This document is the user guide for AirWave 8.2.10. It begins with an introduction and overview of the key features and capabilities of AirWave. The bulk of the document then provides step-by-step instructions for configuring various aspects of AirWave including networks, devices, users, monitoring, alerts, reporting and more. It also includes references to logs, documentation and other troubleshooting resources.
This document provides an overview and user guide for ArubaOS 6.4. It includes sections on fundamentals, deployment scenarios, configuring the controller, control plane security, software licenses, network configuration parameters, and IPv6 support. The document notes copyright information and open source code used by Aruba products. It also includes legal notices regarding VPN termination and warranty information.
This document provides an overview and user guide for ClearPass Guest 6.3. It includes sections on guest management processes, device management, onboarding and workspace features, digital passes, email receipts, customizing forms and interfaces, hotspot management, administration settings, and more. The document outlines the key capabilities and features of ClearPass Guest and provides instructions and examples for common configuration and customization tasks.
This document provides a summary of the Aruba Instant 6.4.0.2-4.1 User Guide, including:
- An overview of Aruba Instant and supported devices.
- Details on new features in version 6.4.0.2-4.1 such as wireless network profiles and captive portal configurations.
- Instructions for initial configuration tasks like modifying the IAP name and location details.
- Sections on monitoring the network, configuring wireless and wired profiles, and authentication methods.
The user guide contains information to help users set up, configure, and manage an Instant network and IAP devices.
This document is the user guide for ClearPass Guest 6.4. It provides an overview of ClearPass Guest functionality and features for visitor management, device provisioning, and customizing the guest portal. The guide covers topics such as guest self-registration, device registration, digital passes, advertising services, and system administration. It is intended to help users understand and utilize the various ClearPass Guest modules.
This document provides a user guide for the ArubaOS 6.3 operating system. It includes sections on fundamentals, deployment scenarios, configuring controllers and networks, control plane security, software licenses, and network configuration parameters. The summary provides high-level information about the document contents and structure but does not include all details.
This document provides instructions for setting up and configuring RSA Authentication Manager 8.4. It includes guidance on planning deployment such as supported platforms, prerequisites for primary and replica instances, and deployment checklists. It then covers deploying the primary instance through Amazon Machine Image, Azure image file, or virtual/hardware appliances. Setup of the replica instance and configuring a load balancer are also described. The guide concludes with next steps around web tier installation and upgrading from previous versions.
This document provides a summary of the ClearPass Policy Manager 6.3 User Guide. It includes sections on common tasks in Policy Manager such as importing, exporting, and resetting passwords. It also summarizes the main components of Policy Manager including monitoring, accounting, analysis and trending, identity, policy modeling, services, authentication and authorization, posture, enforcement, network access devices, and proxy targets. The document is a user guide that assists users in configuring and using the ClearPass Policy Manager system.
This document is the ClearPass Policy Manager 6.3 User Guide. It provides an overview of common tasks in Policy Manager such as importing, exporting, powering up the hardware, resetting passwords, and generating support keys. It also summarizes the main components of Policy Manager including the dashboard, monitoring, accounting, analysis and trending, audit viewer, event viewer, and data filters. Finally, it provides high-level summaries of the policy model, services, authentication and authorization, identity configurations, posture, enforcement, network access devices, and proxy targets.
This document provides an overview and user guide for ArubaOS 6.4. It includes sections on fundamentals, deployment scenarios, configuring the controller, control plane security, software licenses, network configuration parameters, and IPv6 support. The document notes copyright information and open source code used by Aruba products. It also includes legal notices regarding VPN termination and warranty information.
This document provides an overview and user guide for ClearPass Guest 6.3. It includes sections on guest management processes, device management, onboarding and workspace features, digital passes, email receipts, customizing forms and interfaces, hotspot management, administration settings, and more. The document outlines the key capabilities and features of ClearPass Guest and provides instructions and examples for common configuration and customization tasks.
This document provides a summary of the Aruba Instant 6.4.0.2-4.1 User Guide, including:
- An overview of Aruba Instant and supported devices.
- Details on new features in version 6.4.0.2-4.1 such as wireless network profiles and captive portal configurations.
- Instructions for initial configuration tasks like modifying the IAP name and location details.
- Sections on monitoring the network, configuring wireless and wired profiles, and authentication methods.
The user guide contains information to help users set up, configure, and manage an Instant network and IAP devices.
This document is the user guide for ClearPass Guest 6.4. It provides an overview of ClearPass Guest functionality and features for visitor management, device provisioning, and customizing the guest portal. The guide covers topics such as guest self-registration, device registration, digital passes, advertising services, and system administration. It is intended to help users understand and utilize the various ClearPass Guest modules.
This document provides a user guide for the ArubaOS 6.3 operating system. It includes sections on fundamentals, deployment scenarios, configuring controllers and networks, control plane security, software licenses, and network configuration parameters. The summary provides high-level information about the document contents and structure but does not include all details.
This document provides instructions for setting up and configuring RSA Authentication Manager 8.4. It includes guidance on planning deployment such as supported platforms, prerequisites for primary and replica instances, and deployment checklists. It then covers deploying the primary instance through Amazon Machine Image, Azure image file, or virtual/hardware appliances. Setup of the replica instance and configuring a load balancer are also described. The guide concludes with next steps around web tier installation and upgrading from previous versions.
This document provides a summary of the ClearPass Policy Manager 6.3 User Guide. It includes sections on common tasks in Policy Manager such as importing, exporting, and resetting passwords. It also summarizes the main components of Policy Manager including monitoring, accounting, analysis and trending, identity, policy modeling, services, authentication and authorization, posture, enforcement, network access devices, and proxy targets. The document is a user guide that assists users in configuring and using the ClearPass Policy Manager system.
This document is the ClearPass Policy Manager 6.3 User Guide. It provides an overview of common tasks in Policy Manager such as importing, exporting, powering up the hardware, resetting passwords, and generating support keys. It also summarizes the main components of Policy Manager including the dashboard, monitoring, accounting, analysis and trending, audit viewer, event viewer, and data filters. Finally, it provides high-level summaries of the policy model, services, authentication and authorization, identity configurations, posture, enforcement, network access devices, and proxy targets.
This document provides an overview and user guide for ArubaOS 7.3. It covers system basics, profiles management, interface configuration and management, stacking, VLANs, port channels, OAM, and other features. The document includes sections on legal notices, open source software, warranty, and copyright. It provides configuration examples and instructions for using both the CLI and web interface.
This document provides a software configuration guide for Cisco Aironet 340 and 350 series access point radios and Ethernet interfaces. It includes instructions for configuring basic settings like the system name and SSID, radio settings, VLAN configuration, filters and quality of service settings, Proxy Mobile IP, and other optional settings. The document also covers security configuration such as setting up WEP, enabling additional security features, and configuring different authentication types including open, shared key, EAP, and MAC-based authentication.
ArcSight Management Center 2.2 Administrator's Guide.pdfProtect724mouni
This document provides an administrator's guide for HPE ArcSight Management Center version 2.2. It covers topics such as installing and uninstalling ArcSight Management Center, managing nodes and HPE ArcSight products, managing configurations, monitoring, backups and restores, system administration, and special connector configurations. The document contains legal notices, a table of contents, and appendices with additional information.
ArcSight Management Center 2.5 Administrator's Guide Protect724mouni
This document provides an administrator's guide for HPE ArcSight Management Center 2.5. It describes how to install, configure, and manage the ArcSight Management Center platform as well as the connectors, containers, and other managed products it supports. The guide covers topics such as installing ArcSight Management Center, managing nodes and products from the user interface, configuring backups and restores, and performing system administration tasks. It is intended to help administrators effectively use ArcSight Management Center to centrally monitor, configure, and manage their ArcSight deployment.
ArcSight Management Center 2.2 P1 Administrator's Guide.pdfProtect724mouni
This document provides an administrator's guide for HPE ArcSight Management Center version 2.2 Patch 1. It describes how to install, configure, and manage ArcMC and the nodes it manages, including connectors, containers, loggers, and other ArcMCs. The document covers topics such as installing ArcMC, managing nodes and products, configurations, monitoring, backups and restores, licensing, and system administration.
The document introduces Aruba's Virtual Branch Network solution which virtualizes complex network operations in the data center and extends services securely to branch offices and teleworkers. This provides dedicated network infrastructure control and experience at a lower cost than traditional solutions. Remote deployments are simplified for IT to manage while supporting a distributed workforce across varying device types from a centralized management system.
This document provides an overview and conceptual information about ExtremeXOS and its features. It covers topics such as switch management, software management, stack configuration, port and slot configuration, protocols, security, quality of service, routing, and more. The document is intended to help readers understand fundamental ExtremeXOS concepts.
The document provides an overview of new commands, modified commands, and deprecated commands in the ArubaOS 6.4 Command-Line Interface. It also describes how to connect to the controller using the serial port or Telnet/SSH, navigate between different command modes, and get help with commands.
This document provides a summary of Cisco Application Centric Infrastructure (ACI) virtualization capabilities and configuration guidelines. It covers topics such as configuring virtual machine networking policies using Cisco APIC, managing uplinks for virtual machine manager (VMM) domains, configuring custom EPG names, using microsegmentation with Cisco ACI, and integrating Cisco ACI with VMware vCenter, VMware vRealize, Cisco UCSM, VMware NSX-T, and Cisco ACI Virtual Edge. The document is intended for network administrators who need to configure and manage virtualized networking solutions using Cisco ACI.
This guide covers the deployment of Aruba remote access points (RAP) in fixed telecommuter and micro branch office sites, and it is considered part of the base designs guides within the VRD core technologies series. This guide covers the design recommendations for remote network deployment and it explains the various configurations needed to implement a secure, high-performance virtual branch office (VBN) solution with Aruba RAPs.
This guide covers the deployment of Aruba remote access points (RAP) in fixed telecommuter and micro branch office sites, and it is considered part of the base designs guides within the VRD core technologies series. This guide covers the design recommendations for remote network deployment and it explains the various configurations needed to implement a secure, high-performance virtual branch office (VBN) solution with Aruba RAPs.
The document discusses the Internet of Everything (IoE) and connectivity challenges. By 2020, it is estimated that over 25 billion devices will be connected. The IoE brings challenges around discovering devices, identifying services, adapting to changes, managing diverse networks, enabling interoperability across operating systems, and securing connections. The AllJoyn framework and Wi-Fi connectivity help address these challenges by allowing smart devices to connect, interoperate and work together across brands and categories. The Qualcomm XSPAN Wi-Fi portfolio, including the QCA4004 system on chip, aims to enable ubiquitous connectivity for the IoE. Development tools are provided to help build applications for hostless "smart things."
Creator Ci40 IoT kit & Framework - scalable LWM2M IoT dev platform for businessPaul Evans
Delivering a scalable open-source IoT frameworks that fits your business needs can be challenging. Meet the Creator IoT-in-a-box development platform. Hardware and software delivering a complete end-to-end open-source IoT framework, designed to fit the needs of businesses looking integrate IoT solutions, right off-the-shelf. Beyond simply connecting a single device to your phone, businesses need to be able to securely scale and inter-operate with existing equipment. Using open standards such as LWM2M and IPSO objects in a secure environment, over multiple radio standards such as Wi-Fi, Bluetooth, 802.15.4 and many others for that matter, is fast becoming a must for commercial operations who need to own their own destiny and future-proof their solutions. Find out more about the Creator Ci40 IoT-in-a-box development kits and open source Creator IoT framework with this presentation.
The document provides an overview of the CAMARA API project, which aims to standardize telco APIs. It discusses CAMARA's goals of abstracting network capabilities into developer-friendly services APIs and its collaboration with GSMA and other organizations. Key CAMARA APIs are summarized, including Quality on Demand, Device Status, Location Verification, Number Verification, SIM Swap, and Carrier Billing. The API definitions and use cases for some of these are outlined.
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld
VMworld 2013
Ben Basler, VMware
Roberto Mari, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
We will discuss the following: Classical Security Methods, AAA, Authentication, Authorization, Accounting, AAA Characteristic, Local Based AAA, Server Based AAA, TACACS+ and RADIUS.
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Amazon Web Services
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). First, we will cover build-out and design fundamentals for VPC, including picking your IP space, subnetting, routing, security, NAT, and much more. We will then transition into different approaches and use cases for optionally connecting your VPC to your physical data center with VPN or AWS Direct Connect. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision-makers interested in understanding the building blocks AWS makes available with VPC and how you can connect this with your offices and current data center footprint.
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Amazon Web Services
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). First, we will cover build-out and design fundamentals for VPC, including picking your IP space, subnetting, routing, security, NAT, and much more. We will then transition into different approaches and use cases for optionally connecting your VPC to your physical data center with VPN or AWS Direct Connect. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision-makers interested in understanding the building blocks AWS makes available with VPC and how you can connect this with your offices and current data center footprint.
This document provides information about XBee/XBee-PRO S2C ZigBee RF modules, including specifications, operation instructions, networking concepts, and regulatory compliance. It has undergone several revisions to update hardware specifications, firmware notes, and various commands. The document covers topics such as serial communication, sleeping modes, routing, security, and more.
AirWave can be optimally configured to manage Aruba infrastructure by:
1. Disabling SNMP rate limiting to improve polling intervals.
2. Entering required credentials like SNMP strings and Telnet/SSH credentials.
3. Setting recommended SNMP timeouts and retries.
4. Enabling support for channel utilization and statistics in AirWave and on Aruba controllers.
The document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete an order form with instructions, sources, and deadline. 3) Review bids from writers and choose one. 4) Receive the paper and authorize payment if satisfied. 5) Request revisions until fully satisfied, with a refund option for plagiarized work.
Learn How To Tell The TIME Properly In English 7ESLLisa Muthukumar
The document discusses Toyota's recall issues from 2009-2010. Toyota recalled millions of vehicles
due to unintended acceleration problems. The recalls cost Toyota billions of dollars and damaged its
reputation for quality and safety. Federal regulators heavily fined Toyota for its handling of the
recalls.
This document provides an overview and user guide for ArubaOS 7.3. It covers system basics, profiles management, interface configuration and management, stacking, VLANs, port channels, OAM, and other features. The document includes sections on legal notices, open source software, warranty, and copyright. It provides configuration examples and instructions for using both the CLI and web interface.
This document provides a software configuration guide for Cisco Aironet 340 and 350 series access point radios and Ethernet interfaces. It includes instructions for configuring basic settings like the system name and SSID, radio settings, VLAN configuration, filters and quality of service settings, Proxy Mobile IP, and other optional settings. The document also covers security configuration such as setting up WEP, enabling additional security features, and configuring different authentication types including open, shared key, EAP, and MAC-based authentication.
