Wireless Access

last person joined: 18 hours ago 

Access network design for branch, remote, outdoor, and campus locations with HPE Aruba Networking access points and mobility controllers.
Expand all | Collapse all

Trunking VLANS to AP/AM's

This thread has been viewed 0 times
  • 1.  Trunking VLANS to AP/AM's

    Posted Sep 10, 2014 05:16 AM

     

    I am helping out a coustomer that have done dedicated VLANS for AP's.

    This is not good for Rogue detection, and trunking all VLANS to controller is not really feasible with their topology.

    Reading up on rogue detection, and also asking before, one of the advices have been to trunk all the VLANS (wired) to an AP or AM.

    THis is something that could improve the situation here, I am just a bit curious to what exactly does that mean.

    Do you create all the needed VLANS on the Aruba controller as well, and then create a eth profile with a wired AP where all VLAN are allowed in trunking mode?

    I can't see that just trunking them to a AM/AP does much, the VLANS must exist on the controller as well, otherwise the packets will be discarded.



  • 2.  RE: Trunking VLANS to AP/AM's

    EMPLOYEE
    Posted Sep 10, 2014 08:26 AM
    The best practice is to just place your access pointed in the same VLAN where end user devices are (desktops, printers, etc).


  • 3.  RE: Trunking VLANS to AP/AM's
    Best Answer

    Posted Sep 10, 2014 12:58 PM

    We're using the Aruba gear to provide WLAN access for our users and legacy devices, but we're also using it to meet PCI WLAN monitoring requirements.

     

    To get optimum WIPS functionality, we connect the access points to trunk ports with the AP management VLAN set as native and all wired VLAN's "visible" to the wired interface of the AP/AM.

     

    This allows the AM to "see" MAC addresses on the wire and in the air regardless of which VLAN has a potential rogue AP connected.

     

    The onle VLANs we configure on the controller(s) are the VLANs needed for client traffic so the AP can either tunnel or drop off client data as needed.