Voice over IP (VoIP) Deployment with Aruba Mobility Access Switch. Version 1.0
|
|
|
- Angelina Sherman
- 10 years ago
- Views:
Transcription
1 Voice over IP (VoIP) Deployment with Aruba Mobility Access Switch Version 1.0
2 Copyright 2012 Aruba Networks, Inc. AirWave, Aruba Networks, Aruba Mobility Management System, Bluescanner, For Wireless That Works, Mobile Edge Architecture, People Move. Networks Must Follow, RFprotect, The All Wireless Workplace Is Now Open For Business, Green Island, and The Mobile Edge Company are trademarks of Aruba Networks, Inc. All rights reserved. Aruba Networks reserves the right to change, modify, transfer, or otherwise revise this publication and the product specifications without notice. While Aruba uses commercially reasonable efforts to ensure the accuracy of the specifications contained in this document, Aruba will assume no responsibility for any errors or omissions. Open Source Code Certain Aruba products include Open Source software code developed by third parties, including software code subject to the GNU General Public License ( GPL ), GNU Lesser General Public License ( LGPL ), or other Open Source Licenses. The Open Source code used can be found at this site: Legal Notice ARUBA DISCLAIMS ANY AND ALL OTHER REPRESENTATIONS AND WARRANTIES, WEATHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NONINFRINGEMENT, ACCURACY AND QUET ENJOYMENT. IN NO EVENT SHALL THE AGGREGATE LIABILITY OF ARUBA EXCEED THE AMOUNTS ACUTALLY PAID TO ARUBA UNDER ANY APPLICABLE WRITTEN AGREEMENT OR FOR ARUBA PRODUCTS OR SERVICES PURSHASED DIRECTLY FROM ARUBA, WHICHEVER IS LESS. Warning and Disclaimer This guide is designed to provide information about wireless networking, which includes Aruba Network products. Though Aruba uses commercially reasonable efforts to ensure the accuracy of the specifications contained in this document, this guide and the information in it is provided on an as is basis. Aruba assumes no liability or responsibility for any errors or omissions. ARUBA DISCLAIMS ANY AND ALL OTHER REPRESENTATIONS AND WARRANTIES, WHETHER EXPRESSED, IMPLIED, OR STATUTORY, INCLUDING WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NONINFRINGEMENT, ACCURACY, AND QUIET ENJOYMENT. IN NO EVENT SHALL THE AGGREGATE LIABILITY OF ARUBA EXCEED THE AMOUNTS ACTUALLY PAID TO ARUBA UNDER ANY APPLICABLE WRITTEN AGREEMENT OR FOR ARUBA PRODUCTS OR SERVICES PURCHASED DIRECTLY FROM ARUBA, WHICHEVER IS LESS. Aruba Networks reserves the right to change, modify, transfer, or otherwise revise this publication and the product specifications without notice Crossman Avenue Sunnyvale, California Phone: Fax Aruba Networks, Inc. 2
3 Table of Contents Chapter 1: Introduction 4 Chapter 2: Deployment Methods 5 Deploying VoIP Phone with Endpoint Host Using a Single Switch Interface 5 Separation of Voice and Data Traffic in Daisy Chain 5 Link-Layer Discovery Protocol Media Endpoint Discovery (LLDP-MED) 6 Supported Phone Models 7 Voice VLAN with VoIP Phones that Support LLDP-MED 7 Voice VLAN Without LLDP-MED Supported VoIP Phones 11 Cisco VoIP Device Fingerprinting 11 VoIP Phones and Endpoint Host in Same VLAN 13 VoIP Phone and Endpoint Host Deployed on Separate Switch Interfaces 14 Using Separate Switch Interfaces with Voice VLAN 14 Chapter 3: Authentication on VoIP Phones 15 Using MAC Address Based Authentication to Authenticate VoIP phone and 802.1X to Authenticate Endpoint Host 15 Authenticating the VoIP Phone Using MAC Address-Based Authentication While Using 802.1X for Endpoint Host Centrally on the Aruba Mobility Controller through Tunneled Node 19 Tunneled Node Configuration on the Aruba Mobility Access Switch 19 VoIP and Authentication Configuration on a Mobility Controller 20 Using 802.1X to Authenticate the Endpoint Host Only with User-Derived Role (UDR) for VoIP Phones 22 Conclusion 26 Appendix A: Contacting Aruba Networks 27 Contacting Aruba Networks 27 Aruba Networks, Inc. Table of Contents 3
4 Chapter 1: Introduction The Aruba Mobile Virtual Enterprise (MOVE) architecture enables unified access with an emphasis on mobility. MOVE also delivers unique technology to support the increasing numbers of multimedia applications and population of client endpoints. Multimedia and Voice over IP (VoIP) continue to be a growing part of this client ecosystem. VoIP is an integral part of current enterprise networks. Many networks have transitioned from having a separate private branch exchange system and a data network to a single integrated data network that also supports VoIP. The fundamental reason for this change is the reduction of operational cost where network technology has advanced and can support voice functionality on top of the data network. The Aruba Mobility Access Switch family of products provides various features including voice VLAN, Link Layer Discovery Protocol Media Endpoint Discovery (LLDP-MED), and Quality of Service (QoS) to enable successful deployment of VoIP in enterprise networks. As part of the MOVE architecture, the Aruba Mobility Access Switch also provides support for targeted endpoint device fingerprinting. This support eliminates the need for proprietary protocol support and vendor lock-in for VoIP phone development. This application note addresses traditional techniques and introduces new device-aware support to deploy VoIP phones. This document is intended for all system engineers and network administrators who are deploying a VoIP solution in an enterprise network. This document describes various methods of deploying a VoIP solution at the access layer of the enterprise network. Physical connectivity, interface type, and discovery protocol (LLDP-MED) are described. Table 1 lists the current software versions for this guide. Table 1 Product Aruba Software Versions Version ArubaOS (mobility controllers) ArubaOS (mobility access switch) Aruba Networks, Inc. Introduction 4
5 Chapter 2: Deployment Methods The VoIP solution can be implemented in many different ways with different physical connectivity and switch configurations. The decision of which method to use depends on specific business and technological requirements, as well as the preference of network administrators. This section describes the physical configurations of the Aruba Mobility Access Switch for the two most common deployment methods and lists its key benefits. Two major cases are described: 1) the VoIP phone and an endpoint host, such as a laptop, that share a single switch interface, and 2) the VoIP phone and an endpoint host that use separate interfaces. Deploying VoIP Phone with Endpoint Host Using a Single Switch Interface Enterprise networks commonly use a single switch interface to connect the switch interface to a VoIP phone and to connect an endpoint host to the VoIP phone. In this daisy-chain method, the physical connection of the switch interface, VoIP phone, and endpoint host forms a chain. One of the greatest advantages of this method is that fewer interfaces or switch ports are required for deployment. Two devices share a single interface, so only half of the numbers of end-user-facing interfaces are needed. Fewer interfaces reduces the initial cost for required number of access switches, number of physical cable drops at individual locations, as well operational cost to implement and maintain the deployed network. Figure 1 shows a typical setup, with a laptop sharing a connection through a VoIP phone. arun_1021 Figure 1 Aruba Mobility Access Switch VoIP phone laptop Separation of Voice and Data Traffic in Daisy Chain Several logical configurations are possible with this daisy-chain method. The VoIP phone and endpoint host can belong to separate VLANs for each device or they can belong to the same VLAN. Enterprise networks often separate voice and data traffic for a variety reasons, such as management and QoS. The Aruba Mobility Access Switch supports a voice VLAN feature to accommodate this method. The voice VLAN feature enables an access interface, which normally does not accept any tagged traffic, to allow traffic with VLAN tag (voice) in addition to the untagged traffic (data). This voice VLAN feature is especially useful when the VoIP phone that is attached to the switch interface supports LLDP-MED, simplifying the deployment of voice services. Aruba Networks, Inc. Deployment Methods 5