ArcSight Management Center 2.2 Administrator's Guide.pdfProtect724mouni
This document provides an administrator's guide for HPE ArcSight Management Center version 2.2. It covers topics such as installing and uninstalling ArcSight Management Center, managing nodes and HPE ArcSight products, managing configurations, monitoring, backups and restores, system administration, and special connector configurations. The document contains legal notices, a table of contents, and appendices with additional information.
ArcSight Management Center 2.5 Administrator's Guide Protect724mouni
This document provides an administrator's guide for HPE ArcSight Management Center 2.5. It describes how to install, configure, and manage the ArcSight Management Center platform as well as the connectors, containers, and other managed products it supports. The guide covers topics such as installing ArcSight Management Center, managing nodes and products from the user interface, configuring backups and restores, and performing system administration tasks. It is intended to help administrators effectively use ArcSight Management Center to centrally monitor, configure, and manage their ArcSight deployment.
ArcSight Management Center 2.2 P1 Administrator's Guide.pdfProtect724mouni
This document provides an administrator's guide for HPE ArcSight Management Center version 2.2 Patch 1. It describes how to install, configure, and manage ArcMC and the nodes it manages, including connectors, containers, loggers, and other ArcMCs. The document covers topics such as installing ArcMC, managing nodes and products, configurations, monitoring, backups and restores, licensing, and system administration.
The document introduces Aruba's Virtual Branch Network solution which virtualizes complex network operations in the data center and extends services securely to branch offices and teleworkers. This provides dedicated network infrastructure control and experience at a lower cost than traditional solutions. Remote deployments are simplified for IT to manage while supporting a distributed workforce across varying device types from a centralized management system.
This document provides an overview and conceptual information about ExtremeXOS and its features. It covers topics such as switch management, software management, stack configuration, port and slot configuration, protocols, security, quality of service, routing, and more. The document is intended to help readers understand fundamental ExtremeXOS concepts.
The document provides an overview of new commands, modified commands, and deprecated commands in the ArubaOS 6.4 Command-Line Interface. It also describes how to connect to the controller using the serial port or Telnet/SSH, navigate between different command modes, and get help with commands.
This document provides a summary of Cisco Application Centric Infrastructure (ACI) virtualization capabilities and configuration guidelines. It covers topics such as configuring virtual machine networking policies using Cisco APIC, managing uplinks for virtual machine manager (VMM) domains, configuring custom EPG names, using microsegmentation with Cisco ACI, and integrating Cisco ACI with VMware vCenter, VMware vRealize, Cisco UCSM, VMware NSX-T, and Cisco ACI Virtual Edge. The document is intended for network administrators who need to configure and manage virtualized networking solutions using Cisco ACI.
This guide covers the deployment of Aruba remote access points (RAP) in fixed telecommuter and micro branch office sites, and it is considered part of the base designs guides within the VRD core technologies series. This guide covers the design recommendations for remote network deployment and it explains the various configurations needed to implement a secure, high-performance virtual branch office (VBN) solution with Aruba RAPs.
This guide covers the deployment of Aruba remote access points (RAP) in fixed telecommuter and micro branch office sites, and it is considered part of the base designs guides within the VRD core technologies series. This guide covers the design recommendations for remote network deployment and it explains the various configurations needed to implement a secure, high-performance virtual branch office (VBN) solution with Aruba RAPs.
The document discusses the Internet of Everything (IoE) and connectivity challenges. By 2020, it is estimated that over 25 billion devices will be connected. The IoE brings challenges around discovering devices, identifying services, adapting to changes, managing diverse networks, enabling interoperability across operating systems, and securing connections. The AllJoyn framework and Wi-Fi connectivity help address these challenges by allowing smart devices to connect, interoperate and work together across brands and categories. The Qualcomm XSPAN Wi-Fi portfolio, including the QCA4004 system on chip, aims to enable ubiquitous connectivity for the IoE. Development tools are provided to help build applications for hostless "smart things."
Creator Ci40 IoT kit & Framework - scalable LWM2M IoT dev platform for businessPaul Evans
Delivering a scalable open-source IoT frameworks that fits your business needs can be challenging. Meet the Creator IoT-in-a-box development platform. Hardware and software delivering a complete end-to-end open-source IoT framework, designed to fit the needs of businesses looking integrate IoT solutions, right off-the-shelf. Beyond simply connecting a single device to your phone, businesses need to be able to securely scale and inter-operate with existing equipment. Using open standards such as LWM2M and IPSO objects in a secure environment, over multiple radio standards such as Wi-Fi, Bluetooth, 802.15.4 and many others for that matter, is fast becoming a must for commercial operations who need to own their own destiny and future-proof their solutions. Find out more about the Creator Ci40 IoT-in-a-box development kits and open source Creator IoT framework with this presentation.
The document provides an overview of the CAMARA API project, which aims to standardize telco APIs. It discusses CAMARA's goals of abstracting network capabilities into developer-friendly services APIs and its collaboration with GSMA and other organizations. Key CAMARA APIs are summarized, including Quality on Demand, Device Status, Location Verification, Number Verification, SIM Swap, and Carrier Billing. The API definitions and use cases for some of these are outlined.
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld
VMworld 2013
Ben Basler, VMware
Roberto Mari, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
We will discuss the following: Classical Security Methods, AAA, Authentication, Authorization, Accounting, AAA Characteristic, Local Based AAA, Server Based AAA, TACACS+ and RADIUS.
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Amazon Web Services
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). First, we will cover build-out and design fundamentals for VPC, including picking your IP space, subnetting, routing, security, NAT, and much more. We will then transition into different approaches and use cases for optionally connecting your VPC to your physical data center with VPN or AWS Direct Connect. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision-makers interested in understanding the building blocks AWS makes available with VPC and how you can connect this with your offices and current data center footprint.
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Amazon Web Services
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). First, we will cover build-out and design fundamentals for VPC, including picking your IP space, subnetting, routing, security, NAT, and much more. We will then transition into different approaches and use cases for optionally connecting your VPC to your physical data center with VPN or AWS Direct Connect. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision-makers interested in understanding the building blocks AWS makes available with VPC and how you can connect this with your offices and current data center footprint.
This document provides information about XBee/XBee-PRO S2C ZigBee RF modules, including specifications, operation instructions, networking concepts, and regulatory compliance. It has undergone several revisions to update hardware specifications, firmware notes, and various commands. The document covers topics such as serial communication, sleeping modes, routing, security, and more.
AirWave can be optimally configured to manage Aruba infrastructure by:
1. Disabling SNMP rate limiting to improve polling intervals.
2. Entering required credentials like SNMP strings and Telnet/SSH credentials.
3. Setting recommended SNMP timeouts and retries.
4. Enabling support for channel utilization and statistics in AirWave and on Aruba controllers.
The document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete an order form with instructions, sources, and deadline. 3) Review bids from writers and choose one. 4) Receive the paper and authorize payment if satisfied. 5) Request revisions until fully satisfied, with a refund option for plagiarized work.
Learn How To Tell The TIME Properly In English 7ESLLisa Muthukumar
The document discusses Toyota's recall issues from 2009-2010. Toyota recalled millions of vehicles
due to unintended acceleration problems. The recalls cost Toyota billions of dollars and damaged its
reputation for quality and safety. Federal regulators heavily fined Toyota for its handling of the
recalls.
Where To Buy College Essay Of The Highest QualityLisa Muthukumar
This document provides instructions for purchasing a high-quality college essay from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Choose a bid from writers based on qualifications. 4) Review the paper and authorize payment if pleased. 5) Request revisions to ensure satisfaction, with a full refund option for plagiarism. The purpose is to guide customers through purchasing original, customized essays from qualified writers on the site.
What Is A Reaction Essay. Reaction Essay. 2019-01-24Lisa Muthukumar
The document provides instructions for using the HelpWriting.net service to have papers written. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete an order form with instructions, sources, and deadline. 3) Review bids from writers and choose one. 4) Review the completed paper and authorize payment. 5) Request revisions until satisfied with the paper. It emphasizes that original, high-quality content is guaranteed or a full refund will be provided.
Writing A Strong Essay. Paper Rater Writing A Strong Essay. 2022-11-05.pdf Wr...Lisa Muthukumar
The Real Irish Republican Army (RIRA) broke away from the IRA in 1997 because the IRA called a ceasefire, while the RIRA wanted to continue fighting. The RIRA aims to remove British control of Northern Ireland and unify Ireland. It operates out of Northern Ireland, the Irish Republic, Britain, and parts of Europe, with several hundred members. The RIRA remains dedicated to its goals through militant and sometimes violent means.
List Of Transitional Words For Writing Essays. Online assignment writing serv...Lisa Muthukumar
The document provides a 5-step process for requesting and receiving writing assistance from HelpWriting.net. It outlines the registration, order placement, bidding, review, and revision steps. Customers can request revisions until satisfied with the original, plagiarism-free content provided by HelpWriting writers.
Galileo Galilei was an influential Italian scientist during the 1500s-1600s who made important contributions to the fields of motion, astronomy, and material strength classification. He accepted Copernicus' heliocentric model of the solar system and helped convert natural philosophy from a verbal to a more mathematical and experiment-based approach. The document provides biographical details about Galileo's background and career accomplishments as a philosopher, astronomer, and mathematician who helped advance scientific thought and methods.
How To Start Writing Essay About Yourself. How To StaLisa Muthukumar
PageNors Investments was founded in 2006 in Madison, Wisconsin by Sally Page and Jackson
Norstern to provide investment services to individuals in the Madison area. The firm aims to serve
clients in Madison and the surrounding communities of Dane County. Their website provides an
overview of the company's origins and services focused on the local market in Madison.
Writing A Summary In 3 Steps Summary Writing, TLisa Muthukumar
Penguins have thick layers of fat and feathers to insulate them from the extreme cold. Seals have blubber layers and dense fur to retain heat. Both penguins and seals have streamlined bodies for efficient swimming in icy waters. Antarctic krill and fish survive by producing antifreeze proteins in their blood that prevent freezing.
012 College Application Essay Examples About YoLisa Muthukumar
This document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, deadline. 3) Review bids from writers and choose one based on qualifications. 4) Receive the paper and ensure it meets expectations before authorizing payment. 5) Request revisions to ensure satisfaction, and HelpWriting.net offers refunds for plagiarized work. The document explains how to obtain high-quality, original content through their writing assistance service.
Thanksgiving Writing Paper Free Printable - Printable FLisa Muthukumar
The document discusses a biology lab experiment on the effect of osmosis on potato cells placed in sucrose solutions of varying concentrations. Potato slices were placed in 0.0M, 0.1M, 0.2M, 0.3M, 0.4M, and 0.5M sucrose solutions for one hour. Their initial and final masses were measured and compared. In lower concentrations, the potato mass increased due to water entering the cells. In higher concentrations, the potato mass decreased as water left the cells. The results support the hypothesis that different sucrose concentrations impact potato cell mass through osmosis.
PPT - English Essay Writing Help Online PowerPoint Presentation, FreLisa Muthukumar
This document outlines a 5-step proposal for Sterling Marking Products to enter the UK market. It recommends establishing a wholly owned subsidiary to have full control over operations. Some key points:
1. Establish a wholly owned UK subsidiary to have full control over operations and avoid issues from current partnerships where control is shared.
2. Hire a general manager to oversee the subsidiary and hire local staff.
3. Use the subsidiary to target both large retailers and smaller shops to gain market share.
4. Consider Canada for future expansion but be cautious of strain on resources from expanding too quickly internationally.
5. Monitor subsidiary closely and reevaluate strategy after 3 years of operations.
Free Lined Writing Paper Printable - Printable TemplLisa Muthukumar
The document discusses the steps involved in requesting and receiving writing assistance from HelpWriting.net, including creating an account, submitting a request form with instructions and deadlines, reviewing bids from writers, authorizing payment upon approval of the completed paper, and having the option to request revisions. The process utilizes a bidding system where the requester can choose a writer based on qualifications and feedback to work on their assignment. HelpWriting.net promises original, high-quality content and refunds for plagiarized work.
Descriptive Essay College Writing Tutor. Online assignment writing service.Lisa Muthukumar
The document discusses the key steps involved in obtaining college writing assistance from HelpWriting.net:
1. Create an account with a password and email.
2. Complete a 10-minute order form providing instructions, sources, deadline and sample work.
3. Choose a writer based on their bid, qualifications, history and feedback to start the assignment.
4. Review the completed paper and authorize payment or request free revisions until satisfied.
9 Best Images Of Journal Writing Pap. Online assignment writing service.Lisa Muthukumar
The document provides instructions for creating an account and submitting assignment requests on the HelpWriting.net site. It explains the 5-step process: 1) Create an account with email and password. 2) Complete a form with assignment details. 3) Writers will bid on the request and the customer can choose a writer. 4) The customer receives the paper and can request revisions if needed. 5) HelpWriting guarantees original, high-quality work and refunds are offered for plagiarized content.
Divorce Agreement Template - Fill Out, Sign Online AndLisa Muthukumar
The document discusses the steps to request writing assistance from HelpWriting.net, including creating an account, completing an order form, and reviewing writer bids before selecting a writer and placing a deposit to start the assignment. The process also allows customers to request revisions and receives a refund if plagiarism is found. HelpWriting.net aims to fully meet customer needs for original, high-quality content.
Diversity On Campus Essay - Mfawriting515.Web.Fc2.ComLisa Muthukumar
This document provides instructions for creating an account on the website HelpWriting.net in order to request assistance with writing assignments. The process involves 5 steps: 1) Creating an account with a password and email, 2) Completing an order form with instructions and deadline, 3) Choosing a writer based on their bid, qualifications, and reviews, 4) Reviewing the completed paper and authorizing payment, 5) Requesting revisions until satisfied with the work. The website promises original, high-quality content and refunds for plagiarized work.
The document provides instructions for requesting an assignment writing service from HelpWriting.net, including creating an account, completing an order form with instructions and deadline, and reviewing writer bids before authorizing payment upon satisfactory completion of revisions. The process aims to ensure high-quality original content through a bidding system and free revisions until the customer is satisfied with the final work.
College Admission Essays That Worked - The OscillatiLisa Muthukumar
This document discusses the benefits of aerial photography for real estate properties. It states that an aerial view provides a unique perspective that gives buyers a better understanding of the land. This includes seeing the interior, exterior, and surrounding areas from various angles. Hiring an experienced professional for aerial photography can increase the property's resale value by effectively showcasing these features. An amateur photographer may degrade the value by failing to capture the right shots from above. Overall, aerial views are an important part of real estate photography and videography.
