EasyManua.ls Logo

Aruba IAP-335 User Manual

Aruba IAP-335
437 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
User Guide
Aruba Instant
6.5.0.0-4.3.0.0

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Aruba IAP-335 and is the answer not in the manual?

Aruba IAP-335 Specifications

General IconGeneral
ModelIAP-335
CategoryWireless Access Point
Wireless Standard802.11ac
Frequency Bands2.4 GHz and 5 GHz
MIMO4x4
USB Port1 x USB 2.0
Weight1.2 kg
Ethernet Ports2 x Gigabit Ethernet
Power over Ethernet802.3at
Antenna TypeIntegrated
Operating Temperature0°C to 50°C
Mounting OptionsWall, Ceiling
Power SourcePoE or DC power adapter

Summary

Chapter 1 About this Guide

Intended Audience

Specifies the target audience for this guide, which is administrators who configure and use IAPs.

Related Documents

Lists other relevant Aruba Instant product documentation, such as installation and reference guides.

Conventions

Explains typographical conventions used throughout the manual for emphasis and clarity.

Contacting Support

Provides contact information and resources for technical support, including website, forums, and telephone numbers.

Chapter 2 About Aruba Instant

Instant Overview

Describes Aruba Instant's virtualization of controller capabilities on access points for enterprise-grade WLANs.

Supported IAP Platforms

Lists IAP platforms that support Instant software and their minimum required software versions.

Chapter 3 Setting up an IAP

Setting up Instant Network

Details the prerequisites and initial steps for setting up an Instant network, including power sources and connections.

Connecting an IAP

Explains how to connect an IAP to the power source using PoE switch, midspan, or AC adapter.

Assigning an IP address to the IAP

Describes how IAPs obtain IP addresses via DHCP or static configuration for network connectivity.

Provisioning an IAP

Covers different zero-touch provisioning methods for IAPs, including Aruba Activate and AirWave.

Chapter 4 Automatic Retrieval of Configuration

Managed Mode Operations

Explains how IAPs can retrieve configuration files from a server using FTP or FTPS for automatic updates.

Prerequisites

Lists the necessary checks before configuring managed mode command parameters, such as software version and AirWave management.

Chapter 5 Instant User Interface

Login Screen

Describes the Instant login page tasks: viewing connectivity, selecting language, and logging into the UI.

Viewing Connectivity Summary

Details the connectivity status displayed on the login page, including Internet, uplink, and AirWave configuration.

Logging into the Instant UI

Provides instructions on how to log in to the Instant UI using default administrative credentials.

Main Window

Describes the elements of the Instant UI Main Window: Banner, Search Text Box, Tabs, and Links.

Chapter 6 Initial Configuration Tasks

Configuring System Parameters

Details how to configure essential system parameters for an IAP, including name, location, and IP settings.

Changing Password

Explains how to update the administrative user password for an IAP using the Instant UI or the CLI.

Chapter 7 Customizing IAP Settings

Modifying the IAP Host Name

Describes how to change the host name of an IAP through the Instant UI or the CLI.

Configuring Zone Settings on an IAP

Explains how to configure zone settings for an IAP to assign SSIDs to specific access points.

Specifying a Method for Obtaining IP Address

Details how to configure a static IP address or allow the IAP to obtain an IP address from a DHCP server.

Configuring External Antenna

Explains how to configure transmit power for IAPs with external antenna connectors for regulatory compliance.

Chapter 8 VLAN Configuration

VLAN Pooling

Describes VLAN pooling to partition networks into subnets and assign VLANs from a pool for clients.

Uplink VLAN Monitoring and Detection on Upstream Devices

Explains how to monitor and detect VLAN configuration mismatches on upstream devices that affect client connectivity.

Chapter 9 IPv6 Support

IPv6 Notation

Explains the IPv6 address representation, including valid and abbreviated formats, and netmask notation.

Enabling IPv6 Support for IAP Configuration

Details the features and IP modes supported for IPv6 address configuration in IAPs.

