Aruba IAP VPN Solution Guide For Teleworkers and Home Offices
Aruba IAP VPN Solution Guide For Teleworkers and Home Offices
This product includes code licensed under the GNU General Public License, the GNU Lesser General Public
License, and/or certain other open source licenses. A complete machine-readable copy of the source code
corresponding to such code is available upon request. This offer is valid to anyone in receipt of this information
and shall expire three years following the date of the final distribution of this product version by Hewlett-
Packard Company. To obtain such source code, send a check or money order in the amount of US $10.00 to:
Hewlett-Packard Company
Attn: General Counsel
6280 America Center Drive
San Jose, CA 95002
USA
Please specify the product and version for which you are requesting source code.
| 2
Contents
Contents 3
Revision History 4
Solution Overview 1
Network Services 2
Solution Architecture 3
Forwarding Modes 4
L2 Redundancy 14
L3 Redundancy 15
Device Provisioning 25
Administrator Workflow 25
Site Creation 25
Invite Installers 26
Provisioning 27
Important Considerations 28
Central Subscriptions 28
Contents | 3
Revision History
Revision History | 4
Chapter 1
Solution Overview
Remote offices and teleworkers generally have a need for secure communication with the centralized
corporate network. For branch offices, this secure connectivity is typically provided through solutions such as
SD-WAN, where overlay networks are established over private WANs, MPLS networks or the public Internet. In
contrast, remote teleworkers require the same secure connectivity to the corporate network but are limited to
public Internet connectivity options. Each teleworker connects to the Internet via last-mile options based on
their geographic location and service provider.
The Aruba SD-Branch solution seeks to provide a complete suite of solutions for all the needs in a distributed
enterprise. From the road warrior that needs VPN connectivity to access corporate resources to the larger
branches, that may need redundant gateways as well as the complete cloud-managed LAN/WLAN. This, of
course, includes the case of micro-branches such as a small office or a teleworker office, where the branch
network could be built with as little as a single AP using IAP-VPN technology.
Aruba Instant is a powerful platform which is fully capable of providing secure wireless connectivity to either
remote branch offices or teleworkers.
n Branch Offices – Typically employ multiple Intant APs (IAPs) depending on the number of users and the size
of the branch.
n Teleworkers – Typically employ a single IAP single per teleworker. The model of IAP is dependent on the
available connectivity options.
Aruba Instant is designed to alleviate the complexity associated with deploying site-to-site IPsec VPNs through
native VPN capabilities and zero-touch provisioning. These attributes greatly reduce the challenges that
normally come along with deploying IPsec VPN by reducing deployment costs and eliminating the complexity
that is normally associated with traditional IPsec VPN branch or teleworker deployments.
When a VPN is configured, the IAP creates a VPN tunnel over the Internet to a VPN Concentrator (VPNC)
deployed in a corporate office data center. The VPNC exclusively functions as a VPN endpoint and does not
Solution Overview | 1
supply the IAP with any configuration. Aruba Central provides all management, configuration and monitoring
of both the IAPs and VPNCs.
Network Services
With an IAP VPN-based solution, enterprises can quickly and easily extend corporate network services to
remote teleworkers over a secure VPN connection. Depending on the IAP model they deploy, organizations can
offer employees Wi-Fi and wired connectivity options and provide the same connection experience as
employees working in the corporate office.
n Wi-Fi – Provides secure authenticated access to corporate, employee and BYOD SSIDs.
n Wired – Connects desktop PCs, VoIP phones or telepresence devices. Supports MAC and 802.1X
authentication.
The types of radios and port configurations that are available differ by the model of Access Point. For
deployment flexibility, Aruba offers Wi-Fi 5 and Wi-Fi 6 AP models in a variety of configurations and form
2 | Solution Overview
factors. While any Aruba AP can be considered, for remote teleworker deployments, the 203R,
203H and 303H models are generally preferred as these models can be easily placed on a desk and
offer additional Ethernet ports. The 203R and 303H also provide 802.3af PoE to power a VoIP phone, if
required. Your implementation may include a single AP model or different AP models. Both deployment
options are fully supported with this solution, allowing you to deploy the AP model that works best for each
teleworker's needs.
