Dell Powerconnect W Iap108 109 Users Manual Instant 6.4.0.2 4.1 User Guide

2015-01-05

: Dell Dell-Powerconnect-W-Iap108-109-Users-Manual-136757 dell-powerconnect-w-iap108-109-users-manual-136757 dell pdf

Open the PDF directly: View PDF PDF.
Page Count: 377

DownloadDell Dell-Powerconnect-W-Iap108-109-Users-Manual- Instant 6.4.0.2-4.1 User Guide  Dell-powerconnect-w-iap108-109-users-manual
Open PDF In BrowserView PDF
User Guide

Dell Networking W-Series
Instant 6.4.0.2-4.1

Copyright
© 2014 Aruba Networks, Inc. Aruba Networks trademarks include
, Aruba Networks®, Aruba
Wireless Networks®, the registered Aruba the Mobile Edge Company logo, and Aruba Mobility Management
System®. Dell™, the DELL™ logo, and PowerConnect™ are trademarks of Dell Inc.
All rights reserved. Specifications in this manual are subject to change without notice.
Originated in the USA. All other trademarks are the property of their respective owners.
Open Source Code
Certain Aruba products include Open Source software code developed by third parties, including software code
subject to the GNU General Public License (GPL), GNU Lesser General Public License (LGPL), or other Open
Source Licenses. Includes software from Litech Systems Design. The IF-MAP client library copyright 2011 Infoblox,
Inc. All rights reserved. This product includes software developed by Lars Fenneberg, et al. The Open Source code
used can be found at this site:
http://www.arubanetworks.com/open_source
Legal Notice
The use of Aruba Networks, Inc. switching platforms and software, by all individuals or corporations, to terminate
other vendors’ VPN client devices constitutes complete acceptance of liability by that individual or corporation for
this action and indemnifies, in full, Aruba Networks, Inc. from any and all legal actions that might be taken against it
with respect to infringement of copyright on behalf of those vendors.

0511581-01 | June 2014

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Contents

Contents

3

About this Guide

28

Intended Audience

28

Related Documents

28

Conventions

28

Contacting Dell

29

About Instant
Instant Overview

30
30

Supported Devices

30

Instant UI

31

Instant CLI

31

What is New in Instant 6.4.0.2-4.1

Setting up a W-IAP

33

35

Setting up Instant Network

35

Connecting a W-IAP

35

Assigning an IP address to the W-IAP

35

Assigning a Static IP
Connecting to a Provisioning Wi-Fi Network

36
36

W-IAP Cluster

36

Disabling the Provisioning Wi-Fi Network

37

Logging in to the Instant UI

37

Regulatory Domains

38

Country Code
Specifying Country Code
Accessing the Instant CLI

38
41
41

Connecting to a CLI Session

42

Applying Configuration Changes

42

Using Sequence Sensitive Commands

43

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Contents | 3

Instant User Interface
Login Screen

44

Logging into the Instant UI

44

Viewing Connectivity Summary

44

Language

44

Main Window

45

Banner

45

Search

45

Tabs

45

Networks Tab

46

Access Points Tab

46

Clients Tab

47

Links

4 | Contents

44

47

New Version Available

47

System

48

RF

49

Security

50

Maintenance

51

More

52

VPN

52

IDS

53

Wired

54

Services

54

DHCP Server

55

Support

56

Help

57

Logout

57

Monitoring

57

Info

57

RF Dashboard

59

RF Trends

60

Usage Trends

61

Mobility Trail

66

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Client Match

66

AppRF

67

Spectrum

67

Alerts

67

IDS

71

AirGroup

72

Configuration

72

W-AirWave Setup

73

Pause/Resume

73

Views

Initial Configuration Tasks
Basic Configuration Tasks
Modifying the W-IAP Name

73

74
74
74

In the Instant UI

75

In the CLI

75

Updating Location Details of a W-IAP

75

In the Instant UI

75

In the CLI

75

Configuring a Preferred Band

75

In the Instant UI

75

In the CLI

75

Configuring Virtual Controller IP Address

76

In the Instant UI

76

In the CLI

76

Configuring Timezone

76

In the Instant UI

76

In the CLI

76

Configuring an NTP Server

76

In the Instant UI

77

In the CLI

77

Enabling AppRF Visibility

77

Changing Password

77

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Contents | 5

In the Instant UI

77

In the CLI

77

Additional Configuration Tasks
Configuring Virtual Controller VLAN

78

In the Instant UI

79

In the CLI

79

Configuring Auto Join Mode
Enabling or Disabling Auto Join Mode

79
79

In the Instant UI

79

In the CLI

79

Configuring Terminal Access

80

In the Instant UI

80

In the CLI

80

Configuring Console Access

80

In the Instant UI

80

In the CLI

80

Configuring LED Display

81

In the Instant UI

81

In the CLI

81

Configuring Additional WLAN SSIDs
Enabling the Extended SSID

81
81

In the Instant UI

81

In the CLI

82

Preventing Inter-user Bridging

82

In the Instant UI

82

In the CLI

82

Preventing Local Routing between Clients

82

In the Instant UI

82

In the CLI

83

Enabling Dynamic CPU Management

6 | Contents

78

83

In the Instant UI

83

In the CLI

83

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Customizing W-IAP Settings

84

Modifying the W-IAP Hostname

84

In the Instant UI

84

In the CLI

84

Configuring Zone Settings on a W-IAP

84

In the Instant UI

85

In the CLI

85

Specifying a Method for Obtaining IP Address

85

In the Instant UI

85

In the CLI

86

Configuring External Antenna

86

EIRP and Antenna Gain

86

Example
Configuring Antenna Gain

86
86

In the Instant UI

86

In the CLI

87

Configuring Radio Profiles for a W-IAP

87

Configuring ARM Assigned Radio Profiles for a W-IAP

87

Configuring Radio Profiles Manually for W-IAP

87

In the CLI

88

Configuring Uplink VLAN for a W-IAP

88

In the Instant UI

88

In the CLI

89

Master Election and Virtual Controller
Master Election Protocol

89
89

Preference to a W-IAP with 3G/4G Card

89

Preference to a W-IAP with Non-Default IP

90

Viewing Master Election Details

90

Manual Provisioning of Master W-IAP

90

Provisioning a W-IAP as a Master W-IAP

90

In the Instant UI

90

In the CLI

90

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Contents | 7

Adding a W-IAP to the Network

91

Removing a W-IAP from the Network

91

VLAN Configuration

92

VLAN Pooling

92

Uplink VLAN Monitoring and Detection on Upstream Devices

92

Wireless Network Profiles

93

Configuring Wireless Network Profiles

93

Network Types

93

Configuring WLAN Settings for an SSID Profile

93

In the Instant UI

94

In the CLI

96

Configuring VLAN Settings for a WLAN SSID Profile

97

In the Instant UI

97

In the CLI

98

Configuring Security Settings for a WLAN SSID Profile

99

Configuring Security Settings for an Employee or Voice Network
In the Instant UI
In the CLI

Configuring Access Rules for a WLAN SSID Profile

99
103

104

In the Instant UI

105

In the CLI

105

Example

106

Configuring Fast Roaming for Wireless Clients
Opportunistic Key Caching
Configuring a W-IAP for OKC Roaming
In the Instant UI

In the CLI
Fast BSS Transition (802.11r Roaming)
Configuring a W-IAP for 802.11r support

106
106
107
107

107
107
108

In the Instant UI

108

In the CLI

108

Example

108

Radio Resource Management (802.11k)
8 | Contents

99

108
Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Beacon Report Requests and Probe Responses

109

Configuring a WLAN SSID for 802.11k Support

109

In the Instant UI

109

In the CLI

109

Example

109

BSS Transition Management (802.11v)
Configuring a WLAN SSID for 802.11v Support

109
110

In the Instant UI

110

In the CLI

110

Example

110

Editing Status of a WLAN SSID Profile

110

In the Instant UI

110

In the CLI

110

Editing a WLAN SSID Profile

110

Deleting a WLAN SSID Profile

111

Wired Profiles
Configuring a Wired Profile
Configuring Wired Settings

112
112
112

In the Instant UI

112

In the CLI

113

Configuring VLAN for a Wired Profile

114

In the Instant UI

114

In the CLI

114

Configuring Security Settings for a Wired Profile
Configuring Security Settings for a Wired Employee Network

115
115

In the Instant UI

115

In the CLI

115

Configuring Access Rules for a Wired Profile

116

In the Instant UI

116

In the CLI

116

Assigning a Profile to Ethernet Ports

117

In the Instant UI

117

In the CLI

117

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Contents | 9

Editing a Wired Profile

117

Deleting a Wired Profile

118

Link Aggregation Control Protocol for W-IAP220 Series

118

Understanding Hierarchical Deployment

119

Captive Portal for Guest Access

120

Understanding Captive Portal

120

Types of Captive Portal

120

Walled Garden

121

Configuring a WLAN SSID for Guest Access

121

In the Instant UI

121

In the CLI

124

Configuring Wired Profile for Guest Access

125

In the Instant UI

125

In the CLI

126

Configuring Internal Captive Portal for Guest Network

126

In the Instant UI

127

In the CLI

128

Configuring External Captive Portal for a Guest Network

129

External Captive Portal Profiles

129

Creating a Captive Portal Profile

129

In the Instant UI

129

In the CLI

130

Configuring an SSID or Wired Profile to Use External Captive Portal Authentication
In the Instant UI

131

In the CLI

132

Configuring External Captive Portal Authentication Using ClearPass Guest

132

Creating a Web Login page in ClearPass Guest

133

Configuring RADIUS Server in Instant UI

133

Configuring Guest Logon Role and Access Rules for Guest Users

10 | Contents

131

133

In the Instant UI

133

In the CLI

134

Example

135

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Configuring Captive Portal Roles for an SSID

135

In the Instant UI

135

In the CLI

137

Configuring Walled Garden Access

138

In the Instant UI

138

In the CLI

138

Disabling Captive Portal Authentication

138

Authentication and User Management

140

Managing W-IAP Users
Configuring Authentication Parameters for Management Users
Configuring a TACACS+ Server Profile for Management User Authentication

140
141
141

In the Instant UI

141

In the CLI

142

Configuring Administrator Credentials for the Virtual Controller Interface

142

In the Instant UI

142

In the CLI

143

Configuring Guest Management Interface Administrator Credentials

144

In the Instant UI

144

In the CLI

144

Configuring Users for Internal Database of a W-IAP

144

In the Instant UI

144

In the CLI

145

Configuring the Read-Only Administrator Credentials

146

In the Instant UI

146

In the CLI

146

Adding Guest Users through the Guest Management Interface
Understanding Authentication Methods

146
147

802.1X authentication

147

MAC authentication

147

MAC authentication with 802.1X authentication

147

Captive Portal Authentication

148

MAC authentication with Captive Portal authentication

148

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Contents | 11

802.1X authentication with Captive Portal Role

148

WISPr authentication

148

Supported EAP Authentication Frameworks

148

Authentication Termination on W-IAP

149

Supported Authentication Servers

149

Internal RADIUS Server

150

External RADIUS Server

150

RADIUS Server Authentication with VSA

150

Dynamic Load Balancing between Two Authentication Servers
Understanding Encryption Types

154

WPA and WPA2

154

Recommended Authentication and Encryption Combinations

155

Support for Authentication Survivability

155

Configuring Authentication Survivability

156

In the Instant UI

156

Important Points to Remember

156

In the CLI

156

Configuring Authentication Servers

157

Configuring an External Server for Authentication

157

In the Instant UI

157

In the CLI

160

Configuring Dynamic RADIUS Proxy Parameters

161

Enabling Dynamic RADIUS Proxy

161

In the Instant UI

161

In the CLI

162

Configuring Dynamic RADIUS Proxy Parameters for Authentication Servers

162

In the Instant UI

162

In the CLI

162

Associate the Authentication Servers with an SSID or Wired Profile
In the CLI

163

Configuring 802.1X Authentication for a Wireless Network Profile
In the Instant UI

162
163

Configuring 802.1X Authentication for a Network Profile

12 | Contents

154

164
164

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

In the CLI
Configuring 802.1X Authentication for Wired Profiles

164
164

In the Instant UI

165

In the CLI

165

Configuring MAC Authentication for a Network Profile
Configuring MAC Authentication for Wireless Network Profiles

165
165

In the Instant UI

165

In the CLI

166

Configuring MAC Authentication for Wired Profiles

166

In the Instant UI

166

In the CLI

167

Configuring MAC Authentication with 802.1X Authentication
Configuring MAC and 802.1X Authentication for a Wireless Network Profile

167
167

In the Instant UI

167

In the CLI

168

Configuring MAC and 802.1X Authentication for Wired Profiles

168

In the Instant UI

168

In the CLI

168

Configuring MAC Authentication with Captive Portal Authentication
Configuring MAC Authentication with Captive Portal Authentication

169
169

In the Instant UI

169

In the CLI

169

Configuring WISPr Authentication

170

In the Instant UI

170

In the CLI

170

Blacklisting Clients

171

Blacklisting Clients Manually

171

Adding a Client to the Blacklist

171

In the Instant UI

171

In the CLI

171

Blacklisting Users Dynamically
Authentication Failure Blacklisting

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

172
172

Contents | 13

Session Firewall Based Blacklisting

172

Configuring Blacklist Duration

172

In the Instant UI

172

In the CLI

172

Uploading Certificates

173

Loading Certificates through Instant UI

173

Loading Certificates through Instant CLI

174

Loading Certificates through W-AirWave

174

Roles and Policies

176

Firewall Policies

176

Access Control List Rules

176

Configuring Access Rules for Network Services

177

In the Instant UI

177

In the CLI

178

Example

178

Configuring Network Address Translation Rules

179

Configuring a Source NAT Access Rule

179

In the Instant UI

179

In the CLI

179

Configuring Source-Based Routing

180

Configuring a Destination NAT Access Rule

180

In the Instant UI

180

In the CLI

180

Configuring ALG Protocols

181

In the Instant UI

181

In the CLI

181

Configuring Firewall Settings for Protection from ARP Attacks
In the Instant UI

182

In the CLI

182

Managing Inbound Traffic
Configuring Inbound Firewall Rules

14 | Contents

181

183
183

In the Instant UI

183

In the CLI

185

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Example

Configuring Management Subnets

185

185

In the Instant UI

185

In the CLI

186

Configuring Restricted Access to Corporate Network

186

In the Instant UI

186

In the CLI

186

Content Filtering
Enabling Content Filtering
Enabling Content Filtering for a Wireless Profile

186
187
187

In the Instant UI

187

In the CLI

187

Enabling Content Filtering for a Wired Profile

187

In the Instant UI

187

In the CLI

188

Configuring Enterprise Domains

188

In the Instant UI

188

In the CLI

188

Configuring URL Filtering Policies

188

In the Instant UI

188

In the CLI

189

Example

189

Configuring User Roles

190

Creating a User Role

190

In the Instant UI

190

In the CLI

190

Assigning Bandwidth Contracts to User Roles

190

In the Instant UI

191

In the CLI:

191

Configuring Machine and User Authentication Roles

191

In the Instant UI

191

In the CLI

192

Configuring Derivation Rules

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

192

Contents | 15

Understanding Role Assignment Rule

192

RADIUS VSA Attributes

192

MAC-Address Attribute

192

Roles Based on Client Authentication

193

DHCP Option and DHCP Fingerprinting

193

Creating a Role Derivation Rule

193

In the Instant UI

193

In the CLI

194

Example

194

Understanding VLAN Assignment

194

Vendor Specific Attributes

195

VLAN Assignment Based on Derivation Rules

196

User Role

196

VLANs Created for an SSID

196

Configuring VLAN Derivation Rules

196

In the Instant UI

196

In the CLI

197

Example

198

Using Advanced Expressions in Role and VLAN Derivation Rules
Configuring a User Role for VLAN Derivation
Creating a User VLAN Role

199
199

In the Instant UI

199

In the CLI

199

Assigning User VLAN Roles to a Network Profile

200

In the Instant UI

200

In the CLI

200

DHCP Configuration
Configuring DHCP Scopes
Configuring Distributed DHCP Scopes

201
201
201

In the Instant UI

201

In the CLI

203

Configuring a Centralized DHCP Scope
In the Instant UI
16 | Contents

198

204
204
Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

In the CLI
Configuring Local and Local,L3 DHCP Scopes

205
206

In the Instant UI

206

In the CLI

207

Configuring the Default DHCP Scope for Client IP Assignment

208

In the Instant UI

208

In the CLI

209

VPN Configuration

210

Understanding VPN Features

210

Configuring a Tunnel from a W-IAP to Dell Networking W-Series Mobility Controller

210

Configuring an IPSec Tunnel

210

In the Instant UI

210

In the CLI

211

Example

212

Enabling Automatic Configuration of GRE Tunnel

212

In the Instant UI

212

In the CLI

214

Manually Configuring a GRE Tunnel

214

In the Instant UI

214

In the CLI

215

Configuring an L2TPv3 Tunnel

215

In the Instant UI

216

In the CLI

218

Example

218

Configuring Routing Profiles

221

In the Instant UI

221

In the CLI

222

IAP-VPN Deployment
Understanding IAP-VPN Architecture

223
223

IAP-VPN Scalability Limits

223

IAP-VPN Forwarding Modes

224

Local or NAT Mode

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

224

Contents | 17

L2 Switching Mode

224

Distributed L2 Mode

224

Centralized L2 Mode

224

L3 Routing Mode
Distributed L3 mode

225

Centralized L3 Mode

225

Configuring W-IAP and Controller for IAP-VPN Operations

225

Configuring a W-IAP network for IAP-VPN operations

225

Defining the VPN host settings

225

Configuring Routing Profiles

226

Configuring DHCP Profiles

226

Configuring an SSID or Wired Port

226

Enabling Dynamic RADIUS Proxy

227

Configuring Enterprise Domains

227

Configuring a Controller for IAP-VPN Operations

227

OSPF Configuration

227

VPN Configuration

229

Whitelist Database Configuration

229

VPN Local Pool Configuration

230

Role Assignment for the Authenticated W-IAPs

230

VPN Profile Configuration

230

Branch-ID Allocation

230

Branch Status Verification

230

Example

Adaptive Radio Management
ARM Overview

230

232
232

Channel or Power Assignment

232

Voice Aware Scanning

232

Load Aware Scanning

232

Monitoring the Network with ARM

232

ARM Metrics

232

Configuring ARM Features on a W-IAP
Band Steering
18 | Contents

225

233
233
Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

In the Instant UI

233

In the CLI

233

Airtime Fairness Mode

233

In the Instant UI

234

In the CLI

234

Client Match

234

In the Instant UI

235

In the CLI

236

Access Point Control

236

In the Instant UI

236

In the CLI

237

Verifying ARM Configuration
Configuring Radio Settings for a W-IAP
In the Instant UI
In the CLI

Deep Packet Inspection and Application Visibility

237
238
238
239

241

Deep Packet Inspection

241

Enabling Application Visibility

241

In the Instant UI

241

In the CLI

241

Application Visibility

242

Application Category Charts

242

Application Charts

243

Web Categories Charts

245

Web Reputation Charts

245

Configuring Access Rules for Application and Application Categories

246

In the Instant UI

246

In the CLI

248

Example

249

Configuring Web Policy Enforcement

249

In the Instant UI

249

In the CLI

250

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Contents | 19

Example

250

Voice and Video

251

Wi-Fi Multimedia Traffic Management

251

Configuring WMM for Wireless Clients

251

In the Instant UI

252

In the CLI

252

Configuring WMM-DSCP Mapping

252

In the Instant UI

253

In the CLI

253

QoS for Microsoft Office OCS and Apple Facetime

253

Microsoft OCS

253

Apple Facetime

253

Services

255

AirGroup Configuration

255

Multicast DNS and Bonjour® Services

256

DLNA UPnP Support

257

AirGroup Features

258

AirGroup Services

259

AirGroup Components

260

CPPM and ClearPass Guest Features

260

Configuring AirGroup and AirGroup Services on a W-IAP

261

In the Instant UI

261

In the CLI

262

Configuring AirGroup and CPPM interface in Instant

263

Creating a RADIUS Server

263

Assign a Server to AirGroup

263

Configure CPPM to Enforce Registration

263

Change of Authorization (CoA)

263

Configuring a W-IAP for RTLS Support

263

In the Instant UI

263

In the CLI

264

Configuring a W-IAP for Analytics and Location Engine Support

20 | Contents

265

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

ALE with Instant

265

Enabling ALE Support on a W-IAP

265

In the Instant UI

265

In the CLI

266

Verifying ALE Configuration on a W-IAP

266

Configuring OpenDNS Credentials

266

In the Instant UI

266

In the CLI

267

Integrating a W-IAP with Palo Alto Networks Firewall

267

Integration with Instant

267

Configuring a W-IAP for PAN integration

267

In the Instant UI

267

In the CLI

268

Integrating a W-IAP with an XML API interface

268

Integration with Instant

269

Configuring a W-IAP for XML API integration

269

In the Instant UI

269

In the CLI

269

CALEA Integration and Lawful Intercept Compliance
CALEA Server Integration

270
270

Traffic Flow from IAP to CALEA Server

270

Traffic Flow from IAP to CALEA Server through VPN

271

Client Traffic Replication

271

Configuring a W-IAP for CALEA Integration

271

Creating a CALEA Profile

272

In the Instant UI

272

In the CLI

272

Creating an Access Rule for CALEA

272

In the Instant UI

272

In the CLI

273

Verifying the configuration

273

Example

273

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Contents | 21

W-IAP Management and Monitoring

275

Managing a W-IAP from W-AirWave
Image Management

275

W-IAP and Client Monitoring

275

Template-based Configuration

275

Trending Reports

276

Intrusion Detection System

276

Wireless Intrusion Detection System (WIDS) Event Reporting to W-AirWave

276

RF Visualization Support for Instant

276

PSK-based and Certificate-based Authentication

277

Configurable Port for W-IAP and W-AirWave Management Server Communication

277

Configuring Organization String

277

Shared Key

278

Configuring W-AirWave Information

278

In the Instant UI

278

In the CLI

278

Configuring for W-AirWave Discovery through DHCP

279

Standard DHCP option 60 and 43 on Windows Server 2008

279

Alternate Method for Defining Vendor-Specific DHCP Options

283

Uplink Configuration
Uplink Interfaces
Ethernet Uplink
Configuring PPPoE Uplink Profile

285
285
285
286

In the Instant UI

286

In the CLI

287

Cellular Uplink
Configuring Cellular Uplink Profiles

287
290

In the Instant UI

290

In the CLI

290

Wi-Fi Uplink

291

Configuring a Wi-Fi Uplink Profile
Uplink Preferences and Switching

22 | Contents

275

291
292

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Enforcing Uplinks

292

In the Instant UI

292

In the CLI

293

Setting an Uplink Priority

293

In the Instant UI

293

In the CLI

293

Enabling Uplink Preemption

293

In the Instant UI

293

In the CLI

293

Switching Uplinks Based on VPN and Internet Availability

294

Switching Uplinks Based on VPN Status

294

Switching Uplinks Based on Internet Availability

294

In the Instant UI

294

In the CLI

295

Viewing Uplink Status and Configuration

Intrusion Detection

295

296

Detecting and Classifying Rogue APs

296

OS Fingerprinting

296

Configuring Wireless Intrusion Protection and Detection Levels

297

Containment Methods

301

Configuring IDS Using CLI

301

Mesh W-IAP Configuration
Mesh Network Overview
Mesh W-IAPs

303
303
303

Mesh Portals

303

Mesh Points

304

Setting up Instant Mesh Network

304

Configuring Wired Bridging on Ethernet 0 for Mesh Point

304

In the Instant UI

305

In the CLI

305

Mobility and Client Management

306

Layer-3 Mobility Overview

306

Configuring L3-Mobility

307

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Contents | 23

Home Agent Load Balancing

307

Configuring a Mobility Domain for Instant

307

In the Instant UI

307

In the CLI

308

Spectrum Monitor

309

Understanding Spectrum Data
Device List

309

Non Wi-Fi Interferers

310

Channel Details

312

Channel Metrics

313

Spectrum Alerts

314

Configuring Spectrum Monitors and Hybrid W-IAPs
Converting a W-IAP to a Hybrid W-IAP

314
314

In the Instant UI

315

In the CLI

315

Converting a W-IAP to a Spectrum Monitor

315

In the Instant UI

315

In the CLI

315

W-IAP Maintenance
Upgrading a W-IAP
Upgrading a W-IAP and Image Server

317
317
317

Image Management Using W-AirWave

317

Image Management Using Cloud Server

317

Configuring HTTP Proxy on a W-IAP

317

In the Instant UI

317

In the CLI

318

Upgrading a W-IAP Using Automatic Image Check
Upgrading to a New Version Manually
Upgrading an Image Using CLI
Backing up and Restoring W-IAP Configuration Data

24 | Contents

309

318
319
319
319

Viewing Current Configuration

319

Backing up Configuration Data

320

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Restoring Configuration
Converting a W-IAP to a Remote AP and Campus AP

320
320

Regulatory Domain Restrictions for W-IAP to RAP or CAP Conversion

320

Converting a W-IAP to a Remote AP

322

Converting a W-IAP to a Campus AP

323

Converting a W-IAP to Standalone Mode

324

Converting a W-IAP using CLI

325

Resetting a Remote AP or Campus AP to a W-IAP

325

Rebooting the W-IAP

325

Monitoring Devices and Logs
Configuring SNMP

327
327

SNMP Parameters for W-IAP

327

Configuring SNMP

328

Creating community strings for SNMPv1 and SNMPv2 Using Instant UI

328

Creating community strings for SNMPv3 Using Instant UI

328

Configuring SNMP Community Strings in the CLI

329

Configuring SNMP Traps

330

In the Instant UI

330

In the CLI

330

Configuring a Syslog Server

330

In the Instant UI

330

In the CLI

332

Configuring TFTP Dump Server

332

In the Instant UI

332

In the CLI

332

Running Debug Commands from the UI
Support Commands

Hotspot Profiles
Understanding Hotspot Profiles

333
333

338
338

Generic Advertisement Service (GAS)

338

Access Network Query Protocol (ANQP)

339

Hotspot 2.0 Query Protocol (H2QP)

339

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Contents | 25

Information Elements (IEs) and Management Frames

339

NAI Realm List

339

Configuring Hotspot Profiles

339

Creating Advertisement Profiles for Hotspot Configuration

340

Configuring an NAI Realm Profile

340

Configuring a Venue Name Profile

342

Configuring a Network Authentication Profile

343

Configuring a Roaming Consortium Profile

344

Configuring a 3GPP Profile

344

Configuring an IP Address Availability Profile

344

Configuring a Domain Profile

344

Configuring an Operator-friendly Profile

345

Configuring a Connection Capability Profile

345

Configuring an Operating Class Profile

345

Configuring a WAN Metrics Profile

345

Creating a Hotspot Profile

346

Associating an Advertisement Profile to a Hotspot Profile

348

Creating a WLAN SSID and Associating Hotspot Profile

349

Sample Configuration

349

ClearPass Guest Setup

352

Testing

355

Troubleshooting

355

IAP-VPN Deployment Scenarios

356

Scenario 1 - IPSec: Single Datacenter Deployment with No Redundancy
Topology

357

AP Configuration

357

AP Connected Switch Configuration

359

Datacenter Configuration

359

Scenario 2 - IPSec: Single Datacenter with Multiple Controllers for Redundancy

26 | Contents

357

360

Topology

360

AP Configuration

361

AP Connected Switch Configuration

363
Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Datacenter Configuration

363

Scenario 3 - IPSec: Multiple Datacenter Deployment with Primary and Backup Controllers for Redundancy 364
Topology

364

AP Configuration

365

AP Connected Switch Configuration

368

Datacenter Configuration

368

Scenario 4 - GRE: Single Datacenter Deployment with No Redundancy

369

Topology

369

AP Configuration

369

AP Connected Switch Configuration

371

Datacenter Configuration

371

Terminology

373

Acronyms and Abbreviations

373

Glossary

374

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Contents | 27

Chapter 1
About this Guide

This User Guide describes the features supported by Dell Networking W-Series Instant Access Point (W-IAP) and
provides detailed instructions for setting up and configuring the Instant network.

Intended Audience
This guide is intended for customers who configure and use W-IAPs.

Related Documents
In addition to this document, the Dell W-IAP product documentation includes the following:
l

Dell Networking W-Series Instant Access Point Installation Guides

l

Dell Networking W-Series Instant 6.4.0.2-4.1 Quick Start Guide

l

Dell Networking W-Series Instant 6.4.0.2-4.1 CLI Reference Guide

l

Dell Networking W-Series Instant 6.4.0.2-4.1 MIB Reference Guide

l

Dell Networking W-Series Instant 6.4.0.2-4.1 Syslog Messages Reference Guide

l

Dell Networking W-Series Instant 6.4.0.2-4.1 Release Notes

Conventions
The following conventions are used throughout this manual to emphasize important concepts:
Table 1: Typographical Conventions
Type Style

Description

Italics

This style is used to emphasize important terms and to mark the titles of books.

System items

This fixed-width font depicts the following:
Sample screen output
l System prompts
l Filenames, software devices, and specific commands when mentioned in the text.
l

Commands

In the command examples, this style depicts the keywords that must be typed exactly as
shown.



In the command examples, italicized text within angle brackets represents items that you
should replace with information appropriate to your specific situation. For example:
# send 
In this example, you would type “send” at the system prompt exactly as shown, followed by
the text of the message you wish to send. Do not type the angle brackets.

[Optional]

Command examples enclosed in brackets are optional. Do not type the brackets.

{Item A |
Item B}

In the command examples, items within curled braces and separated by a vertical bar
represent the available choices. Enter only one choice. Do not type the braces or bars.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

About this Guide | 28

The following informational icons are used throughout this guide:
Indicates helpful suggestions, pertinent information, and important things to remember.

Indicates a risk of damage to your hardware or loss of data.

Indicates a risk of personal injury or death.

Contacting Dell
Table 2: Support Information
Support
Main Website

dell.com

Contact Information

dell.com/contactdell

Support Website

dell.com/support

Documentation Website

dell.com/support/manuals

29 | About this Guide

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Chapter 2
About Instant

This chapter provides the following information:
l

Instant Overview

l

What is New in Instant 6.4.0.2-4.1

Instant Overview
Instant virtualizes Dell Networking W-Series Mobility Controller capabilities on 802.11 access points (APs), creating
a feature-rich enterprise-grade wireless LAN (WLAN) that combines affordability and configuration simplicity.
Instant is a simple, easy to deploy turn-key WLAN solution consisting of one or more APs. An Ethernet port with
routable connectivity to the Internet or a self-enclosed network is used for deploying an Instant Wireless Network. A
Dell Networking W-Series Instant Access Point (W-IAP) can be installed at a single site or deployed across multiple
geographically-dispersed locations. Designed specifically for easy deployment, and proactive management of
networks, Instant is ideal for small customers or remote locations without any on-site IT administrator.
Instant consists of a W-IAP and a Virtual Controller. The Virtual Controller resides within one of the APs. In a Instant
deployment scenario, only the first W-IAP needs to be configured. After the first W-IAP is configured, the other WIAPs inherit all the required configuration information from the Virtual Controller. Instant continually monitors the
network to determine the W-IAP that should function as the Virtual Controller at any time, and the Virtual Controller
will move from one W-IAP to another as necessary without impacting network performance.

Supported Devices
The following devices are supported in Instant 6.4.0.2-4.1:
l

W-IAP103

l

W-IAP104/ 105

l

W-IAP114/115

l

W-IAP134/135

l

IAP-175P/175AC

l

W-IAP3WN/3WNP

l

W-IAP108/109

l

W-IAP155/155P

l

W-IAP224/225

l

W-IAP274/275

As of Instant 4.1 release, it is recommended that networks with more than 128 APs should be designed as multiple,
smaller virtual-controller networks with Layer-3 mobility enabled between them.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

About Instant | 30

The following table provides the variants supported for each IAP model:
Table 3: Supported W-IAP Variants

W-IAP Model (Reg
Domain)

W-IAP-###-US
(US only)

W-IAP-###

W-IAP-###-RW
W-IAP-###-JP
(Japan only)

(Worldwide
except US)

(Worldwide
except US and
Japan)

W-IAP103

Yes

No

Yes

No

W-IAP104/ 105

Yes

Yes

No

Yes

W-IAP114/115

Yes

No

Yes

No

W-IAP134/135

Yes

Yes

No

Yes

IAP-175P/175AC

Yes

Yes

No

Yes

W-IAP3WN/3WNP

Yes

Yes

No

Yes

W-IAP108/109

Yes

Yes

No

Yes

W-IAP155/155P

Yes

Yes

No

Yes

W-IAP224/225

Yes

No

Yes

No

W-IAP274/275

Yes

No

Yes

No

For information on regulatory domains and the list of countries supported by the W-IAP-RW type, see Country Code
on page 38.

Instant UI
The Instant User Interface (UI) provides a standard Web-based interface that allows you to configure and monitor a
Wi-Fi network. Instant is accessible through a standard Web browser from a remote management console or
workstation and can be launched using the following browsers:
l

Microsoft Internet Explorer 10 or lower

l

Apple Safari 6.0 or later

l

Google Chrome 23.0.1271.95 or later

l

Mozilla Firefox 17.0 or later

If the Instant UI is launched through an unsupported browser, a warning message is displayed along with a list of
recommended browsers. However, the users are allowed to login using the Continue login link on the Login page.
To view the Instant UI, ensure that the JavaScript is enabled on the Web browser.
The Instant UI logs out automatically if the window is inactive for 15 minutes.

Instant CLI
The Instant Command Line Interface (CLI) is a text-based interface accessible through a Secure Shell (SSH)
session.

31 | About Instant

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

SSH access requires that you configure an IP address and a default gateway on the W-IAP and connect the W-IAP
to your network. This is typically performed when the Instant network on a W-IAP is set up.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

About Instant | 32

What is New in Instant 6.4.0.2-4.1
The following features are added in the Instant 6.4.0.2-4.1 release:
Table 4: New Features in 6.4.0.2-4.1
Feature

Description

Support for AppRF

In this release, Instant supports AppRF comprising of two feature sets: On-board Deep
Packet Inspection (DPI) and Web Policy Enforcement (WPE). As part of the AppRF
feature support, Instant supports the following :
l
l

Support for new 4G
modems

Access control based on application and application categories
Access control based on web categories and security ratings assigned to the
websites

Instant now supports the following 4G modems:
Netgear Aircard 341u
l Pantech UML295
l Franklin Wireless u770
l Huawei 3276s-150
l

AirGroup Enhancements

Instant supports Universal Plug and Play (UPnP) and DLNA (Digital Living Network
Alliance) enabled devices. DLNA is a network standard derived from UPnP, which
enables devices to discover the services available in a network.

DSCP Mapping for WMM
Access Categories

Instant supports customization of Wi-Fi Multimedia to DSCP mapping configuration for
upstream and downstream traffic.

Fast roaming
enhancements

Instant supports 802.11k (Radio Resource Management) and 802.11v (BSS Transition
Management) standards to improve Quality of Service (QoS) and seamless connectivity.

Authentication
survivability with EAPTLS

Instant supports the authentication survivability feature with the EAP-TLS authentication
protocol. The authentication survivability feature supports a survivable authentication
framework against the remote link failure when working with the external authentication
servers.

Support for AP zone
configuration

You can configure zone settings on a W-IAP and an SSID, so that the SSID is created on
s specific W-IAP in the cluster.

Configurable port for
communication between
W-IAP and W-AirWave
management server
communication

You can customize the port number of the W-AirWave management server through the
server_host:server_port format, for example, amp.aruba.com:4343.

Client match
visualization

The Instant UI provides a graphical representation of the client distribution on an AP, the
RSSI details, and the channel availability and utilization metrics.

Console access to W-IAP

In this release, you can allow or restrict access to a W-IAP console through the serial port.
By default, the console access to an IAP is enabled.

Backup RADIUS server
with EAP termination

Instant supports the configuration of the primary and backup RADIUS servers in an
enterprise WLAN SSID that has EAP termination enabled.

Support for
TACACS+ Server

In this release, a new external server type called TACACS+ Server is added to support
authentication and accounting privileges for management users.

33 | About Instant

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 4: New Features in 6.4.0.2-4.1
Feature

Description

XML API Integration

The Instant UI allows users to integrate an XML API Interface with a W-IAP. The users can
use the XML API interface to add, delete, authenticate, or query a user or a client.

Support for inbound
firewall rules
configuration

You can configure firewall rules based on the source subnet for the inbound traffic
coming through the uplink ports of a W-IAP.

Full tunnel support

For Centralized-L2 mode SSID, you can disable split-tunnel to tunnel all packets on the
SSID through the VPN tunnel. This overrides any global routing profiles and sends all
traffic from the client including DNS packets into the VPN tunnel.

Table 5: New Hardware Platforms introduced in this release
W-IAP
Platform

Description

W-IAP270
Series

The W-IAP270 Series (W-IAP274 and W-IAP275) are environmentally hardened, outdoor rated,
dual-radio IEEE 802.11ac wireless access points. These access points use MIMO (Multiple-in,
Multiple-out) technology and other high-throughput mode techniques to deliver high-performance,
802.11ac 2.4 GHz and 5 GHz functionality while simultaneously supporting existing 802.11a/b/g/n
wireless services. For more information about this product, visit dell.com.

W-IAP103

The W-IAP103 wireless access point supports the IEEE 802.11n standard for high-performance
WLAN. This access point uses MIMO (Multiple-in, Multiple-out) technology and other highthroughput mode techniques to deliver high performance, 802.11n 2.4 GHz or 5 GHz functionality
while simultaneously supporting existing 802.11a/b/g wireless services. For more information about
this product, visit dell.com.

Check with your local Dell sales representative on device availability for your region.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

About Instant | 34

Chapter 3
Setting up a W-IAP

This chapter describes the following procedures:
l

Setting up Instant Network on page 35

l

Logging in to the Instant UI on page 37

l

Accessing the Instant CLI on page 41

Setting up Instant Network
Before installing a W-IAP:
l

Ensure that you have an Ethernet cable of the required length to connect a W-IAP to the home router.

l

Ensure that you have one of the following power sources:
n

IEEE 802.3af/at-compliant Power over Ethernet (PoE) source. The PoE source can be any power source
equipment (PSE) switch or a midspan PSE device.

n

W-IAP power adapter kit.

Perform the following procedures to set up the Instant network:
1. Connecting a W-IAP on page 35
2. Assigning an IP address to the W-IAP on page 35
3. Connecting to a Provisioning Wi-Fi Network on page 36

Connecting a W-IAP
Based on the type of the power source used, perform one of the following steps to connect a W-IAP to the power
source:
l

PoE switch— Connect the ENET 0 port of the W-IAP to the appropriate port on the PoE switch.

l

PoE midspan— Connect the ENET 0 port of the W-IAP to the appropriate port on the PoE midspan.

l

AC to DC power adapter— Connect the 12V DC power jack socket to the AC to DC power adapter.

W-IAP155P supports PSE for 802.3at powered device (class 0-4) on one port (E1 or E2), or 802.3af powered DC IN
(Power Socket) on two ports (E1 and E2).

Assigning an IP address to the W-IAP
The W-IAP needs an IP address for network connectivity. When you connect a W-IAP to a network, it receives an IP
address from a DHCP server.
To obtain an IP address for a W-IAP:
1. Ensure that the DHCP service is enabled on the network.
2. Connect the ENET 0 port of W-IAP to a switch or router using an Ethernet cable.
3. Connect the W-IAP to a power source. The W-IAP receives an IP address provided by the switch or router.
If there is no DHCP service on the network, the W-IAP can be assigned a static IP address. If a static IP is not
assigned, the W-IAP obtains an IP automatically within the 169.254 subnet.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Setting up a W-IAP | 35

Assigning a Static IP
To assign a static IP to a W-IAP:
1. Connect a terminal, PC, or workstation running a terminal emulation program to the Console port on the W-IAP.
2. Power on the W-IAP. An autoboot countdown prompt that allows you to interrupt the normal startup process and
access apboot is displayed.
3. Click Enter before the timer expires. The W-IAP goes into the apboot mode.
4. In the apboot mode, use the following commands to assign a static IP to the W-IAP.
Hit  to stop autoboot: 0
apboot>
apboot> setenv ipaddr 192.0.2.0
apboot> setenv netmask 255.255.255.0
apboot> setenv gatewayip 192.0.2.2
apboot> save
Saving Environment to Flash...
Un-Protected 1 sectors
.done
Erased 1 sectors
Writing

5. Use the printenv command to view the configuration.
apboot> printenv

Connecting to a Provisioning Wi-Fi Network
The W-IAPs boot with factory default configuration and try to provision automatically. If the automatic provisioning is
successful, the instant SSID will not be available. If W-AirWave and Activate are not reachable and the automatic
provisioning fails, the instant SSID becomes available and the users can connect to a provisioning network by using
the instant SSID.
To connect to a provisioning Wi-Fi network:
1. Ensure that the client is not connected to any wired network.
2. Connect a wireless enabled client to a provisioning Wi-Fi network: for example, instant.
3. If the Windows OS system is used:
a. Click the wireless network connection icon in the system tray. The Wireless Network Connection window
is displayed.
b. Click on the instant network and then click Connect.
4. If the Mac OS system is used:
a. Click the AirPort icon. A list of available Wi-Fi networks is displayed.
b. Click on the instant network.
The instant SSIDs are broadcast in 2.4 GHz only.

W-IAP Cluster
W-IAPs in the same VLAN automatically find each other and form a single functioning network managed by a Virtual
Controller.
Moving a W-IAP from one cluster to another requires a factory reset of the W-IAP.

36 | Setting up a W-IAP

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Disabling the Provisioning Wi-Fi Network
The provisioning network is enabled by default. Instant provides the option to disable the provisioning network
through the console port. Use this option only when you do not want the default SSID instant to be broadcast in your
network.
To disable the provisioning network:
1. Connect a terminal or PC/workstation running a terminal emulation program to the Console port on the W-IAP.
2. Configure the terminal or terminal emulation program to use the following communication settings:
Table 6: Terminal Communication Settings
Baud Rate

Data Bits

Parity

Stop Bits

Flow Control

9600

8

None

1

None

3. Power on the W-IAP. An autoboot countdown prompt that allows you to interrupt the normal startup process and
access apboot is displayed.
4. Click Enter before the timer expires. The W-IAP goes into the apboot mode through console.
5. In the apboot mode, use the following commands to disable the provisioning network:
n

apboot> factory_reset

n

apboot> setenv disable_prov_ssid 1

n

apboot> saveenv

n

apboot> reset

Logging in to the Instant UI
Launch a Web browser and enter instant.dell-pcw.com. In the login screen, enter the following credentials:
l

Username— admin

l

Password— admin

The following figure shows the Login screen:
Figure 1 Login Screen

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Setting up a W-IAP | 37

When you use a provisioning Wi-Fi network to connect to the Internet, all browser requests are directed to the Instant
UI. For example, if you enter example.com in the address field, you are directed to the Instant UI. You can change
the default login credentials after the first login.

Regulatory Domains
The IEEE 802.11/b/g/n Wi-Fi networks operate in the 2.4 GHz spectrum and IEEE 802.11a/n operates in the 5.0
GHz spectrum. The spectrum is divided into channels. The 2.4 GHz spectrum is divided into 14 overlapping,
staggered 20 MHz wireless carrier channels. These channels are spaced 5 MHz apart. The 5 GHz spectrum is
divided into more channels. The channels that can be used in a particular country differ based on the regulations of
that country.
The initial Wi-Fi setup requires you to specify the country code for the country in which the Instant operates. This
configuration sets the regulatory domain for the radio frequencies that the W-IAPs use. Within the regulated
transmission spectrum, a high-throughput 802.11ac, 802.11a, 802.11b/g, or 802.11n radio setting can be configured.
The available 20 MHz, 40 MHz, or 80MHz channels are dependent on the specified country code.
You cannot change the country code for the W-IAPs in the restricted regulatory domains such as US or Japan for
most of the W-IAP models. Improper country code assignments can disrupt wireless transmissions. Most countries
impose penalties and sanctions on operators of wireless networks with devices set to improper country codes.

Country Code
The following table provides a list of supported country codes:
Table 7: Country Codes List
Code

Country Name

AE

United Arab Emirates

AR

Argentina

AT

Austria

AU

Australia

BG

Bulgaria

BH

Bahrain

BM

Bermuda

BO

Bolivia

BR

Brazil

CA

Canada

CH

Switzerland

CL

Chile

CN

China

CO

Colombia

CR

Costa Rica

38 | Setting up a W-IAP

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Code

Country Name

CS

Serbia and Montenegro

CY

Cyprus

CZ

Czech Republic

DE

Germany

DK

Denmark

DO

Dominican Republic

DZ

Algeria

EC

Ecuador

EE

Estonia

EG

Egypt

ES

Spain

FI

Finland

FR

France

GB

United Kingdom

GR

Greece

GT

Guatemala

HK

Hong Kong

HN

Honduras

ID

Indonesia

IE

Ireland

IN

India

IS

Iceland

IT

Italy

JM

Jamaica

JO

Jordan

JP

Japan

KE

Kenya

KR

Republic of Korea (South
Korea)

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Setting up a W-IAP | 39

Code

Country Name

KW

Kuwait

LB

Lebanon

LI

Liechtenstein

LI

Liechtenstein

LK

Sri Lanka

LT

Lithuania

LU

Luxembourg

MA

Morocco

MU

Mauritius

MX

Mexico

NL

Netherlands

NO

Norway

NZ

New Zealand

OM

Oman

PA

Panama

PE

Peru

PH

Philippines

PK

Islamic Republic of Pakistan

PL

Poland

PR

Puerto Rico

PT

Portugal

QA

Qatar

RO

Romania

RU

Russia

SA

Saudi Arabia

SG

Singapore

SI

Slovenia

SK

Slovak Republic

40 | Setting up a W-IAP

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Code

Country Name

SV

El Salvador

TH

Thailand

TN

Tunisia

TR

Turkey

TT

Trinidad and Tobago

TW

Taiwan

UA

Ukraine

US

United States

UY

Uruguay

VE

Venezuela

VN

Vietnam

ZA

South Africa

Specifying Country Code
This procedure is applicable to the W-IAP-RW (Rest of World) variants only. Skip this step if you are installing WIAP in the United States and Japan.
The Country Code window is displayed for the W-IAP-RW (Rest of World) variants when you log in to the UI for the
first time. You can specify a country code by selecting an appropriate option from the Please Specify the Country
Code drop-down list.
Figure 2 Specifying a Country Code

.
For the complete list of the country codes supported by the W-IAP-RW variant type, see Country Code on page 38.

Accessing the Instant CLI
Instant supports the use of Command Line Interface (CLI) for scripting purposes. When you make configuration
changes on a master W-IAP in the CLI, all associated W-IAPs in the cluster inherit these changes and subsequently
update their configurations. By default, you can access the CLI from the serial port or from an SSH session. You
must explicitly enable Telnet access on the W-IAP to access the CLI through a Telnet session.
For information on enabling SSH and Telnet access to the W-IAP CLI, see Configuring Terminal Access on page 80.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Setting up a W-IAP | 41

Connecting to a CLI Session
On connecting to a CLI session, the system displays its host name followed by the login prompt. Use the
administrator credentials to start a CLI session. For example:
(Instant AP)
User: admin

If the login is successful, the privileged command mode is enabled and a command prompt is displayed. For
example:
(Instant AP)#

The privileged mode provides access to show, clear, ping, traceroute, and commit commands. The configuration
commands are available in config mode. To move from privileged mode to the configuration mode, enter the
following command at the command prompt:
(Instant AP)# configure terminal

The configure terminal command allows you to enter the basic configuration mode and the command prompt is
displayed as follows:
(Instant AP)(config)#

The Instant CLI allows CLI scripting in several other sub-command modes to allow the users to configure individual
interfaces, SSIDs, access rules, and security settings.
You can use the question mark (?) to view the commands available in a privileged mode, configuration mode, or submode.
Although automatic completion is supported for some commands such as configure terminal, the complete exit
and end commands must be entered at command prompt.

Applying Configuration Changes
Each command processed by the Virtual Controller is applied on all the slaves in a cluster. The changes configured
in a CLI session are saved in the CLI context. The CLI does not support the configuration data exceeding the 4K
buffer size in a CLI session. Therefore, it is recommended that you configure fewer changes at a time and apply the
changes at regular intervals.
To apply and save the configuration changes at regular intervals, use the following command in the privileged mode:
(Instant AP)# commit apply

To apply the configuration changes to the cluster without saving the configuration, use the following command in the
privileged mode:
(Instant AP)# commit apply no-save

To view the changes that are yet to be applied, use the following command in the privileged mode:
(Instant AP)# show uncommitted-config

To revert to the earlier configuration, use the following command in the privileged mode.
(Instant AP)# commit revert

Example:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

42 | Setting up a W-IAP

AP)(config)# rf dot11a-radio-profile
AP)(RF dot11a Radio Profile)# beacon-interval 200
AP)(RF dot11a Radio Profile)# no legacy-mode
AP)(RF dot11a Radio Profile)# dot11h
AP)(RF dot11a Radio Profile)# interference-immunity 3
AP)(RF dot11a Radio Profile)# csa-count 2
AP)(RF dot11a Radio Profile)# spectrum-monitor
AP)(RF dot11a Radio Profile)# end

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

(Instant AP)# show uncommitted-config
rf dot11a-radio-profile
no legacy-mode
beacon-interval 200
no dot11h
interference-immunity 3
csa-count 1
no spectrum-monitor
Instant Access Point# commit apply

Using Sequence Sensitive Commands
The Instant CLI does not support positioning or precedence of sequence-sensitive commands. Therefore, it is
recommended that you remove the existing configuration before adding or modifying the configuration details for
sequence-sensitive commands. You can either delete an existing profile or remove a specific configuration by using
the no… commands.
The following table lists the sequence-sensitive commands and the corresponding no command to remove the
configuration.
Table 8: Sequence-Sensitive Commands
Sequence-Sensitive Command

Corresponding no command

opendns 

no opendns

rule     
 {permit |deny | src-nat | dst-nat { | }}[]

no rule  <:mask> 
  
{permit | deny | src-nat | dst-nat}

mgmt-auth-server 

no mgmt-auth-server 

set-role {{equals| not-equals| startswith| ends-with| contains}  | valueof}

no set-role {{equals|
not-equals| starts-with| ends-with|
contains} | value-of}
no set-role

set-vlan {{equals| not-equals| startswith| ends-with| contains}  |
value-of}

no set-vlan {{equals|
not-equals| starts-with| ends-with|
contains} | value-of}
no set-vlan

auth-server 

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

no auth-server 

Setting up a W-IAP | 43

Chapter 4
Instant User Interface

This chapter describes the following Instant UI elements:
l

Login Screen

l

Main Window

Login Screen
The Instant login page allows you to:
l

Log in to the Instant UI.

l

View Instant Network Connectivity summary

l

View the Instant UI in a specific language

Logging into the Instant UI
To log in to the Instant UI, enter the following credentials:
l

Username— admin

l

Password— admin

The Instant UI main window is displayed.

Viewing Connectivity Summary
The Login page also displays the connectivity status to the Instant network. The users can view a summary that
indicates the status of the Internet availability, uplink, cellular modem and signal strength, VPN, and W-AirWave
configuration details before logging in to the Instant UI.
The following figure shows the information displayed in the connectivity summary:
Figure 3 Connectivity Summary

The Internet status is available only if the Internet failover feature (System > Show advanced option > uplink >
Internet failover) is enabled.
The cellular provider and cellular strength information is only available when a 3G or 4G modem is in use.

Language
The Language drop-down lists the languages and allows users to select their preferred language before logging in to
the Instant UI. A default language is selected based on the language preferences in the client desktop operating
system or browser. If Instant cannot detect the language, then English is used as the default language.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Instant User Interface | 44

You can also select the required language option from the Languages drop-down located at the bottom left corner of
the Instant main window.

Main Window
On logging into Instant, the Instant UI Main Window is displayed. The following figure shows the Instant main
window:
Figure 4 Instant Main Window

The main window consists of the following elements:
l

Banner

l

Search

l

Tabs

l

Links

l

Views

Banner
The banner is a horizontal rectangle that appears at the top left corner of the Instant main window. It displays the
company name, logo, and Virtual Controller's name.

Search
Administrators can search for a W-IAP, client, or a network in the Search text box. When you type a search text, the
search function suggests matching keywords and allows you to automatically complete the search text entry.

Tabs
The Instant main window consists of the following tabs:
n

Networks Tab— Provides information about the network profiles configured in the Instant network.

n

Access Points Tab— Provides information about the W-IAPs configured in the Instant network.

n

Clients Tab— Provides information about the clients in the Instant network.

Each tab appears in a compressed view by default. The number of networks, W-IAPs, or clients in the network
precedes the tab names. The individual tabs can be expanded or collapsed by clicking on the tabs. The list items in
each tab can be sorted by clicking the triangle icon next to the heading labels.

45 | Instant User Interface

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Networks Tab
This tab displays a list of Wi-Fi networks that are configured in the Instant network. The network names are
displayed as links. The expanded view displays the following information about each WLAN SSID:
l

Name (SSID) — Name of the network.

l

Clients — Number of clients that are connected to the network.

l

Type — Type of network type such as Employee, Guest, or Voice.

l

Band — Band in which the network is broadcast: 2.4 GHz band, 5 GHz band, or both.

l

Authentication Method — Authentication method required to connect to the network.

l

Key Management — Authentication key type.

l

IP Assignment— Source of IP address for the client.

l

Zone—AP zone configured on the SSID.

To add a wireless network profile, click the New link in the Networks tab. To edit, click the edit link that is displayed
on clicking the network name in the Networks tab. To delete a network, click on the link x.
For more information on the procedure to add or modify a wireless network, see Wireless Network Profiles on page
93.

Access Points Tab
If the Auto Join Mode feature is enabled, a list of enabled and active W-IAPs in the Instant network is displayed in
the Access Points tab. The W-IAP names are displayed as links. If the Auto Join Mode feature is disabled, the New
link is displayed. Click this link to add a new W-IAP to the network. If a W-IAP is configured and not active, its MAC
Address is displayed in red.
The expanded view of the Access Points tab displays the following information about each W-IAP:
l

Name — Name of the W-IAP. If the W-IAP functions as a master W-IAP in the network, the asterisk sign "*" is
displayed next to the W-IAP.

l

IP Address — IP address of the W-IAP.

l

Mode — Mode of the W-IAP.
n

Access — In this mode, the AP serves clients and scans the home channel for spectrum analysis while
monitoring channels for rogue APs in the background.

n

Monitor — In this mode, the AP acts as a dedicated Air Monitor (AM), scanning all channels for rogue APs and
clients.

l

Spectrum— When enabled, the AP functions as a dedicated full-spectrum RF monitor, scanning all channels to
detect interference from neighboring APs or non-Wi-Fi devices such as microwaves and cordless phones. When
Spectrum is enabled, the AP does not provide access services to clients.

l

Clients — Number of clients that are currently associated to the W-IAP.

l

Type — Model number of the W-IAP.

l

Zone—AP zone.

l

Channel — Channel on which the W-IAP is currently broadcast.

l

Power (dB) — Maximum transmission EIRP of the radio.

l

Utilization (%) — Percentage of time that the channel is utilized. 

l

Noise (dBm) — Noise floor of the channel.

An edit link is displayed on clicking the W-IAP name. For details about editing W-IAP settings see Customizing WIAP Settings on page 84.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Instant User Interface | 46

Clients Tab
This tab displays a list of clients that are connected to the Instant network. The client names are displayed as links.
The expanded view displays the following information about each client:
l

Name — User name of the client or guest users if available.

l

IP Address — IP address of the client.

l

MAC Address — MAC address of the client.

l

OS — Operating system that runs on the client.

l

Network — The network to which the client is connected.

l

Access Point — W-IAP to which the client is connected.

l

Channel — The client operating channel.

l

Type — Type of the Wi-Fi client: A, G, AN, or GN.

l

Role — Role assigned to the client.

l

Signal — Current signal strength of the client, as detected by the AP.

l

Speed (mbps) — Current speed at which data is transmitted. When the client is associated with an AP, it
constantly negotiates the speed of data transfer. A value of 0 means that the AP has not heard from the client for
some time.

Links
l

The following links allow you to configure various features for the Instant network:

l

New Version Available

l

System

l

RF

l

Security

l

Maintenance

l

More

l

Help

l

Logout

l

Monitoring

l

Client Match

l

AppRF

l

Spectrum

l

Alerts

l

IDS

l

Configuration

l

AirGroup

l

W-AirWave Setup

l

Pause/Resume

Each of these links is explained in the subsequent sections.

New Version Available
This link is displayed in the top right corner of the Instant main window only if a new image version is available on the
image server and W-AirWave is not configured. For more information about the New version available link and its
functions, see Upgrading a W-IAP on page 317.

47 | Instant User Interface

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

System
This link displays the  System window. The System window consists of the following tabs:
Use the Show/Hide Advanced option at the bottom of the System window to view or hide the advanced options.

l

General— Allows you to configure, view or edit the Name, IP address, NTP Server, and other W-IAP settings for
the Virtual Controller. For more information on the basic and additional configuration settings that can be
performed on this tab, see Basic Configuration Tasks on page 74 and Additional Configuration Tasks on page 78.

l

Admin — Allows you to configure administrator credentials for access to the Virtual Controller Management User
Interface. You can also configure W-AirWave in this tab. For more information on management interface and WAirWave configuration, see Managing W-IAP Users on page 140 and Managing a W-IAP from W-AirWave on
page 275 respectively.

l

Uplink — Allows you to view or configure uplink settings. See Uplink Configuration on page 285 for more
information.

l

L3 Mobility — Allows you to view or configure the Layer-3 mobility settings. See Configuring L3-Mobility on page
307 for more information.

l

Enterprise Domains — Allows you to view or configure the DNS domain names that are valid in the enterprise
network. See Configuring Enterprise Domains on page 188 for more information.

l

Monitoring — Allows you to view or configure the following details:
n

Syslog — Allows you to view or configure Syslog Server details for sending syslog messages to the external
servers. See Configuring a Syslog Server on page 330 for more information.

n

TFTP Dump — Allows you to view or configure a TFTP dump server for core dump files. See Configuring
TFTP Dump Server on page 332 for more information.

n

SNMP — Allows you to view or configure SNMP agent settings. See Configuring SNMP on page 327 for more
information.

l

WISPr — Allows you to view or configure the WISPr settings. See Configuring WISPr Authentication on page 170
for more information.

l

Proxy — Allows you to configure HTTP proxy on a W-IAP. See Configuring HTTP Proxy on a W-IAP on page 317
for more information.

The following figure provides a view of the System window with the advanced options.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Instant User Interface | 48

Figure 5 System Window

RF
The RF link displays a window for configuring Adaptive Radio Management (ARM) and Radio features.
l

ARM — Allows you to view or configure channel and power settings for all the W-IAPs in the network. For
information about ARM configuration, see ARM Overview on page 232.

l

Radio — Allows you to view or configure radio settings for 2.4 GHz and the 5 GHz radio profiles. For information
about Radio, see Configuring Radio Settings for a W-IAP on page 238.

The following figure provides a view of the RF window with the advanced options for ARM configuration:

49 | Instant User Interface

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Figure 6 RF Window

Security
The Security link displays a window with the following tabs:
l

Authentication Servers— Use this tab to configure an external RADIUS server for a wireless network. For more
information, see Configuring an External Server for Authentication on page 157.

l

Users for Internal Server— Use this tab to populate the system’s internal authentication server with users. This
list is used by networks for which per-user authorization is specified using the Virtual Controller’s internal
authentication server. For more information about users, see Managing W-IAP Users on page 140.

l

Roles— Use this tab to view the roles defined for all the Networks. The Access Rules part allows you to configure
permissions for each role. For more information, see Configuring User Roles on page 190 and Configuring
Access Rules for Network Services on page 177.

l

Blacklisting— Use this tab to blacklist clients. For more information, see Blacklisting Clients on page 171.

l

Firewall Settings— Use this tab to enable or disable Application Layer Gateway (ALG) supporting address and
port translation for various protocols and to configure protection against wired attacks. For more information, see
Configuring ALG Protocols on page 181 and Configuring Firewall Settings for Protection from ARP Attacks on
page 181

l

Inbound Firewall— Use this tab to enhance the inbound firewall by allowing configuration of inbound firewall
rules, management subnets, and restricted corporate access through an uplink switch. For more information, see
Managing Inbound Traffic on page 183.

l

Walled Garden—Use this window to allow or prevent access to a selected list of websites. For more information,
see Configuring Walled Garden Access on page 138.

l

External Captive Portal— Use this window to configure external captive portal profiles. For more information,
see Configuring External Captive Portal for a Guest Network on page 129.

The following figure shows the default view of the Security window:

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Instant User Interface | 50

Figure 7 Security Window - Default View

Maintenance
The Maintenance link displays a window that allows you to maintain the Wi-Fi network. The Maintenance window
consists of the following tabs:
l

About—Displays the name of the product, build time, W-IAP model name, the Instant version, website address of
Dell, and Copyright information.

l

Configuration— Displays the following details:
n

Current Configuration — Displays the current configuration details.

n

Clear Configuration —Allows you to clear the current configuration details of the network.

n

Backup Configuration — Allows you to back up local configuration details. The backed up configuration data
is saved in the file named instant.cfg.

n

Restore Configuration — Allows you to restore the backed up configuration. The W-IAP must be rebooted
after restoring the configuration for the changes to affect.

l

Certificates — Displays information about the certificates installed on the W-IAP. You can also upload new
certificates and set a passphrase for the certificates. For more information, see Uploading Certificates on page
173.

l

Firmware — Displays the current firmware version and provides various options to upgrade to a new firmware
version. For more information, see Upgrading a W-IAP on page 317.

l

Reboot — Displays the W-IAPs in the network and provides an option to reboot the required access point or all
access points. For more information, see Upgrading a W-IAP on page 317.

l

Convert — Provides an option to convert a W-IAP to a mobility controller managed Remote AP or Campus AP, or
to the default Virtual Controller mode. For more information, see Converting a W-IAP to a Remote AP and
Campus AP on page 320.

The following figure shows the default view of the Maintenance window:

51 | Instant User Interface

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Figure 8 Maintenance Window - Default View

More
The More link allows you to select the following options:
l

VPN

l

IDS

l

Wired

l

Services

l

DHCP Server

l

Support

VPN
The VPN window allows you to define communication settings with a remote Controller. See VPN Configuration on
page 210 for more information. The following figure shows an example of the IPSec configuration options available in
the VPN window:

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Instant User Interface | 52

Figure 9 VPN window for IPSec Configuration

IDS
The IDS window allows you to configure wireless intrusion detection and protection levels. The following figures
show the IDS window:
Figure 10 IDS Window: Intrusion Detection

53 | Instant User Interface

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Figure 11 IDS Window: Intrusion Protection

For more information on wireless intrusion detection and protection, see Detecting and Classifying Rogue APs on
page 296.
Wired
The Wired window allows you to configure a wired network profile. See Wired Profiles on page 112 for more
information. The following figure shows the Wired window:
Figure 12 Wired Window

Services
The Services window allows you to configure services such as AirGroup, RTLS, and OpenDNS. The Services
window consists of the following tabs:
l

AirGroup — Allows you to configure the AirGroup and AirGroup services. For more information, see AirGroup
Configuration on page 255.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Instant User Interface | 54

l

RTLS — Allows you to integrate W-AirWave Management platform or third-party Real Time Location Server such
as Aeroscout Real Time Location Server with Instant. For more information, see Configuring a W-IAP for
RTLS Support on page 263.
The RTLS tab also allows you to integrate W-IAP with the Analytics and Location Engine (ALE). For more
information about configuring a W-IAP for ALE integration, see Configuring a W-IAP for Analytics and Location
Engine Support on page 265.

l

OpenDNS— Allows you to configure support for OpenDNS business solutions, which require an OpenDNS
(opendns.com) account. The OpenDNS credentials are used by Instant and W-AirWave to filter content at the
enterprise level. For more information, see Configuring OpenDNS Credentials on page 266.

l

CALEA—Allows you configure support for Communications Assistance for Law Enforcement Act (CALEA)
server integration, thereby ensuring compliance with Lawful Intercept and CALEA specifications. For more
information, see CALEA Integration and Lawful Intercept Compliance on page 270.

l

Network Integration—Allows you to configure a W-IAP for integration with Palo Alto Networks (PAN) Firewall
and XML API server. For more information about W-IAP integration with PAN, see Integrating a W-IAP with Palo
Alto Networks Firewall on page 267and Integrating a W-IAP with an XML API interface on page 268.

The following figure shows the default view of the Services window:
Figure 13 Services Window: Default View

DHCP Server
The DHCP Servers window allows you to configure various DHCP modes. The following figure shows the contents
of the DHCP Servers window:

55 | Instant User Interface

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Figure 14 DHCP Servers Window

For more information, see DHCP Configuration on page 201.
Support
The Support consists of the following fields:
l

Command— Allows you to select a support command for execution.

l

Target—Displays a list of W-IAPs in the network.

l

Run— Allows you to execute the selected command for a specific W-IAP or all W-IAPs and view logs.

l

Auto Run— Allows you to configure a schedule for automatic execution of a support command for a specific WIAP or all W-IAPs.

l

Filter—Allows you to filter the contents of a command output.

l

Clear—Clears the command output displayed after a command is executed.

l

Save— Allows you to save the support command logs as an HTML or text file.

For more information on support commands, see Running Debug Commands from the UI on page 333. The following
figure shows the Support window:

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Instant User Interface | 56

Figure 15 Support Window

Help
The Help link allows you to view a short description or definition of selected terms and fields in the UI windows or
dialogs.
To activate the context-sensitive help:
1. Click the Help link at the top right corner of Instant main window.
2. Click any text or term displayed in green italics to view its description or definition.
3. To disable the help mode, click Done.

Logout
The Logout link allows you to log out of the Instant UI.

Monitoring
The Monitoring link displays the Monitoring pane for the Instant network. Use the down arrow
right side of these links to compress or expand the monitoring pane.

located to the

The monitoring pane consists of the following sections:
l

Info

l

RF Dashboard

l

RF Trends

l

Usage Trends

l

Mobility Trail

Info
The Info section displays the configuration information of the Virtual Controller by default. On selecting the Network
View tab, the monitoring pane displays configuration information of the selected network. Similarly in the Access
Point or the Client view, this section displays the configuration information of the selected W-IAP or the client.

57 | Instant User Interface

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 9: Contents of the Info Section in the Instant Main Window
Name

Description

Info section in Virtual
Controller view

The Info section in the Virtual Controller view displays the following information:
l Name— Displays the Virtual Controller name.
l Country Code— Displays the Country in which the Virtual Controller is operating.
l Virtual Controller IP address— Displays the IP address of the Virtual Controller.
l Management: Indicates if the W-IAP is managed locally or through W-AirWave.
l Master— Displays the IP address of the Access Point acting as Virtual Controller.
l OpenDNS Status— Displays the OpenDNS status. If the OpenDNS status
indicates Not Connected, ensure that the network connection is up and
appropriate credentials are configured for OpenDNS.
l Uplink type — Displays the type of uplink configured on the W-IAP, for example,
Ethernet or 3G.
l Uplink status — Indicates the uplink status.
l Blacklisted clients — Displays the number of blacklisted clients.
l Internal RADIUS Users — Displays the number of internal RADIUS users.
l Internal Guest Users — Displays the number of internal guest users.
l Internal User Open Slots— Displays the available slots for user configuration as
supported by the W-IAP model.

Info section in Network view

The Info section in the Network view displays the following information:
l Name — Displays the name of the network.
l Status — Displays the status of the network.
l Type — Displays the type of network, for example, Employee, Guest, or Voice.
l IP Assignment— Indicates if the W-IAP clients are assigned IP address from the
network that the Virtual Controller is connected to, or from an internal autogenerated IP scope from the Virtual Controller.
l Access— Indicates the level of access control configured for the network.
l WMM DSCP—Displays WMM DSCP mapping details.
l Security level— Indicates the type of user authentication and data encryption
configured for the network.
The info section for WLAN SSIDs also indicates status of Captive Portal and CALEA
ACLs and provides a link to upload certificates for internal server. For more
information, see Uploading Certificates on page 173.

Info section in Access Point
view

The Info section in the Access Point view displays the following information:
l Name — Displays the name of the selected W-IAP.
l IP Address — Displays the IP address of the W-IAP.
l Mode — Displays the mode in which the AP is configured to operate:
l
l

l
l
l
l
l
l
l
l
l

Info section in Client view

In Access mode, the W-IAP serves clients, while also monitoring
for rogue APs in the background.
In Monitor mode, the W-IAP acts as a dedicated monitor, scanning
all channels for rogue APs and clients.

Spectrum — Displays the status of the spectrum monitor.
Clients — Number of clients associated with the W-IAP.
Type — Displays the model number of the W-IAP.
Zone — Displays AP zone details.
CPU Utilization — Displays the CPU utilization in percentage.
Memory Free — Displays the memory availability of the W-IAP in MB.
Serial number — Displays the serial number of the W-IAP.
MAC— Displays the MAC address.
From Port— Displays the port from where the slave W-IAP is learned in hierarchy
mode.

The Info section in the Client view displays the following information:
l Name— Displays the name of the client.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Instant User Interface | 58

Table 9: Contents of the Info Section in the Instant Main Window
Name

Description
l
l
l
l
l
l
l
l

IP Address— Displays IP address of the client.
MAC Address— Displays MAC Address of the client.
OS— Displays the Operating System that is running on the client.
Network— Indicates the network to which the client is connected.
Access Point— Indicates the W-IAP to which the client is connected.
Channel— Indicates the channel that is currently used by the client.
Type— Displays the channel type on which client is broadcasting.
Role—Displays the role assigned to the client.

RF Dashboard
The RF Dashboard section lists the W-IAPs that exceed the utilization, noise, or error threshold. It also shows the
clients with low speed or signal strength in the network and the RF information for the W-IAP to which the client is
connected.
The W-IAP names are displayed as links. When a W-IAP is clicked, the W-IAP configuration information is
displayed in the Info section and the RF Dashboard section is displayed at the bottom left corner of the Instant main
window.
The following figure shows an example of the RF dashboard with Utilization, Band frames, Noise Floor, and Errors
details:
Figure 16 RF Dashboard in the Monitoring Pane

The following table describes the icons available on the RF Dashboard pane:

59 | Instant User Interface

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 10: RF Dashboard Icons
Icon

Name

Description

1

Signal
Icon

Displays the signal strength of the client. Depending on the signal strength of the client, the color
of the lines on the Signal bar changes from Green > Orange > Red.
l Green— Signal strength is more than 20 decibels.
l Orange— Signal strength is between 15-20 decibels.
l Red— Signal strength is less than 15 decibels.
To view the signal graph for a client, click on the signal icon next to the client in the Signal
column.

2

Speed
icon

Displays the data transfer speed of the client. Depending on the data transfer speed of the client,
the color of the Signal bar changes from Green > Orange > Red.
l Green— Data transfer speed is more than 50 percent of the maximum speed supported by
the client.
l Orange— Data transfer speed is between 25-50 percent of the maximum speed supported by
the client.
l Red— Data transfer speed is less than 25 percent of the maximum speed supported by the
client.
To view the data transfer speed graph of a client, click on the speed icon against the client in the
Speed column.

3

Utilization
icon

Displays the radio utilization rate of the W-IAPs. Depending on the percentage of utilization, the
color of the lines on the Utilization icon changes from Green > Orange > Red.
l Green— Utilization is less than 50 percent.
l Orange— Utilization is between 50-75 percent.
l Red— Utilization is more than 75 percent.
To view the utilization graph of a W-IAP, click the Utilization icon next to the W-IAP in the
Utilization column.

4

Noise icon

Displays the noise floor details for the W-IAPs. Noise is measured in decibels/meter. Depending
on the noise floor, the color of the lines on the Noise icon changes from Green > Orange > Red.
l Green— Noise floor is more than 87 dBm.
l Orange— Noise floor is between 80 dBm-87 dBm.
l Red— Noise floor is less than 80 dBm.
To view the noise floor graph of a W-IAP, click the noise icon next to the W-IAP in the Noise
column.

5

Errors
icon

Displays the errors for the W-IAPs. Depending on the errors, color of the lines on the Errors icon
changes from Green > Yellow > Red.
l Green— Errors are less than 5000 frames per second.
l Orange— Errors are between 5000-10000 frames per second.
l Red— Errors are more than 10000 frames per second.
To view the errors graph of a W-IAP, click the Errors icon next to the W-IAP in the Errors column.

RF Trends
The RF Trends section displays the following graphs for the selected AP and the client. To view the details on the
graphs, click the graphs and hover the mouse on a data point:
Figure 17 RF Trends for Access Point

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Instant User Interface | 60

Figure 18 RF Trends for Clients

Usage Trends
The Usage Trends displays the following graphs:
l

Clients — In the default view, the Clients graph displays the number of clients that were associated with the
Virtual Controller in the last 15 minutes. In Network or Access Points view, this graph displays the number of
clients that were associated with the selected network or W-IAP in the last 15 minutes.

l

Throughput— In the default view, the Throughput graph displays the incoming and outgoing throughput traffic for
the Virtual Controller in the last 15 minutes. In the Network or Access Points view, this graph displays the
incoming and outgoing throughput traffic for the selected network or W-IAP in the last 15 minutes.

Figure 19 Usage Trends Graphs in the Default View

61 | Instant User Interface

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

The following table describes the graphs displayed in the Network view:
Table 11: Network View — Graphs and Monitoring Procedures
Graph Name

Description

Monitoring Procedure

Clients

The Clients graph shows the number of clients
associated with the network for the last 15
minutes.
To see an enlarged view, click the graph.
l The enlarged view provides Last, Minimum,
Maximum, and Average statistics for the
number of clients associated with the Virtual
Controller for the last 15 minutes.
l To see the exact number of clients in the
Instant network at a particular time, move the
cursor over the graph line.

To check the number of clients associated
with the network for the last 15 minutes,
1. Log in to the Instant UI. The Virtual
Controller view appears. This is the
default view.
2. In the Networks tab, click the network for
which you want to check the client
association. The Network view is
displayed.
3. Study the Clients graph in the Usage
Trends pane. For example, the graph
shows that one client is associated with
the selected network at 12:00 hours.

Throughput

The Throughput graph shows the throughput of
the selected network for the last 15 minutes.
l Outgoing traffic — Throughput for outgoing
traffic is displayed in green. Outgoing traffic is
shown above the median line.
l Incoming traffic — Throughput for incoming
traffic is displayed in blue. Incoming traffic is
shown below the median line.
To see an enlarged view, click the graph.
l The enlarged view provides Last, Minimum,
Maximum, and Average statistics for the
incoming and outgoing traffic throughput of the
network for the last 15 minutes.
To see the exact throughput of the selected
network at a particular time, move the cursor over
the graph line.

To check the throughput of the selected
network for the last 15 minutes,
1. Log in to the Instant UI. The Virtual
Controller view is displayed. This is the
default view.
2. In the Networks tab, click the network for
which you want to check the client
association. The Network view is
displayed.
3. Study the Throughput graph in the Usage
Trends pane. For example, the graph
shows 22.0 Kbps incoming traffic
throughput for the selected network at
12:03 hours.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Instant User Interface | 62

The following table describes the graphs displayed in the Access Point view:
Table 12: Access Point View — Usage Trends and Monitoring Procedures
Graph
Name

Description

Monitoring Procedure

Neighboring
APs

The Neighboring APs graph shows the
number of APs heard by the selected WIAP:
l Valid APs: An AP that is part of the
enterprise providing WLAN service.
l Interfering APs: An AP that is seen in
the RF environment but is not
connected to the network.
l Rogue APs: An unauthorized AP that is
plugged into the wired side of the
network.
To see the number of different types of
neighboring APs for the last 15 minutes,
move the cursor over the respective graph
lines.

To check the neighboring APs detected by the W-IAP
for the last 15 minutes,
1. Log in to the Instant UI. The Virtual Controller view
is displayed. This is the default view.
2. In the Access Points tab, click the W-IAP for which
you want to monitor the client association. The WIAP view is displayed.
3. Study the Neighboring APs graph in the Overview
section. For example, the graph shows that 148
interfering APs are detected by the W-IAP at 12:04
hours.

CPU
Utilization

The CPU Utilization graph displays the
utilization of CPU for the selected W-IAP.
To see the CPU utilization of the W-IAP,
move the cursor over the graph line.

To check the CPU utilization of the W-IAP for the last
15 minutes,
1. Log in to the Instant UI. The Virtual Controller view
is displayed. This is the default view.
2. In the Access Points tab, click the W-IAP for which
you want to monitor the client association. The WIAP view is displayed.
3. Study the CPU Utilization graph in the Overview
pane. For example, the graph shows that the CPU
utilization of the W-IAP is 30% at 12:09 hours.

Neighboring
Clients

The Neighboring Clients graph shows the
number of clients not connected to the
selected AP, but heard by it.
l Any client that successfully
authenticates with a valid AP and
passes encrypted traffic is classified as
a valid client.
l Interfering: A client associated to any
AP and is not valid is classified as an
interfering client.
To see the number of different types of
neighboring clients for the last 15 minutes,
move the cursor over the respective graph
lines.

To check the neighboring clients detected by the WIAP for the last 15 minutes,
1. Log in to the Instant UI. The Virtual Controller view
is displayed. This is the default view.
2. In the Access Points tab, click the W-IAP for which
you want to monitor the client association. The WIAP view is displayed.
3. Study the Neighboring Clients graph in the
Overview pane. For example, the graph shows that
20 interfering clients were detected by the W-IAP at
12:15 hours.

63 | Instant User Interface

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 12: Access Point View — Usage Trends and Monitoring Procedures
Graph
Name

Description

Monitoring Procedure

Memory free
(MB)

The memory free graph displays the
memory availability of the W-IAP in MB.
To see the free memory of the W-IAP,
move the cursor over the graph line.

To check the free memory of the W-IAP for the last 15
minutes,
1. Log in to the Instant UI. The Virtual Controller view
is displayed. This is the default view.
2. In the Access Points tab, click the W-IAP for which
you want to monitor the client association. The WIAP view is displayed.
3. Study the Memory free graph in the Overview pane.
For example, the graph shows that the free memory
of the W-IAP is 64 MB at 12:13 hours.

Clients

The Clients graph shows the number of
clients associated with the selected W-IAP
for the last 15 minutes.
To see an enlarged view, click the graph.
The enlarged view provides Last,
Minimum, Maximum, and Average
statistics for the number of clients
associated with the W-IAP for the last 15
minutes.
To see the exact number of clients
associated with the selected W-IAP at a
particular time, move the cursor over the
graph line.

To check the number of clients associated with the WIAP for the last 15 minutes,
1. Log in to the Instant UI. The Virtual Controller view
is displayed. This is the default view.
2. In the Access Points tab, click the W-IAP for which
you want to monitor the client association. The WIAP view is displayed.
3. Study the Clients graph. For example, the graph
shows that six clients are associated with the W-IAP
at 12:11 hours.

