AOS GuestAcccess-AppNote
AOS GuestAcccess-AppNote
AOS GuestAcccess-AppNote
Version 1.0
Application Note
Copyright
2012 Aruba Networks, Inc. AirWave, Aruba Networks, Aruba Mobility Management System, Bluescanner, For Wireless That Works, Mobile Edge Architecture, People Move. Networks Must Follow, RFprotect, The All Wireless Workplace Is Now Open For Business, Green Island, and The Mobile Edge Company are trademarks of Aruba Networks, Inc. All rights reserved. Aruba Networks reserves the right to change, modify, transfer, or otherwise revise this publication and the product specifications without notice. While Aruba uses commercially reasonable efforts to ensure the accuracy of the specifications contained in this document, Aruba will assume no responsibility for any errors or omissions.
Legal Notice
ARUBA DISCLAIMS ANY AND ALL OTHER REPRESENTATIONS AND WARRANTIES, WEATHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NONINFRINGEMENT, ACCURACY AND QUET ENJOYMENT. IN NO EVENT SHALL THE AGGREGATE LIABILITY OF ARUBA EXCEED THE AMOUNTS ACUTALLY PAID TO ARUBA UNDER ANY APPLICABLE WRITTEN AGREEMENT OR FOR ARUBA PRODUCTS OR SERVICES PURSHASED DIRECTLY FROM ARUBA, WHICHEVER IS LESS.
www.arubanetworks.com 1344 Crossman Avenue Sunnyvale, California 94089 Phone: 408.227.4500 Fax 408.227.4550
Application Note
Table of Contents
Chapter 1: Introduction
Reference Material
5
5
Chapter 2: Chapter 3:
ArubaOS or Amigopod for Visitor Management Guest Networks with Captive Portal Authentication
Captive Portal Captive Portal Authentication Process Guest Provisioning Licenses Required Certificates
6 9
9 9 11 11 11
Chapter 4:
12
12 17 18 20 24 25 27 29 30 36
Chapter 5:
Guest Provisioning
Configuring Guest Provisioning User Configuring the Guest-Provisioning Page Modifying Guest Fields on the GPP Modifying Page Design of the GPP Email Options for the GPP Creating Guest User Accounts
37
37 38 38 42 42 44
Chapter 6:
47
47 51 54 56 58
Table of Contents | 3
Application Note
Optional SSID and VAP Profile Parameters for Guest Network Disabling lower Data Rates Denying Inter User Traffic
58 58 60
61
61
Table of Contents | 4
Application Note
Chapter 1: Introduction
Every organization, big or small, wants to provide some sort of network access to visitors. The visitors may be guests, contractors, auditors, or partners. The Aruba guest access solution provides rolebased access to each category of visitors and secures the sensitive corporate resources. In typical Aruba guest access deployment, the guest users are prevented from accessing private network resources, and the contractors and partners can be give restricted access to some corporate resources. Managing visitor accounts has always been difficult for IT teams. The Aruba guest access solution simplifies guest provisioning by allowing authorized non-IT professionals, such as receptionists, to create and delete guest accounts. Additional features include customizable captive portal pages and the ability to gather detailed account information. This guide explains the configuration of enterprise guest access using the captive portal capabilities of the base ArubaOS software. Table 1 lists the current software versions for this guide. Table 1 Product
ArubaOS (mobility controllers) ArubaOS (mobility access switch) Aruba Instant MeshOS AirWave AmigopodOS
Reference Material
This technical document assumes that the reader is familiar with the Aruba technology and knows how to set up a working WLAN using profiles such as SSID, VAP, and AAA profiles. The following prerequisite documentation is highly recommended before reading this document:
Aruba 802.11n Networks Validated Reference Design, available at www.arubanetworks.com/vrd Aruba Campus Wireless Networks Validated Reference Design, available at www.arubanetworks.com/vrd. The complete suite of Aruba technical documentation is available for download from the Aruba support site. These documents present complete, detailed feature and functionality explanations outside the scope of the VRD series. The Aruba support site is located at: https://support.arubanetworks.com/. This site requires a user login and is for current Aruba customers with support contracts.
