status, AirWave provides diagnostic information and recommends actions required to achieve Pass status when sufficient information is available.
You can find the PCI compliance report for a device by navigating to Devices > List, hovering the pointer over a device, and clicking Compliance from the shortcut menu. If you created a PCI compliance report from the Reports Definition page, AirWave displays the report on the Generated Reports page when it is available, as shown in Figure 32. For information, see "Viewing Generated Reports" on page 361.
72 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Figure 32: PCI Compliance Report Example
You can schedule, view, and re-run custom PCI compliance reports. For information about working with reports, see "Creating, Running, and Sending Reports" on page 326.

Enabling PCI Compliance Monitoring

When you enable PCI compliance monitoring, AirWave displays real-time information and generates PCI compliance reports that can be used to verify whether a merchant is compliant with a PCI requirement.
For information security standards, refer to the PCI Quick Reference Guide, accessible online from the PCI
Security Council Document Library or see "Supported PCI Requirements" on page 74.
To enable PCI auditing:
1. Navigate to the AMP Setup > PCI Compliance page.
2. Find the PCI requirement that you want to monitor.
3. Click to open the Default Credential Compliance page. The compliance settings vary depending on the PCIrequirement.
4. Select Save.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 73
5. To view and monitor PCI auditing on the network, use generated or daily reports. See "Creating, Running, and
Sending Reports" on page 326. In addition, you can view the real-time PCI auditing of any given device online.
Perform these steps:
a. Go to the Devices > List page.
b. Select a specific device. The Monitor page for that device displays. The Devices page also displays a
Compliance subtab in the menu bar.
c. Select Compliance to view complete PCI compliance auditing for that specific device.
Supported PCI Requirements
AirWave currently supports the PCI 3.0. requirements described in Table 29. When the requirements are disabled, AirWave does not check for PCI compliance or report on status.
AirWave users without RAPIDS visibility will not see the 11.1 PCI requirements in the PCI compliance report.
Table 29: PCI Requirements
Requirement Description
1.1 Establishes firewall and router configuration standards. A device fails if there are mismatches between the desired configuration and the configuration on the device.
1.2.3 Monitors firewall installation between any wireless networks and the cardholder data environment. A device fails if the firewall is not stateful.
2.1 Changes vendor-supplied default passwords before a device connects to the cardholder data environment or transmits data in the network. A device fails if the user name, passwords or SNMP credentials used by AirWave are on the list of forbidden default credentials. The list includes common vendor default passwords.
2.1.1 Changes vendor-supplied defaults for wireless environments. A device fails if the passwords, SSIDs, or other security-related settings are on a list of forbidden values that AirWave establishes and tracks. The list includes common vendor default passwords. The user can input new values to achieve compliance.
4.1.1 Uses strong encryption in wireless networks before sending payment cardholder data across open public networks. A device fails if the desired or actual configuration reflect that WEP is enabled on the network, or if associated users can connect with WEP.
11.1 Uses RAPIDS to identify unauthorized devices. A device fails when a rogue device is detected and unacknowledged, or when there are no rogues discovered in the last three months.
11.4 Uses intrusion-detection or intrusion-prevention systems to monitor traffic. Recent IDS events are summarized in the PCI compliance report or the IDS report.

Deploying WMS Offload

The Wireless LAN Management Server (WMS) feature is an enterprise-level hardware device and server architecture with managing software for security and network policy.
WMS components include:
l Air monitor. This operating mode provides wireless IDS, rogue detection and containment.
74 | Configuring AirWave AirWave 8.2.10.1 | User Guide
l WMS server. This server manages devices and network activity, such as roguedetection and network policy
enforcement.
l AirWave WebUI. This graphical user interface (GUI) provides access to the WMS offload feature.
Refer to the Aruba and AirWave 8.2.4 Best Practices Guide for additional information, including detailed concepts, configuration procedures, restrictions, ArubaOS infrastructure, and AirWave version differences in support of WMS Offload.

WMS Offload Configuration

WMS offload places the burden of the WMS server data and GUI functions on AirWave. WMS master controllers provide this data so that AirWave can support rigorous network monitoring capabilities.
WMS Offload is supported with ArubaOS Version 2.5.4 or later and AirWave Version 6.0 or later
Follow these steps to configure WMS offload:
1. Configure WLAN switches for optimal AirWave monitoring:
a. Disable debugging.
b. Ensure the AirWave server is a trap receiver host.
c. Ensure proper traps are enabled.
2. Configure AirWave to optimally monitor the AirWave infrastructure:
a. Enable WMS offload on the AMP Setup > General page.
b. Configure SNMP communication.
c. Create a proper policy for monitoring the AirWave infrastructure.
d. Discover the infrastructure.
3. Configure device classification:
a. Set up rogue classification.
b. Set up rogue classification override.
c. Establish user classification override devices.
4. Deploy ArubaOS-specific monitoring features:
a. Enable remote AP and wired network monitoring.
b. View controller license information.
5. Convert existing floor plans to VisualRF to include the following elements:
l ArubaOS
l RF Plan
6. Use RTLS for increasing location accuracy (optional):
a. Enable RTLS service on the AirWave server.
b. Enable RTLS on ArubaOS infrastructure.

Integrating External Servers

AirWave supports integration with Juniper, Brocade or HPE Intelligent Management Center (IMC) servers. When a device is monitored by AirWave and an external server, the Devices > Monitor page for that deviceprovides a link to that external server.

Add a Juniper Network Director

AirWave supports integration with Juniper Network Director (ND) 2.0. Once integrated, the Devices > Monitor pagefor that device provides access to a link the Juniper Network Director WebUI.
AirWave 8.2.10.1 | User Guide Configuring AirWave | 75
To integrate Juniper Network Director with AirWave:
1. Log in to AirWave, then navigate to AMP Setup > External server.
2. In the Juniper Network Director section, enter the IP address or hostnameof the Juniper Network Director.
3. Click Save.

Add a Brocade Network Advisor

AirWave can monitor and secure Brocade wired networks, while Brocade Network Advisor monitors Aruba networks. Once integrated, the Brocade Network Advisor appears in the Devices list on the AirWave Devices > List page, and the Devices > Monitor page for that device provides access to the BrocadeNetwork Advisor home page.
To integrate Brocade Network Advisor with AirWave:
1. Log in to AirWave, then navigate to AMP Setup > External server.
2. In the Brocade Network Advisor section, enter the IP address or hostname of the Brocade Network Advisor.
3. Click Save.

