Aerohive Configuration Guide RADIUS Authentication 330068 03
Aerohive Configuration Guide RADIUS Authentication 330068 03
RADIUS Authentication
Aerohive Configuration Guide: RADIUS Authentication | 2
Contents
Contents ...................................................................................................................................................................................................................... 3
over LAN) frames (EAP—Extensible Authentication Protocol—is a Layer 2 authentication protocol) from the supplicant and convert
them to RADIUS packets (RADIUS is a Layer 3 protocol) to send to the RADIUS server. The conversion must be reversed for
messages traveling from the RADIUS server to the supplicant.
The authenticator does not take an active role in the identity verification process; rather, it only acts as a gatekeeper device.
The 802.1X authentication server contains the information used to authenticate the supplicant. If the credentials supplied by the
supplicant match information in the data store, then the authentication server notifies the authenticator that the supplicant is
authorized to access the network; the authenticator in turn notifies the supplicant by means of an EAP-Success frame. If the
credentials do not match, then the authentication server notifies the authenticator that the supplicant has no access to the network;
the authenticator in turn notifies the supplicant by means of an EAP-Failure frame.
Implementing different EAP types changes how the authentication process exchanges occur. For example, when using EAP-TLS
(Transport Layer Security), the server and supplicant have authoritative certificates that each uses to identify the other, so no
username or password is required. The exchange that results necessarily includes much additional information. Similarly, if EAP-
PEAP (Protected EAP)—which uses no client side certificates—is used, then the server and supplicant build a special TLS tunnel
specifically for exchanging identity information and cryptobinding (a verification process that helps prevent man-in-the-middle
attacks). Figure 2 below illustrates the EAP-PEAP process.
To begin, you can configure the network policy, either by creating a new policy or by editing or using a previously created one.
Aerohive also provides a basic working wireless-only network policy called QuickStart-Wireless-Only that you can clone and use to
build a custom network policy, which is the process that Aerohive recommends, and which this example uses. To clone the policy,
highlight the QuickStart-Wireless-Only policy in the Choose Network Policy dialog box, click the More icon that appears as two fitted
gears, and choose Clone from the drop-down list, which creates a copy of the QuickStart-Wireless-Only policy that you can rename,
enter the following information in the New Network Policy dialog box, and then click Clone:
The More icon appears only when you highlight a list item. Hereafter the sequence of cloning a list item is “click More > Clone”.
Name: Corp-Wireless
Description: Enter a helpful description of the policy that you can use for simple reference.
Hive: Choose the hive that you want this policy to govern.
Click the Choose button next to SSIDs, click New, enter the following information, leaving all other settings at their default values,
and then click Save:
SSID: Enter the SSID you want broadcast in beacons and probe responses. HiveManager populates this field with the contents
of the Profile Name field by default, but you can change it.
Because this selection requires you to configure a RADIUS instance, when you select WPA/WPA2
802.1X (Enterprise), HiveManager automatically prepares the appropriate prompts for you to use to
create the RADIUS instance required.
Select Corp-8021X from the Choose SSIDs dialog box, and then click OK to return to the Configure Interface & User Access panel.
Because you selected WPA/WPA2 802.1X (Enterprise), a <RADIUS_Settings> link is now available in the Authentication column.
This link allows you to configure an Aerohive AP to be NAS (network access server). In this role, the Aerohive AP takes EAPOL
request packets from the client, reencapsulates the request as RADIUS packets, and then forwards the requests to the RADIUS
server.
Click <RADIUS_Settings>, and then click New to create a RADIUS client (that is, a NAS, or network access server) with the
settings necessary to communicate with a RADIUS authentication server, enter the following information, and then click Save.
RADIUS Servers
For the Aerohive APs to function as NAS devices, they must be able to find and communicate with the RADIUS server. In
this section you configure the settings necessary for a NAS to find, authenticate, and communicate with the RADIUS
server. To do so, enter the following information in the Add a New RADIUS Server section, leaving all other fields at their
default values, and then click Apply:
The IP address given here is the static IP address of the RADIUS server.