Throughput

The Throughput graph shows the
throughput for the selected W-IAP for the
last 15 minutes.
l Outgoing traffic — Throughput for
outgoing traffic is displayed in green.
Outgoing traffic is shown about the
median line.
l Incoming traffic — Throughput for
incoming traffic is displayed in blue.
Incoming traffic is shown below the
median line.
To see an enlarged view, click the graph.
l The enlarged view provides Last,
Minimum, Maximum, and Average
statistics for the incoming and outgoing
traffic throughput of the W-IAP for the
last 15 minutes.
To see the exact throughput of the selected
W-IAP at a particular time, move the cursor
over the graph line.

To check the throughput of the selected W-IAP for the
last 15 minutes,
1. Log in to the Instant UI. The Virtual Controller view
is displayed. This is the default view.
2. In the Access Points tab, click the W-IAP for which
you want to monitor the throughput. The W-IAP
view is displayed.
3. Study the Throughput graph. For example, the
graph shows 44.03 Kbps incoming traffic
throughput at 12:08 hours.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Instant User Interface | 64

The following table describes the RF trends graphs available in the client view:
Table 13: Client View — RF Trends Graphs and Monitoring Procedures
Graph
Name

Description

Monitoring Procedure

Signal

The Signal graph shows the signal
strength of the client for the last 15 minutes.
It is measured in decibels.
To see an enlarged view, click the graph.
The enlarged view provides Last,
Minimum, Maximum, and Average signal
statistics of the client for the last 15
minutes.
To see the exact signal strength at a
particular time, move the cursor over the
graph line.

To monitor the signal strength of the selected client for
the last 15 minutes,
1. Log in to the Instant UI. The Virtual Controller view is
displayed. This is the default view.
2. In the Clients tab, click the IP address of the client
for which you want to monitor the signal strength.
The client view is displayed.
3. Study the Signal graph in the RF Trends pane. For
example, the graph shows that signal strength for
the client is 54.0 dB at 12:23 hours.

Frames

The Frames Graph shows the In and Out
frame rate per second of the client for the
last 15 minutes. It also shows data for the
Retry In and Retry Out frames.
l Outgoing frames — Outgoing frame
traffic is displayed in green. It is shown
above the median line.
l Incoming frames — Incoming frame
traffic is displayed in blue. It is shown
below the median line.
l Retry Out — Retries for the outgoing
frames are displayed above the median
line in black .
l Retry In — Retries for the incoming
frames are displayed below the median
line in red.
To see an enlarged view, click the graph.
The enlarged view provides Last,
Minimum, Maximum, and Average statistics
for the In, Out, Retries In, and Retries Out
frames.
To see the exact frames at a particular time
move the cursor over the graph line.

To monitor the In and Out frame rate per second and
retry frames for the In and Out traffic, for the last 15
minutes,
1. Log in to the Instant UI. The Virtual Controller view is
displayed. This is the default view.
2. In the Clients tab, click the IP address of the client
for which you want to monitor the frames. The client
view is displayed.
3. Study the Frames graph in the RF Trends pane. For
example, the graph shows 4.0 frames per second
for the client at 12:27 hours.

Speed

The Speed graph shows the data transfer
speed for the client. Data transfer is
measured in Mbps.
To see an enlarged view, click the graph.
The enlarged view shows Last, Minimum,
Maximum, and Average statistics of the
client for the last 15 minutes.
To see the exact speed at a particular time,
move the cursor over the graph line.

To monitor the speed for the client for the last 15
minutes,
1. Log in to the Instant UI. The Virtual Controller view is
displayed. This is the default view.
2. In the Clients tab, click the IP address of the client
for which you want to monitor the speed. The client
view is displayed.
3. Study the Speed graph in the RF Trends pane. For
example, the graph shows that the data transfer
speed at 12:26 hours is 240 Mbps.

Throughput

The Throughput Graph shows the
throughput of the selected client for the last
15 minutes.
l Outgoing traffic — Throughput for
outgoing traffic is displayed in green.
Outgoing traffic is shown above the
median line.
l Incoming traffic — Throughput for

To monitor the errors for the client for the last 15
minutes,
1. Log in to the Instant UI. The Virtual Controller view is
displayed. This is the default view.
2. In the Clients tab, click the IP address of the client
for which you want to monitor the throughput. The
client view is displayed.
3. Study the Throughput graph in the RF Trends pane.

65 | Instant User Interface

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 13: Client View — RF Trends Graphs and Monitoring Procedures
Graph
Name

Description
incoming traffic is displayed in blue.
Incoming traffic is shown below the
median line.
To see an enlarged view, click the graph.
The enlarged view shows Last, Minimum,
Maximum, and Average statistics for the
incoming and outgoing traffic throughput of
the client for the last 15 minutes.
To see the exact throughput at a particular
time, move the cursor over the graph line.

Monitoring Procedure
For example, the graph shows 1.0 Kbps outgoing
traffic throughput for the client at 12:30 hours.

Mobility Trail
The Mobility Trail section displays the following mobility trail information for the selected client:
l

Association Time— The time at which the selected client was associated with a particular W-IAP.
The Instant UI shows the client and W-IAP association over the last 15 minutes.

l

Access Point— The W-IAP name with which the client was associated.

Mobility information about the client is reset each time it roams from one W-IAP to another.

Client Match
If client match is enabled, the Client Match link provides a graphical representation of radio map view of an AP and
the client distribution on an AP radio.
On clicking an access point in the Access Points tab and the Client Match link, a stations map view is displayed
and a graph is drawn with real-time data points for the AP radio. If the AP supports dual band, you can toggle
between 2.4GHz and 5 GHz links in the client match graph area to view the data. When you hover the mouse on the
graph, details such as RSSI, client match status, and the client distribution on channels are displayed.
The following figure shows the client distribution details for an AP radio.
Figure 20 Client Distribution on AP Radio

On clicking a client in the Clients tab and the Client Match link, a graph is drawn with real-time data points for an AP
radio map. When you hover the mouse on the graph, details such as RSSI, channel utilization details, and client
count on each channel are displayed.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Instant User Interface | 66

The following figure shows the client view heatmap for an AP radio:
Figure 21 Channel Availability Map for Clients

AppRF
The AppRF link displays the application traffic summary for W-IAPs and client devices. The AppRF link in the
activity panel is displayed only if AppRF visibility is enabled in the System window. For more information on
application visibility and AppRF charts, see Application Visibility on page 242.

Spectrum
The spectrum link (in the Access Point view) displays the spectrum data that is collected by a hybrid AP or by a WIAP that has enabled spectrum monitor. The spectrum data is not reported to the Virtual Controller.
The spectrum link displays the following:
l

Device list - The device list display consists of a device summary table and channel information for active non
Wi-Fi devices currently seen by a spectrum monitor or hybrid AP radio.

l

Channel Utilization and Monitoring - This chart provides an overview of channel quality across the spectrum. It
shows channel utilization information such as channel quality, availability, and utilization metrics as seen by a
spectrum monitor for the 2.4 GHz and 5 GHz radio bands. The first bar for each channel represents the
percentage of air time used by non Wi-Fi interference and Wi-Fi devices. The second bar indicates the channel
quality. A higher percentage value indicates better quality.

l

Channel Details - When you move your mouse over a channel, the channel details or the summary of the 5 GHz
and 2.4 GHz channels as detected by a spectrum monitor are displayed. You can view the aggregate data for
each channel seen by the spectrum monitor radio, including the maximum AP power, interference and the Signalto-Noise and Interference Ratio (SNIR). Spectrum monitors display spectrum analysis data seen on all channels
in the selected band, and hybrid W-IAPs display data from the one channel they are monitoring.

For more information on spectrum monitoring, see Spectrum Monitor on page 309.

Alerts
Alerts are generated when a user encounters problems while accessing or connecting to a network. The alerts that
are generated can be categorized as follows:
l

802.11 related association and authentication failure alerts

l

802.1X related mode and key mismatch, server, and client time-out failure alerts

l

IP address related failures - Static IP address or DHCP related alerts.

The following figure shows the contents of details displayed on clicking the Alerts link:

67 | Instant User Interface

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Figure 22 Alerts Link

The Alerts link displays the following types of alerts:
l

Client Alerts

l

Active Faults

l

Fault History

Table 14: Types of Alerts
Type of Alert

Description

Information Displayed

Client Alerts

The Client alerts occur when
clients are connected to the
Instant network.

A client alert displays the following fields:
l Timestamp— Displays the time at which the client alert was
recorded.
l MAC address— Displays the MAC address of the client that
caused the alert.
l Description— Provides a short description of the alert.
l Access Points— Displays the IP address of the W-IAP to
which the client is connected.
l Details— Provides complete details of the alert.

Active Faults

The Active Faults occur in the
event of a system fault.

An Active Faults consists of the following fields:
l Time— Displays the system time when an event occurs.
l Number— Indicates the number of sequence.
l Description— Displays the event details.

Fault History

The Fault History alerts occur in
the event of a system fault.

The Fault History displays the following information:
l Time— Displays the system time when an event occurs.
l Number— Indicates the number of sequence.
l Cleared by— Displays the module which cleared this fault.
l Description— Displays the event details.

The following figures show the client alerts, fault history, and active faults:

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Instant User Interface | 68

Figure 23 Client Alerts

Figure 24 Fault History

Figure 25 Active Faults

The following table displays a list of alerts that are generated in the W-IAP network:

69 | Instant User Interface

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 15: Alerts list
Type
Code

Description

Details

Corrective Actions

100101

Internal error

The W-IAP has encountered
an internal error for this client.

Contact the Dell customer support
team.

100102

Unknown SSID in
association request

The W-IAP cannot allow this
client to associate, because
the association request
received contains an unknown
SSID.

Identify the client and check its Wi-Fi
driver and manager software.

100103

Mismatched
authentication/encryption
setting

The W-IAP cannot allow this
client to associate, because its
authentication or encryption
settings do not match W-IAP's
configuration.

Ascertain the correct authentication or
encryption settings and try to associate
again.

100104

Unsupported 802.11 rate

The W-IAP cannot allow this
client to associate because it
does not support the 802.11
rate requested by this client.

Check the configuration on the W-IAP
to see if the desired rate can be
supported; if not, consider replacing
the W-IAP with another model that can
support the rate.

100105

Maximum capacity reached
on W-IAP

The W-IAP has reached
maximum capacity and cannot
accommodate any more
clients.

Consider expanding capacity by
installing additional W-IAPs or balance
load by relocating W-IAPs.

100206

Invalid MAC Address

The W-IAP cannot
authenticate this client
because the client's MAC
address is not valid.

This condition may be indicative of a
misbehaving client. Try to locate the
client device and check its hardware
and software.

100307

Client blocked due to
repeated authentication
failures

The W-IAP is temporarily
blocking the 802.1X
authentication request from
this client, because the
credentials provided are
rejected by the RADIUS server
too many times.

Identify the client and check its 802.1X
credentials.

100308

RADIUS server connection
failure

The W-IAP cannot
authenticate this client using
802.1X, because the RADIUS
server did not respond to the
authentication request.

If the W-IAP is using the internal
RADIUS server, it is recommended that
you check the related configuration as
well as the installed certificate and
passphrase.
If the W-IAP is using an external
RADIUS server, check if there are any
issues with the RADIUS server and try
connecting again.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Instant User Interface | 70

Table 15: Alerts list
Type
Code

Description

Details

Corrective Actions

100309

RADIUS server
authentication failure

The W-IAP cannot
authenticate this client using
802.1X , because the RADIUS
server rejected the
authentication credentials
(password and so on)
provided by the client.

Ascertain the correct authentication
credentials and log in again.

100410

Integrity check failure in
encrypted message

The W-IAP cannot receive
data from this client , because
the integrity check of the
received message (MIC) has
failed.

Check the encryption setting on the
client and on the W-IAP.

100511

DHCP request timed out

This client did not receive a
response to its DHCP request
in time.

Check the status of the DHCP server in
the network.

IDS
The IDS link displays a list of foreign APs and foreign clients that are detected in the network. It consists of the
following sections:
l

l

Foreign Access Points Detected— Lists the APs that are not controlled by the Virtual Controller. The following
information is displayed for each foreign AP:
n

MAC address— Displays the MAC address of the foreign AP.

n

Network— Displays the name of the network to which the foreign AP is connected.

n

Classification— Displays the classification of the foreign AP, for example, Interfering W-IAP or Rogue W-IAP.

n

Channel— Displays the channel in which the foreign AP is operating.

n

Type— Displays the Wi-Fi type of the foreign AP.

n

Last seen— Displays the time when the foreign AP was last detected in the network.

n

Where— Provides information about the W-IAP that detected the foreign AP. Click the pushpin icon to view
the information.

Foreign Clients Detected— Lists the clients that are not controlled by the Virtual Controller. The following
information is displayed for each foreign client:
n

MAC address— Displays the MAC address of the foreign client.

n

Network— Displays the name of the network to which the foreign client is connected.

n

Classification— Displays the classification of the foreign client: Interfering client.

n

Channel— Displays the channel in which the foreign client is operating.

n

Type— Displays the Wi-Fi type of the foreign client.

n

Last seen— Displays the time when the foreign client was last detected in the network.

n

Where— Provides information about the W-IAP that detected the foreign client. Click the pushpin icon to view
the information.

The following figure shows an example for the intrusion detection log.

71 | Instant User Interface

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Figure 26 Intrusion Detection

For more information on the intrusion detection feature, see Intrusion Detection on page 296.

AirGroup
This AirGroup link provides an overall view of your AirGroup configuration. Click each field to view or edit the
settings.
l

MAC — Displays the MAC address of the AirGroup servers.

l

IP — Displays the IP address of the AirGroup servers.

l

Host Name — Displays the machine name or hostname of the AirGroup servers.

l

Service— Displays the type of the services such as AirPlay or AirPrint.

l

VLAN— Displays VLAN details of the AirGroup servers.

l

Wired/Wireless — Displays if the AirGroup server is connected via wired or wireless interface.

l

Role—Displays the user role if the server is connected through 802.1X authentication. If the server is connected
through PSK or open authentication, this field is blank.

l

Group—Displays the group.

l

CPPM— By clicking on this, you get details of the registered rules in ClearPass Policy Manager (CPPM) for this
server.

l

MDNS Cache— By clicking on this, you receive MDNS record details of a particular server.

The following figure shows the AirGroup server details available on clicking the AirGroup link:
Figure 27 AirGroup Link

Configuration
The Configuration link provides an overall view of your Virtual Controller, Access Points, and WLAN
SSID configuration. The following figure shows the Virtual Controller configuration details displayed on clicking the
Configuration link.
Figure 28 Configuration Link

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Instant User Interface | 72

W-AirWave Setup
W-AirWave is a solution for managing rapidly changing wireless networks. When enabled, W-AirWave allows you to
manage the Instant network. For more information on W-AirWave, see Managing a W-IAP from W-AirWave on page
275. The W-AirWave status is displayed at the bottom of the Instant main window. If the W-AirWave status is Not
Set Up, click the Set Up Now link to configure W-AirWave. The System window is displayed with Admin tab
selected.

Pause/Resume
The Pause/Resume link is located at the bottom right corner of the Instant main window.
Click the Pause link to pause the automatic refreshing of the Instant U after every 15 seconds by default. The
Instant UI is automatically refreshed after every 15 seconds by default. When the automatic refreshing is paused,
the Pause link changes to Resume. Click the Resume link to resume automatic refreshing.
Automatic refreshing allows you to get the latest information about the network and network elements. You can use
the Pause link when you want to analyze or monitor the network or a network element, and therefore do not want the
user interface to refresh.

Views
Depending on the link or tab that is clicked, the Instant displays information about the Virtual Controller, Wi-Fi
networks, W-IAPs, or the clients in the Info section. The views on the Instant main window are classified as follows:
l

Virtual Controller view— The Virtual Controller view is the default view. This view allows you to monitor the
Instant network. This view allows you to monitor the Instant network.

l

The following Instant UI elements are available in this view:
n

Tabs— Networks, Access Points, and Clients. For detailed information about the tabs, see Tabs on page 45.

n

Links— Monitoring, Client Alerts, and IDS. The Spectrum link is visible if you have configured the W-IAP as a
spectrum monitor. These links allow you to monitor the Instant network. For more information about these
links, see Monitoring on page 57, IDS on page 71, Alerts on page 67, and Spectrum Monitor on page 309.

l

Network view— The Network view provides information that is necessary to monitor a selected wireless network.
All Wi-Fi networks in the Instant network are listed in the Networks tab. Click the name of the network that you
want to monitor. Network view for the selected network is displayed.

l

Instant Access Point view— The Instant Access Point view provides information that is necessary to monitor a
selected W-IAP. All W-IAPs in the Instant network are listed in the Access Points tab. Click the name of the WIAP that you want to monitor. Access Point view for that W-IAP is displayed.

l

Client view— The Client view provides information that is necessary to monitor a selected client. In the Client
view, all the clients in the Instant network are listed in the Clients tab. Click the IP address of the client that you
want to monitor. Client view for that client is displayed.

For more information on the graphs and the views, see Monitoring on page 57.

73 | Instant User Interface

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Chapter 5
Initial Configuration Tasks

This chapter describes the general configuration tasks to perform when a W-IAP is set up.
l

Basic Configuration Tasks on page 74

l

Additional Configuration Tasks on page 78

Basic Configuration Tasks
This section describes the following basic configuration tasks that can be performed in the System>General tab
after a W-IAP is set up:
l

Modifying the W-IAP Name on page 74

l

Updating Location Details of a W-IAP on page 75

l

Configuring Virtual Controller IP Address on page 76

l

Configuring Timezone on page 76

l

Configuring a Preferred Band on page 75

l

Configuring an NTP Server on page 76

l

Enabling AppRF Visibility on page 77

The following figure shows an example for the basic configuration settings under the System>General tab:

For information on Dynamic RADIUS proxy configuration, see Configuring Authentication Servers on page 157.

Modifying the W-IAP Name
You can change the name of a W-IAP by using the Instant UI or CLI.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Initial Configuration Tasks | 74

In the Instant UI
1. Navigate to System>General.
2. Specify the name of W-IAP in the Name text box.
3. Click OK.

In the CLI
To change the name:
(Instant AP)# name 

Updating Location Details of a W-IAP
You can update the physical location details of a W-IAP by using the Instant UI or CLI. The system location details
are used for retrieving information through the SNMP sysLocation MIB object.

In the Instant UI
To update location details:
1. Navigate to System>General.
2. Specify the location of a W-IAP in the System location text box.
3. Click OK.

In the CLI
To update location details of a W-IAP:
(Instant AP)(config)# syslocation 
(Instant AP)(config)# end
(Instant AP)# commit apply

Configuring a Preferred Band
You can configure a preferred band for a W-IAP by using the Instant UI or the CLI.

In the Instant UI
1. Navigate to System>General.
2. Select 2.4 GHz, 5 GHz or All from the Preferred band drop-down list for single-radio access points.
3. Click OK.
Reboot the W-IAP after configuring the radio profile for the changes to affect.

In the CLI
To configure a preferred band:
(Instant AP)(config)# rf-band 
(Instant AP)(config)# end
(Instant AP)# commit apply

75 | Initial Configuration Tasks

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Configuring Virtual Controller IP Address
You can specify a single static IP address that can be used to manage a multi-AP Instant network. This IP address
is automatically provisioned on a shadow interface on the W-IAP that takes the role of a Virtual Controller. When a
W-IAP becomes a Virtual Controller, it sends three Address Resolution Protocol (ARP) messages with the static IP
address and its MAC address to update the network ARP cache.
You can configure the Virtual Controller name and IP address using the Instant UI or CLI.

In the Instant UI
1. Navigate to System>General.
2. Enter the IP address in Virtual Controller IP.
3. Click OK.

In the CLI
To configure the Virtual Controller Name and IP address:
(Instant AP)(config)# virtual-controller-ip 
(Instant AP)(config)# end
(Instant AP)# commit apply

Configuring Timezone
You can configure time zone in which the W-IAP must operate by using the Instant or the CLI.

In the Instant UI
To configure time zone:
1. Navigate to System>General.
2. Select a time zone from the Timezone drop-down list.
You can enable daylight saving time (DST) on W-IAPs if the time zone you selected supports the
daylight saving time. If the Time Zone selected does not support DST, the Daylight Saving Time
option is not displayed. When enabled, the Daylight saving time ensures that the W-IAPs reflect the
seasonal time changes in the region they serve.
3. To enable daylight saving time, select the Daylight Saving Time checkbox.
4. Click OK.

In the CLI
To configure time zone:
(Instant AP)(config)# clock timezone   
(Instant AP)(config)# clock summer-time  recurring        
(Instant AP)(config)# end
(Instant AP)# commit apply

Configuring an NTP Server
To facilitate communication between various elements in a network, time synchronization between the elements and
across the network is critical. Time synchronization allows you to:
l

Trace and track security gaps, network usage, and troubleshoot network issues.

l

Validate certificates

l

Map an event on one network element to a corresponding event on another.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Initial Configuration Tasks | 76

l

Maintain accurate time for billing services and similar.

The Network Time Protocol (NTP) helps obtain the precise time from a server and regulate the local time in each
network element. Connectivity to a valid NTP server is required to synchronize the W-IAP clock to set the correct
time. If NTP server is not configured in the W-IAP network, a W-IAP reboot may lead to variation in time data.
By default, the W-IAP tries to connect to pool.ntp.org to synchronize time. A different NTP server can be
configured either from the UI. It can also be provisioned through the DHCP option 42. If the NTP server is
configured, it takes precedence over the DHCP option 42 provisioned value. The NTP server provisioned through the
DHCP option 42 is used if no server is configured. The default server pool.ntp.org is used if no NTP server is
configured or provisioned through DHCP option 42.
Reboot the AP to apply the NTP server configuration.

You can configure an NTP server by using the Instant UI or the CLI.

In the Instant UI
To configure an NTP server:
1. Navigate to System>General.
2. Enter the IP address or the URL (domain name) of the NTP server in the NTP Server text box.
3. Click OK.
4. Reboot the W-IAP.

In the CLI
To configure an NTP server:
(Instant AP)(config)# ntp-server 
(Instant AP)(config)# end
(Instant AP)# commit apply

To check the NTP status and association, run the show clock and show process commands.

Enabling AppRF Visibility
If your W-IAP supports the AppRF feature, you can enable AppRF visibility to view the AppRF statistics for a W-IAP
or the clients associated with a W-IAP. For more information on the procedure for enabling AppRF visualization, see
Enabling Application Visibility on page 241.

Changing Password
You can update your password details by using the Instant UI or the CLI.

In the Instant UI
1. Navigate to System>Admin.
2. Under Local, provide a new password that you would like the admin users to use.
3. Click OK.

In the CLI
To change password for the admin user:
(Instant AP)(config)# mgmt-user  [password]
(Instant AP)(config)# end
(Instant AP)# commit apply

77 | Initial Configuration Tasks

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Additional Configuration Tasks
This section describes the following additional tasks that can be performed after a W-IAP is set up:
l

Configuring Virtual Controller VLAN on page 78

l

Configuring Auto Join Mode on page 79

l

Configuring Terminal Access on page 80

l

Configuring Console Access on page 80

l

Configuring LED Display on page 81

l

Configuring Additional WLAN SSIDs on page 81

l

Preventing Inter-user Bridging on page 82

l

Preventing Local Routing between Clients on page 82

l

Enabling Dynamic CPU Management on page 83

The following figure shows the additional configuration options available under the System>General tab:

Configuring Virtual Controller VLAN
The IP configured for the Virtual Controller can be in the same subnet as W-IAP or can be in a different
subnet. Ensure that you configure the Virtual Controller VLAN, gateway, and subnet mask details only
if the Virtual Controller IP is in a different subnet.
You can configure the Virtual Controller VLAN by using Instant UI or CLI.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Initial Configuration Tasks | 78

In the Instant UI
1. Navigate to System>General> Show advanced options. The advanced options are displayed.
2. Enter subnet mask details in Virtual Controller Netmask.
3. Enter a gateway address in Virtual Controller Gateway.
4. Enter Virtual Controller VLAN in Virtual Controller VLAN.
Ensure that Virtual Controller VLAN is not the same as native VLAN of the W-IAP.

5. Click OK.

In the CLI
To configure the Virtual Controller Name and IP address:
(Instant AP)(config)# virtual-controller-vlan   
(Instant AP)(config)# end
(Instant AP)# commit apply

Configuring Auto Join Mode
The auto join mode feature allows W-IAPs to automatically discover the Virtual Controller and join the network.
The Auto Join Mode feature is enabled by default. If the auto join mode feature is disabled, a New link is displayed
in the Access Points tab. Click this link to add W-IAPs to the network. If this feature is disabled, the inactive WIAPs are displayed in red as shown in the following figure:
Figure 29 Inactive W-IAPs

Enabling or Disabling Auto Join Mode
You can enable or disable auto join mode by using the Instant UI or CLI.
In the Instant UI
To enable or disable auto join mode:
1. Navigate to System>General>Show advanced options.
2. Select Disabled or Enabled from the Auto join mode drop-down list to deny or allow APs to join the network.
3. Click OK.
In the CLI
To disable auto join mode:
(Instant AP)(config)# no allow-new-aps
(Instant AP)(config)# end
(Instant AP)# commit apply

To enable auto join mode:
(Instant AP)(config)# allow-new-aps

79 | Initial Configuration Tasks

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

(Instant AP)(config)# end
(Instant AP)# commit apply

Configuring Terminal Access
When terminal access is enabled, you can access the Instant CLI through SSH or Telnet server. The terminal
access is enabled by default.
You can enable or disable terminal access to a W-IAP by using the Instant UI or CLI.

In the Instant UI
1. Navigate to System>General>Show advanced options.
2. Select Disabled or Enabled from the Terminal access drop-down list.
3. To enable Telnet server based access, select Enabled from the Telnet server drop-down list.
4. Click OK.

In the CLI
To enable terminal access:
(Instant AP)(config)# terminal-access
(Instant AP)(config)# end
(Instant AP)# commit apply

To enable access to the Instant CLI through Telnet:
(Instant AP)(config) # telnet-server
(Instant AP)(config)# end
(Instant AP)# commit apply

Configuring Console Access
You can access a W-IAP console through a serial port to configure or debug system errors. You can enable or
disable console access to a W-IAP through the Instant UI or CLI.

In the Instant UI
1. Navigate to System>General>Show advanced options.
2. Select Disabled or Enabled from the Console access drop-down list. By default, the console access is
enabled. When disabled, the W-IAP console cannot be accessed through the serial port.
3. Click OK.

In the CLI
To enable console access:
(Instant
(Instant
(Instant
(Instant

AP)(config)# console
AP)(console)# enable
AP)(console)# end
AP)# commit apply

To disable console access:
(Instant
(Instant
(Instant
(Instant

AP)(config)# console
AP)(console)# disable
AP)(console)# end
AP)# commit apply

To view the console settings:
(Instant AP)# show console-settings

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Initial Configuration Tasks | 80

Configuring LED Display
The LED display is always in the Enabled mode during the a W-IAP reboot.

You can enable or disable LED Display for a W-IAP using the Instant UI or CLI.

In the Instant UI
To enable or disable LED display for all W-IAPs in a cluster, perform the following steps:
1. Navigate to System > General > Show advanced options.
2. From the LED Display drop-down list, select Enabled to enable LED display or Disabled to turn off the LED
display.
3. Click OK.

In the CLI
To enable LED display:
(Instant AP)(config)# led-off
(Instant AP)(config)# end
(Instant AP)# commit apply

To disable LED display:
(Instant AP)(config)# no led-off
(Instant AP)(config)# end
(Instant AP)# commit apply

Configuring Additional WLAN SSIDs
The number of SSIDs allowed on each W-IAP depends on the W-IAP platform. The following table describes the
number of SSIDs supported on each platform:
No. of SSIDs supported with
Extended SSID disabled

No. of SSIDs supported with
Extended SSID enabled

IAP-175P/175AC, W-IAP104/105, and WIAP108/109

6

8

All other W-IAPs (excluding IAP-175P/175AC,
W-IAP104/105, and W-IAP108/109)

14

16

W-IAP Platform

Enabling the Extended SSID
Extended SSID is enabled by default in the factory default settings of APs. This disables mesh in the factory default
settings.
You can configure additional SSIDs by using the Instant UI or CLI.
In the Instant UI
1. Navigate to System>General>Show advanced options link.
2. In the General tab, select Enabled from the Extended SSID drop-down list.
3. Click OK.

81 | Initial Configuration Tasks

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

4. Reboot the W-IAP to apply the changes. After you enable the option and reboot the W-IAP, the Wi-Fi and mesh
links are disabled automatically.
In the CLI
To enable the extended SSIDs:
(Instant AP)(config)# extended-ssid
(Instant AP)(config)# end
(Instant AP)# commit apply

Preventing Inter-user Bridging
If you have security and traffic management policies defined in upstream devices, you can disable bridging traffic
between two clients connected to the same AP on the same VLAN. When inter-user bridging is denied, the clients
can connect to the Internet but cannot communicate with each other, and the bridging traffic between the clients is
sent to the upstream device to make the forwarding decision.
You can disable inter-user bridging through the Instant UI or CLI.

In the Instant UI
To prevent inter-user bridging:
1. Navigate to System>General>Show advanced options.
2. From the Deny inter user bridging drop-down list, select Enabled to prevent traffic between two clients
connected to a W-IAP on the same VLANs.
3. Click OK.

In the CLI
To deny inter-user bridging:
(Instant AP)(config)# deny-inter-user-bridging
(Instant AP)(config)# end
(Instant AP)# commit apply

To deny inter-user bridging for the WLAN SSID clients:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP) (SSID Profile )# deny-inter-user-bridging
AP) (SSID Profile )# end
AP)# commit apply

Preventing Local Routing between Clients
If you have security and traffic management policies defined in upstream devices, you can disable routing traffic
between two clients connected to the same W-IAP on different VLANs. When local routing is disabled, the clients
can connect to the Internet but cannot communicate with each other, and the routing traffic between the clients is
sent to the upstream device to make the forwarding decision.
You can disable local routing through the Instant UI or CLI.

In the Instant UI
To disable local routing:
1. Navigate to System>General>Show advanced options.
2. From the Deny local routing drop-down list, select Enabled to prevent local routing traffic between two clients
connected to a W-IAP on different VLANs.
3. Click OK.
Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Initial Configuration Tasks | 82

In the CLI
To disable local routing:
(Instant AP)(config)# deny-local-routing
(Instant AP)(config)# end
(Instant AP)# commit apply

To deny local routing for the WLAN SSID clients:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP) (SSID Profile )# deny-local-routing
AP) (SSID Profile )# end
AP)# commit apply

Enabling Dynamic CPU Management
W-IAPs perform various functions such as wireless client connectivity and traffic flows, wired client connectivity
and traffic flows, wireless security, network management, and location tracking. Like with any network element, a
W-IAP can be subject to heavy loads. In such a scenario, it is important to prioritize the platform resources across
different functions. Typically, the W-IAPs manage resources automatically in real-time. However, under special
circumstances, if dynamic resource management needs to be enforced or disabled altogether, the dynamic CPU
management feature settings can be modified.
You can configure the dynamic CPU management feature by using the Instant UI or CLI.

In the Instant UI
To enable or disable the management plane protection:
1. Click System > General>Show Advanced Options.
2. Select any of the following options from the Dynamic CPU Management drop-down list.
n

Automatic — When selected, the CPU management is enabled or disabled automatically during run-time. This
decision is based on real-time load calculations taking into account all different functions that the CPU needs
to perform. This is the default and recommended option.

n

Always disabled on all APs — When selected, this setting manually disables CPU management on all APs,
typically for small networks. This setting protects user experience.

n

Always enabled on APs — When selected, the client and network management functions are protected. This
setting helps in large networks with high client density.

3. Click OK.

In the CLI
(Instant AP)(config)# dynamic-cpu-mgmt {auto| enable| disable}

83 | Initial Configuration Tasks

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Chapter 6
Customizing W-IAP Settings

This chapter describes the procedures for configuring settings that are specific to a W-IAP in the cluster.
l

Modifying the W-IAP Hostname on page 84

l

Configuring Zone Settings on a W-IAP on page 84

l

Specifying a Method for Obtaining IP Address on page 85

l

Configuring External Antenna on page 86

l

Configuring Radio Profiles for a W-IAP on page 87

l

Configuring Uplink VLAN for a W-IAP on page 88

l

Master Election and Virtual Controller on page 89

l

Adding a W-IAP to the Network on page 91

l

Removing a W-IAP from the Network on page 91

Modifying the W-IAP Hostname
You can change the hostname of a W-IAP through the Instant UI or CLI.

In the Instant UI
1. In the Access Points tab, click the W-IAP you want to rename. The edit link is displayed.
2. Click the edit link. The edit window for modifying W-IAP details is displayed.
3. Edit the W-IAP name in Name. You can specify a name of up to 32 ASCII characters.
4. Click OK.

In the CLI
To change the name:
(Instant AP)# hostname 

Configuring Zone Settings on a W-IAP
All APs in a cluster use the same SSID configuration including master and slave W-IAPs. However, if you want to
assign an SSID to a specific W-IAP, you can configure zone settings for a W-IAP.
The following constraints apply to the AP zone configuration:
l

A W-IAP can belong to only one zone and only one zone can be configured on an SSID.

l

If an SSID belongs to a zone, all W-IAPs in this zone can broadcast this SSID. If no W-IAP belongs to the zone
configured on the SSID, the SSID is not broadcast.

l

If an SSID does not belong to any zone, all W-IAPs can broadcast this SSID.

You can add an AP zone by through the UI or CLI.
For the SSID to be assigned to a W-IAP, the same zone details must be configured on the SSID. For more
information on SSID configuration, see Configuring WLAN Settings for an SSID Profile on page 93.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Customizing W-IAP Settings | 84

In the Instant UI
1. In the Access Points tab, click the W-IAP for which you want to set the zone. The edit link is displayed.
2. Click the edit link. The edit window for modifying W-IAP details is displayed.
3. Specify the AP zone in Zone.
4. Click OK.

In the CLI
To change the name:
(Instant AP)# zone 

Specifying a Method for Obtaining IP Address
You can either specify a static IP address or allow the W-IAP to obtain an IP address from the DHCP server. By
default, the W-IAPs obtain IP address from the DHCP server. You can specify a static IP address for the W-IAP by
using the Instant UI or CLI.

In the Instant UI
1. In the Access Points tab, click the W-IAP to modify. The edit link is displayed.
2. Click the edit link. The edit window for modifying the W-IAP details is displayed.
Figure 30 Configuring W-IAP Settings

3. Select Specify statically option to specify a static IP address. The following fields are displayed:
a. Enter the new IP address for the W-IAP in the IP address text box.
b. Enter the subnet mask of the network in the Netmask text box.
c. Enter the IP address of the default gateway in the Default gateway text box.
d. Enter the IP address of the DNS server in the DNS server text box.
e. Enter the domain name in the Domain name text box.
4. Click OK and reboot the W-IAP.

85 | Customizing W-IAP Settings

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

In the CLI
To configure a static IP address:
(Instant AP)# ip-address     

Configuring External Antenna
If your W-IAP has external antenna connectors, you need to configure the transmit power of the system. The
configuration must ensure that the system’s Equivalent Isotropically Radiated Power (EIRP) is in compliance with
the limit specified by the regulatory authority of the country in which the W-IAP is deployed. You can also measure or
calculate additional attenuation between the device and antenna before configuring the antenna gain. To know if your
AP device supports external antenna connectors, see the Install Guide that is shipped along with the AP device.

EIRP and Antenna Gain
The following formula can be used to calculate the EIRP limit related RF power based on selected antennas
(antenna gain) and feeder (Coaxial Cable loss):
EIRP = Tx RF Power (dBm)+GA (dB) - FL (dB)
The following table describes this formula:
Table 16: Formula Variable Definitions
Formula Element

Description

EIRP

Limit specific for each country of deployment

Tx RF Power

RF power measured at RF connector of the unit

GA

Antenna gain

FL

Feeder loss

Example
For example, the maximum gain that can be configured on a W-IAP134 with AP-ANT-1F dual-band and omnidirectional antenna is as follows:
Table 17: Maximum Antenna Gains
Frequency Band

Gain (dBi)

2.4-2.5 GHz

2.0dBi

4.9–5.875GHz

5.0dBi

For information on antenna gain recommended by the manufacturer, see dell.com/support.

Configuring Antenna Gain
You can configure antenna gain for APs with external connectors using Instant UI or CLI.

In the Instant UI
1. Navigate to the Access Point tab, select the access point to configure and then click edit.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Customizing W-IAP Settings | 86

2. In the Edit Access Point window, select External Antenna to configure the antenna gain value. This option is
available only for access points that support external antennas, for example, W-IAP134.
3. Enter the antenna gain values in dBm for the 2.4GHz and 5GHz bands.
4. Click OK.

In the CLI
To configure external antenna for 5 GHz frequency:
(Instant AP)# a-external-antenna 

To configure external antenna for 2,4 GHz frequency:
(Instant AP)# g-external-antenna 

Configuring Radio Profiles for a W-IAP
You can configure a radio profile on a W-IAP either manually or by using the Adaptive Radio Management (ARM)
feature.
Adaptive Radio Management (ARM) is enabled on Instant by default. It automatically assigns appropriate channel
and power settings for the W-IAPs. For more information on ARM, see Adaptive Radio Management on page 232.

Configuring ARM Assigned Radio Profiles for a W-IAP
To enable ARM assigned radio profiles:
1. In the Access Points tab, click the W-IAP to modify. The edit link is displayed.
2. Click the edit link. The edit window for modifying W-IAP details is displayed.
3. Click the Radio tab. The Radio tab details are displayed.
4. Ensure that an appropriate mode is selected.
5. Select the Adaptive radio management assigned option under the bands that are applicable to the W-IAP
configuration.
6. Click OK.

Configuring Radio Profiles Manually for W-IAP
When radio settings are assigned manually by the administrator, the ARM is disabled.

To manually configure radio settings:
1. In the Access Points tab, click the AP for which you want to enable ARM. The edit link is displayed.
2. Click the edit link. The Edit Access Point window is displayed.
3. Click the Radio tab.
4. Ensure that an appropriate mode is selected.
By default the channel and power for an AP are optimized dynamically using Adaptive Radio Management
(ARM). You can override ARM on the 2.4 GHz and 5 GHz bands and set the channel and power manually if
desired. The following table describes various configuration modes for an AP:

87 | Customizing W-IAP Settings

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 18: W-IAP Radio Modes
Mode

Description

Access

In Access mode, the AP serves clients, while also monitoring for rogue APs in the
background.
If the Access mode is selected, perform the following actions:
1. Select Administrator assigned in 2.4 GHz and 5 GHz band sections.
2. Select appropriate channel number from the Channel drop-down list for both 2.4
GHz and 5 GHz band sections.
3. Enter appropriate transmit power value in the Transmit power text box in 2.4 GHz
and 5 GHz band sections.

Monitor

In Monitor mode, the AP acts as a dedicated monitor, scanning all channels for rogue
APs and clients. You can set one radio on the Monitor mode and the other radio on
access mode, so that the clients can use one radio when the other one is in the Air
Monitor mode.

Spectrum Monitor

In Spectrum Monitor mode, the AP functions as a dedicated full-spectrum RF monitor,
scanning all channels to detect interference, whether from the neighboring APs or from
non-WiFi devices such as microwaves and cordless phones.

In the Spectrum Monitor mode, the APs do not provide access services to clients.

4. Click OK.

In the CLI
To configure a radio profile:
(Instant AP)# wifi0-mode {||}
(Instant AP)# wifi1-mode {||}

If the access mode is configured, you can configure the channel and transmission power by running the following
commands:
(Instant AP)# a-channel  
(Instant AP)# g-channel  

Configuring Uplink VLAN for a W-IAP
Instant supports a management VLAN for the uplink traffic on a W-IAP. You can configure an uplink VLAN when a
W-IAP needs to be managed from a non-native VLAN. After a W-IAP is provisioned with the uplink management
VLAN, all management traffic sent from the W-IAP is tagged with the management VLAN.
Ensure that the native VLAN of the W-IAP and uplink are not the same.

You can configure the uplink management VLAN on a W-IAP by using the Instant UI or CLI.

In the Instant UI
To configure uplink management VLAN:
1. In the Access Points tab, click the W-IAP to modify. The edit link is displayed.
Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Customizing W-IAP Settings | 88

2. Click the edit link. The edit window for modifying W-IAP details is displayed.
3. Click the Uplink tab.
4. Specify the VLAN in the Uplink Management VLAN field.
5. Click OK.
6. Reboot the W-IAP.

In the CLI
To configure uplink VLAN:
(Instant AP)# uplink-vlan 

To view the uplink VLAN status:
(Instant AP)# show uplink-vlan
Uplink Vlan Current :0
Uplink Vlan Provisioned :1

Master Election and Virtual Controller
Instant does not require an external mobility controller to regulate and manage the Wi-Fi network. Instead, one WIAP in every network assumes the role of Virtual Controller. It coordinates, stores, and distributes the settings
required to provide a centralized functionality to regulate and manage the Wi-Fi network. The Virtual Controller is the
single point of configuration and firmware management. When configured, the Virtual Controller sets up and
manages the VPN tunnel to a Mobility Controller in the data center.
The Virtual Controller also functions like any other AP with full RF scalability. It also acts as a node, coordinating
DHCP address allocation for network address translated clients ensuring mobility of the clients when they roam
between different W-IAPs.

Master Election Protocol
The Master Election Protocol enables the Instant network to dynamically elect a W-IAP to take on a Virtual
Controller role and allow graceful failover to a new Virtual Controller when the existing Virtual Controller is not
available. This protocol ensures stability of the network during initial startup or when the Virtual Controller goes down
by allowing only one W-IAP to self-elect as a Virtual Controller.

Preference to a W-IAP with 3G/4G Card
The Master Election Protocol prefers the W-IAP with a 3G/4G card, when electing a Virtual Controller for the Instant
network during the initial setup. The Virtual Controller is selected based on the following criteria:
l

If there is more than one W-IAP with 3G/4G cards, one of these W-IAPs is dynamically elected as the Virtual
Controller.

l

When a W-IAP without 3G/4G card is elected as the Virtual Controller but is up for less than 5 minutes, another
W-IAP with 3G/4G card in the network is elected as the Virtual Controller to replace it and the previous Virtual
Controller reboots.

l

When a W-IAP without 3G/4G card is already elected as the Virtual Controller and is up for more than 5 minutes,
the Virtual Controller will not be replaced until it goes down.

W-IAP135 is preferred over W-IAP105 when a Virtual Controller is elected.

89 | Customizing W-IAP Settings

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Preference to a W-IAP with Non-Default IP
The Master Election Protocol prefers a W-IAP with non-default IP, when electing a Virtual Controller for the Instant
network during initial startup. If there are more than one W-IAP with non-default IPs in the network, all W-IAPs with
default IP will automatically reboot and the DHCP process is used to assign new IP addresses.

Viewing Master Election Details
To verify the status of a W-IAP and master election details, use the following commands:
(Instant AP)# show election statistics
(Instant AP)# show summary support

Manual Provisioning of Master W-IAP
In most cases, the master election process automatically determines the best W-IAP that can perform the role of
Virtual Controller, which will apply its image and configuration to all other W-IAPs in the same AP management
VLAN. When the Virtual Controller goes down, a new Virtual Controller is elected.

Provisioning a W-IAP as a Master W-IAP
You can provision a W-IAP as a master W-IAP by using the Instant UI or CLI.
In the Instant UI
1. In the Access Points tab, click the W-IAP to modify. The edit link is displayed.
2. Click the edit link. The edit window for modifying W-IAP details is displayed.
3. Select Enabled from Preferred master drop-down. This option is disabled by default.
Figure 31 W-IAP Settings—Provisioning Master W-IAP

4. Click OK.
In the CLI
To provision a W-IAP as a master W-IAP:
(Instant AP)# iap-master

To verify if the W-IAP is provisioned as master IAP:
(Instant AP)# show ap-env
Antenna Type:Internal

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Customizing W-IAP Settings | 90

Iap_master:1

Adding a W-IAP to the Network
To add a W-IAP to the Instant network, assign an IP address. For more information, see Assigning an IP address to
the W-IAP on page 35.
After a W-IAP is connected to the network, if the Auto Join Mode feature is enabled, the W-IAP inherits the
configuration from the Virtual Controller and is listed in the Access Points tab.
If the Auto Join Mode is disabled, perform the following steps to add a W-IAP to the network:
1. In the Access Points tab, click the New link. The New Access Point window is displayed.
2. In the New Access Point window, enter the MAC address for the new W-IAP.
3. Click OK.

Removing a W-IAP from the Network
You can remove a W-IAP from the network only if the Auto Join Mode feature is disabled. To remove a W-IAP from
the network:
1. In the Access Points tab, click the W-IAP to delete. The x icon is displayed against the W-IAP.
2. Click x to confirm the deletion.
The deleted W-IAPs cannot join the Instant network anymore and no longer are displayed in the Instant UI.
However, the master W-IAP details cannot be deleted from the Virtual Controller database.

91 | Customizing W-IAP Settings

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Chapter 7
VLAN Configuration

VLAN configuration is required for networks with more devices and broadcast traffic on a WLAN SSID or wired
profile. Based on the network type and its requirements, you can configure the VLANs for a WLAN SSID or wired
port profile.
For more information on VLAN configuration for a WLAN SSID and wired port profile, see Configuring VLAN Settings
for a WLAN SSID Profile on page 97 and Configuring VLAN for a Wired Profile on page 114.

VLAN Pooling
In a single W-IAP cluster, a large number of clients can be assigned to the same VLAN. Using the same VLAN for
multiple clients can lead to a high level of broadcasts in the same subnet. To manage the broadcast traffic, you can
partition the network into different subnets and use L3-mobility between those subnets when clients roam. However,
if a large number of clients need to be in the same subnet, you can configure VLAN pooling, in which each client is
randomly assigned a VLAN from a pool of VLANs on the same SSID. Thus, VLAN pooling allows automatic
partitioning of a single broadcast domain of clients into multiple VLANs.

Uplink VLAN Monitoring and Detection on Upstream Devices
If a client connects to an SSID or wired interface with a VLAN that is not allowed on the upstream device, the client
will not be assigned an IP address and thus cannot connect to the Internet. When a client connects to an SSID or a
wired interface with VLAN that is not allowed on the upstream device, the Instant UI now displays the following alert
message:
Figure 32 Uplink VLAN Detection

To resolve this issue, ensure that there is no mismatch in the VLAN configuration.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

VLAN Configuration | 92

Chapter 8
Wireless Network Profiles

This chapter provides the following information:
l

Configuring Wireless Network Profiles on page 93

l

Configuring Fast Roaming for Wireless Clients on page 106

l

Editing Status of a WLAN SSID Profile on page 110

l

Editing a WLAN SSID Profile on page 110

l

Deleting a WLAN SSID Profile on page 111

Configuring Wireless Network Profiles
During start up, a wireless client searches for radio signals or beacon frames that originate from the nearest W-IAP.
After locating the W-IAP, the following transactions take place between the client and the W-IAP:
1. Authentication — The W-IAP communicates with a RADIUS server to validate or authenticate the client.
2. Connection — After successful authentication, the client establishes a connection with the W-IAP.

Network Types
Instant wireless networks are categorized as:
l

Employee network — An Employee network is a classic Wi-Fi network. This network type is used by the
employees in an organization and it supports passphrase-based or 802.1X based authentication methods.
Employees can access the protected data of an enterprise through the employee network after successful
authentication. The employee network is selected by default during a network profile configuration.

l

Voice network —This Voice network type allows you to configure a network profile for devices that provide only
voice services such as handsets or applications that require voice traffic prioritization.

l

Guest network —The Guest wireless network is created for guests, visitors, contractors, and any non-employee
users who use the enterprise Wi-Fi network. The Virtual Controller assigns the IP address for the guest clients.
captive portal or passphrase based authentication methods can be set for this wireless network. Typically, a
guest network is an un-encrypted network. However, you can specify the encryption settings when configuring a
guest network.

When a client is associated to the Voice network, all data traffic is marked and placed into the high priority queue in
QoS (Quality of Service).
To configure a new wireless network profile, complete the following procedures:
1. Configuring WLAN Settings
2. Configuring VLAN Settings
3. Configuring Security Settings
4. Configuring Access Rules for a Network

Configuring WLAN Settings for an SSID Profile
You can configure WLAN settings using the Instant UI or CLI.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Wireless Network Profiles | 93

In the Instant UI
To configure WLAN settings:
1. In the Networks tab of the Instant main window, click the New link. The New WLAN window is displayed. The
following figure shows the contents of the WLAN Settings tab:
Figure 33 WLAN Settings Tab

2. Enter a name that uniquely identifies a wireless network in the Name (SSID) text box.
The SSID Name may contain any special character except for ' and ".

3. Based on the type of network profile, select any of the following options under Primary usage:
l

Employee

l

Voice

l

Guest

4. Click the Show advanced options link. The advanced options for configuration are displayed. Specify the
following parameters as required.

94 | Wireless Network Profiles

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 19: WLAN Configuration Parameters
Parameter
Broadcast filtering

Description
Select any of the following values:
All—When set to All, the W-IAP drops all broadcast and multicast frames except DHCP
and ARP.
l ARP—When set to ARP, the W-IAP converts ARP requests to unicast and send frames
directly to the associated client.
l Disabled— When set to Disabled, all broadcast and multicast traffic is forwarded.
l

DTIM interval

The DTIM interval indicates the delivery traffic indication message (DTIM) period in beacons,
which can be configured for every WLAN SSID profile. The DTIM interval determines how
often the W-IAP should deliver the buffered broadcast and multicast frames to associated
clients in the powersave mode. The default value is 1, which means the client checks for
buffered data on the W-IAP at every beacon. You can also configure a higher DTIM value for
power saving.

Multicast transmission
optimization

Select Enabled if you want the W-IAP to select the optimal rate for sending broadcast and
multicast frames based on the lowest of unicast rates across all associated clients. When this
option is enabled, multicast traffic can be sent at up to 24 Mbps. The default rate for sending
frames for 2.4 GHz is 1 Mbps and 5.0 GHz is 6 Mbps. This option is disabled by default.

Dynamic multicast
optimization

Select Enabled to allow W-IAP to convert multicast streams into unicast streams over the
wireless link. Enabling Dynamic Multicast Optimization (DMO) enhances the quality and
reliability of streaming video, while preserving the bandwidth available to the non-video
clients.
NOTE: When you enable DMO on multicast SSID profiles, ensure that the DMO feature is
enabled on all SSIDs configured in the same VLAN.

DMO channel
utilization threshold

Specify a value to set a threshold for DMO channel utilization. With DMO, the W-IAP converts
multicast streams into unicast streams as long as the channel utilization does not exceed this
threshold. The default value is 90% and the maximum threshold value is 100%. When the
threshold is reached or exceeds the maximum value, the W-IAP sends multicast traffic over
the wireless link.

Transmit Rates

Specify the following parameters:
2.4 GHz—If the 2.4 GHz band is configured on the W-IAP, specify the minimum and
maximum transmission rate. The default value for minimum transmission rate is 1 Mbps
and maximum transmission rate is 54 Mbps.
l 5 GHz—If the 5 GHz band is configured on the W-IAP, specify the minimum and maximum
transmission rate. The default value for minimum transmission rate is 6 Mbps and
maximum transmission rate is 54 Mbps.
l

Zone

Bandwidth Limits

Specify the zone for the SSID. When the zone is defined in SSID profile and if the same zone
is defined on a W-IAP, the SSID is created on that W-IAP. For more information on
configuring zone details on an IAP, see Configuring Zone Settings on a W-IAP on page 84.
The following constraints apply to the zone configuration:
l A W-IAP can belong to only one zone and only one zone can be configured on an SSID.
l If an SSID belongs to a zone, all W-IAPs in this zone can broadcast this SSID. If no W-IAP
belongs to the zone configured on the SSID, the SSID is not broadcast.
l If an SSID does not belong to any zone, all W-IAPs can broadcast this SSID.
Under Bandwidth Limits:
Airtime—Select this checkbox to specify an aggregate amount of airtime that all clients in
this network can use for sending and receiving data. Specify the airtime percentage.
l Each radio— Select this checkbox to specify an aggregate amount of throughput that each
radio is allowed to provide for the connected clients.
l Downstream and Upstream—Specify the downstream and upstream rates within a range
of 1 to 65535 Kbps for the SSID users. If the assignment is specific for each user, select
the Peruser checkbox.
l

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Wireless Network Profiles | 95

Table 19: WLAN Configuration Parameters
Parameter

Description

Wi-Fi Multimedia
(WMM) traffic
management

Configure the following options for WMM traffic management. WMM supports voice, video,
best effort, and background access categories. To allocate bandwidth for the following types
of traffic, specify a percentage value under Share. To configure DSCP mapping, specify a
value under DSCP Mapping.
l Background WMM: For background traffic such as file downloads or print jobs.
l Best effort WMM — For best effort traffic such as traffic from legacy devices or traffic from
applications or devices that do not support QoS.
l Video WMM — For video traffic generated from video streaming.
l Voice WMM— For voice traffic generated from the incoming and outgoing voice
communication.
For more information on WMM traffic and DSCP mapping, see Wi-Fi Multimedia Traffic
Management on page 251

Content filtering

Select Enabled to route all DNS requests for the non-corporate domains to OpenDNS on this
network.

Band

Select a value to specify the band at which the network transmits radio signals. You can set
the band to 2.4 GHz, 5 GHz, or All. The All option is selected by default.

Inactivity timeout

Specify an interval for session timeout in seconds, minutes or hours. If a client session is
inactive for the specified duration, the session expires and the users are required to log in
again. You can specify a value within the range of 60-86400 seconds or up to 24 hours for a
client session. The default value is 1000 seconds.

Hide SSID

Select this checkbox if you do not want the SSID (network name) to be visible to users.

Disable SSID

Select this checkbox if you want to disable the SSID. On selecting this, the SSID will be
disabled, but will not be removed from the network. By default, all SSIDs are enabled.

Can be used without
Uplink

Select the checkbox if you do not want to SSID profile to use uplink.

Max clients threshold

Specify the maximum number of clients that can be configured for each BSSID on a WLAN.
You can specify a value within the range of 0 to 255. The default value is 64.

Local probe request
threshold

Specify a threshold value to limit the number of incoming probe requests. When a client
sends a broadcast probe request frame to search for all available SSIDs, this option controls
system response for this network profile and ignores probe requests if required. You can
specify a Received signal strength indication (RSSI) value within range of 0 to 100 dB.

5. Click Next to configure VLAN settings. For more information, see Configuring VLAN Settings for a WLAN SSID
Profile on page 97.

In the CLI
To configure WLAN settings for an SSID profile:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile )# essid 
AP)(SSID Profile )# type {|| }
AP)(SSID Profile )# broadcast-filter 
AP)(SSID Profile )# dtim-period 
AP)(SSID Profile )# multicast-rate-optimization
AP)(SSID Profile )# dynamic-multicast-optimization
AP)(SSID Profile )# dmo-channel-utilization-threshold
AP)(SSID Profile )# a-max-tx-rate 
AP)(SSID Profile )# a-min-tx-rate 
AP)(SSID Profile )# g-max-tx-rate 
AP)(SSID Profile )# g-min-tx-rate 

96 | Wireless Network Profiles

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(SSID Profile )#
AP)(SSID Profile )#
AP)(SSID Profile )#
AP)(SSID Profile )#
AP)(SSID Profile )#
AP)(SSID Profile )#
AP)(SSID Profile )#
AP)(SSID Profile )#
AP)(SSID Profile )#
AP)(SSID Profile )#
AP)(SSID Profile )#
AP)(SSID Profile )#
AP)(SSID Profile )#
AP)(SSID Profile )#
AP)(SSID Profile )#
AP)(SSID Profile )#
AP)(SSID Profile )#
AP)(SSID Profile )#
AP)(SSID Profile )#
AP)(SSID Profile )#
AP)# commit apply

zone 
bandwidth-limit 
per-user-bandwidth-limit 
air-time-limit 
wmm-background-dscp 
wmm-background-share 
wmm-best-effort-dscp 
wmm-best-effort-share 
wmm-video-dscp 
wmm-video-share 
wmm-voice-dscp 
wmm-voice-share 
rf-band {<2.4>|<5.0>|}
content-filtering
hide-ssid
inactivity-timeout 
work-without-uplink
local-probe-req-thresh 
max-clients-threshold 
end

Configuring VLAN Settings for a WLAN SSID Profile
If you are creating a new SSID profile, complete the WLAN Settings procedure before configuring VLAN. For more
information, see Configuring WLAN Settings for an SSID Profile on page 93.
You can configure VLAN settings for an SSID profile using the Instant UI or CLI.

In the Instant UI
To configure VLAN settings for an SSID:
1. In the VLAN tab of the New WLAN window. The VLAN tab contents are displayed.
Figure 34 VLAN Tab

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Wireless Network Profiles | 97

2. Select any for the following options for Client IP assignment:
l

Virtual Controller assigned—On selecting this option, the client obtains the IP address from the Virtual
Controller.

l

Network assigned—On selecting this option, the IP address is obtained from the network.

3. Based on the type client IP assignment mode selected, you can configure the VLAN assignment for clients as
described in the following table:
Table 20: IP and VLAN Assignment for WLAN SSID Clients
Client IP Assignment

Client VLAN Assignment

Virtual Controller assigned

If the Virtual Controller assigned is selected for client IP assignment, the Virtual
Controller creates a private subnet and VLAN on the W-IAP for the wireless clients. The
network address translation for all client traffic that goes out of this interface is carried out
at the source. This setup eliminates the need for complex VLAN and IP address
management for a multi-site wireless network.
On selecting this option, the following client VLAN assignment options are displayed:
l
l

Network assigned

Default: When selected, the default VLAN as determined by the Virtual Controller is
assigned for clients.
Custom: When selected, you can specify a custom VLAN assignment option. You can
select an existing DHCP scope for client IP and VLAN assignment or you can create
a new DHCP scope by selecting New. For more information on DHCP scopes, see
Configuring DHCP Scopes on page 201.

If the Network assigned is selected, you can specify any of the following options for the
Client VLAN assignment.
l Default— On selecting this option, the client obtains the IP address in the same
subnet as the W-IAPs. By default, the client VLAN is assigned to the native VLAN on
the wired network.
l Static— On selecting this option, you need to specify a single VLAN, a comma
separated list of VLANS, or a range of VLANs for all clients on this network. Select
this option for configuring VLAN pooling.
l Dynamic— On selecting this option, you can assign the VLANs dynamically from a
Dynamic Host Configuration Protocol (DHCP) server. To create VLAN assignment
rules, click New to assign the user to a VLAN. In the New VLAN Assignment Rule
window, enter the following information:
l
l
l
l

Attribute— Select an attribute returned by the RADIUS server during
authentication.
Operator— Select an operator for matching the string.
String— Enter the string to match
VLAN— Enter the VLAN to be assigned.

4. Click Next to configure security settings for the employee network. For more information, see Configuring
Security Settings for a WLAN SSID Profile on page 99.

In the CLI
To manually assign VLANs for WLAN SSID users:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile )# vlan 
AP)(SSID Profile )# end
AP)# commit apply

To enforce DHCP-based VLAN assignment:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile )# enforce-dhcp
(Instant AP)(SSID Profile )# end

98 | Wireless Network Profiles

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

(Instant AP)# commit apply

To create a new VLAN assignment rule:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile )# set-vlan  {{contains|ends-with|equals|matchesregular-expression|not-equals|starts-with}  |value-of}
(Instant AP)(SSID Profile )# end
(Instant AP)# commit apply

Configuring Security Settings for a WLAN SSID Profile
The following procedures are described in this section:
l

Configuring Security Settings for an Employee or Voice Network on page 99

For information on guest network configuration, see Captive Portal for Guest Access.
If you are creating a new SSID profile, configure the WLAN and VLAN settings before defining security settings.
For more information, see Configuring WLAN Settings for an SSID Profile on page 93 and Configuring VLAN
Settings for a WLAN SSID Profile on page 97.

Configuring Security Settings for an Employee or Voice Network
You can configure security settings for an employee or voice network by using the Instant UI or CLI.
In the Instant UI
To configure security settings for an employee or voice network:
1. In the Security tab, specify any of the following types of security levels by moving the slider to a desired level:
l

Enterprise—On selecting enterprise security level, the authentication options applicable to the enterprise
network are displayed.

l

Personal — On selecting personal security level, the authentication options applicable to the personalized
network are displayed.

l

Open—On selecting Open security level, the authentication options applicable to an open network are
displayed:

The default security setting for a network profile is Personal.
The following figures show the configuration options for Enterprise, Personal, and Open security settings:
Figure 35 Security Tab: Enterprise

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Wireless Network Profiles | 99

Figure 36 Security Tab: Personal

Figure 37 Security Tab: Open

2. Based on the security level specified, specify the following parameters:

100 | Wireless Network Profiles

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 21: Configuration Parameters for WLAN Security Settings in an Employee or Voice Network
Security Level
Type

Parameter

Description

Key
Management

For Enterprise security level, select any of the following options from the
Key management drop-down list:
l WPA-2 Enterprise
l Both (WPA-2 & WPA)
l WPA Enterprise
l Dynamic WEP with 802.1X — If you do not want to use a session key
from the RADIUS Server to derive pair wise unicast keys, set Session
Key for LEAP to Enabled. This is required for old printers that use
dynamic WEP through Lightweight Extensible Authentication Protocol
(LEAP) authentication. The Session Key for LEAP feature is Disabled
by default.

Applicable to
Enterprise and
Personal security
levels only.
For the Open
security level, no
encryption settings
are required.

For Personal security level, select an encryption key from the Key
management drop-down list.
l For WPA-2 Personal, WPA Personal, and Both (WPA-2&WPA) keys,
specify the following parameters:
1. Passphrase format: Select a passphrase format from the
Passphrase format drop-down list. The options are
available are 8-63 alphanumeric characters and 64
hexadecimal characters.
2. Enter a passphrase in the Passphrase text box and
reconfirm.
NOTE: The Passphrase may contain any special character
except for ".
l

For Static WEP, specify the following parameters:
1. Select an appropriate value for WEP key size from the
WEP key size drop-down list. You can specify 64-bit or
128-bit .
2. Select an appropriate value for Tx key from the Tx Key
drop-down list. You can specify 1, 2, 3, or 4.
3. Enter an appropriate WEP key and reconfirm.

Termination

To terminate the EAP portion of 802.1X authentication on the W-IAP instead
of the RADIUS server, set Termination to Enabled.
Enabling Termination can reduce network traffic to the external RADIUS
server by terminating the authorization protocol on the W-IAP. By default,
for 802.1X authorization, the client conducts an EAP exchange with the
RADIUS server, and the W-IAP acts as a relay for this exchange.
When Termination is enabled, the W-IAP by itself acts as an authentication
server and terminates the outer layers of the EAP protocol, only relaying the
innermost layer to the external RADIUS server. It can also
reduce the number of exchange packets between the W-IAP and
authentication server.
NOTE: Instant supports the configuration of primary and backup
authentication servers in an EAP termination enabled SSID.
NOTE: If you are using LDAP for authentication, ensure that AP termination
is configured to support EAP.

Enterprise security
level

Authentication
server 1 and
Authentication
server 2

Select any of the following options from the Authentication server 1 dropdown list:
l Select an authentication server from the list if an external servers are
already configured.
l Select New to configure any of the following servers as an external
server:

Enterprise,
Personal, and Open
security levels.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Wireless Network Profiles | 101

Table 21: Configuration Parameters for WLAN Security Settings in an Employee or Voice Network
Parameter

Security Level
Type

Description
l
l
l

RADIUS Server
LDAP Server
CPPM Server for AirGroup CoA

For information on configuring external servers, see Configuring an
External Server for Authentication on page 157.
l To use an internal server, select Internal server and add the clients that
are required to authenticate with the internal RADIUS server. Click the
Users link to add the users. For information on adding a user, see
Managing W-IAP Users on page 140.
If an external server is selected, you can also configure another
authentication server.
Load balancing

Set this to Enabled if you are using two RADIUS authentication servers, so
that the load across the two RADIUS servers is balanced. For more
information on the dynamic load balancing mechanism, see Dynamic Load
Balancing between Two Authentication Servers on page 154.

Enterprise,
Personal, and Open
security levels.

Reauth interval

Specify a value for Reauth interval. When set to a value greater than zero,
APs periodically reauthenticate all associated and authenticated clients.

Enterprise,
Personal, and Open
security levels.

Blacklisting

To enable blacklisting of the clients with a specific number of authentication
failures, select Enabled from the Blacklisting drop-down list and specify a
value for Max authentication failures. The users who fail to authenticate the
number of times specified in Max authentication failures field are
dynamically blacklisted.

Enterprise,
Personal, and Open
security levels.

Accounting

To enable accounting, select Enabled from the Accounting drop-down list.
On setting this option to Enabled, APs post accounting information to the
RADIUS server at the specified Accounting interval.

Enterprise,
Personal, and Open
security levels.

Authentication
survivability

To enable authentication survivability, set Authentication survivability to
Enabled. Specify a value in hours for Cache timeout (global) to set the
duration after which the authenticated credentials in the cache must expire.
When the cache expires, the clients are required to authenticate again. You
can specify a value within range of 1 to 99 hours and the default value is 24
hours.

Enterprise security
level

NOTE: The authentication survivability feature requires ClearPass Policy
Manager 6.0.2 or later, and is available only when the New server option is
selected authentication. On setting this parameter to Enabled, Instant
authenticates the previously connected clients using EAP-PEAP
authentication even when connectivity to ClearPass Policy Manager is
temporarily lost. The Authentication survivability feature is not applicable
when a RADIUS server is configured as an internal server.
MAC
authentication

102 | Wireless Network Profiles

To enable MAC address based authentication for Personal and Open
security levels, set MAC authentication to Enabled.
For Enterprise security level, the following options are available:
l Perform MAC authentication before 802.1X — Select this checkbox to
use 802.1X authentication only when the MAC authentication is
successful.
l MAC authentication fail-thru — On selecting this checkbox, the 802.1X
authentication is attempted when the MAC authentication fails.

Enterprise,
Personal, and Open
security levels.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 21: Configuration Parameters for WLAN Security Settings in an Employee or Voice Network
Security Level
Type

Parameter

Description

Delimiter
character

Specify a character ( for example, colon or dash) as a delimiter for the MAC
address string. When configured, the W-IAP will use the delimiter in the
MAC authentication request. For example, if you specify the colon as a
delimiter, MAC addresses in the xx:xx:xx:xx:xx:xx format are used. If the
delimiter is not specified, the MAC address in the xxxxxxxxxxxx format is
used.

Enterprise,
Personal, and Open
security levels.

This option is available only when MAC authentication is enabled.
Uppercase
support

Set to Enabled to allow the W-IAP to use uppercase letters in MAC address
string for MAC authentication.
This option is available only if MAC authentication is enabled.

Enterprise,
Personal, and Open
security levels.

Upload
Certificate

Click Upload Certificate and browse to upload a certificate file for the
internal server. For more information on certificates, see Uploading
Certificates on page 173.

Enterprise,
Personal, and Open
security levels

Fast Roaming

You can configure the following fast roaming options for the WLAN SSID:

Enterprise,
Personal, and Open
security levels.
NOTE: OKC
roaming can be
configured only for
the Enterprise
security level.

l

l

l

l

Opportunistic Key Caching: When WPA-2 Enterprise and Both (WPA2WPA) encryption types are selected and if 802.1x authentication
method is configured, the Opportunistic Key Caching (OKC) is enabled
by default. If OKC is enabled, a cached pairwise master key (PMK) is
used when the client roams to a new AP. This allows faster roaming of
clients without the need for a complete 802.1x authentication.
802.11r: Selecting this checkbox enables fast BSS transition. The Fast
BSS Transition mechanism minimizes the delay when a client
transitions from one BSS to another within the same cluster.
802.11k: Selecting this checkbox enables 802.11k roaming on the SSID
profile. The 802.11k protocol enables W-IAPs and clients to dynamically
measure the available radio resources. When 802.11k is enabled, WIAPs and clients send neighbor reports, beacon reports, and link
measurement reports to each other.
802.11v: Selecting this checkbox enables 802.11v based BSS
transition.802.11v standard defines mechanisms for wireless network
management enhancements and BSS transition management. It allows
the client devices to exchange information about the network topology
and RF environment. The BSS transition management mechanism
enables an AP to request a voice client to transition to a specific AP, or
suggest a set of preferred APs to a voice client, due to network load
balancing or BSS termination. It also helps the voice client identify the
best AP to transition to as they roam.

4. Click Next to configure access rules. For more information, see Configuring Access Rules for a WLAN SSID
Profile on page 104.
In the CLI
To configure enterprise security settings for the employee and voice users of a WLAN SSID profile:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile )# opmode {wpa2-aes|wpa-tkip,wpa2-aes|wpa-psk-tkip,wpa2-pskaes|dynamic-wep}
(Instant AP)(SSID Profile )# leap-use-session-key
(Instant AP)(SSID Profile )# termination
(Instant AP)(SSID Profile )# auth-server 
(Instant AP)(SSID Profile )# external-server
(Instant AP)(SSID Profile )# server-load-balancing

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Wireless Network Profiles | 103

(Instant AP)(SSID Profile )# blacklist
(Instant AP)(SSID Profile )# mac-authentication
(Instant AP)(SSID Profile )# l2-auth-failthrough
(Instant AP)(SSID Profile )# auth-survivability
(Instant AP)(SSID Profile )# radius-accounting
(Instant AP)(SSID Profile )# radius-accounting-mode {user-association| userauthentication}
(Instant AP)(SSID Profile )# radius-interim-accounting-interval 
(Instant AP)(SSID Profile )# radius-reauth-interval 
(Instant AP)(SSID Profile )# max-authentication-failures 
(Instant AP)(SSID Profile )# no okc-disable
(Instant AP)(SSID Profile )# dot11r
(Instant AP)(SSID Profile )# dot11k
(Instant AP)(SSID Profile )# dot11v
(Instant AP)(SSID Profile )# exit
(Instant AP)(config)# auth-survivability cache-time-out
(Instant AP)(config)# end
(Instant AP)# commit apply

To configure personal security settings for the employee and voice users of a WLAN SSID profile:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile )# opmode {wpa2-psk-aes|wpa-tkip| wpa-psk-tkip|wpa-psktkip,wpa2-psk-aes| static-wep}
(Instant AP)(SSID Profile )# mac-authentication
(Instant AP)(SSID Profile )# auth-server 
(Instant AP)(SSID Profile )# external-server
(Instant AP)(SSID Profile )# server-load-balancing
(Instant AP)(SSID Profile )# blacklist
(Instant AP)(SSID Profile )# max-authentication-failures 
(Instant AP)(SSID Profile )# radius-accounting
(Instant AP)(SSID Profile )# radius-accounting-mode {user-association|userauthentication}
(Instant AP)(SSID Profile )# radius-interim-accounting-interval 
(Instant AP)(SSID Profile )# radius-reauth-interval 
(Instant AP)(SSID Profile )# end
(Instant AP)# commit apply

To configure open security settings for employee and voice users of a WLAN SSID profile:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile )# opmode opensystem
(Instant AP)(SSID Profile )# mac-authentication
(Instant AP)(SSID Profile # auth-server 
(Instant AP)(SSID Profile # external-server
(Instant AP)(SSID Profile # server-load-balancing
(Instant AP)(SSID Profile # blacklist
(Instant AP)(SSID Profile # max-authentication-failures 
(Instant AP)(SSID Profile # radius-accounting
(Instant AP)(SSID Profile # radius-accounting-mode {user-association|userauthentication}
(Instant AP)(SSID Profile # radius-interim-accounting-interval 
(Instant AP)(SSID Profile # radius-reauth-interval 
(Instant AP)(SSID Profile # end
(Instant AP)# commit apply

Configuring Access Rules for a WLAN SSID Profile
This section describes the procedure for configuring security settings for employee and voice network only. For
information on guest network configuration, see Captive Portal for Guest Access.
If you are creating a new SSID profile, complete the WLAN Settings and configure VLAN and security parameters,

104 | Wireless Network Profiles

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

before defining access rules. For more information, see Configuring WLAN Settings for an SSID Profile on page 93,
Configuring VLAN Settings for a WLAN SSID Profile on page 97, and Configuring Security Settings for a WLAN
SSID Profile on page 99.
You can configure up to 128 access rules for an employee, voice , or guest network using the Instant UI or CLI.

In the Instant UI
To configure access rules for an employee or voice network:
1. In the Access Rules tab, set slider to any of the following types of access control:
l

Unrestricted— Select this to set unrestricted access to the network.

l

Network-based— Set the slider to Network-based to set common rules for all users in a network. The Allow
any to all destinations access rule is enabled by default. This rule allows traffic to all destinations. To define
an access rule:
a. Click New.
b. Select appropriate options in the New Rule window.
c. Click OK.

l

Role-based— Select Role-based to enable access based on user roles. For role-based access control:
n

Create a user role if required. For more information, see Configuring User Roles.

n

Create access rules for a specific user role. For more information, see Configuring Access Rules for
Network Services on page 177. You can also configure an access rule to enforce captive portal
authentication for an SSID that is configured to use 802.1X authentication method. For more information,
see Configuring Captive Portal Roles for an SSID on page 135.

n

Create a role assignment rule. For more information, see Configuring Derivation Rules on page 192.

2. Click Finish.

In the CLI
To configure access control rules for a WLAN SSID:
(Instant AP)(config)# wlan access-rule 
(Instant AP)(Access Rule )# rule    {   {permit|deny|src-nat|dst-nat{ | }}| app  {permit| deny}|
appcategory | webcategory  {permit| deny}| webreputation 
[]
(Instant AP)(Access Rule )# end
(Instant AP)# commit apply

To configure access control based on the SSID:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile )# set-role-by-ssid
AP)(SSID Profile )# end
AP)# commit apply

To configure role assignment rules:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile )# set-role {{equals|not-equals|starts-with|endswith|contains|matches-regular-expression}|value-of}
(Instant AP)(SSID Profile )# end
(Instant AP)# commit apply

To configure a pre-authentication role:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile )# set-role-pre-auth 

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Wireless Network Profiles | 105

(Instant AP)(SSID Profile )# end
(Instant AP)# commit apply

To configure machine and user authentication roles
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile )# set-role-machine-auth  
(Instant AP)(SSID Profile )# end
(Instant AP)# commit apply

To configure unrestricted access:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile )# set-role-unrestricted
AP)(SSID Profile )# end
AP)# commit apply

Example
The following example configures access rules for the wireless network:
(Instant AP)(config)# wlan access-rule WirelessRule
(Instant AP)(Access Rule "WirelessRule")# rule 192.0.2.2 255.255.255.0 match 6 4343 4343 log
classify-media
(Instant AP)(Access Rule "WirelessRule")# rule any any match app deny throttle-downstream 256
throttle-up 256
(Instant AP)(Access Rule "WirelessRule")# rule any any match appcategory collaboration permit
(Instant AP)(Access Rule "WirelessRule")# rule any any match webcategory gambling deny
(Instant AP)(Access Rule "WirelessRule")# rule any any match webcategory training-and-tools
permit
(Instant AP)(Access Rule "WirelessRule")# rule any any match webreputation well-known-sites
permit
(Instant AP)(Access Rule "WirelessRule")# rule any any match webreputation safe-sites permit
(Instant AP)(Access Rule "WirelessRule")# rule any any match webreputation benign-sites permit
(Instant AP)(Access Rule "WirelessRule")# rule any any match webreputation suspicious-sites
deny
(Instant AP)(Access Rule "WirelessRule")# rule any any match webreputation high-risk-sites
deny
(Instant AP)(Access Rule "WirelessRule")# end
(Instant AP)# commit apply

Configuring Fast Roaming for Wireless Clients
Instant supports the following features that enable fast roaming of clients:
l

Opportunistic Key Caching

l

Fast BSS Transition (802.11r Roaming)

l

Radio Resource Management (802.11k)

l

BSS Transition Management (802.11v)

Opportunistic Key Caching
Instant now supports opportunistic key caching (OKC) based roaming. In the OKC based roaming, the AP stores
one pairwise master key (PMK) per client, which is derived from last 802.1x authentication completed by the client in
the network. The cached PMK is used when a client roams to a new AP. This allows faster roaming of clients
between the W-IAPs in a cluster, without requiring a complete 802.1X authentication.
OKC roaming (when configured in the 802.1x Authentication profile) is supported on WPA2 clients. If the wireless
client (the 802.1X supplicant) does not support this feature, a complete 802.1X authentication is required
whenever a client roams to a new AP.

106 | Wireless Network Profiles

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Configuring a W-IAP for OKC Roaming
You can enable OKC roaming for WLAN SSID by using Instant UI or CLI.
In the Instant UI
1. Navigate to the WLAN wizard (click Network>New or Network> Select the WLAN SSID>edit).
2. Click the Security tab.
3. Slide to Enterprise security level. On selecting a security level, the authentication options applicable to
Enterprise network are displayed.

4. Select the WPA-2 Enterprise or Both (WPA-2 & WPA) option from the Key management drop-down list.
When any of these encryption types is selected, Opportunistic Key Caching (OKC) is enabled by default.
5. Click Next and then click Finish.

In the CLI
To disable OKC roaming on a WLAN SSID:
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile )# opmode {wpa2-aes|wpa-tkip,wpa-aes,wpa2-tkip,wpa2-aes}
AP)(SSID Profile )# okc-disable
AP)(config)# end
AP)# commit apply

To enable OKC roaming on a WLAN SSID:
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile )# opmode {wpa2-aes| wpa-tkip,wpa-aes,wpa2-tkip,wpa2-aes}
AP)(SSID Profile )# no okc-disable
AP)(config)# end
AP)# commit apply

Fast BSS Transition (802.11r Roaming)
802.11r is a roaming standard defined by IEEE. When enabled, 802.11r reduces roaming delay by pre-authenticating
clients with multiple target APs before a client roams to an AP. With 802.11r implementation, clients preauthenticate with multiple APs in a cluster.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Wireless Network Profiles | 107

As part of the 802.11r implementation, Instant supports the Fast BSS Transition protocol. The Fast BSS Transition
mechanism reduces client roaming delay when a client transitions from one BSS to another within the same cluster.
This minimizes the time required to resume data connectivity when a BSS transition happens.
Fast BSS Transition is operational only if the wireless client supports 802.11r standard. If the client does not
support 802.11r standard, it falls back to the normal WPA2 authentication method.