Add an HPE Intelligent Management Center

When a managed device is monitored by both AirWave and the HPE Intelligent Management Center (IMC) Enterprise Software Platform, the Devices > Monitor page for that device includes a link to the IMC server.
Figure 33: IMC Link on the Devices > Monitor page
To integrate an IMC server with AirWave:
1. Log in to AirWave, then navigate to AMP Setup > External server.
2. In the Intelligent Management Center section, enter the IP address or hostname of the IMC server.
3. (Optional) Click the IMCProtocol drop down list and select the HTTPS or HTTP protocol. The default setting is HTTPS.
4. (Optional) Enter a port number in the IMC Port field. The default port number is 8443.
5. Enter the user name for accessing the IMC server, then confirm this password.
6. Click Save.
76 | Configuring AirWave AirWave 8.2.10.1 | User Guide
Chapter 3

Using Device Groups

AirWave automates the processes of device configuration and compliance auditing using device groups. A Group can include one device to hundreds of devices that share common configuration settings, and you can define groups based on geography, usage or security policies, function, or another variable. Variables include basic settings, security settings, and radio settings.

Navigation Basics

When you select a device group from the Groups List page, the navigation sidebar varies, depending on the default group and type of devices that you added to AirWave. After you create additional device groups, you can change the default group by navigating to AMP Setup > General and selecting a group from the Default Group drop-down menu.
Figure 34 shows a navigation sidebar menu that is available when you select a group that contains Cisco WLCs.
Figure 34: Navigation Sidebar
The following WebUI pages support group monitoring and configuration:
l List. This page lists all groups configured in AirWave and provides the foundation for all group-level
configurations. For more information, see "Viewing Device Groups" on page 78
l Monitor. This page displays client and bandwidth usage information, lists devices in a given group, provides
an Alert Summary table for monitoring alerts for the group, and provides a detailed Audit Log for group­level activity. The default view of the Groups > Monitor page is predefined and cannot be modified. However, you can create a new view, or edit and copy a view, and save the view to access information you frequently use. For more information on filtering data from your view, see "Creating Filtered Views" on page
148.
l Basic. This page becomes available when you create a new group on the Groups > List page. For more
information, see "Configuring Basic Settings for Device Groups" on page89.
l Templates. This page manages templates for any device group. You can use templates to manage the
configuration of third-party devices in a group using a configuration file. Variables configure device-specific and group-level properties. For more information, see "Using Configuration Templates" on page 234.
AirWave 8.2.10.1 | User Guide Using Device Groups | 77
l Security. This page defines general security settings for device groups, to include RADIUS, encryption, and
additional security settings on devices. For more information, see "Configuring Security for Device Groups"
on page 101
l SSID. This page sets SSIDs, VLANs, and related parameters in device groups. Use this submenu is available
when you configure RADIUS servers on the Groups > AAA Servers page. For more information, see
"Configuring SSIDs and VLANs for Device Groups" on page 106.
l AAA Servers. This page configures authentication, authorization, and accounting settings in support of
RADIUS servers for device groups. For more information, see "Configuring AAA Servers for Device Groups" on
page100.
l Radio. This page defines general 802.11 radio settings for device groups. "Configuring Group Radio Settings"
on page 110
l Controller Config. This page manages ArubaOS Device Groups, AP Overrides, and other profiles specific to
Aruba devices on the network. Use this page as an alternative to the Device Setup > Aruba >Configuration page. The appearance of this page varies depending on whether AirWave is configured for
global configuration or group configuration. For more information, see the Aruba Controller Configuration Guide.
l Switch Config. This page manages ArubaOS Device Groups, AP Overrides, and other profiles specific to Aruba
switches on the network. For more information, see the Aruba Switch Configuration Guide.
l Instant Config. This page manages Aruba Instant devices on the network. For more information, see the
Aruba Instant in AirWave 8.2.8.2 Deployment Guide.
l Cisco WLC Config. This page becomes available when you select a device group that contains Cisco WLC
devices and consolidates controller-level settings from several pages (Group Radio, Security, SSIDs, Cisco WLC Radio and AAA Server). For more information, see "Configuring Cisco WLC Device Groups" on page 114
l PTMP. This page defines settings specific to Proxim MP devices when present and is only available when a
Proxim MP device is added to this group. For more information, see "Configuring PTMP Settings for Device
Groups" on page 120.
l Proxim Mesh. This page defines mesh AP settings specific to Proxim devices when present. For more
information, see"Configuring Proxim Mesh Radio Settings" on page 121.
l MACACL. This page defines MAC-specific settings that apply to Proxim, Symbol, and ProCurve 520 devices
when present. For more information, see "Configuring Group MAC ACLs for Device Groups" on page 123.
l Firmware. This page enables you to manage firmware files for many device types in one location. For more
information, see "Specifying the Minimum Firmware Version for Device Groups" on page 124.
l Compare. This page allows you to compare line item-settings between two device groups. On the Groups >
List page, select the Compare two groups link, select the two groups from the drop-down menus, and then select Compare. For more information, see "Comparing Device Groups" on page 80.

Viewing Device Groups

You can view device groups by navigating to Groups > List . When you configure AirWave for the first time, Access Points is the only group in the list.
From the Groups List page, you can:
l Create a group by clicking Add at the top of the page. Alternatively, you could create a group by selecting
group from the list and clicking to clone the group. The copied group will be added to the group list with "copy of" appended in front of the group name.
l Compare two groups. For more information, see "Comparing Device Groups" on page 80.
l Click or hover your mouse over the icon for quick access to other Groups pages. For information about
the Groups pages, see"Navigation Basics" on page 77.
78 | Using Device Groups AirWave 8.2.10.1 | User Guide
For example, you can select Basic from the shortcut menu to change group configurations. Refer to
"Configuring Basic Settings for Device Groups" on page 89 .
l Add groups to a global group. For more information, see "Subscribing other Groups to a Global Group" on
page84.
l Delete a group. For more information, see "Deleting a Group" on page 85.
Table 30 describes the device group details available on the Groups > List page.
Table 30: Groups > List Fields and Descriptions
Field Description
Name Uniquely identifies the group by location, vendor, department or any other identifier (such
as ‘Accounting APs,’ ‘Floor 1 APs,’ ‘Cisco devices,’ ‘802.1X APs,’ and so forth).
SSID The SSID assigned to supported device types within the group.
Total Devices Total number of devices contained in the group including APs, controllers, routers, or
switches.
Changes This field is available when a group has unapplied changes.
Is Global Group This field is available if a group is designated as global. A global group may not contain APs,
but it may be used as a template for other groups.
NOTE: This column might indicate Yes if this group has been pushed to AirWave from a Master Console.
Global Group Specifies which group this Subscriber Group is using as its template.
Down The number of access points within the group that are not reachable via SNMP or are no
longer associated to a controller. Note that thin APs are not directly polled with SNMP, but are polled through the controller. That controller may report that the thin AP is down or is no longer on the controller. At this point, AirWave classifies the device as down.
Mismatched The number of devices within the group that are in a mismatched state.
Ignored The number of ignored devices in that group.
Clients The number of mobile users associated with all access points within the group. To avoid
double counting of clients, clients are only listed in the group of the AP with which they are associated. Note that device groups with only controllers in them report no clients.
Usage A running average of the sum of bytes in and bytes out for the managed radio page.
VPN Sessions Number of active (connected) VPN sessions under this group.
Up/Down Status Polling Period
Duplicate Creates a new group with the name Copy of <Group Name> with identical configuration
The time between Up/Down SNMP polling periods for each device in the group. Detailed SNMP polling period information is available on the Groups > Basic configuration page. By default, most polling intervals do not match the up/down period.
settings. (Aruba configuration settings will have to be manually added back.)
AirWave 8.2.10.1 | User Guide Using Device Groups | 79

