Instant VRD 2.0
Instant VRD 2.0
Version 2.0.1
Authors: Contributors:
Vishal Mann Sathya Narayana Gopal
Hewlett Packard Enterprise believes in being unconditionally inclusive. Terms in this document
that are recognized as offensive or noninclusive are used only for consistency with the
product. When the product is updated to remove the terms, this document will also be updated.
Copyright Information
Copyright © 2018 Hewlett Packard Enterprise Development LP.
www.arubanetworks.com
Fax 408.227.455
Contents
Related Documents
In addition to this document, the IAP product documentation includes the following:
• Aruba Instant User Guide
• Aruba Instant CLI Reference Guide
• Access Point Product Line
• End of Life Information
Bolded words indicate an option that should be selected in the Graphical User
Bolded>words Interface (GUI). The angled brackets indicate that the choices are part of a path
in the GUI.
Command text in this font will appear inside of a box and indicates commands
Command Text
that can be entered into the Command Line Interface (CLI).
In this example, you would type “send” at the system prompt exactly as shown,
followed by the text of the message you wish to send. Do not type the angle
brackets.
Informational Icons
The following informational icons are used throughout this guide:
Indicates helpful suggestions, pertinent information, and important things to remember.
While this design was acceptable back when the demand for Wi-Fi availability was relatively low it
did have some significant drawbacks including the fact that each AP needed to be individually
managed and configured. As Wi-Fi technology progressed and client device capabilities increased
organizations began to realize the advantages of Wi-Fi networks for both guest access as well as
for employee productivity. It didn’t take long before Wi-Fi went from a novelty to becoming the de
facto access standard expected by every user on the network. Unfortunately the fact that fat APs
needed to be individually managed imposed significant limitations to enterprises attempting to
scale and grow their Wi-Fi deployments. Organizations needed a significantly more efficient
method to centrally manage devices which were growing rapidly more complex and experiencing
increased demand from users. This increase in demand led to the development of controller
based WLAN solutions to enable administrators to gain control they needed to manage their
rapidly growing and evolving networks.
Adding controllers and network management systems to wireless deployments introduced added
functionality which made it dramatically easier for administrators to control their networks.
However, enabling a single point of management for Wi-Fi deployments required significant
investment and resources as well. The cost of deploying controllers and management functionality
at the time was so high that typically only large enterprises had the ability to allocate the
resources required for such solutions.
Some examples of controller-based WLAN networks include:
• Organizations that require centralized encryption and decryption of wireless data e.g.
government, financial, and other security conscious organizations
• Large campuses that require thousands of APs at a single location e.g. universities, large
enterprises, etc.
• Organizations with large layer 2 domain that do not want to conduct a major overhaul to
their deployment such as adding or deleting VLANs to their edge network
Management functions such as image sync, cluster monitoring, and image management, are
coordinated by the Master IAP for the cluster through a centralized management plane.
Every cluster holds an election based on the same Master Election Protocol to determine which
IAP will serve as the Master for the cluster. Every IAP in a cluster will run through the steps
depicted in the figure below as part of the Master IAP election process:
When an IAP first boots up it will begin in the Initial state and listen for beacons from an existing
Master for a random period of time. If it does not receive a master beacon it will transition into the
Potential Master state. In the Potential Master state, the IAP waits again and listens for a master
An IAP with a USB modem will ignore master beacon messages in the first 5 minutes after it boots up after which it will
become the cluster Master. The previous Master will reboot and join the cluster as a Slave.
An IAP with a USB modem will become the Master if it attempts to join a cluster and that cluster
does not have a designated Preferred Master. If there are no designated preferred masters or
IAPs with USB modems then the IAP with the longest uptime will win the election and become the
Master.
Master Failover
Once the election has concluded and an IAP is selected as Master it will begin broadcasting master
beacons one a second to every slave in the cluster. These beacons are used as the primary failure
detection mechanism since the Slaves will become aware that the Master IAP has failed if they
cease to receive master beacons. If such an event occurs the Slaves in the cluster will continue to
listen for a random interval of between 10 and 40 seconds. If they fail to receive a master beacon
during the random interval then each slave will transition into the Potential Master state and will
When a Master IAP fails the clients that were associated to it will need to re-associate to a new IAP.
