Users Guide

Table Of Contents
Dell Networking W-Series ArubaOS 6.4.x| User Guide Remote Access Points | 720
Chapter 31
Remote Access Points
The Secure Remote Access Point Service allows AP users, at remote locations, to connect to a Dell controller
over the Internet. Because the Internet is involved, data traffic between the controller and the remote AP is
VPN encapsulated. That is, the traffic between the controller and AP is encrypted. Remote AP operations are
supported on all of Dell’s APs.
Topics in this chapter include:
l About Remote Access Points on page 720
l Configuring the Secure Remote Access Point Service on page 722
l Deploying a Branch/Home Office Solution on page 727
l Enabling Remote AP Advanced Configuration Options on page 734
l Understanding Split Tunneling on page 749
l Understanding Bridge on page 755
l Provisioning Wi-Fi Multimedia on page 759
l Reserving Uplink Bandwidth on page 759
l Provisioning 4G USB Modems on Remote Access Points on page 760
l Configuring W-IAP3WN and W-IAP3WNP Access Points on page 766
l Converting an IAP to RAP or CAP on page 766
l Enabling Bandwidth Contract Support for RAPs on page 767
About Remote Access Points
Remote APs connect to a controller using Extended Authentication and Internet Protocol Security
(XAuth/IPSec). AP control and 802.11 data traffic are carried through this tunnel. Secure Remote Access Point
Service extends the corporate office to the remote site. Remote users can use the same features as corporate
office users. For example, voice over IP (VoIP) applications can be extended to remote sites while the servers
and the PBX remain secure in the corporate office.
For both RAPs and CAPs, tunneled SSIDs will be brought down eight seconds after the AP detects that there is
no connectivity to the controller. However, RAP bridge-mode SSIDs are configurable to stay up indefinitely
(always-on / persistent). For CAP bridge-mode SSIDs, the CAP will be brought down after the keepalive times
out (default 3.5 minutes).
Secure Remote Access Point Service can also be used to secure control traffic between an AP and the controller
in a corporate environment. In this case, both the AP and controller are in the company’s private address
space.
The remote AP must be configured with the IPSec VPN tunnel termination point. Once the VPN tunnel is
established, the AP bootstraps and becomes operational. The tunnel termination point used by the remote AP
depends upon the AP deployment, as shown in the following scenarios:
l Deployment Scenario 1: The remote AP and controller reside in a private network which secures AP-to-
controller communication. (This deployment is recommended when AP-to-controller communications on a
private network need to be secured.) In this scenario, the remote AP uses the controller’s IP address on the
private network to establish the IPSec VPN tunnel.