ADX, AnyIO, Brocade, Brocade Assurance, the B-wing symbol, DCX, Fabric OS, ICX, MLX, MyBrocade, OpenScript, VCS, VDX, and
Vyatta are registered trademarks, and HyperEdge, The Effortless Network, and The On-Demand Data Center are trademarks of
Brocade Communications Systems, Inc., in the United States and/or in other countries. Other brands, products, or service names
mentioned may be trademarks of their respective owners.
Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning
any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to
this document at any time, without notice, and assumes no responsibility for its use. This informational document describes
features that may not be currently available. Contact a Brocade sales office for information on feature and product availability.
Export of technical data contained in this document may require an export license from the United States government.
The authors and Brocade Communications Systems, Inc. shall have no liability or responsibility to any person or entity with
respect to any loss, cost, liability, or damages arising from the information contained in this book or the computer programs that
accompany it.
The product described by this document may contain “open source” software covered by the GNU General Public License or other
open source license agreements. To find out which open source software is included in Brocade products, view the licensing
terms applicable to the open source software, and obtain a copy of the programming source code, please visit
http://www.brocade.com/support/oscd.
Brocade Communications Systems, Incorporated
Corporate and Latin American Headquarters
Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
Tel: 1-408-333-8000
Fax: 1-408-333-8101
E-mail: info@brocade.com
European Headquarters
Brocade Communications Switzerland Sàrl
Centre Swissair
Tour B - 4ème étage
29, Route de l'Aéroport
Case Postale 105
CH-1215 Genève 15
Switzerland
Tel: +41 22 799 5640
Fax: +41 22 799 5641
E-mail: emea-info@brocade.com
Asia-Pacific Headquarters
Brocade Communications Systems China HK, Ltd.
No. 1 Guanghua Road
Chao Yang District
Units 2718 and 2818
Beijing 100020, China
Tel: +8610 6588 8888
Fax: +8610 6588 9999
E-mail: china-info@brocade.com
Asia-Pacific Headquarters
Brocade Communications Systems Co., Ltd. (Shenzhen WFOE)
Citic Plaza
No. 233 Tian He Road North
Unit 1308 – 13th Floor
Guangzhou, China
Tel: +8620 3891 2000
Fax: +8620 3891 2111
E-mail: china-info@brocade.com
Document History
TitlePublication numberSummary of changesDate
Brocade Mobility RFS Controller System
Reference Guide
• Access Points – Brocade Mobility 650 Access Point, Brocade Mobility 6511 Access Point,
Brocade Mobility 1220 Access Point, Brocade Mobility 7131 Access Point, Brocade Mobility
1240 Access Point
Document conventions
This section describes text formatting conventions and important notice formats used in this
document.
Text formatting
The narrative-text formatting conventions that are used are as follows:
bold textIdentifies command names
Identifies the names of user-manipulated GUI elements
Identifies keywords
Identifies text to enter at the GUI or CLI
italic textProvides emphasis
Identifies variables
Identifies document titles
code textIdentifies CLI output
For readability, command names in the narrative portions of this guide are presented in mixed
lettercase: for example, controllerShow. In actual examples, command lettercase is often all
lowercase. Otherwise, this manual specifically notes those cases in which a command is case
sensitive.
Brocade Mobility RFS Controller System Reference Guidexiii
53-1003099-01
Notes, cautions, and warnings
NOTE
CAUTION
DANGER
The following notices and statements are used in this manual. They are listed below in order of
increasing severity of potential hazards.
A note provides a tip, guidance or advice, emphasizes important information, or provides a reference
to related information.
A Caution statement alerts you to situations that can be potentially hazardous to you or cause
damage to hardware, firmware, software, or data.
A Danger statement indicates conditions or situations that can be potentially lethal or extremely
hazardous to you. Safety labels are also attached directly to products to warn of these conditions
or situations.
Related publications
The following Brocade Communications Systems, Inc. documents supplement the information in
this guide and can be located at http://www.brocade.com/ethernetproducts.
• Brocade Mobility RFS Controller System Reference Guide
(this document) - Describes configuration of the Brocade wireless controllers using the Web UI.
• Brocade Mobility RFS Controller CLI Reference Guide - Describes the Command Line Interface
(CLI) and Management Information Base (MIB) commands used to configure the Brocade
controllers.
If you find errors in the guide, send an e-mail to documentation@brocade.com.
Getting technical help
To contact Technical Support, go to http://www.brocade.com/services-support/index.page for the
latest e-mail and telephone contact information.
xivBrocade Mobility RFS Controller System Reference Guide
53-1003099-01
Chapter
Overview
1
Brocade’ family of Access Points, RFS series controllers and service platforms provide a centralized
distribution of high performance, secure and resilient wireless voice and data services to remote
locations with the scalability required to meet the needs of large distributed enterprises.
Brocade controllers and service platforms provide a single platform capable of delivering wireless
voice and data inside and outside the enterprise for small, medium and large enterprise
deployments. Improve operational efficiency and reduce the cost of mobility with a powerful
comprehensive feature set including adaptive AP, which delivers unmatched performance, security,
reliability and scalability to enable networks for business mobility at a low cost of ownership.
Controllers and service platforms provide local centralized management and control of 802.11n
Access Points. The Access Points themselves provide the necessary core switching and routing
needed to eliminate additional routing and switching infrastructure.
802.11n is the next generation WLAN standard that provides improved performance and coverage
compared with previous 802.11 specifications. 802.11n provides enhancements to support
throughput up to 450 Mbps. With these enhancements Brocade' next generation 802.11n Access
Points offer client data-rates of up to 300Mbps.
The network uses 802.11n Access Points and peer controllers and service platforms to adapt to
the dynamic circumstances of their deployment environment. The architecture provides a
customized site-specific deployment, supporting the best path and routes based on the user,
location, the application and the best route available (both wireless and wired). Brocade Mobility
managed network assures end-to-end quality, reliability and security without latency and
performance degradation. The network supports rapid application delivery, mixed-media
application optimization and quality assurance.
Deploying a new Brocade Mobility managed network does not require the replacement of an
existing Brocade wireless infrastructure. Mobility enables the simultaneous use of existing
architectures from Brocade and other vendors, even if those other architectures are centralized
models. A wireless network administrator can retain and optimize legacy infrastructure while
evolving to Mobility as required. Adaptive Access Points can operate in a dependent environment
and are field-upgradable.
The Brocade Mobility architecture is designed for 802.11n networking. It leverages the best
aspects of independent and dependent architectures to create a smart network that meets the
connectivity, quality and security needs of each user deployment and their application
requirements, based on the availability of network resources, including wired networks.
By distributing intelligence and control between the wireless controllers and Access Points, a
Mobility managed network can route data directly using the best path, as determined by factors
including the user, the location, the application and available wireless and wired resources. As a
result, the additional load placed on the wired network from 802.11n is significantly reduced, as
traffic does not require an unnecessary backhaul to a central controller.
Brocade Mobility RFS Controller System Reference Guide1
53-1003099-01
1
Within a Mobility managed network, up to 80% of the network traffic can remain on the wireless
mesh, and never touch the wired network, so the 802.11n load impact on the wired network is
negligible. In addition, latency and associated costs are reduced while reliability and scalability are
increased. A Mobility managed network enables the creation of dynamic wireless traffic flows, so
any bottleneck is avoided, and the destination is reached without latency or performance
degradation. This behavior delivers a significantly better quality of experience for the end user.
The same distributed intelligence enables more resilience and survivability, since the Access Points
keep users connected and traffic flowing with full QoS, security and mobility even if the connection
is interrupted due to a wired network or backhaul problem.
Even when the network is fully operational, outside RF interference sources or unbalanced wireless
network loading can be automatically corrected by Smart RF. Smart RF senses interference or
potential client connectivity problems and makes the required changes to the operating channel
and Access Point radio power while minimizing the impact to latency sensitive applications like
VoIP. Using Smart RF, the network can continuously adjust Access Point power and channel
assignments for self-recovery if a radio fails or a coverage hole is detected.
Additionally, integrated Access Point sensors, in conjunction with AirDefense Network Assurance,
alert administrators of interference and network coverage problems, which shortens response
times and boosts overall reliability and availability of the network.
Network traffic optimization protects networks from broadcast storms and minimizes congestion
on the wired side of the network. Mobility networks provide VLAN load balancing, WAN traffic
shaping and optimizations in dynamic host configuration protocol (DHCP) responses and Internet group management protocol (IGMP) snooping for multicast traffic flows in wired and wireless
networks. Thus, administrators and users both benefit from an extremely reliable network that
adapts to meet their needs while delivering mixed-media applications.
Firmware and configuration updates are supported from one Access Point to another, over the air
or wire, and can be centrally managed. Controllers no longer need to push firmware and
configurations to each individual Access Point, reducing unnecessary network congestion.
Mobility uses Remote Authentication Dial-in User Service (RADIUS) synchronization capabilities
between the core and the access layer. If the central authentication mechanism is not available,
users can authenticate using local RADIUS resources, and continue network support with secure
access.
2Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
Chapter
NOTE
Web Features
The Brocade Mobility software contains a Web UI allowing network administrators to manage and
view Access Point, controller and service platform settings, configuration data and status. This
Graphical User Interface (GUI) allows full control of all administration features.
Access Points, controllers and service platforms also share a Command Line Interface (CLI) for
managing and viewing settings, configuration and status. For more information on the command
line interface and a full list of available commands, see the Brocade Wireless Services CLI Reference Guide available at
For information on how to access and use the Web UI, see:
• Accessing the Web UI
• Glossary of Icons Used
Accessing the Web UI
2
Brocade Access Points, controllers and service platforms use a UI accessed using any supported
Web browser on a client connected to the subnet the Web UI is configured on.
Browser and System Requirements
To access the UI, a browser supporting Flash Player 11 is required. The system accessing the GUI
should have a minimum of 512Mb or RAM for the UI to display and function properly. The Mobility
UI is based on Flex, and does not use Java as its underlying framework.
The following browsers are required to access the Mobility Web UI:
• Firefox 3.5 or higher
• Internet Explorer 7 or higher
• Google Chrome
Throughout the Web UI leading and trailing spaces are not allowed in any text fields. In addition, the
“?” character is also not supported in text fields.
Connecting to the Web UI
Connect one end of an Ethernet cable to a LAN port on the front of the controller or service
platform and connect the other end to a computer with a working Web browser.
Set the computer to use an IP address between 192.168.0.10 and 192.168.0.250 on the
connected port. Set a
subnet/network mask of 255.255.255.0.
Brocade Mobility RFS Controller System Reference Guide3
53-1003099-01
2
Once the computer has an IP address, point the Web browser to: https://192.168.0.1/ and the
following login screen will display.
FIGURE 1Web UI Login Screen
Enter the default username admin in the Username field.
Enter the default password admin123 in the Password field.
Click the Login button to load the management interface.
If this is the first time the UI has been accessed, a dialogue displays to begin an initial
setup wizard. For more information on using the initial setup wizard see Using the Initial
Setup Wizard.
Glossary of Icons Used
The UI uses a number of icons used to interact with the system, gather information, and obtain
status for the entities managed by the system. This chapter is a compendium of the icons used.
This chapter is organized as follows:
• Global Icons
• Dialog Box Icons
• Table I c o n s
• Status Icons
• Configurable Objects
• Configuration Objects
• Configuration Operation Icons
• Access Type Icons
• Administrative Role Icons
•Device Icons
4Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
Global Icons
Glossary of Icons Used
This section lists global icons available throughout the interface.
Logout– Select this icon to log out of the system. This icon is always available and is located
at the top right corner of the UI.
Add – Select this icon to add a row in a table. When selected, a new row is created in the
table or a dialog box displays where you can enter values for a particular list.
Delete – Select this icon to remove a row from a table. When selected, the selected row is
deleted.
More Information – Select this icon to display a pop up with supplementary information that
may be available for an item.
2
Dialog Box Icons
Glossary of Icons Used
Tra sh – Select this icon to remove a row from a table. When selected, the row is immediately
deleted.
Create new policy – Select this icon to create a new policy. Policies define different
configuration parameters that can be applied to individual device configurations, profiles
and RF Domains.
Edit policy – Select this icon to edit an existing configuration item or policy. To edit a policy,
select a policy and this icon.
Brocade Mobility RFS Controller System Reference Guide5
53-1003099-01
2
These icons indicate the current state of various controls in a dialog. These icons enables you to
gather the status of all the controls in a dialog. The absence of any of these icons next to a control
indicates the value in that control has not been modified from its last saved configuration.
Entry Updated – Indicates a value has been modified from its last saved configuration.
Entry Update – States that an override has been applied to a device profile
configuration.
Mandatory Field – Indicates this control value is a mandatory configuration item. You
are not allowed to proceed further without providing all mandatory values in this dialog.
Error in Entry – Indicates there is an error in a supplied value. A small red popup
provides a likely cause of the error.
Table Icons
Glossary of Icons Used
The following two override icons are status indicators for transactions:
Table Row Overridden – Indicates a change (profile configuration override) has been
made to a table row and the change will not be implemented until saved. This icon
represents a change from this device’s profile assigned configuration.
Table Row Added – Indicates a new row has been added to a table and the change is
not implemented until saved. This icon represents a change from this device’s profile
assigned configuration.
Status Icons
Glossary of Icons Used
6Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
2
These icons indicate device status, operations, or any other action that requires a status returned
to the user.
Fatal Error – States there is an error causing a managed device to stop functioning.
Error – Indicates an error exits requiring intervention. An action has failed, but the error
is not system wide.
Warning – States a particular action has completed, but errors were detected that did
not prevent the process from completing. Intervention might still be required to resolve
subsequent warnings.
Success – Indicates everything is well within the network or a process has completed
successfully without error.
Information – This icon always precedes information displayed to the user. This may
either be a message displaying progress for a particular process, or just be a message
from the system.
Configurable Objects
Glossary of Icons Used
These icons represent configurable items within the UI.
Device Configuration – Represents a configuration file supporting a device category
(Access Point, wireless controller etc.).
Auto Provisioning Policy – Represents a provisioning policy. Provisioning policies are a
set of configuration parameters that define how Access Points and wireless clients are
adopted and their management configuration supplied.
Critical Resource Policy – States a critical resource policy has been applied. Critical
resources are resources whose availability is essential to the network. If any of these
resources is unavailable, an administrator is notified.
Wireless LANs – States an action impacting a managed WLAN has occurred.
WLAN QoS Policy – States a quality of service policy (QoS) configuration has been
impacted.
Brocade Mobility RFS Controller System Reference Guide7
53-1003099-01
2
Radio QoS Policy – Indicates a radio’s QoS configuration has been impacted.
AAA Policy – Indicates an Authentication, Authorization and Accounting (AAA) policy
has been impacted. AAA policies define RADIUS authentication and accounting
parameters.
Association ACL – Indicates an Access Control List (ACL) configuration has been
impacted. An ACL is a set of configuration parameters either allowing or denying
access to network resources.