6 Link-Layer Discovery Protocol Media Endpoint Discovery (LLDP-MED) LLDP-MED is an extension to the LLDP (defined in IEEE 802.1AB) published by Telecommunications Industry Association (TIA) as ANSI/TIA This extension primarily is designed to support and enhance the interoperability between VoIP end devices, such as VoIP phones and VoIP-related networking devices. One primary benefit of LLDP-MED is the ability for network devices to advertise network policy such as VLAN ID (voice VLAN) and QoS marking information (802.1p or DSCP value). Figure 2 highlights the LLDP-MED header as seen in a packet capture. Figure 2 Wireshark capture of LLDP-MED from Aruba Mobility Access Switch Like other vendor-specific discovery protocols, LLDP-MED uses a specific, well-known, multicast MAC address (01-80-c e) to send and receive data units (LLDPDUs). These data units are contained within a LAN segment and are not forwarded to other LAN segments. Aruba Networks, Inc. Deployment Methods 6
7 Supported Phone Models Several vendors manufacture VoIP phones that support LLDP-MED. Table 2 lists some commonly deployed VoIP phone models and vendors. This list is intended as a quick reference of the vendors and models, therefore it is not an exhaustive list of every vendor and model. This information has been gathered from various public sources. Before VoIP deployment is planned, consult the product documentation for the relevant vendors. Table 2 Vendor VoIP Phones that Support LLDP-MED Model Avaya 4600 series with firmware release series with firmware release or 2.0 (depending on voice protocol type) Cisco with firmware version 9.0(2) or later 7906G with firmware version 8.3(3) or later 7911G with firmware version 8.3(3) or later 7931G with firmware version 8.3(3) or later 7941G/GE 7942G 7945G with firmware version 8.3(3) or later 7961G/GE 7962G 7965G with firmware version 8.3(3) or later 7970G 7971G-GE 7975G with firmware version 8.3(3) or later with firmware version 9.1(1) or later Polycom SoundPoint IP 320 / 321 / 330 / 331 with firmware SoundPoint IP 430 / 450 / 550 / 560 / 650 / 670 with firmware SoundStation IP 6000 / 7000 with firmware VVX 1500 with firmware Voice VLAN with VoIP Phones that Support LLDP-MED When you enable the voice VLAN feature on an Aruba Mobility Access Switch with VoIP phones that support LLDP-MED, the VoIP phones do not require any manual configuration for connectivity and registration. Voice VLAN enabled LLDP-MED supported Data VLAN with no tags arun_1022 Figure 3 Aruba Mobility Access Switch phone laptop with voice VLAN and LLDP-MED Aruba Networks, Inc. Deployment Methods 7
8 A configuration example of an Aruba Mobility Access Switch with the voice VLAN feature with settings for VoIP phones that support LLDP-MED in a typical implementation is shown below. In this example, two VLANs are created: VLAN 100 is for data where end-hosts will be placed. VLAN 200 is for VoIP where VoIP phones will be placed. vlan "100" description "DATA-ONLY" vlan "200" description "VOIP-ONLY" A switching interface profile is created for the data VLAN (100). interface-profile switching-profile "DATA-ONLY" access-vlan 100 A VoIP interface profile is created with two parameters: VLAN 200 for voice traffic. DSCP value of 46 for voice packets. interface-profile voip-profile "PHONES" voip-vlan 200 voip-dscp 46 The switching and VoIP interface profiles are then applied to the interface. In addition, the interface is configured with QoS trust mode. VoIP packets from the phone that are marked with DSCP value (46) will be given preferred treatment compared to data traffic (DSCP value of 0). However, the qos-profile can be configured to provide more granular control if desired. For more details on qos-profile configuration, refer to Aruba Mobility Access Switch User Guide. interface gigabitethernet "x/x/x" switching-profile "DATA-ONLY" voip-profile "PHONES" qos trust auto Aruba Networks, Inc. Deployment Methods 8
9 (Optional) If multiple interfaces need to be configured with the same profiles, interface-group can be used. Also, some of the factory-default profiles, such as PoE and LLDP, would need to be applied to the newly created interface-group. QoS trust mode can also be configured for the interface-group. For more details on interface-group configuration, refer to Aruba Mobility Access Switch User Guide. interface-group gigabitethernet "FIRST-FLOOR" apply-to x/x/x-y/y/y voip-profile "PHONES" lldp-profile "lldp-factory-initial" poe-profile "poe-factory-initial" switching-profile "DATA-ONLY" qos trust auto (Optional) Another switching profile is created for VoIP server (VLAN 200). Then, it is applied to the interface where VoIP server/gateway is connected. interface-profile switching-profile "VOIP-ONLY" access-vlan 200 interface gigabitethernet "y/y/y" switching-profile "VOIP-ONLY" For more detail about individual CLI configuration syntax, refer to the Aruba Mobility Access Switch User Guide. When the configuration has been completed, LLDP and LLDP-MED operation can be verified by issuing these commands: (ArubaS P) #show interface-profile lldp-profile lldp-factory-initial LLDP Profile "lldp-factory-initial" Parameter Value LLDP pdu transmit Enabled LLDP protocol receive processing Enabled LLDP transmit interval (Secs) 30 LLDP transmit hold multiplier 4 LLDP-MED protocol Enabled Control proprietary neighbor discovery Disabled (ArubaS P) #show lldp interface gigabitethernet 0/0/0 Interface: gigabitethernet0/0/0 LLDP Tx: Enabled, LLDP Rx: Enabled LLDP-MED: Enabled Transmit interval: 30, Hold timer: 120 Aruba Networks, Inc. Deployment Methods 9
10 To display detailed information about the connected VoIP phone and LLDP-MED neighbor, specifically the network policy information including VLAN ID and DSCP/802.1p values, issue the following command (only relevant information is shown) and verify the information shown under LLDP-MED network policy section: (ArubaS P) #show lldp neighbor interface gigabitethernet 0/0/0 detail Interface: gigabitethernet0/0/0, Number of neighbors: Chassis id: , Management address: System capabilities: Bridge,Phone Enabled capabilities: Bridge System name: AVB352CF2 System description: Not received Auto negotiation: Supported, Enabled Autoneg capability: 10Base-T, HD: yes, FD: yes 100Base-T, HD: yes, FD: yes 1000Base-T, HD: no, FD: yes Media attached unit type: 1000BaseTFD - Four-pair Category 5 UTP, full duplex mode (30) LLDP-MED: Device Type: Communication Device Endpoint (Class III) Capability: LLDP-MED capabilities, Network policy, Inventory LLDP-MED Network Policy for: AppType: 1, Defined: yes Descr: Voice VLAN: 200 Layer 2 Priority: 0 DSCP Value: 46 Inventory: Hardware Revision: 9640GD01A Software Revision: ha96xxua3_00.bin Firmware Revision: hb96xxua3_00.bin Serial Number: xxxxxxxxxxxx Manufacturer: Avaya Model: 9640G Aruba Networks, Inc. Deployment Methods 10
