Users Guide

Table Of Contents
328 | Advanced Security Dell PowerConnect ArubaOS 5.0 | [User Guide
c. For Enter VLAN(s), select the native VLAN (for example, VLAN 1) on the port to ensure Layer-2
connectivity to the network.
d. For xSec VLAN, select the VLAN to which authenticated users are assigned from the drop-down menu
(for example, VLAN 20)
e. Click Apply.
2. Navigate to the Configuration > Security > Authentication > AAA Profiles page to configure the AAA
profile.
a. To create a new AAA profile, click Add.
b. Enter a name for the profile (for example, xsec-3party), and click Add.
c. To configure the AAA profile, click on the newly-created profile name.
d. For 802.1x Authentication Default Role, select a configured user role (for example, employee).
e. Click Apply.
f. In the AAA Profile list, select 802.1x Authentication Profile under the AAA profile you configured. Select
the applicable 802.1x authentication profile (for example, xsec-NonDell-dot1x). Click Apply.
g. In the AAA Profile list, select 802.1x Authentication Server Group under the AAA profile you configured.
Select the applicable server group (for example, xsec-svrs). Click Apply.
3. Navigate to the Configuration > Advanced Services > Wired Access page.
a. Under Wired Access AAA Profile, select the AAA profile you just configured.
b. Click Apply.
In the CLI
interface fastethernet|gigabitethernet slot/port
switchport access vlan 1
xsec vlan 20
aaa profile xsec-wired
authentication-dot1x xsec-NonDell-dot1x
dot1x-default-role employee
dot1x-server-group xsec-svrs
aaa authentication wired
profile xsec-wired
Securing Controller-to-Controller Communication
xSec can be used to secure data and control traffic passed between two controllers. The only requirement is that
both controllers be members of the same VLAN. To establish a point-to-point tunnel between the two
controllers, you need to configure the following for the connecting ports on each controller:
z The MAC address of the xSec tunnel termination point. This would be the MAC address of the “other”
controller.
z A 16-byte shared key used to authenticate the controllers to each other. You must configure the same shared
key on both controllers.
z The VLAN IDs for the VLANs that will extend across both the controllers via the xSec. is an example network
where two controllers are connected to the same VLAN, VLAN 1. On controller 1, you configure the MAC
address of controller 2 for the xSec tunnel termination point. On controller 2, you configure the MAC address
of controller 1 for the xSec tunnel termination point. On both controllers, you configure the same 16-byte
shared key and the IDs for the VLANs which are allowed to pass through the xSec tunnel.