interoperability report vowifi & wlan infrastructure … · interoperability report . vowifi & wlan...

16
Interoperability Report - Ascom i62, Aruba (Alcatel-Lucent OmniAccess OAW-4504), AP 60/61 & 65/70 1 2011-04-27 INTEROPERABILITY REPORT VoWiFi & WLAN Infrastructure (IEEE 802.11) Ascom i62 Aruba 3000 (Alcatel-Lucent OmniAccess OAW-4504) AP60/61/65/70 Version 3.4.2.5 Ascom, Gothenburg April 2010 [ ]

Upload: buitruc

Post on 29-Jun-2018

240 views

Category:

Documents


0 download

TRANSCRIPT

  • Interoperability Report - Ascom i62, Aruba (Alcatel-Lucent OmniAccess OAW-4504), AP 60/61 & 65/70 1 2011-04-27

    INTEROPERABILITY REPORT VoWiFi & WLAN Infrastructure (IEEE 802.11) Ascom i62 Aruba 3000 (Alcatel-Lucent OmniAccess OAW-4504) AP60/61/65/70 Version 3.4.2.5 Ascom, Gothenburg

    April 2010

    [ ]

  • Interoperability Report - Ascom i62, Aruba (Alcatel-Lucent OmniAccess OAW-4504), AP 60/61 & 65/70 2 2011-04-27

    TABLE OF CONTENT: SITE INFORMATION ................................................................................................................. 3 SUMMARY ................................................................................................................................. 4 TEST RESULTS......................................................................................................................... 5

    Ascom WLAN Infrastructure Verification VoWiFi .................................................................. 5 APPENDIX A: TEST CONFIGURATIONS .................................................................................. 7

    Alcatel-Lucent OmniAccess OAW-4504 .................................................................................. 7 Security settings .................................................................................................................. 7 General settings (QoS, Radio )............................................................................................ 9

    Ascom i62 ............................................................................................................................. 12 Innovaphone IP6000 (IP PBX & DHCP server) ..................................................................... 14

    APPENDIX B: DETAILED TEST RECORDS ............................................................................ 15

  • Interoperability Report - Ascom i62, Aruba (Alcatel-Lucent OmniAccess OAW-4504), AP 60/61 & 65/70 3 2011-04-27

    SITE INFORMATION

    Test Site: Ascom Grimbodalen 2 P.O Box 87836 40276 Gothenburg Sweden Participants: Test performed by R&D, Gothenburg Karl-Magnus Olsson, Ascom HQ, Gothenburg TEST TOPOLOGY

    Alcatel-Lucent OmniAccess 4504 equals an Aruba 3000 series WLAN controller.

  • Interoperability Report - Ascom i62, Aruba (Alcatel-Lucent OmniAccess OAW-4504), AP 60/61 & 65/70 4 2011-04-27

    SUMMARY Please refer to Appendix B for detailed results. WLAN Controller Features

    High Level Functionality Result Association, Open with No Encryption OK Association, Open with Static WEP64/128 OK Association, WPA-PSK, TKIP OK Association, WPA2-PSK, TKIP / AES Encryption OK Association, LEAP Authentication Not supported Association, PEAP-MSCHAPv2 Auth., TKIP Encryption OK Association, PEAP-MSCHAPv2 Auth., AES Encryption OK Association, EAP-MD5 Authentication OK Association, Multiple ESSIDs OK Beacon Interval and DTIM Period OK Preauthentication Not supported by controller PMKSA Caching OK WPA2-opportunistic/proactive Key Caching OK WMM Prioritization OK Active Mode (load test) Not tested * 802.11 Power-save mode OK 802.11e U-APSD OK 802.11e U-APSD (load test) Not tested * * ) Maximum number of calls not tested. Roaming

    High Level Functionality Result Roaming, Open with No Encryption OK (Avg roaming time 19ms) Roaming, Open with Static WEP64 OK (24-28ms) Roaming, WPA-PSK, TKIP Encryption OK (Avg roaming time 50ms) Roaming, WPA2-PSK, AES Encryption OK (Avg roaming time 50ms) Roaming, LEAP, WEP/TKIP Encryption (CCKM) Not supported by controller Roaming, PEAP-MSCHAPv2 Auth, AES Encryption OK (Avg roaming time 32ms)* * * * ) Result with opportunistic key caching enabled. Without opportunistic key caching the result is in average 159ms

