Wireless Access

 View Only
  • 1.  Issue with Captive-Portal using Aruba Cloud-Guest - Tunnelled SSID

    Posted Feb 05, 2025 04:28 PM
    Edited by vascarf Feb 05, 2025 04:35 PM

    Hi,

    We've been having issues for a while now our new Aruba Wi-Fi system using the Aruba Cloud-Guest captive portal. I have a TAC ticket opened for almost two weeks now, and they cannot seem to give us an explanation on the issue. They keep on asking to recreate the issue, gather logs, which I have done and sent them, but still no answer on what is issue is or where to even start looking. We've recently moved from all Cisco and Meraki APs, and we've never had any of these issues, or at least they've helped us solve it in way less time.

    I have an idea on what could it be based on what I'm seeing, but I do not fully understand how the Cloud-Guest authentication works. I need some insight on what could be causing these issues. 

    Issues / Symptoms:

    When users connect to the SSID, two things can either happen or happen at the same time:

    1. First Issue - Users get "cannot connect to network". It will eventually connect after waiting for 2-5 minutes. They will get an IP from DHCP, then captive-portal shows up. *This relates to the "MAC Authentication" errors / timeouts we see on the Aruba Central Logs.
    2. Second Issue - Users get the captive-portal prompt, to accept "terms and conditions", once they tick the checkbox and click "accept" button, they get a "Login Error". Again, it will eventually connect after waiting for 2-5 minutes. They are now connected to the internet. *This relates to the "Captive-Portal" errors / timeouts we see on the Aruba Central Logs.

    Note: The above does not happen all the time, its very random. This is why its hard to recreate the issue. And we do not get a lot of complaints from users, because it will eventually connect. 

    Here's some background of our environment:

    2 x Aruba  9114 GWs Mobility Gateways - Auto-Clustered

    Aruba AP-635s

    SSID Configured as Tunnel-Mode to GW-Cluster

    SSID Security is Captive-Portal using Aruba Cloud-Guest. MAC-Caching is Enabled.

    See diagram:

    • User device connects to the SSID.
    • User is then tunneled to Guest-Internet VLAN(500) to the 9114 GW.
    • User traffic will hit the FW, then out to the internet.

    Additional observations:

    • When we turn off MAC-Caching on the Cloud-Guest settings, issue #1 completely goes away. My assumption is when its off, the Aruba Gateways does not have to send MAC authentication requests to the Cloud-Servers.
    • Changing the SSID Security to PSK, completely removes all issues. This issue is related to using captive-portal on Cloud-Guest 100%.

    A bit more detail on what I'm seeing:

    • When using Captive-Portal and Cloud-Guest, the Aruba Central configures the Gateways with two Authentication-Server Groups, AS1 and AS2, each tied to the URL below.
    • Looking at the error logs on the GWs, when a user connects to the Wi-Fi and encounters one of the issues above, I see a log entry "authentication-server timeout servergroup=AS1". It will eventually connect. Once the user is connected, if you check "show user mac 00:00:00:00:00:00", it will then tell you that the user is authenticated on what server-group, either AS1 or AS2. All of the connected users are authenticated on AS2. Nothing is authenticated on AS1. 
    • Running the command "show aaa authentication-server all" shows below (Note the Requests Column):

    Now the questions and assumptions:

    • I think the reason why the issue is intermittent and will connect eventually, is because of the two auth servers. If a user authenticating, either by MAC or by Web, it gets assigned to the first set of servers (AS1), it fails or times out. It will then get rolled over to the second set of servers(AS2), then it works.
    • This can explain why all connected users are showing as authenticated on AS2.
    • All the auth-server requests are all going to AS2, based on the requests count.

    • Why is this happening? Both of the URLs are added to our FW Whitelist, as well as the individual IPs those URLs are assigned to (nslookup).
    • We have TCP 2083,443 and just added UDP 1812,1813 allowed for above. We do not see any "denies" on our FW for any traffic coming from our GWs.
    • Now its possible that I'm not understanding how the Aruba Cloud-Guest, RADIUS, MAC-Auth works, so it could be likely that I'm putting my focus on the wrong thing. Maybe the error logs about auth-server timeouts to AS1 is nothing to get worried about? I've asked TAC multiple times to explain to me what these errors mean, or how the Cloud-guest authentication works, but all they say is "add more debugging and captures and we will get back to you". 

