Skip to main content

Proxim Wireless Configuration

This guide explains how to configure Proxim Wireless access points and controllers to work with IronWifi for RADIUS authentication and captive portal.

Overview

Proxim Wireless (now part of ADTRAN) provides enterprise wireless solutions including:

  • ORiNOCO Access Points - Enterprise-grade APs
  • ProximVision - Centralized management platform
  • Tsunami - Point-to-point/multipoint bridges

Prerequisites

In IronWifi Console (complete these first):

  1. Log in to IronWifi Management Console
  2. Navigate to Networks
  3. Click Create Network or select existing
  4. Note RADIUS details:
    • RADIUS Server IP
    • Authentication Port: 1812
    • Accounting Port: 1813
    • Shared Secret
  5. Navigate to Captive Portals
  6. Click Create Captive Portal
  7. Configure:
    • Network: Select your network
    • Vendor: Generic or Proxim
  8. Note the Splash Page URL
  9. Copy the Walled Garden domains

In Proxim Wireless:

  • Proxim Wireless access point or controller
  • Administrative access to device or ProximVision management platform
  • Network connectivity to IronWifi RADIUS servers

ORiNOCO Access Point Configuration

Access Web Interface

  1. Connect to the AP network or via Ethernet
  2. Open browser and navigate to AP management IP
  3. Log in with admin credentials

Configure RADIUS Server

  1. Navigate to Security > RADIUS

  2. Click Add Server or edit existing

  3. Configure Authentication Server:

    • Server Name: IronWifi
    • IP Address: Your IronWifi RADIUS IP
    • Port: 1812
    • Shared Secret: Your RADIUS secret
    • Timeout: 5 seconds
    • Retries: 3
  4. Configure Accounting Server:

    • IP Address: Same as authentication
    • Port: 1813
    • Shared Secret: Same secret
  5. Click Apply

Create Enterprise WLAN

  1. Navigate to Wireless > SSIDs

  2. Click Add SSID

  3. Configure Basic Settings:

    • SSID Name: Your network name
    • SSID Broadcast: Enabled
  4. Configure Security:

    • Security Mode: WPA2-Enterprise
    • Authentication: 802.1X
    • RADIUS Server: IronWifi
    • Encryption: AES
  5. Click Apply

Configure Guest WLAN with Captive Portal

  1. Navigate to Wireless > SSIDs

  2. Click Add SSID

  3. Configure Basic Settings:

    • SSID Name: Guest WiFi
    • SSID Broadcast: Enabled
  4. Configure Security:

    • Security Mode: Open (or WPA2-Personal)
    • Captive Portal: Enable
  5. Configure Captive Portal:

    • Portal Type: External
    • External URL: Your IronWifi Splash Page URL
    • Authentication: RADIUS
    • RADIUS Server: IronWifi
  6. Click Apply

Configure Walled Garden

  1. Navigate to Security > Captive Portal or Access Control
  2. Find Walled Garden or Pre-Authentication Access List
  3. Add IronWifi domains:

Required for IronWifi:

*.ironwifi.com
*.ironwifi.net
splash.ironwifi.com
107.178.250.42

Authentication Provider Domains:

If using social login providers, add the following domains to your walled garden:

ProviderRequired Entries
Google*.google.com, *.googleapis.com, *.gstatic.com, accounts.google.com
Facebook*.facebook.com, *.fbcdn.net, connect.facebook.net, facebook.com
Twitter*.twitter.com, *.twimg.com, twitter.com
LinkedIn*.linkedin.com, *.licdn.com
Microsoft*.microsoft.com, *.microsoftonline.com, *.live.com, login.live.com
  1. Click Apply

ProximVision Configuration

Access ProximVision

  1. Log in to ProximVision management console
  2. Navigate to your network/site

Configure RADIUS Profile

  1. Go to Configuration > Security > RADIUS

  2. Click Add Profile

  3. Configure:

    • Profile Name: IronWifi-RADIUS
    • Primary Server IP: IronWifi RADIUS IP
    • Primary Port: 1812
    • Primary Secret: Your shared secret
    • Accounting Server: Same IP, port 1813
  4. Click Save

Create WLAN Template

  1. Go to Configuration > Wireless > WLAN Templates
  2. Click Create Template
  3. Configure SSID and security settings
  4. Assign RADIUS profile
  5. Deploy to access points

Deploy Configuration

  1. Select target access points
  2. Click Deploy or Push Configuration
  3. Wait for configuration sync

CLI Configuration

For advanced users, access AP via SSH/Telnet:

Configure RADIUS

radius-server host <IronWifi-IP>
radius-server auth-port 1812
radius-server acct-port 1813
radius-server key <shared-secret>
radius-server timeout 5
radius-server retries 3

Configure WLAN

wlan ssid "Enterprise-WiFi"
wlan security wpa2-enterprise
wlan radius-server IronWifi
wlan enable

Configure Captive Portal

captive-portal enable
captive-portal external-url <splash-page-url>
captive-portal radius-server IronWifi
captive-portal walled-garden add *.ironwifi.com
captive-portal walled-garden add 107.178.250.42

Configuration Summary

RADIUS Settings

SettingValue
Server IPIronWifi RADIUS IP
Auth Port1812
Acct Port1813
SecretYour shared secret
Timeout5 seconds

Enterprise WLAN

SettingValue
SecurityWPA2-Enterprise
Authentication802.1X
RADIUSIronWifi

Guest WLAN

SettingValue
Portal TypeExternal
Portal URLIronWifi Splash Page
AuthenticationRADIUS

Verification

Check AP Status

  1. Navigate to Status > System
  2. Verify AP is operational
  3. Check WLAN status

Check RADIUS Connectivity

  1. Navigate to Status > RADIUS or Security
  2. Verify server status
  3. Check for connectivity errors

Test Authentication

  1. Connect client to configured SSID
  2. For Enterprise: Enter credentials
  3. For Guest: Complete captive portal
  4. Verify in IronWifi Console logs

Troubleshooting

IssuePossible CauseSolution
RADIUS timeoutNetwork connectivity issueVerify AP can reach IronWifi RADIUS; check firewall rules allow UDP ports 1812/1813; test with ping/traceroute
Authentication rejectedWrong shared secretVerify shared secret matches exactly in both IronWifi Console and device configuration
Portal not redirectingPortal disabled or URL wrongVerify captive portal is enabled; check external URL is correct; ensure DNS resolution works
Cannot complete authenticationMissing walled garden entriesVerify walled garden includes all required domains; check RADIUS communication
SSL errorCertificate issueAdd authentication provider domains to walled garden

Additional Troubleshooting Steps

  1. Verify RADIUS Configuration

    • Check server IP is correct
    • Verify shared secret matches exactly
    • Ensure ports 1812/1813 are correct
  2. Check Network Connectivity

    • Verify AP can reach IronWifi RADIUS
    • Check firewall rules
    • Test with ping/traceroute
  3. Review Logs

    • Check AP system logs
    • Review IronWifi authentication logs
  4. Captive Portal Issues

    • Clear browser cache and retry
    • Test with different devices/browsers

Best Practices

  1. Firmware Updates: Keep AP firmware current
  2. Strong Secrets: Use complex RADIUS shared secrets
  3. Monitoring: Check AP status regularly
  4. Backup Config: Save configuration before changes
  5. Documentation: Record all settings
  6. Testing: Verify changes before production