Smart RF Policy – States a Smart RF policy has been impacted. Smart RF enables
neighboring Access Point radios to take over for an Access Point radio if it becomes
unavailable. This is accomplished by increasing the power of radios on nearby Access
Points to compensate for the coverage hole created by the non-functioning Access
Point.
Profile – States a device profile configuration has been impacted. A profile is a
collection of configuration parameters used to configure a device or a feature.
Bridging Policy – Indicates a bridging policy configuration has been impacted. A
bridging policy defines which VLANs are bridged, and how local VLANs are bridged
between the wired and wireless sides of the network.
RF Domain – States an RF Domain configuration has been impacted.
Firewall Policy – Indicates a firewall policy has been impacted. Firewalls provide a
barrier that prevents unauthorized access to resources while allowing authorized
access to external and internal resources.
IP Firewall Rules – Indicates an IP firewall rule has been applied. An IP based firewall
rule implements restrictions based on the IP address in a received packet.
MAC Firewall Rules – States a MAC based firewall rule has been applied. A MAC based
firewall rule implements network allowance restrictions based on the MAC address in a
received data packet.
Wireless Client Role – Indicates a wireless client role has been applied to a managed
client. The role could be either sensor or client.
WIPS Policy – States the conditions of a WIPS policy have been invoked. WIPS prevents
unauthorized access to the network by checking for (and removing) rogue Access
Points and wireless clients.
8Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
Advanced WIPS Policy – States the conditions of an advanced WIPS policy have been
invoked.
Device Categorization – Indicates a device categorization policy has been applied. This
is used by the intrusion prevention system to categorize Access Points or wireless
clients as either sanctioned or unsanctioned devices. This enables devices to bypass
the intrusion prevention system.
Captive Portals – States a captive portal is being applied. Captive portal is used to
provide temporary controller, service platform or Access Point access to requesting
wireless clients.
DNS Whitelist – A DNS whitelist is used in conjunction with captive portal to provide
access to requesting wireless clients.
DHCP Server Policy – Indicates a DHCP ser ver policy is being applied. DHCP provides IP
addresses to wireless clients. A DHCP server policy configures how DHCP provides IP
addresses.
2
RADIUS Group – Indicates the configuration of RADIUS group has been defined and
applied. A RADIUS group is a collection of RADIUS users with the same set of
permissions.
RADIUS User Pools – States a RADIUS user pool has been applied. RADIUS user pools
are a set of IP addresses that can be assigned to an authenticated RADIUS user.
RADIUS Server Policy – Indicates a RADIUS server policy has been applied. A RADIUS
server policy is a set of configuration attributes used when a RADIUS server is
configured for AAA.
Smart Caching Policy – Smart Caching enables NX4500 and NX6500 series service
platforms to temporarily store frequently accessed Web content on network
infrastructure devices.
Management Policy – Indicates a management policy has been applied. Management
policies configure access control, authentication, traps and administrator permissions.
Configuration Objects
Glossary of Icons Used
Brocade Mobility RFS Controller System Reference Guide9
53-1003099-01
2
These configuration icons are used to define the following:
Configuration – Indicates an item capable of being configured by an interface.
View Events / Event History – Defines a list of events. Click this icon to view events or
view the event history.
Core Snapshots – Indicates a core snapshot has been generated. A core snapshot is a
file that records status events when a process fails on a wireless controller or Access
Point.
Panic Snapshots – Indicates a panic snapshot has been generated. A panic snapshot
is a file that records status when a wireless controller or Access Point fails without
recovery.
UI Debugging – Select this icon/link to view current NETCONF messages.
View UI Logs – Select this icon/link to view the different logs generated by the UI, FLEX
and the error logs.
Configuration Operation Icons
Glossary of Icons Used
The following operations icons are used to define configuration operations:
Revert – When selected, any unsaved changes are reverted to their last saved
configuration settings.
Commit – When selected, all changes made to the configuration are written to the
system. Once committed, changes cannot be reverted.
Commit and Save – When selected, changes are saved to the configuration.
Access Type Icons
Glossary of Icons Used
10Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
The following icons display a user access type:
Web UI – Defines a Web UI access permission. A user with this permission is permitted
to access an associated device’s Web UI.
Tel net – Defines a TELNET access permission. A user with this permission is permitted
to access an associated device using TELNET.
SSH – Indicates a SSH access permission. A user with this permission is permitted to
access an associated device using SSH.
Console – Indicates a console access permission. A user with this permission is
permitted to access an associated device using the device’s serial console.
Administrative Role Icons
2
Glossary of Icons Used
The following icons identify the different administrative roles allowed on the system:
Superuser – Indicates superuser privileges. A superuser has complete access to all
configuration aspects of the connected device.
System – States system user privileges. A system user is allowed to configure general
settings, such as boot parameters, licenses, auto install, image upgrades etc.
Network – Indicates network user privileges. A network user is allowed to configure
wired and wireless parameters, such as IP configuration, VLANs,
L2/L3 security, WLANs and radios.
Security – Indicates security user privileges. A security level user is allowed to
configure all security related parameters.
Brocade Mobility RFS Controller System Reference Guide11
53-1003099-01
2
Monitor – Defines a monitor role. This role provides no configuration privileges. A user
with this role can view the system configuration but cannot modify it.
Help Desk – Indicates help desk privileges. A help desk user is allowed to use
troubleshooting tools like sniffers, execute service commands, view or retrieve logs and
reboot the controller or service platform.
Web User – Indicates a web user privilege. A Web user is allowed accessing the
device’s Web UI.
Device Icons
Glossary of Icons Used
The following icons represent the different device types managed by the system:
System – This icon represents the entire Mobility supported system, and all of its
member controller, service platform or Access Points that may be interacting at any
one time.
Cluster – This icon represents a cluster. A cluster is a set of wireless controllers or
service platforms working collectively to provide redundancy and load sharing
amongst its members.
Service Platform – This icon indicates an NX45xx, NX65xx or NX9000 series service
platform that’s part of the managed network
Wireless Controller – This icon indicates a RFS6000 or a RFS7000 wireless controller
that’s part of the managed network.
Wireless Controller – This icon indicates a RFS4000 wireless controller that’s part of
the managed network.
Access Point – This icon lists any Access Point that’s part of the managed network.
Wireless Client – This icon defines any wireless client connection within the network.
12Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
Chapter
Quick Start
RFS4011 model controllers utilize an initial setup wizard to streamline getting on the network for
the first time. This wizard configures location, network and WLAN settings and assists in the
discovery of Access Points and their connected clients. For instructions on how to use the initial
setup wizard, see Using the Initial Setup Wizard on page 3-13.
Using the Initial Setup Wizard
Once deployed and powered on, complete the following to get the controller or service platform up
and running and access more advanced user interface functions:
1. Connect one end of an Ethernet cable to a port on the front of the controller or service
platform, and connect the other end to a computer with a working Web browser.
2. Set the computer to use an IP address between 192.168.0.10 and 192.168.0.250 on the
connected port. Set a
subnet/network mask of 255.255.255.0.
3. Once the computer has an IP address, point the Web browser to: https://192.168.0.1/. The
following login screen displays.
3
FIGURE 1Web UI Login Screen
Enter the default username admin in the Username field.
4. Enter the default password admin123 in the Password field.
Select the preferred language to display for the graphical user interface (GUI).
Brocade Mobility RFS Controller System Reference Guide13
53-1003099-01
3
NOTE
NOTE
5. Select the Login button to load the management interface.
When logging in for the first time, you are prompted to change the password to enhance device
security in subsequent logins.
If you get disconnected when running the wizard, you can connect again and resume the wizard
setup.\
FIGURE 2Initial Setup Wizard - Introduction
The Introduction screen displays first (on the right-hand side of the screen), and lists the
various actions that can be performed using the setup wizard.
The wizard displays a Navigation Panel on the left-hand side of each screen to assist the
administrator in assessing which tasks still require completion before the RFS4011,
NX4500 or NX6500 can be deployed.
14Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
FIGURE 3Initial Setup Wizard - Navigation Panel
NOTE
A green checkmark to the left of an item in the Navigation Panel defines the task as having
its minimum required configuration set correctly. A red X defines a task as still requiring at
least one parameter be defined correctly.
Select Save/Commit within each page to save the updates made to that page's
configuration. Select Next to proceed to the next page listed in the Navigation Panel.
Select Back to revert to the previous screen in the Navigation Panel without saving your
updates. Selecting Cancel closes the wizard without committing any updates.
3
While you can scroll to any page in the Navigation Panel at any time, you cannot complete the wizard
until each task in the Navigation Panel has a green checkmark displayed to the left of the task.
6. Select Next. The wizard displays the Networking Mode screen to define routing or bridging
functionality
.
Brocade Mobility RFS Controller System Reference Guide15
53-1003099-01
3
FIGURE 4Initial Setup Wizard - Networking Mode
7.Select one of the following network mode options:
• Router Mode - In Router Mode, connected Access Points route traffic between the local
network (LAN) and the Internet or external network (WAN). Router mode is recommended
in a deployment supported by just a single Access Point. When Router Mode is selected,
an additional WAN screen is available in wizard screen flow to configure interface settings
for an Access Point’s WAN port.
• Bridge Mode - In Bridge Mode, connected Access Points depend on an external router for
routing LAN and WAN traffic. Routing is generally used on one device, whereas bridging is
typically used in a larger network. Thus, select Bridge Mode when deploying numerous
peer Access Points supporting clients on both the 2.4 and 5GHz radio bands.
Select Next. The wizard displays the LAN Configuration screen to set the LAN interface
configuration.
16Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
3
FIGURE 5Initial Setup Wizard - LAN Configuration
Set the following DHCP, Static IP Address/Subnet and VLAN information for the LAN interface:
• Use DHCP - Select Use DHCP to enable an automatic network address configuration using
local DHCP server resources.
• Static IP Address/Subnet - Enter an IP Address and a subnet for the LAN interface. If Use
DHCP is selected, this field is not available. When selecting this option, define the
following DHCP Server and Domain Name Server (DNS) resources, as those fields are
enabled on the bottom portion of the screen.
• Use on-board DHCP server to assign IP addresses to wireless clients -Select this
option to enable the DHCP server to provide IP and DNS support to requesting clients
on the LAN interface.
• Range - Enter a starting and ending IP Address range for client assignments on the
LAN interface. Avoid assigning IP addresses from x.x.x.1 - x.x.x.10 and x.x.x.255, as
they are often reserved for standard network services. This is a required parameter.
• Default Gateway - Define a default an address for use with the default gateway. This is
a required parameter.
• DNS Forwarding - Select this option to allow a DNS server to translate domain names into
IP addresses. If this option is not selected, a primary and secondary DNS resource must
be specified. DNS forwarding is useful when a request for a domain name is made but the
DNS server, responsible for converting the name into its corresponding IP address, cannot
locate the matching IP address.
Brocade Mobility RFS Controller System Reference Guide17
53-1003099-01
3
• Primary DNS - Enter an IP Address for the main Domain Name Server providing DNS
services for the LAN interface.
• Secondary DNS - Enter an IP Address for the backup Domain Name Server providing
DNS services for the LAN
interface.
Use the spinner control to select a VLAN ID for the LAN Interface. Optionally select Advanced VLAN
Configuration to populate the screen with additional VLAN parameters for the LAN interface.
Select Next. If Router was selected as the Access Point mode the wizard displays the WAN
Configuration screen. If Bridge was selected, the wizard proceeds to the Wireless LAN Setting
screen.
FIGURE 6Initial Setup Wizard - WAN Configuration
Set the following DHCP and Static IP Address/Subnet information to define how traffic is routed
between the local network (LAN) and the Internet or external network (WAN).
• Use DHCP - Select Use DHCP to enable an automatic network address configuration using
local DHCP server resources.
• Static IP Address/Subnet - Enter an IP Address/Subnet and gateway for the WAN interface.
These are required fields
• Default Gateway -Enter an IP Address for the default gateway on the WAN interface. If
Use DHCP is enabled, this field is not configurable.
18Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
• VLAN ID for the WAN Interface - Set the VLAN ID (virtual interface) to associate with
the physical WAN Interface. The default setting is VLAN 2100.
• Port for External Network - Select the physical port connected to the WAN interface.
The list of available ports varies based on the RFS4011 controllers or NX4500 and
NX6500 service platform model.
• Enable NAT on the WAN Interface - Select the option to allow traffic to pass between
WAN and LAN interfaces.
Select Next. The wizard displays the Wireless LAN Setting screen to define up to four WLAN
configurations for the controller or service platform.
3
FIGURE 7Initial Setup Wizard - Wireless LAN Settings
Set the following parameters for up to four WLAN configurations:
• SSID - Enter or modify the Services Set Identification (SSID) associated with the WLAN. The
WLAN name is
auto-generated using the SSID until changed by the administrator. The maximum number
of characters is 32. Do not use any of these characters (< > | " & \ ? ,).
• WLAN Type - Select a basic authentication and encryption scheme for the WLAN. Available
options include:
• No Authentication and No Encryption (provides no security at all)
• Captive Portal Authentication and No Encryption
• PSK authentication, WPA2 encryption
Brocade Mobility RFS Controller System Reference Guide19
53-1003099-01
3
• EAP Authentication and WPA2 Encryption
Select Next. The wizard displays the System Information screen to set device deployment,
administrative contact and system time information. The system time can either be set manually or
be supplied by a dedicated Network Time Protocol (NTP) resource.
FIGURE 8Initial Setup Wizard - System Information
Refer to the Country and Time Zone field to set the following deployment information:
• Password - Enter and confirm a system password used to login into the controller or
service platform on subsequent login attempts.Changing the default system password is
strongly recommended to secure the proprietary configuration data maintained on the
controller or service platform.
• Location - Define the location of the controller or service platform deployment.
• Contact - Specify the contact information for the administrator. The credentials provided
should accurately reflect the individual responding to service queries.
• Country - Select the country where the controller or service platform is deployed. The
controller or service platform prompts for the correct country code on the first login. A
warning message also displays stating an incorrect country setting may result in illegal
radio operation. Selecting the correct country is central to legal operation. Each country
has its own regulatory restrictions concerning electromagnetic emissions and the
maximum RF signal strength that can be transmitted.
20Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
3
• Time Zone - Set the time zone where the controller or service platform is deployed. This is
a required parameter. The setting should be complimentary with the selected deployment
country.
Refer to the Select protocols that will be enabled for device access area and enable those
controller or service platform interfaces for accessing the controller or service platform. HTTP and
Telnet are considered relatively insecure and only should be enabled is necessary.
Select Next. The wizard displays the Summary and Commit screen to summarize the screens
(pages) and settings updated using the wizard.
FIGURE 9Initial Setup Wizard - Summary and Commit
No user intervention or additional settings are required within this screen. Its an additional
means of validating the Access Point’s updated configuration before its deployed.
However, if a screen displays settings not intended as part of the initial configuration, the
any screen can be selected again from within the Navigation Panel and its settings
modified accordingly.
