VRD Aruba-Mobility-Controllers 8 PDF
VRD Aruba-Mobility-Controllers 8 PDF
Copyright
© 2011 Aruba Networks, Inc. AirWave®, Aruba Networks®, Aruba Mobility Management System®, Bluescanner, For Wireless That Works®, Mobile
Edge Architecture®, People Move. Networks Must Follow®, RFprotect®, The All Wireless Workplace Is Now Open For Business, Green Island, and The
Mobile Edge Company® are trademarks of Aruba Networks, Inc. All rights reserved. Aruba Networks reserves the right to change, modify, transfer, or
otherwise revise this publication and the product specifications without notice. While Aruba uses commercially reasonable efforts to ensure the
accuracy of the specifications contained in this document, Aruba will assume no responsibility for any errors or omissions.
Open Source Code
Certain Aruba products include Open Source software code developed by third parties, including software code subject to the GNU General Public
License (“GPL”), GNU Lesser General Public License (“LGPL”), or other Open Source Licenses. The Open Source code used can be found at this site:
http://www.arubanetworks.com/open_source
Legal Notice
ARUBA DISCLAIMS ANY AND ALL OTHER REPRESENTATIONS AND WARRANTIES, WEATHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NONINFRINGEMENT, ACCURACY AND QUET ENJOYMENT. IN NO
EVENT SHALL THE AGGREGATE LIABILITY OF ARUBA EXCEED THE AMOUNTS ACUTALLY PAID TO ARUBA UNDER ANY APPLICABLE WRITTEN
AGREEMENT OR FOR ARUBA PRODUCTS OR SERVICES PURSHASED DIRECTLY FROM ARUBA, WHICHEVER IS LESS.
www.arubanetworks.com
1344 Crossman Avenue
Sunnyvale, California 94089
Phone: 408.227.4500
Fax 408.227.4550
Table of Contents
Chapter 1: Introduction
The Aruba Validated Reference Design (VRD) series is a collection of technology deployment guides that include
descriptions of Aruba technology, recommendations for product selections, network design decisions,
configuration procedures, and best practices for deployment. Together these guides comprise a reference
model for understanding Aruba technology and network designs for common customer deployment scenarios.
Each Aruba VRD network design has been constructed in a lab environment and thoroughly tested by Aruba
engineers. Our partners and customers use these proven designs to rapidly deploy Aruba solutions in
production with the assurance that they will perform and scale as expected.
The VRD series focuses on particular aspects of Aruba’s technologies and deployment models. Together the
guides provide a structured framework to understand and deploy Aruba wireless LANs (WLANs). The VRD series
has four types of guides:
Foundation: These guides explain the core technologies of an Aruba WLAN. The guides also describe
different aspects of planning, operation, and troubleshooting deployments.
Base Design: These guides describe the most common deployment models, recommendations, and
configurations.
Applications: These guides are built on the base designs. These guides deliver specific information that is
relevant to deploying particular applications such as voice, video, or outdoor campus extension.
Specialty Deployments: These guides involve deployments in conditions that differ significantly from the
common base design deployment models, such as high-density WLAN deployments.
Specialty Applications
Deployments
Base Designs
Foundation
arun_0335
This guide covers Aruba Mobility Controllers and is considered part of the foundation guides within the VRD
core technologies series. This guide describes these general topics:
Operating modes for the mobility controller
Licensing
Forwarding modes
Logical and physical deployment
Redundancy
How to select the appropriate mobility controller based on scalability requirements
This guide will help you understand the capabilities and options you have when deploying an Aruba Mobility
Controller. Other guides in the series will build specific deployments using the information in this guide.
Table 1 lists the current software versions for this guide.
Product Version
MeshOS 4.2
AirWave® 7.3
AmigopodOS 3.3
Reference Material
This guide is a foundation-level guide, and therefore it will not cover the configuration of the Aruba system.
Instead, this guide provides the baseline knowledge that a wireless engineer must use to deploy an architecture
that is based on the dependent AP model.
The complete suite of Aruba technical documentation is available for download from the Aruba support
site. These documents present complete, detailed feature and functionality explanations outside the
scope of the VRD series. The Aruba support site is located at: https://support.arubanetworks.com/. This
site requires a user login and is for current Aruba customers with support contracts.
For more training on Aruba products or to learn about Aruba certifications, visit our training and
certification page on our public website. This page contains links to class descriptions, calendars, and
test descriptions: http://www.arubanetworks.com/training.php/
Aruba hosts a user forum site and user meetings called Airheads. The forum contains discussions of
deployments, products, and troubleshooting tips. Airheads Online is an invaluable resource that allows
network administrators to interact with each other and Aruba experts. Announcements for Airheads in-
person meetings are also available on the site: http://airheads.arubanetworks.com/
The VRD series assumes a working knowledge of Wi-Fi®, and more specifically dependent AP, or
controller based, architectures. For more information about wireless technology fundamentals, visit the
Certified Wireless Network Professional (CWNP) site at http://www.cwnp.com/
Router
Laptop Server
AirWave Amigopod
server server
arun_0332
This section summarizes the recommendations made throughout the rest of the guide and is intended to be
used as a quick reference. It is highly recommended that if you are new to this material you skip to the next
chapter and continue reading from there.
Master Controllers
License Capacity
AP Capacity 0
PEF-NG 1
PEFV 1
RFProtect 1
CSS N/A
xSec 1
Advanced Crypto 1
Local Controllers
License Capacity
AP Capacity Any AP (campus, mesh, or remote) that broadcasts an SSID, or any active AM or SM. Mesh APs that do not broadcast
an SSID (such as a point-to-point bridge) do not count against this limit.
PEF-NG Any active AP (campus, mesh, or remote) or any AM or SM. This license must be equal to the AP capacity of the
network.
PEFV PEFV is licensed by box capacity, so licenses are not consumed by individual sessions. Instead, after the license is
installed, all sessions up to the box limit will have a firewall policy applied to them.
RFProtect Any active AP (campus, mesh, or remote) or any AM or SM. This license must be equal to the AP capacity of the
network. To enable spectrum analysis, RFProtect must be purchased.
CSS Users in the organization that have signed into the CSS service.
User VLANs Use VLAN pools to control subnet size. Use VLAN pools to control subnet size.
Guest VLANs Not needed except on the controller. Use NAT and Not needed except on the controller. Use NAT and
PEF-NG to control access. PEF-NG to control access.
Quarantine VLANs Not needed. Use PEF-NG to control access. Not needed. Use PEF-NG to control access.
Default Gateway Not for user VLANs. The controller should be the default gateway for all
The controller should be the default gateway for user subnets.
guest VLANs.
The Aruba Mobility Controller is the heart of the Aruba dependent access point (AP) WLAN architecture. The
mobility controller is responsible for many of the operations that traditionally would be handled by an
autonomous AP, and it delivers additional functionality for control, security, operation, and troubleshooting.