Introduction | 5
Application Note
Application Note
Table 2 Feature
Comparison of ArubaOS Guest Access and Amigopod (Continued) ArubaOS ArubaOS Plus Amigopod
Customizable guest-provisioning operator role External servers for operator logins Provisioning of nonguest user roles by operators Limit operators to view only the account they created Self-registration workflow with automated login Sponsor-approved self-registration Time zone support for guest access in distributed deployments Bulk provisioning of guest accounts (CSV import and automatic generation) Export/import of user database Mandatory and nonmandatory fields Guest password complexity requirements Guest account information printing via templates Guest credential delivery through email and SMS Force password change on first login Delete and/or disable guest accounts on expiration
Application Note
Table 2 Feature
Comparison of ArubaOS Guest Access and Amigopod (Continued) ArubaOS ArubaOS Plus Amigopod
Application Note
All other internal resources should be unavailable for the guest. Employee traffic should be prioritized on the wireless medium.
The native ArubaOS can be configured to address these requirements of an enterprise network.
Captive Portal
Wireless networks used by corporate employees should always be secured using Layer 2 methods such as WPA2. For guest access, providing Layer 2 authentication using pre-shared keys (PSK) or 802.1X is not a viable solution due to the technical complexity. Instead authentication is moved to Layer 3. Captive portal authentication is a Layer 3 authentication method that redirects users to a captive portal page when they start a web session. The captive portal page can be used for various purposes, such as authenticating the guest using a user name and password, providing an acceptable use policy, or self registration with an email address. Captive portal on ArubaOS can be configured to authenticate guest users based on user/password or valid email ID information. The system can also be configured simply to present an acceptable use policy and an accept button through custom configuration of the HTML page. ArubaOS does not support the use of advanced features such as payment services, but it can redirect to other portals such as Amigopod for additional services. Captive Portal Authentication Process Captive portal is a Layer 3 authentication, which requires that the devices connect to the network and obtain an IP address and related DNS information before authenticating through the captive portal. The following steps explain the entire captive portal process when the native ArubaOS is used for captive portal authentication: 1. The device that is associating to the guest SSID is assigned an initial role (guest-logon role in the example configuration). This initial role allows DHCP, so the user gets an IP address. 2. The user opens a browser and makes an HTTP (or HTTPS) request to some destination (for example,www.bbc.com).
Aruba Networks, Inc. Guest Networks with Captive Portal Authentication | 9
Application Note
3. The resolver in the device sends a DNS request to resolve the www.bbc.com. The initial role (guest-logon role) permits DNS services, so the resolver can communicate with the DNS server. 4. The DNS server replies with the correct address to www.bbc.com. 5. The resolver tells the browser which IP address to use based on the DNS reply. 6. The browser initiates a TCP connection to port 80 of the www.bbc.com address. 7. The controller intercepts the connection and spoofs the initial TCP handshakes of the HTTP process. At this moment, the client browser thinks it is communicating with the bbc.com server. 8. When the browser sends the HTTP GET request for the web page, the controller replies saying that bbc.com has temporarily moved to <https://securelogin.arubanetworks.com/[string that identifies client]>. 9. The browser closes the connection. 10.The browser attempts to connect with <https://securelogin.arubanetworks.com/[string that identifies client]>, but it first needs to send a DNS request for the address. 11.The actual DNS server responds that it cannot resolve <https://securelogin.arubanetworks.com>, but the controller intercepts that reply and changes the packet to say that securelogin.arubanetworks.com is at the IP address of the controller itself. Remember that it is critical that the DNS server sends back a reply to the query. It is only then that the controller can spoof the reply back from the DNS server. Sending a DNS request without receiving a reply is not sufficient, since without a reply the controller will never help the client resolve securelogin.arubanetworks.com. 12.The browser initiates an HTTPS connection to address of controller, which responds with the captive portal login page, where the guest authenticates. 13.After successful authentication, the user is assigned the post authentication role (auth-guest role in the example configuration). This is the default role in the captive portal profile. 14.After authentication, the browser is redirected to bbc.com at the address originally resolved by the DNS. Alternatively, if a welcome page is configured, the browser is redirected to the welcome page. 15.To successfully redirect to the original web page the controller spoofs a reply from bbc.com to tell the client that bbc.com has permanently moved to bbc.com. This step corrects the temporary relocation that occurred as part of the captive portal login. 16.This causes the client to re-query DNS for the address of www.bbc.com. 17.The browser starts to communicate with the actual bbc.com server.