Comparing Device Groups

You can compare two existing device groups with a detailed line-item comparison. Group comparison allows several levels of analysis including the following:
l Compare performance, bandwidth consumption, or troubleshooting metrics between two groups.
l Debug one device group against the settings of a similar and better performing device group.
l Use one group as a model by which to fine-tune configurations for additional device groups.
This topic presumes that at least two device groups areat least partly configured in AirWave, each with saved configurations. Perform the following steps to compare two existing device groups:
1. From the Groups > List page, select the Compare two groups link. Two drop-down menus appear.
2. Select the two groups to compare in the drop-down menus, and select Compare. The Compare page appears, displaying some or many configuration categories. Figure 35 illustrates this page.
Figure 35: Comparing Two Devices Groups on the Groups > List > Compare Page (Partial View)
3. Note the following factors when using the Compare page:
l The Compare page can be very long or very abbreviated, depending on how many configurations the
device groups share or do not share.
l When a configuration differs between two groups, the setting is flagged in red text for the group on the
right.
80 | Using Device Groups AirWave 8.2.10.1 | User Guide
l The default setting of the Compare page is to highlight settings that differ between two groups.
n To display settings that are similar or identical between two device groups, select Show Similar Fields
at the top left of the page. The result may be a high volume of information.
n Select Hide Similar Fields to return to the default display, emphasizing configuration settings that
differ between two groups.
l You can change the configuration for either or both groups by selecting Edit in the corresponding column
heading. The appropriate configuration page appears.
l If you make and save changes to either or both groups, go back to the Groups > List page and select
Compare two groups. Select the same two groups again for updated information.
l Additional topics in this document describe the many fields that can appear on the Groups > List >
Compare page.

Changing Group Configurations

Perform the following steps to make any changes to an existing group's configuration:
1. Browse to the Groups > List configuration page.
2. Select the Modify button (the wrench icon) for the group you wish to edit. The Groups > Basic configuration page appears.
3. Select the fields to be edited on the Basic configuration page. Other group configuration pages may be available, depending upon the type of devices included in that group. or go to Radio, Security, VLANs, or MAC ACL configuration page and edit the fields. Use the Save button to store the changes prior to applying them.
4. When all changes for the group are complete select the Save and Apply button to make the changes permanent. Figure 36 illustrates the confirmation message that appears.
AirWave 8.2.10.1 | User Guide Using Device Groups | 81
Figure 36: Groups > Basic Configuration Change Confirmation Page Illustration
5. AirWave displays a Configuration Change screen confirming the changes that will be applied to the group's settings.
6. There are several action possibilities from within this confirmation configuration page.
l Apply Changes Now — Applies the changes immediately to access points within the group. If you wish to
edit multiple groups, you must use the Preview button.
You cannot apply Aruba Networks Config changes to other groups. If the only changes on the configuration pageare to Aruba devices, the list of groups and the preview button will not appear.
l Scheduling Options — Schedules the changes to be applied to this group in the future. Enter the desired
change date in the Start Date/Time field. You can also specify if this is a one-time schedule or a recurring schedule. Recurring options are Daily, Weekly, Monthly, and Annually. AirWave takes the time zone into account for the group if a time zone other than AirWave System Time has been configured on the Groups > Basic configuration page.
l Cancel — Cancels the application of changes (immediately or scheduled).
To completely nullify the changerequest, select Revert on one of the group configuration pages after you have selected Cancel.
7. Apply changes to multiple groups by selecting the appropriate group or groups and selecting Preview.
82 | Using Device Groups AirWave 8.2.10.1 | User Guide

Using Global Groups for Group Configuration

The AirWave group configuration feature allows you to push configurations defined on a global group to the managed groups subscribed to that global group.

About Global Group Membership

To have Global Group status, a group must contain no devices; accordingly, access points can never be added to a Global Group. Global groups are visible to users of all roles, so they may not contain devices, which can be made visible only to certain roles. illustrates the Groups > List page.

Creating a Global Group

The Use Global Group option becomes available when you have at least two groups configured in AirWave. You can configure AirWave to push a group configuration to a group when you enable this option.
To configure a global group:
1. Navigate to Groups > List.
2. Select a the group from the list.
3. Navigate to Groups > Basic. The Global Groups section of this page contains the Use Global Group option.
4. Select Yes for the Use Global Group option.
Figure 37: Selecting the Use Global Group Option
5. To associate the group with a global group, select the group from the Global Group drop-down menu.
6. Click Save and Apply.
7. Click Apply Changes Now.
When the Groups list is updated with the global group, you will see Yes in the "Is Global Group" column, and when you go to the Basic pagefor the global group, there will be checkboxes next to the basic settings. Figure 38 shows an example for a global group called "test".
AirWave 8.2.10.1 | User Guide Using Device Groups | 83
Figure 38: Basic Settings for the Global Group
When AirWave pushes a global group configuration to subscriber groups, all settings are static except for those with the checkbox selected; you can change the value or setting of the checked field on the corresponding tab for each managed group. In the case of the Groups > SSIDs configuration page, override options are available only on the Add configuration page (go to the Groups > SSIDs configuration page and select Add).
Global templates are also configurable as part of global groups; for more information, see"Using Configuration
Templates" on page 234.