In normal operating circumstances, the shared secret is typically very long and secure. RADIUS
servers use the shared secret to verify that the incoming RADIUS messages are sent by authorized
NAS devices.
The primary RADIUS server is the server that the authenticator queries first when authenticating user.
If you have multiple RADIUS servers acting in backup roles in the event the primary loses connection,
you can configure additional backup RADIUS servers and priority roles on this page as well.
User is not authenticated. If a user fails authentication, then the AP assigns no attribute and denies the user access to the
network.
User is authenticated, but the RADIUS server returns no attribute. Upon successful user authentication, the RADIUS
might be configured not to return an attribute for that particular user or group. When this occurs, you configure the AP to
apply a default user profile to the user. All authenticated users that have no RADIUS attributes returned receive this
profile.
User is authenticated and the RADIUS server returns an attribute. Upon successful user authentication, if the RADIUS
returns an attribute for that user (or the group to which he belongs), then the AP applies the user profile with the
matching attribute to traffic from the user.
Click the Add/Remove link in the User Profile column to choose a user profile, click New, enter the following information, leaving
all others as their default values, and then click Save:
Name: Corp-User-Wireless
Attribute Number: 5
This is the RADIUS attribute you want to map to this user profile. You can configure a RADIUS server
to return a set of three attribute-value pairs that, together, Aerohive devices can use to map to specific
user profiles. For example, if you configure your RADIUS server to return “Tunnel-Medium-Type =
IPv4”, “Tunnel-Type = GRE”, and “Tunnel-Private-Group-Id = ‘5’" on successful authentication,
Aerohive devices automatically decode this to mean that the authenticated user receives the user
profile with an attribute of 5.
This example assigns authenticated user traffic to VLAN 1, which is the default VLAN for most
networks. If your network uses a different default VLAN, or if you have a specific VLAN already
configured on your network that you want to use for this configuration, enter the VLAN ID here.
The settings available within the Management VLAN, L2 VPN, and Additional Settings sections are not required to be adjusted and
can be left unconfigured.
To update your APs, click the Configure & Update Devices collapsible tab at the bottom of the Configuration module, select the
check boxes next to the APs you want to update, and then click Upload.
For more information on installing and configuring the CVG, please refer to the Aerohive Deployment Guide.
After you configure the CVG and verify that it has a CAPWAP connection to HiveManager, you can continue with the configuration
of the APs and routers.
If you followed the steps in the Aerohive Deployment Guide to install and configure the CVG and used the names provided in the
procedure, then you have already created a cloned a network policy (QuickStart-Wireless-Routing2), and can use that network
policy here by highlighting the name, clicking OK, and then skipping to step 4 below.
To clone the QuickStart-Wireless-Routing network policy highlight QuickStart-Wireless-Routing in the dialog box, and then click
More > Clone, enter the following information in the Clone Network Policy dialog box, and then click Clone:
Name: Corp-Net-Routing
Description: Replace the default description with a helpful description of the policy that you can use for later reference.
Hive: Choose the hive that you want this policy to govern.
When you click Clone, the New Network Policy dialog disappears and your new policy becomes available in the Choose Network
Policy dialog box. Highlight Corp-Net-Policy, and then click OK.
Click the Choose button next to SSIDs, click New, enter the following information, leaving all other settings at their default values,
and then click Save:
SSID: Corp-8021X-2
HiveManager populates this field with the contents of the Profile Name field by default, but you can
change it.
By default, both QS-SSID and Corp-8021X-Routing SSIDs are highlighted. Highlight Corp-8021X-Routing only in the Choose SSIDs
dialog box, and then click OK to return to the Configure Interface & User Access panel.
Because the Corp-RADIUS-Profile configuration is defined in the previous example, you do not need to configure a new RADIUS
server for this example. To use the existing Corp-RADIUS-Profile settings, click <RADIUS_Settings>, highlight Corp-RADIUS-
Profile in the dialog box, and then click OK.
You can view the details of the existing configuration by referring to the “Configuring the RADIUS settings” section on page 8.