  • Interoperability Report - Ascom i62, Aruba (Alcatel-Lucent OmniAccess OAW-4504), AP 60/61 & 65/70 5 2011-04-27

    TEST RESULTS

    Ascom WLAN Infrastructure Verification VoWiFi Software Versions:

    Alcatel-Lucent OmniAccess OAW-4504 AP60/61 & AP65/70 Ascom i62, v 2.1.17

    Signaling Protocol: SIP, Innovaphone IP6000 used as SIP server. Version 7 hotfix 15

    Configuration of WLAN System:

    Beacon Interval: 100ms DTIM Period: 5 802.11b/g 802.11a WMM/ U-APSD Enabled 802.11d Regulatory Domain: World mode

    Ascom i62 Configuration:

    World Mode Regulatory Domain set to World mode. IP DSCP for Voice: 0xC0 (46) Expedited Forwarding IP DSCP for Signaling: 0x68 (26) Assured Forwarding 31 Transmit Gratuitous ARP: Enable

    Keep in mind that security options and power save modes were adjusted according to requirements in individual test cases. Please refer to appendix A for information regarding device configuration.

  • Interoperability Report - Ascom i62, Aruba (Alcatel-Lucent OmniAccess OAW-4504), AP 60/61 & 65/70 6 2011-04-27

    Test Areas Association and Authentication: 100% pass (13/13)

    Only security settings available through the web GUI were tested. LEAP authentication not yet supported by i62. FreeRadius was used in the test cases where an authentication server was needed.

    Power Save: 100 % pass (3/3)

    Power save and U-APSD passed both when using 802.11a and 802.11b/g

    QOS: 100% pass (1/1)

    WMM has to be enabled on controller.

    Maximum Number of Calls: 0% pass (0/0) Not tested

    Not tested

    Roaming and Handover Times: 100% pass (7/7)

    LEAP authentication not supported by controller EAP-MD5 not supported by controller.

    Battery Lifetime: 100% Pass (3/3)

    > 100 hrs battery lifetime in idle mode (DTIM period = 5) * ~ 5 hrs battery lifetime with ongoing call in active mode * ~ 18 hrs battery lifetime with ongoing call in U-APSD mode * * ) Note that figures are Up to values which have been measured in a lab environment. There are a number of different variables that affects both standby time and talk time.

    Stability: 100% Pass (2/2)

    Stable call for the duration of >24 hours in both active and U-APSD mode.

    Please keep in mind that metrics do NOT account for untested cases.

  • Interoperability Report - Ascom i62, Aruba (Alcatel-Lucent OmniAccess OAW-4504), AP 60/61 & 65/70 7 2011-04-27

    APPENDIX A: TEST CONFIGURATIONS

    Alcatel-Lucent OmniAccess OAW-4504

    In the following chapter you will find screenshots and explanations of basic settings in order to get an OAW-4504 system to operate with an Ascom i62. Please note that security settings were modified according to requirements in individual test cases. The configuration file is found at the bottom of this chapter.

    Security settings

    Security profile WPA2-PSK, AES encryption

    Configurations of authentication and Radius sever for 802.1X authentication (Step 1). In this example is WPA2-AES used.

  • Interoperability Report - Ascom i62, Aruba (Alcatel-Lucent OmniAccess OAW-4504), AP 60/61 & 65/70 8 2011-04-27

    Configurations of authentication using Radius sever (Step 2). Select the AAA server to use. The server is configured under tab Security/Authentication. See configuration of server below.

    Configurations of authentication using Radius sever (Step 3). The IP address and the secret must correspond to the IP and the credential used by the Radius server. Tests were performed with FreeRadius.

  • Interoperability Report - Ascom i62, Aruba (Alcatel-Lucent OmniAccess OAW-4504), AP 60/61 & 65/70 9 2011-04-27

    General settings (QoS, Radio )

    Basic SSID settings (Default values).