If the configuration displays as intended, select Save/Commit to implement these settings to the
controller or service platform configuration. If additional changes are warranted based on the
summary, either select the target page from the Navigational Panel, or use the Back and Next
buttons to scroll to the target screen.
Brocade Mobility RFS Controller System Reference Guide21
53-1003099-01
3
22Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
Chapter
Dashboard
Summary
4
The dashboard enables administrators to review and troubleshoot network device operation.
Additionally, the dashboard allows an administrative review of the network’s topology, an
assessment of network’s component health and a diagnostic review of device performance.
By default, the Dashboard displays the System screen, which is the top level in the device
hierarchy. To view information for Access Points, RF Domains or Controllers select the associated
item in the tree.
The Dashboard displays information organized by device association and inter-connectivity
between the connected Access Points and wireless clients.
1. To review dashboard information, select Dashboard.
2. Select Summary if its not already selected by default.
The Dashboard displays the Health tab by default.
Brocade Mobility RFS Controller System Reference Guide23
53-1003099-01
4
FIGURE 1System Dashboard screen - Health tab
Device Listing
Summary
The device menu displays information as a hierarchical tree, comprised of system,
controller/service platform and Access Point connection relationships.
24Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
4
FIGURE 2Dashboard Menu Tree
The Search option, at the bottom of the screen, enables you to filter (search amongst) RF Domains.
The By drop-down menu refines the search. You can further refine a search using the following:
• Auto – The search is automatically set to device type.
• Name – The search is performed for the device name specified in the Search text box.
• WLAN – The search is performed for the WLAN specified in the Search text box.
• IP Address – The search is performed for the IP Address specified in the Search text box.
• MAC Address – The search is performed for the MAC Address specified in the Search text box.
System Screen
The System screen displays system-wide network status. The screen is partitioned into the
following tabs:
• Health – The Health tab displays information about the state of the Mobility device managed
• Inventory – The Inventory tab displays information on the physical devices managed within the
Health
Health
The Health tab displays device performance status for managed devices, and includes their RF
Domain memberships.
To assess system health:
1. Select Dashboard.
2. Select Summary if its not already selected by default.
3. Select System. The Health tab displays by default.
system.
Mobility wireless network.
Brocade Mobility RFS Controller System Reference Guide25
53-1003099-01
4
FIGURE 3System Dashboard screen - Health tab
The Health screen is partitioned into the following fields:
• The Devices field displays a ratio of offline versus online devices within the system. The
information is displayed in pie chart format to illustrate device support ratios.
• The Device Type field displays a numerical representation of the different controller, service
platform and Access Point models in the current system. Their online and offline device
connections are also displayed. Does this device distribution adequately support the number
and types of Access Point radios and their client load requirements.
• The Offline Devices field displays a table of supported RF Domains within the system, with
each RF Domain listing the number offline devices within that RF Domain. Listed RF Domains
display as individual links that can be selected to RF Domain information in greater detail.
• The RF Quality Index displays RF quality per RF Domain. It's a measure of the overall
effectiveness of the RF environment displayed in percentage. It's a function of the connect rate
in both directions, retry rate and error rate.
The RF Quality field displays an average quality index supporting each RF Domain. The table
lists the bottom five (5) RF quality values for RF Domains. Listed RF Domains display as
26Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
4
individual links that can be selected to RF Domain information in greater detail. Use this
diagnostic information to determine what measures can be taken to improve radio
performance in respect to wireless client load and the radio bands supported.
The quality is measured as:
• 0-20 – Very poor quality
• 20-40 – Poor quality
• 40-60 – Average quality
• 60-100 – Good quality
• The System Security field displays RF intrusion prevention stats and their associated threat
level. The greater the number of unauthorized devices, the greater the associated threat level.
The System Security field displays a list of up to five RF Domains in relation to the number of
associated wireless clients. The RF Domains appear as links that can be selected to display RF
Domain information in greater detail.
Inventory
System Screen
The system screen’s Inventory tab displays granular data on specific devices supported within the
network. The screen provides a complete overview of the number and state Mobility managed
devices. Information is displayed in easy to read tables and graphs. This screen also provides links
for more detailed information.
To assess the system inventory:
1. Select Dashboard.
2. Select Summary if its not already selected by default.
3. Select System.
4. Select the Inventory tab.
Brocade Mobility RFS Controller System Reference Guide27
53-1003099-01
4
FIGURE 4System screen - Inventory tab
The information within the Inventory tab is partitioned into the following fields:
• The Devices field displays a ratio of peer controllers and service platforms as well as their
managed Access Point radios. The information is displayed in pie chart format. The Device Type
field displays a numerical representation of the different controller models and connected
Access Points in the current system.
• The Radios field displays top performing radios, their RF Domain memberships and a status
time stamp. RF Domain information can be selected to review RF Domain membership
information in greater detail.Information in the Radio area is presented in two tables. The first
lists the total number of Radios managed by this system, the second lists the top five RF
Domains in terms of the number of available radios.Information in the Radio area is presented
in two tables. The first lists the total number of Radios managed by this system, the second
lists the top five RF Domains in terms of the number of available radios.
• The wireless Clients field lists the top five RF Domains with the highest total number of clients
managed by connected devices in this system. Select Refresh as needed update the screen to
its latest values.
28Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
RF Domain Screen
RF Domains allow administrators to assign configuration data to multiple devices deployed in a
common coverage area, such as in a floor, building or site. Each RF Domain contains policies that
can determine a Smart RF or WIPS configuration.RF Domains enable administrators to override
WLAN SSID name and VLAN assignments. This enables the deployment of a global WLAN across
multiple sites and unique SSID name or VLAN assignments to groups of Access Points servicing the
global WLAN. This WLAN override technique eliminates the requirement for defining and managing
a large number of individual WLANs and profiles.
A configuration contains (at a minimum) one default RF Domain and can optionally use additional
user defined RF Domains:
• Default RF Domain - Automatically assigned to each controller or service platform and associated
Access Point by default.
• User Defined RF Domains - Created by administrators and manually assigned to individual
controller or service platforms, but can be automatically assigned to Access Points using adoption
policies.
Each controller and service platform is assigned to only one RF Domain at a time. However, a user
defined RF Domain can be assigned to multiple controllers or service platforms as required. User
defined RF Domains can be manually assigned or automatically assigned to Access Points using an
AP provisioning policy.
4
The RF Domain screen displays system-wide network status. The screen is partitioned into the
following tabs:
• RF Domain Health – The Health tab displays information about the state of the RF Domain and
network performance as tallied from its collective device members.
• RF Domain Inventory – The Inventory tab displays information on the physical devices
comprising the RF Domain.
RF Domain Health
The Health tab displays the status of the RF Domain’s device membership.
To assess the RF Domain health:
1. Select Dashboard.
2. Select Summary if its not already selected by default.
3. Expand the System node to display RF Domains.
4. Select a RF Domain. The Health tab displays by default.
Brocade Mobility RFS Controller System Reference Guide29
53-1003099-01
4
FIGURE 5RF Domain screen - Health tab
Refer to the following RF Domain health information for member devices:
• The Domain field lists the RF Domain manager reporting utilization statistics. The MAC address
displays as a link that can be selected to display RF Domain information in at more granular
level.
• The Devices field displays the total number of devices and the status of the devices in the
network as a graph. This area displays the total device count managed by this device and their
status (online vs. offline) as a pie graph.
• The Radio Quality table displays a table of RF quality on a per radio basis. It is a measure of the
overall effectiveness of the RF environment displayed in percentage. It is a function of the
transmit retry rate in both directions and the error rate. This area of the screen displays the
average quality index across all the defined RF Domain on the wireless controller. The table
lists worst five of the RF quality values of all the radios defined on the wireless controller. The
quality is measured as:
• 0-20 - Very poor quality
• 20-40 - Poor quality
• 40-60 - Average quality
30Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
4
• 60-100 - Good quality
Select a Radio Id to view all the statistics for the selected radio in detail.
• The Client Quality table displays RF quality for the worst five performing clients.It is a function
of the transmit retry rate in both directions and the error rate. This area of the screen displays
the average quality index across all the defined RF Domain on the wireless controller. The
quality is measured as:
• 0-20 - Very poor quality
• 20-40 - Poor quality
• 40-60 - Average quality
• 60-100 - Good quality
Select a client to view its statistics in greater detail.
• WLAN Utilization displays how efficiently the WLANs are used. Traffic utilization is defined as
the percentage of current throughput relative to the maximum possible throughput for the
WLAN. The total number of WLANs is displayed above the table. The table displays a list of the
top five WLANs in terms of overall traffic utilization. It displays the utilization level names,
WLAN name and SSIDs for each of the top five WLANs.
• Radio Traffic Utilization displays how efficiently the RF medium is used. Traffic utilization is
defined as the percentage of current throughput relative to the maximum possible throughput
for the RF Domain. The Traffic Index area displays an overall quality level for radio traffic and
the Max User Rate displays the maximum data rate of associated radios. The table displays a
list of the top five radios in terms of overall traffic utilization quality. It displays the radio
names, MAC Addresses and radio types for each of the top five radios.
• Client Traffic Utilization displays how efficiently the RF medium is utilized for connected clients.
Traffic utilization is defined as the percentage of current throughput relative to the maximum
possible throughput for the clients in the RF Domain. The table displays a list of the top five
performing clients in respect to overall traffic utilization. It displays the client names, MAC
Addresses and vendor for each of the top five clients.
• The Wireless Security field displays the overall threat index for the system. This index is based
on the number of Rogue/Unsanctioned APs and Wireless Intrusion Protection System (WIPS)
events. The index is in the range 0 to 5 where 0 indicates that there are no detected threats.
An index of 5 indicates that a large number of intrusion detection events or
rogue/unsanctioned APs detected.
• Traffic Statistics include transmit and receive values for Total Bytes, Total Packets, User Data
Rate,Broadcast/Multicast Packets, Management Packets, Tx Dropped Packets and Rx Errors.
RF Domain Inventory
Refer to the following RF Domain inventory data collected by member controllers, service platforms
or Access Points:
To review the RF Domain inventory:
1. Select Dashboard.
2. Select Summary if its not already selected by default.
3. Expand the System node to display RF Domains.
4. Select a RF Domain.
Brocade Mobility RFS Controller System Reference Guide31
53-1003099-01
4
5. Select the Inventory tab.
FIGURE 6RF Domain screen - Inventory tab
The Inventory tab displays information on the devices managed by RF Domain member devices in
the controller, service platform or Access Point managed network. The Inventory screen enables an
administrator to overview of the number and state of the devices in the selected RF Domain.
Information is displayed in easy to read tables and graphs.
• The Device Types table displays the devices types populating the RF Domain. The Device Type
area displays an exploded pie chart that displays the type of device and their numbers in the
RF Domain.
• The Radios by Band table displays a bar graph of RF Domain member device radios classified
by their radio band or sensor dedication. Review this information to assess whether RF Domain
member radios adequately support client device traffic requirements.
• The Radios by Channel table displays pie charts of the different channels utilized by Rf Domain
member radios. These dedicated channels should be as segregated as possible from one
another to avoid interference. If too many radios are utilizing a single channel, consider
off-loading radios to non utilized channels to improve RF Domain performance.
• The Top 5 Ra d i o s by Clients table displays a list of radios that have the highest number of
clients. This list displays the radio IDs as links that can be selected to display individual radio
information in greater detail.
32Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
Controller
4
• The WLANs table displays a list of WLANs utilized by RF Domain member devices. The table is
ordered by WLAN member device radio count and their number of connected clients. Use this
information to assess whether the WLAN is overly populated by radios and clients contributing
to congestion.
• The Client of Channels table displays a bar-graph of wireless clients classified by their
frequency. Information for each channel is further classified by their 802.11x band. In the
5GHz channel, information is displayed classified under 802.11a and 802.11an bands. In the
2.4 GHz channel, information is displayed classified under 802.11b, 802.11bg, and
802.11bgn band.
The Wireless Controller screen displays system collected network status for controllers and service
platforms. The screen is partitioned into two tabs:
• Controller Health – The Health tab displays information about the state of the controller or
service platform managed wireless network.
• Controller Inventory – The Inventory tab displays information on the physical devices managed
by the controller or service platform.
Controller Health
To assess the controller or service platform’s network health:
1. Select Dashboard.
2. Select Summary if its not already selected by default.
3. Expand the System node to display RF Domains.
4. Select and expand a RF Domain to expose its member controllers or service platforms.
5. Select a controller or service platform. The Health tab display by default.
Brocade Mobility RFS Controller System Reference Guide33
53-1003099-01
4
FIGURE 7Wireless Controller screen - Health tab
Refer to the Device Details table for information about the selected controller or service platform
The following information is displayed:
• Hostname - Lists the administrator assigned name of the controller or service platform.
• Device MAC - Lists the factory encoded MAC address of the controller or service platform.
• Typ e - Indicates the type of controller or service platform. An icon representing the RFS
controller is displayed along with the model number.
• RF Domain Name - Lists the RF Domain to which the controller or service platform belongs. The
RF Domain displays as a link that’s selectable to display Rf Domain data in greater detail.
• Model Number - Lists the model number and hardware SKU information of the selected
controller or service platform to refine its intended deployment region.
• Version - Lists the firmware version currently running on the controller or service platform.
Compare this version against the version currently on the support site to ensure the controller
or service platform has the latest feature set available.
• Uptime - Displays the duration the controller or service platform has been running since it was
last restarted.
• CPU - Displays the CPU installed on this controller or service platform.
34Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
4
• RAM - Displays the amount of RAM available for use in this system.
• System Clock - Displays the current time set on the controller or service platform.
The Adopted Devices Health (w/ cluster members) displays a graph of Access Points in the system
with the available Access Points in green and unavailable Access Points in red.
The Radio RF Quality Index provides a table of RF quality on a per radio basis. It is a measure of the
overall effectiveness of the RF environment displayed in percentage. It is a function of the connect
rate in both directions, the retry rate and the error rate. The screen displays the average quality
index within the Access Point single radio. The table lists bottom five (5) of the RF quality values by
Access Point radio. The quality is measured as:
• 0-20 - Very poor quality
• 20-40 - Poor quality
• 40-60 - Average quality
• 60-100 - Good quality
Select a radio Id to view statistics in greater detail.
The Radio Utilization table displays how efficiently the RF medium is used. Radio utilization is
defined as the percentage of current throughput relative to the maximum possible throughput for
the radio. The Radio Utilization table displays the Access Point radios in terms of the number of
associated wireless clients and the percentage of utilization. It also displays a table of packets
types transmitted and received.
The Client RF Quality table displays a table of RF quality on a per client basis. It is a measure of the
overall effectiveness of the RF environment displayed in percentage. It is a function of the connect
rate in both directions, the retry rate and the error rate. This area of the screen displays the average
quality index for a client. The table lists bottom five (5) of the RF quality values by a client. Quality is
measured as:
• 0-20 - Very poor quality
• 20-40 - Poor quality
• 40-60 - Average quality
• 60-100 - Good quality
Select a client MAC to view all the statistics for the selected client in greater detail.
