Group Persona
A persona of a device represents the role that the device plays in a network deployment. Creating persona for devices helps in customizing configuration workflows, automating parts of configurations, showing the default configuration, showing relevant settings for the device. Persona configuration also helps in customizing the monitoring screens and troubleshooting workflows appropriate for the device.
Creating a Persona
Persona can be created when creating a group. Persona and architecture can be set at the group level. All devices within a group inherit the same persona from the group settings.
While creating a group, the architecture and persona settings of the current group can be marked as preferred settings for adding subsequent groups. For subsequent groups, you can either automatically apply the preferred settings or manually select settings for the new group.
Persona for Access Points
Access Points can have the following persona:
- Campus/Branch—In this persona, AP provides WLANWireless Local Area Network. WLAN is a 802.11 standards-based LAN that the users access through a wireless connection. functionality.
Persona for Controllers
Controllers can have the following persona:
- Branch—In this persona, controllers provide Aruba Instant OS SD-Branch (LANLocal Area Network. A LAN is a network of connected devices within a distinct geographic area such as an office or a commercial establishment and share a common communications line or wireless link to a server. + WANWide Area Network. WAN is a telecommunications network or computer network that extends over a large geographical distance.) functionality.
Architecture
The following architecture is supported for creating groups:
- ArubaOS 8—Instant AP-based deployment, including 6.x/8.x IAP, IAP-VPNVirtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two., or 8.x SD-Branch deployments.