HI Guys!
I've got a Single IAP-135, and want to bridge it into my existing non-Aruba wireless system.
In my environment (residential), I want the Aruba's uplink to be wireless to my existing wireless system, and bridge this uplink connection to it's ethernet port, and to an SSID with the same name as my main wireless system.
Well - the uplink works. It joins my wireless network, I can ping it - I set a static IP with setenv, etc.
The IAP is in standalone mode.
If I plug in an ethernet cable to the Aruba, I can ping the IAP 135, but nothing else on the network - bridging isn't working.
Same deal if I join the SSID I created on the Aruba. I can connect, ping the IAP-135, but traffic isn't being bridge.
Help?
My config is attached.
version 6.3.1.0-4.0.0
virtual-controller-country US
virtual-controller-key REDACTED
name REDACTED
virtual-controller-ip 192.168.1.6
virtual-controller-vlan 1 255.255.255.0 192.168.1.1
terminal-access
telnet-server
ntp-server time.nist.gov
clock timezone Indiana(East) -05 00
clock summer-time EDT recurring second sunday march 02:00 first sunday november 02:00
rf-band 5.0
allowed-ap REDACTED
arm
wide-bands 5ghz
80mhz-support
g-channels 1,6,11
min-tx-power 127
max-tx-power 127
band-steering-mode prefer-5ghz
air-time-fairness-mode preferred-access
client-aware
scanning
syslog-level warn ap-debug
syslog-level warn network
syslog-level warn security
syslog-level warn system
syslog-level warn user
syslog-level warn user-debug
syslog-level warn wireless
mgmt-user admin REDACTED
wlan access-rule default_wired_port_profile
index 0
rule any any match any any any permit
wlan access-rule wired-instant
index 1
rule 192.168.1.6 255.255.255.255 match tcp 80 80 permit
rule 192.168.1.6 255.255.255.255 match tcp 4343 4343 permit
rule any any match udp 67 68 permit
rule any any match udp 53 53 permit
wlan access-rule REDACTED
index 2
rule any any match any any any permit
wlan ssid-profile REDACTED
enable
work-without-uplink
index 0
type employee
essid REDACTED
wpa-passphrase REDACTED
opmode wpa2-psk-aes
max-authentication-failures 0
vlan 1
auth-server InternalServer
rf-band all
captive-portal disable
dtim-period 3
inactivity-timeout 1000
broadcast-filter none
multicast-rate-optimization
dmo-channel-utilization-threshold 90
local-probe-req-thresh 0
max-clients-threshold 64
dot11r
auth-survivability cache-time-out 24
wlan external-captive-portal
server localhost
port 80
url "/"
auth-text "Authenticated"
auto-whitelist-disable
https
blacklist-time 3600
auth-failure-blacklist-time 3600
ids classification
ids
wireless-containment none
wired-port-profile wired-instant
switchport-mode access
allowed-vlan all
native-vlan guest
no shutdown
access-rule-name wired-instant
speed auto
duplex auto
no poe
type guest
captive-portal disable
no dot1x
wired-port-profile default_wired_port_profile
switchport-mode access
allowed-vlan all
native-vlan 1
no shutdown
access-rule-name default_wired_port_profile
speed auto
duplex full
no poe
type employee
auth-server InternalServer
captive-portal disable
no dot1x
enet0-port-profile default_wired_port_profile
enet1-port-profile default_wired_port_profile
enet2-port-profile default_wired_port_profile
enet3-port-profile default_wired_port_profile
enet4-port-profile default_wired_port_profile
wlan sta-profile
essid REDACTED
cipher-suite wpa2-ccmp-psk
wpa-passphrase REDACTED
uplink-band dot11a
uplink
no preemption
enforce none
failover-internet-pkt-lost-cnt 10
failover-internet-pkt-send-freq 30
failover-vpn-timeout 180
uplink-priority ethernet 99
uplink-priority wifi 1
uplink-priority cellular 3
airgroup
disable
airgroupservice airplay
disable
description AirPlay
airgroupservice airprint
disable
description AirPrint
#AP135#3600