Application Note
Guest Provisioning
Usually, guest users are required to provide a username and password for captive portal authentication. These guest accounts must be created on the authentication server against which the guest users are authenticated. Every time a guest user account has to be created, an IT staff must login to the authentication server and create it. Adding guest accounts to the authentication server quickly becomes a cumbersome task for the IT team. Aruba guest provisioning solves this problem by allowing non-IT professionals, such as receptionists, to create and delete guest accounts. The Amigopod and base ArubaOS software have guest provisioning capabilities. Any authentication server type available on ArubaOS can be used as the authentication server for captive portal authentication. However, if the base ArubaOS software is used for guest provisioning, only the internal database of the controller can be used as the authentication server for captive portal authentication.
Licenses Required
Captive portal authentication is supported on the base ArubaOS software and it does not require any separate license. However, configuration of guest specific user roles requires the PEFNG license to be present on the mobility controller.
Certificates
The Aruba controller ships with a default server certificate. This certificate demonstrates the secure login process of the controller for captive portal, secure shell (SSH), and WebUI management access. This certificate is not recommended for use in a production network. Aruba strongly recommends that you replace this certificate with a unique certificate that is issued to the organization or its domain by a trusted certificate authority (CA).
Application Note
NOTE
Application Note
Table 3 and Table 4 and Figure 1 through Figure 5 show the configuration of a guest VLAN and the related DHCP services. Table 3 VLAN ID
900
Guest VLAN IP
192.168.200.1
Figure 1
Creating a VLAN
Application Note
Figure 2
Figure 3
Guest VLAN
Application Note
Figure 4
Table 4
Pool Name
guestpool
DNS Server
208.67.222.222 (Public DNS server) 208.67.222.220 (Public DNS server)
Network
192.168.200.0
Netmask
255.255.255.0
NOTE
Test that the DNS services are working properly from the guest subnet. A functional DNS service is an integral part of captive portal authentication process.
Application Note
Figure 5
Application Note
Figure 6
NOTE
Use the public DNS server in your location. If a public DNS server is not available in your region, the guest users should be allowed access to the internal DNS server.
Application Note
The auth-guest role uses these policies: cplogout (predefined) guest-logon-access block-internal-access auth-guest-access drop-and-log A policy might have one or more rules that apply to several networks or hosts. Creating a separate rule for each host or network might be laborious and will increase the number of rules in the policy. The network destination alias feature in the ArubOS can be used to simplify firewall polices that have a set of rules that are common to a group of hosts, domains, or networks. Network Destination Alias The network destination alias feature in the ArubaOS can be used to group several hosts or networks. Aliases can be used when several rules have protocols and actions common to multiple hosts or networks. Alias allows the addition of domain/host names and IP addresses. The IP addresses can be added by host, network, or range. When the invert parameter of an alias is enabled, the rules that use that alias are applied to all the IP addresses, domains and hostnames except those specified in the alias. Table 5 lists the aliases that will be useful in configuration of user roles. Table 5 Aliases Purpose
Defines the public DNS servers
Alias Name
Public-DNS
IP Address/ Range
Host 208.67.222.222 208.67.222.220 These are OpenDNS servers. For more details on OpenDNS see www.opendns.com Network 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16
Internal-Network
Application Note
Figure 7
Aliases
Application Note
Defining Guest Access Policies Guest roles are made up of a number of polices that can be predefined and reused in the system. The following sections describe the policies that will be used to define the rights of the guest in their various roles.