    Set DTIM Interval to 5. This value is recommended in order to allow maximum battery conservation without impacting the quality. Ascom recommends disabling the lowest rates and have 6mbits as lowest supported rate. To further optimize performance it is recommended to disallow 802.11b clients to associate by setting the 6 Mbps or 12Mbps rate to mandatory in the 802.11g configuration.

  • Interoperability Report - Ascom i62, Aruba (Alcatel-Lucent OmniAccess OAW-4504), AP 60/61 & 65/70 10 2011-04-27

    When configuring the 802.11a Transmit rates the default values is good. Make sure WMM is enabled. If using U-APSD make sure to enable it here. In order to get fast and accurate probe responses it is important to enable the Local Probe Response parameter. It is also recommended to set Max Transmit Attempts to 4.

    Set Maximum Transmit Failures to 25.

    Ascom recommends a Beacon Interval of 100ms. It is also recommended to advertise 802.11d/h capabilities.

  • Interoperability Report - Ascom i62, Aruba (Alcatel-Lucent OmniAccess OAW-4504), AP 60/61 & 65/70 11 2011-04-27

    Ascom do not support Dynamic Channel Assignment. Configuration: See attached file (alcatel.cfg) for OAW configuration.

  • Interoperability Report - Ascom i62, Aruba (Alcatel-Lucent OmniAccess OAW-4504), AP 60/61 & 65/70 12 2011-04-27

    Ascom i62

    Recommended i62 setting.

  • Interoperability Report - Ascom i62, Aruba (Alcatel-Lucent OmniAccess OAW-4504), AP 60/61 & 65/70 13 2011-04-27

    System => - DHCP mode: Enable - ESSID: Cisco Interoperability - Authentication: * - Encryption: * - Voice Power Save Mode: * - 802.11 b/g/n Channels: 1,6,11 - IP DSCP for VOICE: 0x2E (46) Expedited forwarding - IP DSCP for SIGNALING: 0x68 (26) - Assured Forwarding 31 - Transmit Gratuitous ARP: Enable VoIP => General - VoIP Protocol: SIP - Endpoint Number - Endpoint ID < Extension no > VoIP => SIP - SIP Proxy IP address: *) Security options and voice power save mode will change depending on individual test case. Other settings were left at their defaults. i62 configuration: See attached file (i62 templates.tpl) for i62 configuration.

  • Interoperability Report - Ascom i62, Aruba (Alcatel-Lucent OmniAccess OAW-4504), AP 60/61 & 65/70 14 2011-04-27

    Innovaphone IP6000 (IP PBX & DHCP server) The Innovaphone IP6000 was configured with a static IP address of 192.168.10.1. Signaling is less relevant here since testing homes in on interoperability in relation to the WLAN infrastructure and not features of the IP PBX. During the tests the IP6000 also was used as DHCP server. IP6000 configuration: See attached file (complete-IP6000-08-03-a6.txt) for IP6000 configuration.

  • Interoperability Report - Ascom i62, Aruba (Alcatel-Lucent OmniAccess OAW-4504), AP 60/61 & 65/70 15 2011-04-27

    APPENDIX B: DETAILED TEST RECORDS VoWIFI Pass 30 Fail 0 Comments 7 Untested 8 Total 45 See attached file (WLANinteroperabilityTestReport_Aruba.xls) for detailed test result. MISCELLANEOUS Please refer to the test specification for WLAN systems on Ascoms interoperability web page for explicit information regarding each test case. See URL (requires login): https://www.ascom-ws.com/AscomPartnerWeb/en/startpage/Sales-tools/Interoperability

    https://www.ascom-ws.com/AscomPartnerWeb/en/startpage/Sales-tools/Interoperability

  • Interoperability Report - Ascom i62, Aruba (Alcatel-Lucent OmniAccess OAW-4504), AP 60/61 & 65/70 16 2011-04-27

    Document History Rev Date Author Description PA 2010-09-13 SEKMO Draft R1 2010-09-13 SEKMO Rev A R2 2011-04-14 SEKMO Added support for AP60/61 and updated to v 3.4.2.5