The user profile contains, at minimum, the attribute number and VLAN information that the Aerohive authenticator uses to identify
the user and applies to user traffic on successful authentication. An Aerohive device can assign different user profiles to a user
based on the attributes that the RADIUS server returns: if the RADIUS authenticates a user and returns a specific attribute value,
the AP maps the user profile containing the matching attribute number and applies it to the user. As explained in the “Configuring
the User Profile“ section on page 9, you can assign a default profile for authenticated users for whom the RADIUS server returns
no attributes, and explicitly specify user profiles for users according to attributes that the RADIUS server returns on
authentication.
To configure a user profile for the LAN ports, return to the Configure Interfaces & User Access panel (by clicking Configuration to
display the guided configuration module, and expanding the Configure Interfaces & User Access panel), click the Add/Remove link in
the User Profile column to choose a user profile, click New, enter the following information, leaving all others as their default
values, and then click Save:
Name: Corp-User
Attribute Number: 10
This is the RADIUS attribute you want to map to this user profile. You can configure a RADIUS server
to return a set of three attribute-value pairs that, together, Aerohive devices can use to map to specific
user profiles. For example, if you configure your RADIUS server to return “Tunnel-Medium-Type =
IPv4”, “Tunnel-Type = GRE”, and “Tunnel-Private-Group-Id = ‘10’" on successful authentication,
Aerohive devices automatically decode this to mean that the authenticated user receives the user
profile with and attribute of 10.
Because you cannot use a wireless only user profile in a wireless routing network, you must either use
the built-in QS-176.28.0.0/16 network or create a new network here. In this example you create a new
10.0.0.0/16 network. In more complex networks or environments you have the option of creating
additional custom networks.
When you click New ( + ) to create a new network, a new dialog box appears. To create a new 10.0.0.0/16 network, enter
the following information:
Name: 10.0.0.0/16
You can enter any name you choose up to 32 characters long; however, using the actual network name
and prefix of the network you intent to use is generally more intuitive for most implementations.
Subnetworks
In this example, you create a single 10.0.0.0/16 network to replace the default network of 176.28.0.0/16.
To configure this network, do the following:
1. Configure the network you want to use. To do this, click New, enter the following information, and then click
Save:
IP Network: 10.0.0.0/16
IP Address Allocation: Position the slider to configure 256 branches with 253 clients per branch.
Each position on the slider represents the netmask of each possible subnet, doubling or halving the
number of branches. Moving the slider to the right increases the number of subnets, whereas moving
the slider to the left decreases the number of subnets you configure. Because the total number of IP
addresses is constant (defined by the IP Network value), increasing the number of branches decreases
the number of clients per branch.
Enable DHCP server: (select)
When Enable DHCP server is selected, the router acts as a DHCP server, providing IP addresses to
DHCP clients on the network. For each subnet, the router reserves the first available IP address in the
subnet for itself.
2. Remove the default network. To do this, select the 172.28.0.0/16 network, and then click Remove.
Click Save to create the network and return to the user profile configuration.
After you create the user profile, you are returned to the Choose User Profiles dialog box. Click the Default tab on the left side of the
dialog box, highlight Corp-User(10), and then click Save.
You must select one and only one default user profile. If you only create one user profile for use in your network, then that user
profile must be the default. When you create a user profile, then user profile appears in the selection dialog box with the attribute in
parentheses for your convenience.
To configure an Ethernet port, click the Choose button next to LANs, click New, enter the following information, leaving all other
settings at their default values, and then click Save:
Interfaces: Highlight ETH1 and ETH2. Click ETH3 and ETH4 to clear the selections.
By default, both QS-LAN and Corp-8021X-LAN profiles are highlighted. Highlight Corp-8021X-Routing only in the Choose LANs
dialog box, and then click OK to return to the Configure Interface & User Access panel.
Because the Corp-RADIUS-Profile configuration is already defined, you do not need to configure a new RADIUS server in
HiveManager. To use the existing Corp-RADIUS-Profile settings, click <RADIUS_Settings>, highlight Corp-RADIUS-Profile in the
dialog box, and then click OK.
