Do you have a question about the Aruba IAP-325 and is the answer not in the manual?
Model | IAP-325 |
---|---|
Category | Wireless Access Point |
Frequency Bands | 2.4 GHz, 5 GHz |
Antenna Type | Internal |
USB Port | 1 x USB 2.0 |
Wireless Standards | 802.11a/b/g/n/ac |
Ethernet Ports | 2 x 10/100/1000BASE-T Ethernet |
PoE | 802.3af/at |
Operating Temperature | 0°C to 50°C (32°F to 122°F) |
Mounting | Wall, Ceiling |
Weight | 0.9 kg |
MIMO | 4x4 MIMO |
Dimensions | 200 mm x 200 mm x 48 mm (7.87 in x 7.87 in x 1.89 in) |
Provides contact information for Aruba support, including website, phone, and email.
Describes Aruba Instant's virtualized controller capabilities for enterprise-grade WLANs.
Describes prerequisites and procedures for setting up the Instant network.
Details steps for connecting an IAP to the power source based on the power source used.
Explains how IAPs obtain IP addresses from DHCP or static assignment for network connectivity.
Covers Zero Touch Provisioning (ZTP) methods like Aruba Activate and AirWave.
Explains obtaining and viewing cloud activation keys for IAPs for Aruba Central provisioning.
Provides instructions for accessing the Instant User Interface using default credentials.
Describes how IAPs retrieve configuration files from a server via FTP/FTPS for automatic updates.
Details steps to enable automatic configuration by specifying credentials, filename, download method, and server.
Describes commands to verify automatic configuration status and download logs.
Allows viewing connectivity summary, selecting language, and logging into the Instant UI.
Provides tabs for Authentication Servers, Users, Roles, Blacklisting, Firewall Settings, Walled Garden, and External Captive Portal.
Allows definition of communication settings with an Aruba controller or a third-party VPN concentrator.
Describes how to configure system parameters for an IAP, including Name, System location, and IP addresses.
Details how to update admin user password via Instant UI or CLI, and configure password hashing.
Describes configuring radio profiles manually or using the Adaptive Radio Management (ARM) feature.
Explains how one IAP assumes the role of VC to manage the network and its master election protocol.
Details client-IAP transactions and network types like Employee, Voice, and Guest.
Explains configuring WLAN settings using Instant UI or CLI, including Name, Primary Usage, and advanced options.
Details configuring VLAN settings for an SSID profile using Instant UI or CLI.
Describes configuring security settings for Employee or Voice networks via Instant UI or CLI.
Details configuring access rules for Employee, Voice, or Guest networks using Instant UI or CLI.
Covers configuring wired settings, VLAN, security, and access rules for wired profiles.
Details configuring security parameters for wired employee networks via Instant UI or CLI.
Describes captive portal authentication, its components, and types.
Details creating an SSID for guest access using Instant UI or CLI.
Describes configuring wired settings, VLAN, and access rules for guest access.
Explains configuring internal captive portal authentication using an internal server.
Details configuring external captive portal profiles and using them with SSIDs or wired profiles.
Classifies IAP users (Administrator, Guest Administrator, etc.) and outlines their access privileges.
Explains configuring RADIUS/TACACS servers for authenticating management users.
Describes procedures for configuring internal or external authentication servers.
Explains configuring external RADIUS servers, including RADIUS, LDAP, and ClearPass.
Explains data encryption process and supported types: WEP, TKIP, and AES.
Supports survivable authentication framework against remote link failures using cached credentials.
Details configuring 802.1X authentication for wireless and wired network profiles.
Details configuring MAC and 802.1X authentications for wireless and wired profiles.
Provides identity-based controls for application-layer security, prioritization, and traffic forwarding.
Allows permitting or denying data packets, limiting bandwidth, and blocking/allowing access.
Explains creating user roles to determine network privileges, reauthentication frequency, and bandwidth contracts.
Allows configuration of role and VLAN derivation rules for assigning roles or VLANs to clients.
Details configuring Local, Distributed, and Centralized DHCP scopes for address assignment.
Explains configuring Local, Local L2, and Local L3 DHCP scopes via Instant UI or CLI.
Describes configuring Distributed L2 and Distributed L3 DHCP scopes for branches via VPN.
Details creating absolute or periodic time range profiles using Instant UI or CLI.
Describes how IAPs use a VC architecture for WLAN services and VPN tunnels to controllers.
Details configuring tunneling protocols like GRE, IPsec, and L2TPv3 for VPN host settings.
Describes the two components of IAP-VPN architecture: IAPs at branch sites and Controller at datacenter.