    SITE INFORMATIONTEST RESULTSAscom WLAN Infrastructure Verification VoWiFi

    APPENDIX A: TEST CONFIGURATIONSAlcatel-Lucent OmniAccess OAW-4504Security settingsGeneral settings (QoS, Radio )

    Ascom i62

    APPENDIX B: DETAILED TEST RECORDS

    WLAN TR

    WLAN Interoperability Test ReportWLAN configuration:

    Beacon Interval: 100ms

    Test object - Handset:DTIM Interval: 5

    Ascom i62802.11d Regulatory Domain: world

    Test object - WLAN system:WMM Enabled (Auto/WMM)

    Alcatel-Lucent OmniAccess OAW-4504, AP 65/70No Auto-tune

    Version 3.4.2.0Single Voice VLAN

    Test CaseDescriptionVerdictComment

    TEST AREA ASSOCIATION / AUTHENTICATION

    #101Association with open authentication, no encryptionPASS

    #102Association with open authentication, WEP 64-bits encryptionPASS

    #103Association with open authentication, WEP 128-bits encryptionPASS

    #104Association with WPA-PSK authentication, TKIP encryptionPASS

    #105Association with WPA-PSK authentication, AES-CCMP encryptionPASSOnly tested on 5Ghz

    #106Association with WPA2-PSK authentication, TKIP encryptionPASS

    #107Association with WPA2-PSK authentication, AES-CCMP encryptionPASSOnly tested on 5Ghz

    #108Association with LEAP authenticationSee CommentNot supported by system

    #109Association with PEAP-MSCHAPv2 auth, TKIP encryptionPASSPASS

    #110Association with PEAP-MSCHAPv2 auth, AES-CCMP encryptionPASSFAIL

    #111Association with EAP-MD5 authenticationPASSNOT TESTED

    #112PreauthenticationSee CommentNot supported by systemSee Comment

    #113PMKSA cachingPASSOnly tested on 5Ghz

    #114Re-Association with WPA2-opportunistic/proactive key cachingPASSOnly tested on 5Ghz

    #115Association with multiple ESSIDs on APPASSOnly tested on 5Ghz

    TEST AREA POWER-SAVE

    #150802.11 Power-save modePASS

    #151Beacon period and DTIM intervalPASS

    #152802.11e U-APSDPASS

    TEST AREA QOS

    #201WMM 802.1D/DSCP classificationSee CommentNot tested due to limitations in testbed

    #202WMM prioritizationPASS

    TEST AREA MAXIMUM NUMBER OF CALLS

    #301Active mode - unencryptedNOT TESTED

    #302Active mode encrypted with WEPNOT TESTED

    #303Active mode encrypted with WPA-PSKNOT TESTED

    #304Active mode encrypted with WEP and limited rates to 802.11b onlyNOT TESTED

    #305Active mode encrypted with WEP and limited Tx rate to 12 Mbit/sNOT TESTED

    #306Power-save mode PS_POLL encrypted with WEPNOT TESTED

    #307Power-save mode U-APSD encrypted with WEPNOT TESTED

    #308Power-save mode U-APSD encrypted with WPA/TKIPNOT TESTED

    TEST AREA ROAMING AND HANDOVER TIMES

    #401Handover with open authentication and no encryptionPASSAvg roaming time 19ms

    #402Handover with open authentication and WEP encryptionPASSSpread 24ms - 28ms

    #403Handover with WPA-PSK authentication and TKIP encryptionPASSAvg roaming time 50ms

    #404Handover with WPA2-PSK auth and AES-CCMP encryptionPASSAvg roaming time 50ms

    #405Handover with LEAP authentication and WEP encryptionSee CommentNot supported by system

    #406Handover with LEAP authentication and TKIP encryptionSee CommentNot supported by system

    #407Handover with LEAP authentication using CCKMSee CommentNot supported by system

    #408Handover with PEAP-MSCHAPv2 authentication and AES-CCMP encryptionPASSAvg roaming time 159ms

    #409Handover with EAP-MD5 authenticationSee CommentNot supported by system

    #410Handover using PMKSA cachingPASSAvg roaming time 32ms

    #411Handover using PMKSA and opportunistic/proactive key cachingPASSAvg roaming time 31ms

