Aerohive Certified Wireless Administrator (Acwa) : Aerohive's Instructor-Led Training
Aerohive Certified Wireless Administrator (Acwa) : Aerohive's Instructor-Led Training
Aerohive Certified Wireless Administrator (Acwa) : Aerohive's Instructor-Led Training
ADMINISTRATOR (ACWA)
Aerohive’s
Instructor-led Training
• Introductions
• Facilities Discussion
• Course Overview
• Extra Training
Resources
• Questions
• Course Material
Distribution
• Course Times
• Restrooms
• Break room
• Smoking Area
• Break Schedule
› Morning Break
› Lunch Break
› Afternoon Break
HiveManager
14 Aerohive APs MGT 10.5.1.20/24 14 Client PCs
For Wireless Access
X=2
Win2008 AD
Server X=2 Ethernet: 10.5.1.202/24
MGT 10.5.1.10/24
10.5.1.*/24 No Gateway
Linux Server
No Gateway Wireless: 10.5.10.X/24
MGT 10.6.1.150./24
Gateway: 10.5.10.1
X=3 L2 Switch
Native VLAN 1 X=3 Ethernet: 10.5.1.203/24
10.5.1.*/24 No Gateway
No Gateway Wireless: 10.5.10.X/24
Gateway: 10.5.10.1
http://www.aerohive.com/techdocs
• Aerohive Education Services offers a complete curriculum that provides you with the
courses you will need as a customer or partner to properly design, deploy, administer, and
troubleshoot all Aerohive WLAN solutions.
• Aerohive Certified WLAN Administrator (ACWA) – First-level course
• Aerohive Cerified WLAN Professional (ACWP) – Second-level course
• Aerohive Certified Network Professional (ACNP) – Switching/Routing course
www.aerohive.com/support/technical-training/training-schedule
• Please, take a moment and register during class if you are not already a member of
HiveNation.
Go to http://community.aerohive.com/aerohive and sign up!
Aerohive’s
Instructor-led Training
19
© 2015 Aerohive Networks Inc.
The Relationship between the OSI Model and
Wi-Fi
Application
Wireless LAN’s provide
Presentation access to the distribution
systems of wired networks.
Session This allows the users the
ability to have untethered
Transport
connections to wired network
Network
resources.
Data Link
Layer 1 ( Physical )
The medium through which Data is transferred
802.3 Uses Cables
802.11 RF Medium
Layer 2 ( Data-Link )
The MAC sublayer manages access to the physical medium
The LLC sublayer manages the flow of multiple simultaneous network
protocols over the same network medium
Devices operating no higher than Layer 2 include: network interface
cards (NICs), Layer-2 Ethernet switches, and wireless access points
• You have been tasked with designing the WLAN for a new building
that has two floors, each 200 feet in length.
• Employees and Guests require high data rate connectivity.
• Your customer plans to implement a voice over WLAN solution in the
future as well. (-67 dBm Coverage)
• This is an office environment. However, the remote lab is built using
AP350’s and we will select them in our plans.
• Many commercial products exist for predictive coverage planning. For
example: AirMagnet, Ekahau and Tamosoft.
• For this deployment the customer is using Aerohive’s Free planner tool.
• Securely browse to
https://training-hm#.aerohive.com
# = The Hosted HiveManager number
Username: adminX
X = Student ID 2 – 26
Password: aerohive123
• Click Log In
• To scale the map, move one red crosshair over the far left of the building
image and the other to the far right of the building image
• In the Scale Map Section, use the drop down arrow to select feet
• Enter a value of 200 feet and click the Update button
• Click the drop down arrow next to Wall Type and select any of the material
types you would like to use
• Click the / icon and trace over a few walls
• Click the drop down arrow next to Wall Type again and select another
material type
• Click the / icon and trace over a few different walls
© 2015 Aerohive Networks CONFIDENTIAL 30
802.11n, 802.11ac and MIMO radios
3x3:3
USB for future use USB for 3G/4G Modem USB for future use N/A
© 2015 Aerohive Networks CONFIDENTIAL * Includes 5 GHz Transmit Beamforming and in 2.4 GHz has TurboQAM
Lab: Planning a Wireless Network
6. Formatting your Plan Building
• Examine the predicted coverage provided by a single AP of the type you selected
earlier
• Click and drag the AP to another location and observe the predicted coverage in the
new location
• Click the Remove All APs button
• Click Yes to confirm the removal
0 dBm = 1 mw
© 2015 Aerohive Networks CONFIDENTIAL 35
The Rule of 10’s and 3’s
dBm milliwatts
1Mbps DSSS
Lowest Rate
2Mbps DSSS
Higher Rate
5.5Mbps
Higher RateDSSS
Highest Rate
11Mbps DSSS
Great Poor
Signal Strength -70dBm -70dBm
- Noise Level - (-95dBm) - (-80dBm)
= SNR = 25dB = 10dB
• Based on the SNR, the client and AP negotiate a data rate in which to send the packet, so the higher the SNR the better
• For good performance, the SNR should be greater than 20 dB
• For optimal performance, the SNR should be at least 25 dB
• In the Navigation pane, right click on your Floor 1 and select Clone
• Name your Clone Floor 2
• Click the Create button
8-channel
8-channel reuse
reuse plan
plan using
using the
the channels
channels in
in the
the UNII-1
UNII-1 and
and UNII-3
UNII-3
• If you are in a country that has channels 1 – 13 or 14 available, you may still
want to use 1, 6, and 11 for compatibility with mobile users from other countries
In
In this
this plan
plan only
only the
the non-overlapping
non-overlapping channels
channels of
of 1,
1, 66 and
and 11
11 are
are used.
used.
Improper
Improper designs
designs use
use overlapping
overlapping channels
channels in
in the
the same
same physical
physical area.
area.
Improper
Improper design
design using
using the
the same
same channel
channel on
on all
all AP’s
AP’s in
in the
the same
same physical
physical area.
area.
Weather
Weather
RADAR
RADAR
100
124
128
153
157
104
108
120
132
136
140
144
149
161
165
112
116
44
48
52
36
40
56
60
62
Weather
RADAR
108
124
149
157
100
104
120
128
132
136
140
144
153
161
165
112
116
40
48
36
44
52
56
60
62
20 MHz
42 58 10 12 13 15 80 MHz
6 2 8 5
50 114 160
MHz
• 802.11n defines the use of 40 MHz wide channels.
• 802.11ac defines dynamic channel sizes up to 160 MHz wide.
Most 802.11ac chipsets on the market today will only scale to a maximum of 80 MHz wide channels.
8-channel
8-channel reuse
reuse plan
plan using
using the
the channels
channels in
in the
the UNII-1
UNII-1 and
and UNII-3
UNII-3
• 17 degree beamwidth
Outdoor Patch Antennas
are well suited for point to • 18 dBi gain
point connections between
buildings. • 2x2 MIMO Patch
Aerohive’s
Instructor-led Training
66
© 2015 Aerohive Networks Inc.
What is HiveManager?
We have completed the predictive model and have deployed and physically
mounted the APs. Now we need a way to centrally manage the WLAN.