5 Steps To Write A Good Essay REssaysondemandLisa Muthukumar
Here is a 150-word introduction for the manuscript:
The tumor suppressor protein p53 plays a crucial role in regulating the cell cycle and preventing uncontrolled cell proliferation. In cells where p53 is absent or mutated, this loss of growth regulation allows tumors to form and progress. Traditionally, p53 was thought to suppress tumors through cell-autonomous mechanisms, inducing cell cycle arrest or apoptosis in cells experiencing DNA damage or other stresses. However, recent evidence suggests p53 can also exert non-cell autonomous tumor suppressive effects. This manuscript aims to review the emerging evidence that p53 induces cellular senescence in neighboring cells, which activates a senescence-associated secretory phenotype that influences the tumor microenvironment and limits tumor growth in
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
3. AirWave 8.2.10 | User Guide Contents | iii
Contents
Introduction 15
Aruba Mobility Controllers 15
Instant Access Points 15
ArubaOS-S Switches and ArubaOS-CX Switches 16
Configuring AirWave 17
Defining General AirWave Server Settings 17
Configuring the AirWave Server 17
General Settings 18
Automatic Authorization Settings 19
Aruba Instant Settings 20
Top Header Settings 21
Search Method 22
Home Overview Preferences 22
Display Settings 23
Device Configuration Settings 24
AMP Features 24
External Logging Settings 25
Historical Data Retention Settings 26
Firmware Upgrade/Reboot Options 28
Additional AMP Services 29
Performance Settings 32
Defining Network Settings 33
Primary Network Interface Settings 34
Secondary Network Interface Settings 35
Network Time Protocol (NTP) Settings 35
Static Routes 35
Creating AirWave Users 36
Configuring AirWave User Roles 38
User Roles and VisualRF 38
Creating AirWave User Roles 38
Configuring the User Login and Authentication 43
Configuring the User Login 44
Configuring Whitelists 44
Setting Up Single Sign-On 45
Specifying the Authentication Priority 45
Integrating a RADIUS Accounting Server 45
Configuring RADIUS Authentication and Authorization 46
Configuring TACACS+ Authentication 48
Configuring LDAP Authentication and Authorization 50
Enabling AirWave to Manage Your Devices 53
Configuring Communication Settings for Discovered Devices 53
Uploading Firmware and Files 55
Adding Certificates 60
Setting Up Device Types 61
Configuring Cisco WLSE and WLSE Rogue Scanning 61
4. iv | Contents AirWave 8.2.10 | User Guide
Introduction to Cisco WLSE 62
Initial WLSE Configuration 62
Adding an ACS Server for WLSE 62
Enabling Rogue Alerts for Cisco WLSE 62
Configuring WLSE to Communicate with APs 63
Discovering Devices 63
Managing Devices 63
Inventory Reporting 63
Defining Access 63
Grouping 64
Configuring IOS APs for WDS Participation 64
WDS Participation 64
Primary or Secondary WDS 64
Configuring ACS for WDS Authentication 64
Configuring Cisco WLSE Rogue Scanning 65
Configuring ACS Servers 66
Integrating NMS Servers 67
Add an NMS Server 67
Download the MIB Files 67
PCI Compliance Monitoring 67
Check Compliance 67
Enabling PCI Compliance Monitoring 68
Supported PCI Requirements 69
Deploying WMS Offload 70
WMS Offload Configuration 70
Integrating External Servers 71
Add a Juniper Network Director 71
Add a Brocade Network Advisor 71
Add an HPE Intelligent Management Center 71
Using Device Groups 73
Navigation Basics 73
Viewing Device Groups 74
Comparing Device Groups 76
Changing Group Configurations 77
Using Global Groups for Group Configuration 79
About Global Group Membership 79
Creating a Global Group 79
Subscribing other Groups to a Global Group 80
Deleting a Group 81
Monitoring Device Groups 81
Modifying Multiple Devices 82
Configuring Basic Settings for Device Groups 85
Basic Settings 86
Global Groups 86
SNMP Polling Periods 87
Routers and Switches 88
Notes 88
Group Display Options 89
Automatic Static IP Assignment 89
Spanning Tree Protocol 90
5. NTP 90
Aruba Switch Configuration 90
Aruba 91
Aruba Instant 91
Cisco IOS/Catalyst 93
Cisco WLC 93
Proxim/ Avaya 93
HP ProCurve 94
Symbol 94
Juniper/3Com/Enterasys/Nortel/Trapeze 95
Universal Devices, Routers and Switches 95
Automatic Authorization 95
Maintenance Windows 96
Configuring AAA Servers for Device Groups 96
Configuring Security for Device Groups 97
Configuring SSIDs and VLANs for Device Groups 102
Configuring Group Radio Settings 106
Configuring Cisco WLC Device Groups 110
Accessing Cisco WLC Configuration 110
Configuring WLANs for Cisco WLC Devices 110
Defining and Configuring LWAPP AP Groups for Cisco Devices 114
Viewing and Creating Cisco AP Groups 114
Configuring Cisco Controller Settings 114
Configuring Wireless Parameters for Cisco Controllers 115
Configuring Cisco WLC Security Parameters and Functions 115
Configuring Management Settings for Cisco WLC Controllers 116
Configuring PTMP Settings for Device Groups 116
Configuring Proxim Mesh Radio Settings 117
Configuring Group MAC ACLs for Device Groups 119
Specifying the Minimum Firmware Version for Device Groups 120
Discovering, Adding, and Auditing Devices 122
How to Set Up Device Discovery 122
Adding Networks for SNMP/HTTP Scanning 122
Adding Credentials for Scanning 123
Defining a Scan Set 124
Running a Scan Set 124
The Cisco Discovery Protocol (CDP) 126
Adding Devices into AirWave 126
Adding Devices Manually 126
Adding Devices from a CSV File 129
Setting the Management Mode 129
Verifying the Device Configuration 130
Ignoring Discovered Devices 131
Unignoring a Device 131
Troubleshooting a Newly Discovered Down Device 132
Using ZTP Orchestrator Beta 134
Before You Begin 134
Minimum Requirements 134
Network Setup 134
Step 1: Create Groups for ZTP 135
AirWave 8.2.10 | User Guide Contents | v
6. vi | Contents AirWave 8.2.10 | User Guide
Step 2: Add ClearPass Policy Manager 136
Step 3: Add Mobility Master 138
Step 4: Add the ArubaOS-CX Switch 139
Deployment 140
Step 1: Deploying Mobility Controllers 140
Step 2: Deploying ArubaOS-S Switches 140
Automated Workflow 141
Deployment Verification 142
Post Deployment 142
Monitoring the Network 143
Monitoring Basics 143
Customizing the Monitoring Page 144
First 25 Results 144
Creating Filtered Views 144
Editing Filtered Views 145
Showing Filters, Clearing Filters, Resetting Grouping 145
Using Device Folders 146
Adding Device Folders 146
Moving Folders 146
Expanding Folders 146
Changing Default Views 147
Monitoring Access Points, Mesh Devices, and Controllers 148
Device Information for Access Points, Mesh Devices, and Controllers 148
Radios 150
Wired Interfaces 151
Graphs for Access Points, Mesh Devices, and Controllers 152
Location 153
Clients 153
AirMesh Links 154
Neighbors 154
RF Neighbors 156
Alerts & Events 156
Advanced Monitoring 156
Viewing the Radio Statistics Page 156
Running Commands from the Radio Statistics Page 156
Issues Summary section 157
802.11 Radio Counters Summary 157
Radio Statistics Interactive Graphs 158
Recent ARM Events Log 159
Detected Interfering Devices Table 160
Active BSSIDs Table 161
AirMatch Statistics for Mobility Master 162
Monitoring Mesh Devices 162
Setting up Spectrum Analysis 163
Spectrum Configurations and Prerequisites 164
Setting up a Permanent Spectrum Aruba AP Group 164
Configuring an Individual AP to run in Spectrum Mode 165
Configuring a Controller to use the Spectrum Profile 166
Monitoring ArubaOS-CX and Mobility Access Switches 167
Device Information 167
7. Graphs 168
Detailed Summary Tables 168
Neighbors 168
Connected Devices 170
Interfaces 171
Monitoring ArubaOS Switches 173
Getting Started 173
Color-Coded Status 173
Navigate Using Quick Links 174
Get Details from Tooltips 175
Summary Tab 176
Ports Tab 176
See Port Counts 177
Open a Port Status Pop-Up 177
Edit a Physical Interface 178
Get Interface Details 179
PoE Tab 179
See PoE Statistics 180
Change the Faceplate Using Overlays 180
Get Port Details 181
View Power Consumption 181
VLANs Tab 181
Change the VLANs View in the Faceplate 182
Get Trunk Details 182
Get Virtual Interface Details 182
Edit a Virtual Interface 182
Connected Tab 183
See Connected Device and Neighbor Counts 183
Determine Which Device Is Connected to a Port 183
View Dynamic Segmentation Information 184
Get Connected Devices Details 184
Edit a Connected Device 185
Get Neighbor Details 186
Hardware Tab 187
Alerts & Events Tab 188
Acknowledge an Alert 189
Troubleshooting Tab 190
Run a Command 190
Test a Cable 191
Monitoring 7000 Controllers 191
Summary Tab 192
WAN Tab 193
See WAN Ports 193
Open the Port Details Pop-Up 193
WAN Interface Summary 194
Get WAN Interface Details 194
Tunnel Tab 195
See Tunnel Counts and Details 195
Tunnel Details 195
Monitoring Controller Clusters 196
AirWave 8.2.10 | User Guide Contents | vii
8. viii | Contents AirWave 8.2.10 | User Guide
Viewing Details about the Controller Cluster 197
Capacity Graphs 197
Controller Statistics 197
Monitoring Cluster Events 198
Where to Find Additional Cluster Information 198
Monitoring Clients 199
Monitoring Wired and Wireless Clients 200
Monitoring Rogue Clients 201
Supporting Wireless Guest Users 202
Supporting VPN Users 205
Monitoring RFID Tags 206
Managing Mobile Devices with SOTI MobiControl and AirWave 207
Overview of SOTI MobiControl 207
Prerequisites for Using MobiControl with AirWave 208
Adding a Mobile Device Management Server for MobiControl 208
Accessing MobiControl from the Clients > Client Detail Page 209
Troubleshooting Client Issues 209
Evaluating User Status 209
Enabling Mobile Device Access Control 210
Classifying Aruba Devices 211
Quick Links for Clients on Aruba Devices 211
Using the Deauthenticate Client Feature 212
Viewing the Client Association History 212
Viewing the Rogue Association History 212
Diagnosing Status and Connectivity 213
Configuring and Managing Devices 214
Moving a Device from Monitor Only to Manage Read/Write Mode 214
Configuring Device Settings 215
Adding a Maintenance Window for a Device 223
Creating Dynamic Variables 224
Configuring Device Interfaces for Switches 225
Individual Device Support and Firmware Upgrades 226
Using Configuration Templates 229
Group Templates 229
Supported Devices 229
Template Variables 229
Viewing, Adding and Editing Templates 231
Configuring General Template Files and Variables 234
Configuring General Templates 235
IOS Configuration File Template 236
Device Configuration File on Devices > Device Configuration Page 236
Template Syntax 236
Using AP-Specific Variables 236
Using Directives to Eliminate Reporting of Configuration Mismatches 237
Using Conditional Variables in Templates 237
Using Substitution Variables in Templates 238
Configuring Templates for Aruba Instant 240
Configuring Templates for AirMesh 241
Configuring Cisco IOS Templates 241
Applying Startup-config Files 241
9. WDS Settings in Templates 242
SCP Required Settings in Templates 242
Supporting Multiple Radio Types via a Single IOS Template 242
Configuring Single and Dual-Radio APs via a Single IOS Template 243
Configuring Cisco Catalyst Switch Templates 243
Configuring Symbol Controller / HPE WESM Templates 243
Configuring a Global Template 245
Using the Home Pages 248
Customizing the Dashboard 248
Available Widgets 248
Adding Widgets 252
Available Widgets 252
Defining Graph Display Preferences 256
Monitoring Your Network Health 257
Monitoring Application Traffic 260
Using the UCC Dashboard 261
Viewing Call Details 261
Viewing UCC Charts, Graphs, and Tables 262
Viewing End-to-End Call Details 263
Get Call Summary 263
Using the UCC Report 264
Viewing RF Performance 265
Viewing RF Capacity 266
Using the AirMatch Dashboard 267
Viewing Network Deviations 268
How Standard Deviation is Calculated 270
Using Clarity 270
View Clarity Charts 271
Failures Rates 271
Process Times 271
Clarity Thresholds 271
View User Details from the Summary Table 272
View Authentication Failure Data 273
View DHCP Failure Data 274
View DNS Failure Data 274
View Association Data 275
Working with Clarity Data 275
First 25 Results 275
Sorting and Filtering Clarity Data 275
Selecting a Folder from the Navigation Bar 275
Exporting Clarity Data 276
Changing the Time Range 276
Evaluate User Status 277
Using Topology 278
Getting Started 278
Navigate the Map 279
Respond to Alerts 279
Setting up Your Map 280
Locate Your Device 280
Select Your Layout 281
AirWave 8.2.10 | User Guide Contents | ix
10. x | Contents AirWave 8.2.10 | User Guide
Arrange Devices on the Map 281
Show Spanning Tree Members 282
Show VLANs 284
Apply Filters 285
Set the Root Node 286
Saving Your Preferences 287
Changing the Default Expansion 287
Checking the Status of Your Network 288
Device Status 288
Health Status 288
Link Status 288
Taking Action from Quick Links 288
View Tooltips 288
Viewing Device and Stack Membership Details 290
Running a Command 291
Accessing AirWave Documentation 292
Working with Licenses 292
Adding licenses 293
Viewing licenses 293
Configuring License Expiration Email Notifications 294
Configuring User Information and Customizing the WebUI 294
Configure Your User Information 294
Customizing the WebUI 294
Setting Severe Alert Warning Behavior 297
Using the System Pages 298
Checking the Status of AirWave Services 298
Important AirWave Logs 299
Downloading Log Files 299
Viewing Device Events 299
Using the Event Log 301
Viewing Triggers 301
Creating New Triggers 302
Types of Triggers 304
Device Triggers 304
Interfaces and Radios Triggers 307
About Alerts 312
Viewing System Alerts 313
Delivering Triggered Alerts 314
Responding to Alerts 315
Backing Up Your Data 315
Viewing and Downloading Backups 315
Using the System > Configuration Change Jobs Page 315
Using the System > Firmware Upgrade Jobs Page 316
Viewing DRT Upgrade Jobs 317
Using the System > Performance Page 317
Creating, Running, and Sending Reports 322
What You Can Do With Reports 322
Track licenses 322
Improve Network Efficiency and User Experience 322
Monitor Clients and Devices 323
11. Show Compliance 323
Troubleshoot Device and Network Issues 323
Sorting Reports 324
About the Default Reports 324
Using the License Report 324
Using the Capacity Planning Report 325
Example Custom Report 325
Using the Memory and CPU Utilization Report 327
Using the Network Usage Report 327
Using the Port Usage Report 329
Using the RF Health Report 331
Thresholds 331
Top Folders and Radio Statistics 332
Lists of Top Radio Issues 333
Using the Client Inventory Report 333
Example Custom Report 334
Using the Client Session Report 335
Using the Configuration Audit Report 337
Using the Device Summary Report 339
Using the Device Uptime Report 340
Using the Inventory Report 341
Example Custom Report 341
Using the Rogue Containment Audit Report 343
Using the PCI Compliance Report 344
Using the IDS Events Report 344
Using the Match Event Report 346
Using the New Clients Report 347
Using the New Rogue Devices Report 348
Using the RADIUS Reports 350
RADIUS Authentication Issues 351
RADIUS Accounting Issues 351
Using the Rogue Clients Report 352