    TEST AREA BATTERY LIFETIME

    #501Battery lifetime in idlePASS

    #502Battery lifetime in call with no power savePASS

    #503Battery lifetime in call with power save mode PS_POLLNOT TESTEDN/A for i62

    #504Battery lifetime in call with power save mode U-APSDPASS

    TEST AREA STABILITY

    #601Duration of call Active modePASS

    #602Duration of call U-APSD modePASS

    version 3.4enable secret "8643fb8d019f5a3d3663bc18aab5ab08749a2406616f7bf6f5"hostname "R&D-OAW-4504"clock timezone GMT 1location "Building1.floor1" mms config 0controller config 607

    crypto-local pki TrustedCA Daniel_CA cacert.pemcrypto-local pki TrustedCA god.ascom.se bundle.p12netservice svc-snmp-trap udp 162netservice svc-https tcp 443netservice svc-dhcp udp 67 68 alg dhcpnetservice svc-syslog udp 514netservice svc-l2tp udp 1701netservice svc-ike udp 500netservice svc-smb-tcp tcp 445netservice svc-pptp tcp 1723netservice svc-sccp tcp 2000 alg sccpnetservice svc-telnet tcp 23netservice svc-sip-tcp tcp 5060netservice svc-tftp udp 69 alg tftpnetservice svc-kerberos udp 88netservice svc-http-proxy3 tcp 8888netservice svc-noe udp 32512 alg noenetservice svc-cfgm-tcp tcp 8211netservice svc-adp udp 8200netservice svc-pop3 tcp 110netservice svc-dns udp 53 alg dnsnetservice svc-rtsp tcp 554 alg rtspnetservice svc-msrpc-tcp tcp 135 139netservice svc-http tcp 80netservice svc-h323-udp udp 1718 1719netservice svc-h323-tcp tcp 1720netservice svc-vocera udp 5002 alg voceranetservice svc-http-proxy2 tcp 8080netservice svc-sip-udp udp 5060netservice svc-nterm tcp 1026 1028netservice svc-noe-oxo udp 5000 alg noenetservice svc-papi udp 8211netservice svc-natt udp 4500netservice svc-ftp tcp 21 alg ftpnetservice svc-svp 119 alg svpnetservice svc-smtp tcp 25netservice svc-gre 47netservice svc-sips tcp 5061 alg sipsnetservice svc-smb-udp udp 445netservice svc-esp 50netservice svc-v6-dhcp udp 546 547netservice svc-snmp udp 161netservice svc-bootp udp 67 69netservice svc-msrpc-udp udp 135 139netservice svc-ntp udp 123netservice svc-icmp 1netservice svc-ssh tcp 22netservice svc-v6-icmp 58netservice svc-http-proxy1 tcp 3128ip access-list session control user any udp 68 deny any any svc-icmp permit any any svc-dns permit any any svc-papi permit any any svc-cfgm-tcp permit any any svc-adp permit any any svc-tftp permit any any svc-dhcp permit any any svc-natt permit !ip access-list session validuser any any any permit !ip access-list session vocera-acl any any svc-vocera permit queue high !ip access-list session icmp-acl any any svc-icmp permit !ip access-list session OXO any any svc-noe-oxo permit queue high !ip access-list session captiveportal user alias mswitch svc-https dst-nat 8081 user any svc-http dst-nat 8080 user any svc-https dst-nat 8081 user any svc-http-proxy1 dst-nat 8088 user any svc-http-proxy2 dst-nat 8088 user any svc-http-proxy3 dst-nat 8088 !ip access-list session allowall any any any permit !ip access-list session sip-acl any any svc-sip-udp permit queue high any any svc-sip-tcp permit queue high !ip access-list session https-acl any any svc-https permit !ip access-list session dns-acl any any svc-dns permit !ip access-list session logon-control user any udp 68 deny any any svc-icmp permit any any svc-dns permit any any svc-dhcp permit any any svc-natt permit !ip access-list session vpnlogon user any svc-ike permit user any svc-esp permit any any svc-l2tp permit any any svc-pptp permit any any svc-gre permit !ip access-list session srcnat user any any src-nat !ip access-list session skinny-acl any any svc-sccp permit queue high !ip access-list session tftp-acl any any svc-tftp permit !ip access-list session cplogout user alias mswitch svc-https dst-nat 8081 !ip access-list session guest!ip access-list session dhcp-acl any any svc-dhcp permit !ip access-list session http-acl any any svc-http permit !ip access-list session ap-acl any any svc-gre permit any any svc-syslog permit any user svc-snmp permit user any svc-snmp-trap permit user any svc-ntp permit !ip access-list session svp-acl any any svc-svp permit queue high user host 224.0.1.116 any permit !ip access-list session noe-acl any any svc-noe-oxo permit queue high any any svc-noe permit queue high !ip access-list session h323-acl any any svc-h323-tcp permit queue high any any svc-h323-udp permit queue high !ipv6 access-list session v6-icmp-acl any any svc-v6-icmp permit !ipv6 access-list session v6-https-acl any any svc-https permit !ipv6 access-list session v6-control user any udp 68 deny any any svc-v6-icmp permit any any svc-v6-dhcp permit any any svc-dns permit any any svc-tftp permit !ipv6 access-list session v6-dhcp-acl any any svc-v6-dhcp permit !ipv6 access-list session v6-dns-acl any any svc-dns permit !ipv6 access-list session v6-allowall any any any permit !ipv6 access-list session v6-http-acl any any svc-http permit !ipv6 access-list session v6-tftp-acl any any svc-tftp permit !ipv6 access-list session v6-logon-control user any udp 68 deny any any svc-v6-icmp permit any any svc-v6-dhcp permit any any svc-dns permit !vpn-dialer default-dialer ike authentication PRE-SHARE 061d247c753080180f2f2794d438eb6cb246cc33f49ed607!user-role ap-role session-acl control session-acl ap-acl!user-role trusted-ap session-acl allowall!user-role default-vpn-role session-acl allowall ipv6 session-acl v6-allowall!user-role voice session-acl sip-acl session-acl noe-acl session-acl svp-acl session-acl vocera-acl session-acl skinny-acl session-acl h323-acl session-acl dhcp-acl session-acl tftp-acl session-acl dns-acl session-acl icmp-acl session-acl allowall session-acl OXO!user-role guest-logon captive-portal default session-acl logon-control session-acl captiveportal!user-role guest session-acl http-acl session-acl https-acl session-acl dhcp-acl session-acl icmp-acl session-acl dns-acl ipv6 session-acl v6-http-acl ipv6 session-acl v6-https-acl ipv6 session-acl v6-dhcp-acl ipv6 session-acl v6-icmp-acl ipv6 session-acl v6-dns-acl!user-role stateful-dot1x!user-role authenticated session-acl allowall ipv6 session-acl v6-allowall!user-role stateful session-acl control!user-role logon session-acl logon-control session-acl captiveportal session-acl vpnlogon ipv6 session-acl v6-logon-control!aaa pubcookie-authentication!