Controller Inventory
The Inventory tab displays information for the devices managed by the system. This screen enables
a system administrator to have a complete overview of the number and state of managed devices.
Information is displayed in easy to read tables and graphs. The Inventory screen also provides links
for the system administrator to get more detailed information.
To assess the controller or service platform inventory:
1. Select Dashboard.
2. Select Summary if its not already selected by default.
3. Expand the System node to display RF Domains.
4. Select and expand a RF Domain to expose its member controllers or service platforms.
5. Select a controller or service platform.
Brocade Mobility RFS Controller System Reference Guide35
53-1003099-01
The Inventory tab displays information on the devices managed by the controller or service
platform. The Inventory screen enables an administrator to overview of the number and state of
controller or service platform managed devices and their utilization. Refer to the following Inventory
data:
• The Device Types field displays a ratio of devices managed by this controller or service platform
in pie chart format. The Device Type area displays an exploded pie chart that displays the type
of device and their numbers in the current system.
• The Radios Type field displays the total number of radios managed by this controller or service
platform. The graph lists the number of radios in both the 2.4 GHz and 5 GHz radio bands.
• The Wireless Clients table lists clients managed by this controller or service platform by
connected client count. Information is presented in two (2) tables and a graph. The first table
lists the total number of clients managed by the listed controller or service platform. The
second lists the top five (5) radios in terms of the number of connected clients. The graph just
below the table lists the number of clients by radio type.
36Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
• The WLAN Utilization table displays utilization statistics for controller or service platform WLAN
configurations. Information displays in two tables. The first table lists the total number of
WLANs managed by this system. The second table lists the top five (5) WLANs in terms of the
usage percentage along with the name and network identifying SSID.
Access Point Screen
The Access Point screen displays system-wide network status for standalone or controller
connected Access Points. The screen is partitioned into the following tabs:
• Access Point Health – The Health tab displays information about the state of the Access Point
managed network.
• Access Point Inventory – The Inventory tab displays information on the physical devices
managed within the Access Point managed network.
Access Point Health
To assess Access Point network health:
1. Select Dashboard.
4
2. Select Summary if its not already selected by default.
3. Expand the System node to display RF Domains.
4. Select and expand a RF Domain to expose its member controllers or service platforms.
5. Select a controller or service platform and expand the menu item to display connected Access
Points.
6. Select an Access Point. The Health tab display by default.
Brocade Mobility RFS Controller System Reference Guide37
53-1003099-01
4
FIGURE 9Access Point screen - Health tab
The Device Detail field displays the following information about the selected Access Point:
• Hostname - Lists the administrator assigned name of the selected Access Point.
• Device MAC - Lists the factory encoded MAC address of the selected Access Point.
• Primary IP Address - Lists the IP address assigned to the Access Point as a network identifier.
• Typ e - Indicates the Access Point model type. An icon representing the Access Point is
displayed along with the model number.
• RF Domain Name - Lists the RF Domain to which the Access Point belongs. The RF Domain
displays as a link that can be selected to display Access Point RF Domain membership data in
greater detail.
• Model Number - Lists the specific model number of the Access Point.
• Version - Lists the version of the firmware running on the Access Point. Compare this version
against the version currently on the support site to ensure the Access Point has the latest
feature set available.
• Uptime - Displays the duration the Access Point has been running from the time it was last
restarted.
• CPU - Displays the CPU installed on this Access Point.
38Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
4
• RAM - Displays the amount of RAM available for use in this system.
• System Clock - Displays the current time on the Access Point.
The Radio RF Quality Index displays a table of RF quality per radio. It is a measure of the overall
effectiveness of the RF environment displayed in percentage. It is a function of the connect rate in
both directions, the retry rate and error rate. The quality is measured as:
• 0-20 - Very poor quality
• 20-40 - Poor quality
• 40-60 - Average quality
• 60-100 - Good quality
The Radio Utilization Index area displays how efficiently the RF medium is used. Radio utilization is
defined as the percentage of current throughput relative to the maximum possible throughput for
the radio. The Radio Utilization displays radios in terms of the number of associated wireless
clients and percentage of utilization. It also lists packets types transmitted and received.
The Client RF Quality Index displays a table of RF quality on a per client basis. It is a measure of the
overall effectiveness of the RF environment displayed in percentage. It is a function of the connect
rate in both directions, the retry rate and the error rate. This area of the screen displays the average
quality index for a client. The table lists bottom five (5) of the RF quality values by client. The quality
is measured as:
• 0-20 - Very poor quality
• 20-40 - Poor quality
• 40-60 - Average quality
• 60-100 - Good quality
Access Point Inventory
The Access Point Inventory tab displays granular data on devices managed by the selected Access
Point. Information is displayed in easy to read tables and graphs.
To assess Access Point network health:
1. Select Dashboard.
2. Select Summary if its not already selected by default.
3. Expand the System node to display RF Domains.
4. Select and expand a RF Domain to expose its member controllers or service platforms.
5. Select a controller or service platform and expand the menu item to display connected Access
Points.
6. Select an Access Point.
7.Select the Inventory tab.
Brocade Mobility RFS Controller System Reference Guide39
53-1003099-01
4
FIGURE 10Access Point screen - Inventory tab
The information within the Inventory tab is partitioned into the following fields:
• The Radios Type field displays the total number of radios utilized by this Access Point. The
graph lists the number of radios in both the 2.4 GHz and 5 GHz radio bands.
• The WLAN Utilization table displays utilization statistics for controller or service platform WLAN
configurations. Information displays in two tables. The first table lists the total number of
WLANs managed by this system. The second table lists the top five (5) WLANs in terms of the
usage percentage along with their name and network identifying SSID.
• The Wireless Clients table lists clients managed by this Access Point by connected client count.
Information is presented in two (2) tables and a graph. The first table lists the total number of
clients managed by the listed Access Point. The second lists the top five (5) radios in terms of
the number of connected clients. The graph just below the table lists the number of clients by
radio type.
40Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
Network View
4
The Network View functionality displays device association connectivity amongst controllers,
service platforms, Access Point radios and wireless clients. This association is represented by a
number of different graphs.
To review the wireless controller’s Network Topology, select Dashboard > Network View.
FIGURE 11Network View Topology
• The screen displays icons for the different views available to the system. Apart from device
specific icons, the following three icons are available:
• default – Displays information about the default RF Domain.
• system – Displays information about the current system.
• cluster – Displays information about clusters managed by this system.
• Use the icons to navigate quickly within top level groupings.
• The middle field displays a Network View, or graphical representation of the network. Nodes
display whether or not they are members of a cluster or mesh domain. Use this information to
assess whether the topology of the network has changed in such a manner that devices need
to be added or moved. This field changes to display a graphical network map.
Brocade Mobility RFS Controller System Reference Guide41
53-1003099-01
4
• Use the Lock / Unlock icon in the upper right of the screen to prevent users from moving APs
around within the specified area.
42Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
Chapter
Device Configuration
Managed devices can either be assigned unique configurations or have existing RF Domain or
Profile configurations modified (overridden) to support a requirement that dictates a device’s
configuration be customized from the configuration shared by its profiled peer devices.
When a device is initially managed by the controller or service platform, it requires several basic
configuration parameters be set (system name, deployment location etc.). Additionally, the number
of permitted device licenses (purchased directly from Brocade) needs to be accessed to determine
whether a new Access Point can be adopted.
Refer to the following to set a device’s basic configuration, license and certificate usage:
• Basic Configuration
• Basic Device Configuration
• License Configuration
• Assigning Certificates
RF Domains allow administrators to assign configuration data to multiple devices deployed in a
common coverage area (floor, building or site). In such instances, there’s many configuration
attributes these devices share as their general client support roles are quite similar. However,
device configurations may need periodic refinement (overrides) from their original RF Domain
administered design. For more information, see RF Domain Overrides.
5
Profiles enable administrators to assign a common set of configuration parameters and policies to
controller or service platforms and Access Points. Profiles can be used to assign shared or unique
network, wireless and security parameters to wireless controllers and Access Points across a large,
multi segment, site. The configuration parameters within a profile are based on the hardware
model the profile was created to support. The controller and service platform supports both default
and user defined profiles implementing new features or updating existing parameters to groups of
controllers, service platforms or Access Points.
However, device profile configurations may need periodic refinement from their original
administered configuration. Consequently, a device profile could be applied an override from the
configuration shared amongst numerous peer devices deployed within a particular site. For more
information, see Profile Overrides.
Adoption is the process an Access Point uses to discover controller or service platforms available in
the network, pick the most desirable, establish an association, obtain its configuration and
consider itself provisioned.
At adoption, an Access Point solicits and receives multiple adoption responses from available
controllers or service platforms on the network. Modify existing adoption policies or create a new
one as needed to meet the adoption requirements of a device and its assigned profile. For more
information, see Auto Provisioning Policies.
Brocade Mobility RFS Controller System Reference Guide43
53-1003099-01
5
Lastly, use Configuration > Devices to define and manage a critical resource policy. A critical
resource policy defines a list of device IP addresses on the network (gateways, routers etc.). The
support of these IP address is interpreted as critical to the health of the network. These devices
addresses are pinged regularly by the controller or service platform. If there’s a connectivity issue,
an event is generated stating a critical resource is unavailable. For more information, see
Overriding a Profile’s Critical Resource Configuration.
Basic Configuration
To assign a Basic Configuration:
1. Select the Configuration tab from the Web UI.
2. Select Devices from the Configuration tab.
The Device Configuration screen displays a list of devices.
FIGURE 1Device Configuration screen
Refer to the following device settings to determine whether a configuration update or RF
Domain or Profile change is warranted:
System Name
Device
Typ e
RF Domain Name
44Brocade Mobility RFS Controller System Reference Guide
Displays the name assigned to the device when the basic configuration was defined. This is also the
device name that appears within the RF Domain or Profile the device supports.
Displays the device’s factory assigned MAC address used as hardware identifier. The MAC address
cannot be revised with the device’s configuration.
Displays the Brocade device model for the listed controller, service platform or Access Point.
Lists RF Domain memberships for each listed device. Devices can either belong to a default RF Domain
based on model type, or be assigned a unique RF Domain supporting a specific configuration
customized to that device model.
53-1003099-01
5
NOTE
Profile Name
Area
Floor
Overrides
Lists the profile each listed device is currently a member of. Devices can either belong to a default
profile based on model type, or be assigned a unique profile supporting a specific configuration
customized to that model.
List the physical area where the controller or service platform is deployed. This can be a building,
region, campus or other area that describes the deployment location.
List the building Floor name representative of the location within the area or building the controller or
service platform was physically deployed. Assigning a building Floor name is helpful when grouping
devices in RF Domains and Profiles, as devices on the same physical building floor may need to share
specific configuration parameters in respect to radio transmission and interference requirements
specific to that location.
The Overrides column contains an option to clear all profile overrides for any devices that contain
overrides. To clear an override, select the clear button to the right of the device.
3. Select Add to create a new device, select Edit to modify an existing device or select Delete to
remove an existing device.
Basic Device Configuration
Setting a device’s Basic Configuration is required to assign a device name, deployment location,
and system time. Similarly, the Basic Configuration screen is where Profile and RF Domain
assignments are made. RF Domains allow administrators to assign configuration data to multiple
devices deployed in a common coverage area, such as in a floor, building or site. Each RF Domain
contains policies that can determine a Smart RF or WIPS configuration.
Profiles enable administrators to assign a common set of configuration parameters and policies to
controllers, service platforms and Access Points. Profiles can be used to assign common or unique
network, wireless and security parameters to wireless controllers and Access Points across a large,
multi segment, site. The configuration parameters within a profile are based on the hardware
model the profile was created to support. A controller and service platform support both default
and user defined profiles implementing new features or updating existing parameters to groups of
peer devices and Access Points. The central benefit of a profile is its ability to update devices
collectively without having to modify individual device configurations one at a time.
Once devices have been assigned membership in either a profile or RF Domain, an administrator
must be careful not to assign the device a configuration update that removes it from membership
from a RF Domain or profile. A RF Domain or profile configuration must be re-applied to a device
once its configuration has been modified in a manner that differentiates it from the configuration
shared by the devices comprising the RF Domain or profile.
To assign a device a Basic Configuration:
1. Select the Configuration tab from the Web UI.
2. Select Devices from the Configuration tab.
The Device Configuration screen displays a list of managed devices or peer controllers, service
platforms or Access Points.
3. Select a target device (by double-clicking it) from amongst those displayed.
Devices can also be selected directly from the Device Browser in the lower, left-hand, side of
the UI.
Brocade Mobility RFS Controller System Reference Guide45
53-1003099-01
5
4. The Basic Configuration screen displays by default.
FIGURE 2Basic Configuration screen
5. Set the following Configuration settings for the target device:
System Name
Area
46Brocade Mobility RFS Controller System Reference Guide
Provide the selected device a system name up to 64 characters. This is the device name that appears
within the RF Domain or Profile the device supports.
Assign the device an Area name representative of the location the controller or service platform was
physically deployed. The name cannot exceed 64 characters. Assigning an area name is helpful when
grouping devices in RF Domains and profiles, as devices in the same physical deployment location may
need to share specific configuration parameters in respect to radio transmission and interference
requirements specific to that location.
53-1003099-01
5
NOTE
Floor
Floor Number
Latitude Coordinate
Longitude Coordinate
Assign the target a device a building Floor name representative of the location the Access Point was
physically deployed. The name cannot exceed 64 characters. Assigning a building Floor name is helpful
when grouping devices within the same general coverage area.
Use the spinner control to assign a numerical floor designation in respect to the floor’s actual location
within a building. Set a value from 1 - 4094. the default setting is the 1st floor.
Set the latitude coordinate where devices are deployed within a floor. When looking at a floor map,
latitude lines specify the east-west position of a point on the Earth's surface. The exact location of a
device deployment can be ascertained by aligning the latitude and longitude points on the earth’s
surface.
Set the longitude coordinate where devices are deployed within a floor. When looking at a floor map,
longitude lines specify the north-south position of a point on the Earth's surface. The exact location of a
device deployment can be ascertained by aligning the longitude and latitude points on the earth’s
surface.
6. Use the RF Domain drop-down menu to select an existing RF Domain for device membership.
If a RF Domain configuration does not exist suiting the deployment requirements of the target
device, select the Create icon to create a new RF Domain configuration, or select the Edit icon
to modify the configuration of a selected RF Domain. For more information, see About RF
Domains or Managing RF Domains.
7.Use the Profile drop-down menu to select an existing RF Domain for device membership.
If a profile configuration does not exist suiting the deployment requirements of the target device,
select the Create icon to create a new profile configuration, or select the Edit icon to modify the
configuration of a selected profile. For more information, see General Profile Configuration.
8. If necessary, select the Clear Overrides button to remove all existing overrides from the device.
9. Refer to the Set Clock parameter to update the system time of the target device.
Refer to the Device Time parameter to assess the device’s current time, or whether the
device time is unavailable. Select Refresh as required to update the device’s reported
system time.
