Configuring System Parameters for an AP
To configure system parameters for an AP, complete the following steps:
1. In the app, set the filter to a group that contains at least one AP.
The dashboard context for the group is displayed.
2. Under , click > .
A list of access points is displayed in the
view.3. Click the icon.
The tabs to configure the access points are displayed.
4. Click , and click the tab.
The System details page is displayed.
5. Click the accordion and configure the following parameters:
Data Pane Item |
Description |
---|---|
|
This parameter configuration is only applicable for APs that operate in a cluster deployment environment. To configure the virtual controller name and IP address, click edit icon and update the name and IP address. The IP address serves as a static IP address for the multi-AP network. When configured, this IP address is automatically provisioned on a shadow interface on the AP that takes the role of a virtual controller. The AP sends three ARPAddress Resolution Protocol. ARP is used for mapping IP network address to the hardware MAC address of a device. messages with the static IP address and its MACMedia Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. address to update the network ARP cache. —Name of the virtual controller. —IPv4 address configured for the virtual controller. The IPv4 address uses the 0.0.0.0 notation. Allow IPv6 Management feature is enabled. —IPv6 address configured for the virtual controller. You can configure IPv6 address for the virtual controller only if theIPv6 is the latest version of IP that is suitable for large-scale IP networks. IPv6 supports a 128-bit address to allow 2128, or approximately 3.4×1038 addresses while IPv4 supports only 232 addresses. The IP address of the IPv6 host is always represented as eight groups of four hexadecimal digits separated by colons. For example 2001:0db8:0a0b:12f0:0000:0000:0000:0001. However, the IPv6 notation can be abbreviated to compress one or more groups of zeroes or to compress leading or trailing zeroes; for example 2001:db8:a0b:12f0::0:0:1. |
|
To configure a country code for the AP at the group level, select the country code from the drop-down list. By default, no country code is configured for the AP device groups.When a country code is configured for the group, it takes precedence over the country code setting configured t the device level. |
|
To configure a time zone, select a time zone from the drop-down list.If the selected timezone supports DSTDaylight Saving Time. DST is also known as summer time that refers to the practice of advancing clocks, so that evenings have more daylight and mornings have less. Typically clocks are adjusted forward one hour near the start of spring and are adjusted backward in autumn. , the UI displays the "The selected country observes Daylight Savings Time" message. |
|
Assign a preferred bandBand refers to a specified range of frequencies of electromagnetic radiation. by selecting an appropriate option from the drop-down list. Reboot the AP after modifying the radio profile for changes to take effect. |
|
To facilitate communication between various elements in a network, time synchronization between the elements and across the network is critical. Time synchronization allows you to:
Validate certificates. Map an event on one network element to a corresponding event on another. Maintain accurate time for billing services and similar. NTPNetwork Time Protocol. NTP is a protocol for synchronizing the clocks of computers over a network. helps obtain the precise time from a server and regulate the local time in each network element. Connectivity to a valid NTP server is required to synchronize the AP clock to set the correct time. If NTP server is not configured in the AP network, an AP reboot may lead to variation in time data. By default, the AP tries to connect to DHCPDynamic Host Configuration Protocol. A network protocol that enables a server to automatically assign an IP address to an IP-enabled device from a defined range of numbers configured for a given network. option 42. If the NTP server is configured, it takes precedence over the DHCP option 42 provisioned value. The NTP server provisioned through the DHCP option 42 is used if no server is configured. The default server is used if no NTP server is configured or provisioned through DHCP option 42. to synchronize time. The NTP server can also be provisioned through theTo configure an NTP server, enter the IP address or the URLUniform Resource Locator. URL is a global address used for locating web resources on the Internet. of the NTP server and reboot the AP to apply the configuration changes. |
|
This parameter configuration is only applicable for APs that operate in a cluster deployment environment. The IP configured for the virtual controller can be in the same subnetSubnet is the logical division of an IP network. as AP or can be in a different subnet. Ensure that you configure the virtual controller VLANVirtual Local Area Network. In computer networking, a single Layer 2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them through one or more routers; such a domain is referred to as a Virtual Local Area Network, Virtual LAN, or VLAN., controller, and subnet mask details only if the virtual controller IP is in a different subnet. Ensure that virtual controller VLAN is not the same as native VLAN of the AP. |
|
The is not applicable for cloud APs.