The functionality that the mobility controller provides includes:
Acting as a user-based stateful firewall
Terminating user-encrypted sessions from wireless devices
Performing Layer 2 switching and Layer 3 routing
Providing clientless Layer 3 mobility
Acting as an IPsec virtual private network (VPN) concentrator for site-to-site and client-based VPNs
Providing certificate-based IPsec security to protect control channel information
Terminating Internet-based remote APs (RAPs)
Providing wired firewall services
Performing user authentication with 802.1X and captive portal authentication, among others
Providing guest access and captive portal services
Provisioning services
Providing advanced RF services with Adaptive Radio Management™ (ARM™) and spectrum analysis
Providing location services and RF coverage “heat maps” of the deployment
Performing rogue detection and containment
Providing self-contained management by way of a master/local hierarchy with one controller pushing
configuration to other mobility controllers to reduce administrative overhead
Delivering AP software updates automatically when the mobility controller is upgraded
This level of seamless, integrated functionality eliminates many of the challenges experienced with traditional
systems integration of these services. Network administrators need to learn only one interface, which reduces
deployment complexity and speeds problem resolution across a broad range of solutions.
Operating Model
The Aruba system has a logical four-tier operating model: management, network services, aggregation, and
network access. Mobility controllers operate at the network services and aggregation layers.
Data center
Management AirWave
File
Master Master POS
Network active standby
services
PBX
Amigopod RADIUS
Control
Aggregation
Local Local
active active
Data
Network
access
Spectrum
MAS
monitor
Air
monitor
arun_0202
Management
AirWave® provides a single point of management for the WLAN, access switches, and VPN clients connected to
Aruba controllers. The core AirWave application is AirWave Management Platform™ (AMP™), which gathers
data from network elements, reports on historical trends, analyzes data for real-time alerts, detects rogue
access points, and creates a visualization of the RF network. AirWave Master Console™ provides a central
reporting, searching, and alerting interface when multiple AMP servers are deployed. AirWave Failover
provides redundancy for one or more AirWave servers in the case of a server failure.
Network Services
The network services layer provides a control plane for the Aruba system that spans the physical geography of
the wired network. This layer consists of master mobility controllers and Amigopod™ appliances. The control
plane does not directly interact with user traffic or APs. Instead, the control plane provides services such as
white list coordination, valid AP lists, control plane security (CPsec) certificates, wireless intrusion detection
and coordination, and RADIUS or AAA proxy. Amigopod provides advanced guest access services.
Aggregation
The aggregation layer is the interconnect point where the AP, AM, wired AP, and RAP traffic that is destined for
the enterprise network is aggregated. This layer provides a logical point for enforcement of roles and policies
on centralized traffic that enters or exits the enterprise LAN.
Network Access
The network access layer is comprised of APs, AMs, wired APs, RAPs, mobility access switches (MASs), and
physical controller ports that work together with the aggregation layer controllers to overlay the Aruba system.
When policy-based or bridge forwarding modes are used, firewall policies are applied at the AP. Bridge mode
traffic never reaches the controller, and split-tunnel traffic is forwarded only to the aggregation layer for
enterprise destinations and traffic not directly bridged.
Maximum RAPs 64 64 32
Master Backup
master
Local Local
arun_0424
Figure 7 Master/Local Hierarchy
The master is the central point of coordination and configuration of the network. The master processes all
wireless security events and sends policy-based configuration to the locals. The locals manage the campus APs
(CAPs), air monitors (AMs), spectrum monitors (SMs), RAPs, VPN clients, MASs with tunneled ports, and devices
attached to the WLAN. APs connect directly to the local over an IP-based network, and in most deployments, all
traffic from devices is sent to the locals for processing.
Master Master
Network active standby
services
arun_0202
Amigopod
network, which in turn certify APs. If more than one master exists in the network, the network
administrator assigns a single master as the trust anchor for that network. The trust anchor issues
certificates to the other master controllers in the network.
Authentication and roles: User authentication methods and role assignments are created on the master
and then propagated to locals throughout the network. A database exists to authenticate users in small
deployments or for guest access credentials that can be leveraged by all the mobility controllers in the
network. Additionally, the master can proxy requests for the network to a RADIUS or LDAP server.
Aggregation
Local Local
active active
arun_0202
Figure 9 Aggregation layer
allowed to do on the network. This definition is enforced by an ICSA1 certified stateful firewall, and a
role-based policy is applied to every device.
ARM assignments and load balancing: Aruba ARM controls aspects of AP and client performance. All
WLANs operate in unlicensed space, so the chance that something will interfere with transmissions is
very high. Aruba has developed a system to work around interference automatically and help clients
have a better operating experience. These features include automatically tuning the WLAN by
configuring AP power and channel settings, as well as scanning for better channels and avoiding
interference. ARM also handles AP load balancing and co-channel interference from other APs and
clients. Airtime fairness ensures that slower-speed clients do not bring down the throughput of higher-
speed clients. Using band steering, when the system detects a client that is capable of operating on the 5
GHz band (the majority of modern clients), the system automatically attempts to steer that client to the
cleaner band. More information on ARM can be found in Aruba 802.11n Networks VRD available at
http://www.arubanetworks.com/vrd.
RFProtect™ security enforcement and blacklisting: While the master handles the processing of security
event information, the local directs the actions of the AMs for enforcement of wireless security policy.
Enforcement can take different shapes, including containing rogue APs by performing denial-of-service
(DoS) attacks wirelessly, ARP cache poisoning on the wire, shielding valid clients from connecting to
rogue APs, and blacklisting clients so that they are unable to attach to the WLAN.
RFProtect spectrum analysis: When an AP is performing spectrum scanning, the visualizations of the RF
data are generated on the local. This data is pushed to the client’s web browser and can be saved for
later analysis.
CPsec AP certification: When CPsec is enabled in the WLAN, the AP and local mobility controller
establish an IPsec tunnel between the two devices using certificates. The local is responsible for issuing
these certificates and adding APs to the white list. When the AP boots up and tries to contact the local,
the certificates are used to build an IPsec tunnel between the devices.
Mobility: Supports Layer 2 (VLAN) mobility and Layer 3 (IP) mobility, which allows users to roam
seamlessly between APs on different mobility controllers without session interruption. This mobility is a
key component to support VoIP sessions, where sessions must be preserved.
Quality of service (QoS): The locals support QoS on the wired and wireless side. This support includes
translating DiffServ and ToS bits set on packets into Wi-Fi Multimedia™ (WMM®) markings and back. The
Aruba Policy Enforcement Firewall™ (PEF™) also allows the administrator to mark packets with the
appropriate level of QoS, and to change markings on packets entering the system.
1. ICSA labs provides vendor neutral testing of products and certifies them in compliance with a set of common tests and criteria. ICSA is on
the web at http://www.icsalabs.com/
The ArubaOS™ base operating system contains many features and types of functionality that are needed for an
enterprise WLAN network. Aruba uses a licensing mechanism to enable additional features and to enable AP
capacity on controllers. By licensing functionality, organizations can deploy the network with the functionality
to meet their specific requirements in a flexible and cost effective manner.
License Descriptions
For complete descriptions of the features enabled by these licenses, visit the Aruba website at
http://www.arubanetworks.com/products/arubaos/.
AP Capacity: AP capacity relates to how many APs, AMs, SMs, RAPs, and mesh points that serve clients
can connect to a particular mobility controller. For mesh APs, where wireless is used for wired traffic
backhaul, the mesh links that do not broadcast a client SSID are not counted against this license. If the
AP acts as a mesh node and an access point for devices, the AP counts against the AP capacity license.
When you plan for redundancy, the AP capacity must match the maximum number of APs that could
potentially terminate on the backup mobility controller.