Use the New Time parameter to set the calendar day, hour and minute for the target
device. Use the AM and PM radio buttons to refine whether the updated time is for the
morning or afternoon/evening.
When completed, select Update Clock to commit the updated time to the target device.
10. Select OK to save the changes made to the device’s Basic Configuration. Selecting Reset
reverts the screen to its last saved configuration.
License Configuration
Licenses are purchased directly from Brocade for the number of permissible adoptions per
controller, service platform or managed cluster.
The Licenses screen is only available to wireless controllers capable of sustaining device
connections, and thus requires license support to set the maximum number of allowed device
connections. The License screen is not available for Access Points.
Brocade Mobility RFS Controller System Reference Guide47
53-1003099-01
5
NOTE
Managing Brocade infrastructure devices requires a license key to enable software functionality or
define the number of adoptable devices permitted. My Licenses is a Web based online application
enabling you to request a license key for license certificates purchased for Brocade products.
For detailed instructions on using My Licenses to add hardware or software licenses and register
certificates, refer to the My Licenses Users Guide, available at
https://MyLicenses.motorolasolutions.com.
The Licenses screen also contains a facility where new licenses can be applied to increase the
number of device adoptions permitted, or to allow the use of the advanced security or advanced
WIPS features.
Each controller and service platform family has multiple models to choose from that range from
zero licenses to the maximum number that can be loaded for that specific SKU.
To configure a device’s a license configuration:
1. Select the Configuration tab from the Web UI.
2. Select Devices from the Configuration tab.
The Device Configuration screen displays a list of managed devices or peer controllers, service
platforms or Access Points.
3. Select a target device (by double-clicking it) from amongst those displayed within the Device
Configuration screen.
Devices can also be selected directly from the Device Browser in the lower, left-hand, side of
the UI.
4. Select Licenses from the Device menu options.
48Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
5
NOTE
FIGURE 3Device Licenses screen
The License screen displays the Device Serial Number of the controller or service platform
generating the license key.
When assessing lent and borrowed license information, its important to distinguish between site
controllers and NOC controllers.
NOC controllers are RFS9510, RFS6000 and RFS7000.
Site controllers are RFS4000, RFS6000 and RFS7000.
Brocade Mobility RFS Controller System Reference Guide49
53-1003099-01
5
NOTE
5. Review the AP Licenses table to assess the specific number of adoptions permitted, as
dictated by the terms of the current license.
AP Adoptions
AP Licenses
AP Lent Licenses
AP Borrowed Licenses
AP Total Licenses
The Device column Lists the total number of AP adoptions made by the controller or service platform. If
the installed license count is 10 APs and the number of AP adoptions is 5, 5 additional APs can still be
adopted under the terms of the license. The total number of APs adoptions varies by platform, as well
as the terms of the license. The Cluster column lists the total number of AP adoptions made by the
cluster membership (all members). If the installed license count is 100 APs and the number of AP
adoptions is 50, 50 additional APs can still be adopted under the terms of the AP licenses, pooled by
the cluster members.
The Device column lists the number of APs available for adoption under the restrictions of the license.
This number applies to dependent mode adaptive APs only, and not independent mode APs. The
Cluster column lists the number of APs available for adoption by cluster members under the restrictions
of the licenses, as pooled amongst the cluster members.
Lent licenses are the total number of AP licenses the NOC controller lends (if needed) to its site
controllers so site controllers can adopt APs in excess of its own installed AP license count. AP lent
licenses can be non-zero only in controllers currently configured as the NOC (NOC controller). Lent
Licenses is always zero in controllers configured as the site (site controller).
Borrowed licenses are the total number of AP licenses borrowed by the site controller from the NOC
controller (NOC controllers if a NOC controller is in a cluster). AP borrowed licenses are always zero in
the NOC controller. AAP borrowed licenses can be non-zero only on site controllers.
Lists the cumulative number of both Device and Cluster AP licenses supported by the listed controller or
service platform.
The following is a licensing example: Assume there's two site controllers (S1 and S2) adopted to a
NOC controller (N1). S1 has 3 installed AP licenses, and S2 has 4 installed AP licenses. Eight APs
seek to adopt on S1, and ten APs seek to adopt on S2. N1 has 1024 installed licenses. N1 lends 5
(8-3) AP licenses to S1, and 6 (10-4) AP licenses to S2.
N1 displays the following in the Device column: AP Adoptions: 2 (site controllers S1 and S2) AP
Licenses: 1024 AP Lent Licenses: 11 (5 to S1 + 6 to S2) AP Borrowed Licenses: 0 AP Total Licenses:
1013 (1024 – 11 lent) S1 displays the following in the Device column: AP Adoptions: 8 AP Licenses:
3 AP Lent Licenses: 0 AP Borrowed Licenses: 5 AP Total Licenses: 8 (3 + 5 borrowed). S2 displays
the following in the Device column: AP Adoptions: 10 AP Licenses: 4 AP Lent Licenses: 0 AP
Borrowed Licenses: 6 AP Total Licenses: 10 (4 + 6 borrowed).
N1 displays the following in the Device column: AP Adoptions: 2 (site controllers S1 and S2) AP
Licenses: 1024 AP Lent Licenses: 11 (5 to S1 + 6 to S2) AP Borrowed Licenses: 0 AP Total Licenses:
1013 (1024 – 11 lent) S1 displays the following in the Device column: AP Adoptions: 8 AP Licenses:
3 AP Lent Licenses: 0 AP Borrowed Licenses: 5 AP Total Licenses: 8 (3 + 5 borrowed). S2 displays
the following in the Device column: AP Adoptions: 10 AP Licenses: 4 AP Lent Licenses: 0 AP
Borrowed Licenses: 6 AP Total Licenses: 10 (4 + 6 borrowed).
50Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
6. Review the AAP Licenses table to assess the specific number of adoptions permitted, as
dictated by the terms of the current license.
5
AAP Adoptions
AAP Licenses
AAP Lent Licenses
AAP Borrowed Licenses
AAP Total Licenses
7.Ref e r to t he Security Licenses field to apply licenses and provision advanced security and
Advanced Security
Advanced WIPS
Licenses
Analytics Licenses
Smart Cache Licenses
The Device column Lists the total number of AAP adoptions made by the controller or service platform.
If the installed license count is 10 APs and the number of AAP adoptions is 5, 5 additional AAPs can still
be adopted under the terms of the license. The total number of AAPs adoptions varies by platform, as
well as the terms of the license. The Cluster column lists the total number of AAP adoptions made by
the cluster membership (all members). If the installed license count is 100 APs and the number of AAP
adoptions is 50, 50 additional AAPs can still be adopted under the terms of the AAP licenses, pooled by
the cluster members.
The Device column lists the number of AAPs available for adoption under the restrictions of the license.
This number applies to dependent mode adaptive AAPs only, and not independent mode AAPs. The
Cluster column lists the number of AAPs available for adoption by cluster members under the
restrictions of the licenses, as pooled amongst the cluster members.
Lent licenses are the total number of AAP licenses the NOC controller lends (if needed) to its site
controllers so site controllers can adopt adaptive APs in excess of its own installed AAP license count.
AAP lent licenses can be non-zero only in controllers currently configured as the NOC (NOC controller).
Lent Licenses is always zero in controllers configured as the site (site controller).
Borrowed licenses are the total number of AAP licenses borrowed by the site controller from the NOC
controller (NOC controllers if a NOC controller is in a cluster). AAP borrowed licenses are always zero in
the NOC controller. AAP borrowed licenses can be non-zero only on site controllers.
Lists the cumulative number of both Device and Cluster AAP licenses supported by the listed controller
or service platform.
analytics features:
Enter the Brocade provided license key required to install the Role Based Firewall feature and increase
the number of IPSec VPN tunnels. The number of IPSec tunnels varies by platform.
Enter the Brocade provided license key required to install Advanced WIPS for client terminations and
event sanctioning.
Enter the Brocade provided license key required to install Analytics (an enhanced statistical
management tool) for NX4500, NX6500 and NX9000 series service platforms.
Enter the Brocade provided license key required to install the Smart Cache feature on a supported
service platform. Smart Caching is used on NX4500 and NX6500 series service platforms to
temporarily store frequently accessed Web content (Web pages, graphics, audio and video files etc.) on
network infrastructure devices. When this content is requested, its retrieved from a local content cache
and not from the origin server. Smart caching results in reduced bandwidth usage, lower latency
periods and reduced data transfers from the origin servers. Both forward caching and transparent
caching are supported.
8. Select OK to save the changes made to the applied licenses. Selecting Reset reverts the
screen to its last saved configuration.
Assigning Certificates
A certificate links identity information with a public key enclosed in the certificate.
Brocade Mobility RFS Controller System Reference Guide51
53-1003099-01
5
A certificate authority (CA) is a network authority that issues and manages security credentials and
public keys for message encryption. The CA signs all digital certificates it issues with its own private
key. The corresponding public key is contained within the certificate and is called a CA certificate. A
browser must contain the CA certificate in its Trusted Root Library so it can trust certificates signed
by the CA's private key.
Depending on the public key infrastructure, the digital certificate includes the owner's public key,
the certificate expiration date, the owner's name and other public key owner information.
Each certificate is digitally signed by a trustpoint. The trustpoint signing the certificate can be a
certificate authority, corporation or individual. A trustpoint represents a CA/identity pair containing
the identity of the CA, CA-specific configuration parameters, and an association with an enrolled
identity certificate.
SSH keys are a pair of cryptographic keys used to authenticate users instead of, or in addition to, a
username/password. One key is private and the other is public key. Secure Shell (SSH) public key
authentication can be used by a requesting client to access resources, if properly configured. A RSA
key pair must be generated on the client. The public portion of the key pair resides with the
controller or service platform, while the private portion remains on a secure local area of the client.
To configure certificate usage:
1. Select the Configuration tab from the Web UI.
2. Select Devices from the Configuration tab.
The Device Configuration screen displays a list of managed devices or peer controllers, service
platforms or Access Points.
3. Select Certificates from the Device menu.
FIGURE 4Device Certificates screen
52Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
4. Set the following Management Security certificate configurations:
NOTE
5
HTTPS Trustpoint
SSH RSA Key
RADIUS Certificate
Authority
RADIUS Server
Certificate
Either use the default trustpoint or select the Stored radio button to enable a drop-down menu where
an existing certificate/trustpoint can be utilized. To use an existing certificate for this device, select the
Launch Manager button. For more information, see
Certificate Management
Either use the default_rsa_key or select the Stored radio button to enable a drop-down menu where an
existing certificate can be used. To leverage an existing key, select the Launch Manager button. For
more information, see
RSA Key Management
Pending trustpoints and RSA keys are typically not verified as existing on a device.
5. Set the following RADIUS Security certificate configurations:
Either use the default-trustpoint or select theStored radio button to enable a drop-down menu where
an existing certificate can be leveraged. To leverage an existing certificate, select the Launch Manager
button.
Either use the default-trustpoint or select theStored radio button to enable a drop-down menu where
an existing certificate/trustpoint can be used. To leverage an existing trustpoint, select the Launch Manager button.
6. Select OK to save the changes made to the certificate configurations. Selecting Reset reverts
the screen to its last saved configuration.
For more information on the certification activities supported, refer to the following:
• Certificate Management
• RSA Key Management
• Certificate Creation
• Generating a Certificate Signing Request
Certificate Management
Assigning Certificates
A stored certificate can be leveraged from a different managed device if not wanting to use an
existing certificate or key. Device certificates can be imported and exported to and from the
controller or service platform to a secure remote location for archive and retrieval as required for
other managed devices.
To configure trustpoints for use with certificates:
1. Select Launch Manager from either the HTTPS Trustpoint, SSH RSA Key, RADIUS Certificate Authority or RADIUS Server Certificate parameters.
Brocade Mobility RFS Controller System Reference Guide53
53-1003099-01
The Certificate Management screen displays with the Manage Certificates tab displayed
by default.
2. Select a device from amongst those displayed to review its certificate information.
3. Refer to the All Certificate Details to review the certificate’s properties, self-signed credentials,
validity duration and CA information.
4. To optionally import a certificate, select the Import button from the Certificate Management
screen.
54Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
5
Tru s t p o i nt Name
URL
Protocol
Port
Host
Path/File
Cut and Paste
FIGURE 6Certificate Management - Import New Trustpoint screen
5. Define the following configuration parameters required for the Import of the trustpoint.
Enter the 32 character maximum name assigned to the target trustpoint. The trustpoint signing the
certificate can be a certificate authority, corporation or individual.
Provide the complete URL to the location of the trustpoint. If needed, select Advanced to expand the
dialog to display network address information to the location of the target trustpoint. The number of
additional fields that populate the screen is also dependent on the selected protocol.
Select the protocol used for importing the target trustpoint. Available options include:
tftp
ftp
sftp
http
cf
usb1-4
Use the spinner control to set the port. This option is not valid for cf and usb1-4.
Provide the hostname string or numeric IP address of the server used to import the trustpoint. This
option is not valid for cf and usb1-4.
Specify the path to the trustpoint file. Enter the complete relative path to the file on the server.
Select the Cut and Paste radio button to simply copy an existing trustpoint into the cut and past field.
When pasting, no additional network address information is required.
6. Select OK to import the defined trustpoint. Select Cancel to revert the screen to its last saved
configuration.
7.To optionally import a CA certificate, select the Import CA button from the Certificate
Management screen.
Brocade Mobility RFS Controller System Reference Guide55
53-1003099-01
5
A CA is a network authority that issues and manages security credentials and public keys for
message encryption. The CA signs all digital certificates it issues with its own private key. The
corresponding public key is contained within the certificate and is called a CA certificate.
Tru s t p o i nt Name
URL
Advanced / Basic
Protocol
Port
Host
Path/File
Cut and Paste
FIGURE 7Certificate Management - Import CA Certificate screen
8. Define the following configuration parameters required for the Import of the CA certificate:
Enter the 32 character maximum name assigned to the target trustpoint signing the certificate. A
trustpoint represents a CA/identity pair containing the identity of the CA, CA specific configuration
parameters, and an association with an enrolled identity certificate.
Provide the complete URL to the location of the trustpoint. If needed, select Advanced to expand the
dialog to display network address information to the location of the target trustpoint. The number of
additional fields populating the screen is dependent on the selected protocol.
Click the Advanced or Basic link to switch between a basic URL and an advanced location to specify
trustpoint location.
Select the protocol used for importing the target CA certificate. Available options include:
tftp
ftp
sftp
http
cf
usb1-4
Use the spinner control to set the port. This option is not valid for cf and usb1-4.
Provide the hostname string or numeric IP address of the server used to import the CA. This option is
not valid for cf and usb1-4.
Specify the path to the CA file. Enter the complete relative path to the file on the server.
Select the Cut and Paste radio button to simply copy an existing CA into the cut and past field. When
pasting, no additional network address information is required.
56Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
5
9. Select OK to import the defined CA certificate. Select Cancel to revert the screen to its last
saved configuration.
10. Select the Import CRL button from the Certificate Management screen to optionally import a
CRL to a controller or service platform.