We will us Aerohive’s network management server (NMS) called HiveManager.
HiveManager can be used to monitor, configure and update the WLAN.
• HiveManager can be deployed as a public cloud solution or as a private cloud
solution (on premise).
• The on-premises HiveManager is available in different form factors.
• The Aerohive Devices use an IP discovery process to locate on premise
HiveManagers.
• A redirector service is used to guide Aerohive Devices to the Public Cloud
HiveManager.
• HiveManager uses CAPWAP as the protocol to monitor and manage Aerohive
Devices.
g .a ero hiv e. co m
1. stagin
Serial numbers are
entered into the
redirector.
• Devices that have not yet made a CAPWAP connection with HMOL
will display under the Unmanaged Devices tab.
• Once devices make a CAPWAP connection with HMOL, they will be
displayed under Managed Devices.
On-Premises HiveManager
81
© 2015 Aerohive Networks CONFIDENTIAL
Device auto discovery of HiveManager
Aerohive
Devices
DHCP Server
DHCP Request
DHCP Response
Option 225 HiveManager FQDN
Option 226 HiveManager IP Address
DNS Server
DNS Query
The device performs a DNS lookup for
hivemanager.yourdomain
82
© 2015 Aerohive Networks CONFIDENTIAL
Device auto discovery of HiveManager
https://myhive.aerohive.com
• To add a On-Premises
HiveManager account, click:
Configure Standalone HM
• Enter a public hostname or IP
address for your HiveManager
• Optionally change the Connection
Protocol to TCP if required
• Click Save
Aerohive
Redirector
co m
v e .
ro hi Redirect device to:
g. ae hm1.yourdomain
in
st ag
ire ct
red (Require a standalone
redirector account)
Your Private Cloud
Connect to HM returned or Company
from redirector:
hm1.yourdomain
HiveManager
• Aerohive Device to Aerohive Device
management Traffic (Cooperative Control
Protocols)
› AMRP, DNXP, INXP and ACSP
› Encrypted with the Hive Key
» Cooperative Control discussed later in class
Aerohive
Devices
(Cooperative Control Protocols)
88
© 2015 Aerohive Networks CONFIDENTIAL
Aerohive Device Configuration Updates
1. Over CAPWAP, HiveManager tells the
Complete Upload Aerohive AP to SCP its config to its
flash
DRAM Running
2. Over CAPWAP HiveManager sends Config
the delta configuration changes directly
to RAM which are immediately
activated, and the running configuration Flash
is then saved to flash Permanent
Storage
Hive – Cooperative control for a group of Hive Devices that share the same
Hive name and Hive password.
› There is no limit to the number of Hive Devices that can exist in a single
Hive.
› Aerohive APs in a Hive cooperate with each other using Aerohive’s
cooperative control protocols:
» AMRP (Aerohive Mobility Routing Protocol)
– Layer 2 and Layer 3 Roaming, Load Balancing, Band Steering, Layer 2
GRE Tunnel Authentication and Keepalives
» DNXP (Dynamic Network Extensions Protocol)
– Dynamic GRE tunnels to support layer 3 roaming
» INXP (Identity-Based Network Extensions Protocol)
– GRE tunnels for guest tunnels
» ACSP (Automatic Channel Selection & Power) Protocol
– Radio Channel and Power Management
Routers
• Redundancy
HQ
Network › Built in to the
L2 Switches
protocols
• No single point of failure
Aerohive › Routes around
APs problems and uses
dynamic mesh failover
L2 Switches
• Distributed
Aerohive Forwarding
APs › Takes advantaged of
the wired LAN
WAN › Uses same VLANs as
those used by wired
Routers or
users
Switches
APs
Branch Networks
© 2015 Aerohive Networks CONFIDENTIAL 93
HiveManager Menu navigation demo Connect
to the Hosted Training HiveManager
• Securely browse to
https://training-hm#.aerohive.com
# = The Hosted HiveManager number
Username: adminX@ah-lab.com
X = Student ID 2 – 26
Password: aerohive123
• Click Log In
• Click on
the Home
Tab
The Home section of the GUI is where you configure a number of fundamental
HiveManager settings, such as the following:
• Express and Enterprise modes
• VHM (virtual HiveManager) settings HiveManager administrator accounts
• Settings for HiveManager time and network (including HA), admin access and
session timeout, HTTPS, SSH/SCP, Aerohive product improvement program
participation, and routing
• CAPWAP and e-mail notification settings, SNMP and TFTP services, and
HiveManager administrator authentication options
• Click the
Monitor
Tab
• From the Monitor menu, you can view commonly needed information and link to more
detailed information about all the Aerohive devices that have contacted HiveManager.
• With an On-Premise HiveManager, those listed in the Unconfigured Devices section
are not under HiveManager management and those in the Configured Devices are being
managed by HiveManager.
• When using HiveManager Online (HMOL) devices appear as Managed Devices or
Unmanaged Devices to illustrate if devices are being managed by HiveManager or not.
© 2015 Aerohive Networks CONFIDENTIAL 97
HiveManager Menu Navigation
Reports
• Click the
Reports
Tab
• Click the
Maps Tab
• Use the tools in the Maps section to plan network deployments, and or to track
and monitor the operational status of managed devices.
• Maps can be used in pre-deployment for predictive modeling.
• Maps can be used in post-deployment for coverage visualization,
troubleshooting, and client and rogue location tracking.
• Click the
Configuration
Tab
• Click the
Tools Tab
•The Tools Tab allows you access additional testing and monitoring abilities.
•Here you can access such things as:
›The Planning Tool
›The Client Monitor
›The VLAN Probe
›The Device/Client Simulator
›The Server Access Tests
© 2015 Aerohive Networks CONFIDENTIAL 101
QUESTIONS?
Aerohive’s
Instructor-led Training
103
© 2015 Aerohive Networks Inc.
HiveManager Form Factors
USB for future use USB for 3G/4G Modem USB for future use N/A
© 2015 Aerohive Networks CONFIDENTIAL * Includes 5 GHz Transmit Beamforming and in 2.4 GHz has TurboQAM
Aerohive Switching Platforms
Routing with 3G/4G USB support and Line rate switching Switching Only
4000/1024
5X 10/100 5X 10/100/1000 2X 10/100/1000 Ethernet
Tunnels
Physical/Virt
0 PoE PSE 2X PoE PSE 0 PoE PSE
ual
BR100 BR200/BR200WP
5x FastEthernet 5x Gigabit Ethernet
1x1 11bgn (2.4Ghz) single radio 3x3:3 11abgn dual-band single radio (WP)
No integrated PoE PoE (in WP model)
No console port Console Port
No Spectrum Analysis Integrated Spectrum Analysis (WP)
No Wireless Intrusion Detection Full Aerohive WIPS (WP)
No local RADIUS or AD integration Full Aerohive RADIUS, proxy, and AD
No SNMP logging SNMP Support
Click here to
display the
Navigation Bar
• Click on
Configuration
• Under Choose
Network Policy
Click New
• Network
Policies are used
to assign the
same basic
configurations to
multiple devices.
• One Network
Policy can
configure all
device types.
