Skip to content

Configuring Aruba Gateway in Central for Authentication

Overview

This document helps you configure SNAPx based captive portal authentication system and an Aruba gateway.

SNAPx Equipment Table Requirements

FieldValue
TypeGateway
VendorAruba
Model9004
IP AddressPublic IP Address
SNMP IP AddressPrivate IP Address
ProtocolHTTPS
Usernamedefault
Passworddefault
StatusProduction

Gateway/SNAPx Wireless Connectivity

There are 3 types of communication between the gateway and SNAPx:

  1. RADIUS authentication from the gateway
  2. RADIUS Accounting from the gateway
  3. XML from SNAPx to the gateway

This requires that the gateway be reachable from a static public IP address.

Aruba Gateway Configuration Overview

Auth Servers

Navigate to Security → Auth Servers1768343901860-image.png

Ensure that you add the RADIUS and XML servers below. The RADIUS will be the Egress IP and the XML will be the Ingress IP. These values will be provided by your account representative.

SNAP_RADIUS

For SNAP_RADIUS ensure that you use the SNAP RADIUS key given to you and replicate the settings as shown. 1768344026786-image.png

XML (Your Ingress IP)

The KEY should be aruba123 for all devices. 1768344046187-image.png

Create AAA Profile

Navigate to Security → Role Assignment → AAA Profiles List1768344058031-image.png

Create SNAP profile (must be named SNAP)

MAC Authentication

Navigate to Security → L3 Authentication → SNAP and ensure the settings appear correctly. 1768344087591-image.png

XML API Server

Navigate to Security → L3 Authentication → SNAP and ensure the XML server is added. 1768344101367-image.png

Configure Captive Portal

Navigate to Security → L3 Authentication → Captive Portal Authentication Profile

Create SNAP Profile and add the captive portal URL given to you. It should look like:

https://snapx-us1.selectnetworx.com/guests/welcome/{PORTAL_ID}

1768344190680-image.png1768344202586-image.png

Configure Whitelist Alias

  1. Navigate to Security → Alias
  2. Create new alias labeled "snap"
  3. Add two "name" values:
    • *.selectnetworx.com
    • *.awsamazon.com

Navigate to Security → L3 Authentication → snap and scroll to the White List section. Add the newly created alias to the white list. 1768344226376-image.png1768344232971-image.png

Update the Role

Navigate to Security → Roles

  1. Select the logon role
  2. Select Authentication from the menu below
  3. Select More
  4. Make sure the Captive portal profile is set to SNAP1768344245203-image.png

Apply Security Policy

Navigate to Security → Apply Policy

  1. Select the INTERFACE that has the guest network VLAN
  2. Select the VLAN for the guest network
  3. Assign the SNAP role to it 1768344256124-image.png

Clear Authenticated Device from Aruba

  1. Login to Aruba device via SSH using Putty
  2. To list all the connected devices, run: show user
  3. To delete the device, note down the IP Address of the device and run: aaa user delete 192.168.50.3

Net Destination / Whitelist

Before a user is authenticated, the firewall prohibits most communication to the Internet. For users to reach the SNAPx captive portal servers and any other web site or content that the property may want users to access before they login needs to be added to the whitelist.

Consult Select Networx and the property to correctly build the whitelist. Net Destinations can include IP addresses, ranges, hostnames, etc.

User Authentication

Captive Portal Profile

Create a captive portal profile that defines the external SNAP captive portal page and authentication options. In the example below, we will:

  • Place all authenticated users in the "authenticated" role by default
  • Use the RADIUS server that is in the "SNAP" server group
  • Send users to the specific login page
  • Insert information in the redirect URL for SNAP
  • Apply the whitelist

Logon Role

Create an initial logon role that is assigned to a specific authentication profile. This role is applied to all new users who connect where the authentication profile is applied (guest wired VLAN, Virtual AP, etc.).

Different VLANs or SSIDs can have different initial logon roles, providing unique authentication experience for each. In this example, we are using default logon role access-lists (logon-control and captiveportal) that can be modified for required security policies. We also apply the captive-portal profile.

Authentication Profile

Create an authentication profile that can be assigned to wired or wireless users. Here we control how users authenticate:

  • Assigns all new users the initial role
  • Enables RADIUS accounting
  • Defines the external XML API servers to use

Applying the Roles to Users

The last thing we want to do is enable guest authentication on the guest VLAN.

Untrusted Guest VLAN

We need to set the guest VLAN as untrusted. We can do this by specifying on the interface that only VLAN 1 (or whatever the management VLAN is) should be trusted.

Built with VitePress