Using the VPN Session Report 354
Creating Custom Reports 355
Tips for Restricting Time Ranges 355
Running Reports on Selected Devices 356
Cloning Reports 356
Selecting the Report Definition 356
Selecting the Devices and a Report Template 357
Selecting the Devices Without Using a Report Template 358
Viewing Generated Reports 358
Get an Updated Report 359
Sending Reports 360
Exporting Reports in CSV Format 360
Exporting a Report 360
Exporting Multiple Reports 361
Sending Reports to a Smart Host 362
Using VisualRF 363
Features 364
Useful Terms 364
AirWave 8.2.10 | User Guide Contents | xi
12. xii | Contents AirWave 8.2.10 | User Guide
Starting VisualRF 365
Basic VisualRF Navigation 365
Network View Navigation 365
Customize Your Floor Plan View 366
Devices 366
Client Overlays 367
AP Overlays 367
Relation Lines 367
Floor Plan Features 368
Mesh View Navigation 368
Advanced VisualRF Settings 370
Server Settings 370
Location Settings 371
Location Calculation Timer Settings 372
Disabling Client Calculation 375
Wall Attenuation Settings 376
Adding a Wall Attenuation 376
VisualRF Resource Utilization 377
Planning and Provisioning 377
Creating a New Campus 378
Creating a New Building 378
Adding a Floor Plan 379
Change Settings in VisualRF Floor Plans 380
Editing a Floor Plan Image 380
Replacing the Background 380
Cropping the Floor Plan Image 381
Copying a Floor Plan in the Same Building 382
Sizing a Non-CAD Floor Plan 382
Defining Floor Plan Boundaries 382
Defining Floor Plan Regions 383
Adding Region to a New Floor using the Floor Upload Wizard 383
Adding a Region to an Existing Floor Plan 383
Editing a Planning Region 384
Floor Plan Properties 384
Adding Deployed Access Points onto the Floor Plan 385
Adding Planned APs onto the Floor Plan 386
Auto-Matching Planned Devices 387
Printing a Bill of Materials Report 387
Increasing Location Accuracy 387
Adding Exterior Walls 388
Fine-Tuning Location Service in VisualRF > Setup 389
Decreasing Grid Size 389
Enabling Dynamic Attenuation 390
Configuring Infrastructure 390
Deploying APs for Client Location Accuracy 390
Using VisualRF to Assess RF Environments 391
Viewing a Wireless User’s RF Environment 391
Tracking Location History 392
Checking Signal Strength to Client Location 393
Viewing an AP’s Wireless RF Environment 393
13. Viewing a Floor Plan’s RF Environment 394
Viewing a Network, Campus, Building’s RF Environment 395
Viewing Campuses, Buildings, or Floors from a List View 395
Importing and Exporting in VisualRF 396
Importing from CAD 397
Batch Importing CAD Files 397
Requirements 397
Pre Processing Steps 397
Upload Processing Steps 398
Post Processing Steps 398
Sample Upload Instruction XML File 398
Common Importation Problems 399
Importing from an Aruba Controller 399
Pre-Conversion Checklist 399
Process on Controller 399
Process on AirWave 399
Importing from Ekahau Backups 399
Before you begin 399
Using the VisualRF Audit Log 400
VisualRF Location APIs 400
Sample Device Location Response 400
Sample Site Inventory Response 401
About VisualRF Plan 401
Overview 401
Minimum requirements 402
VisualRF Plan Installation 402
Differences between VisualRF and VisualRF Plan 402
Using RAPIDS 404
Introduction to RAPIDS 404
Viewing RAPIDS Summary 405
Setting Up RAPIDS 406
RAPIDS Setup 406
Basic Configuration 406
Classification Options 407
Containment Options 407
Filtering Options 408
Additional Settings 409
Defining RAPIDS Rules 409
Controller Classification with WMS Offload 409
Device OUI Score 410
Rogue Device Threat Level 410
Viewing and Configuring RAPIDS Rules 411
RAPIDS Classification Rule Properties 413
Deleting or Editing a Rule 414
Changing the Rule Priority 415
Recommended RAPIDS Rules 415
Using RAPIDS Rules with Additional AirWave Functions 415
Viewing Rogues 415
Predefined, Default Views for Rogue Devices 416
Filtered Views for Rogue Devices 417
AirWave 8.2.10 | User Guide Contents | xiii
14. xiv | Contents AirWave 8.2.10 | User Guide
Overview of the RAPIDS > Detail Page 419
Important Considerations 420
Filter the Device Data 420
Update Rogue Devices 420
Viewing Ignored Rogue Devices 421
Using RAPIDS Workflow to Process Rogue Devices 421
Score Override 421
Using the Audit Log 422
Additional Resources 423
Using the Master Console 424
Using the Public Portal on Master Console 424
Adding a Managed AMP with the Master Console 425
Using Global Groups with Master Console 426
Appendix A Using FIPS Encryption 427
Enabling FIPS 140-2 Approved Mode 427
Appendix B AMP Command Line Interface 428
About the Command Line Interface 428
CLI Access 428
How to Reset Your Password 428
CLI Options 429
Appendix C VisualRF and Performance 437
How Floor Components Impact Performance 437
Identifying Performance Problems 437
Resolving Performance Problems 437
Contacting Support 438
Index 439
15. AirWave 8.2.10 | User Guide Introduction | 15
Chapter 1
Introduction
AirWave is a network management platform that provides a single console where you can monitor, analyze, and
configure wired and wireless networks. Whether your network is simple or a large, complex, multi-vendor
installation, AirWave makes it easy to monitor your network with features like AppRF, Clarity, and VisualRF.
AirWave also provisions Aruba switches, provides CPU, memory and interface monitoring, configuration
management, and upgrades switch firmware. AirWave can be used to implement zero-touch provisioning for
Aruba Instant APs (IAP), Aruba switches and branch controllers.
With AirWave, you can configure:
l "Aruba Mobility Controllers" on page 15
l "Instant Access Points" on page 15
l "ArubaOS-S Switches and ArubaOS-CX Switches" on page 16
Aruba Mobility Controllers
AirWave supports global and group-level configuration of Aruba mobility controllers. Several controllers can
work together with APs to provide a hierarchical and redundant mobility controller system.
The mobility controller system provides:
l AP tunnel termination and translational bridging
l GRE tunnel between each AP and a mobility controller
l A virtual connection point to wireless clients
l Frame translation from 802.11 to 802.3 and 802.3 to 802.11, including encryption and decryption of
wireless traffic
l Quality of service (QoS) and traffic prioritization
Working alone or in conjunction with ClearPass, the mobility controller authenticates wireless clients and includes
a stateful firewall that can be configured to filter wireless traffic.
In this document, mobility controllers are also called access devices. For information about controller
configuration, refer to the AirWave 8.2.10 Controller Configuration Guide.
Instant Access Points
Aruba Instant (Instant) is a system of access points in a Layer 2 subnet. The Instant APs (IAPs) are controlled by a
single IAP that serves a dual role as both an IAP and primary Virtual Controller (VC), eliminating the need for
dedicated controller hardware. This system can be deployed through a simplified setup process appropriate for
smaller organizations, or for multiple geographically dispersed locations without an on-site administrator.
With AirWave, IT can centrally configure, monitor, and troubleshoot Aruba Instant WLANs, upload new software
images, track devices, generate reports, and perform other vital management tasks, all from a remote location.
A Virtual Controller or Instant AP can authenticate to the AirWave server using a pre-shared key, or using two-
way certificate-based authentication using an SSL certificate sent from AirWave to the Instant device. Virtual
Controllers push data to AirWave via HTTPS. If your enterprise has a security policy that restricts the use of port
443 for inbound communication, you can change the port AirWave uses to communicate with Instant devices.
For additional information about Instant AP configuration, refer to the Aruba Instant in AirWave 8.2.8.2
Deployment Guide.
16. 16 | Introduction AirWave 8.2.10 | User Guide
ArubaOS-S Switches and ArubaOS-CX Switches
AirWave supports group-level configuration of ArubaOS-S Switches andArubaOS-CX Switches. These switches
connect APs, wired clients and other endpoints to the network. Working alone or in conjunction with ClearPass,
the ArubaOS-S Switches provide authentication, authorization and accounting.
In this document, ArubaOS-S Switches are also called access switches, and ArubaOS-CX Switches are also called
core and aggregation switches. For informationabout switch configuration, refer to the AirWave 8.2 Switch
Configuration Guide.
17. AirWave 8.2.10 | User Guide Configuring AirWave | 17
Chapter 2
Configuring AirWave
This section contains procedures to deploy initial AirWave configuration. Additional configurations are available
after you complete the steps described in this section.
Defining General AirWave Server Settings
The initial configuration tasks to set up AirWave include:
l "Configuring the AirWave Server" on page 17
l "Defining Network Settings" on page 33
l "Configuring AirWave User Roles" on page 38
l "Creating AirWave Users" on page 36
l "Configuring the User Login and Authentication" on page 43
l "Enabling AirWave to Manage Your Devices" on page 53
l "Setting Up Device Types" on page 61
Configuring the AirWave Server
The following topics describe how to configure the general settings for the AirWave server. Figure 1 illustrates the
AMP Setup > General page.
18. 18 | Configuring AirWave AirWave 8.2.10 | User Guide
Figure 1: AMP Setup > General Settings
Whenever you save changes to these settings, AirWave applies them globally across the product for all users.
General Settings
Browse to the AMP Setup > General page, locate the General section, and enter the information described in
Table 1:
Setting Default Description
System Name Defines your name for your AirWave server using alphanumeric
characters.
Default Group Access
Points
Sets the device group that this AirWave server uses as the default for
device-level configuration. Select a device group from the drop-down
menu. A group must first be defined on the Groups > List page to
appear in this drop-down menu. For additional information, refer to
"Using Device Groups" on page 73.
Table 1: AMP Setup > General > General Section Fields and Default Values
19. Setting Default Description
Device
Configuration
Audit Interval
Daily This setting defines the interval of queries which compares actual
device settings to the Group configuration policies stored in the
AirWave database. If the settings do not match, the AP is flagged as
mismatched and AirWave sends an alert via email, log, or SNMP.
NOTE: Enabling this feature with a frequency of Daily or more
frequently is recommended to ensure that your AP configurations
comply with your established policies. Specifying Never is not
recommended.
Automatically
repair
misconfigured
devices
Disabled If enabled, this setting automatically reconfigures the settings on the
device when the device is in Manage mode and AirWave detects a
variance between actual device settings and the Group configuration
policy in the AirWave database.
Help improve
AirWave by
sending
anonymous usage
data
Disabled If enabled, AirWave will send anonymous data to Aruba, which may be
used to improve the AirWave software.
Nightly
Maintenance
Time (00:00 -
23:59)
04:15 Specifies the local time of day AirWave should perform daily
maintenance. During maintenance, AirWave cleans the database,
performs backups, and completes a few other housekeeping tasks.
Such processes should not be performed during peak hours of
demand.
License APs
Usage Threshold
90 Sets a threshold to display an alert on the controller monitor page
when the license usage has reached this number.
Check for
software updates
Yes Enables AirWave to check automatically for multiple update types.
Check daily for AirWave updates, to include enhancements, device
template files, important security updates, and other important news.
This setting requires a direct Internet connection via AirWave.
Table 1: AMP Setup > General > General Section Fields and Default Values (Continued)
Automatic Authorization Settings
On the AMP Setup > General page, locate the Automatic Authorization section. These settings allow you to
control the conditions by which devices are automatically authorized into AP groups and folders. AirWave
validates the Folder and Group to ensure that both settings have been set to valid drop down options. Table 2
describes the settings and default values in this section.
AirWave 8.2.10 | User Guide Configuring AirWave | 19
20. 20 | Configuring AirWave AirWave 8.2.10 | User Guide
Setting Default Description
Add New
Controllers and
Autonomous
Devices Location
New Device List Globally add new controllers and autonomous devices to:
l The New Device List (located in Devices > New).
l The same folder and group as the discovering device.
l The same group and folder of their closest IP neighbor on the
same subnet.
l Choose a group and folder. If you select this option, enter the
folder/group in the Auto Authorization Group and Auto
Authorization Folder fields that display.
NOTE: This setting can be overridden in Groups > Basic.
Add New Thin APs
Location
New Device List Globally add new thin APs to:
l The New Devices list.
l The same folder and group as the discovering device.
l The same group and folder of their closest IP neighbor on the
same subnet.
l Choose a group and folder. If you select this option, enter the
folder/group in the Auto Authorization Group and Auto
Authorization Folder fields that display.
NOTE: This setting can be overridden in Groups > Basic.
Automatically
Authorized Virtual
Controller Mode
Manage
Read/Write
Specify whether Virtual Controller mode for Instant APs will be in
Manage Read/Write mode or Monitor Only mode.
Table 2: AMP Setup > General > Automatic Authorization Fields and Default Values
Aruba Instant Settings
A Virtual Controller can communicate with the AirWave server over a configurable communication port, and
authenticate to the server using a pre-shared key, and/or two-way certificate-based authentication using an SSL
certificate sent from AirWave to the Instant device.
The AMP Setup > General > Aruba Instant Options page includes the following Configuration settings:
Setting Default Description
Communication
port
(443,1000-65534):
443 By default, an Instant Virtual Controller communicates with AirWave
over port 443. If your enterprise has a security policy that restricts the
use of port 443 for inbound communication, use this field to change the
port the Virtual Controller uses to communicate with AirWave.
Security method
for adding new
Virtual Controllers:
PSK Only AirWave can use the following security methods to authenticate a
Virtual Controller to the AirWave server:
l PSK Only
l PSK and Certificate
l Certificate Only
If you enable certificate-based authentication, you are directed to the
AMP Setup > General > Upload SSL Certificate page, where you are
prompted to upload an certificate file in PEM format that contains both a
private key and certificate.