    interface mgmtshutdown!

    interface gigabitethernet 1/0description "GE1/0"trusted!

    interface gigabitethernet 1/1description "GE1/1"trusted!

    interface gigabitethernet 1/2description "GE1/2"trusted!

    interface gigabitethernet 1/3description "GE1/3"trusted!

    interface vlan 1ip address 10.30.7.221 255.255.248.0!

    ip default-gateway 10.30.0.1

    wms general poll-interval 60000 general poll-retries 3 general ap-ageout-interval 30 general sta-ageout-interval 30 general learn-ap disable general persistent-known-interfering enable general propagate-wired-macs enable general stat-update enable general collect-stats disable!no crypto-local isakmp permit-invalid-certlocalip 0.0.0.0 ipsec 1ce45aafc121a954781fcc7a543e472c616443e663f88d68crypto isakmp groupname changemecrypto-local isakmp dpd idle-timeout 22 retry-timeout 2 retry-attempts 3crypto-local isakmp xauth

    vpdn group l2tp ppp authentication PAP!

    vpdn group pptp ppp authentication MSCHAPv2!

    mux-address 0.0.0.0

    adp discovery enableadp igmp-join enableadp igmp-vlan 0

    voip prioritization disable

    ssh mgmt-auth username/password mgmt-user admin root eacd16d301b2e0ed3e2373feff9adf7ca71990dc1e8ceb6c0b

    no database synchronizedatabase synchronize rf-plan-data

    ip mobile domain default!

    ip igmp!