Configuring a W-IAP for 802.11r support
You can configure 802.11r support for a WLAN SSID by using the Instant UI or CLI.
In the Instant UI
1. Navigate to the WLAN wizard (click Network>New or Network> Select the WLAN SSID>edit).
2. Click the Security tab.
3. Under Fast Roaming, select the 802.11r checkbox.
4. Click Next and then click Finish.
In the CLI
To enable 802.11r roaming on a WLAN SSID:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile )# dot11r
AP)(config)# end
AP)# commit apply

Example
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile dot11r-profile
AP)(SSID Profile "dot11r-profile")# dot11r
AP)(config)# end
AP)# commit apply

Radio Resource Management (802.11k)
The 802.11k protocol provides mechanisms for APs and clients to dynamically measure the available radio
resources and enables stations to query and manage their radio resources. In an 802.11k enabled network, APs and
clients can share radio and link measurement information, neighbor reports, and beacon reports with each other. This
allows the WLAN network infrastructural elements and clients to assess resources and make optimal mobility
decisions to ensure Quality of Service (QoS) and seamless continuity.
Instant supports the following radio resource management information elements with 802.11k support enabled:
l

Power Constraint IE—The power constraint element contains the information necessary to allow a client to
determine the local maximum transmit power in the current channel.

l

AP Channel Report IE—The AP channel report element contains a list of channels in a regulatory class where a
client is likely to find an AP, including the AP transmitting the AP channel report.

l

RRM Enabled Capabilities IE—The RRM Enabled Capabilities element signals support for radio measurements in
a device. The clients use this IE to specify their radio measurement capabilities.

l

BSS Load Element: The BSS Load element contains information on the density of clients and traffic levels in the
QBSS.

l
l

Transmit Power Control (TPC) Report IE: The TPC IE contains transmit power and link margin information.
Quiet IE: The Quiet IE defines an interval during which no transmission occurs in the current channel. This
interval may be used to assist in making channel measurements without interference from other stations in the
BSS.

108 | Wireless Network Profiles

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

l

Extended Capabilities IE - The extended capabilities IE carries information about the capabilities of an IEEE
802.11 station.

Beacon Report Requests and Probe Responses
The beacon request frame is sent by an AP to request a client to report the list of beacons heard by the client on all
channels.
l

The beacon request is sent using the radio measurement request action frame.

l

It is sent only to those clients that have the capability to generate beacon reports. The clients indicate their
capabilities through the RRM enabled capabilities IE sent in the association request frames.

l

By default, the beacon request frames are sent at a periodicity of 60 seconds.

Configuring a WLAN SSID for 802.11k Support
You can enable 802.11k support on a WLAN SSID by using the Instant UI or CLI.
In the Instant UI
1. Navigate to the WLAN wizard (click Network>New or Network> Select the WLAN SSID>edit).
2. Click the Security tab.
3. Under Fast Roaming, Select the 802.11k checkbox.
4. Click Next and then click Finish.
To allow the AP and clients to exchange neighbor reports, ensure that the Client match is enabled through RF >
ARM > Client match > Enabled in the UI or by executing the client-match command in the arm configuration
sub-mode.
In the CLI
To enable 802.11k profile:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile )# dot11k
AP)(config)# end
AP)# commit apply

To view the beacon report details:
show ap dot11k-beacon-report 

To view the neighbor details:
show ap dot11k-nbrs

Example
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile dot11k-profile
AP)(SSID Profile "dot11k-profile")# dot11k
AP)(config)# end
AP)# commit apply

BSS Transition Management (802.11v)
The 802.11v standard provides Wireless Network Management enhancements to the IEEE 802.11 MAC and PHY. It
extends radio measurements to define mechanisms for wireless network management of stations including BSS
transition management.
W-IAPs support the generation of the BSS transition management request frames to the 802.11k clients when a
suitable AP is identified for a client through client match.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Wireless Network Profiles | 109

Configuring a WLAN SSID for 802.11v Support
You can enable 802.11v support on a WLAN SSID by using the Instant UI or CLI.
In the Instant UI
1. Navigate to the WLAN wizard (click Network>New or Network> Select the WLAN SSID>edit).
2. Click the Security tab.
3. Under Fast Roaming, Select the 802.11v checkbox.
4. Click Next and then click Finish.
In the CLI
To enable 802.11v profile:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile )# dot11v
AP)(config)# end
AP)# commit apply

Example
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile dot11v-profile
AP)(SSID Profile "dot11v-profile")# dot11v
AP)(config)# end
AP)# commit apply

Editing Status of a WLAN SSID Profile
You can enable or disable an SSID profile in the Instant UI or CLI.

In the Instant UI
To modify the status of a WLAN SSID profile:
1. In the Networks tab, select the network that you want to edit. The edit link is displayed.
2. Click the edit link. The Edit network window is displayed.
3. Select or clear the Disable SSID checkbox to disable or enable the SSID. The SSID is enabled by default.
4. Click Next or the tab name to move to the next tab.
5. Click Finish to save the modifications.

In the CLI
To disable an SSID
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile )# disable
AP)(SSID Profile )# end
AP)# commit apply

To enable an SSID:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile )# enable
AP)(SSID Profile )# end
AP)# commit apply

Editing a WLAN SSID Profile
To edit a WLAN SSID profile:
1. In the Networks tab, select the network that you want to edit. The edit link is displayed.
110 | Wireless Network Profiles

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

2. Click the edit link. The Edit network window is displayed.
3. Modify the required settings. Click Next to move to the next tab.
4. Click Finish to save the modifications.

Deleting a WLAN SSID Profile
To delete a WLAN SSID profile:
1. In the Networks tab, click the network that you want to delete. A x link is displayed against the network to be
deleted.
2. Click x. A delete confirmation window is displayed.
3. Click Delete Now.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Wireless Network Profiles | 111

Chapter 9
Wired Profiles

This chapter describes the following procedures:
l

Configuring a Wired Profile on page 112

l

Assigning a Profile to Ethernet Ports on page 117

l

Editing a Wired Profile on page 117

l

Deleting a Wired Profile on page 118

l

Link Aggregation Control Protocol for W-IAP220 Series on page 118

l

Understanding Hierarchical Deployment on page 119

Configuring a Wired Profile
The Ethernet ports allow third-party devices such as VoIP phones or printers (which support only wired connections)
to connect to the wireless network. You can also configure an Access Control List (ACL) for additional security on
the Ethernet downlink.
The wired profile configuration for employee network involves the following procedures:
1. Configuring Wired Settings on page 112
2. Configuring VLAN for a Wired Profile on page 114
3. Configuring Security Settings for a Wired Profile on page 115
4. Configuring Access Rules for a Wired Profile on page 116
For information on creating a wired profile for guest network, see Captive Portal for Guest Access

Configuring Wired Settings
You can configure wired settings for a wired profile by using the Instant UI or CLI.

In the Instant UI
1. Click the Wired link under More at the top right corner of the Instant main window. The Wired window is
displayed.
2. Click New under Wired Networks. The New Wired Network window is displayed. The following figure shows
the contents of the Wired Settings tab:

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Wired Profiles | 112

Figure 38 New Wired Network Window: Wired Settings Window

3. Click the Wired Settings tab and enter the following information:
a. Name— Specify a name for the profile.
b. Primary Usage — Select Employee or Guest.
c. Speed/Duplex — Ensure that appropriate values are selected for Speed/Duplex. Contact your network
administrator if you need to assign speed and duplex parameters.
d. POE — Set POE to Enabled to enable Power over Ethernet.
The E2 port on W-IAP3WNP supports Power Sourcing Equipment (PSE) to supply power to any compliant 802.3af
powered (class 0-4) device. W-IAP155P supports PSE for 802.3af powered device (class 0-4) on one port (E1 or
E2), or 802.3at powered DC IN (Power Socket) on two ports (E1 and E2).
e. Admin Status — Ensure that an appropriate value is selected. The Admin Status indicates if the port is up or
down.
f. Content Filtering— To ensure that all DNS requests to non-corporate domains on this wired network are sent
to OpenDNS, select Enabled for Content Filtering.
g. Uplink — Select Enabled to configure uplink on this wired profile. If Uplink is set to Enabled and this network
profile is assigned to a specific port, the port will be enabled as Uplink port. For more information on assigning
a wired network profile to a port, see Assigning a Profile to Ethernet Ports on page 117.
h. Spanning Tree—Select the Spanning Tree checkbox to enable Spanning Tree Protocol (STP) on the wired
profile. STP ensures that there are no loops in any bridged Ethernet network and operates on all downlink
ports, regardless of forwarding mode. STP will not operate on the uplink port and is supported only on W-IAPs
with three or more ports. By default Spanning Tree is disabled on wired profiles.
4. Click Next. The VLAN tab details are displayed.
5. Configure VLAN for the wired profile. For more information, see Configuring VLAN for a Wired Profile on page
114.

In the CLI
To configure wired settings for:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

113 | Wired Profiles

AP)(config)#
AP)(wired ap
AP)(wired ap
AP)(wired ap
AP)(wired ap
AP)(wired ap

wired-port-profile 
profile )# type { |}
profile )# speed {10 |100 |1000 |auto}
profile )# duplex {half|full|auto}
profile )# no shutdown
profile )# poe

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

(Instant
(Instant
(Instant
(Instant
(Instant

AP)(wired ap profile
AP)(wired ap profile
AP)(wired ap profile
AP)(wired ap profile
AP)# commit apply

)#
)#
)#
)#

uplink-enable
content-filtering
spanning-tree
end

Configuring VLAN for a Wired Profile
If you are creating a new wired profile, complete the Wired Settings procedure before configuring VLAN. For more
information, see Configuring Wired Settings on page 112.
You can configure VLAN using the Instant UI or CLI.

In the Instant UI
To configure VLAN:
1. In the VLAN tab, enter the following information.
a. Mode — You can specify any of the following modes:
l

Access — Select this mode to allow the port to carry a single VLAN specified as the native VLAN.

l

Trunk — Select this mode to allow the port to carry packets for multiple VLANs specified as allowed
VLANs.

b. Specify any of the following values for Client IP Assignment:
l

Virtual Controller Assigned: Select this option to allow the Virtual Controller to assign IP addresses to
the wired clients. When the Virtual Controller assignment is used, the source IP address is translated for
all client traffic that goes through this interface. The Virtual Controller can also assign a guest VLAN to a
wired client.

l

Network Assigned: Select this option to allow the clients to receive an IP address from the network to
which the Virtual Controller is connected. On selecting this option, the New button to create a VLAN is
displayed. Create a new VLAN if required.

c. If the Trunk mode is selected:
l

Specify the Allowed VLAN, enter a list of comma separated digits or ranges 1,2,5 or 1-4, or all. The
Allowed VLAN refers to the VLANs carried by the port in Access mode.

l

If the Client IP Assignment is set to Network Assigned, specify a value for Native VLAN. A VLAN that
does not have a VLAN ID tag in the frames is referred to as Native VLAN. You can specify a value within
the range of 1-4093.

d. If the Access mode is selected:
l

If the Client IP Assignment is set to Virtual Controller Assigned, proceed to step 2.

l

If the Client IP Assignment is set to Network Assigned, specify a value for Access VLAN to indicate the
VLAN carried by the port in the Access mode.

2. Click Next. The Security tab details are displayed.
3. Configure security settings for the wired profile. For more information, see Configuring Security Settings for a
Wired Profile on page 115.

In the CLI
To configure VLAN settings for a wired profile:
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)#
AP)(wired ap
AP)(wired ap
AP)(wired ap
AP)(wired ap

wired-port-profile 
profile )# switchport-mode {trunk|access}
profile )# allowed-vlan 
profile )# native-vlan {}
profile )# end

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Wired Profiles | 114

(Instant AP)# commit apply

To configure a new VLAN assignment rule:
(Instant AP)(config)# wired-port-profile 
(Instant AP)(wired ap profile )# set-vlan {equals| not-equals| starts-with|
ends-with| contains| matches-regular-expression}  | value-of}
(Instant AP)(wired ap profile )# end
(Instant AP)# commit apply

Configuring Security Settings for a Wired Profile
If you are creating a new wired profile, complete the Wired Settings and VLAN procedures before specifying security
settings. For more information, see Configuring Wired Settings on page 112 and Configuring VLAN Settings for a
WLAN SSID Profile on page 97.

Configuring Security Settings for a Wired Employee Network
You can configure security parameters for an employee network by using the Instant UI or CLI.
In the Instant UI
To configure security parameters for an employee network:
1. Configure the following parameters in the Security tab.
l

MAC authentication — To enable MAC authentication, select Enabled. The MAC authentication is disabled
by default.

l

802.1X authentication — To enable 802.1X authentication, select Enabled.

l

MAC authentication fail-thru — To enable authentication fail-thru, select Enabled. When this feature is
enabled, 802.1X authentication is attempted when MAC authentication fails. The MAC authentication failthru checkbox is displayed only when both MAC authentication and 802.1X authentication are Enabled.

l

Select any of the following options for Authentication server 1:
n

New — On selecting this option, an external RADIUS server must be configured to authenticate the users.
For information on configuring an external server, see Configuring an External Server for Authentication on
page 157.Authentication and User Management on page 140

n

Internal server— If an internal server is selected, add the clients that are required to authenticate with the
internal RADIUS server. Click the Users link to add the users. For information on adding a user, see
Managing W-IAP Users on page 140.

l

Reauth interval — Specify the interval at which all associated and authenticated clients must be
reauthenticated.

l

Load balancing— Set this to Enabled if you are using two RADIUS authentication servers, so that the load
across the two RADIUS servers is balanced. For more information on the dynamic load balancing
mechanism, see Dynamic Load Balancing between Two Authentication Servers on page 154.

2. Click Next. The Access tab details are displayed.
In the CLI
To configure security settings for an employee network:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

115 | Wired Profiles

AP)(config)# wired-port-profile 
AP)(wired ap profile )# mac-authentication
AP)(wired ap profile )# l2-auth-failthrough
AP)(wired ap profile )# auth-server 
AP)(wired ap profile )# server-load-balancing
AP)(wired ap profile )# radius-reauth-interval 
AP)(wired ap profile )# end
AP)# commit apply

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Configuring Access Rules for a Wired Profile
The Ethernet ports allow third-party devices such as VoIP phones or printers (that support only wired connections) to
connect to the wireless network. You can also configure an Access Control List (ACL) for additional security on the
Ethernet downlink.
If you are creating a new wired profile, complete the Wired Settings and configure VLAN and security parameters,
before defining access rules. For more information, see Configuring Wired Settings on page 112, Configuring VLAN
for a Wired Profile on page 114, and Configuring Security Settings for a Wired Profile on page 115.
You can configure access rules by using the Instant UI or CLI.

In the Instant UI
To configure access rules:
1. In the Access tab, configure the following access rule parameters.
a. Select any of the following types of access control:
l

Role-based— Allows the users to obtain access based on the roles assigned to them.

l

Unrestricted— Allows the users to obtain unrestricted access on the port.

l

Network-based— Allows the users to be authenticated based on access rules specified for a network.

b. If the Role-based access control is selected, perform the following steps:
Under Roles, select an existing role for which you want to apply the access rules, or click New and add
the required role. The list of roles defined for all networks is displayed under Roles.

l

The default role with the same name as the network, is automatically defined for each network. The default roles
cannot be modified or deleted.
l

Select the access rule associated with a specific role and modify if required. To add a new access rule,
click New in the Access Rules window. You can configure up to 64 access rules. For more information on
configuring access rules, see Configuring Access Rules for Network Services on page 177.

l

Configure rules to assign roles for an authenticated client. You can also configure rules to derive VLANs
for the wired network profile. For more information on role assignment rules and VLAN derivation rules, see
Configuring Derivation Rules on page 192 and Configuring VLAN Derivation Rules on page 196.

l

Select the Assign pre-authentication role checkbox to add a pre-authentication role that allows some
access to the users before the client authentication.

l

Select the Enforce Machine Authentication checkbox, to configure access rights to clients based on
whether the client device supports machine authentication. Select the Machine auth only and User auth
only rules. Machine Authentication is only supported on Windows devices and devices such as iPads.
If Enforce Machine Authentication is enabled, both the device and the user must be authenticated for
the role assignment rule to apply.

2. Click Finish.

In the CLI
To configure access rules for a wired profile:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wired-port-profile 
AP)(wired ap profile )# access-rule-name 
AP)(wired ap profile )# end
AP)# commit apply

To configure role assignment rules:
Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Wired Profiles | 116

(Instant AP)(config)# wired-port-profile 
(Instant AP)(wired ap profile )# set-role {{equals| not-equal| starts-with|
ends-with| contains| matches-regular-expression} | value-of}
(Instant AP)(wired ap profile )# end
(Instant AP)# commit apply

To configure a pre-authentication role:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wired-port-profile 
AP)(wired ap profile )# set-role-pre-auth 
AP)(wired ap profile )# end
AP)# commit apply

To configure machine and user authentication roles:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wired-port-profile 
AP)(wired ap profile )# set-role-machine-auth  
AP)(wired ap profile )# end
AP)# commit apply

To configure unrestricted access:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wired-port-profile 
AP)(wired ap profile )# set-role-unrestricted
AP)(wired ap profile )# end
AP)# commit apply

Assigning a Profile to Ethernet Ports
You can assign profiles to Ethernet ports using the Instant UI or CLI.

In the Instant UI
To assign profiles to Ethernet ports:
1. Click the Wired link under More at the top right corner of the Instant main window. The Wired window is
displayed.
2. To assign an Ethernet downlink profile to Ethernet 0 port:
a. Ensure that the wired bridging on the port is enabled. For more information, see Configuring Wired Bridging on
Ethernet 0 for Mesh Point on page 304.
b. Select and assign a profile from the 0/0 drop down list.
c. To assign a wired profile to Ethernet 0/1 port, select the profile from the 0/1 drop down list.
d. If the W-IAP supports E2, E3 and E4 ports, assign profiles to other Ethernet ports by selecting a profile from
the 0/2, 0/3, and 0/4 drop-down list.

In the CLI
To assign profiles to Ethernet ports:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# enet0-port-profile
AP)(config)# enet1-port-profile
AP)(config)# enet2-port-profile
AP)(config)# enet3-port-profile
AP)(config)# enet4-port-profile
AP)(config)# end
AP)# commit apply







Editing a Wired Profile
To edit a wired profile:

117 | Wired Profiles

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

1. Click the Wired link under More at the top right corner of the Instant main window. The Wired window is
displayed.
2. In the Wired window, select the wired profile to modify.
3. Click Edit. The Edit Wired Network window is displayed.
4. Modify the required settings.
5. Click Finish to save the modifications.

Deleting a Wired Profile
To delete a wired profile:
1. Click the Wired link under More at the top right corner of the Instant main window. The Wired window is
displayed.
2. In the Wired window, select the wired profile to delete.
3. Click Delete. The wired profile is deleted.

Link Aggregation Control Protocol for W-IAP220 Series
W-IAP220 Series supports the IEEE 802.11ac standard for high-performance WLAN. To support maximum traffic,
port aggregation is required as it increases throughput and enhances reliability. To support port aggregation, Instant
supports Link Aggregation Control Protocol (LACP) based on the IEEE 802.3ad standard. 802.3ad standard for
Ethernet aggregation uses LACP as a method to manage link configuration and balance traffic among aggregated
ports.
LACP provides a standardized means for exchanging information with partner systems to form a dynamic link
aggregation group. The LACP feature is automatically enabled during W-IAP boots and it dynamically detects the AP
if connected to a partner system with LACP capability, by checking if there is any LACP Protocol Data Unit (PDU)
received on either eth0 or eth1 port.
If the switch in the cluster has the LACP capability, you can combine eth0 and eth1 interfaces into the link
aggregation group to form a single logical interface (port-channel). Port-channels can be used to provide additional
bandwidth or link redundancy between two devices. W-IAP220 Series supports link aggregation using either
standard port-channel (configuration based) or Link Aggregation Control Protocol (protocol signaling based). WIAP220 Series can optionally be deployed with LACP configuration to benefit from the higher (greater than 1 Gbps)
aggregate throughput capabilities of the two radios.
The LACP feature is supported only on W-IAP220 Series.

There is no configuration required on the AP for enabling LACP support. However, you can view the status of LACP
on W-IAPs by using the following command:
(Instant AP)# show lacp status
AP LACP Status
-------------Link Status LACP Rate Num Ports Actor Key Partner Key Partner MAC
----------- --------- --------- --------- ----------- ----------Up slow 2 17 1 70:81:05:11:3e:80
Slave Interface Status
---------------------Slave I/f Name Permanent MAC Addr Link Status Member of LAG Link Fail Count
-------------- ------------------ ----------- ------------- --------------eth0 6c:f3:7f:c6:76:6e Up Yes 0
eth1 6c:f3:7f:c6:76:6f Up Yes 0
Traffic Sent on Enet Ports

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Wired Profiles | 118

-------------------------Radio Num Enet 0 Tx Count Enet 1 Tx Count
--------- --------------- --------------0 0 0
1 0 0
non-wifi 2 17

Understanding Hierarchical Deployment
A W-IAP130 Series or W-IAP3WN (with more than one wired port) can be connected to the downlink wired port of
another W-IAP (ethX). A W-IAP with a single Ethernet port (like W-IAP90 or W-IAP100 series devices) can be
provisioned to use Ethernet bridging, so that Ethernet 0 port is converted to a downlink wired port.
You can also form a W-IAP network by connecting the downlink port of an AP to other APs. Only one AP in the
network uses its downlink port to connect to the other APs. This AP (called the root AP) acts as the wired device for
the network, provides DHCP service and an L3 connection to the ISP uplink with NAT. The root AP is always the
master of the Instant network. In a single Ethernet port platform deployment, the root AP must be configured to use
the 3G uplink.
A typical hierarchical deployment consists of the following:
l

A direct wired ISP connection or a wireless uplink.

l

One or more DHCP pools for private VLANs.

l

One downlink port configured on a private VLAN without authentication for connecting to slave APs. Ensure that
the downlink port configured in a private VLAN is not used for any wired client connection. Other downlink ports
can be used for connecting to the wired clients.

The following figure illustrates a hierarchical deployment scenario:
Figure 39 Hierarchical Deployment

119 | Wired Profiles

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Chapter 10
Captive Portal for Guest Access

This chapter provides the following information:
l

Understanding Captive Portal on page 120

l

Configuring a WLAN SSID for Guest Access on page 121

l

Configuring Wired Profile for Guest Access on page 125

l

Configuring Internal Captive Portal for Guest Network on page 126

l

Configuring External Captive Portal for a Guest Network on page 129

l

Configuring External Captive Portal Authentication Using ClearPass Guest on page 132

l

Configuring Guest Logon Role and Access Rules for Guest Users on page 133

l

Configuring Captive Portal Roles for an SSID on page 135

l

Configuring Walled Garden Access on page 138

l

Disabling Captive Portal Authentication on page 138

Understanding Captive Portal
Instant supports the captive portal authentication method, where a Web page is presented to the guest users when
they try to access the Internet whether in hotels, conference centers or Wi-Fi hotspots. The Web page also prompts
the guest users to authenticate or accept the usage policy and terms. captive portals are used at many Wi-Fi
hotspots and can be used to control wired access as well.
The Instant captive portal solution consists of the following:
l

The captive portal Web login page hosted by an internal or external server.

l

The RADIUS authentication or user authentication against W-IAP's internal database.

l

The SSID broadcast by the W-IAP.

With Instant, the administrators can create a wired or WLAN guest network based on captive portal authentication
for guests, visitors, contractors, and any non-employee users who can use the enterprise Wi-Fi network. The
administrators can also create guest accounts and customize the captive portal page with organization-specific logo,
terms, and usage policy. With captive portal authentication and guest profiles, the devices associating with the
guest SSID are assigned an initial role and are assigned IP addresses. When a guest user tries to access a URL
through HTTP or HTTPS, the captive portal web page prompting the user to authenticate with a user name and
password is displayed.

Types of Captive Portal
Instant supports the following types of captive portal authentication:
l

Internal captive portal — For Internal captive portal authentication, an internal server is used for hosting the
captive portal service. It supports the following types of authentication:
n

Internal Authenticated— When Internal Authenticated is enabled, a guest user must authenticate in the
captive portal page to access the Internet. The guest users who are required to authenticate must already be
added to the user database.

n

Internal Acknowledged— When Internal Acknowledged is enabled, a guest user must accept the terms
and conditions to access the Internet.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Captive Portal for Guest Access | 120

l

External captive portal— For external captive portal authentication, an external portal on the cloud or on a server
outside the enterprise network is used.

Walled Garden
The administrators can also control the resources that the guest users can access and the amount of bandwidth or
air time they can use at any given time. When an external captive portal is used, the administrators can configure a
walled garden, which determines access to the URLs requested by the guest users. For example, a hotel
environment where the unauthenticated users are allowed to navigate to a designated login page (for example, a
hotel website) and all its contents. The users who do not sign up for the Internet service can view only the “allowed”
websites (typically hotel property websites).
The administrators can allow or block access to specific URLs by creating a whitelist and blacklist. When the users
attempt to navigate to other websites, which are not in the whitelist of the walled garden profile, the users are
redirected to the login page. If the requested URL is on the blacklist, it is blocked. If it appears on neither list, the
request is redirected to the external captive portal.

Configuring a WLAN SSID for Guest Access
You create an SSID for guest access by using the Instant UI or CLI:

In the Instant UI
1. In the Networks tab of the Instant main window, click the New link. The New WLAN window is displayed.
2. Enter a name that uniquely identifies a wireless network in the Name (SSID) text box.
3. Based on the type of network profile, specify the Primary usage as Guest.
4. Click the Show advanced options link. The advanced options for configuration are displayed.
5. Enter the required values for the following configuration parameters:
Table 22: WLAS SSID Configuration Parameters for Guest Network
Parameters
Broadcast/Multicast

Description
Select any of the following values under Broadcast filtering:
All—When set to All, the W-IAP drops all broadcast and multicast frames
except DHCP and ARP.
l ARP—When set to ARP, the W-IAP converts ARP requests to unicast and
send frames directly to the associated client.
l Disabled— When set to Disabled, all broadcast and multicast traffic is
forwarded.
l

DTIM interval

The DTIM interval indicates the delivery traffic indication message (DTIM) period
in beacons, which can be configured for every WLAN SSID profile. The
DTIM interval determines how often the W-IAP should deliver the buffered
broadcast and multicast frames to associated clients in the powersave mode.
The default value is 1, which means the client checks for buffered data on the WIAP at every beacon. You can also configure a higher DTIM value for power
saving.

Multicast transmission
optimization

Select Enabled if you want the W-IAP to select the optimal rate for sending
broadcast and multicast frames based on the lowest of unicast rates across all
associated clients. When this option is enabled, multicast traffic can be sent at up
to 24 Mbps. The default rate for sending frames for 2.4 GHz is 1 Mbps and 5.0
GHz is 6 Mbps. This option is disabled by default.

121 | Captive Portal for Guest Access

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Parameters

Description

Dynamic multicast optimization

Select Enabled to allow W-IAP to convert multicast streams into unicast streams
over the wireless link. Enabling Dynamic Multicast Optimization (DMO)
enhances the quality and reliability of streaming video, while preserving the
bandwidth available to the non-video clients.

DMO channel utilization threshold

Specify a value to set a threshold for DMO channel utilization. With DMO, the WIAP converts multicast streams into unicast streams as long as the channel
utilization does not exceed this threshold. The default value is 90% and the
maximum threshold value is 100%. When the threshold is reached or exceeds
the maximum value, the W-IAP sends multicast traffic over the wireless link.
NOTE: When you enable DMO on multicast SSID profiles, ensure that the DMO
feature is enabled on all SSIDs configured in the same VLAN.

Transmit Rates

Specify the following parameters:
2.4 GHz—If the 2.4 GHz band is configured on the W-IAP, specify the
minimum and maximum transmission rate. The default value for minimum
transmission rate is 1 Mbps and maximum transmission rate is 54 Mbps.
l 5 GHz—If the 5 GHz band is configured on the W-IAP, specify the minimum
and maximum transmission rate. The default value for minimum transmission
rate is 6 Mbps and maximum transmission rate is 54 Mbps.
l

Zone

Bandwidth Limits

Specify the zone for the SSID. When the zone is defined in SSID profile and if the
same zone is defined on a W-IAP, the SSID is created on that W-IAP. For more
information on configuring zone details on an IAP, see Configuring Zone
Settings on a W-IAP on page 84.
The following constraints apply to the zone configuration:
l A W-IAP can belong to only one zone and only one zone can be configured
on an SSID.
l If an SSID belongs to a zone, all W-IAPs in this zone can broadcast this SSID.
If no W-IAP belongs to the zone configured on the SSID, the SSID is not
broadcast.
l If an SSID does not belong to any zone, all W-IAPs can broadcast this SSID.
Select any of the following checkboxes to specify the bandwidth limit:
Airtime—Select this checkbox to specify an aggregate amount of airtime that
all clients in this network can use for sending and receiving data. Specify the
airtime percentage.
l Each user— Select this checkbox to specify a throughput for any single user
in this network. Specify the throughput value in Kbps.
l Each radio— Select this checkbox to specify an aggregate amount of
throughput that each radio is allowed to provide for the connected clients.
l

Wi-Fi Multimedia (WMM) traffic
management

Configure the following options for WMM traffic management. WMM supports
voice, video, best effort, and background access categories. To allocate
bandwidth for the following types of traffic, specify a percentage value under
Share. To configure DSCP mapping, specify a value under DSCP Mapping.
l Background WMM: For background traffic such as file downloads or print
jobs.
l Best effort WMM — For best effort traffic such as traffic from legacy devices or
traffic from applications or devices that do not support QoS.
l Video WMM — For video traffic generated from video streaming.
l Voice WMM— For voice traffic generated from the incoming and outgoing
voice communication.
For more information on WMM traffic and DSCP mapping, see Wi-Fi Multimedia
Traffic Management on page 251

Content filtering

Set to Enabled to route all DNS requests for the non-corporate domains to
OpenDNS on this network.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Captive Portal for Guest Access | 122

Parameters

Description

Band

Select a value to specify the band at which the network transmits radio signals.
You can set the band to 2.4 GHz, 5 GHz, or All. The All option is selected by
default.

Inactivity timeout

Specify a timeout interval. If a client session is inactive for the specified duration,
the session expires and the users are required to log in again. The minimum
value is set to 60 seconds and the default value is 1000 seconds.

Hide SSID

Select the checkbox if you do not want the SSID (network name) to be visible to
users

Disable SSID

Select to the checkbox to disable the SSID. On selecting this checkbox, the SSID
is disabled, but not removed from the network. By default, all SSIDs are enabled.

Can be used without Uplink

Select the checkbox if you do not want the SSID users to use uplink.

Max clients threshold

Specify the maximum number of clients that can be configured for each BSSID
on a WLAN in the text box. You can specify a value within the range of 0 to 255.
The default value is 64.

Local probe request threshold

Specify a threshold value in the Local probe request threshold text box to limit
the number of incoming probe requests. When a client sends a broadcast probe
request frame to search for all available SSIDs, this option controls system
response for this network profile and ignores probe requests if required. You can
specify a Received signal strength indication (RSSI) value within range of 0 to
100 dB.

6. Click Next to configure VLAN settings. The VLAN tab contents are displayed.
7. Select any for the following options for Client IP assignment:
l

Virtual Controller assigned—On selecting this option, the client obtains the IP address from the Virtual
Controller.

l

Network assigned—On selecting this option, the IP address is obtained from the network.

8. Based on the type client IP assignment mode selected, you can configure the VLAN assignment for clients as
described in the following table:

123 | Captive Portal for Guest Access

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 23: IP and VLAN Assignment for WLAN SSID Clients
Client IP Assignment

Client VLAN Assignment

Virtual Controller assigned

If the Virtual Controller assigned is selected for client IP assignment, the Virtual
Controller creates a private subnet and VLAN on the W-IAP for the wireless clients. The
network address translation for all client traffic that goes out of this interface is carried out
at the source. This setup eliminates the need for complex VLAN and IP address
management for a multi-site wireless network.
On selecting this option, the following client VLAN assignment options are displayed:
l
l

Network assigned

Default: When selected, the default VLAN as determined by the Virtual Controller is
assigned for clients.
Custom: When selected, you can specify a custom VLAN assignment option. You can
select an existing DHCP scope for client IP and VLAN assignment or you can create
a new DHCP scope by selecting New. For more information on DHCP scopes, see
Configuring DHCP Scopes on page 201.

If the Network assigned is selected, you can specify any of the following options for the
Client VLAN assignment.
l Default— On selecting this option, the client obtains the IP address in the same
subnet as the W-IAPs. By default, the client VLAN is assigned to the native VLAN on
the wired network.
l Static— On selecting this option, you need to specify a single VLAN, a comma
separated list of VLANS, or a range of VLANs for all clients on this network. Select
this option for configuring VLAN pooling.
l Dynamic— On selecting this option, you can assign the VLANs dynamically from a
Dynamic Host Configuration Protocol (DHCP) server. To create VLAN assignment
rules, click New to assign the user to a VLAN. In the New VLAN Assignment Rule
window, enter the following information:
l
l
l
l

Attribute— Select an attribute returned by the RADIUS server during
authentication.
Operator— Select an operator for matching the string.
String— Enter the string to match
VLAN— Enter the VLAN to be assigned.

9. Click Next to configure internal or external captive portal authentication, roles and access rules for the guest
users.

In the CLI
To configure WLAN settings for an SSID profile:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile )# essid 
AP)(SSID Profile )# type 
AP)(SSID Profile )# broadcast-filter 
AP)(SSID Profile # dtim-period 
AP)(SSID Profile )# multicast-rate-optimization
AP)(SSID Profile )# dynamic-multicast-optimization
AP)(SSID Profile )# dmo-channel-utilization-threshold
AP)(SSID Profile )# a-max-tx-rate 
AP)(SSID Profile )# a-min-tx-rate 
AP)(SSID Profile )# g-max-tx-rate 
AP)(SSID Profile )# g-min-tx-rate 
AP)(SSID Profile )# zone 
AP)(SSID Profile )# bandwidth-limit 
AP)(SSID Profile )# per-user-bandwidth-limit 
AP)(SSID Profile )# air-time-limit 
AP)(SSID Profile )# wmm-background-share 
AP)(SSID Profile )# wmm-best-effort-share
AP)(SSID Profile )# wmm-video-share 
AP)(SSID Profile )# wmm-voice-share 

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Captive Portal for Guest Access | 124

(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(SSID
AP)(SSID
AP)(SSID
AP)(SSID
AP)(SSID
AP)(SSID
AP)(SSID

Profile
Profile
Profile
Profile
Profile
Profile
Profile

)#
)#
)#
)#
)#
)#
)#

rf-band {<2.4>|<5.0>|}
content-filtering
hide-ssid
inactivity-timeout 
work-without-uplink
local-probe-req-thresh 
max-clients-threshold 

To manually assign VLANs for WLAN SSID users:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile # vlan 

To enforce DHCP-based VLAN assignment:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile # enforce-dhcp

To create a new VLAN assignment rule:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile )# set-vlan {equals|not-equals| starts-with| endswith| contains|matches-regular-expression}  | value-of}

Configuring Wired Profile for Guest Access
You can configure wired settings for a wired profile by using the Instant UI or CLI.

In the Instant UI
1. Click the Wired link under More at the top right corner of the Instant main window. The Wired window is
displayed.
2. Click New under Wired Networks. The New Wired Network window is displayed.
3. Click the Wired Settings tab and enter the following information:
a. Name— Specify a name for the profile.
b. Primary Usage — Select Employee or Guest.
c. Speed/Duplex — Ensure that appropriate values are selected for Speed/Duplex. Contact your network
administrator if you need to assign speed and duplex parameters.
d. POE — Set POE to Enabled to enable Power over Ethernet.
e. Admin Status — Ensure that an appropriate value is selected. The Admin Status indicates if the port is up or
down.
f. Content Filtering— To ensure that all DNS requests to non-corporate domains on this wired network are sent
to OpenDNS, select Enabled for Content Filtering.
g. Uplink — Select Enabled to configure uplink on this wired profile. If Uplink is set to Enabled and this network
profile is assigned to a specific port, the port will be enabled as Uplink port. For more information on assigning
a wired network profile to a port, see Assigning a Profile to Ethernet Ports on page 117.
h. Spanning Tree—Select the Spanning Tree checkbox to enable Spanning Tree Protocol (STP) on the wired
profile. STP ensures that there are no loops in any bridged Ethernet network and operates on all downlink
ports, regardless of forwarding mode. STP will not operate on the uplink port and is supported only on W-IAPs
with three or more ports. By default Spanning Tree is disabled on wired profiles.
4. Click Next. The VLAN tab details are displayed.
5. Enter the following information.
a. Mode — You can specify any of the following modes:
l

Access — Select this mode to allow the port to carry a single VLAN specified as the native VLAN.

125 | Captive Portal for Guest Access

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

l

Trunk — Select this mode to allow the port to carry packets for multiple VLANs specified as allowed
VLANs.

b. Specify any of the following values for Client IP Assignment:
l

Virtual Controller Assigned: Select this option to allow the Virtual Controller to assign IP addresses to
the wired clients. When the Virtual Controller assignment is used, the source IP address is translated for
all client traffic that goes through this interface. The Virtual Controller can also assign a guest VLAN to a
wired client.

l

Network Assigned: Select this option to allow the clients to receive an IP address from the network to
which the Virtual Controller is connected. On selecting this option, the New button to create a VLAN is
displayed. Create a new VLAN if required.

c. If the Trunk mode is selected:
l

Specify the Allowed VLAN, enter a list of comma separated digits or ranges 1,2,5 or 1-4, or all. The
Allowed VLAN refers to the VLANs carried by the port in Access mode.

l

If the Client IP Assignment is set to Network Assigned, specify a value for Native VLAN. A VLAN that
does not have a VLAN ID tag in the frames is referred to as Native VLAN. You can specify a value within
the range of 1-4093.

d. If the Access mode is selected:
l

If the Client IP Assignment is set to Virtual Controller Assigned, proceed to step 2.

l

If the Client IP Assignment is set to Network Assigned, specify a value for Access VLAN to indicate the
VLAN carried by the port in the Access mode.

6. Click Next to configure internal or external captive portal authentication, roles and access rules for the guest
users.

In the CLI
To configure wired settings for:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)#
AP)(wired ap
AP)(wired ap
AP)(wired ap
AP)(wired ap
AP)(wired ap
AP)(wired ap
AP)(wired ap
AP)(wired ap

wired-port-profile 
profile )# type 
profile )# speed {10 |100 |1000 |auto}
profile )# duplex {half|full|auto}
profile )# no shutdown
profile )# poe
profile )# uplink-enable
profile )# content-filtering
profile )# spanning-tree

To configure VLAN settings for a wired profile:
(Instant
(Instant
(Instant
(Instant

AP)(config)#
AP)(wired ap
AP)(wired ap
AP)(wired ap

wired-port-profile 
profile )# switchport-mode {trunk|access}
profile )# allowed-vlan 
profile )# native-vlan {}

To configure a new VLAN assignment rule:
(Instant AP)(config)# wired-port-profile 
(Instant AP)(wired ap profile )# set-vlan {equals| not-equals| starts-with|
ends-with| contains| matches-regular-expression}  | value-of}

Configuring Internal Captive Portal for Guest Network
In the Internal Captive Portal type, an internal server is used for hosting the captive portal service. You can configure
internal captive portal authentication when adding or editing a guest network created for wireless or wired profile
through the Instant UI or CLI.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Captive Portal for Guest Access | 126

In the Instant UI
1. Navigate to the WLAN wizard or Wired window.
l

To configure internal captive portal authentication for a WLAN SSID, in the Network tab, click New to create
a new network profile or edit to modify an existing profile.

l

To configure internal captive portal authentication for a wired profile, click More>Wired. In the Wired window,
click New under Wired Networks to create a new network, or click Edit to select an existing profile.

2. Click the Security tab and assign values for the configuration parameters:
Table 24: Internal Captive Portal Configuration Parameters
Parameter
Splash page type

Description
Select any of the following from the drop-down list.
Internal - Authenticated—When Internal Authenticated is enabled, the guest
users are required to authenticate in the captive portal page to access the
Internet. The guest users who are required to authenticate must already be
added to the user database.
l Internal - Acknowledged— When Internal Acknowledged is enabled, the guest
users are required to accept the terms and conditions to access the Internet.
l

MAC authentication

Select Enabled from the drop-down list to enable the MAC authentication.

WISPr

Select Enabled if you want to enable WISPr authentication. For more information on
WISPr authentication, see Configuring WISPr Authentication on page 170.

(Applicable for WLAN SSIDs
only.)

Auth server 1
Auth server 2

NOTE: The WISPr authentication is applicable only for Internal-Authenticated splash
pages and is not applicable for wired profiles.
Select any one of the following:
A server from the list of servers if the server is already configured.
l Internal Server to authenticate user credentials at run time.
l Select New for configuring a new external RADIUS or LDAP server for
authentication.
l

Load balancing

Select Enabled to enable load balancing if two authentication servers are used.

Reauth interval

Select a value to allow the APs to periodically reauthenticate all associated and
authenticated clients.

Blacklisting

If you are configuring a wireless network profile, select Enabled to enable
blacklisting of the clients with a specific number of authentication failures.

(Applicable for WLAN SSIDs
only.)
Accounting mode
(Applicable for WLAN SSIDs
only.)

127 | Captive Portal for Guest Access

Select an accounting mode from Accounting mode for posting accounting
information at the specified Accounting interval. When the accounting mode is set to
Authentication, the accounting starts only after client authentication is successful
and stops when the client logs out of the network. If the accounting mode is set to
Association, the accounting starts when the client associates to the network
successfully and stops when the client is disconnected.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Parameter

Description

Disable if uplink type is

To exclude uplink, select an uplink type.

Encryption

Select Enabled to configure encryption parameters.

(Applicable for WLAN SSIDs
only.)
Splash Page Design

Under Splash Page Visuals, use the editor to specify text and colors for the initial
page that will be displayed to the users connecting to the network. The initial page
asks for user credentials or email, depending on the splash page type (Internal Authenticated or Internal -Acknowledged) for which you are customizing the splash
page design. Perform the following steps to customize the splash page design.
l To change the color of the splash page, click the Splash page rectangle and
select the required color from the Background Color palette.
l To change the welcome text, click the first square box in the splash page, type
the required text in the Welcome text box, and click OK. Ensure that the welcome
text does not exceed 127 characters.
l To change the policy text, click the second square in the splash page, type the
required text in the Policy text box, and click OK. Ensure that the policy text does
not exceed 255 characters.
l To upload a custom logo, click Upload your own custom logo Image, browse the
image file, and click upload image. Ensure that the image file size does not
exceed 16 KB.
l To redirect users to another URL, specify a URL in Redirect URL.
l Click Preview to preview the Captive Portal page.
NOTE: You can customize the captive portal page using double-byte characters.
Traditional Chinese, Simplified Chinese, and Korean are a few languages that use
double-byte characters. Click on the banner, term, or policy in the Splash Page
Visuals to modify the text in the red box. These fields accept double-byte characters
or a combination of English and double-byte characters.

3. Click Next to configure access rules.

In the CLI
To configure internal captive portal authentication:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile )# essid 
(Instant AP)(SSID Profile )# type 
(Instant AP)(SSID Profile )# captive-portal  exclude-uplink
{3G|4G|Wifi|Ethernet}
(Instant AP)(SSID Profile )# mac-authentication
(Instant AP)(SSID Profile )# auth-server 
(Instant AP)(SSID Profile )# radius-reauth-interval 
(Instant AP)(SSID Profile )# end
(Instant AP)# commit apply

To configure internal captive portal for a wired profile:
(Instant AP) (config)# wired-port-profile 
(Instant AP) (wired ap profile )# type 
(Instant AP) (wired ap profile )# captive-portal {| } exclude-uplink {3G|4G|Wifi|Ethernet}
(Instant AP) (wired ap profile )# mac-authentication
(Instant AP) (wired ap profile )# auth-server 
(Instant AP) (wired ap profile )# radius-reauth-interval 
(Instant AP) (wired ap profile )# end
(Instant AP)# commit apply

To customize internal captive portal splash page:

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Captive Portal for Guest Access | 128

(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan captive-portal
AP)(Captive Portal)# authenticated
AP)(Captive Portal)# background-color 
AP)(Captive Portal)# banner-color 
AP)(Captive Portal)# banner-text 
AP)(Captive Portal)# decoded-texts 
AP)(Captive Portal)# redirect-url 
AP)(Captive Portal)# terms-of-use 
AP)(Captive Portal)# use-policy 
AP)(Captive Portal)# end
AP)# commit apply

To upload a customized logo from a TFTP server to the W-IAP:
(Instant AP)# copy config tftp   portal logo

Configuring External Captive Portal for a Guest Network
This section provides the following information:
l

External Captive Portal Profiles on page 129

l

Creating a Captive Portal Profile on page 129

l

Configuring an SSID or Wired Profile to Use External Captive Portal Authentication on page 131

External Captive Portal Profiles
You can now configure external captive portal profiles and associate these profiles to a user role or SSID. You can
create a set of captive portal profiles in the Security>External Captive Portal window and associate these profiles
with an SSID or a wired profile. You can also create a new captive portal profile under the Security tab of the WLAN
wizard or a Wired Network window. In the current release, you can configure up to eight external captive portal
profiles.
When the captive portal profile is associated to an SSID, it is used before user authentication. If the profile is
associated to a role, it is used only after the user authentication. When a captive portal profile is applied to an SSID
or wired profile, the users connecting to the SSID or wired network are assigned a role with the captive portal rule.
The guest user role allows only DNS and DHCP traffic between the client and network, and directs all HTTP or
HTTPS requests to the captive portal unless explicitly permitted.

Creating a Captive Portal Profile
You can create a captive portal profile using the Instant UI or CLI.

In the Instant UI
1. Click Security>External Captive Portal.
2. Click New. The New pop-up window is displayed.
3. Specify values for the following parameters:

129 | Captive Portal for Guest Access

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 25: Captive Portal Profile Configuration Parameters
Parameter

Description

Name

Enter a name for the profile.

Type

Select any one of the following types of authentication:
l
l

Radius Authentication - Select this option to enable user authentication against a RADIUS
server.
Authentication Text - Select this option to specify an authentication text. The specified text
will be returned by the external server after a successful user authentication.

IP or hostname

Enter the IP address or the hostname of the external splash page server.

URL

Enter the URL for the external captive portal server.

Port

Enter the number of the port to use for communicating with the external captive portal server.

Use https

Select Enabled to enforce clients to use HTTPS to communicate with the captive portal server.

(Available only if
RADIUS
Authentication is
selected)
Captive Portal failure

This field allows you to configure Internet access for the guest clients when the external
captive portal server is not available. Select Deny Internet to prevent clients from using the
network, or Allow Internet to allow the guest clients to access Internet when the external
captive portal server is not available.

Automatic URL
Whitelisting

Select Enabled or Disabled to enable or disable automatic whitelisting of URLs. On selecting
the checkbox for the external captive portal authentication, the URLs that are allowed for the
unauthenticated users to access are automatically whitelisted. The automatic URL whitelisting
is disabled by default.

Auth Text

If the External Authentication splash page is selected, specify the authentication text that must
be returned by the external server after successful authentication.

(Available only if
Authentication Text is
selected)
Redirect URL

Specify a redirect URL if you want to redirect the users to another URL.

In the CLI
To configure an external Captive Portal profile:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan external-captive-portal [profile_name]
AP)(External Captive Portal)# server 
AP)(External Captive Portal)# port 
AP)(External Captive Portal)# url 
AP)(External Captive Portal)# https
AP)(External Captive Portal)# redirect-url 
AP)(External Captive Portal)# server-fail-through
AP)(External Captive Portal)# no auto-whitelist-disable
AP)(External Captive Portal)# end
AP)# commit apply

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Captive Portal for Guest Access | 130

Configuring an SSID or Wired Profile to Use External Captive Portal Authentication
You can configure external captive portal authentication for a network profile when adding or editing a guest network
using the Instant UI or CLI.

In the Instant UI
1. Navigate to the WLAN wizard or Wired window.
l

To configure external captive portal authentication for a WLAN SSID, in the Network tab, click New to create a
new network profile or edit to modify an existing profile.

l

To configure external captive portal authentication for a wired profile, click More>Wired. In the Wired window,
click New under Wired Networks to create a new network, or click Edit to select an existing profile.

2. In the Security tab, select External from the Splash page type drop-down list.
3. From the captive portal profile drop-down list, select a profile. You can select a default profile, or an already
existing profile, or click New and create a new profile.
4. Configure the following parameters based on the type of splash page you selected.
Table 26: External Captive Portal Configuration Parameters
Parameter

Description

WISPr

Select Enabled if you want to enable WISPr authentication. For more information on WISPr
authentication, see Configuring WISPr Authentication on page 170.
NOTE: The WISPr authentication is applicable only for the External - RADIUS Server and
Internal-Authenticated splash pages and is not applicable for wired profiles.

MAC authentication

Select Enabled if you want to enable MAC authentication. For information on MAC
authentication, see Configuring MAC Authentication for a Network Profile on page 165.
To configure an authentication server, select any of the following options:
If the server is already configured, select the server from the list.
l To create new external RADIUS server, select New. For more information, see Configuring
an External Server for Authentication on page 157.

Authentication
server

l

Reauth interval

Specify a value for the reauthentication interval at which the APs periodically reauthenticate all
associated and authenticated clients.

Accounting mode

Select an accounting mode from Accounting mode for posting accounting information at the
specified Accounting interval. When the accounting mode is set to Authentication, the
accounting starts only after client authentication is successful and stops when the client logs
out of the network. If the accounting mode is set to Association, the accounting starts when the
client associates to the network successfully and stops when the client is disconnected.

Blacklisting

If you are configuring a wireless network profile, select Enabled to enable blacklisting of the
clients with a specific number of authentication failures.

Max authentication
failures

If you are configuring a wireless network profile and the Blacklisting is enabled, specify a
maximum number of authentication failures after which users who fail to authenticate must be
dynamically blacklisted.

131 | Captive Portal for Guest Access

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 26: External Captive Portal Configuration Parameters
Parameter

Description

Walled garden

Click the link to open the Walled Garden window. The walled garden configuration determines
access to the websites. For more information, see Configuring Walled Garden Access on page
138.

Disable if uplink type
is

Select the type of the uplink to exclude.

Encryption

Select Enabled to configure encryption settings and specify the encryption parameters.

5. Click Next to continue and then click Finish to apply the changes.
In the CLI
To configure security settings for guest users of the WLAN SSID profile:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile )# essid 
(Instant AP)(SSID Profile )# type 
(Instant AP)(SSID Profile )# captive-portal{[exclude-uplink ]| external
[exclude-uplink | profile [exclude-uplink ]]}
(Instant AP)(SSID Profile )# blacklist
(Instant AP)(SSID Profile )# mac-authentication
(Instant AP)(SSID Profile )# max-authentication-failures 
(Instant AP)(SSID Profile )# auth-server 
(Instant Access Point (SSID Profile )# radius-accounting
(Instant Access Point (SSID Profile )# radius-interim-accounting-interval
(Instant Access Point (SSID Profile )# radius-accounting-mode {user-association|userauthentication}
(Instant AP)(SSID Profile )# wpa-passphrase 
(Instant AP)(SSID Profile )# wep-key  
(Instant AP)(SSID Profile )# end
(Instant AP)# commit apply

To configure security settings for guest users of the wired profile:
(Instant AP)(config)# wired-port-profile 
(Instant AP)(wired ap profile )# type 
(Instant AP)(wired ap profile )# captive-portal{[exclude-uplink ]| external
[exclude-uplink | profile [exclude-uplink ]]}
(Instant AP)(wired ap profile )# mac-authentication
(Instant AP)(wired ap profile )# end
(Instant AP)# commit apply

Configuring External Captive Portal Authentication Using ClearPass Guest
You can configure Instant to point to ClearPass Guest as an external Captive Portal server. With this configuration,
the user authentication is performed by matching a string in the server response and RADIUS server (either
ClearPass Guest or a different RADIUS server).

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Captive Portal for Guest Access | 132

Creating a Web Login page in ClearPass Guest
The ClearPass Guest Visitor Management Appliance provides a simple and personalized user interface through
which operational staff can quickly and securely manage visitor network access. With ClearPass Guest, the users
can have a controlled access to a dedicated visitor management user database. Through a customizable Web portal,
the administrators can easily create an account, reset a password or set an expiry time for visitors. Visitors can be
registered at reception and provisioned with an individual guest account that defines their visitor profile and the
duration of their visit. By defining a Web login page on the ClearPass Guest Visitor Management Appliance, you are
able to provide a customized graphical login page for visitors accessing the network.
For information on setting up the RADIUS Web Login feature, see the RADIUS Services section in the ClearPass
Guest Deployment Guide.

Configuring RADIUS Server in Instant UI
To configure Instant to point to ClearPass Guest as an external Captive Portal server, perform the following steps:
1. Select the WLAN SSID for which you want to enable external captive portal authentication with CPPM. You can
also configure the RADIUS server when configuring a new SSID profile.
2. In the Security tab, select External from the Splash page type.
3. Select New from the Captive portal profile drop-down list and update the following fields:
a. Enter the IP address of the ClearPass Guest server in the IP or hostname field. Obtain the ClearPass Guest
IP address from your system administrator.
b. Enter /page_name.php in the URL field. This URL must correspond to the Page Name configured in the
ClearPass Guest RADIUS Web Login page. For example, if the Page Name is Dell, the URL should be
/Dell.php in the Instant UI.
c. Enter the Port number (generally should be 80). The ClearPass Guest server uses this port for HTTP
services.
d. Click OK.
4. To create an external RADIUS server, select New from the Authentication server 1 drop-down list. For
information on authentication server configuration parameters, see Configuring an External Server for
Authentication on page 157.
5. Click Next and then click Finish.
6. Click the updated SSID in the Network tab.
7. Open any browser and type any URL. Instant redirects the URL to ClearPass Guest login page.
8. Log in to the network with the user name and password specified used while configuring the RADIUS server.

Configuring Guest Logon Role and Access Rules for Guest Users
For captive portal profile, you can create any the following types of roles:
l

A pre-authenticated role - This role is assigned before the captive portal authentication. The user can only access
certain destinations with this role.

l

A guest role – This role is assigned after user authentication.

l

A captive-portal role - This role can be assigned to any network such as empolyee, voice, or guest. When the
user is assigned with this role, a splash page is displayed after opening a browser and the users may need to
authenticate.

You can configure up to 128 access rules for guest user roles through the Instant UI or CLI.

In the Instant UI
To configure roles and access rules for the guest network:

133 | Captive Portal for Guest Access

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

1. In the Access Rules tab, set the slider to any of the following types of access control:
l

Unrestricted— Select this to set unrestricted access to the network.

l

Network-based— Set the slider to Network-based to set common rules for all users in a network. The Allow
any to all destinations access rule is enabled by default. This rule allows traffic to all destinations. To define
an access rule:
a. Click New.
b. Select appropriate options in the New Rule window.
c. Click OK.

l

Role-based— Select Role-based to enable access based on user roles. For role-based access control:
n

Create a user role if required. For more information, see Configuring User Roles.

n

Create access rules for a specific user role. For more information, see Configuring Access Rules for
Network Services on page 177. You can also configure an access rule to enforce captive portal
authentication for an SSID with the 802.1X authentication method. For more information, see Configuring
Captive Portal Roles for an SSID on page 135.

n

Create a role assignment rule. For more information, see Configuring Derivation Rules on page 192.
Instant supports role derivation based on the DHCP option for Captive Portal authentication. When the
Captive Portal authentication is successful, a new user role is assigned to the guest users based on
DHCP option configured for the SSID profile, instead of the pre-authenticated role.

2. Click Finish.

In the CLI
To configure access control rules for a WLAN SSID:
(Instant AP)(config)# wlan access-rule 
(Instant AP)(Access Rule )# rule    {   {permit|deny|src-nat|dst-nat{ | }}| app  {permit| deny}|
appcategory | webcategory  {permit| deny}| webreputation 
[]
(Instant AP)(Access Rule )# end
(Instant AP)# commit apply

To configure access control based on the SSID:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile # set-role-by-ssid
AP)(SSID Profile # end
AP)# commit apply

To configure role assignment rules:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile # set-role {{equals|not-equals|starts-with|endswith|contains|matches-regular-expression}|value-of}
(Instant AP)(SSID Profile # end
(Instant AP)# commit apply

To configure a pre-authentication role:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile # set-role-pre-auth 
AP)(SSID Profile # end
AP)# commit apply

To configure machine and user authentication roles
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile # set-role-machine-auth  

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Captive Portal for Guest Access | 134

(Instant AP)(SSID Profile # end
(Instant AP)# commit apply

To configure unrestricted access:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile # set-role-unrestricted
AP)(SSID Profile # end
AP)# commit apply

Example
The following example configures access rules for the wireless network:
(Instant AP)(config)# wlan access-rule WirelessRule
(Instant AP)(Access Rule "WirelessRule")# rule 192.0.2.2 255.255.255.0 match 6 4343 4343 log
classify-media
(Instant AP)(Access Rule "WirelessRule")# rule any any match app deny throttle-downstream 256
throttle-up 256
(Instant AP)(Access Rule "WirelessRule")# rule any any match appcategory collaboration permit
(Instant AP)(Access Rule "WirelessRule")# rule any any match webcategory gambling deny
(Instant AP)(Access Rule "WirelessRule")# rule any any match webcategory training-and-tools
permit
(Instant AP)(Access Rule "WirelessRule")# rule any any match webreputation well-known-sites
permit
(Instant AP)(Access Rule "WirelessRule")# rule any any match webreputation safe-sites permit
(Instant AP)(Access Rule "WirelessRule")# rule any any match webreputation benign-sites permit
(Instant AP)(Access Rule "WirelessRule")# rule any any match webreputation suspicious-sites
deny
(Instant AP)(Access Rule "WirelessRule")# rule any any match webreputation high-risk-sites
deny
(Instant AP)(Access Rule "WirelessRule")# end
(Instant AP)# commit apply

Configuring Captive Portal Roles for an SSID
You can configure an access rule to enforce captive portal authentication for SSIDs with 802.1X authentication
enabled. You can configure rules to provide access to an external captive portal, internal captive portal, so that some
of the clients using this SSID can derive the captive portal role.
The following conditions apply to the 802.1X and captive portal authentication configuration:
l

If a user role does not have Captive Portal settings configured, the captive portal settings configured for an SSID
are applied to the client's profile.

l

If the SSID does not have Captive Portal settings configured, the captive portal settings configured for a user role
are applied to the client's profile.

l

If captive portal settings are configured for both SSID and user role, the captive portal settings configured for a
user role are applied to the client's profile.

You can create a captive portal role for both Internal-acknowledged and External Authentication Text splash
page types.
To enforce the Captive Portal role, use the Instant UI or CLI.

In the Instant UI
To create a captive portal role:
1. Select an SSID profile from the Networks tab. The Edit  window is displayed.
2. In the Access tab, slide to Role-based access control by using the scroll bar.
3. Select a role or create a new one if required.

135 | Captive Portal for Guest Access

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

4. Click New to add a new rule. The New Rule window is displayed.
5. In the New Rule window, specify the following parameters. The following figures show the parameters for
Captive Portal role configuration:
Figure 40 Captive Portal Rule for Internal Acknowledged Splash Page

Figure 41 Captive Portal Rule for External Captive portal profile

Table 27: New Access Rule Configuration Parameters
Field

Description

Rule type

Select Captive Portal from the drop-down list.

Splash Page
Type

l

Internal

Select any of following attributes:
Select Internal to configure a rule for internal captive portal authentication.
l Select External to configure a rule for external captive portal authentication.
If Internal is selected as splash page type, perform the following steps:
Under Splash Page Visuals, use the editor to specify text and colors for the initial
page that would be displayed to users connecting to the network. The initial
page asks for user credentials or email, depending on the splash page type
configured
l To change the color of the splash page, click the Splash page rectangle and
select the required color from the Background Color palette.
l To change the welcome text, click the first square box in the splash page, type
the required text in the Welcome text box, and click OK. Ensure that the
welcome text does not exceed 127 characters.
l

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Captive Portal for Guest Access | 136

Field

Description
l

l
l
l

To change the policy text, click the second square in the splash page, type the
required text in the Policy text box, and click OK. Ensure that the policy text does
not exceed 255 characters.
Specify the URL to which you want to redirect the guest users.
To upload a custom logo, click Upload your own custom logo Image, browse the
image file, and click upload image.
Click Preview to preview the Captive Portal page.

If External is selected, perform the following steps:

External

l

Select a profile from the Captive portal profile drop-down list.

l

If you want to edit the profile, click Edit and update the following parameters:
l

l
l
l
l
l

l

l

Type—Select either Radius Authentication ( to enable user
authentication against a RADIUS server) or Authentication Text
(to specify the authentication text to returned by the external
server after a successful user authentication).
IP or hostname— Enter the IP address or the hostname of the
external splash page server.
URL— Enter the URL for the external splash page server.
Port—Enter the number of the port to use for communicating with
the external splash page server
Redirect URL—Specify a redirect URL if you want to redirect the
users to another URL.
Captive Portal failure—This field allows you to configure Internet
access for the guest clients when the external captive portal
server is not available. Select Deny Internet to prevent clients
from using the network, or Allow Internet to allow the guest
clients to access Internet when the external captive portal server
is not available.
Automatic URL Whitelisting— Select Enabled or Disabled to
enable or disable automatic whitelisting of URLs. On selecting
the checkbox for the external captive portal authentication, the
URLs allowed for the unauthenticated users to access are
automatically whitelisted. The automatic URL whitelisting is
disabled by default.
Auth Text—Indicates the authentication text returned by the
external server after a successful user authentication.

6. Click OK. The enforce captive portal rule is created and listed as an access rule.
7. Create a role assignment rule based on the user role, to which the captive portal access rule is assigned.
8. Click Finish.
The client can connect to this SSID after authenticating with username and password. After a successful user login,
the captive portal role is assigned to the client.

In the CLI
To create a captive portal role:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan access-rule 
AP)(Access Rule )# captive-portal {external [profile ]|internal}
AP)(Access Rule )# end
AP)# commit apply

137 | Captive Portal for Guest Access

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Configuring Walled Garden Access
On the Internet, a walled garden typically controls access to Web content and services. The Walled garden access
is required when an external captive portal is used. For example, a hotel environment where the unauthenticated
users are allowed to navigate to a designated login page (for example, a hotel website) and all its contents.
The users who do not sign up for the Internet service can view the “allowed” websites (typically hotel property
websites). The website names must be DNS-based and support the option to define wildcards. This works for client
devices with or without HTTP proxy settings.
When a user attempts to navigate to other websites, which are not in the whitelist of the walled garden profile, the
user is redirected to the login page. In addition, a blacklisted walled garden profile can also be configured to explicitly
block the unauthenticated users from accessing some websites.
You can create a walled garden access in Instant UI or CLI.

In the Instant UI
To create a Walled Garden access:
1. Click the Security link at the top right corner of the Instant main window and click Walled Garden. The Walled
Garden tab contents are displayed.
2. To allow users to access a specific domain, click New and enter the domain name or URL in the Whitelist
section of the window. This allows access to a domain while the user remains unauthenticated. Specify a POSIX
regular expression (regex(7)). For example:
l

yahoo.com matches various domains such as news.yahoo.com, travel.yahoo.com and finance.yahoo.com

l

www.apple.com/library/test is a subset of apple.com site corresponding to path /library/test/*

l

favicon.ico allows access to /favicon.ico from all domains.

3. To deny users access to a domain, click New and enter the domain name or URL in the Blacklist section of the
window. This prevents the unauthenticated users from viewing specific websites. When a URL specified in the
blacklist is accessed by an unauthenticated user, W-IAP sends an HTTP 403 response to the client with a simple
error message.
If the requested URL does not appear on the blacklist or whitelist list, the request is redirected to the external
captive portal.
4. Select the domain name/URL and click Edit to modify or Delete to remove the entry from the list.
5. Click OK to apply the changes.

In the CLI
To create a Walled Garden access:
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan walled-garden
AP)(Walled Garden)# white-list 
AP)(Walled Garden)# black-list 
AP)(Walled Garden)# end
AP)# commit apply

Disabling Captive Portal Authentication
To disable captive portal authentication, perform the following steps:
1. Select an existing wireless or wired profile. Depending on the network profile selected, the Edit 
or Edit Wired Network window is displayed.
You can also customize splash page design in the Security tab of New WLAN and New Wired Network windows
when configuring a new profile.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Captive Portal for Guest Access | 138

2. Navigate to the Security tab.
3. Select None from the Splash page type drop-down list.
4. Click Next and then click Finish to apply the changes.

139 | Captive Portal for Guest Access

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Chapter 11
Authentication and User Management

This chapter provides the following information:
l

Managing W-IAP Users on page 140

l

Understanding Authentication Methods on page 147

l

Supported Authentication Servers on page 149

l

Understanding Encryption Types on page 154

l

Support for Authentication Survivability on page 155

l

Configuring Authentication Servers on page 157

l

Configuring 802.1X Authentication for a Network Profile on page 163

l

Configuring MAC Authentication for a Network Profile on page 165

l

Configuring MAC Authentication with 802.1X Authentication on page 167

l

Configuring MAC Authentication with Captive Portal Authentication on page 169

l

Configuring WISPr Authentication on page 170

l

Blacklisting Clients on page 171

l

Uploading Certificates on page 173

Managing W-IAP Users
The W-IAP users can be classified as follows:
l

Administrator— An admin user who creates SSIDs, wired profiles, DHCP server configuration parameters, and
manages the local user database. The admin users can access to the Virtual Controller Management User
Interface.

l

Guest administrator— A guest interface management user who manages guest users added in the local user
database.

l

Administrator with read-only access— The read-only admin user does not have access to the Instant CLI. The
Instant UI will be displayed in the read-only mode for these users.

l

Employee users — Employees who use the enterprise network for official tasks.

l

Guest users—Visiting users who temporarily use the enterprise network to access the Internet.

The user access privileges are determined by W-IAP management settings in the W-AirWave Management client,
and the type of the user. The following table outlines the access privileges defined for the admin user, guest
management interface admin, and read-only users.
Table 28: User Privileges
User Category

W-AirWave Management Platform in
Management Mode

W-IAP in monitor mode or without WAirWave Management Platform

administrator

Access to local user database only

Complete access to the W-IAP

read-only
administrator

No write privileges

No write privileges

guest administrator

Access to local user database only

Access to local user database only

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Authentication and User Management | 140

Configuring Authentication Parameters for Management Users
Instant now allows you to configure a TACACS+ Server as the authentication server to support authentication and
accounting privileges for management users. TACACS+ server allows a remote access server to communicate with
an authentication server to determine if the user has access to the network. In Instant, the users can create several
TACACS+ server profiles, out of which one or two of the servers can be specified to authenticate management
users.
TACACS+ supports the following types of authentication for management users in Instant:
l

ASCII

l

PAP

l

CHAP

l

ARAP

l

MSCHAP

The TACACS+ server cannot be attributed to any SSID or wired profile in general as the authentication server and
is configured only for management users.
You can also enable TACACS+ accounting when the TACACS+ server is used for authentication.

Configuring a TACACS+ Server Profile for Management User Authentication
To configure a TACACS+ authentication server:
In the Instant UI
1. Navigate to Security>Authentication Servers. The Security window is displayed.
2. To create a new server, click New. A window for configuring server details for the new server is displayed. The
following figure shows the parameters to configure for a new authentication server configuration:
Figure 42 New Authentication Server Window

To create a TACACS+ server profile, specify the attributes described in the following table:

141 | Authentication and User Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 29: TACACS+ Server Configuration Parameters
Parameter

Description

IP address

Enter the IP address of the TACACS+ server.

Auth Port

Enter the TCP IP port used by the server. The default port number is 49.

Shared Key

Enter the secret key of your choice to authenticate communication between the TACACS+
client and server.

Retype Key

Re-enter the secret key you have specified as the Shared Key.

Timeout

Enter a number between 1 and 30 seconds to indicate the timeout period for TACACS+
requests. The default value is 20 seconds.

Retry Count

Enter a number between 1 and 5 to indicate the maximum number of authentication attempts.
The default value is 3.

In the CLI
To configure a TACACS+ server:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan
AP)(TACACS Server
AP)(TACACS Server
AP)(TACACS Server
AP)(TACACS Server
AP)(TACACS Server
AP)(TACACS Server
AP)(TACACS Server

tacacs-server 
)# ip 
)# port 
)# key 
)# timeout 
)# retry-count 
)# deadtime 
)# end

Configuring Administrator Credentials for the Virtual Controller Interface
You can configure authentication parameters for admin users to enable access to the Virtual Controller management
user interface in the Instant UI or CLI.
In the Instant UI
1. Click the System link at top right corner of the Instant main window. The System window is displayed.
2. Click the Admin tab. The Admin tab details are displayed. The following figure shows the contents of the Admin
tab:

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Authentication and User Management | 142

Figure 43 Admin Tab: Management Authentication Parameters

3. Under Local, select any of the following options from the Authentication drop-down list:
l

Internal— Select this option to specify a single set of user credentials. Enter the Username and Password for
accessing the Virtual Controller Management User Interface.

l

Authentication Server— Specify one or two authentication servers to authenticate clients. If two servers are
configured, users can use them in primary or backup mode or load balancing mode. To enable load balancing,
select Enabled from the Load balancing drop-down list. For more information on load balancing, see Dynamic
Load Balancing between Two Authentication Servers on page 154.
You may also specify a RADIUS Server as one of the authentication servers along with a TACACS+ server. If a
TACACS+ server is selected, you can select the TACACS accounting checkbox for reporting management
commands.
The TACACS accounting option is available only when a TACACS+ server is specified as one of the
authentication servers.

l

Authentication server w/ fallback to internal— Select this option to use both internal and external servers.
When enabled, the authentication switches to Internal if there is no response from the RADIUS server (RADIUS
server timeout). To complete this configuration, perform the following step:
a. To enable load balancing, select Enabled from the Load balancing drop-down list.
b. Specify a Username and Password.
c. Retype the password to confirm.

4. Click OK.
In the CLI
To configure an admin user:
(Instant AP)(config)# mgmt-user  [password]
(Instant AP)(config)# end
(Instant AP)# commit apply

To configure RADIUS or TACACS+ authentication parameters:
(Instant AP)(config)# mgmt-auth-server 

143 | Authentication and User Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# mgmt-auth-server 
AP)(config)# mgmt-auth-server-load-balancing
AP)(config)# mgmt-auth-server-local-backup
AP)(config)# end
AP)# commit apply

To configure management authentication settings:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# mgmt-auth-server 
AP)(config)# mgmt-auth-server 
AP)(config)# mgmt-auth-server-load-balancing
AP)(config)# mgmt-auth-server-local-backup
AP)(config)# end
AP)# commit apply

Configuring Guest Management Interface Administrator Credentials
You can configure guest administrator credentials in the Instant UI or CLI.

In the Instant UI
1. Click the System link at top right corner of the Instant main window. The System window is displayed.
2. Click the Admin tab. The Admin tab details are displayed.
3. Under Guest Registration Only:
a. Specify a Username and Password.
b. Retype the password to confirm.
4. Click OK. When the guest management administrator logs in with these credentials, the guest management
interface is displayed.

In the CLI
To configure guest management administrator credentials:
(Instant AP)(config)# mgmt-user  [password] guest-mgmt
(Instant AP)(config)# end
(Instant AP)# commit apply

Configuring Users for Internal Database of a W-IAP
The Instant user database consists of a list of guest and employee users. The addition of a user involves specifying
a login credentials for a user. The login credentials for these users are provided outside the Instant system.
A guest user can be a visitor who is temporarily using the enterprise network to access the Internet. However, if you
do not want to allow access to the internal network and the Intranet, you can segregate the guest traffic from the
enterprise traffic by creating a guest WLAN and specifying the required authentication, encryption, and access rules.
An employee user is the employee who is using the enterprise network for official tasks. You can create Employee
WLANs, specify the required authentication, encryption and access rules and allow the employees to use the
enterprise network.
The user database is also used when a W-IAP is configured as an internal RADIUS server.
The local user database of APs can support up to 512 user entries except W-IAP9x. W-IAP9x supports
only 256 user entries. If there are already 512 users, W-IAP9x will not be able to join the cluster.

In the Instant UI
To configure users:
1. Click the Security at the top right corner of Instant main window.
Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Authentication and User Management | 144

2. Click Users for Internal Server. The following figure shows the contents of the Users for Internal Server tab.
Figure 44 Adding a User

3. Enter the username in the Username text box.
4. Enter the password in the Password text box and reconfirm.
5. Select a type of network from the Type drop-down list.
6. Click Add and click OK. The users are listed in the Users list.
7. To edit user settings:
a. Select the user to modify under Users
b. Click Edit to modify user settings.
c. Click OK.
8. To delete a user:
a. In the Users section, select the username to delete
b. Click Delete.
c. Click OK.
9. To delete all or multiple users at a time:
a. Select the usernames that you want to delete
b. Click Delete All.
c. Click OK.
Deleting a user only removes the user record from the user database, and will not disconnect the online user
associated with the username.

In the CLI
To configure an employee user:
(Instant AP)(config)# user   radius
(Instant AP)(config)# end

145 | Authentication and User Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

(Instant AP)# commit apply

To configure a guest user:
(Instant AP)(config)# user   portal
(Instant AP)(config)# end
(Instant AP)# commit apply

Configuring the Read-Only Administrator Credentials
You can assign the read-only privilege to an admin user by using the Instant UI or CLI.

In the Instant UI
1. Click the System link at top right corner of the Instant main window. The System window is displayed.
2. Click the Admin tab. The Admin tab details are displayed.
3. Under View Only:
a. Specify a Username and Password.
b. Retype the password to confirm.
4. Click OK. When the users log in with these credentials, the Instant UI is displayed in the read-only mode.

In the CLI
To configure a user with read-only privilege:
(Instant AP)(config)# mgmt-user  [password] read-only
(Instant AP)(config)# end
(Instant AP)# commit apply

Adding Guest Users through the Guest Management Interface
To add guest users through the Guest Management interface:
1. Log in to Instant UI with the guest management interface administrator credentials. The guest management
interface is displayed.
Figure 45 Guest Management Interface

2. To add a user, click New. The New Guest User pop-up window is displayed.
3. Specify a Username and Password.
4. Retype the password to confirm.
5. Click OK.
Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Authentication and User Management | 146

Understanding Authentication Methods
Authentication is a process of identifying a user by through a valid username and password or based on their MAC
addresses. The following authentication methods are supported in Instant:
l

802.1X authentication

l

MAC authentication

l

MAC authentication with 802.1X authentication

l

Captive Portal Authentication

l

MAC authentication with Captive Portal authentication

l

802.1X authentication with Captive Portal Role

l

WISPr authentication

802.1X authentication
802.1X is an IEEE standard that provides an authentication framework for WLANs. 802.1x uses the Extensible
Authentication Protocol (EAP) to exchange messages during the authentication process. The authentication
protocols that operate inside the 802.1X framework include EAP-Transport Layer Security (EAP-TLS), Protected
EAP (PEAP), and EAP-Tunneled TLS (EAP-TTLS). These protocols allow the network to authenticate the client
while also allowing the client to authenticate the network. For more information on EAP authentication framework
supported by the W-IAP, see Supported EAP Authentication Frameworks on page 148.
802.1X authentication method allows a W-IAP to authenticate the identity of a user before providing network access
to the user. The Remote Authentication Dial In User Service (RADIUS) protocol provides centralized authentication,
authorization, and accounting management. For authentication purpose, the wireless client can associate to a
network access server (NAS) or RADIUS client such as a wireless W-IAP. The wireless client can pass data traffic
only after successful 802.1X authentication.
For more information on configuring a W-IAP to use 802.1X authentication, see Configuring 802.1X Authentication
for a Network Profile on page 163.

MAC authentication
MAC authentication is used for authenticating devices based on their physical MAC addresses. MAC authentication
requires that the MAC address of a machine matches a manually defined list of addresses. This authentication
method is not recommended for scalable networks and the networks that require stringent security settings. For
more information on configuring a W-IAP to use MAC authentication, see Configuring MAC Authentication for a
Network Profile on page 165.

MAC authentication with 802.1X authentication
This authentication method has the following features:
l

MAC authentication precedes 802.1X authentication - The administrators can enable MAC authentication for
802.1X authentication. MAC authentication shares all the authentication server configurations with 802.1X
authentication. If a wireless or wired client connects to the network, MAC authentication is performed first. If
MAC authentication fails, 802.1X authentication does not trigger. If MAC authentication is successful, 802.1X
authentication is attempted. If 802.1X authentication is successful, the client is assigned an 802.1X
authentication role. If 802.1X authentication fails, the client is assigned a deny-all role or mac-auth-only role.

l

MAC authentication only role - Allows you to create a mac-auth-only role to allow role-based access rules when
MAC authentication is enabled for 802.1X authentication. The mac-auth-only role is assigned to a client when
the MAC authentication is successful and 802.1X authentication fails. If 802.1X authentication is successful, the
mac-auth-only role is overwritten by the final role. The mac-auth-only role is primarily used for wired clients.

147 | Authentication and User Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

l

L2 authentication fall-through - Allows you to enable the l2-authentication-fallthrough mode. When this option
is enabled, the 802.1X authentication is allowed even if the MAC authentication fails. If this option is disabled,
802.1X authentication is not allowed. The l2-authentication-fallthrough mode is disabled by default.
For more information on configuring a W-IAP to use MAC + 802.1X Authentication, see Configuring MAC
Authentication with 802.1X Authentication on page 167.

Captive Portal Authentication
Captive portal authentication is used for authenticating guest users. For more information on Captive Portal
authentication, see Captive Portal for Guest Access on page 120.

MAC authentication with Captive Portal authentication
This authentication method has the following features:
l

If the captive portal splash page type is Internal-Authenticated or External-RADIUS Server, MAC
authentication reuses the server configurations.

l

If the captive portal splash page type is Internal-Acknowledged or External-Authentication Text and MAC
authentication is enabled, a server configuration page is displayed.

l

If the captive portal splash page type is none, MAC authentication is disabled.

l

You can configure the mac-auth-only role when MAC authentication is enabled with captive portal
authentication.

For more information configuring a W-IAP to use MAC and Captive Portal authentication, see Configuring MAC
Authentication with Captive Portal Authentication on page 169.

802.1X authentication with Captive Portal Role
This authentication mechanism allows you to configure different captive portal settings for clients on the same
SSID. For example, you can configure an 802.1x SSID and create a role for captive portal access, so that some of
the clients using the SSID derive the captive portal role. You can configure rules to indicate access to external or
internal captive portal, or none. For more information on configuring captive portal roles for an SSID with 802.1x
authentication, see Configuring Captive Portal Roles for an SSID on page 135.