Policy Enforcement Firewall–Next Generation (PEF-NG): The Aruba PEF-NG module for ArubaOS
provides identity-based controls. The controls enforce application-layer security, prioritization, traffic
forwarding, and network performance policies for wired and wireless networks. Administrators can build
a unified, integrated system for network policy enforcement by leveraging the open APIs of PEF-NG.
External services such as content security appliances, network access control (NAC) policy engines,
performance monitors, and authentication/authorization servers also can be leveraged by redirecting
traffic and accepting authorization information from the external device. PEF-NG is licensed by AP count,
and the number of licensed APs must be equal to the AP capacity license of the mobility controller. To
enable PEF-NG on wired-only gateways, a single AP PEF-NG license is required.
Policy Enforcement Firewall–VPN (PEFV): The PEFV license provides the same features and functionality
that PEF-NG does, but it is applied to users coming in over VPN connections as opposed to wireless
users. The user role and policy are enforced on the mobility controller and thus only affects centralized
traffic. This license is required for the Aruba VIA client. The PEFV license is purchased as a single license
that enables the functionality up to the full user capacity of the mobility controller.
RFProtect: The Aruba RFProtect module protects the network against wireless threats to network
security by incorporating multiple scanning and containment features into the network infrastructure.
Integration of WLAN and security provides wireless network visibility and simplicity of operation for
network administrators, and thwarts malicious wireless attacks, impersonations, and unauthorized
intrusions. Clients and APs are already a part of the system, so no valid AP or user list must be manually
maintained because the network already knows which users and devices belong there. Additionally,
many of the traditional features and attacks that are reported by traditional WIDS vendors are
unnecessary due to the RFProtect integration with the WLAN itself. RFProtect is licensed by AP count,
and the number of licensed APs must be equal to the AP capacity license of the mobility controller.
Content Security Service (CSS): Aruba CSS provides cloud-based security for branch offices and
teleworkers. CSS seamlessly integrates with the RAP and BOC product families to provide high-
throughput, low-latency content security with centralized reporting and management. CSS leverages
data centers around the world and provides complete protection including advanced URL filtering, P2P
control, antivirus and antimalware, botnet detection, and data loss prevention. High-speed web logs in
CSS provide a flexible and powerful way to view broad trends and per-user drill-downs of Internet
activity. CSS licensing is based on three components: total user count, feature bundles, and contract
length (1 or 3 years). The CSS licenses are installed on the cloud-based service platform.
xSec™ (XSC): xSec is a highly secure data link layer (Layer 2) protocol that provides a unified framework
for securing all wired and wireless connections using strong encryption and authentication. xSec
provides a Federal Information Processing Standard (FIPS)-compliant mechanism to provide identity-
based security to government agencies and commercial entities that need to transmit extremely
sensitive information over wireless networks. xSec provides greater security than other Layer 2
encryption technologies through the use of longer keys, FIPS-validated encryption algorithms (AES-CBC-
256 with HMAC-SHA1), and the encryption of Layer 2 header information that includes MAC addresses.
xSec was jointly developed by Aruba and Funk Software®, which is a division of Juniper Networks®. xSec
is licensed on a per-user basis.
ArubaOS Advanced Cryptography (ACR): The ACR module brings Suite B cryptography to Aruba Mobility
Controllers, which creates a secure and affordable unified access network that enables mobility for
highly sensitive and classified networks. Approved by the US National Security Agency (NSA), Suite B is a
set of publicly available algorithms that serve as the cryptographic base for both unclassified information
and most classified information. The NSA has authorized the use of Suite B to facilitate the use of
commercial technology for mobility as well as sharing of sensitive and classified information among
disparate departments. ACR is licensed on a per-user basis.
Only licenses that enable required functionality should be purchased. For example,
xSec is primarily deployed only in government and military installations, and it is not
required unless it will be in use at the organization. Before purchasing any licenses,
NOTE check that the functionality enabled by the license will be used within the
organization.
License Capacity
AP Capacity 0
PEF-NG 1
PEFV 1
RFProtect 1
CSS N/A
xSec 1
Advanced Crypto 1
License Capacity
AP Capacity Any AP (campus, mesh, or remote) that broadcasts an SSID, or any active AM or SM. Mesh APs that do not broadcast an
SSID (such as a point-to-point bridge) do not count against this limit.
PEF-NG Any active AP (campus, mesh, or remote) or any AM or SM. This license must be equal to the AP capacity of the network.
PEFV PEFV is licensed by box capacity, so licenses are not consumed by individual sessions. Instead, after the license is installed,
all sessions up to the box limit will have a firewall policy applied to them.
RFProtect Any active AP (campus, mesh, or remote) or any AM or SM. This license must be equal to the AP capacity of the network.
To enable spectrum analysis, RFProtect must be purchased.
CSS Users in the organization that have signed into the CSS service.
Mobility controllers centralize many of the functions that would previously have been pushed to the edge of
the network. Understanding the available options will help the network administrator build an effective Aruba
WLAN.
User VLANs
The VLANs that support user traffic and that the client device uses to receive its IP addressing information are
not always that same as the VLAN that the AP is plugged in to. In many cases, the user VLAN has nothing to do
with the VLAN that the AP is connecting through. The user VLAN assignment varies depending on the
forwarding mode, so each forwarding mode is described here.
Local
mobility
100 100
arun_0239
controller
In this case the VLANs that the users are assigned to do not exist at the AP. Those VLANs exist only on the
mobility controller itself. This configuration simplifies the edge of the network, because all user VLANs are not
required to reside at the edge switches and they need only be trunked to the mobility controller. Figure 11
shows the actual VLAN of the users, which exists only from the mobility controller through the switch to the
router.
Local 200
mobility
controller 200
arun_0240
Figure 11 User VLAN, logical connection
The advantage of this design is a simplification of the network and flexibility of terminating users. When the
organization needs additional user VLANs, these can be created only at the switch that connects to the mobility
controllers, and no change must be made to the APs or the network edge.
AP2
VLAN 100
Client
Figure 12 Users and APs in a bridge mode deployment share the same VLAN
Websites
Locally
bridged Enterprise
data Firewall / SSID
NAT-T
RAP Internet or
(with firewall) WAN
Voice
Enterprise SSID
SSID
arun_0243
Voice SSID
RAP Enterprise
(with firewall) Firewall / SSID
NAT-T
Enterprise
Internet or
SSID
WAN
(Split Tunnel Voice
Mode-802.1X) SSID
Voice SSID
RNSG_124
(Full Tunnel
Mode-PSK) Enterprise
arun_0244
IP phone
Guest VLANs
Dedicated guest VLANs are common in networks to limit guest access to other parts of the network and they
take two forms:
VLANs to the DMZ: Limit guest access by using a management construct.
VLANs just at the mobility controller: Limit guest access by using firewall policy.
When the VLAN is run from the controller to the DMZ, users are placed in this VLAN and sent to the DMZ.
Routers in the network forward traffic only to the DMZ and do not allow the users to route to other VLANs. This
action protects the local infrastructure if the VLAN design is secure, but as shown in Figure 15 it does nothing to
stop users from interacting with one another on the same guest VLAN.