If a certificate displays within the Certificate Management screen with a CRL, that CRL can
be imported. A certificate revocation list (CRL) is a list of certificates that have been
revoked or are no longer valid. A certificate can be revoked if the CA had improperly issued
a certificate, or if a private-key is compromised. The most common reason for revocation is
the user no longer being in sole possession of the private key.
For information on creating a CRL to use with a trustpoint, refer to Setting the Certificate
Brocade Mobility RFS Controller System Reference Guide57
53-1003099-01
5
Define the following configuration parameters required for the Import of the CRL
Tru s t p o i nt Name
From Network
URL
Protocol
Port
Host
Path/File
Cut and Paste
Enter the 32 character maximum name assigned to the target trustpoint signing the certificate. A
trustpoint represents a CA/identity pair containing the identity of the CA, CA-specific configuration
parameters, and an association with an enrolled identity certificate.
Select theFrom Network radio button to provide network address information to the location of the
target CRL. The number of additional fields that populate the screen is also dependent on the selected
protocol. This is the default setting.
Provide the complete URL to the location of the CRL. If needed, select Advanced to expand the dialog to
display network address information to the location of the CRL. The number of additional fields that
populate the screen is also dependent on the selected protocol.
Select the protocol used for importing the CRL. Available options include:
tftp
ftp
sftp
http
cf
usb1-4
Use the spinner control to set the port. This option is not valid for cf and usb1-4.
Provide the hostname string or numeric IP address of the server used to import the CRL. This option is
not valid for cf and usb1-4.
Specify the path to the CRL file. Enter the complete relative path to the file on the server.
Select the Cut and Paste radio button to simply copy an existing CRL into the cut and past field. When
pasting, no additional network address information is required.
11. Select OK to import the CRL. Select Cancel to revert the screen to its last saved configuration.
12. To import a signed certificate, select the Import Signed Cert button from the Certificate
Management screen.
Signed certificates (or root certificates) avoid the use of public or private CAs. A self-signed
certificate is an identity certificate signed by its own creator, thus the certificate creator also
signs off on its legitimacy. The lack of mistakes or corruption in the issuance of self signed
certificates is central.
Self-signed certificates cannot be revoked which may allow an attacker who has already
gained access to monitor and inject data into a connection to spoof an identity if a private key
has been compromised. However, CAs have the ability to revoke a compromised certificate,
preventing its further use.
58Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
5
FIGURE 9Certificate Management - Import Signed Cert screen
13. Define the following parameters required for the Import of the CA certificate:
Certificate Name
From Network
URL
Protocol
Port
Host
Path/File
Cut and Paste
Enter the 32 character maximum trustpoint name with which the certificate should be
associated.
Select the From Network radio button to provide network address information to the
location of the signed certificate. The number of additional fields that populate the
screen is dependent on the selected protocol. From Network is the default setting.
Provide the complete URL to the location of the signed certificate. If needed, select
Advanced to expand the dialog to display network address information to the location
of the signed certificate. The number of additional fields populating the screen is
dependent on the selected protocol.
Select the protocol for importing the signed certificate. Available options include:
tftp
ftp
sftp
http
cf
usb1-4
Use the spinner control to set the port. This option is not valid for cf and usb1-4.
Provide the hostname string or numeric IP address of the server used to import the
signed certificate. This option is not valid for cf and usb1-4.
Specify the path to the signed certificate file. Enter the complete relative path to the file
on the server.
Select the Cut and Paste radio button to simply copy an existing certificate into the cut
and past field. When pasting, no additional network address information is required.
Brocade Mobility RFS Controller System Reference Guide59
53-1003099-01
5
14. Select OK to import the signed certificate. Select Cancel to revert the screen to its last saved
configuration
15. To optionally export a trustpoint to a remote location, select the Export button from the
Certificate Management screen.
Once a certificate has been generated on the controller or service platform’s authentication
server, export the self signed certificate. A digital CA certificate is different from a self signed
certificate. The CA certificate contains the public and private key pairs. The self certificate only
contains a public key. Export the self certificate for publication on a Web server or file server
for certificate deployment or export it in to an active directory group policy for automatic root
certificate deployment.
16. Additionally export the key to a redundant RADIUS server so it can be imported without
generating a second key. If there’s more than one RADIUS authentication server, export the
certificate and don’t generate a second key unless you want to deploy two root certificates.
60Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
17. Define the following configuration parameters required for the Export of the trustpoint.
5
Trustpoint Name
URL
Protocol
Port
Host
Path/File
Cut and Paste
Enter the 32 character maximum name assigned to the trustpoint. The trustpoint
signing the certificate can be a certificate authority, corporation or individual.
Provide the complete URL to the location of the trustpoint. If needed, select
Advanced to expand the dialog to display network address information to the
location of the trustpoint. The number of additional fields that populate the screen is
dependent on the selected protocol.
Select the protocol used for exporting the target trustpoint. Available options
include:
tftp
ftp
sftp
http
cf
usb1-4
Use the spinner control to set the port. This option is not valid for cf and usb1-4.
Provide the hostname string or numeric IP address of the server used to export the
trustpoint. This option is not valid for cf and usb1-4.
Specify the path to the signed trustpoint file. Enter the complete relative path to the
file on the server.
Select the Cut and Paste radio button to simply copy an existing trustpoint into the
cut and past field. When pasting, no additional network address information is
required.
18. Select OK to export the defined trustpoint. Select Cancel to revert the screen to its last saved
configuration.
19. To optionally delete a trustpoint, select the Delete button from within the Certificate
Management screen. Provide the trustpoint name within the Delete Trustpoint screen and
optionally select Delete RSA Key to remove the RSA key along with the trustpoint. Select OK to
proceed with the deletion, or Cancel to revert to the Certificate Management screen
RSA Key Management
Assigning Certificates
Refer to the RSA Keys screen to review existing RSA key configurations that have been applied to
managed devices. If an existing key does not meet the needs of a pending certificate request,
generate a new key or import/export an existing key to and from a remote location.
Rivest, Shamir, and Adleman (RSA) is an algorithm for public key cryptography. It’s an algorithm
that can be used for certificate signing and encryption. When a device trustpoint is created, the
RSA key is the private key used with the trustpoint.
To review existing device RSA key configurations, generate additional keys or import/export keys to
and from remote locations:
1. Select the Launch Manager button from either the SSH RSA Key, RADIUS Certificate Authority
or RADIUS Server Certificate parameters (within the Certificate Management screen).
2. Select RSA Keys from the upper, left-hand, side of the Certificate Management screen.
Brocade Mobility RFS Controller System Reference Guide61
53-1003099-01
5
FIGURE 11Certificate Management - RSA Keys screen
3. Select a listed device to review its current RSA key configuration.
Each key can have its size and character syntax displayed. Once reviewed, optionally generate
a new RSA key, import a key from a selected device, export a key to a remote location or delete
a key from a selected device.
4. Select Generate Key to create a new key with a defined size.
62Brocade Mobility RFS Controller System Reference Guide
5. Define the following configuration parameters required for the Import of the key:
Key Name
Key Size
Enter the 32 character maximum name assigned to the RSA key.
Use the spinner control to set the size of the key (from 1,024 - 2,048 bits). Brocade
recommends leaving this value at the default setting of 1024 to ensure optimum
functionality.
6. Select OK to generate the RSA key. Select Cancel to revert the screen to its last saved
configuration.
7.To optionally import a CA certificate, select the Import button from the Certificate Management
> RSA Keys screen.
Brocade Mobility RFS Controller System Reference Guide63
53-1003099-01
5
FIGURE 13Certificate Management - Import New RSA Key screen
8. Define the following parameters required for the Import of the RSA key:
Key Name
Key Passphrase
URL
Advanced / Basic
Protocol
Port
Host
Path/File
Enter the 32 character maximum name assigned to identify the RSA key.
Define the key used by both the controller or service platform and the server (or
repository) of the target RSA key. Select the Show
in the passphrase. Leaving the Show unselected displays the passphrase as a series of
asterisks “*”.
Provide the complete URL to the location of the RSA key. If needed, select Advanced to
expand the dialog to display network address information to the location of the target
key. The number of additional fields that populate the screen is dependent on the
selected protocol.
Select either theAdvanced or Basic link to switch between a basic URL and an
advanced location to specify key location.
Select the protocol used for importing the target key. Available options include:
tftp
ftp
sftp
http
cf
usb1-4
Use the spinner control to set the port. This option is not valid for cf and usb1-4.
Provide a text string hostname or numeric IP address of the server used to import the
RSA key. This option is not valid for cf and usb1-4.
Specify the path to the RSA key. Enter the complete relative path to the key on the
server.
to expose the actual characters used
64Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
5
9. Select OK to import the defined RSA key. Select Cancel to revert the screen to its last saved
configuration.
10. To optionally export a RSA key to a remote location, select the Export button from the
Certificate Management > RSA Keys screen.
Export the key to a redundant RADIUS server to import it without generating a second key. If
there’s more than one RADIUS authentication server, export the certificate and don’t generate
a second key unless you want to deploy two root certificates.
11. Define the following configuration parameters required for the Export of the RSA key.
Key Name
Key Passphrase
URL
Protocol
Port
Host
Path / File
Enter the 32 character maximum name assigned to the RSA key.
Define the key passphrase used by both the controller or service platform and the
server. Select Show
Leaving the Show unselected displays the passphrase as a series of asterisks “*”.
Provide the complete URL to the location of the key. If needed, select Advanced to
expand the dialog to display network address information to the location of the
target key. The number of additional fields that populate the screen is dependent
on the selected protocol.
Select the protocol used for exporting the RSA key. Available options include:
tftp
ftp
sftp
http
cf
usb1-4
Use the spinner control to set the port. This option is not valid for cf and usb1-4.
Provide a text string hostname or numeric IP address of the server used to export
the RSA key. This option is not valid for cf and usb1-4.
Specify the path to the key. Enter the complete relative path to the key on the
server.
to expose the actual characters used in the passphrase.
Brocade Mobility RFS Controller System Reference Guide65
53-1003099-01
5
12. Select OK to export the defined RSA key. Select Cancel to revert the screen to its last saved
configuration.
13. To optionally delete a key, select the Delete button from within the Certificate Management >
RSA Keys screen. Provide the key name within the Delete RSA Key screen and select Delete
Certificates to remove the certificate. Select OK to proceed with the deletion, or Cancel to
revert back to the Certificate Management screen.
Certificate Creation
Assigning Certificates
The Certificate Management screen provides the facility for creating new self-signed certificates.
Self signed certificates (often referred to as root certificates) do not use public or private CAs. A self
signed certificate is a certificate signed by its own creator, with the certificate creator responsible
for its legitimacy.
To create a self-signed certificate that can be applied to a managed device:
1. Select the Launch Manager button from either the SSH RSA Key, RADIUS Certificate Authority
or RADIUS Server Certificate parameters (within the Certificate Management screen).
2. Select Create Certificate from the upper, left-hand, side of the Certificate Management screen.
66Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
5
3. Define the following configuration parameters required to Create New Self-Signed Certificate:
Certificate Name
RSA Key
Enter the 32 character maximum name assigned to identify the name of the
trustpoint associated with the certificate. A trustpoint represents a CA/identity pair
containing the identity of the CA, CA-specific configuration parameters, and an
association with an enrolled identity certificate.
Select a radio button and use the drop-down menu to set the key used by both the
controller or service platform and the server (or repository) of the target RSA key.
Optionally select Create New and enter a 32 character name used to identify the
RSA key. Use the spinner control to set the size of the key (from 1,024 - 2,048 bits).
Brocade recommends leaving this value at the default setting of 1024 to ensure
optimum functionality.
4. Set the following Certificate Subject Name parameters required for the creation of the
certificate:
Certificate Subject
Name
Country (C)
State (ST)
City (L)
Organization (O)
Organizational Unit
(OU)
Select either auto-generate to automatically create the certificate's subject
credentials or user-defined to manually enter the credentials of the self signed
certificate. The default setting is auto-generate.
Define the Country used in the certificate. The field can be modified by the user to
other values. This is a required field and must not exceed 2 characters.
Enter a State/Prov. for the state or province name used in the certificate. This is a
required field.
Enter a City to represent the city used in the certificate. This is a required field.
Define an Organization for the organization represented in the certificate. This is a
required field.
Enter an Org. Unit for the organization unit represented in the certificate. This is a
required field.
Common Name (CN)
If there’s a common name (IP address) for the organizational unit issuing the
certificate, enter it here.
5. Select the following Additional Credentials required for the generation of the self signed
certificate:
Email Address
Domain Name)
IP Address
Provide an Email Address used as the contact address for issues relating to this
certificate request.
Enter a fully qualified domain name (FQDN) is an unambiguous domain name that
specifies the node's position in the DNS tree hierarchy absolutely. To distinguish an
FQDN from a regular domain name, a trailing period is added. For example,
somehost.example.com. An FQDN differs from a regular domain name by its
absoluteness, since a suffix is not added.
Specify the IP address used as the destination for certificate requests.
6. Select the Generate Certificate button at the bottom of the Certificate Management > Create
Certificate screen to produce the certificate.
Generating a Certificate Signing Request
Assigning Certificates
Brocade Mobility RFS Controller System Reference Guide67
53-1003099-01
5
A certificate signing request (CSR) is a request to a certificate authority to apply for a digital identity
certificate. The CSR is a block of encrypted text generated on the server the certificate is used on.
It contains the organization name, common name (domain name), locality and country.
A RSA key must be either created or applied to the certificate request before the certificate can be
generated. A private key is not included in the CSR, but is used to digitally sign the completed
request. The certificate created with a particular CSR only works with the private key generated
with it. If the private key is lost, the certificate is no longer functional.The CSR can be accompanied
by other identity credentials required by the certificate authority, and the certificate authority
maintains the right to contact the applicant for additional information.
If the request is successful, the CA sends an identity certificate digitally signed with the private key
of the CA.
To cr e a te a CSR:
1. Select the Launch Manager button from either the SSH RSA Key, RADIUS Certificate Authority
or RADIUS Server Certificate parameters (within the Certificate Management screen).
2. Select Create CSR from the upper, left-hand, side of the Certificate Management screen.
68Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
3. Define the following configuration parameters required to Create New Certificate Signing
Request (CSR):
5
RSA Key
Select a radio button and use the drop-down menu to set the key used by both the
controller or service platform and the server (or repository) of the target RSA key.
Optionally select Create New to use new RSA key and provide a 32 character name
used to identify the RSA key. Use the spinner control to set the size of the key (from
1,024 - 2,048 bits). Brocade recommends leaving this value at the default setting of
1024 to ensure optimum functionality.
4. Set the following Certificate Subject Name parameters required for the creation of the
certificate:
Certificate Subject
Name
Country (C)
State (ST)
City (L)
Organization (O)
Organizational Unit
Select either the auto-generate radio button to automatically create the certificate's
subject credentials or user-defined to manually enter the credentials of the self
signed certificate. The default setting is auto-generate.