Chapter 10 Wireless Network Profiles

Configuring Wireless Network Profiles

Describes the transactions between a client and an IAP during startup, including authentication and connection.

Network Types

Categorizes Instant wireless networks into Employee, Voice, and Guest network types.

Configuring WLAN Settings for an SSID Profile

Provides steps to configure WLAN settings for an SSID profile using the Instant UI or CLI.

Configuring VLAN Settings for a WLAN SSID Profile

Details how to configure VLAN settings for an SSID profile using the Instant UI or CLI.

Chapter 11 Wired Profiles

Configuring a Wired Profile

Explains how to configure wired settings for a wired profile using the Instant UI or CLI.

Configuring VLAN for a Wired Profile

Describes how to configure VLAN settings for a wired profile using the Instant UI or CLI.

Configuring Security Settings for a Wired Profile

Details how to configure security parameters for a wired employee network.

Configuring Access Rules for a Wired Profile

Explains how to configure access rules for wired profiles using the Instant UI or CLI.

Chapter 12 Captive Portal for Guest Access

Understanding Captive Portal

Explains captive portal authentication, its components, and how administrators can create guest networks.

Configuring a WLAN SSID for Guest Access

Provides steps to create an SSID for guest access using the Instant UI or CLI.

Configuring Wired Profile for Guest Access

Details how to configure wired settings for a wired profile using the Instant UI or CLI.

Configuring Internal Captive Portal for Guest Network

Describes how to configure internal captive portal authentication for guest networks.

Configuring External Captive Portal for a Guest Network

Explains how to configure external captive portal profiles and associate them to user roles or SSIDs.

Configuring Facebook Login

Describes how to configure a guest network to use a customized Facebook page for authentication.

Configuring Guest Logon Role and Access Rules for Guest Users

Explains how to create user roles and access rules for guest users in captive portal configurations.

Configuring Captive Portal Roles for an SSID

Details how to configure captive portal roles for SSIDs that use 802.1X authentication.

Configuring Walled Garden Access

Explains how to control access to web content and services using a walled garden for external captive portals.

Chapter 13 Authentication and User Management

Managing IAP Users

Classifies IAP users into Administrator, Guest administrator, Employee, and Guest users and their privileges.

Configuring IAP Users

Describes how to configure users by specifying login credentials in the Instant UI.

Configuring Authentication Parameters for Management Users

Explains how to configure RADIUS or TACACS servers for authenticating management users.

Supported Authentication Methods

Lists the supported authentication methods in Instant, including 802.1X, MAC, and Captive Portal.

802.1X Authentication

Describes the 802.1X standard for WLAN authentication using EAP and RADIUS protocols.

MAC Authentication

Explains MAC authentication based on physical MAC addresses against a manually defined list.

MAC Authentication with 802.1X Authentication

Details features like MAC authentication preceding 802.1X and role-based access rules.

Captive Portal Authentication

Explains captive portal authentication used for authenticating guest users.

MAC Authentication with Captive Portal Authentication

Describes how to enforce MAC authentication for captive portal clients.

802.1X Authentication with Captive Portal Role

Explains how to configure different captive portal settings for clients on the same SSID.

WISPr Authentication

Describes WISPr authentication for smart clients to authenticate on networks with multiple ISPs.

Supported EAP Authentication Frameworks

Lists the supported EAP authentication frameworks for Instant networks, including TLS, TTLS, and PEAP.

Authentication Termination on IAP

Explains how IAPs support EAP termination for enterprise WLAN SSIDs to reduce exchange packets.

Configuring Authentication Servers

Describes procedures for configuring internal or external authentication servers for client authentication.

Internal RADIUS Server

Explains the local RADIUS server operating on each IAP for 802.1X authentication.

External RADIUS Server

Details how to configure an external RADIUS server, including dynamic forwarding of requests.

Dynamic Load Balancing between Two Authentication Servers

Describes how to configure two authentication servers for primary, backup, and load balancing.

Configuring an External Server for Authentication

Provides steps to configure RADIUS, TACACS, LDAP, and ClearPass Policy Manager servers.