The clients connected to the rest of the Slave IAPs will remain unaffected by a Master failure. A
Master IAP failure event will have the following impact on its associated clients:
1. Clients which were authenticated to the failed Master IAP will need to re-associate to a new
IAP
2. Clients using Magic Guest VLAN will need to wait till new Master is elected since Dynamic
Host Configuration Protocol (DHCP) and Network Address Translation (NAT) are both
coordinated by the Master IAP
3. If Dynamic Remote Authentication Dial In User Service (RADIUS) Proxy (DRP) has been
enabled and new clients attempt to associate to an IAP during the re-election process they
will be required to wait until a Master has been elected
4. If the Master IAP is acting as a Virtual Private Network (VPN) client and is forwarding client
traffic to the datacenter that flow will be disrupted until a new Master is elected
5. After the failure it will take approximately 30-70 seconds until the VC IP becomes reachable
Aruba strongly discourages customers from configuring multiple preferred masters in the same cluster.
Multi-model AP Cluster
IAPs of different models in the same layer 2 domain are capable of forming a cluster together. The
determining factor to whether or not IAPs will be able to successfully form a cluster is the Instant
image on the devices. In the figure below, we’ll assume that the three IAPs in a cluster have an
Instant image of version 6.5.4.3 and an administrator wants to add new instant IAP with code
version 6.5.4.0 to the same layer 2 domain:
If the new IAP cannot reach device.arubanetworks.com and fails to download the same image as the Master IAP it will
not join the cluster.
Additional information for Aruba products can be accessed through the Related Documents
section.
Cluster Architecture
Just like any other device in a network the functions of an IAP are best understood when thought
of as three operational planes:
• Management Plane
• Control Plane
• Data Plane
Out of these planes only the management plane is centralized in Instant. The control and data
planes are distributed. The determination of how a function is mapped to a plane and whether or
not is centralized, is determined by the function's relationship to Cluster Master. If a function
requires traffic to be sent to the Cluster Master for normal operation then it is considered
centralized. Each plane and the functions associated with them in an Aruba Instant architecture
will be discussed in the following sections.
• Cluster Configuration Sync - Once the Master IAP is configured, the slave in that cluster
will download its configuration from the Master IAP. Any changes pushed from the local
GUI will be synchronized to all the IAPs in that cluster
• Cluster Monitoring - All the IAPs in a cluster will periodically provide status updates to the
Master IAP. This data is presented on the cluster’s local GUI
• Firmware Upgrade Orchestration - Images for the entire cluster can be pushed through
the local GUI. This can be done automatically by clicking on the “Check for newer option”
button or manually by downloading the image and pointing it via “Browse” option or
providing a URL to a server containing the image.
• Communication with Management Platforms - Management platforms such as AirWave
and Central communicate with the Master IAP. The configuration changes made through
these platforms are sent to the Master IAP.
• Dynamic RADIUS Proxy (DRP) - The IAP acts as an authenticator when 802.1x security has
been configured for client authentication. This means that each IAP must be individually
added as a NAS client into the RADIUS server. However, in an environment where adding of
each IAP as a NAS client is not feasible DRP can be used. When DRP is enabled, all IAPs in a
cluster send RADIUS messages to the Master IAP which acts as a RADIUS proxy.
Aruba strongly recommends the network-assigned IP addressing option for client IP assignment for security purposes.
Do not use the VC-assigned IP option in an environment in which a VLAN-based segregation is required between the
guest VLAN and the AP VLAN.
Aruba recommends using a dedicated uplink VLAN on IAP trunk links for guest access. Magic VLANs should only be
utilized if there is no alternative option.
Control Plane
The figure below illustrates the functions which are part of the distributed control plane in Aruba
Instant:
• Client-aware Scanning – When ARM is enabled, APs will not change the channel that
clients currently connected clients are using. This results in a much more stable
environment for clients. The only exception to this behavior are triggers from high priority
events such as radar or excessive noise. It is recommended to enable client-aware
scanning for most deployments
• Band steering – ARM will automatically steer clients that support both 2.4 GHz and 5GHZ
bands to the 5GHz band as it is less congested. This in turn frees up valuable space in the
2.4GHz band for clients that are not 5GHz-capable. Band steering works in coordination
with Aruba’s airtime fairness feature which ensures that legacy clients will never be
bandwidth-starved
• Client Match - ARM continuously monitors the RF environment and dynamically load
balances clients at the time of association. Evenly distributing clients in this manner allows
sticky clients to roam to IAPs with high signal strength, prevents APs from becoming
overburdened, and dramatically improves the user experience. ClientMatch will not trigger
AP changes for clients that are actively transmitting data
Background Spectrum
Disabled Disabled Disabled Disabled Enabled
Monitoring
Airtime Fairness Default Access Fair Access Fair Access Fair Access Fair Access
ARP (Disabled if
Broadcast Filtering Disabled All ARP ARP
running Multicast)
Multicast
Disabled Enabled Enabled Enabled Enabled
Optimization
Dynamic Multicast
Disabled Disabled Disabled Enabled Disabled
Optimization
Interference
2 2 2 2 2*
Immunity Level
Dynamic CPU
Automatic Automatic Automatic Automatic Automatic
Management
* Modify if directed by Aruba Support
AppRF
AppRF is Aruba’s custom-built layer 7 firewall. It consists of integrated Deep Packet Inspection
(DPI) functionality as well as a cloud-based Web Policy Enforcement (WPE) service. Each IAP has its
own DPI engine which performs packet analysis and classification. They are also connected to
Aruba’s web-based URL database aruba.brightcloud.com for web category caching and verifying
the reputation of URLs accessed by clients on the network. In conjunction with WPE, DPI provides
the ability to analyze and identify applications, application categories, web categories, web
reputation, and web URLs based on client data packets. Traffic shaping policies such as bandwidth
control and per-application QoS can be defined for unique client roles. E.g. bandwidth-hungry
applications may be blocked on a guest role within an enterprise. AppRF also enables compliance
with privacy standards such as Health Insurance Portability and Accountability Act (HIPAA),
Payment Card Industry Data Security Standard (PCI DSS), and Children’s Internet Protection Act
(CIPA).