Solution Architecture
The IAP VPN tunnel architecture includes the following three components:
1. Aruba Central – Provides configuration, management, monitoring and insights for the solution.
2. Instant APs – For this guide, it is assumed that one IAP is deployed at each teleworker site.
3. VPN Concentrators – One or more VPNCs are deployed in data centers. D
The IAP at the teleworker site serves as the VPN endpoint, and the gateway located in the datacenter serves as
the VPN concentrator. When an IAP is set up for a VPN, it forms an IPsec tunnel to a gateway in the data center
to secure sensitive corporate data.
IPsec authentication and authorization between the VPNC and the IAP is based on a whitelist configured in
Aruba Central. From the VPNCs perspective, the IAPs that form the VPN tunnels are considered VPN clients.
The VPNCs purpose in this scenario is to terminate VPN tunnels as well as route or switch VPN traffic into the
data center. The IAP creates an IPsec or GRE VPN tunnel from the remote site to the VPNC. The VPNC only acts
as an IPsec or GRE VPN endpoint. It does not provide any configuration or management for the IAP. The figure
below provides a visual depiction of the IAP VPN tunnel architecture:
Solution Overview | 3
Figure 3 IAM Solution Architecture
Forwarding Modes
Instant APs support four forwarding modes to accommodate various branch use-cases. Each forwarding mode
determines whether the DHCP server and default gateway for the clients reside in the branch or in the data
center. (These modes do not determine the firewall processing or traffic forwarding functionality.) The IAP
enables different DHCP pools (various assignment modes) and allocatie IP subnets for each branch. The VPNC
allows different traffic forwarding modes from clients on a VLAN based on the DHCP scope configured on the
Instant AP.
For the remote teleworker solution, Aruba recommends the centralized Layer 2 or distributed Layer 3
forwarding modes. Both of these forwarding options are simple to deploy, easy manage, and securely extend
the corporate IP network to the remote teleworker clients. Unlike other remote access solutions that rely on
NAT translation, the remote teleworker devices are assigned an IP address from the corporate network.This
provides several benefits:
4 | Solution Overview
n IT staff can apply policies in the data center to determine which applications teleworkers can access the
same way as if they are in the office.
n IT teams can provide support for remote teleworkers by permitting remote access into managed assets.
n Real-time voice and video communications are permitted over the VPN network.
A full description of each forwarding mode is captured in the Aruba Instant Validated Reference Design v2.0 guide.
While the local, distributed Layer 2 and centralized Layer 3 modes are valid for remote teleworker deployments, the
centralized Layer 2 and distributed Layer 3 forwarding modes are the most commonly deployed.
Centralized Layer 2
Centralized Layer 2 forwarding extends the corporate VLAN or broadcast domain to remote teleworkers. The
DHCP server and default gateway for the remote clients reside in the datacenter. Depending on the datacenter
architecture, either the VPNC or an upstream router acts as the gateway for clients. DHCP services are provided
by the existing corporate DHCP / IP Address Management (IPAM) system.
A centralized Layer 2 deployment offers two options for forwarding remote teleworker traffic:
n Full-Tunnel Mode – All traffic is forwarded by the IAP through the IPsec tunnel to the default gateway in
the data center. This option is typically selected by organizations that prefer to exercise more control over
traffic by having it forwarded to the datacenter for additional inspection.
n Split-Tunnel – All corporate traffic is forwarded by the IAP through the IPsec tunnel to the default gateway
in the data center while Internet traffic is NAT translated and forwarded locally. This option is preferred by
organizations that utilize cloud hosted applications thus offloading overhead from the corporate network
or where full control / inspection over Internet traffic is less of a concern.
Deciding which mode to implement will primarily depend on your organizations security policy. It is important
to note that these forwarding options are defined per Centralized L2 DHCP scope / VLAN in Central. This allows
the forwarding behavior to be assigned on a per-client basis based on VLAN assignments from AAA. This
provides full flexibility by allowing administrators to require full-tunnel mode for some client devices while
permitting split-tunneling for others. The IAP provides deep packet inspection and full control as to which
teleworker traffic is permitted or denied for each path, regardless of which forwarding mode is selected.
An overview of the centralized Layer 2 forwarding architecture is provided in the figure below. Centralized
Layer 2 forwarding is the simplest forwarding option to implement as the corporate subnet resides in the
datacenter. No routing is performed between the IAP and VPNC, however the inner-IP and centralized Layer 2
subnets are typically advertised by the datacenter router into the datacenter using OSPFv2 or BGP4. Static
routing is also an option for smaller environments. All teleworker traffic is encapsulated in GRE inside an IPsec
tunnel to the datacenter. The VLAN, IP subnet, DHCP server and default gateway all reside in the datacenter.
