What's New

Important Notes

  • It is recommended to upgrade all the Aruba Central On-Premises nodes to 512 GB for optimum performance. Starting from this release, 256 GB RAM Random Access Memory. is not supported.
  • Admins must prepare all the Aruba Central On-Premises nodes to upgrade with HPE release Service Pack. This Service Pack fixes any kind of known vulnerabilities and provides security updates for the drivers along with additional features. It is recommended by HPE to keep ILO to the latest Service Pack as it improves reliability and performance of the servers.
    For more information, see Installing Service Pack and Upgrade ILO Using Service Pack.
    For more information on Service Pack software requirement, you can refer to the Support Advisory.

    Customers must sign-in to HPE Networking Support Portal to access this Support Advisory.

New Features

The following sections provide an overview of the new features that are added to Aruba Central On-Premises in this release.

Adding Subscription for Offline-Mode Installations

Aruba Central On-Premises has introduced manually adding the subscription A business model where a customer pays a certain amount as subscription price to obtain access to a product or service. on HPE GreenLake account home to support offline deployments. The license file is uploaded in the Device Subscriptions page under Manage Account > Subscriptions. For more information, see Subscription for Offline-Mode Installation.

Aruba Central NetConductor

Listed below are the features introduced for Aruba Central On-Premises, in this release: 

  • Users can configure underlay network in Aruba Central On-Premises.

    For more information, see Network Wizard Overview .

  • Aruba Central On-Premises now provides a re-sync button to resolve configuration conflicts within existing overlay fabrics. This button is only available when a configuration conflicts exists.

    For more information, see Fabric Wizard Overview .

  • Aruba Central On-Premises now supports Layer 2 overlay segments for the default gateways.

    For more information, see Fabric Wizard Overview .

Automatic Recovery

Aruba Central On-Premises has introduced the Auto Recovery tab under System Management. This feature allows you to recover critical resources in an event of network interface failure. The option to set up time for node reboot operation is also provided in this tab. For more information, see Automatic Recovery.

Aruba Central On-Premises APIs

Listed below are the APIs introduced in this release.

API Application Programming Interface. Refers to a set of functions, procedures, protocols, and tools that enable users to build application software. Category New APIs

Service RAPIDS Rogue Access Point identification and Detection System. An AMP module that is designed to identify and locate wireless threats by making use of all of the information available from your existing infrastructure. > Aruba Rapids

 

 

 

  • [GET GET refers HTTP request method or an SNMP operation method. The GET HTTP request method submits data to be processed to a specified resource. The GET SNMP operation method obtains information from the Management Information Base (MIB). ] /rapids-config/v1/node_list/{node_type}/{node_id}/config/
  • [GET] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rule/
  • [GET] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rule/{rule_name}/
  • [GET] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rule/{rule_name}/match_criteria/
  • [GET] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rules/{rule_name}/match_criteria/site_excludes/
  • [GET] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rules/{rule_name}/match_criteria/site_excludes/{name}/
  • [GET] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rules/{rule_name}/match_criteria/site_includes/
  • [GET] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rules/{rule_name}/match_criteria/site_includes/{name}/
  • [GET] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rules/{rule_name}/match_criteria/ssid_excludes/
  • [GET] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rules/{rule_name}/match_criteria/ssid_excludes/{essid}/
  • [GET] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rules/{rule_name}/match_criteria/ssid_includes/
  • [GET] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rules/{rule_name}/match_criteria/ssid_includes/{essid}/
  • [PUT] /rapids-config/v1/node_list/{node_type}/{node_id}/config//rapids-config/v1/node_list/{node_type}/node_id}/config/classification_rule/{rule_name}/
  • [PUT] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rule/{rule_name}/match_criteria/
  • [PUT] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rules/{rule_name}/match_criteria/site_excludes/{name}/
  • [PUT] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rules/{rule_name}/match_criteria/site_includes/{name}/
  • [PUT] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rules/{rule_name}/match_criteria/ssid_excludes/{essid}/
  • [PUT] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rules/{rule_name}/match_criteria/ssid_includes/{essid}/
  • [DELETE] /rapids-config/v1/node_list/{node_type}/{node_id}/config/
  • [DELETE] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rule/{rule_name}/
  • [DELETE] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rule/{rule_name}/match_criteria/
  • [DELETE] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rules/{rule_name}/match_criteria/site_excludes/{name}/
  • [DELETE] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rules/{rule_name}/match_criteria/site_includes/{name}/
  • [DELETE] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rules/{rule_name}/match_criteria/ssid_excludes/{essid}/
  • [DELETE] /rapids-config/v1/node_list/{node_type}/{node_id}/config/classification_rules/{rule_name}/match_criteria/ssid_includes/{essid}/

