What "a bunch of different businesses" means exactly?
3 Businesses for 3 Aruba 2930F (where each Business uses one specific assigned Aruba 2930F) OR a lot more Businesses (dynamically, from the short/mid/long term time standpoint) sharing 3 Aruba 2930F?
Deploynent scenarios would vary with regards to given answer.
If each Business uses its assigned Aruba 2930F specifically and statically...you could use each one as a (physically) isolated switched network connected to a specific Firewall's LAN interface, Firewall will apply all required NAT/Access policies to grant each Business its slice of WAN connectivity, this for each LAN downlink to each Aruba 2930F (that's "total separation"...the Firewall does all and it is SPoF, no IP Routing on Switches is necessary since each Switch will manage basically one VLAN/Subnet...at least until you start eventually to want VLANs on each Switch to do sub-separation...and that less simple scenario could/couldn't imply enabling IP Routing - and ACL? - at Switches level for convenience and rethinking the role of your Firewall)...if, instead, the scenario is "all Businesses share all the whole switching infrastructure" then VLANs deployment shall become a mandatory requirement even if NAT/Access policies should be still performed at Firewall level...but downlink(s) to entire switching infrastructure can be simplified (or not) transporting all necessary VLANs IDs over a single uplink (or over an aggregated one) to one (multiple) Firewall LAN interface(s) (so there will still be a logical separation of Businesses subnets), VLANs IP interfaces would be defined on the Firewall (where, as first case, you will continue to provide DHCP services) and, each one of them, would be the gateway for its subnet...clearly Firewall will do all IP Routing to Internet and, as written, it will provide all NAT/Access required features for each VLAN.
In this latter case maybe you can create, switching infrastructure side, a Virtual Switch by using Aruba VSF...and, to enhance resiliency, use a LACP aggregated group of ports (three) as uplinks to your Firewall...if it supports IEEE 802.3ad on its LAN interfaces.
There are, for sure, many other possible solutions or variants...