Internet
/4G
LT
E
Po
E
BR200 Po AP
E
BR100 esh
M
AP
Small Branch Office
or Teleworker Site Small to Medium Size Branch Office
that may have APs behind the router
• Bonjour Gateway
› Allows Bonjour services to be seen in multiple subnets
• Switching
› Used to manage wired traffic using Aerohive Switches
Internet SR2024
PoE AP
AP AP
© 2014 Aerohive Networks CONFIDENTIAL 117
Unified Policy Management (Instructor Demo)
• Students and Instructor should open and view and discuss the Network
Policy called Wireless-Access-Demo.
• Students and Instructor should open and view and discuss the Network
Policy called Wireless-Routing-Demo.
• Students and Instructor should open and view and discuss the Network
Policy called Wireless-Switching-Demo.
120
© 2015 Aerohive Networks Inc.
Scenario: First Login and Test Configuration
• For example,
› a DNS service object
with the name “Class”
is automatically
generated
› an NTP service object
with the name “Class”
is automatically
generated
• These objects are used
when configuring
WLAN and routing
settings
The IP addresses for the QuickStart DNS object are Public DNS
servers.
It is recommended that you edit the QuickStart DNS object to use DNS server IP
addresses that are relevant to your deployment. Do this BEFORE you configure the rest
of your Network Policy.
© 2015 Aerohive Networks CONFIDENTIAL 128
Informational
HiveManager Initial Configuration
The public Aerohive NTP server is used to set the clocks of your
Aerohive Devices. You can edit this object to use a different NTP
server.
Mandatory: You must change the time zone to match the time zone where your Aerohive
Devices reside. Do this BEFORE you configure the rest of your Network Policy.
• Go to Configuration
• Click the New Button
• Name:
Test-X
• Select:
Wireless
Access and
Bonjour
Gateway
• Click Create
Network Configuration
• Next to SSIDs click
Choose
• Then click New
• In Choose User
Profiles Click New
• Ensure Staff-X
User Profile is
highlighted
• Click Save
From the Configure & Update Devices section, click the + next to
Filter to create a device display filter.
• Device Model:
AP350
• Host Name: 0X-
• Save Filter As:
0X-APs
• Click Search
• Five APs will display
The Auto option, which is set by default, performs a complete initial upload, requiring the
device to reboot before activating the uploaded configuration. Following that, all subsequent
uploads consist of delta configurations based on a comparison with the current configuration
running on the device.
Because the filter is set by default to Current Policy/Default Policies, you will
only see devices assigned to your selected network policy, or the def-policy-
template (assigned to new devices)
Select None if
you want to see
all devices
Selected
Network Policy
Filter set by
default to
Current
Policy/Default
Policies
If Audit is Red
Exclamation Point, click Turn off auto refresh if you Set items
it to see the difference want to make changes per page
between HiveManager without interruption
and the device.
149
© 2015 Aerohive Networks CONFIDENTIAL
Lab: Creating a Test Network Policy
18. Customize the Monitor View Columns
Note:
Note:
Both
Both the
the Instructor
Instructor
and
and Students
Students
MUST
MUST perform
perform
this
this exercise.
exercise.
• Unconfigured Devices
The configuration on
HiveManager does are Aerohive APs, Routers
NOT match the and other Aerohive
configuration on the devices that have
Aerohive Device discovered HiveManager
for the first time.
• IP connectivity and
CAPWAP connectivity
are needed for discovery.
The configuration
on HiveManager Once Aerohive Devices
MATCHES the have a configuration
configuration on uploaded they become
the Aerohive Configured Devices.
Device
• Single-click the
wireless icon on the
bottom right corner of
the windows task bar
• Click your SSID
Corp-PSK-X
• Click Connect
› Security Key:
aerohive123
› Click OK
Aerohive’s
Instructor-led Training
158
© 2015 Aerohive Networks Inc.
Design Implementation
• Drag and drop the APs onto your map as planned in the predictive
model.
• Check the Nodes Locked check box
© 2015 Aerohive Networks CONFIDENTIAL 165
Design Implementation
Once the APs are located properly you can use you map for post deployment validation
processes such as:
RSSI values
Interference source locationing
Channel verification
Display of Ethernet and Mesh connections
© 2015 Aerohive Networks CONFIDENTIAL 166
Topology Maps
With RSSI and Power (Heatmap)
• If three or more
Aerohive APs on a
map detect a rogue,
Client
HiveManager can
estimate the location
of the rogue on the
topology map
Friendly AP
• Also, if the Aerohive
AP location service is
Rogue AP
enabled, you can view
clients as well
168
© 2015 Aerohive Networks CONFIDENTIAL
QUESTIONS?
• We'll start with the types of users we have in the network. We have different types of
employees, and different types of guests.
• Employees should have secure access to the wireless network, and the most secure
method is 802.1X/EAP
• We can create 1 SSID for all Employee access, but have different access policies
depending on the type of employee.
• For devices that do not support 802.1X, or require fast roaming and do not support
802.11r or OKC, then you should consider Private PSK for that
• For guests, there is the legacy open SSID method, that we don't feel it does provide
security for guests, and leave them extremely vulnerable. So instead we should provide
a Private PSK infrastructure and a captive web portal for use policy acceptance. We
can also provide a way for self registration, employee sponsorship, etc…
• We will need to consider the best practice AP settings to meet our network design
goals. After which we will need to show how to maintain and monitor a network.
Aerohive’s
Instructor-led Training
171
© 2015 Aerohive Networks Inc.
Classroom Employee WLAN
Scenario
Supplicant
Supplicant Calculating Authenticator
Authenticator Authentication
Authentication
Computer
Computer my key… (AP)
(AP) Server
Server (RADIUS)
(RADIUS)
EAP-request/identity
Access Granted
• Fill in the Name box using Corp-X as your Network Policy Name
• Click the Create button
It is recommended that you ALWAYS add descriptions about the objects you are
building whenever possible.
To configure a
802.1X/EAP SSID
for Secure Wireless
Access
• Next to SSIDs,
click Choose
• Click New
• Profile Name:
Corp-Secure-X
• SSID:
Corp-Secure-X
• Under SSID Access
Security select
WPA/WPA2
802.1X
(Enterprise)
• Click Save
Ensure
Corp-Secure-X
is highlighted
then click OK
• Ensure the
Corp-Secure-X SSID
is selected
• Click OK
Click
Click
© 2015 Aerohive Networks CONFIDENTIAL 179
Lab: Creating the Employee 802.1X Network
7. Creating the RADIUS Object
• RADIUS Name:
RADIUS-X
• IP Address/Domain
Name: 10.5.1.10
Click Apply
• Shared Secret:
When Done!
aerohive123
• Confirm Secret:
aerohive123
• Click Apply
• Click Save
• Click New
• Name: Employees-X
• Attribute Number: 10
• Default VLAN: 10
• Click Save
• Select the
Authentication tab
• Select (highlight) both
the IT and Executives
User Profiles
NOTE: The (User Profile
Attribute) is appended to
the User Profile Name
Authentication Tab
• Click Save
Standard RADIUS
Attribute/Value Pairs Returned
Tunnel-Medium-Type: IPv4
Tunnel-Type: GRE
Tunnel-Pvt-Group-ID: 10
• After successful
authentication by
users in the
AH-LAB\Wireless
Windows AD group,
RADIUS will return three
attribute value pairs to
assign the Aerohive user
profile.
