HPE Aruba Networks Networks Dynamic Segmentation User Based Tunneling 2.0

  Рет қаралды 10,712

Airheads Broadcasting

Airheads Broadcasting

Күн бұрын

Пікірлер: 19
@zbigniewkozyra
@zbigniewkozyra 4 жыл бұрын
Great video. One problem.CLI terminal window is so small. It is 1/6 of my screen. Barely can read your typing.
@AirheadsBroadcasting
@AirheadsBroadcasting 6 жыл бұрын
More great, new features in ArubaOS-Switch 16.08. Dik gives you a walk-through of the Dynamic Segmentation improvements.
@tehnikis
@tehnikis 5 жыл бұрын
Why do you have to specify VLAN twice - under the user role on the controller and on Clearpass in the enforcement profile? Wouldn't it be logical that CP tells the switch and it passes the VLAN information to the controller?
@jazztptman214
@jazztptman214 6 жыл бұрын
Great video. Quick question - can you combine a switch downloadable user role with a secondary (controller) downloadable role? In the video you set the role to employee and had to create the employee role on the controller. Can you have everything dynamic and controlled from ClearPass?
@JohnEgilSolberg
@JohnEgilSolberg 6 жыл бұрын
Yes! Thats the beauty of it :) There is an updated whitepaper that takes you through it - just search for "ArubaOS-Switch Dynamic Segmentation Technical Whitepaper.pdf" The introduction of "reserved-vlan" is a nice touch. A comment on that - you don't need the vlan defined on either switch or controller. Also remember that you need to be on CP 6.7.8, AOS-S 16.08 AND AOS 8.4 for it all to run as smoothly as in the guide.
@oss279
@oss279 4 жыл бұрын
@@JohnEgilSolberg Hi John, can you elaborate more on the how exactly the reserved vlan works? what i know is that we do not need to configure this VLAN on controller but how exactly the reserve vlan is used as a mechanism to tunnel traffic from SW to MC
@JohnEgilSolberg
@JohnEgilSolberg 6 жыл бұрын
Nice walkthrough Dik! Want to point out that there is a few things you do that isn't needed with the software versions you list: * Manual download of the Clearpass RootCA certificate, this is done automatically (according to Tim in a recent Airheads post - haven't verified it myself) * Adding VLAN to secondary role, this is not required with AOS-S 16.08 and is only added to the Role in the Controller So people should combine this with Aruba Controller DUR to give full flexibility including the USER VLAN pushed from Clearpass. There is a whitepaper for this that you might want to point out ;) And - can you elaborate more how to do this with a cluster? It's not clear which IP you use if you have say a cluster of 4 controllers.. In my test with 2 controllers I just added the first Controller IP, and then the second was automatically added as a tunnel even if I didn't add it as secondary-controller-ip. Cheers!
@AirheadsBroadcasting
@AirheadsBroadcasting 6 жыл бұрын
Hi John, You're correct by saying that the certificate push is done automatically, however for the sake of speed in the video I forced the download of the certificate. As for adding the VLAN in the secondary user role on ClearPass, you're correct. You don't really need that, you can also see this when you issue the "show port-access client detail" command. There is no VLAN for that authenticated user, it is enforced on the mobility controller. As for the cluster setup, this is a complete automatic process. In a cluster environment you provide the Master IP address as the tunneled-node-server. The mobility master knows all the controller members in the cluster. What will happen is that when the tunneled-node-server connection (control-plane) is established, it will be established with one of the cluster members. This will be the SAC (Switch Anchor Controller). At the same time a dormant tunnel is established with a S-SAC (Secondary Switch Anchor Controller). When the primary fails there is an instant fail over to the S-SAC. The same applies to the user tunnel. The user tunnel is established with the UAC (User Anchor Controller). This is the data plane. There is also a dormant entry creation with a S-UAC so when the active connection fails, there is an instant fail over to the secondary. The tunnel entries are maintained in a bucket map that is maintained by the mobility master. The bucket map contains all the client and switch anchor controller mappings so there is always an up to date connection list. For example, if you have a cluster with 4 members, each SAC/S-SAC/UAC/S-UAC connection is load balanced across all 4 members, this is done dynamically based on the information in the bucket map. Hope this helps.
@JohnEgilSolberg
@JohnEgilSolberg 6 жыл бұрын
​@@AirheadsBroadcasting Thanks for the reply! You can't add the MM as IP for tunneled-node-server controller-ip - unless there is some other magic config that needs to be applied to the controller. Like - how would the MM know which MD-cluster and/or MC to terminate the tunnel on?
@AirheadsBroadcasting
@AirheadsBroadcasting 6 жыл бұрын