WISPr authentication
Wireless Internet Service Provider roaming (WISPr) authentication allows a smart client to authenticate on the
network when they roam between wireless Internet service providers, even if the wireless hotspot uses an Internet
Service Provider (ISP) with whom the client may not have an account.
If a hotspot is configured to use WISPr authentication in a specific ISP and a client attempts to access the Internet
at that hotspot, the WISPr AAA server configured for the ISP authenticates the client directly and allows the client to
access the network. If the client only has an account with a partner ISP, the WISPr AAA server forwards the client’s
credentials to the partner ISP’s WISPr AAA server for authentication. When the client is authenticated on the partner
ISP, it is also authenticated on your hotspot’s own ISP as per their service agreements. The W-IAP assigns the
default WISPr user role to the client when your ISP sends an authentication message to the W-IAP. For more
information on WISPr authentication, see Configuring WISPr Authentication on page 170.

Supported EAP Authentication Frameworks
The following EAP authentication frameworks are supported in the Instant network:
l

EAP-TLS— The Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) method supports the
termination of EAP-TLS security using the internal RADIUS server . The EAP-TLS requires both server and
certification authority (CA) certificates installed on the W-IAP. The client certificate is verified on the Virtual

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Authentication and User Management | 148

Controller (the client certificate must be signed by a known CA), before the username is verified on the
authentication server.
l

EAP-TTLS (MSCHAPv2)— The Extensible Authentication Protocol-Tunneled Transport Layer Security (EAPTTLS) method uses server-side certificates to set up authentication between clients and servers. However, the
actual authentication is performed using passwords.

l

EAP-PEAP (MSCHAPv2)— EAP-PEAP is an 802.1X authentication method that uses server-side public key
certificates to authenticate clients with server. The PEAP authentication creates an encrypted SSL / TLS tunnel
between the client and the authentication server. Exchange of information is encrypted and stored in the tunnel
ensuring the user credentials are kept secure.

l

LEAP— Lightweight Extensible Authentication Protocol (LEAP) uses dynamic WEP keys for authentication
between the client and authentication server.

To use the W-IAP’s internal database for user authentication, add the names and passwords of the users to be
authenticated.
Dell does not recommend the use of LEAP authentication, because it does not provide any resistance to network
attacks.

Authentication Termination on W-IAP
W-IAPs support EAP termination for enterprise WLAN SSIDs. The EAP termination can reduce the number of
exchange packets between the W-IAP and the authentication servers. Instant allows Extensible Authentication
Protocol (EAP) termination for Protected Extensible Authentication Protocol (PEAP)-Generic Token Card (PEAPGTC) and Protected Extensible Authentication Protocol-Microsoft Challenge Authentication Protocol version 2
(PEAP-MSCHAV2). PEAP-GTC termination allows authorization against an Lightweight Directory Access Protocol
(LDAP) server and external RADIUS server while PEAP-MSCHAV2 allows authorization against an external
RADIUS server.
This allows the users to run PEAP-GTC termination with their username and password to a local Microsoft Active
Directory server with LDAP authentication.
l

EAP-Generic Token Card (GTC)— This EAP method permits the transfer of unencrypted usernames and
passwords from client to server. The main uses for EAP-GTC are one-time token cards such as SecureID and
the use of LDAP or RADIUS as the user authentication server. You can also enable caching of user credentials
on the W-IAP to an external authentication server for user data backup.

l

EAP-Microsoft Challenge Authentication Protocol version 2 (MS-CHAPv2)— This EAP method is widely
supported by Microsoft clients. A RADIUS server must be used as the back-end authentication server.

Supported Authentication Servers
Based on the security requirements, you can configure internal or external authentication servers. This section
describes the types of servers that can be configured for client authentication:
l

Internal RADIUS Server on page 150

l

External RADIUS Server on page 150

l

Dynamic Load Balancing between Two Authentication Servers on page 154

In 6.4.0.2-4.1 release, you can configure TACACS+ server for authenticating management users. For more
information, on management users and TACACS+ server based authentication, see Configuring Authentication
Parameters for Management Users .

149 | Authentication and User Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Internal RADIUS Server
Each W-IAP has an instance of free RADIUS server operating locally. When you enable the internal RADIUS server
option for the network, the client on the W-IAP sends a RADIUS packet to the local IP address. The internal
RADIUS server listens and replies to the RADIUS packet. Instant itself serves as a RADIUS server for 802.1X
authentication. However, the internal RADIUS server can also be configured as a backup RADIUS server for an
external RADIUS server.

External RADIUS Server
In the external RADIUS server, the IP address of the Virtual Controller is configured as the NAS IP address. Instant
RADIUS is implemented on the Virtual Controller, and this eliminates the need to configure multiple NAS clients for
every W-IAP on the RADIUS server for client authentication. Instant RADIUS dynamically forwards all the
authentication requests from a NAS to a remote RADIUS server. The RADIUS server responds to the
authentication request with an Access-Accept or Access-Reject message, and the clients are allowed or denied
access to the network depending on the response from the RADIUS server. When you enable an external RADIUS
server for the network, the client on the W-IAP sends a RADIUS packet to the local IP address. The external
RADIUS server then responds to the RADIUS packet.
Instant supports the following external authentication servers:
l

RADIUS (Remote Authentication Dial-In User Service)

l

LDAP (Lightweight Directory Access Protocol)

l

CPPM Server for AirGroup CoA

To use an LDAP server for user authentication, configure the LDAP server on the Virtual Controller, and configure
user IDs and passwords. To use a RADIUS server for user authentication, configure the RADIUS server on the
Virtual Controller.

RADIUS Server Authentication with VSA
An external RADIUS server authenticates network users and returns to the W-IAP the vendor-specific attribute
(VSA) that contains the name of the network role for the user. The authenticated user is placed into the management
role specified by the VSA.
Instant supports the following VSAs for user role and VLAN derivation rules:
l

AP-Group

l

AP-Name

l

ARAP-Features

l

ARAP-Security

l

ARAP-Security-Data

l

ARAP-Zone-Access

l

Acct-Authentic

l

Acct-Delay-Time

l

Acct-Input-Gigawords

l

Acct-Input-Octets

l

Acct-Input-Packets

l

Acct-Interim-Interval

l

Acct-Link-Count

l

Acct-Multi-Session-Id

l

Acct-Output-Gigawords

l

Acct-Output-Octets

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Authentication and User Management | 150

l

Acct-Output-Packets

l

Acct-Session-Id

l

Acct-Session-Time

l

Acct-Status-Type

l

Acct-Terminate-Cause

l

Acct-Tunnel-Packets-Lost

l

Add-Port-To-IP-Address

l

Aruba-AP-Group

l

Aruba-AP-IP-Address

l

Aruba-AS-Credential-Hash

l

Aruba-AS-User-Name

l

Aruba-Admin-Role

l

Aruba-AirGroup-Device-Type

l

Aruba-AirGroup-Shared-Group

l

Aruba-AirGroup-Shared-Role

l

Aruba-AirGroup-Shared-User

l

Aruba-AirGroup-User-Name

l

Aruba-AirGroup-Version

l

Aruba-Auth-Survivability

l

Aruba-CPPM-Role

l

Aruba-Device-Type

l

Aruba-Essid-Name

l

Aruba-Framed-IPv6-Address

l

Aruba-Location-Id

l

Aruba-Mdps-Device-Iccid

l

Aruba-Mdps-Device-Imei

l

Aruba-Mdps-Device-Name

l

Aruba-Mdps-Device-Product

l

Aruba-Mdps-Device-Profile

l

Aruba-Mdps-Device-Serial

l

Aruba-Mdps-Device-Udid

l

Aruba-Mdps-Device-Version

l

Aruba-Mdps-Max-Devices

l

Aruba-Mdps-Provisioning-Settings

l

Aruba-Named-User-Vlan

l

Aruba-Network-SSO-Token

l

Aruba-No-DHCP-Fingerprint

l

Aruba-Port-Id

l

Aruba-Priv-Admin-User

l

Aruba-Template-User

l

Aruba-User-Group

l

Aruba-User-Role

151 | Authentication and User Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

l

Aruba-User-Vlan

l

Aruba-WorkSpace-App-Name

l

Authentication-Sub-Type

l

Authentication-Type

l

CHAP-Challenge

l

Callback-Id

l

Callback-Number

l

Chargeable-User-Identity

l

Class

l

Connect-Info

l

Connect-Rate

l

Crypt-Password

l

DB-Entry-State

l

Digest-Response

l

Domain-Name

l

EAP-Message

l

Error-Cause

l

Event-Timestamp

l

Exec-Program

l

Exec-Program-Wait

l

Expiration

l

Fall-Through

l

Filter-Id

l

Framed-AppleTalk-Link

l

Framed-AppleTalk-Network

l

Framed-AppleTalk-Zone

l

Framed-Compression

l

Framed-IP-Address

l

Framed-IP-Netmask

l

Framed-IPX-Network

l

Framed-IPv6-Pool

l

Framed-IPv6-Prefix

l

Framed-IPv6-Route

l

Framed-Interface-Id

l

Framed-MTU

l

Framed-Protocol

l

Framed-Route

l

Framed-Routing

l

Full-Name

l

Group

l

Group-Name

l

Hint

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Authentication and User Management | 152

l

Huntgroup-Name

l

Idle-Timeout

l

Location-Capable

l

Location-Data

l

Location-Information

l

Login-IP-Host

l

Login-IPv6-Host

l

Login-LAT-Node

l

Login-LAT-Port

l

Login-LAT-Service

l

Login-Service

l

Login-TCP-Port

l

Menu

l

Message-Auth

l

NAS-IPv6-Address

l

NAS-Port-Type

l

Operator-Name

l

Password

l

Password-Retry

l

Port-Limit

l

Prefix

l

Prompt

l

Rad-Authenticator

l

Rad-Code

l

Rad-Id

l

Rad-Length

l

Reply-Message

l

Requested-Location-Info

l

Revoke-Text

l

Server-Group

l

Server-Name

l

Service-Type

l

Session-Timeout

l

Simultaneous-Use

l

State

l

Strip-User-Name

l

Suffix

l

Termination-Action

l

Termination-Menu

l

Tunnel-Assignment-Id

l

Tunnel-Client-Auth-Id

l

Tunnel-Client-Endpoint

153 | Authentication and User Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

l

Tunnel-Connection-Id

l

Tunnel-Medium-Type

l

Tunnel-Preference

l

Tunnel-Private-Group-Id

l

Tunnel-Server-Auth-Id

l

Tunnel-Server-Endpoint

l

Tunnel-Type

l

User-Category

l

User-Name

l

User-Vlan

l

Vendor-Specific

Dynamic Load Balancing between Two Authentication Servers
You can configure two authentication servers to serve as a primary and backup RADIUS server and enable load
balancing between these servers. Load balancing of authentication servers ensures that the authentication load is
split across multiple authentication servers and enables the W-IAPs to perform load balancing of authentication
requests destined to authentication servers such as RADIUS or LDAP.
The load balancing in W-IAP is performed based on outstanding authentication sessions. If there are no outstanding
sessions and if the rate of authentication is low, only primary server will be used. The secondary is used only if there
are outstanding authentication sessions on the primary server. With this, the load balance can be performed across
asymmetric capacity RADIUS servers without the need to obtain inputs about the server capabilities from the
administrators.

Understanding Encryption Types
Encryption is the process of converting data into a cryptic format or code when it is transmitted on a network.
Encryption prevents unauthorized use of the data.
Instant supports the following types of encryption:
l

WEP —Wired Equivalent Privacy (WEP) is an authentication method where all users share the same key. WEP
is not secure as other encryption types such as TKIP.

l

TKIP —Temporal Key Integrity Protocol (TKIP) uses the same encryption algorithm as WEP. However, TKIP is
more secure and has an additional message integrity check (MIC).

l

AES — The Advanced Encryption Standard (AES) encryption algorithm a widely supported encryption type for all
wireless networks that contain any confidential data. AES in Wi-Fi leverages 802.1X or PSKs to generate per
station keys for all devices. AES provides a high level of security like IP Security (IPsec) clients.

WEP and TKIP are limited to WLAN connection speed of 54 Mbps. The 802.11n connection supports only AES
encryption. DellIt is recommended to use AES encryption. Ensure that all devices that do not support AES are
upgraded or replaced with the devices that support AES encryption.

WPA and WPA2
WPA is created based on a draft of 802.11i, which allowed users to create more secure WLANs. WPA2
encompasses the full implementation of the 802.11i standard. WPA2 is a superset that encompasses the full WPA
feature set.
The following table summarizes the differences between the two certifications:

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Authentication and User Management | 154

Table 30: WPA and WPA2 Features
Certification

Authentication

WPA

l
l

WPA2

l
l

Encryption

PSK
IEEE 802.1X with
Extensible
Authentication
Protocol (EAP)

TKIP with message integrity check (MIC)

PSK
IEEE 802.1X with
EAP

AES -- Counter Mode with Cipher Block Chaining
Message Authentication Code (AESCCMP)

WPA and WPA2 can be further classified as follows:
l

Personal — Personal is also called Pre-Shared Key (PSK). In this type, a unique key is shared with each client in
the network. Users have to use this key to securely log in to the network. The key remains the same until it is
changed by authorized personnel. You can also configure key change intervals .

l

Enterprise — Enterprise is more secure than WPA Personal. In this type, every client automatically receives a
unique encryption key after securely logging on to the network. This key is automatically updated at regular
intervals. WPA uses TKIP and WPA2 uses the AES algorithm.

Recommended Authentication and Encryption Combinations
The following table summarizes the recommendations for authentication and encryption combinations for the Wi-Fi
networks.
Table 31: Recommended Authentication and Encryption Combinations
Network Type

Authentication

Encryption

Employee

802.1X

AES

Guest Network

Captive Portal

None

Voice Network or Handheld
devices

802.1X or PSK as
supported by the device

AES if possible, TKIP or WEP if
necessary (combine with security
settings assigned for a user role).

Support for Authentication Survivability
The authentication survivability feature supports a survivable authentication framework against the remote link
failure when working with the external authentication servers. When enabled, this feature allows the W-IAPs to
authenticate the previously connected clients against the cached credentials if the connection to the authentication
server is temporarily lost.
Instant supports the following EAP standards for authentication survivability:
l

EAP-PEAP: The Protected Extensible Authentication Protocol also known as Protected EAP or PEAP is a
protocol that encapsulates EAP within a potentially encrypted and authenticated Transport Layer Security (TLS)
tunnel. The EAP-PEAP supports the MSCHAPv2 and GTC methods.

l

EAP-TLS: EAP-Transport Layer Security (EAP-TLS) is an IETF open standard that uses the Transport Layer
Security (TLS) protocol.

155 | Authentication and User Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

When the authentication survivability feature is enabled, the following authentication process is used:
1. The client associates to a W-IAP and authenticates to the external authentication server. The external
authentication server can be either CPPM (for EAP-PEAP) or RADIUS server (EAP-TLS).
2. Upon successful authentication, the associated W-IAP caches the authentication credentials of the connected
users for the configured duration. The cache expiry duration for authentication survivability can be set within the
range of 1-99 hours, with 24 hours being the default cache timeout duration.
3. If the client roams or tries to reconnect to the W-IAP and the remote link fails due to the unavailability of the
authentication server, the W-IAP uses the cached credentials in the internal authentication server to authenticate
the user. However, if the user tries to reconnect after the cache expiry, the authentication fails.
4. When the authentication server is available and if the client tries to reconnect, the W-IAP detects the availability
of server and allows the client to authenticate to the server. Upon successful authentication, the W-IAP cache
details are refreshed.

Configuring Authentication Survivability
You can enable authentication survivability for a wireless network profile through the UI or CLI.

In the Instant UI
To configure authentication survivability for a wireless network:
1. In the Network tab, click New to create a new network profile or select an existing profile for which you want to
enable authentication survivability and click edit.
2. In the Edit  or New WLAN window, ensure that all required WLAN and VLAN attributes are
defined, and then click Next.
3. In the Security tab, under Enterprise security settings, select an existing authentication server or create a new
server by clicking New.
4. To enable authentication survivability, select Enabled from the Authentication survivability drop-down. On
enabling this, the W-IAP authenticates the previously connected clients using EAP-PEAP and EAP-TLS
authentication when connection to the external authentication server is temporarily lost.
5. Specify the cache timeout duration, after which the cached details of the previously authenticated clients expire.
You can specify a value within the range of 1-99 hours and the default cache timeout duration is 24 hours.
6. Click Next and then click Finish to apply the changes.
Important Points to Remember
l

Any client connected through CPPM and authenticated through W-IAP remains authenticated with the W-IAP
even if the client is removed from the CPPM server during the CPPM downtime.

l

Do not make any changes to the authentication survivability cache timeout duration when the authentication
server is down.

l

For EAP-PEAP authentication, ensure that the CPPM 6.0.2 or later version is used for authentication. For EAPTLS authentication, any external or third-party server can be used.

l

For EAP-TLS authentication, ensure that the server and CA certificates from the authentication servers are
uploaded on W-IAP. For more information, see Uploading Certificates on page 173.

In the CLI
To configure authentication survivability for a wireless network:
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile )# type { | | }
AP)(SSID Profile )# auth-server 
AP)(SSID Profile )# auth-survivability
AP)(SSID Profile )# exit

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Authentication and User Management | 156

(Instant AP)(config)# auth-survivability cache-time-out 
(Instant AP)(config)# end
(Instant AP)# commit apply

To view the cache expiry duration:
(Instant AP)# show auth-survivability time-out

To view the information cached by the W-IAP:
(Instant AP)# show auth-survivability cached-info

To view logs for debugging:
(Instant AP)# show auth-survivability debug-log

Configuring Authentication Servers
This section describes the following procedures:
l

Configuring an External Server for Authentication on page 157

l

Configuring Dynamic RADIUS Proxy Parameters on page 161

Configuring an External Server for Authentication
You can add an external RADIUS server, LDAP server, CPPM server for AirGroup or CoA through the Instant UI or
CLI.
In 6.4.0.2-4.1 release, you can configure TACACS+ server for authenticating management users. For more
information, on management users and TACACS+ server based authentication, see Configuring Authentication
Parameters for Management Users ..

In the Instant UI
To configure an authentication server:
1. Navigate to Security>Authentication Servers. The Security window is displayed.
2. To create a new server, click New. A window for specifying details for the new server is displayed. The following
figure shows the parameters to configure for a new RADIUS authentication server configuration:

157 | Authentication and User Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Figure 46 New Authentication Server Window

3. Configure any of the following types of server:
l

RADIUS Server — To configure a RADIUS server, specify the attributes described in the following table:

Table 32: RADIUS Server Configuration Parameters
Parameter

Description

Name

Enter the name of the new external RADIUS server.

IP address

Enter the IP address of the external RADIUS server.

Auth port

Enter the authorization port number of the external RADIUS server. The default port
number is 1812.

Accounting port

Enter the accounting port number. This port is used for sending accounting records
to the RADIUS server. The default port number is 1813.

Shared key

Enter a shared key for communicating with the external RADIUS server.

Retype key

Re-enter the shared key.

Timeout

Specify a timeout value in seconds. The value determines the timeout for one
RADIUS request. The W-IAP retries to send the request several times (as
configured in the Retry count), before the user gets disconnected. For example, if
the Timeout is 5 seconds, Retry counter is 3, user is disconnected after 20
seconds. The default value is 5 seconds.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Authentication and User Management | 158

Parameter

Description

Retry count

Specify a number between 1 and 5. Indicates the maximum number of
authentication requests that are sent to the server group, and the default value is 3
requests.

RFC 3576

Select Enabled to allow the APs to process RFC 3576-compliant Change of
Authorization (CoA) and disconnect messages from the RADIUS server.
Disconnect messages cause a user session to be terminated immediately,
whereas the CoA messages modify session authorization attributes such as data
filters.

NAS IP address

Enter the Virtual Controller IP address. The NAS IP address is the Virtual Controller
IP address that is sent in data packets.
NOTE: If you do not enter the IP address, the Virtual Controller IP address is used
by default when Dynamic RADIUS Proxy is enabled.

NAS identifier

Use this to configure strings for RADIUS attribute 32, NAS Identifier, to be sent with
RADIUS requests to the RADIUS server.

Dead Time

Specify a dead time for authentication server in minutes.
When two or more authentication servers are configured on the W-IAP and a server
is unavailable, the dead time configuration determines the duration for which the
authentication server would be available if the server is marked as unavailable.

Dynamic RADIUS
proxy parameters

Specify the following dynamic RADIUS proxy parameters:
DRP IP— IP address to be used as source IP for RADIUS packets
DRP Mask—Subnet mask of the DRP IP address.
l DRP VLAN—VLAN in which the RADIUS packets are sent.
l DRP Gateway—Gateway IP address of the DRP VLAN.
For more information on dynamic RADIUS proxy parameters and configuration
procedure, see Configuring Dynamic RADIUS Proxy Parameters on page 161.
l
l

l

LDAP Server —To configure an LDAP server, select the LDAP option and specify the attributes described in the
following table:

Table 33: LDAP Server Configuration Parameters
Parameter

Description

Name

Enter the name of the LDAP server.

IP address

Enter the IP address of the LDAP  server.

Auth port

Enter the authorization port number of the LDAP server. The default port number is
389.

Admin-DN

Enter a distinguished name for the admin user with read/search privileges across
all the entries in the LDAP database (the user need not have write privileges, but
the user must be able to search the database, and read attributes of other users in
the database).

Admin password

Enter a password for administrator.

Base-DN

Enter a distinguished name for the node that contains the entire user database.

159 | Authentication and User Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Parameter

Description

Filter

Specify the filter to apply when searching for a user in the LDAP database. The
default filter string is (objectclass=*).

Key Attribute

Specify the attribute to use as a key while searching for the LDAP server. For Active
Directory, the value is sAMAccountName

Timeout

Enter a value between 1 and 30 seconds. The default value is 5.

Retry count

Enter a value between 1 and 5. The default value is 3.

Dead Time

Specify a dead time for authentication server in minutes within the range of 1-1440
minutes. The default dead time interval is 5 minutes.
When two or more authentication servers are configured on the W-IAP and a server
is unavailable, the dead time configuration determines the duration for which the
authentication server would be available if the server is marked as unavailable.

l

CPPM Server for AirGroup CoA — To configure a CPPM server used for AirGroup CoA (Change of
Authorization), select the CoA only checkbox. The RADIUS server is automatically selected.

Table 34: CPPM Server Configuration Parameters for AirGroup CoA
Parameter

Description

Name

Enter the name of the server.

IP address

Enter the IP address of the server.

Air Group CoA port

Enter a port number for sending AirGroup CoA on a different port than on the
standard CoA port. The default value is 5999.

Shared key

Enter a shared key for communicating with the external RADIUS server.

Retype key

Re-enter the shared key.

4. Click OK.
The CPPM server acts as a RADIUS server and asynchronously provides the AirGroup parameters for
the client device including shared user, role, and location.
To assign the RADIUS authentication server to a network profile, select the newly added server when configuring
security settings for a wireless or wired network profile.
You can also add an external RADIUS server by selecting the New option when configuring a WLAN or
wired profile. For more information, see Configuring Security Settings for a WLAN SSID Profile on page
99 and Configuring Security Settings for a Wired Profile on page 115.

In the CLI
To configure a RADIUS server:
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan auth-server 
AP)(Auth Server )# ip 
AP)(Auth Server )# key 
AP)(Auth Server )# port 
AP)(Auth Server )# acctport 

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Authentication and User Management | 160

(Instant AP)(Auth Server )#
(Instant AP)(Auth Server )#
(Instant AP)(Auth Server )#
(Instant AP)(Auth Server )#
(Instant AP)(Auth Server )#
(Instant AP)(Auth Server )#
(Instant AP)(Auth Server )#
)#
(Instant AP)# commit apply
(Instant AP)# commit apply

nas-id 
nas-ip 
timeout 
retry-count 
rfc3576
deadtime 
drp-ip   vlan  gateway
end

To configure an LDAP server:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ldap-server 
AP)(LDAP Server )# ip 
AP)(LDAP Server )# port 
AP)(LDAP Server )# admin-dn 
AP)(LDAP Server )# admin-password 
AP)(LDAP Server )# base-dn 
AP)(LDAP Server )# filter 
AP)(LDAP Server )# key-attribute 
AP)(LDAP Server )# timeout 
AP)(LDAP Server )# retry-count 
AP)(LDAP Server )# deadtime 
AP)(LDAP Server )# end
AP)# commit apply

To configure a CPPM server used for AirGroup CoA (Change of Authorization):
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan auth-server 
AP)(Auth Server )# ip 
AP)(Auth Server )# key 
AP)(Auth Server  # cppm-rfc3576-port 
AP)(Auth Server )# cppm-rfc3576-only
AP)(Auth Server )# end
AP)# commit apply

Configuring Dynamic RADIUS Proxy Parameters
The RADIUS server can be deployed at different locations and VLANs. In most cases, a centralized RADIUS or
local server is used to authenticate users. However, some user networks can use a local RADIUS server for
employee authentication and a centralized RADIUS based captive portal server for guest authentication. To ensure
that the RADIUS traffic is routed to the required RADIUS server, the dynamic RADIUS proxy feature must be
enabled.
If the W-IAP clients need to authenticate to the RADIUS servers through a different IP address and VLAN, ensure
that the following steps are completed:
1. Enable dynamic RADIUS proxy.
2. Configure dynamic RADIUS proxy IP, VLAN. netmask, gateway for each authentication server.
3. Associate the authentication servers to SSID or a wired profile to which the clients connect.
After completing the above-mentioned configuration steps, you can authenticate the SSID users against the
configured dynamic RADIUS proxy parameters.

Enabling Dynamic RADIUS Proxy
You can enable RADIUS Server Support using the Instant UI or CLI.
In the Instant UI
To enable RADIUS server support:
161 | Authentication and User Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

1. In the Instant main window, click the System link. The System window is displayed.
2. In the General tab of System window, select Enabled from the Dynamic RADIUS Proxy drop-down list.
3. Click OK.
When dynamic RADIUS proxy is enabled, ensure that a static Virtual Controller IP is configured. For more
information on configuring Virtual Controller IP address, see Configuring Virtual Controller IP Address on page 76.
When dynamic RADIUS proxy is enabled, the Virtual Controller network uses the IP Address of the Virtual
Controller for communication with external RADIUS servers. Ensure that the Virtual Controller IP Address is set as
a NAS IP when configuring RADIUS server attributes with dynamic RADIUS proxy enabled. For more information
on configuring RADIUS server attributes, see Configuring an External Server for Authentication on page 157.
In the CLI
To enable the dynamic RADIUS proxy feature:
(Instant AP)(config)# dynamic-radius-proxy
(Instant AP)(config)# end
(Instant AP)# commit apply

Configuring Dynamic RADIUS Proxy Parameters for Authentication Servers
You can configure DRP parameters for the authentication server by using the Instant UI or CLI.
In the Instant UI
1. Click the Security>Authentication Servers.
2. To create a new server, click New and configure the required RADIUS server parameters as described in Table
32.
3. Ensure that the following dynamic RADIUS proxy parameters are configured:
l

DRP IP— IP address to be used as source IP for RADIUS packets

l

DRP Mask—Subnet mask of the DRP IP address.

l

DRP VLAN—VLAN in which the RADIUS packets are sent.

l

DRP Gateway—Gateway IP address of the DRP VLAN.

4. Click OK.
In the CLI
To configure dynamic RADIUS proxy parameters:
(Instant AP)(config)# wlan auth-server 
(Instant AP)(Auth Server )# ip 
(Instant AP)(Auth Server )# key 
(Instant AP)(Auth Server )# port 
(Instant AP)(Auth Server )# acctport 
(Instant AP)(Auth Server )# nas-id 
(Instant AP)(Auth Server )# nas-ip 
(Instant AP)(Auth Server )# timeout 
(Instant AP)(Auth Server )# retry-count 
(Instant AP)(Auth Server )# deadtime 
(Instant AP)(Auth Server )# drp-ip   vlan  gateway

(Instant AP)(Auth Server )# end
(Instant AP)# commit apply

Associate the Authentication Servers with an SSID or Wired Profile
1. Access the WLAN wizard or Wired Settings window.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Authentication and User Management | 162

l

To open the WLAN wizard, select an existing SSID in the Network tab, and click edit.

l

To open the wired settings window, click More > Wired. In the Wired window, select a profile and click Edit.

You can also associate the authentication servers when creating a new WLAN or wired profile.
2. Click the Security tab.
3. If you are configuring the authentication server for a WLAN SSID, under Security tab, slide to Enterprise
security level.
4. Ensure that an authentication type is enabled.
5. From the Authentication Server 1 drop-down list, select the server name on which dynamic RADIUS proxy
parameters are enabled. You can also create a new server with RADIUS and RADIUS proxy parameters by
selecting New.
6. Click Next and then click Finish.
7. To assign the RADIUS authentication server to a network profile, select the newly added server when configuring
security settings for a wireless or wired network profile.
You can also add an external RADIUS server by selecting New for Authentication Server when
configuring a WLAN or wired profile. For more information, see Configuring Security Settings for a WLAN
SSID Profile on page 99 and Configuring Security Settings for a Wired Profile on page 115.

In the CLI
To associate an authentication server to a WLAN SSID:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile # auth-server 
(Instant AP)(SSID Profile # end
((Instant AP)# commit apply

To associate an authentication server to a wired profile:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wired-port-profile 
AP)(wired ap profile )# auth-server 
AP)(wired ap profile )# end
AP)# commit apply

Configuring 802.1X Authentication for a Network Profile
The Instant network supports internal RADIUS server and external RADIUS server for 802.1X authentication.
The steps involved in 802.1X authentication are as follows:
1. The NAS requests authentication credentials from a wireless client.
2. The wireless client sends authentication credentials to the NAS.
3. The NAS sends these credentials to a RADIUS server.
4. The RADIUS server checks the user identity and authenticates the client if the user details are available in its
database. The RADIUS server sends an Access-Accept message to the NAS. If the RADIUS server cannot
identify the user, it stops the authentication process and sends an Access-Reject message to the NAS. The
NAS forwards this message to the client and the client must re-authenticate with appropriate credentials.
5. After the client is authenticated, the RADIUS server forwards the encryption key to the NAS. The encryption key
is used for encrypting or decrypting traffic sent to and from the client.
The NAS acts as a gateway to guard access to a protected resource. A client connecting to the wireless network first
connects to the NAS.

163 | Authentication and User Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Configuring 802.1X Authentication for a Wireless Network Profile
You can configure 802.1X authentication for a wireless network profile in the Instant UI or CLI.

In the Instant UI
To enable 802.1X authentication for a wireless network:
1. In the Network tab, click New to create a new network profile or select an existing profile for which you want to
enable 802.1X authentication and click edit.
2. In the Edit  or New WLAN window, ensure that all required WLAN and VLAN attributes are
defined, and then click Next.
3. In the Security tab, specify the following parameters for the Enterprise security level:
a. Select any of the following options from the Key management drop-down list.
l

WPA-2 Enterprise

l

WPA Enterprise

l

Both (WPA-2 & WPA)

l

Dynamic WEP with 802.1X

4. If you do not want to use a session key from the RADIUS Server to derive pair wise unicast keys, set Session
Key for LEAP to Enabled.
5. To terminate the EAP portion of 802.1X authentication on the W-IAP instead of the RADIUS server, set
Termination to Enabled.
By default, for 802.1X authorization, the client conducts an EAP exchange with the RADIUS server, and the AP
acts as a relay for this exchange. When Termination is enabled, the W-IAP by itself acts as an authentication
server and terminates the outer layers of the EAP protocol, only relaying the innermost layer to the external
RADIUS server.
6. Specify the type of authentication server to use and configure other required parameters. You can also configure
two different authentication servers to function as primary and backup servers when termination is enabled. For
more information on RADIUS authentication configuration parameters, see Configuring an External Server for
Authentication on page 157.
7. Click Next to define access rules, and then click Finish to apply the changes.

In the CLI
To configure 802.1X authentication for a wireless network:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile )# type {|}
AP)(SSID Profile )# opmode {wpa2-aes|wpa-tkip|wpa-tkip,wpa2-aes|dynamic-wep}
AP)(SSID Profile )# leap-use-session-key
AP)(SSID Profile )# termination
AP)(SSID Profile )# auth-server 
AP)(SSID Profile )# auth-server 
AP)(SSID Profile )# radius-reauth-interval 
AP)(SSID Profile )# auth-survivability
AP)(SSID Profile )# exit
AP)(config)# auth-survivability cache-time-out 
AP)(config)# end
AP)# commit apply

Configuring 802.1X Authentication for Wired Profiles
You can configure 802.1X authentication for a wired profile in the Instant UI or CLI.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Authentication and User Management | 164

In the Instant UI
To enable 802.1X authentication for a wired profile:
1. Click the Wired link under More at the top right corner of the main window. The Wired window is displayed.
2. Click New under Wired Networks to create a new network or select an existing profile for which you want to
enable 802.1X authentication and then click Edit.
3. In the New Wired Network or the Edit Wired Network window, ensure that all the required Wired and VLAN
attributes are defined, and then click Next.
4. In the Security tab, select Enabled from the 802.1X authentication drop-down list.
5. Specify the type of authentication server to use and configure other required parameters. For more information on
configuration parameters, see Configuring Security Settings for a Wired Profile on page 115.
6. Click Next to define access rules, and then click Finish to apply the changes.
7. Assign the profile to an Ethernet port. For more information, see Assigning a Profile to Ethernet Ports on page
117.

In the CLI
To enable 802.1X authentication for a wired profile:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP) (config)# wired-port-profile 
AP) (wired ap profile )# type { |}
AP) (wired ap profile )# dot1x
AP) (wired ap profile )# auth-server 
AP) (wired ap profile )# auth-server 
AP) (wired ap profile )# server-load-balancing
AP) (wired ap profile )# radius-reauth-interval 
AP) (wired ap profile )# end
AP)# commit apply

Configuring MAC Authentication for a Network Profile
MAC authentication can be used alone or it can be combined with other forms of authentication such as WEP
authentication. However, it is recommended that you do not use the MAC-based authentication.
This section describes the following procedures:
l

Configuring MAC Authentication for Wireless Network Profiles on page 165

l

Configuring MAC Authentication for Wired Profiles on page 166

Configuring MAC Authentication for Wireless Network Profiles
You can configure MAC authentication for a wired profile in the Instant UI or CLI.

In the Instant UI
To enable MAC Authentication for a wireless network:
1. In the Network tab, click New to create a new network profile or select an existing profile for which you want to
enable MAC authentication and click edit.
2. In the Edit  or New WLAN window, ensure that all required WLAN and VLAN attributes are
defined, and then click Next.
3. In the Security tab, select Enabled from the MAC authentication drop-down list, for Personal or Open
security level.
4. Specify the type of authentication server to use.

165 | Authentication and User Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

5. If the internal authentication server is used, perform the following steps to allow MAC address based
authentication:
a. Click the Users link against the Internal server field. The Users window is displayed.
b. Specify the client MAC address as the user name and password.
c. Specify the type of the user (employee or guest).
d. Click Add.
e. Repeat the steps to add more users.
f. Click OK.
6. To allow the W-IAP to use a delimiter in the MAC authentication request, specify a character ( for example, colon
or dash) as a delimiter for the MAC address string. For example, if you specify the colon as a delimiter, MAC
addresses in the xx:xx:xx:xx:xx:xx format are used. If the delimiter is not specified, the MAC address in the
xxxxxxxxxxxx format is used.
7. To allow the W-IAP to use uppercase letters in the MAC address string, set Uppercase support to Enabled.
8. Configure other parameters as required.
9. Click Next to define access rules, and then click Finish to apply the changes.

In the CLI
To configure MAC-address based authentication with external server:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile )# type { | | }
AP)(SSID Profile )# mac-authentication
AP)(SSID Profile )# mac-authentication-delimiter 
AP)(SSID Profile )# mac-authentication-upper-case
AP)(SSID Profile )# external-server
AP)(SSID Profile )# auth-server 
AP)(SSID Profile )# auth-server 
AP)(SSID Profile )# server-load-balancing
AP)(SSID Profile )# radius-reauth-interval 
AP)(SSID Profile )# end
AP)# commit apply

To add users for MAC authentication based on internal authentication server:
(Instant AP)(config)# user  [] [portal| radius]
(Instant AP)(config)# end
(Instant AP)# commit apply

Configuring MAC Authentication for Wired Profiles
You can configure MAC authentication for a wired profile in the Instant UI or CLI.

In the Instant UI
To enable MAC authentication for a wired profile:
1. Click the Wired link under More at the top right corner of the main window. The Wired window is displayed.
2. Click New under Wired Networks to create a new network or select an existing profile for which you want to
enable MAC authentication and then click Edit.
3. In the New Wired Network or the Edit Wired Network window, ensure that all the required Wired and VLAN
attributes are defined, and then click Next.
4. In the Security tab, select Enabled from the MAC authentication drop-down list.
5. Specify the type of authentication server to use.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Authentication and User Management | 166

6. If the internal authentication server is used, perform the following steps to allow MAC address based
authentication:
a. Click the Users link against the Internal server field. The Users window is displayed.
b. Specify the client MAC address as the user name and password.
c. Specify the type of the user (employee or guest).
d. Click Add.
e. Repeat the steps to add more users.
f. Click OK.
7. Configure other parameters as required.
8. Click Next to define access rules, and then click Finish to apply the changes.

In the CLI
To configure MAC-address based authentication with external server:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# wired-port-profile 
AP)(wired ap profile )# type { |}
AP)(wired ap profile )# mac-authentication
AP)(wired ap profile )# auth-server 
AP)(wired ap profile )# auth-server 
AP)(wired ap profile )# server-load-balancing
AP)(wired ap profile )# radius-reauth-interval 
AP)(wired ap profile )# end
AP)# commit apply

To add users for MAC authentication based on internal authentication server:
(Instant AP)(config)# user  [] [portal| radius]
(Instant AP)(config)# end
(Instant AP)# commit apply

Configuring MAC Authentication with 802.1X Authentication
This section describes the following procedures:
l

Configuring MAC and 802.1X Authentication for a Wireless Network Profile on page 167

l

Configuring MAC and 802.1X Authentication for Wired Profiles on page 168

Configuring MAC and 802.1X Authentication for a Wireless Network Profile
You can configure MAC authentication with 802.1X authentication for wireless network profile using the Instant UI or
CLI.

In the Instant UI
To configure both MAC and 802.1X authentication for a wireless network:
1. In the Network tab, click New to create a new network profile or select an existing profile for which you want to
enable MAC and 802.1X authentication and click edit.
2. In the Edit  or New WLAN window, ensure that all required WLAN and VLAN attributes are
defined, and then click Next.
3. In the Security tab, ensure that the required parameters for MAC authentication and 802.1X authentication are
configured.
4. Select the Perform MAC authentication before 802.1X checkbox to use 802.1X authentication only when the
MAC authentication is successful.

167 | Authentication and User Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

5. Select the checkbox MAC authentication fail-thru to use 802.1X authentication even when the MAC
authentication fails.
6. Click Next and then click Finish to apply the changes.

In the CLI
To configure both MAC and 802.1X authentication for a wireless network:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile )# type { | | }
AP)(SSID Profile )# mac-authentication
AP)(SSID Profile )# l2-auth-failthrough
AP)(SSID Profile )# auth-server 
AP)(SSID Profile )# radius-reauth-interval 
AP)(SSID Profile )# auth-survivability
AP)(SSID Profile )# exit
AP)(config)# auth-survivability cache-time-out 
AP)(config)# end
AP)# commit apply

Configuring MAC and 802.1X Authentication for Wired Profiles
You can configure MAC and 802.1X authentication for a wired profile in the Instant UI or CLI.

In the Instant UI
To enable MAC and 802.1X authentication for a wired profile:
1. Click the Wired link under More at the top right corner of the main window. The Wired window is displayed.
2. Click New under Wired Networks to create a new network or select an existing profile for which you want to
enable MAC authentication and then click Edit.
3. In the New Wired Network or the Edit Wired Network window, ensure that all the required Wired and VLAN
attributes are defined, and then click Next.
4. In the Security tab, enable the following options:
l

Select Enabled from the MAC authentication drop-down list.

l

Select Enabled from the 802.1X authentication drop-down list.

l

Select Enabled from the MAC authentication fail-thru drop-down list.

5. Specify the type of authentication server to use and configure other required parameters. For more information on
configuration parameters, see Configuring Security Settings for a Wired Profile on page 115
6. Click Next to define access rules, and then click Finish to apply the changes.

In the CLI
To enable MAC and 802.1X authentication for a wired profile:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# wired-port-profile
AP)(wired ap profile "")#
AP)(wired ap profile "")#
AP)(wired ap profile "")#
AP)(wired ap profile "")#
AP)(wired ap profile "")#
AP)(wired ap profile "")#
AP)(wired ap profile "")#
AP)(wired ap profile "")#
AP)# commit apply

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide


type { |}
mac-authentication
dot1x
l2-auth-failthrough
auth-server 
server-load-balancing
radius-reauth-interval 
end

Authentication and User Management | 168

Configuring MAC Authentication with Captive Portal Authentication
This authentication method has the following features:
l

If the captive portal splash page type is Internal-Authenticated or External-RADIUS Server, MAC
authentication reuses the server configurations.

l

If the captive portal splash page type is Internal-Acknowledged or External-Authentication Text and MAC
authentication is enabled, a server configuration page is displayed.

l

If the captive portal splash page type is none, MAC authentication is disabled.

l

MAC authentication only role— You can use the WLAN wizard to configure the mac-auth-only role in the rolebased access rule configuration section when MAC authentication is enabled with captive portal authentication.

Configuring MAC Authentication with Captive Portal Authentication
You can configure the MAC authentication with Captive Portal authentication for a network profile using the Instant
UI or CLI.

In the Instant UI
1. Select an existing wireless or wired profile for which you want to enable MAC with Captive Portal authentication.
Depending on the network profile selected, the Edit  or Edit Wired Network window is
displayed.
You can configure MAC authentication with Captive Portal authentication, in the Access tab of the New WLAN and
New Wired Network windows when configuring a new profile.
2. In the Access tab, specify the following parameters for a network with Role-Based rules:
a. Select the Enforce Machine Authentication checkbox when MAC authentication is enabled for Captive
Portal. If the MAC authentication fails, the Captive Portal authentication role is assigned to the client.
b. For wireless network profile, select Enforce MAC Auth Only Role checkbox when MAC authentication is
enabled for Captive Portal. After successful MAC authentication, MAC auth only role is assigned to the client.
3. Click Next and then click Finish to apply the changes.

In the CLI
To configure MAC authentication with Captive Portal authentication for a wireless profile:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile )# type 
(Instant AP)(SSID Profile )# mac-authentication
(Instant AP)(SSID Profile )# captive-portal  exclude-uplink 
(Instant AP)(SSID Profile )# set-role-machine-auth  
(Instant AP)(SSID Profile )# set-role-mac-auth 
(Instant AP)(SSID Profile )# end
(Instant AP)# commit apply

To configure MAC authentication with Captive Portal authentication for a wired profile:
(Instant
(Instant
(Instant
(Instant
(Instant
 |
(Instant
(Instant
(Instant

AP)(config)#
AP)(wired ap
AP)(wired ap
AP)(wired ap
AP)(wired ap
Ethernet}
AP)(wired ap
AP)(wired ap
AP)(wired ap

169 | Authentication and User Management

wired-port-profile 
profile )# type 
profile )# mac-authentication
profile )# captive-portal 
profile )# captive-portal  exclude-uplink {<3G>| <4G>|
profile )# set-role-machine-auth  
profile )# set-role-mac-auth 
profile )# end
Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

(Instant AP)# commit apply

Configuring WISPr Authentication
Instant supports the following smart clients:
n

iPass

n

Boingo

These smart clients enable client authentication and roaming between hotspots by embedding iPass Generic
Interface Specification (GIS) redirect, authentication, and logoff messages within HTML messages that are sent to
the W-IAP.
WISPr authentication is supported only for the Internal - Authenticated and External - RADIUS Server captive
portal authentication. Select the Internal – Authenticated or the External - RADIUS Server option from the
Splash page type drop-down list to configure WISPr authentication for a WLAN profile.
You can configure WISPr authentication using the Instant UI or CLI.

In the Instant UI
1. Click the System link at the top-right corner of the Instant main window. The System window is displayed.
2. Click Show advanced options.
3. Click WISPr tab. The WISPr tab contents are displayed. The following figure shows the WISPr tab contents:
Figure 47 Configuring WISPr Authentication

4. Enter the ISO Country Code for the WISPr Location ID in the ISO Country Code text box.
5. Enter the E.164 Area Code for the WISPr Location ID in the E.164 Area Code text box.
6. Enter the operator name of the Hotspot in the Operator Name text box.
7. Enter the E.164 Country Code for the WISPr Location ID in the E.164 Country Code text box.
8. Enter the SSID/Zone section for the WISPr Location ID in the SSID/Zone text box.
9. Enter the name of the Hotspot location in the Location Name text box. If no name is defined, the name of the WIAP to which the user is associated is used.
10. Click OK to apply the changes.
The WISPr RADIUS attributes and configuration parameters are specific to the RADIUS server used by your ISP for
the WISPr authentication. Contact your ISP to determine these values. You can find a list of ISO and ITU country
and area codes at the ISO and ITU websites (iso.org and itu.int).
A Boingo smart client uses a NAS identifier in the format _ for location identification. To
support Boingo clients, ensure that you configure the NAS identifier parameter in the Radius server profile for the
WISPr server.

In the CLI
(Instant AP)(config)# wlan wispr-profile

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Authentication and User Management | 170

(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(WISPr)#
AP)(WISPr)#
AP)(WISPr)#
AP)(WISPr)#
AP)(WISPr)#
AP)(WISPr)#
AP)(WISPr)#
AP)# commit

wispr-location-id-ac
wispr-location-id-cc
wispr-location-id-isocc
wispr-location-id-network
wispr-location-name-location
wispr-location-name-operator-name
end
apply

Blacklisting Clients
The client blacklisting denies connection to the blacklisted clients. When a client is blacklisted, it is not allowed to
associate with a W-IAP in the network. If a client is connected to the network when it is blacklisted, a
deauthentication message is sent to force client disconnection.
This section describes the following procedures:
l

Blacklisting Clients Manually on page 171

l

Blacklisting Users Dynamically on page 172

Blacklisting Clients Manually
Manual blacklisting adds the MAC address of a client to the blacklist. These clients are added into a permanent
blacklist. These clients are not allowed to connect to the network unless they are removed from the blacklist.

Adding a Client to the Blacklist
You can add a client to the blacklist manually using the Instant UI or CLI.

In the Instant UI
1. Click the Security link from the top right corner of the Instant main window.
2. Click the Blacklisting tab.
3. Under the Manual Blacklisting, click New.
4. Enter the MAC address of the client to be blacklisted in the MAC address to add text box.
5. Click OK. The Blacklisted Since tab displays the time at which the current blacklisting has started for the client.
6. To delete a client from the manual blacklist, select the MAC Address of the client under the Manual Blacklisting,
and then click Delete.

In the CLI
To blacklist a client:
(Instant AP)(config)# blacklist-client 
(Instant AP)(config)# end
(Instant AP)# commit apply

To view the blacklisted clients:
(Instant AP)# show blacklist-client
Blacklisted Clients
------------------MAC Reason Timestamp Remaining time(sec) AP name
--- ------ --------- ------------------- ------00:1c:b3:09:85:15 user-defined 17:21:29 Permanent -

171 | Authentication and User Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Blacklisting Users Dynamically
The clients can be blacklisted dynamically when they exceed the authentication failure threshold or when a
blacklisting rule is triggered as part of the authentication process.

Authentication Failure Blacklisting
When a client takes time to authenticate and exceeds the configured failure threshold, it is automatically blacklisted
by a W-IAP.

Session Firewall Based Blacklisting
In session firewall based blacklisting, an ACL rule is used to enable the option for automation blacklisting. When the
ACL rule is triggered, it sends out blacklist information and the client is blacklisted.

Configuring Blacklist Duration
You can set the blacklist duration using the Instant UI or CLI.
In the Instant UI
To set a blacklist duration:
1. Click the Security link from the top right corner of the Instant main window.
2. Click the Blacklisting tab.
3. Under Dynamic Blacklisting:
4. For Auth failure blacklist time, the duration in seconds after which the clients that exceed the authentication
failure threshold must be blacklisted.
5. For PEF rule blacklisted time, enter the duration in seconds after which the clients can be blacklisted due to an
ACL rule trigger.
You can configure a maximum number of authentication failures by the clients, after which a client must
be blacklisted. For more information on configuring maximum authentication failure attempts, see
Configuring Security Settings for a WLAN SSID Profile on page 99
To enable session firewall based blacklisting, click New and navigate to WLAN Settings > VLAN >
Security > Access window, and enable the Blacklist option of the corresponding ACL rule.
In the CLI
To dynamically blacklist clients:
(Instant
(Instant
(Instant
(Instant

AP)(config)# auth-failure-blacklist-time 
AP)(config)# blacklist-time 
AP)(config)# end
AP)# commit apply

To view the blacklisted clients:
(Instant AP)# show blacklist-client config
Blacklist Time :60
Auth Failure Blacklist Time :60
Manually Blacklisted Clients
---------------------------MAC Time
--- ---Dynamically Blacklisted Clients
------------------------------MAC Reason Timestamp Remaining time(sec) AP IP
--- ------ --------- ------------------- ----Dyn Blacklist Count :0

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Authentication and User Management | 172

Uploading Certificates
A certificate is a digital file that certifies the identity of the organization or products of the organization. It is also used
to establish your credentials for any Web transactions. It contains the organization name, a serial number, expiration
date, a copy of the certificate-holder's public key, and the digital signature of the certificate-issuing authority so that a
recipient can ensure that the certificate is real.
Instant supports the following certificate files:
l

Auth server or captive portal server certificate: PEM format with passphrase (PSK)

l

CA certificate: PEM or DER format

In the current release, W-IAP supports uploading of a customized certificate for internal captive portal server.
This section describes the following procedures:
l

Loading Certificates through Instant UI on page 173

l

Loading Certificates through Instant CLI

l

Loading Certificates through W-AirWave on page 174

Loading Certificates through Instant UI
To load a certificate in the Instant UI:
1. Click the Maintenance link at the top right corner of the Instant main window.
2. Click the Certificates tab. The Certificates tab contents are displayed. The following figure shows the
Certificates window:
Figure 48 Maintenance Window: Certificates Tab

3. To upload a certificate, click Upload New Certificate. The New Certificate window is displayed.
4. Browse and select the file to upload.
5. Select any of the following types of certificates from the Certificate type drop-down list:
l

CA—CA certificates validate the client’s certificate.

l

Auth Server—The authentication server certificate verifies the server's identity to the client.

l

Captive portal server—Captive portal server certificate verifies internal captive portal server's identity to the client.

6. Select the certificate format from the Certificate format drop-down list.
7. If you have selected Auth Server or Captive portal server type, enter a passphrase in Passphrase and
reconfirm. The default password is whatever. If the certificate does not include a passphrase, there is no
passphrase required.

173 | Authentication and User Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

8. Click Browse and select the appropriate certificate file, and click Upload Certificate. The Certificate
Successfully Installed message is displayed.

Loading Certificates through Instant CLI
To upload a certificate:
(Instant AP)# copy tftp {  cpserver cert  format {p12|pem}
|system {1xca [format {der|pem}]|1xcert [format {p12|pem}]}

Loading Certificates through W-AirWave
You can manage certificates using the W-AirWave. The AMP directly provisions the certificates and performs basic
certificate verification (such as certificate type, format, version, serial number and so on), before accepting the
certificate and uploading to a W-IAP network. The AMP packages the text of the certificate into an HTTPS message
and sends it to the Virtual Controller. After the VC receives this message, it draws the certificate content from the
message, converts it to the right format, and saves it on the RADIUS server.
To load a certificate in W-AirWave:
1. Navigate to Device Setup > Certificate and then click Add to add a new certificate. The Certificate window is
displayed.
2. Enter the certificate Name, and click Choose File to browse and upload the certificate.
Figure 49 Loading Certificate via W-AirWave

3. Select the appropriate Format that matches the certificate file name. Select Server Cert for certificate Type,
and provide the passphrase if you want to upload a Server certificate. Select either Intermediate CA or Trusted
CA certificate Type, if you want to upload a CA certificate.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Authentication and User Management | 174

Figure 50 Server Certificate

4. After you upload the certificate, navigate to Groups, click the Instant Group and then select Basic. The Group
name is displayed only if you have entered the Organization name in the Instant UI. For more information, see
Configuring Organization String on page 277 for further information.
Figure 51 Selecting the Group

The Virtual Controller Certificate section displays the certificates (CA cert and Server).
5. Click Save to apply the changes only to W-AirWave. Click Save and Apply to apply the changes to the W-IAP.
6. To clear the certificate options, click Revert.

175 | Authentication and User Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Chapter 12
Roles and Policies

This chapter describes the procedures for configuring user roles, role assignment, and firewall policies.
l

Firewall Policies on page 176

l

Content Filtering on page 186

l

Configuring User Roles on page 190

l

Configuring Derivation Rules on page 192

Firewall Policies
Instant firewall provides identity-based controls to enforce application-layer security, prioritization, traffic forwarding,
and network performance policies for wired and wireless networks. Using Instant firewall, you can enforce network
access policies that define access to the network, areas of the network that users may access, and the performance
thresholds of various applications.
Instant supports a role-based stateful firewall. Instant firewall recognizes flows in a network and keeps track of the
state of sessions. Instant firewall manages packets according to the first rule that matches packet. The firewall logs
on the W-IAPs are generated as syslog messages.

Access Control List Rules
You can use Access Control List (ACL) rules to either permit or deny data packets passing through the W-IAP. You
can also limit packets or bandwidth available to a set of user roles by defining access rules. By adding custom rules,
you can block or allow access based on the service or application, source or destination IP addresses.
You can create access rules to allow or block data packets that match the criteria defined in an access rule. You can
create rules for either inbound traffic or outbound traffic. Inbound rules explicitly allow or block the inbound network
traffic that matches the criteria in the rule. Outbound rules explicitly allow or block the network traffic that matches
the criteria in the rule. For example, you can configure a rule to explicitly block outbound traffic to an IP address
through the firewall.
The W-IAP clients are associated with user roles, which determine the client’s network privileges and the frequency
at which clients re-authenticate.
Instant supports the following types of ACLs:
l

ACLs that permit or deny traffic based on the source IP address of the packet.

l

ACLs that permit or deny traffic based on source or destination IP address, source or destination port number.

l

ACLs that permit or deny traffic based on network services, application, application categories, web categories,
and security ratings.

You can configure up to 128 access control entries in an ACL for a user role.

For more information on configuring firewall rules, see:
l

Configuring Access Rules for Network Services on page 177.

l

Configuring Network Address Translation Rules on page 179

l

Configuring Inbound Firewall Rules on page 183

l

Configuring Access Rules for Application and Application Categories on page 246

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Roles and Policies | 176

l

Configuring Web Policy Enforcement on page 249

Configuring Access Rules for Network Services
This section describes the procedure for configuring ACLs to control access to network services. For information on:
l

Configuring access rules based on application and application categories, see Configuring Access Rules for
Application and Application Categories on page 246.

l

Configuring access rules based on web categories and web reputation, see Configuring Web Policy Enforcement
on page 249.

In the Instant UI
To configure ACL rules for a user role:
1. Navigate to Security > Roles tab. The Roles tab contents are displayed.
You can also configure access rules for a wired or wireless client through the WLAN wizard (Network
tab>WLAN SSID> Edit>Edit WLAN > Access ) or the Wired profile (More > Wired>Edit> Edit Wired
Network> Access) window.
2. Select the role for which you want to configure access rules.
3. In Access rules section, click New to add a new rule. The New Rule window is displayed.
4. Ensure that the rule type is set to Access Control
5. To configure a rule to control access to network services, select Network under service category and specify the
following parameters:
Table 35: Access Rule Configuration Parameters
Service
Category
Network

Action

Description
Select a service from the list of available services. You can allow or deny access to any or all
of the following services based on your requirement:
l any—Access is allowed or denied to all services.
l custom—Available options are TCP, UDP, and Other. If you select the TCP or UDP options,
enter appropriate port numbers. If you select the Other option, enter the appropriate ID.
NOTE: If TCP and UDP uses the same port, ensure that you configure separate access rules
to permit or deny access.
Select any of following actions:
Select Allow to allow access users based on the access rule.
l Select Deny to deny access to users based on the access rule.
l Select Destination-NAT to allow changes to destination IP address.
l Select Source-NAT to allow changes to the source IP address.
The destination-nat and source-nat actions apply only to the network services rules.
l

Destination

177 | Roles and Policies

Select a destination option for the access rules for network services, applications, and
application categories. You can allow or deny access to any the following destinations based
on your requirements.
l to all destinations— Access is allowed or denied to all destinations.
l to a particular server—Access is allowed or denied to a particular server. After selecting
this option, specify the IP address of the destination server.
l except to a particular server—Access is allowed or denied to servers other than the
specified server. After selecting this option, specify the IP address of the destination
server.
l to a network—Access is allowed or denied to a network. After selecting this option, specify

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 35: Access Rule Configuration Parameters
Service
Category

Description

l

l

the IP address and netmask for the destination network.
except to a network—Access is allowed or denied to networks other than the specified
network. After selecting this option, specify the IP address and netmask of the destination
network.
to domain name—Access is allowed or denied to the specified domains. After selecting
this option, specify the domain name in the Domain Name text box.

Log

Select this checkbox if you want a log entry to be created when this rule is triggered. Instant
supports firewall based logging function. Firewall logs on the W-IAPs are generated as
security logs.

Blacklist

Select the Blacklist checkbox to blacklist the client when this rule is triggered. The blacklisting
lasts for the duration specified as Auth failure blacklist time on the Blacklisting tab of the
Security window. For more information, see Blacklisting Clients on page 171.

Classify media

Select the Classify media checkbox to prioritize video and voice traffic. When enabled, a
packet inspection is performed on all non-NAT traffic and the traffic is marked as follows:
l Video: Priority 5 (Critical)
l Voice: Priority 6 (Internetwork Control)

Disable scanning

Select Disable scanning checkbox to disable ARM scanning when this rule is triggered.
The selection of the Disable scanning applies only if ARM scanning is enabled, For more
information, see Configuring Radio Settings for a W-IAP on page 238.

DSCP tag

Select the DSCP tag checkbox to specify a DSCP value to prioritize traffic when this rule is
triggered. Specify a value within the range of 0 to 63. To assign a higher priority, specify a
higher value.

802.1p priority

Select the 802.1p priority checkbox to specify an 802.1p priority. Specify a value between 0
and 7. To assign a higher priority, specify a higher value.

6. Click OK and then click Finish.

In the CLI
To configure access rules:
(Instant AP)(config)# wlan access-rule 
(Instant AP)(Access Rule )#rule    { 
 {permit|deny|src-nat|dst-nat{ | }}[]
(Instant AP)(Access Rule )# end
(Instant AP)# commit apply

Example
(Instant AP)(config)# wlan access-rule employee
(Instant AP)(Access Rule "employee")# rule 10.17.88.59 255.255.255.255 match 6 4343 4343 log
classify-media
(Instant AP)(Access Rule "employee")# rule 192.0.2.8 255.255.255.255 invert 6 110 110 permit
(Instant AP)(Access Rule "employee")# rule 192.0.2.2 255.255.255.0 192.0.2.7 255.255.255.0
match tcp 21 21 deny
(Instant AP)(Access Rule "employee")# rule 192.0.2.2 255.255.255.0 192.0.2.7 255.255.255.0
match udp 21 21 deny
(Instant AP)(Access Rule "employee")# rule 192.0.2.2 255.255.255.0 match 6 631 631 permit
(Instant AP)(Access Rule "employee")# rule 192.0.2.8 255.255.255.255 invert 6 21 21 deny
(Instant AP)(Access Rule "employee")# rule 192.0.2.1 255.255.255.0 invert 17 67 69 deny
(Instant AP)(Access Rule "employee")# end
(Instant AP)# commit apply

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Roles and Policies | 178

Configuring Network Address Translation Rules
Network Address Translation (NAT) is the process of modifying network address information when packets pass
through a routing device. The routing device acts as an agent between the public (the Internet) and private (local
network), which allows translation of private network IP addresses to a public address space.
Instant supports the NAT mechanism to allow a routing device to use the translation tables to map the private
addresses into a single IP address and packets are sent from this address, so that they appear to originate from the
routing device. Similarly, if the packets are sent to the private IP address, the destination address is translated as
per the information stored in the translation tables of the routing device.

Configuring a Source NAT Access Rule
The source NAT action in access rules allows the user to override the routing profile entries. For example, when a
routing profile is configured to use 0.0.0.0/0, the client traffic in L3 mode access on an SSID destined to the
corporate network is sent to the tunnel. When an access rule is configured with Source NAT action, the users can
specify the service, protocol, or destination to which the source NAT is applied.
You can also configure source based routing to allow client traffic on one SSID to reach the Internet through the
corporate network, while the other SSID can be used as an alternate uplink. You can create an access rule to
perform source NAT by using the Instant UI or CLI.
In the Instant UI
To configure a source NAT access rule:
1. Navigate to the WLAN wizard or Wired settings window:
l

To configure access rules for a WLAN SSID, in the Network tab, click New to create a new network profile or
edit to modify an existing profile.

l

To configure access rules for a wired profile, More > Wired. In the Wired window, click New under Wired
Networks to create a new network or click Edit to select an existing profile.

2. Click the Access tab.
3. To configure access rules for the network, slide to Network-based. To configure access rules for user roles,
slide to Role-based.
4. To create a new rule for the network, click New. To create an access rule for a user role, select the user role and
then click New. The New Rule window is displayed.
5. In the New Rule window:
6. Select Access control from the Rule type drop-down list.
7. Select Source-NAT from the Action drop-down list, to allow changes to the source IP address.
8. Select a service from the list of available services.
9. Select the required option from the Destination drop-down list.
10. If required, enable other parameters such as Log, Blacklist, Classify media, Disable scanning, DSCP tag, and
802.1p priority.
11. Click OK and then click Finish.
In the CLI
To configure source NAT access rule:
(Instant AP)(config)# wlan access-rule 
(Instant AP)(Access Rule "")# rule     
 src-nat
(Instant AP)(Access Rule "")# end
(Instant AP)# commit apply

179 | Roles and Policies

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Configuring Source-Based Routing
To allow different forwarding policies for different SSIDs, you can configure source-based routing. The source-based
routing configuration overrides the routing profile configuration and allows any destination or service to be configured
to have direct access to the Internet (bypassing VPN tunnel) based on the ACL rule definition. When source-based
routing is enabled, the Virtual Controller performs source NAT by using its uplink IP address.
To configure source-based routing:
1. Ensure that an L3 subnet with the netmask, gateway, VLAN, and IP address is configured. For more information
on configuring L3 subnet, see Configuring L3-Mobility on page 307.
2. Ensure that the source IP address is associated with the IP address configured for the L3 subnet.
3. Create an access rule for the SSID profile with Source NAT action as described in Configuring Source-Based
Routing on page 180. The source NAT pool is configured and source based routing entry is created.

Configuring a Destination NAT Access Rule
Instant supports configuration of the destination NAT rule, which can be used to redirect traffic to the specified IP
address and destination port. Destination-NAT configuration is supported only in the bridge mode without VPN.
You can configure a destination-NAT access rule by using the Instant UI or CLI.
In the Instant UI
To configure a destination NAT access rule:
1. Navigate to the WLAN wizard or Wired settings window:
l

To configure access rules for a WLAN SSID, in the Network tab, click New to create a new network profile or
edit to modify an existing profile.

l

To configure access rules for a wired profile, More > Wired. In the Wired window, click New under Wired
Networks to create a new network or click Edit to select an existing profile.

2. Click the Access tab.
3. To configure access rules for the network, slide to Network-based. To configure access rules for user roles,
slide to Role-based .
4. To create a new rule for the network, click New. To create an access rule for a user role, select the user role and
then click New. The New Rule window is displayed.
5. In the New Rule window:
6. Select Access control from the Rule type drop-down list.
7. Select destination-NAT from the Action drop-down list, to allow changes to the source IP address.
8. Specify the IP address and port details.
9. Select a service from the list of available services.
10. Select the required option from the Destination drop-down list.
11. If required, enable other parameters such as Log, Blacklist, Classify media, Disable scanning, DSCP tag, and
802.1p priority.
12. Click OK and then click Finish.
In the CLI
To configure destination NAT access rule:
(Instant AP)(config)# wlan access-rule 
(Instant AP)(Access Rule "")# rule     
 dst-nat ip  []
(Instant AP)(Access Rule "")# end
(Instant AP)# commit apply

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Roles and Policies | 180

Configuring ALG Protocols
You can enable or disable protocols for Application Layer Gateway (ALG) using the Instant UI or CLI.

In the Instant UI
To configure protocols for ALG:
1. Click the Security link at the top right corner of Instant main window.
2. Click the Firewall Settings tab. The Firewall Settings tab contents are displayed. The following figure shows
the contents of the Firewall Settings tab:
Figure 52 Firewall Settings—ALG Protocols

3. Select Enabled from the corresponding drop-down lists to enable SIP, VOCERA, Alcatel NOE, and Cisco
skinny protocols.
4. Click OK.
When the protocols for ALG are Disabled the changes do not take effect affect until the existing user sessions are
expired. Reboot the W-IAP and the client, or wait for few minutes for changes to affect.

In the CLI
To configure protocols for ALG:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# alg
AP)(ALG)# sccp-disable
AP)(ALG)# no sip-disable
AP)(ALG)# no ua-disable
AP)(ALG)# no vocera-disable
AP)(ALG)# end
AP)# commit apply

To view the ALG configuration:
(Instant AP)# show alg
Current ALG
----------ALG Status
--- -----sccp Disabled
sip Enabled
ua Enabled
vocera Enabled

Configuring Firewall Settings for Protection from ARP Attacks
You can configure firewall settings to protect the network against attacks using the Instant UI or CLI.

181 | Roles and Policies

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

In the Instant UI
To configure firewall settings:
1. Click the Security link at the top right corner of Instant main window.
2. Click the Firewall Settings tab. The Firewall Settings tab contents are displayed.
3. To configure protection against security attacks, select the following checkboxes:
l

Select Drop bad ARP to enable the W-IAP to drop the fake ARP packets.

l

Select Fix malformed DHCP to the W-IAP to fix the malformed DHCP packets.

l

Select ARP poison check to enable the W-IAP to trigger an alert notifying the user about the ARP poisoning
that may have been caused by the rogue APs.

Figure 53 Firewall Settings —Protection Against Wired Attacks

4. Click OK.

In the CLI
To configure firewall settings to prevent attacks
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# attack
AP)(ATTACK)# drop-bad-arp-enable
AP)(ATTACK)# fix-dhcp-enable
AP)(ATTACK)# poison-check-enable
AP)(ATTACK)# end
AP)# commit apply

To view the configuration status:
(Instant AP)# show attack config
Current Attack
-------------Attack Status
------ -----drop-bad-arp Enabled
fix-dhcp Enabled
poison-check Enabled

To view the attack statistics
(Instant AP)# show attack stats
attack counters
-------------------------------------Counter Value
------- ------arp packet counter 0
drop bad arp packet counter 0
dhcp response packet counter 0
fixed bad dhcp packet counter 0
send arp attack alert counter 0
send dhcp attack alert counter 0
arp poison check counter 0
garp send check counter 0

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Roles and Policies | 182

Managing Inbound Traffic
Instant now supports an enhanced inbound firewall by allowing the configuration of firewall rules and management
subnets, and restricting corporate access through an uplink switch.
To allow flexibility in firewall configuration, Instant supports the following features:
l

Inbound firewall rules

l

Configurable management subnets

l

Restricted corporate access

Configuring Inbound Firewall Rules
You can now configure firewall rules for the inbound traffic coming through the uplink ports of a W-IAP. The rules
defined for the inbound traffic are applied if the destination is not a user connected to the W-IAP. If the destination
already has a user role assigned, the user role overrides the actions or options specified in inbound firewall
configuration. However, if a deny rule is defined for the inbound traffic, it is applied irrespective of the destination and
user role. Unlike the ACL rules in a WLAN SSID or wired profile, the inbound firewall rules can be configured based
on the source subnet.
For all subnets, a deny rule is created by default as the last rule. If at least one rule is configured, the deny all rule is
applied to the upstream traffic by default.
Management access to the AP is allowed irrespective of the inbound firewall rule. For more information on
configuring restricted management access, see Configuring Management Subnets on page 185.
The inbound firewall is not applied to traffic coming through GRE tunnel.
You can configure inbound firewall rules through the Instant UI or CLI.
In the Instant UI
1. Navigate to Security > Inbound Firewall tab. The Inbound Firewall tab contents are displayed.
2. Under Inbound Firewall Rules, click New. The New Rule window is displayed.
Figure 54 Inbound Firewall Rules - New Rule Window

3. Configure the following parameters:

183 | Roles and Policies

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 36: Inbound Firewall Rule Configuration Parameters
Parameter
Action

Description
Select any of following actions:
Select Allow to allow access users based on the access rule.
l Select Deny to deny access to users based on the access rule.
l Select Destination-NAT to allow changes to destination IP address.
l Select Source-NAT to allow changes to the source IP address.
The destination-nat and source-nat actions apply only to the network services rules.
l

Service

Select a service from the list of available services. You can allow or deny access to any or all
of the following services based on your requirement:
l any—Access is allowed or denied to all services.
l custom—Available options are TCP, UDP, and Other. If you select the TCP or UDP options,
enter appropriate port numbers. If the Other option is selected, ensure enter the
appropriate ID is entered.

Source

Select any of the following options:
l
l

l

from all sources— Traffic from all sources is either allowed, denied, or the IP address is
translated at the source or destination as defined in the rule.
from a host—Traffic from a particular host is either allowed, denied, or the IP address is
translated at the source or destination as defined in the rule. After selecting this option,
specify the IP address of the host.
from a network—Traffic from a particular network is either allowed, denied, or the IP
address is translated at the source or destination as defined in the rule. After selecting this
option, specify the IP address and netmask of the source network.

Destination

Select a destination option for the access rules for network services, applications, and
application categories. You can allow or deny access to any the following destinations based
on your requirements.
l to all destinations— Traffic for all destinations is allowed, denied, or the IP address is
translated at the source or destination as defined in the rule.
l to a particular server—Traffic to a specific server is allowed, denied, or the IP address is
translated at the source or destination as defined in the rule. After selecting this option,
specify the IP address of the destination server.
l except to a particular server—Access is allowed or denied to servers other than the
specified server. After selecting this option, specify the IP address of the destination
server.
l to a network—Traffic to the specified network is allowed, denied, or the IP address is
translated at the source or destination as defined in the rule. After selecting this option,
specify the IP address and netmask for the destination network.
l except to a network—Access is allowed or denied to networks other than the specified
network. After selecting this option, specify the IP address and netmask of the destination
network.
l to domain name—Traffic to the specified domain is allowed, denied, or the IP address is
translated at the source or destination as defined in the rule. After selecting this option,
specify the domain name in the Domain Name text box.

Log

Select this checkbox if you want a log entry to be created when this rule is triggered. Instant
supports firewall based logging function. Firewall logs on the W-IAPs are generated as
security logs.

Blacklist

Select the Blacklist checkbox to blacklist the client when this rule is triggered. The blacklisting
lasts for the duration specified as Auth failure blacklist time on the Blacklisting tab of the
Security window. For more information, see Blacklisting Clients on page 171.

Classify media

Select the Classify media checkbox to prioritize video and voice traffic. When enabled, a
packet inspection is performed on all non-NAT traffic and the traffic is marked as follows:
l Video: Priority 5 (Critical)

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Roles and Policies | 184

Table 36: Inbound Firewall Rule Configuration Parameters
Parameter

Description
l

Voice: Priority 6 (Internetwork Control)

Disable scanning

Select Disable scanning checkbox to disable ARM scanning when this rule is triggered.
The selection of the Disable scanning applies only if ARM scanning is enabled, For more
information, see Configuring Radio Settings for a W-IAP on page 238.

DSCP tag

Select the DSCP tag checkbox to specify a DSCP value to prioritize traffic when this rule is
triggered. Specify a value within the range of 0 to 63. To assign a higher priority, specify a
higher value.

802.1p priority

Select the 802.1p priority checkbox to specify an 802.1p priority. Specify a value between 0
and 7. To assign a higher priority, specify a higher value.

4. Click OK and then click Finish.
In the CLI
To configure inbound firewall rules:
(Instant AP)(config)# inbound-firewall
(Instant AP)(inbound-firewall)# rule       
{permit|deny|src-nat|dst-nat  } []
(Instant AP)(inbound-firewall)# end
(Instant AP)# commit apply

Example
(Instant
(Instant
(Instant
(Instant

AP)(config)# inbound-firewall
AP)(inbound-firewall)# rule 192.0.2.1 255.255.255.255 any any match 6 631 631 permit
AP)(inbound-firewall)# end
AP)# commit apply

Configuring Management Subnets
You can configure subnets to ensure that the W-IAP management is carried out only from these subnets. When the
management subnets are configured, Telnet, SSH, and UI access is restricted to these subnets only.
You can configure management subnets by using the Instant UI or CLI.
In the Instant UI
To configure management subnets:
1. Navigate to Security > Inbound Firewall. The Inbound Firewall tab contents are displayed.

185 | Roles and Policies

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Figure 55 Firewall Settings—Management Subnets

2. To add a new management subnet:
l

Enter the subnet address in Subnet.

l

Enter the subnet mask in Mask.

l

Click Add.

3. To add multiple subnets, repeat step 2.
4. Click OK.
In the CLI
To configure a management subnet:
(Instant AP)(config) # restricted-mgmt-access  
(Instant AP)(config) # end
(Instant AP)# commit apply

Configuring Restricted Access to Corporate Network
You can configure restricted corporate access to block unauthorized users from accessing the corporate network.
When restricted corporate access is enabled, corporate access is blocked from the uplink port of master W-IAP,
including clients connected to a slave W-IAP. You can configure restricted corporate access by using the Instant UI
or CLI.
In the Instant UI
To configure restricted corporate access:
1. Navigate to Security > Inbound Firewall. The Inbound Firewall (see Figure 55) tab contents are displayed.
2. Select Enabled from the Restrict Corporate Access.
3. Click OK.
In the CLI
To configure restricted management access:
(Instant AP)(config) # restrict-corp-access
(Instant AP)(config) # end
(Instant AP)# commit apply

Content Filtering
The content filtering feature allows you to route DNS request to the OpenDNS platform and create content filtering
policies.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Roles and Policies | 186

With content filter, you can:
l

Allow all DNS requests to the non-corporate domains on a wireless or wired network to be sent to the open DNS
server. When the OpenDNS credentials are configured, the W-IAP uses these credentials to access OpenDNS
to provide enterprise-level content filtering. For more information, see Configuring OpenDNS Credentials on page
266

l

Block certain categories of websites based on your organization policy. For example, if you block the webbased-email category, clients who are assigned this policy will not be able to visit email-based websites such as
mail.yahoo.com.

l

Prevent known malware hosts from accessing your wireless network.

l

Improve employee productivity by limiting access to certain websites.

l

Reduce bandwidth consumption significantly.

Regardless of whether content filtering is disabled or enabled, the DNS requests to instant.dell-pcw.com are
always resolved internally on Instant.
The content filtering configuration applies to all W-IAPs in the network and the service is enabled or disabled globally
across the wireless or wired network profiles.

Enabling Content Filtering
This section describes the following procedures:
l

Enabling Content Filtering for a Wireless Profile on page 187

l

Enabling Content Filtering for a Wired Profile

Enabling Content Filtering for a Wireless Profile
To enable content filtering for a wireless SSID, perform the following steps:
In the Instant UI
1. Select a wireless profile in the Networks tab and then click the edit link. The window for editing the WLAN SSID
profile is displayed.
2. Click Show advanced options.
3. Select Enabled from the Content Filtering drop-down list, and click Next to continue.
You can also enable content filtering while adding a new wireless profile. For more information, see Configuring
WLAN Settings for an SSID Profile on page 93.
In the CLI
To enable content filtering on a WLAN SSID:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile )# content-filtering
AP)(SSID Profile )# end
AP)# commit apply

Enabling Content Filtering for a Wired Profile
To enable content filtering for a wired profile, perform the following steps:
In the Instant UI
1. Click the Wired link under More at the top right corner of the main window. The Wired window is displayed.
2. In the Wired window, select the wired profile to modify.

187 | Roles and Policies

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

3. Click Edit. The Edit Wired Network window is displayed.
4. In the Wired Settings tab, select Enabled from the Content Filtering drop-down list and click Next to continue.
In the CLI
To enable content filtering for a wired profile in the CLI:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wired-port-profile test
AP)(wired ap profile )# content-filtering
AP)(wired ap profile )# end
AP)# commit apply

Configuring Enterprise Domains
The enterprise domain names list displays the DNS domain names that are valid on the enterprise network. This list
is used to determine how client DNS requests must be routed. When Content Filtering is enabled, the DNS request
of the clients is verified and the domain names that do not match the names in the list are sent to the open DNS
server.
You can configure an enterprise domain through the Instant UI or CLI.

In the Instant UI
To manually add a domain:
1. Navigate to System > General, click Show advanced options > Enterprise Domains. The Enterprise
Domain tab contents are displayed.
2. Click New and enter a New Domain Name. Using “*” as an enterprise domain causes all DNS traffic to go
through the tunnel to the original DNS server of clients. If you are configuring routing profile with split-tunnel
disabled, you need add “*” to the enterprise domain list.
3. Click OK to apply the changes.
To delete a domain, select the domain and click Delete to remove the domain name from the list.

In the CLI
To configure an enterprise domain:
(Instant
(Instant
(Instant
(Instant

AP)(config)# internal-domains
AP)(domain)# domain-name 
AP)(domain)# end
AP)# commit apply

Configuring URL Filtering Policies
You can configure URL filtering policies to block certain categories of websites based on your organization
specifications by defining ACL rules either through the Instant UI or CLI.

In the Instant UI
1. Navigate to Security >Roles.
2. Select any WLAN SSID or wired profile role, and click New in the Access Rules section. The New Rule window
appears.
3. Select the rule type as Access Control.
4. To set an access policy based on the web category:
a. Under Services, select Web category and expand the Web categories drop-down.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Roles and Policies | 188

Figure 56

b. Select the categories to which you want to deny or allow access. You can also search for a web category and
select the required option.
c. From the Action drop-down, select Allow or Deny as required.
d. Click OK.
5. To filter access based on the security ratings of the website:
a. Select Web reputation under Services.
b. Move the slider to the required security rating level.
c. From the Action drop-down, select Allow or Deny as required.
6. To set a bandwidth limit based on web category or web reputation score, select Application Throttling checkbox
and specify the downstream and upstream rates in Kbps. For example, you can set a higher bandwidth for trusted
sites and a low bandwidth rate for high risk sites.
7. Click OK to save the rules.
8. Click OK in Roles tab to save the changes to the role for which you defined ACL rules.