DMZ
VLAN 200
Internet
arun_0245
Chat or
file sharing
When the Aruba PEF is used, the guest VLAN typically exists only on the local. The local acts as the DHCP server,
and the firewall policy is used to limit user traffic. A typical policy allows the user to receive DHCP and DNS from
the local network. Figure 16 shows that the policy then prevents all other traffic destined to the local network
and allows only Internet access. Typically guest users in this scenario receive a private, nonroutable IP address,
and NAT is performed as their traffic leaves the controller on a public VLAN.
DMZ
VLAN 200
Internet
arun_0246
These two delivery mechanisms are not a “one or the other” decision, and they can be combined. Aruba
recommends that role-based firewall policies be applied to guest users even when using a dedicated VLAN that
is routed to the DMZ. For more security, users may want to use GRE tunneling instead of a VLAN to force clients
to the DMZ controller as shown in Figure 17.
Internet
arun_0246b
Figure 17 Guest VLAN with firewall and GRE tunnel to the DMZ
Dedicated AP VLANs
When wireless networks were first deployed dedicated AP VLANs were used to segregate the wireless traffic
from other wired traffic. This segregation was done to force wireless traffic through firewalls and IPsec
concentrators to secure wireless connections after WEP was broken. Figure 18 shows this historical view of the
reuse of remote networking technologies to protect WEP encrypted Wi-Fi links.
DMZ
IPsec
concentrator
Data center
Distribution
File
server
arun_0247
Wireless
client
This method leads to management overhead, not only to ensure that each AP is plugged into an “AP port” on
the switch, but also that the switch is configured correctly. The other downside to this approach is that AMs
become less effective, because they can no longer see user traffic that may be exiting a rogue AP on the wired
side of the network.
The only recommended use for a separate AP VLAN is in networks where 802.1X is configured on the edge
switch to do link layer authentication of users. The AP does not support an 802.1X supplicant, so it is
recommended that the wired switch be configured to place “failed” devices in a special AP VLAN that only is
only routable to the mobility controller as shown in Figure 19.
Network
VLAN 100 VLAN 100
802.1X
Network
VLAN 300
VLAN
802.1X 300
fails
arun_0248
Figure 19 Users with 802.1X configured are able to pass, APs are placed in an AP only
VLAN and routed to the mobility controller
Quarantine VLANs
Quarantine VLANs are common in networks where network access control (NAC) has been integrated. Devices
that have failed their health check are put into the quarantine VLAN until they can be brought in-line with
policy. The problem with this traditional method is that a set of infected stations in the same VLAN tends to
lead to more infections as seen in Figure 20. If the users are able to remediate, they must then be moved back
to the “production” VLAN and receive a new IP address.
DMZ
Internet
Some
attempted
200
traffic
Remediation
Server Distribution
200
Access
Viruses
Viruses
arun_0249
Instead, Aruba recommends that the PEF-NG firewall be used to put users into a quarantine role. This role
should allow stations to access only remediation resources, either locally or on the Internet. These resources
could include antivirus vendors, operating system vendors, and software vendors. All other traffic should be
denied, which removes the ability of the station to infect other users as seen in Figure 21. After the station is
remediated, it does not need to reboot or renew its IP address because the station does not switch VLANs. The
user simply is placed in the production role and allowed to use the network fully.
DMZ
Internet
Traffic
200
Remediation
server Distribution
200
Access
arun_0250
Figure 21 Using the firewall to limit the spread of viruses in the remediation role
VLAN Pools
Network administrators prefer to keep subnet sizes down to a Class C size network. This network has a subnet
mask of /24, which yields up to 253 user devices per subnet. This size is considered manageable and helps to
limit the broadcast domain size. In networks where this subdivision needs to be logical as opposed to physical,
VLANs are employed to limit broadcast domain size. The issue arises when enough users exist to exceed a
single subnet, which is a common occurrence because the WLAN has gone from a convenience network to a
part of the critical network infrastructure.
The traditional methodology for dividing up large groups of wireless users is to place a set of APs in a VLAN and
have all devices associated with those APs placed into that single VLAN as shown in Figure 22. This method
works if the user count never goes above the subnet user count limit and if users have no need to roam outside
of the AP group. This method limits the size of a subnet, and it is typically deployed only in small networks with
a single subnet.
Mobility
controller
VLAN 10 VLAN 40
arun_0251
VLAN 20 VLAN 30 arun_048
However, this method tends to fail when large groups of users need to meet in a single location like a lecture
hall, or an “all hands” meeting, or where roaming across APs is likely to occur. The individual subnets will have
their IP pools exhausted, leading to devices being unable to connect. This becomes even more problematic as
smartphones and tablets show up along side laptops and connect to the network.
The Aruba VLAN Pooling feature allows a set of VLANs to be assigned to a designated set of virtual APs. These
VLANs can be configured as a noncontiguous set, a contiguous range, or a combination of the two as shown in
Figure 23. For example, the set could be VLAN numbers 10, 20, and 30. The set could also be VLAN numbers 2
through 5. These methods can be combined to provide a set such as 3, 5, and 7 through 10. This flexibility
allows you to assign users to VLANs that may already exist in the enterprise. VLAN pools are the method that
Aruba recommends for handling user VLANs any time two or more user VLANs are needed to handle the user
load from a single set of APs going to a single mobility controller.
Mobility
controller
arun_0252
The system works by placing users in one of the VLANs in the pool. VLAN placement is determined using the
user MAC address and running it through a hash algorithm. The output of this algorithm places the user into
one of the VLANs in the pool and ensures that the user is always placed into the same pool during a roaming
event. As the user associates with the next AP, their address is hashed and they are placed into the same VLAN
on the new AP. The user can continue to use their existing IP address with no break in their user sessions. This
feature requires that the same VLAN pools be deployed on all controllers that will service these clients.
Packet Sizing
Wherever possible the network should be configured to support jumbo frames to avoid fragmentation of the
packets. When this configuration is not possible due to lack of hardware support, the maximum MTU should be
configured on all devices. This setting is especially important for video transmissions, because the loss of key
video frames can cause the entire packet to be retransmitted. It is also important that transmitters are aware
of the frame size limitations. For instance, video servers should be configured to use the maximum MTU of the
network to limit their packet size to the network-supported maximum and avoid fragmentation.
Layer 2 Deployments
In a Layer 2 deployment, the mobility controller is a “bump in the line” for user traffic. Wireless sessions are
inspected by the firewall and forwarded to the appropriate VLAN, but the mobility controller is not the default
gateway as shown in Figure 24. This deployment model is typically used in campus networks where an existing
Layer 3 switch is already functioning as the default gateway and makes routing decisions for the network. This
deployment model is recommended where multicast routing will occur.
arun_0253
Default gateway
Layer 3 Deployments
The other alternative is a Layer 3 deployment where the mobility controller is the default gateway for the
subnet. This deployment is common for remote networking, where the users receive their IP addressing from
the mobility controller, and for site-to-site VPN applications to the branch office as seen in Figure 25.
Controller
10.1.100.1 Default gateway
10.1.100.1
arun_0254
Default gateway
When a RAP is deployed, all addressing is delivered from the mobility controller to the client machines.
Machines on the same site may receive different addresses from different pools, which would make routing
difficult for a traditional routed network to manage. The mobility controller is the one vending the addressing,
so it is logical for it to also act as the default gateway for those subnets.