Table 3: AMP Setup > General > Aruba Instant Options Fields and Default Values
21. Setting Default Description
Allow None-TPM
Devices
Yes If certificate-based authentication is enabled for the Virtual Controller,
AirWave allows low assurance, non-TPM device. This setting is
unavailable when PSK authentication is used.
Configuration Only No By default, AirWave will push Instant configuration settings as well as
AirWave settings such as RAPIDS settings and traps from an AirWave
group to a Virtual Controller assigned to that group. Select the Yes
option to push Instant configuration settings only.
Table 3: AMP Setup > General > Aruba Instant Options Fields and Default Values (Continued)
If you select a security method that includes Certificate-based authentication, you must upload the a certificate
from a supported certificate authority to the AirWave server, as the default AirWave certificate will not be
recognized by the Instant AP, and will cause the SSL handshake to fail. Certificate authentication also requires
that the AMP IP address information configured on the Instant AP is a domain name, and not an IP address.
AirWave supports the following trusted certificate authorities:
l Chain 1: Trusted Root CA: C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External
CA Root Intermediate CA: C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO
High-Assurance Secure Server CA
l Chain 2: Trusted Root CA: C=US, O=GeoTrust Inc., CN=GeoTrust Global CA Intermediate CA: Subject: C=US,
O=Google Inc, CN=Google Internet Authority G2
l Chain 3: Trusted Root CA: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 2006 VeriSign, Inc. -
For authorized use only, CN=VeriSign Class 3 Public Primary Certification Authority - G5 Intermediate CA:
C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=Terms of use at https://www.verisign.com/rpa (c)10,
CN=VeriSign Class 3 Secure Server CA - G3
l Root CA: Trusted Root CA: C=US, O=Equifax, OU=Equifax Secure Certificate Authority
If you enable certificate authentication, you are prompted to upload an SSL certificate. you can view the current
AirWave certificate using the View Certificate link on that page, or click Change to upload a new certificate file
to the AirWave server.
Top Header Settings
The top header of each AirWave WebUI page displays icons that provide counts on newly discovered devices,
device status, mismatches, rogues, clients, and both unacknowledged and severe alerts. These icons also provide
direct links for immediate access to key system components.
Figure 2: Header Statistics Icons
You can configure what is displayed in the top header for all pages, or for individual AirWave users.
To change the header statistic icons:
1. Navigate to AMP Setup > General, then scroll down to Top Header.
2. Choose the statistics.
3. Choose the devices.
4. Click Save.
A confirmation message does not appear when you make modifications to the top header statistic icons.
To change statistics that display for an AirWave user:
AirWave 8.2.10 | User Guide Configuring AirWave | 21
22. 22 | Configuring AirWave AirWave 8.2.10 | User Guide
1. Navigate to Home > User Info page, then scroll down to Top Header Stats.
2. Choose the statistics.
3. Choose the devices.
4. Click Save. These user settings will override the general settings on the AMP Setup page.
Search Method
On the AMP Setup > General page, locate the Search Method section. Select one of the following drop down
options as the system-wide default search method. This default search type will be used when a user types an
entry in the Search field and then clicks Enter without selecting a specific search type.
l Use System Defaults: The Search Method will be based on the system-wide configuration setting. This
method is configured on the AMP Setup > General page.
l Active clients + historical clients (exact match) + all devices: Commonly referred to as Quick Search, this looks
at all active and historical clients and all devices. This search is not case-sensitive. The results of this search
display in a pop up window rather than on the Home > Search page. This pop up window includes top-level
navigation that allows you to filter the results based on Clients, APs, Controllers, and Switches.
l Active clients + all categories: This looks at all active clients (not historical) and all categories. This search is not
case-sensitive.
l Active clients + all categories (exact match): This looks at all active clients (not historical) and all categories.
This search returns only matches that are exactly as typed (IP, user name, device name, etc). This search is
case-sensitive for all searched fields.
l Active + historical clients + all categories: This looks at all active and historical clients and all categories. This
search is not case-sensitive.
l Active + historical clients + all categories (exact match): This looks at all active and historical clients and all
categories. This search returns only matches that are exactly as typed (IP, user name, device name, etc). This
search is case-sensitive for all searched fields.
A confirmation message does not appear after you make modifications to Search Preferences.
Per-user search preferences can be set in the Home > User Info page.
Home Overview Preferences
On the AMP Setup > General page, locate the Home Overview Preferences section. Table 4 describes the
settings and default values in this section.
Setting Default Description
Configure Channel
Busy Threshold
Yes Whether you want to configure the threshold at which a channel is
considered to be busy at the Top Folders By Radio Channel Usage
Overview widget.
Channel Busy
Threshold (%)
n/a The threshold percent at which the radio channel is considered busier
than normal. This field is only available if the Configure Channel Busy
Threshold setting is Yes.
Table 4: AMP Setup > General > Home Overview Preferences Fields and Default Values
23. Display Settings
On the AMP Setup > General page, locate the Display section and select the options to appear by default in
new device groups.
Changes to this section apply across all of AirWave. These changes affect all users and all new device groups.
Table 5 describes the settings and default values in this section.
Setting Default Description
AP Fully Qualified
Domain Name
Options
No Sets AirWave to use fully qualified domain names for APs instead of the
AP name. For example, ‘testap.yourdomain.com; would be used instead
of ‘testap.’ Select one of the following options:
l Don’t use FQDN - This default value specifies that the fully qualified
domain name will not be used.
l Use AP Name with FQDN - The AP name will prepend the FQDN, for
example “somehostname (my.hostname.com).” Note that if the AP
name is not present, then the FQDN will still appear in parenthesis.
l Use only FQDN - Only the fully qualified domain name will be used.
NOTE: This option is supported only for Cisco IOS, Dell Networking W-
Series, Aruba Networks, and Alcatel-Lucent devices.
Show vendor-
specific device
settings for
All Devices Displays a drop-down menu that determines which Group tabs and
options are viewable by default in new groups, and selects the device
types that use fully qualified domain names. This field has three options,
as follows:
l All devices—When selected, AirWave displays all Group tabs and
setting options.
l Only devices on this AMP—When selected, AirWave hides all
options and tabs that do not apply to the APs and devices currently on
AirWave.
l Selected device type—When selected, a new field appears listing
many device types. This option allows you to specify the device types
for which AirWave displays group settings. You can override this
setting.
Look up device and
wireless user
hostnames
Yes Enables AirWave to look up the DNS for new user hostnames. This setting
can be turned off to troubleshoot performance issues.
DNS Hostname
Lifetime
24 hours Defines the length of time, in hours, for which a DNS server hostname
remains valid on AirWave, after which AirWave refreshes DNS lookup:
l 1 hour
l 2 hours
l 4 hours
l 12 hours
l 24 hours
Device
Troubleshooting
Hint
N/A The message included in this field is displayed along with the Down if a
device’s upstream device is up. This applies to all APs and controllers but
not to routers and switches.
Table 5: AMP Setup > General > Display Fields and Default Values
AirWave 8.2.10 | User Guide Configuring AirWave | 23
24. 24 | Configuring AirWave AirWave 8.2.10 | User Guide
Device Configuration Settings
Locate the Device Configuration section and adjust the settings. Table 6 describes the settings and default
values of this section.
Setting Default Description
Guest User
Configuration
Disabled Enables or prevents guest users to/from pushing configurations to
devices. Options are Disabled (default), Enabled for Devices in
Manage(Read/Write), Enabled for all Devices.
Allow WMS Offload
configuration in
monitor-only mode
No When Yes is selected, you can enable the ArubaOS WMS offload
feature on the Groups > Basic page for WLAN switches in Monitor
Only mode. Enabling WMS offload does not cause a controller to
reboot. This option is supported only for Aruba and Dell Networking
W-Series devices.
Allow disconnecting
users while in
monitor-only mode
No Sets whether you can deauthenticate a user for a device in monitor-
only mode. If set to No, the Deauthenticate Client button for in a
Clients > Client Detail page is enabled only for Managed devices.
Use Global Aruba
Configuration
No Enables Aruba configuration profile settings to be globally configured
and then assigned to device groups. If disabled, settings can be
defined entirely within Groups > Controller Configand Groups
> Switch Config instead of globally.
NOTE: Changing this setting may require importing configuration on
your devices. When an existing Aruba configuration setup is to be
converted from global to group, follow these steps:
1. Set all the devices to Monitor Only mode before setting the flag.
2. Each device Group will need to have an import performed from
the Device Configuration page of a controller in the AMP group.
3. All of the thin APs need to have their settings imported after the
device group settings have finished importing.
4. If the devices were set to Monitor Only mode, set them back to
Managed mode.
Table 6: AMP Setup > General > Device Configuration Section Fields and Default Values
AMP Features
Locate the AMP Features section and adjust settings for VisualRF, RAPIDS, and AirWave Glass. Table 7 describes
these settings and default values.
Setting Default Description
Display VisualRF No Enable or disable the VisualRF navigation tab.
Display RAPIDS No Enable or disable the RAPIDS navigation tab.
Table 7: AMP Setup Setup > General > AMP Features Fields and Default Values
25. Setting Default Description
Hide setup pages
from non-admin
users
Yes Restrict access to following pages to users with the AMP Administration
role only:
l VisualRF > Setup
l AMP Setup > NMS
l RAPIDS > Score Override
l RAPIDS > Rules
l RAPIDS > Setup
l System > Triggers
Allow role based
report visibility
Yes Enable or disable role-based reporting in AMP. When disabled, reports
can only be generated with by-subject visibility.
Enable Central
Authentication
Service
Yes Toggles on or off single-sign on (SSO) authentication between AirWave
and AirWave Glass.
Central
Authentication
Hostname
If the Central Authentication Service is enabled and the managed AMP is
attached to AirWave Glass, this field is automatically populated, and you
don't need to configure the hostname.
Table 7: AMP Setup Setup > General > AMP Features Fields and Default Values (Continued)
External Logging Settings
Locate the External Logging section and adjust settings to send audit and system events to an external syslog
server. Table 8 describes these settings and default values. You can also send a test message using the Send
Test Message button after enabling any of the logging options.
For information about creating triggers in order to receive event notifications, see "Creating New Triggers" on
page 302.
Setting Default Description
Include event log
messages
No Select Yes to send event log messages to an external Syslog server.
NOTE: If you enable event logging, other options to configure the Syslog
server and enable logging using Common Event Format (CEF) become
available.
Syslog Server N/A Enter the IP address of the syslog server. Note that this field is hidden if
both "Include event log messages" and "Include audit log messages" are
set to No.
Syslog Port 514 Enter the port of the syslog server. Note that this field is hidden if both
"Include event log messages" and "Include audit log messages" are set to
No.
Event log facility local1 Select the facility for the event log from the drop-down menu. This field is
only available if the "Include event log messages" setting is Yes.
Include audit log
messages
No Select Yes to send audit log messages to an external syslog server.
Table 8: AMP Setup > General > External Logging Section Fields and Default Values
AirWave 8.2.10 | User Guide Configuring AirWave | 25
26. 26 | Configuring AirWave AirWave 8.2.10 | User Guide
Setting Default Description
Audit log facility local1 Select the facility for the audit log from the drop-down menu. This field is
only available if the "Include audit log messages" setting is Yes
Send Test Message N/A If messaging is enabled and a server and port are configured, click this
button to send a test message. Upon completion, a message will appear
at the top of this page indicating that the message was sent successfully.
Table 8: AMP Setup > General > External Logging Section Fields and Default Values (Continued)
Historical Data Retention Settings
Locate the Historical Data Retention section and specify the number of days you want to keep client session
records and rogue discovery events. Table 9 describes the settings and default values of this section. Many
settings can be set to have no expiration date.
Setting Default Description
Inactive Client and
VPN User Data (0-
1500 days, zero
disables)
60 Defines the number of days AirWave stores basic information about
inactive clients and VPN users. A shorter setting of 60 days is
recommended for customers with high user turnover such as hotels. The
longer you store inactive user data, the more hard disk space you require.
Client Association
and VPN Session
History (0-550
days, zero
disables)
14 Defines the number of days AirWave stores client and VPN session
records. The longer you store client session records, the more hard disk
space you require.
Tag History (0-550
days, zero
disables)
14 Sets the number of days AirWave retains location history for Wi-Fi tags.
Rogue AP
Discovery Events
(14-550 days, zero
disables)
14 Defines the number of days AirWave stores Rogue Discovery Events. The
longer you store discovery event records, the more hard disk space you
require.
Reports (0-550
days, zero
disables)
60 Defines the number of days AirWave stores Reports. Large numbers of
reports, over 1000, can cause the Reports > Generated page to be slow to
respond.
Automatically
Acknowledge
Alerts(0-550 days,
zero disables)
14 Defines automatically acknowledged alerts as the number of days AirWave
retains alerts that have been automatically acknowledged. Setting this
value to 0 disables this function, and alerts will never expire or be deleted
from the database.
Acknowledged
Alerts(0-550 days,
zero disables)
60 Defines the number of days AirWave retains information about
acknowledged alerts. Large numbers of Alerts, over 2000, can cause the
System > Alerts page to be slow to respond.
Table 9: AMP Setup > General > Historical Data Retention Fields and Default Values
27. Setting Default Description
Radius/ARM/IDS
Events(0-550 days,
zero disables)
14 Defines the number of days AirWave retains information about RADIUS,
ARM, and IDS events. Setting this value to 0 disables this function, and the
information will never expire or be deleted from the database.
Archived Device
Configurations (0-
100, zero disables)
10 Defines the number of configurations that will be retained for archived
devices. Whether rogue information is included depends on the setting of
the Archive device configs even if they only have rogue
classifications setting.
Archive device
configs even if they
only have rogue
classifications
No Sets whether to archive device configurations even if the device only has
rogue classifications.
Guest Users (0-550
days, zero
disables)
30 Sets the number of days that AirWave is to support any guest user. A value
of 0 disables this function, and guest users will never expire or be deleted
from the AirWave database.
Inactive SSIDs (0-
550 days, zero
disables)
425 Sets the number of days AirWave retains historical information after
AirWave last saw a client on a specific SSID. Setting this value to 0 disables
this function, and inactive SSIDs will never expire or be deleted from the
database.
Inactive Interfaces
(0-550 days, zero
disables)
425 Sets the number of days AirWave retains inactive interface information
after the interface has been removed or deleted from the device. Setting
this value to 0 disables this function, and inactive interface information will
never expire or be deleted from the database.
Interface Status
History (0-550
days, zero
disables)
425 Sets the number of days AirWave retains historical information on
interface status. Setting this value to 0 disables this function.