VisualRF > GeoFence

  • [GET] /visualrf_api/v1/geofence
  • [POST] /visualrf_api/v1/geofence
  • [DELETE] /visualrf_api/v1/geofence

For more information, see Changes to Aruba Central On-Premises APIs.

Aruba Central On-Premises Deployment

Aruba Central On-Premises now supports Bare Metal mode (non-appliance) deployment along with appliance mode deployment,

In Bare Metal mode, customers deploy Aruba Central On-Premises on HPE servers that meet certain specification. The recommended platform for this deployment is HPE DL360 Gen10. To enable Bare Metal mode, you must download the root certificate authority (CA Certificate Authority or Certification Authority. Entity in a public key infrastructure system that issues certificates to clients. A certificate signing request received by the CA is converted into a certificate when the CA adds a signature generated with a private key. See digital certificate. ) from Comand Line Interface (CLI Command-Line Interface. A console interface with a command line shell that allows users to execute text input as commands and convert these commands to appropriate functions. ) to connect to your network devices. This certificate should be uploaded to your respective devices for authentication.

For more information on Aruba Central On-Premises deployment, seeLegal Disclaimer: The resource assets in this website may include abbreviated and/or legacy terminology for HPE Aruba Networking products. See www.arubanetworks.com for current and complete HPE Aruba Networking product lines and names..

For more information on Command Line Interface options, see System Configuration.

Aruba Central On-Premises Network Link Aggregation

Aruba Central On-Premises supports network link aggregation (LAG Link Aggregation Group . A LAG combines a number of physical ports together to make a single high-bandwidth data path. LAGs can connect two switches to provide a higher-bandwidth connection to a public network. ) in case of any network breakage. LAG can be enabled or disabled through Command Line Interface (CLI) from the ILO console. Aruba Central On-Premises LAG configuration is a network related operation and each node in the cluster must be individually configured for this feature to work. LAG gets disabled when a node in the cluster is reset. For more information, see Network Link Aggregation.

Automatic Rollback Configuration on AOS-CX Switches

Aruba Central On-Premises now supports an auto-rollback mechanism for AOS-CX switches running 10.06 or later software versions. The rollback mechanism is triggered when the switch loses its connectivity to Aruba Central On-Premises after a configuration push. For more information, see Automatic Rollback Configuration .

Cable Test Support for AOS-CX Switches

Aruba Central On-Premises now supports cable test for AOS-CX switches. This enables testing of the electrical connections in the switch cable. For more information, see Troubleshooting Device Issues.

Configuring Client Events for AOS-CX

Users can configure client events to generate authentication and DHCP Dynamic Host Configuration Protocol. A network protocol that enables a server to automatically assign an IP address to an IP-enabled device from a defined range of numbers configured for a given network. events of clients. For more information, see Configuring Authentication and DHCP Related Client Events on AOS-CX

Configuring Port Profiles on AOS-CX

The Port profiles feature allows you to configure interface-specific commands at the group level through an editor that supports syntax and semantic checking. For more information, see Configuring Switch Ports on AOS-S Switches.

Configuring RADIUS Server Settings on AOS-S Switches

Aruba Central On-Premises supports Window Size and Time Window as the RADIUS Remote Authentication Dial-In User Service is a networking protocol that provides centralized authentication, authorization, and accounting management for users who connect and use a network service server parameters.

Window Size is used to configure replay protection for dynamic authorization messages. The window size is the time in seconds within which the received dynamic authorization requests are considered to be current and accepted for processing. A zero value means there is no time limit. A non-zero value indicates that the Event-Timestamp attribute is expected as part of all Change of Authorization and Disconnect request messages. If the timestamp attribute is not present the message is dropped. The default Window Size value is 300 seconds.