Solution Overview | 5
Figure 4 Centralized Layer 2 Forwarding Mode
1. A centralized VLAN 1020 has been defined in the data center with the subnet 10.20.0.0/22. It will
accommodate up to 1,000 client devices.
2. A DHCP scope is configured on the DHCP server with the appropriate DHCP options.
3. A Centralized Layer 2 DHCP scope is created in the AP Group in Central that defines the VLAN ID and
optionally enables split-tunneling.
4. The Centralized Layer 2 DHCP scope is assigned to WLAN and if required wired port profiles.
An example topology and address allocation is provided in the following figure:
6 | Solution Overview
Figure 5 Centralized Layer 2 Deployment Example,
Distributed Layer 3
Distributed Layer 3 forwarding differs from centralized Layer 2 forwarding by assigning a dedicated subnet for
each teleworker site which is used by clients. However, unlike traditional branch deployment which often
requires manual subnet assignments for each site, this process is fully automated. This is achieved by
establishing a master subnet for all the teleworkers upon which smaller subnets are sub-allocated to each IAP.
Enabling automation in this manner eliminates the cost and the complexity associated with a classic site-to-site
VPN routed deployment.
Solution Overview | 7
With distributed Layer 3 forwarding, the IAP manages the dedicated subnet in addition to serving as the DHCP
server and default gateway for clients. Client traffic destined for data center resources is routed to the VPNC
through the IPsec tunnel, which then routes the traffic to the appropriate corporate destination. When an IAP
registers with the VPNC, a route is automatically added to enable the routing of traffic from the corporate
network to clients on the local subnet of the branch. The routes from each teleworker site are redistributed
into the data center using OSPFv2 or BGP4. Static routing is also supported for smaller deployments.
Any traffic destined for the Internet or a local destination is source NATed using the local IP address of the IAP
and locally bridged. The WLAN controller in the data center is aware of the Layer 3 subnet at each branch and
can redistribute these routes to upstream datacenter routers using OSPFv2 or BGP4. All client traffic can be
forwarded through the IPsec tunnel or bridged locally, if required.
One important aspect of a distributed Layer 3 deployment model is the subnet allocation. Each IAP is allocated
a small pool of addresses from a master subnet that is defined in the DHCP pool configured in Aruba Central.
The scope of the master subnet is based on the numbers of IAPs and addresses that need to be supported. For
example, an organization that needs to support 256 remote teleworkers who could each have up to four
devices would require a /21 range, where each IAP would be automatically allocated a /29 subnet. The IAP
assumes the first address in the range. Some examples are provided in the table below:
8 | Solution Overview
Table 1: Distributed L3 Pool Examples
Number Required Resulting IAP Avail. Addresses /
Example IP Range
of IAPs Clients/Branch Subnet Size IAP
Each subnet is assigned to IAPs on the first come, first serve basis using Branch-ID (BID) allocation, twhich is he
process used by the master AP and controller to determine the subnet/IP addresses used in a branch. Once a
subnet has been allocated to an IAP, it is persistent. Once a pool has been registered, it is added as a route in
the VPNC which can be redistributed into the datacenter using OSPFv2 or BGP4 for reachability. Route costs
are utilized when multiple datacenters and VPNCs are deployed.
Subnet allocation follows standard CIDR allocation rules. When entering the number of clients per branch, Central
adds an additional IP for the IAP. For example, entering 6 will result in a /28 subnet being allocated as 7 addresses
are required which cannot be satisfied with a /29 subnet.
DHCP options can be configured with the distributed Layer 3 forwarding mode to support VoIP phones if required.
n A distributed Layer 3 Layer 2 DHCP scope is created in the AP Group to allocate a /29 subnet per branch:
l VLAN ID: 1020
l IP Range: 10.20.0.0 – 10.20.7.255 (/21)
l Clients per branch: 4
n The distributed Layer 3 scope is assigned to the WLAN (and wired port profiles, if required).
An example topology and resulting subnet allocation is provided in the following figure:
Solution Overview | 9
Figure 7 Distributed Layer 3 Deployment Example
10 | Solution Overview
Chapter 2
Data Center Architectures
With the IAP VPN solution, VPN tunnels are established from the IAPs to VPNCs to create an overlay network.
