Users Guide

Table Of Contents
216| BranchController Config for Controllers Dell Networking W-Series ArubaOS 6.5.x| User Guide
Table 54: WISPr Authentication Using PAP
When Authentication Servers Are Available
When Authentication Servers Are Not
Available
For a WISPr client authenticated by an external server
using PAP:
l If authentication succeeds, the associated access
credential, along with an encrypted SHA-1 hash of the
password and Key Reply attributes, are stored in the
Survival Server database.
l If authentication fails, the associated access credential
and Key Reply attributes (if they exist) associated with
the PAP method are deleted from the Survival Server
database.
When there is no available in-service server in the
associated server group, the Survival Server
authenticates the WISPr client using PAP.
Upon successful authentication, the Survival Server
uses the previously stored unexpired credential to
perform authentication, and returns the previously
stored Key Reply attributes .
WAN Health Check
The health-check feature uses ping-probes to measure WAN availability and latency on selected uplinks. Based
upon the results of this health-check information, the controller can continue to use its primary uplink, or
failover to a backup link. Latency is calculated based on the round-trip time (RTT) of ping responses. The results
of this health check appear in the WAN section of the Monitoring Dashboard.
For details on configuring this feature using the Smart Config WebUI, see WANHealth Check on page 246.
WAN Optimization through IP Payload Compression
Data compression reduces the size of data frames that are transmitted over a network link, thereby reducing
the time required to transmit the frame across the network. IP payload compression is one of the key features
of the WAN bandwidth optimization solution, which is comprised of the following elements:
l IP Payload Compression
l Traffic Management and QoS
l Caching
WAN optimization through IP payload compression is not support in a W-7205 controller.
Since the branch controller can send traffic to destinations other than the corporate headquarters on the same
link, the preferred method is to enable payload compression on the IPsec tunnel between the branch controller
and the master controller.
IP payload should be enabled only between Dell devices. When this hardware-based compression feature is enabled,
the quality of unencrypted traffic (such as Skype4b or Voice traffic) is not compromised through increased latency or
decreased throughput.
Distributed Layer 3 Branch Deployment Model
In the branch deployment model shown in
Figure 38, the IPsec tunnels are terminated on the master
controller. IPsec tunnels are treated as master-local tunnels.