From the Configure & Update Devices section, click the drop down
next to Filter and select your 0X-APs filter.
Standard RADIUS
Attribute/Value Pairs Returned
Tunnel-Medium-Type: IPv4
Tunnel-Type: GRE
Tunnel-Pvt-Group-ID: 10
• After successful
authentication by
users in the
AH-LAB\Wireless
Windows AD group,
RADIUS will return three
attribute value pairs to
assign the Aerohive user
profile.
After associating with your SSID, you should see your connection in the
active clients list in HiveManager
• Go to MonitorClientsWireless Clients
• User Name: DOMAIN\user
• VLAN: 10
© 2015 Aerohive Networks CONFIDENTIAL 196
Testing 802.1X/EAP to External RADIUS
3. Customizing Your Column View
Click to change
column layout
Click to change
column layout
Aerohive’s
Instructor-led Training
AP RADIUS
User 1 SSID: Corp-Wi-Fi
PMK: d6#$%^98f..
MANDATORY: You must change the time zone to match the time zone where your
Aerohive Devices reside. Do this BEFORE you configure the rest of your Network
Policy.
To configure a
Private PSK SSID
• Go to Configuration
• Select your Network
Policy: Corp-X and click
OK
• Next to SSIDs,
click Choose
• Click New
Ensure both
Device-PPSK-X
and Corp-
Secure-X are
highlighted then
click OK
• Ensure the
Device-PPSK-X SSID
is selected
• Ensure the Corp-Secure-
X SSID is selected
• Click OK
Click
Click
© 2015 Aerohive Networks CONFIDENTIAL 216
Lab: Private PSK for Enterprise
5. Create a Private PSK Group
• Click Save
Although each of the PPSKs will be unique, they are still susceptible to brute-force
offline dictionary attacks. The Wi-Fi Alliance recommends a passphrase key strength of
20 characters or longer.
• Name: Devices-X
• Attribute Number: 2
• Default VLAN: 2
• Verify the settings, and click Save
Although these are corporate devices, they are using a shared key security. Since they
are not using 802.1X, a more secure authentication method, it is a recommended
practice to separate their traffic to protect you network from unwanted use.
Click here to
obscure or show
or obscure your
clear text PSK
• Check the box next to one of your user user Email Message
accounts, and click Email PSK
IMPORTANT: Please check your Junk
Email folder if you do not receive this
email
The physical APs will not need to reboot this time because
this is a Delta update. The simulated APs will reboot. Only
the configuration changes in the Network Policy were
uploaded. Because a reboot is not necessary, clients already
connected to the Corp-Secure-X SSID are not affected.
231
© 2015 Aerohive Networks CONFIDENTIAL
Copyright ©2011
Lab: Private PSK for Enterprise
1. Testing your PPSK SSID
• After associating with your SSID, you should see your connection in the active
clients list in HiveManager
› Go to MonitorClientsWireless Clients
• Your IP address should be from the 10.5.2.0/24 network
• Note the client information:
› VLAN: 2
› User Profile Attribute: 2
If a user leaves the company, or if their device is lost or stolen, you can revoke a
users key and de-authenticate any active client using the individual private PSK
• Go to ConfigurationAdvanced Configuration
AuthenticationLocal Users
• Check the box next to your user account and click Remove
• Click Yes to continue
› Note: For this change to take effect, you will have to update the configuration of every
Aerohive AP using this Private PSK account...
Aerohive’s
Instructor-led Training
If guest user
DNS lookup = whois www.google.com authentication is
required, the AP
will then query a
RADIUS server
with an
1.1.1.1 authentication
protocol such as
MS-CHAPv2.
DNS response = www.google.com = 1.1.1.1
Multi-Language Support
Sometimes a customer may have a written security policy that mandates that the
guest VLAN not reside at the edge of the network. The guest VLAN can only
exist in a DMZ
• GRE Tunneling – Aerohive APs can be configured to tunnel the guest traffic
back to a HiveOS Appliance server that resides in the DMZ
• Guest GRE Tunnel LAB – This lab is performed in the Aerohive Advanced
WLAN Configuration (ACWP) class
HiveOS VA
More information is available about PPSK User Manager and PPSK self-
registration in the supplemental materials provided by your instructor.
HiveManager Online
+ ID Manager
Internet
ID Manager
HTTPS
APs
Internet
ID Manager
HTTPS
APs
Guest
• The Guest arrives and would like secure guest Wi-Fi access
• An operator who may be a lobby ambassador, an employee with ID manager
operator rights, or the guest themselves using the web-based self-registration
kiosk on an iPad for instance, can enter the Guest information
• Guest information includes who the guest is representing, who they are
visiting, their email, and a phone number
© 2015 Aerohive Networks CONFIDENTIAL 257
ID Manager
Workflow
Internet
ID Manager
HTTPS
APs
Guest
• Next, the guest or the operator creating the guest account can select the
type of guest access needed, such as a contractor, visitor, or guest
secured with Private PSK
• For this example a Visitor using Private PSK will be selected
ID Manager Internet
HTTPS
Private PSK: APs
9LHA82v3
Guest
2. The AP uses
RADSEC uses RADSEC to verify APs
TCP Port 2083 the Private PSK:
3. If validated, the private PSK and user
9LHA82v3
session info is distributed to neighbor APs
1. The Guest connects to the Guest SSID
using WPA2 Personal and enters their
Guest Private PSK: 9LHA82v3
1. After the guest receives their Private PSK, they can use it as the WPA2 Personal
network key when connecting to the guest SSID
2. The AP forwards a verification request to a RADSEC proxy AP on the local subnet,
which could be itself, and that AP uses a secure RADSEC connection to ID
Manager to verify the Private PSK is valid
3. The Private PSK and user session information is securely distributed to neighboring
APs to permit secure and fast roaming
© 2015 Aerohive Networks CONFIDENTIAL 260
ID Manager Features
• Private PSK for Guest Access
• Customizable key creation and expiration times
• 802.1X and Captive Web Portal RADIUS authentication
• Third-party support with 802.1X
• RADIUS Proxy
• Customizable Interface for Guest Access
• Dashboards and Authentication Logs
• Notifications via Email, SMS, Twitter, Printer, and Screen
• Self service kiosk support for tablets and computers
• Anonymous access with time limits or bandwidth limits
• Employee Approval for Guest Self-Registration from CWP
• Employee Sponsorship – Authentication (Using SAML)
• Employee Sponsorship with AD integration
© 2015 Aerohive Networks CONFIDENTIAL 261
Secure Guest WLANs
Scenario
• SSID Profile:
Guest-X
X = (Student ID)
• SSID: Guest-X
• Select Private PSK
• Check Use Aerohive ID
Manager.
• Check Set the maximum
number of clients per private
PSK to: 3.
• Check Enable a captive web
portal with use policy
acceptance.
