Virtual Controller (Master Aruba iAP)

CONFIGURATION GUIDE

The purpose of the following manual is to describe the necessary configuration of the Aruba Instant equipment for integration with the Octopus Platform.

1- Pre-requisites

  • If there is a firewall in the network that might block the traffic, you will need to allow access to some domains to enable user's authentication:

    • Radius Servers:

      • Primary: <IP_Radius_1> 1812 and 1813 UDP ports

      • Secondary: <IP_Radius_2> 1812 and 1813 UDP ports

    • Splash Portal server: 

      • Domain <captive_portal_domain> 80 and 443 TCP ports

  • For the operation of the Guest and Enterprise modules configuration, it will be necessary to previously contract the Octopus platform licenses with the respective modules.

2- Guest module configuration

2.1  WLAN configuration and certificate import

First of all you will have to import the certificates that will be used in the controller, for this in the configuration is necessary to access to Maintenance> Certificates, and click on Upload New Certificate and fill in the values:

  • Certificate file to upload: select the .pem file provided

  • Certificate type: Captive portal server.

  • Certificate format: PAM (.pem .cert or .crt)

  • Passphrase: leave blank.

  • Retype Passphrase: leave blank.

Once you have filled in all the fields, click on the Upload Certificate button and verify that it has been downloaded correctly:

Check in CLI that the certificate has been successfully added by executing the show cert command

2.2  WLAN Settings

To edit a specific Network in the Virtual Controller graphical interface. Go to Networks and edit the WLAN of your choice or create a new one. After opening a new tab with the configuration Wizard, follow the steps below:

 

  • Name (SSID): SSID that the APs will radiate.

  • Primary usage: Guest

 

 

2.3  VLAN

  • Client IP assignment: select the option depending on the network design (DHCP assigned by the Virtual Controller or by another network element).

  • Client VLAN assignment: add the VLAN that will be assigned to the SSID.

2.4  Security

To set up the captive portal configuration, please access to Security tab and perform the following configuration.

  • Splash page type: External

  • Captive portal profile: añadir un nuevo Captive Portal Profile con la siguiente configuración:

    • Name: WIFI

    • Type: Radius Authentication

    • IP or hostname: <captive_portal_domain>

    • URL: /login/hotspot/arubaiap

    • Port: 443

    • Use https: Enabled

    • Captive portal failure: Deny internet

    • Automatic URL whitelisting: Disabled

    • Redirect URL: leave it blank to be able to manage the redirection web site from WiFi platform.

  • Auth server 1: add a new Radius Server with the following parameters:

    • Type: RADIUS

    • Name: RADIUS1

    • IP address: <IP_Radius_1>

    • Auth port: 1812

    • Acct port: 1813

    • Shared key: <Secret>

    • Retype key: <Secret>

  • Auth server 2: add a new Radius Server profile and add the following parameters:

    • Type: RADIUS

    • Name: RADIUS2

    • IP address: <IP_Radius_2>

    • Auth port: 1812

    • Acct port: 1813

    • Shared key: <Secret>

    • Retype key: <Secret>

  • Reauth interval: 24 hrs

  • Accounting: Use authentication servers

  • Accounting mode: Authentication

  • Accounting interval: 10 min

  • Blacklisting: Disabled

2.5  Access

Finally, the role must be configured in Access.

  • Select the option role-based (more control option)

  • In the "Roles" window, create a new role called Preauth.

  • Add a new access rule into this role for each domain listed in the walled garden with the following configuration: 

    • Rule type: Access control

    • Service: Network -  any

    • Action: allow

    • Destination: to domain name

    • Domain name: <captive_portal_domain>

  •  Assign pre-authenticaction role: select the role Preauth

If you wish to add extra domains (Social Networks, Paypal, etc...) they can be consulted from the following link.


2.6 Dynamic Radius Proxy (DRP)

The option Dynamic Radius Proxy allows to send all the access requests to the Radius Server using the Virtual Controller IP address instead of the IP of each access point. 

To enable this configuration access to System > General and enable the option Dynamic Radius Proxy

 

Once this option is enabled all requests sent to the Radius server will be sent by default with the Virtual Controller's IP, however you can modify this default IP to set any other IP even if it is not the Virtual Controller's IP.

To change the IP with which messages are sent to the Radius server, edit the SSID and in the Security tab edit the Radius server configuration by modifying the following parameters:

2.7  Authorized MAC Addresses

In order to allow the users to authenticate themselves in the captive portal correctly, it is necessary to identify the NAS that will send the authentication requests to the Radius Server. In Aruba Instant, it is required to add the MAC address of every access point that will radiate the configured SSID.

These MAC addresses can be obtained from the Access Point tab of the Instant main window.

For information on how to add the MAC address of each AP as an authorized NAS on the platform, please refer to the following link Locations

3- Enterprise module configuration

In order to integrate the configurations of this module with the platform, it is necessary to contract the Octopus Wifi Enterprise Module.

3.1 Captive portal + MAC Authentication configuration

To enable MAC Authentication it is necessary to edit the WLAN created and enable this option. To do so, go to Networks and edit the WLAN on which you want to enable MAC Authentication. In the configuration wizard go to the Security tab and modify the following parameters:

  • MAC Authenticaiton: Enabled

  • Delimitir character: :

After these changes are performed, click Next and then click on the Finish button to save this configuration.

3.2 MAC Authentication configuration

To create an SSID dedicated only to MAC Authentication validation, go to Networks and edit the WLAN of your choice or create a new one. After opening a new tab with the configuration wizard, follow the steps below:

  • Name (SSID): configure the SSID for example Mac_Auth_Guest.

  • Primary usage: Guest

Then click on Next

  • Client IP assignment: select the option depending on the network design (DHCP assigned by the Virtual Controller or by another network element).

  • Client VLAN assignment: add the VLAN to be associated with the SSID.

Continue by clicking on Next

  • Splash page type: None

  • MAC authentication: Enable

  • Link the radius servers created in point 2.4 of this guide

We continue with Next

 Once this is done, click Finish.

3.3 Configuration of “Access Profiles” funtionality in the Octopus Platform

Through the Octopus platform it is possible to configure a series of reply attributes of the Access-Accept packages, grouped in the so-called Access Profiles. These Access Profiles allow you to activate a series of functionalities in Aruba Central. Although the most common and proprietary Aruba radius dictionaries are available, below is a list of some of the most interesting ones:

Attribute

Description

Format

Attribute

Description

Format

Idle-timeout

Maximum inactivity time. If the user does not transfer any data on the network during this time, the session will be terminated and the user will have to re-authenticate.

Seconds

Aruba-User-Vlan

Assignment of a previously created VLAN in Aruba Central

 

Aruba-User-Role

Assignment of a previously created Role in Aruba Central

 

Reply-Message

Useful for troubleshooting functions, as it allows to identify associated elements of the Octopus Wifi platform, such as an access profile, access method, location, ...

 

Example of an Access Profile configuration with the attributes explained above:

 

For more information on how to create an Access Profile in Octopus Platform go to Access profiles