D-Link Nuclias Cloud Configuration
This guide explains how to configure D-Link Nuclias Cloud managed access points to work with IronWifi for RADIUS authentication and captive portal.
Overview
D-Link Nuclias Cloud is a cloud-managed wireless solution that supports:
- External RADIUS authentication
- External captive portal
- WPA2/WPA3-Enterprise
- Guest network isolation
Prerequisites
In IronWifi Console (complete these first):
- Log in to IronWifi Management Console
- Navigate to Networks
- Click Create Network or select existing
- Note RADIUS details:
- RADIUS Server IP
- Authentication Port: 1812
- Accounting Port: 1813
- Shared Secret
- Navigate to Captive Portals
- Click Create Captive Portal
- Configure:
- Network: Select your network
- Vendor: D-Link or Generic
- Note the Splash Page URL
- Copy the Walled Garden domains
In D-Link Nuclias Cloud:
- D-Link Nuclias Cloud account
- Nuclias-compatible access points (DBA series)
- Administrative access to Nuclias Cloud portal
- Network connectivity to IronWifi RADIUS servers
Nuclias Cloud Configuration
Step 1: Access Nuclias Cloud
- Log in to Nuclias Cloud (nuclias.com)
- Navigate to your organization
- Select the site containing your access points
Step 2: Configure RADIUS Server
-
Go to Configure > Authentication > RADIUS
-
Click Add RADIUS Server
-
Configure Primary Server:
- Name: IronWifi
- IP Address: Your IronWifi RADIUS IP
- Port: 1812
- Shared Secret: Your RADIUS secret
- Confirm Secret: Re-enter secret
-
Configure Accounting (Optional):
- Accounting Server IP: Same as authentication
- Accounting Port: 1813
- Accounting Secret: Same secret
-
Click Save
Step 3: Create RADIUS Profile
- Go to RADIUS Profiles
- Click Add Profile
- Configure:
- Profile Name: IronWifi-Profile
- Primary Server: IronWifi
- Timeout: 5 seconds
- Retry: 3
- Click Save
Step 4: Create SSID for Enterprise Authentication
-
Navigate to Configure > SSIDs
-
Click Add SSID
-
Configure Basic Settings:
- SSID Name: Your network name
- Security Mode: WPA2-Enterprise
- RADIUS Profile: IronWifi-Profile
-
Configure Advanced Settings:
- Band: 2.4GHz and 5GHz
- VLAN: Configure as needed
- Client Isolation: Enable for guest networks
-
Click Save
Step 5: Configure Captive Portal (Guest Networks)
For guest networks with captive portal:
-
Go to Configure > SSIDs
-
Create or edit SSID
-
Configure:
- Security Mode: Open or WPA2-Personal
- Captive Portal: Enable
- Portal Type: External
-
Configure External Portal:
- Splash Page URL: Your IronWifi splash page URL
- Portal Mode: Click-through or RADIUS
- RADIUS Server: IronWifi (if using RADIUS auth)
-
Click Save
Step 6: Configure Walled Garden
- In SSID settings, find Walled Garden or Pre-Auth Access
- Add IronWifi domains:
Required for IronWifi:
*.ironwifi.com
*.ironwifi.net
splash.ironwifi.com
107.178.250.42
Authentication Provider Domains:
If using social login providers, add the following domains to your walled garden:
| Provider | Required Entries |
|---|---|
*.google.com, *.googleapis.com, *.gstatic.com, accounts.google.com | |
*.facebook.com, *.fbcdn.net, connect.facebook.net, facebook.com | |
*.twitter.com, *.twimg.com, twitter.com | |
*.linkedin.com, *.licdn.com | |
| Microsoft | *.microsoft.com, *.microsoftonline.com, *.live.com, login.live.com |
- Click Save
Step 7: Apply Configuration
- Go to Devices > Access Points
- Select APs to apply configuration
- Click Push Configuration or wait for automatic sync
Configuration Summary
RADIUS Settings
| Setting | Value |
|---|---|
| Server IP | IronWifi RADIUS IP |
| Auth Port | 1812 |
| Acct Port | 1813 |
| Secret | Your shared secret |
| Timeout | 5 seconds |
SSID Settings (Enterprise)
| Setting | Value |
|---|---|
| Security | WPA2-Enterprise |
| RADIUS Profile | IronWifi-Profile |
| Authentication | 802.1X |
Captive Portal Settings
| Setting | Value |
|---|---|
| Portal Type | External |
| Splash URL | IronWifi splash page URL |
| Walled Garden | IronWifi domains |
Verification
Check AP Status
- Go to Monitor > Access Points
- Verify APs are online
- Check configuration sync status
Check RADIUS Connectivity
- Go to Monitor > Events
- Filter for RADIUS events
- Look for successful authentications
Test Client Connection
- Connect client to configured SSID
- For Enterprise: Enter credentials
- For Captive Portal: Complete splash page authentication
- Verify in IronWifi Console logs
Troubleshooting
| Issue | Possible Cause | Solution |
|---|---|---|
| RADIUS timeout | Network connectivity issue | Verify AP can reach IronWifi RADIUS server; check firewall rules allow outbound UDP 1812/1813 |
| Authentication rejected | Wrong shared secret | Verify shared secret matches exactly in both IronWifi Console and Nuclias Cloud |
| Portal not redirecting | Portal disabled or URL wrong | Verify captive portal is enabled on SSID; check splash page URL is correct; ensure DNS is working |
| Cannot complete authentication | Missing walled garden entries | Verify walled garden includes all required domains; check HTTPS redirect settings |
| Social login failures | Missing provider domains | Add all social provider domains to walled garden; check OAuth callback URLs in IronWifi |
| SSL error | Certificate issue | Add authentication provider domains to walled garden |
| Config sync failed | AP offline | Check AP connectivity to Nuclias Cloud |
Additional Troubleshooting Steps
-
Verify RADIUS Configuration
- Check server IP address is correct
- Verify shared secret matches exactly
- Ensure ports 1812/1813 are correct
-
Check Network Connectivity
- Verify AP can reach IronWifi RADIUS server
- Check firewall rules allow outbound UDP 1812/1813
-
Review Logs
- Check Nuclias Cloud events
- Review IronWifi authentication logs
-
Captive Portal Issues
- Clear browser cache and retry
- Test with different devices/browsers
- Review browser console for errors
Advanced Configuration
Multiple SSIDs
Configure separate SSIDs for different purposes:
- Corporate SSID: WPA2-Enterprise with RADIUS
- Guest SSID: Captive portal with social login
- IoT SSID: MAC authentication
VLAN Assignment
- In SSID settings, enable Dynamic VLAN
- Configure VLAN attributes in IronWifi user/group settings
- Ensure switch ports support tagged VLANs
Band Steering
- Enable Band Steering in SSID settings
- Prefer 5GHz for better performance
- Configure steering thresholds
Best Practices
- Use Strong Secrets: Generate complex RADIUS shared secrets
- Enable Accounting: Track usage and sessions
- Configure Timeouts: Set appropriate session limits
- Monitor Regularly: Check Nuclias Cloud dashboard
- Firmware Updates: Keep APs updated
- Test Changes: Verify before production deployment