• Click Save.
265
© 2015 Aerohive Networks CONFIDENTIAL
Lab: ID Manager - Secure Guest WLAN
3. Save the Guest IDM SSID
266
© 2015 Aerohive Networks CONFIDENTIAL
Lab: ID Manager - Secure Guest WLAN
4. Configure Captive Web Portal
• Name: CWP-X
NOTE: In each section, you can click Customize… if you want to modify the
default web pages or import your own pages.
• Expand Captive Web Portal Success Page Settings
› Select Redirect to an external page and enter a URL:
http://www.aerohive.com
•© 2015
Save Aerohiveyour Captive Web Portal Settings
Networks CONFIDENTIAL 268
Lab: ID Manager - Secure Guest WLAN
6. Create User Profile
Assign a user
profile to the
SSID
• To the right of
your SSID,
under User
Profile, click
Add/Remove
• Choose User
Profiles
• Click New
• Name: Guest-X
• Attribute Number: 500
• VLAN-Only Assignment: 8
• Under Optional Settings
expand
User Firewalls and specify a guest
firewall policy
• Under IP Firewall Policy
› From-Access: Guest-Internet-
Access-Only
› To-Access:
<Leave Empty>
› Default Action: Deny
› Click Save
• Select
Guest-X(500)
• Click Save
Within a
management subnet
for APs, two APs
get elected as ID
Manager RADSEC
proxy APs
The ID Manager
RADSEC proxy
APs have
icons that
look like this
• Employee Sponsorship is an
ID Manager cloud service that
allows employees in your
organization to log in to the ID
Manager registration UI using
their corporate credentials and
register guests (essentially
acting as ID Manager
operators).
• Before you can enable
Employee Sponsorship, you
must already be using RADIUS
authentication that is integrated
with an external LDAP
NOTE:
NOTE: Employee
Employee sponsorship
sponsorship is
is available
available
database server.
from
from the
the registration
registration UI
UI only
only and
and is
is not
not
supported
supported on
on kiosks.
kiosks.
© 2015 Aerohive Networks CONFIDENTIAL 284
Using ID Manager as an External RADIUS
Server for 802.1X or Captive Web Portal
• If you work closely with other organizations whose employees often visit your
company and vice-versa, RADIUS Proxy simplifies the guest login process for these
employees by granting guest access using the employee’s home login credentials.
• If the domain is on the whitelist, ID Manager checks the corporate directory of the
other organization. If the visitor is valid, ID Manager gives your operator the option
to authenticate the visitor using their home credentials.
Admin: idm#-admin@ah-lab.com
Where # is lab=1,2,3,4, or 5
Password: aerohive123
© 2015 Aerohive Networks CONFIDENTIAL 289
ID Manager Configuration
2. Go to ID Manager
• Click Go
• Click CONFIGURATION.
• Authentication for
both wireless and
wired access can be
granted using a
user name and
password.
• Wireless
authentication
methods also
remain for Private
PSK or open
access.
© 2015 Aerohive Networks CONFIDENTIAL 294
ID Manager Configuration
6. Define more Guest Type settings
• Auth Types:
Select Private PSK
• Account Expires: in 24
hours
• Select Access key
must be used within: 2
days
Note: This restricts the
validity period of the key
causing the key to
automatically expire within
desired time frame
• Click Save
© 2015 Aerohive Networks CONFIDENTIAL 295
ID Manager Configuration
7. Verify your Guest Type was created
Admin: idm#-user@ah-lab.com
Where # is lab=1,2,3,4, or 5
Password: aerohive123
© 2015 Aerohive Networks CONFIDENTIAL 299
Lab: Guest Registration Interface
2. Register as Guest, Group, or Kiosk
• Click Guest-X
© 2015 Aerohive Networks CONFIDENTIAL 301
Lab: Guest Registration Interface
4. Enter Guest Information
• Confirm your
settings
• Click the Green
Next arrow button
to Confirm
• Optionally, your
SSID and Key
information is
displayed on the
screen
• Click Done
Here are examples of the email and SMS sent from ID Manager
Please check your email for your guest credentials
Please check your phone for an SMS message with your guest
credentials
© 2015 Aerohive Networks CONFIDENTIAL 307
Lab: Connect to the Secure Guest Network
1. Connected to the Guest SSID
• Open a web
browser
• Click Accept once
the captive web
portal page
appears
• From the ID
Manager
Monitor
Reports view you
can create
authentication
reports, session
reports and more.
The Guests
Step 1 Step 2 Step 3
Connect to the open Browser gets redirected Redirected to the
SSID to the Captive Portal landing page after the
Choose login method login
Peet’s Subscriptions
• Navigate to Home
Administration
HiveManager Services
• Place a check in the
Social Login Settings
check box.
• Under General Settings,
ensure Enable Social
Login is selected.
• Under Social Login
Test, click the Test
button to verify
connectivity to the
Social Login Service.
• Click Update to save the
configuration.
© 2015 Aerohive Networks CONFIDENTIAL 318
Optional Lab (if time permits)
1. Social Login – Guest SSID Profile
• Navigate to Configuration
• In Choose Network Policy, select your Corp-X
• Click OK.
• Name: Social-Guests-X
• Attribute Number: 8
• Default VLAN: 8
• Click Save
• From your remote PC, connect to your • In the captive web portal page, click the
Social-X SSID. link for a Social Media to use for login.
• Launch your browser from the remote
PC.
• Accept the Use Terms and Privacy • In the captive web portal page, click the
Policy. link for a Social Media to use for login.
200
100 Female
37%
0
da
y ay ay ay ay da
y ay Male
on esd esd rsd Fr
id
t ur und 63%
u
M Tu ed
n
Th Sa S
W
0
18-25 26-35 36-45 50+
Icon Login Name DOB Age Phone Last Visit Friend Coupon
Range Visit Freq Counts s
Aerohive’s
Instructor-led Training
340
© 2015 Aerohive Networks Inc.
Device Settings
• All devices including Access Points, Routers, Switches and HiveOS Virtual
Appliances have settings specific to their device type and or model.
• For example, an AP’s device settings are different than those found on a
Switch
STP Settings do not exist on APs Radio Profiles do not exist on Switches
Host Name
Topology Map
Radio Functions
Classifier Tags
The MGT0
Interface is a
logical IP interface
for the AP which is
a Layer two device
Ethernet Setup
Mesh
Mesh Portals
Portals
Mesh
Mesh Points
Points
User
User traffic
traffic can
can be
be routed
routed to
to the
the wired
wired network
network via
via a
a
mesh
mesh backhaul,
backhaul, reducing
reducing installation
installation cost
cost and
and
providing
providing fault
fault tolerance.
tolerance.
The channel map shows two Aerohive APs using channel 153 and two Aerohive
APs using 161 which provides double the bandwidth than an single channel
mesh solution
© 2015 Aerohive Networks CONFIDENTIAL 349
Radio Profiles
A Radio Profile determines the behavior of one of the two radios on Aerohive AP
to which you apply it. Each Aerohive AP has two radios. The wifi0 radio operates
in the 2.4 GHz band as specified in the IEEE 802.11b/g/n standards. The wifi1
radio operates in the 5 GHz band as specified in the IEEE 802.11a/n/ac
standards.