The Time Window option allows the user to select Positive or Plus minus window size. Positive (positive-time-window) sets the current acceptable time-window as + seconds. Plus minus (plus-or-minus-time-window) sets the current acceptable time-window as +/- seconds. When replay protection is enabled and positive-time-window is set, messages from the server must contain an Event-Timestamp attribute that differs from the current time by not more than the specified number of seconds.

When replay protection is enabled and plus-or-minus-time-window is set, messages from the server must contain an Event-Timestamp attribute that differs from the current time by no more than the (+/-) specified number of seconds. Messages with a timestamp value outside the valid window are considered stale and are ignored. Setting the time window to zero disables replay protection. The default window-type is positive-time-window.

For more information on Time Window and Window Size see Configuring RADIUS Server Settings on AOS-S Switches

Configuring Switch Ports on AOS-S Switches

Aruba Central On-Premises allows the user to enable or disable the unsupported transceivers (third-party transceivers).

Configuring System Access for AOS-S Switches

Aruba Central On-Premises supports the following new features:

For more information, see Configuring System Parameters for AOS-S Switches.

Configuring TACACS Server Settings on AOS-S Switches

Aruba Central On-Premises now allows the user to configure TACACS server settings. For more information, see Configuring TACACS Server Settings on AOS-S Switches.

Datacenter Redundancy

The Datacenter Redundancy tab is introduced under System Management. This feature allows you to configure and pair two clusters in order to continue network functioning by switching roles, in case of a failover, within minimum downtime. For more information, see Datacenter Redundancy .

RAPIDS

Aruba Central On-Premises now allows users to enable or disable the RAPIDS feature as a whole on per customer basis. Users who want to configure rules can enable the Enable RAPIDS toggle button under Manage > Security > RAPIDS. Upon enabling the RAPIDS feature, users can see the Classification Rules table with the default configured rules. In addition to the default rules, users can configure a predefined set of customized classification criteria at the global level to determine the classification of a neighboring AP. For more information, see Configuring RAPIDS.

Support for AP-503 Access Points

Aruba Central On-Premises now supports configuring and monitoring of AP-503 access points (AP) using the UI User Interface. options and templates. For more information, see Supported APs.

Support for MultiZone Feature

Aruba Central On-Premises now supports the Multizone feature that allows you to monitor multiple isolated network zones within a single physical network infrastructure, such as an AP. You can group your devices in the WebUI to monitor and troubleshoot network problems that are specific to a particular group, site, or label. You can also create various types of reports for devices associated with groups, sites, and labels in a MultiZone setup. MultiZone has limited support in Aruba Central On-Premises and this feature is applicable from Aruba Central On-Premises 2.5.7.6 or later versions.

For more information, see MultiZone.

Support for Third-Party Devices

Aruba Central On-Premises now supports adding and monitoring third-party devices, such as Cisco 9200 and 9300 series switches. For more information, see Monitoring Third-Party Devices.

VSF Switchover

In AOS-CX switch stacks, the VSF Switchover option triggers the standby conductor switch to take over the conductor role. For more information, see Switching Over the Conductor Role

Aruba Central On-Premises Service Pack Upgrade

Aruba Central On-Premises now supports service pack upgrade through the ILO console and COP CLI console. Customers using lower versions of Aruba Central On-Premises has a low ILO and firmware version installed. For proper functioning of the Aruba Central On-Premises nodes, it is recommend to upgrade it to the latest service pack (SP) which includes all the latest firmwares.

You can trigger the Service Pack upgrade only from the ILO console whereas, you can check the installed Service Pack version and reset it from both ILO console and COP CLI console. You must download the ILO Service Pack from the HPE Support Portal, HPE Support Center and the Patched Service pack by HPE from, SPP Custom Download.. Aruba Central On-Premises supports only "2022.09.01.00", "2023.09.00.03", or "2023.03.00.00" service pack versions. On checking Service Pack version, the version details is displayed as Unknown if the service pack is not one of the supported versions or, the user checks it before applying the Service Pack. For more information, see Installing Service Pack and Upgrade ILO Using Service Pack.

