Troubleshooting Cheat Sheet
|
|
|
- Audra Curtis
- 10 years ago
- Views:
Transcription
1 Troubleshooting Cheat Sheet Infrastructure Issues AP can t connect to controller Master doesn t see all controllers Controller can t reach other resources Poor radio coverage VRRP Roaming User Issues Can t see SSID Can t associate Can t authenticate No IP Address Poor performance Dropped connections 2007 Aruba Networks 1
2 Logging Enable Logging ( ) (config) #logging level debugging? ap-debug Debug an AP bssid-debug Debug a Bssid essid-debug Debug an Essid network Network logs security Security logs system System logs user User logs user-debug Debug a User wireless Wireless logs View Log Files ( ) (config) #show log? ap-debug AP Debug Logs bssid-debug Bssid Debug Logs errorlog Logging for System errors or critical information essid-debug Essid Debug Logs network Network logs security Security logs system System logs user User logs user-debug User Debug Logs wireless Wireless logs # show logging level verbose The logging levels follow syslog convention: Emergency - A panic condition in which the system becomes unusable. Alert - A condition that should be corrected immediately. Critical - Critical conditions, e.g., hard device errors. Errors Error conditions. Warning Warning messages Notice Normal but significant conditions Informational - Informational messages. Debug - Messages that contain information normally of use only when debugging a particular module. The default level is informational 2007 Aruba Networks 2
3 Packet Captures Port mirroring E.g., All traffic sent to/from interface 1/0 to be copied to interface 1/22 (Aruba2400) (config) #interface fastethernet 1/22 (Aruba2400) (config-if)#port monitor fastethernet 1/0 Session mirroring In the GUI when creating a session check the Mirror box (Aruba800) (config-sess-test)#user network svc-dns permit mirror Air capture (AP/AM) Capture AP Radio traffic: Select an AP from Switch > Access Points and click on Packet Capture button, then select either the a or g radio. The controller will set up the capture filters to capture the selected AP Radio traffic and will send to the packet capturing client s Target IP address. Either Ethereal or AiroPeek will need to be running on device set as Target IP listening on the UDP port (UDP 5000 for Aeropeek or UDP 5555 for Ethereal) PCAP (Aruba2400) #packet-capture tcp all (Aruba2400) #packet-capture udp all (Aruba2400) #show packet-capture Current Active Packet Capture Actions(current switch) ===================================================== Packet filtering for all TCP ports enabled. Packet filtering for all UDP ports enabled. Packet filtering for internal messaging opcodes disabled. Packet filtering for all other packets disabled. Packet Capture Defaults(across switches and reboots if saved) ===================================================== Packet filtering for TCP ports disabled. Packet filtering for UDP ports disabled. Packet filtering for internal messaging opcodes disabled. Packet filtering for all other packets disabled. (Aruba2400) # (Aruba2400) #tar logs (Aruba2400) #dir -rw-r--r-- 1 root root Aug 10 02:55 aug10.cfg -rw-r--r-- 1 root root Aug 10 05:45 default.cfg -rw-r--r-- 1 root root Sep 4 05:51 logs.tar (Aruba2400) #copy flash: logs.tar tftp: logszzz.tar Untar to retrieve filter.pcap file 2007 Aruba Networks 3
4 Controller Zone Hardware, software and process health show cpuload show memory show inventory show switchinfo Look for ArubaOS version, boot partition, switch role (master or local) show image version show datapath utilization show processes Please send the file that is generated from tar logs tech-support to Aruba Technical support if you see any process in a state of z or t under the S column. show storage Keep /flash to more the 10MB free space show netstat L2/L3 information show ip interface brief show ip route show interface fastethernet <slot>/<port> show interface fastethernet <slot>/<port> switchport show interface vlan <vlanid> show interface counters show arp show datapath route table show datapath route-cache table show datapath bridge table show datapath bridge counters show datapath frame counters show datapath crypto counters 2007 Aruba Networks 4
