Users Guide

Table 60: WISPr Authentication Using PAP
When Authentication Servers Are Available
When Authentication Servers Are Not
Available
For a WISPr client authenticated by an external server
using PAP:
l If authentication succeeds, the associated access
credential, along with an encrypted SHA-1 hash of the
password and Key Reply attributes, are stored in the
Survival Server database.
l If authentication fails, the associated access credential
and Key Reply attributes (if they exist) associated with
the PAP method are deleted from the Survival Server
database.
When there is no available in-service server in the
associated server group, the Survival Server
authenticates the WISPr client using PAP.
Upon successful authentication, the Survival Server
uses the previously stored unexpired credential to
perform authentication, and returns the previously
stored Key Reply attributes .
WAN Health Check
The health-check feature uses ping-probes for measuring WAN availability and latency. Based upon the results
of this health-check information, the controller can continue to use its primary uplink, or failover to a backup
link. Latency is calculated based on the round-trip time (RTT) of ping responses. Latency is calculated based on
the round-trip time (RTT) of ping responses. The results of this health check appears in the WAN section of the
Monitoring Dashboard.
For details on configuring this feature using the Smart Config WebUI, see WAN Configuration on page 317.
WAN Optimization through IP Payload Compression
Data compression reduces the size of data frames that are transmitted over a network link, thereby reducing
the time required to transmit the frame across the network. IP payload compression is one of the key features
of the WAN bandwidth optimization solution, which is comprised of the following elements:
l IP Payload Compression
l Traffic Management and QoS
l Caching
WAN optimization through IP payload compression is not support in W-7205 controller.
Since the branch controller can have traffic to destinations other than HQ on the same link, the preferred
method is to enable payload compression on the IPsec tunnel between the branch controller and the master
controller.
IP payload should be enabled only between Dell devices. When this hardware-based compression feature is enabled,
the quality of unencrypted traffic (such as Lync or Voice traffic) is not compromised through increased latency or
decreased throughput.
Dell Networking W-Series ArubaOS 6.4.x | User Guide BranchController Config for Controllers | 290