You can view the details of the existing configuration by referring to the “Configuring the RADIUS settings” section on page 8.
You can use the same user profile on the LAN ports that you use on the SSIDs, or you can create custom user profiles for use
specifically with the LAN ports. In this example you choose the same user profiles (Corp-User) that was chosen for use with the
SSID in step 2.
To choose the existing user profile, click Add/Remove in the User Profile column of the Router LAN Ports section, click the Default
tab on the left side of the dialog box, highlight only Corp-User, and then click Save.
Because the network is defined within the user profile, choosing the Corp-User user profile sets the network automatically. In
addition, because you cloned a functioning network policy (QuickStart-Wireless-Routing), the settings available within the
Management VLAN, Router Firewall, Layer 3 IPsec VPN, and Additional Settings sections are not required to be adjusted futher
and can be left unconfigured.
To update your APs, click the Configure & Update Devices collapsible tab at the bottom of the Configuration module, select the
check boxes next to the APs you want to update, and then click Upload.
If you do not want to transmit the IP address of the RADIUS server through the DHCP options, then you also have the option of
configuring your Aerohive devices with the network settings of your RADIUS server, as explained in Example 2, “Example 2:
Remote Site Authentication” on p. 10.
The BR200 and BR200-WP routers, and devices configured as routers support advertising the RADIUS service through DHCP
options, but the BR100 routers do not.
When you enable this functionality on the router, the router responds to the DHCP requests of the APs with a typical offer of an IP
address (for the AP), netmask, default gateway, and so on; however, the router adds additional fields and inserts its own IP
address, which the AP uses to direct all future RADIUS requests to the router. Figure 5 on the next page shows the DHCP options
that the AP is configured to use (left), as well as a sample set of DHCP options returned by the router in its DHCP messages (right).
You can see these settings by logging in to the respective devices and entering the following commands—also represented in the
Figure 5 on the next page in bold text—at the command line:
1. DHCP Discover: The AP sends a DHCP Discover message (see Figure 6, step 1), which is a broadcast message that informs
any DHCP servers on the network that the AP is attached to the network and has no network settings. This message does not
request network settings from the server.
2. DHCP Offer: In response, the router reserves an IP address, and then offers to lease the AP network settings for a specific
length of time. In addition, the router also includes the specific options that direct the AP to use the router as its RADIUS
authentication (option 230) and accounting (option 231) server. If there are multiple DHCP servers, the AP might receive
multiple offers.
3. DHCP Request: The AP responds in turn with a formal request to use the network settings the DHCP server offered. This
message is not only a response to the router, but is also a notification to other DHCP servers, if present, that they may now
release any DHCP offers they made to the AP.
4. DHCP ACK: As a final step, the DHCP server acknowledges the request and reiterates the DHCP options sent previously in the
DHCP Offer. When the AP receives this message, it sets its network setting accordingly.
Configuration Steps
When configuring RADIUS authentication, you must do so in the following order:
1. Clone a working network profile for use in the new configuration
2. Create a local user data store on the Aerohive RADIUS server or point the Aerohive RADIUS server to an existing user
database server
3. Create a network policy, SSID, and RADIUS service
4. Configure a user profile and a network
5. Upload the configuration and users (for local RADIUS authentication) or certificates (for use with an external user database
server)
Because the changes in the work flow impact steps one, three, and four the most, they are treated here in detail. Steps two and five
are presented here as overviews of the process with directions on how to find detailed information in the Help system.
Name: 10.1.0.0/16
You can enter any name you choose up to 32 characters long; however, using the actual network name
and prefix of the network you intent to use is generally more intuitive for most implementations.
Subnetworks
In this example, you create a single 10.1.0.0/16 network to replace the default network of 176.28.0.0/16. To configure this
network, do the following:
1. Configure the network you want to use. To do this, click New, enter the following information, and then click Save:
IP Network: 10.1.0.0/16
IP Address Allocation: Position the slider to configure 256 branches with 253 clients per branch.