5 Local can t communicate with master Basic commands (Aruba200) # show datapath tunnel table Look for inbound and outbound IPSec tunnels (Master) #show crypto isakmp sa (Master) #show log security Look for: IKE Aggressive Mode Phase 1 succeeded for peer <ip address> ike_quick_mode.c:checkipsecselectors_localmaster:3601 ipsec_map peer IP: SA IP:<ip address> map_name default-local-master-ipsecmap Wrong IKE passphrase (Master) (config) #logging level debugging security subcat ike Look for: IKE Phase 1 hash mistmatch. Most likely because IKE pre-shared key or certificate mismatch 2007 Aruba Networks 5
6 VRRP Issues Correct interfaces in same VLAN? Preempt enabled? Active/Standby roles at correct locations? Priority value set? Passwords enabled and/or matching? L2 connectivity exist between participants? Controllers running same code level? AP L3 connectivity to standby device when failover occurs? Basic commands (Aruba200) #show vrrp statistics 1 Look at Admin State, VR State, Advertisements sent and received, authentication failures (Aruba200) #show log network Look for messages from fpapps 2007 Aruba Networks 6
7 AP Zone AP config and bootup AP basic commands (Aruba200) #show ap database AP may be upgrading or rebooting (Aruba200) #show ap debug counters ap-name <ap-name> Check for incrementing bootstrap or reboot counter (Aruba200) # show ap active (Aruba200) # show ap bss-table (Aruba200) # show datapath tunnel table (Aruba200) # show ap config ap-name <ap-name> # show datapath session table <ap-ip> Look for GRE (protocol 47) and PAPI (UDP port 8211) Use Serial over Ethernet (config)# telnet soe telnet <controller-ip> Aruba Networks 7
8 Trying Connected to Escape character is '^]'. User: admin Password: ******* Available commands: connect <slot/port> exit (no args) soe> connect 1/1 AP show tech show ap tech-support ap-name <ap-name> Protocol ports UDP 69 (tftp), UDP 123 (ntp), UDP 514 (syslog), UDP 8211 (papi), TCP 21/22 (ftp), and Protocol 47 (gre) need to be opened between the AP and the Controller (in non STRAP mode) (Aruba200) #show profile-errors VLANs for SSID may not be configured on the LMS GRE heartbeat (default value is 8) ap system-profile <system prof name> bootstrap-threshold <number of missed heartbeats> PAPI heartbeat (default value is 10 retries, 60 second interval, 10 request retries) ap system-profile <system prof name> max-request-retries <maximum number of retries> ap system-profile <system prof name> keepalive-interval <value in seconds> ap system-profile <system prof name> request-retry-interval <value in seconds> Poor RF Coverage Basic commands (Aruba200) #show ap arm rf-summary ip-addr <ap ip address> Interference index column displays the measured interference and is used to determine the best channel. The format for the column is a/b/c/d where: A=That AP s measure of co-channel interference B=That AP s measure of adjacent channel interference C=The neighbor AP s measure of co-channel interference D=The neighbor AP s measure of adjacent channel interference To determine the best channel, add the four values together. The best channel will have the lowest value. By default, an AP will not switch channels unless the better measurement is at least twenty-five (25) less than the current channel assignment. (Aruba200) #show ap active ip-addr <ap ip address> 2007 Aruba Networks 8
9 Check to make sure: Channel Frame Retry Rate % is below 30%. If higher then too much interference. Channel Noise Floor is above 80. If Noise Floor is lower then too much non interference (Aruba200) #show ap monitor ap-list ip-addr <ap ip address> Check for interferencing APs Link quality #rft test profile link-quality ip-addr dest-mac 00:40:96:a4:e7:c1 Transaction ID: 1 # show rft result trans-id 1 Antenna connectivity # show rft profile antenna-connectivity #rft test profile antenna-connectivity ip-addr dest-mac 00:15:00:26:f8:f5 phy a Transaction ID: 1 #show rft result trans-id 1 Raw profile #rft test profile raw ip-addr dest-mac 00:15:00:26:f8:f5 phy a Transaction ID: 1001 #show rft result trans-id Aruba Networks 9
