Users Guide

Table Of Contents
180 | Remote Access Points Dell PowerConnect ArubaOS 5.0 | User Guide
Remote AP Authorization Profiles
Remote AP configurations include an authorization profile that specifies which profile settings should be
assigned to a remote AP that has been provisioned but not yet authenticated at the remote site. By default, these
yet-unauthorized APs are put into the temporary AP group authorization-group and assigned the predefined
profile NoAuthApGroup. This configuration allows the user to connect to an unauthorized remote AP via a wired
port then enter a corporate username and password. Once a valid user has authorized the AP and the remote AP
will be marked as authorized on the network. The remote AP will then download the configuration assigned to
that AP by it's permanent AP group.
Add or Edit a Remote AP Authorization Profile
To create a new authorization profile or edit an existing authorization profile via the WebUI:
1. Select Configuration > All Profiles. The All Profile Management window opens.
2. Select AP to expand the AP profile menu.
3. Select AP Authorization Profile. The Profile Details pane appears and displays the list of existing AP
authorization profiles.
z To edit an existing profile, select a profile from from the Profile Details pane.
z To create a new authorization profile, enter a new profile name in the entry blank on the Profile Details
pane, then click Add.
4. The Profile Details window will display the AP group currently defined for that authorization profile. To
select a new AP group, click the drop-down list and select a different AP group name.
5. Click Apply to save your changes.
To create a new authorization profile or edit an existing authorization profile via the command-line interface,
access the command-line interface in enable mode, and issue the following commands.
ap authorization-profile <profile>
authorization-group <ap-group>
Access Control Lists and Firewall Policies
Remote APs support the following access control lists (ACLs); unless otherwise noted, you apply these ACLS to
user roles:
z Standard ACLs—Permit or deny traffic based on the source IP address of the packet.
z Ethertype ACLs—Filter traffic based on the Ethertype field in the frame header.
z MAC ACLs—Filter traffic on a specific source MAC address or range of MAC addresses.
z Firewall policies (session ACLs)—Identifies specific characteristics about a data packet passing through the
controller and takes some action based on that identification. You apply these ACLs to user roles or uplink
ports.
For more information about ACLs and firewall policies, see “Configuring the fallback mode” on page169.
Split Tunneling
The split tunneling feature allows you to optimize traffic flow by directing only corporate traffic back to the
controller, while local application traffic remains local. This ensures that local traffic does not incur the overhead
of the round trip to the controller, which decreases traffic on the WAN link and minimizes latency for local
application traffic. This is useful for sites that have local servers and printers. With split tunneling, a remote user
associates with a single SSID, not multiple SSIDs, to access corporate resources (for example, a mail server) and
Note: To configure firewall policies, you must install the PEFNG license.