The mobility controller can also terminate VPN sessions, including site-to-site VPNs from other mobility
controllers in branch office deployments as shown in Figure 26. In these cases, the local branch typically has a
DHCP server local to the site. The mobility controller that establishes the VPN connection is the default router
for that site. The mobility controller that acts as the VPN head end will be the gateway for the rest of the
network to the branch office.
Internet
OSPF
arun_0255
VPN VPN tunnel
tunnel
The final case where the controller is typically the Layer 3 device is when it exists as the default router for a
nonroutable guest network as shown in Figure 27. When a guest network is deployed in private IP space and is
not routable from the general network, the mobility controller is normally configured to act as both the DHCP
server and NAT device for the guests.
10.1.100.1
Internet
Controller Guest laptop
192.168.0.1 Guest 192.168.0.2
SSID
Layer 3 gateway
arun_0256
DHCP server
NAT device Services
totally stub mode. This capability allows the mobility controller to advertise its routes into the network without
the overhead of maintaining the full routing table.
OSPF routing
domain
OSPF OSPF
arun_0257
Figure 28 OSPF running between routers and the mobility controller
User VLANs Use VLAN pools to control subnet size. Use VLAN pools to control subnet size.
Guest VLANs Not needed except on the controller. Use NAT and PEF- Not needed except on the controller. Use NAT and PEF-
NG to control access. NG to control access.
Quarantine VLANs Not needed. Use PEF-NG to control access. Not needed. Use PEF-NG to control access.
Jumbo Frames Enable jumbo frames if possible, or the largest frame N/A
size available. Make sure servers are configured to use
the maximum size possible frame to avoid
fragmentation.
Default Gateway Not for user VLANs. The controller should be the default gateway for all
The controller should be the default gateway for guest user subnets.
VLANs.
As the WLAN moves from a convenience network to a mission-critical application, the need for availability and
redundancy also increases. Aruba provides several redundancy models for local and masters. Each of these
options, including the choice to forgo redundancy, must be understood so that the correct choice can be made
for each deployment model.
Redundancy is always a tradeoff between the cost of building a redundant network and the risk of the network
being unavailable if an outage occurs. In some cases, multiple types of redundancy are possible, and it is up to
the organization to gauge its tolerance for risk given the pros and cons of each redundancy model. The scale of
redundancy has different levels, with cost and resiliency increasing as you move up the scale as seen in Figure
29:
Having a completely redundant network
Adding redundancy for aggregation level mobility controllers
Adding redundancy between a set of mobility controllers
Having no redundancy at all
Master Standby
Master Local 1 Local n
Local 2
Fully Redundant
Local 1 Local n
Master
Local 2
Redundant Aggregation
Local
Master
Hot Standby
Master
Local
arun_0275
No Redundancy
At each level, as the network moves up the scale, the cost and complexity increases. At the same time, the
chance of the network being unusable due to a network outage decreases. The following sections discuss
redundancy at each level and what the consequences are of running a network without redundancy.
Master Redundancy
The master mobility controller is the center of the control plane. The master controller handles initial AP boot
up in Layer 3 deployments, policy configuration and push to the local mobility controllers, local database
access, and services such as security coordination and location. Additionally, if CPsec is enabled on the
network, the master is responsible for certificate generation.
To achieve high availability of the master mobility controller, use the master redundancy method (see Figure
30. In this scenario, two controllers are used at the management layer: one controller is configured as an active
master and one is configured as a standby master. The two masters operate in a hot standby redundancy
model. One master is the active primary, and the second is a standby that receives updates from the master
about the state of the network.
Master Master
Periodic Database
active Dynchronization standby
RNSG_043
VRRP
Keepalives
arun_0262
The two masters synchronize databases and run a VRRP instance between them. The virtual IP (VIP) address
that is configured in the VRRP instance is also used to communicate with the current primary master. This
address is given to the local mobility controllers, MASs, and APs that attempt to discover a mobility controller.
The VIP is also used for network administration.
When the primary master becomes unreachable for the timeout period, the backup master promotes itself to
be the primary master and uses the VRRP IP address (see Figure 31). All traffic from locals and APs to the
master automatically switches to the new primary.
Primary Backup
master master
arun_0263
Local
controller
Figure 31 Master redundancy failure scenario for the local mobility controller
Aruba does not recommend enabling preemption on the master redundancy model. If preemption is disabled
and a failover occurs, the new primary remains the primary even when the original master comes back online.
The new primary does not revert to a backup unless an administrator forces it to. Disabling preemption
prevents the master from “flapping” between two controllers and it allows the administrator to investigate the
cause of the outage. When the original master has been recovered and is in a steady state, it is possible to fall
back to that primary master.
Local Redundancy
Three types of local redundancy are available. Each type of local redundancy is appropriate in a particular
scenario, and sometimes they operate together.
AP Reconnection The APs radios rebootstrap on failover. The AP reboots after the heartbeats time and
attempts to reestablish a connection to the primary
before failing to the backup.
VRRP tends to be faster than LMS redundancy, but it only works at Layer 2. Aruba recommends running VRRP
wherever possible, and reserving LMS redundancy where Layer 2 adjacency is not available, such as between
datacenters.
Active-Active (1:1)
In the Aruba active-active redundancy model, two locals share a set of APs, divide the load, and act as a backup
for the other mobility controller. Active-active is Aruba’s recommended method of deploying redundant locals.
When two controllers operate together, they must run two instances of VRRP and each controller acts as the
primary for one instance and backup for the other as shown in Figure 32.
Keepalives
Local Local
arun_044
arun_0264
Air monitor
Using this model, two local controllers terminate APs on two separate VRRP VIP addresses. Each Aruba Mobility
Controller is the active local controller for one VIP address and the standby local controller for the other VIP.
The controllers each terminate half of the APs in this redundancy group. The APs are configured in two
different AP groups, each with a different VIP as the local management switch (LMS) IP address for that AP
group.
When one active local controller becomes unreachable, as in Figure 33 APs connected to the unreachable
controller fail over to the standby local. That controller now terminates all of the APs in the redundancy group.
Therefore each controller must have sufficient processing power and licenses to accommodate all of the APs
served by the entire cluster.
Local Local
arun_045
arun_0265
Air monitor
In this model, preemption should be disabled so that APs are not to forced to fail back to the original primary
when it comes back online. APs will not fail back, so this model requires that the mobility controller be sized
appropriately to carry the entire planned failover AP capacity for an extended period of time.
When determining the AP load for active-active, some thought should be given (from
a capacity standpoint) to what will happen to the backup controller when the APs fail
over. If each mobility controller is at 50% of total capacity, when a failure occurs, the
mobility controller that the APs fail over to will now be at 100% capacity. As with any
system component, it is never a good idea to run the system at maximum capacity
and leave no room for future growth. Aruba recommends that each mobility
NOTE controller be planned to run at 40% capacity, so that when a failover occurs, the
surviving mobility controller will only be at an 80% load. This load gives the mobility
controller the room to operate under the failover conditions for a longer period of
time. An 80% load also reduces the time for APs to fail over from the primary mobility
controller to the backup mobility controller.
Active-Standby (1+1)
The active-standby model also has two controllers, but in this case, one controller sits idle while the primary
controller supports the full load of APs and users (see Figure 34).