​@@JohnEgilSolberg​ You are right that you can't add the MM as IP for tunneled-node-server. You need to point it to the IP address of one of the cluster members or to the VRRP IP address in case you have VRRP configured on your cluster. The switch will automatically learn all cluster members and setup tunnels to the SAC and S-SAC.
@AirheadsBroadcasting
@AirheadsBroadcasting 6 жыл бұрын
@@JohnEgilSolberg Hi John-Egil, I have verified this. You just add one of the mobility controller IP addresses. Each MC controller contains the bucket map with all the other MC members, so as soon as you configure the controller IP, the MC sends a bootstrap message containing the bucket map and the SAC and S-SAC connections between the switch and another MC in a cluster will be established. So, for example if you have 4 MC's with IP address 1, 2, 3 and 4 and you configure the controller ip to be 1, a SAC is established with 1 and a S-SAC with one of the other MC's (can be any). And it's all dynamic for the S-SAC. Hope this makes sense.
@JohnEgilSolberg
@JohnEgilSolberg 6 жыл бұрын
@@AirheadsBroadcasting Yes it does - thanks for checking up on andverifying this :)
@munkh-orgilerdenebat8778
@munkh-orgilerdenebat8778 5 жыл бұрын
Thanks for great video. I did exactly what you did. But switches are failed to download user-roles. What could be problem?
@AirheadsBroadcasting
@AirheadsBroadcasting 5 жыл бұрын
Hello, this could be related to a number of things. First, it is super important that the time on your switch is in sync with ClearPass. So, make sure that your ClearPass and switches are using the same time source. In addition, checkout whether the certificate is downloaded to the switch. You can check this by doing the following: enable debugging on the switch and enable event debugging (debug destination session and debug event). Then issue the command: radius-server host a.b.c.d clearpass (a.b.c.d is the IP address of your ClearPass server). Once you issue the command, the debug screen should show the download of the certificate. If this doesn't happen, then it might be that the https certificate that you are using on ClearPass is not a trusted certificate. If that is the case you have to manually download/copy the certificate onto the switch by creating a ta-profile and copy the certificate in the ta-profile through tftp. If you're certificate is ok, then next to check is whether you have the downloadable user role admin user created on ClearPass and on the switch. This user is used to ssl download the role. If all of these actions don't help, then you have to start debug your security on the switch. Enable "usertn" and "security ssl" debugging and checkout what is happening on the console when you authenticate a device. Typically, most common issues are related to timesync, certificate and dur admin user. Hope this helps.
@munkh-orgilerdenebat8778
@munkh-orgilerdenebat8778 5 жыл бұрын
@@AirheadsBroadcasting in my case ntp and duradmin config s are okey. I upload certificate to switch as you showed in the video. Now i will try to upload https certificate manually.
@munkh-orgilerdenebat8778
@munkh-orgilerdenebat8778 5 жыл бұрын
@@AirheadsBroadcasting I checked certificate on switch. It says pending. I uploaded it manually. This time it says invalid anchor certificate.
@munkh-orgilerdenebat8778
@munkh-orgilerdenebat8778 5 жыл бұрын
@@AirheadsBroadcasting Problem was related with certificate. I created certificate request from CPPM first and signed with our cert server. Then uploaded that certificate to the clearpass. After that everything works fine :)
@null_zero
@null_zero 6 жыл бұрын
Good walk-through, Dik. How about a shorter video that just shows the specific config steps?
@AirheadsBroadcasting
@AirheadsBroadcasting 6 жыл бұрын
Hi Joe, I think that's a good idea. Let me work on that.
AOS 8.x REST API with Python
13:24
Airheads Broadcasting
Рет қаралды 7 М.
HPE Aruba Networks User Based Tunneling with Dynamic User Roles
16:08
Airheads Broadcasting
Рет қаралды 6 М.
Don’t Choose The Wrong Box 😱
00:41
Topper Guild
Рет қаралды 62 МЛН
AOS-CX Virtual Switching Extension - HPE Aruba Networks AOS-CX VSX
27:33
Airheads Broadcasting
Рет қаралды 47 М.
Microsoft Intune From Zero to Hero
39:08
Andy Malone MVP
Рет қаралды 286 М.
HPE Aruba Networks Networks Dynamic Segmentation Inside Out part I: User roles
7:43
Cabling Devices | Network Fundamentals Part 2
25:25
Network Direction
Рет қаралды 898 М.
Understanding Active Directory and Group Policy
51:56
Kevin Brown
Рет қаралды 1,8 МЛН
AOS 8.9 Series - Part 10 - AirGroup
25:13
Airheads Broadcasting
Рет қаралды 10 М.
User roles on AOS and ClearPass
22:56
Airheads Broadcasting
Рет қаралды 24 М.
OSI Model Deep Dive
31:52
Kevin Wallace Training, LLC
Рет қаралды 351 М.
Ansible 101 - Episode 3 - Introduction to Playbooks
1:02:07
Jeff Geerling
Рет қаралды 104 М.
Nastya is preparing for a hurricane - safety rules for kids
9:23
Like Nastya
Рет қаралды 7 МЛН
ДОБРО БАБУШКЕ/ВЫЗВАЛИ ПОЛИЦИЮ #shorts
1:00
Леха Медведь
Рет қаралды 2,9 МЛН
Как открыть двери машины без ключей
0:59
Брат Лизоньки. Как его зовут?
0:48
Hanna11-тиктокер с 4 мультами
Рет қаралды 2,4 МЛН
Қызын құттықтап Келді😱😱😱
4:01
1канал
Рет қаралды 98 М.