2.4GHz Client 2.4GHz & 5GHz Client 2.4GHz & 5GHz Client
(Out of Range of 5GHz) (In of Range of 5GHz)
• From Monitor
All Devices
Select your 0X-A-
xxxxxx Aerohive AP and
click and Modify
• For the 2.4 GHz radio,
click + to create a new
radio profile
• Click More Settings…
• Profile Name:
2.4GHz-X
• Radio Mode:
11g/n
Optional Advanced Settings
• Important Notes:
› Background scanning is used
for auto channel selection,
and rogue AP detection
› You can select a region or just
modify an existing region to
select your own channel plan.
The default is USA with
channels 1, 6, and 11
• Do not save yet...
3 clients
21 clients 6 clients
21 clients 60 clients
24 21 clients
357
1 2 3 4 5 6 7 8 9 10 11 12 13 14
• Profile Name:
5GHz-X
• Radio Mode:
11a/n
• NOTE: If the AP supports DFS in
your country, you can enable it here
• Expand Channel and Power
• Select 40 MHz and Above
• Expand Optimizing
Management Traffic Settings
• Enable Client Load Balancing
and select the Load Balancing
Mode: Station-Number
• Click Save
© 2015 Aerohive Networks CONFIDENTIAL 360
Lab: Radio Profile
6. Assign 11na Profile
361
© 2015 Aerohive Networks CONFIDENTIAL
Radio Profiles
Local Demo If Possible
• Students and Instructor: Observe the connected data rate of your classroom
laptop. Are you connected to 2.4 GHz or 5 GHz?
• Instructor ONLY repeat the previous lab using the Aerohive APs in the Training
Room and Update the Training Room Aerohive APs.
• Students and Instructor disconnect from the Aerohive Class SSID and then
reconnect.
• Go to MonitorClientsActive Clients and apply the Training Room-X Filter
you made in an earlier lab.
• Determine how many devices were able to be guided into 5 GHz. Note the data
rates of the clients.
• Go to MonitorAccess PointsAerohive Access Points.
• Locate the Training Room Aerohive APs.
• Examine the Client load on each Aerohive AP to see the balance of Client Devices
among the Aerohive APs
• On the desktop of your laptop verify the data rate you are using.
© 2015 Aerohive Networks CONFIDENTIAL 363
QUESTIONS?
Aerohive’s
Instructor-led Training
365
© 2015 Aerohive Networks Inc.
User Profiles – Provide User Policy
Assigned to SSIDs or Bridge Interfaces
User Profiles provide the policy to assign
to users when they access an SSID or
bridge interface
• Attribute Number
Used to identify the user profile in a Hive –
returned by Private PSK Group or from
RADIUS after successful authentication
• VLAN Assignment
The VLAN assigned to clients
• GRE Tunnels
L3-Roaming & Identity-based Tunnels
• User Firewalls
MAC level Firewall and
Stateful IP (L3/L4) Firewall Policies
• QoS Settings
Specifies rate limits and weights for user
queues, users, and user profiles
• Availability Schedules
Permitted User Access Times
• SLA Settings
Specify a service level agreement and decide
to report on and/or boost client performance
to meet a client’s SLA with help from the
dynamic airtime scheduling engine
• Client Classification Rules
Reassign user profiles based on the MAC
OUI, Operating System, Domain
membership or BYOD/CID ownership of a
user device.
Although the default MGT VLAN setting is 1, a good security best practice is to change
the setting for the MGT VLAN to a non-default value.
© 2015 Aerohive Networks CONFIDENTIAL 368
Using Trunked Ports and VLANS
SSIDs
Employee 802.1XVLAN 5
Device PPSK VLAN 10
IDM/Guest VLAN 20
LAN
• Traffic from the AP management interface to the LAN will be untagged and
dropped by the switch which expects the management traffic to be tagged.
VLAN 1 traffic is untagged.
• To correct this: The native VLAN on the Aerohive AP must match the native
VLAN on the switch
• The use of NTP to synchronize the timestamp on messages from all syslog clients
ensures that all messages reported to the Syslog server appear in the proper
chronological order.
• You can set up to four Syslog servers to which Aerohive devices can save event log
entries.
• Remember that devices send Syslog messages for the severity level you choose plus
messages for all the more severe levels above it. Choose to send information you must
collect.
1.
3.
In Network
6. Rogue
• Expand
Service Settings
• Next to WIPS
Policy
- Click +
• Name: WIPS-X
IMPORTANT:
IMPORTANT: For For class,
class, do
do not
not
enable
enable Automatic,
Automatic, because
because that
that
will
will impact
impact other
other classes
classes that
that are
are
going
going onon at
at the
the same
same time.
time.
389
© 2015 Aerohive Networks CONFIDENTIAL
Copyright ©2011
Email Notification of In Network Rogue APs (View
Only Permissions in Class)
Found to be
attached to the Reason(s) why
wired network considered rogue
• When mitigation is set to Semi-Automatic, you can mitigate in-net rogues by going
to: MonitorAccess PointsRogue APs
• Select a BSSID for a rogue SSID to mitigate
• Click Mitigation...Start Mitigation, and click Yes
• The APs will cooperate among themselves to determine which APs should
participate in mitigation, which is similar to automatic mitigation
© 2015 Aerohive Networks CONFIDENTIAL 392
Topology Maps
With Rogue AP Detection and Client Location
393
© 2015 Aerohive Networks CONFIDENTIAL
QUESTIONS?
Three Modes:
• WIPS Only Mode:
› The AP scans the channels and collects data that it then uses to
identify and mitigate rogues devices.
• Presence Only Mode:
› The AP collects, aggregates, and analyzes client Presence data.
Presence must be enabled under Reports->Presence Analytics
• WIPS and Presence Mode:
› When both modes are enabled, the AP both collects presence
data and monitors the network for rogue activity.
• Expand WIPS
Server Settings
• WIPS is enabled by
default in all radio
profiles.
• Only disable WIPS in
the radio profile if you
do not want WIPS
• A WIPS policy must
be still be configured
in your Network
Policy
Note: The dwell time is the time you want the sensor to remain on any channel
before moving to another channel to continue the scan.
Aerohive’s
Instructor-led Training
Click Help on the top menu bar to get a menu of the help options Click
Help
When you click Help in the upper right hand corner of the
HiveManager Settings you have several options.