Local Local
arun_0266
Air monitor
When a failure occurs in the active-standby model, all of the APs and users must fail over to the backup
controller. This model has a larger failure domain and will have some increased latency as the full load of APs
fails over to the backup controller and users reauthenticate as shown in Figure 35. This form of redundancy
uses the LMS and backup LMS configuration for the AP. Alternatively, a single VRRP instance could be run
between the two controllers, and all APs for the pair would terminate against this VRRP IP address.
Local Local
arun_0267
Air monitor
The active-standby model is primarily used when the two mobility controllers are separated by a Layer 3
boundary, which makes it impossible to run VRRP, which operates at Layer 2, between the two mobility
controllers. Mobility controllers are typically separated by a Layer 3 boundary when they are deployed in
separate data centers.
As with active-active, when the active local becomes unreachable, all of the APs that are connected to the
unreachable controller fail over to the standby local. That controller carries the full AP load of both mobility
controllers for the duration of the outage. Therefore each controller must have sufficient processing power and
licenses to accommodate all of the APs served by the entire cluster.
Many-to-One (N+1)
The many-to-one model is typically used in remote networks where branch offices have local mobility
controllers but redundancy on site is not feasible. These are typically smaller controllers with limited numbers
of APs, and a much larger controller id deployed as the +1 in the datacenter as seen in Figure 36. It is possible to
use N+1 on the campus as well, but here consideration should be given to the ratio and likelihood that sections
of the campus might become unreachable, which would cause a multiple controller failover. This model
requires that a secure connection is established between the sites that is independent of the mobility
controllers, and that the connection should have high bandwidth and low latency.
Data center
Backup
mobility
controller
Private WAN
or site-to-site VPN
arun_0268
Figure 36 N+1 redundancy, local active
When the local at the remote site fails, the APs fails back to the backup LMS configured for that purpose, just as
in the active-standby scenario (see Figure 37).
Data center
Backup
mobility
controller
Private WAN
or site-to-site VPN
Local Local
Local
arun_0269
Figure 37 N+1 redundancy, local failed, AP connected across the WAN
The difference in the N+1 scenario is that this failure is typically across a WAN link, and the backup controller
should be large enough to handle multiple site failures at the same time. Though a typical small site might have
a handful of APs on a smaller mobility controller, the central site must have a much larger mobility controller
with increased licensing to handle the expected number of failures of locals. In typical designs, only a single
failure is anticipated, but some organizations require more resiliency against failure of multiple sites. Common
cases include retail stores, where more than a single store may have an outage at any one time due to the
sheer number of sites and the fact that the controller may be in user-accessible space.
Aruba strongly recommends that preemption be enabled in this scenario. Due to the limited capacity of the
redundant mobility controller and the possible delay introduced by failing over to a remote site, it is
recommended that APs be moved back to their original mobility controller as soon as service is restored.
Some consideration should be given to the number of nodes to backup ratio. If the backup mobility controller is
the same model and scale as all of the locals that it is backing up, on a single local can become unreachable in
the network and have the network operate properly. If a second local became unreachable, all APs that exceed
the capacity of the backup mobility controller will be listed as unlicensed and will not operate. It is
recommended that, where possible, the backup have the ability to terminate multiple locals in the event that
multiple mobility controllers go off line.
Active-Active (1:1) Smaller failure domain, because fewer APs must fail More expensive than N+1, because all mobility
over in the event of an outage controllers must be licensed to handle the full
Outage duration is smaller, because fewer APs will complement of APs in the failure domain. Aruba
take less time to recover, typically about half as recommends that this load be planned to 80% of
long as failing over a fully loaded mobility controller each mobility controller’s maximum capacity
All mobility controllers in use at all times Twice as many mobility controllers are required vs.
Reduced load on each mobility controller no redundancy
Active-Standby (1:1) If APs fail to the backup controller, essentially Has the same cost structure as the active-active
nothing has changed in the network except where redundancy model, with two sets of mobility
the APs and users are hosted controllers and two sets of licenses
Larger failure domain, all APs must fail to the
backup mobility controller, typically takes twice as
long as active-active
Outage duration will be longer, because more APs
must be recovered
Many-to-One (N+1) Cost-optimized model, fewer redundant mobility Multiple failures can overwhelm the redundant
controllers are required, and need only be licensed mobility controller, which causes a network down
and scaled to handle the maximum number of scenario
failed mobility controllers Preemption must be enabled to clear APs back to
Typically only one redundant mobility controller is the primary mobility controller as soon as it is
deployed recovered, which results in a second unplanned
outage
Aruba recommends using active-active redundancy wherever possible. Active-active provides the fastest
recovery time in the event of a network outage with the least disruption to the end user. Aruba also
recommends in all models that mobility controllers not be loaded past the 80% mark. This load level helps
increase the stability of the network during prolonged outages and allow for future growth of the network.
arun_0271
LMS A LMS B
Backup LMS C Backup LMS D
When the datacenter is at a remote site, consider the link between sites. The primary concerns are latency,
overall bandwidth, and security. Latency will affect authentication, such as 802.1X, and voice calling. Overall
bandwidth needs to consider AP control traffic and user traffic. Finally, the connection should be secure
between the sites, especially if decrypt tunnel is in use.
Data center redundancy consists of two to four total controllers, and up to four instances of VRRP. The APs can
be set up either to split between two of the mobility controllers (active-active) with a pair in hot standby, or
spread evenly across all four mobility controllers. In this model, the APs are set up so that they operate on the
VIP of their primary pair of mobility controllers (Figure 39), and their backup is one of the two VIPs on the
second pair of mobility controllers (Figure 40).
arun_0272
LMS A LMS B
Backup LMS C Backup LMS D
Figure 39 Failure of single primary mobility controllers in active-active with LMS and backup LMS
LMS A LMS B
Backup LMS C Backup LMS D
Figure 40 Failure of primary the primary data center in active-active with LMS and backup LMS
In a failure scenario, the failure of one mobility controller in a pair results in typical active-active failover. If the
second mobility controller in the pair fails, the APs fail over to their backup pair of controllers and split between
the two VIP instances. In either deployment model, all four mobility controllers must be licensed and capable of
supporting the full AP load.
LMS A and B Backup LMS C and D LMS A and B Backup LMS C and D
arun_0273
LMS A LMS B LMS A LMS B
Backup LMS C Backup LMS D Backup LMS C Backup LMS D
Figure 41 Failure series, active-active with LMS and standby backup LMS
arun_0274
LMS A LMS B LMS C LMS D LMS A LMS B LMS C LMS D
Backup LMS C Backup LMS D Backup LMS A Backup LMS B Backup LMS C Backup LMS D Backup LMS A Backup LMS B
Figure 42 Failure series, active-active with LMS and backup LMS also in use
No Redundancy
In early WLAN deployments, redundancy was often viewed as a luxury, because the network was not deemed
to be mission critical. Not having redundancy is still considered acceptable to some organizations, though it is
not recommended by Aruba. This section describes what is lost when a component of the system fails without
redundancy enabled.