10 Backend Server Zone Radius Check that Radius server is properly configured and that a user account can authenticate show aaa authentication-server all Check if Inservice and Requests count is increasing aaa test-server <radius-server-name> <username> <password> In ArubaOS3.1 or earlier - PAP only. PAP must be enabled on Radius server Most common error is to not enable dial-up for a user in AD aaa test-server pap <radius-server> <username> <password> aaa test-server mschapv2 <radius-server-name> <username> <password> show aaa authentication-server radius <radius-server-name> Initial starting point for user debugging: logging level informational user Gives you info on server selection and role derivation in one place (show log user) show auth-tracebuf mac <user mac> More detailed debugging: (Aruba200) (config) #logging level debugging user-debug <user mac> show log user-debug all include <mac addr> Other logging you can try: (Aruba200) (config) #logging level debugging network (Aruba200) (config) #logging level debugging security subcat dot1x (Aruba200) (config) #logging level debugging security subcat aaa (Aruba200) (config) #logging level debugging security process authmgr subcat all (Aruba200) (config) #logging level debugging user subcat dot1x packet-capture udp <radius port> Do a tar logs, move the logs.tar to server, untar and look for filter.pcap If IAS/AD then check the Event Viewer on the server If SBR check the Statistics page in SBR Administrator and log files (C:\Radius\Service) 2007 Aruba Networks 10
11 DHCP (Aruba200) (config) #logging level debugging network subcat dhcp If Windows server check the Event Viewer on the server and look in DHCP config to confirm that scope exists and check Leases to see if any clients have obtained IP addresses Check that wired switches have ip helper-address properly set If Aruba is DHCP server check that DHCP service is enabled (in GUI need to check the DHCP service box, click apply and then create scopes - cannot do both at the same time) 2007 Aruba Networks 11
12 Wireless Client Zone Client cannot find AP Multiple Users Hidden SSID/Disabled Probe Response AP Offline AP Provisioned as AM SNR/Interference issues Single User Wrong radio band (e.g b/g only NIC in an a network) Driver issue Wireless adapter disabled Failed NIC 2007 Aruba Networks 12
13 Client cannot associate Shared authentication rather than Open/WPA/WPA2 SNR Driver NIC problem Blacklisted DoS Minimum supported/basic rate may be higher than client supports Track down the client 1. Get the MAC address of the wireless device 2. Find what BSSID the station is associated with (use AP troubleshooting if problems here) show wms client <wireless device mac address> 3. Find which Controller the AP is connected with show ap database long include <AP name> 4. Log on to the Controller and search for the user show user mac <wireless device mac address> Negotiation logging level debugging security process authmgr subcat packet-trace logging level debugging user-debug 00:16:cf:af:bb:e2 subcat all show logging level verbose show ap debug mgmt-frames client-mac <mac address> show log user-debug all include <mac address> show log user all include <mac address> Use AP remote packet capture to analyze negotiation 2007 Aruba Networks 13
14 Client cannot authenticate x Enable 802.1x related debugging logging level debugging network process dhcpd subcat dhcp logging level debugging network process dhcpd subcat packet-dump logging level debugging security process authmgr subcat dot1x logging level debugging security process authmgr subcat packet-trace logging level debugging user process authmgr subcat dot1x logging level debugging user process authmgr subcat radius logging level debugging user-debug <client mac> subcat all View debug output show logging level verbose show ap debug mgmt-frames client-mac <mac address show log user-debug all include <mac address> 2007 Aruba Networks 14
15 show log user all include <mac address> show log network all include <mac address> show log security all include authmgrshow auth-tracebuf mac <client mac> show dot1x supplicant-info list-all show dot1x supplicant-info statistics show dot1x counters Validate client certificates - check date, signature and status Make sure client has the correct certificate selected in Validate server certificate Make sure client has correct EAP settings - machine authentication on/off, windows domain logon credentials on/off, 2007 Aruba Networks 15
16 Client cannot authenticate - Captive Portal Most common errors: Forgetting to assign a captive portal role to the initial (logon) role DNS cannot be resolved so redirection doesn t work (try or some IP address to check if this is the cause) Client has proxy settings which are preventing access to the captive portal 2007 Aruba Networks 16