    Sorry for the lengthy post. I hope what I've described makes sense and someone can chime in on what the issue is, and where I can start looking. I can share some outputs from my APs and GWs if you need to have a look at what we have.

    Thank you.

    Vascar



  • 2.  RE: Issue with Captive-Portal using Aruba Cloud-Guest - Tunnelled SSID

    Posted Feb 14, 2025 07:33 AM

    If you are not satisfied with the support from TAC, or the progress on an existing case, please escalate. The TAC User Guide can help to get that done in the correct way.

    As much as I would like, it's quite hard to find the solution based on the description you provided, and I'm confident it's something trivial that's being overlooked (and because it's trivial, it's not mentioned/checked).

    You mention that there are no blocks on the firewall. Please also check that there is no additional security (like DPI, SSL inspection, DLP) applied on the traffic between your gateway/APs and Central.



    ------------------------------
    Herman Robers
    ------------------------
    If you have urgent issues, always contact your HPE Aruba Networking partner, distributor, or Aruba TAC Support. Check https://www.arubanetworks.com/support-services/contact-support/ for how to contact HPE Aruba Networking TAC. Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or HPE Aruba Networking.

    In case your problem is solved, please invest the time to post a follow-up with the information on how you solved it. Others can benefit from that.
    ------------------------------



  • 3.  RE: Issue with Captive-Portal using Aruba Cloud-Guest - Tunnelled SSID

    Posted Feb 18, 2025 12:31 PM

    Thanks for the tip. I have already escalated it the first day I opened the ticket. Had to get my account rep involved to get TAC to really focus on it. 

    Ill mention those additional security features to our FW team and see if there is anything there that could be culprit.

    As of today, TAC still couldn't find the cause of issue, after sending a bunch of logs, and multiple live troubleshooting sessions, and given them full access to our central. They've asked us to upgrade the GWs and the APs to latest code : 10.7.0.1. Right now, our GWs and APs are on 10.6. and 10.7.0.0 respectively. Odd thing about it is we've been running the GWs and the APs on this code for over a month since the issues, and it just broke suddenly. 

     Hopefully upgrading fixes the issue. I just want this issue behind me. I'd still be nice to get a root cause for the sudden Wi-Fi outage, as my boss will ask for it, but from the looks of I'll just have to say "related to firmware", and hopefully he accepts that lol.




  • 4.  RE: Issue with Captive-Portal using Aruba Cloud-Guest - Tunnelled SSID

    Posted Feb 14, 2025 10:56 AM

    Both of the Cloud Guest auth servers should be connecting with RadSec, either over port 2083 or 443.  Since your output is showing native RADIUS on UDP 1812/1813, that is incorrect.  As to why that is happening, no idea, but point that out to your TAC engineer and go from there.



    ------------------------------
    Carson Hulcher, ACEX#110
    ------------------------------



  • 5.  RE: Issue with Captive-Portal using Aruba Cloud-Guest - Tunnelled SSID

    Posted Feb 18, 2025 12:16 PM

    This was something that I mentioned to TAC, because I remember when I was looking at the FW logs before the issue started, I saw a lot of requests from the GWs to the cloud-servers on port 2083. The FW logs after the issue started, I'm now seeing requests to from the same GW to cloud-servers, on 1812 and 1813, none on 2083, which I found odd.

    There was no change that happened on our side, that could have caused the GWs to stop reauthenticating on 2083, and now attempt on 1812, 1813. Based on this, I feel like this this setting below:

    The radius cloud-auth 1 settings does say "RADSEC" disabled. 

    I remember seeing TAC looked at this setting specifically but didn't say anything about it, so I figured that is just the way it is supposed to be configured.