In the CLI
To control access based on web categories and security ratings:
(Instant AP)(config)# wlan access-rule 
(Instant AP) (Access Rule "")# rule    webcategory 
{permit| deny}[]
(Instant AP) (Access Rule "")# rule    webreputation 
{permit|deny}[]
(Instant AP) (Access Rule "")# end
(Instant AP)# commit apply

Example
(Instant
(Instant
(Instant
permit
(Instant
permit
(Instant
(Instant
(Instant

189 | Roles and Policies

AP)(config)# wlan access-rule URLFilter
AP) (Access Rule "URLFilter")# rule any any match webcategory gambling deny
AP) (Access Rule "URLFilter")# rule any any match webcategory training-and-tools
AP) (Access Rule "URLFilter")# rule any any match webreputation trustworthy-sites
AP) (Access Rule "URLFilter")# rule any any match webreputation suspicious-sites deny
AP) (Access Rule "URLFilter")# end
AP)# commit apply

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Configuring User Roles
Every client in the Instant network is associated with a user role, which determines the client’s network privileges,
the frequency of reauthentication, and the applicable bandwidth contracts.
Instant allows you to configuration of up to 32 user roles. If the number of roles exceed 32, an error message is
displayed.
The user role configuration on a W-IAP involves the following procedures:
l

Creating a User Role on page 190

l

Assigning Bandwidth Contracts to User Roles on page 190

l

Configuring Machine and User Authentication Roles on page 191

Creating a User Role
You can create a user role by using the Instant UI or CLI.

In the Instant UI
To create a user role:
1. Click the Security at the top right corner of Instant main window. The Security window is displayed.
2. Click Roles tab. The Roles tab contents are displayed.
3. Under Roles, click New.
4. Enter a name for the new role and click OK.
You can also create a user role when configuring wireless or wired network profiles. For more information, see
Configuring Access Rules for a WLAN SSID Profile on page 104 and Configuring Access Rules for a Wired Profile
on page 116

In the CLI
To configure user roles and access rules:
(Instant AP)(config)# wlan access-rule 
(Instant AP)(Access Rule )# rule       {permit |deny | src-nat | dst-nat {  | }}[]

Assigning Bandwidth Contracts to User Roles
The administrators can manage bandwidth utilization by assigning maximum bandwidth rates, or bandwidth
contracts to user roles. The administrator can assign a bandwidth contract configured in Kbps to upstream (client to
the W-IAP) or downstream (W-IAP to clients) traffic for a user role. The bandwidth contract will not be applicable to
the user traffic on the bridged out (same subnet) destinations. For example, if clients are connected to an SSID, you
can restrict the upstream bandwidth rate allowed for each user to 512 Kbps.
By default, all users that belong to the same role share a configured bandwidth rate for upstream or downstream
traffic. The assigned bandwidth will be served and shared among all the users. You can also assign bandwidth per
user to provide every user a specific bandwidth within a range of 1 to 65535 Kbps. If there is no bandwidth contract
specified for a traffic direction, unlimited bandwidth is allowed.
In the earlier releases, bandwidth contract could be assigned per SSID. In the current release, the bandwidth
contract can also be assigned for each SSID user. If the bandwidth contract is assigned for an SSID in the Instant
6.2.1.0-3.4.0.0 image, and when the W-IAP is upgraded to 6.4.0.2-4.1 release version, the bandwidth configuration
per SSID will be treated as a per-user downstream bandwidth contract for that SSID.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Roles and Policies | 190

In the Instant UI
1. Click the Security at the top right corner of Instant main window. The Security window is displayed.
2. Click the Roles tab. The Roles tab contents are displayed.
3. Create a new role or select an existing role.
4. Under Access Rules, click New. The New Rule window is displayed.
5. Select Bandwidth Contract from the Rule Type drop-down list.

6. Specify the downstream and upstream rates in Kbps. If the assignment is specific for each user, select the
Peruser checkbox.
7. Click OK.
8. Associate the user role to a WLAN SSID or wired profile.
You can also create a user role and assign bandwidth contracts while configuring an SSID or wired profile.

In the CLI:
To assign a bandwidth contract in the CLI:
(Instant AP)(config)# wlan access-rule 
(Instant AP) (Access Rule )# bandwidth-limit {downstream | upstream |peruser
{downstream | upstream }}
(Instant AP) (Access Rule )# end
(Instant AP) # commit apply

To associate the access rule to a wired profile:
(Instant
(Instant
(Instant
(Instant

AP)(config)#
AP)(wired ap
AP)(wired ap
AP) # commit

wired-port-profile 
profile )# access-rule-name 
profile )# end
apply

Configuring Machine and User Authentication Roles
You can assign different rights to clients based on whether their hardware device supports machine authentication.
Machine Authentication is only supported on Windows devices, so this can be used to distinguish between Windows
devices and other devices such as iPads.
You can create any of the following types of rules:
l

Machine Auth only role - This indicates a Windows machine with no user logged in. The device supports machine
authentication and has a valid RADIUS account, but a user has not yet logged in and authenticated.

l

User Auth only role - This indicates a known user or a non-Windows device. The device does not support
machine auth or does not have a RADIUS account, but the user is logged in and authenticated.

When a device does both machine and user authentication, the user obtains the default role or the derived role based
on the RADIUS attribute.
You can configure machine authentication with role-based access control using the Instant UI or CLI.

In the Instant UI
To configure machine authentication with role-based access control, perform the following steps:

191 | Roles and Policies

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

1. In the Access tab of the WLAN (New WLAN or Edit ) or Wired Network configuration (New
Wired Network or Edit Wired Network) window, under Roles, create Machine auth only and User auth
only roles.
2. Configure access rules for these roles by selecting the role, and applying the rule. For more information on
configuring access rules, see Configuring Access Rules for Network Services on page 177.
3. Select Enforce Machine Authentication and select the Machine auth only and User auth only roles.
4. Click Finish to apply these changes.

In the CLI
To configure machine and user authentication roles for a WLAN SSID:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile # set-role-machine-auth  
(Instant AP)(SSID Profile # end
(Instant AP)# commit apply

To configure machine and user authentication roles for wired profile:
(Instant AP)(config)# wired-port-profile 
(Instant AP)(wired ap profile )# set-role-machine-auth 

(Instant AP)(wired ap profile )# end
(Instant AP)# commit apply

Configuring Derivation Rules
Instant allows you to configure role and VLAN derivation-rules. You can configure these rules to assign a user role or
VLAN to the clients connecting to an SSID or a wired profile.

Understanding Role Assignment Rule
When an SSID or wired profile is created, a default role for the clients connecting this SSID or wired profile is
assigned. You can assign a user role to the clients connecting to an SSID by any of the following methods. The role
assigned by some methods may take precedence over the roles assigned by the other methods.

RADIUS VSA Attributes
The user role can be derived from Dell Vendor-Specific Attributes (VSA) for RADIUS server authentication. The role
derived from a Dell VSA takes precedence over roles defined by other methods.

MAC-Address Attribute
The first three octets in a MAC address are known as Organizationally Unique Identifier (OUI), and are purchased
from the Institute of Electrical and Electronics Engineers, Incorporated (IEEE) Registration Authority. This identifier
uniquely identifies a vendor, manufacturer, or other organization (referred to by the IEEE as the “assignee”) globally
and effectively reserves a block of each possible type of derivative identifier (such as MAC addresses) for the
exclusive use of the assignee.
W-IAPs use the OUI part of a MAC address to identify the device manufacturer and can be configures to assign a
desired role for users who have completed 802.1X authentication and MAC authentication. The user role can be
derived from the user attributes after a client associates with an AP. You can configure rules that assign a user role
to clients that match a MAC address based criteria. For example, you can assign a voice role to any client with a
MAC address starting a0:a1:a2.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Roles and Policies | 192

Roles Based on Client Authentication
The user role can be the default user role configured for an authentication method, such as 802.1x authentication. For
each authentication method, you can configure a default role for clients who are successfully authenticated using
that method.

DHCP Option and DHCP Fingerprinting
The DHCP fingerprinting allows you to identify the operating system of a device by looking at the options in the
DHCP frame. Based on the operating system type, a role can be assigned to the device.
For example, to create a role assignment rule with the DHCP option, select equals from the Operator drop-down
list and enter 370103060F77FC in the String text box. Since 370103060F77FC is the fingerprint for Apple iOS
devices such as iPad and iPhone, W-IAP assigns Apple iOS devices to the role that you choose.
Table 37: Validated DHCP Fingerprint
Device

DHCP Option

DHCP Fingerprint

Apple iOS

Option 55

370103060F77FC

Android

Option 60

3C64686370636420342E302E3135

Blackberry

Option 60

3C426C61636B4265727279

Windows 7/Vista Desktop

Option 55

37010f03062c2e2f1f2179f92b

Windows XP(SP3, Home,
Professional)

Option 55

37010f03062c2e2f1f21f92b

Windows Mobile

Option 60

3c4d6963726f736f66742057696e646f777320434500

Windows 7 Phone

Option 55

370103060f2c2e2f

Apple Mac OSX

Option 55

370103060f775ffc2c2e2f

Creating a Role Derivation Rule
You can configure rules for determining the role that is assigned for each authenticated client.
When creating more than one role assignment rule, the first matching rule in the rule list is applied.

You can create a role assignment rules by using the Instant UI or CLI.

In the Instant UI
1. Navigate to the WLAN wizard or Wired settings window:
l

To configure access rules for a WLAN SSID, in the Network tab, click New to create a new network profile or
edit to modify an existing profile.

l

To configure access rules for a wired profile, More > Wired. In the Wired window, click New under Wired
Networks to create a new network or click Edit to select an existing profile.

2. Click the Access tab.
3. Under Role Assignment Rules, click New. The New Role Assignment window allows you to define a match
method by which the string in Operand is matched with the attribute value returned by the authentication server.

193 | Roles and Policies

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

4. Select the attribute from the Attribute drop-down list that the rule it matches against. The list of supported
attributes includes RADIUS attributes, dhcp-option, dot1x-authentication-type, mac-address, and mac-addressand-dhcp-options. For information on a list of RADIUS attributes, see RADIUS Server Authentication with VSA
on page 150.
5. Select the operator from the Operator drop-down list. The following types of operators are supported:
l

contains— The rule is applied only if the attribute value contains the string specified in Operand.

l

Is the role— The rule is applied if the attribute value is the role.

l

equals— The rule is applied only if the attribute value is equal to the string specified in Operand.

l

not-equals— The rule is applied only if the attribute value is not equal to the string specified in Operand.

l

starts-with— The rule is applied only if the attribute value starts with the string specified in Operand.

l

ends-with— The rule is applied only if the attribute value ends with string specified in Operand.

l

matches-regular-expression— The rule is applied only if the attribute value matches the regular expression
pattern specified in Operand. This operator is available only if the mac-address-and-dhcp-options attribute
is selected in the Attribute drop-down. The mac-address-and-dhcp-options attribute and matchesregular-expression are applicable only for the WLAN clients.

6. Enter the string to match in the String text box.
7. Select the appropriate role from the Role drop-down list.
8. Click OK.
When Enforce Machine Authentication is enabled, both the device and the user must be authenticated for the role
assignment rule to apply.

In the CLI
To configure role assignment rules for a WLAN SSID:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile )# set-role {{equals|not-equals|starts-with|endswith|contains|matches-regular-expression} |value-of}
(Instant AP)(SSID Profile # end
(Instant AP)# commit apply

To configure role assignment rules for a wired profile:
(Instant AP)(config)# wired-port-profile 
(Instant AP)(wired ap profile )# set-role {{equals| not-equal| starts-with|
ends-with|contains} | value-of}
(Instant AP)(wired ap profile )# end
(Instant AP)# commit apply

Example
(Instant AP)(config)# wlan ssid-profile Profile1
(Instant AP)(SSID Profile "Profile1")# set-role mac-address-and-dhcp-options matches-regularexpression \bring\b Profile1
(Instant AP)(SSID Profile"Profile1")# end
(Instant AP)# commit apply

Understanding VLAN Assignment
You can assign VLANs to a client based on the following configuration conditions:
l

The default VLAN configured for the WLAN can be assigned to a client.

l

If VLANs are configured for a WLAN SSID or an Ethernet port profile, the VLAN for the client can be derived
before the authentication, from the rules configured for these profiles.

l

If a rule derives a specific VLAN, it is prioritized over the user roles that may have a VLAN configured.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Roles and Policies | 194

l

The user VLANs can be derived from the default roles configured for 802.1X authentication or MAC
authentication.

l

After client authentication, the VLAN can be derived from Vendor Specific Attributes (VSA) for RADIUS server
authentication.

l

The DHCP-based VLANs can be derived for Captive Portal authentication.

Instant supports role derivation based on the DHCP option for Captive Portal authentication. When the Captive
Portal authentication is successful, the role derivation based on the DHCP option assigns a new user role to the
guest users, instead of the pre-authenticated role.

Vendor Specific Attributes
When an external RADIUS server is used, the user VLAN can be derived from the Dell-User-Vlan VSA. The VSA is
then carried in an Access-Accept packet from the RADIUS server. The W-IAP can analyze the return message and
derive the value of the VLAN which it assigns to the user.
Figure 57 RADIUS Access-Accept packets with VSA

Figure 58 Configure VSA on a RADIUS Server

195 | Roles and Policies

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

VLAN Assignment Based on Derivation Rules
When an external RADIUS server is used for authentication, the RADIUS server may return a reply message for
authentication. If the RADIUS server supports return attributes, and sets an attribute value to the reply message, the
W-IAP can analyze the return message and match attributes with a user pre-defined VLAN derivation rule. If the rule
is matched, the VLAN value defined by the rule is assigned to the user. For a complete list of RADIUS server
attributes, see RADIUS Server Authentication with VSA on page 150.
Figure 59 Configuring RADIUS Attributes on the RADIUS Server

User Role
If the VSA and VLAN derivation rules are not matching, then the user VLAN can be derived by a user role.

VLANs Created for an SSID
If the VSA and VLAN derivation rules are not matching, and the User Role does not contain a VLAN, the user VLAN
can be derived by VLANs configured for an SSID or Ethernet port profile.

Configuring VLAN Derivation Rules
The users are assigned to a VLAN based on the attributes returned by the RADIUS server after the users
authenticate.
You can configure VLAN derivation rules for an SSID profile by using the Instant UI or CLI.

In the Instant UI
1. Perform the following steps:

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Roles and Policies | 196

l

To configure VLAN derivation rule for a WLAN SSID profile, Click Network > New > New WLAN > VLAN or
Network > edit > Edit  > VLAN. Select the Dynamic option under the Client VLAN
assignment.

l

To configure VLAN derivation rule for a wired network profile, click Wired > New > New Wired Network >
VLAN or Wired > Edit > Edit Wired Network > VLAN.

2. Click New to create a VLAN assignment rule. The New VLAN Assignment Rule window is displayed. In this
window, you can define a match method by which the string in Operand is matched with the attribute values
returned by the authentication server.
Figure 60 VLAN Assignment Rule Window

3. Select the attribute from the Attribute drop-down list. The list of supported attributes includes RADIUS
attributes, dhcp-option, dot1x-authentication-type, mac-address, and mac-address-and-dhcp-options. For
information on a list of RADIUS attributes, see RADIUS Server Authentication with VSA on page 150.
4. Select the operator from the Operator drop-down list. The following types of operators are supported:
l

contains— The rule is applied only if the attribute value contains the string specified in Operand.

l

equals— The rule is applied only if the attribute value is equal to the string specified in Operand.

l

not-equals — The rule is applied only if the attribute value is not equal to the string specified in Operand.

l

starts-with — The rule is applied only if the attribute value starts with the string specified in Operand.

l

ends-with — The rule is applied only if the attribute value ends with string specified in Operand.

l

matches-regular-expression — The rule is applied only if the attribute value matches the regular expression
pattern specified in Operand. This operator is available only if the mac-address-and-dhcp-options attribute
is selected in the Attribute drop-down. The mac-address-and-dhcp-options attribute and matchesregular-expression are applicable only for the WLAN clients.

5. Enter the string to match in the String field.
6. Select the appropriate VLAN ID from the VLAN drop-down list.
7. Click OK.
8. Ensure that all other required parameters are configured.
9. Click Finish to apply the changes.

In the CLI
To create a VLAN assignment rule for WLAN SSID:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile )# set-vlan {equals|not-equals|starts-with|endswith|contains|matches-regular-expression}|value-of}
(Instant AP)(SSID Profile )# end
(Instant AP)# commit apply

197 | Roles and Policies

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

To configure a VLAN assignment rule for a wired profile:
(Instant AP)(config)# wired-port-profile 
(Instant AP)(wired ap profile )# set-vlan {equals|not-equals|startswith|ends-with|contains}|value-of}
(Instant AP)(wired ap profile )# end
(Instant AP)# commit apply

Example
(Instant AP)(config)# wlan ssid-profile Profile1
(Instant AP)(SSID Profile "Profile1")# set-vlan mac-address-and-dhcp-options matches-regularexpression ..link 100
(Instant AP)(SSID Profile "Profile1")# end
(Instant AP)# commit apply

Using Advanced Expressions in Role and VLAN Derivation Rules
For complex policies of role and VLAN derivation using device DHCP fingerprints, you can use a regular expression
to match against the combined string of the MAC address and the DHCP options. The combined string is formed by
concatenating the hexadecimal presentation of the MAC address and all of the DHCP options sent by a particular
device. The regular expression is a powerful pattern description language that can be used to perform advanced
pattern matching of the above string.
If the combined device fingerprint string matches the specified regular expression, the role or vlan can be set to the
WLAN client.
The following table lists some of the most commonly used regular expressions, which can be used in user role and
user VLAN derivation rules:
Operator

Description

.

Matches any character. For example, l..k matches lack, lark, link, lock, look, Lync and so on.

\

Matches the character that follows the backslash. For example, \192.\.0\.. matches IP addresses ranges
that starting with 192.0, such as 192.0.1.1. The expression looks only for the single characters that
match.

[ ]

Matches any one character listed between the brackets. For example, [bc]lock matches block and clock.

\b

Matches the words that begin and end with the given expression. For example, \bdown matches
downlink, linkdown, shutdown.

\B

Matches the middle of a word. For example, \Bvice matches services, devices, serviceID, deviceID, and
so on.

^

Matches the characters at starting position in a string. For example, ^bcd matches bcde or bcdf, but not
abcd.

[^]

Matches any characters that are not listed between the brackets. For example, [^u]link matches
downlink, link, but not uplink.

?

Matches any one occurrence of the pattern. For example, ?est matches best, nest, rest, test and so on.

$

Matches the end of an input string. For example, eth$ matches Eth, but not Ethernet.

*

Matches the declared element multiple times if it exists. For example, eth* matches all occurrences of
eth, such as Eth, Ethernet, Eth0 and so on.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Roles and Policies | 198

Operator

Description

+

Matches the declared element one or more times. For example, aa+ matches occurrences of aa and
aaa.

( )

Matches nested characters. For example, (192)* matches any number of the character string 192.

|

Matches the character patterns on either side of the vertical bar. You can use this expression to construct
a series of options.

\<

Matches the beginning of the word. For example, \

Matches the end of the word. For example, \>list matches blacklist, whitelist, and so on.

{n}

Where n is an integer" Matches the declared element exactly the n times. For example, {2}link matches
uplink, but not downlink.

{n,}

Where n is an integer" Matches the declared element at n times. For example, {2,}ink matches downlink,
but not uplink.

For information on how to use regular expressions in role and VLAN derivation rules, see the following topics:
l

Configuring VLAN Derivation Rules on page 196

l

Creating a Role Derivation Rule on page 193

Configuring a User Role for VLAN Derivation
This section describes the following procedures:
l

Creating a User VLAN Role on page 199

l

Assigning User VLAN Roles to a Network Profile on page 200

Creating a User VLAN Role
You can create a user role for VLAN derivation using the Instant UI or CLI
In the Instant UI
To configure a user role for VLAN derivation:
1. Click the Security at the top right corner of Instant main window.
2. Click the Roles tab. The Roles tab contents are displayed.
3. Under Roles, click New.
4. Enter a name for the new role and click OK.
5. Under the Access rules, click New.
6. Select the Rule type as VLAN assignment.
7. Enter the ID of the VLAN in the VLAN ID text box.
8. Click OK.
In the CLI
To create a VLAN role:
(Instant
(Instant
(Instant
(Instant

199 | Roles and Policies

AP)(config)# wlan access-rule 
AP)(Access Rule )# vlan 200
AP)(Access Rule )# end
AP)# commit apply

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Assigning User VLAN Roles to a Network Profile
You can configure user VLAN roles for a network profile using Instant UI or CLI.
In the Instant UI
To assign a user VLAN role:
1. Click Network > New > New WLAN > Access or Network > edit > Edit  > Access.
2. Ensure that the slider is at the Role-based option.
3. Click New under the New Role Assignment and configure the following parameters:
a. Select the attribute from the Attribute drop-down list.
b. Select the operator to match from the Operator drop-down list.
c. Enter the string to match in the String text box.
d. Select the role to be assigned from the Role text box. The following figure shows an example for the VLAN
role assignment:
Figure 61 User VLAN Role Assignment

4. Click OK.
In the CLI
To assign VLAN role to a WLAN profile:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile )# set-role {{equals  | not-equals
 | starts-with  | ends-with  | contains
 }|value-of}
(Instant AP)(SSID Profile )# end
(Instant AP)# commit apply

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Roles and Policies | 200

Chapter 13
DHCP Configuration

This chapter provides the following information:
l

Configuring DHCP Scopes on page 201

l

Configuring the Default DHCP Scope for Client IP Assignment on page 208

Configuring DHCP Scopes
The virtual controller supports different modes of DHCP address assignment. With each DHCP address assignment
mode, various client traffic forwarding modes are associated. For more information on client traffic forwarding modes
for IAP-VPN, see IAP-VPN Forwarding Modes on page 224.
You can configure the default DHCP scope for virtual controller assigned networks, Distributed L2, Distributed L3,
Local or NAT DHCP, Local L3, and Centralized DHCP scopes through the Instant UI or CLI.
This section describes the following procedures:
l

Configuring the Default DHCP Scope for Client IP Assignment on page 208

l

Configuring Distributed DHCP Scopes on page 201

l

Configuring a Centralized DHCP Scope on page 204

l

Configuring Local and Local,L3 DHCP Scopes on page 206

Configuring Distributed DHCP Scopes
Instant allows you to configure the DHCP address assignment for the branches connected to the corporate network
through VPN. You can configure the range of DHCP IP addresses used in the branches and the number of client
addresses allowed per branch. You can also specify the IP addresses that must be excluded from those assigned to
clients, so that they are assigned statically.
Instant supports the following distributed DHCP scopes:
l

Distributed, L2 — In this mode, the Virtual Controller acts as the DHCP server, but the default gateway is in the
data center. Based on the number of clients specified for each branch, the range of IP addresses is divided.
Based on the IP address range and client count configuration, the DHCP server in the Virtual Controller controls a
scope that is a subset of the complete IP Address range for the subnet distributed across all the branches. This
DHCP Assignment mode is used with the L2 forwarding mode.

l

Distributed, L3 — In this mode, the Virtual Controller acts as the DHCP server and the default gateway. Based
on the number of clients specified for each branch, the range of IP addresses is divided. Based on the IP address
range and client count configuration, the DHCP server in the Virtual Controller is configured with a unique subnet
and a corresponding scope.

You can configure distributed DHCP scopes such as Distributed, L2 or Distributed,L3 by using the Instant UI or CLI.

In the Instant UI
To configure distributed DHCP scopes such as Distributed,L2 or Distributed,L3:
1. Click More > DHCP Server. The DHCP Server window is displayed.
2. To configure a distributed DHCP mode, click New under Distributed DHCP Scopes. The New DHCP Scope
window is displayed. The following figure shows the contents of the New DHCP Scope window.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

DHCP Configuration | 201

Figure 62 New DHCP Scope: Distributed DHCP Mode

3. Based on the type of distributed DHCP scope, configure the following parameters:
Table 38: Distributed DHCP Mode: Configuration Parameters
Name

Description

Name

Enter a name for the DHCP scope.

Type

Select any of the following options:
Distributed, L2— On selecting Distributed, L2, the Virtual Controller acts as the
DHCP Server but the default gateway is in the data center. Traffic is bridged into
VPN tunnel.
l Distributed, L3— On selecting Distributed, L3, the Virtual Controller acts as both
DHCP Server and default gateway. Traffic is routed into the VPN tunnel.
l

VLAN

Specify a VLAN ID. To use this subnet, ensure that the VLAN ID specified here is
assigned to an SSID profile. For more information on SSID profile configuration, see
Configuring VLAN Settings for a WLAN SSID Profile on page 97 and Configuring
VLAN for a Wired Profile on page 114

Netmask

If Distributed, L2 is selected for type of DHCP scope, specify the subnet mask. The
subnet mask and the network determine the size of subnet.

Default router

If Distributed, L2 is selected for type of DHCP scope, specify the IP address of the
default router.

DNS Server

If required, specify the IP address of a DNS server.

Domain Name

If required, specify the domain name.

202 | DHCP Configuration

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 38: Distributed DHCP Mode: Configuration Parameters
Name

Description

Lease Time

Specify a lease time for the client in minutes.

IP Address Range

Specify a range of IP addresses to use. To add another range, click the + icon. You can
specify up to four different ranges of IP addresses.
l For Distributed, L2 mode, ensure that all IP ranges are in the same subnet as the
default router. On specifying the IP address ranges, a subnet validation is
performed to ensure that the specified ranges of IP address are in the same subnet
as the default router and subnet mask. The configured IP range is divided into
blocks based on the configured client count.
l For Distributed,L3 mode, you can configure any discontiguous IP ranges. The
configured IP range is divided into multiple IP subnets that are sufficient to
accommodate the configured client count.
NOTE: You can allocate multiple branch IDs (BID) per subnet. The W-IAP generates a
subnet name from the DHCP IP configuration, which the controller can use as a subnet
identifier. If static subnets are configured in each branch, all of them are assigned the
with BID 0, which is mapped directly to the configured static subnet.

Option

Specify the type and a value for the DHCP option. You can configure the organizationspecific DHCP options supported by the DHCP server. For example, 176, 242, 161,
and so on. To add multiple DHCP options, click the + icon. You can add up to eight
DHCP options.

4. Click Next.
5. Specify the number of clients to use per branch. The client count configured for a branch determines the use of IP
addresses from the IP address range defined for a DHCP scope. For example, if 20 IP addresses are available in
an IP address range configured for a DHCP scope and a client count of 9 is configured, only a few IP addresses
(in this example, 9) from this range will be used and allocated to a branch. The W-IAP does not allow the
administrators to assign the remaining IP addresses to another branch, although a lower value is configured for
the client count.
6. Click Next. The Static IP tab is displayed. Specify the number of first and last IP addresses to reserve in the
subnet.
7. Click Finish.

In the CLI
To configure Distributed,L2 DHCP scope:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# ip dhcp 
AP)(DHCP Profile )# ip dhcp server-type 
AP)(DHCP Profile )# server-vlan 
AP)(DHCP Profile )# subnet-mask 
AP)(DHCP Profile )# default-router 
AP)(DHCP Profile )# client-count 
AP)(DHCP Profile )# dns-server 
AP)(DHCP Profile )# domain-name 
AP)(DHCP Profile )# lease-time 
AP)(DHCP Profile )# ip-range  
AP)(DHCP Profile )# reserve {first|last} 
AP)(DHCP Profile )# option  
AP)(DHCP Profile )# end
AP)# commit apply

To configure Distributed,L3 DHCP scope:
(Instant AP)(config)# ip dhcp 
(Instant AP)(DHCP Profile )# ip dhcp server-type 
Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

DHCP Configuration | 203

(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(DHCP Profile )#
AP)(DHCP Profile )#
AP)(DHCP Profile )#
AP)(DHCP Profile )#
AP)(DHCP Profile )#
AP)(DHCP Profile )#
AP)(DHCP Profile )#
AP)(DHCP Profile )#
AP)(DHCP Profile )#
AP)# commit apply

server-vlan 
client-count 
dns-server 
domain-name 
lease-time 
ip-range  
reserve {first | last} 
option  
end

Configuring a Centralized DHCP Scope
You can configure centralized,L2 and centralized,L3 DHCP profiles. When a centralized DHCP scope is configured:
l

The Virtual Controller does not assign an IP address to the client and the DHCP traffic is directly forwarded to the
DHCP Server.

l

For Centralized, L2 clients, the Virtual Controller bridges the DHCP traffic to the controller over the VPN/GRE
tunnel. The IP address is obtained from the DHCP server behind the controller serving the VLAN/GRE of the
client. This DHCP assignment mode also allows you to add the DHCP option 82 to the DHCP traffic forwarded
to the controller.

l

For Centralized, L3 clients, the Virtual Controller acts as a DHCP relay agent that forwards the DHCP traffic to
the DHCP server located either in the corporate or local network. The centralized L3 VLAN IP is used as the
source IP. The IP address is obtained from the DHCP server.

You can configure a centralized DHCP scope through the Instant UI or CLI.

In the Instant UI
To configure a centralized DHCP scope:
1. Click More > DHCP Server. The DHCP Server window is displayed.
2. To configure a centralized DHCP scopes, click New under Centralized DHCP Scopes. The New DHCP
Scope window is displayed.
3. To configure centralized,L2 profile, select the profile type as Centralized,L2 or Centralized,L3 and configure
the following parameters.
Table 39: Centralized DHCP Mode: Configuration Parameters
Name

Description

Name

Enter a name for the DHCP scope.

Type

Set the type as follows:
l Centralized,L2 for the centralized,L2 profile
l Centralized,L3 for the centralized,L3 profile

VLAN

Specify a VLAN ID. To use this subnet, ensure that the VLAN ID specified here is assigned
to an SSID profile. For more information on SSID profile configuration, see Configuring
VLAN Settings for a WLAN SSID Profile on page 97 and Configuring VLAN for a Wired
Profile on page 114.

Split tunnel

Set this to Enabled or Disabled for split tunnel functionality for the centralized,L2 subnet.

204 | DHCP Configuration

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 39: Centralized DHCP Mode: Configuration Parameters
Name

Description
Enabling split tunnel allows a VPN user to access a public network and a local LAN or
WAN network at the same time through the same physical network connection. For
example, a user can use a remote access VPN software client connecting to a corporate
network using a home wireless network. The user with split tunneling enabled is able to
connect to file servers, database servers, mail servers and other servers on the corporate
network through the VPN connection. When the user connects to Internet resources (Web
sites, FTP sites and so on), the connection request goes directly out the gateway provided
by the home network. The split-DNS functionality intercepts DNS requests from clients for
non-corporate domains (as configured in Enterprise Domains list) and forwards to AP's
own DNS server.
When split-tunnel is disabled, all the traffic including the corporate and Internet traffic is
tunneled irrespective of the routing profile specifications. If the GRE tunnel is down and
when the corporate network is not reachable, the client traffic is dropped.

DHCP relay

If you are configuring a Centralized, L2 DHCP profile, you can select Enabled to allow the
W-IAPs to intercept the broadcast packets and relay DHCP requests to centralized DHCP
server.
NOTE: The DHCP relay option is not available for centralized,L3 profile configuration.

Helper address

Specify the IP address of the DHCP server.
NOTE: For Centralized, L2 DHCP profiles, the Helper address option is displayed only
when DHCP relay is enabled.

VLAN IP

Specify the Centralized L3 DHCP subnet gateway IP.

VLAN Mask

Specify the subnet mask of the Centralized L3 DHCP subnet gateway IP.

Option82

Select Alcatel to enable DHCP Option 82 to allow clients to send DHCP packets with the
Option 82 string. The Option 82 string is available only in the Alcatel (ALU) format. The ALU
format for the Option 82 string consists of the following:
l Remote Circuit ID; X AP-MAC; SSID; SSID-Type
l Remote Agent; X IDUE-MAC
NOTE: The Option 82 string is specific to Alcatel and is not configurable.

4. Click OK.
The following table describes the behavior of the DHCP Relay Agent and Option 82 in the W-IAP.
Table 40: DHCP Relay and Option 82
DHCP Relay

Option 82

Behavior

Enabled

Enabled

DHCP packet relayed with the ALU-specific Option 82 string

Enabled

Disabled

DHCP packet relayed without the ALU-specific Option 82 string

Disabled

Enabled

DHCP packet not relayed, but broadcast with the ALU-specific Option 82 string

Disabled

Disabled

DHCP packet not relayed, but broadcast without the ALU-specific Option 82
string

In the CLI
To configure a centralized,L2 DHCP profile:
(Instant AP)(config)# ip dhcp 
(Instant AP)(DHCP Profile )# server-type 

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

DHCP Configuration | 205

(Instant
(Instant
(Instant
(Instant
(Instant

AP)(DHCP Profile )#
AP)(DHCP Profile )#
AP)(DHCP Profile )#
AP)(DHCP Profile )#
AP)# commit apply

server-vlan 
option82 alu
disable-split-tunnel
end

To configure a centralized,L3 DHCP profile:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# ip dhcp 
AP)(DHCP Profile )# server-type 
AP)(DHCP Profile )# server-vlan 
AP)(DHCP Profile )# dhcp-relay
AP)(DHCP Profile )# dhcp-server 
AP)(DHCP Profile )# vlan-ip  mask 
AP)(DHCP Profile )# end
AP)# commit apply

Configuring Local and Local,L3 DHCP Scopes
You can configure Local and Local,L3 DHCP scopes through the Instant UI or CLI.
l

Local — In this mode, the Virtual Controller acts as both the DHCP Server and the default gateway. The
configured subnet and the corresponding DHCP scope are independent of subnets configured in other W-IAP
clusters. The Virtual Controller assigns an IP address from a local subnet and forwards traffic to both corporate
and non-corporate destinations. The network address is translated appropriately and the packet is forwarded
through the IPSec tunnel or through the uplink. This DHCP assignment mode is used for the NAT forwarding
mode.

l

Local, L3— This DHCP assignment mode is used with the L3 forwarding mode. In this mode, the Virtual
Controller acts as a DHCP server and the gateway, and assigns an IP address from the local subnet. The W-IAP
routes the packets sent by clients on its uplink. The Local, L3 subnets can now access corporate network
through the IPsec tunnel. The network address for all traffic generated by clients in Local, L3 subnets are
translated at the source by using the tunnel inner IP to the corporate subnet. However, if corporate access to
Local, L3 is not required, you can configure ACL rules to deny access.

In the Instant UI
To configure a Local or Local,L3 DHCP scope:
1. Click More > DHCP Server. The DHCP Server window is displayed.
2. To configure a Local or Local,L3 DHCP scopes, click New under Local DHCP Scopes. The New DHCP
Scope window is displayed.
3. Based on type of DHCP scope selected, configure the following parameters:

206 | DHCP Configuration

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 41: DHCP Mode: Configuration Parameters
Name

Description

Name

Enter a name for the DHCP scope.
Select any of the following options:
Local— On selecting Local, the DHCP server for local branch network is used for
keeping the scope of the subnet local to the W-IAP. In the NAT mode, the traffic is
forwarded through the IPSec tunnel or the uplink.
l Local, L3—On selecting Local, L3, the Virtual Controller acts as a DHCP server and
gateway. In this mode, the W-IAP routes the packets sent by clients and also adds a
route on the controller, after the VPN tunnel is set up during the registration of the
subnet.

Type

l

VLAN

Specify a VLAN ID. To use this subnet, ensure that the VLAN ID specified here is
assigned to an SSID profile. For more information on SSID profile configuration, see
Configuring VLAN Settings for a WLAN SSID Profile on page 97 and Configuring
VLAN for a Wired Profile on page 114

Network

Specify the network to use.

Netmask

If Local or Local,L3 is selected, specify the subnet mask. The subnet mask and the
network determine the size of subnet.

Excluded address

If Local,L3 is selected, specify the IP address to exclude. The value entered in the field
determines the exclusion range of the subnet. Based on the size of the subnet, the
lesser range of IP’s before or after the specified IP address will be excluded

DNS Server

If required, specify the IP address of a DNS server for the Local and Local,L3 scopes.

Domain Name

If required, specify the domain name for the Local and Local,L3 scopes.

Lease Time

Specify a lease time for the client in minutes.

Option

Specify the type and a value for the DHCP option. You can configure the organizationspecific DHCP options supported by the DHCP server. For example, 176, 242, and
161. To add multiple DHCP options, click the + icon.

4. Click OK.

In the CLI
To configure Local DHCP scope:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# ip dhcp 
AP)(DHCP Profile )# server-type 
AP)(DHCP Profile )# server-vlan 
AP)(DHCP Profile )# subnet 
AP)(DHCP Profile )# subnet-mask 
AP)(DHCP Profile )# dns-server 
AP)(DHCP Profile )# domain-name 
AP)(DHCP Profile )# lease-time 
AP)(DHCP Profile )# option  
AP)(DHCP Profile )# end
AP)# commit apply

To configure Local,L3 DHCP scope:
(Instant AP)(config)# ip dhcp 
(Instant AP)(DHCP Profile )# server-type 
(Instant AP)(DHCP Profile )# server-vlan 

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

DHCP Configuration | 207

(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(DHCP Profile )#
AP)(DHCP Profile )#
AP)(DHCP Profile )#
AP)(DHCP Profile )#
AP)(DHCP Profile )#
AP)(DHCP Profile )#
AP)(DHCP Profile )#
AP)(DHCP Profile )#
AP)# commit apply

subnet 
subnet-mask 
exclude-address 
dns-server 
domain-name 
lease-time 
option  
end

Configuring the Default DHCP Scope for Client IP Assignment
The DHCP server is a built-in server, used for networks in which clients are assigned IP address by the Virtual
Controller. You can customize the DHCP pool subnet and address range to provide simultaneous access to more
number of clients. The largest address pool supported is 2048. The default size of the IP address pool is 512.
When the DHCP server is configured and if the Client IP assignment parameter for an SSID profile is set to
Virtual Controller Assigned, the Virtual Controller assigns the IP addresses to the WLAN or wired clients. By
default, the W-IAP automatically determines a suitable DHCP pool for Virtual Controller Assigned networks.
In the current release, the W-IAP typically selects the 172.31.98.0/23 subnet. If the IP address of the W-IAP is
within the 172.31.98.0/23 subnet, the W-IAP selects the 10.254.98.0/23 subnet. However, this mechanism does
not guarantee that it would avoid all possible conflicts with the wired network. If your wired network uses either
172.31.98.0/23 or 10.254.98.0/23, and you experience problems with the Virtual Controller Assigned networks
after upgrading to Dell Networking W-Series Instant 6.2.1.0-3.4 or later, manually configure the DHCP pool by
following the steps described in this section.
You can configure a domain name, DNS server, and DHCP server for client IP assignment using the Instant UI or
CLI.

In the Instant UI
1. Navigate to More > DHCP Server tab. The DHCP Server tab contents are displayed.
Figure 63 DHCP Servers Window

2. Enter the domain name of the client in the Domain name text box.
3. Enter the IP addresses of the DNS servers separated by a comma(,) in the DNS server (s) text box.

208 | DHCP Configuration

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

4. Enter the duration of the DHCP lease in the Lease time text box.
5. Select Minutes, Hours, or Days for the lease time from the drop-down list next to Lease time. The default lease
time is 0.
6. Enter the network range for the client IP addresses in the Network field. The system generates a network range
automatically that is sufficient for 254 addresses. If you want to provide simultaneous access to more number of
clients, specify a larger range.
7. Specify the subnet mask details for the network range in the Mask text box.
The DNS cache function is only enabled when content-filtering is disabled.

8. Click OK to apply the changes.

In the CLI
To configure a DHCP pool:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# ip dhcp pool
AP)(DHCP)# domain-name 
AP)(DHCP)# dns-server 
AP)(DHCP)# lease-time 
AP)(DHCP)# subnet 
AP)(DHCP)# subnet-mask 

To view the DHCP database:
(Instant AP)# show ip dhcp database
DHCP
DHCP
DHCP
DHCP
DHCP

Subnet :192.0.2.0
Netmask :255.255.255.0
Lease Time(m) :20
Domain Name :example.com
DNS Server :192.0.2.1

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

DHCP Configuration | 209

Chapter 14
VPN Configuration

This chapter describes the following VPN configuration procedures:
l

Understanding VPN Features on page 210

l

Configuring a Tunnel from a W-IAP to Dell Networking W-Series Mobility Controller on page 210

l

Configuring Routing Profiles on page 221

Understanding VPN Features
As W-IAPs use a Virtual Controller architecture, the W-IAP network does not require a physical controller to provide
the configured WLAN services. However, a physical controller is required for terminating Virtual Private Networks
(VPN) tunnels from the W-IAP networks at branch locations to datacenters, where the Dell controller acts as a VPN
concentrator.
When the VPN is configured, the W-IAP acting as the Virtual Controller creates a VPN tunnel to a Dell Networking
W-Series mobility controller in your corporate office. The controller acts as a VPN end-point and does not supply the
W-IAP with any configuration.
The VPN features are recommended for:
l

Enterprises with many branches that do not have a dedicated VPN connection to the corporate office.

l

Branch offices that require multiple APs.

l

Individuals working from home, connecting to the VPN.

The survivability feature of W-IAPs with the VPN connectivity of W-IAPs allows you to provide corporate
connectivity on non-corporate networks.

Configuring a Tunnel from a W-IAP to Dell Networking W-Series
Mobility Controller
W-IAP supports the configuration of tunneling protocols such as Generic Routing Encapsulation (GRE), IPsec, and
L2TPv3. This section describes the procedure for configuring VPN host settings on a W-IAP to enable
communication with a controller in a remote location:
l

Configuring an IPSec Tunnel on page 210

l

Enabling Automatic Configuration of GRE Tunnel on page 212

l

Manually Configuring a GRE Tunnel on page 214

l

Configuring an L2TPv3 Tunnel on page 215

Configuring an IPSec Tunnel
An IPsec tunnel is configured to ensure that the data flow between the networks is encrypted. When configured, the
IPSec tunnel to the controller secures corporate data.
You can configure an IPSec tunnel from Virtual Controller using the Instant UI or CLI.

In the Instant UI
To configure a tunnel using the IPSec protocol:
1. Click the More > VPN link at the top right corner of the Instant UI. The Tunneling window is displayed.
Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

VPN Configuration | 210

2. Select Aruba IPSec from the Protocol drop-down list.
3. Enter the IP address or fully qualified domain name (FQDN) for the primary VPN/IPSec endpoint in the Primary
host field.
4. Enter the IP address or FQDN for the backup VPN/IPSec endpoint in the Backup host field. This entry is
optional. When you specify the primary and backup host details, the other fields are displayed.
5. Specify the following parameters. A sample configuration is shown in Figure 64.
a. To allow the VPN tunnel to switch back to the primary host when it becomes available again, select Enabled
from the Preemption drop-down list. This step is optional.
b. If Preemption is enabled, specify a value in seconds for Hold time. When preemption is enabled and the
primary host comes up, the VPN tunnel switches back to the primary host after the specified hold-time. The
default value for Hold time is 600 seconds.
c. To allow the W-IAP to create a backup VPN tunnel to the controller along with the primary tunnel, and
maintain both the primary and backup tunnels separately, select Enabled from the Fast failover drop-down
list. When fast failover is enabled and if the primary tunnel fails, the W-IAP can switch the data stream to the
backup tunnel. This reduces the total failover time to less than one minute.
d. To disconnect all wired and wireless users when the system switches during VPN tunnel transition from
primary to backup and backup to primary, set Reconnect user on failover to Enabled.
e. To configure an interval during which the wired and wireless users are disconnected during a VPN tunnel
switch, specify a value in seconds for Reconnect time on failover within a range of 30—900 seconds. By
default, the reconnection duration is set to 60 seconds.
f. Specify a value in seconds for Secs between test packets. Based on the configured frequency, the W-IAP
can verify if an active VPN connection is available. The default value is 5 seconds, which means that the WIAP sends one packet to the controller every 5 seconds.
g. Enter a value for Max allowed test packet loss, to define a number for lost packets, after which the W-IAP
can determine that the VPN connection is unavailable. The default value is 2.
Figure 64 IPSec Configuration

6. Click Next to create routing profiles. When the IPsec tunnel configuration is completed, the packets that are sent
from and received by a W-IAP are encrypted.

In the CLI
To configure an IPSec VPN tunnel:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

211 | VPN Configuration

AP)(config)#
AP)(config)#
AP)(config)#
AP)(config)#
AP)(config)#
AP)(config)#

vpn
vpn
vpn
vpn
vpn
vpn

primary 
backup 
fast-failover
hold-time 
preemption
monitor-pkt-send-freq 

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# vpn monitor-pkt-lost-cnt 
AP)(config)# vpn reconnect-user-on-failover
AP)(config)# vpn reconnect-time-on-failover 
AP)(config)# end
AP)# commit apply

Example
(Instant
(Instant
(Instant
(Instant

AP)(config)#
AP)(config)#
AP)(config)#
AP)(config)#

vpn
vpn
vpn
vpn

primary 192.0.2.18
backup 192.0.2.18
fast-failover
preemption

(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# ip dhcp distl2
AP)(DHCP Profile "distL2")#
AP)(DHCP Profile "distL2")#
AP)(DHCP Profile "distL2")#
AP)(DHCP Profile "distL2")#
AP)(DHCP Profile "distL2")#
AP)(DHCP Profile "distL2")#
AP)(DHCP Profile "distL2")#
AP)(DHCP Profile "distL2")#
AP)(DHCP Profile "distL2")#

(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# ip dhcp local
AP)(DHCP Profile "local")#
AP)(DHCP Profile "local")#
AP)(DHCP Profile "local")#
AP)(DHCP Profile "local")#
AP)(DHCP Profile "local")#
AP)(DHCP Profile "local")#
AP)(DHCP Profile "local")#

server-type Distributed,L2
server-vlan 2
ip-range 10.15.205.0 10.15.205.255
subnet-mask 255.255.255.0
lease-time 86400
default-router 10.15.205.254
dns-server 10.13.6.110,10.1.1.50
domain-name dell.com
client-count 5

server-type Local
server-vlan 200
subnet 172.16.200.1
subnet-mask 255.255.255.0
lease-time 86400
dns-server 10.13.6.110,10.1.1.50
domain-name dell.com

To view VPN configuration:
Instant Access Point# show vpn config

Enabling Automatic Configuration of GRE Tunnel
GRE is a tunnel protocol for encapsulating multicast, broadcast, and L2 packets between a controller and the WIAPs. The automatic GRE feature uses the IPSec connection between the W-IAP and controller to send the control
information for setting up a GRE tunnel. When automatic GRE configuration is enabled, a single IPSec tunnel
between the W-IAP cluster and the controller and one or several GRE tunnels are created based on the Per-AP
tunnel configuration on the W-IAP. When this feature is enabled on the W-IAP, no manual configuration is required
on the controller to create the GRE tunnel.
Automatic configuration of the GRE tunnel is supported only on Dell controlleres. This feature is not supported on
controllers running ArubaOS 6.3.x.x or lower versions.
You can configure a W-IAP to automatically set up a GRE tunnel from the W-IAP to Controller by using the Instant
UI or CLI.

In the Instant UI
1. Click the More > VPN link at the top right corner of the Instant UI. The Tunneling window is displayed.
2. Select Aruba GRE from the Protocol drop-down list.
3. Enter the IP address or FQDN for the main VPN/IPSec endpoint in the Primary host field.
4. Enter the IP address or FQDN for the backup VPN/IPSec endpoint in the Backup host field. This entry is
optional. When you enter the primary host IP address and backup host IP address, other fields are displayed.
5. Specify the following parameters. A sample configuration is shown in Figure 65.
Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

VPN Configuration | 212

a. To allow the VPN tunnel to switch back to the primary host when it becomes available again, select Enabled
from the Preemption drop-down list. This step is optional.
b. If Preemption is enabled, specify a value in seconds for Hold time. When preemption is enabled and the
primary host comes up, the VPN tunnel switches to the primary host after the specified hold time. The default
value for Hold time is 600 seconds.
c. To allow the W-IAP to create a backup VPN tunnel to the controller along with the primary tunnel, and
maintain both the primary and backup tunnels separately, select Enabled or Disabled from the Fast failover
drop-down list. If the primary tunnel fails, the W-IAP can switch the data stream to the backup tunnel. This
reduces the total failover time to less than one minute.
d. To disconnect all wired and wireless users when the system switches during VPN tunnel transition from
primary to backup and backup to primary, set Reconnect user on failover to Enabled.
e. To configure an interval for which wired and wireless users are disconnected during a VPN tunnel switch,
specify a value in seconds for Reconnect time on failover within the range of 30—900 seconds. By default,
the reconnection duration is set to 60 seconds.
f. Specify a value in seconds for Secs between test packets. Based on the configured frequency, the W-IAP
can verify if an active VPN connection is available. The default value is 5 seconds, which means that the WIAP sends one packet to the controller every 5 seconds.
g. Enter a value for Max allowed test packet loss, to define a number for lost packets, after which the W-IAP
can determine that the VPN connection is unavailable. The default value is 2.
h. Select Enabled or Disabled from the Per-AP tunnel drop-down list. The administrator can enable this option
to create a GRE tunnel from each W-IAP to the VPN/GRE Endpoint rather than the tunnels created just from
the master W-IAP. When enabled, the traffic to the corporate network is sent through a Layer-2 GRE tunnel
from the W-IAP itself and need not be forwarded through the master W-IAP.
Figure 65 Dell GRE Configuration

6. Click Next to continue.

213 | VPN Configuration

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

In the CLI
To enable automatic configuration of the GRE tunnel:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# vpn gre-outside
AP)(config)# vpn primary 
AP)(config)# vpn backup <>
AP)(config)# vpn fast-failover
AP)(config)# vpn hold-time 
AP)(config)# vpn preemption
AP)(config)# vpn monitor-pkt-send-freq 
AP)(config)# vpn monitor-pkt-lost-cnt 
AP)(config)# vpn reconnect-user-on-failover
AP)(config)# vpn reconnect-time-on-failover 
AP)(config)# end
AP)# commit apply

To view VPN configuration details:
(Instant AP)# show vpn config

Manually Configuring a GRE Tunnel
You can also manually configure a GRE tunnel by configuring the GRE tunnel parameters on the W-IAP and
controller. This procedure describes the steps involved in the manual configuration of a GRE tunnel from Virtual
Controller by using the Instant UI or CLI.
During the manual GRE setup, you can either use the Virtual Controller IP or the W-IAP IP to create the GRE tunnel
at the controller side depending upon the following W-IAP settings:
l

If a Virtual Controller IP is configured and if Per-AP tunnel is disabled, the Virtual Controller IP is used to create
the GRE tunnel.

l

If a Virtual Controller IP is not configured or if Per-AP tunnel is enabled, the W-IAP IP is used to create the GRE
tunnel.

For information on the GRE tunnel configuration on controller, see ArubaOS User Guide.

In the Instant UI
1. Click the More > VPN link at the top right corner of the Instant UI. The Tunneling window is displayed.
2. Select Manual GRE from the Protocol drop-down list.
3. Specify the following parameters. A sample configuration is shown in Figure 66.
a. Enter an IP address or the FQDN for the main VPN/GRE endpoint.
b. Enter a value for the GRE type parameter.
c. Select Enabled or Disabled from the Per-AP tunnel drop-down list. The administrator can enable this option
to create a GRE tunnel from each W-IAP to the VPN/GRE Endpoint rather than the tunnels created just from
the master W-IAP. When enabled, the traffic to the corporate network is sent through a Layer-2 GRE tunnel
from the W-IAP itself and need not be forwarded through the master W-IAP.
By default, the Per-AP tunnel option is disabled.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

VPN Configuration | 214

Figure 66 Manual GRE Configuration

4. Click Next to continue. When the GRE tunnel configuration is completed on both the W-IAP and Controller, the
packets sent from and received by a W-IAP are encapsulated, but not encrypted.

In the CLI
To configure a manual GRE VPN tunnel:
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# gre primary 
AP)(config)# gre type 
AP)(config)# gre per-ap-tunnel
AP)(config)# end
AP)# commit apply

To view VPN configuration details:
Instant Access Point# show vpn config

To configure GRE tunnel on the controller:
(host)(config)# interface tunnel 
(host)(config-tunnel)# description 
(host)(config-tunnel)# tunnel mode gre 
(host)(config-tunnel)# tunnel source 
(host)(config-tunnel)# tunnel destination 
(host)(config-tunnel)# trusted
(host)(config-tunnel)# tunnel vlan 

Configuring an L2TPv3 Tunnel
The Layer 2 Tunneling Protocol version 3 (L2TPv3) feature allows W-IAP to act as L2TP Access Concentrator (LAC)
and tunnel all wireless clients L2 traffic from AP to L2TP Network Server (LNS). In a centralized L2 model, the VLAN
on the corporate side are extended to remote branch sites. Wireless clients associated with W-IAP gets the IP
address from the DHCP server running on LNS. For this, AP has to transparently allow DHCP transactions through
the L2TPv3 tunnel. In this release, L2TPv3 supports the following:
l

Instant supports tunnel and session configuration, and uses Control Message Authentication (RFC 3931) for
tunnel and session establishment. Each L2TPv3 tunnel supports one data connection and this connection is
termed as an L2TPv3 session.

l

Each W-IAP supports tunneling over UDP only.

l

If the primary LNS is down, it fails over to the backup LNS. L2TPv3 has one tunnel profile and under this, one
primary peer and a backup peer are configured. If the primary tunnel creation fails or if the primary tunnel gets
deleted, the backup starts. The following two failover modes are supported:

215 | VPN Configuration

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

l

n

Preemptive: In this mode, if the primary comes up when the backup is active, the backup tunnel is deleted and
the primary tunnel resumes as an active tunnel. If you configure the tunnel to be preemptive, and when the
primary tunnel goes down, it starts the persistence timer which tries to bring up the primary tunnel.

n

Non-Preemptive: In this mode, when the back tunnel is established after the primary tunnel goes down, it
does not make the primary tunnel active again.

L2TPV3 configuration is supported on the following W-IAPs:
n

W-IAP108

n

W-IAP109

n

W-IAP135

You can configure an L2TPv3 tunnel and session profiles through the Instant UI or CLI.

In the Instant UI
1. Click the More > VPN link at the top right corner of the Instant UI. The Tunneling window is displayed.
Figure 67 L3TPv3 Tunneling

2. Select L2TPv3 from the Protocol drop-down list.
3. Configure the tunnel profile:
a. Enter the tunnel name to be used for tunnel creation.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

VPN Configuration | 216

Figure 68 Tunnel Configuration

b. Enter the primary server IP address.
c. Enter the remote end backup tunnel IP address. This is an optional field and is required only when backup
server is configured.
d. Enter the remote end UDP port number. The default value is 1701.
e. Enter the interval at which the hello packets are sent through the tunnel. The default value is 60 seconds.
f. Select the message digest as MD5 or SHA used for message authentication.
g. Enter a shared key for the message digest. This key should match with the tunnel end point shared key.
h. If required, select the failover mode as Primary or Backup (when the backup server is available).
i. Specify a value for the tunnel MTU value if required. The default value is 1460.
j. Click OK.
4. Configure the session profile:
a. Enter the session name to be used for session creation.
Figure 69 Session Configuration

b. Enter the tunnel profile name where the session will be associated.
c. Configure the tunnel IP address with the corresponding network mask and VLAN ID. This is required to reach
an AP from a corporate network. For example, SNMP polling.

217 | VPN Configuration

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

d. Select the cookie length and enter a cookie value corresponding to the length. By default, the cookie length is
not set.
e. Specify the remote end ID.
f. If required, enable default l2 specific sublayer in the L2TP session.
g. Click OK.
5. Click Next to continue.

In the CLI
To configure an L2TPv3 VPN tunnel profile:
(Instant AP)(config)# l2tpv3 tunnel
(Instant AP) (L2TPv3 Tunnel Profile
addr_tunnel>
(Instant AP) (L2TPv3 Tunnel Profile
addr_tunnel>
(Instant AP) (L2TPv3 Tunnel Profile
(Instant AP) (L2TPv3 Tunnel Profile
(Instant AP) (L2TPv3 Tunnel Profile
count>
(Instant AP) (L2TPv3 Tunnel Profile

(Instant AP) (L2TPv3 Tunnel Profile
(Instant AP) (L2TPv3 Tunnel Profile
(Instant AP) (L2TPv3 Tunnel Profile
(Instant AP) (L2TPv3 Tunnel Profile
algo>
(Instant AP) (L2TPv3 Tunnel Profile
(Instant AP) (L2TPv3 Tunnel Profile
(Instant AP) (L2TPv3 Tunnel Profile
(Instant AP)# commit apply


)# primary peer-address )# backup peer-address )# checksum
)# failover-mode 
)# failover-retry-count )# failover-retry-interval
)#
)#
)#
)#

hello-timeout 
local-port 
peer-port 
message-digest-type )# secret-key 
)# mtu 
)# end

To configure an L2TPv3 session profile:
(Instant AP)(config)# l2tpv3 session 
(Instant AP) (L2TPv3 Tunnel Profile )#
value 
(Instant AP) (L2TPv3 Tunnel Profile )#
name_to_associate>
(Instant AP) (L2TPv3 Tunnel Profile )#
tunnel> mask  vlan 
(Instant AP) (L2TPv3 Tunnel Profile )#
(Instant AP) (L2TPv3 Tunnel Profile )#
(Instant AP)# commit apply

cookie len 
l2tpv3 tunnel   
AP)(Routing-profile)# end
AP)# commit apply

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

VPN Configuration | 222

Chapter 15
IAP-VPN Deployment

This section provides the following information:
l

Understanding IAP-VPN Architecture on page 223

l

Configuring W-IAP and Controller for IAP-VPN Operations on page 225

Understanding IAP-VPN Architecture
The IAP-VPN architecture includes the following two components:
l

W-IAPs at branch sites

l

Controller at the datacenter

The master W-IAP at the branch acts as the VPN endpoint and the controller at the datacenter acts as the VPN
concentrator. When a W-IAP is set up for VPN, it forms an IPsec tunnel to the controller to secure sensitive
corporate data. IPsec authentication and authorization between the controller and the W-IAPs is based on the RAP
whitelist configured on the controller.
Only the master AP in a W-IAP cluster forms the VPN tunnel.

From the controller perspective, the master W-IAPs that form the VPN tunnel are considered as VPN clients. The
controller terminates VPN tunnels and routes or switches VPN traffic. The W-IAP cluster creates an IPSec or GRE
VPN tunnel from the Virtual Controller to a mobility controller in a branch office. The controller only acts an IPSec or
GRE VPN end-point and it does not configure the W-IAP.

IAP-VPN Scalability Limits
The controller scalability in IAP-VPN architecture depends on factors such as IPsec tunnel limit, Branch ID limit and
datapath route table limit. The following table provides the IAP-VPN scalability information for various controller
platforms:
Table 42: IAP-VPN Scalability
Platforms

Branches

Routes

L3 Mode Users

W-3200

1000

1000

64000

W-3400

2000

2000

64000

W-3600

8000

8000

64000

W-6000M3

8000

8000

64000

W-7210

8000

8000

64000

W-7220

16000

16000

32000

Total L2 Users

128000
N/A

W-7240

NAT Users

32000

N/A
128000

l

Branches—The number of IAP-VPN branches that can be terminated on a given controller platform.

l

Routes—The number of L3 routes supported on the controller.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

IAP-VPN Deployment | 223

l

L3 mode and NAT mode users—The number of trusted users supported on the controller. There is no scale
impact on the controller. They are limited only by the number of clients supported per W-IAP.

l

L2 mode users—The number of L2 mode users are limited to 128000 for W-7220/W-7240 and 64000 across all
platforms.

IAP-VPN Forwarding Modes
The following forwarding modes are supported in the IAP-VPN scenario.
l

Local mode

l

Centralized L2 mode

l

Distributed L2 mode

l

Distributed L3 mode

The forwarding modes determine whether the DHCP server and default gateway for clients reside in the branch or at
the datacenter. These modes do not determine the firewall processing or traffic forwarding behavior. The Virtual
Controller enables different DHCP pools (various assignment modes) in addition to allocating IP subnets for each
branch. The Virtual Controller allows different modes of forwarding of traffic from the clients on a VLAN with a VPN
tunnel. The forwarding modes are associated with various modes of DHCP address assignment modes.

Local or NAT Mode
In this mode, the W-IAP cluster at that branch has a local subnet and the master W-IAP of the cluster acts as the
DHCP server and gateway for clients. The local mode provides VPN capabilities using the inner IP of the IAP-VPN
IPsec tunnel. The source IP for all client traffic is translated and the traffic destined for the corporate network is
translated using the VPN tunnel IP address of the W-IAP, and is forwarded through the IPsec VPN tunnel. The traffic
destined for the non-corporate network is translated using the IP address of the IAP and is forwarded through the
uplink.
When the local mode is used for forwarding client traffic, hosts on the corporate network cannot establish
connections to the clients on the W-IAP, because the source address of the clients is translated.

L2 Switching Mode
In this mode, the traffic destined for the corporate network is bridged through the VPN tunnel to the controller. The
traffic destined for the non-corporate network is translated using the IP address of the W-IAP and is forwarded
through the uplink.
When a W-IAP registers with the controller, and is configured to use the L2 DHCP scope, the controller
automatically adds the VPN tunnel associated to this W-IAP into the VLAN multicast table. This allows the clients
connecting to the L2 mode VLAN to be part of the same L2 broadcast domain on the controller.
Distributed L2 Mode
In this mode, the W-IAP assigns an IP address from the configured subnet and forwards traffic to both corporate and
non-corporate destinations. Clients receive the corporate IP with Virtual Controller as the DHCP server. The default
gateway for the client still resides in the datacenter and hence this mode is an L2 extension of corporate VLAN to
remote site. Either the controller or an upstream router can be the gateway for the clients. Client traffic destined to
datacenter resources is forwarded by the Master AP (through the IPSec tunnel) to the client's default gateway in the
datacenter.
Centralized L2 Mode
The centralized L2 mode extends the corporate VLAN or broadcast domain to remote branches. The DHCP server
and the gateway for the clients reside in the datacenter. Either the controller or an upstream router can be the
gateway for the clients. For DHCP services in centralized L2 mode, it is recommended that you use an external

224 | IAP-VPN Deployment

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

DHCP server and not the DHCP server on the controller. Client traffic destined to datacenter resources is forwarded
by the master W-IAP (through the IPsec tunnel) to the client's default gateway in the datacenter.

L3 Routing Mode
In this mode, the traffic destined for the corporate network is routed through the VPN tunnel to the controller. The
traffic destined for the non-corporate network is translated using the IP address of the W-IAP and is forwarded
through the uplink.
When a W-IAP registers with the controller and is configured to use the L3 DHCP scope, the Controller adds a route
to enable the routing of traffic from the corporate network to clients on this subnet in the branch.
Distributed L3 mode
The distributed L3 mode contains all broadcast and multicast traffic to a branch. The distributed L3 mode reduces the
cost and eliminates the complexity associated with the classic site-site VPN. However, this mode is very similar to
a classic site-site IPsec VPN where two VPN endpoints connect individual networks together over a public network.
In distributed L3 mode, each branch location is assigned a dedicated subnet. The master AP in the branch manages
the dedicated subnet and acts as the DHCP server and gateway for clients. Client traffic destined to datacenter
resources is routed to the Dell controller through the IPsec tunnel which then routes the traffic to the appropriate
corporate destinations.
Centralized L3 Mode
For centralized L3 clients, the virtual controller acts as a DHCP relay agent that forwards the DHCP traffic to the
DHCP server located behind the controller in the corporate network and reachable through the IPSec tunnel. The
centralized L3 VLAN IP is used as the source IP. The IP address is obtained from the DHCP server.

Configuring W-IAP and Controller for IAP-VPN Operations
This section describes the configuration procedures to perform on the W-IAP and controller for generic use cases.
For information on specific deployment scenarios, see IAP-VPN Deployment Scenarios on page 356.

Configuring a W-IAP network for IAP-VPN operations
This section describes the configuration procedures to perform on the W-IAP for generic use cases. For
information on specific deployment scenarios, see IAP-VPN Deployment Scenarios on page 356.
A W-IAP network requires the following configuration for IAP-VPN operations.
1. Defining the VPN host settings
2. Configuring Routing Profiles
3. Configuring DHCP Profiles
4. Configuring an SSID or Wired Port
5. Enabling Dynamic RADIUS Proxy
6. Configuring Enterprise Domains

Defining the VPN host settings
The VPN endpoint on which a master W-IAP terminates its VPN tunnel is considered as the host. A master AP in a
W-IAP network can be configured with a primary and backup host to provide VPN redundancy. You can define VPN
host settings through More>VPN>Controller in the UI.
You can configure the following VPN profiles for the IAP-VPN operations. For more information, see Configuring a
Tunnel from a W-IAP to Dell Networking W-Series Mobility Controller on page 210.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

IAP-VPN Deployment | 225

l

IPSec

l

Aruba GRE

l

Manual GRE

Configuring Routing Profiles
The routing profile on the W-IAP determines whether the traffic destined to a subnet must be tunneled through IPSec
or bridged locally. If the routing profile is empty, the client traffic will always be bridged locally. For example, if the
routing profile is configured to tunnel 10.0.0.0 /8, traffic destined to 10.0.0.0 /8 will be forwarded through the IPsec
tunnel and the traffic to all other destinations is bridged locally.
You can also configure a routing profile with 0.0.0.0 as gateway to allow both client and IAP traffic to be routed
through a non-tunnel route. If the gateway is in the same subnet as uplink IP address, it is used as a static gateway
entry. A static route can be added on all master and slave W-IAPs for these destinations. The VPN traffic from the
local subnet of W-IAP or the virtual controller IP address in the local subnet is not routed to tunnel, but will be
switched to the relevant VLAN. For example, when a 0.0.0.0/0.0.0.0 routing profile is defined, to bypass certain IPs,
you can add a route to the IP by defining 0.0.0.0 as the destination, thereby forcing the traffic to be routed through the
default gateway of the W-IAP.
You can configure routing profiles through More>VPN>Controller UI. For step-by-step procedural information on
configuring routing profile, see Configuring Routing Profiles on page 221.
The W-IAP network has only one active tunnel even when fast failover enabled. At any given time, traffic can be
tunneled only to one VPN host.

Configuring DHCP Profiles
You can create DHCP profiles to determine the IAP-VPN mode of operation. A W-IAP network can have multiple
DHCP profiles configured for different modes of IAP-VPN. You can configure up to eight DHCP profiles. For more
information on the IAP-VPN modes of operation, see IAP-VPN Forwarding Modes on page 224.
You can create any of the following types of DHCP profiles for the IAP-VPN operations:
l

Local

l

Local L3

l

Distributed L2

l

Distributed L3

l

Centralized

For more information on configuring DHCP profiles, see Configuring DHCP Scopes on page 201..
A centralized L2 or distributed L2 VLAN or subnet cannot be used to serve APs in a hierarchical mode of
deployment. Ensure that the physical IP of the APs connecting to the master AP in hierarchical mode of
deployment is not on a VLAN or subnet that is in centralized or distributed L2 mode of operation. For information on
hierarchical mode of deployment, see Understanding Hierarchical Deployment on page 119.

Configuring an SSID or Wired Port
For a client to connect to the IAP-VPN network, an SSID or wired port profile on a W-IAP must be configured with
appropriate IAP-VPN mode of operation. The VLAN configuration in an SSID or wired port profile determines whether
an SSID or wired port is configured for the IAP-VPN operations.
To configure an SSID or wired port for a specific IAP-VPN mode, the VLAN ID defined in the SSID or wired port
profile must match the VLAN ID defined in the DHCP profile configuration. If the VLAN assignment for an SSID or
wired port profile is set to Virtual controller assigned, default, or a static VLAN ID that does not match the VLAN ID

226 | IAP-VPN Deployment

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

configured in the DHCP profiles, the IAP-VPN operations are affected. For example, if a local DHCP profile is
configured with a VLAN ID of 200, the VLAN configuration on the SSID must be set to a static VLAN ID 200.
For information on how to configure an SSID or wired port profile, seeWireless Network Profiles on page 93 and
Configuring a Wired Profile on page 112 respectively.

Enabling Dynamic RADIUS Proxy
The RADIUS server can be deployed at different locations and VLANs. In most cases, a centralized RADIUS or
local server is used to authenticate users. However, some user networks can use a local RADIUS server for
employee authentication and a centralized RADIUS based captive portal server for guest authentication. To ensure
that the RADIUS traffic is routed to the required RADIUS server, the dynamic RADIUS proxy feature must be
enabled. When enabled, dynamic RADIUS proxy ensures that all the RADIUS traffic is sourced from the Virtual
Controller IP or inner IP of the W-IAP IPsec tunnel depending on the RADIUS server IP and routing profile.
Ensure that a static Virtual Controller IP is configured before enabling dynamic RADIUS proxy, in order to tunnel
the RADIUS traffic to the central RADIUS server in the datacenter.
For information on enabling dynamic RADIUS proxy, see Configuring Dynamic RADIUS Proxy Parameters on page
161.

Configuring Enterprise Domains
By default, all the DNS requests from a client are forwarded to the clients DNS server. In a typical W-IAP
deployment without VPN configuration, client DNS requests are resolved by the DNS server of clients. For the IAPVPN scenario, the enterprise domain settings on the W-IAP are used for determining how client DNS requests are
routed. For information on how to configure enterprise domains, see Configuring Enterprise Domains on page 188.

Configuring a Controller for IAP-VPN Operations
Dell Networking W-Series controllers provide an ability to terminate the IPSec and GRE VPN tunnels from the WIAP and provide corporate connectivity to the branch network. For IAP-VPN operations, ensure that the following
configuration and verification procedures are completed on the controller:
l

OSPF Configuration

l

VPN Configuration

l

Branch-ID Allocation

l

Branch Status Verification

This section describes the configuration procedures to perform on the controller for generic use cases. For
information on specific deployment scenarios, see IAP-VPN Deployment Scenarios on page 356.

ArubaOS 6.3 or later is the recommended version to run on the controllers for the IAP-VPN configuration. The IAPVPN configuration is not supported on W-600 Series controllers.

OSPF Configuration
Open Shortest Path First (OSPF) is a dynamic Interior Gateway routing Protocol (IGP) based on IETF RFC 2328.
The premise of OSPF is that the shortest or fastest routing path is used. The implementation of OSPFv2 allows
controllers to deploy effectively in a Layer 3 topology. The controllers can act as the default gateway for all clients
and forward user packets to the upstream router.
Each IAP-VPN can be defined a separate subnet derived from the corporate intranet pool to allow IAP-VPN devices
to work independently. For sample topology and configuration, see ArubaOS User Guide.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

IAP-VPN Deployment | 227

To redistribute IAP-VPN routes into the OSPF process, use the following command :
(host)(config) # router ospf redistribute rapng-vpn

To verify if the redistribution of the IAP-VPN is enabled, use following command:
(host) #show ip ospf redistribute
Redistribute RAPNG

To configure aggregate route for IAP-VPN routes, use the following command:
(host) (config) # router ospf aggregate-route rapng-vpn

To view the aggregated routes for IAP-VPN routes, use the following command:
(host) #show ip ospf rapng-vpn aggregate-routes
RAPNG VPN aggregate routes
-------------------------Prefix Mask Contributing routes Cost
------ ---- ------------------- ---201.201.200.0 255.255.252.0 5 268779624
100.100.2.0 255.255.255.0 1 10

To verify the details of configured aggregated route, use the following command:
(host) # show ip ospf rapng-vpn aggregated-routes  
(host) #show ip ospf rapng-vpn aggregate-routes 100.100.2.0 255.255.255.0
Contributing routes of RAPNG VPN aggregate route
-----------------------------------------------Prefix Mask Next-Hop Cost
------ ---- -------- ---100.100.2.64 255.255.255.224 5.5.0.10 10

To view all the redistributed routes:
(host) #show ip ospf database
OSPF Database Table
------------------Area ID LSA Type Link ID Adv Router Age Seq# Checksum
------- -------- ------- ---------- --- ---- -------0.0.0.15 ROUTER 9.9.9.9 9.9.9.9 159 0x80000016 0xee92
0.0.0.15 ROUTER 10.15.148.12 10.15.148.12 166 0x80000016 0x4c0d
0.0.0.15 NETWORK 10.15.148.12 10.15.148.12 167 0x80000001 0x9674
0.0.0.15 NSSA 12.12.2.0 9.9.9.9 29 0x80000003 0x7b54
0.0.0.15 NSSA 12.12.12.0 9.9.9.9 164 0x80000008 0x63a
0.0.0.15 NSSA 12.12.12.32 9.9.9.9 164 0x80000008 0x7b8
0.0.0.15 NSSA 50.40.40.0 9.9.9.9 164 0x80000007 0x8ed4
0.0.0.15 NSSA 51.41.41.128 9.9.9.9 164 0x80000007 0x68f6
0.0.0.15 NSSA 53.43.43.32 9.9.9.9 164 0x80000007 0x2633
0.0.0.15 NSSA 54.44.44.16 9.9.9.9 164 0x80000007 0x353
N/A AS_EXTERNAL 12.12.2.0 9.9.9.9 29 0x80000003 0x8c06
N/A AS_EXTERNAL 12.12.12.0 9.9.9.9 169 0x80000001 0x25e4
N/A AS_EXTERNAL 12.12.12.32 9.9.9.9 169 0x80000001 0x2663
N/A AS_EXTERNAL 50.40.40.0 9.9.9.9 169 0x80000001 0xab80
N/A AS_EXTERNAL 51.41.41.128 9.9.9.9 169 0x80000001 0x85a2
N/A AS_EXTERNAL 53.43.43.32 9.9.9.9 169 0x80000001 0x43de
N/A AS_EXTERNAL 54.44.44.16 9.9.9.9 169 0x80000001 0x20fe

To verify if the redistributed routes are installed or not:
(host) #show ip route
Codes: C - connected, O - OSPF, R - RIP, S - static
M - mgmt, U - route usable, * - candidate default, V - RAPNG VPN
Gateway of last resort is Imported from DHCP to network 0.0.0.0 at cost 10
Gateway of last resort is Imported from CELL to network 0.0.0.0 at cost 10
Gateway of last resort is Imported from PPPOE to network 0.0.0.0 at cost 10
Gateway of last resort is 10.15.148.254 to network 0.0.0.0 at cost 1
S* 0.0.0.0/0 [1/0] via 10.15.148.254*

228 | IAP-VPN Deployment

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

V
V
V
V
V
V
V
C
C
C
C
C
C
C

12.12.2.0/24 [10/0] ipsec map
12.12.12.0/25 [10/0] ipsec map
12.12.12.32/27 [10/0] ipsec map
50.40.40.0/24 [10/0] ipsec map
51.41.41.128/25 [10/0] ipsec map
53.43.43.32/27 [10/0] ipsec map
54.44.44.16/28 [10/0] ipsec map
9.9.9.0/24 is directly connected, VLAN9
10.15.148.0/24 is directly connected, VLAN1
43.43.43.0/24 is directly connected, VLAN132
42.42.42.0/24 is directly connected, VLAN123
44.44.44.0/24 is directly connected, VLAN125
182.82.82.12/32 is an ipsec map 10.15.149.69-182.82.82.12
182.82.82.14/32 is an ipsec map 10.17.87.126-182.82.82.14

VPN Configuration
The following VPN configuration steps on the controller enable the W-IAPs to terminate their VPN connection on the
controller:
Whitelist Database Configuration
The whitelist database is a list of the MAC addresses of the W-IAPs that are allowed to establish VPN connections
with the controller. This list can be either stored in the controller database or on an external server.
You can use the following CLI command to configure the whitelist database entry if the controller is acting as the
whitelist database:
(host)# whitelist-db rap add mac-address 00:11:22:33:44:55 ap-group test

The ap-group parameter is not used for any configuration, but needs to be configured. The parameter can be any
valid string.
If an external server is used as the location for the whitelist database, add the MAC addresses of the valid W-IAPs in
the external database or external directory server and then configure a RADIUS server to authenticate the W-IAPs
using the entries in the external database or external directory server.
If you are using the Windows 2003 server, perform the following steps to configure the external whitelist database on
it. There are equivalent steps available for the Windows Server 2008 and other RADIUS servers.
1. Add the MAC addresses for all the W-IAPs in the Active Directory of the RADIUS server:
a. Open the Active Directory and Computers window, add a new user and specify the MAC address (without
the colon delimiter) of the W-IAP for the user name and password.
b. Right-click the user that you have just created and click Properties.
c. In the Dial-in tab, select Allow access in the Remote Access Permission section and click OK.
d. Repeat Step a through Step b for all W-IAPs.
2. Define the remote access policy in the Internet Authentication Service:
a. In the Internet Authentication Service window, select Remote Access Policies.
b. Launch the wizard to configure a new remote access policy.
c. Define filters and select grant remote access permission in the Permissions window.
d. Right-click the policy that you have just created and select Properties.
e. In the Settings tab, select the policy condition, and Edit Profile....
f. In the Advanced tab, select Vendor Specific, and click Add to add new vendor specific attributes.
g. Add new vendor specific attributes and click OK.
h. In the IP tab, provide the IP address of the W-IAP and click OK.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

IAP-VPN Deployment | 229

VPN Local Pool Configuration
The VPN local pool is used to assign an IP Address to the W-IAP after successful XAUTH VPN.
(host) # ip local pool "rapngpool"  

Role Assignment for the Authenticated W-IAPs
Define a role that includes a src-nat rule to allow connections to the RADIUS server and for the Dynamic Radius
Proxy in the W-IAP to work. This role is assigned to W-IAPs after successful authentication.
(host)
(host)
(host)
(host)
(host)
(host)

(config) #ip access-list session iaprole
(config-sess-iaprole)#any host  any src-nat
(config-sess-iaprole)#any any any permit
(config-sess-iaprole)#!
(config) #user-role iaprole
(config-role) #session-acl iaprole

VPN Profile Configuration
The VPN profile configuration defines the server used to authenticate the W-IAP (internal or an external server) and
the role assigned to the IAP after successful authentication.
(host) (config) #aaa authentication vpn default-iap
(host) (VPN Authentication Profile "default-iap") #server-group default
(host) (VPN Authentication Profile "default-iap") #default-role iaprole

Branch-ID Allocation
For branches deployed in distributed L3 and distributed L2 mode, the master AP in the branch and the controller
should agree upon a subnet/IP addresses to be used for DHCP services in the branch. The process or protocol used
by the master AP and the controller to determine the subnet/IP addresses used in a branch is called BID allocation.
The BID allocation process is not essential for branches deployed in local or centralized L2 mode. The following are
some of the key functions of the BID allocation process:
l

Determines the IP addresses used in a branch for distributed L2 mode

l

Determines the subnet used in a branch for distributed L3 mode

l

Avoids IP address or subnet overlap (that is, avoids IP conflict)

l

Ensures that a branch is allocated the same subnet or range of IP addresses irrespective of which AP in the
branch becomes the master in the IAP cluster

Branch Status Verification
To view the details of the branch information connected to the controller, execute the show iap table command.
Example
This example shows the details of the branches connected to the controller:
(host) #show iap table long
IAP Branch Table
---------------Name VC MAC Address Status Inner IP Assigned Subnet Assigned Vlan
---- -------------- ------ -------- --------------- ------------Tokyo-CB:D3:16 6c:f3:7f:cc:42:f8 DOWN 0.0.0.0
Paris-CB:D3:16 6c:f3:7f:cc:3d:04 UP 10.15.207.140 10.15.206.99/29 2
LA 6c:f3:7f:cc:42:25 UP 10.15.207.111 10.15.206.24/29 2
Munich d8:c7:c8:cb:d3:16 DOWN 0.0.0.0
London-c0:e1 6c:f3:7f:c0:e1:b1 UP 10.15.207.120 10.15.206.64/29 2
Instant-CB:D3 6c:f3:7f:cc:42:1e DOWN 0.0.0.0
Delhi 6c:f3:7f:cc:42:ca DOWN 0.0.0.0
Singapore 6c:f3:7f:cc:42:cb UP 10.15.207.122 10.15.206.120/29 2

230 | IAP-VPN Deployment

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Key Bid(Subnet Name)
--- ---------------b3c65c...
b3c65c...
b3c65c... 2(10.15.205.0-10.15.205.250,5),1(10.15.206.1-10.15.206.252,5)
a2a65c... 0
b3c65c... 7(10.15.205.0-10.15.205.250,5),8(10.15.206.1-10.15.206.252,5)
b3c65c...
b3c65c... 1(10.15.205.0-10.15.205.250,5),2(10.15.206.1-10.15.206.252,5)
b3c65c... 14(10.15.205.0-10.15.205.250,5),15(10.15.206.1-10.15.206.252,5)

The output of this command provides the following information:
Table 43: Branch Details
Parameter

Description

Name

Displays the name of the branch.

