Event log messages...............................................................................................................................603
Interoperability....................................................................................................................................... 604
IP SLA UDP Jitter and Jitter for VoIP ....................................................................................................604
Overview..................................................................................................................................... 604
Significance of jitter..................................................................................................................... 605
Solution components...................................................................................................................605
SLA Measurements.....................................................................................................................606
Chapter 18 Dynamic Segmentation............................................................ 608
Definition of Terms................................................................................................................................. 608
Overview................................................................................................................................................ 608
Benefits of Dynamic Segmentation........................................................................................................609
Use Cases............................................................................................................................................. 609
Users/Devices and Policy Enforcement Recommendations.................................................................. 611
Colorless Ports.......................................................................................................................................612
Port-Based Tunneling............................................................................................................................ 612
Configuring Port-Based Tunneling.............................................................................................. 613
Operating notes...........................................................................................................................614
Interaction table...........................................................................................................................614
Restrictions................................................................................................................................. 615
Preventing double tunneling of Aruba Access Points................................................................. 616
Preventing double tunneling using device profile............................................................. 617
User-Based Tunneling........................................................................................................................... 620
User Authentication Workflow..................................................................................................... 620
How it works................................................................................................................................621
Licensing Requirements..............................................................................................................622
Dependencies............................................................................................................................. 623
Simplifying User-Based Tunneling with Reserved VLAN............................................................624
Configuration and show commands............................................................................................625
Commands to configure a tunneled node server on the switch....................................... 625
Show commands..............................................................................................................629
Commands to configure VLAN ID in user role................................................................. 635
Tunneled Node profile on a Mobility Controller and Cluster ............................................636
Using User Roles with User-Based Tunneling................................................................. 636
User-Based Tunneling in v6 networks.........................................................................................638
PAPI security..........................................................................................................................................638
Protocol Application Programming Interface (PAPI)....................................................................638
PAPI configurable secret key...................................................................................................... 638
papi-security........................................................................................................................ 639
Frequently Asked Questions..................................................................................................................640
Chapter 19 Cable Diagnostics.....................................................................643
Virtual cable testing................................................................................................................................643
Cable Diagnostics.................................................................................................................................. 643
show cable-diagnostics..........................................................................................................................646
clear cable-diagnostics.......................................................................................................................... 646
Limitations..............................................................................................................................................646
Chapter 20 Virtual Switching Framework (VSF)........................................ 648
List of abbreviated terms........................................................................................................................648
Overview of VSF.................................................................................................................................... 648
Benefits of VSF...................................................................................................................................... 650
VSF domain ID.......................................................................................................................................651
Contents 21