Interfering Devices
(0-550 days, zero
disables)
14 Sets the number of days AirWave retains historical information on
interfering devices. Setting this value to 0 disables this function.
Device Events
(Syslog, Traps)(1-
31 days)
2 Sets the number of days AirWave retains historical information on device
events such as syslog entries and SNMP traps. Setting this value to 0
disables this function. Refer to "Viewing Device Events" on page 299.
NOTE: If your data table has more than 5 million rows, AirWave will
truncate the device event retention data. In this case, the "number of days"
setting becomes "number of hours."
Mesh Link History
(0-550 days)
30 Sets the number of days AirWave retains historical information for mesh
links.
Device Uptime (0-
120 months, zero
disables)
60 Sets the number of months AirWave retains historical information on
device uptime. Setting this value to 0 disables this function.
Table 9: AMP Setup > General > Historical Data Retention Fields and Default Values (Continued)
AirWave 8.2.10 | User Guide Configuring AirWave | 27
28. 28 | Configuring AirWave AirWave 8.2.10 | User Guide
Setting Default Description
Client Data
Retention Interval
(1-425 days)
425 Sets the number of days AirWave retains historical information for clients.
UCC Call History
(1-30 days)
30 Sets the number of days that calls remain in AirWave's call history.
UCC Call Details
(1-7 days)
2 Sets the number if days that the AirWave retains details for individual calls.
Config Job
Retention Interval
(1-31 days)
31 Sets the number of days AirWave retains information about configuration
jobs.
Table 9: AMP Setup > General > Historical Data Retention Fields and Default Values (Continued)
Firmware Upgrade/Reboot Options
Locate the Firmware Upgrade/Reboot Options section and adjust settings as required. This section allows
you to configure the default firmware upgrade behavior for AirWaveTable 10
Table 10 describes the firmware upgrade and reboot options.
Setting Default Description
Allow firmware
upgrades in
monitor-only mode
No If Yes is selected, AirWave upgrades the firmware for APs in Monitor
Only mode. When AirWave upgrades the firmware in this mode, the
desired configuration are not be pushed to AirWave. Only the firmware is
applied. The firmware upgrade may result in configuration changes
AirWave does not correct those changes when the AP is in Monitor Only
mode.
Allow Rebooting
Monitor Only
Devices
No If Yes is selected, AirWave can reboot devices in Monitor Only mode.
Enable firmware
distribution via http
No By default, we use HTTPS and require user log in for firmware updates.
NOTE: For IAPs running versions earlier than Instant 3.4.0.0, set this
option to "Yes" in order to get firmware updates using HTTP.
Fast Download No When fast download is enabled, standalone IAPs in the same RF zone are
grouped so that they can download the image from each other. This
assumes that the APs are behind the same firewall so that they can reach
each other, thereby making the firmware download faster.
Sequential Reboot No When sequential reboot is enabled, the APs in the same RF zone will
reboot sequentially. At any given time, only one AP is being rebooted. As a
result, users can use another AP that is visible in RF and have
uninterrupted service.
Table 10: AMP Setup > General > Firmware Upgrade Defaults Fields and Default Values
29. Setting Default Description
Maximum
Interleaved Jobs (1-
20)
20 Defines the number of jobs AirWave runs at the same time. A job can
include multiple APs. When jobs are started by multiple users, AirWave will
interleave upgrades so that one user's job does not completely block
another’s.
Maximum
Interleaved Devices
Per Job (1-1000)
20 Defines the number of devices that can be in the process of upgrading at
the same time. Within a single job, AirWave may start the upgrade
process for up to this number of devices at the same time. However, only
one device will be actively downloading a firmware file at any given time.
Failures before
stopping (0-20, zero
disables)
1 Sets the default number of upgrade failures before AirWave pauses the
upgrade process. User intervention is required to resume the upgrade
process. Setting this value to 0 disables this function.
Failure timeout (5-
60 mins)
60 Sets the timeout for an upgrade attempt.
DRT upgrade failure
timeout (2-30 mins)
6 Sets the timeout for a Downloadable Regulatory Table (DRT) upgrade
attempt.
Number of tries in
failure (1-4)
1 Sets the number of retry attempts.
Periodic run failed
upgrade interval
Disabled Set the length of time AirWave retries running a failed upgrade.
Table 10: AMP Setup > General > Firmware Upgrade Defaults Fields and Default Values (Continued)
Additional AMP Services
Locate the Additional AMP Services section, and adjust settings as required. Table 11 describes the settings
and default values of this section.
Setting Default Description
Enable FTP Server No Enables or disables the FTP server on AirWave. The FTP server is only
used to manage Aruba AirMesh and Cisco Aironet 4800 APs. Best
practice is to disable the FTP server if you do not have any supported
devices in the network.
Table 11: AMP Setup > General > Additional AMP Services Fields and Default Values
AirWave 8.2.10 | User Guide Configuring AirWave | 29
30. 30 | Configuring AirWave AirWave 8.2.10 | User Guide
Setting Default Description
Enable RTLS
Collector
No Enables or disables the RTLS Collector, which is used to allow
ArubaOS controllers to send signed and encrypted RTLS (real time
locating system) packets to VisualRF; in other words, AirWave becomes
the acting RTLS server. The RTLS server IP address must be configured on
each controller. This function is used for VisualRF to improve location
accuracy and to locate chirping asset tags. This function is supported only
for Dell Networking W-Series, Alcatel-Lucent, and Aruba Networks
devices.
If Yes is specified, the following additional fields appear. These
configuration settings should match the settings configured on the
controller:
l RTLS Port—Specify the port for the AirWave RTLS server.
l RTLS Username—Enter the user name used by the controller to
decode RTLS messages.
l RTLS Password—Enter the RTLS server password that matches the
controller’s value.
l Confirm RTLS Password—Re-enter the RTLS server password.
Use Embedded
Mail Server
Yes Enables or disables the embedded mail server that is included with
AirWave.
Mail Relay Server Optional If you enable the "Use embedded mail server" option, enter information
for an optional mail relay server. This field supports a Send Test Email
button for testing server functionality. Click this button to enter valid email
addresses.
Process user
roaming traps from
Cisco WLC
Yes Whether AirWave should parse client association and authentication traps
from Cisco WLC controllers to give real time information on users
connected to the wireless network.
Enable AMON data
collection
Yes Allows AirWave to collect enhanced data from Aruba devices on certain
firmware versions. See the Best Practices Guide on the Home >
Documentation page for more details
NOTE:
l When enabling AMON, auditing should be set to daily and have been
successful at least once to allow AirWave to calculate the proper
BSSIDs per radio. If these BSSIDs do not exist, clients are dropped
because they do not have any corresponding BSSIDs in the AirWave
database. Auditing should be set to daily because the BSSIDs are kept
in cache memory and cleared every 24 hours.
l To view usage data on a standalone controller or managed device, set
the Enable AMON Data Collection option to No to allow usage data
to be aggregated from the AP level.
Enable Clarity Data
Collection
Yes Allows AirWave to collect enhanced Clarity Monitoring data from Aruba
devices running ArubaOS 6.4.3 and later versions
Enable Traffic
Analysis Data
Collection
Yes If AMON is enabled for a controller, you can enable AirWave to collect
Traffic Analysis data from the controller by setting this to Yes. When
enabled, the Home > Traffic Anaylsis dashboard is available in the
WebUI.
Table 11: AMP Setup > General > Additional AMP Services Fields and Default Values (Continued)
31. Setting Default Description
Traffic Analysis
Storage Allocated
(GiB)
50 If Traffic Analysis Data Collection is enabled, you can specify the amount
of storage to allocate.
Enable UCC Data
Collection
Yes Enables controllers to send UCC data to AirWave. For this feature to work,
AirWave must be a management server on the controller, the AMON port
is set up for UDP port 8211, and the controller profile has UCC monitoring
enabled.
Enable UCC Calls
Stitching
(Heuristics)
Yes Enables caller-to-callee call stitching for non-SDN deployments. You
should turn off this option for NAT and BOC deployments.
Prefer AMON vs
SNMP Polling
Yes Prefer AMON is a configuration setting which causes AirWave to use an
AMON feed to obtain client monitoring information from a controller
rather than polling it via SNMP. When you enable this setting, values such
as AP lists and rogue AP lists are still polled via SNMP, but the bulk of
client monitoring information is delivered via AMON.
NOTE:
l Auditing needs to have been successful at least once to allow AirWave
to calculate the proper BSSIDs per radio.
l When Prefer AMON is enabled, the controller must be configured to
send AMON to AirWave by issuing the controller-amon bssid-
tunnel-stats command from the command-line interface of the
standalone controller or managed device (not mobility master).
l To view bandwidth usage data on a standalone controller or managed
device, you must set Prefer AMON vs SNMP Polling to No and also
set the Enable AMON Collection setting to No. For more information,
see "Enable AMON data collection" on page 30.
l The network path from the controller to the AirWave server must allow
traffic on UDP port 8211.
l The controller routinely sends AMON in large UDP packets, (up to 30K
bytes). Before enabling this setting, ensure the network path from the
controller to AirWave can pass such large packets intact.
l This setting should only be used in a network environment with low
levels of UDP packet loss, as the loss of a single Ethernet frame will
potentially result in the loss of up to 30K bytes worth of data.
l
Enable Syslog and
SNMP Trap
Collection
Yes This option specifies whether traps used to detect roaming events, auth
failures, AP up/down status, and IDS events will still be collected if they
are sent by managed devices.
Require SSH host
key verification
No This setting reserved for future use.
Validate PAPI key No Security improvements in AirWave 8.2.1 and later releases allow you to
specify a custom PAPI key and require PAPI key validation. If you select the
Yes option, you are prompted to enter a custom PAPI key
Disable TLS 1.0 and
1.1
Yes This option is set to Yes by default. In order for Aruba switches to
automatically check-in to AirWave by ZTP, you must change this option to
No. If you select No, you must restart AMP.
Table 11: AMP Setup > General > Additional AMP Services Fields and Default Values (Continued)
AirWave 8.2.10 | User Guide Configuring AirWave | 31
32. 32 | Configuring AirWave AirWave 8.2.10 | User Guide
Performance Settings
Locate the Performance section. Performance tuning is unlikely to be necessary for many AirWave
deployments, and likely provides the most improvements for customers with extremely large Pro or Enterprise
installations. Please contact Aruba support if you think you might need to change any of these settings. Table 12
describes the settings and default values of this section.
Setting Default Description
Monitoring
Processes
Based on
the number
of cores for
your server
Optional setting configures the throughput of monitoring data.
Increasing this setting allows AirWave to process more data per
second, but it can take resources away from other AirWave
processes. Contact Aruba support if you think you might need to
increase this setting for your network. Also note that the value
range varies based on the number of available process cores.
Maximum number
of configuration
processes
5 Increases the number of processes that are pushing configurations
to your devices, as an option. The optimal setting for your network
depends on the resources available, especially RAM. Contact Aruba
support if you think you might need to increase this setting for your
network.
Maximum number
of audit processes
3 Increases the number of processes that audit configurations for
your devices, as an option. The optimal setting for your network
depends on the resources available, especially RAM. Contact Aruba
support if you are considering increasing this setting for your
network.
SNMP Fetcher
Count (2-6)
2 Specify the number of SNMPv2 fetchers.
Verbose Logging
of SNMP
Configuration
No Enables or disables logging detailed records of SNMP configuration
information.
SNMP Rate
Limiting for
Monitored
Devices
No When enabled, AirWave fetches SNMP data more slowly, potentially
reducing device CPU load.
We recommend enabling this global setting if your network contains
a majority of legacy controllers (800, 2400, 5000, or controllers that
use Supervisor Module II). If your network mainly uses newer
(30000 Series, 600 Series, or the M3 module in the 6000 series), we
strongly recommend disabling this setting.
Client Association
Relevance Factor
0 days
(disabled)
Use this setting to hide old client information from clients lists and
client search results. For example, a setting of 3 limits the historical
client data displayed in client lists and search results to client
sessions that have been disconnected within the last three days.
When this value is set to 1, client lists and search results display
only the client history for the previous day.
This time range can be set from 0-550 days, where a value of zero
disables this feature and makes available all historical client data. A
shorter time period improves search performance and allows client
lists to display more rapidly, though it will also display fewer results.
Table 12: AMP Setup> General > Performance Fields and Default Values
33. Setting Default Description
RAPIDS
Processing
Priority
Low Defines the processing and system resource priority for RAPIDS in
relation to AirWave as a whole.
When AirWave is processing data at or near its maximum capacity,
reducing the priority of RAPIDS can ensure that processing of other
data (such as client connections and bandwidth usage) is not
adversely impacted.
The default priority is Low. You can also tune your system
performance by changing group poll periods.
If you select Custom for the priority, then also specify the RAPIDS
custom process limit.
RAPIDS custom
process limit (1-
16)
1 when
Custom is
specified for
the RAPIDS
Processing
Priority.
Sets the maximum number of monitoring process assigned to
RAPIDS work. Note that this option is only available if Custom is
specified for the RAPIDS Processing Priority.
Table 12: AMP Setup> General > Performance Fields and Default Values (Continued)
Defining Network Settings
The next steps in setting up AirWave are to configure the network interface, DNS settings, NTP servers, and static
routes.
Figure 3 illustrates the contents of the AMP Setup > Network page when setting up an IPv4 interface.
Optionally, you can configure an IPv6 interface. For information, see "Primary Network Interface Settings" on
page 34.
AirWave 8.2.10 | User Guide Configuring AirWave | 33
34. 34 | Configuring AirWave AirWave 8.2.10 | User Guide
Figure 3: Network Page
Specify the network configuration options described in the sections that follow to define the AirWave network
settings. Select Save when you have completed all changes on the AMP Setup > Network page, or select
Revert to return to the last settings. Save restarts any affected services and may temporarily disrupt your
network connection.
Primary Network Interface Settings
Locate the Primary Network Interface section. The information in this sections should match what you
defined during initial network configuration and should not require changes. Table 13 describes the settings and
default values.
Setting Default Description
IPv4 Address None Sets the IPv4 address of the AirWave network interface.
NOTE: This address must be a static IP address.
Hostname None Sets the DNS name assigned to the AirWave server.
Subnet Mask None Sets the subnet mask for the primary network interface.
IPv4 Gateway None Sets the default gateway for the network interface.
IPv6 Enabled No By selecting Yes, you can enter an optional IPv6 address and gateway
address.
IPv6 Address None Sets the IPv6 address of the AirWave network interface.
Table 13: Primary Network Interface Fields and Default Values
35. Setting Default Description
IPv6 Gateway None Sets the default gateway for the network interface.
