Wireless Access

last person joined: 21 hours ago 

Access network design for branch, remote, outdoor, and campus locations with HPE Aruba Networking access points and mobility controllers.
Expand all | Collapse all

Separating SSID from Other VLANs on Wireless Controller

This thread has been viewed 1 times
  • 1.  Separating SSID from Other VLANs on Wireless Controller

    Posted May 21, 2019 01:56 PM

    I am not 100% certain that I am explaining this correct, so obviously feel free to ask questions.

     

    I have an Aruba7210-US controller with multiple AP Groups, Virtual APs, and SSIDs. I recently created a new Virtual AP/SSID on a separate VLAN, in other to connect specific laptops and completely separate them from the rest of the network.

     

    The problem is that since there are other, existing Virtual AP/SSIDs that the "general public" (staff) uses within these AP Groups, I am unable to remove those other VLANs from the uplink port for the wireless controller on the switch, which means that my new Virtual AP/SSID can still connect to other servers/systems that I do not want them to connect to.

     

    What can I do on the actual wireless controller in order to completely segratate this new Virtual AP/SSID from the rest of the network. Thank you in advance for any help.



  • 2.  RE: Separating SSID from Other VLANs on Wireless Controller

    EMPLOYEE
    Posted May 21, 2019 02:05 PM

    You can apply an ACL to any user role to block any destination, protocol or any combination of both that you don't want specific users connecting to.  This is irrespective of any VLAN you have trunked to a controller.

     

    Again, you should be restricting user traffic based on ACLs attached to the the user's role.



  • 3.  RE: Separating SSID from Other VLANs on Wireless Controller

    Posted May 21, 2019 02:21 PM

    Are you able to point me in the right direction of where the ACLs are configured within the GUI? I actually have an open case with support, but the technician was doing it via the terminal and could not get it working. I am willing to do it myself, as I am familiar with networking. I just don't know how to do it on an Aruba Controller; either via the GUI or the terminal.

     

    Please advise. Thank you.



  • 4.  RE: Separating SSID from Other VLANs on Wireless Controller

    EMPLOYEE
    Posted May 21, 2019 07:57 PM

    What version of ArubaOS is this?  That will determine where to look.

     

    What was the technican trying to do?  If you are not satisified, you should ask to escalate the issue.



  • 5.  RE: Separating SSID from Other VLANs on Wireless Controller

    Posted May 21, 2019 08:53 PM

    Model: Aruba7210-US / Version: 6.5.3.4

     

    The technician was attempting to create an ACL via the terminal, but for whatever reason was not successful. If I can be honest, I have never had a successful support call with Aruba and I am knowledgeable enough that if I am guided in the right direction I can figure it out.



  • 6.  RE: Separating SSID from Other VLANs on Wireless Controller
    Best Answer

    EMPLOYEE
    Posted May 21, 2019 09:09 PM


  • 7.  RE: Separating SSID from Other VLANs on Wireless Controller

    Posted May 22, 2019 03:32 PM

    You have been so helpful that I have to take advantage of your knowledge with one last question. I know that I have been concentrating on blocking everything, but could you point me in the right the direction if I wanted to allow access to one specific IP address?

     

    Thanks again.



  • 8.  RE: Separating SSID from Other VLANs on Wireless Controller

    EMPLOYEE
    Posted May 22, 2019 03:54 PM

    In the session ACL you would have:

     

    user  host <ip address> any permit



  • 9.  RE: Separating SSID from Other VLANs on Wireless Controller

    Posted May 30, 2019 04:29 PM

    Just to add to the other comments. You want to create a "session" ACL, which uses the Aruba firewall, as opposed to the traditional standard or extended ACLs that are traditionally used with switches.

     

    Firewall rules make up policies. Firewall policies make up roles. Roles are assigned to users that connect to untrusted connections, such as an SSID.

     

    If you wanted/needed to put restrictions on a physical port or a VLAN, you can assign a firewall policy to the port or VLAN.

     

    I hope this helps,