Define the Country used in the CSR. The field can be modified by the user to other
values. This is a required field and must not exceed 2 characters.
Enter a State/Prov. for the state or province name represented in the CSR. This is a
required field.
Enter a City represented in the CSR. This is a required field.
Define the Organization represented in the CSR. This is a required field.
Enter the Org. Unit represented in the CSR. This is a required field.
(OU)
Common Name (CN)
If there’s a common name (IP address) for the organizational unit issuing the
certificate, enter it here.
5. Select the following Additional Credentials required for the generation of the CSR:
Email Address
Domain Name)
IP Address
Provide an email address used as the contact address for issues relating to this CSR.
Enter a fully qualified domain name (FQDN) is an unambiguous domain name that
specifies the node's position in the DNS tree hierarchy absolutely. To distinguish an
FQDN from a regular domain name, a trailing period is added. ex:
somehost.example.com. An FQDN differs from a regular domain name by its
absoluteness; as a suffix is not added.
Specify the IP address used as the destination for certificate requests.
6. Select the Generate CSR button to produce the CSR.
Port Mirroring (NX4524 and NX6524 Service Platforms only)
NX4524 and NX6524 model service platforms have the ability to mirror data packets transmitted
or received on any of their GE ports (GE port 1 - 24). Both transmit and receive packets can be
mirrored from a source to a destination port as needed to provide traditional spanning functionality
on the 24 GE ports.
Brocade Mobility RFS Controller System Reference Guide69
53-1003099-01
5
NOTE
Port mirroring is not supported on NX4500 or NX6500 models, as they only utilize GE ports 1 - 2.
Additionally, port mirroring is not supported on uplink (up) ports or wired ports on any controller or
service platform model.
To set a NX4524 or NX6524 service platform port mirror configuration:
1. Select the Configuration tab from the Web UI.
2. Select Devices from the Configuration tab.
The Device Configuration screen displays a list of managed devices or peer controllers, service
platforms or Access Points.
3. Select a target device (by double-clicking it) from amongst those displayed within the Device
Configuration screen.
Devices can also be selected directly from the Device Browser in the lower, left-hand, side of
the UI.
4. Select Mirroring from the Device menu options.
FIGURE 17Port Mirroring screen
70Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
5
5. Set the following Port Mirroring values to define the ports and directions data is spanned on
the NX4524 or NX6524 model service platform:
Source
Destination
Direction
Select the GE port (1 - 24) used as the data source to span packets to the selected destination port.
The packets spanned from the selected source to the destination depend on whether Inbound, Outbound or Any is selected as the direction. A source port cannot be a destination port.
Select the GE port (1 - 24) used as the port destination to span packets from the selected source. The
destination port serves as a duplicate image of the source port and can be used to send packets to a
network diagnostic without disrupting the behavior on the original port. The destination port transmits
only mirrored traffic and does not forward received traffic. Additionally, address learning is disabled on
the destination port.
Define the direction data packets are spanned from the selected source to the defined destination.
Packets spanned from the source to the destination depend on whether Inbound (received packets
only), Outbound (transmitted packets only) or Any (packets in either direction) is selected.
6. Select + Add Row to add different sources, destinations and directions for additional GE port
spanning configurations.
7.S el e c t OK to save the changes made to the NX4524 or NX6524 port mirroring configuration.
Selecting Reset reverts the screen to its last saved configuration.
RF Domain Overrides
Use RF Domain Overrides to define configurations overriding the configuration set by the target
device’s original RF Domain assignment.
RF Domains allow administrators to assign configuration data to multiple devices deployed in a
common coverage area (floor, building or site). In such instances, there’s many configuration
attributes these devices share, since their general client support roles are quite similar. However,
device configurations may need periodic refinement from their original RF Domain administered
design.
A controller or service platform configuration contains (at a minimum) one default RF Domain, but
can optionally use additional user defined RF Domains:
• Default RF Domain - Automatically assigned to each controller, service platform and
associated Access Points by default. A default RF Domain is unique to a specific model.
• User Defined RF Domains - Created by administrators and manually assigned to individual
controllers, service platforms or Access Points, but can be automatically assigned to Access
Points using adoption policies.
Each controller, service platform and Access Point is assigned one RF Domain at a time. However, a
user defined RF Domain can be assigned to multiple devices as required. User defined RF Domains
can be manually assigned or automatically assigned to Access Points using an auto provisioning
policy. The more devices assigned a single RF Domain, the greater the likelihood one of the
device’s configurations will require an override deviating that device’s configuration from the
original RF Domain assignment shared by the others.
To review the RF Domain’s original configuration requirements and the options available for a
target device, refer to Managing RF Domains.
To define a device’s RF Domain override configuration:
1. Select the Configuration tab from the Web UI.
Brocade Mobility RFS Controller System Reference Guide71
53-1003099-01
5
NOTE
2. Select Devices from the Configuration tab.
The Device Configuration screen displays a list of managed devices or peer controllers,
service platforms or Access Points.
3. Select a device (by double-clinking it) from amongst those displayed within the Device
Configuration screen.
Devices can also be selected directly from the Device Browser in the lower, left-hand, side of
the UI.
4. Expand the RF Domain Overrides menu option to display its sub-menu options.
5. Select RF Domain.
FIGURE 18RF Domain Overrides screen
A blue override icon (to the left of a parameter) defines the parameter as having an override applied.
To remove an override go to the Basic Configuration section of the device and click the Clear
Overrides button. This removes all overrides from the device.
72Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
5
6. Refer to the Basic Configuration field to review the basic settings defined for the target device’s
RF Domain configuration, and optionally assign/remove overrides to and from specific
parameters.
Location
Contact
Time Zone
Country Code
VLAN for Control Traffic
Provide the 64 character maximum deployment location set for the controller or
service platform as part of its RF Domain configuration.
Enter the 64 character maximum administrative contact for the controller or service
platform as part of its RF Domain configuration.
Displays the time zone utilized for the RF Domain configuration.
Displays the country code set for the as part of the RF Domain configuration.
Displays the VLAN for Control Traffic setting for the device as part of its RF Domain
configuration.
7.Ref e r to t he Smart RF section to configure Smart RF policy and dynamic channel settings.
2.4 GHz Radios
5 GHz Radios
Select an override group of channels Smart RF can use for channel compensation
adjustments in the 2.4 GHz band.
Select an override group of channels Smart RF can use for channel compensation
adjustments in the 5 GHz band.
8. Refer to the Smart Scan section to configure Smart RF policy and dynamic channel settings.
Enable Dynamic
Select this option to enable dynamic channel switching for Smart RF radios.
Channel
2.4 GHz Channels
5 GHz Channels
Select channels from the drop-down menu and click the down arrow to move it to
the list of channels used for 2.4GHz Smart RF radios.
Select channels from the drop-down menu and click the down arrow to move it to
the list of channels used for 5GHz Smart RF radios.
9. Select the Create icon to define a new Smart RF policy that can be applied to the RF Domain,
or select the Edit icon to modify or override an existing Smart RF policy.
For an overview of Smart RF and instructions on how to create a Smart RF policy that can be
used with a RF Domain, see Smart RF Policy.
10. Use the WIPS Policy drop-down menu to apply a WIPS policy to the RF Domain.
The Wireless Intrusion Protection System (WIPS) provides continuous protection against
wireless threats and act as an additional layer of security complementing wireless VPNs and
encryption and authentication policies. Controllers and service platforms support WIPS
through the use of dedicated sensor devices, designed to actively detect and locate
unauthorized AP devices. After detection, they use mitigation techniques to block devices using
manual termination, air lockdown or port suppression.
11. Select the Create icon to define a new WIPS policy that can be applied to the RF Domain, or
select the Edit icon to modify or override an existing WIPS policy.
For an overview of WIPS and instructions on how to create a WIPS policy that can be used with
a RF Domain, see Intrusion Prevention.
Brocade Mobility RFS Controller System Reference Guide73
53-1003099-01
5
NOTE
12. Refer to the Statistics field to set the following data:
Window Index
Sample Interval
Window Size
Use the spinner control to set a numerical index used as an identifier for RF Domain
statistics.
Use the spinner control to define the interval (in seconds) to capture windowed
statistics supporting with the listed RF Domain. The default is 5 seconds.
Use the spinner control to set the number of samples used to define RF Domain
statistics. The default value is 6 samples.
13. Select OK to save the changes and overrides made to the RF Domain configuration. Selecting
Reset reverts the screen to its last saved configuration.
14. Select Sensor Configuration from within the expanded RF Domain Overrides menu.
FIGURE 19Sensor Configuration Override screen
15. Define a Sensor Configuration for dedicating a WIPS server resource for client terminations
and WIPS event logging.
Optionally set up to 3 overrides for the listed device’s sensor server assignment:
Server Id
IP Address/Hostname
Port
Use the spinner control set a numerical index to differentiate this server from
other servers. Up to 3 sensor server resources can be defined. Select + Add Row
as needed to add additional servers.
Set IP Addresses or Hostnames of up to 3 sensor servers supporting WIPS events
on behalf of the controller or service platform.
Assign the sensor server port number using the spinner control. The default port is
443.
A blue override icon (to the left of a parameter) defines the parameter as having an override applied.
To remove an override go to the Basic Configuration section of the device and click the Clear
Overrides button. This removes all overrides from the device.
74Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
5
NOTE
NOTE
16. Select OK to save the changes and overrides made to the Sensor Appliance Configuration.
Selecting Reset reverts the screen to its last saved configuration.
17. Select WLAN Override from within the expanded RF Domain Overrides.
The WLAN Override option does not appear as a sub menu option under RF Domain Overrides for
either controllers or service platforms, just Access Points.
FIGURE 20WLAN Override screen - Override SSID tab
The WLAN Override screen displays with the Override SSID tab displayed by default.
18. Optionally define up to 3 overrides for the listed Access Point’s WLAN SSID assignment:
WLAN
SSID
Optionally use the drop-down menu to change the WLAN assignment for the listed
Access Point. Select either the Create icon to define a new WLAN configuration, or
select the Edit icon to modify an existing WLAN configuration.
Optionally change the SSID associated with the WLAN. The WLAN name is
auto-generated using the SSID until changed (overridden). The maximum number
of characters used for the SSID is 32.
19. Select the Add Row + button as needed to add additional WLAN SSID overrides.
A blue override icon (to the left of a parameter) defines the parameter as having an override applied.
To remove an override go to the Basic Configuration section of the device and click the Clear
Overrides button. This removes all overrides from the device.
Brocade Mobility RFS Controller System Reference Guide75
53-1003099-01
5
NOTE
20. Select OK to save the changes and overrides. Selecting Reset reverts the screen to its last
saved configuration.
21. Select the Override VLAN tab to review any VLAN assignment overrides that may have been or
optionally add or edit override configurations.
FIGURE 21WLAN Override screen - Override VLAN tab
The Override VLANs tab displays the VLANs assigned to the WLAN on the Access Point. Select
Add to create a new client limit configuration for a specific WLAN and VLAN or Edit to modify an
existing configuration.
22. Optionally define a VLAN’s wireless client limit override configuration.
VLANS
Wireless Client Limit
A blue override icon (to the left of a parameter) defines the parameter as having an override applied.
To remove an override go to the Basic Configuration section of the device and click the Clear
Overrides button. This removes all overrides from the device.
23. Select OK to save the changes and overrides. Selecting Reset reverts the screen to its last
saved configuration.
Use the spinner control to set a virtual interface ID (between 1 - 4094).
Use the spinner control to set the number of users permitted on the VLAN. Set the
value to 0 to have an unlimited number of users.
76Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
Wired 802.1x Configuration
802.1X is an IEEE standard for media-level (Layer 2) access control, providing the capability to
permit or deny connectivity based on user or device identity. 802.1X allows port based access
using authentication. An 802.1X enabled port can be dynamically enabled or disabled depending
on user identity or device connection.
Before authentication, the endpoint is unknown, and traffic is blocked. Upon authentication, the
endpoint is known and traffic is allowed. The controller or service platform uses source MAC
filtering to ensure only the authenticated endpoint is allowed to send traffic.
To configure a device’s wired 802.1x configuration:
1. Select the Configuration tab from the Web UI.
2. Select Devices from the Configuration tab.
The Device Configuration screen displays a list of managed devices or peer controllers, service
platforms or Access Points.
3. Select a device (by double-clicking it) from amongst those displayed within the Device
Configuration screen.
Devices can also be selected directly from the Device Browser in the lower, left-hand, side of
the UI.
5
4. Select Wired 802.1x from the Device menu options.
FIGURE 22Device Wired 802.1x screen
Brocade Mobility RFS Controller System Reference Guide77
53-1003099-01
5
5. Review the Wired 802.1x Settings area to configure the following parameters.
Dot1x Authentication
Control
Dot1x AAA Policy
Dot1x Guest VLAN
Control
MAC Authentication
Control
Select this option to globally enable 802.1x authentication. 802.1x authentication is disabled by
default.
Use the drop-down menu to select a AAA policy to associate with wired 802.1x traffic. If a suitable AAA
policy does not exist, select the Create icon to create a new policy or the Edit icon to modify an existing
policy.
Select this option to globally enable the use of 802.1x guest VLANs.
Use the drop-down menu to select an AAA authentication policy for MAC address authentication. If a
suitable MAC AAA policy does not exist, click the Create icon to create a new policy or the Edit icon to
modify an existing policy.
Profile Overrides
Profiles enable administrators to assign a common set of parameters and policies to controllers,
service platforms and Access Points. Profiles can be used to assign shared or unique network,
wireless and security parameters to wireless controllers and Access Points across a large, multi
segment, site. The configuration parameters within a profile are based on the hardware model the
profile was created to support. Controllers and service platforms support both default and user
defined profiles implementing new features or updating existing parameters to groups of devices.
The central benefit of a profile is its ability to update devices collectively without having to modify
individual device configurations. Power and Adoption overrides apply specifically to Access Points,
while Cluster configuration overrides apply to only controller or service platform configurations.
However, device profile configurations may need periodic refinement from their original
administered design. Consequently, a device profile could require modification from a profile
configuration shared amongst numerous devices deployed within a particular site.
Use Profile Overrides to define configurations overriding the parameters set by the target device’s
original profile assignment.
To review a profile’s original configuration requirements and the options available for a target
device, refer to General Profile Configuration.
To define a device’s general profile override configuration:
1. Select the Configuration tab from the Web UI.
2. Select Devices from the Configuration tab.s
The Device Configuration screen displays a list of managed devices or peer controllers,
service platforms or Access Points.
3. Select a device (by double-clinking it) from amongst those displayed within the Device
Configuration screen.
Devices can also be selected directly from the Device Browser in the lower, left-hand, side
of the UI.
4. Select Profile Overrides from the Device menu to expand it into sub menu options.
5. Select General if it doesn’t display by default.
78Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
FIGURE 23Profile Overrides - General screen
NOTE
5
Server IP
Key Number
Key
Preferred
AutoKey
Version
A blue override icon (to the left of a parameter) defines the parameter as having an override applied.