    no firewall prohibit-ip-spoofingfirewall disable-stateful-sip-processingfirewall disable-stateful-h323-processingfirewall broadcast-filter arppacket-capture-defaults tcp disable udp disable sysmsg disable other disable!ip domain lookup!country SEaaa authentication mac "default"!aaa authentication dot1x "default"!aaa authentication dot1x "default-eap-tls" machine-authentication enable machine-authentication machine-default-role "voice" machine-authentication user-default-role "voice" termination enable termination eap-type eap-tls termination eap-type eap-peap termination inner-eap-type eap-mschapv2 ca-cert "Daniel_CA"!aaa authentication dot1x "default-psk" timer wpa-key-period 100!aaa authentication-server radius "172.20.14.220" host 172.20.14.220 key 83a3bc0f3e65aa9487a7fc1c8d979e2e!aaa server-group "default" auth-server Internal set role condition role value-of!aaa server-group "radius" auth-server 172.20.14.220 set role condition Class value-of!aaa profile "aaa_phone" initial-role "guest" authentication-dot1x "default-psk"!aaa profile "default"!aaa profile "phone_default" initial-role "voice" mac-default-role "voice" dot1x-default-role "voice"!aaa profile "phone_default_dot1x" initial-role "voice" mac-default-role "voice" authentication-dot1x "default-eap-tls" dot1x-default-role "voice" dot1x-server-group "internal"!aaa profile "phone_default_dot1x-psk" initial-role "voice" mac-default-role "voice" authentication-dot1x "default-psk" dot1x-default-role "voice"!aaa authentication captive-portal "default"!aaa authentication vpn!aaa authentication mgmt!aaa authentication stateful-dot1x!aaa authentication wired!web-server!ap system-profile "default"!ap regulatory-domain-profile "default" country-code SE valid-11g-channel 11 valid-11a-channel 36 valid-11a-channel 40 valid-11a-channel 44 valid-11a-channel 48 valid-11a-channel 52 valid-11a-channel 56 valid-11a-channel 60 valid-11a-channel 64 valid-11a-channel 100 valid-11a-channel 104 valid-11a-channel 108 valid-11a-channel 112 valid-11a-channel 116 valid-11a-channel 120 valid-11a-channel 124 valid-11a-channel 128 valid-11a-channel 132 valid-11a-channel 136 valid-11a-channel 140 valid-11g-40mhz-channel-pair 1+ valid-11g-40mhz-channel-pair 5- valid-11g-40mhz-channel-pair 7+ valid-11g-40mhz-channel-pair 11- valid-11a-40mhz-channel-pair 36+ valid-11a-40mhz-channel-pair 40- valid-11a-40mhz-channel-pair 44+ valid-11a-40mhz-channel-pair 48- valid-11a-40mhz-channel-pair 52+ valid-11a-40mhz-channel-pair 56- valid-11a-40mhz-channel-pair 60+ valid-11a-40mhz-channel-pair 64- valid-11a-40mhz-channel-pair 100+ valid-11a-40mhz-channel-pair 104- valid-11a-40mhz-channel-pair 108+ valid-11a-40mhz-channel-pair 112- valid-11a-40mhz-channel-pair 116+ valid-11a-40mhz-channel-pair 120- valid-11a-40mhz-channel-pair 124+ valid-11a-40mhz-channel-pair 128- valid-11a-40mhz-channel-pair 132+ valid-11a-40mhz-channel-pair 136-!ap wired-ap-profile "default"!ap enet-link-profile "default"!ap snmp-profile "default"!ids general-profile "default"!ids rate-thresholds-profile "default"!ids signature-profile "default"!ids impersonation-profile "default"!ids unauthorized-device-profile "default"!ids