Aruba Central Integration
Configure Aruba Central cloud-managed Instant APs to authenticate with NetKey RADIUS for MPSK, WPA2-Enterprise, and dynamic VLAN assignment.
Aruba Central-managed APs need network access to reach the NetKey RADIUS server. Ensure firewall rules allow RADIUS traffic from AP subnets.
Prerequisites
- Aruba Central account with Instant AP management license
- Instant APs onboarded to Aruba Central
- Network connectivity from APs to NetKey RADIUS (UDP 1812/1813)
- NetKey Group configured with RADIUS secret
Log in to app.netkey.no → Settings → RADIUS Clients to find your RADIUS server IP/hostname and create a shared secret for your APs.
Aruba Central Configuration
Step 1: Configure Authentication Server
Log in to Aruba Central portal
Navigate to your Site/Group
Go to Configuration → Security → Authentication Servers
Click + Add and configure:
| Name | NetKey-RADIUS |
| Type | RADIUS |
| IP/Hostname | your-radius-server |
| Auth Port | 1812 |
| Shared Key | Your NetKey RADIUS secret |
Configure Accounting (optional):
| Enable Accounting | On |
| Accounting Port | 1813 |
Click Save
Step 2: Create Server Group
Go to Configuration → Security → Server Groups
Click + Add:
| Name | NetKey-Group |
| Servers | NetKey-RADIUS |
WPA2/WPA3-Enterprise WLAN
Navigate to Configuration → WLANs
Click + Add WLAN
Configure WLAN settings:
| Name | Corporate-Enterprise |
| SSID | Corporate-WiFi |
| Type | Employee |
Configure Security:
| Security Level | Enterprise |
| Key Management | WPA2-Enterprise (or WPA3) |
| Authentication Server | NetKey-Group |
Configure VLAN (if needed):
| Client IP Assignment | Virtual Controller Managed |
| Client VLAN Assignment | Static or Dynamic |
Click Save
MPSK Configuration
Configure Multiple Pre-Shared Keys (MPSK) via RADIUS.
Create or edit a WLAN
Configure security settings:
| Security Level | Personal |
| Key Management | WPA2-Personal (or WPA3-Personal) |
| Passphrase | Fallback PSK (8+ chars) |
Enable MAC Authentication:
| MAC Authentication | Enabled |
| Authentication Server | NetKey-Group |
| Delimiter | Colon (or configure in NetKey) |
| Uppercase | Off (lowercase) |
NetKey returns the per-device passphrase via
Aruba-MPSK-Passphrase VSA. The AP uses this instead of the fallback PSK.
RADIUS Response for MPSK
Aruba-MPSK-Passphrase = "UniqueDevicePass123"
Tunnel-Type = VLAN
Tunnel-Medium-Type = IEEE-802
Tunnel-Private-Group-ID = "100"
Dynamic VLAN Assignment
Configure VLANs to be assigned dynamically from RADIUS.
In WLAN settings, configure:
| Client VLAN Assignment | Dynamic |
| Default VLAN | Fallback VLAN ID |
| Allowed VLANs | 100,200,300,400 |
Ensure VLANs are configured on your switch infrastructure and allowed on trunk ports connecting to Instant APs.
User Roles
Assign user roles via RADIUS for differentiated access.
Create User Role
Navigate to Configuration → Roles
Click + Add Role
Configure role:
| Name | employee-role |
| VLAN | 100 |
Add access rules as needed (firewall policies)
RADIUS Response for Role
Aruba-User-Role = "employee-role"
The role name in NetKey must match exactly the role configured in Aruba Central.
Testing & Verification
View AP Status
Navigate to Monitor → Access Points
Verify APs show as "Up" and have the WLAN configured
View Client Connections
Navigate to Monitor → Clients
Check for connected clients showing:
- Authentication status
- Assigned VLAN
- User role (if applicable)
View Logs
Navigate to Monitor → Alerts & Events
Look for authentication events and RADIUS messages
Verify in NetKey
Check NetKey Auth Logs for:
- Incoming authentication requests
- Access-Accept or Access-Reject responses
- Returned attributes (VLAN, role, passphrase)
Troubleshooting
- Verify APs can reach NetKey RADIUS server IP
- Check firewall rules allow UDP 1812/1813 from AP subnet
- Confirm authentication server is correctly configured
- Verify server group is assigned to WLAN
- Verify MAC authentication is enabled on WLAN
- Check MAC format matches between Central and NetKey
- Confirm endpoint exists in NetKey with correct MAC
- Verify NetKey returns Aruba-MPSK-Passphrase
- Verify VLAN is in "Allowed VLANs" list
- Check Client VLAN Assignment is set to "Dynamic"
- Ensure VLAN exists on switch infrastructure
- Verify NetKey returns Tunnel-Private-Group-ID
- Shared secrets are case-sensitive
- Re-enter secret on both Aruba Central and NetKey
- Avoid special characters that may be interpreted differently
- Check for trailing spaces
Best Practices
- Use RadSec for WAN deployments - Consider RadSec (RADIUS over TLS) for sites connected via WAN for encrypted RADIUS traffic
- Configure redundant RADIUS - Add a secondary NetKey RADIUS server for high availability
- Monitor authentication logs - Regularly review NetKey Auth Logs for failed attempts
- Test in staging - Test configuration on a staging group before deploying to production
- Document MAC formats - Keep a record of the MAC format configured for consistency