Enabling RADIUS Communication over TLS

Explains how to enable secure communication between RADIUS server and IAP clients using TLS.

Configuring RadSec Protocol

Details how to configure RadSec Protocol using the Instant UI or the CLI for secure communication.

Associate the Server Profile with a Network Profile

Describes how to associate authentication server profiles with network profiles using UI or CLI.

Configuring Dynamic RADIUS Proxy Parameters

Explains how to configure DRP parameters for the authentication server using Instant UI or CLI.

Enabling Dynamic RADIUS Proxy

Describes how to enable RADIUS server support using Instant UI or CLI.

Understanding Encryption Types

Explains data encryption process and supported types like WEP, TKIP, and AES.

WPA and WPA-2

Summarizes the differences between WPA and WPA-2 certifications and features.

Recommended Authentication and Encryption Combinations

Provides recommendations for authentication and encryption combinations for Wi-Fi networks.

Configuring Authentication Survivability

Explains how to enable survivable authentication framework against remote link failures.

Configuring 802.1X Authentication for a Network Profile

Details procedures for configuring 802.1X authentication for wireless and wired profiles.

Configuring 802.1X Authentication for Wireless Network Profiles

Provides steps to enable 802.1X authentication for a wireless network profile using Instant UI or CLI.

Configuring 802.1X Authentication for Wired Profiles

Details how to enable 802.1X authentication for a wired profile using Instant UI or CLI.

Enabling 802.1X Supplicant Support

Explains how to configure IAPs to function as 802.1X clients or supplicants for network access.

Configuring an IAP for 802.1X Supplicant Support

Details how to enable 802.1X supplicant support by configuring authentication parameters on IAPs.

Configuring MAC Authentication for a Network Profile

Explains how to configure MAC authentication for wireless and wired profiles.

Configuring MAC Authentication for Wireless Network Profiles

Provides steps to enable MAC authentication for a wireless network using Instant UI or CLI.

Configuring MAC Authentication for Wired Profiles

Details how to enable MAC authentication for a wired profile using Instant UI or CLI.

Configuring MAC Authentication with 802.1X Authentication

Explains how to configure MAC and 802.1X authentications for wireless and wired profiles.

Configuring MAC Authentication with Captive Portal Authentication

Describes how to configure MAC authentication with captive portal authentication for network profiles.

Configuring WISPr Authentication

Explains WISPr authentication for smart clients to authenticate on networks with multiple ISPs.

Blacklisting Clients

Details how client blacklisting denies connection to blacklisted clients and forces disconnection.

Blacklisting Clients Manually

Explains how to manually add MAC addresses to the blacklist for permanent exclusion.

Blacklisting Users Dynamically

Describes dynamic blacklisting when clients exceed authentication failure thresholds or when a rule is triggered.

Uploading Certificates

Provides information on loading certificates for authentication, captive portal, and RadSec.

Chapter 14 Roles and Policies

Firewall Policies

Explains identity-based controls for application-layer security, prioritization, and traffic forwarding.

Access Control List Rules

Describes how to use ACL rules to permit or deny data packets and limit bandwidth for user roles.

Configuring ACL Rules for Network Services

Details procedures for configuring ACLs to control access to network services.

Configuring Network Address Translation Rules

Explains NAT process and how to configure source-NAT access rules.

Configuring Policy-Based Corporate Access

Describes how to configure policy-based corporate access to override routing profiles.

Configuring a Destination-NAT Access Rule

Explains how to configure destination-NAT rules to redirect traffic to specified IP addresses and ports.

Configuring ALG Protocols

Details how to enable or disable protocols for Application Layer Gateway (ALG) using Instant UI or CLI.

Configuring Firewall Settings for Protection from ARP Attacks

Explains how to configure firewall settings to protect the network against ARP attacks.

Configuring Firewall Settings to Disable Auto Topology Rules

Describes how to disable auto topology rules by configuring firewall settings in the IAP.