Subscribing other Groups to a Global Group

Once oneor more global groups have been configured, other groups may subscribe to a particular Global Group. To subscribe a (non-global) group to a Global Group:
1. Navigate to Groups > List.
2. Select a the group from the Groups table.
3. Navigate to Groups > Basic.
4. In the Global Groups section of this page, click the Global Group drop-down list and select a global group.
5. Select Save and Apply to make the changes permanent.
Figure 39: Subscribe to a Global Group
Once the configuration is pushed, the unchecked fields from the Global Group appears on the Subscriber Group as static values and settings. Only fields that had the override checkbox selected in the Global Group appear as fields that can be set at the level of the Subscriber Group. Any changes to a static field must be made on the Global Group.
If you want to change a global group into a regular group and it has subscribers, you need to remove the subscribers first before you can change the "Is Global Group" option to No on the Groups > Basic page.
84 | Using Device Groups AirWave 8.2.10.1 | User Guide

Deleting a Group

Perform the following steps to delete an existing Group from the AirWave database:
1. Browse to the Groups > List configuration page.
2. Ensure that the group you wish to delete is not marked as the default group. (See the AMP Setup > General page.) AirWave does not permit you to delete the current default group.
3. Ensure that there are no devices in the group that you want to delete. AirWave does not permit you to delete a group that still contains managed devices. You must move all devices to other groups before deleting a group.
4. Ensure that the group is not a global group that has subscriber groups, and is not a group that was pushed from a Master Console. AirWave will not delete a group in which either of those cases is true.
5. Select the checkbox, and click the Delete button.

Monitoring Device Groups

You can find the monitoring page by navigating to Groups > Monitor page and selecting a device group from the list.
Figure 40 shows the main components of the monitoring page for the default device group called Access Points.
Figure 40: Group Monitoring Page
Here are some of the things you can view on or from the Groups > Monitor page:
l Group statistics. The total number of devices contained in the group includes APs, controllers, routers, or
switches. From the summary counts at the top of the page, you can click links to monitoring pages for devices and connected clients.
l Graphs. The client and usage graphs show the attached clients and averagebandwidth or VPN session usage
for the devices in the group. You can change the sample interval, or show the maximum or average statistics by clicking the menu options in the graph header.
l Group table. The default view of the devices group includes these columns:
AirWave 8.2.10.1 | User Guide Using Device Groups | 85
n Device. This information shows the device MAC address and provides a quick link to the monitoring page
for the device. Hover over the blue link to access shortcuts to other pages, such as Manage, Config, Monitor, and Compliance.
n Status. This information shows whether devices are up or down in the group.
n Configuration. This information shows whether the device configuration is good, or there is an error or
mismatch. Click the blue link to access the Device Configuration page and review the device configuration.
n Controller. This information shows the name of the controller and provides a quick link to the monitoring
pagefor the controller.
n Version. This information shows the firmware version running on the controller.
n Folder. This information shows the name of the folder the device belongs to and provides a quick link to
the list of devices for the folder.
n Clients. This information shows the number of clients per device.
n APs. This information shows the number of APs per device, if applicable.
n Usage. This information shows the total speed of all clients at that moment.
n IP Address. This information shows the IP address of the device.
n Type. This information shows the device model.
n Master Controller. If the controller role is master, AirWave displays the device type and provides a quick
link to the monitoring page for the device.
n Switch Role. For switches that support VSFstacking, this information shows whether the switch functions
as commander, standby, member, or has been provisioned to bea member of the stack.
l Alerts. From the alert summary table at the bottom of the page, you can click links to summary pages
forAMP, Intrusion Detection System (IDS), RADIUS accounting, and RADIUS authentication alerts received on the devices in the group. You can also access the audit log and system event log from this table.

Modifying Multiple Devices

AirWave provides a Modify Devices tool that enables you to makebulk changes to devices, including controllers that have thin APS. Some of the device actions you can make include deleting multiple devices, migrating devices to another group or folder, updating credentials, and optimizing channels.
To modify multiple devices:
1. Navigate to one of the following pages that has a Device List:
n Devices > List. You can also click the Up, Down, Mismatched hyperlinks on the List page to open
monitoring pages for the devices with those devices states.
n Groups > Monitor.
2. Click at the top right corner of the device list, then select the devices you want to modify.
3. Select as many changes as you want from the Device Actions drop-down menu.
86 | Using Device Groups AirWave 8.2.10.1 | User Guide
Figure 41: Selecting the Device Actions
4. Click Apply All.
Table 31 describes the changes you can apply to multiple devices at the same time.
Table 31: Modify Multiple Devices Section Fields and Default Values
Action Description
System Actions
Change Device Group/Folder
Poll selected devices Click Poll Now to poll selected devices for current user count and bandwidth data.
Audit selected devices Fetches the current configuration from the device and compares it to the desired
Move the selected devices to a new group or folder. If the device is in managed mode when it is moved to a new group, it will be reconfigured. When you select this option, you must also click the Group and/or Folder drop down menu and select the destination group or folder for the devices. Click Move and then select Apply All to save your changes.
This action overrides default poll settings for the group. Polling numerous devices may create a temporary performance load on your AirWave server.
AirWave configuration. The audit action updates the Configuration Status.
NOTE: If a group has audit disabled for its devices, AirWave does not show the Audit button in the Modify devices list.
AirWave 8.2.10.1 | User Guide Using Device Groups | 87
Table 31: Modify Multiple Devices Section Fields and Default Values (Continued)
Action Description
Delete selected devices Click Delete to remove the selected devices from AirWave. A new window opens
and asks you to confirm your changes. Select Apply Changes Now. The deletions will be performed in the background and it may take a minute to remove the selected devices from the list.
Run report on selected devices
Update the credentials used to communicate with these devices
Import settings from selected devices (and discard current pre­device desired settings)
Management Level When you select this action, you must select either Monitor Only + Firmware
Replace Hardware Select the down device that will be replaced and view the list of AirWave devices
Takes you to the Reports > Definitions page where you can define or run a custom report for selected devices. For more details and a procedure, see
"Running Reports on Selected Devices" on page 359.
NOTE: Some reports are not device-based and can't be run with the bulk selection of devices from Modify Devices; these reports are New Rogue Device, Rogue Clients, Rogue Containment Audit, Traffic Analysis, and UCC.
Update changes the credentials AirWave uses to communicate with the device. It does not change the credentials on the AP.
Audit updates a number of the AP-specific settings that AirWave initially read off of the AP including channel, power, antenna settings and SSL certifications. AirWave recommends using this setting if APs have been updated outside of AirWave. Most settings on the Devices > Manage configuration page are set to the values currently read off of the devices.
Upgrade or Manage Read/Write to choose new the management level for the devices.
that match the name or IP address of the selected device. The down devices can be replaced with any device in the New Devices list or in the current folder or group.
Planned Downtime Mode When you select this action, you must select either Enable or Disable to change
the downtime mode for the selected devices. When this option is enabled, the selected devices are put into Planned Maintenance mode. When this mode is enabled, no AP Down triggers will be deployed on these devices. Users will not be able to delete folders that contain devices in Planned Maintenance. The devices in Planned Maintenance will show the Up status, but will not be tracked in historical graphs and logs as Up.
Add Maintenance Window
Delete all Maintenance Windows
Device Actions (Aruba)
Aruba AP Group When you select this option then click Update Aruba AP Group, a new window
Automate the manual action of putting the selected devices into Manage mode at once so that changes can be applied, and after the maintenance period is over, the devices automatically revert to Monitor-Only mode.
Maintenance windows can be set as a one-time or recurring event.
Deletes all maintenance windows set for these devices.
opens that allows you to assign the devices to a new AP group.
88 | Using Device Groups AirWave 8.2.10.1 | User Guide
Table 31: Modify Multiple Devices Section Fields and Default Values (Continued)
Action Description
Aruba Instant Virtual Controller Variables
Import unreferenced Aruba profiles from selected devices
Reprovision selected Aruba devices
Device Actions
Rename devices Rename all the selected devices in bulk. Note that you can also rename the
Upgrade firmware for selected devices
Cancel firmware upgrade for selected devices
Reboot selected devices Reboots the selected devices. Use caution when rebooting devices because this
Opens the Variable Editor page for selected Aruba Instant APs.
Select the devices that include unreferenced profiles, then click this button to import those profiles from the selected devices.
Configures the controller to send provisioning parameters such as radio, antenna, and IP address settings to the selected APs. Please note that APs will be rebooted as part of reprovisioning.
devices one at a time using the editable Name fields in each row.
Upgrades firmware for the selected devices. Refer to the firmware upgrade help under Devices > Manage configuration page for detailed help on Firmware job options.
Cancels any firmware upgrades that are scheduled or in progress for the selected APs.
can disrupt wireless users.
Factory reset Resets the selected devices back to factory-default settings.
Desired Radio Status Enables or disables the radios on the selected device. This parameter does not
apply to Cisco IOS APs.
Cisco Thin AP Settings Bulk configuration for per-thin AP settings, previously configured on the Group
LWAPP AP tab, can be performed from Modify Devices on the Devices > List page. Make changes to LWAPP AP groups, including the option that was under Modify Devices.

