EasyManua.ls Logo

Aruba IAP-325 User Manual

Aruba IAP-325
437 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
User Guide
Aruba Instant
6.5.0.0-4.3.0.0

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Aruba IAP-325 and is the answer not in the manual?

Aruba IAP-325 Specifications

General IconGeneral
ModelIAP-325
CategoryWireless Access Point
Frequency Bands2.4 GHz, 5 GHz
Antenna TypeInternal
USB Port1 x USB 2.0
Wireless Standards802.11a/b/g/n/ac
Ethernet Ports2 x 10/100/1000BASE-T Ethernet
PoE802.3af/at
Operating Temperature0°C to 50°C (32°F to 122°F)
MountingWall, Ceiling
Weight0.9 kg
MIMO4x4 MIMO
Dimensions200 mm x 200 mm x 48 mm (7.87 in x 7.87 in x 1.89 in)

Summary

About this Guide

Contacting Support

Provides contact information for Aruba support, including website, phone, and email.

About Aruba Instant

Instant Overview

Describes Aruba Instant's virtualized controller capabilities for enterprise-grade WLANs.

Setting up an IAP

Setting up Instant Network

Describes prerequisites and procedures for setting up the Instant network.

Connecting an IAP

Details steps for connecting an IAP to the power source based on the power source used.

Assigning an IP address to the IAP

Explains how IAPs obtain IP addresses from DHCP or static assignment for network connectivity.

Provisioning an IAP

Covers Zero Touch Provisioning (ZTP) methods like Aruba Activate and AirWave.

Provisioning IAPs through Central

Explains obtaining and viewing cloud activation keys for IAPs for Aruba Central provisioning.

Logging in to the Instant UI

Provides instructions for accessing the Instant User Interface using default credentials.

Automatic Retrieval of Configuration

Managed Mode Operations

Describes how IAPs retrieve configuration files from a server via FTP/FTPS for automatic updates.

Configuring Managed Mode Parameters

Details steps to enable automatic configuration by specifying credentials, filename, download method, and server.

Verifying the Configuration

Describes commands to verify automatic configuration status and download logs.

Instant User Interface

Login Screen

Allows viewing connectivity summary, selecting language, and logging into the Instant UI.

Security

Provides tabs for Authentication Servers, Users, Roles, Blacklisting, Firewall Settings, Walled Garden, and External Captive Portal.

VPN

Allows definition of communication settings with an Aruba controller or a third-party VPN concentrator.

Initial Configuration Tasks

Configuring System Parameters

Describes how to configure system parameters for an IAP, including Name, System location, and IP addresses.

Changing Password

Details how to update admin user password via Instant UI or CLI, and configure password hashing.

Customizing IAP Settings

Configuring Radio Profiles for an IAP

Describes configuring radio profiles manually or using the Adaptive Radio Management (ARM) feature.

Master Election and Virtual Controller

Explains how one IAP assumes the role of VC to manage the network and its master election protocol.

Wireless Network Profiles

Configuring Wireless Network Profiles

Details client-IAP transactions and network types like Employee, Voice, and Guest.

Configuring WLAN Settings for an SSID Profile

Explains configuring WLAN settings using Instant UI or CLI, including Name, Primary Usage, and advanced options.

Configuring VLAN Settings for a WLAN SSID Profile

Details configuring VLAN settings for an SSID profile using Instant UI or CLI.

Configuring Security Settings for a WLAN SSID Profile

Describes configuring security settings for Employee or Voice networks via Instant UI or CLI.

Configuring Access Rules for a WLAN SSID Profile

Details configuring access rules for Employee, Voice, or Guest networks using Instant UI or CLI.

Wired Profiles

Configuring a Wired Profile

Covers configuring wired settings, VLAN, security, and access rules for wired profiles.

Configuring Security Settings for a Wired Profile

Details configuring security parameters for wired employee networks via Instant UI or CLI.

Captive Portal for Guest Access

Understanding Captive Portal

Describes captive portal authentication, its components, and types.

Configuring a WLAN SSID for Guest Access

Details creating an SSID for guest access using Instant UI or CLI.

Configuring Wired Profile for Guest Access

Describes configuring wired settings, VLAN, and access rules for guest access.

Configuring Internal Captive Portal for Guest Network

Explains configuring internal captive portal authentication using an internal server.

Configuring External Captive Portal for a Guest Network

Details configuring external captive portal profiles and using them with SSIDs or wired profiles.

Authentication and User Management

Managing IAP Users

Classifies IAP users (Administrator, Guest Administrator, etc.) and outlines their access privileges.

Configuring Authentication Parameters for Management Users

Explains configuring RADIUS/TACACS servers for authenticating management users.

Configuring Authentication Servers

Describes procedures for configuring internal or external authentication servers.

External RADIUS Server

Explains configuring external RADIUS servers, including RADIUS, LDAP, and ClearPass.

Understanding Encryption Types

Explains data encryption process and supported types: WEP, TKIP, and AES.

Configuring Authentication Survivability

Supports survivable authentication framework against remote link failures using cached credentials.

Configuring 802.1X Authentication for a Network Profile

Details configuring 802.1X authentication for wireless and wired network profiles.

Configuring MAC Authentication with 802.1X Authentication

Details configuring MAC and 802.1X authentications for wireless and wired profiles.

Roles and Policies

Firewall Policies

Provides identity-based controls for application-layer security, prioritization, and traffic forwarding.

Access Control List Rules

Allows permitting or denying data packets, limiting bandwidth, and blocking/allowing access.

Configuring User Roles

Explains creating user roles to determine network privileges, reauthentication frequency, and bandwidth contracts.

Configuring Derivation Rules

Allows configuration of role and VLAN derivation rules for assigning roles or VLANs to clients.

DHCP Configuration

Configuring DHCP Scopes

Details configuring Local, Distributed, and Centralized DHCP scopes for address assignment.

Configuring Local DHCP Scopes

Explains configuring Local, Local L2, and Local L3 DHCP scopes via Instant UI or CLI.

Configuring Distributed DHCP Scopes

Describes configuring Distributed L2 and Distributed L3 DHCP scopes for branches via VPN.

Configuring Time-Based Services

Configuring a Time Range Profile

Details creating absolute or periodic time range profiles using Instant UI or CLI.

VPN Configuration

Understanding VPN Features

Describes how IAPs use a VC architecture for WLAN services and VPN tunnels to controllers.

Configuring a Tunnel from an IAP to a Mobility Controller

Details configuring tunneling protocols like GRE, IPsec, and L2TPv3 for VPN host settings.

IAP-VPN Deployment Scenarios

Understanding IAP-VPN Architecture

Describes the two components of IAP-VPN architecture: IAPs at branch sites and Controller at datacenter.

Related product manuals