Skip to main content

D-Link Nuclias Cloud Configuration

This guide explains how to configure D-Link Nuclias Cloud managed access points to work with IronWifi for RADIUS authentication and captive portal.

Overview

D-Link Nuclias Cloud is a cloud-managed wireless solution that supports:

  • External RADIUS authentication
  • External captive portal
  • WPA2/WPA3-Enterprise
  • Guest network isolation

Prerequisites

In IronWifi Console (complete these first):

  1. Log in to IronWifi Management Console
  2. Navigate to Networks
  3. Click Create Network or select existing
  4. Note RADIUS details:
    • RADIUS Server IP
    • Authentication Port: 1812
    • Accounting Port: 1813
    • Shared Secret
  5. Navigate to Captive Portals
  6. Click Create Captive Portal
  7. Configure:
    • Network: Select your network
    • Vendor: D-Link or Generic
  8. Note the Splash Page URL
  9. Copy the Walled Garden domains
  • D-Link Nuclias Cloud account
  • Nuclias-compatible access points (DBA series)
  • Administrative access to Nuclias Cloud portal
  • Network connectivity to IronWifi RADIUS servers

Nuclias Cloud Configuration

Step 1: Access Nuclias Cloud

  1. Log in to Nuclias Cloud (nuclias.com)
  2. Navigate to your organization
  3. Select the site containing your access points

Step 2: Configure RADIUS Server

  1. Go to Configure > Authentication > RADIUS

  2. Click Add RADIUS Server

  3. Configure Primary Server:

    • Name: IronWifi
    • IP Address: Your IronWifi RADIUS IP
    • Port: 1812
    • Shared Secret: Your RADIUS secret
    • Confirm Secret: Re-enter secret
  4. Configure Accounting (Optional):

    • Accounting Server IP: Same as authentication
    • Accounting Port: 1813
    • Accounting Secret: Same secret
  5. Click Save

Step 3: Create RADIUS Profile

  1. Go to RADIUS Profiles
  2. Click Add Profile
  3. Configure:
    • Profile Name: IronWifi-Profile
    • Primary Server: IronWifi
    • Timeout: 5 seconds
    • Retry: 3
  4. Click Save

Step 4: Create SSID for Enterprise Authentication

  1. Navigate to Configure > SSIDs

  2. Click Add SSID

  3. Configure Basic Settings:

    • SSID Name: Your network name
    • Security Mode: WPA2-Enterprise
    • RADIUS Profile: IronWifi-Profile
  4. Configure Advanced Settings:

    • Band: 2.4GHz and 5GHz
    • VLAN: Configure as needed
    • Client Isolation: Enable for guest networks
  5. Click Save

Step 5: Configure Captive Portal (Guest Networks)

For guest networks with captive portal:

  1. Go to Configure > SSIDs

  2. Create or edit SSID

  3. Configure:

    • Security Mode: Open or WPA2-Personal
    • Captive Portal: Enable
    • Portal Type: External
  4. Configure External Portal:

    • Splash Page URL: Your IronWifi splash page URL
    • Portal Mode: Click-through or RADIUS
    • RADIUS Server: IronWifi (if using RADIUS auth)
  5. Click Save

Step 6: Configure Walled Garden

  1. In SSID settings, find Walled Garden or Pre-Auth Access
  2. Add IronWifi domains:

Required for IronWifi:

*.ironwifi.com
*.ironwifi.net
splash.ironwifi.com
107.178.250.42

Authentication Provider Domains:

If using social login providers, add the following domains to your walled garden:

ProviderRequired Entries
Google*.google.com, *.googleapis.com, *.gstatic.com, accounts.google.com
Facebook*.facebook.com, *.fbcdn.net, connect.facebook.net, facebook.com
Twitter*.twitter.com, *.twimg.com, twitter.com
LinkedIn*.linkedin.com, *.licdn.com
Microsoft*.microsoft.com, *.microsoftonline.com, *.live.com, login.live.com
  1. Click Save

Step 7: Apply Configuration

  1. Go to Devices > Access Points
  2. Select APs to apply configuration
  3. Click Push Configuration or wait for automatic sync

Configuration Summary

RADIUS Settings

SettingValue
Server IPIronWifi RADIUS IP
Auth Port1812
Acct Port1813
SecretYour shared secret
Timeout5 seconds

SSID Settings (Enterprise)

SettingValue
SecurityWPA2-Enterprise
RADIUS ProfileIronWifi-Profile
Authentication802.1X

Captive Portal Settings

SettingValue
Portal TypeExternal
Splash URLIronWifi splash page URL
Walled GardenIronWifi domains

Verification

Check AP Status

  1. Go to Monitor > Access Points
  2. Verify APs are online
  3. Check configuration sync status

Check RADIUS Connectivity

  1. Go to Monitor > Events
  2. Filter for RADIUS events
  3. Look for successful authentications

Test Client Connection

  1. Connect client to configured SSID
  2. For Enterprise: Enter credentials
  3. For Captive Portal: Complete splash page authentication
  4. Verify in IronWifi Console logs

Troubleshooting

IssuePossible CauseSolution
RADIUS timeoutNetwork connectivity issueVerify AP can reach IronWifi RADIUS server; check firewall rules allow outbound UDP 1812/1813
Authentication rejectedWrong shared secretVerify shared secret matches exactly in both IronWifi Console and Nuclias Cloud
Portal not redirectingPortal disabled or URL wrongVerify captive portal is enabled on SSID; check splash page URL is correct; ensure DNS is working
Cannot complete authenticationMissing walled garden entriesVerify walled garden includes all required domains; check HTTPS redirect settings
Social login failuresMissing provider domainsAdd all social provider domains to walled garden; check OAuth callback URLs in IronWifi
SSL errorCertificate issueAdd authentication provider domains to walled garden
Config sync failedAP offlineCheck AP connectivity to Nuclias Cloud

Additional Troubleshooting Steps

  1. Verify RADIUS Configuration

    • Check server IP address is correct
    • Verify shared secret matches exactly
    • Ensure ports 1812/1813 are correct
  2. Check Network Connectivity

    • Verify AP can reach IronWifi RADIUS server
    • Check firewall rules allow outbound UDP 1812/1813
  3. Review Logs

    • Check Nuclias Cloud events
    • Review IronWifi authentication logs
  4. Captive Portal Issues

    • Clear browser cache and retry
    • Test with different devices/browsers
    • Review browser console for errors

Advanced Configuration

Multiple SSIDs

Configure separate SSIDs for different purposes:

  1. Corporate SSID: WPA2-Enterprise with RADIUS
  2. Guest SSID: Captive portal with social login
  3. IoT SSID: MAC authentication

VLAN Assignment

  1. In SSID settings, enable Dynamic VLAN
  2. Configure VLAN attributes in IronWifi user/group settings
  3. Ensure switch ports support tagged VLANs

Band Steering

  1. Enable Band Steering in SSID settings
  2. Prefer 5GHz for better performance
  3. Configure steering thresholds

Best Practices

  1. Use Strong Secrets: Generate complex RADIUS shared secrets
  2. Enable Accounting: Track usage and sessions
  3. Configure Timeouts: Set appropriate session limits
  4. Monitor Regularly: Check Nuclias Cloud dashboard
  5. Firmware Updates: Keep APs updated
  6. Test Changes: Verify before production deployment