17 Client cannot obtain IP address See DHCP debugging section in Backend Server Zone Check VLAN assignment for the SSID - is there a DHCP scope? General notes on client connectivity Network Card Driver controls association, roaming, and encryption/decryption WZC controls to which network the supplicant will connect 802.1x controls authentication and key exchanges/updates Always upgrade to the latest driver (after its tested on a lab laptop first) Always upgrade to the latest supplicant (after its tested on a lab laptop first) Keep the default driver configuration settings. Common issues: Inability to connect to the SSID Incorrect wireless config on the client s supplicant Incorrect config of authentication types/unsupported EAP types Authentication delays Missing CA certificates New Controller is not added to the approved RADIUS client list Check Controller CLI show ap debug mgmt-frames client-mac <client mac> Intermittent connectivity Check if machine auth is enabled/disabled on both client and Controller Check Controller CLI show ap debug mgmt-frames client-mac <client mac> if client debug enabled with logging level debugging user-debug <client mac address> show log user all and show log user-debug all 2007 Aruba Networks 17
18 Security Policy Issues What role was assigned to the user? How was the role derived? #show user ip <ip address> Will list role and how it was derived. It will also list the authentication protocol, authentication server #show rights <role> Check the session ACLs in the role that was assigned to the user. It will also indicate the ACL number #show datapath acl <acl number> More details on the ACL in the user role 2007 Aruba Networks 18
19 Network Access Issues show datapath session table <client ip> The most commonly used command - look for D flags which means the firewall policy is blocking access Session mirroring Use session mirror to debug application level issues - after L2 encryption is removed (cannot do this with wireless sniffing). You may want to avoid turning on mirroring for all users in a role. In that case create a new session ACL and a new role for the specific user or otherwise limit the traffic. (config) #ip access-list session mirror_acl (config-sess-mirror_acl) #any any any permit mirror (config-sess-mirror) #exit (config) #firewall session-mirror-destination ip-address <target ip> 2007 Aruba Networks 19
20 ArubaOS Role and VLAN Derivation Flow Chart Role Derivation START Collect Aruba DSA s PHY Collect Aruba DSA s (Device Specific Attribute) User MAC (Example: 00:34:d4:ca:58:0f) Port ID (Example: FastEthernet 1/8) Tunnel ID (Example: Tunnel-109) No VLAN derivation past this point BSSID (Example: 00:0b:86:12:fd:37) ESSID (Example: guest, contractor, staff) Location (Example: , , ) User MAC (Example: 00:34:d4:ca:58:0f) Encryption (Example: WEP, TKIP, AES, etc.) Trust is always Un-Trusted Is User in Database? Role and VLAN already derived in first pass (usually logon role and default vlan), this is the second pass for VPN or CP authentication. VPN Login? CP Login? User Derivation? Authentication dot1x Auth MAC Auth USER Derivation contains ends with equals does not equal starts with value of User Derivation will be overridden by later processes Server Derivation AUTHENTICATION SOURCES Radius LDAP XML TACACS+ Internal AUTHENTICATION SOURCES Aruba VSA s Authenticated Aruba DSA s BSSID ESSID Location User MAC Encryption-Type DHCP-opt-77 Authentication SERVER Derivation contains ends with equals does not equal starts with value of Radius Returned VSA s Aruba DSA s ESSID Location* User MAC* Aruba-User-Role Aruba-User-Vlan Aruba-Priv-Admin-User Aruba-Admin-Role Aruba-Essid-Name Aruba-Location-Id Aruba-Port-Identifier Role/VLAN Auto Applied User Derived Role/VLAN Logon Role/Default VLAN Default Role/VLAN Radius VSA Derived Role/VLAN Aruba DSA Derived Role/VAN Aruba VSA Derived Role/VLAN EXIT TO DATA PATH ESI ESI Derived Role/VAN Steve Carr - role-plus-vlan-derivation-ver4e.jpg *=available in ArubaOS Aruba Networks 20
Useful CLI Commands. Contents. Enable Logging
Useful CLI Commands Contents Enable Logging... 1 Interface... 3 AP... 4 ARM... 9 User... 11 Client Troubleshooting Typical... 16 Radio Tests (rft)... 16 Windows Client data... 18 Enable Logging (Aruba3200)
Packet Capturing Options with Aruba Wireless Networks
Packet Capturing Options with Aruba Wireless Networks [email protected] 18/09/2006 A number of different options for packet capture are available with Aruba s Wireless Infrastructure. Typically Packet
Read all the information in this chapter before upgrading your controllers.