Configuring the guest-logon-access Policy
The guest-logon-access policy is similar to predefined logon-control policy, but it is much more restrictive. The guest-logon-access policy is a part of the guest-logon and auth-guest roles. The rules defined in this policy allow these exchanges: Allow DHCP exchanges between the user and the DHCP server, but block other users from responding to DHCP requests. Allow DNS exchanges between the user and the public DNS server. Remember that the guests should be allowed to access only the local resources that are required for IP connectivity. These resources include DHCP and possibly DNS if an outside DNS server is not available. Table 6 summarizes the rules used by the guest-logon-access policy. Table 6 Rule Number
1
Destination
Any
Service
UDP min port = 68 max port = 68 Service svc-dhcp (udp 67 68)
Action
Drop
Purpose
This rule drops responses from a personal DHCP server. This action prevents the clients from acting as DHCP servers. This rule allows clients to request and discover DHCP IP addresses over the network. The DHCP server on the network does not fall under the user category. Therefore, its response on port 68 is not dropped by the first rule. The first two rules guarantee that DHCP is processed only by legitimate DHCP servers on the network. This rule allows DNS queries only to the DNS servers that are defined in the Public-DNS alias.
Any
Any
Permit
User
Alias Public-DNS
permit
Application Note
Figure 8
guest-logon-access policy
The internal resources of an organization should be available only to employees or to trusted groups. Guest users are not part of the trusted entity, so they must be denied access to all internal resources. As the name implies, the block-internal-access policy denies access to all internal resources. This policy is a part of the guest-logon and auth-guest roles. Table 7 summarizes the rules used by the block-internal-access policy. Table 7 Rule Number
1
Destination
Alias Internal-Network
Service
any
Action
drop
Purpose
This rule denies access to all the addresses that are in the InternalNetwork alias.
Application Note
Figure 9
Configuring the auth-guest-access Policy
block-internal-access policy
The most important purpose of the auth-guest-access policy is to define the protocols and ports that the users are allowed to access. This policy is an integral part of the auth-guest role. The auth-guestaccess policy allows HTTP and HTTPS traffic to go to any destination from the user. When this policy is combined with the block-internal-access policy in the auth-guest role, the users will be allowed HTTP and HTTPS access to the public websites only. If you want your guest users to use their IPsec clients, create rules in this policy that allows the use of ports 4500 (for IPsec NAT-T) and 500 (for IKE).
NOTE
Table 8 summarizes the rules used by the auth-guest-access policy. Table 8 Rule Number
1 2
Destination
Any Any
Service
Service svc-http Service svc-https
Action
permit permit
Purpose
This rule allows HTTP traffic from the users to any destination. This rule allows HTTPS traffic from the users to any destination.
Application Note
Figure 10
Configuring the drop-and-log Policy
auth-guest-access policy
The drop-and-log policy denies all traffic and records the network access attempt. The logging function in this policy increases your syslog repository. If you do not require logging, remove the log action from the firewall rule of this policy.
NOTE
Table 9 summarizes the rule used by the drop-and-log policy. Table 9 Rule Number
1
Destination
Any
Service
Any
Action
Deny
Log
Yes
Purpose
This rule denies access to all services on the network and logs the network access attempt.
Application Note
drop-and-log policy
The guest-logon role is the first role that is assigned to the users when they associate with the guest SSID. Users in this role have access only to the DHCP/DNS services and are redirected to the captive portal page whenever they try to access a web page. The captive portal page requires login credentials. The captive portal authentication profile that is appended to this role specifies the captive portal login page and other configurable parameters such as the default role and the type of login. To create and add the captive portal authentication profile to this guest role, see Configuring the Captive Portal Authentication Profile on page 30. Table 10 describes the policies in the guest-logon role. Table 10 Policy Number
1
Purpose
This predefined policy initiates captive portal authentication. This policy redirects any HTTP or HTTPS traffic to port 8080, 8081, or 8088 of the controller. When the controller sees traffic on these ports, it checks the captive portal authentication profile associated with the current role of the user and processes the values specified on this profile. This policy allows DHCP and DNS services. For details, see Configuring the guest-logon-access Policy on page 20.
guest-logon-access
Application Note
guest-logon role
The auth-guest role is assigned to users after they authenticate successfully through the captive portal. This role is the default role in the captive portal authentication profile. This role allows only HTTP and HTTPS services to Internet. Sometimes an organization wants its guest users to use the printers in the internal network. In such cases, create a separate policy that allows user traffic to an alias called printers. This alias must include only the IP address of the printers that the guests are allowed to use. Place this policy in the auth-guest user role just above the block-internal-access policy.