Data Truncation for PDF Export in Reports

The widgets for PDF in the Resource Utilization Reports, Rapids, Guest, Network Report, New Infra Inventory Report, Security, Config & Audit Report, Switch capacity planning- and RF Health reports are truncated up to 2.5 lakh characters to support the PDF export. The complete data can be exported to CSV Comma-Separated Values. A file format that stores tabular data in the plain text format separated by commas. format. For more information, see Report Types.

Enhancements

The following sections provide an overview of the enhancements introduced in Aruba Central On-Premises in this release.

Access Logs

Users can now see logs for any kind of Aruba Central On-Premises access that is either done through the web or Command Line Interface (CLI). For more information, see Audit Trail.

Access Points Monitoring

The following AP monitoring enhancements are introduced in this release.

Controller AP Group

Aruba Central On-Premises now supports Controller AP Group parameter in the Access Points List and Access Points Overview page that displays the name of the AP group.

For more information, see the following topics:

Support for Access Points Tab in the Controller Dashboard

Aruba Central On-Premises now supports Access Points tab under Manage > Access Points page in the controller dashboard that displays details of all the APs connected to a specific controller. For more information, see Access Points Tab in the Controller Dashboard.

Alerts and Events

The following Alerts & Events enhancements are introduced in this release:

IP Management System

A new alert type IP Management System is added under Alerts & Events. The following alert is added under IP Management System alert type:

IPMS Pool Capacity Alert—Generates an alert when IPMS pool allocation crosses 80% of assigned pool size. The alert is cleared when the pool capacity is below 80% of the assigned capacity in the network.

For more information, see IP Management System Alert.

Access Point Alerts

DPP Attack—Generates an alert when there is a DPP-related DoS Denial of Service.  DoS is any type of attack where the attackers send excessive messages to flood traffic and thereby preventing the legitimate users from accessing the service.  attack in the network.

For more information, see Access Point Alerts.

Central System Alerts

COP Disaster Recovery Alert Notifier—Generates an alert when the DR (Disaster Recovery) role is successfully changed to the Primary cluster.

Connectivity Alerts

The following new authentication alert types are added in Connectivity alerts to enhance user experience by adding detailed information regarding the server IP, authentication type, number of users impacted, and percentage of users effected.

This additional categorization of the authentication alerts enable users to quickly triage the alerts and take appropriate action.

For more information, see Connectivity Alerts

AOS-CX Switch Alerts

The following alerts are introduced in this release:

  • Management module failure—Generates an alert when the state of the management module changes to down or failed.

  • Line-card failure—Generates an alert when the state of the line card changes to down or failed.

  • Fan tray failure —Generates an alert when the state of the fan tray in the slot changes to down or failed.

  • Fan failure —Generates an alert when the state of the fan in the slot tray changes to fault.

  • Power supply failure—Generates an alert when the state of the power supply in the slot changes to fault input or warning.

  • Switch Uplink Port Status Change—Generates an alert when there is a change in the status of the uplink port. This alert is generated when the uplink port goes down and it is cleared when the port status is restored.

For more information, see AOS-CX Switch Alerts.

AOS-CX Switch Events

Support for the following events are available:

For more information about the AOS-CX switch events, navigate to the AOS-CX Switch Software Documentation Portal. In the AOS-CX Switch Software Documentation portal, navigate to a switch model and click the View software feature and user guides (HTML) link. Click Software Release Version listed next to the Event Log Message Reference Guide to view the events for the software release version selected.

Aruba Central On-Premises APIs

Listed below are the APIs enhanced in this release.

API Category Modified APIs

Configuration > Certificates

  • [POST /configuration/v1/certificates/
  • [PUT] /configuration/v1/msp/certificate
  • [PUT] /configuration/v1/non_msp/certificate

Configuration > WLAN Wireless Local Area Network. WLAN is a 802.11 standards-based LAN that the users access through a wireless connection. Configuration

  • [POST] /configuration/v2/wlan/{group_name_or_guid_or_serial_number}/{wlan_name}
  • [PUT] /configuration/v2/wlan/{group_name_or_guid_or_serial_number}/{wlan_name}
  • [PATCH] /configuration/v2/wlan/{group_name_or_guid_or_serial_number}/{wlan_name}