Chapter 4 Upgrade Procedures This chapter details software and hardware upgrade procedures. Aruba best practices recommend that you schedule a maintenance window when upgrading your controllers.! CAUTION
Ruckus Wireless ZoneDirector Command Line Interface
Ruckus Wireless ZoneDirector Command Line Interface Reference Guide Part Number 800-70258-001 Published September 2010 www.ruckuswireless.com Contents About This Guide Document Conventions................................................
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
Case Study - Configuration between NXC2500 and LDAP Server
Case Study - Configuration between NXC2500 and LDAP Server 1 1. Scenario:... 3 2. Topology:... 4 3. Step-by-step Configurations:...4 a. Configure NXC2500:...4 b. Configure LDAP setting on NXC2500:...10
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 This example explains how to configure pre-shared key based simple IPSec tunnel between NetScreen Remote Client and RN300 VPN Gateway.
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
Web Authentication Proxy on a Wireless LAN Controller Configuration Example
Web Authentication Proxy on a Wireless LAN Controller Configuration Example Document ID: 113151 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Proxy on
WiNG 5.X How-To Guide
WiNG 5.X How-To Guide Captive Portals Part No. TME-12-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION:
Management Authentication using Windows IAS as a Radius Server
Management Authentication using Windows IAS as a Radius Server OVERVIEW: In this we are using Radius server Windows IAS as a backend server for the management authentication for the controller. When the
Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller
Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller August 2006 Contents Overview section on page 1 Configuring Guest Access on the Cisco Wireless LAN Controller section on page
TABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
ArubaOS v2.4. User Guide
ArubaOS v2.4 User Guide TM ArubsOS v2.4: User Guide Copyright Copyright 2005 Aruba Wireless Networks, Inc. All rights reserved. Specifications in this manual are subject to change without notice. Originated
Innominate mguard Version 6
Innominate mguard Version 6 Configuration Examples mguard smart mguard PCI mguard blade mguard industrial RS EAGLE mguard mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489
WiNG 5.x How-To Guide
WiNG 5.x How-To Guide Remote Debugging Part No. TME-02-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings,
WiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
Unified Access Point Administrator's Guide
Unified Access Point Administrator's Guide Product Model: DWL-3600AP DWL-6600AP DWL-8600AP Unified Wired & Wireless Access System Release 2.0 November 2011 Copyright 2011. All rights reserved. November
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
LifeSize Video Communications Systems Administrator Guide
LifeSize Video Communications Systems Administrator Guide November 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made
Using Templates. Information About Templates. Accessing the Controller Template Launch Pad CHAPTER
CHAPTER 11 This chapter describes how to add and apply templates. Templates allow you to set fields that you can then apply to multiple devices without having to reenter the common information. This chapter
Welch Allyn Acuity Network installation. Best practices
Welch Allyn Acuity Network installation Best practices ii Welch Allyn Network installation 2014 Welch Allyn. All rights are reserved. To support the intended use of the product described in this publication,
DV230 Web Based Configuration Troubleshooting Guide
DV230 Web Based Configuration Troubleshooting Guide 1. Login settings After getting a DHCP IP address from your P1 W1MAX Modem DV-230), open any Internet browser and type in the URL address: http://10.1.1.254
AP6511 First Time Configuration Procedure
AP6511 First Time Configuration Procedure Recommended Minimum Configuration Steps From the factory, all of the 6511 AP s should be configured with a shadow IP that starts with 169.254.xxx.xxx with the
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
Nokia Siemens Networks. CPEi-lte 7212. User Manual
Nokia Siemens Networks CPEi-lte 7212 User Manual Contents Chapter 1: CPEi-lte 7212 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the CPEi-lte 7212... 1-2 Back of the CPEi-lte