All VLANs where a rogue AP could connect must be trunked to IAPs in order to enable rogue classification. Aruba
recommends adjusting the detection and protection settings to “Low”. Setting the detection to “Medium” or “High”
might result in false positives or too many alerts.
Data Plane
The data plane of the IAP is completely distributed and is responsible for handling client as well as
AP traffic. In a cluster there are two basic types of VLANs:
AP VLAN
The VLAN which all APs in a cluster have in common is referred to as the AP VLAN. AP-generated
traffic such as RADIUS transactions, management traffic, SNMP, Syslog, and communication
between IAPs are all forwarded through the AP VLAN. In most deployments it is the native VLAN of
the trunk port the AP uses to connect. AP-generated traffic is left untagged and it is recommended
to maintain that default setting. However, AP traffic can be tagged by changing the uplink
management VLAN value in the WebUI if needed.
Aruba recommends enabling DHCP on the AP VLAN for large deployments. Static IP addresses can also be assigned in
smaller deployments if desired.
Client VLAN
The VLAN used to serve clients in an Instant cluster is referred to as the Client VLAN. The clients
are assigned an IP address either by the DHCP server on the network or from the DHCP server on
the IAP cluster.
Aruba recommends configuring different VLANs for APs and Clients
VLANs managed by the uplink network are commonly deployed with Aruba Instant. For example, if
VLAN 20 is managed by the uplink network and is mapped to the “Employee” SSID, the client traffic
is examined by the firewall of the IAP where the client is connected and directly bridged to VLAN
20 without flowing through the Master IAP of the cluster.
Deploying Instant
Cluster Security
Datagram Transport Layer Security
Control plane messages between IAPs are exchanged using the Process Application Programming
Interface (PAPI) protocol which operates on UDP port 8211. While PAPI functions well for its
intended purpose of carrying control plane traffic these messages have the potential to be
decoded by an expert hacker. Alternatively, Datagram Transport Layer Security (DTLS) operating
on UDP port 4434 can be used to provide security for control plane messages between IAPs in a
cluster.
Advantages of using DTLS for cluster security are as follows:
A Slave IAP with a non-default configuration that has enabled DTLS will not be able to join a cluster
where DTLS is disabled. An IAP in this scenario is considered to be in “Locked Mode”. In order for a
DTLS-enabled IAP to join a non-DTLS cluster it must either be reset to its factory settings or DTLS
must be disabled. Conversely, a non-DTLS enabled IAP cannot join a cluster that is currently using
DTLS unless DTLS is disabled for the entire cluster.
Most Aruba devices contain a TPM chip which performs cryptographic operations and stores
security keys. However, some devices do not have this chip and the keys are stored in flash which
reduces the level of protection for these devices. Starting with Instant 6.5.3, device certificates are
issued by a new PKI to non-TPM devices. The private key is encrypted using the Advanced
Encryption Standard (AES), compressed, and stored in the certificate files in flash. These devices
are called “low assurance devices”. Clusters which have DTLS enabled can be configured to either
permit or deny low assurance devices from joining the cluster.
Auto-Join
When a new IAP is added to a layer 2 network with an existing IAP network, the new IAP will join
the cluster via the Auto-Join feature. Auto-Join is enabled by default for purposes of IAP
deployment simplification. Once the initial cluster deployment is complete, Aruba recommends
disabling auto-join to prevent unauthorized IAPs from joining the cluster. Additional IAPs can be
added manually by using MAC the address of the new IAP or by temporarily enabling auto-join.