Primary DNS IP None Sets the primary DNS IP address for the network interface.
Secondary DNS IP None Sets the secondary DNS IP address for the network interface.
Table 13: Primary Network Interface Fields and Default Values (Continued)
Secondary Network Interface Settings
Locate the Secondary Network Interface section. The information in this section should match what you
defined during initial network configuration and should not require changes. Table 14 describes the settings and
default values.
Setting Default Description
Enabled No Select Yes to enable a secondary network interface. You will be
prompted to define the IP address and subnet mask.
IP Address None Specify the IP address of the AirWave secondary network.
NOTE: This address must be a static IP address. AirWave supports
IPv4 and IPv6 addresses.
Subnet Mask None Specify the subnet mask for the secondary network interface.
Table 14: Secondary Network Interface Fields and Default Values
Network Time Protocol (NTP) Settings
On the AMP Setup > Network page, locate the Network Time Protocol (NTP) section. The Network Time
Protocol is used to synchronize the time between AirWave and your network’s NTP server. NTP servers
synchronize with external reference time sources, such as satellites, radios, or modems.
Specifying NTP servers is optional. NTP servers synchronize the time on the AirWave server, not on individual
access points.
To disable NTP services, clear both the Primary and Secondary NTP server fields. Any problem related to
communication between AirWave and the NTP servers creates an entry in the event log. Table 15 describes the
settings and default values in more detail. For more information on ensuring that AirWave servers have the
correct time, please see http://support.ntp.org/bin/view/Servers/NTPPoolServers.
Setting Default Description
Primary ntp1.yourdomain.com Sets the IP address or DNS name for the primary NTP server.
Secondary ntp2.yourdomain.com Sets the IP address or DNS name for the secondary NTP server.
Table 15: AMP Setup > Network > Secondary Network Fields and Default Values
Static Routes
On the AMP Setup > Network page, locate the Static Routes area. This section displays network, subnet
mask, and gateway settings that you have defined elsewhere from a command-line interface.
AirWave 8.2.10 | User Guide Configuring AirWave | 35
36. 36 | Configuring AirWave AirWave 8.2.10 | User Guide
This section does not enable you to configure new routes or remove existing routes.
What Next?
l Go to additional tabs in the AMP Setup section to continue additional setup configurations. The next section
describes AirWave roles.
l Complete the required configurations in this chapter before proceeding. Aruba support remains available to
you for any phase of AirWave configuration.
Creating AirWave Users
AirWave installs with only one user—the admin, who is authorized to perform the following functions:
l Define additional users with varying levels of privilege, be it manage read/write or monitoring.
l Limit the viewable devices as well as the level of access a user has to the devices.
Each general user that you add must have a user name, a password, and a role. Use unique and meaningful user
names as they are recorded in the log files when you or other users make changes in AirWave.
User name and password are not required if you configure AirWave to use RADIUS, TACACS, or LDAP
authentication. You do not need to add individual users to the AirWave server if you use RADIUS, TACACS, or
LDAP authentication.
The user role defines the user type, access level, and the top folder for that user. User roles are defined on the
AMP Setup > Roles page. Refer to the previous procedure in this chapter for additional information, "Creating
AirWave User Roles" on page 38.
The admin user can provide optional additional information about the user, including the user's real name, email
address, phone number, and so forth.
Perform the following steps to display, add, edit, or delete AirWave users of any privilege level. You must be an
admin user to complete these steps.
1. Go to the AMP Setup > Users page. This page displays all users currently configured in AirWave, as shown in
Figure 4.
Figure 4: AMP Setup > Users Page
2. Select Add to create a new user, select the pencil icon to edit an existing user, or select a user and select
Delete to remove that user from AirWave. When you select Add or the edit icon, the Add User page appears,
illustrated in Figure 5.
Current users cannot change their own role. The Role drop-down field is disabled to prevent this.
37. Figure 5: AMP Setup > Users > Add/Edit User Page
3. Enter or edit the settings on this page. Table 16 describes these settings.
Setting Default Description
Username None Sets the user name for the user who logs in to AirWave. This user name is
displayed in AirWave log files.
Role None Specifies the user’s Role, which defines the Top viewable folder as well as the
type and access level of the user specified in the previous field.
The admin user defines user roles on the AMP Setup > Roles page, and each
user in the system is assigned to a role.
Password None Sets the password for the user being created or edited. Enter an alphanumeric
string without spaces, and enter the password again in the Confirm Password
field. AirWave strengthens user passwords with SHA512 encryption.
NOTE: Because the default user's password is identical to the Name, you should
change this password. You will be logged out and asked to enter your new
password.
Name None Allows you to define an optional and alphanumeric text field that takes note of the
user's actual name.
Email
Address
None Allows you to specify a specific email address that will propagate throughout
many additional pages in AirWave for that user, including reports, triggers, and
alerts.
Phone None Allows you to enter an optional phone number for the user.
Notes None Enables you to cite any additional notes about the user, including the reason they
were granted access, the user's department, or job title.
Table 16: AMP Setup > Users > Add/Edit User Fields and Default Values
AirWave 8.2.10 | User Guide Configuring AirWave | 37
38. 38 | Configuring AirWave AirWave 8.2.10 | User Guide
4. Select Add to create the new user, Save to retain changes to an existing user, or Cancel to cancel out of this
screen. The user information you have configured appears on the AMP Setup > Users page, and the user
propagates to all other AirWave pages and relevant functions.
AirWave enables user roles to be created with access to folders within multiple branches of the overall
hierarchy. This feature assists non-administrator users who support a subset of accounts or sites within a single
AirWave deployment, such as help desk or IT staff.
Configuring AirWave User Roles
The AMP Setup > Roles page defines the viewable devices, the operations that can be performed on devices,
and general AirWave access. User roles can be created that provide users with access to folders within multiple
branches of the overall hierarchy. This feature assists non-administrative users, such as help desk or IT staff, who
support a subset of accounts or sites within a single AirWave deployment. You can restrict user roles to multiple
folders within the overall hierarchy even if they do not share the same top-level folder. Non-admin users are only
able to see data and users for devices within their assigned subset of folders.
User Roles and VisualRF
VisualRF uses the same user roles as defined for AirWave. Users can see floor plans that contain an AP to which
they have access in AirWave, although only visible APs appear on the floor plan. VisualRF users can also see any
building that contains a visible floor plan and any campus that contains a visible building.
In VisualRF > Setup > Server Settings, the Restrict visibility of empty floor plans to the user that
created them configuration option allows you to restrict the visibility of empty floor plans to the role of the
user who created them. By default, this setting is set to No.
When a new role is added to AirWave, VisualRF must be restarted for the new user to be enabled.
Creating AirWave User Roles
Roles define the capabilities a user has access to and the privileges and views available for device groups and
devices in AirWave. The available configuration options differ for each role type.
Most users will see two sections on this page: Role and Guest User Preferences. The Guest User
Preferences section appears only if Guest User Configuration is enabled in AMP Setup > General.
If you want to create a user role, log in to AirWave as admin and follow these steps:
1. Go to the AMP Setup > Roles and click Add.
2. Enter a name for the user role, select options, and click Add. Figure 6 shows a role named Traffic Analysis
being created.
39. Figure 6: Adding a Non-Admin Role Named Traffic Analysis
3. Enter additional settings on this page.
Figure 7 shows the newly created Traffic Analysis Admin role in the Role page.
Figure 7: Newly Created Traffic Analysis Admin Role
AMP Administrator Role
The following table describes the available settings and default values for the AMP Administrator role.
AirWave 8.2.10 | User Guide Configuring AirWave | 39
40. 40 | Configuring AirWave AirWave 8.2.10 | User Guide
Setting Default Description
Name None Sets the administrator-definable string that names the role. The role
name should indicate the devices and groups that are viewable, as well
as the privileges granted to that role.
Enabled Yes Disables or enables the role. Disabling a role prevents all users of that
role from logging in to AirWave.
Type Device
Manager
Defines the type of role.
AirWave Administrator—Grants full access to AirWave and all the
devices, the capability to create new users, and access to AMP Setup,
VisualRF > Setup, VisualRF > Audit Log, System > Event Log, and
System > Performance pages.
Aruba Controller
Role
Disabled Enables or disables Single Sign-On for the role. If enabled, allows the
user read-only access or direct access to the Aruba controller UIs from
quick links in the WebUI without having to enter credentials for the
controller.
Allow user to
disable timeout
No Whether a user can disable AirWave’s timeout feature.
Custom Message none A custom message can also be included.
Table 17: AMP Setup > Roles > Add/Edit Roles Fields and Default Values for AMP Administrator Role
Setting Default Description
Name None Sets the administrator-definable string that names the role. The role name
should indicate the devices and groups that are viewable, as well as the
privileges granted to that role.
Enabled Yes Disables or enables the role. Disabling a role prevents all users of that role
from logging in to AirWave.
Type Device
Manager
Defines the type of role.
Device Manager—Provides access to a limited number of devices and groups
based on the Top folder and varying levels of control based on the Access
Level.
Table 18: AMP Setup > Roles > Add/Edit Roles Fields and Default Values for Device Manager Role
41. Setting Default Description
Access Level Monitor
(Read Only)
Defines the privileges the role has over the viewable device. AirWave supports
three privilege levels, as follows:
l Manage (Read/Write)—Provides the capability to modify, remove, and
view information for devices and groups. Selecting this option causes a new
field, Allow authorization of Devices, to appear on the page, and is
enabled by default.
l Audit (Read Only)—Provides the capability to view devices and groups
and the Device Configuration page, which may contain sensitive
information like AP passwords.
l Monitor (Read Only)—Provides the capability to view devices and groups
and VisualRF.
Top Folder Top Defines the highest viewable folder for the role. The role is able to view all
devices and groups contained by the specified top folder. The top folder and its
subfolders must contain all of the devices in any of the groups it can view.
NOTE: AirWave enables user roles to be created with access to folders within
multiple branches of the overall hierarchy. This feature assists non-
administrator users who support a subset of accounts or sites within a single
AirWave deployment, such as help desk or IT staff.
User roles can be restricted to multiple folders within the overall hierarchy,
even if they do not share the same top-level folder. Non-administrator users
are only able to see data and users for devices within their assigned subset of
folders.
Allow
Authorization
of Devices
Yes NOTE: This option is only available when the AP/Device Access Level is
specified as Manage (Read/Write).
RAPIDS None Sets the RAPIDS privileges. This field specifies the RAPIDS privileges for the
user role and includes these options:
l None— Cannot view the RAPIDS tab or any rogue devices.
l Read Only—The user can view the RAPIDS pages but cannot make any
changes to rogue devices or perform OS scans.
l Read/Write—The user may edit individual rogues, classification, threat
levels and notes, and perform OS scans.
l Administrator—Has the same privileges as the Read/Write user, but can
also set up RAPIDS rules, override scores and is the only user who can
access the RAPIDS > Setup page.
VisualRF Read Only Sets the VisualRF privileges, which are set separately from the Devices:
l Read Only—The user can view the VisualRF pages but cannot make any
changes to floor plans.
l Read/Write—The user may edit individual floor plans, buildings, and
campuses.
UCC Yes Permits access to UCC views and tables. Monitoring and managing privileges
are set at the device level.
Traffic
Analysis
Yes Permits access to Traffic Analysis views and tables. Monitoring and managing
privileges are set at the AP/Device level.
Table 18: AMP Setup > Roles > Add/Edit Roles Fields and Default Values for Device Manager Role
(Continued)
AirWave 8.2.10 | User Guide Configuring AirWave | 41
42. 42 | Configuring AirWave AirWave 8.2.10 | User Guide
Setting Default Description
Aruba
Controller
Single Sign-
On Role
Disabled If enabled, the user has read-only or root access to Aruba controller UIs from
quick links without having to enter credentials for the controller.
Display Client
Diagnostics
Screens By
Default
No Sets the role to support helpdesk users with parameters that are specific to
the needs of helpdesk personnel supporting users on a wireless network.
Allow User to
Disable
Timeout
No Whether a user can disable AirWave’s timeout feature.
Allow Reboot
of Devices
No Allows user to reboot devices in AirWave.
Allow
Creation of
Guest Users
Yes If this option is enabled, users with an assigned role of Monitoring or Audit can
be given access to guest user account creation along with the option to allow a
sponsor to change its user name.
NOTE: This option is not available if the AP/Device Access Level is specified
as Manage (Read/Write).
Allow
Accounts
With No
Expiration
Yes Specifies whether to allow accounts that have no expiration set. If this is set to
No, then enter the amount of time that can elapse before the access expires.
Allow
Sponsor to
Change
Sponsorship
User Name
No Specifies whether a sponsor can change the sponsorship user name.
Custom
Message
none A custom message can also be included.
Table 18: AMP Setup > Roles > Add/Edit Roles Fields and Default Values for Device Manager Role
(Continued)
Guest Access Sponsor Role
The following table describes the available settings and default values for the Guest Access Sponsor role.
Setting Default Description
Name None Sets the administrator-definable string that names the role. The role name
should indicate the devices and groups that are viewable, as well as the
privileges granted to that role.
Table 19: AMP Setup > Roles > Add/Edit Roles Fields and Default Values for Guest Access Sponsor Role
43. Setting Default Description
Enabled Yes Disables or enables the role. Disabling a role prevents all users of that role
from logging in to AirWave.
Type AP/Device
Manager
Defines the type of role.
Guest Access Sponsor—Limited-functionality role to allow helpdesk or
reception desk staff to grant wireless access to temporary personnel. This role
only has access to the defined top folder.
Top Folder Top Defines the Top viewable folder for the role. The role is able to view all devices
and groups contained by the Top folder. The top folder and its subfolders must
contain all of the devices in any of the groups it can view.
NOTE: AirWave enables user roles to be created with access to folders within
multiple branches of the overall hierarchy. This feature assists non-
administrator users who support a subset of accounts or sites within a single
AirWave deployment, such as help desk or IT staff.
User roles can be restricted to multiple folders within the overall hierarchy,
even if they do not share the same top-level folder. Non-administrator users
are only able to see data and users for devices within their assigned subset of
folders.
Allow user
to disable
timeout
No Whether a user can disable AirWave’s timeout feature.
Allow
accounts
with no
expiration
Yes Specifies whether to allow accounts that have no expiration set. If this is set to
No, then enter the amount of time that can elapse before the access expires.
Allow
sponsor to
change
sponsorship
user name
No Specifies whether a sponsor can change the sponsorship user name.
Custom
Message
none A custom message can also be included.
Table 19: AMP Setup > Roles > Add/Edit Roles Fields and Default Values for Guest Access Sponsor Role
(Continued)
Configuring the User Login and Authentication
AirWave uses session-based authentication with a configurable login message and idle timeout. As an option,
you can set AirWave to use an external user database to simplify password management for AirWave
administrators and users.
