cancel
Showing results for 
Search instead for 
Did you mean: 

AP230 and AP370: Older firmware downloads

AP230 and AP370: Older firmware downloads

quickmouseclick
New Contributor

I am looking for older firmware versions for AP230 and AP370's. I am having major performance issues with a few of these AP's and wanted to try an older firmware.

Thanks

13 REPLIES 13

quickmouseclick
New Contributor

Channel width of the Meraki is 80Mhz - same as the AH (looking at this config)

quickmouseclick
New Contributor

hostname AP-Rm212

admin root-admin admin password ***

dns server-ip 10.3.33.1

dns server-ip 10.3.33.2 second

ntp server ntp1.aerohive.com

ntp interval 1440

clock time-zone daylight-saving-time 03-31 00:59:59 10-27 01:59:59

config version 138

config rollback enable

snmp location "Rm212@First Floor"

capwap client server name hm-emea-206.aerohive.com

capwap client dtls hm-defined-passphrase *** key-id 1

capwap client vhm-name Okehampton_College

no capwap client dtls negotiation enable

service L7-SNAPCHAT app-id 1137

service app19000 app-id 19000

qos policy BYOD-Students user-profile 3000 10 user 1000

qos policy BYOD-Students qos 0 wrr 1000 10

qos policy BYOD-Students qos 1 wrr 1000 20

qos policy BYOD-Students qos 2 wrr 1000 30

qos policy BYOD-Students qos 3 wrr 1000 40

qos policy BYOD-Students qos 4 wrr 1000 50

qos policy BYOD-Students qos 5 wrr 1000 60

qos policy BYOD-Students qos 6 strict 1000 0

qos policy BYOD-Students qos 7 strict 1000 0

user-profile Guest qos-policy def-user-qos vlan-id 18 attribute 18

user-profile BYOD-User qos-policy BYOD-Students vlan-id 17 attribute 1

user-profile InternalUser qos-policy def-user-qos vlan-id 1 attribute 2

ip-policy SnapchatDeny

ip-policy SnapchatDeny id 1 from 0.0.0.0 0.0.0.0 to 0.0.0.0 0.0.0.0 service app19000 action deny

ip-policy SnapchatDeny id 2 from 0.0.0.0 0.0.0.0 to 0.0.0.0 0.0.0.0 service L7-SNAPCHAT action deny

user-profile Guest security ip-policy from-access SnapchatDeny

user-profile Guest ip-policy-default-action permit

bonjour-gateway enable

bonjour-gateway vlan 16 18

bonjour-gateway realm "Mill Road_Okehampton_College"

application reporting auto

application identification cdp-index 19000 cdp-name app19000

application identification cdp-index 19000 cdp-rule host=feelinsonice.appspot.com cdp-module TLS

application identification cdp-index 19000 cdp-rule host=feelinsonice-hrd.appspot.com cdp-module TLS

application identification cdp-index 19000 cdp-rule host=data.flurry.com cdp-module TLS

application identification cdp-index 19000 cdp-rule host=appspot.l.google.com cdp-module TLS

application reporting watch-list 191,641,706,957,1137,1152,19000 enable

bonjour-gateway filter rule 1 *._aerohive-proxy._tcp.

bonjour-gateway filter rule 2 *._aerohive*._tcp.

bonjour-gateway filter rule 3 *._aerohive*._udp.

 

quickmouseclick
New Contributor

Hi. Quite possibly - this install was put in by an external company 5 years ago and the config was left to them. It has been working perfectly fine until recently so never had the need to look too closely. The situation now is that our hivemanager licensing has expired - this is for a number of reasons that I wont go into here. Here is the running config on this AP:

 

