Alcatel-Lucent Enterprise Configuration
This guide explains how to configure Alcatel-Lucent Enterprise (ALE) wireless infrastructure to work with IronWifi for RADIUS authentication and captive portal.
Supported Platforms
- OmniAccess Stellar - AP1101, AP1201, AP1220 series
- OmniAccess WLAN - Controller-based deployments
- Instant Access Points (IAP) - Standalone/cluster mode
Prerequisites
In IronWifi Console (complete these first):
- Log in to IronWifi Management Console
- Navigate to Networks
- Click Create Network or select existing
- Note RADIUS details:
- RADIUS Server IP
- Authentication Port: 1812
- Accounting Port: 1813
- Shared Secret
- (Optional) Navigate to Captive Portals and create portal for your network
- Note the Splash Page URL
In Alcatel-Lucent Enterprise:
- Administrative access to OmniVista or controller interface
- Network connectivity to IronWifi RADIUS servers
- For captive portal: Access to configure walled garden
Controller-Based Configuration
OmniVista Network Management
Step 1: Configure RADIUS Server
- Log in to OmniVista 2500
- Navigate to Network > Unified Access > RADIUS Servers
- Click Add
- Configure:
- Name: IronWifi
- IP Address: Your IronWifi RADIUS IP
- Authentication Port: 1812
- Accounting Port: 1813
- Shared Secret: Your RADIUS secret
- Confirm Secret: Re-enter secret
- Click Create
Step 2: Create Authentication Profile
- Go to Authentication > Profiles
- Click Add
- Configure:
- Profile Name: IronWifi-Auth
- Primary RADIUS Server: IronWifi
- Authentication Type: 802.1X or MAC
- Click Create
Step 3: Configure WLAN
- Navigate to Wireless > WLANs
- Click Add WLAN
- Configure:
- SSID Name: Your network name
- Security: WPA2-Enterprise
- Authentication Profile: IronWifi-Auth
Step 4: Configure Captive Portal (Optional)
- In WLAN settings, go to Captive Portal
- Enable External Captive Portal
- Configure:
- Redirect URL: Your IronWifi Splash Page URL
- Walled Garden: Add IronWifi domains
CLI Configuration
Connect to controller CLI:
# Configure RADIUS server
aaa radius-server IronWifi host <IronWifi-IP> key <secret>
# Configure authentication profile
aaa profile IronWifi-Auth
authentication server IronWifi
accounting server IronWifi
# Configure WLAN
wlan ssid-profile IronWifi-SSID
essid "YourNetworkName"
encryption wpa2-aes
aaa-profile IronWifi-Auth
Instant Access Point (IAP) Configuration
Web Interface Configuration
Step 1: Access IAP
- Connect to IAP web interface
- Log in with admin credentials
Step 2: Configure RADIUS
- Navigate to Security > Authentication Servers
- Click Add
- Configure:
- Name: IronWifi
- IP Address: IronWifi RADIUS IP
- Auth Port: 1812
- Accounting Port: 1813
- Shared Key: Your RADIUS secret
Step 3: Create Network
- Go to Network > Networks
- Click + to add network
- Configure Basic Settings:
- Name: IronWifi-Network
- SSID: Your network name
- Type: Employee or Guest
Step 4: Configure Security
- In network settings, go to Security
- Configure:
- Security Level: Enterprise
- Key Management: WPA2-Enterprise
- Authentication Server: IronWifi
Step 5: Configure Captive Portal (Guest Networks)
- In network settings, go to Captive Portal
- Select External captive portal
- Configure:
- Server: IronWifi splash page URL
- URL: Redirect URL
IAP CLI Configuration
# Configure RADIUS
wlan auth-server IronWifi
ip <IronWifi-IP>
port 1812
acctport 1813
key <your-secret>
# Configure network
wlan ssid-profile IronWifi-SSID
essid YourNetworkName
type employee
opmode wpa2-aes
auth-server IronWifi
# For guest with captive portal
wlan ssid-profile Guest-SSID
essid GuestNetwork
type guest
captive-portal external
captive-portal-url https://us-east1.ironwifi.com/captive-portal/...
Stellar Wireless Configuration
OmniVista Cirrus
- Log in to OmniVista Cirrus cloud management
- Navigate to Network > Wireless
- Configure RADIUS and WLAN similar to controller-based setup
Stellar AP Direct Configuration
- Access Stellar AP web interface
- Configure RADIUS server
- Create WLAN with WPA2-Enterprise
- Configure captive portal if needed
Walled Garden Configuration
For captive portal networks, add these domains to the walled garden:
Required for IronWifi:
*.ironwifi.com
*.ironwifi.net
splash.ironwifi.com
us-east1.ironwifi.com
eu-west1.ironwifi.com
Authentication Provider Domains:
If using social login providers, add the following domains to your walled garden:
| Provider | Required Entries |
|---|---|
*.google.com, *.googleapis.com, *.gstatic.com, accounts.google.com | |
*.facebook.com, *.fbcdn.net, connect.facebook.net, facebook.com | |
*.twitter.com, *.twimg.com, twitter.com | |
*.linkedin.com, *.licdn.com | |
| Microsoft | *.microsoft.com, *.microsoftonline.com, *.live.com, login.live.com |
Verification
Check RADIUS Connectivity
- In OmniVista, go to Monitoring > RADIUS
- Verify server status shows connected
- Check for authentication events
Test Authentication
- Connect client device to WLAN
- Enter credentials (for 802.1X) or wait for captive portal
- Verify authentication in IronWifi Console
Debug Commands
# Check RADIUS status
show aaa radius-server
# Check authentication events
show aaa authentication
# Check WLAN status
show wlan ssid-profile
# Check connected clients
show clients
Troubleshooting
| Issue | Possible Cause | Solution |
|---|---|---|
| RADIUS timeout | Network connectivity issue | Check connectivity between AP/controller and IronWifi RADIUS server; verify firewall allows UDP ports 1812/1813 |
| Authentication rejected | Wrong shared secret | Verify shared secret matches exactly in both IronWifi Console and device configuration |
| Portal not redirecting | Incorrect portal URL or walled garden | Verify captive portal URL is correct; check walled garden configuration includes all required domains |
| Cannot complete authentication | Missing walled garden entries | Check walled garden includes all required domains for IronWifi and social login providers |
| SSL error | Certificate issue | Add authentication provider domains to walled garden |
| No redirect | Portal URL misconfigured | Check captive portal configuration and URL |
| DNS resolution failure | DNS not working | Ensure DNS is properly configured for clients |
Additional Troubleshooting Steps
-
Verify RADIUS Configuration
- Check server IP address is correct
- Verify shared secret matches exactly
- Ensure ports 1812/1813 are open
-
Check Connectivity
ping <IronWifi-RADIUS-IP> -
Review Logs
- Check controller/AP logs for RADIUS errors
- Review IronWifi Console authentication logs
- Look for timeout or rejection messages
Best Practices
- Redundancy: Configure secondary RADIUS server
- Timeouts: Set appropriate RADIUS timeout values
- Logging: Enable detailed logging during setup
- Testing: Test with multiple client types
- Documentation: Record all configuration settings
- Updates: Keep firmware current