This overlay network is used to securely transport traffic forwarded between the teleworkers and data centers.
Data centers typically consist of corporate headquarters or computer rooms that include one or more VPN
Concentrators. Larger organizations may include additional data centers that provide additional layers of
redundancy in the event of any primary data center failures.
The Aruba IAP VPN solution supports a hub-and-spoke architecture where the VPN tunnels are established
between IAPs (spokes) and VPNCs (hubs). All IAP VPN deployments include at least one hub site, with one or
more VPNCs installed, that terminates IPsec based VPN tunnels initiated from the IAPs installed at the
teleworkers homes. The number of VPNCs that are deployed in each hub site depend upon the size and
redundancy needs of the deployment. The most basic IAP VPN deployment consists of one VPNC installed at a
hub site that services all the IAPs. An optional layer 2 redundancy is provided by installing a second VPNC at the
hub site.
Larger IAP VPN deployments often include a secondary hub site providing additional failover and recovery in
the event of a primary hub failure. The most typical deployments consist of a primary and secondary hub each
with standalone or layer 2 redundant VPNCs .
Finally, the Aruba Micro-Branch Solution can also leverage Headend Gateways (or VPN Concentrators) in Public
Cloud environments such as AWS or Azure. In such environments, Aruba Central can handle the full life cycle of
the Aruba Virtual Gateways (Aruba VPNCs in AWS or Azure): from the initial bring up and provisioning through
the regular management (as if it were another VPNC in the network), and to even handle failover in HA
scenarios.
In this process, Aruba Central connects to the customer AWS or Azure account to have visibility over it and
provision the VM together with the necessary interfaces, subnets, elastic-IP mappings, and so on. This provides
In summary, Aruba Virtual Gateways would behave like Aruba VPNCs deployed in the customer’s Public Cloud.
Additional details on Virtual Gateway Orchestration and Public Cloud integration can be found in Tech Notes as well
as the Aruba Central documentation.
When L2 redundant VPNCs are deployed, the VPN tunnels from the IAPs are terminated on the VRRP virtual IP
rather than the real IP of the VPNC that is the VRRP master. (The VNPC that is the VRRP master terminates the
VPN tunnels and forwards the traffic during normal operation.) As most VPNCs are deployed behind an
Internet edge firewall, a port-forwarding rule is configured to permit UDP4500 traffic from an outside public IP
address to the VRRP virtual IP.
L3 Redundancy
Larger IAP VPN deployments may include a secondary hub site for additional failover and recovery. The
secondary hub site can include a standalone or L2 redundant pair of VPNCs as required. This deployment
model is often referred to as Layer 3 redundancy since OSPFv2 or BGP4 route costs in the corporate network
are used to determine which hub site is actively forwarding traffic to the teleworker sites.
In an L3 redundancy deployment, each IAP has a VPN tunnel established to the primary and secondary hub
sites. The VPNCs in each hub are configured with route policies that redistribute the teleworker subnets into
the datacenter network via OSPFv2 or BGP4 at different route costs. The hub that advertises the teleworker
routes at the lowest cost being the preferred path.
In this model, it is important to note that while the IAPs establish active VPN tunnels to both hubs, only one hub is
actively forwarding traffic for the IAPs at any given time. The ability to simultaneously forward traffic to both hubs at
the same time is not supported with the IAP VPN solution.
Each hub is therefore assigned a primary or secondary role. The designated VPNCs in each hub advertise the
branch routes into OSPFv2 or BGP4 at different route costs. The VPNCs in the primary hub advertise the
branch routes at a lower route cost than the VPNCs in the secondary hub. The VPNCs in the primary hub
forward hub-to-spoke, spoke-to-hub and spoke-to-spoke traffic during normal operation (Figure X). If the
primary hub fails or becomes unreachable, the VPN tunnels are already established to the secondary hub site.
During a failover, the OSPF/BGP routers will re-converge so that the teleworker routes are reachable via the
secondary hubwith a typical re-convergence occurring in under 1 minute (depending on the IGP configuration).
Aruba Central uses a hierarchical configuration model where configurations applied at the group level filter
down to all the devices in the group. Specific overrides, like hostnames, IP addresses or specific routing
configurations are generally overridden at the device level.