security mac-filter Okehampton_College default permit

security mac-filter OKE-Internal default permit

security mac-filter OKE-Guest default permit

security mac-filter OKE-BYOD default permit

security mac-filter OKE-BYOD address 8863:df70:f1e6 deny

security mac-filter OKE-BYOD address dc41:5fa0:49b1 deny

security mac-filter OKE-BYOD address 444c:0cd7:2d3d deny

security mac-filter OKE-BYOD address 28a0:2b36:b90f deny

security mac-filter OKE-BYOD address 28ed:6a53:d3a3 deny

security mac-filter OKE-BYOD address c4b3:0163:d6e9 deny

security mac-filter OKE-BYOD address 48e9:f149:ba4e deny

security mac-filter OKE-BYOD address a0cb:fd78:6ece deny

security mac-filter OKE-BYOD address 68fb:7e26:382d deny

security mac-filter OKE-BYOD address 68fb:7eac:8c3e deny

security mac-filter OKE-BYOD address 8832:9b68:3741 deny

security mac-filter OKE-BYOD address 24a2:e1dd:478d deny

security mac-filter OKE-BYOD address 78c3:e936:6ed0 deny

security mac-filter OKE-BYOD address ac29:3a35:96cc deny

security mac-filter OKE-BYOD address 5c95:ae71:999a deny

security mac-filter OKE-BYOD address e05f:459c:3954 deny

security mac-filter OKE-BYOD address 4033:1a98:f4fd deny

security mac-filter OKE-BYOD address 70e7:2ca5:2315 deny

security mac-filter OKE-BYOD address 1ccb:9900:fd91 deny

security mac-filter OKE-BYOD address 08fc:887a:9cae deny

security mac-filter OKE-BYOD address bc4c:c43b:e859 deny

security mac-filter OKE-BYOD address a88e:241d:d02e deny

security mac-filter OKE-BYOD address f0db:f872:88cf deny

security mac-filter OKE-BYOD address 483b:3864:3942 deny

security mac-filter OKE-BYOD address 78fd:9463:3bb0 deny

security mac-filter OKE-BYOD address c0f2:fb29:5ff7 deny

security mac-filter OKE-BYOD address 20a9:0eb9:26ce deny

security mac-filter OKE-BYOD address 60d9:c71c:6c2a deny

security mac-filter OKE-BYOD address 3ce0:72a7:bafc deny

security mac-filter OKE-BYOD address dc41:5fa8:5f48 deny

security mac-filter OKE-BYOD address 0ce7:2537:4934 deny

security mac-filter OKE-BYOD address 4033:1a44:d3b8 deny

radio profile Okehampton_NG

radio profile Okehampton_NG phymode 11ng

radio profile Okehampton_NG acsp access channel-auto-select time-range 05:00 10:00

radio profile Okehampton_NG beacon-period 300

radio profile Okehampton_NG short-guard-interval

radio profile Okehampton_NG benchmark phymode 11b rate 11 success 60 usage 50

radio profile Okehampton_NG benchmark phymode 11b rate 5.5 success 70 usage 50

radio profile Okehampton_NG benchmark phymode 11g rate 36 success 70 usage 50

radio profile Okehampton_NG benchmark phymode 11g rate 24 success 80 usage 50

radio profile Okehampton_NG benchmark phymode 11a rate 36 success 70 usage 50

radio profile Okehampton_NG benchmark phymode 11a rate 24 success 80 usage 50

radio profile Okehampton_NG benchmark phymode 11n rate mcs4/2 success 80 usage 50

radio profile Okehampton_NG benchmark phymode 11n rate 54 success 70 usage 50

radio profile Okehampton_NG benchmark phymode 11ac rate mcs2/2 success 80 usage 50

radio profile Okehampton_NG benchmark phymode 11ac rate 54 success 70 usage 50

radio profile Okehampton_NG band-steering enable

radio profile Okehampton_AC

radio profile Okehampton_AC phymode 11ac

radio profile Okehampton_AC channel-width 80

radio profile Okehampton_AC beacon-period 300

radio profile Okehampton_AC short-guard-interval

radio profile Okehampton_AC benchmark phymode 11b rate 11 success 60 usage 50

radio profile Okehampton_AC benchmark phymode 11b rate 5.5 success 70 usage 50

radio profile Okehampton_AC benchmark phymode 11g rate 36 success 70 usage 50

radio profile Okehampton_AC benchmark phymode 11g rate 24 success 80 usage 50

radio profile Okehampton_AC benchmark phymode 11a rate 36 success 70 usage 50

radio profile Okehampton_AC benchmark phymode 11a rate 24 success 80 usage 50

radio profile Okehampton_AC benchmark phymode 11n rate mcs4/2 success 80 usage 50

radio profile Okehampton_AC benchmark phymode 11n rate 54 success 70 usage 50

radio profile Okehampton_AC benchmark phymode 11ac rate mcs2/2 success 80 usage 50

