Skip to main content

Aruba Mobility Controller

Integrate Aruba Mobility Controller with IronWifi's RADIUS authentication and external captive portal services. This comprehensive guide covers AAA server groups, captive portal profiles, pre-authentication ACLs, user roles, WLAN configuration, and WPA-Enterprise setup for enterprise-grade guest and employee WiFi networks.

Prerequisites

In Aruba Mobility Controller:

  • Aruba Mobility Controller running ArubaOS 8.x or later
  • Access to the controller web interface or CLI
  • Administrator credentials

In IronWifi Console (complete these first):

  1. Create a Network and note the RADIUS details:
    • Primary and backup server IP addresses
    • Authentication port (1812) and Accounting port (1813)
    • Shared secret
  2. Create a Captive Portal with vendor set to Aruba and note the Splash Page URL

Controller Configuration

Step 1: Configure RADIUS Server

  1. Navigate to ConfigurationSecurityAuthenticationServers
  2. Click Add
  3. Configure primary server:
FieldValue
NameIronWifi-Primary
IP Address{Primary IP from IronWifi}
Auth Port1812
Acct Port1813
Shared Key{Shared secret from IronWifi}
  1. Add backup server with the same settings using the backup IP

Step 2: Create Server Group

  1. Navigate to AuthenticationServer Group
  2. Click Add
  3. Configure:
FieldValue
NameIronWifi
ServersAdd both IronWifi-Primary and IronWifi-Backup

Step 3: Create AAA Profile

  1. Navigate to AuthenticationL3 AuthenticationCaptive Portal Authentication
  2. Create new profile:
FieldValue
NameIronWifi-CaptivePortal
Login pageExternal
Redirect URL{Splash Page URL from IronWifi}
Server GroupIronWifi

Step 4: Configure Captive Portal Profile

  1. Navigate to SecurityCaptive Portal
  2. Create new profile:
FieldValue
NameIronWifi-Portal
TypeExternal
Auth textWelcome to Guest WiFi
Server107.178.250.42

Step 5: Create Pre-Authentication ACL

Create a whitelist for access before authentication.

Required Entry

Always allow the IronWifi server:

ip access-list session ironwifi-preauth
any host 107.178.250.42 any permit
any any svc-dns permit
any any svc-dhcp permit

Additional Entries by Authentication Provider

Only add entries for authentication methods you've enabled in IronWifi:

ProviderACL Entries to Add
Googleany host accounts.google.com any permit, any network 142.250.0.0/16 any permit
Facebookany host facebook.com any permit, any network 157.240.0.0/16 any permit
LinkedInany host linkedin.com any permit
Twitter/Xany host twitter.com any permit, any host x.com any permit
Appleany host appleid.apple.com any permit
Microsoftany host login.microsoftonline.com any permit
tip

For wildcard domain support, consider using destination-based ACLs with DNS snooping or use IP ranges for the authentication providers.

Step 6: Create User Role

  1. Navigate to RolesAdd
  2. Create authenticated role:
FieldValue
NameIronWifi-Authenticated
Access PoliciesConfigure appropriate internet access

Step 7: Configure WLAN

  1. Navigate to WLANsAdd
  2. Configure:
FieldValue
NameGuest-WiFi
SSIDGuest-WiFi
AAA ProfileIronWifi-CaptivePortal
Captive Portal ProfileIronWifi-Portal
Initial Role(role using ironwifi-preauth ACL)
Authenticated RoleIronWifi-Authenticated

CLI Configuration

For administrators who prefer CLI configuration:

# Configure RADIUS servers
aaa authentication-server radius IronWifi-Primary
host {PRIMARY_IP}
key {SHARED_SECRET}
authport 1812
acctport 1813

aaa authentication-server radius IronWifi-Backup
host {BACKUP_IP}
key {SHARED_SECRET}
authport 1812
acctport 1813

# Create server group
aaa server-group IronWifi
auth-server IronWifi-Primary
auth-server IronWifi-Backup

# Pre-authentication ACL
ip access-list session ironwifi-preauth
any host 107.178.250.42 any permit
any any svc-dns permit
any any svc-dhcp permit

# Captive portal profile
aaa authentication captive-portal IronWifi-Portal
login-page external
redirect-url "{SPLASH_URL}"
server-group IronWifi

# WLAN configuration
wlan ssid-profile Guest-WiFi
essid Guest-WiFi
opmode opensystem

wlan virtual-ap Guest-WiFi
ssid-profile Guest-WiFi
aaa-profile IronWifi-CaptivePortal
captive-portal-profile IronWifi-Portal

Alternative: WPA-Enterprise (No Captive Portal)

For 802.1X authentication where users enter credentials in their device WiFi settings:

# AAA profile for 802.1X
aaa authentication dot1x IronWifi-Dot1x
server-group IronWifi

# WLAN with WPA2-Enterprise
wlan ssid-profile Secure-WiFi
essid Secure-WiFi
opmode wpa2-aes

wlan virtual-ap Secure-WiFi
ssid-profile Secure-WiFi
aaa-profile IronWifi-Dot1x

Testing and Verification

After completing the configuration, verify everything works correctly.

Test Captive Portal Flow

  1. Connect a device to the Guest-WiFi SSID
  2. Open a browser and navigate to http://example.com
  3. Verify redirect to IronWifi splash page
  4. Complete authentication
  5. Verify internet access is granted

Verification Commands

# Check RADIUS server status
show aaa authentication-server radius statistics

# View server group configuration
show aaa server-group IronWifi

# Check client connections
show user-table

# View captive portal sessions
show captive-portal sessions

Troubleshooting

If testing reveals issues, use this section to diagnose common problems.

Captive Portal Not Redirecting

SymptomCauseSolution
No redirectCaptive portal not appliedVerify WLAN has captive portal profile
Wrong pageIncorrect redirect URLCheck external portal URL configuration
Blank pageWhitelist missingAdd 107.178.250.42 to pre-auth ACL

RADIUS Failures

SymptomCauseSolution
TimeoutServer unreachableVerify IP and check firewall
RejectWrong secretConfirm shared secret matches
No accountingServer not configuredAdd accounting server to group

Debug commands:

show aaa authentication-server radius statistics
debug aaa all

Authentication Issues

SymptomCauseSolution
Stuck in initial roleAuth not completingCheck captive portal profile
Wrong role assignedRole mapping issueVerify authenticated role configuration
Can't reach internetACL blockingCheck authenticated role policies

Debug commands:

show user-table
show datapath user
debug aaa events all