Each position on the slider represents the netmask of each possible subnet, doubling or halving the
number of branches. Moving the slider to the right increases the number of subnets, whereas moving
the slider to the left decreases the number of subnets you configure. Because the total number of IP
addresses is constant (defined by the IP Network value), increasing the number of branches decreases
the number of clients per branch.
When Enable DHCP server is selected, the router acts as a DHCP server, providing IP addresses to
DHCP clients on the network. For each subnet, the router reserves the first available IP address in the
subnet for itself.
2. Remove the default network from the network policy. To do this, select the 172.28.0.0/16 network, and then click
Remove.
1. To create a new network policy, click Configuration > New, enter the following information, and then click Create:
Name: Corp-Network
Description: Enter a note about the network policy for future reference.
Hive: Choose the hive that you want to assign to devices to which you apply this policy.
When you create your network policy, HiveManager returns you to the Choose Network Policy panel with your new policy
already highlighted in the dialog box. Click OK to continue to the Configure Interfaces & User Access panel.
If you do not see your new network policy in the list, you might need to scroll down the list to find it.
2. To create a new SSID that uses a local RADIUS server, click the Choose button next to SSIDs, click New to create a new SSID,
enter the following information, leaving all other settings at their default values, and then click Save:
SSID: By default, HiveManager automatically populates this field with the SSID profile name that you enter. You can change the
SSID name if you choose.
Description: Enter a brief description of the SSID profile for future reference.
3. When you save your new SSID, HiveManager displays the Choose SSIDs dialog box. Choose the SSID profile that you just
created, and then click OK.
4. To configure RADIUS settings, click <RADIUS_Settings>, click New, enter the following information, and then click Save:
Name: Employee-RADIUS
When you select this, the APs receive information regarding the network settings of the RADIUS
server running on the router through the DHCP messages they receive. For example, if the router gets
an IP address of 10.1.10.1/24 for its mgt0 interface, which is the interface to which the APs in the same
management network can connect, then the router passes that information to the APs along with other
options such as default gateway and DNS server information. When the APs have this information, they
have everything they need to act as RADIUS authenticators and process authentication exchanges
between RADIUS supplicants and the RADIUS authentication server (that is, the router). Clearing this
check box disables the automatic process and prompts you to configure the RADIUS server manually.
5. To create a RADIUS server that runs on the router, click the Modify button at the bottom next to Additional Settings, expand the
Router Settings section, enter the following information, and then click Save:
RADIUS Service: Click the New ( + ) icon to create a new RADIUS server instance, enter the following information, and then
click Save:
Name: Aerohive-RADIUS
A single External Database tab appears containing configuration options. Although this configuration example uses only an
external database, you can configure the router to use multiple databases. When you do this, multiple tabs appears in the
Database Settings section, and there are considerations of priority in terms of which database the router uses in what
order. You can find more information on these priorities in the Help system.
Under the External Database tab, select the appropriate radio button for the type of server (Active Directory, LDAP Server,
or Open Directory) against which you are authenticating users. The configuration controls under the tab change according
to the type of authentication server you select.
Select the user database server that you want to use from the drop-down list. If the server is not listed, you can create it
by clicking the New ( + ) icon. For information about configuring user database servers, see the detailed Help system
information at Configuration > Advanced Configuration > Authentication > Defining HiveAP AAA Server Settings.
To configure a user profile for the LAN ports, return to the Configure Interfaces & User Access panel (by clicking Configuration to
display the guided configuration module, and expanding the Configure Interfaces & User Access panel), click the Add/Remove link in
the User Profile column to choose a user profile, click New, enter the following information, leaving all others as their default
values, and then click Save:
Name: Corp-Employee
Attribute Number: 15
This is the RADIUS attribute you want to map to this user profile. You can configure an LDAP or Active
Directory server—as you can a RADIUS server—to return attributes that Aerohive devices can use to
map to specific user profiles. For example, if you configure your LDAP server to return
“radiusCallbackNumber: ‘15’" on successful authentication, Aerohive devices automatically decode this
to mean that the authenticated user receives the user profile with and attribute of 15.
Choose the 10.1.0.0/16 network you created in step 1 from the drop-down list. In more complex
networks or environments you have the option of creating additional custom networks and
subnetworks.