radio profile Okehampton_AC benchmark phymode 11ac rate 54 success 70 usage 50

radio profile Okehampton_AC band-steering enable

radio profile Okehampton_AC tx-beamforming auto

security-object OKE-Internal

security-object OKE-Internal security protocol-suite wpa2-aes-psk ascii-key *** 

security-object OKE-Internal default-user-profile-attr 2

security-object OKE-Guest

security-object OKE-Guest security protocol-suite wpa2-aes-psk ascii-key ***

security-object OKE-Guest default-user-profile-attr 18

security-object OKE-BYOD

security-object OKE-BYOD security aaa radius-server account-interim-interval 20

security-object OKE-BYOD security aaa radius-server primary 10.3.35.181 shared-secret ***

security-object OKE-BYOD security aaa radius-server accounting primary 10.3.35.181 shared-secret ***

security-object OKE-BYOD security aaa user-profile-mapping enable

security-object OKE-BYOD security aaa user-profile-mapping attribute-id 1

security-object OKE-BYOD security protocol-suite wpa2-aes-8021x

security-object OKE-BYOD security additional-auth-method captive-web-portal reg-user-profile-attr 1

security-object OKE-BYOD default-user-profile-attr 1

security-object OKE-BYOD security additional-auth-method captive-web-portal default-language english

security-object OKE-BYOD security additional-auth-method captive-web-portal success-redirect original-page

security-object OKE-BYOD web-server web-page mandatory-field 0 optional-field 0

security-object OKE-BYOD web-server index-file eulaokecoll.html success-file successokecoll.html

security-object OKE-BYOD web-directory OkehamptonCollAUP

ssid OKE-Internal

ssid OKE-Internal security-object OKE-Internal

ssid OKE-Internal security mac-filter OKE-Internal

ssid OKE-Guest

ssid OKE-Guest security-object OKE-Guest

ssid OKE-Guest security mac-filter OKE-Guest

ssid OKE-BYOD

ssid OKE-BYOD security-object OKE-BYOD

ssid OKE-BYOD security mac-filter OKE-BYOD

hive Okehampton_College

hive Okehampton_College security mac-filter Okehampton_College

hive Okehampton_College wlan-idp mitigation-mode manual

hive Okehampton_College password ***

interface wifi0 radio profile Okehampton_NG

interface wifi1 radio profile Okehampton_AC

interface mgt0 hive Okehampton_College

interface wifi0 ssid OKE-BYOD

interface wifi0 ssid OKE-Guest

interface wifi0 ssid OKE-Guest shutdown

interface wifi0 ssid OKE-Internal

interface wifi1 ssid OKE-BYOD

interface wifi1 ssid OKE-Guest

interface wifi1 ssid OKE-Guest shutdown

interface wifi1 ssid OKE-Internal

system led power-saving-mode

security wlan-idp profile RogueAP

security wlan-idp profile RogueAP ap-policy

security wlan-idp profile RogueAP ap-policy ap-oui

security wlan-idp profile RogueAP ap-policy ap-oui entry 40:18:b1

security wlan-idp profile RogueAP ap-policy ap-oui entry 00:19:77

security wlan-idp profile RogueAP ap-policy ap-oui entry 08??44

security wlan-idp profile RogueAP ap-policy ap-oui entry e0:1c:41

security wlan-idp profile RogueAP ap-policy ap-oui entry f0:9c:e9

security wlan-idp profile RogueAP ap-policy ap-oui entry 9c:5d:12

security wlan-idp profile RogueAP ap-policy ap-oui entry b8:7c:f2

security wlan-idp profile RogueAP ap-policy ap-oui entry 88:5b:dd

security wlan-idp profile RogueAP ap-policy ap-oui entry c4:13:e2

security wlan-idp profile RogueAP ap-policy ap-oui entry d8:54:a2

security wlan-idp profile RogueAP ap-policy short-preamble

security wlan-idp profile RogueAP ap-policy short-beacon

security wlan-idp profile RogueAP adhoc

interface wifi0 wlan-idp profile RogueAP

interface wifi1 wlan-idp profile RogueAP

lldp

lldp max-power 154

report statistic period 1

 

 

ashley_finch
Contributor III

Out of interest, is there any difference in radio profile settings - specifically in regard to channel widths - are they both using 20MHz channels?

quickmouseclick
New Contributor

Quick update... results copying large file (12ish GB)

Initial firmware 8.2r6 (fresh boot): 19min 50

6.5r3 (fresh boot): 15min 50

8.2r4: 19min 30

Meraki MR33: 7min 15

GTM-P2G8KFN