Configuring Basic Settings for Device Groups

The first default device group set up in AirWave is the Access Points group, but you can configure additional device groups. After you definethe basic group settings, you can save the changes without pushing these settings to the devices in the group. You might want to do this in order to push configuration changes at a later time.
To access the Basic Group Settings page:
l Add a device group from the Groups > List page. The Groups > Basic page displays and becomes available
from the navigation sidebar.
l Navigate to Groups > List, locate the group and click .
l Navigate to Groups > List, locate the group and select Basic from the shortcut menu. The shortcut menu
varies depending on the group's settings.
AirWave 8.2.10.1 | User Guide Using Device Groups | 89

Basic Settings

To set up the device group, you need to configure the basic settings described in Table 32.
Figure 42: Basic Settings
Table 32: Basic Settings, Default Values, and Descriptions
Setting Default Description
Name Defined
when first adding the group
Missed SNMP Poll Threshold (1-100)
Regulatory Domain
Timezone AMP system
Allow One-to­One NAT
Audit Configuration on Devices
1 Sets the number of Up/Down SNMP polls that must be missed before
US-United States
time
No Allows AirWave to talk to the devices on a different IP address than the one
Yes Auditing and pushing of configuration to devices can be disabled on all the
Displays or changes the group name. Enter a name that helps to identify the group. For example, Accounting APs, Cisco devices, and Aruba controllers).
AirWave considers a device to be down.
NOTE: Set the number of SNMP retries and the SNMP timeout of a poll on the Device Setup > Communication page.
Sets the regulatory domain in AirWave, limiting the selectable channels for APs in the group.
Allows group configuration changes to be scheduled relative to the time zone in which the devices are located.
configured on the device.
NOTE: If enabled, the LAN IP Address listed on the Devices > Manage configuration page under the Settings area is different than the IP Address under the Device Communication area.
devices in the group.
NOTE: Once disabled, all the devices in the groups will not be counted towards mismatched devices.

Global Groups

The global groups option becomes available on the Groups Basic page when you create a new group for the first time and it is a global group.
90 | Using Device Groups AirWave 8.2.10.1 | User Guide
Table 33 describes the global group options you can define in order to push configurations to group members.
Table 33: Global Groups Fields and Default Values
Setting Default Description
Is Global Group No If set to Yes, then this group can be selected in the Use Global Group
drop down menu for future group configurations. For more information, refer to"Using Global Groups for Group Configuration"
on page 83 .
Use Global Group No Click this drop-down list to select a global group to which this (non-
global) group should be associated. For more information, refer to
"Subscribing other Groups to a Global Group" on page 84 .
NOTE: This field becomes available when there are more than one groups configured in AirWave.

SNMP Polling Periods

You can override the override default SNMP polling settings with the SNMP polling period options described in
Table 34.
Table 34: SNMP Polling Periods Fields and Default Values
Setting Default Description
Up/Down Status Polling Period
Override Polling Period for Other Services
AP Interface Polling Period
Client Data Polling Period 10
Thin AP Discovery Polling Period
Device-to-Device link Polling Period
5 minutes Sets time between Up/Down SNMP polling for each device in the
group.
The Group SNMP Polling Interval overrides the global parameter configured on the Device Setup > Communication page. An initial polling interval of 5 minutes is best for most networks.
No Enables or disables overriding the base SNMP Polling Period. If you
select Yes, the other settings in the SNMP Polling Periods section are activated, and you can override default values.
10 minutes
minutes
15 minutes
5 minutes Sets time between SNMP polls for Device-to-Device link polling.
Sets the interval at which AirWave polls for radio monitoring and bandwidth being used by a device.
Sets time between SNMP polls for client data for devices in the group.
Sets time between SNMP polls for Thin AP Device Discovery. Controllers are the only devices affected by this polling interval.
Mesh APs are the only devices affected by this polling interval.
802.11 Counters Polling Period
Rogue AP and Device Location Data Polling Period
AirWave 8.2.10.1 | User Guide Using Device Groups | 91
15 minutes
30 minutes
Sets time between SNMP polls for 802.11 Counter information.
Sets time between SNMP polls for Rogue AP and Device Location Data polling.
Table 34: SNMP Polling Periods Fields and Default Values (Continued)
Setting Default Description
CDP Neighbor Data Polling Period
Mesh Discovery Polling Period
30 minutes
15 minutes
Sets the frequency in which this group polls the network for Cisco Discovery Protocol (CDP) neighbors.
Sets time between SNMP polls for Mesh Device Discovery.

