Proxim Wireless Configuration
This guide explains how to configure Proxim Wireless access points and controllers to work with IronWifi for RADIUS authentication and captive portal.
Overview
Proxim Wireless (now part of ADTRAN) provides enterprise wireless solutions including:
- ORiNOCO Access Points - Enterprise-grade APs
- ProximVision - Centralized management platform
- Tsunami - Point-to-point/multipoint bridges
Prerequisites
In IronWifi Console (complete these first):
- Log in to IronWifi Management Console
- Navigate to Networks
- Click Create Network or select existing
- Note RADIUS details:
- RADIUS Server IP
- Authentication Port: 1812
- Accounting Port: 1813
- Shared Secret
- Navigate to Captive Portals
- Click Create Captive Portal
- Configure:
- Network: Select your network
- Vendor: Generic or Proxim
- Note the Splash Page URL
- Copy the Walled Garden domains
In Proxim Wireless:
- Proxim Wireless access point or controller
- Administrative access to device or ProximVision management platform
- Network connectivity to IronWifi RADIUS servers
ORiNOCO Access Point Configuration
Access Web Interface
- Connect to the AP network or via Ethernet
- Open browser and navigate to AP management IP
- Log in with admin credentials
Configure RADIUS Server
-
Navigate to Security > RADIUS
-
Click Add Server or edit existing
-
Configure Authentication Server:
- Server Name: IronWifi
- IP Address: Your IronWifi RADIUS IP
- Port: 1812
- Shared Secret: Your RADIUS secret
- Timeout: 5 seconds
- Retries: 3
-
Configure Accounting Server:
- IP Address: Same as authentication
- Port: 1813
- Shared Secret: Same secret
-
Click Apply
Create Enterprise WLAN
-
Navigate to Wireless > SSIDs
-
Click Add SSID
-
Configure Basic Settings:
- SSID Name: Your network name
- SSID Broadcast: Enabled
-
Configure Security:
- Security Mode: WPA2-Enterprise
- Authentication: 802.1X
- RADIUS Server: IronWifi
- Encryption: AES
-
Click Apply
Configure Guest WLAN with Captive Portal
-
Navigate to Wireless > SSIDs
-
Click Add SSID
-
Configure Basic Settings:
- SSID Name: Guest WiFi
- SSID Broadcast: Enabled
-
Configure Security:
- Security Mode: Open (or WPA2-Personal)
- Captive Portal: Enable
-
Configure Captive Portal:
- Portal Type: External
- External URL: Your IronWifi Splash Page URL
- Authentication: RADIUS
- RADIUS Server: IronWifi
-
Click Apply
Configure Walled Garden
- Navigate to Security > Captive Portal or Access Control
- Find Walled Garden or Pre-Authentication Access List
- Add IronWifi domains:
Required for IronWifi:
*.ironwifi.com
*.ironwifi.net
splash.ironwifi.com
107.178.250.42
Authentication Provider Domains:
If using social login providers, add the following domains to your walled garden:
| Provider | Required Entries |
|---|---|
*.google.com, *.googleapis.com, *.gstatic.com, accounts.google.com | |
*.facebook.com, *.fbcdn.net, connect.facebook.net, facebook.com | |
*.twitter.com, *.twimg.com, twitter.com | |
*.linkedin.com, *.licdn.com | |
| Microsoft | *.microsoft.com, *.microsoftonline.com, *.live.com, login.live.com |
- Click Apply
ProximVision Configuration
Access ProximVision
- Log in to ProximVision management console
- Navigate to your network/site
Configure RADIUS Profile
-
Go to Configuration > Security > RADIUS
-
Click Add Profile
-
Configure:
- Profile Name: IronWifi-RADIUS
- Primary Server IP: IronWifi RADIUS IP
- Primary Port: 1812
- Primary Secret: Your shared secret
- Accounting Server: Same IP, port 1813
-
Click Save
Create WLAN Template
- Go to Configuration > Wireless > WLAN Templates
- Click Create Template
- Configure SSID and security settings
- Assign RADIUS profile
- Deploy to access points
Deploy Configuration
- Select target access points
- Click Deploy or Push Configuration
- Wait for configuration sync
CLI Configuration
For advanced users, access AP via SSH/Telnet:
Configure RADIUS
radius-server host <IronWifi-IP>
radius-server auth-port 1812
radius-server acct-port 1813
radius-server key <shared-secret>
radius-server timeout 5
radius-server retries 3
Configure WLAN
wlan ssid "Enterprise-WiFi"
wlan security wpa2-enterprise
wlan radius-server IronWifi
wlan enable
Configure Captive Portal
captive-portal enable
captive-portal external-url <splash-page-url>
captive-portal radius-server IronWifi
captive-portal walled-garden add *.ironwifi.com
captive-portal walled-garden add 107.178.250.42
Configuration Summary
RADIUS Settings
| Setting | Value |
|---|---|
| Server IP | IronWifi RADIUS IP |
| Auth Port | 1812 |
| Acct Port | 1813 |
| Secret | Your shared secret |
| Timeout | 5 seconds |
Enterprise WLAN
| Setting | Value |
|---|---|
| Security | WPA2-Enterprise |
| Authentication | 802.1X |
| RADIUS | IronWifi |
Guest WLAN
| Setting | Value |
|---|---|
| Portal Type | External |
| Portal URL | IronWifi Splash Page |
| Authentication | RADIUS |
Verification
Check AP Status
- Navigate to Status > System
- Verify AP is operational
- Check WLAN status
Check RADIUS Connectivity
- Navigate to Status > RADIUS or Security
- Verify server status
- Check for connectivity errors
Test Authentication
- Connect client to configured SSID
- For Enterprise: Enter credentials
- For Guest: Complete captive portal
- Verify in IronWifi Console logs
Troubleshooting
| Issue | Possible Cause | Solution |
|---|---|---|
| RADIUS timeout | Network connectivity issue | Verify AP can reach IronWifi RADIUS; check firewall rules allow UDP ports 1812/1813; test with ping/traceroute |
| Authentication rejected | Wrong shared secret | Verify shared secret matches exactly in both IronWifi Console and device configuration |
| Portal not redirecting | Portal disabled or URL wrong | Verify captive portal is enabled; check external URL is correct; ensure DNS resolution works |
| Cannot complete authentication | Missing walled garden entries | Verify walled garden includes all required domains; check RADIUS communication |
| SSL error | Certificate issue | Add authentication provider domains to walled garden |
Additional Troubleshooting Steps
-
Verify RADIUS Configuration
- Check server IP is correct
- Verify shared secret matches exactly
- Ensure ports 1812/1813 are correct
-
Check Network Connectivity
- Verify AP can reach IronWifi RADIUS
- Check firewall rules
- Test with ping/traceroute
-
Review Logs
- Check AP system logs
- Review IronWifi authentication logs
-
Captive Portal Issues
- Clear browser cache and retry
- Test with different devices/browsers
Best Practices
- Firmware Updates: Keep AP firmware current
- Strong Secrets: Use complex RADIUS shared secrets
- Monitoring: Check AP status regularly
- Backup Config: Save configuration before changes
- Documentation: Record all settings
- Testing: Verify changes before production