Aruba Instant AP Integration
Configure Aruba Instant Access Points (IAP) in standalone or cluster mode to authenticate users with NetKey RADIUS for PSK and iPSK authentication.
This guide is for Aruba Instant APs operating in standalone or virtual controller mode. For controller-based deployments, see Aruba Mobility Controller.
Prerequisites
- Aruba Instant APs running Instant 8.x firmware or later
- Network connectivity between IAP and NetKey RADIUS
- Access to IAP web interface or CLI
- NetKey Group configured with RADIUS secret
Log in to app.netkey.no → Settings → RADIUS Clients to find your RADIUS server IP/hostname and create a shared secret for your IAPs.
Web GUI Configuration
Step 1: Access the IAP Interface
Connect to the IAP web interface at https://[IAP-IP]:4343
Log in with administrator credentials.
Step 2: Configure RADIUS Server
Navigate to Security → Authentication Servers
Click + to add a new server.
Configure the RADIUS server:
| Name | netkey-radius |
| IP Address | your-radius-server |
| Auth Port | 1812 |
| Accounting Port | 1813 |
| Shared Secret | Your NetKey RADIUS secret |
Click OK to save.
Step 3: Create SSID with PSK
Navigate to Networks
Click + to create a new network.
Configure Basic settings:
| Name | Corporate-PSK |
| Primary Usage | Employee |
Configure VLAN settings:
| Client IP Assignment | Network assigned |
| Client VLAN Assignment | Static (or Dynamic for RADIUS) |
Configure Security settings:
| Security Level | Personal |
| Key Management | WPA-2 Personal |
| Passphrase | Placeholder PSK |
Enable MAC Authentication:
| MAC Authentication | Enabled |
| Authentication Server 1 | netkey-radius |
| Delimiter | Colon |
| Uppercase | Enabled |
Click Next through remaining steps and Finish.
CLI Configuration
Configure via SSH to the virtual controller IP.
Configure RADIUS Server
# Configure RADIUS authentication server
wlan auth-server netkey-radius
ip your-radius-server
port 1812
acctport 1813
key YourSecretHere
exit
Create SSID with MAC Auth
# Create network profile
wlan ssid-profile Corporate-PSK
essid Corporate-PSK
type employee
opmode wpa2-psk-aes
wpa-passphrase placeholder123
mac-authentication
mac-authentication-delimiter colon
mac-authentication-upper-case
auth-server netkey-radius
vlan 100
exit
# Commit changes
commit apply
iPSK (MPSK) Configuration
Aruba Instant supports Multi-PSK (MPSK) via RADIUS lookup.
How MPSK Works
- Client connects with their unique PSK
- IAP sends MAC to NetKey for authentication
- NetKey returns the expected PSK for that MAC
- IAP validates the client-provided PSK
Enable MPSK
# Configure SSID for MPSK
wlan ssid-profile IoT-Devices
essid IoT-Devices
type employee
opmode wpa2-psk-aes
wpa-passphrase placeholder123
mac-authentication
mac-authentication-delimiter colon
mac-authentication-upper-case
auth-server netkey-radius
mpsk
exit
commit apply
NetKey returns the PSK using the Aruba-MPSK-Passphrase
vendor-specific attribute for MPSK authentication.
Dynamic VLAN
NetKey can dynamically assign VLANs based on the endpoint or user.
Enable Dynamic VLAN
# Configure SSID for dynamic VLAN
wlan ssid-profile Corporate-PSK
vlan 100
set-vlan-by-role
exit
commit apply
RADIUS Attributes
NetKey returns VLAN using:
Tunnel-Type = VLAN
Tunnel-Medium-Type = IEEE-802
Tunnel-Private-Group-ID = "100"
Or Aruba-specific attribute:
Aruba-User-Vlan = 100
User Roles
Assign access control using Aruba roles returned from RADIUS.
Create Roles
# Create guest role
wlan access-rule guest-role
rule any any match any any any permit
exit
# Create IoT role with restrictions
wlan access-rule iot-role
rule any any match any any 53 permit
rule any any match any any 443 permit
rule any any match any any any deny
exit
RADIUS Role Assignment
NetKey returns the role using:
Aruba-User-Role = "iot-role"
Verification
Check RADIUS Server
show auth-server
Test Authentication
aaa test-server ip your-radius-server user AABBCCDDEEFF password AABBCCDDEEFF
View Connected Clients
show clients
show client status aa:bb:cc:dd:ee:ff
Debug Output
# Enable debugging
logging level debug auth-server
# View logs
show log auth-server
# Disable debugging
logging level warning auth-server
Troubleshooting
- Verify IP address is correct:
show auth-server - Test connectivity:
ping your-radius-server - Check firewall allows UDP 1812/1813
- Verify shared secret matches exactly
- Verify MAC format matches NetKey (delimiter, case)
- Check endpoint exists in NetKey
- Verify endpoint group has PSK configured
- Check NetKey Auth Logs for rejection reason
- Ensure
mpskis enabled on SSID - Verify NetKey returns Aruba-MPSK-Passphrase
- Check endpoint or group has PSK configured
- PSK must be 8-63 characters
- Verify
set-vlan-by-roleis enabled - Check role exists:
show access-rule - Verify NetKey returns correct attributes
- Check client status:
show client status [mac]