Managing Inbound Traffic

Explains enhanced inbound firewall for configuring rules, management subnets, and restricting corporate access.

Configuring Management Subnets

Details how to configure subnets to ensure IAP management is carried out only from these subnets.

Configuring Restricted Access to Corporate Network

Explains how to configure restricted corporate access to block unauthorized users from accessing the corporate network.

Content Filtering

Describes how to route DNS requests to OpenDNS and create content filtering policies.

Enabling Content Filtering for a Wireless Profile

Provides steps to enable content filtering for a wireless SSID using the Instant UI or CLI.

Enabling Content Filtering for a Wired Profile

Details how to enable content filtering for a wired profile using the Instant UI or CLI.

Configuring Enterprise Domains

Explains how to configure enterprise domain names for routing client DNS requests.

Configuring URL Filtering Policies

Describes how to configure URL filtering policies to block websites by defining ACL rules.

Creating Custom Error Page for Web Access Blocked by AppRF Policies

Explains how to create a list of URLs to redirect users when accessing blocked websites.

Configuring ACL Rules to Redirect Blocked HTTP Websites to a Custom Error Page URL

Details how to configure ACL rules to redirect blocked HTTP websites to a custom error page URL.

Configuring ACL Rules to Redirect Blocked HTTPS Websites to a Custom Blocked Page URL

Describes how to configure ACL rules to redirect blocked HTTPS websites to a custom error page.

Configuring User Roles

Explains how to configure user roles to determine network privileges, reauthentication, and bandwidth.

Creating a User Role

Provides steps to create a user role using the Instant UI or the CLI.

Assigning Bandwidth Contracts to User Roles

Details how to manage bandwidth by assigning contracts or rates to user roles.

Configuring Machine and User Authentication Roles

Explains how to assign different rights to clients based on device support for machine authentication.

Configuring Derivation Rules

Allows configuration of role and VLAN derivation rules to assign roles or VLANs to clients.

Understanding Role Assignment Rule

Explains how roles are assigned to clients connecting to SSIDs or wired profiles.

Creating a Role Derivation Rule

Describes how to configure rules to determine the role assigned for each authenticated client.

Understanding VLAN Assignment

Explains how VLANs can be assigned to clients based on configuration conditions.

Configuring VLAN Derivation Rules

Details how VLAN derivation rules allow assigning VLANs based on RADIUS server attributes.

Using Advanced Expressions in Role and VLAN Derivation Rules

Explains how to use regular expressions for complex policies of role and VLAN derivation.

Chapter 15 DHCP Configuration

Configuring DHCP Scopes

Describes different modes of DHCP address assignment and associated client traffic forwarding modes.

Configuring the Default DHCP Scope for Client IP Assignment

Explains how to customize DHCP pool subnet and address range for client IP assignment.

Configuring Local DHCP Scopes

Details how to configure Local, Local L2, and Local L3 DHCP scopes using Instant UI or CLI.

Configuring Distributed DHCP Scopes

Explains how to configure distributed DHCP scopes for branches connected via VPN.

Configuring Centralized DHCP Scopes

Describes points to note when configuring centralized DHCP scopes.

Chapter 16 Configuring Time-Based Services

Time Range Profiles

Explains how to enable or disable SSIDs for users at specific times using time range profiles.

Configuring a Time Range Profile

Provides steps to create time range profiles using the Instant UI or the CLI.

Applying a Time Range Profile to a WLAN SSID

Details how to apply a time range profile to a WLAN SSID using the Instant UI.

Verifying the Configuration

Explains how to view time range profiles created on an IAP and verify their status.

Chapter 17 Dynamic DNS Registration

Enabling Dynamic DNS

Describes how IAPs support dynamic DNS for updating DNS records of IAPs and clients.

Configuring Dynamic DNS Updates for Clients

Explains how to enable DDNS updates for clients when creating or editing a DHCP scope.

Verifying the Configuration

Provides commands to view DDNS status on an IAP and the list of DDNS clients.