Application Note
Table 11 describes the policies in the auth-guest role. Table 11 Policy Number
1
Purpose
This policy makes the controller present the captive portal logout window. If the user attempts to connect to the controller on the standard HTTPS port (443), the client is NATed to port 8081, where the captive portal server will answer. If this rule is not present, a wireless client may be able to access the administrative interface of the controller. This policy denies personal DHCP servers and provides legitimate DHCP services and DNS. This policy blocks access to internal network. This policy should be placed before the next policy that allows HTTP and HTTPS service, otherwise guest users will have access to the internal websites. This policy allows HTTP and HTTPS services to any destination. Any traffic that does not match the previous policies encounters this policy. This policy denies all services and logs the network access attempt.
2 3
guest-logon-access block-internal-access
4 5
auth-guest-access drop-and-log
cplogout position 1 guest-logon-access position 2 block-internal-access position 3 auth-guest-access position 4 drop-and-log position 5
Application Note
Figure 13
auth-guest
NOTE
Application Note
Table 12 summarizes the parameter in the sample guest SSID profile. Table 12 Guest SSID Profile Network Name (SSID)
Guest
SSID Profile
guestnet
Authentication
Open
Encryption
none
WMM
__
Purpose
Guest users. (Captive portal is used to provide Layer 3 authentication.)
Figure 14
Application Note
Server
Internal (predefined)
Figure 15
Server group
Application Note
auth-guest diasbled
_ enabled
Login page
/auth/index.html
/auth/welcome.html enabled
enabled --
Application Note
Table 14 Parameter
Black List
enabled
Remember to add a server group, which defines internal database as the authentication server, to the captive portal profile.
Captive Portal Configuration
! aaa authentication captive-portal "guestnet" default-role "auth-guest" no guest-logon server-group "Guest-internal" logout-popup-window login-page "/auth/index.html" welcome-page "/auth/welcome.html" show-acceptable-use-policy !
Application Note
Figure 16
Application Note
Figure 17
Captive portal page when user and guest login are enabled
Figure 18
Application Note
Figure 19
After you configure the captive portal profile, append it to the initial role, which is the guest-logon role in the example configuration.
Appending Captive Portal Profile to Initial Guest Role
! user-role guest-logon captive-portal guestnet !
Application Note
Figure 20
Application Note
Figure 21
After completing all the above configurations, create the required VAP profile and attach it to an AP group. For details about configuring the VAP profiles and AP groups, see the Aruba Campus Wireless Networks Validated Reference Design.
Application Note
NOTE
Guest Provisioning | 37
Application Note
A network administrator with root access to the controller can create a guest-provisioning user on the controller for local authentication. To create guest-provisioning user, add a management user account with the role set to guest-provisioning. The predefined guest-provisioning role available on the ArubaOS software cannot be edited.
Creating a Guest-Provisioning User Account on the Controller
! mgmt-user "receptionist" "guest-provisioning" ****** !
Figure 22
Guest Provisioning | 38
Application Note
The Guest Fields tab has these columns: Internal Name: The unique identifier that is mapped to the label in the UI. This filed cannot be edited. Label in UI: Name of the field display on the main GPP and while creating guest accounts.
Display in Details: The fields of the guest account that are selected as display in details are hidden from the main GPP. These fields are shown only when the show details parameter in the GPP is enabled and a user account is selected. Display in Listing: These fields of the guest account are displayed on the main GPP by default.
Figure 23
Guest Provisioning | 39
Application Note
Figure 24
Figure 25
Guest Provisioning | 40
Application Note
Figure 26
Display In Details fields shown only when the Show details field is enabled on the GPP
Guest Provisioning | 41
Application Note
Modifying Page Design of the GPP The page design of the GPP can be modified to add or change the company banner, heading and text, and background colors that appear on the GPP.