› HiveManager Help
» Context sensitive help based on where you are when you select this
option
› Settings
» Lets you specify a path to host the online help web pages locally on
your network
› Videos and Guides
» Contains links to all Aerohive documentation and computer-based
training modules
» You can also download the web-based help system from here as well
› Check for Updates
» Checks Aerohive’s latest code
› About HiveManager
• Context sensitive
help can be viewed
in any configuration
window
• By default your PC
must be connected
to the Internet to
view the help files
unless you have
downloaded them
and hosted on your
own web server
Online Training
Deployment,
Quickstart, and
Mounting
Guides
CLI Reference
Guides
• To access the new Help System for Mobile Devices, simply go to:
http://www.aerohive.com/330000/docs/help/english/6.1r3/hm/mobile/
help.htm
• Shortened URL: http://bit.ly/1aO1kJ7
Good connection
High data rates & high successful
transmission rates
Marginal connection
Lower data rates / lower
successful transmission rates
Poor connection
Low data rates / low successful
transmission rates
Radio health
• At a glance
understanding of a
clients health
• Easy to drill into
http://blogs.aerohive.com/blog/living-on-the-edge/diagnosing-wi-fi-with-
aerohives-client-health-tool
Client Monitor allows you to monitor the process a wireless client goes through
when connecting with an Aerohive AP as well as other ongoing client activity
such as probe requests and responses.
Click Add • Note: Remember the Client MAC address for the
next step in the lab.
• Click Add
© 2015 Aerohive Networks CONFIDENTIAL 416
Lab: Client Monitor
2. Start the client monitor
• Select Filter Probe
Note: This removes all the probe
requests and responses you will see
from clients and APs so you can
1. Select
Filter Probe focus on protocol connectivity
2. Click Start
• Click Start
Note: Your client will be monitored
until you click Stop.
You can leave this window, and if you
go back to Operation...
Client Monitor, you will see the list
of all clients being monitored
• You can expand the window by
dragging the bottom right corner
• Select your client to see the
connection logs for your client as
3. Drag bottom right corner
they occur
of window to expand
PSK authentication
4-way handshake fails
and client is
de-authenticated
4-way handshake
completes
Client is assigned IP
address from DHCP
© 2015 Aerohive Networks CONFIDENTIAL 422
Client Monitor
If Client Does Not Exist In Active Clients
3. From Active
1. On a windows PC for example: Have client open a Clients, click
CMD prompt then type ipconfig /all Operation...
Make sure to view the Wireless Network Connection Client Monitor
4. Enter the
wireless
client MAC
address
2. Note Wireless
MAC Address
5. Select
6. Click Start Filter Probe
You do not need to know the client location or associated Aerohive AP. If you leave the fields blank, they will automatically be
found
© 2015 Aerohive Networks CONFIDENTIAL 423
Client Monitor Troubleshooting 802.1X Blog
The AP advertises a
WPA2 SSID that is its
hostname_ac
The administrator
connects to the SSID, Default gateway is not
and opens an SSH responding to PING
connection to the AP
Track IP
(Default Gateway)
Access Security
• Select WPA2-PSK
(WPA2-Personal)
› Encryption Method:
CCMP(AES)
› ASCII Key: aerohive123
› Confirm ASCII Key:
aerohive123
Optional Settings
• Use the default settings
Note: Telnet is secured because you are
using it over an encrypted Wi-Fi
connection. Also, if you know the MAC
addresses of the wireless cards on
administrator PCs, you can add them here
as well to limit access.
• Click Save
• Name: Track-X
• Enable IP tracking
Track the following targets
• Default Gateway
• Take action when:
all targets become unresponsive
Action
• Enable the virtual access
console
• Disable all active SSIDs
• Click Save Note: Note, disabling active SSIDs when the tracked IPs
are not available may lead people to believe the Wi-Fi is
not working, although the real problem is that the wired
network is down. If you enable this, please realize that
you may have to explain that to people.
© 2015 Aerohive Networks CONFIDENTIAL 430
Lab: Virtual Access Console
6. Active the Track IP Group
VLAN PROBE:
int mgt0 dhcp-probe vlan-range 1 10 timeout 2
Firewall/Gateway
10.5.2.1
Client SSID: Device-PPSK-X
• The Utilities Menu can be accessed from both the Utilities button and from
the MAPS view
• To access the Utilities from MAPS, right click on an AP and select the desired
tool
• Navigate to Monitor and place a check in the box next to your 0X-
A-###### AP
• Click Utilities and select Diagnostics Ping from the available list
• Navigate to Monitor and place a check in the box next to your 0X-
A-###### AP
• Click Utilities and select Diagnostics Show Running Config
from the list
• Navigate to Monitor and place a check in the box next to your 0X-
A-###### AP
• Click Utilities and select Diagnostics Show Version from the
list and find out which version of HiveOS is on your device
• Navigate to Monitor and place a check in the box next to your 0X-A-
###### AP
• Click Utilities and select Diagnostics Show DNXP Neighbors
from the list and see Layer 2 and Layer 3 neighbor relationships
• Navigate to Monitor and place a check in the box next to your 0X-
A-###### AP
• Click Utilities and select Diagnostics Show CPU from the list
and view the device CPU usage
• Enter a range of 1 to 10
• Click Start
• View the results
• A DHCP Discover
is sent out on each
specified VLAN in
the range from the
Aerohive AP
• If a DHCP offer is
received from the
DHCP server, the
Aerohive AP will
NAK will be sent to
free up the offer
• This tool ensures the
switches, routers,
DHCP relays, and
DHCP server all
work for the VLANs
that are available
• Navigate to Monitor and place a check in the box next to your 0X-A-
###### AP
• Click Utilities and select Status Advanced Channel Selection
Protocol
• Examine the Channels and power settings being used by your AP
• Navigate to Monitor and place a check in the box next to your 0X-A-
###### AP
• Click Utilities and select Status Interface
• Examine the configuration of both your wireless and wired interfaces
• Navigate to Monitor and place a check in the box next to your 0X-
A-###### AP
• Click Utilities and select Status Wi-Fi Status Summary
• Examine the status of your wireless interfaces
• LLDP/CDP can be enabled to allow your device to collect and transmit Link
Layer Discovery Protocol data and Collect Cisco Discovery Protocol data
• Typically this would be enabled via your Network Policy
• Here in Utilities you will have many of the same LLDP/CDP options
expected to be found in the CLI
• Reboot Device allows you to reboot devices from the Utilities menu
• Set Image to Boot allows you to select either the Active or Backup image
stored on the device
cla ss!
i s in
OT do th
O N
s eD
Plea
• Locate Device allows you to alter the LED status on Aerohive APs
• Facilitates rapid physical location of Aerohive APs
• You can select the LED Color
• You can alter the Blink Mode
i n c lass!
