Release Notes

251 | cluster-member-custom-cert Dell Networking W-Series ArubaOS 6.4.x| Reference Guide
cluster-member-custom-cert
cluster-member-custom-cert member-mac <mac> ca-cert <ca> server-cert <cert>
suite-b <gcm-128 | gcm-256>]
Description
This command sets the controller as a control plane security cluster root, and specifies a custom user-installed
certificate for authenticating cluster members.
Syntax
Parameter Description
member-mac <ca>
MAC address of the cluster member
ca-cert <ca>
Name of the CA certificate uploaded via the WebUI
ca-cert <ca>
Name of the CA certificate uploaded via the WebUI
server-cert <cert>
Name of the server certificate uploaded via the WebUI.
suite-b
To use Suite-B encryption in the secure communication between the cluster root
and cluster member, specify one of the following Suite-B algorithms
l gcm-128: Encryption using 128-bit AES-GCM
l gcm-256: Encryption using 256-but AES-GCM
Usage Guidelines
If your network includes multiple master controllers each with their own hierarchy of APs and local controllers,
you can allow APs from one hierarchy to failover to any other hierarchy by defining a cluster of master
controllers. Each cluster will have one master controller as its cluster root, and all other master controllers as
cluster members.
To define a controller as a cluster root, issue one of the following commands on that controller:
l cluster-member-custom-cert: Define the controller as a cluster root, and select a user-installed certificate to
authenticate that cluster member.
l cluster-member-factory-cert: Define the controller as a cluster root, and select a factory-installed certificate
to authenticate that cluster member.
l cluster-member-ip : Define the controller as a cluster root, and set the IPsec key to authenticate that cluster
member.
For information on installing certificates on your controller, refer to the Management Utilities chapter of the Dell
Networking W-Series ArubaOS User Guide.
Example
The following example selects a customer installed certificate for cluster member authentication.
(host)(config) # cluster-member-custom-cert member-mac 00:1E:37:CB:D4:52 ca-cert cacert1
server-cert servercert1