Do you have a question about the Aruba IAP-204 and is the answer not in the manual?
Model | IAP-204 |
---|---|
Wireless Standards | 802.11a/b/g/n/ac |
Frequency Bands | 2.4 GHz and 5 GHz |
Maximum Data Rate (5 GHz) | 867 Mbps |
Maximum Data Rate (2.4 GHz) | 300 Mbps |
Radio Chains/Streams | 2 |
Antenna | Internal |
Ethernet Ports | 2 |
Ethernet Ports (PoE) | 1 |
Ethernet Ports (Total) | 2 |
Power over Ethernet (PoE) | 802.3af |
Product Name | Instant IAP-204 |
MIMO | 2x2 |
Power Source | Power over Ethernet or AC adapter |
Operating Temperature | 0°C to +40°C |
Operating Temperature (°F) | 32 to 122 °F |
Mounting | Wall, ceiling |
Radio Technology | Dual Radio |
Describes how IAPs retrieve and update configurations from a server using FTP or FTPS.
Step-by-step guide to configure managed mode profiles for automatic configuration via CLI commands.
Describes how to configure system parameters for an IAP, including name, location, IP, and uplink settings.
Details how to update admin user passwords via the Instant UI or CLI, including password hashing.
Covers configuring radio profiles manually or using ARM, including access modes and channel settings.
Outlines the process of configuring WLAN settings for an SSID profile, including network types and advanced options.
Details how to configure VLAN settings for an SSID profile, including client IP assignment and VLAN rules.
Describes how to configure security settings for Employee or Voice networks, including key management and authentication.
Explains how to configure access rules for guest user roles, including network-based and role-based access control.
Covers configuring wired settings for profiles, including name, primary usage, speed, duplex, and content filtering.
Explains how to configure security parameters for wired employee networks, including port type and MAC authentication.
Details how to create an SSID for guest access, including WLAN settings and advanced options.
Describes how to configure internal captive portal authentication using an internal server.
Explains how to configure external captive portal profiles and associate them to roles or SSIDs.
Describes how to configure internal and external authentication servers, including RADIUS and LDAP.
Details how to enable authentication survivability against remote link failures using cached credentials.
Explains identity-based controls for application-layer security, traffic forwarding, and network performance policies.
Describes how to create user roles to determine network privileges, reauthentication frequency, and bandwidth contracts.
Explains how to configure rules for deriving user roles or VLANs based on client attributes and DHCP fingerprints.
Explains different DHCP address assignment modes and associated client traffic forwarding modes.
Details customizing the DHCP pool subnet and address range for client IP assignment.
Provides steps to create time range profiles using Instant UI or CLI, defining parameters like type and period.
Explains how to apply a time range profile to a WLAN SSID to make it available or unavailable during specific times.
Provides procedures for configuring IPsec, L2-GRE, and L2TPv3 tunnels for VPN host settings.
Defines how routing profiles determine traffic tunneling through IPsec or local bridging.
Details configuration procedures for IAP-VPN operations, covering VPN host settings, routing, and DHCP profiles.
Introduces Adaptive Radio Management (ARM) for optimizing WLAN performance via channel and power settings.
Explains how to configure ARM features like Band Steering, Airtime Fairness, and Client Match.
Describes AppRF's Layer 7 firewall capability for creating policies based on application types.
Describes procedures for enforcing uplinks, setting priorities, enabling preemption, and switching based on VPN/Internet availability.
Explains how to detect rogue IAPs plugged into the wired network and classify them as Interfering or Rogue.
Details WIP options for detecting and protecting against wireless threats, including custom levels.
Covers upgrading IAPs using Automatic Image Check or manual methods via UI or CLI.
Describes a single datacenter IPsec deployment with no redundancy, including topology and IAP configuration.
Details a single datacenter IPsec deployment with multiple controllers for redundancy, including topology and IAP configuration.
Explains a multi-datacenter IPsec deployment with primary/backup controllers for redundancy and routing configuration.
Covers a single datacenter GRE deployment with no redundancy, including topology and IAP configuration.