  • 6.  RE: Issue with Captive-Portal using Aruba Cloud-Guest - Tunnelled SSID

    Posted Feb 18, 2025 04:05 PM

    If you would please, bring this directly to the attention of the TAC engineer and escalate if necessary.



    ------------------------------
    Carson Hulcher, ACEX#110
    ------------------------------



  • 7.  RE: Issue with Captive-Portal using Aruba Cloud-Guest - Tunnelled SSID

    Posted Feb 20, 2025 06:08 AM

    This is how it looks like for me:

    (cic-mg01-9114) #show aaa authentication-server all
    
    Auth Server Table
    -----------------
    Name                    Type    FQDN                                           IP addr        AuthPort      AcctPort      Status   Requests
    ----                    ----    ----                                           -------        --------      --------      ------   --------
    Internal                Local   n/a                                            52.36.146.215  n/a           n/a           Enabled  0
    AS1_#cloud_auth#_       Radius  naw1.cloudguest.central.arubanetworks.com      54.185.82.247  2083(radsec)  2083(radsec)  Enabled  170
    AS2_#cloud_auth#_       Radius  naw1-elb.cloudguest.central.arubanetworks.com  44.234.219.72  443(radsec)   443(radsec)   Enabled  0
    cppm.lab.hpearuba.net   Radius  cppm.lab.hpearuba.net                          10.12.99.40    1812          1813          Enabled  11151
    cppm2.lab.hpearuba.net  Radius  cppm2.lab.hpearuba.net                         10.12.99.42    1812          1813          Enabled  0
    cppm-tacacs             Tacacs  n/a                                            10.12.99.40    49            n/a           Enabled  0
    cppm1-tacacs            Tacacs  n/a                                            10.12.99.41    49            n/a           Enabled  3
    cppm2-tacacs            Tacacs  n/a                                            10.12.99.42    49            n/a           Enabled  0
    (cic-mg01-9114) #show aaa authentication-server radius AS1_#cloud_auth#_
    
    RADIUS Server "AS1_#cloud_auth#_"
    ---------------------------------
    Parameter                                                         Value
    ---------                                                         -----
    Enable IPv6                                                       Disabled
    Host                                                              naw1.cloudguest.central.arubanetworks.com
    Key                                                               ********
    CPPM credentials                                                  N/A
    Auth Port                                                         1812
    Acct Port                                                         1813
    RadSec Port                                                       2083
    Retransmits                                                       3
    Timeout                                                           20 sec
    NAS ID                                                            63404eb5-d488-49b4-a1c3-9f0beafbc4f5
    NAS IP                                                            N/A
    NAS IPv6                                                          N/A
    Source Interface                                                  N/A
    Use MD5                                                           Disabled
    Use IP address for calling station ID                             Disabled
    Mode                                                              Enabled
    Lowercase MAC addresses                                           Disabled
    MAC address delimiter                                             none
    Service-type of FRAMED-USER                                       Disabled
    RadSec                                                            Enabled
    RadSec Trusted CA Name                                            N/A
    RadSec Server Cert Name                                           N/A
    RadSec Client Cert                                                N/A
    called-station-id                                                 macaddr colon disable
    Access-Request Modifier                                           N/A
    Accounting-Request Modifier                                       N/A
    Message-Authenticator required in Access-Accept/Reject/Challenge  No
    Radsec EST Cert Profile                                           N/A

    RadSec is/should be enabled.



    ------------------------------
    Herman Robers
    ------------------------
    If you have urgent issues, always contact your HPE Aruba Networking partner, distributor, or Aruba TAC Support. Check https://www.arubanetworks.com/support-services/contact-support/ for how to contact HPE Aruba Networking TAC. Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or HPE Aruba Networking.

    In case your problem is solved, please invest the time to post a follow-up with the information on how you solved it. Others can benefit from that.
    ------------------------------



  • 8.  RE: Issue with Captive-Portal using Aruba Cloud-Guest - Tunnelled SSID

    Posted 26 days ago

    Thank you for checking. I've brought it again to their attention.