โ† All skills
Tencent SkillHub ยท Developer Tools

Aruba Iap Publish

Comprehensive Aruba Instant AP (IAP) configuration management with automatic baseline capture, rollback support, and health monitoring. Supports device disco...

skill openclawclawhub Free
0 Downloads
0 Stars
0 Installs
0 Score
High Signal

Comprehensive Aruba Instant AP (IAP) configuration management with automatic baseline capture, rollback support, and health monitoring. Supports device disco...

โฌ‡ 0 downloads โ˜… 0 stars Unverified but indexed

Install for OpenClaw

Quick setup
  1. Download the package from Yavira.
  2. Extract the archive and review SKILL.md first.
  3. Import or place the package into your OpenClaw setup.

Requirements

Target platform
OpenClaw
Install method
Manual import
Extraction
Extract archive
Prerequisites
OpenClaw
Primary doc
SKILL.md

Package facts

Download mode
Yavira redirect
Package format
ZIP package
Source platform
Tencent SkillHub
What's included
README.md, SKILL.md, _meta.json, add-aruba-ssid.json, assets/config_template.txt, backups/20260223_232629/result.json

Validation

  • Use the Yavira download entry.
  • Review SKILL.md after the package is downloaded.
  • Confirm the extracted package contains the expected setup assets.

Install with your agent

Agent handoff

Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.

  1. Download the package from Yavira.
  2. Extract it into a folder your agent can access.
  3. Paste one of the prompts below and point your agent at the extracted folder.
New install

I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.

Upgrade existing

I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.

Trust & source

Release facts

Source
Tencent SkillHub
Verification
Indexed source record
Version
1.2.0

Documentation

ClawHub primary doc Primary doc: SKILL.md 26 sections Open source page

Aruba IAP Configuration Manager

Comprehensive Aruba Instant AP (IAP) configuration management with automatic baseline capture, rollback support, and health monitoring.

โœจ Core Capabilities

Device Mode Detection: Automatically detects Virtual Controller, Single-Node Cluster, or Standalone AP mode Configuration Snapshots: Full configuration capture with structured JSON output Safe Configuration Changes: Apply changes with automatic baseline capture and rollback support Comprehensive Monitoring: 40+ monitoring commands across 10 categories Risk Assessment: Automatic risk evaluation for configuration changes Secret Management: Secure secret references (no plain-text passwords) Change History: Full audit trail with timestamped artifacts Interactive Configuration Mode: Support for Aruba IAP CLI commit model

๐Ÿ“Š Configuration Change Types

TypeRiskDescriptionssid_profileMediumCreate complete SSID profile with WPA2-PSK-AESssid_deleteHighRemove existing SSID profilesnmp_communityLowSNMP community configurationsnmp_hostLow-MediumSNMP host/trap destinationsyslog_levelLowSyslog logging levelsauth_serverMediumRADIUS/CPPM authentication serverap_allowlistMediumAdd/remove APs from allowlistwired_port_profileMediumWired port configurationntpLowNTP server configurationdnsLowDNS server configurationrf_templateLowRF template application

1. Installation

# Clone or download the skill cd ~/.openclaw/workspace/skills/aruba-iap-publish # Run install script ./install.sh # Verify installation iapctl --help

2. Basic Usage

# Device Discovery iapctl discover --cluster office-iap --vc 192.168.20.56 --out ./out # Configuration Snapshot iapctl snapshot --cluster office-iap --vc 192.168.20.56 --out ./out # Verify Configuration iapctl verify --cluster office-iap --vc 192.168.20.56 --level basic --out ./out

3. Add SSID

# Create SSID configuration JSON cat > add-ssid.json << 'EOF' { "changes": [ { "type": "ssid_profile", "profile_name": "MyWiFi", "essid": "MyNetwork", "opmode": "wpa2-psk-aes", "wpa_passphrase": "MySecurePassword123", "vlan": 1, "rf_band": "all" } ] } EOF # Generate diff iapctl diff --cluster office-iap --vc 192.168.20.56 \ --in add-ssid.json --out ./diff # Apply changes iapctl apply --cluster office-iap --vc 192.168.20.56 \ --change-id $(cat diff/commands.json | jq -r '.change_id') \ --in diff/commands.json --out ./apply

4. Delete SSID

# Create delete SSID configuration JSON cat > delete-ssid.json << 'EOF' { "changes": [ { "type": "ssid_delete", "profile_name": "OldSSID" } ] } EOF # Generate diff iapctl diff --cluster office-iap --vc 192.168.20.56 \ --in delete-ssid.json --out ./diff # Apply changes iapctl apply --cluster office-iap --vc 192.168.20.56 \ --change-id $(cat diff/commands.json | jq -r '.change_id') \ --in diff/commands.json --out ./apply

