Users Guide

Table Of Contents
18 | Dell PowerConnect ArubaOS 5.0 | [User Guide
Control Plane Security Overview.................................................................................................373
Configuring Control Plane Security.............................................................................................374
Verifying Certificates .............................................................................................................374
Configuring Settings via the WebUI....................................................................................375
Configuring Settings via the CLI...........................................................................................376
Managing the Campus AP Whitelist ...................................................................................376
Viewing Entries in the Campus AP Whitelist.............................................................377
Modifying an AP in the Campus AP Whitelist ...........................................................378
Revoking an AP via the Campus AP Whitelist...........................................................379
Deleting an AP Entry from the Campus AP Whitelist...............................................380
Purging the Campus AP Whitelist ...............................................................................380
Whitelists on Master and Local Controllers ..............................................................................380
Campus AP Whitelist Synchronization ...............................................................................381
Viewing and Managing the Master or Local controller Whitelists................................382
Viewing the Master or Local Controller Whitelist ....................................................382
Deleting an Entry from the Master or Local Controller Whitelist...........................382
Purging the Master or Local Controller Whitelist.....................................................383
Environments with Multiple Master Controllers .......................................................................383
Configuring Networks with a Backup Master Controller ................................................383
Configuring Networks with Clusters of Master Controllers............................................384
Creating a Cluster Root .................................................................................................384
Creating a Cluster Member ..........................................................................................385
Viewing Controller Cluster Settings............................................................................385
Replacing a Controller on a Multi-Controller Network ............................................................386
Replacing Controllers in a Single Master Network..........................................................386
Replacing a Local Controller ........................................................................................386
Replacing a Master Controller (With No Backup)....................................................387
Replacing a Redundant Master Controller ................................................................387
Replacing Controllers in a Multi-Master Network ...........................................................388
Replacing a Local Controller in a Multi-Master Network .......................................388
Replacing a Cluster Member Controller (With no Backup).....................................388
Replacing a Redundant Cluster Member Controller ................................................389
Replacing a Cluster Root Controller with no Backup Controller............................389
Replacing a Redundant Cluster Root Controller .......................................................389
Troubleshooting Control Plane Security.....................................................................................390
Certificate Problems ..............................................................................................................390
Disabling Control Plane Security.........................................................................................390
Verify Whitelist Synchronization .........................................................................................390
Supported APs........................................................................................................................391
Rogue APs ...............................................................................................................................391
Chapter 18 Adding Local Controllers................................................................................................393
Moving to a Multi-Controller Environment.................................................................................393
Preshared Key for Inter-Controller Communication.........................................................393
Best Security Practices for the Preshared Key ................................................................394
Configuring the Preshared Key............................................................................................394
Using the WebUI to configure the Local Controller PSK.........................................394
Using the WebUI to configure the Master Controller PSK......................................394
Using the CLI to configure the PSK.............................................................................395
Configuring Local Controllers.......................................................................................................395
Configuring the Local Controller..........................................................................................395
Using the Initial Setup ...................................................................................................395
Using the Web UI ...........................................................................................................396
Using the CLI...................................................................................................................396
Configuring Layer-2/Layer-3 Settings .................................................................................396
Configuring Trusted Ports.....................................................................................................396