The email options of guest provisioning allows you to edit the subject, from address field and the body of the email send, to the guests and sponsors. Emails can be chosen to be sent automatically when an account is created or manually from the GPP at any time. To send emails to the guests and sponsors from the controller, the simple mail transfer protocol (SMTP) parameters on the controller must be configured. To configure SMTP on the controller, this information is required:
Aruba controller does not support the use of secure simple mail transfer protocol (SMTPS).
Aruba Networks, Inc. Guest Provisioning | 42
Application Note
SMTP Configuration
! guest-access-email smtp-server "10.10.10.100" smtp-port 25 !
Figure 28
Guest Provisioning | 43
Application Note
Figure 29
Guest Provisioning | 44
Application Note
To create a guest account on the GPP, the guest-provisioning user must perform these tasks: 1. Click the New tab on the GPP. 2. Fill the guest fields. 3. If required, send emails manually. Guest user accounts are automatically removed from the internal database when they expire.
NOTE
Figure 30
Figure 31
Guest Provisioning | 45
Application Note
Figure 32
Figure 33
Creating guest accounts directly on the internal database using root access
Guest Provisioning | 46
Application Note
Time Range
A time-of-day restriction policy can be used to allow guests to access the network only during normal working hours, because they should be using the network only while conducting official business. A time-of-day restriction policy prevents guest users from using the network after normal working hours. You can define a time range in ArubaOS that can be used in firewall policies to allow users to associate to the guest network only during certain hours of the day.
Access controlled
Figure 34
The types of time ranges available are these: 1. Absolute: This time range starts and ends on a specific date and at a specific time. 2. Periodic: This recurring time-range starts and ends at a specific time. The recurring interval can to set to be daily, weekdays, weekends, or any particular day of the week. Table 16 lists the parameters used in the configuration of a time range named Working-hours. Table 16 Name
Working-hours
Start Date
weekday
Start Time
07:00
End Time
17:30
Application Note
Figure 35
Time range
Time range can be used as a part of the rules in a firewall policy to impose an action during a particular time. For example, if the guest access is to be allowed only during 7:30 am to 5:30 pm on weekdays, then a time range should be attached to certain rules of some guest firewall policies. To impose a time range for guest access, add a time range to rules 2 and 3 in the guest-logon-access policy and to the both the rules in the auth-guest-access policy.
Time Range Configuration for guest-logon-access and auth-guest-access Policies
! ip access-list session guest-logon-access user any udp 68 deny position 1 any any svc-dhcp permit time-range Working-hours position 2 user alias Public-DNS svc-dns permit time-range Working-hours position 3 ! ! ip access-list session auth-guest-access user any svc-http permit time-range Working-hours position 1 user any svc-https permit time-range Working-hours position 2 !
Application Note
Figure 36
Figure 37
Application Note
An alternative method of using time range to restrict guest access to business hours or a particular time is by using the deny time range parameter of the VAP profile. If configured, the deny time range parameter of the VAP profile will deny access to the associated SSID during the defined time range. If guest access is to be restricted to business hours then define a time range that includes the nonbusiness hours and add it to the deny time range parameter of the VAP profile. Table 17 shows the parameters used in the configuration of deny-access time range. Table 17 Name
deny-access deny-access deny-access
Start Date
weekday weekday weekend
Start Time
17:30 00:00 00:00
End Time
23:59 07:30 23:59
Figure 38
Application Note
Figure 39
Bandwidth Contracts
The amount of upstream and downstream bandwidth used by guests can be limited using bandwidth contracts. A bandwidth contract policy rate limits the traffic to the configured value as it flows through the controller. Bandwidth contracts can be assigned on per role or per user basis. When a bandwidth contract is created on per user basis, each user can pass traffic equivalent or less than the configured rate. If the bandwidth contract is created on per role basis, then the bandwidth pool is shared by all the users that belong to that role. The bandwidth is configurable in Kb/s or Mb/s and separate bandwidth contracts can be assigned for upstream and downstream traffic.
