|
4 | Contents AirWave Wireless Management Suite | Configuration GuideGeneral Profiles Guidelines........................................................................................ 39General Controller Procedures and Guidelines ......................................................... 40Using Master, Standby Master, and Local Controllers in Aruba Configuration ................ 40Pushing Device Configurations to Controllers................................................................... 40Supporting APs with Aruba Configuration................................................................. 41AP Overrides Guidelines.................................................................................................... 41Configuring or Editing AP Overrides.................................................................................. 41Changing Adaptive Radio Management (ARM) Settings................................................... 42Changing SSID and Encryption Settings........................................................................... 43Changing the Aruba AP Group for an AP Device .............................................................. 43Using AWMS to Deploy Aruba APs for the First Time....................................................... 43Using General AWMS Device Groups and Folders ........................................................... 45Visibility in Aruba Configuration................................................................................. 45Visibility Overview .............................................................................................................. 45Defining Visibility for Aruba Configuration ......................................................................... 46Appendix A Aruba Configuration Reference ................................................................. 49Introduction................................................................................................................ 49Aruba AP Groups Pages and Field Descriptions....................................................... 53Aruba AP Groups............................................................................................................... 53AP Overrides Pages and Field Descriptions.............................................................. 57AP Overrides...................................................................................................................... 57WLAN Pages and Field Descriptions......................................................................... 62Overview of WLANs in Aruba Configuration...................................................................... 62WLANs............................................................................................................................... 62WLANs > Basic.................................................................................................................. 63WLANs > Advanced .......................................................................................................... 64Profiles Pages and Field Descriptions ....................................................................... 68Understanding Aruba Configuration Profiles..................................................................... 68Profiles > AAA.................................................................................................................... 69Profiles > AAA.................................................................................................................... 70Profiles > AAA > Captive Portal Auth ................................................................................ 71Modifying the Initial User Role.................................................................................... 73Profiles > AAA > Mac Auth ................................................................................................ 73Profiles > AAA > Stateful 802.1X Auth............................................................................... 75Profiles > AAA > Wired Auth.............................................................................................. 76Profiles > AAA > VPN Auth ................................................................................................ 76Profiles > AAA > Management Auth .................................................................................. 77Profiles > AAA > 802.1x Auth ............................................................................................ 78Profiles > AAA > Stateful NTLM Auth ................................................................................ 83Profiles > AAA > WISPr Auth ............................................................................................. 84Profiles > AP ...................................................................................................................... 86Profiles > AP > System...................................................................................................... 86Profiles > AP > Regulatory Domain ................................................................................... 91Profiles > AP > AP Wired................................................................................................... 92Profiles > AP > AP Ethernet Link ....................................................................................... 94Profiles > AP > SNMP ....................................................................................................... 94Profiles > AP > SNMP > SNMP User ................................................................................ 95Aruba Controller Traps ...................................................................................................... 96Access Point/Air Monitor Traps.................................................................................. 97Profiles > IDS ..................................................................................................................... 98Profiles > IDS > General .................................................................................................. 101Profiles > IDS > Signature Matching ............................................................................... 102Profiles > IDS > Signature Matching > Signatures .......................................................... 103Profiles > IDS > Denial of Service.................................................................................... 103Profiles > IDS > Denial of Service > Rate Threshold ....................................................... 106Profiles > IDS > Impersonation........................................................................................ 108Profiles > IDS > Unauthorized Device ............................................................................. 109Profiles > Mesh................................................................................................................ 112Profiles > Mesh > Radio .................................................................................................. 112Profiles > Mesh > Radio > Mesh HT SSID ...................................................................... 114 PreviousNext |