is
do th
D O NOT
se
Plea
• Allows you to use a different SSH client than the one provided in
HiveManager should you so desire
• Provides an opportunity to configure the SSH Proxy credentials and settings
• Allows you to retrieve the output of the show tech command through the
HiveManager GUI
• Displays a wealth of important technical support information
• Navigate to Monitor and place a check in the box next to your 0X-
A-###### AP
• Click Utilities and select Spectrum Analysis
• Click YES in the Confirm window
RB
CC
NC
3. The current configuration (CC)
becomes the rollback (RB)
configuration, and the new
configuration (NC) is then loaded
1. Administrator updates 4. If the Aerohive AP cannot
complete or delta contact HiveManager with
configuration of Aerohive APs CAPWAP after the configuration
update, the Aerohive AP will start a
configuration rollback timer, which
is 10 minutes, and after the timer
expires, the Aerohive AP will reboot
and use the rollback configuration
to regain connectivity back to
483
© 2015 Aerohive Networks CONFIDENTIAL HiveManager
Configuration Rollback
• In this example the Aerohive AP’s MGT0 interface is set to a VLAN that does not
exist on the switch the AP is connected to
• When updating the configuration, if you view the configuration, you can see that
the config rollback command is set
© 2015 Aerohive Networks CONFIDENTIAL 485
Configuration Rollback
Example – Configuration Update Results
Automatic
Automatic Contextual
Contextual Dashboard
Dashboard Filters
Filters
based
based on
on Device
Device Groups
Groups using…
using…
Location
Location
Network
Network Policies
Policies
Device
Device Tags
Tags
Additional
Additional Filtering
Filtering of
of Device
Device Groups
Groups based
based on…
on…
SSIDs
SSIDs
User
User Profiles
Profiles
• Click the Dashboard tab and select the Network Summary tab
• Select World
• Click the dropdown arrow on the far right
• Click Save as Report
• From the Dashboard tab click on the dropdown arrow on the far
right
• Select Export from the dropdown choices
Historical Filters
Top Apps by #
All Applications of users
• Multiple rules can be created and are evaluated from top to bottom
• Rules can be created using a Host Name, Server IP Address & Port
Number or just a Port Number
• Navigate to
Configuration, select
your Corp-X policy and
click OK.
• Under User Profile,
click on the link for
your Devices-X User
Profile
• Under Optional
Settings, expand
Firewalls
• Under IP Firewall
Policy click + next to
From-Access
© 2015 Aerohive Networks CONFIDENTIAL 506
Lab: Application Firewall
2. Create an Application Firewall Policy
• ddd
• Choose Group
• Type streaming
• Select 3-4 streaming
apps and move them to
the right >.
• Click OK.
• ddd
• ddd
• ddd
Aerohive’s
Instructor-led Training
519
© 2015 Aerohive Networks Inc.
Updating On-Premises HiveManager Software
Do not perform this operation in class
• In in Confirm dialogue
box, you are reminded to
verify that your devices
can reach URL’s ending
in aerohive.com.
• The software update
continues.
• When prompted, click
the Confirm button to
complete the update.
• There is different
software for each
Aerohive Device
platform.
• You can select from
existing software on
HiveManager.
• Device software not
already on HiveManager
can be obtained from the
support site and uploaded
to your HiveManager or
obtained via the Aerohive
Update Server
Internet
1. Administrator Uploads
HiveOS to a set of
Aerohive APs in a branch office
over a WAN link or the
Internet 3. The rest of the
Aerohive APs at
2. One Aerohive AP at the remote the remote site SCP to
site is selected as the Image the Image Upgrade
Upgrade Server and obtains the Server Aerohive AP
HiveOS software and install the HiveOS
from HiveManager software
• When updating multiple devices, you may wish to choose a single device to
pull the update from HiveManager and distribute it to the other devices on its
subnet, making it an Update Server.
• To do so, click the Change Server button and select the desired device. (Make
sure to NEVER select a Mesh Point as the Server. If its Mesh Portal
reboots during the process, updating the other devices will be problematic.)
• Click Upload
• After a few minutes, you should
see the update is a success
• When updating the software, if
you elected to activate at next
reboot, you can select the box
next your Aerohive Device and
reboot it or click the Reboot link
to activate the new HiveOS
version
Aerohive’s
Instructor-led Training
• Click Configuration
• Click the New Button
• Select Auto Provisioning in the
Navigation Pane
• Enter the IP Subnetwork upon which your APs reside using CIDR notation
as seen in the example used in the image below
• Click Save
• Click OK and close the import dialog box
Aerohive’s
Instructor-led Training
Hive – Cooperative control for a group of Hive Devices that share the same
Hive name and Hive password.
› There is no limit to the number of Hive Devices that can exist in a
single Hive
› Aerohive APs in a Hive cooperate with each other using Aerohive’s
cooperative control protocols:
» AMRP (Aerohive Mobility Routing Protocol)
– Layer 2 and Layer 3 Roaming, Load Balancing, Band Steering, Layer 2
GRE Tunnel Authentication and Keepalives
» DNXP (Dynamic Network Extensions Protocol)
– Dynamic GRE tunnels to support layer 3 roaming
» INXP (Identity-Based Network Extensions Protocol)
– GRE tunnels for guest tunnels
» ACSP (Automatic Channel Selection & Power) Protocol
– Radio Channel and Power Management
Aerohive APs must be configured to be in the same Hive to interoperate with these
features
© 2015 Aerohive Networks CONFIDENTIAL 545
Hive - AMRP Operation Modes
Attach Message, DA and BDA roles
Designated AP Backup Designated AP
...
The rest of the APs are in Attach Mode
• Aerohive AP Operational Modes for Aerohive APs in the
same subnet of a Hive
› Attach – sends topology and load info to DA
» If DA exists, it takes <3 seconds for a new Aerohive AP to attach
» Sends unicast heartbeats and topology updates to DA
› DA (Designated AP) – AMRP Hello protocol automatically elects one DA per subnet
» Broadcasts Hello Packets to neighbors every 3 seconds
» Periodically broadcast topology table to the Ethernet every 60 seconds
– Triggered update when other APs attach
› BDA (Backup Designated AP) – Is the backup for the DA
» Periodically broadcast Hello packets to neighbors every 3 seconds
» Syncs with DA every 20 seconds in unicast
546
© 2015 Aerohive Networks CONFIDENTIAL
Cooperative Control Example:
Roaming Handoffs using AMRP
Wireless Wired
Network Network
Policy Reporting Heat SLA
Configuration Maps Compliance
HiveManager NMS
A single
Mesh HiveAP
networking
HiveAPs areby itselfbest
and
discovered, acts path
as a
Dynamic
With
full-featured best
WithCooperative
aCooperative
second path forwarding
HiveAP,Control,
Control, fast
forwarding
As policy isenterprise
more HiveAPs
Cooperative can power
pushed
RF beareclass
used
and access
for
the
added,
levels
and stateful
clients
clients
stateful roaming
can
can
roaming, securely
securely
point provides
cooperative
extra
WLAN
coverage, resiliency
is andand
operational
reliability
minimize
RF, and
station
resiliency
and seamlessly
Identity-based load
without
seamlessly
security, includingroam
balancing
a
roamsingle
stateful and
inspection
reachability
backhaul
co-channel
HiveManager bandwidth
FW, rogueisdetection
a single & increases
interference
mitigation
mgmt interface for
seamless point
across
across
configuration,
Airtime OS
Scheduling,of
the
the
resiliency failure
WLAN
WLAN
updates
SLA &are
complianceenabled
monitoring of
and local
Dynamically reroutes
thousands
forwarding around
of devices
implemented failures
at the edge
As Clients 0 1 2
3 4 5
Roam, APs 6 7 8
Constantly 12
9
13
10
14
11
11
15
Update 16
19
17
20
18
21
Neighbours 22 23
27
24
28
25
25
26
29 30 31
32 33 34 35
36 37
37 38
39 40
X AP to which client is Connected
• Next-hop neighbors
are APs that within
radio range.
552
© 2015 Aerohive Networks Inc.