Routers and Switches

You can configure how often AirWave polls devices in the group with the routers and switches options described in Table 35. You can also disable these options.
Table 35: Routers and Switches Fields and Default Values
Setting Default Description
Read ARP Table 4 hours Sets the frequency in which devices poll routers and switches for
Address Resolution Protocol (ARP) table information. This setting can be disabled, or set to poll for ARP information in a range from every 15 seconds to 12 hours.
Read CDP Table for Device Discovery
4 hours For Cisco devices, sets the frequency in which devices poll routers
and switches for Cisco Discovery Protocol (CDP) information. This setting can be disabled, or set to poll for CDP neighbor information in a range from every 15 seconds to 12 hours.
Read Bridge Forwarding Table
Interface Up/Down Polling Period
Interface Bandwidth Polling Period
Interface Error Counter Polling Period
Poll 802.3 error counters No Sets whether 802.3 error counters should be polled.
Poll Cisco interface error counters
4 hours Sets the frequency in which devices poll the network for bridge
forwarding information. This setting can be disabled, or set to poll bridge forwarding tables from switches in a range from every 15 seconds to 12 hours.
5 minutes Sets the frequency in which network interfaces are polled for
up/down status. This setting can be disabled, or set to poll from switches in a range from every 15 seconds to 30 minutes.
15 minutes
30 minutes
No Sets whether the interface error counters for Cisco devices should
Sets the frequency in which network interfaces are polled for bandwidth usage. This setting can be disabled, or set to poll from switches in a range from every 5 minutes to 30 minutes.
Sets the frequency in which network interfaces are polled for up/down status. This setting can be disabled, or set to poll bridge forwarding tables from switches in a range from every 5 minutes to 30 minutes.
be polled.

Notes

Use this optional section to record additional information and comments about the group.
92 | Using Device Groups AirWave 8.2.10.1 | User Guide
GroupDisplay Options
You can configure the group display options as described in Table 36.
Table 36: Group Display Options Fields and Default Values
Setting Default Description
Show device settings for
Selected Device Types
Only devices on this AMP
N/A This option appears if you chose to display selected device types, allowing you to
Drop-down menu determines which Group tabs and options are to be viewable by default in new groups. Settings include the following:
l All Devices—AirWave displays all Group tabs and setting options. l Only devices in this group—AirWave hides all options and tabs that do not
apply to the devices in the group. If you use this setting, then to get the group list to display the correct SSIDs for the group, you must Save and Apply on the group.
l Only devices on this AMP— hides all options and tabs that do not apply to
the APs and devices currently on AirWave.
l Use system defaults—Use the default settings on AMP Setup > General l Selected device types—Allows you to specify the device types for which
AirWave displays Group settings.
select the device types to display group settings. Use Select devices in this group to display only devices in the group being configured.

Automatic Static IP Assignment

Use the Automatic Static IP Assignment section on the Groups > Basic configuration page to automatically assign a range of static IP addresses to new devices as they are added into the group.
These options are relevant for a small number of device types and will appear when they are present.
Table 37 describes the automatic static IPaddress options.
Table 37: Automatic Static IP Assignment Fields and Default Values
Setting Default Description
Assign Static IP Addresses to Devices
Start IP Address
Number of Addresses
Subnet Mask none Sets the subnet mask to be assigned to the devices in the Group.
Subnet Gateway
Next IP Address
No Specify whether to enable AirWave to statically assign IP addresses from a
specified range to all devices in the Group.
NOTE: If this value is set to Yes, then the additional configuration fields described in this table will become available.
none Sets the first address AirWave assigns to the devices in the Group.
none Sets the number of addresses in the pool from which AirWave can assign IP
addresses.
none Sets the gateway to be assigned to the devices in the Group.
none Defines the next IP address queued for assignment. This field is disabled for the
initial Access Points group.
AirWave 8.2.10.1 | User Guide Using Device Groups | 93

Spanning Tree Protocol

Use the Spanning Tree Protocol settings on the Groups > Basic page to configure the Spanning Tree Protocol on Wireless LANController (WLC) devices and Proxim APs.
Table 38 describes the settings and default values in this section.
Table 38: Spanning Tree Protocol Fields and Default Values
Setting Default Description
Spanning Tree Protocol
Bridge Priority 32768 Sets the priority for the AP. Values range from 0 to 65535. Lower values have
Bridge Maximum Age
Bridge Hello Time
Bridge Forward Delay
No Specify whether to enable STP on Proxim APs. When you set this option to Yes,
additional configuration fields described in this table become available.
higher priority. The lowest value is the root of the spanning tree. If all devices are at default the device with the lowest MAC address will become the root.
20 Sets the maximum time, in seconds, that the device stores protocol
information. The supported range is from 6 to 40.
2 Sets the time, from 1 to 10 seconds, between Hello message broadcasts.
15 Sets the time, from 4 to 30 seconds, that the port spends in listening and
learning mode if the spanning tree has changed.
NTP
Use the NTP Settings section of the Groups > Basic page to define an NTP server and configure Network Time Protocol (NTP) settings.
Table 39 describes the NTP settings and default values.
Table 39: NTP Fields and Default Values
Setting Default Description
NTP Server #1,2,3
UTC Time Zone
Daylight Saving Time
None Sets the IP address of the NTP servers to be configured on the AP.
0 Sets the hour offset from UTC time to local time for the AP. Times displayed in
AirWave graphs and logs use the time set on the AirWave server.
No Enables or disables the advanced daylight saving time settings in the Proxim
section of the Groups > Basic configuration page.

Aruba Switch Configuration

AirWave automates provisioning of several models of HPEOfficeConnect access points, which are mainly used for Comware switches. Provisioning uses template-based configuration, zero-touch provisioning (ZTP), and configuration snippets.
There are two methods of switch configuration:
l Full configuration. AirWave pushes a complete set of changes using a template to the group of devices. By
default, the full configuration mode is enabled whenever you create a device group.
l Config job. AirWave pushes a golden configuration to a group that contains factory-default ZTP devices.
94 | Using Device Groups AirWave 8.2.10.1 | User Guide
You can also push any command supported by the switch CLI to the device group regardless of their device state (factory or non-factory).
For help with switch configuration, refer to AirWave 8.2.8 Switch Configuration Guide.