Chapter 18 VPN Configuration

Understanding VPN Features

Explains IAP VPN features, requirements, and recommended setups for corporate connectivity.

Supported VPN Protocols

Lists supported VPN protocols for remote access, including Aruba IPsec, GRE, and L2TPv3.

Configuring a Tunnel from an IAP to a Mobility Controller

Describes procedures for configuring VPN host settings to enable communication with a controller.

Configuring an IPsec Tunnel

Details how to configure an IPsec tunnel to ensure encrypted data flow and secure corporate data.

Configuring an L2-GRE Tunnel

Explains procedures for configuring GRE tunnels between IAP and controller.

Configuring Aruba GRE Parameters

Describes Aruba GRE feature for sending control information for GRE tunnel setup.

Configuring an L2TPv3 Tunnel

Provides information on configuring L2TPv3 tunnels and session profiles through Instant UI or CLI.

Configuring Routing Profiles

Explains how routing profiles determine whether traffic is tunneled through IPsec or bridged locally.

Chapter 19 IAP-VPN Deployment

Understanding IAP-VPN Architecture

Describes the two components of IAP-VPN architecture: IAPs at branch sites and Controller at datacenter.

IAP-VPN Scalability Limits

Details controller scalability in IAP-VPN architecture based on IPsec tunnel, Branch ID, and datapath limits.

IAP-VPN Forwarding Modes

Determines DHCP server and default gateway for clients; supports Local, L2 Switching, and L3 routing modes.

Configuring an IAP Network for IAP-VPN Operations

Outlines the necessary configurations for IAP-VPN operations, including VPN host settings and routing profiles.

Defining the VPN Host Settings

Explains how to define VPN host settings through More > VPN > Controller in the UI.

Configuring Routing Profiles

Describes how routing profiles determine whether traffic is tunneled through IPsec or bridged locally.

Configuring DHCP Profiles

Explains how to create DHCP profiles to determine IAP-VPN mode of operation.

Configuring an SSID or Wired Port

Details how to configure SSID or wired port profiles for IAP-VPN operations.

Enabling Dynamic RADIUS Proxy

Explains how to enable dynamic RADIUS proxy to route RADIUS traffic to the required server.

Configuring Enterprise Domains

Describes how to configure enterprise domains to determine client DNS request routing.

Branch-ID Allocation

Explains the key functions of BID allocation process for DHCP services in branches.

Branch Status Verification

Describes how to view branch information connected to the controller using the 'show iap table' command.

Chapter 20 Adaptive Radio Management

ARM Overview

Explains Adaptive Radio Management (ARM) for optimizing WLAN performance through channel and power settings.

Configuring ARM Features on an IAP

Details procedures for configuring ARM features, including Band Steering and Airtime Fairness.

Configuring Radio Settings

Describes how to configure 2.4 GHz and 5 GHz radio settings for an IAP using Instant UI or CLI.

ARM Channel Selection using the CLI

Explains how to trigger ARM to perform frequent scanning and selection of a valid channel using CLI.

Chapter 21 Deep Packet Inspection and Application Visibility

Deep Packet Inspection

Describes AppRF as a Layer 7 firewall capability for creating firewall policies based on application types.

Enabling Application Visibility

Explains how to enable AppRF visibility to view statistics for IAPs and associated clients.

Application Visibility

Details the AppRF dashboard with graphs on client traffic and content filters by App Category, Web Category, and Reputation.

Enabling URL Visibility

Describes how to enable URL visibility to extract and log HTTP/HTTPS session information.

Configuring ACL Rules for Application and Application Categories

Provides procedures for configuring access rules based on application and application categories using DPI engine.

Configuring Web Policy Enforcement Service

Explains how to configure WPE service to block websites based on organization specifications via ACL rules.

Chapter 22 Voice and Video

Wi-Fi Multimedia Traffic Management

Explains Wi-Fi Multimedia (WMM) QoS standard and its support for Voice, Video, Best effort, and Background ACs.

Media Classification for Voice and Video Calls

Describes media classification types like Classify Media Flag and STUN Based Media Classification.