For a micro-branch environment, Aruba recommends having different groups for each data center site and for
each type of branch site. Different branch types or geographical locations with different RF regulations also
have their own recommendations.
Authentication
Aruba APs identify themselves using their factory TPM certificate, which has the device’s MAC address as the
CN. The first step in authentication is to have VPNC accept incoming connection from the IAPs. When both the
Headend Gateway and the AP are managed by the same Central account, whitelisting happens automatically.
Upon receiving the connection request, the VPNC validates with Central that the AP is licensed and in the same
Central account.
To configure, validate that the VPNC group is using the default setup to authenticate IAP-VPN tunnels. This is
the default configuration and typically does not require any changes. For verification, the settings can be found
under Headend > Devices > Gateways > Security > L3 Authentication > VPN Authentication >
default-iap > Server Group:
Dynamic IP Assignment
When connecting to the VPNC, APs behave like dynamic VPN clients. This means that they are assigned a pool
of Inner IP addresses, which can be configured in Headend > Devices > Gateways> VPN > General VPN.
This pool of IP addresses is used by IAPs and client devices in source-NATed subnets in the IAPs to reach the
rest of the network. Therefore, the pool of IP addresses should be routable.
The inner IP pool is advertised to the rest of the network as branch subnets are advertised. Aruba recommends
setting the same IP pools in all VPNCs and leveraging routing costs to ensure that the primary VPNCs advertise
these subnets with higher priority.
For IAPs using ArubaOS versions prior to 8.4, make sure you check the IAP-VPN Backwards Compatible box.
Route Redistribution
The Aruba Micro-Branch architecture can work in layer 2 (L2) mode, where VLANs are L2 extended from the
APs to the VPNC, or in layer 3 (L3) mode, where branch subnets are advertised upstream as part of the tunnel
negotiation. When working in L3 mode, branch subnets should be redistributed into a dynamic routing
protocol. Use the following methods to redistribute branch subnets into a dynamic routing protocol:
OSPF
1. Enable OSPF and set the area to be used with the upstream router.
2. Enable the interface VLANs to be used in the OSPF process.
3. Redistribute IAP-VPN overlay routes into OSPF.
BGP
1. Enable BGP globally and set the AS number.
2. Create the necessary BGP neighbors.
3. Redistrube IAP-VPN overlay routes into BGP.
ArubaOS follows RFC1812, which describes that in the absence of a route map, no routes should be learned from a
neighboring eBGP router.
Tunnel Establishment
Access points bring up tunnels to the VPNCs using their TPM as authentication to automate them. The
configurations are done in Micro-Branch > Devices > Access Points > Configuration > VPN. The following
are some reference configurations:
Protocol: Aruba IPSec.
Set the primary and secondary hosts (these should be the Outer IPs of the VPNCs).
Preemption enabled with the default hold time of 600 seconds.
Fast failover enabled, resulting in having tunnels to both VPNCs preemptively established.
Reconnect user on failover with a reconnect time of 60 seconds. In the case of an L2 extension, this
disconnects all WLAN users from the network to ensure that they get an IP from the subnet in the
secondary DC.
Once the tunnels are established, either L2 VLAN extension or L3 routing can be selected based on each VLAN.
Routing
An AP acting as a Micro-Branch can forward traffic through the tunnel or source-NAT it through its default
gateway. The destinations for which traffic should be tunneled can be selected in Micro-Branch > Devices >
Access Points > VPN > Routing. Keep the following in mind when setting the routes:
Routes pointing to the tunnels should point to the physical IP of the VPNCs, not the Outer IP NATted by the
firewall. In case there is a pair of VPNC with VRRP enable, point routes with different metrics to the physical
address of the VPNCs.
Select 0.0.0.0/0 as the destination network for full-tunnel configuration.
Select 0.0.0.0 as the gateway to exclude a destination subnet from being tunneled.
This behavior applies to L3 routed branch subnet and L2 extended VLANs that are configured in Split-Tunnel mode.
To find the physical IP addresses of the VPNCs to be set in the routing table of the IAPs, go to the Gateway Details
page and select the LAN tab.
Modes of Operation
Setting the modes of operation is done based on each VLAN. In Micro-Branch > Devices > Access Points >
System > DHCP, create the Local, L2, or L3 subnets and DHCP scopes to be used. Centralized modes assume
the existence of a corporate DHCP server to which requests are relayed. In distributed modes, the AP acts as
the DHCP server. The two most common modes are L2 centralized mode and L3 distributed mode.