Aruba

To configure settings specific to Aruba locate the Aruba section and adjust these settings as required.
Table 40 describes the settings and default values of this section of the Groups > Basic page.
Table 40: Aruba Fields and Default Values
Setting Default Description
SNMP Version 2c The version of SNMP used by AirWave to communicate to the AP.
Offload WMS Database
Aruba GUI Config
Manage local configuration on controllers
Ignore Rogues Discovered by Remote APs
Delete Certificates On Controller
Archive Controller/Switch Backups
No Configures commands previously documented in the AirWave 8.2.10.1 Best
Practices Guide. When enabled, this feature allows AirWave to display historical information for WLAN switches.
Changing the setting to Yes pushes commands via SSH to all WLAN switches in Monitor Only mode without rebooting the controller. The command can be pushed to controllers in manage mode (also without rebooting the controller) if the Allow WMS Offload setting on AMP Setup > General is changed to Yes.
Yes This setting selects whether you'd like to configure your devices using the
Groups > Controller method (either global or group) or using Templates.
No Enables or disables the management of local configuration including audit,
push, and import operations.
No Configures whether to turn off RAPIDS rogue classification and rogue
reporting for RAPs in this group.
No Specifies whether to delete the current certificates on an
ArubaOScontroller.
Yes This setting enables AirWave to create config backups manually.
NOTE: After you enable this setting, you can go to the Device Configuration page and click Create Backup Now. An archived config
backup is available only Aruba controllers and Mobility Access Switches.

Aruba Instant

To specify the Aruba Instant settings to be applied to this group, locate the Aruba Instant settings section of the Groups > Basic page and adjust these settings as desired.
Table 41 describes the settings and default values.
AirWave 8.2.10.1 | User Guide Using Device Groups | 95
Table 41: Virtual Controller Certificate Fields and Default Values
Setting Default Description
Enable Instant GUI Config
Configure AirWave communication settings:
Disable auto join mode
Ignore DHCP configuration
HTTPStimeout 5 minutes the HTTPS timeout for Instant devices is the period for which AirWave
No Select this option to configure your Instant APs via the IGC feature on the
Groups > Instant Config pages of the AirWave WebUI, rather than via Instant template configuration.
No If the Enable Instant GUIConfig setting is set to No, you can use this
option to configure the primary (and optionally, secondary) AirWave server settings on an Instant AP via template configuration.
No If you enable the Disable auto join mode setting, then Instant APs will not
automatically join a group of Instant APs in AirWave when that device becomes active on the network.
No When this feature is enabled, AirWave will not run a DHCP configuration
audit when the device is added to AirWave. For IAP DHCP configuration, from the IAP UI, go to DHCP Servers.
waits for an Instant heartbeat message.
The Missed SNMPPoll Threshold in the Basic Settings section at the top of the Groups > Basic page sets the number of Up/Down SNMP polls that must be missed before AirWave considers a device to be down.
If, for example, a group of Instant APs your group settings has a Missed SNMP Poll Threshold of 1, then an instant AP is considered to be down if there is 1 missed heartbeat during this HTTPS timeout period, which could be anywhere between 1-30 min.
CA Cert None Specify a CA certificate for the Instant virtual controller. The fields in this
drop down will populate when a certificate of type Intermediate CA or Trusted CA is added in the Device Setup > Certificates page.
Server Cert None Specify a server certificate for the virtual controller. The fields in this drop
down will populate when a certificate of type Server Cert is added in the Device Setup > Certificates page.
Captive Portal Cert None Specify a Captive portal certificate for the virtual controller. The fields in
this drop down will populate when a certificate of type Captive Portal Cert is added in the Device Setup > Certificates page.
Captive Portal Logo None You can use AirWave to download a captive portal logo to your Instant
APs. Upload the image (which must be 16 KB or less) on the Device Setup > Upload page, then click the Captive Portal Logo drop down list on the Groups > Basic page to select the image to send to the IAPs.
RadSec Server Cert None Specify a RadSec server certificate for the virtual controller. The fields in
this drop down will populate when a certificate of type Server Cert is added in the Device Setup > Certificates page.
RadSec CA Cert None Specify a RadSec CA certificate for the virtual controller. The fields in this
drop down will populate when a certificate of type Intermediate CA or Trusted CA is added in the Device Setup > Certificates page.
96 | Using Device Groups AirWave 8.2.10.1 | User Guide

Cisco IOS/Catalyst

Configure group settings specific to Cisco IOS/Catalyst devices, as described in Table 42.
Table 42: Cisco IOS/Catalyst Fields and Default Values
Setting Default Description
SNMP Version 2c The version of SNMP used by AirWave to communicate to the AP.
Cisco IOS CLI Communication
Cisco IOS Config File Communication
Telnet The protocol AirWave uses to communicate with Cisco IOS devices.
Selecting SSH uses the secure shell for command line page (CLI) communication and displays an SSH Version option. Selecting Telnet sends the data in clear text via Telnet.
TFTP The protocol AirWave uses to communicate with Cisco IOS devices.
Selecting SCP uses the secure copy protocol for file transfers and displays an SCP Version option. Selecting TFTP will use the insecure trivial file transfer protocol. The SCP login and password should be entered in the Telnet user name and password fields.

Cisco WLC

Use the Cisco WLC section of the Groups > Basic page to configure settings specific to a Cisco Wireless LANControllers (WLC).
Table 43 describes the settings and default values in this section.
Table 43: Cisco WLC Fields and Default Values
Setting Default Description
SNMP Version 2c Sets the version of SNMP used by AirWave to communicate to WLC
controllers.
CLI Communication SSH Sets the protocol AirWave uses to communicate with Cisco IOS devices.
Selecting SSH uses the secure shell for command line page (CLI) communication. Selecting Telnet sends the data in clear text via Telnet.
When configuring Cisco WLC controllers, refer to "Configuring Wireless Parameters for Cisco Controllers" on
page119.

Proxim/ Avaya

To configure Proxim/Avaya specific settings locate the Proxim/Avaya section of the Groups > Basic page and adjust these settings as required.
Table 44 describes the settings and default values.
Table 44: Proxim/Avaya Settings
Setting Default Description
SNMP Version
1 Sets the version of SNMP used by AMP to communicate to the AP.
AirWave 8.2.10.1 | User Guide Using Device Groups | 97
Table 44: Proxim/Avaya Settings (Continued)
Setting Default Description
Enable DNS Client
Primary DNS server
Secondary DNS server
Default DNS domains
HTTP Server Port
Country Code
No Enables the DNS client on the AP. Enabling the DNS client allows you to set some values on
the AP by hostname instead of IP address. If you select Yes for this setting, additional DNS fields display.
Blank Sets the IP address of the Primary DNS server.
Blank Sets the IP address of the Secondary DNS server.
Blank Sets the default DNS domain used by the AP.
80 Sets this port as the HTTP server port on all Proxim APs in the group.
United States
Configures AMP to derive its time settings based on the country of location, as specified in this field.