This section contains the following procedures to be followed in AMP Setup > Authentication:
l "Configuring the User Login" on page 44
l "Configuring Whitelists" on page 44
l Setting up Certificate Authentication
l "Setting Up Single Sign-On" on page 45
l "Specifying the Authentication Priority" on page 45
AirWave 8.2.10 | User Guide Configuring AirWave | 43
44. 44 | Configuring AirWave AirWave 8.2.10 | User Guide
l "Configuring RADIUS Authentication and Authorization" on page 46
l "Integrating a RADIUS Accounting Server" on page 45
l "Configuring TACACS+ Authentication" on page 48
l "Configuring LDAP Authentication and Authorization" on page 50
Configuring the User Login
Follow these steps to configure the login banner message, idle timeout, and persistent cookies which are session-
based:
To configure user login:
1. Navigate to AMP Setup > Authentication > Login Configuration.
2. To clear information such as user logins, select No for the "Use Persistent Cookies" option.
3. Enter the length of time that passes before AirWave ends an idle user session. 5 minutes is the lowest idle
setting.
Figure 8: Example Settings for the Login Configuration Page
4. In the Login Message and Click Through Agreement fields, type the login banner message and login
agreement message that will display before the user logs in to AirWave, requiring the user to accept the terms
of usage before granting full access to the WebUI.
5. Click Save at the bottom of the page.
Configuring Whitelists
By adding subnets to a whitelist, you can limit AirWave access to users on a list of trusted subnets.
Do not delete the current client network from the AirWave whitelist, or you might lose access to the AirWave WebUI.
To configure the whitelist:
1. Navigate to AMP Setup > Authentication.
2. In the Login Configuration section, select Yes for the "Enable AMP Whitelist" option. When you enable this
functionality, AirWave displays the whitelist with the current client network as the first entry.
45. Figure 9: Enabling Whitelists
3. Enter additional subnets, one subnet per line.
4. Scroll down the page, then click Save.
Setting Up Single Sign-On
On the AMP Setup > Authentication page, administrators can set up single sign-on (SSO) for users that have
access to AirWave controllers. This allows users to log in to AirWave and use the IP Address or Quick Links
hypertext links across AirWave to access the controller’s WebUI without having to enter credentials again. The
links the user can select to access a controller can be found on the Devices > Monitor page in the Device Info
section, and on device list pages.
Perform the following steps to enable this feature for this AirWave.
1. Locate the Single Sign-On section in AMP Setup > Authentication.
2. In the Enable Single Sign-On field, select Yes.
3. Select Save if you are finished or follow the next procedure to specify the authentication priority.
Specifying the Authentication Priority
To specify the authentication priority for this AirWave server, locate the Authentication Priority section in
AMP Setup > Authentication, and select either Local or Remote as the priority.
If Local is selected, then remote will be attempted if a user is not available. If Remote is selected, then the local
database is searched if remote authentication fails. The order of remote authentication is RADIUS first, followed
by TACACS, and finally LDAP.
Select Save if you are finished or follow the next procedure to configure RADIUS, TACACS+, and LDAP
Authentication options.
Integrating a RADIUS Accounting Server
AirWave checks the local user name and password before checking with the RADIUS server. If the user is found
locally, the local password and role apply. When using RADIUS, it’s not necessary or recommended to define
users on the AirWave server. The only recommended user is the backup admin, in case the RADIUS server goes
down.
Optionally, you can configure RADIUS server accounting on AMP Setup > RADIUS Accounting. This capability
is not required for basic AirWave operation, but can increase the user-friendliness of AirWave administration in
large networks. Figure 10 illustrates the settings of this optional configuration interface.
Perform the following steps and configurations to enable AirWave to receive accounting records from a separate
RADIUS server. Figure 10 illustrates the display of RADIUS accounting clients already configured.
AirWave 8.2.10 | User Guide Configuring AirWave | 45
46. 46 | Configuring AirWave AirWave 8.2.10 | User Guide
Figure 10: AMP Setup > RADIUS Accounting Page Illustration
1. To define a the RADIUS authentication server or network, browse to the AMP Setup > RADIUS Accounting
page, select Add, and provide the information in Table 20.
Setting Default Description
IP/Network None Specify the IP address for the authentication server if you only want to accept
packets from one device. To accept packets from an entire network enter the
IP/Netmask of the network (for example, 10.51.0.0/24).
Nickname None Sets a user-defined name for the authentication server.
Shared Secret
(Confirm)
None Sets the Shared Secret that is used to establish communication between
AirWave and the RADIUS authentication server.
Table 20: AMP Setup > Radius Accounting Fields and Default Values for LDAP Authentication
2. Click Add to save your settings.
Configuring RADIUS Authentication and Authorization
For RADIUS capability, you must configure the IP/Hostname of the RADIUS server, the TCP port, and the server
shared secret. Perform these steps to configure RADIUS authentication:
1. Go to the AMP Setup > Authentication page. This page displays current status of RADIUS. Figure 11
illustrates this page.
47. Figure 11: AMP Setup > Authentication Page Illustration for RADIUS
2. Select No to disable or Yes to enable RADIUS authentication. If you select Yes, several new fields appear.
Complete the fields described in Table 21.
Field Default Description
Primary Server
Hostname/IP Address
N/A Enter the IP address or the hostname of the primary RADIUS server.
Primary Server Port
(1-65535)
1812 Enter the TCP port for the primary RADIUS server.
Primary Server Secret N/A Specify and confirm the primary shared secret for the primary RADIUS
server.
Confirm Primary
Server Secret
N/A Re-enter the primary server secret.
Secondary Server
Hostname/IP Address
N/A Enter the IP address or the hostname of the secondary RADIUS server.
Secondary Server Port
(1-65535)
1812 Enter the TCP port for the secondary RADIUS server.
Secondary Server
Secret
N/A Enter the shared secret for the secondary RADIUS server.
Confirm Secondary
Server Secret
N/A Re-enter the secondary server secret.
Table 21: AMP Setup > Authentication Fields and Default Values for RADIUS Authentication
AirWave 8.2.10 | User Guide Configuring AirWave | 47
48. 48 | Configuring AirWave AirWave 8.2.10 | User Guide
Field Default Description
Authentication Method PAP Select one of the following authentication methods:
l PAP
l PEAP-MSCHAPv2
If you use the PEAP-MSCHAPv2 authentication method with the default
"Read-Only Monitoring and Auditing" user role, note that the name of
this role has been slightly modified in AirWave 8.2.3 to allow support
the PEAP-MSCHAPv2 authentication method: the ampersand
(&) symbol has been changed to the word and.
l Role Name in 8.2.2.x and earlier releases: Read-Only Monitoring
& Auditing
l Role Name in AirWave 8.2.3: Read-Only Monitoring and Auditing
If you used the Read-Only Monitoring & Auditing user role prior to
upgrading to AirWave 8.2.3 or later releases, you must modify the user
role name on the RADIUS server to ensure that the user role name on
the RADIUS server exactly matches the user role name in AirWave.
Table 21: AMP Setup > Authentication Fields and Default Values for RADIUS Authentication (Continued)
3. Select Save to retain these configurations, and continue with additional steps in the next procedure.
Configuring TACACS+ Authentication
For TACACS+ capability, you must configure the IP/Hostname of the TACACS+ server, the TCP port, and the
server shared secret. This TACACS+ configuration is for AirWave users and does not affect APs or users logging
into APs.
1. Go to the AMP Setup > Authentication page. This page displays current status of TACACS+. Figure 12
illustrates this page when neither TACACS+, LDAP, nor RADIUS authentication is enabled in AirWave.
Figure 12: AMP Setup > Authentication Page Illustration for TACACS+
2. Select No to disable or Yes to enable TACACS+ authentication. If you select Yes, several new fields appear.
Complete the fields described in Table 22.
49. Field Default Description
Primary Server Hostname/IP
Address
N/A Enter the IP address or the hostname of the primary TACACS+
server.
Primary Server Port (1-65535) 49 Enter the port for the primary TACACS+ server.
Primary Server Secret N/A Specify and confirm the primary shared secret for the primary
TACACS+ server.
Confirm Primary Server
Secret
N/A Re-enter the primary server secret.
Secondary Server
Hostname/IP Address
N/A Enter the IP address or hostname of the secondary TACACS+
server.
Secondary Server Port (1-
65535)
49 Enter the port for the secondary TACACS+ server.
Secondary Server Secret N/A Enter the shared secret for the secondary TACACS+ server.
Confirm Secondary Server
Secret
N/A Re-enter the secondary server secret.
Table 22: AMP Setup > Authentication Fields and Default Values for TACACS+ Authentication
3. Select Save and continue with additional steps.
Configuring Cisco ACS to Work with AirWave
To configure Cisco ACS to work with AirWave, you must define a new service named AMP that uses HTTPS on the
ACS server.
1. The AMP HTTPS service is added to the TACACS+ (Cisco) interface under the Interface Configuration tab.
2. Select a checkbox for a new service.
3. Enter AMP in the service column and https in the protocol column.
4. Select Save.
5. Edit the existing groups or users in TACACS to use the AMP service and define a role for the group or user.
l The role defined on the Group Setup page in ACS must match the exact name of the role defined on the
AMP Setup > Roles page.
n The defined role should use the format: role=<name_of_AMP_role>. For example role=DormMonitoring.
As with routers and switches, AirWave does not need to know user names.
6. AirWave also needs to be configured as an AAA client.
l On the Network Configuration page, select Add Entry.
l Enter the IP address of AirWave as the AAA Client IP Address.
l The secret should be the same value that was entered on the AMP Setup > TACACS+ page.
7. Select TACACS+ (Cisco IOS) in the Authenticate Using drop down menu and select submit + restart.
AirWave checks the local user name and password store before checking with the TACACS+ server. If the user is
found locally, the local password and local role apply. When using TACACS+, it is not necessary or
recommended to define users on the AirWave server. The only recommended user is the backup administrator,
in the event that the TACACS+ server goes down.
AirWave 8.2.10 | User Guide Configuring AirWave | 49
50. 50 | Configuring AirWave AirWave 8.2.10 | User Guide
Configuring LDAP Authentication and Authorization
LDAP (Lightweight Directory Access Protocol) provides users with a way of accessing and maintaining distributed
directory information services over a network. When LDAP is enabled, a client can begin a session by
authenticating against an LDAP server which by default is on TCP port 389.
Perform these steps to configure LDAP authentication:
1. Go to the AMP Setup > Authentication page.
2. Select the Yes radio button to enable LDAP authentication and authorization. Once enabled, the available
LDAP configuration options will display. Figure 13 illustrates this page.
Figure 13: AMP Setup > Authentication Page Illustration for LDAP
3. Complete the fields described in Table 23.
51. Field Default Description
Support Deprecated
Ciphers
Disabled By default, AirWave supports the following strong ciphers.
l DHE-RSA-AES128-SHA
l DHE-RSA-AES256-SHA
l DHE-RSA-AES128-SHA256
l DHE-RSA-AES256-SHA256
l ECDHE-ECDSA-AES128-SHA256
l ECDHE-ECDSA-AES256-SHA384
l ECDHE-ECDSA-AES128-GCM-SHA256
l ECDHE-ECDSA-AES256-GCM-SHA384
Enable this Support Deprecated Ciphers option to allow
AirWave to also use following legacy ciphers:
l AES128-SHA
l AES256-SHA
l DES-CBC3-SHA
l DHE-DSS-AES128-SHA
l DHE-DSS-AES256-SHA
l EDH-DSS-DES-CBC3-SHA
l EDH-RSA-DES-CBC3-SHA
l KRB5-DES-CBC3-MD5
l KRB5-DES-CBC3-SHA
NOTE: AirWave does not recommend using legacy ciphers
for an extended length of time.
Primary Server
Hostname/IP Address
none Enter the IP address or the hostname of the primary LDAP
server.
Primary Server Port
(1-65535)
389 Enter the port where the LDAP server is listening. The default
port is 389.
Secondary Server
Hostname/IP Address
none Optionally enter the IP address or hostname of the
secondary LDAP server. This server will be contacted in the
event that the primary LDAP server is not reachable.
Secondary Server Port
(1-65535)
389 Enter the port where the LDAP service is listening on the
secondary LDAP server. The default port is 389.
Connection Type clear-text Specify one of the following connection types AirWave and
the LDAP server:
l clear-text results in unencrypted communication.
l ldap-s results in communication over SSL.
l start-tls uses certificates to initiate encrypted
communication.
Table 23: AMP Setup > Authentication Fields and Default Values for LDAP Authentication
AirWave 8.2.10 | User Guide Configuring AirWave | 51
52. 52 | Configuring AirWave AirWave 8.2.10 | User Guide
Field Default Description
View Server
Certificate
none If Connection Type is configured as start-tls, then also
specify whether the start-tls connection type uses a
certificate.
l none - The server may provide a certificate, but it will not
be verified. This may mean that you are connected to the
wrong server.
l optional - Verifies only when the servers offers a valid
certificate.
l require - The server must provide a valid certificate.
A valid LDAP Server CA Certificate must be provided in
case of optional or require. Certificates uploaded on the
Device Setup > Certificates page with a type of
Intermediate CA or Trusted CA are listed in the drop down
for LDAP Server CA Certificate.
LDAP Server CA
Certificate
none Specify the LDAP server certificate to use to initiate
encrypted communication. Only certificates that have been
uploaded with a type of Intermediate CA or Trusted CA will
appear in this drop down.
NOTE: This LDAP Server CA Certificate drop down menu
only appears if View Server Certificate is specified as
optional or require.
Bind DN none Specify the Distinguished Name (DN) of the administrator
account, such as
‘cn=admin01,cn=admin,dn=domain,dn=com’. Note that for
the Active directory, the bind DN can also be in the
administrator@domain format (for example,
administrator@acme.com).
Bind Password none Specify the bind DN account password.
Confirm Bind
Password
none Re-enter the bind password.
Base DN none The DN of the node in your directory tree from which to start
searching for records. Generally, this would be the node that
contains all the users who may access AirWave, for example
cn=users,dc=domain,dc=com.
Key Attribute sAMAccountName The LDAP attribute that identifies the user, such as
‘sAMAccountName’ for Active Directory
Role Attribute none The LDAP attribute that contains the AirWave role. Users
who log in to AirWave using this LDAP authentication will be
granted permissions based on this role. Refer to Configuring
AirWave User Roles for more information about AirWave
User Roles.
Filter (objectclass=*) This option limits the object classes in which the key,role
attributes would be searched.
Table 23: AMP Setup > Authentication Fields and Default Values for LDAP Authentication (Continued)