L2 Centralized Mode
When working in L2 centralized mode, a common subnet spans across all the locations. DHCP requests are
related by the AP to the DHCP server. In order to preserve scalability, the Headend Gateways do not flood all
broadcast and unknown multicast traffic to the rest of the branches. When there is an L2 extension of a VLAN
across multiple locations in this mode, traffic can be source-NATed.
Define an L2-Centralized VLAN in a Micro-Branch group in Micro-Branch > Devices > Access Points >
System > DHCP.
When Split-Tunnel is enabled, the AP source-NATs all traffic that is not set to be forwarded through the IPSec tunnel,
as defined in the routing configuration.
L3 Distributed Mode
When working in L3 centralized mode, a common range (or set of ranges) of IP addresses is distributed across
the branch subnets. This range is sliced into smaller subnets and allocated to the different APs by the VPNC.
Once the larger group range is selected, the number of hosts per branch and the number of reserved IPs, the
VPNC allocates subnets to the APs.
For the example shown in Figure 25, there are a total of 31 addresses as follows:
25 hosts
3 reserved addresses
1 access point IP address
1 network IP
1 broadcast IP
This results in the VPNC allocation 27 branch subnets to all of the APs in the group for VLAN 100.
Aruba recommends all teleworker ports to be treated as untrusted and to apply 802.1X authentication on wired and
wireless subnets to ensure non-corporate devices are not connected to the network. Details on how to configure
Network Profiles as well as AAA and Security Profiles can be found in the Aruba Central documentation.
Aruba Central helps streamline IT operations by providing a true zero-touch deployment. Devices can be
shipped directly to remote locations, such as teleworker offices, and installed by non-technical personnel
because devices are added to the customer's Device Inventory in Aruba Central as soon as a purchase order for
any number of (n) devices, are received by Aruba. Once the devices are added to the Device Inventory in Aruba
Central, they can be manually or automatically assigned a Central subscription in the Aruba Central Account
Home.
If an Aruba Central subscription is assigned to a device, it automatically connects to Aruba Central as soon as it
has network connectivity and Internet access. This allows the device to download its configuration and to be
managed by Aruba Central. The Aruba Installation Management service simplifies and automates site
deployments and helps IT administrators manage site installations with ease. Detailed information about this
process is available in the Aruba Central Documentation Portal.
Administrator Workflow
Install Manager on the Aruba Central portal. For more information, refer to the Aruba Central Documentation
Portal.
Site Creation
This part of the process is an optional step that allows installers to assign the name and location of the
installation sites. Assigning names and locations to all of the sites simplifies day-to-day operations and can be
done in bulk using a CSV file or through the Aruba Central API. For more information, refer to the Managing
Sites section of the Aruba Central Documentation Portal.
Device Provisioning | 25
Figure 28 Assigning Groups to Sites on the Site Installation Page
Invite Installers
Since Aruba Central provides a true zero-touch deployment, anyone at the remote site can be an installer.
Installers can be added and assigned to their respective locations on the All Devices > Global > Organization
> Install Manager > Installers page.
26 | Device Provisioning
Provisioning
Once an installer is added, they receive a text message with a prompt to download the mobile app for
provisioning. Once the mobile app is downloaded, the installer can use the following steps to provision the
devices:
1. Log in to the application using an OTP sent in a text message.
2. Click on the site where the AP will be installed.
3. Scan the barcode with the serial number and (optionally) set the name of the AP.
Once an AP is scanned, it is ready to connect to the network. The AP automatically connects with Aruba Central,
receives its configuration, and brings up a secure corporate network at the teleworker site.
The mobile app allows installers to view all of the devices that have been scanned on site, as well as devices that
are connected or not connected.
Provisioning | 27
Appendix A
Important Considerations
Software updates can be managed from Aruba Central. To guarantee a consistent software image is deployed
across all sites, it is recommended to set a compliant software image through the Firmware Management
page in Aruba Central.
Central Subscriptions
When devices are managed by Central, the following subscriptions required for the teleworker service:
n Headend gateways require a Gateway Foundation subscription.
n APs require a Device Management subscription.
Virtual Gateway
7200 Series
Important Considerations | 28
Platform IAP Tunnel Route Limit User Limit (L2 mode) VLAN Limit
7000 Series
29 | Important Considerations