WAN认证由此可见bility Overview
Authentication survivability is critical tomanaged deviceWLANsWireless Local Area Network. WLAN is a 802.11 standards-based LAN that the users access through a wireless connection.since mostmanaged devicesuse geographically remote authentication servers to provide authentication and authorization services. When those authentication servers are not accessible, clients cannot access theWLANWireless Local Area Network. WLAN is a 802.11 standards-based LAN that the users access through a wireless connection.because themanaged devicecannot authenticate them.ArubaOSauthentication survivability allowsmanaged devicesto provide client authentication and authorization survivability when remote authentication servers are not accessible. When this feature is enabled,ArubaOSstores user access credentials and key reply attributes whenever clients are authenticated with externalRADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.servers orLDAPLightweight Directory Access Protocol. LDAP is a communication protocol that provides the ability to access and maintain distributed directory information services over a network.authentication servers. When external authentication servers are not accessible, themanaged deviceuses its internal survival server to continue providing authentication and authorization functions by using the user access credentials and key reply attributes that were stored earlier.
When authentication survivability is enabled, an internal survival server on the managed node performs authentication functions, as well asEAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.-termination using theRADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.protocol. The survival server performs authentication or query requests when authentication survivability is enabled,andone of the following is true:
1.All servers are out of service in the server group if fail-through is disabled.
2.All in-service servers failed the authentication and at least one server is out of service when fail-through is enabled.
All access credentials and key reply attributes saved in the local survival server remain in the system until they expire. The system-wide lifetime parameter
- has a range from 1 to 168 hours, and a default value of 24 hours. Expired user credential attributes and key reply attributes stored in the survival server cache are purged every 10 minutes.Best practices is to import a customer server certificate into themanaged deviceand assign it to the local survival server. |
The survival server can store the following types of client data:
Client username
Encrypted Passwords. ForPAPPassword Authentication Protocol. PAP validates users by password. PAP does not encrypt passwords for transmission and is thus considered insecure.authentication, the survival server receives the password provided by the client and then stores the encryptedSHASecure Hash Algorithm. SHA is a family of cryptographic hash functions. The SHA algorithm includes the SHA, SHA-1, SHA-2 and SHA-3 variants.-1 hashed value of the password.
EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.indicator: When employing802.1X802.1X is an IEEE standard for port-based network access control designed to enhance 802.11 WLAN security. 802.1X provides an authentication framework that allows a user to be authenticated by a central authority.with disabled termination usingEAP-TLSEAP–Transport Layer Security. EAP-TLS is a certificate-based authentication method supporting mutual authentication, integrity-protected ciphersuite negotiation and key exchange between two endpoints. See RFC 5216.,EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.indicator is stored.
TheCNCommon Name. CN is the primary name used to identify a certificate.lookupEXISTindicator
Supported Client and Authentication Types
The following combination of clients and authentication types are supported with the authentication survivability feature see the table below:
Table 1:Clients and Supported Authentication Types
Supported Key Reply Attributes
The following key reply attributes are supported:
ARUBA_ROLE
MS_TUNNEL_MEDIUM_TYPE
MS_TUNNEL_PRIVATE_GROUP_ID
MS_TUNNEL_TYPE
PW_SESSION_TIMEOUT
PW_USER_NAME
Feature Restrictions and Limitations
The authentication survivability feature has the following support restrictions:
The Survival Server cache database is station-based (thus, theMACMedia Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network.address is the key), so authentication survivability is not supported for any station with a zeroMACMedia Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network.address.
For a client usingEAP-TLSEAP–Transport Layer Security. EAP-TLS is a certificate-based authentication method supporting mutual authentication, integrity-protected ciphersuite negotiation and key exchange between two endpoints. See RFC 5216.,您必须安装的发行者证书urvival Server certificate as a TrustedCA certificate in the client station.
For an802.1X802.1X is an IEEE standard for port-based network access control designed to enhance 802.11 WLAN security. 802.1X provides an authentication framework that allows a user to be authenticated by a central authority.client usingEAP-TLSEAP–Transport Layer Security. EAP-TLS is a certificate-based authentication method supporting mutual authentication, integrity-protected ciphersuite negotiation and key exchange between two endpoints. See RFC 5216.that does not terminate at themanaged device,issuer certificate for the client certificate must be imported as a TrustedCA or an intermediateCA certificate at themanaged device—just as the same certificate must be installed at the terminating ExternalRADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.server.
The Survival Server does not support theOCSPOnline Certificate Status Protocol. OCSP is used for determining the current status of a digital certificate without requiring a CRL.nor theCRLCertificate Revocation List. CRL is a list of revoked certificates maintained by a certification authority.forEAP-TLSEAP–Transport Layer Security. EAP-TLS is a certificate-based authentication method supporting mutual authentication, integrity-protected ciphersuite negotiation and key exchange between two endpoints. See RFC 5216..
Authentication survivability will not activate if Authentication Server Dead Time is configured as 0.
To configure Authentication Server Dead Time, on themanaged device, navigate to: > > > > > .
Captive Portal Authentication Workflow
This section describes the authentication procedures forCaptive PortalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.clients, both when the branch authentication servers are available and when they are not available. When the authentication servers are not available, the Survival Server takes over the handling of authentication requests.
