Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Comprehensive Aruba Instant AP (IAP) configuration management with automatic baseline capture, rollback support, and health monitoring. Supports device disco...
Comprehensive Aruba Instant AP (IAP) configuration management with automatic baseline capture, rollback support, and health monitoring. Supports device disco...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Comprehensive Aruba Instant AP (IAP) configuration management with automatic baseline capture, rollback support, and health monitoring.
Device Mode Detection: Automatically detects Virtual Controller, Single-Node Cluster, or Standalone AP mode Configuration Snapshots: Full configuration capture with structured JSON output Safe Configuration Changes: Apply changes with automatic baseline capture and rollback support Comprehensive Monitoring: 40+ monitoring commands across 10 categories Risk Assessment: Automatic risk evaluation for configuration changes Secret Management: Secure secret references (no plain-text passwords) Change History: Full audit trail with timestamped artifacts Interactive Configuration Mode: Support for Aruba IAP CLI commit model
TypeRiskDescriptionssid_profileMediumCreate complete SSID profile with WPA2-PSK-AESssid_deleteHighRemove existing SSID profilesnmp_communityLowSNMP community configurationsnmp_hostLow-MediumSNMP host/trap destinationsyslog_levelLowSyslog logging levelsauth_serverMediumRADIUS/CPPM authentication serverap_allowlistMediumAdd/remove APs from allowlistwired_port_profileMediumWired port configurationntpLowNTP server configurationdnsLowDNS server configurationrf_templateLowRF template application
# Clone or download the skill cd ~/.openclaw/workspace/skills/aruba-iap-publish # Run install script ./install.sh # Verify installation iapctl --help
# Device Discovery iapctl discover --cluster office-iap --vc 192.168.20.56 --out ./out # Configuration Snapshot iapctl snapshot --cluster office-iap --vc 192.168.20.56 --out ./out # Verify Configuration iapctl verify --cluster office-iap --vc 192.168.20.56 --level basic --out ./out
# Create SSID configuration JSON cat > add-ssid.json << 'EOF' { "changes": [ { "type": "ssid_profile", "profile_name": "MyWiFi", "essid": "MyNetwork", "opmode": "wpa2-psk-aes", "wpa_passphrase": "MySecurePassword123", "vlan": 1, "rf_band": "all" } ] } EOF # Generate diff iapctl diff --cluster office-iap --vc 192.168.20.56 \ --in add-ssid.json --out ./diff # Apply changes iapctl apply --cluster office-iap --vc 192.168.20.56 \ --change-id $(cat diff/commands.json | jq -r '.change_id') \ --in diff/commands.json --out ./apply
# Create delete SSID configuration JSON cat > delete-ssid.json << 'EOF' { "changes": [ { "type": "ssid_delete", "profile_name": "OldSSID" } ] } EOF # Generate diff iapctl diff --cluster office-iap --vc 192.168.20.56 \ --in delete-ssid.json --out ./diff # Apply changes iapctl apply --cluster office-iap --vc 192.168.20.56 \ --change-id $(cat diff/commands.json | jq -r '.change_id') \ --in diff/commands.json --out ./apply
# Monitor all categories iapctl monitor --cluster office-iap --vc 192.168.20.56 --out ./monitor # Monitor specific categories iapctl monitor --cluster office-iap --vc 192.168.20.56 \ -c "system ap clients wlan" --out ./monitor
Virtual Controller Mode Manages multiple IAPs Full CLI command set available Single-Node Cluster Mode โจ NEW Single IAP with VC configuration Supports interactive config mode configure terminal โ config commands โ commit apply Standalone AP Mode Individual AP without cluster Basic configuration available
For Aruba IAP devices, configuration uses the CLI commit model: Enter configuration mode: configure terminal Enter sub-mode (e.g., wlan ssid-profile <name>) Configure parameters (flat commands, no indentation) Exit sub-mode: exit Exit configuration mode: exit Save configuration: write memory Apply configuration: commit apply
iapctl automatically assesses risks for each change set:
low: Minimal impact, safe to apply medium: May affect connectivity, review recommended high: Major changes, requires careful planning
Removing WLAN or RADIUS configuration may disconnect users WPA passphrase changes will require clients to re-authenticate AP allowlist changes may prevent APs from joining the cluster VLAN changes may affect network connectivity Large number of changes - consider applying in stages
Always use secret_ref for passwords and keys: { "type": "auth_server", "server_name": "radius-primary", "ip": "10.10.10.10", "secret_ref": "secret:radius-primary-key" } Never commit plain-text secrets to version control.
Always review risk.json before applying changes: cat diff/risk.json
Test with --dry-run to verify commands without applying: iapctl apply --dry-run ...
Always run verify after applying changes: iapctl verify --level full ...
For large change sets, break them into smaller batches: Stage 1: SNMP and syslog configuration Stage 2: Authentication servers Stage 3: SSID profiles Stage 4: AP allowlist and wired ports
Comprehensive testing performed on real hardware: โ Device discovery and mode detection โ Configuration snapshot with multiple artifacts โ Configuration diff generation โ SSID profile addition โ SSID profile deletion โ Configuration apply with interactive mode โ Configuration verification โ Health monitoring โ Risk assessment โ AP allowlist management Test Results: 10/11 tests passed (91%)
Status: Partially working Issue: Rollback command execution has limitations Impact: Low - can be done manually if needed Workaround: Use no <command> for manual rollback
Status: Sometimes times out Issue: show running-config after commit apply can timeout Impact: Minimal - configuration is applied successfully Workaround: Wait a few seconds and retry
โ Add ssid_delete change type โ Add send_config_and_apply() method โ Add send_config_commands() method โ Update diff_engine.py for flat command generation โ Fix Result action pattern for 'monitor' โ Support Aruba IAP single-node cluster mode โ Comprehensive testing on real hardware
โ Initial release with core functionality โ Device discovery and mode detection โ Configuration snapshots โ SSID profile management โ Configuration diff and apply โ Risk assessment โ Health monitoring
Python 3.8+ scrapli[paramiko] for SSH connections Aruba Instant AP 6.x, 8.x, or AOS 10.x
MIT License - See LICENSE file for details
For issues, questions, or contributions: ClawHub: https://clawhub.com/skills/aruba-iap Documentation: See docs/ folder Examples: See examples/ folder
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.