Aruba Instant On
Configure Aruba Instant On cloud-managed access points with IronWifi for small business WiFi. This guide covers the cloud portal configuration for external captive portal, RADIUS authentication, allowed destinations (walled garden), and WPA2-Enterprise setup - all managed through the intuitive web portal or mobile app interface.
Prerequisites
In Aruba Instant On:
- Aruba Instant On access points set up and online
- Access to portal.arubainstanton.com
- Administrator credentials
In IronWifi Console (complete these first):
- Create a Network and note the RADIUS details:
- Primary server IP address
- Authentication port (1812)
- Shared secret
- Create a Captive Portal with vendor set to Aruba Instant On and note the Splash Page URL
Instant On Configuration
Access the Portal
- Go to portal.arubainstanton.com
- Log in with your account
- Select your site
Step 1: Create Guest Network
- Navigate to Networks
- Click + Add Network
- Configure:
| Field | Value |
|---|---|
| Network Type | Guest |
| Name | Guest-WiFi |
| Security | Open |
Step 2: Configure Captive Portal
- In the network settings, find Captive Portal
- Enable Captive Portal
- Select External portal type
- Configure:
| Field | Value |
|---|---|
| Server URL | 107.178.250.42 |
| Port | 443 |
| Use HTTPS | Enabled |
| Custom splash page URL | {Splash URL from IronWifi} |
Step 3: Configure Allowed Destinations (Walled Garden)
Add entries to allow access before authentication.
Required Entry
Always add the IronWifi server:
107.178.250.42
Additional Entries by Authentication Provider
Only add entries for authentication methods you've enabled in IronWifi:
| Provider | Required Allowed Destinations |
|---|---|
*.google.com, *.googleapis.com, *.gstatic.com, accounts.google.com | |
*.facebook.com, *.fbcdn.net, connect.facebook.net, facebook.com | |
*.linkedin.com, *.licdn.com, linkedin.com | |
| Twitter/X | *.twitter.com, *.twimg.com, twitter.com, *.x.com, x.com |
| Apple | *.apple.com, *.icloud.com, appleid.apple.com |
| Microsoft/Azure AD | *.microsoft.com, *.microsoftonline.com, *.msftauth.net, login.microsoftonline.com |
| Stripe | *.stripe.com, js.stripe.com |
| PayPal | *.paypal.com, *.paypalobjects.com |
| Twilio (SMS) | *.twilio.com |
Step 4: Configure RADIUS (Optional)
If using RADIUS authentication for session tracking:
- Navigate to Network Security
- Add RADIUS server:
| Field | Value |
|---|---|
| IP Address | {Primary IP from IronWifi} |
| Port | 1812 |
| Shared Secret | {Shared secret from IronWifi} |
Alternative: WPA-Enterprise (No Captive Portal)
For 802.1X authentication where users enter credentials in their device WiFi settings:
- Create new network
- Set Security to WPA2 Enterprise
- Configure RADIUS servers with IronWifi details
- Save and deploy to access points
Testing and Verification
After completing the configuration, verify everything works correctly.
Test Captive Portal Flow
- Connect a device to the Guest-WiFi network
- Open a browser and navigate to
http://example.com - Verify redirect to IronWifi splash page
- Complete authentication
- Confirm internet access is granted
Verify in Instant On Portal
- Navigate to Clients in the Instant On portal
- Find your test device
- Verify it shows as connected and authorized
Troubleshooting
If testing reveals issues, use this section to diagnose common problems.
No Splash Page
| Symptom | Cause | Solution |
|---|---|---|
| No redirect | Captive portal disabled | Enable captive portal in network settings |
| Wrong page | Incorrect external portal URL | Verify URL matches IronWifi Console |
| Blank page | Missing allowed destination | Add 107.178.250.42 to allowed destinations |
Authentication Failed
| Symptom | Cause | Solution |
|---|---|---|
| Login error | RADIUS misconfigured | Verify server IP, port, and secret |
| Timeout | Server unreachable | Check firewall allows UDP 1812 |
| Reject | Wrong credentials | Test credentials in IronWifi Console |
Connectivity Issues
| Symptom | Cause | Solution |
|---|---|---|
| AP offline | No internet | Ensure AP has internet connectivity |
| Config not applying | Sync issue | Wait for config to push, or restart AP |
| DNS failures | DNS not allowed | Ensure DNS is permitted before auth |