signature-matching-profile "default"!ids dos-profile "default"!ids profile "default"!rf arm-profile "default" assignment disable max-tx-power 21 min-tx-power 21 voip-aware-scan!rf optimization-profile "default"!rf event-thresholds-profile "default"!rf dot11a-radio-profile "default"!rf dot11g-radio-profile "default" tx-power 22.5!wlan voip-cac-profile "default"!wlan ht-ssid-profile "default"!wlan edca-parameters-profile station "default"!wlan edca-parameters-profile ap "default"!wlan ssid-profile "--NEW--"!wlan ssid-profile "default"!wlan ssid-profile "hidden" essid "hidden" opmode static-wep hide-ssid wepkey1 eaaa2d4d4053a001ad90090306a187802fc23897acdfe201!wlan ssid-profile "Sirens Develop" essid "Voice4" opmode wpa2-psk-aes wmm no local-probe-response wpa-passphrase e0ab5fe142c1c3e02031a7daeac9408c73089e0b6972cfa5!wlan ssid-profile "Sirens Develop 3" essid "Voice3" opmode static-wep a-tx-rates 6 9 12 18 24 g-tx-rates 1 2 5 6 9 11 12 18 24 wmm wmm-vo-dscp 46 wmm-vi-dscp 26 wepkey1 79455593876a63ff840764dd7d265c1863a1b2494d71d966!wlan ssid-profile "Sirens Develop 4" essid "Voice4"!wlan ssid-profile "Sirens Develop 5" essid "Voice5" opmode wpa2-aes!wlan ssid-profile "Sirens WLAN Intop" essid "SirensIntop" opmode wpa2-psk-aes dtim-period 5 wmm wmm-vo-dscp 46 wmm-vi-dscp 26 hide-ssid wepkey1 e3e0ca5a6dabf43fdf7caca10bbb100b777c530e80ef73e9 wpa-passphrase 259a836fd31a3fc7f3d88db7cc83a43aab965438035583a5!wlan ssid-profile "Voice2" essid "Voice2" opmode wpa-psk-tkip a-tx-rates 6 9 12 18 24 g-tx-rates 1 2 5 6 9 11 12 18 24 wmm wpa-passphrase d253526de54c72f6dd2ec68e35c17b88f0f0a78fd0047b93!wlan virtual-ap "default" no vap-enable aaa-profile "default-dot1x" broadcast-filter arp!wlan virtual-ap "hidden" no vap-enable ssid-profile "hidden" broadcast-filter arp!wlan virtual-ap "Sirens Develop" ssid-profile "Sirens Develop" aaa-profile "phone_default_dot1x-psk" broadcast-filter all broadcast-filter arp!wlan virtual-ap "Sirens Develop 2" ssid-profile "Voice2" aaa-profile "phone_default_dot1x-psk" broadcast-filter arp!wlan virtual-ap "Sirens Develop 3" ssid-profile "Sirens Develop 3" aaa-profile "phone_default" broadcast-filter all broadcast-filter arp!wlan virtual-ap "Sirens Develop 4" ssid-profile "Sirens Develop 5" aaa-profile "phone_default_dot1x" broadcast-filter all broadcast-filter arp!wlan virtual-ap "Sirens WLAN Intop" no vap-enable ssid-profile "Sirens WLAN Intop" aaa-profile "phone_default_dot1x-psk" broadcast-filter all broadcast-filter arp!ap-group "default" virtual-ap "default" virtual-ap "Sirens Develop" virtual-ap "Sirens WLAN Intop" virtual-ap "Sirens Develop 3" virtual-ap "Sirens Develop 2" virtual-ap "hidden" virtual-ap "Sirens Develop 4"!logging level debugging security subcat aaalogging level debugging security subcat alllogging level debugging security subcat dot1xlogging level debugging security subcat mobilitylogging facility local0logging 172.20.13.91logging level debugging user-debug 00:01:3e:10:0a:12

    rf arm-profile "no_arm_enable_MeSh" assignment disable!

    end

    Aruba WIFI

    Y29tcHRlc3Q=

    Aruba

    03

    192.168.10.1

    172.20.106.50

    07

    07

    1000

    00

    01

    00

    01