Aruba recommends configuring clusters with DTLS enabled and the auto-join feature disabled.
The boot process which determines the operating mode for a UAP is outlined in the image and
steps listed below:
Country Codes
Aruba IAPs & UAPs are available in the following variants:
1. United States (US)
2. Japan (JP)
3. Israel (IL)
4. Egypt
5. Rest of the World (RoW)
Improper country code assignments can disrupt wireless transmissions. Most countries impose penalties and
sanctions on operators of wireless networks with devices set to improper country codes
AirWave
Aruba AirWave is a powerful platform capable of managing Aruba’s wireless and wired devices
alike along with a wide range of third party devices. It can deployed as either a physical or a virtual
appliance and provides real-time monitoring, reporting, troubleshooting, configuration, and
firmware management. AirWave also offers a suite of tools which assist organization with
demonstrating regulatory compliance, strengthening wireless security, and managing RF coverage.
Provisioning
AirWave
IAPs can be provisioned for AirWave either manually or using any of the following Zero Touch
Provisioning (ZTP) methods:
• Activate
• DHCP Options
• DNS
Activate
Aruba activate is a cloud-based inventory management and provisioning service which
automatically deploys IAPs without the need for manual intervention. The service is offered to
DHCP Options
IAPs can be provisioned with AirWave using DHCP options 43 and 60. The DHCP client on the IAPs
sends out a DHCP request with option 60 and a string value of “ArubaInstantAP” to the DHCP
server. When the DHCP server receives the request it checks to see if option 43 has been
configured. If option 43 configuration is verified then a corresponding IP address for AirWave is
returned.
DNS Based
IAPs can discover an AirWave server through the domain name option in situations where it is not
possible to use DHCP options or perform ZTP with Activate. For example, if the domain “abc” is
included in the DHCP configuration, the IAPs will search for the DNS server records for “aruba-
AirWave.abc”. If no domain is specified then the IAP will search records for “aruba-AirWave”.
Manual Provisioning
IAPs may be manually added to Airwave by providing shared key and IP address of the Airwave
server in the VC WebUI.
Aruba recommends to use ZTP methods for IAP deployment whenever possible.
Subscription Key/ZTP
Aruba Central has its own version of the ZTP process for provisioning. When IAPs are purchased
they are automatically associated with a user account and the purchaser receives a subscription
key. When the user inputs the subscription key Central import all devices that the customer
purchased without the need for any additional steps.
Activate Account
IAPs are associated to an Activate user account upon purchase. Users can enter their Activate
credentials in Central to import IAPs as well.
The following table outlines Aruba’s best practice recommendations for authentication with Aruba
Instant:
Authentication Type Employee Guest
Recommended with a higher-
Open Not Recommended
level authentication method
WEP Not Recommended Not Recommended
Recommended for devices Can be used but the PSK key
PSK that do not support stronger should be rotated in a regular
authentication basis
802.1X Recommended N/A
Recommended in public
WISPr N/A
places such as airports
Captive Portal N/A Recommended
Encryption
The following types of encryption are available with Aruba Instant:
• Open – Open networks have no encryption and offer no protection from wireless packet
captures. Most hot spot or guest networks are open networks and the end user is expected
to use their own protection methods such as VPN or Secure Sockets Layer (SSL) to secure
their transmissions.
• Temporal Key Integrity Protocol (TKIP) - TKIP is a part of the WPA certification and was
created as a stopgap measure to secure wireless networks that previously used WEP
encryption whose 802.11 adapters were not capable of supporting AES encryption. TKIP
uses the same encryption algorithm as WEP, but TKIP is significantly more secure and has
an additional message integrity check (MIC).
The following table outlines Aruba’s best practice recommendations for encryption with Aruba
Instant:
Access Rules
Role-Based
All IAPs support a role-based firewall that allows users to obtain network access based on their
user role. These roles can be assigned based on various attributes e.g. Vendor Specific Attributes,
MAC address, AP Name, etc. The users connected to the Service Set Identifier (SSID) are all on the
same subnet however they have different rights customized for their needs. When a user joins an
SSID they will be placed into a default role until an administrator assigned them a new one. A
RADIUS server such as ClearPass Policy Manger (CPPM) can also dynamically assign roles for
users.
Network-Based
Network-based access means that users connected to the same SSID will have common rules
specified for a network. These rules can be based on an access control list, captive portal, VLAN
assignment etc.
Unrestricted
Unrestricted access allows users connected to the SSID to gain network access without any
restriction on destinations or type of traffic.
Aruba recommends using a RADIUS server to manage access rules rather than locally assigning them on the IAP. A
RADIUS server will need to send the Aruba-User-Role attribute back to an IAP to change client’s role.