Master – No Redundancy
If the master fails without a backup, the following services stop working:
AP boot: During the AP boot cycle, the AP must discover and connect to a provisioning mobility
controller. In almost all deployments this is the master mobility controller, because that mobility
controller typically is not serving APs and is able to be a single source for AP provisioning. It is also far
easier to configure either DNS lookup or a single DHCP option to find a single mobility controller than to
manage multiple lookups or scopes. It is also possible to use Layer 2 discovery mechanisms to find a local
mobility controller, but this is not realistic in larger deployments. If the master is unreachable, in certain
cases the APs may not be able to reboot until the master is restored or their boot process is modified:
In situations where DHCP option 43 is used, the APs are unable to boot until a new master is in place
or the DHCP scope option is modified to point at either a new master or to a local.
If DNS is used to locate the master, the APs are down unless a second IP is also returned in the DNS
response that points to a local. Note that this configuration results in a protracted outage, and the
local must have AP capacity to bring up and then redirect the APs as they fail to the backup DNS
response. This outage is longer in duration, with each AP taking approximately 4-5 minutes to fail to
the backup. Depending on the AP capacity on the backup, several attempts may be needed before
the AP is able to connect and be properly redirected.
APs that rely on Aruba Discovery Protocol (ADP) continue to operate as long as a local is capable of
answering their ADP request. These APs require Layer 2 connectivity to the local for ADP to function.
In all cases, APs that are currently operating continue to do so in the event that the master becomes
unreachable until they are rebooted or power cycled.
Local policy configuration: Configuration, done either on the master or AirWave, requires that the
master is operational to push configurations to the locals. If the master is not available, changes to the
network policy configuration are not possible unless each mobility controller is modified manually,
though local configuration at the IP level is possible.
Local database access is lost: If the master becomes unreachable, guest access using the local database,
as well as when roaming between locals when machine authentication is enabled, is lost.
Monitoring, heat maps, and location: If AirWave is not present in the network, centralized network
monitoring, heat map generation, and location services all are down.
Valid AP table: When the master is down, the valid AP table is no longer available for updates. The locals
continue to function with cached data until that ages out. After that time, other APs in the network are
seen as “unknown” instead of valid, interfering, or rogue. When this occurs, Adaptive Radio
Management (ARM) increases power to the edge APs on both sides in an attempt to increase coverage
and work around the now unknown AP. At AP border areas, overlapping channels and power lead to
increased interference.
RFProtect coordination: When the master is down, RFProtect security loses its coordination capabilities
between locals. Any new APs that show up are classified as “unknown,” which prevents automatic
containment from functioning. Existing data remains until it ages out, and then all of the APs begin to be
reclassified as “unknown.” If protection of valid stations is enabled, clients are prevented from joining
any AP that is not valid, which after some time will be all APs that that mobility controller can see that
are not directly attached.
AP white lists: The two varieties of white lists are the CAP and RAP white lists. For the CAP white list, all
mobility controllers share a copy of the white list, but without the master, they lose the capability to
synchronize the lists. The RAP white list must be manually exported to the local to ensure that
operations continue, but no additional APs can be authorized while the master is unreachable.
CPsec: Failure to have a backup for CPsec results in the same failures as a master mobility controller,
with the additional problem. If the master physically must be replaced, as soon as it is brought online,
the entire network goes back through the recertification list. In addition, the AP white list must be
rebuilt.
Local – No Redundancy
If a local becomes unreachable and has no backups configured for the APs, all APs assigned to that mobility
controller go down and no users can connect. Any AMs associated to the controller are also down, which
eliminates the capability to scan for threats and contain rogue devices. This situation continues until the APs
are reprovisioned and assigned to another mobility controller or the original or replacement local becomes
reachable again.
The selection of the proper mobility controller depends greatly on the application and usage model for the
network. This chapter examines the network usage considerations that must be considered, controller scaling,
and selection criteria.
Information Gathering
Selecting the proper mobility controller for the deployment depends on a number of factors, including
forwarding mode, usage model, and AP count. Consider these factors to select the proper mobility controller
for the application.
AP counts: The most common selection criteria for many organizations, the number of APs, often
dictates a minimum controller scale. To determine the required AP count, a planning tool such as the
Aruba VisualRF™ Plan or a traditional site survey determines the number of CAPs, AMs, and SMs
necessary to provide adequate coverage. For remote access solutions, use the number of RAPs and/or
the number of VIA agent or VPN users. Mixed environments require additional planning to ensure that
the combined CAP and RAP counts do not exceed the maximum supported limits on the mobility
controller.
MAS parameters: Consider two MAS parameters. The first is the number of switch devices. This is a 1:4
ratio, with each MAS equaling the supported capacity of four APs. The second parameter is the number
of tunneled switch ports, with each port counting as one tunnel. This number counts against the
maximum tunnel limits for the platform. VIA users: If the VIA agent will be deployed, the number of
users must be known so that the deployment can be scaled appropriately. Additionally, the decision to
make SSL fallback available for the VIA agents has an impact on the system and must be considered
when selecting the appropriate mobility controller model and quantity.
Device count: Each platform has a maximum user count that limits the maximum devices that can
associate with each controller. Look at the number of users that will use the WLAN at each site, and
determine how many devices each user will have on average. Aruba recommends that each user count
for two devices in general (laptop plus smartphone or tablet). Some organizations will have higher user
to device ratios. Include employees, guests, contractors, and autonomous systems such as phones,
printers, and building automation. Data throughput: As with any networking device, each mobility
controller has a maximum platform throughput, which is also affected by encryption and firewall
processing. Aruba recommends that baseline assessments of the data throughput of the organization be
gathered to use in the mobility controller selection process. If a WLAN is already in place, use the
AirWave management server before the Aruba WLAN is installed to help understand the average and
peak throughput from wireless devices. If a WLAN is not currently in place, the network management
system in place should be used to understand the size of traffic flows in the system.
Forwarding modes and CPsec: The forwarding mode selected for the mobility controllers affect how
much traffic and how many tunnels the AP will generate. In addition, CPsec processing adds additional
processing overhead during boot up and when APs are being certified. Remember that CPsec is required
for some modes of operation.
Mobility controller role: The role of the mobility controller in the system greatly affects the selection,
because a master has different requirements than a local on the campus or local terminating RAPs or VIA
clients. The most critical aspect to consider for masters is the control processing power. However, locals
have greater concerns around data throughput and AP and user scaling.
Aruba recommends that information be gathered on a site-level basis during the planning process so that
better choices are made for each site. Use Table 13 to keep track of this information.
AP Count N/A
AM / SM Count N/A
Fully
620 650 Aruba Aruba Aruba Loaded
Features M3 Blade
Controller Controller 3200XM 3400 3600 Chassis
(4 x M3)
Maximum Max number of 256 512 2048 4096 8192 8192 32768
users or devices per controller
Maximum number of VIA 256 512 2048 4096 4096 4096 16384
clients per controller (no SSL
fallback)
Maximum number of VIA 128 256 1024 2048 2048 2048 8192
clients per controller (with SSL
fallback)
Maximum firewall throughput 800 Mb/s 2 Gb/s 3 Gb/s 4 Gb/s 4 Gb/s 20 Gb/s 80 Gb/s
Maximum encrypted 400 Mb/s 1.6 Gb/s 1.6 Gb/s 4 Gb/s 8 Gb/s 8 Gb/s 32 Gb/s
throughput (3DES, AESCBC256)
Maximum encrypted 320 Mb/s 800 Mb/s 800 Mb/s 2 Gb/s 4 Gb/s 4 Gb/s 16 Gb/s
throughput (AES-CCM)
This table and those that follow contain the maximum supported values for the
mobility controllers. As with any other piece of networking equipment, caution should
be exercised with any system that is approaching the maximum supported load.