11 Voice VLAN Without LLDP-MED Supported VoIP Phones The advantages of LLDP-MED-supported VoIP phones are clear, but some older phones do not support LLDP-MED or have only the proprietary protocol of the manufacturer. The voice VLAN feature on the Aruba Mobility Access Switch still can be used in such cases, but the VoIP phones must be configured manually by the network administrator. Configuration includes VLAN IDs (voice VLAN) to be used for the voice traffic, as well as any information that is related to QoS such as 802.1p or DSCP marking, which is typically completed by the administrator on the VoIP phone if available. Figure 4 shows that though the physical connection is unchanged, the operating model has shifted. Voice VLAN enabled LLDP-MED not supported manually configured Data VLAN with no tags arun_1023 Figure 4 Aruba Mobility Access Switch phone laptop without LLDP-MED Cisco VoIP Device Fingerprinting One of the key technologies in the Aruba MOVE architecture is the ability to fingerprint selected devices or protocols. The device fingerprinting capability on the Aruba Mobility Access Switch is available to fingerprint the Cisco Discovery Protocol. This fingerprinting enables customers to deploy Cisco phones that do not support standards-based LLDP-MED seamlessly with Aruba Mobility Access Switches. In particular, this capability can be implemented to support non-lldp-med VoIP phones. The device fingerprinting capability identifies the connected devices (VoIP phones) and treats the incoming packets from the device as if they were already modified by the phones themselves through LLDP-MED. This is especially useful in cases where a large number of VoIP phones exist that do not support LLDP-MED and cannot be configured manually. In this example, a Cisco VoIP phone that does not support LLDP-MED is connected to the interface. The Aruba Mobility Access Switch identifies the incoming traffic from the phone and places the traffic on the appropriate VLAN with QoS marking. The phone requires no network policy configuration on itself because the Mobility Access Switch can identify the device and achieve the desired implementation. Aruba Networks, Inc. Deployment Methods 11
12 The Cisco Discovery Protocol VoIP device finger printing is configured in the VoIP interface profile with additional parameters: VLAN 200 for voice traffic. DSCP value of 46 for voice packets. The auto-discover mode has been enabled for Cisco Discovery Protocol-only phones. interface-profile voip-profile "CDP-PHONES" voip-vlan 200 voip-dscp 46 voip-mode auto-discover Then, LLDP interface profile is created and LLDP and LLDP-MED functionality is turned on with Cisco Discovery Protocol receive processing. interface-profile lldp-profile "CDP-PROCESSING" lldp transmit lldp receive med enable proprietary-neighbor-discovery The LLDP and VoIP interface profiles are applied to the interface. The interface-group configuration can also be used to apply the profiles to multiple interfaces at once. Refer to Voice VLAN with VoIP Phones that Support LLDP-MED on page 7 for a configuration example. interface gigabitethernet "x/x/x" voip-profile "CDP-PHONES" lldp-profile "CDP-PROCESSING" Cisco Discovery Protocol fingerprinting can be verified by using the following CLI command. The VoIP mode being set to auto-discover indicates the Cisco Discovery Protocol fingerprinting is enabled: (ArubaS P) #show interface-profile voip-profile CDP-PHONES VOIP profile "CDP-PHONES" Parameter Value VOIP VLAN 200 DSCP UP 0 VOIP Mode auto-discover Aruba Networks, Inc. Deployment Methods 12
13 To view information about the connected Cisco Discovery Protocol-only VoIP phone and any Cisco Discovery Protocol neighbors including the remote interface identification information, issue these commands: (ArubaS P) #show neighbor-devices Neighbor Devices Information Interface Neighbor ID Protocol Remote intf Expiry-Time (Secs) GE0/0/0 SEPxxxxxxxxxxxx CDPv2 Port GE0/0/47 CUCMExxxxxxxxxx CDPv2 GigabitEthernet0/0 137 Number of neighbors: 2 (ArubaS P) #show neighbor-devices phones Neighbor Phones Interface Protocol Phone MAC Voice VLAN GE0/0/0 CDPv2 xx:xx:xx:xx:xx:xx 200 Number of phones: 1 VoIP Phones and Endpoint Host in Same VLAN When you place the VoIP phone and the endpoint host in a single VLAN, the configuration is simplified. The connected switch interface is an access interface where voice and data traffic will not need to be separated. This is not a commonly deployed configuration; however, it can be used if the simplest configuration is desired. A switching interface profile is created for a data-and-voice VLAN. The interface-group configuration can also be used to apply the profiles to multiple interfaces at once. Refer to Voice VLAN with VoIP Phones that Support LLDP-MED on page 7. interface-profile switching-profile "DATA-AND-VOICE" access-vlan 200 interface gigabitethernet "x/x/x" switching-profile "DATA-AND-VOICE" Aruba Networks, Inc. Deployment Methods 13
14 VoIP Phone and Endpoint Host Deployed on Separate Switch Interfaces Another method of deploying VoIP is to have each device, whether VoIP phone or endpoint host (such as a laptop), occupy its own interface on the switch. This method often is chosen when each end-user device must occupy its own interface for business or management reasons. The network administrator must assign specific interface(s) to either data VLAN or voice VLAN, depending on where the endpoint device or VoIP phone would be connected. For the VoIP phone, LLDP-MED is not needed to advertise which voice VLAN should be used because the interface is already in the voice traffic VLAN. Using Separate Switch Interfaces with Voice VLAN Even though only a single device connects to each switch interface, it can still be useful to configure the interface with access interface with voice VLAN feature if the phones support LLDP-MED. This allows switch interfaces that face end users to be configured in consistent manner without requiring any prior knowledge of which interface would be connected to the endpoint device or VoIP phone. The configuration of this method is identical to the voice VLAN with LLDP-MED supported VoIP phones. Figure 5 shows the separated physical connections. Voice VLAN enabled Figure 5 Separate physical connections for phones and other devices arun_1024 Aruba Networks, Inc. Deployment Methods 14
15 Chapter 3: Authentication on VoIP Phones When a VoIP solution is deployed in an enterprise network, network administrators may set up authentication of connected devices so that only the allowed devices gain access to the network. Several methods are available, depending on the supportability of connected devices. Two typical methods are IEEE 802.1X and MAC address-based authentication. This document does not describe all possible combinations of authentication methods on VoIP phones and endpoint hosts, but some of the common scenarios are described. For more details on authentication such as authentication and AAA profile configuration, refer to the Aruba Mobility Access Switch User Guide. Using MAC Address Based Authentication to Authenticate VoIP phone and 802.1X to Authenticate Endpoint Host One of the most common methods of authentication is to use MAC-address based authentication for the VoIP phone while 802.1X for the endpoint host, because each device must be authenticated separately. This configuration requires that the network administrator obtain the MAC address of the VoIP phone and populate the authentication server with appropriate credentials. Currently most endpoint hosts such as laptops and desktops support 802.1X. However some VoIP vendors and models still do not support 802.1X. The Aruba Mobility Access Switch supports different authentication methods on a given interface which allows each device or supplicant to be authenticated individually. The configuration below shows how MAC-address based authentication as well as 802.1X is implemented for a VoIP phone and endpoint host. Starting with two VLANs to be created: VLAN 100 for data VLAN where endpoint hosts will be placed. VLAN 200 where VoIP phones will be placed. vlan "100" description "DATA-ONLY" vlan "200" description "VOIP-ONLY" A VoIP profile is created with VLAN 200 for VoIP phones and DSCP value 46 for voice traffic. Cisco Discovery Protocol fingerprinting can also be added for Cisco Discovery Protocol-only phones if necessary. Refer to Cisco VoIP Device Fingerprinting on page 11 for configuration details. interface-profile voip-profile "PHONES" voip-vlan 200 voip-dscp 46 Aruba Networks, Inc. Authentication on VoIP Phones 15