After you create the user profile, you are returned to the Choose User Profiles dialog box. Click the Default tab on the left side of the
dialog box, highlight Corp-Employee(15), and then click Save.
To update your APs, click the Configure & Update Devices collapsible tab at the bottom of the Configuration module, select the
check boxes next to the APs you want to update, and then click Upload.
To integrate an Aerohive RADIUS and an Active Directory server, you must have your Active Directory server running with at least
the following two user accounts (the account user names can be anything you choose):
Aerohive administrator: You must create an account whose minimum privileges include the ability to add computers to the
domain. When you join your Aerohive RADIUS to the domain, the Active Directory server uses this account to add it to the
domain, and places it in the Computers OU by default. You can change the OU when you configure the Active Directory setting
on the Aerohive RADIUS server.
Aerohive user: You must also create a limited user account whose minimum privileges include the ability to perform user
lookups in the Active Directory user database. When a user authenticate to Active Directory through the Aerohive RADIUS
server, Active Directory uses this account to verify that the identity of the user attempting to log in.
Configuration Steps
When configuring RADIUS authentication, you must do so in the following order:
1. Clone a working network profile for use in the new configuration
2. Create a local user data store on the Aerohive RADIUS server or point the Aerohive RADIUS server to an existing user
database server
3. Create a network policy, SSID, and RADIUS service
4. Configure a user profile and a network
5. Upload the configuration and users for local RADIUS authentication and certificates for use with an external user database
server
6. Install the Root Certificate on a Windows Client
Because the changes in the work flow impact steps one, three, and four the most, they are treated here in detail. Steps two and five
are presented here as overviews of the process with directions on how to find detailed information in the Help system.
Name: 10.2.0.0/16
You can enter any name you choose up to 32 characters long; however, using the actual network name
and prefix of the network you intent to use is generally more intuitive for most implementations.
Subnetworks
In this example, you create a single 10.2.0.0/16 network to replace the default network of 176.28.0.0/16. To configure this
network, do the following:
Configure the network you want to use. To do this, click New, enter the following information, and then click Save:
IP Network: 10.2.0.0/16
IP Address Allocation: Position the slider to configure 256 branches with 253 clients per branch.
Each position on the slider represents the netmask of each possible subnet, doubling or halving the
number of branches. Moving the slider to the right increases the number of subnets, whereas moving
the slider to the left decreases the number of subnets you configure. Because the total number of IP
addresses is constant (defined by the IP Network value), increasing the number of branches decreases
the number of clients per branch.
When Enable DHCP server is selected, the router acts as a DHCP server, providing IP addresses to
DHCP clients on the network. For each subnet, the router reserves the first available IP address in the
subnet for itself.
Remove the default network from the network policy. To do this, select the 172.28.0.0/16 network, and then click Remove.
1. To create a new network policy, click Configuration > New, enter the following information, and then click Create:
Name: Corp-Network
Description: Enter a note about the network policy for future reference.
Hive: Choose the hive that you want to assign to devices to which you apply this policy.
When you create your network policy, HiveManager returns you to the Choose Network Policy panel with your new policy
already highlighted in the dialog box. Click OK to continue to the Configure Interfaces & User Access panel.
If you do not see your new network policy in the list, you might need to scroll down the list to find it.
2. To create a new SSID that uses a local RADIUS server, click the Choose button next to SSIDs, click New to create a new SSID,
enter the following information, leaving all other settings at their default values, and then click Save:
SSID: By default, HiveManager automatically populates this field with the SSID profile name that you enter. You can change the
SSID name if you choose.
Description: Enter a brief description of the SSID profile for future reference.
3. When you save your new SSID, HiveManager displays the Choose SSIDs dialog box. Choose the SSID profile that you just
created, and then click OK.