NOTE Aruba does not recommend that devices be run at full capacity except in extreme
circumstances.
8 16 32 64 128 512
Typically, Aruba does not recommend the M3 mobility controller in remote access deployments. The reasons
for this are practical (cost of the controller, chassis, and interface compatibility) as well as operational
(increased user to RAP ratio as well as smaller failure domain with fewer RAPs on the Aruba 3600). M3s can be
deployed as the RAP mobility controller if desired. Simply replace the Aruba 3600s with M3s in Table 16.
Maximum number of VIA clients per controller 256 512 512 2048 4096 4096
(no SSL fallback)
Maximum number of VIA clients per controller 128 256 256 1024 2048 2048
(with SSL fallback)
Platform Calculation
Aruba 3000 and 600 Series CAP + (RAP / 4) <= CAP Limit
The M3 and Aruba 3600 have equivalent scalability numbers when they operate as the master mobility
controller, so Aruba typically recommends that the Aruba 3600 be selected as the master for large-scale
deployments.
Master redundancy x2
Active-active x2
Active-standby x2
Full data center redundancy Multiply all counts in the Total column by 2 to provide for full data center redundancy.
Command Description
Memory Utilization Memory is another limited resource on the system. When the system boots, it uses a set amount of
memory to load ArubaOS and provide base-level functionality. Issue the following command to show the
current state of memory on the system:
The organization should consider that the memory is moderately utilized at 30 Mb free (begin monitoring
regularly) and highly utilized at 15 Mb free (being investigating) over a 5-minute period.
Alternatively, consider using AirWave to track average memory utilization over time.
If the CPU utilization is sustained or regularly spikes above these thresholds, consider an upgrade to add
capacity to the system.
CPU Utilization As with all systems, a finite amount of CPU is available for processing data. Issue the following command to
find out the current CPU utilization of the mobility controller:
The organization should consider the CPU to be highly utilized at 70% (begin monitoring regularly) and
considered critical at 100% (being investigating) over a 5-minute period.
Alternatively, consider using AirWave to track average CPU utilization over time.
If the CPU utilization is sustained or regularly spikes above these thresholds, consider an upgrade to add
capacity to the system.
Command Description
Platform Limitations for Devices As the platform reaches its maximum device count, the devices must be split across multiple mobility
controllers. During busy times of the day, issue the following command to show the summary user count:
Compare the summary count to the platform limit. Or, consider using AirWave to track average device
counts over time. The output would look like:
License Limitations License limitations can show up as the inability to add additional APs, or APs not behaving as expected due
to incorrect license counts. Issue the following command to ensure that all licensing numbers for APs
match, and that sufficient license capacity exists on the platform:
If the platform is at its maximum capacity, additional mobility controllers must be purchased.
Command Description
Datapath Utilization / Throughput Mobility controllers have a limitation on the amount of traffic that can flow through the system. Issue the
following command to show this information as a percentage of utilization:
The organization should consider that the data path is moderately utilized at 50% (begin monitoring
regularly) and highly utilized at 70% (being investigating) over a 5-minute period.
Alternatively, consider using AirWave to track average data throughput over time.
All Masters
For remote deployments, masters usually are deployed in the DMZ. Depending on the scale, they may use
AirWave to synchronize configuration files. When more capacity is needed, additional masters must be
deployed. Those controllers are configured in two ways:
AirWave synchronization (if present)
Modifying the configuration file of the existing master on the new controller to ensure synchronization
In remote deployments, the terminating remote access devices could be split by geography. In this case,
existing users, RAPs, or remote controllers in a particular region are moved to the new controller. Consider that
the new master may also be deployable in a new datacenter located closer to the users. For all masters in
campus deployments, ensure that all APs in the same building terminate to the same master. If APs from
different masters will be able to hear each other, use AirWave and WMS offload to ensure correct operation of
the valid AP list.
A number of factors can affect the deployment of CPsec and the scalability of the system. Table 22 provides
information about the testing of the solution that Aruba has performed.
Scalability of the AP white list White list testing was performed with 140 locals
synchronization sharing a white list with a single M3 master.
Synchronization consisted of an Aruba 5000 AP
white list and synchronization across all controllers
took approximately 10 minutes.
Root CA scalability testing Testing involved a single trust anchor with 140 locals
directly attached to the single master. This level of
scalability is applicable for the all masters
deployment.
Table 23 on page 74 and Table 24 on page 74 show failover times for APs failing over in an active-active
deployment. This table was developed using two test cases:
Test case 1: The test starts with APs distributed evenly between two mobility controllers. The test ends
when all APs have completed their transition from the disconnected mobility controller to the remaining
mobility controller.
Test case 2: This test takes the first test case and includes APs and clients failing over between the two
mobility controllers. Test case 2 represents a “worst case scenario.” This test starts with APs and clients
evenly distributed between two mobility controllers. The test ends when the last client connection is re-
established on the remaining mobility controller. Actual client experience will vary between a few
seconds and the maximum value stated.
The client reauthentication rate is affected by a variety of factors outside of the WLAN infrastructure. In this
scenario, the clients dominate the resultant failover times. Client reauthentication can vary considerably based
on these things:
Client supplicant: Problems with the client supplicant can include slow authentication and noncached
credentials.
Client driver: The client NIC card is slow to recognize that the network connection has been interrupted
and is again available. The NIC card takes longer than expected to attempt to reconnect to the network.
Authentication type: Different authentication types have different speeds for reauthentication. An
example is 802.1X is more involved than an open network.
Insufficient AAA infrastructure: When a large number of clients attempt to reconnect to the network at
the same time, the AAA infrastructure, such as RADIUS and LDAP servers, can become overwhelmed.
Insufficient backend infrastructure: Bottlenecks in the internal infrastructure can lead to longer
response times and dropped packets, which creates longer authentication times.
These numbers are based on active-active redundancy, with half of the APs and users
active on each mobility controller. For active-standby or N+1 redundancy, expect that
failover times and client authentication can take 25% to 100% longer for each set of
NOTE
numbers. The longer times are caused by the greater number of APs and clients that
fail over to the backup controller. For example, in the largest test case, 256 APs need
to fail over. In the active-standby model, 512 APs need to fail over.
Active-Active
64 CAP<==>64 CAP 17s 26s 1K User+ 256 CAP<==>1K User + 256 CAP 2m:20s
128 CAP<==>128 CAP 22s 38s 2K User+ 256 CAP<==>2K User + 256 CAP 2m:55s
256 CAP<==>256 CAP 48s 52s 4K User+ 256 CAP<==>4K User + 256 CAP 5m:45
1K Users + 512 RAP<==>0 3m:00s 1K Users+ 256 RAP<==>1K Users + 256 2m:10s
RAP
The following scaling numbers apply to the all master deployments in ArubaOS 6.1 / AirWave 7.3:
An all-master deployment, where APs are spread across multiple mobility controllers but are in the same
physical location, must be under the control of a single AirWave instance. Currently these deployments
scale to 2500 devices. WMS offload must be enabled on the mobility controllers to allow the AirWave to
manage valid AP lists.
Support Emails
EMEA emea_support@arubanetworks.com
Telephone Support
Support
Telephone Support