LOHU 4951L Outdoor Wireless Access Point / Bridge
LOHU 4951L Outdoor Wireless Access Point / Bridge Version 2.3 ------------------------------------------------------------------------------------------------------- -1- Software setup and configuration
Design and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note
ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE Technical Note Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba the
On-boarding and Provisioning with Cisco Identity Services Engine
On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID
Troubleshooting Wireless Clients Version 1.1
Troubleshooting Wireless Clients Version 1.1 Basic Connectivity Troubleshooting information in this section covers problems with basic wireless connectivity, such as inability to associate or inability
Monitoring Remote Access VPN Services
CHAPTER 5 A remote access service (RAS) VPN secures connections for remote users, such as mobile users or telecommuters. RAS VPN monitoring provides all of the most important indicators of cluster, concentrator,
OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R
OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:
Lab 6.2.12a Configure Remote Access Using Cisco Easy VPN
Lab 6.2.12a Configure Remote Access Using Cisco Easy VPN Objective Scenario Topology In this lab, the students will complete the following tasks: Enable policy lookup via authentication, authorization,
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example
Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2
Wireless Local Area Networks (WLANs)
4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................
NETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
VPN SECURITY POLICIES
TECHNICAL SUPPORT NOTE Introduction to the VPN Menu in the Web GUI Featuring ADTRAN OS and the Web GUI Introduction This Technical Support Note shows the different options available in the VPN menu of
Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4
1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may
Table of Contents. Cisco Cisco VPN Client FAQ
Table of Contents Cisco VPN Client FAQ...1 Questions...1 Introduction...2 Q. Why does the VPN Client disconnect after 30 minutes? Can I extend this time period?...2 Q. I upgraded to Mac OS X 10.3 (known
Configuring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
Switch Configuration Required to Support Cisco ISE Functions
APPENDIXC Switch Configuration Required to Support Cisco ISE Functions To ensure Cisco ISE is able to interoperate with network switches and functions from Cisco ISE are successful across the network segment,
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
Configuring Security Solutions
CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from
Managing Software and Configurations
55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page
Encrypted Preshared Key
The feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Release Modification 12.3(2)T This feature was introduced. Finding Support Information
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of
WiNG 5.X How To. Policy Based Routing Cache Redirection. Part No. TME-05-2012-01 Rev. A
WiNG 5.X How To Policy Based Routing Cache Redirection Part No. TME-05-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark
LevelOne WAP - 0005. User s Manual. 108 Mbps Wireless Access Point
LevelOne WAP - 0005 108 Mbps Wireless Access Point User s Manual TABLE OF CONTENTS CHAPTER 1 INTRODUCTION... 1 Features of your Wireless Access Point... 1 Package Contents... 3 Physical Details... 3 CHAPTER
BorderWare Firewall Server 7.1. Release Notes
BorderWare Firewall Server 7.1 Release Notes BorderWare Technologies is pleased to announce the release of version 7.1 of the BorderWare Firewall Server. This release includes following new features and
Mobility System Software Quick Start Guide
Mobility System Software Quick Start Guide Version 8.0 P/N 530-041387 Rev.05 Table of Contents About this Guide Using the Web Quick Start (WLC2, WLC8, WLC200,WLC800R, and WLC880R) Remotely Configuring
RAP Installation - Updated
RAP Installation - Updated August 01, 2012 Aruba Controller Release 6.1.3.2 The Controller has several wizards that can guide you through a variety of configuration processes. On the Configuration tab
Using PIX Firewall in SOHO Networks