HP ProCurve

To configure HP ProCurve specific settings, locate the HP ProCurve section of the Groups > Basic page and adjust these settings as required.
The Table 45 describes the settings and default values.
Table 45: HP ProCurve Settings
Setting Default Description
SNMP Version 2c Sets the version of SNMP used by AirWaveto communicate to the AP.
ProCurve XL/ZWeSM CLI Communication
ControllerSNMP Version
Telnet Sets the protocol AirWave uses to communicate with ProCurve XLWeSM devices.
Selecting SSH will use the secure shell for command line (CLI) communication. Selecting Telnet will send the data in clear text via telnet.
2c Specifies the version of SNMP used by AirWaveto communicate to the controller.

Symbol

To configure settings for Symbol controllers, locate the Symbol section of the Groups > Basic page and adjust these settings as required.
Table 46 describes the settings and default values.
Table 46: Symbol Settings
Setting Default Description
SNMP Version 2c Specifies the version of SNMP used by AWMS to communicate to the device.
98 | Using Device Groups AirWave 8.2.10.1 | User Guide
Table 46: Symbol Settings (Continued)
Setting Default Description
Symbol Client Inactivity Timeout (3-600 min)
Symbol Controller CLI Communication
Web Config Interface
3
Telnet The connection type to support the command-line interface (CLI) connection. The
Yes Enables or disables the http/https configuration page for the Symbol 4131 devices.
Sets the minutes of inactivity after which a client associated to a Symbol AP will be considered "inactive." A lower value typically provides a more accurate representation of current WLAN usage.
NOTE: For other APs, AWMS has more precise methods to determine when inactive clients are no longer associated to an AP.
options are Telnet and secure shell (SSH). This is supported for WS5100, RFS4000, RFS6000 and RFS7000 devices only.

Juniper/3Com/Enterasys/Nortel/Trapeze

To configure SNMP settings for 3Com, Enterasys, Nortel, or Trapeze devices, locate the Juniper/3Com/Enterasys/Nortel/Trapeze section of the Groups > Basic page and click the SNMP Version drop-down list to define the version of SNMP to besupported. The default setting is SNMPv2c.

Universal Devices, Routers and Switches

To configure settings for universal devices on the network, including routers and switches that support both wired and wireless networks,, locate the Juniper/3Com/Enterasys/Nortel/Trapeze section of the Groups > Basic page and click the SNMP Version drop-down list to define the version of SNMP to be supported. The default setting is SNMPv2c.

Automatic Authorization

To control the conditions by which devices are automatically authorized into this group, locate the Automatic Authorization settings section of the Groups > Basic page and adjust these settings as required.
Table 47 describes the automatic authorization options for the device group.
Table 47: Automatic Authorization Fields and Default Values
Setting Default Description
Add New Controllers and Autonomous Devices Location
Add New Thin APs Location
Ignore Device's Configured Folder
Use Global Setting
Use Global Setting
No Enable this option to ignore the folder in the provisioning rule for Aruba
Whether to auto authorize new controllers to the New Devices List, the same Group/Folder as the discovering devices, the same Group/Folder as the closest IP neighbor, and/or a specified auto-authorization group and folder. The Current Global Setting set in AMP Setup > General is shown below this field. Selecting a different option overrides the global setting.
Whether to auto authorize new thin APs to the New Devices List, the same Group/Folder as the discovering devices, the same Group/Folder as the closest IP neighbor, and/or a specified auto-authorization group and folder. The Current Global Setting set in AMP Setup > General is shown below. Selecting a different option overrides the global setting for this group.
switches configured via Activate, DHCP, or the switch comand-line interface.
AirWave 8.2.10.1 | User Guide Using Device Groups | 99

Maintenance Windows

You can use maintenance windows to put multiple devices into Management mode, apply configuration changes to the devices in the group, and then reset them to Monitor-Only mode after the maintenance period is over. For more information, see "Adding a Maintenance Window for a Device" on page 228.

Configuring AAA Servers for Device Groups

Configure RADIUS servers on the Groups > AAA Servers page. Once defined on this page, the Groups > Security and Groups > SSIDs menus appear in the navigation bar, allowing you to select and configure your
RADIUS servers.
If the Groups > AAA Servers page does not appear in the navigation bar, select the group from the Groups > List page, select the Groups > Basic page, then choose the Show Device Settings for : All Devices option in the Group Display Options section of the Groups > Basic page.
1. Go to the Groups > List page and select the group for which to define AAA servers by selecting the group name. The Monitor page appears.
2. Select the AAA Servers page. The AAA Servers page appears, enabling you to add a RADIUS server.
3. To add a RADIUS server or edit an existing server, select Add New RADIUS Server or the corresponding pencil icon to edit an existing server. Table 48 describes the settings and default values of the Add/Edit page.
Table 48: Adding a RADIUS Server Fields and Default Values
Setting Default Description
Hostname/IP Address
Secret and Confirm Secret
Authentication No Sets the RADIUS server to perform authentication when this setting is
Authentication Port (1-65535)
Accounting No Sets the RADIUS server to perform accounting functions when enabled with
Accounting Port (1-
65535)
Timeout (0-86400) None Sets the time (in seconds) that the access point waits for a response from
None Sets the IP Address or DNS name for RADIUS Server.
NOTE: IP Address is required for Proxim/ORiNOCO and Cisco Aironet IOS APs.
None Sets the shared secret that is used to establish communication between
AirWave and the RADIUS server.
NOTE: The shared secret entered in AirWave must match the shared secret on the server.
enabled with Yes.
1812 Appears when Authentication is enabled. Sets the port used for
communication between the AP and the RADIUS server.
Yes.
1813 Appears when Accounting is enabled. Sets the port used for
communication between the AP and the RADIUS server.
the RADIUS server.
Max Retries (0-20)
100 | Using Device Groups AirWave 8.2.10.1 | User Guide
None Sets the number of times a RADIUS request is resent to a RADIUS server
before failing.
NOTE: If a RADIUS server is not responding or appears to be responding slowly, consider increasing the number of retries.
Loading...