Firmware

  • [GET] /firmware/v1/devices
  • [GET] /firmware/v1/devices/{serial}
  • [GET] /firmware/v1/versions
  • [GET] /firmware/v1/versions/{firmware_version}
  • [GET] /firmware/v1/status
  • [GET] /firmware/v2/upgrade/compliance_version
  • [GET] /firmware/v1/upgrade/compliance_version
  • [GET] /firmware/v1/models
  • [GET] /firmware/v1/msp/upgrade/compliance_version
  • [GET] /firmware/v1/msp/upgrade/customers/{customer_id}/compliance_version
  • [GET] /firmware/v1/msp/tenants/{tenant_id}
  • [POST] /firmware/v1/upgrade
  • [POST] /firmware/v1/upgrade/cancel
  • [POST] /firmware/v1/upgrade/compliance_version
  • [POST] /firmware/v1/msp/upgrade
  • [POST] /firmware/v1/msp/upgrade/customers/{customer_id}
  • [POST] /firmware/v1/msp/upgrade/cancel
  • [POST] /firmware/v1/msp/upgrade/customers/{customer_id}/cancel
  • [POST] /firmware/v2/msp/upgrade/cancel
  • [POST] /firmware/v2/msp/upgrade/customers/{customer_id}/cancel
  • [POST] /firmware/v1/msp/upgrade/compliance_version
  • [POST] /firmware/v1/msp/upgrade/customers/{customer_id}/compliance_version
  • [DELETE] /firmware/v2/upgrade/compliance_version
  • [DELETE] /firmware/v1/msp/upgrade/compliance_version
  • [DELETE] /firmware/v1/msp/upgrade/customers/{customer_id}/compliance_version

Monitoring > AP

  • [GET] /monitoring/v2/aps/
  • [GET] /monitoring/v1/aps/{serial}

New Device Inventory > Devices

  • [GET] /platform/device_inventory/v1/devices

New Licensing

  • [GET] /platform/licensing/v1/subscriptions

Configuration > Device

Depending on the role and group scope assigned to a user, the behavior of the APIs are updated .

  • [GET] /configuration/v1/devices/{device_serial}/group
  • [GET] /configuration/v1/devices/{device_serial}/configuration
  • [GET] /configuration/v1/devices/{device_serial}/config_details
  • [GET] /configuration/v1/devices/{device_serial}/variablised_template

Configuration > MM-MD

Depending on the role and group scope assigned to a user, the behavior of the API is updated.

  • [POST] /configuration/v1/devices/{device_serial}/recover_device

Monitoring > Switch

Depending on the role and group scope assigned to a user, the behavior of the APIs listed under Monitoring > Switch category are updated.

Monitoring > Gateway

Depending on the role and group scope assigned to a user, the behavior of the APIs listed under Monitoring > Gateway category are updated.

Listed below are the APIs removed in this release.

API Category Removed APIs
Rapids > SSIDs

The following APIs in the RAPIDS category are removed. You can now configure RAPIDS from the RAPIDS configuration page. For more information, see Configuring RAPIDS.

  • [GET] /rapids/v1/ssid_allow
  • [GET] /rapids/v1/ssid_block
  • [POST] /rapids/v1/ssid_allow
  • [POST] /rapids/v1/ssid_block
  • [DELETE] /rapids/v1/ssid_allow
  • [DELETE /rapids/v1/ssid_block

For more information, see Changes to Aruba Central On-Premises APIs.

Aruba Central supports streaming GeoFence events using streaming API. For more information, see Streaming APIs.

To enhance security, client_id and client_secret are part of the body parameters for customer facing token generation APIs. For more information, see Obtaining Token Using OAuth Grant Mechanism.

Aruba Central On-Premises ISO Installation

From now, during any Aruba Central On-Premises installation on the iLO Integrated Lights-Out (iLO) by Hewlett-Packard Enterprise is a proprietary embedded server management technology providing out-of-band management facilities. server, if there are any test ilo user accounts that were created by the customer, those accounts will be deleted. Only ‘administrator’ and ‘copilo’ ILO account can be created and retained as a part of the ISO An ISO file is an identical copy of an entire optical disk for example, a CD or a DVD, archived into a single file. This ISO file is also referred to as an ISO image, which is a smaller-sized copy of large sets of data. installation. This behavior is applicable to any upgrade from Aruba Central On-Premises 2.5.6 to Aruba Central On-Premises 2.5.7, and also when any customer migrates from Airwave to Aruba Central On-Premises.