Enabling Enhanced Voice Call Tracking

Details how Aruba Instant supports tracking VoIP calls by sending location details to a third-party server.

Chapter 23 Services

Configuring AirGroup

Provides information on configuring AirGroup services for enterprise-class capability and zero configuration networking.

Configuring an IAP for RTLS Support

Explains how Instant supports real-time tracking of devices integrated with AMP or third-party RTLS servers.

Configuring an IAP for Analytics and Location Engine Support

Details how ALE gathers client information for business purposes by analyzing Internet behavior.

Managing BLE Beacons

Explains how to configure parameters for managing BLE beacons and secure communication with BMC.

Configuring OpenDNS Credentials

Describes how to configure OpenDNS credentials for accessing OpenDNS for enterprise-level content filtering.

Integrating an IAP with Palo Alto Networks Firewall

Explains how Palo Alto Networks firewall offers contextual security for users based on user ID.

Integrating an IAP with an XML API Interface

Provides options to create and execute user management operations using XML API interface.

CALEA Integration and Lawful Intercept Compliance

Explains how Instant supports CALEA integration for lawful interception and electronic surveillance.

Chapter 24 IAP Management and Monitoring

Managing an IAP from AirWave

Describes AirWave as a platform for managing Aruba wireless, wired, and remote access networks.

Image Management

Explains how AirWave manages firmware updates for WLAN devices by defining acceptable firmware versions.

Resetting an IAP

Details how an IAP device can be reset to factory default settings through AirWave.

IAP and Client Monitoring

Explains how AirWave allows finding IAPs or clients and viewing real-time monitoring data.

Template-Based Configuration

Describes how AirWave automatically creates configuration templates based on existing IAPs.

Trending Reports

Explains how AirWave saves actionable information for analyzing network usage and performance trends.

Intrusion Detection System (IDS)

Describes AirWave's advanced, rules-based rogue classification for detecting unauthorized IAPs and clients.

Wireless Intrusion Detection System (WIDS) Event Reporting to AirWave

Details WIDS classification integration with Rogue Access Point Detection Software (RAPIDS).

RF Visualization Support for Instant

Explains how AirWave supports RF visualization for Instant, providing real-time radio environment pictures.

PSK-Based and Certificate-Based Authentication

Describes supported DHCP server formats for AirWave authentication using PSK or certificates.

Configuring Organization String

Explains how to create organization strings for accurately representing IAP deployment in AirWave.

Configuring AirWave Information

Provides steps to configure AirWave information using Instant UI or CLI.

Enabling DNS-Based Discovery of the Provisioning AMP Server

Describes how IAPs can automatically discover the AMP server via DHCP option 43 and Activate.

Standard DHCP Options 60 and 43 on Windows Server 2008

Explains how to use standard DHCP options 60 and 43 for IAPs and APs on Windows Server 2008.

Managing IAP from Aruba Central

Describes Aruba Central's web-based interface for configuring and monitoring Aruba Instant networks.

Provisioning an IAP using Central

Explains how to subscribe, register, and manage IAPs through the Central dashboard.

Maintaining the Subscription List

Details how Aruba Central maintains a subscription list to identify authorized and unauthorized IAPs.

Firmware Maintenance

Ensures IAPs can download software images from Aruba Cloud-Based Image Service and configure HTTP proxy.

Chapter 25 Uplink Configuration

Uplink Interfaces

Describes Instant network support for Ethernet, 3G/4G USB modems, and Wi-Fi uplinks.

Ethernet Uplink

Explains that the Eth0 port is enabled as an uplink port by default.

Configuring PPPoE Uplink Profile

Provides steps to configure PPPoE settings for uplink connections using Instant UI or CLI.

Cellular Uplink

Details how Instant supports 3G/4G USB modems for Internet backhaul and extending connectivity.

Managing Cellular SIM PIN

Explains SIM PIN management functions like locking and unlocking for 3G/4G modems via IAP CLI.