Mobility controller
Data
Controlled data
arun_061
Figure 40
Application Note
Table 18 lists the parameters used in the configuration of separate per role bandwidth contracts for upstream and downstream traffic. Table 18 Name
guest-upstream guest-downstream
Rate
1 Mb/s 3 Mb/s
Purpose
used as upstream bandwidth contract for authenticated guest role (auth-guest) used as downstream bandwidth contract for authenticated guest role (auth-guest)
Application Note
Figure 41
Application Note
Application Note
Figure 42
Application Note
Walled Garden
The walled garden feature of the ArubaOS, which is a part of captive portal authentication, allows access by unauthenticated guest to certain websites. The whitelist feature of walled garden (available in the captive portal profile) allows you to define a list of websites to which unauthenticated users are allowed access. The blacklist feature of walled garden can be configured to explicitly block navigation to certain websites from unauthenticated guests. This feature is very useful for businesses such as hotels, which want guests to access their websites for free, but require them to pay for Internet services. Configuring walled garden includes the following two steps: 1. Create an alias for the allowed or disallowed websites. 2. To allow unauthenticated guests to access the websites defined in the alias, add the alias to the whitelist of the captive portal profile used for guest access. If you want to deny access, add the alias to the blacklist of the captive portal profile. If you want to allow or deny access using walled garden to just a website, include the entire hostname in the alias such as www.arubanetwoks.com (include all prefixes, such as WWW). If you just use the domain name such as arubanetworks.com in the alias, then all of the domain and subdomain hostnames that can be resolved are accessible by the unauthenticated guest users. In deployments that use internal DNS servers for guest networks, whitelisting the entire domain allows unauthenticated guests access to all the internal hostnames that can be resolved by the internal DNS server.
!
CAUTION
Table 19 summarizes the configuration of the walled-garden-access alias, which defines the hostname www.arubanetwoks.com. Table 19 Alias Name
walled-garden-access
Purpose
Define the websites to which unauthenticated guests are allowed access.
Application Note
Figure 43
walled-garden-access alias
Figure 44
Application Note
Application Note
Figure 45
Application Note
Denying Inter User Traffic Usually, there is no need for guests to share anything with other guests. Organizations which want to deny inter user communication between the guests can use the deny inter user traffic parameter of the VAP profile. If the deny inter user traffic parameter is enabled on a VAP, traffic between users connected to that VAP is denied.
Figure 46
Application Note
Telephone Support
Aruba Corporate FAX Support
United States Universal Free Phone Service Numbers (UIFN):
+1-800-WI-FI-LAN (800-943-4526)
Reach: 1300 4 ARUBA (27822) 1 800 9434526 1 650 3856589 1 800 9434526 1 650 3856589 BT: 0 825 494 34526 MCL: 0 825 494 34526
Canada
United Kingdom
Application Note
Telephone Support
Universal Free Phone Service Numbers (UIFN):
Japan
IDC: 10 810 494 34526 * Select fixed phones IDC: 0061 010 812 494 34526 * Any fixed, mobile & payphone KDD: 10 813 494 34526 * Select fixed phones JT: 10 815 494 34526 * Select fixed phones JT: 0041 010 816 494 34526 * Any fixed, mobile & payphone DACOM: 2 819 494 34526 KT: 1 820 494 34526 ONSE: 8 821 494 34526 Singapore Telecom: 1 822 494 34526 CHT-I: 0 824 494 34526 Belgacom: 0 827 494 34526 Bezeq: 14 807 494 34526 Barack ITC: 13 808 494 34526 EIRCOM: 0 806 494 34526 HKTI: 1 805 494 34526 Deutsche Telkom: 0 804 494 34526 France Telecom: 0 803 494 34526 China Telecom South: 0 801 494 34526 China Netcom Group: 0 802 494 34526 800 8445708 800 04416077 2510-0200 8885177267 * within Cairo 02-2510-0200 8885177267 * outside Cairo 91 044 66768150
Korea
India