For more information, see ISO and Aruba Central On-Premises Software Installation

Certificates

Certificates are enhanced to support the following:

For more information on certificates, see Manage Certificates.

Device Override Visualization

Users can now view the local override configuration details of a switch or its group. For more information, see Using Configuration Status on AOS-CX.

Handling Aruba Central On-Premises Upgrade for Datacenter Redundancy

For Aruba Central On-Premises upgrade from one version to another, it is beneficial to have a secondary cluster for safe management of software and hardware systems. To upgrade the secondary cluster, you must first upgrade the primary cluster. Primary cluster can be upgraded through user interface or command line interface (CLI) option whereas, the secondary cluster can only be upgraded through CLI.

For more information, see the following topics:

Host Upgrade Parallelization

The time to perform a host upgrade from Aruba Central On-Premises 2.5.6 to Aruba Central On-Premises 2.5.7 for a 7 node cluster is now reduced to 1.5 hours - 2 hours.

Incremental Backup

A new option, Incremental Backup, is added to the Backup Later schedule under MaintainSystem ManagementBackup and Restore. This option is provided to aid in taking daily backup of voluminous databases in a segregated manner. For more information, see Schedule Incremental Backup.

Managing Local Overrides for AOS-CX Switches

Aruba Central On-Premises now allows users to view the local overrides of a switch or its group. For more information, see Using Configuration Status on AOS-CX.

NAE Scripts

In this version of Aruba Central On-Premises, new NAE scripts are supported. For more information, see Express Configuration Using MultiEdit on AOS-CX.

New Infra Inventory Report

A new column Controller AP Group is added to the Total APs table of the New Infra Inventory report.

For more information, see Report Categories.

OPA Gatekeeper for Public Image Restriction

Aruba Central On-Premises now downloads packages from private allow listed repositories and uses signed packages for images.

For more information, see the following topics:

Password Specifications for Aruba Central On-Premises Configuration

The password must be alphanumeric. The minimum requirement is eight characters that includes a combination of letters, numbers, and special characters.

This password specification is applicable for the following operations:

Table 1: Password Requirements

Requirement

Description

Password length

The minimum number of alphanumeric characters required for a password is 8.

Range: 8 - 64 (combination of alphabets, numbers, and special characters).

Upper Case characters

Use a minimum of 1 uppercase alphabet in password.

Alphabets A to Z.

Lower Case characters

Use a minimum of 1 lowercase alphabet in password.

Alphabets a to z.

Numbers

Use a minimum of 1 digit (number) in password.

Numbers 0 - 9.

Special characters

Use a minimum of 1 special character in password.

Supported special characters are ~, !, @, #, $, %, ^, &, *, (, ), <, >, {, }, ;, :, . and ,.

For more information, see Aruba Central Configuration .

Removing Multiple Devices from a Site

Aruba Central On-Premises now allows users to remove multiple devices at a time. For more information, see Manage Sites.

Replacement Details Page

You can now view the device replacement details page for a particular device by clicking on the old device serial from the Devices Under Replacement and Replacement History pages. For more information, see Device Replacement

Support for Resolving FQDNs

Aruba Central On-Premises now requires the FQDNs to be resolved on both the primary and secondary DNS Domain Name System. A DNS server functions as a phone book for the intranet and Internet users. It converts human-readable computer host names into IP addresses and IP addresses into host names. It stores several records for a domain name such as an address 'A' record, name server (NS), and mail exchanger (MX) records. The Address 'A' record is the most important record that is stored in a DNS server, because it provides the required IP address for a network peripheral or element. servers.

System Security

The System Management tab now includes the System Security tab. The System Security tab provides the option to configure insecure algorithms for backup on older servers that do not support secure protocols, and to restrict management access on Aruba Central On-Premises. For more information, see Configuring System Security.

Multi- Node Cluster Update

In case of multi-node cluster, Aruba Central On-Premises CLI option 1-1 Reboot System enables you to perform a wide cluster reboot or a single cluster reboot based on your requirement. Following are options that you can choose:

  • Cluster Reboot

  • Current Node Reboot

For more information, see The CLI Bank.