Configuring Cellular Uplink Profiles

Describes how to configure 3G or 4G uplinks using the Instant UI or CLI.

Wi-Fi Uplink

Explains Wi-Fi uplink support on IAP models, except 802.11ac, with master IAP using the uplink.

Configuring a Wi-Fi Uplink Profile

Details configuration conditions for Wi-Fi uplink, including binding, disabling, and controller requirements.

Uplink Preferences and Switching

Describes procedures for enforcing uplinks, setting priorities, enabling preemption, and switching based on VPN/Internet.

Enforcing Uplinks

Explains uplink enforcement conditions, using specified uplink as primary, regardless of status.

Setting an Uplink Priority

Details how to set uplink priority using Instant UI or CLI.

Enabling Uplink Preemption

Explains uplink preemption conditions, which can be enabled only when no uplink is enforced.

Switching Uplinks Based on VPN and Internet Availability

Describes how to switch uplinks based on VPN status and Internet availability.

Viewing Uplink Status and Configuration

Provides CLI commands to view uplink status and configuration.

Chapter 26 Intrusion Detection

Detecting and Classifying Rogue IAPs

Explains how to detect rogue IAPs, which are unauthorized IAPs plugged into the wired network.

OS Fingerprinting

Gathers client OS information to identify rogue or outdated operating systems for patching.

Configuring Wireless Intrusion Protection and Detection Levels

Describes WIP options for detecting and protecting against wireless attacks on APs and clients.

Containment Methods

Explains wired and wireless containment mechanisms to prevent unauthorized stations from connecting.

Configuring IDS

Details how to create the IDS policy for IAPs using the CLI.

Chapter 27 Mesh IAP Configuration

Mesh Network Overview

Explains the Instant secure enterprise mesh solution for expanding network coverage without wires.

Mesh IAPs

Describes requirements for mesh IAPs, including valid uplink connections and roles (portal/point).

Mesh Portals

Defines a mesh portal as a gateway between wireless mesh and enterprise wired LAN.

Setting up Instant Mesh Network

Provides steps to provision IAPs as mesh IAPs, noting that mesh functionality is disabled by default.

Configuring Wired Bridging on Ethernet 0 for Mesh Point

Explains how to configure wired bridging on the Enet0 port of an IAP for mesh point function.

Chapter 28 Mobility and Client Management

Layer-3 Mobility Overview

Explains how clients roam without losing IP addresses and sessions across networks with same WLAN parameters.

Configuring L3-Mobility

Details how to configure a mobility domain by specifying Instant networks and VC IPs.

Home Agent Load Balancing

Explains Home Agent Load Balancing for large networks to distribute load using a round robin policy.

Chapter 29 Spectrum Monitor

Understanding Spectrum Data

Explains how spectrum monitor software examines RF environment to identify interference and classify sources.

Device List

Consists of a device summary table and channel information for active non-Wi-Fi devices seen by spectrum monitor.

Non-Wi-Fi Interferers

Describes types of non-Wi-Fi interferers detected by the Spectrum Monitor feature.

Channel Details

Shows channel details, summary, and aggregate data for RF environment analysis.

Channel Metrics

Displays channel quality, availability, and utilization metrics for 2.4 GHz and 5 GHz radio channels.

Spectrum Alerts

Reports alerts to VC when a new non-Wi-Fi device is found, including device ID, type, and IP address.

Configuring Spectrum Monitors and Hybrid IAPs

Explains how to provision IAPs as spectrum monitors or hybrid IAPs using background spectrum monitoring.

Converting an IAP to a Hybrid IAP

Details how to convert IAPs to hybrid mode by enabling background spectrum monitoring.

Converting an IAP to a Spectrum Monitor

Describes how to configure IAPs to function as stand-alone spectrum monitors.

Chapter 30 IAP Maintenance

Upgrading an IAP

Explains how to upgrade IAPs using the image check feature for new software images from cloud server.

Image Management Using AirWave

Details how AirWave manages firmware updates for multiclass IAP networks.