To remove an override go to the Basic Configuration section of the device and click the Clear
Overrides button. This removes all overrides from the device.
6. Select the IP Routing option (within the Settings field) to enable routing for the device.
7.Se t a NoC Update Interval of 0, or from 5-300 seconds for updates from the RF Domain
manager to the controller or service platform.
8. Select + Add Row below the Network Time Protocol (NTP) table to launch a screen used to
define (or override) the configurations of NTP server resources the controller or service
platform uses it obtain its system time. Set the following parameters to define the NTP
configuration:
Set the IP address of each server as a potential NTP resource.
Select the number of the associated Authentication Key for the NTP resource.
If an autokey is not being used, manually enter a 64 character maximum key the controller or service
platform and NTP resource share to securely interoperate.
Select the radio button to designate this particular NTP resource as preferred. If using multiple NTP
resources, preferred resources are given first opportunity to connect to the controller or service
platform and provide NTP calibration.
Select the radio button to enable an Autokey configuration for the controller or service platform and
NTP resource. The default setting is disabled.
Use the spinner control to specify the version number used by this NTP server resource. The default
setting is 0.
9. Refer to the RAID Alarm field to either enable or disable the chassis alarm that sounds when
events are detected that degrade RAID support (drive content mirroring) on a NX9000 series
service platform.
Brocade Mobility RFS Controller System Reference Guide79
53-1003099-01
5
NOTE
RAID controller drive arrays are available within NX9000 series service platforms (RFS9510 models)
only. However, they can be administrated on behalf of a NX9000 profile by a different model service
platform or controller.
NX9000 series service platforms include a single Intel MegaRAID controller (virtual drive)
with RAID-1 mirroring support enabled. The online virtual drive supports up to two physical
drives that could require hot spare substitution if a drive were to fail. With the Mobility 5.5
release, an administrator can manage the RADI controller event alarm and syslogs
supporting the array hardware from the service platform user interface and is not required
to reboot the service platform BIOS.
For information on setting the service platform drive array configuration and diagnostic behavior of
its member drives, refer to RAID Operations on page 14-12. To view the service platform’s current
RAID array status, drive utilization and consistency check information, refer to RAID Statistics.
Select OK to save the changes and overrides made to the general profile configuration. Select
Reset to revert to the last saved configuration.
Cluster Configuration Overrides (Controllers and Service Platforms Only)
A redundancy group (cluster) is a set of controllers or service platforms (nodes) uniquely defined by
a profile configuration. Within the redundancy group, members discover and establish connections
to other peers and provide wireless self-healing support in the event of cluster member failure.
A cluster’s AP load balance is typically distributed evenly amongst the controllers or service
platforms in the cluster. Define how often this profile is load balanced for AP radio distribution as
often as you feel required, as radios can come and go and members can join and exit the cluster.
For information on setting a profile’s original cluster configuration (before applying an override),
see Profile Cluster Configuration (Controllers and Service Platforms Only).
As cluster memberships increase or decrease and their load requirements change, a profile may
need an override applied to best suit a site’s cluster requirements.
To apply an override (if required) to a profile cluster configuration:
1. Select the Configuration tab from the Web UI.
2. Select Devices from the Configuration tab.
The Device Configuration screen displays a list of devices or peer controllers service platforms
or Access Points.
3. Select a target device (by double-clinking it) from amongst those displayed within the Device
Configuration screen.
Devices can also be selected directly from the Device Browser in the lower, left-hand, side of
the UI.
4. Select Profile Overrides from the Device menu to expand it into sub menu options.
5. Select Cluster.
80Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
5
NOTE
A blue override icon (to the left of a parameter) defines the parameter as having an override applied.
To remove an override go to the Basic Configuration section of the device and click the Clear
Overrides button. This removes all overrides from the device.
FIGURE 24Profile Overrides - Cluster screen
Brocade Mobility RFS Controller System Reference Guide81
53-1003099-01
5
6. Optionally define the following Cluster Settings and overrides:
Cluster Mode
Cluster Name
Master Priority
Handle STP Convergence
Force Configured State
Force Configured State
Delay
A member can be in either an Active or Standby mode. All active member
controllers or service platforms can adopt Access Points. Standby members only
adopt Access Points when an active member has failed or sees an Access Point
that’s not yet adopted. The default cluster mode is Active and enabled for use
with the profile.
Define a name for the cluster name unique to its configuration or profile support
requirements. The name cannot exceed 64 characters.
Set a priority value from 1 and 255 with the higher value being given higher
priority. This configuration is the device’s priority to become cluster master. In
cluster environment one device from cluster members is elected as cluster
master. This configuration is the device’s priority to become cluster master. The
default value is 128.
Select the radio button to enable Spanning Tree Protocol (STP) convergence for
the controller or service platform. In general, this protocol is enabled in layer 2
networks to prevent network looping. Spanning Tree is a network layer protocol
that ensures a loop-free topology in a mesh network of inter-connected layer 2
controller or service platform. The spanning tree protocol disables redundant
connections and uses the least costly path to maintain a connection between
any two controllers or service platforms in the network. If enabled, the network
forwards data only after STP convergence. Enabling STP convergence delays the
redundancy state machine execution until the STP convergence is completed
(the standard protocol value for STP convergence is 50 seconds). Delaying the
state machine is important to load balance APs at startup. The default setting is
disabled.
Select the radio button to allow this controller or service platform to take over for
an active member if it were to fail. A standby controller or service platform in the
cluster takes over APs adopted by the failed active member. If the failed active
member were to come back up, the active member starts a timer based on the
Auto Revert Delay interval. At the expiration of the Auto Revert Delay, the standby
member releases all adopted APs and goes back to a monitoring mode. The Auto
Revert Delay timer is stopped and restarted if the active member goes down and
comes up during the Auto Revert Delay interval. The default value is disabled.
Specify a delay interval in minutes (1 - 1,800). This is the interval a standby
member waits before releasing adopted APs and goes back to a monitoring
mode when an active cluster member becomes active again after a failure. The
default interval is 5 minutes.
7.Wi t h i n th e Cluster Member field, select Cluster VLAN to enable a spinner control to designate
the VLAN where cluster members are reachable. Specify a VLAN from 1 - 4094.
Specify the IP addresses of the VLAN’s cluster members using the IP Address table.
8. Select OK to save the changes and overrides made to the profile’s cluster configuration. Select
Reset to revert to the last saved configuration.
Access Point Radio Power Overrides (Access Points Only)
A profile can manage the transmit output power of the Access Point radios it supports within the
network.
82Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
5
NOTE
NOTE
The Power option only appears within the Profile Overrides menu tree if an Access Point is selected
from within the main Devices screen. Power management is configured differently for controllers or
service platforms, so the Power screen only displays for Access Points.
Use the Power screen to set or override one of two power modes (3af or Auto) for a managed
Access Point. When automatic is selected, the Access Point safely operates within available power.
Once the power configuration is determined, the Access Point configures its operating power
characteristics based on its model and power configuration.
An Access Point uses a complex programmable logic device (CPLD). The CPLD determines proper
supply sequencing, the maximum power available and other status information. One of the primary
functions of the CPLD is to determine the Access Point’s maximum power budget. When an Access
Point is powered on (or performing a cold reset), the CPLD determines the maximum power
provided by the POE device and the budget available to the Access Point. The CPLD also
determines the access point hardware SKU and the number of radios. If the Access Point’s POE
resource cannot provide sufficient power (with all intended interfaces enabled), some of the
following interfaces could be disabled or modified:
• The Access Point’s transmit and receive algorithms could be negatively impacted
• The Access Point’s transmit power could be reduced due to insufficient power
• The Access Point’s WAN port configuration could be changed (either enabled or disabled)
To define an Access Point’s power configuration or apply an override to an existing parameter:
1. Select the Devices tab from the Web UI.
2. Select Profile Overrides to expand its sub menu items.
3. Select Power.
A screen displays where an Access Point’s power configuration can be defined or
overridden for a profile.
A blue override icon (to the left of a parameter) defines the parameter as having an override applied.
To remove an override go to the Basic Configuration section of the device and click the Clear
Overrides button. This removes all overrides from the device.
Brocade Mobility RFS Controller System Reference Guide83
53-1003099-01
5
NOTE
FIGURE 25Access Point Profile Power Override screen
4. Use the Power Mode drop-down menu to set or override the Power Mode Configuration on this
AP.
Single radio model Access Point’s always operate using a full power configuration. The power
management configurations described in this section do not apply to single radio models.
When an Access Point is powered on for the first time, the system determines the power
budget available to the Access Point. Using the Automatic setting, the Access Point
automatically determines the best power configuration based on the available power budget.
Automatic is the default setting.
If 802.3af is selected, the Access Point assumes 12.95 watts are available. If the mode is
changed, the Access Point requires a reset to implement the change. If 802.3at is selected,
the Access Point assumes 23 - 26 watts are available.
5. Set or override the Access Point radio’s 802.3af Power Mode and the radio’s 802.3at Power
Mode.
Use the drop-down menu to define a mode of either Range or Throughput.
Select Throughput to transmit packets at the radio’s highest defined basic rate (based on the
radio’s current basic rate settings). This option is optimal in environments where the
transmission range is secondary to broadcast/multicast transmission performance. Select
Range when range is preferred over performance for broadcast/multicast (group) traffic. The
data rates used for range are the lowest defined basic rates. Throughput is the default setting
for both 802.3af and 802.3at.
6. Select OK to save the changes and overrides made to the Access Point power configuration.
Select Reset to revert to the last saved configuration.
84Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
5
NOTE
NOTE
Access Point Adoption Overrides (Access Points Only)
Adoption is the process an Access Point uses to discover available controllers or service platforms,
pick the most desirable one, establish an association and optionally obtain an image upgrade and
configuration. Adoption is configurable and supported within a device profile and applied to other
Access Points supported by the profile. Individual attributes of an Access Point’s auto provisioning
policy can be overridden as specific parameters require modification.
At adoption, an Access Point solicits and receives multiple adoption responses from controllers and
service platforms available on the network. These adoption responses contain loading policy
information the Access Point uses to select the optimum controller or service platform for adoption.
By default, an auto provisioning policy generally distributes AP adoption evenly amongst available
controllers and service platforms. Modify existing adoption policies or create a new one as needed
to meet the adoption requirements of a device and their assigned profile.
A device configuration does not need to be present for an auto provisioning policy to take effect.
Once adopted, and the device’s configuration is defined and applied by the controller or service
platform, the auto provisioning policy mapping does not have impact on subsequent adoptions by
the same device.
An auto provisioning policy enables an administrator to define adoption rules for the supported
Access Points capable of being adopted by a wireless controller.
To define an Access Point’s adoption configuration or apply an override:
1. Select the Devices from the Web UI.
2. Select Profiles from the Configuration tab.
3. Select Profile Overrides to expand its sub-menu items.
4. Select Adoption.
A screen displays where an Access Point’s adoption configuration can be defined and
overridden for a profile.
A blue override icon (to the left of a parameter) defines the parameter as having an override applied.
To remove an override go to the Basic Configuration section of the device and click the Clear
Overrides button. This removes all overrides from the device.
Brocade Mobility RFS Controller System Reference Guide85
53-1003099-01
5
FIGURE 26Access Point Adoption Override screen
5. Define or override the Preferred Group used as optimal group for the Access Point’s adoption.
The name of the preferred group cannot exceed 64 characters.
6. Set the following Controller Hello Interval settings manage message exchanges and
connection re-establishments between adopting devices:
Hello Interval
Adjacency Hold Time
Define an interval (from 1 - 120 seconds) between hello keep alive messages
exchanged with the adopting device. These messages serve as a connection
validation mechanism to ensure the availability of the adopting resource.
Set the time (from 2 - 600 seconds) after the last hello packet after which the
connection between the controller and Access Point is defined as lost and their
connection is re-established. When a hello interval is set, an adjacency hold time is
mandatory and should be higher then the hello interval.
7.Select the check box to define or override a VLAN the Access Point’s associating controller or
service platform is reachable on.
VLANs 0 and 4,094 are reserved and cannot be used by a controller or service platform
VLAN.
8. Enter Controller Hostnames as needed to define or override resources for Access Point
adoption.
86Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
5
NOTE
Select + Add Row as needed to populate the table with IP Addresses or Hostnames used
as Access Point adoption resources into the managed network.
Host
Pool
Routing Level
IPSec Secure
IPSec GW
Force
Remote VPN Client
Use the drop-down menu to specify whether the adoption resource is defined as
a (non DNS) IP Address or a Hostname. Once defined, provide the numerical IP
or Hostname. A Hostname cannot exceed 64 characters.
Use the spinner control to set a pool of either 1 or 2. This is the pool the target
controller or service platform belongs to.
Define a routing level (either 1 or 2) for the link between adopting devices. The
default setting is 1.
Enable this option to provide IPSec secure peer authentication on the
connection (link) between the adopting devices. This option is disabled by
default.
Select the numerical IP address or administrator defined hostname of the
adopting controller resource.
Enable this setting to create a forced link between an Access Point and adopting
controller, even when not necessarily needed. This setting is disabled by default.
Displays whether a secure controller link has been established using a remote
VPN client.
9. Select OK to save the changes and overrides made to the Access Point profile adoption
configuration. Select Reset to revert to the last saved configuration.
Adoption Overrides (Controllers Only)
Adoption is the process an Access Point uses to discover available controllers, pick the most
desirable controller, establish a controller association and optionally obtain an image upgrade and
configuration. Adoption is configurable and supported within a device profile and applied to other
Access Points supported by the profile. Individual attributes of an Access Point’s auto provisioning
policy can be overridden as specific parameters require modification.
At adoption, an Access Point solicits and receives multiple adoption responses from controllers and
service platforms available on the network. These adoption responses contain loading policy
information the Access Point uses to select the optimum controller or service platform for adoption.
By default, an auto provisioning policy generally distributes AP adoption evenly amongst available
controllers and service platforms. Modify existing adoption policies or create a new one as needed
to meet the adoption requirements of a device and their assigned profile.
A device configuration does not need to be present for an auto provisioning policy to take effect.
Once adopted, and the device’s configuration is defined and applied by the controller or service
platform, the auto provisioning policy mapping does not have impact on subsequent adoptions by
the same device.
To define a controller or service platform’s adoption configuration:
1. Select the Devices from the Web UI.
2. Select Profiles.
3. Select Profile Overrides to expand its sub-menu items.
4. Select Adoption.
Brocade Mobility RFS Controller System Reference Guide87
53-1003099-01
5
NOTE
A screen displays where a controller or service platform’s adoption configuration can be
set or overridden for a profile.
A blue override icon (to the left of a parameter) defines the parameter as having an override applied.
To remove an override go to the Basic Configuration section of the device and click the Clear
Overrides button. This removes all overrides from the device.
FIGURE 27Controller Adoption Override screen
5. Within the Controller Group field, use the Group item to set provide the controller group this
controller or service platform belongs to. A preferred group can also be selected for the
adoption of this controller or service platform. The name of the preferred group cannot exceed
64 characters.
88Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.