EasyManua.ls Logo

Aruba IAP-204 User Manual

Aruba IAP-204
437 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
User Guide
Aruba Instant
6.5.0.0-4.3.0.0

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Aruba IAP-204 and is the answer not in the manual?

Aruba IAP-204 Specifications

General IconGeneral
ModelIAP-204
Wireless Standards802.11a/b/g/n/ac
Frequency Bands2.4 GHz and 5 GHz
Maximum Data Rate (5 GHz)867 Mbps
Maximum Data Rate (2.4 GHz)300 Mbps
Radio Chains/Streams2
AntennaInternal
Ethernet Ports2
Ethernet Ports (PoE)1
Ethernet Ports (Total)2
Power over Ethernet (PoE)802.3af
Product NameInstant IAP-204
MIMO2x2
Power SourcePower over Ethernet or AC adapter
Operating Temperature0°C to +40°C
Operating Temperature (°F)32 to 122 °F
MountingWall, ceiling
Radio TechnologyDual Radio

Summary

Automatic Retrieval of Configuration

Managed Mode Operations

Describes how IAPs retrieve and update configurations from a server using FTP or FTPS.

Configuring Managed Mode Parameters

Step-by-step guide to configure managed mode profiles for automatic configuration via CLI commands.

Initial Configuration Tasks

Configuring System Parameters

Describes how to configure system parameters for an IAP, including name, location, IP, and uplink settings.

Changing Password

Details how to update admin user passwords via the Instant UI or CLI, including password hashing.

Customizing IAP Settings

Configuring Radio Profiles for an IAP

Covers configuring radio profiles manually or using ARM, including access modes and channel settings.

Wireless Network Profiles

Configuring Wireless Network Profiles

Outlines the process of configuring WLAN settings for an SSID profile, including network types and advanced options.

Configuring VLAN Settings for a WLAN SSID Profile

Details how to configure VLAN settings for an SSID profile, including client IP assignment and VLAN rules.

Configuring Security Settings for a WLAN SSID Profile

Describes how to configure security settings for Employee or Voice networks, including key management and authentication.

Configuring Access Rules for a WLAN SSID Profile

Explains how to configure access rules for guest user roles, including network-based and role-based access control.

Wired Profiles

Configuring a Wired Profile

Covers configuring wired settings for profiles, including name, primary usage, speed, duplex, and content filtering.

Configuring Security Settings for a Wired Profile

Explains how to configure security parameters for wired employee networks, including port type and MAC authentication.

Captive Portal for Guest Access

Configuring a WLAN SSID for Guest Access

Details how to create an SSID for guest access, including WLAN settings and advanced options.

Configuring Internal Captive Portal for Guest Network

Describes how to configure internal captive portal authentication using an internal server.

Configuring External Captive Portal for a Guest Network

Explains how to configure external captive portal profiles and associate them to roles or SSIDs.

Authentication and User Management

Configuring Authentication Servers

Describes how to configure internal and external authentication servers, including RADIUS and LDAP.

Configuring Authentication Survivability

Details how to enable authentication survivability against remote link failures using cached credentials.

Roles and Policies

Firewall Policies

Explains identity-based controls for application-layer security, traffic forwarding, and network performance policies.

Configuring User Roles

Describes how to create user roles to determine network privileges, reauthentication frequency, and bandwidth contracts.

Configuring Derivation Rules

Explains how to configure rules for deriving user roles or VLANs based on client attributes and DHCP fingerprints.

DHCP Configuration

Configuring DHCP Scopes

Explains different DHCP address assignment modes and associated client traffic forwarding modes.

Configuring the Default DHCP Scope for Client IP Assignment

Details customizing the DHCP pool subnet and address range for client IP assignment.

Configuring Time-Based Services

Configuring a Time Range Profile

Provides steps to create time range profiles using Instant UI or CLI, defining parameters like type and period.

Applying a Time Range Profile to a WLAN SSID

Explains how to apply a time range profile to a WLAN SSID to make it available or unavailable during specific times.

VPN Configuration

Configuring a Tunnel from an IAP to a Mobility Controller

Provides procedures for configuring IPsec, L2-GRE, and L2TPv3 tunnels for VPN host settings.

Configuring Routing Profiles

Defines how routing profiles determine traffic tunneling through IPsec or local bridging.

IAP-VPN Deployment Scenarios

Configuring IAP and Controller for IAP-VPN Operations

Details configuration procedures for IAP-VPN operations, covering VPN host settings, routing, and DHCP profiles.

Adaptive Radio Management

ARM Overview

Introduces Adaptive Radio Management (ARM) for optimizing WLAN performance via channel and power settings.

Configuring ARM Features on an IAP

Explains how to configure ARM features like Band Steering, Airtime Fairness, and Client Match.

Deep Packet Inspection and Application Visibility

Deep Packet Inspection

Describes AppRF's Layer 7 firewall capability for creating policies based on application types.

Voice and Video

IAP Management and Monitoring

Uplink Configuration

Uplink Preferences and Switching

Describes procedures for enforcing uplinks, setting priorities, enabling preemption, and switching based on VPN/Internet availability.

Intrusion Detection

Detecting and Classifying Rogue IAPs

Explains how to detect rogue IAPs plugged into the wired network and classify them as Interfering or Rogue.

Configuring Wireless Intrusion Protection and Detection Levels

Details WIP options for detecting and protecting against wireless threats, including custom levels.

Mobility and Client Management

Spectrum Monitor

IAP Maintenance

Upgrading an IAP

Covers upgrading IAPs using Automatic Image Check or manual methods via UI or CLI.

Monitoring Devices and Logs

Mobility Access Switch Integration

IAP-VPN Deployment Scenarios

Scenario 1—IPsec: Single Datacenter Deployment with No Redundancy

Describes a single datacenter IPsec deployment with no redundancy, including topology and IAP configuration.

Scenario 2—IPsec: Single Datacenter with Multiple Controllers for Redundancy

Details a single datacenter IPsec deployment with multiple controllers for redundancy, including topology and IAP configuration.

Scenario 3—IPsec: Multiple Datacenter Deployment with Primary and Backup Controllers for Redundancy

Explains a multi-datacenter IPsec deployment with primary/backup controllers for redundancy and routing configuration.

Scenario 4—GRE: Single Datacenter Deployment with No Redundancy

Covers a single datacenter GRE deployment with no redundancy, including topology and IAP configuration.

Related product manuals