Deployment Models
Cluster Mode
For the Instant Cluster Mode deployment model we’ll use the example of a K-12 school district
which requires enterprise-grade Wi-Fi infrastructure, security, and centralized management. Since
each school is considered an individual site and the number of IAPs at each school is less than
128, cluster mode will be the best choice for a deployment model. Each school will contain an
individual cluster with IAPs deployed based on site survey data. Once the desired IAPs are have
been deployed, the auto-join feature is disabled and DTLS is enabled for cluster communications
per Aruba’s best practice recommendations.
The K-12 school in this scenario is managed by an IT team which prefers cloud-based
management servers, therefore Aruba Central is the ideal choice for cluster management. Each
school cluster will have its own VC with Aruba Central coordinating all monitoring, configuration,
and reporting. Depending on the school’s requirements, ClearPass could be used to provide
802.1x authentication for students, teachers, and district employees as well as provide a captive
portal for guests trying to gain internet access.
Branch Connectivity
Distributed Network Design
A branch office is a location other than a main office where business is conducted however the
term has different connotations depending on the type of organization deploying the branch. In
the context of a retail chain the term branch represents stores that serve customers, whereas for a
traditional enterprise organization a branch would be defined as an offsite location where
employees and contractors congregate for their daily work. Regardless of the type of organization
a branch serves the main objective of any branch office network is to provide the following
functions:
• Secure employee access
• Guest Access
• Support applications such as voice and video
• Devices like printers, mobile, kiosks, security cameras
• Comply with regulations such as PCI, HIPPA, and CALEA
• Secure sensitive data
• Provide a highly-available network
Branch offices generally have a need for secure communication with the centralized corporate
network. This connectivity is typically provided through of WAN connectivity options such as
leased lines, MPLS, or forming a VPN over the public Internet. Connecting branch offices through
leased lines can be extremely cost prohibitive compared to options such as MPLS or VPN over
Internet. The decision of whether to use VPN or MPLS for branch connectivity is dependent on
numerous factors which need to be weighed including cost, security policies, and service
availability.
Aruba Instant is a powerful platform which is fully capable of providing wireless connectivity for a
branch office network. The number of IAPs required in a network depends on factors such as
number of users, the size of the branches, and the type of services required at each branch. The
physical design options that are available with Aruba Instant for branch office networks as follows:
• Single IAP branch
• Multi-IAP branch
The uplink Ethernet port of the IAP is directly connected to the WAN uplink which eliminates the
need for additional networking infrastructure at the branch. An IAP with a USB modem is also
capable of acting as an uplink.
Hierarchical Mode
In Hierarchical Mode one port of the multiport IAP acts as an uplink since it is connected to the
WAN network. The remaining IAP ports are referred to as downlink ports and can be used to
connect other multiport IAPs or wired devices. The IAP that is connected to the WAN through the
uplink port is referred to as the root IAP. The root IAP provides DHCP services and well as a Layer 3
connection to the ISP WAN uplink through NAT. The root IAP will always win the Master election
for the Aruba Instant cluster.
Aruba advises against using Hierarchical Mode if more than 5 IAPs are required in a network.
Flat Mode
The Flat Mode design is a default deployment model for a multi-IAP network and is recommended
for all branch networks that require more than five IAPs. In Flat Mode, all of the IAPs deployed at
the branch are connected to an uplink switch. If the Aruba Instant cluster is required to support
multiple VLANs then the uplink switch must be a managed switch. In addition, the IAPs must be
trunked to that uplink switch so that they may carry the appropriate VLAN tags.
E.g., if the AP VLAN, the employee VLAN, and the guest VLANs are VLANS 10, 20, and 30
respectively, then the IAPs should be trunked into the uplink switch with the native VLAN 10 and
tagged VLANs of 20 and 30. The figure below represents what a typical Multi-IAP Flat Mode
branch architecture would look like:
Aruba recommends deploying IAPs in a Flat Mode design if a managed switch is available.
The WLAN controller is not responsible for anything other than acting as a VPNC for IAP networks in remote branches.
Architecture
The IAP TUNNEL architecture includes the following two components:
1. Instant APs at branch sites
2. Controller at the Data center
The Master IAP at the branch site serves as the VPN endpoint and the controller located in the
datacenter serves as the VPN concentrator. When an IAP is set up for VPN it forms an IPsec tunnel
to the controller in the datacenter to secure sensitive corporate data.
IPsec authentication and authorization between the controller and the IAP is based on the Remote
AP whitelist configured on the controller. Only the Master IAP of the cluster forms the VPN tunnel
to the VPNC. From the controller’s perspective, the Master IAPs that form the VPN tunnels are
considered VPN clients.