ISPInternet Service Provider. An ISP is an organization that provides services for accessing and using the Internet. using the master AP. To facilitate customization using a XMLExtensible Markup Language. XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. definition, multiple parameters for Circuit ID and Remote ID options of DHCP Option 82 XML are introduced. can be customized to cater to the requirements of anyThe XML file is used as the input and is validated against an XSD file in the master AP. The format in the XML file is parsed and stored in the DHCP relay which is used to insert Option 82 related values in the DHCP request packets sent from the client to the server. From the drop-down list, select one of the following XML files:
For more information, see Configuring Distributed DHCP Scopes. |
|
APs perform various functions such as wired and wireless client connectivity and traffic flows, wireless security, network management, and location tracking. If an AP is overloaded, prioritize the platform resources across different functions. Typically, the APs manage resources automatically in real time. However, under special circumstances, if dynamic resource management needs to be enforced or disabled altogether, the dynamic CPUCentral Processing Unit. A CPU is an electronic circuitry in a computer for processing instructions. management feature settings can be modified. To configure dynamic CPU management, select any of the following options from .—When selected, the CPU management is enabled or disabled automatically during run-time. This decision is based on real time load calculations taking into account all different functions that the CPU needs to perform. This is the default and recommended option. —When selected, this setting disables CPU management on all APs, typically for small networks. This setting protects user experience. —When selected, the client and network management functions are protected. This setting helps in large networks with high client density. |
|
When enabled, APs can automatically discover the virtual controller and join the network. The Auto-Join Mode feature is enabled by default. |
|
Displays the number of APs allowed for .Click to view the details of AP allowed for Auto-Join mode.Click to hide the details of AP allowed for Auto-Join mode.When Aruba Central may not be synchronized or up-to-date. In such cases, you can manually add a list of APs that can join the AP cluster in the Aruba Central UI. is enabled, the APs are automatically discovered and are allowed to join the cluster. When the is disabled on the AP, the list of allowed APs onTo manually add the list of allowed AP devices, complete the following steps: Under , click in the pane.In the window, enter the MAC address of the AP in the .Click . |
|
Enables IPv6 address configuration for the virtual controller. You can configure an IPv6 address for a virtual controller IP only when feature is enabled. |
|
Allows you to specify a VLAN ID, to prevent the AP from sending tagged frames for clients connected on the SSIDService Set Identifier. SSID is a name given to a WLAN and is used by the client to access a WLAN network. that uses the same VLAN as the native VLAN of the switch. By default, the AP considers the native VLAN of the upstream switch, to which it is connected, as the VLAN ID 1. |
|
When enabled, the users can access the AP CLI through SSHSecure Shell. SSH is a network protocol that provides secure access to a remote device. . |
|
Allows you to set a timeout for login session. |
|
When enabled, the users can access AP through the console port. |
|
If an AP is connected to Aruba Central, you can use this option to disable AP Web UI access and any communication via HTTPSHypertext Transfer Protocol Secure. HTTPS is a variant of the HTTP that adds a layer of security on the data in transit through a secure socket layer or transport layer security protocol connection. or SSH. If you enable this feature, you can manage the AP only from Aruba Central. |
|
When enabled, the users can start a Telnet session with the AP CLI. |
|
Enables or disables the LEDLight Emitting Diode. LED is a semiconductor light source that emits light when an electric current passes through it. display for all APs in a cluster. The LED display is always enabled during the AP reboot. |
|
is enabled by default in the factory default settings of APs. This disables mesh in the factory default settings. For AP devices that support Aruba Instant 8.4.0.0 firmware versions and above, you can configure up to 14 SSIDs. By enabling , you can create up to 16 networks. |
|
Turn on the toggle switch to enable the advance zone. |
|
If you have security and traffic management policies defined in upstream devices, you can disable bridging traffic between two clients connected to the same AP on the same VLAN. When inter-user bridging is denied, the clients can connect to the Internet but cannot communicate with each other, and the bridging traffic between the clients is sent to the upstream device to make the forwarding decision. To disable inter-user bridging, turn off the toggle switch. |
|