VC MAC
Address

Displays the MAC address of the Virtual Controller of the branch.

Status

Displays the current status of the branch (UP/DOWN).

Inner IP

Displays the internal VPN IP of the branch.

Assigned
Subnet

Displays the subnet mask assigned to the branch.

Assigned
Vlan

Displays the VLAN ID assigned to the branch.

Key

Displays the key for the branch, which is unique to each branch.

Bid(Subnet
Name)

Displays the Branch ID (BID) of the subnet.
l In the example above, the controller displays bid-per-subnet-per-branch i.e., for "LA"
branch, BID "2" for the ip-range "10.15.205.0-10.15.205.250" with client count per branch
"5"). If a branch has multiple subnets, it can have multiple BIDs.
l If a branch is in UP state and does not have a Bid(Subnet Name), it means that the W-IAP
is connected to a controller, which did not assign any BID for any subnet. In the above
example, "Paris-CB:D3:16" branch is UP and does not have a Bid (Subnet Name). This
means that either the W-IAP is connected to a backup controller or it is connected to a
primary controller without any distributed L2 or L3 subnets.

The show iap table command output does not display the Key and Bid(Subnet Name) details.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

IAP-VPN Deployment | 231

Chapter 16
Adaptive Radio Management

This chapter provides the following information:
l

ARM Overview on page 232

l

Configuring ARM Features on a W-IAP on page 233

l

Configuring Radio Settings for a W-IAP on page 238

ARM Overview
Adaptive Radio Management (ARM) is a radio frequency management technology that optimizes WLAN
performance even in the networks with highest traffic by dynamically and intelligently choosing the best 802.11
channel and transmitting power for each W-IAP in its current RF environment. ARM works with all standard clients,
across all operating systems, while remaining in compliance with the IEEE 802.11 standards. It does not require any
proprietary client software to achieve its performance goals. ARM ensures low-latency roaming, consistently high
performance, and maximum client compatibility in a multi-channel environment. By ensuring the fair distribution of
available Wi-Fi bandwidth to mobile devices, ARM ensures that data, voice, and video applications have sufficient
network resources at all times. ARM allows mixed 802.11a, b, g, n, and ac client types to inter operate at the highest
performance levels.

Channel or Power Assignment
The channel or power assignment feature automatically assigns channel and power settings for all the W-IAPs in the
network according to changes in the RF environment. This feature automates many setup tasks during network
installation and the ongoing operations when RF conditions change.

Voice Aware Scanning
The Voice Aware scanning feature prevents a W-IAP supporting an active voice call from scanning for other
channels in the RF spectrum and allows a W-IAP to resume scanning when there are no active voice calls. This
significantly improves the voice quality when a call is in progress and simultaneously delivers the automated RF
management functions. By default, this feature is enabled.

Load Aware Scanning
The Load Aware Scanning feature dynamically adjusts scanning behavior to maintain uninterrupted data transfer on
resource intensive systems when the network traffic exceeds a predefined threshold. The W-IAPs resume complete
monitoring scans when the traffic drops to the normal levels. By default, this feature is enabled.

Monitoring the Network with ARM
When ARM is enabled, a W-IAP dynamically scans all 802.11 channels within its 802.11 regulatory domain at
regular intervals and sends reports to a Virtual Controller on network (WLAN) coverage, interference, and intrusion
detection.

ARM Metrics
ARM computes coverage and interference metrics for each valid channel and chooses the best performing channel
and transmit power settings for each W-IAP RF environment. Each W-IAP gathers other metrics on its ARMassigned channel to provide a snapshot of the current RF health state.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Adaptive Radio Management | 232

Configuring ARM Features on a W-IAP
This section describes the following procedures for configuring ARM features:
l

Band Steering on page 233

l

Airtime Fairness Mode on page 233

l

Client Match on page 234

l

Access Point Control on page 236

Band Steering
The band steering feature assigns the dual-band capable clients to the 5 GHz band on dual-band W-IAPs. This
feature reduces co-channel interference and increases available bandwidth for dual-band clients, because there are
more channels on the 5 GHz band than on the 2.4 GHz band. You can configure band steering parameters through
the Instant UI or CLI.

In the Instant UI
To configure band steering:
1. In the RF > ARM >Show advanced options view, configure the following parameters:
Table 44: Band Steering Mode - Configuration Parameters
Parameter

Description

Prefer 5 GHz

Select this option to use band steering in the 5 GHz mode. On selecting this, the WIAP steers the client to the 5 GHz band (if the client is 5 GHz capable), but allows
the client connection on the 2.4 GHz band if the client persistently attempts for 2.4
GHz association.

Force 5 GHz

Select this option to enforce 5 GHz band steering mode on the W-IAPs.

Balance Bands

Select this option to allow the W-IAP to balance the clients across the two radios to
best utilize the available 2.4 GHz bandwidth. This feature takes into account the
fact that the 5 GHz band has more channels than the 2.4 GHz band, and that the 5
GHz channels operate in 40MHz, while the 2.5 GHz band operates in 20MHz.

Disabled

Select this option if you want to allow the clients to select the band to use.

2. Click OK.

In the CLI
To configure band steering:
(Instant AP)(config)# arm
(Instant AP)(ARM)# band-steering-mode {| ||}
(Instant AP)(ARM)# end
(Instant AP)# commit apply

Airtime Fairness Mode
The airtime fairness feature provides equal access to all clients on the wireless medium, regardless of client type,
capability, or operating system, thus delivering uniform performance to all clients. This feature prevents the clients
from monopolizing resources. You can configure airtime fairness mode parameters through the Instant UI or CLI.

233 | Adaptive Radio Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

In the Instant UI
1. For Airtime fairness mode configuration, specify any of the following values in the RF > ARM >Show
advanced options tab:
Table 45: Airtime Fairness Mode - Configuration Parameters
Parameter

Description

Default Access

Select this option to provide access based on client requests. When Air Time
Fairness is set to default access, per user and per SSID bandwidth limits are not
enforced.

Fair Access

Select this option to allocate Airtime evenly across all the clients.

Preferred Access

Select this option to set a preference where 11n clients are assigned more airtime
than 11a/11g. The 11a/11g clients get more airtime than 11b. The ratio is 16:4:1.

2. Click OK.

In the CLI
(Instant
(Instant
Access>
(Instant
(Instant

AP)(config)# arm
AP)(ARM)# air-time-fairness-mode {|  |  ARM >Show advanced options tab:
Table 46: Client Match Configuration Parameters
Parameter

Description

Client match

Select Enabled to enable the Client match feature on APs. When enabled, client
count will be balanced among all the channels in the same band. For more
information, see ARM Overview on page 232. By default, the client match feature is
disabled.
NOTE: When client match is enabled, ensure that Scanning is enabled.

CM calculating
interval

Specify a value for the calculating interval of Client match. The value specified for
CM calculating interval determines the interval at which client match is calculated.
The interval is specified in seconds and the default value is 30 seconds. You can
specify a value within the range of 10-600.

CM neighbor
matching %

Specify a value for CM neighbor matching %. This number takes into account the
least similarity percentage to be considered as in the same virtual RF
neighborhood of client match. You can specify a percentage value within the range
of 20-100. The default value is 75%.

CM threshold

Specify a value for CM threshold. This number takes acceptance client count
difference among all the channels of Client match into account. When the client
load on an AP reaches or exceeds the threshold in comparison, client match is
enabled on that AP.
You can specify a value within range of 1-255. The default value is 2.

SLB mode

Select a mode from the SLB mode drop-down list. The SLB mode determines the
balancing strategy for client match. The following options are available:
l
l
l

Channel
Radio
Channel + Radio

2. Click OK.

235 | Adaptive Radio Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

In the CLI
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# arm
AP)(ARM)# client-match
AP)(ARM)# client-match
AP)(ARM)# client-match
AP)(ARM)# client-match
AP)(ARM)# end
AP)# commit apply

calc-interval 
calc-threshold 
nb-matching 
slb-mode 1

Access Point Control
You can configure access point control parameters through the Instant UI or CLI.

In the Instant UI
1. For Access Point Control, specify the following parameters in the RF > ARM >Show advanced options tab:
Table 47: Access Point Control - Configuration Parameters
Parameter

Description

Customize Valid
Channels

Select this checkbox to customize valid channels for 2,4 GHz and 5 GHz. By default,
the AP uses valid channels as defined by the Country Code (regulatory domain). On
selecting the Customize Valid Channels checkbox, a list of valid channels for both
2.4.GHz and 5 GHz are displayed. The valid channel customization feature is
disabled by default..

Minimum
Transmit Power

Specify the minimum transmission power. The value specified for Minimum Transmit
Power indicates the minimum Effective Isotropic Radiated Power (EIRP) from 3 to 33
dBm in 3 dBm increments. If the minimum transmission EIRP setting configured on
an AP is not supported by the AP model, this value is reduced to the highest
supported power setting. The default value is for minimum transmit power is 18 dBm.

Maximum
Transmit Power

Specify the maximum transmission power. The value specified for Maximum
Transmit Power indicates the maximum Effective Isotropic Radiated Power (EIRP)
from 3 to 33 dBm in 3 dBm increments. If the maximum transmission EIRP configured
on an AP is not supported by the AP model, the value is reduced to the highest
supported power setting. The default value for maximum transmit power is 127 dBm.

Client aware

When Enabled, ARM does not change channels for the APs with active clients,
except for high priority events such as radar or excessive noise. This feature must be
enabled in most deployments for a stable WLAN. If the Client Aware mode is
Disabled, the W-IAP may change to a more optimal channel, which change may
disrupt current client traffic for a while. The Client aware option is Enabled by default.
NOTE: When Client aware is disabled, channels can be changed even when the
clients are active on a BSSID.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Adaptive Radio Management | 236

Parameter

Description

Scanning

Select Enabled so that the W-IAP dynamically scans all 802.11 channels within its
802.11 regulatory domain at regular intervals and reports to the W-IAP. This
scanning report includes WLAN coverage, interference, and intrusion detection data.
NOTE: For client match configuration, ensure that scanning is enabled.

Wide Channel
Bands

Select a band to allow the APs to be placed in 40Mhz (wide band) channels. The
Wide channel band allows administrators to configure 40 MHz channels in the 2.4
GHz and 5.0 GHz bands. 40 MHz channels are two 20 MHz adjacent channels that
are bonded together. 40 MHz channel effectively doubles the frequency bandwidth
available for data transmission.

80 MHz Support

Enables or disables the use of 80 MHz channels on APs. This feature allows ARM to
assign 80 MHz channels on APs with 5GHz radios, which support a very high
throughput. This setting is enabled by default.
NOTE: Only the APs that support 802.11ac can be configured with 80 MHz
channels.

2. Reboot the W-IAP.
3. Click OK.

In the CLI
To configure access point control parameters:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# arm
AP)(ARM)# a-channels <5GHz-channels>
AP)(ARM)# min-tx-power 
AP)(ARM)# max-tx-power 
AP)(ARM)# client-aware
AP)(ARM)# wide-bands {<5GHz>|<2GHz>||}
AP)(ARM)# scanning
AP)(ARM)# 80mhz-support
AP)(ARM)# end
AP)# commit apply

Verifying ARM Configuration
To view ARM configuration:
(Instant AP)# show arm config
Minimum Transmit Power :18
Maximum Transmit Power :127
Band Steering Mode :prefer-5ghz
Client Aware :enable
Scanning :enable
Wide Channel Bands :5ghz
80Mhz Support :enable
Air Time Fairness Mode :fair-access
Client Match :disable
CM NB Matching Percent :75
CM Calculating Interval :30
CM SLB Threshold :2
CM SLB Balancing Mode :channel based
CM max client match req :5
CM max adoption :5
Custom Channels :No
2.4 GHz Channels

237 | Adaptive Radio Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

---------------Channel Status
------- -----1 enable
2 disable
3 disable
4 disable
5 disable
6 enable
7 disable
8 disable
9 disable
10 disable
11 enable
12 disable
13 disable
1+ enable
2+ disable
3+ disable
4+ disable
5+ disable
6+ disable
7+ enable
5.0 GHz Channels
---------------Channel Status
------- -----36 enable
40 enable
44 enable
48 enable
52 enable
56 enable
60 enable
64 enable
149 enable
153 enable
157 enable
161 enable
165 enable
36+ enable
44+ enable
52+ disable
60+ disable
149+ enable
157+ enable
36E enable
52E enable
149E enable

Configuring Radio Settings for a W-IAP
You can configure 2.4 GHz and 5 GHz radio settings for a W-IAP either using the Instant UI or CLI.

In the Instant UI
To configure radio settings:
1. Click the RF link at the top right corner of the Instant main window.
2. Click Show advanced options. The advanced options are displayed.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Adaptive Radio Management | 238

3. Click the Radio tab.
4. Under the channel 2.4.GHz or 5GHz or both, configure the following parameters.
Table 48: Radio Configuration Parameters
Parameter

Description

Legacy only

Select Enabled to run the radio in non-802.11n mode. This option is set to Disabled
by default.

802.11d /
802.11h

Select Enabled to allow the radio to advertise its 802.11d (Country Information) and
802.11h (Transmit Power Control) capabilities. This option is set to Disabled by
default.

Beacon interval

Enter the Beacon period for the W-IAP in milliseconds. This indicates how often the
802.11 beacon management frames are transmitted by the access point. You can
specify a value within the range of 60-500. The default value is 100 milliseconds.

Interference
immunity level

Select to increase the immunity level to improve performance in high-interference
environments.
The default immunity level is 2.
l Level 0— no ANI adaptation.
l Level 1— Noise immunity only. This level enables power-based packet detection
by controlling the amount of power increase that makes a radio aware that it has
received a packet.
l Level 2— Noise and spur immunity. This level also controls the detection of
OFDM packets, and is the default setting for the Noise Immunity feature.
l Level 3— Level 2 settings and weak OFDM immunity. This level minimizes false
detects on the radio due to interference, but may also reduce radio sensitivity.
This level is recommended for environments with a high-level of interference
related to 2.4 GHz appliances such as cordless phones.
l Level 4— Level 3 settings, and FIR immunity. At this level, the AP adjusts its
sensitivity to in-band power, which can improve performance in environments
with high and constant levels of noise interference.
l Level 5— The AP completely disables PHY error reporting, improving
performance by eliminating the time the W-IAP would spend on PHY processing.
NOTE: Increasing the immunity level makes the AP to lose a small amount of range.

Channel switch
announcement
count

Specify the count to indicate the number of channel switching announcements that
must be sent before switching to a new channel. This allows associated clients to
recover gracefully from a channel change.

Background
spectrum
monitoring

Select Enabled to allow the APs in access mode to continue with normal access
service to clients, while performing additional function of monitoring RF interference
(from both neighboring APs and non Wi-Fi sources such as, microwaves and
cordless phones) on the channel they are currently serving clients.

5. Reboot the W-IAP after configuring the radio profile settings.

In the CLI
To configure 2.4 GHz radio settings:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)#
AP)(RF dot11
AP)(RF dot11
AP)(RF dot11
AP)(RF dot11
AP)(RF dot11
AP)(RF dot11
AP)(RF dot11
AP)(RF dot11

239 | Adaptive Radio Management

rf dot11g-radio-profile
g Radio Profile)# beacon-interval 
g Radio Profile)# legacy-mode
g Radio Profile)# spectrum-monitor
g Radio Profile)# dot11h
g Radio Profile)# interference-immunity 
g Radio Profile)# csa-count 
g Radio Profile)# max-distance 
g Radio Profile)# end

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

(Instant AP)# commit apply

To configure 5 GHz radio settings:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# rf dot11a-radio-profile
AP)(RF dot11a Radio Profile)# beacon-interval 
AP)(RF dot11a Radio Profile)# legacy-mode
AP)(RF dot11a Radio Profile)# spectrum-monitor
AP)(RF dot11a Radio Profile)# spectrum-band 
AP)(RF dot11a Radio Profile)# dot11h
AP)(RF dot11a Radio Profile)# interference-immunity 
AP)(RF dot11a Radio Profile)# max-distance 
AP)(RF dot11a Radio Profile)# csa-count 
AP)(RF dot11 g Radio Profile)# end
AP)# commit apply

To view the radio configuration:
(Instant AP)# show radio config
Legacy Mode:enable
Beacon Interval:100
802.11d/802.11h:enable
Interference Immunity Level:2
Channel Switch Announcement Count:0
MAX Distance:600
Channel Reuse Type:disable
Channel Reuse Threshold:0
Background Spectrum Monitor:disable
5.0 GHz:
Legacy Mode:enable
Beacon Interval:100
802.11d/802.11h:enable
Interference Immunity Level:2
Channel Switch Announcement Count:2
MAX Distance:600
Channel Reuse Type:disable
Channel Reuse Threshold:0
Background Spectrum Monitor:disable
Standalone Spectrum Band:5ghz-upper

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Adaptive Radio Management | 240

Chapter 17
Deep Packet Inspection and Application Visibility

This chapter provides the following information:
l

Deep Packet Inspection on page 241

l

Enabling Application Visibility on page 241

l

Application Visibility on page 242

l

Configuring Access Rules for Application and Application Categories on page 246

l

Configuring Web Policy Enforcement on page 249

Deep Packet Inspection
AppRF is Dell's custom built Layer 7 firewall capability. It comprises of an on-board deep packet inspection and a
cloud-based Web Policy Enforcement service that allows creating firewall policies based on types of application.
The web policy enforcement capabilities require the W-IAP to have a web policy enforcement subscription. Please
contact the Dell Sales Team.
W-IAPs with DPI capability analyze data packets to identify applications in-use and allow you to create access rules
to determine client access to applications, application categories, web categories and website URLs based on
security ratings. You can also define traffic shaping policies such as bandwidth control and QoS per application for
client roles. For example, you can block bandwidth monopolizing applications on a guest role within an enterprise.
The AppRF feature provides application visibility for analyzing client traffic flow. W-IAPs support both the power of
in-device packet flow identification and dynamically updated cloud-based web categorization.
To view the graphs, set the AppRF visibility option in the System window to Enabled. For more information on DPI
ACLs and AppRF visibility, see the following topics:

Enabling Application Visibility
Enabling AppRF visibility allows you to view the AppRF statistics for a W-IAP or the clients associated with a WIAP. When visibility is enabled, the AppRF link appears on the dashboard area of the main window. On clicking this
link, you can view the client traffic flow based on the enforcements.
You can enable AppRF visibility through the Instant UI or CLI:

In the Instant UI
1. Navigate to System>General.
2. Select Enabled from the AppRF visibility drop-down.
3. Click OK.

In the CLI
To enable AppRF visibility:
(Instant AP)(config)# dpi
(Instant AP)(config)# end
(Instant AP)# commit apply

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Deep Packet Inspection and Application Visibility | 241

Application Visibility
The AppRF graphs are based on Deep Packet Inspection (DPI) application and Web Policy Enforcement service,
which provides application traffic summary for the client devices associated with a W-IAP. The AppRF link above
the activity panel of the dashboard is displayed only if AppRF visibility is enabled in the System window.
The following figure provides a view of the AppRF dashboard:
Figure 71 AppRF Dashboard

The AppRF dashboard presents four different graph areas with data graphs on all client traffic and content filters
based on web category and security ratings. Click on each category to view real-time client traffic data or usage
trend in the last 15 minutes.
The application charts are not supported on W-IAP104/105, W-IAP134/135, W-IAP175P/175AC, and WIAP3WN/3WNP platforms. Only the web category charts are displayed for these W-IAP models.

Application Category Charts
The application category chart displays details on the client traffic towards the application categories. On clicking in
the rectangle area, you can view the following graphs and toggle between the chart and list views.
Figure 72 Application Categories Chart - Client View

242 | Deep Packet Inspection and Application Visibility

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Figure 73 Application Categories List - Client View

Figure 74 Application Category Chart - AP View

Application Charts
The application chart displays details on the client traffic towards the applications. On clicking in the rectangle area,
you can view the following graphs and toggle between the chart and list views.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Deep Packet Inspection and Application Visibility | 243

Figure 75 Application Chart - Client View

Figure 76 Application List - Client View

Figure 77 Application Chart - AP View

244 | Deep Packet Inspection and Application Visibility

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Web Categories Charts
The web categories chart displays details about the client traffic to the web categories. On clicking in the rectangle
area, you can view the following graphs and toggle between the chart and list views.
Figure 78 Web Categories Chart - Client View

Figure 79 Web Categories List - Client View

Figure 80 Web Categories Chart - AP View

Web Reputation Charts
The web reputation chart displays details about the client traffic to the URLs with that are assigned a security score.
On clicking in the rectangle area, you can view the following graphs and toggle between the chart and list views.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Deep Packet Inspection and Application Visibility | 245

Figure 81 Web Reputation Chart - Client View

Figure 82 Web Reputation List - Client View

Figure 83 Web Reputation Chart - AP View

Configuring Access Rules for Application and Application Categories
This section describes the procedure for configuring access rules based on application and application categories.
The Application and Application rules utilize the on-board DPI engine. For information on:
l

Configuring access rules to control access to network services, see Configuring Access Rules for Network
Services on page 177.

l

Configuring access rules based on web categories and web reputation, see Configuring Web Policy Enforcement
on page 249

In the Instant UI
To configure ACL rules for a user role:
246 | Deep Packet Inspection and Application Visibility

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

1. Navigate to Security > Roles tab. The Roles tab contents are displayed.
You can also configure access rules for a wired or wireless client through the WLAN wizard (Network
tab>WLAN SSID> Edit>Edit WLAN > Access ) or the Wired profile (More > Wired>Edit> Edit Wired
Network> Access) window.
2. Select the role for which you want to configure access rules.
3. In Access rules section, click New to add a new rule. The New Rule window is displayed.
4. Ensure that the rule type is set to Access Control
5. To configure access to applications or application category, select a service category from the following list:
l

Application

l

Application category

Configuring access rules based on application and application category is not supported on W-IAP104/105, WIAP134/135, and W-IAP3WN/3WNP platforms.
6. Based on the selected service category, configure the following parameters:
Table 49: Access Rule Configuration Parameters
Service
Category

Description

Application

Select the applications to which you want to allow or deny access.

Application
category

Select any of the following application categories to which you want to allow or deny access:
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l

Application
Throttling

antivirus
authentication
cloud-file-storage
collaboration
encrypted
enterprise-apps
gaming
im-file-transfer
instant-messaging
mail-protocols
mobile-app-store
network-service
peer-to-peer
social-networking
standard
streaming
thin-client
tunneling
unified-communications
web
Webmail

Application throttling allows you to set a bandwidth limit for an application, application
category, web category, or for sites based on their web reputation. For example, you can limit
the bandwidth rate for video streaming applications such as Youtube or Netflix, or assign a
low bandwidth to high risk sites. If your W-IAP model does not support configuring access
rules based on application or application category, you can create a rule based on web
category or website reputation and assign bandwidth rates.
To specify a bandwidth limit:

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Deep Packet Inspection and Application Visibility | 247

Table 49: Access Rule Configuration Parameters
Service
Category

Description
1. Select the Application Throttling checkbox.
2. Specify the downstream and upstream rates in Kbps.

Action

Select any of following actions:
Select Allow to allow access users based on the access rule.
l Select Deny to deny access to users based on the access rule.
l Select Destination-NAT to allow changes to destination IP address.
l Select Source-NAT to allow changes to the source IP address.
The destination-nat and source-nat actions apply only to the network services rules.
l

Destination

Select a destination option for the access rules for network services, applications, and
application categories. You can allow or deny access to any the following destinations based
on your requirements.
l to all destinations— Access is allowed or denied to all destinations.
l to a particular server—Access is allowed or denied to a particular server. After selecting
this option, specify the IP address of the destination server.
l except to a particular server—Access is allowed or denied to servers other than the
specified server. After selecting this option, specify the IP address of the destination
server.
l to a network—Access is allowed or denied to a network. After selecting this option, specify
the IP address and netmask for the destination network.
l except to a network—Access is allowed or denied to networks other than the specified
network. After selecting this option, specify the IP address and netmask of the destination
network.
l to domain name—Access is allowed or denied to the specified domains. After selecting
this option, specify the domain name in the Domain Name text box.
l to master IP—Access is allowed or denied to the master IP address.

Log

Select this checkbox if you want a log entry to be created when this rule is triggered. Instant
supports firewall based logging function. Firewall logs on the W-IAPs are generated as
security logs.

Blacklist

Select the Blacklist checkbox to blacklist the client when this rule is triggered. The blacklisting
lasts for the duration specified as Auth failure blacklist time on the Blacklisting tab of the
Security window. For more information, see Blacklisting Clients on page 171.

Disable scanning

Select Disable scanning checkbox to disable ARM scanning when this rule is triggered.
The selection of the Disable scanning applies only if ARM scanning is enabled, For more
information, see Configuring Radio Settings for a W-IAP on page 238.

DSCP tag

Select the DSCP tag checkbox to specify a DSCP value to prioritize traffic when this rule is
triggered. Specify a value within the range of 0 to 63. To assign a higher priority, specify a
higher value.

802.1p priority

Select the 802.1p priority checkbox to specify an 802.1p priority. Specify a value between 0
and 7. To assign a higher priority, specify a higher value.

3. Click OK and then click Finish.

In the CLI
To configure access rules:
(Instant AP)(config)# wlan access-rule 
(Instant AP)(Access Rule )#rule    {app  {permit|deny}
|appcategory }[]
(Instant AP)(Access Rule )# end

248 | Deep Packet Inspection and Application Visibility

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

(Instant AP)# commit apply

Example
(Instant AP)(config)# wlan access-rule employee
(Instant AP)(Access Rule "employee")# rule any any match app deny throttle-downstream 256
throttle-up 256
(Instant AP)(Access Rule "employee")# rule any any match appcategory collaboration permit
(Instant AP)(Access Rule "employee")# end
(Instant AP)# commit apply

Configuring Web Policy Enforcement
You can configure Web Policy Enforcement on a W-IAP to block certain categories of websites based on your
organization specifications by defining ACL rules either through the Instant UI or CLI.

In the Instant UI
1. Navigate to Security >Roles.
2. Select any WLAN SSID or wired profile role, and click New in the Access Rules section. The New Rule window
appears.
3. Select the rule type as Access Control.
4. To set an access policy based on the web category:
a. Under Services, select Web category and expand the Web categories drop-down.
Figure 84

b. Select the categories to which you want to deny or allow access. You can also search for a web category and
select the required option.
c. From the Action drop-down, select Allow or Deny as required.
d. Click OK.
5. To filter access based on the security ratings of the website:
a. Select Web reputation under Services.
b. Move the slider to the required security rating level. Move the slider to select a specific web reputation value to
deny access to websites with a reputation value lower than or equal to the configured value or to permit
access to websites with a reputation value higher than or equal to the configured value. The following options
are available:
n

Trustworthy - These are well known sites with strong security practices and may not expose the user to
security risks. There is a very low probability that the user will be exposed to malicious links or payloads.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Deep Packet Inspection and Application Visibility | 249

n

Low risk - These are benign sites and may not expose the user to security risks. There is a low probability
that the user will be exposed to malicious links or payloads.

n

Moderate risk - These are generally benign sites, but may pose a security risk. There is some probability
that the user will be exposed to malicious links or payloads.

n

Suspicious - These are suspicious sites. There is a higher than average probability that the user will be
exposed to malicious links or payloads.

n

High risk - These are high risk sites. There is a high probability that the user will be exposed to malicious
links or payloads.

c. From the Action drop-down, select Allow or Deny as required.
6. To set a bandwidth limit based on web category or web reputation score, select Application Throttling checkbox
and specify the downstream and upstream rates in Kbps. For example, you can set a higher bandwidth for trusted
sites and a low bandwidth rate for high risk sites.
7. If required, select the following checkboxes:
l

Log—Select this checkbox if you want a log entry to be created when this rule is triggered. Instant supports
firewall based logging function. Firewall logs on the W-IAPs are generated as security logs.

l

Blacklist—Select the Blacklist checkbox to blacklist the client when this rule is triggered. The blacklisting
lasts for the duration specified as Auth failure blacklist time on the Blacklisting tab of the Security window.
For more information, see Blacklisting Clients on page 171.

l

Disable scanning—Select Disable scanning checkbox to disable ARM scanning when this rule is triggered.
The selection of the Disable scanning applies only if ARM scanning is enabled, For more information, see
Configuring Radio Settings for a W-IAP on page 238.

l

DSCP tag—Select the DSCP tag checkbox to specify a DSCP value to prioritize traffic when this rule is
triggered. Specify a value within the range of 0 to 63. To assign a higher priority, specify a higher value.

l

802.1p priority—Select the 802.1p priority checkbox to specify an 802.1p priority. Specify a value between
0 and 7. To assign a higher priority, specify a higher value.

8. Click OK to save the rules.
9. Click OK in Roles tab to save the changes to the role for which you defined ACL rules.

In the CLI
To control access based on web categories and security ratings:
(Instant AP)(config)# wlan access-rule 
(Instant AP) (Access Rule "")# rule    webcategory 
{permit| deny}[]
(Instant AP) (Access Rule "")# rule    webreputation 
{permit|deny}[]
(Instant AP) (Access Rule "")# end
(Instant AP)# commit apply

Example
(Instant
(Instant
(Instant
permit
(Instant
(Instant
(Instant

AP)(config)# wlan access-rule URLFilter
AP) (Access Rule "URLFilter")# rule any any match webcategory gambling deny
AP) (Access Rule "URLFilter")# rule any any match webcategory training-and-tools
AP) (Access Rule "URLFilter")# rule any any match webreputation suspicious-sites deny
AP) (Access Rule "URLFilter")# end
AP)# commit apply

250 | Deep Packet Inspection and Application Visibility

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Chapter 18
Voice and Video

This chapter the steps required to configure voice and video services on a W-IAP for Voice over IP (VoIP) devices,
including Session Initiation Protocol (SIP), Spectralink Voice Priority (SVP), H323, SCCP, Vocera, and Alcatel NOE
phones, clients running Microsoft OCS, and Apple devices running the Facetime application.
This section includes the following topics:
l

Wi-Fi Multimedia Traffic Management on page 251

l

QoS for Microsoft Office OCS and Apple Facetime on page 253

Wi-Fi Multimedia Traffic Management
Wi-Fi Multimedia (WMM), is a Wi-Fi Alliance specification based on the IEEE 802.11e wireless Quality of Service
(QoS) standard. WMM works with 802.11a, b, g, and n physical layer standards.
WMM supports the following access categories (ACs):
l

Voice

l

Video

l

Best effort

l

Background

The following table shows the mapping of the WMM access categories to 802.1p priority values. The 802.1p priority
value is contained in a two-byte QoS control field in the WMM data frame.
Table 50: WMM AC to 802.1p Priority Mapping
802.1p Priority

WMM Access Category

1

Background

2
0

Best effort

3
4

Video

5
6

Voice

7

In a non-WMM or hybrid environment, where some clients are not WMM-capable, you can configure an SSID with
higher values for best effort and voice ACs, to allocate a higher bandwidth to clients transmitting best effort and
voice traffic.

Configuring WMM for Wireless Clients
You can configure WMM for wireless clients by using the UI or CLI.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Voice and Video | 251

In the Instant UI
1. Navigate to the WLAN wizard (click Network>New or Network> Select the WLAN SSID>edit).
2. Click Show advanced options under WLAN Settings.
3. Specify a percentage value for the following WMM access categories in the corresponding Share field. You can
allocate a higher bandwidth for voice and video traffic than other types of traffic based on the network profile.
l

Background WMM — Allocates bandwidth for background traffic such as file downloads or print jobs.

l

Best effort WMM —Allocates bandwidth or best effort traffic such as traffic from legacy devices or traffic from
applications or devices that do not support QoS.

l

Video WMM — Allocates bandwidth for video traffic generated from video streaming.

l

Voice WMM — Allocates bandwidth for voice traffic generated from the incoming and outgoing voice
communication.

In a non-WMM or hybrid environment, where some clients are not WMM-capable, you can allocate higher values
for Best effort WMM and Voice WMM to allocate a higher bandwidth to clients transmitting best effort and voice
traffic.
4. Click Next and complete the configuration as required.

In the CLI
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile )# wmm-background-share 
AP)(SSID Profile )# wmm-best-effort-share 
AP)(SSID Profile )# wmm-video-share 
AP)(SSID Profile )# wmm-voice-share 
AP)(SSID Profile )# end
AP)# commit apply

Configuring WMM-DSCP Mapping
The IEEE 802.11e standard defines the mapping between WMM ACs and Differentiated Services Codepoint
(DSCP) tags.You can customize the mapping values between WMM ACs and DSCP tags to prioritize various traffic
types and apply these changes to a WMM-enabled SSID profile.
DSCP classifies packets based on network policies and rules. The following table shows the default WMM AC to
DSCP mappings and the recommended WMM AC to DSCP mappings.
Table 51: WMM-DSCP Mapping
DSCP Value

WMM Access Category

8

Background

16
0

Best effort

24
32

Video

40
48

Voice

56

252 | Voice and Video

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

By customizing WMM AC mappings, all packets received are matched against the entries in the mapping table and
prioritized accordingly. The mapping table contains information for upstream (client to W-IAP) and downstream (WIAP to client) traffic.
You can configure different WMM to DSCP mapping values for each WMM AC when configuring an SSID profile
either in the Instant UI or CLI.

In the Instant UI
1. Navigate to the WLAN wizard (click Network>New or Network> Select the WLAN SSID>edit).
2. Click Show advanced options under WLAN Settings.
3. Specify the appropriate DSCP mapping value within a range of 0-63 for the following access categories in the
DSCP mapping field:
l

Background WMM — DSCP mapping for the background traffic.

l

Best effort WMM — DSCP mapping for the best-effort traffic.

l

Video WMM — DSCP mapping for the video traffic.

l

Voice WMM — DSCP mapping for the voice traffic.

4. Click Next and complete the configuration as required.

In the CLI
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan ssid-profile 
AP)(SSID Profile )# wmm-background-dscp 
AP)(SSID Profile )# wmm-best-effort-dscp 
AP)(SSID Profile )# wmm-video-dscp 
AP)(SSID Profile )# wmm-voice-dscp 
AP)(SSID Profile )# end
AP)# commit apply

You can configure up to 8 DSCP mappings values within the range of 0-63. You can also configure a combination of
multiple values separated by a comma, for example, wmm-voice-dscp 46,44,42,41.

QoS for Microsoft Office OCS and Apple Facetime
Voice and video devices use a signaling protocol to establish, control, and terminate voice and video calls. These
control or signaling sessions are usually permitted using pre-defined ACLs. If the control signaling packets are
encrypted, the W-IAP cannot determine the dynamic ports are used for voice or video traffic. In these cases, the WIAP has to use an ACL with the classify-media option enabled to identify the voice or video flow based on a deep
packet inspection and analysis of the actual traffic. Instant identifies and prioritizes voice and video traffic from
applications such as Microsoft Office Communications Server (OCS) and Apple Facetime.
Microsoft OCS
Microsoft Office Communications Server (OCS) uses Session Initiation Protocol (SIP) over TLS to establish,
control, and terminate voice and video calls.
Apple Facetime
When an Apple device starts a Facetime video call, it initiates a TCP session to the Apple Facetime server over port
5223, then sends SIP signaling messages over a non-default port. When media traffic starts flowing, audio and video
data are sent through that same port using RTP. (The audio and video packets are interleaved in the air, though
individual the sessions can be uniquely identified using their payload type and sequence numbers.) The RTP header
and payload also get encapsulated under the TURN ChannelData Messages. The Facetime call is terminated with a
SIP BYE message that can be sent by either party.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Voice and Video | 253

The following table lists the ports used by Apple Facetime. Facetime users need to be assigned a role where traffic is
allowed on these ports.
Table 52: Ports Used by the Apple Facetime Application
Port

Packet Type

53

TCP/UDP

443

TCP

3478-3497

UDP

5223

TCP

16384-16387

UDP

16393-16402

UDP

254 | Voice and Video

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Chapter 19
Services

This chapter provides information on how to configure following services on a W-IAP:
l

AirGroup

l

Real Time Location Server (RTLS)

l

Analytics and Location Engine (ALE)

l

OpenDNS

l

Communications Assistance for Law Enforcement Act (CALEA)

l

Palo Alto Network Firewall

l

XML-API Server

AirGroup Configuration
AirGroup provides a unique enterprise-class capability that leverages zero configuration networking to enable
AirGroup services from mobile devices in an efficient manner. Zero configuration networking enables service
discovery, address assignment, and name resolution for desktop computers, mobile devices, and network services.
It is designed for flat, single-subnet IP networks such as wireless networking at home. The users can register their
personal devices and define a group of users who can to share the registered devices. Administrators can register
and manage an organization's shared devices such as printers and grant global access to each device, or restrict
access according to the username, role, or user location.
In large universities and enterprise networks, it is common for devices to connect to the network across VLANs. As
a result, user devices on a specific VLAN cannot discover service that resides on another VLAN. As the addresses
used by the protocol are link-scope multicast addresses, each query or advertisement can only be forwarded on its
respective VLAN, but not across different VLANs. Broadcast and multicast traffic are usually filtered out from a
wireless LAN network to preserve the airtime and battery life. This inhibits the performance of AirGroup services that
rely on multicast traffic. Dell addresses this challenge with AirGroup technology.
The distributed AirGroup architecture allows each W-IAP to handle mDNS and DLNA queries and responses
individually instead of overloading a Virtual Controller with these tasks. This results in a scalable AirGroup solution.
The AirGroup solution supports both wired and wireless devices. An AirGroup device can be registered by an
administrator or a guest user.
1. The AirGroup administrator gives an end user the AirGroup operator role, which authorizes the user to register the
client devices on the CPPM platform.
2. W-IAPs maintain information for all AirGroup services. W-IAP queries CPPM to map each device’s access
privileges to the available services and responds to the query made by a device based on contextual data such as
user role, username, and location.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Services | 255

The following figure illustrates how AirGroup enables personal sharing of Apple devices:
Figure 85 AirGroup Enables Personal Device Sharing

AirGroup is not supported on a 3G and PPPoE uplinks.

Multicast DNS and Bonjour® Services
Bonjour is the trade name for the zero configuration implementation introduced by Apple. It is supported by most of
the Apple product lines, including the Mac OS X operating system, iPhone, iPod Touch, iPad, Apple TV, and AirPort
Express. Apple AirPlay and AirPrint services are based on the Bonjour protocol and are essential services in
campus Wi-Fi networks.
Bonjour can be installed on computers running Microsoft Windows® and is supported by the new network-capable
printers. Bonjour is also included with popular software programs such as Apple iTunes, Safari, and iPhoto. Bonjour
uses multicast DNS (mDNS) to locate devices and the services offered by these devices.
As shown in the following figure, the W-IAP1 discovers AirPrint (P1) and W-IAP3 discovers Apple TV (TV1). W-IAP1
advertises information about its connected P1 device to the other W-IAPs that isW-IAP2 and W-IAP3. Similarly, WIAP3 advertises TV1 device to W-IAP1 and W-IAP2. This type of distributed architecture allows any W-IAP to
respond to its connected devices locally. In this example, the iPad connected to W-IAP2 obtains direct response
from the same W-IAP about the other Bonjour-enabled services in the network.

256 | Services

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Figure 86 Bonjour Services and AirGroup Architecture

For a list of supported Bonjour services, see AirGroup Services on page 259.

DLNA UPnP Support
In addition to the mDNS protocol, W-IAPs now support Universal Plug and Play (UPnP) and DLNA (Digital Living
Network Alliance) enabled devices. DLNA is a network standard derived from UPnP, which enables devices to
discover the services available in a network. DLNA also provides the ability to share data between the Windows or
Android based multimedia devices. All the features and policies applicable to mDNS are extended to DLNA to
ensure full interoperability between compliant devices.
In a UPnP based scenario, the following types of devices are available in a network:
l

Controlled devices (servers)

l

Control points (clients)

When a controlled device joins a network and acquires IP address, it multicasts a number of discovery messages
advertising itself, its embedded devices and services. On the other hand, when a control point joins a network, it may
multicast a search discovery message searching for interesting devices and services. The devices listening on the
multicast address respond if they match the search criteria in the search message.
In a single AP network, the W-IAP maintains a cache table containing the list of discovered services in the network.
The W-IAP also enforces native policies such as disallowing roles and VLANs and the policies defined on CPPM to
determine the devices or services that are allowed and can be discovered in the network. Whenever a search
request comes, the AP looks up its cache table and filters based on configured policies and then builds a search
response and unicasts it to the requesting device.
In a W-IAP cluster, the W-IAPs maintain a list of associated UPnP devices and allow the discovery of the
associated devices.
The following figure illustrates DLNA UPnP Services and AirGroup Architecture.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Services | 257

Figure 87 DLNA UPnP Services and AirGroup Architecture

For a list of supported DLNA services, see AirGroup Services on page 259.

AirGroup Features
AirGroup supports the following features:
l

Sends unicast responses to mDNS or DLNA queries and reduces the traffic footprint.

l

Ensures cross-VLAN visibility and availability of AirGroup devices and services.

l

Allows or blocks AirGroup services for all users.

l

Allows or blocks AirGroup services based on user roles.

l

Allows or blocks AirGroup services based on VLANs.

l

Matches devices to their closest services such as printers

AirGroup also enables context awareness for services across the network:
l

AirGroup is aware of personal and shared devices. For example, an Apple TV in a dorm room can be associated
with the student who owns it or an Apple TV in a meeting room or a printer in a supply room that is available to
certain users, such as the marketing department.

l

AirGroup is aware of the location of services when CPPM support is enabled. For example, depending on
proximity, a user would be presented with the closest printer instead of all the printers in the building.

l

When configured, AirGroup enables a client to perform a location-based discovery. For example, when a client
roams from one Instant cluster to another, it can discover devices available in the new cluster to which the client
is currently connected.

The following figure shows an example of a higher-education environment with shared, local, and personal services
available to mobile devices.

258 | Services

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Figure 88 AirGroup in a Higher-Education Environment

When AirGroup discovers a new device, it interacts with CPPM to obtain the shared attributes such as shared
location and role. However, the current versions of W-IAPs do not support the enforcement of shared location
policy.

AirGroup Services
AirGroup supports zero configuration services. The services are pre-configured and are available as part of the
factory default configuration. The administrator can also enable or disable any or all services by using the Instant UI
or CLI.
The following services are available for W-IAP clients:
l

AirPlay™— Apple® AirPlay allows wireless streaming of music, video, and slideshows from your iOS device to
Apple TV® and other devices that support the AirPlay feature.

l

AirPrint™— Apple AirPrint allows you to print from an iPad®, iPhone®, or iPod® Touch directly to any AirPrint
compatible printers.

l

iTunes—The iTunes service is used by iTunes Wi-Fi sync and iTunes home-sharing applications across all Apple
devices.

l

RemoteMgmt—The RemoteMgmt service allows remote login, remote management, and FTP utilities on Apple
devices.

l

Sharing— The Sharing service allows applications such as disk sharing and file sharing among Apple devices.

l

Chat— The iChat® (Instant Messenger) application on Apple devices uses this service.

l

ChromeCast—ChromeCast service allows you to use a ChromeCast device to play audio or video content on a
high definition television by streaming content through Wi-Fi from the Internet or local network.

l

DLNA Media—Applications such as Windows Media Player use this service to browse and play media content on
a remote device.

l

DLNA Print—This service is used by printers that support DLNA.

In the Instant 6.4.0.2-4.1 release, it is recommended to have a maximum of upto 80 AirGroup servers in the
network
For more information on configuring AirGroup services, see Configuring AirGroup and AirGroup Services on a W-IAP
on page 261.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Services | 259

AirGroup Components
AirGroup leverages key elements of the Dell solution portfolio including operating system software for Instant,
CPPM, and the VLAN-based or role-based filtering options offered by the AirGroup services. The components that
make up the AirGroup solution include the Instant, CPPM, and ClearPass Guest. The version requirements are
described in the following table:
Table 53: Instant, CPPM, and ClearPass Guest Requirements
Component

Minimum Version for mDNS
Services

Minimum Version for DLNA
Services

Instant

6.2.0.0-3.2.0.0

6.4.0.2-4.1

ClearPass Guest software

5.2

6.2

ClearPass Guest Services plugin

6.2.0

6.3.0

Starting from ClearPass version 6.0, the ClearPass Guest and the AirGroup Services plug-in are integrated into a
single platform.
AirGroup maintains seamless connectivity between clients and services across VLANs and SSIDs. The following
table summarizes the filtering options supported by Instant:
Table 54: AirGroup Filtering Options
Features

 Instant Deployment Models
Integrated

Integrated with CPPM

Allow mDNS and DLNA traffic to propagate
across subnets/VLANs

Yes

Yes

Limit mDNS and DLNA traffic on the network

Yes

Yes

VLAN based AirGroup service policy enforcement

Yes

Yes

User-role based AirGroup service policy
enforcement

Yes

Yes

Portal to self register personal leaves

No

Yes

Device owner based policy enforcement

No

Yes

Location based policy enforcement

No

Yes

Shared user list based policy enforcement

No

Yes

Shared role list based policy enforcement

No

Yes

CPPM and ClearPass Guest Features
CPPM and ClearPass Guest support the following features:
l

Registration portal for WLAN users to register their personal devices.

l

Registration portal for WLAN administrators to register shared devices.

l

Operator-defined personal AirGroup to specify a list of other users who can share devices with the operator.

l

Administrator defined username, user role, and location attributes for shared devices.

260 | Services

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Configuring AirGroup and AirGroup Services on a W-IAP
You can configure AirGroup services, using the Instant UI or CLI.

In the Instant UI
To enable AirGroup and its services:
1. Click the More > Services link at the top right corner of the Instant main window.
2. Click the Air Group tab. The Air Group tab details are displayed.
Figure 89 AirGroup Configuration

3. To enable support for Bonjour services, select the Enable Bonjour checkbox and select the AirGroup services
related to Bonjour as required.
4. To enable DLNA support, select the Enable DLNA checkbox and select the DLNA services.
5. To allow the users to use Bonjour services enabled in a guest VLAN, select Enable Guest Bonjour multicast.
When this checkbox is enabled, the Bonjour devices are visible only in the guest VLAN and AirGroup will not
discover or enforce policies in guest VLAN.
6. Select the Enable Air Group across mobility domains checkbox to enable inter-cluster mobility. When
enabled, the W-IAP shares the mDNS database information with the other clusters. The DNS records in the
Virtual Controller can be shared with the all the Virtual Controllers configured for L3 Mobility.
By default, this feature is disabled. To define clusters, go to System> L3 Mobility tab.
7. Ensure that the required AirGroup services are selected. To add any service, click New and add. To allow all
services, select allowall. If a custom service is added, you can add a corresponding service ID by clicking New
under Service ID.
If the W-IAP is upgraded to current release and if Bonjour is enabled, ensure that the corresponding Bonjour
services are selected.
Instant supports the use of upto 6 custom services.
8. Based on the services configured, you can block any user roles from accessing an AirGroup service and restrict
the AirGroup servers connected to a specific set of VLANs from being discovered . The user roles and VLANs

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Services | 261

marked as disallowed are prevented from accessing the corresponding AirGroup service. You can create a list of
disallowed user roles and VLANs for all AirGroup services configured on the W-IAP. For example, If the AirPlay
service is selected, the edit links for the airplay disallowed roles and airplay disallowed vlans are displayed.
Similarly, if sharing service is selected, the edit links for the sharing disallowed roles and sharing disallowed
vlans are displayed.
l

To select block user roles from accessing an AirGroup service, click the corresponding edit link and select the
user roles for which you want to restrict access. By default, an AirGroup service is accessible by all user roles
configured in your W-IAP cluster.

l

To select VLANs from allowing access to an AirGroup service, click the corresponding edit link and select the
VLANs to exclude. By default, the AirGroup services are accessible by users or devices in all VLANs
configured in your W-IAP cluster.

9. ClearPass Settings— Use this section to configure the CPPM server, CoA server, and enforce ClearPass
registering.
l

CPPM server 1— Indicates the ClearPass Policy Manager server information for AirGroup policy.

l

Enforce ClearPass registering— When enabled, only devices registered with CPPM will be discovered by
Bonjour devices, based on the CPPM policy.

In the CLI
To configure AirGroup:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# airgroup
AP)(airgroup)# enable [dlna-only| mdns-only]
AP)(airgroup)# cppm enforce-registration
AP)(airgroup)# cppm-server 
AP)(airgroup)# cppm-query-interval 
AP)(airgroup)# disallow-vlan 
AP)(airgroup)# enable-guest-multicast
AP)(airgroup)# multi-swarm
AP)(airgroup)# end
AP)# commit apply

To enable DLNA support:
(Instant
(Instant
(Instant
(Instant

AP)(config)# airgroup
AP)(airgroup)# enable dlna-only
AP)(airgroup)# end
AP)# commit apply

To enable support for Bonjour services:
(Instant
(Instant
(Instant
(Instant

AP)(config)# airgroup
AP)(config)# enable mdns-only
AP)(airgroup)# end
AP)# commit apply

To configure AirGroup Service
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# airgroupservice 
AP)(airgroup-service)# id 
AP)(airgroup-service)# description 
AP)(airgroup-service)# disallow-role 
AP)(airgroup-service)# disallow-vlan 
AP)(airgroup-service)# end
AP)# commit apply

To verify the AirGroup configuration status:
(Instant AP)# show airgroup status

262 | Services

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Configuring AirGroup and CPPM interface in Instant
Configure the Instant and CPPM interface to allow an AirGroup W-IAP and CPPM to exchange information
regarding device sharing, and location. The configuration options define the RADIUS server that is used by the
AirGroup RADIUS client.
The AirGroup configuration with CPPM involves the following steps:
1. Create a RADIUS service
2. Assign a Server to AirGroup
3. Configure CPPM to Enforce Registration

Creating a RADIUS Server
You can configure an external RADIUS Security window. For more information on the configuring CPPM server, see
Configuring an External Server for Authentication on page 157. You can also create a RADIUS server in the Air
Group window. Navigate to Services > AirGroup > Clear Pass Settings > CPPM server 1 > and select New
from the drop-down list.

Assign a Server to AirGroup
To associate the CPPM server with AirGroup, select the CPPM server from the CPPM Server 1 drop-down list.
If two CPPM servers are configured, the CPPM server 1 acts as a primary server and the CPPM server 2 acts as a
backup server.
After the configuration is complete, this particular server will be displayed in the CoA server option. To view this
server go to Services> AirGroup >ClearPass Settings > CoA server.

Configure CPPM to Enforce Registration
When CPPM registration is enforced, the devices registered with CPPM will be discovered by Bonjour devices,
based on the CPPM policy.

Change of Authorization (CoA)
When a RADIUS server is configured with Change of Authorization (CoA) with the CPPM server, the guest users
are allowed to register their devices. For more information on configuring RADIUS server with CoA , see Configuring
an External Server for Authentication on page 157.
You can also create a CoA only server in the Services > AirGroup > Clear Pass Settings > CoA server
window.

Configuring a W-IAP for RTLS Support
Instant supports the real-time tracking of devices when integrated with the W-AirWave Management Platform, or a
third-party Real Time Location Server such as Aeroscout Real Time Location Server. With the help of the RTLS, the
devices can be monitored in real-time or through history.
You can configure RTLS using the Instant UI or CLI.

In the Instant UI
To configure Aruba RTLS:
1. Click the More > Services link at the top right corner of the Instant main window. The Services window is
displayed.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Services | 263

2. Click the RTLS tab. The following figure shows the contents of the RTLS tab.
3. Under Aruba, select the RTLS check-box to integrate Instant with the W-AirWave Management Platform or
Ekahau Real Time Location Server.
Figure 90 RTLS Window

4. Specify the IP address and port to which the location reports must be sent.
5. Specify the shared secret key in the Passphrase text box.
6. Specify the frequency at which the Virtual Controller can send updates to the server. You can specify a value
within the range of 5-3600 seconds. The default value is 5 seconds.
7. Select the Include unassociated stations check-box to send reports on the stations that are not associated to
any W-IAP to the RTLS server.
8. Click OK.
To configure third-party RTLS such as Aeroscout:
1. Select the Aeroscout check-box to send the RFID tag information to an AeroScout RTLS.
2. Specify the IP address and port number of the AeroScout server, to which location reports must be sent.
3. Select the Include unassociated stations check-box to send reports on the stations that are not associated to
any W-IAP to the Aeroscout RTLS server.
4. Click OK.

In the CLI
To configure W-AirWave RTLS:
(Instant AP)(config)# airwave-rtls     include-unassocsta
(Instant AP)(config)# end
(Instant AP)# commit apply

To configure Aeroscout RTLS
(Instant AP)(config)# aeroscout-rtls   include-unassoc-sta
(Instant AP)(config)# end
(Instant AP)# commit apply

264 | Services

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Configuring a W-IAP for Analytics and Location Engine Support
The Analytics and Location Engine (ALE) is designed to gather client information from the network, process it and
share it through a standard API. The client information gathered by ALE can be used for analyzing a client’s internet
behavior for business such as shopping preferences.
ALE includes a location engine that calculates the associated and unassociated device location every 30 seconds
by default. For every device on the network, ALE provides the following information through the Northbound API:
l

Client user name

l

IP address

l

MAC address

l

Device type

l

Application firewall data, showing the destinations and applications used by associated devices.

l

Current location

l

Historical location

ALE requires the AP placement data to be able to calculate location for the devices in a network.

ALE with Instant
The Instant 6.3.1.1-4.0 release supports Analytics and Location Engine (ALE). The ALE server acts as a primary
interface to all third-party applications and the W-IAP sends client information and all status information to the ALE
server.
To integrate W-IAP with ALE, the ALE server address must be configured on a W-IAP. If the ALE sever is configured
with a host name, the Virtual Controller performs a mutual certificated-based authentication with ALE server, before
sending any information.

Enabling ALE Support on a W-IAP
You can configure a W-IAP for ALE support using the Instant UI or CLI.

In the Instant UI
1. Click More > Services. The Services window is displayed.
2. Click the RTLS tab. The tab details are displayed.
3. Select the Analytics & Location Engine checkbox.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Services | 265

Figure 91 Services Window —ALE Integration

4. Specify the ALE server name or IP address.
5. Specify the reporting interval within the range of 6–60 seconds. The W-IAP sends messages to the ALE server at
the specified interval. The default interval is 30 seconds.
6. Click OK.

In the CLI
To enable W-IAP integration with the ALE server:
(Instant
(Instant
(Instant
(Instant

AP)(config)# ale-server 
AP)(config)# ale-report-interval 
AP)(config)# end
AP)# commit apply

Verifying ALE Configuration on a W-IAP
To view the configuration details:
(Instant AP)# show ale config

To verify the configuration status
(Instant AP)# show ale status

Configuring OpenDNS Credentials
When configured, the OpenDNS credentials are used by Instant to access OpenDNS to provide enterprise-level
content filtering. You can configure OpenDNS credentials using the Instant UI or CLI.

In the Instant UI
To configure OpenDNS credentials:
1. Click More > Services > OpenDNS. The OpenDNS tab contents are displayed.
2. Enter the Username and Password to enable access to OpenDNS.
3. Click OK to apply the changes.

266 | Services

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

In the CLI
To configure OpenDNS credentials:
(Instant AP)(config)# opendns 
(Instant AP)(config)# end
(Instant AP)# commit apply

Integrating a W-IAP with Palo Alto Networks Firewall
Palo Alto Networks (PAN) next-generation firewall offers contextual security for all users for safe enabling of
applications. A simple firewall beyond basic IP address or TCP port numbers only provides a subset of the enhanced
security required for enterprises to secure their networks. In the context of businesses using social networking sites,
legacy firewalls are not able to differentiate valid authorized users from casual social networking users.
The Palo Alto next-generation firewall is based on user ID, which provides many methods for connecting to sources
of identity information and associating them with firewall policy rules. For example, it provides an option to gather
user information from Active Directory or LDAP server.

Integration with Instant
The functionality provided by the PAN firewall based on user ID requires the collection of information from the
network. W-IAP maintains the network (such as mapping IP address) and user information for its clients in the
network and can provide the required information for the user ID feature on PAN firewall. Before sending the user-ID
mapping information to the PAN firewall, the W-IAP must retrieve an API key that will be used for authentication for
all APIs.
W-IAP and PAN firewall integration can be seamless with the XML-API that available with PAN-OS 5.0 or later.
To integrate a W-IAP with PAN user ID, a global profile is added. This profile can be configured on a W-IAP with
PAN firewall information such as IP address, port, user name, password, firewall enabled or disabled status.
The W-IAP sends messages to PAN based on the type of authentication and client status:
l

After a client completes the authentication and is assigned an ip address, W-IAP will send the login message.

l

After a client is disconnected or dissociated from the W-IAP, the W-IAP sends a logout message.

Configuring a W-IAP for PAN integration
You can configure a W-IAP for PAN firewall integration using the Instant UI or CLI.

In the Instant UI
1. Click More > Services. The Services window is displayed.
2. Click Network Integration. The PAN firewall configuration options are displayed.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Services | 267

Figure 92 Services Window - Network Integration Tab

3. Select the Enable checkbox to enable PAN firewall.
4. Specify the user name and password. Ensure that you provide user credentials of the PAN firewall administrator.
5. Enter the PAN firewall IP address.
6. Enter the port number within the range of 1—65535. The default port is 443.
7. Click OK.

In the CLI
To enable PAN firewall integration with the W-IAP:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# firewall-external-enforcement pan
AP)(firewall-external-enforcement pan)# enable
AP)(firewall-external-enforcement pan)# ip 
AP)(firewall-external-enforcement pan)# port 
AP)(firewall-external-enforcement pan)# user  
AP)(firewall-external-enforcement pan)# end
AP)# commit apply

Integrating a W-IAP with an XML API interface
The XML API interface provides options to create and execute user management operations seamlessly on behalf of
the clients or users.

268 | Services

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Integration with Instant
The XML API interface allows users to send specific XML commands to a W-IAP from an external server. These
XML commands can be used to customize W-IAP client entries. You can use the XML API interface to add, delete,
authenticate, query, or blacklist a user or a client.
The user authentication is supported only for users authenticated by Captive Portal authentication and not for the
dot1x-authentication users.
The user add operation performed by the XML API interface is only used to modify the role of an existing user and
not to create a new user.
Users can now use HTTP or HTTPS to post commands to W-IAP. The communication process using the
XML API Interface is as follows:
l

An API command is issued in XML format from the Server to the Virtual Controller.

l

The Virtual Controller processes the XML request and identifies where the client is and sends the command to
the correct slave W-IAP.

l

Once the operation is completed, Virtual Controller sends the XML response to the XML server.

l

Users can use the response and take appropriate action that suit their requirements. The response from the
controller is returned using predefined formats.

Configuring a W-IAP for XML API integration
You can configure a W-IAP for XML API integration using the Instant UI or CLI.

In the Instant UI
1. Click More > Services. The Services window is displayed.
2. Click Network Integration. The XML API Server configuration options are displayed.
Figure 93 XML API Server Configuration

3. Enter the IP address of the XML API Server.
4. Enter the Passphrase required to authenticate and access the XML API Server.
5. Re-enter the Passphrase in the Retype box.
6. Click OK.

In the CLI
To enable XML API integration with the W-IAP:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# xml-api-server
AP)(xml-api-server)# ip 
AP)(xml-api-server)# key 
AP)(xml-api-server)# no 
AP)(xml-api-server)# end
AP)# commit apply

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Services | 269

CALEA Integration and Lawful Intercept Compliance
Lawful Intercept (LI) allows the Law Enforcement Agencies (LEA) to perform an authorized electronic surveillance.
Depending on the country of operation, the service providers (SPs) are required to support LI in their respective
networks.
In the United States, SPs are required to ensure LI compliance based on Communications Assistance for Law
Enforcement Act (CALEA) specifications.
Instant supports CALEA integration in a hierarchical and flat topology, mesh W-IAP network, the wired and wireless
networks.
Enable this feature only if lawful interception is authorized by a law enforcement agency.

CALEA Server Integration
To support CALEA integration and ensure LI compliance, you can configure the W-IAPs to replicate a specific or
selected client traffic and send it to a remote CALEA server.

Traffic Flow from IAP to CALEA Server
You can configure a W-IAP to send GRE encapsulated packets to the CALEA server and replicate client traffic
within the GRE tunnel. Each W-IAP sends GRE encapsulated packets only for its associated or connected clients.
The following figure illustrates the traffic flow from the W-IAP to the CALEA server.
Figure 94 IAP to CALEA Server

270 | Services

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Traffic Flow from IAP to CALEA Server through VPN
You can also deploy the CALEA server with the controller and configure an additional IPSec tunnel for corporate
access. When CALEA server is configured with the controller, the client traffic is replicated by the slave W-IAP and
client data is encapsulated by GRE on slave, and routed to the master W-IAP. The master IAP sends the IPsec
client traffic to the controller. The controller handles the IPSec client traffic while GRE data is routed to the CALEA
server. The following figure illustrates the traffic flow from W-IAP to the CALEA server through VPN.
Figure 95 IAP to CALEA Server through VPN

Ensure that IPSec tunnel is configured if the client data has to be routed to the ISP or CALEA server through VPN.
For more information on configuring IPSec, see Configuring an IPSec Tunnel on page 210.

Client Traffic Replication
Client traffic is replicated in the following ways:
l

Through RADIUS VSA— In this method, the client traffic is replicated by using the RADIUS VSA to assign
clients to a CALEA related user role. To enable role assignment to clients, you need to create a user role and a
CALEA access rule, and then assign the CALEA rule to the user role. Whenever a client that is configured to use
a CALEA rule connects, a replication role is assigned.

l

Through Change of Authorization (CoA)—In this method, a user session can start without replication. When the
network administrator triggers a CoA from the RADIUS server, the user session is replicated. The replication is
stopped when the user disconnects or by sending a CoA to change the replication role.

As the client information is shared between multiple W-IAPs in a cluster, the replication rules persist when clients
roam within the cluster.

Configuring a W-IAP for CALEA Integration
To enable CALEA server integration, perform the following steps:
1. Create a CALEA profile.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Services | 271

2. If a replication role must be assigned through the RADIUS VSA, create an access rule and assign the access
rule to a WLAN SSID or wired profile.
3. Verify the configuration.

Creating a CALEA Profile
You can create a CALEA profile by using the Instant UI or CLI.
In the Instant UI
To configure a CALEA profile:
1. Click More > Services at the top right corner of the Instant main window.
2. Click CALEA. The CALEA tab details are displayed.

3. Specify the following parameters:
l

IP address— Specify the IP address of the CALEA server.

l

Encapsulation type— Specify the encapsulation type. The current release of Instant supports GRE only.

l

GRE type— Specify the GRE type.

l

MTU— Specify a size for the maximum transmission unit (MTU) within the range of 68—1500. After GRE
encapsulation, if packet length exceeds the configured MTU, IP fragmentation occurs. The default MTU size
is 1500.

4. Click OK.
In the CLI
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# calea
AP)(calea)# ip 
AP)(calea)# ip mtu 
AP)(calea)# encapsulation-type 
AP)(calea)# gre-type 
AP)(calea)# end
AP)# commit apply

Creating an Access Rule for CALEA
You can create an access rule for CALEA by using the Instant UI or CLI.
In the Instant UI
To create an access rule:

272 | Services

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

1. To add the CALEA access rule to an existing profile, select an existing wireless (Networks tab > edit) or wired
(More > Wired > Edit) profile. To add the access rule to a new profile, click New under Network tab and create a
WLAN profile, or click More>Wired>New and create a wired port profile.
2. In the Access tab, select the role for which you want create the access rule.
3. Under Access Rules, click New. The New Rule window is displayed.
4. Select CALEA.
5. Click OK.
6. Create a role assignment rule if required.
7. Click Finish.
In the CLI
To create a CALEA access rule:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan access-rule 
AP)(Access Rule )# calea
AP)(Access Rule )# end
AP)# commit apply

To assign the CALEA rule to a user role:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile # set-role {{equals| not-equals| starts-with| endswith|contains}|value-of}
(Instant AP)(SSID Profile # end
(Instant AP)(SSID Profile # commit apply

To associate the access rule with a wired profile:
(Instant
(Instant
(Instant
(Instant

AP)(config)# wired-port-profile 
AP)(Wired ap profile )# access-rule-name 
AP)(Wired ap profile )# end
AP)# commit apply

Verifying the configuration
To verify the CALEA configuration:
(Instant AP)# show calea config

To view the tunnel encapsulation statistics:
(Instant AP)# show calea statistics

Example
To enable CALEA integration:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# calea
AP)(calea)# ip 192.0.2.7
AP)(calea)# ip mtu 1500
AP)(calea)# encapsulation-type GRE
AP)(calea)# gre-type 255
AP)(calea)# end

(Instant
(Instant
(Instant
(Instant

AP)(config)# wlan access-rule ProfileCalea
AP)(Access Rule "ProfileCalea")# calea
AP)(Access Rule "ProfileCalea")# end
AP)# commit apply

(Instant AP)(config)# wlan ssid-profile Calea-Test
(Instant AP)(SSID Profile"Calea-Test")# enable
(Instant AP)(SSID Profile"Calea-Test")# index 0

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Services | 273

(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(SSID
AP)(SSID
AP)(SSID
AP)(SSID
AP)(SSID
AP)(SSID
AP)(SSID
AP)(SSID
AP)(SSID
AP)(SSID
AP)(SSID
AP)(SSID
AP)(SSID
AP)(SSID
AP)(SSID
AP)(SSID

Profile"Calea-Test")#
Profile"Calea-Test")#
Profile"Calea-Test")#
Profile"Calea-Test")#
Profile"Calea-Test")#
Profile"Calea-Test")#
Profile"Calea-Test")#
Profile"Calea-Test")#
Profile"Calea-Test")#
Profile"Calea-Test")#
Profile"Calea-Test")#
Profile"Calea-Test")#
Profile"Calea-Test")#
Profile"Calea-Test")#
Profile"Calea-Test")#
Profile"Calea-Test")#

type employee
essid QA-Calea-Test
opmode wpa2-aes
max-authentication-failures 0
auth-server server1
set-role Filter-Id equals 123456 calea-test
rf-band 5.0
captive-portal disable
dtim-period 1
inactivity-timeout 1000
broadcast-filter none
dmo-channel-utilization-threshold 90
local-probe-req-thresh 0
max-clients-threshold 64
end
commit apply

To verify the configuration:
(Instant AP)# show calea config
calea-ip :10.0.0.5
encapsulation-type :gre
gre-type :25944
ip mtu : 150
(Instant AP)# show calea statistics
Rt resolve fail : 0
Dst resolve fail: 0
Alloc failure : 0
Fragged packets : 0
Jumbo packets : 263
Total Tx fail : 0
Total Tx ok : 263

274 | Services

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Chapter 20
W-IAP Management and Monitoring

This chapter provides information on W-IAP management and monitoring from:
l

W-AirWave management server

Managing a W-IAP from W-AirWave
W-AirWave is a powerful tool and easy-to-use network operations system that manages Dell wireless, wired, and
remote access networks, as well as wired and wireless infrastructures from a wide range of third-party
manufacturers. With its easy-to-use interface, W-AirWave provides real-time monitoring, proactive alerts, historical
reporting, and fast, efficient troubleshooting. It also offers tools that manage RF coverage, strengthen wireless
security, and demonstrate regulatory compliance.
The W-IAPs communicate with W-AirWave using the HTTPS protocol. This allows a W-AirWave server to be
deployed in the cloud across a NAT device, such as a router. The W-AirWave features available in the Instant
network are described in the following sections.

Image Management
W-AirWave allows you to manage firmware updates on WLAN devices by defining a minimum acceptable firmware
version for each make and model of a device. It remotely distributes the firmware image to the WLAN devices that
require updates, and it schedules the firmware updates such that updating is completed without requiring you to
manually monitor the devices.
The following models can be used to upgrade the firmware:
l

Automatic— In this model, the Virtual Controller periodically checks for newer updates from a configured URL and
automatically initiates upgrade of the network.

l

Manual— In this model, the user can manually start a firmware upgrade for each Virtual Controller or set the
desired firmware preference per group of devices.

W-IAP and Client Monitoring
W-AirWave allows you to find any W-IAP or client on the wireless network and to see real-time monitoring views.
These monitoring views can be used to aggregate critical information and high-end monitoring information.
In the W-AirWave User Interface (UI), you can select either Manage Read/Write or Monitor-only+Firmware
Upgrades as management modes. When the Management level is set to Manage Read/Write, the Instant UI is
in read-only mode. If W-AirWave Management Level is set to Monitor-only+Firmware Upgrades mode, the
Instant UI changes to the read-write mode.

Template-based Configuration
W-AirWave automatically creates a configuration template based on any of the existing W-IAPs, and it applies that
template across the network as shown in the following figure. It audits every device on an ongoing basis to ensure
that configurations never vary from the enterprise policies. It alerts you whenever a violation is detected and
automatically repairs the incorrectly configured devices.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

W-IAP Management and Monitoring | 275

Figure 96 Template-based Configuration

Trending Reports
W-AirWave saves up to 14 months of actionable information, including network performance data and user roaming
patterns, so you can analyze how network usage and performance trends have changed over time. It also provides
detailed capacity reports with which you can plan the capacity and appropriate strategies for your organization.

Intrusion Detection System
W-AirWave provides advanced, rules-based rogue classification. It automatically detects rogue APs irrespective of
their location in the network and prevents authorized W-IAPs from being detected as rogue W-IAPs. It tracks and
correlates the IDS events to provide a complete picture of network security.

Wireless Intrusion Detection System (WIDS) Event Reporting to W-AirWave
W-AirWave supports Wireless Intrusion Detection System (WIDS) Event Reporting, which is provided by Instant.
This includes WIDS classification integration with the RAPIDS (Rogue Access Point Detection Software) module.
RAPIDS is a powerful and easy-to-use tool for automatic detection of unauthorized wireless devices. It supports
multiple methods of rogue detection and uses authorized wireless APs to report other devices within range.
The WIDS report cites the number of IDS events for devices that have experienced the most instances in the prior
24 hours and provides links to support additional analysis or configuration in response.

RF Visualization Support for Instant
W-AirWave supports RF visualization for Instant. The VisualRF module provides a real-time picture of the actual
radio environment of your wireless network and the ability to plan the wireless coverage of new sites. VisualRF uses
sophisticated RF fingerprinting to accurately display coverage patterns and calculate the location of every Instant
device in range. VisualRF provides graphical access to floor plans, client location, and RF visualization for floors,
buildings, and campuses that host your network.

276 | W-IAP Management and Monitoring

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Figure 97 Adding a W-IAP in VisualRF

PSK-based and Certificate-based Authentication
On the DHCP server, two formats for option 43 are supported:
l

,,— If you choose this format, the W-IAP authenticates the W-AirWave
Management Platform server using the Pre-Shared Key (PSK) login process.

l

,— If you choose this format, the W-IAP resolves the W-AirWave domain name
into one or two IP addresses as W-AirWave Primary or W-AirWave Backup, and then W-IAP starts a certificatebased authentication with W-AirWave Management platform server, instead of the PSK login. When the WAirWave Management platform domain name is used, the W-IAP performs certificate-based authentication with
the W-AirWave Management platform server. The W-IAP initiates an SSL connection with the W-AirWave
server. The W-AirWave server verifies the signature and public key certificate from the W-IAP. If the signature
matches, the W-AirWave responds to the W-IAP with the login request.

Configurable Port for W-IAP and W-AirWave Management Server Communication
You can now customize the port number of the W-AirWave management server through the server_host:server_
port format, for example, amp.aruba.com:4343.

Configuring Organization String
The Organization string is a set of colon-separated strings created by the W-AirWave administrator to accurately
represent the deployment of each W-IAP. This string is defined by the installation personnel on the site.
You can use any of the following strings:
l

AMP Role— "Org Admin" (initially disabled)

l

AMP User— "Org Admin" (assigned to the role "Org Admin")

l

Folder— "Org" (under the Top folder in AMP)

l

Configuration Group— "Org"

You can also assign additional strings to create a hierarchy of sub folders under the folder named "Org". For
example:
n

subfolder1 for a folder under the "Org" folder

n

subfolder2 for a folder under subfolder1

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

W-IAP Management and Monitoring | 277

Shared Key
The Shared Secret key is an optional field used by the administrator to manually authorize the first Virtual Controller
for an organization. Any string is acceptable.

Configuring W-AirWave Information
You can configure W-AirWave information using the Instant UI or CLI.
In the Instant UI
1. Click the W-AirWave Set Up Now link in the bottom-middle region of the main window. The System window is
displayed with the W-AirWave parameters in the Admin tab.
Figure 98 Configuring W-AirWave

2. Enter the name of your organization in the Organization name text box. The name defined for organization is
displayed under the Groups tab in the W-AirWave user interface.
3. Enter the IP address or domain name of the W-AirWave server in the AirWave server text box.
4. Enter the IP address or domain name of a backup W-AirWave server in the AirWave backup server text box.
The backup server provides connectivity when the primary server is down. If the W-IAP cannot send data to the
primary server, the Virtual Controller switches to the backup server automatically.
5. Enter the shared key in the Shared key text box and reconfirm. This shared key is used for configuring the first
AP in the Instant network.
6. Click OK.
In the CLI
To configure W-AirWave information in Instant:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# organization 
AP)(config)# ams-ip 
AP)(config)# ams-backup-ip 
AP)(config)# ams-key 
AP)(config)# end
AP)# commit apply

278 | W-IAP Management and Monitoring

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Configuring for W-AirWave Discovery through DHCP
The W-AirWave can be discovered through DHCP server. You can configure this only if W-AirWave was not
configured earlier or if you have deleted the precedent configuration.
On the DHCP server, the format for option 60 is “ InstantAP“, and the two formats for option 43 are
“,,” and “,” .
If you use the ,, format, the PSK-based authentication is used to access the
W-AirWave Management Platform server.
If you use the , format, the W-IAP resolves the domain name into two IP address as
W-AirWave Primary W-AirWave Backup, and then W-IAP starts a certificate-based authentication with W-AirWave
Management platform server, instead of the PSK login.
For option 43, when you choose to enter the domain name, the IP address and key are not available.

Standard DHCP option 60 and 43 on Windows Server 2008
In networks that are not using DHCP option 60 and 43, it is easy to use the standard DHCP options 60 and 43 for an
AP or W-IAP. For APs, these options can be used to indicate the master controller or the local controller. For WIAPs, these options can be used to define the W-AirWave IP, group, password, and domain name.
1. From a server running Windows Server 2008 navigate to Server Manager > Roles >  DHCP
sever >domain DHCP Server > IPv4.
2. Right-click IPv4 and select Set Predefined Options.
Figure 99 Instant and DHCP options for W-AirWave: Set Predefined Options

3. Select DHCP Standard Options in the Option class drop-down list and then click Add.
4. Enter the following information:
n

Name— Instant

n

Data Type— String

n

Code—60

n

Description—Instant AP

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

W-IAP Management and Monitoring | 279

Figure 100 Instant and DHCP options for W-AirWave: Predefined Options and Values

5. Navigate to Server Manager and select Server Options in the IPv4 window. (This sets the value globally. Use
options on a per-scope basis to override the global options.)
6. Right-click Server Options and select the configuration options.

280 | W-IAP Management and Monitoring

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Figure 101 Instant and DHCP options for W-AirWave: Server Options

7. Select 060 Dell Instant AP in the Server Options window and enter DellInstantAP in the String Value.
Figure 102 Instant and DHCP options for W-AirWave—060 W-IAP in Server Options

8. Select 043 Vendor Specific Info and enter a value for either of the following in ASCII field:
l
l

airwave-orgn, airwave-ip, airwave-key; for example: Dell,192.0.2.20, 12344567
airwave-orgn, airwave-domain; for example: Dell, dell.support.com

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

W-IAP Management and Monitoring | 281

Figure 103 Instant and DHCP options for W-AirWave— 043 Vendor Specific Info

This creates a DHCP option 60 and 43 on a global basis. You can do the same on a per-scope basis. The per-scope
option overrides the global option.
Figure 104 Instant and DHCP options for W-AirWave: Scope Options

282 | W-IAP Management and Monitoring

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Alternate Method for Defining Vendor-Specific DHCP Options
This section describes how to add vendor-specific DHCP options for Instant APs in a network that already uses
DHCP options 60 and 43 for other services. Some networks use DHCP standard options 60 and 43 to provide the
DHCP clients information about certain services such as PXE. In such an environment, the standard DHCP options
60 and 43 cannot be used for W-IAPs.
This method describes how to set up a DHCP server to send option 43 with W-AirWave information to the W-IAP.
This section assumes that option 43 is sent per scope, because option 60 is being shared by other devices as well.
The DHCP scope must be specific to Instant, and the PXE devices that use options 60 and 43 must not connect to
the subnet defined by this scope. This is because you can specify only one option 43 for a scope, and if other
devices that use option 43 connect to this subnet, they are presented with the information specific to the W-IAP.
1. In server 2008, navigate to Server Manager > Roles > DHCP Server > Domain DHCP Server > IPv4.
2. Select a scope (subnet). Scope (10.169.145.0)145 is selected in the example shown in the figure below.
3. Right-click and select Advanced, and then specify the following options:
n

Vendor class— DHCP Standard Options

n

User class— Default User Class

n

Available options— Select 043 Vendor-Specific Info

n

String Value— DellInstantAP, tme-store4, 10.169.240.8, Dell123 (which is the AP description, organization
string, W-AirWave IP address or domain name, Pre-shared key, for W-AirWave)

Figure 105 Vendor Specific DHCP options

Upon completion, the W-IAP shows up as a new device in W-AirWave, and a new group called tme-store4 is
created. Navigate to APs/Devices > New > Group to view this group.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

W-IAP Management and Monitoring | 283

Figure 106 W-AirWave — New Group

Figure 107 W-AirWave —Monitor

284 | W-IAP Management and Monitoring

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Chapter 21
Uplink Configuration

This chapter provides the following information:
l

Uplink Interfaces on page 285

l

Ethernet Uplink on page 285

l

Cellular Uplink on page 287

l

Wi-Fi Uplink on page 291

l

Uplink Preferences and Switching on page 292

Uplink Interfaces
Instant network supports Ethernet, 3G and 4G USB modems, and the Wi-Fi uplink to provide access to the corporate
Instant network. The 3G/4G USB modems and the Wi-Fi uplink can be used to extend the connectivity to places
where an Ethernet uplink cannot be configured. It also provides a reliable backup link for the Ethernet based Instant
network.
The following figure illustrates a scenario in which the W-IAPs join the Virtual Controller as slave W-IAPs through a
wired or mesh Wi-Fi uplink:
Figure 108 Uplink Types

The following types of uplinks are supported on Instant:
l

Ethernet Uplink

l

Cellular Uplink

l

Wi-Fi Uplink

Ethernet Uplink
The Ethernet 0 port on a W-IAP is enabled as an uplink port by default. You can view the type of uplink and the status
of the uplink in the Instant in the Info tab on selecting a client.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Uplink Configuration | 285

Figure 109 Uplink Status

Ethernet uplink supports the following types of configuration in this Instant release.
n

PPPoE

n

DHCP

n

Static IP

You can use PPPoE for your uplink connectivity in both W-IAP and IAP-VPN deployments. PPPoE is supported
only in a single AP deployment.
Uplink redundancy with the PPPoE link is not supported.