CHAPTER 4 This chapter describes features provided by the PIX Firewall that are used in the small office, home office (SOHO) environment. It includes the following sections: Using PIX Firewall as an Easy
How To Manage My Smb Ap On Cwm On Pc Or Mac Or Ipad (Windows) On A Pc Or Ipa (Windows 2) On Pc (Windows 3) On An Ipa Or Mac (Windows 5) On Your Pc
Central Wifi Manager FAQs 1 The installation tool can t find my SMB AP Check the firmware and hardware version of your SMB AP o DAP-2310 H/W B1 F/W v2.01rc013 or above o DAP-2360 H/W B1 F/W v2.01rc012
Chapter 4 Managing Your Network
Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration
Encrypted Preshared Key
Encrypted Preshared Key The Encrypted Preshared Key feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Encrypted Preshared Key Release
Chapter 9 Monitoring System Performance
Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important
Monitoring and Analyzing Switch Operation
B Monitoring and Analyzing Switch Operation Contents Overview..................................................... B-3....................................... B-4 Menu Access To Status and Counters.........................
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
GregSowell.com. Mikrotik Basics
Mikrotik Basics Terms Used Layer X When I refer to something being at layer X I m referring to the OSI model. VLAN 802.1Q Layer 2 marking on traffic used to segment sets of traffic. VLAN tags are applied
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Chapter 5 Virtual Private Networking Using IPsec
Chapter 5 Virtual Private Networking Using IPsec This chapter describes how to use the IPsec virtual private networking (VPN) features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to provide
Troubleshooting the Firewall Services Module
CHAPTER 25 This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
CT5760 Controller and Catalyst 3850 Switch Configuration Example
CT5760 Controller and Catalyst 3850 Switch Configuration Example Document ID: 116342 Contributed by Antoine KMEID and Serge Yasmine, Cisco TAC Engineers. Aug 13, 2013 Contents Introduction Prerequisites
Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected]. 2006 Cisco Systems, Inc. All rights reserved.
Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected] 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and
Lab14.8.1 Configure a PIX Firewall VPN
Lab14.8.1 Configure a PIX Firewall VPN Complete the following lab exercise to practice what you learned in this chapter. Objectives In this lab exercise you will complete the following tasks: Visual Objective
Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items
D-Link Central WiFiManager Configuration Guide
Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install
IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers
IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers Application Note Revision 1.0 10 February 2011 Copyright 2011. Aruba Networks, Inc. All rights reserved. IPsec VPN Security
MN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
Aruba Aruba Certification ACMP-6.4 test questions and answers :http://www.it-tests.com/ACMP-6.4.html
IT-TESTs.com IT Certification Guaranteed, The Easy Way! \ http://www.it-tests.com We offer free update service for one year Exam : ACMP-6.4 Title : Aruba Certified Mobility Professional 6.4 Vendor : Aruba
Alarms and Events CHAPTER
CHAPTER 14 This chapter describes the type of events and alarms reported, how to view alarms and events by product or entity and severity, and how to view IDS signature attacks. It contains these sections:
How to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
Troubleshooting the Firewall Services Module
25 CHAPTER This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
SonicWALL strongly recommends you follow these steps before installing Global VPN Client (GVC) 4.0.0:
GVC SonicWALL Global VPN Client 4.0.0 Contents Pre-installation Recommendations Platform Compatibility New Features Known Issues Resolved Known Issues Troubleshooting Pre-installation Recommendations SonicWALL
Features Description Benefit AP-7131N support Adaptive AP Support for the AP7131N-GR and AP7131N- GRN
Release Notes for RFS7000 v4.1.0.0-040gr Contents 1. Introduction to New Features 2. Features Added for FIPS Compliance 3. Features Disabled or Modified for FIPS Compliance 4. Firmware Versions & Compatibility
Application Note. Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.