If you have security and traffic management policies defined in upstream devices, you can disable routing traffic between two clients connected to the same AP on different VLANs. When local routing is disabled, the clients can connect to the Internet but cannot communicate with each other, and the routing traffic between the clients is sent to the upstream device to make the forwarding decision. To disable local routing, move the slider to the right. |
|
If your network has separate RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources. authentication servers (local and centralized servers) for user authentication, you may want to enable to route traffic to a specific RADIUS server. When is enabled, the IP address of the virtual controller is used for communication with external RADIUS servers. To enable NASNetwork Access Server. NAS provides network access to users, such as a wireless AP, network switch, or dial-in terminal server. client in the RADIUS server profile. , you must configure an IP address for the Virtual Controller and set it as a |
|
If you want to route traffic to different TACACSTerminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. servers, enable . When enabled, the AP cluster uses the IP address of the Virtual Controller for communication with external TACACS servers. If an IP address is not configured for the Virtual Controller, the IP address of the bridge interface is used for communication between the AP and TACACS servers. However, if a VPNVirtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. tunnel exists between the Instant AP and TACACS server, the IP address of the tunnel interface is used. |
|
This parameter is required to be set only for APs that operate in a cluster deployment environment. Enables or disables the cluster security feature. When enabled, the control plane communication between the AP cluster nodes is secured. The DTLSDatagram Transport Layer Security. DTLS communications protocol provides communications security for datagram protocols. enabled cluster. toggle switch appears. Turn on the toggle switch to allow slave APs to join aFor secure communication between the cluster nodes, the Internet connection must be available, or at least a local NTP server must be configured. After enabling or disabling cluster security, ensure that the configuration is synchronized across all devices in the cluster, and then reboot the cluster. The Aruba Instant 8.4.0.0 firmware versions and above. feature is only supported in AP devices supporting |
|
Turn on the toggle switch to allow low assurance devices that use non-TPMTrusted Platform Module. TPM is an international standard for a secure cryptoprocessor, which is a dedicated microcontroller designed to secure hardware by integrating cryptographic keys into devices. chip, in the network. To enable the cluster security feature, turn on the Low Assurance PKI, refer to Cluster Security section in Aruba Instant User Guide. toggle switch. For more information onThe Aruba Instant 6.5.3.0 firmware versions and later. toggle switch is supported in AP devices running |
|
Turn on the toggle switch to enable LLDPLink Layer Discovery Protocol. LLDP is a vendor-neutral link layer protocol in the Internet Protocol suite used by network devices for advertising their identity, capabilities, and neighbors on an IEEE 802 local area network, which is principally a wired Ethernet. protocol for . With this protocol, APs can instruct the switch to turn off ports where rogue access points are connected, as well as take actions such as increasing PoEPower over Ethernet. PoE is a technology for wired Ethernet LANs to carry electric power required for the device in the data cables. The IEEE 802.3af PoE standard provides up to 15.4 W of power on each port. priority and automatically configuring VLANs on ports where APs are connected. |
|
Turn on the toggle switch to enable URL data logging for client HTTPHypertext Transfer Protocol. The HTTP is an application protocol to transfer data over the web. The HTTP protocol defines how messages are formatted and transmitted, and the actions that the w servers and browsers should take in response to various commands. and HTTPS sessions and allows APs to extract URL information and periodically log them on ALEAnalytics and Location Engine. ALE gives visibility into everything the wireless network knows. This enables customers and partners to gain a wealth of information about the people on their premises. This can be very important for many different verticals and use cases. ALE includes a location engine that calculates associated and unassociated device location periodically using context streams, including RSSI readings, from WLAN controllers or Instant clusters. for DPIDeep Packet Inspection. DPI is an advanced method of network packet filtering that is used for inspecting data packets exchanged between the devices and systems over a network. DPI functions at the Application layer of the Open Systems Interconnection (OSI) reference model and enables users to identify, categorize, track, reroute, or stop packets passing through a network. and application analytics. |
6. Click .