16 Two roles are defined for endpoint hosts (PC-ROLE and PHONE-ROLE). The PHONE-ROLE is also assigning the PHONES voip-profile for the role. user-role PHONE-ROLE voip-profile "PHONES" access-list stateless allowall-stateless user-role PC-ROLE vlan 100 access-list stateless allowall-stateless An Authentication server and group are defined, where the authentication server with IP address of a.b.c.d should contain the list of 802.1X supplicants and MAC addresses and be reachable from the Aruba Mobility Access Switch. aaa authentication-server radius "RADIUS1" host "a.b.c.d" key <shared secret> aaa server-group "AUTH-SERVER-GROUP1" auth-server RADIUS1 AAA authentication profiles are defined for 802.1X (for endpoint hosts) and MAC authentication (for VoIP phones). aaa authentication dot1x "DOT1X-ACCESS" aaa authentication mac "MAC-ACCESS" An AAA profile is created with default of PHONE-ROLE for successful MAC-address based authentication and PC-ROLE for successful 802.1X supplicant authentication. aaa profile "MAC-DOT1X-AAA" authentication-mac "MAC-ACCESS" mac-default-role "PHONE-ROLE" mac-server-group "AUTH-SERVER-GROUP1" authentication-dot1x "DOT1X-ACCESS" dot1x-default-role "PC-ROLE" dot1x-server-group "AUTH-SERVER-GROUP1" Aruba Networks, Inc. Authentication on VoIP Phones 16
17 The AAA profile is applied to the interface, configured as untrusted with QoS trust mode. The interfacegroup configuration can also be used to apply the profiles to multiple interfaces at once. Refer to Voice VLAN with VoIP Phones that Support LLDP-MED on page 7. interface gigabitethernet "x/x/x" aaa-profile "MAC-DOT1X-AAA" no trusted port qos trust auto (Optional) Another switching profile is created for VoIP server (VLAN 200). Then it is applied to the interface where VoIP server/gateway is connected. interface-profile switching-profile "VOIP-ONLY" access-vlan 200 interface gigabitethernet "y/y/y" switching-profile "VOIP-ONLY" (Optional) An IP address is assigned to management (MGMT) interface with default gateway configured for connectivity with authentication server. interface mgmt ip address <IP address> <netmask> ip-profile default-gateway <IP address> NOTE The VoIP interface profile is applied to the user role in the example because the interface is untrusted for authentication. Currently, VoIP interface profile can only be applied to trusted interfaces or user roles as shown in the Voice VLAN with VoIP Phones that Support LLDP-MED scenario. Aruba Networks, Inc. Authentication on VoIP Phones 17
18 MAC address based and 802.1X authentication profile configuration as well as authentication status of users and/or supplicants can be viewed by the following CLI commands: (ArubaS P) #show aaa profile MAC-DOT1X-AAA AAA Profile "MAC-DOT1X-AAA" Parameter Value Initial role logon MAC Authentication Profile MAC-ACCESS MAC Authentication Default Role PHONE-ROLE MAC Authentication Server Group AUTH-SERVER-GROUP X Authentication Profile DOT1X-ACCESS 802.1X Authentication Default Role PC-ROLE 802.1X Authentication Server Group AUTH-SERVER-GROUP1... (ArubaS P) #show user-table Users IP MAC Name Role Age(d:h:m) Auth AP name Roaming Essid/Bssid/Phy Profile xx:xx:xx:xx:xx:xx pcuser PC-ROLE 00:00: x-Wired 0/0/0 Wired MAC-DOT1X-AAA yy:yy:yy:yy:yy:yy yyyyyyyyyyyy PHONE-ROLE 00:00:00 MAC 0/0/0 Wired MAC-DOT1X-AAA User Entries: 2/2 The MAC address table can be used to verify the authentication status and its associated VLAN ID on per-mac address basis. The following CLI command can be used: (ArubaS P) #show mac-address-table Total MAC address: 3 Learnt: 1, Static: 0, Auth: 2, Phone: 0 MAC Address Table Destination Address Address Type VLAN Destination Port xx:xx:xx:xx:xx:xx Auth 0100 GE0/0/0 yy:yy:yy:yy:yy:yy Auth 0200 GE0/0/0 zz:zz:zz:zz:zz:zz Learnt 0200 GE0/0/47 NOTE EAP-MD5 is not currently supported on the Aruba Mobility Access Switch, so the 802.1X method cannot be used for VoIP phone authentication. Aruba Networks, Inc. Authentication on VoIP Phones 18
19 Authenticating the VoIP Phone Using MAC Address-Based Authentication While Using 802.1X for Endpoint Host Centrally on the Aruba Mobility Controller through Tunneled Node As mentioned earlier, some VoIP phones do not support 802.1X. In such cases, the MAC address of the VoIP phone can be used to provide some level of security while 802.1X is used for the endpoint host. In addition, the Aruba Mobility Access Switch supports the tunneled node feature where authentication can take place centrally. This example uses the Aruba 3400 mobility controller to authenticate the devices. For more information on tunneled node feature, refer to the Aruba Mobility Access Switch User Guide. Tunneled Node Configuration on the Aruba Mobility Access Switch Layer 3 reachability is required for the tunneled-node feature. This configuration can be used as a reference, where <VLAN-ID> is a VLAN number that is used for connectivity between the Aruba Mobility Access Switch and the Aruba Mobility Controller. vlan <VLAN-ID> interface vlan <VLAN-ID> ip address <IP address> <netmask> ip-profile default-gateway <IP address of controller or default gateway> interface-profile switching-profile "VLAN-<VLAN-ID>" access-vlan <VLAN-ID> interface gigabitethernet x/x/x switching-profile VLAN-<VLAN-ID> Tunneled-node and switching profiles are defined on the Mobility Access Switch. interface-profile tunneled-node-profile "TUNNELED-NODE" controller-ip <IP address> interface-profile switching-profile "CONTROLLER-VLAN-100" access-vlan 100 Configured profiles are applied to the interface where end-host/voip phone will be connected. The interface-group configuration can also be used to apply the profiles to multiple interfaces at the same time. Refer to the Voice VLAN with VoIP Phones that Support LLDP-MED on page 7. interface gigabitethernet "x/x/x" tunneled-node-profile "TUNNELED-NODE" switching-profile "CONTROLLER-VLAN-100" Aruba Networks, Inc. Authentication on VoIP Phones 19
20 VoIP and Authentication Configuration on a Mobility Controller Layer 3 reachability is required for tunneled-node feature. This configuration can be used as a reference, where <VLAN-ID> is a VLAN number that is used for connectivity between the Mobility Access Switch and the Aruba Mobility Controller as well as authentication server. vlan <VLAN-ID> interface vlan <VLAN-ID> ip address <IP address> <netmask> ip default-gateway <IP address> interface gigabitethernet "z/z" access-vlan <VLAN-ID> Two VLANs are created (100 for endpoint hosts and 200 for VoIP phones). vlan 100 "DATA-ONLY" vlan 200 "VOIP-ONLY" Two roles are defined for endpoint hosts (TN-PC-ROLE and TN-PHONE-ROLE). The TN-PHONE- ROLE is also assigning VLAN 200 for the role. user-role TN-PC-ROLE access-list session allowall user-role TN-PHONE-ROLE vlan 200 access-list session allowall An authentication server and group are defined, where the authentication server with IP address of a.b.c.d should contain the list of 802.1X supplicants and MAC addresses and be reachable from the Aruba Mobility Access Switch. aaa authentication-server radius "RADIUS1" host "a.b.c.d" key <shared secret> aaa server-group "TN-AUTH-SERVER-GROUP1" auth-server RADIUS1 AAA authentication profiles are defined for 802.1X (for endpoint hosts) and MAC authentication (for VoIP phones). aaa authentication mac "MAC-ACCESS" aaa authentication dot1x "DOT1X-ACCESS" Aruba Networks, Inc. Authentication on VoIP Phones 20