The controller’s purpose in this scenario is to terminate VPN tunnels as well as route or switch VPN
traffic. The IP cluster creates an IPsec or GRE VPN tunnel from the VC to a Mobility Controller in a
branch office. The controller only acts as an IPsec or GRE VPN endpoint. It does not provide any
configuration or management of any kind for the IAP. The figure below provides a visual depiction
of the IAP TUNNEL architecture:
When an IPsec connection is established between the WLAN controller and an IAP, each end of the
IPsec tunnel has two IP addresses: an Inner IP address and an Outer IP address. By default, the
WLAN controller assigns them the following roles:
• Outer IP address: Logon
• Inner IP address: Default VPN with an “allow all” access control list (ACL)
Licenses Features
Base ArubaOS IAP can terminate a VPN tunnel and pass VPN traffic. Roles and polices
cannot be edited.
ArubaOS with a IAP can terminate a VPN tunnel and pass VPN traffic. The default role in the
PEFV license default IAP VPN authentication profile of a WLAN controller can be edited.
New user roles with custom firewall policies can be applied.
Tunneling Options
Instant supports the following tunneling protocols for remote access:
• Aruba IPSec - IPsec is a protocol suite that secures IP communications by authenticating
and encrypting each IP packet of a communication session. IPsec tunnels can be configured
to ensure that the data flow between the networks is encrypted. However, a split-tunnel
can also be configured which will only encrypt the corporate traffic. When IPsec is
configured it is important to add the Instant AP MAC addresses to the whitelist database
stored on the controller or external server. IPsec supports Local, L2, and L3 modes of IAP
TUNNEL operations
Instant APs only support IPSec with Aruba Controllers.
• Layer-2 GRE - GRE is a tunnel protocol for encapsulating multicast, broadcast, and L2
packets between a GRE-capable device and an endpoint. Instant APs support the
configuration of L2 GRE tunnel with an Aruba controller to encapsulate the packets sent
and received by the Instant AP
The GRE configuration for L2 deployments can be used when there is no encryption
requirement between the Instant AP and controller for client traffic. Instant APs support
two types of GRE configuration:
Manual GRE - The manual GRE configuration sends unencrypted client traffic with an
additional GRE header and does not support failover. When manual GRE is configured
on an Instant AP it is important ensure that the GRE tunnel settings are enabled on the
controller
Instant APs can send IPsec and GRE heartbeat packets to Aruba Controllers. By default,
Instant APs verify the status of heartbeat messages every 5 seconds and look for lost
packets 6 times before marking the IPsec tunnel as down. The time intervals are fully
configurable and can be modified according to the needs of network administrators.
• L2TPv3 - The L2TPv3 feature allows the Instant AP to act as an L2TP Access Concentrator
and tunnel all wireless client L2 traffic from the Instant AP to the L2TP Network Server
(LNS). In a centralized L2 model the VLAN on the corporate side is extended to remote
branch sites. Wireless clients associated with an Instant AP receive the IP address from the
DHCP server running on the LNS. In order to receive the address the Instant AP has to
transparently allow DHCP transactions through the L2TPv3 tunnel. Some important points
to note about L2TPv3 in the context of Instant APs are as follows:
Instant supports tunnel and session configuration and uses Control Message
Authentication (RFC 3931) for tunnel and session establishment. Each L2TPv3 tunnel
supports one data connection and this connection is termed as an L2TPv3 session
IAPs only support tunneling over UDP
If the primary LNS goes down it will fail over to the backup LNS. L2TPv3 has one tunnel
profile under which a primary peer and a backup peer are configured. If the primary
tunnel creation fails or if the primary tunnel gets deleted then the backup is engaged.
The following two failover modes are supported:
Preemptive: Preemptive mode means that if the primary peer comes back up while
the backup is active then the backup tunnel is deleted and the primary tunnel
resumes its role as an active tunnel. If preemption is configured when the primary
tunnel goes down a persistence timer is triggered which will attempt to bring up the
primary tunnel.
Non-Preemptive: In non-preemptive mode the backup tunnel will continue to
operate after taking over from the primary tunnel even if the primary comes back
up again.
L2TPV3 is not supported on IAP-205 devices.
The DHCP scopes associated with these forwarding modes are described in the following sections.
When configuring forwarding modes it is important to ensure that VLAN 1 is not configured for
any of the DHCP scopes as it is reserved for a different purpose.
• Local Mode - In Local Mode the IAP cluster at that branch uses a local subnet and the
Master IAP of the cluster acts as both the DHCP server and default gateway for clients.
Local Mode provides access to the corporate network using the inner IP of the IPsec tunnel.