When the Ethernet link is up, it is used as a PPPoE or DHCP uplink. After the PPPoE settings are configured,
PPPoE has the highest priority for the uplink connections. The W-IAP can establish a PPPoE session with a PPPoE
server at the ISP and get authenticated using Password Authentication Protocol (PAP) or the Challenge Handshake
Authentication Protocol (CHAP). Depending upon the request from the PPPoE server, either the PAP or the CHAP
credentials are used for authentication. After configuring PPPoE, reboot the W-IAP for the configuration to affect.
The PPPoE connection is dialed after the AP comes up. The PPPoE configuration is checked during W-IAP boot
and if the configuration is correct, Ethernet is used for the uplink connection.
When PPPoE is used, do not configure Dynamic RADIUS Proxy and IP address of the Virtual Controller. An SSID
created with default VLAN is not supported with PPPoE uplink.
You can also configure an alternate Ethernet uplink to enable uplink failover when an Ethernet port fails.

Configuring PPPoE Uplink Profile
You can configure PPPOE settings from the Instant UI or CLI.
In the Instant UI
1. Click the System link at the top right corner of the Instant main window. The System window is displayed.
2. Click the Show advanced options link. The advanced options are displayed.
3. In the Uplink tab, perform the following steps in the PPPoE section:
a. Enter the PPPoE service name provided by your service provider in the Service name field.
b. In the CHAP secret and Retype fields, enter the secret key used for Challenge Handshake Authentication
Protocol (CHAP) authentication. You can use a maximum of 34 characters for the CHAP secret key.
c. Enter the user name for the PPPoE connection in the User field.
d. In the Password and Retype fields, enter a password for the PPPoE connection and confirm it.

286 | Uplink Configuration

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

4. To set a local interface for the PPPoE uplink connections, select a value from the Local interface drop-down list.
The selected DHCP scope will be used as a local interface on the PPPoE interface and the Local,L3 DHCP
gateway IP address as its local IP address. When configured, the local interface acts as an unnumbered PPPoE
interface and allows the entire Local,L3 DHCP subnet to be allocated to clients.
The options in the Local interface drop-down list are displayed only if a Local,L3 DHCP scope is configured on the
W-IAP.
5. Click OK.
6. Reboot the W-IAP for the configuration to affect.
In the CLI
To configure a PPPoE uplink connection:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config) # pppoe-uplink-profile
AP)(pppoe-uplink-profile)# pppoe-svcname 
AP)(pppoe-uplink-profile)# pppoe-username 
AP)(pppoe-uplink-profile)# pppoe-passwd 
AP)(pppoe-uplink-profile)# pppoe-chapsecret 
AP)(pppoe-uplink-profile)# pppoe-unnumbered-local-l3-dhcp-profile 
AP)(pppoe-uplink-profile)# end
AP)# commit apply

To view the PPPoE configuration:
(Instant AP)# show pppoe config
PPPoE Configuration
------------------Type Value
---- ----User testUser
Password 3c28ec1b82d3eef0e65371da2f39c4d49803e5b2bc88be0c
Service name internet03
CHAP secret 8e87644deda9364100719e017f88ebce
Unnumbered dhcp profile dhcpProfile1

To view the PPPoE status:
(Instant AP)# show pppoe status
pppoe uplink state:Suppressed.

Cellular Uplink
Instant supports the use of 3G and 4G USB modems to provide the Internet backhaul to an Instant network. The 3G
or 4G USB modems can be used to extend client connectivity to places where an Ethernet uplink cannot be
configured. This enables the W-IAPs to automatically choose the available network in a specific region.
The 3G and 4G LTE USB modems can be provisioned on W-IAP3WN/3WNP, W-IAP108/109, and WIAP155/155P.
The following 3G modems are supported:
l

USBConnect 881 (Sierra 881U)

l

Quicksilver (Globetrotter ICON 322)

l

UM100C (UTstarcom)

l

Icon 452

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Uplink Configuration | 287

l

Aircard 250U (Sierra)

l

USB 598 (Sierra)

l

U300 (Franklin wireless)

l

U301 (Franklin wireless)

l

USB U760 for Virgin (Novatel)

l

USB U720 (Novatel/Qualcomm)

l

UM175 (Pantech)

l

UM150 (Pantech)

l

UMW190(Pantech)

l

SXC-1080 (Qualcomm)

l

Globetrotter ICON 225

l

UMG181

l

NTT DoCoMo L-05A (LG FOMA L05A)

l

NTT DoCoMo L-02A

l

ZTE WCDMA Technologies MSM (MF668?)

l

Fivespot (ZTE)

l

c-motech CNU-600

l

ZTE AC2736

l

SEC-8089 (EpiValley)

l

Nokia CS-10

l

NTT DoCoMo L-08C (LG)

l

NTT DoCoMo L-02C (LG)

l

Novatel MC545

l

Huawei E220 for Movistar in Spain

l

Huawei E180 for Movistar in Spain

l

ZTE-MF820

l

Huawei E173s-1

l

Sierra 320

l

Longcheer WM72

l

U600 (3G mode)

l

Sierra USB-306 (HK CLS/1010 (HK))

l

Sierra 306/308 (Telstra (Aus))

l

Sierra 503 PCIe (Telstra (Aus))

l

Sierra 312 (Telstra (Aus))

l

Aircard USB 308 (AT&T's Shockwave)

l

Compass 597(Sierra) (Sprint)

l

U597 (Sierra) (Verizon)

l

Tstick C597(Sierra) (Telecom(NZ))

l

Ovation U727 (Novatel) (Sprint)

l

USB U727 (Novatel) (Verizon)

l

USB U760 (Novatel) (Sprint)

l

USB U760 (Novatel) (Verizon)

288 | Uplink Configuration

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

l

Novatel MiFi 2200 (Verizon Mifi 2200)

l

Huawei E272, E170, E220 (ATT)

l

Huawei E169, E180,E220,E272 (Vodafone/SmarTone (HK))

l

Huawei E160 (O2(UK))

l

Huawei E160 (SFR (France))

l

Huawei E220 (NZ and JP)

l

Huawei E176G (Telstra (Aus))

l

Huawei E1553, E176 (3/HUTCH (Aus))

l

Huawei K4505 (Vodafone/SmarTone (HK))

l

Huawei K4505 (Vodafone (UK))

l

ZTE MF656 (Netcom (norway))

l

ZTE MF636 (HK CSL/1010)

l

ZTE MF633/MF636 (Telstra (Aus))

l

ZTE MF637 (Orange in Israel)

l

Huawei E180, E1692,E1762 (Optus (Aus))

l

Huawei E1731 (Airtel-3G (India))

l

Huawei E3765 (Vodafone (Aus))

l

Huawei E3765 (T-Mobile (Germany)

l

Huawei E1552 (SingTel)

l

Huawei E1750 (T-Mobile (Germany))

l

UGM 1831 (TMobile)

l

Huawei D33HW (EMOBILE(Japan))

l

Huawei GD01 (EMOBILE(Japan))

l

Huawei EC150 (Reliance NetConnect+ (India))

l

KDDI DATA07(Huawei) (KDDI (Japan))

l

Huawei E353 (China Unicom)

l

Huawei EC167 (China Telecom)

l

Huawei E367 (Vodafone (UK))

l

Huawei E352s-5 (T-Mobile (Germany))

l

Huawei K4505 (Vodafone/SmarTone (HK))

l

Huawei K4505 (Vodafone (UK))

l

ZTE MF656 (Netcom (norway))

l

ZTE MF636 (HK CSL/1010)

l

ZTE MF633/MF636 (Telstra (Aus))

l

ZTE MF637 (Orange in Israel)

l

Huawei E180, E1692,E1762 (Optus (Aus))

l

Huawei E1731 (Airtel-3G (India))

l

Huawei E3765 (Vodafone (Aus))

l

Huawei E3765 (T-Mobile (Germany)

l

Huawei E1552 (SingTel)

l

Huawei E1750 (T-Mobile (Germany))

l

UGM 1831 (TMobile)

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Uplink Configuration | 289

l

Huawei D33HW (EMOBILE(Japan))

l

Huawei GD01 (EMOBILE(Japan))

l

Huawei EC150 (Reliance NetConnect+ (India))

l

KDDI DATA07(Huawei) (KDDI (Japan))

l

Huawei E353 (China Unicom)

l

Huawei EC167 (China Telecom)

l

Huawei E367 (Vodafone (UK))

l

Huawei E352s-5 (T-Mobile (Germany))

l

Huawei D41HW

l

ZTE AC2726

The following table lists the supported 4G modems.
l

Netgear U340

l

Netgear Aircard 341u

l

Fraklin Wireless u770

l

Huawei 3276s-150

l

MC551L

l

Pantech UML295

l

Pantech UML290

In the 6.4.0.2-4.1 release, all modems are detected automatically by the W-IAP.
When UML290 runs in auto detect mode, the modem can switch from 4G network to 3G network or vice-versa
based on the signal strength. To configure the UML290 for the 3G network only, manually set the USB type to
pantech-3g. To configure the UML290 for the 4G network only, manually set the 4G USB type to pantech-lte.

Configuring Cellular Uplink Profiles
You can configure 3G or 4G uplinks using the Instant UI or CLI.
In the Instant UI
1. Click the System link at the upper right corner of the Instant main window. The System window is displayed.
2. In the System window, click the show advanced settings link. The advanced options are displayed.
3. Click the Uplink tab.
4. To configure a 3G or 4G uplink manually, select the Country and ISP.
5. Click OK.
6. Reboot the W-IAP for changes to affect.
In the CLI
To configure 3G/4G uplink manually:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config) # cellular-uplink-profile
AP)(cellular-uplink-profile)# usb-type <3G-usb-type>
AP)(cellular-uplink-profile)# 4g-usb-type <4g-usb>
AP)(cellular-uplink-profile)# modem-country 
AP)(cellular-uplink-profile)# modem-isp 
AP)(cellular-uplink-profile)# usb-auth-type 
AP)(cellular-uplink-profile)# usb-user 
AP)(cellular-uplink-profile)# usb-passwd 
AP)(cellular-uplink-profile)# usb-dev 
AP)(cellular-uplink-profile)# usb-tty 
AP)(cellular-uplink-profile)# usb-init 

290 | Uplink Configuration

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

(Instant
(Instant
(Instant
(Instant

AP)(cellular-uplink-profile)# usb-dial 
AP)(cellular-uplink-profile)# usb-modeswitch 
AP)(cellular-uplink-profile)# end
AP)# commit apply

To switch a modem from the storage mode to modem mode:
(Instant AP)(config)# cellular-uplink-profile
(Instant AP)(cellular-uplink-profile)# usb-modeswitch 

To view the cellular configuration:
(Instant AP)# show cellular config

Wi-Fi Uplink
The Wi-Fi uplink is supported for all the W-IAP models, but only the master W-IAP uses this uplink. The Wi-Fi allows
uplink to open, PSK-CCMP, and PSK-TKIP SSIDs.
l

For single radio W-IAPs, the radio serves wireless clients and the Wi-Fi uplink.

l

For dual radio W-IAPs, both radios can be used to serve clients but only one of them can be used for the Wi-Fi
uplink.

When the Wi-Fi uplink is in use, the client IP is assigned by the internal DHCP server.

Configuring a Wi-Fi Uplink Profile
The following configuration conditions apply to the Wi-Fi uplink:
l

To bind or unbind the Wi-Fi uplink on the 5 GHz band, reboot the W-IAP.

l

If the Wi-Fi uplink is used on the 5 GHz band, mesh is disabled. The two links are mutually exclusive.

l

For W-IAPs to connect to an ArubaOS based WLAN using Wi-Fi uplink, the controller must run ArubaOS 6.2.1.0
or later.

To provision a with the Wi-Fi Uplink, complete the following steps:
1. If you are configuring a Wi-Fi uplink after restoring factory settings on a W-IAP, connect the W-IAP to an Ethernet
cable to allow the W-IAP to get the IP address. Otherwise, go to step 2.
2. Click the System link at the top right corner of the Instant main window. The System window is displayed.
3. Click the Show advanced options link. The advanced options are displayed.
4. Click the Uplink tab.
5. Under Wi-Fi, enter the name of the wireless network that is used for the Wi-Fi uplink in the Name (SSID) text
box.
6. Select the type of key for uplink encryption and authentication from the Key management drop-down list. If the
uplink wireless router uses mixed encryption, WPA-2 is recommended for the Wi-Fi uplink.
7. From the band drop-down list. Select the band in which the Virtual Controller currently operates. The following
options are available:
l

2.4 GHz (default)

l

5 GHz

8. Select a passphrase format from the Passphrase format drop-down list. The following options are available:
l

8 - 63 alphanumeric characters

l

64 hexadecimal characters

Ensure that the hexadecimal password string is exactly 64 digits in length.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Uplink Configuration | 291

9. Enter a pre-shared key (PSK) passphrase in the Passphrase text box and click OK.
You can view the W-Fi configuration and uplink status in the CLI. To view the configuration status in the CLI:
(Instant AP)# show wifi-uplink status
configured :NO
(Instant AP)# show wifi-uplink config
ESSID :
Cipher Suite :
Passphrase :
Band :
(Instant AP)# show wifi-uplink auth log
---------------------------------------------------------------------wifi uplink auth configuration:
------------------------------------------------------------------------------------------------------------------------------------------wifi uplink auth log:
---------------------------------------------------------------------[1116]2000-01-01 00:00:45.625: Global control interface '/tmp/supp_gbl'

Uplink Preferences and Switching
This topic describes the following procedures:
l

Enforcing Uplinks on page 292

l

Setting an Uplink Priority on page 293

l

Enabling Uplink Preemption on page 293

l

Switching Uplinks Based on VPN and Internet Availability on page 294

l

Viewing Uplink Status and Configuration on page 295

Enforcing Uplinks
The following configuration conditions apply to the uplink enforcement:
l

When an uplink is enforced, the W-IAP uses the specified uplink regardless of uplink preemption configuration
and the current uplink status.

l

When an uplink is enforced and multiple Ethernet ports are configured and uplink is enabled on the wired profiles,
the W-IAP tries to find an alternate Ethernet link based on the priority configured.

l

When no uplink is enforced and preemption is not enabled, and if the current uplink fails, the W-IAP tries to find an
available uplink based on the priority configured.

l

When no uplink is enforced and preemption is enabled, and if the current uplink fails, the W-IAP tries to find an
available uplink based on the priority configured. If current uplink is active, the W-IAP periodically tries to use a
higher priority uplink and switches to the higher priority uplink even if the current uplink is active.

You can enforce a specific uplink on a W-IAP by using the Instant UI or CLI.
In the Instant UI
To enforce an uplink:
1. Click the System > show advanced settings > Uplink. The Uplink tab contents are displayed.
2. Under Uplink Management, select the type of uplink from the Enforce Uplink drop-down list. If Ethernet uplink
is selected, the Port field is displayed.
3. Specify the Ethernet interface port number.

292 | Uplink Configuration

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

4. Click OK. The selected uplink is enforced on the W-IAP.
In the CLI
To enforce an uplink:
(Instant
(Instant
(Instant
(Instant

AP)(config)# uplink
AP)(uplink)# enforce {cellular|ethernet|wifi|none}
AP)(uplink)# end
AP)# commit apply

Setting an Uplink Priority
You can set an uplink priority by using the Instant UI or CLI.
In the Instant UI
1. Click the System > show advanced settings > Uplink. The Uplink tab contents are displayed.
2. Under Uplink Priority List, select the uplink, and click the icons at the bottom of the Uplink Priority List section,
to increase or decrease the priority. By default, the Eth0 uplink is set as a high priority uplink.
3. Click OK. The selected uplink is prioritized over other uplinks.
In the CLI
To set an uplink priority:
(Instant AP)(config)# uplink
(Instant AP)(uplink)# uplink-priority {cellular  | ethernet |[port
 ]|wifi }
(Instant AP)(uplink)# end
(Instant AP)# commit apply

For example, to set a priority for Ethernet uplink:
(Instant AP)(uplink)# uplink-priority ethernet port 0 1
(Instant AP)(uplink)# end
(Instant AP)# commit apply

Enabling Uplink Preemption
The following configuration conditions apply to uplink preemption:
l

Preemption can be enabled only when no uplink is enforced.

l

When preemption is disabled and the current uplink goes down, the W-IAP tries to find an available uplink based
on the uplink priority configuration.

l

When preemption is enabled and if the current uplink is active, the W-IAP periodically tries to use a higher priority
uplink, and switches to a higher priority uplink even if the current uplink is active.

You can enable uplink preemption using Instant UI or CLI.
In the Instant UI
1. Click the System > show advanced settings > Uplink. The Uplink tab contents are displayed.
2. Under Uplink Management, ensure that the Enforce Uplink is set to none.
3. Select Enabled from the Pre-emption drop-down list.
4. Click OK.
In the CLI
To enable uplink preemption:
(Instant AP)(config)# uplink
(Instant AP)(uplink)# preemption

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Uplink Configuration | 293

(Instant AP)(uplink)# end
(Instant AP)# commit apply

Switching Uplinks Based on VPN and Internet Availability
The default priority for uplink switchover is Ethernet and then 3G/4G. The W-IAP can switch to the lower priority
uplink if the current uplink is down.

Switching Uplinks Based on VPN Status
Instant supports switching uplinks based on the VPN status when deploying multiple uplinks (Ethernet, 3G/4G, and
Wi-Fi). When VPN is used with multiple backhaul options, the W-IAP switches to an uplink connection based on the
VPN connection status, instead of only using the Ethernet or the physical backhaul link.
The following configuration conditions apply to uplink switching:
l

If the current uplink is Ethernet and the VPN connection is down, the W-IAP tries to reconnect to VPN. The retry
time depends on the fast failover configuration and the primary or backup VPN tunnel. If this fails, the W-IAP
waits for the VPN failover timeout and selects a different uplink such as 3G/4G or Wi-Fi.

l

If the current uplink is 3G or Wi-Fi, and Ethernet has a physical link, the W-IAP periodically suspends user traffic
to try and connect to the VPN on the Ethernet. If the W-IAP succeeds, the W-IAP switches to Ethernet. If the WIAP does not succeed, it restores the VPN connection to the current uplink.

Uplink switching based on VPN status is automatically enabled if VPN is configured on the W-IAP. However, you
can specify the duration in VPN failover timeout field to wait for an uplink switch. By default, this duration is set to
180 seconds. The W-IAP monitors the VPN status and when the VPN connection is not available for 3 minutes, the
uplink switches to another available connection (if a low priority uplink is detected and the uplink preference is set to
none). When VPN failover timeout is set to 0, uplink does not switch over.
When uplink switching based on the Internet availability is enabled, the uplink switching based on VPN failover is
automatically disabled.

Switching Uplinks Based on Internet Availability
You can configure Instant to switch uplinks based on Internet availability.
When the uplink switchover based on Internet availability is enabled, the W-IAP continuously sends ICMP packets
to some well-known Internet servers. If the request is timed out due to a bad uplink connection or uplink interface
failure, and the public Internet is not reachable from the current uplink, the W-IAP switches to a different connection.
You can set preferences for uplink switching using the Instant UI and CLI.
In the Instant UI
To configure uplink switching:
1. Click the System > show advanced settings > Uplink. The Uplink tab contents are displayed.
2. Under Uplink Management, configure the following parameters:
l

VPN failover timeout — To configure uplink switching based on VPN status, specify the duration to wait for
an uplink switch. The default duration is set to 180 seconds.

l

Internet failover — To configure uplink switching based on Internet availability, perform the following steps:
a. Select Enabled from the Internet failover drop-down list.
b. Specify the required values for the following fields:
n

294 | Uplink Configuration

Max allowed test packet loss— The maximum number of ICMP test packets that are
allowed to be lost to determine if the W-IAP must switch to a different uplink connection.
You can specify a value within the range of 1—1000.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

n

Secs between test packets— The frequency at which ICMP test packets are sent.You can
specify a value within the range of 1—3600 seconds.

n

Internet check time— Internet check timeout is the duration for the test packet timeout. You
can specify a value within the range of 0—3600 seconds and the default value is 10 seconds.

c. Click OK.
When Internet failover is enabled, the W-IAP ignores the VPN status, although uplink switching based on VPN
status is enabled.
In the CLI
To enable uplink switching based on VPN status:
(Instant
(Instant
(Instant
(Instant

AP)(config)# uplink
AP)(uplink)# failover-vpn-timeout 
AP)(uplink)# end
AP)# commit apply

To enable uplink switching based on Internet availability:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# uplink
AP)(uplink)# failover-internet
AP)(uplink)# failover-internet-pkt-lost-cnt 
AP)(uplink)# failover-internet-pkt-send-freq 
AP)(uplink)# end
AP)# commit apply

Viewing Uplink Status and Configuration
To view the uplink status and configuration in the CLI:
Instant Access Point# show uplink status
Uplink preemption :enable
Uplink enforce :none
Ethernet uplink bond0 :DHCP
Uplink Table
-----------Type State Priority In Use
---- ----- -------- -----eth0 UP 0 Yes
Wifi-sta LOAD 6 No
3G/4G INIT 7 No
Internet failover :disable
Max allowed test packet loss:10
Secs between test packets :30
VPN failover timeout (secs) :180
ICMP pkt sent :0
ICMP pkt lost :0
Continuous pkt lost :0
VPN down time :0
Instant Access Point# show uplink config
Uplink preemption :enable
Uplink enforce :none
Ethernet uplink bond0 :DHCP
Internet failover :disable
Max allowed test packet loss:10
Secs between test packets :30
VPN failover timeout (secs) :180

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Uplink Configuration | 295

Chapter 22
Intrusion Detection

The Intrusion Detection System (IDS) is a feature that monitors the network for the presence of unauthorized WIAPs and clients. It also logs information about the unauthorized W-IAPs and clients, and generates reports based
on the logged information.
The IDS feature in the Instant network enables you to detect rogue APs, interfering APs, and other devices that can
potentially disrupt network operations.
This chapter describes the following procedures:
l

Detecting and Classifying Rogue APs on page 296

l

OS Fingerprinting on page 296

l

Configuring Wireless Intrusion Protection and Detection Levels on page 297

l

Configuring IDS Using CLI on page 301

Detecting and Classifying Rogue APs
A rogue AP is an unauthorized AP plugged into the wired side of the network.
An interfering AP is an AP seen in the RF environment but it is not connected to the wired network. While the
interfering AP can potentially cause RF interference, it is not considered a direct security threat, because it is not
connected to the wired network. However, an interfering AP may be reclassified as a rogue AP.
To detect the rogue APs, click the IDS link in the Instant main window. The built-in IDS scans for access points that
are not controlled by the Virtual Controller. These are listed and classified as either Interfering or Rogue, depending
on whether they are on a foreign network or your network.
Figure 110 Intrusion Detection

OS Fingerprinting
The OS Fingerprinting feature gathers information about the client that is connected to the Instant network to find the
operating system that the client is running on. The following is a list of advantages of this feature:
l

Identifying rogue clients— Helps to identify clients that are running on forbidden operating systems.

l

Identifying outdated operating systems— Helps to locate outdated and unexpected OS in the company network.

l

Locating and patching vulnerable operating systems— Assists in locating and patching specific operating system
versions on the network that have known vulnerabilities, thereby securing the company network.

OS Fingerprinting is enabled in the Instant network by default. The following operating systems are identified by
Instant:
l

Windows 7

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Intrusion Detection | 296

l

Windows Vista

l

Windows Server

l

Windows XP

l

Windows ME

l

OS-X

l

iPhone

l

iOS

l

Android

l

Blackberry

l

Linux

Configuring Wireless Intrusion Protection and Detection Levels
WIP offers a wide selection of intrusion detection and protection features to protect the network against wireless
threats.
Like most other security-related features of the Instant network, the WIP can be configured on the W-IAP.
You can configure the following options:
l

Infrastructure Detection Policies— Specifies the policy for detecting wireless attacks on access points.

l

Client Detection Policies— Specifies the policy for detecting wireless attacks on clients.

l

Infrastructure Protection Policies— Specifies the policy for protecting access points from wireless attacks.

l

Client Protection Policies— Specifies the policy for protecting clients from wireless attacks.

l

Containment Methods— Prevents unauthorized stations from connecting to your Instant network.

Each of these options contains several default levels that enable different sets of policies. An administrator can
customize enable or disable these options accordingly.
The detection levels can be configured using the IDS window. To view the IDS window, click More > IDS link at the
top right corner of the Instant main window. The following levels of detection can be configured in the WIP Detection
page:
l

Off

l

Low

l

Medium

l

High

297 | Intrusion Detection

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Figure 111 Wireless Intrusion Detection

The following table describes the detection policies enabled in the Infrastructure Detection Custom settings field.
Table 55: Infrastructure Detection Policies
Detection Level

Detection Policy

Off

Rogue Classification

Low

l
l
l
l

Medium

l

l

High

l
l
l
l
l
l
l
l
l
l
l
l

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Detect AP Spoofing
Detect Windows Bridge
IDS Signature— Deauthentication Broadcast
IDS Signature— Deassociation Broadcast
Detect Adhoc networks using VALID SSID— Valid
SSID list is auto-configured based on Instant AP
configuration
Detect Malformed Frame— Large Duration
Detect AP Impersonation
Detect Adhoc Networks
Detect Valid SSID Misuse
Detect Wireless Bridge
Detect 802.11 40MHz intolerance settings
Detect Active 802.11n Greenfield Mode
Detect AP Flood Attack
Detect Client Flood Attack
Detect Bad WEP
Detect CTS Rate Anomaly
Detect RTS Rate Anomaly
Detect Invalid Address Combination

Intrusion Detection | 298

Table 55: Infrastructure Detection Policies
Detection Level

Detection Policy
l
l
l
l
l
l
l

Detect Malformed Frame— HT IE
Detect Malformed Frame— Association Request
Detect Malformed Frame— Auth
Detect Overflow IE
Detect Overflow EAPOL Key
Detect Beacon Wrong Channel
Detect devices with invalid MAC OUI

The following table describes the detection policies enabled in the Client Detection Custom settings field.
Table 56: Client Detection Policies
Detection Level

Detection Policy

Off

All detection policies are disabled.

Low

l

Detect Valid Station Misassociation

Medium

l

Detect Disconnect Station Attack
Detect Omerta Attack
Detect FATA-Jack Attack
Detect Block ACK DOS
Detect Hotspotter Attack
Detect unencrypted Valid Client
Detect Power Save DOS Attack

l
l
l
l
l
l

High

l
l
l
l
l
l

Detect EAP Rate Anomaly
Detect Rate Anomaly
Detect Chop Chop Attack
Detect TKIP Replay Attack
IDS Signature— Air Jack
IDS Signature— ASLEAP

The following levels of detection can be configured in the WIP Protection page:
l

Off

l

Low

l

High

299 | Intrusion Detection

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Figure 112 Wireless Intrusion Protection

The following table describes the protection policies that are enabled in the Infrastructure Protection Custom
settings field.
Table 57: Infrastructure Protection Policies
Protection Level

Protection Policy

Off

All protection policies are disabled

Low

l
l

High

l
l

Protect SSID – Valid SSID list should be auto
derived from Instant configuration
Rogue Containment
Protect from Adhoc Networks
Protect AP Impersonation

The following table describes the detection policies that are enabled in the Client Protection Custom settings field.
Table 58: Client Protection Policies
Protection Level

Protection Policy

Off

All protection policies are disabled

Low

Protect Valid Station

High

Protect Windows Bridge

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Intrusion Detection | 300

Containment Methods
You can enable wired and wireless containments to prevent unauthorized stations from connecting to your Instant
network.
Instant supports the following types of containment mechanisms:
l

Wired containment— When enabled, W-IAPs generate ARP packets on the wired network to contain wireless
attacks.

l

Wireless containment— When enabled, the system attempts to disconnect all clients that are connected or
attempting to connect to the identified Access Point.
n

None— Disables all the containment mechanisms.

n

Deauthenticate only— With deauthentication containment, the Access Point or client is contained by
disrupting the client association on the wireless interface.

n

Tarpit containment— With Tarpit containment, the Access Point is contained by luring clients that are
attempting to associate with it to a tarpit. The tarpit can be on the same channel or a different channel as the
Access Point being contained.

Figure 113 Containment Methods

Configuring IDS Using CLI
To configure IDS using CLI:
(Instant
(Instant
(Instant
(Instant
(Instant

301 | Intrusion Detection

AP)(config)# ids
AP)(IDS)# infrastructure-detection-level 
AP)(IDS)# client-detection-level 
AP)(IDS)# infrastructure-protection-level 
AP)(IDS)# client-protection-level 

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(IDS)# wireless-containment 
AP)(IDS)# wired-containment
AP)(IDS)# detect-ap-spoofing
AP)(IDS)# detect-windows-bridge
AP)(IDS)# signature-deauth-broadcast
AP)(IDS)# signature-deassociation-broadcast
AP)(IDS)# detect-adhoc-using-valid-ssid
AP)(IDS)# detect-malformed-large-duration
AP)(IDS)# detect-ap-impersonation
AP)(IDS)# detect-adhoc-network
AP)(IDS)# detect-valid-ssid-misuse
AP)(IDS)# detect-wireless-bridge
AP)(IDS)# detect-ht-40mhz-intolerance
AP)(IDS)# detect-ht-greenfield
AP)(IDS)# detect-ap-flood
AP)(IDS)# detect-client-flood
AP)(IDS)# detect-bad-wep
AP)(IDS)# detect-cts-rate-anomaly
AP)(IDS)# detect-rts-rate-anomaly
AP)(IDS)# detect-invalid-addresscombination
AP)(IDS)# detect-malformed-htie
AP)(IDS)# detect-malformed-assoc-req
AP)(IDS)# detect-malformed-frame-auth
AP)(IDS)# detect-overflow-ie
AP)(IDS)# detect-overflow-eapol-key
AP)(IDS)# detect-beacon-wrong-channel
AP)(IDS)# detect-invalid-mac-oui
AP)(IDS)# detect-valid-clientmisassociation
AP)(IDS)# detect-disconnect-sta
AP)(IDS)# detect-omerta-attack
AP)(IDS)# detect-fatajack
AP)(IDS)# detect-block-ack-attack
AP)(IDS)# detect-hotspotter-attack
AP)(IDS)# detect-unencrypted-valid
AP)(IDS)# detect-power-save-dos-attack
AP)(IDS)# detect-eap-rate-anomaly
AP)(IDS)# detect-rate-anomalies
AP)(IDS)# detect-chopchop-attack
AP)(IDS)# detect-tkip-replay-attack
AP)(IDS)# signature-airjack
AP)(IDS)# signature-asleap
AP)(IDS)# protect-ssid
AP)(IDS)# rogue-containment
AP)(IDS)# protect-adhoc-network
AP)(IDS)# protect-ap-impersonation
AP)(IDS)# protect-valid-sta
AP)(IDS)# protect-windows-bridge
AP)(IDS)# end
AP)# commit apply

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Intrusion Detection | 302

Chapter 23
Mesh W-IAP Configuration

This chapter provides the following information:
l

Mesh Network Overview on page 303

l

Setting up Instant Mesh Network on page 304

l

Configuring Wired Bridging on Ethernet 0 for Mesh Point on page 304

Mesh Network Overview
The Dell Instant secure enterprise mesh solution is an effective way to expand network coverage for outdoor and
indoor enterprise environments without any wires. As traffic traverses across mesh W-IAPs, the mesh network
automatically reconfigures around broken or blocked paths. This self-healing feature provides increased reliability
and redundancy and allows the network to continue operation even when a W-IAP stops functioning or if a
connection fails.

Mesh W-IAPs
Mesh network requires at least one valid uplink (wired or 3G) connection. Any provisioned W-IAP that has a valid
uplink (wired or 3G) functions as a mesh portal, and the W-IAP without an Ethernet link functions as a mesh point.
The mesh portal can also act as a Virtual Controller. Mesh portals and mesh points are also known as mesh nodes, a
generic term used to describe W-IAPs configured for mesh.
If two W-IAPs have valid uplink connections, there is redundancy in the mesh network, and most mesh points try to
mesh directly with one of the two portals. However, depending on the actual deployment and RF environment, some
mesh points may mesh through other intermediate mesh points.
In a Instant mesh network, the maximum hop count is two nodes (point >point >portal) and the maximum number of
mesh points per mesh portal is eight.
Mesh W-IAPs detect the environment when they boot up, locate and associate with their nearest neighbor, to
determine the best path to the mesh portal.
Instant mesh functionality is supported only on dual radio W-IAPs only. On dual-radio W-IAPs, the 5 GHz radio is
always used for both mesh-backhaul and client traffic, while the 2.4 GHz radio is always used for client traffic.
Mesh service is automatically enabled on 802.11a band for dual-radio W-IAP only, and this is not configurable.

For W-IAP-RW variants, the mesh network must be provisioned for the first time by plugging into the wired network.
After that, mesh works on W-IAP-RWs like any other regulatory domain.

Mesh Portals
A mesh portal (MPP) is a gateway between the wireless mesh network and the enterprise wired LAN. The mesh
roles are automatically assigned based on the W-IAP configuration. A mesh network could have multiple mesh
portals to support redundant mesh paths (mesh links between neighboring mesh points that establish the best path
to the mesh portal) from the wireless mesh network to the wired LAN.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Mesh W-IAP Configuration | 303

The mesh portal broadcasts a mesh services set identifier (MSSID/ mesh cluster name) to advertise the mesh
network service to other mesh points in that Instant network. This is not configurable and is transparent to the user.
The mesh points authenticate to the mesh portal and establish a link that is secured using Advanced Encryption
Standard (AES) encryption.
The mesh portal reboots after 5 minutes when it loses its uplink connectivity to a wired network.

Mesh Points
The mesh point establishes an all-wireless path to the mesh portal. The mesh point provides traditional WLAN
services such as client connectivity, intrusion detection system (IDS) capabilities, user role association, and Quality
of Service (QoS) for LAN-to-mesh communication to clients and performs mesh backhaul/network connectivity.
Mesh point also supports LAN bridging. You can connect any wired device to the downlink port of the mesh point. In
the case of single Ethernet port platforms such as AP-93 and AP-105, you can convert the Eth0 uplink port to a
downlink port by enabling Eth0 Bridging. For additional information, see Configuring Wired Bridging on Ethernet 0 for
Mesh Point on page 304.

Setting up Instant Mesh Network
Starting from Instant 6.4.0.2-4.1 release, mesh functionality is disabled by default, because of which over-the-air
provisioning of mesh W-IAPs is not supported.
To provision W-IAPs as mesh W-IAPs:
1. Connect the W-IAPs to a wired switch.
2. Ensure that the Virtual Controller key is synchronized and the country code is configured.
3. Ensure that a valid SSID is configured on the W-IAP.
4. If the IAP has a factory default SSID (instant SSID), delete the SSID.
5. If an extended SSID is enabled on the virtual controller, disable it and reboot the W-IAP cluster.
6. Disconnect the W-IAPs that you want to deploy as mesh points from the switch and place the W-IAPs at a
remote location. The W-IAPs power on without any wired uplink connection and function as mesh points and the
W-IAPs with valid uplink connections function as the mesh portal.
Instant does not support the topology in which the W-IAPs are connected to the downlink ethernet port of a mesh
point.

Configuring Wired Bridging on Ethernet 0 for Mesh Point
Instant supports wired bridging on the Ethernet 0 port of a W-IAP. If W-IAP is configured to function as a mesh point,
you can configure wired bridging.
Enabling wired bridging on this port of a W-IAP makes the port available as a downlink wired bridge and allows
client access through the port.

When using 3G uplink, the wired port will be used as downlink.

You can configure support for wired bridging on the Ethernet 0 port of a W-IAP using the Instant UI or CLI.

304 | Mesh W-IAP Configuration

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

In the Instant UI
To configure Ethernet bridging:
1. In the Access Points tab, click the W-IAP to modify. The edit link is displayed.
2. Click the edit link. The edit window for modifying W-IAP details is displayed.
3. Click the Uplink tab.
4. Select Enable from the Eth0 Bridging drop-down list.
5. Click OK.
6. Reboot the W-IAP.

In the CLI
To configure Ethernet bridging:
Instant Access Point# enet0-bridging

Make the necessary changes to the wired-profile when eth0 is used as the downlink port. For more information, see
the Configuring a Wired Profile on page 112

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Mesh W-IAP Configuration | 305

Chapter 24
Mobility and Client Management

This chapter provides the following information:
l

Layer-3 Mobility Overview on page 306

l

Configuring L3-Mobility on page 307

Layer-3 Mobility Overview
W-IAPs form a single Instant network when they are in the same Layer-2 (L2) domain. As the number of clients
increase, multiple subnets are required to avoid broadcast overhead. In such a scenario, a client must be allowed to
roam away from the Instant network to which it first connected (home network) to another network supporting the
same WLAN access parameters (foreign network) and continue its existing sessions.
Layer-3 (L3) mobility allows a client to roam without losing its IP address and sessions. If WLAN access parameters
are the same across these networks, clients connected to W-IAPs in a given Instant network can roam to APs in a
foreign Instant network and continue their existing sessions. Clients roaming across these networks are able to
continue using their IP addresses after roaming. You can configure a list of Virtual Controller IP addresses across
which L3 mobility is supported.
The Dell Networking W-Series Instant Layer-3 mobility solution defines a Mobility Domain as a set of Instant
networks, with the same WLAN access parameters, across which client roaming is supported. The Instant network
to which the client first connects is called its home network. When the client roams to a foreign network, an AP in the
home network (home AP) anchors all traffic to or from this client. The AP to which the client is connected in the
foreign network (foreign AP) tunnels all client traffic to or from the home AP through a GRE tunnel.
Figure 114 Routing of traffic when the client is away from its home network

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Mobility and Client Management | 306

When a client first connects to an Instant network, a message is sent to all configured Virtual Controller IP
addresses to see if this is an L3 roamed client. On receiving an acknowledgement from any of the configured Virtual
Controller IP addresses, the client is identified as an L3 roamed client. If the AP has no GRE tunnel to this home
network, a new tunnel is formed to an AP (home AP) from the client's home network.
Each foreign AP has only one home AP per Instant network to avoid duplication of broadcast traffic. Separate GRE
tunnels are created for each foreign AP / home AP pair. If a peer AP is a foreign AP for one client and a home AP for
another, two separate GRE tunnels are used to handle L3 roaming traffic between these APs.
If client subnet discovery fails on association due to some reason, the foreign AP identifies its subnet when it sends
out the first L3 packet. If the subnet is not a local subnet and belongs to another Instant network, the client is treated
as an L3 roamed client and all its traffic is forwarded to the home network through a GRE tunnel.

Configuring L3-Mobility
To configure a mobility domain, you have to specify the list of all Instant networks that form the mobility domain. To
allow clients to roam seamlessly among all the APs, specify the Virtual Controller IP for each foreign subnet. You
may include the local Instant or Virtual Controller IP address, so that the same configuration can be used across all
Instant networks in the mobility domain.
It is recommended that you configure all client subnets in the mobility domain. When client subnets are configured:
l

If a client is from a local subnet, it is identified as a local client. When a local client starts using the IP address,
the L3 roaming is terminated.

l

If the client is from a foreign subnet, it is identified as a foreign client. When a foreign client starts using the IP
address, the L3 roaming is set up.

Home Agent Load Balancing
Home Agent Load Balancing is required in large networks where multiple tunnels might terminate on a single border
or lobby AP and overload it. When load balancing is enabled, the Virtual Controller assigns the home AP for roamed
clients by using a round robin policy. With this policy, the load for the APs acting as Home Agents for roamed clients
is uniformly distributed across the W-IAP cluster.

Configuring a Mobility Domain for Instant
You can configure L3 mobility domain by using the Instant UI or CLI.

In the Instant UI
To configure a mobility domain, perform the following steps:
1. Click the System link at top right corner of the Instant main window. The System window is displayed.
2. Click the Show advanced options link. The advanced options are displayed.
3. Click L3 Mobility. The L3 Mobility window is displayed.

307 | Mobility and Client Management

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Figure 115 L3 Mobility Window

4. Select Enabled from the Home agent load balancing drop-down list. By default, home agent load balancing is
disabled.
5. Click New in the Virtual Controller IP Addresses section, add the IP address of a Virtual Controller that is part
of the mobility domain, and click OK.
6. Repeat Step 2 to add the IP addresses of all Virtual Controllers that form the L3 mobility domain.
7. Click New in the Subnets section and specify the following:
a. Enter the client subnet in the IP address text box.
b. Enter the mask in the Subnet mask text box.
c. Enter the VLAN ID in the home network in the VLAN ID text box.
d. Enter the home VC IP address for this subnet in the Virtual Controller IP text box.
8. Click OK.

In the CLI
To configure a mobility domain:
(Instant
(Instant
(Instant
(Instant
address>
(Instant
(Instant

AP)(config)# l3-mobility
AP)(L3-mobility)# home-agent-load-balancing
AP)(L3-mobility)# virtual-controller 
AP)(L3-mobility)# subnet    ||}
(Instant AP)# wifi1-mode {||}

To enable spectrum monitoring for any other band for the 5 GHz radio:
(Instant AP)(config)# rf dot11a-radio-profile
Instant Access Point (RF dot11a Radio Profile)# spectrum-band 

To view the radio configuration:
Instant Access Point# show radio config
2.4 GHz:
Legacy Mode:disable
Beacon Interval:100
802.11d/802.11h:disable
Interference Immunity Level:2
Channel Switch Announcement Count:0
Channel Reuse Type:disable
Channel Reuse Threshold:0
Background Spectrum Monitor:disable
5.0 GHz:
Legacy Mode:disable
Beacon Interval:100
802.11d/802.11h:disable
Interference Immunity Level:2
Channel Switch Announcement Count:0
Channel Reuse Type:disable
Channel Reuse Threshold:0
Background Spectrum Monitor:disable
Standalone Spectrum Band:5ghz-upper

316 | Spectrum Monitor

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Chapter 26
W-IAP Maintenance

This section provides information on the following procedures:
l

Upgrading a W-IAP on page 317

l

Backing up and Restoring W-IAP Configuration Data on page 319

l

Converting a W-IAP to a Remote AP and Campus AP on page 320

l

Resetting a Remote AP or Campus AP to a W-IAP on page 325

l

Rebooting the W-IAP on page 325

Upgrading a W-IAP
While upgrading a W-IAP, you can use the image check feature to allow the W-IAP to find new software image
versions available on a cloud-based image server hosted and maintained by Dell. The location of the image server is
fixed and cannot be changed by the user. The image server is loaded with latest versions of Instant software.

Upgrading a W-IAP and Image Server
Instant supports mixed AP-class instant deployment with all APs as part of the same Virtual Controller cluster.

Image Management Using W-AirWave
If the multi-class W-IAP network is managed by W-AirWave, image upgrades can only be done through the WAirWave UI. The W-IAP images for different classes must be uploaded on the AMP server. When new W-IAPs
joining the network need to synchronize their software with the version running on the Virtual Controller, and if the
new W-IAP belongs to a different class, the image file for the new W-IAP is provided by W-AirWave. If W-AirWave
does not have the appropriate image file, the new AP will not be able to join the network.
The Virtual Controller communicates with the W-AirWave server if W-AirWave is configured. If W-AirWave is not
configured on the W-IAP, the image is requested from the Image server.

Image Management Using Cloud Server
If the multi-class W-IAP network is not managed by W-AirWave, image upgrades can be done through the cloudbased image check feature. When a new W-IAP joining the network needs to synchronize its software version with
the version on the Virtual Controller and if the new W-IAP belongs to a different class, the image file for the new WIAP is provided by the cloud server.

Configuring HTTP Proxy on a W-IAP
If your network requires a proxy server for internet access, you must first configure the HTTP proxy on the W-IAP to
download the image from the cloud server. After you setup the HTTP proxy settings, the W-IAP connects to the
Activate server, W-AirWave Management platform or OpenDNS server through a secure HTTP connection. You can
also exempt certain applications from using the HTTP proxy (configured on a W-IAP ) by providing their hostname or
IP address under exceptions.
In the Instant UI
Perform these steps to configure the HTTP proxy settings:
1. Navigate to System > Proxy. The proxy configuration window is displayed.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

W-IAP Maintenance | 317

Figure 120 Proxy Configuration Window

2. Enter the HTTP proxy server's IP address and the port number.
3. If you do not want the HTTP proxy to be applied for a particular host, click New to enter that IP address or domain
name of that host under exceptions list.
In the CLI
(Instant
(Instant
(Instant
(Instant

AP)(config)# proxy server 192.0.2.1 8080
AP)(config)# proxy exception 192.0.2.2
AP)(config)# end
AP)# commit apply

Upgrading a W-IAP Using Automatic Image Check
You can upgrade a W-IAP by using the automatic image check feature. The Automatic image checks are performed
once after the AP boots up and every week thereafter.
If the image check locates a new version of the Instant software on the image server, the New version available
link is displayed at the top right corner of the UI.
If W-AirWave is configured, the automatic image check is disabled.

To check for a new version on the image server in the cloud:
1. Go to Maintenance>Automatic>Check for New Version. After the image check is completed, one of the
following messages is displayed:
n

No new version available — If there is no new version available.

n

Image server timed out — Connection or session between the image server and the W-IAP is timed out.

n

Image server failure — If the image server does not respond.

n

A new image version found — If a new image version is found.

2. If a new version is found, the Upgrade Now button becomes available and the version number is displayed.
3. Click Upgrade Now.
The W-IAP downloads the image from the server, saves it to flash and reboots. Depending on the progress and
success of the upgrade, one of the following messages is displayed:
n

Upgrading — While image upgrading is in progress.

n

Upgrade successful — When the upgrading is successful.

n

Upgrade failed — When the upgrading fails.

If the upgrade fails and an error message is displayed, retry upgrading the W-IAP.
318 | W-IAP Maintenance

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Upgrading to a New Version Manually
If the automatic image check feature is disabled, you can use obtain an image file from a local file system or from a
TFTP or HTTP URL. To manually check for a new firmware image version and obtain an image file:
1. Navigate to Maintenance>Firmware. The Firmware window is displayed.
2. Under Manual section, perform the following steps:
l

Select the Image file option. This method is only available for single-class W-IAPs.
The following examples describe the image file format for different W-IAP models:

l

n

For W-IAP134/135 — DellInstant_Cassiopeia_6.4.0.2-4.1.0.0_xxxx

n

For W-IAP108/109, W-IAP103, and W-IAP114/115— DellInstant_Pegasus_6.4.0.2-4.1.0.0_xxxx

n

For W-IAP155/155P — DellInstant_Aries_6.4.0.2-4.1.0.0_xxxx

n

For W-IAP220 Series and W-IAP270 Series — DellInstant_Centaurus_6.4.0.2-4.1.0.0_xxxx

n

For all other W-IAPs —DellInstant_Orion_6.4.0.2-4.1.0.0_xxxx

Select the Image URL option. Select this option to obtain an image file from a TFTP, FTP, or HTTP URL.
n

HTTP - http:///. For example, http:///DellInstant_Orion_6.4.0.24.1.0.0_xxxx

n

TFTP - tftp:///. For example, tftp:///DellInstant_Orion_6.4.0.24.1.0.0_xxxx

n

FTP - ftp:///. For example, ftp:///DellInstant_Orion_6.4.0.2-4.1.0.0_
xxxx

3. Clear the Reboot all APs after upgrade checkbox if required. The Reboot all APs after upgrade checkbox is
selected by default to allow the W-IAPs to reboot automatically after a successful upgrade. To reboot the W-IAP
at a later time, clear the Reboot all APs after upgrade checkbox.
4. Click Upgrade Now to upgrade the W-IAP to the newer version.

Upgrading an Image Using CLI
To upgrade an image using a HTTP, TFTP, or FTP URL:
(Instant AP)# upgrade-image 

To upgrade an image without rebooting the W-IAP:
(Instant AP)# upgrade-image2-no-reboot 

To view the upgrade information:
(Instant AP)# show upgrade info
Image Upgrade Progress
---------------------Mac IP Address AP Class Status Image Info Error Detail
--- --------- -------- ------ ---------- -----------d8:c7:c8:c4:42:98 10.17.101.1 Orion image-ok image file none
Auto reboot :enable
Use external URL :disable

Backing up and Restoring W-IAP Configuration Data
You can back up the W-IAP configuration data and restore the configuration when required.

Viewing Current Configuration
To view the current configuration on the W-IAP:
Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

W-IAP Maintenance | 319

l

In the UI, navigate to Maintenance > Configuration > Current Configuration.

l

In the CLI, enter the following command at the command prompt:
(Instant AP)# show running-config

Backing up Configuration Data
To back up the W-IAP configuration data:
1. Navigate to the Maintenance > Configuration> page.
2. Click Backup Configuration.
3. Click Continue to confirm the backup. The instant.cfg containing the W-IAP configuration data is saved in your
local file system.
4. To view the configuration that is backed up by the W-IAP, enter the following command at the command prompt:
(Instant AP)# show backup-config

Restoring Configuration
To restore configuration:
1. Navigate to the Maintenance > Configuration page.
2. Click Restore Configuration. Click Browse to browse your local system and select the configuration file.
3. Click Restore Now.
4. Click Restore Configuration to confirm restoration. The configuration is restored and the W-IAP reboots to load
the new configuration.

Converting a W-IAP to a Remote AP and Campus AP
This section provides the following information:
l

Regulatory Domain Restrictions for W-IAP to RAP or CAP Conversion on page 320

l

Converting a W-IAP to a Remote AP on page 322

l

Converting a W-IAP to a Campus AP on page 323

l

Converting a W-IAP to Standalone Mode on page 324

l

Converting a W-IAP using CLI on page 325

Regulatory Domain Restrictions for W-IAP to RAP or CAP Conversion
You can provision a W-IAP as a Campus AP or a Remote AP in a controller-based network. Before converting a WIAP, ensure that there is a regulatory domain match between the W-IAP and controller.

320 | W-IAP Maintenance

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

The following table describes the regulatory domain restrictions that apply for the W-IAP to ArubaOS AP conversion:
Table 63: W-IAP to ArubaOS AP Conversion
ArubaOS
version on
Controller

Controller
Regulatory
Domain

IAP-22x

IAP-27x

W-IAP11x

W-IAP103

All other W-IAPs

US

RW

US

RW

US

RW

US

RW

US

Unrestricted

JP

IL

Versions lower

US

—

—

—

—

—

—

—

—

Valid

X

X

X

Unrestricted

—

—

—

—

—

—

—

—

X

Valid

Valid for
JP
country
code

X

IL

—

—

—

—

—

—

—

—

X

X

X

Valid

US

Valid

X

—

—

—

—

—

—

Valid

X

X

X

Unrestricted

X

X

—

—

—

—

—

—

X

Valid

Valid for
JP
country
code

X

IL

X

X

—

—

—

—

—

—

X

X

X

Valid

US

Valid

X

—

—

Valid

X

—

—

Valid

X

X

X

Unrestricted

X

X

—

—

X

X

—

—

X

Valid

Valid for
JP
country
code

X

IL

X

X

—

—

X

X

—

—

X

X

X

Valid

US

Valid

X

—

—

Valid

X

—

—

Valid

X

X

X

Unrestricted

X

Valid

—

—

X

Valid

—

—

X

Valid

Valid for
JP
country
code

X

IL

X

Valid

—

—

X

Valid

—

—

X

X

X

Valid

US

Valid

X

Valid

X

Valid

X

Valid

X

Valid

X

X

X

IL

X

Valid

X

Valid

X

Valid

X

Valid

X

Valid

Valid for
JP
country
code

X

Unrestricted

X

Valid

X

Valid

X

Valid

X

Valid

X

X

X

Valid

than 6.3.0

6.3.0

6.3.1.0,
6.3.1.1, and
6.3.1.2

6.3.1.3

6.4 or later

NOTE: "—" indicates not supported and "X" indicates invalid configuration.
NOTE: The minimum Instant version for W-IAP103 and W-IAP274/275 is 6.4.0.2-4.1.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

W-IAP Maintenance | 321

Converting a W-IAP to a Remote AP
For Remote AP conversion, the Virtual Controller sends the Remote AP convert command to all the other W-IAPs.
The Virtual Controller along with the other slave W-IAPs set up a VPN tunnel to the remote controller, and download
the firmware through FTP. The Virtual Controller uses IPsec to communicate to the mobility controller over the
Internet.
l

If the W-IAP obtains W-AirWave information through DHCP (Option 43 and Option 60), it establishes an HTTPS
connection to the W-AirWave server and downloads the configuration and operates in the W-IAP mode.

l

If the W-IAP does not get W-AirWave information through DHCP provisioning, it tries provisioning through a
firmware image server in the cloud by sending a serial number MAC address. If an entry for the W-IAP is present
in the firmware image cloud server and is provisioned as a W-IAP > Remote AP, the firmware image cloud server
responds with mobility controller IP address, AP group, and AP type. The W-IAP then contacts the controller,
establishes certificate-based secure communication, and obtains configuration and image from the controller.
The W-IAP reboots and comes up as a Remote AP. The W-IAP then establishes an IPSEC connection with the
controller and begins operating in the Remote AP mode.

l

If a W-IAP entry for the AP is present in the firmware image cloud server, the W-IAP obtains W-AirWave server
information from the cloud server and downloads configuration from W-AirWave to operate in the W-IAP mode.

l

If there is no response from the cloud server or AirGroup is received, the W-IAP comes up in Instant mode.

l

For more information on firmware image cloud server, see Upgrading a W-IAP on page 317.
A mesh point cannot be converted to Remote AP, because mesh access points do not support VPN
connection.

A W-IAP can be converted to a Campus AP and Remote AP only if the controller is running ArubaOS 6.1.4 or later.
The following table describes the supported W-IAP platforms and minimal ArubaOS version required for the Campus
AP or Remote AP conversion.
Table 64: W-IAP Platforms and Minimum ArubaOS Versions for W-IAP to Remote AP Conversion
W-IAP Platform

ArubaOS Version

Instant Version

W-IAP103

6.4 or later

4.1 or later

W-IAP104

6.1.4 or later

3.0 or later

W-IAP105

6.1.4 or later

1.0 or later

W-IAP134/135

6.1.4 or later

2.0 or later

W-IAP175AC/175P

6.1.4 or later

3.0 or later

W-IAP3WN/3WNP

6.1.4 or later

3.0 or later

W-IAP108/109

6.2.0.0 or later

3.2 or later

W-IAP155/155P

6.3 or later

3.3 or later

W-IAP114/115

6.3.1.1 or later

4.0 or later

W-IAP224/225

6.3.1.1 or later

4.0 or later

W-IAP274/275

6.4 or later

4.1 or later

To convert a W-IAP to a RAP, perform the following steps:

322 | W-IAP Maintenance

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

1. Click the Maintenance link in the Instant main window.
2. Click the Convert tab. The Convert tab is displayed.
Figure 121 Maintenance — Convert Tab

3. Select Remote APs managed by a Mobility Controller from the drop-down list.
4. Enter the hostname (fully qualified domain name) or the IP address of the controller in the Hostname or IP
Address of Mobility Controller text box. Contact your local network administrator to obtain the IP address.
Ensure that the mobility controller IP Address is reachable by the a W-IAPs.

5. Click Convert Now to complete the conversion. The W-IAP reboots and begins operating in the Remote AP
mode.
6. After conversion, the W-IAP is managed by the Dell Networking W-Series mobility controller.
For W-IAPs to function as Remote APs, configure the W-IAP in the Remote AP whitelist and enable the FTP
service on the controller.
If the VPN setup fails and an error message is displayed, click OK, copy the error logs, and share them with your
local administrator.

Converting a W-IAP to a Campus AP
To convert a W-IAP to a Campus AP, do the following:
1. Click the Maintenance link in the Instant main window.
2. Click the Convert tab. The Convert tab is displayed.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

W-IAP Maintenance | 323

Figure 122 Converting a W-IAP to Campus AP

3. Select Campus APs managed by a Mobility Controller from the drop-down list.
4. Enter the hostname, Fully Qualified Domain Name (FQDN), or the IP address of the controller in the Hostname
or IP Address of Mobility Controller text box. Contact your local administrator to obtain these details.
5. Ensure that the W-IAPs access the mobility controller IP Address.
6. Click Convert Now to complete the conversion.

Converting a W-IAP to Standalone Mode
This feature allows you to deploy a W-IAP as an autonomous AP, which is a separate entity from the existing Virtual
Controller cluster in the Layer 2 domain.
To convert a W-IAP to a standalone AP:
1. Click the Maintenance link in the Instant main window.
2. Click the Convert tab. The Convert tab is displayed.
Figure 123 Standalone AP Conversion

3. Select Standalone AP from the drop-down list.
4. Select the Access Point from the drop-down list.
5. Click Convert Now to complete the conversion. The a W-IAP now operates in the standalone mode.

324 | W-IAP Maintenance

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Converting a W-IAP using CLI
To convert a W-IAP
(Instant AP)# convert-aos-ap  

Resetting a Remote AP or Campus AP to a W-IAP
The reset button located on the rear of a W-IAP can be used to reset the W-IAP to factory default settings.
To reset a W-IAP, perform the following steps:
1. Power off the W-IAP.
2. Press and hold the reset button using a small and narrow object such as a paperclip.
3. Power on the W-IAP without releasing the reset button. The power LED flashes within 5 seconds indicating that
the reset is completed.
4. Release the reset button. The W-IAP reboots with the factory default settings.
All APs have a reset button, except IAP-175P/175AC. Contact Dell support for resetting these W-IAPs.

Rebooting the W-IAP
If you encounter any problem with the W-IAPs, you can reboot all W-IAPs or a selected W-IAP in a network using
the Instant UI. To reboot a W-IAP:
1. Click the Maintenance link. The Maintenance window is displayed.
2. Click the Reboot tab.
Figure 124 Rebooting the W-IAP

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

W-IAP Maintenance | 325

3. In the W-IAP list, select the W-IAP that you want to reboot and click Reboot selected Access Point. To reboot
all the W-IAPs in the network, click Reboot All.
4. The Confirm Reboot for AP message is displayed. Click Reboot Now to proceed. The Reboot in Progress
message is displayed indicating that the reboot is in progress. The Reboot Successful message is displayed
after the process is complete. If the system fails to boot, the Unable to contact Access Points after reboot
was initiated message is displayed.
5. Click OK.

326 | W-IAP Maintenance

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Chapter 27
Monitoring Devices and Logs

This chapter provides the following information:
l

Configuring SNMP on page 327

l

Configuring a Syslog Server on page 330

l

Configuring TFTP Dump Server on page 332

l

Running Debug Commands from the UI on page 333

Configuring SNMP
This section provides the following information:
l

SNMP Parameters for W-IAP on page 327

l

Configuring SNMP on page 328

l

Configuring SNMP Traps on page 330

SNMP Parameters for W-IAP
Instant supports SNMPv1, SNMPv2c, and SNMPv3 for reporting purposes only. A W-IAP cannot use SNMP to set
values in a Dell system.
You can configure the following parameters for a W-IAP:
Table 65: SNMP Parameters for W-IAP
Field

Description

Community Strings for SNMPV1
and SNMPV2

An SNMP Community string is a text string that acts as a password,
and is used to authenticate messages sent between the Virtual
Controller and the SNMP agent.

If you are using SNMPv3 to obtain values from the W-IAP, you can configure the following parameters:
Name

A string representing the name of the user.

Authentication Protocol

An indication of whether messages sent on behalf of this user can
be authenticated, and if so, the type of authentication protocol used.
This can take one of the two values:
l MD5— HMAC-MD5-96 Digest Authentication Protocol
l SHA: HMAC-SHA-96 Digest Authentication Protocol

Authentication protocol
password

If messages sent on behalf of this user can be authenticated, the
(private) authentication key for use with the authentication protocol.
This is a string password for MD5 or SHA depending on the choice
above.

Privacy protocol

An indication of whether messages sent on behalf of this user can
be protected from disclosure, and if so, the type of privacy protocol
which is used. This takes the value DES (CBC-DES Symmetric
Encryption).

Privacy protocol password

If messages sent on behalf of this user can be encrypted/decrypted
with DES, the (private) privacy key for use with the privacy protocol.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Monitoring Devices and Logs | 327

Configuring SNMP
This section describes the procedure for configuring SNMPv1, SNMPv2, and SNMPv3 community strings using the
Instant UI or CLI.

Creating community strings for SNMPv1 and SNMPv2 Using Instant UI
To create community strings for SNMPv1 and SNMPv2:
1. Click the System link at the top right corner of the Instant main window. The system window is displayed.
2. Click the Monitoring tab. The following figure shows the SNMP configuration parameters displayed in the
Monitoring tab.
Figure 125 Monitoring Tab: SNMP Configuration Parameters

3. Click New.
4. Enter the string in the New Community String text box.
5. Click OK.
6. To delete a community string, select the string, and click Delete.

Creating community strings for SNMPv3 Using Instant UI
To create community strings for SNMPv3:
1. Click System link at the top right corner of the Instant main window. The system window is displayed.
2. Click the Monitoring tab. The SNMP configuration parameters displayed in the Monitoring tab.
3. Click New in the Users for SNMPV3 box. A window for specifying SNMPv3 user information is displayed.

328 | Monitoring Devices and Logs

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Figure 126 SNMPv3 User

4. Enter the name of the user in the Name text box.
5. Select the type of authentication protocol from the Auth protocol drop-down list.
6. Enter the authentication password in the Password text box and retype the password in the Retype text box.
7. Select the type of privacy protocol from the Privacy protocol drop-down list.
8. Enter the privacy protocol password in the Password text box and retype the password in the Retype text box.
9. Click OK.
10. To edit the details for a particular user, select the user and click Edit.
11. To delete a particular user, select the user and click Delete.

Configuring SNMP Community Strings in the CLI
To configure an SNMP engine ID and host:
(Instant AP)(config)# snmp-server engine-id 
(Instant AP)(config)# host  version {1  udp-port }|{2c|3  [inform]
[udp-port ]}

To configure SNMPv1 and SNMPv2 community strings:
(Instant AP)(config)# snmp-server community 

To configure SNMPv3 community strings:
(Instant AP)(config)# snmp-server user    


To view SNMP configuration:
(Instant AP)# show snmp-configuration
Engine ID:D8C7C8C44298
Community Strings
----------------Name
---SNMPv3 Users
-----------Name Authentication Type Encryption Type
---- ------------------- --------------SNMP Trap Hosts
--------------IP Address Version Name Port Inform
---------- ------- ---- ---- ------

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Monitoring Devices and Logs | 329

Configuring SNMP Traps
Instant supports the configuration of external trap receivers. Only the W-IAP acting as the Virtual Controller
generates traps. The traps for W-IAP cluster are generated with Virtual Controller IP as the source IP if Virtual
Controller IP is configured. The OID of the traps is 1.3.6.1.4.1.14823.2.3.3.1.200.2.X.
You can configure SNMP traps using the Instant UI or CLI.

In the Instant UI
To configure an SNMP trap receiver:
1. Navigate to System > Show advanced options > Monitoring. The Monitoring window is displayed.
2. Under SNMP Traps, enter a name in the SNMP Engine ID text box. It indicates the name of the SNMP agent on
the access point. The SNMPV3 agent has an engine ID that uniquely identifies the agent in the device and is
unique to that internal network.
3. Click New and update the following fields:
l

IP Address— Enter the IP Address of the new SNMP Trap receiver.

l

Version— Select the SNMP version— v1, v2c, v3 from the drop-down list. The version specifies the format of
traps generated by the access point.

l

Community/Username— Specify the community string for SNMPv1 and SNMPv2c traps and a username for
SNMPv3 traps.

l

Port— Enter the port to which the traps are sent. The default value is 162.

l

Inform— When enabled, traps are sent as SNMP INFORM messages. It is applicable to SNMPv3 only. The
default value is Yes.

4. Click OK to view the trap receiver information in the SNMP Trap Receivers window.

In the CLI
To configure SNMP traps:
(Instant
udp-port
(Instant
(Instant

AP)(config)# snmp-server host  {version 1 | version 2 | version 3} 
 inform
AP)(config)# end
AP)# commit apply

Instant supports SNMP Management Information Bases (MIBs) along with Dell-MIBs. For information about MIBs
and SNMP traps, see Dell Networking W-Series Instant MIB Reference Guide.

Configuring a Syslog Server
You can specify a syslog server for sending syslog messages to the external servers either by using the Instant UI
or CLI.

In the Instant UI
1. In the Instant main window, click the System link. The System window is displayed.
2. Click Show advanced options to display the advanced options.
3. Click the Monitoring tab. The Monitoring tab details are displayed.

330 | Monitoring Devices and Logs

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Figure 127 Syslog Server

4. In the Syslog server text box, enter the IP address of the server to which you want to send system logs.
5. Select the required values to configure syslog facility levels. Syslog Facility is an information field associated
with a syslog message. It is an application or operating system component that generates a log message. The
following seven facilities are supported by Syslog:
l

AP-Debug— Detailed log about the AP device.

l

Network— Log about change of network, for example, when a new W-IAP is added to a network.

l

Security— Log about network security, for example, when a client connects using wrong password.

l

System— Log about configuration and system status.

l

User— Important logs about client.

l

User-Debug— Detailed log about client.

l

Wireless— Log about radio.

The following table describes the logging levels in order of severity, from the most to the least severe.
Table 66:

Logging Levels

Logging Level

Description

Emergency

Panic conditions that occur when the system becomes unusable.

Alert

Any condition requiring immediate attention and correction.

Critical

Any critical conditions such as a hard drive error.

Errors

Error conditions.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Monitoring Devices and Logs | 331

Logging Level

Description

Warning

Warning messages.

Notice

Significant events of a non-critical and normal nature. The default value for
all Syslog facilities.

Informational

Messages of general interest to system users.

Debug

Messages containing information useful for debugging.

6. Click OK.

In the CLI
To configure a syslog server:
(Instant AP)(config)# syslog-server 

To configure syslog facility levels:
(Instant AP)(config)# syslog-level [ap-debug |network |security |system |user |
user-debug | wireless]
(Instant AP)(config)# end
(Instant AP)# commit apply

To view syslog logging levels:
Instant Access Point# show syslog-level
Logging Level
------------Facility Level
-------- ----ap-debug warn
network warn
security warn
system warn
user warn
user-debug warn
wireless error

Configuring TFTP Dump Server
You can configure a TFTP server for storing core dump files by using the Instant UI or CLI.

In the Instant UI
1. In the Instant main window, click the System link. The System window is displayed.
2. Click Show advanced options to display the advanced options.
3. Click the Monitoring tab. The Monitoring tab details are displayed.
4. Enter the IP address of the TFTP server in the TFTP Dump Server text box.
5. Click OK.

In the CLI
To configure a TFTP server:
(Instant AP)(config)# tftp-dump-server 
(Instant AP)(config)# end
(Instant AP)# commit apply

332 | Monitoring Devices and Logs

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Running Debug Commands from the UI
To run the debugging commands from the UI:
1. Navigate to More>Support at the top right corner of the Instant main window. The Support window is displayed.
2. Select the required option from the Command drop-down list.
3. Select All Access Points or Instant Access Point(VC) from the Target drop-down list.
4. Click Run. When you run debug commands and click Save, the output of all the selected commands is
displayed in a single page.

Support Commands
You can view the following information for each access point in the cluster using the support window:
l

AP 3G/4G Status— Displays the cellular status of the W-IAP.

l

AP 802.1x Certificate— Displays the CA certificate and server certificate for the Virtual Controller.

l

AP 802.1X Statistics— Displays the 802.1X statistics of the W-IAP.

l

AP Access Rule Table— Displays the list of ACL rules configured on the W-IAP.

l

AP Inbound Firewall Rules—Displays inbound firewall rules configured on the W-IAP

l

AP Active— Displays the list of active APs in Instant network.

l

AP Airgroup Cache— Displays the Bonjour Multicast DNS (mDNS) records for the W-IAP.

l

AP Airgroup CPPM Entries— Displays the AirGroup CPPM policies of the registered devices.

l

AP Airgroup CPPM Servers— Displays the AirGroup CPPM server information.

l

AP Airgroup Debug Statistics— Displays the debug statistics for the W-IAP.

l

AP Airgroup Servers— Displays information about the Bonjour devices which supports AirPrint and AirPlay
services for the W-IAP.

l

AP Airgroup User— Displays the IP/MAC address, device name, VLAN, type of connection of the Bonjour
devices for the W-IAP.

l

AP Allowed Channels— Displays information of the allowed channels for the W-IAP.

l

AP Allowed MAX-EIRP— Displays information on the maximum EIRP settings that can be configured on a WIAP serving in a specific regulatory domain.

l

AP All Supported Timezones— Displays all the supported time zones of Instant.

l

AP ARM Bandwidth Management— Displays bandwidth management information for the W-IAP.

l

AP ARM Channels— Displays ARM channel details for the W-IAP.

l

AP ARM Configuration— Displays ARM configuration details for the W-IAP.

l

AP ARM History— Displays the channel history and power changes due to Adaptive Radio Management (ARM)
for the W-IAP.

l

AP ARM Neighbors— Displays the ARM neighbors of the W-IAP.

l

AP ARM RF Summary— Displays the status and statistics for all channels monitored by the W-IAP.

l

AP ARM Scan Times— Displays channel scanning information for the W-IAP.

l

AP ARP Table— Displays the ARP table of the W-IAP.

l

AP Association Table— Displays information about the W-IAP association.

l

AP Auth-Survivability cache— Displays the list of 802.1X cached user's information.

l

AP Authentication Frames— Displays the authentication trace buffer information of the W-IAP.

l

AP BSSID Table— Displays the Basic Service Set (BSS) table of the W-IAP.

l

AP Captive Portal Domains—Displays captive portal domains configured on the W-IAP.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Monitoring Devices and Logs | 333

l

AP Captive Portal Auto White List—Displays details about the automatic whitelist configured for a captive portal
profile.

l

AP Checksum—Displays checksum details for a W-IAP.

l

AP Client Match Action—Displays details of the client match action.

l

AP Client Match Live— Displays the live details of the client match configuration on a W-IAP.

l

AP Client Match History— Displays the historical details of the client match configuration on a W-IAP.

l

AP Client Match Status— Displays information about the client match configuration status.

l

AP Client Match Triggers—Displays information about the client match triggers.

l

AP Client Table—Displays the client details.

l

AP Client View — Displays client details of a W-IAP.

l

AP Country Codes— Displays country code details for the W-IAP.

l

AP CPU Details— Displays detailed information about memory utilization and CPU load for system processes.

l

AP CPU Utilization— Displays utilization of CPU for the W-IAP.

l

AP Crash Info— Displays crash log information (if it exists) for the W-IAP. The stored information is cleared from
the flash after the AP reboots.

l

AP Current Time— Displays the current time configured on the W-IAP.

l

AP Current Timezone— Displays the current time zone configured on the W-IAP.

l

AP Datapath ACL Table Allocation— Displays ACL table allocation details for the W-IAP.

l

AP Datapath ACL Tables— Displays the list of ACL rules configured for the SSID and Ethernet port profiles.

l

AP Datapath Bridge Table— Displays bridge table entry statistics including MAC address, VLAN, assigned
VLAN, Destination and flag information for the W-IAP.

l

AP Datapath DMO Session— Displays details of a DMO session.

l

AP Datapath Dns Id Map— Displays the mapping details for the DNS ID.

l

AP Datapath DPI Session Table and AP Datapath DPI Session Table Verbose—Display the datapath
session table entries.

l

AP Datapath Multicast Table— Displays multicast table statistics for the W-IAP.

l

AP Datapath Nat Pool—Displays NAT pool details configured in the datapath.

l

AP Datapath Route Table— Displays route table statistics for the W-IAP.

l

AP Datapath Session Table— Displays the datapath session table statistics for the W-IAP.

l

AP Datapath Statistics— Displays the hardware packet statistics for the W-IAP.

l

AP Datapath User Table— Displays datapath user statistics such as current entries, pending deletes, high
water mark, maximum entries, total entries, allocation failures, invalid users, and maximum link length for the WIAP.

l

AP Datapath VLAN Table— Displays the VLAN table information such as VLAN memberships inside the
datapath including L2 tunnels for the W-IAP.

l

AP Daylight Saving Time—Displays the Daylight Saving Time configured on the W-IAP.

l

AP Derivation Rules—Displays the role and VLAN derivation rules configured on a W-IAP.

l

AP DPI Debug statistics—Displays DPI statistics that can be used for debugging DPI issues.

l

AP Driver Configuration— Displays driver configuration details of the W-IAP.

l

AP Election and AP Election Statistics—Display the master election statistics.

l

AP Environment Variable— Displays information about the type of antenna used by the W-IAP.

l

AP ESSID Table— Displays the SSID profiles configured on the W-IAP.

l

AP Flash Configuration— Displays statistics of the W-IAP configuration stored in flash memory.

l

AP IGMP Group Table—Displays IGMP group information.

334 | Monitoring Devices and Logs

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

l

AP IAP-VPN Retry Counters—Displays IAP-VPN tunnel details.

l

AP Interface Counters— Displays information about the Ethernet interface packet counters for the W-IAP.

l

AP Interface Status— Displays the Ethernet port status for the W-IAP.

l

AP Internal DHCP Status—Displays details on DHCP allocation.

l

AP IP Interface—Displays a summary of all IP-related information for Ethernet interfaces configured on the WIAP.

l

AP IP Route Table— Displays information about IP routes for the W-IAP.

l

AP L3 Mobility Datapath—Display L3 mobility details.

l

AP L3 Mobility Events Log—Displays a log with L3 client roaming details.

l

AP L3 Mobility Status—Displays the status of L3 roaming clients.

l

AP LACP Status—Displays the Link Aggregation Control Protocol (LACP) configuration status.

l

AP Log All— Displays all logs for the W-IAP.

l

AP Log AP-Debug— Displays logs with debugging information for the W-IAP.

l

AP Log Conversion—Displays image conversion details for the W-IAP.

l

AP Log Driver—Displays the status of drivers configured on the W-IAP.

l

AP Log Kernel—Displays logs for AP’s kernel.

l

AP Log Network— Displays network logs for the W-IAP.

l

AP Log PPPd—Displays the Point-to-Point Protocol daemon (PPPd) network connection details.

l

AP Log Rapper—Displays rapper information.

l

AP Log Sapd— Displays SAPd logs.

l

AP Log Security— Displays security logs of the W-IAP.

l

AP Log System— Displays system logs of the W-IAP.

l

AP Log Tunnel Status Management—Displays tunnel status.

l

AP Log Upgrade—Displays image download and upgrade details for the W-IAP.

l

AP Log User-Debug— Displays user-debug logs of the W-IAP.

l

AP Log User— Displays user logs of the W-IAP.

l

AP Log VPN Tunnel Log— Displays VPN tunnel status for the W-IAP.

l

AP Log Wireless— Displays wireless logs of the W-IAP.

l

AP Management Frames— Displays the traced 802.11 management frames for the W-IAP.

l

AP Memory Allocation State Dumps— Displays the memory allocation details for the W-IAP.

l

AP Memory Utilization— Displays memory utilization of the W-IAP.

l

AP Mesh Counters— Displays the mesh counters of the W-IAP.

l

AP Mesh Link— Displays the mesh link of the W-IAP.

l

AP Mesh Neighbors— Displays the mesh link neighbors of the W-IAP.

l

AP Monitor Active Laser Beams— Displays the active laser beam sources for the W-IAP.

l

AP Monitor AP Table— Displays the list of APs monitored by the W-IAP.

l

AP Monitor ARP Cache— Displays ARP cache details for the W-IAP.

l

AP Monitor Client Table— Displays the list of clients monitored by the W-IAP.

l

AP Monitor Containment Information— Displays containment details for the W-IAP.

l

AP Monitor Potential AP Table— Displays the list of potential APs for the W-IAP.

l

AP Monitor Potential Client Table— Displays the list of potential clients for the W-IAP.

l

AP Monitor Router— Displays information about the potential wireless devices.

l

AP Monitor Scan Information— Displays scanned information for the W-IAP.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Monitoring Devices and Logs | 335

l

AP Monitor Status— Displays the configuration and status of monitor information of the W-IAP.

l

AP Persistent Clients— Displays the list persistent clients for the W-IAP.

l

AP PMK Cache— Displays the PMK cache details for the clients associated with the W-IAP.

l

AP PPPoE uplink debug— Displays PPPoE debug logs.

l

AP PPPoE uplink status— Displays PPPoE uplink status.

l

AP Processes— Displays the processes running on the W-IAP.

l

AP Radio 0 Stats— Displays aggregate debug statistics of the W-IAP Radio 0.

l

AP Radio 1 Stats— Displays aggregate debug statistics of the W-IAP Radio 1. .

l

AP Radio 0 Client Probe Report— Displays a report on the AP clients connected to W-IAP Radio 0.

l

AP Radio 1 Client Probe Report— Displays a report on the AP clients connected to W-IAP Radio 1.

l

AP RADIUS Statistics— Displays the RADIUS server statistics for the W-IAP.

l

AP Shaping Table— Displays shaping information for clients associated with the W-IAP.

l

AP Sockets— Displays information sockets of the W-IAP.

l

AP STM Configuration— Displays STM configuration details for each SSID profile configured on the W-IAP.

l

AP System Status— Displays detailed system status information for the W-IAP.

l

AP System Summary— Displays the W-IAP configuration.

l

AP Swarm State— Displays details of the W-IAP cluster to which the AP is connected.

l

AP Tech Support Dump— Displays the logs with complete W-IAP configuration information required for
debugging by technical support.

l

AP Tech Support Dump Advanced— Displays the logs with advanced configuration details and logs required for
debugging by technical support.

l

AP Uplink Status— Displays uplink status for the W-IAP.

l

AP User Table— Displays the list of clients for the W-IAP.

l

AP Valid Channels— Displays valid channels of the W-IAP.

l

AP Version— Displays the version number of the W-IAP.

l

AP VPN Status— Displays VPN status for the W-IAP.

l

AP Virtual Beacon Report— Displays a report on virtual beacons for a W-IAP.

l

AP Wired Port Settings— Displays wired port configuration details for the W-IAP.

l

AP Wired User Table— Displays the list of clients associated with the wired network profile configured on the WIAP.

l

VC About— Displays information such as AP type, build time of image, and image version for the Virtual
Controller.

l

VC Active Configuration— Displays the active configuration of Virtual Controller.

l

VC Airgroup Service— Displays the Bonjour services supported by the Virtual Controller.

l

VC Airgroup Status— Displays the status of the AirGroup and CPPM server details configured on the Virtual
Controller.

l

VC Allowed AP Table— Displays the list of allowed APs.

l

VC AMP Current State Data— Displays the current status of W-AirWave Management Platform.

l

VC AMP Current Stats Data— Displays the current W-AirWave configuration details.

l

VC AMP Data Sent— Displays information about the data exchange between W-AirWave server and the Virtual
Controller.

l

VC AMP Events Pending— Displays information about the pending events on the W-AirWave server.

l

VC AMP Last Configuration Received— Displays the last configuration details received from W-AirWave.