21 Defined authentication profiles (802.1X and MAC authentication) are applied to the AAA profile X has the default role of TN-PC-ROLE for endpoint hosts. MAC authentication has the default role of TN-PHONE-ROLE for VoIP phones. aaa profile "TN-AAA" authentication-mac "MAC-ACCESS" mac-default-role "TN-PHONE-ROLE" mac-server-group "TN-AUTH-SERVER-GROUP1" authentication-dot1x "DOT1X-ACCESS" dot1x-default-role "TN-PC-ROLE" dot1x-server-group "TN-AUTH-SERVER-GROUP1" The AAA profile is applied to VLAN 100. vlan 100 wired aaa-profile "TN-AAA" Tunneled node client status and the controller IP address can be viewed by the following CLI command on the Aruba Mobility Access Switch: (ArubaS P) #show tunneled-node config Tunneled Node Client: Enabled Tunneled Node Server: Tunneled Node Loop Prevention: Disabled Operational status of tunneled node feature that includes the tunneled node interface, state of the tunnel, its associated VLAN ID and controller MAC address can be viewed by the following CLI commands on the Aruba Mobility Access Switch: (ArubaS P) #show tunneled-node state Tunneled Node State IP MAC Port state vlan tunnel inactive-time aa:aa:aa:aa:aa:aa GE0/0/0 complete (ArubaS P) #show mac-address-table Total MAC address: 1 Learnt: 1, Static: 0, Auth: 0, Phone: 0 MAC Address Table Destination Address Address Type VLAN Destination Port bb:bb:bb:bb:bb:bb Learnt 0001 GE0/0/45 Aruba Networks, Inc. Authentication on VoIP Phones 21
22 Similar to the commands above, operational status of tunneled-node feature as well as MAC address based and 802.1X authentication status can be viewed by the following CLI commands on the mobility controller: (Aruba3400) #show tunneled-node state Tunneled Node State IP MAC s/p state vlan tunnel inactive-time aa:aa:aa:aa:aa:aa gigabitethernet0/0/0 complete (Aruba3400) #show tunneled-node config Tunneled node Server:Enabled Tunnel Loop Prevention:Disabled (Aruba3400) #show user-table Users IP MAC Name Role Age(d:h:m) Auth VPN link AP name Roaming Essid/Bssid/Phy Profile Forward mode Type yy:yy:yy:yy:yy:yy yyyyyyyyyyyy TN-PHONE-ROLE 00:00:01 MAC tunnel 9 Wired :gigabitethernet0/0/0/aa:aa:aa:aa:aa:aa TN-AAA tunnel xx:xx:xx:xx:xx:xx pcuser TN-PC-ROLE 00:00: x-Wired tunnel 9 Wired :gigabitethernet0/0/0/aa:aa:aa:aa:aa:aa TN-AAA tunnel User Entries: 2/2 Using 802.1X to Authenticate the Endpoint Host Only with User-Derived Role (UDR) for VoIP Phones Another common scenario is to authenticate only the endpoint hosts using 802.1X while allowing the VoIP phones to connect using user-derived role (UDR). This scenario is less secure than the previous scenario where VoIP phones were authenticated using MAC address based authentication. This method is deployed when the network administrator does not need to authenticate the VoIP phones individually (which may or may not support 802.1X), but still needs to have the endpoint hosts to authenticate. The switch interface must be configured as untrusted, so the first half (or three octets) of the MAC address of the VoIP phones, also known as Organizationally Unique Identifier (OUI), can be used to define a separate rule derivation. Aruba Networks, Inc. Authentication on VoIP Phones 22
23 Two VLANs are created: VLAN 100 for data VLAN where endpoint hosts will be placed. VLAN 200 VoIP VLAN where VoIP phones will be placed. vlan "100" description "DATA-ONLY" vlan "200" description "VOIP-ONLY" A VoIP profile is created with VLAN 200 for VoIP phones and DSCP value 46 for voice traffic. Cisco Discovery Protocol fingerprinting can also be added for Cisco Discovery Protocol-only phones. Refer to Cisco VoIP Device Fingerprinting on page 11 for configuration details. interface-profile voip-profile "PHONES" voip-vlan 200 voip-dscp 46 Two roles are defined: one for VoIP phones and the other for endpoint hosts (PCs). The VoIP phone role has the VoIP profile applied to the role and PC-ROLE has the VLAN 100 tag. user-role PHONE-ROLE voip-profile "PHONES" access-list stateless allowall-stateless user-role PC-ROLE vlan 100 access-list stateless allowall-stateless An authentication server and group are defined, where authentication server a.b.c.d must be reachable from the Aruba Mobility Access Switch. aaa authentication-server radius "RADIUS1" host "a.b.c.d" key <shared secret> aaa server-group "AUTH-SERVER-GROUP1" auth-server RADIUS1 Aruba Networks, Inc. Authentication on VoIP Phones 23
24 An 802.1X authentication profile is configured with default of PC-ROLE for successful supplicant authentication. In addition, a user derivation rule is defined for phones that will not be authenticated using 802.1X. Phones can be placed into PHONE-ROLE upon matching the first three octets (OUI). NOTE When entering the VoIP phone OUI, colon format must be used for CLI syntax (00:11:22). aaa authentication dot1x "DOT1X-ACCESS" aaa derivation-rules user PHONES-UDR set role condition macaddr starts-with "XX:XX:XX" set-value PHONE-ROLE aaa profile "UDR-DOT1X-AAA" authentication-dot1x "DOT1X-ACCESS" dot1x-default-role "PC-ROLE" dot1x-server-group "AUTH-SERVER-GROUP1" user-derivation-rules "PHONES-UDR" The AAA profile is applied to the interface, configured as untrusted with QoS trust mode. The interfacegroup configuration can also be used to apply the profiles to multiple interfaces at the same time. Refer to Voice VLAN with VoIP Phones that Support LLDP-MED on page 7. interface gigabitethernet "x/x/x" aaa-profile "UDR-DOT1X-AAA" no trusted port qos trust auto (Optional) Another switching profile is created for VoIP server (VLAN 200). Then it is applied to the interface where VoIP server/gateway is connected. interface-profile switching-profile "VOIP-ONLY" access-vlan 200 interface gigabitethernet "y/y/y" switching-profile "VOIP-ONLY" Aruba Networks, Inc. Authentication on VoIP Phones 24
25 (Optional) Connectivity with authentication is necessary for authentication to take place. An IP address is assigned to the MGMT interface with the default gateway configured for connectivity with the authentication server. interface mgmt ip address <IP address> <netmask> ip-profile default-gateway <IP address> User derivation rule and 802.1X authentication profile configuration and user/supplicant status can be viewed by the following CLI commands: (ArubaS P) #show aaa profile UDR-DOT1X-AAA AAA Profile "UDR-DOT1X-AAA" Parameter Value Initial role logon MAC Authentication Profile N/A MAC Authentication Default Role guest MAC Authentication Server Group N/A 802.1X Authentication Profile DOT1X-ACCESS 802.1X Authentication Default Role PC-ROLE 802.1X Authentication Server Group AUTH-SERVER-GROUP1 RADIUS Accounting Server Group N/A RADIUS Interim Accounting Disabled XML API server N/A User derivation rules PHONES-UDR Enforce DHCP Disabled Authentication Failure Blacklist Time 3600 sec (ArubaS P) #show user-table Users IP MAC Name Role Age(d:h:m) Auth AP name Roaming Essid/Bssid/Phy Profile xx:xx:xx:xx:xx:xx pcuser PC-ROLE 00:00: x-Wired 0/0/0 Wired UDR-DOT1X-AAA yy:yy:yy:yy:yy:yy PHONE-ROLE 00:00:11 0/0/0 Wired UDR-DOT1X-AAA User Entries: 2/2 Aruba Networks, Inc. Authentication on VoIP Phones 25