The traffic destined for the corporate network is translated at the source with the inner IP
of the IPsec tunnel and is then forwarded through the tunnel. All other non-corporate
network traffic is translated using the IP address of the IAP and is forwarded through its
uplink. When Local Mode is used for forwarding client traffic, hosts on the corporate
network cannot establish connections to the clients on the Instant AP since the source
addresses of the clients are translated.
• Distributed L2 Mode - In this mode, the Master IAP assigns IP addresses from the
configured subnet and forwards traffic to both corporate and non-corporate destinations.
The Master IAP acts as a DHCP server for the clients while the gateway for clients resides in
the datacenter. Distributed L2 Mode can be thought of as an L2 extension of the corporate
VLAN to remote sites. Either the controller or an upstream router can serve as the gateway
for clients. Client traffic destined for datacenter resources is forwarded by the Master IAP
through the IPSec tunnel to the default gateway in the datacenter. When an IAP registers
with the VPNC it automatically adds the VPN tunnel associated to that IAP into the VLAN
multicast table. This allows the clients connecting to the L2 Mode VLAN to be part of the
same L2 broadcast domain on the controller.
• Distributed L3 Mode - Distributed L3 mode restricts all broadcast and multicast traffic to a
branch which eliminates the cost and the complexity associated with a classic site-to-site
VPN. Each branch location is assigned a dedicated subnet. The Master IAP in the branch
manages the dedicated subnet in addition to serving as the DHCP server and default
gateway for clients. Client traffic destined for datacenter resources is routed to the
Client Branch
Forwarding Corporate
DHCP Server Default Internet Traffic Access from
Mode Traffic
Gateway Datacenter
DHCP server in
Source NAT
the datacenter, Virtual
Centralized L3 Routed performed with the Yes
VC acts as a Controller
local IP of the VC
DHCP relay
Source NAT
Virtual Virtual
Distributed L3 Routed performed with the Yes
Controller Controller
local IP of the VC
Local Mode
Local Mode with Aruba Instant is similar to the local network of a home wireless router with the
exception that it has VPN capabilities in addition to other enterprise grade features. The IAP
cluster at the branch has a local subnet (e.g., 192.168.200.0/24) and the Master IAP of the cluster
functions as the DHCP server as well as the default gateway for clients. Local Mode enables VPN
capabilities by using the inner IP address of the Instant-VPN IPsec tunnel. Client traffic destined for
corporate destinations is source NATed by the Master IAP using the inner IP address of the IPsec
tunnel. Traffic that is destined for the Internet or local destinations is source NATed using the local
IP address of the Master IAP. It is essential that the IP addresses that are defined in the VPN
address pool of the WLAN controller (which is used for inner IP addresses of IPsec tunnels) are
routable from the upstream router in the data center. If required, all client traffic can be
forwarded through the IPsec tunnel or bridged locally.
Centralized L2 Mode
Centralized L2 Mode extends the corporate VLAN and broadcast domain to remote branches. The
DHCP server and the gateway for branch clients both reside in the data center. Either the WLAN
controller or an upstream router act as the gateway for clients. Aruba recommends using an
external DHCP server for DHCP services in Centralized L2 mode rather than the DHCP server on
the WLAN controller.
Centralized L2 mode has two options for forwarding traffic:
1. All traffic including guest traffic is forwarded by the Master IAP through the IPsec tunnel to
the default gateway in the data center. This option is typically selected for organizations
that prefer to exercise more control over guest traffic by having it forwarded to the data
center
2. Alternatively, a split-tunnel can be used which forwards traffic destined for corporate
resources through an IPsec tunnel to the VPNC while internet traffic is bridged locally. This
option is effective for scenarios where control over guest traffic is less of a concern while
also alleviating overhead on the corporate network
In Centralized L2 Mode connections can be initiated from the data center to remote clients for
troubleshooting purposes. If RADIUS traffic is not source NATed at the WLAN controller, the VPN
pool for inner IP addresses must be made routable for RFC 3576-compliance and 802.1X. A
routable VPN address pool also allows access to the local WebUI of the Aruba Instant cluster from
the datacenter.
Aruba recommends using Centralized L2 Mode only if Layer 2 extension is mandatory for branches. The mode is well
suited for organizations that stream multicast videos to remote branches.