4. To configure RADIUS settings, click <RADIUS_Settings>, click New, enter the following information, and then click Save:
Name: Employee-RADIUS-2
When you select this, the APs receive information regarding the network settings of the RADIUS
server running on the router through the DHCP messages they receive. For example, if the router gets
an IP address of 10.1.10.1/24 for its mgt0 interface, which is the interface to which the APs in the same
management network can connect, then the router passes that information to the APs along with other
options such as default gateway and DNS server information. When the APs have this information, they
have everything they need to act as RADIUS authenticators and process authentication exchanges
between RADIUS supplicants and the RADIUS authentication server (that is, the router). Clearing this
check box disables the automatic process and prompts you to configure the RADIUS server manually.
5. To create a RADIUS server that runs on the router, click the Modify button at the bottom next to Additional Settings, expand the
Router Settings section, enter the following information, and then click Save:
RADIUS Service: Click the New ( + ) icon to create a new RADIUS server instance, enter the following information, and then
click Save:
Name: Aerohive-RADIUS-2
A single External Database tab appears containing configuration options. Although this configuration example uses
only an external database, you can configure the router to use multiple databases. When you do this, multiple tabs
appears in the Database Settings section, and there are considerations of priority in terms of which database the
router uses in what order. You can find more information on these priorities in the Help system.
Click New ( + ) to create a new Active Directory server, enter the following information, and then click
Save:
Name: BR-AD
IP Address: 172.18.0.1
The correct IP address appears in the field by default. Leave the IP address as the default setting.
Netmask: 255.255.0.0
The DNS service is provided by the Active Directory server. If you enter the IP address of another DNS
server, then the authentication will fail.
Domain: Enter the domain to which the user authenticates (for example, aerohive.com)
Click Retrieve Directory Information to have HiveManager query the Active Directory server for the
BaseDN and organizational unit where the Aerohive router information will be stored.
Domain Admin: Enter the username of an Active Directory use with administrator privileges.
Password: Enter the password of the user entered in the previous step.
Click Join to join the Aerohive router to the Active Directory domain.
Domain User: Enter the username of an Active Directory user. The Aerohive router and Active
Directory use this account to look up and validate users in the Active Directory user database.
Click Validate User to ensure that the user is configured properly, and that the user information on the
Aerohive router and the Active Directory user database match.
For more information about configuring user database servers, see the detailed Help system information at
Configuration > Advanced Configuration > Authentication > Defining HiveAP AAA Server Settings.
Ensure that Aerohive-RADIUS-2 from the RADIUS Service drop-down list before you click Save to save your
changes.
To configure a user profile for the LAN ports, return to the Configure Interfaces & User Access panel (by clicking Configuration to
display the guided configuration module, and expanding the Configure Interfaces & User Access panel), click the Add/Remove link in
the User Profile column to choose a user profile, click New, enter the following information, leaving all others as their default
values, and then click Save:
Name: Corp-Employee-2
Attribute Number: 25
After you create the user profile, you are returned to the Choose User Profiles dialog box. Click the Default tab on the left side of the
dialog box, highlight Corp-Employee(25), and then click Save.
Click Continue.
To update your APs, click the Configure & Update Devices collapsible tab at the bottom of the Configuration module, select the
check boxes next to the APs you want to update, and then click Upload.
1. To download the root certificate, click Configuration > Show Nav > Advanced Configuration > Keys and Certificates >
Certificate Management, select Default_CA.pem, and then click Export. When prompted for the save location, save the file on
the desktop or in another location that is easy to find. Because Windows clients do not recognize the .pem extension, rename
the Default_CA.pem file to Default_CA.cer.
2. To install the certificate, simply double click the Default_CA.cer file, and then click Install Certificate when prompted. This
starts the Certificate Import Wizard. Click Next.
3. When you are prompted to choose a certificate store, select Place all certificates in the following store, click Browse, select
Trusted Root Certification Authorities (the default location), click OK, and then click Next.
4. Complete the importation by clicking Finish to close the wizard, clicking Yes to acknowledge the security warning, and then
clicking OK.
You can verify the validity of the certificate by opening the Default_CA.cer file again to view the contents. Under the General
tab, a valid certificate is issued to HiveManager, issued by HiveManager, and has a valid date range within which today’s date
lies; under the Details tab in the Subject field, the certificate contains HiveManager and location information.