26 The MAC address table can be used to verify the authentication status and its associated VLAN ID on per-mac address basis. The following CLI command can be used: (ArubaS P) #show mac-address-table Total MAC address: 3 Learnt: 1, Static: 0, Auth: 2, Phone: 0 MAC Address Table Destination Address Address Type VLAN Destination Port xx:xx:xx:xx:xx:xx Auth 0100 GE0/0/0 yy:yy:yy:yy:yy:yy Auth 0200 GE0/0/0 zz:zz:zz:zz:zz:zz Learnt 0200 GE0/0/47 Conclusion The Aruba Mobility Access Switch supports various methods to deploy VoIP in enterprise networks. These methods include different ways to connect VoIP phones and endpoint host devices physically as well as various types of configuration that can be implemented on the Mobility Access Switch. Furthermore, the VoIP solution can also provide security by adding an authentication mechanism such as IEEE 802.1X or MAC address-based authentication. In addition to a clear understanding of the various available options discussed, careful planning prior to actual deployment is highly recommended for successful VoIP deployment in enterprise networks. Aruba Networks, Inc. Authentication on VoIP Phones 26
27 Appendix A: Contacting Aruba Networks Contacting Aruba Networks Web Site Support Main Site Support Site Software Licensing Site Wireless Security Incident Response Team (WSIRT) Support s Americas and APAC EMEA WSIRT Please details of any security problem found in an Aruba product. Validated Reference Design Contact and User Forum Validated Reference Designs VRD Contact AirHeads Online User Forum Telephone Support Aruba Corporate +1 (408) FAX +1 (408) Support United States WI-FI-LAN ( ) Universal Free Phone Service Numbers (UIFN): Australia Reach: ARUBA (27822) United States Canada United Kingdom BT: MCL: Aruba Networks, Inc. Contacting Aruba Networks 27
28 Telephone Support Universal Free Phone Service Numbers (UIFN): Japan IDC: * Select fixed phones IDC: * Any fixed, mobile & payphone KDD: * Select fixed phones JT: * Select fixed phones JT: * Any fixed, mobile & payphone Korea DACOM: KT: ONSE: Singapore Singapore Telecom: Taiwan (U) CHT-I: Belgium Belgacom: Israel Bezeq: Barack ITC: Ireland EIRCOM: Hong Kong HKTI: Germany Deutsche Telkom: France France Telecom: China (P) China Telecom South: China Netcom Group: Saudi Arabia UAE Egypt * within Cairo * outside Cairo India Aruba Networks, Inc. Contacting Aruba Networks 28
Optimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches
APPLICATION NOTE Deploying IP Telephony with JUNIPER NETWORKS ETHERNET Switches Optimizing Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches Copyright 2009, Juniper Networks,
Deploying IP Telephony with EX-Series Switches
Application Note Deploying IP Telephony with EX-Series Switches Optimizing VoIP Applications with EX 3200 and EX 4200 Series Ethernet Switches Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES
APPLICATION NOTE DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES Optimizing Applications with Juniper Networks Access Switches Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction.....................................................................................................3
ArubaOS DHCP Fingerprinting. Version 1.0
ArubaOS DHCP Fingerprinting Version 1.0 Copyright 2011 Aruba Networks, Inc. AirWave, Aruba Networks, Aruba Mobility Management System, Bluescanner, For Wireless That Works, Mobile Edge Architecture, People
Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication
Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication Requirements You can configure voice over IP (VoIP) on an EX Series switch to support IP telephones. To configure
Campus Redundancy Models. Version 1.0
Version 1.0 Copyright 2012 Aruba Networks, Inc. AirWave, Aruba Networks, Aruba Mobility Management System, Bluescanner, For Wireless That Works, Mobile Edge Architecture, People Move. Networks Must Follow,
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN assignment to Avaya 4600 Series IP Telephones
ClearPass Policy manager Cisco Switch Setup with CPPM. Technical Note
ClearPass Policy manager Cisco Switch Setup with CPPM Technical Note Copyright 2012 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN Assignment for Avaya 9600 and 1600 Series
How To Configure Voice Vlan On An Ip Phone
1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices
802.1X Authentication, Link Layer Discovery Protocol (LLDP), and Avaya IP Telephones
802.1X Authentication, Link Layer Discovery Protocol (LLDP), and Avaya IP Telephones Abstract The purpose of this document is to discuss 802.1X Authentication and Link Layer Discovery Protocol (LLDP) in
Interoperability between Avaya IP phones and ProCurve switches
An HP ProCurve Networking Application Note Interoperability between Avaya IP phones and ProCurve switches Contents 1. Introduction... 3 2. Architecture... 3 3. Checking PoE compatibility... 3 4. Configuring
Palo Alto Networks User-ID Services. Unified Visitor Management
Palo Alto Networks User-ID Services Unified Visitor Management Copyright 2011 Aruba Networks, Inc. Aruba Networks trademarks include Airwave, Aruba Networks, Aruba Wireless Networks, the registered Aruba
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Aruba Mobility Access Switch and Arista 7050S INTEROPERABILITY TEST RESULTS:
Aruba and INTEROPERABILITY TEST RESULTS: Aruba and Aruba and Table of Contents Executive summary 3 Scope and methodology 3 Interface connectivity 4 Port channels and link aggregation control protocol (LACP)
Configuring LLDP, LLDP-MED, and Location Service
27 CHAPTER Configuring LLDP, LLDP-MED, and Location Service This chapter describes how to configure the Link Layer Discovery Protocol (LLDP), LLDP Media Endpoint Discovery (LLDP-MED), and Location Service
Interoperability between Cisco Unified IP 7900 Series phones and ProCurve switches
An HP ProCurve Networking Application Note Interoperability between Cisco Unified IP 7900 Series phones and ProCurve switches Contents 1. Introduction... 3 2. Architecture... 3 3. Checking PoE compatibility...
VOIP Guide Using ZyXEL Switch
VOIP Guide Using ZyXEL Switch 2015/8/10 ZyXEL Communications Corporation Barney Gregorio Overview: This article will contain solutions on how to configure Voice over IP (VOIP). Two methods will be discussed:
Juniper Networks EX Series Ethernet Switches/ Cisco VoIP Interoperability Test Results. September 25, 2009
Juniper Networks EX Series Ethernet Switches/ Cisco VoIP Interoperability Test Results September 25, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between
Using Link Layer Discovery Protocol in Multivendor Networks
Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates
Juniper / Cisco Interoperability Tests. August 2014
Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper
Solving the Sticky Client Problem in Wireless LANs SOLVING THE STICKY CLIENT PROBLEM IN WIRELESS LANS. Aruba Networks AP-135 and Cisco AP3602i
SOLVING THE STICKY CLIENT PROBLEM IN WIRELESS LANS Aruba Networks AP-135 and Cisco AP3602i Conducted at the Aruba Proof-of-Concept Lab May 2013 Statement of test result confidence Aruba makes every attempt
Aruba Remote Access Point (RAP) Networks. Version 8
Aruba Remote Access Point (RAP) Networks Version 8 Copyright 2012 Aruba Networks, Inc. AirWave, Aruba Networks, Aruba Mobility Management System, Bluescanner, For Wireless That Works, Mobile Edge Architecture,
ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note
ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE Technical Note Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba the
Configuring DHCP Snooping
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples.