Application Note Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.0 Page 1 Controlling Access to Large Numbers of Networks Devices to
Contents. Pre-Installation Recommendations. Platform Compatibility. G lobal VPN Client SonicWALL Global VPN Client 4.2.6 for 64-Bit Clients
G lobal VPN Client SonicWALL Global VPN Client 4.2.6 for 64-Bit Clients Contents Pre-Installation Recommendations... 1 Platform Compatibility... 1 New Features... 2 Troubleshooting... 3 Pre-Installation
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
your Gateway Windows network installationguide 802.11b wireless series Router model WBR-100 Configuring Installing
your Gateway Windows network installationguide 802.11b wireless series Router model WBR-100 Installing Configuring Contents 1 Introduction...................................................... 1 Features...........................................................
Minimum Information Needed To Open an IP Networking / IP Security Service Request
In order to provide timely feedback to Business Partners, the Alcatel-Lucent Enterprise Market Group Technical Support team requests that upon opening any IP Networking/IP Security case, the following
Application Note User Groups
Application Note User Groups Application Note User Groups Table of Contents Background... 3 Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 6 Configuration...
How To Industrial Networking
How To Industrial Networking Prepared by: Matt Crites Product: Date: April 2014 Any RAM or SN 6xxx series router Legacy firmware 3.14/4.14 or lower Subject: This document provides a step by step procedure
EAP350 EAP350. Long Range Ceiling Mount Access Point PRODUCT OVERVIEW
Long Range Ceiling Mount Access Point 2.4 GHz 300Mbps 11b/g/n 29dBm AP/WDS/Repeater PRODUCT OVERVIEW is a 300Mbps wireless-n ceiling mount AP which offers users extended coverage, strong penetration, secure
Network Detector Setup and Configuration
339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net MODE SYST RPS MASTR STAT SPEDUPLX STACK 1 2 3 4 5 6 7 8 91 0 11 12 1X 2X 11X 12X 13 14 15 16 1718 19 20 2122 23 24 13X
Unified Access Point Administrator s Guide
Page 1 Table of Contents Section 1 - About This Document...9 Document Organization... 9 Additional Documentation... 9 Document Conventions... 9 Online Help, Supported Browsers, and Limitations... 10 Section
Wireless LAN Access Point. IEEE 802.11g 54Mbps. User s Manual
Wireless LAN Access Point IEEE 802.11g 54Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents...2 1.2 Features...2 1.3 Specifications...2 1.4 Physical Description...3 Chapter
Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led
Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led Course Description This 3-day instructor-led, hands-on course provides learners with skills and resources required to successfully
Network Security 2. Module 6 Configure Remote Access VPN
1 1 Network Security 2 Module 6 Configure Remote Access VPN 2 Learning Objectives 6.1 Introduction to Cisco Easy VPN 6.2 Configure the Easy VPN Server 6.3 Configure Easy VPN Remote for the Cisco VPN Client
PIX/ASA 7.x with Syslog Configuration Example
PIX/ASA 7.x with Syslog Configuration Example Document ID: 63884 Introduction Prerequisites Requirements Components Used Conventions Basic Syslog Configure Basic Syslog using ASDM Send Syslog Messages
Basic System. Vyatta System. REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging VYATTA, INC.
VYATTA, INC. Vyatta System Basic System REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com
Configure WorkGroup Bridge on the WAP131 Access Point
Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless
Configuring Redundancy
7 CHAPTER This chapter describes how to configure redundancy and contains these sections: Configuring Fault Tolerance, page 7-1 Configuring HSRP, page 7-5 Configuring Interface and Device Tracking, page