336 | Monitoring Devices and Logs

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

l

VC AMP Single Sign-on Key— Displays single sign-on key details for W-AirWave.

l

VC Application Services— Displays the details of application services, which includes protocol number, port
number.

l

VC DHCP Option 43 Received— Displays information about the current activities for the DHCP scope with
Option 43.

l

VC Global Alerts— Displays the list of alerts for all W-IAPs managed by the Virtual Controller.

l

VC Global Statistics— Displays the flow information and signal strength of the Virtual Controller.

l

VC IDS AP List— Displays the list of W-IAPs monitored by the Virtual Controller.

l

VC IDS Client List— Displays the list of clients detected by IDS for the Virtual Controller.

l

VC Internal DHCP Server Configuration— Displays the configuration details of the internal DHCP server.

l

VC L2TPv3 config— Displays the L2TPv3 configuration status.

l

VC L2TPv3 tunnel status— Displays the L2TPv3 tunnel status.

l

VC L2TPv3 tunnel configuration— Displays the L2TPv3 tunnel configuration status.

l

VC L2TPv3 session status— Displays the L2TPv3 session configuration status.

l

VC L2TPv3 system wide global statistics— Displays the L2TPv3 system statistics.

l

VC Local User Database— Displays the list of users configured for the W-IAP.

l

VC OpenDNS Configuration and Status— Displays configuration details and status of the OpenDNS server.

l

VC Radius Attributes— Displays information about the RADIUS attributes.

l

VC Radius Servers— Displays the list of RADIUS servers configured on the W-IAP.

l

VC Saved Configuration— Displays the configuration details of the Virtual Controller.

l

VC Scanning Statistics— Displays the scanned information for the W-IAP.

l

VC SNMP Configuration— Displays the SNMP configuration details of the W-IAP.

l

VC Uplink 3G/4G Configuration— Displays the 3G/4G cellular configuration information for the W-IAPs
managed by the Virtual Controller.

l

VC Uplink Management Configuration— Displays uplink configuration details for the Virtual Controller.

l

VC WISPr Configuration— Displays the WISPr configuration details.

Use the support commands under the supervision of Dell technical support.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Monitoring Devices and Logs | 337

Chapter 28
Hotspot Profiles

This chapter describes the following procedures:
l

Understanding Hotspot Profiles on page 338

l

Configuring Hotspot Profiles on page 339

l

Sample Configuration on page 349

In the current release, Instant supports the hotspot profile configuration only through the CLI.

Understanding Hotspot Profiles
Hotspot 2.0 is a Wi-Fi Alliance specification based on the 802.11u protocol, which allows wireless clients to discover
hotspots using management frames (such as beacon, association request, and association response), connect to
networks, and roam between networks without additional authentication.
The Hotspot 2.0 provides the following services:
l

Network discovery and selection— Allows the clients to discover suitable and available networks by advertising
the access network type, roaming consortium, and venue information through the management frames. For
network discovery and selection, Generic Advertisement Service (GAS) and Access Network Query Protocol
(ANQP) are used.

l

QOS Mapping— Provides a mapping between the network-layer QoS packet marking and over- the-air QoS frame
marking based on user priority.

When a hotspot is configured in a network:
l

The clients search for available hotspots using the beacon management frame.

l

When a hotspot is found, the client sends queries to obtain information about the type of network authentication
and IP address, and IP address availability using the Generic Advertisement Service (GAS) action frames.

l

Based on the response of the advertisement Server (response to the GAS Action Frames), the relevant hotspot is
selected and the client attempts to associate with it.

l

Based on the authentication mode used for mobility clients, the client authenticates to access the network.

Generic Advertisement Service (GAS)
GAS is a request-response protocol, which provides L2 transport mechanism between a wireless client and a server
in the network prior to authentication. It helps in determining an 802.11 infrastructure before associating clients and
allows clients to send queries to multiple 802.11 networks in parallel.
An AP can include its service provider Organization Identifier (OI) indicating the service provider identity in beacons
and probe responses to clients. When a client recognizes a W-IAP's OI, it attempts to associate to that W-IAP using
the security credentials corresponding to that service provider. If the client does not recognize the AP’s OI, the client
sends a Generic Advertisement Service (GAS) query to the W-IAP to request more information about the network
before associating. A client transmits a GAS Query using a GAS Initial Request frame and the W-IAP provides the
query response or information on how to receive the query response in a GAS Initial Response frame. To transmit a
GAS query for any advertisement protocol, the advertisement protocol ID must include the advertisement protocol
information element with information about the advertisement protocol and its corresponding advertisement control.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Hotspot Profiles | 338

Access Network Query Protocol (ANQP)
ANQP provides a range of information, such as IP address type and availability, roaming partners accessible
through a hotspot, and the Extensible Authentication Protocol (EAP) method supported for authentication, for a query
and response protocol. The ANQP Information Elements (IEs) provide additional data that can be sent from a W-IAP
to the client to identify the W-IAP's network and service provider. If a client requests this information through a GAS
query, the hotspot AP sends the ANQP capability list in the GAS Initial Response frame indicating support for the
following IEs:
l

Venue Name

l

Domain Name

l

Network Authentication Type

l

Roaming Consortium List

l

Network Access Identifier Realm

l

3GPP Cellular Network Data

Hotspot 2.0 Query Protocol (H2QP)
The H2QP profiles provide a range of information on hotspot 2.0 elements such as hotspot protocol and port,
operating class, operator names, WAN status, and uplink and downlink metrics.

Information Elements (IEs) and Management Frames
The hotspot 2.0 configuration supports the following IEs:
l

Interworking IE—Provides information about the Interworking service capabilities such as the Internet availability
in a specific service provider network.

l

Advertisement Protocol IE—Provides information about the advertisement protocol that a client can use for
communication with the advertisement servers in a network.

l

Roaming Consortium IE—Provides information about the service provider network for roaming clients, which can
be used to authenticate with the AP.

The IEs are included in the following Management Frames when 802.11u is enabled:
l

Beacon Frame

l

Probe Request Frame

l

Probe response frame

l

Association Request

l

Re-Association request

NAI Realm List
An NAI Realm profile identifies and describes a NAI realm to which the clients can connect. The NAI realm settings
on a W-IAP as an advertisement profile to determine the NAI realm elements that must be included as part of a GAS
Response frame.

Configuring Hotspot Profiles
To configure a hotspot profile, perform the following steps:
1. Create the required ANQP and H2QP advertisement profiles.
2. Create a hotspot profile.

339 | Hotspot Profiles

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

3. Associate the required ANQP and H2QP advertisement profiles created in step 1 to the hotspot profile created in
step 2.
4. Create a SSID Profile with enterprise security and WPA2 encryption settings and associate the SSID with the
hotspot profile created in step 2.

Creating Advertisement Profiles for Hotspot Configuration
A hotspot profile contains one or several advertisement profiles. The following advertisement profiles can be
configured through the Instant CLI:
l

l

ANQP advertisement profiles
n

NAI Realm profile

n

Venue Name Profile

n

Network Authentication Profile

n

Roaming Consortium Profile

n

3GPP Profile

n

IP Address availability Profile

n

Domain Name Profile

H2QP advertisement profiles
n

Operator Friendly Name Profile

n

Connection Capability Profile

n

Operating Class Profile

n

WAN-Metrics Profile

Configuring an NAI Realm Profile
You configure a Network Access Identifier (NAI) Realm profile to define the NAI realm information, which can be
sent as an ANQP IE in a GAS query response.
To configure a NAI profile, enter the following commands at the command prompt:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# hotspot anqp-nai-realm-profile 
AP)(nai-realm )# nai-realm-name 
AP)(nai-realm )# nai-realm-encoding {|}
AP)(nai-realm )# nai-realm-eap-method 
AP)(nai-realm )# nai-realm-auth-id-1 
AP)(nai-realm )# nai-realm-auth-id-2 
AP)(nai-realm )# nai-realm-auth-value-1 
AP)(nai-realm )# nai-realm-auth-value-2 
AP)(nai-realm )# nai-home-realm
AP)(nai-realm )# enable
AP)(nai-realm )# end
AP)# commit apply

You can specify any of the following EAP methods for the nai-realm-eap-method  command:
l

identity— To use EAP Identity type. The associated numeric value is 1.

l

notification—To allow the hotspot realm to use EAP Notification messages for authentication. The associated
numeric value is 2.

l

one-time-password—To use Authentication with a single-use password. The associated numeric value is 5.

l

generic-token-card—To use EAP Generic Token Card (EAP-GTC). The associated numeric value is 6.

l

eap-tls—To use EAP-Transport Layer Security. The associated numeric value is 13.

l

eap-sim—To use EAP for GSM Subscriber Identity Modules. The associated numeric value is 18.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Hotspot Profiles | 340

l

eap-ttls—To use EAP-Tunneled Transport Layer Security. The associated numeric value is 21.

l

peap—To use protected Extensible Authentication Protocol. The associated numeric value is 25.

l

crypto-card— To use crypto card authentication. The associated numeric value is 28.

l

peapmschapv2— To use PEAP with Microsoft Challenge Handshake Authentication Protocol version 2
(MSCHAPV2). The associated numeric value is 29.

l

eap-aka—To use EAP for UMTS Authentication and Key Agreement. The associated numeric value is 50.

The following table lists the possible authentication IDs and their respective values:
Table 67: NAI Realm Profile Configuration Parameters
Authentication ID

Authentication Value

reserved
Uses the reserved authentication
method.
l The associated numeric value is 0.

—

expanded-eap
Uses the expanded EAP authentication
method.
l The associated numeric value is 1.

Use expanded-eap as the authentication value.

non-eap-inner-auth
Uses non-EAP inner authentication type.
l The associated numeric value is 2.

The following authentication values apply:

l

l

l

l
l
l
l
l

reserved— The associated numeric value is 0.
pap—The associated numeric value is 1.
chap—The associated numeric value is 2.
mschap—The associated numeric value is 3.
mschapv2—The associated numeric value is 4.

The following authentication values apply:
reserved— The associated numeric value is 0.
l pap—The associated numeric value is 1.
l chap—The associated numeric value is 2.
l mschap—The associated numeric value is 3.
l mschapv2—The associated numeric value is 4.

l

eap-inner-auth
Uses EAP inner authentication type.
l The associated numeric value is 3.

l

exp-inner-eap

Use the exp-inner-eap authentication value.

l
l

Uses the expanded inner EAP
authentication method.
The associated numeric value is 4.

credential
l
l

Uses credential authentication.
The associated numeric value is 5.

The following authentication values apply:
l
l
l
l
l
l
l
l
l
l

341 | Hotspot Profiles

sim— The associated numeric value is 1.
usim— The associated numeric value is 2.
nfc-secure— The associated numeric value is 3.
hw-token— The associated numeric value is 4.
softoken— The associated numeric value is 5.
certificate— The associated numeric value is 6.
uname-passward—The associated numeric value is 7.
none—The associated numeric value is 8.
reserved—The associated numeric value is 9.
vendor-specific—The associated numeric value is 10.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Configuring a Venue Name Profile
You configure a venue name profile to send venue information as an ANQP IE in a GAS query response. To
configure a venue name profile, enter the following commands at the command prompt:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# hotspot anqp-venue-name-profile 
AP)(venue-name )# venue-name 
AP)(venue-name )# venue-group 
AP)(venue-name )# venue-type 
AP)(venue-name )# venue-lang-code 
AP)(venue-name )# enable
AP)(venue-name )# end
AP)# commit apply

You can specify any of the following venue groups and the corresponding venue types:
Table 68: Venue Types
Venue Group

Associated Venue Type Value

unspecified
The associated numeric value is 0.
assembly
The associated numeric value is 1.

l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l

business
The associated numeric value is 2.

l
l
l
l
l
l
l
l
l

educational
The associated numeric value is 3.

l
l
l
l

factory-and-industrial
The associated numeric value is 4.
institutional

l
l

l
l

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

unspecified—The associated numeric value is 0.
arena—The associated numeric value is 1.
stadium—The associated numeric value is 2.
passenger-terminal—The associated numeric value is 3.
amphitheater—The associated numeric value is 4.
amusement-park—The associated numeric value is 5.
place-of-worship—The associated numeric value is 6.
convention-center—The associated numeric value is 7.
library—The associated numeric value is 8.
museum—The associated numeric value is 9.
restaurant—The associated numeric value is 10.
theater—The associated numeric value is 11.
bar —The associated numeric value is 12.
coffee-shop —The associated numeric value is 13.
zoo-or-aquarium —The associated numeric value is 14.
emergency-cord-center—The associated numeric value is 15.
unspecified—The associated numeric value is 0.
doctor—The associated numeric value is 1
bank—The associated numeric value is 2
fire-station—The associated numeric value is 3
police-station—The associated numeric value is 4
post-office—The associated numeric value is 6
professional-office—The associated numeric value is 7
research-and-dev-facility—The associated numeric value is 8
attorney-office—The associated numeric value is 9
unspecified—The associated numeric value is 0.
school-primary—The associated numeric value is 1.
school-secondary—The associated numeric value is 2.
univ-or-college—The associated numeric value is 3.
unspecified—The associated numeric value is 0.
factory—The associated numeric value is 1.
unspecified—The associated numeric value is 0.
hospital—The associated numeric value is 1.

Hotspot Profiles | 342

Venue Group

Associated Venue Type Value

The associated numeric value is 5.

l
l
l
l

mercantile
The associated numeric value is 6.

l
l
l
l
l
l

residential
The associated numeric value is 7.

l
l
l
l
l

long-term-care—The associated numeric value is 2.
alc-drug-rehab—The associated numeric value is 3.
group-home—The associated numeric value is 4.
prison-or-jail—The associated numeric value is 5.
unspecified—The associated numeric value is 0.
retail-store—The associated numeric value is 1.
grocery-market—The associated numeric value is 2.
auto-service-station—The associated numeric value is 3.
shopping-mall—The associated numeric value is  4.
gas-station—The associated numeric value is 5
unspecified—The associated numeric value is 0.
private-residence—The associated numeric value is 1.
hotel—The associated numeric value is 3
dormitory—The associated numeric value is 4
boarding-house—The associated numeric value is 5.

storage
The associated numeric value is 8.

unspecified—The associated numeric value is 0.

utility-misc

unspecified—The associated numeric value is 0.

The associated numeric value is 9.
vehicular

l

The associated numeric value is 10

l
l
l
l
l
l
l

outdoor

l

The associated numeric value is 11.

l
l
l
l
l
l

unspecified—The associated numeric value is 0.
automobile-or-truck—The associated numeric value is 1.
airplane—The associated numeric value is 2.
bus—The associated numeric value is 3.
ferry—The associated numeric value is 4.
ship —The associated numeric value is 5.
train —The associated numeric value is 6.
motor-bike—The associated numeric value is 7.
unspecified—The associated numeric value is 0
muni-mesh-network—The associated numeric value is 1.
city-park—The associated numeric value is 2.
rest-area—The associated numeric value is 3.
traffic-control—The associated numeric value is 4
bus-stop—The associated numeric value is 5
kiosk —The associated numeric value is 6

Configuring a Network Authentication Profile
You can configure a network authentication profile to define the authentication type used by the hotspot network. To
configure a network authentication profile, enter the following commands at the command prompt:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# hotspot anqp-nwk-auth-profile 
AP)(network-auth )# nwk-auth-type 
AP)(network-auth )# url 
AP)(network-auth )# enable
AP)(network-auth )# end
AP)# commit apply

You can specify any of the following network authentication type for the nwk-auth-type  command:
l

accept-term-and-cond—When configured, the network requires the user to accept terms and conditions. This
option requires you to specify a redirection URL string as an IP address, FQDN or URL.

l

online-enrollment—When configured, the network supports the online enrollment.

343 | Hotspot Profiles

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

l

http-redirect—When configured, additional information on the network is provided through HTTP/HTTPS
redirection.

l

dns-redirect—When configured, additional information on the network is provided through DNS redirection. This
option requires you to specify a redirection URL string as an IP address, FQDN, or URL.

Configuring a Roaming Consortium Profile
You can configure a roaming consortium profile to send the roaming consortium information as an ANQP IE in a GAS
query response. To configure a roaming consortium profile, enter the following commands at the command prompt:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# hotspot anqp-roam-cons-profile 
AP)(roaming-consortium )# roam-cons-oi 
AP)(roaming-consortium )# roam-cons-oi-len 
AP)(roaming-consortium )# enable
AP)(roaming-consortium )# end
AP)# commit apply

Specify a hexadecimal string of 3 to 5 octets for roam-cons-oi .
Based on the OI specified, you can specify the following parameters for the length of OI in roam-cons-oi-len
.
l

For 0: 0 Octets in the OI (Null)

l

For 3: OI length is 24-bit (3 Octets)

l

For 5: OI length is 36-bit (5 Octets)

Configuring a 3GPP Profile
You can configure a 3rd Generation Partnership Project (3GPP) profile to define information for the 3G Cellular
Network for hotspots.
To configure a 3GPP profile, enter the following commands at the command prompt:
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# hotspot anqp-3gpp-profile 
AP)(3gpp )# 3gpp-plmn1 
AP)(3gpp )# enable
AP)(3gpp )# end
AP)# commit apply

The Public Land Mobile Network (PLMN) ID is a combination of the mobile country code and network code. You can
specify up to 6 PLMN IDs for a 3GPP profile.

Configuring an IP Address Availability Profile
You can configure the available IP address types to send information on IP address availability as an ANQP IE in a
GAS query response. To configure an IP address availability profile, enter the following commands at the command
prompt:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# hotspot anqp-ip-addr-avail-profile 
AP)(IP-addr-avail )# ipv4-addr-avail
AP)(IP-addr-avail )# ipv6-addr-avail
AP)(IP-addr-avail )# enable
AP)(IP-addr-avail )# end
AP)# commit apply

Configuring a Domain Profile
You can configure a domain profile to send the domain names as an ANQP IE in a GAS query response. To
configure a domain name profile, enter the following commands at the command prompt:
(Instant AP)(config)# hotspot anqp-domain-name-profile 
(Instant AP)(domain-name )# domain-name 
(Instant AP)(domain-name )# enable

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Hotspot Profiles | 344

(Instant AP)(domain-name )# end
(Instant AP)# commit apply

Configuring an Operator-friendly Profile
You can configure the operator-friendly name profile to define the identify the operator. To configure an H2QP
operator-friendly name profile:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# hotspot h2qp-oper-name-profile 
AP)(operator-friendly-name )# op-fr-name 
AP)(operator-friendly-name )# op-lang-code 
AP)(operator-friendly-name )# enable
AP)(operator-friendly-name )# end
AP)# commit apply

Configuring a Connection Capability Profile
You can configure a Connection Capability profile to define information such as the hotspot IP protocols and
associated port numbers that are available for communication. To configure an H2QP connection capability profile:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config) # hotspot h2qp-conn-cap-profile
AP)(connection-capabilities )# esp-port
AP)(connection-capabilities )# icmp
AP)(connection-capabilities )# tcp-ftp
AP)(connection-capabilities )# tcp-http
AP)(connection-capabilities )# tcp-pptp-vpn
AP)(connection-capabilities )# tcp-ssh
AP)(connection-capabilities )# tcp-tls-vpn
AP)(connection-capabilities )# tcp-voip
AP)(connection-capabilities )# udp-ike2
AP)(connection-capabilities )# udp-ipsec-vpn
AP)(connection-capabilities )# udp-voip
AP)(connection-capabilities )# enable
AP)(connection-capabilities )# end
AP)# commit apply

Configuring an Operating Class Profile
You can configure an operating class profile to list the channels on which the hotspot is capable of operating. To
configure an H2QP operating class profile:
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config) # hotspot h2qp-oper-class-profile 
AP)(operator-class )# op-class 
AP)(operator-class )# enable
AP)(operator-class )# end
AP)# commit apply

Configuring a WAN Metrics Profile
You can configure a WAN metrics profile to define information about access network characteristics such as link
status and metrics. To configure a WAN metrics profile:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# hotspot h2qp-wan-metrics-profile 
AP)(WAN-metrics )# at-capacity
AP)(WAN-metrics )# downlink-load 
AP)(WAN-metrics )# downlink-speed 
AP)(WAN-metrics )# load-duration 
AP)(WAN-metrics )# symm-link
AP)(WAN-metrics )# uplink-load 
AP)(WAN-metrics )# uplink-speed 
AP)(WAN-metrics )# wan-metrics-link-status 
AP)(WAN-metrics )# end
AP)# commit apply

You can specify the following WAN downlink and uplink parameters:
345 | Hotspot Profiles

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

l

Downlink load— Indicates the percentage of the WAN downlink currently utilized. The default value of 0
indicates that the downlink speed is unknown or unspecified.

l

Downlink speed —Indicates the WAN downlink speed in Kbps.

l

Uplink load—Indicates the percentage of the WAN uplink currently utilized. The default value of 0 indicates that
the downlink speed is unknown or unspecified.

l

Uplink speed—Indicates the WAN uplink speed in Kbps.

l

Load duration—Indicates the duration in seconds during which the downlink utilization is measured.

l

Symmetric links—Indicates if the uplink and downlink have the same speed.

l

WAN Link Status— Indicates if the WAN is down (link-down), up (link-up), or in test state (link-under-test).

Creating a Hotspot Profile
To create a hotspot profile:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# hotspot hs-profile 
AP)(Hotspot2.0 )# asra
AP)(Hotspot2.0 )# access-network-type 
AP)(Hotspot2.0 )# addtl-roam-cons-ois 
AP)(Hotspot2.0 )# comeback-mode
AP)(Hotspot2.0 )# gas-comeback 
AP)(Hotspot2.0 )# group-frame-block
AP)(Hotspot2.0 )# hessid 
AP)(Hotspot2.0 )# internet
AP)(Hotspot2.0 )# p2p-cross-connect
AP)(Hotspot2.0 )# p2p-dev-mgmt
AP)(Hotspot2.0 )# pame-bi
AP)(Hotspot2.0 )# query-response-length-limit 
AP)(Hotspot2.0 )# roam-cons-len-1 
AP)(Hotspot2.0 )# roam-cons-len-2 
AP)(Hotspot2.0 )# roam-cons-len-3 
AP)(Hotspot2.0 )# roam-cons-oi-1 
AP)(Hotspot2.0 )# roam-cons-oi-2 
AP)(Hotspot2.0 )# roam-cons-oi-3 
AP)(Hotspot2.0 )# venue-group 
AP)(Hotspot2.0 )# venue-type 
AP)(Hotspot2.0 )# enable
AP)(Hotspot2.0 )# end
AP)#commit apply

The hotspot profile configuration parameters are described in the following table:

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Hotspot Profiles | 346

Table 69: Hotspot Configuration Parameters
Parameter

Description

access-networktype 

Specify any of the following 802.11u network types.
l private — This network is accessible for authorized users only. For example, home networks
or enterprise networks that require user authentication. The corresponding integer value for
this network type is 0.
l private-with-guest — This network is accessible to guest users based on guest authentication
methods. For example, enterprise networks that allow guest users with captive portal
authentication. The corresponding integer value for this network type is 1.
l chargeable-public — This network provides access to the Internet based on payment. For
example, a subscription-based Internet access in a coffee shop or a hotel offering chargeable
in-room Internet access service. The corresponding integer value for this network type is 2.
l free-public —This network is accessible to all without any charges applied. For example, a
hotspot in airport or other public places that provide Internet access with no additional cost.
The corresponding integer value for this network type is 3.
l personal-device — This network is accessible for personal devices. For example, a laptop or
camera configured with a printer for the purpose of printing. The corresponding integer value
for this network type is 4.
l emergency-services —This network is limited to accessing emergency services only. The
corresponding integer value for this network type is 5.
l test — This network is used for test purposes only. The corresponding integer value for this
network type is 14.
l wildcard —This network indicates a wildcard network. The corresponding integer value for this
network type is 15.

addtl-roam-consois

Specify the number of additional roaming consortium Organization Identifiers (OIs) advertised by
the AP. You can specify up to three additional OIs.

asra

Enable the Additional Steps Required for Access (asra) to indicate if additional steps are
required for authentication. When enabled, the following information is sent to the client in
response to an ANQP query. For ASRA, ensure that the network authentication type is
associated.

comeback-mode

Enable this parameter to allow the client to obtain a GAS Request and Response as a
Comeback-Request and Comeback-Response. By default, this comeback mode is disabled.

gas-comebackdelay

Specify a GAS come back delay interval in milliseconds to allow the client to retrieve the query
response using a comeback request action frame when the GAS response is delayed. You can
specify a value within the range of 100-2000 milliseconds and the default value is 500
milliseconds.

group-frameblock

Enable this parameter if you want to stop the AP from sending forward downstream groupaddressed frames.

hessid

Specify a Homogenous Extended Service Set Identifier (HESSID) in a hexadecimal format
separated by colons.

internet

Specify this parameter to allow the W-IAP to send an Information Element (IE) indicating that the
network allows Internet access.

p2p-crossconnect

Specify this parameter to advertise support for P2P Cross Connections.

p2p-dev-mgmt

Specify this parameter to advertise support for P2P device management.

pame-bi

Specify this parameter to enable Pre-Association Message Exchange BSSID Independent
(PAME-BI) bit, with which the W-IAP can indicate that the Advertisement Server can return a
query response independent of the BSSID used in the GAS Frame exchange.

347 | Hotspot Profiles

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 69: Hotspot Configuration Parameters
Parameter

Description

queryresponselength-limit

Specify this parameter to set the maximum length of the GAS query response, in octets. You can
specify a value within the range of 1-127. The default value is 127.

roam-cons-len1
roam-cons-len2
roam-cons-len3

Specify the length of the organization identifier. The value of the roam-cons-len-1, roam-conslen-2, or roam-cons-len-3. The roaming consortium OI is based on the following parameters:
l 0: Zero Octets in the OI (Null)
l 3: OI length is 24-bit (3 Octets)
l 5: OI length is 36-bit (5 Octets)

venue-group

Specify one of the following venue groups
l assembly
l business
l educational
l factory-and-industrial
l institutional
l mercantile
l outdoor
l residential
l storage
l utility-and-misc
l vehicular

By default, the business venue group is used.
venue-type

Specify a venue type to be advertised in the ANQP IEs from W-IAPs associated with this hotspot
profile. For more information about the supported venue types for each venue group, see Table
68.

Associating an Advertisement Profile to a Hotspot Profile
To associate a hotspot profile with an advertisement profile:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# hotspot hs-profile 
AP)(Hotspot2.0 )# advertisement-protocol 
AP)(Hotspot2.0 )# advertisement-profile anqp-3gpp 
AP)(Hotspot2.0 )# advertisement-profile anqp-domain-name 
AP)(Hotspot2.0 )# advertisement-profile anqp-ip-addr-avail 
AP)(Hotspot2.0 )# advertisement-profile anqp-nai-realm 
AP)(Hotspot2.0 )# advertisement-profile anqp-nwk-auth 
AP)(Hotspot2.0 )# advertisement-profile anqp-roam-cons 
AP)(Hotspot2.0 )# advertisement-profile anqp-venue-name 
AP)(Hotspot2.0 )# advertisement-profile h2qp-conn-cap 
AP)(Hotspot2.0 )# advertisement-profile h2qp-oper-class 
AP)(Hotspot2.0 )# advertisement-profile h2qp-oper-name 
AP)(Hotspot2.0 )# advertisement-profile h2qp-wan-metrics 
AP)(Hotspot2.0 )# end
AP)# commit apply

The configuration parameters for associating an advertisement profile with a hotspot profile are described in the
following table:

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Hotspot Profiles | 348

Table 70: Advertisement Association Parameters
Parameter

Description

advertisementprofile

Specify the advertisement profile to associate with this hotspot profile. For information on
advertisement profiles, see Creating Advertisement Profiles for Hotspot Configuration on
page 340.

advertisementprotocol

Specify the advertisement protocol types as Access Network Query Protocol (ANQP) as
anqp.

Creating a WLAN SSID and Associating Hotspot Profile
To create a WLAN SSID with Enterprise Security and WPA2 Encryption Settings:
(Instant AP)(config)# wlan ssid-profile 
(Instant AP)(SSID Profile # essid 
(Instant AP)(SSID Profile # type { | | }
(Instant AP)(SSID Profile # vlan 
(Instant AP)(SSID Profile # set-vlan {equals|not-equals|starts-with|endswith|contains}  | value-of}
(Instant AP)(SSID Profile # opmode {wpa2-aes|wpa-tkip,wpa2-aes}
(Instant AP)(SSID Profile # blacklist
(Instant AP)(SSID Profile # mac-authentication
(Instant AP)(SSID Profile # l2-auth-failthrough
(Instant AP)(SSID Profile # termination
(Instant AP)(SSID Profile # external-server
(Instant AP)(SSID Profile # auth-server 
(Instant AP)(SSID Profile # server-load-balancing
(Instant AP)(SSID Profile # radius-accounting
(Instant AP)(SSID Profile # radius-accounting-mode {user-authentication| userassociation}
(Instant AP)(SSID Profile # radius-interim-accounting-interval 
(Instant AP)(SSID Profile # radius-reauth-interval 
(Instant AP)(SSID Profile # set-role-by-ssid
(Instant AP)(SSID Profile )# hotspot-profile 
(Instant AP)(SSID Profile # end
(Instant AP)# commit apply

Sample Configuration
Step 1 - Creating ANQP and H2QP Advertisement Profile
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)# configure terminal
AP)(config)# hotspot anqp-nai-realm-profile nr1
AP)(nai-realm "nr1")# nai-realm-name name1
AP)(nai-realm "nr1")# nai-realm-encoding utf8
AP)(nai-realm "nr1")# nai-realm-eap-method eap-sim
AP)(nai-realm "nr1")# nai-realm-auth-id-1 non-eap-inner-auth
AP)(nai-realm "nr1")# nai-realm-auth-value-1 mschapv2
AP)(nai-realm "nr1")# nai-home-realm
AP)(nai-realm "nr1")# exit

(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)(config)# hotspot anqp-venue-name-profile vn1
AP)(venue-name "vn1")# venue-group business
AP)(venue-name "vn1")# venue-type research-and-dev-facility
AP)(venue-name "vn1")# venue-lang-code eng
AP)(venue-name "vn1")# venue-name VenueName
AP)(venue-name "vn1")# exit

(Instant AP)(config)# hotspot anqp-nwk-auth-profile na1

349 | Hotspot Profiles

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

(Instant AP)(network-auth "na1")# nwk-auth-type accept-term-and-cond
(Instant AP)(network-auth "na1")# url www.nwkauth.com
(Instant AP)(network-auth "na1")# exit
(Instant
(Instant
(Instant
(Instant

AP)(config)# hotspot anqp-roam-cons-profile rc1
AP)(roaming-consortium "rc1")# roam-cons-oi-len 3
AP)(roaming-consortium "rc1")# roam-cons-oi 888888
AP)(roaming-consortium "rc1")# exit

(Instant AP)(config)# hotspot anqp-3gpp-profile 3g
(Instant AP)(3gpp "3g")# 3gpp-plmn1 40486
(Instant AP)(3gpp "3g")# exit
(Instant
(Instant
(Instant
(Instant

AP)(config)# hotspot anqp-ip-addr-avail-profile ip1
AP)(IP-addr-avail "ip1")# no ipv4-addr-avail
AP)(IP-addr-avail "ip1")# ipv6-addr-avail
AP)(IP-addr-avail "ip1")# exit

(Instant AP)(config)# hotspot anqp-domain-name-profile dn1
(Instant AP)(domain-name "dn1")# domain-name DomainName
(Instant AP)(domain-name "dn1")# exit
(Instant
(Instant
(Instant
(Instant

AP)(config)# hotspot h2qp-oper-name-profile on1
AP)(operator-friendly-name"on1")# op-lang-code eng
AP) operator-friendly-name"on1")# op-fr-name OperatorFriendlyName
AP) (operator-friendly-name"on1")# exit

Step 2: Creating a hotspot profile
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)# configure terminal
AP)(config)# hotspot hs-profile hs1
AP)(Hotspot2.0 "hs1")# enable
AP)(Hotspot2.0 "hs1")# comeback-mode
AP)(Hotspot2.0 "hs1")# gas-comeback-delay 10
AP)(Hotspot2.0 "hs1")# no asra
AP)(Hotspot2.0 "hs1")# no internet
AP)(Hotspot2.0 "hs1")# query-response-length-limit 20
AP)(Hotspot2.0 "hs1")# access-network-type chargeable-public
AP)(Hotspot2.0 "hs1")# roam-cons-len-1 3
AP)(Hotspot2.0 "hs1")# roam-cons-oi-1 123456
AP)(Hotspot2.0 "hs1")# roam-cons-len-2 3
AP)(Hotspot2.0 "hs1")# roam-cons-oi-2 223355
AP)(Hotspot2.0 "hs1")# addtl-roam-cons-ois 0
AP)(Hotspot2.0 "hs1")# venue-group business
AP)(Hotspot2.0 "hs1")# venue-type research-and-dev-facility
AP)(Hotspot2.0 "hs1")# pame-bi
AP)(Hotspot2.0 "hs1")# group-frame-block
AP)(Hotspot2.0 "hs1")# p2p-dev-mgmt
AP)(Hotspot2.0 "hs1")# p2p-cross-connect
AP)(Hotspot2.0 "hs1")# end
AP)# commit apply

Step 3: Associating advertisement profiles with the hotspot profile
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

AP)# configure terminal
AP)(config)# hotspot hs-profile hs1
AP)(Hotspot2.0 "hs1")# advertisement-profile
AP)(Hotspot2.0 "hs1")# advertisement-profile
AP)(Hotspot2.0 "hs1")# advertisement-profile
AP)(Hotspot2.0 "hs1")# advertisement-profile
AP)(Hotspot2.0 "hs1")# advertisement-profile
AP)(Hotspot2.0 "hs1")# advertisement-profile
AP)(Hotspot2.0 "hs1")# advertisement-profile
AP)(Hotspot2.0 "hs1")# advertisement-profile

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

anqp-nai-realm nr1
anqp-venue-name vn1
anqp-nwk-auth na1
anqp-roam-cons rc1
anqp-3gpp 3g1
anqp-ip-addr-avail ip1
anqp-domain-name dn1
h2qp-oper-name on1
Hotspot Profiles | 350

(Instant
(Instant
(Instant
(Instant

AP)(Hotspot2.0
AP)(Hotspot2.0
AP)(Hotspot2.0
AP)(Hotspot2.0

"hs1")#
"hs1")#
"hs1")#
"hs1")#

advertisement-profile h2qp-wan-metrics wm1
advertisement-profile h2qp-conn-cap cc1
advertisement-profile h2qp-oper-class oc1
exit

Step 4: Associate the hotspot profile with WLAN SSID:
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant
(Instant

351 | Hotspot Profiles

AP)# configure terminal
AP)# wlan ssid-profile ssidProfile1
AP)(SSID Profile "ssidProfile1")# essid hsProf
AP)(SSID Profile "ssidProfile1")# type employee
AP)(SSID Profile "ssidProfile1")# vlan 200
AP)(SSID Profile "ssidProfile1")# opmode wpa2-aes
AP)(SSID Profile "ssidProfile1")# blacklist
AP)(SSID Profile "ssidProfile1")# mac-authentication
AP)(SSID Profile "ssidProfile1")# l2-auth-failthrough
AP)(SSID Profile "ssidProfile1")# radius-accounting
AP)(SSID Profile "ssidProfile1")# radius-accounting-mode user-association
AP)(SSID Profile "ssidProfile1")# radius-interim-accounting-interval 10
AP)(SSID Profile "ssidProfile1")# radius-reauth-interval 20
AP)(SSID Profile "ssidProfile1")# max-authentication-failures 2
AP)(SSID Profile "ssidProfile1")# set-role-by-ssid
AP)(SSID Profile "ssidProfile1")# hotspot-profile hs1
AP)(SSID Profile "ssidProfile1")# end
AP)# commit apply

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

ClearPass Guest Setup

To configure ClearPass Guest:
1. On ClearPass Guest, navigate to Administration > AirGroup Services.
2. Click Configure AirGroup Services.
Figure 128 Configure AirGroup Services

3. Click Add a new controller.
4. Update the fields with the appropriate information.
Ensure that the port configured matches the CoA port (RFC 3576) set on the W-IAP configuration.

5. Click Save Configuration.
In order to demonstrate AirGroup, either an AirGroup Administrator or an AirGroup Operator account must be created.
1. Navigate to the ClearPass Policy Manager UI, and navigate to Configuration > Identity > Local Users.
Figure 129 Configuration > Identity > Local Users Selection

2. Click Add User.
3. Create an AirGroup Administrator.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

ClearPass Guest Setup | 352

Figure 130 Create an AirGroup Administrator

4. In this example, the password used is test123. Click Add.
5. Now click Add User, and create an AirGroup Operator.
Figure 131 Create an AirGroup Operator

6. Click Add to save the user with an AirGroup Operator role. The AirGroup Administrator and AirGroup
Operator IDs will be displayed in the Local Users UI screen.

353 | ClearPass Guest Setup

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Figure 132 Local Users UI Screen

7. Navigate to the ClearPass Guest UI and click Logout. The ClearPass Guest Login page is displayed. Use the
AirGroup admin credentials to log in.
8. After logging in, click Create Device.
Figure 133 Create a Device

The following page is displayed.
Figure 134 - Register Shared Device

For this test, add your AppleTV device name and MAC address but leave all other fields empty.
Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

ClearPass Guest Setup | 354

9. Click Register Shared Device.

Testing
To verify the setup:
1. Disconnect your AppleTV and OSX Mountain Lion/iOS 6 devices if they were previously connected to the
wireless network. Remove their entries from the controller’s user table using these commands:
n

Find the MAC address— show user table

n

Delete the address from the table— aaa user delete mac 00:aa:22:bb:33:cc

2. Reconnect both devices. To limit access to the AppleTV, access the ClearPass Guest UI using either the
AirGroup admin or the AirGroup operator credentials. Next, navigate to List Devices > Test Apple TV > Edit.
Add a username that is not used to log in to the Apple devices in the Shared With field.
3. Disconnect and remove the OSX Mountain Lion/iOS 6 device from the controller’s user table. Reconnect the
device by not using the username that you added to the Shared With field. The AppleTV should not be available
to this device.
4. Disconnect the OSX Mountain Lion/iOS 6 device and delete it from the controller’s user table. Reconnect using
the username that was added to the Shared With field. The OSX Mountain Lion/iOS 6 device should once again
have access to the AppleTV.

Troubleshooting
Table 71: Troubleshooting
Problem

Solution

Limiting devices has no effect.

Ensure IPv6 is disabled.

Apple Macintosh running Mountain Lion can use
AirPlay but iOS devices cannot.

Ensure IPv6 is disabled.

355 | ClearPass Guest Setup

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

IAP-VPN Deployment Scenarios

This section describes the most common IAP-VPN deployments models and provides information to carry out the
necessary configuration procedures. The examples in this section refer to more than one DHCP profile and wired
port configuration in addition to wireless SSID configuration. All these are optional. In most networks, a single DHCP
profile and wireless SSID configuration referring a DHCP profile is sufficient.
The following scenarios are described in this section:
l

Scenario 1 - IPSec: Single Datacenter Deployment with No Redundancy on page 357

l

Scenario 2 - IPSec: Single Datacenter with Multiple Controllers for Redundancy on page 360

l

Scenario 3 - IPSec: Multiple Datacenter Deployment with Primary and Backup Controllers for Redundancy on
page 364

l

Scenario 4 - GRE: Single Datacenter Deployment with No Redundancy on page 369

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

IAP-VPN Deployment Scenarios | 356

Scenario 1 - IPSec: Single Datacenter Deployment with No
Redundancy
This scenario includes the following configuration elements:
1. Single VPN primary configuration using IPSec
2. Split tunneling of client traffic
3. Split tunneling of DNS traffic from clients
4. Distributed L3 and Centralized L2 mode DHCP
5. RADIUS server within corporate network and authentication survivability for branch survivability
6. Wired and wireless users in L2 and L3 modes respectively
7. Access rules defined for wired and wireless networks to permit all traffic

Topology
Figure 135 shows the topology and the IP addressing scheme used in this scenario.
Figure 135 Scenario 1 - IPSec: Single datacenter Deployment with No Redundancy

The following IP addresses are used in the examples for this scenario:
l

10.0.0.0/8 is the corporate network

l

10.20.0.0/16 subnet is reserved for L2 mode

l

10.30.0.0/16 subnet is reserved for L3 mode

l

Client count in each branch is 200

AP Configuration
The following table provides information on the configuration steps performed through the CLI with example values.
For information on the UI procedures, see the topics referenced in the UI Navigation Details column.

357 | IAP-VPN Deployment Scenarios

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 72: W-IAP Configuration for Scenario 1 - IPSec: Single Datacenter Deployment with No Redundancy
Configuration Steps

CLI Commands

UI Procedure

1. Configure the primary
host for VPN with the
Public VRRP IP address
of the controller.

(ap)(config)# vpn primary 

See
Configuring an
IPSec Tunnel

2. Configure a routing
profile to tunnel all
10.0.0.0/8 subnet traffic to
controller.

(ap)(config)# routing-profile
(ap)(routing-profile)# route 10.0.0.0 255.0.0.0 

See
Configuring
Routing
Profiles

3. Configure Enterprise
DNS for split DNS. The
example in the next
column uses a specific
enterprise domain to only
tunnel all DNS queries
matching that domain to
corporate.

(ap)(config)# internal-domains
(ap)(domains)# domain-name corpdomain.com

See
Configuring
Enterprise
Domains

4. Configure centralized L2
and distributed L3 with
VLAN 20 and 30
respectively.

Centralized L2 profile (ap)(config)# ip dhcp l2-dhcp
(ap)(DHCP Profile "l2-dhcp")# server-type
Centralized,L2
(ap)(DHCP Profile "l2-dhcp")# server-vlan 20
Distributed L3 profile
(ap)(config)# ip dhcp l3-dhcp
(ap)(DHCP Profile "l3-dhcp")# server-type
Distributed,L3
(ap)(DHCP Profile "l3-dhcp")# server-vlan 30
(ap)(DHCP Profile "l3-dhcp")# ip-range 10.30.0.0
10.30.255.255
(ap)(DHCP Profile "l3-dhcp")# dns-server
10.1.1.50,10.1.1.30
(ap)(DHCP Profile "l3-dhcp")# domain-name
corpdomain.com
(ap)(DHCP Profile "l3-dhcp")# client-count 200

See
Configuring a
Centralized
DHCP Scope
and
Configuring
Distributed
DHCP Scopes

NOTE: The IP range configuration on each branch will be the
same. Each W-IAP will derive a smaller subnet based on the client
count scope using the Branch ID (BID) allocated by controller.
5. Create authentication
servers for user
authentication. The
example in the next
column assumes 802.1x
SSID.

(ap)(config)# wlan auth-server server1
(ap)(Auth Server "server1")# ip 10.2.2.1
(ap)(Auth Server "server1")# port 1812
(ap)(Auth Server "server1")# acctport 1813
(ap)(Auth Server "server1")# key "presharedkey"
(ap)(Auth Server "server1")# exit
(ap)(config)# wlan auth-server server2
(ap)(Auth Server "server2")# ip 10.2.2.2
(ap)(Auth Server "server2")# port 1812
(ap)(Auth Server "server2")# acctport 1813
(ap)(Auth Server "server2")# key "presharedkey"

See
Configuring an
External Server
for
Authentication

6. Configure wired and
wireless SSIDs using the
authentication servers
and access rules created

Configure wired ports to operate in L2 mode and associate
centralized L2 mode VLAN 20 to the wired port profile.
(ap)(config) # wired-port-profile wired-port

See
Configuring a
Wired Profile
and Wireless

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

IAP-VPN Deployment Scenarios | 358

Table 72: W-IAP Configuration for Scenario 1 - IPSec: Single Datacenter Deployment with No Redundancy
Configuration Steps
above and enable
authentication
survivability.

CLI Commands

UI Procedure

(ap)(wired-port-profile "wired-port")# switchportmode access
(ap)(wired-port-profile "wired-port")# allowed-vlan
all
(ap)(wired-port-profile "wired-port")# native-vlan
20
(ap)(wired-port-profile "wired-port")# no shutdown
(ap)(wired-port-profile "wired-port")# access-rulename wired-port
(ap)(wired-port-profile "wired-port")# type employee
(ap)(wired-port-profile "wired-port")# auth-server
server1
(ap)(wired-port-profile "wired-port")# auth-server
server2
(ap)(wired-port-profile "wired-port")# dot1x
(ap)(wired-port-profile "wired-port")# exit
(ap)(config)# enet1-port-profile wired-port

Network
Profiles

Configure a wireless SSID to operate in L3 mode and associate
distributed L3 mode VLAN 30 to the WLAN SSID profile.
(ap)(config) # wlan ssid-profile wireless-ssid
(ap)(SSID Profile "wireless-ssidt")# enable
(ap)(SSID Profile "wireless-ssid")# type employee
(ap)(SSID Profile "wireless-ssid")# essid wirelessssid
(ap)(SSID Profile "wireless-ssid")# opmode wpa2-aes
(ap)(SSID Profile "wireless-ssid")# vlan 30
(ap)(SSID Profile "wireless-ssid")# auth-server
server1
(ap)(SSID Profile "wireless-ssid")# auth-server
server2
(ap)(SSID Profile "wireless-ssid")# authsurvivability
7. Create access rule for
wired and wireless
authentication. In this
example, the rule permits
all traffic.

For wired profile:
(ap)(config)# wlan access-rule wired-port
(ap)(Access Rule "wired-port")# rule any any match
any any any
permit

See
Configuring
Access Rules
for Network
Services

For WLAN SSID:
(ap)(config)# wlan access-rule wireless-ssid
(ap)(Access Rule "wireless-ssid")# rule any any
match any any any permit
NOTE: Ensure that you execute the commit apply command in the Instant CLI before saving the configuration and
propagating changes across the W-IAP cluster.

AP Connected Switch Configuration
Client VLANs defined in this example must be opened on the upstream switches in multi AP deployments, as client
traffic from slave to master is tagged with the client VLAN.

Datacenter Configuration
For information on controller configuration, see Configuring a Controller for IAP-VPN Operations on page 227.
Ensure that the upstream router is configured with a static route pointing to the controller for the L3 VLAN.

359 | IAP-VPN Deployment Scenarios

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Scenario 2 - IPSec: Single Datacenter with Multiple Controllers for
Redundancy
This scenario includes the following configuration elements:
l

A VRRP instance between the master/standby-master pair, which is configured as the primary VPN IP address.

l

Tunneling of all traffic to datacenter.

l

Exception route to bypass tunneling of RADIUS and W-AirWave traffic, which are locally reachable in the branch
and the Internet respectively.

l

All client DNS queries are tunneled to the controller.

l

Distributed L3 and Centralized L2 mode DHCP on all branches. L3 is used by the employee network and L2 is
used by the guest network with captive portal.

l

Wired and wireless users in L2 and L3 modes.

l

Access rules defined for wired and wireless networks.

Topology
Figure 136 shows the topology and the IP addressing scheme used in this scenario.
Figure 136 Scenario 2 - IPSec: Single Datacenter with Multiple controllers for Redundancy

The following IP addresses are used in the examples for this scenario:
l

10.0.0.0/8 is the corporate network

l

10.20.0.0/16 subnet is reserved for L2 mode – used for guest network

l

10.30.0.0/16 subnet is reserved for L3 mode

l

Client count in each branch is 200

360 | IAP-VPN Deployment Scenarios

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

l

10.2.2.0/24 is a branch owned subnet, which needs to override global routing profile

l

199.127.104.32 is used an example IP address of the W-AirWave server in the Internet

AP Configuration
The following table provides information on the configuration steps performed through the CLI with example values.
For information on the UI procedures, see the topics referenced in the UI Navigation Details column.
Table 73: W-IAP Configuration for Scenario 2 - IPSec: Single Datacenter with Multiple controllers for Redundancy
Configuration Steps

CLI Commands

UI Procedure

1. Configure the primary
host for VPN with the
Public VRRP IP address
of the controller.

(ap)(config)# vpn primary 

See
Configuring an
IPSec Tunnel

2. Configure routing profiles
to tunnel traffic through
IPSec.

(ap)(config)# routing-profile
(ap)(routing-profile)# route 0.0.0.0 0.0.0.0 

See
Configuring
Routing
Profiles

3. Define routing profile
exception RADIUS server
and W-AirWave IPs, since
the design requirement
for this solution requires
local RADIUS
authentication, even
though the IP matches the
routing profile destination.

(ap)(config)# routing-profile
(ap)(routing-profile)# route 10.2.2.1
255.255.255.255 0.0.0.0
(ap)(routing-profile)# route 10.2.2.2
255.255.255.255 0.0.0.0
(ap)(routing-profile)# route 199.127.104.32
255.255.255.255 0.0.0.0

See
Configuring
Routing
Profiles

4. Configure Enterprise
DNS. The configuration
example in the next
column tunnels all DNS
queries to the original
DNS server of clients
without proxying on WIAP.

(ap)(config)# internal-domains
(ap)(domains)# domain-name *

See
Configuring
Enterprise
Domains

5. Configure centralized L2
and distributed L3 with
VLAN 20 and 30
respectively.

Centralized L2 profile
(ap)(config)# ip dhcp l2-dhcp
(ap)(DHCP Profile "l2-dhcp")#
Centralized,L2
(ap)(DHCP Profile "l2-dhcp")#
Distributed L3 profile
(ap)(config)# ip dhcp l3-dhcp
(ap)(DHCP Profile "l3-dhcp")#
Distributed,L3
(ap)(DHCP Profile "l3-dhcp")#
(ap)(DHCP Profile "l3-dhcp")#
10.30.255.255
(ap)(DHCP Profile "l3-dhcp")#
10.1.1.50,10.1.1.30
(ap)(DHCP Profile "l3-dhcp")#
corpdomain.com
(ap)(DHCP Profile "l3-dhcp")#

See
Configuring a
Centralized
DHCP Scope
and
Configuring
Distributed
DHCP Scopes

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

server-type
server-vlan 20

server-type
server-vlan 30
ip-range 10.30.0.0
dns-server
domain-name
client-count 200

IAP-VPN Deployment Scenarios | 361

Table 73: W-IAP Configuration for Scenario 2 - IPSec: Single Datacenter with Multiple controllers for Redundancy
Configuration Steps

CLI Commands

UI Procedure

NOTE: The IP range configuration on each branch will be the
same. Each W-IAP will derive a smaller subnet based on the client
count scope using the Branch ID (BID) allocated by controller.
6. Create authentication
servers for user
authentication. The
example in the next
column assumes 802.1x
SSID.

(ap)(config)# wlan auth-server server1
(ap)(Auth Server "server1")# ip 10.2.2.1
(ap)(Auth Server "server1")# port 1812
(ap)(Auth Server "server1")# acctport 1813
(ap)(Auth Server "server1")# key "presharedkey"
(ap)(Auth Server "server1")# exit

See
Configuring an
External Server
for
Authentication

(ap)(config)# wlan auth-server server2
(ap)(Auth Server "server2")# ip 10.2.2.2
(ap)(Auth Server "server2")# port 1812
(ap)(Auth Server "server2")# acctport 1813
(ap)(Auth Server "server2")# key "presharedkey"
7. Configure wired and
wireless SSIDs using the
authentication servers
and access rules created
above and enable
authentication
survivability.

Configure wired ports to operate in L3 mode and associate
distributed L3 mode VLAN 30 to the wired port profile.
(ap)(config) # wired-port-profile wired-port
(ap)(wired-port-profile "wired-port")# switchportmode access
(ap)(wired-port-profile "wired-port")# allowed-vlan
all
(ap)(wired-port-profile "wired-port")# native-vlan
30
(ap)(wired-port-profile "wired-port")# no shutdown
(ap)(wired-port-profile "wired-port")# access-rulename wired-port
(ap)(wired-port-profile "wired-port")# type employee
(ap)(wired-port-profile "wired-port")# auth-server
server1
(ap)(wired-port-profile "wired-port")# auth-server
server2
(ap)(wired-port-profile "wired-port")# dot1x
(ap)(wired-port-profile "wired-port")# exit
(ap)(config)# enet1-port-profile wired-port

See
Configuring a
Wired Profile
and Wireless
Network
Profiles

Configure a wireless SSID to operate in L2 mode and associate
Centralized L2 mode VLAN 20 to the WLAN SSID profile.
(ap)(config) # wlan ssid-profile guest
(ap)(SSID Profile "guest")# enable
(ap)(SSID Profile "guest")# type guest
(ap)(SSID Profile "guest")# essid guest
(ap)(SSID Profile "guest")# opmode opensystem
(ap)(SSID Profile "guest")# vlan 20
(ap)(SSID Profile "guest")# auth-server server1
(ap)(SSID Profile "guest")# auth-server server2
(ap)(SSID Profile "guest")# captive-portal internal
NOTE: This example uses internal captive portal use case using
external authentication server. You can also use an external
captive portal example.
NOTE: The SSID type guest is used in this example to enable
configuration of captive portal. However, corporate access through
VPN tunnel is still allowed for this SSID because the VLAN
associated to this SSID is a VPN enabled VLAN (20 in this
example).

362 | IAP-VPN Deployment Scenarios

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 73: W-IAP Configuration for Scenario 2 - IPSec: Single Datacenter with Multiple controllers for Redundancy
Configuration Steps

CLI Commands

UI Procedure

8. Create access rule for
wired and wireless
authentication. In this
example, the rule permits
all traffic.

For wired profile:
(ap)(config)# wlan access-rule wired-port
(ap)(Access Rule "wired-port")# rule any any match
any any any
permit

See
Configuring
Access Rules
for Network
Services

For WLAN SSID:
(ap)(config)# wlan access-rule guest
(ap)(Access Rule "guest")# rule any any match any
any any permit
NOTE: Ensure that you execute the commit apply command in the Instant CLI before saving the configuration and
propagating changes across the W-IAP cluster.

AP Connected Switch Configuration
Client VLANs defined in this example must be opened on the upstream switches in multiple AP deployments, as
client traffic from slave to master is tagged with the client VLAN.

Datacenter Configuration
For information on controller configuration, see Configuring a Controller for IAP-VPN Operations on page 227.
Ensure that the upstream router is configured with a static route pointing to the controller for the L3 VLAN.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

IAP-VPN Deployment Scenarios | 363

Scenario 3 - IPSec: Multiple Datacenter Deployment with Primary and
Backup Controllers for Redundancy
This scenario includes the following configuration elements:
l

Multiple controller deployment model with controllers in different datacenters operating as primary/backup VPN
with fast-failover and pre-emption enabled.

l

Split tunneling of traffic.

l

Split tunneling of client DNS traffic.

l

Two Distributed L3 mode DHCPs, one each for employee and contractors and one Local mode DHCP server.

l

RADIUS server within corporate network and authentication survivability enabled for branch survivability.

l

Wired and wireless users in L3 and NAT modes respectively.

l

Access rules for wired and wireless users with source NAT based rule for contractor roles to bypass global
routing profile.

l

OSPF based route propagation on controller.

Topology
Figure 137 shows the topology and the IP addressing scheme used in this scenario.
Figure 137 Scenario 3 - IPSec: Multiple Datacenter Deployment with Primary and Backup Controllers for
Redundancy

The IP addressing scheme used in this example is as follows:
l

10.0.0.0/8 is the corporate network.

l

10.30.0.0/16 subnet is reserved for L3 mode –used by Employee SSID.

l

10.40.0.0/16 subnet is reserved for L3 mode –used by Contractor SSID.

364 | IAP-VPN Deployment Scenarios

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

l

172.16.20.0/24 subnet is used for NAT mode – used for wired network.

l

Client count in each branch is 200.

l

Contractors are only permitted to reach 10.16.0.0/16 network.

AP Configuration
This section provides information on configuration steps performed through the CLI or the UI.
Table 74: W-IAP Configuration for Scenario 3 - IPSec: Multiple Datacenter Deployment
Configuration Steps

CLI Commands

1. Configure the primary IP
address. This IP address
is the Public IP address of
the controller. Fast
failover is enabled for fast
convergence.

(ap)(config)#
controller>
(ap)(config)#
controlleres>
(ap)(config)#
(ap)(config)#

2. Configure routing profiles
to tunnel traffic through
IPSec.

(ap)(config)# routing-profile
(ap)(routing-profile)# route 0.0.0.0 0.0.0.0 
(ap)(routing-profile)# route 10.0.0.0 255.0.0.0 

See
Configuring
Routing
Profiles

3. Configure Enterprise
DNS for split DNS. The
example in the next
column uses a specific
enterprise domain to
tunnel all DNS queries
matching that domain to
corporate.

(ap)(config)# internal-domains
(ap)(domains)# domain-name corpdomain.com

See
Configuring
Enterprise
Domains

4. Configure distributed L3
DHCP profiles with VLAN
30 and 40.

Distributed L3 profile with VLAN 30
(ap)(config)# ip dhcp l3-dhcp
(ap)(DHCP profile "l3-dhcp")# server-type
Distributed,L3
(ap)(DHCP profile "l3-dhcp")# server-vlan 30
(ap)(DHCP profile "l3-dhcp")# ip-range 10.30.0.0
10.30.255.255
(ap)(DHCP profile "l3-dhcp")# dns-server
10.1.1.50,10.1.1.30
(ap)(DHCP profile "l3-dhcp")# domain-name
corpdomain.com
(ap)(DHCP profile "l3-dhcp")# client-count 200
Distributed L3 profile with VLAN 40
(ap)(config)# ip dhcp l3-dhcp
(ap)(DHCP profile "l3-dhcp")# server-type
Distributed,L3
(ap)(DHCP profile "l3-dhcp")# server-vlan 40
(ap)(DHCP profile "l3-dhcp")# ip-range 10.40.0.0
10.40.255.255
(ap)(DHCP profile "l3-dhcp")# dns-server
10.1.1.50,10.1.1.30
(ap)(DHCP profile "l3-dhcp")# domain-name
corpdomain.com
(ap)(DHCP profile "l3-dhcp")# client-count 200
Local profile with VLAN 20

See
Configuring
Distributed
DHCP Scopes
and
Configuring
Local and
Local,L3
DHCP Scopes

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

UI Procedure
vpn primary 
ospf area 0.0.0.0
ospf redistribute rapng-vpn

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Scenario 4 - GRE: Single Datacenter Deployment with No Redundancy
This scenario includes the following configuration elements:
l

Single VPN primary configuration using GRE
n

Aruba GRE, does not require any configuration on the Dell Networking W-Series Mobility Controller that acts
as a GRE endpoint.

n

Manual GRE, which requires GRE tunnels to be explicitly configured on the GRE-endpoint that can be a Dell
Networking W-Series Mobility Controller or any device that supports GRE termination.

l

Tunneling of all traffic to datacenter

l

Centralized L2 mode DHCP profile

l

RADIUS server within corporate network and authentication survivability for branch survivability.

l

Wired and wireless users in L2 mode

l

Access rules defined for wired and wireless networks to permit all traffic

Topology
Figure 138 shows the topology and the IP addressing scheme used in this scenario:
Figure 138 Scenario 4 - GRE: Single Datacenter Deployment with No Redundancy

The following IP addresses are used in the examples for this scenario:
l

10.0.0.0/8 is the corporate network.

l

10.20.0.0/16 subnet is reserved for L2 mode.

AP Configuration
This section provides information on configuration steps performed through the CLI or the UI.

369 | IAP-VPN Deployment Scenarios

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 75: W-IAP Configuration for Scenario
Configuration Steps

CLI Commands

UI Procedure

1. Configure Aruba GRE or
manual GRE
l Aruba GRE uses an
IPSec tunnel to facilitate
controller configuration
and requires VPN to be
configured. This VPN
tunnel is not used for any
client traffic.
l Manual GRE uses
standard GRE tunnel
configuration and
requires controller
configuration to complete
the GRE tunnel.

Aruba GRE configuration
(ap)(config)# vpn primary 
(ap)(config)# vpn gre-outside

See Enabling
Automatic
Configuration
of GRE Tunnel
and Manually
Configuring a
GRE Tunnel

Manual GRE configuration
(ap)(config)# gre primary 
(ap)(config)# gre type 80
Per-AP GRE tunnel configuration
Optionally, per-AP GRE tunnel can also be enabled, which causes
each W-IAP to form an independent GRE tunnel to the GRE endpoint. This requires each W-IAP MAC to be present in the controller
whitelist if Aruba GRE is used, or GRE configuration for the IP of the
each W-IAP on the controller for Manual GRE.
(ap)(config)# gre per-ap-tunnel
NOTE: Starting with 6.4.0.2-4.1, if Virtual Controller IP is configured
and per-AP GRE tunnel is disabled, W-IAP uses Virtual Controller
IP as the GRE source IP. For Manual GRE, this simplifies
configuration on controller, since only the Virtual Controller IP
destined GRE tunnel interface configuration is required.

2. Configure routing profiles
to tunnel traffic through
GRE.

(ap)(config)# routing-profile
(ap)(routing-profile)# route 0.0.0.0 0.0.0.0 

See
Configuring
Routing
Profiles

3. Configure Enterprise
DNS. The example in the
next column tunnels all
DNS queries to the
client’s original DNS
server without proxying
on W-IAP.

(ap)(config)# internal-domains
(ap)(domains)# domain-name *

See
Configuring
Enterprise
Domains

4. Configure centralized L2
DHCP profile with VLAN
20.

Centralized L2 DHCP profile VLAN 20
(ap)(config)# ip dhcp l2-dhcp
(ap)(DHCP profile "l2-dhcp")# server-type
Centralized,L2
(ap)(DHCP profile "l2-dhcp")# server-vlan 20

See
Configuring a
Centralized
DHCP Scope

5. Create authentication
servers for user
authentication. The
example in the next
column assumes 802.1x
SSID.

(ap)(config)# wlan auth-server server1
(ap)(Auth Server "server1")# ip 10.2.2.1
(ap)(Auth Server "server1")# port 1812
(ap)(Auth Server "server1")# acctport 1813
(ap)(Auth Server "server1")# key "presharedkey"
(ap)(Auth Server "server1")# exit
(ap)(config)# wlan auth-server server2
(ap)(Auth Server "server1")# ip 10.2.2.2
(ap)(Auth Server "server1")# port 1812
(ap)(Auth Server "server1")# acctport 1813
(ap)(Auth Server "server1")# key "presharedkey"

See
Configuring an
External Server
for
Authentication

6. Configure wired and
wireless SSIDs using the
authentication servers

Configure wired ports to operate in centralized L2 mode and
associate VLAN 20 to the wired port profile.
(ap)(config) # wired-port-profile wired-port

See
Configuring a
Wired Profile

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

IAP-VPN Deployment Scenarios | 370

Table 75: W-IAP Configuration for Scenario
Configuration Steps
and access rules, and
enable authentication
survivability.

CLI Commands

UI Procedure

(ap)(wired-port-profile "wired-port")# switchportmode access
(ap)(wired-port-profile "wired-port")# allowed-vlan
all
(ap)(wired-port-profile "wired-port")# native-vlan
20
(ap)(wired-port-profile "wired-port")# no shutdown
(ap)(wired-port-profile "wired-port")# access-rulename wired-port
(ap)(wired-port-profile "wired-port")# type employee
(ap)(wired-port-profile "wired-port")# auth-server
server1
(ap)(wired-port-profile "wired-port")# auth-server
server2
(ap)(wired-port-profile "wired-port")# dot1x
(ap)(wired-port-profile "wired-port")# exit
(ap)(config)# enet1-port-profile wired-port

and Wireless
Network
Profiles

Configure a wireless SSID to operate in centralized L2 mode and
associate VLAN 20 to the WLAN SSID profile.
(ap)(config) # wlan ssid-profile wireless-ssid
(ap)(SSID Profile "wireless-ssid")# enable
(ap)(SSID Profile "wireless-ssid")# type employee
(ap)(SSID Profile "wireless-ssid")# essid wirelessssid
(ap)(SSID Profile "wireless-ssid")# opmode wpa2-aes
(ap)(SSID Profile "wireless-ssid")# vlan 20
(ap)(SSID Profile "wireless-ssid")# auth-server
server1
(ap)(SSID Profile "wireless-ssid")# auth-server
server2
(ap)(SSID Profile "wireless-ssid")# authsurvivability
7. Create access rule for
wired and wireless
authentication.

For wired profile:
(ap)(config)# wlan access-rule wired-port
(ap)(Access Rule "wired-port")# rule any any match
any any any
permit

See
Configuring
Access Rules
for Network
Services

For WLAN SSID employee roles:
(ap)(config)# wlan access-rule wireless-ssid
(ap)(Access Rule "wireless-ssid")# rule any any match any any any
permit
NOTE: Ensure that you execute the commit apply command in the Instant CLI before saving the configuration and
propagating changes across the W-IAP cluster.

AP Connected Switch Configuration
Client VLANs defined in this example must be opened on the upstream switches in multiple AP deployments, as
client traffic from slave to master is tagged with the client VLAN.

Datacenter Configuration
For information on controller configuration, see Configuring a Controller for IAP-VPN Operations on page 227. The
following GRE configuration is required on the controller:
(host)(config)# interface tunnel 
371 | IAP-VPN Deployment Scenarios

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

(host)(config-tunnel)#
(host)(config-tunnel)#
(host)(config-tunnel)#
(host)(config-tunnel)#
(host)(config-tunnel)#
(host)(config-tunnel)#

description 
tunnel mode gre 
tunnel source 
tunnel destination 
trusted
tunnel vlan 

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

IAP-VPN Deployment Scenarios | 372

Terminology

Acronyms and Abbreviations
The following table lists the abbreviations used in this document.
Table 76: List of abbreviations
Abbreviation

Expansion

ARM

Adaptive Radio Management

ARP

Address Resolution Protocol

BSS

Basic Server Set

BSSID

Basic Server Set Identifier

CA

Certification Authority

CLI

Command Line Interface

DHCP

Dynamic Host Configuration Protocol

DMZ

Demilitarized Zone

DNS

Domain Name System

EAP-TLS

Extensible Authentication Protocol- Transport Layer Security

EAP-TTLS

Extensible Authentication Protocol-Tunneled Transport
Layer Security

W-IAP

Instant Access Point

IDS

Intrusion Detection System

IEEE

Institute of Electrical and Electronics Engineers

ISP

Internet Service Provider

LEAP

Lightweight Extensible Authentication Protocol

MX

Mail Exchanger

MAC

Media Access Control

NAS

Network Access Server

NAT

Network Address Translation

NS

Name Server

NTP

Network Time Protocol

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Terminology | 373

Table 76: List of abbreviations
Abbreviation

Expansion

PEAP

Protected Extensible Authentication Protocol

PEM

Privacy Enhanced Mail

PoE

Power over Ethernet

RADIUS

Remote Authentication Dial In User Service

VC

Virtual Controller

VSA

Vendor-Specific Attributes

WLAN

Wireless Local Area Network

Glossary
The following table lists the terms and their definitions used in this document.
Table 77: List of Terms
Term

Definition

802.11

An evolving family of specifications for wireless LANs developed by a
working group of the Institute of Electrical and Electronics Engineers
(IEEE). 802.11 standards use the Ethernet protocol and CSMA/CA (carrier
sense multiple access with collision avoidance) for path sharing.

802.11a

Provides specifications for wireless systems. Networks using 802.11a
operate at radio frequencies in the 5GHz band. The specification uses a
modulation scheme known as orthogonal frequency-division multiplexing
(OFDM) that is especially well suited to use in office settings. The
maximum data transfer rate is 54 Mbps.

802.11b

WLAN standard often called Wi-Fi; backward compatible with 802.11.
Instead of the phase-shift keying (PSK) modulation method historically
used in 802.11 standards, 802.11b uses complementary code keying
(CCK), which allows higher data speeds and is less susceptible to
multipath-propagation interference. 802.11b operates in the 2.4 GHz band
and the maximum data transfer rate is 11 Mbps.

802.11g

Offers transmission over relatively short distances at up to 54 Mbps,
compared with the 11 Mbps theoretical maximum of 802.11b. 802.11g
operates in the 2.4 GHz band and employs orthogonal frequency division
multiplexing (OFDM), the modulation scheme used in 802.11a, to obtain
higher data speed. Computers or terminals set up for 802.11g can fall
back to speeds of 11 Mbps, so that 802.11b and 802.11g devices can be
compatible within a single network.

802.11n

Wireless networking standard to improve network throughput over the two
previous standards 802.11a and 802.11g with a significant increase in the
maximum raw data rate from 54 Mbps to 600 Mbps with the use of four
spatial streams at a channel width of 40 MHz. 802.11n operates in the 2.4
and 5.0 bands.

374 | Terminology

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 77: List of Terms
Term

Definition

AP

An access point (AP) connects users to other users within the network and
also can serve as the point of interconnection between the WLAN and a
fixed wire network. The number of access points a WLAN needs is
determined by the number of users and the size of the network.

access point mapping

The act of locating and possibly exploiting connections to WLANs while
driving around a city or elsewhere. To do war driving, you need a vehicle,
a computer (which can be a laptop), a wireless Ethernet card set to work in
promiscuous mode, and some kind of an antenna which can be mounted
on top of or positioned inside the car. Because a WLAN may have a range
that extends beyond an office building, an outside user may be able to
intrude into the network, obtain a free Internet connection, and possibly
gain access to company records and other resources.

ad-hoc network

A LAN or other small network, especially one with wireless or temporary
plug-in connections, in which some of the network devices are part of the
network only for the duration of a communications session or, in the case
of mobile or portable devices, while in some close proximity to the rest of
the network.

band

A specified range of frequencies of electromagnetic radiation.

DHCP

The Dynamic Host Configuration Protocol (DHCP) is an auto-configuration
protocol used on IP networks. Computers or any network peripherals that
are connected to IP networks must be configured, before they can
communicate with other computers on the network. DHCP allows a
computer to be configured automatically, eliminating the need for a
network administrator. DHCP also provides a central database to
keep track of computers connected to the network. This database helps in
preventing any two computers from being configured with the same IP
address.

DNS Server

A Domain Name System (DNS) server functions as a phonebook for the
Internet and Internet users. It converts human readable computer
hostnames into IP addresses and vice-versa.
A DNS server stores several records for a domain name such as an
address 'A' record, name server (NS), and mail exchanger (MX) records.
The Address 'A' record is the most important record that is stored in a DNS
server, because it provides the required IP address for a network
peripheral or element.

DST

Daylight saving time (DST), also known as summer time, is the practice of
advancing clocks, so that evenings have more daylight and mornings
have less. Typically clocks are adjusted forward one hour near the start of
spring and are adjusted backward in autumn.

EAP

Extensible authentication protocol (EAP) refers to the authentication
protocol in wireless networks that expands on methods used by the pointto-point protocol (PPP), a protocol often used when connecting a
computer to the Internet. EAP can support multiple authentication
mechanisms, such as token cards, smart cards, certificates, one-time
passwords, and public key encryption authentication.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Terminology | 375

Table 77: List of Terms
Term

Definition

fixed wireless

Wireless devices or systems in fixed locations such as homes and offices.
Fixed wireless devices usually derive their electrical power from the utility
mains, unlike mobile wireless or portable wireless which tend to be
battery-powered. Although mobile and portable systems can be used in
fixed locations, efficiency and bandwidth are compromised compared with
fixed systems.

frequency allocation

Use of radio frequency spectrum regulated by governments.

frequency spectrum

Part of the electromagnetic spectrum.

hotspot

A WLAN node that provides Internet connection and virtual private
network (VPN) access from a given location. A business traveler, for
example, with a laptop equipped for Wi-Fi can look up a local hot spot,
contact it, and get connected through its network to reach the Internet and
their own company remotely with a secure connection. Increasingly, public
places, such as airports, hotels, and coffee shops are providing free
wireless access for customers.

IEEE 802.11 standards

The IEEE 802.11 is a set of standards that are categorized based on the
radio wave frequency and the data transfer rate.

POE

Power over Ethernet (PoE) is a method of delivering power on the same
physical Ethernet wire used for data communication. Power for devices is
provided in one of the following two ways:
l Endspan— The switch that an AP is connected for power supply.
l Midspan— A device can sit between the switch and APs
The choice of endspan or midspan depends on the capabilities of the
switch to which the W-IAP is connected. Typically if a switch is in place
and does not support PoE, midspan power injectors are used.

PPPoE

Point-to-Point Protocol over Ethernet (PPPoE) is a method of connecting
to the Internet typically used with DSL services where the client connects
to the DSL modem.

QoS

Quality of Service (QoS) refers to the capability of a network to provide
better service to a specific network traffic over various technologies.

RF

Radio Frequency (RF) refers to the portion of electromagnetic spectrum in
which electromagnetic waves are generated by feeding alternating current
to an antenna.

TACACS

Family of protocols that handle remote authentication and related services
for network access control through a centralized server.

TACACS+

Derived from TACACS but an entirely new and separate protocol to
handle AAA services. TACACS+ uses TCP and is not compatible with
TACACS. Because it encrypts password, username, authorization, and
accounting, it is less vulnerable than RADIUS.

VPN

A Virtual Private Network (VPN) network that uses a public
telecommunication infrastructure, such as the Internet, to provide remote
offices or individual users with secure access to their organization's
network. A VPN ensures privacy through security procedures and
tunneling protocols such as the Layer Two Tunneling Protocol ( L2TP ).
Data is encrypted at the sending end and decrypted at the receiving end.

376 | Terminology

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Table 77: List of Terms
Term

Definition

W-CDMA

Officially known as IMT-2000 direct spread; ITU standard derived from
Code-Division Multiple Access (CDMA). Wideband code-division multiple
access (W-CDMA) is a third-generation (3G) mobile wireless technology
that promises much higher data speeds to mobile and portable wireless
devices than commonly offered in today's market.

Wi-Fi

A term for certain types of WLANs. Wi-Fi can apply to products that use
any 802.11 standard. Wi-Fi has gained acceptance in many businesses,
agencies, schools, and homes as an alternative to a wired LAN. Many
airports, hotels, and fast-food facilities offer public access to Wi-Fi
networks.

WEP

Wired equivalent privacy (WEP) is a security protocol specified in 802.11b,
designed to provide a WLAN with a level of security and privacy
comparable to what is usually expected of a wired LAN. Data encryption
protects the vulnerable wireless link between clients and access points;
once this measure has been taken, other typical LAN security
mechanisms such as password protection, end-to-end encryption, virtual
private networks (VPNs), and authentication can be put in place to ensure
privacy.

wireless

Describes telecommunications in which electromagnetic waves (rather
than some form of wire) carry the signal over part or all of the
communication path.

wireless network

In a Wireless LAN (WLAN), laptops, desktops, PDAs, and other computer
peripherals are connected to each other without any network cables.
These network elements or clients use radio signals to communicate with
each other. Wireless networks are set up based on the IEEE 802.11
standards.

WISP

Wireless ISP (WISP) refers to an internet service provider (ISP) that allows
subscribers to connect to a server at designated hot spots (access points)
using a wireless connection such as Wi-Fi. This type of ISP offers
broadband service and allows subscriber computers, called stations, to
access the Internet and the Web from anywhere within the zone of
coverage provided by the server antenna, usually a region with a radius of
several kilometers.

wireless service provider

A company that offers transmission services to users of wireless devices
through radio frequency (RF) signals rather than through end-to-end wire
communication.

WLAN

Wireless local area network (WLAN) is a local area network (LAN) that the
users access through a wireless connection.

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide

Terminology | 377



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
Language                        : en-us
Format                          : application/pdf
Creator                         : Dell Inc.
Subject                         : User's Guide11
Description                     : User's Guide11
Title                           : Dell Instant 6.4.0.2-4.1 User Guide
Producer                        : MadCap Flare V9; modified using iTextSharp 5.1.3 (c) 1T3XT BVBA
Keywords                        : Servers, Storage, & Networking#Networking#Blade InterconnectsChassis SwitchesFixed Port SwitchesNetworking SoftwareWireless##powerconnect w iap 108 109#powerconnect-w-iap-108-109#User's Guide11#Dell Instant 6.4.0.2-4.1 User Guide
Create Date                     : 2014:08:25 15:35:19+05:30
Modify Date                     : 2014:09:03 00:02:52-05:00
Page Mode                       : UseOutlines
Page Count                      : 377
Author                          : Dell Inc.
Productcode                     : powerconnect-w-iap-108-109
Typecode                        : ug11
Typedescription                 : User's Guide11
Languagecodes                   : en-us
Publishdate                     : 2014-09-03 00:00:00
Expirydate                      : 9999-09-09 00:00:00
Manualurl                       : ftp://ftp.dell.com/Manuals/all-products/esuprt_ser_stor_net/esuprt_networking/esuprt_net_wireless/powerconnect-w-iap-108-109_User%27s%20Guide11_en-us.pdf
Readytocopy                     : false
Isdeleted                       : False
Businesskeywords                : Dell Instant 6.4.0.2-4.1 User Guide
Futureproductindication         : No
Categorypathforfutureproducts   : 
Filesize                        : 8711
Isrestricted                    : False
Productpath                     : esuprt_net_wireless
Creationdate                    : D:20140825153519+05'30'
Moddate                         : D:20140902045402-05'00'
EXIF Metadata provided by EXIF.tools

Navigation menu