Interoperability between Mitel IP Phones and ProCurve Switches
An HP ProCurve Networking Application Note Interoperability between Mitel IP Phones and ProCurve Switches Contents 1. Introduction... 3 2. Architecture... 3 3. Configuration... 3 3.1 Check power over Ethernet
MS Series: VolP Deployment Guide
Solution Guide MS Series: VolP Deployment Guide JULY 2013 How to deploy a distributed VoIP infrastructure with Meraki MS switches. Table of Contents Introduction 3 Getting Started 4 Setting up VoIP using
Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
Configuring CyberData Devices for Intermedia Hosted PBX
The IP Endpoint Company Configuring CyberData Devices for Intermedia Hosted PBX This procedure was written by: CyberData Corporation 3 Justin Court Monterey, CA 93940 T:831-373-2601 F: 831-373-4193 www.cyberdata.net
Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
Link Layer Discovery Protocol (LLDP)
Extreme etworks Technical Brief Link Layer Discovery Protocol () A ew Standard for Discovering and Managing Converged etwork Devices If there is any certainty in the access layer of a network, it is that
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
VLAN and QinQ Technology White Paper
VLAN and QinQ Technology White Paper Issue 1.01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
Datasheet. Managed PoE+ Gigabit Switches with SFP. Models: ES-24-250W, ES-24-500W, ES-48-500W, ES-48-750W
Managed PoE+ Gigabit Switches with SFP Models: ES-24-250W, ES-24-500W, ES-48-500W, ES-48-750W Non-Blocking Throughput Switching Performance Gigabit Ethernet RJ45 and SFP+/SFP Ports Auto-Sensing IEEE 802.3af/at
solution guide DLNA, AIRPLAY AND AIRPRINT ON CAMPUS NETWORKS
DLNA, AIRPLAY AND AIRPRINT ON CAMPUS NETWORKS Table of Contents Warning and Disclaimer Introduction What is Zero Configuration Networking (zeroconf)? What is DLNA? Making DLNA and Bonjour work over WLANs
VOICE VLAN SUPPORT IN THE DELL POWERCONNECT 6200
VOICE VLAN SUPPORT IN THE DELL POWERCONNECT 6200 CONTENTS INTRODUCTION 3 REQUIREMENTS 3 USING VOICE VLAN 3 INTERACTION WITH LLDP-MED 4 VOICE VLAN CONFIGURATION 4 CLI CONFIGURATION 4 WEB CONFIGURATION 8
Design and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
Aruba-Certified Design Expert (ACDX) Study Guide
Aruba-Certified Design Expert (ACDX) Study Guide Table of Contents Introduction Prerequisites for the ACDX Exam Format Software Versions Exam Deliverables Exam Equipment Scheduling and Paying for an Exam
IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.
IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for an Aruba Networks Remote Access VPN Solution with GSM Failover using an Avaya Aura Telephony Infrastructure in a Converged Voice over IP
QUALITY OF SERVICE FOR CLOUD-BASED MOBILE APPS: Aruba Networks AP-135 and Cisco AP3602i
QUALITY OF SERVICE FOR CLOUD-BASED MOBILE APPS: Aruba Networks AP-135 and Cisco AP3602i Conducted at the Aruba Proof-of-Concept Lab November 2012 Statement of test result confidence Aruba makes every attempt
TotalCloud Phone System
TotalCloud Phone System Cisco SF 302-08P PoE VLAN Configuration Guide Note: The below information and configuration is for deployment of the Cbeyond managed switch solution using the Cisco 302 8 port Power
Cisco Virtual Office Express
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
ARUBA RAP-3 REMOTE ACCESS POINT
ARUBA RAP-3 REMOTE ACCESS POINT High-performance wireless and wired networking for branch offices and teleworkers The multifunctional Aruba RAP-3 delivers secure 802.11n wireless and wired network access
Guest Access with ArubaOS. Version 1.0
Version 1.0 Copyright 2012 Aruba Networks, Inc. AirWave, Aruba Networks, Aruba Mobility Management System, Bluescanner, For Wireless That Works, Mobile Edge Architecture, People Move. Networks Must Follow,
FSM73xx GSM73xx GMS72xxR Shared access to the Internet across Multiple routing VLANs using a Prosafe Firewall
FSM73xx GSM73xx GMS72xxR Shared access to the Internet across Multiple routing VLANs using a Prosafe Firewall This document describes how to: - Create multiple routing VLANs - Obtain Internet access on
Cisco EtherSwitch Network Modules
Cisco EtherSwitch Network Modules 16- and 36-Port 10/100 Ethernet Modules for Cisco 2600/2800/3600/3700/3800 Series Routers Figure 1. Cisco 16-Port and 36-Port EtherSwitch Network Modules The Cisco 16-
DCS-3950-28CT-POE fully loaded AT PoE Switch Datasheet
DCS-3950-28CT-POE fully loaded AT PoE Switch Datasheet DCS-3950-28CT-POE Product Overview DCS-3950-28CT-POE is fully loaded PoE switch for carrier and enterprises. It supports comprehensive QoS, enhanced
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example
Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Document ID: 69632 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure
Aruba Mobility Controllers and Deployment Models Validated Reference Design
Aruba Mobility s and Deployment Models Validated Reference Design Version 5.0 Solution Guide Copyright 2010 Aruba Networks, Inc. AirWave, Aruba Networks, Aruba Mobility Management System, Bluescanner,
Managing a FortiSwitch unit with a FortiGate Administration Guide
Managing a FortiSwitch unit with a FortiGate Administration Guide Managing a FortiSwitch unit with a FortiGate April 30, 2014. Copyright 2014 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiCare
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for HP ProCurve Networking Switches connected to an Avaya Telephony Infrastructure in a Multi-Site VoIP and Data Network solution using Avaya
GVRP Overview. Overview
3 GVRP Contents Overview...................................................... 3-2................................................... 3-3 General Operation........................................... 3-4
LLDP-MED and Cisco Discovery Protocol
White Paper LLDP-MED and Cisco Discovery Protocol DEVICE DISCOVERY PROTOCOLS Device discovery protocols enable directly connected devices to discover information about each other. They advertise information
Network Configuration Example
Network Configuration Example Configuring Link Aggregation Between EX Series Switches and Ruckus Wireless Access Points Modified: 2015-10-01 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Enterasys Wireless Access Point 3000 (RBT3K-AG) to Support Avaya IP Office, Avaya IP Wireless Telephones and Avaya Phone Manager
Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009
Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results May 1, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between its EX4200 and EX8208
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Configuring a Small to Medium Size Business VoIP and Data Network Solution Consisting of HP ProCurve Networking Switches and an Avaya Telephony
Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features
Data Sheet Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features Introduction to Public Key Infrastructure Public Key Infrastructure (PKI) offers a scalable method of securing networks,
HP ProCurve and Avaya Aura Application Integration Guide. VoIP Interoperability with Avaya Aura Communication Manager
HP ProCurve and Avaya Aura Application Integration Guide VoIP Interoperability with Avaya Aura Communication Manager Introduction... 3 Solution architecture... 3 Description... 3 Typical topologies...