Captive Portal Client Authentication Using PAP
Table 2describes what occurs forCaptive PortalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.clients usingPAPPassword Authentication Protocol. PAP validates users by password. PAP does not encrypt passwords for transmission and is thus considered insecure.as the authentication method.
Table 2:Captive Portal Authentication Using PAP
When Authentication Servers Are Available |
When Authentication Servers Are Not Available |
---|---|
If authentication succeeds, the associated access credential with an encryptedSHASecure Hash Algorithm. SHA is a family of cryptographic hash functions. The SHA algorithm includes the SHA, SHA-1, SHA-2 and SHA-3 variants.‑1 hash of the password and Key Reply attributes are stored in the Survival Server database. If authentication fails, the associated access credential and Key Reply attributes associated with thePAPPassword Authentication Protocol. PAP validates users by password. PAP does not encrypt passwords for transmission and is thus considered insecure.method (if they exist) are deleted from the Survival Server database. |
When no in-service server in the associated server group is available, the Survival Server is used to authenticate theCaptive portalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.client usingPAPPassword Authentication Protocol. PAP validates users by password. PAP does not encrypt passwords for transmission and is thus considered insecure.. The Survival Server uses the previously stored unexpired access credential to perform authentication and, upon successful authentication, returns the previously stored Key Reply attributes. |
External Captive Portal Client Authentication Using the XML-API
Table 3describes the authentication procedures for ExternalCaptive PortalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users.客户使用XMLExtensible Markup Language. XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.-APIApplication Programming Interface. Refers to a set of functions, procedures, protocols, and tools that enable users to build application software., both when the branch authentication servers are available and when they are not available. When the authentication servers are not available, the Survival Server takes over the handling of authentication requests.
Table 3:Captive Portal Authentication Using XML-API
802.1X Authentication Workflow
This section describes the authentication procedures for802.1X802.1X is an IEEE standard for port-based network access control designed to enhance 802.11 WLAN security. 802.1X provides an authentication framework that allows a user to be authenticated by a central authority.clients with termination at an ExternalRADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.server, or at thecontroller.
Table 4:802.1X Authentication Terminating at an External Server
For an802.1X802.1X is an IEEE standard for port-based network access control designed to enhance 802.11 WLAN security. 802.1X provides an authentication framework that allows a user to be authenticated by a central authority.client for which termination is enabled at themanaged deviceusingEAP-TLSEAP–Transport Layer Security. EAP-TLS is a certificate-based authentication method supporting mutual authentication, integrity-protected ciphersuite negotiation and key exchange between two endpoints. See RFC 5216.withCNCommon Name. CN is the primary name used to identify a certificate.lookup, a query request about the Common Name is sent to the external authentication server.
Table 5:802.1X Client Authentication Using EAP_TLS with CN Lookup
When Authentication Servers Are Available |
When Authentication Servers Are Not Available |
---|---|
If the query succeeds, the associated access credential with a returned indicator ofEXIST, plus the Key Reply attributes, are stored in the Survival Server database. If the query fails, the associated access credential and Key Reply attributes associated with the Query method (if they exist) are deleted from the Survival Server database. |
When there is no available in-service server in the associated server group, the Survival Server performsCNCommon Name. CN is the primary name used to identify a certificate.lookup for802.1X802.1X is an IEEE standard for port-based network access control designed to enhance 802.11 WLAN security. 802.1X provides an authentication framework that allows a user to be authenticated by a central authority.clients for which termination is enabled at themanaged deviceusingEAP-TLSEAP–Transport Layer Security. EAP-TLS is a certificate-based authentication method supporting mutual authentication, integrity-protected ciphersuite negotiation and key exchange between two endpoints. See RFC 5216.. The Survival Server returns previously stored Key Reply attributes as long as the client with theEXISTindicator is in the Survival Server database. |
MAC Authentication Workflow
This section describes the authentication procedures for clients.
Table 6:MAC-Based Client Authentication Using PAP
When Authentication Servers Are Available |
When Authentication Servers Are Not Available |
---|---|
If authentication succeeds, the associated access credential, along with an encryptedSHASecure Hash Algorithm. SHA is a family of cryptographic hash functions. The SHA algorithm includes the SHA, SHA-1, SHA-2 and SHA-3 variants.-1 hash of the password and Key Reply attributes, are stored in the Survival Server database. If authentication fails, the associated access credential and Key Reply attributes associated with thePAPPassword Authentication Protocol. PAP validates users by password. PAP does not encrypt passwords for transmission and is thus considered insecure.method (if they exist) are deleted from the Survival Server database. |
When there is no available in-service server in the associated server group, the Survival Server authenticates theMACMedia Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network.-based authentication client usingPAPPassword Authentication Protocol. PAP validates users by password. PAP does not encrypt passwords for transmission and is thus considered insecure.. The Survival Server returns previously stored Key Reply attributes as long as the client with theEXISTindicator is in the Survival Server database. |
WISPr Authentication
This section describes the authentication procedures forWISPrWireless Internet Service Provider Roaming. The WISPr framework enables the client devices to roam between the wireless hotspots using different ISPs.clients, both when the branch authentication servers are available and when they are not available. When the authentication servers are not available, the Survival Server takes over the handling of authentication requests.
Table 7:WISPr Authentication Using PAP