BID Allocation
When an Instant cluster in a branch comes up for the first time, one IAP is elected as the Master
IAP through the master election algorithm. The designated Master IAP in a cluster generates a
branch key by hashing its own MAC address and proceeds to distribute the key to all IAP cluster
members. The branch key plays a significant role in ensuring that a branch is allocated the same
In addition to the MAX_BID, the IAP sends the corresponding subnet name to the VPNC. The subnet
name is derived from IP address range in the configuration as well as the client count for each
mode. E.g., if an organization uses 10.10.0.0/16 with 250 clients per branch, the IP configuration
on the IAP is 10.0.0.0 - 10.10.255.255 instead of 10.10.0.0/16. The name of the L3 subnet will
appear in the CLI as “10.0.0.0 – 10.10.255.255,250”.
The subnet name keeps track of which MAX_BIDs apply apply to which distributed mode
configurations. If a branch is configured for multiple distributed modes, the IAP sends multiple
combinations of MAX_BID and corresponding subnet names to the WLAN controller. This method
allows a branch to have multiple SSIDs that use different distributed modes and different subnet
sizes. For example an organization can have an SSID_1 with distributed L3 mode and a
configuration of "10.10.0.0 /16” with 250 clients per branch and SSID_2 with distributed L3 mode
and a configuration of "10.20.0.0 /16” with 100 clients per branch. The configuration on an Aruba
IAP assumes the following definitions:
• BID: Value that specifies whether a branch is new or existing. A new branch uses a unique
value in this field to specify that it requires a BID from the MAX_BID range. If the Master IAP
of a branch that has already received a BID fails then a new IAP will be elected as the
Master. When the newly elected Master IAP connects to the WLAN controller it will use the
previously allocated BID in this field.
• Backup: Value that specifies whether the Master IAP is communicating with a backup host.
A backup host is a backup WLAN controller where the Master IAP can initiate an IPsec
connection. A backup host is similar to a backup local management switch BLMS controller
in an ArubaOS campus network. It does not represent a VRRP backup to a WLAN controller.
The BID allocation process occurs between the primary host and the Master IAP. The WLAN
controller serving as the primary host must be operational when a branch comes up for the first
Distributed L3 Mode
In Distributed L3 mode, each branch location is assigned a dedicated subnet. The Master IAP in
the branch manages the subnet, functions as the DHCP server, and acts as the default gateway for
clients. Client traffic destined for datacenter resources is routed to the WLAN controller through
an IPsec tunnel. The WLAN controller then routes the traffic to the appropriate corporate
destinations as needed.
Any traffic destined for the Internet or a local destination is source NATed using the local IP
address of the Master IAP and locally bridged. The WLAN controller in the datacenter is aware of
the Layer 3 subnet at each branch and can redistribute these routes to upstream routers through
the Open Shortest Path First (OSPF) routing protocol. All client traffic can be forwarded through
the IPsec tunnel or bridged locally if required.
Distributed L3 mode allows connections to be initiated from the data center to remote clients for
troubleshooting purposes. If RADIUS traffic is not source NATed at the WLAN controller then the
VPN pool that is used for inner IP addresses of the IPsec tunnel must be routable for RFC 3576-
compliance and 802.1X.
Split-tunnel Mode cannot be configured in Distributed Layer 3 mode as it can in Centralized Layer 2 Mode. In
Centralized Layer 2 deployments Split-tunnel Mode more frequent use case. Routing profiles can be used to achieve
similar functionality with a Distributed Layer 3 deployment
Distributed L3 mode is the recommended mode of operation for Instant-VPN networks. Centralized L2 mode should
only be used by organizations which require the extension of corporate VLANs to branch networks.
Scalability
The table 9 below outlines scalability numbers for each controller model for an IAP TUNNEL
deployment. The table assumes the following definitions:
• IAP TUNNEL Branches –The number of IAP TUNNEL branches that can be terminated on a
particular controller platform
• Route Limit – The number of L3 routes supported on a controller
• VLAN Limit – The number of VLANs supported on a controller
Employees are authenticated with 802.1x through the ClearPass server in the DC. Guests can be
presented with a captive portal from the ClearPass server as well with internet traffic bridged
locally at the branch using a separate guest VLAN. Split-tunnel DNS is configured under the
enterprise domain tab with a rule created only corporate domain name queries are tunneled to
the DC.
Centralized L2 Mode is the preferred forwarding mode for this scenario since the DHCP and DNS
servers are centralized and employee as well as guest traffic needs to be forwarded to the DC. The
ClearPass server provides 802.1X authentication so employees in the branch office can access the
network.
Guest users are provided with a captive portal through the ClearPass server in the DC. All guest
traffic is tunneled to the controller in the DMZ. Appropriate firewall policies should be applied to
restrict guests from gaining access to internal resources. The IAPs where clients are connected
tunnel the guest traffic to the controller in the DMZ. As the DNS server is also centralized an
asterisk is placed in the enterprise domain list to ensure that all DNS queries are forwarded to the
servers in the DC.