BroadCloud PBX Polycom VLAN Support
BroadCloud PBX Polycom VLAN Support Technical Guide Version 1.0 1009 Pruitt Road The Woodlands, TX 77380 Tel +1 281.465.3320 WWW.BROADSOFT.COM BroadCloud PBX Polycom VLAN Support Technical Guide Copyright
ProCurve and Mitel Convergence Solution Brief
ProCurve Networking ProCurve and Mitel Convergence Solution Brief Introduction...2 ProCurve and Mitel: A true partnership...2 Driving technological developments...2 Voice over Wi-Fi...4 Supporting customers...4
APPLICATION NOTE. Copyright 2011, Juniper Networks, Inc. 1
APPLICATION NOTE Configuring and Deploying the AX411 Wireless Access Point Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction......................................................................................................3
Lucent VPN Firewall Security in 802.11x Wireless Networks
Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper
Aruba Mobility Controllers and Deployment Models Validated Reference Design
Aruba Mobility s and Deployment Models Validated Reference Design Version 5.0 Solution Guide Copyright 2012 Aruba Networks, Inc. AirWave, Aruba Networks, Aruba Mobility Management System, Bluescanner,
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid
Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 4 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch. Software Release Notes
AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch Supported Platforms Software Release Notes Please read this document before you begin to use the AT-S60 management software. The AT-S60
HARTING Ha-VIS Management Software
HARTING Ha-VIS Management Software People Power Partnership HARTING Management Software Network Management Automation IT - with mcon Switches from HARTING With the Ha-VIS mcon families, HARTING has expanded
Installation of the On Site Server (OSS)
Installation of the On Site Server (OSS) rev 1.1 Step #1 - Initial Connection to the OSS Having plugged in power and an ethernet cable in the eth0 interface (see diagram below) you can connect to the unit
IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers
IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers Application Note Revision 1.0 10 February 2011 Copyright 2011. Aruba Networks, Inc. All rights reserved. IPsec VPN Security
Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation
Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation This document describes the steps to undertake in configuring a Layer 2/Layer 3 switch (in this document a FMS7382S
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
Microsoft Windows Server System White Paper
Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta
L2 / L3 Switches. Link Layer Discovery Protocol (LLDP) Configuration Guide
L2 / L3 Switches Link Layer Discovery Protocol (LLDP) Configuration Guide Revision 1.0 The information in this USER S MANUAL has been carefully reviewed and is believed to be accurate. The vendor assumes
48 GE PoE-Plus + 2 GE SFP L2 Managed Switch, 375W
GEP-5070 Version: 1 48 GE PoE-Plus + 2 GE SFP L2 Managed Switch, 375W The LevelOne GEP-5070 is an intelligent L2 Managed Switch with 48 x 1000Base-T PoE-Plus ports and 2 x 100/1000BASE-X SFP (Small Form
CT5760 Controller and Catalyst 3850 Switch Configuration Example
CT5760 Controller and Catalyst 3850 Switch Configuration Example Document ID: 116342 Contributed by Antoine KMEID and Serge Yasmine, Cisco TAC Engineers. Aug 13, 2013 Contents Introduction Prerequisites
Virtual Networking Features of the VMware vnetwork Distributed Switch and Cisco Nexus 1000V Series Switches
Virtual Networking Features of the vnetwork Distributed Switch and Cisco Nexus 1000V Series Switches What You Will Learn With the introduction of ESX, many virtualization administrators are managing virtual
DIGIPASS Authentication for Cisco ASA 5500 Series
DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations
EX 3500 ETHERNET SWITCH
PRODUCT SPEC SHEET EX 3500 ETHERNET SWITCH EX 3500 ETHERNET SWITCH EQUIPPED THE WIRED ETHERNET SWITCH FOR UNIFIED WIRED-WIRELESS NETWORKS GET ALL THE WIRED NETWORKING FEATURES YOU NEED, PLUS THE SIMPLICITY
Network Detector Setup and Configuration
339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net MODE SYST RPS MASTR STAT SPEDUPLX STACK 1 2 3 4 5 6 7 8 91 0 11 12 1X 2X 11X 12X 13 14 15 16 1718 19 20 2122 23 24 13X
Network Security Solutions Implementing Network Access Control (NAC)
Network Security Solutions Implementing Network Access Control (NAC) Tested Solution: Protecting a network with Sophos NAC Advanced and Switches Sophos NAC Advanced is a sophisticated Network Access Control
On-boarding and Provisioning with Cisco Identity Services Engine
On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID
Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led
Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led Course Description This 3-day instructor-led, hands-on course provides learners with skills and resources required to successfully
How to Configure a BYOD Environment with the DWS-4026
Configuration Guide How to Configure a BYOD Environment with the DWS-4026 (MAC Authentication + Captive Portal) Overview This guide describes how to configure and implement BYOD environment with the D-Link
ARCHITECT S GUIDE: Mobile Security Using TNC Technology
ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 [email protected] www.trustedcomputinggroup.org
Application Note Gigabit Ethernet Port Modes
Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7
V310 Support Note Version 1.0 November, 2011
1 V310 Support Note Version 1.0 November, 2011 2 Index How to Register V310 to Your SIP server... 3 Register Your V310 through Auto-Provision... 4 Phone Book and Firmware Upgrade... 5 Auto Upgrade... 6
20 GE PoE-Plus + 4 GE PoE-Plus Combo SFP + 2 GE SFP L2 Managed Switch, 370W
GEP-2672 Version: 1 20 GE PoE-Plus + 4 GE PoE-Plus Combo SFP + 2 GE SFP L2 Managed Switch, 370W The LevelOne GEP-2672 is a Layer 2 Managed switch with 24 x 1000Base-T PoE-Plus ports associated with 4 x
Deploying and Configuring Polycom Phones in 802.1X Environments
Deploying and Configuring Polycom Phones in 802.1X Environments This document provides system administrators with the procedures and reference information needed to successfully deploy and configure Polycom
Datasheet. Managed Gigabit Switches with SFP. Models: ES-24-Lite, ES-48-Lite. Non-Blocking Throughput Switching Performance
Managed Gigabit Switches with SFP Models: ES-24-Lite, ES-48-Lite Non-Blocking Throughput Switching Performance Gigabit Ethernet RJ45 Ports SFP+/SFP Fiber Connectivity Options Deployment Examples VLAN 80
ArubaOS v2.4. User Guide
ArubaOS v2.4 User Guide TM ArubsOS v2.4: User Guide Copyright Copyright 2005 Aruba Wireless Networks, Inc. All rights reserved. Specifications in this manual are subject to change without notice. Originated
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Configuring a Virtual Private Network (VPN) for Avaya IP Office using the Edgewater Networks EdgeMarc 4500 VoIP VPN Appliance - Issue 1.0
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
Seamless Roaming in a Remote Access VPN Environment
Always on If we look just a few years into the future, the office warrior who works exclusively onsite will be a scarce phenomenon. Instead, these busy professionals will use PCs, smartphones, and tablets
TP-LINK. 24-Port Gigabit L2 Managed PoE Switch with 4 Combo SFP Slots. Overview. Datasheet TL-SG3424P. www.tp-link.com
TP-LINK TM 24-Port Gigabit L2 Managed PoE Switch with 4 Combo SFP Slots Overview The provides 24 10/100/1000Mbps ports that supports 802.3at/af-compliant PoE, with a total PoE power supply up to 320W,