Image Management Using Cloud Server

Explains how to perform image upgrades using the Cloud Based Image Check feature.

Configuring HTTP Proxy on an IAP

Provides steps to configure HTTP proxy on IAPs for downloading images from the cloud server.

Upgrading an IAP Using CLI

Details how to upgrade an image using HTTP, TFTP, or FTP URL via CLI.

Backing up and Restoring IAP Configuration Data

Explains how to back up IAP configuration data and restore it when required.

Viewing Current Configuration

Describes how to view the current configuration on the IAP using UI or CLI.

Backing up Configuration Data

Provides steps to back up IAP configuration data using the Instant UI or CLI.

Restoring Configuration

Details how to restore IAP configuration data by browsing and selecting a configuration file.

Converting an IAP to a Remote AP and Campus AP

Provides information on regulatory domain restrictions for IAP to RAP or CAP conversion.

Converting an IAP to a Remote AP

Explains how to convert an IAP to a Remote AP using the Instant UI or CLI.

Converting an IAP to a Campus AP

Details how to convert an IAP to a Campus AP.

Converting an IAP to Stand-Alone Mode

Explains how to deploy an IAP as a stand-alone or autonomous IAP.

Converting an IAP using CLI

Provides CLI commands to convert an IAP to a remote AP or campus AP.

Resetting a Remote AP or Campus AP to an IAP

Describes how to reset an IAP to factory default settings using the reset knob.

Rebooting the IAP

Explains how to reboot all IAPs or a selected IAP using the Instant UI.

Chapter 31 Monitoring Devices and Logs

Configuring SNMP

Provides information on configuring SNMPv1, SNMPv2, and SNMPv3 community strings.

SNMP Parameters for IAP

Lists the parameters that can be configured for an IAP for SNMP reporting.

Creating Community Strings for SNMPv1 and SNMPv2 Using Instant UI

Details how to create community strings for SNMPv1 and SNMPv2 using the Instant UI.

Creating Community Strings for SNMPv3 Using Instant UI

Explains how to create community strings for SNMPv3 users using the Instant UI.

Configuring SNMP Community Strings in the CLI

Provides CLI commands to configure SNMP engine ID, host, community strings, and users.

Configuring SNMP Traps

Details how to configure external trap receivers for IAP cluster traps using Instant UI or CLI.

Configuring a Syslog Server

Explains how to specify a syslog server for sending syslog messages to external servers.

Configuring TFTP Dump Server

Provides steps to configure a TFTP server for storing core dump files using Instant UI or CLI.

Running Debug Commands

Describes how to run debugging commands from the UI and lists available support commands.

Uplink Bandwidth Monitoring

Explains how IAPs use Iperf3 to measure uplink bandwidth and publish results to ALE.

Chapter 33 Mobility Access Switch Integration

Mobility Access Switch Overview

Describes the Aruba Mobility Access Switch for secure, role-based network access for wired and wireless users.

Mobility Access Switch Integration with an IAP

Explains integration features like Rogue AP containment, PoE prioritization, and GVRP Integration.

Configuring IAPs for Mobility Access Switch Integration

Details how to enable Mobility Access Switch integration by enabling LLDP and MAS integration.

Chapter 35 IAP-VPN Deployment Scenarios

Scenario 1—IPsec: Single Datacenter Deployment with No Redundancy

Describes a single VPN primary configuration using IPsec with split tunneling for DNS and client traffic.

Scenario 2—IPsec: Single Datacenter with Multiple Controllers for Redundancy

Outlines a scenario with multiple controllers for redundancy, including VRRP, split tunneling, and distributed DHCP.

Scenario 3—IPsec: Multiple Datacenter Deployment with Primary and Backup Controllers for Redundancy

Details a multiple controller deployment with primary/backup VPNs, split tunneling, and OSPF.

Scenario 4—GRE: Single Datacenter Deployment with No Redundancy

Describes a single VPN primary configuration using GRE with centralized L2 mode DHCP.

Glossary

Acronyms and Abbreviations

Related product manuals