5. Monitor Device

# Monitor all categories iapctl monitor --cluster office-iap --vc 192.168.20.56 --out ./monitor # Monitor specific categories iapctl monitor --cluster office-iap --vc 192.168.20.56 \ -c "system ap clients wlan" --out ./monitor

Supported Device Modes

Virtual Controller Mode Manages multiple IAPs Full CLI command set available Single-Node Cluster Mode โœจ NEW Single IAP with VC configuration Supports interactive config mode configure terminal โ†’ config commands โ†’ commit apply Standalone AP Mode Individual AP without cluster Basic configuration available

Interactive Configuration Mode

For Aruba IAP devices, configuration uses the CLI commit model: Enter configuration mode: configure terminal Enter sub-mode (e.g., wlan ssid-profile <name>) Configure parameters (flat commands, no indentation) Exit sub-mode: exit Exit configuration mode: exit Save configuration: write memory Apply configuration: commit apply

Risk Assessment

iapctl automatically assesses risks for each change set:

Risk Levels

low: Minimal impact, safe to apply medium: May affect connectivity, review recommended high: Major changes, requires careful planning

Common Warnings

Removing WLAN or RADIUS configuration may disconnect users WPA passphrase changes will require clients to re-authenticate AP allowlist changes may prevent APs from joining the cluster VLAN changes may affect network connectivity Large number of changes - consider applying in stages

1. Use Secret References

Always use secret_ref for passwords and keys: { "type": "auth_server", "server_name": "radius-primary", "ip": "10.10.10.10", "secret_ref": "secret:radius-primary-key" } Never commit plain-text secrets to version control.

2. Review Risk Assessment

Always review risk.json before applying changes: cat diff/risk.json

3. Use Dry Run First

Test with --dry-run to verify commands without applying: iapctl apply --dry-run ...

4. Verify After Changes

Always run verify after applying changes: iapctl verify --level full ...

5. Apply Changes in Stages

For large change sets, break them into smaller batches: Stage 1: SNMP and syslog configuration Stage 2: Authentication servers Stage 3: SSID profiles Stage 4: AP allowlist and wired ports

Testing

Comprehensive testing performed on real hardware: โœ… Device discovery and mode detection โœ… Configuration snapshot with multiple artifacts โœ… Configuration diff generation โœ… SSID profile addition โœ… SSID profile deletion โœ… Configuration apply with interactive mode โœ… Configuration verification โœ… Health monitoring โœ… Risk assessment โœ… AP allowlist management Test Results: 10/11 tests passed (91%)

Rollback Functionality

Status: Partially working Issue: Rollback command execution has limitations Impact: Low - can be done manually if needed Workaround: Use no <command> for manual rollback

Post-Apply Verification

Status: Sometimes times out Issue: show running-config after commit apply can timeout Impact: Minimal - configuration is applied successfully Workaround: Wait a few seconds and retry

v1.1.1 (2026-02-23)

โœ… Add ssid_delete change type โœ… Add send_config_and_apply() method โœ… Add send_config_commands() method โœ… Update diff_engine.py for flat command generation โœ… Fix Result action pattern for 'monitor' โœ… Support Aruba IAP single-node cluster mode โœ… Comprehensive testing on real hardware

v1.1.0 (2026-02-23)

โœ… Initial release with core functionality โœ… Device discovery and mode detection โœ… Configuration snapshots โœ… SSID profile management โœ… Configuration diff and apply โœ… Risk assessment โœ… Health monitoring

Requirements

Python 3.8+ scrapli[paramiko] for SSH connections Aruba Instant AP 6.x, 8.x, or AOS 10.x

License

MIT License - See LICENSE file for details

Support

For issues, questions, or contributions: ClawHub: https://clawhub.com/skills/aruba-iap Documentation: See docs/ folder Examples: See examples/ folder

Category context

Code helpers, APIs, CLIs, browser automation, testing, and developer operations.

Source: Tencent SkillHub

Largest current source with strong distribution and engagement signals.

Package contents

Included in package
3 Config2 Docs1 Assets
  • SKILL.md Primary doc
  • README.md Docs
  • _meta.json Config
  • add-aruba-ssid.json Config
  • backups/20260223_232629/result.json Config
  • assets/config_template.txt Assets