Configuring APs Using Templates
Templates in Aruba Central refer to a set of configuration commands that can be used by the administrators for provisioning devices in a group. Configuration templates enable administrators to apply a set of configuration parameters simultaneously to multiple devices in a group and thus automate AP deployments.
|
To minimize configuration errors and troubleshoot device-specific configuration issues, Aruba recommends that the device administrators familiarize themselves with the CLI configuration commands available on Aruba APs. |
For template-based provisioning, APs must be assigned to a group with template-based configuration method enabled.
To create a template for the devices in a template group, complete the following steps:
1. In the app, set the filter to a group that contains at least one AP.
The dashboard context for the group is displayed.
2. Under , click .
3. Click the icon to display the AP configuration dashboard.
4. Under , click to add a new template. The window opens.
5. Add the template name.
6. Set the model and firmware version parameters to .
7. Add the CLI script content. Check the following guidelines before adding content to the template:
Ensure that the command text indentation matches the indentation in the running configuration.
The template allows only one Aruba recommends that you upload all variables for all devices in a cluster and change values as required for individual AP variables.
block. It must include the variable. The block uses the variables for the individual APs. The general VC configuration uses variables for master AP to generate the final configuration from the provided template. Hence,The commands in the template are case-sensitive.
IF ELSE ENDIF conditions are supported in the template. If the template text includes the if condition, % sign is required at the beginning and the end of the text. For example, %if guest%. The following example shows the template text with the IF ELSE ENDIF condition.
wlan ssid-profile %ssid_name%
%if disable_ssid=true%
disable-ssid
%endif%
%if ssid_security=wpa2%
opmode wpa2-aes
%else%
opmode opensystem
%endif%
Templates also support nesting of the IF ELSE END IF condition blocks. The following example shows how to nest such blocks:
%if condition1=true%
routing-profile 10.10.0.0 255.255.255.0 10.10.0.255
%if condition2=true%
routing-profile 10.20.0.0 255.255.255.0 10.20.0.255
%else%
routing-profile 10.30.0.0 255.255.255.0 10.30.0.255
%endif%
%else%
routing-profile 10.40.0.0 255.255.255.0 10.40.0.255
%if condition3=true%
routing-profile 10.50.0.0 255.255.255.0 10.50.0.255
%else%
routing-profile 10.60.0.0 255.255.255.0 10.60.0.255
%endif%
%endif%
For profile configuration CLI text, for example, vlanVirtual Local Area Network. In computer networking, a single Layer 2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them through one or more routers; such a domain is referred to as a Virtual Local Area Network, Virtual LAN, or VLAN., interface, access-list, ssidService Set Identifier. SSID is a name given to a WLAN and is used by the client to access a WLAN network. and so on, the first command must start with no whitespace. The subsequent local commands in given profile must start with at least one initial space (' ') or indented as shown in the following examples:
vlan 1
name "vlan1"
no untagged 1-24
ip address dhcp-bootp
exit
%if vlan_id1%
vlan %vlan_id1%
%if vlan_id1=1%
ip address dhcp-bootp
%endif%
no untagged %_sys_vlan_1_untag_command%
exit
%endif%
To comment out a line in the template text, use the pound sign (#). Any template text preceded by # is ignored when processing the template.
To allow or restrict APs from joining the
8. Click .
|
The variables configured for the If any device in the cluster has any missing variables, the configuration push to those AP devices in the cluster fails. The audit trail for such instances shows the missing variables. |
The following example shows the typical contents allowed in a template file for APs:
organization %org%
virtual-controller-ip 1.1.1.1
syslog-level debug
syslog-level warn ap-debug
per-ap-settings %_sys_lan_mac%
hostname %hostname%
zonename %zonename%
wlan ssid-profile %ssid_name%
%if disable_ssid=true%
disable-ssid
%endif%
%if ssid_security=wpa2%
opmode wpa2-aes
%else%
opmode opensystem
%endif%
%if condition1=true%
routing-profile 10.10.0.0 255.255.255.0 10.10.0.255
%if condition2=true%
routing-profile 10.20.0.0 255.255.255.0 10.20.0.255
%else%
routing-profile 10.30.0.0 255.255.255.0 10.30.0.255
%endif%
%else%
routing-profile 10.40.0.0 255.255.255.0 10.40.0.255
%if condition3=true%
routing-profile 10.50.0.0 255.255.255.0 10.50.0.255
%else%
routing-profile 10.60.0.0 255.255.255.0 10.60.0.255
%endif%
%endif%
Password Management in Configuration Templates for AP
In Aruba Central, the AP management user passwords are stored and displayed as hash instead of plain text. Password for AP can be set using the following commands:
mgmt-user <user-name> <password>
mgmt-user <user-name> <password> read-only
mgmt-user <user-name> <password> guest-mgmt
|
The Aruba Instant 4.3 firmware version. commands are used for APs running below |
The Aruba Central and is moved to a new group, Aruba Central uses the configuration settings and discards configuration settings, if any, on the AP. In other words, Aruba Central hashes management user passwords irrespective of the management user configuration settings running on an AP.
command is enabled by default on the APs provisioned in the template and UI groups. If a pre-configured AP joins
|
The Aruba Instant 4.3. commands can only be used for APs running firmware versions equal to or above |
Password for AP can be set using the following
commands:hash-mgmt-user <user-name> password hash <hash-password>
hash-mgmt-user <user-name> password cleartext <cleartext-password>
hash-mgmt-user <user-name> password hash <hash-password> usertype read-only
hash-mgmt-user <user-name> password cleartext <cleartext-password> usertype read-only
hash-mgmt-user <user-name> password hash <hash-password> usertype guest-mgmt
hash-mgmt-user <user-name> password cleartext <cleartext-password> usertype guest-mgmt
hash-mgmt-user <user-name> password hash <hash-password> usertype local
hash-mgmt-user <user-name> password cleartext <cleartext-password> usertype local
|
Aruba Central supports the use of hash commands with clear text, however, Aruba recommends you to use hash passwords instead of clear text passwords to avoid password disclosures. Aruba Central allows you to re-use the hash from one AP on another AP. All AP templates must include a password command to set a password for the device. The AP template cannot be saved without adding a password command. |